fffffffffffffffa, 0x1, 0x80000000, 0xe6d1, 0x4, 0x8001, 0x9, 0x1f, 0xfffffffffffffc00, 0x0, 0x0, 0x0, 0x15ac000000000000, 0x0, 0x3, 0x1, 0xfffffffffffffffe, 0x9, 0xff, 0x1, 0x2, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000002c0), 0x8}, 0x8004, 0x3, 0x6, 0x1, 0x5, 0xb03c, 0x5}, r6, 0xc, 0xffffffffffffffff, 0xb) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000280)={0xffffffffffffffff, 0xffffff8f, &(0x7f0000000300)}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000600)={0xffffffffffffffff, &(0x7f00000004c0)="648d1c6e4e7374f62b21f1c71a7cd05c41e2a0bf36f2f23f5761a39646321c3b5e4e670bd9a8f7a3fc36d594c1799d7dec6f0ba644a16abd532529ac63497998169000b2e491e82f659738895262b6fc9c79d8e6736c91136937b9", &(0x7f0000000540)="0c39cf9403045550ce39840a2a90ca20bc744608140dcd6c55d855533bb97417ef0cd19e1990bf245f0f38ab76b7f283d20500e75742ca4151b5489f5848a6b6104b0334b5427d07a3464ecffbfda64068c2d7ea6c230ba9040eebaec2030d19884f9f815ab793bd836fdb9c142a7aa9510939e2d3b5e6f57fa56f5464911bd939ca0ab0a1c19407fc9b1b974b94401f7c82bce0926bd5"}, 0x20) 2018/03/31 09:08:12 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x5, 0x0, 0x8000000001, 0x5}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x13, 0x0, 0x7ffff9, 0x0, 0x20000003, 0x0}, 0x2c) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x13, 0x0, 0x7ffff9, 0x0, 0x20000003, 0x0}, 0x2c) [ 351.715155] FAULT_INJECTION: forcing a failure. [ 351.715155] name failslab, interval 1, probability 0, space 0, times 0 [ 351.726584] CPU: 0 PID: 9551 Comm: syz-executor1 Not tainted 4.16.0-rc6+ #43 [ 351.733782] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 351.743140] Call Trace: [ 351.745737] dump_stack+0x194/0x24d [ 351.749378] ? arch_local_irq_restore+0x53/0x53 [ 351.754077] should_fail+0x8c0/0xa40 [ 351.758322] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 351.763451] ? is_bpf_text_address+0xa4/0x120 [ 351.767960] ? find_held_lock+0x35/0x1d0 [ 351.772047] ? check_same_owner+0x320/0x320 [ 351.776358] ? putname+0xee/0x130 [ 351.779794] ? filename_lookup+0x315/0x500 [ 351.784016] ? user_path_at_empty+0x40/0x50 [ 351.788329] ? rcu_note_context_switch+0x710/0x710 [ 351.793243] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 351.798596] should_failslab+0xec/0x120 [ 351.802553] kmem_cache_alloc+0x47/0x760 [ 351.806597] ? perf_trace_lock+0xd6/0x900 [ 351.810732] ? free_obj_work+0x690/0x690 [ 351.814780] alloc_vfsmnt+0xe0/0x9c0 [ 351.818476] ? path_lookupat+0x238/0xba0 [ 351.822520] ? mnt_free_id.isra.21+0x50/0x50 [ 351.826913] ? trace_hardirqs_off+0x10/0x10 [ 351.831219] ? putname+0xee/0x130 [ 351.834655] ? putname+0xee/0x130 [ 351.838093] ? rcu_read_lock_sched_held+0x108/0x120 [ 351.843094] ? find_held_lock+0x35/0x1d0 [ 351.847143] ? __get_fs_type+0x8a/0xc0 [ 351.851019] ? lock_downgrade+0x980/0x980 [ 351.855154] ? module_unload_free+0x5b0/0x5b0 [ 351.859630] ? lock_release+0xa40/0xa40 [ 351.863588] ? mpi_resize+0x200/0x200 [ 351.867379] vfs_kern_mount.part.26+0x84/0x4a0 [ 351.871952] ? may_umount+0xa0/0xa0 [ 351.875562] ? _raw_read_unlock+0x22/0x30 [ 351.879690] ? __get_fs_type+0x8a/0xc0 [ 351.883563] do_mount+0xea4/0x2bb0 [ 351.887083] ? __might_fault+0x110/0x1d0 [ 351.891129] ? copy_mount_string+0x40/0x40 [ 351.895345] ? check_same_owner+0x320/0x320 [ 351.899649] ? __check_object_size+0x8b/0x530 [ 351.904133] ? __might_sleep+0x95/0x190 [ 351.908097] ? kasan_check_write+0x14/0x20 [ 351.912318] ? _copy_from_user+0x99/0x110 [ 351.916452] ? memdup_user+0x5e/0x90 [ 351.920147] ? copy_mount_options+0x1f7/0x2e0 [ 351.924637] SyS_mount+0xab/0x120 [ 351.928074] ? copy_mnt_ns+0xb30/0xb30 [ 351.931944] do_syscall_64+0x281/0x940 [ 351.935810] ? vmalloc_sync_all+0x30/0x30 [ 351.939939] ? _raw_spin_unlock_irq+0x27/0x70 [ 351.944417] ? finish_task_switch+0x1c1/0x7e0 [ 351.948904] ? syscall_return_slowpath+0x550/0x550 [ 351.953815] ? syscall_return_slowpath+0x2ac/0x550 [ 351.958725] ? prepare_exit_to_usermode+0x350/0x350 [ 351.963723] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 351.969072] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 351.973904] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 351.979075] RIP: 0033:0x454e79 [ 351.982245] RSP: 002b:00007fed74635c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 351.989938] RAX: ffffffffffffffda RBX: 00007fed746366d4 RCX: 0000000000454e79 [ 351.997192] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 352.004443] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 2018/03/31 09:08:12 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xf, 0x5, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x80000000}, [@map={0x18, 0x1, 0x1, 0x0, 0x1}], {0x95}}, &(0x7f0000000040)='syzkaller\x00', 0x3, 0x10, &(0x7f0000000080)=""/16, 0x41000, 0x2f3100a785778bd1}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000001c0)={r0, 0x50, &(0x7f0000000140)}, 0x10) close(r0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000780)={&(0x7f0000000240)=@ax25, 0x80, &(0x7f0000000600)=[{&(0x7f00000002c0)=""/114, 0x72}, {&(0x7f0000000340)=""/133, 0x85}, {&(0x7f0000000400)=""/23, 0x17}, {&(0x7f0000000440)=""/59, 0x3b}, {&(0x7f0000000480)=""/114, 0x72}, {&(0x7f0000000500)=""/45, 0x2d}, {&(0x7f0000000540)=""/83, 0x53}, {&(0x7f00000005c0)}], 0x8, &(0x7f0000000680)=""/214, 0xd6, 0x100}, 0x40) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000007c0)={0xffffffffffffffff}) recvmsg(r2, &(0x7f00000019c0)={&(0x7f0000000800)=@ax25, 0x80, &(0x7f00000018c0)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000001880)=""/18, 0x12}], 0x2, &(0x7f0000001900)=""/184, 0xb8, 0x3}, 0x1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001a80)={r4, 0x50, &(0x7f0000001a00)}, 0x10) r5 = perf_event_open(&(0x7f0000001b00)={0x2, 0x70, 0x6, 0x8, 0x80000000, 0x10001, 0x0, 0x7ff, 0x4, 0xa, 0x200, 0x20, 0x72, 0x5, 0x0, 0x0, 0x5, 0x8f, 0x9ed, 0xff, 0x0, 0xa58, 0x7f, 0xf2f, 0x4503, 0x6, 0x81, 0x5, 0x1ff, 0xffffffff00000000, 0x2, 0x5, 0x9000000000000, 0xfffffffffffffffa, 0x8, 0x10001, 0x731ab510, 0x9, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000001ac0), 0x1}, 0x80, 0x2b4, 0x200, 0x3, 0x6, 0x9, 0x4}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0x20000) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000001b80)) r6 = getpid() r7 = perf_event_open(&(0x7f0000001c00)={0x1, 0x70, 0x0, 0xfff, 0x4, 0x80000000, 0x0, 0x3, 0x40, 0xa, 0x7, 0x7, 0x7, 0x4800000000000000, 0x7, 0x6, 0x62b, 0x8, 0x9, 0x100000000, 0x1, 0x0, 0x5, 0xd199, 0x1f, 0x10000, 0xff80000000000000, 0x3, 0x4, 0x8, 0x80000001, 0x8000, 0x7fff, 0x4, 0x16, 0x7, 0x40, 0x8, 0x0, 0x5, 0x50031dd1e89e26d1, @perf_bp={&(0x7f0000001bc0), 0x2}, 0x10000, 0x3a, 0x80000001, 0x1, 0x2c, 0x3ff, 0x6}, r6, 0x6, r3, 0x3) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000001c80)=r0, 0x4) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000001cc0)) ioctl$PERF_EVENT_IOC_REFRESH(r7, 0x2402, 0xffffffff) r8 = perf_event_open(&(0x7f0000001d00)={0x0, 0x70, 0x7, 0x400, 0x100, 0xac, 0x0, 0x100000000, 0xc2800, 0xa, 0x33e3, 0x2, 0x10001, 0x8, 0x5, 0x100000001, 0x2e9, 0x2, 0xc1, 0xf2, 0x2, 0x9, 0xffff, 0x7, 0x1, 0x0, 0x8000, 0x800, 0xfffffffffffffffa, 0x40, 0x0, 0x3, 0x6, 0xfa4, 0x7, 0xffffffffffff8000, 0x0, 0x0, 0x0, 0x8000, 0x3, @perf_config_ext={0x400}, 0x100, 0xa264, 0x4, 0x7, 0x2, 0x1000, 0x92}, r6, 0x5, r7, 0x1) socketpair(0x7, 0x6, 0x1, &(0x7f0000001d80)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000001e00)={&(0x7f0000001dc0)='./file0\x00', r9}, 0x10) r10 = perf_event_open(&(0x7f0000001e40)={0x4, 0x70, 0x5, 0x4, 0x8, 0x6, 0x0, 0x2, 0x1425, 0xb, 0x0, 0xcc9, 0x400, 0x57f90db4, 0x80000000, 0x7, 0x1000, 0x0, 0x8, 0x8000, 0xffffffff, 0x400, 0x1, 0x6, 0x40, 0x2, 0x10000, 0x8, 0x9, 0xfffffffffffffff8, 0x9, 0x4, 0x3, 0x400, 0x3, 0x9, 0x3, 0x100, 0x0, 0x6, 0x0, @perf_config_ext={0x4, 0x2}, 0x20, 0x3ff, 0x0, 0x7, 0x3, 0x5, 0xfa5e}, r6, 0xd, r7, 0x2) bpf$OBJ_GET_MAP(0x7, &(0x7f0000001f00)={&(0x7f0000001ec0)='./file0\x00'}, 0x10) socketpair$inet6_sctp(0xa, 0x0, 0x84, &(0x7f0000001f40)) ioctl$PERF_EVENT_IOC_DISABLE(r10, 0x2401, 0xbad) r11 = perf_event_open(&(0x7f0000001fc0)={0x3, 0x70, 0xff, 0x2f, 0x2, 0x7, 0x0, 0x40, 0x80000, 0x1, 0x8, 0x6, 0xfffffffffffffffb, 0x7, 0x2, 0x10000, 0x6, 0x5, 0x0, 0x10, 0x6, 0xc58, 0x7f, 0x3, 0x2, 0x3, 0x5, 0x80000000800000, 0x7, 0xfff, 0x16, 0x2b65, 0x9, 0x69244395, 0x10000, 0x4, 0x9, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000001f80), 0x8}, 0x100, 0x8, 0x51b4, 0x4, 0x800, 0xb7, 0x4800}, r6, 0x8, r8, 0x1) r12 = gettid() socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000002040)) perf_event_open(&(0x7f0000002080)={0x0, 0x70, 0x100, 0x0, 0x2, 0x401, 0x0, 0x6, 0x1, 0x6, 0x656, 0x5, 0xfffffffffffff973, 0xffffffffffffffff, 0x9, 0x7, 0x3, 0x3ff, 0x1c000000, 0x10000, 0x6, 0x20, 0x6, 0x1, 0x1, 0x4, 0x2, 0x20, 0x9, 0xed5, 0x847, 0x1000, 0x0, 0x0, 0x102bed3b, 0x9, 0x7fffffff, 0x6, 0x0, 0x24, 0x0, @perf_config_ext={0x100000001, 0x6}, 0x200, 0x800000010000000, 0x7, 0x7, 0x1000, 0xf3, 0xe87}, r12, 0xf, r11, 0x8) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000002100)) perf_event_open(&(0x7f0000002180)={0x4, 0x70, 0x0, 0x8, 0xff, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x3, 0xffffffffffffff00, 0x93eb, 0x1, 0x4e5e, 0x8001, 0xfffffffffffffff8, 0x7, 0x1f4, 0x80000001, 0x99b, 0x4, 0x8, 0xed8, 0x3f, 0xec9, 0x6, 0x1, 0x4ab8, 0x8, 0x2, 0xdd, 0x9, 0xffffffffffffffff, 0x8000, 0x0, 0x6, 0xffff, 0x8, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000002140), 0xf}, 0x400, 0x5, 0x7, 0x4, 0x7, 0x4}, r12, 0x3, r7, 0x8) [ 352.011692] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000016 [ 352.018941] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000004 2018/03/31 09:08:12 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x5, 0x100000000209e20, 0x8000000001, 0x5}, 0x2c) r1 = bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x13, 0x0, 0x7ffff9, 0x0, 0x20000003, 0x0}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xe, 0x0, 0x7f, 0x3e83, 0x8, r1, 0x80000000}, 0x2c) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x50, &(0x7f0000000140)={0x0, 0x0}}, 0x10) socket$kcm(0x29, 0x2, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) socketpair(0x4, 0x1, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r3, 0x2401, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000480)={r4, &(0x7f0000000440)="3068306ef4a0ff8256b6430a042a9b"}, 0x10) socketpair(0x15, 0x7, 0xff, &(0x7f0000000540)) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40042409, 0x1) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r3) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x0, 0x8, 0x0, 0x0, r0, 0x6}, 0x2c) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)) perf_event_open(&(0x7f000025c000)={0x5, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = gettid() bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x8}, 0x10) r6 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0xfff, 0x100000001, 0xfffffffffffffffb, 0x0, 0x8001, 0x0, 0x1, 0x0, 0xfffffffffffffff9, 0x0, 0x9, 0x9, 0x5, 0x8, 0x1, 0x8106, 0x0, 0x14000000000, 0x80000000, 0x1, 0x5, 0x0, 0x40, 0x2839, 0x1d, 0x800, 0x7, 0x0, 0x0, 0x5, 0x7, 0x0, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x4}, 0x0, 0x0, 0xff, 0x0, 0x3, 0x8, 0x3}, r5, 0x2, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=r2, 0x4) perf_event_open(&(0x7f00000003c0)={0x7, 0x70, 0x7fff, 0x5, 0x6, 0x8000, 0x0, 0x1000, 0x0, 0x7, 0x1000, 0x1, 0xffffffff, 0x3, 0xaf99, 0x40, 0x8001, 0xfffffffffffffffa, 0x1, 0x80000000, 0xe6d1, 0x4, 0x8001, 0x9, 0x1f, 0xfffffffffffffc00, 0x0, 0x0, 0x7ff, 0x15ac000000000000, 0x0, 0x3, 0x1, 0xfffffffffffffffe, 0x9, 0xff, 0x1, 0x2, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000002c0), 0x8}, 0x0, 0x3, 0x6, 0x1, 0x5, 0xb03c, 0x5}, r5, 0xc, r6, 0xb) bpf$MAP_CREATE(0x0, &(0x7f0000000640)={0x8, 0x6bcb8e63, 0x0, 0x59ad, 0x12, r0, 0x8001}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000880)={r0, &(0x7f0000000840), &(0x7f00000008c0)=""/70}, 0x375) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000280)={0xffffffffffffffff, 0xffffff8f, &(0x7f0000000300)}, 0x10) 2018/03/31 09:08:12 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000a40)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x0, 0x0) socketpair(0x2, 0x0, 0x0, &(0x7f0000000640)={0xffffffffffffffff}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r6 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x0, 0x10000, 0x1182, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f00000009c0)={r4}) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000280)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000a00)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg(r3, &(0x7f0000000cc0)={&(0x7f0000000400)=@ethernet={0x1}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000580)="4589496d6a3bfcccae07dc729c52ee6bdf10d9cf221f605c25f790103018703b9a67491f96c3f9f8d07204ee4adf21acce1afdaedaba1228b4d33c3fa702a46b1329a0e52eea6a7908fd375ace47", 0x4e}], 0x1, &(0x7f0000000700), 0x0, 0x40000}, 0x4044080) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000740)={r5, &(0x7f0000000700)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") close(0xffffffffffffffff) 2018/03/31 09:08:12 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x5, 0x0, 0x0, 0x5}, 0x2c) r1 = bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x13, 0x0, 0x0, 0x0, 0x20000003, 0x0}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x3e83, 0x8, r1}, 0x2c) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x50, &(0x7f0000000140)={0x0, 0x0}}, 0x10) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, r2, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) socketpair(0x4, 0x1, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000480)={r5, &(0x7f0000000440)="3068306ef4a0ff8256b6430a042a9b"}, 0x10) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x0, 0x8, 0x0, 0x0, r0, 0x6}, 0x2c) socketpair(0x8, 0x2, 0x0, &(0x7f0000000040)) r6 = gettid() bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=r3, 0x4) perf_event_open(&(0x7f00000003c0)={0x7, 0x70, 0x7fff, 0x5, 0x6, 0x8000, 0x0, 0x1000, 0x0, 0x7, 0x1000, 0x1, 0xffffffff, 0x3, 0xaf99, 0x40, 0x8001, 0xfffffffffffffffa, 0x1, 0x80000000, 0xe6d1, 0x4, 0x8001, 0x9, 0x1f, 0xfffffffffffffc00, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x3, 0x1, 0xfffffffffffffffe, 0x9, 0xff, 0x1, 0x2, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000002c0), 0x8}, 0x8004, 0x3, 0x6, 0x1, 0x5, 0xb03c, 0x5}, r6, 0xc, 0xffffffffffffffff, 0xb) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000280)={0xffffffffffffffff, 0xffffff8f, &(0x7f0000000300)}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000600)={0xffffffffffffffff, &(0x7f00000004c0)="648d1c6e4e7374f62b21f1c71a7cd05c41e2a0bf36f2f23f5761a39646321c3b5e4e670bd9a8f7a3fc36d594c1799d7dec6f0ba644a16abd532529ac63497998169000b2e491e82f659738895262b6fc9c79d8e6736c91136937b9", &(0x7f0000000540)="0c39cf9403045550ce39840a2a90ca20bc744608140dcd6c55d855533bb97417ef0cd19e1990bf245f0f38ab76b7f283d20500e75742ca4151b5489f5848a6b6104b0334b5427d07a3464ecffbfda64068c2d7ea6c230ba9040eebaec2030d19884f9f815ab793bd836fdb9c142a7aa9510939e2d3b5e6f57fa56f5464911bd939ca0ab0a1c19407fc9b1b974b94401f7c82bce0926bd5"}, 0x20) 2018/03/31 09:08:12 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x5, 0x0, 0x8000000001, 0x5}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x13, 0x0, 0x7ffff9, 0x0, 0x20000003, 0x0}, 0x2c) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x13, 0x0, 0x7ffff9, 0x0, 0x20000003, 0x0}, 0x2c) 2018/03/31 09:08:12 executing program 7: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)={0xffffffffffffffff}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x0, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r5 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x0, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f00000009c0)={r4}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg(r3, &(0x7f0000000cc0)={&(0x7f0000000400)=@ethernet={0x1}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000580)="4589496d6a3bfcccae07dc729c52ee6bdf10d9cf221f605c25f790103018703b9a67491f96c3f9f8d07204ee4adf21acce1afdaedaba1228b4d33c3fa702a46b1329a0e52eea6a7908fd375ace47", 0x4e}], 0x1, &(0x7f0000000700), 0x0, 0x40000}, 0x4044080) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000740)={0xffffffffffffffff, &(0x7f0000000700)="ec1b815b5cc95d6e0dff859791e3341b8790dcb187f25418f8003a2b3bf345"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36") close(0xffffffffffffffff) 2018/03/31 09:08:12 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x5, 0x100000000209e20, 0x8000000001, 0x5}, 0x2c) r1 = bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x13, 0x0, 0x7ffff9, 0x0, 0x20000003, 0x0}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xe, 0x0, 0x7f, 0x3e83, 0x8, r1, 0x80000000}, 0x2c) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x50, &(0x7f0000000140)={0x0, 0x0}}, 0x10) socket$kcm(0x29, 0x2, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) socketpair(0x4, 0x1, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r3, 0x2401, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000480)={r4, &(0x7f0000000440)="3068306ef4a0ff8256b6430a042a9b"}, 0x10) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40042409, 0x1) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r3) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x0, 0x8, 0x0, 0x0, r0, 0x6}, 0x2c) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)) r5 = gettid() r6 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0xfff, 0x100000001, 0xfffffffffffffffb, 0x0, 0x8001, 0x0, 0x1, 0x0, 0xfffffffffffffff9, 0x0, 0x9, 0x9, 0x5, 0x8, 0x1, 0x8106, 0x0, 0x14000000000, 0x80000000, 0x1, 0x5, 0x0, 0x40, 0x2839, 0x1d, 0x800, 0x7, 0x0, 0x0, 0x5, 0x7, 0x0, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x4}, 0x0, 0x0, 0xff, 0x0, 0x3, 0x8, 0x3}, r5, 0x2, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=r2, 0x4) perf_event_open(&(0x7f00000003c0)={0x7, 0x70, 0x7fff, 0x5, 0x6, 0x8000, 0x0, 0x1000, 0x0, 0x7, 0x1000, 0x1, 0xffffffff, 0x3, 0xaf99, 0x40, 0x8001, 0xfffffffffffffffa, 0x1, 0x80000000, 0xe6d1, 0x4, 0x8001, 0x9, 0x1f, 0xfffffffffffffc00, 0x0, 0x0, 0x7ff, 0x15ac000000000000, 0x0, 0x3, 0x1, 0xfffffffffffffffe, 0x9, 0xff, 0x1, 0x2, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000002c0), 0x8}, 0x0, 0x3, 0x6, 0x1, 0x5, 0xb03c, 0x5}, r5, 0xc, r6, 0xb) bpf$MAP_CREATE(0x0, &(0x7f0000000640)={0x8, 0x6bcb8e63, 0x0, 0x59ad, 0x12, r0, 0x8001}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000880)={r0, &(0x7f0000000840), &(0x7f00000008c0)=""/70}, 0x375) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000280)={0xffffffffffffffff, 0xffffff8f, &(0x7f0000000300)}, 0x10) 2018/03/31 09:08:12 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xf, 0x5, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x80000000}, [@map={0x18, 0x1, 0x1, 0x0, 0x1}], {0x95}}, &(0x7f0000000040)='syzkaller\x00', 0x3, 0x10, &(0x7f0000000080)=""/16, 0x41000, 0x2f3100a785778bd1}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000001c0)={r0, 0x50, &(0x7f0000000140)}, 0x10) close(r0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000780)={&(0x7f0000000240)=@ax25, 0x80, &(0x7f0000000600)=[{&(0x7f00000002c0)=""/114, 0x72}, {&(0x7f0000000340)=""/133, 0x85}, {&(0x7f0000000400)=""/23, 0x17}, {&(0x7f0000000440)=""/59, 0x3b}, {&(0x7f0000000480)=""/114, 0x72}, {&(0x7f0000000500)=""/45, 0x2d}, {&(0x7f0000000540)=""/83, 0x53}, {&(0x7f00000005c0)}], 0x8, &(0x7f0000000680)=""/214, 0xd6, 0x100}, 0x40) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000007c0)={0xffffffffffffffff}) recvmsg(r2, &(0x7f00000019c0)={&(0x7f0000000800)=@ax25, 0x80, &(0x7f00000018c0)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000001880)=""/18, 0x12}], 0x2, &(0x7f0000001900)=""/184, 0xb8, 0x3}, 0x1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001a80)={r4, 0x50, &(0x7f0000001a00)}, 0x10) r5 = perf_event_open(&(0x7f0000001b00)={0x2, 0x70, 0x6, 0x8, 0x80000000, 0x10001, 0x0, 0x7ff, 0x4, 0xa, 0x200, 0x20, 0x72, 0x5, 0x0, 0x0, 0x5, 0x8f, 0x9ed, 0xff, 0x0, 0xa58, 0x7f, 0xf2f, 0x4503, 0x6, 0x81, 0x5, 0x1ff, 0xffffffff00000000, 0x2, 0x5, 0x9000000000000, 0xfffffffffffffffa, 0x8, 0x10001, 0x731ab510, 0x9, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000001ac0), 0x1}, 0x80, 0x2b4, 0x200, 0x3, 0x6, 0x9, 0x4}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0x20000) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000001b80)) r6 = getpid() r7 = perf_event_open(&(0x7f0000001c00)={0x1, 0x70, 0x0, 0xfff, 0x4, 0x80000000, 0x0, 0x3, 0x40, 0xa, 0x7, 0x7, 0x7, 0x4800000000000000, 0x7, 0x6, 0x62b, 0x8, 0x9, 0x100000000, 0x1, 0x0, 0x5, 0xd199, 0x1f, 0x10000, 0xff80000000000000, 0x3, 0x4, 0x8, 0x80000001, 0x8000, 0x7fff, 0x4, 0x16, 0x7, 0x40, 0x8, 0x0, 0x5, 0x50031dd1e89e26d1, @perf_bp={&(0x7f0000001bc0), 0x2}, 0x10000, 0x3a, 0x80000001, 0x1, 0x2c, 0x3ff, 0x6}, r6, 0x6, r3, 0x3) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000001c80)=r0, 0x4) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000001cc0)) ioctl$PERF_EVENT_IOC_REFRESH(r7, 0x2402, 0xffffffff) r8 = perf_event_open(&(0x7f0000001d00)={0x0, 0x70, 0x7, 0x400, 0x100, 0xac, 0x0, 0x100000000, 0xc2800, 0xa, 0x33e3, 0x2, 0x10001, 0x8, 0x5, 0x100000001, 0x2e9, 0x2, 0xc1, 0xf2, 0x2, 0x9, 0xffff, 0x7, 0x1, 0x0, 0x8000, 0x800, 0xfffffffffffffffa, 0x40, 0x0, 0x3, 0x6, 0xfa4, 0x7, 0xffffffffffff8000, 0x0, 0x0, 0x0, 0x8000, 0x3, @perf_config_ext={0x400}, 0x100, 0xa264, 0x4, 0x7, 0x2, 0x1000, 0x92}, r6, 0x5, r7, 0x1) socketpair(0x7, 0x6, 0x1, &(0x7f0000001d80)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000001e00)={&(0x7f0000001dc0)='./file0\x00', r9}, 0x10) r10 = perf_event_open(&(0x7f0000001e40)={0x4, 0x70, 0x5, 0x4, 0x8, 0x6, 0x0, 0x2, 0x1425, 0xb, 0x0, 0xcc9, 0x400, 0x57f90db4, 0x80000000, 0x7, 0x1000, 0x0, 0x8, 0x8000, 0xffffffff, 0x400, 0x1, 0x6, 0x40, 0x2, 0x10000, 0x8, 0x9, 0xfffffffffffffff8, 0x9, 0x4, 0x3, 0x400, 0x3, 0x9, 0x3, 0x100, 0x0, 0x6, 0x0, @perf_config_ext={0x4, 0x2}, 0x20, 0x3ff, 0x0, 0x7, 0x3, 0x5, 0xfa5e}, r6, 0xd, r7, 0x2) bpf$OBJ_GET_MAP(0x7, &(0x7f0000001f00)={&(0x7f0000001ec0)='./file0\x00'}, 0x10) socketpair$inet6_sctp(0xa, 0x0, 0x84, &(0x7f0000001f40)) ioctl$PERF_EVENT_IOC_DISABLE(r10, 0x2401, 0xbad) r11 = perf_event_open(&(0x7f0000001fc0)={0x3, 0x70, 0xff, 0x2f, 0x2, 0x7, 0x0, 0x40, 0x80000, 0x1, 0x8, 0x6, 0xfffffffffffffffb, 0x7, 0x2, 0x10000, 0x6, 0x5, 0x0, 0x10, 0x6, 0xc58, 0x7f, 0x3, 0x2, 0x3, 0x5, 0x80000000800000, 0x7, 0xfff, 0x16, 0x2b65, 0x9, 0x69244395, 0x10000, 0x4, 0x9, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000001f80), 0x8}, 0x100, 0x8, 0x51b4, 0x4, 0x800, 0xb7, 0x4800}, r6, 0x8, r8, 0x1) r12 = gettid() socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000002040)) perf_event_open(&(0x7f0000002080)={0x0, 0x70, 0x100, 0x0, 0x2, 0x401, 0x0, 0x6, 0x1, 0x6, 0x656, 0x5, 0xfffffffffffff973, 0xffffffffffffffff, 0x9, 0x7, 0x3, 0x3ff, 0x1c000000, 0x10000, 0x6, 0x20, 0x6, 0x1, 0x1, 0x4, 0x2, 0x20, 0x9, 0xed5, 0x847, 0x1000, 0x0, 0x0, 0x102bed3b, 0x9, 0x7fffffff, 0x6, 0x0, 0x24, 0x0, @perf_config_ext={0x100000001, 0x6}, 0x200, 0x800000010000000, 0x7, 0x7, 0x1000, 0xf3, 0xe87}, r12, 0xf, r11, 0x8) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000002100)) perf_event_open(&(0x7f0000002180)={0x4, 0x70, 0x0, 0x8, 0xff, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x3, 0xffffffffffffff00, 0x93eb, 0x1, 0x4e5e, 0x8001, 0xfffffffffffffff8, 0x7, 0x1f4, 0x80000001, 0x99b, 0x4, 0x8, 0xed8, 0x3f, 0xec9, 0x6, 0x1, 0x4ab8, 0x8, 0x2, 0xdd, 0x9, 0xffffffffffffffff, 0x8000, 0x0, 0x6, 0xffff, 0x8, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000002140), 0xf}, 0x400, 0x5, 0x7, 0x4, 0x7, 0x4}, r12, 0x3, r7, 0x8) 2018/03/31 09:08:12 executing program 1 (fault-call:20 fault-nth:5): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)={0xffffffffffffffff}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x0, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r5 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f00000009c0)={r4}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg(r3, &(0x7f0000000cc0)={&(0x7f0000000400)=@ethernet={0x1}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000580)="4589496d6a3bfcccae07dc729c52ee6bdf10d9cf221f605c25f790103018703b9a67491f96c3f9f8d07204ee4adf21acce1afdaedaba1228b4d33c3fa702a46b1329a0e52eea6a7908fd375ace47", 0x4e}], 0x1, &(0x7f0000000700), 0x0, 0x40000}, 0x4044080) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000740)={0xffffffffffffffff, &(0x7f0000000700)="ec1b815b5cc95d6e0dff859791e3341b8790dcb187f25418f8003a2b3bf345dc"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") close(0xffffffffffffffff) 2018/03/31 09:08:12 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x0, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r7 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) ioctl$PERF_EVENT_IOC_RESET(r5, 0x2403, 0x2) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f00000009c0)={r4}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r7, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) ioctl$PERF_EVENT_IOC_RESET(r4, 0x2403, 0x2) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000280)={r6, &(0x7f0000000700)="ec1b815b5cc95d6e0dff859791e3341b"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)={0x3, 0x40000100, 0x56c96e7a, 0xea, 0x1, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") close(0xffffffffffffffff) 2018/03/31 09:08:12 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x5, 0x0, 0x0, 0x5}, 0x2c) r1 = bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x13, 0x0, 0x0, 0x0, 0x20000003, 0x0}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x3e83, 0x8, r1}, 0x2c) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x50, &(0x7f0000000140)={0x0, 0x0}}, 0x10) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, r2, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) socketpair(0x4, 0x1, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000480)={r5, &(0x7f0000000440)="3068306ef4a0ff8256b6430a042a9b"}, 0x10) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x0, 0x8, 0x0, 0x0, r0, 0x6}, 0x2c) socketpair(0x8, 0x2, 0x0, &(0x7f0000000040)) r6 = gettid() bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=r3, 0x4) perf_event_open(&(0x7f00000003c0)={0x7, 0x70, 0x7fff, 0x5, 0x6, 0x8000, 0x0, 0x1000, 0x0, 0x7, 0x1000, 0x1, 0xffffffff, 0x3, 0xaf99, 0x40, 0x8001, 0xfffffffffffffffa, 0x1, 0x80000000, 0xe6d1, 0x4, 0x8001, 0x9, 0x1f, 0xfffffffffffffc00, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x3, 0x1, 0xfffffffffffffffe, 0x9, 0xff, 0x1, 0x2, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000002c0), 0x8}, 0x8004, 0x3, 0x6, 0x1, 0x5, 0xb03c, 0x5}, r6, 0xc, 0xffffffffffffffff, 0xb) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000280)={0xffffffffffffffff, 0xffffff8f, &(0x7f0000000300)}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000600)={0xffffffffffffffff, &(0x7f00000004c0)="648d1c6e4e7374f62b21f1c71a7cd05c41e2a0bf36f2f23f5761a39646321c3b5e4e670bd9a8f7a3fc36d594c1799d7dec6f0ba644a16abd532529ac63497998169000b2e491e82f659738895262b6fc9c79d8e6736c91136937b9", &(0x7f0000000540)="0c39cf9403045550ce39840a2a90ca20bc744608140dcd6c55d855533bb97417ef0cd19e1990bf245f0f38ab76b7f283d20500e75742ca4151b5489f5848a6b6104b0334b5427d07a3464ecffbfda64068c2d7ea6c230ba9040eebaec2030d19884f9f815ab793bd836fdb9c142a7aa9510939e2d3b5e6f57fa56f5464911bd939ca0ab0a1c19407fc9b1b974b94401f7c82bce0926bd5"}, 0x20) 2018/03/31 09:08:12 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000a40)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x0, 0x0) socketpair(0x2, 0x0, 0x0, &(0x7f0000000640)={0xffffffffffffffff}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r6 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x0, 0x10000, 0x1182, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f00000009c0)={r4}) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000280)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000a00)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg(r3, &(0x7f0000000cc0)={&(0x7f0000000400)=@ethernet={0x1}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000580)="4589496d6a3bfcccae07dc729c52ee6bdf10d9cf221f605c25f790103018703b9a67491f96c3f9f8d07204ee4adf21acce1afdaedaba1228b4d33c3fa702a46b1329a0e52eea6a7908fd375ace47", 0x4e}], 0x1, &(0x7f0000000700), 0x0, 0x40000}, 0x4044080) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000740)={r5, &(0x7f0000000700)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") close(0xffffffffffffffff) [ 352.343110] FAULT_INJECTION: forcing a failure. [ 352.343110] name failslab, interval 1, probability 0, space 0, times 0 [ 352.354438] CPU: 1 PID: 9607 Comm: syz-executor1 Not tainted 4.16.0-rc6+ #43 [ 352.361977] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 352.371335] Call Trace: [ 352.373934] dump_stack+0x194/0x24d [ 352.377570] ? arch_local_irq_restore+0x53/0x53 [ 352.382510] ? __unwind_start+0x169/0x330 [ 352.386669] ? __kernel_text_address+0xd/0x40 [ 352.391170] should_fail+0x8c0/0xa40 [ 352.394868] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 352.399951] ? perf_trace_lock_acquire+0xe3/0x980 [ 352.404776] ? save_stack+0xa3/0xd0 [ 352.408389] ? perf_trace_lock+0x900/0x900 [ 352.412601] ? do_mount+0xea4/0x2bb0 [ 352.416306] ? find_held_lock+0x35/0x1d0 [ 352.420368] ? check_same_owner+0x320/0x320 [ 352.424671] ? rcu_note_context_switch+0x710/0x710 [ 352.429589] should_failslab+0xec/0x120 [ 352.433544] __kmalloc_track_caller+0x5f/0x760 [ 352.438115] ? do_raw_spin_trylock+0x190/0x190 [ 352.442680] ? kstrdup_const+0x39/0x50 [ 352.446551] kstrdup+0x39/0x70 [ 352.449725] kstrdup_const+0x39/0x50 [ 352.453424] alloc_vfsmnt+0x1a5/0x9c0 [ 352.457206] ? path_lookupat+0x238/0xba0 [ 352.461249] ? mnt_free_id.isra.21+0x50/0x50 [ 352.465729] ? trace_hardirqs_off+0x10/0x10 [ 352.470036] ? putname+0xee/0x130 [ 352.473476] ? rcu_read_lock_sched_held+0x108/0x120 [ 352.478476] ? find_held_lock+0x35/0x1d0 [ 352.482523] ? __get_fs_type+0x8a/0xc0 [ 352.486394] ? lock_downgrade+0x980/0x980 [ 352.490526] ? module_unload_free+0x5b0/0x5b0 [ 352.495002] ? lock_release+0xa40/0xa40 [ 352.498967] ? mpi_resize+0x200/0x200 [ 352.502753] vfs_kern_mount.part.26+0x84/0x4a0 [ 352.507319] ? may_umount+0xa0/0xa0 [ 352.510930] ? _raw_read_unlock+0x22/0x30 [ 352.515059] ? __get_fs_type+0x8a/0xc0 [ 352.518931] do_mount+0xea4/0x2bb0 [ 352.522450] ? __might_fault+0x110/0x1d0 [ 352.526496] ? copy_mount_string+0x40/0x40 [ 352.530715] ? __check_object_size+0x8b/0x530 [ 352.535196] ? __might_sleep+0x95/0x190 [ 352.539156] ? kasan_check_write+0x14/0x20 [ 352.543373] ? _copy_from_user+0x99/0x110 [ 352.547505] ? memdup_user+0x5e/0x90 [ 352.551197] ? copy_mount_options+0x1f7/0x2e0 [ 352.555676] SyS_mount+0xab/0x120 [ 352.559107] ? copy_mnt_ns+0xb30/0xb30 [ 352.562976] do_syscall_64+0x281/0x940 [ 352.566843] ? vmalloc_sync_all+0x30/0x30 [ 352.570968] ? _raw_spin_unlock_irq+0x27/0x70 [ 352.575445] ? finish_task_switch+0x1c1/0x7e0 [ 352.579921] ? syscall_return_slowpath+0x550/0x550 [ 352.584837] ? syscall_return_slowpath+0x2ac/0x550 [ 352.589747] ? prepare_exit_to_usermode+0x350/0x350 [ 352.594744] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 352.600093] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 352.604924] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 352.610094] RIP: 0033:0x454e79 [ 352.613264] RSP: 002b:00007fed74635c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 352.620956] RAX: ffffffffffffffda RBX: 00007fed746366d4 RCX: 0000000000454e79 [ 352.628206] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 352.635455] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 2018/03/31 09:08:13 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x5, 0x0, 0x0, 0x5}, 0x2c) r1 = bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x13, 0x0, 0x0, 0x0, 0x20000003, 0x0}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x3e83, 0x8, r1}, 0x2c) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x50, &(0x7f0000000140)={0x0, 0x0}}, 0x10) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, r2, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) socketpair(0x4, 0x1, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000480)={r5, &(0x7f0000000440)="3068306ef4a0ff8256b6430a042a9b"}, 0x10) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x0, 0x8, 0x0, 0x0, r0, 0x6}, 0x2c) socketpair(0x8, 0x2, 0x0, &(0x7f0000000040)) r6 = gettid() bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=r3, 0x4) perf_event_open(&(0x7f00000003c0)={0x7, 0x70, 0x7fff, 0x5, 0x6, 0x8000, 0x0, 0x1000, 0x0, 0x7, 0x1000, 0x1, 0xffffffff, 0x3, 0xaf99, 0x40, 0x8001, 0xfffffffffffffffa, 0x1, 0x80000000, 0xe6d1, 0x4, 0x8001, 0x9, 0x1f, 0xfffffffffffffc00, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x3, 0x1, 0xfffffffffffffffe, 0x9, 0xff, 0x1, 0x2, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000002c0), 0x8}, 0x8004, 0x3, 0x6, 0x1, 0x5, 0xb03c, 0x5}, r6, 0xc, 0xffffffffffffffff, 0xb) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000280)={0xffffffffffffffff, 0xffffff8f, &(0x7f0000000300)}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000600)={0xffffffffffffffff, &(0x7f00000004c0)="648d1c6e4e7374f62b21f1c71a7cd05c41e2a0bf36f2f23f5761a39646321c3b5e4e670bd9a8f7a3fc36d594c1799d7dec6f0ba644a16abd532529ac63497998169000b2e491e82f659738895262b6fc9c79d8e6736c91136937b9", &(0x7f0000000540)="0c39cf9403045550ce39840a2a90ca20bc744608140dcd6c55d855533bb97417ef0cd19e1990bf245f0f38ab76b7f283d20500e75742ca4151b5489f5848a6b6104b0334b5427d07a3464ecffbfda64068c2d7ea6c230ba9040eebaec2030d19884f9f815ab793bd836fdb9c142a7aa9510939e2d3b5e6f57fa56f5464911bd939ca0ab0a1c19407fc9b1b974b94401f7c82bce0926bd5"}, 0x20) 2018/03/31 09:08:13 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x5, 0x100000000209e20, 0x0, 0x5}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x13, 0x0, 0x7ffff9, 0x0, 0x20000003, 0x0}, 0x2c) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x13, 0x0, 0x7ffff9, 0x0, 0x20000003, 0x0}, 0x2c) [ 352.642704] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000016 [ 352.649955] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000005 2018/03/31 09:08:13 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x0, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r7 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) ioctl$PERF_EVENT_IOC_RESET(r5, 0x2403, 0x2) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f00000009c0)={r4}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r7, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) ioctl$PERF_EVENT_IOC_RESET(r4, 0x2403, 0x2) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000280)={r6, &(0x7f0000000700)="ec1b815b5cc95d6e0dff859791e3341b"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)={0x3, 0x40000100, 0x56c96e7a, 0xea, 0x1, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") close(0xffffffffffffffff) 2018/03/31 09:08:13 executing program 1 (fault-call:20 fault-nth:6): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)={0xffffffffffffffff}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x0, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r5 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f00000009c0)={r4}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg(r3, &(0x7f0000000cc0)={&(0x7f0000000400)=@ethernet={0x1}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000580)="4589496d6a3bfcccae07dc729c52ee6bdf10d9cf221f605c25f790103018703b9a67491f96c3f9f8d07204ee4adf21acce1afdaedaba1228b4d33c3fa702a46b1329a0e52eea6a7908fd375ace47", 0x4e}], 0x1, &(0x7f0000000700), 0x0, 0x40000}, 0x4044080) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000740)={0xffffffffffffffff, &(0x7f0000000700)="ec1b815b5cc95d6e0dff859791e3341b8790dcb187f25418f8003a2b3bf345dc"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") close(0xffffffffffffffff) 2018/03/31 09:08:13 executing program 7: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)={0xffffffffffffffff}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x0, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r5 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x0, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f00000009c0)={r4}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg(r3, &(0x7f0000000cc0)={&(0x7f0000000400)=@ethernet={0x1}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000580)="4589496d6a3bfcccae07dc729c52ee6bdf10d9cf221f605c25f790103018703b9a67491f96c3f9f8d07204ee4adf21acce1afdaedaba1228b4d33c3fa702a46b1329a0e52eea6a7908fd375ace47", 0x4e}], 0x1, &(0x7f0000000700), 0x0, 0x40000}, 0x4044080) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000740)={0xffffffffffffffff, &(0x7f0000000700)="ec1b815b5cc95d6e0dff859791e3341b8790dcb187f25418f8003a2b3bf345"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36") close(0xffffffffffffffff) 2018/03/31 09:08:13 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x5, 0x0, 0x0, 0x5}, 0x2c) r1 = bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x13, 0x0, 0x0, 0x0, 0x20000003, 0x0}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x3e83, 0x8, r1}, 0x2c) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x50, &(0x7f0000000140)={0x0, 0x0}}, 0x10) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, r2, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) socketpair(0x4, 0x1, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000480)={r5, &(0x7f0000000440)="3068306ef4a0ff8256b6430a042a9b"}, 0x10) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x0, 0x8, 0x0, 0x0, r0, 0x6}, 0x2c) socketpair(0x8, 0x2, 0x0, &(0x7f0000000040)) r6 = gettid() bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=r3, 0x4) perf_event_open(&(0x7f00000003c0)={0x7, 0x70, 0x7fff, 0x5, 0x6, 0x8000, 0x0, 0x1000, 0x0, 0x7, 0x1000, 0x1, 0xffffffff, 0x3, 0xaf99, 0x40, 0x8001, 0xfffffffffffffffa, 0x1, 0x80000000, 0xe6d1, 0x4, 0x8001, 0x9, 0x1f, 0xfffffffffffffc00, 0x0, 0x0, 0x7ff, 0x15ac000000000000, 0x0, 0x0, 0x1, 0xfffffffffffffffe, 0x9, 0xff, 0x1, 0x2, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000002c0), 0x8}, 0x8004, 0x3, 0x6, 0x1, 0x5, 0xb03c, 0x5}, r6, 0xc, 0xffffffffffffffff, 0xb) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000280)={0xffffffffffffffff, 0xffffff8f, &(0x7f0000000300)}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000600)={0xffffffffffffffff, &(0x7f00000004c0)="648d1c6e4e7374f62b21f1c71a7cd05c41e2a0bf36f2f23f5761a39646321c3b5e4e670bd9a8f7a3fc36d594c1799d7dec6f0ba644a16abd532529ac63497998169000b2e491e82f659738895262b6fc9c79d8e6736c91136937b9", &(0x7f0000000540)="0c39cf9403045550ce39840a2a90ca20bc744608140dcd6c55d855533bb97417ef0cd19e1990bf245f0f38ab76b7f283d20500e75742ca4151b5489f5848a6b6104b0334b5427d07a3464ecffbfda64068c2d7ea6c230ba9040eebaec2030d19884f9f815ab793bd836fdb9c142a7aa9510939e2d3b5e6f57fa56f5464911bd939ca0ab0a1c19407fc9b1b974b94401f7c82bce0926bd5"}, 0x20) 2018/03/31 09:08:13 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xf, 0x5, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x80000000}, [@map={0x18, 0x1, 0x1, 0x0, 0x1}], {0x95}}, &(0x7f0000000040)='syzkaller\x00', 0x3, 0x10, &(0x7f0000000080)=""/16, 0x41000, 0x2f3100a785778bd1}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000001c0)={r0, 0x50, &(0x7f0000000140)}, 0x10) close(r0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000780)={&(0x7f0000000240)=@ax25, 0x80, &(0x7f0000000600)=[{&(0x7f00000002c0)=""/114, 0x72}, {&(0x7f0000000340)=""/133, 0x85}, {&(0x7f0000000400)=""/23, 0x17}, {&(0x7f0000000440)=""/59, 0x3b}, {&(0x7f0000000480)=""/114, 0x72}, {&(0x7f0000000500)=""/45, 0x2d}, {&(0x7f0000000540)=""/83, 0x53}, {&(0x7f00000005c0)}], 0x8, &(0x7f0000000680)=""/214, 0xd6, 0x100}, 0x40) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000007c0)={0xffffffffffffffff}) recvmsg(r2, &(0x7f00000019c0)={&(0x7f0000000800)=@ax25, 0x80, &(0x7f00000018c0)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000001880)=""/18, 0x12}], 0x2, &(0x7f0000001900)=""/184, 0xb8, 0x3}, 0x1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001a80)={r4, 0x50, &(0x7f0000001a00)}, 0x10) r5 = perf_event_open(&(0x7f0000001b00)={0x2, 0x70, 0x6, 0x8, 0x80000000, 0x10001, 0x0, 0x7ff, 0x4, 0xa, 0x200, 0x20, 0x72, 0x5, 0x0, 0x0, 0x5, 0x8f, 0x9ed, 0xff, 0x0, 0xa58, 0x7f, 0xf2f, 0x4503, 0x6, 0x81, 0x5, 0x1ff, 0xffffffff00000000, 0x2, 0x5, 0x9000000000000, 0xfffffffffffffffa, 0x8, 0x10001, 0x731ab510, 0x9, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000001ac0), 0x1}, 0x80, 0x2b4, 0x200, 0x3, 0x6, 0x9, 0x4}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0x20000) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000001b80)) r6 = getpid() r7 = perf_event_open(&(0x7f0000001c00)={0x1, 0x70, 0x0, 0xfff, 0x4, 0x80000000, 0x0, 0x3, 0x40, 0xa, 0x7, 0x7, 0x7, 0x4800000000000000, 0x7, 0x6, 0x62b, 0x8, 0x9, 0x100000000, 0x1, 0x0, 0x5, 0xd199, 0x1f, 0x10000, 0xff80000000000000, 0x3, 0x4, 0x8, 0x80000001, 0x8000, 0x7fff, 0x4, 0x16, 0x7, 0x40, 0x8, 0x0, 0x5, 0x50031dd1e89e26d1, @perf_bp={&(0x7f0000001bc0), 0x2}, 0x10000, 0x3a, 0x80000001, 0x1, 0x2c, 0x3ff, 0x6}, r6, 0x6, r3, 0x3) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000001c80)=r0, 0x4) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000001cc0)) ioctl$PERF_EVENT_IOC_REFRESH(r7, 0x2402, 0xffffffff) r8 = perf_event_open(&(0x7f0000001d00)={0x0, 0x70, 0x7, 0x400, 0x100, 0xac, 0x0, 0x100000000, 0xc2800, 0xa, 0x33e3, 0x2, 0x10001, 0x8, 0x5, 0x100000001, 0x2e9, 0x2, 0xc1, 0xf2, 0x2, 0x9, 0xffff, 0x7, 0x1, 0x0, 0x8000, 0x800, 0xfffffffffffffffa, 0x40, 0x0, 0x3, 0x6, 0xfa4, 0x7, 0xffffffffffff8000, 0x0, 0x0, 0x0, 0x8000, 0x3, @perf_config_ext={0x400}, 0x100, 0xa264, 0x4, 0x7, 0x2, 0x1000, 0x92}, r6, 0x5, r7, 0x1) socketpair(0x7, 0x6, 0x1, &(0x7f0000001d80)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000001e00)={&(0x7f0000001dc0)='./file0\x00', r9}, 0x10) r10 = perf_event_open(&(0x7f0000001e40)={0x4, 0x70, 0x5, 0x4, 0x8, 0x6, 0x0, 0x2, 0x1425, 0xb, 0x0, 0xcc9, 0x400, 0x57f90db4, 0x80000000, 0x7, 0x1000, 0x0, 0x8, 0x8000, 0xffffffff, 0x400, 0x1, 0x6, 0x40, 0x2, 0x10000, 0x8, 0x9, 0xfffffffffffffff8, 0x9, 0x4, 0x3, 0x400, 0x3, 0x9, 0x3, 0x100, 0x0, 0x6, 0x0, @perf_config_ext={0x4, 0x2}, 0x20, 0x3ff, 0x0, 0x7, 0x3, 0x5, 0xfa5e}, r6, 0xd, r7, 0x2) bpf$OBJ_GET_MAP(0x7, &(0x7f0000001f00)={&(0x7f0000001ec0)='./file0\x00'}, 0x10) socketpair$inet6_sctp(0xa, 0x0, 0x84, &(0x7f0000001f40)) ioctl$PERF_EVENT_IOC_DISABLE(r10, 0x2401, 0xbad) r11 = perf_event_open(&(0x7f0000001fc0)={0x3, 0x70, 0xff, 0x2f, 0x2, 0x7, 0x0, 0x40, 0x80000, 0x1, 0x8, 0x6, 0xfffffffffffffffb, 0x7, 0x2, 0x10000, 0x6, 0x5, 0x0, 0x10, 0x6, 0xc58, 0x7f, 0x3, 0x2, 0x3, 0x5, 0x80000000800000, 0x7, 0xfff, 0x16, 0x2b65, 0x9, 0x69244395, 0x10000, 0x4, 0x9, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000001f80), 0x8}, 0x100, 0x8, 0x51b4, 0x4, 0x800, 0xb7, 0x4800}, r6, 0x8, r8, 0x1) r12 = gettid() socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000002040)) perf_event_open(&(0x7f0000002080)={0x0, 0x70, 0x100, 0x0, 0x2, 0x401, 0x0, 0x6, 0x1, 0x6, 0x656, 0x5, 0xfffffffffffff973, 0xffffffffffffffff, 0x9, 0x7, 0x3, 0x3ff, 0x1c000000, 0x10000, 0x6, 0x20, 0x6, 0x1, 0x1, 0x4, 0x2, 0x20, 0x9, 0xed5, 0x847, 0x1000, 0x0, 0x0, 0x102bed3b, 0x9, 0x7fffffff, 0x6, 0x0, 0x24, 0x0, @perf_config_ext={0x100000001, 0x6}, 0x200, 0x800000010000000, 0x7, 0x7, 0x1000, 0xf3, 0xe87}, r12, 0xf, r11, 0x8) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000002100)) perf_event_open(&(0x7f0000002180)={0x4, 0x70, 0x0, 0x8, 0xff, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x3, 0xffffffffffffff00, 0x93eb, 0x1, 0x4e5e, 0x8001, 0xfffffffffffffff8, 0x7, 0x1f4, 0x80000001, 0x99b, 0x4, 0x8, 0xed8, 0x3f, 0xec9, 0x6, 0x1, 0x4ab8, 0x8, 0x2, 0xdd, 0x9, 0xffffffffffffffff, 0x8000, 0x0, 0x6, 0xffff, 0x8, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000002140), 0xf}, 0x400, 0x5, 0x7, 0x4, 0x7, 0x4}, r12, 0x3, r7, 0x8) 2018/03/31 09:08:13 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x5, 0x100000000209e20, 0x8000000001, 0x5}, 0x2c) r1 = bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x13, 0x0, 0x7ffff9, 0x0, 0x20000003, 0x0}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xe, 0x0, 0x7f, 0x3e83, 0x8, r1, 0x80000000}, 0x2c) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x50, &(0x7f0000000140)={0x0, 0x0}}, 0x10) socket$kcm(0x29, 0x2, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) socketpair(0x4, 0x1, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r3, 0x2401, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000480)={r4, &(0x7f0000000440)="3068306ef4a0ff8256b6430a042a9b"}, 0x10) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40042409, 0x1) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r3) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x0, 0x8, 0x0, 0x0, r0, 0x6}, 0x2c) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)) perf_event_open(&(0x7f000025c000)={0x5, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = gettid() bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x0, 0x400, 0xfff, 0x7f, 0x5, r0, 0x80}, 0x2c) r6 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0xfff, 0x100000001, 0xfffffffffffffffb, 0x0, 0x8001, 0x0, 0x1, 0x0, 0xfffffffffffffff9, 0x0, 0x9, 0x9, 0x5, 0x8, 0x1, 0x8106, 0x0, 0x14000000000, 0x80000000, 0x1, 0x5, 0x0, 0x40, 0x2839, 0x1d, 0x800, 0x7, 0x0, 0x0, 0x5, 0x7, 0x0, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x4}, 0x0, 0x0, 0xff, 0x0, 0x3, 0x8, 0x3}, r5, 0x2, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=r2, 0x4) perf_event_open(&(0x7f00000003c0)={0x7, 0x70, 0x7fff, 0x5, 0x6, 0x8000, 0x0, 0x1000, 0x0, 0x7, 0x1000, 0x1, 0xffffffff, 0x3, 0xaf99, 0x40, 0x8001, 0xfffffffffffffffa, 0x1, 0x80000000, 0xe6d1, 0x4, 0x8001, 0x9, 0x1f, 0xfffffffffffffc00, 0x0, 0x0, 0x7ff, 0x15ac000000000000, 0x0, 0x3, 0x1, 0xfffffffffffffffe, 0x9, 0xff, 0x1, 0x2, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000002c0), 0x8}, 0x0, 0x3, 0x6, 0x1, 0x5, 0xb03c, 0x5}, r5, 0xc, r6, 0xb) bpf$MAP_CREATE(0x0, &(0x7f0000000640)={0x8, 0x6bcb8e63, 0x0, 0x59ad, 0x12, r0, 0x8001}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000880)={r0, &(0x7f0000000840), &(0x7f00000008c0)=""/70}, 0x375) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000280)={0xffffffffffffffff, 0xffffff8f, &(0x7f0000000300)}, 0x10) [ 352.934301] FAULT_INJECTION: forcing a failure. [ 352.934301] name failslab, interval 1, probability 0, space 0, times 0 [ 352.945698] CPU: 0 PID: 9646 Comm: syz-executor1 Not tainted 4.16.0-rc6+ #43 [ 352.952888] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 352.962239] Call Trace: [ 352.964831] dump_stack+0x194/0x24d [ 352.968461] ? arch_local_irq_restore+0x53/0x53 [ 352.973133] ? wait_for_completion+0x770/0x770 [ 352.977720] should_fail+0x8c0/0xa40 [ 352.981440] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 352.986545] ? rcu_pm_notify+0xc0/0xc0 [ 352.990443] ? find_held_lock+0x35/0x1d0 [ 352.994524] ? check_same_owner+0x320/0x320 [ 352.998848] ? sget_userns+0x27d/0xe40 [ 353.002754] ? rcu_note_context_switch+0x710/0x710 [ 353.007688] should_failslab+0xec/0x120 [ 353.011667] kmem_cache_alloc_trace+0x4b/0x740 [ 353.016255] ? security_capable+0x8e/0xc0 [ 353.020415] sget_userns+0x2a3/0xe40 [ 353.024124] ? set_anon_super+0x20/0x20 [ 353.028093] ? put_filp+0x90/0x90 [ 353.031524] ? destroy_unused_super.part.6+0xd0/0xd0 [ 353.036605] ? alloc_vfsmnt+0x762/0x9c0 [ 353.040556] ? path_lookupat+0x238/0xba0 [ 353.044592] ? mnt_free_id.isra.21+0x50/0x50 [ 353.048979] ? trace_hardirqs_off+0x10/0x10 [ 353.053274] ? putname+0xee/0x130 [ 353.056707] ? cap_capable+0x1b5/0x230 [ 353.060570] ? security_capable+0x8e/0xc0 [ 353.064695] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 353.069861] ? ns_capable_common+0xcf/0x160 [ 353.074163] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 353.079332] mount_ns+0x6d/0x190 [ 353.082676] rpc_mount+0x9e/0xd0 [ 353.086025] mount_fs+0x66/0x2d0 [ 353.089372] vfs_kern_mount.part.26+0xc6/0x4a0 [ 353.094285] ? may_umount+0xa0/0xa0 [ 353.097889] ? _raw_read_unlock+0x22/0x30 [ 353.102021] ? __get_fs_type+0x8a/0xc0 [ 353.105889] do_mount+0xea4/0x2bb0 [ 353.109405] ? __might_fault+0x110/0x1d0 [ 353.113442] ? copy_mount_string+0x40/0x40 [ 353.117649] ? check_same_owner+0x320/0x320 [ 353.121946] ? __check_object_size+0x8b/0x530 [ 353.126416] ? __might_sleep+0x95/0x190 [ 353.130366] ? kasan_check_write+0x14/0x20 [ 353.134576] ? _copy_from_user+0x99/0x110 [ 353.138699] ? memdup_user+0x5e/0x90 [ 353.142386] ? copy_mount_options+0x1f7/0x2e0 [ 353.146858] SyS_mount+0xab/0x120 [ 353.150292] ? copy_mnt_ns+0xb30/0xb30 [ 353.154157] do_syscall_64+0x281/0x940 [ 353.158026] ? vmalloc_sync_all+0x30/0x30 [ 353.162152] ? _raw_spin_unlock_irq+0x27/0x70 [ 353.166619] ? finish_task_switch+0x1c1/0x7e0 [ 353.171092] ? syscall_return_slowpath+0x550/0x550 [ 353.176011] ? syscall_return_slowpath+0x2ac/0x550 [ 353.180924] ? prepare_exit_to_usermode+0x350/0x350 [ 353.185914] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 353.191255] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 353.196077] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 353.201237] RIP: 0033:0x454e79 [ 353.204401] RSP: 002b:00007fed74635c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 353.212084] RAX: ffffffffffffffda RBX: 00007fed746366d4 RCX: 0000000000454e79 [ 353.219328] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 353.226570] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 2018/03/31 09:08:13 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x5, 0x100000000209e20, 0x0, 0x5}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x13, 0x0, 0x7ffff9, 0x0, 0x20000003, 0x0}, 0x2c) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x13, 0x0, 0x7ffff9, 0x0, 0x20000003, 0x0}, 0x2c) 2018/03/31 09:08:13 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000a40)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x0, 0x0) socketpair(0x2, 0x0, 0x0, &(0x7f0000000640)={0xffffffffffffffff}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r6 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x0, 0x10000, 0x1182, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f00000009c0)={r4}) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000280)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000a00)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg(r3, &(0x7f0000000cc0)={&(0x7f0000000400)=@ethernet={0x1}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000580)="4589496d6a3bfcccae07dc729c52ee6bdf10d9cf221f605c25f790103018703b9a67491f96c3f9f8d07204ee4adf21acce1afdaedaba1228b4d33c3fa702a46b1329a0e52eea6a7908fd375ace47", 0x4e}], 0x1, &(0x7f0000000700), 0x0, 0x40000}, 0x4044080) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000740)={r5, &(0x7f0000000700)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") close(0xffffffffffffffff) [ 353.233817] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000016 [ 353.241068] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000006 2018/03/31 09:08:13 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x5, 0x0, 0x0, 0x5}, 0x2c) r1 = bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x13, 0x0, 0x0, 0x0, 0x20000003, 0x0}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x3e83, 0x8, r1}, 0x2c) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x50, &(0x7f0000000140)={0x0, 0x0}}, 0x10) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, r2, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) socketpair(0x4, 0x1, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000480)={r5, &(0x7f0000000440)="3068306ef4a0ff8256b6430a042a9b"}, 0x10) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x0, 0x8, 0x0, 0x0, r0, 0x6}, 0x2c) socketpair(0x8, 0x2, 0x0, &(0x7f0000000040)) r6 = gettid() bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=r3, 0x4) perf_event_open(&(0x7f00000003c0)={0x7, 0x70, 0x7fff, 0x5, 0x6, 0x8000, 0x0, 0x1000, 0x0, 0x7, 0x1000, 0x1, 0xffffffff, 0x3, 0xaf99, 0x40, 0x8001, 0xfffffffffffffffa, 0x1, 0x80000000, 0xe6d1, 0x4, 0x8001, 0x9, 0x1f, 0xfffffffffffffc00, 0x0, 0x0, 0x7ff, 0x15ac000000000000, 0x0, 0x0, 0x1, 0xfffffffffffffffe, 0x9, 0xff, 0x1, 0x2, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000002c0), 0x8}, 0x8004, 0x3, 0x6, 0x1, 0x5, 0xb03c, 0x5}, r6, 0xc, 0xffffffffffffffff, 0xb) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000280)={0xffffffffffffffff, 0xffffff8f, &(0x7f0000000300)}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000600)={0xffffffffffffffff, &(0x7f00000004c0)="648d1c6e4e7374f62b21f1c71a7cd05c41e2a0bf36f2f23f5761a39646321c3b5e4e670bd9a8f7a3fc36d594c1799d7dec6f0ba644a16abd532529ac63497998169000b2e491e82f659738895262b6fc9c79d8e6736c91136937b9", &(0x7f0000000540)="0c39cf9403045550ce39840a2a90ca20bc744608140dcd6c55d855533bb97417ef0cd19e1990bf245f0f38ab76b7f283d20500e75742ca4151b5489f5848a6b6104b0334b5427d07a3464ecffbfda64068c2d7ea6c230ba9040eebaec2030d19884f9f815ab793bd836fdb9c142a7aa9510939e2d3b5e6f57fa56f5464911bd939ca0ab0a1c19407fc9b1b974b94401f7c82bce0926bd5"}, 0x20) 2018/03/31 09:08:13 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x0, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r7 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) ioctl$PERF_EVENT_IOC_RESET(r5, 0x2403, 0x2) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f00000009c0)={r4}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r7, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg(r3, &(0x7f0000000cc0)={&(0x7f0000000400)=@ethernet={0x1}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000580)="4589496d6a3bfcccae07dc729c52ee6bdf10d9cf221f605c25f790103018703b9a67491f96c3f9f8d07204ee4adf21acce1afdaedaba1228b4d33c3fa702a46b1329a0e52eea6a7908fd375ace47", 0x4e}], 0x1, &(0x7f0000000700), 0x0, 0x40000}, 0x4044080) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000280)={r6, &(0x7f0000000700)="ec1b815b5cc95d6e0dff859791e3341b"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)={0x3, 0x40000100, 0x56c96e7a, 0xea, 0x1, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") close(0xffffffffffffffff) 2018/03/31 09:08:13 executing program 7: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)={0xffffffffffffffff}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x0, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r5 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x0, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f00000009c0)={r4}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg(r3, &(0x7f0000000cc0)={&(0x7f0000000400)=@ethernet={0x1}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000580)="4589496d6a3bfcccae07dc729c52ee6bdf10d9cf221f605c25f790103018703b9a67491f96c3f9f8d07204ee4adf21acce1afdaedaba1228b4d33c3fa702a46b1329a0e52eea6a7908fd375ace47", 0x4e}], 