id() perf_event_open(&(0x7f0000000680)={0x4, 0x70, 0x64, 0xffff, 0x1f, 0x4, 0x0, 0x1c3, 0x0, 0x1, 0x1, 0x9, 0x1ff, 0xfffffffffffffff8, 0x0, 0x0, 0x6, 0x7fffffff, 0x0, 0xffffffff, 0x80000001, 0xd0, 0x7, 0x1f, 0x0, 0x8, 0x9, 0x1ff, 0x8, 0x785, 0x4, 0xff, 0x2, 0x656, 0x5000000, 0x1, 0x460e3be0, 0x1, 0x0, 0x0, 0x7, @perf_bp={&(0x7f0000000640), 0x1}, 0x1000, 0xa, 0x7fff, 0x7, 0x3, 0x400, 0x9}, r5, 0xe, r4, 0x1) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', 0x0, 0x10}, 0x10) close(0xffffffffffffffff) bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)={&(0x7f0000000040)='./file0\x00', 0x0, 0x18}, 0x10) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000100)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0, 0x2e, &(0x7f0000000440), &(0x7f0000000140)=""/46, 0x4229}, 0x28) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000003480)={&(0x7f0000003300)=@can={0x0, 0x0}, 0x80, &(0x7f0000003400)=[{&(0x7f0000003380)=""/56, 0x38}, {&(0x7f00000033c0)=""/1, 0x1}], 0x2, &(0x7f0000003440)=""/33, 0x21, 0x1}, 0x40010000) bpf$PROG_LOAD(0x5, &(0x7f00000034c0)={0xe, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="1800000002000000000000004ce700002555fdff00000000002371d07c9ba7f4a23372b0ad61000000000000009500000000000000"], &(0x7f00000007c0)='GPL\x00', 0x3, 0x2d, &(0x7f0000000800)=""/45, 0x40f00, 0x1, [], r6}, 0x48) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000740)={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x10) socketpair$inet(0x2, 0x80a, 0x81, &(0x7f0000000240)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={0xffffffffffffffff, &(0x7f0000000500)="ae30f1bca1b4d3f69f1aac81517d42ad5980bc63b5008616a1f4724b9f8c1e4ecd8de336f57dd727cdaab04f0b40f28612615ad08de414711d841a88db33fd33884b627074213a0c5de3be2bbaec9207d9865c47f240467849979b5ab5632376608fc4be41a274abb2dc07cabe344a18db51048e5b0cbda843905a4258cdee3e649eddf104ba78894dce09747dcfe6a8d6d6d985520eeef448b83a8bcb83074541ba7a20d6094aa206c01a0690e5b3bfa05d475eb382b0199031d22bb26cde9b1ca0055eef9f6c4993b71ba19ba0590bb5efdaddaa574c25356ca890d138fc9fe0e975b6d5a1a8251503cd0a91845f9d95", &(0x7f0000000480)="9bc7741ea5e524cc8c6f748a73153834428729c45bf4ad446d2dddf1978baf431d0ba35b5442b5afe22db8b003650320200af7e1368ef7cdfa79ca8b9d3564363a5d2a502970314f2264c883bc8d990afc003e5adb95b30edad245c4420c8126f1d33db75ff0230698eaff90055e0f", 0x2}, 0x20) socketpair(0x0, 0x80003, 0xffff, &(0x7f0000000380)={0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r7, 0x50, &(0x7f00000003c0)}, 0x10) [ 811.403984] IPVS: ftp: loaded support on port[0] = 21 [ 812.400525] IPVS: ftp: loaded support on port[0] = 21 [ 812.426874] IPVS: ftp: loaded support on port[0] = 21 [ 812.437298] FAULT_INJECTION: forcing a failure. [ 812.437298] name failslab, interval 1, probability 0, space 0, times 0 [ 812.448594] CPU: 1 PID: 26681 Comm: syz-executor4 Not tainted 4.16.0-rc6+ #40 [ 812.455872] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 812.465829] Call Trace: [ 812.467795] IPVS: ftp: loaded support on port[0] = 21 [ 812.468423] dump_stack+0x194/0x24d [ 812.477237] ? arch_local_irq_restore+0x53/0x53 [ 812.481926] should_fail+0x8c0/0xa40 [ 812.485648] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 812.490755] ? __lock_is_held+0xb6/0x140 [ 812.494827] ? mark_held_locks+0xaf/0x100 [ 812.498975] ? __raw_spin_lock_init+0x1c/0x100 [ 812.503563] ? find_held_lock+0x35/0x1d0 [ 812.507632] ? __lock_is_held+0xb6/0x140 [ 812.511712] ? check_same_owner+0x320/0x320 [ 812.516031] ? d_alloc+0x269/0x340 [ 812.519566] ? rcu_note_context_switch+0x710/0x710 [ 812.524474] ? lock_release+0xa40/0xa40 [ 812.528438] should_failslab+0xec/0x120 [ 812.532391] kmem_cache_alloc+0x47/0x760 [ 812.536432] ? d_drop+0x51/0x60 [ 812.539690] ? rpc_i_callback+0x30/0x30 [ 812.543642] rpc_alloc_inode+0x1a/0x20 [ 812.547503] alloc_inode+0x65/0x180 [ 812.551107] new_inode_pseudo+0x69/0x190 [ 812.555143] ? prune_icache_sb+0x1a0/0x1a0 [ 812.559351] ? do_raw_spin_trylock+0x190/0x190 [ 812.563910] ? d_add+0xa70/0xa70 [ 812.567257] new_inode+0x1c/0x40 [ 812.570601] rpc_get_inode+0x20/0x1e0 [ 812.574380] __rpc_create_common+0x5d/0x1d0 [ 812.578682] rpc_populate.constprop.15+0x1ad/0x340 [ 812.583596] rpc_fill_super+0x379/0xae0 [ 812.587554] ? cap_capable+0x1b5/0x230 [ 812.591423] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 812.596594] ? security_capable+0x8e/0xc0 [ 812.600720] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 812.605883] ? ns_capable_common+0xcf/0x160 [ 812.610183] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 812.615350] mount_ns+0xc4/0x190 [ 812.618700] rpc_mount+0x9e/0xd0 [ 812.622045] mount_fs+0x66/0x2d0 [ 812.625395] vfs_kern_mount.part.26+0xc6/0x4a0 [ 812.629954] ? may_umount+0xa0/0xa0 [ 812.633559] ? _raw_read_unlock+0x22/0x30 [ 812.637684] ? __get_fs_type+0x8a/0xc0 [ 812.641558] do_mount+0xea4/0x2bb0 [ 812.645085] ? copy_mount_string+0x40/0x40 [ 812.649300] ? rcu_pm_notify+0xc0/0xc0 [ 812.653174] ? copy_mount_options+0x5f/0x2e0 [ 812.657560] ? rcu_read_lock_sched_held+0x108/0x120 [ 812.662550] ? kmem_cache_alloc_trace+0x459/0x740 [ 812.667375] ? kasan_check_write+0x14/0x20 [ 812.671616] ? copy_mount_options+0x1f7/0x2e0 [ 812.676093] SyS_mount+0xab/0x120 [ 812.679531] ? copy_mnt_ns+0xb30/0xb30 [ 812.683399] do_syscall_64+0x281/0x940 [ 812.687260] ? __do_page_fault+0xc90/0xc90 [ 812.691468] ? _raw_spin_unlock_irq+0x27/0x70 [ 812.695942] ? finish_task_switch+0x1c1/0x7e0 [ 812.700419] ? syscall_return_slowpath+0x550/0x550 [ 812.705328] ? syscall_return_slowpath+0x2ac/0x550 [ 812.710240] ? prepare_exit_to_usermode+0x350/0x350 [ 812.715240] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 812.720617] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 812.725460] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 812.730625] RIP: 0033:0x4548b9 [ 812.733791] RSP: 002b:00007f568222fc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 812.741479] RAX: ffffffffffffffda RBX: 00007f56822306d4 RCX: 00000000004548b9 [ 812.748725] RDX: 00000000200002c0 RSI: 0000000020000140 RDI: 0000000020000300 [ 812.755975] RBP: 000000000072bea0 R08: 0000000020000200 R09: 0000000000000000 [ 812.763228] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 812.770477] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000002e 2018/03/29 11:56:07 executing program 3: r0 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x10}, 0x10) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000000c0)={0x0, 0x1000, 0x8}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000080)='./file0\x00', r1}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0x0, 0x8}, 0x10) mount(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='cpuset\x00', 0x40, &(0x7f0000000280)="8a4562cb6a7df38be32246afcaef1e1a3f933cb428242c55c117c0fbbd62cea0aab31f2665fb88267466eca314fc8cafd72cc24143121c0691236768fad66390bf9b55014c2bd49faa5388cbabd52e730eeb4ccc411bacd296e423d971043756cf2b35a4063f2a7465b44a60ef31ae437f6160ed2f63afa62c36a27c33e4779e7c0404e337abc025bb2e4b39cc265573c6ab1a3ff09c7ad6bb4631a4") mount(&(0x7f0000000340)='./file1\x00', &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='devtmpfs\x00', 0x40, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xb, 0x7f, 0x0, 0x1, 0x12, r1, 0x100000000}, 0x2c) mkdir(&(0x7f0000000440)='./file1\x00', 0x20) mount(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='iso9660\x00', 0x8, &(0x7f0000000540)="650fe6ccea2b17860de967406c566ec16fe5a7a4c064707e22906e9d3d2a70b4") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000005c0)={r2, 0x28, &(0x7f0000000580)={0x0, 0x0}}, 0x10) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={r3, 0x8, 0x10}, 0xc) mount(&(0x7f0000000640)='./file1\x00', &(0x7f0000000680)='./file1\x00', &(0x7f00000006c0)='pstore\x00', 0x1000000, &(0x7f0000000700)="f48afa3ab3cc319f917be52b04c388c229578537782bc5ffc32c7747b1d28999ad89f5fba460640a324385ac03cccef4553d641b91d79d014804a98e72796f8eb2e1a7056efeaa63404648df67079ae817420f248ccf9d01e7a027c600c71777fb9ebc97da60f3d1a287ef8bc00f1dc68c3b1f0c1836cde5b62be45dd58c3415cbb0f916fe3c04fc69911e2bec15c208d023bdb608fa727657c532bd5101a2a36b34c4eb65f855fea2d6f8a0a79b15ecef1a4c81a8f6f5ed57b09db2ab482413540416126718f2a33ed21346ded20b084a8dc10702ec279fc486b5c57c163d") socketpair(0x3, 0x2, 0x1f, &(0x7f0000001c40)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$kcm(r6, &(0x7f0000004300)={0x0, 0x0, &(0x7f0000004140)=[{&(0x7f0000001c80)=""/139, 0x8b}, {&(0x7f0000001d40)=""/149, 0x95}, {&(0x7f0000001e00)=""/188, 0xbc}, {&(0x7f0000001ec0)=""/69, 0x45}, {&(0x7f0000001f40)=""/165, 0xa5}, {&(0x7f0000002000)=""/4096, 0x1000}, {&(0x7f0000003000)=""/42, 0x2a}, {&(0x7f0000003040)=""/4096, 0x1000}, {&(0x7f0000004040)=""/233, 0xe9}], 0x9, &(0x7f0000004200)=""/236, 0xec, 0xe00}, 0x40) mount(&(0x7f0000004340)='./file1/file0\x00', &(0x7f0000004380)='./file1\x00', &(0x7f00000043c0)='ceph\x00', 0x4860, &(0x7f0000004400)="2c8eb517dd302be26597065442d58f3f345c295b542b2b1df3046ae176") bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000004600)={r6, &(0x7f0000004440)="903685b47b9c4d5c1dffcefa6a92cd57ccdfaf1af0be272f1cb4a5b86ab9d1ef248a63f04f5d59c2cd6e6b7722f5ff866c5d353014f28baaa95bce06a787a3e085102126a0386ffd4e136d472f2cdfb7c658643d2792b7235e2ec8c782080850c20eb00014eab035d7d56c8ddd0d7fdc4c21602d480e4accea0867cc5b4172b46b8f028bd623c58544092396dbda704543cd7c93219ff7f4caf9d0c12fc32c65ddac48ba22321d2c7ef1152f0dd87ed22cb30eb2b24d381b3abaefc114ad4c08e329cfbce60e0549ca", &(0x7f0000004540)="38859653237c5c9685cf2e44e1eea64846e190b778f29b06c26c2f2b8a0800f9fc2019b05290fc5c82f612eb7f479918015eb3af93cc57f01db731e129275ce05910f66e436ef09a8fe7bf22f960eacec350a7f7e9e9a47cb163f467b6a29523346a4c61d65d2235c73095a53929d509538f640424133cfa3617b41a51aa7172460146433abbe604f2c92827fabd5d3134d36b4cecd0fd2549f3527615f9eb63dd9332021e4eff13ad6aa509db21ed98745d00cb36e547", 0x3}, 0x20) mkdir(&(0x7f0000004640)='./file1/file0\x00', 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000004680)={0x0, 0x0, 0xa6, 0x3, 0x4}, 0x2c) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000046c0)=0x7, 0x4) recvmsg$kcm(r6, &(0x7f00000058c0)={&(0x7f0000004700)=@alg, 0x80, &(0x7f0000005880)=[{&(0x7f0000004780)=""/4096, 0x1000}, {&(0x7f0000005780)=""/219, 0xdb}], 0x2, 0x0, 0x0, 0x100000001}, 0x40000000) r7 = gettid() r8 = perf_event_open(&(0x7f0000005900)={0x7, 0x70, 0x0, 0xfffffffffffffff7, 0x9, 0x4, 0x0, 0x7, 0x100, 0x8, 0x100000000, 0x8000, 0x8, 0x6, 0x0, 0x6, 0x10001, 0x9, 0x1f, 0x2, 0x1, 0x3, 0x1, 0x1f, 0x23, 0x1, 0xaa4, 0x5, 0x4, 0x200, 0x6, 0x9, 0xfffffffffffffffb, 0x3, 0x3, 0xff, 0x80000000, 0x0, 0x0, 0xffffffffffffff9d, 0x2, @perf_config_ext={0x7, 0x9}, 0x100, 0x8, 0x2, 0x6, 0x4, 0x6, 0xf71}, r7, 0x9, r6, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f00000059c0)={&(0x7f0000005980)='./file0\x00'}, 0x10) ioctl$sock_kcm_SIOCKCMATTACH(r5, 0x89e0, &(0x7f0000005a00)={r5, r0}) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000005c00)={r4, &(0x7f0000005a40)="313befc1e9ac680c4369983530ee783c4f018c38e134b4b0aebd06ede05f238850949c0f5d32ab19889f880e87e3a0fa5a43500affdcc508d56f3a4df6c159ca9cfa62124b79b4607d42738dc5e16d09ea2c6a2346fc2360feff08d9f464dfdebce2cb99d4ba8e5fc37edfba041f14e16a68192d7d8687404ee7318323520188c4e5d52e8c7ec40bd0823fb210e530c74ea842bd8bacbc48317b0b6ed12528ecd30e1af83b8049df791ff7affe91ab54", &(0x7f0000005b00)=""/243}, 0x18) mount(&(0x7f0000005c40)='./file1/file0\x00', &(0x7f0000005c80)='./file1\x00', &(0x7f0000005cc0)='btrfs\x00', 0x0, 0x0) recvmsg(r5, &(0x7f00000073c0)={&(0x7f0000005d00)=@sco, 0x80, &(0x7f0000007300)=[{&(0x7f0000005d80)=""/103, 0x67}, {&(0x7f0000005e00)=""/170, 0xaa}, {&(0x7f0000005ec0)=""/252, 0xfc}, {&(0x7f0000005fc0)=""/136, 0x88}, {&(0x7f0000006080)=""/125, 0x7d}, {&(0x7f0000006100)=""/4096, 0x1000}, {&(0x7f0000007100)=""/106, 0x6a}, {&(0x7f0000007180)=""/115, 0x73}, {&(0x7f0000007200)=""/240, 0xf0}], 0x9, 0x0, 0x0, 0x7}, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000007400)={r3, 0x0, 0x18}, 0xc) ioctl$PERF_EVENT_IOC_REFRESH(r8, 0x2402, 0xc4c) recvmsg$kcm(r6, &(0x7f0000008880)={&(0x7f0000007440)=@l2, 0x80, &(0x7f0000008800)=[{&(0x7f00000074c0)=""/231, 0xe7}, {&(0x7f00000075c0)=""/118, 0x76}, {&(0x7f0000007640)=""/4096, 0x1000}, {&(0x7f0000008640)=""/223, 0xdf}, {&(0x7f0000008740)}, {&(0x7f0000008780)=""/32, 0x20}, {&(0x7f00000087c0)=""/53, 0x35}], 0x7}, 0x10000) 2018/03/29 11:56:07 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x1e1, 0x100000000209e20, 0x8000000001, 0x5}, 0xfffffffffffffe20) r0 = getpid() r1 = perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0xfffffffffffffffc, 0x3, 0x8, 0x2, 0x0, 0x9, 0x10000, 0xc, 0x3d3, 0x80, 0x5, 0xfffffffffffffffc, 0x8, 0x3f, 0x5d, 0xbbb0, 0x20, 0x3, 0x8000, 0x100000000, 0x8, 0x9, 0x2, 0x4, 0x800, 0xf8, 0x3, 0x9, 0x1, 0x3, 0x8, 0x3, 0x7, 0x10001, 0xf16, 0x2, 0x0, 0x7fffffff, 0x4, @perf_bp={&(0x7f0000000780), 0x1}, 0x4080, 0x10001, 0xcc, 0x7, 0x3, 0xffff, 0x7fffffff}, 0xffffffffffffffff, 0xd, 0xffffffffffffff9c, 0x8) perf_event_open(&(0x7f0000000980)={0x4, 0x70, 0x6, 0x3f, 0x8e, 0x1, 0x0, 0x3, 0x404, 0x0, 0xbc2b, 0x40, 0x7, 0xffff, 0xffff, 0x9, 0x9de2, 0x9, 0x0, 0x3, 0x7f, 0xff, 0x40, 0x400, 0x9, 0x7fffffff, 0x80000000, 0x7, 0x8, 0x10001, 0x1f, 0x2778, 0x800, 0x8001, 0x101, 0x9, 0x8, 0x7ff, 0x0, 0x1000, 0x5, @perf_config_ext={0x3ff, 0xb69b}, 0x3040, 0x2, 0x2, 0x5, 0x7, 0x6, 0x7283ed73}, r0, 0xe, r1, 0x8) bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x0, 0x0, 0x7ffff9, 0x0, 0x20000003, 0x0}, 0x2c) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) r2 = gettid() r3 = perf_event_open(&(0x7f00000008c0)={0x7, 0x70, 0x1, 0x200, 0x3, 0xdbce, 0x0, 0x8, 0x1002, 0x1, 0xffffffffffffff00, 0x8, 0x1, 0xb3fa, 0x8, 0x0, 0x1, 0x2, 0x1000, 0x2, 0x401, 0x8, 0x3, 0x81, 0x0, 0x7, 0x2fc4, 0x882, 0x4, 0x8, 0x3, 0x81, 0x3, 0x7, 0x8857, 0x7, 0x5, 0x9, 0x0, 0x7, 0x1, @perf_config_ext={0x0, 0x80000000}, 0x400, 0x7f, 0x4, 0x7, 0x2, 0x7f, 0x200}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000840)={0x5, 0x70, 0xef, 0x2, 0x1000, 0xffffffff80000000, 0x0, 0x1a7800000000, 0x2000, 0x4, 0x5, 0x6814, 0x3a9, 0x5, 0x63b, 0x6, 0x8, 0x1000, 0x250420ee, 0x3, 0x0, 0x20, 0x6, 0x0, 0x4, 0x5, 0x4, 0x8, 0x3, 0x8, 0x52893dd5, 0x2, 0x2, 0x8, 0x44d, 0x1, 0x8, 0x6, 0x0, 0x100000000, 0x0, @perf_config_ext={0x9, 0x80}, 0x0, 0x0, 0x2b67, 0x6, 0x4b0, 0x81, 0x4}, r2, 0x5, r3, 0xb) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1003, 0x0) mount(&(0x7f00002b9ff8)='./file0\x00', &(0x7f0000cbeff8)='./file0\x00', &(0x7f00005f7ffa)='ramfs\x00', 0x80000, &(0x7f000002f000)) mount(&(0x7f0000000000)='.', &(0x7f0000000040)='.', &(0x7f0000000080)='cgroup\x00', 0x5010, &(0x7f00000000c0)) mount(&(0x7f0000377ff8)='.', &(0x7f0000000280)='.', &(0x7f0000000600)='nfs4\x00', 0x5010, &(0x7f0000000300)="2161893416a0c71070768c219eb114c3253c9f3baf4e9e8e9111c1a7fc6e266009fe27243deeaa22ca7ae9341f714300b5ee807e55d609036f2a3260475922bdfb2d2849f1c3b2ad3c051bd4f3751a177f77a92758c6d2b23fe7f1535b54e5846d11c135de8286066dec1b25f6e1378944ac5f7fce42d055821b5e19") perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xd68, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f0000014f88)={0x5, 0xfffffffffffffdc4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x46000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = getpid() perf_event_open(&(0x7f0000000680)={0x4, 0x70, 0x64, 0xffff, 0x1f, 0x4, 0x0, 0x1c3, 0x0, 0x1, 0x1, 0x9, 0x1ff, 0xfffffffffffffff8, 0x0, 0x0, 0x6, 0x7fffffff, 0x0, 0xffffffff, 0x80000001, 0xd0, 0x7, 0x1f, 0x0, 0x8, 0x9, 0x1ff, 0x8, 0x785, 0x4, 0xff, 0x2, 0x656, 0x5000000, 0x1, 0x460e3be0, 0x1, 0x0, 0x0, 0x7, @perf_bp={&(0x7f0000000640), 0x1}, 0x1000, 0xa, 0x7fff, 0x7, 0x3, 0x400, 0x9}, r5, 0xe, r4, 0x1) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', 0x0, 0x10}, 0x10) close(0xffffffffffffffff) bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)={&(0x7f0000000040)='./file0\x00', 0x0, 0x18}, 0x10) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000100)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0, 0x2e, &(0x7f0000000440), &(0x7f0000000140)=""/46, 0x4229}, 0x28) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000003480)={&(0x7f0000003300)=@can={0x0, 0x0}, 0x80, &(0x7f0000003400)=[{&(0x7f0000003380)=""/56, 0x38}, {&(0x7f00000033c0)=""/1, 0x1}], 0x2, &(0x7f0000003440)=""/33, 0x21, 0x1}, 0x40010000) bpf$PROG_LOAD(0x5, &(0x7f00000034c0)={0xe, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="1800000002000000000000004ce700002555fdff00000000002371d07c9ba7f4a23372b0ad61000000000000009500000000000000"], &(0x7f00000007c0)='GPL\x00', 0x3, 0x2d, &(0x7f0000000800)=""/45, 0x40f00, 0x1, [], r6}, 0x48) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000740)={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x10) socketpair$inet(0x2, 0x80a, 0x81, &(0x7f0000000240)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={0xffffffffffffffff, &(0x7f0000000500)="ae30f1bca1b4d3f69f1aac81517d42ad5980bc63b5008616a1f4724b9f8c1e4ecd8de336f57dd727cdaab04f0b40f28612615ad08de414711d841a88db33fd33884b627074213a0c5de3be2bbaec9207d9865c47f240467849979b5ab5632376608fc4be41a274abb2dc07cabe344a18db51048e5b0cbda843905a4258cdee3e649eddf104ba78894dce09747dcfe6a8d6d6d985520eeef448b83a8bcb83074541ba7a20d6094aa206c01a0690e5b3bfa05d475eb382b0199031d22bb26cde9b1ca0055eef9f6c4993b71ba19ba0590bb5efdaddaa574c25356ca890d138fc9fe0e975b6d5a1a8251503cd0a91845f9d95", &(0x7f0000000480)="9bc7741ea5e524cc8c6f748a73153834428729c45bf4ad446d2dddf1978baf431d0ba35b5442b5afe22db8b003650320200af7e1368ef7cdfa79ca8b9d3564363a5d2a502970314f2264c883bc8d990afc003e5adb95b30edad245c4420c8126f1d33db75ff0230698eaff90055e0f", 0x2}, 0x20) socketpair(0x0, 0x80003, 0xffff, &(0x7f0000000380)={0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r7, 0x50, &(0x7f00000003c0)}, 0x10) 2018/03/29 11:56:07 executing program 0: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000001a00)) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000001a40)={0xffffffffffffffff}) recvmsg$kcm(r1, &(0x7f0000000540)={&(0x7f00000000c0)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @broadcast}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000240)=""/65, 0x41}], 0x1, &(0x7f0000000440)=""/213, 0xd5}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x8983, &(0x7f0000000040)) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000080)) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000019c0)={0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000000140)="0253eea6a53cc0eae389e9a13e5f2046d0633eebde90f446c1b1eabbd0adb42dfcefb37a3df93feb3d5e76dc353ecf23fe9c81afa5", 0x35}, {&(0x7f00000002c0)}, {&(0x7f0000000400)}, {&(0x7f0000001600)}], 0x4, &(0x7f0000001700)=ANY=[@ANYBLOB="680000000000000007010000c17d0425755cd1e9e23de47cb15819d813deb534cee2d9497c58eba5bd8a228407fb709d70f16afa73f4924f12ecc429b6fd356748940b62ee5f5685ce027fe4e6c60a8f88cd5a5827d099f5849f09bd37f681e29814e6bb00dc9242000000100000000000000000000000ff01000010000000000000000701000001"], 0x88}, 0x48800) 2018/03/29 11:56:07 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x1e1, 0x100000000209e20, 0x8000000001, 0x5}, 0xfffffffffffffe20) r0 = getpid() r1 = perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0xfffffffffffffffc, 0x3, 0x8, 0x2, 0x0, 0x9, 0x10000, 0xc, 0x3d3, 0x80, 0x5, 0xfffffffffffffffc, 0x8, 0x3f, 0x5d, 0xbbb0, 0x20, 0x3, 0x8000, 0x100000000, 0x8, 0x9, 0x2, 0x4, 0x800, 0xf8, 0x3, 0x9, 0x1, 0x3, 0x8, 0x3, 0x7, 0x10001, 0xf16, 0x2, 0x0, 0x7fffffff, 0x4, @perf_bp={&(0x7f0000000780), 0x1}, 0x4080, 0x10001, 0xcc, 0x7, 0x3, 0xffff, 0x7fffffff}, 0xffffffffffffffff, 0xd, 0xffffffffffffff9c, 0x8) perf_event_open(&(0x7f0000000980)={0x4, 0x70, 0x6, 0x3f, 0x8e, 0x1, 0x0, 0x3, 0x404, 0x0, 0xbc2b, 0x40, 0x7, 0xffff, 0xffff, 0x9, 0x9de2, 0x9, 0x0, 0x3, 0x7f, 0xff, 0x40, 0x400, 0x9, 0x7fffffff, 0x80000000, 0x7, 0x8, 0x10001, 0x1f, 0x2778, 0x800, 0x8001, 0x101, 0x9, 0x8, 0x7ff, 0x0, 0x1000, 0x5, @perf_config_ext={0x3ff, 0xb69b}, 0x3040, 0x2, 0x2, 0x5, 0x7, 0x6, 0x7283ed73}, r0, 0xe, r1, 0x8) bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x0, 0x0, 0x7ffff9, 0x0, 0x20000003, 0x0}, 0x2c) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) r2 = gettid() r3 = perf_event_open(&(0x7f00000008c0)={0x7, 0x70, 0x1, 0x200, 0x3, 0xdbce, 0x0, 0x8, 0x1002, 0x1, 0xffffffffffffff00, 0x8, 0x1, 0xb3fa, 0x8, 0x0, 0x1, 0x2, 0x1000, 0x2, 0x401, 0x8, 0x3, 0x81, 0x0, 0x7, 0x2fc4, 0x882, 0x4, 0x8, 0x3, 0x81, 0x3, 0x7, 0x8857, 0x7, 0x5, 0x9, 0x0, 0x7, 0x1, @perf_config_ext={0x0, 0x80000000}, 0x400, 0x7f, 0x4, 0x7, 0x2, 0x7f, 0x200}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000840)={0x5, 0x70, 0xef, 0x2, 0x1000, 0xffffffff80000000, 0x0, 0x1a7800000000, 0x2000, 0x4, 0x5, 0x6814, 0x3a9, 0x5, 0x63b, 0x6, 0x8, 0x1000, 0x250420ee, 0x3, 0x0, 0x20, 0x6, 0x0, 0x4, 0x5, 0x4, 0x8, 0x3, 0x8, 0x52893dd5, 0x2, 0x2, 0x8, 0x44d, 0x1, 0x8, 0x6, 0x0, 0x100000000, 0x0, @perf_config_ext={0x9, 0x80}, 0x0, 0x0, 0x2b67, 0x6, 0x4b0, 0x81, 0x4}, r2, 0x5, r3, 0xb) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1003, 0x0) mount(&(0x7f00002b9ff8)='./file0\x00', &(0x7f0000cbeff8)='./file0\x00', &(0x7f00005f7ffa)='ramfs\x00', 0x80000, &(0x7f000002f000)) mount(&(0x7f0000000000)='.', &(0x7f0000000040)='.', &(0x7f0000000080)='cgroup\x00', 0x5010, &(0x7f00000000c0)) mount(&(0x7f0000377ff8)='.', &(0x7f0000000280)='.', &(0x7f0000000600)='nfs4\x00', 0x5010, &(0x7f0000000300)="2161893416a0c71070768c219eb114c3253c9f3baf4e9e8e9111c1a7fc6e266009fe27243deeaa22ca7ae9341f714300b5ee807e55d609036f2a3260475922bdfb2d2849f1c3b2ad3c051bd4f3751a177f77a92758c6d2b23fe7f1535b54e5846d11c135de8286066dec1b25f6e1378944ac5f7fce42d055821b5e19") perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xd68, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f0000014f88)={0x5, 0xfffffffffffffdc4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x46000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = getpid() perf_event_open(&(0x7f0000000680)={0x4, 0x70, 0x64, 0xffff, 0x1f, 0x4, 0x0, 0x1c3, 0x0, 0x1, 0x1, 0x9, 0x1ff, 0xfffffffffffffff8, 0x0, 0x0, 0x6, 0x7fffffff, 0x4, 0xffffffff, 0x80000001, 0xd0, 0x7, 0x1f, 0x0, 0x8, 0x9, 0x1ff, 0x8, 0x785, 0x4, 0xff, 0x2, 0x656, 0x5000000, 0x1, 0x460e3be0, 0x1, 0x0, 0x0, 0x7, @perf_bp={&(0x7f0000000640), 0x1}, 0x1000, 0xa, 0x7fff, 0x7, 0x3, 0x400, 0x9}, r5, 0xe, r4, 0x1) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', 0x0, 0x10}, 0x10) close(0xffffffffffffffff) bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)={&(0x7f0000000040)='./file0\x00', 0x0, 0x18}, 0x10) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000100)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0, 0x2e, &(0x7f0000000440), &(0x7f0000000140)=""/46, 0x4229}, 0x28) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000003480)={&(0x7f0000003300)=@can={0x0, 0x0}, 0x80, &(0x7f0000003400)=[{&(0x7f0000003380)=""/56, 0x38}, {&(0x7f00000033c0)=""/1, 0x1}], 0x2, &(0x7f0000003440)=""/33, 0x21, 0x1}, 0x40010000) bpf$PROG_LOAD(0x5, &(0x7f00000034c0)={0xe, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="1800000002000000000000004ce700002555fdff00000000002371d07c9ba7f4a23372b0ad61000000000000009500"], &(0x7f00000007c0)='GPL\x00', 0x3, 0x2d, &(0x7f0000000800)=""/45, 0x40f00, 0x1, [], r6}, 0x48) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000740)={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x10) socketpair$inet(0x2, 0x80a, 0x81, &(0x7f0000000240)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={0xffffffffffffffff, &(0x7f0000000500)="ae30f1bca1b4d3f69f1aac81517d42ad5980bc63b5008616a1f4724b9f8c1e4ecd8de336f57dd727cdaab04f0b40f28612615ad08de414711d841a88db33fd33884b627074213a0c5de3be2bbaec9207d9865c47f240467849979b5ab5632376608fc4be41a274abb2dc07cabe344a18db51048e5b0cbda843905a4258cdee3e649eddf104ba78894dce09747dcfe6a8d6d6d985520eeef448b83a8bcb83074541ba7a20d6094aa206c01a0690e5b3bfa05d475eb382b0199031d22bb26cde9b1ca0055eef9f6c4993b71ba19ba0590bb5efdaddaa574c25356ca890d138fc9fe0e975b6d5a1a8251503cd0a91845f9d95", &(0x7f0000000480)="9bc7741ea5e524cc8c6f748a73153834428729c45bf4ad446d2dddf1978baf431d0ba35b5442b5afe22db8b003650320200af7e1368ef7cdfa79ca8b9d3564363a5d2a502970314f2264c883bc8d990afc003e5adb95b30edad245c4420c8126f1d33db75ff0230698eaff90055e0f", 0x2}, 0x20) socketpair(0x0, 0x80003, 0xffff, &(0x7f0000000380)={0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r7, 0x50, &(0x7f00000003c0)}, 0x10) 2018/03/29 11:56:07 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x3, &(0x7f0000002000)=@framed={{0x18}, [], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000680)={0xffffffffffffffff, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x7}, 0x28) recvmsg(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x8, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000100)=r0, 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) recvmsg(r2, &(0x7f00000011c0)={&(0x7f0000000b40)=@can, 0x80, &(0x7f0000001100)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f0000000c80)=""/169, 0xa9}, {&(0x7f0000000d40)=""/229, 0xe5}, {&(0x7f0000000e40)=""/128, 0x80}, {&(0x7f0000000ec0)=""/48, 0x30}, {&(0x7f0000000f00)=""/137, 0x89}, {&(0x7f0000006000)=""/4096, 0x1000}, {&(0x7f0000007000)=""/4096, 0x1000}, {&(0x7f0000001080)=""/127, 0x7f}, {&(0x7f0000008000)=""/4096, 0x1000}], 0xa, 0x0, 0x0, 0x1}, 0x2020) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001200)={0x7, 0x4, 0x0, 0x4, 0x8, 0xffffffffffffffff, 0x9}, 0x2c) socketpair(0x3, 0x80e, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r3, &(0x7f0000000200)={&(0x7f0000000fc0)=@pppol2tp={0x18, 0x1, {0x0, r2, {0x2, 0x4e20, @broadcast=0xffffffff}, 0x1, 0x3, 0x0, 0x2}}, 0x80, &(0x7f0000001580)=[{&(0x7f0000001240)="95c4dcff0f017b3c1979888e50f6c20a37b4edaffb28a3b609d24a8180434ab2fac426d3e4fc87e18267002be3cd56b11d69c4db739bf6a9c91af67ee87be1ea522993a368bdfc0df55539a60ef5515b4f03f3dbddae65cd66a90f030118870b473f156cb9a18624103000608c63f84b09ea89bfb8d8e7705c6ef456ef28adec5e566632ddd63098", 0x88}, {&(0x7f0000001380)="5745869bf3b6f562576761d821af2ad55c2f81345c810d6dbd43facd33c5107488aa7f04c5ab1302b820cd31405e9f657776a0d48e2225f39aabc3de0b30dc7422503b448ad89c23ebaee24ae9696e4e58eccae5febf47fff53dc1f03d869303acdef233746263c5c567e84edb166010fd23f56d6e84406bced5a00b5016b0c700fd76218ecf5da3527552a683eb87aa4b246cd74bcbeff8dedec74332e0214e4dc64cb7ac24c4447843caa7550375ef8e1f74a78c40a617e913a25e4837d24fb09e93eaa2", 0xc5}, {&(0x7f0000001480)="8247f46d4324760570d5078149dc5b38f7d1c592564148ecc6262e91c29cd4344e423ff476882993a2844af9a7c306a15e659a4cb9230b5139842c87ad8fa95c202146730fa610b141dfe4c7b771b46e4db879d2b92a01cb8642100d80a1d4658fd0df05c06c8615960a92b690c728e2603373657a9a46b2f200f2895198694d470ab95b6eb7a76ccee67c9219b4afa289d70c87cf22c733e00700f345136d59bcbd89ce7e110746f91e7a7661b8eb0afe54e3cb1c712441dd9a6ffb59a2eb58e5f5eabd4bec428fe27a403bb0d19125e473abdfea87a0c89108e3c876438a7c3f84bebad6cf858f26d2083efd60", 0xee}], 0x3, &(0x7f000000a000)=[{0x88, 0x112, 0xc2, "6671b4b66ac2fb4e14cee671813dc3834802e601529feb049ebb70880567948953018cfd53d7b1c9be27b1084adfba62040c7f889cfbc15407d93133259d9d5052bf6648a69218702e35278939ad399dc3ebed233c1792c7c1204353c8fe75ea0398f4aaf830834bc93873c119dddc539c"}, {0xe8, 0x6f180cc1befb202, 0x9, "4577f77fd3b3acd92c96feff8b0409afeae1c16fa3d367241c9679e5105141c7205d47ce27a418c10fbe7f601c3142e7b7b3a67322c9d345e0baf4315e13dc771a962ff445015c98a70b319d46ba59155d1cf07827804ea1ca86db74f3029bd60f6f365d955ec12be30102e59b4b3940152988ef09443df596bad9525f697fad61507e856c6acb744cfb034863943e811bd378843ccbd95f8221a444f4c323a391f5788559f34ac02e6e18065b87e8c962353623250694e5b4bf9bc1b00fadf2875995067ff6c18590c207f9a83f06665f5b5af77b4e"}, {0xa0, 0x10f, 0x5, "07c5972c79a30903d5d93f57c962c0351628551f6a3fbac8e18984ad9b8caeb403f1d588fa0b9955ce44d018cbcc06ad98b588dd45fd0ccd6b8d1965e70693ec76dd521aa2693829ef54059dc3191f2f4eca64c63f2f901ead2d6c54f0119212ebb77e956117d9130d3adff30a5598567fd540cf0a8f9f8c469ad15f209ad8ef161006831b39e4ddf2fcd748a8629e33"}], 0x210, 0x40}, 0x40) close(r0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)) recvmsg(r1, &(0x7f00000267c0)={&(0x7f00000251c0)=@can, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) 2018/03/29 11:56:07 executing program 6: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x3, &(0x7f0000002000)=@framed={{0x18}, [], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000680)={0xffffffffffffffff, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x7}, 0x28) recvmsg(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000001c0)) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000100)=r0, 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) recvmsg(r3, &(0x7f00000011c0)={&(0x7f0000000b40)=@can, 0x80, &(0x7f0000001100)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f0000000c80)=""/169, 0xa9}, {&(0x7f0000000d40)=""/229, 0xe5}, {&(0x7f0000000e40)=""/128, 0x80}, {&(0x7f0000000ec0)=""/48, 0x30}, {&(0x7f0000000f00)=""/137, 0x89}, {&(0x7f0000006000)=""/4096, 0x1000}, {&(0x7f0000001080)=""/127, 0x7f}, {&(0x7f0000008000)=""/4096, 0x1000}], 0x9, 0x0, 0x0, 0x1}, 0x2020) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001200)={0x7, 0x4, 0x0, 0x4, 0x8, 0xffffffffffffffff, 0x9}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x1000000007, 0xcf2e, 0x7e, 0x20, 0x15, r1, 0x4}, 0x2c) socketpair(0x3, 0x80e, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r4, &(0x7f0000000200)={&(0x7f0000000fc0)=@pppol2tp={0x18, 0x1, {0x0, r3, {0x2, 0x4e20, @broadcast=0xffffffff}, 0x1, 0x3, 0x0, 0x2}}, 0x80, &(0x7f0000001580)=[{&(0x7f0000001240)="95c4dcff0f017b3c1979888e50f6c20a37b4edaffb28a3b609d24a8180434ab2fac426d3e4fc87e18267002be3cd56b11d69c4db739bf6a9c91af67ee87be1ea522993a368bdfc0df55539a60ef5515b4f03f3dbddae65cd66a90f030118870b473f156cb9a18624103000608c63f84b09ea89bfb8d8e7705c6ef456ef28adec5e566632ddd63098", 0x88}, {&(0x7f0000001380)="5745869bf3b6f562576761d821af2ad55c2f81345c810d6dbd43facd33c5107488aa7f04c5ab1302b820cd31405e9f657776a0d48e2225f39aabc3de0b30dc7422503b448ad89c23ebaee24ae9696e4e58eccae5febf47fff53dc1f03d869303acdef233746263c5c567e84edb166010fd23f56d6e84406bced5a00b5016b0c700fd76218ecf5da3527552a683eb87aa4b246cd74bcbeff8dedec74332e0214e4dc64cb7ac24c4447843caa7550375ef8e1f74a78c40a617e913a25e4837d24fb09e93eaa2", 0xc5}, {&(0x7f0000001480)="8247f46d4324760570d5078149dc5b38f7d1c592564148ecc6262e91c29cd4344e423ff476882993a2844af9a7c306a15e659a4cb9230b5139842c87ad8fa95c202146730fa610b141dfe4c7b771b46e4db879d2b92a01cb8642100d80a1d4658fd0df05c06c8615960a92b690c728e2603373657a9a46b2f200f2895198694d470ab95b6eb7a76ccee67c9219b4afa289d70c87cf22c733e00700f345136d59bcbd89ce7e110746f91e7a7661b8eb0afe54e3cb1c712441dd9a6ffb59a2eb58e5f5eabd4bec428fe27a403bb0d19125e473abdfea87a0c89108e3c876438a7c3f84bebad6cf858f26d2083efd60", 0xee}], 0x3, &(0x7f000000a000)=[{0x88, 0x112, 0xc2, "6671b4b66ac2fb4e14cee671813dc3834802e601529feb049ebb70880567948953018cfd53d7b1c9be27b1084adfba62040c7f889cfbc15407d93133259d9d5052bf6648a69218702e35278939ad399dc3ebed233c1792c7c1204353c8fe75ea0398f4aaf830834bc93873c119dddc539c"}, {0xe8, 0x6f180cc1befb202, 0x9, "4577f77fd3b3acd92c96feff8b0409afeae1c16fa3d367241c9679e5105141c7205d47ce27a418c10fbe7f601c3142e7b7b3a67322c9d345e0baf4315e13dc771a962ff445015c98a70b319d46ba59155d1cf07827804ea1ca86db74f3029bd60f6f365d955ec12be30102e59b4b3940152988ef09443df596bad9525f697fad61507e856c6acb744cfb034863943e811bd378843ccbd95f8221a444f4c323a391f5788559f34ac02e6e18065b87e8c962353623250694e5b4bf9bc1b00fadf2875995067ff6c18590c207f9a83f06665f5b5af77b4e"}, {0xa0, 0x10f, 0x5, "07c5972c79a30903d5d93f57c962c0351628551f6a3fbac8e18984ad9b8caeb403f1d588fa0b9955ce44d018cbcc06ad98b588dd45fd0ccd6b8d1965e70693ec76dd521aa2693829ef54059dc3191f2f4eca64c63f2f901ead2d6c54f0119212ebb77e956117d9130d3adff30a5598567fd540cf0a8f9f8c469ad15f209ad8ef161006831b39e4ddf2fcd748a8629e33"}], 0x210, 0x40}, 0x40) close(r0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)) recvmsg(r2, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) recvmsg$kcm(r4, &(0x7f0000001a00)={0x0, 0x0, &(0x7f00000018c0)=[{&(0x7f0000001600)=""/173, 0xad}, {&(0x7f0000001040)=""/25, 0x19}, {&(0x7f00000016c0)=""/132, 0x84}, {&(0x7f0000001780)=""/91, 0x5b}, {&(0x7f0000001800)=""/183, 0xb7}], 0x5, &(0x7f0000001940)=""/163, 0xa3, 0xe43}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000a80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r5}, 0x48) 2018/03/29 11:56:07 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x3, &(0x7f0000002000)=@framed={{0x18}, [], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000680)={0xffffffffffffffff, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x7}, 0x28) recvmsg(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000001c0)) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100)=r0, 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) recvmsg(r3, &(0x7f00000011c0)={&(0x7f0000000b40)=@can, 0x80, &(0x7f0000001100)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f0000000c80)=""/169, 0xa9}, {&(0x7f0000000d40)=""/229, 0xe5}, {&(0x7f0000000e40)=""/128, 0x80}, {&(0x7f0000000ec0)=""/48, 0x30}, {&(0x7f0000000f00)=""/137, 0x89}, {&(0x7f0000006000)=""/4096, 0x1000}, {&(0x7f0000007000)=""/4096, 0x1000}, {&(0x7f0000001080)=""/127, 0x7f}, {&(0x7f0000008000)=""/4096, 0x1000}], 0xa, 0x0, 0x0, 0x1}, 0x2020) bpf$MAP_CREATE(0x0, &(0x7f0000001200)={0x7, 0x4, 0x0, 0x4, 0x8, 0xffffffffffffffff, 0x9}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x1000000007, 0xcf2e, 0x7e, 0x20, 0x15, r1, 0x4}, 0x2c) socketpair(0x3, 0x80e, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r4, &(0x7f0000000200)={&(0x7f0000000fc0)=@pppol2tp={0x18, 0x1, {0x0, r3, {0x2, 0x4e20, @broadcast=0xffffffff}, 0x1, 0x3, 0x0, 0x2}}, 0x80, &(0x7f0000001580)=[{&(0x7f0000001240)="95c4dcff0f017b3c1979888e50f6c20a37b4edaffb28a3b609d24a8180434ab2fac426d3e4fc87e18267002be3cd56b11d69c4db739bf6a9c91af67ee87be1ea522993a368bdfc0df55539a60ef5515b4f03f3dbddae65cd66a90f030118870b473f156cb9a18624103000608c63f84b09ea89bfb8d8e7705c6ef456ef28adec5e566632ddd63098", 0x88}, {&(0x7f0000001380)="5745869bf3b6f562576761d821af2ad55c2f81345c810d6dbd43facd33c5107488aa7f04c5ab1302b820cd31405e9f657776a0d48e2225f39aabc3de0b30dc7422503b448ad89c23ebaee24ae9696e4e58eccae5febf47fff53dc1f03d869303acdef233746263c5c567e84edb166010fd23f56d6e84406bced5a00b5016b0c700fd76218ecf5da3527552a683eb87aa4b246cd74bcbeff8dedec74332e0214e4dc64cb7ac24c4447843caa7550375ef8e1f74a78c40a617e913a25e4837d24fb09e93eaa2", 0xc5}, {&(0x7f0000001480)="8247f46d4324760570d5078149dc5b38f7d1c592564148ecc6262e91c29cd4344e423ff476882993a2844af9a7c306a15e659a4cb9230b5139842c87ad8fa95c202146730fa610b141dfe4c7b771b46e4db879d2b92a01cb8642100d80a1d4658fd0df05c06c8615960a92b690c728e2603373657a9a46b2f200f2895198694d470ab95b6eb7a76ccee67c9219b4afa289d70c87cf22c733e00700f345136d59bcbd89ce7e110746f91e7a7661b8eb0afe54e3cb1c712441dd9a6ffb59a2eb58e5f5eabd4bec428fe27a403bb0d19125e473abdfea87a0c89108e3c876438a7c3f84bebad6cf858f26d2083efd60", 0xee}], 0x3, &(0x7f000000a000)=[{0x88, 0x112, 0xc2, "6671b4b66ac2fb4e14cee671813dc3834802e601529feb049ebb70880567948953018cfd53d7b1c9be27b1084adfba62040c7f889cfbc15407d93133259d9d5052bf6648a69218702e35278939ad399dc3ebed233c1792c7c1204353c8fe75ea0398f4aaf830834bc93873c119dddc539c"}, {0xe8, 0x6f180cc1befb202, 0x9, "4577f77fd3b3acd92c96feff8b0409afeae1c16fa3d367241c9679e5105141c7205d47ce27a418c10fbe7f601c3142e7b7b3a67322c9d345e0baf4315e13dc771a962ff445015c98a70b319d46ba59155d1cf07827804ea1ca86db74f3029bd60f6f365d955ec12be30102e59b4b3940152988ef09443df596bad9525f697fad61507e856c6acb744cfb034863943e811bd378843ccbd95f8221a444f4c323a391f5788559f34ac02e6e18065b87e8c962353623250694e5b4bf9bc1b00fadf2875995067ff6c18590c207f9a83f06665f5b5af77b4e"}, {0xa0, 0x10f, 0x5, "07c5972c79a30903d5d93f57c962c0351628551f6a3fbac8e18984ad9b8caeb403f1d588fa0b9955ce44d018cbcc06ad98b588dd45fd0ccd6b8d1965e70693ec76dd521aa2693829ef54059dc3191f2f4eca64c63f2f901ead2d6c54f0119212ebb77e956117d9130d3adff30a5598567fd540cf0a8f9f8c469ad15f209ad8ef161006831b39e4ddf2fcd748a8629e33"}], 0x210, 0x40}, 0x40) close(r0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)) recvmsg(r2, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) recvmsg$kcm(r4, &(0x7f0000001a00)={0x0, 0x0, &(0x7f00000018c0)=[{&(0x7f0000001600)=""/173, 0xad}, {&(0x7f0000001040)=""/25, 0x19}, {&(0x7f00000016c0)=""/132, 0x84}, {&(0x7f0000001780)=""/91, 0x5b}, {&(0x7f0000001800)=""/183, 0xb7}], 0x5, &(0x7f0000001940)=""/163, 0xa3, 0xe43}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000a80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r5}, 0x48) 2018/03/29 11:56:07 executing program 4 (fault-call:8 fault-nth:47): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x3, &(0x7f0000002000)=@framed={{0x18}, [], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000680)={0xffffffffffffffff, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x7}, 0x28) recvmsg(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000001c0)) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000100)=r0, 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) recvmsg(r3, &(0x7f00000011c0)={&(0x7f0000000b40)=@can, 0x80, &(0x7f0000001100)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f0000000c80)=""/169, 0xa9}, {&(0x7f0000000d40)=""/229, 0xe5}, {&(0x7f0000000e40)=""/128, 0x80}, {&(0x7f0000000ec0)=""/48, 0x30}, {&(0x7f0000000f00)=""/137, 0x89}, {&(0x7f0000006000)=""/4096, 0x1000}, {&(0x7f0000007000)=""/4096, 0x1000}, {&(0x7f0000001080)=""/127, 0x7f}, {&(0x7f0000008000)=""/4096, 0x1000}], 0xa, 0x0, 0x0, 0x1}, 0x2020) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001200)={0x7, 0x4, 0x0, 0x4, 0x8, 0xffffffffffffffff, 0x9}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x1000000007, 0xcf2e, 0x7e, 0x20, 0x15, r1, 0x4}, 0x2c) socketpair(0x3, 0x80e, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r4, &(0x7f0000000200)={&(0x7f0000000fc0)=@pppol2tp={0x18, 0x1, {0x0, r3, {0x2, 0x4e20, @broadcast=0xffffffff}, 0x1, 0x3, 0x0, 0x2}}, 0x80, &(0x7f0000001580)=[{&(0x7f0000001240)="95c4dcff0f017b3c1979888e50f6c20a37b4edaffb28a3b609d24a8180434ab2fac426d3e4fc87e18267002be3cd56b11d69c4db739bf6a9c91af67ee87be1ea522993a368bdfc0df55539a60ef5515b4f03f3dbddae65cd66a90f030118870b473f156cb9a18624103000608c63f84b09ea89bfb8d8e7705c6ef456ef28adec5e566632ddd63098", 0x88}, {&(0x7f0000001380)="5745869bf3b6f562576761d821af2ad55c2f81345c810d6dbd43facd33c5107488aa7f04c5ab1302b820cd31405e9f657776a0d48e2225f39aabc3de0b30dc7422503b448ad89c23ebaee24ae9696e4e58eccae5febf47fff53dc1f03d869303acdef233746263c5c567e84edb166010fd23f56d6e84406bced5a00b5016b0c700fd76218ecf5da3527552a683eb87aa4b246cd74bcbeff8dedec74332e0214e4dc64cb7ac24c4447843caa7550375ef8e1f74a78c40a617e913a25e4837d24fb09e93eaa2", 0xc5}, {&(0x7f0000001480)="8247f46d4324760570d5078149dc5b38f7d1c592564148ecc6262e91c29cd4344e423ff476882993a2844af9a7c306a15e659a4cb9230b5139842c87ad8fa95c202146730fa610b141dfe4c7b771b46e4db879d2b92a01cb8642100d80a1d4658fd0df05c06c8615960a92b690c728e2603373657a9a46b2f200f2895198694d470ab95b6eb7a76ccee67c9219b4afa289d70c87cf22c733e00700f345136d59bcbd89ce7e110746f91e7a7661b8eb0afe54e3cb1c712441dd9a6ffb59a2eb58e5f5eabd4bec428fe27a403bb0d19125e473abdfea87a0c89108e3c876438a7c3f84bebad6cf858f26d2083efd60", 0xee}], 0x3, &(0x7f000000a000)=[{0x88, 0x112, 0xc2, "6671b4b66ac2fb4e14cee671813dc3834802e601529feb049ebb70880567948953018cfd53d7b1c9be27b1084adfba62040c7f889cfbc15407d93133259d9d5052bf6648a69218702e35278939ad399dc3ebed233c1792c7c1204353c8fe75ea0398f4aaf830834bc93873c119dddc539c"}, {0xe8, 0x6f180cc1befb202, 0x9, "4577f77fd3b3acd92c96feff8b0409afeae1c16fa3d367241c9679e5105141c7205d47ce27a418c10fbe7f601c3142e7b7b3a67322c9d345e0baf4315e13dc771a962ff445015c98a70b319d46ba59155d1cf07827804ea1ca86db74f3029bd60f6f365d955ec12be30102e59b4b3940152988ef09443df596bad9525f697fad61507e856c6acb744cfb034863943e811bd378843ccbd95f8221a444f4c323a391f5788559f34ac02e6e18065b87e8c962353623250694e5b4bf9bc1b00fadf2875995067ff6c18590c207f9a83f06665f5b5af77b4e"}, {0xa0, 0x10f, 0x5, "07c5972c79a30903d5d93f57c962c0351628551f6a3fbac8e18984ad9b8caeb403f1d588fa0b9955ce44d018cbcc06ad98b588dd45fd0ccd6b8d1965e70693ec76dd521aa2693829ef54059dc3191f2f4eca64c63f2f901ead2d6c54f0119212ebb77e956117d9130d3adff30a5598567fd540cf0a8f9f8c469ad15f209ad8ef161006831b39e4ddf2fcd748a8629e33"}], 0x210, 0x40}, 0x40) close(r0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b53596090ebcc07d8584f358be88fafe") recvmsg(r2, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) recvmsg$kcm(r4, &(0x7f0000001a00)={0x0, 0x0, &(0x7f00000018c0)=[{&(0x7f0000001600)=""/173, 0xad}, {&(0x7f0000001040)=""/25, 0x19}, {&(0x7f00000016c0)=""/132, 0x84}, {&(0x7f0000001780)=""/91, 0x5b}, {&(0x7f0000001800)=""/183, 0xb7}], 0x5, &(0x7f0000001940)=""/163, 0xa3, 0xe43}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000a80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r5}, 0x48) [ 812.778008] net/sunrpc/rpc_pipe.c: __rpc_create_common failed to allocate inode for dentry portmap [ 812.789119] net/sunrpc/rpc_pipe.c: rpc_populate failed to populate directory / 2018/03/29 11:56:07 executing program 3: r0 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x10}, 0x10) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000000c0)={0x0, 0x1000, 0x8}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000080)='./file0\x00', r1}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0x0, 0x8}, 0x10) mount(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='cpuset\x00', 0x40, &(0x7f0000000280)="8a4562cb6a7df38be32246afcaef1e1a3f933cb428242c55c117c0fbbd62cea0aab31f2665fb88267466eca314fc8cafd72cc24143121c0691236768fad66390bf9b55014c2bd49faa5388cbabd52e730eeb4ccc411bacd296e423d971043756cf2b35a4063f2a7465b44a60ef31ae437f6160ed2f63afa62c36a27c33e4779e7c0404e337abc025bb2e4b39cc265573c6ab1a3ff09c7ad6bb4631a4") mount(&(0x7f0000000340)='./file1\x00', &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='devtmpfs\x00', 0x40, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xb, 0x7f, 0x0, 0x1, 0x12, r1, 0x100000000}, 0x2c) mkdir(&(0x7f0000000440)='./file1\x00', 0x20) mount(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='iso9660\x00', 0x8, &(0x7f0000000540)="650fe6ccea2b17860de967406c566ec16fe5a7a4c064707e22906e9d3d2a70b4") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000005c0)={r2, 0x28, &(0x7f0000000580)={0x0, 0x0}}, 0x10) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={r3, 0x8, 0x10}, 0xc) mount(&(0x7f0000000640)='./file1\x00', &(0x7f0000000680)='./file1\x00', &(0x7f00000006c0)='pstore\x00', 0x1000000, &(0x7f0000000700)="f48afa3ab3cc319f917be52b04c388c229578537782bc5ffc32c7747b1d28999ad89f5fba460640a324385ac03cccef4553d641b91d79d014804a98e72796f8eb2e1a7056efeaa63404648df67079ae817420f248ccf9d01e7a027c600c71777fb9ebc97da60f3d1a287ef8bc00f1dc68c3b1f0c1836cde5b62be45dd58c3415cbb0f916fe3c04fc69911e2bec15c208d023bdb608fa727657c532bd5101a2a36b34c4eb65f855fea2d6f8a0a79b15ecef1a4c81a8f6f5ed57b09db2ab482413540416126718f2a33ed21346ded20b084a8dc10702ec279fc486b5c57c163d") socketpair(0x3, 0x2, 0x1f, &(0x7f0000001c40)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$kcm(r6, &(0x7f0000004300)={0x0, 0x0, &(0x7f0000004140)=[{&(0x7f0000001c80)=""/139, 0x8b}, {&(0x7f0000001d40)=""/149, 0x95}, {&(0x7f0000001e00)=""/188, 0xbc}, {&(0x7f0000001ec0)=""/69, 0x45}, {&(0x7f0000001f40)=""/165, 0xa5}, {&(0x7f0000002000)=""/4096, 0x1000}, {&(0x7f0000003000)=""/42, 0x2a}, {&(0x7f0000003040)=""/4096, 0x1000}, {&(0x7f0000004040)=""/233, 0xe9}], 0x9, &(0x7f0000004200)=""/236, 0xec, 0xe00}, 0x40) mount(&(0x7f0000004340)='./file1/file0\x00', &(0x7f0000004380)='./file1\x00', &(0x7f00000043c0)='ceph\x00', 0x4860, &(0x7f0000004400)="2c8eb517dd302be26597065442d58f3f345c295b542b2b1df3046ae176") bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000004600)={r6, &(0x7f0000004440)="903685b47b9c4d5c1dffcefa6a92cd57ccdfaf1af0be272f1cb4a5b86ab9d1ef248a63f04f5d59c2cd6e6b7722f5ff866c5d353014f28baaa95bce06a787a3e085102126a0386ffd4e136d472f2cdfb7c658643d2792b7235e2ec8c782080850c20eb00014eab035d7d56c8ddd0d7fdc4c21602d480e4accea0867cc5b4172b46b8f028bd623c58544092396dbda704543cd7c93219ff7f4caf9d0c12fc32c65ddac48ba22321d2c7ef1152f0dd87ed22cb30eb2b24d381b3abaefc114ad4c08e329cfbce60e0549ca", &(0x7f0000004540)="38859653237c5c9685cf2e44e1eea64846e190b778f29b06c26c2f2b8a0800f9fc2019b05290fc5c82f612eb7f479918015eb3af93cc57f01db731e129275ce05910f66e436ef09a8fe7bf22f960eacec350a7f7e9e9a47cb163f467b6a29523346a4c61d65d2235c73095a53929d509538f640424133cfa3617b41a51aa7172460146433abbe604f2c92827fabd5d3134d36b4cecd0fd2549f3527615f9eb63dd9332021e4eff13ad6aa509db21ed98745d00cb36e547", 0x3}, 0x20) mkdir(&(0x7f0000004640)='./file1/file0\x00', 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000004680)={0x0, 0x0, 0xa6, 0x3, 0x4}, 0x2c) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000046c0)=0x7, 0x4) recvmsg$kcm(r6, &(0x7f00000058c0)={&(0x7f0000004700)=@alg, 0x80, &(0x7f0000005880)=[{&(0x7f0000004780)=""/4096, 0x1000}, {&(0x7f0000005780)=""/219, 0xdb}], 0x2, 0x0, 0x0, 0x100000001}, 0x40000000) r7 = gettid() r8 = perf_event_open(&(0x7f0000005900)={0x7, 0x70, 0x0, 0xfffffffffffffff7, 0x9, 0x4, 0x0, 0x7, 0x100, 0x8, 0x100000000, 0x8000, 0x8, 0x6, 0x0, 0x6, 0x10001, 0x9, 0x1f, 0x2, 0x1, 0x3, 0x1, 0x1f, 0x23, 0x1, 0xaa4, 0x5, 0x4, 0x200, 0x6, 0x9, 0xfffffffffffffffb, 0x3, 0x3, 0xff, 0x80000000, 0x0, 0x0, 0xffffffffffffff9d, 0x2, @perf_config_ext={0x7, 0x9}, 0x100, 0x8, 0x2, 0x6, 0x4, 0x6, 0xf71}, r7, 0x9, r6, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f00000059c0)={&(0x7f0000005980)='./file0\x00'}, 0x10) ioctl$sock_kcm_SIOCKCMATTACH(r5, 0x89e0, &(0x7f0000005a00)={r5, r0}) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000005c00)={r4, &(0x7f0000005a40)="313befc1e9ac680c4369983530ee783c4f018c38e134b4b0aebd06ede05f238850949c0f5d32ab19889f880e87e3a0fa5a43500affdcc508d56f3a4df6c159ca9cfa62124b79b4607d42738dc5e16d09ea2c6a2346fc2360feff08d9f464dfdebce2cb99d4ba8e5fc37edfba041f14e16a68192d7d8687404ee7318323520188c4e5d52e8c7ec40bd0823fb210e530c74ea842bd8bacbc48317b0b6ed12528ecd30e1af83b8049df791ff7affe91ab54", &(0x7f0000005b00)=""/243}, 0x18) mount(&(0x7f0000005c40)='./file1/file0\x00', &(0x7f0000005c80)='./file1\x00', &(0x7f0000005cc0)='btrfs\x00', 0x0, 0x0) recvmsg(r5, &(0x7f00000073c0)={&(0x7f0000005d00)=@sco, 0x80, &(0x7f0000007300)=[{&(0x7f0000005d80)=""/103, 0x67}, {&(0x7f0000005e00)=""/170, 0xaa}, {&(0x7f0000005ec0)=""/252, 0xfc}, {&(0x7f0000005fc0)=""/136, 0x88}, {&(0x7f0000006080)=""/125, 0x7d}, {&(0x7f0000006100)=""/4096, 0x1000}, {&(0x7f0000007100)=""/106, 0x6a}, {&(0x7f0000007180)=""/115, 0x73}, {&(0x7f0000007200)=""/240, 0xf0}], 0x9, 0x0, 0x0, 0x7}, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000007400)={r3, 0x0, 0x18}, 0xc) ioctl$PERF_EVENT_IOC_REFRESH(r8, 0x2402, 0xc4c) recvmsg$kcm(r6, &(0x7f0000008880)={&(0x7f0000007440)=@l2, 0x80, &(0x7f0000008800)=[{&(0x7f00000074c0)=""/231, 0xe7}, {&(0x7f00000075c0)=""/118, 0x76}, {&(0x7f0000007640)=""/4096, 0x1000}, {&(0x7f0000008640)=""/223, 0xdf}, {&(0x7f0000008740)}, {&(0x7f0000008780)=""/32, 0x20}, {&(0x7f00000087c0)=""/53, 0x35}], 0x7}, 0x10000) 2018/03/29 11:56:07 executing program 4 (fault-call:8 fault-nth:48): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x3, &(0x7f0000002000)=@framed={{0x18}, [], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000680)={0xffffffffffffffff, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x7}, 0x28) recvmsg(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000001c0)) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000100)=r0, 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) recvmsg(r3, &(0x7f00000011c0)={&(0x7f0000000b40)=@can, 0x80, &(0x7f0000001100)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f0000000c80)=""/169, 0xa9}, {&(0x7f0000000d40)=""/229, 0xe5}, {&(0x7f0000000e40)=""/128, 0x80}, {&(0x7f0000000ec0)=""/48, 0x30}, {&(0x7f0000000f00)=""/137, 0x89}, {&(0x7f0000006000)=""/4096, 0x1000}, {&(0x7f0000007000)=""/4096, 0x1000}, {&(0x7f0000001080)=""/127, 0x7f}, {&(0x7f0000008000)=""/4096, 0x1000}], 0xa, 0x0, 0x0, 0x1}, 0x2020) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001200)={0x7, 0x4, 0x0, 0x4, 0x8, 0xffffffffffffffff, 0x9}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x1000000007, 0xcf2e, 0x7e, 0x20, 0x15, r1, 0x4}, 0x2c) socketpair(0x3, 0x80e, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r4, &(0x7f0000000200)={&(0x7f0000000fc0)=@pppol2tp={0x18, 0x1, {0x0, r3, {0x2, 0x4e20, @broadcast=0xffffffff}, 0x1, 0x3, 0x0, 0x2}}, 0x80, &(0x7f0000001580)=[{&(0x7f0000001240)="95c4dcff0f017b3c1979888e50f6c20a37b4edaffb28a3b609d24a8180434ab2fac426d3e4fc87e18267002be3cd56b11d69c4db739bf6a9c91af67ee87be1ea522993a368bdfc0df55539a60ef5515b4f03f3dbddae65cd66a90f030118870b473f156cb9a18624103000608c63f84b09ea89bfb8d8e7705c6ef456ef28adec5e566632ddd63098", 0x88}, {&(0x7f0000001380)="5745869bf3b6f562576761d821af2ad55c2f81345c810d6dbd43facd33c5107488aa7f04c5ab1302b820cd31405e9f657776a0d48e2225f39aabc3de0b30dc7422503b448ad89c23ebaee24ae9696e4e58eccae5febf47fff53dc1f03d869303acdef233746263c5c567e84edb166010fd23f56d6e84406bced5a00b5016b0c700fd76218ecf5da3527552a683eb87aa4b246cd74bcbeff8dedec74332e0214e4dc64cb7ac24c4447843caa7550375ef8e1f74a78c40a617e913a25e4837d24fb09e93eaa2", 0xc5}, {&(0x7f0000001480)="8247f46d4324760570d5078149dc5b38f7d1c592564148ecc6262e91c29cd4344e423ff476882993a2844af9a7c306a15e659a4cb9230b5139842c87ad8fa95c202146730fa610b141dfe4c7b771b46e4db879d2b92a01cb8642100d80a1d4658fd0df05c06c8615960a92b690c728e2603373657a9a46b2f200f2895198694d470ab95b6eb7a76ccee67c9219b4afa289d70c87cf22c733e00700f345136d59bcbd89ce7e110746f91e7a7661b8eb0afe54e3cb1c712441dd9a6ffb59a2eb58e5f5eabd4bec428fe27a403bb0d19125e473abdfea87a0c89108e3c876438a7c3f84bebad6cf858f26d2083efd60", 0xee}], 0x3, &(0x7f000000a000)=[{0x88, 0x112, 0xc2, "6671b4b66ac2fb4e14cee671813dc3834802e601529feb049ebb70880567948953018cfd53d7b1c9be27b1084adfba62040c7f889cfbc15407d93133259d9d5052bf6648a69218702e35278939ad399dc3ebed233c1792c7c1204353c8fe75ea0398f4aaf830834bc93873c119dddc539c"}, {0xe8, 0x6f180cc1befb202, 0x9, "4577f77fd3b3acd92c96feff8b0409afeae1c16fa3d367241c9679e5105141c7205d47ce27a418c10fbe7f601c3142e7b7b3a67322c9d345e0baf4315e13dc771a962ff445015c98a70b319d46ba59155d1cf07827804ea1ca86db74f3029bd60f6f365d955ec12be30102e59b4b3940152988ef09443df596bad9525f697fad61507e856c6acb744cfb034863943e811bd378843ccbd95f8221a444f4c323a391f5788559f34ac02e6e18065b87e8c962353623250694e5b4bf9bc1b00fadf2875995067ff6c18590c207f9a83f06665f5b5af77b4e"}, {0xa0, 0x10f, 0x5, "07c5972c79a30903d5d93f57c962c0351628551f6a3fbac8e18984ad9b8caeb403f1d588fa0b9955ce44d018cbcc06ad98b588dd45fd0ccd6b8d1965e70693ec76dd521aa2693829ef54059dc3191f2f4eca64c63f2f901ead2d6c54f0119212ebb77e956117d9130d3adff30a5598567fd540cf0a8f9f8c469ad15f209ad8ef161006831b39e4ddf2fcd748a8629e33"}], 0x210, 0x40}, 0x40) close(r0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b53596090ebcc07d8584f358be88fafe") recvmsg(r2, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) recvmsg$kcm(r4, &(0x7f0000001a00)={0x0, 0x0, &(0x7f00000018c0)=[{&(0x7f0000001600)=""/173, 0xad}, {&(0x7f0000001040)=""/25, 0x19}, {&(0x7f00000016c0)=""/132, 0x84}, {&(0x7f0000001780)=""/91, 0x5b}, {&(0x7f0000001800)=""/183, 0xb7}], 0x5, &(0x7f0000001940)=""/163, 0xa3, 0xe43}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000a80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r5}, 0x48) 2018/03/29 11:56:07 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x1e1, 0x100000000209e20, 0x8000000001, 0x5}, 0xfffffffffffffe20) r0 = getpid() r1 = perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0xfffffffffffffffc, 0x3, 0x8, 0x2, 0x0, 0x9, 0x10000, 0xc, 0x3d3, 0x80, 0x5, 0xfffffffffffffffc, 0x8, 0x3f, 0x5d, 0xbbb0, 0x20, 0x3, 0x8000, 0x100000000, 0x8, 0x9, 0x2, 0x4, 0x800, 0xf8, 0x3, 0x9, 0x1, 0x3, 0x8, 0x3, 0x7, 0x10001, 0xf16, 0x2, 0x0, 0x7fffffff, 0x4, @perf_bp={&(0x7f0000000780), 0x1}, 0x4080, 0x10001, 0xcc, 0x7, 0x3, 0xffff, 0x7fffffff}, 0xffffffffffffffff, 0xd, 0xffffffffffffff9c, 0x8) perf_event_open(&(0x7f0000000980)={0x4, 0x70, 0x6, 0x3f, 0x8e, 0x1, 0x0, 0x3, 0x404, 0x0, 0xbc2b, 0x40, 0x7, 0xffff, 0xffff, 0x9, 0x9de2, 0x9, 0x0, 0x3, 0x7f, 0xff, 0x40, 0x400, 0x9, 0x7fffffff, 0x80000000, 0x7, 0x8, 0x10001, 0x1f, 0x2778, 0x800, 0x8001, 0x101, 0x9, 0x8, 0x7ff, 0x0, 0x1000, 0x5, @perf_config_ext={0x3ff, 0xb69b}, 0x3040, 0x2, 0x2, 0x5, 0x7, 0x6, 0x7283ed73}, r0, 0xe, r1, 0x8) bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x0, 0x0, 0x7ffff9, 0x0, 0x20000003, 0x0}, 0x2c) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) r2 = gettid() r3 = perf_event_open(&(0x7f00000008c0)={0x7, 0x70, 0x1, 0x200, 0x3, 0xdbce, 0x0, 0x8, 0x1002, 0x1, 0xffffffffffffff00, 0x8, 0x1, 0xb3fa, 0x8, 0x0, 0x1, 0x2, 0x1000, 0x2, 0x401, 0x8, 0x3, 0x81, 0x0, 0x7, 0x2fc4, 0x882, 0x4, 0x8, 0x3, 0x81, 0x3, 0x7, 0x8857, 0x7, 0x5, 0x9, 0x0, 0x7, 0x1, @perf_config_ext={0x0, 0x80000000}, 0x400, 0x7f, 0x4, 0x7, 0x2, 0x7f, 0x200}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000840)={0x5, 0x70, 0xef, 0x2, 0x1000, 0xffffffff80000000, 0x0, 0x1a7800000000, 0x2000, 0x4, 0x5, 0x6814, 0x3a9, 0x5, 0x63b, 0x6, 0x8, 0x1000, 0x250420ee, 0x3, 0x0, 0x20, 0x6, 0x0, 0x4, 0x5, 0x4, 0x8, 0x3, 0x8, 0x52893dd5, 0x2, 0x2, 0x8, 0x44d, 0x1, 0x8, 0x6, 0x0, 0x100000000, 0x0, @perf_config_ext={0x9, 0x80}, 0x0, 0x0, 0x2b67, 0x6, 0x4b0, 0x81, 0x4}, r2, 0x5, r3, 0xb) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1003, 0x0) mount(&(0x7f00002b9ff8)='./file0\x00', &(0x7f0000cbeff8)='./file0\x00', &(0x7f00005f7ffa)='ramfs\x00', 0x80000, &(0x7f000002f000)) mount(&(0x7f0000000000)='.', &(0x7f0000000040)='.', &(0x7f0000000080)='cgroup\x00', 0x5010, &(0x7f00000000c0)) mount(&(0x7f0000377ff8)='.', &(0x7f0000000280)='.', &(0x7f0000000600)='nfs4\x00', 0x5010, &(0x7f0000000300)="2161893416a0c71070768c219eb114c3253c9f3baf4e9e8e9111c1a7fc6e266009fe27243deeaa22ca7ae9341f714300b5ee807e55d609036f2a3260475922bdfb2d2849f1c3b2ad3c051bd4f3751a177f77a92758c6d2b23fe7f1535b54e5846d11c135de8286066dec1b25f6e1378944ac5f7fce42d055821b5e19") perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xd68, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f0000014f88)={0x5, 0xfffffffffffffdc4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x46000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = getpid() perf_event_open(&(0x7f0000000680)={0x4, 0x70, 0x64, 0xffff, 0x1f, 0x4, 0x0, 0x1c3, 0x0, 0x1, 0x1, 0x9, 0x1ff, 0xfffffffffffffff8, 0x0, 0x0, 0x6, 0x7fffffff, 0x0, 0xffffffff, 0x80000001, 0xd0, 0x7, 0x1f, 0x0, 0x8, 0x9, 0x1ff, 0x8, 0x785, 0x4, 0xff, 0x2, 0x656, 0x5000000, 0x1, 0x460e3be0, 0x1, 0x0, 0x0, 0x7, @perf_bp={&(0x7f0000000640), 0x1}, 0x1000, 0xa, 0x7fff, 0x7, 0x3, 0x400, 0x9}, r5, 0xe, r4, 0x1) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', 0x0, 0x10}, 0x10) close(0xffffffffffffffff) bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)={&(0x7f0000000040)='./file0\x00', 0x0, 0x18}, 0x10) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000100)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0, 0x2e, &(0x7f0000000440), &(0x7f0000000140)=""/46, 0x4229}, 0x28) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000003480)={&(0x7f0000003300)=@can={0x0, 0x0}, 0x80, &(0x7f0000003400)=[{&(0x7f0000003380)=""/56, 0x38}, {&(0x7f00000033c0)=""/1, 0x1}], 0x2, &(0x7f0000003440)=""/33, 0x21, 0x1}, 0x40010000) bpf$PROG_LOAD(0x5, &(0x7f00000034c0)={0xe, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="1800000002000000000000004ce700002555fdff00000000002371d07c9ba7f4a23372b0ad61000000000000009500000000000000"], &(0x7f00000007c0)='GPL\x00', 0x3, 0x2d, &(0x7f0000000800)=""/45, 0x40f00, 0x1, [], r6}, 0x48) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000740)={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x10) socketpair$inet(0x2, 0x80a, 0x81, &(0x7f0000000240)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={0xffffffffffffffff, &(0x7f0000000500)="ae30f1bca1b4d3f69f1aac81517d42ad5980bc63b5008616a1f4724b9f8c1e4ecd8de336f57dd727cdaab04f0b40f28612615ad08de414711d841a88db33fd33884b627074213a0c5de3be2bbaec9207d9865c47f240467849979b5ab5632376608fc4be41a274abb2dc07cabe344a18db51048e5b0cbda843905a4258cdee3e649eddf104ba78894dce09747dcfe6a8d6d6d985520eeef448b83a8bcb83074541ba7a20d6094aa206c01a0690e5b3bfa05d475eb382b0199031d22bb26cde9b1ca0055eef9f6c4993b71ba19ba0590bb5efdaddaa574c25356ca890d138fc9fe0e975b6d5a1a8251503cd0a91845f9d95", &(0x7f0000000480)="9bc7741ea5e524cc8c6f748a73153834428729c45bf4ad446d2dddf1978baf431d0ba35b5442b5afe22db8b003650320200af7e1368ef7cdfa79ca8b9d3564363a5d2a502970314f2264c883bc8d990afc003e5adb95b30edad245c4420c8126f1d33db75ff0230698eaff90055e0f", 0x2}, 0x20) socketpair(0x0, 0x80003, 0xffff, &(0x7f0000000380)={0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r7, 0x50, &(0x7f00000003c0)}, 0x10) 2018/03/29 11:56:07 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x3, &(0x7f0000002000)=@framed={{0x18}, [], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000680)={0xffffffffffffffff, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x7}, 0x28) recvmsg(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000001c0)) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000100), 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) recvmsg(r3, &(0x7f00000011c0)={&(0x7f0000000b40)=@can, 0x80, &(0x7f0000001100)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f0000000c80)=""/169, 0xa9}, {&(0x7f0000000d40)=""/229, 0xe5}, {&(0x7f0000000e40)=""/128, 0x80}, {&(0x7f0000000ec0)=""/48, 0x30}, {&(0x7f0000000f00)=""/137, 0x89}, {&(0x7f0000006000)=""/4096, 0x1000}, {&(0x7f0000007000)=""/4096, 0x1000}, {&(0x7f0000001080)=""/127, 0x7f}, {&(0x7f0000008000)=""/4096, 0x1000}], 0xa, 0x0, 0x0, 0x1}, 0x2020) bpf$MAP_CREATE(0x0, &(0x7f0000001200)={0x7, 0x4, 0x0, 0x4, 0x8, 0xffffffffffffffff, 0x9}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x1000000007, 0xcf2e, 0x7e, 0x20, 0x15, r1, 0x4}, 0x2c) socketpair(0x3, 0x80e, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r4, &(0x7f0000000200)={&(0x7f0000000fc0)=@pppol2tp={0x18, 0x1, {0x0, r3, {0x2, 0x4e20, @broadcast=0xffffffff}, 0x1, 0x3, 0x0, 0x2}}, 0x80, &(0x7f0000001580)=[{&(0x7f0000001240)="95c4dcff0f017b3c1979888e50f6c20a37b4edaffb28a3b609d24a8180434ab2fac426d3e4fc87e18267002be3cd56b11d69c4db739bf6a9c91af67ee87be1ea522993a368bdfc0df55539a60ef5515b4f03f3dbddae65cd66a90f030118870b473f156cb9a18624103000608c63f84b09ea89bfb8d8e7705c6ef456ef28adec5e566632ddd63098", 0x88}, {&(0x7f0000001380)="5745869bf3b6f562576761d821af2ad55c2f81345c810d6dbd43facd33c5107488aa7f04c5ab1302b820cd31405e9f657776a0d48e2225f39aabc3de0b30dc7422503b448ad89c23ebaee24ae9696e4e58eccae5febf47fff53dc1f03d869303acdef233746263c5c567e84edb166010fd23f56d6e84406bced5a00b5016b0c700fd76218ecf5da3527552a683eb87aa4b246cd74bcbeff8dedec74332e0214e4dc64cb7ac24c4447843caa7550375ef8e1f74a78c40a617e913a25e4837d24fb09e93eaa2", 0xc5}, {&(0x7f0000001480)="8247f46d4324760570d5078149dc5b38f7d1c592564148ecc6262e91c29cd4344e423ff476882993a2844af9a7c306a15e659a4cb9230b5139842c87ad8fa95c202146730fa610b141dfe4c7b771b46e4db879d2b92a01cb8642100d80a1d4658fd0df05c06c8615960a92b690c728e2603373657a9a46b2f200f2895198694d470ab95b6eb7a76ccee67c9219b4afa289d70c87cf22c733e00700f345136d59bcbd89ce7e110746f91e7a7661b8eb0afe54e3cb1c712441dd9a6ffb59a2eb58e5f5eabd4bec428fe27a403bb0d19125e473abdfea87a0c89108e3c876438a7c3f84bebad6cf858f26d2083efd60", 0xee}], 0x3, &(0x7f000000a000)=[{0x88, 0x112, 0xc2, "6671b4b66ac2fb4e14cee671813dc3834802e601529feb049ebb70880567948953018cfd53d7b1c9be27b1084adfba62040c7f889cfbc15407d93133259d9d5052bf6648a69218702e35278939ad399dc3ebed233c1792c7c1204353c8fe75ea0398f4aaf830834bc93873c119dddc539c"}, {0xe8, 0x6f180cc1befb202, 0x9, "4577f77fd3b3acd92c96feff8b0409afeae1c16fa3d367241c9679e5105141c7205d47ce27a418c10fbe7f601c3142e7b7b3a67322c9d345e0baf4315e13dc771a962ff445015c98a70b319d46ba59155d1cf07827804ea1ca86db74f3029bd60f6f365d955ec12be30102e59b4b3940152988ef09443df596bad9525f697fad61507e856c6acb744cfb034863943e811bd378843ccbd95f8221a444f4c323a391f5788559f34ac02e6e18065b87e8c962353623250694e5b4bf9bc1b00fadf2875995067ff6c18590c207f9a83f06665f5b5af77b4e"}, {0xa0, 0x10f, 0x5, "07c5972c79a30903d5d93f57c962c0351628551f6a3fbac8e18984ad9b8caeb403f1d588fa0b9955ce44d018cbcc06ad98b588dd45fd0ccd6b8d1965e70693ec76dd521aa2693829ef54059dc3191f2f4eca64c63f2f901ead2d6c54f0119212ebb77e956117d9130d3adff30a5598567fd540cf0a8f9f8c469ad15f209ad8ef161006831b39e4ddf2fcd748a8629e33"}], 0x210, 0x40}, 0x40) close(r0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)) recvmsg(r2, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) recvmsg$kcm(r4, &(0x7f0000001a00)={0x0, 0x0, &(0x7f00000018c0)=[{&(0x7f0000001600)=""/173, 0xad}, {&(0x7f0000001040)=""/25, 0x19}, {&(0x7f00000016c0)=""/132, 0x84}, {&(0x7f0000001780)=""/91, 0x5b}, {&(0x7f0000001800)=""/183, 0xb7}], 0x5, &(0x7f0000001940)=""/163, 0xa3, 0xe43}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000a80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r5}, 0x48) 2018/03/29 11:56:07 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x3, &(0x7f0000002000)=@framed={{0x18}, [], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000680)={0xffffffffffffffff, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x7}, 0x28) recvmsg(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x8, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000100)=r0, 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) recvmsg(r2, &(0x7f00000011c0)={&(0x7f0000000b40)=@can, 0x80, &(0x7f0000001100)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f0000000c80)=""/169, 0xa9}, {&(0x7f0000000d40)=""/229, 0xe5}, {&(0x7f0000000e40)=""/128, 0x80}, {&(0x7f0000000ec0)=""/48, 0x30}, {&(0x7f0000000f00)=""/137, 0x89}, {&(0x7f0000006000)=""/4096, 0x1000}, {&(0x7f0000007000)=""/4096, 0x1000}, {&(0x7f0000001080)=""/127, 0x7f}, {&(0x7f0000008000)=""/4096, 0x1000}], 0xa, 0x0, 0x0, 0x1}, 0x2020) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001200)={0x7, 0x4, 0x0, 0x4, 0x8, 0xffffffffffffffff, 0x9}, 0x2c) socketpair(0x3, 0x80e, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r3, &(0x7f0000000200)={&(0x7f0000000fc0)=@pppol2tp={0x18, 0x1, {0x0, r2, {0x2, 0x4e20, @broadcast=0xffffffff}, 0x1, 0x3, 0x0, 0x2}}, 0x80, &(0x7f0000001580)=[{&(0x7f0000001240)="95c4dcff0f017b3c1979888e50f6c20a37b4edaffb28a3b609d24a8180434ab2fac426d3e4fc87e18267002be3cd56b11d69c4db739bf6a9c91af67ee87be1ea522993a368bdfc0df55539a60ef5515b4f03f3dbddae65cd66a90f030118870b473f156cb9a18624103000608c63f84b09ea89bfb8d8e7705c6ef456ef28adec5e566632ddd63098", 0x88}, {&(0x7f0000001380)="5745869bf3b6f562576761d821af2ad55c2f81345c810d6dbd43facd33c5107488aa7f04c5ab1302b820cd31405e9f657776a0d48e2225f39aabc3de0b30dc7422503b448ad89c23ebaee24ae9696e4e58eccae5febf47fff53dc1f03d869303acdef233746263c5c567e84edb166010fd23f56d6e84406bced5a00b5016b0c700fd76218ecf5da3527552a683eb87aa4b246cd74bcbeff8dedec74332e0214e4dc64cb7ac24c4447843caa7550375ef8e1f74a78c40a617e913a25e4837d24fb09e93eaa2", 0xc5}, {&(0x7f0000001480)="8247f46d4324760570d5078149dc5b38f7d1c592564148ecc6262e91c29cd4344e423ff476882993a2844af9a7c306a15e659a4cb9230b5139842c87ad8fa95c202146730fa610b141dfe4c7b771b46e4db879d2b92a01cb8642100d80a1d4658fd0df05c06c8615960a92b690c728e2603373657a9a46b2f200f2895198694d470ab95b6eb7a76ccee67c9219b4afa289d70c87cf22c733e00700f345136d59bcbd89ce7e110746f91e7a7661b8eb0afe54e3cb1c712441dd9a6ffb59a2eb58e5f5eabd4bec428fe27a403bb0d19125e473abdfea87a0c89108e3c876438a7c3f84bebad6cf858f26d2083efd60", 0xee}], 0x3, &(0x7f000000a000)=[{0x88, 0x112, 0xc2, "6671b4b66ac2fb4e14cee671813dc3834802e601529feb049ebb70880567948953018cfd53d7b1c9be27b1084adfba62040c7f889cfbc15407d93133259d9d5052bf6648a69218702e35278939ad399dc3ebed233c1792c7c1204353c8fe75ea0398f4aaf830834bc93873c119dddc539c"}, {0xe8, 0x6f180cc1befb202, 0x9, "4577f77fd3b3acd92c96feff8b0409afeae1c16fa3d367241c9679e5105141c7205d47ce27a418c10fbe7f601c3142e7b7b3a67322c9d345e0baf4315e13dc771a962ff445015c98a70b319d46ba59155d1cf07827804ea1ca86db74f3029bd60f6f365d955ec12be30102e59b4b3940152988ef09443df596bad9525f697fad61507e856c6acb744cfb034863943e811bd378843ccbd95f8221a444f4c323a391f5788559f34ac02e6e18065b87e8c962353623250694e5b4bf9bc1b00fadf2875995067ff6c18590c207f9a83f06665f5b5af77b4e"}, {0xa0, 0x10f, 0x5, "07c5972c79a30903d5d93f57c962c0351628551f6a3fbac8e18984ad9b8caeb403f1d588fa0b9955ce44d018cbcc06ad98b588dd45fd0ccd6b8d1965e70693ec76dd521aa2693829ef54059dc3191f2f4eca64c63f2f901ead2d6c54f0119212ebb77e956117d9130d3adff30a5598567fd540cf0a8f9f8c469ad15f209ad8ef161006831b39e4ddf2fcd748a8629e33"}], 0x210, 0x40}, 0x40) close(r0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)) recvmsg(r1, &(0x7f00000267c0)={&(0x7f00000251c0)=@can, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) 2018/03/29 11:56:07 executing program 0: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000001a00)) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000001a40)={0xffffffffffffffff}) recvmsg$kcm(r1, &(0x7f0000000540)={&(0x7f00000000c0)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @broadcast}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000240)=""/65, 0x41}], 0x1, &(0x7f0000000440)=""/213, 0xd5}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x8983, &(0x7f0000000040)) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000080)) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000019c0)={0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000000140)="0253eea6a53cc0eae389e9a13e5f2046d0633eebde90f446c1b1eabbd0adb42dfcefb37a3df93feb3d5e76dc353ecf23fe9c81afa5", 0x35}, {&(0x7f00000002c0)}, {&(0x7f0000000400)}, {&(0x7f0000001600)}], 0x4, &(0x7f0000001700)=ANY=[@ANYBLOB="680000000000000007010000c17d0425c209d1e9e23de47cb15819d813deb534cee2d9497c58eba5bd8a228407fb709d70f16afa73f4924f12ecc429b6fd356748940b62ee5f5685ce027fe4e6c60a8f88cd848bc5aaea8c0ca3e826e2490300000000000000849f09bd37f681e29814e6bb00000000100000000000000000000000ff0100001000"], 0x88}, 0x48800) 2018/03/29 11:56:07 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x1e1, 0x100000000209e20, 0x8000000001, 0x5}, 0xfffffffffffffe20) r0 = getpid() r1 = perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0xfffffffffffffffc, 0x3, 0x8, 0x2, 0x0, 0x9, 0x10000, 0xc, 0x3d3, 0x80, 0x5, 0xfffffffffffffffc, 0x8, 0x3f, 0x5d, 0xbbb0, 0x20, 0x3, 0x8000, 0x100000000, 0x8, 0x9, 0x2, 0x4, 0x800, 0xf8, 0x3, 0x9, 0x1, 0x3, 0x8, 0x3, 0x7, 0x10001, 0xf16, 0x2, 0x0, 0x7fffffff, 0x4, @perf_bp={&(0x7f0000000780), 0x1}, 0x4080, 0x10001, 0xcc, 0x7, 0x3, 0xffff, 0x7fffffff}, 0xffffffffffffffff, 0xd, 0xffffffffffffff9c, 0x8) perf_event_open(&(0x7f0000000980)={0x4, 0x70, 0x6, 0x3f, 0x8e, 0x1, 0x0, 0x3, 0x404, 0x0, 0xbc2b, 0x40, 0x7, 0xffff, 0xffff, 0x9, 0x9de2, 0x9, 0x0, 0x3, 0x7f, 0xff, 0x40, 0x400, 0x9, 0x7fffffff, 0x80000000, 0x7, 0x8, 0x10001, 0x1f, 0x2778, 0x800, 0x8001, 0x101, 0x9, 0x8, 0x7ff, 0x0, 0x1000, 0x5, @perf_config_ext={0x3ff, 0xb69b}, 0x3040, 0x2, 0x2, 0x5, 0x7, 0x6, 0x7283ed73}, r0, 0xe, r1, 0x8) bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x0, 0x0, 0x7ffff9, 0x0, 0x20000003, 0x0}, 0x2c) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) r2 = gettid() r3 = perf_event_open(&(0x7f00000008c0)={0x7, 0x70, 0x1, 0x200, 0x3, 0xdbce, 0x0, 0x8, 0x1002, 0x1, 0xffffffffffffff00, 0x8, 0x1, 0xb3fa, 0x8, 0x0, 0x1, 0x2, 0x1000, 0x2, 0x401, 0x8, 0x3, 0x81, 0x0, 0x7, 0x2fc4, 0x882, 0x4, 0x8, 0x3, 0x81, 0x3, 0x7, 0x8857, 0x7, 0x5, 0x9, 0x0, 0x7, 0x1, @perf_config_ext={0x0, 0x80000000}, 0x400, 0x7f, 0x4, 0x7, 0x2, 0x7f, 0x200}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000840)={0x5, 0x70, 0xef, 0x2, 0x1000, 0xffffffff80000000, 0x0, 0x1a7800000000, 0x2000, 0x4, 0x5, 0x6814, 0x3a9, 0x5, 0x63b, 0x6, 0x8, 0x1000, 0x250420ee, 0x3, 0x0, 0x20, 0x6, 0x0, 0x4, 0x5, 0x4, 0x8, 0x3, 0x8, 0x52893dd5, 0x2, 0x2, 0x8, 0x44d, 0x1, 0x8, 0x6, 0x0, 0x100000000, 0x0, @perf_config_ext={0x9, 0x80}, 0x0, 0x0, 0x2b67, 0x6, 0x4b0, 0x81, 0x4}, r2, 0x5, r3, 0xb) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1003, 0x0) mount(&(0x7f00002b9ff8)='./file0\x00', &(0x7f0000cbeff8)='./file0\x00', &(0x7f00005f7ffa)='ramfs\x00', 0x80000, &(0x7f000002f000)) mount(&(0x7f0000000000)='.', &(0x7f0000000040)='.', &(0x7f0000000080)='cgroup\x00', 0x5010, &(0x7f00000000c0)) mount(&(0x7f0000377ff8)='.', &(0x7f0000000280)='.', &(0x7f0000000600)='nfs4\x00', 0x5010, &(0x7f0000000300)="2161893416a0c71070768c219eb114c3253c9f3baf4e9e8e9111c1a7fc6e266009fe27243deeaa22ca7ae9341f714300b5ee807e55d609036f2a3260475922bdfb2d2849f1c3b2ad3c051bd4f3751a177f77a92758c6d2b23fe7f1535b54e5846d11c135de8286066dec1b25f6e1378944ac5f7fce42d055821b5e19") perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xd68, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f0000014f88)={0x5, 0xfffffffffffffdc4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x46000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = getpid() perf_event_open(&(0x7f0000000680)={0x4, 0x70, 0x64, 0xffff, 0x1f, 0x4, 0x0, 0x1c3, 0x0, 0x1, 0x1, 0x9, 0x1ff, 0xfffffffffffffff8, 0x0, 0x0, 0x6, 0x7fffffff, 0x4, 0xffffffff, 0x80000001, 0xd0, 0x7, 0x1f, 0x0, 0x8, 0x9, 0x1ff, 0x8, 0x785, 0x4, 0xff, 0x2, 0x656, 0x5000000, 0x1, 0x460e3be0, 0x1, 0x0, 0x0, 0x7, @perf_bp={&(0x7f0000000640), 0x1}, 0x1000, 0xa, 0x7fff, 0x7, 0x3, 0x400, 0x9}, r5, 0xe, r4, 0x1) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', 0x0, 0x10}, 0x10) close(0xffffffffffffffff) bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)={&(0x7f0000000040)='./file0\x00', 0x0, 0x18}, 0x10) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000100)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0, 0x2e, &(0x7f0000000440), &(0x7f0000000140)=""/46, 0x4229}, 0x28) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000003480)={&(0x7f0000003300)=@can={0x0, 0x0}, 0x80, &(0x7f0000003400)=[{&(0x7f0000003380)=""/56, 0x38}, {&(0x7f00000033c0)=""/1, 0x1}], 0x2, &(0x7f0000003440)=""/33, 0x21, 0x1}, 0x40010000) bpf$PROG_LOAD(0x5, &(0x7f00000034c0)={0xe, 0x6, &(0x7f0000000940)=ANY=[@ANYBLOB="1800000002000000000000004ce700002555fdff00000000002371d07c9ba7f4a23372b0ad61000000000000009500000000"], &(0x7f00000007c0)='GPL\x00', 0x3, 0x2d, &(0x7f0000000800)=""/45, 0x40f00, 0x1, [], r6}, 0x48) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000740)={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x10) socketpair$inet(0x2, 0x80a, 0x81, &(0x7f0000000240)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={0xffffffffffffffff, &(0x7f0000000500)="ae30f1bca1b4d3f69f1aac81517d42ad5980bc63b5008616a1f4724b9f8c1e4ecd8de336f57dd727cdaab04f0b40f28612615ad08de414711d841a88db33fd33884b627074213a0c5de3be2bbaec9207d9865c47f240467849979b5ab5632376608fc4be41a274abb2dc07cabe344a18db51048e5b0cbda843905a4258cdee3e649eddf104ba78894dce09747dcfe6a8d6d6d985520eeef448b83a8bcb83074541ba7a20d6094aa206c01a0690e5b3bfa05d475eb382b0199031d22bb26cde9b1ca0055eef9f6c4993b71ba19ba0590bb5efdaddaa574c25356ca890d138fc9fe0e975b6d5a1a8251503cd0a91845f9d95", &(0x7f0000000480)="9bc7741ea5e524cc8c6f748a73153834428729c45bf4ad446d2dddf1978baf431d0ba35b5442b5afe22db8b003650320200af7e1368ef7cdfa79ca8b9d3564363a5d2a502970314f2264c883bc8d990afc003e5adb95b30edad245c4420c8126f1d33db75ff0230698eaff90055e0f", 0x2}, 0x20) socketpair(0x0, 0x80003, 0xffff, &(0x7f0000000380)={0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r7, 0x50, &(0x7f00000003c0)}, 0x10) 2018/03/29 11:56:07 executing program 3: r0 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x10}, 0x10) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000000c0)={0x0, 0x1000, 0x8}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000080)='./file0\x00', r1}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0x0, 0x8}, 0x10) mount(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='cpuset\x00', 0x40, &(0x7f0000000280)="8a4562cb6a7df38be32246afcaef1e1a3f933cb428242c55c117c0fbbd62cea0aab31f2665fb88267466eca314fc8cafd72cc24143121c0691236768fad66390bf9b55014c2bd49faa5388cbabd52e730eeb4ccc411bacd296e423d971043756cf2b35a4063f2a7465b44a60ef31ae437f6160ed2f63afa62c36a27c33e4779e7c0404e337abc025bb2e4b39cc265573c6ab1a3ff09c7ad6bb4631a4") mount(&(0x7f0000000340)='./file1\x00', &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='devtmpfs\x00', 0x40, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xb, 0x7f, 0x0, 0x1, 0x12, r1, 0x100000000}, 0x2c) mkdir(&(0x7f0000000440)='./file1\x00', 0x20) mount(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='iso9660\x00', 0x8, &(0x7f0000000540)="650fe6ccea2b17860de967406c566ec16fe5a7a4c064707e22906e9d3d2a70b4") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000005c0)={r2, 0x28, &(0x7f0000000580)={0x0, 0x0}}, 0x10) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={r3, 0x8, 0x10}, 0xc) mount(&(0x7f0000000640)='./file1\x00', &(0x7f0000000680)='./file1\x00', &(0x7f00000006c0)='pstore\x00', 0x1000000, &(0x7f0000000700)="f48afa3ab3cc319f917be52b04c388c229578537782bc5ffc32c7747b1d28999ad89f5fba460640a324385ac03cccef4553d641b91d79d014804a98e72796f8eb2e1a7056efeaa63404648df67079ae817420f248ccf9d01e7a027c600c71777fb9ebc97da60f3d1a287ef8bc00f1dc68c3b1f0c1836cde5b62be45dd58c3415cbb0f916fe3c04fc69911e2bec15c208d023bdb608fa727657c532bd5101a2a36b34c4eb65f855fea2d6f8a0a79b15ecef1a4c81a8f6f5ed57b09db2ab482413540416126718f2a33ed21346ded20b084a8dc10702ec279fc486b5c57c163d") socketpair(0x3, 0x2, 0x1f, &(0x7f0000001c40)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$kcm(r6, &(0x7f0000004300)={0x0, 0x0, &(0x7f0000004140)=[{&(0x7f0000001c80)=""/139, 0x8b}, {&(0x7f0000001d40)=""/149, 0x95}, {&(0x7f0000001e00)=""/188, 0xbc}, {&(0x7f0000001ec0)=""/69, 0x45}, {&(0x7f0000001f40)=""/165, 0xa5}, {&(0x7f0000002000)=""/4096, 0x1000}, {&(0x7f0000003000)=""/42, 0x2a}, {&(0x7f0000003040)=""/4096, 0x1000}, {&(0x7f0000004040)=""/233, 0xe9}], 0x9, &(0x7f0000004200)=""/236, 0xec, 0xe00}, 0x40) mount(&(0x7f0000004340)='./file1/file0\x00', &(0x7f0000004380)='./file1\x00', &(0x7f00000043c0)='ceph\x00', 0x4860, &(0x7f0000004400)="2c8eb517dd302be26597065442d58f3f345c295b542b2b1df3046ae176") bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000004600)={r6, &(0x7f0000004440)="903685b47b9c4d5c1dffcefa6a92cd57ccdfaf1af0be272f1cb4a5b86ab9d1ef248a63f04f5d59c2cd6e6b7722f5ff866c5d353014f28baaa95bce06a787a3e085102126a0386ffd4e136d472f2cdfb7c658643d2792b7235e2ec8c782080850c20eb00014eab035d7d56c8ddd0d7fdc4c21602d480e4accea0867cc5b4172b46b8f028bd623c58544092396dbda704543cd7c93219ff7f4caf9d0c12fc32c65ddac48ba22321d2c7ef1152f0dd87ed22cb30eb2b24d381b3abaefc114ad4c08e329cfbce60e0549ca", &(0x7f0000004540)="38859653237c5c9685cf2e44e1eea64846e190b778f29b06c26c2f2b8a0800f9fc2019b05290fc5c82f612eb7f479918015eb3af93cc57f01db731e129275ce05910f66e436ef09a8fe7bf22f960eacec350a7f7e9e9a47cb163f467b6a29523346a4c61d65d2235c73095a53929d509538f640424133cfa3617b41a51aa7172460146433abbe604f2c92827fabd5d3134d36b4cecd0fd2549f3527615f9eb63dd9332021e4eff13ad6aa509db21ed98745d00cb36e547", 0x3}, 0x20) mkdir(&(0x7f0000004640)='./file1/file0\x00', 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000004680)={0x0, 0x0, 0xa6, 0x3, 0x4}, 0x2c) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000046c0)=0x7, 0x4) recvmsg$kcm(r6, &(0x7f00000058c0)={&(0x7f0000004700)=@alg, 0x80, &(0x7f0000005880)=[{&(0x7f0000004780)=""/4096, 0x1000}, {&(0x7f0000005780)=""/219, 0xdb}], 0x2, 0x0, 0x0, 0x100000001}, 0x40000000) r7 = gettid() r8 = perf_event_open(&(0x7f0000005900)={0x7, 0x70, 0x0, 0xfffffffffffffff7, 0x9, 0x4, 0x0, 0x7, 0x100, 0x8, 0x100000000, 0x8000, 0x8, 0x6, 0x0, 0x6, 0x10001, 0x9, 0x1f, 0x2, 0x1, 0x3, 0x1, 0x1f, 0x23, 0x1, 0xaa4, 0x5, 0x4, 0x200, 0x6, 0x9, 0xfffffffffffffffb, 0x3, 0x3, 0xff, 0x80000000, 0x0, 0x0, 0xffffffffffffff9d, 0x2, @perf_config_ext={0x7, 0x9}, 0x100, 0x8, 0x2, 0x6, 0x4, 0x6, 0xf71}, r7, 0x9, r6, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f00000059c0)={&(0x7f0000005980)='./file0\x00'}, 0x10) ioctl$sock_kcm_SIOCKCMATTACH(r5, 0x89e0, &(0x7f0000005a00)={r5, r0}) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000005c00)={r4, &(0x7f0000005a40)="313befc1e9ac680c4369983530ee783c4f018c38e134b4b0aebd06ede05f238850949c0f5d32ab19889f880e87e3a0fa5a43500affdcc508d56f3a4df6c159ca9cfa62124b79b4607d42738dc5e16d09ea2c6a2346fc2360feff08d9f464dfdebce2cb99d4ba8e5fc37edfba041f14e16a68192d7d8687404ee7318323520188c4e5d52e8c7ec40bd0823fb210e530c74ea842bd8bacbc48317b0b6ed12528ecd30e1af83b8049df791ff7affe91ab54", &(0x7f0000005b00)=""/243}, 0x18) mount(&(0x7f0000005c40)='./file1/file0\x00', &(0x7f0000005c80)='./file1\x00', &(0x7f0000005cc0)='btrfs\x00', 0x0, 0x0) recvmsg(r5, &(0x7f00000073c0)={&(0x7f0000005d00)=@sco, 0x80, &(0x7f0000007300)=[{&(0x7f0000005d80)=""/103, 0x67}, {&(0x7f0000005e00)=""/170, 0xaa}, {&(0x7f0000005ec0)=""/252, 0xfc}, {&(0x7f0000005fc0)=""/136, 0x88}, {&(0x7f0000006080)=""/125, 0x7d}, {&(0x7f0000006100)=""/4096, 0x1000}, {&(0x7f0000007100)=""/106, 0x6a}, {&(0x7f0000007180)=""/115, 0x73}, {&(0x7f0000007200)=""/240, 0xf0}], 0x9, 0x0, 0x0, 0x7}, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000007400)={r3, 0x10001}, 0xc) ioctl$PERF_EVENT_IOC_REFRESH(r8, 0x2402, 0xc4c) recvmsg$kcm(r6, &(0x7f0000008880)={&(0x7f0000007440)=@l2, 0x80, &(0x7f0000008800)=[{&(0x7f00000074c0)=""/231, 0xe7}, {&(0x7f00000075c0)=""/118, 0x76}, {&(0x7f0000007640)=""/4096, 0x1000}, {&(0x7f0000008640)=""/223, 0xdf}, {&(0x7f0000008740)}, {&(0x7f0000008780)=""/32, 0x20}, {&(0x7f00000087c0)=""/53, 0x35}], 0x7}, 0x10000) 2018/03/29 11:56:07 executing program 0: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000001a00)) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000001a40)={0xffffffffffffffff}) recvmsg$kcm(r1, &(0x7f0000000540)={&(0x7f00000000c0)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @broadcast}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000240)=""/65, 0x41}], 0x1, &(0x7f0000000440)=""/213, 0xd5}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x8983, &(0x7f0000000040)) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={r2}) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000080)={0xffffffffffffffff}) recvmsg(r4, &(0x7f0000001880)={&(0x7f0000001600)=@can={0x0, 0x0}, 0x80, &(0x7f00000016c0)=[{&(0x7f0000001780)=""/65, 0x41}], 0x1, &(0x7f0000001800)=""/76, 0x4c, 0xbd1}, 0x100) bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0xb, 0x8, &(0x7f0000000200)=@raw=[@exit={0x95}, @ldst={0x0, 0x3, 0x0, 0x9, 0x6, 0x0, 0xfffffffffffffff0}, @ldst={0x1, 0x3, 0x2, 0x4, 0x7, 0xfffffff6}, @alu={0x4, 0x1, 0xc, 0x9, 0x2, 0xfffffffe, 0xfffffffffffffff1}], &(0x7f00000002c0)='syzkaller\x00', 0x49, 0xd3, &(0x7f0000000580)=""/211, 0x41000, 0x6919a4149c7554e6, [], r5}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000019c0)={0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000000140)="0253eea6a53cc0eae389e9a13e5f2046d0633eebde90f446c1b1eabbd0adb42dfcefb37a3df93feb3d5e76dc353ecf23fe9c81afa5", 0x35}, {&(0x7f00000002c0)}, {&(0x7f0000000400)}, {&(0x7f0000001600)}], 0x4, &(0x7f0000001700)=ANY=[@ANYBLOB="68000000000000020701000100000000000000e9e23de47cb15819d813deb534cee2d9497c58eb856721207e6da5bd8a228407fb709d70f16bfa73f4924f12ecc429b6fd356748940b62ee5f5685ce027fe4e6c60a8f88cd1a5827d099f5849f09bd370000000000000000ff01000010000000000000000701000009000080"], 0x88}, 0x48800) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', r3}, 0x10) 2018/03/29 11:56:07 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x1e1, 0x100000000209e20, 0x8000000001, 0x5}, 0xfffffffffffffe20) r0 = getpid() r1 = perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0xfffffffffffffffc, 0x3, 0x8, 0x2, 0x0, 0x9, 0x10000, 0xc, 0x3d3, 0x80, 0x5, 0xfffffffffffffffc, 0x8, 0x3f, 0x5d, 0xbbb0, 0x20, 0x3, 0x8000, 0x100000000, 0x8, 0x9, 0x2, 0x4, 0x800, 0xf8, 0x3, 0x9, 0x1, 0x3, 0x8, 0x3, 0x7, 0x10001, 0xf16, 0x2, 0x0, 0x7fffffff, 0x4, @perf_bp={&(0x7f0000000780), 0x1}, 0x4080, 0x10001, 0xcc, 0x7, 0x3, 0xffff, 0x7fffffff}, 0xffffffffffffffff, 0xd, 0xffffffffffffff9c, 0x8) perf_event_open(&(0x7f0000000980)={0x4, 0x70, 0x6, 0x3f, 0x8e, 0x1, 0x0, 0x3, 0x404, 0x0, 0xbc2b, 0x40, 0x7, 0xffff, 0xffff, 0x9, 0x9de2, 0x9, 0x0, 0x3, 0x7f, 0xff, 0x40, 0x400, 0x9, 0x7fffffff, 0x80000000, 0x7, 0x8, 0x10001, 0x1f, 0x2778, 0x800, 0x8001, 0x101, 0x9, 0x8, 0x7ff, 0x0, 0x1000, 0x5, @perf_config_ext={0x3ff, 0xb69b}, 0x3040, 0x2, 0x2, 0x5, 0x7, 0x6, 0x7283ed73}, r0, 0xe, r1, 0x8) bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x0, 0x0, 0x7ffff9, 0x0, 0x20000003, 0x0}, 0x2c) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) r2 = gettid() r3 = perf_event_open(&(0x7f00000008c0)={0x7, 0x70, 0x1, 0x200, 0x3, 0xdbce, 0x0, 0x8, 0x1002, 0x1, 0xffffffffffffff00, 0x8, 0x1, 0xb3fa, 0x8, 0x0, 0x1, 0x2, 0x1000, 0x2, 0x401, 0x8, 0x3, 0x81, 0x0, 0x7, 0x2fc4, 0x882, 0x4, 0x8, 0x3, 0x81, 0x3, 0x7, 0x8857, 0x7, 0x5, 0x9, 0x0, 0x7, 0x1, @perf_config_ext={0x0, 0x80000000}, 0x400, 0x7f, 0x4, 0x7, 0x2, 0x7f, 0x200}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000840)={0x5, 0x70, 0xef, 0x2, 0x1000, 0xffffffff80000000, 0x0, 0x1a7800000000, 0x2000, 0x4, 0x5, 0x6814, 0x3a9, 0x5, 0x63b, 0x6, 0x8, 0x1000, 0x250420ee, 0x3, 0x0, 0x20, 0x6, 0x0, 0x4, 0x5, 0x4, 0x8, 0x3, 0x8, 0x52893dd5, 0x2, 0x2, 0x8, 0x44d, 0x1, 0x8, 0x6, 0x0, 0x100000000, 0x0, @perf_config_ext={0x9, 0x80}, 0x0, 0x0, 0x2b67, 0x6, 0x4b0, 0x81, 0x4}, r2, 0x5, r3, 0xb) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1003, 0x0) mount(&(0x7f00002b9ff8)='./file0\x00', &(0x7f0000cbeff8)='./file0\x00', &(0x7f00005f7ffa)='ramfs\x00', 0x80000, &(0x7f000002f000)) mount(&(0x7f0000000000)='.', &(0x7f0000000040)='.', &(0x7f0000000080)='cgroup\x00', 0x5010, &(0x7f00000000c0)) mount(&(0x7f0000377ff8)='.', &(0x7f0000000280)='.', &(0x7f0000000600)='nfs4\x00', 0x5010, &(0x7f0000000300)="2161893416a0c71070768c219eb114c3253c9f3baf4e9e8e9111c1a7fc6e266009fe27243deeaa22ca7ae9341f714300b5ee807e55d609036f2a3260475922bdfb2d2849f1c3b2ad3c051bd4f3751a177f77a92758c6d2b23fe7f1535b54e5846d11c135de8286066dec1b25f6e1378944ac5f7fce42d055821b5e19") perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xd68, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f0000014f88)={0x5, 0xfffffffffffffdc4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x46000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = getpid() perf_event_open(&(0x7f0000000680)={0x4, 0x70, 0x64, 0xffff, 0x1f, 0x4, 0x0, 0x1c3, 0x0, 0x1, 0x1, 0x9, 0x1ff, 0xfffffffffffffff8, 0x0, 0x0, 0x6, 0x7fffffff, 0x4, 0xffffffff, 0x80000001, 0xd0, 0x7, 0x1f, 0x0, 0x8, 0x9, 0x1ff, 0x8, 0x785, 0x4, 0xff, 0x2, 0x656, 0x5000000, 0x1, 0x460e3be0, 0x1, 0x0, 0x0, 0x7, @perf_bp={&(0x7f0000000640), 0x1}, 0x1000, 0xa, 0x7fff, 0x7, 0x3, 0x400, 0x9}, r5, 0xe, r4, 0x1) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', 0x0, 0x10}, 0x10) close(0xffffffffffffffff) bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)={&(0x7f0000000040)='./file0\x00', 0x0, 0x18}, 0x10) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000100)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0, 0x2e, &(0x7f0000000440), &(0x7f0000000140)=""/46, 0x4229}, 0x28) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000003480)={&(0x7f0000003300)=@can={0x0, 0x0}, 0x80, &(0x7f0000003400)=[{&(0x7f0000003380)=""/56, 0x38}, {&(0x7f00000033c0)=""/1, 0x1}], 0x2, &(0x7f0000003440)=""/33, 0x21, 0x1}, 0x40010000) bpf$PROG_LOAD(0x5, &(0x7f00000034c0)={0xe, 0x6, &(0x7f0000000940)=ANY=[@ANYBLOB="1800000002000000000000004ce700002555fdff00000000002371d07c9ba7f4a23372b0ad61000000000000009500000000"], &(0x7f00000007c0)='GPL\x00', 0x3, 0x2d, &(0x7f0000000800)=""/45, 0x40f00, 0x1, [], r6}, 0x48) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000740)={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x10) socketpair$inet(0x2, 0x80a, 0x81, &(0x7f0000000240)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={0xffffffffffffffff, &(0x7f0000000500)="ae30f1bca1b4d3f69f1aac81517d42ad5980bc63b5008616a1f4724b9f8c1e4ecd8de336f57dd727cdaab04f0b40f28612615ad08de414711d841a88db33fd33884b627074213a0c5de3be2bbaec9207d9865c47f240467849979b5ab5632376608fc4be41a274abb2dc07cabe344a18db51048e5b0cbda843905a4258cdee3e649eddf104ba78894dce09747dcfe6a8d6d6d985520eeef448b83a8bcb83074541ba7a20d6094aa206c01a0690e5b3bfa05d475eb382b0199031d22bb26cde9b1ca0055eef9f6c4993b71ba19ba0590bb5efdaddaa574c25356ca890d138fc9fe0e975b6d5a1a8251503cd0a91845f9d95", &(0x7f0000000480)="9bc7741ea5e524cc8c6f748a73153834428729c45bf4ad446d2dddf1978baf431d0ba35b5442b5afe22db8b003650320200af7e1368ef7cdfa79ca8b9d3564363a5d2a502970314f2264c883bc8d990afc003e5adb95b30edad245c4420c8126f1d33db75ff0230698eaff90055e0f", 0x2}, 0x20) socketpair(0x0, 0x80003, 0xffff, &(0x7f0000000380)={0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r7, 0x50, &(0x7f00000003c0)}, 0x10) 2018/03/29 11:56:07 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x0, 0x100000000209e20, 0x8000000001, 0x5}, 0xfffffffffffffe20) r0 = getpid() r1 = perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0xfffffffffffffffc, 0x3, 0x8, 0x2, 0x0, 0x9, 0x10000, 0xc, 0x3d3, 0x80, 0x5, 0xfffffffffffffffc, 0x8, 0x3f, 0x5d, 0xbbb0, 0x20, 0x3, 0x8000, 0x100000000, 0x8, 0x9, 0x2, 0x4, 0x800, 0xf8, 0x3, 0x9, 0x1, 0x3, 0x8, 0x3, 0x7, 0x10001, 0xf16, 0x2, 0x0, 0x7fffffff, 0x4, @perf_bp={&(0x7f0000000780), 0x1}, 0x4080, 0x10001, 0xcc, 0x7, 0x3, 0xffff, 0x7fffffff}, 0xffffffffffffffff, 0xd, 0xffffffffffffff9c, 0x8) perf_event_open(&(0x7f0000000980)={0x4, 0x70, 0x6, 0x3f, 0x8e, 0x1, 0x0, 0x3, 0x404, 0x0, 0xbc2b, 0x40, 0x7, 0xffff, 0xffff, 0x9, 0x9de2, 0x9, 0x0, 0x3, 0x7f, 0xff, 0x40, 0x400, 0x9, 0x7fffffff, 0x80000000, 0x7, 0x8, 0x10001, 0x1f, 0x2778, 0x800, 0x8001, 0x101, 0x9, 0x8, 0x7ff, 0x0, 0x1000, 0x5, @perf_config_ext={0x3ff, 0xb69b}, 0x3040, 0x2, 0x2, 0x5, 0x7, 0x6, 0x7283ed73}, r0, 0xe, r1, 0x8) bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x0, 0x0, 0x7ffff9, 0x0, 0x20000003, 0x0}, 0x2c) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) r2 = gettid() r3 = perf_event_open(&(0x7f00000008c0)={0x7, 0x70, 0x1, 0x200, 0x3, 0xdbce, 0x0, 0x8, 0x1002, 0x1, 0xffffffffffffff00, 0x8, 0x1, 0xb3fa, 0x8, 0x0, 0x1, 0x2, 0x1000, 0x2, 0x401, 0x8, 0x3, 0x81, 0x0, 0x7, 0x2fc4, 0x882, 0x4, 0x8, 0x3, 0x81, 0x3, 0x7, 0x8857, 0x7, 0x5, 0x9, 0x0, 0x7, 0x1, @perf_config_ext={0x0, 0x80000000}, 0x400, 0x7f, 0x4, 0x7, 0x2, 0x7f, 0x200}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000840)={0x5, 0x70, 0xef, 0x2, 0x1000, 0xffffffff80000000, 0x0, 0x1a7800000000, 0x2000, 0x4, 0x5, 0x6814, 0x3a9, 0x5, 0x63b, 0x6, 0x8, 0x1000, 0x250420ee, 0x3, 0x0, 0x20, 0x6, 0x0, 0x4, 0x5, 0x4, 0x8, 0x3, 0x8, 0x52893dd5, 0x2, 0x2, 0x8, 0x44d, 0x1, 0x8, 0x6, 0x0, 0x100000000, 0x0, @perf_config_ext={0x9, 0x80}, 0x0, 0x0, 0x2b67, 0x6, 0x4b0, 0x81, 0x4}, r2, 0x5, r3, 0xb) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1003, 0x0) mount(&(0x7f00002b9ff8)='./file0\x00', &(0x7f0000cbeff8)='./file0\x00', &(0x7f00005f7ffa)='ramfs\x00', 0x80000, &(0x7f000002f000)) mount(&(0x7f0000000000)='.', &(0x7f0000000040)='.', &(0x7f0000000080)='cgroup\x00', 0x5010, &(0x7f00000000c0)) mount(&(0x7f0000377ff8)='.', &(0x7f0000000280)='.', &(0x7f0000000600)='nfs4\x00', 0x5010, &(0x7f0000000300)="2161893416a0c71070768c219eb114c3253c9f3baf4e9e8e9111c1a7fc6e266009fe27243deeaa22ca7ae9341f714300b5ee807e55d609036f2a3260475922bdfb2d2849f1c3b2ad3c051bd4f3751a177f77a92758c6d2b23fe7f1535b54e5846d11c135de8286066dec1b25f6e1378944ac5f7fce42d055821b5e19") perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xd68, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f0000014f88)={0x5, 0xfffffffffffffdc4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x46000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = getpid() perf_event_open(&(0x7f0000000680)={0x4, 0x70, 0x64, 0xffff, 0x1f, 0x4, 0x0, 0x1c3, 0x0, 0x1, 0x1, 0x9, 0x1ff, 0xfffffffffffffff8, 0x0, 0x0, 0x6, 0x7fffffff, 0x0, 0xffffffff, 0x80000001, 0xd0, 0x7, 0x1f, 0x0, 0x8, 0x9, 0x1ff, 0x8, 0x785, 0x4, 0xff, 0x2, 0x656, 0x5000000, 0x1, 0x460e3be0, 0x1, 0x0, 0x0, 0x7, @perf_bp={&(0x7f0000000640), 0x1}, 0x1000, 0xa, 0x7fff, 0x7, 0x3, 0x400, 0x9}, r5, 0xe, r4, 0x1) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', 0x0, 0x10}, 0x10) close(0xffffffffffffffff) bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)={&(0x7f0000000040)='./file0\x00', 0x0, 0x18}, 0x10) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000100)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0, 0x2e, &(0x7f0000000440), &(0x7f0000000140)=""/46, 0x4229}, 0x28) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000003480)={&(0x7f0000003300)=@can={0x0, 0x0}, 0x80, &(0x7f0000003400)=[{&(0x7f0000003380)=""/56, 0x38}, {&(0x7f00000033c0)=""/1, 0x1}], 0x2, &(0x7f0000003440)=""/33, 0x21, 0x1}, 0x40010000) bpf$PROG_LOAD(0x5, &(0x7f00000034c0)={0xe, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="1800000002000000000000004ce700002555fdff00000000002371d07c9ba7f4a23372b0ad61000000000000009500000000000000"], &(0x7f00000007c0)='GPL\x00', 0x3, 0x2d, &(0x7f0000000800)=""/45, 0x40f00, 0x1, [], r6}, 0x48) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000740)={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x10) socketpair$inet(0x2, 0x80a, 0x81, &(0x7f0000000240)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={0xffffffffffffffff, &(0x7f0000000500)="ae30f1bca1b4d3f69f1aac81517d42ad5980bc63b5008616a1f4724b9f8c1e4ecd8de336f57dd727cdaab04f0b40f28612615ad08de414711d841a88db33fd33884b627074213a0c5de3be2bbaec9207d9865c47f240467849979b5ab5632376608fc4be41a274abb2dc07cabe344a18db51048e5b0cbda843905a4258cdee3e649eddf104ba78894dce09747dcfe6a8d6d6d985520eeef448b83a8bcb83074541ba7a20d6094aa206c01a0690e5b3bfa05d475eb382b0199031d22bb26cde9b1ca0055eef9f6c4993b71ba19ba0590bb5efdaddaa574c25356ca890d138fc9fe0e975b6d5a1a8251503cd0a91845f9d95", &(0x7f0000000480)="9bc7741ea5e524cc8c6f748a73153834428729c45bf4ad446d2dddf1978baf431d0ba35b5442b5afe22db8b003650320200af7e1368ef7cdfa79ca8b9d3564363a5d2a502970314f2264c883bc8d990afc003e5adb95b30edad245c4420c8126f1d33db75ff0230698eaff90055e0f", 0x2}, 0x20) socketpair(0x0, 0x80003, 0xffff, &(0x7f0000000380)={0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r7, 0x50, &(0x7f00000003c0)}, 0x10) 2018/03/29 11:56:07 executing program 3: r0 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x10}, 0x10) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000000c0)={0x0, 0x1000, 0x8}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000080)='./file0\x00', r1}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0x0, 0x8}, 0x10) mount(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='cpuset\x00', 0x40, &(0x7f0000000280)="8a4562cb6a7df38be32246afcaef1e1a3f933cb428242c55c117c0fbbd62cea0aab31f2665fb88267466eca314fc8cafd72cc24143121c0691236768fad66390bf9b55014c2bd49faa5388cbabd52e730eeb4ccc411bacd296e423d971043756cf2b35a4063f2a7465b44a60ef31ae437f6160ed2f63afa62c36a27c33e4779e7c0404e337abc025bb2e4b39cc265573c6ab1a3ff09c7ad6bb4631a4") mount(&(0x7f0000000340)='./file1\x00', &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='devtmpfs\x00', 0x40, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xb, 0x7f, 0x0, 0x1, 0x12, r1, 0x100000000}, 0x2c) mkdir(&(0x7f0000000440)='./file1\x00', 0x20) mount(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='iso9660\x00', 0x8, &(0x7f0000000540)="650fe6ccea2b17860de967406c566ec16fe5a7a4c064707e22906e9d3d2a70b4") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000005c0)={r2, 0x28, &(0x7f0000000580)={0x0, 0x0}}, 0x10) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={r3, 0x8, 0x10}, 0xc) mount(&(0x7f0000000640)='./file1\x00', &(0x7f0000000680)='./file1\x00', &(0x7f00000006c0)='pstore\x00', 0x1000000, &(0x7f0000000700)="f48afa3ab3cc319f917be52b04c388c229578537782bc5ffc32c7747b1d28999ad89f5fba460640a324385ac03cccef4553d641b91d79d014804a98e72796f8eb2e1a7056efeaa63404648df67079ae817420f248ccf9d01e7a027c600c71777fb9ebc97da60f3d1a287ef8bc00f1dc68c3b1f0c1836cde5b62be45dd58c3415cbb0f916fe3c04fc69911e2bec15c208d023bdb608fa727657c532bd5101a2a36b34c4eb65f855fea2d6f8a0a79b15ecef1a4c81a8f6f5ed57b09db2ab482413540416126718f2a33ed21346ded20b084a8dc10702ec279fc486b5c57c163d") socketpair(0x3, 0x2, 0x1f, &(0x7f0000001c40)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$kcm(r6, &(0x7f0000004300)={0x0, 0x0, &(0x7f0000004140)=[{&(0x7f0000001c80)=""/139, 0x8b}, {&(0x7f0000001d40)=""/149, 0x95}, {&(0x7f0000001e00)=""/188, 0xbc}, {&(0x7f0000001ec0)=""/69, 0x45}, {&(0x7f0000001f40)=""/165, 0xa5}, {&(0x7f0000002000)=""/4096, 0x1000}, {&(0x7f0000003000)=""/42, 0x2a}, {&(0x7f0000003040)=""/4096, 0x1000}, {&(0x7f0000004040)=""/233, 0xe9}], 0x9, &(0x7f0000004200)=""/236, 0xec, 0xe00}, 0x40) mount(&(0x7f0000004340)='./file1/file0\x00', &(0x7f0000004380)='./file1\x00', &(0x7f00000043c0)='ceph\x00', 0x4860, &(0x7f0000004400)="2c8eb517dd302be26597065442d58f3f345c295b542b2b1df3046ae176") bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000004600)={r6, &(0x7f0000004440)="903685b47b9c4d5c1dffcefa6a92cd57ccdfaf1af0be272f1cb4a5b86ab9d1ef248a63f04f5d59c2cd6e6b7722f5ff866c5d353014f28baaa95bce06a787a3e085102126a0386ffd4e136d472f2cdfb7c658643d2792b7235e2ec8c782080850c20eb00014eab035d7d56c8ddd0d7fdc4c21602d480e4accea0867cc5b4172b46b8f028bd623c58544092396dbda704543cd7c93219ff7f4caf9d0c12fc32c65ddac48ba22321d2c7ef1152f0dd87ed22cb30eb2b24d381b3abaefc114ad4c08e329cfbce60e0549ca", &(0x7f0000004540)="38859653237c5c9685cf2e44e1eea64846e190b778f29b06c26c2f2b8a0800f9fc2019b05290fc5c82f612eb7f479918015eb3af93cc57f01db731e129275ce05910f66e436ef09a8fe7bf22f960eacec350a7f7e9e9a47cb163f467b6a29523346a4c61d65d2235c73095a53929d509538f640424133cfa3617b41a51aa7172460146433abbe604f2c92827fabd5d3134d36b4cecd0fd2549f3527615f9eb63dd9332021e4eff13ad6aa509db21ed98745d00cb36e547", 0x3}, 0x20) mkdir(&(0x7f0000004640)='./file1/file0\x00', 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000004680)={0x0, 0x0, 0xa6, 0x3, 0x4}, 0x2c) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000046c0)=0x7, 0x4) recvmsg$kcm(r6, &(0x7f00000058c0)={&(0x7f0000004700)=@alg, 0x80, &(0x7f0000005880)=[{&(0x7f0000004780)=""/4096, 0x1000}, {&(0x7f0000005780)=""/219, 0xdb}], 0x2, 0x0, 0x0, 0x100000001}, 0x40000000) r7 = gettid() r8 = perf_event_open(&(0x7f0000005900)={0x7, 0x70, 0x0, 0xfffffffffffffff7, 0x9, 0x4, 0x0, 0x7, 0x100, 0x8, 0x100000000, 0x8000, 0x8, 0x6, 0x0, 0x6, 0x10001, 0x9, 0x1f, 0x2, 0x1, 0x3, 0x1, 0x1f, 0x23, 0x1, 0xaa4, 0x5, 0x4, 0x200, 0x6, 0x9, 0xfffffffffffffffb, 0x3, 0x3, 0xff, 0x80000000, 0x0, 0x0, 0xffffffffffffff9d, 0x2, @perf_config_ext={0x7, 0x9}, 0x100, 0x8, 0x2, 0x6, 0x4, 0x6, 0xf71}, r7, 0x9, r6, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f00000059c0)={&(0x7f0000005980)='./file0\x00'}, 0x10) ioctl$sock_kcm_SIOCKCMATTACH(r5, 0x89e0, &(0x7f0000005a00)={r5, r0}) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000005c00)={r4, &(0x7f0000005a40)="313befc1e9ac680c4369983530ee783c4f018c38e134b4b0aebd06ede05f238850949c0f5d32ab19889f880e87e3a0fa5a43500affdcc508d56f3a4df6c159ca9cfa62124b79b4607d42738dc5e16d09ea2c6a2346fc2360feff08d9f464dfdebce2cb99d4ba8e5fc37edfba041f14e16a68192d7d8687404ee7318323520188c4e5d52e8c7ec40bd0823fb210e530c74ea842bd8bacbc48317b0b6ed12528ecd30e1af83b8049df791ff7affe91ab54", &(0x7f0000005b00)=""/243}, 0x18) mount(&(0x7f0000005c40)='./file1/file0\x00', &(0x7f0000005c80)='./file1\x00', &(0x7f0000005cc0)='btrfs\x00', 0x0, 0x0) recvmsg(r5, &(0x7f00000073c0)={&(0x7f0000005d00)=@sco, 0x80, &(0x7f0000007300)=[{&(0x7f0000005d80)=""/103, 0x67}, {&(0x7f0000005e00)=""/170, 0xaa}, {&(0x7f0000005ec0)=""/252, 0xfc}, {&(0x7f0000005fc0)=""/136, 0x88}, {&(0x7f0000006080)=""/125, 0x7d}, {&(0x7f0000006100)=""/4096, 0x1000}, {&(0x7f0000007100)=""/106, 0x6a}, {&(0x7f0000007180)=""/115, 0x73}, {&(0x7f0000007200)=""/240, 0xf0}], 0x9, 0x0, 0x0, 0x7}, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000007400)={r3, 0x10001}, 0xc) ioctl$PERF_EVENT_IOC_REFRESH(r8, 0x2402, 0xc4c) recvmsg$kcm(r6, &(0x7f0000008880)={&(0x7f0000007440)=@l2, 0x80, &(0x7f0000008800)=[{&(0x7f00000074c0)=""/231, 0xe7}, {&(0x7f00000075c0)=""/118, 0x76}, {&(0x7f0000007640)=""/4096, 0x1000}, {&(0x7f0000008640)=""/223, 0xdf}, {&(0x7f0000008740)}, {&(0x7f0000008780)=""/32, 0x20}, {&(0x7f00000087c0)=""/53, 0x35}], 0x7}, 0x10000) 2018/03/29 11:56:07 executing program 3: r0 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x10}, 0x10) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000000c0)={0x0, 0x1000, 0x8}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000080)='./file0\x00', r1}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0x0, 0x8}, 0x10) mount(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='cpuset\x00', 0x40, &(0x7f0000000280)="8a4562cb6a7df38be32246afcaef1e1a3f933cb428242c55c117c0fbbd62cea0aab31f2665fb88267466eca314fc8cafd72cc24143121c0691236768fad66390bf9b55014c2bd49faa5388cbabd52e730eeb4ccc411bacd296e423d971043756cf2b35a4063f2a7465b44a60ef31ae437f6160ed2f63afa62c36a27c33e4779e7c0404e337abc025bb2e4b39cc265573c6ab1a3ff09c7ad6bb4631a4") mount(&(0x7f0000000340)='./file1\x00', &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='devtmpfs\x00', 0x40, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xb, 0x7f, 0x0, 0x1, 0x12, r1, 0x100000000}, 0x2c) mkdir(&(0x7f0000000440)='./file1\x00', 0x20) mount(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='iso9660\x00', 0x8, &(0x7f0000000540)="650fe6ccea2b17860de967406c566ec16fe5a7a4c064707e22906e9d3d2a70b4") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000005c0)={r2, 0x28, &(0x7f0000000580)={0x0, 0x0}}, 0x10) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={r3, 0x8, 0x10}, 0xc) mount(&(0x7f0000000640)='./file1\x00', &(0x7f0000000680)='./file1\x00', &(0x7f00000006c0)='pstore\x00', 0x1000000, &(0x7f0000000700)="f48afa3ab3cc319f917be52b04c388c229578537782bc5ffc32c7747b1d28999ad89f5fba460640a324385ac03cccef4553d641b91d79d014804a98e72796f8eb2e1a7056efeaa63404648df67079ae817420f248ccf9d01e7a027c600c71777fb9ebc97da60f3d1a287ef8bc00f1dc68c3b1f0c1836cde5b62be45dd58c3415cbb0f916fe3c04fc69911e2bec15c208d023bdb608fa727657c532bd5101a2a36b34c4eb65f855fea2d6f8a0a79b15ecef1a4c81a8f6f5ed57b09db2ab482413540416126718f2a33ed21346ded20b084a8dc10702ec279fc486b5c57c163d") socketpair(0x3, 0x2, 0x1f, &(0x7f0000001c40)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$kcm(r6, &(0x7f0000004300)={0x0, 0x0, &(0x7f0000004140)=[{&(0x7f0000001c80)=""/139, 0x8b}, {&(0x7f0000001d40)=""/149, 0x95}, {&(0x7f0000001e00)=""/188, 0xbc}, {&(0x7f0000001ec0)=""/69, 0x45}, {&(0x7f0000001f40)=""/165, 0xa5}, {&(0x7f0000002000)=""/4096, 0x1000}, {&(0x7f0000003000)=""/42, 0x2a}, {&(0x7f0000003040)=""/4096, 0x1000}, {&(0x7f0000004040)=""/233, 0xe9}], 0x9, &(0x7f0000004200)=""/236, 0xec, 0xe00}, 0x40) mount(&(0x7f0000004340)='./file1/file0\x00', &(0x7f0000004380)='./file1\x00', &(0x7f00000043c0)='ceph\x00', 0x4860, &(0x7f0000004400)="2c8eb517dd302be26597065442d58f3f345c295b542b2b1df3046ae176") bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000004600)={r6, &(0x7f0000004440)="903685b47b9c4d5c1dffcefa6a92cd57ccdfaf1af0be272f1cb4a5b86ab9d1ef248a63f04f5d59c2cd6e6b7722f5ff866c5d353014f28baaa95bce06a787a3e085102126a0386ffd4e136d472f2cdfb7c658643d2792b7235e2ec8c782080850c20eb00014eab035d7d56c8ddd0d7fdc4c21602d480e4accea0867cc5b4172b46b8f028bd623c58544092396dbda704543cd7c93219ff7f4caf9d0c12fc32c65ddac48ba22321d2c7ef1152f0dd87ed22cb30eb2b24d381b3abaefc114ad4c08e329cfbce60e0549ca", &(0x7f0000004540)="38859653237c5c9685cf2e44e1eea64846e190b778f29b06c26c2f2b8a0800f9fc2019b05290fc5c82f612eb7f479918015eb3af93cc57f01db731e129275ce05910f66e436ef09a8fe7bf22f960eacec350a7f7e9e9a47cb163f467b6a29523346a4c61d65d2235c73095a53929d509538f640424133cfa3617b41a51aa7172460146433abbe604f2c92827fabd5d3134d36b4cecd0fd2549f3527615f9eb63dd9332021e4eff13ad6aa509db21ed98745d00cb36e547", 0x3}, 0x20) mkdir(&(0x7f0000004640)='./file1/file0\x00', 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000004680)={0x0, 0x0, 0xa6, 0x3, 0x4}, 0x2c) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000046c0)=0x7, 0x4) recvmsg$kcm(r6, &(0x7f00000058c0)={&(0x7f0000004700)=@alg, 0x80, &(0x7f0000005880)=[{&(0x7f0000004780)=""/4096, 0x1000}, {&(0x7f0000005780)=""/219, 0xdb}], 0x2, 0x0, 0x0, 0x100000001}, 0x40000000) r7 = gettid() r8 = perf_event_open(&(0x7f0000005900)={0x7, 0x70, 0x0, 0xfffffffffffffff7, 0x9, 0x4, 0x0, 0x7, 0x100, 0x8, 0x100000000, 0x8000, 0x8, 0x6, 0x0, 0x6, 0x10001, 0x9, 0x1f, 0x2, 0x1, 0x3, 0x1, 0x1f, 0x23, 0x1, 0xaa4, 0x5, 0x4, 0x200, 0x6, 0x9, 0xfffffffffffffffb, 0x3, 0x3, 0xff, 0x80000000, 0x0, 0x0, 0xffffffffffffff9d, 0x2, @perf_config_ext={0x7, 0x9}, 0x100, 0x8, 0x2, 0x6, 0x4, 0x6, 0xf71}, r7, 0x9, r6, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f00000059c0)={&(0x7f0000005980)='./file0\x00'}, 0x10) ioctl$sock_kcm_SIOCKCMATTACH(r5, 0x89e0, &(0x7f0000005a00)={r5, r0}) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000005c00)={r4, &(0x7f0000005a40)="313befc1e9ac680c4369983530ee783c4f018c38e134b4b0aebd06ede05f238850949c0f5d32ab19889f880e87e3a0fa5a43500affdcc508d56f3a4df6c159ca9cfa62124b79b4607d42738dc5e16d09ea2c6a2346fc2360feff08d9f464dfdebce2cb99d4ba8e5fc37edfba041f14e16a68192d7d8687404ee7318323520188c4e5d52e8c7ec40bd0823fb210e530c74ea842bd8bacbc48317b0b6ed12528ecd30e1af83b8049df791ff7affe91ab54", &(0x7f0000005b00)=""/243}, 0x18) mount(&(0x7f0000005c40)='./file1/file0\x00', &(0x7f0000005c80)='./file1\x00', &(0x7f0000005cc0)='btrfs\x00', 0x0, 0x0) recvmsg(r5, &(0x7f00000073c0)={&(0x7f0000005d00)=@sco, 0x80, &(0x7f0000007300)=[{&(0x7f0000005d80)=""/103, 0x67}, {&(0x7f0000005e00)=""/170, 0xaa}, {&(0x7f0000005ec0)=""/252, 0xfc}, {&(0x7f0000005fc0)=""/136, 0x88}, {&(0x7f0000006080)=""/125, 0x7d}, {&(0x7f0000006100)=""/4096, 0x1000}, {&(0x7f0000007100)=""/106, 0x6a}, {&(0x7f0000007180)=""/115, 0x73}, {&(0x7f0000007200)=""/240, 0xf0}], 0x9, 0x0, 0x0, 0x7}, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000007400)={r3, 0x10001}, 0xc) ioctl$PERF_EVENT_IOC_REFRESH(r8, 0x2402, 0xc4c) recvmsg$kcm(r6, &(0x7f0000008880)={&(0x7f0000007440)=@l2, 0x80, &(0x7f0000008800)=[{&(0x7f00000074c0)=""/231, 0xe7}, {&(0x7f00000075c0)=""/118, 0x76}, {&(0x7f0000007640)=""/4096, 0x1000}, {&(0x7f0000008640)=""/223, 0xdf}, {&(0x7f0000008740)}, {&(0x7f0000008780)=""/32, 0x20}, {&(0x7f00000087c0)=""/53, 0x35}], 0x7}, 0x10000) [ 813.751322] IPVS: ftp: loaded support on port[0] = 21 [ 813.778928] IPVS: ftp: loaded support on port[0] = 21 [ 813.794907] FAULT_INJECTION: forcing a failure. [ 813.794907] name failslab, interval 1, probability 0, space 0, times 0 [ 813.806218] CPU: 0 PID: 26753 Comm: syz-executor4 Not tainted 4.16.0-rc6+ #40 [ 813.813493] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 813.818586] IPVS: ftp: loaded support on port[0] = 21 [ 813.822836] Call Trace: [ 813.822859] dump_stack+0x194/0x24d [ 813.822876] ? arch_local_irq_restore+0x53/0x53 [ 813.838924] should_fail+0x8c0/0xa40 [ 813.842647] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 813.847756] ? __lock_is_held+0xb6/0x140 [ 813.851824] ? mark_held_locks+0xaf/0x100 [ 813.855969] ? __raw_spin_lock_init+0x1c/0x100 [ 813.860650] ? find_held_lock+0x35/0x1d0 [ 813.864718] ? __lock_is_held+0xb6/0x140 [ 813.868798] ? check_same_owner+0x320/0x320 [ 813.873111] ? d_alloc+0x269/0x340 [ 813.876635] ? rcu_note_context_switch+0x710/0x710 [ 813.881541] ? lock_release+0xa40/0xa40 [ 813.885500] should_failslab+0xec/0x120 [ 813.889450] kmem_cache_alloc+0x47/0x760 [ 813.893492] ? d_drop+0x51/0x60 [ 813.896749] ? rpc_i_callback+0x30/0x30 [ 813.900702] rpc_alloc_inode+0x1a/0x20 [ 813.904566] alloc_inode+0x65/0x180 [ 813.908175] new_inode_pseudo+0x69/0x190 [ 813.912212] ? prune_icache_sb+0x1a0/0x1a0 [ 813.916422] ? do_raw_spin_trylock+0x190/0x190 [ 813.920980] ? d_add+0xa70/0xa70 [ 813.924339] new_inode+0x1c/0x40 [ 813.927684] rpc_get_inode+0x20/0x1e0 [ 813.931463] __rpc_create_common+0x5d/0x1d0 [ 813.935768] rpc_populate.constprop.15+0x1ad/0x340 [ 813.940682] rpc_fill_super+0x379/0xae0 [ 813.944636] ? cap_capable+0x1b5/0x230 [ 813.948497] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 813.953665] ? security_capable+0x8e/0xc0 [ 813.957790] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 813.962953] ? ns_capable_common+0xcf/0x160 [ 813.967262] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 813.972426] mount_ns+0xc4/0x190 [ 813.975775] rpc_mount+0x9e/0xd0 [ 813.979119] mount_fs+0x66/0x2d0 [ 813.982468] vfs_kern_mount.part.26+0xc6/0x4a0 [ 813.987029] ? may_umount+0xa0/0xa0 [ 813.990630] ? _raw_read_unlock+0x22/0x30 [ 813.994753] ? __get_fs_type+0x8a/0xc0 [ 813.998623] do_mount+0xea4/0x2bb0 [ 814.002148] ? copy_mount_string+0x40/0x40 [ 814.006362] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 814.011359] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 814.016096] ? retint_kernel+0x10/0x10 [ 814.019971] ? copy_mount_options+0x183/0x2e0 [ 814.024443] ? copy_mount_options+0x1f7/0x2e0 [ 814.028921] SyS_mount+0xab/0x120 [ 814.032351] ? copy_mnt_ns+0xb30/0xb30 [ 814.036216] do_syscall_64+0x281/0x940 [ 814.040079] ? __do_page_fault+0xc90/0xc90 [ 814.044287] ? _raw_spin_unlock_irq+0x27/0x70 [ 814.048760] ? finish_task_switch+0x1c1/0x7e0 [ 814.053237] ? syscall_return_slowpath+0x550/0x550 [ 814.058143] ? syscall_return_slowpath+0x2ac/0x550 [ 814.063051] ? prepare_exit_to_usermode+0x350/0x350 [ 814.068042] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 814.073390] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 814.078215] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 814.083389] RIP: 0033:0x4548b9 [ 814.086551] RSP: 002b:00007fdacf69dc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 814.094251] RAX: ffffffffffffffda RBX: 00007fdacf69e6d4 RCX: 00000000004548b9 [ 814.101494] RDX: 00000000200002c0 RSI: 0000000020000140 RDI: 0000000020000300 [ 814.108746] RBP: 000000000072bea0 R08: 0000000020000200 R09: 0000000000000000 [ 814.115991] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 814.123246] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000030 [ 814.130698] net/sunrpc/rpc_pipe.c: __rpc_create_common failed to allocate inode for dentry statd [ 814.143966] net/sunrpc/rpc_pipe.c: rpc_populate failed to populate directory / 2018/03/29 11:56:09 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x3, &(0x7f0000002000)=@framed={{0x18}, [], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000680)={0xffffffffffffffff, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x7}, 0x28) recvmsg(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x8, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000100)=r0, 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) recvmsg(r2, &(0x7f00000011c0)={&(0x7f0000000b40)=@can, 0x80, &(0x7f0000001100)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f0000000c80)=""/169, 0xa9}, {&(0x7f0000000d40)=""/229, 0xe5}, {&(0x7f0000000e40)=""/128, 0x80}, {&(0x7f0000000ec0)=""/48, 0x30}, {&(0x7f0000000f00)=""/137, 0x89}, {&(0x7f0000006000)=""/4096, 0x1000}, {&(0x7f0000007000)=""/4096, 0x1000}, {&(0x7f0000001080)=""/127, 0x7f}, {&(0x7f0000008000)=""/4096, 0x1000}], 0xa, 0x0, 0x0, 0x1}, 0x2020) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001200)={0x7, 0x4, 0x0, 0x4, 0x8, 0xffffffffffffffff, 0x9}, 0x2c) socketpair(0x3, 0x80e, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r3, &(0x7f0000000200)={&(0x7f0000000fc0)=@pppol2tp={0x18, 0x1, {0x0, r2, {0x2, 0x4e20, @broadcast=0xffffffff}, 0x1, 0x3, 0x0, 0x2}}, 0x80, &(0x7f0000001580)=[{&(0x7f0000001240)="95c4dcff0f017b3c1979888e50f6c20a37b4edaffb28a3b609d24a8180434ab2fac426d3e4fc87e18267002be3cd56b11d69c4db739bf6a9c91af67ee87be1ea522993a368bdfc0df55539a60ef5515b4f03f3dbddae65cd66a90f030118870b473f156cb9a18624103000608c63f84b09ea89bfb8d8e7705c6ef456ef28adec5e566632ddd63098", 0x88}, {&(0x7f0000001380)="5745869bf3b6f562576761d821af2ad55c2f81345c810d6dbd43facd33c5107488aa7f04c5ab1302b820cd31405e9f657776a0d48e2225f39aabc3de0b30dc7422503b448ad89c23ebaee24ae9696e4e58eccae5febf47fff53dc1f03d869303acdef233746263c5c567e84edb166010fd23f56d6e84406bced5a00b5016b0c700fd76218ecf5da3527552a683eb87aa4b246cd74bcbeff8dedec74332e0214e4dc64cb7ac24c4447843caa7550375ef8e1f74a78c40a617e913a25e4837d24fb09e93eaa2", 0xc5}, {&(0x7f0000001480)="8247f46d4324760570d5078149dc5b38f7d1c592564148ecc6262e91c29cd4344e423ff476882993a2844af9a7c306a15e659a4cb9230b5139842c87ad8fa95c202146730fa610b141dfe4c7b771b46e4db879d2b92a01cb8642100d80a1d4658fd0df05c06c8615960a92b690c728e2603373657a9a46b2f200f2895198694d470ab95b6eb7a76ccee67c9219b4afa289d70c87cf22c733e00700f345136d59bcbd89ce7e110746f91e7a7661b8eb0afe54e3cb1c712441dd9a6ffb59a2eb58e5f5eabd4bec428fe27a403bb0d19125e473abdfea87a0c89108e3c876438a7c3f84bebad6cf858f26d2083efd60", 0xee}], 0x3, &(0x7f000000a000)=[{0x88, 0x112, 0xc2, "6671b4b66ac2fb4e14cee671813dc3834802e601529feb049ebb70880567948953018cfd53d7b1c9be27b1084adfba62040c7f889cfbc15407d93133259d9d5052bf6648a69218702e35278939ad399dc3ebed233c1792c7c1204353c8fe75ea0398f4aaf830834bc93873c119dddc539c"}, {0xe8, 0x6f180cc1befb202, 0x9, "4577f77fd3b3acd92c96feff8b0409afeae1c16fa3d367241c9679e5105141c7205d47ce27a418c10fbe7f601c3142e7b7b3a67322c9d345e0baf4315e13dc771a962ff445015c98a70b319d46ba59155d1cf07827804ea1ca86db74f3029bd60f6f365d955ec12be30102e59b4b3940152988ef09443df596bad9525f697fad61507e856c6acb744cfb034863943e811bd378843ccbd95f8221a444f4c323a391f5788559f34ac02e6e18065b87e8c962353623250694e5b4bf9bc1b00fadf2875995067ff6c18590c207f9a83f06665f5b5af77b4e"}, {0xa0, 0x10f, 0x5, "07c5972c79a30903d5d93f57c962c0351628551f6a3fbac8e18984ad9b8caeb403f1d588fa0b9955ce44d018cbcc06ad98b588dd45fd0ccd6b8d1965e70693ec76dd521aa2693829ef54059dc3191f2f4eca64c63f2f901ead2d6c54f0119212ebb77e956117d9130d3adff30a5598567fd540cf0a8f9f8c469ad15f209ad8ef161006831b39e4ddf2fcd748a8629e33"}], 0x210, 0x40}, 0x40) close(r0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)) recvmsg(r1, &(0x7f00000267c0)={&(0x7f00000251c0)=@can, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) [ 815.065937] IPVS: ftp: loaded support on port[0] = 21 2018/03/29 11:56:09 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x0, 0x100000000209e20, 0x8000000001, 0x5}, 0xfffffffffffffe20) r0 = getpid() r1 = perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0xfffffffffffffffc, 0x3, 0x8, 0x2, 0x0, 0x9, 0x10000, 0xc, 0x3d3, 0x80, 0x5, 0xfffffffffffffffc, 0x8, 0x3f, 0x5d, 0xbbb0, 0x20, 0x3, 0x8000, 0x100000000, 0x8, 0x9, 0x2, 0x4, 0x800, 0xf8, 0x3, 0x9, 0x1, 0x3, 0x8, 0x3, 0x7, 0x10001, 0xf16, 0x2, 0x0, 0x7fffffff, 0x4, @perf_bp={&(0x7f0000000780), 0x1}, 0x4080, 0x10001, 0xcc, 0x7, 0x3, 0xffff, 0x7fffffff}, 0xffffffffffffffff, 0xd, 0xffffffffffffff9c, 0x8) perf_event_open(&(0x7f0000000980)={0x4, 0x70, 0x6, 0x3f, 0x8e, 0x1, 0x0, 0x3, 0x404, 0x0, 0xbc2b, 0x40, 0x7, 0xffff, 0xffff, 0x9, 0x9de2, 0x9, 0x0, 0x3, 0x7f, 0xff, 0x40, 0x400, 0x9, 0x7fffffff, 0x80000000, 0x7, 0x8, 0x10001, 0x1f, 0x2778, 0x800, 0x8001, 0x101, 0x9, 0x8, 0x7ff, 0x0, 0x1000, 0x5, @perf_config_ext={0x3ff, 0xb69b}, 0x3040, 0x2, 0x2, 0x5, 0x7, 0x6, 0x7283ed73}, r0, 0xe, r1, 0x8) bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x0, 0x0, 0x7ffff9, 0x0, 0x20000003, 0x0}, 0x2c) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) r2 = gettid() r3 = perf_event_open(&(0x7f00000008c0)={0x7, 0x70, 0x1, 0x200, 0x3, 0xdbce, 0x0, 0x8, 0x1002, 0x1, 0xffffffffffffff00, 0x8, 0x1, 0xb3fa, 0x8, 0x0, 0x1, 0x2, 0x1000, 0x2, 0x401, 0x8, 0x3, 0x81, 0x0, 0x7, 0x2fc4, 0x882, 0x4, 0x8, 0x3, 0x81, 0x3, 0x7, 0x8857, 0x7, 0x5, 0x9, 0x0, 0x7, 0x1, @perf_config_ext={0x0, 0x80000000}, 0x400, 0x7f, 0x4, 0x7, 0x2, 0x7f, 0x200}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000840)={0x5, 0x70, 0xef, 0x2, 0x1000, 0xffffffff80000000, 0x0, 0x1a7800000000, 0x2000, 0x4, 0x5, 0x6814, 0x3a9, 0x5, 0x63b, 0x6, 0x8, 0x1000, 0x250420ee, 0x3, 0x0, 0x20, 0x6, 0x0, 0x4, 0x5, 0x4, 0x8, 0x3, 0x8, 0x52893dd5, 0x2, 0x2, 0x8, 0x44d, 0x1, 0x8, 0x6, 0x0, 0x100000000, 0x0, @perf_config_ext={0x9, 0x80}, 0x0, 0x0, 0x2b67, 0x6, 0x4b0, 0x81, 0x4}, r2, 0x5, r3, 0xb) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1003, 0x0) mount(&(0x7f00002b9ff8)='./file0\x00', &(0x7f0000cbeff8)='./file0\x00', &(0x7f00005f7ffa)='ramfs\x00', 0x80000, &(0x7f000002f000)) mount(&(0x7f0000000000)='.', &(0x7f0000000040)='.', &(0x7f0000000080)='cgroup\x00', 0x5010, &(0x7f00000000c0)) mount(&(0x7f0000377ff8)='.', &(0x7f0000000280)='.', &(0x7f0000000600)='nfs4\x00', 0x5010, &(0x7f0000000300)="2161893416a0c71070768c219eb114c3253c9f3baf4e9e8e9111c1a7fc6e266009fe27243deeaa22ca7ae9341f714300b5ee807e55d609036f2a3260475922bdfb2d2849f1c3b2ad3c051bd4f3751a177f77a92758c6d2b23fe7f1535b54e5846d11c135de8286066dec1b25f6e1378944ac5f7fce42d055821b5e19") perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xd68, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f0000014f88)={0x5, 0xfffffffffffffdc4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x46000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = getpid() perf_event_open(&(0x7f0000000680)={0x4, 0x70, 0x64, 0xffff, 0x1f, 0x4, 0x0, 0x1c3, 0x0, 0x1, 0x1, 0x9, 0x1ff, 0xfffffffffffffff8, 0x0, 0x0, 0x6, 0x7fffffff, 0x0, 0xffffffff, 0x80000001, 0xd0, 0x7, 0x1f, 0x0, 0x8, 0x9, 0x1ff, 0x8, 0x785, 0x4, 0xff, 0x2, 0x656, 0x5000000, 0x1, 0x460e3be0, 0x1, 0x0, 0x0, 0x7, @perf_bp={&(0x7f0000000640), 0x1}, 0x1000, 0xa, 0x7fff, 0x7, 0x3, 0x400, 0x9}, r5, 0xe, r4, 0x1) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', 0x0, 0x10}, 0x10) close(0xffffffffffffffff) bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)={&(0x7f0000000040)='./file0\x00', 0x0, 0x18}, 0x10) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000100)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0, 0x2e, &(0x7f0000000440), &(0x7f0000000140)=""/46, 0x4229}, 0x28) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000003480)={&(0x7f0000003300)=@can={0x0, 0x0}, 0x80, &(0x7f0000003400)=[{&(0x7f0000003380)=""/56, 0x38}, {&(0x7f00000033c0)=""/1, 0x1}], 0x2, &(0x7f0000003440)=""/33, 0x21, 0x1}, 0x40010000) bpf$PROG_LOAD(0x5, &(0x7f00000034c0)={0xe, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="1800000002000000000000004ce700002555fdff00000000002371d07c9ba7f4a23372b0ad61000000000000009500000000000000"], &(0x7f00000007c0)='GPL\x00', 0x3, 0x2d, &(0x7f0000000800)=""/45, 0x40f00, 0x1, [], r6}, 0x48) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000740)={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x10) socketpair$inet(0x2, 0x80a, 0x81, &(0x7f0000000240)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={0xffffffffffffffff, &(0x7f0000000500)="ae30f1bca1b4d3f69f1aac81517d42ad5980bc63b5008616a1f4724b9f8c1e4ecd8de336f57dd727cdaab04f0b40f28612615ad08de414711d841a88db33fd33884b627074213a0c5de3be2bbaec9207d9865c47f240467849979b5ab5632376608fc4be41a274abb2dc07cabe344a18db51048e5b0cbda843905a4258cdee3e649eddf104ba78894dce09747dcfe6a8d6d6d985520eeef448b83a8bcb83074541ba7a20d6094aa206c01a0690e5b3bfa05d475eb382b0199031d22bb26cde9b1ca0055eef9f6c4993b71ba19ba0590bb5efdaddaa574c25356ca890d138fc9fe0e975b6d5a1a8251503cd0a91845f9d95", &(0x7f0000000480)="9bc7741ea5e524cc8c6f748a73153834428729c45bf4ad446d2dddf1978baf431d0ba35b5442b5afe22db8b003650320200af7e1368ef7cdfa79ca8b9d3564363a5d2a502970314f2264c883bc8d990afc003e5adb95b30edad245c4420c8126f1d33db75ff0230698eaff90055e0f", 0x2}, 0x20) socketpair(0x0, 0x80003, 0xffff, &(0x7f0000000380)={0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r7, 0x50, &(0x7f00000003c0)}, 0x10) 2018/03/29 11:56:09 executing program 4 (fault-call:8 fault-nth:49): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x3, &(0x7f0000002000)=@framed={{0x18}, [], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000680)={0xffffffffffffffff, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x7}, 0x28) recvmsg(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000001c0)) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000100)=r0, 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) recvmsg(r3, &(0x7f00000011c0)={&(0x7f0000000b40)=@can, 0x80, &(0x7f0000001100)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f0000000c80)=""/169, 0xa9}, {&(0x7f0000000d40)=""/229, 0xe5}, {&(0x7f0000000e40)=""/128, 0x80}, {&(0x7f0000000ec0)=""/48, 0x30}, {&(0x7f0000000f00)=""/137, 0x89}, {&(0x7f0000006000)=""/4096, 0x1000}, {&(0x7f0000007000)=""/4096, 0x1000}, {&(0x7f0000001080)=""/127, 0x7f}, {&(0x7f0000008000)=""/4096, 0x1000}], 0xa, 0x0, 0x0, 0x1}, 0x2020) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001200)={0x7, 0x4, 0x0, 0x4, 0x8, 0xffffffffffffffff, 0x9}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x1000000007, 0xcf2e, 0x7e, 0x20, 0x15, r1, 0x4}, 0x2c) socketpair(0x3, 0x80e, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r4, &(0x7f0000000200)={&(0x7f0000000fc0)=@pppol2tp={0x18, 0x1, {0x0, r3, {0x2, 0x4e20, @broadcast=0xffffffff}, 0x1, 0x3, 0x0, 0x2}}, 0x80, &(0x7f0000001580)=[{&(0x7f0000001240)="95c4dcff0f017b3c1979888e50f6c20a37b4edaffb28a3b609d24a8180434ab2fac426d3e4fc87e18267002be3cd56b11d69c4db739bf6a9c91af67ee87be1ea522993a368bdfc0df55539a60ef5515b4f03f3dbddae65cd66a90f030118870b473f156cb9a18624103000608c63f84b09ea89bfb8d8e7705c6ef456ef28adec5e566632ddd63098", 0x88}, {&(0x7f0000001380)="5745869bf3b6f562576761d821af2ad55c2f81345c810d6dbd43facd33c5107488aa7f04c5ab1302b820cd31405e9f657776a0d48e2225f39aabc3de0b30dc7422503b448ad89c23ebaee24ae9696e4e58eccae5febf47fff53dc1f03d869303acdef233746263c5c567e84edb166010fd23f56d6e84406bced5a00b5016b0c700fd76218ecf5da3527552a683eb87aa4b246cd74bcbeff8dedec74332e0214e4dc64cb7ac24c4447843caa7550375ef8e1f74a78c40a617e913a25e4837d24fb09e93eaa2", 0xc5}, {&(0x7f0000001480)="8247f46d4324760570d5078149dc5b38f7d1c592564148ecc6262e91c29cd4344e423ff476882993a2844af9a7c306a15e659a4cb9230b5139842c87ad8fa95c202146730fa610b141dfe4c7b771b46e4db879d2b92a01cb8642100d80a1d4658fd0df05c06c8615960a92b690c728e2603373657a9a46b2f200f2895198694d470ab95b6eb7a76ccee67c9219b4afa289d70c87cf22c733e00700f345136d59bcbd89ce7e110746f91e7a7661b8eb0afe54e3cb1c712441dd9a6ffb59a2eb58e5f5eabd4bec428fe27a403bb0d19125e473abdfea87a0c89108e3c876438a7c3f84bebad6cf858f26d2083efd60", 0xee}], 0x3, &(0x7f000000a000)=[{0x88, 0x112, 0xc2, "6671b4b66ac2fb4e14cee671813dc3834802e601529feb049ebb70880567948953018cfd53d7b1c9be27b1084adfba62040c7f889cfbc15407d93133259d9d5052bf6648a69218702e35278939ad399dc3ebed233c1792c7c1204353c8fe75ea0398f4aaf830834bc93873c119dddc539c"}, {0xe8, 0x6f180cc1befb202, 0x9, "4577f77fd3b3acd92c96feff8b0409afeae1c16fa3d367241c9679e5105141c7205d47ce27a418c10fbe7f601c3142e7b7b3a67322c9d345e0baf4315e13dc771a962ff445015c98a70b319d46ba59155d1cf07827804ea1ca86db74f3029bd60f6f365d955ec12be30102e59b4b3940152988ef09443df596bad9525f697fad61507e856c6acb744cfb034863943e811bd378843ccbd95f8221a444f4c323a391f5788559f34ac02e6e18065b87e8c962353623250694e5b4bf9bc1b00fadf2875995067ff6c18590c207f9a83f06665f5b5af77b4e"}, {0xa0, 0x10f, 0x5, "07c5972c79a30903d5d93f57c962c0351628551f6a3fbac8e18984ad9b8caeb403f1d588fa0b9955ce44d018cbcc06ad98b588dd45fd0ccd6b8d1965e70693ec76dd521aa2693829ef54059dc3191f2f4eca64c63f2f901ead2d6c54f0119212ebb77e956117d9130d3adff30a5598567fd540cf0a8f9f8c469ad15f209ad8ef161006831b39e4ddf2fcd748a8629e33"}], 0x210, 0x40}, 0x40) close(r0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b53596090ebcc07d8584f358be88fafe") recvmsg(r2, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) recvmsg$kcm(r4, &(0x7f0000001a00)={0x0, 0x0, &(0x7f00000018c0)=[{&(0x7f0000001600)=""/173, 0xad}, {&(0x7f0000001040)=""/25, 0x19}, {&(0x7f00000016c0)=""/132, 0x84}, {&(0x7f0000001780)=""/91, 0x5b}, {&(0x7f0000001800)=""/183, 0xb7}], 0x5, &(0x7f0000001940)=""/163, 0xa3, 0xe43}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000a80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r5}, 0x48) 2018/03/29 11:56:09 executing program 6: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x3, &(0x7f0000002000)=@framed={{0x18}, [], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000680)={0xffffffffffffffff, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x7}, 0x28) recvmsg(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000001c0)) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000100)=r0, 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) recvmsg(r3, &(0x7f00000011c0)={&(0x7f0000000b40)=@can, 0x80, &(0x7f0000001100)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f0000000c80)=""/169, 0xa9}, {&(0x7f0000000d40)=""/229, 0xe5}, {&(0x7f0000000e40)=""/128, 0x80}, {&(0x7f0000000ec0)=""/48, 0x30}, {&(0x7f0000000f00)=""/137, 0x89}, {&(0x7f0000006000)=""/4096, 0x1000}, {&(0x7f0000001080)=""/127, 0x7f}, {&(0x7f0000008000)=""/4096, 0x1000}], 0x9, 0x0, 0x0, 0x1}, 0x2020) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001200)={0x7, 0x4, 0x0, 0x4, 0x8, 0xffffffffffffffff, 0x9}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x1000000007, 0xcf2e, 0x7e, 0x20, 0x15, r1, 0x4}, 0x2c) socketpair(0x3, 0x80e, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r4, &(0x7f0000000200)={&(0x7f0000000fc0)=@pppol2tp={0x18, 0x1, {0x0, r3, {0x2, 0x4e20, @broadcast=0xffffffff}, 0x1, 0x3, 0x0, 0x2}}, 0x80, &(0x7f0000001580)=[{&(0x7f0000001240)="95c4dcff0f017b3c1979888e50f6c20a37b4edaffb28a3b609d24a8180434ab2fac426d3e4fc87e18267002be3cd56b11d69c4db739bf6a9c91af67ee87be1ea522993a368bdfc0df55539a60ef5515b4f03f3dbddae65cd66a90f030118870b473f156cb9a18624103000608c63f84b09ea89bfb8d8e7705c6ef456ef28adec5e566632ddd63098", 0x88}, {&(0x7f0000001380)="5745869bf3b6f562576761d821af2ad55c2f81345c810d6dbd43facd33c5107488aa7f04c5ab1302b820cd31405e9f657776a0d48e2225f39aabc3de0b30dc7422503b448ad89c23ebaee24ae9696e4e58eccae5febf47fff53dc1f03d869303acdef233746263c5c567e84edb166010fd23f56d6e84406bced5a00b5016b0c700fd76218ecf5da3527552a683eb87aa4b246cd74bcbeff8dedec74332e0214e4dc64cb7ac24c4447843caa7550375ef8e1f74a78c40a617e913a25e4837d24fb09e93eaa2", 0xc5}, {&(0x7f0000001480)="8247f46d4324760570d5078149dc5b38f7d1c592564148ecc6262e91c29cd4344e423ff476882993a2844af9a7c306a15e659a4cb9230b5139842c87ad8fa95c202146730fa610b141dfe4c7b771b46e4db879d2b92a01cb8642100d80a1d4658fd0df05c06c8615960a92b690c728e2603373657a9a46b2f200f2895198694d470ab95b6eb7a76ccee67c9219b4afa289d70c87cf22c733e00700f345136d59bcbd89ce7e110746f91e7a7661b8eb0afe54e3cb1c712441dd9a6ffb59a2eb58e5f5eabd4bec428fe27a403bb0d19125e473abdfea87a0c89108e3c876438a7c3f84bebad6cf858f26d2083efd60", 0xee}], 0x3, &(0x7f000000a000)=[{0x88, 0x112, 0xc2, "6671b4b66ac2fb4e14cee671813dc3834802e601529feb049ebb70880567948953018cfd53d7b1c9be27b1084adfba62040c7f889cfbc15407d93133259d9d5052bf6648a69218702e35278939ad399dc3ebed233c1792c7c1204353c8fe75ea0398f4aaf830834bc93873c119dddc539c"}, {0xe8, 0x6f180cc1befb202, 0x9, "4577f77fd3b3acd92c96feff8b0409afeae1c16fa3d367241c9679e5105141c7205d47ce27a418c10fbe7f601c3142e7b7b3a67322c9d345e0baf4315e13dc771a962ff445015c98a70b319d46ba59155d1cf07827804ea1ca86db74f3029bd60f6f365d955ec12be30102e59b4b3940152988ef09443df596bad9525f697fad61507e856c6acb744cfb034863943e811bd378843ccbd95f8221a444f4c323a391f5788559f34ac02e6e18065b87e8c962353623250694e5b4bf9bc1b00fadf2875995067ff6c18590c207f9a83f06665f5b5af77b4e"}, {0xa0, 0x10f, 0x5, "07c5972c79a30903d5d93f57c962c0351628551f6a3fbac8e18984ad9b8caeb403f1d588fa0b9955ce44d018cbcc06ad98b588dd45fd0ccd6b8d1965e70693ec76dd521aa2693829ef54059dc3191f2f4eca64c63f2f901ead2d6c54f0119212ebb77e956117d9130d3adff30a5598567fd540cf0a8f9f8c469ad15f209ad8ef161006831b39e4ddf2fcd748a8629e33"}], 0x210, 0x40}, 0x40) close(r0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)) recvmsg(r2, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) recvmsg$kcm(r4, &(0x7f0000001a00)={0x0, 0x0, &(0x7f00000018c0)=[{&(0x7f0000001600)=""/173, 0xad}, {&(0x7f0000001040)=""/25, 0x19}, {&(0x7f00000016c0)=""/132, 0x84}, {&(0x7f0000001780)=""/91, 0x5b}, {&(0x7f0000001800)=""/183, 0xb7}], 0x5, &(0x7f0000001940)=""/163, 0xa3, 0xe43}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000a80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r5}, 0x48) 2018/03/29 11:56:09 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x3, &(0x7f0000002000)=@framed={{0x18}, [], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000680)={0xffffffffffffffff, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x7}, 0x28) recvmsg(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000001c0)) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000100), 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) recvmsg(r3, &(0x7f00000011c0)={&(0x7f0000000b40)=@can, 0x80, &(0x7f0000001100)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f0000000c80)=""/169, 0xa9}, {&(0x7f0000000d40)=""/229, 0xe5}, {&(0x7f0000000e40)=""/128, 0x80}, {&(0x7f0000000ec0)=""/48, 0x30}, {&(0x7f0000000f00)=""/137, 0x89}, {&(0x7f0000006000)=""/4096, 0x1000}, {&(0x7f0000007000)=""/4096, 0x1000}, {&(0x7f0000001080)=""/127, 0x7f}, {&(0x7f0000008000)=""/4096, 0x1000}], 0xa, 0x0, 0x0, 0x1}, 0x2020) bpf$MAP_CREATE(0x0, &(0x7f0000001200)={0x7, 0x4, 0x0, 0x4, 0x8, 0xffffffffffffffff, 0x9}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x1000000007, 0xcf2e, 0x7e, 0x20, 0x15, r1, 0x4}, 0x2c) socketpair(0x3, 0x80e, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r4, &(0x7f0000000200)={&(0x7f0000000fc0)=@pppol2tp={0x18, 0x1, {0x0, r3, {0x2, 0x4e20, @broadcast=0xffffffff}, 0x1, 0x3, 0x0, 0x2}}, 0x80, &(0x7f0000001580)=[{&(0x7f0000001240)="95c4dcff0f017b3c1979888e50f6c20a37b4edaffb28a3b609d24a8180434ab2fac426d3e4fc87e18267002be3cd56b11d69c4db739bf6a9c91af67ee87be1ea522993a368bdfc0df55539a60ef5515b4f03f3dbddae65cd66a90f030118870b473f156cb9a18624103000608c63f84b09ea89bfb8d8e7705c6ef456ef28adec5e566632ddd63098", 0x88}, {&(0x7f0000001380)="5745869bf3b6f562576761d821af2ad55c2f81345c810d6dbd43facd33c5107488aa7f04c5ab1302b820cd31405e9f657776a0d48e2225f39aabc3de0b30dc7422503b448ad89c23ebaee24ae9696e4e58eccae5febf47fff53dc1f03d869303acdef233746263c5c567e84edb166010fd23f56d6e84406bced5a00b5016b0c700fd76218ecf5da3527552a683eb87aa4b246cd74bcbeff8dedec74332e0214e4dc64cb7ac24c4447843caa7550375ef8e1f74a78c40a617e913a25e4837d24fb09e93eaa2", 0xc5}, {&(0x7f0000001480)="8247f46d4324760570d5078149dc5b38f7d1c592564148ecc6262e91c29cd4344e423ff476882993a2844af9a7c306a15e659a4cb9230b5139842c87ad8fa95c202146730fa610b141dfe4c7b771b46e4db879d2b92a01cb8642100d80a1d4658fd0df05c06c8615960a92b690c728e2603373657a9a46b2f200f2895198694d470ab95b6eb7a76ccee67c9219b4afa289d70c87cf22c733e00700f345136d59bcbd89ce7e110746f91e7a7661b8eb0afe54e3cb1c712441dd9a6ffb59a2eb58e5f5eabd4bec428fe27a403bb0d19125e473abdfea87a0c89108e3c876438a7c3f84bebad6cf858f26d2083efd60", 0xee}], 0x3, &(0x7f000000a000)=[{0x88, 0x112, 0xc2, "6671b4b66ac2fb4e14cee671813dc3834802e601529feb049ebb70880567948953018cfd53d7b1c9be27b1084adfba62040c7f889cfbc15407d93133259d9d5052bf6648a69218702e35278939ad399dc3ebed233c1792c7c1204353c8fe75ea0398f4aaf830834bc93873c119dddc539c"}, {0xe8, 0x6f180cc1befb202, 0x9, "4577f77fd3b3acd92c96feff8b0409afeae1c16fa3d367241c9679e5105141c7205d47ce27a418c10fbe7f601c3142e7b7b3a67322c9d345e0baf4315e13dc771a962ff445015c98a70b319d46ba59155d1cf07827804ea1ca86db74f3029bd60f6f365d955ec12be30102e59b4b3940152988ef09443df596bad9525f697fad61507e856c6acb744cfb034863943e811bd378843ccbd95f8221a444f4c323a391f5788559f34ac02e6e18065b87e8c962353623250694e5b4bf9bc1b00fadf2875995067ff6c18590c207f9a83f06665f5b5af77b4e"}, {0xa0, 0x10f, 0x5, "07c5972c79a30903d5d93f57c962c0351628551f6a3fbac8e18984ad9b8caeb403f1d588fa0b9955ce44d018cbcc06ad98b588dd45fd0ccd6b8d1965e70693ec76dd521aa2693829ef54059dc3191f2f4eca64c63f2f901ead2d6c54f0119212ebb77e956117d9130d3adff30a5598567fd540cf0a8f9f8c469ad15f209ad8ef161006831b39e4ddf2fcd748a8629e33"}], 0x210, 0x40}, 0x40) close(r0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)) recvmsg(r2, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) recvmsg$kcm(r4, &(0x7f0000001a00)={0x0, 0x0, &(0x7f00000018c0)=[{&(0x7f0000001600)=""/173, 0xad}, {&(0x7f0000001040)=""/25, 0x19}, {&(0x7f00000016c0)=""/132, 0x84}, {&(0x7f0000001780)=""/91, 0x5b}, {&(0x7f0000001800)=""/183, 0xb7}], 0x5, &(0x7f0000001940)=""/163, 0xa3, 0xe43}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000a80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r5}, 0x48) 2018/03/29 11:56:09 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x1e1, 0x100000000209e20, 0x8000000001, 0x5}, 0xfffffffffffffe20) r0 = getpid() r1 = perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0xfffffffffffffffc, 0x3, 0x8, 0x2, 0x0, 0x9, 0x10000, 0xc, 0x3d3, 0x80, 0x5, 0xfffffffffffffffc, 0x8, 0x3f, 0x5d, 0xbbb0, 0x20, 0x3, 0x8000, 0x100000000, 0x8, 0x9, 0x2, 0x4, 0x800, 0xf8, 0x3, 0x9, 0x1, 0x3, 0x8, 0x3, 0x7, 0x10001, 0xf16, 0x2, 0x0, 0x7fffffff, 0x4, @perf_bp={&(0x7f0000000780), 0x1}, 0x4080, 0x10001, 0xcc, 0x7, 0x3, 0xffff, 0x7fffffff}, 0xffffffffffffffff, 0xd, 0xffffffffffffff9c, 0x8) perf_event_open(&(0x7f0000000980)={0x4, 0x70, 0x6, 0x3f, 0x8e, 0x1, 0x0, 0x3, 0x404, 0x0, 0xbc2b, 0x40, 0x7, 0xffff, 0xffff, 0x9, 0x9de2, 0x9, 0x0, 0x3, 0x7f, 0xff, 0x40, 0x400, 0x9, 0x7fffffff, 0x80000000, 0x7, 0x8, 0x10001, 0x1f, 0x2778, 0x800, 0x8001, 0x101, 0x9, 0x8, 0x7ff, 0x0, 0x1000, 0x5, @perf_config_ext={0x3ff, 0xb69b}, 0x3040, 0x2, 0x2, 0x5, 0x7, 0x6, 0x7283ed73}, r0, 0xe, r1, 0x8) bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x0, 0x0, 0x7ffff9, 0x0, 0x20000003, 0x0}, 0x2c) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) r2 = gettid() r3 = perf_event_open(&(0x7f00000008c0)={0x7, 0x70, 0x1, 0x200, 0x3, 0xdbce, 0x0, 0x8, 0x1002, 0x1, 0xffffffffffffff00, 0x8, 0x1, 0xb3fa, 0x8, 0x0, 0x1, 0x2, 0x1000, 0x2, 0x401, 0x8, 0x3, 0x81, 0x0, 0x7, 0x2fc4, 0x882, 0x4, 0x8, 0x3, 0x81, 0x3, 0x7, 0x8857, 0x7, 0x5, 0x9, 0x0, 0x7, 0x1, @perf_config_ext={0x0, 0x80000000}, 0x400, 0x7f, 0x4, 0x7, 0x2, 0x7f, 0x200}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000840)={0x5, 0x70, 0xef, 0x2, 0x1000, 0xffffffff80000000, 0x0, 0x1a7800000000, 0x2000, 0x4, 0x5, 0x6814, 0x3a9, 0x5, 0x63b, 0x6, 0x8, 0x1000, 0x250420ee, 0x3, 0x0, 0x20, 0x6, 0x0, 0x4, 0x5, 0x4, 0x8, 0x3, 0x8, 0x52893dd5, 0x2, 0x2, 0x8, 0x44d, 0x1, 0x8, 0x6, 0x0, 0x100000000, 0x0, @perf_config_ext={0x9, 0x80}, 0x0, 0x0, 0x2b67, 0x6, 0x4b0, 0x81, 0x4}, r2, 0x5, r3, 0xb) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1003, 0x0) mount(&(0x7f00002b9ff8)='./file0\x00', &(0x7f0000cbeff8)='./file0\x00', &(0x7f00005f7ffa)='ramfs\x00', 0x80000, &(0x7f000002f000)) mount(&(0x7f0000000000)='.', &(0x7f0000000040)='.', &(0x7f0000000080)='cgroup\x00', 0x5010, &(0x7f00000000c0)) mount(&(0x7f0000377ff8)='.', &(0x7f0000000280)='.', &(0x7f0000000600)='nfs4\x00', 0x5010, &(0x7f0000000300)="2161893416a0c71070768c219eb114c3253c9f3baf4e9e8e9111c1a7fc6e266009fe27243deeaa22ca7ae9341f714300b5ee807e55d609036f2a3260475922bdfb2d2849f1c3b2ad3c051bd4f3751a177f77a92758c6d2b23fe7f1535b54e5846d11c135de8286066dec1b25f6e1378944ac5f7fce42d055821b5e19") perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xd68, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f0000014f88)={0x5, 0xfffffffffffffdc4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x46000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = getpid() perf_event_open(&(0x7f0000000680)={0x4, 0x70, 0x64, 0xffff, 0x1f, 0x4, 0x0, 0x1c3, 0x0, 0x1, 0x1, 0x9, 0x1ff, 0xfffffffffffffff8, 0x0, 0x0, 0x6, 0x7fffffff, 0x4, 0xffffffff, 0x80000001, 0xd0, 0x7, 0x1f, 0x0, 0x8, 0x9, 0x1ff, 0x8, 0x785, 0x4, 0xff, 0x2, 0x656, 0x5000000, 0x1, 0x460e3be0, 0x1, 0x0, 0x0, 0x7, @perf_bp={&(0x7f0000000640), 0x1}, 0x1000, 0xa, 0x7fff, 0x7, 0x3, 0x400, 0x9}, r5, 0xe, r4, 0x1) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', 0x0, 0x10}, 0x10) close(0xffffffffffffffff) bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)={&(0x7f0000000040)='./file0\x00', 0x0, 0x18}, 0x10) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000100)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0, 0x2e, &(0x7f0000000440), &(0x7f0000000140)=""/46, 0x4229}, 0x28) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000003480)={&(0x7f0000003300)=@can={0x0, 0x0}, 0x80, &(0x7f0000003400)=[{&(0x7f0000003380)=""/56, 0x38}, {&(0x7f00000033c0)=""/1, 0x1}], 0x2, &(0x7f0000003440)=""/33, 0x21, 0x1}, 0x40010000) bpf$PROG_LOAD(0x5, &(0x7f00000034c0)={0xe, 0x6, &(0x7f0000000940)=ANY=[@ANYBLOB="1800000002000000000000004ce700002555fdff00000000002371d07c9ba7f4a23372b0ad61000000000000009500000000"], &(0x7f00000007c0)='GPL\x00', 0x3, 0x2d, &(0x7f0000000800)=""/45, 0x40f00, 0x1, [], r6}, 0x48) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000740)={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x10) socketpair$inet(0x2, 0x80a, 0x81, &(0x7f0000000240)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={0xffffffffffffffff, &(0x7f0000000500)="ae30f1bca1b4d3f69f1aac81517d42ad5980bc63b5008616a1f4724b9f8c1e4ecd8de336f57dd727cdaab04f0b40f28612615ad08de414711d841a88db33fd33884b627074213a0c5de3be2bbaec9207d9865c47f240467849979b5ab5632376608fc4be41a274abb2dc07cabe344a18db51048e5b0cbda843905a4258cdee3e649eddf104ba78894dce09747dcfe6a8d6d6d985520eeef448b83a8bcb83074541ba7a20d6094aa206c01a0690e5b3bfa05d475eb382b0199031d22bb26cde9b1ca0055eef9f6c4993b71ba19ba0590bb5efdaddaa574c25356ca890d138fc9fe0e975b6d5a1a8251503cd0a91845f9d95", &(0x7f0000000480)="9bc7741ea5e524cc8c6f748a73153834428729c45bf4ad446d2dddf1978baf431d0ba35b5442b5afe22db8b003650320200af7e1368ef7cdfa79ca8b9d3564363a5d2a502970314f2264c883bc8d990afc003e5adb95b30edad245c4420c8126f1d33db75ff0230698eaff90055e0f", 0x2}, 0x20) socketpair(0x0, 0x80003, 0xffff, &(0x7f0000000380)={0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r7, 0x50, &(0x7f00000003c0)}, 0x10) 2018/03/29 11:56:09 executing program 0: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000001a00)) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000001a40)={0xffffffffffffffff}) recvmsg$kcm(r1, &(0x7f0000000540)={&(0x7f00000000c0)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @broadcast}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000240)=""/65, 0x41}], 0x1, &(0x7f0000000440)=""/213, 0xd5}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x8983, &(0x7f0000000040)) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000080)) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000019c0)={0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000000140)="0253eea6a53cc0eae389e9a13e5f2046d0633eebde90f446c1b1eabbd0adb42dfcefb37a3df93feb3d5e76dc353ecf23fe9c81afa5", 0x35}, {&(0x7f00000002c0)}, {&(0x7f0000000400)}, {&(0x7f0000001600)}], 0x4, &(0x7f0000001700)=[{0x68, 0x107, 0x25047dc1, "755cd1e9e23de47cb15819d813deb534cee2d9497c58eba5bd8a228407fb709d70f16afa73f4924f12ecc429b6fd356748940b62ee5f5685ce027fe4e6c60a8f88cd1a5827d099f5849f09bd37f681e29814e6bb"}, {0x10, 0x0, 0x1ff}, {0x10, 0x107, 0x80000001}], 0x88}, 0x48800) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000000)) 2018/03/29 11:56:09 executing program 3: r0 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x10}, 0x10) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000000c0)={0x0, 0x1000, 0x8}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000080)='./file0\x00', r1}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0x0, 0x8}, 0x10) mount(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='cpuset\x00', 0x40, &(0x7f0000000280)="8a4562cb6a7df38be32246afcaef1e1a3f933cb428242c55c117c0fbbd62cea0aab31f2665fb88267466eca314fc8cafd72cc24143121c0691236768fad66390bf9b55014c2bd49faa5388cbabd52e730eeb4ccc411bacd296e423d971043756cf2b35a4063f2a7465b44a60ef31ae437f6160ed2f63afa62c36a27c33e4779e7c0404e337abc025bb2e4b39cc265573c6ab1a3ff09c7ad6bb4631a4") mount(&(0x7f0000000340)='./file1\x00', &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='devtmpfs\x00', 0x40, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xb, 0x7f, 0x0, 0x1, 0x12, r1, 0x100000000}, 0x2c) mkdir(&(0x7f0000000440)='./file1\x00', 0x20) mount(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='iso9660\x00', 0x8, &(0x7f0000000540)="650fe6ccea2b17860de967406c566ec16fe5a7a4c064707e22906e9d3d2a70b4") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000005c0)={r2, 0x28, &(0x7f0000000580)={0x0, 0x0}}, 0x10) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={r3, 0x8, 0x10}, 0xc) mount(&(0x7f0000000640)='./file1\x00', &(0x7f0000000680)='./file1\x00', &(0x7f00000006c0)='pstore\x00', 0x1000000, &(0x7f0000000700)="f48afa3ab3cc319f917be52b04c388c229578537782bc5ffc32c7747b1d28999ad89f5fba460640a324385ac03cccef4553d641b91d79d014804a98e72796f8eb2e1a7056efeaa63404648df67079ae817420f248ccf9d01e7a027c600c71777fb9ebc97da60f3d1a287ef8bc00f1dc68c3b1f0c1836cde5b62be45dd58c3415cbb0f916fe3c04fc69911e2bec15c208d023bdb608fa727657c532bd5101a2a36b34c4eb65f855fea2d6f8a0a79b15ecef1a4c81a8f6f5ed57b09db2ab482413540416126718f2a33ed21346ded20b084a8dc10702ec279fc486b5c57c163d") socketpair(0x3, 0x2, 0x1f, &(0x7f0000001c40)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$kcm(r6, &(0x7f0000004300)={0x0, 0x0, &(0x7f0000004140)=[{&(0x7f0000001c80)=""/139, 0x8b}, {&(0x7f0000001d40)=""/149, 0x95}, {&(0x7f0000001e00)=""/188, 0xbc}, {&(0x7f0000001ec0)=""/69, 0x45}, {&(0x7f0000001f40)=""/165, 0xa5}, {&(0x7f0000002000)=""/4096, 0x1000}, {&(0x7f0000003000)=""/42, 0x2a}, {&(0x7f0000003040)=""/4096, 0x1000}, {&(0x7f0000004040)=""/233, 0xe9}], 0x9, &(0x7f0000004200)=""/236, 0xec, 0xe00}, 0x40) mount(&(0x7f0000004340)='./file1/file0\x00', &(0x7f0000004380)='./file1\x00', &(0x7f00000043c0)='ceph\x00', 0x4860, &(0x7f0000004400)="2c8eb517dd302be26597065442d58f3f345c295b542b2b1df3046ae176") bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000004600)={r6, &(0x7f0000004440)="903685b47b9c4d5c1dffcefa6a92cd57ccdfaf1af0be272f1cb4a5b86ab9d1ef248a63f04f5d59c2cd6e6b7722f5ff866c5d353014f28baaa95bce06a787a3e085102126a0386ffd4e136d472f2cdfb7c658643d2792b7235e2ec8c782080850c20eb00014eab035d7d56c8ddd0d7fdc4c21602d480e4accea0867cc5b4172b46b8f028bd623c58544092396dbda704543cd7c93219ff7f4caf9d0c12fc32c65ddac48ba22321d2c7ef1152f0dd87ed22cb30eb2b24d381b3abaefc114ad4c08e329cfbce60e0549ca", &(0x7f0000004540)="38859653237c5c9685cf2e44e1eea64846e190b778f29b06c26c2f2b8a0800f9fc2019b05290fc5c82f612eb7f479918015eb3af93cc57f01db731e129275ce05910f66e436ef09a8fe7bf22f960eacec350a7f7e9e9a47cb163f467b6a29523346a4c61d65d2235c73095a53929d509538f640424133cfa3617b41a51aa7172460146433abbe604f2c92827fabd5d3134d36b4cecd0fd2549f3527615f9eb63dd9332021e4eff13ad6aa509db21ed98745d00cb36e547", 0x3}, 0x20) mkdir(&(0x7f0000004640)='./file1/file0\x00', 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000004680)={0x0, 0x0, 0xa6, 0x3, 0x4}, 0x2c) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000046c0)=0x7, 0x4) recvmsg$kcm(r6, &(0x7f00000058c0)={&(0x7f0000004700)=@alg, 0x80, &(0x7f0000005880)=[{&(0x7f0000004780)=""/4096, 0x1000}, {&(0x7f0000005780)=""/219, 0xdb}], 0x2, 0x0, 0x0, 0x100000001}, 0x40000000) r7 = gettid() r8 = perf_event_open(&(0x7f0000005900)={0x7, 0x70, 0x0, 0xfffffffffffffff7, 0x9, 0x4, 0x0, 0x7, 0x100, 0x8, 0x100000000, 0x8000, 0x8, 0x6, 0x0, 0x6, 0x10001, 0x9, 0x1f, 0x2, 0x1, 0x3, 0x1, 0x1f, 0x23, 0x1, 0xaa4, 0x5, 0x4, 0x200, 0x6, 0x9, 0xfffffffffffffffb, 0x3, 0x3, 0xff, 0x80000000, 0x0, 0x0, 0xffffffffffffff9d, 0x2, @perf_config_ext={0x7, 0x9}, 0x100, 0x8, 0x2, 0x6, 0x4, 0x6, 0xf71}, r7, 0x9, r6, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f00000059c0)={&(0x7f0000005980)='./file0\x00'}, 0x10) ioctl$sock_kcm_SIOCKCMATTACH(r5, 0x89e0, &(0x7f0000005a00)={r5, r0}) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000005c00)={r4, &(0x7f0000005a40)="313befc1e9ac680c4369983530ee783c4f018c38e134b4b0aebd06ede05f238850949c0f5d32ab19889f880e87e3a0fa5a43500affdcc508d56f3a4df6c159ca9cfa62124b79b4607d42738dc5e16d09ea2c6a2346fc2360feff08d9f464dfdebce2cb99d4ba8e5fc37edfba041f14e16a68192d7d8687404ee7318323520188c4e5d52e8c7ec40bd0823fb210e530c74ea842bd8bacbc48317b0b6ed12528ecd30e1af83b8049df791ff7affe91ab54", &(0x7f0000005b00)=""/243}, 0x18) mount(&(0x7f0000005c40)='./file1/file0\x00', &(0x7f0000005c80)='./file1\x00', &(0x7f0000005cc0)='btrfs\x00', 0x0, 0x0) recvmsg(r5, &(0x7f00000073c0)={&(0x7f0000005d00)=@sco, 0x80, &(0x7f0000007300)=[{&(0x7f0000005d80)=""/103, 0x67}, {&(0x7f0000005e00)=""/170, 0xaa}, {&(0x7f0000005ec0)=""/252, 0xfc}, {&(0x7f0000005fc0)=""/136, 0x88}, {&(0x7f0000006080)=""/125, 0x7d}, {&(0x7f0000006100)=""/4096, 0x1000}, {&(0x7f0000007100)=""/106, 0x6a}, {&(0x7f0000007180)=""/115, 0x73}, {&(0x7f0000007200)=""/240, 0xf0}], 0x9, 0x0, 0x0, 0x7}, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000007400)={r3, 0x10001, 0x18}, 0xc) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0xc4c) recvmsg$kcm(r6, &(0x7f0000008880)={&(0x7f0000007440)=@l2, 0x80, &(0x7f0000008800)=[{&(0x7f00000074c0)=""/231, 0xe7}, {&(0x7f00000075c0)=""/118, 0x76}, {&(0x7f0000007640)=""/4096, 0x1000}, {&(0x7f0000008640)=""/223, 0xdf}, {&(0x7f0000008740)}, {&(0x7f0000008780)=""/32, 0x20}, {&(0x7f00000087c0)=""/53, 0x35}], 0x7}, 0x10000) 2018/03/29 11:56:09 executing program 6: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x3, &(0x7f0000002000)=@framed={{0x18}, [], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000680)={0xffffffffffffffff, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x7}, 0x28) recvmsg(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000001c0)) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000100)=r0, 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) recvmsg(r3, &(0x7f00000011c0)={&(0x7f0000000b40)=@can, 0x80, &(0x7f0000001100)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f0000000c80)=""/169, 0xa9}, {&(0x7f0000000d40)=""/229, 0xe5}, {&(0x7f0000000e40)=""/128, 0x80}, {&(0x7f0000000ec0)=""/48, 0x30}, {&(0x7f0000000f00)=""/137, 0x89}, {&(0x7f0000006000)=""/4096, 0x1000}, {&(0x7f0000007000)=""/4096, 0x1000}, {&(0x7f0000008000)=""/4096, 0x1000}], 0x9, 0x0, 0x0, 0x1}, 0x2020) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001200)={0x7, 0x4, 0x0, 0x4, 0x8, 0xffffffffffffffff, 0x9}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x1000000007, 0xcf2e, 0x7e, 0x20, 0x15, r1, 0x4}, 0x2c) socketpair(0x3, 0x80e, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r4, &(0x7f0000000200)={&(0x7f0000000fc0)=@pppol2tp={0x18, 0x1, {0x0, r3, {0x2, 0x4e20, @broadcast=0xffffffff}, 0x1, 0x3, 0x0, 0x2}}, 0x80, &(0x7f0000001580)=[{&(0x7f0000001240)="95c4dcff0f017b3c1979888e50f6c20a37b4edaffb28a3b609d24a8180434ab2fac426d3e4fc87e18267002be3cd56b11d69c4db739bf6a9c91af67ee87be1ea522993a368bdfc0df55539a60ef5515b4f03f3dbddae65cd66a90f030118870b473f156cb9a18624103000608c63f84b09ea89bfb8d8e7705c6ef456ef28adec5e566632ddd63098", 0x88}, {&(0x7f0000001380)="5745869bf3b6f562576761d821af2ad55c2f81345c810d6dbd43facd33c5107488aa7f04c5ab1302b820cd31405e9f657776a0d48e2225f39aabc3de0b30dc7422503b448ad89c23ebaee24ae9696e4e58eccae5febf47fff53dc1f03d869303acdef233746263c5c567e84edb166010fd23f56d6e84406bced5a00b5016b0c700fd76218ecf5da3527552a683eb87aa4b246cd74bcbeff8dedec74332e0214e4dc64cb7ac24c4447843caa7550375ef8e1f74a78c40a617e913a25e4837d24fb09e93eaa2", 0xc5}, {&(0x7f0000001480)="8247f46d4324760570d5078149dc5b38f7d1c592564148ecc6262e91c29cd4344e423ff476882993a2844af9a7c306a15e659a4cb9230b5139842c87ad8fa95c202146730fa610b141dfe4c7b771b46e4db879d2b92a01cb8642100d80a1d4658fd0df05c06c8615960a92b690c728e2603373657a9a46b2f200f2895198694d470ab95b6eb7a76ccee67c9219b4afa289d70c87cf22c733e00700f345136d59bcbd89ce7e110746f91e7a7661b8eb0afe54e3cb1c712441dd9a6ffb59a2eb58e5f5eabd4bec428fe27a403bb0d19125e473abdfea87a0c89108e3c876438a7c3f84bebad6cf858f26d2083efd60", 0xee}], 0x3, &(0x7f000000a000)=[{0x88, 0x112, 0xc2, "6671b4b66ac2fb4e14cee671813dc3834802e601529feb049ebb70880567948953018cfd53d7b1c9be27b1084adfba62040c7f889cfbc15407d93133259d9d5052bf6648a69218702e35278939ad399dc3ebed233c1792c7c1204353c8fe75ea0398f4aaf830834bc93873c119dddc539c"}, {0xe8, 0x6f180cc1befb202, 0x9, "4577f77fd3b3acd92c96feff8b0409afeae1c16fa3d367241c9679e5105141c7205d47ce27a418c10fbe7f601c3142e7b7b3a67322c9d345e0baf4315e13dc771a962ff445015c98a70b319d46ba59155d1cf07827804ea1ca86db74f3029bd60f6f365d955ec12be30102e59b4b3940152988ef09443df596bad9525f697fad61507e856c6acb744cfb034863943e811bd378843ccbd95f8221a444f4c323a391f5788559f34ac02e6e18065b87e8c962353623250694e5b4bf9bc1b00fadf2875995067ff6c18590c207f9a83f06665f5b5af77b4e"}, {0xa0, 0x10f, 0x5, "07c5972c79a30903d5d93f57c962c0351628551f6a3fbac8e18984ad9b8caeb403f1d588fa0b9955ce44d018cbcc06ad98b588dd45fd0ccd6b8d1965e70693ec76dd521aa2693829ef54059dc3191f2f4eca64c63f2f901ead2d6c54f0119212ebb77e956117d9130d3adff30a5598567fd540cf0a8f9f8c469ad15f209ad8ef161006831b39e4ddf2fcd748a8629e33"}], 0x210, 0x40}, 0x40) close(r0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)) recvmsg(r2, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) recvmsg$kcm(r4, &(0x7f0000001a00)={0x0, 0x0, &(0x7f00000018c0)=[{&(0x7f0000001600)=""/173, 0xad}, {&(0x7f0000001040)=""/25, 0x19}, {&(0x7f00000016c0)=""/132, 0x84}, {&(0x7f0000001780)=""/91, 0x5b}, {&(0x7f0000001800)=""/183, 0xb7}], 0x5, &(0x7f0000001940)=""/163, 0xa3, 0xe43}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000a80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r5}, 0x48) 2018/03/29 11:56:09 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x0, 0x100000000209e20, 0x8000000001, 0x5}, 0xfffffffffffffe20) r0 = getpid() r1 = perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0xfffffffffffffffc, 0x3, 0x8, 0x2, 0x0, 0x9, 0x10000, 0xc, 0x3d3, 0x80, 0x5, 0xfffffffffffffffc, 0x8, 0x3f, 0x5d, 0xbbb0, 0x20, 0x3, 0x8000, 0x100000000, 0x8, 0x9, 0x2, 0x4, 0x800, 0xf8, 0x3, 0x9, 0x1, 0x3, 0x8, 0x3, 0x7, 0x10001, 0xf16, 0x2, 0x0, 0x7fffffff, 0x4, @perf_bp={&(0x7f0000000780), 0x1}, 0x4080, 0x10001, 0xcc, 0x7, 0x3, 0xffff, 0x7fffffff}, 0xffffffffffffffff, 0xd, 0xffffffffffffff9c, 0x8) perf_event_open(&(0x7f0000000980)={0x4, 0x70, 0x6, 0x3f, 0x8e, 0x1, 0x0, 0x3, 0x404, 0x0, 0xbc2b, 0x40, 0x7, 0xffff, 0xffff, 0x9, 0x9de2, 0x9, 0x0, 0x3, 0x7f, 0xff, 0x40, 0x400, 0x9, 0x7fffffff, 0x80000000, 0x7, 0x8, 0x10001, 0x1f, 0x2778, 0x800, 0x8001, 0x101, 0x9, 0x8, 0x7ff, 0x0, 0x1000, 0x5, @perf_config_ext={0x3ff, 0xb69b}, 0x3040, 0x2, 0x2, 0x5, 0x7, 0x6, 0x7283ed73}, r0, 0xe, r1, 0x8) bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x0, 0x0, 0x7ffff9, 0x0, 0x20000003, 0x0}, 0x2c) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) r2 = gettid() r3 = perf_event_open(&(0x7f00000008c0)={0x7, 0x70, 0x1, 0x200, 0x3, 0xdbce, 0x0, 0x8, 0x1002, 0x1, 0xffffffffffffff00, 0x8, 0x1, 0xb3fa, 0x8, 0x0, 0x1, 0x2, 0x1000, 0x2, 0x401, 0x8, 0x3, 0x81, 0x0, 0x7, 0x2fc4, 0x882, 0x4, 0x8, 0x3, 0x81, 0x3, 0x7, 0x8857, 0x7, 0x5, 0x9, 0x0, 0x7, 0x1, @perf_config_ext={0x0, 0x80000000}, 0x400, 0x7f, 0x4, 0x7, 0x2, 0x7f, 0x200}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000840)={0x5, 0x70, 0xef, 0x2, 0x1000, 0xffffffff80000000, 0x0, 0x1a7800000000, 0x2000, 0x4, 0x5, 0x6814, 0x3a9, 0x5, 0x63b, 0x6, 0x8, 0x1000, 0x250420ee, 0x3, 0x0, 0x20, 0x6, 0x0, 0x4, 0x5, 0x4, 0x8, 0x3, 0x8, 0x52893dd5, 0x2, 0x2, 0x8, 0x44d, 0x1, 0x8, 0x6, 0x0, 0x100000000, 0x0, @perf_config_ext={0x9, 0x80}, 0x0, 0x0, 0x2b67, 0x6, 0x4b0, 0x81, 0x4}, r2, 0x5, r3, 0xb) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1003, 0x0) mount(&(0x7f00002b9ff8)='./file0\x00', &(0x7f0000cbeff8)='./file0\x00', &(0x7f00005f7ffa)='ramfs\x00', 0x80000, &(0x7f000002f000)) mount(&(0x7f0000000000)='.', &(0x7f0000000040)='.', &(0x7f0000000080)='cgroup\x00', 0x5010, &(0x7f00000000c0)) mount(&(0x7f0000377ff8)='.', &(0x7f0000000280)='.', &(0x7f0000000600)='nfs4\x00', 0x5010, &(0x7f0000000300)="2161893416a0c71070768c219eb114c3253c9f3baf4e9e8e9111c1a7fc6e266009fe27243deeaa22ca7ae9341f714300b5ee807e55d609036f2a3260475922bdfb2d2849f1c3b2ad3c051bd4f3751a177f77a92758c6d2b23fe7f1535b54e5846d11c135de8286066dec1b25f6e1378944ac5f7fce42d055821b5e19") perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xd68, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f0000014f88)={0x5, 0xfffffffffffffdc4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x46000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = getpid() perf_event_open(&(0x7f0000000680)={0x4, 0x70, 0x64, 0xffff, 0x1f, 0x4, 0x0, 0x1c3, 0x0, 0x1, 0x1, 0x9, 0x1ff, 0xfffffffffffffff8, 0x0, 0x0, 0x6, 0x7fffffff, 0x0, 0xffffffff, 0x80000001, 0xd0, 0x7, 0x1f, 0x0, 0x8, 0x9, 0x1ff, 0x8, 0x785, 0x4, 0xff, 0x2, 0x656, 0x5000000, 0x1, 0x460e3be0, 0x1, 0x0, 0x0, 0x7, @perf_bp={&(0x7f0000000640), 0x1}, 0x1000, 0xa, 0x7fff, 0x7, 0x3, 0x400, 0x9}, r5, 0xe, r4, 0x1) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', 0x0, 0x10}, 0x10) close(0xffffffffffffffff) bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)={&(0x7f0000000040)='./file0\x00', 0x0, 0x18}, 0x10) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000100)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0, 0x2e, &(0x7f0000000440), &(0x7f0000000140)=""/46, 0x4229}, 0x28) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000003480)={&(0x7f0000003300)=@can={0x0, 0x0}, 0x80, &(0x7f0000003400)=[{&(0x7f0000003380)=""/56, 0x38}, {&(0x7f00000033c0)=""/1, 0x1}], 0x2, &(0x7f0000003440)=""/33, 0x21, 0x1}, 0x40010000) bpf$PROG_LOAD(0x5, &(0x7f00000034c0)={0xe, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="1800000002000000000000004ce700002555fdff00000000002371d07c9ba7f4a23372b0ad61000000000000009500000000000000"], &(0x7f00000007c0)='GPL\x00', 0x3, 0x2d, &(0x7f0000000800)=""/45, 0x40f00, 0x1, [], r6}, 0x48) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000740)={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x10) socketpair$inet(0x2, 0x80a, 0x81, &(0x7f0000000240)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={0xffffffffffffffff, &(0x7f0000000500)="ae30f1bca1b4d3f69f1aac81517d42ad5980bc63b5008616a1f4724b9f8c1e4ecd8de336f57dd727cdaab04f0b40f28612615ad08de414711d841a88db33fd33884b627074213a0c5de3be2bbaec9207d9865c47f240467849979b5ab5632376608fc4be41a274abb2dc07cabe344a18db51048e5b0cbda843905a4258cdee3e649eddf104ba78894dce09747dcfe6a8d6d6d985520eeef448b83a8bcb83074541ba7a20d6094aa206c01a0690e5b3bfa05d475eb382b0199031d22bb26cde9b1ca0055eef9f6c4993b71ba19ba0590bb5efdaddaa574c25356ca890d138fc9fe0e975b6d5a1a8251503cd0a91845f9d95", &(0x7f0000000480)="9bc7741ea5e524cc8c6f748a73153834428729c45bf4ad446d2dddf1978baf431d0ba35b5442b5afe22db8b003650320200af7e1368ef7cdfa79ca8b9d3564363a5d2a502970314f2264c883bc8d990afc003e5adb95b30edad245c4420c8126f1d33db75ff0230698eaff90055e0f", 0x2}, 0x20) socketpair(0x0, 0x80003, 0xffff, &(0x7f0000000380)={0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r7, 0x50, &(0x7f00000003c0)}, 0x10) [ 816.044923] IPVS: ftp: loaded support on port[0] = 21 [ 816.825923] IPVS: ftp: loaded support on port[0] = 21 [ 816.851769] IPVS: ftp: loaded support on port[0] = 21 [ 816.884532] IPVS: ftp: loaded support on port[0] = 21 [ 816.936361] FAULT_INJECTION: forcing a failure. [ 816.936361] name failslab, interval 1, probability 0, space 0, times 0 [ 816.947899] CPU: 0 PID: 26799 Comm: syz-executor4 Not tainted 4.16.0-rc6+ #40 [ 816.955169] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 816.964509] Call Trace: [ 816.967086] dump_stack+0x194/0x24d [ 816.970694] ? arch_local_irq_restore+0x53/0x53 [ 816.975353] should_fail+0x8c0/0xa40 [ 816.979050] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 816.984132] ? __lock_is_held+0xb6/0x140 [ 816.988173] ? mark_held_locks+0xaf/0x100 [ 816.992300] ? __raw_spin_lock_init+0x1c/0x100 [ 816.996872] ? find_held_lock+0x35/0x1d0 [ 817.000916] ? __lock_is_held+0xb6/0x140 [ 817.004971] ? check_same_owner+0x320/0x320 [ 817.009272] ? d_alloc+0x269/0x340 [ 817.012796] ? rcu_note_context_switch+0x710/0x710 [ 817.017716] ? lock_release+0xa40/0xa40 [ 817.021693] should_failslab+0xec/0x120 [ 817.025651] kmem_cache_alloc+0x47/0x760 [ 817.029695] ? d_drop+0x51/0x60 [ 817.032954] ? rpc_i_callback+0x30/0x30 [ 817.036912] rpc_alloc_inode+0x1a/0x20 [ 817.040779] alloc_inode+0x65/0x180 [ 817.044389] new_inode_pseudo+0x69/0x190 [ 817.048426] ? prune_icache_sb+0x1a0/0x1a0 [ 817.052638] ? do_raw_spin_trylock+0x190/0x190 [ 817.057199] ? d_add+0xa70/0xa70 [ 817.060550] new_inode+0x1c/0x40 [ 817.063893] rpc_get_inode+0x20/0x1e0 [ 817.067684] __rpc_create_common+0x5d/0x1d0 [ 817.072040] rpc_populate.constprop.15+0x1ad/0x340 [ 817.077010] rpc_fill_super+0x379/0xae0 [ 817.080990] ? cap_capable+0x1b5/0x230 [ 817.084865] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 817.090053] ? security_capable+0x8e/0xc0 [ 817.094196] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 817.099382] ? ns_capable_common+0xcf/0x160 [ 817.103703] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 817.108894] mount_ns+0xc4/0x190 [ 817.112255] rpc_mount+0x9e/0xd0 [ 817.115616] mount_fs+0x66/0x2d0 [ 817.118990] vfs_kern_mount.part.26+0xc6/0x4a0 [ 817.123566] ? may_umount+0xa0/0xa0 [ 817.127181] ? _raw_read_unlock+0x22/0x30 [ 817.131326] ? __get_fs_type+0x8a/0xc0 [ 817.135209] do_mount+0xea4/0x2bb0 [ 817.138760] ? copy_mount_string+0x40/0x40 [ 817.143001] ? rcu_pm_notify+0xc0/0xc0 [ 817.146891] ? copy_mount_options+0x5f/0x2e0 [ 817.151283] ? rcu_read_lock_sched_held+0x108/0x120 [ 817.156278] ? kmem_cache_alloc_trace+0x459/0x740 [ 817.161100] ? kasan_check_write+0x14/0x20 [ 817.165311] ? _copy_from_user+0x99/0x110 [ 817.169444] ? copy_mount_options+0x1f7/0x2e0 [ 817.173929] SyS_mount+0xab/0x120 [ 817.177357] ? copy_mnt_ns+0xb30/0xb30 [ 817.181222] do_syscall_64+0x281/0x940 [ 817.185096] ? __do_page_fault+0xc90/0xc90 [ 817.189306] ? _raw_spin_unlock_irq+0x27/0x70 [ 817.193776] ? finish_task_switch+0x1c1/0x7e0 [ 817.198248] ? syscall_return_slowpath+0x550/0x550 [ 817.203156] ? syscall_return_slowpath+0x2ac/0x550 [ 817.208065] ? prepare_exit_to_usermode+0x350/0x350 [ 817.213058] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 817.218414] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 817.223241] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 817.228404] RIP: 0033:0x4548b9 [ 817.231570] RSP: 002b:00007ff3b28cdc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 817.239256] RAX: ffffffffffffffda RBX: 00007ff3b28ce6d4 RCX: 00000000004548b9 [ 817.246503] RDX: 00000000200002c0 RSI: 0000000020000140 RDI: 0000000020000300 [ 817.253752] RBP: 000000000072bea0 R08: 0000000020000200 R09: 0000000000000000 [ 817.261002] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 817.268251] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000031 [ 817.275657] net/sunrpc/rpc_pipe.c: __rpc_create_common failed to allocate inode for dentry cache 2018/03/29 11:56:11 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x1e1, 0x0, 0x8000000001, 0x5}, 0xfffffffffffffe20) r0 = getpid() r1 = perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0xfffffffffffffffc, 0x3, 0x8, 0x2, 0x0, 0x9, 0x10000, 0xc, 0x3d3, 0x80, 0x5, 0xfffffffffffffffc, 0x8, 0x3f, 0x5d, 0xbbb0, 0x20, 0x3, 0x8000, 0x100000000, 0x8, 0x9, 0x2, 0x4, 0x800, 0xf8, 0x3, 0x9, 0x1, 0x3, 0x8, 0x3, 0x7, 0x10001, 0xf16, 0x2, 0x0, 0x7fffffff, 0x4, @perf_bp={&(0x7f0000000780), 0x1}, 0x4080, 0x10001, 0xcc, 0x7, 0x3, 0xffff, 0x7fffffff}, 0xffffffffffffffff, 0xd, 0xffffffffffffff9c, 0x8) perf_event_open(&(0x7f0000000980)={0x4, 0x70, 0x6, 0x3f, 0x8e, 0x1, 0x0, 0x3, 0x404, 0x0, 0xbc2b, 0x40, 0x7, 0xffff, 0xffff, 0x9, 0x9de2, 0x9, 0x0, 0x3, 0x7f, 0xff, 0x40, 0x400, 0x9, 0x7fffffff, 0x80000000, 0x7, 0x8, 0x10001, 0x1f, 0x2778, 0x800, 0x8001, 0x101, 0x9, 0x8, 0x7ff, 0x0, 0x1000, 0x5, @perf_config_ext={0x3ff, 0xb69b}, 0x3040, 0x2, 0x2, 0x5, 0x7, 0x6, 0x7283ed73}, r0, 0xe, r1, 0x8) bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x0, 0x0, 0x7ffff9, 0x0, 0x20000003, 0x0}, 0x2c) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) r2 = gettid() r3 = perf_event_open(&(0x7f00000008c0)={0x7, 0x70, 0x1, 0x200, 0x3, 0xdbce, 0x0, 0x8, 0x1002, 0x1, 0xffffffffffffff00, 0x8, 0x1, 0xb3fa, 0x8, 0x0, 0x1, 0x2, 0x1000, 0x2, 0x401, 0x8, 0x3, 0x81, 0x0, 0x7, 0x2fc4, 0x882, 0x4, 0x8, 0x3, 0x81, 0x3, 0x7, 0x8857, 0x7, 0x5, 0x9, 0x0, 0x7, 0x1, @perf_config_ext={0x0, 0x80000000}, 0x400, 0x7f, 0x4, 0x7, 0x2, 0x7f, 0x200}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000840)={0x5, 0x70, 0xef, 0x2, 0x1000, 0xffffffff80000000, 0x0, 0x1a7800000000, 0x2000, 0x4, 0x5, 0x6814, 0x3a9, 0x5, 0x63b, 0x6, 0x8, 0x1000, 0x250420ee, 0x3, 0x0, 0x20, 0x6, 0x0, 0x4, 0x5, 0x4, 0x8, 0x3, 0x8, 0x52893dd5, 0x2, 0x2, 0x8, 0x44d, 0x1, 0x8, 0x6, 0x0, 0x100000000, 0x0, @perf_config_ext={0x9, 0x80}, 0x0, 0x0, 0x2b67, 0x6, 0x4b0, 0x81, 0x4}, r2, 0x5, r3, 0xb) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1003, 0x0) mount(&(0x7f00002b9ff8)='./file0\x00', &(0x7f0000cbeff8)='./file0\x00', &(0x7f00005f7ffa)='ramfs\x00', 0x80000, &(0x7f000002f000)) mount(&(0x7f0000000000)='.', &(0x7f0000000040)='.', &(0x7f0000000080)='cgroup\x00', 0x5010, &(0x7f00000000c0)) mount(&(0x7f0000377ff8)='.', &(0x7f0000000280)='.', &(0x7f0000000600)='nfs4\x00', 0x5010, &(0x7f0000000300)="2161893416a0c71070768c219eb114c3253c9f3baf4e9e8e9111c1a7fc6e266009fe27243deeaa22ca7ae9341f714300b5ee807e55d609036f2a3260475922bdfb2d2849f1c3b2ad3c051bd4f3751a177f77a92758c6d2b23fe7f1535b54e5846d11c135de8286066dec1b25f6e1378944ac5f7fce42d055821b5e19") perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xd68, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f0000014f88)={0x5, 0xfffffffffffffdc4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x46000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = getpid() perf_event_open(&(0x7f0000000680)={0x4, 0x70, 0x64, 0xffff, 0x1f, 0x4, 0x0, 0x1c3, 0x0, 0x1, 0x1, 0x9, 0x1ff, 0xfffffffffffffff8, 0x0, 0x0, 0x6, 0x7fffffff, 0x0, 0xffffffff, 0x80000001, 0xd0, 0x7, 0x1f, 0x0, 0x8, 0x9, 0x1ff, 0x8, 0x785, 0x4, 0xff, 0x2, 0x656, 0x5000000, 0x1, 0x460e3be0, 0x1, 0x0, 0x0, 0x7, @perf_bp={&(0x7f0000000640), 0x1}, 0x1000, 0xa, 0x7fff, 0x7, 0x3, 0x400, 0x9}, r5, 0xe, r4, 0x1) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', 0x0, 0x10}, 0x10) close(0xffffffffffffffff) bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)={&(0x7f0000000040)='./file0\x00', 0x0, 0x18}, 0x10) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000100)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0, 0x2e, &(0x7f0000000440), &(0x7f0000000140)=""/46, 0x4229}, 0x28) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000003480)={&(0x7f0000003300)=@can={0x0, 0x0}, 0x80, &(0x7f0000003400)=[{&(0x7f0000003380)=""/56, 0x38}, {&(0x7f00000033c0)=""/1, 0x1}], 0x2, &(0x7f0000003440)=""/33, 0x21, 0x1}, 0x40010000) bpf$PROG_LOAD(0x5, &(0x7f00000034c0)={0xe, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="1800000002000000000000004ce700002555fdff00000000002371d07c9ba7f4a23372b0ad61000000000000009500000000000000"], &(0x7f00000007c0)='GPL\x00', 0x3, 0x2d, &(0x7f0000000800)=""/45, 0x40f00, 0x1, [], r6}, 0x48) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000740)={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x10) socketpair$inet(0x2, 0x80a, 0x81, &(0x7f0000000240)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={0xffffffffffffffff, &(0x7f0000000500)="ae30f1bca1b4d3f69f1aac81517d42ad5980bc63b5008616a1f4724b9f8c1e4ecd8de336f57dd727cdaab04f0b40f28612615ad08de414711d841a88db33fd33884b627074213a0c5de3be2bbaec9207d9865c47f240467849979b5ab5632376608fc4be41a274abb2dc07cabe344a18db51048e5b0cbda843905a4258cdee3e649eddf104ba78894dce09747dcfe6a8d6d6d985520eeef448b83a8bcb83074541ba7a20d6094aa206c01a0690e5b3bfa05d475eb382b0199031d22bb26cde9b1ca0055eef9f6c4993b71ba19ba0590bb5efdaddaa574c25356ca890d138fc9fe0e975b6d5a1a8251503cd0a91845f9d95", &(0x7f0000000480)="9bc7741ea5e524cc8c6f748a73153834428729c45bf4ad446d2dddf1978baf431d0ba35b5442b5afe22db8b003650320200af7e1368ef7cdfa79ca8b9d3564363a5d2a502970314f2264c883bc8d990afc003e5adb95b30edad245c4420c8126f1d33db75ff0230698eaff90055e0f", 0x2}, 0x20) socketpair(0x0, 0x80003, 0xffff, &(0x7f0000000380)={0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r7, 0x50, &(0x7f00000003c0)}, 0x10) 2018/03/29 11:56:11 executing program 0: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000180)={&(0x7f0000000380)='./file0/file0\x00', 0x0, 0x18}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r0, 0x28, &(0x7f00000001c0)}, 0x10) r1 = socket$kcm(0x29, 0x5, 0x0) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000c00)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000bc0)={r2}) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000001a40)={0xffffffffffffffff}) recvmsg$kcm(r3, &(0x7f0000000540)={&(0x7f00000000c0)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @broadcast}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000240)=""/65, 0x41}], 0x1, &(0x7f0000000440)=""/213, 0xd5}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x8983, &(0x7f0000000040)) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000080)) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000019c0)={0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000000140)="0253eea6a53cc0eae389e9a13e5f2046d0633eebde90f446c1b1eabbd0adb42dfcefb37a3df93feb3d5e76dc353ecf23fe9c81afa5", 0x35}, {&(0x7f00000002c0)}, {&(0x7f0000000400)}, {&(0x7f0000001600)}], 0x4, &(0x7f0000001700)=[{0x68, 0x107, 0x25047dc1, "755cd1e9e23de47cb15819d813deb534cee2d9497c58eba5bd8a228407fb709d70f16afa73f4924f12ecc429b6fd356748940b62ee5f5685ce027fe4e6c60a8f88cd1a5827d099f5849f09bd37f681e29814e6bb"}, {0x10, 0x0, 0x1ff}, {0x10, 0x107, 0x80000001}], 0x88}, 0x48800) sendmsg$kcm(r3, &(0x7f0000000b80)={&(0x7f00000002c0)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000000)="7368d1d9722f25ea405d5afe4f217ab7eff92ba7fce242868e7e6b7db8973415cf1a35d2bf00aa19a04d6e693ba7f3c5ce678bb9e8af3542be409b9c26", 0x3d}, {&(0x7f0000000580)="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", 0xfc}, {&(0x7f0000000680)="86400657868f83afacd973ed4c84a00a0cb2f77543954a0daad1b0e39814b96a90effaeb009a20cdd3fe5d1ee1c518366140fa9d775b5b7cc7978ceb8726da6e106c90220303c4bcc0daf2e1fcfb0ea4f9353f6e74e39dd846d5e73c8e3e0b4bbbc28160776090151669ed380d6bda985c065c885c97bb988ceaf952c1265af7aa4a", 0x82}, {&(0x7f0000000740)="ab225de34bf0faf43ee910edaa3c0d925ce54cf056d1ce2c2174b39eb1512b76f30a22358040049e6720b4fa14be638d71f695bdfe5443f44e44b5722b79898dd59de5986694554eaed8c3af1d54bdf5d6046f067c9a63b759e78cd14e14b01befef7a5fb2e79f4f7d04f291577fb24845342ccdc29ac369faf5b8f36a88", 0x7e}, {&(0x7f0000000340)="b57ac3a3b93ff79fa827a04dce1f0155927af9e29fcea71e10aade55d74a265f461c077a3295120d3d9664dae548def416a7", 0x32}, {&(0x7f0000000400)="105a", 0x2}, {&(0x7f00000007c0)="895e7db06b761015d2491b5b26e037da5af1628262d63af8adbdec73f20298337d98229ca060f39900792b0c679c1c8fbbe78f976141e5c120c0fd0c5c9f592ec29abd860bcf3b5c33c9748e3791d94cabf917c9cd7cfc891d24ed860224a93f94ac7c3221ba79458747fd237e106c14901616931a49540da5b5c1ca75ef83be7bbd0ae7557fd667b274021173e5ce178365a7dba558c6eb3c392c4f935a13cd564099e3232201139a9953c08f091883650d435a69db9993952a7c3d88aa575156a77344db4cfa404b742d50406fd8f5a8d023a75437fe5ce8e048db", 0xdc}, {&(0x7f00000008c0)="911078e1e585c89fc1b9487362a32ee152c1a4805fc5aadf21a896ea2e7e5e", 0x1f}, {&(0x7f0000000900)="568a3fe341b8b5f969b4463d5c020f7b19133c3d1a6f4cce645a9fa545485db93ab44973e9c3682ec187306c984d", 0x2e}], 0x9, &(0x7f0000000a00)=[{0x60, 0x88, 0x80, "86d6dd177fb4a374521f865c2ce65b408ed10bb9be3af3dbd01ec6056cb3b78f463b26c47d6173866828355e9f008ce1e0ad60f405a53aa25075686129ed29251f43f8654dfa529b61d256"}, {0xa8, 0x1ff, 0x0, "2a555567edb10732ff6e0c8ffb6c388f3ede5d52268bd7720d991c773f8e4e51b6662e441f30b45ef9e78aaa915e3639f819acf5ac94528d9db75ffc7d8c49bf720ba187023fda6c36e0312ba48363263a5d434e21ddc5d3f9cd79af70b86d40e83b9003d9869498beb77ade3e9298aca83052adda5afa1198104ae165fea9ac5a7cd13bc16bfd3f9de11300f6c578750e"}, {0x30, 0x3a, 0x2, "425f8540fd626255964208c4bec03c80130b66f484008f96737a7a75f6"}, {0x18, 0x112, 0x32, "4e37686550438ef1"}], 0x150, 0x80}, 0x4) 2018/03/29 11:56:11 executing program 3: r0 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x10}, 0x10) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000000c0)={0x0, 0x1000, 0x8}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000080)='./file0\x00', r1}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0x0, 0x8}, 0x10) mount(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='cpuset\x00', 0x40, &(0x7f0000000280)="8a4562cb6a7df38be32246afcaef1e1a3f933cb428242c55c117c0fbbd62cea0aab31f2665fb88267466eca314fc8cafd72cc24143121c0691236768fad66390bf9b55014c2bd49faa5388cbabd52e730eeb4ccc411bacd296e423d971043756cf2b35a4063f2a7465b44a60ef31ae437f6160ed2f63afa62c36a27c33e4779e7c0404e337abc025bb2e4b39cc265573c6ab1a3ff09c7ad6bb4631a4") mount(&(0x7f0000000340)='./file1\x00', &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='devtmpfs\x00', 0x40, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xb, 0x7f, 0x0, 0x1, 0x12, r1, 0x100000000}, 0x2c) mkdir(&(0x7f0000000440)='./file1\x00', 0x20) mount(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='iso9660\x00', 0x8, &(0x7f0000000540)="650fe6ccea2b17860de967406c566ec16fe5a7a4c064707e22906e9d3d2a70b4") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000005c0)={r2, 0x28, &(0x7f0000000580)={0x0, 0x0}}, 0x10) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={r3, 0x8, 0x10}, 0xc) mount(&(0x7f0000000640)='./file1\x00', &(0x7f0000000680)='./file1\x00', &(0x7f00000006c0)='pstore\x00', 0x1000000, &(0x7f0000000700)="f48afa3ab3cc319f917be52b04c388c229578537782bc5ffc32c7747b1d28999ad89f5fba460640a324385ac03cccef4553d641b91d79d014804a98e72796f8eb2e1a7056efeaa63404648df67079ae817420f248ccf9d01e7a027c600c71777fb9ebc97da60f3d1a287ef8bc00f1dc68c3b1f0c1836cde5b62be45dd58c3415cbb0f916fe3c04fc69911e2bec15c208d023bdb608fa727657c532bd5101a2a36b34c4eb65f855fea2d6f8a0a79b15ecef1a4c81a8f6f5ed57b09db2ab482413540416126718f2a33ed21346ded20b084a8dc10702ec279fc486b5c57c163d") socketpair(0x3, 0x2, 0x1f, &(0x7f0000001c40)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$kcm(r6, &(0x7f0000004300)={0x0, 0x0, &(0x7f0000004140)=[{&(0x7f0000001c80)=""/139, 0x8b}, {&(0x7f0000001d40)=""/149, 0x95}, {&(0x7f0000001e00)=""/188, 0xbc}, {&(0x7f0000001ec0)=""/69, 0x45}, {&(0x7f0000001f40)=""/165, 0xa5}, {&(0x7f0000002000)=""/4096, 0x1000}, {&(0x7f0000003000)=""/42, 0x2a}, {&(0x7f0000003040)=""/4096, 0x1000}, {&(0x7f0000004040)=""/233, 0xe9}], 0x9, &(0x7f0000004200)=""/236, 0xec, 0xe00}, 0x40) mount(&(0x7f0000004340)='./file1/file0\x00', &(0x7f0000004380)='./file1\x00', &(0x7f00000043c0)='ceph\x00', 0x4860, &(0x7f0000004400)="2c8eb517dd302be26597065442d58f3f345c295b542b2b1df3046ae176") bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000004600)={r6, &(0x7f0000004440)="903685b47b9c4d5c1dffcefa6a92cd57ccdfaf1af0be272f1cb4a5b86ab9d1ef248a63f04f5d59c2cd6e6b7722f5ff866c5d353014f28baaa95bce06a787a3e085102126a0386ffd4e136d472f2cdfb7c658643d2792b7235e2ec8c782080850c20eb00014eab035d7d56c8ddd0d7fdc4c21602d480e4accea0867cc5b4172b46b8f028bd623c58544092396dbda704543cd7c93219ff7f4caf9d0c12fc32c65ddac48ba22321d2c7ef1152f0dd87ed22cb30eb2b24d381b3abaefc114ad4c08e329cfbce60e0549ca", &(0x7f0000004540)="38859653237c5c9685cf2e44e1eea64846e190b778f29b06c26c2f2b8a0800f9fc2019b05290fc5c82f612eb7f479918015eb3af93cc57f01db731e129275ce05910f66e436ef09a8fe7bf22f960eacec350a7f7e9e9a47cb163f467b6a29523346a4c61d65d2235c73095a53929d509538f640424133cfa3617b41a51aa7172460146433abbe604f2c92827fabd5d3134d36b4cecd0fd2549f3527615f9eb63dd9332021e4eff13ad6aa509db21ed98745d00cb36e547", 0x3}, 0x20) mkdir(&(0x7f0000004640)='./file1/file0\x00', 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000004680)={0x0, 0x0, 0xa6, 0x3, 0x4}, 0x2c) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000046c0)=0x7, 0x4) recvmsg$kcm(r6, &(0x7f00000058c0)={&(0x7f0000004700)=@alg, 0x80, &(0x7f0000005880)=[{&(0x7f0000004780)=""/4096, 0x1000}, {&(0x7f0000005780)=""/219, 0xdb}], 0x2, 0x0, 0x0, 0x100000001}, 0x40000000) r7 = gettid() r8 = perf_event_open(&(0x7f0000005900)={0x7, 0x70, 0x0, 0xfffffffffffffff7, 0x9, 0x4, 0x0, 0x7, 0x100, 0x8, 0x100000000, 0x8000, 0x8, 0x6, 0x0, 0x6, 0x10001, 0x9, 0x1f, 0x2, 0x1, 0x3, 0x1, 0x1f, 0x23, 0x1, 0xaa4, 0x5, 0x4, 0x200, 0x6, 0x9, 0xfffffffffffffffb, 0x3, 0x3, 0xff, 0x80000000, 0x0, 0x0, 0xffffffffffffff9d, 0x2, @perf_config_ext={0x7, 0x9}, 0x100, 0x8, 0x2, 0x6, 0x4, 0x6, 0xf71}, r7, 0x9, r6, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f00000059c0)={&(0x7f0000005980)='./file0\x00'}, 0x10) ioctl$sock_kcm_SIOCKCMATTACH(r5, 0x89e0, &(0x7f0000005a00)={r5, r0}) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000005c00)={r4, &(0x7f0000005a40)="313befc1e9ac680c4369983530ee783c4f018c38e134b4b0aebd06ede05f238850949c0f5d32ab19889f880e87e3a0fa5a43500affdcc508d56f3a4df6c159ca9cfa62124b79b4607d42738dc5e16d09ea2c6a2346fc2360feff08d9f464dfdebce2cb99d4ba8e5fc37edfba041f14e16a68192d7d8687404ee7318323520188c4e5d52e8c7ec40bd0823fb210e530c74ea842bd8bacbc48317b0b6ed12528ecd30e1af83b8049df791ff7affe91ab54", &(0x7f0000005b00)=""/243}, 0x18) mount(&(0x7f0000005c40)='./file1/file0\x00', &(0x7f0000005c80)='./file1\x00', &(0x7f0000005cc0)='btrfs\x00', 0x0, 0x0) recvmsg(r5, &(0x7f00000073c0)={&(0x7f0000005d00)=@sco, 0x80, &(0x7f0000007300)=[{&(0x7f0000005d80)=""/103, 0x67}, {&(0x7f0000005e00)=""/170, 0xaa}, {&(0x7f0000005ec0)=""/252, 0xfc}, {&(0x7f0000005fc0)=""/136, 0x88}, {&(0x7f0000006080)=""/125, 0x7d}, {&(0x7f0000006100)=""/4096, 0x1000}, {&(0x7f0000007100)=""/106, 0x6a}, {&(0x7f0000007180)=""/115, 0x73}, {&(0x7f0000007200)=""/240, 0xf0}], 0x9, 0x0, 0x0, 0x7}, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000007400)={r3, 0x10001, 0x18}, 0xc) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0xc4c) recvmsg$kcm(r6, &(0x7f0000008880)={&(0x7f0000007440)=@l2, 0x80, &(0x7f0000008800)=[{&(0x7f00000074c0)=""/231, 0xe7}, {&(0x7f00000075c0)=""/118, 0x76}, {&(0x7f0000007640)=""/4096, 0x1000}, {&(0x7f0000008640)=""/223, 0xdf}, {&(0x7f0000008740)}, {&(0x7f0000008780)=""/32, 0x20}, {&(0x7f00000087c0)=""/53, 0x35}], 0x7}, 0x10000) 2018/03/29 11:56:11 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x1e1, 0x100000000209e20, 0x8000000001, 0x5}, 0xfffffffffffffe20) r0 = getpid() r1 = perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0xfffffffffffffffc, 0x3, 0x8, 0x2, 0x0, 0x9, 0x10000, 0xc, 0x3d3, 0x80, 0x5, 0xfffffffffffffffc, 0x8, 0x3f, 0x5d, 0xbbb0, 0x20, 0x3, 0x8000, 0x100000000, 0x8, 0x9, 0x2, 0x4, 0x800, 0xf8, 0x3, 0x9, 0x1, 0x3, 0x8, 0x3, 0x7, 0x10001, 0xf16, 0x2, 0x0, 0x7fffffff, 0x4, @perf_bp={&(0x7f0000000780), 0x1}, 0x4080, 0x10001, 0xcc, 0x7, 0x3, 0xffff, 0x7fffffff}, 0xffffffffffffffff, 0xd, 0xffffffffffffff9c, 0x8) perf_event_open(&(0x7f0000000980)={0x4, 0x70, 0x6, 0x3f, 0x8e, 0x1, 0x0, 0x3, 0x404, 0x0, 0xbc2b, 0x40, 0x7, 0xffff, 0xffff, 0x9, 0x9de2, 0x9, 0x0, 0x3, 0x7f, 0xff, 0x40, 0x400, 0x9, 0x7fffffff, 0x80000000, 0x7, 0x8, 0x10001, 0x1f, 0x2778, 0x800, 0x8001, 0x101, 0x9, 0x8, 0x7ff, 0x0, 0x1000, 0x5, @perf_config_ext={0x3ff, 0xb69b}, 0x3040, 0x2, 0x2, 0x5, 0x7, 0x6, 0x7283ed73}, r0, 0xe, r1, 0x8) bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x0, 0x0, 0x7ffff9, 0x0, 0x20000003, 0x0}, 0x2c) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) r2 = gettid() r3 = perf_event_open(&(0x7f00000008c0)={0x7, 0x70, 0x1, 0x200, 0x3, 0xdbce, 0x0, 0x8, 0x1002, 0x1, 0xffffffffffffff00, 0x8, 0x1, 0xb3fa, 0x8, 0x0, 0x1, 0x2, 0x1000, 0x2, 0x401, 0x8, 0x3, 0x81, 0x0, 0x7, 0x2fc4, 0x882, 0x4, 0x8, 0x3, 0x81, 0x3, 0x7, 0x8857, 0x7, 0x5, 0x9, 0x0, 0x7, 0x1, @perf_config_ext={0x0, 0x80000000}, 0x400, 0x7f, 0x4, 0x7, 0x2, 0x7f, 0x200}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000840)={0x5, 0x70, 0xef, 0x2, 0x1000, 0xffffffff80000000, 0x0, 0x1a7800000000, 0x2000, 0x4, 0x5, 0x6814, 0x3a9, 0x5, 0x63b, 0x6, 0x8, 0x1000, 0x250420ee, 0x3, 0x0, 0x20, 0x6, 0x0, 0x4, 0x5, 0x4, 0x8, 0x3, 0x8, 0x52893dd5, 0x2, 0x2, 0x8, 0x44d, 0x1, 0x8, 0x6, 0x0, 0x100000000, 0x0, @perf_config_ext={0x9, 0x80}, 0x0, 0x0, 0x2b67, 0x6, 0x4b0, 0x81, 0x4}, r2, 0x5, r3, 0xb) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1003, 0x0) mount(&(0x7f00002b9ff8)='./file0\x00', &(0x7f0000cbeff8)='./file0\x00', &(0x7f00005f7ffa)='ramfs\x00', 0x80000, &(0x7f000002f000)) mount(&(0x7f0000000000)='.', &(0x7f0000000040)='.', &(0x7f0000000080)='cgroup\x00', 0x5010, &(0x7f00000000c0)) mount(&(0x7f0000377ff8)='.', &(0x7f0000000280)='.', &(0x7f0000000600)='nfs4\x00', 0x5010, &(0x7f0000000300)="2161893416a0c71070768c219eb114c3253c9f3baf4e9e8e9111c1a7fc6e266009fe27243deeaa22ca7ae9341f714300b5ee807e55d609036f2a3260475922bdfb2d2849f1c3b2ad3c051bd4f3751a177f77a92758c6d2b23fe7f1535b54e5846d11c135de8286066dec1b25f6e1378944ac5f7fce42d055821b5e19") perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xd68, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f0000014f88)={0x5, 0xfffffffffffffdc4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x46000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = getpid() perf_event_open(&(0x7f0000000680)={0x4, 0x70, 0x64, 0xffff, 0x1f, 0x4, 0x0, 0x1c3, 0x0, 0x1, 0x1, 0x9, 0x1ff, 0xfffffffffffffff8, 0x0, 0x0, 0x6, 0x7fffffff, 0x4, 0xffffffff, 0x80000001, 0xd0, 0x7, 0x1f, 0x0, 0x8, 0x9, 0x1ff, 0x8, 0x785, 0x4, 0xff, 0x2, 0x656, 0x5000000, 0x1, 0x460e3be0, 0x1, 0x0, 0x0, 0x7, @perf_bp={&(0x7f0000000640), 0x1}, 0x1000, 0xa, 0x7fff, 0x7, 0x3, 0x400, 0x9}, r5, 0xe, r4, 0x1) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', 0x0, 0x10}, 0x10) close(0xffffffffffffffff) bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)={&(0x7f0000000040)='./file0\x00', 0x0, 0x18}, 0x10) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000100)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0, 0x2e, &(0x7f0000000440), &(0x7f0000000140)=""/46, 0x4229}, 0x28) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000003480)={&(0x7f0000003300)=@can={0x0, 0x0}, 0x80, &(0x7f0000003400)=[{&(0x7f0000003380)=""/56, 0x38}, {&(0x7f00000033c0)=""/1, 0x1}], 0x2, &(0x7f0000003440)=""/33, 0x21, 0x1}, 0x40010000) bpf$PROG_LOAD(0x5, &(0x7f00000034c0)={0xe, 0x6, &(0x7f0000000940)=ANY=[@ANYBLOB="1800000002000000000000004ce700002555fdff00000000002371d07c9ba7f4a23372b0ad610000000000000095000000000000"], &(0x7f00000007c0)='GPL\x00', 0x3, 0x2d, &(0x7f0000000800)=""/45, 0x40f00, 0x1, [], r6}, 0x48) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000740)={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x10) socketpair$inet(0x2, 0x80a, 0x81, &(0x7f0000000240)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={0xffffffffffffffff, &(0x7f0000000500)="ae30f1bca1b4d3f69f1aac81517d42ad5980bc63b5008616a1f4724b9f8c1e4ecd8de336f57dd727cdaab04f0b40f28612615ad08de414711d841a88db33fd33884b627074213a0c5de3be2bbaec9207d9865c47f240467849979b5ab5632376608fc4be41a274abb2dc07cabe344a18db51048e5b0cbda843905a4258cdee3e649eddf104ba78894dce09747dcfe6a8d6d6d985520eeef448b83a8bcb83074541ba7a20d6094aa206c01a0690e5b3bfa05d475eb382b0199031d22bb26cde9b1ca0055eef9f6c4993b71ba19ba0590bb5efdaddaa574c25356ca890d138fc9fe0e975b6d5a1a8251503cd0a91845f9d95", &(0x7f0000000480)="9bc7741ea5e524cc8c6f748a73153834428729c45bf4ad446d2dddf1978baf431d0ba35b5442b5afe22db8b003650320200af7e1368ef7cdfa79ca8b9d3564363a5d2a502970314f2264c883bc8d990afc003e5adb95b30edad245c4420c8126f1d33db75ff0230698eaff90055e0f", 0x2}, 0x20) socketpair(0x0, 0x80003, 0xffff, &(0x7f0000000380)={0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r7, 0x50, &(0x7f00000003c0)}, 0x10) 2018/03/29 11:56:11 executing program 4 (fault-call:8 fault-nth:50): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x3, &(0x7f0000002000)=@framed={{0x18}, [], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000680)={0xffffffffffffffff, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x7}, 0x28) recvmsg(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000001c0)) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000100)=r0, 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) recvmsg(r3, &(0x7f00000011c0)={&(0x7f0000000b40)=@can, 0x80, &(0x7f0000001100)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f0000000c80)=""/169, 0xa9}, {&(0x7f0000000d40)=""/229, 0xe5}, {&(0x7f0000000e40)=""/128, 0x80}, {&(0x7f0000000ec0)=""/48, 0x30}, {&(0x7f0000000f00)=""/137, 0x89}, {&(0x7f0000006000)=""/4096, 0x1000}, {&(0x7f0000007000)=""/4096, 0x1000}, {&(0x7f0000001080)=""/127, 0x7f}, {&(0x7f0000008000)=""/4096, 0x1000}], 0xa, 0x0, 0x0, 0x1}, 0x2020) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001200)={0x7, 0x4, 0x0, 0x4, 0x8, 0xffffffffffffffff, 0x9}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x1000000007, 0xcf2e, 0x7e, 0x20, 0x15, r1, 0x4}, 0x2c) socketpair(0x3, 0x80e, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r4, &(0x7f0000000200)={&(0x7f0000000fc0)=@pppol2tp={0x18, 0x1, {0x0, r3, {0x2, 0x4e20, @broadcast=0xffffffff}, 0x1, 0x3, 0x0, 0x2}}, 0x80, &(0x7f0000001580)=[{&(0x7f0000001240)="95c4dcff0f017b3c1979888e50f6c20a37b4edaffb28a3b609d24a8180434ab2fac426d3e4fc87e18267002be3cd56b11d69c4db739bf6a9c91af67ee87be1ea522993a368bdfc0df55539a60ef5515b4f03f3dbddae65cd66a90f030118870b473f156cb9a18624103000608c63f84b09ea89bfb8d8e7705c6ef456ef28adec5e566632ddd63098", 0x88}, {&(0x7f0000001380)="5745869bf3b6f562576761d821af2ad55c2f81345c810d6dbd43facd33c5107488aa7f04c5ab1302b820cd31405e9f657776a0d48e2225f39aabc3de0b30dc7422503b448ad89c23ebaee24ae9696e4e58eccae5febf47fff53dc1f03d869303acdef233746263c5c567e84edb166010fd23f56d6e84406bced5a00b5016b0c700fd76218ecf5da3527552a683eb87aa4b246cd74bcbeff8dedec74332e0214e4dc64cb7ac24c4447843caa7550375ef8e1f74a78c40a617e913a25e4837d24fb09e93eaa2", 0xc5}, {&(0x7f0000001480)="8247f46d4324760570d5078149dc5b38f7d1c592564148ecc6262e91c29cd4344e423ff476882993a2844af9a7c306a15e659a4cb9230b5139842c87ad8fa95c202146730fa610b141dfe4c7b771b46e4db879d2b92a01cb8642100d80a1d4658fd0df05c06c8615960a92b690c728e2603373657a9a46b2f200f2895198694d470ab95b6eb7a76ccee67c9219b4afa289d70c87cf22c733e00700f345136d59bcbd89ce7e110746f91e7a7661b8eb0afe54e3cb1c712441dd9a6ffb59a2eb58e5f5eabd4bec428fe27a403bb0d19125e473abdfea87a0c89108e3c876438a7c3f84bebad6cf858f26d2083efd60", 0xee}], 0x3, &(0x7f000000a000)=[{0x88, 0x112, 0xc2, "6671b4b66ac2fb4e14cee671813dc3834802e601529feb049ebb70880567948953018cfd53d7b1c9be27b1084adfba62040c7f889cfbc15407d93133259d9d5052bf6648a69218702e35278939ad399dc3ebed233c1792c7c1204353c8fe75ea0398f4aaf830834bc93873c119dddc539c"}, {0xe8, 0x6f180cc1befb202, 0x9, "4577f77fd3b3acd92c96feff8b0409afeae1c16fa3d367241c9679e5105141c7205d47ce27a418c10fbe7f601c3142e7b7b3a67322c9d345e0baf4315e13dc771a962ff445015c98a70b319d46ba59155d1cf07827804ea1ca86db74f3029bd60f6f365d955ec12be30102e59b4b3940152988ef09443df596bad9525f697fad61507e856c6acb744cfb034863943e811bd378843ccbd95f8221a444f4c323a391f5788559f34ac02e6e18065b87e8c962353623250694e5b4bf9bc1b00fadf2875995067ff6c18590c207f9a83f06665f5b5af77b4e"}, {0xa0, 0x10f, 0x5, "07c5972c79a30903d5d93f57c962c0351628551f6a3fbac8e18984ad9b8caeb403f1d588fa0b9955ce44d018cbcc06ad98b588dd45fd0ccd6b8d1965e70693ec76dd521aa2693829ef54059dc3191f2f4eca64c63f2f901ead2d6c54f0119212ebb77e956117d9130d3adff30a5598567fd540cf0a8f9f8c469ad15f209ad8ef161006831b39e4ddf2fcd748a8629e33"}], 0x210, 0x40}, 0x40) close(r0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b53596090ebcc07d8584f358be88fafe") recvmsg(r2, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) recvmsg$kcm(r4, &(0x7f0000001a00)={0x0, 0x0, &(0x7f00000018c0)=[{&(0x7f0000001600)=""/173, 0xad}, {&(0x7f0000001040)=""/25, 0x19}, {&(0x7f00000016c0)=""/132, 0x84}, {&(0x7f0000001780)=""/91, 0x5b}, {&(0x7f0000001800)=""/183, 0xb7}], 0x5, &(0x7f0000001940)=""/163, 0xa3, 0xe43}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000a80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r5}, 0x48) 2018/03/29 11:56:11 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x3, &(0x7f0000002000)=@framed={{0x18}, [], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000680)={0xffffffffffffffff, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x7}, 0x28) recvmsg(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000001c0)) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000100), 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) recvmsg(r3, &(0x7f00000011c0)={&(0x7f0000000b40)=@can, 0x80, &(0x7f0000001100)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f0000000c80)=""/169, 0xa9}, {&(0x7f0000000d40)=""/229, 0xe5}, {&(0x7f0000000e40)=""/128, 0x80}, {&(0x7f0000000ec0)=""/48, 0x30}, {&(0x7f0000000f00)=""/137, 0x89}, {&(0x7f0000006000)=""/4096, 0x1000}, {&(0x7f0000007000)=""/4096, 0x1000}, {&(0x7f0000001080)=""/127, 0x7f}, {&(0x7f0000008000)=""/4096, 0x1000}], 0xa, 0x0, 0x0, 0x1}, 0x2020) bpf$MAP_CREATE(0x0, &(0x7f0000001200)={0x7, 0x4, 0x0, 0x4, 0x8, 0xffffffffffffffff, 0x9}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x1000000007, 0xcf2e, 0x7e, 0x20, 0x15, r1, 0x4}, 0x2c) socketpair(0x3, 0x80e, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r4, &(0x7f0000000200)={&(0x7f0000000fc0)=@pppol2tp={0x18, 0x1, {0x0, r3, {0x2, 0x4e20, @broadcast=0xffffffff}, 0x1, 0x3, 0x0, 0x2}}, 0x80, &(0x7f0000001580)=[{&(0x7f0000001240)="95c4dcff0f017b3c1979888e50f6c20a37b4edaffb28a3b609d24a8180434ab2fac426d3e4fc87e18267002be3cd56b11d69c4db739bf6a9c91af67ee87be1ea522993a368bdfc0df55539a60ef5515b4f03f3dbddae65cd66a90f030118870b473f156cb9a18624103000608c63f84b09ea89bfb8d8e7705c6ef456ef28adec5e566632ddd63098", 0x88}, {&(0x7f0000001380)="5745869bf3b6f562576761d821af2ad55c2f81345c810d6dbd43facd33c5107488aa7f04c5ab1302b820cd31405e9f657776a0d48e2225f39aabc3de0b30dc7422503b448ad89c23ebaee24ae9696e4e58eccae5febf47fff53dc1f03d869303acdef233746263c5c567e84edb166010fd23f56d6e84406bced5a00b5016b0c700fd76218ecf5da3527552a683eb87aa4b246cd74bcbeff8dedec74332e0214e4dc64cb7ac24c4447843caa7550375ef8e1f74a78c40a617e913a25e4837d24fb09e93eaa2", 0xc5}, {&(0x7f0000001480)="8247f46d4324760570d5078149dc5b38f7d1c592564148ecc6262e91c29cd4344e423ff476882993a2844af9a7c306a15e659a4cb9230b5139842c87ad8fa95c202146730fa610b141dfe4c7b771b46e4db879d2b92a01cb8642100d80a1d4658fd0df05c06c8615960a92b690c728e2603373657a9a46b2f200f2895198694d470ab95b6eb7a76ccee67c9219b4afa289d70c87cf22c733e00700f345136d59bcbd89ce7e110746f91e7a7661b8eb0afe54e3cb1c712441dd9a6ffb59a2eb58e5f5eabd4bec428fe27a403bb0d19125e473abdfea87a0c89108e3c876438a7c3f84bebad6cf858f26d2083efd60", 0xee}], 0x3, &(0x7f000000a000)=[{0x88, 0x112, 0xc2, "6671b4b66ac2fb4e14cee671813dc3834802e601529feb049ebb70880567948953018cfd53d7b1c9be27b1084adfba62040c7f889cfbc15407d93133259d9d5052bf6648a69218702e35278939ad399dc3ebed233c1792c7c1204353c8fe75ea0398f4aaf830834bc93873c119dddc539c"}, {0xe8, 0x6f180cc1befb202, 0x9, "4577f77fd3b3acd92c96feff8b0409afeae1c16fa3d367241c9679e5105141c7205d47ce27a418c10fbe7f601c3142e7b7b3a67322c9d345e0baf4315e13dc771a962ff445015c98a70b319d46ba59155d1cf07827804ea1ca86db74f3029bd60f6f365d955ec12be30102e59b4b3940152988ef09443df596bad9525f697fad61507e856c6acb744cfb034863943e811bd378843ccbd95f8221a444f4c323a391f5788559f34ac02e6e18065b87e8c962353623250694e5b4bf9bc1b00fadf2875995067ff6c18590c207f9a83f06665f5b5af77b4e"}, {0xa0, 0x10f, 0x5, "07c5972c79a30903d5d93f57c962c0351628551f6a3fbac8e18984ad9b8caeb403f1d588fa0b9955ce44d018cbcc06ad98b588dd45fd0ccd6b8d1965e70693ec76dd521aa2693829ef54059dc3191f2f4eca64c63f2f901ead2d6c54f0119212ebb77e956117d9130d3adff30a5598567fd540cf0a8f9f8c469ad15f209ad8ef161006831b39e4ddf2fcd748a8629e33"}], 0x210, 0x40}, 0x40) close(r0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)) recvmsg(r2, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) recvmsg$kcm(r4, &(0x7f0000001a00)={0x0, 0x0, &(0x7f00000018c0)=[{&(0x7f0000001600)=""/173, 0xad}, {&(0x7f0000001040)=""/25, 0x19}, {&(0x7f00000016c0)=""/132, 0x84}, {&(0x7f0000001780)=""/91, 0x5b}, {&(0x7f0000001800)=""/183, 0xb7}], 0x5, &(0x7f0000001940)=""/163, 0xa3, 0xe43}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000a80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r5}, 0x48) 2018/03/29 11:56:11 executing program 6: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x3, &(0x7f0000002000)=@framed={{0x18}, [], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000680)={0xffffffffffffffff, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x7}, 0x28) recvmsg(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000001c0)) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000100)=r0, 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) recvmsg(r3, &(0x7f00000011c0)={&(0x7f0000000b40)=@can, 0x80, &(0x7f0000001100)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f0000000c80)=""/169, 0xa9}, {&(0x7f0000000d40)=""/229, 0xe5}, {&(0x7f0000000e40)=""/128, 0x80}, {&(0x7f0000000ec0)=""/48, 0x30}, {&(0x7f0000000f00)=""/137, 0x89}, {&(0x7f0000006000)=""/4096, 0x1000}, {&(0x7f0000007000)=""/4096, 0x1000}, {&(0x7f0000008000)=""/4096, 0x1000}], 0x9, 0x0, 0x0, 0x1}, 0x2020) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001200)={0x7, 0x4, 0x0, 0x4, 0x8, 0xffffffffffffffff, 0x9}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x1000000007, 0xcf2e, 0x7e, 0x20, 0x15, r1, 0x4}, 0x2c) socketpair(0x3, 0x80e, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r4, &(0x7f0000000200)={&(0x7f0000000fc0)=@pppol2tp={0x18, 0x1, {0x0, r3, {0x2, 0x4e20, @broadcast=0xffffffff}, 0x1, 0x3, 0x0, 0x2}}, 0x80, &(0x7f0000001580)=[{&(0x7f0000001240)="95c4dcff0f017b3c1979888e50f6c20a37b4edaffb28a3b609d24a8180434ab2fac426d3e4fc87e18267002be3cd56b11d69c4db739bf6a9c91af67ee87be1ea522993a368bdfc0df55539a60ef5515b4f03f3dbddae65cd66a90f030118870b473f156cb9a18624103000608c63f84b09ea89bfb8d8e7705c6ef456ef28adec5e566632ddd63098", 0x88}, {&(0x7f0000001380)="5745869bf3b6f562576761d821af2ad55c2f81345c810d6dbd43facd33c5107488aa7f04c5ab1302b820cd31405e9f657776a0d48e2225f39aabc3de0b30dc7422503b448ad89c23ebaee24ae9696e4e58eccae5febf47fff53dc1f03d869303acdef233746263c5c567e84edb166010fd23f56d6e84406bced5a00b5016b0c700fd76218ecf5da3527552a683eb87aa4b246cd74bcbeff8dedec74332e0214e4dc64cb7ac24c4447843caa7550375ef8e1f74a78c40a617e913a25e4837d24fb09e93eaa2", 0xc5}, {&(0x7f0000001480)="8247f46d4324760570d5078149dc5b38f7d1c592564148ecc6262e91c29cd4344e423ff476882993a2844af9a7c306a15e659a4cb9230b5139842c87ad8fa95c202146730fa610b141dfe4c7b771b46e4db879d2b92a01cb8642100d80a1d4658fd0df05c06c8615960a92b690c728e2603373657a9a46b2f200f2895198694d470ab95b6eb7a76ccee67c9219b4afa289d70c87cf22c733e00700f345136d59bcbd89ce7e110746f91e7a7661b8eb0afe54e3cb1c712441dd9a6ffb59a2eb58e5f5eabd4bec428fe27a403bb0d19125e473abdfea87a0c89108e3c876438a7c3f84bebad6cf858f26d2083efd60", 0xee}], 0x3, &(0x7f000000a000)=[{0x88, 0x112, 0xc2, "6671b4b66ac2fb4e14cee671813dc3834802e601529feb049ebb70880567948953018cfd53d7b1c9be27b1084adfba62040c7f889cfbc15407d93133259d9d5052bf6648a69218702e35278939ad399dc3ebed233c1792c7c1204353c8fe75ea0398f4aaf830834bc93873c119dddc539c"}, {0xe8, 0x6f180cc1befb202, 0x9, "4577f77fd3b3acd92c96feff8b0409afeae1c16fa3d367241c9679e5105141c7205d47ce27a418c10fbe7f601c3142e7b7b3a67322c9d345e0baf4315e13dc771a962ff445015c98a70b319d46ba59155d1cf07827804ea1ca86db74f3029bd60f6f365d955ec12be30102e59b4b3940152988ef09443df596bad9525f697fad61507e856c6acb744cfb034863943e811bd378843ccbd95f8221a444f4c323a391f5788559f34ac02e6e18065b87e8c962353623250694e5b4bf9bc1b00fadf2875995067ff6c18590c207f9a83f06665f5b5af77b4e"}, {0xa0, 0x10f, 0x5, "07c5972c79a30903d5d93f57c962c0351628551f6a3fbac8e18984ad9b8caeb403f1d588fa0b9955ce44d018cbcc06ad98b588dd45fd0ccd6b8d1965e70693ec76dd521aa2693829ef54059dc3191f2f4eca64c63f2f901ead2d6c54f0119212ebb77e956117d9130d3adff30a5598567fd540cf0a8f9f8c469ad15f209ad8ef161006831b39e4ddf2fcd748a8629e33"}], 0x210, 0x40}, 0x40) close(r0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)) recvmsg(r2, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) recvmsg$kcm(r4, &(0x7f0000001a00)={0x0, 0x0, &(0x7f00000018c0)=[{&(0x7f0000001600)=""/173, 0xad}, {&(0x7f0000001040)=""/25, 0x19}, {&(0x7f00000016c0)=""/132, 0x84}, {&(0x7f0000001780)=""/91, 0x5b}, {&(0x7f0000001800)=""/183, 0xb7}], 0x5, &(0x7f0000001940)=""/163, 0xa3, 0xe43}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000a80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r5}, 0x48) 2018/03/29 11:56:11 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x3, &(0x7f0000002000)=@framed={{0x18}, [], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000680)={0xffffffffffffffff, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x7}, 0x28) recvmsg(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x7, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000100)=r0, 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) recvmsg(r2, &(0x7f00000011c0)={&(0x7f0000000b40)=@can, 0x80, &(0x7f0000001100)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f0000000c80)=""/169, 0xa9}, {&(0x7f0000000d40)=""/229, 0xe5}, {&(0x7f0000000e40)=""/128, 0x80}, {&(0x7f0000000ec0)=""/48, 0x30}, {&(0x7f0000000f00)=""/137, 0x89}, {&(0x7f0000006000)=""/4096, 0x1000}, {&(0x7f0000007000)=""/4096, 0x1000}, {&(0x7f0000001080)=""/127, 0x7f}, {&(0x7f0000008000)=""/4096, 0x1000}], 0xa, 0x0, 0x0, 0x1}, 0x2020) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001200)={0x7, 0x4, 0x0, 0x4, 0x8, 0xffffffffffffffff, 0x9}, 0x2c) socketpair(0x3, 0x80e, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r3, &(0x7f0000000200)={&(0x7f0000000fc0)=@pppol2tp={0x18, 0x1, {0x0, r2, {0x2, 0x4e20, @broadcast=0xffffffff}, 0x1, 0x3, 0x0, 0x2}}, 0x80, &(0x7f0000001580)=[{&(0x7f0000001240)="95c4dcff0f017b3c1979888e50f6c20a37b4edaffb28a3b609d24a8180434ab2fac426d3e4fc87e18267002be3cd56b11d69c4db739bf6a9c91af67ee87be1ea522993a368bdfc0df55539a60ef5515b4f03f3dbddae65cd66a90f030118870b473f156cb9a18624103000608c63f84b09ea89bfb8d8e7705c6ef456ef28adec5e566632ddd63098", 0x88}, {&(0x7f0000001380)="5745869bf3b6f562576761d821af2ad55c2f81345c810d6dbd43facd33c5107488aa7f04c5ab1302b820cd31405e9f657776a0d48e2225f39aabc3de0b30dc7422503b448ad89c23ebaee24ae9696e4e58eccae5febf47fff53dc1f03d869303acdef233746263c5c567e84edb166010fd23f56d6e84406bced5a00b5016b0c700fd76218ecf5da3527552a683eb87aa4b246cd74bcbeff8dedec74332e0214e4dc64cb7ac24c4447843caa7550375ef8e1f74a78c40a617e913a25e4837d24fb09e93eaa2", 0xc5}, {&(0x7f0000001480)="8247f46d4324760570d5078149dc5b38f7d1c592564148ecc6262e91c29cd4344e423ff476882993a2844af9a7c306a15e659a4cb9230b5139842c87ad8fa95c202146730fa610b141dfe4c7b771b46e4db879d2b92a01cb8642100d80a1d4658fd0df05c06c8615960a92b690c728e2603373657a9a46b2f200f2895198694d470ab95b6eb7a76ccee67c9219b4afa289d70c87cf22c733e00700f345136d59bcbd89ce7e110746f91e7a7661b8eb0afe54e3cb1c712441dd9a6ffb59a2eb58e5f5eabd4bec428fe27a403bb0d19125e473abdfea87a0c89108e3c876438a7c3f84bebad6cf858f26d2083efd60", 0xee}], 0x3, &(0x7f000000a000)=[{0x88, 0x112, 0xc2, "6671b4b66ac2fb4e14cee671813dc3834802e601529feb049ebb70880567948953018cfd53d7b1c9be27b1084adfba62040c7f889cfbc15407d93133259d9d5052bf6648a69218702e35278939ad399dc3ebed233c1792c7c1204353c8fe75ea0398f4aaf830834bc93873c119dddc539c"}, {0xe8, 0x6f180cc1befb202, 0x9, "4577f77fd3b3acd92c96feff8b0409afeae1c16fa3d367241c9679e5105141c7205d47ce27a418c10fbe7f601c3142e7b7b3a67322c9d345e0baf4315e13dc771a962ff445015c98a70b319d46ba59155d1cf07827804ea1ca86db74f3029bd60f6f365d955ec12be30102e59b4b3940152988ef09443df596bad9525f697fad61507e856c6acb744cfb034863943e811bd378843ccbd95f8221a444f4c323a391f5788559f34ac02e6e18065b87e8c962353623250694e5b4bf9bc1b00fadf2875995067ff6c18590c207f9a83f06665f5b5af77b4e"}, {0xa0, 0x10f, 0x5, "07c5972c79a30903d5d93f57c962c0351628551f6a3fbac8e18984ad9b8caeb403f1d588fa0b9955ce44d018cbcc06ad98b588dd45fd0ccd6b8d1965e70693ec76dd521aa2693829ef54059dc3191f2f4eca64c63f2f901ead2d6c54f0119212ebb77e956117d9130d3adff30a5598567fd540cf0a8f9f8c469ad15f209ad8ef161006831b39e4ddf2fcd748a8629e33"}], 0x210, 0x40}, 0x40) close(r0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)) recvmsg(r1, &(0x7f00000267c0)={&(0x7f00000251c0)=@can, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) [ 817.284879] net/sunrpc/rpc_pipe.c: rpc_populate failed to populate directory / 2018/03/29 11:56:11 executing program 4 (fault-call:8 fault-nth:51): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x3, &(0x7f0000002000)=@framed={{0x18}, [], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000680)={0xffffffffffffffff, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x7}, 0x28) recvmsg(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000001c0)) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000100)=r0, 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) recvmsg(r3, &(0x7f00000011c0)={&(0x7f0000000b40)=@can, 0x80, &(0x7f0000001100)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f0000000c80)=""/169, 0xa9}, {&(0x7f0000000d40)=""/229, 0xe5}, {&(0x7f0000000e40)=""/128, 0x80}, {&(0x7f0000000ec0)=""/48, 0x30}, {&(0x7f0000000f00)=""/137, 0x89}, {&(0x7f0000006000)=""/4096, 0x1000}, {&(0x7f0000007000)=""/4096, 0x1000}, {&(0x7f0000001080)=""/127, 0x7f}, {&(0x7f0000008000)=""/4096, 0x1000}], 0xa, 0x0, 0x0, 0x1}, 0x2020) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001200)={0x7, 0x4, 0x0, 0x4, 0x8, 0xffffffffffffffff, 0x9}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x1000000007, 0xcf2e, 0x7e, 0x20, 0x15, r1, 0x4}, 0x2c) socketpair(0x3, 0x80e, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r4, &(0x7f0000000200)={&(0x7f0000000fc0)=@pppol2tp={0x18, 0x1, {0x0, r3, {0x2, 0x4e20, @broadcast=0xffffffff}, 0x1, 0x3, 0x0, 0x2}}, 0x80, &(0x7f0000001580)=[{&(0x7f0000001240)="95c4dcff0f017b3c1979888e50f6c20a37b4edaffb28a3b609d24a8180434ab2fac426d3e4fc87e18267002be3cd56b11d69c4db739bf6a9c91af67ee87be1ea522993a368bdfc0df55539a60ef5515b4f03f3dbddae65cd66a90f030118870b473f156cb9a18624103000608c63f84b09ea89bfb8d8e7705c6ef456ef28adec5e566632ddd63098", 0x88}, {&(0x7f0000001380)="5745869bf3b6f562576761d821af2ad55c2f81345c810d6dbd43facd33c5107488aa7f04c5ab1302b820cd31405e9f657776a0d48e2225f39aabc3de0b30dc7422503b448ad89c23ebaee24ae9696e4e58eccae5febf47fff53dc1f03d869303acdef233746263c5c567e84edb166010fd23f56d6e84406bced5a00b5016b0c700fd76218ecf5da3527552a683eb87aa4b246cd74bcbeff8dedec74332e0214e4dc64cb7ac24c4447843caa7550375ef8e1f74a78c40a617e913a25e4837d24fb09e93eaa2", 0xc5}, {&(0x7f0000001480)="8247f46d4324760570d5078149dc5b38f7d1c592564148ecc6262e91c29cd4344e423ff476882993a2844af9a7c306a15e659a4cb9230b5139842c87ad8fa95c202146730fa610b141dfe4c7b771b46e4db879d2b92a01cb8642100d80a1d4658fd0df05c06c8615960a92b690c728e2603373657a9a46b2f200f2895198694d470ab95b6eb7a76ccee67c9219b4afa289d70c87cf22c733e00700f345136d59bcbd89ce7e110746f91e7a7661b8eb0afe54e3cb1c712441dd9a6ffb59a2eb58e5f5eabd4bec428fe27a403bb0d19125e473abdfea87a0c89108e3c876438a7c3f84bebad6cf858f26d2083efd60", 0xee}], 0x3, &(0x7f000000a000)=[{0x88, 0x112, 0xc2, "6671b4b66ac2fb4e14cee671813dc3834802e601529feb049ebb70880567948953018cfd53d7b1c9be27b1084adfba62040c7f889cfbc15407d93133259d9d5052bf6648a69218702e35278939ad399dc3ebed233c1792c7c1204353c8fe75ea0398f4aaf830834bc93873c119dddc539c"}, {0xe8, 0x6f180cc1befb202, 0x9, "4577f77fd3b3acd92c96feff8b0409afeae1c16fa3d367241c9679e5105141c7205d47ce27a418c10fbe7f601c3142e7b7b3a67322c9d345e0baf4315e13dc771a962ff445015c98a70b319d46ba59155d1cf07827804ea1ca86db74f3029bd60f6f365d955ec12be30102e59b4b3940152988ef09443df596bad9525f697fad61507e856c6acb744cfb034863943e811bd378843ccbd95f8221a444f4c323a391f5788559f34ac02e6e18065b87e8c962353623250694e5b4bf9bc1b00fadf2875995067ff6c18590c207f9a83f06665f5b5af77b4e"}, {0xa0, 0x10f, 0x5, "07c5972c79a30903d5d93f57c962c0351628551f6a3fbac8e18984ad9b8caeb403f1d588fa0b9955ce44d018cbcc06ad98b588dd45fd0ccd6b8d1965e70693ec76dd521aa2693829ef54059dc3191f2f4eca64c63f2f901ead2d6c54f0119212ebb77e956117d9130d3adff30a5598567fd540cf0a8f9f8c469ad15f209ad8ef161006831b39e4ddf2fcd748a8629e33"}], 0x210, 0x40}, 0x40) close(r0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b53596090ebcc07d8584f358be88fafe") recvmsg(r2, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) recvmsg$kcm(r4, &(0x7f0000001a00)={0x0, 0x0, &(0x7f00000018c0)=[{&(0x7f0000001600)=""/173, 0xad}, {&(0x7f0000001040)=""/25, 0x19}, {&(0x7f00000016c0)=""/132, 0x84}, {&(0x7f0000001780)=""/91, 0x5b}, {&(0x7f0000001800)=""/183, 0xb7}], 0x5, &(0x7f0000001940)=""/163, 0xa3, 0xe43}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000a80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r5}, 0x48) 2018/03/29 11:56:11 executing program 3: r0 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x10}, 0x10) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000000c0)={0x0, 0x1000, 0x8}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000080)='./file0\x00', r1}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0x0, 0x8}, 0x10) mount(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='cpuset\x00', 0x40, &(0x7f0000000280)="8a4562cb6a7df38be32246afcaef1e1a3f933cb428242c55c117c0fbbd62cea0aab31f2665fb88267466eca314fc8cafd72cc24143121c0691236768fad66390bf9b55014c2bd49faa5388cbabd52e730eeb4ccc411bacd296e423d971043756cf2b35a4063f2a7465b44a60ef31ae437f6160ed2f63afa62c36a27c33e4779e7c0404e337abc025bb2e4b39cc265573c6ab1a3ff09c7ad6bb4631a4") mount(&(0x7f0000000340)='./file1\x00', &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='devtmpfs\x00', 0x40, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xb, 0x7f, 0x0, 0x1, 0x12, r1, 0x100000000}, 0x2c) mkdir(&(0x7f0000000440)='./file1\x00', 0x20) mount(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='iso9660\x00', 0x8, &(0x7f0000000540)="650fe6ccea2b17860de967406c566ec16fe5a7a4c064707e22906e9d3d2a70b4") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000005c0)={r2, 0x28, &(0x7f0000000580)={0x0, 0x0}}, 0x10) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={r3, 0x8, 0x10}, 0xc) mount(&(0x7f0000000640)='./file1\x00', &(0x7f0000000680)='./file1\x00', &(0x7f00000006c0)='pstore\x00', 0x1000000, &(0x7f0000000700)="f48afa3ab3cc319f917be52b04c388c229578537782bc5ffc32c7747b1d28999ad89f5fba460640a324385ac03cccef4553d641b91d79d014804a98e72796f8eb2e1a7056efeaa63404648df67079ae817420f248ccf9d01e7a027c600c71777fb9ebc97da60f3d1a287ef8bc00f1dc68c3b1f0c1836cde5b62be45dd58c3415cbb0f916fe3c04fc69911e2bec15c208d023bdb608fa727657c532bd5101a2a36b34c4eb65f855fea2d6f8a0a79b15ecef1a4c81a8f6f5ed57b09db2ab482413540416126718f2a33ed21346ded20b084a8dc10702ec279fc486b5c57c163d") socketpair(0x3, 0x2, 0x1f, &(0x7f0000001c40)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$kcm(r6, &(0x7f0000004300)={0x0, 0x0, &(0x7f0000004140)=[{&(0x7f0000001c80)=""/139, 0x8b}, {&(0x7f0000001d40)=""/149, 0x95}, {&(0x7f0000001e00)=""/188, 0xbc}, {&(0x7f0000001ec0)=""/69, 0x45}, {&(0x7f0000001f40)=""/165, 0xa5}, {&(0x7f0000002000)=""/4096, 0x1000}, {&(0x7f0000003000)=""/42, 0x2a}, {&(0x7f0000003040)=""/4096, 0x1000}, {&(0x7f0000004040)=""/233, 0xe9}], 0x9, &(0x7f0000004200)=""/236, 0xec, 0xe00}, 0x40) mount(&(0x7f0000004340)='./file1/file0\x00', &(0x7f0000004380)='./file1\x00', &(0x7f00000043c0)='ceph\x00', 0x4860, &(0x7f0000004400)="2c8eb517dd302be26597065442d58f3f345c295b542b2b1df3046ae176") bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000004600)={r6, &(0x7f0000004440)="903685b47b9c4d5c1dffcefa6a92cd57ccdfaf1af0be272f1cb4a5b86ab9d1ef248a63f04f5d59c2cd6e6b7722f5ff866c5d353014f28baaa95bce06a787a3e085102126a0386ffd4e136d472f2cdfb7c658643d2792b7235e2ec8c782080850c20eb00014eab035d7d56c8ddd0d7fdc4c21602d480e4accea0867cc5b4172b46b8f028bd623c58544092396dbda704543cd7c93219ff7f4caf9d0c12fc32c65ddac48ba22321d2c7ef1152f0dd87ed22cb30eb2b24d381b3abaefc114ad4c08e329cfbce60e0549ca", &(0x7f0000004540)="38859653237c5c9685cf2e44e1eea64846e190b778f29b06c26c2f2b8a0800f9fc2019b05290fc5c82f612eb7f479918015eb3af93cc57f01db731e129275ce05910f66e436ef09a8fe7bf22f960eacec350a7f7e9e9a47cb163f467b6a29523346a4c61d65d2235c73095a53929d509538f640424133cfa3617b41a51aa7172460146433abbe604f2c92827fabd5d3134d36b4cecd0fd2549f3527615f9eb63dd9332021e4eff13ad6aa509db21ed98745d00cb36e547", 0x3}, 0x20) mkdir(&(0x7f0000004640)='./file1/file0\x00', 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000004680)={0x0, 0x0, 0xa6, 0x3, 0x4}, 0x2c) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000046c0)=0x7, 0x4) recvmsg$kcm(r6, &(0x7f00000058c0)={&(0x7f0000004700)=@alg, 0x80, &(0x7f0000005880)=[{&(0x7f0000004780)=""/4096, 0x1000}, {&(0x7f0000005780)=""/219, 0xdb}], 0x2, 0x0, 0x0, 0x100000001}, 0x40000000) r7 = gettid() r8 = perf_event_open(&(0x7f0000005900)={0x7, 0x70, 0x0, 0xfffffffffffffff7, 0x9, 0x4, 0x0, 0x7, 0x100, 0x8, 0x100000000, 0x8000, 0x8, 0x6, 0x0, 0x6, 0x10001, 0x9, 0x1f, 0x2, 0x1, 0x3, 0x1, 0x1f, 0x23, 0x1, 0xaa4, 0x5, 0x4, 0x200, 0x6, 0x9, 0xfffffffffffffffb, 0x3, 0x3, 0xff, 0x80000000, 0x0, 0x0, 0xffffffffffffff9d, 0x2, @perf_config_ext={0x7, 0x9}, 0x100, 0x8, 0x2, 0x6, 0x4, 0x6, 0xf71}, r7, 0x9, r6, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f00000059c0)={&(0x7f0000005980)='./file0\x00'}, 0x10) ioctl$sock_kcm_SIOCKCMATTACH(r5, 0x89e0, &(0x7f0000005a00)={r5, r0}) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000005c00)={r4, &(0x7f0000005a40)="313befc1e9ac680c4369983530ee783c4f018c38e134b4b0aebd06ede05f238850949c0f5d32ab19889f880e87e3a0fa5a43500affdcc508d56f3a4df6c159ca9cfa62124b79b4607d42738dc5e16d09ea2c6a2346fc2360feff08d9f464dfdebce2cb99d4ba8e5fc37edfba041f14e16a68192d7d8687404ee7318323520188c4e5d52e8c7ec40bd0823fb210e530c74ea842bd8bacbc48317b0b6ed12528ecd30e1af83b8049df791ff7affe91ab54", &(0x7f0000005b00)=""/243}, 0x18) mount(&(0x7f0000005c40)='./file1/file0\x00', &(0x7f0000005c80)='./file1\x00', &(0x7f0000005cc0)='btrfs\x00', 0x0, 0x0) recvmsg(r5, &(0x7f00000073c0)={&(0x7f0000005d00)=@sco, 0x80, &(0x7f0000007300)=[{&(0x7f0000005d80)=""/103, 0x67}, {&(0x7f0000005e00)=""/170, 0xaa}, {&(0x7f0000005ec0)=""/252, 0xfc}, {&(0x7f0000005fc0)=""/136, 0x88}, {&(0x7f0000006080)=""/125, 0x7d}, {&(0x7f0000006100)=""/4096, 0x1000}, {&(0x7f0000007100)=""/106, 0x6a}, {&(0x7f0000007180)=""/115, 0x73}, {&(0x7f0000007200)=""/240, 0xf0}], 0x9, 0x0, 0x0, 0x7}, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000007400)={r3, 0x10001, 0x18}, 0xc) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0xc4c) recvmsg$kcm(r6, &(0x7f0000008880)={&(0x7f0000007440)=@l2, 0x80, &(0x7f0000008800)=[{&(0x7f00000074c0)=""/231, 0xe7}, {&(0x7f00000075c0)=""/118, 0x76}, {&(0x7f0000007640)=""/4096, 0x1000}, {&(0x7f0000008640)=""/223, 0xdf}, {&(0x7f0000008740)}, {&(0x7f0000008780)=""/32, 0x20}, {&(0x7f00000087c0)=""/53, 0x35}], 0x7}, 0x10000) 2018/03/29 11:56:11 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x1e1, 0x100000000209e20, 0x8000000001, 0x5}, 0xfffffffffffffe20) r0 = getpid() r1 = perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0xfffffffffffffffc, 0x3, 0x8, 0x2, 0x0, 0x9, 0x10000, 0xc, 0x3d3, 0x80, 0x5, 0xfffffffffffffffc, 0x8, 0x3f, 0x5d, 0xbbb0, 0x20, 0x3, 0x8000, 0x100000000, 0x8, 0x9, 0x2, 0x4, 0x800, 0xf8, 0x3, 0x9, 0x1, 0x3, 0x8, 0x3, 0x7, 0x10001, 0xf16, 0x2, 0x0, 0x7fffffff, 0x4, @perf_bp={&(0x7f0000000780), 0x1}, 0x4080, 0x10001, 0xcc, 0x7, 0x3, 0xffff, 0x7fffffff}, 0xffffffffffffffff, 0xd, 0xffffffffffffff9c, 0x8) perf_event_open(&(0x7f0000000980)={0x4, 0x70, 0x6, 0x3f, 0x8e, 0x1, 0x0, 0x3, 0x404, 0x0, 0xbc2b, 0x40, 0x7, 0xffff, 0xffff, 0x9, 0x9de2, 0x9, 0x0, 0x3, 0x7f, 0xff, 0x40, 0x400, 0x9, 0x7fffffff, 0x80000000, 0x7, 0x8, 0x10001, 0x1f, 0x2778, 0x800, 0x8001, 0x101, 0x9, 0x8, 0x7ff, 0x0, 0x1000, 0x5, @perf_config_ext={0x3ff, 0xb69b}, 0x3040, 0x2, 0x2, 0x5, 0x7, 0x6, 0x7283ed73}, r0, 0xe, r1, 0x8) bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x0, 0x0, 0x7ffff9, 0x0, 0x20000003, 0x0}, 0x2c) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) r2 = gettid() r3 = perf_event_open(&(0x7f00000008c0)={0x7, 0x70, 0x1, 0x200, 0x3, 0xdbce, 0x0, 0x8, 0x1002, 0x1, 0xffffffffffffff00, 0x8, 0x1, 0xb3fa, 0x8, 0x0, 0x1, 0x2, 0x1000, 0x2, 0x401, 0x8, 0x3, 0x81, 0x0, 0x7, 0x2fc4, 0x882, 0x4, 0x8, 0x3, 0x81, 0x3, 0x7, 0x8857, 0x7, 0x5, 0x9, 0x0, 0x7, 0x1, @perf_config_ext={0x0, 0x80000000}, 0x400, 0x7f, 0x4, 0x7, 0x2, 0x7f, 0x200}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000840)={0x5, 0x70, 0xef, 0x2, 0x1000, 0xffffffff80000000, 0x0, 0x1a7800000000, 0x2000, 0x4, 0x5, 0x6814, 0x3a9, 0x5, 0x63b, 0x6, 0x8, 0x1000, 0x250420ee, 0x3, 0x0, 0x20, 0x6, 0x0, 0x4, 0x5, 0x4, 0x8, 0x3, 0x8, 0x52893dd5, 0x2, 0x2, 0x8, 0x44d, 0x1, 0x8, 0x6, 0x0, 0x100000000, 0x0, @perf_config_ext={0x9, 0x80}, 0x0, 0x0, 0x2b67, 0x6, 0x4b0, 0x81, 0x4}, r2, 0x5, r3, 0xb) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1003, 0x0) mount(&(0x7f00002b9ff8)='./file0\x00', &(0x7f0000cbeff8)='./file0\x00', &(0x7f00005f7ffa)='ramfs\x00', 0x80000, &(0x7f000002f000)) mount(&(0x7f0000000000)='.', &(0x7f0000000040)='.', &(0x7f0000000080)='cgroup\x00', 0x5010, &(0x7f00000000c0)) mount(&(0x7f0000377ff8)='.', &(0x7f0000000280)='.', &(0x7f0000000600)='nfs4\x00', 0x5010, &(0x7f0000000300)="2161893416a0c71070768c219eb114c3253c9f3baf4e9e8e9111c1a7fc6e266009fe27243deeaa22ca7ae9341f714300b5ee807e55d609036f2a3260475922bdfb2d2849f1c3b2ad3c051bd4f3751a177f77a92758c6d2b23fe7f1535b54e5846d11c135de8286066dec1b25f6e1378944ac5f7fce42d055821b5e19") perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xd68, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f0000014f88)={0x5, 0xfffffffffffffdc4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x46000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = getpid() perf_event_open(&(0x7f0000000680)={0x4, 0x70, 0x64, 0xffff, 0x1f, 0x4, 0x0, 0x1c3, 0x0, 0x1, 0x1, 0x9, 0x1ff, 0xfffffffffffffff8, 0x0, 0x0, 0x6, 0x7fffffff, 0x4, 0xffffffff, 0x80000001, 0xd0, 0x7, 0x1f, 0x0, 0x8, 0x9, 0x1ff, 0x8, 0x785, 0x4, 0xff, 0x2, 0x656, 0x5000000, 0x1, 0x460e3be0, 0x1, 0x0, 0x0, 0x7, @perf_bp={&(0x7f0000000640), 0x1}, 0x1000, 0xa, 0x7fff, 0x7, 0x3, 0x400, 0x9}, r5, 0xe, r4, 0x1) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', 0x0, 0x10}, 0x10) close(0xffffffffffffffff) bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)={&(0x7f0000000040)='./file0\x00', 0x0, 0x18}, 0x10) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000100)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0, 0x2e, &(0x7f0000000440), &(0x7f0000000140)=""/46, 0x4229}, 0x28) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000003480)={&(0x7f0000003300)=@can={0x0, 0x0}, 0x80, &(0x7f0000003400)=[{&(0x7f0000003380)=""/56, 0x38}, {&(0x7f00000033c0)=""/1, 0x1}], 0x2, &(0x7f0000003440)=""/33, 0x21, 0x1}, 0x40010000) bpf$PROG_LOAD(0x5, &(0x7f00000034c0)={0xe, 0x6, &(0x7f0000000940)=ANY=[@ANYBLOB="1800000002000000000000004ce700002555fdff00000000002371d07c9ba7f4a23372b0ad610000000000000095000000000000"], &(0x7f00000007c0)='GPL\x00', 0x3, 0x2d, &(0x7f0000000800)=""/45, 0x40f00, 0x1, [], r6}, 0x48) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000740)={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x10) socketpair$inet(0x2, 0x80a, 0x81, &(0x7f0000000240)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={0xffffffffffffffff, &(0x7f0000000500)="ae30f1bca1b4d3f69f1aac81517d42ad5980bc63b5008616a1f4724b9f8c1e4ecd8de336f57dd727cdaab04f0b40f28612615ad08de414711d841a88db33fd33884b627074213a0c5de3be2bbaec9207d9865c47f240467849979b5ab5632376608fc4be41a274abb2dc07cabe344a18db51048e5b0cbda843905a4258cdee3e649eddf104ba78894dce09747dcfe6a8d6d6d985520eeef448b83a8bcb83074541ba7a20d6094aa206c01a0690e5b3bfa05d475eb382b0199031d22bb26cde9b1ca0055eef9f6c4993b71ba19ba0590bb5efdaddaa574c25356ca890d138fc9fe0e975b6d5a1a8251503cd0a91845f9d95", &(0x7f0000000480)="9bc7741ea5e524cc8c6f748a73153834428729c45bf4ad446d2dddf1978baf431d0ba35b5442b5afe22db8b003650320200af7e1368ef7cdfa79ca8b9d3564363a5d2a502970314f2264c883bc8d990afc003e5adb95b30edad245c4420c8126f1d33db75ff0230698eaff90055e0f", 0x2}, 0x20) socketpair(0x0, 0x80003, 0xffff, &(0x7f0000000380)={0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r7, 0x50, &(0x7f00000003c0)}, 0x10) 2018/03/29 11:56:11 executing program 0: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000001a40)={0xffffffffffffffff}) recvmsg$kcm(r1, &(0x7f0000000540)={&(0x7f00000000c0)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @broadcast}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000240)=""/65, 0x41}], 0x1, &(0x7f0000000440)=""/213, 0xd5}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x8983, &(0x7f0000000040)={r0}) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000080)) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000019c0)={0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000000140)="0253eea6a53cc0eae389e9a13e5f2046d0633eebde90f446c1b1eabbd0adb42dfcefb37a3df93feb3d5e76dc353ecf23fe9c81afa5", 0x35}, {&(0x7f00000002c0)}, {&(0x7f0000000400)}, {&(0x7f0000001600)}], 0x4, &(0x7f0000001700)=ANY=[@ANYBLOB="680000000000778d90000007010000c17d0425755cd1e9e23de47cb15819d813deb534cee2d9497c58dba5bd8a228407fb709d70f16afa73f4924f12ecc429b6fd356748940b62ee5f5685ce027fe4e6c60a8f88cd1a5827d099f5849f09bd37f681e29814e6bb00000000100000000000000000000000ff01000010000000000000000701040001"], 0x88}, 0x48800) 2018/03/29 11:56:11 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x1e1, 0x0, 0x8000000001, 0x5}, 0xfffffffffffffe20) r0 = getpid() r1 = perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0xfffffffffffffffc, 0x3, 0x8, 0x2, 0x0, 0x9, 0x10000, 0xc, 0x3d3, 0x80, 0x5, 0xfffffffffffffffc, 0x8, 0x3f, 0x5d, 0xbbb0, 0x20, 0x3, 0x8000, 0x100000000, 0x8, 0x9, 0x2, 0x4, 0x800, 0xf8, 0x3, 0x9, 0x1, 0x3, 0x8, 0x3, 0x7, 0x10001, 0xf16, 0x2, 0x0, 0x7fffffff, 0x4, @perf_bp={&(0x7f0000000780), 0x1}, 0x4080, 0x10001, 0xcc, 0x7, 0x3, 0xffff, 0x7fffffff}, 0xffffffffffffffff, 0xd, 0xffffffffffffff9c, 0x8) perf_event_open(&(0x7f0000000980)={0x4, 0x70, 0x6, 0x3f, 0x8e, 0x1, 0x0, 0x3, 0x404, 0x0, 0xbc2b, 0x40, 0x7, 0xffff, 0xffff, 0x9, 0x9de2, 0x9, 0x0, 0x3, 0x7f, 0xff, 0x40, 0x400, 0x9, 0x7fffffff, 0x80000000, 0x7, 0x8, 0x10001, 0x1f, 0x2778, 0x800, 0x8001, 0x101, 0x9, 0x8, 0x7ff, 0x0, 0x1000, 0x5, @perf_config_ext={0x3ff, 0xb69b}, 0x3040, 0x2, 0x2, 0x5, 0x7, 0x6, 0x7283ed73}, r0, 0xe, r1, 0x8) bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x0, 0x0, 0x7ffff9, 0x0, 0x20000003, 0x0}, 0x2c) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) r2 = gettid() r3 = perf_event_open(&(0x7f00000008c0)={0x7, 0x70, 0x1, 0x200, 0x3, 0xdbce, 0x0, 0x8, 0x1002, 0x1, 0xffffffffffffff00, 0x8, 0x1, 0xb3fa, 0x8, 0x0, 0x1, 0x2, 0x1000, 0x2, 0x401, 0x8, 0x3, 0x81, 0x0, 0x7, 0x2fc4, 0x882, 0x4, 0x8, 0x3, 0x81, 0x3, 0x7, 0x8857, 0x7, 0x5, 0x9, 0x0, 0x7, 0x1, @perf_config_ext={0x0, 0x80000000}, 0x400, 0x7f, 0x4, 0x7, 0x2, 0x7f, 0x200}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000840)={0x5, 0x70, 0xef, 0x2, 0x1000, 0xffffffff80000000, 0x0, 0x1a7800000000, 0x2000, 0x4, 0x5, 0x6814, 0x3a9, 0x5, 0x63b, 0x6, 0x8, 0x1000, 0x250420ee, 0x3, 0x0, 0x20, 0x6, 0x0, 0x4, 0x5, 0x4, 0x8, 0x3, 0x8, 0x52893dd5, 0x2, 0x2, 0x8, 0x44d, 0x1, 0x8, 0x6, 0x0, 0x100000000, 0x0, @perf_config_ext={0x9, 0x80}, 0x0, 0x0, 0x2b67, 0x6, 0x4b0, 0x81, 0x4}, r2, 0x5, r3, 0xb) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1003, 0x0) mount(&(0x7f00002b9ff8)='./file0\x00', &(0x7f0000cbeff8)='./file0\x00', &(0x7f00005f7ffa)='ramfs\x00', 0x80000, &(0x7f000002f000)) mount(&(0x7f0000000000)='.', &(0x7f0000000040)='.', &(0x7f0000000080)='cgroup\x00', 0x5010, &(0x7f00000000c0)) mount(&(0x7f0000377ff8)='.', &(0x7f0000000280)='.', &(0x7f0000000600)='nfs4\x00', 0x5010, &(0x7f0000000300)="2161893416a0c71070768c219eb114c3253c9f3baf4e9e8e9111c1a7fc6e266009fe27243deeaa22ca7ae9341f714300b5ee807e55d609036f2a3260475922bdfb2d2849f1c3b2ad3c051bd4f3751a177f77a92758c6d2b23fe7f1535b54e5846d11c135de8286066dec1b25f6e1378944ac5f7fce42d055821b5e19") perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xd68, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f0000014f88)={0x5, 0xfffffffffffffdc4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x46000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = getpid() perf_event_open(&(0x7f0000000680)={0x4, 0x70, 0x64, 0xffff, 0x1f, 0x4, 0x0, 0x1c3, 0x0, 0x1, 0x1, 0x9, 0x1ff, 0xfffffffffffffff8, 0x0, 0x0, 0x6, 0x7fffffff, 0x0, 0xffffffff, 0x80000001, 0xd0, 0x7, 0x1f, 0x0, 0x8, 0x9, 0x1ff, 0x8, 0x785, 0x4, 0xff, 0x2, 0x656, 0x5000000, 0x1, 0x460e3be0, 0x1, 0x0, 0x0, 0x7, @perf_bp={&(0x7f0000000640), 0x1}, 0x1000, 0xa, 0x7fff, 0x7, 0x3, 0x400, 0x9}, r5, 0xe, r4, 0x1) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', 0x0, 0x10}, 0x10) close(0xffffffffffffffff) bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)={&(0x7f0000000040)='./file0\x00', 0x0, 0x18}, 0x10) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000100)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0, 0x2e, &(0x7f0000000440), &(0x7f0000000140)=""/46, 0x4229}, 0x28) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000003480)={&(0x7f0000003300)=@can={0x0, 0x0}, 0x80, &(0x7f0000003400)=[{&(0x7f0000003380)=""/56, 0x38}, {&(0x7f00000033c0)=""/1, 0x1}], 0x2, &(0x7f0000003440)=""/33, 0x21, 0x1}, 0x40010000) bpf$PROG_LOAD(0x5, &(0x7f00000034c0)={0xe, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="1800000002000000000000004ce700002555fdff00000000002371d07c9ba7f4a23372b0ad61000000000000009500000000000000"], &(0x7f00000007c0)='GPL\x00', 0x3, 0x2d, &(0x7f0000000800)=""/45, 0x40f00, 0x1, [], r6}, 0x48) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000740)={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x10) socketpair$inet(0x2, 0x80a, 0x81, &(0x7f0000000240)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={0xffffffffffffffff, &(0x7f0000000500)="ae30f1bca1b4d3f69f1aac81517d42ad5980bc63b5008616a1f4724b9f8c1e4ecd8de336f57dd727cdaab04f0b40f28612615ad08de414711d841a88db33fd33884b627074213a0c5de3be2bbaec9207d9865c47f240467849979b5ab5632376608fc4be41a274abb2dc07cabe344a18db51048e5b0cbda843905a4258cdee3e649eddf104ba78894dce09747dcfe6a8d6d6d985520eeef448b83a8bcb83074541ba7a20d6094aa206c01a0690e5b3bfa05d475eb382b0199031d22bb26cde9b1ca0055eef9f6c4993b71ba19ba0590bb5efdaddaa574c25356ca890d138fc9fe0e975b6d5a1a8251503cd0a91845f9d95", &(0x7f0000000480)="9bc7741ea5e524cc8c6f748a73153834428729c45bf4ad446d2dddf1978baf431d0ba35b5442b5afe22db8b003650320200af7e1368ef7cdfa79ca8b9d3564363a5d2a502970314f2264c883bc8d990afc003e5adb95b30edad245c4420c8126f1d33db75ff0230698eaff90055e0f", 0x2}, 0x20) socketpair(0x0, 0x80003, 0xffff, &(0x7f0000000380)={0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r7, 0x50, &(0x7f00000003c0)}, 0x10) 2018/03/29 11:56:11 executing program 3: r0 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x10}, 0x10) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000000c0)={0x0, 0x1000, 0x8}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000080)='./file0\x00', r1}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0x0, 0x8}, 0x10) mount(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='cpuset\x00', 0x40, &(0x7f0000000280)="8a4562cb6a7df38be32246afcaef1e1a3f933cb428242c55c117c0fbbd62cea0aab31f2665fb88267466eca314fc8cafd72cc24143121c0691236768fad66390bf9b55014c2bd49faa5388cbabd52e730eeb4ccc411bacd296e423d971043756cf2b35a4063f2a7465b44a60ef31ae437f6160ed2f63afa62c36a27c33e4779e7c0404e337abc025bb2e4b39cc265573c6ab1a3ff09c7ad6bb4631a4") mount(&(0x7f0000000340)='./file1\x00', &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='devtmpfs\x00', 0x40, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xb, 0x7f, 0x0, 0x1, 0x12, r1, 0x100000000}, 0x2c) mkdir(&(0x7f0000000440)='./file1\x00', 0x20) mount(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='iso9660\x00', 0x8, &(0x7f0000000540)="650fe6ccea2b17860de967406c566ec16fe5a7a4c064707e22906e9d3d2a70b4") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000005c0)={r2, 0x28, &(0x7f0000000580)={0x0, 0x0}}, 0x10) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={r3, 0x8, 0x10}, 0xc) mount(&(0x7f0000000640)='./file1\x00', &(0x7f0000000680)='./file1\x00', &(0x7f00000006c0)='pstore\x00', 0x1000000, &(0x7f0000000700)="f48afa3ab3cc319f917be52b04c388c229578537782bc5ffc32c7747b1d28999ad89f5fba460640a324385ac03cccef4553d641b91d79d014804a98e72796f8eb2e1a7056efeaa63404648df67079ae817420f248ccf9d01e7a027c600c71777fb9ebc97da60f3d1a287ef8bc00f1dc68c3b1f0c1836cde5b62be45dd58c3415cbb0f916fe3c04fc69911e2bec15c208d023bdb608fa727657c532bd5101a2a36b34c4eb65f855fea2d6f8a0a79b15ecef1a4c81a8f6f5ed57b09db2ab482413540416126718f2a33ed21346ded20b084a8dc10702ec279fc486b5c57c163d") socketpair(0x3, 0x2, 0x1f, &(0x7f0000001c40)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$kcm(r6, &(0x7f0000004300)={0x0, 0x0, &(0x7f0000004140)=[{&(0x7f0000001c80)=""/139, 0x8b}, {&(0x7f0000001d40)=""/149, 0x95}, {&(0x7f0000001e00)=""/188, 0xbc}, {&(0x7f0000001ec0)=""/69, 0x45}, {&(0x7f0000001f40)=""/165, 0xa5}, {&(0x7f0000002000)=""/4096, 0x1000}, {&(0x7f0000003000)=""/42, 0x2a}, {&(0x7f0000003040)=""/4096, 0x1000}, {&(0x7f0000004040)=""/233, 0xe9}], 0x9, &(0x7f0000004200)=""/236, 0xec, 0xe00}, 0x40) mount(&(0x7f0000004340)='./file1/file0\x00', &(0x7f0000004380)='./file1\x00', &(0x7f00000043c0)='ceph\x00', 0x4860, &(0x7f0000004400)="2c8eb517dd302be26597065442d58f3f345c295b542b2b1df3046ae176") bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000004600)={r6, &(0x7f0000004440)="903685b47b9c4d5c1dffcefa6a92cd57ccdfaf1af0be272f1cb4a5b86ab9d1ef248a63f04f5d59c2cd6e6b7722f5ff866c5d353014f28baaa95bce06a787a3e085102126a0386ffd4e136d472f2cdfb7c658643d2792b7235e2ec8c782080850c20eb00014eab035d7d56c8ddd0d7fdc4c21602d480e4accea0867cc5b4172b46b8f028bd623c58544092396dbda704543cd7c93219ff7f4caf9d0c12fc32c65ddac48ba22321d2c7ef1152f0dd87ed22cb30eb2b24d381b3abaefc114ad4c08e329cfbce60e0549ca", &(0x7f0000004540)="38859653237c5c9685cf2e44e1eea64846e190b778f29b06c26c2f2b8a0800f9fc2019b05290fc5c82f612eb7f479918015eb3af93cc57f01db731e129275ce05910f66e436ef09a8fe7bf22f960eacec350a7f7e9e9a47cb163f467b6a29523346a4c61d65d2235c73095a53929d509538f640424133cfa3617b41a51aa7172460146433abbe604f2c92827fabd5d3134d36b4cecd0fd2549f3527615f9eb63dd9332021e4eff13ad6aa509db21ed98745d00cb36e547", 