0x1, &(0x7f0000000700), 0x0, 0x40000}, 0x4044080) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000740)={0xffffffffffffffff, &(0x7f0000000700)="ec1b815b5cc95d6e0dff859791e3341b8790dcb187f25418f8003a2b3bf345"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dc") close(0xffffffffffffffff) 2018/03/31 09:08:13 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xf, 0x5, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x80000000}, [@map={0x18, 0x1, 0x1, 0x0, 0x1}], {0x95}}, &(0x7f0000000040)='syzkaller\x00', 0x3, 0x10, &(0x7f0000000080)=""/16, 0x41000, 0x2f3100a785778bd1}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000001c0)={r0, 0x50, &(0x7f0000000140)}, 0x10) close(r0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000780)={&(0x7f0000000240)=@ax25, 0x80, &(0x7f0000000600)=[{&(0x7f00000002c0)=""/114, 0x72}, {&(0x7f0000000340)=""/133, 0x85}, {&(0x7f0000000400)=""/23, 0x17}, {&(0x7f0000000440)=""/59, 0x3b}, {&(0x7f0000000480)=""/114, 0x72}, {&(0x7f0000000500)=""/45, 0x2d}, {&(0x7f0000000540)=""/83, 0x53}, {&(0x7f00000005c0)}], 0x8, &(0x7f0000000680)=""/214, 0xd6, 0x100}, 0x40) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000007c0)={0xffffffffffffffff}) recvmsg(r2, &(0x7f00000019c0)={&(0x7f0000000800)=@ax25, 0x80, &(0x7f00000018c0)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000001880)=""/18, 0x12}], 0x2, &(0x7f0000001900)=""/184, 0xb8, 0x3}, 0x1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001a80)={r4, 0x50, &(0x7f0000001a00)}, 0x10) r5 = perf_event_open(&(0x7f0000001b00)={0x2, 0x70, 0x6, 0x8, 0x80000000, 0x10001, 0x0, 0x7ff, 0x4, 0xa, 0x200, 0x20, 0x72, 0x5, 0x0, 0x0, 0x5, 0x8f, 0x9ed, 0xff, 0x0, 0xa58, 0x7f, 0xf2f, 0x4503, 0x6, 0x81, 0x5, 0x1ff, 0xffffffff00000000, 0x2, 0x5, 0x9000000000000, 0xfffffffffffffffa, 0x8, 0x10001, 0x731ab510, 0x9, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000001ac0), 0x1}, 0x80, 0x2b4, 0x200, 0x3, 0x6, 0x9, 0x4}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0x20000) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000001b80)) r6 = getpid() r7 = perf_event_open(&(0x7f0000001c00)={0x1, 0x70, 0x0, 0xfff, 0x4, 0x80000000, 0x0, 0x3, 0x40, 0xa, 0x7, 0x7, 0x7, 0x4800000000000000, 0x7, 0x6, 0x62b, 0x8, 0x9, 0x100000000, 0x1, 0x0, 0x5, 0xd199, 0x1f, 0x10000, 0xff80000000000000, 0x3, 0x4, 0x8, 0x80000001, 0x8000, 0x7fff, 0x4, 0x16, 0x7, 0x40, 0x8, 0x0, 0x5, 0x50031dd1e89e26d1, @perf_bp={&(0x7f0000001bc0), 0x2}, 0x10000, 0x3a, 0x80000001, 0x1, 0x2c, 0x3ff, 0x6}, r6, 0x6, r3, 0x3) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000001c80)=r0, 0x4) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000001cc0)) ioctl$PERF_EVENT_IOC_REFRESH(r7, 0x2402, 0xffffffff) r8 = perf_event_open(&(0x7f0000001d00)={0x0, 0x70, 0x7, 0x400, 0x100, 0xac, 0x0, 0x100000000, 0xc2800, 0xa, 0x33e3, 0x2, 0x10001, 0x8, 0x5, 0x100000001, 0x2e9, 0x2, 0xc1, 0xf2, 0x2, 0x9, 0xffff, 0x7, 0x1, 0x0, 0x8000, 0x800, 0xfffffffffffffffa, 0x40, 0x0, 0x3, 0x6, 0xfa4, 0x7, 0xffffffffffff8000, 0x0, 0x0, 0x0, 0x8000, 0x3, @perf_config_ext={0x400}, 0x100, 0xa264, 0x4, 0x7, 0x2, 0x1000, 0x92}, r6, 0x5, r7, 0x1) socketpair(0x7, 0x6, 0x1, &(0x7f0000001d80)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000001e00)={&(0x7f0000001dc0)='./file0\x00', r9}, 0x10) r10 = perf_event_open(&(0x7f0000001e40)={0x4, 0x70, 0x5, 0x4, 0x8, 0x6, 0x0, 0x2, 0x1425, 0xb, 0x0, 0xcc9, 0x400, 0x57f90db4, 0x80000000, 0x7, 0x1000, 0x0, 0x8, 0x8000, 0xffffffff, 0x400, 0x1, 0x6, 0x40, 0x2, 0x10000, 0x8, 0x9, 0xfffffffffffffff8, 0x9, 0x4, 0x3, 0x400, 0x3, 0x9, 0x3, 0x100, 0x0, 0x6, 0x0, @perf_config_ext={0x4, 0x2}, 0x20, 0x3ff, 0x0, 0x7, 0x3, 0x5, 0xfa5e}, r6, 0xd, r7, 0x2) bpf$OBJ_GET_MAP(0x7, &(0x7f0000001f00)={&(0x7f0000001ec0)='./file0\x00'}, 0x10) socketpair$inet6_sctp(0xa, 0x0, 0x84, &(0x7f0000001f40)) ioctl$PERF_EVENT_IOC_DISABLE(r10, 0x2401, 0xbad) r11 = perf_event_open(&(0x7f0000001fc0)={0x3, 0x70, 0xff, 0x2f, 0x2, 0x7, 0x0, 0x40, 0x80000, 0x1, 0x8, 0x6, 0xfffffffffffffffb, 0x7, 0x2, 0x10000, 0x6, 0x5, 0x0, 0x10, 0x6, 0xc58, 0x7f, 0x3, 0x2, 0x3, 0x5, 0x80000000800000, 0x7, 0xfff, 0x16, 0x2b65, 0x9, 0x69244395, 0x10000, 0x4, 0x9, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000001f80), 0x8}, 0x100, 0x8, 0x51b4, 0x4, 0x800, 0xb7, 0x4800}, r6, 0x8, r8, 0x1) r12 = gettid() socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000002040)) perf_event_open(&(0x7f0000002080)={0x0, 0x70, 0x100, 0x0, 0x2, 0x401, 0x0, 0x6, 0x1, 0x6, 0x656, 0x5, 0xfffffffffffff973, 0xffffffffffffffff, 0x9, 0x7, 0x3, 0x3ff, 0x1c000000, 0x10000, 0x6, 0x20, 0x6, 0x1, 0x1, 0x4, 0x2, 0x20, 0x9, 0xed5, 0x847, 0x1000, 0x0, 0x0, 0x102bed3b, 0x9, 0x7fffffff, 0x6, 0x0, 0x24, 0x0, @perf_config_ext={0x100000001, 0x6}, 0x200, 0x800000010000000, 0x7, 0x7, 0x1000, 0xf3, 0xe87}, r12, 0xf, r11, 0x8) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000002100)) perf_event_open(&(0x7f0000002180)={0x4, 0x70, 0x0, 0x8, 0xff, 0x0, 0x0, 0xfffffffffffffff9, 0x10001, 0x0, 0xffffffffffffff00, 0x93eb, 0x1, 0x4e5e, 0x8001, 0xfffffffffffffff8, 0x7, 0x1f4, 0x80000001, 0x99b, 0x4, 0x8, 0xed8, 0x3f, 0xec9, 0x6, 0x1, 0x4ab8, 0x8, 0x2, 0xdd, 0x9, 0xffffffffffffffff, 0x8000, 0x0, 0x6, 0xffff, 0x8, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000002140), 0xf}, 0x400, 0x5, 0x7, 0x4, 0x7, 0x4}, r12, 0x3, r7, 0x8) 2018/03/31 09:08:13 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x5, 0x100000000209e20, 0x8000000001, 0x5}, 0x2c) r1 = bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x13, 0x0, 0x7ffff9, 0x0, 0x20000003, 0x0}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xe, 0x0, 0x7f, 0x3e83, 0x8, r1, 0x80000000}, 0x2c) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x50, &(0x7f0000000140)={0x0, 0x0}}, 0x10) socket$kcm(0x29, 0x2, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x3, &(0x7f0000000500)="fa0430e247ad0128221987e9475876ff9555aa619cbc933ebfb291fd83d53c1307bca5db614c15a951c61fcb603fd3b0") ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) socketpair(0x4, 0x1, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r3, 0x2401, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000480)={r4, &(0x7f0000000440)="3068306ef4a0ff8256b6430a042a9b"}, 0x10) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40042409, 0x1) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r3) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x0, 0x8, 0x0, 0x0, r0, 0x6}, 0x2c) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)) perf_event_open(&(0x7f000025c000)={0x5, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = gettid() r6 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0xfff, 0x100000001, 0xfffffffffffffffb, 0x0, 0x8001, 0x0, 0x1, 0x0, 0xfffffffffffffff9, 0x0, 0x9, 0x9, 0x5, 0x8, 0x1, 0x8106, 0x0, 0x14000000000, 0x80000000, 0x1, 0x5, 0x0, 0x40, 0x2839, 0x1d, 0x800, 0x7, 0x0, 0x0, 0x5, 0x7, 0x0, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x4}, 0x0, 0x0, 0xff, 0x0, 0x3, 0x8, 0x3}, r5, 0x2, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=r2, 0x4) perf_event_open(&(0x7f00000003c0)={0x7, 0x70, 0x7fff, 0x5, 0x6, 0x8000, 0x0, 0x1000, 0x0, 0x7, 0x1000, 0x1, 0xffffffff, 0x3, 0xaf99, 0x40, 0x8001, 0xfffffffffffffffa, 0x1, 0x80000000, 0xe6d1, 0x4, 0x8001, 0x9, 0x1f, 0xfffffffffffffc00, 0x0, 0x0, 0x7ff, 0x15ac000000000000, 0x0, 0x3, 0x1, 0xfffffffffffffffe, 0x9, 0xff, 0x1, 0x2, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000002c0), 0x8}, 0x0, 0x3, 0x6, 0x1, 0x5, 0xb03c, 0x5}, r5, 0xc, r6, 0xb) bpf$MAP_CREATE(0x0, &(0x7f0000000640)={0x8, 0x6bcb8e63, 0x0, 0x59ad, 0x12, r0, 0x8001}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000880)={r0, &(0x7f0000000840), &(0x7f00000008c0)=""/70}, 0x375) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000280)={0xffffffffffffffff, 0xffffff8f, &(0x7f0000000300)}, 0x10) 2018/03/31 09:08:13 executing program 1 (fault-call:20 fault-nth:7): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)={0xffffffffffffffff}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x0, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r5 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f00000009c0)={r4}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg(r3, &(0x7f0000000cc0)={&(0x7f0000000400)=@ethernet={0x1}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000580)="4589496d6a3bfcccae07dc729c52ee6bdf10d9cf221f605c25f790103018703b9a67491f96c3f9f8d07204ee4adf21acce1afdaedaba1228b4d33c3fa702a46b1329a0e52eea6a7908fd375ace47", 0x4e}], 0x1, &(0x7f0000000700), 0x0, 0x40000}, 0x4044080) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000740)={0xffffffffffffffff, &(0x7f0000000700)="ec1b815b5cc95d6e0dff859791e3341b8790dcb187f25418f8003a2b3bf345dc"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") close(0xffffffffffffffff) [ 353.337612] FAULT_INJECTION: forcing a failure. [ 353.337612] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 353.349440] CPU: 1 PID: 9674 Comm: syz-executor1 Not tainted 4.16.0-rc6+ #43 [ 353.356612] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 353.365946] Call Trace: [ 353.368514] dump_stack+0x194/0x24d [ 353.372121] ? arch_local_irq_restore+0x53/0x53 [ 353.376776] should_fail+0x8c0/0xa40 [ 353.380467] ? find_held_lock+0x35/0x1d0 [ 353.384506] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 353.389589] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 353.394766] ? pcpu_next_fit_region.constprop.27+0x2a7/0x3a0 [ 353.400547] ? perf_trace_lock_acquire+0xe3/0x980 [ 353.405371] ? perf_trace_lock+0x900/0x900 [ 353.409582] ? should_fail+0x23b/0xa40 [ 353.413451] __alloc_pages_nodemask+0x327/0xdd0 [ 353.418097] ? perf_trace_lock+0x900/0x900 [ 353.422311] ? __alloc_pages_slowpath+0x2d10/0x2d10 [ 353.427310] ? find_held_lock+0x35/0x1d0 [ 353.431361] ? check_same_owner+0x320/0x320 [ 353.435658] ? sget_userns+0x27d/0xe40 [ 353.439527] cache_grow_begin+0x72/0x640 [ 353.443568] kmem_cache_alloc_trace+0x3f1/0x740 [ 353.448214] ? security_capable+0x8e/0xc0 [ 353.452346] sget_userns+0x2a3/0xe40 [ 353.456036] ? set_anon_super+0x20/0x20 [ 353.459988] ? put_filp+0x90/0x90 [ 353.463423] ? destroy_unused_super.part.6+0xd0/0xd0 [ 353.468507] ? alloc_vfsmnt+0x762/0x9c0 [ 353.472462] ? path_lookupat+0x238/0xba0 [ 353.476500] ? mnt_free_id.isra.21+0x50/0x50 [ 353.480890] ? trace_hardirqs_off+0x10/0x10 [ 353.485188] ? putname+0xee/0x130 [ 353.488620] ? cap_capable+0x1b5/0x230 [ 353.492490] ? security_capable+0x8e/0xc0 [ 353.496618] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 353.501789] ? ns_capable_common+0xcf/0x160 [ 353.506089] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 353.511257] mount_ns+0x6d/0x190 [ 353.514602] rpc_mount+0x9e/0xd0 [ 353.517946] mount_fs+0x66/0x2d0 [ 353.521290] vfs_kern_mount.part.26+0xc6/0x4a0 [ 353.525851] ? may_umount+0xa0/0xa0 [ 353.529455] ? _raw_read_unlock+0x22/0x30 [ 353.533578] ? __get_fs_type+0x8a/0xc0 [ 353.537443] do_mount+0xea4/0x2bb0 [ 353.540961] ? __might_fault+0x110/0x1d0 [ 353.545006] ? copy_mount_string+0x40/0x40 [ 353.549222] ? __check_object_size+0x8b/0x530 [ 353.553695] ? __might_sleep+0x95/0x190 [ 353.557648] ? kasan_check_write+0x14/0x20 [ 353.561862] ? _copy_from_user+0x99/0x110 [ 353.565987] ? memdup_user+0x5e/0x90 [ 353.569679] ? copy_mount_options+0x1f7/0x2e0 [ 353.574154] SyS_mount+0xab/0x120 [ 353.577580] ? copy_mnt_ns+0xb30/0xb30 [ 353.581445] do_syscall_64+0x281/0x940 [ 353.585309] ? vmalloc_sync_all+0x30/0x30 [ 353.589434] ? _raw_spin_unlock_irq+0x27/0x70 [ 353.593906] ? finish_task_switch+0x1c1/0x7e0 [ 353.598378] ? syscall_return_slowpath+0x550/0x550 [ 353.603283] ? syscall_return_slowpath+0x2ac/0x550 [ 353.608189] ? prepare_exit_to_usermode+0x350/0x350 [ 353.613181] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 353.618524] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 353.623345] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 353.628511] RIP: 0033:0x454e79 2018/03/31 09:08:14 executing program 7: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)={0xffffffffffffffff}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x0, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r5 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x0, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f00000009c0)={r4}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg(r3, &(0x7f0000000cc0)={&(0x7f0000000400)=@ethernet={0x1}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000580)="4589496d6a3bfcccae07dc729c52ee6bdf10d9cf221f605c25f790103018703b9a67491f96c3f9f8d07204ee4adf21acce1afdaedaba1228b4d33c3fa702a46b1329a0e52eea6a7908fd375ace47", 0x4e}], 0x1, &(0x7f0000000700), 0x0, 0x40000}, 0x4044080) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000740)={0xffffffffffffffff, &(0x7f0000000700)="ec1b815b5cc95d6e0dff859791e3341b8790dcb187f25418f8003a2b3bf345"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dc") close(0xffffffffffffffff) 2018/03/31 09:08:14 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x5, 0x100000000209e20, 0x0, 0x5}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x13, 0x0, 0x7ffff9, 0x0, 0x20000003, 0x0}, 0x2c) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x13, 0x0, 0x7ffff9, 0x0, 0x20000003, 0x0}, 0x2c) [ 353.631676] RSP: 002b:00007fed74635c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 353.639360] RAX: ffffffffffffffda RBX: 00007fed746366d4 RCX: 0000000000454e79 [ 353.646608] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 353.653857] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 353.661104] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000016 [ 353.668349] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000007 2018/03/31 09:08:14 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x5, 0x0, 0x0, 0x5}, 0x2c) r1 = bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x13, 0x0, 0x0, 0x0, 0x20000003, 0x0}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x3e83, 0x8, r1}, 0x2c) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x50, &(0x7f0000000140)={0x0, 0x0}}, 0x10) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, r2, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) socketpair(0x4, 0x1, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000480)={r5, &(0x7f0000000440)="3068306ef4a0ff8256b6430a042a9b"}, 0x10) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x0, 0x8, 0x0, 0x0, r0, 0x6}, 0x2c) socketpair(0x8, 0x2, 0x0, &(0x7f0000000040)) r6 = gettid() bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=r3, 0x4) perf_event_open(&(0x7f00000003c0)={0x7, 0x70, 0x7fff, 0x5, 0x6, 0x8000, 0x0, 0x1000, 0x0, 0x7, 0x1000, 0x1, 0xffffffff, 0x3, 0xaf99, 0x40, 0x8001, 0xfffffffffffffffa, 0x1, 0x80000000, 0xe6d1, 0x4, 0x8001, 0x9, 0x1f, 0xfffffffffffffc00, 0x0, 0x0, 0x7ff, 0x15ac000000000000, 0x0, 0x0, 0x1, 0xfffffffffffffffe, 0x9, 0xff, 0x1, 0x2, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000002c0), 0x8}, 0x8004, 0x3, 0x6, 0x1, 0x5, 0xb03c, 0x5}, r6, 0xc, 0xffffffffffffffff, 0xb) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000280)={0xffffffffffffffff, 0xffffff8f, &(0x7f0000000300)}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000600)={0xffffffffffffffff, &(0x7f00000004c0)="648d1c6e4e7374f62b21f1c71a7cd05c41e2a0bf36f2f23f5761a39646321c3b5e4e670bd9a8f7a3fc36d594c1799d7dec6f0ba644a16abd532529ac63497998169000b2e491e82f659738895262b6fc9c79d8e6736c91136937b9", &(0x7f0000000540)="0c39cf9403045550ce39840a2a90ca20bc744608140dcd6c55d855533bb97417ef0cd19e1990bf245f0f38ab76b7f283d20500e75742ca4151b5489f5848a6b6104b0334b5427d07a3464ecffbfda64068c2d7ea6c230ba9040eebaec2030d19884f9f815ab793bd836fdb9c142a7aa9510939e2d3b5e6f57fa56f5464911bd939ca0ab0a1c19407fc9b1b974b94401f7c82bce0926bd5"}, 0x20) 2018/03/31 09:08:14 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xf, 0x5, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x80000000}, [@map={0x18, 0x1, 0x1, 0x0, 0x1}], {0x95}}, &(0x7f0000000040)='syzkaller\x00', 0x3, 0x10, &(0x7f0000000080)=""/16, 0x41000, 0x2f3100a785778bd1}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000001c0)={r0, 0x50, &(0x7f0000000140)}, 0x10) close(r0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000780)={&(0x7f0000000240)=@ax25, 0x80, &(0x7f0000000600)=[{&(0x7f00000002c0)=""/114, 0x72}, {&(0x7f0000000340)=""/133, 0x85}, {&(0x7f0000000400)=""/23, 0x17}, {&(0x7f0000000440)=""/59, 0x3b}, {&(0x7f0000000480)=""/114, 0x72}, {&(0x7f0000000500)=""/45, 0x2d}, {&(0x7f0000000540)=""/83, 0x53}, {&(0x7f00000005c0)}], 0x8, &(0x7f0000000680)=""/214, 0xd6, 0x100}, 0x40) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000007c0)={0xffffffffffffffff}) recvmsg(r2, &(0x7f00000019c0)={&(0x7f0000000800)=@ax25, 0x80, &(0x7f00000018c0)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000001880)=""/18, 0x12}], 0x2, &(0x7f0000001900)=""/184, 0xb8, 0x3}, 0x1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001a80)={r4, 0x50, &(0x7f0000001a00)}, 0x10) r5 = perf_event_open(&(0x7f0000001b00)={0x2, 0x70, 0x6, 0x8, 0x80000000, 0x10001, 0x0, 0x7ff, 0x4, 0xa, 0x200, 0x20, 0x72, 0x5, 0x0, 0x0, 0x5, 0x8f, 0x9ed, 0xff, 0x0, 0xa58, 0x7f, 0xf2f, 0x4503, 0x6, 0x81, 0x5, 0x1ff, 0xffffffff00000000, 0x2, 0x5, 0x9000000000000, 0xfffffffffffffffa, 0x8, 0x10001, 0x731ab510, 0x9, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000001ac0), 0x1}, 0x80, 0x2b4, 0x200, 0x3, 0x6, 0x9, 0x4}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0x20000) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000001b80)) r6 = getpid() r7 = perf_event_open(&(0x7f0000001c00)={0x1, 0x70, 0x0, 0xfff, 0x4, 0x80000000, 0x0, 0x3, 0x40, 0xa, 0x7, 0x7, 0x7, 0x4800000000000000, 0x7, 0x6, 0x62b, 0x8, 0x9, 0x100000000, 0x1, 0x0, 0x5, 0xd199, 0x1f, 0x10000, 0xff80000000000000, 0x3, 0x4, 0x8, 0x80000001, 0x8000, 0x7fff, 0x4, 0x16, 0x7, 0x40, 0x8, 0x0, 0x5, 0x50031dd1e89e26d1, @perf_bp={&(0x7f0000001bc0), 0x2}, 0x10000, 0x3a, 0x80000001, 0x1, 0x2c, 0x3ff, 0x6}, r6, 0x6, r3, 0x3) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000001c80)=r0, 0x4) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000001cc0)) ioctl$PERF_EVENT_IOC_REFRESH(r7, 0x2402, 0xffffffff) r8 = perf_event_open(&(0x7f0000001d00)={0x0, 0x70, 0x7, 0x400, 0x100, 0xac, 0x0, 0x100000000, 0xc2800, 0xa, 0x33e3, 0x2, 0x10001, 0x8, 0x5, 0x100000001, 0x2e9, 0x2, 0xc1, 0xf2, 0x2, 0x9, 0xffff, 0x7, 0x1, 0x0, 0x8000, 0x800, 0xfffffffffffffffa, 0x40, 0x0, 0x3, 0x6, 0xfa4, 0x7, 0xffffffffffff8000, 0x0, 0x0, 0x0, 0x8000, 0x3, @perf_config_ext={0x400}, 0x100, 0xa264, 0x4, 0x7, 0x2, 0x1000, 0x92}, r6, 0x5, r7, 0x1) socketpair(0x7, 0x6, 0x1, &(0x7f0000001d80)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000001e00)={&(0x7f0000001dc0)='./file0\x00', r9}, 0x10) r10 = perf_event_open(&(0x7f0000001e40)={0x4, 0x70, 0x5, 0x4, 0x8, 0x6, 0x0, 0x2, 0x1425, 0xb, 0x0, 0xcc9, 0x400, 0x57f90db4, 0x80000000, 0x7, 0x1000, 0x0, 0x8, 0x8000, 0xffffffff, 0x400, 0x1, 0x6, 0x40, 0x2, 0x10000, 0x8, 0x9, 0xfffffffffffffff8, 0x9, 0x4, 0x3, 0x400, 0x3, 0x9, 0x3, 0x100, 0x0, 0x6, 0x0, @perf_config_ext={0x4, 0x2}, 0x20, 0x3ff, 0x0, 0x7, 0x3, 0x5, 0xfa5e}, r6, 0xd, r7, 0x2) bpf$OBJ_GET_MAP(0x7, &(0x7f0000001f00)={&(0x7f0000001ec0)='./file0\x00'}, 0x10) socketpair$inet6_sctp(0xa, 0x0, 0x84, &(0x7f0000001f40)) ioctl$PERF_EVENT_IOC_DISABLE(r10, 0x2401, 0xbad) r11 = perf_event_open(&(0x7f0000001fc0)={0x3, 0x70, 0xff, 0x2f, 0x2, 0x7, 0x0, 0x40, 0x80000, 0x1, 0x8, 0x6, 0xfffffffffffffffb, 0x7, 0x2, 0x10000, 0x6, 0x5, 0x0, 0x10, 0x6, 0xc58, 0x7f, 0x3, 0x2, 0x3, 0x5, 0x80000000800000, 0x7, 0xfff, 0x16, 0x2b65, 0x9, 0x69244395, 0x10000, 0x4, 0x9, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000001f80), 0x8}, 0x100, 0x8, 0x51b4, 0x4, 0x800, 0xb7, 0x4800}, r6, 0x8, r8, 0x1) r12 = gettid() socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000002040)) perf_event_open(&(0x7f0000002080)={0x0, 0x70, 0x100, 0x0, 0x2, 0x401, 0x0, 0x6, 0x1, 0x6, 0x656, 0x5, 0xfffffffffffff973, 0xffffffffffffffff, 0x9, 0x7, 0x3, 0x3ff, 0x1c000000, 0x10000, 0x6, 0x20, 0x6, 0x1, 0x1, 0x4, 0x2, 0x20, 0x9, 0xed5, 0x847, 0x1000, 0x0, 0x0, 0x102bed3b, 0x9, 0x7fffffff, 0x6, 0x0, 0x24, 0x0, @perf_config_ext={0x100000001, 0x6}, 0x200, 0x800000010000000, 0x7, 0x7, 0x1000, 0xf3, 0xe87}, r12, 0xf, r11, 0x8) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000002100)) perf_event_open(&(0x7f0000002180)={0x4, 0x70, 0x0, 0x8, 0xff, 0x0, 0x0, 0xfffffffffffffff9, 0x10001, 0x0, 0xffffffffffffff00, 0x93eb, 0x1, 0x4e5e, 0x8001, 0xfffffffffffffff8, 0x7, 0x1f4, 0x80000001, 0x99b, 0x4, 0x8, 0xed8, 0x3f, 0xec9, 0x6, 0x1, 0x4ab8, 0x8, 0x2, 0xdd, 0x9, 0xffffffffffffffff, 0x8000, 0x0, 0x6, 0xffff, 0x8, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000002140), 0xf}, 0x400, 0x5, 0x7, 0x4, 0x7, 0x4}, r12, 0x3, r7, 0x8) 2018/03/31 09:08:14 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000a40)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x0, 0x0) socketpair(0x2, 0x0, 0x0, &(0x7f0000000640)={0xffffffffffffffff}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r6 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x0, 0x10000, 0x1182, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f00000009c0)={r4}) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000280)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000a00)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg(r3, &(0x7f0000000cc0)={&(0x7f0000000400)=@ethernet={0x1}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000580)="4589496d6a3bfcccae07dc729c52ee6bdf10d9cf221f605c25f790103018703b9a67491f96c3f9f8d07204ee4adf21acce1afdaedaba1228b4d33c3fa702a46b1329a0e52eea6a7908fd375ace47", 0x4e}], 0x1, &(0x7f0000000700), 0x0, 0x40000}, 0x4044080) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000740)={r5, &(0x7f0000000700)="ec1b815b5cc95d6e0dff859791e3341b"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") close(0xffffffffffffffff) 2018/03/31 09:08:14 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x5, 0x100000000209e20, 0x8000000001}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x13, 0x0, 0x7ffff9, 0x0, 0x20000003, 0x0}, 0x2c) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x13, 0x0, 0x7ffff9, 0x0, 0x20000003, 0x0}, 0x2c) 2018/03/31 09:08:14 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x5, 0x100000000209e20, 0x8000000001, 0x5}, 0x2c) r1 = bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x13, 0x0, 0x7ffff9, 0x0, 0x20000003, 0x0}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xe, 0x0, 0x7f, 0x3e83, 0x8, r1, 0x80000000}, 0x2c) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x50, &(0x7f0000000140)={0x0, 0x0}}, 0x10) socket$kcm(0x29, 0x2, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) socketpair(0x4, 0x1, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r3, 0x2401, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000480)={r4, &(0x7f0000000440)="3068306ef4a0ff8256b6430a042a9b"}, 0x10) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40042409, 0x1) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r3) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x0, 0x8, 0x0, 0x0, r0, 0x6}, 0x2c) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)) perf_event_open(&(0x7f000025c000)={0x5, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = gettid() r6 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0xfff, 0x100000001, 0xfffffffffffffffb, 0x0, 0x8001, 0x0, 0x1, 0x0, 0xfffffffffffffff9, 0x0, 0x9, 0x9, 0x5, 0x8, 0x1, 0x8106, 0x0, 0x14000000000, 0x80000000, 0x1, 0x5, 0x0, 0x40, 0x2839, 0x1d, 0x800, 0x7, 0x0, 0x0, 0x5, 0x7, 0x0, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x4}, 0x0, 0x0, 0xff, 0x0, 0x3, 0x8, 0x3}, r5, 0x2, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=r2, 0x4) mount(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='minix\x00', 0x8000, &(0x7f0000000580)="710d6bc7ed39fb8ec5b77927c925e149c70d88cb77854dd13f0589a62ffd878ccb4d2a964bd8b3caf09359b9c450fd21e0776d464145ab582a24db71a6d1d36633b61540fadebda8b66b15c1550ab999cf48a9233f8c841482438c36ab09bf30009d01e54c7bfd0b722c49ec2332cbaae222347169db05d975ac805d3a46c8a18f10bfb1") perf_event_open(&(0x7f00000003c0)={0x7, 0x70, 0x7fff, 0x5, 0x6, 0x8000, 0x0, 0x1000, 0x0, 0x7, 0x1000, 0x1, 0xffffffff, 0x3, 0xaf99, 0x40, 0x8001, 0xfffffffffffffffa, 0x1, 0x80000000, 0xe6d1, 0x4, 0x8001, 0x9, 0x1f, 0xfffffffffffffc00, 0x0, 0x0, 0x7ff, 0x15ac000000000000, 0x0, 0x3, 0x1, 0xfffffffffffffffe, 0x9, 0xff, 0x1, 0x2, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000002c0), 0x8}, 0x0, 0x3, 0x6, 0x1, 0x5, 0xb03c, 0x5}, r5, 0xc, r6, 0xb) bpf$MAP_CREATE(0x0, &(0x7f0000000640)={0x8, 0x6bcb8e63, 0x0, 0x59ad, 0x12, r0, 0x8001}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000880)={r0, &(0x7f0000000840), &(0x7f00000008c0)=""/70}, 0x375) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000280)={0xffffffffffffffff, 0xffffff8f, &(0x7f0000000300)}, 0x10) 2018/03/31 09:08:14 executing program 1 (fault-call:20 fault-nth:8): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)={0xffffffffffffffff}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x0, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r5 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f00000009c0)={r4}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg(r3, &(0x7f0000000cc0)={&(0x7f0000000400)=@ethernet={0x1}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000580)="4589496d6a3bfcccae07dc729c52ee6bdf10d9cf221f605c25f790103018703b9a67491f96c3f9f8d07204ee4adf21acce1afdaedaba1228b4d33c3fa702a46b1329a0e52eea6a7908fd375ace47", 0x4e}], 0x1, &(0x7f0000000700), 0x0, 0x40000}, 0x4044080) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000740)={0xffffffffffffffff, &(0x7f0000000700)="ec1b815b5cc95d6e0dff859791e3341b8790dcb187f25418f8003a2b3bf345dc"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") close(0xffffffffffffffff) 2018/03/31 09:08:14 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x0, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r7 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) ioctl$PERF_EVENT_IOC_RESET(r5, 0x2403, 0x2) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f00000009c0)={r4}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r7, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg(r3, &(0x7f0000000cc0)={&(0x7f0000000400)=@ethernet={0x1}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000580)="4589496d6a3bfcccae07dc729c52ee6bdf10d9cf221f605c25f790103018703b9a67491f96c3f9f8d07204ee4adf21acce1afdaedaba1228b4d33c3fa702a46b1329a0e52eea6a7908fd375ace47", 0x4e}], 0x1, &(0x7f0000000700), 0x0, 0x40000}, 0x4044080) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000280)={r6, &(0x7f0000000700)="ec1b815b5cc95d6e0dff859791e3341b"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)={0x3, 0x40000100, 0x56c96e7a, 0xea, 0x1, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") close(0xffffffffffffffff) 2018/03/31 09:08:14 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x5, 0x0, 0x0, 0x5}, 0x2c) r1 = bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x13, 0x0, 0x0, 0x0, 0x20000003, 0x0}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x3e83, 0x8, r1}, 0x2c) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x50, &(0x7f0000000140)={0x0, 0x0}}, 0x10) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, r2, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) socketpair(0x4, 0x1, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000480)={r5, &(0x7f0000000440)="3068306ef4a0ff8256b6430a042a9b"}, 0x10) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x0, 0x8, 0x0, 0x0, r0, 0x6}, 0x2c) socketpair(0x8, 0x2, 0x0, &(0x7f0000000040)) r6 = gettid() bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=r3, 0x4) perf_event_open(&(0x7f00000003c0)={0x7, 0x70, 0x7fff, 0x5, 0x6, 0x8000, 0x0, 0x1000, 0x0, 0x7, 0x1000, 0x1, 0xffffffff, 0x3, 0xaf99, 0x40, 0x8001, 0xfffffffffffffffa, 0x1, 0x80000000, 0xe6d1, 0x4, 0x8001, 0x9, 0x1f, 0xfffffffffffffc00, 0x0, 0x0, 0x7ff, 0x15ac000000000000, 0x0, 0x3, 0x0, 0xfffffffffffffffe, 0x9, 0xff, 0x1, 0x2, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000002c0), 0x8}, 0x8004, 0x3, 0x6, 0x1, 0x5, 0xb03c, 0x5}, r6, 0xc, 0xffffffffffffffff, 0xb) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000280)={0xffffffffffffffff, 0xffffff8f, &(0x7f0000000300)}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000600)={0xffffffffffffffff, &(0x7f00000004c0)="648d1c6e4e7374f62b21f1c71a7cd05c41e2a0bf36f2f23f5761a39646321c3b5e4e670bd9a8f7a3fc36d594c1799d7dec6f0ba644a16abd532529ac63497998169000b2e491e82f659738895262b6fc9c79d8e6736c91136937b9", &(0x7f0000000540)="0c39cf9403045550ce39840a2a90ca20bc744608140dcd6c55d855533bb97417ef0cd19e1990bf245f0f38ab76b7f283d20500e75742ca4151b5489f5848a6b6104b0334b5427d07a3464ecffbfda64068c2d7ea6c230ba9040eebaec2030d19884f9f815ab793bd836fdb9c142a7aa9510939e2d3b5e6f57fa56f5464911bd939ca0ab0a1c19407fc9b1b974b94401f7c82bce0926bd5"}, 0x20) 2018/03/31 09:08:14 executing program 7: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)={0xffffffffffffffff}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x0, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r5 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x0, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f00000009c0)={r4}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg(r3, &(0x7f0000000cc0)={&(0x7f0000000400)=@ethernet={0x1}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000580)="4589496d6a3bfcccae07dc729c52ee6bdf10d9cf221f605c25f790103018703b9a67491f96c3f9f8d07204ee4adf21acce1afdaedaba1228b4d33c3fa702a46b1329a0e52eea6a7908fd375ace47", 0x4e}], 0x1, &(0x7f0000000700), 0x0, 0x40000}, 0x4044080) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000740)={0xffffffffffffffff, &(0x7f0000000700)="ec1b815b5cc95d6e0dff859791e3341b8790dcb187f25418f8003a2b3bf345"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dc") close(0xffffffffffffffff) 2018/03/31 09:08:14 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000a40)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x0, 0x0) socketpair(0x2, 0x0, 0x0, &(0x7f0000000640)={0xffffffffffffffff}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r6 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x0, 0x10000, 0x1182, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f00000009c0)={r4}) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000280)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000a00)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg(r3, &(0x7f0000000cc0)={&(0x7f0000000400)=@ethernet={0x1}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000580)="4589496d6a3bfcccae07dc729c52ee6bdf10d9cf221f605c25f790103018703b9a67491f96c3f9f8d07204ee4adf21acce1afdaedaba1228b4d33c3fa702a46b1329a0e52eea6a7908fd375ace47", 0x4e}], 0x1, &(0x7f0000000700), 0x0, 0x40000}, 0x4044080) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000740)={r5, &(0x7f0000000700)="ec1b815b5cc95d6e0dff859791e3341b"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") close(0xffffffffffffffff) 2018/03/31 09:08:14 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xf, 0x5, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x80000000}, [@map={0x18, 0x1, 0x1, 0x0, 0x1}], {0x95}}, &(0x7f0000000040)='syzkaller\x00', 0x3, 0x10, &(0x7f0000000080)=""/16, 0x41000, 0x2f3100a785778bd1}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000001c0)={r0, 0x50, &(0x7f0000000140)}, 0x10) close(r0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000780)={&(0x7f0000000240)=@ax25, 0x80, &(0x7f0000000600)=[{&(0x7f00000002c0)=""/114, 0x72}, {&(0x7f0000000340)=""/133, 0x85}, {&(0x7f0000000400)=""/23, 0x17}, {&(0x7f0000000440)=""/59, 0x3b}, {&(0x7f0000000480)=""/114, 0x72}, {&(0x7f0000000500)=""/45, 0x2d}, {&(0x7f0000000540)=""/83, 0x53}, {&(0x7f00000005c0)}], 0x8, &(0x7f0000000680)=""/214, 0xd6, 0x100}, 0x40) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000007c0)={0xffffffffffffffff}) recvmsg(r2, &(0x7f00000019c0)={&(0x7f0000000800)=@ax25, 0x80, &(0x7f00000018c0)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000001880)=""/18, 0x12}], 0x2, &(0x7f0000001900)=""/184, 0xb8, 0x3}, 0x1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001a80)={r4, 0x50, &(0x7f0000001a00)}, 0x10) r5 = perf_event_open(&(0x7f0000001b00)={0x2, 0x70, 0x6, 0x8, 0x80000000, 0x10001, 0x0, 0x7ff, 0x4, 0xa, 0x200, 0x20, 0x72, 0x5, 0x0, 0x0, 0x5, 0x8f, 0x9ed, 0xff, 0x0, 0xa58, 0x7f, 0xf2f, 0x4503, 0x6, 0x81, 0x5, 0x1ff, 0xffffffff00000000, 0x2, 0x5, 0x9000000000000, 0xfffffffffffffffa, 0x8, 0x10001, 0x731ab510, 0x9, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000001ac0), 0x1}, 0x80, 0x2b4, 0x200, 0x3, 0x6, 0x9, 0x4}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0x20000) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000001b80)) r6 = getpid() r7 = perf_event_open(&(0x7f0000001c00)={0x1, 0x70, 0x0, 0xfff, 0x4, 0x80000000, 0x0, 0x3, 0x40, 0xa, 0x7, 0x7, 0x7, 0x4800000000000000, 0x7, 0x6, 0x62b, 0x8, 0x9, 0x100000000, 0x1, 0x0, 0x5, 0xd199, 0x1f, 0x10000, 0xff80000000000000, 0x3, 0x4, 0x8, 0x80000001, 0x8000, 0x7fff, 0x4, 0x16, 0x7, 0x40, 0x8, 0x0, 0x5, 0x50031dd1e89e26d1, @perf_bp={&(0x7f0000001bc0), 0x2}, 0x10000, 0x3a, 0x80000001, 0x1, 0x2c, 0x3ff, 0x6}, r6, 0x6, r3, 0x3) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000001c80)=r0, 0x4) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000001cc0)) ioctl$PERF_EVENT_IOC_REFRESH(r7, 0x2402, 0xffffffff) r8 = perf_event_open(&(0x7f0000001d00)={0x0, 0x70, 0x7, 0x400, 0x100, 0xac, 0x0, 0x100000000, 0xc2800, 0xa, 0x33e3, 0x2, 0x10001, 0x8, 0x5, 0x100000001, 0x2e9, 0x2, 0xc1, 0xf2, 0x2, 0x9, 0xffff, 0x7, 0x1, 0x0, 0x8000, 0x800, 0xfffffffffffffffa, 0x40, 0x0, 0x3, 0x6, 0xfa4, 0x7, 0xffffffffffff8000, 0x0, 0x0, 0x0, 0x8000, 0x3, @perf_config_ext={0x400}, 0x100, 0xa264, 0x4, 0x7, 0x2, 0x1000, 0x92}, r6, 0x5, r7, 0x1) socketpair(0x7, 0x6, 0x1, &(0x7f0000001d80)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000001e00)={&(0x7f0000001dc0)='./file0\x00', r9}, 0x10) r10 = perf_event_open(&(0x7f0000001e40)={0x4, 0x70, 0x5, 0x4, 0x8, 0x6, 0x0, 0x2, 0x1425, 0xb, 0x0, 0xcc9, 0x400, 0x57f90db4, 0x80000000, 0x7, 0x1000, 0x0, 0x8, 0x8000, 0xffffffff, 0x400, 0x1, 0x6, 0x40, 0x2, 0x10000, 0x8, 0x9, 0xfffffffffffffff8, 0x9, 0x4, 0x3, 0x400, 0x3, 0x9, 0x3, 0x100, 0x0, 0x6, 0x0, @perf_config_ext={0x4, 0x2}, 0x20, 0x3ff, 0x0, 0x7, 0x3, 0x5, 0xfa5e}, r6, 0xd, r7, 0x2) bpf$OBJ_GET_MAP(0x7, &(0x7f0000001f00)={&(0x7f0000001ec0)='./file0\x00'}, 0x10) socketpair$inet6_sctp(0xa, 0x0, 0x84, &(0x7f0000001f40)) ioctl$PERF_EVENT_IOC_DISABLE(r10, 0x2401, 0xbad) r11 = perf_event_open(&(0x7f0000001fc0)={0x3, 0x70, 0xff, 0x2f, 0x2, 0x7, 0x0, 0x40, 0x80000, 0x1, 0x8, 0x6, 0xfffffffffffffffb, 0x7, 0x2, 0x10000, 0x6, 0x5, 0x0, 0x10, 0x6, 0xc58, 0x7f, 0x3, 0x2, 0x3, 0x5, 0x80000000800000, 0x7, 0xfff, 0x16, 0x2b65, 0x9, 0x69244395, 0x10000, 0x4, 0x9, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000001f80), 0x8}, 0x100, 0x8, 0x51b4, 0x4, 0x800, 0xb7, 0x4800}, r6, 0x8, r8, 0x1) r12 = gettid() socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000002040)) perf_event_open(&(0x7f0000002080)={0x0, 0x70, 0x100, 0x0, 0x2, 0x401, 0x0, 0x6, 0x1, 0x6, 0x656, 0x5, 0xfffffffffffff973, 0xffffffffffffffff, 0x9, 0x7, 0x3, 0x3ff, 0x1c000000, 0x10000, 0x6, 0x20, 0x6, 0x1, 0x1, 0x4, 0x2, 0x20, 0x9, 0xed5, 0x847, 0x1000, 0x0, 0x0, 0x102bed3b, 0x9, 0x7fffffff, 0x6, 0x0, 0x24, 0x0, @perf_config_ext={0x100000001, 0x6}, 0x200, 0x800000010000000, 0x7, 0x7, 0x1000, 0xf3, 0xe87}, r12, 0xf, r11, 0x8) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000002100)) perf_event_open(&(0x7f0000002180)={0x4, 0x70, 0x0, 0x8, 0xff, 0x0, 0x0, 0xfffffffffffffff9, 0x10001, 0x0, 0xffffffffffffff00, 0x93eb, 0x1, 0x4e5e, 0x8001, 0xfffffffffffffff8, 0x7, 0x1f4, 0x80000001, 0x99b, 0x4, 0x8, 0xed8, 0x3f, 0xec9, 0x6, 0x1, 0x4ab8, 0x8, 0x2, 0xdd, 0x9, 0xffffffffffffffff, 0x8000, 0x0, 0x6, 0xffff, 0x8, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000002140), 0xf}, 0x400, 0x5, 0x7, 0x4, 0x7, 0x4}, r12, 0x3, r7, 0x8) 2018/03/31 09:08:14 executing program 7: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)={0xffffffffffffffff}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x0, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r5 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x0, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f00000009c0)={r4}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg(r3, &(0x7f0000000cc0)={&(0x7f0000000400)=@ethernet={0x1}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000580)="4589496d6a3bfcccae07dc729c52ee6bdf10d9cf221f605c25f790103018703b9a67491f96c3f9f8d07204ee4adf21acce1afdaedaba1228b4d33c3fa702a46b1329a0e52eea6a7908fd375ace47", 0x4e}], 0x1, &(0x7f0000000700), 0x0, 0x40000}, 0x4044080) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000740)={0xffffffffffffffff, &(0x7f0000000700)="ec1b815b5cc95d6e0dff859791e3341b8790dcb187f25418f8003a2b3bf345"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c741") close(0xffffffffffffffff) 2018/03/31 09:08:14 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x5, 0x100000000209e20, 0x8000000001}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x13, 0x0, 0x7ffff9, 0x0, 0x20000003, 0x0}, 0x2c) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x13, 0x0, 0x7ffff9, 0x0, 0x20000003, 0x0}, 0x2c) 2018/03/31 09:08:14 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x5, 0x0, 0x0, 0x5}, 0x2c) r1 = bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x13, 0x0, 0x0, 0x0, 0x20000003, 0x0}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x3e83, 0x8, r1}, 0x2c) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x50, &(0x7f0000000140)={0x0, 0x0}}, 0x10) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, r2, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) socketpair(0x4, 0x1, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000480)={r5, &(0x7f0000000440)="3068306ef4a0ff8256b6430a042a9b"}, 0x10) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x0, 0x8, 0x0, 0x0, r0, 0x6}, 0x2c) socketpair(0x8, 0x2, 0x0, &(0x7f0000000040)) r6 = gettid() bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=r3, 0x4) perf_event_open(&(0x7f00000003c0)={0x7, 0x70, 0x7fff, 0x5, 0x6, 0x8000, 0x0, 0x1000, 0x0, 0x7, 0x1000, 0x1, 0xffffffff, 0x3, 0xaf99, 0x40, 0x8001, 0xfffffffffffffffa, 0x1, 0x80000000, 0xe6d1, 0x4, 0x8001, 0x9, 0x1f, 0xfffffffffffffc00, 0x0, 0x0, 0x7ff, 0x15ac000000000000, 0x0, 0x3, 0x0, 0xfffffffffffffffe, 0x9, 0xff, 0x1, 0x2, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000002c0), 0x8}, 0x8004, 0x3, 0x6, 0x1, 0x5, 0xb03c, 0x5}, r6, 0xc, 0xffffffffffffffff, 0xb) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000280)={0xffffffffffffffff, 0xffffff8f, &(0x7f0000000300)}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000600)={0xffffffffffffffff, &(0x7f00000004c0)="648d1c6e4e7374f62b21f1c71a7cd05c41e2a0bf36f2f23f5761a39646321c3b5e4e670bd9a8f7a3fc36d594c1799d7dec6f0ba644a16abd532529ac63497998169000b2e491e82f659738895262b6fc9c79d8e6736c91136937b9", &(0x7f0000000540)="0c39cf9403045550ce39840a2a90ca20bc744608140dcd6c55d855533bb97417ef0cd19e1990bf245f0f38ab76b7f283d20500e75742ca4151b5489f5848a6b6104b0334b5427d07a3464ecffbfda64068c2d7ea6c230ba9040eebaec2030d19884f9f815ab793bd836fdb9c142a7aa9510939e2d3b5e6f57fa56f5464911bd939ca0ab0a1c19407fc9b1b974b94401f7c82bce0926bd5"}, 0x20) 2018/03/31 09:08:14 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x0, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r7 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) ioctl$PERF_EVENT_IOC_RESET(r5, 0x2403, 0x2) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f00000009c0)={r4}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r7, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg(r3, &(0x7f0000000cc0)={&(0x7f0000000400)=@ethernet={0x1}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000580)="4589496d6a3bfcccae07dc729c52ee6bdf10d9cf221f605c25f790103018703b9a67491f96c3f9f8d07204ee4adf21acce1afdaedaba1228b4d33c3fa702a46b1329a0e52eea6a7908fd375ace47", 0x4e}], 0x1, &(0x7f0000000700), 0x0, 0x40000}, 0x4044080) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000280)={r6, &(0x7f0000000700)="ec1b815b5cc95d6e0dff859791e3341b"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)={0x3, 0x40000100, 0x56c96e7a, 0xea, 0x1, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") close(0xffffffffffffffff) [ 354.137707] FAULT_INJECTION: forcing a failure. [ 354.137707] name failslab, interval 1, probability 0, space 0, times 0 [ 354.149320] CPU: 1 PID: 9748 Comm: syz-executor1 Not tainted 4.16.0-rc6+ #43 [ 354.156516] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 354.165874] Call Trace: [ 354.168467] dump_stack+0x194/0x24d [ 354.172100] ? arch_local_irq_restore+0x53/0x53 [ 354.176773] ? kernel_text_address+0xd1/0xe0 [ 354.181177] ? __unwind_start+0x169/0x330 [ 354.185316] should_fail+0x8c0/0xa40 [ 354.189014] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 354.194114] ? kasan_kmalloc+0xad/0xe0 [ 354.197981] ? __kmalloc+0x162/0x760 [ 354.201673] ? __list_lru_init+0xcf/0x750 [ 354.205805] ? find_held_lock+0x35/0x1d0 [ 354.209850] ? __lock_is_held+0xb6/0x140 [ 354.213901] ? check_same_owner+0x320/0x320 [ 354.218208] ? rcu_note_context_switch+0x710/0x710 [ 354.223126] should_failslab+0xec/0x120 [ 354.227081] kmem_cache_alloc_node_trace+0x5a/0x760 [ 354.232077] ? mark_held_locks+0xaf/0x100 [ 354.236204] ? __raw_spin_lock_init+0x1c/0x100 [ 354.240772] __kmalloc_node+0x33/0x70 [ 354.244556] kvmalloc_node+0x99/0xd0 [ 354.248251] __list_lru_init+0x5d5/0x750 [ 354.252302] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 354.258174] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 354.263179] ? __lockdep_init_map+0xe4/0x650 [ 354.267573] ? lockdep_init_map+0x9/0x10 [ 354.271618] sget_userns+0x691/0xe40 [ 354.275312] ? set_anon_super+0x20/0x20 [ 354.279268] ? put_filp+0x90/0x90 [ 354.282706] ? destroy_unused_super.part.6+0xd0/0xd0 [ 354.287788] ? alloc_vfsmnt+0x762/0x9c0 [ 354.291744] ? path_lookupat+0x238/0xba0 [ 354.295788] ? mnt_free_id.isra.21+0x50/0x50 [ 354.300181] ? trace_hardirqs_off+0x10/0x10 [ 354.304486] ? putname+0xee/0x130 [ 354.307922] ? cap_capable+0x1b5/0x230 [ 354.311795] ? security_capable+0x8e/0xc0 [ 354.315928] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 354.321097] ? ns_capable_common+0xcf/0x160 [ 354.325399] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 354.330569] mount_ns+0x6d/0x190 [ 354.333920] rpc_mount+0x9e/0xd0 [ 354.337270] mount_fs+0x66/0x2d0 [ 354.340621] vfs_kern_mount.part.26+0xc6/0x4a0 [ 354.345186] ? may_umount+0xa0/0xa0 [ 354.348793] ? _raw_read_unlock+0x22/0x30 [ 354.352922] ? __get_fs_type+0x8a/0xc0 [ 354.356792] do_mount+0xea4/0x2bb0 [ 354.360313] ? __might_fault+0x110/0x1d0 [ 354.364359] ? copy_mount_string+0x40/0x40 [ 354.368574] ? __check_object_size+0x8b/0x530 [ 354.373056] ? __might_sleep+0x95/0x190 [ 354.377022] ? kasan_check_write+0x14/0x20 [ 354.381241] ? _copy_from_user+0x99/0x110 [ 354.385373] ? memdup_user+0x5e/0x90 [ 354.389065] ? copy_mount_options+0x1f7/0x2e0 [ 354.393545] SyS_mount+0xab/0x120 [ 354.396975] ? copy_mnt_ns+0xb30/0xb30 [ 354.400845] do_syscall_64+0x281/0x940 [ 354.404712] ? vmalloc_sync_all+0x30/0x30 [ 354.408840] ? _raw_spin_unlock_irq+0x27/0x70 [ 354.413318] ? finish_task_switch+0x1c1/0x7e0 [ 354.417795] ? syscall_return_slowpath+0x550/0x550 [ 354.422704] ? syscall_return_slowpath+0x2ac/0x550 [ 354.427613] ? prepare_exit_to_usermode+0x350/0x350 [ 354.432622] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 354.437969] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 354.442804] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 354.447974] RIP: 0033:0x454e79 [ 354.451143] RSP: 002b:00007fed74635c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 354.458834] RAX: ffffffffffffffda RBX: 00007fed746366d4 RCX: 0000000000454e79 [ 354.466083] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 354.473332] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 354.480579] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000016 2018/03/31 09:08:15 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x5, 0x100000000209e20, 0x8000000001, 0x5}, 0x2c) r1 = bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x13, 0x0, 0x7ffff9, 0x0, 0x20000003, 0x0}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xe, 0x0, 0x7f, 0x3e83, 0x8, r1, 0x80000000}, 0x2c) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x50, &(0x7f0000000140)={0x0, 0x0}}, 0x10) socket$kcm(0x29, 0x2, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) socketpair(0x4, 0x1, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r3, 0x2401, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x8, 0x100000000, 0x2, 0x7, 0x10, 0xffffffffffffffff, 0xfffffffffffffeff}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000480)={r4, &(0x7f0000000440)="3068306ef4a0ff8256b6430a042a9b"}, 0x10) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40042409, 0x1) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r3) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x0, 0x8, 0x0, 0x0, r0, 0x6}, 0x2c) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)) perf_event_open(&(0x7f000025c000)={0x5, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = gettid() r6 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0xfff, 0x100000001, 0xfffffffffffffffb, 0x0, 0x8001, 0x0, 0x1, 0x0, 0xfffffffffffffff9, 0x0, 0x9, 0x9, 0x5, 0x8, 0x1, 0x8106, 0x0, 0x14000000000, 0x80000000, 0x1, 0x5, 0x0, 0x40, 0x2839, 0x1d, 0x800, 0x7, 0x0, 0x0, 0x5, 0x7, 0x0, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x4}, 0x0, 0x0, 0xff, 0x0, 0x3, 0x8, 0x3}, r5, 0x2, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=r2, 0x4) perf_event_open(&(0x7f00000003c0)={0x7, 0x70, 0x7fff, 0x5, 0x6, 0x8000, 0x0, 0x1000, 0x0, 0x7, 0x1000, 0x1, 0xffffffff, 0x3, 0xaf99, 0x40, 0x8001, 0xfffffffffffffffa, 0x1, 0x80000000, 0xe6d1, 0x4, 0x8001, 0x9, 0x1f, 0xfffffffffffffc00, 0x0, 0x0, 0x7ff, 0x15ac000000000000, 0x0, 0x3, 0x1, 0xfffffffffffffffe, 0x9, 0xff, 0x1, 0x2, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000002c0), 0x8}, 0x0, 0x3, 0x6, 0x1, 0x5, 0xb03c, 0x5}, r5, 0xc, r6, 0xb) bpf$MAP_CREATE(0x0, &(0x7f0000000640)={0x8, 0x6bcb8e63, 0x0, 0x59ad, 0x12, r0, 0x8001}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000880)={r0, &(0x7f0000000840), &(0x7f00000008c0)=""/70}, 0x375) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000280)={0xffffffffffffffff, 0xffffff8f, &(0x7f0000000300)}, 0x10) 2018/03/31 09:08:15 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x5, 0x100000000209e20, 0x8000000001}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x13, 0x0, 0x7ffff9, 0x0, 0x20000003, 0x0}, 0x2c) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x13, 0x0, 0x7ffff9, 0x0, 0x20000003, 0x0}, 0x2c) [ 354.487825] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000008 2018/03/31 09:08:15 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xf, 0x5, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x80000000}, [@map={0x18, 0x1, 0x1, 0x0, 0x1}], {0x95}}, &(0x7f0000000040)='syzkaller\x00', 0x3, 0x10, &(0x7f0000000080)=""/16, 0x41000, 0x2f3100a785778bd1}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000001c0)={r0, 0x50, &(0x7f0000000140)}, 0x10) close(r0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000780)={&(0x7f0000000240)=@ax25, 0x80, &(0x7f0000000600)=[{&(0x7f00000002c0)=""/114, 0x72}, {&(0x7f0000000340)=""/133, 0x85}, {&(0x7f0000000400)=""/23, 0x17}, {&(0x7f0000000440)=""/59, 0x3b}, {&(0x7f0000000480)=""/114, 0x72}, {&(0x7f0000000500)=""/45, 0x2d}, {&(0x7f0000000540)=""/83, 0x53}, {&(0x7f00000005c0)}], 0x8, &(0x7f0000000680)=""/214, 0xd6, 0x100}, 0x40) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000007c0)={0xffffffffffffffff}) recvmsg(r2, &(0x7f00000019c0)={&(0x7f0000000800)=@ax25, 0x80, &(0x7f00000018c0)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000001880)=""/18, 0x12}], 0x2, &(0x7f0000001900)=""/184, 0xb8, 0x3}, 0x1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001a80)={r4, 0x50, &(0x7f0000001a00)}, 0x10) r5 = perf_event_open(&(0x7f0000001b00)={0x2, 0x70, 0x6, 0x8, 0x80000000, 0x10001, 0x0, 0x7ff, 0x4, 0xa, 0x200, 0x20, 0x72, 0x5, 0x0, 0x0, 0x5, 0x8f, 0x9ed, 0xff, 0x0, 0xa58, 0x7f, 0xf2f, 0x4503, 0x6, 0x81, 0x5, 0x1ff, 0xffffffff00000000, 0x2, 0x5, 0x9000000000000, 0xfffffffffffffffa, 0x8, 0x10001, 0x731ab510, 0x9, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000001ac0), 0x1}, 0x80, 0x2b4, 0x200, 0x3, 0x6, 0x9, 0x4}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0x20000) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000001b80)) r6 = getpid() r7 = perf_event_open(&(0x7f0000001c00)={0x1, 0x70, 0x0, 0xfff, 0x4, 0x80000000, 0x0, 0x3, 0x40, 0xa, 0x7, 0x7, 0x7, 0x4800000000000000, 0x7, 0x6, 0x62b, 0x8, 0x9, 0x100000000, 0x1, 0x0, 0x5, 0xd199, 0x1f, 0x10000, 0xff80000000000000, 0x3, 0x4, 0x8, 0x80000001, 0x8000, 0x7fff, 0x4, 0x16, 0x7, 0x40, 0x8, 0x0, 0x5, 0x50031dd1e89e26d1, @perf_bp={&(0x7f0000001bc0), 0x2}, 0x10000, 0x3a, 0x80000001, 0x1, 0x2c, 0x3ff, 0x6}, r6, 0x6, r3, 0x3) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000001c80)=r0, 0x4) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000001cc0)) ioctl$PERF_EVENT_IOC_REFRESH(r7, 0x2402, 0xffffffff) r8 = perf_event_open(&(0x7f0000001d00)={0x0, 0x70, 0x7, 0x400, 0x100, 0xac, 0x0, 0x100000000, 0xc2800, 0xa, 0x33e3, 0x2, 0x10001, 0x8, 0x5, 0x100000001, 0x2e9, 0x2, 0xc1, 0xf2, 0x2, 0x9, 0xffff, 0x7, 0x1, 0x0, 0x8000, 0x800, 0xfffffffffffffffa, 0x40, 0x0, 0x3, 0x6, 0xfa4, 0x7, 0xffffffffffff8000, 0x0, 0x0, 0x0, 0x8000, 0x3, @perf_config_ext={0x400}, 0x100, 0xa264, 0x4, 0x7, 0x2, 0x1000, 0x92}, r6, 0x5, r7, 0x1) socketpair(0x7, 0x6, 0x1, &(0x7f0000001d80)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000001e00)={&(0x7f0000001dc0)='./file0\x00', r9}, 0x10) r10 = perf_event_open(&(0x7f0000001e40)={0x4, 0x70, 0x5, 0x4, 0x8, 0x6, 0x0, 0x2, 0x1425, 0xb, 0x0, 0xcc9, 0x400, 0x57f90db4, 0x80000000, 0x7, 0x1000, 0x0, 0x8, 0x8000, 0xffffffff, 0x400, 0x1, 0x6, 0x40, 0x2, 0x10000, 0x8, 0x9, 0xfffffffffffffff8, 0x9, 0x4, 0x3, 0x400, 0x3, 0x9, 0x3, 0x100, 0x0, 0x6, 0x0, @perf_config_ext={0x4, 0x2}, 0x20, 0x3ff, 0x0, 0x7, 0x3, 0x5, 0xfa5e}, r6, 0xd, r7, 0x2) bpf$OBJ_GET_MAP(0x7, &(0x7f0000001f00)={&(0x7f0000001ec0)='./file0\x00'}, 0x10) socketpair$inet6_sctp(0xa, 0x0, 0x84, &(0x7f0000001f40)) ioctl$PERF_EVENT_IOC_DISABLE(r10, 0x2401, 0xbad) r11 = perf_event_open(&(0x7f0000001fc0)={0x3, 0x70, 0xff, 0x2f, 0x2, 0x7, 0x0, 0x40, 0x80000, 0x1, 0x8, 0x6, 0xfffffffffffffffb, 0x7, 0x2, 0x10000, 0x6, 0x5, 0x0, 0x10, 0x6, 0xc58, 0x7f, 0x3, 0x2, 0x3, 0x5, 0x80000000800000, 0x7, 0xfff, 0x16, 0x2b65, 0x9, 0x69244395, 0x10000, 0x4, 0x9, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000001f80), 0x8}, 0x100, 0x8, 0x51b4, 0x4, 0x800, 0xb7, 0x4800}, r6, 0x8, r8, 0x1) r12 = gettid() socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000002040)) perf_event_open(&(0x7f0000002080)={0x0, 0x70, 0x100, 0x0, 0x2, 0x401, 0x0, 0x6, 0x1, 0x6, 0x656, 0x5, 0xfffffffffffff973, 0xffffffffffffffff, 0x9, 0x7, 0x3, 0x3ff, 0x1c000000, 0x10000, 0x6, 0x20, 0x6, 0x1, 0x1, 0x4, 0x2, 0x20, 0x9, 0xed5, 0x847, 0x1000, 0x0, 0x0, 0x102bed3b, 0x9, 0x7fffffff, 0x6, 0x0, 0x24, 0x0, @perf_config_ext={0x100000001, 0x6}, 0x200, 0x800000010000000, 0x7, 0x7, 0x1000, 0xf3, 0xe87}, r12, 0xf, r11, 0x8) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000002100)) perf_event_open(&(0x7f0000002180)={0x4, 0x70, 0x0, 0x8, 0xff, 0x0, 0x0, 0xfffffffffffffff9, 0x10001, 0x3, 0x0, 0x93eb, 0x1, 0x4e5e, 0x8001, 0xfffffffffffffff8, 0x7, 0x1f4, 0x80000001, 0x99b, 0x4, 0x8, 0xed8, 0x3f, 0xec9, 0x6, 0x1, 0x4ab8, 0x8, 0x2, 0xdd, 0x9, 0xffffffffffffffff, 0x8000, 0x0, 0x6, 0xffff, 0x8, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000002140), 0xf}, 0x400, 0x5, 0x7, 0x4, 0x7, 0x4}, r12, 0x3, r7, 0x8) 2018/03/31 09:08:15 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x5, 0x0, 0x0, 0x5}, 0x2c) r1 = bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x13, 0x0, 0x0, 0x0, 0x20000003, 0x0}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x3e83, 0x8, r1}, 0x2c) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x50, &(0x7f0000000140)={0x0, 0x0}}, 0x10) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, r2, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) socketpair(0x4, 0x1, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000480)={r5, &(0x7f0000000440)="3068306ef4a0ff8256b6430a042a9b"}, 0x10) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x0, 0x8, 0x0, 0x0, r0, 0x6}, 0x2c) socketpair(0x8, 0x2, 0x0, &(0x7f0000000040)) r6 = gettid() bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=r3, 0x4) perf_event_open(&(0x7f00000003c0)={0x7, 0x70, 0x7fff, 0x5, 0x6, 0x8000, 0x0, 0x1000, 0x0, 0x7, 0x1000, 0x1, 0xffffffff, 0x3, 0xaf99, 0x40, 0x8001, 0xfffffffffffffffa, 0x1, 0x80000000, 0xe6d1, 0x4, 0x8001, 0x9, 0x1f, 0xfffffffffffffc00, 0x0, 0x0, 0x7ff, 0x15ac000000000000, 0x0, 0x3, 0x0, 0xfffffffffffffffe, 0x9, 0xff, 0x1, 0x2, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000002c0), 0x8}, 0x8004, 0x3, 0x6, 0x1, 0x5, 0xb03c, 0x5}, r6, 0xc, 0xffffffffffffffff, 0xb) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000280)={0xffffffffffffffff, 0xffffff8f, &(0x7f0000000300)}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000600)={0xffffffffffffffff, &(0x7f00000004c0)="648d1c6e4e7374f62b21f1c71a7cd05c41e2a0bf36f2f23f5761a39646321c3b5e4e670bd9a8f7a3fc36d594c1799d7dec6f0ba644a16abd532529ac63497998169000b2e491e82f659738895262b6fc9c79d8e6736c91136937b9", &(0x7f0000000540)="0c39cf9403045550ce39840a2a90ca20bc744608140dcd6c55d855533bb97417ef0cd19e1990bf245f0f38ab76b7f283d20500e75742ca4151b5489f5848a6b6104b0334b5427d07a3464ecffbfda64068c2d7ea6c230ba9040eebaec2030d19884f9f815ab793bd836fdb9c142a7aa9510939e2d3b5e6f57fa56f5464911bd939ca0ab0a1c19407fc9b1b974b94401f7c82bce0926bd5"}, 0x20) 2018/03/31 09:08:15 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000a40)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x0, 0x0) socketpair(0x2, 0x0, 0x0, &(0x7f0000000640)={0xffffffffffffffff}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r6 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x0, 0x10000, 0x1182, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f00000009c0)={r4}) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000280)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000a00)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg(r3, &(0x7f0000000cc0)={&(0x7f0000000400)=@ethernet={0x1}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000580)="4589496d6a3bfcccae07dc729c52ee6bdf10d9cf221f605c25f790103018703b9a67491f96c3f9f8d07204ee4adf21acce1afdaedaba1228b4d33c3fa702a46b1329a0e52eea6a7908fd375ace47", 0x4e}], 0x1, &(0x7f0000000700), 0x0, 0x40000}, 