0x3}, 0x20) mkdir(&(0x7f0000004640)='./file1/file0\x00', 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000004680)={0x0, 0x0, 0xa6, 0x3, 0x4}, 0x2c) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000046c0)=0x7, 0x4) recvmsg$kcm(r6, &(0x7f00000058c0)={&(0x7f0000004700)=@alg, 0x80, &(0x7f0000005880)=[{&(0x7f0000004780)=""/4096, 0x1000}, {&(0x7f0000005780)=""/219, 0xdb}], 0x2, 0x0, 0x0, 0x100000001}, 0x40000000) r7 = gettid() r8 = perf_event_open(&(0x7f0000005900)={0x7, 0x70, 0x0, 0xfffffffffffffff7, 0x9, 0x4, 0x0, 0x7, 0x100, 0x8, 0x100000000, 0x8000, 0x8, 0x6, 0x0, 0x6, 0x10001, 0x9, 0x1f, 0x2, 0x1, 0x3, 0x1, 0x1f, 0x23, 0x1, 0xaa4, 0x5, 0x4, 0x200, 0x6, 0x9, 0xfffffffffffffffb, 0x3, 0x3, 0xff, 0x80000000, 0x0, 0x0, 0xffffffffffffff9d, 0x2, @perf_config_ext={0x7, 0x9}, 0x100, 0x8, 0x2, 0x6, 0x4, 0x6, 0xf71}, r7, 0x9, r6, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f00000059c0)={&(0x7f0000005980)='./file0\x00'}, 0x10) ioctl$sock_kcm_SIOCKCMATTACH(r5, 0x89e0, &(0x7f0000005a00)={r5, r0}) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000005c00)={r4, &(0x7f0000005a40)="313befc1e9ac680c4369983530ee783c4f018c38e134b4b0aebd06ede05f238850949c0f5d32ab19889f880e87e3a0fa5a43500affdcc508d56f3a4df6c159ca9cfa62124b79b4607d42738dc5e16d09ea2c6a2346fc2360feff08d9f464dfdebce2cb99d4ba8e5fc37edfba041f14e16a68192d7d8687404ee7318323520188c4e5d52e8c7ec40bd0823fb210e530c74ea842bd8bacbc48317b0b6ed12528ecd30e1af83b8049df791ff7affe91ab54", &(0x7f0000005b00)=""/243}, 0x18) mount(&(0x7f0000005c40)='./file1/file0\x00', &(0x7f0000005c80)='./file1\x00', &(0x7f0000005cc0)='btrfs\x00', 0x0, 0x0) recvmsg(r5, &(0x7f00000073c0)={&(0x7f0000005d00)=@sco, 0x80, &(0x7f0000007300)=[{&(0x7f0000005d80)=""/103, 0x67}, {&(0x7f0000005e00)=""/170, 0xaa}, {&(0x7f0000005ec0)=""/252, 0xfc}, {&(0x7f0000005fc0)=""/136, 0x88}, {&(0x7f0000006080)=""/125, 0x7d}, {&(0x7f0000006100)=""/4096, 0x1000}, {&(0x7f0000007100)=""/106, 0x6a}, {&(0x7f0000007180)=""/115, 0x73}, {&(0x7f0000007200)=""/240, 0xf0}], 0x9, 0x0, 0x0, 0x7}, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000007400)={r3, 0x10001, 0x18}, 0xc) ioctl$PERF_EVENT_IOC_REFRESH(r8, 0x2402, 0x0) recvmsg$kcm(r6, &(0x7f0000008880)={&(0x7f0000007440)=@l2, 0x80, &(0x7f0000008800)=[{&(0x7f00000074c0)=""/231, 0xe7}, {&(0x7f00000075c0)=""/118, 0x76}, {&(0x7f0000007640)=""/4096, 0x1000}, {&(0x7f0000008640)=""/223, 0xdf}, {&(0x7f0000008740)}, {&(0x7f0000008780)=""/32, 0x20}, {&(0x7f00000087c0)=""/53, 0x35}], 0x7}, 0x10000) [ 818.185518] IPVS: ftp: loaded support on port[0] = 21 [ 818.220522] FAULT_INJECTION: forcing a failure. [ 818.220522] name failslab, interval 1, probability 0, space 0, times 0 [ 818.231785] CPU: 1 PID: 26844 Comm: syz-executor4 Not tainted 4.16.0-rc6+ #40 [ 818.239052] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 818.248401] Call Trace: [ 818.250977] dump_stack+0x194/0x24d [ 818.254585] ? arch_local_irq_restore+0x53/0x53 [ 818.259244] should_fail+0x8c0/0xa40 [ 818.262941] ? __free_insn_slot+0x5c0/0x5c0 [ 818.267245] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 818.272334] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 818.277516] ? __lock_acquire+0x664/0x3e00 [ 818.281733] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 818.286928] ? find_held_lock+0x35/0x1d0 [ 818.290975] ? __lock_is_held+0xb6/0x140 [ 818.295037] ? check_same_owner+0x320/0x320 [ 818.299353] ? __d_lookup+0x4f4/0x830 [ 818.303144] ? rcu_note_context_switch+0x710/0x710 [ 818.308075] should_failslab+0xec/0x120 [ 818.312032] kmem_cache_alloc+0x47/0x760 [ 818.316086] __d_alloc+0xc1/0xbd0 [ 818.319522] ? shrink_dcache_for_umount+0x290/0x290 [ 818.324525] ? d_alloc_parallel+0x1b40/0x1b40 [ 818.329009] ? lock_release+0xa40/0xa40 [ 818.332974] ? mark_held_locks+0xaf/0x100 [ 818.337102] ? d_lookup+0x133/0x2e0 [ 818.340714] ? d_lookup+0x1d5/0x2e0 [ 818.344328] d_alloc+0x8e/0x340 [ 818.347590] ? __d_alloc+0xbd0/0xbd0 [ 818.351279] ? full_name_hash+0x9b/0xe0 [ 818.355244] __rpc_lookup_create_exclusive+0x183/0x1d0 [ 818.360502] ? rpc_d_lookup_sb+0x1a0/0x1a0 [ 818.364731] rpc_populate.constprop.15+0xa3/0x340 [ 818.369563] rpc_fill_super+0x379/0xae0 [ 818.373530] ? cap_capable+0x1b5/0x230 [ 818.377405] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 818.382579] ? security_capable+0x8e/0xc0 [ 818.386712] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 818.391885] ? ns_capable_common+0xcf/0x160 [ 818.396189] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 818.401357] mount_ns+0xc4/0x190 [ 818.404711] rpc_mount+0x9e/0xd0 [ 818.408061] mount_fs+0x66/0x2d0 [ 818.411413] vfs_kern_mount.part.26+0xc6/0x4a0 [ 818.415974] ? may_umount+0xa0/0xa0 [ 818.419580] ? _raw_read_unlock+0x22/0x30 [ 818.423705] ? __get_fs_type+0x8a/0xc0 [ 818.427579] do_mount+0xea4/0x2bb0 [ 818.431110] ? copy_mount_string+0x40/0x40 [ 818.435325] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 818.440322] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 818.445066] ? retint_kernel+0x10/0x10 [ 818.448945] ? copy_mount_options+0x183/0x2e0 [ 818.453419] ? copy_mount_options+0x1f7/0x2e0 [ 818.457895] SyS_mount+0xab/0x120 [ 818.461327] ? copy_mnt_ns+0xb30/0xb30 [ 818.465192] do_syscall_64+0x281/0x940 [ 818.469055] ? __do_page_fault+0xc90/0xc90 [ 818.473267] ? _raw_spin_unlock_irq+0x27/0x70 [ 818.477740] ? finish_task_switch+0x1c1/0x7e0 [ 818.482218] ? syscall_return_slowpath+0x550/0x550 [ 818.487130] ? syscall_return_slowpath+0x2ac/0x550 [ 818.492045] ? prepare_exit_to_usermode+0x350/0x350 [ 818.497043] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 818.502389] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 818.507229] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 818.512398] RIP: 0033:0x4548b9 [ 818.515575] RSP: 002b:00007f67a7726c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 818.523263] RAX: ffffffffffffffda RBX: 00007f67a77276d4 RCX: 00000000004548b9 [ 818.530514] RDX: 00000000200002c0 RSI: 0000000020000140 RDI: 0000000020000300 [ 818.537764] RBP: 000000000072bea0 R08: 0000000020000200 R09: 0000000000000000 [ 818.545015] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 818.552267] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000033 [ 818.560727] net/sunrpc/rpc_pipe.c: rpc_populate failed to populate directory / [ 819.469214] IPVS: ftp: loaded support on port[0] = 21 [ 819.495043] IPVS: ftp: loaded support on port[0] = 21 [ 819.528583] IPVS: ftp: loaded support on port[0] = 21 2018/03/29 11:56:14 executing program 0: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000001a00)) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000001a40)={0xffffffffffffffff}) recvmsg$kcm(r1, &(0x7f0000000540)={&(0x7f00000000c0)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @broadcast}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000240)=""/65, 0x41}], 0x1, &(0x7f0000000440)=""/213, 0xd5}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x8983, &(0x7f0000000040)={r2}) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000080)) close(r2) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000019c0)={0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000000140)="0253eea6a53cc0eae389e9a13e5f2046d0633eebde90f446c1b1eabbd0adb42dfcefb37a3df93feb3d5e76dc353ecf23fe9c81afa5", 0x35}, {&(0x7f00000002c0)}, {&(0x7f0000000400)}, {&(0x7f0000001600)}], 0x4, &(0x7f0000001700)=[{0x68, 0x107, 0x25047dc1, "755cd1e9e23de47cb15819d813deb534cee2d9497c58eba5bd8a228407fb709d70f16afa73f4924f12ecc429b6fd356748940b62ee5f5685ce027fe4e6c60a8f88cd1a5827d099f5849f09bd37f681e29814e6bb"}, {0x10, 0x0, 0x1ff}, {0x10, 0x107, 0x80000001}], 0x88}, 0x48800) 2018/03/29 11:56:14 executing program 6: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x3, &(0x7f0000002000)=@framed={{0x18}, [], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000680)={0xffffffffffffffff, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x7}, 0x28) recvmsg(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000001c0)) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000100)=r0, 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) recvmsg(r3, &(0x7f00000011c0)={&(0x7f0000000b40)=@can, 0x80, &(0x7f0000001100)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f0000000c80)=""/169, 0xa9}, {&(0x7f0000000d40)=""/229, 0xe5}, {&(0x7f0000000e40)=""/128, 0x80}, {&(0x7f0000000ec0)=""/48, 0x30}, {&(0x7f0000000f00)=""/137, 0x89}, {&(0x7f0000006000)=""/4096, 0x1000}, {&(0x7f0000007000)=""/4096, 0x1000}, {&(0x7f0000008000)=""/4096, 0x1000}], 0x9, 0x0, 0x0, 0x1}, 0x2020) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001200)={0x7, 0x4, 0x0, 0x4, 0x8, 0xffffffffffffffff, 0x9}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x1000000007, 0xcf2e, 0x7e, 0x20, 0x15, r1, 0x4}, 0x2c) socketpair(0x3, 0x80e, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r4, &(0x7f0000000200)={&(0x7f0000000fc0)=@pppol2tp={0x18, 0x1, {0x0, r3, {0x2, 0x4e20, @broadcast=0xffffffff}, 0x1, 0x3, 0x0, 0x2}}, 0x80, &(0x7f0000001580)=[{&(0x7f0000001240)="95c4dcff0f017b3c1979888e50f6c20a37b4edaffb28a3b609d24a8180434ab2fac426d3e4fc87e18267002be3cd56b11d69c4db739bf6a9c91af67ee87be1ea522993a368bdfc0df55539a60ef5515b4f03f3dbddae65cd66a90f030118870b473f156cb9a18624103000608c63f84b09ea89bfb8d8e7705c6ef456ef28adec5e566632ddd63098", 0x88}, {&(0x7f0000001380)="5745869bf3b6f562576761d821af2ad55c2f81345c810d6dbd43facd33c5107488aa7f04c5ab1302b820cd31405e9f657776a0d48e2225f39aabc3de0b30dc7422503b448ad89c23ebaee24ae9696e4e58eccae5febf47fff53dc1f03d869303acdef233746263c5c567e84edb166010fd23f56d6e84406bced5a00b5016b0c700fd76218ecf5da3527552a683eb87aa4b246cd74bcbeff8dedec74332e0214e4dc64cb7ac24c4447843caa7550375ef8e1f74a78c40a617e913a25e4837d24fb09e93eaa2", 0xc5}, {&(0x7f0000001480)="8247f46d4324760570d5078149dc5b38f7d1c592564148ecc6262e91c29cd4344e423ff476882993a2844af9a7c306a15e659a4cb9230b5139842c87ad8fa95c202146730fa610b141dfe4c7b771b46e4db879d2b92a01cb8642100d80a1d4658fd0df05c06c8615960a92b690c728e2603373657a9a46b2f200f2895198694d470ab95b6eb7a76ccee67c9219b4afa289d70c87cf22c733e00700f345136d59bcbd89ce7e110746f91e7a7661b8eb0afe54e3cb1c712441dd9a6ffb59a2eb58e5f5eabd4bec428fe27a403bb0d19125e473abdfea87a0c89108e3c876438a7c3f84bebad6cf858f26d2083efd60", 0xee}], 0x3, &(0x7f000000a000)=[{0x88, 0x112, 0xc2, "6671b4b66ac2fb4e14cee671813dc3834802e601529feb049ebb70880567948953018cfd53d7b1c9be27b1084adfba62040c7f889cfbc15407d93133259d9d5052bf6648a69218702e35278939ad399dc3ebed233c1792c7c1204353c8fe75ea0398f4aaf830834bc93873c119dddc539c"}, {0xe8, 0x6f180cc1befb202, 0x9, "4577f77fd3b3acd92c96feff8b0409afeae1c16fa3d367241c9679e5105141c7205d47ce27a418c10fbe7f601c3142e7b7b3a67322c9d345e0baf4315e13dc771a962ff445015c98a70b319d46ba59155d1cf07827804ea1ca86db74f3029bd60f6f365d955ec12be30102e59b4b3940152988ef09443df596bad9525f697fad61507e856c6acb744cfb034863943e811bd378843ccbd95f8221a444f4c323a391f5788559f34ac02e6e18065b87e8c962353623250694e5b4bf9bc1b00fadf2875995067ff6c18590c207f9a83f06665f5b5af77b4e"}, {0xa0, 0x10f, 0x5, "07c5972c79a30903d5d93f57c962c0351628551f6a3fbac8e18984ad9b8caeb403f1d588fa0b9955ce44d018cbcc06ad98b588dd45fd0ccd6b8d1965e70693ec76dd521aa2693829ef54059dc3191f2f4eca64c63f2f901ead2d6c54f0119212ebb77e956117d9130d3adff30a5598567fd540cf0a8f9f8c469ad15f209ad8ef161006831b39e4ddf2fcd748a8629e33"}], 0x210, 0x40}, 0x40) close(r0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)) recvmsg(r2, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) recvmsg$kcm(r4, &(0x7f0000001a00)={0x0, 0x0, &(0x7f00000018c0)=[{&(0x7f0000001600)=""/173, 0xad}, {&(0x7f0000001040)=""/25, 0x19}, {&(0x7f00000016c0)=""/132, 0x84}, {&(0x7f0000001780)=""/91, 0x5b}, {&(0x7f0000001800)=""/183, 0xb7}], 0x5, &(0x7f0000001940)=""/163, 0xa3, 0xe43}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000a80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r5}, 0x48) 2018/03/29 11:56:14 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x1e1, 0x100000000209e20, 0x8000000001, 0x5}, 0xfffffffffffffe20) r0 = getpid() r1 = perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0xfffffffffffffffc, 0x3, 0x8, 0x2, 0x0, 0x9, 0x10000, 0xc, 0x3d3, 0x80, 0x5, 0xfffffffffffffffc, 0x8, 0x3f, 0x5d, 0xbbb0, 0x20, 0x3, 0x8000, 0x100000000, 0x8, 0x9, 0x2, 0x4, 0x800, 0xf8, 0x3, 0x9, 0x1, 0x3, 0x8, 0x3, 0x7, 0x10001, 0xf16, 0x2, 0x0, 0x7fffffff, 0x4, @perf_bp={&(0x7f0000000780), 0x1}, 0x4080, 0x10001, 0xcc, 0x7, 0x3, 0xffff, 0x7fffffff}, 0xffffffffffffffff, 0xd, 0xffffffffffffff9c, 0x8) perf_event_open(&(0x7f0000000980)={0x4, 0x70, 0x6, 0x3f, 0x8e, 0x1, 0x0, 0x3, 0x404, 0x0, 0xbc2b, 0x40, 0x7, 0xffff, 0xffff, 0x9, 0x9de2, 0x9, 0x0, 0x3, 0x7f, 0xff, 0x40, 0x400, 0x9, 0x7fffffff, 0x80000000, 0x7, 0x8, 0x10001, 0x1f, 0x2778, 0x800, 0x8001, 0x101, 0x9, 0x8, 0x7ff, 0x0, 0x1000, 0x5, @perf_config_ext={0x3ff, 0xb69b}, 0x3040, 0x2, 0x2, 0x5, 0x7, 0x6, 0x7283ed73}, r0, 0xe, r1, 0x8) bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x0, 0x0, 0x7ffff9, 0x0, 0x20000003, 0x0}, 0x2c) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) r2 = gettid() r3 = perf_event_open(&(0x7f00000008c0)={0x7, 0x70, 0x1, 0x200, 0x3, 0xdbce, 0x0, 0x8, 0x1002, 0x1, 0xffffffffffffff00, 0x8, 0x1, 0xb3fa, 0x8, 0x0, 0x1, 0x2, 0x1000, 0x2, 0x401, 0x8, 0x3, 0x81, 0x0, 0x7, 0x2fc4, 0x882, 0x4, 0x8, 0x3, 0x81, 0x3, 0x7, 0x8857, 0x7, 0x5, 0x9, 0x0, 0x7, 0x1, @perf_config_ext={0x0, 0x80000000}, 0x400, 0x7f, 0x4, 0x7, 0x2, 0x7f, 0x200}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000840)={0x5, 0x70, 0xef, 0x2, 0x1000, 0xffffffff80000000, 0x0, 0x1a7800000000, 0x2000, 0x4, 0x5, 0x6814, 0x3a9, 0x5, 0x63b, 0x6, 0x8, 0x1000, 0x250420ee, 0x3, 0x0, 0x20, 0x6, 0x0, 0x4, 0x5, 0x4, 0x8, 0x3, 0x8, 0x52893dd5, 0x2, 0x2, 0x8, 0x44d, 0x1, 0x8, 0x6, 0x0, 0x100000000, 0x0, @perf_config_ext={0x9, 0x80}, 0x0, 0x0, 0x2b67, 0x6, 0x4b0, 0x81, 0x4}, r2, 0x5, r3, 0xb) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1003, 0x0) mount(&(0x7f00002b9ff8)='./file0\x00', &(0x7f0000cbeff8)='./file0\x00', &(0x7f00005f7ffa)='ramfs\x00', 0x80000, &(0x7f000002f000)) mount(&(0x7f0000000000)='.', &(0x7f0000000040)='.', &(0x7f0000000080)='cgroup\x00', 0x5010, &(0x7f00000000c0)) mount(&(0x7f0000377ff8)='.', &(0x7f0000000280)='.', &(0x7f0000000600)='nfs4\x00', 0x5010, &(0x7f0000000300)="2161893416a0c71070768c219eb114c3253c9f3baf4e9e8e9111c1a7fc6e266009fe27243deeaa22ca7ae9341f714300b5ee807e55d609036f2a3260475922bdfb2d2849f1c3b2ad3c051bd4f3751a177f77a92758c6d2b23fe7f1535b54e5846d11c135de8286066dec1b25f6e1378944ac5f7fce42d055821b5e19") perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xd68, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f0000014f88)={0x5, 0xfffffffffffffdc4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x46000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = getpid() perf_event_open(&(0x7f0000000680)={0x4, 0x70, 0x64, 0xffff, 0x1f, 0x4, 0x0, 0x1c3, 0x0, 0x1, 0x1, 0x9, 0x1ff, 0xfffffffffffffff8, 0x0, 0x0, 0x6, 0x7fffffff, 0x4, 0xffffffff, 0x80000001, 0xd0, 0x7, 0x1f, 0x0, 0x8, 0x9, 0x1ff, 0x8, 0x785, 0x4, 0xff, 0x2, 0x656, 0x5000000, 0x1, 0x460e3be0, 0x1, 0x0, 0x0, 0x7, @perf_bp={&(0x7f0000000640), 0x1}, 0x1000, 0xa, 0x7fff, 0x7, 0x3, 0x400, 0x9}, r5, 0xe, r4, 0x1) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', 0x0, 0x10}, 0x10) close(0xffffffffffffffff) bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)={&(0x7f0000000040)='./file0\x00', 0x0, 0x18}, 0x10) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000100)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0, 0x2e, &(0x7f0000000440), &(0x7f0000000140)=""/46, 0x4229}, 0x28) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000003480)={&(0x7f0000003300)=@can={0x0, 0x0}, 0x80, &(0x7f0000003400)=[{&(0x7f0000003380)=""/56, 0x38}, {&(0x7f00000033c0)=""/1, 0x1}], 0x2, &(0x7f0000003440)=""/33, 0x21, 0x1}, 0x40010000) bpf$PROG_LOAD(0x5, &(0x7f00000034c0)={0xe, 0x6, &(0x7f0000000940)=ANY=[@ANYBLOB="1800000002000000000000004ce700002555fdff00000000002371d07c9ba7f4a23372b0ad610000000000000095000000000000"], &(0x7f00000007c0)='GPL\x00', 0x3, 0x2d, &(0x7f0000000800)=""/45, 0x40f00, 0x1, [], r6}, 0x48) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000740)={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x10) socketpair$inet(0x2, 0x80a, 0x81, &(0x7f0000000240)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={0xffffffffffffffff, &(0x7f0000000500)="ae30f1bca1b4d3f69f1aac81517d42ad5980bc63b5008616a1f4724b9f8c1e4ecd8de336f57dd727cdaab04f0b40f28612615ad08de414711d841a88db33fd33884b627074213a0c5de3be2bbaec9207d9865c47f240467849979b5ab5632376608fc4be41a274abb2dc07cabe344a18db51048e5b0cbda843905a4258cdee3e649eddf104ba78894dce09747dcfe6a8d6d6d985520eeef448b83a8bcb83074541ba7a20d6094aa206c01a0690e5b3bfa05d475eb382b0199031d22bb26cde9b1ca0055eef9f6c4993b71ba19ba0590bb5efdaddaa574c25356ca890d138fc9fe0e975b6d5a1a8251503cd0a91845f9d95", &(0x7f0000000480)="9bc7741ea5e524cc8c6f748a73153834428729c45bf4ad446d2dddf1978baf431d0ba35b5442b5afe22db8b003650320200af7e1368ef7cdfa79ca8b9d3564363a5d2a502970314f2264c883bc8d990afc003e5adb95b30edad245c4420c8126f1d33db75ff0230698eaff90055e0f", 0x2}, 0x20) socketpair(0x0, 0x80003, 0xffff, &(0x7f0000000380)={0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r7, 0x50, &(0x7f00000003c0)}, 0x10) 2018/03/29 11:56:14 executing program 4 (fault-call:8 fault-nth:52): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x3, &(0x7f0000002000)=@framed={{0x18}, [], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000680)={0xffffffffffffffff, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x7}, 0x28) recvmsg(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000001c0)) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000100)=r0, 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) recvmsg(r3, &(0x7f00000011c0)={&(0x7f0000000b40)=@can, 0x80, &(0x7f0000001100)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f0000000c80)=""/169, 0xa9}, {&(0x7f0000000d40)=""/229, 0xe5}, {&(0x7f0000000e40)=""/128, 0x80}, {&(0x7f0000000ec0)=""/48, 0x30}, {&(0x7f0000000f00)=""/137, 0x89}, {&(0x7f0000006000)=""/4096, 0x1000}, {&(0x7f0000007000)=""/4096, 0x1000}, {&(0x7f0000001080)=""/127, 0x7f}, {&(0x7f0000008000)=""/4096, 0x1000}], 0xa, 0x0, 0x0, 0x1}, 0x2020) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001200)={0x7, 0x4, 0x0, 0x4, 0x8, 0xffffffffffffffff, 0x9}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x1000000007, 0xcf2e, 0x7e, 0x20, 0x15, r1, 0x4}, 0x2c) socketpair(0x3, 0x80e, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r4, &(0x7f0000000200)={&(0x7f0000000fc0)=@pppol2tp={0x18, 0x1, {0x0, r3, {0x2, 0x4e20, @broadcast=0xffffffff}, 0x1, 0x3, 0x0, 0x2}}, 0x80, &(0x7f0000001580)=[{&(0x7f0000001240)="95c4dcff0f017b3c1979888e50f6c20a37b4edaffb28a3b609d24a8180434ab2fac426d3e4fc87e18267002be3cd56b11d69c4db739bf6a9c91af67ee87be1ea522993a368bdfc0df55539a60ef5515b4f03f3dbddae65cd66a90f030118870b473f156cb9a18624103000608c63f84b09ea89bfb8d8e7705c6ef456ef28adec5e566632ddd63098", 0x88}, {&(0x7f0000001380)="5745869bf3b6f562576761d821af2ad55c2f81345c810d6dbd43facd33c5107488aa7f04c5ab1302b820cd31405e9f657776a0d48e2225f39aabc3de0b30dc7422503b448ad89c23ebaee24ae9696e4e58eccae5febf47fff53dc1f03d869303acdef233746263c5c567e84edb166010fd23f56d6e84406bced5a00b5016b0c700fd76218ecf5da3527552a683eb87aa4b246cd74bcbeff8dedec74332e0214e4dc64cb7ac24c4447843caa7550375ef8e1f74a78c40a617e913a25e4837d24fb09e93eaa2", 0xc5}, {&(0x7f0000001480)="8247f46d4324760570d5078149dc5b38f7d1c592564148ecc6262e91c29cd4344e423ff476882993a2844af9a7c306a15e659a4cb9230b5139842c87ad8fa95c202146730fa610b141dfe4c7b771b46e4db879d2b92a01cb8642100d80a1d4658fd0df05c06c8615960a92b690c728e2603373657a9a46b2f200f2895198694d470ab95b6eb7a76ccee67c9219b4afa289d70c87cf22c733e00700f345136d59bcbd89ce7e110746f91e7a7661b8eb0afe54e3cb1c712441dd9a6ffb59a2eb58e5f5eabd4bec428fe27a403bb0d19125e473abdfea87a0c89108e3c876438a7c3f84bebad6cf858f26d2083efd60", 0xee}], 0x3, &(0x7f000000a000)=[{0x88, 0x112, 0xc2, "6671b4b66ac2fb4e14cee671813dc3834802e601529feb049ebb70880567948953018cfd53d7b1c9be27b1084adfba62040c7f889cfbc15407d93133259d9d5052bf6648a69218702e35278939ad399dc3ebed233c1792c7c1204353c8fe75ea0398f4aaf830834bc93873c119dddc539c"}, {0xe8, 0x6f180cc1befb202, 0x9, "4577f77fd3b3acd92c96feff8b0409afeae1c16fa3d367241c9679e5105141c7205d47ce27a418c10fbe7f601c3142e7b7b3a67322c9d345e0baf4315e13dc771a962ff445015c98a70b319d46ba59155d1cf07827804ea1ca86db74f3029bd60f6f365d955ec12be30102e59b4b3940152988ef09443df596bad9525f697fad61507e856c6acb744cfb034863943e811bd378843ccbd95f8221a444f4c323a391f5788559f34ac02e6e18065b87e8c962353623250694e5b4bf9bc1b00fadf2875995067ff6c18590c207f9a83f06665f5b5af77b4e"}, {0xa0, 0x10f, 0x5, "07c5972c79a30903d5d93f57c962c0351628551f6a3fbac8e18984ad9b8caeb403f1d588fa0b9955ce44d018cbcc06ad98b588dd45fd0ccd6b8d1965e70693ec76dd521aa2693829ef54059dc3191f2f4eca64c63f2f901ead2d6c54f0119212ebb77e956117d9130d3adff30a5598567fd540cf0a8f9f8c469ad15f209ad8ef161006831b39e4ddf2fcd748a8629e33"}], 0x210, 0x40}, 0x40) close(r0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b53596090ebcc07d8584f358be88fafe") recvmsg(r2, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) recvmsg$kcm(r4, &(0x7f0000001a00)={0x0, 0x0, &(0x7f00000018c0)=[{&(0x7f0000001600)=""/173, 0xad}, {&(0x7f0000001040)=""/25, 0x19}, {&(0x7f00000016c0)=""/132, 0x84}, {&(0x7f0000001780)=""/91, 0x5b}, {&(0x7f0000001800)=""/183, 0xb7}], 0x5, &(0x7f0000001940)=""/163, 0xa3, 0xe43}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000a80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r5}, 0x48) 2018/03/29 11:56:14 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x3, &(0x7f0000002000)=@framed={{0x18}, [], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000680)={0xffffffffffffffff, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x7}, 0x28) recvmsg(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x7, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000100)=r0, 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) recvmsg(r2, &(0x7f00000011c0)={&(0x7f0000000b40)=@can, 0x80, &(0x7f0000001100)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f0000000c80)=""/169, 0xa9}, {&(0x7f0000000d40)=""/229, 0xe5}, {&(0x7f0000000e40)=""/128, 0x80}, {&(0x7f0000000ec0)=""/48, 0x30}, {&(0x7f0000000f00)=""/137, 0x89}, {&(0x7f0000006000)=""/4096, 0x1000}, {&(0x7f0000007000)=""/4096, 0x1000}, {&(0x7f0000001080)=""/127, 0x7f}, {&(0x7f0000008000)=""/4096, 0x1000}], 0xa, 0x0, 0x0, 0x1}, 0x2020) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001200)={0x7, 0x4, 0x0, 0x4, 0x8, 0xffffffffffffffff, 0x9}, 0x2c) socketpair(0x3, 0x80e, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r3, &(0x7f0000000200)={&(0x7f0000000fc0)=@pppol2tp={0x18, 0x1, {0x0, r2, {0x2, 0x4e20, @broadcast=0xffffffff}, 0x1, 0x3, 0x0, 0x2}}, 0x80, &(0x7f0000001580)=[{&(0x7f0000001240)="95c4dcff0f017b3c1979888e50f6c20a37b4edaffb28a3b609d24a8180434ab2fac426d3e4fc87e18267002be3cd56b11d69c4db739bf6a9c91af67ee87be1ea522993a368bdfc0df55539a60ef5515b4f03f3dbddae65cd66a90f030118870b473f156cb9a18624103000608c63f84b09ea89bfb8d8e7705c6ef456ef28adec5e566632ddd63098", 0x88}, {&(0x7f0000001380)="5745869bf3b6f562576761d821af2ad55c2f81345c810d6dbd43facd33c5107488aa7f04c5ab1302b820cd31405e9f657776a0d48e2225f39aabc3de0b30dc7422503b448ad89c23ebaee24ae9696e4e58eccae5febf47fff53dc1f03d869303acdef233746263c5c567e84edb166010fd23f56d6e84406bced5a00b5016b0c700fd76218ecf5da3527552a683eb87aa4b246cd74bcbeff8dedec74332e0214e4dc64cb7ac24c4447843caa7550375ef8e1f74a78c40a617e913a25e4837d24fb09e93eaa2", 0xc5}, {&(0x7f0000001480)="8247f46d4324760570d5078149dc5b38f7d1c592564148ecc6262e91c29cd4344e423ff476882993a2844af9a7c306a15e659a4cb9230b5139842c87ad8fa95c202146730fa610b141dfe4c7b771b46e4db879d2b92a01cb8642100d80a1d4658fd0df05c06c8615960a92b690c728e2603373657a9a46b2f200f2895198694d470ab95b6eb7a76ccee67c9219b4afa289d70c87cf22c733e00700f345136d59bcbd89ce7e110746f91e7a7661b8eb0afe54e3cb1c712441dd9a6ffb59a2eb58e5f5eabd4bec428fe27a403bb0d19125e473abdfea87a0c89108e3c876438a7c3f84bebad6cf858f26d2083efd60", 0xee}], 0x3, &(0x7f000000a000)=[{0x88, 0x112, 0xc2, "6671b4b66ac2fb4e14cee671813dc3834802e601529feb049ebb70880567948953018cfd53d7b1c9be27b1084adfba62040c7f889cfbc15407d93133259d9d5052bf6648a69218702e35278939ad399dc3ebed233c1792c7c1204353c8fe75ea0398f4aaf830834bc93873c119dddc539c"}, {0xe8, 0x6f180cc1befb202, 0x9, "4577f77fd3b3acd92c96feff8b0409afeae1c16fa3d367241c9679e5105141c7205d47ce27a418c10fbe7f601c3142e7b7b3a67322c9d345e0baf4315e13dc771a962ff445015c98a70b319d46ba59155d1cf07827804ea1ca86db74f3029bd60f6f365d955ec12be30102e59b4b3940152988ef09443df596bad9525f697fad61507e856c6acb744cfb034863943e811bd378843ccbd95f8221a444f4c323a391f5788559f34ac02e6e18065b87e8c962353623250694e5b4bf9bc1b00fadf2875995067ff6c18590c207f9a83f06665f5b5af77b4e"}, {0xa0, 0x10f, 0x5, "07c5972c79a30903d5d93f57c962c0351628551f6a3fbac8e18984ad9b8caeb403f1d588fa0b9955ce44d018cbcc06ad98b588dd45fd0ccd6b8d1965e70693ec76dd521aa2693829ef54059dc3191f2f4eca64c63f2f901ead2d6c54f0119212ebb77e956117d9130d3adff30a5598567fd540cf0a8f9f8c469ad15f209ad8ef161006831b39e4ddf2fcd748a8629e33"}], 0x210, 0x40}, 0x40) close(r0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)) recvmsg(r1, &(0x7f00000267c0)={&(0x7f00000251c0)=@can, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) 2018/03/29 11:56:14 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x3, &(0x7f0000002000)=@framed={{0x18}, [], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000680)={0xffffffffffffffff, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x7}, 0x28) recvmsg(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000001c0)) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000100), 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) recvmsg(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000000b40)=@can, 0x80, &(0x7f0000001100)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f0000000c80)=""/169, 0xa9}, {&(0x7f0000000d40)=""/229, 0xe5}, {&(0x7f0000000e40)=""/128, 0x80}, {&(0x7f0000000ec0)=""/48, 0x30}, {&(0x7f0000000f00)=""/137, 0x89}, {&(0x7f0000006000)=""/4096, 0x1000}, {&(0x7f0000007000)=""/4096, 0x1000}, {&(0x7f0000001080)=""/127, 0x7f}, {&(0x7f0000008000)=""/4096, 0x1000}], 0xa, 0x0, 0x0, 0x1}, 0x2020) bpf$MAP_CREATE(0x0, &(0x7f0000001200)={0x7, 0x4, 0x0, 0x4, 0x8, 0xffffffffffffffff, 0x9}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x1000000007, 0xcf2e, 0x7e, 0x20, 0x15, r1, 0x4}, 0x2c) socketpair(0x3, 0x80e, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r4, &(0x7f0000000200)={&(0x7f0000000fc0)=@pppol2tp={0x18, 0x1, {0x0, r3, {0x2, 0x4e20, @broadcast=0xffffffff}, 0x1, 0x3, 0x0, 0x2}}, 0x80, &(0x7f0000001580)=[{&(0x7f0000001240)="95c4dcff0f017b3c1979888e50f6c20a37b4edaffb28a3b609d24a8180434ab2fac426d3e4fc87e18267002be3cd56b11d69c4db739bf6a9c91af67ee87be1ea522993a368bdfc0df55539a60ef5515b4f03f3dbddae65cd66a90f030118870b473f156cb9a18624103000608c63f84b09ea89bfb8d8e7705c6ef456ef28adec5e566632ddd63098", 0x88}, {&(0x7f0000001380)="5745869bf3b6f562576761d821af2ad55c2f81345c810d6dbd43facd33c5107488aa7f04c5ab1302b820cd31405e9f657776a0d48e2225f39aabc3de0b30dc7422503b448ad89c23ebaee24ae9696e4e58eccae5febf47fff53dc1f03d869303acdef233746263c5c567e84edb166010fd23f56d6e84406bced5a00b5016b0c700fd76218ecf5da3527552a683eb87aa4b246cd74bcbeff8dedec74332e0214e4dc64cb7ac24c4447843caa7550375ef8e1f74a78c40a617e913a25e4837d24fb09e93eaa2", 0xc5}, {&(0x7f0000001480)="8247f46d4324760570d5078149dc5b38f7d1c592564148ecc6262e91c29cd4344e423ff476882993a2844af9a7c306a15e659a4cb9230b5139842c87ad8fa95c202146730fa610b141dfe4c7b771b46e4db879d2b92a01cb8642100d80a1d4658fd0df05c06c8615960a92b690c728e2603373657a9a46b2f200f2895198694d470ab95b6eb7a76ccee67c9219b4afa289d70c87cf22c733e00700f345136d59bcbd89ce7e110746f91e7a7661b8eb0afe54e3cb1c712441dd9a6ffb59a2eb58e5f5eabd4bec428fe27a403bb0d19125e473abdfea87a0c89108e3c876438a7c3f84bebad6cf858f26d2083efd60", 0xee}], 0x3, &(0x7f000000a000)=[{0x88, 0x112, 0xc2, "6671b4b66ac2fb4e14cee671813dc3834802e601529feb049ebb70880567948953018cfd53d7b1c9be27b1084adfba62040c7f889cfbc15407d93133259d9d5052bf6648a69218702e35278939ad399dc3ebed233c1792c7c1204353c8fe75ea0398f4aaf830834bc93873c119dddc539c"}, {0xe8, 0x6f180cc1befb202, 0x9, "4577f77fd3b3acd92c96feff8b0409afeae1c16fa3d367241c9679e5105141c7205d47ce27a418c10fbe7f601c3142e7b7b3a67322c9d345e0baf4315e13dc771a962ff445015c98a70b319d46ba59155d1cf07827804ea1ca86db74f3029bd60f6f365d955ec12be30102e59b4b3940152988ef09443df596bad9525f697fad61507e856c6acb744cfb034863943e811bd378843ccbd95f8221a444f4c323a391f5788559f34ac02e6e18065b87e8c962353623250694e5b4bf9bc1b00fadf2875995067ff6c18590c207f9a83f06665f5b5af77b4e"}, {0xa0, 0x10f, 0x5, "07c5972c79a30903d5d93f57c962c0351628551f6a3fbac8e18984ad9b8caeb403f1d588fa0b9955ce44d018cbcc06ad98b588dd45fd0ccd6b8d1965e70693ec76dd521aa2693829ef54059dc3191f2f4eca64c63f2f901ead2d6c54f0119212ebb77e956117d9130d3adff30a5598567fd540cf0a8f9f8c469ad15f209ad8ef161006831b39e4ddf2fcd748a8629e33"}], 0x210, 0x40}, 0x40) close(r0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)) recvmsg(r2, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) recvmsg$kcm(r4, &(0x7f0000001a00)={0x0, 0x0, &(0x7f00000018c0)=[{&(0x7f0000001600)=""/173, 0xad}, {&(0x7f0000001040)=""/25, 0x19}, {&(0x7f00000016c0)=""/132, 0x84}, {&(0x7f0000001780)=""/91, 0x5b}, {&(0x7f0000001800)=""/183, 0xb7}], 0x5, &(0x7f0000001940)=""/163, 0xa3, 0xe43}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000a80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r5}, 0x48) 2018/03/29 11:56:14 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x1e1, 0x0, 0x8000000001, 0x5}, 0xfffffffffffffe20) r0 = getpid() r1 = perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0xfffffffffffffffc, 0x3, 0x8, 0x2, 0x0, 0x9, 0x10000, 0xc, 0x3d3, 0x80, 0x5, 0xfffffffffffffffc, 0x8, 0x3f, 0x5d, 0xbbb0, 0x20, 0x3, 0x8000, 0x100000000, 0x8, 0x9, 0x2, 0x4, 0x800, 0xf8, 0x3, 0x9, 0x1, 0x3, 0x8, 0x3, 0x7, 0x10001, 0xf16, 0x2, 0x0, 0x7fffffff, 0x4, @perf_bp={&(0x7f0000000780), 0x1}, 0x4080, 0x10001, 0xcc, 0x7, 0x3, 0xffff, 0x7fffffff}, 0xffffffffffffffff, 0xd, 0xffffffffffffff9c, 0x8) perf_event_open(&(0x7f0000000980)={0x4, 0x70, 0x6, 0x3f, 0x8e, 0x1, 0x0, 0x3, 0x404, 0x0, 0xbc2b, 0x40, 0x7, 0xffff, 0xffff, 0x9, 0x9de2, 0x9, 0x0, 0x3, 0x7f, 0xff, 0x40, 0x400, 0x9, 0x7fffffff, 0x80000000, 0x7, 0x8, 0x10001, 0x1f, 0x2778, 0x800, 0x8001, 0x101, 0x9, 0x8, 0x7ff, 0x0, 0x1000, 0x5, @perf_config_ext={0x3ff, 0xb69b}, 0x3040, 0x2, 0x2, 0x5, 0x7, 0x6, 0x7283ed73}, r0, 0xe, r1, 0x8) bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x0, 0x0, 0x7ffff9, 0x0, 0x20000003, 0x0}, 0x2c) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) r2 = gettid() r3 = perf_event_open(&(0x7f00000008c0)={0x7, 0x70, 0x1, 0x200, 0x3, 0xdbce, 0x0, 0x8, 0x1002, 0x1, 0xffffffffffffff00, 0x8, 0x1, 0xb3fa, 0x8, 0x0, 0x1, 0x2, 0x1000, 0x2, 0x401, 0x8, 0x3, 0x81, 0x0, 0x7, 0x2fc4, 0x882, 0x4, 0x8, 0x3, 0x81, 0x3, 0x7, 0x8857, 0x7, 0x5, 0x9, 0x0, 0x7, 0x1, @perf_config_ext={0x0, 0x80000000}, 0x400, 0x7f, 0x4, 0x7, 0x2, 0x7f, 0x200}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000840)={0x5, 0x70, 0xef, 0x2, 0x1000, 0xffffffff80000000, 0x0, 0x1a7800000000, 0x2000, 0x4, 0x5, 0x6814, 0x3a9, 0x5, 0x63b, 0x6, 0x8, 0x1000, 0x250420ee, 0x3, 0x0, 0x20, 0x6, 0x0, 0x4, 0x5, 0x4, 0x8, 0x3, 0x8, 0x52893dd5, 0x2, 0x2, 0x8, 0x44d, 0x1, 0x8, 0x6, 0x0, 0x100000000, 0x0, @perf_config_ext={0x9, 0x80}, 0x0, 0x0, 0x2b67, 0x6, 0x4b0, 0x81, 0x4}, r2, 0x5, r3, 0xb) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1003, 0x0) mount(&(0x7f00002b9ff8)='./file0\x00', &(0x7f0000cbeff8)='./file0\x00', &(0x7f00005f7ffa)='ramfs\x00', 0x80000, &(0x7f000002f000)) mount(&(0x7f0000000000)='.', &(0x7f0000000040)='.', &(0x7f0000000080)='cgroup\x00', 0x5010, &(0x7f00000000c0)) mount(&(0x7f0000377ff8)='.', &(0x7f0000000280)='.', &(0x7f0000000600)='nfs4\x00', 0x5010, &(0x7f0000000300)="2161893416a0c71070768c219eb114c3253c9f3baf4e9e8e9111c1a7fc6e266009fe27243deeaa22ca7ae9341f714300b5ee807e55d609036f2a3260475922bdfb2d2849f1c3b2ad3c051bd4f3751a177f77a92758c6d2b23fe7f1535b54e5846d11c135de8286066dec1b25f6e1378944ac5f7fce42d055821b5e19") perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xd68, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f0000014f88)={0x5, 0xfffffffffffffdc4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x46000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = getpid() perf_event_open(&(0x7f0000000680)={0x4, 0x70, 0x64, 0xffff, 0x1f, 0x4, 0x0, 0x1c3, 0x0, 0x1, 0x1, 0x9, 0x1ff, 0xfffffffffffffff8, 0x0, 0x0, 0x6, 0x7fffffff, 0x0, 0xffffffff, 0x80000001, 0xd0, 0x7, 0x1f, 0x0, 0x8, 0x9, 0x1ff, 0x8, 0x785, 0x4, 0xff, 0x2, 0x656, 0x5000000, 0x1, 0x460e3be0, 0x1, 0x0, 0x0, 0x7, @perf_bp={&(0x7f0000000640), 0x1}, 0x1000, 0xa, 0x7fff, 0x7, 0x3, 0x400, 0x9}, r5, 0xe, r4, 0x1) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', 0x0, 0x10}, 0x10) close(0xffffffffffffffff) bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)={&(0x7f0000000040)='./file0\x00', 0x0, 0x18}, 0x10) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000100)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0, 0x2e, &(0x7f0000000440), &(0x7f0000000140)=""/46, 0x4229}, 0x28) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000003480)={&(0x7f0000003300)=@can={0x0, 0x0}, 0x80, &(0x7f0000003400)=[{&(0x7f0000003380)=""/56, 0x38}, {&(0x7f00000033c0)=""/1, 0x1}], 0x2, &(0x7f0000003440)=""/33, 0x21, 0x1}, 0x40010000) bpf$PROG_LOAD(0x5, &(0x7f00000034c0)={0xe, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="1800000002000000000000004ce700002555fdff00000000002371d07c9ba7f4a23372b0ad61000000000000009500000000000000"], &(0x7f00000007c0)='GPL\x00', 0x3, 0x2d, &(0x7f0000000800)=""/45, 0x40f00, 0x1, [], r6}, 0x48) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000740)={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x10) socketpair$inet(0x2, 0x80a, 0x81, &(0x7f0000000240)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={0xffffffffffffffff, &(0x7f0000000500)="ae30f1bca1b4d3f69f1aac81517d42ad5980bc63b5008616a1f4724b9f8c1e4ecd8de336f57dd727cdaab04f0b40f28612615ad08de414711d841a88db33fd33884b627074213a0c5de3be2bbaec9207d9865c47f240467849979b5ab5632376608fc4be41a274abb2dc07cabe344a18db51048e5b0cbda843905a4258cdee3e649eddf104ba78894dce09747dcfe6a8d6d6d985520eeef448b83a8bcb83074541ba7a20d6094aa206c01a0690e5b3bfa05d475eb382b0199031d22bb26cde9b1ca0055eef9f6c4993b71ba19ba0590bb5efdaddaa574c25356ca890d138fc9fe0e975b6d5a1a8251503cd0a91845f9d95", &(0x7f0000000480)="9bc7741ea5e524cc8c6f748a73153834428729c45bf4ad446d2dddf1978baf431d0ba35b5442b5afe22db8b003650320200af7e1368ef7cdfa79ca8b9d3564363a5d2a502970314f2264c883bc8d990afc003e5adb95b30edad245c4420c8126f1d33db75ff0230698eaff90055e0f", 0x2}, 0x20) socketpair(0x0, 0x80003, 0xffff, &(0x7f0000000380)={0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r7, 0x50, &(0x7f00000003c0)}, 0x10) 2018/03/29 11:56:14 executing program 3: r0 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x10}, 0x10) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000000c0)={0x0, 0x1000, 0x8}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000080)='./file0\x00', r1}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0x0, 0x8}, 0x10) mount(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='cpuset\x00', 0x40, &(0x7f0000000280)="8a4562cb6a7df38be32246afcaef1e1a3f933cb428242c55c117c0fbbd62cea0aab31f2665fb88267466eca314fc8cafd72cc24143121c0691236768fad66390bf9b55014c2bd49faa5388cbabd52e730eeb4ccc411bacd296e423d971043756cf2b35a4063f2a7465b44a60ef31ae437f6160ed2f63afa62c36a27c33e4779e7c0404e337abc025bb2e4b39cc265573c6ab1a3ff09c7ad6bb4631a4") mount(&(0x7f0000000340)='./file1\x00', &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='devtmpfs\x00', 0x40, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xb, 0x7f, 0x0, 0x1, 0x12, r1, 0x100000000}, 0x2c) mkdir(&(0x7f0000000440)='./file1\x00', 0x20) mount(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='iso9660\x00', 0x8, &(0x7f0000000540)="650fe6ccea2b17860de967406c566ec16fe5a7a4c064707e22906e9d3d2a70b4") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000005c0)={r2, 0x28, &(0x7f0000000580)={0x0, 0x0}}, 0x10) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={r3, 0x8, 0x10}, 0xc) mount(&(0x7f0000000640)='./file1\x00', &(0x7f0000000680)='./file1\x00', &(0x7f00000006c0)='pstore\x00', 0x1000000, &(0x7f0000000700)="f48afa3ab3cc319f917be52b04c388c229578537782bc5ffc32c7747b1d28999ad89f5fba460640a324385ac03cccef4553d641b91d79d014804a98e72796f8eb2e1a7056efeaa63404648df67079ae817420f248ccf9d01e7a027c600c71777fb9ebc97da60f3d1a287ef8bc00f1dc68c3b1f0c1836cde5b62be45dd58c3415cbb0f916fe3c04fc69911e2bec15c208d023bdb608fa727657c532bd5101a2a36b34c4eb65f855fea2d6f8a0a79b15ecef1a4c81a8f6f5ed57b09db2ab482413540416126718f2a33ed21346ded20b084a8dc10702ec279fc486b5c57c163d") socketpair(0x3, 0x2, 0x1f, &(0x7f0000001c40)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$kcm(r6, &(0x7f0000004300)={0x0, 0x0, &(0x7f0000004140)=[{&(0x7f0000001c80)=""/139, 0x8b}, {&(0x7f0000001d40)=""/149, 0x95}, {&(0x7f0000001e00)=""/188, 0xbc}, {&(0x7f0000001ec0)=""/69, 0x45}, {&(0x7f0000001f40)=""/165, 0xa5}, {&(0x7f0000002000)=""/4096, 0x1000}, {&(0x7f0000003000)=""/42, 0x2a}, {&(0x7f0000003040)=""/4096, 0x1000}, {&(0x7f0000004040)=""/233, 0xe9}], 0x9, &(0x7f0000004200)=""/236, 0xec, 0xe00}, 0x40) mount(&(0x7f0000004340)='./file1/file0\x00', &(0x7f0000004380)='./file1\x00', &(0x7f00000043c0)='ceph\x00', 0x4860, &(0x7f0000004400)="2c8eb517dd302be26597065442d58f3f345c295b542b2b1df3046ae176") bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000004600)={r6, &(0x7f0000004440)="903685b47b9c4d5c1dffcefa6a92cd57ccdfaf1af0be272f1cb4a5b86ab9d1ef248a63f04f5d59c2cd6e6b7722f5ff866c5d353014f28baaa95bce06a787a3e085102126a0386ffd4e136d472f2cdfb7c658643d2792b7235e2ec8c782080850c20eb00014eab035d7d56c8ddd0d7fdc4c21602d480e4accea0867cc5b4172b46b8f028bd623c58544092396dbda704543cd7c93219ff7f4caf9d0c12fc32c65ddac48ba22321d2c7ef1152f0dd87ed22cb30eb2b24d381b3abaefc114ad4c08e329cfbce60e0549ca", &(0x7f0000004540)="38859653237c5c9685cf2e44e1eea64846e190b778f29b06c26c2f2b8a0800f9fc2019b05290fc5c82f612eb7f479918015eb3af93cc57f01db731e129275ce05910f66e436ef09a8fe7bf22f960eacec350a7f7e9e9a47cb163f467b6a29523346a4c61d65d2235c73095a53929d509538f640424133cfa3617b41a51aa7172460146433abbe604f2c92827fabd5d3134d36b4cecd0fd2549f3527615f9eb63dd9332021e4eff13ad6aa509db21ed98745d00cb36e547", 0x3}, 0x20) mkdir(&(0x7f0000004640)='./file1/file0\x00', 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000004680)={0x0, 0x0, 0xa6, 0x3, 0x4}, 0x2c) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000046c0)=0x7, 0x4) recvmsg$kcm(r6, &(0x7f00000058c0)={&(0x7f0000004700)=@alg, 0x80, &(0x7f0000005880)=[{&(0x7f0000004780)=""/4096, 0x1000}, {&(0x7f0000005780)=""/219, 0xdb}], 0x2, 0x0, 0x0, 0x100000001}, 0x40000000) r7 = gettid() r8 = perf_event_open(&(0x7f0000005900)={0x7, 0x70, 0x0, 0xfffffffffffffff7, 0x9, 0x4, 0x0, 0x7, 0x100, 0x8, 0x100000000, 0x8000, 0x8, 0x6, 0x0, 0x6, 0x10001, 0x9, 0x1f, 0x2, 0x1, 0x3, 0x1, 0x1f, 0x23, 0x1, 0xaa4, 0x5, 0x4, 0x200, 0x6, 0x9, 0xfffffffffffffffb, 0x3, 0x3, 0xff, 0x80000000, 0x0, 0x0, 0xffffffffffffff9d, 0x2, @perf_config_ext={0x7, 0x9}, 0x100, 0x8, 0x2, 0x6, 0x4, 0x6, 0xf71}, r7, 0x9, r6, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f00000059c0)={&(0x7f0000005980)='./file0\x00'}, 0x10) ioctl$sock_kcm_SIOCKCMATTACH(r5, 0x89e0, &(0x7f0000005a00)={r5, r0}) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000005c00)={r4, &(0x7f0000005a40)="313befc1e9ac680c4369983530ee783c4f018c38e134b4b0aebd06ede05f238850949c0f5d32ab19889f880e87e3a0fa5a43500affdcc508d56f3a4df6c159ca9cfa62124b79b4607d42738dc5e16d09ea2c6a2346fc2360feff08d9f464dfdebce2cb99d4ba8e5fc37edfba041f14e16a68192d7d8687404ee7318323520188c4e5d52e8c7ec40bd0823fb210e530c74ea842bd8bacbc48317b0b6ed12528ecd30e1af83b8049df791ff7affe91ab54", &(0x7f0000005b00)=""/243}, 0x18) mount(&(0x7f0000005c40)='./file1/file0\x00', &(0x7f0000005c80)='./file1\x00', &(0x7f0000005cc0)='btrfs\x00', 0x0, 0x0) recvmsg(r5, &(0x7f00000073c0)={&(0x7f0000005d00)=@sco, 0x80, &(0x7f0000007300)=[{&(0x7f0000005d80)=""/103, 0x67}, {&(0x7f0000005e00)=""/170, 0xaa}, {&(0x7f0000005ec0)=""/252, 0xfc}, {&(0x7f0000005fc0)=""/136, 0x88}, {&(0x7f0000006080)=""/125, 0x7d}, {&(0x7f0000006100)=""/4096, 0x1000}, {&(0x7f0000007100)=""/106, 0x6a}, {&(0x7f0000007180)=""/115, 0x73}, {&(0x7f0000007200)=""/240, 0xf0}], 0x9, 0x0, 0x0, 0x7}, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000007400)={r3, 0x10001, 0x18}, 0xc) ioctl$PERF_EVENT_IOC_REFRESH(r8, 0x2402, 0x0) recvmsg$kcm(r6, &(0x7f0000008880)={&(0x7f0000007440)=@l2, 0x80, &(0x7f0000008800)=[{&(0x7f00000074c0)=""/231, 0xe7}, {&(0x7f00000075c0)=""/118, 0x76}, {&(0x7f0000007640)=""/4096, 0x1000}, {&(0x7f0000008640)=""/223, 0xdf}, {&(0x7f0000008740)}, {&(0x7f0000008780)=""/32, 0x20}, {&(0x7f00000087c0)=""/53, 0x35}], 0x7}, 0x10000) 2018/03/29 11:56:14 executing program 0: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000001a00)) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f00000001c0)={0xffffffffffffffff}) recvmsg$kcm(r1, &(0x7f0000000540)={&(0x7f00000000c0)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @broadcast}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000240)=""/65, 0x41}], 0x1, &(0x7f0000000440)=""/213, 0xd5}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x8983, &(0x7f0000000180)) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000019c0)={0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000000140)="0253eea6a53cc0eae389e9a13e5f2046d0633eebde90f446c1b1eabbd0adb42dfcefb37a3df93feb3d5e76dc353ecf23fe9c81afa5", 0x35}, {&(0x7f00000002c0)}, {&(0x7f0000000400)}, {&(0x7f0000001600)}], 0x4, &(0x7f0000001700)=ANY=[@ANYBLOB="680000000000000007010000c17d0425755cd1e9e23de47cf28319d813deb534cee2d9497c58eba5bd8a228407fb709d7007000000f4924f12ecc429b6fd356748940b62ee5f5685ce027fe4e6c60a8f88cd1a5827d099f5849f09bd37f681e29814e6bb00000000100000000000000000000000ff01000010000000000000000701000001000080"], 0x88}, 0x48800) 2018/03/29 11:56:14 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x1e1, 0x100000000209e20, 0x8000000001, 0x5}, 0xfffffffffffffe20) r0 = getpid() r1 = perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0xfffffffffffffffc, 0x3, 0x8, 0x2, 0x0, 0x9, 0x10000, 0xc, 0x3d3, 0x80, 0x5, 0xfffffffffffffffc, 0x8, 0x3f, 0x5d, 0xbbb0, 0x20, 0x3, 0x8000, 0x100000000, 0x8, 0x9, 0x2, 0x4, 0x800, 0xf8, 0x3, 0x9, 0x1, 0x3, 0x8, 0x3, 0x7, 0x10001, 0xf16, 0x2, 0x0, 0x7fffffff, 0x4, @perf_bp={&(0x7f0000000780), 0x1}, 0x4080, 0x10001, 0xcc, 0x7, 0x3, 0xffff, 0x7fffffff}, 0xffffffffffffffff, 0xd, 0xffffffffffffff9c, 0x8) perf_event_open(&(0x7f0000000980)={0x4, 0x70, 0x6, 0x3f, 0x8e, 0x1, 0x0, 0x3, 0x404, 0x0, 0xbc2b, 0x40, 0x7, 0xffff, 0xffff, 0x9, 0x9de2, 0x9, 0x0, 0x3, 0x7f, 0xff, 0x40, 0x400, 0x9, 0x7fffffff, 0x80000000, 0x7, 0x8, 0x10001, 0x1f, 0x2778, 0x800, 0x8001, 0x101, 0x9, 0x8, 0x7ff, 0x0, 0x1000, 0x5, @perf_config_ext={0x3ff, 0xb69b}, 0x3040, 0x2, 0x2, 0x5, 0x7, 0x6, 0x7283ed73}, r0, 0xe, r1, 0x8) bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x0, 0x0, 0x7ffff9, 0x0, 0x20000003, 0x0}, 0x2c) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) r2 = gettid() r3 = perf_event_open(&(0x7f00000008c0)={0x7, 0x70, 0x1, 0x200, 0x3, 0xdbce, 0x0, 0x8, 0x1002, 0x1, 0xffffffffffffff00, 0x8, 0x1, 0xb3fa, 0x8, 0x0, 0x1, 0x2, 0x1000, 0x2, 0x401, 0x8, 0x3, 0x81, 0x0, 0x7, 0x2fc4, 0x882, 0x4, 0x8, 0x3, 0x81, 0x3, 0x7, 0x8857, 0x7, 0x5, 0x9, 0x0, 0x7, 0x1, @perf_config_ext={0x0, 0x80000000}, 0x400, 0x7f, 0x4, 0x7, 0x2, 0x7f, 0x200}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000840)={0x5, 0x70, 0xef, 0x2, 0x1000, 0xffffffff80000000, 0x0, 0x1a7800000000, 0x2000, 0x4, 0x5, 0x6814, 0x3a9, 0x5, 0x63b, 0x6, 0x8, 0x1000, 0x250420ee, 0x3, 0x0, 0x20, 0x6, 0x0, 0x4, 0x5, 0x4, 0x8, 0x3, 0x8, 0x52893dd5, 0x2, 0x2, 0x8, 0x44d, 0x1, 0x8, 0x6, 0x0, 0x100000000, 0x0, @perf_config_ext={0x9, 0x80}, 0x0, 0x0, 0x2b67, 0x6, 0x4b0, 0x81, 0x4}, r2, 0x5, r3, 0xb) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1003, 0x0) mount(&(0x7f00002b9ff8)='./file0\x00', &(0x7f0000cbeff8)='./file0\x00', &(0x7f00005f7ffa)='ramfs\x00', 0x80000, &(0x7f000002f000)) mount(&(0x7f0000000000)='.', &(0x7f0000000040)='.', &(0x7f0000000080)='cgroup\x00', 0x5010, &(0x7f00000000c0)) mount(&(0x7f0000377ff8)='.', &(0x7f0000000280)='.', &(0x7f0000000600)='nfs4\x00', 0x5010, &(0x7f0000000300)="2161893416a0c71070768c219eb114c3253c9f3baf4e9e8e9111c1a7fc6e266009fe27243deeaa22ca7ae9341f714300b5ee807e55d609036f2a3260475922bdfb2d2849f1c3b2ad3c051bd4f3751a177f77a92758c6d2b23fe7f1535b54e5846d11c135de8286066dec1b25f6e1378944ac5f7fce42d055821b5e19") perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xd68, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f0000014f88)={0x5, 0xfffffffffffffdc4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x46000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = getpid() perf_event_open(&(0x7f0000000680)={0x4, 0x70, 0x64, 0xffff, 0x1f, 0x4, 0x0, 0x1c3, 0x0, 0x1, 0x1, 0x9, 0x1ff, 0xfffffffffffffff8, 0x0, 0x0, 0x6, 0x7fffffff, 0x4, 0xffffffff, 0x80000001, 0xd0, 0x7, 0x1f, 0x0, 0x8, 0x9, 0x1ff, 0x8, 0x785, 0x4, 0xff, 0x2, 0x656, 0x5000000, 0x1, 0x460e3be0, 0x1, 0x0, 0x0, 0x7, @perf_bp={&(0x7f0000000640), 0x1}, 0x1000, 0xa, 0x7fff, 0x7, 0x3, 0x400, 0x9}, r5, 0xe, r4, 0x1) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', 0x0, 0x10}, 0x10) close(0xffffffffffffffff) bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)={&(0x7f0000000040)='./file0\x00', 0x0, 0x18}, 0x10) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000100)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0, 0x2e, &(0x7f0000000440), &(0x7f0000000140)=""/46, 0x4229}, 0x28) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000003480)={&(0x7f0000003300)=@can={0x0, 0x0}, 0x80, &(0x7f0000003400)=[{&(0x7f0000003380)=""/56, 0x38}, {&(0x7f00000033c0)=""/1, 0x1}], 0x2, &(0x7f0000003440)=""/33, 0x21, 0x1}, 0x40010000) bpf$PROG_LOAD(0x5, &(0x7f00000034c0)={0xe, 0x6, &(0x7f0000000940)=ANY=[@ANYBLOB="1800000002000000000000004ce700002555fdff00000000002371d07c9ba7f4a23372b0ad61000000000000009500000000000000"], &(0x7f00000007c0)='GPL\x00', 0x0, 0x2d, &(0x7f0000000800)=""/45, 0x40f00, 0x1, [], r6}, 0x48) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000740)={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x10) socketpair$inet(0x2, 0x80a, 0x81, &(0x7f0000000240)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={0xffffffffffffffff, &(0x7f0000000500)="ae30f1bca1b4d3f69f1aac81517d42ad5980bc63b5008616a1f4724b9f8c1e4ecd8de336f57dd727cdaab04f0b40f28612615ad08de414711d841a88db33fd33884b627074213a0c5de3be2bbaec9207d9865c47f240467849979b5ab5632376608fc4be41a274abb2dc07cabe344a18db51048e5b0cbda843905a4258cdee3e649eddf104ba78894dce09747dcfe6a8d6d6d985520eeef448b83a8bcb83074541ba7a20d6094aa206c01a0690e5b3bfa05d475eb382b0199031d22bb26cde9b1ca0055eef9f6c4993b71ba19ba0590bb5efdaddaa574c25356ca890d138fc9fe0e975b6d5a1a8251503cd0a91845f9d95", &(0x7f0000000480)="9bc7741ea5e524cc8c6f748a73153834428729c45bf4ad446d2dddf1978baf431d0ba35b5442b5afe22db8b003650320200af7e1368ef7cdfa79ca8b9d3564363a5d2a502970314f2264c883bc8d990afc003e5adb95b30edad245c4420c8126f1d33db75ff0230698eaff90055e0f", 0x2}, 0x20) socketpair(0x0, 0x80003, 0xffff, &(0x7f0000000380)={0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r7, 0x50, &(0x7f00000003c0)}, 0x10) 2018/03/29 11:56:14 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x1e1, 0x100000000209e20, 0x0, 0x5}, 0xfffffffffffffe20) r0 = getpid() r1 = perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0xfffffffffffffffc, 0x3, 0x8, 0x2, 0x0, 0x9, 0x10000, 0xc, 0x3d3, 0x80, 0x5, 0xfffffffffffffffc, 0x8, 0x3f, 0x5d, 0xbbb0, 0x20, 0x3, 0x8000, 0x100000000, 0x8, 0x9, 0x2, 0x4, 0x800, 0xf8, 0x3, 0x9, 0x1, 0x3, 0x8, 0x3, 0x7, 0x10001, 0xf16, 0x2, 0x0, 0x7fffffff, 0x4, @perf_bp={&(0x7f0000000780), 0x1}, 0x4080, 0x10001, 0xcc, 0x7, 0x3, 0xffff, 0x7fffffff}, 0xffffffffffffffff, 0xd, 0xffffffffffffff9c, 0x8) perf_event_open(&(0x7f0000000980)={0x4, 0x70, 0x6, 0x3f, 0x8e, 0x1, 0x0, 0x3, 0x404, 0x0, 0xbc2b, 0x40, 0x7, 0xffff, 0xffff, 0x9, 0x9de2, 0x9, 0x0, 0x3, 0x7f, 0xff, 0x40, 0x400, 0x9, 0x7fffffff, 0x80000000, 0x7, 0x8, 0x10001, 0x1f, 0x2778, 0x800, 0x8001, 0x101, 0x9, 0x8, 0x7ff, 0x0, 0x1000, 0x5, @perf_config_ext={0x3ff, 0xb69b}, 0x3040, 0x2, 0x2, 0x5, 0x7, 0x6, 0x7283ed73}, r0, 0xe, r1, 0x8) bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x0, 0x0, 0x7ffff9, 0x0, 0x20000003, 0x0}, 0x2c) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) r2 = gettid() r3 = perf_event_open(&(0x7f00000008c0)={0x7, 0x70, 0x1, 0x200, 0x3, 0xdbce, 0x0, 0x8, 0x1002, 0x1, 0xffffffffffffff00, 0x8, 0x1, 0xb3fa, 0x8, 0x0, 0x1, 0x2, 0x1000, 0x2, 0x401, 0x8, 0x3, 0x81, 0x0, 0x7, 0x2fc4, 0x882, 0x4, 0x8, 0x3, 0x81, 0x3, 0x7, 0x8857, 0x7, 0x5, 0x9, 0x0, 0x7, 0x1, @perf_config_ext={0x0, 0x80000000}, 0x400, 0x7f, 0x4, 0x7, 0x2, 0x7f, 0x200}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000840)={0x5, 0x70, 0xef, 0x2, 0x1000, 0xffffffff80000000, 0x0, 0x1a7800000000, 0x2000, 0x4, 0x5, 0x6814, 0x3a9, 0x5, 0x63b, 0x6, 0x8, 0x1000, 0x250420ee, 0x3, 0x0, 0x20, 0x6, 0x0, 0x4, 0x5, 0x4, 0x8, 0x3, 0x8, 0x52893dd5, 0x2, 0x2, 0x8, 0x44d, 0x1, 0x8, 0x6, 0x0, 0x100000000, 0x0, @perf_config_ext={0x9, 0x80}, 0x0, 0x0, 0x2b67, 0x6, 0x4b0, 0x81, 0x4}, r2, 0x5, r3, 0xb) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1003, 0x0) mount(&(0x7f00002b9ff8)='./file0\x00', &(0x7f0000cbeff8)='./file0\x00', &(0x7f00005f7ffa)='ramfs\x00', 0x80000, &(0x7f000002f000)) mount(&(0x7f0000000000)='.', &(0x7f0000000040)='.', &(0x7f0000000080)='cgroup\x00', 0x5010, &(0x7f00000000c0)) mount(&(0x7f0000377ff8)='.', &(0x7f0000000280)='.', &(0x7f0000000600)='nfs4\x00', 0x5010, &(0x7f0000000300)="2161893416a0c71070768c219eb114c3253c9f3baf4e9e8e9111c1a7fc6e266009fe27243deeaa22ca7ae9341f714300b5ee807e55d609036f2a3260475922bdfb2d2849f1c3b2ad3c051bd4f3751a177f77a92758c6d2b23fe7f1535b54e5846d11c135de8286066dec1b25f6e1378944ac5f7fce42d055821b5e19") perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xd68, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f0000014f88)={0x5, 0xfffffffffffffdc4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x46000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = getpid() perf_event_open(&(0x7f0000000680)={0x4, 0x70, 0x64, 0xffff, 0x1f, 0x4, 0x0, 0x1c3, 0x0, 0x1, 0x1, 0x9, 0x1ff, 0xfffffffffffffff8, 0x0, 0x0, 0x6, 0x7fffffff, 0x0, 0xffffffff, 0x80000001, 0xd0, 0x7, 0x1f, 0x0, 0x8, 0x9, 0x1ff, 0x8, 0x785, 0x4, 0xff, 0x2, 0x656, 0x5000000, 0x1, 0x460e3be0, 0x1, 0x0, 0x0, 0x7, @perf_bp={&(0x7f0000000640), 0x1}, 0x1000, 0xa, 0x7fff, 0x7, 0x3, 0x400, 0x9}, r5, 0xe, r4, 0x1) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', 0x0, 0x10}, 0x10) close(0xffffffffffffffff) bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)={&(0x7f0000000040)='./file0\x00', 0x0, 0x18}, 0x10) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000100)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0, 0x2e, &(0x7f0000000440), &(0x7f0000000140)=""/46, 0x4229}, 0x28) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000003480)={&(0x7f0000003300)=@can={0x0, 0x0}, 0x80, &(0x7f0000003400)=[{&(0x7f0000003380)=""/56, 0x38}, {&(0x7f00000033c0)=""/1, 0x1}], 0x2, &(0x7f0000003440)=""/33, 0x21, 0x1}, 0x40010000) bpf$PROG_LOAD(0x5, &(0x7f00000034c0)={0xe, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="1800000002000000000000004ce700002555fdff00000000002371d07c9ba7f4a23372b0ad61000000000000009500000000000000"], &(0x7f00000007c0)='GPL\x00', 0x3, 0x2d, &(0x7f0000000800)=""/45, 0x40f00, 0x1, [], r6}, 0x48) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000740)={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x10) socketpair$inet(0x2, 0x80a, 0x81, &(0x7f0000000240)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={0xffffffffffffffff, &(0x7f0000000500)="ae30f1bca1b4d3f69f1aac81517d42ad5980bc63b5008616a1f4724b9f8c1e4ecd8de336f57dd727cdaab04f0b40f28612615ad08de414711d841a88db33fd33884b627074213a0c5de3be2bbaec9207d9865c47f240467849979b5ab5632376608fc4be41a274abb2dc07cabe344a18db51048e5b0cbda843905a4258cdee3e649eddf104ba78894dce09747dcfe6a8d6d6d985520eeef448b83a8bcb83074541ba7a20d6094aa206c01a0690e5b3bfa05d475eb382b0199031d22bb26cde9b1ca0055eef9f6c4993b71ba19ba0590bb5efdaddaa574c25356ca890d138fc9fe0e975b6d5a1a8251503cd0a91845f9d95", &(0x7f0000000480)="9bc7741ea5e524cc8c6f748a73153834428729c45bf4ad446d2dddf1978baf431d0ba35b5442b5afe22db8b003650320200af7e1368ef7cdfa79ca8b9d3564363a5d2a502970314f2264c883bc8d990afc003e5adb95b30edad245c4420c8126f1d33db75ff0230698eaff90055e0f", 0x2}, 0x20) socketpair(0x0, 0x80003, 0xffff, &(0x7f0000000380)={0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r7, 0x50, &(0x7f00000003c0)}, 0x10) 2018/03/29 11:56:14 executing program 3: r0 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x10}, 0x10) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000000c0)={0x0, 0x1000, 0x8}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000080)='./file0\x00', r1}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0x0, 0x8}, 0x10) mount(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='cpuset\x00', 0x40, &(0x7f0000000280)="8a4562cb6a7df38be32246afcaef1e1a3f933cb428242c55c117c0fbbd62cea0aab31f2665fb88267466eca314fc8cafd72cc24143121c0691236768fad66390bf9b55014c2bd49faa5388cbabd52e730eeb4ccc411bacd296e423d971043756cf2b35a4063f2a7465b44a60ef31ae437f6160ed2f63afa62c36a27c33e4779e7c0404e337abc025bb2e4b39cc265573c6ab1a3ff09c7ad6bb4631a4") mount(&(0x7f0000000340)='./file1\x00', &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='devtmpfs\x00', 0x40, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xb, 0x7f, 0x0, 0x1, 0x12, r1, 0x100000000}, 0x2c) mkdir(&(0x7f0000000440)='./file1\x00', 0x20) mount(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='iso9660\x00', 0x8, &(0x7f0000000540)="650fe6ccea2b17860de967406c566ec16fe5a7a4c064707e22906e9d3d2a70b4") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000005c0)={r2, 0x28, &(0x7f0000000580)={0x0, 0x0}}, 0x10) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={r3, 0x8, 0x10}, 0xc) mount(&(0x7f0000000640)='./file1\x00', &(0x7f0000000680)='./file1\x00', &(0x7f00000006c0)='pstore\x00', 0x1000000, &(0x7f0000000700)="f48afa3ab3cc319f917be52b04c388c229578537782bc5ffc32c7747b1d28999ad89f5fba460640a324385ac03cccef4553d641b91d79d014804a98e72796f8eb2e1a7056efeaa63404648df67079ae817420f248ccf9d01e7a027c600c71777fb9ebc97da60f3d1a287ef8bc00f1dc68c3b1f0c1836cde5b62be45dd58c3415cbb0f916fe3c04fc69911e2bec15c208d023bdb608fa727657c532bd5101a2a36b34c4eb65f855fea2d6f8a0a79b15ecef1a4c81a8f6f5ed57b09db2ab482413540416126718f2a33ed21346ded20b084a8dc10702ec279fc486b5c57c163d") socketpair(0x3, 0x2, 0x1f, &(0x7f0000001c40)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$kcm(r6, &(0x7f0000004300)={0x0, 0x0, &(0x7f0000004140)=[{&(0x7f0000001c80)=""/139, 0x8b}, {&(0x7f0000001d40)=""/149, 0x95}, {&(0x7f0000001e00)=""/188, 0xbc}, {&(0x7f0000001ec0)=""/69, 0x45}, {&(0x7f0000001f40)=""/165, 0xa5}, {&(0x7f0000002000)=""/4096, 0x1000}, {&(0x7f0000003000)=""/42, 0x2a}, {&(0x7f0000003040)=""/4096, 0x1000}, {&(0x7f0000004040)=""/233, 0xe9}], 0x9, &(0x7f0000004200)=""/236, 0xec, 0xe00}, 0x40) mount(&(0x7f0000004340)='./file1/file0\x00', &(0x7f0000004380)='./file1\x00', &(0x7f00000043c0)='ceph\x00', 0x4860, &(0x7f0000004400)="2c8eb517dd302be26597065442d58f3f345c295b542b2b1df3046ae176") bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000004600)={r6, &(0x7f0000004440)="903685b47b9c4d5c1dffcefa6a92cd57ccdfaf1af0be272f1cb4a5b86ab9d1ef248a63f04f5d59c2cd6e6b7722f5ff866c5d353014f28baaa95bce06a787a3e085102126a0386ffd4e136d472f2cdfb7c658643d2792b7235e2ec8c782080850c20eb00014eab035d7d56c8ddd0d7fdc4c21602d480e4accea0867cc5b4172b46b8f028bd623c58544092396dbda704543cd7c93219ff7f4caf9d0c12fc32c65ddac48ba22321d2c7ef1152f0dd87ed22cb30eb2b24d381b3abaefc114ad4c08e329cfbce60e0549ca", &(0x7f0000004540)="38859653237c5c9685cf2e44e1eea64846e190b778f29b06c26c2f2b8a0800f9fc2019b05290fc5c82f612eb7f479918015eb3af93cc57f01db731e129275ce05910f66e436ef09a8fe7bf22f960eacec350a7f7e9e9a47cb163f467b6a29523346a4c61d65d2235c73095a53929d509538f640424133cfa3617b41a51aa7172460146433abbe604f2c92827fabd5d3134d36b4cecd0fd2549f3527615f9eb63dd9332021e4eff13ad6aa509db21ed98745d00cb36e547", 0x3}, 0x20) mkdir(&(0x7f0000004640)='./file1/file0\x00', 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000004680)={0x0, 0x0, 0xa6, 0x3, 0x4}, 0x2c) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000046c0)=0x7, 0x4) recvmsg$kcm(r6, &(0x7f00000058c0)={&(0x7f0000004700)=@alg, 0x80, &(0x7f0000005880)=[{&(0x7f0000004780)=""/4096, 0x1000}, {&(0x7f0000005780)=""/219, 0xdb}], 0x2, 0x0, 0x0, 0x100000001}, 0x40000000) r7 = gettid() r8 = perf_event_open(&(0x7f0000005900)={0x7, 0x70, 0x0, 0xfffffffffffffff7, 0x9, 0x4, 0x0, 0x7, 0x100, 0x8, 0x100000000, 0x8000, 0x8, 0x6, 0x0, 0x6, 0x10001, 0x9, 0x1f, 0x2, 0x1, 0x3, 0x1, 0x1f, 0x23, 0x1, 0xaa4, 0x5, 0x4, 0x200, 0x6, 0x9, 0xfffffffffffffffb, 0x3, 0x3, 0xff, 0x80000000, 0x0, 0x0, 0xffffffffffffff9d, 0x2, @perf_config_ext={0x7, 0x9}, 0x100, 0x8, 0x2, 0x6, 0x4, 0x6, 0xf71}, r7, 0x9, r6, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f00000059c0)={&(0x7f0000005980)='./file0\x00'}, 0x10) ioctl$sock_kcm_SIOCKCMATTACH(r5, 0x89e0, &(0x7f0000005a00)={r5, r0}) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000005c00)={r4, &(0x7f0000005a40)="313befc1e9ac680c4369983530ee783c4f018c38e134b4b0aebd06ede05f238850949c0f5d32ab19889f880e87e3a0fa5a43500affdcc508d56f3a4df6c159ca9cfa62124b79b4607d42738dc5e16d09ea2c6a2346fc2360feff08d9f464dfdebce2cb99d4ba8e5fc37edfba041f14e16a68192d7d8687404ee7318323520188c4e5d52e8c7ec40bd0823fb210e530c74ea842bd8bacbc48317b0b6ed12528ecd30e1af83b8049df791ff7affe91ab54", &(0x7f0000005b00)=""/243}, 0x18) mount(&(0x7f0000005c40)='./file1/file0\x00', &(0x7f0000005c80)='./file1\x00', &(0x7f0000005cc0)='btrfs\x00', 0x0, 0x0) recvmsg(r5, &(0x7f00000073c0)={&(0x7f0000005d00)=@sco, 0x80, &(0x7f0000007300)=[{&(0x7f0000005d80)=""/103, 0x67}, {&(0x7f0000005e00)=""/170, 0xaa}, {&(0x7f0000005ec0)=""/252, 0xfc}, {&(0x7f0000005fc0)=""/136, 0x88}, {&(0x7f0000006080)=""/125, 0x7d}, {&(0x7f0000006100)=""/4096, 0x1000}, {&(0x7f0000007100)=""/106, 0x6a}, {&(0x7f0000007180)=""/115, 0x73}, {&(0x7f0000007200)=""/240, 0xf0}], 0x9, 0x0, 0x0, 0x7}, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000007400)={r3, 0x10001, 0x18}, 0xc) ioctl$PERF_EVENT_IOC_REFRESH(r8, 0x2402, 0x0) recvmsg$kcm(r6, &(0x7f0000008880)={&(0x7f0000007440)=@l2, 0x80, &(0x7f0000008800)=[{&(0x7f00000074c0)=""/231, 0xe7}, {&(0x7f00000075c0)=""/118, 0x76}, {&(0x7f0000007640)=""/4096, 0x1000}, {&(0x7f0000008640)=""/223, 0xdf}, {&(0x7f0000008740)}, {&(0x7f0000008780)=""/32, 0x20}, {&(0x7f00000087c0)=""/53, 0x35}], 0x7}, 0x10000) 2018/03/29 11:56:14 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x3, &(0x7f0000002000)=@framed={{0x18}, [], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000680)={0xffffffffffffffff, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x7}, 0x28) recvmsg(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000001c0)) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000100), 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) recvmsg(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000000b40)=@can, 0x80, &(0x7f0000001100)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f0000000c80)=""/169, 0xa9}, {&(0x7f0000000d40)=""/229, 0xe5}, {&(0x7f0000000e40)=""/128, 0x80}, {&(0x7f0000000ec0)=""/48, 0x30}, {&(0x7f0000000f00)=""/137, 0x89}, {&(0x7f0000006000)=""/4096, 0x1000}, {&(0x7f0000007000)=""/4096, 0x1000}, {&(0x7f0000001080)=""/127, 0x7f}, {&(0x7f0000008000)=""/4096, 0x1000}], 0xa, 0x0, 0x0, 0x1}, 0x2020) bpf$MAP_CREATE(0x0, &(0x7f0000001200)={0x7, 0x4, 0x0, 0x4, 0x8, 0xffffffffffffffff, 0x9}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x1000000007, 0xcf2e, 0x7e, 0x20, 0x15, r1, 0x4}, 0x2c) socketpair(0x3, 0x80e, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r4, &(0x7f0000000200)={&(0x7f0000000fc0)=@pppol2tp={0x18, 0x1, {0x0, r3, {0x2, 0x4e20, @broadcast=0xffffffff}, 0x1, 0x3, 0x0, 0x2}}, 0x80, &(0x7f0000001580)=[{&(0x7f0000001240)="95c4dcff0f017b3c1979888e50f6c20a37b4edaffb28a3b609d24a8180434ab2fac426d3e4fc87e18267002be3cd56b11d69c4db739bf6a9c91af67ee87be1ea522993a368bdfc0df55539a60ef5515b4f03f3dbddae65cd66a90f030118870b473f156cb9a18624103000608c63f84b09ea89bfb8d8e7705c6ef456ef28adec5e566632ddd63098", 0x88}, {&(0x7f0000001380)="5745869bf3b6f562576761d821af2ad55c2f81345c810d6dbd43facd33c5107488aa7f04c5ab1302b820cd31405e9f657776a0d48e2225f39aabc3de0b30dc7422503b448ad89c23ebaee24ae9696e4e58eccae5febf47fff53dc1f03d869303acdef233746263c5c567e84edb166010fd23f56d6e84406bced5a00b5016b0c700fd76218ecf5da3527552a683eb87aa4b246cd74bcbeff8dedec74332e0214e4dc64cb7ac24c4447843caa7550375ef8e1f74a78c40a617e913a25e4837d24fb09e93eaa2", 0xc5}, {&(0x7f0000001480)="8247f46d4324760570d5078149dc5b38f7d1c592564148ecc6262e91c29cd4344e423ff476882993a2844af9a7c306a15e659a4cb9230b5139842c87ad8fa95c202146730fa610b141dfe4c7b771b46e4db879d2b92a01cb8642100d80a1d4658fd0df05c06c8615960a92b690c728e2603373657a9a46b2f200f2895198694d470ab95b6eb7a76ccee67c9219b4afa289d70c87cf22c733e00700f345136d59bcbd89ce7e110746f91e7a7661b8eb0afe54e3cb1c712441dd9a6ffb59a2eb58e5f5eabd4bec428fe27a403bb0d19125e473abdfea87a0c89108e3c876438a7c3f84bebad6cf858f26d2083efd60", 0xee}], 0x3, &(0x7f000000a000)=[{0x88, 0x112, 0xc2, "6671b4b66ac2fb4e14cee671813dc3834802e601529feb049ebb70880567948953018cfd53d7b1c9be27b1084adfba62040c7f889cfbc15407d93133259d9d5052bf6648a69218702e35278939ad399dc3ebed233c1792c7c1204353c8fe75ea0398f4aaf830834bc93873c119dddc539c"}, {0xe8, 0x6f180cc1befb202, 0x9, "4577f77fd3b3acd92c96feff8b0409afeae1c16fa3d367241c9679e5105141c7205d47ce27a418c10fbe7f601c3142e7b7b3a67322c9d345e0baf4315e13dc771a962ff445015c98a70b319d46ba59155d1cf07827804ea1ca86db74f3029bd60f6f365d955ec12be30102e59b4b3940152988ef09443df596bad9525f697fad61507e856c6acb744cfb034863943e811bd378843ccbd95f8221a444f4c323a391f5788559f34ac02e6e18065b87e8c962353623250694e5b4bf9bc1b00fadf2875995067ff6c18590c207f9a83f06665f5b5af77b4e"}, {0xa0, 0x10f, 0x5, "07c5972c79a30903d5d93f57c962c0351628551f6a3fbac8e18984ad9b8caeb403f1d588fa0b9955ce44d018cbcc06ad98b588dd45fd0ccd6b8d1965e70693ec76dd521aa2693829ef54059dc3191f2f4eca64c63f2f901ead2d6c54f0119212ebb77e956117d9130d3adff30a5598567fd540cf0a8f9f8c469ad15f209ad8ef161006831b39e4ddf2fcd748a8629e33"}], 0x210, 0x40}, 0x40) close(r0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)) recvmsg(r2, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) recvmsg$kcm(r4, &(0x7f0000001a00)={0x0, 0x0, &(0x7f00000018c0)=[{&(0x7f0000001600)=""/173, 0xad}, {&(0x7f0000001040)=""/25, 0x19}, {&(0x7f00000016c0)=""/132, 0x84}, {&(0x7f0000001780)=""/91, 0x5b}, {&(0x7f0000001800)=""/183, 0xb7}], 0x5, &(0x7f0000001940)=""/163, 0xa3, 0xe43}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000a80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r5}, 0x48) 2018/03/29 11:56:14 executing program 0: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000001a00)) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000001a40)={0xffffffffffffffff}) recvmsg$kcm(r1, &(0x7f0000000540)={&(0x7f00000000c0)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @broadcast}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000240)=""/65, 0x41}], 0x1, &(0x7f0000000440)=""/213, 0xd5}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x8983, &(0x7f0000000040)) sendmsg$kcm(r2, &(0x7f00000016c0)={&(0x7f0000000180)=@pptp={0x18, 0x2, {0x2}}, 0x80, &(0x7f0000001600)=[{}, {&(0x7f00000002c0)="ee903b144dd28cbc4fff54cec0ad88bcab48b3ca31536fceba2146317384dfa264666427f8a57f1650764348da5fe1ca7e06349e2442ecb9b52880ef5c1d599b1e8c0783b524139a46aefc2f4907ec61ce0489cb4e45ada7b1a984d78bfb87643b75dfa21833cad5985421c6bfcc332d32dd7d", 0x73}, {&(0x7f0000000200)="a239a0dfe09fe18d8e88ab932a74ee2c0f", 0x11}, {&(0x7f0000000580)="ca997d3401ba1f4022b8091a3c4de036c884c5fb06a266a4dcc4ca42af22089e352c6bf17dde896e23a2d577a88113a28e08854fa801b128869f60c43a026d07f7c661b2e00263e7cc0f2e0c36b6381392751ad2e4e0a80e0ba6fbecc8ed114902d9c6ea345f747e5ad59b299d5c9a58d53c2aafc63ee4da399316bcbc09681e900e1766e1374fdc008b489b11cb5fd57bc10bf556c3ec6228e229e5f6d5d7d3f5f57e8a809461a5765d34ddd6685ded5738b1d44cb4e576623dbeae7d62d585655e59d39d377754acb69d51641a22bc47a12bce6a0b73eaa06be59ccb440a251cc074b47f2f0306e81a9321029d73c738fba9b808c891f1ee6e5d91357797bda16f76125b07047ec8e7613aa798ffc21b15a1cb6c691f7083b0aa4cb868e5777f61f551379c7a81e3d997b5afcb80a776870274bb7c4edfbbe01a2b4a587b3b24cc65c4407e5cac52eef4924a1a186210daa89576f43ec0b0587a7033ae44c9febe5df6321b0ab5490819f830e9c1ca2e8b2f6e1503828a72f0cfbc473945683bd46fc300c5d75a16df8a20c47706dbe4e01dc42e2038f1d443eaca71fdccaa9af83efeec5d9c93f0081b1b8a084873bb81d7b873277c2aa7828351eae0ece3b1d8bbd08872907fa5945036b865b8eb83204be58e27aa66e5e8cbea24f0d771bc9b70eb7bf2c81e33543616f03b13c54663f2e7385fd1686d4c428bc781b4c33d7c438317ea9210f8220d81d321304de6225ed32fb5a3220bd06a165eba3246711844ebd359cbee750d7cf891650f97200438804dbf00b5f7c27cafe879a119fb984ec240eeaa81bd39092ccd83f95a1bc4adf352c82af0d6c7dc21a2e879e2fc8d0faa4f95346179ba72b7be14e50c4dc3b9649999bfe77a144bc81b3887f7f7997dad4c9f71a52c4867773d5adbd370c02317c4b1ee5efa76a3c423327efea24692fdc69107040102502181a9115f20b4ca23df956ba839ebf5e3099b524b4d816b0b17e8a5d6ff43ab20ad8538c21fdb88810f6c4cca12bb500c3f208448fa9b872c1cde03abf12d83ddb683c65233c791c6ae6755f0015c392decc80f08bac5ee727b9a0447c5a12a19f4246e0bfcef508f38fd61f44eb6d18ae4a8a796ab40f5fc0aa7094fd9a821cf3180777ae79de6aff646436c595aaa473d9c8b2c5895b8b7af51c5e8d08ae47e4d5b41d914a450568ad2e098f01bca3ea365409ac992d709fa5747f3d7380283b9a1ab94f89d597b136f06b81223062a20a48c646d4215f101131aa3c112c9fa949be0fe7ffa0e39299b7e2d854773b2d0b99500a0d5856396215e414cef09eede3b958fd84adb08f20552b85c7c7384d0c5720f1d7eabfd3ee94ab5b052e425ccca6680d77cf0810f997217c6cffff35af3ed73968e9f8847e7c762a99cdc158346fc6829175fb54c55d0d7efdcf8f4da822e614a72c57e234bfb45f91c78c335353bca8a927d619af7c4abca49f314f9e1071fe3b7c0d802c87c06899eed89f09c942bb6f6258323b50def38a59346bf08f23315578862a2bf6576c090719a835061d28f4a7cf11681b932351315ab00011f7e55572868411ce2d8bbfe9d9e60d4b227bd286507be9d7a52c3424e603eece71dad3c882cd4df5d7bc58e1c98902f3cac68a5c363b001c911663dc1b27335b4db96cdbc4e28d31c3c668f734135c913b1c54ec8d72cc11134092810abd7571e911ce8f42b9e2666cc72cf343198b5d2bfd3d7e34496fed0c5c9fb1bff5e53c25d1a54293c20813f9e602e473d4d36c75d34baa6643a3645c1d94c61ff4702459eafbc1526475459d1d93ffe799eece24f161495a4138ff43431eeff815f8880894cf69e95493fcdc4ee766aa19931a427fb6c39cf454e928fc2d9ab2daa74e58ec63d2342612661ff1cbc8249c9865a26fba71e37caf7af66d3fabd5e6292591c977ebdf88c1bc87fd45f2c0ad06f0c1b6ea5e76066a211308f8c888146086b5d67b22570afc8ed53fbe5117fe1b666cfba94eb7f73174bb7d670d559341b5c9441215d73b475ea999c4abc0e0eb40ec980e7244621086c0d5731ce16a67664dd439c58c32f73b5e96d0bacc94c83ec162e7563089ba5de78ef79fa54d624194002e9c8e457b1a291d793f6af9b3e524257288e53d89faec5e5d3e018f6e3376833b91e3d86987792b0e23b403bdc911ee88ac5072b990cb64e4cc3ce3f10fbffcdc112d48e5e45a4871513cb4cc50958063c77ad2fbc579494ee69c59487a53bb59bf481b60cb13b2c9fee2e73a6dd0fa526f3709731fe50dc14b15dccf8e7a598c0254283c53da9834cbef3949e5ce3ae15df58ef51c693c8c77425ecd88ff0d32f7ee929e3a99ace7c16791eda3322548c364826bdb726f88e2bd187d3ea7b2743f68e3ed98e0c47480a58aa96edecdfbe1274f46da81fadb2f6bc102d336320a950656203e1270bf4cf2feb589d2106a9a31661a9c6782cbb6cebb534a09953b7a238e7f821a4070c128a8412d181e6c54c79e620c308cf994669e4501ae80f1377b627f5db1554591416e20a94fcb6fc914aff98cd81bbc08e13975a6dae06ddb6642d92657f85827e5c8311d0cfd7b005a8d35f230fa0a215721f0f2223ac3079982f6e5bb7c3dc2bb7fc5be4d9f55b002eb7fccd8b888d9f3631b9458ccbbb4c3ac4f103d88fda8e4f49ae47fdba2e6538d177f96f9782ce1d7c1528a8d94caa2997bd15b50932680e5790ff8b5c0dfec338bc726c7379a9c0ee0469f96077ce976f87bdd3e27ad8f558e2fae523467bc085ee40610705a76deb03b2856a9db69f8fbdec7c7fd9bcc62c1d49a209080ab608743370b39475153757b504d42b1953de4ffdc15d3e3b4da21b045b2e3e36165033b0f714dd6546a6e0a613a2433900efd0ba5f528ba8541ef3199bd0345a98bf93023246236fbb8c46e7d8990ebfc0beb4823a8d6789db9684709c236ae551090c0b55f880d654819c52d2b8a0955d5975f0fba39752b0b071517a4b3a845137dd33408aa4f4219b33c31792139986c72f8f7d6ec4cdda12c3d72d1791c278d4d1a7512553a8cd5f44ae14bfcc02f396171c8084ab4e1be2856d2ee551fad9e6ee52aaa373f7fd95fccbb426518eb5cfeaf89e0b62a81d66cb130e2053e765c96ed899e893d7a4ed3f8892a64888fe85c397c3adc5f93b0c47e6609a4af5a6f05651b543f3ffa89ebb0d1dd187f23399b10e02ecca0d93f06a790a900a7440109675f5508910c3218c972c9f25cc75efde40f8401f3610dd93cc86d1b5b72e6e97f067114847b88252563a442099bc9ca0bb0e2616535b132a68ee813c252169842caef6f9533e10371ec353c6a2cd4a2ab112610a0a5a67521e389804197c7e1d7dbf94e9003600cb5a618ec3f1ab4613f388999fbad72b30307a14235e981f94b04a3dfcd765348071dd0bcef5f00a39502dd4a3af2bdf2f1485c5c575d652ba26bd23991d6e2a05a81a5f5ee9294741a61586ce2bf3587ad6c010268045b29d75802caa98dad6ac58dfca6c8dac56cd46677476e22152343d43c10c815a767f322f467be2755034f0c0ac44738c63050b5ae7ac0157399d466a2acf4a2aef0c1d827c968afb975964da815ea2e3c7cd6a5770287e68a61b71ba721ae552642f4047fde78d21138f183723875446ec5a146f41ce0f74d5ccf45f424ed7a131cf106fa29c2b8ab2c92e3c199b8f047166458aed3147f55a14934c028adcf301fb22c6efc751b03b0e65c07bd105094c387cd04b3c3e1f2a1a662b95e85bb03f48463aac095a471e1308c989d3e31c4ca1ce3db2c7d76de9a51c9547f120fefc168f48adaaf830c83102cc265b22ce4b43b5c954754acee07c80f454e3af21067b8130b97bf0c6271c9168d4a9ad4775411ae345fa85ab9dadda6f708ce5617dfe1f6bbb1c4341660149fd0fc40018719200b7da9496c5fbbd63d511a61d597bb6b0afcedfa9965405526dbcb8851a15e7ab29e425b4f1c7ab68852d69c46b519f6752ea48cc6ba82fae1802fa196b16fcf3ed0cf7229968faefb381192e459d3d0f58624177ad2fe3e9c5e7348170533fd2fd39b0301cf52cd3bf468ddba09ae65c9513fdf56982f1413271cf00ccd141f362e525d82e4408943776330073a03da08d1993f5c1718054ab4b2ea5f851fa576d50ff656d7186018906aef54da07950c4370605e7a50868705ce9be6b29ae29f153b8055f83e6699ad13fd7a0ebc9034ab355ac4b9a3bdd0eb8468ef634fa031bd074521cf65897a68c3241ccdb258b58e01c60ba2b0f8be53d657cf09bcd2cf30f6a4823717a870fc2849a52d2984f2351f803c1cba4d7c234fad0659b21cb367ef9d302102ac562933cfe38b78a68d7d37dff8b9d1f8a32f1bb161b399807dbc8cd691fa0e6726f2483558feb492b3969ef6d73ce59ba9cf8f5a6924aa898f7046498b04b764d1395325f717c71c14f94c3abc7765a06551ee871a36d043ecdbe92669b85f3abb34d572264fc1189f1497247ebbd5d3fb8bfcb7aecceb5ace15c2807cb8d65e096f923d0d6c86169f9097c8a1837a0c31b2496b266b4e6033df67ffb5ffc38546bfb39dcc0664b7418b9a469416de9a7e56cd64824d9689a4f87f274d665016672f614f6ce3f7a34b0252abb702ffe21207a704e8d6daa633e1fb78a4a5f48a5d2d65e6479062b16da9e079b11557346ad6ae553e6968862a3999bc7e33d4b992ca5e31cd7e01c5285b16ebffb1ea2929a0b41847379d26eadd259289d39778ffabfd71d931a5803c2f80c0fcf20e9e38233249cc721eb0006ceffb56830312fcc43154f2148fa5766d7aefaecb59de309cb1a4c7459279aa67449b57372dfdf34bee254c342d45729158afe0eca330caeae66c33860efff95e86b0cb0e6ad11c1d1ed101729de0d0f23d3d636ae772ac8cb7b9324159a5fa2a9399880440a5f0aa900364d4d117b173bece87d513d6ac63afb05ae0159ad5a3e91d2ae4902211d186c4ae96179f6b4e27cb4e657b9acb2a19b0c48c896e784af8b982cf7318827cf6fbdee06bd6f9a44259f2f52c8b901bc95c98d272f1c6992a4671ff7bf0d17ec41853fb09ad316f946e6611e1a59517334da50d1e43822f9048ab653b6481ecc4d0d6098052b4eca321354acc45dcc603bc7b961464c122d40308049a8f8a606ce776e5f710f51fed1c0800c08f463c7137bea431331d560aab00b167bff7646c95204fec1ff6e2373d45292fd12d1efd4fe8e5b4aaf20f67eaa9ef43da3303204f5af818c29688555deda09a14a09b6777f5bc0c1d61273bb8321acfc8ac0fa2aed1095d6e9f46655010fda4a5f7df31ba3a4528bde3aa9a1876d71fdf1b71e5d6002c08a4af7cc867d900b88bbe0e99358199e0d5b52dce947424b384fa6d57271d4aa328ff10039a3cfccba4dadbe82d672d50afb661a40859c67a634b43a99552fd99c48d60dfce5d5089ea479ee35655fa74ae95a086e1c4b62858d4f656a0319cb05945e4db474bab574d6c28e1bdb7b0afc434b06557c739d5296332bc4b4cde47720ea1ac85285f39055638b5ab40df7c115a8ecc6b4fecba5359947e3ea5c079699e3441fa5cfaea9150bb8ca3dccd66d6fd2c84c100dca21f7d1a80d6818e65e0da82c054ecb88d8bfd754cecb179a8292f7683abd0f0b386d8e1f0599c8561828adc06ea839be8f0556db479f46382f7d5d3d1bc974eeba7e1e6048dee679a9b5f3c5a7af52a17daca01ee195c1f1c0203362d836643d1d498ccef9aa81f8ac1c7f25b220f6b976001b", 0x1000}, {&(0x7f0000000340)="96876f09d4392b99b9e7da2cc5f7adf4cf23835121365202bed7dad26d6eb04048578886f68767e0aa2ed729bcbde6381fc6d99dfecbd7bd5474040e372feb72b2cbafb38a44e9e6e16ceb3d9ca5324c0ae2397a978870a585ce3b575352c9f452dcfc01e0b28e81e7", 0x69}, {&(0x7f0000001580)="01a741a4109a64a8cbd70eeed327d31824f7a9ce2134bc4040b892e7cfd6f885f7c8e258c52ad5d201bb3a04dba1bdd227ee580c70c6c95e32713ae95d869873817ec6a5", 0x44}, {&(0x7f0000000400)="2a88aad391c829baca18ff9b34a29af0dddb87ee88587179beb4bd064c202e4b9e07389ea1d1126d5b71008c6ef25ed6393129c9ab726f46a48f45aede", 0x3d}], 0x7, &(0x7f0000002dc0)=ANY=[@ANYBLOB="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"], 0x1330, 0x4000011}, 0x800) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000080)) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000019c0)={0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000000140)="0253eea6a53cc0eae389e9a13e5f2046d0633eebde90f446c1b1eabbd0adb42dfcefb37a3df93feb3d5e76dc353ecf23fe9c81afa5", 0x35}, {&(0x7f00000002c0)}, {&(0x7f0000000400)}, {&(0x7f0000001600)}], 0x4, &(0x7f0000001700)=[{0x68, 0x107, 0x25047dc1, "755cd1e9e23de47cb15819d813deb534cee2d9497c58eba5bd8a228407fb709d70f16afa73f4924f12ecc429b6fd356748940b62ee5f5685ce027fe4e6c60a8f88cd1a5827d099f5849f09bd37f681e29814e6bb"}, {0x10, 0x0, 0x1ff}, {0x10, 0x107, 0x80000001}], 0x88}, 0x48800) 2018/03/29 11:56:14 executing program 3: r0 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x10}, 0x10) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000000c0)={0x0, 0x1000, 0x8}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000080)='./file0\x00', r1}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0x0, 0x8}, 0x10) mount(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='cpuset\x00', 0x40, &(0x7f0000000280)="8a4562cb6a7df38be32246afcaef1e1a3f933cb428242c55c117c0fbbd62cea0aab31f2665fb88267466eca314fc8cafd72cc24143121c0691236768fad66390bf9b55014c2bd49faa5388cbabd52e730eeb4ccc411bacd296e423d971043756cf2b35a4063f2a7465b44a60ef31ae437f6160ed2f63afa62c36a27c33e4779e7c0404e337abc025bb2e4b39cc265573c6ab1a3ff09c7ad6bb4631a4") mount(&(0x7f0000000340)='./file1\x00', &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='devtmpfs\x00', 0x40, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xb, 0x7f, 0x0, 0x1, 0x12, r1, 0x100000000}, 0x2c) mkdir(&(0x7f0000000440)='./file1\x00', 0x20) mount(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='iso9660\x00', 0x8, &(0x7f0000000540)="650fe6ccea2b17860de967406c566ec16fe5a7a4c064707e22906e9d3d2a70b4") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000005c0)={r2, 0x28, &(0x7f0000000580)={0x0, 0x0}}, 0x10) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={r3, 0x8, 0x10}, 0xc) mount(&(0x7f0000000640)='./file1\x00', &(0x7f0000000680)='./file1\x00', &(0x7f00000006c0)='pstore\x00', 0x1000000, &(0x7f0000000700)="f48afa3ab3cc319f917be52b04c388c229578537782bc5ffc32c7747b1d28999ad89f5fba460640a324385ac03cccef4553d641b91d79d014804a98e72796f8eb2e1a7056efeaa63404648df67079ae817420f248ccf9d01e7a027c600c71777fb9ebc97da60f3d1a287ef8bc00f1dc68c3b1f0c1836cde5b62be45dd58c3415cbb0f916fe3c04fc69911e2bec15c208d023bdb608fa727657c532bd5101a2a36b34c4eb65f855fea2d6f8a0a79b15ecef1a4c81a8f6f5ed57b09db2ab482413540416126718f2a33ed21346ded20b084a8dc10702ec279fc486b5c57c163d") socketpair(0x3, 0x2, 0x1f, &(0x7f0000001c40)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$kcm(r6, &(0x7f0000004300)={0x0, 0x0, &(0x7f0000004140)=[{&(0x7f0000001c80)=""/139, 0x8b}, {&(0x7f0000001d40)=""/149, 0x95}, {&(0x7f0000001e00)=""/188, 0xbc}, {&(0x7f0000001ec0)=""/69, 0x45}, {&(0x7f0000001f40)=""/165, 0xa5}, {&(0x7f0000002000)=""/4096, 0x1000}, {&(0x7f0000003000)=""/42, 0x2a}, {&(0x7f0000003040)=""/4096, 0x1000}, {&(0x7f0000004040)=""/233, 0xe9}], 0x9, &(0x7f0000004200)=""/236, 0xec, 0xe00}, 0x40) mount(&(0x7f0000004340)='./file1/file0\x00', &(0x7f0000004380)='./file1\x00', &(0x7f00000043c0)='ceph\x00', 0x4860, &(0x7f0000004400)="2c8eb517dd302be26597065442d58f3f345c295b542b2b1df3046ae176") bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000004600)={r6, &(0x7f0000004440)="903685b47b9c4d5c1dffcefa6a92cd57ccdfaf1af0be272f1cb4a5b86ab9d1ef248a63f04f5d59c2cd6e6b7722f5ff866c5d353014f28baaa95bce06a787a3e085102126a0386ffd4e136d472f2cdfb7c658643d2792b7235e2ec8c782080850c20eb00014eab035d7d56c8ddd0d7fdc4c21602d480e4accea0867cc5b4172b46b8f028bd623c58544092396dbda704543cd7c93219ff7f4caf9d0c12fc32c65ddac48ba22321d2c7ef1152f0dd87ed22cb30eb2b24d381b3abaefc114ad4c08e329cfbce60e0549ca", &(0x7f0000004540)="38859653237c5c9685cf2e44e1eea64846e190b778f29b06c26c2f2b8a0800f9fc2019b05290fc5c82f612eb7f479918015eb3af93cc57f01db731e129275ce05910f66e436ef09a8fe7bf22f960eacec350a7f7e9e9a47cb163f467b6a29523346a4c61d65d2235c73095a53929d509538f640424133cfa3617b41a51aa7172460146433abbe604f2c92827fabd5d3134d36b4cecd0fd2549f3527615f9eb63dd9332021e4eff13ad6aa509db21ed98745d00cb36e547", 0x3}, 0x20) mkdir(&(0x7f0000004640)='./file1/file0\x00', 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000004680)={0x0, 0x0, 0xa6, 0x3, 0x4}, 0x2c) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000046c0)=0x7, 0x4) recvmsg$kcm(r6, &(0x7f00000058c0)={&(0x7f0000004700)=@alg, 0x80, &(0x7f0000005880)=[{&(0x7f0000004780)=""/4096, 0x1000}, {&(0x7f0000005780)=""/219, 0xdb}], 0x2, 0x0, 0x0, 0x100000001}, 0x40000000) r7 = gettid() r8 = perf_event_open(&(0x7f0000005900)={0x7, 0x70, 0x0, 0xfffffffffffffff7, 0x9, 0x4, 0x0, 0x7, 0x100, 0x8, 0x100000000, 0x8000, 0x8, 0x6, 0x0, 0x6, 0x10001, 0x9, 0x1f, 0x2, 0x1, 0x3, 0x1, 0x1f, 0x23, 0x1, 0xaa4, 0x5, 0x4, 0x200, 0x6, 0x9, 0xfffffffffffffffb, 0x3, 0x3, 0xff, 0x80000000, 0x0, 0x0, 0xffffffffffffff9d, 0x2, @perf_config_ext={0x7, 0x9}, 0x100, 0x8, 0x2, 0x6, 0x4, 0x6, 0xf71}, r7, 0x9, r6, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f00000059c0)={&(0x7f0000005980)='./file0\x00'}, 0x10) ioctl$sock_kcm_SIOCKCMATTACH(r5, 0x89e0, &(0x7f0000005a00)={r5, r0}) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000005c00)={r4, &(0x7f0000005a40)="313befc1e9ac680c4369983530ee783c4f018c38e134b4b0aebd06ede05f238850949c0f5d32ab19889f880e87e3a0fa5a43500affdcc508d56f3a4df6c159ca9cfa62124b79b4607d42738dc5e16d09ea2c6a2346fc2360feff08d9f464dfdebce2cb99d4ba8e5fc37edfba041f14e16a68192d7d8687404ee7318323520188c4e5d52e8c7ec40bd0823fb210e530c74ea842bd8bacbc48317b0b6ed12528ecd30e1af83b8049df791ff7affe91ab54", &(0x7f0000005b00)=""/243}, 0x18) mount(&(0x7f0000005c40)='./file1/file0\x00', &(0x7f0000005c80)='./file1\x00', &(0x7f0000005cc0)='btrfs\x00', 0x0, 0x0) recvmsg(r5, &(0x7f00000073c0)={&(0x7f0000005d00)=@sco, 0x80, &(0x7f0000007300)=[{&(0x7f0000005d80)=""/103, 0x67}, {&(0x7f0000005e00)=""/170, 0xaa}, {&(0x7f0000005ec0)=""/252, 0xfc}, {&(0x7f0000005fc0)=""/136, 0x88}, {&(0x7f0000006080)=""/125, 0x7d}, {&(0x7f0000006100)=""/4096, 0x1000}, {&(0x7f0000007100)=""/106, 0x6a}, {&(0x7f0000007180)=""/115, 0x73}, {&(0x7f0000007200)=""/240, 0xf0}], 0x9, 0x0, 0x0, 0x7}, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000007400)={r3, 0x10001, 0x18}, 0xc) ioctl$PERF_EVENT_IOC_REFRESH(r8, 0x2402, 0xc4c) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008880)={&(0x7f0000007440)=@l2, 0x80, &(0x7f0000008800)=[{&(0x7f00000074c0)=""/231, 0xe7}, {&(0x7f00000075c0)=""/118, 0x76}, {&(0x7f0000007640)=""/4096, 0x1000}, {&(0x7f0000008640)=""/223, 0xdf}, {&(0x7f0000008740)}, {&(0x7f0000008780)=""/32, 0x20}, {&(0x7f00000087c0)=""/53, 0x35}], 0x7}, 0x10000) 2018/03/29 11:56:14 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x1e1, 0x100000000209e20, 0x0, 0x5}, 0xfffffffffffffe20) r0 = getpid() r1 = perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0xfffffffffffffffc, 0x3, 0x8, 0x2, 0x0, 0x9, 0x10000, 0xc, 0x3d3, 0x80, 0x5, 0xfffffffffffffffc, 0x8, 0x3f, 0x5d, 0xbbb0, 0x20, 0x3, 0x8000, 0x100000000, 0x8, 0x9, 0x2, 0x4, 0x800, 0xf8, 0x3, 0x9, 0x1, 0x3, 0x8, 0x3, 0x7, 0x10001, 0xf16, 0x2, 0x0, 0x7fffffff, 0x4, @perf_bp={&(0x7f0000000780), 0x1}, 0x4080, 0x10001, 0xcc, 0x7, 0x3, 0xffff, 0x7fffffff}, 0xffffffffffffffff, 0xd, 0xffffffffffffff9c, 0x8) perf_event_open(&(0x7f0000000980)={0x4, 0x70, 0x6, 0x3f, 0x8e, 0x1, 0x0, 0x3, 0x404, 0x0, 0xbc2b, 0x40, 0x7, 0xffff, 0xffff, 0x9, 0x9de2, 0x9, 0x0, 0x3, 0x7f, 0xff, 0x40, 0x400, 0x9, 0x7fffffff, 0x80000000, 0x7, 0x8, 0x10001, 0x1f, 0x2778, 0x800, 0x8001, 0x101, 0x9, 0x8, 0x7ff, 0x0, 0x1000, 0x5, @perf_config_ext={0x3ff, 0xb69b}, 0x3040, 0x2, 0x2, 0x5, 0x7, 0x6, 0x7283ed73}, r0, 0xe, r1, 0x8) bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x0, 0x0, 0x7ffff9, 0x0, 0x20000003, 0x0}, 0x2c) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) r2 = gettid() r3 = perf_event_open(&(0x7f00000008c0)={0x7, 0x70, 0x1, 0x200, 0x3, 0xdbce, 0x0, 0x8, 0x1002, 0x1, 0xffffffffffffff00, 0x8, 0x1, 0xb3fa, 0x8, 0x0, 0x1, 0x2, 0x1000, 0x2, 0x401, 0x8, 0x3, 0x81, 0x0, 0x7, 0x2fc4, 0x882, 0x4, 0x8, 0x3, 0x81, 0x3, 0x7, 0x8857, 0x7, 0x5, 0x9, 0x0, 0x7, 0x1, @perf_config_ext={0x0, 0x80000000}, 0x400, 0x7f, 0x4, 0x7, 0x2, 0x7f, 0x200}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000840)={0x5, 0x70, 0xef, 0x2, 0x1000, 0xffffffff80000000, 0x0, 0x1a7800000000, 0x2000, 0x4, 0x5, 0x6814, 0x3a9, 0x5, 0x63b, 0x6, 0x8, 0x1000, 0x250420ee, 0x3, 0x0, 0x20, 0x6, 0x0, 0x4, 0x5, 0x4, 0x8, 0x3, 0x8, 0x52893dd5, 0x2, 0x2, 0x8, 0x44d, 0x1, 0x8, 0x6, 0x0, 0x100000000, 0x0, @perf_config_ext={0x9, 0x80}, 0x0, 0x0, 0x2b67, 0x6, 0x4b0, 0x81, 0x4}, r2, 0x5, r3, 0xb) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1003, 0x0) mount(&(0x7f00002b9ff8)='./file0\x00', &(0x7f0000cbeff8)='./file0\x00', &(0x7f00005f7ffa)='ramfs\x00', 0x80000, &(0x7f000002f000)) mount(&(0x7f0000000000)='.', &(0x7f0000000040)='.', &(0x7f0000000080)='cgroup\x00', 0x5010, &(0x7f00000000c0)) mount(&(0x7f0000377ff8)='.', &(0x7f0000000280)='.', &(0x7f0000000600)='nfs4\x00', 0x5010, &(0x7f0000000300)="2161893416a0c71070768c219eb114c3253c9f3baf4e9e8e9111c1a7fc6e266009fe27243deeaa22ca7ae9341f714300b5ee807e55d609036f2a3260475922bdfb2d2849f1c3b2ad3c051bd4f3751a177f77a92758c6d2b23fe7f1535b54e5846d11c135de8286066dec1b25f6e1378944ac5f7fce42d055821b5e19") perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xd68, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f0000014f88)={0x5, 0xfffffffffffffdc4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x46000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = getpid() perf_event_open(&(0x7f0000000680)={0x4, 0x70, 0x64, 0xffff, 0x1f, 0x4, 0x0, 0x1c3, 0x0, 0x1, 0x1, 0x9, 0x1ff, 0xfffffffffffffff8, 0x0, 0x0, 0x6, 0x7fffffff, 0x0, 0xffffffff, 0x80000001, 0xd0, 0x7, 0x1f, 0x0, 0x8, 0x9, 0x1ff, 0x8, 0x785, 0x4, 0xff, 0x2, 0x656, 0x5000000, 0x1, 0x460e3be0, 0x1, 0x0, 0x0, 0x7, @perf_bp={&(0x7f0000000640), 0x1}, 0x1000, 0xa, 0x7fff, 0x7, 0x3, 0x400, 0x9}, r5, 0xe, r4, 0x1) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', 0x0, 0x10}, 0x10) close(0xffffffffffffffff) bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)={&(0x7f0000000040)='./file0\x00', 0x0, 0x18}, 0x10) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000100)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0, 0x2e, &(0x7f0000000440), &(0x7f0000000140)=""/46, 0x4229}, 0x28) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000003480)={&(0x7f0000003300)=@can={0x0, 0x0}, 0x80, &(0x7f0000003400)=[{&(0x7f0000003380)=""/56, 0x38}, {&(0x7f00000033c0)=""/1, 0x1}], 0x2, &(0x7f0000003440)=""/33, 0x21, 0x1}, 0x40010000) bpf$PROG_LOAD(0x5, &(0x7f00000034c0)={0xe, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="1800000002000000000000004ce700002555fdff00000000002371d07c9ba7f4a23372b0ad61000000000000009500000000000000"], &(0x7f00000007c0)='GPL\x00', 0x3, 0x2d, &(0x7f0000000800)=""/45, 0x40f00, 0x1, [], r6}, 0x48) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000740)={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x10) socketpair$inet(0x2, 0x80a, 0x81, &(0x7f0000000240)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={0xffffffffffffffff, &(0x7f0000000500)="ae30f1bca1b4d3f69f1aac81517d42ad5980bc63b5008616a1f4724b9f8c1e4ecd8de336f57dd727cdaab04f0b40f28612615ad08de414711d841a88db33fd33884b627074213a0c5de3be2bbaec9207d9865c47f240467849979b5ab5632376608fc4be41a274abb2dc07cabe344a18db51048e5b0cbda843905a4258cdee3e649eddf104ba78894dce09747dcfe6a8d6d6d985520eeef448b83a8bcb83074541ba7a20d6094aa206c01a0690e5b3bfa05d475eb382b0199031d22bb26cde9b1ca0055eef9f6c4993b71ba19ba0590bb5efdaddaa574c25356ca890d138fc9fe0e975b6d5a1a8251503cd0a91845f9d95", &(0x7f0000000480)="9bc7741ea5e524cc8c6f748a73153834428729c45bf4ad446d2dddf1978baf431d0ba35b5442b5afe22db8b003650320200af7e1368ef7cdfa79ca8b9d3564363a5d2a502970314f2264c883bc8d990afc003e5adb95b30edad245c4420c8126f1d33db75ff0230698eaff90055e0f", 0x2}, 0x20) socketpair(0x0, 0x80003, 0xffff, &(0x7f0000000380)={0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r7, 0x50, &(0x7f00000003c0)}, 0x10) 2018/03/29 11:56:14 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x1e1, 0x100000000209e20, 0x8000000001, 0x5}, 0xfffffffffffffe20) r0 = getpid() r1 = perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0xfffffffffffffffc, 0x3, 0x8, 0x2, 0x0, 0x9, 0x10000, 0xc, 0x3d3, 0x80, 0x5, 0xfffffffffffffffc, 0x8, 0x3f, 0x5d, 0xbbb0, 0x20, 0x3, 0x8000, 0x100000000, 0x8, 0x9, 0x2, 0x4, 0x800, 0xf8, 0x3, 0x9, 0x1, 0x3, 0x8, 0x3, 0x7, 0x10001, 0xf16, 0x2, 0x0, 0x7fffffff, 0x4, @perf_bp={&(0x7f0000000780), 0x1}, 0x4080, 0x10001, 0xcc, 0x7, 0x3, 0xffff, 0x7fffffff}, 0xffffffffffffffff, 0xd, 0xffffffffffffff9c, 0x8) perf_event_open(&(0x7f0000000980)={0x4, 0x70, 0x6, 0x3f, 0x8e, 0x1, 0x0, 0x3, 0x404, 0x0, 0xbc2b, 0x40, 0x7, 0xffff, 0xffff, 0x9, 0x9de2, 0x9, 0x0, 0x3, 0x7f, 0xff, 0x40, 0x400, 0x9, 0x7fffffff, 0x80000000, 0x7, 0x8, 0x10001, 0x1f, 0x2778, 0x800, 0x8001, 0x101, 0x9, 0x8, 0x7ff, 0x0, 0x1000, 0x5, @perf_config_ext={0x3ff, 0xb69b}, 0x3040, 0x2, 0x2, 0x5, 0x7, 0x6, 0x7283ed73}, r0, 0xe, r1, 0x8) bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x0, 0x0, 0x7ffff9, 0x0, 0x20000003, 0x0}, 0x2c) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) r2 = gettid() r3 = perf_event_open(&(0x7f00000008c0)={0x7, 0x70, 0x1, 0x200, 0x3, 0xdbce, 0x0, 0x8, 0x1002, 0x1, 0xffffffffffffff00, 0x8, 0x1, 0xb3fa, 0x8, 0x0, 0x1, 0x2, 0x1000, 0x2, 0x401, 0x8, 0x3, 0x81, 0x0, 0x7, 0x2fc4, 0x882, 0x4, 0x8, 0x3, 0x81, 0x3, 0x7, 0x8857, 0x7, 0x5, 0x9, 0x0, 0x7, 0x1, @perf_config_ext={0x0, 0x80000000}, 0x400, 0x7f, 0x4, 0x7, 0x2, 0x7f, 0x200}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000840)={0x5, 0x70, 0xef, 0x2, 0x1000, 0xffffffff80000000, 0x0, 0x1a7800000000, 0x2000, 0x4, 0x5, 0x6814, 0x3a9, 0x5, 0x63b, 0x6, 0x8, 0x1000, 0x250420ee, 0x3, 0x0, 0x20, 0x6, 0x0, 0x4, 0x5, 0x4, 0x8, 0x3, 0x8, 0x52893dd5, 0x2, 0x2, 0x8, 0x44d, 0x1, 0x8, 0x6, 0x0, 0x100000000, 0x0, @perf_config_ext={0x9, 0x80}, 0x0, 0x0, 0x2b67, 0x6, 0x4b0, 0x81, 0x4}, r2, 0x5, r3, 0xb) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1003, 0x0) mount(&(0x7f00002b9ff8)='./file0\x00', &(0x7f0000cbeff8)='./file0\x00', &(0x7f00005f7ffa)='ramfs\x00', 0x80000, &(0x7f000002f000)) mount(&(0x7f0000000000)='.', &(0x7f0000000040)='.', &(0x7f0000000080)='cgroup\x00', 0x5010, &(0x7f00000000c0)) mount(&(0x7f0000377ff8)='.', &(0x7f0000000280)='.', &(0x7f0000000600)='nfs4\x00', 0x5010, &(0x7f0000000300)="2161893416a0c71070768c219eb114c3253c9f3baf4e9e8e9111c1a7fc6e266009fe27243deeaa22ca7ae9341f714300b5ee807e55d609036f2a3260475922bdfb2d2849f1c3b2ad3c051bd4f3751a177f77a92758c6d2b23fe7f1535b54e5846d11c135de8286066dec1b25f6e1378944ac5f7fce42d055821b5e19") perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xd68, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f0000014f88)={0x5, 0xfffffffffffffdc4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x46000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = getpid() perf_event_open(&(0x7f0000000680)={0x4, 0x70, 0x64, 0xffff, 0x1f, 0x4, 0x0, 0x1c3, 0x0, 0x1, 0x1, 0x9, 0x1ff, 0xfffffffffffffff8, 0x0, 0x0, 0x6, 0x7fffffff, 0x4, 0xffffffff, 0x80000001, 0xd0, 0x7, 0x1f, 0x0, 0x8, 0x9, 0x1ff, 0x8, 0x785, 0x4, 0xff, 0x2, 0x656, 0x5000000, 0x1, 0x460e3be0, 0x1, 0x0, 0x0, 0x7, @perf_bp={&(0x7f0000000640), 0x1}, 0x1000, 0xa, 0x7fff, 0x7, 0x3, 0x400, 0x9}, r5, 0xe, r4, 0x1) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', 0x0, 0x10}, 0x10) close(0xffffffffffffffff) bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)={&(0x7f0000000040)='./file0\x00', 0x0, 0x18}, 0x10) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000100)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0, 0x2e, &(0x7f0000000440), &(0x7f0000000140)=""/46, 0x4229}, 0x28) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000003480)={&(0x7f0000003300)=@can={0x0, 0x0}, 0x80, &(0x7f0000003400)=[{&(0x7f0000003380)=""/56, 0x38}, {&(0x7f00000033c0)=""/1, 0x1}], 0x2, &(0x7f0000003440)=""/33, 0x21, 0x1}, 0x40010000) bpf$PROG_LOAD(0x5, &(0x7f00000034c0)={0xe, 0x6, &(0x7f0000000940)=ANY=[@ANYBLOB="1800000002000000000000004ce700002555fdff00000000002371d07c9ba7f4a23372b0ad61000000000000009500000000000000"], &(0x7f00000007c0)='GPL\x00', 0x0, 0x2d, &(0x7f0000000800)=""/45, 0x40f00, 0x1, [], r6}, 0x48) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000740)={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x10) socketpair$inet(0x2, 0x80a, 0x81, &(0x7f0000000240)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={0xffffffffffffffff, &(0x7f0000000500)="ae30f1bca1b4d3f69f1aac81517d42ad5980bc63b5008616a1f4724b9f8c1e4ecd8de336f57dd727cdaab04f0b40f28612615ad08de414711d841a88db33fd33884b627074213a0c5de3be2bbaec9207d9865c47f240467849979b5ab5632376608fc4be41a274abb2dc07cabe344a18db51048e5b0cbda843905a4258cdee3e649eddf104ba78894dce09747dcfe6a8d6d6d985520eeef448b83a8bcb83074541ba7a20d6094aa206c01a0690e5b3bfa05d475eb382b0199031d22bb26cde9b1ca0055eef9f6c4993b71ba19ba0590bb5efdaddaa574c25356ca890d138fc9fe0e975b6d5a1a8251503cd0a91845f9d95", &(0x7f0000000480)="9bc7741ea5e524cc8c6f748a73153834428729c45bf4ad446d2dddf1978baf431d0ba35b5442b5afe22db8b003650320200af7e1368ef7cdfa79ca8b9d3564363a5d2a502970314f2264c883bc8d990afc003e5adb95b30edad245c4420c8126f1d33db75ff0230698eaff90055e0f", 0x2}, 0x20) socketpair(0x0, 0x80003, 0xffff, &(0x7f0000000380)={0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r7, 0x50, &(0x7f00000003c0)}, 0x10) [ 820.506154] IPVS: ftp: loaded support on port[0] = 21 [ 821.463571] IPVS: ftp: loaded support on port[0] = 21 [ 821.490486] IPVS: ftp: loaded support on port[0] = 21 [ 821.523673] IPVS: ftp: loaded support on port[0] = 21 [ 821.534248] FAULT_INJECTION: forcing a failure. [ 821.534248] name failslab, interval 1, probability 0, space 0, times 0 [ 821.545548] CPU: 0 PID: 26925 Comm: syz-executor4 Not tainted 4.16.0-rc6+ #40 [ 821.552819] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 821.562167] Call Trace: [ 821.564758] dump_stack+0x194/0x24d [ 821.568383] ? arch_local_irq_restore+0x53/0x53 [ 821.573046] should_fail+0x8c0/0xa40 [ 821.576741] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 821.581825] ? __lock_is_held+0xb6/0x140 [ 821.585865] ? mark_held_locks+0xaf/0x100 [ 821.589988] ? __raw_spin_lock_init+0x1c/0x100 [ 821.594553] ? find_held_lock+0x35/0x1d0 [ 821.598599] ? __lock_is_held+0xb6/0x140 [ 821.602655] ? check_same_owner+0x320/0x320 [ 821.606950] ? d_alloc+0x269/0x340 [ 821.610473] ? rcu_note_context_switch+0x710/0x710 [ 821.615379] ? lock_release+0xa40/0xa40 [ 821.619341] should_failslab+0xec/0x120 [ 821.623291] kmem_cache_alloc+0x47/0x760 [ 821.627331] ? d_drop+0x51/0x60 [ 821.630589] ? rpc_i_callback+0x30/0x30 [ 821.634553] rpc_alloc_inode+0x1a/0x20 [ 821.638417] alloc_inode+0x65/0x180 [ 821.642027] new_inode_pseudo+0x69/0x190 [ 821.646065] ? prune_icache_sb+0x1a0/0x1a0 [ 821.650276] ? do_raw_spin_trylock+0x190/0x190 [ 821.654839] ? d_add+0xa70/0xa70 [ 821.658191] new_inode+0x1c/0x40 [ 821.661534] rpc_get_inode+0x20/0x1e0 [ 821.665315] __rpc_create_common+0x5d/0x1d0 [ 821.669620] rpc_populate.constprop.15+0x1ad/0x340 [ 821.674535] rpc_fill_super+0x379/0xae0 [ 821.678490] ? cap_capable+0x1b5/0x230 [ 821.682356] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 821.687526] ? security_capable+0x8e/0xc0 [ 821.691651] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 821.696856] ? ns_capable_common+0xcf/0x160 [ 821.701161] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 821.706325] mount_ns+0xc4/0x190 [ 821.709676] rpc_mount+0x9e/0xd0 [ 821.713026] mount_fs+0x66/0x2d0 [ 821.716407] vfs_kern_mount.part.26+0xc6/0x4a0 [ 821.720969] ? may_umount+0xa0/0xa0 [ 821.724572] ? _raw_read_unlock+0x22/0x30 [ 821.728696] ? __get_fs_type+0x8a/0xc0 [ 821.732566] do_mount+0xea4/0x2bb0 [ 821.736096] ? copy_mount_string+0x40/0x40 [ 821.740309] ? rcu_pm_notify+0xc0/0xc0 [ 821.744182] ? copy_mount_options+0x5f/0x2e0 [ 821.748566] ? rcu_read_lock_sched_held+0x108/0x120 [ 821.753565] ? kmem_cache_alloc_trace+0x459/0x740 [ 821.758403] ? kasan_check_write+0x14/0x20 [ 821.762623] ? copy_mount_options+0x1f7/0x2e0 [ 821.767100] SyS_mount+0xab/0x120 [ 821.770528] ? copy_mnt_ns+0xb30/0xb30 [ 821.774395] do_syscall_64+0x281/0x940 [ 821.778259] ? __do_page_fault+0xc90/0xc90 [ 821.782471] ? _raw_spin_unlock_irq+0x27/0x70 [ 821.786944] ? finish_task_switch+0x1c1/0x7e0 [ 821.791416] ? syscall_return_slowpath+0x550/0x550 [ 821.796321] ? syscall_return_slowpath+0x2ac/0x550 [ 821.801229] ? prepare_exit_to_usermode+0x350/0x350 [ 821.806226] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 821.811571] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 821.816398] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 821.821601] RIP: 0033:0x4548b9 [ 821.824764] RSP: 002b:00007ff90564bc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 821.832446] RAX: ffffffffffffffda RBX: 00007ff90564c6d4 RCX: 00000000004548b9 [ 821.839735] RDX: 00000000200002c0 RSI: 0000000020000140 RDI: 0000000020000300 [ 821.846981] RBP: 000000000072bea0 R08: 0000000020000200 R09: 0000000000000000 [ 821.854227] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 821.861469] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000034 2018/03/29 11:56:16 executing program 3: r0 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x10}, 0x10) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000000c0)={0x0, 0x1000, 0x8}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000080)='./file0\x00', r1}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0x0, 0x8}, 0x10) mount(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='cpuset\x00', 0x40, &(0x7f0000000280)="8a4562cb6a7df38be32246afcaef1e1a3f933cb428242c55c117c0fbbd62cea0aab31f2665fb88267466eca314fc8cafd72cc24143121c0691236768fad66390bf9b55014c2bd49faa5388cbabd52e730eeb4ccc411bacd296e423d971043756cf2b35a4063f2a7465b44a60ef31ae437f6160ed2f63afa62c36a27c33e4779e7c0404e337abc025bb2e4b39cc265573c6ab1a3ff09c7ad6bb4631a4") mount(&(0x7f0000000340)='./file1\x00', &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='devtmpfs\x00', 0x40, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xb, 0x7f, 0x0, 0x1, 0x12, r1, 0x100000000}, 0x2c) mkdir(&(0x7f0000000440)='./file1\x00', 0x20) mount(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='iso9660\x00', 0x8, &(0x7f0000000540)="650fe6ccea2b17860de967406c566ec16fe5a7a4c064707e22906e9d3d2a70b4") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000005c0)={r2, 0x28, &(0x7f0000000580)={0x0, 0x0}}, 0x10) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={r3, 0x8, 0x10}, 0xc) mount(&(0x7f0000000640)='./file1\x00', &(0x7f0000000680)='./file1\x00', &(0x7f00000006c0)='pstore\x00', 0x1000000, &(0x7f0000000700)="f48afa3ab3cc319f917be52b04c388c229578537782bc5ffc32c7747b1d28999ad89f5fba460640a324385ac03cccef4553d641b91d79d014804a98e72796f8eb2e1a7056efeaa63404648df67079ae817420f248ccf9d01e7a027c600c71777fb9ebc97da60f3d1a287ef8bc00f1dc68c3b1f0c1836cde5b62be45dd58c3415cbb0f916fe3c04fc69911e2bec15c208d023bdb608fa727657c532bd5101a2a36b34c4eb65f855fea2d6f8a0a79b15ecef1a4c81a8f6f5ed57b09db2ab482413540416126718f2a33ed21346ded20b084a8dc10702ec279fc486b5c57c163d") socketpair(0x3, 0x2, 0x1f, &(0x7f0000001c40)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$kcm(r6, &(0x7f0000004300)={0x0, 0x0, &(0x7f0000004140)=[{&(0x7f0000001c80)=""/139, 0x8b}, {&(0x7f0000001d40)=""/149, 0x95}, {&(0x7f0000001e00)=""/188, 0xbc}, {&(0x7f0000001ec0)=""/69, 0x45}, {&(0x7f0000001f40)=""/165, 0xa5}, {&(0x7f0000002000)=""/4096, 0x1000}, {&(0x7f0000003000)=""/42, 0x2a}, {&(0x7f0000003040)=""/4096, 0x1000}, {&(0x7f0000004040)=""/233, 0xe9}], 0x9, &(0x7f0000004200)=""/236, 0xec, 0xe00}, 0x40) mount(&(0x7f0000004340)='./file1/file0\x00', &(0x7f0000004380)='./file1\x00', &(0x7f00000043c0)='ceph\x00', 0x4860, &(0x7f0000004400)="2c8eb517dd302be26597065442d58f3f345c295b542b2b1df3046ae176") bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000004600)={r6, &(0x7f0000004440)="903685b47b9c4d5c1dffcefa6a92cd57ccdfaf1af0be272f1cb4a5b86ab9d1ef248a63f04f5d59c2cd6e6b7722f5ff866c5d353014f28baaa95bce06a787a3e085102126a0386ffd4e136d472f2cdfb7c658643d2792b7235e2ec8c782080850c20eb00014eab035d7d56c8ddd0d7fdc4c21602d480e4accea0867cc5b4172b46b8f028bd623c58544092396dbda704543cd7c93219ff7f4caf9d0c12fc32c65ddac48ba22321d2c7ef1152f0dd87ed22cb30eb2b24d381b3abaefc114ad4c08e329cfbce60e0549ca", &(0x7f0000004540)="38859653237c5c9685cf2e44e1eea64846e190b778f29b06c26c2f2b8a0800f9fc2019b05290fc5c82f612eb7f479918015eb3af93cc57f01db731e129275ce05910f66e436ef09a8fe7bf22f960eacec350a7f7e9e9a47cb163f467b6a29523346a4c61d65d2235c73095a53929d509538f640424133cfa3617b41a51aa7172460146433abbe604f2c92827fabd5d3134d36b4cecd0fd2549f3527615f9eb63dd9332021e4eff13ad6aa509db21ed98745d00cb36e547", 0x3}, 0x20) mkdir(&(0x7f0000004640)='./file1/file0\x00', 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000004680)={0x0, 0x0, 0xa6, 0x3, 0x4}, 0x2c) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000046c0)=0x7, 0x4) recvmsg$kcm(r6, &(0x7f00000058c0)={&(0x7f0000004700)=@alg, 0x80, &(0x7f0000005880)=[{&(0x7f0000004780)=""/4096, 0x1000}, {&(0x7f0000005780)=""/219, 0xdb}], 0x2, 0x0, 0x0, 0x100000001}, 0x40000000) r7 = gettid() r8 = perf_event_open(&(0x7f0000005900)={0x7, 0x70, 0x0, 0xfffffffffffffff7, 0x9, 0x4, 0x0, 0x7, 0x100, 0x8, 0x100000000, 0x8000, 0x8, 0x6, 0x0, 0x6, 0x10001, 0x9, 0x1f, 0x2, 0x1, 0x3, 0x1, 0x1f, 0x23, 0x1, 0xaa4, 0x5, 0x4, 0x200, 0x6, 0x9, 0xfffffffffffffffb, 0x3, 0x3, 0xff, 0x80000000, 0x0, 0x0, 0xffffffffffffff9d, 0x2, @perf_config_ext={0x7, 0x9}, 0x100, 0x8, 0x2, 0x6, 0x4, 0x6, 0xf71}, r7, 0x9, r6, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f00000059c0)={&(0x7f0000005980)='./file0\x00'}, 0x10) ioctl$sock_kcm_SIOCKCMATTACH(r5, 0x89e0, &(0x7f0000005a00)={r5, r0}) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000005c00)={r4, &(0x7f0000005a40)="313befc1e9ac680c4369983530ee783c4f018c38e134b4b0aebd06ede05f238850949c0f5d32ab19889f880e87e3a0fa5a43500affdcc508d56f3a4df6c159ca9cfa62124b79b4607d42738dc5e16d09ea2c6a2346fc2360feff08d9f464dfdebce2cb99d4ba8e5fc37edfba041f14e16a68192d7d8687404ee7318323520188c4e5d52e8c7ec40bd0823fb210e530c74ea842bd8bacbc48317b0b6ed12528ecd30e1af83b8049df791ff7affe91ab54", &(0x7f0000005b00)=""/243}, 0x18) mount(&(0x7f0000005c40)='./file1/file0\x00', &(0x7f0000005c80)='./file1\x00', &(0x7f0000005cc0)='btrfs\x00', 0x0, 0x0) recvmsg(r5, &(0x7f00000073c0)={&(0x7f0000005d00)=@sco, 0x80, &(0x7f0000007300)=[{&(0x7f0000005d80)=""/103, 0x67}, {&(0x7f0000005e00)=""/170, 0xaa}, {&(0x7f0000005ec0)=""/252, 0xfc}, {&(0x7f0000005fc0)=""/136, 0x88}, {&(0x7f0000006080)=""/125, 0x7d}, {&(0x7f0000006100)=""/4096, 0x1000}, {&(0x7f0000007100)=""/106, 0x6a}, {&(0x7f0000007180)=""/115, 0x73}, {&(0x7f0000007200)=""/240, 0xf0}], 0x9, 0x0, 0x0, 0x7}, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000007400)={r3, 0x10001, 0x18}, 0xc) ioctl$PERF_EVENT_IOC_REFRESH(r8, 0x2402, 0xc4c) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008880)={&(0x7f0000007440)=@l2, 0x80, &(0x7f0000008800)=[{&(0x7f00000074c0)=""/231, 0xe7}, {&(0x7f00000075c0)=""/118, 0x76}, {&(0x7f0000007640)=""/4096, 0x1000}, {&(0x7f0000008640)=""/223, 0xdf}, {&(0x7f0000008740)}, {&(0x7f0000008780)=""/32, 0x20}, {&(0x7f00000087c0)=""/53, 0x35}], 0x7}, 0x10000) 2018/03/29 11:56:16 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x1e1, 0x100000000209e20, 0x8000000001, 0x5}, 0xfffffffffffffe20) r0 = getpid() r1 = perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0xfffffffffffffffc, 0x3, 0x8, 0x2, 0x0, 0x9, 0x10000, 0xc, 0x3d3, 0x80, 0x5, 0xfffffffffffffffc, 0x8, 0x3f, 0x5d, 0xbbb0, 0x20, 0x3, 0x8000, 0x100000000, 0x8, 0x9, 0x2, 0x4, 0x800, 0xf8, 0x3, 0x9, 0x1, 0x3, 0x8, 0x3, 0x7, 0x10001, 0xf16, 0x2, 0x0, 0x7fffffff, 0x4, @perf_bp={&(0x7f0000000780), 0x1}, 0x4080, 0x10001, 0xcc, 0x7, 0x3, 0xffff, 0x7fffffff}, 0xffffffffffffffff, 0xd, 0xffffffffffffff9c, 0x8) perf_event_open(&(0x7f0000000980)={0x4, 0x70, 0x6, 0x3f, 0x8e, 0x1, 0x0, 0x3, 0x404, 0x0, 0xbc2b, 0x40, 0x7, 0xffff, 0xffff, 0x9, 0x9de2, 0x9, 0x0, 0x3, 0x7f, 0xff, 0x40, 0x400, 0x9, 0x7fffffff, 0x80000000, 0x7, 0x8, 0x10001, 0x1f, 0x2778, 0x800, 0x8001, 0x101, 0x9, 0x8, 0x7ff, 0x0, 0x1000, 0x5, @perf_config_ext={0x3ff, 0xb69b}, 0x3040, 0x2, 0x2, 0x5, 0x7, 0x6, 0x7283ed73}, r0, 0xe, r1, 0x8) bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x0, 0x0, 0x7ffff9, 0x0, 0x20000003, 0x0}, 0x2c) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) r2 = gettid() r3 = perf_event_open(&(0x7f00000008c0)={0x7, 0x70, 0x1, 0x200, 0x3, 0xdbce, 0x0, 0x8, 0x1002, 0x1, 0xffffffffffffff00, 0x8, 0x1, 0xb3fa, 0x8, 0x0, 0x1, 0x2, 0x1000, 0x2, 0x401, 0x8, 0x3, 0x81, 0x0, 0x7, 0x2fc4, 0x882, 0x4, 0x8, 0x3, 0x81, 0x3, 0x7, 0x8857, 0x7, 0x5, 0x9, 0x0, 0x7, 0x1, @perf_config_ext={0x0, 0x80000000}, 0x400, 0x7f, 0x4, 0x7, 0x2, 0x7f, 0x200}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000840)={0x5, 0x70, 0xef, 0x2, 0x1000, 0xffffffff80000000, 0x0, 0x1a7800000000, 0x2000, 0x4, 0x5, 0x6814, 0x3a9, 0x5, 0x63b, 0x6, 0x8, 0x1000, 0x250420ee, 0x3, 0x0, 0x20, 0x6, 0x0, 0x4, 0x5, 0x4, 0x8, 0x3, 0x8, 0x52893dd5, 0x2, 0x2, 0x8, 0x44d, 0x1, 0x8, 0x6, 0x0, 0x100000000, 0x0, @perf_config_ext={0x9, 0x80}, 0x0, 0x0, 0x2b67, 0x6, 0x4b0, 0x81, 0x4}, r2, 0x5, r3, 0xb) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1003, 0x0) mount(&(0x7f00002b9ff8)='./file0\x00', &(0x7f0000cbeff8)='./file0\x00', &(0x7f00005f7ffa)='ramfs\x00', 0x80000, &(0x7f000002f000)) mount(&(0x7f0000000000)='.', &(0x7f0000000040)='.', &(0x7f0000000080)='cgroup\x00', 0x5010, &(0x7f00000000c0)) mount(&(0x7f0000377ff8)='.', &(0x7f0000000280)='.', &(0x7f0000000600)='nfs4\x00', 0x5010, &(0x7f0000000300)="2161893416a0c71070768c219eb114c3253c9f3baf4e9e8e9111c1a7fc6e266009fe27243deeaa22ca7ae9341f714300b5ee807e55d609036f2a3260475922bdfb2d2849f1c3b2ad3c051bd4f3751a177f77a92758c6d2b23fe7f1535b54e5846d11c135de8286066dec1b25f6e1378944ac5f7fce42d055821b5e19") perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xd68, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f0000014f88)={0x5, 0xfffffffffffffdc4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x46000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = getpid() perf_event_open(&(0x7f0000000680)={0x4, 0x70, 0x64, 0xffff, 0x1f, 0x4, 0x0, 0x1c3, 0x0, 0x1, 0x1, 0x9, 0x1ff, 0xfffffffffffffff8, 0x0, 0x0, 0x6, 0x7fffffff, 0x4, 0xffffffff, 0x80000001, 0xd0, 0x7, 0x1f, 0x0, 0x8, 0x9, 0x1ff, 0x8, 0x785, 0x4, 0xff, 0x2, 0x656, 0x5000000, 0x1, 0x460e3be0, 0x1, 0x0, 0x0, 0x7, @perf_bp={&(0x7f0000000640), 0x1}, 0x1000, 0xa, 0x7fff, 0x7, 0x3, 0x400, 0x9}, r5, 0xe, r4, 0x1) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', 0x0, 0x10}, 0x10) close(0xffffffffffffffff) bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)={&(0x7f0000000040)='./file0\x00', 0x0, 0x18}, 0x10) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000100)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0, 0x2e, &(0x7f0000000440), &(0x7f0000000140)=""/46, 0x4229}, 0x28) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000003480)={&(0x7f0000003300)=@can={0x0, 0x0}, 0x80, &(0x7f0000003400)=[{&(0x7f0000003380)=""/56, 0x38}, {&(0x7f00000033c0)=""/1, 0x1}], 0x2, &(0x7f0000003440)=""/33, 0x21, 0x1}, 0x40010000) bpf$PROG_LOAD(0x5, &(0x7f00000034c0)={0xe, 0x6, &(0x7f0000000940)=ANY=[@ANYBLOB="1800000002000000000000004ce700002555fdff00000000002371d07c9ba7f4a23372b0ad61000000000000009500000000000000"], &(0x7f00000007c0)='GPL\x00', 0x0, 0x2d, &(0x7f0000000800)=""/45, 0x40f00, 0x1, [], r6}, 0x48) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000740)={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x10) socketpair$inet(0x2, 0x80a, 0x81, &(0x7f0000000240)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={0xffffffffffffffff, &(0x7f0000000500)="ae30f1bca1b4d3f69f1aac81517d42ad5980bc63b5008616a1f4724b9f8c1e4ecd8de336f57dd727cdaab04f0b40f28612615ad08de414711d841a88db33fd33884b627074213a0c5de3be2bbaec9207d9865c47f240467849979b5ab5632376608fc4be41a274abb2dc07cabe344a18db51048e5b0cbda843905a4258cdee3e649eddf104ba78894dce09747dcfe6a8d6d6d985520eeef448b83a8bcb83074541ba7a20d6094aa206c01a0690e5b3bfa05d475eb382b0199031d22bb26cde9b1ca0055eef9f6c4993b71ba19ba0590bb5efdaddaa574c25356ca890d138fc9fe0e975b6d5a1a8251503cd0a91845f9d95", &(0x7f0000000480)="9bc7741ea5e524cc8c6f748a73153834428729c45bf4ad446d2dddf1978baf431d0ba35b5442b5afe22db8b003650320200af7e1368ef7cdfa79ca8b9d3564363a5d2a502970314f2264c883bc8d990afc003e5adb95b30edad245c4420c8126f1d33db75ff0230698eaff90055e0f", 0x2}, 0x20) socketpair(0x0, 0x80003, 0xffff, &(0x7f0000000380)={0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r7, 0x50, &(0x7f00000003c0)}, 0x10) 2018/03/29 11:56:16 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x3, &(0x7f0000002000)=@framed={{0x18}, [], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000680)={0xffffffffffffffff, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x7}, 0x28) recvmsg(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x7, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000100)=r0, 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) recvmsg(r2, &(0x7f00000011c0)={&(0x7f0000000b40)=@can, 0x80, &(0x7f0000001100)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f0000000c80)=""/169, 0xa9}, {&(0x7f0000000d40)=""/229, 0xe5}, {&(0x7f0000000e40)=""/128, 0x80}, {&(0x7f0000000ec0)=""/48, 0x30}, {&(0x7f0000000f00)=""/137, 0x89}, {&(0x7f0000006000)=""/4096, 0x1000}, {&(0x7f0000007000)=""/4096, 0x1000}, {&(0x7f0000001080)=""/127, 0x7f}, {&(0x7f0000008000)=""/4096, 0x1000}], 0xa, 0x0, 0x0, 0x1}, 0x2020) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001200)={0x7, 0x4, 0x0, 0x4, 0x8, 0xffffffffffffffff, 0x9}, 0x2c) socketpair(0x3, 0x80e, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r3, &(0x7f0000000200)={&(0x7f0000000fc0)=@pppol2tp={0x18, 0x1, {0x0, r2, {0x2, 0x4e20, @broadcast=0xffffffff}, 0x1, 0x3, 0x0, 0x2}}, 0x80, &(0x7f0000001580)=[{&(0x7f0000001240)="95c4dcff0f017b3c1979888e50f6c20a37b4edaffb28a3b609d24a8180434ab2fac426d3e4fc87e18267002be3cd56b11d69c4db739bf6a9c91af67ee87be1ea522993a368bdfc0df55539a60ef5515b4f03f3dbddae65cd66a90f030118870b473f156cb9a18624103000608c63f84b09ea89bfb8d8e7705c6ef456ef28adec5e566632ddd63098", 0x88}, {&(0x7f0000001380)="5745869bf3b6f562576761d821af2ad55c2f81345c810d6dbd43facd33c5107488aa7f04c5ab1302b820cd31405e9f657776a0d48e2225f39aabc3de0b30dc7422503b448ad89c23ebaee24ae9696e4e58eccae5febf47fff53dc1f03d869303acdef233746263c5c567e84edb166010fd23f56d6e84406bced5a00b5016b0c700fd76218ecf5da3527552a683eb87aa4b246cd74bcbeff8dedec74332e0214e4dc64cb7ac24c4447843caa7550375ef8e1f74a78c40a617e913a25e4837d24fb09e93eaa2", 0xc5}, {&(0x7f0000001480)="8247f46d4324760570d5078149dc5b38f7d1c592564148ecc6262e91c29cd4344e423ff476882993a2844af9a7c306a15e659a4cb9230b5139842c87ad8fa95c202146730fa610b141dfe4c7b771b46e4db879d2b92a01cb8642100d80a1d4658fd0df05c06c8615960a92b690c728e2603373657a9a46b2f200f2895198694d470ab95b6eb7a76ccee67c9219b4afa289d70c87cf22c733e00700f345136d59bcbd89ce7e110746f91e7a7661b8eb0afe54e3cb1c712441dd9a6ffb59a2eb58e5f5eabd4bec428fe27a403bb0d19125e473abdfea87a0c89108e3c876438a7c3f84bebad6cf858f26d2083efd60", 0xee}], 0x3, &(0x7f000000a000)=[{0x88, 0x112, 0xc2, "6671b4b66ac2fb4e14cee671813dc3834802e601529feb049ebb70880567948953018cfd53d7b1c9be27b1084adfba62040c7f889cfbc15407d93133259d9d5052bf6648a69218702e35278939ad399dc3ebed233c1792c7c1204353c8fe75ea0398f4aaf830834bc93873c119dddc539c"}, {0xe8, 0x6f180cc1befb202, 0x9, "4577f77fd3b3acd92c96feff8b0409afeae1c16fa3d367241c9679e5105141c7205d47ce27a418c10fbe7f601c3142e7b7b3a67322c9d345e0baf4315e13dc771a962ff445015c98a70b319d46ba59155d1cf07827804ea1ca86db74f3029bd60f6f365d955ec12be30102e59b4b3940152988ef09443df596bad9525f697fad61507e856c6acb744cfb034863943e811bd378843ccbd95f8221a444f4c323a391f5788559f34ac02e6e18065b87e8c962353623250694e5b4bf9bc1b00fadf2875995067ff6c18590c207f9a83f06665f5b5af77b4e"}, {0xa0, 0x10f, 0x5, "07c5972c79a30903d5d93f57c962c0351628551f6a3fbac8e18984ad9b8caeb403f1d588fa0b9955ce44d018cbcc06ad98b588dd45fd0ccd6b8d1965e70693ec76dd521aa2693829ef54059dc3191f2f4eca64c63f2f901ead2d6c54f0119212ebb77e956117d9130d3adff30a5598567fd540cf0a8f9f8c469ad15f209ad8ef161006831b39e4ddf2fcd748a8629e33"}], 0x210, 0x40}, 0x40) close(r0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)) recvmsg(r1, &(0x7f00000267c0)={&(0x7f00000251c0)=@can, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) 2018/03/29 11:56:16 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x1e1, 0x100000000209e20, 0x0, 0x5}, 0xfffffffffffffe20) r0 = getpid() r1 = perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0xfffffffffffffffc, 0x3, 0x8, 0x2, 0x0, 0x9, 0x10000, 0xc, 0x3d3, 0x80, 0x5, 0xfffffffffffffffc, 0x8, 0x3f, 0x5d, 0xbbb0, 0x20, 0x3, 0x8000, 0x100000000, 0x8, 0x9, 0x2, 0x4, 0x800, 0xf8, 0x3, 0x9, 0x1, 0x3, 0x8, 0x3, 0x7, 0x10001, 0xf16, 0x2, 0x0, 0x7fffffff, 0x4, @perf_bp={&(0x7f0000000780), 0x1}, 0x4080, 0x10001, 0xcc, 0x7, 0x3, 0xffff, 0x7fffffff}, 0xffffffffffffffff, 0xd, 0xffffffffffffff9c, 0x8) perf_event_open(&(0x7f0000000980)={0x4, 0x70, 0x6, 0x3f, 0x8e, 0x1, 0x0, 0x3, 0x404, 0x0, 0xbc2b, 0x40, 0x7, 0xffff, 0xffff, 0x9, 0x9de2, 0x9, 0x0, 0x3, 0x7f, 0xff, 0x40, 0x400, 0x9, 0x7fffffff, 0x80000000, 0x7, 0x8, 0x10001, 0x1f, 0x2778, 0x800, 0x8001, 0x101, 0x9, 0x8, 0x7ff, 0x0, 0x1000, 0x5, @perf_config_ext={0x3ff, 0xb69b}, 0x3040, 0x2, 0x2, 0x5, 0x7, 0x6, 0x7283ed73}, r0, 0xe, r1, 0x8) bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x0, 0x0, 0x7ffff9, 0x0, 0x20000003, 0x0}, 0x2c) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) r2 = gettid() r3 = perf_event_open(&(0x7f00000008c0)={0x7, 0x70, 0x1, 0x200, 0x3, 0xdbce, 0x0, 0x8, 0x1002, 0x1, 0xffffffffffffff00, 0x8, 0x1, 0xb3fa, 0x8, 0x0, 0x1, 0x2, 0x1000, 0x2, 0x401, 0x8, 0x3, 0x81, 0x0, 0x7, 0x2fc4, 0x882, 0x4, 0x8, 0x3, 0x81, 0x3, 0x7, 0x8857, 0x7, 0x5, 0x9, 0x0, 0x7, 0x1, @perf_config_ext={0x0, 0x80000000}, 0x400, 0x7f, 0x4, 0x7, 0x2, 0x7f, 0x200}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000840)={0x5, 0x70, 0xef, 0x2, 0x1000, 0xffffffff80000000, 0x0, 0x1a7800000000, 0x2000, 0x4, 0x5, 0x6814, 0x3a9, 0x5, 0x63b, 0x6, 0x8, 0x1000, 0x250420ee, 0x3, 0x0, 0x20, 0x6, 0x0, 0x4, 0x5, 0x4, 0x8, 0x3, 0x8, 0x52893dd5, 0x2, 0x2, 0x8, 0x44d, 0x1, 0x8, 0x6, 0x0, 0x100000000, 0x0, @perf_config_ext={0x9, 0x80}, 0x0, 0x0, 0x2b67, 0x6, 0x4b0, 0x81, 0x4}, r2, 0x5, r3, 0xb) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1003, 0x0) mount(&(0x7f00002b9ff8)='./file0\x00', &(0x7f0000cbeff8)='./file0\x00', &(0x7f00005f7ffa)='ramfs\x00', 0x80000, &(0x7f000002f000)) mount(&(0x7f0000000000)='.', &(0x7f0000000040)='.', &(0x7f0000000080)='cgroup\x00', 0x5010, &(0x7f00000000c0)) mount(&(0x7f0000377ff8)='.', &(0x7f0000000280)='.', &(0x7f0000000600)='nfs4\x00', 0x5010, &(0x7f0000000300)="2161893416a0c71070768c219eb114c3253c9f3baf4e9e8e9111c1a7fc6e266009fe27243deeaa22ca7ae9341f714300b5ee807e55d609036f2a3260475922bdfb2d2849f1c3b2ad3c051bd4f3751a177f77a92758c6d2b23fe7f1535b54e5846d11c135de8286066dec1b25f6e1378944ac5f7fce42d055821b5e19") perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xd68, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f0000014f88)={0x5, 0xfffffffffffffdc4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x46000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = getpid() perf_event_open(&(0x7f0000000680)={0x4, 0x70, 0x64, 0xffff, 0x1f, 0x4, 0x0, 0x1c3, 0x0, 0x1, 0x1, 0x9, 0x1ff, 0xfffffffffffffff8, 0x0, 0x0, 0x6, 0x7fffffff, 0x0, 0xffffffff, 0x80000001, 0xd0, 0x7, 0x1f, 0x0, 0x8, 0x9, 0x1ff, 0x8, 0x785, 0x4, 0xff, 0x2, 0x656, 0x5000000, 0x1, 0x460e3be0, 0x1, 0x0, 0x0, 0x7, @perf_bp={&(0x7f0000000640), 0x1}, 0x1000, 0xa, 0x7fff, 0x7, 0x3, 0x400, 0x9}, r5, 0xe, r4, 0x1) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', 0x0, 0x10}, 0x10) close(0xffffffffffffffff) bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)={&(0x7f0000000040)='./file0\x00', 0x0, 0x18}, 0x10) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000100)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0, 0x2e, &(0x7f0000000440), &(0x7f0000000140)=""/46, 0x4229}, 0x28) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000003480)={&(0x7f0000003300)=@can={0x0, 0x0}, 0x80, &(0x7f0000003400)=[{&(0x7f0000003380)=""/56, 0x38}, {&(0x7f00000033c0)=""/1, 0x1}], 0x2, &(0x7f0000003440)=""/33, 0x21, 0x1}, 0x40010000) bpf$PROG_LOAD(0x5, &(0x7f00000034c0)={0xe, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="1800000002000000000000004ce700002555fdff00000000002371d07c9ba7f4a23372b0ad61000000000000009500000000000000"], &(0x7f00000007c0)='GPL\x00', 0x3, 0x2d, &(0x7f0000000800)=""/45, 0x40f00, 0x1, [], r6}, 0x48) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000740)={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x10) socketpair$inet(0x2, 0x80a, 0x81, &(0x7f0000000240)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={0xffffffffffffffff, &(0x7f0000000500)="ae30f1bca1b4d3f69f1aac81517d42ad5980bc63b5008616a1f4724b9f8c1e4ecd8de336f57dd727cdaab04f0b40f28612615ad08de414711d841a88db33fd33884b627074213a0c5de3be2bbaec9207d9865c47f240467849979b5ab5632376608fc4be41a274abb2dc07cabe344a18db51048e5b0cbda843905a4258cdee3e649eddf104ba78894dce09747dcfe6a8d6d6d985520eeef448b83a8bcb83074541ba7a20d6094aa206c01a0690e5b3bfa05d475eb382b0199031d22bb26cde9b1ca0055eef9f6c4993b71ba19ba0590bb5efdaddaa574c25356ca890d138fc9fe0e975b6d5a1a8251503cd0a91845f9d95", &(0x7f0000000480)="9bc7741ea5e524cc8c6f748a73153834428729c45bf4ad446d2dddf1978baf431d0ba35b5442b5afe22db8b003650320200af7e1368ef7cdfa79ca8b9d3564363a5d2a502970314f2264c883bc8d990afc003e5adb95b30edad245c4420c8126f1d33db75ff0230698eaff90055e0f", 0x2}, 0x20) socketpair(0x0, 0x80003, 0xffff, &(0x7f0000000380)={0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r7, 0x50, &(0x7f00000003c0)}, 0x10) 2018/03/29 11:56:16 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x3, &(0x7f0000002000)=@framed={{0x18}, [], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000680)={0xffffffffffffffff, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x7}, 0x28) recvmsg(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000001c0)) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000100), 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) recvmsg(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000000b40)=@can, 0x80, &(0x7f0000001100)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f0000000c80)=""/169, 0xa9}, {&(0x7f0000000d40)=""/229, 0xe5}, {&(0x7f0000000e40)=""/128, 0x80}, {&(0x7f0000000ec0)=""/48, 0x30}, {&(0x7f0000000f00)=""/137, 0x89}, {&(0x7f0000006000)=""/4096, 0x1000}, {&(0x7f0000007000)=""/4096, 0x1000}, {&(0x7f0000001080)=""/127, 0x7f}, {&(0x7f0000008000)=""/4096, 0x1000}], 0xa, 0x0, 0x0, 0x1}, 0x2020) bpf$MAP_CREATE(0x0, &(0x7f0000001200)={0x7, 0x4, 0x0, 0x4, 0x8, 0xffffffffffffffff, 0x9}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x1000000007, 0xcf2e, 0x7e, 0x20, 0x15, r1, 0x4}, 0x2c) socketpair(0x3, 0x80e, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r4, &(0x7f0000000200)={&(0x7f0000000fc0)=@pppol2tp={0x18, 0x1, {0x0, r3, {0x2, 0x4e20, @broadcast=0xffffffff}, 0x1, 0x3, 0x0, 0x2}}, 0x80, &(0x7f0000001580)=[{&(0x7f0000001240)="95c4dcff0f017b3c1979888e50f6c20a37b4edaffb28a3b609d24a8180434ab2fac426d3e4fc87e18267002be3cd56b11d69c4db739bf6a9c91af67ee87be1ea522993a368bdfc0df55539a60ef5515b4f03f3dbddae65cd66a90f030118870b473f156cb9a18624103000608c63f84b09ea89bfb8d8e7705c6ef456ef28adec5e566632ddd63098", 0x88}, {&(0x7f0000001380)="5745869bf3b6f562576761d821af2ad55c2f81345c810d6dbd43facd33c5107488aa7f04c5ab1302b820cd31405e9f657776a0d48e2225f39aabc3de0b30dc7422503b448ad89c23ebaee24ae9696e4e58eccae5febf47fff53dc1f03d869303acdef233746263c5c567e84edb166010fd23f56d6e84406bced5a00b5016b0c700fd76218ecf5da3527552a683eb87aa4b246cd74bcbeff8dedec74332e0214e4dc64cb7ac24c4447843caa7550375ef8e1f74a78c40a617e913a25e4837d24fb09e93eaa2", 0xc5}, {&(0x7f0000001480)="8247f46d4324760570d5078149dc5b38f7d1c592564148ecc6262e91c29cd4344e423ff476882993a2844af9a7c306a15e659a4cb9230b5139842c87ad8fa95c202146730fa610b141dfe4c7b771b46e4db879d2b92a01cb8642100d80a1d4658fd0df05c06c8615960a92b690c728e2603373657a9a46b2f200f2895198694d470ab95b6eb7a76ccee67c9219b4afa289d70c87cf22c733e00700f345136d59bcbd89ce7e110746f91e7a7661b8eb0afe54e3cb1c712441dd9a6ffb59a2eb58e5f5eabd4bec428fe27a403bb0d19125e473abdfea87a0c89108e3c876438a7c3f84bebad6cf858f26d2083efd60", 0xee}], 0x3, &(0x7f000000a000)=[{0x88, 0x112, 0xc2, "6671b4b66ac2fb4e14cee671813dc3834802e601529feb049ebb70880567948953018cfd53d7b1c9be27b1084adfba62040c7f889cfbc15407d93133259d9d5052bf6648a69218702e35278939ad399dc3ebed233c1792c7c1204353c8fe75ea0398f4aaf830834bc93873c119dddc539c"}, {0xe8, 0x6f180cc1befb202, 0x9, "4577f77fd3b3acd92c96feff8b0409afeae1c16fa3d367241c9679e5105141c7205d47ce27a418c10fbe7f601c3142e7b7b3a67322c9d345e0baf4315e13dc771a962ff445015c98a70b319d46ba59155d1cf07827804ea1ca86db74f3029bd60f6f365d955ec12be30102e59b4b3940152988ef09443df596bad9525f697fad61507e856c6acb744cfb034863943e811bd378843ccbd95f8221a444f4c323a391f5788559f34ac02e6e18065b87e8c962353623250694e5b4bf9bc1b00fadf2875995067ff6c18590c207f9a83f06665f5b5af77b4e"}, {0xa0, 0x10f, 0x5, "07c5972c79a30903d5d93f57c962c0351628551f6a3fbac8e18984ad9b8caeb403f1d588fa0b9955ce44d018cbcc06ad98b588dd45fd0ccd6b8d1965e70693ec76dd521aa2693829ef54059dc3191f2f4eca64c63f2f901ead2d6c54f0119212ebb77e956117d9130d3adff30a5598567fd540cf0a8f9f8c469ad15f209ad8ef161006831b39e4ddf2fcd748a8629e33"}], 0x210, 0x40}, 0x40) close(r0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)) recvmsg(r2, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) recvmsg$kcm(r4, &(0x7f0000001a00)={0x0, 0x0, &(0x7f00000018c0)=[{&(0x7f0000001600)=""/173, 0xad}, {&(0x7f0000001040)=""/25, 0x19}, {&(0x7f00000016c0)=""/132, 0x84}, {&(0x7f0000001780)=""/91, 0x5b}, {&(0x7f0000001800)=""/183, 0xb7}], 0x5, &(0x7f0000001940)=""/163, 0xa3, 0xe43}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000a80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r5}, 0x48) 2018/03/29 11:56:16 executing program 4 (fault-call:8 fault-nth:53): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x3, &(0x7f0000002000)=@framed={{0x18}, [], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000680)={0xffffffffffffffff, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x7}, 0x28) recvmsg(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000001c0)) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000100)=r0, 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) recvmsg(r3, &(0x7f00000011c0)={&(0x7f0000000b40)=@can, 0x80, &(0x7f0000001100)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f0000000c80)=""/169, 0xa9}, {&(0x7f0000000d40)=""/229, 0xe5}, {&(0x7f0000000e40)=""/128, 0x80}, {&(0x7f0000000ec0)=""/48, 0x30}, {&(0x7f0000000f00)=""/137, 0x89}, {&(0x7f0000006000)=""/4096, 0x1000}, {&(0x7f0000007000)=""/4096, 0x1000}, {&(0x7f0000001080)=""/127, 0x7f}, {&(0x7f0000008000)=""/4096, 0x1000}], 0xa, 0x0, 0x0, 0x1}, 0x2020) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001200)={0x7, 0x4, 0x0, 0x4, 0x8, 0xffffffffffffffff, 0x9}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x1000000007, 0xcf2e, 0x7e, 0x20, 0x15, r1, 0x4}, 0x2c) socketpair(0x3, 0x80e, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r4, &(0x7f0000000200)={&(0x7f0000000fc0)=@pppol2tp={0x18, 0x1, {0x0, r3, {0x2, 0x4e20, @broadcast=0xffffffff}, 0x1, 0x3, 0x0, 0x2}}, 0x80, &(0x7f0000001580)=[{&(0x7f0000001240)="95c4dcff0f017b3c1979888e50f6c20a37b4edaffb28a3b609d24a8180434ab2fac426d3e4fc87e18267002be3cd56b11d69c4db739bf6a9c91af67ee87be1ea522993a368bdfc0df55539a60ef5515b4f03f3dbddae65cd66a90f030118870b473f156cb9a18624103000608c63f84b09ea89bfb8d8e7705c6ef456ef28adec5e566632ddd63098", 0x88}, {&(0x7f0000001380)="5745869bf3b6f562576761d821af2ad55c2f81345c810d6dbd43facd33c5107488aa7f04c5ab1302b820cd31405e9f657776a0d48e2225f39aabc3de0b30dc7422503b448ad89c23ebaee24ae9696e4e58eccae5febf47fff53dc1f03d869303acdef233746263c5c567e84edb166010fd23f56d6e84406bced5a00b5016b0c700fd76218ecf5da3527552a683eb87aa4b246cd74bcbeff8dedec74332e0214e4dc64cb7ac24c4447843caa7550375ef8e1f74a78c40a617e913a25e4837d24fb09e93eaa2", 0xc5}, {&(0x7f0000001480)="8247f46d4324760570d5078149dc5b38f7d1c592564148ecc6262e91c29cd4344e423ff476882993a2844af9a7c306a15e659a4cb9230b5139842c87ad8fa95c202146730fa610b141dfe4c7b771b46e4db879d2b92a01cb8642100d80a1d4658fd0df05c06c8615960a92b690c728e2603373657a9a46b2f200f2895198694d470ab95b6eb7a76ccee67c9219b4afa289d70c87cf22c733e00700f345136d59bcbd89ce7e110746f91e7a7661b8eb0afe54e3cb1c712441dd9a6ffb59a2eb58e5f5eabd4bec428fe27a403bb0d19125e473abdfea87a0c89108e3c876438a7c3f84bebad6cf858f26d2083efd60", 0xee}], 0x3, &(0x7f000000a000)=[{0x88, 0x112, 0xc2, "6671b4b66ac2fb4e14cee671813dc3834802e601529feb049ebb70880567948953018cfd53d7b1c9be27b1084adfba62040c7f889cfbc15407d93133259d9d5052bf6648a69218702e35278939ad399dc3ebed233c1792c7c1204353c8fe75ea0398f4aaf830834bc93873c119dddc539c"}, {0xe8, 0x6f180cc1befb202, 0x9, "4577f77fd3b3acd92c96feff8b0409afeae1c16fa3d367241c9679e5105141c7205d47ce27a418c10fbe7f601c3142e7b7b3a67322c9d345e0baf4315e13dc771a962ff445015c98a70b319d46ba59155d1cf07827804ea1ca86db74f3029bd60f6f365d955ec12be30102e59b4b3940152988ef09443df596bad9525f697fad61507e856c6acb744cfb034863943e811bd378843ccbd95f8221a444f4c323a391f5788559f34ac02e6e18065b87e8c962353623250694e5b4bf9bc1b00fadf2875995067ff6c18590c207f9a83f06665f5b5af77b4e"}, {0xa0, 0x10f, 0x5, "07c5972c79a30903d5d93f57c962c0351628551f6a3fbac8e18984ad9b8caeb403f1d588fa0b9955ce44d018cbcc06ad98b588dd45fd0ccd6b8d1965e70693ec76dd521aa2693829ef54059dc3191f2f4eca64c63f2f901ead2d6c54f0119212ebb77e956117d9130d3adff30a5598567fd540cf0a8f9f8c469ad15f209ad8ef161006831b39e4ddf2fcd748a8629e33"}], 0x210, 0x40}, 0x40) close(r0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b53596090ebcc07d8584f358be88fafe") recvmsg(r2, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) recvmsg$kcm(r4, &(0x7f0000001a00)={0x0, 0x0, &(0x7f00000018c0)=[{&(0x7f0000001600)=""/173, 0xad}, {&(0x7f0000001040)=""/25, 0x19}, {&(0x7f00000016c0)=""/132, 0x84}, {&(0x7f0000001780)=""/91, 0x5b}, {&(0x7f0000001800)=""/183, 0xb7}], 0x5, &(0x7f0000001940)=""/163, 0xa3, 0xe43}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000a80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r5}, 0x48) 2018/03/29 11:56:16 executing program 6: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x3, &(0x7f0000002000)=@framed={{0x18}, [], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000680)={0xffffffffffffffff, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x7}, 0x28) recvmsg(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000001c0)) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000100)=r0, 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) recvmsg(r3, &(0x7f00000011c0)={&(0x7f0000000b40)=@can, 0x80, &(0x7f0000001100)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f0000000c80)=""/169, 0xa9}, {&(0x7f0000000d40)=""/229, 0xe5}, {&(0x7f0000000e40)=""/128, 0x80}, {&(0x7f0000000ec0)=""/48, 0x30}, {&(0x7f0000000f00)=""/137, 0x89}, {&(0x7f0000006000)=""/4096, 0x1000}, {&(0x7f0000007000)=""/4096, 0x1000}, {&(0x7f0000001080)=""/127, 0x7f}], 0x9, 0x0, 0x0, 0x1}, 0x2020) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001200)={0x7, 0x4, 0x0, 0x4, 0x8, 0xffffffffffffffff, 0x9}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x1000000007, 0xcf2e, 0x7e, 0x20, 0x15, r1, 0x4}, 0x2c) socketpair(0x3, 0x80e, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r4, &(0x7f0000000200)={&(0x7f0000000fc0)=@pppol2tp={0x18, 0x1, {0x0, r3, {0x2, 0x4e20, @broadcast=0xffffffff}, 0x1, 0x3, 0x0, 0x2}}, 0x80, &(0x7f0000001580)=[{&(0x7f0000001240)="95c4dcff0f017b3c1979888e50f6c20a37b4edaffb28a3b609d24a8180434ab2fac426d3e4fc87e18267002be3cd56b11d69c4db739bf6a9c91af67ee87be1ea522993a368bdfc0df55539a60ef5515b4f03f3dbddae65cd66a90f030118870b473f156cb9a18624103000608c63f84b09ea89bfb8d8e7705c6ef456ef28adec5e566632ddd63098", 0x88}, {&(0x7f0000001380)="5745869bf3b6f562576761d821af2ad55c2f81345c810d6dbd43facd33c5107488aa7f04c5ab1302b820cd31405e9f657776a0d48e2225f39aabc3de0b30dc7422503b448ad89c23ebaee24ae9696e4e58eccae5febf47fff53dc1f03d869303acdef233746263c5c567e84edb166010fd23f56d6e84406bced5a00b5016b0c700fd76218ecf5da3527552a683eb87aa4b246cd74bcbeff8dedec74332e0214e4dc64cb7ac24c4447843caa7550375ef8e1f74a78c40a617e913a25e4837d24fb09e93eaa2", 0xc5}, {&(0x7f0000001480)="8247f46d4324760570d5078149dc5b38f7d1c592564148ecc6262e91c29cd4344e423ff476882993a2844af9a7c306a15e659a4cb9230b5139842c87ad8fa95c202146730fa610b141dfe4c7b771b46e4db879d2b92a01cb8642100d80a1d4658fd0df05c06c8615960a92b690c728e2603373657a9a46b2f200f2895198694d470ab95b6eb7a76ccee67c9219b4afa289d70c87cf22c733e00700f345136d59bcbd89ce7e110746f91e7a7661b8eb0afe54e3cb1c712441dd9a6ffb59a2eb58e5f5eabd4bec428fe27a403bb0d19125e473abdfea87a0c89108e3c876438a7c3f84bebad6cf858f26d2083efd60", 0xee}], 0x3, &(0x7f000000a000)=[{0x88, 0x112, 0xc2, "6671b4b66ac2fb4e14cee671813dc3834802e601529feb049ebb70880567948953018cfd53d7b1c9be27b1084adfba62040c7f889cfbc15407d93133259d9d5052bf6648a69218702e35278939ad399dc3ebed233c1792c7c1204353c8fe75ea0398f4aaf830834bc93873c119dddc539c"}, {0xe8, 0x6f180cc1befb202, 0x9, "4577f77fd3b3acd92c96feff8b0409afeae1c16fa3d367241c9679e5105141c7205d47ce27a418c10fbe7f601c3142e7b7b3a67322c9d345e0baf4315e13dc771a962ff445015c98a70b319d46ba59155d1cf07827804ea1ca86db74f3029bd60f6f365d955ec12be30102e59b4b3940152988ef09443df596bad9525f697fad61507e856c6acb744cfb034863943e811bd378843ccbd95f8221a444f4c323a391f5788559f34ac02e6e18065b87e8c962353623250694e5b4bf9bc1b00fadf2875995067ff6c18590c207f9a83f06665f5b5af77b4e"}, {0xa0, 0x10f, 0x5, "07c5972c79a30903d5d93f57c962c0351628551f6a3fbac8e18984ad9b8caeb403f1d588fa0b9955ce44d018cbcc06ad98b588dd45fd0ccd6b8d1965e70693ec76dd521aa2693829ef54059dc3191f2f4eca64c63f2f901ead2d6c54f0119212ebb77e956117d9130d3adff30a5598567fd540cf0a8f9f8c469ad15f209ad8ef161006831b39e4ddf2fcd748a8629e33"}], 0x210, 0x40}, 0x40) close(r0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)) recvmsg(r2, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) recvmsg$kcm(r4, &(0x7f0000001a00)={0x0, 0x0, &(0x7f00000018c0)=[{&(0x7f0000001600)=""/173, 0xad}, {&(0x7f0000001040)=""/25, 0x19}, {&(0x7f00000016c0)=""/132, 0x84}, {&(0x7f0000001780)=""/91, 0x5b}, {&(0x7f0000001800)=""/183, 0xb7}], 0x5, &(0x7f0000001940)=""/163, 0xa3, 0xe43}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000a80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r5}, 0x48) 2018/03/29 11:56:16 executing program 0: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000001a00)) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000001a40)={0xffffffffffffffff}) recvmsg$kcm(r1, &(0x7f0000000540)={&(0x7f00000000c0)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @broadcast}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000240)=""/65, 0x41}], 0x1, &(0x7f0000000440)=""/213, 0xd5}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x8983, &(0x7f0000000040)) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000080)) recvmsg$kcm(r2, &(0x7f0000000640)={&(0x7f0000000180)=@nfc_llcp, 0x80, &(0x7f0000000400)=[{&(0x7f0000000000)=""/41, 0x29}, {&(0x7f0000000200)=""/27, 0x1b}, {&(0x7f00000002c0)=""/210, 0xd2}], 0x3, &(0x7f0000000580)=""/134, 0x86, 0x9}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000019c0)={0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000000140)="0253eea6a53cc0eae389e9a13e5f2046d0633eebde90f446c1b1eabbd0adb42dfcefb37a3df93feb3d5e76dc353ecf23fe9c81afa5", 0x35}, {&(0x7f00000002c0)}, {&(0x7f0000000400)}, {&(0x7f0000001600)}], 0x4, &(0x7f0000001700)=ANY=[@ANYBLOB="680000000000000007010000c17d042575ac4c61e23de4040000000000000034cee2d9497c58eba5bd8a228407fb709d70f16afa73f4924f12ecc429f7ffffffffffffffee5f5685ce027fe4e6c60a8f88cd1a58d00099f5849f09bd37f681e29814e6bb00000000100000000000000000000000ff01000010000000000000000701000001000080"], 0x88}, 0x48800) [ 821.868931] net/sunrpc/rpc_pipe.c: __rpc_create_common failed to allocate inode for dentry cache [ 821.883831] net/sunrpc/rpc_pipe.c: rpc_populate failed to populate directory / 2018/03/29 11:56:16 executing program 4 (fault-call:8 fault-nth:54): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x3, &(0x7f0000002000)=@framed={{0x18}, [], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000680)={0xffffffffffffffff, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x7}, 0x28) recvmsg(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000001c0)) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000100)=r0, 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) recvmsg(r3, &(0x7f00000011c0)={&(0x7f0000000b40)=@can, 0x80, &(0x7f0000001100)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f0000000c80)=""/169, 0xa9}, {&(0x7f0000000d40)=""/229, 0xe5}, {&(0x7f0000000e40)=""/128, 0x80}, {&(0x7f0000000ec0)=""/48, 0x30}, {&(0x7f0000000f00)=""/137, 0x89}, {&(0x7f0000006000)=""/4096, 0x1000}, {&(0x7f0000007000)=""/4096, 0x1000}, {&(0x7f0000001080)=""/127, 0x7f}, {&(0x7f0000008000)=""/4096, 0x1000}], 0xa, 0x0, 0x0, 0x1}, 0x2020) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001200)={0x7, 0x4, 0x0, 0x4, 0x8, 0xffffffffffffffff, 0x9}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x1000000007, 0xcf2e, 0x7e, 0x20, 0x15, r1, 0x4}, 0x2c) socketpair(0x3, 0x80e, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r4, &(0x7f0000000200)={&(0x7f0000000fc0)=@pppol2tp={0x18, 0x1, {0x0, r3, {0x2, 0x4e20, @broadcast=0xffffffff}, 0x1, 0x3, 0x0, 0x2}}, 0x80, &(0x7f0000001580)=[{&(0x7f0000001240)="95c4dcff0f017b3c1979888e50f6c20a37b4edaffb28a3b609d24a8180434ab2fac426d3e4fc87e18267002be3cd56b11d69c4db739bf6a9c91af67ee87be1ea522993a368bdfc0df55539a60ef5515b4f03f3dbddae65cd66a90f030118870b473f156cb9a18624103000608c63f84b09ea89bfb8d8e7705c6ef456ef28adec5e566632ddd63098", 0x88}, {&(0x7f0000001380)="5745869bf3b6f562576761d821af2ad55c2f81345c810d6dbd43facd33c5107488aa7f04c5ab1302b820cd31405e9f657776a0d48e2225f39aabc3de0b30dc7422503b448ad89c23ebaee24ae9696e4e58eccae5febf47fff53dc1f03d869303acdef233746263c5c567e84edb166010fd23f56d6e84406bced5a00b5016b0c700fd76218ecf5da3527552a683eb87aa4b246cd74bcbeff8dedec74332e0214e4dc64cb7ac24c4447843caa7550375ef8e1f74a78c40a617e913a25e4837d24fb09e93eaa2", 0xc5}, {&(0x7f0000001480)="8247f46d4324760570d5078149dc5b38f7d1c592564148ecc6262e91c29cd4344e423ff476882993a2844af9a7c306a15e659a4cb9230b5139842c87ad8fa95c202146730fa610b141dfe4c7b771b46e4db879d2b92a01cb8642100d80a1d4658fd0df05c06c8615960a92b690c728e2603373657a9a46b2f200f2895198694d470ab95b6eb7a76ccee67c9219b4afa289d70c87cf22c733e00700f345136d59bcbd89ce7e110746f91e7a7661b8eb0afe54e3cb1c712441dd9a6ffb59a2eb58e5f5eabd4bec428fe27a403bb0d19125e473abdfea87a0c89108e3c876438a7c3f84bebad6cf858f26d2083efd60", 0xee}], 0x3, &(0x7f000000a000)=[{0x88, 0x112, 0xc2, "6671b4b66ac2fb4e14cee671813dc3834802e601529feb049ebb70880567948953018cfd53d7b1c9be27b1084adfba62040c7f889cfbc15407d93133259d9d5052bf6648a69218702e35278939ad399dc3ebed233c1792c7c1204353c8fe75ea0398f4aaf830834bc93873c119dddc539c"}, {0xe8, 0x6f180cc1befb202, 0x9, "4577f77fd3b3acd92c96feff8b0409afeae1c16fa3d367241c9679e5105141c7205d47ce27a418c10fbe7f601c3142e7b7b3a67322c9d345e0baf4315e13dc771a962ff445015c98a70b319d46ba59155d1cf07827804ea1ca86db74f3029bd60f6f365d955ec12be30102e59b4b3940152988ef09443df596bad9525f697fad61507e856c6acb744cfb034863943e811bd378843ccbd95f8221a444f4c323a391f5788559f34ac02e6e18065b87e8c962353623250694e5b4bf9bc1b00fadf2875995067ff6c18590c207f9a83f06665f5b5af77b4e"}, {0xa0, 0x10f, 0x5, "07c5972c79a30903d5d93f57c962c0351628551f6a3fbac8e18984ad9b8caeb403f1d588fa0b9955ce44d018cbcc06ad98b588dd45fd0ccd6b8d1965e70693ec76dd521aa2693829ef54059dc3191f2f4eca64c63f2f901ead2d6c54f0119212ebb77e956117d9130d3adff30a5598567fd540cf0a8f9f8c469ad15f209ad8ef161006831b39e4ddf2fcd748a8629e33"}], 0x210, 0x40}, 0x40) close(r0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b53596090ebcc07d8584f358be88fafe") recvmsg(r2, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) recvmsg$kcm(r4, &(0x7f0000001a00)={0x0, 0x0, &(0x7f00000018c0)=[{&(0x7f0000001600)=""/173, 0xad}, {&(0x7f0000001040)=""/25, 0x19}, {&(0x7f00000016c0)=""/132, 0x84}, {&(0x7f0000001780)=""/91, 0x5b}, {&(0x7f0000001800)=""/183, 0xb7}], 0x5, &(0x7f0000001940)=""/163, 0xa3, 0xe43}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000a80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r5}, 0x48) 2018/03/29 11:56:16 executing program 3: r0 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x10}, 0x10) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000000c0)={0x0, 0x1000, 0x8}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000080)='./file0\x00', r1}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0x0, 0x8}, 0x10) mount(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='cpuset\x00', 0x40, &(0x7f0000000280)="8a4562cb6a7df38be32246afcaef1e1a3f933cb428242c55c117c0fbbd62cea0aab31f2665fb88267466eca314fc8cafd72cc24143121c0691236768fad66390bf9b55014c2bd49faa5388cbabd52e730eeb4ccc411bacd296e423d971043756cf2b35a4063f2a7465b44a60ef31ae437f6160ed2f63afa62c36a27c33e4779e7c0404e337abc025bb2e4b39cc265573c6ab1a3ff09c7ad6bb4631a4") mount(&(0x7f0000000340)='./file1\x00', &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='devtmpfs\x00', 0x40, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xb, 0x7f, 0x0, 0x1, 0x12, r1, 0x100000000}, 0x2c) mkdir(&(0x7f0000000440)='./file1\x00', 0x20) mount(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='iso9660\x00', 0x8, &(0x7f0000000540)="650fe6ccea2b17860de967406c566ec16fe5a7a4c064707e22906e9d3d2a70b4") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000005c0)={r2, 0x28, &(0x7f0000000580)={0x0, 0x0}}, 0x10) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={r3, 0x8, 0x10}, 0xc) mount(&(0x7f0000000640)='./file1\x00', &(0x7f0000000680)='./file1\x00', &(0x7f00000006c0)='pstore\x00', 0x1000000, &(0x7f0000000700)="f48afa3ab3cc319f917be52b04c388c229578537782bc5ffc32c7747b1d28999ad89f5fba460640a324385ac03cccef4553d641b91d79d014804a98e72796f8eb2e1a7056efeaa63404648df67079ae817420f248ccf9d01e7a027c600c71777fb9ebc97da60f3d1a287ef8bc00f1dc68c3b1f0c1836cde5b62be45dd58c3415cbb0f916fe3c04fc69911e2bec15c208d023bdb608fa727657c532bd5101a2a36b34c4eb65f855fea2d6f8a0a79b15ecef1a4c81a8f6f5ed57b09db2ab482413540416126718f2a33ed21346ded20b084a8dc10702ec279fc486b5c57c163d") socketpair(0x3, 0x2, 0x1f, &(0x7f0000001c40)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$kcm(r6, &(0x7f0000004300)={0x0, 0x0, &(0x7f0000004140)=[{&(0x7f0000001c80)=""/139, 0x8b}, {&(0x7f0000001d40)=""/149, 0x95}, {&(0x7f0000001e00)=""/188, 0xbc}, {&(0x7f0000001ec0)=""/69, 0x45}, {&(0x7f0000001f40)=""/165, 0xa5}, {&(0x7f0000002000)=""/4096, 0x1000}, {&(0x7f0000003000)=""/42, 0x2a}, {&(0x7f0000003040)=""/4096, 0x1000}, {&(0x7f0000004040)=""/233, 0xe9}], 0x9, &(0x7f0000004200)=""/236, 0xec, 0xe00}, 0x40) mount(&(0x7f0000004340)='./file1/file0\x00', &(0x7f0000004380)='./file1\x00', &(0x7f00000043c0)='ceph\x00', 0x4860, &(0x7f0000004400)="2c8eb517dd302be26597065442d58f3f345c295b542b2b1df3046ae176") bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000004600)={r6, &(0x7f0000004440)="903685b47b9c4d5c1dffcefa6a92cd57ccdfaf1af0be272f1cb4a5b86ab9d1ef248a63f04f5d59c2cd6e6b7722f5ff866c5d353014f28baaa95bce06a787a3e085102126a0386ffd4e136d472f2cdfb7c658643d2792b7235e2ec8c782080850c20eb00014eab035d7d56c8ddd0d7fdc4c21602d480e4accea0867cc5b4172b46b8f028bd623c58544092396dbda704543cd7c93219ff7f4caf9d0c12fc32c65ddac48ba22321d2c7ef1152f0dd87ed22cb30eb2b24d381b3abaefc114ad4c08e329cfbce60e0549ca", &(0x7f0000004540)="38859653237c5c9685cf2e44e1eea64846e190b778f29b06c26c2f2b8a0800f9fc2019b05290fc5c82f612eb7f479918015eb3af93cc57f01db731e129275ce05910f66e436ef09a8fe7bf22f960eacec350a7f7e9e9a47cb163f467b6a29523346a4c61d65d2235c73095a53929d509538f640424133cfa3617b41a51aa7172460146433abbe604f2c92827fabd5d3134d36b4cecd0fd2549f3527615f9eb63dd9332021e4eff13ad6aa509db21ed98745d00cb36e547", 0x3}, 0x20) mkdir(&(0x7f0000004640)='./file1/file0\x00', 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000004680)={0x0, 0x0, 0xa6, 0x3, 0x4}, 0x2c) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000046c0)=0x7, 0x4) recvmsg$kcm(r6, &(0x7f00000058c0)={&(0x7f0000004700)=@alg, 0x80, &(0x7f0000005880)=[{&(0x7f0000004780)=""/4096, 0x1000}, {&(0x7f0000005780)=""/219, 0xdb}], 0x2, 0x0, 0x0, 0x100000001}, 0x40000000) r7 = gettid() r8 = perf_event_open(&(0x7f0000005900)={0x7, 0x70, 0x0, 0xfffffffffffffff7, 0x9, 0x4, 0x0, 0x7, 0x100, 0x8, 0x100000000, 0x8000, 0x8, 0x6, 0x0, 0x6, 0x10001, 0x9, 0x1f, 0x2, 0x1, 0x3, 0x1, 0x1f, 0x23, 0x1, 0xaa4, 0x5, 0x4, 0x200, 0x6, 0x9, 0xfffffffffffffffb, 0x3, 0x3, 0xff, 0x80000000, 0x0, 0x0, 0xffffffffffffff9d, 0x2, @perf_config_ext={0x7, 0x9}, 0x100, 0x8, 0x2, 0x6, 0x4, 0x6, 0xf71}, r7, 0x9, r6, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f00000059c0)={&(0x7f0000005980)='./file0\x00'}, 0x10) ioctl$sock_kcm_SIOCKCMATTACH(r5, 0x89e0, &(0x7f0000005a00)={r5, r0}) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000005c00)={r4, &(0x7f0000005a40)="313befc1e9ac680c4369983530ee783c4f018c38e134b4b0aebd06ede05f238850949c0f5d32ab19889f880e87e3a0fa5a43500affdcc508d56f3a4df6c159ca9cfa62124b79b4607d42738dc5e16d09ea2c6a2346fc2360feff08d9f464dfdebce2cb99d4ba8e5fc37edfba041f14e16a68192d7d8687404ee7318323520188c4e5d52e8c7ec40bd0823fb210e530c74ea842bd8bacbc48317b0b6ed12528ecd30e1af83b8049df791ff7affe91ab54", &(0x7f0000005b00)=""/243}, 0x18) mount(&(0x7f0000005c40)='./file1/file0\x00', &(0x7f0000005c80)='./file1\x00', &(0x7f0000005cc0)='btrfs\x00', 0x0, 0x0) recvmsg(r5, &(0x7f00000073c0)={&(0x7f0000005d00)=@sco, 0x80, &(0x7f0000007300)=[{&(0x7f0000005d80)=""/103, 0x67}, {&(0x7f0000005e00)=""/170, 0xaa}, {&(0x7f0000005ec0)=""/252, 0xfc}, {&(0x7f0000005fc0)=""/136, 0x88}, {&(0x7f0000006080)=""/125, 0x7d}, {&(0x7f0000006100)=""/4096, 0x1000}, {&(0x7f0000007100)=""/106, 0x6a}, {&(0x7f0000007180)=""/115, 0x73}, {&(0x7f0000007200)=""/240, 0xf0}], 0x9, 0x0, 0x0, 0x7}, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000007400)={r3, 0x10001, 0x18}, 0xc) ioctl$PERF_EVENT_IOC_REFRESH(r8, 0x2402, 0xc4c) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008880)={&(0x7f0000007440)=@l2, 0x80, &(0x7f0000008800)=[{&(0x7f00000074c0)=""/231, 0xe7}, {&(0x7f00000075c0)=""/118, 0x76}, {&(0x7f0000007640)=""/4096, 0x1000}, {&(0x7f0000008640)=""/223, 0xdf}, {&(0x7f0000008740)}, {&(0x7f0000008780)=""/32, 0x20}, {&(0x7f00000087c0)=""/53, 0x35}], 0x7}, 0x10000) 2018/03/29 11:56:16 executing program 0: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000001a00)) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000001a40)={0xffffffffffffffff}) recvmsg$kcm(r1, &(0x7f0000000540)={&(0x7f00000000c0)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @broadcast}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000240)=""/65, 0x41}], 0x1, &(0x7f0000000440)=""/213, 0xd5}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x8983, &(0x7f0000000040)) socketpair$inet_sctp(0x2, 0x800000000000005, 0x84, &(0x7f0000000000)) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000019c0)={0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000000140)="0253eea6a53cc0eae389e9a13e5f2046d0633eebde90f446c1b1eabbd0adb42dfcefb37a3df93feb3d5e76dc353ecf23fe9c81afa5", 0x35}, {&(0x7f00000002c0)}, {&(0x7f0000000400)}, {&(0x7f0000001600)}], 0x4, &(0x7f0000001700)=ANY=[@ANYBLOB="680000000000000007010000c17d0425755cd1e9e23de47cb15819d813deb534cee2d9497c58eba5bd8a228407fb709d70f16afa73f4924f12ecc429b6fd356748940b62ee5f5685ce02c60a8f88cd1a5827d0416c99f5849f09bd37f681e29814e6bb00000000100000000000000000000000ff0100001000000000000000070100000100008000"], 0x88}, 0x48800) 2018/03/29 11:56:16 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x1e1, 0x100000000209e20, 0x8000000001, 0x5}, 0xfffffffffffffe20) r0 = getpid() r1 = perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0xfffffffffffffffc, 0x3, 0x8, 0x2, 0x0, 0x9, 0x10000, 0xc, 0x3d3, 0x80, 0x5, 0xfffffffffffffffc, 0x8, 0x3f, 0x5d, 0xbbb0, 0x20, 0x3, 0x8000, 0x100000000, 0x8, 0x9, 0x2, 0x4, 0x800, 0xf8, 0x3, 0x9, 0x1, 0x3, 0x8, 0x3, 0x7, 0x10001, 0xf16, 0x2, 0x0, 0x7fffffff, 0x4, @perf_bp={&(0x7f0000000780), 0x1}, 0x4080, 0x10001, 0xcc, 0x7, 0x3, 0xffff, 0x7fffffff}, 0xffffffffffffffff, 0xd, 0xffffffffffffff9c, 0x8) perf_event_open(&(0x7f0000000980)={0x4, 0x70, 0x6, 0x3f, 0x8e, 0x1, 0x0, 0x3, 0x404, 0x0, 0xbc2b, 0x40, 0x7, 0xffff, 0xffff, 0x9, 0x9de2, 0x9, 0x0, 0x3, 0x7f, 0xff, 0x40, 0x400, 0x9, 0x7fffffff, 0x80000000, 0x7, 0x8, 0x10001, 0x1f, 0x2778, 0x800, 0x8001, 0x101, 0x9, 0x8, 0x7ff, 0x0, 0x1000, 0x5, @perf_config_ext={0x3ff, 0xb69b}, 0x3040, 0x2, 0x2, 0x5, 0x7, 0x6, 0x7283ed73}, r0, 0xe, r1, 0x8) bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x0, 0x0, 0x7ffff9, 0x0, 0x20000003, 0x0}, 0x2c) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) r2 = gettid() r3 = perf_event_open(&(0x7f00000008c0)={0x7, 0x70, 0x1, 0x200, 0x3, 0xdbce, 0x0, 0x8, 0x1002, 0x1, 0xffffffffffffff00, 0x8, 0x1, 0xb3fa, 0x8, 0x0, 0x1, 0x2, 0x1000, 0x2, 0x401, 0x8, 0x3, 0x81, 0x0, 0x7, 0x2fc4, 0x882, 0x4, 0x8, 0x3, 0x81, 0x3, 0x7, 0x8857, 0x7, 0x5, 0x9, 0x0, 0x7, 0x1, @perf_config_ext={0x0, 0x80000000}, 0x400, 0x7f, 0x4, 0x7, 0x2, 0x7f, 0x200}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000840)={0x5, 0x70, 0xef, 0x2, 0x1000, 0xffffffff80000000, 0x0, 0x1a7800000000, 0x2000, 0x4, 0x5, 0x6814, 0x3a9, 0x5, 0x63b, 0x6, 0x8, 0x1000, 0x250420ee, 0x3, 0x0, 0x20, 0x6, 0x0, 0x4, 0x5, 0x4, 0x8, 0x3, 0x8, 0x52893dd5, 0x2, 0x2, 0x8, 0x44d, 0x1, 0x8, 0x6, 0x0, 0x100000000, 0x0, @perf_config_ext={0x9, 0x80}, 0x0, 0x0, 0x2b67, 0x6, 0x4b0, 0x81, 0x4}, r2, 0x5, r3, 0xb) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1003, 0x0) mount(&(0x7f00002b9ff8)='./file0\x00', &(0x7f0000cbeff8)='./file0\x00', &(0x7f00005f7ffa)='ramfs\x00', 0x80000, &(0x7f000002f000)) mount(&(0x7f0000000000)='.', &(0x7f0000000040)='.', &(0x7f0000000080)='cgroup\x00', 0x5010, &(0x7f00000000c0)) mount(&(0x7f0000377ff8)='.', &(0x7f0000000280)='.', &(0x7f0000000600)='nfs4\x00', 0x5010, &(0x7f0000000300)="2161893416a0c71070768c219eb114c3253c9f3baf4e9e8e9111c1a7fc6e266009fe27243deeaa22ca7ae9341f714300b5ee807e55d609036f2a3260475922bdfb2d2849f1c3b2ad3c051bd4f3751a177f77a92758c6d2b23fe7f1535b54e5846d11c135de8286066dec1b25f6e1378944ac5f7fce42d055821b5e19") perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xd68, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f0000014f88)={0x5, 0xfffffffffffffdc4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x46000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = getpid() perf_event_open(&(0x7f0000000680)={0x4, 0x70, 0x64, 0xffff, 0x1f, 0x4, 0x0, 0x1c3, 0x0, 0x1, 0x1, 0x9, 0x1ff, 0xfffffffffffffff8, 0x0, 0x0, 0x6, 0x7fffffff, 0x4, 0xffffffff, 0x80000001, 0xd0, 0x7, 0x1f, 0x0, 0x8, 0x9, 0x1ff, 0x8, 0x785, 0x4, 0xff, 0x2, 0x656, 0x5000000, 0x1, 0x460e3be0, 0x1, 0x0, 0x0, 0x7, @perf_bp={&(0x7f0000000640), 0x1}, 0x1000, 0xa, 0x7fff, 0x7, 0x3, 0x400, 0x9}, r5, 0xe, r4, 0x1) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', 0x0, 0x10}, 0x10) close(0xffffffffffffffff) bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)={&(0x7f0000000040)='./file0\x00', 0x0, 0x18}, 0x10) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000100)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0, 0x2e, &(0x7f0000000440), &(0x7f0000000140)=""/46, 0x4229}, 0x28) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000003480)={&(0x7f0000003300)=@can={0x0, 0x0}, 0x80, &(0x7f0000003400)=[{&(0x7f0000003380)=""/56, 0x38}, {&(0x7f00000033c0)=""/1, 0x1}], 0x2, &(0x7f0000003440)=""/33, 0x21, 0x1}, 0x40010000) bpf$PROG_LOAD(0x5, &(0x7f00000034c0)={0xe, 0x6, &(0x7f0000000940)=ANY=[@ANYBLOB="1800000002000000000000004ce700002555fdff00000000002371d07c9ba7f4a23372b0ad61000000000000009500000000000000"], &(0x7f00000007c0)='GPL\x00', 0x3, 0x2d, &(0x7f0000000800)=""/45, 0x0, 0x1, [], r6}, 0x48) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000740)={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x10) socketpair$inet(0x2, 0x80a, 0x81, &(0x7f0000000240)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={0xffffffffffffffff, &(0x7f0000000500)="ae30f1bca1b4d3f69f1aac81517d42ad5980bc63b5008616a1f4724b9f8c1e4ecd8de336f57dd727cdaab04f0b40f28612615ad08de414711d841a88db33fd33884b627074213a0c5de3be2bbaec9207d9865c47f240467849979b5ab5632376608fc4be41a274abb2dc07cabe344a18db51048e5b0cbda843905a4258cdee3e649eddf104ba78894dce09747dcfe6a8d6d6d985520eeef448b83a8bcb83074541ba7a20d6094aa206c01a0690e5b3bfa05d475eb382b0199031d22bb26cde9b1ca0055eef9f6c4993b71ba19ba0590bb5efdaddaa574c25356ca890d138fc9fe0e975b6d5a1a8251503cd0a91845f9d95", &(0x7f0000000480)="9bc7741ea5e524cc8c6f748a73153834428729c45bf4ad446d2dddf1978baf431d0ba35b5442b5afe22db8b003650320200af7e1368ef7cdfa79ca8b9d3564363a5d2a502970314f2264c883bc8d990afc003e5adb95b30edad245c4420c8126f1d33db75ff0230698eaff90055e0f", 0x2}, 0x20) socketpair(0x0, 0x80003, 0xffff, &(0x7f0000000380)={0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r7, 0x50, &(0x7f00000003c0)}, 0x10) 2018/03/29 11:56:16 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x1e1, 0x100000000209e20, 0x8000000001}, 0xfffffffffffffe20) r0 = getpid() r1 = perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0xfffffffffffffffc, 0x3, 0x8, 0x2, 0x0, 0x9, 0x10000, 0xc, 0x3d3, 0x80, 0x5, 0xfffffffffffffffc, 0x8, 0x3f, 0x5d, 0xbbb0, 0x20, 0x3, 0x8000, 0x100000000, 0x8, 0x9, 0x2, 0x4, 0x800, 0xf8, 0x3, 0x9, 0x1, 0x3, 0x8, 0x3, 0x7, 0x10001, 0xf16, 0x2, 0x0, 0x7fffffff, 0x4, @perf_bp={&(0x7f0000000780), 0x1}, 0x4080, 0x10001, 0xcc, 0x7, 0x3, 0xffff, 0x7fffffff}, 0xffffffffffffffff, 0xd, 0xffffffffffffff9c, 0x8) perf_event_open(&(0x7f0000000980)={0x4, 0x70, 0x6, 0x3f, 0x8e, 0x1, 0x0, 0x3, 0x404, 0x0, 0xbc2b, 0x40, 0x7, 0xffff, 0xffff, 0x9, 0x9de2, 0x9, 0x0, 0x3, 0x7f, 0xff, 0x40, 0x400, 0x9, 0x7fffffff, 0x80000000, 0x7, 0x8, 0x10001, 0x1f, 0x2778, 0x800, 0x8001, 0x101, 0x9, 0x8, 0x7ff, 0x0, 0x1000, 0x5, @perf_config_ext={0x3ff, 0xb69b}, 0x3040, 0x2, 0x2, 0x5, 0x7, 0x6, 0x7283ed73}, r0, 0xe, r1, 0x8) bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x0, 0x0, 0x7ffff9, 0x0, 0x20000003, 0x0}, 0x2c) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) r2 = gettid() r3 = perf_event_open(&(0x7f00000008c0)={0x7, 0x70, 0x1, 0x200, 0x3, 0xdbce, 0x0, 0x8, 0x1002, 0x1, 0xffffffffffffff00, 0x8, 0x1, 0xb3fa, 0x8, 0x0, 0x1, 0x2, 0x1000, 0x2, 0x401, 0x8, 0x3, 0x81, 0x0, 0x7, 0x2fc4, 0x882, 0x4, 0x8, 0x3, 0x81, 0x3, 0x7, 0x8857, 0x7, 0x5, 0x9, 0x0, 0x7, 0x1, @perf_config_ext={0x0, 0x80000000}, 0x400, 0x7f, 0x4, 0x7, 0x2, 0x7f, 0x200}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000840)={0x5, 0x70, 0xef, 0x2, 0x1000, 0xffffffff80000000, 0x0, 0x1a7800000000, 0x2000, 0x4, 0x5, 0x6814, 0x3a9, 0x5, 0x63b, 0x6, 0x8, 0x1000, 0x250420ee, 0x3, 0x0, 0x20, 0x6, 0x0, 0x4, 0x5, 0x4, 0x8, 0x3, 0x8, 0x52893dd5, 0x2, 0x2, 0x8, 0x44d, 0x1, 0x8, 0x6, 0x0, 0x100000000, 0x0, @perf_config_ext={0x9, 0x80}, 0x0, 0x0, 0x2b67, 0x6, 0x4b0, 0x81, 0x4}, r2, 0x5, r3, 0xb) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1003, 0x0) mount(&(0x7f00002b9ff8)='./file0\x00', &(0x7f0000cbeff8)='./file0\x00', &(0x7f00005f7ffa)='ramfs\x00', 0x80000, &(0x7f000002f000)) mount(&(0x7f0000000000)='.', &(0x7f0000000040)='.', &(0x7f0000000080)='cgroup\x00', 0x5010, &(0x7f00000000c0)) mount(&(0x7f0000377ff8)='.', &(0x7f0000000280)='.', &(0x7f0000000600)='nfs4\x00', 0x5010, &(0x7f0000000300)="2161893416a0c71070768c219eb114c3253c9f3baf4e9e8e9111c1a7fc6e266009fe27243deeaa22ca7ae9341f714300b5ee807e55d609036f2a3260475922bdfb2d2849f1c3b2ad3c051bd4f3751a177f77a92758c6d2b23fe7f1535b54e5846d11c135de8286066dec1b25f6e1378944ac5f7fce42d055821b5e19") perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xd68, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f0000014f88)={0x5, 0xfffffffffffffdc4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x46000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = getpid() perf_event_open(&(0x7f0000000680)={0x4, 0x70, 0x64, 0xffff, 0x1f, 0x4, 0x0, 0x1c3, 0x0, 0x1, 0x1, 0x9, 0x1ff, 0xfffffffffffffff8, 0x0, 0x0, 0x6, 0x7fffffff, 0x0, 0xffffffff, 0x80000001, 0xd0, 0x7, 0x1f, 0x0, 0x8, 0x9, 0x1ff, 0x8, 0x785, 0x4, 0xff, 0x2, 0x656, 0x5000000, 0x1, 0x460e3be0, 0x1, 0x0, 0x0, 0x7, @perf_bp={&(0x7f0000000640), 0x1}, 0x1000, 0xa, 0x7fff, 0x7, 0x3, 0x400, 0x9}, r5, 0xe, r4, 0x1) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', 0x0, 0x10}, 0x10) close(0xffffffffffffffff) bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)={&(0x7f0000000040)='./file0\x00', 0x0, 0x18}, 0x10) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000100)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0, 0x2e, &(0x7f0000000440), &(0x7f0000000140)=""/46, 0x4229}, 0x28) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000003480)={&(0x7f0000003300)=@can={0x0, 0x0}, 0x80, &(0x7f0000003400)=[{&(0x7f0000003380)=""/56, 0x38}, {&(0x7f00000033c0)=""/1, 0x1}], 0x2, &(0x7f0000003440)=""/33, 0x21, 0x1}, 0x40010000) bpf$PROG_LOAD(0x5, &(0x7f00000034c0)={0xe, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="1800000002000000000000004ce700002555fdff00000000002371d07c9ba7f4a23372b0ad61000000000000009500000000000000"], &(0x7f00000007c0)='GPL\x00', 0x3, 0x2d, &(0x7f0000000800)=""/45, 0x40f00, 0x1, [], r6}, 0x48) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000740)={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x10) socketpair$inet(0x2, 0x80a, 0x81, &(0x7f0000000240)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={0xffffffffffffffff, &(0x7f0000000500)="ae30f1bca1b4d3f69f1aac81517d42ad5980bc63b5008616a1f4724b9f8c1e4ecd8de336f57dd727cdaab04f0b40f28612615ad08de414711d841a88db33fd33884b627074213a0c5de3be2bbaec9207d9865c47f240467849979b5ab5632376608fc4be41a274abb2dc07cabe344a18db51048e5b0cbda843905a4258cdee3e649eddf104ba78894dce09747dcfe6a8d6d6d985520eeef448b83a8bcb83074541ba7a20d6094aa206c01a0690e5b3bfa05d475eb382b0199031d22bb26cde9b1ca0055eef9f6c4993b71ba19ba0590bb5efdaddaa574c25356ca890d138fc9fe0e975b6d5a1a8251503cd0a91845f9d95", &(0x7f0000000480)="9bc7741ea5e524cc8c6f748a73153834428729c45bf4ad446d2dddf1978baf431d0ba35b5442b5afe22db8b003650320200af7e1368ef7cdfa79ca8b9d3564363a5d2a502970314f2264c883bc8d990afc003e5adb95b30edad245c4420c8126f1d33db75ff0230698eaff90055e0f", 0x2}, 0x20) socketpair(0x0, 0x80003, 0xffff, &(0x7f0000000380)={0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r7, 0x50, &(0x7f00000003c0)}, 0x10) 2018/03/29 11:56:16 executing program 0: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000001a00)) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000001a40)={0xffffffffffffffff}) recvmsg$kcm(r1, &(0x7f0000001640)={&(0x7f0000000180)=@l2, 0x80, &(0x7f0000001a80)=[{&(0x7f0000000000)=""/32, 0x20}, {&(0x7f0000000580)=""/4096, 0x1000}, {&(0x7f00000002c0)=""/234, 0xea}, {&(0x7f0000001580)=""/161, 0xa1}, {&(0x7f00000017c0)=""/217, 0xd9}, {&(0x7f00000018c0)=""/191, 0xbf}, {&(0x7f0000000200)=""/13, 0xd}], 0x7, &(0x7f0000000400)=""/11, 0xb, 0x8}, 0x0) recvmsg$kcm(r1, &(0x7f0000000540)={&(0x7f00000000c0)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @broadcast}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000240)=""/65, 0x41}], 0x1, &(0x7f0000000440)=""/213, 0xd5}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x8983, &(0x7f0000000040)) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000080)) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000019c0)={0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000000140)="0253eea6a53cc0eae389e9a13e5f2046d0633eebde90f446c1b1eabbd0adb42dfcefb37a3df93feb3d5e76dc353ecf23fe9c81afa5", 0x35}, {&(0x7f00000002c0)}, {&(0x7f0000000400)}, {&(0x7f0000001600)}], 0x4, &(0x7f0000001b00)=ANY=[@ANYBLOB="68000000000000000704000000020000005cd1e9e23de47cb15819d813deb534cee2d9497c58eba5bd8a228407fb709d70f16afa73f4924f12ecc429b6fd356748940b62ee5f5685ce027fe4e6c60a8f88cd1a5827d099f5849f0949a1d5904b8004cebb0200000010000000002000d07f389b155f3c6d13b6952e73ae61730000000000ff010000100000"], 0x88}, 0x48800) 2018/03/29 11:56:16 executing program 3: r0 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x10}, 0x10) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000000c0)={0x0, 0x1000, 0x8}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000080)='./file0\x00', r1}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0x0, 0x8}, 0x10) mount(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='cpuset\x00', 0x40, &(0x7f0000000280)="8a4562cb6a7df38be32246afcaef1e1a3f933cb428242c55c117c0fbbd62cea0aab31f2665fb88267466eca314fc8cafd72cc24143121c0691236768fad66390bf9b55014c2bd49faa5388cbabd52e730eeb4ccc411bacd296e423d971043756cf2b35a4063f2a7465b44a60ef31ae437f6160ed2f63afa62c36a27c33e4779e7c0404e337abc025bb2e4b39cc265573c6ab1a3ff09c7ad6bb4631a4") mount(&(0x7f0000000340)='./file1\x00', &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='devtmpfs\x00', 0x40, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xb, 0x7f, 0x0, 0x1, 0x12, r1, 0x100000000}, 0x2c) mkdir(&(0x7f0000000440)='./file1\x00', 0x20) mount(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='iso9660\x00', 0x8, &(0x7f0000000540)="650fe6ccea2b17860de967406c566ec16fe5a7a4c064707e22906e9d3d2a70b4") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000005c0)={r2, 0x28, &(0x7f0000000580)={0x0, 0x0}}, 0x10) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={r3, 0x8, 0x10}, 0xc) mount(&(0x7f0000000640)='./file1\x00', &(0x7f0000000680)='./file1\x00', &(0x7f00000006c0)='pstore\x00', 0x1000000, &(0x7f0000000700)="f48afa3ab3cc319f917be52b04c388c229578537782bc5ffc32c7747b1d28999ad89f5fba460640a324385ac03cccef4553d641b91d79d014804a98e72796f8eb2e1a7056efeaa63404648df67079ae817420f248ccf9d01e7a027c600c71777fb9ebc97da60f3d1a287ef8bc00f1dc68c3b1f0c1836cde5b62be45dd58c3415cbb0f916fe3c04fc69911e2bec15c208d023bdb608fa727657c532bd5101a2a36b34c4eb65f855fea2d6f8a0a79b15ecef1a4c81a8f6f5ed57b09db2ab482413540416126718f2a33ed21346ded20b084a8dc10702ec279fc486b5c57c163d") socketpair(0x3, 0x2, 0x1f, &(0x7f0000001c40)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$kcm(r6, &(0x7f0000004300)={0x0, 0x0, &(0x7f0000004140)=[{&(0x7f0000001c80)=""/139, 0x8b}, {&(0x7f0000001d40)=""/149, 0x95}, {&(0x7f0000001e00)=""/188, 0xbc}, {&(0x7f0000001ec0)=""/69, 0x45}, {&(0x7f0000001f40)=""/165, 0xa5}, {&(0x7f0000002000)=""/4096, 0x1000}, {&(0x7f0000003000)=""/42, 0x2a}, {&(0x7f0000003040)=""/4096, 0x1000}, {&(0x7f0000004040)=""/233, 0xe9}], 0x9, &(0x7f0000004200)=""/236, 0xec, 0xe00}, 0x40) mount(&(0x7f0000004340)='./file1/file0\x00', &(0x7f0000004380)='./file1\x00', &(0x7f00000043c0)='ceph\x00', 0x4860, &(0x7f0000004400)="2c8eb517dd302be26597065442d58f3f345c295b542b2b1df3046ae176") bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000004600)={r6, &(0x7f0000004440)="903685b47b9c4d5c1dffcefa6a92cd57ccdfaf1af0be272f1cb4a5b86ab9d1ef248a63f04f5d59c2cd6e6b7722f5ff866c5d353014f28baaa95bce06a787a3e085102126a0386ffd4e136d472f2cdfb7c658643d2792b7235e2ec8c782080850c20eb00014eab035d7d56c8ddd0d7fdc4c21602d480e4accea0867cc5b4172b46b8f028bd623c58544092396dbda704543cd7c93219ff7f4caf9d0c12fc32c65ddac48ba22321d2c7ef1152f0dd87ed22cb30eb2b24d381b3abaefc114ad4c08e329cfbce60e0549ca", &(0x7f0000004540)="38859653237c5c9685cf2e44e1eea64846e190b778f29b06c26c2f2b8a0800f9fc2019b05290fc5c82f612eb7f479918015eb3af93cc57f01db731e129275ce05910f66e436ef09a8fe7bf22f960eacec350a7f7e9e9a47cb163f467b6a29523346a4c61d65d2235c73095a53929d509538f640424133cfa3617b41a51aa7172460146433abbe604f2c92827fabd5d3134d36b4cecd0fd2549f3527615f9eb63dd9332021e4eff13ad6aa509db21ed98745d00cb36e547", 0x3}, 0x20) mkdir(&(0x7f0000004640)='./file1/file0\x00', 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000004680)={0x0, 0x0, 0xa6, 0x3, 0x4}, 0x2c) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000046c0)=0x7, 0x4) recvmsg$kcm(r6, &(0x7f00000058c0)={&(0x7f0000004700)=@alg, 0x80, &(0x7f0000005880)=[{&(0x7f0000004780)=""/4096, 0x1000}, {&(0x7f0000005780)=""/219, 0xdb}], 0x2, 0x0, 0x0, 0x100000001}, 0x40000000) r7 = gettid() r8 = perf_event_open(&(0x7f0000005900)={0x7, 0x70, 0x0, 0xfffffffffffffff7, 0x9, 0x4, 0x0, 0x7, 0x100, 0x8, 0x100000000, 0x8000, 0x8, 0x6, 0x0, 0x6, 0x10001, 0x9, 0x1f, 0x2, 0x1, 0x3, 0x1, 0x1f, 0x23, 0x1, 0xaa4, 0x5, 0x4, 0x200, 0x6, 0x9, 0xfffffffffffffffb, 0x3, 0x3, 0xff, 0x80000000, 0x0, 0x0, 0xffffffffffffff9d, 0x2, @perf_config_ext={0x7, 0x9}, 0x100, 0x8, 0x2, 0x6, 0x4, 0x6, 0xf71}, r7, 0x9, r6, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f00000059c0)={&(0x7f0000005980)='./file0\x00'}, 0x10) ioctl$sock_kcm_SIOCKCMATTACH(r5, 0x89e0, &(0x7f0000005a00)={r5, r0}) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000005c00)={r4, &(0x7f0000005a40)="313befc1e9ac680c4369983530ee783c4f018c38e134b4b0aebd06ede05f238850949c0f5d32ab19889f880e87e3a0fa5a43500affdcc508d56f3a4df6c159ca9cfa62124b79b4607d42738dc5e16d09ea2c6a2346fc2360feff08d9f464dfdebce2cb99d4ba8e5fc37edfba041f14e16a68192d7d8687404ee7318323520188c4e5d52e8c7ec40bd0823fb210e530c74ea842bd8bacbc48317b0b6ed12528ecd30e1af83b8049df791ff7affe91ab54", &(0x7f0000005b00)=""/243}, 0x18) mount(&(0x7f0000005c40)='./file1/file0\x00', &(0x7f0000005c80)='./file1\x00', &(0x7f0000005cc0)='btrfs\x00', 0x0, 0x0) recvmsg(r5, &(0x7f00000073c0)={&(0x7f0000005d00)=@sco, 0x80, &(0x7f0000007300)=[{&(0x7f0000005d80)=""/103, 0x67}, {&(0x7f0000005e00)=""/170, 0xaa}, {&(0x7f0000005ec0)=""/252, 0xfc}, {&(0x7f0000005fc0)=""/136, 0x88}, {&(0x7f0000006080)=""/125, 0x7d}, {&(0x7f0000006100)=""/4096, 0x1000}, {&(0x7f0000007100)=""/106, 0x6a}, {&(0x7f0000007180)=""/115, 0x73}, {&(0x7f0000007200)=""/240, 0xf0}], 0x9, 0x0, 0x0, 0x7}, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000007400)={r3, 0x10001, 0x18}, 0xc) ioctl$PERF_EVENT_IOC_REFRESH(r8, 0x2402, 0xc4c) recvmsg$kcm(r6, &(0x7f0000008880)={&(0x7f0000007440)=@l2, 0x80, &(0x7f0000008800)=[{&(0x7f00000075c0)=""/118, 0x76}, {&(0x7f0000007640)=""/4096, 0x1000}, {&(0x7f0000008640)=""/223, 0xdf}, {&(0x7f0000008740)}, {&(0x7f0000008780)=""/32, 0x20}, {&(0x7f00000087c0)=""/53, 0x35}], 0x6}, 0x10000) 2018/03/29 11:56:16 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x1e1, 0x100000000209e20, 0x8000000001}, 0xfffffffffffffe20) r0 = getpid() r1 = perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0xfffffffffffffffc, 0x3, 0x8, 0x2, 0x0, 0x9, 0x10000, 0xc, 0x3d3, 0x80, 0x5, 0xfffffffffffffffc, 0x8, 0x3f, 0x5d, 0xbbb0, 0x20, 0x3, 0x8000, 0x100000000, 0x8, 0x9, 0x2, 0x4, 0x800, 0xf8, 0x3, 0x9, 0x1, 0x3, 0x8, 0x3, 0x7, 0x10001, 0xf16, 0x2, 0x0, 0x7fffffff, 0x4, @perf_bp={&(0x7f0000000780), 0x1}, 0x4080, 0x10001, 0xcc, 0x7, 0x3, 0xffff, 0x7fffffff}, 0xffffffffffffffff, 0xd, 0xffffffffffffff9c, 0x8) perf_event_open(&(0x7f0000000980)={0x4, 0x70, 0x6, 0x3f, 0x8e, 0x1, 0x0, 0x3, 0x404, 0x0, 0xbc2b, 0x40, 0x7, 0xffff, 0xffff, 0x9, 0x9de2, 0x9, 0x0, 0x3, 0x7f, 0xff, 0x40, 0x400, 0x9, 0x7fffffff, 0x80000000, 0x7, 0x8, 0x10001, 0x1f, 0x2778, 0x800, 0x8001, 0x101, 0x9, 0x8, 0x7ff, 0x0, 0x1000, 0x5, @perf_config_ext={0x3ff, 0xb69b}, 0x3040, 0x2, 0x2, 0x5, 0x7, 0x6, 0x7283ed73}, r0, 0xe, r1, 0x8) bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x0, 0x0, 0x7ffff9, 0x0, 0x20000003, 0x0}, 0x2c) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) r2 = gettid() r3 = perf_event_open(&(0x7f00000008c0)={0x7, 0x70, 0x1, 0x200, 0x3, 0xdbce, 0x0, 0x8, 0x1002, 0x1, 0xffffffffffffff00, 0x8, 0x1, 0xb3fa, 0x8, 0x0, 0x1, 0x2, 0x1000, 0x2, 0x401, 0x8, 0x3, 0x81, 0x0, 0x7, 0x2fc4, 0x882, 0x4, 0x8, 0x3, 0x81, 0x3, 0x7, 0x8857, 0x7, 0x5, 0x9, 0x0, 0x7, 0x1, @perf_config_ext={0x0, 0x80000000}, 0x400, 0x7f, 0x4, 0x7, 0x2, 0x7f, 0x200}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000840)={0x5, 0x70, 0xef, 0x2, 0x1000, 0xffffffff80000000, 0x0, 0x1a7800000000, 0x2000, 0x4, 0x5, 0x6814, 0x3a9, 0x5, 0x63b, 0x6, 0x8, 0x1000, 0x250420ee, 0x3, 0x0, 0x20, 0x6, 0x0, 0x4, 0x5, 0x4, 0x8, 0x3, 0x8, 0x52893dd5, 0x2, 0x2, 0x8, 0x44d, 0x1, 0x8, 0x6, 0x0, 0x100000000, 0x0, @perf_config_ext={0x9, 0x80}, 0x0, 0x0, 0x2b67, 0x6, 0x4b0, 0x81, 0x4}, r2, 0x5, r3, 0xb) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1003, 0x0) mount(&(0x7f00002b9ff8)='./file0\x00', &(0x7f0000cbeff8)='./file0\x00', &(0x7f00005f7ffa)='ramfs\x00', 0x80000, &(0x7f000002f000)) mount(&(0x7f0000000000)='.', &(0x7f0000000040)='.', &(0x7f0000000080)='cgroup\x00', 0x5010, &(0x7f00000000c0)) mount(&(0x7f0000377ff8)='.', &(0x7f0000000280)='.', &(0x7f0000000600)='nfs4\x00', 0x5010, &(0x7f0000000300)="2161893416a0c71070768c219eb114c3253c9f3baf4e9e8e9111c1a7fc6e266009fe27243deeaa22ca7ae9341f714300b5ee807e55d609036f2a3260475922bdfb2d2849f1c3b2ad3c051bd4f3751a177f77a92758c6d2b23fe7f1535b54e5846d11c135de8286066dec1b25f6e1378944ac5f7fce42d055821b5e19") perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xd68, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f0000014f88)={0x5, 0xfffffffffffffdc4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x46000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = getpid() perf_event_open(&(0x7f0000000680)={0x4, 0x70, 0x64, 0xffff, 0x1f, 0x4, 0x0, 0x1c3, 0x0, 0x1, 0x1, 0x9, 0x1ff, 0xfffffffffffffff8, 0x0, 0x0, 0x6, 0x7fffffff, 0x0, 0xffffffff, 0x80000001, 0xd0, 0x7, 0x1f, 0x0, 0x8, 0x9, 0x1ff, 0x8, 0x785, 0x4, 0xff, 0x2, 0x656, 0x5000000, 0x1, 0x460e3be0, 0x1, 0x0, 0x0, 0x7, @perf_bp={&(0x7f0000000640), 0x1}, 0x1000, 0xa, 0x7fff, 0x7, 0x3, 0x400, 0x9}, r5, 0xe, r4, 0x1) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', 0x0, 0x10}, 0x10) close(0xffffffffffffffff) bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)={&(0x7f0000000040)='./file0\x00', 0x0, 0x18}, 0x10) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000100)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0, 0x2e, &(0x7f0000000440), &(0x7f0000000140)=""/46, 0x4229}, 0x28) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000003480)={&(0x7f0000003300)=@can={0x0, 0x0}, 0x80, &(0x7f0000003400)=[{&(0x7f0000003380)=""/56, 0x38}, {&(0x7f00000033c0)=""/1, 0x1}], 0x2, &(0x7f0000003440)=""/33, 0x21, 0x1}, 0x40010000) bpf$PROG_LOAD(0x5, &(0x7f00000034c0)={0xe, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="1800000002000000000000004ce700002555fdff00000000002371d07c9ba7f4a23372b0ad61000000000000009500000000000000"], &(0x7f00000007c0)='GPL\x00', 0x3, 0x2d, &(0x7f0000000800)=""/45, 0x40f00, 0x1, [], r6}, 0x48) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000740)={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x10) socketpair$inet(0x2, 0x80a, 0x81, &(0x7f0000000240)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={0xffffffffffffffff, &(0x7f0000000500)="ae30f1bca1b4d3f69f1aac81517d42ad5980bc63b5008616a1f4724b9f8c1e4ecd8de336f57dd727cdaab04f0b40f28612615ad08de414711d841a88db33fd33884b627074213a0c5de3be2bbaec9207d9865c47f240467849979b5ab5632376608fc4be41a274abb2dc07cabe344a18db51048e5b0cbda843905a4258cdee3e649eddf104ba78894dce09747dcfe6a8d6d6d985520eeef448b83a8bcb83074541ba7a20d6094aa206c01a0690e5b3bfa05d475eb382b0199031d22bb26cde9b1ca0055eef9f6c4993b71ba19ba0590bb5efdaddaa574c25356ca890d138fc9fe0e975b6d5a1a8251503cd0a91845f9d95", &(0x7f0000000480)="9bc7741ea5e524cc8c6f748a73153834428729c45bf4ad446d2dddf1978baf431d0ba35b5442b5afe22db8b003650320200af7e1368ef7cdfa79ca8b9d3564363a5d2a502970314f2264c883bc8d990afc003e5adb95b30edad245c4420c8126f1d33db75ff0230698eaff90055e0f", 0x2}, 0x20) socketpair(0x0, 0x80003, 0xffff, &(0x7f0000000380)={0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r7, 0x50, &(0x7f00000003c0)}, 0x10) 2018/03/29 11:56:16 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x1e1, 0x100000000209e20, 0x8000000001, 0x5}, 0xfffffffffffffe20) r0 = getpid() r1 = perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0xfffffffffffffffc, 0x3, 0x8, 0x2, 0x0, 0x9, 0x10000, 0xc, 0x3d3, 0x80, 0x5, 0xfffffffffffffffc, 0x8, 0x3f, 0x5d, 0xbbb0, 0x20, 0x3, 0x8000, 0x100000000, 0x8, 0x9, 0x2, 0x4, 0x800, 0xf8, 0x3, 0x9, 0x1, 0x3, 0x8, 0x3, 0x7, 0x10001, 0xf16, 0x2, 0x0, 0x7fffffff, 0x4, @perf_bp={&(0x7f0000000780), 0x1}, 0x4080, 0x10001, 0xcc, 0x7, 0x3, 0xffff, 0x7fffffff}, 0xffffffffffffffff, 0xd, 0xffffffffffffff9c, 0x8) perf_event_open(&(0x7f0000000980)={0x4, 0x70, 0x6, 0x3f, 0x8e, 0x1, 0x0, 0x3, 0x404, 0x0, 0xbc2b, 0x40, 0x7, 0xffff, 0xffff, 0x9, 0x9de2, 0x9, 0x0, 0x3, 0x7f, 0xff, 0x40, 0x400, 0x9, 0x7fffffff, 0x80000000, 0x7, 0x8, 0x10001, 0x1f, 0x2778, 0x800, 0x8001, 0x101, 0x9, 0x8, 0x7ff, 0x0, 0x1000, 0x5, @perf_config_ext={0x3ff, 0xb69b}, 0x3040, 0x2, 0x2, 0x5, 0x7, 0x6, 0x7283ed73}, r0, 0xe, r1, 0x8) bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x0, 0x0, 0x7ffff9, 0x0, 0x20000003, 0x0}, 0x2c) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) r2 = gettid() r3 = perf_event_open(&(0x7f00000008c0)={0x7, 0x70, 0x1, 0x200, 0x3, 0xdbce, 0x0, 0x8, 0x1002, 0x1, 0xffffffffffffff00, 0x8, 0x1, 0xb3fa, 0x8, 0x0, 0x1, 0x2, 0x1000, 0x2, 0x401, 0x8, 0x3, 0x81, 0x0, 0x7, 0x2fc4, 0x882, 0x4, 0x8, 0x3, 0x81, 0x3, 0x7, 0x8857, 0x7, 0x5, 0x9, 0x0, 0x7, 0x1, @perf_config_ext={0x0, 0x80000000}, 0x400, 0x7f, 0x4, 0x7, 0x2, 0x7f, 0x200}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000840)={0x5, 0x70, 0xef, 0x2, 0x1000, 0xffffffff80000000, 0x0, 0x1a7800000000, 0x2000, 0x4, 0x5, 0x6814, 0x3a9, 0x5, 0x63b, 0x6, 0x8, 0x1000, 0x250420ee, 0x3, 0x0, 0x20, 0x6, 0x0, 0x4, 0x5, 0x4, 0x8, 0x3, 0x8, 0x52893dd5, 0x2, 0x2, 0x8, 0x44d, 0x1, 0x8, 0x6, 0x0, 0x100000000, 0x0, @perf_config_ext={0x9, 0x80}, 0x0, 0x0, 0x2b67, 0x6, 0x4b0, 0x81, 0x4}, r2, 0x5, r3, 0xb) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1003, 0x0) mount(&(0x7f00002b9ff8)='./file0\x00', &(0x7f0000cbeff8)='./file0\x00', &(0x7f00005f7ffa)='ramfs\x00', 0x80000, &(0x7f000002f000)) mount(&(0x7f0000000000)='.', &(0x7f0000000040)='.', &(0x7f0000000080)='cgroup\x00', 0x5010, &(0x7f00000000c0)) mount(&(0x7f0000377ff8)='.', &(0x7f0000000280)='.', &(0x7f0000000600)='nfs4\x00', 0x5010, &(0x7f0000000300)="2161893416a0c71070768c219eb114c3253c9f3baf4e9e8e9111c1a7fc6e266009fe27243deeaa22ca7ae9341f714300b5ee807e55d609036f2a3260475922bdfb2d2849f1c3b2ad3c051bd4f3751a177f77a92758c6d2b23fe7f1535b54e5846d11c135de8286066dec1b25f6e1378944ac5f7fce42d055821b5e19") perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xd68, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f0000014f88)={0x5, 0xfffffffffffffdc4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x46000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = getpid() perf_event_open(&(0x7f0000000680)={0x4, 0x70, 0x64, 0xffff, 0x1f, 0x4, 0x0, 0x1c3, 0x0, 0x1, 0x1, 0x9, 0x1ff, 0xfffffffffffffff8, 0x0, 0x0, 0x6, 0x7fffffff, 0x4, 0xffffffff, 0x80000001, 0xd0, 0x7, 0x1f, 0x0, 0x8, 0x9, 0x1ff, 0x8, 0x785, 0x4, 0xff, 0x2, 0x656, 0x5000000, 0x1, 0x460e3be0, 0x1, 0x0, 0x0, 0x7, @perf_bp={&(0x7f0000000640), 0x1}, 0x1000, 0xa, 0x7fff, 0x7, 0x3, 0x400, 0x9}, r5, 0xe, r4, 0x1) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', 0x0, 0x10}, 0x10) close(0xffffffffffffffff) bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)={&(0x7f0000000040)='./file0\x00', 0x0, 0x18}, 0x10) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000100)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0, 0x2e, &(0x7f0000000440), &(0x7f0000000140)=""/46, 0x4229}, 0x28) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000003480)={&(0x7f0000003300)=@can={0x0, 0x0}, 0x80, &(0x7f0000003400)=[{&(0x7f0000003380)=""/56, 0x38}, {&(0x7f00000033c0)=""/1, 0x1}], 0x2, &(0x7f0000003440)=""/33, 0x21, 0x1}, 0x40010000) bpf$PROG_LOAD(0x5, &(0x7f00000034c0)={0xe, 0x6, &(0x7f0000000940)=ANY=[@ANYBLOB="1800000002000000000000004ce700002555fdff00000000002371d07c9ba7f4a23372b0ad61000000000000009500000000000000"], &(0x7f00000007c0)='GPL\x00', 0x3, 0x2d, &(0x7f0000000800)=""/45, 0x0, 0x1, [], r6}, 0x48) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000740)={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x10) socketpair$inet(0x2, 0x80a, 0x81, &(0x7f0000000240)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={0xffffffffffffffff, &(0x7f0000000500)="ae30f1bca1b4d3f69f1aac81517d42ad5980bc63b5008616a1f4724b9f8c1e4ecd8de336f57dd727cdaab04f0b40f28612615ad08de414711d841a88db33fd33884b627074213a0c5de3be2bbaec9207d9865c47f240467849979b5ab5632376608fc4be41a274abb2dc07cabe344a18db51048e5b0cbda843905a4258cdee3e649eddf104ba78894dce09747dcfe6a8d6d6d985520eeef448b83a8bcb83074541ba7a20d6094aa206c01a0690e5b3bfa05d475eb382b0199031d22bb26cde9b1ca0055eef9f6c4993b71ba19ba0590bb5efdaddaa574c25356ca890d138fc9fe0e975b6d5a1a8251503cd0a91845f9d95", &(0x7f0000000480)="9bc7741ea5e524cc8c6f748a73153834428729c45bf4ad446d2dddf1978baf431d0ba35b5442b5afe22db8b003650320200af7e1368ef7cdfa79ca8b9d3564363a5d2a502970314f2264c883bc8d990afc003e5adb95b30edad245c4420c8126f1d33db75ff0230698eaff90055e0f", 0x2}, 0x20) socketpair(0x0, 0x80003, 0xffff, &(0x7f0000000380)={0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r7, 0x50, &(0x7f00000003c0)}, 0x10) 2018/03/29 11:56:16 executing program 3: r0 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x10}, 0x10) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000000c0)={0x0, 0x1000, 0x8}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000080)='./file0\x00', r1}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0x0, 0x8}, 0x10) mount(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='cpuset\x00', 0x40, &(0x7f0000000280)="8a4562cb6a7df38be32246afcaef1e1a3f933cb428242c55c117c0fbbd62cea0aab31f2665fb88267466eca314fc8cafd72cc24143121c0691236768fad66390bf9b55014c2bd49faa5388cbabd52e730eeb4ccc411bacd296e423d971043756cf2b35a4063f2a7465b44a60ef31ae437f6160ed2f63afa62c36a27c33e4779e7c0404e337abc025bb2e4b39cc265573c6ab1a3ff09c7ad6bb4631a4") mount(&(0x7f0000000340)='./file1\x00', &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='devtmpfs\x00', 0x40, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xb, 0x7f, 0x0, 0x1, 0x12, r1, 0x100000000}, 0x2c) mkdir(&(0x7f0000000440)='./file1\x00', 0x20) mount(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='iso9660\x00', 0x8, &(0x7f0000000540)="650fe6ccea2b17860de967406c566ec16fe5a7a4c064707e22906e9d3d2a70b4") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000005c0)={r2, 0x28, &(0x7f0000000580)={0x0, 0x0}}, 0x10) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={r3, 0x8, 0x10}, 0xc) mount(&(0x7f0000000640)='./file1\x00', &(0x7f0000000680)='./file1\x00', &(0x7f00000006c0)='pstore\x00', 0x1000000, &(0x7f0000000700)="f48afa3ab3cc319f917be52b04c388c229578537782bc5ffc32c7747b1d28999ad89f5fba460640a324385ac03cccef4553d641b91d79d014804a98e72796f8eb2e1a7056efeaa63404648df67079ae817420f248ccf9d01e7a027c600c71777fb9ebc97da60f3d1a287ef8bc00f1dc68c3b1f0c1836cde5b62be45dd58c3415cbb0f916fe3c04fc69911e2bec15c208d023bdb608fa727657c532bd5101a2a36b34c4eb65f855fea2d6f8a0a79b15ecef1a4c81a8f6f5ed57b09db2ab482413540416126718f2a33ed21346ded20b084a8dc10702ec279fc486b5c57c163d") socketpair(0x3, 0x2, 0x1f, &(0x7f0000001c40)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$kcm(r6, &(0x7f0000004300)={0x0, 0x0, &(0x7f0000004140)=[{&(0x7f0000001c80)=""/139, 0x8b}, {&(0x7f0000001d40)=""/149, 0x95}, {&(0x7f0000001e00)=""/188, 0xbc}, {&(0x7f0000001ec0)=""/69, 0x45}, {&(0x7f0000001f40)=""/165, 0xa5}, {&(0x7f0000002000)=""/4096, 0x1000}, {&(0x7f0000003000)=""/42, 0x2a}, {&(0x7f0000003040)=""/4096, 0x1000}, {&(0x7f0000004040)=""/233, 0xe9}], 0x9, &(0x7f0000004200)=""/236, 0xec, 0xe00}, 0x40) mount(&(0x7f0000004340)='./file1/file0\x00', &(0x7f0000004380)='./file1\x00', &(0x7f00000043c0)='ceph\x00', 0x4860, &(0x7f0000004400)="2c8eb517dd302be26597065442d58f3f345c295b542b2b1df3046ae176") bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000004600)={r6, &(0x7f0000004440)="903685b47b9c4d5c1dffcefa6a92cd57ccdfaf1af0be272f1cb4a5b86ab9d1ef248a63f04f5d59c2cd6e6b7722f5ff866c5d353014f28baaa95bce06a787a3e085102126a0386ffd4e136d472f2cdfb7c658643d2792b7235e2ec8c782080850c20eb00014eab035d7d56c8ddd0d7fdc4c21602d480e4accea0867cc5b4172b46b8f028bd623c58544092396dbda704543cd7c93219ff7f4caf9d0c12fc32c65ddac48ba22321d2c7ef1152f0dd87ed22cb30eb2b24d381b3abaefc114ad4c08e329cfbce60e0549ca", &(0x7f0000004540)="38859653237c5c9685cf2e44e1eea64846e190b778f29b06c26c2f2b8a0800f9fc2019b05290fc5c82f612eb7f479918015eb3af93cc57f01db731e129275ce05910f66e436ef09a8fe7bf22f960eacec350a7f7e9e9a47cb163f467b6a29523346a4c61d65d2235c73095a53929d509538f640424133cfa3617b41a51aa7172460146433abbe604f2c92827fabd5d3134d36b4cecd0fd2549f3527615f9eb63dd9332021e4eff13ad6aa509db21ed98745d00cb36e547", 0x3}, 0x20) mkdir(&(0x7f0000004640)='./file1/file0\x00', 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000004680)={0x0, 0x0, 0xa6, 0x3, 0x4}, 0x2c) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000046c0)=0x7, 0x4) recvmsg$kcm(r6, &(0x7f00000058c0)={&(0x7f0000004700)=@alg, 0x80, &(0x7f0000005880)=[{&(0x7f0000004780)=""/4096, 0x1000}, {&(0x7f0000005780)=""/219, 0xdb}], 0x2, 0x0, 0x0, 0x100000001}, 0x40000000) r7 = gettid() r8 = perf_event_open(&(0x7f0000005900)={0x7, 0x70, 0x0, 0xfffffffffffffff7, 0x9, 0x4, 0x0, 0x7, 0x100, 0x8, 0x100000000, 0x8000, 0x8, 0x6, 0x0, 0x6, 0x10001, 0x9, 0x1f, 0x2, 0x1, 0x3, 0x1, 0x1f, 0x23, 0x1, 0xaa4, 0x5, 0x4, 0x200, 0x6, 0x9, 0xfffffffffffffffb, 0x3, 0x3, 0xff, 0x80000000, 0x0, 0x0, 0xffffffffffffff9d, 0x2, @perf_config_ext={0x7, 0x9}, 0x100, 0x8, 0x2, 0x6, 0x4, 0x6, 0xf71}, r7, 0x9, r6, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f00000059c0)={&(0x7f0000005980)='./file0\x00'}, 0x10) ioctl$sock_kcm_SIOCKCMATTACH(r5, 0x89e0, &(0x7f0000005a00)={r5, r0}) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000005c00)={r4, &(0x7f0000005a40)="313befc1e9ac680c4369983530ee783c4f018c38e134b4b0aebd06ede05f238850949c0f5d32ab19889f880e87e3a0fa5a43500affdcc508d56f3a4df6c159ca9cfa62124b79b4607d42738dc5e16d09ea2c6a2346fc2360feff08d9f464dfdebce2cb99d4ba8e5fc37edfba041f14e16a68192d7d8687404ee7318323520188c4e5d52e8c7ec40bd0823fb210e530c74ea842bd8bacbc48317b0b6ed12528ecd30e1af83b8049df791ff7affe91ab54", &(0x7f0000005b00)=""/243}, 0x18) mount(&(0x7f0000005c40)='./file1/file0\x00', &(0x7f0000005c80)='./file1\x00', &(0x7f0000005cc0)='btrfs\x00', 0x0, 0x0) recvmsg(r5, &(0x7f00000073c0)={&(0x7f0000005d00)=@sco, 0x80, &(0x7f0000007300)=[{&(0x7f0000005d80)=""/103, 0x67}, {&(0x7f0000005e00)=""/170, 0xaa}, {&(0x7f0000005ec0)=""/252, 0xfc}, {&(0x7f0000005fc0)=""/136, 0x88}, {&(0x7f0000006080)=""/125, 0x7d}, {&(0x7f0000006100)=""/4096, 0x1000}, {&(0x7f0000007100)=""/106, 0x6a}, {&(0x7f0000007180)=""/115, 0x73}, {&(0x7f0000007200)=""/240, 0xf0}], 0x9, 0x0, 0x0, 0x7}, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000007400)={r3, 0x10001, 0x18}, 0xc) ioctl$PERF_EVENT_IOC_REFRESH(r8, 0x2402, 0xc4c) recvmsg$kcm(r6, &(0x7f0000008880)={&(0x7f0000007440)=@l2, 0x80, &(0x7f0000008800)=[{&(0x7f00000075c0)=""/118, 0x76}, {&(0x7f0000007640)=""/4096, 0x1000}, {&(0x7f0000008640)=""/223, 0xdf}, {&(0x7f0000008740)}, {&(0x7f0000008780)=""/32, 0x20}, {&(0x7f00000087c0)=""/53, 0x35}], 0x6}, 0x10000) [ 822.853843] IPVS: ftp: loaded support on port[0] = 21 [ 822.887599] FAULT_INJECTION: forcing a failure. [ 822.887599] name failslab, interval 1, probability 0, space 0, times 0 [ 822.898886] CPU: 1 PID: 26992 Comm: syz-executor4 Not tainted 4.16.0-rc6+ #40 [ 822.906144] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 822.915488] Call Trace: [ 822.918067] dump_stack+0x194/0x24d [ 822.921674] ? arch_local_irq_restore+0x53/0x53 [ 822.926336] should_fail+0x8c0/0xa40 [ 822.930033] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 822.935114] ? __lock_is_held+0xb6/0x140 [ 822.939157] ? mark_held_locks+0xaf/0x100 [ 822.943286] ? __raw_spin_lock_init+0x1c/0x100 [ 822.947857] ? find_held_lock+0x35/0x1d0 [ 822.951904] ? __lock_is_held+0xb6/0x140 [ 822.955956] ? check_same_owner+0x320/0x320 [ 822.960255] ? d_alloc+0x269/0x340 [ 822.963776] ? rcu_note_context_switch+0x710/0x710 [ 822.968682] ? lock_release+0xa40/0xa40 [ 822.972643] should_failslab+0xec/0x120 [ 822.976597] kmem_cache_alloc+0x47/0x760 [ 822.980639] ? d_drop+0x51/0x60 [ 822.983899] ? rpc_i_callback+0x30/0x30 [ 822.987851] rpc_alloc_inode+0x1a/0x20 [ 822.991718] alloc_inode+0x65/0x180 [ 822.995349] new_inode_pseudo+0x69/0x190 [ 822.999387] ? prune_icache_sb+0x1a0/0x1a0 [ 823.003600] ? do_raw_spin_trylock+0x190/0x190 [ 823.008170] ? d_add+0xa70/0xa70 [ 823.011531] new_inode+0x1c/0x40 [ 823.014887] rpc_get_inode+0x20/0x1e0 [ 823.018676] __rpc_create_common+0x5d/0x1d0 [ 823.022984] rpc_populate.constprop.15+0x1ad/0x340 [ 823.027903] rpc_fill_super+0x379/0xae0 [ 823.031860] ? cap_capable+0x1b5/0x230 [ 823.035725] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 823.040900] ? security_capable+0x8e/0xc0 [ 823.045030] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 823.050196] ? ns_capable_common+0xcf/0x160 [ 823.054499] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 823.059672] mount_ns+0xc4/0x190 [ 823.063027] rpc_mount+0x9e/0xd0 [ 823.066377] mount_fs+0x66/0x2d0 [ 823.069726] vfs_kern_mount.part.26+0xc6/0x4a0 [ 823.074289] ? may_umount+0xa0/0xa0 [ 823.077894] ? _raw_read_unlock+0x22/0x30 [ 823.082021] ? __get_fs_type+0x8a/0xc0 [ 823.085892] do_mount+0xea4/0x2bb0 [ 823.089416] ? copy_mount_string+0x40/0x40 [ 823.093626] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 823.098622] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 823.103363] ? retint_kernel+0x10/0x10 [ 823.107244] ? __sanitizer_cov_trace_pc+0x14/0x50 [ 823.112068] ? copy_mount_options+0x1f7/0x2e0 [ 823.116546] SyS_mount+0xab/0x120 [ 823.119980] ? copy_mnt_ns+0xb30/0xb30 [ 823.123847] do_syscall_64+0x281/0x940 [ 823.127885] ? __do_page_fault+0xc90/0xc90 [ 823.132664] ? _raw_spin_unlock_irq+0x27/0x70 [ 823.137143] ? finish_task_switch+0x1c1/0x7e0 [ 823.141615] ? syscall_return_slowpath+0x550/0x550 [ 823.146520] ? syscall_return_slowpath+0x2ac/0x550 [ 823.151436] ? prepare_exit_to_usermode+0x350/0x350 [ 823.156429] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 823.161861] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 823.166772] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 823.171936] RIP: 0033:0x4548b9 [ 823.175100] RSP: 002b:00007f69e477fc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 823.182785] RAX: ffffffffffffffda RBX: 00007f69e47806d4 RCX: 00000000004548b9 [ 823.190034] RDX: 00000000200002c0 RSI: 0000000020000140 RDI: 0000000020000300 [ 823.197283] RBP: 000000000072bea0 R08: 0000000020000200 R09: 0000000000000000 [ 823.204526] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 823.211769] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000036 [ 823.219307] net/sunrpc/rpc_pipe.c: __rpc_create_common failed to allocate inode for dentry nfsd [ 823.230270] net/sunrpc/rpc_pipe.c: rpc_populate failed to populate directory / [ 824.157111] IPVS: ftp: loaded support on port[0] = 21 [ 824.182872] IPVS: ftp: loaded support on port[0] = 21 [ 824.216949] IPVS: ftp: loaded support on port[0] = 21 2018/03/29 11:56:18 executing program 0: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000001a00)) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000001a40)={0xffffffffffffffff}) recvmsg$kcm(r1, &(0x7f0000000540)={&(0x7f00000000c0)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @broadcast}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000240)=""/65, 0x41}], 0x1, &(0x7f0000000440)=""/213, 0xd5}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x8983, &(0x7f0000000040)) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000080)) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000000)) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000019c0)={0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000000140)="0253eea6a53cc0eae389e9a13e5f2046d0633eebde90f446c1b1eabbd0adb42dfcefb37a3df93feb3d5e76dc353ecf23fe9c81afa5", 0x35}, {&(0x7f00000002c0)}, {&(0x7f0000000400)}, {&(0x7f0000001600)}], 0x4, &(0x7f0000001700)=[{0x68, 0x107, 0x25047dc1, "755cd1e9e23de47cb15819d813deb534cee2d9497c58eba5bd8a228407fb709d70f16afa73f4924f12ecc429b6fd356748940b62ee5f5685ce027fe4e6c60a8f88cd1a5827d099f5849f09bd37f681e29814e6bb"}, {0x10, 0x0, 0x1ff}, {0x10, 0x107, 0x80000001}], 0x88}, 0x48800) 2018/03/29 11:56:18 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x1e1, 0x100000000209e20, 0x8000000001}, 0xfffffffffffffe20) r0 = getpid() r1 = perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0xfffffffffffffffc, 0x3, 0x8, 0x2, 0x0, 0x9, 0x10000, 0xc, 0x3d3, 0x80, 0x5, 0xfffffffffffffffc, 0x8, 0x3f, 0x5d, 0xbbb0, 0x20, 0x3, 0x8000, 0x100000000, 0x8, 0x9, 0x2, 0x4, 0x800, 0xf8, 0x3, 0x9, 0x1, 0x3, 0x8, 0x3, 0x7, 0x10001, 0xf16, 0x2, 0x0, 0x7fffffff, 0x4, @perf_bp={&(0x7f0000000780), 0x1}, 0x4080, 0x10001, 0xcc, 0x7, 0x3, 0xffff, 0x7fffffff}, 0xffffffffffffffff, 0xd, 0xffffffffffffff9c, 0x8) perf_event_open(&(0x7f0000000980)={0x4, 0x70, 0x6, 0x3f, 0x8e, 0x1, 0x0, 0x3, 0x404, 0x0, 0xbc2b, 0x40, 0x7, 0xffff, 0xffff, 0x9, 0x9de2, 0x9, 0x0, 0x3, 0x7f, 0xff, 0x40, 0x400, 0x9, 0x7fffffff, 0x80000000, 0x7, 0x8, 0x10001, 0x1f, 0x2778, 0x800, 0x8001, 0x101, 0x9, 0x8, 0x7ff, 0x0, 0x1000, 0x5, @perf_config_ext={0x3ff, 0xb69b}, 0x3040, 0x2, 0x2, 0x5, 0x7, 0x6, 0x7283ed73}, r0, 0xe, r1, 0x8) bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x0, 0x0, 0x7ffff9, 0x0, 0x20000003, 0x0}, 0x2c) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) r2 = gettid() r3 = perf_event_open(&(0x7f00000008c0)={0x7, 0x70, 0x1, 0x200, 0x3, 0xdbce, 0x0, 0x8, 0x1002, 0x1, 0xffffffffffffff00, 0x8, 0x1, 0xb3fa, 0x8, 0x0, 0x1, 0x2, 0x1000, 0x2, 0x401, 0x8, 0x3, 0x81, 0x0, 0x7, 0x2fc4, 0x882, 0x4, 0x8, 0x3, 0x81, 0x3, 0x7, 0x8857, 0x7, 0x5, 0x9, 0x0, 0x7, 0x1, @perf_config_ext={0x0, 0x80000000}, 0x400, 0x7f, 0x4, 0x7, 0x2, 0x7f, 0x200}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000840)={0x5, 0x70, 0xef, 0x2, 0x1000, 0xffffffff80000000, 0x0, 0x1a7800000000, 0x2000, 0x4, 0x5, 0x6814, 0x3a9, 0x5, 0x63b, 0x6, 0x8, 0x1000, 0x250420ee, 0x3, 0x0, 0x20, 0x6, 0x0, 0x4, 0x5, 0x4, 0x8, 0x3, 0x8, 0x52893dd5, 0x2, 0x2, 0x8, 0x44d, 0x1, 0x8, 0x6, 0x0, 0x100000000, 0x0, @perf_config_ext={0x9, 0x80}, 0x0, 0x0, 0x2b67, 0x6, 0x4b0, 0x81, 0x4}, r2, 0x5, r3, 0xb) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1003, 0x0) mount(&(0x7f00002b9ff8)='./file0\x00', &(0x7f0000cbeff8)='./file0\x00', &(0x7f00005f7ffa)='ramfs\x00', 0x80000, &(0x7f000002f000)) mount(&(0x7f0000000000)='.', &(0x7f0000000040)='.', &(0x7f0000000080)='cgroup\x00', 0x5010, &(0x7f00000000c0)) mount(&(0x7f0000377ff8)='.', &(0x7f0000000280)='.', &(0x7f0000000600)='nfs4\x00', 0x5010, &(0x7f0000000300)="2161893416a0c71070768c219eb114c3253c9f3baf4e9e8e9111c1a7fc6e266009fe27243deeaa22ca7ae9341f714300b5ee807e55d609036f2a3260475922bdfb2d2849f1c3b2ad3c051bd4f3751a177f77a92758c6d2b23fe7f1535b54e5846d11c135de8286066dec1b25f6e1378944ac5f7fce42d055821b5e19") perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xd68, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f0000014f88)={0x5, 0xfffffffffffffdc4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x46000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = getpid() perf_event_open(&(0x7f0000000680)={0x4, 0x70, 0x64, 0xffff, 0x1f, 0x4, 0x0, 0x1c3, 0x0, 0x1, 0x1, 0x9, 0x1ff, 0xfffffffffffffff8, 0x0, 0x0, 0x6, 0x7fffffff, 0x0, 0xffffffff, 0x80000001, 0xd0, 0x7, 0x1f, 0x0, 0x8, 0x9, 0x1ff, 0x8, 0x785, 0x4, 0xff, 0x2, 0x656, 0x5000000, 0x1, 0x460e3be0, 0x1, 0x0, 0x0, 0x7, @perf_bp={&(0x7f0000000640), 0x1}, 0x1000, 0xa, 0x7fff, 0x7, 0x3, 0x400, 0x9}, r5, 0xe, r4, 0x1) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', 0x0, 0x10}, 0x10) close(0xffffffffffffffff) bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)={&(0x7f0000000040)='./file0\x00', 0x0, 0x18}, 0x10) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000100)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0, 0x2e, &(0x7f0000000440), &(0x7f0000000140)=""/46, 0x4229}, 0x28) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000003480)={&(0x7f0000003300)=@can={0x0, 0x0}, 0x80, &(0x7f0000003400)=[{&(0x7f0000003380)=""/56, 0x38}, {&(0x7f00000033c0)=""/1, 0x1}], 0x2, &(0x7f0000003440)=""/33, 0x21, 0x1}, 0x40010000) bpf$PROG_LOAD(0x5, &(0x7f00000034c0)={0xe, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="1800000002000000000000004ce700002555fdff00000000002371d07c9ba7f4a23372b0ad61000000000000009500000000000000"], &(0x7f00000007c0)='GPL\x00', 0x3, 0x2d, &(0x7f0000000800)=""/45, 0x40f00, 0x1, [], r6}, 0x48) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000740)={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x10) socketpair$inet(0x2, 0x80a, 0x81, &(0x7f0000000240)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={0xffffffffffffffff, &(0x7f0000000500)="ae30f1bca1b4d3f69f1aac81517d42ad5980bc63b5008616a1f4724b9f8c1e4ecd8de336f57dd727cdaab04f0b40f28612615ad08de414711d841a88db33fd33884b627074213a0c5de3be2bbaec9207d9865c47f240467849979b5ab5632376608fc4be41a274abb2dc07cabe344a18db51048e5b0cbda843905a4258cdee3e649eddf104ba78894dce09747dcfe6a8d6d6d985520eeef448b83a8bcb83074541ba7a20d6094aa206c01a0690e5b3bfa05d475eb382b0199031d22bb26cde9b1ca0055eef9f6c4993b71ba19ba0590bb5efdaddaa574c25356ca890d138fc9fe0e975b6d5a1a8251503cd0a91845f9d95", &(0x7f0000000480)="9bc7741ea5e524cc8c6f748a73153834428729c45bf4ad446d2dddf1978baf431d0ba35b5442b5afe22db8b003650320200af7e1368ef7cdfa79ca8b9d3564363a5d2a502970314f2264c883bc8d990afc003e5adb95b30edad245c4420c8126f1d33db75ff0230698eaff90055e0f", 0x2}, 0x20) socketpair(0x0, 0x80003, 0xffff, &(0x7f0000000380)={0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r7, 0x50, &(0x7f00000003c0)}, 0x10) 2018/03/29 11:56:18 executing program 3: r0 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x10}, 0x10) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000000c0)={0x0, 0x1000, 0x8}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000080)='./file0\x00', r1}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0x0, 0x8}, 0x10) mount(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='cpuset\x00', 0x40, &(0x7f0000000280)="8a4562cb6a7df38be32246afcaef1e1a3f933cb428242c55c117c0fbbd62cea0aab31f2665fb88267466eca314fc8cafd72cc24143121c0691236768fad66390bf9b55014c2bd49faa5388cbabd52e730eeb4ccc411bacd296e423d971043756cf2b35a4063f2a7465b44a60ef31ae437f6160ed2f63afa62c36a27c33e4779e7c0404e337abc025bb2e4b39cc265573c6ab1a3ff09c7ad6bb4631a4") mount(&(0x7f0000000340)='./file1\x00', &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='devtmpfs\x00', 0x40, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xb, 0x7f, 0x0, 0x1, 0x12, r1, 0x100000000}, 0x2c) mkdir(&(0x7f0000000440)='./file1\x00', 0x20) mount(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='iso9660\x00', 0x8, &(0x7f0000000540)="650fe6ccea2b17860de967406c566ec16fe5a7a4c064707e22906e9d3d2a70b4") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000005c0)={r2, 0x28, &(0x7f0000000580)={0x0, 0x0}}, 0x10) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={r3, 0x8, 0x10}, 0xc) mount(&(0x7f0000000640)='./file1\x00', &(0x7f0000000680)='./file1\x00', &(0x7f00000006c0)='pstore\x00', 0x1000000, &(0x7f0000000700)="f48afa3ab3cc319f917be52b04c388c229578537782bc5ffc32c7747b1d28999ad89f5fba460640a324385ac03cccef4553d641b91d79d014804a98e72796f8eb2e1a7056efeaa63404648df67079ae817420f248ccf9d01e7a027c600c71777fb9ebc97da60f3d1a287ef8bc00f1dc68c3b1f0c1836cde5b62be45dd58c3415cbb0f916fe3c04fc69911e2bec15c208d023bdb608fa727657c532bd5101a2a36b34c4eb65f855fea2d6f8a0a79b15ecef1a4c81a8f6f5ed57b09db2ab482413540416126718f2a33ed21346ded20b084a8dc10702ec279fc486b5c57c163d") socketpair(0x3, 0x2, 0x1f, &(0x7f0000001c40)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$kcm(r6, &(0x7f0000004300)={0x0, 0x0, &(0x7f0000004140)=[{&(0x7f0000001c80)=""/139, 0x8b}, {&(0x7f0000001d40)=""/149, 0x95}, {&(0x7f0000001e00)=""/188, 0xbc}, {&(0x7f0000001ec0)=""/69, 0x45}, {&(0x7f0000001f40)=""/165, 0xa5}, {&(0x7f0000002000)=""/4096, 0x1000}, {&(0x7f0000003000)=""/42, 0x2a}, {&(0x7f0000003040)=""/4096, 0x1000}, {&(0x7f0000004040)=""/233, 0xe9}], 0x9, &(0x7f0000004200)=""/236, 0xec, 0xe00}, 0x40) mount(&(0x7f0000004340)='./file1/file0\x00', &(0x7f0000004380)='./file1\x00', &(0x7f00000043c0)='ceph\x00', 0x4860, &(0x7f0000004400)="2c8eb517dd302be26597065442d58f3f345c295b542b2b1df3046ae176") bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000004600)={r6, &(0x7f0000004440)="903685b47b9c4d5c1dffcefa6a92cd57ccdfaf1af0be272f1cb4a5b86ab9d1ef248a63f04f5d59c2cd6e6b7722f5ff866c5d353014f28baaa95bce06a787a3e085102126a0386ffd4e136d472f2cdfb7c658643d2792b7235e2ec8c782080850c20eb00014eab035d7d56c8ddd0d7fdc4c21602d480e4accea0867cc5b4172b46b8f028bd623c58544092396dbda704543cd7c93219ff7f4caf9d0c12fc32c65ddac48ba22321d2c7ef1152f0dd87ed22cb30eb2b24d381b3abaefc114ad4c08e329cfbce60e0549ca", &(0x7f0000004540)="38859653237c5c9685cf2e44e1eea64846e190b778f29b06c26c2f2b8a0800f9fc2019b05290fc5c82f612eb7f479918015eb3af93cc57f01db731e129275ce05910f66e436ef09a8fe7bf22f960eacec350a7f7e9e9a47cb163f467b6a29523346a4c61d65d2235c73095a53929d509538f640424133cfa3617b41a51aa7172460146433abbe604f2c92827fabd5d3134d36b4cecd0fd2549f3527615f9eb63dd9332021e4eff13ad6aa509db21ed98745d00cb36e547", 0x3}, 0x20) mkdir(&(0x7f0000004640)='./file1/file0\x00', 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000004680)={0x0, 0x0, 0xa6, 0x3, 0x4}, 0x2c) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000046c0)=0x7, 0x4) recvmsg$kcm(r6, &(0x7f00000058c0)={&(0x7f0000004700)=@alg, 0x80, &(0x7f0000005880)=[{&(0x7f0000004780)=""/4096, 0x1000}, {&(0x7f0000005780)=""/219, 0xdb}], 0x2, 0x0, 0x0, 0x100000001}, 0x40000000) r7 = gettid() r8 = perf_event_open(&(0x7f0000005900)={0x7, 0x70, 0x0, 0xfffffffffffffff7, 0x9, 0x4, 0x0, 0x7, 0x100, 0x8, 0x100000000, 0x8000, 0x8, 0x6, 0x0, 0x6, 0x10001, 0x9, 0x1f, 0x2, 0x1, 0x3, 0x1, 0x1f, 0x23, 0x1, 0xaa4, 0x5, 0x4, 0x200, 0x6, 0x9, 0xfffffffffffffffb, 0x3, 0x3, 0xff, 0x80000000, 0x0, 0x0, 0xffffffffffffff9d, 0x2, @perf_config_ext={0x7, 0x9}, 0x100, 0x8, 0x2, 0x6, 0x4, 0x6, 0xf71}, r7, 0x9, r6, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f00000059c0)={&(0x7f0000005980)='./file0\x00'}, 0x10) ioctl$sock_kcm_SIOCKCMATTACH(r5, 0x89e0, &(0x7f0000005a00)={r5, r0}) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000005c00)={r4, &(0x7f0000005a40)="313befc1e9ac680c4369983530ee783c4f018c38e134b4b0aebd06ede05f238850949c0f5d32ab19889f880e87e3a0fa5a43500affdcc508d56f3a4df6c159ca9cfa62124b79b4607d42738dc5e16d09ea2c6a2346fc2360feff08d9f464dfdebce2cb99d4ba8e5fc37edfba041f14e16a68192d7d8687404ee7318323520188c4e5d52e8c7ec40bd0823fb210e530c74ea842bd8bacbc48317b0b6ed12528ecd30e1af83b8049df791ff7affe91ab54", &(0x7f0000005b00)=""/243}, 0x18) mount(&(0x7f0000005c40)='./file1/file0\x00', &(0x7f0000005c80)='./file1\x00', &(0x7f0000005cc0)='btrfs\x00', 0x0, 0x0) recvmsg(r5, &(0x7f00000073c0)={&(0x7f0000005d00)=@sco, 0x80, &(0x7f0000007300)=[{&(0x7f0000005d80)=""/103, 0x67}, {&(0x7f0000005e00)=""/170, 0xaa}, {&(0x7f0000005ec0)=""/252, 0xfc}, {&(0x7f0000005fc0)=""/136, 0x88}, {&(0x7f0000006080)=""/125, 0x7d}, {&(0x7f0000006100)=""/4096, 0x1000}, {&(0x7f0000007100)=""/106, 0x6a}, {&(0x7f0000007180)=""/115, 0x73}, {&(0x7f0000007200)=""/240, 0xf0}], 0x9, 0x0, 0x0, 0x7}, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000007400)={r3, 0x10001, 0x18}, 0xc) ioctl$PERF_EVENT_IOC_REFRESH(r8, 0x2402, 0xc4c) recvmsg$kcm(r6, &(0x7f0000008880)={&(0x7f0000007440)=@l2, 0x80, &(0x7f0000008800)=[{&(0x7f00000075c0)=""/118, 0x76}, {&(0x7f0000007640)=""/4096, 0x1000}, {&(0x7f0000008640)=""/223, 0xdf}, {&(0x7f0000008740)}, {&(0x7f0000008780)=""/32, 0x20}, {&(0x7f00000087c0)=""/53, 0x35}], 0x6}, 0x10000) 2018/03/29 11:56:18 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x3, &(0x7f0000002000)=@framed={{0x18}, [], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000680)={0xffffffffffffffff, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x7}, 0x28) recvmsg(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x7, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000100)=r0, 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) recvmsg(r2, &(0x7f00000011c0)={&(0x7f0000000b40)=@can, 0x80, &(0x7f0000001100)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f0000000c80)=""/169, 0xa9}, {&(0x7f0000000d40)=""/229, 0xe5}, {&(0x7f0000000e40)=""/128, 0x80}, {&(0x7f0000000ec0)=""/48, 0x30}, {&(0x7f0000000f00)=""/137, 0x89}, {&(0x7f0000006000)=""/4096, 0x1000}, {&(0x7f0000007000)=""/4096, 0x1000}, {&(0x7f0000001080)=""/127, 0x7f}, {&(0x7f0000008000)=""/4096, 0x1000}], 0xa, 0x0, 0x0, 0x1}, 0x2020) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001200)={0x7, 0x4, 0x0, 0x4, 0x8, 0xffffffffffffffff, 0x9}, 0x2c) socketpair(0x3, 0x80e, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r3, &(0x7f0000000200)={&(0x7f0000000fc0)=@pppol2tp={0x18, 0x1, {0x0, r2, {0x2, 0x4e20, @broadcast=0xffffffff}, 0x1, 0x3, 0x0, 0x2}}, 0x80, &(0x7f0000001580)=[{&(0x7f0000001240)="95c4dcff0f017b3c1979888e50f6c20a37b4edaffb28a3b609d24a8180434ab2fac426d3e4fc87e18267002be3cd56b11d69c4db739bf6a9c91af67ee87be1ea522993a368bdfc0df55539a60ef5515b4f03f3dbddae65cd66a90f030118870b473f156cb9a18624103000608c63f84b09ea89bfb8d8e7705c6ef456ef28adec5e566632ddd63098", 0x88}, {&(0x7f0000001380)="5745869bf3b6f562576761d821af2ad55c2f81345c810d6dbd43facd33c5107488aa7f04c5ab1302b820cd31405e9f657776a0d48e2225f39aabc3de0b30dc7422503b448ad89c23ebaee24ae9696e4e58eccae5febf47fff53dc1f03d869303acdef233746263c5c567e84edb166010fd23f56d6e84406bced5a00b5016b0c700fd76218ecf5da3527552a683eb87aa4b246cd74bcbeff8dedec74332e0214e4dc64cb7ac24c4447843caa7550375ef8e1f74a78c40a617e913a25e4837d24fb09e93eaa2", 0xc5}, {&(0x7f0000001480)="8247f46d4324760570d5078149dc5b38f7d1c592564148ecc6262e91c29cd4344e423ff476882993a2844af9a7c306a15e659a4cb9230b5139842c87ad8fa95c202146730fa610b141dfe4c7b771b46e4db879d2b92a01cb8642100d80a1d4658fd0df05c06c8615960a92b690c728e2603373657a9a46b2f200f2895198694d470ab95b6eb7a76ccee67c9219b4afa289d70c87cf22c733e00700f345136d59bcbd89ce7e110746f91e7a7661b8eb0afe54e3cb1c712441dd9a6ffb59a2eb58e5f5eabd4bec428fe27a403bb0d19125e473abdfea87a0c89108e3c876438a7c3f84bebad6cf858f26d2083efd60", 0xee}], 0x3, &(0x7f000000a000)=[{0x88, 0x112, 0xc2, "6671b4b66ac2fb4e14cee671813dc3834802e601529feb049ebb70880567948953018cfd53d7b1c9be27b1084adfba62040c7f889cfbc15407d93133259d9d5052bf6648a69218702e35278939ad399dc3ebed233c1792c7c1204353c8fe75ea0398f4aaf830834bc93873c119dddc539c"}, {0xe8, 0x6f180cc1befb202, 0x9, "4577f77fd3b3acd92c96feff8b0409afeae1c16fa3d367241c9679e5105141c7205d47ce27a418c10fbe7f601c3142e7b7b3a67322c9d345e0baf4315e13dc771a962ff445015c98a70b319d46ba59155d1cf07827804ea1ca86db74f3029bd60f6f365d955ec12be30102e59b4b3940152988ef09443df596bad9525f697fad61507e856c6acb744cfb034863943e811bd378843ccbd95f8221a444f4c323a391f5788559f34ac02e6e18065b87e8c962353623250694e5b4bf9bc1b00fadf2875995067ff6c18590c207f9a83f06665f5b5af77b4e"}, {0xa0, 0x10f, 0x5, "07c5972c79a30903d5d93f57c962c0351628551f6a3fbac8e18984ad9b8caeb403f1d588fa0b9955ce44d018cbcc06ad98b588dd45fd0ccd6b8d1965e70693ec76dd521aa2693829ef54059dc3191f2f4eca64c63f2f901ead2d6c54f0119212ebb77e956117d9130d3adff30a5598567fd540cf0a8f9f8c469ad15f209ad8ef161006831b39e4ddf2fcd748a8629e33"}], 0x210, 0x40}, 0x40) close(r0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)) recvmsg(r1, &(0x7f00000267c0)={&(0x7f00000251c0)=@can, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) 2018/03/29 11:56:18 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x1e1, 0x100000000209e20, 0x8000000001, 0x5}, 0xfffffffffffffe20) r0 = getpid() r1 = perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0xfffffffffffffffc, 0x3, 0x8, 0x2, 0x0, 0x9, 0x10000, 0xc, 0x3d3, 0x80, 0x5, 0xfffffffffffffffc, 0x8, 0x3f, 0x5d, 0xbbb0, 0x20, 0x3, 0x8000, 0x100000000, 0x8, 0x9, 0x2, 0x4, 0x800, 0xf8, 0x3, 0x9, 0x1, 0x3, 0x8, 0x3, 0x7, 0x10001, 0xf16, 0x2, 0x0, 0x7fffffff, 0x4, @perf_bp={&(0x7f0000000780), 0x1}, 0x4080, 0x10001, 0xcc, 0x7, 0x3, 0xffff, 0x7fffffff}, 0xffffffffffffffff, 0xd, 0xffffffffffffff9c, 0x8) perf_event_open(&(0x7f0000000980)={0x4, 0x70, 0x6, 0x3f, 0x8e, 0x1, 0x0, 0x3, 0x404, 0x0, 0xbc2b, 0x40, 0x7, 0xffff, 0xffff, 0x9, 0x9de2, 0x9, 0x0, 0x3, 0x7f, 0xff, 0x40, 0x400, 0x9, 0x7fffffff, 0x80000000, 0x7, 0x8, 0x10001, 0x1f, 0x2778, 0x800, 0x8001, 0x101, 0x9, 0x8, 0x7ff, 0x0, 0x1000, 0x5, @perf_config_ext={0x3ff, 0xb69b}, 0x3040, 0x2, 0x2, 0x5, 0x7, 0x6, 0x7283ed73}, r0, 0xe, r1, 0x8) bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x0, 0x0, 0x7ffff9, 0x0, 0x20000003, 0x0}, 0x2c) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) r2 = gettid() r3 = perf_event_open(&(0x7f00000008c0)={0x7, 0x70, 0x1, 0x200, 0x3, 0xdbce, 0x0, 0x8, 0x1002, 0x1, 0xffffffffffffff00, 0x8, 0x1, 0xb3fa, 0x8, 0x0, 0x1, 0x2, 0x1000, 0x2, 0x401, 0x8, 0x3, 0x81, 0x0, 0x7, 0x2fc4, 0x882, 0x4, 0x8, 0x3, 0x81, 0x3, 0x7, 0x8857, 0x7, 0x5, 0x9, 0x0, 0x7, 0x1, @perf_config_ext={0x0, 0x80000000}, 0x400, 0x7f, 0x4, 0x7, 0x2, 0x7f, 0x200}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000840)={0x5, 0x70, 0xef, 0x2, 0x1000, 0xffffffff80000000, 0x0, 0x1a7800000000, 0x2000, 0x4, 0x5, 0x6814, 0x3a9, 0x5, 0x63b, 0x6, 0x8, 0x1000, 0x250420ee, 0x3, 0x0, 0x20, 0x6, 0x0, 0x4, 0x5, 0x4, 0x8, 0x3, 0x8, 0x52893dd5, 0x2, 0x2, 0x8, 0x44d, 0x1, 0x8, 0x6, 0x0, 0x100000000, 0x0, @perf_config_ext={0x9, 0x80}, 0x0, 0x0, 0x2b67, 0x6, 0x4b0, 0x81, 0x4}, r2, 0x5, r3, 0xb) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1003, 0x0) mount(&(0x7f00002b9ff8)='./file0\x00', &(0x7f0000cbeff8)='./file0\x00', &(0x7f00005f7ffa)='ramfs\x00', 0x80000, &(0x7f000002f000)) mount(&(0x7f0000000000)='.', &(0x7f0000000040)='.', &(0x7f0000000080)='cgroup\x00', 0x5010, &(0x7f00000000c0)) mount(&(0x7f0000377ff8)='.', &(0x7f0000000280)='.', &(0x7f0000000600)='nfs4\x00', 0x5010, &(0x7f0000000300)="2161893416a0c71070768c219eb114c3253c9f3baf4e9e8e9111c1a7fc6e266009fe27243deeaa22ca7ae9341f714300b5ee807e55d609036f2a3260475922bdfb2d2849f1c3b2ad3c051bd4f3751a177f77a92758c6d2b23fe7f1535b54e5846d11c135de8286066dec1b25f6e1378944ac5f7fce42d055821b5e19") perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xd68, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f0000014f88)={0x5, 0xfffffffffffffdc4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x46000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = getpid() perf_event_open(&(0x7f0000000680)={0x4, 0x70, 0x64, 0xffff, 0x1f, 0x4, 0x0, 0x1c3, 0x0, 0x1, 0x1, 0x9, 0x1ff, 0xfffffffffffffff8, 0x0, 0x0, 0x6, 0x7fffffff, 0x4, 0xffffffff, 0x80000001, 0xd0, 0x7, 0x1f, 0x0, 0x8, 0x9, 0x1ff, 0x8, 0x785, 0x4, 0xff, 0x2, 0x656, 0x5000000, 0x1, 0x460e3be0, 0x1, 0x0, 0x0, 0x7, @perf_bp={&(0x7f0000000640), 0x1}, 0x1000, 0xa, 0x7fff, 0x7, 0x3, 0x400, 0x9}, r5, 0xe, r4, 0x1) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', 0x0, 0x10}, 0x10) close(0xffffffffffffffff) bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)={&(0x7f0000000040)='./file0\x00', 0x0, 0x18}, 0x10) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000100)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0, 0x2e, &(0x7f0000000440), &(0x7f0000000140)=""/46, 0x4229}, 0x28) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000003480)={&(0x7f0000003300)=@can={0x0, 0x0}, 0x80, &(0x7f0000003400)=[{&(0x7f0000003380)=""/56, 0x38}, {&(0x7f00000033c0)=""/1, 0x1}], 0x2, &(0x7f0000003440)=""/33, 0x21, 0x1}, 0x40010000) bpf$PROG_LOAD(0x5, &(0x7f00000034c0)={0xe, 0x6, &(0x7f0000000940)=ANY=[@ANYBLOB="1800000002000000000000004ce700002555fdff00000000002371d07c9ba7f4a23372b0ad61000000000000009500000000000000"], &(0x7f00000007c0)='GPL\x00', 0x3, 0x2d, &(0x7f0000000800)=""/45, 0x0, 0x1, [], r6}, 0x48) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000740)={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x10) socketpair$inet(0x2, 0x80a, 0x81, &(0x7f0000000240)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={0xffffffffffffffff, &(0x7f0000000500)="ae30f1bca1b4d3f69f1aac81517d42ad5980bc63b5008616a1f4724b9f8c1e4ecd8de336f57dd727cdaab04f0b40f28612615ad08de414711d841a88db33fd33884b627074213a0c5de3be2bbaec9207d9865c47f240467849979b5ab5632376608fc4be41a274abb2dc07cabe344a18db51048e5b0cbda843905a4258cdee3e649eddf104ba78894dce09747dcfe6a8d6d6d985520eeef448b83a8bcb83074541ba7a20d6094aa206c01a0690e5b3bfa05d475eb382b0199031d22bb26cde9b1ca0055eef9f6c4993b71ba19ba0590bb5efdaddaa574c25356ca890d138fc9fe0e975b6d5a1a8251503cd0a91845f9d95", &(0x7f0000000480)="9bc7741ea5e524cc8c6f748a73153834428729c45bf4ad446d2dddf1978baf431d0ba35b5442b5afe22db8b003650320200af7e1368ef7cdfa79ca8b9d3564363a5d2a502970314f2264c883bc8d990afc003e5adb95b30edad245c4420c8126f1d33db75ff0230698eaff90055e0f", 0x2}, 0x20) socketpair(0x0, 0x80003, 0xffff, &(0x7f0000000380)={0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r7, 0x50, &(0x7f00000003c0)}, 0x10) 2018/03/29 11:56:18 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x3, &(0x7f0000002000)=@framed={{0x18}, [], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000680)={0xffffffffffffffff, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x7}, 0x28) recvmsg(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000001c0)) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000100), 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) recvmsg(r3, &(0x7f00000011c0)={&(0x7f0000000b40)=@can, 0x80, &(0x7f0000001100)=[{&(0x7f0000000c80)=""/169, 0xa9}, {&(0x7f0000000d40)=""/229, 0xe5}, {&(0x7f0000000e40)=""/128, 0x80}, {&(0x7f0000000ec0)=""/48, 0x30}, {&(0x7f0000000f00)=""/137, 0x89}, {&(0x7f0000006000)=""/4096, 0x1000}, {&(0x7f0000007000)=""/4096, 0x1000}, {&(0x7f0000001080)=""/127, 0x7f}, {&(0x7f0000008000)=""/4096, 0x1000}], 0x9, 0x0, 0x0, 0x1}, 0x2020) bpf$MAP_CREATE(0x0, &(0x7f0000001200)={0x7, 0x4, 0x0, 0x4, 0x8, 0xffffffffffffffff, 0x9}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x1000000007, 0xcf2e, 0x7e, 0x20, 0x15, r1, 0x4}, 0x2c) socketpair(0x3, 0x80e, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r4, &(0x7f0000000200)={&(0x7f0000000fc0)=@pppol2tp={0x18, 0x1, {0x0, r3, {0x2, 0x4e20, @broadcast=0xffffffff}, 0x1, 0x3, 0x0, 0x2}}, 0x80, &(0x7f0000001580)=[{&(0x7f0000001240)="95c4dcff0f017b3c1979888e50f6c20a37b4edaffb28a3b609d24a8180434ab2fac426d3e4fc87e18267002be3cd56b11d69c4db739bf6a9c91af67ee87be1ea522993a368bdfc0df55539a60ef5515b4f03f3dbddae65cd66a90f030118870b473f156cb9a18624103000608c63f84b09ea89bfb8d8e7705c6ef456ef28adec5e566632ddd63098", 0x88}, {&(0x7f0000001380)="5745869bf3b6f562576761d821af2ad55c2f81345c810d6dbd43facd33c5107488aa7f04c5ab1302b820cd31405e9f657776a0d48e2225f39aabc3de0b30dc7422503b448ad89c23ebaee24ae9696e4e58eccae5febf47fff53dc1f03d869303acdef233746263c5c567e84edb166010fd23f56d6e84406bced5a00b5016b0c700fd76218ecf5da3527552a683eb87aa4b246cd74bcbeff8dedec74332e0214e4dc64cb7ac24c4447843caa7550375ef8e1f74a78c40a617e913a25e4837d24fb09e93eaa2", 0xc5}, {&(0x7f0000001480)="8247f46d4324760570d5078149dc5b38f7d1c592564148ecc6262e91c29cd4344e423ff476882993a2844af9a7c306a15e659a4cb9230b5139842c87ad8fa95c202146730fa610b141dfe4c7b771b46e4db879d2b92a01cb8642100d80a1d4658fd0df05c06c8615960a92b690c728e2603373657a9a46b2f200f2895198694d470ab95b6eb7a76ccee67c9219b4afa289d70c87cf22c733e00700f345136d59bcbd89ce7e110746f91e7a7661b8eb0afe54e3cb1c712441dd9a6ffb59a2eb58e5f5eabd4bec428fe27a403bb0d19125e473abdfea87a0c89108e3c876438a7c3f84bebad6cf858f26d2083efd60", 0xee}], 0x3, &(0x7f000000a000)=[{0x88, 0x112, 0xc2, "6671b4b66ac2fb4e14cee671813dc3834802e601529feb049ebb70880567948953018cfd53d7b1c9be27b1084adfba62040c7f889cfbc15407d93133259d9d5052bf6648a69218702e35278939ad399dc3ebed233c1792c7c1204353c8fe75ea0398f4aaf830834bc93873c119dddc539c"}, {0xe8, 0x6f180cc1befb202, 0x9, "4577f77fd3b3acd92c96feff8b0409afeae1c16fa3d367241c9679e5105141c7205d47ce27a418c10fbe7f601c3142e7b7b3a67322c9d345e0baf4315e13dc771a962ff445015c98a70b319d46ba59155d1cf07827804ea1ca86db74f3029bd60f6f365d955ec12be30102e59b4b3940152988ef09443df596bad9525f697fad61507e856c6acb744cfb034863943e811bd378843ccbd95f8221a444f4c323a391f5788559f34ac02e6e18065b87e8c962353623250694e5b4bf9bc1b00fadf2875995067ff6c18590c207f9a83f06665f5b5af77b4e"}, {0xa0, 0x10f, 0x5, "07c5972c79a30903d5d93f57c962c0351628551f6a3fbac8e18984ad9b8caeb403f1d588fa0b9955ce44d018cbcc06ad98b588dd45fd0ccd6b8d1965e70693ec76dd521aa2693829ef54059dc3191f2f4eca64c63f2f901ead2d6c54f0119212ebb77e956117d9130d3adff30a5598567fd540cf0a8f9f8c469ad15f209ad8ef161006831b39e4ddf2fcd748a8629e33"}], 0x210, 0x40}, 0x40) close(r0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)) recvmsg(r2, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) recvmsg$kcm(r4, &(0x7f0000001a00)={0x0, 0x0, &(0x7f00000018c0)=[{&(0x7f0000001600)=""/173, 0xad}, {&(0x7f0000001040)=""/25, 0x19}, {&(0x7f00000016c0)=""/132, 0x84}, {&(0x7f0000001780)=""/91, 0x5b}, {&(0x7f0000001800)=""/183, 0xb7}], 0x5, &(0x7f0000001940)=""/163, 0xa3, 0xe43}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000a80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r5}, 0x48) 2018/03/29 11:56:18 executing program 6: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x3, &(0x7f0000002000)=@framed={{0x18}, [], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000680)={0xffffffffffffffff, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x7}, 0x28) recvmsg(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000001c0)) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000100)=r0, 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) recvmsg(r3, &(0x7f00000011c0)={&(0x7f0000000b40)=@can, 0x80, &(0x7f0000001100)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f0000000c80)=""/169, 0xa9}, {&(0x7f0000000d40)=""/229, 0xe5}, {&(0x7f0000000e40)=""/128, 0x80}, {&(0x7f0000000ec0)=""/48, 0x30}, {&(0x7f0000000f00)=""/137, 0x89}, {&(0x7f0000006000)=""/4096, 0x1000}, {&(0x7f0000007000)=""/4096, 0x1000}, {&(0x7f0000001080)=""/127, 0x7f}], 0x9, 0x0, 0x0, 0x1}, 0x2020) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001200)={0x7, 0x4, 0x0, 0x4, 0x8, 0xffffffffffffffff, 0x9}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x1000000007, 0xcf2e, 0x7e, 0x20, 0x15, r1, 0x4}, 0x2c) socketpair(0x3, 0x80e, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r4, &(0x7f0000000200)={&(0x7f0000000fc0)=@pppol2tp={0x18, 0x1, {0x0, r3, {0x2, 0x4e20, @broadcast=0xffffffff}, 0x1, 0x3, 0x0, 0x2}}, 0x80, &(0x7f0000001580)=[{&(0x7f0000001240)="95c4dcff0f017b3c1979888e50f6c20a37b4edaffb28a3b609d24a8180434ab2fac426d3e4fc87e18267002be3cd56b11d69c4db739bf6a9c91af67ee87be1ea522993a368bdfc0df55539a60ef5515b4f03f3dbddae65cd66a90f030118870b473f156cb9a18624103000608c63f84b09ea89bfb8d8e7705c6ef456ef28adec5e566632ddd63098", 0x88}, {&(0x7f0000001380)="5745869bf3b6f562576761d821af2ad55c2f81345c810d6dbd43facd33c5107488aa7f04c5ab1302b820cd31405e9f657776a0d48e2225f39aabc3de0b30dc7422503b448ad89c23ebaee24ae9696e4e58eccae5febf47fff53dc1f03d869303acdef233746263c5c567e84edb166010fd23f56d6e84406bced5a00b5016b0c700fd76218ecf5da3527552a683eb87aa4b246cd74bcbeff8dedec74332e0214e4dc64cb7ac24c4447843caa7550375ef8e1f74a78c40a617e913a25e4837d24fb09e93eaa2", 0xc5}, {&(0x7f0000001480)="8247f46d4324760570d5078149dc5b38f7d1c592564148ecc6262e91c29cd4344e423ff476882993a2844af9a7c306a15e659a4cb9230b5139842c87ad8fa95c202146730fa610b141dfe4c7b771b46e4db879d2b92a01cb8642100d80a1d4658fd0df05c06c8615960a92b690c728e2603373657a9a46b2f200f2895198694d470ab95b6eb7a76ccee67c9219b4afa289d70c87cf22c733e00700f345136d59bcbd89ce7e110746f91e7a7661b8eb0afe54e3cb1c712441dd9a6ffb59a2eb58e5f5eabd4bec428fe27a403bb0d19125e473abdfea87a0c89108e3c876438a7c3f84bebad6cf858f26d2083efd60", 0xee}], 0x3, &(0x7f000000a000)=[{0x88, 0x112, 0xc2, "6671b4b66ac2fb4e14cee671813dc3834802e601529feb049ebb70880567948953018cfd53d7b1c9be27b1084adfba62040c7f889cfbc15407d93133259d9d5052bf6648a69218702e35278939ad399dc3ebed233c1792c7c1204353c8fe75ea0398f4aaf830834bc93873c119dddc539c"}, {0xe8, 0x6f180cc1befb202, 0x9, "4577f77fd3b3acd92c96feff8b0409afeae1c16fa3d367241c9679e5105141c7205d47ce27a418c10fbe7f601c3142e7b7b3a67322c9d345e0baf4315e13dc771a962ff445015c98a70b319d46ba59155d1cf07827804ea1ca86db74f3029bd60f6f365d955ec12be30102e59b4b3940152988ef09443df596bad9525f697fad61507e856c6acb744cfb034863943e811bd378843ccbd95f8221a444f4c323a391f5788559f34ac02e6e18065b87e8c962353623250694e5b4bf9bc1b00fadf2875995067ff6c18590c207f9a83f06665f5b5af77b4e"}, {0xa0, 0x10f, 0x5, "07c5972c79a30903d5d93f57c962c0351628551f6a3fbac8e18984ad9b8caeb403f1d588fa0b9955ce44d018cbcc06ad98b588dd45fd0ccd6b8d1965e70693ec76dd521aa2693829ef54059dc3191f2f4eca64c63f2f901ead2d6c54f0119212ebb77e956117d9130d3adff30a5598567fd540cf0a8f9f8c469ad15f209ad8ef161006831b39e4ddf2fcd748a8629e33"}], 0x210, 0x40}, 0x40) close(r0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)) recvmsg(r2, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) recvmsg$kcm(r4, &(0x7f0000001a00)={0x0, 0x0, &(0x7f00000018c0)=[{&(0x7f0000001600)=""/173, 0xad}, {&(0x7f0000001040)=""/25, 0x19}, {&(0x7f00000016c0)=""/132, 0x84}, {&(0x7f0000001780)=""/91, 0x5b}, {&(0x7f0000001800)=""/183, 0xb7}], 0x5, &(0x7f0000001940)=""/163, 0xa3, 0xe43}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000a80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r5}, 0x48) 2018/03/29 11:56:18 executing program 4 (fault-call:8 fault-nth:55): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x3, &(0x7f0000002000)=@framed={{0x18}, [], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000680)={0xffffffffffffffff, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x7}, 0x28) recvmsg(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000001c0)) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000100)=r0, 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) recvmsg(r3, &(0x7f00000011c0)={&(0x7f0000000b40)=@can, 0x80, &(0x7f0000001100)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f0000000c80)=""/169, 0xa9}, {&(0x7f0000000d40)=""/229, 0xe5}, {&(0x7f0000000e40)=""/128, 0x80}, {&(0x7f0000000ec0)=""/48, 0x30}, {&(0x7f0000000f00)=""/137, 0x89}, {&(0x7f0000006000)=""/4096, 0x1000}, {&(0x7f0000007000)=""/4096, 0x1000}, {&(0x7f0000001080)=""/127, 0x7f}, {&(0x7f0000008000)=""/4096, 0x1000}], 0xa, 0x0, 0x0, 0x1}, 0x2020) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001200)={0x7, 0x4, 0x0, 0x4, 0x8, 0xffffffffffffffff, 0x9}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x1000000007, 0xcf2e, 0x7e, 0x20, 0x15, r1, 0x4}, 0x2c) socketpair(0x3, 0x80e, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r4, &(0x7f0000000200)={&(0x7f0000000fc0)=@pppol2tp={0x18, 0x1, {0x0, r3, {0x2, 0x4e20, @broadcast=0xffffffff}, 0x1, 0x3, 0x0, 0x2}}, 0x80, &(0x7f0000001580)=[{&(0x7f0000001240)="95c4dcff0f017b3c1979888e50f6c20a37b4edaffb28a3b609d24a8180434ab2fac426d3e4fc87e18267002be3cd56b11d69c4db739bf6a9c91af67ee87be1ea522993a368bdfc0df55539a60ef5515b4f03f3dbddae65cd66a90f030118870b473f156cb9a18624103000608c63f84b09ea89bfb8d8e7705c6ef456ef28adec5e566632ddd63098", 0x88}, {&(0x7f0000001380)="5745869bf3b6f562576761d821af2ad55c2f81345c810d6dbd43facd33c5107488aa7f04c5ab1302b820cd31405e9f657776a0d48e2225f39aabc3de0b30dc7422503b448ad89c23ebaee24ae9696e4e58eccae5febf47fff53dc1f03d869303acdef233746263c5c567e84edb166010fd23f56d6e84406bced5a00b5016b0c700fd76218ecf5da3527552a683eb87aa4b246cd74bcbeff8dedec74332e0214e4dc64cb7ac24c4447843caa7550375ef8e1f74a78c40a617e913a25e4837d24fb09e93eaa2", 0xc5}, {&(0x7f0000001480)="8247f46d4324760570d5078149dc5b38f7d1c592564148ecc6262e91c29cd4344e423ff476882993a2844af9a7c306a15e659a4cb9230b5139842c87ad8fa95c202146730fa610b141dfe4c7b771b46e4db879d2b92a01cb8642100d80a1d4658fd0df05c06c8615960a92b690c728e2603373657a9a46b2f200f2895198694d470ab95b6eb7a76ccee67c9219b4afa289d70c87cf22c733e00700f345136d59bcbd89ce7e110746f91e7a7661b8eb0afe54e3cb1c712441dd9a6ffb59a2eb58e5f5eabd4bec428fe27a403bb0d19125e473abdfea87a0c89108e3c876438a7c3f84bebad6cf858f26d2083efd60", 0xee}], 0x3, &(0x7f000000a000)=[{0x88, 0x112, 0xc2, "6671b4b66ac2fb4e14cee671813dc3834802e601529feb049ebb70880567948953018cfd53d7b1c9be27b1084adfba62040c7f889cfbc15407d93133259d9d5052bf6648a69218702e35278939ad399dc3ebed233c1792c7c1204353c8fe75ea0398f4aaf830834bc93873c119dddc539c"}, {0xe8, 0x6f180cc1befb202, 0x9, "4577f77fd3b3acd92c96feff8b0409afeae1c16fa3d367241c9679e5105141c7205d47ce27a418c10fbe7f601c3142e7b7b3a67322c9d345e0baf4315e13dc771a962ff445015c98a70b319d46ba59155d1cf07827804ea1ca86db74f3029bd60f6f365d955ec12be30102e59b4b3940152988ef09443df596bad9525f697fad61507e856c6acb744cfb034863943e811bd378843ccbd95f8221a444f4c323a391f5788559f34ac02e6e18065b87e8c962353623250694e5b4bf9bc1b00fadf2875995067ff6c18590c207f9a83f06665f5b5af77b4e"}, {0xa0, 0x10f, 0x5, "07c5972c79a30903d5d93f57c962c0351628551f6a3fbac8e18984ad9b8caeb403f1d588fa0b9955ce44d018cbcc06ad98b588dd45fd0ccd6b8d1965e70693ec76dd521aa2693829ef54059dc3191f2f4eca64c63f2f901ead2d6c54f0119212ebb77e956117d9130d3adff30a5598567fd540cf0a8f9f8c469ad15f209ad8ef161006831b39e4ddf2fcd748a8629e33"}], 0x210, 0x40}, 0x40) close(r0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b53596090ebcc07d8584f358be88fafe") recvmsg(r2, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) recvmsg$kcm(r4, &(0x7f0000001a00)={0x0, 0x0, &(0x7f00000018c0)=[{&(0x7f0000001600)=""/173, 0xad}, {&(0x7f0000001040)=""/25, 0x19}, {&(0x7f00000016c0)=""/132, 0x84}, {&(0x7f0000001780)=""/91, 0x5b}, {&(0x7f0000001800)=""/183, 0xb7}], 0x5, &(0x7f0000001940)=""/163, 0xa3, 0xe43}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000a80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r5}, 0x48) 2018/03/29 11:56:18 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x3, &(0x7f0000002000)=@framed={{0x18}, [], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000680)={0xffffffffffffffff, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x7}, 0x28) recvmsg(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000001c0)) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000100), 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) recvmsg(r3, &(0x7f00000011c0)={&(0x7f0000000b40)=@can, 0x80, &(0x7f0000001100)=[{&(0x7f0000000c80)=""/169, 0xa9}, {&(0x7f0000000d40)=""/229, 0xe5}, {&(0x7f0000000e40)=""/128, 0x80}, {&(0x7f0000000ec0)=""/48, 0x30}, {&(0x7f0000000f00)=""/137, 0x89}, {&(0x7f0000006000)=""/4096, 0x1000}, {&(0x7f0000007000)=""/4096, 0x1000}, {&(0x7f0000001080)=""/127, 0x7f}, {&(0x7f0000008000)=""/4096, 0x1000}], 0x9, 0x0, 0x0, 0x1}, 0x2020) bpf$MAP_CREATE(0x0, &(0x7f0000001200)={0x7, 0x4, 0x0, 0x4, 0x8, 0xffffffffffffffff, 0x9}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x1000000007, 0xcf2e, 0x7e, 0x20, 0x15, r1, 0x4}, 0x2c) socketpair(0x3, 0x80e, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r4, &(0x7f0000000200)={&(0x7f0000000fc0)=@pppol2tp={0x18, 0x1, {0x0, r3, {0x2, 0x4e20, @broadcast=0xffffffff}, 0x1, 0x3, 0x0, 0x2}}, 0x80, &(0x7f0000001580)=[{&(0x7f0000001240)="95c4dcff0f017b3c1979888e50f6c20a37b4edaffb28a3b609d24a8180434ab2fac426d3e4fc87e18267002be3cd56b11d69c4db739bf6a9c91af67ee87be1ea522993a368bdfc0df55539a60ef5515b4f03f3dbddae65cd66a90f030118870b473f156cb9a18624103000608c63f84b09ea89bfb8d8e7705c6ef456ef28adec5e566632ddd63098", 0x88}, {&(0x7f0000001380)="5745869bf3b6f562576761d821af2ad55c2f81345c810d6dbd43facd33c5107488aa7f04c5ab1302b820cd31405e9f657776a0d48e2225f39aabc3de0b30dc7422503b448ad89c23ebaee24ae9696e4e58eccae5febf47fff53dc1f03d869303acdef233746263c5c567e84edb166010fd23f56d6e84406bced5a00b5016b0c700fd76218ecf5da3527552a683eb87aa4b246cd74bcbeff8dedec74332e0214e4dc64cb7ac24c4447843caa7550375ef8e1f74a78c40a617e913a25e4837d24fb09e93eaa2", 