0x4044080) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000740)={r5, &(0x7f0000000700)="ec1b815b5cc95d6e0dff859791e3341b"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") close(0xffffffffffffffff) 2018/03/31 09:08:15 executing program 1 (fault-call:20 fault-nth:9): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)={0xffffffffffffffff}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x0, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r5 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f00000009c0)={r4}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg(r3, &(0x7f0000000cc0)={&(0x7f0000000400)=@ethernet={0x1}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000580)="4589496d6a3bfcccae07dc729c52ee6bdf10d9cf221f605c25f790103018703b9a67491f96c3f9f8d07204ee4adf21acce1afdaedaba1228b4d33c3fa702a46b1329a0e52eea6a7908fd375ace47", 0x4e}], 0x1, &(0x7f0000000700), 0x0, 0x40000}, 0x4044080) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000740)={0xffffffffffffffff, &(0x7f0000000700)="ec1b815b5cc95d6e0dff859791e3341b8790dcb187f25418f8003a2b3bf345dc"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") close(0xffffffffffffffff) 2018/03/31 09:08:15 executing program 7: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)={0xffffffffffffffff}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x0, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r5 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x0, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f00000009c0)={r4}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg(r3, &(0x7f0000000cc0)={&(0x7f0000000400)=@ethernet={0x1}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000580)="4589496d6a3bfcccae07dc729c52ee6bdf10d9cf221f605c25f790103018703b9a67491f96c3f9f8d07204ee4adf21acce1afdaedaba1228b4d33c3fa702a46b1329a0e52eea6a7908fd375ace47", 0x4e}], 0x1, &(0x7f0000000700), 0x0, 0x40000}, 0x4044080) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000740)={0xffffffffffffffff, &(0x7f0000000700)="ec1b815b5cc95d6e0dff859791e3341b8790dcb187f25418f8003a2b3bf345"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c741") close(0xffffffffffffffff) 2018/03/31 09:08:15 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x0, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r7 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) ioctl$PERF_EVENT_IOC_RESET(r5, 0x2403, 0x2) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f00000009c0)={r4}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r7, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) ioctl$PERF_EVENT_IOC_RESET(r4, 0x2403, 0x2) sendmsg(r3, &(0x7f0000000cc0)={&(0x7f0000000400)=@ethernet={0x1}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000580)="4589496d6a3bfcccae07dc729c52ee6bdf10d9cf221f605c25f790103018703b9a67491f96c3f9f8d07204ee4adf21acce1afdaedaba1228b4d33c3fa702a46b1329a0e52eea6a7908fd375ace47", 0x4e}], 0x1, &(0x7f0000000700), 0x0, 0x40000}, 0x4044080) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000280)={r6, &(0x7f0000000700)="ec1b815b5cc95d6e0dff859791e3341b"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)={0x3, 0x40000100, 0x56c96e7a, 0xea, 0x1, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") close(0xffffffffffffffff) [ 354.679420] FAULT_INJECTION: forcing a failure. [ 354.679420] name failslab, interval 1, probability 0, space 0, times 0 [ 354.690720] CPU: 0 PID: 9782 Comm: syz-executor1 Not tainted 4.16.0-rc6+ #43 [ 354.697915] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 354.707263] Call Trace: [ 354.709842] dump_stack+0x194/0x24d [ 354.713450] ? arch_local_irq_restore+0x53/0x53 [ 354.718109] should_fail+0x8c0/0xa40 [ 354.721806] ? is_bpf_text_address+0xa4/0x120 [ 354.726281] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 354.731363] ? __kernel_text_address+0xd/0x40 [ 354.735838] ? unwind_get_return_address+0x61/0xa0 [ 354.740760] ? find_held_lock+0x35/0x1d0 [ 354.744807] ? __lock_is_held+0xb6/0x140 [ 354.748867] ? check_same_owner+0x320/0x320 [ 354.753178] ? rcu_note_context_switch+0x710/0x710 [ 354.758099] should_failslab+0xec/0x120 [ 354.762056] kmem_cache_alloc_trace+0x4b/0x740 [ 354.766616] ? __kmalloc_node+0x33/0x70 [ 354.770570] ? __kmalloc_node+0x33/0x70 [ 354.774527] ? rcu_read_lock_sched_held+0x108/0x120 [ 354.779530] __memcg_init_list_lru_node+0x169/0x270 [ 354.784527] ? list_lru_add+0x7c0/0x7c0 [ 354.788480] ? __kmalloc_node+0x47/0x70 [ 354.792438] __list_lru_init+0x544/0x750 [ 354.796483] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 354.802349] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 354.807345] ? __lockdep_init_map+0xe4/0x650 [ 354.811737] ? lockdep_init_map+0x9/0x10 [ 354.815780] sget_userns+0x691/0xe40 [ 354.819473] ? set_anon_super+0x20/0x20 [ 354.823430] ? put_filp+0x90/0x90 [ 354.826864] ? destroy_unused_super.part.6+0xd0/0xd0 [ 354.831949] ? alloc_vfsmnt+0x762/0x9c0 [ 354.835902] ? path_lookupat+0x238/0xba0 [ 354.839944] ? mnt_free_id.isra.21+0x50/0x50 [ 354.844334] ? trace_hardirqs_off+0x10/0x10 [ 354.848638] ? putname+0xee/0x130 [ 354.852077] ? cap_capable+0x1b5/0x230 [ 354.855947] ? security_capable+0x8e/0xc0 [ 354.860078] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 354.865250] ? ns_capable_common+0xcf/0x160 [ 354.869551] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 354.874719] mount_ns+0x6d/0x190 [ 354.878069] rpc_mount+0x9e/0xd0 [ 354.881417] mount_fs+0x66/0x2d0 [ 354.884777] vfs_kern_mount.part.26+0xc6/0x4a0 [ 354.889340] ? may_umount+0xa0/0xa0 [ 354.892945] ? _raw_read_unlock+0x22/0x30 [ 354.897072] ? __get_fs_type+0x8a/0xc0 [ 354.900956] do_mount+0xea4/0x2bb0 [ 354.904476] ? __might_fault+0x110/0x1d0 [ 354.908521] ? copy_mount_string+0x40/0x40 [ 354.912738] ? __check_object_size+0x8b/0x530 [ 354.917217] ? __might_sleep+0x95/0x190 [ 354.921178] ? kasan_check_write+0x14/0x20 [ 354.925394] ? _copy_from_user+0x99/0x110 [ 354.929524] ? memdup_user+0x5e/0x90 [ 354.933218] ? copy_mount_options+0x1f7/0x2e0 [ 354.937695] SyS_mount+0xab/0x120 [ 354.941131] ? copy_mnt_ns+0xb30/0xb30 [ 354.945000] do_syscall_64+0x281/0x940 [ 354.948874] ? vmalloc_sync_all+0x30/0x30 [ 354.953001] ? trace_event_raw_event_sys_exit+0x260/0x260 [ 354.958521] ? syscall_return_slowpath+0x550/0x550 [ 354.963428] ? syscall_return_slowpath+0x2ac/0x550 [ 354.968340] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 354.973688] ? trace_hardirqs_off_thunk+0x1a/0x1c 2018/03/31 09:08:15 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x5, 0x100000000209e20, 0x8000000001, 0x5}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x0, 0x0, 0x7ffff9, 0x0, 0x20000003, 0x0}, 0x2c) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x13, 0x0, 0x7ffff9, 0x0, 0x20000003, 0x0}, 0x2c) [ 354.978515] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 354.983682] RIP: 0033:0x454e79 [ 354.986850] RSP: 002b:00007fed74635c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 354.994536] RAX: ffffffffffffffda RBX: 00007fed746366d4 RCX: 0000000000454e79 [ 355.001783] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 355.009036] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 355.016286] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000016 [ 355.023532] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000009 2018/03/31 09:08:15 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xf, 0x5, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x80000000}, [@map={0x18, 0x1, 0x1, 0x0, 0x1}], {0x95}}, &(0x7f0000000040)='syzkaller\x00', 0x3, 0x10, &(0x7f0000000080)=""/16, 0x41000, 0x2f3100a785778bd1}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000001c0)={r0, 0x50, &(0x7f0000000140)}, 0x10) close(r0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000780)={&(0x7f0000000240)=@ax25, 0x80, &(0x7f0000000600)=[{&(0x7f00000002c0)=""/114, 0x72}, {&(0x7f0000000340)=""/133, 0x85}, {&(0x7f0000000400)=""/23, 0x17}, {&(0x7f0000000440)=""/59, 0x3b}, {&(0x7f0000000480)=""/114, 0x72}, {&(0x7f0000000500)=""/45, 0x2d}, {&(0x7f0000000540)=""/83, 0x53}, {&(0x7f00000005c0)}], 0x8, &(0x7f0000000680)=""/214, 0xd6, 0x100}, 0x40) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000007c0)={0xffffffffffffffff}) recvmsg(r2, &(0x7f00000019c0)={&(0x7f0000000800)=@ax25, 0x80, &(0x7f00000018c0)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000001880)=""/18, 0x12}], 0x2, &(0x7f0000001900)=""/184, 0xb8, 0x3}, 0x1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001a80)={r4, 0x50, &(0x7f0000001a00)}, 0x10) r5 = perf_event_open(&(0x7f0000001b00)={0x2, 0x70, 0x6, 0x8, 0x80000000, 0x10001, 0x0, 0x7ff, 0x4, 0xa, 0x200, 0x20, 0x72, 0x5, 0x0, 0x0, 0x5, 0x8f, 0x9ed, 0xff, 0x0, 0xa58, 0x7f, 0xf2f, 0x4503, 0x6, 0x81, 0x5, 0x1ff, 0xffffffff00000000, 0x2, 0x5, 0x9000000000000, 0xfffffffffffffffa, 0x8, 0x10001, 0x731ab510, 0x9, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000001ac0), 0x1}, 0x80, 0x2b4, 0x200, 0x3, 0x6, 0x9, 0x4}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0x20000) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000001b80)) r6 = getpid() r7 = perf_event_open(&(0x7f0000001c00)={0x1, 0x70, 0x0, 0xfff, 0x4, 0x80000000, 0x0, 0x3, 0x40, 0xa, 0x7, 0x7, 0x7, 0x4800000000000000, 0x7, 0x6, 0x62b, 0x8, 0x9, 0x100000000, 0x1, 0x0, 0x5, 0xd199, 0x1f, 0x10000, 0xff80000000000000, 0x3, 0x4, 0x8, 0x80000001, 0x8000, 0x7fff, 0x4, 0x16, 0x7, 0x40, 0x8, 0x0, 0x5, 0x50031dd1e89e26d1, @perf_bp={&(0x7f0000001bc0), 0x2}, 0x10000, 0x3a, 0x80000001, 0x1, 0x2c, 0x3ff, 0x6}, r6, 0x6, r3, 0x3) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000001c80)=r0, 0x4) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000001cc0)) ioctl$PERF_EVENT_IOC_REFRESH(r7, 0x2402, 0xffffffff) r8 = perf_event_open(&(0x7f0000001d00)={0x0, 0x70, 0x7, 0x400, 0x100, 0xac, 0x0, 0x100000000, 0xc2800, 0xa, 0x33e3, 0x2, 0x10001, 0x8, 0x5, 0x100000001, 0x2e9, 0x2, 0xc1, 0xf2, 0x2, 0x9, 0xffff, 0x7, 0x1, 0x0, 0x8000, 0x800, 0xfffffffffffffffa, 0x40, 0x0, 0x3, 0x6, 0xfa4, 0x7, 0xffffffffffff8000, 0x0, 0x0, 0x0, 0x8000, 0x3, @perf_config_ext={0x400}, 0x100, 0xa264, 0x4, 0x7, 0x2, 0x1000, 0x92}, r6, 0x5, r7, 0x1) socketpair(0x7, 0x6, 0x1, &(0x7f0000001d80)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000001e00)={&(0x7f0000001dc0)='./file0\x00', r9}, 0x10) r10 = perf_event_open(&(0x7f0000001e40)={0x4, 0x70, 0x5, 0x4, 0x8, 0x6, 0x0, 0x2, 0x1425, 0xb, 0x0, 0xcc9, 0x400, 0x57f90db4, 0x80000000, 0x7, 0x1000, 0x0, 0x8, 0x8000, 0xffffffff, 0x400, 0x1, 0x6, 0x40, 0x2, 0x10000, 0x8, 0x9, 0xfffffffffffffff8, 0x9, 0x4, 0x3, 0x400, 0x3, 0x9, 0x3, 0x100, 0x0, 0x6, 0x0, @perf_config_ext={0x4, 0x2}, 0x20, 0x3ff, 0x0, 0x7, 0x3, 0x5, 0xfa5e}, r6, 0xd, r7, 0x2) bpf$OBJ_GET_MAP(0x7, &(0x7f0000001f00)={&(0x7f0000001ec0)='./file0\x00'}, 0x10) socketpair$inet6_sctp(0xa, 0x0, 0x84, &(0x7f0000001f40)) ioctl$PERF_EVENT_IOC_DISABLE(r10, 0x2401, 0xbad) r11 = perf_event_open(&(0x7f0000001fc0)={0x3, 0x70, 0xff, 0x2f, 0x2, 0x7, 0x0, 0x40, 0x80000, 0x1, 0x8, 0x6, 0xfffffffffffffffb, 0x7, 0x2, 0x10000, 0x6, 0x5, 0x0, 0x10, 0x6, 0xc58, 0x7f, 0x3, 0x2, 0x3, 0x5, 0x80000000800000, 0x7, 0xfff, 0x16, 0x2b65, 0x9, 0x69244395, 0x10000, 0x4, 0x9, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000001f80), 0x8}, 0x100, 0x8, 0x51b4, 0x4, 0x800, 0xb7, 0x4800}, r6, 0x8, r8, 0x1) r12 = gettid() socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000002040)) perf_event_open(&(0x7f0000002080)={0x0, 0x70, 0x100, 0x0, 0x2, 0x401, 0x0, 0x6, 0x1, 0x6, 0x656, 0x5, 0xfffffffffffff973, 0xffffffffffffffff, 0x9, 0x7, 0x3, 0x3ff, 0x1c000000, 0x10000, 0x6, 0x20, 0x6, 0x1, 0x1, 0x4, 0x2, 0x20, 0x9, 0xed5, 0x847, 0x1000, 0x0, 0x0, 0x102bed3b, 0x9, 0x7fffffff, 0x6, 0x0, 0x24, 0x0, @perf_config_ext={0x100000001, 0x6}, 0x200, 0x800000010000000, 0x7, 0x7, 0x1000, 0xf3, 0xe87}, r12, 0xf, r11, 0x8) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000002100)) perf_event_open(&(0x7f0000002180)={0x4, 0x70, 0x0, 0x8, 0xff, 0x0, 0x0, 0xfffffffffffffff9, 0x10001, 0x3, 0x0, 0x93eb, 0x1, 0x4e5e, 0x8001, 0xfffffffffffffff8, 0x7, 0x1f4, 0x80000001, 0x99b, 0x4, 0x8, 0xed8, 0x3f, 0xec9, 0x6, 0x1, 0x4ab8, 0x8, 0x2, 0xdd, 0x9, 0xffffffffffffffff, 0x8000, 0x0, 0x6, 0xffff, 0x8, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000002140), 0xf}, 0x400, 0x5, 0x7, 0x4, 0x7, 0x4}, r12, 0x3, r7, 0x8) 2018/03/31 09:08:15 executing program 7: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)={0xffffffffffffffff}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x0, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r5 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x0, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f00000009c0)={r4}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg(r3, &(0x7f0000000cc0)={&(0x7f0000000400)=@ethernet={0x1}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000580)="4589496d6a3bfcccae07dc729c52ee6bdf10d9cf221f605c25f790103018703b9a67491f96c3f9f8d07204ee4adf21acce1afdaedaba1228b4d33c3fa702a46b1329a0e52eea6a7908fd375ace47", 0x4e}], 0x1, &(0x7f0000000700), 0x0, 0x40000}, 0x4044080) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000740)={0xffffffffffffffff, &(0x7f0000000700)="ec1b815b5cc95d6e0dff859791e3341b8790dcb187f25418f8003a2b3bf345"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c741") close(0xffffffffffffffff) 2018/03/31 09:08:15 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x5, 0x100000000209e20, 0x8000000001, 0x5}, 0x2c) r1 = bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x13, 0x0, 0x7ffff9, 0x0, 0x20000003, 0x0}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xe, 0x0, 0x7f, 0x3e83, 0x8, r1, 0x80000000}, 0x2c) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x50, &(0x7f0000000140)={0x0, 0x0}}, 0x10) socket$kcm(0x29, 0x2, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) socketpair(0x4, 0x1, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r3, 0x2401, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000480)={r4, &(0x7f0000000440)="3068306ef4a0ff8256b6430a042a9b"}, 0x10) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40042409, 0x1) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r3) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x0, 0x8, 0x0, 0x0, r0, 0x6}, 0x2c) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x5, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r7 = gettid() r8 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0xfff, 0x100000001, 0xfffffffffffffffb, 0x0, 0x8001, 0x0, 0x1, 0x0, 0xfffffffffffffff9, 0x0, 0x9, 0x9, 0x5, 0x8, 0x1, 0x8106, 0x0, 0x14000000000, 0x80000000, 0x1, 0x5, 0x0, 0x40, 0x2839, 0x1d, 0x800, 0x7, 0x0, 0x0, 0x5, 0x7, 0x0, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x4}, 0x0, 0x0, 0xff, 0x0, 0x3, 0x8, 0x3}, r7, 0x2, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=r2, 0x4) perf_event_open(&(0x7f00000003c0)={0x7, 0x70, 0x7fff, 0x5, 0x6, 0x8000, 0x0, 0x1000, 0x0, 0x7, 0x1000, 0x1, 0xffffffff, 0x3, 0xaf99, 0x40, 0x8001, 0xfffffffffffffffa, 0x1, 0x80000000, 0xe6d1, 0x4, 0x8001, 0x9, 0x1f, 0xfffffffffffffc00, 0x0, 0x0, 0x7ff, 0x15ac000000000000, 0x0, 0x3, 0x1, 0xfffffffffffffffe, 0x9, 0xff, 0x1, 0x2, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000002c0), 0x8}, 0x0, 0x3, 0x6, 0x1, 0x5, 0xb03c, 0x5}, r7, 0xc, r8, 0xb) bpf$MAP_CREATE(0x0, &(0x7f0000000640)={0x8, 0x6bcb8e63, 0x0, 0x59ad, 0x12, r0, 0x8001}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={r6, 0x28, &(0x7f0000000540)={0x0, 0x0}}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000600)={r5, &(0x7f0000000680)="a27f74b8a64a8b4c10502e7ed19783752c5b5fd77213dd05d9a254c1ad840299a1f336f56b1dc71bdbf507c1bf05f381806c4c1e6b7555eedc5e5589a63bc1b1459f462eef1aac5f5d29b6e7a9228a5311e3eea7e3fca32260f05900875b45299e44e8d4799a203db989a99b902b53e10033cbf308224ec87b22e4547a", &(0x7f0000000700)="01baf4725da03417e6438b1eaeac3c92741b45f73a5ac2605bcab29d88dffe3d1d351042999660fa626e48bcd0bc3761e9a70387f8b7d7d19831c96c2f29c15200767d0e333ebe7e23e41e8665d88f7552f39a8aae67b7242f9d89921f7d2d155697278b417c56366c185dc71e43a052178e5eeb8512b7bd364fd7f541ae31b1e5a7b6b2bddce30757c9b11a1868b6c8dfdc5a15e547127d395f", 0x2}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000005c0)={r9, 0x0, 0x10}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000880)={r0, &(0x7f0000000840), &(0x7f00000004c0)=""/70}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000280)={0xffffffffffffffff, 0xffffff8f, &(0x7f0000000300)}, 0x10) 2018/03/31 09:08:15 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x5, 0x0, 0x0, 0x5}, 0x2c) r1 = bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x13, 0x0, 0x0, 0x0, 0x20000003, 0x0}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x3e83, 0x8, r1}, 0x2c) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x50, &(0x7f0000000140)={0x0, 0x0}}, 0x10) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, r2, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) socketpair(0x4, 0x1, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000480)={r5, &(0x7f0000000440)="3068306ef4a0ff8256b6430a042a9b"}, 0x10) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x0, 0x8, 0x0, 0x0, r0, 0x6}, 0x2c) socketpair(0x8, 0x2, 0x0, &(0x7f0000000040)) r6 = gettid() bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=r3, 0x4) perf_event_open(&(0x7f00000003c0)={0x7, 0x70, 0x7fff, 0x5, 0x6, 0x8000, 0x0, 0x1000, 0x0, 0x7, 0x1000, 0x1, 0xffffffff, 0x3, 0xaf99, 0x40, 0x8001, 0xfffffffffffffffa, 0x1, 0x80000000, 0xe6d1, 0x4, 0x8001, 0x9, 0x1f, 0xfffffffffffffc00, 0x0, 0x0, 0x7ff, 0x15ac000000000000, 0x0, 0x3, 0x1, 0x0, 0x9, 0xff, 0x1, 0x2, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000002c0), 0x8}, 0x8004, 0x3, 0x6, 0x1, 0x5, 0xb03c, 0x5}, r6, 0xc, 0xffffffffffffffff, 0xb) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000280)={0xffffffffffffffff, 0xffffff8f, &(0x7f0000000300)}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000600)={0xffffffffffffffff, &(0x7f00000004c0)="648d1c6e4e7374f62b21f1c71a7cd05c41e2a0bf36f2f23f5761a39646321c3b5e4e670bd9a8f7a3fc36d594c1799d7dec6f0ba644a16abd532529ac63497998169000b2e491e82f659738895262b6fc9c79d8e6736c91136937b9", &(0x7f0000000540)="0c39cf9403045550ce39840a2a90ca20bc744608140dcd6c55d855533bb97417ef0cd19e1990bf245f0f38ab76b7f283d20500e75742ca4151b5489f5848a6b6104b0334b5427d07a3464ecffbfda64068c2d7ea6c230ba9040eebaec2030d19884f9f815ab793bd836fdb9c142a7aa9510939e2d3b5e6f57fa56f5464911bd939ca0ab0a1c19407fc9b1b974b94401f7c82bce0926bd5"}, 0x20) 2018/03/31 09:08:15 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x5, 0x100000000209e20, 0x8000000001, 0x5}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x0, 0x0, 0x7ffff9, 0x0, 0x20000003, 0x0}, 0x2c) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x13, 0x0, 0x7ffff9, 0x0, 0x20000003, 0x0}, 0x2c) 2018/03/31 09:08:15 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x0, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r7 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) ioctl$PERF_EVENT_IOC_RESET(r5, 0x2403, 0x2) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f00000009c0)={r4}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r7, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) ioctl$PERF_EVENT_IOC_RESET(r4, 0x2403, 0x2) sendmsg(r3, &(0x7f0000000cc0)={&(0x7f0000000400)=@ethernet={0x1}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000580)="4589496d6a3bfcccae07dc729c52ee6bdf10d9cf221f605c25f790103018703b9a67491f96c3f9f8d07204ee4adf21acce1afdaedaba1228b4d33c3fa702a46b1329a0e52eea6a7908fd375ace47", 0x4e}], 0x1, &(0x7f0000000700), 0x0, 0x40000}, 0x4044080) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000280)={r6, &(0x7f0000000700)="ec1b815b5cc95d6e0dff859791e3341b"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)={0x3, 0x40000100, 0x56c96e7a, 0xea, 0x1, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") close(0xffffffffffffffff) 2018/03/31 09:08:15 executing program 1 (fault-call:20 fault-nth:10): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)={0xffffffffffffffff}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x0, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r5 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f00000009c0)={r4}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg(r3, &(0x7f0000000cc0)={&(0x7f0000000400)=@ethernet={0x1}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000580)="4589496d6a3bfcccae07dc729c52ee6bdf10d9cf221f605c25f790103018703b9a67491f96c3f9f8d07204ee4adf21acce1afdaedaba1228b4d33c3fa702a46b1329a0e52eea6a7908fd375ace47", 0x4e}], 0x1, &(0x7f0000000700), 0x0, 0x40000}, 0x4044080) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000740)={0xffffffffffffffff, &(0x7f0000000700)="ec1b815b5cc95d6e0dff859791e3341b8790dcb187f25418f8003a2b3bf345dc"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") close(0xffffffffffffffff) 2018/03/31 09:08:15 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000a40)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x0, 0x0) socketpair(0x2, 0x0, 0x0, &(0x7f0000000640)={0xffffffffffffffff}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r6 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x0, 0x10000, 0x1182, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f00000009c0)={r4}) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000280)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000a00)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg(r3, &(0x7f0000000cc0)={&(0x7f0000000400)=@ethernet={0x1}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000580)="4589496d6a3bfcccae07dc729c52ee6bdf10d9cf221f605c25f790103018703b9a67491f96c3f9f8d07204ee4adf21acce1afdaedaba1228b4d33c3fa702a46b1329a0e52eea6a7908fd375ace47", 0x4e}], 0x1, &(0x7f0000000700), 0x0, 0x40000}, 0x4044080) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000740)={r5, &(0x7f0000000700)="ec1b815b5cc95d6e0dff859791e3341b8790dcb187f25418"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") close(0xffffffffffffffff) [ 355.316797] FAULT_INJECTION: forcing a failure. [ 355.316797] name failslab, interval 1, probability 0, space 0, times 0 [ 355.328180] CPU: 0 PID: 9826 Comm: syz-executor1 Not tainted 4.16.0-rc6+ #43 [ 355.335372] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 355.344720] Call Trace: [ 355.347297] dump_stack+0x194/0x24d [ 355.350906] ? arch_local_irq_restore+0x53/0x53 [ 355.355562] should_fail+0x8c0/0xa40 [ 355.359262] ? is_bpf_text_address+0xa4/0x120 [ 355.363740] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 355.368820] ? __kernel_text_address+0xd/0x40 [ 355.373296] ? unwind_get_return_address+0x61/0xa0 [ 355.378216] ? find_held_lock+0x35/0x1d0 [ 355.382259] ? __lock_is_held+0xb6/0x140 [ 355.386310] ? check_same_owner+0x320/0x320 [ 355.390613] ? rcu_note_context_switch+0x710/0x710 [ 355.395526] should_failslab+0xec/0x120 [ 355.399482] kmem_cache_alloc_trace+0x4b/0x740 [ 355.404045] ? __kmalloc_node+0x33/0x70 [ 355.408001] ? __kmalloc_node+0x33/0x70 [ 355.411960] ? rcu_read_lock_sched_held+0x108/0x120 [ 355.416960] __memcg_init_list_lru_node+0x169/0x270 [ 355.421959] ? list_lru_add+0x7c0/0x7c0 [ 355.425919] ? __kmalloc_node+0x47/0x70 [ 355.429877] __list_lru_init+0x544/0x750 [ 355.433927] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 355.439795] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 355.444792] ? __lockdep_init_map+0xe4/0x650 [ 355.449184] ? lockdep_init_map+0x9/0x10 [ 355.453226] sget_userns+0x691/0xe40 [ 355.456919] ? set_anon_super+0x20/0x20 [ 355.460876] ? put_filp+0x90/0x90 [ 355.464312] ? destroy_unused_super.part.6+0xd0/0xd0 [ 355.469397] ? alloc_vfsmnt+0x762/0x9c0 [ 355.473350] ? path_lookupat+0x238/0xba0 [ 355.477389] ? mnt_free_id.isra.21+0x50/0x50 [ 355.481781] ? trace_hardirqs_off+0x10/0x10 [ 355.486086] ? putname+0xee/0x130 [ 355.489522] ? cap_capable+0x1b5/0x230 [ 355.493395] ? security_capable+0x8e/0xc0 [ 355.497526] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 355.502696] ? ns_capable_common+0xcf/0x160 [ 355.506999] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 355.512172] mount_ns+0x6d/0x190 [ 355.515521] rpc_mount+0x9e/0xd0 [ 355.518870] mount_fs+0x66/0x2d0 [ 355.522218] vfs_kern_mount.part.26+0xc6/0x4a0 [ 355.526791] ? may_umount+0xa0/0xa0 [ 355.530399] ? _raw_read_unlock+0x22/0x30 [ 355.534525] ? __get_fs_type+0x8a/0xc0 [ 355.538397] do_mount+0xea4/0x2bb0 [ 355.541916] ? __might_fault+0x110/0x1d0 [ 355.545961] ? copy_mount_string+0x40/0x40 [ 355.550179] ? __check_object_size+0x8b/0x530 [ 355.554659] ? __might_sleep+0x95/0x190 [ 355.558618] ? kasan_check_write+0x14/0x20 [ 355.562831] ? _copy_from_user+0x99/0x110 [ 355.566963] ? memdup_user+0x5e/0x90 [ 355.570654] ? copy_mount_options+0x1f7/0x2e0 [ 355.575132] SyS_mount+0xab/0x120 [ 355.578564] ? copy_mnt_ns+0xb30/0xb30 [ 355.582432] do_syscall_64+0x281/0x940 [ 355.586307] ? vmalloc_sync_all+0x30/0x30 [ 355.590433] ? _raw_spin_unlock_irq+0x27/0x70 [ 355.594907] ? finish_task_switch+0x1c1/0x7e0 [ 355.599383] ? syscall_return_slowpath+0x550/0x550 [ 355.605333] ? syscall_return_slowpath+0x2ac/0x550 [ 355.610241] ? prepare_exit_to_usermode+0x350/0x350 [ 355.615235] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 355.620582] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 355.625409] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 355.630577] RIP: 0033:0x454e79 [ 355.633744] RSP: 002b:00007fed74635c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 355.641434] RAX: ffffffffffffffda RBX: 00007fed746366d4 RCX: 0000000000454e79 [ 355.648684] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 355.655933] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 2018/03/31 09:08:16 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x5, 0x0, 0x0, 0x5}, 0x2c) r1 = bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x13, 0x0, 0x0, 0x0, 0x20000003, 0x0}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x3e83, 0x8, r1}, 0x2c) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x50, &(0x7f0000000140)={0x0, 0x0}}, 0x10) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, r2, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) socketpair(0x4, 0x1, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000480)={r5, &(0x7f0000000440)="3068306ef4a0ff8256b6430a042a9b"}, 0x10) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x0, 0x8, 0x0, 0x0, r0, 0x6}, 0x2c) socketpair(0x8, 0x2, 0x0, &(0x7f0000000040)) r6 = gettid() bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=r3, 0x4) perf_event_open(&(0x7f00000003c0)={0x7, 0x70, 0x7fff, 0x5, 0x6, 0x8000, 0x0, 0x1000, 0x0, 0x7, 0x1000, 0x1, 0xffffffff, 0x3, 0xaf99, 0x40, 0x8001, 0xfffffffffffffffa, 0x1, 0x80000000, 0xe6d1, 0x4, 0x8001, 0x9, 0x1f, 0xfffffffffffffc00, 0x0, 0x0, 0x7ff, 0x15ac000000000000, 0x0, 0x3, 0x1, 0x0, 0x9, 0xff, 0x1, 0x2, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000002c0), 0x8}, 0x8004, 0x3, 0x6, 0x1, 0x5, 0xb03c, 0x5}, r6, 0xc, 0xffffffffffffffff, 0xb) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000280)={0xffffffffffffffff, 0xffffff8f, &(0x7f0000000300)}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000600)={0xffffffffffffffff, &(0x7f00000004c0)="648d1c6e4e7374f62b21f1c71a7cd05c41e2a0bf36f2f23f5761a39646321c3b5e4e670bd9a8f7a3fc36d594c1799d7dec6f0ba644a16abd532529ac63497998169000b2e491e82f659738895262b6fc9c79d8e6736c91136937b9", &(0x7f0000000540)="0c39cf9403045550ce39840a2a90ca20bc744608140dcd6c55d855533bb97417ef0cd19e1990bf245f0f38ab76b7f283d20500e75742ca4151b5489f5848a6b6104b0334b5427d07a3464ecffbfda64068c2d7ea6c230ba9040eebaec2030d19884f9f815ab793bd836fdb9c142a7aa9510939e2d3b5e6f57fa56f5464911bd939ca0ab0a1c19407fc9b1b974b94401f7c82bce0926bd5"}, 0x20) 2018/03/31 09:08:16 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x5, 0x100000000209e20, 0x8000000001, 0x5}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x0, 0x0, 0x7ffff9, 0x0, 0x20000003, 0x0}, 0x2c) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x13, 0x0, 0x7ffff9, 0x0, 0x20000003, 0x0}, 0x2c) 2018/03/31 09:08:16 executing program 7: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)={0xffffffffffffffff}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x0, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r5 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x0, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f00000009c0)={r4}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg(r3, &(0x7f0000000cc0)={&(0x7f0000000400)=@ethernet={0x1}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000580)="4589496d6a3bfcccae07dc729c52ee6bdf10d9cf221f605c25f790103018703b9a67491f96c3f9f8d07204ee4adf21acce1afdaedaba1228b4d33c3fa702a46b1329a0e52eea6a7908fd375ace47", 0x4e}], 0x1, &(0x7f0000000700), 0x0, 0x40000}, 0x4044080) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000740)={0xffffffffffffffff, &(0x7f0000000700)="ec1b815b5cc95d6e0dff859791e3341b8790dcb187f25418f8003a2b3bf345"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4") close(0xffffffffffffffff) 2018/03/31 09:08:16 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x0, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r7 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) ioctl$PERF_EVENT_IOC_RESET(r5, 0x2403, 0x2) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f00000009c0)={r4}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r7, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) ioctl$PERF_EVENT_IOC_RESET(r4, 0x2403, 0x2) sendmsg(r3, &(0x7f0000000cc0)={&(0x7f0000000400)=@ethernet={0x1}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000580)="4589496d6a3bfcccae07dc729c52ee6bdf10d9cf221f605c25f790103018703b9a67491f96c3f9f8d07204ee4adf21acce1afdaedaba1228b4d33c3fa702a46b1329a0e52eea6a7908fd375ace47", 0x4e}], 0x1, &(0x7f0000000700), 0x0, 0x40000}, 0x4044080) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000280)={r6, &(0x7f0000000700)="ec1b815b5cc95d6e0dff859791e3341b"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)={0x3, 0x40000100, 0x56c96e7a, 0xea, 0x1, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") close(0xffffffffffffffff) [ 355.663180] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000016 [ 355.670427] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000000a 2018/03/31 09:08:16 executing program 1 (fault-call:20 fault-nth:11): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)={0xffffffffffffffff}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x0, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r5 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f00000009c0)={r4}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg(r3, &(0x7f0000000cc0)={&(0x7f0000000400)=@ethernet={0x1}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000580)="4589496d6a3bfcccae07dc729c52ee6bdf10d9cf221f605c25f790103018703b9a67491f96c3f9f8d07204ee4adf21acce1afdaedaba1228b4d33c3fa702a46b1329a0e52eea6a7908fd375ace47", 0x4e}], 0x1, &(0x7f0000000700), 0x0, 0x40000}, 0x4044080) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000740)={0xffffffffffffffff, &(0x7f0000000700)="ec1b815b5cc95d6e0dff859791e3341b8790dcb187f25418f8003a2b3bf345dc"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") close(0xffffffffffffffff) 2018/03/31 09:08:16 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x5, 0x100000000209e20, 0x8000000001, 0x5}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0xf, 0x0, 0x2d51, 0x0, 0x20000003, r0}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0xb, 0x4, 0x100000000007f, 0x4, 0x10, 0xffffffffffffffff, 0x80000000}, 0x2c) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x50, &(0x7f0000000140)={0x0, 0x0}}, 0x10) socket$kcm(0x29, 0x2, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) socketpair(0x4, 0x1, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000480)={r3, &(0x7f0000000440)="3068306ef4a0ff8256b6430a042a9b"}, 0x10) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x1) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r2) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x0, 0x8, 0x0, 0x0, r0, 0x6}, 0x2c) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)) perf_event_open(&(0x7f000025c000)={0x5, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = gettid() r5 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0xfff, 0x100000001, 0xfffffffffffffffb, 0x0, 0x8001, 0x0, 0x1, 0x0, 0xfffffffffffffff9, 0x0, 0x9, 0x9, 0x5, 0x8, 0x1, 0x8106, 0x0, 0x14000000000, 0x80000000, 0x1, 0x5, 0x0, 0x40, 0x2839, 0x1d, 0x800, 0x7, 0x0, 0x0, 0x5, 0x7, 0x0, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x4}, 0x0, 0x0, 0xff, 0x0, 0x3, 0x8, 0x3}, r4, 0x2, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=r1, 0x4) perf_event_open(&(0x7f00000003c0)={0x7, 0x70, 0x7fff, 0x5, 0x6, 0x8000, 0x0, 0x1000, 0x0, 0x7, 0x1000, 0x1, 0xffffffff, 0x3, 0xaf99, 0x40, 0x8001, 0xfffffffffffffffa, 0x1, 0x80000000, 0xe6d1, 0x4, 0x8001, 0x9, 0x1f, 0xfffffffffffffc00, 0x0, 0x0, 0x7ff, 0x15ac000000000000, 0x0, 0x3, 0x1, 0xfffffffffffffffe, 0x9, 0xff, 0x1, 0x2, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000002c0), 0x8}, 0x0, 0x3, 0x6, 0x1, 0x5, 0xb03c, 0x5}, r4, 0xc, r5, 0xb) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)={0x8, 0x6bcb8e63, 0x0, 0x59ad, 0x12, r0, 0x8001}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000500)={r6, &(0x7f0000000840), &(0x7f0000000540)=""/70}, 0xfffffd1c) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000280)={0xffffffffffffffff, 0xffffff8f, &(0x7f0000000300)}, 0x10) [ 355.860119] FAULT_INJECTION: forcing a failure. [ 355.860119] name failslab, interval 1, probability 0, space 0, times 0 [ 355.871440] CPU: 0 PID: 9851 Comm: syz-executor1 Not tainted 4.16.0-rc6+ #43 [ 355.878632] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 355.887982] Call Trace: [ 355.890577] dump_stack+0x194/0x24d [ 355.894215] ? arch_local_irq_restore+0x53/0x53 [ 355.898887] ? __save_stack_trace+0x7e/0xd0 [ 355.903219] should_fail+0x8c0/0xa40 [ 355.906943] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 355.912058] ? kasan_kmalloc+0xad/0xe0 [ 355.915951] ? kmem_cache_alloc_trace+0x136/0x740 [ 355.920790] ? __memcg_init_list_lru_node+0x169/0x270 [ 355.925968] ? __list_lru_init+0x544/0x750 [ 355.930185] ? sget_userns+0x691/0xe40 [ 355.934059] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 355.938797] ? do_mount+0xea4/0x2bb0 [ 355.942488] ? SyS_mount+0xab/0x120 [ 355.946097] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 355.951445] ? find_held_lock+0x35/0x1d0 [ 355.955492] ? __lock_is_held+0xb6/0x140 [ 355.959544] ? check_same_owner+0x320/0x320 [ 355.963849] ? rcu_note_context_switch+0x710/0x710 [ 355.968765] should_failslab+0xec/0x120 [ 355.972719] kmem_cache_alloc_trace+0x4b/0x740 [ 355.977283] ? __kmalloc_node+0x33/0x70 [ 355.981234] ? __kmalloc_node+0x33/0x70 [ 355.985188] ? rcu_read_lock_sched_held+0x108/0x120 [ 355.990186] __memcg_init_list_lru_node+0x169/0x270 [ 355.995188] ? list_lru_add+0x7c0/0x7c0 [ 355.999145] ? __kmalloc_node+0x47/0x70 [ 356.003104] __list_lru_init+0x544/0x750 [ 356.007150] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 356.013018] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 356.018025] ? __lockdep_init_map+0xe4/0x650 [ 356.022420] ? lockdep_init_map+0x9/0x10 [ 356.026462] sget_userns+0x691/0xe40 [ 356.030153] ? set_anon_super+0x20/0x20 [ 356.034109] ? put_filp+0x90/0x90 [ 356.037543] ? destroy_unused_super.part.6+0xd0/0xd0 [ 356.042628] ? alloc_vfsmnt+0x762/0x9c0 [ 356.046580] ? path_lookupat+0x238/0xba0 [ 356.050621] ? mnt_free_id.isra.21+0x50/0x50 [ 356.055016] ? trace_hardirqs_off+0x10/0x10 [ 356.059324] ? putname+0xee/0x130 [ 356.062763] ? cap_capable+0x1b5/0x230 [ 356.066637] ? security_capable+0x8e/0xc0 [ 356.070769] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 356.075937] ? ns_capable_common+0xcf/0x160 [ 356.080240] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 356.085406] mount_ns+0x6d/0x190 [ 356.088754] rpc_mount+0x9e/0xd0 [ 356.092104] mount_fs+0x66/0x2d0 [ 356.095453] vfs_kern_mount.part.26+0xc6/0x4a0 [ 356.100023] ? may_umount+0xa0/0xa0 [ 356.103632] ? _raw_read_unlock+0x22/0x30 [ 356.107758] ? __get_fs_type+0x8a/0xc0 [ 356.111630] do_mount+0xea4/0x2bb0 [ 356.115150] ? __might_fault+0x110/0x1d0 [ 356.119196] ? copy_mount_string+0x40/0x40 [ 356.123413] ? __check_object_size+0x8b/0x530 [ 356.127891] ? __might_sleep+0x95/0x190 [ 356.131850] ? kasan_check_write+0x14/0x20 [ 356.136067] ? _copy_from_user+0x99/0x110 [ 356.140198] ? memdup_user+0x5e/0x90 [ 356.143889] ? copy_mount_options+0x1f7/0x2e0 [ 356.148364] SyS_mount+0xab/0x120 [ 356.151794] ? copy_mnt_ns+0xb30/0xb30 [ 356.155660] do_syscall_64+0x281/0x940 [ 356.159529] ? vmalloc_sync_all+0x30/0x30 [ 356.163655] ? _raw_spin_unlock_irq+0x27/0x70 [ 356.168130] ? finish_task_switch+0x1c1/0x7e0 [ 356.172606] ? syscall_return_slowpath+0x550/0x550 [ 356.177515] ? syscall_return_slowpath+0x2ac/0x550 [ 356.182428] ? prepare_exit_to_usermode+0x350/0x350 [ 356.187424] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 356.192771] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 356.197596] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 356.202764] RIP: 0033:0x454e79 [ 356.205932] RSP: 002b:00007fed74635c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 356.213620] RAX: ffffffffffffffda RBX: 00007fed746366d4 RCX: 0000000000454e79 [ 356.220870] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 356.228118] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 356.235369] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000016 [ 356.242617] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000000b 2018/03/31 09:08:16 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000a40)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x0, 0x0) socketpair(0x2, 0x0, 0x0, &(0x7f0000000640)={0xffffffffffffffff}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r6 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x0, 0x10000, 0x1182, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f00000009c0)={r4}) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000280)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000a00)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg(r3, &(0x7f0000000cc0)={&(0x7f0000000400)=@ethernet={0x1}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000580)="4589496d6a3bfcccae07dc729c52ee6bdf10d9cf221f605c25f790103018703b9a67491f96c3f9f8d07204ee4adf21acce1afdaedaba1228b4d33c3fa702a46b1329a0e52eea6a7908fd375ace47", 0x4e}], 0x1, &(0x7f0000000700), 0x0, 0x40000}, 0x4044080) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000740)={r5, &(0x7f0000000700)="ec1b815b5cc95d6e0dff859791e3341b8790dcb187f25418"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") close(0xffffffffffffffff) 2018/03/31 09:08:16 executing program 7: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)={0xffffffffffffffff}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x0, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r5 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x0, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f00000009c0)={r4}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg(r3, &(0x7f0000000cc0)={&(0x7f0000000400)=@ethernet={0x1}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000580)="4589496d6a3bfcccae07dc729c52ee6bdf10d9cf221f605c25f790103018703b9a67491f96c3f9f8d07204ee4adf21acce1afdaedaba1228b4d33c3fa702a46b1329a0e52eea6a7908fd375ace47", 0x4e}], 0x1, &(0x7f0000000700), 0x0, 0x40000}, 0x4044080) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000740)={0xffffffffffffffff, &(0x7f0000000700)="ec1b815b5cc95d6e0dff859791e3341b8790dcb187f25418f8003a2b3bf345"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4") close(0xffffffffffffffff) 2018/03/31 09:08:16 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x5, 0x0, 0x0, 0x5}, 0x2c) r1 = bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x13, 0x0, 0x0, 0x0, 0x20000003, 0x0}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x3e83, 0x8, r1}, 0x2c) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x50, &(0x7f0000000140)={0x0, 0x0}}, 0x10) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, r2, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) socketpair(0x4, 0x1, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000480)={r5, &(0x7f0000000440)="3068306ef4a0ff8256b6430a042a9b"}, 0x10) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x0, 0x8, 0x0, 0x0, r0, 0x6}, 0x2c) socketpair(0x8, 0x2, 0x0, &(0x7f0000000040)) r6 = gettid() bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=r3, 0x4) perf_event_open(&(0x7f00000003c0)={0x7, 0x70, 0x7fff, 0x5, 0x6, 0x8000, 0x0, 0x1000, 0x0, 0x7, 0x1000, 0x1, 0xffffffff, 0x3, 0xaf99, 0x40, 0x8001, 0xfffffffffffffffa, 0x1, 0x80000000, 0xe6d1, 0x4, 0x8001, 0x9, 0x1f, 0xfffffffffffffc00, 0x0, 0x0, 0x7ff, 0x15ac000000000000, 0x0, 0x3, 0x1, 0x0, 0x9, 0xff, 0x1, 0x2, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000002c0), 0x8}, 0x8004, 0x3, 0x6, 0x1, 0x5, 0xb03c, 0x5}, r6, 0xc, 0xffffffffffffffff, 0xb) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000280)={0xffffffffffffffff, 0xffffff8f, &(0x7f0000000300)}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000600)={0xffffffffffffffff, &(0x7f00000004c0)="648d1c6e4e7374f62b21f1c71a7cd05c41e2a0bf36f2f23f5761a39646321c3b5e4e670bd9a8f7a3fc36d594c1799d7dec6f0ba644a16abd532529ac63497998169000b2e491e82f659738895262b6fc9c79d8e6736c91136937b9", &(0x7f0000000540)="0c39cf9403045550ce39840a2a90ca20bc744608140dcd6c55d855533bb97417ef0cd19e1990bf245f0f38ab76b7f283d20500e75742ca4151b5489f5848a6b6104b0334b5427d07a3464ecffbfda64068c2d7ea6c230ba9040eebaec2030d19884f9f815ab793bd836fdb9c142a7aa9510939e2d3b5e6f57fa56f5464911bd939ca0ab0a1c19407fc9b1b974b94401f7c82bce0926bd5"}, 0x20) 2018/03/31 09:08:16 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xf, 0x5, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x80000000}, [@map={0x18, 0x1, 0x1, 0x0, 0x1}], {0x95}}, &(0x7f0000000040)='syzkaller\x00', 0x3, 0x10, &(0x7f0000000080)=""/16, 0x41000, 0x2f3100a785778bd1}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000001c0)={r0, 0x50, &(0x7f0000000140)}, 0x10) close(r0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000780)={&(0x7f0000000240)=@ax25, 0x80, &(0x7f0000000600)=[{&(0x7f00000002c0)=""/114, 0x72}, {&(0x7f0000000340)=""/133, 0x85}, {&(0x7f0000000400)=""/23, 0x17}, {&(0x7f0000000440)=""/59, 0x3b}, {&(0x7f0000000480)=""/114, 0x72}, {&(0x7f0000000500)=""/45, 0x2d}, {&(0x7f0000000540)=""/83, 0x53}, {&(0x7f00000005c0)}], 0x8, &(0x7f0000000680)=""/214, 0xd6, 0x100}, 0x40) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000007c0)={0xffffffffffffffff}) recvmsg(r2, &(0x7f00000019c0)={&(0x7f0000000800)=@ax25, 0x80, &(0x7f00000018c0)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000001880)=""/18, 0x12}], 0x2, &(0x7f0000001900)=""/184, 0xb8, 0x3}, 0x1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001a80)={r4, 0x50, &(0x7f0000001a00)}, 0x10) r5 = perf_event_open(&(0x7f0000001b00)={0x2, 0x70, 0x6, 0x8, 0x80000000, 0x10001, 0x0, 0x7ff, 0x4, 0xa, 0x200, 0x20, 0x72, 0x5, 0x0, 0x0, 0x5, 0x8f, 0x9ed, 0xff, 0x0, 0xa58, 0x7f, 0xf2f, 0x4503, 0x6, 0x81, 0x5, 0x1ff, 0xffffffff00000000, 0x2, 0x5, 0x9000000000000, 0xfffffffffffffffa, 0x8, 0x10001, 0x731ab510, 0x9, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000001ac0), 0x1}, 0x80, 0x2b4, 0x200, 0x3, 0x6, 0x9, 0x4}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0x20000) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000001b80)) r6 = getpid() r7 = perf_event_open(&(0x7f0000001c00)={0x1, 0x70, 0x0, 0xfff, 0x4, 0x80000000, 0x0, 0x3, 0x40, 0xa, 0x7, 0x7, 0x7, 0x4800000000000000, 0x7, 0x6, 0x62b, 0x8, 0x9, 0x100000000, 0x1, 0x0, 0x5, 0xd199, 0x1f, 0x10000, 0xff80000000000000, 0x3, 0x4, 0x8, 0x80000001, 0x8000, 0x7fff, 0x4, 0x16, 0x7, 0x40, 0x8, 0x0, 0x5, 0x50031dd1e89e26d1, @perf_bp={&(0x7f0000001bc0), 0x2}, 0x10000, 0x3a, 0x80000001, 0x1, 0x2c, 0x3ff, 0x6}, r6, 0x6, r3, 0x3) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000001c80)=r0, 0x4) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000001cc0)) ioctl$PERF_EVENT_IOC_REFRESH(r7, 0x2402, 0xffffffff) r8 = perf_event_open(&(0x7f0000001d00)={0x0, 0x70, 0x7, 0x400, 0x100, 0xac, 0x0, 0x100000000, 0xc2800, 0xa, 0x33e3, 0x2, 0x10001, 0x8, 0x5, 0x100000001, 0x2e9, 0x2, 0xc1, 0xf2, 0x2, 0x9, 0xffff, 0x7, 0x1, 0x0, 0x8000, 0x800, 0xfffffffffffffffa, 0x40, 0x0, 0x3, 0x6, 0xfa4, 0x7, 0xffffffffffff8000, 0x0, 0x0, 0x0, 0x8000, 0x3, @perf_config_ext={0x400}, 0x100, 0xa264, 0x4, 0x7, 0x2, 0x1000, 0x92}, r6, 0x5, r7, 0x1) socketpair(0x7, 0x6, 0x1, &(0x7f0000001d80)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000001e00)={&(0x7f0000001dc0)='./file0\x00', r9}, 0x10) r10 = perf_event_open(&(0x7f0000001e40)={0x4, 0x70, 0x5, 0x4, 0x8, 0x6, 0x0, 0x2, 0x1425, 0xb, 0x0, 0xcc9, 0x400, 0x57f90db4, 0x80000000, 0x7, 0x1000, 0x0, 0x8, 0x8000, 0xffffffff, 0x400, 0x1, 0x6, 0x40, 0x2, 0x10000, 0x8, 0x9, 0xfffffffffffffff8, 0x9, 0x4, 0x3, 0x400, 0x3, 0x9, 0x3, 0x100, 0x0, 0x6, 0x0, @perf_config_ext={0x4, 0x2}, 0x20, 0x3ff, 0x0, 0x7, 0x3, 0x5, 0xfa5e}, r6, 0xd, r7, 0x2) bpf$OBJ_GET_MAP(0x7, &(0x7f0000001f00)={&(0x7f0000001ec0)='./file0\x00'}, 0x10) socketpair$inet6_sctp(0xa, 0x0, 0x84, &(0x7f0000001f40)) ioctl$PERF_EVENT_IOC_DISABLE(r10, 0x2401, 0xbad) r11 = perf_event_open(&(0x7f0000001fc0)={0x3, 0x70, 0xff, 0x2f, 0x2, 0x7, 0x0, 0x40, 0x80000, 0x1, 0x8, 0x6, 0xfffffffffffffffb, 0x7, 0x2, 0x10000, 0x6, 0x5, 0x0, 0x10, 0x6, 0xc58, 0x7f, 0x3, 0x2, 0x3, 0x5, 0x80000000800000, 0x7, 0xfff, 0x16, 0x2b65, 0x9, 0x69244395, 0x10000, 0x4, 0x9, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000001f80), 0x8}, 0x100, 0x8, 0x51b4, 0x4, 0x800, 0xb7, 0x4800}, r6, 0x8, r8, 0x1) r12 = gettid() socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000002040)) perf_event_open(&(0x7f0000002080)={0x0, 0x70, 0x100, 0x0, 0x2, 0x401, 0x0, 0x6, 0x1, 0x6, 0x656, 0x5, 0xfffffffffffff973, 0xffffffffffffffff, 0x9, 0x7, 0x3, 0x3ff, 0x1c000000, 0x10000, 0x6, 0x20, 0x6, 0x1, 0x1, 0x4, 0x2, 0x20, 0x9, 0xed5, 0x847, 0x1000, 0x0, 0x0, 0x102bed3b, 0x9, 0x7fffffff, 0x6, 0x0, 0x24, 0x0, @perf_config_ext={0x100000001, 0x6}, 0x200, 0x800000010000000, 0x7, 0x7, 0x1000, 0xf3, 0xe87}, r12, 0xf, r11, 0x8) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000002100)) perf_event_open(&(0x7f0000002180)={0x4, 0x70, 0x0, 0x8, 0xff, 0x0, 0x0, 0xfffffffffffffff9, 0x10001, 0x3, 0x0, 0x93eb, 0x1, 0x4e5e, 0x8001, 0xfffffffffffffff8, 0x7, 0x1f4, 0x80000001, 0x99b, 0x4, 0x8, 0xed8, 0x3f, 0xec9, 0x6, 0x1, 0x4ab8, 0x8, 0x2, 0xdd, 0x9, 0xffffffffffffffff, 0x8000, 0x0, 0x6, 0xffff, 0x8, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000002140), 0xf}, 0x400, 0x5, 0x7, 0x4, 0x7, 0x4}, r12, 0x3, r7, 0x8) 2018/03/31 09:08:16 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x5, 0x100000000209e20, 0x8000000001, 0x5}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x13, 0x0, 0x0, 0x0, 0x20000003, 0x0}, 0x2c) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x13, 0x0, 0x7ffff9, 0x0, 0x20000003, 0x0}, 0x2c) 2018/03/31 09:08:16 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x0, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r7 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) ioctl$PERF_EVENT_IOC_RESET(r5, 0x2403, 0x2) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f00000009c0)={r4}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r7, 0x40042408, 0xffffffffffffffff) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) ioctl$PERF_EVENT_IOC_RESET(r4, 0x2403, 0x2) sendmsg(r3, &(0x7f0000000cc0)={&(0x7f0000000400)=@ethernet={0x1}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000580)="4589496d6a3bfcccae07dc729c52ee6bdf10d9cf221f605c25f790103018703b9a67491f96c3f9f8d07204ee4adf21acce1afdaedaba1228b4d33c3fa702a46b1329a0e52eea6a7908fd375ace47", 0x4e}], 0x1, &(0x7f0000000700), 0x0, 0x40000}, 0x4044080) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000280)={r6, &(0x7f0000000700)="ec1b815b5cc95d6e0dff859791e3341b"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)={0x3, 0x40000100, 0x56c96e7a, 0xea, 0x1, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") close(0xffffffffffffffff) 2018/03/31 09:08:16 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x5, 0x100000000209e20, 0x8000000001, 0x5}, 0x2c) r1 = bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x13, 0x0, 0x7ffff9, 0x0, 0x20000003, 0x0}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xe, 0x0, 0x7f, 0x3e83, 0x8, r1, 0x80000000}, 0x2c) mkdir(&(0x7f0000000580)='./file0\x00', 0x124) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x50, &(0x7f0000000140)={0x0, 0x0}}, 0x10) socket$kcm(0x29, 0x2, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) socketpair(0x4, 0x1, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r3, 0x2401, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000480)={r4, &(0x7f0000000440)="3068306ef4a0ff8256b6430a042a9b"}, 0x10) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40042409, 0x1) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r3) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x0, 0x8, 0x0, 0x0, r0, 0x6}, 0x2c) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000600)={r6, 0x28, &(0x7f00000005c0)}, 0x10) perf_event_open(&(0x7f000025c000)={0x5, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r7 = gettid() r8 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0xfff, 0x100000001, 0xfffffffffffffffb, 0x0, 0x8001, 0x0, 0x1, 0x0, 0xfffffffffffffff9, 0x0, 0x9, 0x9, 0x5, 0x8, 0x1, 0x8106, 0x0, 0x14000000000, 0x80000000, 0x1, 0x5, 0x0, 0x40, 0x2839, 0x1d, 0x800, 0x7, 0x0, 0x0, 0x5, 0x7, 0x0, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x4}, 0x0, 0x0, 0xff, 0x0, 0x3, 0x8, 0x3}, r7, 0x2, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=r2, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={r5, 0x28, &(0x7f00000004c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000540)={r9, 0x51c, 0x10}, 0xc) perf_event_open(&(0x7f00000003c0)={0x7, 0x70, 0x7fff, 0x5, 0x6, 0x8000, 0x0, 0x1000, 0x0, 0x7, 0x1000, 0x1, 0xffffffff, 0x3, 0xaf99, 0x40, 0x8001, 0xfffffffffffffffa, 0x1, 0x80000000, 0xe6d1, 0x4, 0x8001, 0x9, 0x1f, 0xfffffffffffffc00, 0x0, 0x0, 0x7ff, 0x15ac000000000000, 0x0, 0x3, 0x1, 0xfffffffffffffffe, 0x9, 0xff, 0x1, 0x2, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000002c0), 0x8}, 0x0, 0x3, 0x6, 0x1, 0x5, 0xb03c, 0x5}, r7, 0xc, r8, 0xb) bpf$MAP_CREATE(0x0, &(0x7f0000000640)={0x8, 0x6bcb8e63, 0x0, 0x59ad, 0x12, r0, 0x8001}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000880)={r0, &(0x7f0000000840), &(0x7f00000008c0)=""/70}, 0x375) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000280)={0xffffffffffffffff, 0xffffff8f, &(0x7f0000000300)}, 0x10) 2018/03/31 09:08:16 executing program 1 (fault-call:20 fault-nth:12): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)={0xffffffffffffffff}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x0, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r5 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f00000009c0)={r4}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg(r3, &(0x7f0000000cc0)={&(0x7f0000000400)=@ethernet={0x1}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000580)="4589496d6a3bfcccae07dc729c52ee6bdf10d9cf221f605c25f790103018703b9a67491f96c3f9f8d07204ee4adf21acce1afdaedaba1228b4d33c3fa702a46b1329a0e52eea6a7908fd375ace47", 0x4e}], 0x1, &(0x7f0000000700), 0x0, 0x40000}, 0x4044080) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000740)={0xffffffffffffffff, &(0x7f0000000700)="ec1b815b5cc95d6e0dff859791e3341b8790dcb187f25418f8003a2b3bf345dc"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") close(0xffffffffffffffff) [ 356.359310] FAULT_INJECTION: forcing a failure. [ 356.359310] name failslab, interval 1, probability 0, space 0, times 0 [ 356.370707] CPU: 1 PID: 9872 Comm: syz-executor1 Not tainted 4.16.0-rc6+ #43 [ 356.377900] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 356.387262] Call Trace: [ 356.389857] dump_stack+0x194/0x24d [ 356.393491] ? arch_local_irq_restore+0x53/0x53 [ 356.398197] ? __save_stack_trace+0x7e/0xd0 [ 356.402554] should_fail+0x8c0/0xa40 [ 356.406274] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 356.411381] ? kasan_kmalloc+0xad/0xe0 [ 356.415274] ? kmem_cache_alloc_trace+0x136/0x740 [ 356.420117] ? __memcg_init_list_lru_node+0x169/0x270 [ 356.425288] ? __list_lru_init+0x544/0x750 [ 356.429504] ? sget_userns+0x691/0xe40 [ 356.433375] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 356.438109] ? do_mount+0xea4/0x2bb0 [ 356.441800] ? SyS_mount+0xab/0x120 [ 356.445410] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 356.450758] ? find_held_lock+0x35/0x1d0 [ 356.454801] ? __lock_is_held+0xb6/0x140 [ 356.458852] ? check_same_owner+0x320/0x320 [ 356.463162] ? rcu_note_context_switch+0x710/0x710 [ 356.468080] should_failslab+0xec/0x120 [ 356.472039] kmem_cache_alloc_trace+0x4b/0x740 [ 356.476603] ? __kmalloc_node+0x33/0x70 [ 356.480556] ? __kmalloc_node+0x33/0x70 [ 356.484513] ? rcu_read_lock_sched_held+0x108/0x120 [ 356.489516] __memcg_init_list_lru_node+0x169/0x270 [ 356.494516] ? list_lru_add+0x7c0/0x7c0 [ 356.498471] ? __kmalloc_node+0x47/0x70 [ 356.502436] __list_lru_init+0x544/0x750 [ 356.506487] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 356.512354] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 356.517356] ? __lockdep_init_map+0xe4/0x650 [ 356.521749] ? lockdep_init_map+0x9/0x10 [ 356.525793] sget_userns+0x691/0xe40 [ 356.529490] ? set_anon_super+0x20/0x20 [ 356.533446] ? put_filp+0x90/0x90 [ 356.536879] ? destroy_unused_super.part.6+0xd0/0xd0 [ 356.541960] ? alloc_vfsmnt+0x762/0x9c0 [ 356.545913] ? path_lookupat+0x238/0xba0 [ 356.549952] ? mnt_free_id.isra.21+0x50/0x50 [ 356.554344] ? trace_hardirqs_off+0x10/0x10 [ 356.558648] ? putname+0xee/0x130 [ 356.562087] ? cap_capable+0x1b5/0x230 [ 356.565960] ? security_capable+0x8e/0xc0 [ 356.570094] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 356.575263] ? ns_capable_common+0xcf/0x160 [ 356.579569] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 356.584736] mount_ns+0x6d/0x190 [ 356.588085] rpc_mount+0x9e/0xd0 [ 356.591435] mount_fs+0x66/0x2d0 [ 356.594783] vfs_kern_mount.part.26+0xc6/0x4a0 [ 356.599346] ? may_umount+0xa0/0xa0 [ 356.602957] ? _raw_read_unlock+0x22/0x30 [ 356.607086] ? __get_fs_type+0x8a/0xc0 [ 356.610957] do_mount+0xea4/0x2bb0 [ 356.614479] ? __might_fault+0x110/0x1d0 [ 356.618526] ? copy_mount_string+0x40/0x40 [ 356.622744] ? __check_object_size+0x8b/0x530 [ 356.627223] ? __might_sleep+0x95/0x190 [ 356.631183] ? kasan_check_write+0x14/0x20 [ 356.635399] ? _copy_from_user+0x99/0x110 [ 356.639528] ? memdup_user+0x5e/0x90 [ 356.643219] ? copy_mount_options+0x1f7/0x2e0 [ 356.647696] SyS_mount+0xab/0x120 [ 356.651130] ? copy_mnt_ns+0xb30/0xb30 [ 356.654997] do_syscall_64+0x281/0x940 [ 356.658868] ? vmalloc_sync_all+0x30/0x30 [ 356.662993] ? _raw_spin_unlock_irq+0x27/0x70 [ 356.667476] ? finish_task_switch+0x1c1/0x7e0 [ 356.671952] ? syscall_return_slowpath+0x550/0x550 [ 356.676862] ? syscall_return_slowpath+0x2ac/0x550 [ 356.681772] ? prepare_exit_to_usermode+0x350/0x350 [ 356.686773] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 356.692123] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 356.696949] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 356.702116] RIP: 0033:0x454e79 2018/03/31 09:08:17 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x0, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r7 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) ioctl$PERF_EVENT_IOC_RESET(r5, 0x2403, 0x2) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f00000009c0)={r4}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r7, 0x40042408, 0xffffffffffffffff) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) ioctl$PERF_EVENT_IOC_RESET(r4, 0x2403, 0x2) sendmsg(r3, &(0x7f0000000cc0)={&(0x7f0000000400)=@ethernet={0x1}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000580)="4589496d6a3bfcccae07dc729c52ee6bdf10d9cf221f605c25f790103018703b9a67491f96c3f9f8d07204ee4adf21acce1afdaedaba1228b4d33c3fa702a46b1329a0e52eea6a7908fd375ace47", 0x4e}], 0x1, &(0x7f0000000700), 0x0, 0x40000}, 0x4044080) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000280)={r6, &(0x7f0000000700)="ec1b815b5cc95d6e0dff859791e3341b"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)={0x3, 0x40000100, 0x56c96e7a, 0xea, 0x1, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") close(0xffffffffffffffff) 2018/03/31 09:08:17 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x5, 0x100000000209e20, 0x8000000001, 0x5}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x13, 0x0, 0x0, 0x0, 0x20000003, 0x0}, 0x2c) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x13, 0x0, 0x7ffff9, 0x0, 0x20000003, 0x0}, 0x2c) [ 356.705284] RSP: 002b:00007fed74635c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 356.712972] RAX: ffffffffffffffda RBX: 00007fed746366d4 RCX: 0000000000454e79 [ 356.720220] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 356.727472] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 356.734720] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000016 [ 356.741968] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000000c 2018/03/31 09:08:17 executing program 7: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)={0xffffffffffffffff}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x0, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r5 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x0, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f00000009c0)={r4}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg(r3, &(0x7f0000000cc0)={&(0x7f0000000400)=@ethernet={0x1}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000580)="4589496d6a3bfcccae07dc729c52ee6bdf10d9cf221f605c25f790103018703b9a67491f96c3f9f8d07204ee4adf21acce1afdaedaba1228b4d33c3fa702a46b1329a0e52eea6a7908fd375ace47", 0x4e}], 0x1, &(0x7f0000000700), 0x0, 0x40000}, 0x4044080) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000740)={0xffffffffffffffff, &(0x7f0000000700)="ec1b815b5cc95d6e0dff859791e3341b8790dcb187f25418f8003a2b3bf345"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4") close(0xffffffffffffffff) 2018/03/31 09:08:17 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x5, 0x0, 0x0, 0x5}, 0x2c) r1 = bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x13, 0x0, 0x0, 0x0, 0x20000003, 0x0}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x3e83, 0x8, r1}, 0x2c) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x50, &(0x7f0000000140)={0x0, 0x0}}, 0x10) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, r2, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) socketpair(0x4, 0x1, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000480)={r5, &(0x7f0000000440)="3068306ef4a0ff8256b6430a042a9b"}, 0x10) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x0, 0x8, 0x0, 0x0, r0, 0x6}, 0x2c) socketpair(0x8, 0x2, 0x0, &(0x7f0000000040)) r6 = gettid() bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=r3, 0x4) perf_event_open(&(0x7f00000003c0)={0x7, 0x70, 0x7fff, 0x5, 0x6, 0x8000, 0x0, 0x1000, 0x0, 0x7, 0x1000, 0x1, 0xffffffff, 0x3, 0xaf99, 0x40, 0x8001, 0xfffffffffffffffa, 0x1, 0x80000000, 0xe6d1, 0x4, 0x8001, 0x9, 0x1f, 0xfffffffffffffc00, 0x0, 0x0, 0x7ff, 0x15ac000000000000, 0x0, 0x3, 0x1, 0xfffffffffffffffe, 0x0, 0xff, 0x1, 0x2, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000002c0), 0x8}, 0x8004, 0x3, 0x6, 0x1, 0x5, 0xb03c, 0x5}, r6, 0xc, 0xffffffffffffffff, 0xb) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000280)={0xffffffffffffffff, 0xffffff8f, &(0x7f0000000300)}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000600)={0xffffffffffffffff, &(0x7f00000004c0)="648d1c6e4e7374f62b21f1c71a7cd05c41e2a0bf36f2f23f5761a39646321c3b5e4e670bd9a8f7a3fc36d594c1799d7dec6f0ba644a16abd532529ac63497998169000b2e491e82f659738895262b6fc9c79d8e6736c91136937b9", &(0x7f0000000540)="0c39cf9403045550ce39840a2a90ca20bc744608140dcd6c55d855533bb97417ef0cd19e1990bf245f0f38ab76b7f283d20500e75742ca4151b5489f5848a6b6104b0334b5427d07a3464ecffbfda64068c2d7ea6c230ba9040eebaec2030d19884f9f815ab793bd836fdb9c142a7aa9510939e2d3b5e6f57fa56f5464911bd939ca0ab0a1c19407fc9b1b974b94401f7c82bce0926bd5"}, 0x20) 2018/03/31 09:08:17 executing program 1 (fault-call:20 fault-nth:13): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)={0xffffffffffffffff}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x0, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r5 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f00000009c0)={r4}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg(r3, &(0x7f0000000cc0)={&(0x7f0000000400)=@ethernet={0x1}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000580)="4589496d6a3bfcccae07dc729c52ee6bdf10d9cf221f605c25f790103018703b9a67491f96c3f9f8d07204ee4adf21acce1afdaedaba1228b4d33c3fa702a46b1329a0e52eea6a7908fd375ace47", 0x4e}], 0x1, &(0x7f0000000700), 0x0, 0x40000}, 0x4044080) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000740)={0xffffffffffffffff, &(0x7f0000000700)="ec1b815b5cc95d6e0dff859791e3341b8790dcb187f25418f8003a2b3bf345dc"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") close(0xffffffffffffffff) 2018/03/31 09:08:17 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x5, 0x100000000209e20, 0x8000000001, 0x5}, 0x2c) r1 = bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x13, 0x0, 0x7ffff9, 0x0, 0x20000003, 0x0}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xe, 0x0, 0x7f, 0x3e83, 0x8, r1, 0x80000000}, 0x2c) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x50, &(0x7f0000000140)={0x0, 0x0}}, 0x10) socket$kcm(0x29, 0x2, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) socketpair(0x4, 0x1, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) r5 = gettid() perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x200, 0xc6, 0x7, 0x5, 0x0, 0x3f, 0x8900, 0x0, 0x8, 0x7, 0x0, 0xffffffffffffff2e, 0x1ffe0, 0x400, 0x3, 0x38d, 0x8, 0x6, 0x0, 0x80, 0x401, 0x3, 0x8000, 0xf2, 0x4, 0x1, 0x7f, 0x9, 0x8, 0xe7, 0x5, 0x8, 0x3ff, 0x8000, 0x0, 0x9, 0x0, 0x101, 0x7, @perf_bp={&(0x7f00000004c0), 0xb}, 0x400, 0x3ff, 0x5, 0x7, 0x80000001, 0x5, 0x401}, r5, 0xf, r3, 0x2) ioctl$PERF_EVENT_IOC_DISABLE(r3, 0x2401, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000480)={r4, &(0x7f0000000440)="3068306ef4a0ff8256b6430a042a9b"}, 0x10) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40042409, 0x1) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r3) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x0, 0x8, 0x0, 0x0, r0, 0x6}, 0x2c) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)) perf_event_open(&(0x7f000025c000)={0x5, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = gettid() r7 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0xfff, 0x100000001, 0xfffffffffffffffb, 0x0, 0x8001, 0x0, 0x1, 0x0, 0xfffffffffffffff9, 0x0, 0x9, 0x9, 0x5, 0x8, 0x1, 0x8106, 0x0, 0x14000000000, 0x80000000, 0x1, 0x5, 0x0, 0x40, 0x2839, 0x1d, 0x800, 0x7, 0x0, 0x0, 0x5, 0x7, 0x0, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x4}, 0x0, 0x0, 0xff, 0x0, 0x3, 0x8, 0x3}, r6, 0x2, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=r2, 0x4) perf_event_open(&(0x7f00000003c0)={0x7, 0x70, 0x7fff, 0x5, 0x6, 0x8000, 0x0, 0x1000, 0x0, 0x7, 0x1000, 0x1, 0xffffffff, 0x3, 0xaf99, 0x40, 0x8001, 0xfffffffffffffffa, 0x1, 0x80000000, 0xe6d1, 0x4, 0x8001, 0x9, 0x1f, 0xfffffffffffffc00, 0x0, 0x0, 0x7ff, 0x15ac000000000000, 0x0, 0x3, 0x1, 0xfffffffffffffffe, 0x9, 0xff, 0x1, 0x2, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000002c0), 0x8}, 0x0, 0x3, 0x6, 0x1, 0x5, 0xb03c, 0x5}, r6, 0xc, r7, 0xb) bpf$MAP_CREATE(0x0, &(0x7f0000000640)={0x8, 0x6bcb8e63, 0x0, 0x59ad, 0x12, r0, 0x8001}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000880)={r0, &(0x7f0000000840), &(0x7f00000008c0)=""/70}, 0x375) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000280)={0xffffffffffffffff, 0xffffff8f, &(0x7f0000000300)}, 0x10) [ 356.958611] FAULT_INJECTION: forcing a failure. [ 356.958611] name failslab, interval 1, probability 0, space 0, times 0 [ 356.969901] CPU: 1 PID: 9907 Comm: syz-executor1 Not tainted 4.16.0-rc6+ #43 [ 356.977088] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 356.986456] Call Trace: [ 356.989058] dump_stack+0x194/0x24d [ 356.992692] ? arch_local_irq_restore+0x53/0x53 [ 356.997360] ? __save_stack_trace+0x7e/0xd0 [ 357.001690] should_fail+0x8c0/0xa40 [ 357.005427] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 357.010565] ? kasan_kmalloc+0xad/0xe0 [ 357.014457] ? kmem_cache_alloc_trace+0x136/0x740 [ 357.019299] ? __memcg_init_list_lru_node+0x169/0x270 [ 357.024492] ? __list_lru_init+0x544/0x750 [ 357.028739] ? sget_userns+0x691/0xe40 [ 357.032628] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 357.037382] ? do_mount+0xea4/0x2bb0 [ 357.041092] ? SyS_mount+0xab/0x120 [ 357.044721] ? do_syscall_64+0x281/0x940 [ 357.048785] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 357.054151] ? find_held_lock+0x35/0x1d0 [ 357.058205] ? __lock_is_held+0xb6/0x140 [ 357.062263] ? check_same_owner+0x320/0x320 [ 357.066588] ? rcu_note_context_switch+0x710/0x710 [ 357.071519] should_failslab+0xec/0x120 [ 357.075499] kmem_cache_alloc_trace+0x4b/0x740 [ 357.080075] ? __kmalloc_node+0x33/0x70 [ 357.084030] ? __kmalloc_node+0x33/0x70 [ 357.087988] ? rcu_read_lock_sched_held+0x108/0x120 [ 357.092983] __memcg_init_list_lru_node+0x169/0x270 [ 357.098006] ? list_lru_add+0x7c0/0x7c0 [ 357.101966] ? __kmalloc_node+0x47/0x70 [ 357.105918] __list_lru_init+0x544/0x750 [ 357.109956] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 357.115815] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 357.120807] ? __lockdep_init_map+0xe4/0x650 [ 357.125196] ? lockdep_init_map+0x9/0x10 [ 357.129233] sget_userns+0x691/0xe40 [ 357.132921] ? set_anon_super+0x20/0x20 [ 357.136883] ? put_filp+0x90/0x90 [ 357.140322] ? destroy_unused_super.part.6+0xd0/0xd0 [ 357.145404] ? alloc_vfsmnt+0x762/0x9c0 [ 357.149350] ? path_lookupat+0x238/0xba0 [ 357.153384] ? mnt_free_id.isra.21+0x50/0x50 [ 357.157766] ? trace_hardirqs_off+0x10/0x10 [ 357.162061] ? putname+0xee/0x130 [ 357.165492] ? cap_capable+0x1b5/0x230 [ 357.169355] ? security_capable+0x8e/0xc0 [ 357.173482] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 357.178647] ? ns_capable_common+0xcf/0x160 [ 357.182943] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 357.188107] mount_ns+0x6d/0x190 [ 357.191449] rpc_mount+0x9e/0xd0 [ 357.194788] mount_fs+0x66/0x2d0 [ 357.198130] vfs_kern_mount.part.26+0xc6/0x4a0 [ 357.202684] ? may_umount+0xa0/0xa0 [ 357.206286] ? _raw_read_unlock+0x22/0x30 [ 357.210409] ? __get_fs_type+0x8a/0xc0 [ 357.214273] do_mount+0xea4/0x2bb0 [ 357.217786] ? __might_fault+0x110/0x1d0 [ 357.221823] ? copy_mount_string+0x40/0x40 [ 357.226038] ? check_same_owner+0x320/0x320 [ 357.230344] ? __check_object_size+0x8b/0x530 [ 357.234818] ? __might_sleep+0x95/0x190 [ 357.238767] ? kasan_check_write+0x14/0x20 [ 357.242976] ? _copy_from_user+0x99/0x110 [ 357.247099] ? memdup_user+0x5e/0x90 [ 357.250787] ? copy_mount_options+0x1f7/0x2e0 [ 357.255259] SyS_mount+0xab/0x120 [ 357.258684] ? copy_mnt_ns+0xb30/0xb30 [ 357.262546] do_syscall_64+0x281/0x940 [ 357.266407] ? vmalloc_sync_all+0x30/0x30 [ 357.270532] ? _raw_spin_unlock_irq+0x27/0x70 [ 357.275002] ? finish_task_switch+0x1c1/0x7e0 [ 357.279480] ? syscall_return_slowpath+0x550/0x550 [ 357.284386] ? syscall_return_slowpath+0x2ac/0x550 [ 357.289289] ? prepare_exit_to_usermode+0x350/0x350 [ 357.294282] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 357.299622] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 357.304443] entry_SYSCALL_64_after_hwframe+0x42/0xb7 2018/03/31 09:08:17 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x5, 0x100000000209e20, 0x8000000001, 0x5}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x13, 0x0, 0x0, 0x0, 0x20000003, 0x0}, 0x2c) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x13, 0x0, 0x7ffff9, 0x0, 0x20000003, 0x0}, 0x2c) 2018/03/31 09:08:17 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xf, 0x5, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x80000000}, [@map={0x18, 0x1, 0x1, 0x0, 0x1}], {0x95}}, &(0x7f0000000040)='syzkaller\x00', 0x3, 0x10, &(0x7f0000000080)=""/16, 0x41000, 0x2f3100a785778bd1}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000001c0)={r0, 0x50, &(0x7f0000000140)}, 0x10) close(r0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000780)={&(0x7f0000000240)=@ax25, 0x80, &(0x7f0000000600)=[{&(0x7f00000002c0)=""/114, 0x72}, {&(0x7f0000000340)=""/133, 0x85}, {&(0x7f0000000400)=""/23, 0x17}, {&(0x7f0000000440)=""/59, 0x3b}, {&(0x7f0000000480)=""/114, 0x72}, {&(0x7f0000000500)=""/45, 0x2d}, {&(0x7f0000000540)=""/83, 0x53}, {&(0x7f00000005c0)}], 0x8, &(0x7f0000000680)=""/214, 0xd6, 0x100}, 0x40) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000007c0)={0xffffffffffffffff}) recvmsg(r2, &(0x7f00000019c0)={&(0x7f0000000800)=@ax25, 0x80, &(0x7f00000018c0)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000001880)=""/18, 0x12}], 0x2, &(0x7f0000001900)=""/184, 0xb8, 0x3}, 0x1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001a80)={r4, 0x50, &(0x7f0000001a00)}, 0x10) r5 = perf_event_open(&(0x7f0000001b00)={0x2, 0x70, 0x6, 0x8, 0x80000000, 0x10001, 0x0, 0x7ff, 0x4, 0xa, 0x200, 0x20, 0x72, 0x5, 0x0, 0x0, 0x5, 0x8f, 0x9ed, 0xff, 0x0, 0xa58, 0x7f, 0xf2f, 0x4503, 0x6, 0x81, 0x5, 0x1ff, 0xffffffff00000000, 0x2, 0x5, 0x9000000000000, 0xfffffffffffffffa, 0x8, 0x10001, 0x731ab510, 0x9, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000001ac0), 0x1}, 0x80, 0x2b4, 0x200, 0x3, 0x6, 0x9, 0x4}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0x20000) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000001b80)) r6 = getpid() r7 = perf_event_open(&(0x7f0000001c00)={0x1, 0x70, 0x0, 0xfff, 0x4, 0x80000000, 0x0, 0x3, 0x40, 0xa, 0x7, 0x7, 0x7, 0x4800000000000000, 0x7, 0x6, 0x62b, 0x8, 0x9, 0x100000000, 0x1, 0x0, 0x5, 0xd199, 0x1f, 0x10000, 0xff80000000000000, 0x3, 0x4, 0x8, 0x80000001, 0x8000, 0x7fff, 0x4, 0x16, 0x7, 0x40, 0x8, 0x0, 0x5, 0x50031dd1e89e26d1, @perf_bp={&(0x7f0000001bc0), 0x2}, 0x10000, 0x3a, 0x80000001, 0x1, 0x2c, 0x3ff, 0x6}, r6, 0x6, r3, 0x3) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000001c80)=r0, 0x4) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000001cc0)) ioctl$PERF_EVENT_IOC_REFRESH(r7, 0x2402, 0xffffffff) r8 = perf_event_open(&(0x7f0000001d00)={0x0, 0x70, 0x7, 0x400, 0x100, 0xac, 0x0, 0x100000000, 0xc2800, 0xa, 0x33e3, 0x2, 0x10001, 0x8, 0x5, 0x100000001, 0x2e9, 0x2, 0xc1, 0xf2, 0x2, 0x9, 0xffff, 0x7, 0x1, 0x0, 0x8000, 0x800, 0xfffffffffffffffa, 0x40, 0x0, 0x3, 0x6, 0xfa4, 0x7, 0xffffffffffff8000, 0x0, 0x0, 0x0, 0x8000, 0x3, @perf_config_ext={0x400}, 0x100, 0xa264, 0x4, 0x7, 0x2, 0x1000, 0x92}, r6, 0x5, r7, 0x1) socketpair(0x7, 0x6, 0x1, &(0x7f0000001d80)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000001e00)={&(0x7f0000001dc0)='./file0\x00', r9}, 0x10) r10 = perf_event_open(&(0x7f0000001e40)={0x4, 0x70, 0x5, 0x4, 0x8, 0x6, 0x0, 0x2, 0x1425, 0xb, 0x0, 0xcc9, 0x400, 0x57f90db4, 0x80000000, 0x7, 0x1000, 0x0, 0x8, 0x8000, 0xffffffff, 0x400, 0x1, 0x6, 0x40, 0x2, 0x10000, 0x8, 0x9, 0xfffffffffffffff8, 0x9, 0x4, 0x3, 0x400, 0x3, 0x9, 0x3, 0x100, 0x0, 0x6, 0x0, @perf_config_ext={0x4, 0x2}, 0x20, 0x3ff, 0x0, 0x7, 0x3, 0x5, 0xfa5e}, r6, 0xd, r7, 0x2) bpf$OBJ_GET_MAP(0x7, &(0x7f0000001f00)={&(0x7f0000001ec0)='./file0\x00'}, 0x10) socketpair$inet6_sctp(0xa, 0x0, 0x84, &(0x7f0000001f40)) ioctl$PERF_EVENT_IOC_DISABLE(r10, 0x2401, 0xbad) r11 = perf_event_open(&(0x7f0000001fc0)={0x3, 0x70, 0xff, 0x2f, 0x2, 0x7, 0x0, 0x40, 0x80000, 0x1, 0x8, 0x6, 0xfffffffffffffffb, 0x7, 0x2, 0x10000, 0x6, 0x5, 0x0, 0x10, 0x6, 0xc58, 0x7f, 0x3, 0x2, 0x3, 0x5, 0x80000000800000, 0x7, 0xfff, 0x16, 0x2b65, 0x9, 0x69244395, 0x10000, 0x4, 0x9, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000001f80), 0x8}, 0x100, 0x8, 0x51b4, 0x4, 0x800, 0xb7, 0x4800}, r6, 0x8, r8, 0x1) r12 = gettid() socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000002040)) perf_event_open(&(0x7f0000002080)={0x0, 0x70, 0x100, 0x0, 0x2, 0x401, 0x0, 0x6, 0x1, 0x6, 0x656, 0x5, 0xfffffffffffff973, 0xffffffffffffffff, 0x9, 0x7, 0x3, 0x3ff, 0x1c000000, 0x10000, 0x6, 0x20, 0x6, 0x1, 0x1, 0x4, 0x2, 0x20, 0x9, 0xed5, 0x847, 0x1000, 0x0, 0x0, 0x102bed3b, 0x9, 0x7fffffff, 0x6, 0x0, 0x24, 0x0, @perf_config_ext={0x100000001, 0x6}, 0x200, 0x800000010000000, 0x7, 0x7, 0x1000, 0xf3, 0xe87}, r12, 0xf, r11, 0x8) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000002100)) perf_event_open(&(0x7f0000002180)={0x4, 0x70, 0x0, 0x8, 0xff, 0x0, 0x0, 0xfffffffffffffff9, 0x10001, 0x3, 0xffffffffffffff00, 0x0, 0x1, 0x4e5e, 0x8001, 0xfffffffffffffff8, 0x7, 0x1f4, 0x80000001, 0x99b, 0x4, 0x8, 0xed8, 0x3f, 0xec9, 0x6, 0x1, 0x4ab8, 0x8, 0x2, 0xdd, 0x9, 0xffffffffffffffff, 0x8000, 0x0, 0x6, 0xffff, 0x8, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000002140), 0xf}, 0x400, 0x5, 0x7, 0x4, 0x7, 0x4}, r12, 0x3, r7, 0x8) 2018/03/31 09:08:17 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000a40)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x0, 0x0) socketpair(0x2, 0x0, 0x0, &(0x7f0000000640)={0xffffffffffffffff}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r6 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x0, 0x10000, 0x1182, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f00000009c0)={r4}) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000280)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000a00)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg(r3, &(0x7f0000000cc0)={&(0x7f0000000400)=@ethernet={0x1}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000580)="4589496d6a3bfcccae07dc729c52ee6bdf10d9cf221f605c25f790103018703b9a67491f96c3f9f8d07204ee4adf21acce1afdaedaba1228b4d33c3fa702a46b1329a0e52eea6a7908fd375ace47", 0x4e}], 0x1, &(0x7f0000000700), 0x0, 0x40000}, 0x4044080) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000740)={r5, &(0x7f0000000700)="ec1b815b5cc95d6e0dff859791e3341b8790dcb187f25418"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") close(0xffffffffffffffff) 2018/03/31 09:08:17 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x5, 0x0, 0x0, 0x5}, 0x2c) r1 = bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x13, 0x0, 0x0, 0x0, 0x20000003, 0x0}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x3e83, 0x8, r1}, 0x2c) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x50, &(0x7f0000000140)={0x0, 0x0}}, 0x10) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, r2, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) socketpair(0x4, 0x1, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000480)={r5, &(0x7f0000000440)="3068306ef4a0ff8256b6430a042a9b"}, 0x10) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x0, 0x8, 0x0, 0x0, r0, 0x6}, 0x2c) socketpair(0x8, 0x2, 0x0, &(0x7f0000000040)) r6 = gettid() bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=r3, 0x4) perf_event_open(&(0x7f00000003c0)={0x7, 0x70, 0x7fff, 0x5, 0x6, 0x8000, 0x0, 0x1000, 0x0, 0x7, 0x1000, 0x1, 0xffffffff, 0x3, 0xaf99, 0x40, 0x8001, 0xfffffffffffffffa, 0x1, 0x80000000, 0xe6d1, 0x4, 0x8001, 0x9, 0x1f, 0xfffffffffffffc00, 0x0, 0x0, 0x7ff, 0x15ac000000000000, 0x0, 0x3, 0x1, 0xfffffffffffffffe, 0x0, 0xff, 0x1, 0x2, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000002c0), 0x8}, 0x8004, 0x3, 0x6, 0x1, 0x5, 0xb03c, 0x5}, r6, 0xc, 0xffffffffffffffff, 0xb) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000280)={0xffffffffffffffff, 0xffffff8f, &(0x7f0000000300)}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000600)={0xffffffffffffffff, &(0x7f00000004c0)="648d1c6e4e7374f62b21f1c71a7cd05c41e2a0bf36f2f23f5761a39646321c3b5e4e670bd9a8f7a3fc36d594c1799d7dec6f0ba644a16abd532529ac63497998169000b2e491e82f659738895262b6fc9c79d8e6736c91136937b9", &(0x7f0000000540)="0c39cf9403045550ce39840a2a90ca20bc744608140dcd6c55d855533bb97417ef0cd19e1990bf245f0f38ab76b7f283d20500e75742ca4151b5489f5848a6b6104b0334b5427d07a3464ecffbfda64068c2d7ea6c230ba9040eebaec2030d19884f9f815ab793bd836fdb9c142a7aa9510939e2d3b5e6f57fa56f5464911bd939ca0ab0a1c19407fc9b1b974b94401f7c82bce0926bd5"}, 0x20) 2018/03/31 09:08:17 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x0, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r7 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) ioctl$PERF_EVENT_IOC_RESET(r5, 0x2403, 0x2) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f00000009c0)={r4}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r7, 0x40042408, 0xffffffffffffffff) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) ioctl$PERF_EVENT_IOC_RESET(r4, 0x2403, 0x2) sendmsg(r3, &(0x7f0000000cc0)={&(0x7f0000000400)=@ethernet={0x1}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000580)="4589496d6a3bfcccae07dc729c52ee6bdf10d9cf221f605c25f790103018703b9a67491f96c3f9f8d07204ee4adf21acce1afdaedaba1228b4d33c3fa702a46b1329a0e52eea6a7908fd375ace47", 0x4e}], 0x1, &(0x7f0000000700), 0x0, 0x40000}, 0x4044080) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000280)={r6, &(0x7f0000000700)="ec1b815b5cc95d6e0dff859791e3341b"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)={0x3, 0x40000100, 0x56c96e7a, 0xea, 0x1, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") close(0xffffffffffffffff) 2018/03/31 09:08:17 executing program 7: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)={0xffffffffffffffff}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x0, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r5 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x0, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f00000009c0)={r4}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg(r3, &(0x7f0000000cc0)={&(0x7f0000000400)=@ethernet={0x1}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000580)="4589496d6a3bfcccae07dc729c52ee6bdf10d9cf221f605c25f790103018703b9a67491f96c3f9f8d07204ee4adf21acce1afdaedaba1228b4d33c3fa702a46b1329a0e52eea6a7908fd375ace47", 0x4e}], 0x1, &(0x7f0000000700), 0x0, 0x40000}, 0x4044080) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000740)={0xffffffffffffffff, &(0x7f0000000700)="ec1b815b5cc95d6e0dff859791e3341b8790dcb187f25418f8003a2b3bf345"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97f") close(0xffffffffffffffff) 2018/03/31 09:08:17 executing program 1 (fault-call:20 fault-nth:14): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)={0xffffffffffffffff}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x0, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r5 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f00000009c0)={r4}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg(r3, &(0x7f0000000cc0)={&(0x7f0000000400)=@ethernet={0x1}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000580)="4589496d6a3bfcccae07dc729c52ee6bdf10d9cf221f605c25f790103018703b9a67491f96c3f9f8d07204ee4adf21acce1afdaedaba1228b4d33c3fa702a46b1329a0e52eea6a7908fd375ace47", 0x4e}], 0x1, &(0x7f0000000700), 0x0, 0x40000}, 0x4044080) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000740)={0xffffffffffffffff, &(0x7f0000000700)="ec1b815b5cc95d6e0dff859791e3341b8790dcb187f25418f8003a2b3bf345dc"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") close(0xffffffffffffffff) 2018/03/31 09:08:17 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x5, 0x100000000209e20, 0x8000000001, 0x5}, 0x2c) r1 = bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x13, 0x0, 0x7ffff9, 0x0, 0x20000003, 0x0}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xe, 0x0, 0x7f, 0x3e83, 0x8, r1, 0x80000000}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f00000005c0)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x50, &(0x7f0000000140)={0x0, 0x0}}, 0x10) socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='bpf\x00', 0x88, &(0x7f0000000580)="c36afc6aeba8c6e75b95f67e4ee49674fca76951") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) socketpair(0x4, 0x1, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r3, 0x2401, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000480)={r4, &(0x7f0000000440)="3068306ef4a0ff8256b6430a042a9b"}, 0x10) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40042409, 0x1) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r3) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x0, 0x8, 0x0, 0x0, r0, 0x6}, 0x2c) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)) perf_event_open(&(0x7f000025c000)={0x5, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = gettid() r6 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0xfff, 0x100000001, 0xfffffffffffffffb, 0x0, 0x8001, 0x0, 0x1, 0x0, 0xfffffffffffffff9, 0x0, 0x9, 0x9, 0x5, 0x8, 0x1, 0x8106, 0x0, 0x14000000000, 0x80000000, 0x1, 0x5, 0x0, 0x40, 0x2839, 0x1d, 0x800, 0x7, 0x0, 0x0, 0x5, 0x7, 0x0, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x4}, 0x0, 0x0, 0xff, 0x0, 0x3, 0x8, 0x3}, r5, 0x2, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000600)=r2, 0x0) perf_event_open(&(0x7f00000003c0)={0x7, 0x70, 0x7fff, 0x5, 0x6, 0x8000, 0x0, 0x1000, 0x0, 0x7, 0x1000, 0x1, 0xffffffff, 0x3, 0xaf99, 0x40, 0x8001, 0xfffffffffffffffa, 0x1, 0x80000000, 0xe6d1, 0x4, 0x8001, 0x9, 0x1f, 0xfffffffffffffc00, 0x0, 0x0, 0x7ff, 0x15ac000000000000, 0x0, 0x3, 0x1, 0xfffffffffffffffe, 0x9, 0xff, 0x1, 0x2, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000002c0), 0x8}, 0x0, 0x3, 0x6, 0x1, 0x5, 0xb03c, 0x5}, r5, 0xc, r6, 0xb) bpf$MAP_CREATE(0x0, &(0x7f0000000640)={0x8, 0x6bcb8e63, 0x0, 0x59ad, 0x12, r0, 0x8001}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000880)={r0, &(0x7f0000000840), &(0x7f00000008c0)=""/70}, 0x375) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000280)={0xffffffffffffffff, 0xffffff8f, &(0x7f0000000300)}, 0x10) [ 357.309606] RIP: 0033:0x454e79 [ 357.312769] RSP: 002b:00007fed74635c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 357.320451] RAX: ffffffffffffffda RBX: 00007fed746366d4 RCX: 0000000000454e79 [ 357.327695] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 357.334938] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 357.342180] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000016 [ 357.349427] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000000d [ 357.468262] FAULT_INJECTION: forcing a failure. [ 357.468262] name failslab, interval 1, probability 0, space 0, times 0 [ 357.479549] CPU: 1 PID: 9943 Comm: syz-executor1 Not tainted 4.16.0-rc6+ #43 [ 357.486734] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 357.496081] Call Trace: [ 357.498653] dump_stack+0x194/0x24d [ 357.502258] ? arch_local_irq_restore+0x53/0x53 [ 357.506908] ? __save_stack_trace+0x7e/0xd0 [ 357.511217] should_fail+0x8c0/0xa40 [ 357.514910] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 357.519994] ? kasan_kmalloc+0xad/0xe0 [ 357.523860] ? kmem_cache_alloc_trace+0x136/0x740 [ 357.528677] ? __memcg_init_list_lru_node+0x169/0x270 [ 357.533843] ? __list_lru_init+0x544/0x750 [ 357.538055] ? sget_userns+0x691/0xe40 [ 357.541927] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 357.546656] ? do_mount+0xea4/0x2bb0 [ 357.550345] ? SyS_mount+0xab/0x120 [ 357.553948] ? do_syscall_64+0x281/0x940 [ 357.557987] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 357.563332] ? find_held_lock+0x35/0x1d0 [ 357.567371] ? __lock_is_held+0xb6/0x140 [ 357.571416] ? check_same_owner+0x320/0x320 [ 357.575718] ? rcu_note_context_switch+0x710/0x710 [ 357.580625] should_failslab+0xec/0x120 [ 357.584576] kmem_cache_alloc_trace+0x4b/0x740 [ 357.589132] ? __kmalloc_node+0x33/0x70 [ 357.593079] ? __kmalloc_node+0x33/0x70 [ 357.597033] ? rcu_read_lock_sched_held+0x108/0x120 [ 357.602031] __memcg_init_list_lru_node+0x169/0x270 [ 357.607028] ? list_lru_add+0x7c0/0x7c0 [ 357.610979] ? __kmalloc_node+0x47/0x70 [ 357.614930] __list_lru_init+0x544/0x750 [ 357.618972] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 357.624835] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 357.629830] ? __lockdep_init_map+0xe4/0x650 [ 357.634218] ? lockdep_init_map+0x9/0x10 [ 357.638259] sget_userns+0x691/0xe40 [ 357.641947] ? set_anon_super+0x20/0x20 [ 357.645898] ? put_filp+0x90/0x90 [ 357.649327] ? destroy_unused_super.part.6+0xd0/0xd0 [ 357.654416] ? alloc_vfsmnt+0x762/0x9c0 [ 357.658366] ? path_lookupat+0x238/0xba0 [ 357.662405] ? mnt_free_id.isra.21+0x50/0x50 [ 357.666789] ? trace_hardirqs_off+0x10/0x10 [ 357.671085] ? putname+0xee/0x130 [ 357.674517] ? cap_capable+0x1b5/0x230 [ 357.678383] ? security_capable+0x8e/0xc0 [ 357.682513] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 357.687681] ? ns_capable_common+0xcf/0x160 [ 357.691990] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 357.697157] mount_ns+0x6d/0x190 [ 357.700501] rpc_mount+0x9e/0xd0 [ 357.703843] mount_fs+0x66/0x2d0 [ 357.707185] vfs_kern_mount.part.26+0xc6/0x4a0 [ 357.711745] ? may_umount+0xa0/0xa0 [ 357.715349] ? _raw_read_unlock+0x22/0x30 [ 357.719472] ? __get_fs_type+0x8a/0xc0 [ 357.723337] do_mount+0xea4/0x2bb0 [ 357.726853] ? __might_fault+0x110/0x1d0 [ 357.730892] ? copy_mount_string+0x40/0x40 [ 357.735101] ? check_same_owner+0x320/0x320 [ 357.739400] ? __check_object_size+0x8b/0x530 [ 357.743872] ? __might_sleep+0x95/0x190 [ 357.747827] ? kasan_check_write+0x14/0x20 [ 357.752038] ? _copy_from_user+0x99/0x110 [ 357.756163] ? memdup_user+0x5e/0x90 [ 357.759853] ? copy_mount_options+0x1f7/0x2e0 [ 357.764323] SyS_mount+0xab/0x120 [ 357.767752] ? copy_mnt_ns+0xb30/0xb30 [ 357.771614] do_syscall_64+0x281/0x940 [ 357.775477] ? vmalloc_sync_all+0x30/0x30 [ 357.779610] ? _raw_spin_unlock_irq+0x27/0x70 [ 357.784083] ? finish_task_switch+0x1c1/0x7e0 [ 357.788555] ? syscall_return_slowpath+0x550/0x550 [ 357.793462] ? syscall_return_slowpath+0x2ac/0x550 [ 357.798368] ? prepare_exit_to_usermode+0x350/0x350 [ 357.803361] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 357.808703] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 357.813522] entry_SYSCALL_64_after_hwframe+0x42/0xb7 2018/03/31 09:08:18 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xf, 0x5, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x80000000}, [@map={0x18, 0x1, 0x1, 0x0, 0x1}], {0x95}}, &(0x7f0000000040)='syzkaller\x00', 0x3, 0x10, &(0x7f0000000080)=""/16, 0x41000, 0x2f3100a785778bd1}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000001c0)={r0, 0x50, &(0x7f0000000140)}, 0x10) close(r0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000780)={&(0x7f0000000240)=@ax25, 0x80, &(0x7f0000000600)=[{&(0x7f00000002c0)=""/114, 0x72}, {&(0x7f0000000340)=""/133, 0x85}, {&(0x7f0000000400)=""/23, 0x17}, {&(0x7f0000000440)=""/59, 0x3b}, {&(0x7f0000000480)=""/114, 0x72}, {&(0x7f0000000500)=""/45, 0x2d}, {&(0x7f0000000540)=""/83, 0x53}, {&(0x7f00000005c0)}], 0x8, &(0x7f0000000680)=""/214, 0xd6, 0x100}, 0x40) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000007c0)={0xffffffffffffffff}) recvmsg(r2, &(0x7f00000019c0)={&(0x7f0000000800)=@ax25, 0x80, &(0x7f00000018c0)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000001880)=""/18, 0x12}], 0x2, &(0x7f0000001900)=""/184, 0xb8, 0x3}, 0x1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001a80)={r4, 0x50, &(0x7f0000001a00)}, 0x10) r5 = perf_event_open(&(0x7f0000001b00)={0x2, 0x70, 0x6, 0x8, 0x80000000, 0x10001, 0x0, 0x7ff, 0x4, 0xa, 0x200, 0x20, 0x72, 0x5, 0x0, 0x0, 0x5, 0x8f, 0x9ed, 0xff, 0x0, 0xa58, 0x7f, 0xf2f, 0x4503, 0x6, 0x81, 0x5, 0x1ff, 0xffffffff00000000, 0x2, 0x5, 0x9000000000000, 0xfffffffffffffffa, 0x8, 0x10001, 0x731ab510, 0x9, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000001ac0), 0x1}, 0x80, 0x2b4, 0x200, 0x3, 0x6, 0x9, 0x4}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0x20000) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000001b80)) r6 = getpid() r7 = perf_event_open(&(0x7f0000001c00)={0x1, 0x70, 0x0, 0xfff, 0x4, 0x80000000, 0x0, 0x3, 0x40, 0xa, 0x7, 0x7, 0x7, 0x4800000000000000, 0x7, 0x6, 0x62b, 0x8, 0x9, 0x100000000, 0x1, 0x0, 0x5, 0xd199, 0x1f, 0x10000, 0xff80000000000000, 0x3, 0x4, 0x8, 0x80000001, 0x8000, 0x7fff, 0x4, 0x16, 0x7, 0x40, 0x8, 0x0, 0x5, 0x50031dd1e89e26d1, @perf_bp={&(0x7f0000001bc0), 0x2}, 0x10000, 0x3a, 0x80000001, 0x1, 0x2c, 0x3ff, 0x6}, r6, 0x6, r3, 0x3) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000001c80)=r0, 0x4) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000001cc0)) ioctl$PERF_EVENT_IOC_REFRESH(r7, 0x2402, 0xffffffff) r8 = perf_event_open(&(0x7f0000001d00)={0x0, 0x70, 0x7, 0x400, 0x100, 0xac, 0x0, 0x100000000, 0xc2800, 0xa, 0x33e3, 0x2, 0x10001, 0x8, 0x5, 0x100000001, 0x2e9, 0x2, 0xc1, 0xf2, 0x2, 0x9, 0xffff, 0x7, 0x1, 0x0, 0x8000, 0x800, 0xfffffffffffffffa, 0x40, 0x0, 0x3, 0x6, 0xfa4, 0x7, 0xffffffffffff8000, 0x0, 0x0, 0x0, 0x8000, 0x3, @perf_config_ext={0x400}, 0x100, 0xa264, 0x4, 0x7, 0x2, 0x1000, 0x92}, r6, 0x5, r7, 0x1) socketpair(0x7, 0x6, 0x1, &(0x7f0000001d80)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000001e00)={&(0x7f0000001dc0)='./file0\x00', r9}, 0x10) r10 = perf_event_open(&(0x7f0000001e40)={0x4, 0x70, 0x5, 0x4, 0x8, 0x6, 0x0, 0x2, 0x1425, 0xb, 0x0, 0xcc9, 0x400, 0x57f90db4, 0x80000000, 0x7, 0x1000, 0x0, 0x8, 0x8000, 0xffffffff, 0x400, 0x1, 0x6, 0x40, 0x2, 0x10000, 0x8, 0x9, 0xfffffffffffffff8, 0x9, 0x4, 0x3, 0x400, 0x3, 0x9, 0x3, 0x100, 0x0, 0x6, 0x0, @perf_config_ext={0x4, 0x2}, 0x20, 0x3ff, 0x0, 0x7, 0x3, 0x5, 0xfa5e}, r6, 0xd, r7, 0x2) bpf$OBJ_GET_MAP(0x7, &(0x7f0000001f00)={&(0x7f0000001ec0)='./file0\x00'}, 0x10) socketpair$inet6_sctp(0xa, 0x0, 0x84, &(0x7f0000001f40)) ioctl$PERF_EVENT_IOC_DISABLE(r10, 0x2401, 0xbad) r11 = perf_event_open(&(0x7f0000001fc0)={0x3, 0x70, 0xff, 0x2f, 0x2, 0x7, 0x0, 0x40, 0x80000, 0x1, 0x8, 0x6, 0xfffffffffffffffb, 0x7, 0x2, 0x10000, 0x6, 0x5, 0x0, 0x10, 0x6, 0xc58, 0x7f, 0x3, 0x2, 0x3, 0x5, 0x80000000800000, 0x7, 0xfff, 0x16, 0x2b65, 0x9, 0x69244395, 0x10000, 0x4, 0x9, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000001f80), 0x8}, 0x100, 0x8, 0x51b4, 0x4, 0x800, 0xb7, 0x4800}, r6, 0x8, r8, 0x1) r12 = gettid() socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000002040)) perf_event_open(&(0x7f0000002080)={0x0, 0x70, 0x100, 0x0, 0x2, 0x401, 0x0, 0x6, 0x1, 0x6, 0x656, 0x5, 0xfffffffffffff973, 0xffffffffffffffff, 0x9, 0x7, 0x3, 0x3ff, 0x1c000000, 0x10000, 0x6, 0x20, 0x6, 0x1, 0x1, 0x4, 0x2, 0x20, 0x9, 0xed5, 0x847, 0x1000, 0x0, 0x0, 0x102bed3b, 0x9, 0x7fffffff, 0x6, 0x0, 0x24, 0x0, @perf_config_ext={0x100000001, 0x6}, 0x200, 0x800000010000000, 0x7, 0x7, 0x1000, 0xf3, 0xe87}, r12, 0xf, r11, 0x8) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000002100)) perf_event_open(&(0x7f0000002180)={0x4, 0x70, 0x0, 0x8, 0xff, 0x0, 0x0, 0xfffffffffffffff9, 0x10001, 0x3, 0xffffffffffffff00, 0x0, 0x1, 0x4e5e, 0x8001, 0xfffffffffffffff8, 0x7, 0x1f4, 0x80000001, 0x99b, 0x4, 0x8, 0xed8, 0x3f, 0xec9, 0x6, 0x1, 0x4ab8, 0x8, 0x2, 0xdd, 0x9, 0xffffffffffffffff, 0x8000, 0x0, 0x6, 0xffff, 0x8, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000002140), 0xf}, 0x400, 0x5, 0x7, 0x4, 0x7, 0x4}, r12, 0x3, r7, 0x8) 2018/03/31 09:08:18 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x0, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r7 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) ioctl$PERF_EVENT_IOC_RESET(r5, 0x2403, 0x2) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f00000009c0)={r4}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) ioctl$PERF_EVENT_IOC_RESET(r4, 0x2403, 0x2) sendmsg(r3, &(0x7f0000000cc0)={&(0x7f0000000400)=@ethernet={0x1}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000580)="4589496d6a3bfcccae07dc729c52ee6bdf10d9cf221f605c25f790103018703b9a67491f96c3f9f8d07204ee4adf21acce1afdaedaba1228b4d33c3fa702a46b1329a0e52eea6a7908fd375ace47", 0x4e}], 0x1, &(0x7f0000000700), 0x0, 0x40000}, 0x4044080) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000280)={r6, &(0x7f0000000700)="ec1b815b5cc95d6e0dff859791e3341b"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)={0x3, 0x40000100, 0x56c96e7a, 0xea, 0x1, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") close(0xffffffffffffffff) 2018/03/31 09:08:18 executing program 7: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)={0xffffffffffffffff}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x0, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r5 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x0, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f00000009c0)={r4}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg(r3, &(0x7f0000000cc0)={&(0x7f0000000400)=@ethernet={0x1}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000580)="4589496d6a3bfcccae07dc729c52ee6bdf10d9cf221f605c25f790103018703b9a67491f96c3f9f8d07204ee4adf21acce1afdaedaba1228b4d33c3fa702a46b1329a0e52eea6a7908fd375ace47", 0x4e}], 0x1, &(0x7f0000000700), 0x0, 0x40000}, 0x4044080) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000740)={0xffffffffffffffff, &(0x7f0000000700)="ec1b815b5cc95d6e0dff859791e3341b8790dcb187f25418f8003a2b3bf345"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97f") close(0xffffffffffffffff) [ 357.818686] RIP: 0033:0x454e79 [ 357.821850] RSP: 002b:00007fed74635c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 357.829534] RAX: ffffffffffffffda RBX: 00007fed746366d4 RCX: 0000000000454e79 [ 357.836779] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 357.844028] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 357.851273] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000016 [ 357.858519] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000000e 2018/03/31 09:08:18 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x5, 0x0, 0x0, 0x5}, 0x2c) r1 = bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x13, 0x0, 0x0, 0x0, 0x20000003, 0x0}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x3e83, 0x8, r1}, 0x2c) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x50, &(0x7f0000000140)={0x0, 0x0}}, 0x10) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, r2, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) socketpair(0x4, 0x1, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000480)={r5, &(0x7f0000000440)="3068306ef4a0ff8256b6430a042a9b"}, 0x10) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x0, 0x8, 0x0, 0x0, r0, 0x6}, 0x2c) socketpair(0x8, 0x2, 0x0, &(0x7f0000000040)) r6 = gettid() bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=r3, 0x4) perf_event_open(&(0x7f00000003c0)={0x7, 0x70, 0x7fff, 0x5, 0x6, 0x8000, 0x0, 0x1000, 0x0, 0x7, 0x1000, 0x1, 0xffffffff, 0x3, 0xaf99, 0x40, 0x8001, 0xfffffffffffffffa, 0x1, 0x80000000, 0xe6d1, 0x4, 0x8001, 0x9, 0x1f, 0xfffffffffffffc00, 0x0, 0x0, 0x7ff, 0x15ac000000000000, 0x0, 0x3, 0x1, 0xfffffffffffffffe, 0x0, 0xff, 0x1, 0x2, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000002c0), 0x8}, 0x8004, 0x3, 0x6, 0x1, 0x5, 0xb03c, 0x5}, r6, 0xc, 0xffffffffffffffff, 0xb) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000280)={0xffffffffffffffff, 0xffffff8f, &(0x7f0000000300)}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000600)={0xffffffffffffffff, &(0x7f00000004c0)="648d1c6e4e7374f62b21f1c71a7cd05c41e2a0bf36f2f23f5761a39646321c3b5e4e670bd9a8f7a3fc36d594c1799d7dec6f0ba644a16abd532529ac63497998169000b2e491e82f659738895262b6fc9c79d8e6736c91136937b9", &(0x7f0000000540)="0c39cf9403045550ce39840a2a90ca20bc744608140dcd6c55d855533bb97417ef0cd19e1990bf245f0f38ab76b7f283d20500e75742ca4151b5489f5848a6b6104b0334b5427d07a3464ecffbfda64068c2d7ea6c230ba9040eebaec2030d19884f9f815ab793bd836fdb9c142a7aa9510939e2d3b5e6f57fa56f5464911bd939ca0ab0a1c19407fc9b1b974b94401f7c82bce0926bd5"}, 0x20) 2018/03/31 09:08:18 executing program 1 (fault-call:20 fault-nth:15): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)={0xffffffffffffffff}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x0, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r5 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f00000009c0)={r4}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg(r3, &(0x7f0000000cc0)={&(0x7f0000000400)=@ethernet={0x1}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000580)="4589496d6a3bfcccae07dc729c52ee6bdf10d9cf221f605c25f790103018703b9a67491f96c3f9f8d07204ee4adf21acce1afdaedaba1228b4d33c3fa702a46b1329a0e52eea6a7908fd375ace47", 0x4e}], 0x1, &(0x7f0000000700), 0x0, 0x40000}, 0x4044080) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000740)={0xffffffffffffffff, &(0x7f0000000700)="ec1b815b5cc95d6e0dff859791e3341b8790dcb187f25418f8003a2b3bf345dc"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") close(0xffffffffffffffff) 2018/03/31 09:08:18 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x5, 0x100000000209e20, 0x8000000001, 0x5}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x13, 0x0, 0x7ffff9, 0x0, 0x0, 0x0}, 0x2c) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x13, 0x0, 0x7ffff9, 0x0, 0x20000003, 0x0}, 0x2c) 2018/03/31 09:08:18 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x5, 0x100000000209e20, 0x8000000001, 0x5}, 0x2c) r1 = socket$kcm(0x29, 0x2, 0x0) recvmsg(r1, &(0x7f0000000600)={&(0x7f00000004c0)=@vsock={0x0, 0x0, 0x0, @my}, 0x80, &(0x7f0000000ac0)=[{&(0x7f0000000540)=""/44, 0x2c}, {&(0x7f0000000580)=""/8, 0x8}, {&(0x7f0000000680)=""/252, 0xfc}, {&(0x7f0000000780)=""/167, 0xa7}, {&(0x7f00000005c0)=""/35, 0x23}, {&(0x7f0000000940)=""/236, 0xec}, {&(0x7f0000000a40)=""/87, 0x57}], 0x7, 0x0, 0x0, 0x3}, 0x2003) r2 = bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x13, 0x0, 0x7ffff9, 0x0, 0x20000003, 0x0}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xe, 0x0, 0x7f, 0x3e83, 0x8, r2, 0x80000000}, 0x2c) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x50, &(0x7f0000000140)={0x0, 0x0}}, 0x10) socket$kcm(0x29, 0x2, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) socketpair(0x4, 0x1, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000480)={r5, &(0x7f0000000440)="3068306ef4a0ff8256b6430a042a9b"}, 0x10) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x1) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r4) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x0, 0x8, 0x0, 0x0, r0, 0x6}, 0x2c) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)) perf_event_open(&(0x7f000025c000)={0x5, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = gettid() r7 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0xfff, 0x100000001, 0xfffffffffffffffb, 0x0, 0x8001, 0x0, 0x1, 0x0, 0xfffffffffffffff9, 0x0, 0x9, 0x9, 0x5, 0x8, 0x1, 0x8106, 0x0, 0x14000000000, 0x80000000, 0x1, 0x5, 0x0, 0x40, 0x2839, 0x1d, 0x800, 0x7, 0x0, 0x0, 0x5, 0x7, 0x0, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x4}, 0x0, 0x0, 0xff, 0x0, 0x3, 0x8, 0x3}, r6, 0x2, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=r3, 0x4) perf_event_open(&(0x7f00000003c0)={0x7, 0x70, 0x7fff, 0x5, 0x6, 0x8000, 0x0, 0x1000, 0x0, 0x7, 0x1000, 0x1, 0xffffffff, 0x3, 0xaf99, 0x40, 0x8001, 0xfffffffffffffffa, 0x1, 0x80000000, 0xe6d1, 0x4, 0x8001, 0x9, 0x1f, 0xfffffffffffffc00, 0x0, 0x0, 0x7ff, 0x15ac000000000000, 0x0, 0x3, 0x1, 0xfffffffffffffffe, 0x9, 0xff, 0x1, 0x2, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000002c0), 0x8}, 0x0, 0x3, 0x6, 0x1, 0x5, 0xb03c, 0x5}, r6, 0xc, r7, 0xb) bpf$MAP_CREATE(0x0, &(0x7f0000000640)={0x8, 0x6bcb8e63, 0x0, 0x59ad, 0x12, r0, 0x8001}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000880)={r0, &(0x7f0000000840), &(0x7f00000008c0)=""/70}, 0x375) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000280)={0xffffffffffffffff, 0xffffff8f, &(0x7f0000000300)}, 0x10) 2018/03/31 09:08:18 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000a40)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x0, 0x0) socketpair(0x2, 0x0, 0x0, &(0x7f0000000640)={0xffffffffffffffff}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r6 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x0, 0x10000, 0x1182, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f00000009c0)={r4}) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000280)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000a00)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg(r3, &(0x7f0000000cc0)={&(0x7f0000000400)=@ethernet={0x1}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000580)="4589496d6a3bfcccae07dc729c52ee6bdf10d9cf221f605c25f790103018703b9a67491f96c3f9f8d07204ee4adf21acce1afdaedaba1228b4d33c3fa702a46b1329a0e52eea6a7908fd375ace47", 0x4e}], 0x1, &(0x7f0000000700), 0x0, 0x40000}, 0x4044080) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000740)={r5, &(0x7f0000000700)="ec1b815b5cc95d6e0dff859791e3341b8790dcb187f25418f8003a2b"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") close(0xffffffffffffffff) 2018/03/31 09:08:18 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xf, 0x5, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x80000000}, [@map={0x18, 0x1, 0x1, 0x0, 0x1}], {0x95}}, &(0x7f0000000040)='syzkaller\x00', 0x3, 0x10, &(0x7f0000000080)=""/16, 0x41000, 0x2f3100a785778bd1}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000001c0)={r0, 0x50, &(0x7f0000000140)}, 0x10) close(r0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000780)={&(0x7f0000000240)=@ax25, 0x80, &(0x7f0000000600)=[{&(0x7f00000002c0)=""/114, 0x72}, {&(0x7f0000000340)=""/133, 0x85}, {&(0x7f0000000400)=""/23, 0x17}, {&(0x7f0000000440)=""/59, 0x3b}, {&(0x7f0000000480)=""/114, 0x72}, {&(0x7f0000000500)=""/45, 0x2d}, {&(0x7f0000000540)=""/83, 0x53}, {&(0x7f00000005c0)}], 0x8, &(0x7f0000000680)=""/214, 0xd6, 0x100}, 0x40) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000007c0)={0xffffffffffffffff}) recvmsg(r2, &(0x7f00000019c0)={&(0x7f0000000800)=@ax25, 0x80, &(0x7f00000018c0)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000001880)=""/18, 0x12}], 0x2, &(0x7f0000001900)=""/184, 0xb8, 0x3}, 0x1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001a80)={r4, 0x50, &(0x7f0000001a00)}, 0x10) r5 = perf_event_open(&(0x7f0000001b00)={0x2, 0x70, 0x6, 0x8, 0x80000000, 0x10001, 0x0, 0x7ff, 0x4, 0xa, 0x200, 0x20, 0x72, 0x5, 0x0, 0x0, 0x5, 0x8f, 0x9ed, 0xff, 0x0, 0xa58, 0x7f, 0xf2f, 0x4503, 0x6, 0x81, 0x5, 0x1ff, 0xffffffff00000000, 0x2, 0x5, 0x9000000000000, 0xfffffffffffffffa, 0x8, 0x10001, 0x731ab510, 0x9, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000001ac0), 0x1}, 0x80, 0x2b4, 0x200, 0x3, 0x6, 0x9, 0x4}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0x20000) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000001b80)) r6 = getpid() r7 = perf_event_open(&(0x7f0000001c00)={0x1, 0x70, 0x0, 0xfff, 0x4, 0x80000000, 0x0, 0x3, 0x40, 0xa, 0x7, 0x7, 0x7, 0x4800000000000000, 0x7, 0x6, 0x62b, 0x8, 0x9, 0x100000000, 0x1, 0x0, 0x5, 0xd199, 0x1f, 0x10000, 0xff80000000000000, 0x3, 0x4, 0x8, 0x80000001, 0x8000, 0x7fff, 0x4, 0x16, 0x7, 0x40, 0x8, 0x0, 0x5, 0x50031dd1e89e26d1, @perf_bp={&(0x7f0000001bc0), 0x2}, 0x10000, 0x3a, 0x80000001, 0x1, 0x2c, 0x3ff, 0x6}, r6, 0x6, r3, 0x3) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000001c80)=r0, 0x4) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000001cc0)) ioctl$PERF_EVENT_IOC_REFRESH(r7, 0x2402, 0xffffffff) r8 = perf_event_open(&(0x7f0000001d00)={0x0, 0x70, 0x7, 0x400, 0x100, 0xac, 0x0, 0x100000000, 0xc2800, 0xa, 0x33e3, 0x2, 0x10001, 0x8, 0x5, 0x100000001, 0x2e9, 0x2, 0xc1, 0xf2, 0x2, 0x9, 0xffff, 0x7, 0x1, 0x0, 0x8000, 0x800, 0xfffffffffffffffa, 0x40, 0x0, 0x3, 0x6, 0xfa4, 0x7, 0xffffffffffff8000, 0x0, 0x0, 0x0, 0x8000, 0x3, @perf_config_ext={0x400}, 0x100, 0xa264, 0x4, 0x7, 0x2, 0x1000, 0x92}, r6, 0x5, r7, 0x1) socketpair(0x7, 0x6, 0x1, &(0x7f0000001d80)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000001e00)={&(0x7f0000001dc0)='./file0\x00', r9}, 0x10) r10 = perf_event_open(&(0x7f0000001e40)={0x4, 0x70, 0x5, 0x4, 0x8, 0x6, 0x0, 0x2, 0x1425, 0xb, 0x0, 0xcc9, 0x400, 0x57f90db4, 0x80000000, 0x7, 0x1000, 0x0, 0x8, 0x8000, 0xffffffff, 0x400, 0x1, 0x6, 0x40, 0x2, 0x10000, 0x8, 0x9, 0xfffffffffffffff8, 0x9, 0x4, 0x3, 0x400, 0x3, 0x9, 0x3, 0x100, 0x0, 0x6, 0x0, @perf_config_ext={0x4, 0x2}, 0x20, 0x3ff, 0x0, 0x7, 0x3, 0x5, 0xfa5e}, r6, 0xd, r7, 0x2) bpf$OBJ_GET_MAP(0x7, &(0x7f0000001f00)={&(0x7f0000001ec0)='./file0\x00'}, 0x10) socketpair$inet6_sctp(0xa, 0x0, 0x84, &(0x7f0000001f40)) ioctl$PERF_EVENT_IOC_DISABLE(r10, 0x2401, 0xbad) r11 = perf_event_open(&(0x7f0000001fc0)={0x3, 0x70, 0xff, 0x2f, 0x2, 0x7, 0x0, 0x40, 0x80000, 0x1, 0x8, 0x6, 0xfffffffffffffffb, 0x7, 0x2, 0x10000, 0x6, 0x5, 0x0, 0x10, 0x6, 0xc58, 0x7f, 0x3, 0x2, 0x3, 0x5, 0x80000000800000, 0x7, 0xfff, 0x16, 0x2b65, 0x9, 0x69244395, 0x10000, 0x4, 0x9, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000001f80), 0x8}, 0x100, 0x8, 0x51b4, 0x4, 0x800, 0xb7, 0x4800}, r6, 0x8, r8, 0x1) r12 = gettid() socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000002040)) perf_event_open(&(0x7f0000002080)={0x0, 0x70, 0x100, 0x0, 0x2, 0x401, 0x0, 0x6, 0x1, 0x6, 0x656, 0x5, 0xfffffffffffff973, 0xffffffffffffffff, 0x9, 0x7, 0x3, 0x3ff, 0x1c000000, 0x10000, 0x6, 0x20, 0x6, 0x1, 0x1, 0x4, 0x2, 0x20, 0x9, 0xed5, 0x847, 0x1000, 0x0, 0x0, 0x102bed3b, 0x9, 0x7fffffff, 0x6, 0x0, 0x24, 0x0, @perf_config_ext={0x100000001, 0x6}, 0x200, 0x800000010000000, 0x7, 0x7, 0x1000, 0xf3, 0xe87}, r12, 0xf, r11, 0x8) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000002100)) perf_event_open(&(0x7f0000002180)={0x4, 0x70, 0x0, 0x8, 0xff, 0x0, 0x0, 0xfffffffffffffff9, 0x10001, 0x3, 0xffffffffffffff00, 0x0, 0x1, 0x4e5e, 0x8001, 0xfffffffffffffff8, 0x7, 0x1f4, 0x80000001, 0x99b, 0x4, 0x8, 0xed8, 0x3f, 0xec9, 0x6, 0x1, 0x4ab8, 0x8, 0x2, 0xdd, 0x9, 0xffffffffffffffff, 0x8000, 0x0, 0x6, 0xffff, 0x8, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000002140), 0xf}, 0x400, 0x5, 0x7, 0x4, 0x7, 0x4}, r12, 0x3, r7, 0x8) 2018/03/31 09:08:18 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x0, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r7 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) ioctl$PERF_EVENT_IOC_RESET(r5, 0x2403, 0x2) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f00000009c0)={r4}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) ioctl$PERF_EVENT_IOC_RESET(r4, 0x2403, 0x2) sendmsg(r3, &(0x7f0000000cc0)={&(0x7f0000000400)=@ethernet={0x1}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000580)="4589496d6a3bfcccae07dc729c52ee6bdf10d9cf221f605c25f790103018703b9a67491f96c3f9f8d07204ee4adf21acce1afdaedaba1228b4d33c3fa702a46b1329a0e52eea6a7908fd375ace47", 0x4e}], 0x1, &(0x7f0000000700), 0x0, 0x40000}, 0x4044080) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000280)={r6, &(0x7f0000000700)="ec1b815b5cc95d6e0dff859791e3341b"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)={0x3, 0x40000100, 0x56c96e7a, 0xea, 0x1, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") close(0xffffffffffffffff) [ 358.127699] FAULT_INJECTION: forcing a failure. [ 358.127699] name failslab, interval 1, probability 0, space 0, times 0 [ 358.139065] CPU: 0 PID: 9975 Comm: syz-executor1 Not tainted 4.16.0-rc6+ #43 [ 358.146255] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 358.156283] Call Trace: [ 358.158885] dump_stack+0x194/0x24d [ 358.162521] ? arch_local_irq_restore+0x53/0x53 [ 358.167192] ? __save_stack_trace+0x7e/0xd0 [ 358.171527] should_fail+0x8c0/0xa40 [ 358.175249] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 358.180356] ? kasan_kmalloc+0xad/0xe0 [ 358.184244] ? kmem_cache_alloc_trace+0x136/0x740 [ 358.189092] ? __memcg_init_list_lru_node+0x169/0x270 [ 358.194279] ? __list_lru_init+0x544/0x750 [ 358.198517] ? sget_userns+0x691/0xe40 [ 358.202404] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 358.207160] ? do_mount+0xea4/0x2bb0 [ 358.210871] ? SyS_mount+0xab/0x120 [ 358.214494] ? do_syscall_64+0x281/0x940 [ 358.218556] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 358.223922] ? find_held_lock+0x35/0x1d0 [ 358.227990] ? __lock_is_held+0xb6/0x140 [ 358.232060] ? check_same_owner+0x320/0x320 [ 358.236387] ? rcu_note_context_switch+0x710/0x710 [ 358.241325] should_failslab+0xec/0x120 [ 358.245303] kmem_cache_alloc_trace+0x4b/0x740 [ 358.249886] ? __kmalloc_node+0x33/0x70 [ 358.253848] ? __kmalloc_node+0x33/0x70 [ 358.257799] ? rcu_read_lock_sched_held+0x108/0x120 [ 358.262803] __memcg_init_list_lru_node+0x169/0x270 [ 358.267808] ? list_lru_add+0x7c0/0x7c0 [ 358.271759] ? __kmalloc_node+0x47/0x70 [ 358.275718] __list_lru_init+0x544/0x750 [ 358.279761] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 358.285622] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 358.290623] ? __lockdep_init_map+0xe4/0x650 [ 358.295020] ? lockdep_init_map+0x9/0x10 [ 358.299066] sget_userns+0x691/0xe40 [ 358.302759] ? set_anon_super+0x20/0x20 [ 358.306719] ? put_filp+0x90/0x90 [ 358.310146] ? destroy_unused_super.part.6+0xd0/0xd0 [ 358.315222] ? alloc_vfsmnt+0x762/0x9c0 [ 358.319170] ? path_lookupat+0x238/0xba0 [ 358.323206] ? mnt_free_id.isra.21+0x50/0x50 [ 358.327592] ? trace_hardirqs_off+0x10/0x10 [ 358.331887] ? putname+0xee/0x130 [ 358.335316] ? cap_capable+0x1b5/0x230 [ 358.339180] ? security_capable+0x8e/0xc0 [ 358.343306] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 358.348475] ? ns_capable_common+0xcf/0x160 [ 358.352779] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 358.357943] mount_ns+0x6d/0x190 [ 358.361285] rpc_mount+0x9e/0xd0 [ 358.364625] mount_fs+0x66/0x2d0 [ 358.367968] vfs_kern_mount.part.26+0xc6/0x4a0 [ 358.372529] ? may_umount+0xa0/0xa0 [ 358.376138] ? _raw_read_unlock+0x22/0x30 [ 358.380270] ? __get_fs_type+0x8a/0xc0 [ 358.384141] do_mount+0xea4/0x2bb0 [ 358.387660] ? __might_fault+0x110/0x1d0 [ 358.391694] ? copy_mount_string+0x40/0x40 [ 358.395904] ? check_same_owner+0x320/0x320 [ 358.400202] ? __check_object_size+0x8b/0x530 [ 358.404671] ? __might_sleep+0x95/0x190 [ 358.408628] ? kasan_check_write+0x14/0x20 [ 358.412847] ? _copy_from_user+0x99/0x110 [ 358.416979] ? memdup_user+0x5e/0x90 [ 358.420667] ? copy_mount_options+0x1f7/0x2e0 [ 358.425137] SyS_mount+0xab/0x120 [ 358.428572] ? copy_mnt_ns+0xb30/0xb30 [ 358.432445] do_syscall_64+0x281/0x940 [ 358.436310] ? vmalloc_sync_all+0x30/0x30 [ 358.440432] ? _raw_spin_unlock_irq+0x27/0x70 [ 358.444903] ? finish_task_switch+0x1c1/0x7e0 [ 358.449374] ? syscall_return_slowpath+0x550/0x550 [ 358.454289] ? syscall_return_slowpath+0x2ac/0x550 [ 358.459191] ? prepare_exit_to_usermode+0x350/0x350 [ 358.464188] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 358.469545] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 358.474385] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 358.479550] RIP: 0033:0x454e79 [ 358.482713] RSP: 002b:00007fed74635c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 358.490402] RAX: ffffffffffffffda RBX: 00007fed746366d4 RCX: 0000000000454e79 [ 358.497647] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 358.504891] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 358.512135] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000016 [ 358.519380] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000000f 2018/03/31 09:08:19 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x5, 0x0, 0x0, 0x5}, 0x2c) r1 = bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x13, 0x0, 0x0, 0x0, 0x20000003, 0x0}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x3e83, 0x8, r1}, 0x2c) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x50, &(0x7f0000000140)={0x0, 0x0}}, 0x10) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, r2, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) socketpair(0x4, 0x1, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000480)={r5, &(0x7f0000000440)="3068306ef4a0ff8256b6430a042a9b"}, 0x10) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x0, 0x8, 0x0, 0x0, r0, 0x6}, 0x2c) socketpair(0x8, 0x2, 0x0, &(0x7f0000000040)) r6 = gettid() bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=r3, 0x4) perf_event_open(&(0x7f00000003c0)={0x7, 0x70, 0x7fff, 0x5, 0x6, 0x8000, 0x0, 0x1000, 0x0, 0x7, 0x1000, 0x1, 0xffffffff, 0x3, 0xaf99, 0x40, 0x8001, 0xfffffffffffffffa, 0x1, 0x80000000, 0xe6d1, 0x4, 0x8001, 0x9, 0x1f, 0xfffffffffffffc00, 0x0, 0x0, 0x7ff, 0x15ac000000000000, 0x0, 0x3, 0x1, 0xfffffffffffffffe, 0x9, 0x0, 0x1, 0x2, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000002c0), 0x8}, 0x8004, 0x3, 0x6, 0x1, 0x5, 0xb03c, 0x5}, r6, 0xc, 0xffffffffffffffff, 0xb) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000280)={0xffffffffffffffff, 0xffffff8f, &(0x7f0000000300)}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000600)={0xffffffffffffffff, &(0x7f00000004c0)="648d1c6e4e7374f62b21f1c71a7cd05c41e2a0bf36f2f23f5761a39646321c3b5e4e670bd9a8f7a3fc36d594c1799d7dec6f0ba644a16abd532529ac63497998169000b2e491e82f659738895262b6fc9c79d8e6736c91136937b9", &(0x7f0000000540)="0c39cf9403045550ce39840a2a90ca20bc744608140dcd6c55d855533bb97417ef0cd19e1990bf245f0f38ab76b7f283d20500e75742ca4151b5489f5848a6b6104b0334b5427d07a3464ecffbfda64068c2d7ea6c230ba9040eebaec2030d19884f9f815ab793bd836fdb9c142a7aa9510939e2d3b5e6f57fa56f5464911bd939ca0ab0a1c19407fc9b1b974b94401f7c82bce0926bd5"}, 0x20) 2018/03/31 09:08:19 executing program 7: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)={0xffffffffffffffff}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x0, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r5 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x0, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f00000009c0)={r4}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg(r3, &(0x7f0000000cc0)={&(0x7f0000000400)=@ethernet={0x1}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000580)="4589496d6a3bfcccae07dc729c52ee6bdf10d9cf221f605c25f790103018703b9a67491f96c3f9f8d07204ee4adf21acce1afdaedaba1228b4d33c3fa702a46b1329a0e52eea6a7908fd375ace47", 0x4e}], 0x1, &(0x7f0000000700), 0x0, 0x40000}, 0x4044080) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000740)={0xffffffffffffffff, &(0x7f0000000700)="ec1b815b5cc95d6e0dff859791e3341b8790dcb187f25418f8003a2b3bf345"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97f") close(0xffffffffffffffff) 2018/03/31 09:08:19 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x0, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r7 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) ioctl$PERF_EVENT_IOC_RESET(r5, 0x2403, 0x2) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f00000009c0)={r4}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) ioctl$PERF_EVENT_IOC_RESET(r4, 0x2403, 0x2) sendmsg(r3, &(0x7f0000000cc0)={&(0x7f0000000400)=@ethernet={0x1}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000580)="4589496d6a3bfcccae07dc729c52ee6bdf10d9cf221f605c25f790103018703b9a67491f96c3f9f8d07204ee4adf21acce1afdaedaba1228b4d33c3fa702a46b1329a0e52eea6a7908fd375ace47", 0x4e}], 0x1, &(0x7f0000000700), 0x0, 0x40000}, 0x4044080) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000280)={r6, &(0x7f0000000700)="ec1b815b5cc95d6e0dff859791e3341b"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)={0x3, 0x40000100, 0x56c96e7a, 0xea, 0x1, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") close(0xffffffffffffffff) 2018/03/31 09:08:19 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x5, 0x100000000209e20, 0x8000000001, 0x5}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x13, 0x0, 0x7ffff9, 0x0, 0x0, 0x0}, 0x2c) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x13, 0x0, 0x7ffff9, 0x0, 0x20000003, 0x0}, 0x2c) 2018/03/31 09:08:19 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xf, 0x5, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x80000000}, [@map={0x18, 0x1, 0x1, 0x0, 0x1}], {0x95}}, &(0x7f0000000040)='syzkaller\x00', 0x3, 0x10, &(0x7f0000000080)=""/16, 0x41000, 0x2f3100a785778bd1}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000001c0)={r0, 0x50, &(0x7f0000000140)}, 0x10) close(r0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000780)={&(0x7f0000000240)=@ax25, 0x80, &(0x7f0000000600)=[{&(0x7f00000002c0)=""/114, 0x72}, {&(0x7f0000000340)=""/133, 0x85}, {&(0x7f0000000400)=""/23, 0x17}, {&(0x7f0000000440)=""/59, 0x3b}, {&(0x7f0000000480)=""/114, 0x72}, {&(0x7f0000000500)=""/45, 0x2d}, {&(0x7f0000000540)=""/83, 0x53}, {&(0x7f00000005c0)}], 0x8, &(0x7f0000000680)=""/214, 0xd6, 0x100}, 0x40) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000007c0)={0xffffffffffffffff}) recvmsg(r2, &(0x7f00000019c0)={&(0x7f0000000800)=@ax25, 0x80, &(0x7f00000018c0)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000001880)=""/18, 0x12}], 0x2, &(0x7f0000001900)=""/184, 0xb8, 0x3}, 0x1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001a80)={r4, 0x50, &(0x7f0000001a00)}, 0x10) r5 = perf_event_open(&(0x7f0000001b00)={0x2, 0x70, 0x6, 0x8, 0x80000000, 0x10001, 0x0, 0x7ff, 0x4, 0xa, 0x200, 0x20, 0x72, 0x5, 0x0, 0x0, 0x5, 0x8f, 0x9ed, 0xff, 0x0, 0xa58, 0x7f, 0xf2f, 0x4503, 0x6, 0x81, 0x5, 0x1ff, 0xffffffff00000000, 0x2, 0x5, 0x9000000000000, 0xfffffffffffffffa, 0x8, 0x10001, 0x731ab510, 0x9, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000001ac0), 0x1}, 0x80, 0x2b4, 0x200, 0x3, 0x6, 0x9, 0x4}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0x20000) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000001b80)) r6 = getpid() r7 = perf_event_open(&(0x7f0000001c00)={0x1, 0x70, 0x0, 0xfff, 0x4, 0x80000000, 0x0, 0x3, 0x40, 0xa, 0x7, 0x7, 0x7, 0x4800000000000000, 0x7, 0x6, 0x62b, 0x8, 0x9, 0x100000000, 0x1, 0x0, 0x5, 0xd199, 0x1f, 0x10000, 0xff80000000000000, 0x3, 0x4, 0x8, 0x80000001, 0x8000, 0x7fff, 0x4, 0x16, 0x7, 0x40, 0x8, 0x0, 0x5, 0x50031dd1e89e26d1, @perf_bp={&(0x7f0000001bc0), 0x2}, 0x10000, 0x3a, 0x80000001, 0x1, 0x2c, 0x3ff, 0x6}, r6, 0x6, r3, 0x3) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000001c80)=r0, 0x4) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000001cc0)) ioctl$PERF_EVENT_IOC_REFRESH(r7, 0x2402, 0xffffffff) r8 = perf_event_open(&(0x7f0000001d00)={0x0, 0x70, 0x7, 0x400, 0x100, 0xac, 0x0, 0x100000000, 0xc2800, 0xa, 0x33e3, 0x2, 0x10001, 0x8, 0x5, 0x100000001, 0x2e9, 0x2, 0xc1, 0xf2, 0x2, 0x9, 0xffff, 0x7, 0x1, 0x0, 0x8000, 0x800, 0xfffffffffffffffa, 0x40, 0x0, 0x3, 0x6, 0xfa4, 0x7, 0xffffffffffff8000, 0x0, 0x0, 0x0, 0x8000, 0x3, @perf_config_ext={0x400}, 0x100, 0xa264, 0x4, 0x7, 0x2, 0x1000, 0x92}, r6, 0x5, r7, 0x1) socketpair(0x7, 0x6, 0x1, &(0x7f0000001d80)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000001e00)={&(0x7f0000001dc0)='./file0\x00', r9}, 0x10) r10 = perf_event_open(&(0x7f0000001e40)={0x4, 0x70, 0x5, 0x4, 0x8, 0x6, 0x0, 0x2, 0x1425, 0xb, 0x0, 0xcc9, 0x400, 0x57f90db4, 0x80000000, 0x7, 0x1000, 0x0, 0x8, 0x8000, 0xffffffff, 0x400, 0x1, 0x6, 0x40, 0x2, 0x10000, 0x8, 0x9, 0xfffffffffffffff8, 0x9, 0x4, 0x3, 0x400, 0x3, 0x9, 0x3, 0x100, 0x0, 0x6, 0x0, @perf_config_ext={0x4, 0x2}, 0x20, 0x3ff, 0x0, 0x7, 0x3, 0x5, 0xfa5e}, r6, 0xd, r7, 0x2) bpf$OBJ_GET_MAP(0x7, &(0x7f0000001f00)={&(0x7f0000001ec0)='./file0\x00'}, 0x10) socketpair$inet6_sctp(0xa, 0x0, 0x84, &(0x7f0000001f40)) ioctl$PERF_EVENT_IOC_DISABLE(r10, 0x2401, 0xbad) r11 = perf_event_open(&(0x7f0000001fc0)={0x3, 0x70, 0xff, 0x2f, 0x2, 0x7, 0x0, 0x40, 0x80000, 0x1, 0x8, 0x6, 0xfffffffffffffffb, 0x7, 0x2, 0x10000, 0x6, 0x5, 0x0, 0x10, 0x6, 0xc58, 0x7f, 0x3, 0x2, 0x3, 0x5, 0x80000000800000, 0x7, 0xfff, 0x16, 0x2b65, 0x9, 0x69244395, 0x10000, 0x4, 0x9, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000001f80), 0x8}, 0x100, 0x8, 0x51b4, 0x4, 0x800, 0xb7, 0x4800}, r6, 0x8, r8, 0x1) r12 = gettid() socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000002040)) perf_event_open(&(0x7f0000002080)={0x0, 0x70, 0x100, 0x0, 0x2, 0x401, 0x0, 0x6, 0x1, 0x6, 0x656, 0x5, 0xfffffffffffff973, 0xffffffffffffffff, 0x9, 0x7, 0x3, 0x3ff, 0x1c000000, 0x10000, 0x6, 0x20, 0x6, 0x1, 0x1, 0x4, 0x2, 0x20, 0x9, 0xed5, 0x847, 0x1000, 0x0, 0x0, 0x102bed3b, 0x9, 0x7fffffff, 0x6, 0x0, 0x24, 0x0, @perf_config_ext={0x100000001, 0x6}, 0x200, 0x800000010000000, 0x7, 0x7, 0x1000, 0xf3, 0xe87}, r12, 0xf, r11, 0x8) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000002100)) perf_event_open(&(0x7f0000002180)={0x4, 0x70, 0x0, 0x8, 0xff, 0x0, 0x0, 0xfffffffffffffff9, 0x10001, 0x3, 0xffffffffffffff00, 0x93eb, 0x0, 0x4e5e, 0x8001, 0xfffffffffffffff8, 0x7, 0x1f4, 0x80000001, 0x99b, 0x4, 0x8, 0xed8, 0x3f, 0xec9, 0x6, 0x1, 0x4ab8, 0x8, 0x2, 0xdd, 0x9, 0xffffffffffffffff, 0x8000, 0x0, 0x6, 0xffff, 0x8, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000002140), 0xf}, 0x400, 0x5, 0x7, 0x4, 0x7, 0x4}, r12, 0x3, r7, 0x8) 2018/03/31 09:08:19 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000a40)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x0, 0x0) socketpair(0x2, 0x0, 0x0, &(0x7f0000000640)={0xffffffffffffffff}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r6 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x0, 0x10000, 0x1182, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f00000009c0)={r4}) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000280)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000a00)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg(r3, &(0x7f0000000cc0)={&(0x7f0000000400)=@ethernet={0x1}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000580)="4589496d6a3bfcccae07dc729c52ee6bdf10d9cf221f605c25f790103018703b9a67491f96c3f9f8d07204ee4adf21acce1afdaedaba1228b4d33c3fa702a46b1329a0e52eea6a7908fd375ace47", 0x4e}], 0x1, &(0x7f0000000700), 0x0, 0x40000}, 0x4044080) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000740)={r5, &(0x7f0000000700)="ec1b815b5cc95d6e0dff859791e3341b8790dcb187f25418f8003a2b"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") close(0xffffffffffffffff) 2018/03/31 09:08:19 executing program 1 (fault-call:20 fault-nth:16): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)={0xffffffffffffffff}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x0, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r5 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f00000009c0)={r4}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg(r3, &(0x7f0000000cc0)={&(0x7f0000000400)=@ethernet={0x1}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000580)="4589496d6a3bfcccae07dc729c52ee6bdf10d9cf221f605c25f790103018703b9a67491f96c3f9f8d07204ee4adf21acce1afdaedaba1228b4d33c3fa702a46b1329a0e52eea6a7908fd375ace47", 0x4e}], 0x1, &(0x7f0000000700), 0x0, 0x40000}, 0x4044080) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000740)={0xffffffffffffffff, &(0x7f0000000700)="ec1b815b5cc95d6e0dff859791e3341b8790dcb187f25418f8003a2b3bf345dc"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") close(0xffffffffffffffff) 2018/03/31 09:08:19 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x5, 0x100000000209e20, 0x8000000001, 0x5}, 0x2c) r1 = bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x13, 0x0, 0x7ffff9, 0x0, 0x20000003, 0x0}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xe, 0x0, 0x7f, 0x3e83, 0x8, r1, 0x80000000}, 0x2c) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x50, &(0x7f0000000140)={0x0, 0x0}}, 0x10) socket$kcm(0x29, 0x2, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) socketpair(0x4, 0x1, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r3, 0x2401, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000480)={r4, &(0x7f0000000440)="3068306ef4a0ff8256b6430a042a9b"}, 0xfffffee9) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40042409, 0x1) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r3) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x0, 0x8, 0x0, 0x0, r0, 0x6}, 0x2c) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)) perf_event_open(&(0x7f000025c000)={0x5, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = gettid() r6 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x100000001, 0x101, 0xffffffffffff7fff, 0x1, 0x0, 0x7ff, 0x80, 0x1, 0xfffffffffffffffb, 0xd39c, 0x5, 0x100, 0x4, 0x3, 0x7, 0x9, 0x6, 0x8a, 0x800, 0x9, 0x0, 0x8, 0x5, 0x7fffffff, 0x68, 0x900000000000000, 0xfffffffffffffffe, 0x7, 0x0, 0x7, 0x4, 0x0, 0x7ff, 0x359fd0e8, 0x10001, 0xde, 0x0, 0x0, 0x6, @perf_bp={&(0x7f00000004c0), 0x8}, 0x4c0e, 0x2, 0x0, 0x5, 0x80000001, 0x6}, r5, 0x7, r4, 0x0) perf_event_open(&(0x7f0000000580)={0x7, 0x70, 0x6, 0x5, 0x5, 0x5, 0x0, 0xabb, 0x40000, 0xc, 0x8, 0x0, 0x7, 0x3ff, 0x4, 0x5, 0x4757, 0x2, 0x8, 0x100000000, 0x8, 0x8, 0x5, 0x7, 0x10000, 0x10, 0x9, 0x3, 0xffffffff, 0xd6, 0x80, 0x3, 0x3, 0x7, 0xa318, 0x5, 0x1ff, 0x1, 0x0, 0x40, 0x0, @perf_config_ext={0x9, 0x9}, 0x800, 0x934e, 0x100, 0x6, 0x4, 0x4, 0x1000}, r5, 0x2, r6, 0x3) r7 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0xfff, 0x100000001, 0xfffffffffffffffb, 0x0, 0x8001, 0x0, 0x1, 0x0, 0xfffffffffffffff9, 0x0, 0x9, 0x9, 0x5, 0x8, 0x1, 0x8106, 0x0, 0x14000000000, 0x80000000, 0x1, 0x5, 0x0, 0x40, 0x2839, 0x1d, 0x800, 0x7, 0x0, 0x0, 0x5, 0x7, 0x0, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x4}, 0x0, 0x0, 0xff, 0x0, 0x3, 0x8, 0x3}, r5, 0x2, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=r2, 0x4) perf_event_open(&(0x7f00000003c0)={0x7, 0x70, 0x7fff, 0x5, 0x6, 0x8000, 0x0, 0x1000, 0x0, 0x7, 0x1000, 0x1, 0xffffffff, 0x3, 0xaf99, 0x40, 0x8001, 0xfffffffffffffffa, 0x1, 0x80000000, 0xe6d1, 0x4, 0x8001, 0x9, 0x1f, 0xfffffffffffffc00, 0x0, 0x0, 0x7ff, 0x15ac000000000000, 0x0, 0x3, 0x1, 0xfffffffffffffffe, 0x9, 0xff, 0x1, 0x2, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000002c0), 0x8}, 0x0, 0x3, 0x6, 0x1, 0x5, 0xb03c, 0x5}, r5, 0xc, r7, 0xb) bpf$MAP_CREATE(0x0, &(0x7f0000000640)={0x8, 0x6bcb8e63, 0x0, 0x59ad, 0x12, r0, 0x8001}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000880)={r0, &(0x7f0000000840), &(0x7f00000008c0)=""/70}, 0x375) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000280)={0xffffffffffffffff, 0xffffff8f, &(0x7f0000000300)}, 0x10) [ 359.277336] FAULT_INJECTION: forcing a failure. [ 359.277336] name failslab, interval 1, probability 0, space 0, times 0 [ 359.288725] CPU: 0 PID: 10011 Comm: syz-executor1 Not tainted 4.16.0-rc6+ #43 [ 359.296014] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 359.305364] Call Trace: [ 359.307958] dump_stack+0x194/0x24d [ 359.311584] ? arch_local_irq_restore+0x53/0x53 [ 359.316236] ? __save_stack_trace+0x7e/0xd0 [ 359.320545] should_fail+0x8c0/0xa40 [ 359.324239] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 359.329325] ? kasan_kmalloc+0xad/0xe0 [ 359.333192] ? kmem_cache_alloc_trace+0x136/0x740 [ 359.338016] ? __memcg_init_list_lru_node+0x169/0x270 [ 359.343188] ? __list_lru_init+0x544/0x750 [ 359.347403] ? sget_userns+0x691/0xe40 [ 359.351273] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 359.356009] ? do_mount+0xea4/0x2bb0 [ 359.359707] ? SyS_mount+0xab/0x120 [ 359.363315] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 359.368661] ? find_held_lock+0x35/0x1d0 [ 359.372706] ? __lock_is_held+0xb6/0x140 [ 359.376764] ? check_same_owner+0x320/0x320 [ 359.381074] ? rcu_note_context_switch+0x710/0x710 [ 359.385990] should_failslab+0xec/0x120 [ 359.389948] kmem_cache_alloc_trace+0x4b/0x740 [ 359.394508] ? __kmalloc_node+0x33/0x70 [ 359.398462] ? __kmalloc_node+0x33/0x70 [ 359.402418] ? rcu_read_lock_sched_held+0x108/0x120 [ 359.407419] __memcg_init_list_lru_node+0x169/0x270 [ 359.412418] ? list_lru_add+0x7c0/0x7c0 [ 359.416372] ? __kmalloc_node+0x47/0x70 [ 359.420329] __list_lru_init+0x544/0x750 [ 359.424376] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 359.430245] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 359.435244] ? __lockdep_init_map+0xe4/0x650 [ 359.439636] ? lockdep_init_map+0x9/0x10 [ 359.443677] sget_userns+0x691/0xe40 [ 359.447367] ? set_anon_super+0x20/0x20 [ 359.451323] ? put_filp+0x90/0x90 [ 359.454755] ? destroy_unused_super.part.6+0xd0/0xd0 [ 359.459839] ? alloc_vfsmnt+0x762/0x9c0 [ 359.463793] ? path_lookupat+0x238/0xba0 [ 359.467833] ? mnt_free_id.isra.21+0x50/0x50 [ 359.472225] ? trace_hardirqs_off+0x10/0x10 [ 359.476529] ? putname+0xee/0x130 [ 359.479967] ? cap_capable+0x1b5/0x230 [ 359.483837] ? security_capable+0x8e/0xc0 [ 359.487967] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 359.493135] ? ns_capable_common+0xcf/0x160 [ 359.497439] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 359.502606] mount_ns+0x6d/0x190 [ 359.505956] rpc_mount+0x9e/0xd0 [ 359.509306] mount_fs+0x66/0x2d0 [ 359.512655] vfs_kern_mount.part.26+0xc6/0x4a0 [ 359.517217] ? may_umount+0xa0/0xa0 [ 359.520827] ? _raw_read_unlock+0x22/0x30 [ 359.524952] ? __get_fs_type+0x8a/0xc0 [ 359.528826] do_mount+0xea4/0x2bb0 [ 359.532344] ? __might_fault+0x110/0x1d0 [ 359.536388] ? copy_mount_string+0x40/0x40 [ 359.540602] ? __check_object_size+0x8b/0x530 [ 359.545081] ? __might_sleep+0x95/0x190 [ 359.549042] ? kasan_check_write+0x14/0x20 [ 359.553258] ? _copy_from_user+0x99/0x110 [ 359.557386] ? memdup_user+0x5e/0x90 [ 359.561076] ? copy_mount_options+0x1f7/0x2e0 [ 359.565552] SyS_mount+0xab/0x120 [ 359.568982] ? copy_mnt_ns+0xb30/0xb30 [ 359.572849] do_syscall_64+0x281/0x940 [ 359.576714] ? vmalloc_sync_all+0x30/0x30 [ 359.580841] ? _raw_spin_unlock_irq+0x27/0x70 [ 359.585316] ? finish_task_switch+0x1c1/0x7e0 [ 359.589790] ? syscall_return_slowpath+0x550/0x550 [ 359.594696] ? syscall_return_slowpath+0x2ac/0x550 [ 359.599605] ? prepare_exit_to_usermode+0x350/0x350 [ 359.604600] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 359.609946] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 359.614774] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 359.619944] RIP: 0033:0x454e79 2018/03/31 09:08:20 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x5, 0x100000000209e20, 0x8000000001, 0x5}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x13, 0x0, 0x7ffff9, 0x0, 0x0, 0x0}, 0x2c) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x13, 0x0, 0x7ffff9, 0x0, 0x20000003, 0x0}, 0x2c) [ 359.623114] RSP: 002b:00007fed74635c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 359.630801] RAX: ffffffffffffffda RBX: 00007fed746366d4 RCX: 0000000000454e79 [ 359.638049] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 359.645296] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 359.652543] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000016 [ 359.659800] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000010 2018/03/31 09:08:20 executing program 7: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)={0xffffffffffffffff}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x0, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r5 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x0, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f00000009c0)={r4}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg(r3, &(0x7f0000000cc0)={&(0x7f0000000400)=@ethernet={0x1}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000580)="4589496d6a3bfcccae07dc729c52ee6bdf10d9cf221f605c25f790103018703b9a67491f96c3f9f8d07204ee4adf21acce1afdaedaba1228b4d33c3fa702a46b1329a0e52eea6a7908fd375ace47", 0x4e}], 0x1, &(0x7f0000000700), 0x0, 0x40000}, 0x4044080) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000740)={0xffffffffffffffff, &(0x7f0000000700)="ec1b815b5cc95d6e0dff859791e3341b8790dcb187f25418f8003a2b3bf345"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272") close(0xffffffffffffffff) 2018/03/31 09:08:20 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x0, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r7 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) ioctl$PERF_EVENT_IOC_RESET(r5, 0x2403, 0x2) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f00000009c0)={r4}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) ioctl$PERF_EVENT_IOC_SET_BPF(r7, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) ioctl$PERF_EVENT_IOC_RESET(r4, 0x2403, 0x2) sendmsg(r3, &(0x7f0000000cc0)={&(0x7f0000000400)=@ethernet={0x1}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000580)="4589496d6a3bfcccae07dc729c52ee6bdf10d9cf221f605c25f790103018703b9a67491f96c3f9f8d07204ee4adf21acce1afdaedaba1228b4d33c3fa702a46b1329a0e52eea6a7908fd375ace47", 0x4e}], 0x1, &(0x7f0000000700), 0x0, 0x40000}, 0x4044080) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000280)={r6, &(0x7f0000000700)="ec1b815b5cc95d6e0dff859791e3341b"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)={0x3, 0x40000100, 0x56c96e7a, 0xea, 0x1, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") close(0xffffffffffffffff) 2018/03/31 09:08:20 executing program 1 (fault-call:20 fault-nth:17): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)={0xffffffffffffffff}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x0, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r5 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f00000009c0)={r4}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg(r3, &(0x7f0000000cc0)={&(0x7f0000000400)=@ethernet={0x1}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000580)="4589496d6a3bfcccae07dc729c52ee6bdf10d9cf221f605c25f790103018703b9a67491f96c3f9f8d07204ee4adf21acce1afdaedaba1228b4d33c3fa702a46b1329a0e52eea6a7908fd375ace47", 0x4e}], 0x1, &(0x7f0000000700), 0x0, 0x40000}, 0x4044080) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000740)={0xffffffffffffffff, &(0x7f0000000700)="ec1b815b5cc95d6e0dff859791e3341b8790dcb187f25418f8003a2b3bf345dc"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") close(0xffffffffffffffff) 2018/03/31 09:08:20 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x5, 0x0, 0x0, 0x5}, 0x2c) r1 = bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x13, 0x0, 0x0, 0x0, 0x20000003, 0x0}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x3e83, 0x8, r1}, 0x2c) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x50, &(0x7f0000000140)={0x0, 0x0}}, 0x10) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, r2, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) socketpair(0x4, 0x1, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000480)={r5, &(0x7f0000000440)="3068306ef4a0ff8256b6430a042a9b"}, 0x10) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x0, 0x8, 0x0, 0x0, r0, 0x6}, 0x2c) socketpair(0x8, 0x2, 0x0, &(0x7f0000000040)) r6 = gettid() bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=r3, 0x4) perf_event_open(&(0x7f00000003c0)={0x7, 0x70, 0x7fff, 0x5, 0x6, 0x8000, 0x0, 0x1000, 0x0, 0x7, 0x1000, 0x1, 0xffffffff, 0x3, 0xaf99, 0x40, 0x8001, 0xfffffffffffffffa, 0x1, 0x80000000, 0xe6d1, 0x4, 0x8001, 0x9, 0x1f, 0xfffffffffffffc00, 0x0, 0x0, 0x7ff, 0x15ac000000000000, 0x0, 0x3, 0x1, 0xfffffffffffffffe, 0x9, 0x0, 0x1, 0x2, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000002c0), 0x8}, 0x8004, 0x3, 0x6, 0x1, 0x5, 0xb03c, 0x5}, r6, 0xc, 0xffffffffffffffff, 0xb) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000280)={0xffffffffffffffff, 0xffffff8f, &(0x7f0000000300)}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000600)={0xffffffffffffffff, &(0x7f00000004c0)="648d1c6e4e7374f62b21f1c71a7cd05c41e2a0bf36f2f23f5761a39646321c3b5e4e670bd9a8f7a3fc36d594c1799d7dec6f0ba644a16abd532529ac63497998169000b2e491e82f659738895262b6fc9c79d8e6736c91136937b9", &(0x7f0000000540)="0c39cf9403045550ce39840a2a90ca20bc744608140dcd6c55d855533bb97417ef0cd19e1990bf245f0f38ab76b7f283d20500e75742ca4151b5489f5848a6b6104b0334b5427d07a3464ecffbfda64068c2d7ea6c230ba9040eebaec2030d19884f9f815ab793bd836fdb9c142a7aa9510939e2d3b5e6f57fa56f5464911bd939ca0ab0a1c19407fc9b1b974b94401f7c82bce0926bd5"}, 0x20) 2018/03/31 09:08:20 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000a40)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x0, 0x0) socketpair(0x2, 0x0, 0x0, &(0x7f0000000640)={0xffffffffffffffff}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r6 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x0, 0x10000, 0x1182, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f00000009c0)={r4}) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000280)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000a00)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg(r3, &(0x7f0000000cc0)={&(0x7f0000000400)=@ethernet={0x1}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000580)="4589496d6a3bfcccae07dc729c52ee6bdf10d9cf221f605c25f790103018703b9a67491f96c3f9f8d07204ee4adf21acce1afdaedaba1228b4d33c3fa702a46b1329a0e52eea6a7908fd375ace47", 0x4e}], 0x1, &(0x7f0000000700), 0x0, 0x40000}, 0x4044080) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000740)={r5, &(0x7f0000000700)="ec1b815b5cc95d6e0dff859791e3341b8790dcb187f25418f8003a2b"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") close(0xffffffffffffffff) 2018/03/31 09:08:20 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x5, 0x100000000209e20, 0x8000000001, 0x5}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x13, 0x0, 0x7ffff9, 0x0, 0x20000003, 0x0}, 0x2c) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x13, 0x0, 0x7ffff9, 0x0, 0x20000003, 0x0}, 0x2c) [ 359.845184] FAULT_INJECTION: forcing a failure. [ 359.845184] name failslab, interval 1, probability 0, space 0, times 0 [ 359.856488] CPU: 0 PID: 10042 Comm: syz-executor1 Not tainted 4.16.0-rc6+ #43 [ 359.863760] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 359.873111] Call Trace: [ 359.875710] dump_stack+0x194/0x24d [ 359.879343] ? arch_local_irq_restore+0x53/0x53 [ 359.884015] ? __save_stack_trace+0x7e/0xd0 [ 359.888345] should_fail+0x8c0/0xa40 [ 359.892066] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 359.897171] ? kasan_kmalloc+0xad/0xe0 [ 359.901062] ? kmem_cache_alloc_trace+0x136/0x740 [ 359.905906] ? __memcg_init_list_lru_node+0x169/0x270 [ 359.911093] ? __list_lru_init+0x544/0x750 [ 359.915324] ? sget_userns+0x691/0xe40 [ 359.919212] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 359.923966] ? do_mount+0xea4/0x2bb0 [ 359.927680] ? SyS_mount+0xab/0x120 [ 359.931313] ? do_syscall_64+0x281/0x940 [ 359.935379] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 359.940749] ? find_held_lock+0x35/0x1d0 [ 359.944814] ? __lock_is_held+0xb6/0x140 [ 359.948903] ? check_same_owner+0x320/0x320 [ 359.953233] ? rcu_note_context_switch+0x710/0x710 [ 359.958172] should_failslab+0xec/0x120 [ 359.962150] kmem_cache_alloc_trace+0x4b/0x740 [ 359.966732] ? __kmalloc_node+0x33/0x70 [ 359.970716] ? __kmalloc_node+0x33/0x70 [ 359.974697] ? rcu_read_lock_sched_held+0x108/0x120 [ 359.979720] __memcg_init_list_lru_node+0x169/0x270 [ 359.984742] ? list_lru_add+0x7c0/0x7c0 [ 359.988723] ? __kmalloc_node+0x47/0x70 [ 359.992707] __list_lru_init+0x544/0x750 [ 359.996778] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 360.002667] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 360.007694] ? __lockdep_init_map+0xe4/0x650 [ 360.012109] ? lockdep_init_map+0x9/0x10 [ 360.016174] sget_userns+0x691/0xe40 [ 360.019895] ? set_anon_super+0x20/0x20 [ 360.023869] ? put_filp+0x90/0x90 [ 360.027317] ? destroy_unused_super.part.6+0xd0/0xd0 [ 360.032414] ? alloc_vfsmnt+0x762/0x9c0 [ 360.036387] ? path_lookupat+0x238/0xba0 [ 360.040447] ? mnt_free_id.isra.21+0x50/0x50 [ 360.044852] ? trace_hardirqs_off+0x10/0x10 [ 360.049169] ? mark_held_locks+0xaf/0x100 [ 360.053311] ? cap_capable+0x1b5/0x230 [ 360.057192] ? security_capable+0x8e/0xc0 [ 360.061336] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 360.066522] ? ns_capable_common+0xcf/0x160 [ 360.070845] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 360.076027] mount_ns+0x6d/0x190 [ 360.079392] rpc_mount+0x9e/0xd0 [ 360.082757] mount_fs+0x66/0x2d0 [ 360.086117] vfs_kern_mount.part.26+0xc6/0x4a0 [ 360.090698] ? may_umount+0xa0/0xa0 [ 360.094322] ? _raw_read_unlock+0x22/0x30 [ 360.098465] ? __get_fs_type+0x8a/0xc0 [ 360.102351] do_mount+0xea4/0x2bb0 [ 360.105884] ? __might_fault+0x110/0x1d0 [ 360.109943] ? copy_mount_string+0x40/0x40 [ 360.114175] ? check_same_owner+0x320/0x320 [ 360.118492] ? __check_object_size+0x8b/0x530 [ 360.122987] ? __might_sleep+0x95/0x190 [ 360.126960] ? kasan_check_write+0x14/0x20 [ 360.131190] ? _copy_from_user+0x99/0x110 [ 360.135339] ? memdup_user+0x5e/0x90 [ 360.139049] ? copy_mount_options+0x1f7/0x2e0 [ 360.143542] SyS_mount+0xab/0x120 [ 360.146990] ? copy_mnt_ns+0xb30/0xb30 [ 360.150874] do_syscall_64+0x281/0x940 [ 360.154757] ? vmalloc_sync_all+0x30/0x30 [ 360.158904] ? trace_event_raw_event_sys_exit+0x260/0x260 [ 360.164436] ? syscall_return_slowpath+0x550/0x550 [ 360.169358] ? syscall_return_slowpath+0x2ac/0x550 [ 360.174285] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 360.179660] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 360.184533] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 360.189725] RIP: 0033:0x454e79 2018/03/31 09:08:20 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x0, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r7 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) ioctl$PERF_EVENT_IOC_RESET(r5, 0x2403, 0x2) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f00000009c0)={r4}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) ioctl$PERF_EVENT_IOC_SET_BPF(r7, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) ioctl$PERF_EVENT_IOC_RESET(r4, 0x2403, 0x2) sendmsg(r3, &(0x7f0000000cc0)={&(0x7f0000000400)=@ethernet={0x1}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000580)="4589496d6a3bfcccae07dc729c52ee6bdf10d9cf221f605c25f790103018703b9a67491f96c3f9f8d07204ee4adf21acce1afdaedaba1228b4d33c3fa702a46b1329a0e52eea6a7908fd375ace47", 0x4e}], 0x1, &(0x7f0000000700), 0x0, 0x40000}, 0x4044080) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000280)={r6, &(0x7f0000000700)="ec1b815b5cc95d6e0dff859791e3341b"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)={0x3, 0x40000100, 0x56c96e7a, 0xea, 0x1, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") close(0xffffffffffffffff) 2018/03/31 09:08:20 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x5, 0x100000000209e20, 0x8000000001, 0x5}, 0x2c) r1 = bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x13, 0x0, 0x7ffff9, 0x0, 0x20000003, 0x0}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xe, 0x0, 0x7f, 0x3e83, 0x8, r1, 0x80000000}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x7, 0xb, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0xefda}, [@call={0x85, 0x0, 0x0, 0xc}, @jmp={0x5, 0x8, 0x3, 0xa, 0xf, 0x4, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x800}, @jmp={0x5, 0x40, 0xf, 0x9, 0x0, 0x5c, 0xfffffffffffffffc}], {0x95}}, &(0x7f0000000680)='syzkaller\x00', 0x0, 0xed, &(0x7f00000006c0)=""/237, 0x41100, 0x1}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r2, 0xfffffecc, &(0x7f0000000140)={0x0, 0x0}}, 0x10) socket$kcm(0x29, 0x200, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000000840)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) socketpair(0x4, 0x1, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000480)={r5, &(0x7f0000000440)="3068306ef4a0ff8256b6430a042a9b"}, 0x10) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x1) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r4) r6 = gettid() perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0xfffffffffffffffa, 0x7, 0x10001, 0x742, 0x0, 0xfff, 0x8000, 0xf, 0x3, 0x12, 0xb37, 0x9, 0x6, 0xa33, 0x3ff, 0x8001, 0x10000, 0x0, 0xf4, 0x8, 0x7, 0x533, 0x200, 0x100, 0x101, 0xbcbc, 0x80, 0x9, 0x81, 0xffffffffffffb6fb, 0x2, 0x8000, 0x80000000, 0x2f105201, 0x5, 0x4f, 0x0, 0xff, 0x4, @perf_config_ext={0x3, 0x3}, 0x14408, 0xe951, 0x200, 0x7, 0x8000, 0x3, 0x3}, r6, 0x7, r5, 0xa) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x20, 0x8, 0x0, 0x0, r1, 0x4}, 0xe) recvmsg(r4, &(0x7f0000000c00)={&(0x7f0000000a80)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000b00)=""/78, 0x4e}], 0x1, &(0x7f0000000500)=""/23, 0x17, 0x7f}, 0x0) sendmsg$kcm(r5, &(0x7f0000002280)={&(0x7f0000000c40)=@hci={0x1f, r7, 0x3}, 0x80, &(0x7f0000001f80)=[{&(0x7f0000000cc0)="9f529acdcd2bdc9389bbdf18209eb26f26aa81b2af7e28f327babee996ad81b1a40b1d420c3afd8b5f60a1acdc8ce6fba581c6e142a436d1db1591666f1ddaec762c2c083e2ff0f98ce1ceb3e9d798e8b794cca70061117286cd7da9b8f55590bfcf39202a89131b9f00f1bdaa522f41949cc93a635df39176b0a6c38637542331477784394a5d42023160bb17a93278882e12106fb6fca99cff4aa2c654b9295faf46ba6bc7e611b06fb345ac57c0b5672a870a73d86b573aadd597bad480a50d530a852c3ac30a2f874729", 0xcc}, {&(0x7f0000000dc0)="f0c20294a9b3ed2c86474c081af96df113bee1e4a2a8bfb3d308a8a6dd46d2ef0ed3eb7e0cbff012a8e66b1398dc32587b89e2c7473822dbb750643111f6dfa775ec07ce861dd2e88f967d236e6983f349bec0adba36c9e5db2780293e4dc8fb4a717d", 0x63}, {&(0x7f0000000e40)="9739349847302c66a3f17f83f54315478675a18140fda166ff1c9b74fc63d18556b9da", 0x23}, {&(0x7f0000000e80)="8a754fdfd9108045e7049bb1f4f38c949030088826a1e24b7ba5a80e2f736736a65d54dd944342a82b373b01262d012082fd9d4d1f77d9424d74014c4230b7faf7125e5ef4273ded139e89dfe137e265c77b", 0x52}, {&(0x7f0000000f00)="4d4e5c0ec320481d26e7ff0455287e7a951a9b1a992c8449a7717646ac2e095869bd8f949e37646b16c7f839ff1a533a39558d19a864d42f2e2d8bc67ccf0b35613bbb9cd39a40cb8a9834fe6ec8a4225a29974c79a3a595f341160f9b4b9f526563d64cb4b83bcb", 0x68}, {&(0x7f0000000f80)="33370f78ea3566823026a536f8a0477b27913c78140ee95149d436d52d1e161226ac0398254224ecf115c8367c757558863cf35c92b552e39770e78d6aab898ae2b7f6ae29b1d75868134ffe9e5382956ec50e698e6f7d8b7fa6f069b64a2f1ce7b34f4e1a9e36a752865798e7b5482cfec796470a31697a3fe729f1197ea55cffdd3514640d6bf9634f6f797c407c332a44dcc6c548368d0ff581e0458a40f3a969324424ee5ea2de1bdefd4172a73a029f0447e529cdc55b30b66366e8a79a03edf652f28f90bde0c1dc16bc9db6730afa6a5fd66be46cce1647bb7544e52ad728c5c672d28a1a641b4c1954ab9370aae46e220e517a1adefe7700ae196e5e9951bc70e35a27e608e49fbf3e6806b2c862bf56a13d98574533ba4feae6cdcdc3739a567282fffc102bb8d87dedd1ea1acf53e0def73132bfdd93d4f66c881e3ef14f8c38c50ecd6d79382ec58c8641db46e807a408584c446fe1d51b713c112bebe87cd21262c74a4053ab9f802f0a4367dd8d9ce2998118d07b7a3020eae0742ff3fdeafcb0ed7082fd70788e1f279dfd7f9c1480a8dff5c620f4d0351bb885b4b92ca59e58b6d2f7f91d91397ecd873a9a3bcd4b9040ee5ac1870b70e60f71a9fd59247a6d0f6d8768f2648d15a8ba86eb94a012076a002d35de62fece6d6e010dc9becb922159e2b4d19b577bc88f9ea3fb2fbf20e629283c94377b939274ff0dec9da36b1535782afc49558be5a44580c5c94c17b67ba71b042a542ffeebc77c1291db922670ee978e7e181358943f43a68cd4bebb99e4c5f9a4078505e88997f8023920c97f3980396ae9ae9f2dda3deede9e28e419223273f9b34bb979eabfd33c0b8b8972eaa6da7663ec63a36863fd8bbc63ac9c811581c9b69256b7470002cfc0ce8b96e007f7f0a578701d688c86b23de0485d570f671b011902de93aba84debd910f344c4bf4852cb897d941e479c222ad85cc360b067c1566681d689b4d904f3e3c745f3a83c549de5d708f0088a8df4acf7967881710aea1586f09b4fa10b0c6ab970a7b21fdf32f8b14ac7d211f458a216dbc3fa5cdc4a2532c2e2c8ea8e62ff0108257d07dfb695327847f2156a69c746ecdc91e4f1f08ed29b9872555a0af77857bdd7a2e0c739f95527537d7548613cb8a90dd26443ea805a06b57816ef22d7e5fd1aa437772fea56aba5497c54ffc7f6392e53d94747f0ea4b2049058431c9b9e270db0066131b38406110d563d0bc2d3a90c04331afd73ebed57f8ab874d8545a926e9aa0ad250a27defa01f28e682ab5fd6378c3b7616df4c54bc00a4dc19686d4f4a243f449c79b50b1a6381d7fd51ae0308464f7746611f159ffea7418b06e003097cb9acd5e63259773850bb343c023c826351114cb05db043b7b642ef507f01091318712058dafcf4aeb0131da6477e83a97b8ad6a766c716aab2a990ff85534dba9d260ccfdb0137acf5059c38f31eeedef273e2fd16b6c837ad74eaedf411efa99ab15bd2f39845cc40b25ae3520d6704e353a061ee61e1096a144f08a45644e2cd2892456357499fc184b137a359637caec2ff7434849b5928977f2f38384debeec8d70af146d60bcffd8e5be0dc40afe51db984bd23da3fbd3bf54bcb8a9d49bc5ee1ae54baa3d4652589e4efe9af4a08936bc032a171bca72c7e96420e71217f1929f5cd36374a5246ff40a80883f5bbcdf099ad85c3c2fab0826b090431de8085fd8639cadbdac86f52d3137b7c2ed82e1cd6133e566ff1cecbb3ab0c941975379a151b818e583d9bc3d5c23f22a930f1abeaedb9ba85ade46f69aadcab3c3144cccb2128f9b4307eefac060168a412aa9e981d6b4065d96964c6bcb868bd2c6302f375cf9612f726ec72f504b080f1f9cb00cd04490c67e7bcc6154ff0869ff8002d930db76b2ad7d07ebe721ae745e946cec40c4d698fe20709081154ccdfc6576ea59b3b37cd9755484d774746c908725e2056f7857355796bc60ee8c44f7a703ecc9478505388c69618e1cecbf1c20f5d05d6199601d3756b8f23512238ae0e1624ca76b1a92690117b7f92f5908dbddbfa5d8e8a66fdd5264e580ee5377f5206aabadbf0decd842b671d374cdbf461daee327663284db50c0a0d2576f128d08ac5b34d8f46846a2b89e298df9f9c06e669d792332456f431250c5361fdcd7b50f5f81d4c6dab461d6cb312eaa387b5dbd0c1279105bb75cfbf0f7e1240f890c0e184a3a1211da567034f2bc9de791360b3c9774c65d6775b840e17c8f22252960dc1a3092f758e044498f96c1176af76f4a9a86a14cbd765c1fc2ca80d42a911c00ba9327f2c1afa27e6e04740c2c36e156dc2d8acb875595a2d10e1f814db75f676133837ce38cb693d13cc27efec5e90bd9de27492916aec5dd49bf4840772a45f75eb1ab30b18c4f2affff5281232aac013af592855c849b95b71be6788bf22d0595e77f549b5f29f07f402e1041f2a84fa993cc4094fb60456f3abbd92b6958206db88a22294e5b9472e0a5cf9033c476ff4abc51aac2a0b0417e8b981d41c9121f47a23979c39a9021f3fee5728d6b9cb080cf0164f119e819370910defa6acabe000689e994b2b2e46406ddeb40f47e4a56ffcc14073976890f1788e3ee23221b4d829bc498aa6a758caae0d304fc85750fd9eef38d0efc52ab0de31d0afee6dd8d8f467dd673a904f52abdab68d007182abd3f2d7b280a41cba53b6493dbb80b9ff992b7a5e0aae12ebc325a87a4f828b1ff4944e1b59c3b3c4281d7f6c4828c8ba55114fdcf7451a754b42db7ef1b8f5dd21cc033a19bf8fc64c86b7dde5f7e136be60933f9100248a30b5b9061a55dca3e1510fc4db53477e732fc0a392e54e11f35a223184d058b5ab1a989cbf1818aefe1db1c836eb7fdc18732ddda309191b4bd6961bccf09495a6957c21ab1b88e25f49e5f4489e398e81e501d3b2aa99c5812b7d5c48db5d97e27bec121d0fd42db564a89660a21f7f20e894675cc73b29ca185b331c66f83d085ef8168475561bdc5ad145ee189516360ef3286d04b50c33ac4bebf3da78a266ba12a1c78f63945ec426dcd55ce137e37ccc4b30b19290414af616ee4a7295ddb47a02b4f7e69076e4af7875c3a0353e69236a2d48b200adf8d8d704c5d53a63af022904b23d8491bae33c09af526d2e6d12d728243821e82bf3fa1a61004289baac2590be9499ac07bab05073084965a6bc3f29429daadcbcca4cd8978b375ad1b07e417559e0a36e46801610d4eccd1dbee8029a32dbaa16d2a47836d0a7fe4b2dede14252317104204f774ebefc2e55b85c8af9937e2c153c750c3ca12a82910f86de4be76dded0e181b34c871b2aa9116e28e88876504a4a51ed9eac7c783424ebd74173003476425637245fb1bedc7b893878ff79b368948a57fd48737d5ee5bcf36501b51282cdda7d974b19b05650bf5da78fdc32f80f420b2bad4f16977c043fd6119f6191be9d7f8f4beb141c96bc3479c0104cb07f561fce8e5e426eb8ebb18e3640efd6d9b8ac3f86a36c444ef096ed8b31ec6f221ddc48f1fe47e4ea2348bac00c14bfee84ae372b5408c2e857b65abe2db51665b56e735ecb6f0e20fbb1b462923f2ad824008c5bb344da3e08970a3fbef1e34b4dc53096103f989cb0a1086754a7bd40ec63f80d1d3eb61903d5c27900920443b15fabc8efb1d76bc2b2579d84df3bda17d853ab144a4344a26c1c6ddac7f11266621bf22225c345c076318786940202813d6d7ab4ef9601c7e4f06cbed6ca921f56dbca06473b0e16a4b15b5ec3a96cdd28817bda688f3298579d3a92d09fef06b5db2f3d959c686dcf21d53530db8e7fe42aaace37bb0ec8cb6affebb7bcc4cb0477bc444a0c231b218a859c7b1e066d6ea4e4c45d459715f0768a79fd3bc2dd9324e1ed6d7ee606700a81e9f6134bf77abd80e56b04202ad4eb4b11471ad6ccdf10ccf91872d59d5f9ceb3512649edb891ea88d2492784e3463c5109b0801dce9d5c6cf52570342bad48ec169e51f44ed279dc47d527fc4d4e93a5f809bb76b5d744a86c7eaebb9c27a6c25185cb4a43457e52e967e16951540027a319978b2af539b05e60ac18617c5fd01491e7138873708cf4fe4bb485aa90d31ad66a67ac81e0569001d73f31a4721ddc3071a095e05d7f85bff878910483f7764001e7919c9ac0e6b680600e43efb0973c221a2434ce659d6a70a815657a8258f8b3d6c1e909713025c96e61a4e6b3451fa12fbff54396b20b5956b94210449050f985e5ab728622342f28a7b022bacfcbb163064de3e9243be3e33be0fd6b4d20555472317fc978cd7185ff0e67abca305a8564c1b0be115af2f0a171fbd27e591baaeaa176cfafbed8e39cc7ab4b4f764c0ae1c7089231391479a3046167b308c02fb8def15e5a96775b87fa4e54f1f6f10559278c85359b032921480a8114b7e1223178323543cb769c85987d231a519cd794f0b06dfd0241368905784fef4845c46691d573857ec956c50c20db4feee531a72c52b441f292159c58357c3d206c879a516f599dfc7c239e0bdcd0eb34e17f6ccb4ddf641b01a722d4219c30a962883be457f1c2d1c6770c2ddee3c27920c6ac9895586a904247bd676fd420ee40969d7c95a70962edc4a1cef7fc7e271ecb0efd68180e155eb5a27b5a50c3cdbc1cc0b941bc43eac2c0d558345179060754971cde634429bafd3caf0d2226967d0accdf86f45fd38ca50849cbc2845fbff29539edbca3092f38ea056e4b1e0ba4253d30e6de6a1f9a7c794b2301c8e7c837da90ed480f9d9825aa3bac63c69e62bff666f61d0c62f5d822effb5ca85da599b31c01057f6b5059e3c2e987d49a6e6b74f05da6936e366ce4d1f18eee413c9496e06d1d49ac7a17a458b118e40a659a08ebd5bf32efae2e3d421b8602096bafcc19a458c07e66cd789e3380ea82bf0c75a57cac3f1134632482a5352d18bceafcac704bf00e864b229d01f8b92de1cd488dee265942d073ec30854b04928fd676fafb1b6702db7ec825c66d3d800eb068a9bd4fcf8f766cf9912bf18ce5e7e1518f1ede26b393d7264fdb8d492cddc83da08d0e880d971ba123635242c8c63c000f7638ffb92946e7188d5c137ee4a59e07bf0ff0d232d7e80dbf3d17cf6faa73201a0a1a4e03d55d77b770211e3c3b685a5a65158023983412e776932023c780a7240878ff53964a1ec27ab6c4078f3b2aebb1c3574eed208f0d38fd20a550327d838edfa7e7d9714539a497ae70f572883ec8b3c0080112f3ada30fd610bfc194700a5a3618cf7747c32f3de32b9c28ff4ee824361aec65f6c24dd1875a54fd261379ae8047bd689cd2947d72dd227cd120f6caba654b58437850e79e5e88fa9a412f18ec586ccc21adc26c70192927e5539818e3267a89a5f6b2a21fff7b7bb588226bd03798411a2e5c9aef6e23c6a881e0afec2b9f0504329e066af28a60d3f8f89fcb55558311f78441835e63b996b7809aed7dcb14de150b84324af2a2071fcd254f88d452425e830bd4ec3063b4dd5df4dd0ed92e91c830772972d35746bd9e8ed07d5f4841350e0d102bf0a6079b83db05a45ce016e047d975b69cc828e68fbaf29039f28fdb2c44a146e280185bedae792461249546028c60e64a865fd04d654ce5b33dbe57734271950725b8b27d6d500e3bbf73a36c8ce27ddfb92a04ce537490feae4f7d96e740f2cf445bcca6e7e4ed2b8f592bc0d6ba067303eaee69a244d209a40a5c5d5b4d386674cf5a741f", 0x1000}], 0x6, &(0x7f00000022c0)=ANY=[@ANYBLOB="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"], 0x248, 0x8050}, 0x10) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)) perf_event_open(&(0x7f000025c000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r8 = gettid() mkdir(&(0x7f00000004c0)='./file0\x00', 0x1) r9 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0xfff, 0x100000001, 0xfffffffffffffffb, 0x0, 0x8001, 0x0, 0x1, 0x0, 0xfffffffffffffff9, 0x0, 0x9, 0x9, 0x5, 0x8, 0x1, 0x8106, 0x0, 0x14000000000, 0x80000000, 0x1, 0x5, 0x0, 0x40, 0x2839, 0x1d, 0x800, 0x7, 0x0, 0x0, 0x5, 0x7, 0x0, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x4}, 0x0, 0x0, 0xff, 0x0, 0x3, 0x8, 0x3}, r8, 0x2, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=r3, 0x4) perf_event_open(&(0x7f00000003c0)={0x7, 0x70, 0x7fff, 0x5, 0x6, 0x8000, 0x0, 0x1000, 0x0, 0x7, 0x1000, 0x1, 0xffffffff, 0x3, 0xaf99, 0x40, 0x8001, 0xfffffffffffffffa, 0x1, 0x80000000, 0xe6d1, 0x4, 0x8001, 0x9, 0x1f, 0xfffffffffffffc00, 0x0, 0x0, 0x7ff, 0x15ac000000000000, 0x0, 0x3, 0x1, 0xfffffffffffffffe, 0x9, 0xff, 0x1, 0x2, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000002c0), 0x8}, 0x0, 0x3, 0x6, 0x1, 0x5, 0xb03c, 0x5}, r8, 0xc, r9, 0xb) bpf$MAP_CREATE(0x0, &(0x7f0000000640)={0x8, 0x6bcb8e63, 0x0, 0x59ad, 0x12, r0, 0x8001}, 0xfffffffffffffeb9) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000880)={r0, &(0x7f0000000840), &(0x7f00000008c0)=""/70}, 0x375) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000280)={0xffffffffffffffff, 0xffffff8f, &(0x7f0000000300)}, 0x10) 2018/03/31 09:08:20 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xf, 0x5, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x80000000}, [@map={0x18, 0x1, 0x1, 0x0, 0x1}], {0x95}}, &(0x7f0000000040)='syzkaller\x00', 0x3, 0x10, &(0x7f0000000080)=""/16, 0x41000, 0x2f3100a785778bd1}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000001c0)={r0, 0x50, &(0x7f0000000140)}, 0x10) close(r0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000780)={&(0x7f0000000240)=@ax25, 0x80, &(0x7f0000000600)=[{&(0x7f00000002c0)=""/114, 0x72}, {&(0x7f0000000340)=""/133, 0x85}, {&(0x7f0000000400)=""/23, 0x17}, {&(0x7f0000000440)=""/59, 0x3b}, {&(0x7f0000000480)=""/114, 0x72}, {&(0x7f0000000500)=""/45, 0x2d}, {&(0x7f0000000540)=""/83, 0x53}, {&(0x7f00000005c0)}], 0x8, &(0x7f0000000680)=""/214, 0xd6, 0x100}, 0x40) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000007c0)={0xffffffffffffffff}) recvmsg(r2, &(0x7f00000019c0)={&(0x7f0000000800)=@ax25, 0x80, &(0x7f00000018c0)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000001880)=""/18, 0x12}], 0x2, &(0x7f0000001900)=""/184, 0xb8, 0x3}, 0x1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001a80)={r4, 0x50, &(0x7f0000001a00)}, 0x10) r5 = perf_event_open(&(0x7f0000001b00)={0x2, 0x70, 0x6, 0x8, 0x80000000, 0x10001, 0x0, 0x7ff, 0x4, 0xa, 0x200, 0x20, 0x72, 0x5, 0x0, 0x0, 0x5, 0x8f, 0x9ed, 0xff, 0x0, 0xa58, 0x7f, 0xf2f, 0x4503, 0x6, 0x81, 0x5, 0x1ff, 0xffffffff00000000, 0x2, 0x5, 0x9000000000000, 0xfffffffffffffffa, 0x8, 0x10001, 0x731ab510, 0x9, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000001ac0), 0x1}, 0x80, 0x2b4, 0x200, 0x3, 0x6, 0x9, 0x4}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0x20000) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000001b80)) r6 = getpid() r7 = perf_event_open(&(0x7f0000001c00)={0x1, 0x70, 0x0, 0xfff, 0x4, 0x80000000, 0x0, 0x3, 0x40, 0xa, 0x7, 0x7, 0x7, 0x4800000000000000, 0x7, 0x6, 0x62b, 0x8, 0x9, 0x100000000, 0x1, 0x0, 0x5, 0xd199, 0x1f, 0x10000, 0xff80000000000000, 0x3, 0x4, 0x8, 0x80000001, 0x8000, 0x7fff, 0x4, 0x16, 0x7, 0x40, 0x8, 0x0, 0x5, 0x50031dd1e89e26d1, @perf_bp={&(0x7f0000001bc0), 0x2}, 0x10000, 0x3a, 0x80000001, 0x1, 0x2c, 0x3ff, 0x6}, r6, 0x6, r3, 0x3) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000001c80)=r0, 0x4) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000001cc0)) ioctl$PERF_EVENT_IOC_REFRESH(r7, 0x2402, 0xffffffff) r8 = perf_event_open(&(0x7f0000001d00)={0x0, 0x70, 0x7, 0x400, 0x100, 0xac, 0x0, 0x100000000, 0xc2800, 0xa, 0x33e3, 0x2, 0x10001, 0x8, 0x5, 0x100000001, 0x2e9, 0x2, 0xc1, 0xf2, 0x2, 0x9, 0xffff, 0x7, 0x1, 0x0, 0x8000, 0x800, 0xfffffffffffffffa, 0x40, 0x0, 0x3, 0x6, 0xfa4, 0x7, 0xffffffffffff8000, 0x0, 0x0, 0x0, 0x8000, 0x3, @perf_config_ext={0x400}, 0x100, 0xa264, 0x4, 0x7, 0x2, 0x1000, 0x92}, r6, 0x5, r7, 0x1) socketpair(0x7, 0x6, 0x1, &(0x7f0000001d80)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000001e00)={&(0x7f0000001dc0)='./file0\x00', r9}, 0x10) r10 = perf_event_open(&(0x7f0000001e40)={0x4, 0x70, 0x5, 0x4, 0x8, 0x6, 0x0, 0x2, 0x1425, 0xb, 0x0, 0xcc9, 0x400, 0x57f90db4, 0x80000000, 0x7, 0x1000, 0x0, 0x8, 0x8000, 0xffffffff, 0x400, 0x1, 0x6, 0x40, 0x2, 0x10000, 0x8, 0x9, 0xfffffffffffffff8, 0x9, 0x4, 0x3, 0x400, 0x3, 0x9, 0x3, 0x100, 0x0, 0x6, 0x0, @perf_config_ext={0x4, 0x2}, 0x20, 0x3ff, 0x0, 0x7, 0x3, 0x5, 0xfa5e}, r6, 0xd, r7, 0x2) bpf$OBJ_GET_MAP(0x7, &(0x7f0000001f00)={&(0x7f0000001ec0)='./file0\x00'}, 0x10) socketpair$inet6_sctp(0xa, 0x0, 0x84, &(0x7f0000001f40)) ioctl$PERF_EVENT_IOC_DISABLE(r10, 0x2401, 0xbad) r11 = perf_event_open(&(0x7f0000001fc0)={0x3, 0x70, 0xff, 0x2f, 0x2, 0x7, 0x0, 0x40, 0x80000, 0x1, 0x8, 0x6, 0xfffffffffffffffb, 0x7, 0x2, 0x10000, 0x6, 0x5, 0x0, 0x10, 0x6, 0xc58, 0x7f, 0x3, 0x2, 0x3, 0x5, 0x80000000800000, 0x7, 0xfff, 0x16, 0x2b65, 0x9, 0x69244395, 0x10000, 0x4, 0x9, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000001f80), 0x8}, 0x100, 0x8, 0x51b4, 0x4, 0x800, 0xb7, 0x4800}, r6, 0x8, r8, 0x1) r12 = gettid() socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000002040)) perf_event_open(&(0x7f0000002080)={0x0, 0x70, 0x100, 0x0, 0x2, 0x401, 0x0, 0x6, 0x1, 0x6, 0x656, 0x5, 0xfffffffffffff973, 0xffffffffffffffff, 0x9, 0x7, 0x3, 0x3ff, 0x1c000000, 0x10000, 0x6, 0x20, 0x6, 0x1, 0x1, 0x4, 0x2, 0x20, 0x9, 0xed5, 0x847, 0x1000, 0x0, 0x0, 0x102bed3b, 0x9, 0x7fffffff, 0x6, 0x0, 0x24, 0x0, @perf_config_ext={0x100000001, 0x6}, 0x200, 0x800000010000000, 0x7, 0x7, 0x1000, 0xf3, 0xe87}, r12, 0xf, r11, 0x8) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000002100)) perf_event_open(&(0x7f0000002180)={0x4, 0x70, 0x0, 0x8, 0xff, 0x0, 0x0, 0xfffffffffffffff9, 0x10001, 0x3, 0xffffffffffffff00, 0x93eb, 0x0, 0x4e5e, 0x8001, 0xfffffffffffffff8, 0x7, 0x1f4, 0x80000001, 0x99b, 0x4, 0x8, 0xed8, 0x3f, 0xec9, 0x6, 0x1, 0x4ab8, 0x8, 0x2, 0xdd, 0x9, 0xffffffffffffffff, 0x8000, 0x0, 0x6, 0xffff, 0x8, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000002140), 0xf}, 0x400, 0x5, 0x7, 0x4, 0x7, 0x4}, r12, 0x3, r7, 0x8) 2018/03/31 09:08:20 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x5, 0x100000000209e20, 0x8000000001, 0x5}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x13, 0x0, 0x7ffff9, 0x0, 0x20000003, 0x0}, 0x2c) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x13, 0x0, 0x7ffff9, 0x0, 0x20000003, 0x0}, 0x2c) 2018/03/31 09:08:20 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xf, 0x5, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x80000000}, [@map={0x18, 0x1, 0x1, 0x0, 0x1}], {0x95}}, &(0x7f0000000040)='syzkaller\x00', 0x3, 0x10, &(0x7f0000000080)=""/16, 0x41000, 0x2f3100a785778bd1}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000001c0)={r0, 0x50, &(0x7f0000000140)}, 0x10) close(r0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000780)={&(0x7f0000000240)=@ax25, 0x80, &(0x7f0000000600)=[{&(0x7f00000002c0)=""/114, 0x72}, {&(0x7f0000000340)=""/133, 0x85}, {&(0x7f0000000400)=""/23, 0x17}, {&(0x7f0000000440)=""/59, 0x3b}, {&(0x7f0000000480)=""/114, 0x72}, {&(0x7f0000000500)=""/45, 0x2d}, {&(0x7f0000000540)=""/83, 0x53}, {&(0x7f00000005c0)}], 0x8, &(0x7f0000000680)=""/214, 0xd6, 0x100}, 0x40) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000007c0)={0xffffffffffffffff}) recvmsg(r2, &(0x7f00000019c0)={&(0x7f0000000800)=@ax25, 0x80, &(0x7f00000018c0)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000001880)=""/18, 0x12}], 0x2, &(0x7f0000001900)=""/184, 0xb8, 0x3}, 0x1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001a80)={r4, 0x50, &(0x7f0000001a00)}, 0x10) r5 = perf_event_open(&(0x7f0000001b00)={0x2, 0x70, 0x6, 0x8, 0x80000000, 0x10001, 0x0, 0x7ff, 0x4, 0xa, 0x200, 0x20, 0x72, 0x5, 0x0, 0x0, 0x5, 0x8f, 0x9ed, 0xff, 0x0, 0xa58, 0x7f, 0xf2f, 0x4503, 0x6, 0x81, 0x5, 0x1ff, 0xffffffff00000000, 0x2, 0x5, 0x9000000000000, 0xfffffffffffffffa, 0x8, 0x10001, 0x731ab510, 0x9, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000001ac0), 0x1}, 0x80, 0x2b4, 0x200, 0x3, 0x6, 0x9, 0x4}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0x20000) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000001b80)) r6 = getpid() r7 = perf_event_open(&(0x7f0000001c00)={0x1, 0x70, 0x0, 0xfff, 0x4, 0x80000000, 0x0, 0x3, 0x40, 0xa, 0x7, 0x7, 0x7, 0x4800000000000000, 0x7, 0x6, 0x62b, 0x8, 0x9, 0x100000000, 0x1, 0x0, 0x5, 0xd199, 0x1f, 0x10000, 0xff80000000000000, 0x3, 0x4, 0x8, 0x80000001, 0x8000, 0x7fff, 0x4, 0x16, 0x7, 0x40, 0x8, 0x0, 0x5, 0x50031dd1e89e26d1, @perf_bp={&(0x7f0000001bc0), 0x2}, 0x10000, 0x3a, 0x80000001, 0x1, 0x2c, 0x3ff, 0x6}, r6, 0x6, r3, 0x3) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000001c80)=r0, 0x4) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000001cc0)) ioctl$PERF_EVENT_IOC_REFRESH(r7, 0x2402, 0xffffffff) r8 = perf_event_open(&(0x7f0000001d00)={0x0, 0x70, 0x7, 0x400, 0x100, 0xac, 0x0, 0x100000000, 0xc2800, 0xa, 0x33e3, 0x2, 0x10001, 0x8, 0x5, 0x100000001, 0x2e9, 0x2, 0xc1, 0xf2, 0x2, 0x9, 0xffff, 0x7, 0x1, 0x0, 0x8000, 0x800, 0xfffffffffffffffa, 0x40, 0x0, 0x3, 0x6, 0xfa4, 0x7, 0xffffffffffff8000, 0x0, 0x0, 0x0, 0x8000, 0x3, @perf_config_ext={0x400}, 0x100, 0xa264, 0x4, 0x7, 0x2, 0x1000, 0x92}, r6, 0x5, r7, 0x1) socketpair(0x7, 0x6, 0x1, &(0x7f0000001d80)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000001e00)={&(0x7f0000001dc0)='./file0\x00', r9}, 0x10) r10 = perf_event_open(&(0x7f0000001e40)={0x4, 0x70, 0x5, 0x4, 0x8, 0x6, 0x0, 0x2, 0x1425, 0xb, 0x0, 0xcc9, 0x400, 0x57f90db4, 0x80000000, 0x7, 0x1000, 0x0, 0x8, 0x8000, 0xffffffff, 0x400, 0x1, 0x6, 0x40, 0x2, 0x10000, 0x8, 0x9, 0xfffffffffffffff8, 0x9, 0x4, 0x3, 0x400, 0x3, 0x9, 0x3, 0x100, 0x0, 0x6, 0x0, @perf_config_ext={0x4, 0x2}, 0x20, 0x3ff, 0x0, 0x7, 0x3, 0x5, 0xfa5e}, r6, 0xd, r7, 0x2) bpf$OBJ_GET_MAP(0x7, &(0x7f0000001f00)={&(0x7f0000001ec0)='./file0\x00'}, 0x10) socketpair$inet6_sctp(0xa, 0x0, 0x84, &(0x7f0000001f40)) ioctl$PERF_EVENT_IOC_DISABLE(r10, 0x2401, 0xbad) r11 = perf_event_open(&(0x7f0000001fc0)={0x3, 0x70, 0xff, 0x2f, 0x2, 0x7, 0x0, 0x40, 0x80000, 0x1, 0x8, 0x6, 0xfffffffffffffffb, 0x7, 0x2, 0x10000, 0x6, 0x5, 0x0, 0x10, 0x6, 0xc58, 0x7f, 0x3, 0x2, 0x3, 0x5, 0x80000000800000, 0x7, 0xfff, 0x16, 0x2b65, 0x9, 0x69244395, 0x10000, 0x4, 0x9, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000001f80), 0x8}, 0x100, 0x8, 0x51b4, 0x4, 0x800, 0xb7, 0x4800}, r6, 0x8, r8, 0x1) r12 = gettid() socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000002040)) perf_event_open(&(0x7f0000002080)={0x0, 0x70, 0x100, 0x0, 0x2, 0x401, 0x0, 0x6, 0x1, 0x6, 0x656, 0x5, 0xfffffffffffff973, 0xffffffffffffffff, 0x9, 0x7, 0x3, 0x3ff, 0x1c000000, 0x10000, 0x6, 0x20, 0x6, 0x1, 0x1, 0x4, 0x2, 0x20, 0x9, 0xed5, 0x847, 0x1000, 0x0, 0x0, 0x102bed3b, 0x9, 0x7fffffff, 0x6, 0x0, 0x24, 0x0, @perf_config_ext={0x100000001, 0x6}, 0x200, 0x800000010000000, 0x7, 0x7, 0x1000, 0xf3, 0xe87}, r12, 0xf, r11, 0x8) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000002100)) perf_event_open(&(0x7f0000002180)={0x4, 0x70, 0x0, 0x8, 0xff, 0x0, 0x0, 0xfffffffffffffff9, 0x10001, 0x3, 0xffffffffffffff00, 0x93eb, 0x0, 0x4e5e, 0x8001, 0xfffffffffffffff8, 0x7, 0x1f4, 0x80000001, 0x99b, 0x4, 0x8, 0xed8, 0x3f, 0xec9, 0x6, 0x1, 0x4ab8, 0x8, 0x2, 0xdd, 0x9, 0xffffffffffffffff, 0x8000, 0x0, 0x6, 0xffff, 0x8, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000002140), 