0xc5}, {&(0x7f0000001480)="8247f46d4324760570d5078149dc5b38f7d1c592564148ecc6262e91c29cd4344e423ff476882993a2844af9a7c306a15e659a4cb9230b5139842c87ad8fa95c202146730fa610b141dfe4c7b771b46e4db879d2b92a01cb8642100d80a1d4658fd0df05c06c8615960a92b690c728e2603373657a9a46b2f200f2895198694d470ab95b6eb7a76ccee67c9219b4afa289d70c87cf22c733e00700f345136d59bcbd89ce7e110746f91e7a7661b8eb0afe54e3cb1c712441dd9a6ffb59a2eb58e5f5eabd4bec428fe27a403bb0d19125e473abdfea87a0c89108e3c876438a7c3f84bebad6cf858f26d2083efd60", 0xee}], 0x3, &(0x7f000000a000)=[{0x88, 0x112, 0xc2, "6671b4b66ac2fb4e14cee671813dc3834802e601529feb049ebb70880567948953018cfd53d7b1c9be27b1084adfba62040c7f889cfbc15407d93133259d9d5052bf6648a69218702e35278939ad399dc3ebed233c1792c7c1204353c8fe75ea0398f4aaf830834bc93873c119dddc539c"}, {0xe8, 0x6f180cc1befb202, 0x9, "4577f77fd3b3acd92c96feff8b0409afeae1c16fa3d367241c9679e5105141c7205d47ce27a418c10fbe7f601c3142e7b7b3a67322c9d345e0baf4315e13dc771a962ff445015c98a70b319d46ba59155d1cf07827804ea1ca86db74f3029bd60f6f365d955ec12be30102e59b4b3940152988ef09443df596bad9525f697fad61507e856c6acb744cfb034863943e811bd378843ccbd95f8221a444f4c323a391f5788559f34ac02e6e18065b87e8c962353623250694e5b4bf9bc1b00fadf2875995067ff6c18590c207f9a83f06665f5b5af77b4e"}, {0xa0, 0x10f, 0x5, "07c5972c79a30903d5d93f57c962c0351628551f6a3fbac8e18984ad9b8caeb403f1d588fa0b9955ce44d018cbcc06ad98b588dd45fd0ccd6b8d1965e70693ec76dd521aa2693829ef54059dc3191f2f4eca64c63f2f901ead2d6c54f0119212ebb77e956117d9130d3adff30a5598567fd540cf0a8f9f8c469ad15f209ad8ef161006831b39e4ddf2fcd748a8629e33"}], 0x210, 0x40}, 0x40) close(r0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)) recvmsg(r2, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) recvmsg$kcm(r4, &(0x7f0000001a00)={0x0, 0x0, &(0x7f00000018c0)=[{&(0x7f0000001600)=""/173, 0xad}, {&(0x7f0000001040)=""/25, 0x19}, {&(0x7f00000016c0)=""/132, 0x84}, {&(0x7f0000001780)=""/91, 0x5b}, {&(0x7f0000001800)=""/183, 0xb7}], 0x5, &(0x7f0000001940)=""/163, 0xa3, 0xe43}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000a80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r5}, 0x48) 2018/03/29 11:56:18 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x1e1, 0x100000000209e20, 0x8000000001, 0x5}, 0xfffffffffffffe20) r0 = getpid() r1 = perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0xfffffffffffffffc, 0x3, 0x8, 0x2, 0x0, 0x9, 0x10000, 0xc, 0x3d3, 0x80, 0x5, 0xfffffffffffffffc, 0x8, 0x3f, 0x5d, 0xbbb0, 0x20, 0x3, 0x8000, 0x100000000, 0x8, 0x9, 0x2, 0x4, 0x800, 0xf8, 0x3, 0x9, 0x1, 0x3, 0x8, 0x3, 0x7, 0x10001, 0xf16, 0x2, 0x0, 0x7fffffff, 0x4, @perf_bp={&(0x7f0000000780), 0x1}, 0x4080, 0x10001, 0xcc, 0x7, 0x3, 0xffff, 0x7fffffff}, 0xffffffffffffffff, 0xd, 0xffffffffffffff9c, 0x8) perf_event_open(&(0x7f0000000980)={0x4, 0x70, 0x6, 0x3f, 0x8e, 0x1, 0x0, 0x3, 0x404, 0x0, 0xbc2b, 0x40, 0x7, 0xffff, 0xffff, 0x9, 0x9de2, 0x9, 0x0, 0x3, 0x7f, 0xff, 0x40, 0x400, 0x9, 0x7fffffff, 0x80000000, 0x7, 0x8, 0x10001, 0x1f, 0x2778, 0x800, 0x8001, 0x101, 0x9, 0x8, 0x7ff, 0x0, 0x1000, 0x5, @perf_config_ext={0x3ff, 0xb69b}, 0x3040, 0x2, 0x2, 0x5, 0x7, 0x6, 0x7283ed73}, r0, 0xe, r1, 0x8) bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x0, 0x0, 0x7ffff9, 0x0, 0x20000003, 0x0}, 0x2c) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) r2 = gettid() r3 = perf_event_open(&(0x7f00000008c0)={0x7, 0x70, 0x1, 0x200, 0x3, 0xdbce, 0x0, 0x8, 0x1002, 0x1, 0xffffffffffffff00, 0x8, 0x1, 0xb3fa, 0x8, 0x0, 0x1, 0x2, 0x1000, 0x2, 0x401, 0x8, 0x3, 0x81, 0x0, 0x7, 0x2fc4, 0x882, 0x4, 0x8, 0x3, 0x81, 0x3, 0x7, 0x8857, 0x7, 0x5, 0x9, 0x0, 0x7, 0x1, @perf_config_ext={0x0, 0x80000000}, 0x400, 0x7f, 0x4, 0x7, 0x2, 0x7f, 0x200}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000840)={0x5, 0x70, 0xef, 0x2, 0x1000, 0xffffffff80000000, 0x0, 0x1a7800000000, 0x2000, 0x4, 0x5, 0x6814, 0x3a9, 0x5, 0x63b, 0x6, 0x8, 0x1000, 0x250420ee, 0x3, 0x0, 0x20, 0x6, 0x0, 0x4, 0x5, 0x4, 0x8, 0x3, 0x8, 0x52893dd5, 0x2, 0x2, 0x8, 0x44d, 0x1, 0x8, 0x6, 0x0, 0x100000000, 0x0, @perf_config_ext={0x9, 0x80}, 0x0, 0x0, 0x2b67, 0x6, 0x4b0, 0x81, 0x4}, r2, 0x5, r3, 0xb) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1003, 0x0) mount(&(0x7f00002b9ff8)='./file0\x00', &(0x7f0000cbeff8)='./file0\x00', &(0x7f00005f7ffa)='ramfs\x00', 0x80000, &(0x7f000002f000)) mount(&(0x7f0000000000)='.', &(0x7f0000000040)='.', &(0x7f0000000080)='cgroup\x00', 0x5010, &(0x7f00000000c0)) mount(&(0x7f0000377ff8)='.', &(0x7f0000000280)='.', &(0x7f0000000600)='nfs4\x00', 0x5010, &(0x7f0000000300)="2161893416a0c71070768c219eb114c3253c9f3baf4e9e8e9111c1a7fc6e266009fe27243deeaa22ca7ae9341f714300b5ee807e55d609036f2a3260475922bdfb2d2849f1c3b2ad3c051bd4f3751a177f77a92758c6d2b23fe7f1535b54e5846d11c135de8286066dec1b25f6e1378944ac5f7fce42d055821b5e19") perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xd68, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f0000014f88)={0x5, 0xfffffffffffffdc4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x46000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = getpid() perf_event_open(&(0x7f0000000680)={0x4, 0x70, 0x64, 0xffff, 0x1f, 0x4, 0x0, 0x1c3, 0x0, 0x1, 0x1, 0x9, 0x1ff, 0xfffffffffffffff8, 0x0, 0x0, 0x6, 0x7fffffff, 0x4, 0xffffffff, 0x80000001, 0xd0, 0x7, 0x1f, 0x0, 0x8, 0x9, 0x1ff, 0x8, 0x785, 0x4, 0xff, 0x2, 0x656, 0x5000000, 0x1, 0x460e3be0, 0x1, 0x0, 0x0, 0x7, @perf_bp={&(0x7f0000000640), 0x1}, 0x1000, 0xa, 0x7fff, 0x7, 0x3, 0x400, 0x9}, r5, 0xe, r4, 0x1) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', 0x0, 0x10}, 0x10) close(0xffffffffffffffff) bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)={&(0x7f0000000040)='./file0\x00', 0x0, 0x18}, 0x10) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000100)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0, 0x2e, &(0x7f0000000440), &(0x7f0000000140)=""/46, 0x4229}, 0x28) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000003480)={&(0x7f0000003300)=@can={0x0, 0x0}, 0x80, &(0x7f0000003400)=[{&(0x7f0000003380)=""/56, 0x38}, {&(0x7f00000033c0)=""/1, 0x1}], 0x2, &(0x7f0000003440)=""/33, 0x21, 0x1}, 0x40010000) bpf$PROG_LOAD(0x5, &(0x7f00000034c0)={0xe, 0x6, &(0x7f0000000940)=ANY=[@ANYBLOB="1800000002000000000000004ce700002555fdff00000000002371d07c9ba7f4a23372b0ad61000000000000009500000000000000"], &(0x7f00000007c0)='GPL\x00', 0x3, 0x2d, &(0x7f0000000800)=""/45, 0x40f00, 0x0, [], r6}, 0x48) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000740)={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x10) socketpair$inet(0x2, 0x80a, 0x81, &(0x7f0000000240)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={0xffffffffffffffff, &(0x7f0000000500)="ae30f1bca1b4d3f69f1aac81517d42ad5980bc63b5008616a1f4724b9f8c1e4ecd8de336f57dd727cdaab04f0b40f28612615ad08de414711d841a88db33fd33884b627074213a0c5de3be2bbaec9207d9865c47f240467849979b5ab5632376608fc4be41a274abb2dc07cabe344a18db51048e5b0cbda843905a4258cdee3e649eddf104ba78894dce09747dcfe6a8d6d6d985520eeef448b83a8bcb83074541ba7a20d6094aa206c01a0690e5b3bfa05d475eb382b0199031d22bb26cde9b1ca0055eef9f6c4993b71ba19ba0590bb5efdaddaa574c25356ca890d138fc9fe0e975b6d5a1a8251503cd0a91845f9d95", &(0x7f0000000480)="9bc7741ea5e524cc8c6f748a73153834428729c45bf4ad446d2dddf1978baf431d0ba35b5442b5afe22db8b003650320200af7e1368ef7cdfa79ca8b9d3564363a5d2a502970314f2264c883bc8d990afc003e5adb95b30edad245c4420c8126f1d33db75ff0230698eaff90055e0f", 0x2}, 0x20) socketpair(0x0, 0x80003, 0xffff, &(0x7f0000000380)={0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r7, 0x50, &(0x7f00000003c0)}, 0x10) 2018/03/29 11:56:18 executing program 0: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000001a00)) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000180)={0xffffffffffffffff}) recvmsg$kcm(r1, &(0x7f0000000540)={&(0x7f00000000c0)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @broadcast}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000240)=""/65, 0x41}], 0x1, &(0x7f0000000440)=""/213, 0xd5}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x8983, &(0x7f0000000040)) sendmsg$kcm(r0, &(0x7f0000000000)={&(0x7f0000001580)=@ipx={0x4, 0x5, 0x9, "3211d2774173", 0x7}, 0x80, &(0x7f0000001c00)=[{&(0x7f00000017c0)="b4d58b716139fdd811b1f839681917bbb2b7f1e54661bf5261941d09ad6e4300b9670e340b5a20c3a878fdfa23acf72ce8852d4c6441a7d6b7f5b17fa7411f8020b32c45bc5ed72713cb3afd655d40110d6c5bb61116f5e6967784f0e715429de833e5faccb51af7f4307247d8e10fbaafdda9a12fe03dae4eb809480a5879d7aea37938b501e0c0264363372b4214f11d94927b6f2eedac29364227464c9fbf107bb1ab5340aaf8c335f0c06c6fcfef3cc3405dc5b1bbbb1bcf77ba03328cdddab2ac4d36d710e7c4241cd3e33a32d7804d20e6f4aa56d5af465646c04c34a30fda1c0041a6250b930510", 0xeb}, {&(0x7f0000001600)="f30a320a3e83f165ebb91c5f837719877da4e8ebac7c319cdcdf073b2429d763d3c7b56c25cdbf721ce679393ac5138b3bc14d4122ac9e3fe0d55589dc690f41f8ff7e55670ef972820945f70481a00dfb397a90a234", 0x56}, {&(0x7f00000018c0)="a4c97df6c8da9790f38eb21278297dd647ea55c15746fbab0e1f5086b2540dc2de551822e95f1c67a1ac658c3bb9a7ff6a47f63960a743730833f28414bb20df7a6c386b79d16cb746086a9bcfc68bf09fbf8287ffe0237b3961a9fc0cb86039a259414988231ee516b49fc5966a70b9e6cbfff7b2a665d287186c3a5a87cfd9b4476f6fcf1878533eb61e1dc34bbf4d82c545bf6d8e86648b5ebdcab63de89ee95185ad7fc68ee1d6ab71112291b12eb454877e01c69b6007553e5f1af50b6445bcad3bfce5979308000675e1", 0xcd}, {&(0x7f0000001a40)="d4d6f45a79b3f8057d874796ad4a265b44118215541b00a3ee543b8f701846cc4c0e7e440ef72d00470c9c9132ad3f7602dde455d7d253559c3a250f351fd5466f44e53d2576f5b37f5edf43889dea8bb6d31ffb06b990ae14c3c9d20877979a6f8131b7ad3ff20c8aaaa165cc9a6fc5011f2eef6e375acbf06a341b78b1611f618751242e", 0x85}, {&(0x7f0000001b00)="79aed6c7291ec81482e9c8c7d24dc2fd4580bb4a6e1557c2c9762f89efb8cd790b3427b49dd3aa903625d3ddbf306af97f46e241c749e4fbb6b016639627781722d0cd1564c196fb01c12d43ec8923a5bac9787c7c525c32ac168c957bbcf0a70cdb8195bcedc2cee4f1d9ad18bc6fc2320b2ff792019f78babd2001d77cb2b6e9c920e5dab8212f0e5de5bdb87f9687dc3fb05ec8e4ce311b059be6325caa61c1f023f74b6a8c1887727219114a1f7483f3513ea7cfb59ea562bcfa44d84eebdbd3412211bcb15172224f4b20624f4d588647134b68565d5ca79d4d5936cccc1bead5100bf4b515d77a45d6bb94164f34048929f7ccda94e2", 0xf9}], 0x5, &(0x7f0000002f00)=ANY=[@ANYBLOB="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"], 0x1158, 0xc801}, 0x80c0) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000080)) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000019c0)={0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000000140)="0253eea6a53cc0eae389e9a13e5f2046d0633eebde90f446c1b1eabbd0adb42dfcefb37a3df93feb3d5e76dc353ecf23fe9c81afa5", 0x35}, {&(0x7f00000002c0)}, {&(0x7f0000000400)}, {&(0x7f0000001600)}], 0x4, &(0x7f0000001700)=ANY=[@ANYBLOB="680000000000000007010000c17d0425755cd1e9e23de47cb15819d813deb534cee2d9497c58eba5bd8a228407fb709d70f16afa73f4924f12ecc429b6fd356748940b62ee5f5685ce027fe4e6c60a8f88cd1a5827d099f5849f09bd37f681e29814e6bb00000000100000000000000000000000ff010000000050cb000701000001000080000000"], 0x88}, 0x48800) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f00000016c0)) socketpair(0xa, 0x0, 0xfffffffffffffff8, &(0x7f0000001c80)={0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f00000073c0)={0x2, 0x5, &(0x7f0000001e00)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x4}, [@jmp={0x5, 0xffffffffffffff81, 0x2, 0x3, 0xf, 0xffffffc0, 0x1}], {0x95}}, &(0x7f0000001e40)='GPL\x00', 0x6, 0x1000, &(0x7f0000001e80)=""/4096, 0x41100, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000001dc0)={r2, &(0x7f0000001cc0)="6db42b37ab821602610dba4e95fb63b59cd05dddc0ef8ebe14e1b2036c4859238bbad8a3dc7b5c3c55fb85b7bf0d437826d48420944673343d8f29ee83d85e984a1160a411b9477974cae7041a0fd23b912d56410b624ac4fc8c12988083696605f4938e03bcd0f4497e6acf2172712ed3efe8adeabb43d27203e16c06bb738ef04790d0a19f1736f933a75bfdbcc9528318d958a9a4deb8d6eea84d55a0744a3fbeb8da2f0e4c6631a80cb64ab71083", &(0x7f0000001d80)=""/13}, 0x18) recvmsg$kcm(r0, &(0x7f0000000400)={&(0x7f00000001c0)=@alg, 0x80, &(0x7f00000002c0)=[{&(0x7f0000000580)=""/4096, 0x1000}, {}], 0x2, &(0x7f0000000300)=""/158, 0x9e, 0x400000}, 0x100) 2018/03/29 11:56:18 executing program 3: r0 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x10}, 0x10) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000000c0)={0x0, 0x1000, 0x8}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000080)='./file0\x00', r1}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0x0, 0x8}, 0x10) mount(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='cpuset\x00', 0x40, &(0x7f0000000280)="8a4562cb6a7df38be32246afcaef1e1a3f933cb428242c55c117c0fbbd62cea0aab31f2665fb88267466eca314fc8cafd72cc24143121c0691236768fad66390bf9b55014c2bd49faa5388cbabd52e730eeb4ccc411bacd296e423d971043756cf2b35a4063f2a7465b44a60ef31ae437f6160ed2f63afa62c36a27c33e4779e7c0404e337abc025bb2e4b39cc265573c6ab1a3ff09c7ad6bb4631a4") mount(&(0x7f0000000340)='./file1\x00', &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='devtmpfs\x00', 0x40, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xb, 0x7f, 0x0, 0x1, 0x12, r1, 0x100000000}, 0x2c) mkdir(&(0x7f0000000440)='./file1\x00', 0x20) mount(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='iso9660\x00', 0x8, &(0x7f0000000540)="650fe6ccea2b17860de967406c566ec16fe5a7a4c064707e22906e9d3d2a70b4") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000005c0)={r2, 0x28, &(0x7f0000000580)={0x0, 0x0}}, 0x10) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={r3, 0x8, 0x10}, 0xc) mount(&(0x7f0000000640)='./file1\x00', &(0x7f0000000680)='./file1\x00', &(0x7f00000006c0)='pstore\x00', 0x1000000, &(0x7f0000000700)="f48afa3ab3cc319f917be52b04c388c229578537782bc5ffc32c7747b1d28999ad89f5fba460640a324385ac03cccef4553d641b91d79d014804a98e72796f8eb2e1a7056efeaa63404648df67079ae817420f248ccf9d01e7a027c600c71777fb9ebc97da60f3d1a287ef8bc00f1dc68c3b1f0c1836cde5b62be45dd58c3415cbb0f916fe3c04fc69911e2bec15c208d023bdb608fa727657c532bd5101a2a36b34c4eb65f855fea2d6f8a0a79b15ecef1a4c81a8f6f5ed57b09db2ab482413540416126718f2a33ed21346ded20b084a8dc10702ec279fc486b5c57c163d") socketpair(0x3, 0x2, 0x1f, &(0x7f0000001c40)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$kcm(r6, &(0x7f0000004300)={0x0, 0x0, &(0x7f0000004140)=[{&(0x7f0000001c80)=""/139, 0x8b}, {&(0x7f0000001d40)=""/149, 0x95}, {&(0x7f0000001e00)=""/188, 0xbc}, {&(0x7f0000001ec0)=""/69, 0x45}, {&(0x7f0000001f40)=""/165, 0xa5}, {&(0x7f0000002000)=""/4096, 0x1000}, {&(0x7f0000003000)=""/42, 0x2a}, {&(0x7f0000003040)=""/4096, 0x1000}, {&(0x7f0000004040)=""/233, 0xe9}], 0x9, &(0x7f0000004200)=""/236, 0xec, 0xe00}, 0x40) mount(&(0x7f0000004340)='./file1/file0\x00', &(0x7f0000004380)='./file1\x00', &(0x7f00000043c0)='ceph\x00', 0x4860, &(0x7f0000004400)="2c8eb517dd302be26597065442d58f3f345c295b542b2b1df3046ae176") bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000004600)={r6, &(0x7f0000004440)="903685b47b9c4d5c1dffcefa6a92cd57ccdfaf1af0be272f1cb4a5b86ab9d1ef248a63f04f5d59c2cd6e6b7722f5ff866c5d353014f28baaa95bce06a787a3e085102126a0386ffd4e136d472f2cdfb7c658643d2792b7235e2ec8c782080850c20eb00014eab035d7d56c8ddd0d7fdc4c21602d480e4accea0867cc5b4172b46b8f028bd623c58544092396dbda704543cd7c93219ff7f4caf9d0c12fc32c65ddac48ba22321d2c7ef1152f0dd87ed22cb30eb2b24d381b3abaefc114ad4c08e329cfbce60e0549ca", &(0x7f0000004540)="38859653237c5c9685cf2e44e1eea64846e190b778f29b06c26c2f2b8a0800f9fc2019b05290fc5c82f612eb7f479918015eb3af93cc57f01db731e129275ce05910f66e436ef09a8fe7bf22f960eacec350a7f7e9e9a47cb163f467b6a29523346a4c61d65d2235c73095a53929d509538f640424133cfa3617b41a51aa7172460146433abbe604f2c92827fabd5d3134d36b4cecd0fd2549f3527615f9eb63dd9332021e4eff13ad6aa509db21ed98745d00cb36e547", 0x3}, 0x20) mkdir(&(0x7f0000004640)='./file1/file0\x00', 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000004680)={0x0, 0x0, 0xa6, 0x3, 0x4}, 0x2c) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000046c0)=0x7, 0x4) recvmsg$kcm(r6, &(0x7f00000058c0)={&(0x7f0000004700)=@alg, 0x80, &(0x7f0000005880)=[{&(0x7f0000004780)=""/4096, 0x1000}, {&(0x7f0000005780)=""/219, 0xdb}], 0x2, 0x0, 0x0, 0x100000001}, 0x40000000) r7 = gettid() r8 = perf_event_open(&(0x7f0000005900)={0x7, 0x70, 0x0, 0xfffffffffffffff7, 0x9, 0x4, 0x0, 0x7, 0x100, 0x8, 0x100000000, 0x8000, 0x8, 0x6, 0x0, 0x6, 0x10001, 0x9, 0x1f, 0x2, 0x1, 0x3, 0x1, 0x1f, 0x23, 0x1, 0xaa4, 0x5, 0x4, 0x200, 0x6, 0x9, 0xfffffffffffffffb, 0x3, 0x3, 0xff, 0x80000000, 0x0, 0x0, 0xffffffffffffff9d, 0x2, @perf_config_ext={0x7, 0x9}, 0x100, 0x8, 0x2, 0x6, 0x4, 0x6, 0xf71}, r7, 0x9, r6, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f00000059c0)={&(0x7f0000005980)='./file0\x00'}, 0x10) ioctl$sock_kcm_SIOCKCMATTACH(r5, 0x89e0, &(0x7f0000005a00)={r5, r0}) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000005c00)={r4, &(0x7f0000005a40)="313befc1e9ac680c4369983530ee783c4f018c38e134b4b0aebd06ede05f238850949c0f5d32ab19889f880e87e3a0fa5a43500affdcc508d56f3a4df6c159ca9cfa62124b79b4607d42738dc5e16d09ea2c6a2346fc2360feff08d9f464dfdebce2cb99d4ba8e5fc37edfba041f14e16a68192d7d8687404ee7318323520188c4e5d52e8c7ec40bd0823fb210e530c74ea842bd8bacbc48317b0b6ed12528ecd30e1af83b8049df791ff7affe91ab54", &(0x7f0000005b00)=""/243}, 0x18) mount(&(0x7f0000005c40)='./file1/file0\x00', &(0x7f0000005c80)='./file1\x00', &(0x7f0000005cc0)='btrfs\x00', 0x0, 0x0) recvmsg(r5, &(0x7f00000073c0)={&(0x7f0000005d00)=@sco, 0x80, &(0x7f0000007300)=[{&(0x7f0000005d80)=""/103, 0x67}, {&(0x7f0000005e00)=""/170, 0xaa}, {&(0x7f0000005ec0)=""/252, 0xfc}, {&(0x7f0000005fc0)=""/136, 0x88}, {&(0x7f0000006080)=""/125, 0x7d}, {&(0x7f0000006100)=""/4096, 0x1000}, {&(0x7f0000007100)=""/106, 0x6a}, {&(0x7f0000007180)=""/115, 0x73}, {&(0x7f0000007200)=""/240, 0xf0}], 0x9, 0x0, 0x0, 0x7}, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000007400)={r3, 0x10001, 0x18}, 0xc) ioctl$PERF_EVENT_IOC_REFRESH(r8, 0x2402, 0xc4c) recvmsg$kcm(r6, &(0x7f0000008880)={&(0x7f0000007440)=@l2, 0x80, &(0x7f0000008800)=[{&(0x7f00000074c0)=""/231, 0xe7}, {&(0x7f0000007640)=""/4096, 0x1000}, {&(0x7f0000008640)=""/223, 0xdf}, {&(0x7f0000008740)}, {&(0x7f0000008780)=""/32, 0x20}, {&(0x7f00000087c0)=""/53, 0x35}], 0x6}, 0x10000) 2018/03/29 11:56:18 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x1e1, 0x100000000209e20, 0x8000000001, 0x5}, 0xfffffffffffffe20) r0 = getpid() r1 = perf_event_open(&(0x7f0000000a00)={0x0, 0x70, 0xfffffffffffffffc, 0x3, 0x8, 0x2, 0x0, 0x9, 0x10000, 0xc, 0x3d3, 0x80, 0x5, 0xfffffffffffffffc, 0x8, 0x3f, 0x5d, 0xbbb0, 0x20, 0x3, 0x8000, 0x100000000, 0x8, 0x9, 0x2, 0x4, 0x800, 0xf8, 0x3, 0x9, 0x1, 0x3, 0x8, 0x3, 0x7, 0x10001, 0xf16, 0x2, 0x0, 0x7fffffff, 0x4, @perf_bp={&(0x7f0000000780), 0x1}, 0x4080, 0x10001, 0xcc, 0x7, 0x3, 0xffff, 0x7fffffff}, 0xffffffffffffffff, 0xd, 0xffffffffffffff9c, 0x8) perf_event_open(&(0x7f0000000980)={0x4, 0x70, 0x6, 0x3f, 0x8e, 0x1, 0x0, 0x3, 0x404, 0x0, 0xbc2b, 0x40, 0x7, 0xffff, 0xffff, 0x9, 0x9de2, 0x9, 0x0, 0x3, 0x7f, 0xff, 0x40, 0x400, 0x9, 0x7fffffff, 0x80000000, 0x7, 0x8, 0x10001, 0x1f, 0x2778, 0x800, 0x8001, 0x101, 0x9, 0x8, 0x7ff, 0x0, 0x1000, 0x5, @perf_config_ext={0x3ff, 0xb69b}, 0x3040, 0x2, 0x2, 0x5, 0x7, 0x6, 0x7283ed73}, r0, 0xe, r1, 0x8) bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x0, 0x0, 0x7ffff9, 0x0, 0x20000003, 0x0}, 0x2c) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) r2 = gettid() r3 = perf_event_open(&(0x7f00000008c0)={0x7, 0x70, 0x1, 0x200, 0x3, 0xdbce, 0x0, 0x8, 0x1002, 0x1, 0xffffffffffffff00, 0x8, 0x1, 0xb3fa, 0x8, 0x0, 0x1, 0x2, 0x1000, 0x2, 0x401, 0x8, 0x3, 0x81, 0x0, 0x7, 0x2fc4, 0x882, 0x4, 0x8, 0x3, 0x81, 0x3, 0x7, 0x8857, 0x7, 0x5, 0x9, 0x0, 0x7, 0x1, @perf_config_ext={0x0, 0x80000000}, 0x400, 0x7f, 0x4, 0x7, 0x2, 0x7f, 0x200}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000840)={0x5, 0x70, 0xef, 0x2, 0x1000, 0xffffffff80000000, 0x0, 0x1a7800000000, 0x2000, 0x4, 0x5, 0x6814, 0x3a9, 0x5, 0x63b, 0x6, 0x8, 0x1000, 0x250420ee, 0x3, 0x0, 0x20, 0x6, 0x0, 0x4, 0x5, 0x4, 0x8, 0x3, 0x8, 0x52893dd5, 0x2, 0x2, 0x8, 0x44d, 0x1, 0x8, 0x6, 0x0, 0x100000000, 0x0, @perf_config_ext={0x9, 0x80}, 0x0, 0x0, 0x2b67, 0x6, 0x4b0, 0x81, 0x4}, r2, 0x5, r3, 0xb) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1003, 0x0) mount(&(0x7f00002b9ff8)='./file0\x00', &(0x7f0000cbeff8)='./file0\x00', &(0x7f00005f7ffa)='ramfs\x00', 0x80000, &(0x7f000002f000)) mount(&(0x7f0000000000)='.', &(0x7f0000000040)='.', &(0x7f0000000080)='cgroup\x00', 0x5010, &(0x7f00000000c0)) mount(&(0x7f0000377ff8)='.', &(0x7f0000000280)='.', &(0x7f0000000600)='nfs4\x00', 0x5010, &(0x7f0000000300)="2161893416a0c71070768c219eb114c3253c9f3baf4e9e8e9111c1a7fc6e266009fe27243deeaa22ca7ae9341f714300b5ee807e55d609036f2a3260475922bdfb2d2849f1c3b2ad3c051bd4f3751a177f77a92758c6d2b23fe7f1535b54e5846d11c135de8286066dec1b25f6e1378944ac5f7fce42d055821b5e19") perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xd68, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f0000014f88)={0x5, 0xfffffffffffffdc4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x46000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = getpid() perf_event_open(&(0x7f0000000680)={0x4, 0x70, 0x64, 0xffff, 0x1f, 0x4, 0x0, 0x1c3, 0x0, 0x1, 0x1, 0x9, 0x1ff, 0xfffffffffffffff8, 0x0, 0x0, 0x6, 0x7fffffff, 0x0, 0xffffffff, 0x80000001, 0xd0, 0x7, 0x1f, 0x0, 0x8, 0x9, 0x1ff, 0x8, 0x785, 0x4, 0xff, 0x2, 0x656, 0x5000000, 0x1, 0x460e3be0, 0x1, 0x0, 0x0, 0x7, @perf_bp={&(0x7f0000000640), 0x1}, 0x1000, 0xa, 0x7fff, 0x7, 0x3, 0x400, 0x9}, r5, 0xe, r4, 0x1) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', 0x0, 0x10}, 0x10) close(0xffffffffffffffff) bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)={&(0x7f0000000040)='./file0\x00', 0x0, 0x18}, 0x10) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000100)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0, 0x2e, &(0x7f0000000440), &(0x7f0000000140)=""/46, 0x4229}, 0x28) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000003480)={&(0x7f0000003300)=@can={0x0, 0x0}, 0x80, &(0x7f0000003400)=[{&(0x7f0000003380)=""/56, 0x38}, {&(0x7f00000033c0)=""/1, 0x1}], 0x2, &(0x7f0000003440)=""/33, 0x21, 0x1}, 0x40010000) bpf$PROG_LOAD(0x5, &(0x7f00000034c0)={0xe, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="1800000002000000000000004ce700002555fdff00000000002371d07c9ba7f4a23372b0ad61000000000000009500000000000000"], &(0x7f00000007c0)='GPL\x00', 0x3, 0x2d, &(0x7f0000000800)=""/45, 0x40f00, 0x1, [], r6}, 0x48) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000740)={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x10) socketpair$inet(0x2, 0x80a, 0x81, &(0x7f0000000240)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={0xffffffffffffffff, &(0x7f0000000500)="ae30f1bca1b4d3f69f1aac81517d42ad5980bc63b5008616a1f4724b9f8c1e4ecd8de336f57dd727cdaab04f0b40f28612615ad08de414711d841a88db33fd33884b627074213a0c5de3be2bbaec9207d9865c47f240467849979b5ab5632376608fc4be41a274abb2dc07cabe344a18db51048e5b0cbda843905a4258cdee3e649eddf104ba78894dce09747dcfe6a8d6d6d985520eeef448b83a8bcb83074541ba7a20d6094aa206c01a0690e5b3bfa05d475eb382b0199031d22bb26cde9b1ca0055eef9f6c4993b71ba19ba0590bb5efdaddaa574c25356ca890d138fc9fe0e975b6d5a1a8251503cd0a91845f9d95", &(0x7f0000000480)="9bc7741ea5e524cc8c6f748a73153834428729c45bf4ad446d2dddf1978baf431d0ba35b5442b5afe22db8b003650320200af7e1368ef7cdfa79ca8b9d3564363a5d2a502970314f2264c883bc8d990afc003e5adb95b30edad245c4420c8126f1d33db75ff0230698eaff90055e0f", 0x2}, 0x20) socketpair(0x0, 0x80003, 0xffff, &(0x7f0000000380)={0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r7, 0x50, &(0x7f00000003c0)}, 0x10) 2018/03/29 11:56:18 executing program 3: r0 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x10}, 0x10) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000000c0)={0x0, 0x1000, 0x8}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000080)='./file0\x00', r1}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0x0, 0x8}, 0x10) mount(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='cpuset\x00', 0x40, &(0x7f0000000280)="8a4562cb6a7df38be32246afcaef1e1a3f933cb428242c55c117c0fbbd62cea0aab31f2665fb88267466eca314fc8cafd72cc24143121c0691236768fad66390bf9b55014c2bd49faa5388cbabd52e730eeb4ccc411bacd296e423d971043756cf2b35a4063f2a7465b44a60ef31ae437f6160ed2f63afa62c36a27c33e4779e7c0404e337abc025bb2e4b39cc265573c6ab1a3ff09c7ad6bb4631a4") mount(&(0x7f0000000340)='./file1\x00', &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='devtmpfs\x00', 0x40, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xb, 0x7f, 0x0, 0x1, 0x12, r1, 0x100000000}, 0x2c) mkdir(&(0x7f0000000440)='./file1\x00', 0x20) mount(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='iso9660\x00', 0x8, &(0x7f0000000540)="650fe6ccea2b17860de967406c566ec16fe5a7a4c064707e22906e9d3d2a70b4") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000005c0)={r2, 0x28, &(0x7f0000000580)={0x0, 0x0}}, 0x10) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={r3, 0x8, 0x10}, 0xc) mount(&(0x7f0000000640)='./file1\x00', &(0x7f0000000680)='./file1\x00', &(0x7f00000006c0)='pstore\x00', 0x1000000, &(0x7f0000000700)="f48afa3ab3cc319f917be52b04c388c229578537782bc5ffc32c7747b1d28999ad89f5fba460640a324385ac03cccef4553d641b91d79d014804a98e72796f8eb2e1a7056efeaa63404648df67079ae817420f248ccf9d01e7a027c600c71777fb9ebc97da60f3d1a287ef8bc00f1dc68c3b1f0c1836cde5b62be45dd58c3415cbb0f916fe3c04fc69911e2bec15c208d023bdb608fa727657c532bd5101a2a36b34c4eb65f855fea2d6f8a0a79b15ecef1a4c81a8f6f5ed57b09db2ab482413540416126718f2a33ed21346ded20b084a8dc10702ec279fc486b5c57c163d") socketpair(0x3, 0x2, 0x1f, &(0x7f0000001c40)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$kcm(r6, &(0x7f0000004300)={0x0, 0x0, &(0x7f0000004140)=[{&(0x7f0000001c80)=""/139, 0x8b}, {&(0x7f0000001d40)=""/149, 0x95}, {&(0x7f0000001e00)=""/188, 0xbc}, {&(0x7f0000001ec0)=""/69, 0x45}, {&(0x7f0000001f40)=""/165, 0xa5}, {&(0x7f0000002000)=""/4096, 0x1000}, {&(0x7f0000003000)=""/42, 0x2a}, {&(0x7f0000003040)=""/4096, 0x1000}, {&(0x7f0000004040)=""/233, 0xe9}], 0x9, &(0x7f0000004200)=""/236, 0xec, 0xe00}, 0x40) mount(&(0x7f0000004340)='./file1/file0\x00', &(0x7f0000004380)='./file1\x00', &(0x7f00000043c0)='ceph\x00', 0x4860, &(0x7f0000004400)="2c8eb517dd302be26597065442d58f3f345c295b542b2b1df3046ae176") bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000004600)={r6, &(0x7f0000004440)="903685b47b9c4d5c1dffcefa6a92cd57ccdfaf1af0be272f1cb4a5b86ab9d1ef248a63f04f5d59c2cd6e6b7722f5ff866c5d353014f28baaa95bce06a787a3e085102126a0386ffd4e136d472f2cdfb7c658643d2792b7235e2ec8c782080850c20eb00014eab035d7d56c8ddd0d7fdc4c21602d480e4accea0867cc5b4172b46b8f028bd623c58544092396dbda704543cd7c93219ff7f4caf9d0c12fc32c65ddac48ba22321d2c7ef1152f0dd87ed22cb30eb2b24d381b3abaefc114ad4c08e329cfbce60e0549ca", &(0x7f0000004540)="38859653237c5c9685cf2e44e1eea64846e190b778f29b06c26c2f2b8a0800f9fc2019b05290fc5c82f612eb7f479918015eb3af93cc57f01db731e129275ce05910f66e436ef09a8fe7bf22f960eacec350a7f7e9e9a47cb163f467b6a29523346a4c61d65d2235c73095a53929d509538f640424133cfa3617b41a51aa7172460146433abbe604f2c92827fabd5d3134d36b4cecd0fd2549f3527615f9eb63dd9332021e4eff13ad6aa509db21ed98745d00cb36e547", 0x3}, 0x20) mkdir(&(0x7f0000004640)='./file1/file0\x00', 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000004680)={0x0, 0x0, 0xa6, 0x3, 0x4}, 0x2c) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000046c0)=0x7, 0x4) recvmsg$kcm(r6, &(0x7f00000058c0)={&(0x7f0000004700)=@alg, 0x80, &(0x7f0000005880)=[{&(0x7f0000004780)=""/4096, 0x1000}, {&(0x7f0000005780)=""/219, 0xdb}], 0x2, 0x0, 0x0, 0x100000001}, 0x40000000) r7 = gettid() r8 = perf_event_open(&(0x7f0000005900)={0x7, 0x70, 0x0, 0xfffffffffffffff7, 0x9, 0x4, 0x0, 0x7, 0x100, 0x8, 0x100000000, 0x8000, 0x8, 0x6, 0x0, 0x6, 0x10001, 0x9, 0x1f, 0x2, 0x1, 0x3, 0x1, 0x1f, 0x23, 0x1, 0xaa4, 0x5, 0x4, 0x200, 0x6, 0x9, 0xfffffffffffffffb, 0x3, 0x3, 0xff, 0x80000000, 0x0, 0x0, 0xffffffffffffff9d, 0x2, @perf_config_ext={0x7, 0x9}, 0x100, 0x8, 0x2, 0x6, 0x4, 0x6, 0xf71}, r7, 0x9, r6, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f00000059c0)={&(0x7f0000005980)='./file0\x00'}, 0x10) ioctl$sock_kcm_SIOCKCMATTACH(r5, 0x89e0, &(0x7f0000005a00)={r5, r0}) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000005c00)={r4, &(0x7f0000005a40)="313befc1e9ac680c4369983530ee783c4f018c38e134b4b0aebd06ede05f238850949c0f5d32ab19889f880e87e3a0fa5a43500affdcc508d56f3a4df6c159ca9cfa62124b79b4607d42738dc5e16d09ea2c6a2346fc2360feff08d9f464dfdebce2cb99d4ba8e5fc37edfba041f14e16a68192d7d8687404ee7318323520188c4e5d52e8c7ec40bd0823fb210e530c74ea842bd8bacbc48317b0b6ed12528ecd30e1af83b8049df791ff7affe91ab54", &(0x7f0000005b00)=""/243}, 0x18) mount(&(0x7f0000005c40)='./file1/file0\x00', &(0x7f0000005c80)='./file1\x00', &(0x7f0000005cc0)='btrfs\x00', 0x0, 0x0) recvmsg(r5, &(0x7f00000073c0)={&(0x7f0000005d00)=@sco, 0x80, &(0x7f0000007300)=[{&(0x7f0000005d80)=""/103, 0x67}, {&(0x7f0000005e00)=""/170, 0xaa}, {&(0x7f0000005ec0)=""/252, 0xfc}, {&(0x7f0000005fc0)=""/136, 0x88}, {&(0x7f0000006080)=""/125, 0x7d}, {&(0x7f0000006100)=""/4096, 0x1000}, {&(0x7f0000007100)=""/106, 0x6a}, {&(0x7f0000007180)=""/115, 0x73}, {&(0x7f0000007200)=""/240, 0xf0}], 0x9, 0x0, 0x0, 0x7}, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000007400)={r3, 0x10001, 0x18}, 0xc) ioctl$PERF_EVENT_IOC_REFRESH(r8, 0x2402, 0xc4c) recvmsg$kcm(r6, &(0x7f0000008880)={&(0x7f0000007440)=@l2, 0x80, &(0x7f0000008800)=[{&(0x7f00000074c0)=""/231, 0xe7}, {&(0x7f0000007640)=""/4096, 0x1000}, {&(0x7f0000008640)=""/223, 0xdf}, {&(0x7f0000008740)}, {&(0x7f0000008780)=""/32, 0x20}, {&(0x7f00000087c0)=""/53, 0x35}], 0x6}, 0x10000) [ 825.152260] IPVS: ftp: loaded support on port[0] = 21 [ 826.128464] IPVS: ftp: loaded support on port[0] = 21 [ 826.155069] IPVS: ftp: loaded support on port[0] = 21 [ 826.187911] IPVS: ftp: loaded support on port[0] = 21 [ 826.234998] FAULT_INJECTION: forcing a failure. [ 826.234998] name failslab, interval 1, probability 0, space 0, times 0 [ 826.246338] CPU: 1 PID: 27062 Comm: syz-executor4 Not tainted 4.16.0-rc6+ #40 [ 826.253599] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 826.262932] Call Trace: [ 826.265508] dump_stack+0x194/0x24d [ 826.269217] ? arch_local_irq_restore+0x53/0x53 [ 826.273876] should_fail+0x8c0/0xa40 [ 826.277570] ? __free_insn_slot+0x5c0/0x5c0 [ 826.281873] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 826.286960] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 826.292137] ? __lock_acquire+0x664/0x3e00 [ 826.296358] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 826.301573] ? find_held_lock+0x35/0x1d0 [ 826.305636] ? __lock_is_held+0xb6/0x140 [ 826.309688] ? check_same_owner+0x320/0x320 [ 826.314004] ? __d_lookup+0x4f4/0x830 [ 826.317802] ? rcu_note_context_switch+0x710/0x710 [ 826.322735] should_failslab+0xec/0x120 [ 826.326696] kmem_cache_alloc+0x47/0x760 [ 826.330750] __d_alloc+0xc1/0xbd0 [ 826.334187] ? shrink_dcache_for_umount+0x290/0x290 [ 826.339186] ? d_alloc_parallel+0x1b40/0x1b40 [ 826.343662] ? lock_release+0xa40/0xa40 [ 826.347618] ? mark_held_locks+0xaf/0x100 [ 826.351742] ? d_lookup+0x133/0x2e0 [ 826.355352] ? d_lookup+0x1d5/0x2e0 [ 826.358959] d_alloc+0x8e/0x340 [ 826.362224] ? __d_alloc+0xbd0/0xbd0 [ 826.365918] ? full_name_hash+0x9b/0xe0 [ 826.369880] __rpc_lookup_create_exclusive+0x183/0x1d0 [ 826.375147] ? rpc_d_lookup_sb+0x1a0/0x1a0 [ 826.379381] rpc_populate.constprop.15+0xa3/0x340 [ 826.384211] rpc_fill_super+0x379/0xae0 [ 826.388168] ? cap_capable+0x1b5/0x230 [ 826.392127] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 826.397298] ? security_capable+0x8e/0xc0 [ 826.401434] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 826.406605] ? ns_capable_common+0xcf/0x160 [ 826.410905] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 826.416082] mount_ns+0xc4/0x190 [ 826.419431] rpc_mount+0x9e/0xd0 [ 826.422790] mount_fs+0x66/0x2d0 [ 826.426236] vfs_kern_mount.part.26+0xc6/0x4a0 [ 826.430804] ? may_umount+0xa0/0xa0 [ 826.434421] ? _raw_read_unlock+0x22/0x30 [ 826.438556] ? __get_fs_type+0x8a/0xc0 [ 826.442429] do_mount+0xea4/0x2bb0 [ 826.445957] ? copy_mount_string+0x40/0x40 [ 826.450174] ? rcu_pm_notify+0xc0/0xc0 [ 826.454066] ? copy_mount_options+0x5f/0x2e0 [ 826.458459] ? rcu_read_lock_sched_held+0x108/0x120 [ 826.463463] ? kmem_cache_alloc_trace+0x459/0x740 [ 826.468293] ? kasan_check_write+0x14/0x20 [ 826.472513] ? copy_mount_options+0x1f7/0x2e0 [ 826.476996] SyS_mount+0xab/0x120 [ 826.480429] ? copy_mnt_ns+0xb30/0xb30 [ 826.484294] do_syscall_64+0x281/0x940 [ 826.488157] ? __do_page_fault+0xc90/0xc90 [ 826.492366] ? _raw_spin_unlock_irq+0x27/0x70 [ 826.496839] ? finish_task_switch+0x1c1/0x7e0 [ 826.501316] ? syscall_return_slowpath+0x550/0x550 [ 826.506227] ? syscall_return_slowpath+0x2ac/0x550 [ 826.511138] ? prepare_exit_to_usermode+0x350/0x350 [ 826.516146] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 826.521502] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 826.526329] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 826.531501] RIP: 0033:0x4548b9 [ 826.534668] RSP: 002b:00007f56e59a9c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 826.542394] RAX: ffffffffffffffda RBX: 00007f56e59aa6d4 RCX: 00000000004548b9 [ 826.549650] RDX: 00000000200002c0 RSI: 0000000020000140 RDI: 0000000020000300 [ 826.556897] RBP: 000000000072bea0 R08: 0000000020000200 R09: 0000000000000000 [ 826.564150] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 826.571398] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000037 2018/03/29 11:56:21 executing program 0: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000001a00)) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000001a40)={0xffffffffffffffff}) sendmsg$kcm(r0, &(0x7f0000000000)={&(0x7f0000000180)=@pppoe={0x18, 0x0, {0x4, @empty, 'eql\x00'}}, 0x80, &(0x7f0000000900)=[{&(0x7f00000002c0)="afc067927e14a740ac7bdc22ec6102a6b888b5678ecbaa065a09d88db2acf1b5fe63c7696a97114575f6cb3e3cf35ae8d89b7529c41b630fdcca645bc144ae4bc95b28f19852cc848708086071fd0dd906c240cb4adc6a03602fc39f0fc692b29c90f6cb7c9b251178b51edbe13966c8a8b553e44da95597aa96398a3fc6ef47434d7eafe22f41e6a62f0a47ed73d1577948c2e3346b539392066c5d6d3516d66f74b0fc0d883ffe8ca5b23e01d6117f6e185fdd7c", 0xb5}, {&(0x7f0000000580)="aaae0c963f6a34ac9237e94a05edbfb1c771f1b99198ff0d07f6ff04758398670f4db325e1fe039ed5dc2c101eaf803e791f698eaad809be5b65a6c958ca1e52957a9b205407ef585241fc398c2c228629facf5ab6b952a0511554d221daf7897227b195ebf528f32ffdf99417b153c83619f28a5cf718b2e5498c6783395ee090af45173db06ac649d18685316d968d66f148d020cf5034f5db99fcc708ce4c00", 0xa1}, {&(0x7f0000000640)="06c529c48026b35e6be4aa03b359abad8463145905516b77c00518e2cdcd1d2f00d5eb658f74713b2077b29888a43cc53fceba7ed0a13537cfc08b2a7a2aa5c52fe1af8ef39f76c3540a69ce55ca9b24414c72ff751a28f53fc3b0c67061ec18e84bdc47981ed93a677a378984b14ff0ca081e2ac269cdf5a50d93b8cb21e092d8dd714b744a13b0322e74d5bb6945a1f25ae4514a10c52924c2ee049ef063b84b3afcd37a938d43984210b56cb69c2936bed4bda11fc038aee21998b2d599ec70aa560c1e68aa09c16727dc8aed020d4be4eefaa7427f2d1b554249c02d597b717090", 0xe3}, {&(0x7f0000000740)="b4d226fa497fd353c4f1f6088f6f2f27a2ee173e747b06686d3dcfa38b760f05e4b6432c7adcb00ff97b0806f2262c6b39ae68c5fab054090d62843b3710050f03b432e02a9c292843c4e96e3cc8454e680fe665e59215a7646ea020011268ca99fc5e28671357af0132ad25a1debd67fa61b68f9ee7d3d2b5fa5ec4511205b212ab1fc0bb5ed6d8e8160bf3ca84431041d32c1fb5238d202e48897b09cf0e7206b64ca588", 0xa5}, {&(0x7f0000000800)="9e7250ebd9c65043a2ee92d5946799c7694e6fb1ff5f90fa27ba847525314a2d022b9516f64d110e52e9abec2015d8b2601ac23369a0f2814fd9080b3d9ba1cb6023c6537d08a963131468af7e44008eebd7a128ee4ae78dcf836f8f4bcbd580c3e097e8254a7a4ff40a5b9c7ec567d169cd60124a0f7ec882699e27a46b960130623c98855dde16611b3988640671652237aa11f4fb1a1a5b68334280774d788b2200ede0324fc2eb59901cb51a887dbad888db261ea78f8f1fee9518d27c207b98ad3fc0ef51475da633f92531365f58dbe53972", 0xd5}], 0x5, &(0x7f0000000980)=[{0xb0, 0x11, 0x9, "2d7d627fc1d8aa18561d896b25d89e2ca3f61816e0de2f14b7817cf4a3d14dac325cf3875735879fb0a83d850c30b2b7ff433780cc895444e218b2e6e0fd35ef920473b1fd725f051550afc438d5f8ba8eef447e61d294a92c2b231266589f5d63b00b8c3b88cbb5ea1dcead18d1546ded41b69f30ef541ead27c59addf21abcf730799382d39b329e94ad935139cf74712698e222221df5e282"}], 0xb0, 0x800}, 0x40001) recvmsg$kcm(r1, &(0x7f0000000540)={&(0x7f00000000c0)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @broadcast}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000240)=""/65, 0x41}], 0x1, &(0x7f0000000440)=""/213, 0xd5}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x8983, &(0x7f0000000040)) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000080)) sendmsg(r1, &(0x7f0000000e00)={0x0, 0x0, &(0x7f0000000d80)=[{&(0x7f0000000200)="48d6c9", 0x3}, {&(0x7f0000000a40)="42dc6afc7f0b25faf08ce3fc532544f6f5e3f6c15ddb954e98c2c10da5e59d715e70cbf477be7f8a6535eedb41accf906b954dcf327d372d0a93d9e48eb86850ca37fe572b13e95f7402e14558d3e4eb2b997bd09891831ec74a8faba890029db6d2deba1c0b4f6a96c102c76f68df8653a9247e7cc767e1da36e6f411a0fd14896a9d5239ac0665ed1f8862b932f15c21ab46bc3e43cf4285c7d107a48c62370210771117c06f708097abd0a3", 0xad}, {&(0x7f0000000b00)="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", 0xfa}, {&(0x7f0000000c00)="fe85070b240fad28ce2fa12b95481fc34fc6bbbcdb1679facd2567f4fc141436181c7f3391bd1dab46e6f82676a4e80da63617bef819bac61510bf26dd5737674c887e19e0eb5317e2139ce742a7bd56f5c2e4869e60c4de5c9c019fd5c7a914a5", 0x61}, {&(0x7f0000000c80)="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", 0xfa}, {&(0x7f0000001a80)="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", 0x1000}, {&(0x7f0000000380)="001c8cb6ec009deb062616f64cbfbbb3a9770132cc8969a50098231f95e8cb15f7052c1bc7dffc0e1014d4f9", 0x2c}, {&(0x7f0000000400)="55ae57cd42356a0fda6e4ba9ff44c72f5e1bd6900ca5678298", 0x19}], 0x8, &(0x7f0000002a80)=[{0x1010, 0xddf5b5f10c8e8222, 0xfa4f, "10f55ccca352d8a680a81c026ace67e9fcc6c7fe0d7ccfe4269338a44e35f2b2216be4bb2ff25ac1b8097ba6e6c1ed3edbd8f1db2d35b87014eef4a64bbf1271f8970a5625cf61c52ec045cc87f4d99bb0ab0a3363372c2d3a7e7196713e2a370d2be45a5d8c64ecf06d65727b705c0af00c7be1a5e23667e2acd56913055e6ded12e029809e04afe53f4fc7d01b6b24a633e6c66df5dae57e0e1a2798ce716b5c6a2be081094c20d52050209e3f4b4321f5349ae88a8f71c2588499506ce2c9040f028e51c829df2d422fa07c02111c64376a1ad8bc05721a4eacc309f02d494c433b4665934f866ee82e4b7f5507fcf680f8f217b37ff2b130f3d399149595dca1a7fc2d4c90cb5e9efd8def03bcff7fba4e5525cab3d1e51c4fbc081221aa7e61666aa8597cf2acc2ceb10304b2a78787094ef979c793ae5ae7365283b1c9b988bcc7e8ec71a85246629ea07bb8e30d6b890ea6b78e26e8f150cd72366990101a1cd3b8f3cd3b625cb826d5b73f32206aade00f70d92449716e28134529803a8e313f6ab9ccf7a4a5a7d01e29e6d23423785e2649a35d951cab1a349a18bf1c4844eaeebc4ddc772d1b7decafcfefb5270e777c0ede78736e5f123edddf5ea5aa34e039416e328dfce0e48cabdc04459fbac9639ae6a6b75547acbf4ca4e5282f8d40677138ee254f1157b95036aadeec2833964e686f61240a6e01aa9c0e2ee9d01f0d3adf800e3de6e0d336009cbcf297f3bce8ff394260d0ca1659a8bd98a3dae43df0dfabd61138169c052132be525b0683fe08d3c0eef839c1de73fd5186ccd17e57959e24bbff4fb8eb4d36b660eaad7149d4f188a377f4056ad4c9d96a382d617f5e0fce04f4bb9cd9206556d719295087d7f3cf9b01065cc769619e0525dcd36931922ec51754e9008305582c695f752229e0e6994bf38f319bdf693e799d2e870fd11edbe9320f0e36c96a267ca7221bea875be9c38cbb16e7dd1a99826c04e0fbcee6d8e0db829be8d06b218cdac270a950df6265f3eaea19c91625c93a67674acce5061d17c72b704b190ff6fb364257b6fc4076aa252abb921509cdaa3ce26e3e90b144a8ad4dedbd046283b8aa9daba2d992d7374db60004abbe80e8bbe5c72c7c72014dcd28750cf403beb3a04263faf983d54107ca4e6e75fa98c199d38476bcee3a788fc8da6a7e4978e384fe4a47ce188e99644e8029d75d5d17fa0114338f863166f8c169548428bf5df71450442b1dc1fccebd839ec7bc42c283cc7a84b69e4c040b0e6ff1e8a8541f569afde0ec15fb6ad89aca3d8d15f3524be6cb7b274837ec6e4815a94af24d1f55bdaef7c36ea85b69789e46e387fa349bef574ce413109844fb490747c77991dcdd0545405401f420ab1b225e9d60f7938e684ef68733841cd1bc4eed8e84ef840bc4dfe9912151b2e0ea8d935dfae5b8831ecee318bd6359f51a70b9248049b81b5be2acefc382868dab93683843bdfa18d0399fb97764e329ba46a46688e483a28c7f82c31ec199710e9e3c82432525d930884a0bda8f913d752c5a9e2d2f100242e69bc65c3b222bd708544e69861e647e5885b5f962d064ea3d1b6f501900fa3b56945f5048c0a07f02f75e0cfc4ed7bf265663345e01efef41f122c2c5c08ba03a73afd80de37e0bc077b479d376ec38229cec65b45525d1809e78c2649b20d8531f9e3d3c574312ee138220ae9fb4cc7cfcb72a443489def41efcb04abc73e326e8e5196c5fae5ce70d6ca44dfb0e6f330a58a9ebf5a4b1734ec8fcd519bc6f4ee7417ac3b6b8b0268c662cb37793dde2bad2c43060e8a955b30f051d00a30a79b8a6a5797940d2340a3c90842ab3ea41bb8cca461e6e5d17b4f512062ea469af9c05ac624efcf2d16c6da0ef4cce6f72859fdae6ec0abc27ae337e79677c8f2dc9c1b5ffba4dd08a3528486a127e40d397df6f0a8810e9db6bd8071323ca0757eb5cec4618d16996fc9c570cffc827b7c895ac1d7135ad7305b512ad3fb1d1b9a92ca53c28505d653c8ae45c9845025c28ad2767d6bde98a09f097fed1c133073a2b85ca03d64ea9defc90bd66af5467da510535fec1979617d3e017c3eff8f79abeb4f802b828a6b160bf341636f79ac534ea247bcf9f448f618cfae7f8ef5b4906c28185bfe23f88421a48bbe43896961f2ee90ccb62fa19da868170258ba051632e2da9fe2f8cdcad43a10d58f0ee8cc83fe974c24819fc84cd6c6230f82a95bc81ebf23991bcb414eca69496f25f36cf89c9330b4adf5ff05d24fb11ad5803a6f18cc6d7975084a81836fc854b724687240ef4d4be8aaeb67200856d61edc25b62f69734a35114ae96022cf303a61063c1cf6fd2170dfc8481dbae8b47a97be756468f7fd4eaf648da3786703a1cc484bb37799d7cb80369b9f45fdb2b9d2385e94993adc63dd87376b6634f1ab8bc338d562eee136a182f1690b7a206e8c72a99c5d67dc38ef523cf2eef83154e5bcf1cb6e7f1fa19c874267fc0b7706a499d41cda3868f16f9093403e6201a8b47aeba18a6574081b74ba6b66893385835d45c852c1eba767d398925353ca288587ba763b787f34d898df80014f07fd8d4a6359f97d1aa5586a1d1c87bd26302833ea77690a3ade085b1e9066304e5daa1b1933f81e332d7468ba3d5b8d8f4682bc7d751756f2c4a5f8ac619d907ff0319eb019e4fc709c8c63e3b9db46fae1c7a8da18065f54b574627b4c4a695a29facbcc510cc62a3847b9d73cda91efdcd4955cd43504ba6821d74c142b4159e03dd798375844927b2e14bd4cc73a0aec27d938f715a7c893115e0869a806aa60515a97aa62798840f06703b1558df59cf7e74480afb83f1c84407d00fdfc03cbf7a000b4507455736a4add1bfc4c31398187005188a8c119907910706c41a2755b7cd78bdeef5001f7d47090d65bdfb12a93b095a46c3b4d1495d514c152e343d460d74a91bdf2ea4ae48c10e360b8a440cbecbb06e36153ab7129bb8c16a2dac0845c02d3673e235229ff9a5eb9b9b7cf9cf9a9f0be4de4bb2cd0d14fb447845cb59f48050a4fc08f8a32bd371c9f58ccc58d4756098e1064c93ab9ecdac9a44d9fb7994baf7b2006c33cd495b99f5d96f3685f81b17420374d9c16fde577600743be2931ae89b2b2b36aabec8ff88e48b0188784a43d3d669544c5939d48d711ddf8927a5fdce9de0ace2b28d8311b769d679ea793fa58193874beaa1a088d4b6d4bad789cf6ee7101f3f57801add0143363785e283fd5aa05da1309bef60371e01ba98c650cae90c7e476a55ded3e4894423a7ac015f194e94d8c0af6ca5c23d4301dfd80952a9f5198b40d02a7d8f0c63c45c9b16f9f619d5c881c5a676d3e14e8b6f36fd4d0f43eb1582d9dcf6755bc35e668476f59a81c955623923f4d1505554c6bdc55a5b853bf343509eccd1c173bdac0843f28595f0a340c3f0a2c93301f76c460bee68a71d5c267031af1d8381710a3767d737b15539304e4073968a027607dc4eee898f18af7a47d2bfa1c74b8d57034633fbb5f14f84c5c703a2d08c9fd840530b9a14a5f100c9e8f108ffbf60ef1df15515c4947088483023bd732ee7454c1cc3211e0755f5089e6dd22a84180b2330518c5bd261f36c1e1eba7ac7abbccf0a36dfa6742914d14ab2decaad7214144f82dfca9319c7d5fce4e98d03ea4b403011668989a931a0093b2336864efc63c9d196b1c6286b010ceaf79018a8cba1f24c9da4ea958c45d93f8e44e76616fc489655a04af1da9d0131ad43d4814c5c859573e28ad6bb1f34369e0c59b09b8a7296a4b9d687087185db13de351cd98c36e8a1ce56ffd94b4e35ae87feb165a25c45a57a42d61e919edeb86343aea77e1a9df9d7aafa24cce9bc6d6624a281ecba99a1569c2cabbebf188bfbbccbddfcff4f2b9ee1c4c14eba54cffba50200702159582ec043bfad632cca0378541ae6cff1c14892decb213d0993f4f927025c8f2038fbe076334c7e9fe10d0d1833f3bf5b7cc206902af2f503a9bc023ff6ffa3e09f33f3cd63e85fbbd0bd54d41811e3ed628bac45a64be6b34dc007ed638be6b1a4eed5744ad128def1f8f15ed8ccd2b1e2b6f01da886de0e2d2ec89d8a4e9f4decfb451b307ca6115d8ffe7f2c67c631a2d3e7b547b870e5baf1677c2d4ebc9fe407ba4b8627c5f773e20e3989a4dc1b8cbd45175833ee14e876a291b8ef852d017696d8c580c22217fc136ee862ef6b899190c5affa8714397cc1aa331e73b51ec32c0d3348c0ba0cc3bbeb5f4746161edc49e07d498b91d9feb868d320ee85e41b422188b1f08487d1f211490c5e8901768ae6b3f05d80af4b75828c81bd06a21681c22c0c95d494966a0003504b18af51aa5abd060c20672c9a651b7a27bb116d128b55f2f697d3365bda80490b3df54425f4964bd967ba901d44f10967f8b2f7fc348ed66fa4267ca74c3a804f07d0ac43cb7ce93efb097611fd81081d5e0db417e489c7a49988f4da846c95857ef4602559ed7a2e84dc0b0212947ce9a6fb35ecaf8a449d5973bedcb2bc5e5f22296db0eceb8f62e92df9300a9d537673cd52e5b119641de6a4001f6d33aa3b23d1ec0b231d9ec05066fe63296a30f9450cd4836b62b02b34570efe0d06b9b4e697a89ae82c687e5fc766735675d1ddeacff564525102249e6f0f1b91f409088f533b1b1c6dd6e79f0c868258b3a6510404444ca97751ce16e4f2fa1d01a61eb7dd4d11a68e16c8023bb938ebecbdeaec6e4c7e55197d1e981c23f777611ac95259f231d3d91046c59278385c4ba1a3646bb687e4a1fa78a46a33e4372ac1fb284044d5c856cbe0029920a3aaa9caa18702b0237618fb881f09168e44f141639a20134441d67fca4e558b34d0840f7624b2e72e88424c36fe4130df1a24776a4b32a87b93fa71f7ea1a7aac403da2100410fee2fbbd146d54e21f5809d66f04592abe6f8e37f7724a146c9daabcd2f8271e16083c9fc4b01ee0647d909030629b19f389cb23d396e626be8b2b5cc25898ee52f4200ff25ff241d5a0fdfb52ed6aa8140dbc8540170d1511a1d3807a360a06ea14e09d30f9fe9b1ff56bbba311db959509fca3ff650893a59c2e3c745b3c7b0a5a45ef4fd1d5c5f6a4983233d309c9b82dfc9fa40ef897d58cca9850a0ae6e9c14ba85c994ce97858a8168aa2ba5daf69c3bd5ff7a27f0e0b670b9e8c89d3fc20602d4eba075980320a7fbf4e251d9ad0be17c241cef4ba37ca9be18fc7408329e9a34cc179e84b166b41a904d6c69d7dbc5d41bb3f18e5f74d1248b6f1c432edd096a69161e67c1c7e7c18caae0b154ca5ee4fc0f76caf31cda11f4ce110d41a2f956db90fb3feef10a3f4151ec88436ff5b7cd488c29e277120c7ad75ed106a2140fc02d0aa403704789bbe581069f3edfaf72db8dec72e03d5072c6bbbc8ec62621a326bc0d347fd47ebc9d07f7120d327f5d815ffcff495f9cb4e81eaf19006cadce33bd1791b3a3e7f15bf3e515f287ad6dae983b394d1a69101ea3ff2d0b7efec4427e07b36781d4a1e0f3e989b882906c68a15519de3e27baae2fe9269f148ca4165e1aebfdb717d79fa5ea506995189deddb2ed1ef0d64e5e1519e5703245f9bbd3813431bdec4876a56673a0578aa7a92aa17bc0db256bef4b822f1bc7dbf4cc01e2572979f921fb3af6119f733d54b6caf3e0b6b70b16214ad91d4cae25a6d1b188d58370d1b758fee2552837978212ae68773bf761ab56503d4b7ccb141edcc89bd09fd9b8976c60906"}, {0xc0, 0x11d, 0x8, "ea9ac0f680e89afbf31cc7bdac447bb7ad55cbf0792b1cfd1d94ee3b29abde3ba777e4bc1eff4facf62f7b61c47a8fda90fe50011139e4243f43b55a7ba2bc0f66408a4945d93502790d60ef6edc36496d577ac6b80ce991be16d1588fa887e8fb0bace7ddfe6a55b28a6a04c14a8599e1399544c5f2234213f2aca904b7193a2c73141ab0459658e4ea73b3d2d269224138efaa0acb54a2c86e93540ea00eb32e6435d9f37cf48a423f48292fa2"}, {0x90, 0x117, 0x81, "3a74b0fedbe350875abdf272671bcc1f75c005b25fb2676593b3ee5a9cb54707765d67bc0902f62518ea9721c3ecb8468fc0ae97ed28d9066721cfdbaf7ca1cdf4df5be932da2226f8930938e35604079b2513084c37043b947a714a4b477ff7039392b0c91e8dac7b66d9321b2473d9ae902d2a1ab51d7cf8646d00"}, {0x50, 0x10b, 0x7, "8c9c54675d2108b44df3e56c4e5a5decea46cb4bc190e983b9e475549a4d614f1986bb341237547e320b34e5d2de8c0e7d05a49912a3faea30e9b3"}, {0x58, 0x19f, 0x100000001, "afc43ab75a012b8766fa2fa3cc44c69383afec1fedd3335fdceed7154953660bec9a077521e2550f581f63abfe85f7abe19e430ee066300ab14cf44ed3b93592998e9bfc93fa28"}], 0x1208, 0x4800}, 0x40001) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000019c0)={0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000000140)="0253eea6a53cc0eae389e9a13e5f2046d0633eebde90f446c1b1eabbd0adb42dfcefb37a3df93feb3d5e76dc353ecf23fe9c81afa5", 0x35}, {&(0x7f00000002c0)}, {&(0x7f0000000400)}, {&(0x7f0000001600)}], 0x4, &(0x7f0000001700)=[{0x68, 0x107, 0x25047dc1, "755cd1e9e23de47cb15819d813deb534cee2d9497c58eba5bd8a228407fb709d70f16afa73f4924f12ecc429b6fd356748940b62ee5f5685ce027fe4e6c60a8f88cd1a5827d099f5849f09bd37f681e29814e6bb"}, {0x10, 0x0, 0x1ff}, {0x10, 0x107, 0x80000001}], 0x88}, 0x48800) 2018/03/29 11:56:21 executing program 3: r0 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x10}, 0x10) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000000c0)={0x0, 0x1000, 0x8}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000080)='./file0\x00', r1}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0x0, 0x8}, 0x10) mount(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='cpuset\x00', 0x40, &(0x7f0000000280)="8a4562cb6a7df38be32246afcaef1e1a3f933cb428242c55c117c0fbbd62cea0aab31f2665fb88267466eca314fc8cafd72cc24143121c0691236768fad66390bf9b55014c2bd49faa5388cbabd52e730eeb4ccc411bacd296e423d971043756cf2b35a4063f2a7465b44a60ef31ae437f6160ed2f63afa62c36a27c33e4779e7c0404e337abc025bb2e4b39cc265573c6ab1a3ff09c7ad6bb4631a4") mount(&(0x7f0000000340)='./file1\x00', &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='devtmpfs\x00', 0x40, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xb, 0x7f, 0x0, 0x1, 0x12, r1, 0x100000000}, 0x2c) mkdir(&(0x7f0000000440)='./file1\x00', 0x20) mount(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='iso9660\x00', 0x8, &(0x7f0000000540)="650fe6ccea2b17860de967406c566ec16fe5a7a4c064707e22906e9d3d2a70b4") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000005c0)={r2, 0x28, &(0x7f0000000580)={0x0, 0x0}}, 0x10) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={r3, 0x8, 0x10}, 0xc) mount(&(0x7f0000000640)='./file1\x00', &(0x7f0000000680)='./file1\x00', &(0x7f00000006c0)='pstore\x00', 0x1000000, &(0x7f0000000700)="f48afa3ab3cc319f917be52b04c388c229578537782bc5ffc32c7747b1d28999ad89f5fba460640a324385ac03cccef4553d641b91d79d014804a98e72796f8eb2e1a7056efeaa63404648df67079ae817420f248ccf9d01e7a027c600c71777fb9ebc97da60f3d1a287ef8bc00f1dc68c3b1f0c1836cde5b62be45dd58c3415cbb0f916fe3c04fc69911e2bec15c208d023bdb608fa727657c532bd5101a2a36b34c4eb65f855fea2d6f8a0a79b15ecef1a4c81a8f6f5ed57b09db2ab482413540416126718f2a33ed21346ded20b084a8dc10702ec279fc486b5c57c163d") socketpair(0x3, 0x2, 0x1f, &(0x7f0000001c40)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$kcm(r6, &(0x7f0000004300)={0x0, 0x0, &(0x7f0000004140)=[{&(0x7f0000001c80)=""/139, 0x8b}, {&(0x7f0000001d40)=""/149, 0x95}, {&(0x7f0000001e00)=""/188, 0xbc}, {&(0x7f0000001ec0)=""/69, 0x45}, {&(0x7f0000001f40)=""/165, 0xa5}, {&(0x7f0000002000)=""/4096, 0x1000}, {&(0x7f0000003000)=""/42, 0x2a}, {&(0x7f0000003040)=""/4096, 0x1000}, {&(0x7f0000004040)=""/233, 0xe9}], 0x9, &(0x7f0000004200)=""/236, 0xec, 0xe00}, 0x40) mount(&(0x7f0000004340)='./file1/file0\x00', &(0x7f0000004380)='./file1\x00', &(0x7f00000043c0)='ceph\x00', 0x4860, &(0x7f0000004400)="2c8eb517dd302be26597065442d58f3f345c295b542b2b1df3046ae176") bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000004600)={r6, &(0x7f0000004440)="903685b47b9c4d5c1dffcefa6a92cd57ccdfaf1af0be272f1cb4a5b86ab9d1ef248a63f04f5d59c2cd6e6b7722f5ff866c5d353014f28baaa95bce06a787a3e085102126a0386ffd4e136d472f2cdfb7c658643d2792b7235e2ec8c782080850c20eb00014eab035d7d56c8ddd0d7fdc4c21602d480e4accea0867cc5b4172b46b8f028bd623c58544092396dbda704543cd7c93219ff7f4caf9d0c12fc32c65ddac48ba22321d2c7ef1152f0dd87ed22cb30eb2b24d381b3abaefc114ad4c08e329cfbce60e0549ca", &(0x7f0000004540)="38859653237c5c9685cf2e44e1eea64846e190b778f29b06c26c2f2b8a0800f9fc2019b05290fc5c82f612eb7f479918015eb3af93cc57f01db731e129275ce05910f66e436ef09a8fe7bf22f960eacec350a7f7e9e9a47cb163f467b6a29523346a4c61d65d2235c73095a53929d509538f640424133cfa3617b41a51aa7172460146433abbe604f2c92827fabd5d3134d36b4cecd0fd2549f3527615f9eb63dd9332021e4eff13ad6aa509db21ed98745d00cb36e547", 0x3}, 0x20) mkdir(&(0x7f0000004640)='./file1/file0\x00', 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000004680)={0x0, 0x0, 0xa6, 0x3, 0x4}, 0x2c) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000046c0)=0x7, 0x4) recvmsg$kcm(r6, &(0x7f00000058c0)={&(0x7f0000004700)=@alg, 0x80, &(0x7f0000005880)=[{&(0x7f0000004780)=""/4096, 0x1000}, {&(0x7f0000005780)=""/219, 0xdb}], 0x2, 0x0, 0x0, 0x100000001}, 0x40000000) r7 = gettid() r8 = perf_event_open(&(0x7f0000005900)={0x7, 0x70, 0x0, 0xfffffffffffffff7, 0x9, 0x4, 0x0, 0x7, 0x100, 0x8, 0x100000000, 0x8000, 0x8, 0x6, 0x0, 0x6, 0x10001, 0x9, 0x1f, 0x2, 0x1, 0x3, 0x1, 0x1f, 0x23, 0x1, 0xaa4, 0x5, 0x4, 0x200, 0x6, 0x9, 0xfffffffffffffffb, 0x3, 0x3, 0xff, 0x80000000, 0x0, 0x0, 0xffffffffffffff9d, 0x2, @perf_config_ext={0x7, 0x9}, 0x100, 0x8, 0x2, 0x6, 0x4, 0x6, 0xf71}, r7, 0x9, r6, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f00000059c0)={&(0x7f0000005980)='./file0\x00'}, 0x10) ioctl$sock_kcm_SIOCKCMATTACH(r5, 0x89e0, &(0x7f0000005a00)={r5, r0}) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000005c00)={r4, &(0x7f0000005a40)="313befc1e9ac680c4369983530ee783c4f018c38e134b4b0aebd06ede05f238850949c0f5d32ab19889f880e87e3a0fa5a43500affdcc508d56f3a4df6c159ca9cfa62124b79b4607d42738dc5e16d09ea2c6a2346fc2360feff08d9f464dfdebce2cb99d4ba8e5fc37edfba041f14e16a68192d7d8687404ee7318323520188c4e5d52e8c7ec40bd0823fb210e530c74ea842bd8bacbc48317b0b6ed12528ecd30e1af83b8049df791ff7affe91ab54", &(0x7f0000005b00)=""/243}, 0x18) mount(&(0x7f0000005c40)='./file1/file0\x00', &(0x7f0000005c80)='./file1\x00', &(0x7f0000005cc0)='btrfs\x00', 0x0, 0x0) recvmsg(r5, &(0x7f00000073c0)={&(0x7f0000005d00)=@sco, 0x80, &(0x7f0000007300)=[{&(0x7f0000005d80)=""/103, 0x67}, {&(0x7f0000005e00)=""/170, 0xaa}, {&(0x7f0000005ec0)=""/252, 0xfc}, {&(0x7f0000005fc0)=""/136, 0x88}, {&(0x7f0000006080)=""/125, 0x7d}, {&(0x7f0000006100)=""/4096, 0x1000}, {&(0x7f0000007100)=""/106, 0x6a}, {&(0x7f0000007180)=""/115, 0x73}, {&(0x7f0000007200)=""/240, 0xf0}], 0x9, 0x0, 0x0, 0x7}, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000007400)={r3, 0x10001, 0x18}, 0xc) ioctl$PERF_EVENT_IOC_REFRESH(r8, 0x2402, 0xc4c) recvmsg$kcm(r6, &(0x7f0000008880)={&(0x7f0000007440)=@l2, 0x80, &(0x7f0000008800)=[{&(0x7f00000074c0)=""/231, 0xe7}, {&(0x7f0000007640)=""/4096, 0x1000}, {&(0x7f0000008640)=""/223, 0xdf}, {&(0x7f0000008740)}, {&(0x7f0000008780)=""/32, 0x20}, {&(0x7f00000087c0)=""/53, 0x35}], 0x6}, 0x10000) 2018/03/29 11:56:21 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x1e1, 0x100000000209e20, 0x8000000001, 0x5}, 0xfffffffffffffe20) r0 = getpid() r1 = perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0xfffffffffffffffc, 0x3, 0x8, 0x2, 0x0, 0x9, 0x10000, 0xc, 0x3d3, 0x80, 0x5, 0xfffffffffffffffc, 0x8, 0x3f, 0x5d, 0xbbb0, 0x20, 0x3, 0x8000, 0x100000000, 0x8, 0x9, 0x2, 0x4, 0x800, 0xf8, 0x3, 0x9, 0x1, 0x3, 0x8, 0x3, 0x7, 0x10001, 0xf16, 0x2, 0x0, 0x7fffffff, 0x4, @perf_bp={&(0x7f0000000780), 0x1}, 0x4080, 0x10001, 0xcc, 0x7, 0x3, 0xffff, 0x7fffffff}, 0xffffffffffffffff, 0xd, 0xffffffffffffff9c, 0x8) perf_event_open(&(0x7f0000000980)={0x4, 0x70, 0x6, 0x3f, 0x8e, 0x1, 0x0, 0x3, 0x404, 0x0, 0xbc2b, 0x40, 0x7, 0xffff, 0xffff, 0x9, 0x9de2, 0x9, 0x0, 0x3, 0x7f, 0xff, 0x40, 0x400, 0x9, 0x7fffffff, 0x80000000, 0x7, 0x8, 0x10001, 0x1f, 0x2778, 0x800, 0x8001, 0x101, 0x9, 0x8, 0x7ff, 0x0, 0x1000, 0x5, @perf_config_ext={0x3ff, 0xb69b}, 0x3040, 0x2, 0x2, 0x5, 0x7, 0x6, 0x7283ed73}, r0, 0xe, r1, 0x8) bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x0, 0x0, 0x7ffff9, 0x0, 0x20000003, 0x0}, 0x2c) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) r2 = gettid() r3 = perf_event_open(&(0x7f00000008c0)={0x7, 0x70, 0x1, 0x200, 0x3, 0xdbce, 0x0, 0x8, 0x1002, 0x1, 0xffffffffffffff00, 0x8, 0x1, 0xb3fa, 0x8, 0x0, 0x1, 0x2, 0x1000, 0x2, 0x401, 0x8, 0x3, 0x81, 0x0, 0x7, 0x2fc4, 0x882, 0x4, 0x8, 0x3, 0x81, 0x3, 0x7, 0x8857, 0x7, 0x5, 0x9, 0x0, 0x7, 0x1, @perf_config_ext={0x0, 0x80000000}, 0x400, 0x7f, 0x4, 0x7, 0x2, 0x7f, 0x200}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000840)={0x5, 0x70, 0xef, 0x2, 0x1000, 0xffffffff80000000, 0x0, 0x1a7800000000, 0x2000, 0x4, 0x5, 0x6814, 0x3a9, 0x5, 0x63b, 0x6, 0x8, 0x1000, 0x250420ee, 0x3, 0x0, 0x20, 0x6, 0x0, 0x4, 0x5, 0x4, 0x8, 0x3, 0x8, 0x52893dd5, 0x2, 0x2, 0x8, 0x44d, 0x1, 0x8, 0x6, 0x0, 0x100000000, 0x0, @perf_config_ext={0x9, 0x80}, 0x0, 0x0, 0x2b67, 0x6, 0x4b0, 0x81, 0x4}, r2, 0x5, r3, 0xb) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1003, 0x0) mount(&(0x7f00002b9ff8)='./file0\x00', &(0x7f0000cbeff8)='./file0\x00', &(0x7f00005f7ffa)='ramfs\x00', 0x80000, &(0x7f000002f000)) mount(&(0x7f0000000000)='.', &(0x7f0000000040)='.', &(0x7f0000000080)='cgroup\x00', 0x5010, &(0x7f00000000c0)) mount(&(0x7f0000377ff8)='.', &(0x7f0000000280)='.', &(0x7f0000000600)='nfs4\x00', 0x5010, &(0x7f0000000300)="2161893416a0c71070768c219eb114c3253c9f3baf4e9e8e9111c1a7fc6e266009fe27243deeaa22ca7ae9341f714300b5ee807e55d609036f2a3260475922bdfb2d2849f1c3b2ad3c051bd4f3751a177f77a92758c6d2b23fe7f1535b54e5846d11c135de8286066dec1b25f6e1378944ac5f7fce42d055821b5e19") perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xd68, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f0000014f88)={0x5, 0xfffffffffffffdc4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x46000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = getpid() perf_event_open(&(0x7f0000000680)={0x4, 0x70, 0x64, 0xffff, 0x1f, 0x4, 0x0, 0x1c3, 0x0, 0x1, 0x1, 0x9, 0x1ff, 0xfffffffffffffff8, 0x0, 0x0, 0x6, 0x7fffffff, 0x4, 0xffffffff, 0x80000001, 0xd0, 0x7, 0x1f, 0x0, 0x8, 0x9, 0x1ff, 0x8, 0x785, 0x4, 0xff, 0x2, 0x656, 0x5000000, 0x1, 0x460e3be0, 0x1, 0x0, 0x0, 0x7, @perf_bp={&(0x7f0000000640), 0x1}, 0x1000, 0xa, 0x7fff, 0x7, 0x3, 0x400, 0x9}, r5, 0xe, r4, 0x1) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', 0x0, 0x10}, 0x10) close(0xffffffffffffffff) bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)={&(0x7f0000000040)='./file0\x00', 0x0, 0x18}, 0x10) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000100)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0, 0x2e, &(0x7f0000000440), &(0x7f0000000140)=""/46, 0x4229}, 0x28) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000003480)={&(0x7f0000003300)=@can={0x0, 0x0}, 0x80, &(0x7f0000003400)=[{&(0x7f0000003380)=""/56, 0x38}, {&(0x7f00000033c0)=""/1, 0x1}], 0x2, &(0x7f0000003440)=""/33, 0x21, 0x1}, 0x40010000) bpf$PROG_LOAD(0x5, &(0x7f00000034c0)={0xe, 0x6, &(0x7f0000000940)=ANY=[@ANYBLOB="1800000002000000000000004ce700002555fdff00000000002371d07c9ba7f4a23372b0ad61000000000000009500000000000000"], &(0x7f00000007c0)='GPL\x00', 0x3, 0x2d, &(0x7f0000000800)=""/45, 0x40f00, 0x0, [], r6}, 0x48) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000740)={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x10) socketpair$inet(0x2, 0x80a, 0x81, &(0x7f0000000240)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={0xffffffffffffffff, &(0x7f0000000500)="ae30f1bca1b4d3f69f1aac81517d42ad5980bc63b5008616a1f4724b9f8c1e4ecd8de336f57dd727cdaab04f0b40f28612615ad08de414711d841a88db33fd33884b627074213a0c5de3be2bbaec9207d9865c47f240467849979b5ab5632376608fc4be41a274abb2dc07cabe344a18db51048e5b0cbda843905a4258cdee3e649eddf104ba78894dce09747dcfe6a8d6d6d985520eeef448b83a8bcb83074541ba7a20d6094aa206c01a0690e5b3bfa05d475eb382b0199031d22bb26cde9b1ca0055eef9f6c4993b71ba19ba0590bb5efdaddaa574c25356ca890d138fc9fe0e975b6d5a1a8251503cd0a91845f9d95", &(0x7f0000000480)="9bc7741ea5e524cc8c6f748a73153834428729c45bf4ad446d2dddf1978baf431d0ba35b5442b5afe22db8b003650320200af7e1368ef7cdfa79ca8b9d3564363a5d2a502970314f2264c883bc8d990afc003e5adb95b30edad245c4420c8126f1d33db75ff0230698eaff90055e0f", 0x2}, 0x20) socketpair(0x0, 0x80003, 0xffff, &(0x7f0000000380)={0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r7, 0x50, &(0x7f00000003c0)}, 0x10) 2018/03/29 11:56:21 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x1e1, 0x100000000209e20, 0x8000000001, 0x5}, 0xfffffffffffffe20) r0 = getpid() r1 = perf_event_open(&(0x7f0000000a00)={0x0, 0x70, 0xfffffffffffffffc, 0x3, 0x8, 0x2, 0x0, 0x9, 0x10000, 0xc, 0x3d3, 0x80, 0x5, 0xfffffffffffffffc, 0x8, 0x3f, 0x5d, 0xbbb0, 0x20, 0x3, 0x8000, 0x100000000, 0x8, 0x9, 0x2, 0x4, 0x800, 0xf8, 0x3, 0x9, 0x1, 0x3, 0x8, 0x3, 0x7, 0x10001, 0xf16, 0x2, 0x0, 0x7fffffff, 0x4, @perf_bp={&(0x7f0000000780), 0x1}, 0x4080, 0x10001, 0xcc, 0x7, 0x3, 0xffff, 0x7fffffff}, 0xffffffffffffffff, 0xd, 0xffffffffffffff9c, 0x8) perf_event_open(&(0x7f0000000980)={0x4, 0x70, 0x6, 0x3f, 0x8e, 0x1, 0x0, 0x3, 0x404, 0x0, 0xbc2b, 0x40, 0x7, 0xffff, 0xffff, 0x9, 0x9de2, 0x9, 0x0, 0x3, 0x7f, 0xff, 0x40, 0x400, 0x9, 0x7fffffff, 0x80000000, 0x7, 0x8, 0x10001, 0x1f, 0x2778, 0x800, 0x8001, 0x101, 0x9, 0x8, 0x7ff, 0x0, 0x1000, 0x5, @perf_config_ext={0x3ff, 0xb69b}, 0x3040, 0x2, 0x2, 0x5, 0x7, 0x6, 0x7283ed73}, r0, 0xe, r1, 0x8) bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x0, 0x0, 0x7ffff9, 0x0, 0x20000003, 0x0}, 0x2c) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) r2 = gettid() r3 = perf_event_open(&(0x7f00000008c0)={0x7, 0x70, 0x1, 0x200, 0x3, 0xdbce, 0x0, 0x8, 0x1002, 0x1, 0xffffffffffffff00, 0x8, 0x1, 0xb3fa, 0x8, 0x0, 0x1, 0x2, 0x1000, 0x2, 0x401, 0x8, 0x3, 0x81, 0x0, 0x7, 0x2fc4, 0x882, 0x4, 0x8, 0x3, 0x81, 0x3, 0x7, 0x8857, 0x7, 0x5, 0x9, 0x0, 0x7, 0x1, @perf_config_ext={0x0, 0x80000000}, 0x400, 0x7f, 0x4, 0x7, 0x2, 0x7f, 0x200}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000840)={0x5, 0x70, 0xef, 0x2, 0x1000, 0xffffffff80000000, 0x0, 0x1a7800000000, 0x2000, 0x4, 0x5, 0x6814, 0x3a9, 0x5, 0x63b, 0x6, 0x8, 0x1000, 0x250420ee, 0x3, 0x0, 0x20, 0x6, 0x0, 0x4, 0x5, 0x4, 0x8, 0x3, 0x8, 0x52893dd5, 0x2, 0x2, 0x8, 0x44d, 0x1, 0x8, 0x6, 0x0, 0x100000000, 0x0, @perf_config_ext={0x9, 0x80}, 0x0, 0x0, 0x2b67, 0x6, 0x4b0, 0x81, 0x4}, r2, 0x5, r3, 0xb) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1003, 0x0) mount(&(0x7f00002b9ff8)='./file0\x00', &(0x7f0000cbeff8)='./file0\x00', &(0x7f00005f7ffa)='ramfs\x00', 0x80000, &(0x7f000002f000)) mount(&(0x7f0000000000)='.', &(0x7f0000000040)='.', &(0x7f0000000080)='cgroup\x00', 0x5010, &(0x7f00000000c0)) mount(&(0x7f0000377ff8)='.', &(0x7f0000000280)='.', &(0x7f0000000600)='nfs4\x00', 0x5010, &(0x7f0000000300)="2161893416a0c71070768c219eb114c3253c9f3baf4e9e8e9111c1a7fc6e266009fe27243deeaa22ca7ae9341f714300b5ee807e55d609036f2a3260475922bdfb2d2849f1c3b2ad3c051bd4f3751a177f77a92758c6d2b23fe7f1535b54e5846d11c135de8286066dec1b25f6e1378944ac5f7fce42d055821b5e19") perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xd68, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f0000014f88)={0x5, 0xfffffffffffffdc4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x46000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = getpid() perf_event_open(&(0x7f0000000680)={0x4, 0x70, 0x64, 0xffff, 0x1f, 0x4, 0x0, 0x1c3, 0x0, 0x1, 0x1, 0x9, 0x1ff, 0xfffffffffffffff8, 0x0, 0x0, 0x6, 0x7fffffff, 0x0, 0xffffffff, 0x80000001, 0xd0, 0x7, 0x1f, 0x0, 0x8, 0x9, 0x1ff, 0x8, 0x785, 0x4, 0xff, 0x2, 0x656, 0x5000000, 0x1, 0x460e3be0, 0x1, 0x0, 0x0, 0x7, @perf_bp={&(0x7f0000000640), 0x1}, 0x1000, 0xa, 0x7fff, 0x7, 0x3, 0x400, 0x9}, r5, 0xe, r4, 0x1) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', 0x0, 0x10}, 0x10) close(0xffffffffffffffff) bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)={&(0x7f0000000040)='./file0\x00', 0x0, 0x18}, 0x10) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000100)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0, 0x2e, &(0x7f0000000440), &(0x7f0000000140)=""/46, 0x4229}, 0x28) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000003480)={&(0x7f0000003300)=@can={0x0, 0x0}, 0x80, &(0x7f0000003400)=[{&(0x7f0000003380)=""/56, 0x38}, {&(0x7f00000033c0)=""/1, 0x1}], 0x2, &(0x7f0000003440)=""/33, 0x21, 0x1}, 0x40010000) bpf$PROG_LOAD(0x5, &(0x7f00000034c0)={0xe, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="1800000002000000000000004ce700002555fdff00000000002371d07c9ba7f4a23372b0ad61000000000000009500000000000000"], &(0x7f00000007c0)='GPL\x00', 0x3, 0x2d, &(0x7f0000000800)=""/45, 0x40f00, 0x1, [], r6}, 0x48) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000740)={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x10) socketpair$inet(0x2, 0x80a, 0x81, &(0x7f0000000240)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={0xffffffffffffffff, &(0x7f0000000500)="ae30f1bca1b4d3f69f1aac81517d42ad5980bc63b5008616a1f4724b9f8c1e4ecd8de336f57dd727cdaab04f0b40f28612615ad08de414711d841a88db33fd33884b627074213a0c5de3be2bbaec9207d9865c47f240467849979b5ab5632376608fc4be41a274abb2dc07cabe344a18db51048e5b0cbda843905a4258cdee3e649eddf104ba78894dce09747dcfe6a8d6d6d985520eeef448b83a8bcb83074541ba7a20d6094aa206c01a0690e5b3bfa05d475eb382b0199031d22bb26cde9b1ca0055eef9f6c4993b71ba19ba0590bb5efdaddaa574c25356ca890d138fc9fe0e975b6d5a1a8251503cd0a91845f9d95", &(0x7f0000000480)="9bc7741ea5e524cc8c6f748a73153834428729c45bf4ad446d2dddf1978baf431d0ba35b5442b5afe22db8b003650320200af7e1368ef7cdfa79ca8b9d3564363a5d2a502970314f2264c883bc8d990afc003e5adb95b30edad245c4420c8126f1d33db75ff0230698eaff90055e0f", 0x2}, 0x20) socketpair(0x0, 0x80003, 0xffff, &(0x7f0000000380)={0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r7, 0x50, &(0x7f00000003c0)}, 0x10) 2018/03/29 11:56:21 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x3, &(0x7f0000002000)=@framed={{0x18}, [], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000680)={0xffffffffffffffff, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x7}, 0x28) recvmsg(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x7, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000100)=r0, 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) recvmsg(r2, &(0x7f00000011c0)={&(0x7f0000000b40)=@can, 0x80, &(0x7f0000001100)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f0000000c80)=""/169, 0xa9}, {&(0x7f0000000d40)=""/229, 0xe5}, {&(0x7f0000000e40)=""/128, 0x80}, {&(0x7f0000000ec0)=""/48, 0x30}, {&(0x7f0000000f00)=""/137, 0x89}, {&(0x7f0000006000)=""/4096, 0x1000}, {&(0x7f0000007000)=""/4096, 0x1000}, {&(0x7f0000001080)=""/127, 0x7f}, {&(0x7f0000008000)=""/4096, 0x1000}], 0xa, 0x0, 0x0, 0x1}, 0x2020) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001200)={0x7, 0x4, 0x0, 0x4, 0x8, 0xffffffffffffffff, 0x9}, 0x2c) socketpair(0x3, 0x80e, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r3, &(0x7f0000000200)={&(0x7f0000000fc0)=@pppol2tp={0x18, 0x1, {0x0, r2, {0x2, 0x4e20, @broadcast=0xffffffff}, 0x1, 0x3, 0x0, 0x2}}, 0x80, &(0x7f0000001580)=[{&(0x7f0000001240)="95c4dcff0f017b3c1979888e50f6c20a37b4edaffb28a3b609d24a8180434ab2fac426d3e4fc87e18267002be3cd56b11d69c4db739bf6a9c91af67ee87be1ea522993a368bdfc0df55539a60ef5515b4f03f3dbddae65cd66a90f030118870b473f156cb9a18624103000608c63f84b09ea89bfb8d8e7705c6ef456ef28adec5e566632ddd63098", 0x88}, {&(0x7f0000001380)="5745869bf3b6f562576761d821af2ad55c2f81345c810d6dbd43facd33c5107488aa7f04c5ab1302b820cd31405e9f657776a0d48e2225f39aabc3de0b30dc7422503b448ad89c23ebaee24ae9696e4e58eccae5febf47fff53dc1f03d869303acdef233746263c5c567e84edb166010fd23f56d6e84406bced5a00b5016b0c700fd76218ecf5da3527552a683eb87aa4b246cd74bcbeff8dedec74332e0214e4dc64cb7ac24c4447843caa7550375ef8e1f74a78c40a617e913a25e4837d24fb09e93eaa2", 0xc5}, {&(0x7f0000001480)="8247f46d4324760570d5078149dc5b38f7d1c592564148ecc6262e91c29cd4344e423ff476882993a2844af9a7c306a15e659a4cb9230b5139842c87ad8fa95c202146730fa610b141dfe4c7b771b46e4db879d2b92a01cb8642100d80a1d4658fd0df05c06c8615960a92b690c728e2603373657a9a46b2f200f2895198694d470ab95b6eb7a76ccee67c9219b4afa289d70c87cf22c733e00700f345136d59bcbd89ce7e110746f91e7a7661b8eb0afe54e3cb1c712441dd9a6ffb59a2eb58e5f5eabd4bec428fe27a403bb0d19125e473abdfea87a0c89108e3c876438a7c3f84bebad6cf858f26d2083efd60", 0xee}], 0x3, &(0x7f000000a000)=[{0x88, 0x112, 0xc2, "6671b4b66ac2fb4e14cee671813dc3834802e601529feb049ebb70880567948953018cfd53d7b1c9be27b1084adfba62040c7f889cfbc15407d93133259d9d5052bf6648a69218702e35278939ad399dc3ebed233c1792c7c1204353c8fe75ea0398f4aaf830834bc93873c119dddc539c"}, {0xe8, 0x6f180cc1befb202, 0x9, "4577f77fd3b3acd92c96feff8b0409afeae1c16fa3d367241c9679e5105141c7205d47ce27a418c10fbe7f601c3142e7b7b3a67322c9d345e0baf4315e13dc771a962ff445015c98a70b319d46ba59155d1cf07827804ea1ca86db74f3029bd60f6f365d955ec12be30102e59b4b3940152988ef09443df596bad9525f697fad61507e856c6acb744cfb034863943e811bd378843ccbd95f8221a444f4c323a391f5788559f34ac02e6e18065b87e8c962353623250694e5b4bf9bc1b00fadf2875995067ff6c18590c207f9a83f06665f5b5af77b4e"}, {0xa0, 0x10f, 0x5, "07c5972c79a30903d5d93f57c962c0351628551f6a3fbac8e18984ad9b8caeb403f1d588fa0b9955ce44d018cbcc06ad98b588dd45fd0ccd6b8d1965e70693ec76dd521aa2693829ef54059dc3191f2f4eca64c63f2f901ead2d6c54f0119212ebb77e956117d9130d3adff30a5598567fd540cf0a8f9f8c469ad15f209ad8ef161006831b39e4ddf2fcd748a8629e33"}], 0x210, 0x40}, 0x40) close(r0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)) recvmsg(r1, &(0x7f00000267c0)={&(0x7f00000251c0)=@can, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) 2018/03/29 11:56:21 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x3, &(0x7f0000002000)=@framed={{0x18}, [], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000680)={0xffffffffffffffff, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x7}, 0x28) recvmsg(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000001c0)) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000100), 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) recvmsg(r3, &(0x7f00000011c0)={&(0x7f0000000b40)=@can, 0x80, &(0x7f0000001100)=[{&(0x7f0000000c80)=""/169, 0xa9}, {&(0x7f0000000d40)=""/229, 0xe5}, {&(0x7f0000000e40)=""/128, 0x80}, {&(0x7f0000000ec0)=""/48, 0x30}, {&(0x7f0000000f00)=""/137, 0x89}, {&(0x7f0000006000)=""/4096, 0x1000}, {&(0x7f0000007000)=""/4096, 0x1000}, {&(0x7f0000001080)=""/127, 0x7f}, {&(0x7f0000008000)=""/4096, 0x1000}], 0x9, 0x0, 0x0, 0x1}, 0x2020) bpf$MAP_CREATE(0x0, &(0x7f0000001200)={0x7, 0x4, 0x0, 0x4, 0x8, 0xffffffffffffffff, 0x9}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x1000000007, 0xcf2e, 0x7e, 0x20, 0x15, r1, 0x4}, 0x2c) socketpair(0x3, 0x80e, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r4, &(0x7f0000000200)={&(0x7f0000000fc0)=@pppol2tp={0x18, 0x1, {0x0, r3, {0x2, 0x4e20, @broadcast=0xffffffff}, 0x1, 0x3, 0x0, 0x2}}, 0x80, &(0x7f0000001580)=[{&(0x7f0000001240)="95c4dcff0f017b3c1979888e50f6c20a37b4edaffb28a3b609d24a8180434ab2fac426d3e4fc87e18267002be3cd56b11d69c4db739bf6a9c91af67ee87be1ea522993a368bdfc0df55539a60ef5515b4f03f3dbddae65cd66a90f030118870b473f156cb9a18624103000608c63f84b09ea89bfb8d8e7705c6ef456ef28adec5e566632ddd63098", 0x88}, {&(0x7f0000001380)="5745869bf3b6f562576761d821af2ad55c2f81345c810d6dbd43facd33c5107488aa7f04c5ab1302b820cd31405e9f657776a0d48e2225f39aabc3de0b30dc7422503b448ad89c23ebaee24ae9696e4e58eccae5febf47fff53dc1f03d869303acdef233746263c5c567e84edb166010fd23f56d6e84406bced5a00b5016b0c700fd76218ecf5da3527552a683eb87aa4b246cd74bcbeff8dedec74332e0214e4dc64cb7ac24c4447843caa7550375ef8e1f74a78c40a617e913a25e4837d24fb09e93eaa2", 0xc5}, {&(0x7f0000001480)="8247f46d4324760570d5078149dc5b38f7d1c592564148ecc6262e91c29cd4344e423ff476882993a2844af9a7c306a15e659a4cb9230b5139842c87ad8fa95c202146730fa610b141dfe4c7b771b46e4db879d2b92a01cb8642100d80a1d4658fd0df05c06c8615960a92b690c728e2603373657a9a46b2f200f2895198694d470ab95b6eb7a76ccee67c9219b4afa289d70c87cf22c733e00700f345136d59bcbd89ce7e110746f91e7a7661b8eb0afe54e3cb1c712441dd9a6ffb59a2eb58e5f5eabd4bec428fe27a403bb0d19125e473abdfea87a0c89108e3c876438a7c3f84bebad6cf858f26d2083efd60", 0xee}], 0x3, &(0x7f000000a000)=[{0x88, 0x112, 0xc2, "6671b4b66ac2fb4e14cee671813dc3834802e601529feb049ebb70880567948953018cfd53d7b1c9be27b1084adfba62040c7f889cfbc15407d93133259d9d5052bf6648a69218702e35278939ad399dc3ebed233c1792c7c1204353c8fe75ea0398f4aaf830834bc93873c119dddc539c"}, {0xe8, 0x6f180cc1befb202, 0x9, "4577f77fd3b3acd92c96feff8b0409afeae1c16fa3d367241c9679e5105141c7205d47ce27a418c10fbe7f601c3142e7b7b3a67322c9d345e0baf4315e13dc771a962ff445015c98a70b319d46ba59155d1cf07827804ea1ca86db74f3029bd60f6f365d955ec12be30102e59b4b3940152988ef09443df596bad9525f697fad61507e856c6acb744cfb034863943e811bd378843ccbd95f8221a444f4c323a391f5788559f34ac02e6e18065b87e8c962353623250694e5b4bf9bc1b00fadf2875995067ff6c18590c207f9a83f06665f5b5af77b4e"}, {0xa0, 0x10f, 0x5, "07c5972c79a30903d5d93f57c962c0351628551f6a3fbac8e18984ad9b8caeb403f1d588fa0b9955ce44d018cbcc06ad98b588dd45fd0ccd6b8d1965e70693ec76dd521aa2693829ef54059dc3191f2f4eca64c63f2f901ead2d6c54f0119212ebb77e956117d9130d3adff30a5598567fd540cf0a8f9f8c469ad15f209ad8ef161006831b39e4ddf2fcd748a8629e33"}], 0x210, 0x40}, 0x40) close(r0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)) recvmsg(r2, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) recvmsg$kcm(r4, &(0x7f0000001a00)={0x0, 0x0, &(0x7f00000018c0)=[{&(0x7f0000001600)=""/173, 0xad}, {&(0x7f0000001040)=""/25, 0x19}, {&(0x7f00000016c0)=""/132, 0x84}, {&(0x7f0000001780)=""/91, 0x5b}, {&(0x7f0000001800)=""/183, 0xb7}], 0x5, &(0x7f0000001940)=""/163, 0xa3, 0xe43}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000a80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r5}, 0x48) 2018/03/29 11:56:21 executing program 4 (fault-call:8 fault-nth:56): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x3, &(0x7f0000002000)=@framed={{0x18}, [], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000680)={0xffffffffffffffff, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x7}, 0x28) recvmsg(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000001c0)) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000100)=r0, 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) recvmsg(r3, &(0x7f00000011c0)={&(0x7f0000000b40)=@can, 0x80, &(0x7f0000001100)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f0000000c80)=""/169, 0xa9}, {&(0x7f0000000d40)=""/229, 0xe5}, {&(0x7f0000000e40)=""/128, 0x80}, {&(0x7f0000000ec0)=""/48, 0x30}, {&(0x7f0000000f00)=""/137, 0x89}, {&(0x7f0000006000)=""/4096, 0x1000}, {&(0x7f0000007000)=""/4096, 0x1000}, {&(0x7f0000001080)=""/127, 0x7f}, {&(0x7f0000008000)=""/4096, 0x1000}], 0xa, 0x0, 0x0, 0x1}, 0x2020) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001200)={0x7, 0x4, 0x0, 0x4, 0x8, 0xffffffffffffffff, 0x9}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x1000000007, 0xcf2e, 0x7e, 0x20, 0x15, r1, 0x4}, 0x2c) socketpair(0x3, 0x80e, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r4, &(0x7f0000000200)={&(0x7f0000000fc0)=@pppol2tp={0x18, 0x1, {0x0, r3, {0x2, 0x4e20, @broadcast=0xffffffff}, 0x1, 0x3, 0x0, 0x2}}, 0x80, &(0x7f0000001580)=[{&(0x7f0000001240)="95c4dcff0f017b3c1979888e50f6c20a37b4edaffb28a3b609d24a8180434ab2fac426d3e4fc87e18267002be3cd56b11d69c4db739bf6a9c91af67ee87be1ea522993a368bdfc0df55539a60ef5515b4f03f3dbddae65cd66a90f030118870b473f156cb9a18624103000608c63f84b09ea89bfb8d8e7705c6ef456ef28adec5e566632ddd63098", 0x88}, {&(0x7f0000001380)="5745869bf3b6f562576761d821af2ad55c2f81345c810d6dbd43facd33c5107488aa7f04c5ab1302b820cd31405e9f657776a0d48e2225f39aabc3de0b30dc7422503b448ad89c23ebaee24ae9696e4e58eccae5febf47fff53dc1f03d869303acdef233746263c5c567e84edb166010fd23f56d6e84406bced5a00b5016b0c700fd76218ecf5da3527552a683eb87aa4b246cd74bcbeff8dedec74332e0214e4dc64cb7ac24c4447843caa7550375ef8e1f74a78c40a617e913a25e4837d24fb09e93eaa2", 0xc5}, {&(0x7f0000001480)="8247f46d4324760570d5078149dc5b38f7d1c592564148ecc6262e91c29cd4344e423ff476882993a2844af9a7c306a15e659a4cb9230b5139842c87ad8fa95c202146730fa610b141dfe4c7b771b46e4db879d2b92a01cb8642100d80a1d4658fd0df05c06c8615960a92b690c728e2603373657a9a46b2f200f2895198694d470ab95b6eb7a76ccee67c9219b4afa289d70c87cf22c733e00700f345136d59bcbd89ce7e110746f91e7a7661b8eb0afe54e3cb1c712441dd9a6ffb59a2eb58e5f5eabd4bec428fe27a403bb0d19125e473abdfea87a0c89108e3c876438a7c3f84bebad6cf858f26d2083efd60", 0xee}], 0x3, &(0x7f000000a000)=[{0x88, 0x112, 0xc2, "6671b4b66ac2fb4e14cee671813dc3834802e601529feb049ebb70880567948953018cfd53d7b1c9be27b1084adfba62040c7f889cfbc15407d93133259d9d5052bf6648a69218702e35278939ad399dc3ebed233c1792c7c1204353c8fe75ea0398f4aaf830834bc93873c119dddc539c"}, {0xe8, 0x6f180cc1befb202, 0x9, "4577f77fd3b3acd92c96feff8b0409afeae1c16fa3d367241c9679e5105141c7205d47ce27a418c10fbe7f601c3142e7b7b3a67322c9d345e0baf4315e13dc771a962ff445015c98a70b319d46ba59155d1cf07827804ea1ca86db74f3029bd60f6f365d955ec12be30102e59b4b3940152988ef09443df596bad9525f697fad61507e856c6acb744cfb034863943e811bd378843ccbd95f8221a444f4c323a391f5788559f34ac02e6e18065b87e8c962353623250694e5b4bf9bc1b00fadf2875995067ff6c18590c207f9a83f06665f5b5af77b4e"}, {0xa0, 0x10f, 0x5, "07c5972c79a30903d5d93f57c962c0351628551f6a3fbac8e18984ad9b8caeb403f1d588fa0b9955ce44d018cbcc06ad98b588dd45fd0ccd6b8d1965e70693ec76dd521aa2693829ef54059dc3191f2f4eca64c63f2f901ead2d6c54f0119212ebb77e956117d9130d3adff30a5598567fd540cf0a8f9f8c469ad15f209ad8ef161006831b39e4ddf2fcd748a8629e33"}], 0x210, 0x40}, 0x40) close(r0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b53596090ebcc07d8584f358be88fafe") recvmsg(r2, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) recvmsg$kcm(r4, &(0x7f0000001a00)={0x0, 0x0, &(0x7f00000018c0)=[{&(0x7f0000001600)=""/173, 0xad}, {&(0x7f0000001040)=""/25, 0x19}, {&(0x7f00000016c0)=""/132, 0x84}, {&(0x7f0000001780)=""/91, 0x5b}, {&(0x7f0000001800)=""/183, 0xb7}], 0x5, &(0x7f0000001940)=""/163, 0xa3, 0xe43}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000a80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r5}, 0x48) 2018/03/29 11:56:21 executing program 6: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x3, &(0x7f0000002000)=@framed={{0x18}, [], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000680)={0xffffffffffffffff, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x7}, 0x28) recvmsg(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000001c0)) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000100)=r0, 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) recvmsg(r3, &(0x7f00000011c0)={&(0x7f0000000b40)=@can, 0x80, &(0x7f0000001100)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f0000000c80)=""/169, 0xa9}, {&(0x7f0000000d40)=""/229, 0xe5}, {&(0x7f0000000e40)=""/128, 0x80}, {&(0x7f0000000ec0)=""/48, 0x30}, {&(0x7f0000000f00)=""/137, 0x89}, {&(0x7f0000006000)=""/4096, 0x1000}, {&(0x7f0000007000)=""/4096, 0x1000}, {&(0x7f0000001080)=""/127, 0x7f}], 0x9}, 0x2020) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001200)={0x7, 0x4, 0x0, 0x4, 0x8, 0xffffffffffffffff, 0x9}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x1000000007, 0xcf2e, 0x7e, 0x20, 0x15, r1, 0x4}, 0x2c) socketpair(0x3, 0x80e, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r4, &(0x7f0000000200)={&(0x7f0000000fc0)=@pppol2tp={0x18, 0x1, {0x0, r3, {0x2, 0x4e20, @broadcast=0xffffffff}, 0x1, 0x3, 0x0, 0x2}}, 0x80, &(0x7f0000001580)=[{&(0x7f0000001240)="95c4dcff0f017b3c1979888e50f6c20a37b4edaffb28a3b609d24a8180434ab2fac426d3e4fc87e18267002be3cd56b11d69c4db739bf6a9c91af67ee87be1ea522993a368bdfc0df55539a60ef5515b4f03f3dbddae65cd66a90f030118870b473f156cb9a18624103000608c63f84b09ea89bfb8d8e7705c6ef456ef28adec5e566632ddd63098", 0x88}, {&(0x7f0000001380)="5745869bf3b6f562576761d821af2ad55c2f81345c810d6dbd43facd33c5107488aa7f04c5ab1302b820cd31405e9f657776a0d48e2225f39aabc3de0b30dc7422503b448ad89c23ebaee24ae9696e4e58eccae5febf47fff53dc1f03d869303acdef233746263c5c567e84edb166010fd23f56d6e84406bced5a00b5016b0c700fd76218ecf5da3527552a683eb87aa4b246cd74bcbeff8dedec74332e0214e4dc64cb7ac24c4447843caa7550375ef8e1f74a78c40a617e913a25e4837d24fb09e93eaa2", 0xc5}, {&(0x7f0000001480)="8247f46d4324760570d5078149dc5b38f7d1c592564148ecc6262e91c29cd4344e423ff476882993a2844af9a7c306a15e659a4cb9230b5139842c87ad8fa95c202146730fa610b141dfe4c7b771b46e4db879d2b92a01cb8642100d80a1d4658fd0df05c06c8615960a92b690c728e2603373657a9a46b2f200f2895198694d470ab95b6eb7a76ccee67c9219b4afa289d70c87cf22c733e00700f345136d59bcbd89ce7e110746f91e7a7661b8eb0afe54e3cb1c712441dd9a6ffb59a2eb58e5f5eabd4bec428fe27a403bb0d19125e473abdfea87a0c89108e3c876438a7c3f84bebad6cf858f26d2083efd60", 0xee}], 0x3, &(0x7f000000a000)=[{0x88, 0x112, 0xc2, "6671b4b66ac2fb4e14cee671813dc3834802e601529feb049ebb70880567948953018cfd53d7b1c9be27b1084adfba62040c7f889cfbc15407d93133259d9d5052bf6648a69218702e35278939ad399dc3ebed233c1792c7c1204353c8fe75ea0398f4aaf830834bc93873c119dddc539c"}, {0xe8, 0x6f180cc1befb202, 0x9, "4577f77fd3b3acd92c96feff8b0409afeae1c16fa3d367241c9679e5105141c7205d47ce27a418c10fbe7f601c3142e7b7b3a67322c9d345e0baf4315e13dc771a962ff445015c98a70b319d46ba59155d1cf07827804ea1ca86db74f3029bd60f6f365d955ec12be30102e59b4b3940152988ef09443df596bad9525f697fad61507e856c6acb744cfb034863943e811bd378843ccbd95f8221a444f4c323a391f5788559f34ac02e6e18065b87e8c962353623250694e5b4bf9bc1b00fadf2875995067ff6c18590c207f9a83f06665f5b5af77b4e"}, {0xa0, 0x10f, 0x5, "07c5972c79a30903d5d93f57c962c0351628551f6a3fbac8e18984ad9b8caeb403f1d588fa0b9955ce44d018cbcc06ad98b588dd45fd0ccd6b8d1965e70693ec76dd521aa2693829ef54059dc3191f2f4eca64c63f2f901ead2d6c54f0119212ebb77e956117d9130d3adff30a5598567fd540cf0a8f9f8c469ad15f209ad8ef161006831b39e4ddf2fcd748a8629e33"}], 0x210, 0x40}, 0x40) close(r0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)) recvmsg(r2, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) recvmsg$kcm(r4, &(0x7f0000001a00)={0x0, 0x0, &(0x7f00000018c0)=[{&(0x7f0000001600)=""/173, 0xad}, {&(0x7f0000001040)=""/25, 0x19}, {&(0x7f00000016c0)=""/132, 0x84}, {&(0x7f0000001780)=""/91, 0x5b}, {&(0x7f0000001800)=""/183, 0xb7}], 0x5, &(0x7f0000001940)=""/163, 0xa3, 0xe43}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000a80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r5}, 0x48) [ 826.579895] net/sunrpc/rpc_pipe.c: rpc_populate failed to populate directory / 2018/03/29 11:56:21 executing program 4 (fault-call:8 fault-nth:57): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x3, &(0x7f0000002000)=@framed={{0x18}, [], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000680)={0xffffffffffffffff, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x7}, 0x28) recvmsg(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000001c0)) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000100)=r0, 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) recvmsg(r3, &(0x7f00000011c0)={&(0x7f0000000b40)=@can, 0x80, &(0x7f0000001100)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f0000000c80)=""/169, 0xa9}, {&(0x7f0000000d40)=""/229, 0xe5}, {&(0x7f0000000e40)=""/128, 0x80}, {&(0x7f0000000ec0)=""/48, 0x30}, {&(0x7f0000000f00)=""/137, 0x89}, {&(0x7f0000006000)=""/4096, 0x1000}, {&(0x7f0000007000)=""/4096, 0x1000}, {&(0x7f0000001080)=""/127, 0x7f}, {&(0x7f0000008000)=""/4096, 0x1000}], 0xa, 0x0, 0x0, 0x1}, 0x2020) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001200)={0x7, 0x4, 0x0, 0x4, 0x8, 0xffffffffffffffff, 0x9}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x1000000007, 0xcf2e, 0x7e, 0x20, 0x15, r1, 0x4}, 0x2c) socketpair(0x3, 0x80e, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r4, &(0x7f0000000200)={&(0x7f0000000fc0)=@pppol2tp={0x18, 0x1, {0x0, r3, {0x2, 0x4e20, @broadcast=0xffffffff}, 0x1, 0x3, 0x0, 0x2}}, 0x80, &(0x7f0000001580)=[{&(0x7f0000001240)="95c4dcff0f017b3c1979888e50f6c20a37b4edaffb28a3b609d24a8180434ab2fac426d3e4fc87e18267002be3cd56b11d69c4db739bf6a9c91af67ee87be1ea522993a368bdfc0df55539a60ef5515b4f03f3dbddae65cd66a90f030118870b473f156cb9a18624103000608c63f84b09ea89bfb8d8e7705c6ef456ef28adec5e566632ddd63098", 0x88}, {&(0x7f0000001380)="5745869bf3b6f562576761d821af2ad55c2f81345c810d6dbd43facd33c5107488aa7f04c5ab1302b820cd31405e9f657776a0d48e2225f39aabc3de0b30dc7422503b448ad89c23ebaee24ae9696e4e58eccae5febf47fff53dc1f03d869303acdef233746263c5c567e84edb166010fd23f56d6e84406bced5a00b5016b0c700fd76218ecf5da3527552a683eb87aa4b246cd74bcbeff8dedec74332e0214e4dc64cb7ac24c4447843caa7550375ef8e1f74a78c40a617e913a25e4837d24fb09e93eaa2", 0xc5}, {&(0x7f0000001480)="8247f46d4324760570d5078149dc5b38f7d1c592564148ecc6262e91c29cd4344e423ff476882993a2844af9a7c306a15e659a4cb9230b5139842c87ad8fa95c202146730fa610b141dfe4c7b771b46e4db879d2b92a01cb8642100d80a1d4658fd0df05c06c8615960a92b690c728e2603373657a9a46b2f200f2895198694d470ab95b6eb7a76ccee67c9219b4afa289d70c87cf22c733e00700f345136d59bcbd89ce7e110746f91e7a7661b8eb0afe54e3cb1c712441dd9a6ffb59a2eb58e5f5eabd4bec428fe27a403bb0d19125e473abdfea87a0c89108e3c876438a7c3f84bebad6cf858f26d2083efd60", 0xee}], 0x3, &(0x7f000000a000)=[{0x88, 0x112, 0xc2, "6671b4b66ac2fb4e14cee671813dc3834802e601529feb049ebb70880567948953018cfd53d7b1c9be27b1084adfba62040c7f889cfbc15407d93133259d9d5052bf6648a69218702e35278939ad399dc3ebed233c1792c7c1204353c8fe75ea0398f4aaf830834bc93873c119dddc539c"}, {0xe8, 0x6f180cc1befb202, 0x9, "4577f77fd3b3acd92c96feff8b0409afeae1c16fa3d367241c9679e5105141c7205d47ce27a418c10fbe7f601c3142e7b7b3a67322c9d345e0baf4315e13dc771a962ff445015c98a70b319d46ba59155d1cf07827804ea1ca86db74f3029bd60f6f365d955ec12be30102e59b4b3940152988ef09443df596bad9525f697fad61507e856c6acb744cfb034863943e811bd378843ccbd95f8221a444f4c323a391f5788559f34ac02e6e18065b87e8c962353623250694e5b4bf9bc1b00fadf2875995067ff6c18590c207f9a83f06665f5b5af77b4e"}, {0xa0, 0x10f, 0x5, "07c5972c79a30903d5d93f57c962c0351628551f6a3fbac8e18984ad9b8caeb403f1d588fa0b9955ce44d018cbcc06ad98b588dd45fd0ccd6b8d1965e70693ec76dd521aa2693829ef54059dc3191f2f4eca64c63f2f901ead2d6c54f0119212ebb77e956117d9130d3adff30a5598567fd540cf0a8f9f8c469ad15f209ad8ef161006831b39e4ddf2fcd748a8629e33"}], 0x210, 0x40}, 0x40) close(r0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b53596090ebcc07d8584f358be88fafe") recvmsg(r2, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) recvmsg$kcm(r4, &(0x7f0000001a00)={0x0, 0x0, &(0x7f00000018c0)=[{&(0x7f0000001600)=""/173, 0xad}, {&(0x7f0000001040)=""/25, 0x19}, {&(0x7f00000016c0)=""/132, 0x84}, {&(0x7f0000001780)=""/91, 0x5b}, {&(0x7f0000001800)=""/183, 0xb7}], 0x5, &(0x7f0000001940)=""/163, 0xa3, 0xe43}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000a80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r5}, 0x48) 2018/03/29 11:56:21 executing program 3: r0 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x10}, 0x10) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000000c0)={0x0, 0x1000, 0x8}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000080)='./file0\x00', r1}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0x0, 0x8}, 0x10) mount(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='cpuset\x00', 0x40, &(0x7f0000000280)="8a4562cb6a7df38be32246afcaef1e1a3f933cb428242c55c117c0fbbd62cea0aab31f2665fb88267466eca314fc8cafd72cc24143121c0691236768fad66390bf9b55014c2bd49faa5388cbabd52e730eeb4ccc411bacd296e423d971043756cf2b35a4063f2a7465b44a60ef31ae437f6160ed2f63afa62c36a27c33e4779e7c0404e337abc025bb2e4b39cc265573c6ab1a3ff09c7ad6bb4631a4") mount(&(0x7f0000000340)='./file1\x00', &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='devtmpfs\x00', 0x40, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xb, 0x7f, 0x0, 0x1, 0x12, r1, 0x100000000}, 0x2c) mkdir(&(0x7f0000000440)='./file1\x00', 0x20) mount(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='iso9660\x00', 0x8, &(0x7f0000000540)="650fe6ccea2b17860de967406c566ec16fe5a7a4c064707e22906e9d3d2a70b4") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000005c0)={r2, 0x28, &(0x7f0000000580)={0x0, 0x0}}, 0x10) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={r3, 0x8, 0x10}, 0xc) mount(&(0x7f0000000640)='./file1\x00', &(0x7f0000000680)='./file1\x00', &(0x7f00000006c0)='pstore\x00', 0x1000000, &(0x7f0000000700)="f48afa3ab3cc319f917be52b04c388c229578537782bc5ffc32c7747b1d28999ad89f5fba460640a324385ac03cccef4553d641b91d79d014804a98e72796f8eb2e1a7056efeaa63404648df67079ae817420f248ccf9d01e7a027c600c71777fb9ebc97da60f3d1a287ef8bc00f1dc68c3b1f0c1836cde5b62be45dd58c3415cbb0f916fe3c04fc69911e2bec15c208d023bdb608fa727657c532bd5101a2a36b34c4eb65f855fea2d6f8a0a79b15ecef1a4c81a8f6f5ed57b09db2ab482413540416126718f2a33ed21346ded20b084a8dc10702ec279fc486b5c57c163d") socketpair(0x3, 0x2, 0x1f, &(0x7f0000001c40)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$kcm(r6, &(0x7f0000004300)={0x0, 0x0, &(0x7f0000004140)=[{&(0x7f0000001c80)=""/139, 0x8b}, {&(0x7f0000001d40)=""/149, 0x95}, {&(0x7f0000001e00)=""/188, 0xbc}, {&(0x7f0000001ec0)=""/69, 0x45}, {&(0x7f0000001f40)=""/165, 0xa5}, {&(0x7f0000002000)=""/4096, 0x1000}, {&(0x7f0000003000)=""/42, 0x2a}, {&(0x7f0000003040)=""/4096, 0x1000}, {&(0x7f0000004040)=""/233, 0xe9}], 0x9, &(0x7f0000004200)=""/236, 0xec, 0xe00}, 0x40) mount(&(0x7f0000004340)='./file1/file0\x00', &(0x7f0000004380)='./file1\x00', &(0x7f00000043c0)='ceph\x00', 0x4860, &(0x7f0000004400)="2c8eb517dd302be26597065442d58f3f345c295b542b2b1df3046ae176") bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000004600)={r6, &(0x7f0000004440)="903685b47b9c4d5c1dffcefa6a92cd57ccdfaf1af0be272f1cb4a5b86ab9d1ef248a63f04f5d59c2cd6e6b7722f5ff866c5d353014f28baaa95bce06a787a3e085102126a0386ffd4e136d472f2cdfb7c658643d2792b7235e2ec8c782080850c20eb00014eab035d7d56c8ddd0d7fdc4c21602d480e4accea0867cc5b4172b46b8f028bd623c58544092396dbda704543cd7c93219ff7f4caf9d0c12fc32c65ddac48ba22321d2c7ef1152f0dd87ed22cb30eb2b24d381b3abaefc114ad4c08e329cfbce60e0549ca", &(0x7f0000004540)="38859653237c5c9685cf2e44e1eea64846e190b778f29b06c26c2f2b8a0800f9fc2019b05290fc5c82f612eb7f479918015eb3af93cc57f01db731e129275ce05910f66e436ef09a8fe7bf22f960eacec350a7f7e9e9a47cb163f467b6a29523346a4c61d65d2235c73095a53929d509538f640424133cfa3617b41a51aa7172460146433abbe604f2c92827fabd5d3134d36b4cecd0fd2549f3527615f9eb63dd9332021e4eff13ad6aa509db21ed98745d00cb36e547", 0x3}, 0x20) mkdir(&(0x7f0000004640)='./file1/file0\x00', 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000004680)={0x0, 0x0, 0xa6, 0x3, 0x4}, 0x2c) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000046c0)=0x7, 0x4) recvmsg$kcm(r6, &(0x7f00000058c0)={&(0x7f0000004700)=@alg, 0x80, &(0x7f0000005880)=[{&(0x7f0000004780)=""/4096, 0x1000}, {&(0x7f0000005780)=""/219, 0xdb}], 0x2, 0x0, 0x0, 0x100000001}, 0x40000000) r7 = gettid() r8 = perf_event_open(&(0x7f0000005900)={0x7, 0x70, 0x0, 0xfffffffffffffff7, 0x9, 0x4, 0x0, 0x7, 0x100, 0x8, 0x100000000, 0x8000, 0x8, 0x6, 0x0, 0x6, 0x10001, 0x9, 0x1f, 0x2, 0x1, 0x3, 0x1, 0x1f, 0x23, 0x1, 0xaa4, 0x5, 0x4, 0x200, 0x6, 0x9, 0xfffffffffffffffb, 0x3, 0x3, 0xff, 0x80000000, 0x0, 0x0, 0xffffffffffffff9d, 0x2, @perf_config_ext={0x7, 0x9}, 0x100, 0x8, 0x2, 0x6, 0x4, 0x6, 0xf71}, r7, 0x9, r6, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f00000059c0)={&(0x7f0000005980)='./file0\x00'}, 0x10) ioctl$sock_kcm_SIOCKCMATTACH(r5, 0x89e0, &(0x7f0000005a00)={r5, r0}) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000005c00)={r4, &(0x7f0000005a40)="313befc1e9ac680c4369983530ee783c4f018c38e134b4b0aebd06ede05f238850949c0f5d32ab19889f880e87e3a0fa5a43500affdcc508d56f3a4df6c159ca9cfa62124b79b4607d42738dc5e16d09ea2c6a2346fc2360feff08d9f464dfdebce2cb99d4ba8e5fc37edfba041f14e16a68192d7d8687404ee7318323520188c4e5d52e8c7ec40bd0823fb210e530c74ea842bd8bacbc48317b0b6ed12528ecd30e1af83b8049df791ff7affe91ab54", &(0x7f0000005b00)=""/243}, 0x18) mount(&(0x7f0000005c40)='./file1/file0\x00', &(0x7f0000005c80)='./file1\x00', &(0x7f0000005cc0)='btrfs\x00', 0x0, 0x0) recvmsg(r5, &(0x7f00000073c0)={&(0x7f0000005d00)=@sco, 0x80, &(0x7f0000007300)=[{&(0x7f0000005d80)=""/103, 0x67}, {&(0x7f0000005e00)=""/170, 0xaa}, {&(0x7f0000005ec0)=""/252, 0xfc}, {&(0x7f0000005fc0)=""/136, 0x88}, {&(0x7f0000006080)=""/125, 0x7d}, {&(0x7f0000006100)=""/4096, 0x1000}, {&(0x7f0000007100)=""/106, 0x6a}, {&(0x7f0000007180)=""/115, 0x73}, {&(0x7f0000007200)=""/240, 0xf0}], 0x9, 0x0, 0x0, 0x7}, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000007400)={r3, 0x10001, 0x18}, 0xc) ioctl$PERF_EVENT_IOC_REFRESH(r8, 0x2402, 0xc4c) recvmsg$kcm(r6, &(0x7f0000008880)={&(0x7f0000007440)=@l2, 0x80, &(0x7f0000008800)=[{&(0x7f00000074c0)=""/231, 0xe7}, {&(0x7f00000075c0)=""/118, 0x76}, {&(0x7f0000008640)=""/223, 0xdf}, {&(0x7f0000008740)}, {&(0x7f0000008780)=""/32, 0x20}, {&(0x7f00000087c0)=""/53, 0x35}], 0x6}, 0x10000) 2018/03/29 11:56:21 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x1e1, 0x100000000209e20, 0x8000000001, 0x5}, 0xfffffffffffffe20) r0 = getpid() r1 = perf_event_open(&(0x7f0000000a00)={0x0, 0x70, 0xfffffffffffffffc, 0x3, 0x8, 0x2, 0x0, 0x9, 0x10000, 0xc, 0x3d3, 0x80, 0x5, 0xfffffffffffffffc, 0x8, 0x3f, 0x5d, 0xbbb0, 0x20, 0x3, 0x8000, 0x100000000, 0x8, 0x9, 0x2, 0x4, 0x800, 0xf8, 0x3, 0x9, 0x1, 0x3, 0x8, 0x3, 0x7, 0x10001, 0xf16, 0x2, 0x0, 0x7fffffff, 0x4, @perf_bp={&(0x7f0000000780), 0x1}, 0x4080, 0x10001, 0xcc, 0x7, 0x3, 0xffff, 0x7fffffff}, 0xffffffffffffffff, 0xd, 0xffffffffffffff9c, 0x8) perf_event_open(&(0x7f0000000980)={0x4, 0x70, 0x6, 0x3f, 0x8e, 0x1, 0x0, 0x3, 0x404, 0x0, 0xbc2b, 0x40, 0x7, 0xffff, 0xffff, 0x9, 0x9de2, 0x9, 0x0, 0x3, 0x7f, 0xff, 0x40, 0x400, 0x9, 0x7fffffff, 0x80000000, 0x7, 0x8, 0x10001, 0x1f, 0x2778, 0x800, 0x8001, 0x101, 0x9, 0x8, 0x7ff, 0x0, 0x1000, 0x5, @perf_config_ext={0x3ff, 0xb69b}, 0x3040, 0x2, 0x2, 0x5, 0x7, 0x6, 0x7283ed73}, r0, 0xe, r1, 0x8) bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x0, 0x0, 0x7ffff9, 0x0, 0x20000003, 0x0}, 0x2c) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) r2 = gettid() r3 = perf_event_open(&(0x7f00000008c0)={0x7, 0x70, 0x1, 0x200, 0x3, 0xdbce, 0x0, 0x8, 0x1002, 0x1, 0xffffffffffffff00, 0x8, 0x1, 0xb3fa, 0x8, 0x0, 0x1, 0x2, 0x1000, 0x2, 0x401, 0x8, 0x3, 0x81, 0x0, 0x7, 0x2fc4, 0x882, 0x4, 0x8, 0x3, 0x81, 0x3, 0x7, 0x8857, 0x7, 0x5, 0x9, 0x0, 0x7, 0x1, @perf_config_ext={0x0, 0x80000000}, 0x400, 0x7f, 0x4, 0x7, 0x2, 0x7f, 0x200}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000840)={0x5, 0x70, 0xef, 0x2, 0x1000, 0xffffffff80000000, 0x0, 0x1a7800000000, 0x2000, 0x4, 0x5, 0x6814, 0x3a9, 0x5, 0x63b, 0x6, 0x8, 0x1000, 0x250420ee, 0x3, 0x0, 0x20, 0x6, 0x0, 0x4, 0x5, 0x4, 0x8, 0x3, 0x8, 0x52893dd5, 0x2, 0x2, 0x8, 0x44d, 0x1, 0x8, 0x6, 0x0, 0x100000000, 0x0, @perf_config_ext={0x9, 0x80}, 0x0, 0x0, 0x2b67, 0x6, 0x4b0, 0x81, 0x4}, r2, 0x5, r3, 0xb) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1003, 0x0) mount(&(0x7f00002b9ff8)='./file0\x00', &(0x7f0000cbeff8)='./file0\x00', &(0x7f00005f7ffa)='ramfs\x00', 0x80000, &(0x7f000002f000)) mount(&(0x7f0000000000)='.', &(0x7f0000000040)='.', &(0x7f0000000080)='cgroup\x00', 0x5010, &(0x7f00000000c0)) mount(&(0x7f0000377ff8)='.', &(0x7f0000000280)='.', &(0x7f0000000600)='nfs4\x00', 0x5010, &(0x7f0000000300)="2161893416a0c71070768c219eb114c3253c9f3baf4e9e8e9111c1a7fc6e266009fe27243deeaa22ca7ae9341f714300b5ee807e55d609036f2a3260475922bdfb2d2849f1c3b2ad3c051bd4f3751a177f77a92758c6d2b23fe7f1535b54e5846d11c135de8286066dec1b25f6e1378944ac5f7fce42d055821b5e19") perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xd68, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f0000014f88)={0x5, 0xfffffffffffffdc4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x46000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = getpid() perf_event_open(&(0x7f0000000680)={0x4, 0x70, 0x64, 0xffff, 0x1f, 0x4, 0x0, 0x1c3, 0x0, 0x1, 0x1, 0x9, 0x1ff, 0xfffffffffffffff8, 0x0, 0x0, 0x6, 0x7fffffff, 0x0, 0xffffffff, 0x80000001, 0xd0, 0x7, 0x1f, 0x0, 0x8, 0x9, 0x1ff, 0x8, 0x785, 0x4, 0xff, 0x2, 0x656, 0x5000000, 0x1, 0x460e3be0, 0x1, 0x0, 0x0, 0x7, @perf_bp={&(0x7f0000000640), 0x1}, 0x1000, 0xa, 0x7fff, 0x7, 0x3, 0x400, 0x9}, r5, 0xe, r4, 0x1) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', 0x0, 0x10}, 0x10) close(0xffffffffffffffff) bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)={&(0x7f0000000040)='./file0\x00', 0x0, 0x18}, 0x10) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000100)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0, 0x2e, &(0x7f0000000440), &(0x7f0000000140)=""/46, 0x4229}, 0x28) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000003480)={&(0x7f0000003300)=@can={0x0, 0x0}, 0x80, &(0x7f0000003400)=[{&(0x7f0000003380)=""/56, 0x38}, {&(0x7f00000033c0)=""/1, 0x1}], 0x2, &(0x7f0000003440)=""/33, 0x21, 0x1}, 0x40010000) bpf$PROG_LOAD(0x5, &(0x7f00000034c0)={0xe, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="1800000002000000000000004ce700002555fdff00000000002371d07c9ba7f4a23372b0ad61000000000000009500000000000000"], &(0x7f00000007c0)='GPL\x00', 0x3, 0x2d, &(0x7f0000000800)=""/45, 0x40f00, 0x1, [], r6}, 0x48) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000740)={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x10) socketpair$inet(0x2, 0x80a, 0x81, &(0x7f0000000240)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={0xffffffffffffffff, &(0x7f0000000500)="ae30f1bca1b4d3f69f1aac81517d42ad5980bc63b5008616a1f4724b9f8c1e4ecd8de336f57dd727cdaab04f0b40f28612615ad08de414711d841a88db33fd33884b627074213a0c5de3be2bbaec9207d9865c47f240467849979b5ab5632376608fc4be41a274abb2dc07cabe344a18db51048e5b0cbda843905a4258cdee3e649eddf104ba78894dce09747dcfe6a8d6d6d985520eeef448b83a8bcb83074541ba7a20d6094aa206c01a0690e5b3bfa05d475eb382b0199031d22bb26cde9b1ca0055eef9f6c4993b71ba19ba0590bb5efdaddaa574c25356ca890d138fc9fe0e975b6d5a1a8251503cd0a91845f9d95", &(0x7f0000000480)="9bc7741ea5e524cc8c6f748a73153834428729c45bf4ad446d2dddf1978baf431d0ba35b5442b5afe22db8b003650320200af7e1368ef7cdfa79ca8b9d3564363a5d2a502970314f2264c883bc8d990afc003e5adb95b30edad245c4420c8126f1d33db75ff0230698eaff90055e0f", 0x2}, 0x20) socketpair(0x0, 0x80003, 0xffff, &(0x7f0000000380)={0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r7, 0x50, &(0x7f00000003c0)}, 0x10) 2018/03/29 11:56:21 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x1e1, 0x100000000209e20, 0x8000000001, 0x5}, 0xfffffffffffffe20) r0 = getpid() r1 = perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0xfffffffffffffffc, 0x3, 0x8, 0x2, 0x0, 0x9, 0x10000, 0xc, 0x3d3, 0x80, 0x5, 0xfffffffffffffffc, 0x8, 0x3f, 0x5d, 0xbbb0, 0x20, 0x3, 0x8000, 0x100000000, 0x8, 0x9, 0x2, 0x4, 0x800, 0xf8, 0x3, 0x9, 0x1, 0x3, 0x8, 0x3, 0x7, 0x10001, 0xf16, 0x2, 0x0, 0x7fffffff, 0x4, @perf_bp={&(0x7f0000000780), 0x1}, 0x4080, 0x10001, 0xcc, 0x7, 0x3, 0xffff, 0x7fffffff}, 0xffffffffffffffff, 0xd, 0xffffffffffffff9c, 0x8) perf_event_open(&(0x7f0000000980)={0x4, 0x70, 0x6, 0x3f, 0x8e, 0x1, 0x0, 0x3, 0x404, 0x0, 0xbc2b, 0x40, 0x7, 0xffff, 0xffff, 0x9, 0x9de2, 0x9, 0x0, 0x3, 0x7f, 0xff, 0x40, 0x400, 0x9, 0x7fffffff, 0x80000000, 0x7, 0x8, 0x10001, 0x1f, 0x2778, 0x800, 0x8001, 0x101, 0x9, 0x8, 0x7ff, 0x0, 0x1000, 0x5, @perf_config_ext={0x3ff, 0xb69b}, 0x3040, 0x2, 0x2, 0x5, 0x7, 0x6, 0x7283ed73}, r0, 0xe, r1, 0x8) bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x0, 0x0, 0x7ffff9, 0x0, 0x20000003, 0x0}, 0x2c) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) r2 = gettid() r3 = perf_event_open(&(0x7f00000008c0)={0x7, 0x70, 0x1, 0x200, 0x3, 0xdbce, 0x0, 0x8, 0x1002, 0x1, 0xffffffffffffff00, 0x8, 0x1, 0xb3fa, 0x8, 0x0, 0x1, 0x2, 0x1000, 0x2, 0x401, 0x8, 0x3, 0x81, 0x0, 0x7, 0x2fc4, 0x882, 0x4, 0x8, 0x3, 0x81, 0x3, 0x7, 0x8857, 0x7, 0x5, 0x9, 0x0, 0x7, 0x1, @perf_config_ext={0x0, 0x80000000}, 0x400, 0x7f, 0x4, 0x7, 0x2, 0x7f, 0x200}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000840)={0x5, 0x70, 0xef, 0x2, 0x1000, 0xffffffff80000000, 0x0, 0x1a7800000000, 0x2000, 0x4, 0x5, 0x6814, 0x3a9, 0x5, 0x63b, 0x6, 0x8, 0x1000, 0x250420ee, 0x3, 0x0, 0x20, 0x6, 0x0, 0x4, 0x5, 0x4, 0x8, 0x3, 0x8, 0x52893dd5, 0x2, 0x2, 0x8, 0x44d, 0x1, 0x8, 0x6, 0x0, 0x100000000, 0x0, @perf_config_ext={0x9, 0x80}, 0x0, 0x0, 0x2b67, 0x6, 0x4b0, 0x81, 0x4}, r2, 0x5, r3, 0xb) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1003, 0x0) mount(&(0x7f00002b9ff8)='./file0\x00', &(0x7f0000cbeff8)='./file0\x00', &(0x7f00005f7ffa)='ramfs\x00', 0x80000, &(0x7f000002f000)) mount(&(0x7f0000000000)='.', &(0x7f0000000040)='.', &(0x7f0000000080)='cgroup\x00', 0x5010, &(0x7f00000000c0)) mount(&(0x7f0000377ff8)='.', &(0x7f0000000280)='.', &(0x7f0000000600)='nfs4\x00', 0x5010, &(0x7f0000000300)="2161893416a0c71070768c219eb114c3253c9f3baf4e9e8e9111c1a7fc6e266009fe27243deeaa22ca7ae9341f714300b5ee807e55d609036f2a3260475922bdfb2d2849f1c3b2ad3c051bd4f3751a177f77a92758c6d2b23fe7f1535b54e5846d11c135de8286066dec1b25f6e1378944ac5f7fce42d055821b5e19") perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xd68, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f0000014f88)={0x5, 0xfffffffffffffdc4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x46000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = getpid() perf_event_open(&(0x7f0000000680)={0x4, 0x70, 0x64, 0xffff, 0x1f, 0x4, 0x0, 0x1c3, 0x0, 0x1, 0x1, 0x9, 0x1ff, 0xfffffffffffffff8, 0x0, 0x0, 0x6, 0x7fffffff, 0x4, 0xffffffff, 0x80000001, 0xd0, 0x7, 0x1f, 0x0, 0x8, 0x9, 0x1ff, 0x8, 0x785, 0x4, 0xff, 0x2, 0x656, 0x5000000, 0x1, 0x460e3be0, 0x1, 0x0, 0x0, 0x7, @perf_bp={&(0x7f0000000640), 0x1}, 0x1000, 0xa, 0x7fff, 0x7, 0x3, 0x400, 0x9}, r5, 0xe, r4, 0x1) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', 0x0, 0x10}, 0x10) close(0xffffffffffffffff) bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)={&(0x7f0000000040)='./file0\x00', 0x0, 0x18}, 0x10) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000100)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0, 0x2e, &(0x7f0000000440), &(0x7f0000000140)=""/46, 0x4229}, 0x28) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000003480)={&(0x7f0000003300)=@can={0x0, 0x0}, 0x80, &(0x7f0000003400)=[{&(0x7f0000003380)=""/56, 0x38}, {&(0x7f00000033c0)=""/1, 0x1}], 0x2, &(0x7f0000003440)=""/33, 0x21, 0x1}, 0x40010000) bpf$PROG_LOAD(0x5, &(0x7f00000034c0)={0xe, 0x6, &(0x7f0000000940)=ANY=[@ANYBLOB="1800000002000000000000004ce700002555fdff00000000002371d07c9ba7f4a23372b0ad61000000000000009500000000000000"], &(0x7f00000007c0)='GPL\x00', 0x3, 0x2d, &(0x7f0000000800)=""/45, 0x40f00, 0x0, [], r6}, 0x48) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000740)={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x10) socketpair$inet(0x2, 0x80a, 0x81, &(0x7f0000000240)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={0xffffffffffffffff, &(0x7f0000000500)="ae30f1bca1b4d3f69f1aac81517d42ad5980bc63b5008616a1f4724b9f8c1e4ecd8de336f57dd727cdaab04f0b40f28612615ad08de414711d841a88db33fd33884b627074213a0c5de3be2bbaec9207d9865c47f240467849979b5ab5632376608fc4be41a274abb2dc07cabe344a18db51048e5b0cbda843905a4258cdee3e649eddf104ba78894dce09747dcfe6a8d6d6d985520eeef448b83a8bcb83074541ba7a20d6094aa206c01a0690e5b3bfa05d475eb382b0199031d22bb26cde9b1ca0055eef9f6c4993b71ba19ba0590bb5efdaddaa574c25356ca890d138fc9fe0e975b6d5a1a8251503cd0a91845f9d95", &(0x7f0000000480)="9bc7741ea5e524cc8c6f748a73153834428729c45bf4ad446d2dddf1978baf431d0ba35b5442b5afe22db8b003650320200af7e1368ef7cdfa79ca8b9d3564363a5d2a502970314f2264c883bc8d990afc003e5adb95b30edad245c4420c8126f1d33db75ff0230698eaff90055e0f", 0x2}, 0x20) socketpair(0x0, 0x80003, 0xffff, &(0x7f0000000380)={0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r7, 0x50, &(0x7f00000003c0)}, 0x10) 2018/03/29 11:56:21 executing program 0: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000001a00)) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000001a40)={0xffffffffffffffff}) recvmsg$kcm(r1, &(0x7f0000000540)={&(0x7f00000000c0)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @broadcast}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000240)=""/65, 0x41}], 0x1, &(0x7f0000000440)=""/213, 0xd5}, 0x0) recvmsg(r1, &(0x7f0000000000)={&(0x7f0000000180)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000880)=[{&(0x7f00000002c0)=""/171, 0xab}, {&(0x7f0000000580)=""/231, 0xe7}, {&(0x7f0000000680)=""/126, 0x7e}, {&(0x7f0000000700)=""/111, 0x6f}, {&(0x7f0000000780)=""/210, 0xd2}], 0x5, &(0x7f0000000900)=""/151, 0x97, 0xe584}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x8983, &(0x7f0000000040)) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000001180)) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000019c0)={0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000000140)="0253eea6a53cc0eae389e9a13e5f2046d0633eebde90f446c1b1eabbd0adb42dfcefb37a3df93feb3d5e76dc353ecf23fe9c81afa5", 0x35}, {&(0x7f00000002c0)}, {&(0x7f0000000400)}, {&(0x7f0000001600)}], 0x4, &(0x7f0000001700)=ANY=[@ANYBLOB="680000000000000007010000c17d0425755cd1e9e23de47cb15819d813deb534cee2d9497c58eba5bd8a228407fb709d70f16afa73f4924f12ecc429b6fd356748940b62ee5f5685027fe4e6c60a8f88cd1a5827d099f5849f09bd3b4a2e37871738f200000000100000000000000000007c509f0000ff01000010000000000000000701000801"], 0x88}, 0x48800) recvmsg(r2, &(0x7f0000001140)={&(0x7f0000000d00)=@nfc_llcp, 0x80, &(0x7f0000001000)=[{&(0x7f0000000d80)=""/112, 0x70}, {&(0x7f0000000e00)=""/110, 0x6e}, {&(0x7f0000000e80)=""/82, 0x52}, {&(0x7f0000000f00)=""/250, 0xfa}], 0x4, &(0x7f0000001040)=""/210, 0xd2, 0xffffffffffffff62}, 0x40010040) recvmsg(r2, &(0x7f0000000cc0)={0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f0000000200)=""/21, 0x15}, {&(0x7f00000009c0)=""/162, 0xa2}, {&(0x7f0000000380)=""/19, 0x13}, {&(0x7f0000000400)=""/32, 0x20}, {&(0x7f0000000a80)=""/232, 0xe8}, {&(0x7f0000000b80)=""/58, 0x3a}], 0x6, &(0x7f0000000c40)=""/106, 0x6a, 0x200}, 0x40000043) 2018/03/29 11:56:21 executing program 3: r0 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x10}, 0x10) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000000c0)={0x0, 0x1000, 0x8}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000080)='./file0\x00', r1}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0x0, 0x8}, 0x10) mount(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='cpuset\x00', 0x40, &(0x7f0000000280)="8a4562cb6a7df38be32246afcaef1e1a3f933cb428242c55c117c0fbbd62cea0aab31f2665fb88267466eca314fc8cafd72cc24143121c0691236768fad66390bf9b55014c2bd49faa5388cbabd52e730eeb4ccc411bacd296e423d971043756cf2b35a4063f2a7465b44a60ef31ae437f6160ed2f63afa62c36a27c33e4779e7c0404e337abc025bb2e4b39cc265573c6ab1a3ff09c7ad6bb4631a4") mount(&(0x7f0000000340)='./file1\x00', &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='devtmpfs\x00', 0x40, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xb, 0x7f, 0x0, 0x1, 0x12, r1, 0x100000000}, 0x2c) mkdir(&(0x7f0000000440)='./file1\x00', 0x20) mount(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='iso9660\x00', 0x8, &(0x7f0000000540)="650fe6ccea2b17860de967406c566ec16fe5a7a4c064707e22906e9d3d2a70b4") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000005c0)={r2, 0x28, &(0x7f0000000580)={0x0, 0x0}}, 0x10) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={r3, 0x8, 0x10}, 0xc) mount(&(0x7f0000000640)='./file1\x00', &(0x7f0000000680)='./file1\x00', &(0x7f00000006c0)='pstore\x00', 0x1000000, &(0x7f0000000700)="f48afa3ab3cc319f917be52b04c388c229578537782bc5ffc32c7747b1d28999ad89f5fba460640a324385ac03cccef4553d641b91d79d014804a98e72796f8eb2e1a7056efeaa63404648df67079ae817420f248ccf9d01e7a027c600c71777fb9ebc97da60f3d1a287ef8bc00f1dc68c3b1f0c1836cde5b62be45dd58c3415cbb0f916fe3c04fc69911e2bec15c208d023bdb608fa727657c532bd5101a2a36b34c4eb65f855fea2d6f8a0a79b15ecef1a4c81a8f6f5ed57b09db2ab482413540416126718f2a33ed21346ded20b084a8dc10702ec279fc486b5c57c163d") socketpair(0x3, 0x2, 0x1f, &(0x7f0000001c40)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$kcm(r6, &(0x7f0000004300)={0x0, 0x0, &(0x7f0000004140)=[{&(0x7f0000001c80)=""/139, 0x8b}, {&(0x7f0000001d40)=""/149, 0x95}, {&(0x7f0000001e00)=""/188, 0xbc}, {&(0x7f0000001ec0)=""/69, 0x45}, {&(0x7f0000001f40)=""/165, 0xa5}, {&(0x7f0000002000)=""/4096, 0x1000}, {&(0x7f0000003000)=""/42, 0x2a}, {&(0x7f0000003040)=""/4096, 0x1000}, {&(0x7f0000004040)=""/233, 0xe9}], 0x9, &(0x7f0000004200)=""/236, 0xec, 0xe00}, 0x40) mount(&(0x7f0000004340)='./file1/file0\x00', &(0x7f0000004380)='./file1\x00', &(0x7f00000043c0)='ceph\x00', 0x4860, &(0x7f0000004400)="2c8eb517dd302be26597065442d58f3f345c295b542b2b1df3046ae176") bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000004600)={r6, &(0x7f0000004440)="903685b47b9c4d5c1dffcefa6a92cd57ccdfaf1af0be272f1cb4a5b86ab9d1ef248a63f04f5d59c2cd6e6b7722f5ff866c5d353014f28baaa95bce06a787a3e085102126a0386ffd4e136d472f2cdfb7c658643d2792b7235e2ec8c782080850c20eb00014eab035d7d56c8ddd0d7fdc4c21602d480e4accea0867cc5b4172b46b8f028bd623c58544092396dbda704543cd7c93219ff7f4caf9d0c12fc32c65ddac48ba22321d2c7ef1152f0dd87ed22cb30eb2b24d381b3abaefc114ad4c08e329cfbce60e0549ca", &(0x7f0000004540)="38859653237c5c9685cf2e44e1eea64846e190b778f29b06c26c2f2b8a0800f9fc2019b05290fc5c82f612eb7f479918015eb3af93cc57f01db731e129275ce05910f66e436ef09a8fe7bf22f960eacec350a7f7e9e9a47cb163f467b6a29523346a4c61d65d2235c73095a53929d509538f640424133cfa3617b41a51aa7172460146433abbe604f2c92827fabd5d3134d36b4cecd0fd2549f3527615f9eb63dd9332021e4eff13ad6aa509db21ed98745d00cb36e547", 0x3}, 0x20) mkdir(&(0x7f0000004640)='./file1/file0\x00', 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000004680)={0x0, 0x0, 0xa6, 0x3, 0x4}, 0x2c) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000046c0)=0x7, 0x4) recvmsg$kcm(r6, &(0x7f00000058c0)={&(0x7f0000004700)=@alg, 0x80, &(0x7f0000005880)=[{&(0x7f0000004780)=""/4096, 0x1000}, {&(0x7f0000005780)=""/219, 0xdb}], 0x2, 0x0, 0x0, 0x100000001}, 0x40000000) r7 = gettid() r8 = perf_event_open(&(0x7f0000005900)={0x7, 0x70, 0x0, 0xfffffffffffffff7, 0x9, 0x4, 0x0, 0x7, 0x100, 0x8, 0x100000000, 0x8000, 0x8, 0x6, 0x0, 0x6, 0x10001, 0x9, 0x1f, 0x2, 0x1, 0x3, 0x1, 0x1f, 0x23, 0x1, 0xaa4, 0x5, 0x4, 0x200, 0x6, 0x9, 0xfffffffffffffffb, 0x3, 0x3, 0xff, 0x80000000, 0x0, 0x0, 0xffffffffffffff9d, 0x2, @perf_config_ext={0x7, 0x9}, 0x100, 0x8, 0x2, 0x6, 0x4, 0x6, 0xf71}, r7, 0x9, r6, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f00000059c0)={&(0x7f0000005980)='./file0\x00'}, 0x10) ioctl$sock_kcm_SIOCKCMATTACH(r5, 0x89e0, &(0x7f0000005a00)={r5, r0}) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000005c00)={r4, &(0x7f0000005a40)="313befc1e9ac680c4369983530ee783c4f018c38e134b4b0aebd06ede05f238850949c0f5d32ab19889f880e87e3a0fa5a43500affdcc508d56f3a4df6c159ca9cfa62124b79b4607d42738dc5e16d09ea2c6a2346fc2360feff08d9f464dfdebce2cb99d4ba8e5fc37edfba041f14e16a68192d7d8687404ee7318323520188c4e5d52e8c7ec40bd0823fb210e530c74ea842bd8bacbc48317b0b6ed12528ecd30e1af83b8049df791ff7affe91ab54", &(0x7f0000005b00)=""/243}, 0x18) mount(&(0x7f0000005c40)='./file1/file0\x00', &(0x7f0000005c80)='./file1\x00', &(0x7f0000005cc0)='btrfs\x00', 0x0, 0x0) recvmsg(r5, &(0x7f00000073c0)={&(0x7f0000005d00)=@sco, 0x80, &(0x7f0000007300)=[{&(0x7f0000005d80)=""/103, 0x67}, {&(0x7f0000005e00)=""/170, 0xaa}, {&(0x7f0000005ec0)=""/252, 0xfc}, {&(0x7f0000005fc0)=""/136, 0x88}, {&(0x7f0000006080)=""/125, 0x7d}, {&(0x7f0000006100)=""/4096, 0x1000}, {&(0x7f0000007100)=""/106, 0x6a}, {&(0x7f0000007180)=""/115, 0x73}, {&(0x7f0000007200)=""/240, 0xf0}], 0x9, 0x0, 0x0, 0x7}, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000007400)={r3, 0x10001, 0x18}, 0xc) ioctl$PERF_EVENT_IOC_REFRESH(r8, 0x2402, 0xc4c) recvmsg$kcm(r6, &(0x7f0000008880)={&(0x7f0000007440)=@l2, 0x80, &(0x7f0000008800)=[{&(0x7f00000074c0)=""/231, 0xe7}, {&(0x7f00000075c0)=""/118, 0x76}, {&(0x7f0000008640)=""/223, 0xdf}, {&(0x7f0000008740)}, {&(0x7f0000008780)=""/32, 0x20}, {&(0x7f00000087c0)=""/53, 0x35}], 0x6}, 0x10000) 2018/03/29 11:56:21 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x1e1, 0x100000000209e20, 0x8000000001, 0x5}, 0xfffffffffffffe20) r0 = getpid() r1 = perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0x0, 0x3, 0x8, 0x2, 0x0, 0x9, 0x10000, 0xc, 0x3d3, 0x80, 0x5, 0xfffffffffffffffc, 0x8, 0x3f, 0x5d, 0xbbb0, 0x20, 0x3, 0x8000, 0x100000000, 0x8, 0x9, 0x2, 0x4, 0x800, 0xf8, 0x3, 0x9, 0x1, 0x3, 0x8, 0x3, 0x7, 0x10001, 0xf16, 0x2, 0x0, 0x7fffffff, 0x4, @perf_bp={&(0x7f0000000780), 0x1}, 0x4080, 0x10001, 0xcc, 0x7, 0x3, 0xffff, 0x7fffffff}, 0xffffffffffffffff, 0xd, 0xffffffffffffff9c, 0x8) perf_event_open(&(0x7f0000000980)={0x4, 0x70, 0x6, 0x3f, 0x8e, 0x1, 0x0, 0x3, 0x404, 0x0, 0xbc2b, 0x40, 0x7, 0xffff, 0xffff, 0x9, 0x9de2, 0x9, 0x0, 0x3, 0x7f, 0xff, 0x40, 0x400, 0x9, 0x7fffffff, 0x80000000, 0x7, 0x8, 0x10001, 0x1f, 0x2778, 0x800, 0x8001, 0x101, 0x9, 0x8, 0x7ff, 0x0, 0x1000, 0x5, @perf_config_ext={0x3ff, 0xb69b}, 0x3040, 0x2, 0x2, 0x5, 0x7, 0x6, 0x7283ed73}, r0, 0xe, r1, 0x8) bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x0, 0x0, 0x7ffff9, 0x0, 0x20000003, 0x0}, 0x2c) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) r2 = gettid() r3 = perf_event_open(&(0x7f00000008c0)={0x7, 0x70, 0x1, 0x200, 0x3, 0xdbce, 0x0, 0x8, 0x1002, 0x1, 0xffffffffffffff00, 0x8, 0x1, 0xb3fa, 0x8, 0x0, 0x1, 0x2, 0x1000, 0x2, 0x401, 0x8, 0x3, 0x81, 0x0, 0x7, 0x2fc4, 0x882, 0x4, 0x8, 0x3, 0x81, 0x3, 0x7, 0x8857, 0x7, 0x5, 0x9, 0x0, 0x7, 0x1, @perf_config_ext={0x0, 0x80000000}, 0x400, 0x7f, 0x4, 0x7, 0x2, 0x7f, 0x200}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000840)={0x5, 0x70, 0xef, 0x2, 0x1000, 0xffffffff80000000, 0x0, 0x1a7800000000, 0x2000, 0x4, 0x5, 0x6814, 0x3a9, 0x5, 0x63b, 0x6, 0x8, 0x1000, 0x250420ee, 0x3, 0x0, 0x20, 0x6, 0x0, 0x4, 0x5, 0x4, 0x8, 0x3, 0x8, 0x52893dd5, 0x2, 0x2, 0x8, 0x44d, 0x1, 0x8, 0x6, 0x0, 0x100000000, 0x0, @perf_config_ext={0x9, 0x80}, 0x0, 0x0, 0x2b67, 0x6, 0x4b0, 0x81, 0x4}, r2, 0x5, r3, 0xb) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1003, 0x0) mount(&(0x7f00002b9ff8)='./file0\x00', &(0x7f0000cbeff8)='./file0\x00', &(0x7f00005f7ffa)='ramfs\x00', 0x80000, &(0x7f000002f000)) mount(&(0x7f0000000000)='.', &(0x7f0000000040)='.', &(0x7f0000000080)='cgroup\x00', 0x5010, &(0x7f00000000c0)) mount(&(0x7f0000377ff8)='.', &(0x7f0000000280)='.', &(0x7f0000000600)='nfs4\x00', 0x5010, &(0x7f0000000300)="2161893416a0c71070768c219eb114c3253c9f3baf4e9e8e9111c1a7fc6e266009fe27243deeaa22ca7ae9341f714300b5ee807e55d609036f2a3260475922bdfb2d2849f1c3b2ad3c051bd4f3751a177f77a92758c6d2b23fe7f1535b54e5846d11c135de8286066dec1b25f6e1378944ac5f7fce42d055821b5e19") perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xd68, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f0000014f88)={0x5, 0xfffffffffffffdc4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x46000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = getpid() perf_event_open(&(0x7f0000000680)={0x4, 0x70, 0x64, 0xffff, 0x1f, 0x4, 0x0, 0x1c3, 0x0, 0x1, 0x1, 0x9, 0x1ff, 0xfffffffffffffff8, 0x0, 0x0, 0x6, 0x7fffffff, 0x0, 0xffffffff, 0x80000001, 0xd0, 0x7, 0x1f, 0x0, 0x8, 0x9, 0x1ff, 0x8, 0x785, 0x4, 0xff, 0x2, 0x656, 0x5000000, 0x1, 0x460e3be0, 0x1, 0x0, 0x0, 0x7, @perf_bp={&(0x7f0000000640), 0x1}, 0x1000, 0xa, 0x7fff, 0x7, 0x3, 0x400, 0x9}, r5, 0xe, r4, 0x1) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', 0x0, 0x10}, 0x10) close(0xffffffffffffffff) bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)={&(0x7f0000000040)='./file0\x00', 0x0, 0x18}, 0x10) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000100)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0, 0x2e, &(0x7f0000000440), &(0x7f0000000140)=""/46, 0x4229}, 0x28) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000003480)={&(0x7f0000003300)=@can={0x0, 0x0}, 0x80, &(0x7f0000003400)=[{&(0x7f0000003380)=""/56, 0x38}, {&(0x7f00000033c0)=""/1, 0x1}], 0x2, &(0x7f0000003440)=""/33, 0x21, 0x1}, 0x40010000) bpf$PROG_LOAD(0x5, &(0x7f00000034c0)={0xe, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="1800000002000000000000004ce700002555fdff00000000002371d07c9ba7f4a23372b0ad61000000000000009500000000000000"], &(0x7f00000007c0)='GPL\x00', 0x3, 0x2d, &(0x7f0000000800)=""/45, 0x40f00, 0x1, [], r6}, 0x48) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000740)={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x10) socketpair$inet(0x2, 0x80a, 0x81, &(0x7f0000000240)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={0xffffffffffffffff, &(0x7f0000000500)="ae30f1bca1b4d3f69f1aac81517d42ad5980bc63b5008616a1f4724b9f8c1e4ecd8de336f57dd727cdaab04f0b40f28612615ad08de414711d841a88db33fd33884b627074213a0c5de3be2bbaec9207d9865c47f240467849979b5ab5632376608fc4be41a274abb2dc07cabe344a18db51048e5b0cbda843905a4258cdee3e649eddf104ba78894dce09747dcfe6a8d6d6d985520eeef448b83a8bcb83074541ba7a20d6094aa206c01a0690e5b3bfa05d475eb382b0199031d22bb26cde9b1ca0055eef9f6c4993b71ba19ba0590bb5efdaddaa574c25356ca890d138fc9fe0e975b6d5a1a8251503cd0a91845f9d95", &(0x7f0000000480)="9bc7741ea5e524cc8c6f748a73153834428729c45bf4ad446d2dddf1978baf431d0ba35b5442b5afe22db8b003650320200af7e1368ef7cdfa79ca8b9d3564363a5d2a502970314f2264c883bc8d990afc003e5adb95b30edad245c4420c8126f1d33db75ff0230698eaff90055e0f", 0x2}, 0x20) socketpair(0x0, 0x80003, 0xffff, &(0x7f0000000380)={0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r7, 0x50, &(0x7f00000003c0)}, 0x10) 2018/03/29 11:56:21 executing program 0: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000001a00)) r1 = perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0xb208, 0x7fff, 0xffffffff, 0x1ff, 0x0, 0x10000, 0x104, 0x8, 0x0, 0x3ff, 0x4, 0xfffffffffffffffa, 0x100, 0x4, 0xffffffffffffffff, 0x6, 0x7ff, 0x2, 0x41, 0x9, 0x7, 0x0, 0xff, 0x80000000, 0xe3, 0x7f, 0x1, 0x0, 0x2, 0xffffffffffff8f7c, 0xc0eb, 0xfffffffffffff001, 0xbd5, 0x8, 0xbf2e, 0x3, 0x0, 0x436, 0x4, @perf_bp={&(0x7f0000000000), 0x2}, 0x1008, 0x8001, 0x0, 0x7, 0x3, 0x100, 0x1f}, 0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000001a40)={0xffffffffffffffff}) recvmsg$kcm(r2, &(0x7f0000000540)={&(0x7f00000000c0)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @broadcast}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000240)=""/65, 0x41}], 0x1, &(0x7f0000000440)=""/213, 0xd5}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x8983, &(0x7f0000000040)) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000080)) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000019c0)={0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000000140)="0253eea6a53cc0eae389e9a13e5f2046d0633eebde90f446c1b1eabbd0adb42dfcefb37a3df93feb3d5e76dc353ecf23fe9c81afa5", 0x35}, {&(0x7f00000002c0)}, {&(0x7f0000000400)}, {&(0x7f0000001600)}], 0x4, &(0x7f0000001700)=[{0x68, 0x107, 0x25047dc1, "755cd1e9e23de47cb15819d813deb534cee2d9497c58eba5bd8a228407fb709d70f16afa73f4924f12ecc429b6fd356748940b62ee5f5685ce027fe4e6c60a8f88cd1a5827d099f5849f09bd37f681e29814e6bb"}, {0x10, 0x0, 0x1ff}, {0x10, 0x107, 0x80000001}], 0x88}, 0x48800) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000200)='./file0\x00'}, 0x10) 2018/03/29 11:56:21 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x1e1, 0x100000000209e20, 0x8000000001, 0x5}, 0xfffffffffffffe20) r0 = getpid() r1 = perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0xfffffffffffffffc, 0x3, 0x8, 0x2, 0x0, 0x9, 0x10000, 0xc, 0x3d3, 0x80, 0x5, 0xfffffffffffffffc, 0x8, 0x3f, 0x5d, 0xbbb0, 0x20, 0x3, 0x8000, 0x100000000, 0x8, 0x9, 0x2, 0x4, 0x800, 0xf8, 0x3, 0x9, 0x1, 0x3, 0x8, 0x3, 0x7, 0x10001, 0xf16, 0x2, 0x0, 0x7fffffff, 0x4, @perf_bp={&(0x7f0000000780), 0x1}, 0x4080, 0x10001, 0xcc, 0x7, 0x3, 0xffff, 0x7fffffff}, 0xffffffffffffffff, 0xd, 0xffffffffffffff9c, 0x8) perf_event_open(&(0x7f0000000980)={0x4, 0x70, 0x6, 0x3f, 0x8e, 0x1, 0x0, 0x3, 0x404, 0x0, 0xbc2b, 0x40, 0x7, 0xffff, 0xffff, 0x9, 0x9de2, 0x9, 0x0, 0x3, 0x7f, 0xff, 0x40, 0x400, 0x9, 0x7fffffff, 0x80000000, 0x7, 0x8, 0x10001, 0x1f, 0x2778, 0x800, 0x8001, 0x101, 0x9, 0x8, 0x7ff, 0x0, 0x1000, 0x5, @perf_config_ext={0x3ff, 0xb69b}, 0x3040, 0x2, 0x2, 0x5, 0x7, 0x6, 0x7283ed73}, r0, 0xe, r1, 0x8) bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x0, 0x0, 0x7ffff9, 0x0, 0x20000003, 0x0}, 0x2c) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) r2 = gettid() r3 = perf_event_open(&(0x7f00000008c0)={0x7, 0x70, 0x1, 0x200, 0x3, 0xdbce, 0x0, 0x8, 0x1002, 0x1, 0xffffffffffffff00, 0x8, 0x1, 0xb3fa, 0x8, 0x0, 0x1, 0x2, 0x1000, 0x2, 0x401, 0x8, 0x3, 0x81, 0x0, 0x7, 0x2fc4, 0x882, 0x4, 0x8, 0x3, 0x81, 0x3, 0x7, 0x8857, 0x7, 0x5, 0x9, 0x0, 0x7, 0x1, @perf_config_ext={0x0, 0x80000000}, 0x400, 0x7f, 0x4, 0x7, 0x2, 0x7f, 0x200}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000840)={0x5, 0x70, 0xef, 0x2, 0x1000, 0xffffffff80000000, 0x0, 0x1a7800000000, 0x2000, 0x4, 0x5, 0x6814, 0x3a9, 0x5, 0x63b, 0x6, 0x8, 0x1000, 0x250420ee, 0x3, 0x0, 0x20, 0x6, 0x0, 0x4, 0x5, 0x4, 0x8, 0x3, 0x8, 0x52893dd5, 0x2, 0x2, 0x8, 0x44d, 0x1, 0x8, 0x6, 0x0, 0x100000000, 0x0, @perf_config_ext={0x9, 0x80}, 0x0, 0x0, 0x2b67, 0x6, 0x4b0, 0x81, 0x4}, r2, 0x5, r3, 0xb) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1003, 0x0) mount(&(0x7f00002b9ff8)='./file0\x00', &(0x7f0000cbeff8)='./file0\x00', &(0x7f00005f7ffa)='ramfs\x00', 0x80000, &(0x7f000002f000)) mount(&(0x7f0000000000)='.', &(0x7f0000000040)='.', &(0x7f0000000080)='cgroup\x00', 0x5010, &(0x7f00000000c0)) mount(&(0x7f0000377ff8)='.', &(0x7f0000000280)='.', &(0x7f0000000600)='nfs4\x00', 0x5010, &(0x7f0000000300)="2161893416a0c71070768c219eb114c3253c9f3baf4e9e8e9111c1a7fc6e266009fe27243deeaa22ca7ae9341f714300b5ee807e55d609036f2a3260475922bdfb2d2849f1c3b2ad3c051bd4f3751a177f77a92758c6d2b23fe7f1535b54e5846d11c135de8286066dec1b25f6e1378944ac5f7fce42d055821b5e19") perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xd68, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f0000014f88)={0x5, 0xfffffffffffffdc4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x46000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = getpid() perf_event_open(&(0x7f0000000680)={0x4, 0x70, 0x64, 0xffff, 0x1f, 0x4, 0x0, 0x1c3, 0x0, 0x1, 0x1, 0x9, 0x1ff, 0xfffffffffffffff8, 0x0, 0x0, 0x6, 0x7fffffff, 0x4, 0xffffffff, 0x80000001, 0xd0, 0x7, 0x1f, 0x0, 0x8, 0x9, 0x1ff, 0x8, 0x785, 0x4, 0xff, 0x2, 0x656, 0x5000000, 0x1, 0x460e3be0, 0x1, 0x0, 0x0, 0x7, @perf_bp={&(0x7f0000000640), 0x1}, 0x1000, 0xa, 0x7fff, 0x7, 0x3, 0x400, 0x9}, r5, 0xe, r4, 0x1) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', 0x0, 0x10}, 0x10) close(0xffffffffffffffff) bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)={&(0x7f0000000040)='./file0\x00', 0x0, 0x18}, 0x10) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000100)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0, 0x2e, &(0x7f0000000440), &(0x7f0000000140)=""/46, 0x4229}, 0x28) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000003480)={&(0x7f0000003300)=@can={0x0, 0x0}, 0x80, &(0x7f0000003400)=[{&(0x7f0000003380)=""/56, 0x38}, {&(0x7f00000033c0)=""/1, 0x1}], 0x2, &(0x7f0000003440)=""/33, 0x21, 0x1}, 0x40010000) bpf$PROG_LOAD(0x5, &(0x7f00000034c0)={0xe, 0x6, &(0x7f0000000940)=ANY=[@ANYBLOB="1800000002000000000000004ce700002555fdff00000000002371d07c9ba7f4a23372b0ad61000000000000009500000000000000"], &(0x7f00000007c0)='GPL\x00', 0x3, 0x2d, &(0x7f0000000800)=""/45, 0x40f00, 0x1}, 0x48) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000740)={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x10) socketpair$inet(0x2, 0x80a, 0x81, &(0x7f0000000240)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={0xffffffffffffffff, &(0x7f0000000500)="ae30f1bca1b4d3f69f1aac81517d42ad5980bc63b5008616a1f4724b9f8c1e4ecd8de336f57dd727cdaab04f0b40f28612615ad08de414711d841a88db33fd33884b627074213a0c5de3be2bbaec9207d9865c47f240467849979b5ab5632376608fc4be41a274abb2dc07cabe344a18db51048e5b0cbda843905a4258cdee3e649eddf104ba78894dce09747dcfe6a8d6d6d985520eeef448b83a8bcb83074541ba7a20d6094aa206c01a0690e5b3bfa05d475eb382b0199031d22bb26cde9b1ca0055eef9f6c4993b71ba19ba0590bb5efdaddaa574c25356ca890d138fc9fe0e975b6d5a1a8251503cd0a91845f9d95", &(0x7f0000000480)="9bc7741ea5e524cc8c6f748a73153834428729c45bf4ad446d2dddf1978baf431d0ba35b5442b5afe22db8b003650320200af7e1368ef7cdfa79ca8b9d3564363a5d2a502970314f2264c883bc8d990afc003e5adb95b30edad245c4420c8126f1d33db75ff0230698eaff90055e0f", 0x2}, 0x20) socketpair(0x0, 0x80003, 0xffff, &(0x7f0000000380)={0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r7, 0x50, &(0x7f00000003c0)}, 0x10) [ 827.517398] IPVS: ftp: loaded support on port[0] = 21 [ 827.551245] FAULT_INJECTION: forcing a failure. [ 827.551245] name failslab, interval 1, probability 0, space 0, times 0 [ 827.562506] CPU: 1 PID: 27120 Comm: syz-executor4 Not tainted 4.16.0-rc6+ #40 [ 827.569768] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 827.579107] Call Trace: [ 827.581683] dump_stack+0x194/0x24d [ 827.585291] ? arch_local_irq_restore+0x53/0x53 [ 827.589950] should_fail+0x8c0/0xa40 [ 827.593640] ? __free_insn_slot+0x5c0/0x5c0 [ 827.597943] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 827.603030] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 827.608204] ? __lock_acquire+0x664/0x3e00 [ 827.612424] ? find_held_lock+0x35/0x1d0 [ 827.616473] ? __lock_is_held+0xb6/0x140 [ 827.620526] ? check_same_owner+0x320/0x320 [ 827.624833] ? __d_lookup+0x4f4/0x830 [ 827.628623] ? rcu_note_context_switch+0x710/0x710 [ 827.633544] should_failslab+0xec/0x120 [ 827.637498] kmem_cache_alloc+0x47/0x760 [ 827.641549] __d_alloc+0xc1/0xbd0 [ 827.644992] ? shrink_dcache_for_umount+0x290/0x290 [ 827.649998] ? d_alloc_parallel+0x1b40/0x1b40 [ 827.654484] ? lock_release+0xa40/0xa40 [ 827.658443] ? mark_held_locks+0xaf/0x100 [ 827.662572] ? d_lookup+0x133/0x2e0 [ 827.666186] ? d_lookup+0x1d5/0x2e0 [ 827.669797] d_alloc+0x8e/0x340 [ 827.673059] ? __d_alloc+0xbd0/0xbd0 [ 827.676753] ? full_name_hash+0x9b/0xe0 [ 827.680762] __rpc_lookup_create_exclusive+0x183/0x1d0 [ 827.686019] ? down_write+0x87/0x120 [ 827.689715] ? rpc_d_lookup_sb+0x1a0/0x1a0 [ 827.693930] ? down_read+0x150/0x150 [ 827.697631] ? __d_lookup+0x830/0x830 [ 827.701417] rpc_populate.constprop.15+0xa3/0x340 [ 827.706250] rpc_fill_super+0x464/0xae0 [ 827.710210] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 827.715384] ? security_capable+0x8e/0xc0 [ 827.719514] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 827.724679] ? ns_capable_common+0xcf/0x160 [ 827.728981] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 827.734150] mount_ns+0xc4/0x190 [ 827.737499] rpc_mount+0x9e/0xd0 [ 827.740845] mount_fs+0x66/0x2d0 [ 827.744194] vfs_kern_mount.part.26+0xc6/0x4a0 [ 827.748755] ? may_umount+0xa0/0xa0 [ 827.752361] ? _raw_read_unlock+0x22/0x30 [ 827.756490] ? __get_fs_type+0x8a/0xc0 [ 827.760365] do_mount+0xea4/0x2bb0 [ 827.763894] ? copy_mount_string+0x40/0x40 [ 827.768106] ? rcu_pm_notify+0xc0/0xc0 [ 827.771981] ? copy_mount_options+0x5f/0x2e0 [ 827.776368] ? rcu_read_lock_sched_held+0x108/0x120 [ 827.781361] ? kmem_cache_alloc_trace+0x459/0x740 [ 827.786183] ? kasan_check_write+0x14/0x20 [ 827.790408] ? copy_mount_options+0x1f7/0x2e0 [ 827.794886] SyS_mount+0xab/0x120 [ 827.798319] ? copy_mnt_ns+0xb30/0xb30 [ 827.802190] do_syscall_64+0x281/0x940 [ 827.806057] ? __do_page_fault+0xc90/0xc90 [ 827.810269] ? _raw_spin_unlock_irq+0x27/0x70 [ 827.814746] ? finish_task_switch+0x1c1/0x7e0 [ 827.819224] ? syscall_return_slowpath+0x550/0x550 [ 827.824133] ? syscall_return_slowpath+0x2ac/0x550 [ 827.829043] ? prepare_exit_to_usermode+0x350/0x350 [ 827.834043] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 827.839398] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 827.844228] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 827.849396] RIP: 0033:0x4548b9 [ 827.852565] RSP: 002b:00007f731e3e3c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 827.860252] RAX: ffffffffffffffda RBX: 00007f731e3e46d4 RCX: 00000000004548b9 [ 827.867504] RDX: 00000000200002c0 RSI: 0000000020000140 RDI: 0000000020000300 [ 827.874753] RBP: 000000000072bea0 R08: 0000000020000200 R09: 0000000000000000 [ 827.882005] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 827.889256] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000039 [ 827.896837] net/sunrpc/rpc_pipe.c: rpc_populate failed to populate directory gssd [ 828.817928] IPVS: ftp: loaded support on port[0] = 21 [ 828.844714] IPVS: ftp: loaded support on port[0] = 21 [ 828.878663] IPVS: ftp: loaded support on port[0] = 21 2018/03/29 11:56:23 executing program 3: r0 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x10}, 0x10) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000000c0)={0x0, 0x1000, 0x8}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000080)='./file0\x00', r1}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0x0, 0x8}, 0x10) mount(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='cpuset\x00', 0x40, &(0x7f0000000280)="8a4562cb6a7df38be32246afcaef1e1a3f933cb428242c55c117c0fbbd62cea0aab31f2665fb88267466eca314fc8cafd72cc24143121c0691236768fad66390bf9b55014c2bd49faa5388cbabd52e730eeb4ccc411bacd296e423d971043756cf2b35a4063f2a7465b44a60ef31ae437f6160ed2f63afa62c36a27c33e4779e7c0404e337abc025bb2e4b39cc265573c6ab1a3ff09c7ad6bb4631a4") mount(&(0x7f0000000340)='./file1\x00', &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='devtmpfs\x00', 0x40, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xb, 0x7f, 0x0, 0x1, 0x12, r1, 0x100000000}, 0x2c) mkdir(&(0x7f0000000440)='./file1\x00', 0x20) mount(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='iso9660\x00', 0x8, &(0x7f0000000540)="650fe6ccea2b17860de967406c566ec16fe5a7a4c064707e22906e9d3d2a70b4") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000005c0)={r2, 0x28, &(0x7f0000000580)={0x0, 0x0}}, 0x10) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={r3, 0x8, 0x10}, 0xc) mount(&(0x7f0000000640)='./file1\x00', &(0x7f0000000680)='./file1\x00', &(0x7f00000006c0)='pstore\x00', 0x1000000, &(0x7f0000000700)="f48afa3ab3cc319f917be52b04c388c229578537782bc5ffc32c7747b1d28999ad89f5fba460640a324385ac03cccef4553d641b91d79d014804a98e72796f8eb2e1a7056efeaa63404648df67079ae817420f248ccf9d01e7a027c600c71777fb9ebc97da60f3d1a287ef8bc00f1dc68c3b1f0c1836cde5b62be45dd58c3415cbb0f916fe3c04fc69911e2bec15c208d023bdb608fa727657c532bd5101a2a36b34c4eb65f855fea2d6f8a0a79b15ecef1a4c81a8f6f5ed57b09db2ab482413540416126718f2a33ed21346ded20b084a8dc10702ec279fc486b5c57c163d") socketpair(0x3, 0x2, 0x1f, &(0x7f0000001c40)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$kcm(r6, &(0x7f0000004300)={0x0, 0x0, &(0x7f0000004140)=[{&(0x7f0000001c80)=""/139, 0x8b}, {&(0x7f0000001d40)=""/149, 0x95}, {&(0x7f0000001e00)=""/188, 0xbc}, {&(0x7f0000001ec0)=""/69, 0x45}, {&(0x7f0000001f40)=""/165, 0xa5}, {&(0x7f0000002000)=""/4096, 0x1000}, {&(0x7f0000003000)=""/42, 0x2a}, {&(0x7f0000003040)=""/4096, 0x1000}, {&(0x7f0000004040)=""/233, 0xe9}], 0x9, &(0x7f0000004200)=""/236, 0xec, 0xe00}, 0x40) mount(&(0x7f0000004340)='./file1/file0\x00', &(0x7f0000004380)='./file1\x00', &(0x7f00000043c0)='ceph\x00', 0x4860, &(0x7f0000004400)="2c8eb517dd302be26597065442d58f3f345c295b542b2b1df3046ae176") bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000004600)={r6, &(0x7f0000004440)="903685b47b9c4d5c1dffcefa6a92cd57ccdfaf1af0be272f1cb4a5b86ab9d1ef248a63f04f5d59c2cd6e6b7722f5ff866c5d353014f28baaa95bce06a787a3e085102126a0386ffd4e136d472f2cdfb7c658643d2792b7235e2ec8c782080850c20eb00014eab035d7d56c8ddd0d7fdc4c21602d480e4accea0867cc5b4172b46b8f028bd623c58544092396dbda704543cd7c93219ff7f4caf9d0c12fc32c65ddac48ba22321d2c7ef1152f0dd87ed22cb30eb2b24d381b3abaefc114ad4c08e329cfbce60e0549ca", &(0x7f0000004540)="38859653237c5c9685cf2e44e1eea64846e190b778f29b06c26c2f2b8a0800f9fc2019b05290fc5c82f612eb7f479918015eb3af93cc57f01db731e129275ce05910f66e436ef09a8fe7bf22f960eacec350a7f7e9e9a47cb163f467b6a29523346a4c61d65d2235c73095a53929d509538f640424133cfa3617b41a51aa7172460146433abbe604f2c92827fabd5d3134d36b4cecd0fd2549f3527615f9eb63dd9332021e4eff13ad6aa509db21ed98745d00cb36e547", 0x3}, 0x20) mkdir(&(0x7f0000004640)='./file1/file0\x00', 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000004680)={0x0, 0x0, 0xa6, 0x3, 0x4}, 0x2c) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000046c0)=0x7, 0x4) recvmsg$kcm(r6, &(0x7f00000058c0)={&(0x7f0000004700)=@alg, 0x80, &(0x7f0000005880)=[{&(0x7f0000004780)=""/4096, 0x1000}, {&(0x7f0000005780)=""/219, 0xdb}], 0x2, 0x0, 0x0, 0x100000001}, 0x40000000) r7 = gettid() r8 = perf_event_open(&(0x7f0000005900)={0x7, 0x70, 0x0, 0xfffffffffffffff7, 0x9, 0x4, 0x0, 0x7, 0x100, 0x8, 0x100000000, 0x8000, 0x8, 0x6, 0x0, 0x6, 0x10001, 0x9, 0x1f, 0x2, 0x1, 0x3, 0x1, 0x1f, 0x23, 0x1, 0xaa4, 0x5, 0x4, 0x200, 0x6, 0x9, 0xfffffffffffffffb, 0x3, 0x3, 0xff, 0x80000000, 0x0, 0x0, 0xffffffffffffff9d, 0x2, @perf_config_ext={0x7, 0x9}, 0x100, 0x8, 0x2, 0x6, 0x4, 0x6, 0xf71}, r7, 0x9, r6, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f00000059c0)={&(0x7f0000005980)='./file0\x00'}, 0x10) ioctl$sock_kcm_SIOCKCMATTACH(r5, 0x89e0, &(0x7f0000005a00)={r5, r0}) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000005c00)={r4, &(0x7f0000005a40)="313befc1e9ac680c4369983530ee783c4f018c38e134b4b0aebd06ede05f238850949c0f5d32ab19889f880e87e3a0fa5a43500affdcc508d56f3a4df6c159ca9cfa62124b79b4607d42738dc5e16d09ea2c6a2346fc2360feff08d9f464dfdebce2cb99d4ba8e5fc37edfba041f14e16a68192d7d8687404ee7318323520188c4e5d52e8c7ec40bd0823fb210e530c74ea842bd8bacbc48317b0b6ed12528ecd30e1af83b8049df791ff7affe91ab54", &(0x7f0000005b00)=""/243}, 0x18) mount(&(0x7f0000005c40)='./file1/file0\x00', &(0x7f0000005c80)='./file1\x00', &(0x7f0000005cc0)='btrfs\x00', 0x0, 0x0) recvmsg(r5, &(0x7f00000073c0)={&(0x7f0000005d00)=@sco, 0x80, &(0x7f0000007300)=[{&(0x7f0000005d80)=""/103, 0x67}, {&(0x7f0000005e00)=""/170, 0xaa}, {&(0x7f0000005ec0)=""/252, 0xfc}, {&(0x7f0000005fc0)=""/136, 0x88}, {&(0x7f0000006080)=""/125, 0x7d}, {&(0x7f0000006100)=""/4096, 0x1000}, {&(0x7f0000007100)=""/106, 0x6a}, {&(0x7f0000007180)=""/115, 0x73}, {&(0x7f0000007200)=""/240, 0xf0}], 0x9, 0x0, 0x0, 0x7}, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000007400)={r3, 0x10001, 0x18}, 0xc) ioctl$PERF_EVENT_IOC_REFRESH(r8, 0x2402, 0xc4c) recvmsg$kcm(r6, &(0x7f0000008880)={&(0x7f0000007440)=@l2, 0x80, &(0x7f0000008800)=[{&(0x7f00000074c0)=""/231, 0xe7}, {&(0x7f00000075c0)=""/118, 0x76}, {&(0x7f0000008640)=""/223, 0xdf}, {&(0x7f0000008740)}, {&(0x7f0000008780)=""/32, 0x20}, {&(0x7f00000087c0)=""/53, 0x35}], 0x6}, 0x10000) 2018/03/29 11:56:23 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x3, &(0x7f0000002000)=@framed={{0x18}, [], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000680)={0xffffffffffffffff, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x7}, 0x28) recvmsg(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x7, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000100)=r0, 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) recvmsg(r2, &(0x7f00000011c0)={&(0x7f0000000b40)=@can, 0x80, &(0x7f0000001100)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f0000000c80)=""/169, 0xa9}, {&(0x7f0000000d40)=""/229, 0xe5}, {&(0x7f0000000e40)=""/128, 0x80}, {&(0x7f0000000ec0)=""/48, 0x30}, {&(0x7f0000000f00)=""/137, 0x89}, {&(0x7f0000006000)=""/4096, 0x1000}, {&(0x7f0000007000)=""/4096, 0x1000}, {&(0x7f0000001080)=""/127, 0x7f}, {&(0x7f0000008000)=""/4096, 0x1000}], 0xa, 0x0, 0x0, 0x1}, 0x2020) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001200)={0x7, 0x4, 0x0, 0x4, 0x8, 0xffffffffffffffff, 0x9}, 0x2c) socketpair(0x3, 0x80e, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r3, &(0x7f0000000200)={&(0x7f0000000fc0)=@pppol2tp={0x18, 0x1, {0x0, r2, {0x2, 0x4e20, @broadcast=0xffffffff}, 0x1, 0x3, 0x0, 0x2}}, 0x80, &(0x7f0000001580)=[{&(0x7f0000001240)="95c4dcff0f017b3c1979888e50f6c20a37b4edaffb28a3b609d24a8180434ab2fac426d3e4fc87e18267002be3cd56b11d69c4db739bf6a9c91af67ee87be1ea522993a368bdfc0df55539a60ef5515b4f03f3dbddae65cd66a90f030118870b473f156cb9a18624103000608c63f84b09ea89bfb8d8e7705c6ef456ef28adec5e566632ddd63098", 0x88}, {&(0x7f0000001380)="5745869bf3b6f562576761d821af2ad55c2f81345c810d6dbd43facd33c5107488aa7f04c5ab1302b820cd31405e9f657776a0d48e2225f39aabc3de0b30dc7422503b448ad89c23ebaee24ae9696e4e58eccae5febf47fff53dc1f03d869303acdef233746263c5c567e84edb166010fd23f56d6e84406bced5a00b5016b0c700fd76218ecf5da3527552a683eb87aa4b246cd74bcbeff8dedec74332e0214e4dc64cb7ac24c4447843caa7550375ef8e1f74a78c40a617e913a25e4837d24fb09e93eaa2", 0xc5}, {&(0x7f0000001480)="8247f46d4324760570d5078149dc5b38f7d1c592564148ecc6262e91c29cd4344e423ff476882993a2844af9a7c306a15e659a4cb9230b5139842c87ad8fa95c202146730fa610b141dfe4c7b771b46e4db879d2b92a01cb8642100d80a1d4658fd0df05c06c8615960a92b690c728e2603373657a9a46b2f200f2895198694d470ab95b6eb7a76ccee67c9219b4afa289d70c87cf22c733e00700f345136d59bcbd89ce7e110746f91e7a7661b8eb0afe54e3cb1c712441dd9a6ffb59a2eb58e5f5eabd4bec428fe27a403bb0d19125e473abdfea87a0c89108e3c876438a7c3f84bebad6cf858f26d2083efd60", 0xee}], 0x3, &(0x7f000000a000)=[{0x88, 0x112, 0xc2, "6671b4b66ac2fb4e14cee671813dc3834802e601529feb049ebb70880567948953018cfd53d7b1c9be27b1084adfba62040c7f889cfbc15407d93133259d9d5052bf6648a69218702e35278939ad399dc3ebed233c1792c7c1204353c8fe75ea0398f4aaf830834bc93873c119dddc539c"}, {0xe8, 0x6f180cc1befb202, 0x9, "4577f77fd3b3acd92c96feff8b0409afeae1c16fa3d367241c9679e5105141c7205d47ce27a418c10fbe7f601c3142e7b7b3a67322c9d345e0baf4315e13dc771a962ff445015c98a70b319d46ba59155d1cf07827804ea1ca86db74f3029bd60f6f365d955ec12be30102e59b4b3940152988ef09443df596bad9525f697fad61507e856c6acb744cfb034863943e811bd378843ccbd95f8221a444f4c323a391f5788559f34ac02e6e18065b87e8c962353623250694e5b4bf9bc1b00fadf2875995067ff6c18590c207f9a83f06665f5b5af77b4e"}, {0xa0, 0x10f, 0x5, "07c5972c79a30903d5d93f57c962c0351628551f6a3fbac8e18984ad9b8caeb403f1d588fa0b9955ce44d018cbcc06ad98b588dd45fd0ccd6b8d1965e70693ec76dd521aa2693829ef54059dc3191f2f4eca64c63f2f901ead2d6c54f0119212ebb77e956117d9130d3adff30a5598567fd540cf0a8f9f8c469ad15f209ad8ef161006831b39e4ddf2fcd748a8629e33"}], 0x210, 0x40}, 0x40) close(r0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)) recvmsg(r1, &(0x7f00000267c0)={&(0x7f00000251c0)=@can, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) 2018/03/29 11:56:23 executing program 0: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000001a00)) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000001a40)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000200)={&(0x7f0000000180)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, 0x80, &(0x7f0000000000)=[{&(0x7f00000002c0)=""/236, 0xec}], 0x1, &(0x7f0000000580)=""/4096, 0x1000}, 0x21) recvmsg$kcm(r1, &(0x7f0000000540)={&(0x7f00000000c0)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @broadcast}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000240)=""/65, 0x41}], 0x1, &(0x7f0000000440)=""/213, 0xd5}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x8983, &(0x7f0000000040)) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000080)) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000019c0)={0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000000140)="0253eea6a53cc0eae389e9a13e5f2046d0633eebde90f446c1b1eabbd0adb42dfcefb37a3df93feb3d5e76dc353ecf23fe9c81afa5", 0x35}, {&(0x7f00000002c0)}, {&(0x7f0000000400)}, {&(0x7f0000001600)}], 0x4, &(0x7f0000001700)=[{0x68, 0x107, 0x25047dc1, "755cd1e9e23de47cb15819d813deb534cee2d9497c58eba5bd8a228407fb709d70f16afa73f4924f12ecc429b6fd356748940b62ee5f5685ce027fe4e6c60a8f88cd1a5827d099f5849f09bd37f681e29814e6bb"}, {0x10, 0x0, 0x1ff}, {0x10, 0x107, 0x80000001}], 0x88}, 0x48800) sendmsg$kcm(r0, &(0x7f00000016c0)={&(0x7f0000001580)=@rc={0x1f, {0x3, 0x5c92, 0x4, 0x7, 0xfffffffffffffffe, 0xc5f}, 0x4}, 0x80, &(0x7f0000000400)=[{&(0x7f0000001600)="ae13f70d2c2ac90466ed66956e112133329ce12684d3cd0ecc4ba929b71945785a104c07b148bd1dd6a65e3c0ff0da0e73acf97fc9a60ff659736544f2fd4ea02fe728", 0x43}, {&(0x7f00000017c0)="6c84fa680f3ff9c9ba26b011b45d8dc13fa5b38cafa1b3672c1dd1a5495b915639716f14dc5b9a3fd870327cf7a5d6b79b46d85feff4ccba82c231dbcc0d27ac6642a0bb64ef8acdb4b9abe7eb6deeacce8c0e3c2479599447f234a70e5ca81a19", 0x61}], 0x2, &(0x7f0000001840)=[{0x58, 0x116, 0x401, "5412e22e76709f2f61be35cca1b2261d1d4e45c03eae3a4a57ac3305c1476b84abb4c947eb8f7e6cfe0d379f5bd5e5128a0c32473ab875d0e47aa7ab4993cc0c9559618bee"}, {0x30, 0x6, 0x1, "61f71818800ad6fafe6f20f89417ceac093ea532c1258bab6f579d"}], 0x88, 0x8000}, 0x20008000) 2018/03/29 11:56:23 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x1e1, 0x100000000209e20, 0x8000000001, 0x5}, 0xfffffffffffffe20) r0 = getpid() r1 = perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0xfffffffffffffffc, 0x3, 0x8, 0x2, 0x0, 0x9, 0x10000, 0xc, 0x3d3, 0x80, 0x5, 0xfffffffffffffffc, 0x8, 0x3f, 0x5d, 0xbbb0, 0x20, 0x3, 0x8000, 0x100000000, 0x8, 0x9, 0x2, 0x4, 0x800, 0xf8, 0x3, 0x9, 0x1, 0x3, 0x8, 0x3, 0x7, 0x10001, 0xf16, 0x2, 0x0, 0x7fffffff, 0x4, @perf_bp={&(0x7f0000000780), 0x1}, 0x4080, 0x10001, 0xcc, 0x7, 0x3, 0xffff, 0x7fffffff}, 0xffffffffffffffff, 0xd, 0xffffffffffffff9c, 0x8) perf_event_open(&(0x7f0000000980)={0x4, 0x70, 0x6, 0x3f, 0x8e, 0x1, 0x0, 0x3, 0x404, 0x0, 0xbc2b, 0x40, 0x7, 0xffff, 0xffff, 0x9, 0x9de2, 0x9, 0x0, 0x3, 0x7f, 0xff, 0x40, 0x400, 0x9, 0x7fffffff, 0x80000000, 0x7, 0x8, 0x10001, 0x1f, 0x2778, 0x800, 0x8001, 0x101, 0x9, 0x8, 0x7ff, 0x0, 0x1000, 0x5, @perf_config_ext={0x3ff, 0xb69b}, 0x3040, 0x2, 0x2, 0x5, 0x7, 0x6, 0x7283ed73}, r0, 0xe, r1, 0x8) bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x0, 0x0, 0x7ffff9, 0x0, 0x20000003, 0x0}, 0x2c) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) r2 = gettid() r3 = perf_event_open(&(0x7f00000008c0)={0x7, 0x70, 0x1, 0x200, 0x3, 0xdbce, 0x0, 0x8, 0x1002, 0x1, 0xffffffffffffff00, 0x8, 0x1, 0xb3fa, 0x8, 0x0, 0x1, 0x2, 0x1000, 0x2, 0x401, 0x8, 0x3, 0x81, 0x0, 0x7, 0x2fc4, 0x882, 0x4, 0x8, 0x3, 0x81, 0x3, 0x7, 0x8857, 0x7, 0x5, 0x9, 0x0, 0x7, 0x1, @perf_config_ext={0x0, 0x80000000}, 0x400, 0x7f, 0x4, 0x7, 0x2, 0x7f, 0x200}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000840)={0x5, 0x70, 0xef, 0x2, 0x1000, 0xffffffff80000000, 0x0, 0x1a7800000000, 0x2000, 0x4, 0x5, 0x6814, 0x3a9, 0x5, 0x63b, 0x6, 0x8, 0x1000, 0x250420ee, 0x3, 0x0, 0x20, 0x6, 0x0, 0x4, 0x5, 0x4, 0x8, 0x3, 0x8, 0x52893dd5, 0x2, 0x2, 0x8, 0x44d, 0x1, 0x8, 0x6, 0x0, 0x100000000, 0x0, @perf_config_ext={0x9, 0x80}, 0x0, 0x0, 0x2b67, 0x6, 0x4b0, 0x81, 0x4}, r2, 0x5, r3, 0xb) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1003, 0x0) mount(&(0x7f00002b9ff8)='./file0\x00', &(0x7f0000cbeff8)='./file0\x00', &(0x7f00005f7ffa)='ramfs\x00', 0x80000, &(0x7f000002f000)) mount(&(0x7f0000000000)='.', &(0x7f0000000040)='.', &(0x7f0000000080)='cgroup\x00', 0x5010, &(0x7f00000000c0)) mount(&(0x7f0000377ff8)='.', &(0x7f0000000280)='.', &(0x7f0000000600)='nfs4\x00', 0x5010, &(0x7f0000000300)="2161893416a0c71070768c219eb114c3253c9f3baf4e9e8e9111c1a7fc6e266009fe27243deeaa22ca7ae9341f714300b5ee807e55d609036f2a3260475922bdfb2d2849f1c3b2ad3c051bd4f3751a177f77a92758c6d2b23fe7f1535b54e5846d11c135de8286066dec1b25f6e1378944ac5f7fce42d055821b5e19") perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xd68, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f0000014f88)={0x5, 0xfffffffffffffdc4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x46000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = getpid() perf_event_open(&(0x7f0000000680)={0x4, 0x70, 0x64, 0xffff, 0x1f, 0x4, 0x0, 0x1c3, 0x0, 0x1, 0x1, 0x9, 0x1ff, 0xfffffffffffffff8, 0x0, 0x0, 0x6, 0x7fffffff, 0x4, 0xffffffff, 0x80000001, 0xd0, 0x7, 0x1f, 0x0, 0x8, 0x9, 0x1ff, 0x8, 0x785, 0x4, 0xff, 0x2, 0x656, 0x5000000, 0x1, 0x460e3be0, 0x1, 0x0, 0x0, 0x7, @perf_bp={&(0x7f0000000640), 0x1}, 0x1000, 0xa, 0x7fff, 0x7, 0x3, 0x400, 0x9}, r5, 0xe, r4, 0x1) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', 0x0, 0x10}, 0x10) close(0xffffffffffffffff) bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)={&(0x7f0000000040)='./file0\x00', 0x0, 0x18}, 0x10) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000100)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0, 0x2e, &(0x7f0000000440), &(0x7f0000000140)=""/46, 0x4229}, 0x28) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000003480)={&(0x7f0000003300)=@can={0x0, 0x0}, 0x80, &(0x7f0000003400)=[{&(0x7f0000003380)=""/56, 0x38}, {&(0x7f00000033c0)=""/1, 0x1}], 0x2, &(0x7f0000003440)=""/33, 0x21, 0x1}, 0x40010000) bpf$PROG_LOAD(0x5, &(0x7f00000034c0)={0xe, 0x6, &(0x7f0000000940)=ANY=[@ANYBLOB="1800000002000000000000004ce700002555fdff00000000002371d07c9ba7f4a23372b0ad61000000000000009500000000000000"], &(0x7f00000007c0)='GPL\x00', 0x3, 0x2d, &(0x7f0000000800)=""/45, 0x40f00, 0x1}, 0x48) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000740)={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x10) socketpair$inet(0x2, 0x80a, 0x81, &(0x7f0000000240)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={0xffffffffffffffff, &(0x7f0000000500)="ae30f1bca1b4d3f69f1aac81517d42ad5980bc63b5008616a1f4724b9f8c1e4ecd8de336f57dd727cdaab04f0b40f28612615ad08de414711d841a88db33fd33884b627074213a0c5de3be2bbaec9207d9865c47f240467849979b5ab5632376608fc4be41a274abb2dc07cabe344a18db51048e5b0cbda843905a4258cdee3e649eddf104ba78894dce09747dcfe6a8d6d6d985520eeef448b83a8bcb83074541ba7a20d6094aa206c01a0690e5b3bfa05d475eb382b0199031d22bb26cde9b1ca0055eef9f6c4993b71ba19ba0590bb5efdaddaa574c25356ca890d138fc9fe0e975b6d5a1a8251503cd0a91845f9d95", &(0x7f0000000480)="9bc7741ea5e524cc8c6f748a73153834428729c45bf4ad446d2dddf1978baf431d0ba35b5442b5afe22db8b003650320200af7e1368ef7cdfa79ca8b9d3564363a5d2a502970314f2264c883bc8d990afc003e5adb95b30edad245c4420c8126f1d33db75ff0230698eaff90055e0f", 0x2}, 0x20) socketpair(0x0, 0x80003, 0xffff, &(0x7f0000000380)={0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r7, 0x50, &(0x7f00000003c0)}, 0x10) 2018/03/29 11:56:23 executing program 6: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x3, &(0x7f0000002000)=@framed={{0x18}, [], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000680)={0xffffffffffffffff, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x7}, 0x28) recvmsg(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000001c0)) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000100)=r0, 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) recvmsg(r3, &(0x7f00000011c0)={&(0x7f0000000b40)=@can, 0x80, &(0x7f0000001100)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f0000000c80)=""/169, 0xa9}, {&(0x7f0000000d40)=""/229, 0xe5}, {&(0x7f0000000e40)=""/128, 0x80}, {&(0x7f0000000ec0)=""/48, 0x30}, {&(0x7f0000000f00)=""/137, 0x89}, {&(0x7f0000006000)=""/4096, 0x1000}, {&(0x7f0000007000)=""/4096, 0x1000}, {&(0x7f0000001080)=""/127, 0x7f}], 0x9}, 0x2020) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001200)={0x7, 0x4, 0x0, 0x4, 0x8, 0xffffffffffffffff, 0x9}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x1000000007, 0xcf2e, 0x7e, 0x20, 0x15, r1, 0x4}, 0x2c) socketpair(0x3, 0x80e, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r4, &(0x7f0000000200)={&(0x7f0000000fc0)=@pppol2tp={0x18, 0x1, {0x0, r3, {0x2, 0x4e20, @broadcast=0xffffffff}, 0x1, 0x3, 0x0, 0x2}}, 0x80, &(0x7f0000001580)=[{&(0x7f0000001240)="95c4dcff0f017b3c1979888e50f6c20a37b4edaffb28a3b609d24a8180434ab2fac426d3e4fc87e18267002be3cd56b11d69c4db739bf6a9c91af67ee87be1ea522993a368bdfc0df55539a60ef5515b4f03f3dbddae65cd66a90f030118870b473f156cb9a18624103000608c63f84b09ea89bfb8d8e7705c6ef456ef28adec5e566632ddd63098", 0x88}, {&(0x7f0000001380)="5745869bf3b6f562576761d821af2ad55c2f81345c810d6dbd43facd33c5107488aa7f04c5ab1302b820cd31405e9f657776a0d48e2225f39aabc3de0b30dc7422503b448ad89c23ebaee24ae9696e4e58eccae5febf47fff53dc1f03d869303acdef233746263c5c567e84edb166010fd23f56d6e84406bced5a00b5016b0c700fd76218ecf5da3527552a683eb87aa4b246cd74bcbeff8dedec74332e0214e4dc64cb7ac24c4447843caa7550375ef8e1f74a78c40a617e913a25e4837d24fb09e93eaa2", 0xc5}, {&(0x7f0000001480)="8247f46d4324760570d5078149dc5b38f7d1c592564148ecc6262e91c29cd4344e423ff476882993a2844af9a7c306a15e659a4cb9230b5139842c87ad8fa95c202146730fa610b141dfe4c7b771b46e4db879d2b92a01cb8642100d80a1d4658fd0df05c06c8615960a92b690c728e2603373657a9a46b2f200f2895198694d470ab95b6eb7a76ccee67c9219b4afa289d70c87cf22c733e00700f345136d59bcbd89ce7e110746f91e7a7661b8eb0afe54e3cb1c712441dd9a6ffb59a2eb58e5f5eabd4bec428fe27a403bb0d19125e473abdfea87a0c89108e3c876438a7c3f84bebad6cf858f26d2083efd60", 0xee}], 0x3, &(0x7f000000a000)=[{0x88, 0x112, 0xc2, "6671b4b66ac2fb4e14cee671813dc3834802e601529feb049ebb70880567948953018cfd53d7b1c9be27b1084adfba62040c7f889cfbc15407d93133259d9d5052bf6648a69218702e35278939ad399dc3ebed233c1792c7c1204353c8fe75ea0398f4aaf830834bc93873c119dddc539c"}, {0xe8, 0x6f180cc1befb202, 0x9, "4577f77fd3b3acd92c96feff8b0409afeae1c16fa3d367241c9679e5105141c7205d47ce27a418c10fbe7f601c3142e7b7b3a67322c9d345e0baf4315e13dc771a962ff445015c98a70b319d46ba59155d1cf07827804ea1ca86db74f3029bd60f6f365d955ec12be30102e59b4b3940152988ef09443df596bad9525f697fad61507e856c6acb744cfb034863943e811bd378843ccbd95f8221a444f4c323a391f5788559f34ac02e6e18065b87e8c962353623250694e5b4bf9bc1b00fadf2875995067ff6c18590c207f9a83f06665f5b5af77b4e"}, {0xa0, 0x10f, 0x5, "07c5972c79a30903d5d93f57c962c0351628551f6a3fbac8e18984ad9b8caeb403f1d588fa0b9955ce44d018cbcc06ad98b588dd45fd0ccd6b8d1965e70693ec76dd521aa2693829ef54059dc3191f2f4eca64c63f2f901ead2d6c54f0119212ebb77e956117d9130d3adff30a5598567fd540cf0a8f9f8c469ad15f209ad8ef161006831b39e4ddf2fcd748a8629e33"}], 0x210, 0x40}, 0x40) close(r0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)) recvmsg(r2, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) recvmsg$kcm(r4, &(0x7f0000001a00)={0x0, 0x0, &(0x7f00000018c0)=[{&(0x7f0000001600)=""/173, 0xad}, {&(0x7f0000001040)=""/25, 0x19}, {&(0x7f00000016c0)=""/132, 0x84}, {&(0x7f0000001780)=""/91, 0x5b}, {&(0x7f0000001800)=""/183, 0xb7}], 0x5, &(0x7f0000001940)=""/163, 0xa3, 0xe43}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000a80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r5}, 0x48) 2018/03/29 11:56:23 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x1e1, 0x100000000209e20, 0x8000000001, 0x5}, 0xfffffffffffffe20) r0 = getpid() r1 = perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0x0, 0x3, 0x8, 0x2, 0x0, 0x9, 0x10000, 0xc, 0x3d3, 0x80, 0x5, 0xfffffffffffffffc, 0x8, 0x3f, 0x5d, 0xbbb0, 0x20, 0x3, 0x8000, 0x100000000, 0x8, 0x9, 0x2, 0x4, 0x800, 0xf8, 0x3, 0x9, 0x1, 0x3, 0x8, 0x3, 0x7, 0x10001, 0xf16, 0x2, 0x0, 0x7fffffff, 0x4, @perf_bp={&(0x7f0000000780), 0x1}, 0x4080, 0x10001, 0xcc, 0x7, 0x3, 0xffff, 0x7fffffff}, 0xffffffffffffffff, 0xd, 0xffffffffffffff9c, 0x8) perf_event_open(&(0x7f0000000980)={0x4, 0x70, 0x6, 0x3f, 0x8e, 0x1, 0x0, 0x3, 0x404, 0x0, 0xbc2b, 0x40, 0x7, 0xffff, 0xffff, 0x9, 0x9de2, 0x9, 0x0, 0x3, 0x7f, 0xff, 0x40, 0x400, 0x9, 0x7fffffff, 0x80000000, 0x7, 0x8, 0x10001, 0x1f, 0x2778, 0x800, 0x8001, 0x101, 0x9, 0x8, 0x7ff, 0x0, 0x1000, 0x5, @perf_config_ext={0x3ff, 0xb69b}, 0x3040, 0x2, 0x2, 0x5, 0x7, 0x6, 0x7283ed73}, r0, 0xe, r1, 0x8) bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x0, 0x0, 0x7ffff9, 0x0, 0x20000003, 0x0}, 0x2c) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) r2 = gettid() r3 = perf_event_open(&(0x7f00000008c0)={0x7, 0x70, 0x1, 0x200, 0x3, 0xdbce, 0x0, 0x8, 0x1002, 0x1, 0xffffffffffffff00, 0x8, 0x1, 0xb3fa, 0x8, 0x0, 0x1, 0x2, 0x1000, 0x2, 0x401, 0x8, 0x3, 0x81, 0x0, 0x7, 0x2fc4, 0x882, 0x4, 0x8, 0x3, 0x81, 0x3, 0x7, 0x8857, 0x7, 0x5, 0x9, 0x0, 0x7, 0x1, @perf_config_ext={0x0, 0x80000000}, 0x400, 0x7f, 0x4, 0x7, 0x2, 0x7f, 0x200}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000840)={0x5, 0x70, 0xef, 0x2, 0x1000, 0xffffffff80000000, 0x0, 0x1a7800000000, 0x2000, 0x4, 0x5, 0x6814, 0x3a9, 0x5, 0x63b, 0x6, 0x8, 0x1000, 0x250420ee, 0x3, 0x0, 0x20, 0x6, 0x0, 0x4, 0x5, 0x4, 0x8, 0x3, 0x8, 0x52893dd5, 0x2, 0x2, 0x8, 0x44d, 0x1, 0x8, 0x6, 0x0, 0x100000000, 0x0, @perf_config_ext={0x9, 0x80}, 0x0, 0x0, 0x2b67, 0x6, 0x4b0, 0x81, 0x4}, r2, 0x5, r3, 0xb) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1003, 0x0) mount(&(0x7f00002b9ff8)='./file0\x00', &(0x7f0000cbeff8)='./file0\x00', &(0x7f00005f7ffa)='ramfs\x00', 0x80000, &(0x7f000002f000)) mount(&(0x7f0000000000)='.', &(0x7f0000000040)='.', &(0x7f0000000080)='cgroup\x00', 0x5010, &(0x7f00000000c0)) mount(&(0x7f0000377ff8)='.', &(0x7f0000000280)='.', &(0x7f0000000600)='nfs4\x00', 0x5010, &(0x7f0000000300)="2161893416a0c71070768c219eb114c3253c9f3baf4e9e8e9111c1a7fc6e266009fe27243deeaa22ca7ae9341f714300b5ee807e55d609036f2a3260475922bdfb2d2849f1c3b2ad3c051bd4f3751a177f77a92758c6d2b23fe7f1535b54e5846d11c135de8286066dec1b25f6e1378944ac5f7fce42d055821b5e19") perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xd68, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f0000014f88)={0x5, 0xfffffffffffffdc4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x46000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = getpid() perf_event_open(&(0x7f0000000680)={0x4, 0x70, 0x64, 0xffff, 0x1f, 0x4, 0x0, 0x1c3, 0x0, 0x1, 0x1, 0x9, 0x1ff, 0xfffffffffffffff8, 0x0, 0x0, 0x6, 0x7fffffff, 0x0, 0xffffffff, 0x80000001, 0xd0, 0x7, 0x1f, 0x0, 0x8, 0x9, 0x1ff, 0x8, 0x785, 0x4, 0xff, 0x2, 0x656, 0x5000000, 0x1, 0x460e3be0, 0x1, 0x0, 0x0, 0x7, @perf_bp={&(0x7f0000000640), 0x1}, 0x1000, 0xa, 0x7fff, 0x7, 0x3, 0x400, 0x9}, r5, 0xe, r4, 0x1) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', 0x0, 0x10}, 0x10) close(0xffffffffffffffff) bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)={&(0x7f0000000040)='./file0\x00', 0x0, 0x18}, 0x10) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000100)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0, 0x2e, &(0x7f0000000440), &(0x7f0000000140)=""/46, 0x4229}, 0x28) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000003480)={&(0x7f0000003300)=@can={0x0, 0x0}, 0x80, &(0x7f0000003400)=[{&(0x7f0000003380)=""/56, 0x38}, {&(0x7f00000033c0)=""/1, 0x1}], 0x2, &(0x7f0000003440)=""/33, 0x21, 0x1}, 0x40010000) bpf$PROG_LOAD(0x5, &(0x7f00000034c0)={0xe, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="1800000002000000000000004ce700002555fdff00000000002371d07c9ba7f4a23372b0ad61000000000000009500000000000000"], &(0x7f00000007c0)='GPL\x00', 0x3, 0x2d, &(0x7f0000000800)=""/45, 0x40f00, 0x1, [], r6}, 0x48) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000740)={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x10) socketpair$inet(0x2, 0x80a, 0x81, &(0x7f0000000240)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={0xffffffffffffffff, &(0x7f0000000500)="ae30f1bca1b4d3f69f1aac81517d42ad5980bc63b5008616a1f4724b9f8c1e4ecd8de336f57dd727cdaab04f0b40f28612615ad08de414711d841a88db33fd33884b627074213a0c5de3be2bbaec9207d9865c47f240467849979b5ab5632376608fc4be41a274abb2dc07cabe344a18db51048e5b0cbda843905a4258cdee3e649eddf104ba78894dce09747dcfe6a8d6d6d985520eeef448b83a8bcb83074541ba7a20d6094aa206c01a0690e5b3bfa05d475eb382b0199031d22bb26cde9b1ca0055eef9f6c4993b71ba19ba0590bb5efdaddaa574c25356ca890d138fc9fe0e975b6d5a1a8251503cd0a91845f9d95", &(0x7f0000000480)="9bc7741ea5e524cc8c6f748a73153834428729c45bf4ad446d2dddf1978baf431d0ba35b5442b5afe22db8b003650320200af7e1368ef7cdfa79ca8b9d3564363a5d2a502970314f2264c883bc8d990afc003e5adb95b30edad245c4420c8126f1d33db75ff0230698eaff90055e0f", 0x2}, 0x20) socketpair(0x0, 0x80003, 0xffff, &(0x7f0000000380)={0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r7, 0x50, &(0x7f00000003c0)}, 0x10) 2018/03/29 11:56:23 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x3, &(0x7f0000002000)=@framed={{0x18}, [], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000680)={0xffffffffffffffff, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x7}, 0x28) recvmsg(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000001c0)) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000100), 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) recvmsg(r3, &(0x7f00000011c0)={&(0x7f0000000b40)=@can, 0x80, &(0x7f0000001100)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f0000000d40)=""/229, 0xe5}, {&(0x7f0000000e40)=""/128, 0x80}, {&(0x7f0000000ec0)=""/48, 0x30}, {&(0x7f0000000f00)=""/137, 0x89}, {&(0x7f0000006000)=""/4096, 0x1000}, {&(0x7f0000007000)=""/4096, 0x1000}, {&(0x7f0000001080)=""/127, 0x7f}, {&(0x7f0000008000)=""/4096, 0x1000}], 0x9, 0x0, 0x0, 0x1}, 0x2020) bpf$MAP_CREATE(0x0, &(0x7f0000001200)={0x7, 0x4, 0x0, 0x4, 0x8, 0xffffffffffffffff, 0x9}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x1000000007, 0xcf2e, 0x7e, 0x20, 0x15, r1, 0x4}, 0x2c) socketpair(0x3, 0x80e, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r4, &(0x7f0000000200)={&(0x7f0000000fc0)=@pppol2tp={0x18, 0x1, {0x0, r3, {0x2, 0x4e20, @broadcast=0xffffffff}, 0x1, 0x3, 0x0, 0x2}}, 0x80, &(0x7f0000001580)=[{&(0x7f0000001240)="95c4dcff0f017b3c1979888e50f6c20a37b4edaffb28a3b609d24a8180434ab2fac426d3e4fc87e18267002be3cd56b11d69c4db739bf6a9c91af67ee87be1ea522993a368bdfc0df55539a60ef5515b4f03f3dbddae65cd66a90f030118870b473f156cb9a18624103000608c63f84b09ea89bfb8d8e7705c6ef456ef28adec5e566632ddd63098", 0x88}, {&(0x7f0000001380)="5745869bf3b6f562576761d821af2ad55c2f81345c810d6dbd43facd33c5107488aa7f04c5ab1302b820cd31405e9f657776a0d48e2225f39aabc3de0b30dc7422503b448ad89c23ebaee24ae9696e4e58eccae5febf47fff53dc1f03d869303acdef233746263c5c567e84edb166010fd23f56d6e84406bced5a00b5016b0c700fd76218ecf5da3527552a683eb87aa4b246cd74bcbeff8dedec74332e0214e4dc64cb7ac24c4447843caa7550375ef8e1f74a78c40a617e913a25e4837d24fb09e93eaa2", 0xc5}, {&(0x7f0000001480)="8247f46d4324760570d5078149dc5b38f7d1c592564148ecc6262e91c29cd4344e423ff476882993a2844af9a7c306a15e659a4cb9230b5139842c87ad8fa95c202146730fa610b141dfe4c7b771b46e4db879d2b92a01cb8642100d80a1d4658fd0df05c06c8615960a92b690c728e2603373657a9a46b2f200f2895198694d470ab95b6eb7a76ccee67c9219b4afa289d70c87cf22c733e00700f345136d59bcbd89ce7e110746f91e7a7661b8eb0afe54e3cb1c712441dd9a6ffb59a2eb58e5f5eabd4bec428fe27a403bb0d19125e473abdfea87a0c89108e3c876438a7c3f84bebad6cf858f26d2083efd60", 0xee}], 0x3, &(0x7f000000a000)=[{0x88, 0x112, 0xc2, "6671b4b66ac2fb4e14cee671813dc3834802e601529feb049ebb70880567948953018cfd53d7b1c9be27b1084adfba62040c7f889cfbc15407d93133259d9d5052bf6648a69218702e35278939ad399dc3ebed233c1792c7c1204353c8fe75ea0398f4aaf830834bc93873c119dddc539c"}, {0xe8, 0x6f180cc1befb202, 0x9, "4577f77fd3b3acd92c96feff8b0409afeae1c16fa3d367241c9679e5105141c7205d47ce27a418c10fbe7f601c3142e7b7b3a67322c9d345e0baf4315e13dc771a962ff445015c98a70b319d46ba59155d1cf07827804ea1ca86db74f3029bd60f6f365d955ec12be30102e59b4b3940152988ef09443df596bad9525f697fad61507e856c6acb744cfb034863943e811bd378843ccbd95f8221a444f4c323a391f5788559f34ac02e6e18065b87e8c962353623250694e5b4bf9bc1b00fadf2875995067ff6c18590c207f9a83f06665f5b5af77b4e"}, {0xa0, 0x10f, 0x5, "07c5972c79a30903d5d93f57c962c0351628551f6a3fbac8e18984ad9b8caeb403f1d588fa0b9955ce44d018cbcc06ad98b588dd45fd0ccd6b8d1965e70693ec76dd521aa2693829ef54059dc3191f2f4eca64c63f2f901ead2d6c54f0119212ebb77e956117d9130d3adff30a5598567fd540cf0a8f9f8c469ad15f209ad8ef161006831b39e4ddf2fcd748a8629e33"}], 0x210, 0x40}, 0x40) close(r0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)) recvmsg(r2, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) recvmsg$kcm(r4, &(0x7f0000001a00)={0x0, 0x0, &(0x7f00000018c0)=[{&(0x7f0000001600)=""/173, 0xad}, {&(0x7f0000001040)=""/25, 0x19}, {&(0x7f00000016c0)=""/132, 0x84}, {&(0x7f0000001780)=""/91, 0x5b}, {&(0x7f0000001800)=""/183, 0xb7}], 0x5, &(0x7f0000001940)=""/163, 0xa3, 0xe43}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000a80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r5}, 0x48) 2018/03/29 11:56:23 executing program 4 (fault-call:8 fault-nth:58): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x3, &(0x7f0000002000)=@framed={{0x18}, [], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000680)={0xffffffffffffffff, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x7}, 0x28) recvmsg(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000001c0)) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000100)=r0, 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) recvmsg(r3, &(0x7f00000011c0)={&(0x7f0000000b40)=@can, 0x80, &(0x7f0000001100)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f0000000c80)=""/169, 0xa9}, {&(0x7f0000000d40)=""/229, 0xe5}, {&(0x7f0000000e40)=""/128, 0x80}, {&(0x7f0000000ec0)=""/48, 0x30}, {&(0x7f0000000f00)=""/137, 0x89}, {&(0x7f0000006000)=""/4096, 0x1000}, {&(0x7f0000007000)=""/4096, 0x1000}, {&(0x7f0000001080)=""/127, 0x7f}, {&(0x7f0000008000)=""/4096, 0x1000}], 0xa, 0x0, 0x0, 0x1}, 0x2020) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001200)={0x7, 0x4, 0x0, 0x4, 0x8, 0xffffffffffffffff, 0x9}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x1000000007, 0xcf2e, 0x7e, 0x20, 0x15, r1, 0x4}, 0x2c) socketpair(0x3, 0x80e, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r4, &(0x7f0000000200)={&(0x7f0000000fc0)=@pppol2tp={0x18, 0x1, {0x0, r3, {0x2, 0x4e20, @broadcast=0xffffffff}, 0x1, 0x3, 0x0, 0x2}}, 0x80, &(0x7f0000001580)=[{&(0x7f0000001240)="95c4dcff0f017b3c1979888e50f6c20a37b4edaffb28a3b609d24a8180434ab2fac426d3e4fc87e18267002be3cd56b11d69c4db739bf6a9c91af67ee87be1ea522993a368bdfc0df55539a60ef5515b4f03f3dbddae65cd66a90f030118870b473f156cb9a18624103000608c63f84b09ea89bfb8d8e7705c6ef456ef28adec5e566632ddd63098", 0x88}, {&(0x7f0000001380)="5745869bf3b6f562576761d821af2ad55c2f81345c810d6dbd43facd33c5107488aa7f04c5ab1302b820cd31405e9f657776a0d48e2225f39aabc3de0b30dc7422503b448ad89c23ebaee24ae9696e4e58eccae5febf47fff53dc1f03d869303acdef233746263c5c567e84edb166010fd23f56d6e84406bced5a00b5016b0c700fd76218ecf5da3527552a683eb87aa4b246cd74bcbeff8dedec74332e0214e4dc64cb7ac24c4447843caa7550375ef8e1f74a78c40a617e913a25e4837d24fb09e93eaa2", 0xc5}, {&(0x7f0000001480)="8247f46d4324760570d5078149dc5b38f7d1c592564148ecc6262e91c29cd4344e423ff476882993a2844af9a7c306a15e659a4cb9230b5139842c87ad8fa95c202146730fa610b141dfe4c7b771b46e4db879d2b92a01cb8642100d80a1d4658fd0df05c06c8615960a92b690c728e2603373657a9a46b2f200f2895198694d470ab95b6eb7a76ccee67c9219b4afa289d70c87cf22c733e00700f345136d59bcbd89ce7e110746f91e7a7661b8eb0afe54e3cb1c712441dd9a6ffb59a2eb58e5f5eabd4bec428fe27a403bb0d19125e473abdfea87a0c89108e3c876438a7c3f84bebad6cf858f26d2083efd60", 0xee}], 0x3, &(0x7f000000a000)=[{0x88, 0x112, 0xc2, "6671b4b66ac2fb4e14cee671813dc3834802e601529feb049ebb70880567948953018cfd53d7b1c9be27b1084adfba62040c7f889cfbc15407d93133259d9d5052bf6648a69218702e35278939ad399dc3ebed233c1792c7c1204353c8fe75ea0398f4aaf830834bc93873c119dddc539c"}, {0xe8, 0x6f180cc1befb202, 0x9, "4577f77fd3b3acd92c96feff8b0409afeae1c16fa3d367241c9679e5105141c7205d47ce27a418c10fbe7f601c3142e7b7b3a67322c9d345e0baf4315e13dc771a962ff445015c98a70b319d46ba59155d1cf07827804ea1ca86db74f3029bd60f6f365d955ec12be30102e59b4b3940152988ef09443df596bad9525f697fad61507e856c6acb744cfb034863943e811bd378843ccbd95f8221a444f4c323a391f5788559f34ac02e6e18065b87e8c962353623250694e5b4bf9bc1b00fadf2875995067ff6c18590c207f9a83f06665f5b5af77b4e"}, {0xa0, 0x10f, 0x5, "07c5972c79a30903d5d93f57c962c0351628551f6a3fbac8e18984ad9b8caeb403f1d588fa0b9955ce44d018cbcc06ad98b588dd45fd0ccd6b8d1965e70693ec76dd521aa2693829ef54059dc3191f2f4eca64c63f2f901ead2d6c54f0119212ebb77e956117d9130d3adff30a5598567fd540cf0a8f9f8c469ad15f209ad8ef161006831b39e4ddf2fcd748a8629e33"}], 0x210, 0x40}, 0x40) close(r0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b53596090ebcc07d8584f358be88fafe") recvmsg(r2, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) recvmsg$kcm(r4, &(0x7f0000001a00)={0x0, 0x0, &(0x7f00000018c0)=[{&(0x7f0000001600)=""/173, 0xad}, {&(0x7f0000001040)=""/25, 0x19}, {&(0x7f00000016c0)=""/132, 0x84}, {&(0x7f0000001780)=""/91, 0x5b}, {&(0x7f0000001800)=""/183, 0xb7}], 0x5, &(0x7f0000001940)=""/163, 0xa3, 0xe43}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000a80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r5}, 0x48) 2018/03/29 11:56:23 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x3, &(0x7f0000002000)=@framed={{0x18}, [], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000680)={0xffffffffffffffff, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x7}, 0x28) recvmsg(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000001c0)) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000100), 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) recvmsg(r3, &(0x7f00000011c0)={&(0x7f0000000b40)=@can, 0x80, &(0x7f0000001100)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f0000000d40)=""/229, 0xe5}, {&(0x7f0000000e40)=""/128, 0x80}, {&(0x7f0000000ec0)=""/48, 0x30}, {&(0x7f0000000f00)=""/137, 0x89}, {&(0x7f0000006000)=""/4096, 0x1000}, {&(0x7f0000007000)=""/4096, 0x1000}, {&(0x7f0000001080)=""/127, 0x7f}, {&(0x7f0000008000)=""/4096, 0x1000}], 0x9, 0x0, 0x0, 0x1}, 0x2020) bpf$MAP_CREATE(0x0, &(0x7f0000001200)={0x7, 0x4, 0x0, 0x4, 0x8, 0xffffffffffffffff, 0x9}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x1000000007, 0xcf2e, 0x7e, 0x20, 0x15, r1, 0x4}, 0x2c) socketpair(0x3, 0x80e, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r4, &(0x7f0000000200)={&(0x7f0000000fc0)=@pppol2tp={0x18, 0x1, {0x0, r3, {0x2, 0x4e20, @broadcast=0xffffffff}, 0x1, 0x3, 0x0, 0x2}}, 0x80, &(0x7f0000001580)=[{&(0x7f0000001240)="95c4dcff0f017b3c1979888e50f6c20a37b4edaffb28a3b609d24a8180434ab2fac426d3e4fc87e18267002be3cd56b11d69c4db739bf6a9c91af67ee87be1ea522993a368bdfc0df55539a60ef5515b4f03f3dbddae65cd66a90f030118870b473f156cb9a18624103000608c63f84b09ea89bfb8d8e7705c6ef456ef28adec5e566632ddd63098", 0x88}, {&(0x7f0000001380)="5745869bf3b6f562576761d821af2ad55c2f81345c810d6dbd43facd33c5107488aa7f04c5ab1302b820cd31405e9f657776a0d48e2225f39aabc3de0b30dc7422503b448ad89c23ebaee24ae9696e4e58eccae5febf47fff53dc1f03d869303acdef233746263c5c567e84edb166010fd23f56d6e84406bced5a00b5016b0c700fd76218ecf5da3527552a683eb87aa4b246cd74bcbeff8dedec74332e0214e4dc64cb7ac24c4447843caa7550375ef8e1f74a78c40a617e913a25e4837d24fb09e93eaa2", 0xc5}, {&(0x7f0000001480)="8247f46d4324760570d5078149dc5b38f7d1c592564148ecc6262e91c29cd4344e423ff476882993a2844af9a7c306a15e659a4cb9230b5139842c87ad8fa95c202146730fa610b141dfe4c7b771b46e4db879d2b92a01cb8642100d80a1d4658fd0df05c06c8615960a92b690c728e2603373657a9a46b2f200f2895198694d470ab95b6eb7a76ccee67c9219b4afa289d70c87cf22c733e00700f345136d59bcbd89ce7e110746f91e7a7661b8eb0afe54e3cb1c712441dd9a6ffb59a2eb58e5f5eabd4bec428fe27a403bb0d19125e473abdfea87a0c89108e3c876438a7c3f84bebad6cf858f26d2083efd60", 0xee}], 0x3, &(0x7f000000a000)=[{0x88, 0x112, 0xc2, "6671b4b66ac2fb4e14cee671813dc3834802e601529feb049ebb70880567948953018cfd53d7b1c9be27b1084adfba62040c7f889cfbc15407d93133259d9d5052bf6648a69218702e35278939ad399dc3ebed233c1792c7c1204353c8fe75ea0398f4aaf830834bc93873c119dddc539c"}, {0xe8, 0x6f180cc1befb202, 0x9, "4577f77fd3b3acd92c96feff8b0409afeae1c16fa3d367241c9679e5105141c7205d47ce27a418c10fbe7f601c3142e7b7b3a67322c9d345e0baf4315e13dc771a962ff445015c98a70b319d46ba59155d1cf07827804ea1ca86db74f3029bd60f6f365d955ec12be30102e59b4b3940152988ef09443df596bad9525f697fad61507e856c6acb744cfb034863943e811bd378843ccbd95f8221a444f4c323a391f5788559f34ac02e6e18065b87e8c962353623250694e5b4bf9bc1b00fadf2875995067ff6c18590c207f9a83f06665f5b5af77b4e"}, {0xa0, 0x10f, 0x5, "07c5972c79a30903d5d93f57c962c0351628551f6a3fbac8e18984ad9b8caeb403f1d588fa0b9955ce44d018cbcc06ad98b588dd45fd0ccd6b8d1965e70693ec76dd521aa2693829ef54059dc3191f2f4eca64c63f2f901ead2d6c54f0119212ebb77e956117d9130d3adff30a5598567fd540cf0a8f9f8c469ad15f209ad8ef161006831b39e4ddf2fcd748a8629e33"}], 0x210, 0x40}, 0x40) close(r0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)) recvmsg(r2, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) recvmsg$kcm(r4, &(0x7f0000001a00)={0x0, 0x0, &(0x7f00000018c0)=[{&(0x7f0000001600)=""/173, 0xad}, {&(0x7f0000001040)=""/25, 0x19}, {&(0x7f00000016c0)=""/132, 0x84}, {&(0x7f0000001780)=""/91, 0x5b}, {&(0x7f0000001800)=""/183, 0xb7}], 0x5, &(0x7f0000001940)=""/163, 0xa3, 0xe43}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000a80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r5}, 0x48) 2018/03/29 11:56:23 executing program 3: r0 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x10}, 0x10) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000000c0)={0x0, 0x1000, 0x8}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000080)='./file0\x00', r1}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0x0, 0x8}, 0x10) mount(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='cpuset\x00', 0x40, &(0x7f0000000280)="8a4562cb6a7df38be32246afcaef1e1a3f933cb428242c55c117c0fbbd62cea0aab31f2665fb88267466eca314fc8cafd72cc24143121c0691236768fad66390bf9b55014c2bd49faa5388cbabd52e730eeb4ccc411bacd296e423d971043756cf2b35a4063f2a7465b44a60ef31ae437f6160ed2f63afa62c36a27c33e4779e7c0404e337abc025bb2e4b39cc265573c6ab1a3ff09c7ad6bb4631a4") mount(&(0x7f0000000340)='./file1\x00', &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='devtmpfs\x00', 0x40, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xb, 0x7f, 0x0, 0x1, 0x12, r1, 0x100000000}, 0x2c) mkdir(&(0x7f0000000440)='./file1\x00', 0x20) mount(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='iso9660\x00', 0x8, &(0x7f0000000540)="650fe6ccea2b17860de967406c566ec16fe5a7a4c064707e22906e9d3d2a70b4") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000005c0)={r2, 0x28, &(0x7f0000000580)={0x0, 0x0}}, 0x10) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={r3, 0x8, 0x10}, 0xc) mount(&(0x7f0000000640)='./file1\x00', &(0x7f0000000680)='./file1\x00', &(0x7f00000006c0)='pstore\x00', 0x1000000, &(0x7f0000000700)="f48afa3ab3cc319f917be52b04c388c229578537782bc5ffc32c7747b1d28999ad89f5fba460640a324385ac03cccef4553d641b91d79d014804a98e72796f8eb2e1a7056efeaa63404648df67079ae817420f248ccf9d01e7a027c600c71777fb9ebc97da60f3d1a287ef8bc00f1dc68c3b1f0c1836cde5b62be45dd58c3415cbb0f916fe3c04fc69911e2bec15c208d023bdb608fa727657c532bd5101a2a36b34c4eb65f855fea2d6f8a0a79b15ecef1a4c81a8f6f5ed57b09db2ab482413540416126718f2a33ed21346ded20b084a8dc10702ec279fc486b5c57c163d") socketpair(0x3, 0x2, 0x1f, &(0x7f0000001c40)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$kcm(r6, &(0x7f0000004300)={0x0, 0x0, &(0x7f0000004140)=[{&(0x7f0000001c80)=""/139, 0x8b}, {&(0x7f0000001d40)=""/149, 0x95}, {&(0x7f0000001e00)=""/188, 0xbc}, {&(0x7f0000001ec0)=""/69, 0x45}, {&(0x7f0000001f40)=""/165, 0xa5}, {&(0x7f0000002000)=""/4096, 0x1000}, {&(0x7f0000003000)=""/42, 0x2a}, {&(0x7f0000003040)=""/4096, 0x1000}, {&(0x7f0000004040)=""/233, 0xe9}], 0x9, &(0x7f0000004200)=""/236, 0xec, 0xe00}, 0x40) mount(&(0x7f0000004340)='./file1/file0\x00', &(0x7f0000004380)='./file1\x00', &(0x7f00000043c0)='ceph\x00', 0x4860, &(0x7f0000004400)="2c8eb517dd302be26597065442d58f3f345c295b542b2b1df3046ae176") bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000004600)={r6, &(0x7f0000004440)="903685b47b9c4d5c1dffcefa6a92cd57ccdfaf1af0be272f1cb4a5b86ab9d1ef248a63f04f5d59c2cd6e6b7722f5ff866c5d353014f28baaa95bce06a787a3e085102126a0386ffd4e136d472f2cdfb7c658643d2792b7235e2ec8c782080850c20eb00014eab035d7d56c8ddd0d7fdc4c21602d480e4accea0867cc5b4172b46b8f028bd623c58544092396dbda704543cd7c93219ff7f4caf9d0c12fc32c65ddac48ba22321d2c7ef1152f0dd87ed22cb30eb2b24d381b3abaefc114ad4c08e329cfbce60e0549ca", &(0x7f0000004540)="38859653237c5c9685cf2e44e1eea64846e190b778f29b06c26c2f2b8a0800f9fc2019b05290fc5c82f612eb7f479918015eb3af93cc57f01db731e129275ce05910f66e436ef09a8fe7bf22f960eacec350a7f7e9e9a47cb163f467b6a29523346a4c61d65d2235c73095a53929d509538f640424133cfa3617b41a51aa7172460146433abbe604f2c92827fabd5d3134d36b4cecd0fd2549f3527615f9eb63dd9332021e4eff13ad6aa509db21ed98745d00cb36e547", 0x3}, 0x20) mkdir(&(0x7f0000004640)='./file1/file0\x00', 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000004680)={0x0, 0x0, 0xa6, 0x3, 0x4}, 0x2c) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000046c0)=0x7, 0x4) recvmsg$kcm(r6, &(0x7f00000058c0)={&(0x7f0000004700)=@alg, 0x80, &(0x7f0000005880)=[{&(0x7f0000004780)=""/4096, 0x1000}, {&(0x7f0000005780)=""/219, 0xdb}], 0x2, 0x0, 0x0, 0x100000001}, 0x40000000) r7 = gettid() r8 = perf_event_open(&(0x7f0000005900)={0x7, 0x70, 0x0, 0xfffffffffffffff7, 0x9, 0x4, 0x0, 0x7, 0x100, 0x8, 0x100000000, 0x8000, 0x8, 0x6, 0x0, 0x6, 0x10001, 0x9, 0x1f, 0x2, 0x1, 0x3, 0x1, 0x1f, 0x23, 0x1, 0xaa4, 0x5, 0x4, 0x200, 0x6, 0x9, 0xfffffffffffffffb, 0x3, 0x3, 0xff, 0x80000000, 0x0, 0x0, 0xffffffffffffff9d, 0x2, @perf_config_ext={0x7, 0x9}, 0x100, 0x8, 0x2, 0x6, 0x4, 0x6, 0xf71}, r7, 0x9, r6, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f00000059c0)={&(0x7f0000005980)='./file0\x00'}, 0x10) ioctl$sock_kcm_SIOCKCMATTACH(r5, 0x89e0, &(0x7f0000005a00)={r5, r0}) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000005c00)={r4, &(0x7f0000005a40)="313befc1e9ac680c4369983530ee783c4f018c38e134b4b0aebd06ede05f238850949c0f5d32ab19889f880e87e3a0fa5a43500affdcc508d56f3a4df6c159ca9cfa62124b79b4607d42738dc5e16d09ea2c6a2346fc2360feff08d9f464dfdebce2cb99d4ba8e5fc37edfba041f14e16a68192d7d8687404ee7318323520188c4e5d52e8c7ec40bd0823fb210e530c74ea842bd8bacbc48317b0b6ed12528ecd30e1af83b8049df791ff7affe91ab54", &(0x7f0000005b00)=""/243}, 0x18) mount(&(0x7f0000005c40)='./file1/file0\x00', &(0x7f0000005c80)='./file1\x00', &(0x7f0000005cc0)='btrfs\x00', 0x0, 0x0) recvmsg(r5, &(0x7f00000073c0)={&(0x7f0000005d00)=@sco, 0x80, &(0x7f0000007300)=[{&(0x7f0000005d80)=""/103, 0x67}, {&(0x7f0000005e00)=""/170, 0xaa}, {&(0x7f0000005ec0)=""/252, 0xfc}, {&(0x7f0000005fc0)=""/136, 0x88}, {&(0x7f0000006080)=""/125, 0x7d}, {&(0x7f0000006100)=""/4096, 0x1000}, {&(0x7f0000007100)=""/106, 0x6a}, {&(0x7f0000007180)=""/115, 0x73}, {&(0x7f0000007200)=""/240, 0xf0}], 0x9, 0x0, 0x0, 0x7}, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000007400)={r3, 0x10001, 0x18}, 0xc) ioctl$PERF_EVENT_IOC_REFRESH(r8, 0x2402, 0xc4c) recvmsg$kcm(r6, &(0x7f0000008880)={&(0x7f0000007440)=@l2, 0x80, &(0x7f0000008800)=[{&(0x7f00000074c0)=""/231, 0xe7}, {&(0x7f00000075c0)=""/118, 0x76}, {&(0x7f0000007640)=""/4096, 0x1000}, {&(0x7f0000008740)}, {&(0x7f0000008780)=""/32, 0x20}, {&(0x7f00000087c0)=""/53, 0x35}], 0x6}, 0x10000) 2018/03/29 11:56:23 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x1e1, 0x100000000209e20, 0x8000000001, 0x5}, 0xfffffffffffffe20) r0 = getpid() r1 = perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0xfffffffffffffffc, 0x3, 0x8, 0x2, 0x0, 0x9, 0x10000, 0xc, 0x3d3, 0x80, 0x5, 0xfffffffffffffffc, 0x8, 0x3f, 0x5d, 0xbbb0, 0x20, 0x3, 0x8000, 0x100000000, 0x8, 0x9, 0x2, 0x4, 0x800, 0xf8, 0x3, 0x9, 0x1, 0x3, 0x8, 0x3, 0x7, 0x10001, 0xf16, 0x2, 0x0, 0x7fffffff, 0x4, @perf_bp={&(0x7f0000000780), 0x1}, 0x4080, 0x10001, 0xcc, 0x7, 0x3, 0xffff, 0x7fffffff}, 0xffffffffffffffff, 0xd, 0xffffffffffffff9c, 0x8) perf_event_open(&(0x7f0000000980)={0x4, 0x70, 0x6, 0x3f, 0x8e, 0x1, 0x0, 0x3, 0x404, 0x0, 0xbc2b, 0x40, 0x7, 0xffff, 0xffff, 0x9, 0x9de2, 0x9, 0x0, 0x3, 0x7f, 0xff, 0x40, 0x400, 0x9, 0x7fffffff, 0x80000000, 0x7, 0x8, 0x10001, 0x1f, 0x2778, 0x800, 0x8001, 0x101, 0x9, 0x8, 0x7ff, 0x0, 0x1000, 0x5, @perf_config_ext={0x3ff, 0xb69b}, 0x3040, 0x2, 0x2, 0x5, 0x7, 0x6, 0x7283ed73}, r0, 0xe, r1, 0x8) bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x0, 0x0, 0x7ffff9, 0x0, 0x20000003, 0x0}, 0x2c) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) r2 = gettid() r3 = perf_event_open(&(0x7f00000008c0)={0x7, 0x70, 0x1, 0x200, 0x3, 0xdbce, 0x0, 0x8, 0x1002, 0x1, 0xffffffffffffff00, 0x8, 0x1, 0xb3fa, 0x8, 0x0, 0x1, 0x2, 0x1000, 0x2, 0x401, 0x8, 0x3, 0x81, 0x0, 0x7, 0x2fc4, 0x882, 0x4, 0x8, 0x3, 0x81, 0x3, 0x7, 0x8857, 0x7, 0x5, 0x9, 0x0, 0x7, 0x1, @perf_config_ext={0x0, 0x80000000}, 0x400, 0x7f, 0x4, 0x7, 0x2, 0x7f, 0x200}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000840)={0x5, 0x70, 0xef, 0x2, 0x1000, 0xffffffff80000000, 0x0, 0x1a7800000000, 0x2000, 0x4, 0x5, 0x6814, 0x3a9, 0x5, 0x63b, 0x6, 0x8, 0x1000, 0x250420ee, 0x3, 0x0, 0x20, 0x6, 0x0, 0x4, 0x5, 0x4, 0x8, 0x3, 0x8, 0x52893dd5, 0x2, 0x2, 0x8, 0x44d, 0x1, 0x8, 0x6, 0x0, 0x100000000, 0x0, @perf_config_ext={0x9, 0x80}, 0x0, 0x0, 0x2b67, 0x6, 0x4b0, 0x81, 0x4}, r2, 0x5, r3, 0xb) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1003, 0x0) mount(&(0x7f00002b9ff8)='./file0\x00', &(0x7f0000cbeff8)='./file0\x00', &(0x7f00005f7ffa)='ramfs\x00', 0x80000, &(0x7f000002f000)) mount(&(0x7f0000000000)='.', &(0x7f0000000040)='.', &(0x7f0000000080)='cgroup\x00', 0x5010, &(0x7f00000000c0)) mount(&(0x7f0000377ff8)='.', &(0x7f0000000280)='.', &(0x7f0000000600)='nfs4\x00', 0x5010, &(0x7f0000000300)="2161893416a0c71070768c219eb114c3253c9f3baf4e9e8e9111c1a7fc6e266009fe27243deeaa22ca7ae9341f714300b5ee807e55d609036f2a3260475922bdfb2d2849f1c3b2ad3c051bd4f3751a177f77a92758c6d2b23fe7f1535b54e5846d11c135de8286066dec1b25f6e1378944ac5f7fce42d055821b5e19") perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xd68, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f0000014f88)={0x5, 0xfffffffffffffdc4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x46000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = getpid() perf_event_open(&(0x7f0000000680)={0x4, 0x70, 0x64, 0xffff, 0x1f, 0x4, 0x0, 0x1c3, 0x0, 0x1, 0x1, 0x9, 0x1ff, 0xfffffffffffffff8, 0x0, 0x0, 0x6, 0x7fffffff, 0x4, 0xffffffff, 0x80000001, 0xd0, 0x7, 0x1f, 0x0, 0x8, 0x9, 0x1ff, 0x8, 0x785, 0x4, 0xff, 0x2, 0x656, 0x5000000, 0x1, 0x460e3be0, 0x1, 0x0, 0x0, 0x7, @perf_bp={&(0x7f0000000640), 0x1}, 0x1000, 0xa, 0x7fff, 0x7, 0x3, 0x400, 0x9}, r5, 0xe, r4, 0x1) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', 0x0, 0x10}, 0x10) close(0xffffffffffffffff) bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)={&(0x7f0000000040)='./file0\x00', 0x0, 0x18}, 0x10) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000100)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0, 0x2e, &(0x7f0000000440), &(0x7f0000000140)=""/46, 0x4229}, 0x28) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000003480)={&(0x7f0000003300)=@can={0x0, 0x0}, 0x80, &(0x7f0000003400)=[{&(0x7f0000003380)=""/56, 0x38}, {&(0x7f00000033c0)=""/1, 0x1}], 0x2, &(0x7f0000003440)=""/33, 0x21, 0x1}, 0x40010000) bpf$PROG_LOAD(0x5, &(0x7f00000034c0)={0xe, 0x6, &(0x7f0000000940)=ANY=[@ANYBLOB="1800000002000000000000004ce700002555fdff00000000002371d07c9ba7f4a23372b0ad61000000000000009500000000000000"], &(0x7f00000007c0)='GPL\x00', 0x3, 0x2d, &(0x7f0000000800)=""/45, 0x40f00, 0x1}, 0x48) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000740)={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x10) socketpair$inet(0x2, 0x80a, 0x81, &(0x7f0000000240)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={0xffffffffffffffff, &(0x7f0000000500)="ae30f1bca1b4d3f69f1aac81517d42ad5980bc63b5008616a1f4724b9f8c1e4ecd8de336f57dd727cdaab04f0b40f28612615ad08de414711d841a88db33fd33884b627074213a0c5de3be2bbaec9207d9865c47f240467849979b5ab5632376608fc4be41a274abb2dc07cabe344a18db51048e5b0cbda843905a4258cdee3e649eddf104ba78894dce09747dcfe6a8d6d6d985520eeef448b83a8bcb83074541ba7a20d6094aa206c01a0690e5b3bfa05d475eb382b0199031d22bb26cde9b1ca0055eef9f6c4993b71ba19ba0590bb5efdaddaa574c25356ca890d138fc9fe0e975b6d5a1a8251503cd0a91845f9d95", &(0x7f0000000480)="9bc7741ea5e524cc8c6f748a73153834428729c45bf4ad446d2dddf1978baf431d0ba35b5442b5afe22db8b003650320200af7e1368ef7cdfa79ca8b9d3564363a5d2a502970314f2264c883bc8d990afc003e5adb95b30edad245c4420c8126f1d33db75ff0230698eaff90055e0f", 0x2}, 0x20) socketpair(0x0, 0x80003, 0xffff, &(0x7f0000000380)={0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r7, 0x50, &(0x7f00000003c0)}, 0x10) 2018/03/29 11:56:23 executing program 0: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000001a00)) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000001a40)={0xffffffffffffffff}) recvmsg$kcm(r1, &(0x7f0000000540)={&(0x7f00000000c0)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @broadcast}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000240)=""/65, 0x41}], 0x1, &(0x7f0000000440)=""/213, 0xd5}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x8983, &(0x7f0000000040)) socketpair(0x2, 0x2, 0x1a6d, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000180)='ppp1^\x00') socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000080)) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000019c0)={0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000000140)="0253eea6a53cc0eae389e9a13e5f2046d0633eebde90f446c1b1eabbd0adb42dfcefb37a3df93feb3d5e76dc353ecf23fe9c81afa5", 0x35}, {&(0x7f00000002c0)}, {&(0x7f0000000400)}, {&(0x7f0000001600)}], 0x4, &(0x7f0000001700)=[{0x68, 0x107, 0x25047dc1, "755cd1e9e23de47cb15819d813deb534cee2d9497c58eba5bd8a228407fb709d70f16afa73f4924f12ecc429b6fd356748940b62ee5f5685ce027fe4e6c60a8f88cd1a5827d099f5849f09bd37f681e29814e6bb"}, {0x10, 0x0, 0x1ff}, {0x10, 0x107, 0x80000001}], 0x88}, 0x48800) 2018/03/29 11:56:23 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x1e1, 0x100000000209e20, 0x8000000001, 0x5}, 0xfffffffffffffe20) r0 = getpid() r1 = perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0x0, 0x3, 0x8, 0x2, 0x0, 0x9, 0x10000, 0xc, 0x3d3, 0x80, 0x5, 0xfffffffffffffffc, 0x8, 0x3f, 0x5d, 0xbbb0, 0x20, 0x3, 0x8000, 0x100000000, 0x8, 0x9, 0x2, 0x4, 0x800, 0xf8, 0x3, 0x9, 0x1, 0x3, 0x8, 0x3, 0x7, 0x10001, 0xf16, 0x2, 0x0, 0x7fffffff, 0x4, @perf_bp={&(0x7f0000000780), 0x1}, 0x4080, 0x10001, 0xcc, 0x7, 0x3, 0xffff, 0x7fffffff}, 0xffffffffffffffff, 0xd, 0xffffffffffffff9c, 0x8) perf_event_open(&(0x7f0000000980)={0x4, 0x70, 0x6, 0x3f, 0x8e, 0x1, 0x0, 0x3, 0x404, 0x0, 0xbc2b, 0x40, 0x7, 0xffff, 0xffff, 0x9, 0x9de2, 0x9, 0x0, 0x3, 0x7f, 0xff, 0x40, 0x400, 0x9, 0x7fffffff, 0x80000000, 0x7, 0x8, 0x10001, 0x1f, 0x2778, 0x800, 0x8001, 0x101, 0x9, 0x8, 0x7ff, 0x0, 0x1000, 0x5, @perf_config_ext={0x3ff, 0xb69b}, 0x3040, 0x2, 0x2, 0x5, 0x7, 0x6, 0x7283ed73}, r0, 0xe, r1, 0x8) bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x0, 0x0, 0x7ffff9, 0x0, 0x20000003, 0x0}, 0x2c) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) r2 = gettid() r3 = perf_event_open(&(0x7f00000008c0)={0x7, 0x70, 0x1, 0x200, 0x3, 0xdbce, 0x0, 0x8, 0x1002, 0x1, 0xffffffffffffff00, 0x8, 0x1, 0xb3fa, 0x8, 0x0, 0x1, 0x2, 0x1000, 0x2, 0x401, 0x8, 0x3, 0x81, 0x0, 0x7, 0x2fc4, 0x882, 0x4, 0x8, 0x3, 0x81, 0x3, 0x7, 0x8857, 0x7, 0x5, 0x9, 0x0, 0x7, 0x1, @perf_config_ext={0x0, 0x80000000}, 0x400, 0x7f, 0x4, 0x7, 0x2, 0x7f, 0x200}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000840)={0x5, 0x70, 0xef, 0x2, 0x1000, 0xffffffff80000000, 0x0, 0x1a7800000000, 0x2000, 0x4, 0x5, 0x6814, 0x3a9, 0x5, 0x63b, 0x6, 0x8, 0x1000, 0x250420ee, 0x3, 0x0, 0x20, 0x6, 0x0, 0x4, 0x5, 0x4, 0x8, 0x3, 0x8, 0x52893dd5, 0x2, 0x2, 0x8, 0x44d, 0x1, 0x8, 0x6, 0x0, 0x100000000, 0x0, @perf_config_ext={0x9, 0x80}, 0x0, 0x0, 0x2b67, 0x6, 0x4b0, 0x81, 0x4}, r2, 0x5, r3, 0xb) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1003, 0x0) mount(&(0x7f00002b9ff8)='./file0\x00', &(0x7f0000cbeff8)='./file0\x00', &(0x7f00005f7ffa)='ramfs\x00', 0x80000, &(0x7f000002f000)) mount(&(0x7f0000000000)='.', &(0x7f0000000040)='.', &(0x7f0000000080)='cgroup\x00', 0x5010, &(0x7f00000000c0)) mount(&(0x7f0000377ff8)='.', &(0x7f0000000280)='.', &(0x7f0000000600)='nfs4\x00', 0x5010, &(0x7f0000000300)="2161893416a0c71070768c219eb114c3253c9f3baf4e9e8e9111c1a7fc6e266009fe27243deeaa22ca7ae9341f714300b5ee807e55d609036f2a3260475922bdfb2d2849f1c3b2ad3c051bd4f3751a177f77a92758c6d2b23fe7f1535b54e5846d11c135de8286066dec1b25f6e1378944ac5f7fce42d055821b5e19") perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xd68, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f0000014f88)={0x5, 0xfffffffffffffdc4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x46000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = getpid() perf_event_open(&(0x7f0000000680)={0x4, 0x70, 0x64, 0xffff, 0x1f, 0x4, 0x0, 0x1c3, 0x0, 0x1, 0x1, 0x9, 0x1ff, 0xfffffffffffffff8, 0x0, 0x0, 0x6, 0x7fffffff, 0x0, 0xffffffff, 0x80000001, 0xd0, 0x7, 0x1f, 0x0, 0x8, 0x9, 0x1ff, 0x8, 0x785, 0x4, 0xff, 0x2, 0x656, 0x5000000, 0x1, 0x460e3be0, 0x1, 0x0, 0x0, 0x7, @perf_bp={&(0x7f0000000640), 0x1}, 0x1000, 0xa, 0x7fff, 0x7, 0x3, 0x400, 0x9}, r5, 0xe, r4, 0x1) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', 0x0, 0x10}, 0x10) close(0xffffffffffffffff) bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)={&(0x7f0000000040)='./file0\x00', 0x0, 0x18}, 0x10) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000100)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0, 0x2e, &(0x7f0000000440), &(0x7f0000000140)=""/46, 0x4229}, 0x28) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000003480)={&(0x7f0000003300)=@can={0x0, 0x0}, 0x80, &(0x7f0000003400)=[{&(0x7f0000003380)=""/56, 0x38}, {&(0x7f00000033c0)=""/1, 0x1}], 0x2, &(0x7f0000003440)=""/33, 0x21, 0x1}, 0x40010000) bpf$PROG_LOAD(0x5, &(0x7f00000034c0)={0xe, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="1800000002000000000000004ce700002555fdff00000000002371d07c9ba7f4a23372b0ad61000000000000009500000000000000"], &(0x7f00000007c0)='GPL\x00', 0x3, 0x2d, &(0x7f0000000800)=""/45, 0x40f00, 0x1, [], r6}, 0x48) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000740)={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x10) socketpair$inet(0x2, 0x80a, 0x81, &(0x7f0000000240)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={0xffffffffffffffff, &(0x7f0000000500)="ae30f1bca1b4d3f69f1aac81517d42ad5980bc63b5008616a1f4724b9f8c1e4ecd8de336f57dd727cdaab04f0b40f28612615ad08de414711d841a88db33fd33884b627074213a0c5de3be2bbaec9207d9865c47f240467849979b5ab5632376608fc4be41a274abb2dc07cabe344a18db51048e5b0cbda843905a4258cdee3e649eddf104ba78894dce09747dcfe6a8d6d6d985520eeef448b83a8bcb83074541ba7a20d6094aa206c01a0690e5b3bfa05d475eb382b0199031d22bb26cde9b1ca0055eef9f6c4993b71ba19ba0590bb5efdaddaa574c25356ca890d138fc9fe0e975b6d5a1a8251503cd0a91845f9d95", &(0x7f0000000480)="9bc7741ea5e524cc8c6f748a73153834428729c45bf4ad446d2dddf1978baf431d0ba35b5442b5afe22db8b003650320200af7e1368ef7cdfa79ca8b9d3564363a5d2a502970314f2264c883bc8d990afc003e5adb95b30edad245c4420c8126f1d33db75ff0230698eaff90055e0f", 0x2}, 0x20) socketpair(0x0, 0x80003, 0xffff, &(0x7f0000000380)={0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r7, 0x50, &(0x7f00000003c0)}, 0x10) 2018/03/29 11:56:23 executing program 3: r0 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x10}, 0x10) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000000c0)={0x0, 0x1000, 0x8}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000080)='./file0\x00', r1}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0x0, 0x8}, 0x10) mount(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='cpuset\x00', 0x40, &(0x7f0000000280)="8a4562cb6a7df38be32246afcaef1e1a3f933cb428242c55c117c0fbbd62cea0aab31f2665fb88267466eca314fc8cafd72cc24143121c0691236768fad66390bf9b55014c2bd49faa5388cbabd52e730eeb4ccc411bacd296e423d971043756cf2b35a4063f2a7465b44a60ef31ae437f6160ed2f63afa62c36a27c33e4779e7c0404e337abc025bb2e4b39cc265573c6ab1a3ff09c7ad6bb4631a4") mount(&(0x7f0000000340)='./file1\x00', &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='devtmpfs\x00', 0x40, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xb, 0x7f, 0x0, 0x1, 0x12, r1, 0x100000000}, 0x2c) mkdir(&(0x7f0000000440)='./file1\x00', 0x20) mount(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='iso9660\x00', 0x8, &(0x7f0000000540)="650fe6ccea2b17860de967406c566ec16fe5a7a4c064707e22906e9d3d2a70b4") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000005c0)={r2, 0x28, &(0x7f0000000580)={0x0, 0x0}}, 0x10) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={r3, 0x8, 0x10}, 0xc) mount(&(0x7f0000000640)='./file1\x00', &(0x7f0000000680)='./file1\x00', &(0x7f00000006c0)='pstore\x00', 0x1000000, &(0x7f0000000700)="f48afa3ab3cc319f917be52b04c388c229578537782bc5ffc32c7747b1d28999ad89f5fba460640a324385ac03cccef4553d641b91d79d014804a98e72796f8eb2e1a7056efeaa63404648df67079ae817420f248ccf9d01e7a027c600c71777fb9ebc97da60f3d1a287ef8bc00f1dc68c3b1f0c1836cde5b62be45dd58c3415cbb0f916fe3c04fc69911e2bec15c208d023bdb608fa727657c532bd5101a2a36b34c4eb65f855fea2d6f8a0a79b15ecef1a4c81a8f6f5ed57b09db2ab482413540416126718f2a33ed21346ded20b084a8dc10702ec279fc486b5c57c163d") socketpair(0x3, 0x2, 0x1f, &(0x7f0000001c40)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$kcm(r6, &(0x7f0000004300)={0x0, 0x0, &(0x7f0000004140)=[{&(0x7f0000001c80)=""/139, 0x8b}, {&(0x7f0000001d40)=""/149, 0x95}, {&(0x7f0000001e00)=""/188, 0xbc}, {&(0x7f0000001ec0)=""/69, 0x45}, {&(0x7f0000001f40)=""/165, 0xa5}, {&(0x7f0000002000)=""/4096, 0x1000}, {&(0x7f0000003000)=""/42, 0x2a}, {&(0x7f0000003040)=""/4096, 0x1000}, {&(0x7f0000004040)=""/233, 0xe9}], 0x9, &(0x7f0000004200)=""/236, 0xec, 0xe00}, 0x40) mount(&(0x7f0000004340)='./file1/file0\x00', &(0x7f0000004380)='./file1\x00', &(0x7f00000043c0)='ceph\x00', 0x4860, &(0x7f0000004400)="2c8eb517dd302be26597065442d58f3f345c295b542b2b1df3046ae176") bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000004600)={r6, &(0x7f0000004440)="903685b47b9c4d5c1dffcefa6a92cd57ccdfaf1af0be272f1cb4a5b86ab9d1ef248a63f04f5d59c2cd6e6b7722f5ff866c5d353014f28baaa95bce06a787a3e085102126a0386ffd4e136d472f2cdfb7c658643d2792b7235e2ec8c782080850c20eb00014eab035d7d56c8ddd0d7fdc4c21602d480e4accea0867cc5b4172b46b8f028bd623c58544092396dbda704543cd7c93219ff7f4caf9d0c12fc32c65ddac48ba22321d2c7ef1152f0dd87ed22cb30eb2b24d381b3abaefc114ad4c08e329cfbce60e0549ca", &(0x7f0000004540)="38859653237c5c9685cf2e44e1eea64846e190b778f29b06c26c2f2b8a0800f9fc2019b05290fc5c82f612eb7f479918015eb3af93cc57f01db731e129275ce05910f66e436ef09a8fe7bf22f960eacec350a7f7e9e9a47cb163f467b6a29523346a4c61d65d2235c73095a53929d509538f640424133cfa3617b41a51aa7172460146433abbe604f2c92827fabd5d3134d36b4cecd0fd2549f3527615f9eb63dd9332021e4eff13ad6aa509db21ed98745d00cb36e547", 0x3}, 0x20) mkdir(&(0x7f0000004640)='./file1/file0\x00', 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000004680)={0x0, 0x0, 0xa6, 0x3, 0x4}, 0x2c) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000046c0)=0x7, 0x4) recvmsg$kcm(r6, &(0x7f00000058c0)={&(0x7f0000004700)=@alg, 0x80, &(0x7f0000005880)=[{&(0x7f0000004780)=""/4096, 0x1000}, {&(0x7f0000005780)=""/219, 0xdb}], 0x2, 0x0, 0x0, 0x100000001}, 0x40000000) r7 = gettid() r8 = perf_event_open(&(0x7f0000005900)={0x7, 0x70, 0x0, 0xfffffffffffffff7, 0x9, 0x4, 0x0, 0x7, 0x100, 0x8, 0x100000000, 0x8000, 0x8, 0x6, 0x0, 0x6, 0x10001, 0x9, 0x1f, 0x2, 0x1, 0x3, 0x1, 0x1f, 0x23, 0x1, 0xaa4, 0x5, 0x4, 0x200, 0x6, 0x9, 0xfffffffffffffffb, 0x3, 0x3, 0xff, 0x80000000, 0x0, 0x0, 0xffffffffffffff9d, 0x2, @perf_config_ext={0x7, 0x9}, 0x100, 0x8, 0x2, 0x6, 0x4, 0x6, 0xf71}, r7, 0x9, r6, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f00000059c0)={&(0x7f0000005980)='./file0\x00'}, 0x10) ioctl$sock_kcm_SIOCKCMATTACH(r5, 0x89e0, &(0x7f0000005a00)={r5, r0}) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000005c00)={r4, &(0x7f0000005a40)="313befc1e9ac680c4369983530ee783c4f018c38e134b4b0aebd06ede05f238850949c0f5d32ab19889f880e87e3a0fa5a43500affdcc508d56f3a4df6c159ca9cfa62124b79b4607d42738dc5e16d09ea2c6a2346fc2360feff08d9f464dfdebce2cb99d4ba8e5fc37edfba041f14e16a68192d7d8687404ee7318323520188c4e5d52e8c7ec40bd0823fb210e530c74ea842bd8bacbc48317b0b6ed12528ecd30e1af83b8049df791ff7affe91ab54", &(0x7f0000005b00)=""/243}, 0x18) mount(&(0x7f0000005c40)='./file1/file0\x00', &(0x7f0000005c80)='./file1\x00', &(0x7f0000005cc0)='btrfs\x00', 0x0, 0x0) recvmsg(r5, &(0x7f00000073c0)={&(0x7f0000005d00)=@sco, 0x80, &(0x7f0000007300)=[{&(0x7f0000005d80)=""/103, 0x67}, {&(0x7f0000005e00)=""/170, 0xaa}, {&(0x7f0000005ec0)=""/252, 0xfc}, {&(0x7f0000005fc0)=""/136, 0x88}, {&(0x7f0000006080)=""/125, 0x7d}, {&(0x7f0000006100)=""/4096, 0x1000}, {&(0x7f0000007100)=""/106, 0x6a}, {&(0x7f0000007180)=""/115, 0x73}, {&(0x7f0000007200)=""/240, 0xf0}], 0x9, 0x0, 0x0, 0x7}, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000007400)={r3, 0x10001, 0x18}, 0xc) ioctl$PERF_EVENT_IOC_REFRESH(r8, 0x2402, 0xc4c) recvmsg$kcm(r6, &(0x7f0000008880)={&(0x7f0000007440)=@l2, 0x80, &(0x7f0000008800)=[{&(0x7f00000074c0)=""/231, 0xe7}, {&(0x7f00000075c0)=""/118, 0x76}, {&(0x7f0000007640)=""/4096, 0x1000}, {&(0x7f0000008740)}, {&(0x7f0000008780)=""/32, 0x20}, {&(0x7f00000087c0)=""/53, 0x35}], 0x6}, 0x10000) [ 829.809120] IPVS: ftp: loaded support on port[0] = 21 [ 830.771089] IPVS: ftp: loaded support on port[0] = 21 [ 830.796778] IPVS: ftp: loaded support on port[0] = 21 [ 830.830563] IPVS: ftp: loaded support on port[0] = 21 [ 830.882432] FAULT_INJECTION: forcing a failure. [ 830.882432] name failslab, interval 1, probability 0, space 0, times 0 [ 830.893693] CPU: 0 PID: 27190 Comm: syz-executor4 Not tainted 4.16.0-rc6+ #40 [ 830.900973] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 830.910315] Call Trace: [ 830.912899] dump_stack+0x194/0x24d [ 830.916507] ? arch_local_irq_restore+0x53/0x53 [ 830.921165] should_fail+0x8c0/0xa40 [ 830.924863] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 830.929947] ? __lock_is_held+0xb6/0x140 [ 830.933997] ? mark_held_locks+0xaf/0x100 [ 830.938228] ? __raw_spin_lock_init+0x1c/0x100 [ 830.942797] ? find_held_lock+0x35/0x1d0 [ 830.946855] ? __lock_is_held+0xb6/0x140 [ 830.950915] ? check_same_owner+0x320/0x320 [ 830.955217] ? d_alloc+0x269/0x340 [ 830.958742] ? rcu_note_context_switch+0x710/0x710 [ 830.963738] ? lock_release+0xa40/0xa40 [ 830.967700] should_failslab+0xec/0x120 [ 830.971653] kmem_cache_alloc+0x47/0x760 [ 830.975701] ? d_drop+0x51/0x60 [ 830.978962] ? rpc_i_callback+0x30/0x30 [ 830.982916] rpc_alloc_inode+0x1a/0x20 [ 830.986781] alloc_inode+0x65/0x180 [ 830.990387] new_inode_pseudo+0x69/0x190 [ 830.994438] ? prune_icache_sb+0x1a0/0x1a0 [ 830.998650] ? do_raw_spin_trylock+0x190/0x190 [ 831.003209] ? d_add+0xa70/0xa70 [ 831.006566] new_inode+0x1c/0x40 [ 831.009911] rpc_get_inode+0x20/0x1e0 [ 831.013690] __rpc_create_common+0x5d/0x1d0 [ 831.017991] ? __d_lookup+0x830/0x830 [ 831.021779] rpc_populate.constprop.15+0x1ad/0x340 [ 831.026695] rpc_fill_super+0x464/0xae0 [ 831.030655] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 831.035832] ? security_capable+0x8e/0xc0 [ 831.039964] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 831.045130] ? ns_capable_common+0xcf/0x160 [ 831.049432] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 831.054598] mount_ns+0xc4/0x190 [ 831.057951] rpc_mount+0x9e/0xd0 [ 831.061296] mount_fs+0x66/0x2d0 [ 831.064646] vfs_kern_mount.part.26+0xc6/0x4a0 [ 831.069206] ? may_umount+0xa0/0xa0 [ 831.072818] ? _raw_read_unlock+0x22/0x30 [ 831.076945] ? __get_fs_type+0x8a/0xc0 [ 831.080820] do_mount+0xea4/0x2bb0 [ 831.084346] ? copy_mount_string+0x40/0x40 [ 831.088559] ? rcu_pm_notify+0xc0/0xc0 [ 831.092436] ? copy_mount_options+0x5f/0x2e0 [ 831.096820] ? rcu_read_lock_sched_held+0x108/0x120 [ 831.101814] ? kmem_cache_alloc_trace+0x459/0x740 [ 831.106636] ? kasan_check_write+0x14/0x20 [ 831.110857] ? copy_mount_options+0x1f7/0x2e0 [ 831.115338] SyS_mount+0xab/0x120 [ 831.118766] ? copy_mnt_ns+0xb30/0xb30 [ 831.122636] do_syscall_64+0x281/0x940 [ 831.126497] ? __do_page_fault+0xc90/0xc90 [ 831.130716] ? _raw_spin_unlock_irq+0x27/0x70 [ 831.135190] ? finish_task_switch+0x1c1/0x7e0 [ 831.139665] ? syscall_return_slowpath+0x550/0x550 [ 831.144572] ? syscall_return_slowpath+0x2ac/0x550 [ 831.149477] ? prepare_exit_to_usermode+0x350/0x350 [ 831.154469] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 831.159820] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 831.164646] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 831.169809] RIP: 0033:0x4548b9 [ 831.172974] RSP: 002b:00007f917abd5c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 2018/03/29 11:56:25 executing program 0: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000001a00)) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000001a40)={0xffffffffffffffff}) recvmsg$kcm(r1, &(0x7f0000000540)={&(0x7f00000000c0)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @broadcast}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000240)=""/65, 0x41}], 0x1, &(0x7f0000000440)=""/213, 0xd5}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x8983, &(0x7f0000000040)) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000080)) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000019c0)={0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000000140)="0253eea6a53cc0eae389e9a13e5f2046d0633eebde90f446c1b1eabbd0adb42dfcefb37a3df93feb3d5e76dc353ecf23fe9c81afa5", 0x35}, {&(0x7f0000000180)="b51387cadf3c28e011f7240d6c650a861db6d0a6c7eca1495759253c5e98be53bdd951b82203d4c0a4a3d2f785d497900444b845930dfd482865480e3dfdf07d3806a6dda78ae43d5ac1381ea47d1851cd0bc04cbc", 0x55}, {&(0x7f0000000400)}, {&(0x7f00000002c0)="fb17fce0f90c7fbc94ec78bb2af21beb0f4f057a54af488991781ad9d3824125ebde266e44b62cfaaec70c0b71cecfe57d9c4f584edee39b03f38061f0e089cadba6b954901a7acd6d8a552d7f5724f6475e8ad29e5fa9ad6efb5fd3af972015985b90dcd4", 0x65}], 0x4, &(0x7f0000001700)=[{0x68, 0x107, 0x25047dc1, "755cd1e9e23de47cb15819d813deb534cee2d9497c58eba5bd8a228407fb709d70f16afa73f4924f12ecc429b6fd356748940b62ee5f5685ce027fe4e6c60a8f88cd1a5827d099f5849f09bd37f681e29814e6bb"}, {0x10, 0x0, 0x1ff}, {0x10, 0x10a, 0x80000001}], 0x88}, 0x48800) 2018/03/29 11:56:25 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x3, &(0x7f0000002000)=@framed={{0x18}, [], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000680)={0xffffffffffffffff, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x7}, 0x28) recvmsg(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000001c0)) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000100), 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) recvmsg(r3, &(0x7f00000011c0)={&(0x7f0000000b40)=@can, 0x80, &(0x7f0000001100)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f0000000d40)=""/229, 0xe5}, {&(0x7f0000000e40)=""/128, 0x80}, {&(0x7f0000000ec0)=""/48, 0x30}, {&(0x7f0000000f00)=""/137, 0x89}, {&(0x7f0000006000)=""/4096, 0x1000}, {&(0x7f0000007000)=""/4096, 0x1000}, {&(0x7f0000001080)=""/127, 0x7f}, {&(0x7f0000008000)=""/4096, 0x1000}], 0x9, 0x0, 0x0, 0x1}, 0x2020) bpf$MAP_CREATE(0x0, &(0x7f0000001200)={0x7, 0x4, 0x0, 0x4, 0x8, 0xffffffffffffffff, 0x9}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x1000000007, 0xcf2e, 0x7e, 0x20, 0x15, r1, 0x4}, 0x2c) socketpair(0x3, 0x80e, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r4, &(0x7f0000000200)={&(0x7f0000000fc0)=@pppol2tp={0x18, 0x1, {0x0, r3, {0x2, 0x4e20, @broadcast=0xffffffff}, 0x1, 0x3, 0x0, 0x2}}, 0x80, &(0x7f0000001580)=[{&(0x7f0000001240)="95c4dcff0f017b3c1979888e50f6c20a37b4edaffb28a3b609d24a8180434ab2fac426d3e4fc87e18267002be3cd56b11d69c4db739bf6a9c91af67ee87be1ea522993a368bdfc0df55539a60ef5515b4f03f3dbddae65cd66a90f030118870b473f156cb9a18624103000608c63f84b09ea89bfb8d8e7705c6ef456ef28adec5e566632ddd63098", 0x88}, {&(0x7f0000001380)="5745869bf3b6f562576761d821af2ad55c2f81345c810d6dbd43facd33c5107488aa7f04c5ab1302b820cd31405e9f657776a0d48e2225f39aabc3de0b30dc7422503b448ad89c23ebaee24ae9696e4e58eccae5febf47fff53dc1f03d869303acdef233746263c5c567e84edb166010fd23f56d6e84406bced5a00b5016b0c700fd76218ecf5da3527552a683eb87aa4b246cd74bcbeff8dedec74332e0214e4dc64cb7ac24c4447843caa7550375ef8e1f74a78c40a617e913a25e4837d24fb09e93eaa2", 0xc5}, {&(0x7f0000001480)="8247f46d4324760570d5078149dc5b38f7d1c592564148ecc6262e91c29cd4344e423ff476882993a2844af9a7c306a15e659a4cb9230b5139842c87ad8fa95c202146730fa610b141dfe4c7b771b46e4db879d2b92a01cb8642100d80a1d4658fd0df05c06c8615960a92b690c728e2603373657a9a46b2f200f2895198694d470ab95b6eb7a76ccee67c9219b4afa289d70c87cf22c733e00700f345136d59bcbd89ce7e110746f91e7a7661b8eb0afe54e3cb1c712441dd9a6ffb59a2eb58e5f5eabd4bec428fe27a403bb0d19125e473abdfea87a0c89108e3c876438a7c3f84bebad6cf858f26d2083efd60", 0xee}], 0x3, &(0x7f000000a000)=[{0x88, 0x112, 0xc2, "6671b4b66ac2fb4e14cee671813dc3834802e601529feb049ebb70880567948953018cfd53d7b1c9be27b1084adfba62040c7f889cfbc15407d93133259d9d5052bf6648a69218702e35278939ad399dc3ebed233c1792c7c1204353c8fe75ea0398f4aaf830834bc93873c119dddc539c"}, {0xe8, 0x6f180cc1befb202, 0x9, "4577f77fd3b3acd92c96feff8b0409afeae1c16fa3d367241c9679e5105141c7205d47ce27a418c10fbe7f601c3142e7b7b3a67322c9d345e0baf4315e13dc771a962ff445015c98a70b319d46ba59155d1cf07827804ea1ca86db74f3029bd60f6f365d955ec12be30102e59b4b3940152988ef09443df596bad9525f697fad61507e856c6acb744cfb034863943e811bd378843ccbd95f8221a444f4c323a391f5788559f34ac02e6e18065b87e8c962353623250694e5b4bf9bc1b00fadf2875995067ff6c18590c207f9a83f06665f5b5af77b4e"}, {0xa0, 0x10f, 0x5, "07c5972c79a30903d5d93f57c962c0351628551f6a3fbac8e18984ad9b8caeb403f1d588fa0b9955ce44d018cbcc06ad98b588dd45fd0ccd6b8d1965e70693ec76dd521aa2693829ef54059dc3191f2f4eca64c63f2f901ead2d6c54f0119212ebb77e956117d9130d3adff30a5598567fd540cf0a8f9f8c469ad15f209ad8ef161006831b39e4ddf2fcd748a8629e33"}], 0x210, 0x40}, 0x40) close(r0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)) recvmsg(r2, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) recvmsg$kcm(r4, &(0x7f0000001a00)={0x0, 0x0, &(0x7f00000018c0)=[{&(0x7f0000001600)=""/173, 0xad}, {&(0x7f0000001040)=""/25, 0x19}, {&(0x7f00000016c0)=""/132, 0x84}, {&(0x7f0000001780)=""/91, 0x5b}, {&(0x7f0000001800)=""/183, 0xb7}], 0x5, &(0x7f0000001940)=""/163, 0xa3, 0xe43}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000a80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r5}, 0x48) 2018/03/29 11:56:25 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x1e1, 0x100000000209e20, 0x8000000001, 0x5}, 0xfffffffffffffe20) r0 = getpid() r1 = perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0xfffffffffffffffc, 0x3, 0x8, 0x2, 0x0, 0x9, 0x10000, 0xc, 0x3d3, 0x80, 0x5, 0xfffffffffffffffc, 0x8, 0x3f, 0x5d, 0xbbb0, 0x20, 0x3, 0x8000, 0x100000000, 0x8, 0x9, 0x2, 0x4, 0x800, 0xf8, 0x3, 0x9, 0x1, 0x3, 0x8, 0x3, 0x7, 0x10001, 0xf16, 0x2, 0x0, 0x7fffffff, 0x4, @perf_bp={&(0x7f0000000780), 0x1}, 0x4080, 0x10001, 0xcc, 0x7, 0x3, 0xffff, 0x7fffffff}, 0xffffffffffffffff, 0xd, 0xffffffffffffff9c, 0x8) perf_event_open(&(0x7f0000000980)={0x4, 0x70, 0x6, 0x3f, 0x8e, 0x1, 0x0, 0x3, 0x404, 0x0, 0xbc2b, 0x40, 0x7, 0xffff, 0xffff, 0x9, 0x9de2, 0x9, 0x0, 0x3, 0x7f, 0xff, 0x40, 0x400, 0x9, 0x7fffffff, 0x80000000, 0x7, 0x8, 0x10001, 0x1f, 0x2778, 0x800, 0x8001, 0x101, 0x9, 0x8, 0x7ff, 0x0, 0x1000, 0x5, @perf_config_ext={0x3ff, 0xb69b}, 0x3040, 0x2, 0x2, 0x5, 0x7, 0x6, 0x7283ed73}, r0, 0xe, r1, 0x8) bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x0, 0x0, 0x7ffff9, 0x0, 0x20000003, 0x0}, 0x2c) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) r2 = gettid() r3 = perf_event_open(&(0x7f00000008c0)={0x7, 0x70, 0x1, 0x200, 0x3, 0xdbce, 0x0, 0x8, 0x1002, 0x1, 0xffffffffffffff00, 0x8, 0x1, 0xb3fa, 0x8, 0x0, 0x1, 0x2, 0x1000, 0x2, 0x401, 0x8, 0x3, 0x81, 0x0, 0x7, 0x2fc4, 0x882, 0x4, 0x8, 0x3, 0x81, 0x3, 0x7, 0x8857, 0x7, 0x5, 0x9, 0x0, 0x7, 0x1, @perf_config_ext={0x0, 0x80000000}, 0x400, 0x7f, 0x4, 0x7, 0x2, 0x7f, 0x200}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000840)={0x5, 0x70, 0xef, 0x2, 0x1000, 0xffffffff80000000, 0x0, 0x1a7800000000, 0x2000, 0x4, 0x5, 0x6814, 0x3a9, 0x5, 0x63b, 0x6, 0x8, 0x1000, 0x250420ee, 0x3, 0x0, 0x20, 0x6, 0x0, 0x4, 0x5, 0x4, 0x8, 0x3, 0x8, 0x52893dd5, 0x2, 0x2, 0x8, 0x44d, 0x1, 0x8, 0x6, 0x0, 0x100000000, 0x0, @perf_config_ext={0x9, 0x80}, 0x0, 0x0, 0x2b67, 0x6, 0x4b0, 0x81, 0x4}, r2, 0x5, r3, 0xb) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1003, 0x0) mount(&(0x7f00002b9ff8)='./file0\x00', &(0x7f0000cbeff8)='./file0\x00', &(0x7f00005f7ffa)='ramfs\x00', 0x80000, &(0x7f000002f000)) mount(&(0x7f0000000000)='.', &(0x7f0000000040)='.', &(0x7f0000000080)='cgroup\x00', 0x5010, &(0x7f00000000c0)) mount(&(0x7f0000377ff8)='.', &(0x7f0000000280)='.', &(0x7f0000000600)='nfs4\x00', 0x5010, &(0x7f0000000300)="2161893416a0c71070768c219eb114c3253c9f3baf4e9e8e9111c1a7fc6e266009fe27243deeaa22ca7ae9341f714300b5ee807e55d609036f2a3260475922bdfb2d2849f1c3b2ad3c051bd4f3751a177f77a92758c6d2b23fe7f1535b54e5846d11c135de8286066dec1b25f6e1378944ac5f7fce42d055821b5e19") perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xd68, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f0000014f88)={0x5, 0xfffffffffffffdc4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x46000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = getpid() perf_event_open(&(0x7f0000000680)={0x4, 0x70, 0x64, 0xffff, 0x1f, 0x4, 0x0, 0x1c3, 0x0, 0x1, 0x1, 0x9, 0x1ff, 0xfffffffffffffff8, 0x0, 0x0, 0x6, 0x7fffffff, 0x4, 0xffffffff, 0x80000001, 0xd0, 0x7, 0x1f, 0x0, 0x8, 0x9, 0x1ff, 0x8, 0x785, 0x4, 0xff, 0x2, 0x656, 0x5000000, 0x1, 0x460e3be0, 0x1, 0x0, 0x0, 0x7, @perf_bp={&(0x7f0000000640), 0x1}, 0x1000, 0xa, 0x7fff, 0x7, 0x3, 0x400, 0x9}, r5, 0xe, r4, 0x1) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', 0x0, 0x10}, 0x10) close(0xffffffffffffffff) bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)={&(0x7f0000000040)='./file0\x00', 0x0, 0x18}, 0x10) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000100)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0, 0x2e, &(0x7f0000000440), &(0x7f0000000140)=""/46, 0x4229}, 0x28) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000003480)={&(0x7f0000003300)=@can={0x0, 0x0}, 0x80, &(0x7f0000003400)=[{&(0x7f0000003380)=""/56, 0x38}, {&(0x7f00000033c0)=""/1, 0x1}], 0x2, &(0x7f0000003440)=""/33, 0x21, 0x1}, 0x40010000) bpf$PROG_LOAD(0x5, &(0x7f00000034c0)={0xe, 0x6, &(0x7f0000000940)=ANY=[@ANYBLOB="1800000002000000000000004ce700002555fdff00000000002371d07c9ba7f4a23372b0ad61000000000000009500000000000000"], &(0x7f00000007c0)='GPL\x00', 0x3, 0x2d, &(0x7f0000000800)=""/45, 0x40f00, 0x1, [], r6}, 0x48) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000740)={&(0x7f0000000700)='./file0\x00'}, 0x10) socketpair$inet(0x2, 0x80a, 0x81, &(0x7f0000000240)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={0xffffffffffffffff, &(0x7f0000000500)="ae30f1bca1b4d3f69f1aac81517d42ad5980bc63b5008616a1f4724b9f8c1e4ecd8de336f57dd727cdaab04f0b40f28612615ad08de414711d841a88db33fd33884b627074213a0c5de3be2bbaec9207d9865c47f240467849979b5ab5632376608fc4be41a274abb2dc07cabe344a18db51048e5b0cbda843905a4258cdee3e649eddf104ba78894dce09747dcfe6a8d6d6d985520eeef448b83a8bcb83074541ba7a20d6094aa206c01a0690e5b3bfa05d475eb382b0199031d22bb26cde9b1ca0055eef9f6c4993b71ba19ba0590bb5efdaddaa574c25356ca890d138fc9fe0e975b6d5a1a8251503cd0a91845f9d95", &(0x7f0000000480)="9bc7741ea5e524cc8c6f748a73153834428729c45bf4ad446d2dddf1978baf431d0ba35b5442b5afe22db8b003650320200af7e1368ef7cdfa79ca8b9d3564363a5d2a502970314f2264c883bc8d990afc003e5adb95b30edad245c4420c8126f1d33db75ff0230698eaff90055e0f", 0x2}, 0x20) socketpair(0x0, 0x80003, 0xffff, &(0x7f0000000380)={0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r7, 0x50, &(0x7f00000003c0)}, 0x10) 2018/03/29 11:56:25 executing program 3: r0 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x10}, 0x10) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000000c0)={0x0, 0x1000, 0x8}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000080)='./file0\x00', r1}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0x0, 0x8}, 0x10) mount(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='cpuset\x00', 0x40, &(0x7f0000000280)="8a4562cb6a7df38be32246afcaef1e1a3f933cb428242c55c117c0fbbd62cea0aab31f2665fb88267466eca314fc8cafd72cc24143121c0691236768fad66390bf9b55014c2bd49faa5388cbabd52e730eeb4ccc411bacd296e423d971043756cf2b35a4063f2a7465b44a60ef31ae437f6160ed2f63afa62c36a27c33e4779e7c0404e337abc025bb2e4b39cc265573c6ab1a3ff09c7ad6bb4631a4") mount(&(0x7f0000000340)='./file1\x00', &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='devtmpfs\x00', 0x40, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xb, 0x7f, 0x0, 0x1, 0x12, r1, 0x100000000}, 0x2c) mkdir(&(0x7f0000000440)='./file1\x00', 0x20) mount(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='iso9660\x00', 0x8, &(0x7f0000000540)="650fe6ccea2b17860de967406c566ec16fe5a7a4c064707e22906e9d3d2a70b4") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000005c0)={r2, 0x28, &(0x7f0000000580)={0x0, 0x0}}, 0x10) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={r3, 0x8, 0x10}, 0xc) mount(&(0x7f0000000640)='./file1\x00', &(0x7f0000000680)='./file1\x00', &(0x7f00000006c0)='pstore\x00', 0x1000000, &(0x7f0000000700)="f48afa3ab3cc319f917be52b04c388c229578537782bc5ffc32c7747b1d28999ad89f5fba460640a324385ac03cccef4553d641b91d79d014804a98e72796f8eb2e1a7056efeaa63404648df67079ae817420f248ccf9d01e7a027c600c71777fb9ebc97da60f3d1a287ef8bc00f1dc68c3b1f0c1836cde5b62be45dd58c3415cbb0f916fe3c04fc69911e2bec15c208d023bdb608fa727657c532bd5101a2a36b34c4eb65f855fea2d6f8a0a79b15ecef1a4c81a8f6f5ed57b09db2ab482413540416126718f2a33ed21346ded20b084a8dc10702ec279fc486b5c57c163d") socketpair(0x3, 0x2, 0x1f, &(0x7f0000001c40)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$kcm(r6, &(0x7f0000004300)={0x0, 0x0, &(0x7f0000004140)=[{&(0x7f0000001c80)=""/139, 0x8b}, {&(0x7f0000001d40)=""/149, 0x95}, {&(0x7f0000001e00)=""/188, 0xbc}, {&(0x7f0000001ec0)=""/69, 0x45}, {&(0x7f0000001f40)=""/165, 0xa5}, {&(0x7f0000002000)=""/4096, 0x1000}, {&(0x7f0000003000)=""/42, 0x2a}, {&(0x7f0000003040)=""/4096, 0x1000}, {&(0x7f0000004040)=""/233, 0xe9}], 0x9, &(0x7f0000004200)=""/236, 0xec, 0xe00}, 0x40) mount(&(0x7f0000004340)='./file1/file0\x00', &(0x7f0000004380)='./file1\x00', &(0x7f00000043c0)='ceph\x00', 0x4860, &(0x7f0000004400)="2c8eb517dd302be26597065442d58f3f345c295b542b2b1df3046ae176") bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000004600)={r6, &(0x7f0000004440)="903685b47b9c4d5c1dffcefa6a92cd57ccdfaf1af0be272f1cb4a5b86ab9d1ef248a63f04f5d59c2cd6e6b7722f5ff866c5d353014f28baaa95bce06a787a3e085102126a0386ffd4e136d472f2cdfb7c658643d2792b7235e2ec8c782080850c20eb00014eab035d7d56c8ddd0d7fdc4c21602d480e4accea0867cc5b4172b46b8f028bd623c58544092396dbda704543cd7c93219ff7f4caf9d0c12fc32c65ddac48ba22321d2c7ef1152f0dd87ed22cb30eb2b24d381b3abaefc114ad4c08e329cfbce60e0549ca", &(0x7f0000004540)="38859653237c5c9685cf2e44e1eea64846e190b778f29b06c26c2f2b8a0800f9fc2019b05290fc5c82f612eb7f479918015eb3af93cc57f01db731e129275ce05910f66e436ef09a8fe7bf22f960eacec350a7f7e9e9a47cb163f467b6a29523346a4c61d65d2235c73095a53929d509538f640424133cfa3617b41a51aa7172460146433abbe604f2c92827fabd5d3134d36b4cecd0fd2549f3527615f9eb63dd9332021e4eff13ad6aa509db21ed98745d00cb36e547", 0x3}, 0x20) mkdir(&(0x7f0000004640)='./file1/file0\x00', 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000004680)={0x0, 0x0, 0xa6, 0x3, 0x4}, 0x2c) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000046c0)=0x7, 0x4) recvmsg$kcm(r6, &(0x7f00000058c0)={&(0x7f0000004700)=@alg, 0x80, &(0x7f0000005880)=[{&(0x7f0000004780)=""/4096, 0x1000}, {&(0x7f0000005780)=""/219, 0xdb}], 0x2, 0x0, 0x0, 0x100000001}, 0x40000000) r7 = gettid() r8 = perf_event_open(&(0x7f0000005900)={0x7, 0x70, 0x0, 0xfffffffffffffff7, 0x9, 0x4, 0x0, 0x7, 0x100, 0x8, 0x100000000, 0x8000, 0x8, 0x6, 0x0, 0x6, 0x10001, 0x9, 0x1f, 0x2, 0x1, 0x3, 0x1, 0x1f, 0x23, 0x1, 0xaa4, 0x5, 0x4, 0x200, 0x6, 0x9, 0xfffffffffffffffb, 0x3, 0x3, 0xff, 0x80000000, 0x0, 0x0, 0xffffffffffffff9d, 0x2, @perf_config_ext={0x7, 0x9}, 0x100, 0x8, 0x2, 0x6, 0x4, 0x6, 0xf71}, r7, 0x9, r6, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f00000059c0)={&(0x7f0000005980)='./file0\x00'}, 0x10) ioctl$sock_kcm_SIOCKCMATTACH(r5, 0x89e0, &(0x7f0000005a00)={r5, r0}) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000005c00)={r4, &(0x7f0000005a40)="313befc1e9ac680c4369983530ee783c4f018c38e134b4b0aebd06ede05f238850949c0f5d32ab19889f880e87e3a0fa5a43500affdcc508d56f3a4df6c159ca9cfa62124b79b4607d42738dc5e16d09ea2c6a2346fc2360feff08d9f464dfdebce2cb99d4ba8e5fc37edfba041f14e16a68192d7d8687404ee7318323520188c4e5d52e8c7ec40bd0823fb210e530c74ea842bd8bacbc48317b0b6ed12528ecd30e1af83b8049df791ff7affe91ab54", &(0x7f0000005b00)=""/243}, 0x18) mount(&(0x7f0000005c40)='./file1/file0\x00', &(0x7f0000005c80)='./file1\x00', &(0x7f0000005cc0)='btrfs\x00', 0x0, 0x0) recvmsg(r5, &(0x7f00000073c0)={&(0x7f0000005d00)=@sco, 0x80, &(0x7f0000007300)=[{&(0x7f0000005d80)=""/103, 0x67}, {&(0x7f0000005e00)=""/170, 0xaa}, {&(0x7f0000005ec0)=""/252, 0xfc}, {&(0x7f0000005fc0)=""/136, 0x88}, {&(0x7f0000006080)=""/125, 0x7d}, {&(0x7f0000006100)=""/4096, 0x1000}, {&(0x7f0000007100)=""/106, 0x6a}, {&(0x7f0000007180)=""/115, 0x73}, {&(0x7f0000007200)=""/240, 0xf0}], 0x9, 0x0, 0x0, 0x7}, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000007400)={r3, 0x10001, 0x18}, 0xc) ioctl$PERF_EVENT_IOC_REFRESH(r8, 0x2402, 0xc4c) recvmsg$kcm(r6, &(0x7f0000008880)={&(0x7f0000007440)=@l2, 0x80, &(0x7f0000008800)=[{&(0x7f00000074c0)=""/231, 0xe7}, {&(0x7f00000075c0)=""/118, 0x76}, {&(0x7f0000007640)=""/4096, 0x1000}, {&(0x7f0000008740)}, {&(0x7f0000008780)=""/32, 0x20}, {&(0x7f00000087c0)=""/53, 0x35}], 0x6}, 0x10000) 2018/03/29 11:56:25 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x1e1, 0x100000000209e20, 0x8000000001, 0x5}, 0xfffffffffffffe20) r0 = getpid() r1 = perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0xfffffffffffffffc, 0x0, 0x8, 0x2, 0x0, 0x9, 0x10000, 0xc, 0x3d3, 0x80, 0x5, 0xfffffffffffffffc, 0x8, 0x3f, 0x5d, 0xbbb0, 0x20, 0x3, 0x8000, 0x100000000, 0x8, 0x9, 0x2, 0x4, 0x800, 0xf8, 0x3, 0x9, 0x1, 0x3, 0x8, 0x3, 0x7, 0x10001, 0xf16, 0x2, 0x0, 0x7fffffff, 0x4, @perf_bp={&(0x7f0000000780), 0x1}, 0x4080, 0x10001, 0xcc, 0x7, 0x3, 0xffff, 0x7fffffff}, 0xffffffffffffffff, 0xd, 0xffffffffffffff9c, 0x8) perf_event_open(&(0x7f0000000980)={0x4, 0x70, 0x6, 0x3f, 0x8e, 0x1, 0x0, 0x3, 0x404, 0x0, 0xbc2b, 0x40, 0x7, 0xffff, 0xffff, 0x9, 0x9de2, 0x9, 0x0, 0x3, 0x7f, 0xff, 0x40, 0x400, 0x9, 0x7fffffff, 0x80000000, 0x7, 0x8, 0x10001, 0x1f, 0x2778, 0x800, 0x8001, 0x101, 0x9, 0x8, 0x7ff, 0x0, 0x1000, 0x5, @perf_config_ext={0x3ff, 0xb69b}, 0x3040, 0x2, 0x2, 0x5, 0x7, 0x6, 0x7283ed73}, r0, 0xe, r1, 0x8) bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x0, 0x0, 0x7ffff9, 0x0, 0x20000003, 0x0}, 0x2c) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) r2 = gettid() r3 = perf_event_open(&(0x7f00000008c0)={0x7, 0x70, 0x1, 0x200, 0x3, 0xdbce, 0x0, 0x8, 0x1002, 0x1, 0xffffffffffffff00, 0x8, 0x1, 0xb3fa, 0x8, 0x0, 0x1, 0x2, 0x1000, 0x2, 0x401, 0x8, 0x3, 0x81, 0x0, 0x7, 0x2fc4, 0x882, 0x4, 0x8, 0x3, 0x81, 0x3, 0x7, 0x8857, 0x7, 0x5, 0x9, 0x0, 0x7, 0x1, @perf_config_ext={0x0, 0x80000000}, 0x400, 0x7f, 0x4, 0x7, 0x2, 0x7f, 0x200}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000840)={0x5, 0x70, 0xef, 0x2, 0x1000, 0xffffffff80000000, 0x0, 0x1a7800000000, 0x2000, 0x4, 0x5, 0x6814, 0x3a9, 0x5, 0x63b, 0x6, 0x8, 0x1000, 0x250420ee, 0x3, 0x0, 0x20, 0x6, 0x0, 0x4, 0x5, 0x4, 0x8, 0x3, 0x8, 0x52893dd5, 0x2, 0x2, 0x8, 0x44d, 0x1, 0x8, 0x6, 0x0, 0x100000000, 0x0, @perf_config_ext={0x9, 0x80}, 0x0, 0x0, 0x2b67, 0x6, 0x4b0, 0x81, 0x4}, r2, 0x5, r3, 0xb) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1003, 0x0) mount(&(0x7f00002b9ff8)='./file0\x00', &(0x7f0000cbeff8)='./file0\x00', &(0x7f00005f7ffa)='ramfs\x00', 0x80000, &(0x7f000002f000)) mount(&(0x7f0000000000)='.', &(0x7f0000000040)='.', &(0x7f0000000080)='cgroup\x00', 0x5010, &(0x7f00000000c0)) mount(&(0x7f0000377ff8)='.', &(0x7f0000000280)='.', &(0x7f0000000600)='nfs4\x00', 0x5010, &(0x7f0000000300)="2161893416a0c71070768c219eb114c3253c9f3baf4e9e8e9111c1a7fc6e266009fe27243deeaa22ca7ae9341f714300b5ee807e55d609036f2a3260475922bdfb2d2849f1c3b2ad3c051bd4f3751a177f77a92758c6d2b23fe7f1535b54e5846d11c135de8286066dec1b25f6e1378944ac5f7fce42d055821b5e19") perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xd68, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f0000014f88)={0x5, 0xfffffffffffffdc4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x46000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = getpid() perf_event_open(&(0x7f0000000680)={0x4, 0x70, 0x64, 0xffff, 0x1f, 0x4, 0x0, 0x1c3, 0x0, 0x1, 0x1, 0x9, 0x1ff, 0xfffffffffffffff8, 0x0, 0x0, 0x6, 0x7fffffff, 0x0, 0xffffffff, 0x80000001, 0xd0, 0x7, 0x1f, 0x0, 0x8, 0x9, 0x1ff, 0x8, 0x785, 0x4, 0xff, 0x2, 0x656, 0x5000000, 0x1, 0x460e3be0, 0x1, 0x0, 0x0, 0x7, @perf_bp={&(0x7f0000000640), 0x1}, 0x1000, 0xa, 0x7fff, 0x7, 0x3, 0x400, 0x9}, r5, 0xe, r4, 0x1) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', 0x0, 0x10}, 0x10) close(0xffffffffffffffff) bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)={&(0x7f0000000040)='./file0\x00', 0x0, 0x18}, 0x10) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000100)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0, 0x2e, &(0x7f0000000440), &(0x7f0000000140)=""/46, 0x4229}, 0x28) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000003480)={&(0x7f0000003300)=@can={0x0, 0x0}, 0x80, &(0x7f0000003400)=[{&(0x7f0000003380)=""/56, 0x38}, {&(0x7f00000033c0)=""/1, 0x1}], 0x2, &(0x7f0000003440)=""/33, 0x21, 0x1}, 0x40010000) bpf$PROG_LOAD(0x5, &(0x7f00000034c0)={0xe, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="1800000002000000000000004ce700002555fdff00000000002371d07c9ba7f4a23372b0ad61000000000000009500000000000000"], &(0x7f00000007c0)='GPL\x00', 0x3, 0x2d, &(0x7f0000000800)=""/45, 0x40f00, 0x1, [], r6}, 0x48) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000740)={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x10) socketpair$inet(0x2, 0x80a, 0x81, &(0x7f0000000240)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={0xffffffffffffffff, &(0x7f0000000500)="ae30f1bca1b4d3f69f1aac81517d42ad5980bc63b5008616a1f4724b9f8c1e4ecd8de336f57dd727cdaab04f0b40f28612615ad08de414711d841a88db33fd33884b627074213a0c5de3be2bbaec9207d9865c47f240467849979b5ab5632376608fc4be41a274abb2dc07cabe344a18db51048e5b0cbda843905a4258cdee3e649eddf104ba78894dce09747dcfe6a8d6d6d985520eeef448b83a8bcb83074541ba7a20d6094aa206c01a0690e5b3bfa05d475eb382b0199031d22bb26cde9b1ca0055eef9f6c4993b71ba19ba0590bb5efdaddaa574c25356ca890d138fc9fe0e975b6d5a1a8251503cd0a91845f9d95", &(0x7f0000000480)="9bc7741ea5e524cc8c6f748a73153834428729c45bf4ad446d2dddf1978baf431d0ba35b5442b5afe22db8b003650320200af7e1368ef7cdfa79ca8b9d3564363a5d2a502970314f2264c883bc8d990afc003e5adb95b30edad245c4420c8126f1d33db75ff0230698eaff90055e0f", 0x2}, 0x20) socketpair(0x0, 0x80003, 0xffff, &(0x7f0000000380)={0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r7, 0x50, &(0x7f00000003c0)}, 0x10) 2018/03/29 11:56:25 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x3, &(0x7f0000002000)=@framed={{0x18}, [], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000680)={0xffffffffffffffff, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x7}, 0x28) recvmsg(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x7, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000100)=r0, 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) recvmsg(r2, &(0x7f00000011c0)={&(0x7f0000000b40)=@can, 0x80, &(0x7f0000001100)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f0000000c80)=""/169, 0xa9}, {&(0x7f0000000d40)=""/229, 0xe5}, {&(0x7f0000000e40)=""/128, 