0xf}, 0x400, 0x5, 0x7, 0x4, 0x7, 0x4}, r12, 0x3, r7, 0x8) 2018/03/31 09:08:20 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x5, 0x100000000209e20, 0x8000000001, 0x5}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x13, 0x0, 0x7ffff9, 0x0, 0x20000003, 0x0}, 0x2c) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x13, 0x0, 0x7ffff9, 0x0, 0x20000003, 0x0}, 0x2c) 2018/03/31 09:08:20 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x5, 0x100000000209e20, 0x8000000001, 0x5}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x13, 0x0, 0x7ffff9, 0x0, 0x20000003, 0x0}, 0x2c) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x13, 0x0, 0x7ffff9, 0x0, 0x20000003, 0x0}, 0x2c) 2018/03/31 09:08:20 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xf, 0x5, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x80000000}, [@map={0x18, 0x1, 0x1, 0x0, 0x1}], {0x95}}, &(0x7f0000000040)='syzkaller\x00', 0x3, 0x10, &(0x7f0000000080)=""/16, 0x41000, 0x2f3100a785778bd1}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000001c0)={r0, 0x50, &(0x7f0000000140)}, 0x10) close(r0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000780)={&(0x7f0000000240)=@ax25, 0x80, &(0x7f0000000600)=[{&(0x7f00000002c0)=""/114, 0x72}, {&(0x7f0000000340)=""/133, 0x85}, {&(0x7f0000000400)=""/23, 0x17}, {&(0x7f0000000440)=""/59, 0x3b}, {&(0x7f0000000480)=""/114, 0x72}, {&(0x7f0000000500)=""/45, 0x2d}, {&(0x7f0000000540)=""/83, 0x53}, {&(0x7f00000005c0)}], 0x8, &(0x7f0000000680)=""/214, 0xd6, 0x100}, 0x40) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000007c0)={0xffffffffffffffff}) recvmsg(r2, &(0x7f00000019c0)={&(0x7f0000000800)=@ax25, 0x80, &(0x7f00000018c0)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000001880)=""/18, 0x12}], 0x2, &(0x7f0000001900)=""/184, 0xb8, 0x3}, 0x1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001a80)={r4, 0x50, &(0x7f0000001a00)}, 0x10) r5 = perf_event_open(&(0x7f0000001b00)={0x2, 0x70, 0x6, 0x8, 0x80000000, 0x10001, 0x0, 0x7ff, 0x4, 0xa, 0x200, 0x20, 0x72, 0x5, 0x0, 0x0, 0x5, 0x8f, 0x9ed, 0xff, 0x0, 0xa58, 0x7f, 0xf2f, 0x4503, 0x6, 0x81, 0x5, 0x1ff, 0xffffffff00000000, 0x2, 0x5, 0x9000000000000, 0xfffffffffffffffa, 0x8, 0x10001, 0x731ab510, 0x9, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000001ac0), 0x1}, 0x80, 0x2b4, 0x200, 0x3, 0x6, 0x9, 0x4}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0x20000) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000001b80)) r6 = getpid() r7 = perf_event_open(&(0x7f0000001c00)={0x1, 0x70, 0x0, 0xfff, 0x4, 0x80000000, 0x0, 0x3, 0x40, 0xa, 0x7, 0x7, 0x7, 0x4800000000000000, 0x7, 0x6, 0x62b, 0x8, 0x9, 0x100000000, 0x1, 0x0, 0x5, 0xd199, 0x1f, 0x10000, 0xff80000000000000, 0x3, 0x4, 0x8, 0x80000001, 0x8000, 0x7fff, 0x4, 0x16, 0x7, 0x40, 0x8, 0x0, 0x5, 0x50031dd1e89e26d1, @perf_bp={&(0x7f0000001bc0), 0x2}, 0x10000, 0x3a, 0x80000001, 0x1, 0x2c, 0x3ff, 0x6}, r6, 0x6, r3, 0x3) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000001c80)=r0, 0x4) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000001cc0)) ioctl$PERF_EVENT_IOC_REFRESH(r7, 0x2402, 0xffffffff) r8 = perf_event_open(&(0x7f0000001d00)={0x0, 0x70, 0x7, 0x400, 0x100, 0xac, 0x0, 0x100000000, 0xc2800, 0xa, 0x33e3, 0x2, 0x10001, 0x8, 0x5, 0x100000001, 0x2e9, 0x2, 0xc1, 0xf2, 0x2, 0x9, 0xffff, 0x7, 0x1, 0x0, 0x8000, 0x800, 0xfffffffffffffffa, 0x40, 0x0, 0x3, 0x6, 0xfa4, 0x7, 0xffffffffffff8000, 0x0, 0x0, 0x0, 0x8000, 0x3, @perf_config_ext={0x400}, 0x100, 0xa264, 0x4, 0x7, 0x2, 0x1000, 0x92}, r6, 0x5, r7, 0x1) socketpair(0x7, 0x6, 0x1, &(0x7f0000001d80)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000001e00)={&(0x7f0000001dc0)='./file0\x00', r9}, 0x10) r10 = perf_event_open(&(0x7f0000001e40)={0x4, 0x70, 0x5, 0x4, 0x8, 0x6, 0x0, 0x2, 0x1425, 0xb, 0x0, 0xcc9, 0x400, 0x57f90db4, 0x80000000, 0x7, 0x1000, 0x0, 0x8, 0x8000, 0xffffffff, 0x400, 0x1, 0x6, 0x40, 0x2, 0x10000, 0x8, 0x9, 0xfffffffffffffff8, 0x9, 0x4, 0x3, 0x400, 0x3, 0x9, 0x3, 0x100, 0x0, 0x6, 0x0, @perf_config_ext={0x4, 0x2}, 0x20, 0x3ff, 0x0, 0x7, 0x3, 0x5, 0xfa5e}, r6, 0xd, r7, 0x2) bpf$OBJ_GET_MAP(0x7, &(0x7f0000001f00)={&(0x7f0000001ec0)='./file0\x00'}, 0x10) socketpair$inet6_sctp(0xa, 0x0, 0x84, &(0x7f0000001f40)) ioctl$PERF_EVENT_IOC_DISABLE(r10, 0x2401, 0xbad) r11 = perf_event_open(&(0x7f0000001fc0)={0x3, 0x70, 0xff, 0x2f, 0x2, 0x7, 0x0, 0x40, 0x80000, 0x1, 0x8, 0x6, 0xfffffffffffffffb, 0x7, 0x2, 0x10000, 0x6, 0x5, 0x0, 0x10, 0x6, 0xc58, 0x7f, 0x3, 0x2, 0x3, 0x5, 0x80000000800000, 0x7, 0xfff, 0x16, 0x2b65, 0x9, 0x69244395, 0x10000, 0x4, 0x9, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000001f80), 0x8}, 0x100, 0x8, 0x51b4, 0x4, 0x800, 0xb7, 0x4800}, r6, 0x8, r8, 0x1) r12 = gettid() socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000002040)) perf_event_open(&(0x7f0000002080)={0x0, 0x70, 0x100, 0x0, 0x2, 0x401, 0x0, 0x6, 0x1, 0x6, 0x656, 0x5, 0xfffffffffffff973, 0xffffffffffffffff, 0x9, 0x7, 0x3, 0x3ff, 0x1c000000, 0x10000, 0x6, 0x20, 0x6, 0x1, 0x1, 0x4, 0x2, 0x20, 0x9, 0xed5, 0x847, 0x1000, 0x0, 0x0, 0x102bed3b, 0x9, 0x7fffffff, 0x6, 0x0, 0x24, 0x0, @perf_config_ext={0x100000001, 0x6}, 0x200, 0x800000010000000, 0x7, 0x7, 0x1000, 0xf3, 0xe87}, r12, 0xf, r11, 0x8) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000002100)) perf_event_open(&(0x7f0000002180)={0x4, 0x70, 0x0, 0x8, 0xff, 0x0, 0x0, 0xfffffffffffffff9, 0x10001, 0x3, 0xffffffffffffff00, 0x93eb, 0x1, 0x0, 0x8001, 0xfffffffffffffff8, 0x7, 0x1f4, 0x80000001, 0x99b, 0x4, 0x8, 0xed8, 0x3f, 0xec9, 0x6, 0x1, 0x4ab8, 0x8, 0x2, 0xdd, 0x9, 0xffffffffffffffff, 0x8000, 0x0, 0x6, 0xffff, 0x8, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000002140), 0xf}, 0x400, 0x5, 0x7, 0x4, 0x7, 0x4}, r12, 0x3, r7, 0x8) 2018/03/31 09:08:20 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x5, 0x100000000209e20, 0x8000000001, 0x5}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x13, 0x0, 0x7ffff9, 0x0, 0x20000003, 0x0}, 0x2c) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x13, 0x0, 0x7ffff9, 0x0, 0x20000003, 0x0}, 0x2c) [ 360.192907] RSP: 002b:00007fed74635c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 360.200605] RAX: ffffffffffffffda RBX: 00007fed746366d4 RCX: 0000000000454e79 [ 360.207867] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 360.215127] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 360.222388] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000016 [ 360.229647] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000011 2018/03/31 09:08:20 executing program 1 (fault-call:20 fault-nth:18): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)={0xffffffffffffffff}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x0, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r5 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f00000009c0)={r4}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg(r3, &(0x7f0000000cc0)={&(0x7f0000000400)=@ethernet={0x1}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000580)="4589496d6a3bfcccae07dc729c52ee6bdf10d9cf221f605c25f790103018703b9a67491f96c3f9f8d07204ee4adf21acce1afdaedaba1228b4d33c3fa702a46b1329a0e52eea6a7908fd375ace47", 0x4e}], 0x1, &(0x7f0000000700), 0x0, 0x40000}, 0x4044080) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000740)={0xffffffffffffffff, &(0x7f0000000700)="ec1b815b5cc95d6e0dff859791e3341b8790dcb187f25418f8003a2b3bf345dc"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") close(0xffffffffffffffff) [ 360.395133] FAULT_INJECTION: forcing a failure. [ 360.395133] name failslab, interval 1, probability 0, space 0, times 0 [ 360.406410] CPU: 1 PID: 10105 Comm: syz-executor1 Not tainted 4.16.0-rc6+ #43 [ 360.413684] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 360.423039] Call Trace: [ 360.425639] dump_stack+0x194/0x24d [ 360.429312] ? arch_local_irq_restore+0x53/0x53 [ 360.433987] ? mutex_lock_io_nested+0x1900/0x1900 [ 360.438935] ? __memcg_init_list_lru_node+0x169/0x270 [ 360.444155] should_fail+0x8c0/0xa40 [ 360.447874] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 360.453088] ? trace_hardirqs_off+0x10/0x10 [ 360.457411] ? lock_downgrade+0x980/0x980 [ 360.461550] ? trace_hardirqs_off+0x10/0x10 [ 360.465850] ? find_held_lock+0x35/0x1d0 [ 360.469890] ? __lock_is_held+0xb6/0x140 [ 360.473931] ? check_same_owner+0x320/0x320 [ 360.478226] ? rcu_note_context_switch+0x710/0x710 [ 360.483129] ? rcu_note_context_switch+0x710/0x710 [ 360.488046] should_failslab+0xec/0x120 [ 360.491997] __kmalloc+0x63/0x760 [ 360.495430] ? __kmalloc_node+0x47/0x70 [ 360.499379] ? __list_lru_init+0xcf/0x750 [ 360.503501] __list_lru_init+0xcf/0x750 [ 360.507453] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 360.513311] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 360.518305] ? lockdep_init_map+0x9/0x10 [ 360.522342] sget_userns+0x6b1/0xe40 [ 360.526042] ? set_anon_super+0x20/0x20 [ 360.529994] ? put_filp+0x90/0x90 [ 360.533425] ? destroy_unused_super.part.6+0xd0/0xd0 [ 360.538509] ? alloc_vfsmnt+0x762/0x9c0 [ 360.542471] ? path_lookupat+0x238/0xba0 [ 360.546519] ? mnt_free_id.isra.21+0x50/0x50 [ 360.550904] ? trace_hardirqs_off+0x10/0x10 [ 360.555202] ? putname+0xee/0x130 [ 360.558630] ? cap_capable+0x1b5/0x230 [ 360.562495] ? security_capable+0x8e/0xc0 [ 360.566618] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 360.571877] ? ns_capable_common+0xcf/0x160 [ 360.576172] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 360.581335] mount_ns+0x6d/0x190 [ 360.584768] rpc_mount+0x9e/0xd0 [ 360.588113] mount_fs+0x66/0x2d0 [ 360.591459] vfs_kern_mount.part.26+0xc6/0x4a0 [ 360.596020] ? may_umount+0xa0/0xa0 [ 360.599627] ? _raw_read_unlock+0x22/0x30 [ 360.603749] ? __get_fs_type+0x8a/0xc0 [ 360.607613] do_mount+0xea4/0x2bb0 [ 360.611125] ? __might_fault+0x110/0x1d0 [ 360.615163] ? copy_mount_string+0x40/0x40 [ 360.619371] ? check_same_owner+0x320/0x320 [ 360.623669] ? __check_object_size+0x8b/0x530 [ 360.628143] ? __might_sleep+0x95/0x190 [ 360.632094] ? kasan_check_write+0x14/0x20 [ 360.636313] ? _copy_from_user+0x99/0x110 [ 360.640441] ? memdup_user+0x5e/0x90 [ 360.644133] ? copy_mount_options+0x1f7/0x2e0 [ 360.648604] SyS_mount+0xab/0x120 [ 360.652035] ? copy_mnt_ns+0xb30/0xb30 [ 360.655908] do_syscall_64+0x281/0x940 [ 360.659772] ? vmalloc_sync_all+0x30/0x30 [ 360.663894] ? _raw_spin_unlock_irq+0x27/0x70 [ 360.668365] ? finish_task_switch+0x1c1/0x7e0 [ 360.672836] ? syscall_return_slowpath+0x550/0x550 [ 360.677740] ? syscall_return_slowpath+0x2ac/0x550 [ 360.682643] ? prepare_exit_to_usermode+0x350/0x350 [ 360.687633] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 360.693064] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 360.697882] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 360.703047] RIP: 0033:0x454e79 [ 360.706215] RSP: 002b:00007fed74635c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 360.713905] RAX: ffffffffffffffda RBX: 00007fed746366d4 RCX: 0000000000454e79 [ 360.721149] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 360.728393] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 360.735637] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000016 2018/03/31 09:08:21 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xf, 0x5, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x80000000}, [@map={0x18, 0x1, 0x1, 0x0, 0x1}], {0x95}}, &(0x7f0000000040)='syzkaller\x00', 0x3, 0x10, &(0x7f0000000080)=""/16, 0x41000, 0x2f3100a785778bd1}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000001c0)={r0, 0x50, &(0x7f0000000140)}, 0x10) close(r0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000780)={&(0x7f0000000240)=@ax25, 0x80, &(0x7f0000000600)=[{&(0x7f00000002c0)=""/114, 0x72}, {&(0x7f0000000340)=""/133, 0x85}, {&(0x7f0000000400)=""/23, 0x17}, {&(0x7f0000000440)=""/59, 0x3b}, {&(0x7f0000000480)=""/114, 0x72}, {&(0x7f0000000500)=""/45, 0x2d}, {&(0x7f0000000540)=""/83, 0x53}, {&(0x7f00000005c0)}], 0x8, &(0x7f0000000680)=""/214, 0xd6, 0x100}, 0x40) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000007c0)={0xffffffffffffffff}) recvmsg(r2, &(0x7f00000019c0)={&(0x7f0000000800)=@ax25, 0x80, &(0x7f00000018c0)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000001880)=""/18, 0x12}], 0x2, &(0x7f0000001900)=""/184, 0xb8, 0x3}, 0x1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001a80)={r4, 0x50, &(0x7f0000001a00)}, 0x10) r5 = perf_event_open(&(0x7f0000001b00)={0x2, 0x70, 0x6, 0x8, 0x80000000, 0x10001, 0x0, 0x7ff, 0x4, 0xa, 0x200, 0x20, 0x72, 0x5, 0x0, 0x0, 0x5, 0x8f, 0x9ed, 0xff, 0x0, 0xa58, 0x7f, 0xf2f, 0x4503, 0x6, 0x81, 0x5, 0x1ff, 0xffffffff00000000, 0x2, 0x5, 0x9000000000000, 0xfffffffffffffffa, 0x8, 0x10001, 0x731ab510, 0x9, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000001ac0), 0x1}, 0x80, 0x2b4, 0x200, 0x3, 0x6, 0x9, 0x4}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0x20000) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000001b80)) r6 = getpid() r7 = perf_event_open(&(0x7f0000001c00)={0x1, 0x70, 0x0, 0xfff, 0x4, 0x80000000, 0x0, 0x3, 0x40, 0xa, 0x7, 0x7, 0x7, 0x4800000000000000, 0x7, 0x6, 0x62b, 0x8, 0x9, 0x100000000, 0x1, 0x0, 0x5, 0xd199, 0x1f, 0x10000, 0xff80000000000000, 0x3, 0x4, 0x8, 0x80000001, 0x8000, 0x7fff, 0x4, 0x16, 0x7, 0x40, 0x8, 0x0, 0x5, 0x50031dd1e89e26d1, @perf_bp={&(0x7f0000001bc0), 0x2}, 0x10000, 0x3a, 0x80000001, 0x1, 0x2c, 0x3ff, 0x6}, r6, 0x6, r3, 0x3) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000001c80)=r0, 0x4) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000001cc0)) ioctl$PERF_EVENT_IOC_REFRESH(r7, 0x2402, 0xffffffff) r8 = perf_event_open(&(0x7f0000001d00)={0x0, 0x70, 0x7, 0x400, 0x100, 0xac, 0x0, 0x100000000, 0xc2800, 0xa, 0x33e3, 0x2, 0x10001, 0x8, 0x5, 0x100000001, 0x2e9, 0x2, 0xc1, 0xf2, 0x2, 0x9, 0xffff, 0x7, 0x1, 0x0, 0x8000, 0x800, 0xfffffffffffffffa, 0x40, 0x0, 0x3, 0x6, 0xfa4, 0x7, 0xffffffffffff8000, 0x0, 0x0, 0x0, 0x8000, 0x3, @perf_config_ext={0x400}, 0x100, 0xa264, 0x4, 0x7, 0x2, 0x1000, 0x92}, r6, 0x5, r7, 0x1) socketpair(0x7, 0x6, 0x1, &(0x7f0000001d80)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000001e00)={&(0x7f0000001dc0)='./file0\x00', r9}, 0x10) r10 = perf_event_open(&(0x7f0000001e40)={0x4, 0x70, 0x5, 0x4, 0x8, 0x6, 0x0, 0x2, 0x1425, 0xb, 0x0, 0xcc9, 0x400, 0x57f90db4, 0x80000000, 0x7, 0x1000, 0x0, 0x8, 0x8000, 0xffffffff, 0x400, 0x1, 0x6, 0x40, 0x2, 0x10000, 0x8, 0x9, 0xfffffffffffffff8, 0x9, 0x4, 0x3, 0x400, 0x3, 0x9, 0x3, 0x100, 0x0, 0x6, 0x0, @perf_config_ext={0x4, 0x2}, 0x20, 0x3ff, 0x0, 0x7, 0x3, 0x5, 0xfa5e}, r6, 0xd, r7, 0x2) bpf$OBJ_GET_MAP(0x7, &(0x7f0000001f00)={&(0x7f0000001ec0)='./file0\x00'}, 0x10) socketpair$inet6_sctp(0xa, 0x0, 0x84, &(0x7f0000001f40)) ioctl$PERF_EVENT_IOC_DISABLE(r10, 0x2401, 0xbad) r11 = perf_event_open(&(0x7f0000001fc0)={0x3, 0x70, 0xff, 0x2f, 0x2, 0x7, 0x0, 0x40, 0x80000, 0x1, 0x8, 0x6, 0xfffffffffffffffb, 0x7, 0x2, 0x10000, 0x6, 0x5, 0x0, 0x10, 0x6, 0xc58, 0x7f, 0x3, 0x2, 0x3, 0x5, 0x80000000800000, 0x7, 0xfff, 0x16, 0x2b65, 0x9, 0x69244395, 0x10000, 0x4, 0x9, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000001f80), 0x8}, 0x100, 0x8, 0x51b4, 0x4, 0x800, 0xb7, 0x4800}, r6, 0x8, r8, 0x1) r12 = gettid() socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000002040)) perf_event_open(&(0x7f0000002080)={0x0, 0x70, 0x100, 0x0, 0x2, 0x401, 0x0, 0x6, 0x1, 0x6, 0x656, 0x5, 0xfffffffffffff973, 0xffffffffffffffff, 0x9, 0x7, 0x3, 0x3ff, 0x1c000000, 0x10000, 0x6, 0x20, 0x6, 0x1, 0x1, 0x4, 0x2, 0x20, 0x9, 0xed5, 0x847, 0x1000, 0x0, 0x0, 0x102bed3b, 0x9, 0x7fffffff, 0x6, 0x0, 0x24, 0x0, @perf_config_ext={0x100000001, 0x6}, 0x200, 0x800000010000000, 0x7, 0x7, 0x1000, 0xf3, 0xe87}, r12, 0xf, r11, 0x8) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000002100)) perf_event_open(&(0x7f0000002180)={0x4, 0x70, 0x0, 0x8, 0xff, 0x0, 0x0, 0xfffffffffffffff9, 0x10001, 0x3, 0xffffffffffffff00, 0x93eb, 0x1, 0x0, 0x8001, 0xfffffffffffffff8, 0x7, 0x1f4, 0x80000001, 0x99b, 0x4, 0x8, 0xed8, 0x3f, 0xec9, 0x6, 0x1, 0x4ab8, 0x8, 0x2, 0xdd, 0x9, 0xffffffffffffffff, 0x8000, 0x0, 0x6, 0xffff, 0x8, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000002140), 0xf}, 0x400, 0x5, 0x7, 0x4, 0x7, 0x4}, r12, 0x3, r7, 0x8) 2018/03/31 09:08:21 executing program 7: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)={0xffffffffffffffff}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x0, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r5 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x0, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f00000009c0)={r4}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg(r3, &(0x7f0000000cc0)={&(0x7f0000000400)=@ethernet={0x1}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000580)="4589496d6a3bfcccae07dc729c52ee6bdf10d9cf221f605c25f790103018703b9a67491f96c3f9f8d07204ee4adf21acce1afdaedaba1228b4d33c3fa702a46b1329a0e52eea6a7908fd375ace47", 0x4e}], 0x1, &(0x7f0000000700), 0x0, 0x40000}, 0x4044080) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000740)={0xffffffffffffffff, &(0x7f0000000700)="ec1b815b5cc95d6e0dff859791e3341b8790dcb187f25418f8003a2b3bf345"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272") close(0xffffffffffffffff) 2018/03/31 09:08:21 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x0, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r7 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) ioctl$PERF_EVENT_IOC_RESET(r5, 0x2403, 0x2) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f00000009c0)={r4}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) ioctl$PERF_EVENT_IOC_SET_BPF(r7, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) ioctl$PERF_EVENT_IOC_RESET(r4, 0x2403, 0x2) sendmsg(r3, &(0x7f0000000cc0)={&(0x7f0000000400)=@ethernet={0x1}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000580)="4589496d6a3bfcccae07dc729c52ee6bdf10d9cf221f605c25f790103018703b9a67491f96c3f9f8d07204ee4adf21acce1afdaedaba1228b4d33c3fa702a46b1329a0e52eea6a7908fd375ace47", 0x4e}], 0x1, &(0x7f0000000700), 0x0, 0x40000}, 0x4044080) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000280)={r6, &(0x7f0000000700)="ec1b815b5cc95d6e0dff859791e3341b"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)={0x3, 0x40000100, 0x56c96e7a, 0xea, 0x1, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") close(0xffffffffffffffff) 2018/03/31 09:08:21 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x5, 0x100000000209e20, 0x8000000001, 0x5}, 0x2c) r1 = bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x13, 0x0, 0x7ffff9, 0x0, 0x20000003, 0x0}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xe, 0x0, 0x7f, 0x3e83, 0x8, r1, 0x80000000}, 0x2c) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x50, &(0x7f0000000140)={0x0, 0x0}}, 0x10) socket$kcm(0x29, 0x2, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) socketpair(0x4, 0x1, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r3, 0x2401, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000480)={r4, &(0x7f0000000440)="3068306ef4a0ff8256b6430a042a9b"}, 0x10) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r3) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x0, 0x8, 0x0, 0x0, r0, 0x6}, 0x2c) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)) perf_event_open(&(0x7f000025c000)={0x5, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = gettid() r6 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0xfff, 0x100000001, 0xfffffffffffffffb, 0x0, 0x8001, 0x0, 0x1, 0x0, 0xfffffffffffffff9, 0x0, 0x9, 0x9, 0x5, 0x8, 0x1, 0x8106, 0x0, 0x14000000000, 0x80000000, 0x1, 0x5, 0x0, 0x40, 0x2839, 0x1d, 0x800, 0x7, 0x0, 0x0, 0x5, 0x7, 0x0, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x4}, 0x0, 0x0, 0xff, 0x0, 0x3, 0x8, 0x3}, r5, 0x2, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=r2, 0x4) perf_event_open(&(0x7f00000003c0)={0x7, 0x70, 0x7fff, 0x5, 0x6, 0x8000, 0x0, 0x1000, 0x0, 0x7, 0x1000, 0x1, 0xffffffff, 0x3, 0xaf99, 0x40, 0x8001, 0xfffffffffffffffa, 0x1, 0x80000000, 0xe6d1, 0x4, 0x8001, 0x9, 0x1f, 0xfffffffffffffc00, 0x0, 0x0, 0x7ff, 0x15ac000000000000, 0x0, 0x3, 0x1, 0xfffffffffffffffe, 0x9, 0xff, 0x1, 0x2, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000002c0), 0x8}, 0x0, 0x3, 0x6, 0x1, 0x5, 0xb03c, 0x5}, r5, 0xc, r6, 0xb) bpf$MAP_CREATE(0x0, &(0x7f0000000640)={0x8, 0x6bcb8e63, 0x0, 0x59ad, 0x12, r0, 0x8001}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000880)={r0, &(0x7f0000000840), &(0x7f00000008c0)=""/70}, 0x375) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000280)={0xffffffffffffffff, 0xffffff8f, &(0x7f0000000300)}, 0x10) 2018/03/31 09:08:21 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x5, 0x100000000209e20, 0x8000000001, 0x5}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x13, 0x0, 0x7ffff9, 0x0, 0x20000003, 0x0}, 0x2c) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x13, 0x0, 0x7ffff9, 0x0, 0x20000003, 0x0}, 0x2c) 2018/03/31 09:08:21 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000a40)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x0, 0x0) socketpair(0x2, 0x0, 0x0, &(0x7f0000000640)={0xffffffffffffffff}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r6 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x0, 0x10000, 0x1182, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f00000009c0)={r4}) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000280)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000a00)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg(r3, &(0x7f0000000cc0)={&(0x7f0000000400)=@ethernet={0x1}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000580)="4589496d6a3bfcccae07dc729c52ee6bdf10d9cf221f605c25f790103018703b9a67491f96c3f9f8d07204ee4adf21acce1afdaedaba1228b4d33c3fa702a46b1329a0e52eea6a7908fd375ace47", 0x4e}], 0x1, &(0x7f0000000700), 0x0, 0x40000}, 0x4044080) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000740)={r5, &(0x7f0000000700)="ec1b815b5cc95d6e0dff859791e3341b8790dcb187f25418f8003a2b3bf3"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") close(0xffffffffffffffff) 2018/03/31 09:08:21 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x5, 0x0, 0x0, 0x5}, 0x2c) r1 = bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x13, 0x0, 0x0, 0x0, 0x20000003, 0x0}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x3e83, 0x8, r1}, 0x2c) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x50, &(0x7f0000000140)={0x0, 0x0}}, 0x10) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, r2, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) socketpair(0x4, 0x1, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000480)={r5, &(0x7f0000000440)="3068306ef4a0ff8256b6430a042a9b"}, 0x10) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x0, 0x8, 0x0, 0x0, r0, 0x6}, 0x2c) socketpair(0x8, 0x2, 0x0, &(0x7f0000000040)) r6 = gettid() bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=r3, 0x4) perf_event_open(&(0x7f00000003c0)={0x7, 0x70, 0x7fff, 0x5, 0x6, 0x8000, 0x0, 0x1000, 0x0, 0x7, 0x1000, 0x1, 0xffffffff, 0x3, 0xaf99, 0x40, 0x8001, 0xfffffffffffffffa, 0x1, 0x80000000, 0xe6d1, 0x4, 0x8001, 0x9, 0x1f, 0xfffffffffffffc00, 0x0, 0x0, 0x7ff, 0x15ac000000000000, 0x0, 0x3, 0x1, 0xfffffffffffffffe, 0x9, 0x0, 0x1, 0x2, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000002c0), 0x8}, 0x8004, 0x3, 0x6, 0x1, 0x5, 0xb03c, 0x5}, r6, 0xc, 0xffffffffffffffff, 0xb) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000280)={0xffffffffffffffff, 0xffffff8f, &(0x7f0000000300)}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000600)={0xffffffffffffffff, &(0x7f00000004c0)="648d1c6e4e7374f62b21f1c71a7cd05c41e2a0bf36f2f23f5761a39646321c3b5e4e670bd9a8f7a3fc36d594c1799d7dec6f0ba644a16abd532529ac63497998169000b2e491e82f659738895262b6fc9c79d8e6736c91136937b9", &(0x7f0000000540)="0c39cf9403045550ce39840a2a90ca20bc744608140dcd6c55d855533bb97417ef0cd19e1990bf245f0f38ab76b7f283d20500e75742ca4151b5489f5848a6b6104b0334b5427d07a3464ecffbfda64068c2d7ea6c230ba9040eebaec2030d19884f9f815ab793bd836fdb9c142a7aa9510939e2d3b5e6f57fa56f5464911bd939ca0ab0a1c19407fc9b1b974b94401f7c82bce0926bd5"}, 0x20) 2018/03/31 09:08:21 executing program 1 (fault-call:20 fault-nth:19): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)={0xffffffffffffffff}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x0, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r5 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f00000009c0)={r4}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg(r3, &(0x7f0000000cc0)={&(0x7f0000000400)=@ethernet={0x1}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000580)="4589496d6a3bfcccae07dc729c52ee6bdf10d9cf221f605c25f790103018703b9a67491f96c3f9f8d07204ee4adf21acce1afdaedaba1228b4d33c3fa702a46b1329a0e52eea6a7908fd375ace47", 0x4e}], 0x1, &(0x7f0000000700), 0x0, 0x40000}, 0x4044080) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000740)={0xffffffffffffffff, &(0x7f0000000700)="ec1b815b5cc95d6e0dff859791e3341b8790dcb187f25418f8003a2b3bf345dc"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") close(0xffffffffffffffff) [ 360.742879] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000012 2018/03/31 09:08:21 executing program 7: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)={0xffffffffffffffff}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x0, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r5 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x0, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f00000009c0)={r4}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg(r3, &(0x7f0000000cc0)={&(0x7f0000000400)=@ethernet={0x1}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000580)="4589496d6a3bfcccae07dc729c52ee6bdf10d9cf221f605c25f790103018703b9a67491f96c3f9f8d07204ee4adf21acce1afdaedaba1228b4d33c3fa702a46b1329a0e52eea6a7908fd375ace47", 0x4e}], 0x1, &(0x7f0000000700), 0x0, 0x40000}, 0x4044080) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000740)={0xffffffffffffffff, &(0x7f0000000700)="ec1b815b5cc95d6e0dff859791e3341b8790dcb187f25418f8003a2b3bf345"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272") close(0xffffffffffffffff) 2018/03/31 09:08:21 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x5, 0x100000000209e20, 0x8000000001, 0x5}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x13, 0x0, 0x7ffff9, 0x0, 0x20000003, 0x0}, 0x2c) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x13, 0x0, 0x7ffff9, 0x0, 0x20000003, 0x0}, 0x2c) 2018/03/31 09:08:21 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x0, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r7 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) ioctl$PERF_EVENT_IOC_RESET(r5, 0x2403, 0x2) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f00000009c0)={r4}) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r7, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) ioctl$PERF_EVENT_IOC_RESET(r4, 0x2403, 0x2) sendmsg(r3, &(0x7f0000000cc0)={&(0x7f0000000400)=@ethernet={0x1}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000580)="4589496d6a3bfcccae07dc729c52ee6bdf10d9cf221f605c25f790103018703b9a67491f96c3f9f8d07204ee4adf21acce1afdaedaba1228b4d33c3fa702a46b1329a0e52eea6a7908fd375ace47", 0x4e}], 0x1, &(0x7f0000000700), 0x0, 0x40000}, 0x4044080) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000280)={r6, &(0x7f0000000700)="ec1b815b5cc95d6e0dff859791e3341b"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)={0x3, 0x40000100, 0x56c96e7a, 0xea, 0x1, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") close(0xffffffffffffffff) 2018/03/31 09:08:21 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x5, 0x0, 0x0, 0x5}, 0x2c) r1 = bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x13, 0x0, 0x0, 0x0, 0x20000003, 0x0}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x3e83, 0x8, r1}, 0x2c) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x50, &(0x7f0000000140)={0x0, 0x0}}, 0x10) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, r2, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) socketpair(0x4, 0x1, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000480)={r5, &(0x7f0000000440)="3068306ef4a0ff8256b6430a042a9b"}, 0x10) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x0, 0x8, 0x0, 0x0, r0, 0x6}, 0x2c) socketpair(0x8, 0x2, 0x0, &(0x7f0000000040)) r6 = gettid() bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=r3, 0x4) perf_event_open(&(0x7f00000003c0)={0x7, 0x70, 0x7fff, 0x5, 0x6, 0x8000, 0x0, 0x1000, 0x0, 0x7, 0x1000, 0x1, 0xffffffff, 0x3, 0xaf99, 0x40, 0x8001, 0xfffffffffffffffa, 0x1, 0x80000000, 0xe6d1, 0x4, 0x8001, 0x9, 0x1f, 0xfffffffffffffc00, 0x0, 0x0, 0x7ff, 0x15ac000000000000, 0x0, 0x3, 0x1, 0xfffffffffffffffe, 0x9, 0xff, 0x0, 0x2, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000002c0), 0x8}, 0x8004, 0x3, 0x6, 0x1, 0x5, 0xb03c, 0x5}, r6, 0xc, 0xffffffffffffffff, 0xb) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000280)={0xffffffffffffffff, 0xffffff8f, &(0x7f0000000300)}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000600)={0xffffffffffffffff, &(0x7f00000004c0)="648d1c6e4e7374f62b21f1c71a7cd05c41e2a0bf36f2f23f5761a39646321c3b5e4e670bd9a8f7a3fc36d594c1799d7dec6f0ba644a16abd532529ac63497998169000b2e491e82f659738895262b6fc9c79d8e6736c91136937b9", &(0x7f0000000540)="0c39cf9403045550ce39840a2a90ca20bc744608140dcd6c55d855533bb97417ef0cd19e1990bf245f0f38ab76b7f283d20500e75742ca4151b5489f5848a6b6104b0334b5427d07a3464ecffbfda64068c2d7ea6c230ba9040eebaec2030d19884f9f815ab793bd836fdb9c142a7aa9510939e2d3b5e6f57fa56f5464911bd939ca0ab0a1c19407fc9b1b974b94401f7c82bce0926bd5"}, 0x20) [ 360.860298] FAULT_INJECTION: forcing a failure. [ 360.860298] name failslab, interval 1, probability 0, space 0, times 0 [ 360.871657] CPU: 1 PID: 10129 Comm: syz-executor1 Not tainted 4.16.0-rc6+ #43 [ 360.878931] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 360.888282] Call Trace: [ 360.890893] dump_stack+0x194/0x24d [ 360.894543] ? arch_local_irq_restore+0x53/0x53 [ 360.899223] ? mutex_lock_io_nested+0x1900/0x1900 [ 360.904062] ? __memcg_init_list_lru_node+0x169/0x270 [ 360.909245] should_fail+0x8c0/0xa40 [ 360.912948] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 360.918041] ? trace_hardirqs_off+0x10/0x10 [ 360.922346] ? lock_downgrade+0x980/0x980 [ 360.926474] ? trace_hardirqs_off+0x10/0x10 [ 360.930775] ? find_held_lock+0x35/0x1d0 [ 360.934818] ? __lock_is_held+0xb6/0x140 [ 360.938867] ? check_same_owner+0x320/0x320 [ 360.943168] ? rcu_note_context_switch+0x710/0x710 [ 360.948077] ? rcu_note_context_switch+0x710/0x710 [ 360.952993] should_failslab+0xec/0x120 [ 360.956950] __kmalloc+0x63/0x760 [ 360.960383] ? __kmalloc_node+0x47/0x70 [ 360.964336] ? __list_lru_init+0xcf/0x750 [ 360.968471] __list_lru_init+0xcf/0x750 [ 360.972430] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 360.978304] ? lockdep_init_map+0x9/0x10 [ 360.982350] sget_userns+0x6b1/0xe40 [ 360.986042] ? set_anon_super+0x20/0x20 [ 360.990000] ? put_filp+0x90/0x90 [ 360.993445] ? destroy_unused_super.part.6+0xd0/0xd0 [ 360.998527] ? alloc_vfsmnt+0x762/0x9c0 [ 361.002481] ? path_lookupat+0x238/0xba0 [ 361.006527] ? mnt_free_id.isra.21+0x50/0x50 [ 361.010922] ? trace_hardirqs_off+0x10/0x10 [ 361.015224] ? putname+0xee/0x130 [ 361.018663] ? cap_capable+0x1b5/0x230 [ 361.022534] ? security_capable+0x8e/0xc0 [ 361.026665] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 361.031835] ? ns_capable_common+0xcf/0x160 [ 361.036138] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 361.041307] mount_ns+0x6d/0x190 [ 361.044657] rpc_mount+0x9e/0xd0 [ 361.048008] mount_fs+0x66/0x2d0 [ 361.051362] vfs_kern_mount.part.26+0xc6/0x4a0 [ 361.055923] ? may_umount+0xa0/0xa0 [ 361.059534] ? _raw_read_unlock+0x22/0x30 [ 361.063660] ? __get_fs_type+0x8a/0xc0 [ 361.067528] do_mount+0xea4/0x2bb0 [ 361.071048] ? __might_fault+0x110/0x1d0 [ 361.075095] ? copy_mount_string+0x40/0x40 [ 361.079309] ? check_same_owner+0x320/0x320 [ 361.083612] ? __check_object_size+0x8b/0x530 [ 361.088097] ? __might_sleep+0x95/0x190 [ 361.092068] ? kasan_check_write+0x14/0x20 [ 361.096291] ? _copy_from_user+0x99/0x110 [ 361.100421] ? memdup_user+0x5e/0x90 [ 361.104116] ? copy_mount_options+0x1f7/0x2e0 [ 361.108596] SyS_mount+0xab/0x120 [ 361.112132] ? copy_mnt_ns+0xb30/0xb30 [ 361.116002] do_syscall_64+0x281/0x940 [ 361.119873] ? vmalloc_sync_all+0x30/0x30 [ 361.124004] ? finish_task_switch+0x1c1/0x7e0 [ 361.128486] ? syscall_return_slowpath+0x550/0x550 [ 361.133394] ? syscall_return_slowpath+0x2ac/0x550 [ 361.138304] ? prepare_exit_to_usermode+0x350/0x350 [ 361.143302] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 361.148649] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 361.153477] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 361.158647] RIP: 0033:0x454e79 [ 361.161815] RSP: 002b:00007fed74635c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 361.169503] RAX: ffffffffffffffda RBX: 00007fed746366d4 RCX: 0000000000454e79 [ 361.176750] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 361.183999] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 361.191251] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000016 [ 361.198499] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000013 2018/03/31 09:08:21 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000a40)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x0, 0x0) socketpair(0x2, 0x0, 0x0, &(0x7f0000000640)={0xffffffffffffffff}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r6 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x0, 0x10000, 0x1182, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f00000009c0)={r4}) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000280)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000a00)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg(r3, &(0x7f0000000cc0)={&(0x7f0000000400)=@ethernet={0x1}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000580)="4589496d6a3bfcccae07dc729c52ee6bdf10d9cf221f605c25f790103018703b9a67491f96c3f9f8d07204ee4adf21acce1afdaedaba1228b4d33c3fa702a46b1329a0e52eea6a7908fd375ace47", 0x4e}], 0x1, &(0x7f0000000700), 0x0, 0x40000}, 0x4044080) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000740)={r5, &(0x7f0000000700)="ec1b815b5cc95d6e0dff859791e3341b8790dcb187f25418f8003a2b3bf3"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") close(0xffffffffffffffff) 2018/03/31 09:08:21 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xf, 0x5, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x80000000}, [@map={0x18, 0x1, 0x1, 0x0, 0x1}], {0x95}}, &(0x7f0000000040)='syzkaller\x00', 0x3, 0x10, &(0x7f0000000080)=""/16, 0x41000, 0x2f3100a785778bd1}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000001c0)={r0, 0x50, &(0x7f0000000140)}, 0x10) close(r0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000780)={&(0x7f0000000240)=@ax25, 0x80, &(0x7f0000000600)=[{&(0x7f00000002c0)=""/114, 0x72}, {&(0x7f0000000340)=""/133, 0x85}, {&(0x7f0000000400)=""/23, 0x17}, {&(0x7f0000000440)=""/59, 0x3b}, {&(0x7f0000000480)=""/114, 0x72}, {&(0x7f0000000500)=""/45, 0x2d}, {&(0x7f0000000540)=""/83, 0x53}, {&(0x7f00000005c0)}], 0x8, &(0x7f0000000680)=""/214, 0xd6, 0x100}, 0x40) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000007c0)={0xffffffffffffffff}) recvmsg(r2, &(0x7f00000019c0)={&(0x7f0000000800)=@ax25, 0x80, &(0x7f00000018c0)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000001880)=""/18, 0x12}], 0x2, &(0x7f0000001900)=""/184, 0xb8, 0x3}, 0x1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001a80)={r4, 0x50, &(0x7f0000001a00)}, 0x10) r5 = perf_event_open(&(0x7f0000001b00)={0x2, 0x70, 0x6, 0x8, 0x80000000, 0x10001, 0x0, 0x7ff, 0x4, 0xa, 0x200, 0x20, 0x72, 0x5, 0x0, 0x0, 0x5, 0x8f, 0x9ed, 0xff, 0x0, 0xa58, 0x7f, 0xf2f, 0x4503, 0x6, 0x81, 0x5, 0x1ff, 0xffffffff00000000, 0x2, 0x5, 0x9000000000000, 0xfffffffffffffffa, 0x8, 0x10001, 0x731ab510, 0x9, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000001ac0), 0x1}, 0x80, 0x2b4, 0x200, 0x3, 0x6, 0x9, 0x4}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0x20000) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000001b80)) r6 = getpid() r7 = perf_event_open(&(0x7f0000001c00)={0x1, 0x70, 0x0, 0xfff, 0x4, 0x80000000, 0x0, 0x3, 0x40, 0xa, 0x7, 0x7, 0x7, 0x4800000000000000, 0x7, 0x6, 0x62b, 0x8, 0x9, 0x100000000, 0x1, 0x0, 0x5, 0xd199, 0x1f, 0x10000, 0xff80000000000000, 0x3, 0x4, 0x8, 0x80000001, 0x8000, 0x7fff, 0x4, 0x16, 0x7, 0x40, 0x8, 0x0, 0x5, 0x50031dd1e89e26d1, @perf_bp={&(0x7f0000001bc0), 0x2}, 0x10000, 0x3a, 0x80000001, 0x1, 0x2c, 0x3ff, 0x6}, r6, 0x6, r3, 0x3) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000001c80)=r0, 0x4) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000001cc0)) ioctl$PERF_EVENT_IOC_REFRESH(r7, 0x2402, 0xffffffff) r8 = perf_event_open(&(0x7f0000001d00)={0x0, 0x70, 0x7, 0x400, 0x100, 0xac, 0x0, 0x100000000, 0xc2800, 0xa, 0x33e3, 0x2, 0x10001, 0x8, 0x5, 0x100000001, 0x2e9, 0x2, 0xc1, 0xf2, 0x2, 0x9, 0xffff, 0x7, 0x1, 0x0, 0x8000, 0x800, 0xfffffffffffffffa, 0x40, 0x0, 0x3, 0x6, 0xfa4, 0x7, 0xffffffffffff8000, 0x0, 0x0, 0x0, 0x8000, 0x3, @perf_config_ext={0x400}, 0x100, 0xa264, 0x4, 0x7, 0x2, 0x1000, 0x92}, r6, 0x5, r7, 0x1) socketpair(0x7, 0x6, 0x1, &(0x7f0000001d80)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000001e00)={&(0x7f0000001dc0)='./file0\x00', r9}, 0x10) r10 = perf_event_open(&(0x7f0000001e40)={0x4, 0x70, 0x5, 0x4, 0x8, 0x6, 0x0, 0x2, 0x1425, 0xb, 0x0, 0xcc9, 0x400, 0x57f90db4, 0x80000000, 0x7, 0x1000, 0x0, 0x8, 0x8000, 0xffffffff, 0x400, 0x1, 0x6, 0x40, 0x2, 0x10000, 0x8, 0x9, 0xfffffffffffffff8, 0x9, 0x4, 0x3, 0x400, 0x3, 0x9, 0x3, 0x100, 0x0, 0x6, 0x0, @perf_config_ext={0x4, 0x2}, 0x20, 0x3ff, 0x0, 0x7, 0x3, 0x5, 0xfa5e}, r6, 0xd, r7, 0x2) bpf$OBJ_GET_MAP(0x7, &(0x7f0000001f00)={&(0x7f0000001ec0)='./file0\x00'}, 0x10) socketpair$inet6_sctp(0xa, 0x0, 0x84, &(0x7f0000001f40)) ioctl$PERF_EVENT_IOC_DISABLE(r10, 0x2401, 0xbad) r11 = perf_event_open(&(0x7f0000001fc0)={0x3, 0x70, 0xff, 0x2f, 0x2, 0x7, 0x0, 0x40, 0x80000, 0x1, 0x8, 0x6, 0xfffffffffffffffb, 0x7, 0x2, 0x10000, 0x6, 0x5, 0x0, 0x10, 0x6, 0xc58, 0x7f, 0x3, 0x2, 0x3, 0x5, 0x80000000800000, 0x7, 0xfff, 0x16, 0x2b65, 0x9, 0x69244395, 0x10000, 0x4, 0x9, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000001f80), 0x8}, 0x100, 0x8, 0x51b4, 0x4, 0x800, 0xb7, 0x4800}, r6, 0x8, r8, 0x1) r12 = gettid() socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000002040)) perf_event_open(&(0x7f0000002080)={0x0, 0x70, 0x100, 0x0, 0x2, 0x401, 0x0, 0x6, 0x1, 0x6, 0x656, 0x5, 0xfffffffffffff973, 0xffffffffffffffff, 0x9, 0x7, 0x3, 0x3ff, 0x1c000000, 0x10000, 0x6, 0x20, 0x6, 0x1, 0x1, 0x4, 0x2, 0x20, 0x9, 0xed5, 0x847, 0x1000, 0x0, 0x0, 0x102bed3b, 0x9, 0x7fffffff, 0x6, 0x0, 0x24, 0x0, @perf_config_ext={0x100000001, 0x6}, 0x200, 0x800000010000000, 0x7, 0x7, 0x1000, 0xf3, 0xe87}, r12, 0xf, r11, 0x8) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000002100)) perf_event_open(&(0x7f0000002180)={0x4, 0x70, 0x0, 0x8, 0xff, 0x0, 0x0, 0xfffffffffffffff9, 0x10001, 0x3, 0xffffffffffffff00, 0x93eb, 0x1, 0x0, 0x8001, 0xfffffffffffffff8, 0x7, 0x1f4, 0x80000001, 0x99b, 0x4, 0x8, 0xed8, 0x3f, 0xec9, 0x6, 0x1, 0x4ab8, 0x8, 0x2, 0xdd, 0x9, 0xffffffffffffffff, 0x8000, 0x0, 0x6, 0xffff, 0x8, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000002140), 0xf}, 0x400, 0x5, 0x7, 0x4, 0x7, 0x4}, r12, 0x3, r7, 0x8) 2018/03/31 09:08:21 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x5, 0x0, 0x0, 0x5}, 0x2c) r1 = bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x13, 0x0, 0x0, 0x0, 0x20000003, 0x0}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x3e83, 0x8, r1}, 0x2c) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x50, &(0x7f0000000140)={0x0, 0x0}}, 0x10) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, r2, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) socketpair(0x4, 0x1, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000480)={r5, &(0x7f0000000440)="3068306ef4a0ff8256b6430a042a9b"}, 0x10) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x0, 0x8, 0x0, 0x0, r0, 0x6}, 0x2c) socketpair(0x8, 0x2, 0x0, &(0x7f0000000040)) r6 = gettid() bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=r3, 0x4) perf_event_open(&(0x7f00000003c0)={0x7, 0x70, 0x7fff, 0x5, 0x6, 0x8000, 0x0, 0x1000, 0x0, 0x7, 0x1000, 0x1, 0xffffffff, 0x3, 0xaf99, 0x40, 0x8001, 0xfffffffffffffffa, 0x1, 0x80000000, 0xe6d1, 0x4, 0x8001, 0x9, 0x1f, 0xfffffffffffffc00, 0x0, 0x0, 0x7ff, 0x15ac000000000000, 0x0, 0x3, 0x1, 0xfffffffffffffffe, 0x9, 0xff, 0x0, 0x2, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000002c0), 0x8}, 0x8004, 0x3, 0x6, 0x1, 0x5, 0xb03c, 0x5}, r6, 0xc, 0xffffffffffffffff, 0xb) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000280)={0xffffffffffffffff, 0xffffff8f, &(0x7f0000000300)}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000600)={0xffffffffffffffff, &(0x7f00000004c0)="648d1c6e4e7374f62b21f1c71a7cd05c41e2a0bf36f2f23f5761a39646321c3b5e4e670bd9a8f7a3fc36d594c1799d7dec6f0ba644a16abd532529ac63497998169000b2e491e82f659738895262b6fc9c79d8e6736c91136937b9", &(0x7f0000000540)="0c39cf9403045550ce39840a2a90ca20bc744608140dcd6c55d855533bb97417ef0cd19e1990bf245f0f38ab76b7f283d20500e75742ca4151b5489f5848a6b6104b0334b5427d07a3464ecffbfda64068c2d7ea6c230ba9040eebaec2030d19884f9f815ab793bd836fdb9c142a7aa9510939e2d3b5e6f57fa56f5464911bd939ca0ab0a1c19407fc9b1b974b94401f7c82bce0926bd5"}, 0x20) 2018/03/31 09:08:21 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x0, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r7 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) ioctl$PERF_EVENT_IOC_RESET(r5, 0x2403, 0x2) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f00000009c0)={r4}) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r7, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) ioctl$PERF_EVENT_IOC_RESET(r4, 0x2403, 0x2) sendmsg(r3, &(0x7f0000000cc0)={&(0x7f0000000400)=@ethernet={0x1}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000580)="4589496d6a3bfcccae07dc729c52ee6bdf10d9cf221f605c25f790103018703b9a67491f96c3f9f8d07204ee4adf21acce1afdaedaba1228b4d33c3fa702a46b1329a0e52eea6a7908fd375ace47", 0x4e}], 0x1, &(0x7f0000000700), 0x0, 0x40000}, 0x4044080) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000280)={r6, &(0x7f0000000700)="ec1b815b5cc95d6e0dff859791e3341b"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)={0x3, 0x40000100, 0x56c96e7a, 0xea, 0x1, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") close(0xffffffffffffffff) 2018/03/31 09:08:21 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x5, 0x100000000209e20, 0x8000000001, 0x5}, 0x2c) r1 = bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x13, 0x0, 0x7ffff9, 0x0, 0x20000003, 0x0}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xe, 0x0, 0x7f, 0x3e83, 0x8, r1, 0x80000000}, 0x2c) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x50, &(0x7f0000000140)={0x0, 0x0}}, 0x15b) socket$kcm(0x29, 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={r2, 0x50, &(0x7f0000000540)}, 0x10) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r4 = perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = gettid() perf_event_open(&(0x7f0000000680)={0x7, 0x70, 0x7b1, 0x4, 0x10000, 0x80000000, 0x0, 0x4, 0x4010, 0x9, 0x6, 0x6, 0x0, 0x200, 0x20, 0xfffffffffffffff7, 0x7, 0x7fff, 0x326, 0x1c3a48db, 0x4, 0x7fff, 0xb4d, 0x5, 0x3, 0x6, 0x5, 0x7ff, 0x1, 0x100000000, 0x8000, 0x5fb3, 0x5, 0x9, 0x20, 0x8, 0x1000, 0x100000000, 0x0, 0x7, 0x1, @perf_config_ext={0x5}, 0x1004, 0x3, 0x8, 0x3, 0x9, 0xf9, 0x800}, r5, 0xd, r4, 0x1) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) socketpair(0x4, 0x1, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r6, 0x2401, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000480)={r7, &(0x7f0000000440)="3068306ef4a0ff8256b6430a042a9b"}, 0x10) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40042409, 0x1) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r6) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x0, 0x8, 0x0, 0x0, r0, 0x6}, 0x2c) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)) perf_event_open(&(0x7f000025c000)={0x5, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r8 = gettid() r9 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0xfff, 0x100000001, 0xfffffffffffffffb, 0x0, 0x8001, 0x0, 0x1, 0x0, 0xfffffffffffffff9, 0x0, 0x9, 0x9, 0x5, 0x8, 0x1, 0x8106, 0x0, 0x14000000000, 0x80000000, 0x1, 0x5, 0x0, 0x40, 0x2839, 0x1d, 0x800, 0x7, 0x0, 0x0, 0x5, 0x7, 0x0, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x4}, 0x0, 0x0, 0xff, 0x0, 0x3, 0x8, 0x3}, r8, 0x2, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=r3, 0x4) perf_event_open(&(0x7f00000003c0)={0x7, 0x70, 0x7fff, 0x5, 0x6, 0x8000, 0x0, 0x1000, 0x0, 0x7, 0x1000, 0x1, 0xffffffff, 0x3, 0xaf99, 0x40, 0x8001, 0xfffffffffffffffa, 0x1, 0x80000000, 0xe6d1, 0x4, 0x8001, 0x9, 0x1f, 0xfffffffffffffc00, 0x0, 0x0, 0x7ff, 0x15ac000000000000, 0x0, 0x3, 0x1, 0xfffffffffffffffe, 0x9, 0xff, 0x1, 0x2, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000002c0), 0x8}, 0x0, 0x3, 0x6, 0x1, 0x5, 0xb03c, 0x5}, r8, 0xc, r9, 0xb) bpf$MAP_CREATE(0x0, &(0x7f0000000640)={0x8, 0x6bcb8e63, 0x0, 0x59ad, 0x12, r0, 0x8001}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000880)={r0, &(0x7f0000000840), &(0x7f00000008c0)=""/70}, 0x375) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000280)={0xffffffffffffffff, 0xffffff8f, &(0x7f0000000300)}, 0x10) close(r2) 2018/03/31 09:08:21 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x5, 0x100000000209e20, 0x8000000001, 0x5}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x13, 0x0, 0x7ffff9, 0x0, 0x20000003, 0x0}, 0x2c) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x13, 0x0, 0x7ffff9, 0x0, 0x20000003, 0x0}, 0x2c) 2018/03/31 09:08:21 executing program 7 (fault-call:26 fault-nth:0): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)={0xffffffffffffffff}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x0, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r5 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x0, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f00000009c0)={r4}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg(r3, &(0x7f0000000cc0)={&(0x7f0000000400)=@ethernet={0x1}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000580)="4589496d6a3bfcccae07dc729c52ee6bdf10d9cf221f605c25f790103018703b9a67491f96c3f9f8d07204ee4adf21acce1afdaedaba1228b4d33c3fa702a46b1329a0e52eea6a7908fd375ace47", 0x4e}], 0x1, &(0x7f0000000700), 0x0, 0x40000}, 0x4044080) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000740)={0xffffffffffffffff, &(0x7f0000000700)="ec1b815b5cc95d6e0dff859791e3341b8790dcb187f25418f8003a2b3bf345"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") close(0xffffffffffffffff) 2018/03/31 09:08:21 executing program 1 (fault-call:20 fault-nth:20): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)={0xffffffffffffffff}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x0, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r5 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f00000009c0)={r4}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg(r3, &(0x7f0000000cc0)={&(0x7f0000000400)=@ethernet={0x1}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000580)="4589496d6a3bfcccae07dc729c52ee6bdf10d9cf221f605c25f790103018703b9a67491f96c3f9f8d07204ee4adf21acce1afdaedaba1228b4d33c3fa702a46b1329a0e52eea6a7908fd375ace47", 0x4e}], 0x1, &(0x7f0000000700), 0x0, 0x40000}, 0x4044080) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000740)={0xffffffffffffffff, &(0x7f0000000700)="ec1b815b5cc95d6e0dff859791e3341b8790dcb187f25418f8003a2b3bf345dc"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") close(0xffffffffffffffff) [ 361.446745] FAULT_INJECTION: forcing a failure. [ 361.446745] name failslab, interval 1, probability 0, space 0, times 0 [ 361.458164] CPU: 0 PID: 10171 Comm: syz-executor1 Not tainted 4.16.0-rc6+ #43 [ 361.465439] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 361.474789] Call Trace: [ 361.477382] dump_stack+0x194/0x24d [ 361.481013] ? arch_local_irq_restore+0x53/0x53 [ 361.485681] ? kernel_text_address+0xd1/0xe0 [ 361.490092] ? __unwind_start+0x169/0x330 [ 361.494249] should_fail+0x8c0/0xa40 [ 361.497967] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 361.503076] ? save_stack+0x43/0xd0 [ 361.506705] ? kasan_kmalloc+0xad/0xe0 [ 361.510586] ? __kmalloc+0x162/0x760 [ 361.514299] ? __list_lru_init+0xcf/0x750 [ 361.518448] ? find_held_lock+0x35/0x1d0 [ 361.522518] ? __lock_is_held+0xb6/0x140 [ 361.526599] ? check_same_owner+0x320/0x320 [ 361.530923] ? rcu_note_context_switch+0x710/0x710 [ 361.535852] should_failslab+0xec/0x120 [ 361.539830] kmem_cache_alloc_node_trace+0x5a/0x760 2018/03/31 09:08:22 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xf, 0x5, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x80000000}, [@map={0x18, 0x1, 0x1, 0x0, 0x1}], {0x95}}, &(0x7f0000000040)='syzkaller\x00', 0x3, 0x10, &(0x7f0000000080)=""/16, 0x41000, 0x2f3100a785778bd1}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000001c0)={r0, 0x50, &(0x7f0000000140)}, 0x10) close(r0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000780)={&(0x7f0000000240)=@ax25, 0x80, &(0x7f0000000600)=[{&(0x7f00000002c0)=""/114, 0x72}, {&(0x7f0000000340)=""/133, 0x85}, {&(0x7f0000000400)=""/23, 0x17}, {&(0x7f0000000440)=""/59, 0x3b}, {&(0x7f0000000480)=""/114, 0x72}, {&(0x7f0000000500)=""/45, 0x2d}, {&(0x7f0000000540)=""/83, 0x53}, {&(0x7f00000005c0)}], 0x8, &(0x7f0000000680)=""/214, 0xd6, 0x100}, 0x40) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000007c0)={0xffffffffffffffff}) recvmsg(r2, &(0x7f00000019c0)={&(0x7f0000000800)=@ax25, 0x80, &(0x7f00000018c0)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000001880)=""/18, 0x12}], 0x2, &(0x7f0000001900)=""/184, 0xb8, 0x3}, 0x1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001a80)={r4, 0x50, &(0x7f0000001a00)}, 0x10) r5 = perf_event_open(&(0x7f0000001b00)={0x2, 0x70, 0x6, 0x8, 0x80000000, 0x10001, 0x0, 0x7ff, 0x4, 0xa, 0x200, 0x20, 0x72, 0x5, 0x0, 0x0, 0x5, 0x8f, 0x9ed, 0xff, 0x0, 0xa58, 0x7f, 0xf2f, 0x4503, 0x6, 0x81, 0x5, 0x1ff, 0xffffffff00000000, 0x2, 0x5, 0x9000000000000, 0xfffffffffffffffa, 0x8, 0x10001, 0x731ab510, 0x9, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000001ac0), 0x1}, 0x80, 0x2b4, 0x200, 0x3, 0x6, 0x9, 0x4}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0x20000) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000001b80)) r6 = getpid() r7 = perf_event_open(&(0x7f0000001c00)={0x1, 0x70, 0x0, 0xfff, 0x4, 0x80000000, 0x0, 0x3, 0x40, 0xa, 0x7, 0x7, 0x7, 0x4800000000000000, 0x7, 0x6, 0x62b, 0x8, 0x9, 0x100000000, 0x1, 0x0, 0x5, 0xd199, 0x1f, 0x10000, 0xff80000000000000, 0x3, 0x4, 0x8, 0x80000001, 0x8000, 0x7fff, 0x4, 0x16, 0x7, 0x40, 0x8, 0x0, 0x5, 0x50031dd1e89e26d1, @perf_bp={&(0x7f0000001bc0), 0x2}, 0x10000, 0x3a, 0x80000001, 0x1, 0x2c, 0x3ff, 0x6}, r6, 0x6, r3, 0x3) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000001c80)=r0, 0x4) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000001cc0)) ioctl$PERF_EVENT_IOC_REFRESH(r7, 0x2402, 0xffffffff) r8 = perf_event_open(&(0x7f0000001d00)={0x0, 0x70, 0x7, 0x400, 0x100, 0xac, 0x0, 0x100000000, 0xc2800, 0xa, 0x33e3, 0x2, 0x10001, 0x8, 0x5, 0x100000001, 0x2e9, 0x2, 0xc1, 0xf2, 0x2, 0x9, 0xffff, 0x7, 0x1, 0x0, 0x8000, 0x800, 0xfffffffffffffffa, 0x40, 0x0, 0x3, 0x6, 0xfa4, 0x7, 0xffffffffffff8000, 0x0, 0x0, 0x0, 0x8000, 0x3, @perf_config_ext={0x400}, 0x100, 0xa264, 0x4, 0x7, 0x2, 0x1000, 0x92}, r6, 0x5, r7, 0x1) socketpair(0x7, 0x6, 0x1, &(0x7f0000001d80)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000001e00)={&(0x7f0000001dc0)='./file0\x00', r9}, 0x10) r10 = perf_event_open(&(0x7f0000001e40)={0x4, 0x70, 0x5, 0x4, 0x8, 0x6, 0x0, 0x2, 0x1425, 0xb, 0x0, 0xcc9, 0x400, 0x57f90db4, 0x80000000, 0x7, 0x1000, 0x0, 0x8, 0x8000, 0xffffffff, 0x400, 0x1, 0x6, 0x40, 0x2, 0x10000, 0x8, 0x9, 0xfffffffffffffff8, 0x9, 0x4, 0x3, 0x400, 0x3, 0x9, 0x3, 0x100, 0x0, 0x6, 0x0, @perf_config_ext={0x4, 0x2}, 0x20, 0x3ff, 0x0, 0x7, 0x3, 0x5, 0xfa5e}, r6, 0xd, r7, 0x2) bpf$OBJ_GET_MAP(0x7, &(0x7f0000001f00)={&(0x7f0000001ec0)='./file0\x00'}, 0x10) socketpair$inet6_sctp(0xa, 0x0, 0x84, &(0x7f0000001f40)) ioctl$PERF_EVENT_IOC_DISABLE(r10, 0x2401, 0xbad) r11 = perf_event_open(&(0x7f0000001fc0)={0x3, 0x70, 0xff, 0x2f, 0x2, 0x7, 0x0, 0x40, 0x80000, 0x1, 0x8, 0x6, 0xfffffffffffffffb, 0x7, 0x2, 0x10000, 0x6, 0x5, 0x0, 0x10, 0x6, 0xc58, 0x7f, 0x3, 0x2, 0x3, 0x5, 0x80000000800000, 0x7, 0xfff, 0x16, 0x2b65, 0x9, 0x69244395, 0x10000, 0x4, 0x9, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000001f80), 0x8}, 0x100, 0x8, 0x51b4, 0x4, 0x800, 0xb7, 0x4800}, r6, 0x8, r8, 0x1) r12 = gettid() socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000002040)) perf_event_open(&(0x7f0000002080)={0x0, 0x70, 0x100, 0x0, 0x2, 0x401, 0x0, 0x6, 0x1, 0x6, 0x656, 0x5, 0xfffffffffffff973, 0xffffffffffffffff, 0x9, 0x7, 0x3, 0x3ff, 0x1c000000, 0x10000, 0x6, 0x20, 0x6, 0x1, 0x1, 0x4, 0x2, 0x20, 0x9, 0xed5, 0x847, 0x1000, 0x0, 0x0, 0x102bed3b, 0x9, 0x7fffffff, 0x6, 0x0, 0x24, 0x0, @perf_config_ext={0x100000001, 0x6}, 0x200, 0x800000010000000, 0x7, 0x7, 0x1000, 0xf3, 0xe87}, r12, 0xf, r11, 0x8) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000002100)) perf_event_open(&(0x7f0000002180)={0x4, 0x70, 0x0, 0x8, 0xff, 0x0, 0x0, 0xfffffffffffffff9, 0x10001, 0x3, 0xffffffffffffff00, 0x93eb, 0x1, 0x4e5e, 0x0, 0xfffffffffffffff8, 0x7, 0x1f4, 0x80000001, 0x99b, 0x4, 0x8, 0xed8, 0x3f, 0xec9, 0x6, 0x1, 0x4ab8, 0x8, 0x2, 0xdd, 0x9, 0xffffffffffffffff, 0x8000, 0x0, 0x6, 0xffff, 0x8, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000002140), 0xf}, 0x400, 0x5, 0x7, 0x4, 0x7, 0x4}, r12, 0x3, r7, 0x8) 2018/03/31 09:08:22 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x5, 0x0, 0x0, 0x5}, 0x2c) r1 = bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x13, 0x0, 0x0, 0x0, 0x20000003, 0x0}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x3e83, 0x8, r1}, 0x2c) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x50, &(0x7f0000000140)={0x0, 0x0}}, 0x10) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, r2, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) socketpair(0x4, 0x1, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000480)={r5, &(0x7f0000000440)="3068306ef4a0ff8256b6430a042a9b"}, 0x10) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x0, 0x8, 0x0, 0x0, r0, 0x6}, 0x2c) socketpair(0x8, 0x2, 0x0, &(0x7f0000000040)) r6 = gettid() bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=r3, 0x4) perf_event_open(&(0x7f00000003c0)={0x7, 0x70, 0x7fff, 0x5, 0x6, 0x8000, 0x0, 0x1000, 0x0, 0x7, 0x1000, 0x1, 0xffffffff, 0x3, 0xaf99, 0x40, 0x8001, 0xfffffffffffffffa, 0x1, 0x80000000, 0xe6d1, 0x4, 0x8001, 0x9, 0x1f, 0xfffffffffffffc00, 0x0, 0x0, 0x7ff, 0x15ac000000000000, 0x0, 0x3, 0x1, 0xfffffffffffffffe, 0x9, 0xff, 0x0, 0x2, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000002c0), 