0x80}, {&(0x7f0000000ec0)=""/48, 0x30}, {&(0x7f0000000f00)=""/137, 0x89}, {&(0x7f0000006000)=""/4096, 0x1000}, {&(0x7f0000007000)=""/4096, 0x1000}, {&(0x7f0000001080)=""/127, 0x7f}, {&(0x7f0000008000)=""/4096, 0x1000}], 0xa, 0x0, 0x0, 0x1}, 0x2020) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001200)={0x7, 0x4, 0x0, 0x4, 0x8, 0xffffffffffffffff, 0x9}, 0x2c) socketpair(0x3, 0x80e, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r3, &(0x7f0000000200)={&(0x7f0000000fc0)=@pppol2tp={0x18, 0x1, {0x0, r2, {0x2, 0x4e20, @broadcast=0xffffffff}, 0x1, 0x3, 0x0, 0x2}}, 0x80, &(0x7f0000001580)=[{&(0x7f0000001240)="95c4dcff0f017b3c1979888e50f6c20a37b4edaffb28a3b609d24a8180434ab2fac426d3e4fc87e18267002be3cd56b11d69c4db739bf6a9c91af67ee87be1ea522993a368bdfc0df55539a60ef5515b4f03f3dbddae65cd66a90f030118870b473f156cb9a18624103000608c63f84b09ea89bfb8d8e7705c6ef456ef28adec5e566632ddd63098", 0x88}, {&(0x7f0000001380)="5745869bf3b6f562576761d821af2ad55c2f81345c810d6dbd43facd33c5107488aa7f04c5ab1302b820cd31405e9f657776a0d48e2225f39aabc3de0b30dc7422503b448ad89c23ebaee24ae9696e4e58eccae5febf47fff53dc1f03d869303acdef233746263c5c567e84edb166010fd23f56d6e84406bced5a00b5016b0c700fd76218ecf5da3527552a683eb87aa4b246cd74bcbeff8dedec74332e0214e4dc64cb7ac24c4447843caa7550375ef8e1f74a78c40a617e913a25e4837d24fb09e93eaa2", 0xc5}, {&(0x7f0000001480)="8247f46d4324760570d5078149dc5b38f7d1c592564148ecc6262e91c29cd4344e423ff476882993a2844af9a7c306a15e659a4cb9230b5139842c87ad8fa95c202146730fa610b141dfe4c7b771b46e4db879d2b92a01cb8642100d80a1d4658fd0df05c06c8615960a92b690c728e2603373657a9a46b2f200f2895198694d470ab95b6eb7a76ccee67c9219b4afa289d70c87cf22c733e00700f345136d59bcbd89ce7e110746f91e7a7661b8eb0afe54e3cb1c712441dd9a6ffb59a2eb58e5f5eabd4bec428fe27a403bb0d19125e473abdfea87a0c89108e3c876438a7c3f84bebad6cf858f26d2083efd60", 0xee}], 0x3, &(0x7f000000a000)=[{0x88, 0x112, 0xc2, "6671b4b66ac2fb4e14cee671813dc3834802e601529feb049ebb70880567948953018cfd53d7b1c9be27b1084adfba62040c7f889cfbc15407d93133259d9d5052bf6648a69218702e35278939ad399dc3ebed233c1792c7c1204353c8fe75ea0398f4aaf830834bc93873c119dddc539c"}, {0xe8, 0x6f180cc1befb202, 0x9, "4577f77fd3b3acd92c96feff8b0409afeae1c16fa3d367241c9679e5105141c7205d47ce27a418c10fbe7f601c3142e7b7b3a67322c9d345e0baf4315e13dc771a962ff445015c98a70b319d46ba59155d1cf07827804ea1ca86db74f3029bd60f6f365d955ec12be30102e59b4b3940152988ef09443df596bad9525f697fad61507e856c6acb744cfb034863943e811bd378843ccbd95f8221a444f4c323a391f5788559f34ac02e6e18065b87e8c962353623250694e5b4bf9bc1b00fadf2875995067ff6c18590c207f9a83f06665f5b5af77b4e"}, {0xa0, 0x10f, 0x5, "07c5972c79a30903d5d93f57c962c0351628551f6a3fbac8e18984ad9b8caeb403f1d588fa0b9955ce44d018cbcc06ad98b588dd45fd0ccd6b8d1965e70693ec76dd521aa2693829ef54059dc3191f2f4eca64c63f2f901ead2d6c54f0119212ebb77e956117d9130d3adff30a5598567fd540cf0a8f9f8c469ad15f209ad8ef161006831b39e4ddf2fcd748a8629e33"}], 0x210, 0x40}, 0x40) close(r0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)) recvmsg(r1, &(0x7f00000267c0)={&(0x7f00000251c0)=@can, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) 2018/03/29 11:56:25 executing program 4 (fault-call:8 fault-nth:59): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x3, &(0x7f0000002000)=@framed={{0x18}, [], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000680)={0xffffffffffffffff, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x7}, 0x28) recvmsg(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000001c0)) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000100)=r0, 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) recvmsg(r3, &(0x7f00000011c0)={&(0x7f0000000b40)=@can, 0x80, &(0x7f0000001100)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f0000000c80)=""/169, 0xa9}, {&(0x7f0000000d40)=""/229, 0xe5}, {&(0x7f0000000e40)=""/128, 0x80}, {&(0x7f0000000ec0)=""/48, 0x30}, {&(0x7f0000000f00)=""/137, 0x89}, {&(0x7f0000006000)=""/4096, 0x1000}, {&(0x7f0000007000)=""/4096, 0x1000}, {&(0x7f0000001080)=""/127, 0x7f}, {&(0x7f0000008000)=""/4096, 0x1000}], 0xa, 0x0, 0x0, 0x1}, 0x2020) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001200)={0x7, 0x4, 0x0, 0x4, 0x8, 0xffffffffffffffff, 0x9}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x1000000007, 0xcf2e, 0x7e, 0x20, 0x15, r1, 0x4}, 0x2c) socketpair(0x3, 0x80e, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r4, &(0x7f0000000200)={&(0x7f0000000fc0)=@pppol2tp={0x18, 0x1, {0x0, r3, {0x2, 0x4e20, @broadcast=0xffffffff}, 0x1, 0x3, 0x0, 0x2}}, 0x80, &(0x7f0000001580)=[{&(0x7f0000001240)="95c4dcff0f017b3c1979888e50f6c20a37b4edaffb28a3b609d24a8180434ab2fac426d3e4fc87e18267002be3cd56b11d69c4db739bf6a9c91af67ee87be1ea522993a368bdfc0df55539a60ef5515b4f03f3dbddae65cd66a90f030118870b473f156cb9a18624103000608c63f84b09ea89bfb8d8e7705c6ef456ef28adec5e566632ddd63098", 0x88}, {&(0x7f0000001380)="5745869bf3b6f562576761d821af2ad55c2f81345c810d6dbd43facd33c5107488aa7f04c5ab1302b820cd31405e9f657776a0d48e2225f39aabc3de0b30dc7422503b448ad89c23ebaee24ae9696e4e58eccae5febf47fff53dc1f03d869303acdef233746263c5c567e84edb166010fd23f56d6e84406bced5a00b5016b0c700fd76218ecf5da3527552a683eb87aa4b246cd74bcbeff8dedec74332e0214e4dc64cb7ac24c4447843caa7550375ef8e1f74a78c40a617e913a25e4837d24fb09e93eaa2", 0xc5}, {&(0x7f0000001480)="8247f46d4324760570d5078149dc5b38f7d1c592564148ecc6262e91c29cd4344e423ff476882993a2844af9a7c306a15e659a4cb9230b5139842c87ad8fa95c202146730fa610b141dfe4c7b771b46e4db879d2b92a01cb8642100d80a1d4658fd0df05c06c8615960a92b690c728e2603373657a9a46b2f200f2895198694d470ab95b6eb7a76ccee67c9219b4afa289d70c87cf22c733e00700f345136d59bcbd89ce7e110746f91e7a7661b8eb0afe54e3cb1c712441dd9a6ffb59a2eb58e5f5eabd4bec428fe27a403bb0d19125e473abdfea87a0c89108e3c876438a7c3f84bebad6cf858f26d2083efd60", 0xee}], 0x3, &(0x7f000000a000)=[{0x88, 0x112, 0xc2, "6671b4b66ac2fb4e14cee671813dc3834802e601529feb049ebb70880567948953018cfd53d7b1c9be27b1084adfba62040c7f889cfbc15407d93133259d9d5052bf6648a69218702e35278939ad399dc3ebed233c1792c7c1204353c8fe75ea0398f4aaf830834bc93873c119dddc539c"}, {0xe8, 0x6f180cc1befb202, 0x9, "4577f77fd3b3acd92c96feff8b0409afeae1c16fa3d367241c9679e5105141c7205d47ce27a418c10fbe7f601c3142e7b7b3a67322c9d345e0baf4315e13dc771a962ff445015c98a70b319d46ba59155d1cf07827804ea1ca86db74f3029bd60f6f365d955ec12be30102e59b4b3940152988ef09443df596bad9525f697fad61507e856c6acb744cfb034863943e811bd378843ccbd95f8221a444f4c323a391f5788559f34ac02e6e18065b87e8c962353623250694e5b4bf9bc1b00fadf2875995067ff6c18590c207f9a83f06665f5b5af77b4e"}, {0xa0, 0x10f, 0x5, "07c5972c79a30903d5d93f57c962c0351628551f6a3fbac8e18984ad9b8caeb403f1d588fa0b9955ce44d018cbcc06ad98b588dd45fd0ccd6b8d1965e70693ec76dd521aa2693829ef54059dc3191f2f4eca64c63f2f901ead2d6c54f0119212ebb77e956117d9130d3adff30a5598567fd540cf0a8f9f8c469ad15f209ad8ef161006831b39e4ddf2fcd748a8629e33"}], 0x210, 0x40}, 0x40) close(r0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b53596090ebcc07d8584f358be88fafe") recvmsg(r2, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) recvmsg$kcm(r4, &(0x7f0000001a00)={0x0, 0x0, &(0x7f00000018c0)=[{&(0x7f0000001600)=""/173, 0xad}, {&(0x7f0000001040)=""/25, 0x19}, {&(0x7f00000016c0)=""/132, 0x84}, {&(0x7f0000001780)=""/91, 0x5b}, {&(0x7f0000001800)=""/183, 0xb7}], 0x5, &(0x7f0000001940)=""/163, 0xa3, 0xe43}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000a80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r5}, 0x48) 2018/03/29 11:56:25 executing program 6: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x3, &(0x7f0000002000)=@framed={{0x18}, [], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000680)={0xffffffffffffffff, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x7}, 0x28) recvmsg(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000001c0)) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000100)=r0, 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) recvmsg(r3, &(0x7f00000011c0)={&(0x7f0000000b40)=@can, 0x80, &(0x7f0000001100)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f0000000c80)=""/169, 0xa9}, {&(0x7f0000000d40)=""/229, 0xe5}, {&(0x7f0000000e40)=""/128, 0x80}, {&(0x7f0000000ec0)=""/48, 0x30}, {&(0x7f0000000f00)=""/137, 0x89}, {&(0x7f0000006000)=""/4096, 0x1000}, {&(0x7f0000007000)=""/4096, 0x1000}, {&(0x7f0000001080)=""/127, 0x7f}], 0x9}, 0x2020) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001200)={0x7, 0x4, 0x0, 0x4, 0x8, 0xffffffffffffffff, 0x9}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x1000000007, 0xcf2e, 0x7e, 0x20, 0x15, r1, 0x4}, 0x2c) socketpair(0x3, 0x80e, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r4, &(0x7f0000000200)={&(0x7f0000000fc0)=@pppol2tp={0x18, 0x1, {0x0, r3, {0x2, 0x4e20, @broadcast=0xffffffff}, 0x1, 0x3, 0x0, 0x2}}, 0x80, &(0x7f0000001580)=[{&(0x7f0000001240)="95c4dcff0f017b3c1979888e50f6c20a37b4edaffb28a3b609d24a8180434ab2fac426d3e4fc87e18267002be3cd56b11d69c4db739bf6a9c91af67ee87be1ea522993a368bdfc0df55539a60ef5515b4f03f3dbddae65cd66a90f030118870b473f156cb9a18624103000608c63f84b09ea89bfb8d8e7705c6ef456ef28adec5e566632ddd63098", 0x88}, {&(0x7f0000001380)="5745869bf3b6f562576761d821af2ad55c2f81345c810d6dbd43facd33c5107488aa7f04c5ab1302b820cd31405e9f657776a0d48e2225f39aabc3de0b30dc7422503b448ad89c23ebaee24ae9696e4e58eccae5febf47fff53dc1f03d869303acdef233746263c5c567e84edb166010fd23f56d6e84406bced5a00b5016b0c700fd76218ecf5da3527552a683eb87aa4b246cd74bcbeff8dedec74332e0214e4dc64cb7ac24c4447843caa7550375ef8e1f74a78c40a617e913a25e4837d24fb09e93eaa2", 0xc5}, {&(0x7f0000001480)="8247f46d4324760570d5078149dc5b38f7d1c592564148ecc6262e91c29cd4344e423ff476882993a2844af9a7c306a15e659a4cb9230b5139842c87ad8fa95c202146730fa610b141dfe4c7b771b46e4db879d2b92a01cb8642100d80a1d4658fd0df05c06c8615960a92b690c728e2603373657a9a46b2f200f2895198694d470ab95b6eb7a76ccee67c9219b4afa289d70c87cf22c733e00700f345136d59bcbd89ce7e110746f91e7a7661b8eb0afe54e3cb1c712441dd9a6ffb59a2eb58e5f5eabd4bec428fe27a403bb0d19125e473abdfea87a0c89108e3c876438a7c3f84bebad6cf858f26d2083efd60", 0xee}], 0x3, &(0x7f000000a000)=[{0x88, 0x112, 0xc2, "6671b4b66ac2fb4e14cee671813dc3834802e601529feb049ebb70880567948953018cfd53d7b1c9be27b1084adfba62040c7f889cfbc15407d93133259d9d5052bf6648a69218702e35278939ad399dc3ebed233c1792c7c1204353c8fe75ea0398f4aaf830834bc93873c119dddc539c"}, {0xe8, 0x6f180cc1befb202, 0x9, "4577f77fd3b3acd92c96feff8b0409afeae1c16fa3d367241c9679e5105141c7205d47ce27a418c10fbe7f601c3142e7b7b3a67322c9d345e0baf4315e13dc771a962ff445015c98a70b319d46ba59155d1cf07827804ea1ca86db74f3029bd60f6f365d955ec12be30102e59b4b3940152988ef09443df596bad9525f697fad61507e856c6acb744cfb034863943e811bd378843ccbd95f8221a444f4c323a391f5788559f34ac02e6e18065b87e8c962353623250694e5b4bf9bc1b00fadf2875995067ff6c18590c207f9a83f06665f5b5af77b4e"}, {0xa0, 0x10f, 0x5, "07c5972c79a30903d5d93f57c962c0351628551f6a3fbac8e18984ad9b8caeb403f1d588fa0b9955ce44d018cbcc06ad98b588dd45fd0ccd6b8d1965e70693ec76dd521aa2693829ef54059dc3191f2f4eca64c63f2f901ead2d6c54f0119212ebb77e956117d9130d3adff30a5598567fd540cf0a8f9f8c469ad15f209ad8ef161006831b39e4ddf2fcd748a8629e33"}], 0x210, 0x40}, 0x40) close(r0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)) recvmsg(r2, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) recvmsg$kcm(r4, &(0x7f0000001a00)={0x0, 0x0, &(0x7f00000018c0)=[{&(0x7f0000001600)=""/173, 0xad}, {&(0x7f0000001040)=""/25, 0x19}, {&(0x7f00000016c0)=""/132, 0x84}, {&(0x7f0000001780)=""/91, 0x5b}, {&(0x7f0000001800)=""/183, 0xb7}], 0x5, &(0x7f0000001940)=""/163, 0xa3, 0xe43}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000a80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r5}, 0x48) [ 831.180656] RAX: ffffffffffffffda RBX: 00007f917abd66d4 RCX: 00000000004548b9 [ 831.187898] RDX: 00000000200002c0 RSI: 0000000020000140 RDI: 0000000020000300 [ 831.195141] RBP: 000000000072bea0 R08: 0000000020000200 R09: 0000000000000000 [ 831.202385] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 831.209630] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000003a [ 831.217121] net/sunrpc/rpc_pipe.c: __rpc_create_common failed to allocate inode for dentry clntXX [ 831.226365] net/sunrpc/rpc_pipe.c: rpc_populate failed to populate directory gssd 2018/03/29 11:56:25 executing program 4 (fault-call:8 fault-nth:60): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x3, &(0x7f0000002000)=@framed={{0x18}, [], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000680)={0xffffffffffffffff, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x7}, 0x28) recvmsg(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000001c0)) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000100)=r0, 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) recvmsg(r3, &(0x7f00000011c0)={&(0x7f0000000b40)=@can, 0x80, &(0x7f0000001100)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f0000000c80)=""/169, 0xa9}, {&(0x7f0000000d40)=""/229, 0xe5}, {&(0x7f0000000e40)=""/128, 0x80}, {&(0x7f0000000ec0)=""/48, 0x30}, {&(0x7f0000000f00)=""/137, 0x89}, {&(0x7f0000006000)=""/4096, 0x1000}, {&(0x7f0000007000)=""/4096, 0x1000}, {&(0x7f0000001080)=""/127, 0x7f}, {&(0x7f0000008000)=""/4096, 0x1000}], 0xa, 0x0, 0x0, 0x1}, 0x2020) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001200)={0x7, 0x4, 0x0, 0x4, 0x8, 0xffffffffffffffff, 0x9}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x1000000007, 0xcf2e, 0x7e, 0x20, 0x15, r1, 0x4}, 0x2c) socketpair(0x3, 0x80e, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r4, &(0x7f0000000200)={&(0x7f0000000fc0)=@pppol2tp={0x18, 0x1, {0x0, r3, {0x2, 0x4e20, @broadcast=0xffffffff}, 0x1, 0x3, 0x0, 0x2}}, 0x80, &(0x7f0000001580)=[{&(0x7f0000001240)="95c4dcff0f017b3c1979888e50f6c20a37b4edaffb28a3b609d24a8180434ab2fac426d3e4fc87e18267002be3cd56b11d69c4db739bf6a9c91af67ee87be1ea522993a368bdfc0df55539a60ef5515b4f03f3dbddae65cd66a90f030118870b473f156cb9a18624103000608c63f84b09ea89bfb8d8e7705c6ef456ef28adec5e566632ddd63098", 0x88}, {&(0x7f0000001380)="5745869bf3b6f562576761d821af2ad55c2f81345c810d6dbd43facd33c5107488aa7f04c5ab1302b820cd31405e9f657776a0d48e2225f39aabc3de0b30dc7422503b448ad89c23ebaee24ae9696e4e58eccae5febf47fff53dc1f03d869303acdef233746263c5c567e84edb166010fd23f56d6e84406bced5a00b5016b0c700fd76218ecf5da3527552a683eb87aa4b246cd74bcbeff8dedec74332e0214e4dc64cb7ac24c4447843caa7550375ef8e1f74a78c40a617e913a25e4837d24fb09e93eaa2", 0xc5}, {&(0x7f0000001480)="8247f46d4324760570d5078149dc5b38f7d1c592564148ecc6262e91c29cd4344e423ff476882993a2844af9a7c306a15e659a4cb9230b5139842c87ad8fa95c202146730fa610b141dfe4c7b771b46e4db879d2b92a01cb8642100d80a1d4658fd0df05c06c8615960a92b690c728e2603373657a9a46b2f200f2895198694d470ab95b6eb7a76ccee67c9219b4afa289d70c87cf22c733e00700f345136d59bcbd89ce7e110746f91e7a7661b8eb0afe54e3cb1c712441dd9a6ffb59a2eb58e5f5eabd4bec428fe27a403bb0d19125e473abdfea87a0c89108e3c876438a7c3f84bebad6cf858f26d2083efd60", 0xee}], 0x3, &(0x7f000000a000)=[{0x88, 0x112, 0xc2, "6671b4b66ac2fb4e14cee671813dc3834802e601529feb049ebb70880567948953018cfd53d7b1c9be27b1084adfba62040c7f889cfbc15407d93133259d9d5052bf6648a69218702e35278939ad399dc3ebed233c1792c7c1204353c8fe75ea0398f4aaf830834bc93873c119dddc539c"}, {0xe8, 0x6f180cc1befb202, 0x9, "4577f77fd3b3acd92c96feff8b0409afeae1c16fa3d367241c9679e5105141c7205d47ce27a418c10fbe7f601c3142e7b7b3a67322c9d345e0baf4315e13dc771a962ff445015c98a70b319d46ba59155d1cf07827804ea1ca86db74f3029bd60f6f365d955ec12be30102e59b4b3940152988ef09443df596bad9525f697fad61507e856c6acb744cfb034863943e811bd378843ccbd95f8221a444f4c323a391f5788559f34ac02e6e18065b87e8c962353623250694e5b4bf9bc1b00fadf2875995067ff6c18590c207f9a83f06665f5b5af77b4e"}, {0xa0, 0x10f, 0x5, "07c5972c79a30903d5d93f57c962c0351628551f6a3fbac8e18984ad9b8caeb403f1d588fa0b9955ce44d018cbcc06ad98b588dd45fd0ccd6b8d1965e70693ec76dd521aa2693829ef54059dc3191f2f4eca64c63f2f901ead2d6c54f0119212ebb77e956117d9130d3adff30a5598567fd540cf0a8f9f8c469ad15f209ad8ef161006831b39e4ddf2fcd748a8629e33"}], 0x210, 0x40}, 0x40) close(r0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b53596090ebcc07d8584f358be88fafe") recvmsg(r2, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) recvmsg$kcm(r4, &(0x7f0000001a00)={0x0, 0x0, &(0x7f00000018c0)=[{&(0x7f0000001600)=""/173, 0xad}, {&(0x7f0000001040)=""/25, 0x19}, {&(0x7f00000016c0)=""/132, 0x84}, {&(0x7f0000001780)=""/91, 0x5b}, {&(0x7f0000001800)=""/183, 0xb7}], 0x5, &(0x7f0000001940)=""/163, 0xa3, 0xe43}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000a80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r5}, 0x48) 2018/03/29 11:56:25 executing program 0: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000001a00)) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000001a40)={0xffffffffffffffff}) recvmsg$kcm(r1, &(0x7f0000000540)={&(0x7f00000000c0)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @broadcast}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000240)=""/65, 0x41}], 0x1, &(0x7f0000000440)=""/213, 0xd5}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x8983, &(0x7f0000000040)) socketpair(0x11, 0x0, 0x1, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x3ff, 0x6, 0x6, 0x16, r2, 0xfffffffffffffffd}, 0x2c) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000080)) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000019c0)={0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000000140)="0253eea6a53cc0eae389e9a13e5f2046d0633eebde90f446c1b1eabbd0adb42dfcefb37a3df93feb3d5e76dc353ecf23fe9c81afa5", 0x35}, {&(0x7f00000002c0)}, {&(0x7f0000000400)}, {&(0x7f0000001600)}], 0x4, &(0x7f0000001700)=[{0x68, 0x107, 0x25047dc1, "755cd1e9e23de47cb15819d813deb534cee2d9497c58eba5bd8a228407fb709d70f16afa73f4924f12ecc429b6fd356748940b62ee5f5685ce027fe4e6c60a8f88cd1a5827d099f5849f09bd37f681e29814e6bb"}, {0x10, 0x0, 0x1ff}, {0x10, 0x107, 0x80000001}], 0x88}, 0x48800) 2018/03/29 11:56:25 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x1e1, 0x100000000209e20, 0x8000000001, 0x5}, 0xfffffffffffffe20) r0 = getpid() r1 = perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0xfffffffffffffffc, 0x0, 0x8, 0x2, 0x0, 0x9, 0x10000, 0xc, 0x3d3, 0x80, 0x5, 0xfffffffffffffffc, 0x8, 0x3f, 0x5d, 0xbbb0, 0x20, 0x3, 0x8000, 0x100000000, 0x8, 0x9, 0x2, 0x4, 0x800, 0xf8, 0x3, 0x9, 0x1, 0x3, 0x8, 0x3, 0x7, 0x10001, 0xf16, 0x2, 0x0, 0x7fffffff, 0x4, @perf_bp={&(0x7f0000000780), 0x1}, 0x4080, 0x10001, 0xcc, 0x7, 0x3, 0xffff, 0x7fffffff}, 0xffffffffffffffff, 0xd, 0xffffffffffffff9c, 0x8) perf_event_open(&(0x7f0000000980)={0x4, 0x70, 0x6, 0x3f, 0x8e, 0x1, 0x0, 0x3, 0x404, 0x0, 0xbc2b, 0x40, 0x7, 0xffff, 0xffff, 0x9, 0x9de2, 0x9, 0x0, 0x3, 0x7f, 0xff, 0x40, 0x400, 0x9, 0x7fffffff, 0x80000000, 0x7, 0x8, 0x10001, 0x1f, 0x2778, 0x800, 0x8001, 0x101, 0x9, 0x8, 0x7ff, 0x0, 0x1000, 0x5, @perf_config_ext={0x3ff, 0xb69b}, 0x3040, 0x2, 0x2, 0x5, 0x7, 0x6, 0x7283ed73}, r0, 0xe, r1, 0x8) bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x0, 0x0, 0x7ffff9, 0x0, 0x20000003, 0x0}, 0x2c) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) r2 = gettid() r3 = perf_event_open(&(0x7f00000008c0)={0x7, 0x70, 0x1, 0x200, 0x3, 0xdbce, 0x0, 0x8, 0x1002, 0x1, 0xffffffffffffff00, 0x8, 0x1, 0xb3fa, 0x8, 0x0, 0x1, 0x2, 0x1000, 0x2, 0x401, 0x8, 0x3, 0x81, 0x0, 0x7, 0x2fc4, 0x882, 0x4, 0x8, 0x3, 0x81, 0x3, 0x7, 0x8857, 0x7, 0x5, 0x9, 0x0, 0x7, 0x1, @perf_config_ext={0x0, 0x80000000}, 0x400, 0x7f, 0x4, 0x7, 0x2, 0x7f, 0x200}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000840)={0x5, 0x70, 0xef, 0x2, 0x1000, 0xffffffff80000000, 0x0, 0x1a7800000000, 0x2000, 0x4, 0x5, 0x6814, 0x3a9, 0x5, 0x63b, 0x6, 0x8, 0x1000, 0x250420ee, 0x3, 0x0, 0x20, 0x6, 0x0, 0x4, 0x5, 0x4, 0x8, 0x3, 0x8, 0x52893dd5, 0x2, 0x2, 0x8, 0x44d, 0x1, 0x8, 0x6, 0x0, 0x100000000, 0x0, @perf_config_ext={0x9, 0x80}, 0x0, 0x0, 0x2b67, 0x6, 0x4b0, 0x81, 0x4}, r2, 0x5, r3, 0xb) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1003, 0x0) mount(&(0x7f00002b9ff8)='./file0\x00', &(0x7f0000cbeff8)='./file0\x00', &(0x7f00005f7ffa)='ramfs\x00', 0x80000, &(0x7f000002f000)) mount(&(0x7f0000000000)='.', &(0x7f0000000040)='.', &(0x7f0000000080)='cgroup\x00', 0x5010, &(0x7f00000000c0)) mount(&(0x7f0000377ff8)='.', &(0x7f0000000280)='.', &(0x7f0000000600)='nfs4\x00', 0x5010, &(0x7f0000000300)="2161893416a0c71070768c219eb114c3253c9f3baf4e9e8e9111c1a7fc6e266009fe27243deeaa22ca7ae9341f714300b5ee807e55d609036f2a3260475922bdfb2d2849f1c3b2ad3c051bd4f3751a177f77a92758c6d2b23fe7f1535b54e5846d11c135de8286066dec1b25f6e1378944ac5f7fce42d055821b5e19") perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xd68, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f0000014f88)={0x5, 0xfffffffffffffdc4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x46000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = getpid() perf_event_open(&(0x7f0000000680)={0x4, 0x70, 0x64, 0xffff, 0x1f, 0x4, 0x0, 0x1c3, 0x0, 0x1, 0x1, 0x9, 0x1ff, 0xfffffffffffffff8, 0x0, 0x0, 0x6, 0x7fffffff, 0x0, 0xffffffff, 0x80000001, 0xd0, 0x7, 0x1f, 0x0, 0x8, 0x9, 0x1ff, 0x8, 0x785, 0x4, 0xff, 0x2, 0x656, 0x5000000, 0x1, 0x460e3be0, 0x1, 0x0, 0x0, 0x7, @perf_bp={&(0x7f0000000640), 0x1}, 0x1000, 0xa, 0x7fff, 0x7, 0x3, 0x400, 0x9}, r5, 0xe, r4, 0x1) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', 0x0, 0x10}, 0x10) close(0xffffffffffffffff) bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)={&(0x7f0000000040)='./file0\x00', 0x0, 0x18}, 0x10) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000100)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0, 0x2e, &(0x7f0000000440), &(0x7f0000000140)=""/46, 0x4229}, 0x28) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000003480)={&(0x7f0000003300)=@can={0x0, 0x0}, 0x80, &(0x7f0000003400)=[{&(0x7f0000003380)=""/56, 0x38}, {&(0x7f00000033c0)=""/1, 0x1}], 0x2, &(0x7f0000003440)=""/33, 0x21, 0x1}, 0x40010000) bpf$PROG_LOAD(0x5, &(0x7f00000034c0)={0xe, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="1800000002000000000000004ce700002555fdff00000000002371d07c9ba7f4a23372b0ad61000000000000009500000000000000"], &(0x7f00000007c0)='GPL\x00', 0x3, 0x2d, &(0x7f0000000800)=""/45, 0x40f00, 0x1, [], r6}, 0x48) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000740)={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x10) socketpair$inet(0x2, 0x80a, 0x81, &(0x7f0000000240)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={0xffffffffffffffff, &(0x7f0000000500)="ae30f1bca1b4d3f69f1aac81517d42ad5980bc63b5008616a1f4724b9f8c1e4ecd8de336f57dd727cdaab04f0b40f28612615ad08de414711d841a88db33fd33884b627074213a0c5de3be2bbaec9207d9865c47f240467849979b5ab5632376608fc4be41a274abb2dc07cabe344a18db51048e5b0cbda843905a4258cdee3e649eddf104ba78894dce09747dcfe6a8d6d6d985520eeef448b83a8bcb83074541ba7a20d6094aa206c01a0690e5b3bfa05d475eb382b0199031d22bb26cde9b1ca0055eef9f6c4993b71ba19ba0590bb5efdaddaa574c25356ca890d138fc9fe0e975b6d5a1a8251503cd0a91845f9d95", &(0x7f0000000480)="9bc7741ea5e524cc8c6f748a73153834428729c45bf4ad446d2dddf1978baf431d0ba35b5442b5afe22db8b003650320200af7e1368ef7cdfa79ca8b9d3564363a5d2a502970314f2264c883bc8d990afc003e5adb95b30edad245c4420c8126f1d33db75ff0230698eaff90055e0f", 0x2}, 0x20) socketpair(0x0, 0x80003, 0xffff, &(0x7f0000000380)={0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r7, 0x50, &(0x7f00000003c0)}, 0x10) 2018/03/29 11:56:25 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x1e1, 0x100000000209e20, 0x8000000001, 0x5}, 0xfffffffffffffe20) r0 = getpid() r1 = perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0xfffffffffffffffc, 0x3, 0x8, 0x2, 0x0, 0x9, 0x10000, 0xc, 0x3d3, 0x80, 0x5, 0xfffffffffffffffc, 0x8, 0x3f, 0x5d, 0xbbb0, 0x20, 0x3, 0x8000, 0x100000000, 0x8, 0x9, 0x2, 0x4, 0x800, 0xf8, 0x3, 0x9, 0x1, 0x3, 0x8, 0x3, 0x7, 0x10001, 0xf16, 0x2, 0x0, 0x7fffffff, 0x4, @perf_bp={&(0x7f0000000780), 0x1}, 0x4080, 0x10001, 0xcc, 0x7, 0x3, 0xffff, 0x7fffffff}, 0xffffffffffffffff, 0xd, 0xffffffffffffff9c, 0x8) perf_event_open(&(0x7f0000000980)={0x4, 0x70, 0x6, 0x3f, 0x8e, 0x1, 0x0, 0x3, 0x404, 0x0, 0xbc2b, 0x40, 0x7, 0xffff, 0xffff, 0x9, 0x9de2, 0x9, 0x0, 0x3, 0x7f, 0xff, 0x40, 0x400, 0x9, 0x7fffffff, 0x80000000, 0x7, 0x8, 0x10001, 0x1f, 0x2778, 0x800, 0x8001, 0x101, 0x9, 0x8, 0x7ff, 0x0, 0x1000, 0x5, @perf_config_ext={0x3ff, 0xb69b}, 0x3040, 0x2, 0x2, 0x5, 0x7, 0x6, 0x7283ed73}, r0, 0xe, r1, 0x8) bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x0, 0x0, 0x7ffff9, 0x0, 0x20000003, 0x0}, 0x2c) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) r2 = gettid() r3 = perf_event_open(&(0x7f00000008c0)={0x7, 0x70, 0x1, 0x200, 0x3, 0xdbce, 0x0, 0x8, 0x1002, 0x1, 0xffffffffffffff00, 0x8, 0x1, 0xb3fa, 0x8, 0x0, 0x1, 0x2, 0x1000, 0x2, 0x401, 0x8, 0x3, 0x81, 0x0, 0x7, 0x2fc4, 0x882, 0x4, 0x8, 0x3, 0x81, 0x3, 0x7, 0x8857, 0x7, 0x5, 0x9, 0x0, 0x7, 0x1, @perf_config_ext={0x0, 0x80000000}, 0x400, 0x7f, 0x4, 0x7, 0x2, 0x7f, 0x200}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000840)={0x5, 0x70, 0xef, 0x2, 0x1000, 0xffffffff80000000, 0x0, 0x1a7800000000, 0x2000, 0x4, 0x5, 0x6814, 0x3a9, 0x5, 0x63b, 0x6, 0x8, 0x1000, 0x250420ee, 0x3, 0x0, 0x20, 0x6, 0x0, 0x4, 0x5, 0x4, 0x8, 0x3, 0x8, 0x52893dd5, 0x2, 0x2, 0x8, 0x44d, 0x1, 0x8, 0x6, 0x0, 0x100000000, 0x0, @perf_config_ext={0x9, 0x80}, 0x0, 0x0, 0x2b67, 0x6, 0x4b0, 0x81, 0x4}, r2, 0x5, r3, 0xb) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1003, 0x0) mount(&(0x7f00002b9ff8)='./file0\x00', &(0x7f0000cbeff8)='./file0\x00', &(0x7f00005f7ffa)='ramfs\x00', 0x80000, &(0x7f000002f000)) mount(&(0x7f0000000000)='.', &(0x7f0000000040)='.', &(0x7f0000000080)='cgroup\x00', 0x5010, &(0x7f00000000c0)) mount(&(0x7f0000377ff8)='.', &(0x7f0000000280)='.', &(0x7f0000000600)='nfs4\x00', 0x5010, &(0x7f0000000300)="2161893416a0c71070768c219eb114c3253c9f3baf4e9e8e9111c1a7fc6e266009fe27243deeaa22ca7ae9341f714300b5ee807e55d609036f2a3260475922bdfb2d2849f1c3b2ad3c051bd4f3751a177f77a92758c6d2b23fe7f1535b54e5846d11c135de8286066dec1b25f6e1378944ac5f7fce42d055821b5e19") perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xd68, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f0000014f88)={0x5, 0xfffffffffffffdc4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x46000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = getpid() perf_event_open(&(0x7f0000000680)={0x4, 0x70, 0x64, 0xffff, 0x1f, 0x4, 0x0, 0x1c3, 0x0, 0x1, 0x1, 0x9, 0x1ff, 0xfffffffffffffff8, 0x0, 0x0, 0x6, 0x7fffffff, 0x4, 0xffffffff, 0x80000001, 0xd0, 0x7, 0x1f, 0x0, 0x8, 0x9, 0x1ff, 0x8, 0x785, 0x4, 0xff, 0x2, 0x656, 0x5000000, 0x1, 0x460e3be0, 0x1, 0x0, 0x0, 0x7, @perf_bp={&(0x7f0000000640), 0x1}, 0x1000, 0xa, 0x7fff, 0x7, 0x3, 0x400, 0x9}, r5, 0xe, r4, 0x1) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', 0x0, 0x10}, 0x10) close(0xffffffffffffffff) bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)={&(0x7f0000000040)='./file0\x00', 0x0, 0x18}, 0x10) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000100)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0, 0x2e, &(0x7f0000000440), &(0x7f0000000140)=""/46, 0x4229}, 0x28) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000003480)={&(0x7f0000003300)=@can={0x0, 0x0}, 0x80, &(0x7f0000003400)=[{&(0x7f0000003380)=""/56, 0x38}, {&(0x7f00000033c0)=""/1, 0x1}], 0x2, &(0x7f0000003440)=""/33, 0x21, 0x1}, 0x40010000) bpf$PROG_LOAD(0x5, &(0x7f00000034c0)={0xe, 0x6, &(0x7f0000000940)=ANY=[@ANYBLOB="1800000002000000000000004ce700002555fdff00000000002371d07c9ba7f4a23372b0ad61000000000000009500000000000000"], &(0x7f00000007c0)='GPL\x00', 0x3, 0x2d, &(0x7f0000000800)=""/45, 0x40f00, 0x1, [], r6}, 0x48) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000740)={&(0x7f0000000700)='./file0\x00'}, 0x10) socketpair$inet(0x2, 0x80a, 0x81, &(0x7f0000000240)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={0xffffffffffffffff, &(0x7f0000000500)="ae30f1bca1b4d3f69f1aac81517d42ad5980bc63b5008616a1f4724b9f8c1e4ecd8de336f57dd727cdaab04f0b40f28612615ad08de414711d841a88db33fd33884b627074213a0c5de3be2bbaec9207d9865c47f240467849979b5ab5632376608fc4be41a274abb2dc07cabe344a18db51048e5b0cbda843905a4258cdee3e649eddf104ba78894dce09747dcfe6a8d6d6d985520eeef448b83a8bcb83074541ba7a20d6094aa206c01a0690e5b3bfa05d475eb382b0199031d22bb26cde9b1ca0055eef9f6c4993b71ba19ba0590bb5efdaddaa574c25356ca890d138fc9fe0e975b6d5a1a8251503cd0a91845f9d95", &(0x7f0000000480)="9bc7741ea5e524cc8c6f748a73153834428729c45bf4ad446d2dddf1978baf431d0ba35b5442b5afe22db8b003650320200af7e1368ef7cdfa79ca8b9d3564363a5d2a502970314f2264c883bc8d990afc003e5adb95b30edad245c4420c8126f1d33db75ff0230698eaff90055e0f", 0x2}, 0x20) socketpair(0x0, 0x80003, 0xffff, &(0x7f0000000380)={0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r7, 0x50, &(0x7f00000003c0)}, 0x10) 2018/03/29 11:56:25 executing program 3: r0 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x10}, 0x10) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000000c0)={0x0, 0x1000, 0x8}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000080)='./file0\x00', r1}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0x0, 0x8}, 0x10) mount(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='cpuset\x00', 0x40, &(0x7f0000000280)="8a4562cb6a7df38be32246afcaef1e1a3f933cb428242c55c117c0fbbd62cea0aab31f2665fb88267466eca314fc8cafd72cc24143121c0691236768fad66390bf9b55014c2bd49faa5388cbabd52e730eeb4ccc411bacd296e423d971043756cf2b35a4063f2a7465b44a60ef31ae437f6160ed2f63afa62c36a27c33e4779e7c0404e337abc025bb2e4b39cc265573c6ab1a3ff09c7ad6bb4631a4") mount(&(0x7f0000000340)='./file1\x00', &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='devtmpfs\x00', 0x40, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xb, 0x7f, 0x0, 0x1, 0x12, r1, 0x100000000}, 0x2c) mkdir(&(0x7f0000000440)='./file1\x00', 0x20) mount(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='iso9660\x00', 0x8, &(0x7f0000000540)="650fe6ccea2b17860de967406c566ec16fe5a7a4c064707e22906e9d3d2a70b4") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000005c0)={r2, 0x28, &(0x7f0000000580)={0x0, 0x0}}, 0x10) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={r3, 0x8, 0x10}, 0xc) mount(&(0x7f0000000640)='./file1\x00', &(0x7f0000000680)='./file1\x00', &(0x7f00000006c0)='pstore\x00', 0x1000000, &(0x7f0000000700)="f48afa3ab3cc319f917be52b04c388c229578537782bc5ffc32c7747b1d28999ad89f5fba460640a324385ac03cccef4553d641b91d79d014804a98e72796f8eb2e1a7056efeaa63404648df67079ae817420f248ccf9d01e7a027c600c71777fb9ebc97da60f3d1a287ef8bc00f1dc68c3b1f0c1836cde5b62be45dd58c3415cbb0f916fe3c04fc69911e2bec15c208d023bdb608fa727657c532bd5101a2a36b34c4eb65f855fea2d6f8a0a79b15ecef1a4c81a8f6f5ed57b09db2ab482413540416126718f2a33ed21346ded20b084a8dc10702ec279fc486b5c57c163d") socketpair(0x3, 0x2, 0x1f, &(0x7f0000001c40)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$kcm(r6, &(0x7f0000004300)={0x0, 0x0, &(0x7f0000004140)=[{&(0x7f0000001c80)=""/139, 0x8b}, {&(0x7f0000001d40)=""/149, 0x95}, {&(0x7f0000001e00)=""/188, 0xbc}, {&(0x7f0000001ec0)=""/69, 0x45}, {&(0x7f0000001f40)=""/165, 0xa5}, {&(0x7f0000002000)=""/4096, 0x1000}, {&(0x7f0000003000)=""/42, 0x2a}, {&(0x7f0000003040)=""/4096, 0x1000}, {&(0x7f0000004040)=""/233, 0xe9}], 0x9, &(0x7f0000004200)=""/236, 0xec, 0xe00}, 0x40) mount(&(0x7f0000004340)='./file1/file0\x00', &(0x7f0000004380)='./file1\x00', &(0x7f00000043c0)='ceph\x00', 0x4860, &(0x7f0000004400)="2c8eb517dd302be26597065442d58f3f345c295b542b2b1df3046ae176") bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000004600)={r6, &(0x7f0000004440)="903685b47b9c4d5c1dffcefa6a92cd57ccdfaf1af0be272f1cb4a5b86ab9d1ef248a63f04f5d59c2cd6e6b7722f5ff866c5d353014f28baaa95bce06a787a3e085102126a0386ffd4e136d472f2cdfb7c658643d2792b7235e2ec8c782080850c20eb00014eab035d7d56c8ddd0d7fdc4c21602d480e4accea0867cc5b4172b46b8f028bd623c58544092396dbda704543cd7c93219ff7f4caf9d0c12fc32c65ddac48ba22321d2c7ef1152f0dd87ed22cb30eb2b24d381b3abaefc114ad4c08e329cfbce60e0549ca", &(0x7f0000004540)="38859653237c5c9685cf2e44e1eea64846e190b778f29b06c26c2f2b8a0800f9fc2019b05290fc5c82f612eb7f479918015eb3af93cc57f01db731e129275ce05910f66e436ef09a8fe7bf22f960eacec350a7f7e9e9a47cb163f467b6a29523346a4c61d65d2235c73095a53929d509538f640424133cfa3617b41a51aa7172460146433abbe604f2c92827fabd5d3134d36b4cecd0fd2549f3527615f9eb63dd9332021e4eff13ad6aa509db21ed98745d00cb36e547", 0x3}, 0x20) mkdir(&(0x7f0000004640)='./file1/file0\x00', 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000004680)={0x0, 0x0, 0xa6, 0x3, 0x4}, 0x2c) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000046c0)=0x7, 0x4) recvmsg$kcm(r6, &(0x7f00000058c0)={&(0x7f0000004700)=@alg, 0x80, &(0x7f0000005880)=[{&(0x7f0000004780)=""/4096, 0x1000}, {&(0x7f0000005780)=""/219, 0xdb}], 0x2, 0x0, 0x0, 0x100000001}, 0x40000000) r7 = gettid() r8 = perf_event_open(&(0x7f0000005900)={0x7, 0x70, 0x0, 0xfffffffffffffff7, 0x9, 0x4, 0x0, 0x7, 0x100, 0x8, 0x100000000, 0x8000, 0x8, 0x6, 0x0, 0x6, 0x10001, 0x9, 0x1f, 0x2, 0x1, 0x3, 0x1, 0x1f, 0x23, 0x1, 0xaa4, 0x5, 0x4, 0x200, 0x6, 0x9, 0xfffffffffffffffb, 0x3, 0x3, 0xff, 0x80000000, 0x0, 0x0, 0xffffffffffffff9d, 0x2, @perf_config_ext={0x7, 0x9}, 0x100, 0x8, 0x2, 0x6, 0x4, 0x6, 0xf71}, r7, 0x9, r6, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f00000059c0)={&(0x7f0000005980)='./file0\x00'}, 0x10) ioctl$sock_kcm_SIOCKCMATTACH(r5, 0x89e0, &(0x7f0000005a00)={r5, r0}) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000005c00)={r4, &(0x7f0000005a40)="313befc1e9ac680c4369983530ee783c4f018c38e134b4b0aebd06ede05f238850949c0f5d32ab19889f880e87e3a0fa5a43500affdcc508d56f3a4df6c159ca9cfa62124b79b4607d42738dc5e16d09ea2c6a2346fc2360feff08d9f464dfdebce2cb99d4ba8e5fc37edfba041f14e16a68192d7d8687404ee7318323520188c4e5d52e8c7ec40bd0823fb210e530c74ea842bd8bacbc48317b0b6ed12528ecd30e1af83b8049df791ff7affe91ab54", &(0x7f0000005b00)=""/243}, 0x18) mount(&(0x7f0000005c40)='./file1/file0\x00', &(0x7f0000005c80)='./file1\x00', &(0x7f0000005cc0)='btrfs\x00', 0x0, 0x0) recvmsg(r5, &(0x7f00000073c0)={&(0x7f0000005d00)=@sco, 0x80, &(0x7f0000007300)=[{&(0x7f0000005d80)=""/103, 0x67}, {&(0x7f0000005e00)=""/170, 0xaa}, {&(0x7f0000005ec0)=""/252, 0xfc}, {&(0x7f0000005fc0)=""/136, 0x88}, {&(0x7f0000006080)=""/125, 0x7d}, {&(0x7f0000006100)=""/4096, 0x1000}, {&(0x7f0000007100)=""/106, 0x6a}, {&(0x7f0000007180)=""/115, 0x73}, {&(0x7f0000007200)=""/240, 0xf0}], 0x9, 0x0, 0x0, 0x7}, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000007400)={r3, 0x10001, 0x18}, 0xc) ioctl$PERF_EVENT_IOC_REFRESH(r8, 0x2402, 0xc4c) recvmsg$kcm(r6, &(0x7f0000008880)={&(0x7f0000007440)=@l2, 0x80, &(0x7f0000008800)=[{&(0x7f00000074c0)=""/231, 0xe7}, {&(0x7f00000075c0)=""/118, 0x76}, {&(0x7f0000007640)=""/4096, 0x1000}, {&(0x7f0000008640)=""/223, 0xdf}, {&(0x7f0000008780)=""/32, 0x20}, {&(0x7f00000087c0)=""/53, 0x35}], 0x6}, 0x10000) 2018/03/29 11:56:25 executing program 0: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000001a00)) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000001a40)={0xffffffffffffffff}) recvmsg$kcm(r1, &(0x7f0000000540)={&(0x7f00000000c0)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @broadcast}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000240)=""/65, 0x41}], 0x1, &(0x7f0000000440)=""/213, 0xd5}, 0x0) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0x0, 0x0, 0x18}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x1, 0x993, 0xed7, 0x0, 0x2, r2, 0x1}, 0x2c) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x8983, &(0x7f0000000040)) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000080)) recvmsg$kcm(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f00000001c0)=""/29, 0x1d}], 0x1, &(0x7f00000002c0)=""/192, 0xc0, 0x1}, 0x100) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000019c0)={0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000000140)="0253eea6a53cc0eae389e9a13e5f2046d0633eebde90f446c1b1eabbd0adb42dfcefb37a3df93feb3d5e76dc353ecf23fe9c81afa5", 0x35}, {&(0x7f00000002c0)}, {&(0x7f0000000400)}, {&(0x7f0000001600)}], 0x4, &(0x7f0000000580)=ANY=[@ANYBLOB="680400000000000007010000c17d0425755c6492e23de47cb15819d813deb534cee2d9497c58eba5bd8a228407fb709d70f16afa73f4924f12ecc429b6fd356748940b62ee5f5685ce027fe4e6c60a8f88cd1a5827d099f5849f09bd37f672e29814e6bb00000000100000ec0000000000000000ff01000010000000000000000701fba016421205f6fb63adb45f2b757a3566aa95ea43774d3dea46f22c57ef5be771ff9967ebaa541ecbb8fa2991f90553cf9c8abe63722deba53af06c13760425934c87bf948ae21096c9d1c8ac2f999e1c27fc7c4c46d29764d1c5866acb000000000000000000000000000000"], 0x88}, 0x48800) 2018/03/29 11:56:25 executing program 3: r0 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x10}, 0x10) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000000c0)={0x0, 0x1000, 0x8}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000080)='./file0\x00', r1}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0x0, 0x8}, 0x10) mount(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='cpuset\x00', 0x40, &(0x7f0000000280)="8a4562cb6a7df38be32246afcaef1e1a3f933cb428242c55c117c0fbbd62cea0aab31f2665fb88267466eca314fc8cafd72cc24143121c0691236768fad66390bf9b55014c2bd49faa5388cbabd52e730eeb4ccc411bacd296e423d971043756cf2b35a4063f2a7465b44a60ef31ae437f6160ed2f63afa62c36a27c33e4779e7c0404e337abc025bb2e4b39cc265573c6ab1a3ff09c7ad6bb4631a4") mount(&(0x7f0000000340)='./file1\x00', &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='devtmpfs\x00', 0x40, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xb, 0x7f, 0x0, 0x1, 0x12, r1, 0x100000000}, 0x2c) mkdir(&(0x7f0000000440)='./file1\x00', 0x20) mount(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='iso9660\x00', 0x8, &(0x7f0000000540)="650fe6ccea2b17860de967406c566ec16fe5a7a4c064707e22906e9d3d2a70b4") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000005c0)={r2, 0x28, &(0x7f0000000580)={0x0, 0x0}}, 0x10) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={r3, 0x8, 0x10}, 0xc) mount(&(0x7f0000000640)='./file1\x00', &(0x7f0000000680)='./file1\x00', &(0x7f00000006c0)='pstore\x00', 0x1000000, &(0x7f0000000700)="f48afa3ab3cc319f917be52b04c388c229578537782bc5ffc32c7747b1d28999ad89f5fba460640a324385ac03cccef4553d641b91d79d014804a98e72796f8eb2e1a7056efeaa63404648df67079ae817420f248ccf9d01e7a027c600c71777fb9ebc97da60f3d1a287ef8bc00f1dc68c3b1f0c1836cde5b62be45dd58c3415cbb0f916fe3c04fc69911e2bec15c208d023bdb608fa727657c532bd5101a2a36b34c4eb65f855fea2d6f8a0a79b15ecef1a4c81a8f6f5ed57b09db2ab482413540416126718f2a33ed21346ded20b084a8dc10702ec279fc486b5c57c163d") socketpair(0x3, 0x2, 0x1f, &(0x7f0000001c40)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$kcm(r6, &(0x7f0000004300)={0x0, 0x0, &(0x7f0000004140)=[{&(0x7f0000001c80)=""/139, 0x8b}, {&(0x7f0000001d40)=""/149, 0x95}, {&(0x7f0000001e00)=""/188, 0xbc}, {&(0x7f0000001ec0)=""/69, 0x45}, {&(0x7f0000001f40)=""/165, 0xa5}, {&(0x7f0000002000)=""/4096, 0x1000}, {&(0x7f0000003000)=""/42, 0x2a}, {&(0x7f0000003040)=""/4096, 0x1000}, {&(0x7f0000004040)=""/233, 0xe9}], 0x9, &(0x7f0000004200)=""/236, 0xec, 0xe00}, 0x40) mount(&(0x7f0000004340)='./file1/file0\x00', &(0x7f0000004380)='./file1\x00', &(0x7f00000043c0)='ceph\x00', 0x4860, &(0x7f0000004400)="2c8eb517dd302be26597065442d58f3f345c295b542b2b1df3046ae176") bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000004600)={r6, &(0x7f0000004440)="903685b47b9c4d5c1dffcefa6a92cd57ccdfaf1af0be272f1cb4a5b86ab9d1ef248a63f04f5d59c2cd6e6b7722f5ff866c5d353014f28baaa95bce06a787a3e085102126a0386ffd4e136d472f2cdfb7c658643d2792b7235e2ec8c782080850c20eb00014eab035d7d56c8ddd0d7fdc4c21602d480e4accea0867cc5b4172b46b8f028bd623c58544092396dbda704543cd7c93219ff7f4caf9d0c12fc32c65ddac48ba22321d2c7ef1152f0dd87ed22cb30eb2b24d381b3abaefc114ad4c08e329cfbce60e0549ca", &(0x7f0000004540)="38859653237c5c9685cf2e44e1eea64846e190b778f29b06c26c2f2b8a0800f9fc2019b05290fc5c82f612eb7f479918015eb3af93cc57f01db731e129275ce05910f66e436ef09a8fe7bf22f960eacec350a7f7e9e9a47cb163f467b6a29523346a4c61d65d2235c73095a53929d509538f640424133cfa3617b41a51aa7172460146433abbe604f2c92827fabd5d3134d36b4cecd0fd2549f3527615f9eb63dd9332021e4eff13ad6aa509db21ed98745d00cb36e547", 0x3}, 0x20) mkdir(&(0x7f0000004640)='./file1/file0\x00', 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000004680)={0x0, 0x0, 0xa6, 0x3, 0x4}, 0x2c) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000046c0)=0x7, 0x4) recvmsg$kcm(r6, &(0x7f00000058c0)={&(0x7f0000004700)=@alg, 0x80, &(0x7f0000005880)=[{&(0x7f0000004780)=""/4096, 0x1000}, {&(0x7f0000005780)=""/219, 0xdb}], 0x2, 0x0, 0x0, 0x100000001}, 0x40000000) r7 = gettid() r8 = perf_event_open(&(0x7f0000005900)={0x7, 0x70, 0x0, 0xfffffffffffffff7, 0x9, 0x4, 0x0, 0x7, 0x100, 0x8, 0x100000000, 0x8000, 0x8, 0x6, 0x0, 0x6, 0x10001, 0x9, 0x1f, 0x2, 0x1, 0x3, 0x1, 0x1f, 0x23, 0x1, 0xaa4, 0x5, 0x4, 0x200, 0x6, 0x9, 0xfffffffffffffffb, 0x3, 0x3, 0xff, 0x80000000, 0x0, 0x0, 0xffffffffffffff9d, 0x2, @perf_config_ext={0x7, 0x9}, 0x100, 0x8, 0x2, 0x6, 0x4, 0x6, 0xf71}, r7, 0x9, r6, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f00000059c0)={&(0x7f0000005980)='./file0\x00'}, 0x10) ioctl$sock_kcm_SIOCKCMATTACH(r5, 0x89e0, &(0x7f0000005a00)={r5, r0}) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000005c00)={r4, &(0x7f0000005a40)="313befc1e9ac680c4369983530ee783c4f018c38e134b4b0aebd06ede05f238850949c0f5d32ab19889f880e87e3a0fa5a43500affdcc508d56f3a4df6c159ca9cfa62124b79b4607d42738dc5e16d09ea2c6a2346fc2360feff08d9f464dfdebce2cb99d4ba8e5fc37edfba041f14e16a68192d7d8687404ee7318323520188c4e5d52e8c7ec40bd0823fb210e530c74ea842bd8bacbc48317b0b6ed12528ecd30e1af83b8049df791ff7affe91ab54", &(0x7f0000005b00)=""/243}, 0x18) mount(&(0x7f0000005c40)='./file1/file0\x00', &(0x7f0000005c80)='./file1\x00', &(0x7f0000005cc0)='btrfs\x00', 0x0, 0x0) recvmsg(r5, &(0x7f00000073c0)={&(0x7f0000005d00)=@sco, 0x80, &(0x7f0000007300)=[{&(0x7f0000005d80)=""/103, 0x67}, {&(0x7f0000005e00)=""/170, 0xaa}, {&(0x7f0000005ec0)=""/252, 0xfc}, {&(0x7f0000005fc0)=""/136, 0x88}, {&(0x7f0000006080)=""/125, 0x7d}, {&(0x7f0000006100)=""/4096, 0x1000}, {&(0x7f0000007100)=""/106, 0x6a}, {&(0x7f0000007180)=""/115, 0x73}, {&(0x7f0000007200)=""/240, 0xf0}], 0x9, 0x0, 0x0, 0x7}, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000007400)={r3, 0x10001, 0x18}, 0xc) ioctl$PERF_EVENT_IOC_REFRESH(r8, 0x2402, 0xc4c) recvmsg$kcm(r6, &(0x7f0000008880)={&(0x7f0000007440)=@l2, 0x80, &(0x7f0000008800)=[{&(0x7f00000074c0)=""/231, 0xe7}, {&(0x7f00000075c0)=""/118, 0x76}, {&(0x7f0000007640)=""/4096, 0x1000}, {&(0x7f0000008640)=""/223, 0xdf}, {&(0x7f0000008780)=""/32, 0x20}, {&(0x7f00000087c0)=""/53, 0x35}], 0x6}, 0x10000) 2018/03/29 11:56:25 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x1e1, 0x100000000209e20, 0x8000000001, 0x5}, 0xfffffffffffffe20) r0 = getpid() r1 = perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0xfffffffffffffffc, 0x0, 0x8, 0x2, 0x0, 0x9, 0x10000, 0xc, 0x3d3, 0x80, 0x5, 0xfffffffffffffffc, 0x8, 0x3f, 0x5d, 0xbbb0, 0x20, 0x3, 0x8000, 0x100000000, 0x8, 0x9, 0x2, 0x4, 0x800, 0xf8, 0x3, 0x9, 0x1, 0x3, 0x8, 0x3, 0x7, 0x10001, 0xf16, 0x2, 0x0, 0x7fffffff, 0x4, @perf_bp={&(0x7f0000000780), 0x1}, 0x4080, 0x10001, 0xcc, 0x7, 0x3, 0xffff, 0x7fffffff}, 0xffffffffffffffff, 0xd, 0xffffffffffffff9c, 0x8) perf_event_open(&(0x7f0000000980)={0x4, 0x70, 0x6, 0x3f, 0x8e, 0x1, 0x0, 0x3, 0x404, 0x0, 0xbc2b, 0x40, 0x7, 0xffff, 0xffff, 0x9, 0x9de2, 0x9, 0x0, 0x3, 0x7f, 0xff, 0x40, 0x400, 0x9, 0x7fffffff, 0x80000000, 0x7, 0x8, 0x10001, 0x1f, 0x2778, 0x800, 0x8001, 0x101, 0x9, 0x8, 0x7ff, 0x0, 0x1000, 0x5, @perf_config_ext={0x3ff, 0xb69b}, 0x3040, 0x2, 0x2, 0x5, 0x7, 0x6, 0x7283ed73}, r0, 0xe, r1, 0x8) bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x0, 0x0, 0x7ffff9, 0x0, 0x20000003, 0x0}, 0x2c) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) r2 = gettid() r3 = perf_event_open(&(0x7f00000008c0)={0x7, 0x70, 0x1, 0x200, 0x3, 0xdbce, 0x0, 0x8, 0x1002, 0x1, 0xffffffffffffff00, 0x8, 0x1, 0xb3fa, 0x8, 0x0, 0x1, 0x2, 0x1000, 0x2, 0x401, 0x8, 0x3, 0x81, 0x0, 0x7, 0x2fc4, 0x882, 0x4, 0x8, 0x3, 0x81, 0x3, 0x7, 0x8857, 0x7, 0x5, 0x9, 0x0, 0x7, 0x1, @perf_config_ext={0x0, 0x80000000}, 0x400, 0x7f, 0x4, 0x7, 0x2, 0x7f, 0x200}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000840)={0x5, 0x70, 0xef, 0x2, 0x1000, 0xffffffff80000000, 0x0, 0x1a7800000000, 0x2000, 0x4, 0x5, 0x6814, 0x3a9, 0x5, 0x63b, 0x6, 0x8, 0x1000, 0x250420ee, 0x3, 0x0, 0x20, 0x6, 0x0, 0x4, 0x5, 0x4, 0x8, 0x3, 0x8, 0x52893dd5, 0x2, 0x2, 0x8, 0x44d, 0x1, 0x8, 0x6, 0x0, 0x100000000, 0x0, @perf_config_ext={0x9, 0x80}, 0x0, 0x0, 0x2b67, 0x6, 0x4b0, 0x81, 0x4}, r2, 0x5, r3, 0xb) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1003, 0x0) mount(&(0x7f00002b9ff8)='./file0\x00', &(0x7f0000cbeff8)='./file0\x00', &(0x7f00005f7ffa)='ramfs\x00', 0x80000, &(0x7f000002f000)) mount(&(0x7f0000000000)='.', &(0x7f0000000040)='.', &(0x7f0000000080)='cgroup\x00', 0x5010, &(0x7f00000000c0)) mount(&(0x7f0000377ff8)='.', &(0x7f0000000280)='.', &(0x7f0000000600)='nfs4\x00', 0x5010, &(0x7f0000000300)="2161893416a0c71070768c219eb114c3253c9f3baf4e9e8e9111c1a7fc6e266009fe27243deeaa22ca7ae9341f714300b5ee807e55d609036f2a3260475922bdfb2d2849f1c3b2ad3c051bd4f3751a177f77a92758c6d2b23fe7f1535b54e5846d11c135de8286066dec1b25f6e1378944ac5f7fce42d055821b5e19") perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xd68, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f0000014f88)={0x5, 0xfffffffffffffdc4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x46000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = getpid() perf_event_open(&(0x7f0000000680)={0x4, 0x70, 0x64, 0xffff, 0x1f, 0x4, 0x0, 0x1c3, 0x0, 0x1, 0x1, 0x9, 0x1ff, 0xfffffffffffffff8, 0x0, 0x0, 0x6, 0x7fffffff, 0x0, 0xffffffff, 0x80000001, 0xd0, 0x7, 0x1f, 0x0, 0x8, 0x9, 0x1ff, 0x8, 0x785, 0x4, 0xff, 0x2, 0x656, 0x5000000, 0x1, 0x460e3be0, 0x1, 0x0, 0x0, 0x7, @perf_bp={&(0x7f0000000640), 0x1}, 0x1000, 0xa, 0x7fff, 0x7, 0x3, 0x400, 0x9}, r5, 0xe, r4, 0x1) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', 0x0, 0x10}, 0x10) close(0xffffffffffffffff) bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)={&(0x7f0000000040)='./file0\x00', 0x0, 0x18}, 0x10) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000100)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0, 0x2e, &(0x7f0000000440), &(0x7f0000000140)=""/46, 0x4229}, 0x28) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000003480)={&(0x7f0000003300)=@can={0x0, 0x0}, 0x80, &(0x7f0000003400)=[{&(0x7f0000003380)=""/56, 0x38}, {&(0x7f00000033c0)=""/1, 0x1}], 0x2, &(0x7f0000003440)=""/33, 0x21, 0x1}, 0x40010000) bpf$PROG_LOAD(0x5, &(0x7f00000034c0)={0xe, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="1800000002000000000000004ce700002555fdff00000000002371d07c9ba7f4a23372b0ad61000000000000009500000000000000"], &(0x7f00000007c0)='GPL\x00', 0x3, 0x2d, &(0x7f0000000800)=""/45, 0x40f00, 0x1, [], r6}, 0x48) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000740)={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x10) socketpair$inet(0x2, 0x80a, 0x81, &(0x7f0000000240)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={0xffffffffffffffff, &(0x7f0000000500)="ae30f1bca1b4d3f69f1aac81517d42ad5980bc63b5008616a1f4724b9f8c1e4ecd8de336f57dd727cdaab04f0b40f28612615ad08de414711d841a88db33fd33884b627074213a0c5de3be2bbaec9207d9865c47f240467849979b5ab5632376608fc4be41a274abb2dc07cabe344a18db51048e5b0cbda843905a4258cdee3e649eddf104ba78894dce09747dcfe6a8d6d6d985520eeef448b83a8bcb83074541ba7a20d6094aa206c01a0690e5b3bfa05d475eb382b0199031d22bb26cde9b1ca0055eef9f6c4993b71ba19ba0590bb5efdaddaa574c25356ca890d138fc9fe0e975b6d5a1a8251503cd0a91845f9d95", &(0x7f0000000480)="9bc7741ea5e524cc8c6f748a73153834428729c45bf4ad446d2dddf1978baf431d0ba35b5442b5afe22db8b003650320200af7e1368ef7cdfa79ca8b9d3564363a5d2a502970314f2264c883bc8d990afc003e5adb95b30edad245c4420c8126f1d33db75ff0230698eaff90055e0f", 0x2}, 0x20) socketpair(0x0, 0x80003, 0xffff, &(0x7f0000000380)={0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r7, 0x50, &(0x7f00000003c0)}, 0x10) 2018/03/29 11:56:25 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x1e1, 0x100000000209e20, 0x8000000001, 0x5}, 0xfffffffffffffe20) r0 = getpid() r1 = perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0xfffffffffffffffc, 0x3, 0x8, 0x2, 0x0, 0x9, 0x10000, 0xc, 0x3d3, 0x80, 0x5, 0xfffffffffffffffc, 0x8, 0x3f, 0x5d, 0xbbb0, 0x20, 0x3, 0x8000, 0x100000000, 0x8, 0x9, 0x2, 0x4, 0x800, 0xf8, 0x3, 0x9, 0x1, 0x3, 0x8, 0x3, 0x7, 0x10001, 0xf16, 0x2, 0x0, 0x7fffffff, 0x4, @perf_bp={&(0x7f0000000780), 0x1}, 0x4080, 0x10001, 0xcc, 0x7, 0x3, 0xffff, 0x7fffffff}, 0xffffffffffffffff, 0xd, 0xffffffffffffff9c, 0x8) perf_event_open(&(0x7f0000000980)={0x4, 0x70, 0x6, 0x3f, 0x8e, 0x1, 0x0, 0x3, 0x404, 0x0, 0xbc2b, 0x40, 0x7, 0xffff, 0xffff, 0x9, 0x9de2, 0x9, 0x0, 0x3, 0x7f, 0xff, 0x40, 0x400, 0x9, 0x7fffffff, 0x80000000, 0x7, 0x8, 0x10001, 0x1f, 0x2778, 0x800, 0x8001, 0x101, 0x9, 0x8, 0x7ff, 0x0, 0x1000, 0x5, @perf_config_ext={0x3ff, 0xb69b}, 0x3040, 0x2, 0x2, 0x5, 0x7, 0x6, 0x7283ed73}, r0, 0xe, r1, 0x8) bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x0, 0x0, 0x7ffff9, 0x0, 0x20000003, 0x0}, 0x2c) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) r2 = gettid() r3 = perf_event_open(&(0x7f00000008c0)={0x7, 0x70, 0x1, 0x200, 0x3, 0xdbce, 0x0, 0x8, 0x1002, 0x1, 0xffffffffffffff00, 0x8, 0x1, 0xb3fa, 0x8, 0x0, 0x1, 0x2, 0x1000, 0x2, 0x401, 0x8, 0x3, 0x81, 0x0, 0x7, 0x2fc4, 0x882, 0x4, 0x8, 0x3, 0x81, 0x3, 0x7, 0x8857, 0x7, 0x5, 0x9, 0x0, 0x7, 0x1, @perf_config_ext={0x0, 0x80000000}, 0x400, 0x7f, 0x4, 0x7, 0x2, 0x7f, 0x200}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000840)={0x5, 0x70, 0xef, 0x2, 0x1000, 0xffffffff80000000, 0x0, 0x1a7800000000, 0x2000, 0x4, 0x5, 0x6814, 0x3a9, 0x5, 0x63b, 0x6, 0x8, 0x1000, 0x250420ee, 0x3, 0x0, 0x20, 0x6, 0x0, 0x4, 0x5, 0x4, 0x8, 0x3, 0x8, 0x52893dd5, 0x2, 0x2, 0x8, 0x44d, 0x1, 0x8, 0x6, 0x0, 0x100000000, 0x0, @perf_config_ext={0x9, 0x80}, 0x0, 0x0, 0x2b67, 0x6, 0x4b0, 0x81, 0x4}, r2, 0x5, r3, 0xb) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1003, 0x0) mount(&(0x7f00002b9ff8)='./file0\x00', &(0x7f0000cbeff8)='./file0\x00', &(0x7f00005f7ffa)='ramfs\x00', 0x80000, &(0x7f000002f000)) mount(&(0x7f0000000000)='.', &(0x7f0000000040)='.', &(0x7f0000000080)='cgroup\x00', 0x5010, &(0x7f00000000c0)) mount(&(0x7f0000377ff8)='.', &(0x7f0000000280)='.', &(0x7f0000000600)='nfs4\x00', 0x5010, &(0x7f0000000300)="2161893416a0c71070768c219eb114c3253c9f3baf4e9e8e9111c1a7fc6e266009fe27243deeaa22ca7ae9341f714300b5ee807e55d609036f2a3260475922bdfb2d2849f1c3b2ad3c051bd4f3751a177f77a92758c6d2b23fe7f1535b54e5846d11c135de8286066dec1b25f6e1378944ac5f7fce42d055821b5e19") perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xd68, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f0000014f88)={0x5, 0xfffffffffffffdc4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x46000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = getpid() perf_event_open(&(0x7f0000000680)={0x4, 0x70, 0x64, 0xffff, 0x1f, 0x4, 0x0, 0x1c3, 0x0, 0x1, 0x1, 0x9, 0x1ff, 0xfffffffffffffff8, 0x0, 0x0, 0x6, 0x7fffffff, 0x4, 0xffffffff, 0x80000001, 0xd0, 0x7, 0x1f, 0x0, 0x8, 0x9, 0x1ff, 0x8, 0x785, 0x4, 0xff, 0x2, 0x656, 0x5000000, 0x1, 0x460e3be0, 0x1, 0x0, 0x0, 0x7, @perf_bp={&(0x7f0000000640), 0x1}, 0x1000, 0xa, 0x7fff, 0x7, 0x3, 0x400, 0x9}, r5, 0xe, r4, 0x1) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', 0x0, 0x10}, 0x10) close(0xffffffffffffffff) bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)={&(0x7f0000000040)='./file0\x00', 0x0, 0x18}, 0x10) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000100)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0, 0x2e, &(0x7f0000000440), &(0x7f0000000140)=""/46, 0x4229}, 0x28) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000003480)={&(0x7f0000003300)=@can={0x0, 0x0}, 0x80, &(0x7f0000003400)=[{&(0x7f0000003380)=""/56, 0x38}, {&(0x7f00000033c0)=""/1, 0x1}], 0x2, &(0x7f0000003440)=""/33, 0x21, 0x1}, 0x40010000) bpf$PROG_LOAD(0x5, &(0x7f00000034c0)={0xe, 0x6, &(0x7f0000000940)=ANY=[@ANYBLOB="1800000002000000000000004ce700002555fdff00000000002371d07c9ba7f4a23372b0ad61000000000000009500000000000000"], &(0x7f00000007c0)='GPL\x00', 0x3, 0x2d, &(0x7f0000000800)=""/45, 0x40f00, 0x1, [], r6}, 0x48) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000740)={&(0x7f0000000700)='./file0\x00'}, 0x10) socketpair$inet(0x2, 0x80a, 0x81, &(0x7f0000000240)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={0xffffffffffffffff, &(0x7f0000000500)="ae30f1bca1b4d3f69f1aac81517d42ad5980bc63b5008616a1f4724b9f8c1e4ecd8de336f57dd727cdaab04f0b40f28612615ad08de414711d841a88db33fd33884b627074213a0c5de3be2bbaec9207d9865c47f240467849979b5ab5632376608fc4be41a274abb2dc07cabe344a18db51048e5b0cbda843905a4258cdee3e649eddf104ba78894dce09747dcfe6a8d6d6d985520eeef448b83a8bcb83074541ba7a20d6094aa206c01a0690e5b3bfa05d475eb382b0199031d22bb26cde9b1ca0055eef9f6c4993b71ba19ba0590bb5efdaddaa574c25356ca890d138fc9fe0e975b6d5a1a8251503cd0a91845f9d95", &(0x7f0000000480)="9bc7741ea5e524cc8c6f748a73153834428729c45bf4ad446d2dddf1978baf431d0ba35b5442b5afe22db8b003650320200af7e1368ef7cdfa79ca8b9d3564363a5d2a502970314f2264c883bc8d990afc003e5adb95b30edad245c4420c8126f1d33db75ff0230698eaff90055e0f", 0x2}, 0x20) socketpair(0x0, 0x80003, 0xffff, &(0x7f0000000380)={0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r7, 0x50, &(0x7f00000003c0)}, 0x10) [ 832.169844] IPVS: ftp: loaded support on port[0] = 21 [ 832.202601] FAULT_INJECTION: forcing a failure. [ 832.202601] name failslab, interval 1, probability 0, space 0, times 0 [ 832.213855] CPU: 0 PID: 27249 Comm: syz-executor4 Not tainted 4.16.0-rc6+ #40 [ 832.221139] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 832.230525] Call Trace: [ 832.233105] dump_stack+0x194/0x24d [ 832.236716] ? arch_local_irq_restore+0x53/0x53 [ 832.241375] should_fail+0x8c0/0xa40 [ 832.245068] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 832.250148] ? __lock_is_held+0xb6/0x140 [ 832.254198] ? mark_held_locks+0xaf/0x100 [ 832.258325] ? __raw_spin_lock_init+0x1c/0x100 [ 832.262888] ? find_held_lock+0x35/0x1d0 [ 832.266931] ? __lock_is_held+0xb6/0x140 [ 832.270981] ? check_same_owner+0x320/0x320 [ 832.275278] ? d_alloc+0x269/0x340 [ 832.278797] ? rcu_note_context_switch+0x710/0x710 [ 832.283703] ? lock_release+0xa40/0xa40 [ 832.287661] should_failslab+0xec/0x120 [ 832.291628] kmem_cache_alloc+0x47/0x760 [ 832.295669] ? d_drop+0x51/0x60 [ 832.299694] ? rpc_i_callback+0x30/0x30 [ 832.303653] rpc_alloc_inode+0x1a/0x20 [ 832.307520] alloc_inode+0x65/0x180 [ 832.311124] new_inode_pseudo+0x69/0x190 [ 832.315159] ? prune_icache_sb+0x1a0/0x1a0 [ 832.319369] ? do_raw_spin_trylock+0x190/0x190 [ 832.323927] ? d_add+0xa70/0xa70 [ 832.327277] new_inode+0x1c/0x40 [ 832.330622] rpc_get_inode+0x20/0x1e0 [ 832.334400] __rpc_create_common+0x5d/0x1d0 [ 832.338712] ? __d_lookup+0x830/0x830 [ 832.342495] rpc_populate.constprop.15+0x126/0x340 [ 832.347417] rpc_fill_super+0x831/0xae0 [ 832.351375] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 832.356545] ? security_capable+0x8e/0xc0 [ 832.360672] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 832.365840] ? ns_capable_common+0xcf/0x160 [ 832.370143] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 832.375309] mount_ns+0xc4/0x190 [ 832.378656] rpc_mount+0x9e/0xd0 [ 832.382004] mount_fs+0x66/0x2d0 [ 832.385357] vfs_kern_mount.part.26+0xc6/0x4a0 [ 832.389919] ? may_umount+0xa0/0xa0 [ 832.393534] ? _raw_read_unlock+0x22/0x30 [ 832.397657] ? __get_fs_type+0x8a/0xc0 [ 832.401528] do_mount+0xea4/0x2bb0 [ 832.405054] ? copy_mount_string+0x40/0x40 [ 832.409266] ? rcu_pm_notify+0xc0/0xc0 [ 832.413142] ? copy_mount_options+0x5f/0x2e0 [ 832.417528] ? rcu_read_lock_sched_held+0x108/0x120 [ 832.422519] ? kmem_cache_alloc_trace+0x459/0x740 [ 832.427342] ? kasan_check_write+0x14/0x20 [ 832.431573] ? copy_mount_options+0x1f7/0x2e0 [ 832.436053] SyS_mount+0xab/0x120 [ 832.439482] ? copy_mnt_ns+0xb30/0xb30 [ 832.443350] do_syscall_64+0x281/0x940 [ 832.447215] ? __do_page_fault+0xc90/0xc90 [ 832.451427] ? _raw_spin_unlock_irq+0x27/0x70 [ 832.455902] ? finish_task_switch+0x1c1/0x7e0 [ 832.460379] ? syscall_return_slowpath+0x550/0x550 [ 832.465287] ? syscall_return_slowpath+0x2ac/0x550 [ 832.470196] ? prepare_exit_to_usermode+0x350/0x350 [ 832.475192] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 832.480554] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 832.485381] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 832.490546] RIP: 0033:0x4548b9 [ 832.493713] RSP: 002b:00007f4d88ef9c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 832.501397] RAX: ffffffffffffffda RBX: 00007f4d88efa6d4 RCX: 00000000004548b9 [ 832.508647] RDX: 00000000200002c0 RSI: 0000000020000140 RDI: 0000000020000300 [ 832.515893] RBP: 000000000072bea0 R08: 0000000020000200 R09: 0000000000000000 [ 832.523139] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 832.530387] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000003c [ 832.538058] net/sunrpc/rpc_pipe.c: __rpc_create_common failed to allocate inode for dentry info [ 832.547211] net/sunrpc/rpc_pipe.c: rpc_populate failed to populate directory clntXX [ 833.450455] IPVS: ftp: loaded support on port[0] = 21 [ 833.476193] IPVS: ftp: loaded support on port[0] = 21 [ 833.511450] IPVS: ftp: loaded support on port[0] = 21 2018/03/29 11:56:28 executing program 3: r0 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x10}, 0x10) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000000c0)={0x0, 0x1000, 0x8}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000080)='./file0\x00', r1}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0x0, 0x8}, 0x10) mount(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='cpuset\x00', 0x40, &(0x7f0000000280)="8a4562cb6a7df38be32246afcaef1e1a3f933cb428242c55c117c0fbbd62cea0aab31f2665fb88267466eca314fc8cafd72cc24143121c0691236768fad66390bf9b55014c2bd49faa5388cbabd52e730eeb4ccc411bacd296e423d971043756cf2b35a4063f2a7465b44a60ef31ae437f6160ed2f63afa62c36a27c33e4779e7c0404e337abc025bb2e4b39cc265573c6ab1a3ff09c7ad6bb4631a4") mount(&(0x7f0000000340)='./file1\x00', &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='devtmpfs\x00', 0x40, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xb, 0x7f, 0x0, 0x1, 0x12, r1, 0x100000000}, 0x2c) mkdir(&(0x7f0000000440)='./file1\x00', 0x20) mount(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='iso9660\x00', 0x8, &(0x7f0000000540)="650fe6ccea2b17860de967406c566ec16fe5a7a4c064707e22906e9d3d2a70b4") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000005c0)={r2, 0x28, &(0x7f0000000580)={0x0, 0x0}}, 0x10) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={r3, 0x8, 0x10}, 0xc) mount(&(0x7f0000000640)='./file1\x00', &(0x7f0000000680)='./file1\x00', &(0x7f00000006c0)='pstore\x00', 0x1000000, &(0x7f0000000700)="f48afa3ab3cc319f917be52b04c388c229578537782bc5ffc32c7747b1d28999ad89f5fba460640a324385ac03cccef4553d641b91d79d014804a98e72796f8eb2e1a7056efeaa63404648df67079ae817420f248ccf9d01e7a027c600c71777fb9ebc97da60f3d1a287ef8bc00f1dc68c3b1f0c1836cde5b62be45dd58c3415cbb0f916fe3c04fc69911e2bec15c208d023bdb608fa727657c532bd5101a2a36b34c4eb65f855fea2d6f8a0a79b15ecef1a4c81a8f6f5ed57b09db2ab482413540416126718f2a33ed21346ded20b084a8dc10702ec279fc486b5c57c163d") socketpair(0x3, 0x2, 0x1f, &(0x7f0000001c40)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$kcm(r6, &(0x7f0000004300)={0x0, 0x0, &(0x7f0000004140)=[{&(0x7f0000001c80)=""/139, 0x8b}, {&(0x7f0000001d40)=""/149, 0x95}, {&(0x7f0000001e00)=""/188, 0xbc}, {&(0x7f0000001ec0)=""/69, 0x45}, {&(0x7f0000001f40)=""/165, 0xa5}, {&(0x7f0000002000)=""/4096, 0x1000}, {&(0x7f0000003000)=""/42, 0x2a}, {&(0x7f0000003040)=""/4096, 0x1000}, {&(0x7f0000004040)=""/233, 0xe9}], 0x9, &(0x7f0000004200)=""/236, 0xec, 0xe00}, 0x40) mount(&(0x7f0000004340)='./file1/file0\x00', &(0x7f0000004380)='./file1\x00', &(0x7f00000043c0)='ceph\x00', 0x4860, &(0x7f0000004400)="2c8eb517dd302be26597065442d58f3f345c295b542b2b1df3046ae176") bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000004600)={r6, &(0x7f0000004440)="903685b47b9c4d5c1dffcefa6a92cd57ccdfaf1af0be272f1cb4a5b86ab9d1ef248a63f04f5d59c2cd6e6b7722f5ff866c5d353014f28baaa95bce06a787a3e085102126a0386ffd4e136d472f2cdfb7c658643d2792b7235e2ec8c782080850c20eb00014eab035d7d56c8ddd0d7fdc4c21602d480e4accea0867cc5b4172b46b8f028bd623c58544092396dbda704543cd7c93219ff7f4caf9d0c12fc32c65ddac48ba22321d2c7ef1152f0dd87ed22cb30eb2b24d381b3abaefc114ad4c08e329cfbce60e0549ca", &(0x7f0000004540)="38859653237c5c9685cf2e44e1eea64846e190b778f29b06c26c2f2b8a0800f9fc2019b05290fc5c82f612eb7f479918015eb3af93cc57f01db731e129275ce05910f66e436ef09a8fe7bf22f960eacec350a7f7e9e9a47cb163f467b6a29523346a4c61d65d2235c73095a53929d509538f640424133cfa3617b41a51aa7172460146433abbe604f2c92827fabd5d3134d36b4cecd0fd2549f3527615f9eb63dd9332021e4eff13ad6aa509db21ed98745d00cb36e547", 0x3}, 0x20) mkdir(&(0x7f0000004640)='./file1/file0\x00', 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000004680)={0x0, 0x0, 0xa6, 0x3, 0x4}, 0x2c) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000046c0)=0x7, 0x4) recvmsg$kcm(r6, &(0x7f00000058c0)={&(0x7f0000004700)=@alg, 0x80, &(0x7f0000005880)=[{&(0x7f0000004780)=""/4096, 0x1000}, {&(0x7f0000005780)=""/219, 0xdb}], 0x2, 0x0, 0x0, 0x100000001}, 0x40000000) r7 = gettid() r8 = perf_event_open(&(0x7f0000005900)={0x7, 0x70, 0x0, 0xfffffffffffffff7, 0x9, 0x4, 0x0, 0x7, 0x100, 0x8, 0x100000000, 0x8000, 0x8, 0x6, 0x0, 0x6, 0x10001, 0x9, 0x1f, 0x2, 0x1, 0x3, 0x1, 0x1f, 0x23, 0x1, 0xaa4, 0x5, 0x4, 0x200, 0x6, 0x9, 0xfffffffffffffffb, 0x3, 0x3, 0xff, 0x80000000, 0x0, 0x0, 0xffffffffffffff9d, 0x2, @perf_config_ext={0x7, 0x9}, 0x100, 0x8, 0x2, 0x6, 0x4, 0x6, 0xf71}, r7, 0x9, r6, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f00000059c0)={&(0x7f0000005980)='./file0\x00'}, 0x10) ioctl$sock_kcm_SIOCKCMATTACH(r5, 0x89e0, &(0x7f0000005a00)={r5, r0}) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000005c00)={r4, &(0x7f0000005a40)="313befc1e9ac680c4369983530ee783c4f018c38e134b4b0aebd06ede05f238850949c0f5d32ab19889f880e87e3a0fa5a43500affdcc508d56f3a4df6c159ca9cfa62124b79b4607d42738dc5e16d09ea2c6a2346fc2360feff08d9f464dfdebce2cb99d4ba8e5fc37edfba041f14e16a68192d7d8687404ee7318323520188c4e5d52e8c7ec40bd0823fb210e530c74ea842bd8bacbc48317b0b6ed12528ecd30e1af83b8049df791ff7affe91ab54", &(0x7f0000005b00)=""/243}, 0x18) mount(&(0x7f0000005c40)='./file1/file0\x00', &(0x7f0000005c80)='./file1\x00', &(0x7f0000005cc0)='btrfs\x00', 0x0, 0x0) recvmsg(r5, &(0x7f00000073c0)={&(0x7f0000005d00)=@sco, 0x80, &(0x7f0000007300)=[{&(0x7f0000005d80)=""/103, 0x67}, {&(0x7f0000005e00)=""/170, 0xaa}, {&(0x7f0000005ec0)=""/252, 0xfc}, {&(0x7f0000005fc0)=""/136, 0x88}, {&(0x7f0000006080)=""/125, 0x7d}, {&(0x7f0000006100)=""/4096, 0x1000}, {&(0x7f0000007100)=""/106, 0x6a}, {&(0x7f0000007180)=""/115, 0x73}, {&(0x7f0000007200)=""/240, 0xf0}], 0x9, 0x0, 0x0, 0x7}, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000007400)={r3, 0x10001, 0x18}, 0xc) ioctl$PERF_EVENT_IOC_REFRESH(r8, 0x2402, 0xc4c) recvmsg$kcm(r6, &(0x7f0000008880)={&(0x7f0000007440)=@l2, 0x80, &(0x7f0000008800)=[{&(0x7f00000074c0)=""/231, 0xe7}, {&(0x7f00000075c0)=""/118, 0x76}, {&(0x7f0000007640)=""/4096, 0x1000}, {&(0x7f0000008640)=""/223, 0xdf}, {&(0x7f0000008780)=""/32, 0x20}, {&(0x7f00000087c0)=""/53, 0x35}], 0x6}, 0x10000) 2018/03/29 11:56:28 executing program 6: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x3, &(0x7f0000002000)=@framed={{0x18}, [], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000680)={0xffffffffffffffff, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x7}, 0x28) recvmsg(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000001c0)) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000100)=r0, 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) recvmsg(r3, &(0x7f00000011c0)={&(0x7f0000000b40)=@can, 0x80, &(0x7f0000001100)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f0000000c80)=""/169, 0xa9}, {&(0x7f0000000d40)=""/229, 0xe5}, {&(0x7f0000000e40)=""/128, 0x80}, {&(0x7f0000000ec0)=""/48, 0x30}, {&(0x7f0000000f00)=""/137, 0x89}, {&(0x7f0000006000)=""/4096, 0x1000}, {&(0x7f0000007000)=""/4096, 0x1000}, {&(0x7f0000001080)=""/127, 0x7f}], 0x9, 0x0, 0x0, 0x1}, 0x0) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001200)={0x7, 0x4, 0x0, 0x4, 0x8, 0xffffffffffffffff, 0x9}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x1000000007, 0xcf2e, 0x7e, 0x20, 0x15, r1, 0x4}, 0x2c) socketpair(0x3, 0x80e, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r4, &(0x7f0000000200)={&(0x7f0000000fc0)=@pppol2tp={0x18, 0x1, {0x0, r3, {0x2, 0x4e20, @broadcast=0xffffffff}, 0x1, 0x3, 0x0, 0x2}}, 0x80, &(0x7f0000001580)=[{&(0x7f0000001240)="95c4dcff0f017b3c1979888e50f6c20a37b4edaffb28a3b609d24a8180434ab2fac426d3e4fc87e18267002be3cd56b11d69c4db739bf6a9c91af67ee87be1ea522993a368bdfc0df55539a60ef5515b4f03f3dbddae65cd66a90f030118870b473f156cb9a18624103000608c63f84b09ea89bfb8d8e7705c6ef456ef28adec5e566632ddd63098", 0x88}, {&(0x7f0000001380)="5745869bf3b6f562576761d821af2ad55c2f81345c810d6dbd43facd33c5107488aa7f04c5ab1302b820cd31405e9f657776a0d48e2225f39aabc3de0b30dc7422503b448ad89c23ebaee24ae9696e4e58eccae5febf47fff53dc1f03d869303acdef233746263c5c567e84edb166010fd23f56d6e84406bced5a00b5016b0c700fd76218ecf5da3527552a683eb87aa4b246cd74bcbeff8dedec74332e0214e4dc64cb7ac24c4447843caa7550375ef8e1f74a78c40a617e913a25e4837d24fb09e93eaa2", 0xc5}, {&(0x7f0000001480)="8247f46d4324760570d5078149dc5b38f7d1c592564148ecc6262e91c29cd4344e423ff476882993a2844af9a7c306a15e659a4cb9230b5139842c87ad8fa95c202146730fa610b141dfe4c7b771b46e4db879d2b92a01cb8642100d80a1d4658fd0df05c06c8615960a92b690c728e2603373657a9a46b2f200f2895198694d470ab95b6eb7a76ccee67c9219b4afa289d70c87cf22c733e00700f345136d59bcbd89ce7e110746f91e7a7661b8eb0afe54e3cb1c712441dd9a6ffb59a2eb58e5f5eabd4bec428fe27a403bb0d19125e473abdfea87a0c89108e3c876438a7c3f84bebad6cf858f26d2083efd60", 0xee}], 0x3, &(0x7f000000a000)=[{0x88, 0x112, 0xc2, "6671b4b66ac2fb4e14cee671813dc3834802e601529feb049ebb70880567948953018cfd53d7b1c9be27b1084adfba62040c7f889cfbc15407d93133259d9d5052bf6648a69218702e35278939ad399dc3ebed233c1792c7c1204353c8fe75ea0398f4aaf830834bc93873c119dddc539c"}, {0xe8, 0x6f180cc1befb202, 0x9, "4577f77fd3b3acd92c96feff8b0409afeae1c16fa3d367241c9679e5105141c7205d47ce27a418c10fbe7f601c3142e7b7b3a67322c9d345e0baf4315e13dc771a962ff445015c98a70b319d46ba59155d1cf07827804ea1ca86db74f3029bd60f6f365d955ec12be30102e59b4b3940152988ef09443df596bad9525f697fad61507e856c6acb744cfb034863943e811bd378843ccbd95f8221a444f4c323a391f5788559f34ac02e6e18065b87e8c962353623250694e5b4bf9bc1b00fadf2875995067ff6c18590c207f9a83f06665f5b5af77b4e"}, {0xa0, 0x10f, 0x5, "07c5972c79a30903d5d93f57c962c0351628551f6a3fbac8e18984ad9b8caeb403f1d588fa0b9955ce44d018cbcc06ad98b588dd45fd0ccd6b8d1965e70693ec76dd521aa2693829ef54059dc3191f2f4eca64c63f2f901ead2d6c54f0119212ebb77e956117d9130d3adff30a5598567fd540cf0a8f9f8c469ad15f209ad8ef161006831b39e4ddf2fcd748a8629e33"}], 0x210, 0x40}, 0x40) close(r0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)) recvmsg(r2, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) recvmsg$kcm(r4, &(0x7f0000001a00)={0x0, 0x0, &(0x7f00000018c0)=[{&(0x7f0000001600)=""/173, 0xad}, {&(0x7f0000001040)=""/25, 0x19}, {&(0x7f00000016c0)=""/132, 0x84}, {&(0x7f0000001780)=""/91, 0x5b}, {&(0x7f0000001800)=""/183, 0xb7}], 0x5, &(0x7f0000001940)=""/163, 0xa3, 0xe43}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000a80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r5}, 0x48) 2018/03/29 11:56:28 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x1e1, 0x100000000209e20, 0x8000000001, 0x5}, 0xfffffffffffffe20) r0 = getpid() r1 = perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0xfffffffffffffffc, 0x3, 0x8, 0x2, 0x0, 0x9, 0x10000, 0xc, 0x3d3, 0x80, 0x5, 0xfffffffffffffffc, 0x8, 0x3f, 0x5d, 0xbbb0, 0x20, 0x3, 0x8000, 0x100000000, 0x8, 0x9, 0x2, 0x4, 0x800, 0xf8, 0x3, 0x9, 0x1, 0x3, 0x8, 0x3, 0x7, 0x10001, 0xf16, 0x2, 0x0, 0x7fffffff, 0x4, @perf_bp={&(0x7f0000000780), 0x1}, 0x4080, 0x10001, 0xcc, 0x7, 0x3, 0xffff, 0x7fffffff}, 0xffffffffffffffff, 0xd, 0xffffffffffffff9c, 0x8) perf_event_open(&(0x7f0000000980)={0x4, 0x70, 0x6, 0x3f, 0x8e, 0x1, 0x0, 0x3, 0x404, 0x0, 0xbc2b, 0x40, 0x7, 0xffff, 0xffff, 0x9, 0x9de2, 0x9, 0x0, 0x3, 0x7f, 0xff, 0x40, 0x400, 0x9, 0x7fffffff, 0x80000000, 0x7, 0x8, 0x10001, 0x1f, 0x2778, 0x800, 0x8001, 0x101, 0x9, 0x8, 0x7ff, 0x0, 0x1000, 0x5, @perf_config_ext={0x3ff, 0xb69b}, 0x3040, 0x2, 0x2, 0x5, 0x7, 0x6, 0x7283ed73}, r0, 0xe, r1, 0x8) bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x0, 0x0, 0x7ffff9, 0x0, 0x20000003, 0x0}, 0x2c) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) r2 = gettid() r3 = perf_event_open(&(0x7f00000008c0)={0x7, 0x70, 0x1, 0x200, 0x3, 0xdbce, 0x0, 0x8, 0x1002, 0x1, 0xffffffffffffff00, 0x8, 0x1, 0xb3fa, 0x8, 0x0, 0x1, 0x2, 0x1000, 0x2, 0x401, 0x8, 0x3, 0x81, 0x0, 0x7, 0x2fc4, 0x882, 0x4, 0x8, 0x3, 0x81, 0x3, 0x7, 0x8857, 0x7, 0x5, 0x9, 0x0, 0x7, 0x1, @perf_config_ext={0x0, 0x80000000}, 0x400, 0x7f, 0x4, 0x7, 0x2, 0x7f, 0x200}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000840)={0x5, 0x70, 0xef, 0x2, 0x1000, 0xffffffff80000000, 0x0, 0x1a7800000000, 0x2000, 0x4, 0x5, 0x6814, 0x3a9, 0x5, 0x63b, 0x6, 0x8, 0x1000, 0x250420ee, 0x3, 0x0, 0x20, 0x6, 0x0, 0x4, 0x5, 0x4, 0x8, 0x3, 0x8, 0x52893dd5, 0x2, 0x2, 0x8, 0x44d, 0x1, 0x8, 0x6, 0x0, 0x100000000, 0x0, @perf_config_ext={0x9, 0x80}, 0x0, 0x0, 0x2b67, 0x6, 0x4b0, 0x81, 0x4}, r2, 0x5, r3, 0xb) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1003, 0x0) mount(&(0x7f00002b9ff8)='./file0\x00', &(0x7f0000cbeff8)='./file0\x00', &(0x7f00005f7ffa)='ramfs\x00', 0x80000, &(0x7f000002f000)) mount(&(0x7f0000000000)='.', &(0x7f0000000040)='.', &(0x7f0000000080)='cgroup\x00', 0x5010, &(0x7f00000000c0)) mount(&(0x7f0000377ff8)='.', &(0x7f0000000280)='.', &(0x7f0000000600)='nfs4\x00', 0x5010, &(0x7f0000000300)="2161893416a0c71070768c219eb114c3253c9f3baf4e9e8e9111c1a7fc6e266009fe27243deeaa22ca7ae9341f714300b5ee807e55d609036f2a3260475922bdfb2d2849f1c3b2ad3c051bd4f3751a177f77a92758c6d2b23fe7f1535b54e5846d11c135de8286066dec1b25f6e1378944ac5f7fce42d055821b5e19") perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xd68, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f0000014f88)={0x5, 0xfffffffffffffdc4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x46000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = getpid() perf_event_open(&(0x7f0000000680)={0x4, 0x70, 0x64, 0xffff, 0x1f, 0x4, 0x0, 0x1c3, 0x0, 0x1, 0x1, 0x9, 0x1ff, 0xfffffffffffffff8, 0x0, 0x0, 0x6, 0x7fffffff, 0x4, 0xffffffff, 0x80000001, 0xd0, 0x7, 0x1f, 0x0, 0x8, 0x9, 0x1ff, 0x8, 0x785, 0x4, 0xff, 0x2, 0x656, 0x5000000, 0x1, 0x460e3be0, 0x1, 0x0, 0x0, 0x7, @perf_bp={&(0x7f0000000640), 0x1}, 0x1000, 0xa, 0x7fff, 0x7, 0x3, 0x400, 0x9}, r5, 0xe, r4, 0x1) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', 0x0, 0x10}, 0x10) close(0xffffffffffffffff) bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)={&(0x7f0000000040)='./file0\x00', 0x0, 0x18}, 0x10) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000100)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0, 0x2e, &(0x7f0000000440), &(0x7f0000000140)=""/46, 0x4229}, 0x28) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000003480)={&(0x7f0000003300)=@can={0x0, 0x0}, 0x80, &(0x7f0000003400)=[{&(0x7f0000003380)=""/56, 0x38}, {&(0x7f00000033c0)=""/1, 0x1}], 0x2, &(0x7f0000003440)=""/33, 0x21, 0x1}, 0x40010000) bpf$PROG_LOAD(0x5, &(0x7f00000034c0)={0xe, 0x6, &(0x7f0000000940)=ANY=[@ANYBLOB="1800000002000000000000004ce700002555fdff00000000002371d07c9ba7f4a23372b0ad61000000000000009500000000000000"], &(0x7f00000007c0)='GPL\x00', 0x3, 0x2d, &(0x7f0000000800)=""/45, 0x40f00, 0x1, [], r6}, 0x48) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000740)={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x10) socketpair$inet(0x2, 0x0, 0x81, &(0x7f0000000240)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={0xffffffffffffffff, &(0x7f0000000500)="ae30f1bca1b4d3f69f1aac81517d42ad5980bc63b5008616a1f4724b9f8c1e4ecd8de336f57dd727cdaab04f0b40f28612615ad08de414711d841a88db33fd33884b627074213a0c5de3be2bbaec9207d9865c47f240467849979b5ab5632376608fc4be41a274abb2dc07cabe344a18db51048e5b0cbda843905a4258cdee3e649eddf104ba78894dce09747dcfe6a8d6d6d985520eeef448b83a8bcb83074541ba7a20d6094aa206c01a0690e5b3bfa05d475eb382b0199031d22bb26cde9b1ca0055eef9f6c4993b71ba19ba0590bb5efdaddaa574c25356ca890d138fc9fe0e975b6d5a1a8251503cd0a91845f9d95", &(0x7f0000000480)="9bc7741ea5e524cc8c6f748a73153834428729c45bf4ad446d2dddf1978baf431d0ba35b5442b5afe22db8b003650320200af7e1368ef7cdfa79ca8b9d3564363a5d2a502970314f2264c883bc8d990afc003e5adb95b30edad245c4420c8126f1d33db75ff0230698eaff90055e0f", 0x2}, 0x20) socketpair(0x0, 0x80003, 0xffff, &(0x7f0000000380)={0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r7, 0x50, &(0x7f00000003c0)}, 0x10) 2018/03/29 11:56:28 executing program 0: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000001a00)) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000001a40)={0xffffffffffffffff}) recvmsg$kcm(r1, &(0x7f0000000540)={&(0x7f00000000c0)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @broadcast}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000240)=""/65, 0x41}], 0x1, &(0x7f0000000440)=""/213, 0xd5}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x8983, &(0x7f0000000040)) socketpair(0x8, 0x2, 0x0, &(0x7f0000001d40)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000001c40)) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x800000000) r4 = getpid() perf_event_open(&(0x7f0000001bc0)={0x3, 0x70, 0x6, 0x22, 0x2, 0xf5, 0x0, 0x1, 0x20008, 0x4, 0x9, 0x9, 0x1, 0x6, 0x401, 0x7, 0x51, 0x0, 0x5, 0x1, 0x7, 0x6, 0x10001, 0x1000, 0x0, 0x7fff, 0x0, 0x3ff, 0x0, 0xd643, 0xffffffff, 0xfff, 0xf2f3, 0x9, 0x8d, 0x7, 0x1ff, 0x5, 0x0, 0x7fff, 0x6, @perf_config_ext={0xffffffff00000001, 0x1}, 0x1000, 0x2, 0x5, 0x6, 0x4, 0x80000000, 0xffffffffffffffc4}, r4, 0xc, r2, 0x1) r5 = perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x20, 0x0, 0x2, 0x7, 0x0, 0x400, 0x200, 0x5, 0x5000000000000000, 0x80000000, 0x401, 0x0, 0x6, 0x0, 0x7f, 0x0, 0x7, 0x2, 0x7fffffff, 0x6, 0xe5fa, 0x80, 0x6, 0x8, 0x0, 0x9, 0x5, 0x0, 0x0, 0x9, 0xd1, 0x6, 0xfffffffffffff801, 0x8, 0x6, 0x1ff, 0x0, 0x7, 0x4, @perf_config_ext={0x7, 0xfff}, 0x5020, 0xfff, 0x81, 0x7, 0x0, 0x7, 0x6}, r4, 0xa, r2, 0x1) r6 = gettid() r7 = perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x3, 0xc85, 0x3ff, 0x1, 0x0, 0x401, 0x80, 0x1, 0x712000000000000, 0x7, 0x56d29a0f, 0x1, 0xffffffff80000001, 0x2, 0x20, 0x7, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x9, 0x5, 0x1, 0x3e69b47c, 0x0, 0x7fff, 0x1, 0x5, 0x4f, 0x1000, 0x0, 0x4, 0x0, 0x0, 0x4, 0xffffffff, 0x0, 0x2, 0x2, @perf_config_ext={0xffffffffffffff81, 0x8}, 0x20200, 0xf88, 0x0, 0x1, 0x92d5, 0x1, 0x5}, r6, 0xd, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000280)=r3, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000380)='./file0\x00', r3}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f0000000080)='\x00') perf_event_open(&(0x7f0000000480)={0x1c218abbd1b2c600, 0x70, 0x5, 0x0, 0xe9d, 0x9, 0x0, 0x80000001, 0x1408, 0x0, 0x10001, 0x1ff, 0xfff, 0x80000000, 0x5, 0x3, 0x81, 0x6, 0x9151, 0x40, 0x2, 0xfda, 0x7, 0x3, 0x1, 0x100000000, 0x4, 0x2, 0xffffffffffffe17f, 0x2, 0x1, 0x3, 0x1, 0x0, 0x7, 0x2, 0x3, 0x7fff, 0x0, 0xfffffffffffffffb, 0x1, @perf_bp={&(0x7f0000000440), 0xf}, 0x1000, 0x1000, 0xb36, 0x7, 0x5f9, 0x8a, 0x40}, r6, 0xd, r7, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) recvmsg$kcm(r3, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a40), 0x3, &(0x7f0000000580)=""/195, 0xee, 0x2}, 0x2102) mount(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='udf\x00', 0x1000020, 0x0) mkdir(&(0x7f0000001f00)='./file0/file0/file0\x00', 0x1) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fusectl\x00', 0x4000, 0x0) mount(&(0x7f0000001d00)='./file1\x00', &(0x7f0000001d80)='./file0\x00', &(0x7f0000001dc0)='affs\x00', 0x800040, &(0x7f0000001e00)="39ef282caa985216c941be0013a569575f8b267468fe262194491b76dc736e1b4eb9e85bd685609c27f529ef08aff500d3910886a523046831d8c1731e93f35a150a5e2d31d2f90a1662699756b8408eb725f6b128416920a8111c2e5eb71e90008543ca6fd6e14006c64b644e6e73865ab19393ac4a2ca4ae2f83c961a534eda4a1b65dda0645296a5c171c92118a7319a700d9d422b0b720501f621e310a4ca0e1197ee66f7553b67ef1ddd0368e128eba449e35cef95b4a03b6a5c42a7e0292bf43e16df2e950d54cb7dd") socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000400)) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x1) perf_event_open(&(0x7f000000a000)={0x0, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/03/29 11:56:28 executing program 4 (fault-call:8 fault-nth:61): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x3, &(0x7f0000002000)=@framed={{0x18}, [], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000680)={0xffffffffffffffff, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x7}, 0x28) recvmsg(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000001c0)) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000100)=r0, 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) recvmsg(r3, &(0x7f00000011c0)={&(0x7f0000000b40)=@can, 0x80, &(0x7f0000001100)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f0000000c80)=""/169, 0xa9}, {&(0x7f0000000d40)=""/229, 0xe5}, {&(0x7f0000000e40)=""/128, 0x80}, {&(0x7f0000000ec0)=""/48, 0x30}, {&(0x7f0000000f00)=""/137, 0x89}, {&(0x7f0000006000)=""/4096, 0x1000}, {&(0x7f0000007000)=""/4096, 0x1000}, {&(0x7f0000001080)=""/127, 0x7f}, {&(0x7f0000008000)=""/4096, 0x1000}], 0xa, 0x0, 0x0, 0x1}, 0x2020) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001200)={0x7, 0x4, 0x0, 0x4, 0x8, 0xffffffffffffffff, 0x9}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x1000000007, 0xcf2e, 0x7e, 0x20, 0x15, r1, 0x4}, 0x2c) socketpair(0x3, 0x80e, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r4, &(0x7f0000000200)={&(0x7f0000000fc0)=@pppol2tp={0x18, 0x1, {0x0, r3, {0x2, 0x4e20, @broadcast=0xffffffff}, 0x1, 0x3, 0x0, 0x2}}, 0x80, &(0x7f0000001580)=[{&(0x7f0000001240)="95c4dcff0f017b3c1979888e50f6c20a37b4edaffb28a3b609d24a8180434ab2fac426d3e4fc87e18267002be3cd56b11d69c4db739bf6a9c91af67ee87be1ea522993a368bdfc0df55539a60ef5515b4f03f3dbddae65cd66a90f030118870b473f156cb9a18624103000608c63f84b09ea89bfb8d8e7705c6ef456ef28adec5e566632ddd63098", 0x88}, {&(0x7f0000001380)="5745869bf3b6f562576761d821af2ad55c2f81345c810d6dbd43facd33c5107488aa7f04c5ab1302b820cd31405e9f657776a0d48e2225f39aabc3de0b30dc7422503b448ad89c23ebaee24ae9696e4e58eccae5febf47fff53dc1f03d869303acdef233746263c5c567e84edb166010fd23f56d6e84406bced5a00b5016b0c700fd76218ecf5da3527552a683eb87aa4b246cd74bcbeff8dedec74332e0214e4dc64cb7ac24c4447843caa7550375ef8e1f74a78c40a617e913a25e4837d24fb09e93eaa2", 0xc5}, {&(0x7f0000001480)="8247f46d4324760570d5078149dc5b38f7d1c592564148ecc6262e91c29cd4344e423ff476882993a2844af9a7c306a15e659a4cb9230b5139842c87ad8fa95c202146730fa610b141dfe4c7b771b46e4db879d2b92a01cb8642100d80a1d4658fd0df05c06c8615960a92b690c728e2603373657a9a46b2f200f2895198694d470ab95b6eb7a76ccee67c9219b4afa289d70c87cf22c733e00700f345136d59bcbd89ce7e110746f91e7a7661b8eb0afe54e3cb1c712441dd9a6ffb59a2eb58e5f5eabd4bec428fe27a403bb0d19125e473abdfea87a0c89108e3c876438a7c3f84bebad6cf858f26d2083efd60", 0xee}], 0x3, &(0x7f000000a000)=[{0x88, 0x112, 0xc2, "6671b4b66ac2fb4e14cee671813dc3834802e601529feb049ebb70880567948953018cfd53d7b1c9be27b1084adfba62040c7f889cfbc15407d93133259d9d5052bf6648a69218702e35278939ad399dc3ebed233c1792c7c1204353c8fe75ea0398f4aaf830834bc93873c119dddc539c"}, {0xe8, 0x6f180cc1befb202, 0x9, "4577f77fd3b3acd92c96feff8b0409afeae1c16fa3d367241c9679e5105141c7205d47ce27a418c10fbe7f601c3142e7b7b3a67322c9d345e0baf4315e13dc771a962ff445015c98a70b319d46ba59155d1cf07827804ea1ca86db74f3029bd60f6f365d955ec12be30102e59b4b3940152988ef09443df596bad9525f697fad61507e856c6acb744cfb034863943e811bd378843ccbd95f8221a444f4c323a391f5788559f34ac02e6e18065b87e8c962353623250694e5b4bf9bc1b00fadf2875995067ff6c18590c207f9a83f06665f5b5af77b4e"}, {0xa0, 0x10f, 0x5, "07c5972c79a30903d5d93f57c962c0351628551f6a3fbac8e18984ad9b8caeb403f1d588fa0b9955ce44d018cbcc06ad98b588dd45fd0ccd6b8d1965e70693ec76dd521aa2693829ef54059dc3191f2f4eca64c63f2f901ead2d6c54f0119212ebb77e956117d9130d3adff30a5598567fd540cf0a8f9f8c469ad15f209ad8ef161006831b39e4ddf2fcd748a8629e33"}], 0x210, 0x40}, 0x40) close(r0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b53596090ebcc07d8584f358be88fafe") recvmsg(r2, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) recvmsg$kcm(r4, &(0x7f0000001a00)={0x0, 0x0, &(0x7f00000018c0)=[{&(0x7f0000001600)=""/173, 0xad}, {&(0x7f0000001040)=""/25, 0x19}, {&(0x7f00000016c0)=""/132, 0x84}, {&(0x7f0000001780)=""/91, 0x5b}, {&(0x7f0000001800)=""/183, 0xb7}], 0x5, &(0x7f0000001940)=""/163, 0xa3, 0xe43}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000a80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r5}, 0x48) 2018/03/29 11:56:28 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x3, &(0x7f0000002000)=@framed={{0x18}, [], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000680)={0xffffffffffffffff, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x7}, 0x28) recvmsg(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000001c0)) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000100), 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) recvmsg(r3, &(0x7f00000011c0)={&(0x7f0000000b40)=@can, 0x80, &(0x7f0000001100)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f0000000c80)=""/169, 0xa9}, {&(0x7f0000000e40)=""/128, 0x80}, {&(0x7f0000000ec0)=""/48, 0x30}, {&(0x7f0000000f00)=""/137, 0x89}, {&(0x7f0000006000)=""/4096, 0x1000}, {&(0x7f0000007000)=""/4096, 0x1000}, {&(0x7f0000001080)=""/127, 0x7f}, {&(0x7f0000008000)=""/4096, 0x1000}], 0x9, 0x0, 0x0, 0x1}, 0x2020) bpf$MAP_CREATE(0x0, &(0x7f0000001200)={0x7, 0x4, 0x0, 0x4, 0x8, 0xffffffffffffffff, 0x9}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x1000000007, 0xcf2e, 0x7e, 0x20, 0x15, r1, 0x4}, 0x2c) socketpair(0x3, 0x80e, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r4, &(0x7f0000000200)={&(0x7f0000000fc0)=@pppol2tp={0x18, 0x1, {0x0, r3, {0x2, 0x4e20, @broadcast=0xffffffff}, 0x1, 0x3, 0x0, 0x2}}, 0x80, &(0x7f0000001580)=[{&(0x7f0000001240)="95c4dcff0f017b3c1979888e50f6c20a37b4edaffb28a3b609d24a8180434ab2fac426d3e4fc87e18267002be3cd56b11d69c4db739bf6a9c91af67ee87be1ea522993a368bdfc0df55539a60ef5515b4f03f3dbddae65cd66a90f030118870b473f156cb9a18624103000608c63f84b09ea89bfb8d8e7705c6ef456ef28adec5e566632ddd63098", 0x88}, {&(0x7f0000001380)="5745869bf3b6f562576761d821af2ad55c2f81345c810d6dbd43facd33c5107488aa7f04c5ab1302b820cd31405e9f657776a0d48e2225f39aabc3de0b30dc7422503b448ad89c23ebaee24ae9696e4e58eccae5febf47fff53dc1f03d869303acdef233746263c5c567e84edb166010fd23f56d6e84406bced5a00b5016b0c700fd76218ecf5da3527552a683eb87aa4b246cd74bcbeff8dedec74332e0214e4dc64cb7ac24c4447843caa7550375ef8e1f74a78c40a617e913a25e4837d24fb09e93eaa2", 0xc5}, {&(0x7f0000001480)="8247f46d4324760570d5078149dc5b38f7d1c592564148ecc6262e91c29cd4344e423ff476882993a2844af9a7c306a15e659a4cb9230b5139842c87ad8fa95c202146730fa610b141dfe4c7b771b46e4db879d2b92a01cb8642100d80a1d4658fd0df05c06c8615960a92b690c728e2603373657a9a46b2f200f2895198694d470ab95b6eb7a76ccee67c9219b4afa289d70c87cf22c733e00700f345136d59bcbd89ce7e110746f91e7a7661b8eb0afe54e3cb1c712441dd9a6ffb59a2eb58e5f5eabd4bec428fe27a403bb0d19125e473abdfea87a0c89108e3c876438a7c3f84bebad6cf858f26d2083efd60", 0xee}], 0x3, &(0x7f000000a000)=[{0x88, 0x112, 0xc2, "6671b4b66ac2fb4e14cee671813dc3834802e601529feb049ebb70880567948953018cfd53d7b1c9be27b1084adfba62040c7f889cfbc15407d93133259d9d5052bf6648a69218702e35278939ad399dc3ebed233c1792c7c1204353c8fe75ea0398f4aaf830834bc93873c119dddc539c"}, {0xe8, 0x6f180cc1befb202, 0x9, "4577f77fd3b3acd92c96feff8b0409afeae1c16fa3d367241c9679e5105141c7205d47ce27a418c10fbe7f601c3142e7b7b3a67322c9d345e0baf4315e13dc771a962ff445015c98a70b319d46ba59155d1cf07827804ea1ca86db74f3029bd60f6f365d955ec12be30102e59b4b3940152988ef09443df596bad9525f697fad61507e856c6acb744cfb034863943e811bd378843ccbd95f8221a444f4c323a391f5788559f34ac02e6e18065b87e8c962353623250694e5b4bf9bc1b00fadf2875995067ff6c18590c207f9a83f06665f5b5af77b4e"}, {0xa0, 0x10f, 0x5, "07c5972c79a30903d5d93f57c962c0351628551f6a3fbac8e18984ad9b8caeb403f1d588fa0b9955ce44d018cbcc06ad98b588dd45fd0ccd6b8d1965e70693ec76dd521aa2693829ef54059dc3191f2f4eca64c63f2f901ead2d6c54f0119212ebb77e956117d9130d3adff30a5598567fd540cf0a8f9f8c469ad15f209ad8ef161006831b39e4ddf2fcd748a8629e33"}], 0x210, 0x40}, 0x40) close(r0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)) recvmsg(r2, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) recvmsg$kcm(r4, &(0x7f0000001a00)={0x0, 0x0, &(0x7f00000018c0)=[{&(0x7f0000001600)=""/173, 0xad}, {&(0x7f0000001040)=""/25, 0x19}, {&(0x7f00000016c0)=""/132, 0x84}, {&(0x7f0000001780)=""/91, 0x5b}, {&(0x7f0000001800)=""/183, 0xb7}], 0x5, &(0x7f0000001940)=""/163, 0xa3, 0xe43}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000a80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r5}, 0x48) 2018/03/29 11:56:28 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x3, &(0x7f0000002000)=@framed={{0x18}, [], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000680)={0xffffffffffffffff, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x7}, 0x28) recvmsg(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x7, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000100)=r0, 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) recvmsg(r2, &(0x7f00000011c0)={&(0x7f0000000b40)=@can, 0x80, &(0x7f0000001100)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f0000000c80)=""/169, 0xa9}, {&(0x7f0000000d40)=""/229, 0xe5}, {&(0x7f0000000e40)=""/128, 0x80}, {&(0x7f0000000ec0)=""/48, 0x30}, {&(0x7f0000000f00)=""/137, 0x89}, {&(0x7f0000006000)=""/4096, 0x1000}, {&(0x7f0000007000)=""/4096, 0x1000}, {&(0x7f0000001080)=""/127, 0x7f}, {&(0x7f0000008000)=""/4096, 0x1000}], 0xa, 0x0, 0x0, 0x1}, 0x2020) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001200)={0x7, 0x4, 0x0, 0x4, 0x8, 0xffffffffffffffff, 0x9}, 0x2c) socketpair(0x3, 0x80e, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r3, &(0x7f0000000200)={&(0x7f0000000fc0)=@pppol2tp={0x18, 0x1, {0x0, r2, {0x2, 0x4e20, @broadcast=0xffffffff}, 0x1, 0x3, 0x0, 0x2}}, 0x80, &(0x7f0000001580)=[{&(0x7f0000001240)="95c4dcff0f017b3c1979888e50f6c20a37b4edaffb28a3b609d24a8180434ab2fac426d3e4fc87e18267002be3cd56b11d69c4db739bf6a9c91af67ee87be1ea522993a368bdfc0df55539a60ef5515b4f03f3dbddae65cd66a90f030118870b473f156cb9a18624103000608c63f84b09ea89bfb8d8e7705c6ef456ef28adec5e566632ddd63098", 0x88}, {&(0x7f0000001380)="5745869bf3b6f562576761d821af2ad55c2f81345c810d6dbd43facd33c5107488aa7f04c5ab1302b820cd31405e9f657776a0d48e2225f39aabc3de0b30dc7422503b448ad89c23ebaee24ae9696e4e58eccae5febf47fff53dc1f03d869303acdef233746263c5c567e84edb166010fd23f56d6e84406bced5a00b5016b0c700fd76218ecf5da3527552a683eb87aa4b246cd74bcbeff8dedec74332e0214e4dc64cb7ac24c4447843caa7550375ef8e1f74a78c40a617e913a25e4837d24fb09e93eaa2", 0xc5}, {&(0x7f0000001480)="8247f46d4324760570d5078149dc5b38f7d1c592564148ecc6262e91c29cd4344e423ff476882993a2844af9a7c306a15e659a4cb9230b5139842c87ad8fa95c202146730fa610b141dfe4c7b771b46e4db879d2b92a01cb8642100d80a1d4658fd0df05c06c8615960a92b690c728e2603373657a9a46b2f200f2895198694d470ab95b6eb7a76ccee67c9219b4afa289d70c87cf22c733e00700f345136d59bcbd89ce7e110746f91e7a7661b8eb0afe54e3cb1c712441dd9a6ffb59a2eb58e5f5eabd4bec428fe27a403bb0d19125e473abdfea87a0c89108e3c876438a7c3f84bebad6cf858f26d2083efd60", 0xee}], 0x3, &(0x7f000000a000)=[{0x88, 0x112, 0xc2, "6671b4b66ac2fb4e14cee671813dc3834802e601529feb049ebb70880567948953018cfd53d7b1c9be27b1084adfba62040c7f889cfbc15407d93133259d9d5052bf6648a69218702e35278939ad399dc3ebed233c1792c7c1204353c8fe75ea0398f4aaf830834bc93873c119dddc539c"}, {0xe8, 0x6f180cc1befb202, 0x9, "4577f77fd3b3acd92c96feff8b0409afeae1c16fa3d367241c9679e5105141c7205d47ce27a418c10fbe7f601c3142e7b7b3a67322c9d345e0baf4315e13dc771a962ff445015c98a70b319d46ba59155d1cf07827804ea1ca86db74f3029bd60f6f365d955ec12be30102e59b4b3940152988ef09443df596bad9525f697fad61507e856c6acb744cfb034863943e811bd378843ccbd95f8221a444f4c323a391f5788559f34ac02e6e18065b87e8c962353623250694e5b4bf9bc1b00fadf2875995067ff6c18590c207f9a83f06665f5b5af77b4e"}, {0xa0, 0x10f, 0x5, "07c5972c79a30903d5d93f57c962c0351628551f6a3fbac8e18984ad9b8caeb403f1d588fa0b9955ce44d018cbcc06ad98b588dd45fd0ccd6b8d1965e70693ec76dd521aa2693829ef54059dc3191f2f4eca64c63f2f901ead2d6c54f0119212ebb77e956117d9130d3adff30a5598567fd540cf0a8f9f8c469ad15f209ad8ef161006831b39e4ddf2fcd748a8629e33"}], 0x210, 0x40}, 0x40) close(r0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)) recvmsg(r1, &(0x7f00000267c0)={&(0x7f00000251c0)=@can, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) 2018/03/29 11:56:28 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x1e1, 0x100000000209e20, 0x8000000001, 0x5}, 0xfffffffffffffe20) r0 = getpid() r1 = perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0xfffffffffffffffc, 0x3, 0x0, 0x2, 0x0, 0x9, 0x10000, 0xc, 0x3d3, 0x80, 0x5, 0xfffffffffffffffc, 0x8, 0x3f, 0x5d, 0xbbb0, 0x20, 0x3, 0x8000, 0x100000000, 0x8, 0x9, 0x2, 0x4, 0x800, 0xf8, 0x3, 0x9, 0x1, 0x3, 0x8, 0x3, 0x7, 0x10001, 0xf16, 0x2, 0x0, 0x7fffffff, 0x4, @perf_bp={&(0x7f0000000780), 0x1}, 0x4080, 0x10001, 0xcc, 0x7, 0x3, 0xffff, 0x7fffffff}, 0xffffffffffffffff, 0xd, 0xffffffffffffff9c, 0x8) perf_event_open(&(0x7f0000000980)={0x4, 0x70, 0x6, 0x3f, 0x8e, 0x1, 0x0, 0x3, 0x404, 0x0, 0xbc2b, 0x40, 0x7, 0xffff, 0xffff, 0x9, 0x9de2, 0x9, 0x0, 0x3, 0x7f, 0xff, 0x40, 0x400, 0x9, 0x7fffffff, 0x80000000, 0x7, 0x8, 0x10001, 0x1f, 0x2778, 0x800, 0x8001, 0x101, 0x9, 0x8, 0x7ff, 0x0, 0x1000, 0x5, @perf_config_ext={0x3ff, 0xb69b}, 0x3040, 0x2, 0x2, 0x5, 0x7, 0x6, 0x7283ed73}, r0, 0xe, r1, 0x8) bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x0, 0x0, 0x7ffff9, 0x0, 0x20000003, 0x0}, 0x2c) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) r2 = gettid() r3 = perf_event_open(&(0x7f00000008c0)={0x7, 0x70, 0x1, 0x200, 0x3, 0xdbce, 0x0, 0x8, 0x1002, 0x1, 0xffffffffffffff00, 0x8, 0x1, 0xb3fa, 0x8, 0x0, 0x1, 0x2, 0x1000, 0x2, 0x401, 0x8, 0x3, 0x81, 0x0, 0x7, 0x2fc4, 0x882, 0x4, 0x8, 0x3, 0x81, 0x3, 0x7, 0x8857, 0x7, 0x5, 0x9, 0x0, 0x7, 0x1, @perf_config_ext={0x0, 0x80000000}, 0x400, 0x7f, 0x4, 0x7, 0x2, 0x7f, 0x200}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000840)={0x5, 0x70, 0xef, 0x2, 0x1000, 0xffffffff80000000, 0x0, 0x1a7800000000, 0x2000, 0x4, 0x5, 0x6814, 0x3a9, 0x5, 0x63b, 0x6, 0x8, 0x1000, 0x250420ee, 0x3, 0x0, 0x20, 0x6, 0x0, 0x4, 0x5, 0x4, 0x8, 0x3, 0x8, 0x52893dd5, 0x2, 0x2, 0x8, 0x44d, 0x1, 0x8, 0x6, 0x0, 0x100000000, 0x0, @perf_config_ext={0x9, 0x80}, 0x0, 0x0, 0x2b67, 0x6, 0x4b0, 0x81, 0x4}, r2, 0x5, r3, 0xb) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1003, 0x0) mount(&(0x7f00002b9ff8)='./file0\x00', &(0x7f0000cbeff8)='./file0\x00', &(0x7f00005f7ffa)='ramfs\x00', 0x80000, &(0x7f000002f000)) mount(&(0x7f0000000000)='.', &(0x7f0000000040)='.', &(0x7f0000000080)='cgroup\x00', 0x5010, &(0x7f00000000c0)) mount(&(0x7f0000377ff8)='.', &(0x7f0000000280)='.', &(0x7f0000000600)='nfs4\x00', 0x5010, &(0x7f0000000300)="2161893416a0c71070768c219eb114c3253c9f3baf4e9e8e9111c1a7fc6e266009fe27243deeaa22ca7ae9341f714300b5ee807e55d609036f2a3260475922bdfb2d2849f1c3b2ad3c051bd4f3751a177f77a92758c6d2b23fe7f1535b54e5846d11c135de8286066dec1b25f6e1378944ac5f7fce42d055821b5e19") perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xd68, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f0000014f88)={0x5, 0xfffffffffffffdc4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x46000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = getpid() perf_event_open(&(0x7f0000000680)={0x4, 0x70, 0x64, 0xffff, 0x1f, 0x4, 0x0, 0x1c3, 0x0, 0x1, 0x1, 0x9, 0x1ff, 0xfffffffffffffff8, 0x0, 0x0, 0x6, 0x7fffffff, 0x0, 0xffffffff, 0x80000001, 0xd0, 0x7, 0x1f, 0x0, 0x8, 0x9, 0x1ff, 0x8, 0x785, 0x4, 0xff, 0x2, 0x656, 0x5000000, 0x1, 0x460e3be0, 0x1, 0x0, 0x0, 0x7, @perf_bp={&(0x7f0000000640), 0x1}, 0x1000, 0xa, 0x7fff, 0x7, 0x3, 0x400, 0x9}, r5, 0xe, r4, 0x1) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', 0x0, 0x10}, 0x10) close(0xffffffffffffffff) bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)={&(0x7f0000000040)='./file0\x00', 0x0, 0x18}, 0x10) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000100)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0, 0x2e, &(0x7f0000000440), &(0x7f0000000140)=""/46, 0x4229}, 0x28) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000003480)={&(0x7f0000003300)=@can={0x0, 0x0}, 0x80, &(0x7f0000003400)=[{&(0x7f0000003380)=""/56, 0x38}, {&(0x7f00000033c0)=""/1, 0x1}], 0x2, &(0x7f0000003440)=""/33, 0x21, 0x1}, 0x40010000) bpf$PROG_LOAD(0x5, &(0x7f00000034c0)={0xe, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="1800000002000000000000004ce700002555fdff00000000002371d07c9ba7f4a23372b0ad61000000000000009500000000000000"], &(0x7f00000007c0)='GPL\x00', 0x3, 0x2d, &(0x7f0000000800)=""/45, 0x40f00, 0x1, [], r6}, 0x48) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000740)={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x10) socketpair$inet(0x2, 0x80a, 0x81, &(0x7f0000000240)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={0xffffffffffffffff, &(0x7f0000000500)="ae30f1bca1b4d3f69f1aac81517d42ad5980bc63b5008616a1f4724b9f8c1e4ecd8de336f57dd727cdaab04f0b40f28612615ad08de414711d841a88db33fd33884b627074213a0c5de3be2bbaec9207d9865c47f240467849979b5ab5632376608fc4be41a274abb2dc07cabe344a18db51048e5b0cbda843905a4258cdee3e649eddf104ba78894dce09747dcfe6a8d6d6d985520eeef448b83a8bcb83074541ba7a20d6094aa206c01a0690e5b3bfa05d475eb382b0199031d22bb26cde9b1ca0055eef9f6c4993b71ba19ba0590bb5efdaddaa574c25356ca890d138fc9fe0e975b6d5a1a8251503cd0a91845f9d95", &(0x7f0000000480)="9bc7741ea5e524cc8c6f748a73153834428729c45bf4ad446d2dddf1978baf431d0ba35b5442b5afe22db8b003650320200af7e1368ef7cdfa79ca8b9d3564363a5d2a502970314f2264c883bc8d990afc003e5adb95b30edad245c4420c8126f1d33db75ff0230698eaff90055e0f", 0x2}, 0x20) socketpair(0x0, 0x80003, 0xffff, &(0x7f0000000380)={0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r7, 0x50, &(0x7f00000003c0)}, 0x10) 2018/03/29 11:56:28 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x3, &(0x7f0000002000)=@framed={{0x18}, [], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000680)={0xffffffffffffffff, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x7}, 0x28) recvmsg(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x7, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000100)=r0, 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) recvmsg(r2, &(0x7f00000011c0)={&(0x7f0000000b40)=@can, 0x80, &(0x7f0000001100)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f0000000c80)=""/169, 0xa9}, {&(0x7f0000000d40)=""/229, 0xe5}, {&(0x7f0000000e40)=""/128, 0x80}, {&(0x7f0000000ec0)=""/48, 0x30}, {&(0x7f0000000f00)=""/137, 0x89}, {&(0x7f0000006000)=""/4096, 0x1000}, {&(0x7f0000007000)=""/4096, 0x1000}, {&(0x7f0000001080)=""/127, 0x7f}, {&(0x7f0000008000)=""/4096, 0x1000}], 0xa, 0x0, 0x0, 0x1}, 0x2020) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001200)={0x7, 0x4, 0x0, 0x4, 0x8, 0xffffffffffffffff, 0x9}, 0x2c) socketpair(0x3, 0x80e, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r3, &(0x7f0000000200)={&(0x7f0000000fc0)=@pppol2tp={0x18, 0x1, {0x0, r2, {0x2, 0x4e20, @broadcast=0xffffffff}, 0x1, 0x3, 0x0, 0x2}}, 0x80, &(0x7f0000001580)=[{&(0x7f0000001240)="95c4dcff0f017b3c1979888e50f6c20a37b4edaffb28a3b609d24a8180434ab2fac426d3e4fc87e18267002be3cd56b11d69c4db739bf6a9c91af67ee87be1ea522993a368bdfc0df55539a60ef5515b4f03f3dbddae65cd66a90f030118870b473f156cb9a18624103000608c63f84b09ea89bfb8d8e7705c6ef456ef28adec5e566632ddd63098", 0x88}, {&(0x7f0000001380)="5745869bf3b6f562576761d821af2ad55c2f81345c810d6dbd43facd33c5107488aa7f04c5ab1302b820cd31405e9f657776a0d48e2225f39aabc3de0b30dc7422503b448ad89c23ebaee24ae9696e4e58eccae5febf47fff53dc1f03d869303acdef233746263c5c567e84edb166010fd23f56d6e84406bced5a00b5016b0c700fd76218ecf5da3527552a683eb87aa4b246cd74bcbeff8dedec74332e0214e4dc64cb7ac24c4447843caa7550375ef8e1f74a78c40a617e913a25e4837d24fb09e93eaa2", 0xc5}, {&(0x7f0000001480)="8247f46d4324760570d5078149dc5b38f7d1c592564148ecc6262e91c29cd4344e423ff476882993a2844af9a7c306a15e659a4cb9230b5139842c87ad8fa95c202146730fa610b141dfe4c7b771b46e4db879d2b92a01cb8642100d80a1d4658fd0df05c06c8615960a92b690c728e2603373657a9a46b2f200f2895198694d470ab95b6eb7a76ccee67c9219b4afa289d70c87cf22c733e00700f345136d59bcbd89ce7e110746f91e7a7661b8eb0afe54e3cb1c712441dd9a6ffb59a2eb58e5f5eabd4bec428fe27a403bb0d19125e473abdfea87a0c89108e3c876438a7c3f84bebad6cf858f26d2083efd60", 0xee}], 0x3, &(0x7f000000a000)=[{0x88, 0x112, 0xc2, "6671b4b66ac2fb4e14cee671813dc3834802e601529feb049ebb70880567948953018cfd53d7b1c9be27b1084adfba62040c7f889cfbc15407d93133259d9d5052bf6648a69218702e35278939ad399dc3ebed233c1792c7c1204353c8fe75ea0398f4aaf830834bc93873c119dddc539c"}, {0xe8, 0x6f180cc1befb202, 0x9, "4577f77fd3b3acd92c96feff8b0409afeae1c16fa3d367241c9679e5105141c7205d47ce27a418c10fbe7f601c3142e7b7b3a67322c9d345e0baf4315e13dc771a962ff445015c98a70b319d46ba59155d1cf07827804ea1ca86db74f3029bd60f6f365d955ec12be30102e59b4b3940152988ef09443df596bad9525f697fad61507e856c6acb744cfb034863943e811bd378843ccbd95f8221a444f4c323a391f5788559f34ac02e6e18065b87e8c962353623250694e5b4bf9bc1b00fadf2875995067ff6c18590c207f9a83f06665f5b5af77b4e"}, {0xa0, 0x10f, 0x5, "07c5972c79a30903d5d93f57c962c0351628551f6a3fbac8e18984ad9b8caeb403f1d588fa0b9955ce44d018cbcc06ad98b588dd45fd0ccd6b8d1965e70693ec76dd521aa2693829ef54059dc3191f2f4eca64c63f2f901ead2d6c54f0119212ebb77e956117d9130d3adff30a5598567fd540cf0a8f9f8c469ad15f209ad8ef161006831b39e4ddf2fcd748a8629e33"}], 0x210, 0x40}, 0x40) close(r0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)) recvmsg(r1, &(0x7f00000267c0)={&(0x7f00000251c0)=@can, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) 2018/03/29 11:56:28 executing program 3: r0 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x10}, 0x10) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000000c0)={0x0, 0x1000, 0x8}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000080)='./file0\x00', r1}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0x0, 0x8}, 0x10) mount(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='cpuset\x00', 0x40, &(0x7f0000000280)="8a4562cb6a7df38be32246afcaef1e1a3f933cb428242c55c117c0fbbd62cea0aab31f2665fb88267466eca314fc8cafd72cc24143121c0691236768fad66390bf9b55014c2bd49faa5388cbabd52e730eeb4ccc411bacd296e423d971043756cf2b35a4063f2a7465b44a60ef31ae437f6160ed2f63afa62c36a27c33e4779e7c0404e337abc025bb2e4b39cc265573c6ab1a3ff09c7ad6bb4631a4") mount(&(0x7f0000000340)='./file1\x00', &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='devtmpfs\x00', 0x40, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xb, 0x7f, 0x0, 0x1, 0x12, r1, 0x100000000}, 0x2c) mkdir(&(0x7f0000000440)='./file1\x00', 0x20) mount(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='iso9660\x00', 0x8, &(0x7f0000000540)="650fe6ccea2b17860de967406c566ec16fe5a7a4c064707e22906e9d3d2a70b4") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000005c0)={r2, 0x28, &(0x7f0000000580)={0x0, 0x0}}, 0x10) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={r3, 0x8, 0x10}, 0xc) mount(&(0x7f0000000640)='./file1\x00', &(0x7f0000000680)='./file1\x00', &(0x7f00000006c0)='pstore\x00', 0x1000000, &(0x7f0000000700)="f48afa3ab3cc319f917be52b04c388c229578537782bc5ffc32c7747b1d28999ad89f5fba460640a324385ac03cccef4553d641b91d79d014804a98e72796f8eb2e1a7056efeaa63404648df67079ae817420f248ccf9d01e7a027c600c71777fb9ebc97da60f3d1a287ef8bc00f1dc68c3b1f0c1836cde5b62be45dd58c3415cbb0f916fe3c04fc69911e2bec15c208d023bdb608fa727657c532bd5101a2a36b34c4eb65f855fea2d6f8a0a79b15ecef1a4c81a8f6f5ed57b09db2ab482413540416126718f2a33ed21346ded20b084a8dc10702ec279fc486b5c57c163d") socketpair(0x3, 0x2, 0x1f, &(0x7f0000001c40)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$kcm(r6, &(0x7f0000004300)={0x0, 0x0, &(0x7f0000004140)=[{&(0x7f0000001c80)=""/139, 0x8b}, {&(0x7f0000001d40)=""/149, 0x95}, {&(0x7f0000001e00)=""/188, 0xbc}, {&(0x7f0000001ec0)=""/69, 0x45}, {&(0x7f0000001f40)=""/165, 0xa5}, {&(0x7f0000002000)=""/4096, 0x1000}, {&(0x7f0000003000)=""/42, 0x2a}, {&(0x7f0000003040)=""/4096, 0x1000}, {&(0x7f0000004040)=""/233, 0xe9}], 0x9, &(0x7f0000004200)=""/236, 0xec, 0xe00}, 0x40) mount(&(0x7f0000004340)='./file1/file0\x00', &(0x7f0000004380)='./file1\x00', &(0x7f00000043c0)='ceph\x00', 0x4860, &(0x7f0000004400)="2c8eb517dd302be26597065442d58f3f345c295b542b2b1df3046ae176") bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000004600)={r6, &(0x7f0000004440)="903685b47b9c4d5c1dffcefa6a92cd57ccdfaf1af0be272f1cb4a5b86ab9d1ef248a63f04f5d59c2cd6e6b7722f5ff866c5d353014f28baaa95bce06a787a3e085102126a0386ffd4e136d472f2cdfb7c658643d2792b7235e2ec8c782080850c20eb00014eab035d7d56c8ddd0d7fdc4c21602d480e4accea0867cc5b4172b46b8f028bd623c58544092396dbda704543cd7c93219ff7f4caf9d0c12fc32c65ddac48ba22321d2c7ef1152f0dd87ed22cb30eb2b24d381b3abaefc114ad4c08e329cfbce60e0549ca", &(0x7f0000004540)="38859653237c5c9685cf2e44e1eea64846e190b778f29b06c26c2f2b8a0800f9fc2019b05290fc5c82f612eb7f479918015eb3af93cc57f01db731e129275ce05910f66e436ef09a8fe7bf22f960eacec350a7f7e9e9a47cb163f467b6a29523346a4c61d65d2235c73095a53929d509538f640424133cfa3617b41a51aa7172460146433abbe604f2c92827fabd5d3134d36b4cecd0fd2549f3527615f9eb63dd9332021e4eff13ad6aa509db21ed98745d00cb36e547", 0x3}, 0x20) mkdir(&(0x7f0000004640)='./file1/file0\x00', 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000004680)={0x0, 0x0, 0xa6, 0x3, 0x4}, 0x2c) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000046c0)=0x7, 0x4) recvmsg$kcm(r6, &(0x7f00000058c0)={&(0x7f0000004700)=@alg, 0x80, &(0x7f0000005880)=[{&(0x7f0000004780)=""/4096, 0x1000}, {&(0x7f0000005780)=""/219, 0xdb}], 0x2, 0x0, 0x0, 0x100000001}, 0x40000000) r7 = gettid() r8 = perf_event_open(&(0x7f0000005900)={0x7, 0x70, 0x0, 0xfffffffffffffff7, 0x9, 0x4, 0x0, 0x7, 0x100, 0x8, 0x100000000, 0x8000, 0x8, 0x6, 0x0, 0x6, 0x10001, 0x9, 0x1f, 0x2, 0x1, 0x3, 0x1, 0x1f, 0x23, 0x1, 0xaa4, 0x5, 0x4, 0x200, 0x6, 0x9, 0xfffffffffffffffb, 0x3, 0x3, 0xff, 0x80000000, 0x0, 0x0, 0xffffffffffffff9d, 0x2, @perf_config_ext={0x7, 0x9}, 0x100, 0x8, 0x2, 0x6, 0x4, 0x6, 0xf71}, r7, 0x9, r6, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f00000059c0)={&(0x7f0000005980)='./file0\x00'}, 0x10) ioctl$sock_kcm_SIOCKCMATTACH(r5, 0x89e0, &(0x7f0000005a00)={r5, r0}) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000005c00)={r4, &(0x7f0000005a40)="313befc1e9ac680c4369983530ee783c4f018c38e134b4b0aebd06ede05f238850949c0f5d32ab19889f880e87e3a0fa5a43500affdcc508d56f3a4df6c159ca9cfa62124b79b4607d42738dc5e16d09ea2c6a2346fc2360feff08d9f464dfdebce2cb99d4ba8e5fc37edfba041f14e16a68192d7d8687404ee7318323520188c4e5d52e8c7ec40bd0823fb210e530c74ea842bd8bacbc48317b0b6ed12528ecd30e1af83b8049df791ff7affe91ab54", &(0x7f0000005b00)=""/243}, 0x18) mount(&(0x7f0000005c40)='./file1/file0\x00', &(0x7f0000005c80)='./file1\x00', &(0x7f0000005cc0)='btrfs\x00', 0x0, 0x0) recvmsg(r5, &(0x7f00000073c0)={&(0x7f0000005d00)=@sco, 0x80, &(0x7f0000007300)=[{&(0x7f0000005d80)=""/103, 0x67}, {&(0x7f0000005e00)=""/170, 0xaa}, {&(0x7f0000005ec0)=""/252, 0xfc}, {&(0x7f0000005fc0)=""/136, 0x88}, {&(0x7f0000006080)=""/125, 0x7d}, {&(0x7f0000006100)=""/4096, 0x1000}, {&(0x7f0000007100)=""/106, 0x6a}, {&(0x7f0000007180)=""/115, 0x73}, {&(0x7f0000007200)=""/240, 0xf0}], 0x9, 0x0, 0x0, 0x7}, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000007400)={r3, 0x10001, 0x18}, 0xc) ioctl$PERF_EVENT_IOC_REFRESH(r8, 0x2402, 0xc4c) recvmsg$kcm(r6, &(0x7f0000008880)={&(0x7f0000007440)=@l2, 0x80, &(0x7f0000008800)=[{&(0x7f00000074c0)=""/231, 0xe7}, {&(0x7f00000075c0)=""/118, 0x76}, {&(0x7f0000007640)=""/4096, 0x1000}, {&(0x7f0000008640)=""/223, 0xdf}, {&(0x7f0000008740)}, {&(0x7f00000087c0)=""/53, 0x35}], 0x6}, 0x10000) 2018/03/29 11:56:28 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x1e1, 0x100000000209e20, 0x8000000001, 0x5}, 0xfffffffffffffe20) r0 = getpid() r1 = perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0xfffffffffffffffc, 0x3, 0x0, 0x2, 0x0, 0x9, 0x10000, 0xc, 0x3d3, 0x80, 0x5, 0xfffffffffffffffc, 0x8, 0x3f, 0x5d, 0xbbb0, 0x20, 0x3, 0x8000, 0x100000000, 0x8, 0x9, 0x2, 0x4, 0x800, 0xf8, 0x3, 0x9, 0x1, 0x3, 0x8, 0x3, 0x7, 0x10001, 0xf16, 0x2, 0x0, 0x7fffffff, 0x4, @perf_bp={&(0x7f0000000780), 0x1}, 0x4080, 0x10001, 0xcc, 0x7, 0x3, 0xffff, 0x7fffffff}, 0xffffffffffffffff, 0xd, 0xffffffffffffff9c, 0x8) perf_event_open(&(0x7f0000000980)={0x4, 0x70, 0x6, 0x3f, 0x8e, 0x1, 0x0, 0x3, 0x404, 0x0, 0xbc2b, 0x40, 0x7, 0xffff, 0xffff, 0x9, 0x9de2, 0x9, 0x0, 0x3, 0x7f, 0xff, 0x40, 0x400, 0x9, 0x7fffffff, 0x80000000, 0x7, 0x8, 0x10001, 0x1f, 0x2778, 0x800, 0x8001, 0x101, 0x9, 0x8, 0x7ff, 0x0, 0x1000, 0x5, @perf_config_ext={0x3ff, 0xb69b}, 0x3040, 0x2, 0x2, 0x5, 0x7, 0x6, 0x7283ed73}, r0, 0xe, r1, 0x8) bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x0, 0x0, 0x7ffff9, 0x0, 0x20000003, 0x0}, 0x2c) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) r2 = gettid() r3 = perf_event_open(&(0x7f00000008c0)={0x7, 0x70, 0x1, 0x200, 0x3, 0xdbce, 0x0, 0x8, 0x1002, 0x1, 0xffffffffffffff00, 0x8, 0x1, 0xb3fa, 0x8, 0x0, 0x1, 0x2, 0x1000, 0x2, 0x401, 0x8, 0x3, 0x81, 0x0, 0x7, 0x2fc4, 0x882, 0x4, 0x8, 0x3, 0x81, 0x3, 0x7, 0x8857, 0x7, 0x5, 0x9, 0x0, 0x7, 0x1, @perf_config_ext={0x0, 0x80000000}, 0x400, 0x7f, 0x4, 0x7, 0x2, 0x7f, 0x200}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000840)={0x5, 0x70, 0xef, 0x2, 0x1000, 0xffffffff80000000, 0x0, 0x1a7800000000, 0x2000, 0x4, 0x5, 0x6814, 0x3a9, 0x5, 0x63b, 0x6, 0x8, 0x1000, 0x250420ee, 0x3, 0x0, 0x20, 0x6, 0x0, 0x4, 0x5, 0x4, 0x8, 0x3, 0x8, 0x52893dd5, 0x2, 0x2, 0x8, 0x44d, 0x1, 0x8, 0x6, 0x0, 0x100000000, 0x0, @perf_config_ext={0x9, 0x80}, 0x0, 0x0, 0x2b67, 0x6, 0x4b0, 0x81, 0x4}, r2, 0x5, r3, 0xb) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1003, 0x0) mount(&(0x7f00002b9ff8)='./file0\x00', &(0x7f0000cbeff8)='./file0\x00', &(0x7f00005f7ffa)='ramfs\x00', 0x80000, &(0x7f000002f000)) mount(&(0x7f0000000000)='.', &(0x7f0000000040)='.', &(0x7f0000000080)='cgroup\x00', 0x5010, &(0x7f00000000c0)) mount(&(0x7f0000377ff8)='.', &(0x7f0000000280)='.', &(0x7f0000000600)='nfs4\x00', 0x5010, &(0x7f0000000300)="2161893416a0c71070768c219eb114c3253c9f3baf4e9e8e9111c1a7fc6e266009fe27243deeaa22ca7ae9341f714300b5ee807e55d609036f2a3260475922bdfb2d2849f1c3b2ad3c051bd4f3751a177f77a92758c6d2b23fe7f1535b54e5846d11c135de8286066dec1b25f6e1378944ac5f7fce42d055821b5e19") perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xd68, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f0000014f88)={0x5, 0xfffffffffffffdc4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x46000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = getpid() perf_event_open(&(0x7f0000000680)={0x4, 0x70, 0x64, 0xffff, 0x1f, 0x4, 0x0, 0x1c3, 0x0, 0x1, 0x1, 0x9, 0x1ff, 0xfffffffffffffff8, 0x0, 0x0, 0x6, 0x7fffffff, 0x0, 0xffffffff, 0x80000001, 0xd0, 0x7, 0x1f, 0x0, 0x8, 0x9, 0x1ff, 0x8, 0x785, 0x4, 0xff, 0x2, 0x656, 0x5000000, 0x1, 0x460e3be0, 0x1, 0x0, 0x0, 0x7, @perf_bp={&(0x7f0000000640), 0x1}, 0x1000, 0xa, 0x7fff, 0x7, 0x3, 0x400, 0x9}, r5, 0xe, r4, 0x1) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', 0x0, 0x10}, 0x10) close(0xffffffffffffffff) bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)={&(0x7f0000000040)='./file0\x00', 0x0, 0x18}, 0x10) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000100)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0, 0x2e, &(0x7f0000000440), &(0x7f0000000140)=""/46, 0x4229}, 0x28) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000003480)={&(0x7f0000003300)=@can={0x0, 0x0}, 0x80, &(0x7f0000003400)=[{&(0x7f0000003380)=""/56, 0x38}, {&(0x7f00000033c0)=""/1, 0x1}], 0x2, &(0x7f0000003440)=""/33, 0x21, 0x1}, 0x40010000) bpf$PROG_LOAD(0x5, &(0x7f00000034c0)={0xe, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="1800000002000000000000004ce700002555fdff00000000002371d07c9ba7f4a23372b0ad61000000000000009500000000000000"], &(0x7f00000007c0)='GPL\x00', 0x3, 0x2d, &(0x7f0000000800)=""/45, 0x40f00, 0x1, [], r6}, 0x48) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000740)={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x10) socketpair$inet(0x2, 0x80a, 