0x8}, 0x8004, 0x3, 0x6, 0x1, 0x5, 0xb03c, 0x5}, r6, 0xc, 0xffffffffffffffff, 0xb) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000280)={0xffffffffffffffff, 0xffffff8f, &(0x7f0000000300)}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000600)={0xffffffffffffffff, &(0x7f00000004c0)="648d1c6e4e7374f62b21f1c71a7cd05c41e2a0bf36f2f23f5761a39646321c3b5e4e670bd9a8f7a3fc36d594c1799d7dec6f0ba644a16abd532529ac63497998169000b2e491e82f659738895262b6fc9c79d8e6736c91136937b9", &(0x7f0000000540)="0c39cf9403045550ce39840a2a90ca20bc744608140dcd6c55d855533bb97417ef0cd19e1990bf245f0f38ab76b7f283d20500e75742ca4151b5489f5848a6b6104b0334b5427d07a3464ecffbfda64068c2d7ea6c230ba9040eebaec2030d19884f9f815ab793bd836fdb9c142a7aa9510939e2d3b5e6f57fa56f5464911bd939ca0ab0a1c19407fc9b1b974b94401f7c82bce0926bd5"}, 0x20) [ 361.544848] ? mark_held_locks+0xaf/0x100 [ 361.548999] ? __raw_spin_lock_init+0x1c/0x100 [ 361.553594] __kmalloc_node+0x33/0x70 [ 361.557398] kvmalloc_node+0x99/0xd0 [ 361.561120] __list_lru_init+0x5d5/0x750 [ 361.565192] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 361.571077] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 361.576095] ? lockdep_init_map+0x9/0x10 [ 361.580148] sget_userns+0x6b1/0xe40 [ 361.583844] ? set_anon_super+0x20/0x20 [ 361.587806] ? put_filp+0x90/0x90 [ 361.591242] ? destroy_unused_super.part.6+0xd0/0xd0 [ 361.596326] ? alloc_vfsmnt+0x762/0x9c0 [ 361.600278] ? path_lookupat+0x238/0xba0 [ 361.604319] ? mnt_free_id.isra.21+0x50/0x50 [ 361.608713] ? trace_hardirqs_off+0x10/0x10 [ 361.613022] ? putname+0xee/0x130 [ 361.616460] ? cap_capable+0x1b5/0x230 [ 361.620344] ? security_capable+0x8e/0xc0 [ 361.624476] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 361.629647] ? ns_capable_common+0xcf/0x160 [ 361.633950] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 361.639117] mount_ns+0x6d/0x190 [ 361.642465] rpc_mount+0x9e/0xd0 [ 361.645812] mount_fs+0x66/0x2d0 [ 361.649159] vfs_kern_mount.part.26+0xc6/0x4a0 [ 361.653718] ? may_umount+0xa0/0xa0 [ 361.657323] ? _raw_read_unlock+0x22/0x30 [ 361.661451] ? __get_fs_type+0x8a/0xc0 [ 361.665321] do_mount+0xea4/0x2bb0 [ 361.668838] ? __might_fault+0x110/0x1d0 [ 361.672881] ? copy_mount_string+0x40/0x40 [ 361.677091] ? check_same_owner+0x320/0x320 [ 361.681391] ? __check_object_size+0x8b/0x530 [ 361.685867] ? __might_sleep+0x95/0x190 [ 361.689825] ? kasan_check_write+0x14/0x20 [ 361.694038] ? _copy_from_user+0x99/0x110 [ 361.698167] ? memdup_user+0x5e/0x90 [ 361.701857] ? copy_mount_options+0x1f7/0x2e0 [ 361.706332] SyS_mount+0xab/0x120 [ 361.709761] ? copy_mnt_ns+0xb30/0xb30 [ 361.713627] do_syscall_64+0x281/0x940 [ 361.717494] ? trace_event_raw_event_sys_exit+0x260/0x260 [ 361.723014] ? syscall_return_slowpath+0x550/0x550 [ 361.727926] ? syscall_return_slowpath+0x2ac/0x550 [ 361.732835] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 361.738179] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 361.743004] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 361.748176] RIP: 0033:0x454e79 [ 361.751345] RSP: 002b:00007fed74635c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 361.759033] RAX: ffffffffffffffda RBX: 00007fed746366d4 RCX: 0000000000454e79 [ 361.766282] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 361.773528] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 361.780800] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000016 [ 361.788048] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000014 2018/03/31 09:08:22 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000a40)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x0, 0x0) socketpair(0x2, 0x0, 0x0, &(0x7f0000000640)={0xffffffffffffffff}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r6 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x0, 0x10000, 0x1182, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f00000009c0)={r4}) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000280)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000a00)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg(r3, &(0x7f0000000cc0)={&(0x7f0000000400)=@ethernet={0x1}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000580)="4589496d6a3bfcccae07dc729c52ee6bdf10d9cf221f605c25f790103018703b9a67491f96c3f9f8d07204ee4adf21acce1afdaedaba1228b4d33c3fa702a46b1329a0e52eea6a7908fd375ace47", 0x4e}], 0x1, &(0x7f0000000700), 0x0, 0x40000}, 0x4044080) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000740)={r5, &(0x7f0000000700)="ec1b815b5cc95d6e0dff859791e3341b8790dcb187f25418f8003a2b3bf3"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") close(0xffffffffffffffff) 2018/03/31 09:08:22 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x0, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r7 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) ioctl$PERF_EVENT_IOC_RESET(r5, 0x2403, 0x2) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f00000009c0)={r4}) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r7, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) ioctl$PERF_EVENT_IOC_RESET(r4, 0x2403, 0x2) sendmsg(r3, &(0x7f0000000cc0)={&(0x7f0000000400)=@ethernet={0x1}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000580)="4589496d6a3bfcccae07dc729c52ee6bdf10d9cf221f605c25f790103018703b9a67491f96c3f9f8d07204ee4adf21acce1afdaedaba1228b4d33c3fa702a46b1329a0e52eea6a7908fd375ace47", 0x4e}], 0x1, &(0x7f0000000700), 0x0, 0x40000}, 0x4044080) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000280)={r6, &(0x7f0000000700)="ec1b815b5cc95d6e0dff859791e3341b"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)={0x3, 0x40000100, 0x56c96e7a, 0xea, 0x1, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") close(0xffffffffffffffff) 2018/03/31 09:08:22 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x5, 0x0, 0x0, 0x5}, 0x2c) r1 = bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x13, 0x0, 0x0, 0x0, 0x20000003, 0x0}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x3e83, 0x8, r1}, 0x2c) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x50, &(0x7f0000000140)={0x0, 0x0}}, 0x10) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, r2, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) socketpair(0x4, 0x1, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000480)={r5, &(0x7f0000000440)="3068306ef4a0ff8256b6430a042a9b"}, 0x10) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x0, 0x8, 0x0, 0x0, r0, 0x6}, 0x2c) socketpair(0x8, 0x2, 0x0, &(0x7f0000000040)) r6 = gettid() bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=r3, 0x4) perf_event_open(&(0x7f00000003c0)={0x7, 0x70, 0x7fff, 0x5, 0x6, 0x8000, 0x0, 0x1000, 0x0, 0x7, 0x1000, 0x1, 0xffffffff, 0x3, 0xaf99, 0x40, 0x8001, 0xfffffffffffffffa, 0x1, 0x80000000, 0xe6d1, 0x4, 0x8001, 0x9, 0x1f, 0xfffffffffffffc00, 0x0, 0x0, 0x7ff, 0x15ac000000000000, 0x0, 0x3, 0x1, 0xfffffffffffffffe, 0x9, 0xff, 0x1, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000002c0), 0x8}, 0x8004, 0x3, 0x6, 0x1, 0x5, 0xb03c, 0x5}, r6, 0xc, 0xffffffffffffffff, 0xb) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000280)={0xffffffffffffffff, 0xffffff8f, &(0x7f0000000300)}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000600)={0xffffffffffffffff, &(0x7f00000004c0)="648d1c6e4e7374f62b21f1c71a7cd05c41e2a0bf36f2f23f5761a39646321c3b5e4e670bd9a8f7a3fc36d594c1799d7dec6f0ba644a16abd532529ac63497998169000b2e491e82f659738895262b6fc9c79d8e6736c91136937b9", &(0x7f0000000540)="0c39cf9403045550ce39840a2a90ca20bc744608140dcd6c55d855533bb97417ef0cd19e1990bf245f0f38ab76b7f283d20500e75742ca4151b5489f5848a6b6104b0334b5427d07a3464ecffbfda64068c2d7ea6c230ba9040eebaec2030d19884f9f815ab793bd836fdb9c142a7aa9510939e2d3b5e6f57fa56f5464911bd939ca0ab0a1c19407fc9b1b974b94401f7c82bce0926bd5"}, 0x20) [ 361.811046] FAULT_INJECTION: forcing a failure. [ 361.811046] name failslab, interval 1, probability 0, space 0, times 0 [ 361.822299] CPU: 0 PID: 10174 Comm: syz-executor7 Not tainted 4.16.0-rc6+ #43 [ 361.829567] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 361.838913] Call Trace: [ 361.841498] dump_stack+0x194/0x24d [ 361.845135] ? arch_local_irq_restore+0x53/0x53 [ 361.849811] should_fail+0x8c0/0xa40 [ 361.853535] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 361.858641] ? lock_downgrade+0x980/0x980 [ 361.862793] ? get_pid_task+0xbc/0x140 [ 361.866683] ? proc_fail_nth_write+0x9b/0x1d0 [ 361.871191] ? map_files_get_link+0x3a0/0x3a0 [ 361.875691] ? find_held_lock+0x35/0x1d0 [ 361.879767] ? check_same_owner+0x320/0x320 [ 361.884088] ? __lock_is_held+0xb6/0x140 [ 361.888155] ? rcu_note_context_switch+0x710/0x710 [ 361.893087] should_failslab+0xec/0x120 [ 361.897045] __kmalloc_track_caller+0x5f/0x760 [ 361.901611] ? strncpy_from_user+0x430/0x430 [ 361.905999] ? strndup_user+0x62/0xb0 [ 361.909788] memdup_user+0x2c/0x90 [ 361.913308] strndup_user+0x62/0xb0 [ 361.916917] SyS_mount+0x3c/0x120 [ 361.920348] ? copy_mnt_ns+0xb30/0xb30 [ 361.924226] do_syscall_64+0x281/0x940 [ 361.928094] ? vmalloc_sync_all+0x30/0x30 [ 361.932220] ? _raw_spin_unlock_irq+0x27/0x70 [ 361.936697] ? finish_task_switch+0x1c1/0x7e0 [ 361.941170] ? syscall_return_slowpath+0x550/0x550 [ 361.946077] ? syscall_return_slowpath+0x2ac/0x550 [ 361.950986] ? prepare_exit_to_usermode+0x350/0x350 [ 361.955986] ? retint_user+0x18/0x18 [ 361.959683] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 361.964510] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 361.969680] RIP: 0033:0x454e79 [ 361.972850] RSP: 002b:00007fd81e272c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 361.980539] RAX: ffffffffffffffda RBX: 00007fd81e2736d4 RCX: 0000000000454e79 [ 361.987789] RDX: 0000000020000780 RSI: 0000000020000ac0 RDI: 0000000020000000 [ 361.995037] RBP: 000000000072bea0 R08: 0000000020000b00 R09: 0000000000000000 [ 362.002284] R10: 0000000000037002 R11: 0000000000000246 R12: 0000000000000016 [ 362.009553] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000000 2018/03/31 09:08:22 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xf, 0x5, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x80000000}, [@map={0x18, 0x1, 0x1, 0x0, 0x1}], {0x95}}, &(0x7f0000000040)='syzkaller\x00', 0x3, 0x10, &(0x7f0000000080)=""/16, 0x41000, 0x2f3100a785778bd1}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000001c0)={r0, 0x50, &(0x7f0000000140)}, 0x10) close(r0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000780)={&(0x7f0000000240)=@ax25, 0x80, &(0x7f0000000600)=[{&(0x7f00000002c0)=""/114, 0x72}, {&(0x7f0000000340)=""/133, 0x85}, {&(0x7f0000000400)=""/23, 0x17}, {&(0x7f0000000440)=""/59, 0x3b}, {&(0x7f0000000480)=""/114, 0x72}, {&(0x7f0000000500)=""/45, 0x2d}, {&(0x7f0000000540)=""/83, 0x53}, {&(0x7f00000005c0)}], 0x8, &(0x7f0000000680)=""/214, 0xd6, 0x100}, 0x40) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000007c0)={0xffffffffffffffff}) recvmsg(r2, &(0x7f00000019c0)={&(0x7f0000000800)=@ax25, 0x80, &(0x7f00000018c0)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000001880)=""/18, 0x12}], 0x2, &(0x7f0000001900)=""/184, 0xb8, 0x3}, 0x1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001a80)={r4, 0x50, &(0x7f0000001a00)}, 0x10) r5 = perf_event_open(&(0x7f0000001b00)={0x2, 0x70, 0x6, 0x8, 0x80000000, 0x10001, 0x0, 0x7ff, 0x4, 0xa, 0x200, 0x20, 0x72, 0x5, 0x0, 0x0, 0x5, 0x8f, 0x9ed, 0xff, 0x0, 0xa58, 0x7f, 0xf2f, 0x4503, 0x6, 0x81, 0x5, 0x1ff, 0xffffffff00000000, 0x2, 0x5, 0x9000000000000, 0xfffffffffffffffa, 0x8, 0x10001, 0x731ab510, 0x9, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000001ac0), 0x1}, 0x80, 0x2b4, 0x200, 0x3, 0x6, 0x9, 0x4}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0x20000) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000001b80)) r6 = getpid() r7 = perf_event_open(&(0x7f0000001c00)={0x1, 0x70, 0x0, 0xfff, 0x4, 0x80000000, 0x0, 0x3, 0x40, 0xa, 0x7, 0x7, 0x7, 0x4800000000000000, 0x7, 0x6, 0x62b, 0x8, 0x9, 0x100000000, 0x1, 0x0, 0x5, 0xd199, 0x1f, 0x10000, 0xff80000000000000, 0x3, 0x4, 0x8, 0x80000001, 0x8000, 0x7fff, 0x4, 0x16, 0x7, 0x40, 0x8, 0x0, 0x5, 0x50031dd1e89e26d1, @perf_bp={&(0x7f0000001bc0), 0x2}, 0x10000, 0x3a, 0x80000001, 0x1, 0x2c, 0x3ff, 0x6}, r6, 0x6, r3, 0x3) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000001c80)=r0, 0x4) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000001cc0)) ioctl$PERF_EVENT_IOC_REFRESH(r7, 0x2402, 0xffffffff) r8 = perf_event_open(&(0x7f0000001d00)={0x0, 0x70, 0x7, 0x400, 0x100, 0xac, 0x0, 0x100000000, 0xc2800, 0xa, 0x33e3, 0x2, 0x10001, 0x8, 0x5, 0x100000001, 0x2e9, 0x2, 0xc1, 0xf2, 0x2, 0x9, 0xffff, 0x7, 0x1, 0x0, 0x8000, 0x800, 0xfffffffffffffffa, 0x40, 0x0, 0x3, 0x6, 0xfa4, 0x7, 0xffffffffffff8000, 0x0, 0x0, 0x0, 0x8000, 0x3, @perf_config_ext={0x400}, 0x100, 0xa264, 0x4, 0x7, 0x2, 0x1000, 0x92}, r6, 0x5, r7, 0x1) socketpair(0x7, 0x6, 0x1, &(0x7f0000001d80)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000001e00)={&(0x7f0000001dc0)='./file0\x00', r9}, 0x10) r10 = perf_event_open(&(0x7f0000001e40)={0x4, 0x70, 0x5, 0x4, 0x8, 0x6, 0x0, 0x2, 0x1425, 0xb, 0x0, 0xcc9, 0x400, 0x57f90db4, 0x80000000, 0x7, 0x1000, 0x0, 0x8, 0x8000, 0xffffffff, 0x400, 0x1, 0x6, 0x40, 0x2, 0x10000, 0x8, 0x9, 0xfffffffffffffff8, 0x9, 0x4, 0x3, 0x400, 0x3, 0x9, 0x3, 0x100, 0x0, 0x6, 0x0, @perf_config_ext={0x4, 0x2}, 0x20, 0x3ff, 0x0, 0x7, 0x3, 0x5, 0xfa5e}, r6, 0xd, r7, 0x2) bpf$OBJ_GET_MAP(0x7, &(0x7f0000001f00)={&(0x7f0000001ec0)='./file0\x00'}, 0x10) socketpair$inet6_sctp(0xa, 0x0, 0x84, &(0x7f0000001f40)) ioctl$PERF_EVENT_IOC_DISABLE(r10, 0x2401, 0xbad) r11 = perf_event_open(&(0x7f0000001fc0)={0x3, 0x70, 0xff, 0x2f, 0x2, 0x7, 0x0, 0x40, 0x80000, 0x1, 0x8, 0x6, 0xfffffffffffffffb, 0x7, 0x2, 0x10000, 0x6, 0x5, 0x0, 0x10, 0x6, 0xc58, 0x7f, 0x3, 0x2, 0x3, 0x5, 0x80000000800000, 0x7, 0xfff, 0x16, 0x2b65, 0x9, 0x69244395, 0x10000, 0x4, 0x9, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000001f80), 0x8}, 0x100, 0x8, 0x51b4, 0x4, 0x800, 0xb7, 0x4800}, r6, 0x8, r8, 0x1) r12 = gettid() socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000002040)) perf_event_open(&(0x7f0000002080)={0x0, 0x70, 0x100, 0x0, 0x2, 0x401, 0x0, 0x6, 0x1, 0x6, 0x656, 0x5, 0xfffffffffffff973, 0xffffffffffffffff, 0x9, 0x7, 0x3, 0x3ff, 0x1c000000, 0x10000, 0x6, 0x20, 0x6, 0x1, 0x1, 0x4, 0x2, 0x20, 0x9, 0xed5, 0x847, 0x1000, 0x0, 0x0, 0x102bed3b, 0x9, 0x7fffffff, 0x6, 0x0, 0x24, 0x0, @perf_config_ext={0x100000001, 0x6}, 0x200, 0x800000010000000, 0x7, 0x7, 0x1000, 0xf3, 0xe87}, r12, 0xf, r11, 0x8) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000002100)) perf_event_open(&(0x7f0000002180)={0x4, 0x70, 0x0, 0x8, 0xff, 0x0, 0x0, 0xfffffffffffffff9, 0x10001, 0x3, 0xffffffffffffff00, 0x93eb, 0x1, 0x4e5e, 0x0, 0xfffffffffffffff8, 0x7, 0x1f4, 0x80000001, 0x99b, 0x4, 0x8, 0xed8, 0x3f, 0xec9, 0x6, 0x1, 0x4ab8, 0x8, 0x2, 0xdd, 0x9, 0xffffffffffffffff, 0x8000, 0x0, 0x6, 0xffff, 0x8, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000002140), 0xf}, 0x400, 0x5, 0x7, 0x4, 0x7, 0x4}, r12, 0x3, r7, 0x8) 2018/03/31 09:08:22 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x5, 0x0, 0x0, 0x5}, 0x2c) r1 = bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x13, 0x0, 0x0, 0x0, 0x20000003, 0x0}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x3e83, 0x8, r1}, 0x2c) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x50, &(0x7f0000000140)={0x0, 0x0}}, 0x10) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, r2, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) socketpair(0x4, 0x1, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000480)={r5, &(0x7f0000000440)="3068306ef4a0ff8256b6430a042a9b"}, 0x10) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x0, 0x8, 0x0, 0x0, r0, 0x6}, 0x2c) socketpair(0x8, 0x2, 0x0, &(0x7f0000000040)) r6 = gettid() bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=r3, 0x4) perf_event_open(&(0x7f00000003c0)={0x7, 0x70, 0x7fff, 0x5, 0x6, 0x8000, 0x0, 0x1000, 0x0, 0x7, 0x1000, 0x1, 0xffffffff, 0x3, 0xaf99, 0x40, 0x8001, 0xfffffffffffffffa, 0x1, 0x80000000, 0xe6d1, 0x4, 0x8001, 0x9, 0x1f, 0xfffffffffffffc00, 0x0, 0x0, 0x7ff, 0x15ac000000000000, 0x0, 0x3, 0x1, 0xfffffffffffffffe, 0x9, 0xff, 0x1, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000002c0), 0x8}, 0x8004, 0x3, 0x6, 0x1, 0x5, 0xb03c, 0x5}, r6, 0xc, 0xffffffffffffffff, 0xb) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000280)={0xffffffffffffffff, 0xffffff8f, &(0x7f0000000300)}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000600)={0xffffffffffffffff, &(0x7f00000004c0)="648d1c6e4e7374f62b21f1c71a7cd05c41e2a0bf36f2f23f5761a39646321c3b5e4e670bd9a8f7a3fc36d594c1799d7dec6f0ba644a16abd532529ac63497998169000b2e491e82f659738895262b6fc9c79d8e6736c91136937b9", &(0x7f0000000540)="0c39cf9403045550ce39840a2a90ca20bc744608140dcd6c55d855533bb97417ef0cd19e1990bf245f0f38ab76b7f283d20500e75742ca4151b5489f5848a6b6104b0334b5427d07a3464ecffbfda64068c2d7ea6c230ba9040eebaec2030d19884f9f815ab793bd836fdb9c142a7aa9510939e2d3b5e6f57fa56f5464911bd939ca0ab0a1c19407fc9b1b974b94401f7c82bce0926bd5"}, 0x20) 2018/03/31 09:08:22 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x5, 0x100000000209e20, 0x8000000001, 0x5}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x13, 0x0, 0x7ffff9, 0x0, 0x20000003, 0x0}, 0x2c) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x13, 0x0, 0x7ffff9, 0x0, 0x20000003, 0x0}, 0x2c) 2018/03/31 09:08:22 executing program 1 (fault-call:20 fault-nth:21): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)={0xffffffffffffffff}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x0, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r5 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f00000009c0)={r4}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg(r3, &(0x7f0000000cc0)={&(0x7f0000000400)=@ethernet={0x1}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000580)="4589496d6a3bfcccae07dc729c52ee6bdf10d9cf221f605c25f790103018703b9a67491f96c3f9f8d07204ee4adf21acce1afdaedaba1228b4d33c3fa702a46b1329a0e52eea6a7908fd375ace47", 0x4e}], 0x1, &(0x7f0000000700), 0x0, 0x40000}, 0x4044080) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000740)={0xffffffffffffffff, &(0x7f0000000700)="ec1b815b5cc95d6e0dff859791e3341b8790dcb187f25418f8003a2b3bf345dc"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") close(0xffffffffffffffff) [ 362.171096] FAULT_INJECTION: forcing a failure. [ 362.171096] name failslab, interval 1, probability 0, space 0, times 0 [ 362.182422] CPU: 0 PID: 10218 Comm: syz-executor1 Not tainted 4.16.0-rc6+ #43 [ 362.189698] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 362.199053] Call Trace: [ 362.201654] dump_stack+0x194/0x24d [ 362.205294] ? arch_local_irq_restore+0x53/0x53 [ 362.209974] should_fail+0x8c0/0xa40 [ 362.213686] ? is_bpf_text_address+0xa4/0x120 [ 362.218187] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 362.223296] ? __kernel_text_address+0xd/0x40 [ 362.227798] ? unwind_get_return_address+0x61/0xa0 [ 362.232736] ? find_held_lock+0x35/0x1d0 [ 362.236802] ? __lock_is_held+0xb6/0x140 [ 362.240859] ? check_same_owner+0x320/0x320 [ 362.245172] ? rcu_note_context_switch+0x710/0x710 [ 362.250093] should_failslab+0xec/0x120 [ 362.254054] kmem_cache_alloc_trace+0x4b/0x740 [ 362.258619] ? __kmalloc_node+0x33/0x70 [ 362.262596] ? __kmalloc_node+0x33/0x70 [ 362.266552] ? rcu_read_lock_sched_held+0x108/0x120 [ 362.271552] __memcg_init_list_lru_node+0x169/0x270 [ 362.276551] ? list_lru_add+0x7c0/0x7c0 [ 362.280510] ? __kmalloc_node+0x47/0x70 [ 362.284469] __list_lru_init+0x544/0x750 [ 362.288520] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 362.294385] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 362.299383] ? lockdep_init_map+0x9/0x10 [ 362.303427] sget_userns+0x6b1/0xe40 [ 362.307118] ? set_anon_super+0x20/0x20 [ 362.311075] ? put_filp+0x90/0x90 [ 362.314512] ? destroy_unused_super.part.6+0xd0/0xd0 [ 362.319592] ? alloc_vfsmnt+0x762/0x9c0 [ 362.323546] ? path_lookupat+0x238/0xba0 [ 362.327588] ? mnt_free_id.isra.21+0x50/0x50 [ 362.331981] ? trace_hardirqs_off+0x10/0x10 [ 362.336286] ? putname+0xee/0x130 [ 362.339721] ? cap_capable+0x1b5/0x230 [ 362.343592] ? security_capable+0x8e/0xc0 [ 362.347725] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 362.352893] ? ns_capable_common+0xcf/0x160 [ 362.357200] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 362.362369] mount_ns+0x6d/0x190 [ 362.365716] rpc_mount+0x9e/0xd0 [ 362.369061] mount_fs+0x66/0x2d0 [ 362.372410] vfs_kern_mount.part.26+0xc6/0x4a0 [ 362.376970] ? may_umount+0xa0/0xa0 [ 362.380576] ? _raw_read_unlock+0x22/0x30 [ 362.384701] ? __get_fs_type+0x8a/0xc0 [ 362.388572] do_mount+0xea4/0x2bb0 [ 362.392092] ? __might_fault+0x110/0x1d0 [ 362.396137] ? copy_mount_string+0x40/0x40 [ 362.400348] ? check_same_owner+0x320/0x320 [ 362.404647] ? __check_object_size+0x8b/0x530 [ 362.409127] ? __might_sleep+0x95/0x190 [ 362.413091] ? kasan_check_write+0x14/0x20 [ 362.417304] ? _copy_from_user+0x99/0x110 [ 362.421434] ? memdup_user+0x5e/0x90 [ 362.425125] ? copy_mount_options+0x1f7/0x2e0 [ 362.429600] SyS_mount+0xab/0x120 [ 362.433033] ? copy_mnt_ns+0xb30/0xb30 [ 362.436902] do_syscall_64+0x281/0x940 [ 362.440766] ? vmalloc_sync_all+0x30/0x30 [ 362.444890] ? _raw_spin_unlock_irq+0x27/0x70 [ 362.449363] ? finish_task_switch+0x1c1/0x7e0 [ 362.453837] ? syscall_return_slowpath+0x550/0x550 [ 362.458743] ? syscall_return_slowpath+0x2ac/0x550 [ 362.463649] ? prepare_exit_to_usermode+0x350/0x350 [ 362.468642] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 362.473988] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 362.478819] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 362.483986] RIP: 0033:0x454e79 [ 362.487159] RSP: 002b:00007fed74635c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 362.494848] RAX: ffffffffffffffda RBX: 00007fed746366d4 RCX: 0000000000454e79 [ 362.502096] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 362.509345] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 2018/03/31 09:08:23 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x0, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r7 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) ioctl$PERF_EVENT_IOC_RESET(r5, 0x2403, 0x2) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r7, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) ioctl$PERF_EVENT_IOC_RESET(r4, 0x2403, 0x2) sendmsg(r3, &(0x7f0000000cc0)={&(0x7f0000000400)=@ethernet={0x1}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000580)="4589496d6a3bfcccae07dc729c52ee6bdf10d9cf221f605c25f790103018703b9a67491f96c3f9f8d07204ee4adf21acce1afdaedaba1228b4d33c3fa702a46b1329a0e52eea6a7908fd375ace47", 0x4e}], 0x1, &(0x7f0000000700), 0x0, 0x40000}, 0x4044080) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000280)={r6, &(0x7f0000000700)="ec1b815b5cc95d6e0dff859791e3341b"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)={0x3, 0x40000100, 0x56c96e7a, 0xea, 0x1, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") close(0xffffffffffffffff) [ 362.516594] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000016 [ 362.523840] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000015 2018/03/31 09:08:23 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x5, 0x100000000209e20, 0x8000000001, 0x5}, 0x2c) r1 = bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x13, 0x0, 0x7ffff9, 0x0, 0x20000003, 0x0}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xe, 0x0, 0x7f, 0x3e83, 0x8, r1, 0x80000000}, 0x2c) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x50, &(0x7f0000000140)={0x0, 0x0}}, 0x10) socket$kcm(0x29, 0x2, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) socketpair(0x4, 0x1, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r3, 0x2401, 0x1) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000480)={r4, &(0x7f0000000440)="3068306ef4a0ff8256b6430a042a9b"}, 0x10) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40042409, 0x1) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r3) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x0, 0x8, 0x0, 0x0, r0, 0x6}, 0x2c) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)) perf_event_open(&(0x7f000025c000)={0x5, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = gettid() r6 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0xfff, 0x100000001, 0xfffffffffffffffb, 0x0, 0x8001, 0x0, 0x1, 0x0, 0xfffffffffffffff9, 0x0, 0x9, 0x9, 0x5, 0x8, 0x1, 0x8106, 0x0, 0x14000000000, 0x80000000, 0x1, 0x5, 0x0, 0x40, 0x2839, 0x1d, 0x800, 0x7, 0x0, 0x0, 0x5, 0x7, 0x0, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x4}, 0x0, 0x0, 0xff, 0x0, 0x3, 0x8, 0x3}, r5, 0x2, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=r2, 0x4) perf_event_open(&(0x7f00000003c0)={0x7, 0x70, 0x7fff, 0x5, 0x6, 0x8000, 0x0, 0x1000, 0x0, 0x7, 0x1000, 0x1, 0xffffffff, 0x3, 0xaf99, 0x40, 0x8001, 0xfffffffffffffffa, 0x1, 0x80000000, 0xe6d1, 0x4, 0x8001, 0x9, 0x1f, 0xfffffffffffffc00, 0x0, 0x0, 0x7ff, 0x15ac000000000000, 0x0, 0x3, 0x1, 0xfffffffffffffffe, 0x9, 0xff, 0x1, 0x2, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000002c0), 0x8}, 0x0, 0x3, 0x6, 0x1, 0x5, 0xb03c, 0x5}, r5, 0xc, r6, 0xb) bpf$MAP_CREATE(0x0, &(0x7f0000000640)={0x8, 0x6bcb8e63, 0x0, 0x59ad, 0x12, r0, 0x8001}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000880)={r0, &(0x7f0000000840), &(0x7f00000008c0)=""/70}, 0x375) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000280)={0xffffffffffffffff, 0xffffff8f, &(0x7f0000000300)}, 0x10) 2018/03/31 09:08:23 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x0, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r7 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) ioctl$PERF_EVENT_IOC_RESET(r5, 0x2403, 0x2) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r7, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) ioctl$PERF_EVENT_IOC_RESET(r4, 0x2403, 0x2) sendmsg(r3, &(0x7f0000000cc0)={&(0x7f0000000400)=@ethernet={0x1}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000580)="4589496d6a3bfcccae07dc729c52ee6bdf10d9cf221f605c25f790103018703b9a67491f96c3f9f8d07204ee4adf21acce1afdaedaba1228b4d33c3fa702a46b1329a0e52eea6a7908fd375ace47", 0x4e}], 0x1, &(0x7f0000000700), 0x0, 0x40000}, 0x4044080) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000280)={r6, &(0x7f0000000700)="ec1b815b5cc95d6e0dff859791e3341b"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)={0x3, 0x40000100, 0x56c96e7a, 0xea, 0x1, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") close(0xffffffffffffffff) 2018/03/31 09:08:23 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x5, 0x100000000209e20, 0x8000000001, 0x5}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x13, 0x0, 0x7ffff9, 0x0, 0x20000003, 0x0}, 0x2c) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x0, 0x0, 0x7ffff9, 0x0, 0x20000003, 0x0}, 0x2c) 2018/03/31 09:08:23 executing program 1 (fault-call:20 fault-nth:22): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)={0xffffffffffffffff}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x0, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r5 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f00000009c0)={r4}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg(r3, &(0x7f0000000cc0)={&(0x7f0000000400)=@ethernet={0x1}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000580)="4589496d6a3bfcccae07dc729c52ee6bdf10d9cf221f605c25f790103018703b9a67491f96c3f9f8d07204ee4adf21acce1afdaedaba1228b4d33c3fa702a46b1329a0e52eea6a7908fd375ace47", 0x4e}], 0x1, &(0x7f0000000700), 0x0, 0x40000}, 0x4044080) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000740)={0xffffffffffffffff, &(0x7f0000000700)="ec1b815b5cc95d6e0dff859791e3341b8790dcb187f25418f8003a2b3bf345dc"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") close(0xffffffffffffffff) 2018/03/31 09:08:23 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xf, 0x5, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x80000000}, [@map={0x18, 0x1, 0x1, 0x0, 0x1}], {0x95}}, &(0x7f0000000040)='syzkaller\x00', 0x3, 0x10, &(0x7f0000000080)=""/16, 0x41000, 0x2f3100a785778bd1}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000001c0)={r0, 0x50, &(0x7f0000000140)}, 0x10) close(r0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000780)={&(0x7f0000000240)=@ax25, 0x80, &(0x7f0000000600)=[{&(0x7f00000002c0)=""/114, 0x72}, {&(0x7f0000000340)=""/133, 0x85}, {&(0x7f0000000400)=""/23, 0x17}, {&(0x7f0000000440)=""/59, 0x3b}, {&(0x7f0000000480)=""/114, 0x72}, {&(0x7f0000000500)=""/45, 0x2d}, {&(0x7f0000000540)=""/83, 0x53}, {&(0x7f00000005c0)}], 0x8, &(0x7f0000000680)=""/214, 0xd6, 0x100}, 0x40) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000007c0)={0xffffffffffffffff}) recvmsg(r2, &(0x7f00000019c0)={&(0x7f0000000800)=@ax25, 0x80, &(0x7f00000018c0)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000001880)=""/18, 0x12}], 0x2, &(0x7f0000001900)=""/184, 0xb8, 0x3}, 0x1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001a80)={r4, 0x50, &(0x7f0000001a00)}, 0x10) r5 = perf_event_open(&(0x7f0000001b00)={0x2, 0x70, 0x6, 0x8, 0x80000000, 0x10001, 0x0, 0x7ff, 0x4, 0xa, 0x200, 0x20, 0x72, 0x5, 0x0, 0x0, 0x5, 0x8f, 0x9ed, 0xff, 0x0, 0xa58, 0x7f, 0xf2f, 0x4503, 0x6, 0x81, 0x5, 0x1ff, 0xffffffff00000000, 0x2, 0x5, 0x9000000000000, 0xfffffffffffffffa, 0x8, 0x10001, 0x731ab510, 0x9, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000001ac0), 0x1}, 0x80, 0x2b4, 0x200, 0x3, 0x6, 0x9, 0x4}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0x20000) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000001b80)) r6 = getpid() r7 = perf_event_open(&(0x7f0000001c00)={0x1, 0x70, 0x0, 0xfff, 0x4, 0x80000000, 0x0, 0x3, 0x40, 0xa, 0x7, 0x7, 0x7, 0x4800000000000000, 0x7, 0x6, 0x62b, 0x8, 0x9, 0x100000000, 0x1, 0x0, 0x5, 0xd199, 0x1f, 0x10000, 0xff80000000000000, 0x3, 0x4, 0x8, 0x80000001, 0x8000, 0x7fff, 0x4, 0x16, 0x7, 0x40, 0x8, 0x0, 0x5, 0x50031dd1e89e26d1, @perf_bp={&(0x7f0000001bc0), 0x2}, 0x10000, 0x3a, 0x80000001, 0x1, 0x2c, 0x3ff, 0x6}, r6, 0x6, r3, 0x3) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000001c80)=r0, 0x4) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000001cc0)) ioctl$PERF_EVENT_IOC_REFRESH(r7, 0x2402, 0xffffffff) r8 = perf_event_open(&(0x7f0000001d00)={0x0, 0x70, 0x7, 0x400, 0x100, 0xac, 0x0, 0x100000000, 0xc2800, 0xa, 0x33e3, 0x2, 0x10001, 0x8, 0x5, 0x100000001, 0x2e9, 0x2, 0xc1, 0xf2, 0x2, 0x9, 0xffff, 0x7, 0x1, 0x0, 0x8000, 0x800, 0xfffffffffffffffa, 0x40, 0x0, 0x3, 0x6, 0xfa4, 0x7, 0xffffffffffff8000, 0x0, 0x0, 0x0, 0x8000, 0x3, @perf_config_ext={0x400}, 0x100, 0xa264, 0x4, 0x7, 0x2, 0x1000, 0x92}, r6, 0x5, r7, 0x1) socketpair(0x7, 0x6, 0x1, &(0x7f0000001d80)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000001e00)={&(0x7f0000001dc0)='./file0\x00', r9}, 0x10) r10 = perf_event_open(&(0x7f0000001e40)={0x4, 0x70, 0x5, 0x4, 0x8, 0x6, 0x0, 0x2, 0x1425, 0xb, 0x0, 0xcc9, 0x400, 0x57f90db4, 0x80000000, 0x7, 0x1000, 0x0, 0x8, 0x8000, 0xffffffff, 0x400, 0x1, 0x6, 0x40, 0x2, 0x10000, 0x8, 0x9, 0xfffffffffffffff8, 0x9, 0x4, 0x3, 0x400, 0x3, 0x9, 0x3, 0x100, 0x0, 0x6, 0x0, @perf_config_ext={0x4, 0x2}, 0x20, 0x3ff, 0x0, 0x7, 0x3, 0x5, 0xfa5e}, r6, 0xd, r7, 0x2) bpf$OBJ_GET_MAP(0x7, &(0x7f0000001f00)={&(0x7f0000001ec0)='./file0\x00'}, 0x10) socketpair$inet6_sctp(0xa, 0x0, 0x84, &(0x7f0000001f40)) ioctl$PERF_EVENT_IOC_DISABLE(r10, 0x2401, 0xbad) r11 = perf_event_open(&(0x7f0000001fc0)={0x3, 0x70, 0xff, 0x2f, 0x2, 0x7, 0x0, 0x40, 0x80000, 0x1, 0x8, 0x6, 0xfffffffffffffffb, 0x7, 0x2, 0x10000, 0x6, 0x5, 0x0, 0x10, 0x6, 0xc58, 0x7f, 0x3, 0x2, 0x3, 0x5, 0x80000000800000, 0x7, 0xfff, 0x16, 0x2b65, 0x9, 0x69244395, 0x10000, 0x4, 0x9, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000001f80), 0x8}, 0x100, 0x8, 0x51b4, 0x4, 0x800, 0xb7, 0x4800}, r6, 0x8, r8, 0x1) r12 = gettid() socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000002040)) perf_event_open(&(0x7f0000002080)={0x0, 0x70, 0x100, 0x0, 0x2, 0x401, 0x0, 0x6, 0x1, 0x6, 0x656, 0x5, 0xfffffffffffff973, 0xffffffffffffffff, 0x9, 0x7, 0x3, 0x3ff, 0x1c000000, 0x10000, 0x6, 0x20, 0x6, 0x1, 0x1, 0x4, 0x2, 0x20, 0x9, 0xed5, 0x847, 0x1000, 0x0, 0x0, 0x102bed3b, 0x9, 0x7fffffff, 0x6, 0x0, 0x24, 0x0, @perf_config_ext={0x100000001, 0x6}, 0x200, 0x800000010000000, 0x7, 0x7, 0x1000, 0xf3, 0xe87}, r12, 0xf, r11, 0x8) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000002100)) perf_event_open(&(0x7f0000002180)={0x4, 0x70, 0x0, 0x8, 0xff, 0x0, 0x0, 0xfffffffffffffff9, 0x10001, 0x3, 0xffffffffffffff00, 0x93eb, 0x1, 0x4e5e, 0x0, 0xfffffffffffffff8, 0x7, 0x1f4, 0x80000001, 0x99b, 0x4, 0x8, 0xed8, 0x3f, 0xec9, 0x6, 0x1, 0x4ab8, 0x8, 0x2, 0xdd, 0x9, 0xffffffffffffffff, 0x8000, 0x0, 0x6, 0xffff, 0x8, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000002140), 0xf}, 0x400, 0x5, 0x7, 0x4, 0x7, 0x4}, r12, 0x3, r7, 0x8) 2018/03/31 09:08:23 executing program 7 (fault-call:26 fault-nth:1): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)={0xffffffffffffffff}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x0, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r5 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x0, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f00000009c0)={r4}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg(r3, &(0x7f0000000cc0)={&(0x7f0000000400)=@ethernet={0x1}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000580)="4589496d6a3bfcccae07dc729c52ee6bdf10d9cf221f605c25f790103018703b9a67491f96c3f9f8d07204ee4adf21acce1afdaedaba1228b4d33c3fa702a46b1329a0e52eea6a7908fd375ace47", 0x4e}], 0x1, &(0x7f0000000700), 0x0, 0x40000}, 0x4044080) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000740)={0xffffffffffffffff, &(0x7f0000000700)="ec1b815b5cc95d6e0dff859791e3341b8790dcb187f25418f8003a2b3bf345"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") close(0xffffffffffffffff) 2018/03/31 09:08:23 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x5, 0x0, 0x0, 0x5}, 0x2c) r1 = bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x13, 0x0, 0x0, 0x0, 0x20000003, 0x0}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x3e83, 0x8, r1}, 0x2c) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x50, &(0x7f0000000140)={0x0, 0x0}}, 0x10) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, r2, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) socketpair(0x4, 0x1, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000480)={r5, &(0x7f0000000440)="3068306ef4a0ff8256b6430a042a9b"}, 0x10) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x0, 0x8, 0x0, 0x0, r0, 0x6}, 0x2c) socketpair(0x8, 0x2, 0x0, &(0x7f0000000040)) r6 = gettid() bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=r3, 0x4) perf_event_open(&(0x7f00000003c0)={0x7, 0x70, 0x7fff, 0x5, 0x6, 0x8000, 0x0, 0x1000, 0x0, 0x7, 0x1000, 0x1, 0xffffffff, 0x3, 0xaf99, 0x40, 0x8001, 0xfffffffffffffffa, 0x1, 0x80000000, 0xe6d1, 0x4, 0x8001, 0x9, 0x1f, 0xfffffffffffffc00, 0x0, 0x0, 0x7ff, 0x15ac000000000000, 0x0, 0x3, 0x1, 0xfffffffffffffffe, 0x9, 0xff, 0x1, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000002c0), 0x8}, 0x8004, 0x3, 0x6, 0x1, 0x5, 0xb03c, 0x5}, r6, 0xc, 0xffffffffffffffff, 0xb) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000280)={0xffffffffffffffff, 0xffffff8f, &(0x7f0000000300)}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000600)={0xffffffffffffffff, &(0x7f00000004c0)="648d1c6e4e7374f62b21f1c71a7cd05c41e2a0bf36f2f23f5761a39646321c3b5e4e670bd9a8f7a3fc36d594c1799d7dec6f0ba644a16abd532529ac63497998169000b2e491e82f659738895262b6fc9c79d8e6736c91136937b9", &(0x7f0000000540)="0c39cf9403045550ce39840a2a90ca20bc744608140dcd6c55d855533bb97417ef0cd19e1990bf245f0f38ab76b7f283d20500e75742ca4151b5489f5848a6b6104b0334b5427d07a3464ecffbfda64068c2d7ea6c230ba9040eebaec2030d19884f9f815ab793bd836fdb9c142a7aa9510939e2d3b5e6f57fa56f5464911bd939ca0ab0a1c19407fc9b1b974b94401f7c82bce0926bd5"}, 0x20) 2018/03/31 09:08:23 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000a40)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x0, 0x0) socketpair(0x2, 0x0, 0x0, &(0x7f0000000640)={0xffffffffffffffff}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r6 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x0, 0x10000, 0x1182, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f00000009c0)={r4}) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000280)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000a00)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg(r3, &(0x7f0000000cc0)={&(0x7f0000000400)=@ethernet={0x1}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000580)="4589496d6a3bfcccae07dc729c52ee6bdf10d9cf221f605c25f790103018703b9a67491f96c3f9f8d07204ee4adf21acce1afdaedaba1228b4d33c3fa702a46b1329a0e52eea6a7908fd375ace47", 0x4e}], 0x1, &(0x7f0000000700), 0x0, 0x40000}, 0x4044080) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000740)={r5, &(0x7f0000000700)="ec1b815b5cc95d6e0dff859791e3341b8790dcb187f25418f8003a2b3bf345"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") close(0xffffffffffffffff) [ 362.677431] FAULT_INJECTION: forcing a failure. [ 362.677431] name failslab, interval 1, probability 0, space 0, times 0 [ 362.688780] CPU: 0 PID: 10237 Comm: syz-executor1 Not tainted 4.16.0-rc6+ #43 [ 362.696062] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 362.705414] Call Trace: [ 362.708005] dump_stack+0x194/0x24d [ 362.711637] ? arch_local_irq_restore+0x53/0x53 [ 362.716313] ? __save_stack_trace+0x7e/0xd0 [ 362.720642] should_fail+0x8c0/0xa40 [ 362.724364] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 362.729478] ? kasan_kmalloc+0xad/0xe0 [ 362.733379] ? kmem_cache_alloc_trace+0x136/0x740 [ 362.738235] ? __memcg_init_list_lru_node+0x169/0x270 [ 362.743431] ? __list_lru_init+0x544/0x750 [ 362.747679] ? sget_userns+0x6b1/0xe40 [ 362.751568] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 362.756323] ? do_mount+0xea4/0x2bb0 [ 362.760036] ? SyS_mount+0xab/0x120 [ 362.763663] ? do_syscall_64+0x281/0x940 [ 362.767719] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 362.773085] ? find_held_lock+0x35/0x1d0 [ 362.777239] ? __lock_is_held+0xb6/0x140 [ 362.781310] ? check_same_owner+0x320/0x320 [ 362.785635] ? rcu_note_context_switch+0x710/0x710 [ 362.790571] should_failslab+0xec/0x120 [ 362.794551] kmem_cache_alloc_trace+0x4b/0x740 [ 362.799146] ? __kmalloc_node+0x33/0x70 [ 362.803137] ? __kmalloc_node+0x33/0x70 [ 362.807122] ? rcu_read_lock_sched_held+0x108/0x120 [ 362.812143] __memcg_init_list_lru_node+0x169/0x270 [ 362.817165] ? list_lru_add+0x7c0/0x7c0 [ 362.821140] ? __kmalloc_node+0x47/0x70 [ 362.825120] __list_lru_init+0x544/0x750 [ 362.829190] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 362.835082] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 362.840097] ? lockdep_init_map+0x9/0x10 [ 362.844161] sget_userns+0x6b1/0xe40 [ 362.847872] ? set_anon_super+0x20/0x20 [ 362.851845] ? put_filp+0x90/0x90 [ 362.855292] ? destroy_unused_super.part.6+0xd0/0xd0 [ 362.860391] ? alloc_vfsmnt+0x762/0x9c0 [ 362.864363] ? path_lookupat+0x238/0xba0 [ 362.868425] ? mnt_free_id.isra.21+0x50/0x50 [ 362.872882] ? trace_hardirqs_off+0x10/0x10 [ 362.877202] ? putname+0xee/0x130 [ 362.880658] ? cap_capable+0x1b5/0x230 [ 362.884557] ? security_capable+0x8e/0xc0 [ 362.888708] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 362.893885] ? ns_capable_common+0xcf/0x160 [ 362.898208] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 362.903386] mount_ns+0x6d/0x190 [ 362.906731] rpc_mount+0x9e/0xd0 [ 362.910081] mount_fs+0x66/0x2d0 [ 362.913440] vfs_kern_mount.part.26+0xc6/0x4a0 [ 362.918015] ? may_umount+0xa0/0xa0 [ 362.921635] ? _raw_read_unlock+0x22/0x30 [ 362.925779] ? __get_fs_type+0x8a/0xc0 [ 362.929664] do_mount+0xea4/0x2bb0 [ 362.933203] ? __might_fault+0x110/0x1d0 [ 362.937272] ? copy_mount_string+0x40/0x40 [ 362.941521] ? check_same_owner+0x320/0x320 [ 362.945847] ? __check_object_size+0x8b/0x530 [ 362.950340] ? __might_sleep+0x95/0x190 [ 362.954315] ? kasan_check_write+0x14/0x20 [ 362.958538] ? _copy_from_user+0x99/0x110 [ 362.962669] ? memdup_user+0x5e/0x90 [ 362.966369] ? copy_mount_options+0x1f7/0x2e0 [ 362.970851] SyS_mount+0xab/0x120 [ 362.974288] ? copy_mnt_ns+0xb30/0xb30 [ 362.978171] do_syscall_64+0x281/0x940 [ 362.982050] ? vmalloc_sync_all+0x30/0x30 [ 362.986189] ? _raw_spin_unlock_irq+0x27/0x70 [ 362.990676] ? finish_task_switch+0x1c1/0x7e0 [ 362.995165] ? syscall_return_slowpath+0x550/0x550 [ 363.000090] ? syscall_return_slowpath+0x2ac/0x550 [ 363.005031] ? prepare_exit_to_usermode+0x350/0x350 [ 363.010057] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 363.015430] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 363.020274] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 363.025458] RIP: 0033:0x454e79 2018/03/31 09:08:23 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x5, 0x100000000209e20, 0x8000000001, 0x5}, 0x2c) r1 = bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x13, 0x0, 0x7ffff9, 0x0, 0x20000003, 0x0}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xe, 0x0, 0x7f, 0x3e83, 0x8, r1, 0x80000000}, 0x2c) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x50, &(0x7f0000000140)={0x0, 0x0}}, 0x10) socket$kcm(0x29, 0x2, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r3 = perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) socketpair(0x4, 0x1, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000500)=0xb2d6) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000480)={r5, &(0x7f0000000440)="3068306ef4a0ff8256b6430a042a9b"}, 0x10) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x1) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r4) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x0, 0x8, 0x0, 0x0, r0, 0x6}, 0x2c) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x800000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x1e, 0xffd, 0x7, 0x10001, 0x5, r6, 0xffffffffffffffff}, 0x2c) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x1) r7 = gettid() r8 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0xfff, 0x100000001, 0xfffffffffffffffb, 0x0, 0x8001, 0x0, 0x1, 0x0, 0xfffffffffffffff9, 0x0, 0x9, 0x9, 0x5, 0x8, 0x1, 0x8106, 0x0, 0x14000000000, 0x80000000, 0x1, 0x5, 0x0, 0x40, 0x2839, 0x1d, 0x800, 0x7, 0x0, 0x0, 0x5, 0x7, 0x0, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x4}, 0x0, 0x0, 0xff, 0x0, 0x3, 0x8, 0x3}, r7, 0x2, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=r2, 0x4) perf_event_open(&(0x7f00000003c0)={0x7, 0x70, 0x7fff, 0x5, 0x6, 0x8000, 0x0, 0x1000, 0x0, 0x7, 0x1000, 0x1, 0xffffffff, 0x3, 0xaf99, 0x40, 0x8001, 0xfffffffffffffffa, 0x1, 0x80000000, 0xe6d1, 0x4, 0x8001, 0x9, 0x1f, 0xfffffffffffffc00, 0x0, 0x0, 0x7ff, 0x15ac000000000000, 0x0, 0x3, 0x1, 0xfffffffffffffffe, 0x9, 0xff, 0x1, 0x2, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000002c0), 0x8}, 0x0, 0x3, 0x6, 0x1, 0x5, 0xb03c, 0x5}, r7, 0xc, r8, 0xb) bpf$MAP_CREATE(0x0, &(0x7f0000000640)={0x8, 0x6bcb8e63, 0x0, 0x59ad, 0x12, r0, 0x8001}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000880)={r0, &(0x7f0000000840), &(0x7f00000008c0)=""/70}, 0x375) ioctl$PERF_EVENT_IOC_RESET(r4, 0x2403, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000280)={0xffffffffffffffff, 0xffffff8f, &(0x7f0000000300)}, 0x10) 2018/03/31 09:08:23 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x5, 0x100000000209e20, 0x8000000001, 0x5}, 0x2c) r1 = bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x13, 0x0, 0x7ffff9, 0x0, 0x20000003, 0x0}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xe, 0x0, 0x7f, 0x3e83, 0x8, r1, 0x80000000}, 0x2c) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x50, &(0x7f0000000140)={0x0, 0x0}}, 0x10) socket$kcm(0x29, 0x2, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r4 = perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) socketpair(0x4, 0x1, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r5, 0x2401, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', r2}, 0x10) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000480)={r6, &(0x7f0000000440)="3068306ef4a0ff8256b6430a042a9b"}, 0x10) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r6, 0x40042409, 0x1) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, r5) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x0, 0x8, 0x0, 0x0, r0, 0x6}, 0x2c) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r4) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)) perf_event_open(&(0x7f000025c000)={0x5, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r7 = gettid() r8 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0xfff, 0x100000001, 0xfffffffffffffffb, 0x0, 0x8001, 0x0, 0x1, 0x0, 0xfffffffffffffff9, 0x0, 0x9, 0x9, 0x5, 0x8, 0x1, 0x8106, 0x0, 0x14000000000, 0x80000000, 0x1, 0x5, 0x0, 0x40, 0x2839, 0x1d, 0x800, 0x7, 0x0, 0x0, 0x5, 0x7, 0x0, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x4}, 0x0, 0x0, 0xff, 0x0, 0x3, 0x8, 0x3}, r7, 0x2, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=r3, 0x4) perf_event_open(&(0x7f00000007c0)={0x5, 0x70, 0x7, 0x7f, 0x100, 0xfffffffffffffeff, 0x0, 0x6, 0x200, 0x0, 0x6, 0x2, 0x1, 0x3, 0x9, 0x0, 0x3, 0x20, 0xaa1, 0x2, 0x1, 0x8001, 0x100, 0x8, 0x1, 0x1, 0x9, 0x200, 0x7fffffff, 0x8, 0x8, 0x8, 0x5d3, 0x0, 0x4, 0x8001, 0x7fff, 0x6c, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x3}, 0x8, 0x9, 0xbcb, 0x4, 0x6, 0x3, 0x80000000}, r7, 0xf, r5, 0x9) perf_event_open(&(0x7f00000003c0)={0x7, 0x70, 0x7fff, 0x5, 0x6, 0x8000, 0x0, 0x1000, 0x0, 0x7, 0x1000, 0x1, 0xffffffff, 0x3, 0xaf99, 0x40, 0x8001, 0xfffffffffffffffa, 0x1, 0x80000000, 0xe6d1, 0x4, 0x8001, 0x9, 0x1f, 0xfffffffffffffc00, 0x0, 0x0, 0x7ff, 0x15ac000000000000, 0x0, 0x3, 0x1, 0xfffffffffffffffe, 0x9, 0xff, 0x1, 0x2, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000002c0), 0x8}, 0x0, 0x3, 0x6, 0x1, 0x5, 0xb03c, 0x5}, r7, 0xc, r8, 0xb) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r5, 0x0, 0xf4, 0xe6, &(0x7f0000000540)="48f56c31a27ed5b91348095c5faade35329ec16d63e3dcf5451f21dc5c8398cb47a2e634f90418221daf5c0913c530c8ab744668a97d31ebddaa5b67b31ad2685948d1b0c009763cd729ba6b286bb2b039a7b3bb3a354e6e86a2adbc04712b5871dea21291a2c1b4bae2ed5ce88f22310f153d8a7a75e41cab14ff93057712ac49c8cc8ed76dd2fad4f5c701072ba5047061e97731e6a510630f370afc401ac68eeb4f66196b2b028fedbd8752bcab5a09315e3be8c6bb47c9ee2e02489bee23a32871dff478b65d826d001df770a95ee959e4152b6e71a9aaed1ed832150a6bd71290ffd98fe3eb5e8c33a880473fbefb5169ea", &(0x7f0000000680)=""/230, 0x80000000000000, 0x6}, 0x28) bpf$MAP_CREATE(0x0, &(0x7f0000000640)={0x8, 0x6bcb8e63, 0x0, 0x59ad, 0x12, r0, 0x8001}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000880)={r0, &(0x7f0000000840), &(0x7f00000008c0)=""/70}, 0x375) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000280)={0xffffffffffffffff, 0xffffff8f, &(0x7f0000000300)}, 0x10) 2018/03/31 09:08:23 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x5, 0x100000000209e20, 0x8000000001, 0x5}, 0x2c) r1 = bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x13, 0x0, 0x7ffff9, 0x0, 0x20000003, 0x0}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xe, 0x0, 0x7f, 0x3e83, 0x8, r1, 0x80000000}, 0x2c) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x50, &(0x7f0000000140)={0x0, 0x0}}, 0x10) socket$kcm(0x29, 0x2, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) socketpair(0x4, 0x1, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x2) ioctl$PERF_EVENT_IOC_DISABLE(r3, 0x2401, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000480)={r4, &(0x7f0000000440)="3068306ef4a0ff8256b6430a042a9b"}, 0x10) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40042409, 0x1) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r3) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x0, 0x8, 0x0, 0x0, r0, 0x6}, 0x2c) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)) perf_event_open(&(0x7f000025c000)={0x5, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = gettid() r6 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0xfff, 0x100000001, 0xfffffffffffffffb, 0x0, 0x8001, 0x0, 0x1, 0x0, 0xfffffffffffffff9, 0x0, 0x9, 0x9, 0x5, 0x8, 0x1, 0x8106, 0x0, 0x14000000000, 0x80000000, 0x1, 0x5, 0x0, 0x40, 0x2839, 0x1d, 0x800, 0x7, 0x0, 0x0, 0x5, 0x7, 0x0, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x4}, 0x0, 0x0, 0xff, 0x0, 0x3, 0x8, 0x3}, r5, 0x2, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=r2, 0x4) perf_event_open(&(0x7f00000003c0)={0x7, 0x70, 0x7fff, 0x5, 0x6, 0x8000, 0x0, 0x1000, 0x0, 0x7, 0x1000, 0x1, 0xffffffff, 0x3, 0xaf99, 0x40, 0x8001, 0xfffffffffffffffa, 0x1, 0x80000000, 0xe6d1, 0x4, 0x8001, 0x9, 0x1f, 0xfffffffffffffc00, 0x0, 0x0, 0x7ff, 0x15ac000000000000, 0x0, 0x3, 0x1, 0xfffffffffffffffe, 0x9, 0xff, 0x1, 0x2, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000002c0), 0x8}, 0x0, 0x3, 0x6, 0x1, 0x5, 0xb03c, 0x5}, r5, 0xc, r6, 0xb) bpf$MAP_CREATE(0x0, &(0x7f0000000640)={0x8, 0x6bcb8e63, 0x0, 0x59ad, 0x12, r0, 0x8001}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000880)={r0, &(0x7f0000000840), &(0x7f00000008c0)=""/70}, 0x375) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000280)={0xffffffffffffffff, 0xffffff8f, &(0x7f0000000300)}, 0x10) 2018/03/31 09:08:23 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x5, 0x100000000209e20, 0x8000000001, 0x5}, 0x2c) r1 = bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x13, 0x0, 0x7ffff9, 0x0, 0x20000003, 0x0}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xe, 0x0, 0x7f, 0x3e83, 0x8, r1, 0x80000000}, 0x2c) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x50, &(0x7f0000000140)={0x0, 0x0}}, 0x10) socket$kcm(0x29, 0x2, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) socketpair(0x4, 0x1, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r3, 0x2401, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000480)={r4, &(0x7f0000000440)="3068306ef4a0ff8256b6430a042a9b"}, 0x10) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40042409, 0x1) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r3) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x0, 0x8, 0x0, 0x0, r0, 0x6}, 0x2c) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f00000004c0)=ANY=[@ANYBLOB="0900100000000000000000000000000000000000100000000000000000001000000000000000000000000000"]) perf_event_open(&(0x7f000025c000)={0x5, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = gettid() r6 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0xfff, 0x100000001, 0xfffffffffffffffb, 0x0, 0x8001, 0x0, 0x1, 0x0, 0xfffffffffffffff9, 0x0, 0x9, 0x9, 0x5, 0x8, 0x1, 0x8106, 0x0, 0x14000000000, 0x80000000, 0x1, 0x5, 0x0, 0x40, 0x2839, 0x1d, 0x800, 0x7, 0x0, 0x0, 0x5, 0x7, 0x0, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x4}, 0x0, 0x0, 0xff, 0x0, 0x3, 0x8, 0x3}, r5, 0x2, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=r2, 0x4) perf_event_open(&(0x7f00000003c0)={0x7, 0x70, 0x7fff, 0x5, 0x6, 0x8000, 0x0, 0x1000, 0x0, 0x7, 0x1000, 0x1, 0xffffffff, 0x3, 0xaf99, 0x40, 0x8001, 0xfffffffffffffffa, 0x1, 0x80000000, 0xe6d1, 0x4, 0x8001, 0x9, 0x1f, 0xfffffffffffffc00, 0x0, 0x0, 0x7ff, 0x15ac000000000000, 0x0, 0x3, 0x1, 0xfffffffffffffffe, 0x9, 0xff, 0x1, 0x2, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000002c0), 0x8}, 0x0, 0x3, 0x6, 0x1, 0x5, 0xb03c, 0x5}, r5, 0xc, r6, 0xb) bpf$MAP_CREATE(0x0, &(0x7f0000000640)={0x8, 0x6bcb8e63, 0x0, 0x59ad, 0x12, r0, 0x8001}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000880)={r0, &(0x7f0000000840), &(0x7f00000008c0)=""/70}, 0x375) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000280)={0xffffffffffffffff, 0xffffff8f, &(0x7f0000000300)}, 0x10) 2018/03/31 09:08:23 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x5, 0x100000000209e20, 0x8000000001, 0x5}, 0x2c) r1 = bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x13, 0x0, 0x7ffff9, 0x0, 0x20000003, 0x0}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0xe, 0x0, 0x7f, 0x3e83, 0x8, r1, 0x80000003}, 0x2c) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x50, &(0x7f0000000140)={0x0, 0x0}}, 0x10) socket$kcm(0x29, 0x2, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) socketpair(0x4, 0x1, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r3, 0x2401, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000480)={r4, &(0x7f0000000440)="3068306ef4a0ff8256b6430a042a9b"}, 0x10) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40042409, 0x1) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r3) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x0, 0x8, 0x0, 0x0, r0, 0x6}, 0x2c) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r4, 0x2405, r3) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)) perf_event_open(&(0x7f000025c000)={0x5, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = gettid() r6 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0xfff, 0x100000001, 0xfffffffffffffffb, 0x0, 0x8001, 0x0, 0x1, 0x0, 0xfffffffffffffff9, 0x0, 0x9, 0x9, 0x5, 0x8, 0x1, 0x8106, 0x0, 0x14000000000, 0x80000000, 0x1, 0x5, 0x0, 0x40, 0x2839, 0x1d, 0x800, 0x7, 0x0, 0x0, 0x5, 0x7, 0x0, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x4}, 0x0, 0x0, 0xff, 0x0, 0x3, 0x8, 0x3}, r5, 0x2, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=r2, 0x4) perf_event_open(&(0x7f00000003c0)={0x7, 0x70, 0x7fff, 0x5, 0x6, 0x8000, 0x0, 0x1000, 0x0, 0x7, 0x1000, 0x1, 0xffffffff, 0x3, 0xaf99, 0x40, 0x8001, 0xfffffffffffffffa, 0x1, 0x80000000, 0xe6d1, 0x4, 0x8001, 0x9, 0x1f, 0xfffffffffffffc00, 0x0, 0x0, 0x7ff, 0x15ac000000000000, 0x0, 0x3, 0x1, 0xfffffffffffffffe, 0x9, 0xff, 0x1, 0x2, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000002c0), 0x8}, 0x0, 0x3, 0x6, 0x1, 0x5, 0xb03c, 0x5}, r5, 0xc, r6, 0xb) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)={0x8, 0x6bcb8e63, 0x0, 0x59ad, 0x12, r0, 0x8001}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000500)={0xd1d0367b1a160d4c, 0x8001, 0xfffffffffffffffb, 0x2, 0x1c, r7, 0x6}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000880)={r0, &(0x7f0000000840), &(0x7f00000008c0)=""/70}, 0x375) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000280)={0xffffffffffffffff, 0xffffff8f, &(0x7f0000000300)}, 0x10) [ 363.028638] RSP: 002b:00007fed74635c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 363.036336] RAX: ffffffffffffffda RBX: 00007fed746366d4 RCX: 0000000000454e79 [ 363.043596] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 363.050857] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 363.058113] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000016 [ 363.065370] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000016 2018/03/31 09:08:23 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x5, 0x0, 0x0, 0x5}, 0x2c) r1 = bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x13, 0x0, 0x0, 0x0, 0x20000003, 0x0}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x3e83, 0x8, r1}, 0x2c) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x50, &(0x7f0000000140)={0x0, 0x0}}, 