0x81, &(0x7f0000000240)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={0xffffffffffffffff, &(0x7f0000000500)="ae30f1bca1b4d3f69f1aac81517d42ad5980bc63b5008616a1f4724b9f8c1e4ecd8de336f57dd727cdaab04f0b40f28612615ad08de414711d841a88db33fd33884b627074213a0c5de3be2bbaec9207d9865c47f240467849979b5ab5632376608fc4be41a274abb2dc07cabe344a18db51048e5b0cbda843905a4258cdee3e649eddf104ba78894dce09747dcfe6a8d6d6d985520eeef448b83a8bcb83074541ba7a20d6094aa206c01a0690e5b3bfa05d475eb382b0199031d22bb26cde9b1ca0055eef9f6c4993b71ba19ba0590bb5efdaddaa574c25356ca890d138fc9fe0e975b6d5a1a8251503cd0a91845f9d95", &(0x7f0000000480)="9bc7741ea5e524cc8c6f748a73153834428729c45bf4ad446d2dddf1978baf431d0ba35b5442b5afe22db8b003650320200af7e1368ef7cdfa79ca8b9d3564363a5d2a502970314f2264c883bc8d990afc003e5adb95b30edad245c4420c8126f1d33db75ff0230698eaff90055e0f", 0x2}, 0x20) socketpair(0x0, 0x80003, 0xffff, &(0x7f0000000380)={0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r7, 0x50, &(0x7f00000003c0)}, 0x10) 2018/03/29 11:56:28 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x1e1, 0x100000000209e20, 0x8000000001, 0x5}, 0xfffffffffffffe20) r0 = getpid() r1 = perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0xfffffffffffffffc, 0x3, 0x8, 0x2, 0x0, 0x9, 0x10000, 0xc, 0x3d3, 0x80, 0x5, 0xfffffffffffffffc, 0x8, 0x3f, 0x5d, 0xbbb0, 0x20, 0x3, 0x8000, 0x100000000, 0x8, 0x9, 0x2, 0x4, 0x800, 0xf8, 0x3, 0x9, 0x1, 0x3, 0x8, 0x3, 0x7, 0x10001, 0xf16, 0x2, 0x0, 0x7fffffff, 0x4, @perf_bp={&(0x7f0000000780), 0x1}, 0x4080, 0x10001, 0xcc, 0x7, 0x3, 0xffff, 0x7fffffff}, 0xffffffffffffffff, 0xd, 0xffffffffffffff9c, 0x8) perf_event_open(&(0x7f0000000980)={0x4, 0x70, 0x6, 0x3f, 0x8e, 0x1, 0x0, 0x3, 0x404, 0x0, 0xbc2b, 0x40, 0x7, 0xffff, 0xffff, 0x9, 0x9de2, 0x9, 0x0, 0x3, 0x7f, 0xff, 0x40, 0x400, 0x9, 0x7fffffff, 0x80000000, 0x7, 0x8, 0x10001, 0x1f, 0x2778, 0x800, 0x8001, 0x101, 0x9, 0x8, 0x7ff, 0x0, 0x1000, 0x5, @perf_config_ext={0x3ff, 0xb69b}, 0x3040, 0x2, 0x2, 0x5, 0x7, 0x6, 0x7283ed73}, r0, 0xe, r1, 0x8) bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x0, 0x0, 0x7ffff9, 0x0, 0x20000003, 0x0}, 0x2c) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) r2 = gettid() r3 = perf_event_open(&(0x7f00000008c0)={0x7, 0x70, 0x1, 0x200, 0x3, 0xdbce, 0x0, 0x8, 0x1002, 0x1, 0xffffffffffffff00, 0x8, 0x1, 0xb3fa, 0x8, 0x0, 0x1, 0x2, 0x1000, 0x2, 0x401, 0x8, 0x3, 0x81, 0x0, 0x7, 0x2fc4, 0x882, 0x4, 0x8, 0x3, 0x81, 0x3, 0x7, 0x8857, 0x7, 0x5, 0x9, 0x0, 0x7, 0x1, @perf_config_ext={0x0, 0x80000000}, 0x400, 0x7f, 0x4, 0x7, 0x2, 0x7f, 0x200}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000840)={0x5, 0x70, 0xef, 0x2, 0x1000, 0xffffffff80000000, 0x0, 0x1a7800000000, 0x2000, 0x4, 0x5, 0x6814, 0x3a9, 0x5, 0x63b, 0x6, 0x8, 0x1000, 0x250420ee, 0x3, 0x0, 0x20, 0x6, 0x0, 0x4, 0x5, 0x4, 0x8, 0x3, 0x8, 0x52893dd5, 0x2, 0x2, 0x8, 0x44d, 0x1, 0x8, 0x6, 0x0, 0x100000000, 0x0, @perf_config_ext={0x9, 0x80}, 0x0, 0x0, 0x2b67, 0x6, 0x4b0, 0x81, 0x4}, r2, 0x5, r3, 0xb) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1003, 0x0) mount(&(0x7f00002b9ff8)='./file0\x00', &(0x7f0000cbeff8)='./file0\x00', &(0x7f00005f7ffa)='ramfs\x00', 0x80000, &(0x7f000002f000)) mount(&(0x7f0000000000)='.', &(0x7f0000000040)='.', &(0x7f0000000080)='cgroup\x00', 0x5010, &(0x7f00000000c0)) mount(&(0x7f0000377ff8)='.', &(0x7f0000000280)='.', &(0x7f0000000600)='nfs4\x00', 0x5010, &(0x7f0000000300)="2161893416a0c71070768c219eb114c3253c9f3baf4e9e8e9111c1a7fc6e266009fe27243deeaa22ca7ae9341f714300b5ee807e55d609036f2a3260475922bdfb2d2849f1c3b2ad3c051bd4f3751a177f77a92758c6d2b23fe7f1535b54e5846d11c135de8286066dec1b25f6e1378944ac5f7fce42d055821b5e19") perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xd68, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f0000014f88)={0x5, 0xfffffffffffffdc4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x46000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = getpid() perf_event_open(&(0x7f0000000680)={0x4, 0x70, 0x64, 0xffff, 0x1f, 0x4, 0x0, 0x1c3, 0x0, 0x1, 0x1, 0x9, 0x1ff, 0xfffffffffffffff8, 0x0, 0x0, 0x6, 0x7fffffff, 0x4, 0xffffffff, 0x80000001, 0xd0, 0x7, 0x1f, 0x0, 0x8, 0x9, 0x1ff, 0x8, 0x785, 0x4, 0xff, 0x2, 0x656, 0x5000000, 0x1, 0x460e3be0, 0x1, 0x0, 0x0, 0x7, @perf_bp={&(0x7f0000000640), 0x1}, 0x1000, 0xa, 0x7fff, 0x7, 0x3, 0x400, 0x9}, r5, 0xe, r4, 0x1) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', 0x0, 0x10}, 0x10) close(0xffffffffffffffff) bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)={&(0x7f0000000040)='./file0\x00', 0x0, 0x18}, 0x10) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000100)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0, 0x2e, &(0x7f0000000440), &(0x7f0000000140)=""/46, 0x4229}, 0x28) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000003480)={&(0x7f0000003300)=@can={0x0, 0x0}, 0x80, &(0x7f0000003400)=[{&(0x7f0000003380)=""/56, 0x38}, {&(0x7f00000033c0)=""/1, 0x1}], 0x2, &(0x7f0000003440)=""/33, 0x21, 0x1}, 0x40010000) bpf$PROG_LOAD(0x5, &(0x7f00000034c0)={0xe, 0x6, &(0x7f0000000940)=ANY=[@ANYBLOB="1800000002000000000000004ce700002555fdff00000000002371d07c9ba7f4a23372b0ad61000000000000009500000000000000"], &(0x7f00000007c0)='GPL\x00', 0x3, 0x2d, &(0x7f0000000800)=""/45, 0x40f00, 0x1, [], r6}, 0x48) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000740)={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x10) socketpair$inet(0x2, 0x0, 0x81, &(0x7f0000000240)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={0xffffffffffffffff, &(0x7f0000000500)="ae30f1bca1b4d3f69f1aac81517d42ad5980bc63b5008616a1f4724b9f8c1e4ecd8de336f57dd727cdaab04f0b40f28612615ad08de414711d841a88db33fd33884b627074213a0c5de3be2bbaec9207d9865c47f240467849979b5ab5632376608fc4be41a274abb2dc07cabe344a18db51048e5b0cbda843905a4258cdee3e649eddf104ba78894dce09747dcfe6a8d6d6d985520eeef448b83a8bcb83074541ba7a20d6094aa206c01a0690e5b3bfa05d475eb382b0199031d22bb26cde9b1ca0055eef9f6c4993b71ba19ba0590bb5efdaddaa574c25356ca890d138fc9fe0e975b6d5a1a8251503cd0a91845f9d95", &(0x7f0000000480)="9bc7741ea5e524cc8c6f748a73153834428729c45bf4ad446d2dddf1978baf431d0ba35b5442b5afe22db8b003650320200af7e1368ef7cdfa79ca8b9d3564363a5d2a502970314f2264c883bc8d990afc003e5adb95b30edad245c4420c8126f1d33db75ff0230698eaff90055e0f", 0x2}, 0x20) socketpair(0x0, 0x80003, 0xffff, &(0x7f0000000380)={0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r7, 0x50, &(0x7f00000003c0)}, 0x10) 2018/03/29 11:56:28 executing program 3: r0 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x10}, 0x10) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000000c0)={0x0, 0x1000, 0x8}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000080)='./file0\x00', r1}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0x0, 0x8}, 0x10) mount(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='cpuset\x00', 0x40, &(0x7f0000000280)="8a4562cb6a7df38be32246afcaef1e1a3f933cb428242c55c117c0fbbd62cea0aab31f2665fb88267466eca314fc8cafd72cc24143121c0691236768fad66390bf9b55014c2bd49faa5388cbabd52e730eeb4ccc411bacd296e423d971043756cf2b35a4063f2a7465b44a60ef31ae437f6160ed2f63afa62c36a27c33e4779e7c0404e337abc025bb2e4b39cc265573c6ab1a3ff09c7ad6bb4631a4") mount(&(0x7f0000000340)='./file1\x00', &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='devtmpfs\x00', 0x40, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xb, 0x7f, 0x0, 0x1, 0x12, r1, 0x100000000}, 0x2c) mkdir(&(0x7f0000000440)='./file1\x00', 0x20) mount(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='iso9660\x00', 0x8, &(0x7f0000000540)="650fe6ccea2b17860de967406c566ec16fe5a7a4c064707e22906e9d3d2a70b4") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000005c0)={r2, 0x28, &(0x7f0000000580)={0x0, 0x0}}, 0x10) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={r3, 0x8, 0x10}, 0xc) mount(&(0x7f0000000640)='./file1\x00', &(0x7f0000000680)='./file1\x00', &(0x7f00000006c0)='pstore\x00', 0x1000000, &(0x7f0000000700)="f48afa3ab3cc319f917be52b04c388c229578537782bc5ffc32c7747b1d28999ad89f5fba460640a324385ac03cccef4553d641b91d79d014804a98e72796f8eb2e1a7056efeaa63404648df67079ae817420f248ccf9d01e7a027c600c71777fb9ebc97da60f3d1a287ef8bc00f1dc68c3b1f0c1836cde5b62be45dd58c3415cbb0f916fe3c04fc69911e2bec15c208d023bdb608fa727657c532bd5101a2a36b34c4eb65f855fea2d6f8a0a79b15ecef1a4c81a8f6f5ed57b09db2ab482413540416126718f2a33ed21346ded20b084a8dc10702ec279fc486b5c57c163d") socketpair(0x3, 0x2, 0x1f, &(0x7f0000001c40)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$kcm(r6, &(0x7f0000004300)={0x0, 0x0, &(0x7f0000004140)=[{&(0x7f0000001c80)=""/139, 0x8b}, {&(0x7f0000001d40)=""/149, 0x95}, {&(0x7f0000001e00)=""/188, 0xbc}, {&(0x7f0000001ec0)=""/69, 0x45}, {&(0x7f0000001f40)=""/165, 0xa5}, {&(0x7f0000002000)=""/4096, 0x1000}, {&(0x7f0000003000)=""/42, 0x2a}, {&(0x7f0000003040)=""/4096, 0x1000}, {&(0x7f0000004040)=""/233, 0xe9}], 0x9, &(0x7f0000004200)=""/236, 0xec, 0xe00}, 0x40) mount(&(0x7f0000004340)='./file1/file0\x00', &(0x7f0000004380)='./file1\x00', &(0x7f00000043c0)='ceph\x00', 0x4860, &(0x7f0000004400)="2c8eb517dd302be26597065442d58f3f345c295b542b2b1df3046ae176") bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000004600)={r6, &(0x7f0000004440)="903685b47b9c4d5c1dffcefa6a92cd57ccdfaf1af0be272f1cb4a5b86ab9d1ef248a63f04f5d59c2cd6e6b7722f5ff866c5d353014f28baaa95bce06a787a3e085102126a0386ffd4e136d472f2cdfb7c658643d2792b7235e2ec8c782080850c20eb00014eab035d7d56c8ddd0d7fdc4c21602d480e4accea0867cc5b4172b46b8f028bd623c58544092396dbda704543cd7c93219ff7f4caf9d0c12fc32c65ddac48ba22321d2c7ef1152f0dd87ed22cb30eb2b24d381b3abaefc114ad4c08e329cfbce60e0549ca", &(0x7f0000004540)="38859653237c5c9685cf2e44e1eea64846e190b778f29b06c26c2f2b8a0800f9fc2019b05290fc5c82f612eb7f479918015eb3af93cc57f01db731e129275ce05910f66e436ef09a8fe7bf22f960eacec350a7f7e9e9a47cb163f467b6a29523346a4c61d65d2235c73095a53929d509538f640424133cfa3617b41a51aa7172460146433abbe604f2c92827fabd5d3134d36b4cecd0fd2549f3527615f9eb63dd9332021e4eff13ad6aa509db21ed98745d00cb36e547", 0x3}, 0x20) mkdir(&(0x7f0000004640)='./file1/file0\x00', 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000004680)={0x0, 0x0, 0xa6, 0x3, 0x4}, 0x2c) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000046c0)=0x7, 0x4) recvmsg$kcm(r6, &(0x7f00000058c0)={&(0x7f0000004700)=@alg, 0x80, &(0x7f0000005880)=[{&(0x7f0000004780)=""/4096, 0x1000}, {&(0x7f0000005780)=""/219, 0xdb}], 0x2, 0x0, 0x0, 0x100000001}, 0x40000000) r7 = gettid() r8 = perf_event_open(&(0x7f0000005900)={0x7, 0x70, 0x0, 0xfffffffffffffff7, 0x9, 0x4, 0x0, 0x7, 0x100, 0x8, 0x100000000, 0x8000, 0x8, 0x6, 0x0, 0x6, 0x10001, 0x9, 0x1f, 0x2, 0x1, 0x3, 0x1, 0x1f, 0x23, 0x1, 0xaa4, 0x5, 0x4, 0x200, 0x6, 0x9, 0xfffffffffffffffb, 0x3, 0x3, 0xff, 0x80000000, 0x0, 0x0, 0xffffffffffffff9d, 0x2, @perf_config_ext={0x7, 0x9}, 0x100, 0x8, 0x2, 0x6, 0x4, 0x6, 0xf71}, r7, 0x9, r6, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f00000059c0)={&(0x7f0000005980)='./file0\x00'}, 0x10) ioctl$sock_kcm_SIOCKCMATTACH(r5, 0x89e0, &(0x7f0000005a00)={r5, r0}) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000005c00)={r4, &(0x7f0000005a40)="313befc1e9ac680c4369983530ee783c4f018c38e134b4b0aebd06ede05f238850949c0f5d32ab19889f880e87e3a0fa5a43500affdcc508d56f3a4df6c159ca9cfa62124b79b4607d42738dc5e16d09ea2c6a2346fc2360feff08d9f464dfdebce2cb99d4ba8e5fc37edfba041f14e16a68192d7d8687404ee7318323520188c4e5d52e8c7ec40bd0823fb210e530c74ea842bd8bacbc48317b0b6ed12528ecd30e1af83b8049df791ff7affe91ab54", &(0x7f0000005b00)=""/243}, 0x18) mount(&(0x7f0000005c40)='./file1/file0\x00', &(0x7f0000005c80)='./file1\x00', &(0x7f0000005cc0)='btrfs\x00', 0x0, 0x0) recvmsg(r5, &(0x7f00000073c0)={&(0x7f0000005d00)=@sco, 0x80, &(0x7f0000007300)=[{&(0x7f0000005d80)=""/103, 0x67}, {&(0x7f0000005e00)=""/170, 0xaa}, {&(0x7f0000005ec0)=""/252, 0xfc}, {&(0x7f0000005fc0)=""/136, 0x88}, {&(0x7f0000006080)=""/125, 0x7d}, {&(0x7f0000006100)=""/4096, 0x1000}, {&(0x7f0000007100)=""/106, 0x6a}, {&(0x7f0000007180)=""/115, 0x73}, {&(0x7f0000007200)=""/240, 0xf0}], 0x9, 0x0, 0x0, 0x7}, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000007400)={r3, 0x10001, 0x18}, 0xc) ioctl$PERF_EVENT_IOC_REFRESH(r8, 0x2402, 0xc4c) recvmsg$kcm(r6, &(0x7f0000008880)={&(0x7f0000007440)=@l2, 0x80, &(0x7f0000008800)=[{&(0x7f00000074c0)=""/231, 0xe7}, {&(0x7f00000075c0)=""/118, 0x76}, {&(0x7f0000007640)=""/4096, 0x1000}, {&(0x7f0000008640)=""/223, 0xdf}, {&(0x7f0000008740)}, {&(0x7f00000087c0)=""/53, 0x35}], 0x6}, 0x10000) 2018/03/29 11:56:28 executing program 0: r0 = socket$kcm(0x29, 0x5, 0x0) recvmsg$kcm(r0, &(0x7f0000000ec0)={&(0x7f0000000a00)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000000e40)=[{&(0x7f0000000a80)=""/201, 0xc9}, {&(0x7f0000000b80)=""/6, 0x6}, {&(0x7f0000000bc0)=""/136, 0x88}, {&(0x7f0000000c80)=""/246, 0xf6}, {&(0x7f0000000d80)=""/108, 0x6c}, {&(0x7f0000000e00)=""/50, 0x32}], 0x6, 0x0, 0x0, 0x1ff}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000f00)={0x3, 0x7, &(0x7f0000000180)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x1}, [@generic={0x2, 0x0, 0x100000001, 0x1}, @ldst={0x1, 0x2, 0x3, 0xa, 0x5, 0xffffffd0, 0x1}], {0x95}}, &(0x7f00000001c0)='syzkaller\x00', 0xffffffffffff8000, 0xd6, &(0x7f00000002c0)=""/214, 0x40f00, 0x1, [], r1}, 0x48) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000001a00)) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000001a40)={0xffffffffffffffff}) recvmsg$kcm(r2, &(0x7f0000000540)={&(0x7f00000000c0)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @broadcast}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000240)=""/65, 0x41}], 0x1, &(0x7f0000000440)=""/213, 0xd5}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x8983, &(0x7f0000000040)) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000080)) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000019c0)={0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000000140)="0253eea6a53cc0eae389e9a13e5f2046d0633eebde90f446c1b1eabbd0adb42dfcefb37a3df93feb3d5e76dc353ecf23fe9c81afa5", 0x35}, {&(0x7f00000002c0)}, {&(0x7f0000000400)}, {&(0x7f0000001600)}], 0x4, &(0x7f0000001700)=[{0x68, 0x107, 0x25047dc1, "755cd1e9e23de47cb15819d813deb534cee2d9497c58eba5bd8a228407fb709d70f16afa73f4924f12ecc429b6fd356748940b62ee5f5685ce027fe4e6c60a8f88cd1a5827d099f5849f09bd37f681e29814e6bb"}, {0x10, 0x0, 0x1ff}, {0x10, 0x107, 0x80000001}], 0x88}, 0x48800) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000000)) 2018/03/29 11:56:28 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x1e1, 0x100000000209e20, 0x8000000001, 0x5}, 0xfffffffffffffe20) r0 = getpid() r1 = perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0xfffffffffffffffc, 0x3, 0x0, 0x2, 0x0, 0x9, 0x10000, 0xc, 0x3d3, 0x80, 0x5, 0xfffffffffffffffc, 0x8, 0x3f, 0x5d, 0xbbb0, 0x20, 0x3, 0x8000, 0x100000000, 0x8, 0x9, 0x2, 0x4, 0x800, 0xf8, 0x3, 0x9, 0x1, 0x3, 0x8, 0x3, 0x7, 0x10001, 0xf16, 0x2, 0x0, 0x7fffffff, 0x4, @perf_bp={&(0x7f0000000780), 0x1}, 0x4080, 0x10001, 0xcc, 0x7, 0x3, 0xffff, 0x7fffffff}, 0xffffffffffffffff, 0xd, 0xffffffffffffff9c, 0x8) perf_event_open(&(0x7f0000000980)={0x4, 0x70, 0x6, 0x3f, 0x8e, 0x1, 0x0, 0x3, 0x404, 0x0, 0xbc2b, 0x40, 0x7, 0xffff, 0xffff, 0x9, 0x9de2, 0x9, 0x0, 0x3, 0x7f, 0xff, 0x40, 0x400, 0x9, 0x7fffffff, 0x80000000, 0x7, 0x8, 0x10001, 0x1f, 0x2778, 0x800, 0x8001, 0x101, 0x9, 0x8, 0x7ff, 0x0, 0x1000, 0x5, @perf_config_ext={0x3ff, 0xb69b}, 0x3040, 0x2, 0x2, 0x5, 0x7, 0x6, 0x7283ed73}, r0, 0xe, r1, 0x8) bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x0, 0x0, 0x7ffff9, 0x0, 0x20000003, 0x0}, 0x2c) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) r2 = gettid() r3 = perf_event_open(&(0x7f00000008c0)={0x7, 0x70, 0x1, 0x200, 0x3, 0xdbce, 0x0, 0x8, 0x1002, 0x1, 0xffffffffffffff00, 0x8, 0x1, 0xb3fa, 0x8, 0x0, 0x1, 0x2, 0x1000, 0x2, 0x401, 0x8, 0x3, 0x81, 0x0, 0x7, 0x2fc4, 0x882, 0x4, 0x8, 0x3, 0x81, 0x3, 0x7, 0x8857, 0x7, 0x5, 0x9, 0x0, 0x7, 0x1, @perf_config_ext={0x0, 0x80000000}, 0x400, 0x7f, 0x4, 0x7, 0x2, 0x7f, 0x200}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000840)={0x5, 0x70, 0xef, 0x2, 0x1000, 0xffffffff80000000, 0x0, 0x1a7800000000, 0x2000, 0x4, 0x5, 0x6814, 0x3a9, 0x5, 0x63b, 0x6, 0x8, 0x1000, 0x250420ee, 0x3, 0x0, 0x20, 0x6, 0x0, 0x4, 0x5, 0x4, 0x8, 0x3, 0x8, 0x52893dd5, 0x2, 0x2, 0x8, 0x44d, 0x1, 0x8, 0x6, 0x0, 0x100000000, 0x0, @perf_config_ext={0x9, 0x80}, 0x0, 0x0, 0x2b67, 0x6, 0x4b0, 0x81, 0x4}, r2, 0x5, r3, 0xb) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1003, 0x0) mount(&(0x7f00002b9ff8)='./file0\x00', &(0x7f0000cbeff8)='./file0\x00', &(0x7f00005f7ffa)='ramfs\x00', 0x80000, &(0x7f000002f000)) mount(&(0x7f0000000000)='.', &(0x7f0000000040)='.', &(0x7f0000000080)='cgroup\x00', 0x5010, &(0x7f00000000c0)) mount(&(0x7f0000377ff8)='.', &(0x7f0000000280)='.', &(0x7f0000000600)='nfs4\x00', 0x5010, &(0x7f0000000300)="2161893416a0c71070768c219eb114c3253c9f3baf4e9e8e9111c1a7fc6e266009fe27243deeaa22ca7ae9341f714300b5ee807e55d609036f2a3260475922bdfb2d2849f1c3b2ad3c051bd4f3751a177f77a92758c6d2b23fe7f1535b54e5846d11c135de8286066dec1b25f6e1378944ac5f7fce42d055821b5e19") perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xd68, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f0000014f88)={0x5, 0xfffffffffffffdc4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x46000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = getpid() perf_event_open(&(0x7f0000000680)={0x4, 0x70, 0x64, 0xffff, 0x1f, 0x4, 0x0, 0x1c3, 0x0, 0x1, 0x1, 0x9, 0x1ff, 0xfffffffffffffff8, 0x0, 0x0, 0x6, 0x7fffffff, 0x0, 0xffffffff, 0x80000001, 0xd0, 0x7, 0x1f, 0x0, 0x8, 0x9, 0x1ff, 0x8, 0x785, 0x4, 0xff, 0x2, 0x656, 0x5000000, 0x1, 0x460e3be0, 0x1, 0x0, 0x0, 0x7, @perf_bp={&(0x7f0000000640), 0x1}, 0x1000, 0xa, 0x7fff, 0x7, 0x3, 0x400, 0x9}, r5, 0xe, r4, 0x1) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', 0x0, 0x10}, 0x10) close(0xffffffffffffffff) bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)={&(0x7f0000000040)='./file0\x00', 0x0, 0x18}, 0x10) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000100)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0, 0x2e, &(0x7f0000000440), &(0x7f0000000140)=""/46, 0x4229}, 0x28) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000003480)={&(0x7f0000003300)=@can={0x0, 0x0}, 0x80, &(0x7f0000003400)=[{&(0x7f0000003380)=""/56, 0x38}, {&(0x7f00000033c0)=""/1, 0x1}], 0x2, &(0x7f0000003440)=""/33, 0x21, 0x1}, 0x40010000) bpf$PROG_LOAD(0x5, &(0x7f00000034c0)={0xe, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="1800000002000000000000004ce700002555fdff00000000002371d07c9ba7f4a23372b0ad61000000000000009500000000000000"], &(0x7f00000007c0)='GPL\x00', 0x3, 0x2d, &(0x7f0000000800)=""/45, 0x40f00, 0x1, [], r6}, 0x48) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000740)={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x10) socketpair$inet(0x2, 0x80a, 0x81, &(0x7f0000000240)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={0xffffffffffffffff, &(0x7f0000000500)="ae30f1bca1b4d3f69f1aac81517d42ad5980bc63b5008616a1f4724b9f8c1e4ecd8de336f57dd727cdaab04f0b40f28612615ad08de414711d841a88db33fd33884b627074213a0c5de3be2bbaec9207d9865c47f240467849979b5ab5632376608fc4be41a274abb2dc07cabe344a18db51048e5b0cbda843905a4258cdee3e649eddf104ba78894dce09747dcfe6a8d6d6d985520eeef448b83a8bcb83074541ba7a20d6094aa206c01a0690e5b3bfa05d475eb382b0199031d22bb26cde9b1ca0055eef9f6c4993b71ba19ba0590bb5efdaddaa574c25356ca890d138fc9fe0e975b6d5a1a8251503cd0a91845f9d95", &(0x7f0000000480)="9bc7741ea5e524cc8c6f748a73153834428729c45bf4ad446d2dddf1978baf431d0ba35b5442b5afe22db8b003650320200af7e1368ef7cdfa79ca8b9d3564363a5d2a502970314f2264c883bc8d990afc003e5adb95b30edad245c4420c8126f1d33db75ff0230698eaff90055e0f", 0x2}, 0x20) socketpair(0x0, 0x80003, 0xffff, &(0x7f0000000380)={0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r7, 0x50, &(0x7f00000003c0)}, 0x10) [ 834.486371] IPVS: ftp: loaded support on port[0] = 21 [ 835.453875] IPVS: ftp: loaded support on port[0] = 21 [ 835.479580] IPVS: ftp: loaded support on port[0] = 21 [ 835.512834] IPVS: ftp: loaded support on port[0] = 21 [ 835.562563] FAULT_INJECTION: forcing a failure. [ 835.562563] name failslab, interval 1, probability 0, space 0, times 0 [ 835.574118] CPU: 1 PID: 27332 Comm: syz-executor4 Not tainted 4.16.0-rc6+ #40 [ 835.581375] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 835.590703] Call Trace: [ 835.593274] dump_stack+0x194/0x24d [ 835.596881] ? arch_local_irq_restore+0x53/0x53 [ 835.601537] should_fail+0x8c0/0xa40 [ 835.605229] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 835.610337] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 835.615498] ? __lock_acquire+0x664/0x3e00 [ 835.619727] ? __lock_acquire+0x664/0x3e00 [ 835.623940] ? find_held_lock+0x35/0x1d0 [ 835.627981] ? __lock_is_held+0xb6/0x140 [ 835.632044] ? check_same_owner+0x320/0x320 [ 835.636348] ? __d_lookup+0x4f4/0x830 [ 835.640126] ? rcu_note_context_switch+0x710/0x710 [ 835.645047] should_failslab+0xec/0x120 [ 835.648996] kmem_cache_alloc+0x47/0x760 [ 835.653064] __d_alloc+0xc1/0xbd0 [ 835.656496] ? shrink_dcache_for_umount+0x290/0x290 [ 835.661487] ? d_alloc_parallel+0x1b40/0x1b40 [ 835.665958] ? lock_release+0xa40/0xa40 [ 835.669916] ? mark_held_locks+0xaf/0x100 [ 835.674039] ? d_lookup+0x133/0x2e0 [ 835.677645] ? d_lookup+0x1d5/0x2e0 [ 835.681248] ? current_kernel_time64+0x1d4/0x2f0 [ 835.685988] d_alloc+0x8e/0x340 [ 835.689244] ? __d_alloc+0xbd0/0xbd0 [ 835.692932] ? full_name_hash+0x9b/0xe0 [ 835.696890] __rpc_lookup_create_exclusive+0x183/0x1d0 [ 835.702144] ? down_write_nested+0x8b/0x120 [ 835.706448] ? rpc_d_lookup_sb+0x1a0/0x1a0 [ 835.710656] ? _down_write_nest_lock+0x120/0x120 [ 835.715386] ? __d_lookup+0x830/0x830 [ 835.719172] rpc_mkpipe_dentry+0xf8/0x360 [ 835.723300] rpc_fill_super+0x85e/0xae0 [ 835.727251] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 835.732421] ? security_capable+0x8e/0xc0 [ 835.736544] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 835.741708] ? ns_capable_common+0xcf/0x160 [ 835.746012] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 835.751192] mount_ns+0xc4/0x190 [ 835.754537] rpc_mount+0x9e/0xd0 [ 835.757879] mount_fs+0x66/0x2d0 [ 835.761223] vfs_kern_mount.part.26+0xc6/0x4a0 [ 835.765779] ? may_umount+0xa0/0xa0 [ 835.769381] ? _raw_read_unlock+0x22/0x30 [ 835.773500] ? __get_fs_type+0x8a/0xc0 [ 835.777366] do_mount+0xea4/0x2bb0 [ 835.780899] ? copy_mount_string+0x40/0x40 [ 835.785115] ? rcu_pm_notify+0xc0/0xc0 [ 835.788985] ? copy_mount_options+0x5f/0x2e0 [ 835.793365] ? rcu_read_lock_sched_held+0x108/0x120 [ 835.798357] ? kmem_cache_alloc_trace+0x459/0x740 [ 835.803177] ? kasan_check_write+0x14/0x20 [ 835.807390] ? copy_mount_options+0x1f7/0x2e0 [ 835.811863] SyS_mount+0xab/0x120 [ 835.815291] ? copy_mnt_ns+0xb30/0xb30 [ 835.819153] do_syscall_64+0x281/0x940 [ 835.823019] ? __do_page_fault+0xc90/0xc90 [ 835.827228] ? _raw_spin_unlock_irq+0x27/0x70 [ 835.831698] ? finish_task_switch+0x1c1/0x7e0 [ 835.836171] ? syscall_return_slowpath+0x550/0x550 [ 835.841076] ? syscall_return_slowpath+0x2ac/0x550 [ 835.845980] ? prepare_exit_to_usermode+0x350/0x350 [ 835.850971] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 835.856311] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 835.861133] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 835.866311] RIP: 0033:0x4548b9 [ 835.869474] RSP: 002b:00007f0913430c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 835.877153] RAX: ffffffffffffffda RBX: 00007f09134316d4 RCX: 00000000004548b9 [ 835.884397] RDX: 00000000200002c0 RSI: 0000000020000140 RDI: 0000000020000300 [ 835.891640] RBP: 000000000072bea0 R08: 0000000020000200 R09: 0000000000000000 [ 835.899924] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 2018/03/29 11:56:30 executing program 0: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000001a00)) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000001a40)={0xffffffffffffffff}) recvmsg$kcm(r1, &(0x7f0000000540)={&(0x7f00000000c0)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @broadcast}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000240)=""/65, 0x41}], 0x1, &(0x7f0000000440)=""/213, 0xd5}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x8983, &(0x7f0000000040)) recvmsg$kcm(r1, &(0x7f0000000380)={&(0x7f0000000180)=@alg, 0x80, &(0x7f0000000200)=[{&(0x7f00000002c0)=""/190, 0xbe}, {&(0x7f0000000000)=""/30, 0x1e}], 0x2, &(0x7f0000000580)=""/186, 0xba, 0x3ff}, 0x10002) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000080)) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000019c0)={0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000000140)="0253eea6a53cc0eae389e9a13e5f2046d0633eebde90f446c1b1eabbd0adb42dfcefb37a3df93feb3d5e76dc353ecf23fe9c81afa5", 0x35}, {&(0x7f00000002c0)}, {&(0x7f0000000400)}, {&(0x7f0000001600)}], 0x4, &(0x7f0000001700)=[{0x68, 0x107, 0x25047dc1, "755cd1e9e23de47cb15819d813deb534cee2d9497c58eba5bd8a228407fb709d70f16afa73f4924f12ecc429b6fd356748940b62ee5f5685ce027fe4e6c60a8f88cd1a5827d099f5849f09bd37f681e29814e6bb"}, {0x10, 0x0, 0x1ff}, {0x10, 0x107, 0x80000001}], 0x88}, 0x48800) 2018/03/29 11:56:30 executing program 3: r0 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x10}, 0x10) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000000c0)={0x0, 0x1000, 0x8}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000080)='./file0\x00', r1}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0x0, 0x8}, 0x10) mount(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='cpuset\x00', 0x40, &(0x7f0000000280)="8a4562cb6a7df38be32246afcaef1e1a3f933cb428242c55c117c0fbbd62cea0aab31f2665fb88267466eca314fc8cafd72cc24143121c0691236768fad66390bf9b55014c2bd49faa5388cbabd52e730eeb4ccc411bacd296e423d971043756cf2b35a4063f2a7465b44a60ef31ae437f6160ed2f63afa62c36a27c33e4779e7c0404e337abc025bb2e4b39cc265573c6ab1a3ff09c7ad6bb4631a4") mount(&(0x7f0000000340)='./file1\x00', &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='devtmpfs\x00', 0x40, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xb, 0x7f, 0x0, 0x1, 0x12, r1, 0x100000000}, 0x2c) mkdir(&(0x7f0000000440)='./file1\x00', 0x20) mount(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='iso9660\x00', 0x8, &(0x7f0000000540)="650fe6ccea2b17860de967406c566ec16fe5a7a4c064707e22906e9d3d2a70b4") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000005c0)={r2, 0x28, &(0x7f0000000580)={0x0, 0x0}}, 0x10) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={r3, 0x8, 0x10}, 0xc) mount(&(0x7f0000000640)='./file1\x00', &(0x7f0000000680)='./file1\x00', &(0x7f00000006c0)='pstore\x00', 0x1000000, &(0x7f0000000700)="f48afa3ab3cc319f917be52b04c388c229578537782bc5ffc32c7747b1d28999ad89f5fba460640a324385ac03cccef4553d641b91d79d014804a98e72796f8eb2e1a7056efeaa63404648df67079ae817420f248ccf9d01e7a027c600c71777fb9ebc97da60f3d1a287ef8bc00f1dc68c3b1f0c1836cde5b62be45dd58c3415cbb0f916fe3c04fc69911e2bec15c208d023bdb608fa727657c532bd5101a2a36b34c4eb65f855fea2d6f8a0a79b15ecef1a4c81a8f6f5ed57b09db2ab482413540416126718f2a33ed21346ded20b084a8dc10702ec279fc486b5c57c163d") socketpair(0x3, 0x2, 0x1f, &(0x7f0000001c40)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$kcm(r6, &(0x7f0000004300)={0x0, 0x0, &(0x7f0000004140)=[{&(0x7f0000001c80)=""/139, 0x8b}, {&(0x7f0000001d40)=""/149, 0x95}, {&(0x7f0000001e00)=""/188, 0xbc}, {&(0x7f0000001ec0)=""/69, 0x45}, {&(0x7f0000001f40)=""/165, 0xa5}, {&(0x7f0000002000)=""/4096, 0x1000}, {&(0x7f0000003000)=""/42, 0x2a}, {&(0x7f0000003040)=""/4096, 0x1000}, {&(0x7f0000004040)=""/233, 0xe9}], 0x9, &(0x7f0000004200)=""/236, 0xec, 0xe00}, 0x40) mount(&(0x7f0000004340)='./file1/file0\x00', &(0x7f0000004380)='./file1\x00', &(0x7f00000043c0)='ceph\x00', 0x4860, &(0x7f0000004400)="2c8eb517dd302be26597065442d58f3f345c295b542b2b1df3046ae176") bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000004600)={r6, &(0x7f0000004440)="903685b47b9c4d5c1dffcefa6a92cd57ccdfaf1af0be272f1cb4a5b86ab9d1ef248a63f04f5d59c2cd6e6b7722f5ff866c5d353014f28baaa95bce06a787a3e085102126a0386ffd4e136d472f2cdfb7c658643d2792b7235e2ec8c782080850c20eb00014eab035d7d56c8ddd0d7fdc4c21602d480e4accea0867cc5b4172b46b8f028bd623c58544092396dbda704543cd7c93219ff7f4caf9d0c12fc32c65ddac48ba22321d2c7ef1152f0dd87ed22cb30eb2b24d381b3abaefc114ad4c08e329cfbce60e0549ca", &(0x7f0000004540)="38859653237c5c9685cf2e44e1eea64846e190b778f29b06c26c2f2b8a0800f9fc2019b05290fc5c82f612eb7f479918015eb3af93cc57f01db731e129275ce05910f66e436ef09a8fe7bf22f960eacec350a7f7e9e9a47cb163f467b6a29523346a4c61d65d2235c73095a53929d509538f640424133cfa3617b41a51aa7172460146433abbe604f2c92827fabd5d3134d36b4cecd0fd2549f3527615f9eb63dd9332021e4eff13ad6aa509db21ed98745d00cb36e547", 0x3}, 0x20) mkdir(&(0x7f0000004640)='./file1/file0\x00', 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000004680)={0x0, 0x0, 0xa6, 0x3, 0x4}, 0x2c) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000046c0)=0x7, 0x4) recvmsg$kcm(r6, &(0x7f00000058c0)={&(0x7f0000004700)=@alg, 0x80, &(0x7f0000005880)=[{&(0x7f0000004780)=""/4096, 0x1000}, {&(0x7f0000005780)=""/219, 0xdb}], 0x2, 0x0, 0x0, 0x100000001}, 0x40000000) r7 = gettid() r8 = perf_event_open(&(0x7f0000005900)={0x7, 0x70, 0x0, 0xfffffffffffffff7, 0x9, 0x4, 0x0, 0x7, 0x100, 0x8, 0x100000000, 0x8000, 0x8, 0x6, 0x0, 0x6, 0x10001, 0x9, 0x1f, 0x2, 0x1, 0x3, 0x1, 0x1f, 0x23, 0x1, 0xaa4, 0x5, 0x4, 0x200, 0x6, 0x9, 0xfffffffffffffffb, 0x3, 0x3, 0xff, 0x80000000, 0x0, 0x0, 0xffffffffffffff9d, 0x2, @perf_config_ext={0x7, 0x9}, 0x100, 0x8, 0x2, 0x6, 0x4, 0x6, 0xf71}, r7, 0x9, r6, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f00000059c0)={&(0x7f0000005980)='./file0\x00'}, 0x10) ioctl$sock_kcm_SIOCKCMATTACH(r5, 0x89e0, &(0x7f0000005a00)={r5, r0}) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000005c00)={r4, &(0x7f0000005a40)="313befc1e9ac680c4369983530ee783c4f018c38e134b4b0aebd06ede05f238850949c0f5d32ab19889f880e87e3a0fa5a43500affdcc508d56f3a4df6c159ca9cfa62124b79b4607d42738dc5e16d09ea2c6a2346fc2360feff08d9f464dfdebce2cb99d4ba8e5fc37edfba041f14e16a68192d7d8687404ee7318323520188c4e5d52e8c7ec40bd0823fb210e530c74ea842bd8bacbc48317b0b6ed12528ecd30e1af83b8049df791ff7affe91ab54", &(0x7f0000005b00)=""/243}, 0x18) mount(&(0x7f0000005c40)='./file1/file0\x00', &(0x7f0000005c80)='./file1\x00', &(0x7f0000005cc0)='btrfs\x00', 0x0, 0x0) recvmsg(r5, &(0x7f00000073c0)={&(0x7f0000005d00)=@sco, 0x80, &(0x7f0000007300)=[{&(0x7f0000005d80)=""/103, 0x67}, {&(0x7f0000005e00)=""/170, 0xaa}, {&(0x7f0000005ec0)=""/252, 0xfc}, {&(0x7f0000005fc0)=""/136, 0x88}, {&(0x7f0000006080)=""/125, 0x7d}, {&(0x7f0000006100)=""/4096, 0x1000}, {&(0x7f0000007100)=""/106, 0x6a}, {&(0x7f0000007180)=""/115, 0x73}, {&(0x7f0000007200)=""/240, 0xf0}], 0x9, 0x0, 0x0, 0x7}, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000007400)={r3, 0x10001, 0x18}, 0xc) ioctl$PERF_EVENT_IOC_REFRESH(r8, 0x2402, 0xc4c) recvmsg$kcm(r6, &(0x7f0000008880)={&(0x7f0000007440)=@l2, 0x80, &(0x7f0000008800)=[{&(0x7f00000074c0)=""/231, 0xe7}, {&(0x7f00000075c0)=""/118, 0x76}, {&(0x7f0000007640)=""/4096, 0x1000}, {&(0x7f0000008640)=""/223, 0xdf}, {&(0x7f0000008740)}, {&(0x7f00000087c0)=""/53, 0x35}], 0x6}, 0x10000) 2018/03/29 11:56:30 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x1e1, 0x100000000209e20, 0x8000000001, 0x5}, 0xfffffffffffffe20) r0 = getpid() r1 = perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0xfffffffffffffffc, 0x3, 0x8, 0x2, 0x0, 0x9, 0x10000, 0xc, 0x3d3, 0x80, 0x5, 0xfffffffffffffffc, 0x8, 0x3f, 0x5d, 0xbbb0, 0x20, 0x3, 0x8000, 0x100000000, 0x8, 0x9, 0x2, 0x4, 0x800, 0xf8, 0x3, 0x9, 0x1, 0x3, 0x8, 0x3, 0x7, 0x10001, 0xf16, 0x2, 0x0, 0x7fffffff, 0x4, @perf_bp={&(0x7f0000000780), 0x1}, 0x4080, 0x10001, 0xcc, 0x7, 0x3, 0xffff, 0x7fffffff}, 0xffffffffffffffff, 0xd, 0xffffffffffffff9c, 0x8) perf_event_open(&(0x7f0000000980)={0x4, 0x70, 0x6, 0x3f, 0x8e, 0x1, 0x0, 0x3, 0x404, 0x0, 0xbc2b, 0x40, 0x7, 0xffff, 0xffff, 0x9, 0x9de2, 0x9, 0x0, 0x3, 0x7f, 0xff, 0x40, 0x400, 0x9, 0x7fffffff, 0x80000000, 0x7, 0x8, 0x10001, 0x1f, 0x2778, 0x800, 0x8001, 0x101, 0x9, 0x8, 0x7ff, 0x0, 0x1000, 0x5, @perf_config_ext={0x3ff, 0xb69b}, 0x3040, 0x2, 0x2, 0x5, 0x7, 0x6, 0x7283ed73}, r0, 0xe, r1, 0x8) bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x0, 0x0, 0x7ffff9, 0x0, 0x20000003, 0x0}, 0x2c) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) r2 = gettid() r3 = perf_event_open(&(0x7f00000008c0)={0x7, 0x70, 0x1, 0x200, 0x3, 0xdbce, 0x0, 0x8, 0x1002, 0x1, 0xffffffffffffff00, 0x8, 0x1, 0xb3fa, 0x8, 0x0, 0x1, 0x2, 0x1000, 0x2, 0x401, 0x8, 0x3, 0x81, 0x0, 0x7, 0x2fc4, 0x882, 0x4, 0x8, 0x3, 0x81, 0x3, 0x7, 0x8857, 0x7, 0x5, 0x9, 0x0, 0x7, 0x1, @perf_config_ext={0x0, 0x80000000}, 0x400, 0x7f, 0x4, 0x7, 0x2, 0x7f, 0x200}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000840)={0x5, 0x70, 0xef, 0x2, 0x1000, 0xffffffff80000000, 0x0, 0x1a7800000000, 0x2000, 0x4, 0x5, 0x6814, 0x3a9, 0x5, 0x63b, 0x6, 0x8, 0x1000, 0x250420ee, 0x3, 0x0, 0x20, 0x6, 0x0, 0x4, 0x5, 0x4, 0x8, 0x3, 0x8, 0x52893dd5, 0x2, 0x2, 0x8, 0x44d, 0x1, 0x8, 0x6, 0x0, 0x100000000, 0x0, @perf_config_ext={0x9, 0x80}, 0x0, 0x0, 0x2b67, 0x6, 0x4b0, 0x81, 0x4}, r2, 0x5, r3, 0xb) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1003, 0x0) mount(&(0x7f00002b9ff8)='./file0\x00', &(0x7f0000cbeff8)='./file0\x00', &(0x7f00005f7ffa)='ramfs\x00', 0x80000, &(0x7f000002f000)) mount(&(0x7f0000000000)='.', &(0x7f0000000040)='.', &(0x7f0000000080)='cgroup\x00', 0x5010, &(0x7f00000000c0)) mount(&(0x7f0000377ff8)='.', &(0x7f0000000280)='.', &(0x7f0000000600)='nfs4\x00', 0x5010, &(0x7f0000000300)="2161893416a0c71070768c219eb114c3253c9f3baf4e9e8e9111c1a7fc6e266009fe27243deeaa22ca7ae9341f714300b5ee807e55d609036f2a3260475922bdfb2d2849f1c3b2ad3c051bd4f3751a177f77a92758c6d2b23fe7f1535b54e5846d11c135de8286066dec1b25f6e1378944ac5f7fce42d055821b5e19") perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xd68, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f0000014f88)={0x5, 0xfffffffffffffdc4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x46000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = getpid() perf_event_open(&(0x7f0000000680)={0x4, 0x70, 0x64, 0xffff, 0x1f, 0x4, 0x0, 0x1c3, 0x0, 0x1, 0x1, 0x9, 0x1ff, 0xfffffffffffffff8, 0x0, 0x0, 0x6, 0x7fffffff, 0x4, 0xffffffff, 0x80000001, 0xd0, 0x7, 0x1f, 0x0, 0x8, 0x9, 0x1ff, 0x8, 0x785, 0x4, 0xff, 0x2, 0x656, 0x5000000, 0x1, 0x460e3be0, 0x1, 0x0, 0x0, 0x7, @perf_bp={&(0x7f0000000640), 0x1}, 0x1000, 0xa, 0x7fff, 0x7, 0x3, 0x400, 0x9}, r5, 0xe, r4, 0x1) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', 0x0, 0x10}, 0x10) close(0xffffffffffffffff) bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)={&(0x7f0000000040)='./file0\x00', 0x0, 0x18}, 0x10) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000100)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0, 0x2e, &(0x7f0000000440), &(0x7f0000000140)=""/46, 0x4229}, 0x28) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000003480)={&(0x7f0000003300)=@can={0x0, 0x0}, 0x80, &(0x7f0000003400)=[{&(0x7f0000003380)=""/56, 0x38}, {&(0x7f00000033c0)=""/1, 0x1}], 0x2, &(0x7f0000003440)=""/33, 0x21, 0x1}, 0x40010000) bpf$PROG_LOAD(0x5, &(0x7f00000034c0)={0xe, 0x6, &(0x7f0000000940)=ANY=[@ANYBLOB="1800000002000000000000004ce700002555fdff00000000002371d07c9ba7f4a23372b0ad61000000000000009500000000000000"], &(0x7f00000007c0)='GPL\x00', 0x3, 0x2d, &(0x7f0000000800)=""/45, 0x40f00, 0x1, [], r6}, 0x48) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000740)={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x10) socketpair$inet(0x2, 0x0, 0x81, &(0x7f0000000240)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={0xffffffffffffffff, &(0x7f0000000500)="ae30f1bca1b4d3f69f1aac81517d42ad5980bc63b5008616a1f4724b9f8c1e4ecd8de336f57dd727cdaab04f0b40f28612615ad08de414711d841a88db33fd33884b627074213a0c5de3be2bbaec9207d9865c47f240467849979b5ab5632376608fc4be41a274abb2dc07cabe344a18db51048e5b0cbda843905a4258cdee3e649eddf104ba78894dce09747dcfe6a8d6d6d985520eeef448b83a8bcb83074541ba7a20d6094aa206c01a0690e5b3bfa05d475eb382b0199031d22bb26cde9b1ca0055eef9f6c4993b71ba19ba0590bb5efdaddaa574c25356ca890d138fc9fe0e975b6d5a1a8251503cd0a91845f9d95", &(0x7f0000000480)="9bc7741ea5e524cc8c6f748a73153834428729c45bf4ad446d2dddf1978baf431d0ba35b5442b5afe22db8b003650320200af7e1368ef7cdfa79ca8b9d3564363a5d2a502970314f2264c883bc8d990afc003e5adb95b30edad245c4420c8126f1d33db75ff0230698eaff90055e0f", 0x2}, 0x20) socketpair(0x0, 0x80003, 0xffff, &(0x7f0000000380)={0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r7, 0x50, &(0x7f00000003c0)}, 0x10) 2018/03/29 11:56:30 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x3, &(0x7f0000002000)=@framed={{0x18}, [], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000680)={0xffffffffffffffff, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x7}, 0x28) recvmsg(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000001c0)) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000100), 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) recvmsg(r3, &(0x7f00000011c0)={&(0x7f0000000b40)=@can, 0x80, &(0x7f0000001100)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f0000000c80)=""/169, 0xa9}, {&(0x7f0000000e40)=""/128, 0x80}, {&(0x7f0000000ec0)=""/48, 0x30}, {&(0x7f0000000f00)=""/137, 0x89}, {&(0x7f0000006000)=""/4096, 0x1000}, {&(0x7f0000007000)=""/4096, 0x1000}, {&(0x7f0000001080)=""/127, 0x7f}, {&(0x7f0000008000)=""/4096, 0x1000}], 0x9, 0x0, 0x0, 0x1}, 0x2020) bpf$MAP_CREATE(0x0, &(0x7f0000001200)={0x7, 0x4, 0x0, 0x4, 0x8, 0xffffffffffffffff, 0x9}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x1000000007, 0xcf2e, 0x7e, 0x20, 0x15, r1, 0x4}, 0x2c) socketpair(0x3, 0x80e, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r4, &(0x7f0000000200)={&(0x7f0000000fc0)=@pppol2tp={0x18, 0x1, {0x0, r3, {0x2, 0x4e20, @broadcast=0xffffffff}, 0x1, 0x3, 0x0, 0x2}}, 0x80, &(0x7f0000001580)=[{&(0x7f0000001240)="95c4dcff0f017b3c1979888e50f6c20a37b4edaffb28a3b609d24a8180434ab2fac426d3e4fc87e18267002be3cd56b11d69c4db739bf6a9c91af67ee87be1ea522993a368bdfc0df55539a60ef5515b4f03f3dbddae65cd66a90f030118870b473f156cb9a18624103000608c63f84b09ea89bfb8d8e7705c6ef456ef28adec5e566632ddd63098", 0x88}, {&(0x7f0000001380)="5745869bf3b6f562576761d821af2ad55c2f81345c810d6dbd43facd33c5107488aa7f04c5ab1302b820cd31405e9f657776a0d48e2225f39aabc3de0b30dc7422503b448ad89c23ebaee24ae9696e4e58eccae5febf47fff53dc1f03d869303acdef233746263c5c567e84edb166010fd23f56d6e84406bced5a00b5016b0c700fd76218ecf5da3527552a683eb87aa4b246cd74bcbeff8dedec74332e0214e4dc64cb7ac24c4447843caa7550375ef8e1f74a78c40a617e913a25e4837d24fb09e93eaa2", 0xc5}, {&(0x7f0000001480)="8247f46d4324760570d5078149dc5b38f7d1c592564148ecc6262e91c29cd4344e423ff476882993a2844af9a7c306a15e659a4cb9230b5139842c87ad8fa95c202146730fa610b141dfe4c7b771b46e4db879d2b92a01cb8642100d80a1d4658fd0df05c06c8615960a92b690c728e2603373657a9a46b2f200f2895198694d470ab95b6eb7a76ccee67c9219b4afa289d70c87cf22c733e00700f345136d59bcbd89ce7e110746f91e7a7661b8eb0afe54e3cb1c712441dd9a6ffb59a2eb58e5f5eabd4bec428fe27a403bb0d19125e473abdfea87a0c89108e3c876438a7c3f84bebad6cf858f26d2083efd60", 0xee}], 0x3, &(0x7f000000a000)=[{0x88, 0x112, 0xc2, "6671b4b66ac2fb4e14cee671813dc3834802e601529feb049ebb70880567948953018cfd53d7b1c9be27b1084adfba62040c7f889cfbc15407d93133259d9d5052bf6648a69218702e35278939ad399dc3ebed233c1792c7c1204353c8fe75ea0398f4aaf830834bc93873c119dddc539c"}, {0xe8, 0x6f180cc1befb202, 0x9, "4577f77fd3b3acd92c96feff8b0409afeae1c16fa3d367241c9679e5105141c7205d47ce27a418c10fbe7f601c3142e7b7b3a67322c9d345e0baf4315e13dc771a962ff445015c98a70b319d46ba59155d1cf07827804ea1ca86db74f3029bd60f6f365d955ec12be30102e59b4b3940152988ef09443df596bad9525f697fad61507e856c6acb744cfb034863943e811bd378843ccbd95f8221a444f4c323a391f5788559f34ac02e6e18065b87e8c962353623250694e5b4bf9bc1b00fadf2875995067ff6c18590c207f9a83f06665f5b5af77b4e"}, {0xa0, 0x10f, 0x5, "07c5972c79a30903d5d93f57c962c0351628551f6a3fbac8e18984ad9b8caeb403f1d588fa0b9955ce44d018cbcc06ad98b588dd45fd0ccd6b8d1965e70693ec76dd521aa2693829ef54059dc3191f2f4eca64c63f2f901ead2d6c54f0119212ebb77e956117d9130d3adff30a5598567fd540cf0a8f9f8c469ad15f209ad8ef161006831b39e4ddf2fcd748a8629e33"}], 0x210, 0x40}, 0x40) close(r0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)) recvmsg(r2, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) recvmsg$kcm(r4, &(0x7f0000001a00)={0x0, 0x0, &(0x7f00000018c0)=[{&(0x7f0000001600)=""/173, 0xad}, {&(0x7f0000001040)=""/25, 0x19}, {&(0x7f00000016c0)=""/132, 0x84}, {&(0x7f0000001780)=""/91, 0x5b}, {&(0x7f0000001800)=""/183, 0xb7}], 0x5, &(0x7f0000001940)=""/163, 0xa3, 0xe43}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000a80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r5}, 0x48) 2018/03/29 11:56:30 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x1e1, 0x100000000209e20, 0x8000000001, 0x5}, 0xfffffffffffffe20) r0 = getpid() r1 = perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0xfffffffffffffffc, 0x3, 0x8, 0x0, 0x0, 0x9, 0x10000, 0xc, 0x3d3, 0x80, 0x5, 0xfffffffffffffffc, 0x8, 0x3f, 0x5d, 0xbbb0, 0x20, 0x3, 0x8000, 0x100000000, 0x8, 0x9, 0x2, 0x4, 0x800, 0xf8, 0x3, 0x9, 0x1, 0x3, 0x8, 0x3, 0x7, 0x10001, 0xf16, 0x2, 0x0, 0x7fffffff, 0x4, @perf_bp={&(0x7f0000000780), 0x1}, 0x4080, 0x10001, 0xcc, 0x7, 0x3, 0xffff, 0x7fffffff}, 0xffffffffffffffff, 0xd, 0xffffffffffffff9c, 0x8) perf_event_open(&(0x7f0000000980)={0x4, 0x70, 0x6, 0x3f, 0x8e, 0x1, 0x0, 0x3, 0x404, 0x0, 0xbc2b, 0x40, 0x7, 0xffff, 0xffff, 0x9, 0x9de2, 0x9, 0x0, 0x3, 0x7f, 0xff, 0x40, 0x400, 0x9, 0x7fffffff, 0x80000000, 0x7, 0x8, 0x10001, 0x1f, 0x2778, 0x800, 0x8001, 0x101, 0x9, 0x8, 0x7ff, 0x0, 0x1000, 0x5, @perf_config_ext={0x3ff, 0xb69b}, 0x3040, 0x2, 0x2, 0x5, 0x7, 0x6, 0x7283ed73}, r0, 0xe, r1, 0x8) bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x0, 0x0, 0x7ffff9, 0x0, 0x20000003, 0x0}, 0x2c) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) r2 = gettid() r3 = perf_event_open(&(0x7f00000008c0)={0x7, 0x70, 0x1, 0x200, 0x3, 0xdbce, 0x0, 0x8, 0x1002, 0x1, 0xffffffffffffff00, 0x8, 0x1, 0xb3fa, 0x8, 0x0, 0x1, 0x2, 0x1000, 0x2, 0x401, 0x8, 0x3, 0x81, 0x0, 0x7, 0x2fc4, 0x882, 0x4, 0x8, 0x3, 0x81, 0x3, 0x7, 0x8857, 0x7, 0x5, 0x9, 0x0, 0x7, 0x1, @perf_config_ext={0x0, 0x80000000}, 0x400, 0x7f, 0x4, 0x7, 0x2, 0x7f, 0x200}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000840)={0x5, 0x70, 0xef, 0x2, 0x1000, 0xffffffff80000000, 0x0, 0x1a7800000000, 0x2000, 0x4, 0x5, 0x6814, 0x3a9, 0x5, 0x63b, 0x6, 0x8, 0x1000, 0x250420ee, 0x3, 0x0, 0x20, 0x6, 0x0, 0x4, 0x5, 0x4, 0x8, 0x3, 0x8, 0x52893dd5, 0x2, 0x2, 0x8, 0x44d, 0x1, 0x8, 0x6, 0x0, 0x100000000, 0x0, @perf_config_ext={0x9, 0x80}, 0x0, 0x0, 0x2b67, 0x6, 0x4b0, 0x81, 0x4}, r2, 0x5, r3, 0xb) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1003, 0x0) mount(&(0x7f00002b9ff8)='./file0\x00', &(0x7f0000cbeff8)='./file0\x00', &(0x7f00005f7ffa)='ramfs\x00', 0x80000, &(0x7f000002f000)) mount(&(0x7f0000000000)='.', &(0x7f0000000040)='.', &(0x7f0000000080)='cgroup\x00', 0x5010, &(0x7f00000000c0)) mount(&(0x7f0000377ff8)='.', &(0x7f0000000280)='.', &(0x7f0000000600)='nfs4\x00', 0x5010, &(0x7f0000000300)="2161893416a0c71070768c219eb114c3253c9f3baf4e9e8e9111c1a7fc6e266009fe27243deeaa22ca7ae9341f714300b5ee807e55d609036f2a3260475922bdfb2d2849f1c3b2ad3c051bd4f3751a177f77a92758c6d2b23fe7f1535b54e5846d11c135de8286066dec1b25f6e1378944ac5f7fce42d055821b5e19") perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xd68, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f0000014f88)={0x5, 0xfffffffffffffdc4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x46000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = getpid() perf_event_open(&(0x7f0000000680)={0x4, 0x70, 0x64, 0xffff, 0x1f, 0x4, 0x0, 0x1c3, 0x0, 0x1, 0x1, 0x9, 0x1ff, 0xfffffffffffffff8, 0x0, 0x0, 0x6, 0x7fffffff, 0x0, 0xffffffff, 0x80000001, 0xd0, 0x7, 0x1f, 0x0, 0x8, 0x9, 0x1ff, 0x8, 0x785, 0x4, 0xff, 0x2, 0x656, 0x5000000, 0x1, 0x460e3be0, 0x1, 0x0, 0x0, 0x7, @perf_bp={&(0x7f0000000640), 0x1}, 0x1000, 0xa, 0x7fff, 0x7, 0x3, 0x400, 0x9}, r5, 0xe, r4, 0x1) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', 0x0, 0x10}, 0x10) close(0xffffffffffffffff) bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)={&(0x7f0000000040)='./file0\x00', 0x0, 0x18}, 0x10) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000100)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0, 0x2e, &(0x7f0000000440), &(0x7f0000000140)=""/46, 0x4229}, 0x28) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000003480)={&(0x7f0000003300)=@can={0x0, 0x0}, 0x80, &(0x7f0000003400)=[{&(0x7f0000003380)=""/56, 0x38}, {&(0x7f00000033c0)=""/1, 0x1}], 0x2, &(0x7f0000003440)=""/33, 0x21, 0x1}, 0x40010000) bpf$PROG_LOAD(0x5, &(0x7f00000034c0)={0xe, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="1800000002000000000000004ce700002555fdff00000000002371d07c9ba7f4a23372b0ad61000000000000009500000000000000"], &(0x7f00000007c0)='GPL\x00', 0x3, 0x2d, &(0x7f0000000800)=""/45, 0x40f00, 0x1, [], r6}, 0x48) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000740)={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x10) socketpair$inet(0x2, 0x80a, 0x81, &(0x7f0000000240)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={0xffffffffffffffff, &(0x7f0000000500)="ae30f1bca1b4d3f69f1aac81517d42ad5980bc63b5008616a1f4724b9f8c1e4ecd8de336f57dd727cdaab04f0b40f28612615ad08de414711d841a88db33fd33884b627074213a0c5de3be2bbaec9207d9865c47f240467849979b5ab5632376608fc4be41a274abb2dc07cabe344a18db51048e5b0cbda843905a4258cdee3e649eddf104ba78894dce09747dcfe6a8d6d6d985520eeef448b83a8bcb83074541ba7a20d6094aa206c01a0690e5b3bfa05d475eb382b0199031d22bb26cde9b1ca0055eef9f6c4993b71ba19ba0590bb5efdaddaa574c25356ca890d138fc9fe0e975b6d5a1a8251503cd0a91845f9d95", &(0x7f0000000480)="9bc7741ea5e524cc8c6f748a73153834428729c45bf4ad446d2dddf1978baf431d0ba35b5442b5afe22db8b003650320200af7e1368ef7cdfa79ca8b9d3564363a5d2a502970314f2264c883bc8d990afc003e5adb95b30edad245c4420c8126f1d33db75ff0230698eaff90055e0f", 0x2}, 0x20) socketpair(0x0, 0x80003, 0xffff, &(0x7f0000000380)={0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r7, 0x50, &(0x7f00000003c0)}, 0x10) 2018/03/29 11:56:30 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x3, &(0x7f0000002000)=@framed={{0x18}, [], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000680)={0xffffffffffffffff, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x7}, 0x28) recvmsg(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x7, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000100)=r0, 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) recvmsg(r2, &(0x7f00000011c0)={&(0x7f0000000b40)=@can, 0x80, &(0x7f0000001100)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f0000000c80)=""/169, 0xa9}, {&(0x7f0000000d40)=""/229, 0xe5}, {&(0x7f0000000e40)=""/128, 0x80}, {&(0x7f0000000ec0)=""/48, 0x30}, {&(0x7f0000000f00)=""/137, 0x89}, {&(0x7f0000006000)=""/4096, 0x1000}, {&(0x7f0000007000)=""/4096, 0x1000}, {&(0x7f0000001080)=""/127, 0x7f}, {&(0x7f0000008000)=""/4096, 0x1000}], 0xa, 0x0, 0x0, 0x1}, 0x2020) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001200)={0x7, 0x4, 0x0, 0x4, 0x8, 0xffffffffffffffff, 0x9}, 0x2c) socketpair(0x3, 0x80e, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r3, &(0x7f0000000200)={&(0x7f0000000fc0)=@pppol2tp={0x18, 0x1, {0x0, r2, {0x2, 0x4e20, @broadcast=0xffffffff}, 0x1, 0x3, 0x0, 0x2}}, 0x80, &(0x7f0000001580)=[{&(0x7f0000001240)="95c4dcff0f017b3c1979888e50f6c20a37b4edaffb28a3b609d24a8180434ab2fac426d3e4fc87e18267002be3cd56b11d69c4db739bf6a9c91af67ee87be1ea522993a368bdfc0df55539a60ef5515b4f03f3dbddae65cd66a90f030118870b473f156cb9a18624103000608c63f84b09ea89bfb8d8e7705c6ef456ef28adec5e566632ddd63098", 0x88}, {&(0x7f0000001380)="5745869bf3b6f562576761d821af2ad55c2f81345c810d6dbd43facd33c5107488aa7f04c5ab1302b820cd31405e9f657776a0d48e2225f39aabc3de0b30dc7422503b448ad89c23ebaee24ae9696e4e58eccae5febf47fff53dc1f03d869303acdef233746263c5c567e84edb166010fd23f56d6e84406bced5a00b5016b0c700fd76218ecf5da3527552a683eb87aa4b246cd74bcbeff8dedec74332e0214e4dc64cb7ac24c4447843caa7550375ef8e1f74a78c40a617e913a25e4837d24fb09e93eaa2", 0xc5}, {&(0x7f0000001480)="8247f46d4324760570d5078149dc5b38f7d1c592564148ecc6262e91c29cd4344e423ff476882993a2844af9a7c306a15e659a4cb9230b5139842c87ad8fa95c202146730fa610b141dfe4c7b771b46e4db879d2b92a01cb8642100d80a1d4658fd0df05c06c8615960a92b690c728e2603373657a9a46b2f200f2895198694d470ab95b6eb7a76ccee67c9219b4afa289d70c87cf22c733e00700f345136d59bcbd89ce7e110746f91e7a7661b8eb0afe54e3cb1c712441dd9a6ffb59a2eb58e5f5eabd4bec428fe27a403bb0d19125e473abdfea87a0c89108e3c876438a7c3f84bebad6cf858f26d2083efd60", 0xee}], 0x3, &(0x7f000000a000)=[{0x88, 0x112, 0xc2, "6671b4b66ac2fb4e14cee671813dc3834802e601529feb049ebb70880567948953018cfd53d7b1c9be27b1084adfba62040c7f889cfbc15407d93133259d9d5052bf6648a69218702e35278939ad399dc3ebed233c1792c7c1204353c8fe75ea0398f4aaf830834bc93873c119dddc539c"}, {0xe8, 0x6f180cc1befb202, 0x9, "4577f77fd3b3acd92c96feff8b0409afeae1c16fa3d367241c9679e5105141c7205d47ce27a418c10fbe7f601c3142e7b7b3a67322c9d345e0baf4315e13dc771a962ff445015c98a70b319d46ba59155d1cf07827804ea1ca86db74f3029bd60f6f365d955ec12be30102e59b4b3940152988ef09443df596bad9525f697fad61507e856c6acb744cfb034863943e811bd378843ccbd95f8221a444f4c323a391f5788559f34ac02e6e18065b87e8c962353623250694e5b4bf9bc1b00fadf2875995067ff6c18590c207f9a83f06665f5b5af77b4e"}, {0xa0, 0x10f, 0x5, "07c5972c79a30903d5d93f57c962c0351628551f6a3fbac8e18984ad9b8caeb403f1d588fa0b9955ce44d018cbcc06ad98b588dd45fd0ccd6b8d1965e70693ec76dd521aa2693829ef54059dc3191f2f4eca64c63f2f901ead2d6c54f0119212ebb77e956117d9130d3adff30a5598567fd540cf0a8f9f8c469ad15f209ad8ef161006831b39e4ddf2fcd748a8629e33"}], 0x210, 0x40}, 0x40) close(r0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)) recvmsg(r1, &(0x7f00000267c0)={&(0x7f00000251c0)=@can, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) 2018/03/29 11:56:30 executing program 4 (fault-call:8 fault-nth:62): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x3, &(0x7f0000002000)=@framed={{0x18}, [], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000680)={0xffffffffffffffff, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x7}, 0x28) recvmsg(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000001c0)) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000100)=r0, 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) recvmsg(r3, &(0x7f00000011c0)={&(0x7f0000000b40)=@can, 0x80, &(0x7f0000001100)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f0000000c80)=""/169, 0xa9}, {&(0x7f0000000d40)=""/229, 0xe5}, {&(0x7f0000000e40)=""/128, 0x80}, {&(0x7f0000000ec0)=""/48, 0x30}, {&(0x7f0000000f00)=""/137, 0x89}, {&(0x7f0000006000)=""/4096, 0x1000}, {&(0x7f0000007000)=""/4096, 0x1000}, {&(0x7f0000001080)=""/127, 0x7f}, {&(0x7f0000008000)=""/4096, 0x1000}], 0xa, 0x0, 0x0, 0x1}, 0x2020) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001200)={0x7, 0x4, 0x0, 0x4, 0x8, 0xffffffffffffffff, 0x9}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x1000000007, 0xcf2e, 0x7e, 0x20, 0x15, r1, 0x4}, 0x2c) socketpair(0x3, 0x80e, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r4, &(0x7f0000000200)={&(0x7f0000000fc0)=@pppol2tp={0x18, 0x1, {0x0, r3, {0x2, 0x4e20, @broadcast=0xffffffff}, 0x1, 0x3, 0x0, 0x2}}, 0x80, &(0x7f0000001580)=[{&(0x7f0000001240)="95c4dcff0f017b3c1979888e50f6c20a37b4edaffb28a3b609d24a8180434ab2fac426d3e4fc87e18267002be3cd56b11d69c4db739bf6a9c91af67ee87be1ea522993a368bdfc0df55539a60ef5515b4f03f3dbddae65cd66a90f030118870b473f156cb9a18624103000608c63f84b09ea89bfb8d8e7705c6ef456ef28adec5e566632ddd63098", 0x88}, {&(0x7f0000001380)="5745869bf3b6f562576761d821af2ad55c2f81345c810d6dbd43facd33c5107488aa7f04c5ab1302b820cd31405e9f657776a0d48e2225f39aabc3de0b30dc7422503b448ad89c23ebaee24ae9696e4e58eccae5febf47fff53dc1f03d869303acdef233746263c5c567e84edb166010fd23f56d6e84406bced5a00b5016b0c700fd76218ecf5da3527552a683eb87aa4b246cd74bcbeff8dedec74332e0214e4dc64cb7ac24c4447843caa7550375ef8e1f74a78c40a617e913a25e4837d24fb09e93eaa2", 0xc5}, {&(0x7f0000001480)="8247f46d4324760570d5078149dc5b38f7d1c592564148ecc6262e91c29cd4344e423ff476882993a2844af9a7c306a15e659a4cb9230b5139842c87ad8fa95c202146730fa610b141dfe4c7b771b46e4db879d2b92a01cb8642100d80a1d4658fd0df05c06c8615960a92b690c728e2603373657a9a46b2f200f2895198694d470ab95b6eb7a76ccee67c9219b4afa289d70c87cf22c733e00700f345136d59bcbd89ce7e110746f91e7a7661b8eb0afe54e3cb1c712441dd9a6ffb59a2eb58e5f5eabd4bec428fe27a403bb0d19125e473abdfea87a0c89108e3c876438a7c3f84bebad6cf858f26d2083efd60", 0xee}], 0x3, &(0x7f000000a000)=[{0x88, 0x112, 0xc2, "6671b4b66ac2fb4e14cee671813dc3834802e601529feb049ebb70880567948953018cfd53d7b1c9be27b1084adfba62040c7f889cfbc15407d93133259d9d5052bf6648a69218702e35278939ad399dc3ebed233c1792c7c1204353c8fe75ea0398f4aaf830834bc93873c119dddc539c"}, {0xe8, 0x6f180cc1befb202, 0x9, "4577f77fd3b3acd92c96feff8b0409afeae1c16fa3d367241c9679e5105141c7205d47ce27a418c10fbe7f601c3142e7b7b3a67322c9d345e0baf4315e13dc771a962ff445015c98a70b319d46ba59155d1cf07827804ea1ca86db74f3029bd60f6f365d955ec12be30102e59b4b3940152988ef09443df596bad9525f697fad61507e856c6acb744cfb034863943e811bd378843ccbd95f8221a444f4c323a391f5788559f34ac02e6e18065b87e8c962353623250694e5b4bf9bc1b00fadf2875995067ff6c18590c207f9a83f06665f5b5af77b4e"}, {0xa0, 0x10f, 0x5, "07c5972c79a30903d5d93f57c962c0351628551f6a3fbac8e18984ad9b8caeb403f1d588fa0b9955ce44d018cbcc06ad98b588dd45fd0ccd6b8d1965e70693ec76dd521aa2693829ef54059dc3191f2f4eca64c63f2f901ead2d6c54f0119212ebb77e956117d9130d3adff30a5598567fd540cf0a8f9f8c469ad15f209ad8ef161006831b39e4ddf2fcd748a8629e33"}], 0x210, 0x40}, 0x40) close(r0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b53596090ebcc07d8584f358be88fafe") recvmsg(r2, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) recvmsg$kcm(r4, &(0x7f0000001a00)={0x0, 0x0, &(0x7f00000018c0)=[{&(0x7f0000001600)=""/173, 0xad}, {&(0x7f0000001040)=""/25, 0x19}, {&(0x7f00000016c0)=""/132, 0x84}, {&(0x7f0000001780)=""/91, 0x5b}, {&(0x7f0000001800)=""/183, 0xb7}], 0x5, &(0x7f0000001940)=""/163, 0xa3, 0xe43}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000a80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r5}, 0x48) 2018/03/29 11:56:30 executing program 6: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x3, &(0x7f0000002000)=@framed={{0x18}, [], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000680)={0xffffffffffffffff, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x7}, 0x28) recvmsg(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000001c0)) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000100)=r0, 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) recvmsg(r3, &(0x7f00000011c0)={&(0x7f0000000b40)=@can, 0x80, &(0x7f0000001100)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f0000000c80)=""/169, 0xa9}, {&(0x7f0000000d40)=""/229, 0xe5}, {&(0x7f0000000e40)=""/128, 0x80}, {&(0x7f0000000ec0)=""/48, 0x30}, {&(0x7f0000000f00)=""/137, 0x89}, {&(0x7f0000006000)=""/4096, 0x1000}, {&(0x7f0000007000)=""/4096, 0x1000}, {&(0x7f0000001080)=""/127, 0x7f}], 0x9, 0x0, 0x0, 0x1}, 0x0) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001200)={0x7, 0x4, 0x0, 0x4, 0x8, 0xffffffffffffffff, 0x9}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x1000000007, 0xcf2e, 0x7e, 0x20, 0x15, r1, 0x4}, 0x2c) socketpair(0x3, 0x80e, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r4, &(0x7f0000000200)={&(0x7f0000000fc0)=@pppol2tp={0x18, 0x1, {0x0, r3, {0x2, 0x4e20, @broadcast=0xffffffff}, 0x1, 0x3, 0x0, 0x2}}, 0x80, &(0x7f0000001580)=[{&(0x7f0000001240)="95c4dcff0f017b3c1979888e50f6c20a37b4edaffb28a3b609d24a8180434ab2fac426d3e4fc87e18267002be3cd56b11d69c4db739bf6a9c91af67ee87be1ea522993a368bdfc0df55539a60ef5515b4f03f3dbddae65cd66a90f030118870b473f156cb9a18624103000608c63f84b09ea89bfb8d8e7705c6ef456ef28adec5e566632ddd63098", 0x88}, {&(0x7f0000001380)="5745869bf3b6f562576761d821af2ad55c2f81345c810d6dbd43facd33c5107488aa7f04c5ab1302b820cd31405e9f657776a0d48e2225f39aabc3de0b30dc7422503b448ad89c23ebaee24ae9696e4e58eccae5febf47fff53dc1f03d869303acdef233746263c5c567e84edb166010fd23f56d6e84406bced5a00b5016b0c700fd76218ecf5da3527552a683eb87aa4b246cd74bcbeff8dedec74332e0214e4dc64cb7ac24c4447843caa7550375ef8e1f74a78c40a617e913a25e4837d24fb09e93eaa2", 0xc5}, {&(0x7f0000001480)="8247f46d4324760570d5078149dc5b38f7d1c592564148ecc6262e91c29cd4344e423ff476882993a2844af9a7c306a15e659a4cb9230b5139842c87ad8fa95c202146730fa610b141dfe4c7b771b46e4db879d2b92a01cb8642100d80a1d4658fd0df05c06c8615960a92b690c728e2603373657a9a46b2f200f2895198694d470ab95b6eb7a76ccee67c9219b4afa289d70c87cf22c733e00700f345136d59bcbd89ce7e110746f91e7a7661b8eb0afe54e3cb1c712441dd9a6ffb59a2eb58e5f5eabd4bec428fe27a403bb0d19125e473abdfea87a0c89108e3c876438a7c3f84bebad6cf858f26d2083efd60", 0xee}], 0x3, &(0x7f000000a000)=[{0x88, 0x112, 0xc2, "6671b4b66ac2fb4e14cee671813dc3834802e601529feb049ebb70880567948953018cfd53d7b1c9be27b1084adfba62040c7f889cfbc15407d93133259d9d5052bf6648a69218702e35278939ad399dc3ebed233c1792c7c1204353c8fe75ea0398f4aaf830834bc93873c119dddc539c"}, {0xe8, 0x6f180cc1befb202, 0x9, "4577f77fd3b3acd92c96feff8b0409afeae1c16fa3d367241c9679e5105141c7205d47ce27a418c10fbe7f601c3142e7b7b3a67322c9d345e0baf4315e13dc771a962ff445015c98a70b319d46ba59155d1cf07827804ea1ca86db74f3029bd60f6f365d955ec12be30102e59b4b3940152988ef09443df596bad9525f697fad61507e856c6acb744cfb034863943e811bd378843ccbd95f8221a444f4c323a391f5788559f34ac02e6e18065b87e8c962353623250694e5b4bf9bc1b00fadf2875995067ff6c18590c207f9a83f06665f5b5af77b4e"}, {0xa0, 0x10f, 0x5, "07c5972c79a30903d5d93f57c962c0351628551f6a3fbac8e18984ad9b8caeb403f1d588fa0b9955ce44d018cbcc06ad98b588dd45fd0ccd6b8d1965e70693ec76dd521aa2693829ef54059dc3191f2f4eca64c63f2f901ead2d6c54f0119212ebb77e956117d9130d3adff30a5598567fd540cf0a8f9f8c469ad15f209ad8ef161006831b39e4ddf2fcd748a8629e33"}], 0x210, 0x40}, 0x40) close(r0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)) recvmsg(r2, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) recvmsg$kcm(r4, &(0x7f0000001a00)={0x0, 0x0, &(0x7f00000018c0)=[{&(0x7f0000001600)=""/173, 0xad}, {&(0x7f0000001040)=""/25, 0x19}, {&(0x7f00000016c0)=""/132, 0x84}, {&(0x7f0000001780)=""/91, 0x5b}, {&(0x7f0000001800)=""/183, 0xb7}], 0x5, &(0x7f0000001940)=""/163, 0xa3, 0xe43}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000a80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r5}, 0x48) [ 835.907167] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000003d 2018/03/29 11:56:30 executing program 4 (fault-call:8 fault-nth:63): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x3, &(0x7f0000002000)=@framed={{0x18}, [], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000680)={0xffffffffffffffff, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x7}, 0x28) recvmsg(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000001c0)) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000100)=r0, 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) recvmsg(r3, &(0x7f00000011c0)={&(0x7f0000000b40)=@can, 0x80, &(0x7f0000001100)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f0000000c80)=""/169, 0xa9}, {&(0x7f0000000d40)=""/229, 0xe5}, {&(0x7f0000000e40)=""/128, 0x80}, {&(0x7f0000000ec0)=""/48, 0x30}, {&(0x7f0000000f00)=""/137, 0x89}, {&(0x7f0000006000)=""/4096, 0x1000}, {&(0x7f0000007000)=""/4096, 0x1000}, {&(0x7f0000001080)=""/127, 0x7f}, {&(0x7f0000008000)=""/4096, 0x1000}], 0xa, 0x0, 0x0, 0x1}, 0x2020) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001200)={0x7, 0x4, 0x0, 0x4, 0x8, 0xffffffffffffffff, 0x9}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x1000000007, 0xcf2e, 0x7e, 0x20, 0x15, r1, 0x4}, 0x2c) socketpair(0x3, 0x80e, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r4, &(0x7f0000000200)={&(0x7f0000000fc0)=@pppol2tp={0x18, 0x1, {0x0, r3, {0x2, 0x4e20, @broadcast=0xffffffff}, 0x1, 0x3, 0x0, 0x2}}, 0x80, &(0x7f0000001580)=[{&(0x7f0000001240)="95c4dcff0f017b3c1979888e50f6c20a37b4edaffb28a3b609d24a8180434ab2fac426d3e4fc87e18267002be3cd56b11d69c4db739bf6a9c91af67ee87be1ea522993a368bdfc0df55539a60ef5515b4f03f3dbddae65cd66a90f030118870b473f156cb9a18624103000608c63f84b09ea89bfb8d8e7705c6ef456ef28adec5e566632ddd63098", 0x88}, {&(0x7f0000001380)="5745869bf3b6f562576761d821af2ad55c2f81345c810d6dbd43facd33c5107488aa7f04c5ab1302b820cd31405e9f657776a0d48e2225f39aabc3de0b30dc7422503b448ad89c23ebaee24ae9696e4e58eccae5febf47fff53dc1f03d869303acdef233746263c5c567e84edb166010fd23f56d6e84406bced5a00b5016b0c700fd76218ecf5da3527552a683eb87aa4b246cd74bcbeff8dedec74332e0214e4dc64cb7ac24c4447843caa7550375ef8e1f74a78c40a617e913a25e4837d24fb09e93eaa2", 0xc5}, {&(0x7f0000001480)="8247f46d4324760570d5078149dc5b38f7d1c592564148ecc6262e91c29cd4344e423ff476882993a2844af9a7c306a15e659a4cb9230b5139842c87ad8fa95c202146730fa610b141dfe4c7b771b46e4db879d2b92a01cb8642100d80a1d4658fd0df05c06c8615960a92b690c728e2603373657a9a46b2f200f2895198694d470ab95b6eb7a76ccee67c9219b4afa289d70c87cf22c733e00700f345136d59bcbd89ce7e110746f91e7a7661b8eb0afe54e3cb1c712441dd9a6ffb59a2eb58e5f5eabd4bec428fe27a403bb0d19125e473abdfea87a0c89108e3c876438a7c3f84bebad6cf858f26d2083efd60", 0xee}], 0x3, &(0x7f000000a000)=[{0x88, 0x112, 0xc2, "6671b4b66ac2fb4e14cee671813dc3834802e601529feb049ebb70880567948953018cfd53d7b1c9be27b1084adfba62040c7f889cfbc15407d93133259d9d5052bf6648a69218702e35278939ad399dc3ebed233c1792c7c1204353c8fe75ea0398f4aaf830834bc93873c119dddc539c"}, {0xe8, 0x6f180cc1befb202, 0x9, "4577f77fd3b3acd92c96feff8b0409afeae1c16fa3d367241c9679e5105141c7205d47ce27a418c10fbe7f601c3142e7b7b3a67322c9d345e0baf4315e13dc771a962ff445015c98a70b319d46ba59155d1cf07827804ea1ca86db74f3029bd60f6f365d955ec12be30102e59b4b3940152988ef09443df596bad9525f697fad61507e856c6acb744cfb034863943e811bd378843ccbd95f8221a444f4c323a391f5788559f34ac02e6e18065b87e8c962353623250694e5b4bf9bc1b00fadf2875995067ff6c18590c207f9a83f06665f5b5af77b4e"}, {0xa0, 0x10f, 0x5, "07c5972c79a30903d5d93f57c962c0351628551f6a3fbac8e18984ad9b8caeb403f1d588fa0b9955ce44d018cbcc06ad98b588dd45fd0ccd6b8d1965e70693ec76dd521aa2693829ef54059dc3191f2f4eca64c63f2f901ead2d6c54f0119212ebb77e956117d9130d3adff30a5598567fd540cf0a8f9f8c469ad15f209ad8ef161006831b39e4ddf2fcd748a8629e33"}], 0x210, 0x40}, 0x40) close(r0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b53596090ebcc07d8584f358be88fafe") recvmsg(r2, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) recvmsg$kcm(r4, &(0x7f0000001a00)={0x0, 0x0, &(0x7f00000018c0)=[{&(0x7f0000001600)=""/173, 0xad}, {&(0x7f0000001040)=""/25, 0x19}, {&(0x7f00000016c0)=""/132, 0x84}, {&(0x7f0000001780)=""/91, 0x5b}, {&(0x7f0000001800)=""/183, 0xb7}], 0x5, &(0x7f0000001940)=""/163, 0xa3, 0xe43}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000a80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r5}, 0x48) 2018/03/29 11:56:30 executing program 3: r0 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x10}, 0x10) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000000c0)={0x0, 0x1000, 0x8}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000080)='./file0\x00', r1}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0x0, 0x8}, 0x10) mount(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='cpuset\x00', 0x40, &(0x7f0000000280)="8a4562cb6a7df38be32246afcaef1e1a3f933cb428242c55c117c0fbbd62cea0aab31f2665fb88267466eca314fc8cafd72cc24143121c0691236768fad66390bf9b55014c2bd49faa5388cbabd52e730eeb4ccc411bacd296e423d971043756cf2b35a4063f2a7465b44a60ef31ae437f6160ed2f63afa62c36a27c33e4779e7c0404e337abc025bb2e4b39cc265573c6ab1a3ff09c7ad6bb4631a4") mount(&(0x7f0000000340)='./file1\x00', &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='devtmpfs\x00', 0x40, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xb, 0x7f, 0x0, 0x1, 0x12, r1, 0x100000000}, 0x2c) mkdir(&(0x7f0000000440)='./file1\x00', 0x20) mount(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='iso9660\x00', 0x8, &(0x7f0000000540)="650fe6ccea2b17860de967406c566ec16fe5a7a4c064707e22906e9d3d2a70b4") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000005c0)={r2, 0x28, &(0x7f0000000580)={0x0, 0x0}}, 0x10) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={r3, 0x8, 0x10}, 0xc) mount(&(0x7f0000000640)='./file1\x00', &(0x7f0000000680)='./file1\x00', &(0x7f00000006c0)='pstore\x00', 0x1000000, &(0x7f0000000700)="f48afa3ab3cc319f917be52b04c388c229578537782bc5ffc32c7747b1d28999ad89f5fba460640a324385ac03cccef4553d641b91d79d014804a98e72796f8eb2e1a7056efeaa63404648df67079ae817420f248ccf9d01e7a027c600c71777fb9ebc97da60f3d1a287ef8bc00f1dc68c3b1f0c1836cde5b62be45dd58c3415cbb0f916fe3c04fc69911e2bec15c208d023bdb608fa727657c532bd5101a2a36b34c4eb65f855fea2d6f8a0a79b15ecef1a4c81a8f6f5ed57b09db2ab482413540416126718f2a33ed21346ded20b084a8dc10702ec279fc486b5c57c163d") socketpair(0x3, 0x2, 0x1f, &(0x7f0000001c40)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$kcm(r6, &(0x7f0000004300)={0x0, 0x0, &(0x7f0000004140)=[{&(0x7f0000001c80)=""/139, 0x8b}, {&(0x7f0000001d40)=""/149, 0x95}, {&(0x7f0000001e00)=""/188, 0xbc}, {&(0x7f0000001ec0)=""/69, 0x45}, {&(0x7f0000001f40)=""/165, 0xa5}, {&(0x7f0000002000)=""/4096, 0x1000}, {&(0x7f0000003000)=""/42, 0x2a}, {&(0x7f0000003040)=""/4096, 0x1000}, {&(0x7f0000004040)=""/233, 0xe9}], 0x9, &(0x7f0000004200)=""/236, 0xec, 0xe00}, 0x40) mount(&(0x7f0000004340)='./file1/file0\x00', &(0x7f0000004380)='./file1\x00', &(0x7f00000043c0)='ceph\x00', 0x4860, &(0x7f0000004400)="2c8eb517dd302be26597065442d58f3f345c295b542b2b1df3046ae176") bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000004600)={r6, &(0x7f0000004440)="903685b47b9c4d5c1dffcefa6a92cd57ccdfaf1af0be272f1cb4a5b86ab9d1ef248a63f04f5d59c2cd6e6b7722f5ff866c5d353014f28baaa95bce06a787a3e085102126a0386ffd4e136d472f2cdfb7c658643d2792b7235e2ec8c782080850c20eb00014eab035d7d56c8ddd0d7fdc4c21602d480e4accea0867cc5b4172b46b8f028bd623c58544092396dbda704543cd7c93219ff7f4caf9d0c12fc32c65ddac48ba22321d2c7ef1152f0dd87ed22cb30eb2b24d381b3abaefc114ad4c08e329cfbce60e0549ca", &(0x7f0000004540)="38859653237c5c9685cf2e44e1eea64846e190b778f29b06c26c2f2b8a0800f9fc2019b05290fc5c82f612eb7f479918015eb3af93cc57f01db731e129275ce05910f66e436ef09a8fe7bf22f960eacec350a7f7e9e9a47cb163f467b6a29523346a4c61d65d2235c73095a53929d509538f640424133cfa3617b41a51aa7172460146433abbe604f2c92827fabd5d3134d36b4cecd0fd2549f3527615f9eb63dd9332021e4eff13ad6aa509db21ed98745d00cb36e547", 0x3}, 0x20) mkdir(&(0x7f0000004640)='./file1/file0\x00', 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000004680)={0x0, 0x0, 0xa6, 0x3, 0x4}, 0x2c) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000046c0)=0x7, 0x4) recvmsg$kcm(r6, &(0x7f00000058c0)={&(0x7f0000004700)=@alg, 0x80, &(0x7f0000005880)=[{&(0x7f0000004780)=""/4096, 0x1000}, {&(0x7f0000005780)=""/219, 0xdb}], 0x2, 0x0, 0x0, 0x100000001}, 0x40000000) r7 = gettid() r8 = perf_event_open(&(0x7f0000005900)={0x7, 0x70, 0x0, 0xfffffffffffffff7, 0x9, 0x4, 0x0, 0x7, 0x100, 0x8, 0x100000000, 0x8000, 0x8, 0x6, 0x0, 0x6, 0x10001, 0x9, 0x1f, 0x2, 0x1, 0x3, 0x1, 0x1f, 0x23, 0x1, 0xaa4, 0x5, 0x4, 0x200, 0x6, 0x9, 0xfffffffffffffffb, 0x3, 0x3, 0xff, 0x80000000, 0x0, 0x0, 0xffffffffffffff9d, 0x2, @perf_config_ext={0x7, 0x9}, 0x100, 0x8, 0x2, 0x6, 0x4, 0x6, 0xf71}, r7, 0x9, r6, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f00000059c0)={&(0x7f0000005980)='./file0\x00'}, 0x10) ioctl$sock_kcm_SIOCKCMATTACH(r5, 0x89e0, &(0x7f0000005a00)={r5, r0}) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000005c00)={r4, &(0x7f0000005a40)="313befc1e9ac680c4369983530ee783c4f018c38e134b4b0aebd06ede05f238850949c0f5d32ab19889f880e87e3a0fa5a43500affdcc508d56f3a4df6c159ca9cfa62124b79b4607d42738dc5e16d09ea2c6a2346fc2360feff08d9f464dfdebce2cb99d4ba8e5fc37edfba041f14e16a68192d7d8687404ee7318323520188c4e5d52e8c7ec40bd0823fb210e530c74ea842bd8bacbc48317b0b6ed12528ecd30e1af83b8049df791ff7affe91ab54", &(0x7f0000005b00)=""/243}, 0x18) mount(&(0x7f0000005c40)='./file1/file0\x00', &(0x7f0000005c80)='./file1\x00', &(0x7f0000005cc0)='btrfs\x00', 0x0, 0x0) recvmsg(r5, &(0x7f00000073c0)={&(0x7f0000005d00)=@sco, 0x80, &(0x7f0000007300)=[{&(0x7f0000005d80)=""/103, 0x67}, {&(0x7f0000005e00)=""/170, 0xaa}, {&(0x7f0000005ec0)=""/252, 0xfc}, {&(0x7f0000005fc0)=""/136, 0x88}, {&(0x7f0000006080)=""/125, 0x7d}, {&(0x7f0000006100)=""/4096, 0x1000}, {&(0x7f0000007100)=""/106, 0x6a}, {&(0x7f0000007180)=""/115, 0x73}, {&(0x7f0000007200)=""/240, 0xf0}], 0x9, 0x0, 0x0, 0x7}, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000007400)={r3, 0x10001, 0x18}, 0xc) ioctl$PERF_EVENT_IOC_REFRESH(r8, 0x2402, 0xc4c) recvmsg$kcm(r6, &(0x7f0000008880)={&(0x7f0000007440)=@l2, 0x80, &(0x7f0000008800)=[{&(0x7f00000074c0)=""/231, 0xe7}, {&(0x7f00000075c0)=""/118, 0x76}, {&(0x7f0000007640)=""/4096, 0x1000}, {&(0x7f0000008640)=""/223, 0xdf}, {&(0x7f0000008740)}, {&(0x7f0000008780)=""/32, 0x20}], 0x6}, 0x10000) 2018/03/29 11:56:30 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x1e1, 0x100000000209e20, 0x8000000001, 0x5}, 0xfffffffffffffe20) r0 = getpid() r1 = perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0xfffffffffffffffc, 0x3, 0x8, 0x0, 0x0, 0x9, 0x10000, 0xc, 0x3d3, 0x80, 0x5, 0xfffffffffffffffc, 0x8, 0x3f, 0x5d, 0xbbb0, 0x20, 0x3, 0x8000, 0x100000000, 0x8, 0x9, 0x2, 0x4, 0x800, 0xf8, 0x3, 0x9, 0x1, 0x3, 0x8, 0x3, 0x7, 0x10001, 0xf16, 0x2, 0x0, 0x7fffffff, 0x4, @perf_bp={&(0x7f0000000780), 0x1}, 0x4080, 0x10001, 0xcc, 0x7, 0x3, 0xffff, 0x7fffffff}, 0xffffffffffffffff, 0xd, 0xffffffffffffff9c, 0x8) perf_event_open(&(0x7f0000000980)={0x4, 0x70, 0x6, 0x3f, 0x8e, 0x1, 0x0, 0x3, 0x404, 0x0, 0xbc2b, 0x40, 0x7, 0xffff, 0xffff, 0x9, 0x9de2, 0x9, 0x0, 0x3, 0x7f, 0xff, 0x40, 0x400, 0x9, 0x7fffffff, 0x80000000, 0x7, 0x8, 0x10001, 0x1f, 0x2778, 0x800, 0x8001, 0x101, 0x9, 0x8, 0x7ff, 0x0, 0x1000, 0x5, @perf_config_ext={0x3ff, 0xb69b}, 0x3040, 0x2, 0x2, 0x5, 0x7, 0x6, 0x7283ed73}, r0, 0xe, r1, 0x8) bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x0, 0x0, 0x7ffff9, 0x0, 0x20000003, 0x0}, 0x2c) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) r2 = gettid() r3 = perf_event_open(&(0x7f00000008c0)={0x7, 0x70, 0x1, 0x200, 0x3, 0xdbce, 0x0, 0x8, 0x1002, 0x1, 0xffffffffffffff00, 0x8, 0x1, 0xb3fa, 0x8, 0x0, 0x1, 0x2, 0x1000, 0x2, 0x401, 0x8, 0x3, 0x81, 0x0, 0x7, 0x2fc4, 0x882, 0x4, 0x8, 0x3, 0x81, 0x3, 0x7, 0x8857, 0x7, 0x5, 0x9, 0x0, 0x7, 0x1, @perf_config_ext={0x0, 0x80000000}, 0x400, 0x7f, 0x4, 0x7, 0x2, 0x7f, 0x200}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000840)={0x5, 0x70, 0xef, 0x2, 0x1000, 0xffffffff80000000, 0x0, 0x1a7800000000, 0x2000, 0x4, 0x5, 0x6814, 0x3a9, 0x5, 0x63b, 0x6, 0x8, 0x1000, 0x250420ee, 0x3, 0x0, 0x20, 0x6, 0x0, 0x4, 0x5, 0x4, 0x8, 0x3, 0x8, 0x52893dd5, 0x2, 0x2, 0x8, 0x44d, 0x1, 0x8, 0x6, 0x0, 0x100000000, 0x0, @perf_config_ext={0x9, 0x80}, 0x0, 0x0, 0x2b67, 0x6, 0x4b0, 0x81, 0x4}, r2, 0x5, r3, 0xb) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1003, 0x0) mount(&(0x7f00002b9ff8)='./file0\x00', &(0x7f0000cbeff8)='./file0\x00', &(0x7f00005f7ffa)='ramfs\x00', 0x80000, &(0x7f000002f000)) mount(&(0x7f0000000000)='.', &(0x7f0000000040)='.', &(0x7f0000000080)='cgroup\x00', 0x5010, &(0x7f00000000c0)) mount(&(0x7f0000377ff8)='.', &(0x7f0000000280)='.', &(0x7f0000000600)='nfs4\x00', 0x5010, &(0x7f0000000300)="2161893416a0c71070768c219eb114c3253c9f3baf4e9e8e9111c1a7fc6e266009fe27243deeaa22ca7ae9341f714300b5ee807e55d609036f2a3260475922bdfb2d2849f1c3b2ad3c051bd4f3751a177f77a92758c6d2b23fe7f1535b54e5846d11c135de8286066dec1b25f6e1378944ac5f7fce42d055821b5e19") perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xd68, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f0000014f88)={0x5, 0xfffffffffffffdc4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x46000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = getpid() perf_event_open(&(0x7f0000000680)={0x4, 0x70, 0x64, 0xffff, 0x1f, 0x4, 0x0, 0x1c3, 0x0, 0x1, 0x1, 0x9, 0x1ff, 0xfffffffffffffff8, 0x0, 0x0, 0x6, 0x7fffffff, 0x0, 0xffffffff, 0x80000001, 0xd0, 0x7, 0x1f, 0x0, 0x8, 0x9, 0x1ff, 0x8, 0x785, 0x4, 0xff, 0x2, 0x656, 0x5000000, 0x1, 0x460e3be0, 0x1, 0x0, 0x0, 0x7, @perf_bp={&(0x7f0000000640), 0x1}, 0x1000, 0xa, 0x7fff, 0x7, 0x3, 0x400, 0x9}, r5, 0xe, r4, 0x1) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', 0x0, 0x10}, 0x10) close(0xffffffffffffffff) bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)={&(0x7f0000000040)='./file0\x00', 0x0, 0x18}, 0x10) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000100)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0, 0x2e, &(0x7f0000000440), &(0x7f0000000140)=""/46, 0x4229}, 0x28) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000003480)={&(0x7f0000003300)=@can={0x0, 0x0}, 0x80, &(0x7f0000003400)=[{&(0x7f0000003380)=""/56, 0x38}, {&(0x7f00000033c0)=""/1, 0x1}], 0x2, &(0x7f0000003440)=""/33, 0x21, 0x1}, 0x40010000) bpf$PROG_LOAD(0x5, &(0x7f00000034c0)={0xe, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="1800000002000000000000004ce700002555fdff00000000002371d07c9ba7f4a23372b0ad61000000000000009500000000000000"], &(0x7f00000007c0)='GPL\x00', 0x3, 0x2d, &(0x7f0000000800)=""/45, 0x40f00, 0x1, [], r6}, 0x48) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000740)={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x10) socketpair$inet(0x2, 0x80a, 0x81, &(0x7f0000000240)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={0xffffffffffffffff, &(0x7f0000000500)="ae30f1bca1b4d3f69f1aac81517d42ad5980bc63b5008616a1f4724b9f8c1e4ecd8de336f57dd727cdaab04f0b40f28612615ad08de414711d841a88db33fd33884b627074213a0c5de3be2bbaec9207d9865c47f240467849979b5ab5632376608fc4be41a274abb2dc07cabe344a18db51048e5b0cbda843905a4258cdee3e649eddf104ba78894dce09747dcfe6a8d6d6d985520eeef448b83a8bcb83074541ba7a20d6094aa206c01a0690e5b3bfa05d475eb382b0199031d22bb26cde9b1ca0055eef9f6c4993b71ba19ba0590bb5efdaddaa574c25356ca890d138fc9fe0e975b6d5a1a8251503cd0a91845f9d95", &(0x7f0000000480)="9bc7741ea5e524cc8c6f748a73153834428729c45bf4ad446d2dddf1978baf431d0ba35b5442b5afe22db8b003650320200af7e1368ef7cdfa79ca8b9d3564363a5d2a502970314f2264c883bc8d990afc003e5adb95b30edad245c4420c8126f1d33db75ff0230698eaff90055e0f", 0x2}, 0x20) socketpair(0x0, 0x80003, 0xffff, &(0x7f0000000380)={0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r7, 0x50, &(0x7f00000003c0)}, 0x10) 2018/03/29 11:56:30 executing program 0: r0 = socket$kcm(0x29, 0x7, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000001a00)) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000001a40)={0xffffffffffffffff}) recvmsg$kcm(r1, &(0x7f0000000540)={&(0x7f00000000c0)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @broadcast}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000240)=""/65, 0x41}], 0x1, &(0x7f0000000440)=""/213, 0xd5}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x8983, &(0x7f0000000040)) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f00000002c0)) r3 = perf_event_open(&(0x7f0000000180)={0x4, 0x70, 0xffffffff, 0x1, 0xd4b, 0xff, 0x0, 0x1, 0x2080, 0x4, 0x800, 0xfffffffffffffff7, 0x7, 0x1, 0x1, 0x7, 0x800, 0x1, 0x69b48904, 0x4800000000, 0x2, 0x6, 0x800, 0x100000001, 0x0, 0x8, 0x6, 0x80, 0x81, 0xff, 0x5, 0xffff, 0x2, 0x5e3, 0x8, 0x5, 0x1, 0x80000000, 0x0, 0xc64, 0x2, @perf_bp={&(0x7f0000000000), 0x2}, 0x1000, 0x101, 0xffffffffffff7fff, 0x6, 0x5, 0x95bd}, 0x0, 0xa, 0xffffffffffffff9c, 0x9) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f0000000200)={0x3, 0x0, [0x0, 0x0, 0x0]}) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000019c0)={0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000000140)="0253eea6a53cc0eae389e9a13e5f2046d0633eebde90f446c1b1eabbd0adb42dfcefb37a3df93feb3d5e76dc353ecf23fe9c81afa5", 0x35}, {&(0x7f00000002c0)}, {&(0x7f0000000400)}, {&(0x7f0000001600)}], 0x4, &(0x7f0000001700)=[{0x68, 0x107, 0x25047dc1, "755cd1e9e23de47cb15819d813deb534cee2d9497c58eba5bd8a228407fb709d70f16afa73f4924f12ecc429b6fd356748940b62ee5f5685ce027fe4e6c60a8f88cd1a5827d099f5849f09bd37f681e29814e6bb"}, {0x10, 0x0, 0x1ff}, {0x10, 0x107, 0x80000001}], 0x88}, 0x48800) r4 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080), 0x4) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000340)={r1, r4}) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000300)={0x0, r4, 0x2, 0x3}, 0x14) 2018/03/29 11:56:30 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x1e1, 0x100000000209e20, 0x8000000001, 0x5}, 0xfffffffffffffe20) r0 = getpid() r1 = perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0xfffffffffffffffc, 0x3, 0x8, 0x2, 0x0, 0x9, 0x10000, 0xc, 0x3d3, 0x80, 0x5, 0xfffffffffffffffc, 0x8, 0x3f, 0x5d, 0xbbb0, 0x20, 0x3, 0x8000, 0x100000000, 0x8, 0x9, 0x2, 0x4, 0x800, 0xf8, 0x3, 0x9, 0x1, 0x3, 0x8, 0x3, 0x7, 0x10001, 0xf16, 0x2, 0x0, 0x7fffffff, 0x4, @perf_bp={&(0x7f0000000780), 0x1}, 0x4080, 0x10001, 0xcc, 0x7, 0x3, 0xffff, 0x7fffffff}, 0xffffffffffffffff, 0xd, 0xffffffffffffff9c, 0x8) perf_event_open(&(0x7f0000000980)={0x4, 0x70, 0x6, 0x3f, 0x8e, 0x1, 0x0, 0x3, 0x404, 0x0, 0xbc2b, 0x40, 0x7, 0xffff, 0xffff, 0x9, 0x9de2, 0x9, 0x0, 0x3, 0x7f, 0xff, 0x40, 0x400, 0x9, 0x7fffffff, 0x80000000, 0x7, 0x8, 0x10001, 0x1f, 0x2778, 0x800, 0x8001, 0x101, 0x9, 0x8, 0x7ff, 0x0, 0x1000, 0x5, @perf_config_ext={0x3ff, 0xb69b}, 0x3040, 0x2, 0x2, 0x5, 0x7, 0x6, 0x7283ed73}, r0, 0xe, r1, 0x8) bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x0, 0x0, 0x7ffff9, 0x0, 0x20000003, 0x0}, 0x2c) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) r2 = gettid() r3 = perf_event_open(&(0x7f00000008c0)={0x7, 0x70, 0x1, 0x200, 0x3, 0xdbce, 0x0, 0x8, 0x1002, 0x1, 0xffffffffffffff00, 0x8, 0x1, 0xb3fa, 0x8, 0x0, 0x1, 0x2, 0x1000, 0x2, 0x401, 0x8, 0x3, 0x81, 0x0, 0x7, 0x2fc4, 0x882, 0x4, 0x8, 0x3, 0x81, 0x3, 0x7, 0x8857, 0x7, 0x5, 0x9, 0x0, 0x7, 0x1, @perf_config_ext={0x0, 0x80000000}, 0x400, 0x7f, 0x4, 0x7, 0x2, 0x7f, 0x200}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000840)={0x5, 0x70, 0xef, 0x2, 0x1000, 0xffffffff80000000, 0x0, 0x1a7800000000, 0x2000, 0x4, 0x5, 0x6814, 0x3a9, 0x5, 0x63b, 0x6, 0x8, 0x1000, 0x250420ee, 0x3, 0x0, 0x20, 0x6, 0x0, 0x4, 0x5, 0x4, 0x8, 0x3, 0x8, 0x52893dd5, 0x2, 0x2, 0x8, 0x44d, 0x1, 0x8, 0x6, 0x0, 0x100000000, 0x0, @perf_config_ext={0x9, 0x80}, 0x0, 0x0, 0x2b67, 0x6, 0x4b0, 0x81, 0x4}, r2, 0x5, r3, 0xb) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1003, 0x0) mount(&(0x7f00002b9ff8)='./file0\x00', &(0x7f0000cbeff8)='./file0\x00', &(0x7f00005f7ffa)='ramfs\x00', 0x80000, &(0x7f000002f000)) mount(&(0x7f0000000000)='.', &(0x7f0000000040)='.', &(0x7f0000000080)='cgroup\x00', 0x5010, &(0x7f00000000c0)) mount(&(0x7f0000377ff8)='.', &(0x7f0000000280)='.', &(0x7f0000000600)='nfs4\x00', 0x5010, &(0x7f0000000300)="2161893416a0c71070768c219eb114c3253c9f3baf4e9e8e9111c1a7fc6e266009fe27243deeaa22ca7ae9341f714300b5ee807e55d609036f2a3260475922bdfb2d2849f1c3b2ad3c051bd4f3751a177f77a92758c6d2b23fe7f1535b54e5846d11c135de8286066dec1b25f6e1378944ac5f7fce42d055821b5e19") perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xd68, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f0000014f88)={0x5, 0xfffffffffffffdc4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x46000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = getpid() perf_event_open(&(0x7f0000000680)={0x4, 0x70, 0x64, 0xffff, 0x1f, 0x4, 0x0, 0x1c3, 0x0, 0x1, 0x1, 0x9, 0x1ff, 0xfffffffffffffff8, 0x0, 0x0, 0x6, 0x7fffffff, 0x4, 0xffffffff, 0x80000001, 0xd0, 0x7, 0x1f, 0x0, 0x8, 0x9, 0x1ff, 0x8, 0x785, 0x4, 0xff, 0x2, 0x656, 0x5000000, 0x1, 0x460e3be0, 0x1, 0x0, 0x0, 0x7, @perf_bp={&(0x7f0000000640), 0x1}, 0x1000, 0xa, 0x7fff, 0x7, 0x3, 0x400, 0x9}, r5, 0xe, r4, 0x1) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', 0x0, 0x10}, 0x10) close(0xffffffffffffffff) bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)={&(0x7f0000000040)='./file0\x00', 0x0, 0x18}, 0x10) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000100)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0, 0x2e, &(0x7f0000000440), &(0x7f0000000140)=""/46, 0x4229}, 0x28) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000003480)={&(0x7f0000003300)=@can={0x0, 0x0}, 0x80, &(0x7f0000003400)=[{&(0x7f0000003380)=""/56, 0x38}, {&(0x7f00000033c0)=""/1, 0x1}], 0x2, &(0x7f0000003440)=""/33, 0x21, 0x1}, 0x40010000) bpf$PROG_LOAD(0x5, &(0x7f00000034c0)={0xe, 0x6, &(0x7f0000000940)=ANY=[@ANYBLOB="1800000002000000000000004ce700002555fdff00000000002371d07c9ba7f4a23372b0ad61000000000000009500000000000000"], &(0x7f00000007c0)='GPL\x00', 0x3, 0x2d, &(0x7f0000000800)=""/45, 0x40f00, 0x1, [], r6}, 0x48) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000740)={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x10) socketpair$inet(0x2, 0x80a, 0x0, &(0x7f0000000240)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={0xffffffffffffffff, &(0x7f0000000500)="ae30f1bca1b4d3f69f1aac81517d42ad5980bc63b5008616a1f4724b9f8c1e4ecd8de336f57dd727cdaab04f0b40f28612615ad08de414711d841a88db33fd33884b627074213a0c5de3be2bbaec9207d9865c47f240467849979b5ab5632376608fc4be41a274abb2dc07cabe344a18db51048e5b0cbda843905a4258cdee3e649eddf104ba78894dce09747dcfe6a8d6d6d985520eeef448b83a8bcb83074541ba7a20d6094aa206c01a0690e5b3bfa05d475eb382b0199031d22bb26cde9b1ca0055eef9f6c4993b71ba19ba0590bb5efdaddaa574c25356ca890d138fc9fe0e975b6d5a1a8251503cd0a91845f9d95", &(0x7f0000000480)="9bc7741ea5e524cc8c6f748a73153834428729c45bf4ad446d2dddf1978baf431d0ba35b5442b5afe22db8b003650320200af7e1368ef7cdfa79ca8b9d3564363a5d2a502970314f2264c883bc8d990afc003e5adb95b30edad245c4420c8126f1d33db75ff0230698eaff90055e0f", 0x2}, 0x20) socketpair(0x0, 0x80003, 0xffff, &(0x7f0000000380)={0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r7, 0x50, &(0x7f00000003c0)}, 0x10) 2018/03/29 11:56:30 executing program 0: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000001a00)) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000001a40)={0xffffffffffffffff}) recvmsg$kcm(r1, &(0x7f0000000540)={&(0x7f00000000c0)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @broadcast}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000240)=""/65, 0x41}], 0x1, &(0x7f0000000440)=""/213, 0xd5}, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0xe, 0x5, 0x400000000, 0x2, 0x2, 0xffffffffffffffff, 0xffffffffffffffe0}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r2, &(0x7f0000000300)="43b45823384bb9cd", &(0x7f0000000580)=""/159}, 0x18) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x8983, &(0x7f0000000040)) gettid() socketpair(0xa, 0x0, 0x5, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f0000000400)={0x3, 0x0, [0x0, 0x0, 0x0]}) socketpair(0x8, 0x6, 0x9, &(0x7f0000000000)) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000080)) socketpair(0x11, 0xa, 0x20, &(0x7f0000000640)) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000019c0)={0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000000140)="0253eea6a53cc0eae389e9a13e5f2046d0633eebde90f446c1b1eabbd0adb42dfcefb37a3df93feb3d5e76dc353ecf23fe9c81afa5", 0x35}, {&(0x7f00000001c0)}, {&(0x7f0000000400)}, {&(0x7f0000001600)}], 0x4, &(0x7f00000002c0)=ANY=[@ANYPTR64=&(0x7f0000000200)=ANY=[@ANYPTR]], 0x8}, 0x48800) socketpair(0x9, 0x5, 0x3, &(0x7f0000000180)) 2018/03/29 11:56:30 executing program 3: r0 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x10}, 0x10) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000000c0)={0x0, 0x1000, 0x8}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000080)='./file0\x00', r1}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0x0, 0x8}, 0x10) mount(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='cpuset\x00', 0x40, &(0x7f0000000280)="8a4562cb6a7df38be32246afcaef1e1a3f933cb428242c55c117c0fbbd62cea0aab31f2665fb88267466eca314fc8cafd72cc24143121c0691236768fad66390bf9b55014c2bd49faa5388cbabd52e730eeb4ccc411bacd296e423d971043756cf2b35a4063f2a7465b44a60ef31ae437f6160ed2f63afa62c36a27c33e4779e7c0404e337abc025bb2e4b39cc265573c6ab1a3ff09c7ad6bb4631a4") mount(&(0x7f0000000340)='./file1\x00', &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='devtmpfs\x00', 0x40, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xb, 0x7f, 0x0, 0x1, 0x12, r1, 0x100000000}, 0x2c) mkdir(&(0x7f0000000440)='./file1\x00', 0x20) mount(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='iso9660\x00', 0x8, &(0x7f0000000540)="650fe6ccea2b17860de967406c566ec16fe5a7a4c064707e22906e9d3d2a70b4") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000005c0)={r2, 0x28, &(0x7f0000000580)={0x0, 0x0}}, 0x10) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={r3, 0x8, 0x10}, 0xc) mount(&(0x7f0000000640)='./file1\x00', &(0x7f0000000680)='./file1\x00', &(0x7f00000006c0)='pstore\x00', 0x1000000, &(0x7f0000000700)="f48afa3ab3cc319f917be52b04c388c229578537782bc5ffc32c7747b1d28999ad89f5fba460640a324385ac03cccef4553d641b91d79d014804a98e72796f8eb2e1a7056efeaa63404648df67079ae817420f248ccf9d01e7a027c600c71777fb9ebc97da60f3d1a287ef8bc00f1dc68c3b1f0c1836cde5b62be45dd58c3415cbb0f916fe3c04fc69911e2bec15c208d023bdb608fa727657c532bd5101a2a36b34c4eb65f855fea2d6f8a0a79b15ecef1a4c81a8f6f5ed57b09db2ab482413540416126718f2a33ed21346ded20b084a8dc10702ec279fc486b5c57c163d") socketpair(0x3, 0x2, 0x1f, &(0x7f0000001c40)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$kcm(r6, &(0x7f0000004300)={0x0, 0x0, &(0x7f0000004140)=[{&(0x7f0000001c80)=""/139, 0x8b}, {&(0x7f0000001d40)=""/149, 0x95}, {&(0x7f0000001e00)=""/188, 0xbc}, {&(0x7f0000001ec0)=""/69, 0x45}, {&(0x7f0000001f40)=""/165, 0xa5}, {&(0x7f0000002000)=""/4096, 0x1000}, {&(0x7f0000003000)=""/42, 0x2a}, {&(0x7f0000003040)=""/4096, 0x1000}, {&(0x7f0000004040)=""/233, 0xe9}], 0x9, &(0x7f0000004200)=""/236, 0xec, 0xe00}, 0x40) mount(&(0x7f0000004340)='./file1/file0\x00', &(0x7f0000004380)='./file1\x00', &(0x7f00000043c0)='ceph\x00', 0x4860, &(0x7f0000004400)="2c8eb517dd302be26597065442d58f3f345c295b542b2b1df3046ae176") bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000004600)={r6, &(0x7f0000004440)="903685b47b9c4d5c1dffcefa6a92cd57ccdfaf1af0be272f1cb4a5b86ab9d1ef248a63f04f5d59c2cd6e6b7722f5ff866c5d353014f28baaa95bce06a787a3e085102126a0386ffd4e136d472f2cdfb7c658643d2792b7235e2ec8c782080850c20eb00014eab035d7d56c8ddd0d7fdc4c21602d480e4accea0867cc5b4172b46b8f028bd623c58544092396dbda704543cd7c93219ff7f4caf9d0c12fc32c65ddac48ba22321d2c7ef1152f0dd87ed22cb30eb2b24d381b3abaefc114ad4c08e329cfbce60e0549ca", &(0x7f0000004540)="38859653237c5c9685cf2e44e1eea64846e190b778f29b06c26c2f2b8a0800f9fc2019b05290fc5c82f612eb7f479918015eb3af93cc57f01db731e129275ce05910f66e436ef09a8fe7bf22f960eacec350a7f7e9e9a47cb163f467b6a29523346a4c61d65d2235c73095a53929d509538f640424133cfa3617b41a51aa7172460146433abbe604f2c92827fabd5d3134d36b4cecd0fd2549f3527615f9eb63dd9332021e4eff13ad6aa509db21ed98745d00cb36e547", 0x3}, 0x20) mkdir(&(0x7f0000004640)='./file1/file0\x00', 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000004680)={0x0, 0x0, 0xa6, 0x3, 0x4}, 0x2c) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000046c0)=0x7, 0x4) recvmsg$kcm(r6, &(0x7f00000058c0)={&(0x7f0000004700)=@alg, 0x80, &(0x7f0000005880)=[{&(0x7f0000004780)=""/4096, 0x1000}, {&(0x7f0000005780)=""/219, 0xdb}], 0x2, 0x0, 0x0, 0x100000001}, 0x40000000) r7 = gettid() r8 = perf_event_open(&(0x7f0000005900)={0x7, 0x70, 0x0, 0xfffffffffffffff7, 0x9, 0x4, 0x0, 0x7, 0x100, 0x8, 0x100000000, 0x8000, 0x8, 0x6, 0x0, 0x6, 0x10001, 0x9, 0x1f, 0x2, 0x1, 0x3, 0x1, 0x1f, 0x23, 0x1, 0xaa4, 0x5, 0x4, 0x200, 0x6, 0x9, 0xfffffffffffffffb, 0x3, 0x3, 0xff, 0x80000000, 0x0, 0x0, 0xffffffffffffff9d, 0x2, @perf_config_ext={0x7, 0x9}, 0x100, 0x8, 0x2, 0x6, 0x4, 0x6, 0xf71}, r7, 0x9, r6, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f00000059c0)={&(0x7f0000005980)='./file0\x00'}, 0x10) ioctl$sock_kcm_SIOCKCMATTACH(r5, 0x89e0, &(0x7f0000005a00)={r5, r0}) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000005c00)={r4, &(0x7f0000005a40)="313befc1e9ac680c4369983530ee783c4f018c38e134b4b0aebd06ede05f238850949c0f5d32ab19889f880e87e3a0fa5a43500affdcc508d56f3a4df6c159ca9cfa62124b79b4607d42738dc5e16d09ea2c6a2346fc2360feff08d9f464dfdebce2cb99d4ba8e5fc37edfba041f14e16a68192d7d8687404ee7318323520188c4e5d52e8c7ec40bd0823fb210e530c74ea842bd8bacbc48317b0b6ed12528ecd30e1af83b8049df791ff7affe91ab54", &(0x7f0000005b00)=""/243}, 0x18) mount(&(0x7f0000005c40)='./file1/file0\x00', &(0x7f0000005c80)='./file1\x00', &(0x7f0000005cc0)='btrfs\x00', 0x0, 0x0) recvmsg(r5, &(0x7f00000073c0)={&(0x7f0000005d00)=@sco, 0x80, &(0x7f0000007300)=[{&(0x7f0000005d80)=""/103, 0x67}, {&(0x7f0000005e00)=""/170, 0xaa}, {&(0x7f0000005ec0)=""/252, 0xfc}, {&(0x7f0000005fc0)=""/136, 0x88}, {&(0x7f0000006080)=""/125, 0x7d}, {&(0x7f0000006100)=""/4096, 0x1000}, {&(0x7f0000007100)=""/106, 0x6a}, {&(0x7f0000007180)=""/115, 0x73}, {&(0x7f0000007200)=""/240, 0xf0}], 0x9, 0x0, 0x0, 0x7}, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000007400)={r3, 0x10001, 0x18}, 0xc) ioctl$PERF_EVENT_IOC_REFRESH(r8, 0x2402, 0xc4c) recvmsg$kcm(r6, &(0x7f0000008880)={&(0x7f0000007440)=@l2, 0x80, &(0x7f0000008800)=[{&(0x7f00000074c0)=""/231, 0xe7}, {&(0x7f00000075c0)=""/118, 0x76}, {&(0x7f0000007640)=""/4096, 0x1000}, {&(0x7f0000008640)=""/223, 0xdf}, {&(0x7f0000008740)}, {&(0x7f0000008780)=""/32, 0x20}], 0x6}, 0x10000) 2018/03/29 11:56:30 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x1e1, 0x100000000209e20, 0x8000000001, 0x5}, 0xfffffffffffffe20) r0 = getpid() r1 = perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0xfffffffffffffffc, 0x3, 0x8, 0x2, 0x0, 0x9, 0x10000, 0xc, 0x3d3, 0x80, 0x5, 0xfffffffffffffffc, 0x8, 0x3f, 0x5d, 0xbbb0, 0x20, 0x3, 0x8000, 0x100000000, 0x8, 0x9, 0x2, 0x4, 0x800, 0xf8, 0x3, 0x9, 0x1, 0x3, 0x8, 0x3, 0x7, 0x10001, 0xf16, 0x2, 0x0, 0x7fffffff, 0x4, @perf_bp={&(0x7f0000000780), 0x1}, 0x4080, 0x10001, 0xcc, 0x7, 0x3, 0xffff, 0x7fffffff}, 0xffffffffffffffff, 0xd, 0xffffffffffffff9c, 0x8) perf_event_open(&(0x7f0000000980)={0x4, 0x70, 0x6, 0x3f, 0x8e, 0x1, 0x0, 0x3, 0x404, 0x0, 0xbc2b, 0x40, 0x7, 0xffff, 0xffff, 0x9, 0x9de2, 0x9, 0x0, 0x3, 0x7f, 0xff, 0x40, 0x400, 0x9, 0x7fffffff, 0x80000000, 0x7, 0x8, 0x10001, 0x1f, 0x2778, 0x800, 0x8001, 0x101, 0x9, 0x8, 0x7ff, 0x0, 0x1000, 0x5, @perf_config_ext={0x3ff, 0xb69b}, 0x3040, 0x2, 0x2, 0x5, 0x7, 0x6, 0x7283ed73}, r0, 0xe, r1, 0x8) bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x0, 0x0, 0x7ffff9, 0x0, 0x20000003, 0x0}, 0x2c) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) r2 = gettid() r3 = perf_event_open(&(0x7f00000008c0)={0x7, 0x70, 0x1, 0x200, 0x3, 0xdbce, 0x0, 0x8, 0x1002, 0x1, 0xffffffffffffff00, 0x8, 0x1, 0xb3fa, 0x8, 0x0, 0x1, 0x2, 0x1000, 0x2, 0x401, 0x8, 0x3, 0x81, 0x0, 0x7, 0x2fc4, 0x882, 0x4, 0x8, 0x3, 0x81, 0x3, 0x7, 0x8857, 0x7, 0x5, 0x9, 0x0, 0x7, 0x1, @perf_config_ext={0x0, 0x80000000}, 0x400, 0x7f, 0x4, 0x7, 0x2, 0x7f, 0x200}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000840)={0x5, 0x70, 0xef, 0x2, 0x1000, 0xffffffff80000000, 0x0, 0x1a7800000000, 0x2000, 0x4, 0x5, 0x6814, 0x3a9, 0x5, 0x63b, 0x6, 0x8, 0x1000, 0x250420ee, 0x3, 0x0, 0x20, 0x6, 0x0, 0x4, 0x5, 0x4, 0x8, 0x3, 0x8, 0x52893dd5, 0x2, 0x2, 0x8, 0x44d, 0x1, 0x8, 0x6, 0x0, 0x100000000, 0x0, @perf_config_ext={0x9, 0x80}, 0x0, 0x0, 0x2b67, 0x6, 0x4b0, 0x81, 0x4}, r2, 0x5, r3, 0xb) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1003, 0x0) mount(&(0x7f00002b9ff8)='./file0\x00', &(0x7f0000cbeff8)='./file0\x00', &(0x7f00005f7ffa)='ramfs\x00', 0x80000, &(0x7f000002f000)) mount(&(0x7f0000000000)='.', &(0x7f0000000040)='.', &(0x7f0000000080)='cgroup\x00', 0x5010, &(0x7f00000000c0)) mount(&(0x7f0000377ff8)='.', &(0x7f0000000280)='.', &(0x7f0000000600)='nfs4\x00', 0x5010, &(0x7f0000000300)="2161893416a0c71070768c219eb114c3253c9f3baf4e9e8e9111c1a7fc6e266009fe27243deeaa22ca7ae9341f714300b5ee807e55d609036f2a3260475922bdfb2d2849f1c3b2ad3c051bd4f3751a177f77a92758c6d2b23fe7f1535b54e5846d11c135de8286066dec1b25f6e1378944ac5f7fce42d055821b5e19") perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xd68, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f0000014f88)={0x5, 0xfffffffffffffdc4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x46000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = getpid() perf_event_open(&(0x7f0000000680)={0x4, 0x70, 0x64, 0xffff, 0x1f, 0x4, 0x0, 0x1c3, 0x0, 0x1, 0x1, 0x9, 0x1ff, 0xfffffffffffffff8, 0x0, 0x0, 0x6, 0x7fffffff, 0x4, 0xffffffff, 0x80000001, 0xd0, 0x7, 0x1f, 0x0, 0x8, 0x9, 0x1ff, 0x8, 0x785, 0x4, 0xff, 0x2, 0x656, 0x5000000, 0x1, 0x460e3be0, 0x1, 0x0, 0x0, 0x7, @perf_bp={&(0x7f0000000640), 0x1}, 0x1000, 0xa, 0x7fff, 0x7, 0x3, 0x400, 0x9}, r5, 0xe, r4, 0x1) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', 0x0, 0x10}, 0x10) close(0xffffffffffffffff) bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)={&(0x7f0000000040)='./file0\x00', 0x0, 0x18}, 0x10) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000100)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0, 0x2e, &(0x7f0000000440), &(0x7f0000000140)=""/46, 0x4229}, 0x28) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000003480)={&(0x7f0000003300)=@can={0x0, 0x0}, 0x80, &(0x7f0000003400)=[{&(0x7f0000003380)=""/56, 0x38}, {&(0x7f00000033c0)=""/1, 0x1}], 0x2, &(0x7f0000003440)=""/33, 0x21, 0x1}, 0x40010000) bpf$PROG_LOAD(0x5, &(0x7f00000034c0)={0xe, 0x6, &(0x7f0000000940)=ANY=[@ANYBLOB="1800000002000000000000004ce700002555fdff00000000002371d07c9ba7f4a23372b0ad61000000000000009500000000000000"], &(0x7f00000007c0)='GPL\x00', 0x3, 0x2d, &(0x7f0000000800)=""/45, 0x40f00, 0x1, [], r6}, 0x48) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000740)={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x10) socketpair$inet(0x2, 0x80a, 0x0, &(0x7f0000000240)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={0xffffffffffffffff, &(0x7f0000000500)="ae30f1bca1b4d3f69f1aac81517d42ad5980bc63b5008616a1f4724b9f8c1e4ecd8de336f57dd727cdaab04f0b40f28612615ad08de414711d841a88db33fd33884b627074213a0c5de3be2bbaec9207d9865c47f240467849979b5ab5632376608fc4be41a274abb2dc07cabe344a18db51048e5b0cbda843905a4258cdee3e649eddf104ba78894dce09747dcfe6a8d6d6d985520eeef448b83a8bcb83074541ba7a20d6094aa206c01a0690e5b3bfa05d475eb382b0199031d22bb26cde9b1ca0055eef9f6c4993b71ba19ba0590bb5efdaddaa574c25356ca890d138fc9fe0e975b6d5a1a8251503cd0a91845f9d95", &(0x7f0000000480)="9bc7741ea5e524cc8c6f748a73153834428729c45bf4ad446d2dddf1978baf431d0ba35b5442b5afe22db8b003650320200af7e1368ef7cdfa79ca8b9d3564363a5d2a502970314f2264c883bc8d990afc003e5adb95b30edad245c4420c8126f1d33db75ff0230698eaff90055e0f", 0x2}, 0x20) socketpair(0x0, 0x80003, 0xffff, &(0x7f0000000380)={0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r7, 0x50, &(0x7f00000003c0)}, 0x10) 2018/03/29 11:56:30 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x1e1, 0x100000000209e20, 0x8000000001, 0x5}, 0xfffffffffffffe20) r0 = getpid() r1 = perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0xfffffffffffffffc, 0x3, 0x8, 0x0, 0x0, 0x9, 0x10000, 0xc, 0x3d3, 0x80, 0x5, 0xfffffffffffffffc, 0x8, 0x3f, 0x5d, 0xbbb0, 0x20, 0x3, 0x8000, 0x100000000, 0x8, 0x9, 0x2, 0x4, 0x800, 0xf8, 0x3, 0x9, 0x1, 0x3, 0x8, 0x3, 0x7, 0x10001, 0xf16, 0x2, 0x0, 0x7fffffff, 0x4, @perf_bp={&(0x7f0000000780), 0x1}, 0x4080, 0x10001, 0xcc, 0x7, 0x3, 0xffff, 0x7fffffff}, 0xffffffffffffffff, 0xd, 0xffffffffffffff9c, 0x8) perf_event_open(&(0x7f0000000980)={0x4, 0x70, 0x6, 0x3f, 0x8e, 0x1, 0x0, 0x3, 0x404, 0x0, 0xbc2b, 0x40, 0x7, 0xffff, 0xffff, 0x9, 0x9de2, 0x9, 0x0, 0x3, 0x7f, 0xff, 0x40, 0x400, 0x9, 0x7fffffff, 0x80000000, 0x7, 0x8, 0x10001, 0x1f, 0x2778, 0x800, 0x8001, 0x101, 0x9, 0x8, 0x7ff, 0x0, 0x1000, 0x5, @perf_config_ext={0x3ff, 0xb69b}, 0x3040, 0x2, 0x2, 0x5, 0x7, 0x6, 0x7283ed73}, r0, 0xe, r1, 0x8) bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x0, 0x0, 0x7ffff9, 0x0, 0x20000003, 0x0}, 0x2c) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) r2 = gettid() r3 = perf_event_open(&(0x7f00000008c0)={0x7, 0x70, 0x1, 0x200, 0x3, 0xdbce, 0x0, 0x8, 0x1002, 0x1, 0xffffffffffffff00, 0x8, 0x1, 0xb3fa, 0x8, 0x0, 0x1, 0x2, 0x1000, 0x2, 0x401, 0x8, 0x3, 0x81, 0x0, 0x7, 0x2fc4, 0x882, 0x4, 0x8, 0x3, 0x81, 0x3, 0x7, 0x8857, 0x7, 0x5, 0x9, 0x0, 0x7, 0x1, @perf_config_ext={0x0, 0x80000000}, 0x400, 0x7f, 0x4, 0x7, 0x2, 0x7f, 0x200}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000840)={0x5, 0x70, 0xef, 0x2, 0x1000, 0xffffffff80000000, 0x0, 0x1a7800000000, 0x2000, 0x4, 0x5, 0x6814, 0x3a9, 0x5, 0x63b, 0x6, 0x8, 0x1000, 0x250420ee, 0x3, 0x0, 0x20, 0x6, 0x0, 0x4, 0x5, 0x4, 0x8, 0x3, 0x8, 0x52893dd5, 0x2, 0x2, 0x8, 0x44d, 0x1, 0x8, 0x6, 0x0, 0x100000000, 0x0, @perf_config_ext={0x9, 0x80}, 0x0, 0x0, 0x2b67, 0x6, 0x4b0, 0x81, 0x4}, r2, 0x5, r3, 0xb) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1003, 0x0) mount(&(0x7f00002b9ff8)='./file0\x00', &(0x7f0000cbeff8)='./file0\x00', &(0x7f00005f7ffa)='ramfs\x00', 0x80000, &(0x7f000002f000)) mount(&(0x7f0000000000)='.', &(0x7f0000000040)='.', &(0x7f0000000080)='cgroup\x00', 0x5010, &(0x7f00000000c0)) mount(&(0x7f0000377ff8)='.', &(0x7f0000000280)='.', &(0x7f0000000600)='nfs4\x00', 0x5010, &(0x7f0000000300)="2161893416a0c71070768c219eb114c3253c9f3baf4e9e8e9111c1a7fc6e266009fe27243deeaa22ca7ae9341f714300b5ee807e55d609036f2a3260475922bdfb2d2849f1c3b2ad3c051bd4f3751a177f77a92758c6d2b23fe7f1535b54e5846d11c135de8286066dec1b25f6e1378944ac5f7fce42d055821b5e19") perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xd68, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f0000014f88)={0x5, 0xfffffffffffffdc4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x46000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = getpid() perf_event_open(&(0x7f0000000680)={0x4, 0x70, 0x64, 0xffff, 0x1f, 0x4, 0x0, 0x1c3, 0x0, 0x1, 0x1, 0x9, 0x1ff, 0xfffffffffffffff8, 0x0, 0x0, 0x6, 0x7fffffff, 0x0, 0xffffffff, 0x80000001, 0xd0, 0x7, 0x1f, 0x0, 0x8, 0x9, 0x1ff, 0x8, 0x785, 0x4, 0xff, 0x2, 0x656, 0x5000000, 0x1, 0x460e3be0, 0x1, 0x0, 0x0, 0x7, @perf_bp={&(0x7f0000000640), 0x1}, 0x1000, 0xa, 0x7fff, 0x7, 0x3, 0x400, 0x9}, r5, 0xe, r4, 0x1) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', 0x0, 0x10}, 0x10) close(0xffffffffffffffff) bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)={&(0x7f0000000040)='./file0\x00', 0x0, 0x18}, 0x10) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000100)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0, 0x2e, &(0x7f0000000440), &(0x7f0000000140)=""/46, 0x4229}, 0x28) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000003480)={&(0x7f0000003300)=@can={0x0, 0x0}, 0x80, &(0x7f0000003400)=[{&(0x7f0000003380)=""/56, 0x38}, {&(0x7f00000033c0)=""/1, 0x1}], 0x2, &(0x7f0000003440)=""/33, 0x21, 0x1}, 0x40010000) bpf$PROG_LOAD(0x5, &(0x7f00000034c0)={0xe, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="1800000002000000000000004ce700002555fdff00000000002371d07c9ba7f4a23372b0ad61000000000000009500000000000000"], &(0x7f00000007c0)='GPL\x00', 0x3, 0x2d, &(0x7f0000000800)=""/45, 0x40f00, 0x1, [], r6}, 0x48) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000740)={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x10) socketpair$inet(0x2, 0x80a, 0x81, &(0x7f0000000240)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={0xffffffffffffffff, &(0x7f0000000500)="ae30f1bca1b4d3f69f1aac81517d42ad5980bc63b5008616a1f4724b9f8c1e4ecd8de336f57dd727cdaab04f0b40f28612615ad08de414711d841a88db33fd33884b627074213a0c5de3be2bbaec9207d9865c47f240467849979b5ab5632376608fc4be41a274abb2dc07cabe344a18db51048e5b0cbda843905a4258cdee3e649eddf104ba78894dce09747dcfe6a8d6d6d985520eeef448b83a8bcb83074541ba7a20d6094aa206c01a0690e5b3bfa05d475eb382b0199031d22bb26cde9b1ca0055eef9f6c4993b71ba19ba0590bb5efdaddaa574c25356ca890d138fc9fe0e975b6d5a1a8251503cd0a91845f9d95", &(0x7f0000000480)="9bc7741ea5e524cc8c6f748a73153834428729c45bf4ad446d2dddf1978baf431d0ba35b5442b5afe22db8b003650320200af7e1368ef7cdfa79ca8b9d3564363a5d2a502970314f2264c883bc8d990afc003e5adb95b30edad245c4420c8126f1d33db75ff0230698eaff90055e0f", 0x2}, 0x20) socketpair(0x0, 0x80003, 0xffff, &(0x7f0000000380)={0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r7, 0x50, &(0x7f00000003c0)}, 0x10) [ 836.863140] IPVS: ftp: loaded support on port[0] = 21 [ 836.895714] FAULT_INJECTION: forcing a failure. [ 836.895714] name failslab, interval 1, probability 0, space 0, times 0 [ 836.907177] CPU: 1 PID: 27394 Comm: syz-executor4 Not tainted 4.16.0-rc6+ #40 [ 836.914444] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 836.923964] Call Trace: [ 836.926541] dump_stack+0x194/0x24d [ 836.930151] ? arch_local_irq_restore+0x53/0x53 [ 836.934812] should_fail+0x8c0/0xa40 [ 836.938506] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 836.943590] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 836.948759] ? __lock_acquire+0x664/0x3e00 [ 836.952975] ? find_held_lock+0x35/0x1d0 [ 836.957034] ? __lock_is_held+0xb6/0x140 [ 836.961088] ? check_same_owner+0x320/0x320 [ 836.965386] ? __d_lookup+0x4f4/0x830 [ 836.969168] ? rcu_note_context_switch+0x710/0x710 [ 836.974083] should_failslab+0xec/0x120 [ 836.978037] kmem_cache_alloc+0x47/0x760 [ 836.982086] __d_alloc+0xc1/0xbd0 [ 836.985522] ? shrink_dcache_for_umount+0x290/0x290 [ 836.990520] ? d_alloc_parallel+0x1b40/0x1b40 [ 836.996386] ? lock_release+0xa40/0xa40 [ 837.000337] ? d_alloc_parallel+0x1b40/0x1b40 [ 837.004817] ? mark_held_locks+0xaf/0x100 [ 837.008945] ? d_lookup+0x133/0x2e0 [ 837.012556] ? d_lookup+0x1d5/0x2e0 [ 837.016167] d_alloc+0x8e/0x340 [ 837.019426] ? __d_alloc+0xbd0/0xbd0 [ 837.023127] ? full_name_hash+0x9b/0xe0 [ 837.027091] __rpc_lookup_create_exclusive+0x183/0x1d0 [ 837.032342] ? down_write_nested+0x8b/0x120 [ 837.036644] ? rpc_d_lookup_sb+0x1a0/0x1a0 [ 837.040853] ? _down_write_nest_lock+0x120/0x120 [ 837.045594] ? rpc_d_lookup_sb+0x115/0x1a0 [ 837.049805] ? lock_release+0xa40/0xa40 [ 837.053763] rpc_mkpipe_dentry+0xf8/0x360 [ 837.057897] nfs4blocklayout_register_sb+0x4b/0x70 [ 837.062806] rpc_pipefs_event+0x3a4/0x480 [ 837.066934] ? nfs4blocklayout_net_init+0x460/0x460 [ 837.071928] ? lock_release+0xa40/0xa40 [ 837.075876] ? check_same_owner+0x320/0x320 [ 837.080171] ? dput.part.20+0x1d9/0x830 [ 837.084127] notifier_call_chain+0x136/0x2c0 [ 837.088517] ? raw_notifier_chain_unregister+0x1b0/0x1b0 [ 837.093945] ? down_read+0x96/0x150 [ 837.097547] ? blocking_notifier_call_chain+0xe1/0x190 [ 837.102800] ? __down_interruptible+0x6b0/0x6b0 [ 837.107448] ? _raw_spin_unlock+0x22/0x30 [ 837.111582] blocking_notifier_call_chain+0x102/0x190 [ 837.116750] ? srcu_init_notifier_head+0x80/0x80 [ 837.121493] rpc_fill_super+0x525/0xae0 [ 837.125448] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 837.131525] ? security_capable+0x8e/0xc0 [ 837.135657] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 837.140821] ? ns_capable_common+0xcf/0x160 [ 837.145121] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 837.150285] mount_ns+0xc4/0x190 [ 837.153635] rpc_mount+0x9e/0xd0 [ 837.156979] mount_fs+0x66/0x2d0 [ 837.160328] vfs_kern_mount.part.26+0xc6/0x4a0 [ 837.164889] ? may_umount+0xa0/0xa0 [ 837.168492] ? _raw_read_unlock+0x22/0x30 [ 837.172615] ? __get_fs_type+0x8a/0xc0 [ 837.176486] do_mount+0xea4/0x2bb0 [ 837.180015] ? copy_mount_string+0x40/0x40 [ 837.184232] ? rcu_pm_notify+0xc0/0xc0 [ 837.188108] ? copy_mount_options+0x5f/0x2e0 [ 837.192494] ? rcu_read_lock_sched_held+0x108/0x120 [ 837.197488] ? kmem_cache_alloc_trace+0x459/0x740 [ 837.202312] ? kasan_check_write+0x14/0x20 [ 837.206532] ? copy_mount_options+0x1f7/0x2e0 [ 837.211016] SyS_mount+0xab/0x120 [ 837.214450] ? copy_mnt_ns+0xb30/0xb30 [ 837.218325] do_syscall_64+0x281/0x940 [ 837.222188] ? __do_page_fault+0xc90/0xc90 [ 837.226400] ? _raw_spin_unlock_irq+0x27/0x70 [ 837.230873] ? finish_task_switch+0x1c1/0x7e0 [ 837.235346] ? syscall_return_slowpath+0x550/0x550 [ 837.240252] ? syscall_return_slowpath+0x2ac/0x550 [ 837.245160] ? prepare_exit_to_usermode+0x350/0x350 [ 837.250154] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 837.255499] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 837.260325] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 837.265489] RIP: 0033:0x4548b9 [ 837.268653] RSP: 002b:00007fe8eaf09c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 837.276336] RAX: ffffffffffffffda RBX: 00007fe8eaf0a6d4 RCX: 00000000004548b9 [ 837.283581] RDX: 00000000200002c0 RSI: 0000000020000140 RDI: 0000000020000300 [ 837.290825] RBP: 000000000072bea0 R08: 0000000020000200 R09: 0000000000000000 [ 837.298069] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 837.305316] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000003f [ 837.318821] list_del corruption. prev->next should be 00000000af6998a9, but was 000000004d5b2d93 [ 837.328640] ------------[ cut here ]------------ [ 837.333392] kernel BUG at lib/list_debug.c:53! [ 837.338047] invalid opcode: 0000 [#1] SMP KASAN [ 837.342709] Dumping ftrace buffer: [ 837.346249] (ftrace buffer empty) [ 837.349944] Modules linked in: [ 837.353126] CPU: 1 PID: 27394 Comm: syz-executor4 Not tainted 4.16.0-rc6+ #40 [ 837.360385] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 837.369745] RIP: 0010:__list_del_entry_valid+0xef/0x150 [ 837.375100] RSP: 0018:ffff8801b98df7a0 EFLAGS: 00010282 [ 837.380453] RAX: 0000000000000054 RBX: ffff8801a753adf0 RCX: 0000000000000000 [ 837.387699] RDX: 0000000000000054 RSI: ffffc900014c9000 RDI: ffffed003731bee8 [ 837.394946] RBP: ffff8801b98df7b8 R08: 1ffff1003731be40 R09: 0000000000000000 [ 837.402192] R10: ffff8801b98df778 R11: 0000000000000000 R12: ffff8801a753ac70 [ 837.409434] R13: 1ffff1003731befd R14: ffff8801a753a0f0 R15: dffffc0000000000 [ 837.416680] FS: 00007fe8eaf0a700(0000) GS:ffff8801db300000(0000) knlGS:0000000000000000 [ 837.424878] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 837.430731] CR2: 000000c42028b000 CR3: 00000001ca630005 CR4: 00000000001606e0 [ 837.437979] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 837.445233] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 837.452475] Call Trace: [ 837.455046] __dentry_kill+0x260/0x700 [ 837.458910] ? check_and_drop+0x1b0/0x1b0 [ 837.463035] ? d_path+0x930/0x930 [ 837.466465] ? rcu_note_context_switch+0x710/0x710 [ 837.471385] dput.part.20+0x5a0/0x830 [ 837.475160] ? d_path+0x930/0x930 [ 837.478586] ? rpc_show_info+0x460/0x460 [ 837.482618] ? d_delete+0x181/0x280 [ 837.486228] dput+0x1f/0x30 [ 837.489143] rpc_fill_super+0x628/0xae0 [ 837.493099] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 837.498280] ? security_capable+0x8e/0xc0 [ 837.502412] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 837.507580] ? ns_capable_common+0xcf/0x160 [ 837.511884] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 837.517053] mount_ns+0xc4/0x190 [ 837.520404] rpc_mount+0x9e/0xd0 [ 837.523745] mount_fs+0x66/0x2d0 [ 837.527090] vfs_kern_mount.part.26+0xc6/0x4a0 [ 837.531653] ? may_umount+0xa0/0xa0 [ 837.535259] ? _raw_read_unlock+0x22/0x30 [ 837.539389] ? __get_fs_type+0x8a/0xc0 [ 837.543252] do_mount+0xea4/0x2bb0 [ 837.546775] ? copy_mount_string+0x40/0x40 [ 837.550984] ? rcu_pm_notify+0xc0/0xc0 [ 837.554851] ? copy_mount_options+0x5f/0x2e0 [ 837.559238] ? rcu_read_lock_sched_held+0x108/0x120 [ 837.564226] ? kmem_cache_alloc_trace+0x459/0x740 [ 837.569048] ? kasan_check_write+0x14/0x20 [ 837.573270] ? copy_mount_options+0x1f7/0x2e0 [ 837.577739] SyS_mount+0xab/0x120 [ 837.581167] ? copy_mnt_ns+0xb30/0xb30 [ 837.585041] do_syscall_64+0x281/0x940 [ 837.588903] ? __do_page_fault+0xc90/0xc90 [ 837.593111] ? _raw_spin_unlock_irq+0x27/0x70 [ 837.597579] ? finish_task_switch+0x1c1/0x7e0 [ 837.602050] ? syscall_return_slowpath+0x550/0x550 [ 837.606953] ? syscall_return_slowpath+0x2ac/0x550 [ 837.611862] ? prepare_exit_to_usermode+0x350/0x350 [ 837.616852] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 837.622192] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 837.627016] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 837.634267] RIP: 0033:0x4548b9 [ 837.637426] RSP: 002b:00007fe8eaf09c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 837.645112] RAX: ffffffffffffffda RBX: 00007fe8eaf0a6d4 RCX: 00000000004548b9 [ 837.652356] RDX: 00000000200002c0 RSI: 0000000020000140 RDI: 0000000020000300 [ 837.659600] RBP: 000000000072bea0 R08: 0000000020000200 R09: 0000000000000000 [ 837.666849] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 837.674099] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000003f [ 837.681357] Code: 4c 89 e2 48 c7 c7 00 91 e5 86 e8 45 d4 a6 fe 0f 0b 48 c7 c7 60 91 e5 86 e8 37 d4 a6 fe 0f 0b 48 c7 c7 c0 91 e5 86 e8 29 d4 a6 fe <0f> 0b 48 c7 c7 20 92 e5 86 e8 1b d4 a6 fe 0f 0b 48 89 df 48 89 [ 837.700442] RIP: __list_del_entry_valid+0xef/0x150 RSP: ffff8801b98df7a0 [ 837.707353] ---[ end trace 40351c69ef3ca519 ]--- [ 837.712110] Kernel panic - not syncing: Fatal exception [ 837.717913] Dumping ftrace buffer: [ 837.721428] (ftrace buffer empty) [ 837.725111] Kernel Offset: disabled [ 837.728708] Rebooting in 86400 seconds..