0x10) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, r2, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) socketpair(0x4, 0x1, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000480)={r5, &(0x7f0000000440)="3068306ef4a0ff8256b6430a042a9b"}, 0x10) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x0, 0x8, 0x0, 0x0, r0, 0x6}, 0x2c) socketpair(0x8, 0x2, 0x0, &(0x7f0000000040)) r6 = gettid() bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=r3, 0x4) perf_event_open(&(0x7f00000003c0)={0x7, 0x70, 0x7fff, 0x5, 0x6, 0x8000, 0x0, 0x1000, 0x0, 0x7, 0x1000, 0x1, 0xffffffff, 0x3, 0xaf99, 0x40, 0x8001, 0xfffffffffffffffa, 0x1, 0x80000000, 0xe6d1, 0x4, 0x8001, 0x9, 0x1f, 0xfffffffffffffc00, 0x0, 0x0, 0x7ff, 0x15ac000000000000, 0x0, 0x3, 0x1, 0xfffffffffffffffe, 0x9, 0xff, 0x1, 0x2, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0), 0x8}, 0x8004, 0x3, 0x6, 0x1, 0x5, 0xb03c, 0x5}, r6, 0xc, 0xffffffffffffffff, 0xb) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000280)={0xffffffffffffffff, 0xffffff8f, &(0x7f0000000300)}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000600)={0xffffffffffffffff, &(0x7f00000004c0)="648d1c6e4e7374f62b21f1c71a7cd05c41e2a0bf36f2f23f5761a39646321c3b5e4e670bd9a8f7a3fc36d594c1799d7dec6f0ba644a16abd532529ac63497998169000b2e491e82f659738895262b6fc9c79d8e6736c91136937b9", &(0x7f0000000540)="0c39cf9403045550ce39840a2a90ca20bc744608140dcd6c55d855533bb97417ef0cd19e1990bf245f0f38ab76b7f283d20500e75742ca4151b5489f5848a6b6104b0334b5427d07a3464ecffbfda64068c2d7ea6c230ba9040eebaec2030d19884f9f815ab793bd836fdb9c142a7aa9510939e2d3b5e6f57fa56f5464911bd939ca0ab0a1c19407fc9b1b974b94401f7c82bce0926bd5"}, 0x20) 2018/03/31 09:08:23 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x0, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r7 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) ioctl$PERF_EVENT_IOC_RESET(r5, 0x2403, 0x2) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r7, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) ioctl$PERF_EVENT_IOC_RESET(r4, 0x2403, 0x2) sendmsg(r3, &(0x7f0000000cc0)={&(0x7f0000000400)=@ethernet={0x1}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000580)="4589496d6a3bfcccae07dc729c52ee6bdf10d9cf221f605c25f790103018703b9a67491f96c3f9f8d07204ee4adf21acce1afdaedaba1228b4d33c3fa702a46b1329a0e52eea6a7908fd375ace47", 0x4e}], 0x1, &(0x7f0000000700), 0x0, 0x40000}, 0x4044080) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000280)={r6, &(0x7f0000000700)="ec1b815b5cc95d6e0dff859791e3341b"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)={0x3, 0x40000100, 0x56c96e7a, 0xea, 0x1, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") close(0xffffffffffffffff) [ 363.136935] FAULT_INJECTION: forcing a failure. [ 363.136935] name failslab, interval 1, probability 0, space 0, times 0 [ 363.148241] CPU: 1 PID: 10250 Comm: syz-executor7 Not tainted 4.16.0-rc6+ #43 [ 363.155519] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 363.164878] Call Trace: [ 363.167479] dump_stack+0x194/0x24d [ 363.171122] ? arch_local_irq_restore+0x53/0x53 [ 363.175796] ? __save_stack_trace+0x7e/0xd0 [ 363.180127] should_fail+0x8c0/0xa40 2018/03/31 09:08:23 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000a40)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x0, 0x0) socketpair(0x2, 0x0, 0x0, &(0x7f0000000640)={0xffffffffffffffff}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r6 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x0, 0x10000, 0x1182, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f00000009c0)={r4}) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000280)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000a00)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg(r3, &(0x7f0000000cc0)={&(0x7f0000000400)=@ethernet={0x1}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000580)="4589496d6a3bfcccae07dc729c52ee6bdf10d9cf221f605c25f790103018703b9a67491f96c3f9f8d07204ee4adf21acce1afdaedaba1228b4d33c3fa702a46b1329a0e52eea6a7908fd375ace47", 0x4e}], 0x1, &(0x7f0000000700), 0x0, 0x40000}, 0x4044080) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000740)={r5, &(0x7f0000000700)="ec1b815b5cc95d6e0dff859791e3341b8790dcb187f25418f8003a2b3bf345"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") close(0xffffffffffffffff) [ 363.183841] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 363.188950] ? kasan_kmalloc+0xad/0xe0 [ 363.192842] ? __kmalloc_track_caller+0x15e/0x760 [ 363.197688] ? memdup_user+0x2c/0x90 [ 363.201405] ? strndup_user+0x62/0xb0 [ 363.205246] ? SyS_mount+0x3c/0x120 [ 363.208875] ? proc_fail_nth_write+0x9b/0x1d0 [ 363.213368] ? map_files_get_link+0x3a0/0x3a0 [ 363.217850] ? find_held_lock+0x35/0x1d0 [ 363.221910] ? check_same_owner+0x320/0x320 [ 363.226216] ? rcu_note_context_switch+0x710/0x710 [ 363.231129] ? __check_object_size+0x8b/0x530 [ 363.235607] should_failslab+0xec/0x120 [ 363.239565] __kmalloc_track_caller+0x5f/0x760 [ 363.244129] ? strncpy_from_user+0x430/0x430 [ 363.248519] ? strndup_user+0x62/0xb0 [ 363.252297] ? _copy_from_user+0x99/0x110 [ 363.256428] memdup_user+0x2c/0x90 [ 363.259951] strndup_user+0x62/0xb0 [ 363.263559] SyS_mount+0x6b/0x120 [ 363.266991] ? copy_mnt_ns+0xb30/0xb30 [ 363.270865] do_syscall_64+0x281/0x940 [ 363.274735] ? vmalloc_sync_all+0x30/0x30 [ 363.278861] ? _raw_spin_unlock_irq+0x27/0x70 [ 363.283338] ? finish_task_switch+0x1c1/0x7e0 [ 363.287816] ? syscall_return_slowpath+0x550/0x550 [ 363.292726] ? syscall_return_slowpath+0x2ac/0x550 [ 363.297635] ? prepare_exit_to_usermode+0x350/0x350 [ 363.302633] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 363.307980] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 363.312806] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 363.317977] RIP: 0033:0x454e79 [ 363.321144] RSP: 002b:00007fd81e272c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 363.328833] RAX: ffffffffffffffda RBX: 00007fd81e2736d4 RCX: 0000000000454e79 2018/03/31 09:08:23 executing program 1 (fault-call:20 fault-nth:23): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)={0xffffffffffffffff}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x0, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r5 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f00000009c0)={r4}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg(r3, &(0x7f0000000cc0)={&(0x7f0000000400)=@ethernet={0x1}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000580)="4589496d6a3bfcccae07dc729c52ee6bdf10d9cf221f605c25f790103018703b9a67491f96c3f9f8d07204ee4adf21acce1afdaedaba1228b4d33c3fa702a46b1329a0e52eea6a7908fd375ace47", 0x4e}], 0x1, &(0x7f0000000700), 0x0, 0x40000}, 0x4044080) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000740)={0xffffffffffffffff, &(0x7f0000000700)="ec1b815b5cc95d6e0dff859791e3341b8790dcb187f25418f8003a2b3bf345dc"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") close(0xffffffffffffffff) [ 363.336084] RDX: 0000000020000780 RSI: 0000000020000ac0 RDI: 0000000020000000 [ 363.343334] RBP: 000000000072bea0 R08: 0000000020000b00 R09: 0000000000000000 [ 363.350581] R10: 0000000000037002 R11: 0000000000000246 R12: 0000000000000016 [ 363.357828] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000001 [ 363.439968] FAULT_INJECTION: forcing a failure. [ 363.439968] name failslab, interval 1, probability 0, space 0, times 0 [ 363.451362] CPU: 1 PID: 10309 Comm: syz-executor1 Not tainted 4.16.0-rc6+ #43 [ 363.458636] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 363.467988] Call Trace: [ 363.470579] dump_stack+0x194/0x24d [ 363.474215] ? arch_local_irq_restore+0x53/0x53 [ 363.478896] ? __save_stack_trace+0x7e/0xd0 [ 363.483231] should_fail+0x8c0/0xa40 [ 363.486950] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 363.492059] ? kasan_kmalloc+0xad/0xe0 [ 363.495947] ? kmem_cache_alloc_trace+0x136/0x740 [ 363.500796] ? __memcg_init_list_lru_node+0x169/0x270 [ 363.505990] ? __list_lru_init+0x544/0x750 [ 363.510223] ? sget_userns+0x6b1/0xe40 [ 363.514114] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 363.518866] ? do_mount+0xea4/0x2bb0 [ 363.522585] ? SyS_mount+0xab/0x120 [ 363.526204] ? do_syscall_64+0x281/0x940 [ 363.530247] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 363.535599] ? find_held_lock+0x35/0x1d0 [ 363.539650] ? __lock_is_held+0xb6/0x140 [ 363.543691] ? check_same_owner+0x320/0x320 [ 363.547994] ? rcu_note_context_switch+0x710/0x710 [ 363.552908] should_failslab+0xec/0x120 [ 363.556861] kmem_cache_alloc_trace+0x4b/0x740 [ 363.561424] ? __kmalloc_node+0x33/0x70 [ 363.565375] ? __kmalloc_node+0x33/0x70 [ 363.569330] ? rcu_read_lock_sched_held+0x108/0x120 [ 363.574332] __memcg_init_list_lru_node+0x169/0x270 [ 363.579344] ? list_lru_add+0x7c0/0x7c0 [ 363.583309] ? __kmalloc_node+0x47/0x70 [ 363.587262] __list_lru_init+0x544/0x750 [ 363.591308] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 363.597182] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 363.602176] ? lockdep_init_map+0x9/0x10 [ 363.606214] sget_userns+0x6b1/0xe40 [ 363.609908] ? set_anon_super+0x20/0x20 [ 363.613859] ? put_filp+0x90/0x90 [ 363.617294] ? destroy_unused_super.part.6+0xd0/0xd0 [ 363.622374] ? alloc_vfsmnt+0x762/0x9c0 [ 363.626322] ? path_lookupat+0x238/0xba0 [ 363.630377] ? mnt_free_id.isra.21+0x50/0x50 [ 363.634766] ? trace_hardirqs_off+0x10/0x10 [ 363.639063] ? putname+0xee/0x130 [ 363.642496] ? cap_capable+0x1b5/0x230 [ 363.646362] ? security_capable+0x8e/0xc0 [ 363.650490] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 363.655656] ? ns_capable_common+0xcf/0x160 [ 363.659956] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 363.665120] mount_ns+0x6d/0x190 [ 363.668464] rpc_mount+0x9e/0xd0 [ 363.671808] mount_fs+0x66/0x2d0 [ 363.675151] vfs_kern_mount.part.26+0xc6/0x4a0 [ 363.679706] ? may_umount+0xa0/0xa0 [ 363.683310] ? _raw_read_unlock+0x22/0x30 [ 363.687431] ? __get_fs_type+0x8a/0xc0 [ 363.691298] do_mount+0xea4/0x2bb0 [ 363.694812] ? __might_fault+0x110/0x1d0 [ 363.698849] ? copy_mount_string+0x40/0x40 [ 363.703062] ? check_same_owner+0x320/0x320 [ 363.707357] ? __check_object_size+0x8b/0x530 [ 363.711832] ? __might_sleep+0x95/0x190 [ 363.715786] ? kasan_check_write+0x14/0x20 [ 363.719996] ? _copy_from_user+0x99/0x110 [ 363.724128] ? memdup_user+0x5e/0x90 [ 363.727815] ? copy_mount_options+0x1f7/0x2e0 [ 363.732286] SyS_mount+0xab/0x120 [ 363.735713] ? copy_mnt_ns+0xb30/0xb30 [ 363.739576] do_syscall_64+0x281/0x940 [ 363.743438] ? vmalloc_sync_all+0x30/0x30 [ 363.747561] ? _raw_spin_unlock_irq+0x27/0x70 [ 363.752035] ? finish_task_switch+0x1c1/0x7e0 [ 363.756508] ? syscall_return_slowpath+0x550/0x550 [ 363.761413] ? syscall_return_slowpath+0x2ac/0x550 [ 363.766319] ? prepare_exit_to_usermode+0x350/0x350 [ 363.771311] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 363.776653] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 363.781472] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 363.786637] RIP: 0033:0x454e79 [ 363.789801] RSP: 002b:00007fed74635c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 363.797485] RAX: ffffffffffffffda RBX: 00007fed746366d4 RCX: 0000000000454e79 [ 363.804728] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 363.811971] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 363.819214] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000016 [ 363.826461] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000017 2018/03/31 09:08:24 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xf, 0x5, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x80000000}, [@map={0x18, 0x1, 0x1, 0x0, 0x1}], {0x95}}, &(0x7f0000000040)='syzkaller\x00', 0x3, 0x10, &(0x7f0000000080)=""/16, 0x41000, 0x2f3100a785778bd1}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000001c0)={r0, 0x50, &(0x7f0000000140)}, 0x10) close(r0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000780)={&(0x7f0000000240)=@ax25, 0x80, &(0x7f0000000600)=[{&(0x7f00000002c0)=""/114, 0x72}, {&(0x7f0000000340)=""/133, 0x85}, {&(0x7f0000000400)=""/23, 0x17}, {&(0x7f0000000440)=""/59, 0x3b}, {&(0x7f0000000480)=""/114, 0x72}, {&(0x7f0000000500)=""/45, 0x2d}, {&(0x7f0000000540)=""/83, 0x53}, {&(0x7f00000005c0)}], 0x8, &(0x7f0000000680)=""/214, 0xd6, 0x100}, 0x40) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000007c0)={0xffffffffffffffff}) recvmsg(r2, &(0x7f00000019c0)={&(0x7f0000000800)=@ax25, 0x80, &(0x7f00000018c0)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000001880)=""/18, 0x12}], 0x2, &(0x7f0000001900)=""/184, 0xb8, 0x3}, 0x1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001a80)={r4, 0x50, &(0x7f0000001a00)}, 0x10) r5 = perf_event_open(&(0x7f0000001b00)={0x2, 0x70, 0x6, 0x8, 0x80000000, 0x10001, 0x0, 0x7ff, 0x4, 0xa, 0x200, 0x20, 0x72, 0x5, 0x0, 0x0, 0x5, 0x8f, 0x9ed, 0xff, 0x0, 0xa58, 0x7f, 0xf2f, 0x4503, 0x6, 0x81, 0x5, 0x1ff, 0xffffffff00000000, 0x2, 0x5, 0x9000000000000, 0xfffffffffffffffa, 0x8, 0x10001, 0x731ab510, 0x9, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000001ac0), 0x1}, 0x80, 0x2b4, 0x200, 0x3, 0x6, 0x9, 0x4}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0x20000) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000001b80)) r6 = getpid() r7 = perf_event_open(&(0x7f0000001c00)={0x1, 0x70, 0x0, 0xfff, 0x4, 0x80000000, 0x0, 0x3, 0x40, 0xa, 0x7, 0x7, 0x7, 0x4800000000000000, 0x7, 0x6, 0x62b, 0x8, 0x9, 0x100000000, 0x1, 0x0, 0x5, 0xd199, 0x1f, 0x10000, 0xff80000000000000, 0x3, 0x4, 0x8, 0x80000001, 0x8000, 0x7fff, 0x4, 0x16, 0x7, 0x40, 0x8, 0x0, 0x5, 0x50031dd1e89e26d1, @perf_bp={&(0x7f0000001bc0), 0x2}, 0x10000, 0x3a, 0x80000001, 0x1, 0x2c, 0x3ff, 0x6}, r6, 0x6, r3, 0x3) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000001c80)=r0, 0x4) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000001cc0)) ioctl$PERF_EVENT_IOC_REFRESH(r7, 0x2402, 0xffffffff) r8 = perf_event_open(&(0x7f0000001d00)={0x0, 0x70, 0x7, 0x400, 0x100, 0xac, 0x0, 0x100000000, 0xc2800, 0xa, 0x33e3, 0x2, 0x10001, 0x8, 0x5, 0x100000001, 0x2e9, 0x2, 0xc1, 0xf2, 0x2, 0x9, 0xffff, 0x7, 0x1, 0x0, 0x8000, 0x800, 0xfffffffffffffffa, 0x40, 0x0, 0x3, 0x6, 0xfa4, 0x7, 0xffffffffffff8000, 0x0, 0x0, 0x0, 0x8000, 0x3, @perf_config_ext={0x400}, 0x100, 0xa264, 0x4, 0x7, 0x2, 0x1000, 0x92}, r6, 0x5, r7, 0x1) socketpair(0x7, 0x6, 0x1, &(0x7f0000001d80)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000001e00)={&(0x7f0000001dc0)='./file0\x00', r9}, 0x10) r10 = perf_event_open(&(0x7f0000001e40)={0x4, 0x70, 0x5, 0x4, 0x8, 0x6, 0x0, 0x2, 0x1425, 0xb, 0x0, 0xcc9, 0x400, 0x57f90db4, 0x80000000, 0x7, 0x1000, 0x0, 0x8, 0x8000, 0xffffffff, 0x400, 0x1, 0x6, 0x40, 0x2, 0x10000, 0x8, 0x9, 0xfffffffffffffff8, 0x9, 0x4, 0x3, 0x400, 0x3, 0x9, 0x3, 0x100, 0x0, 0x6, 0x0, @perf_config_ext={0x4, 0x2}, 0x20, 0x3ff, 0x0, 0x7, 0x3, 0x5, 0xfa5e}, r6, 0xd, r7, 0x2) bpf$OBJ_GET_MAP(0x7, &(0x7f0000001f00)={&(0x7f0000001ec0)='./file0\x00'}, 0x10) socketpair$inet6_sctp(0xa, 0x0, 0x84, &(0x7f0000001f40)) ioctl$PERF_EVENT_IOC_DISABLE(r10, 0x2401, 0xbad) r11 = perf_event_open(&(0x7f0000001fc0)={0x3, 0x70, 0xff, 0x2f, 0x2, 0x7, 0x0, 0x40, 0x80000, 0x1, 0x8, 0x6, 0xfffffffffffffffb, 0x7, 0x2, 0x10000, 0x6, 0x5, 0x0, 0x10, 0x6, 0xc58, 0x7f, 0x3, 0x2, 0x3, 0x5, 0x80000000800000, 0x7, 0xfff, 0x16, 0x2b65, 0x9, 0x69244395, 0x10000, 0x4, 0x9, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000001f80), 0x8}, 0x100, 0x8, 0x51b4, 0x4, 0x800, 0xb7, 0x4800}, r6, 0x8, r8, 0x1) r12 = gettid() socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000002040)) perf_event_open(&(0x7f0000002080)={0x0, 0x70, 0x100, 0x0, 0x2, 0x401, 0x0, 0x6, 0x1, 0x6, 0x656, 0x5, 0xfffffffffffff973, 0xffffffffffffffff, 0x9, 0x7, 0x3, 0x3ff, 0x1c000000, 0x10000, 0x6, 0x20, 0x6, 0x1, 0x1, 0x4, 0x2, 0x20, 0x9, 0xed5, 0x847, 0x1000, 0x0, 0x0, 0x102bed3b, 0x9, 0x7fffffff, 0x6, 0x0, 0x24, 0x0, @perf_config_ext={0x100000001, 0x6}, 0x200, 0x800000010000000, 0x7, 0x7, 0x1000, 0xf3, 0xe87}, r12, 0xf, r11, 0x8) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000002100)) perf_event_open(&(0x7f0000002180)={0x4, 0x70, 0x0, 0x8, 0xff, 0x0, 0x0, 0xfffffffffffffff9, 0x10001, 0x3, 0xffffffffffffff00, 0x93eb, 0x1, 0x4e5e, 0x8001, 0x0, 0x7, 0x1f4, 0x80000001, 0x99b, 0x4, 0x8, 0xed8, 0x3f, 0xec9, 0x6, 0x1, 0x4ab8, 0x8, 0x2, 0xdd, 0x9, 0xffffffffffffffff, 0x8000, 0x0, 0x6, 0xffff, 0x8, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000002140), 0xf}, 0x400, 0x5, 0x7, 0x4, 0x7, 0x4}, r12, 0x3, r7, 0x8) 2018/03/31 09:08:24 executing program 7 (fault-call:26 fault-nth:2): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)={0xffffffffffffffff}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x0, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r5 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x0, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f00000009c0)={r4}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg(r3, &(0x7f0000000cc0)={&(0x7f0000000400)=@ethernet={0x1}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000580)="4589496d6a3bfcccae07dc729c52ee6bdf10d9cf221f605c25f790103018703b9a67491f96c3f9f8d07204ee4adf21acce1afdaedaba1228b4d33c3fa702a46b1329a0e52eea6a7908fd375ace47", 0x4e}], 0x1, &(0x7f0000000700), 0x0, 0x40000}, 0x4044080) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000740)={0xffffffffffffffff, &(0x7f0000000700)="ec1b815b5cc95d6e0dff859791e3341b8790dcb187f25418f8003a2b3bf345"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") close(0xffffffffffffffff) 2018/03/31 09:08:24 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x5, 0x0, 0x0, 0x5}, 0x2c) r1 = bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x13, 0x0, 0x0, 0x0, 0x20000003, 0x0}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x3e83, 0x8, r1}, 0x2c) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x50, &(0x7f0000000140)={0x0, 0x0}}, 0x10) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, r2, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) socketpair(0x4, 0x1, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000480)={r5, &(0x7f0000000440)="3068306ef4a0ff8256b6430a042a9b"}, 0x10) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x0, 0x8, 0x0, 0x0, r0, 0x6}, 0x2c) socketpair(0x8, 0x2, 0x0, &(0x7f0000000040)) r6 = gettid() bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=r3, 0x4) perf_event_open(&(0x7f00000003c0)={0x7, 0x70, 0x7fff, 0x5, 0x6, 0x8000, 0x0, 0x1000, 0x0, 0x7, 0x1000, 0x1, 0xffffffff, 0x3, 0xaf99, 0x40, 0x8001, 0xfffffffffffffffa, 0x1, 0x80000000, 0xe6d1, 0x4, 0x8001, 0x9, 0x1f, 0xfffffffffffffc00, 0x0, 0x0, 0x7ff, 0x15ac000000000000, 0x0, 0x3, 0x1, 0xfffffffffffffffe, 0x9, 0xff, 0x1, 0x2, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0), 0x8}, 0x8004, 0x3, 0x6, 0x1, 0x5, 0xb03c, 0x5}, r6, 0xc, 0xffffffffffffffff, 0xb) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000280)={0xffffffffffffffff, 0xffffff8f, &(0x7f0000000300)}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000600)={0xffffffffffffffff, &(0x7f00000004c0)="648d1c6e4e7374f62b21f1c71a7cd05c41e2a0bf36f2f23f5761a39646321c3b5e4e670bd9a8f7a3fc36d594c1799d7dec6f0ba644a16abd532529ac63497998169000b2e491e82f659738895262b6fc9c79d8e6736c91136937b9", &(0x7f0000000540)="0c39cf9403045550ce39840a2a90ca20bc744608140dcd6c55d855533bb97417ef0cd19e1990bf245f0f38ab76b7f283d20500e75742ca4151b5489f5848a6b6104b0334b5427d07a3464ecffbfda64068c2d7ea6c230ba9040eebaec2030d19884f9f815ab793bd836fdb9c142a7aa9510939e2d3b5e6f57fa56f5464911bd939ca0ab0a1c19407fc9b1b974b94401f7c82bce0926bd5"}, 0x20) 2018/03/31 09:08:24 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x5, 0x100000000209e20, 0x8000000001, 0x5}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x13, 0x0, 0x7ffff9, 0x0, 0x20000003, 0x0}, 0x2c) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000580), 0x4) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0xe, 0x0, 0x7f, 0x3e83, 0x8, r0, 0x80000000}, 0x2c) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x50, &(0x7f0000000140)={0x0, 0x0}}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000540)={&(0x7f0000000500)='./file0\x00', 0x0, 0x10}, 0x10) socket$kcm(0x29, 0x2, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r3 = perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) ioctl$PERF_EVENT_IOC_REFRESH(r3, 0x2402, 0x0) socketpair(0x4, 0x1, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x80000000000007f) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000480)={r5, &(0x7f0000000440)="3068306ef4a0ff8256b6430a042a9b"}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000600)=0x564) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40042409, 0x1) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r4) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000005c0)={r0, &(0x7f0000000680)="275da00ae339287c3eb8457d4669fcb92a91aac350e3beba64922f954d7f6fc1ecf08fb4947dfc5fae7a2ccb471a6792f4ceefbd0764032db6d9aa733b3d4ed06a40feaaded7b3acad0763ff56f84e621055acf39c3e7d616e3b9bf724869fd2461f463bb35314db8715eb6e5320249beb3d01f7b23939655a36ed585f375022271b166a906ea9d609b84f2dcff36361b006cd398aaa5fb2fef6383b88474e4a4da0", &(0x7f0000000740)="0aa45f2940dc7a114f58e1136999c4024bea83e232b536d0b531d9654a7b31b1c3aa2a643a8cc1b66b5f362211df257b77e67e58df2e45590040b73c171af936e4f870f5061d0191cf464facbbcb2bd171b0e73e719c1657bf6a8411729865afdd3819d90dbc0f4e1f918ecca20df40a8f7aa9a5097458e3036c39113a8b876291fea78e8647874979562eddb275d7a8d8d2551c41dbc5b6e193e8e8c6f629f11249f9e0a801380699847e704365ba6732c3dd96"}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x0, 0x8, 0x0, 0x0, r0, 0x6}, 0x2c) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)) perf_event_open(&(0x7f000025c000)={0x5, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = gettid() r7 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0xfff, 0x100000001, 0xfffffffffffffffb, 0x0, 0x8001, 0x0, 0x1, 0x0, 0xfffffffffffffff9, 0x0, 0x9, 0x9, 0x5, 0x8, 0x1, 0x8106, 0x0, 0x14000000000, 0x80000000, 0x1, 0x5, 0x0, 0x40, 0x2839, 0x1d, 0x800, 0x7, 0x0, 0x0, 0x5, 0x7, 0x0, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x4}, 0x0, 0x0, 0xff, 0x0, 0x3, 0x8, 0x3}, r6, 0x2, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=r2, 0x4) perf_event_open(&(0x7f00000003c0)={0x7, 0x70, 0x7fff, 0x5, 0x6, 0x8000, 0x0, 0x1000, 0x0, 0x7, 0x1000, 0x1, 0xffffffff, 0x3, 0xaf99, 0x40, 0x8001, 0xfffffffffffffffa, 0x1, 0x80000000, 0xe6d1, 0x4, 0x8001, 0x9, 0x1f, 0xfffffffffffffc00, 0x0, 0x0, 0x7ff, 0x15ac000000000000, 0x0, 0x3, 0x1, 0xfffffffffffffffe, 0x9, 0xff, 0x1, 0x2, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000002c0), 0x8}, 0x0, 0x3, 0x6, 0x1, 0x5, 0xb03c, 0x5}, r6, 0xc, r7, 0xb) bpf$MAP_CREATE(0x0, &(0x7f0000000640)={0x8, 0x6bcb8e63, 0x0, 0x59ad, 0x12, r0, 0x8001}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000880)={r0, &(0x7f0000000840), &(0x7f00000008c0)=""/70}, 0x375) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000280)={0xffffffffffffffff, 0xffffff8f, &(0x7f0000000300)}, 0x10) 2018/03/31 09:08:24 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x5, 0x100000000209e20, 0x8000000001, 0x5}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x13, 0x0, 0x7ffff9, 0x0, 0x20000003, 0x0}, 0x2c) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x0, 0x0, 0x7ffff9, 0x0, 0x20000003, 0x0}, 0x2c) 2018/03/31 09:08:24 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)={0xffffffffffffffff}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x0, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r6 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f00000009c0)={r4}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) ioctl$PERF_EVENT_IOC_RESET(r4, 0x2403, 0x2) sendmsg(r3, &(0x7f0000000cc0)={&(0x7f0000000400)=@ethernet={0x1}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000580)="4589496d6a3bfcccae07dc729c52ee6bdf10d9cf221f605c25f790103018703b9a67491f96c3f9f8d07204ee4adf21acce1afdaedaba1228b4d33c3fa702a46b1329a0e52eea6a7908fd375ace47", 0x4e}], 0x1, &(0x7f0000000700), 0x0, 0x40000}, 0x4044080) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000280)={r5, &(0x7f0000000700)="ec1b815b5cc95d6e0dff859791e3341b"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)={0x3, 0x40000100, 0x56c96e7a, 0xea, 0x1, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") close(0xffffffffffffffff) 2018/03/31 09:08:24 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000a40)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x0, 0x0) socketpair(0x2, 0x0, 0x0, &(0x7f0000000640)={0xffffffffffffffff}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r6 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x0, 0x10000, 0x1182, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f00000009c0)={r4}) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000280)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000a00)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg(r3, &(0x7f0000000cc0)={&(0x7f0000000400)=@ethernet={0x1}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000580)="4589496d6a3bfcccae07dc729c52ee6bdf10d9cf221f605c25f790103018703b9a67491f96c3f9f8d07204ee4adf21acce1afdaedaba1228b4d33c3fa702a46b1329a0e52eea6a7908fd375ace47", 0x4e}], 0x1, &(0x7f0000000700), 0x0, 0x40000}, 0x4044080) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000740)={r5, &(0x7f0000000700)="ec1b815b5cc95d6e0dff859791e3341b8790dcb187f25418f8003a2b3bf345"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") close(0xffffffffffffffff) 2018/03/31 09:08:24 executing program 1 (fault-call:20 fault-nth:24): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)={0xffffffffffffffff}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x0, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r5 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f00000009c0)={r4}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg(r3, &(0x7f0000000cc0)={&(0x7f0000000400)=@ethernet={0x1}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000580)="4589496d6a3bfcccae07dc729c52ee6bdf10d9cf221f605c25f790103018703b9a67491f96c3f9f8d07204ee4adf21acce1afdaedaba1228b4d33c3fa702a46b1329a0e52eea6a7908fd375ace47", 0x4e}], 0x1, &(0x7f0000000700), 0x0, 0x40000}, 0x4044080) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000740)={0xffffffffffffffff, &(0x7f0000000700)="ec1b815b5cc95d6e0dff859791e3341b8790dcb187f25418f8003a2b3bf345dc"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") close(0xffffffffffffffff) [ 363.964308] FAULT_INJECTION: forcing a failure. [ 363.964308] name failslab, interval 1, probability 0, space 0, times 0 [ 363.975638] CPU: 1 PID: 10324 Comm: syz-executor7 Not tainted 4.16.0-rc6+ #43 [ 363.982914] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 363.992271] Call Trace: [ 363.994896] dump_stack+0x194/0x24d [ 363.998527] ? arch_local_irq_restore+0x53/0x53 [ 364.003202] should_fail+0x8c0/0xa40 [ 364.006914] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 364.012016] ? __kmalloc_track_caller+0x15e/0x760 [ 364.016849] ? strndup_user+0x62/0xb0 [ 364.020630] ? SyS_mount+0x6b/0x120 [ 364.024238] ? trace_hardirqs_off+0x10/0x10 [ 364.028542] ? proc_fail_nth_write+0x9b/0x1d0 [ 364.033020] ? map_files_get_link+0x3a0/0x3a0 [ 364.037507] ? find_held_lock+0x35/0x1d0 [ 364.041563] ? check_same_owner+0x320/0x320 [ 364.045861] ? lock_release+0xa40/0xa40 [ 364.049815] ? rcu_note_context_switch+0x710/0x710 [ 364.054732] should_failslab+0xec/0x120 [ 364.058689] kmem_cache_alloc_trace+0x4b/0x740 [ 364.063252] ? kasan_check_write+0x14/0x20 [ 364.067470] ? _copy_from_user+0x99/0x110 [ 364.071600] copy_mount_options+0x5f/0x2e0 [ 364.075818] SyS_mount+0x87/0x120 [ 364.079256] ? copy_mnt_ns+0xb30/0xb30 [ 364.083128] do_syscall_64+0x281/0x940 [ 364.087004] ? vmalloc_sync_all+0x30/0x30 [ 364.091146] ? _raw_spin_unlock_irq+0x27/0x70 [ 364.095621] ? finish_task_switch+0x1c1/0x7e0 [ 364.100108] ? syscall_return_slowpath+0x550/0x550 [ 364.105028] ? syscall_return_slowpath+0x2ac/0x550 [ 364.109939] ? prepare_exit_to_usermode+0x350/0x350 [ 364.114939] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 364.120288] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 364.125118] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 364.130289] RIP: 0033:0x454e79 [ 364.133457] RSP: 002b:00007fd81e272c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 364.141146] RAX: ffffffffffffffda RBX: 00007fd81e2736d4 RCX: 0000000000454e79 [ 364.148392] RDX: 0000000020000780 RSI: 0000000020000ac0 RDI: 0000000020000000 [ 364.155639] RBP: 000000000072bea0 R08: 0000000020000b00 R09: 0000000000000000 2018/03/31 09:08:24 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x5, 0x0, 0x0, 0x5}, 0x2c) r1 = bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x13, 0x0, 0x0, 0x0, 0x20000003, 0x0}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x3e83, 0x8, r1}, 0x2c) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x50, &(0x7f0000000140)={0x0, 0x0}}, 0x10) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, r2, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) socketpair(0x4, 0x1, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000480)={r5, &(0x7f0000000440)="3068306ef4a0ff8256b6430a042a9b"}, 0x10) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x0, 0x8, 0x0, 0x0, r0, 0x6}, 0x2c) socketpair(0x8, 0x2, 0x0, &(0x7f0000000040)) r6 = gettid() bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=r3, 0x4) perf_event_open(&(0x7f00000003c0)={0x7, 0x70, 0x7fff, 0x5, 0x6, 0x8000, 0x0, 0x1000, 0x0, 0x7, 0x1000, 0x1, 0xffffffff, 0x3, 0xaf99, 0x40, 0x8001, 0xfffffffffffffffa, 0x1, 0x80000000, 0xe6d1, 0x4, 0x8001, 0x9, 0x1f, 0xfffffffffffffc00, 0x0, 0x0, 0x7ff, 0x15ac000000000000, 0x0, 0x3, 0x1, 0xfffffffffffffffe, 0x9, 0xff, 0x1, 0x2, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0), 0x8}, 0x8004, 0x3, 0x6, 0x1, 0x5, 0xb03c, 0x5}, r6, 0xc, 0xffffffffffffffff, 0xb) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000280)={0xffffffffffffffff, 0xffffff8f, &(0x7f0000000300)}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000600)={0xffffffffffffffff, &(0x7f00000004c0)="648d1c6e4e7374f62b21f1c71a7cd05c41e2a0bf36f2f23f5761a39646321c3b5e4e670bd9a8f7a3fc36d594c1799d7dec6f0ba644a16abd532529ac63497998169000b2e491e82f659738895262b6fc9c79d8e6736c91136937b9", &(0x7f0000000540)="0c39cf9403045550ce39840a2a90ca20bc744608140dcd6c55d855533bb97417ef0cd19e1990bf245f0f38ab76b7f283d20500e75742ca4151b5489f5848a6b6104b0334b5427d07a3464ecffbfda64068c2d7ea6c230ba9040eebaec2030d19884f9f815ab793bd836fdb9c142a7aa9510939e2d3b5e6f57fa56f5464911bd939ca0ab0a1c19407fc9b1b974b94401f7c82bce0926bd5"}, 0x20) [ 364.162887] R10: 0000000000037002 R11: 0000000000000246 R12: 0000000000000016 [ 364.170133] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000002 [ 364.187445] FAULT_INJECTION: forcing a failure. [ 364.187445] name failslab, interval 1, probability 0, space 0, times 0 [ 364.198751] CPU: 1 PID: 10342 Comm: syz-executor1 Not tainted 4.16.0-rc6+ #43 [ 364.206025] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 364.215384] Call Trace: [ 364.217976] dump_stack+0x194/0x24d [ 364.221612] ? arch_local_irq_restore+0x53/0x53 [ 364.226281] ? __save_stack_trace+0x7e/0xd0 [ 364.230611] should_fail+0x8c0/0xa40 [ 364.234331] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 364.239438] ? kasan_kmalloc+0xad/0xe0 [ 364.243321] ? kmem_cache_alloc_trace+0x136/0x740 [ 364.248164] ? __memcg_init_list_lru_node+0x169/0x270 [ 364.253354] ? __list_lru_init+0x544/0x750 [ 364.257583] ? sget_userns+0x6b1/0xe40 [ 364.261469] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 364.266217] ? do_mount+0xea4/0x2bb0 [ 364.269929] ? SyS_mount+0xab/0x120 [ 364.273552] ? do_syscall_64+0x281/0x940 [ 364.277614] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 364.282981] ? find_held_lock+0x35/0x1d0 [ 364.287049] ? __lock_is_held+0xb6/0x140 [ 364.291116] ? check_same_owner+0x320/0x320 [ 364.295445] ? rcu_note_context_switch+0x710/0x710 [ 364.300386] should_failslab+0xec/0x120 [ 364.304363] kmem_cache_alloc_trace+0x4b/0x740 [ 364.308946] ? __kmalloc_node+0x33/0x70 [ 364.312921] ? __kmalloc_node+0x33/0x70 [ 364.316891] ? rcu_read_lock_sched_held+0x108/0x120 [ 364.321911] __memcg_init_list_lru_node+0x169/0x270 [ 364.326930] ? list_lru_add+0x7c0/0x7c0 [ 364.330901] ? __kmalloc_node+0x47/0x70 [ 364.334885] __list_lru_init+0x544/0x750 [ 364.338948] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 364.344833] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 364.349853] ? lockdep_init_map+0x9/0x10 [ 364.353912] sget_userns+0x6b1/0xe40 [ 364.357623] ? set_anon_super+0x20/0x20 [ 364.361598] ? put_filp+0x90/0x90 [ 364.365048] ? destroy_unused_super.part.6+0xd0/0xd0 [ 364.370163] ? alloc_vfsmnt+0x762/0x9c0 [ 364.374128] ? path_lookupat+0x238/0xba0 [ 364.378183] ? mnt_free_id.isra.21+0x50/0x50 [ 364.382582] ? trace_hardirqs_off+0x10/0x10 [ 364.386894] ? putname+0xee/0x130 [ 364.390340] ? cap_capable+0x1b5/0x230 [ 364.394221] ? security_capable+0x8e/0xc0 [ 364.398364] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 364.403545] ? ns_capable_common+0xcf/0x160 [ 364.407858] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 364.413038] mount_ns+0x6d/0x190 [ 364.416398] rpc_mount+0x9e/0xd0 [ 364.419754] mount_fs+0x66/0x2d0 [ 364.423109] vfs_kern_mount.part.26+0xc6/0x4a0 [ 364.427680] ? may_umount+0xa0/0xa0 [ 364.431301] ? _raw_read_unlock+0x22/0x30 [ 364.435447] ? __get_fs_type+0x8a/0xc0 [ 364.439333] do_mount+0xea4/0x2bb0 [ 364.442868] ? __might_fault+0x110/0x1d0 [ 364.446934] ? copy_mount_string+0x40/0x40 [ 364.451179] ? check_same_owner+0x320/0x320 [ 364.455493] ? __check_object_size+0x8b/0x530 [ 364.459984] ? __might_sleep+0x95/0x190 [ 364.463961] ? kasan_check_write+0x14/0x20 [ 364.468190] ? _copy_from_user+0x99/0x110 [ 364.472336] ? memdup_user+0x5e/0x90 [ 364.476046] ? copy_mount_options+0x1f7/0x2e0 [ 364.480537] SyS_mount+0xab/0x120 [ 364.483980] ? copy_mnt_ns+0xb30/0xb30 [ 364.487871] do_syscall_64+0x281/0x940 [ 364.491760] ? trace_event_raw_event_sys_exit+0x260/0x260 [ 364.497289] ? syscall_return_slowpath+0x550/0x550 [ 364.502214] ? syscall_return_slowpath+0x2ac/0x550 [ 364.507137] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 364.512497] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 364.517339] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 364.522518] RIP: 0033:0x454e79 [ 364.525693] RSP: 002b:00007fed74635c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 364.533396] RAX: ffffffffffffffda RBX: 00007fed746366d4 RCX: 0000000000454e79 [ 364.540657] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 364.547916] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 364.555172] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000016 2018/03/31 09:08:24 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x5, 0x100000000209e20, 0x8000000001, 0x5}, 0x2c) r1 = bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x13, 0x0, 0x7ffff9, 0x0, 0x20000003, 0x0}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xe, 0x0, 0x7f, 0x3e83, 0x8, r1, 0x80000000}, 0x2c) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x50, &(0x7f0000000140)={0x0, 0x0}}, 0x10) socket$kcm(0x29, 0x2, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) socketpair(0x4, 0x1, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x9, 0x1, 0xfffffffffffffff8, 0xfffffffffffffffc, 0x9, r0, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r3, 0x2401, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000480)={r4, &(0x7f0000000440)="3068306ef4a0ff8256b6430a042a9b"}, 0x10) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40042409, 0x1) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r3) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x0, 0x8, 0x0, 0x0, r0, 0x6}, 0x2c) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)) perf_event_open(&(0x7f000025c000)={0x5, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = gettid() r6 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0xfff, 0x100000001, 0xfffffffffffffffb, 0x0, 0x8001, 0x0, 0x1, 0x0, 0xfffffffffffffff9, 0x0, 0x9, 0x9, 0x5, 0x8, 0x1, 0x8106, 0x0, 0x14000000000, 0x80000000, 0x1, 0x5, 0x0, 0x40, 0x2839, 0x1d, 0x800, 0x7, 0x0, 0x0, 0x5, 0x7, 0x0, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x4}, 0x0, 0x0, 0xff, 0x0, 0x3, 0x8, 0x3}, r5, 0x2, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=r2, 0x4) perf_event_open(&(0x7f00000003c0)={0x7, 0x70, 0x7fff, 0x5, 0x6, 0x8000, 0x0, 0x1000, 0x0, 0x7, 0x1000, 0x1, 0xffffffff, 0x3, 0xaf99, 0x40, 0x8001, 0xfffffffffffffffa, 0x1, 0x80000000, 0xe6d1, 0x4, 0x8001, 0x9, 0x1f, 0xfffffffffffffc00, 0x0, 0x0, 0x7ff, 0x15ac000000000000, 0x0, 0x3, 0x1, 0xfffffffffffffffe, 0x9, 0xff, 0x1, 0x2, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000002c0), 0x8}, 0x0, 0x3, 0x6, 0x1, 0x5, 0xb03c, 0x5}, r5, 0xc, r6, 0xb) bpf$MAP_CREATE(0x0, &(0x7f0000000640)={0x8, 0x6bcb8e63, 0x0, 0x59ad, 0x12, r0, 0x8001}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000880)={r0, &(0x7f0000000840), &(0x7f00000008c0)=""/70}, 0x375) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0xfffffffffffffded, &(0x7f0000000300)}, 0x10) 2018/03/31 09:08:24 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x5, 0x0, 0x0, 0x5}, 0x2c) r1 = bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x13, 0x0, 0x0, 0x0, 0x20000003, 0x0}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x3e83, 0x8, r1}, 0x2c) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x50, &(0x7f0000000140)={0x0, 0x0}}, 0x10) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, r2, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) socketpair(0x4, 0x1, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000480)={r5, &(0x7f0000000440)="3068306ef4a0ff8256b6430a042a9b"}, 0x10) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x0, 0x8, 0x0, 0x0, r0, 0x6}, 0x2c) socketpair(0x8, 0x2, 0x0, &(0x7f0000000040)) r6 = gettid() bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=r3, 0x4) perf_event_open(&(0x7f00000003c0)={0x7, 0x70, 0x7fff, 0x5, 0x6, 0x8000, 0x0, 0x1000, 0x0, 0x7, 0x1000, 0x1, 0xffffffff, 0x3, 0xaf99, 0x40, 0x8001, 0xfffffffffffffffa, 0x1, 0x80000000, 0xe6d1, 0x4, 0x8001, 0x9, 0x1f, 0xfffffffffffffc00, 0x0, 0x0, 0x7ff, 0x15ac000000000000, 0x0, 0x3, 0x1, 0xfffffffffffffffe, 0x9, 0xff, 0x1, 0x2, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000002c0)}, 0x8004, 0x3, 0x6, 0x1, 0x5, 0xb03c, 0x5}, r6, 0xc, 0xffffffffffffffff, 0xb) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000280)={0xffffffffffffffff, 0xffffff8f, &(0x7f0000000300)}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000600)={0xffffffffffffffff, &(0x7f00000004c0)="648d1c6e4e7374f62b21f1c71a7cd05c41e2a0bf36f2f23f5761a39646321c3b5e4e670bd9a8f7a3fc36d594c1799d7dec6f0ba644a16abd532529ac63497998169000b2e491e82f659738895262b6fc9c79d8e6736c91136937b9", &(0x7f0000000540)="0c39cf9403045550ce39840a2a90ca20bc744608140dcd6c55d855533bb97417ef0cd19e1990bf245f0f38ab76b7f283d20500e75742ca4151b5489f5848a6b6104b0334b5427d07a3464ecffbfda64068c2d7ea6c230ba9040eebaec2030d19884f9f815ab793bd836fdb9c142a7aa9510939e2d3b5e6f57fa56f5464911bd939ca0ab0a1c19407fc9b1b974b94401f7c82bce0926bd5"}, 0x20) 2018/03/31 09:08:24 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x5, 0x100000000209e20, 0x8000000001, 0x5}, 0x2c) r1 = bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x13, 0x0, 0x7ffff9, 0x0, 0x20000003, 0x0}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xe, 0x0, 0x7f, 0x3e83, 0x8, r1, 0x80000000}, 0x2c) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x50, &(0x7f0000000140)={0x0, 0x0}}, 0x10) socket$kcm(0x29, 0x2, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) socketpair(0x4, 0x1, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r3, 0x2401, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000480)={r4, &(0x7f0000000440)="3068306ef4a0ff8256b6430a042a9b"}, 0x10) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40042409, 0x1) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r3) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x0, 0x8, 0x0, 0x0, r0, 0x6}, 0x2c) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x5, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = gettid() r7 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0xfff, 0x100000001, 0xfffffffffffffffb, 0x0, 0x8001, 0x0, 0x1, 0x0, 0xfffffffffffffff9, 0x0, 0x9, 0x9, 0x5, 0x8, 0x1, 0x8106, 0x0, 0x14000000000, 0x80000000, 0x1, 0x5, 0x0, 0x40, 0x2839, 0x1d, 0x800, 0x7, 0x0, 0x0, 0x5, 0x7, 0x0, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x4}, 0x0, 0x0, 0xff, 0x0, 0x3, 0x8, 0x3}, r6, 0x2, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=r2, 0x4) perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x3f, 0x1, 0xedf, 0xffffffff, 0x0, 0x7, 0x28, 0x6, 0x1ff, 0x8, 0x43, 0xa, 0x6, 0xfff, 0x2000000, 0xffff, 0x3629bd3b, 0x6, 0x0, 0x800, 0x401, 0xa73, 0xffffffffffffffff, 0x3, 0x81, 0x20, 0x1, 0x400, 0x0, 0x7e, 0xfff, 0x40, 0x4, 0x1, 0x80000001, 0x80000000, 0x0, 0x6, 0x7, @perf_config_ext={0x2, 0x8}, 0xc040, 0x7, 0x6, 0x5, 0x400, 0x8, 0xffffffffffffffed}, r6, 0x10, r5, 0x2) perf_event_open(&(0x7f00000003c0)={0x7, 0x70, 0x7fff, 0x5, 0x6, 0x8000, 0x0, 0x1000, 0x0, 0x7, 0x1000, 0x1, 0xffffffff, 0x3, 0xaf99, 0x40, 0x8001, 0xfffffffffffffffa, 0x1, 0x80000000, 0xe6d1, 0x4, 0x8001, 0x9, 0x1f, 0xfffffffffffffc00, 0x0, 0x0, 0x7ff, 0x15ac000000000000, 0x0, 0x3, 0x1, 0xfffffffffffffffe, 0x9, 0xff, 0x1, 0x2, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000002c0), 0x8}, 0x0, 0x3, 0x6, 0x1, 0x5, 0xb03c, 0x5}, r6, 0xc, r7, 0xb) bpf$MAP_CREATE(0x0, &(0x7f0000000640)={0x8, 0x6bcb8e63, 0x0, 0x59ad, 0x12, r0, 0x8001}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000880)={r0, &(0x7f0000000840), &(0x7f00000008c0)=""/70}, 0x375) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000280)={0xffffffffffffffff, 0xffffff8f, &(0x7f0000000300)}, 0x10) [ 364.562429] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000018 2018/03/31 09:08:25 executing program 7 (fault-call:26 fault-nth:3): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)={0xffffffffffffffff}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x0, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r5 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x0, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f00000009c0)={r4}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg(r3, &(0x7f0000000cc0)={&(0x7f0000000400)=@ethernet={0x1}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000580)="4589496d6a3bfcccae07dc729c52ee6bdf10d9cf221f605c25f790103018703b9a67491f96c3f9f8d07204ee4adf21acce1afdaedaba1228b4d33c3fa702a46b1329a0e52eea6a7908fd375ace47", 0x4e}], 0x1, &(0x7f0000000700), 0x0, 0x40000}, 0x4044080) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000740)={0xffffffffffffffff, &(0x7f0000000700)="ec1b815b5cc95d6e0dff859791e3341b8790dcb187f25418f8003a2b3bf345"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") close(0xffffffffffffffff) 2018/03/31 09:08:25 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x5, 0x100000000209e20, 0x8000000001, 0x5}, 0x2c) r1 = bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x13, 0x0, 0x7ffff9, 0x0, 0x20000003, 0x0}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xe, 0x0, 0x7f, 0x3e83, 0x8, r1, 0x80000000}, 0x2c) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x50, &(0x7f0000000140)={0x0, 0x0}}, 0x10) socket$kcm(0x29, 0x2, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) socketpair(0x4, 0x1, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000740)={r0, 0x28, &(0x7f0000000700)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={r5, 0xffffffffffffff87, 0x18}, 0xc) ioctl$PERF_EVENT_IOC_DISABLE(r3, 0x2401, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000480)={r4, &(0x7f0000000440)="3068306ef4a0ff8256b6430a042a9b"}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000006c0)={r1, &(0x7f0000000540)="1b81854b6cb98f5c16ea8f618a2db07c06a68df3ed6dfbff1172b9c90eef217bc453649449a0bf45eda0660bc65453ec3cae5adc7e3c548156461edb5529d88cc9b3c1ef00184a004990a71b9ebf6e349dd29938663eca9b242da232dd582f9cacdfc5ce17a708d85014d644a5bb772bfb4a237f0a078574a6939a23316ef7fc6a935c38a09e6af5135ac95f4ea4c4e7202e2a714c427dfaa36243296239862c46250b7ca99a51243cfc0d4d70b3cfc3433c7576d4493bf71fe15ca33fecffddcd0536bc515c4657bc0cbcfc412d86be3accb13fd7518cf3d7b213c19b3e571b09e304c5a1eb97", &(0x7f0000000680)=""/7}, 0x18) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40042409, 0x1) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r3) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x0, 0x8, 0x0, 0x0, r0, 0x6}, 0x2c) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE(0x0, &(0x7f0000000500)={0xb, 0x2, 0x3, 0xfffffffffffffffe, 0x7, r3, 0x1}, 0x2c) perf_event_open(&(0x7f000025c000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r7 = gettid() ioctl$PERF_EVENT_IOC_RESET(r6, 0x2403, 0x100000001) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f00000004c0)) r8 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0xfff, 0x100000001, 0xfffffffffffffffb, 0x0, 0x8001, 0x0, 0x1, 0x0, 0xfffffffffffffff9, 0x0, 0x9, 0x9, 0x5, 0x8, 0x1, 0x8106, 0x0, 0x14000000000, 0x80000000, 0x1, 0x5, 0x0, 0x40, 0x2839, 0x1d, 0x800, 0x7, 0x0, 0x0, 0x5, 0x7, 0x0, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x4}, 0x0, 0x0, 0xff, 0x0, 0x3, 0x8, 0x3}, r7, 0x2, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=r2, 0x4) perf_event_open(&(0x7f00000003c0)={0x7, 0x70, 0x7fff, 0x5, 0x6, 0x8000, 0x0, 0x1000, 0x0, 0x7, 0x1000, 0x1, 0xffffffff, 0x3, 0xaf99, 0x40, 0x8001, 0xfffffffffffffffa, 0x1, 0x80000000, 0xe6d1, 0x4, 0x8001, 0x9, 0x1f, 0xfffffffffffffc00, 0x0, 0x0, 0x7ff, 0x15ac000000000000, 0x0, 0x3, 0x1, 0xfffffffffffffffe, 0x9, 0xff, 0x1, 0x2, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000002c0), 0x8}, 0x0, 0x3, 0x6, 0x1, 0x5, 0xb03c, 0x5}, r7, 0xc, r8, 0xb) bpf$MAP_CREATE(0x0, &(0x7f0000000640)={0x8, 0x6bcb8e63, 0x0, 0x59ad, 0x12, r0, 0x8001}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000880)={r0, &(0x7f0000000840), &(0x7f00000008c0)=""/70}, 0x375) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000280)={0xffffffffffffffff, 0xffffff8f, &(0x7f0000000300)}, 0x10) 2018/03/31 09:08:25 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000a40)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x0, 0x0) socketpair(0x2, 0x0, 0x0, &(0x7f0000000640)={0xffffffffffffffff}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r6 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x0, 0x10000, 0x1182, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f00000009c0)={r4}) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000280)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000a00)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg(r3, &(0x7f0000000cc0)={&(0x7f0000000400)=@ethernet={0x1}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000580)="4589496d6a3bfcccae07dc729c52ee6bdf10d9cf221f605c25f790103018703b9a67491f96c3f9f8d07204ee4adf21acce1afdaedaba1228b4d33c3fa702a46b1329a0e52eea6a7908fd375ace47", 0x4e}], 0x1, &(0x7f0000000700), 0x0, 0x40000}, 0x4044080) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000740)={r5, &(0x7f0000000700)="ec1b815b5cc95d6e0dff859791e3341b8790dcb187f25418f8003a2b3bf345dc"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x0, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") close(0xffffffffffffffff) 2018/03/31 09:08:25 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)={0xffffffffffffffff}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x0, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r6 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f00000009c0)={r4}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) ioctl$PERF_EVENT_IOC_RESET(r4, 0x2403, 0x2) sendmsg(r3, &(0x7f0000000cc0)={&(0x7f0000000400)=@ethernet={0x1}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000580)="4589496d6a3bfcccae07dc729c52ee6bdf10d9cf221f605c25f790103018703b9a67491f96c3f9f8d07204ee4adf21acce1afdaedaba1228b4d33c3fa702a46b1329a0e52eea6a7908fd375ace47", 0x4e}], 0x1, &(0x7f0000000700), 0x0, 0x40000}, 0x4044080) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000280)={r5, &(0x7f0000000700)="ec1b815b5cc95d6e0dff859791e3341b"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)={0x3, 0x40000100, 0x56c96e7a, 0xea, 0x1, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") close(0xffffffffffffffff) 2018/03/31 09:08:25 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x5, 0x0, 0x0, 0x5}, 0x2c) r1 = bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x13, 0x0, 0x0, 0x0, 0x20000003, 0x0}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x3e83, 0x8, r1}, 0x2c) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x50, &(0x7f0000000140)={0x0, 0x0}}, 0x10) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, r2, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) socketpair(0x4, 0x1, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000480)={r5, &(0x7f0000000440)="3068306ef4a0ff8256b6430a042a9b"}, 0x10) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x0, 0x8, 0x0, 0x0, r0, 0x6}, 0x2c) socketpair(0x8, 0x2, 0x0, &(0x7f0000000040)) r6 = gettid() bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=r3, 0x4) perf_event_open(&(0x7f00000003c0)={0x7, 0x70, 0x7fff, 0x5, 0x6, 0x8000, 0x0, 0x1000, 0x0, 0x7, 0x1000, 0x1, 0xffffffff, 0x3, 0xaf99, 0x40, 0x8001, 0xfffffffffffffffa, 0x1, 0x80000000, 0xe6d1, 0x4, 0x8001, 0x9, 0x1f, 0xfffffffffffffc00, 0x0, 0x0, 0x7ff, 0x15ac000000000000, 0x0, 0x3, 0x1, 0xfffffffffffffffe, 0x9, 0xff, 0x1, 0x2, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000002c0)}, 0x8004, 0x3, 0x6, 0x1, 0x5, 0xb03c, 0x5}, r6, 0xc, 0xffffffffffffffff, 0xb) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000280)={0xffffffffffffffff, 0xffffff8f, &(0x7f0000000300)}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000600)={0xffffffffffffffff, &(0x7f00000004c0)="648d1c6e4e7374f62b21f1c71a7cd05c41e2a0bf36f2f23f5761a39646321c3b5e4e670bd9a8f7a3fc36d594c1799d7dec6f0ba644a16abd532529ac63497998169000b2e491e82f659738895262b6fc9c79d8e6736c91136937b9", &(0x7f0000000540)="0c39cf9403045550ce39840a2a90ca20bc744608140dcd6c55d855533bb97417ef0cd19e1990bf245f0f38ab76b7f283d20500e75742ca4151b5489f5848a6b6104b0334b5427d07a3464ecffbfda64068c2d7ea6c230ba9040eebaec2030d19884f9f815ab793bd836fdb9c142a7aa9510939e2d3b5e6f57fa56f5464911bd939ca0ab0a1c19407fc9b1b974b94401f7c82bce0926bd5"}, 0x20) 2018/03/31 09:08:25 executing program 1 (fault-call:20 fault-nth:25): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)={0xffffffffffffffff}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x0, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r5 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f00000009c0)={r4}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg(r3, &(0x7f0000000cc0)={&(0x7f0000000400)=@ethernet={0x1}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000580)="4589496d6a3bfcccae07dc729c52ee6bdf10d9cf221f605c25f790103018703b9a67491f96c3f9f8d07204ee4adf21acce1afdaedaba1228b4d33c3fa702a46b1329a0e52eea6a7908fd375ace47", 0x4e}], 0x1, &(0x7f0000000700), 0x0, 0x40000}, 0x4044080) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000740)={0xffffffffffffffff, &(0x7f0000000700)="ec1b815b5cc95d6e0dff859791e3341b8790dcb187f25418f8003a2b3bf345dc"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") close(0xffffffffffffffff) 2018/03/31 09:08:25 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x5, 0x100000000209e20, 0x8000000001, 0x5}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x13, 0x0, 0x7ffff9, 0x0, 0x20000003, 0x0}, 0x2c) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x0, 0x0, 0x7ffff9, 0x0, 0x20000003, 0x0}, 0x2c) 2018/03/31 09:08:25 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xf, 0x5, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x80000000}, [@map={0x18, 0x1, 0x1, 0x0, 0x1}], {0x95}}, &(0x7f0000000040)='syzkaller\x00', 0x3, 0x10, &(0x7f0000000080)=""/16, 0x41000, 0x2f3100a785778bd1}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000001c0)={r0, 0x50, &(0x7f0000000140)}, 0x10) close(r0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000780)={&(0x7f0000000240)=@ax25, 0x80, &(0x7f0000000600)=[{&(0x7f00000002c0)=""/114, 0x72}, {&(0x7f0000000340)=""/133, 0x85}, {&(0x7f0000000400)=""/23, 0x17}, {&(0x7f0000000440)=""/59, 0x3b}, {&(0x7f0000000480)=""/114, 0x72}, {&(0x7f0000000500)=""/45, 0x2d}, {&(0x7f0000000540)=""/83, 0x53}, {&(0x7f00000005c0)}], 0x8, &(0x7f0000000680)=""/214, 0xd6, 0x100}, 0x40) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000007c0)={0xffffffffffffffff}) recvmsg(r2, &(0x7f00000019c0)={&(0x7f0000000800)=@ax25, 0x80, &(0x7f00000018c0)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000001880)=""/18, 0x12}], 0x2, &(0x7f0000001900)=""/184, 0xb8, 0x3}, 0x1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001a80)={r4, 0x50, &(0x7f0000001a00)}, 0x10) r5 = perf_event_open(&(0x7f0000001b00)={0x2, 0x70, 0x6, 0x8, 0x80000000, 0x10001, 0x0, 0x7ff, 0x4, 0xa, 0x200, 0x20, 0x72, 0x5, 0x0, 0x0, 0x5, 0x8f, 0x9ed, 0xff, 0x0, 0xa58, 0x7f, 0xf2f, 0x4503, 0x6, 0x81, 0x5, 0x1ff, 0xffffffff00000000, 0x2, 0x5, 0x9000000000000, 0xfffffffffffffffa, 0x8, 0x10001, 0x731ab510, 0x9, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000001ac0), 0x1}, 0x80, 0x2b4, 0x200, 0x3, 0x6, 0x9, 0x4}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0x20000) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000001b80)) r6 = getpid() r7 = perf_event_open(&(0x7f0000001c00)={0x1, 0x70, 0x0, 0xfff, 0x4, 0x80000000, 0x0, 0x3, 0x40, 0xa, 0x7, 0x7, 0x7, 0x4800000000000000, 0x7, 0x6, 0x62b, 0x8, 0x9, 0x100000000, 0x1, 0x0, 0x5, 0xd199, 0x1f, 0x10000, 0xff80000000000000, 0x3, 0x4, 0x8, 0x80000001, 0x8000, 0x7fff, 0x4, 0x16, 0x7, 0x40, 0x8, 0x0, 0x5, 0x50031dd1e89e26d1, @perf_bp={&(0x7f0000001bc0), 0x2}, 0x10000, 0x3a, 0x80000001, 0x1, 0x2c, 0x3ff, 0x6}, r6, 0x6, r3, 0x3) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000001c80)=r0, 0x4) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000001cc0)) ioctl$PERF_EVENT_IOC_REFRESH(r7, 0x2402, 0xffffffff) r8 = perf_event_open(&(0x7f0000001d00)={0x0, 0x70, 0x7, 0x400, 0x100, 0xac, 0x0, 0x100000000, 0xc2800, 0xa, 0x33e3, 0x2, 0x10001, 0x8, 0x5, 0x100000001, 0x2e9, 0x2, 0xc1, 0xf2, 0x2, 0x9, 0xffff, 0x7, 0x1, 0x0, 0x8000, 0x800, 0xfffffffffffffffa, 0x40, 0x0, 0x3, 0x6, 0xfa4, 0x7, 0xffffffffffff8000, 0x0, 0x0, 0x0, 0x8000, 0x3, @perf_config_ext={0x400}, 0x100, 0xa264, 0x4, 0x7, 0x2, 0x1000, 0x92}, r6, 0x5, r7, 0x1) socketpair(0x7, 0x6, 0x1, &(0x7f0000001d80)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000001e00)={&(0x7f0000001dc0)='./file0\x00', r9}, 0x10) r10 = perf_event_open(&(0x7f0000001e40)={0x4, 0x70, 0x5, 0x4, 0x8, 0x6, 0x0, 0x2, 0x1425, 0xb, 0x0, 0xcc9, 0x400, 0x57f90db4, 0x80000000, 0x7, 0x1000, 0x0, 0x8, 0x8000, 0xffffffff, 0x400, 0x1, 0x6, 0x40, 0x2, 0x10000, 0x8, 0x9, 0xfffffffffffffff8, 0x9, 0x4, 0x3, 0x400, 0x3, 0x9, 0x3, 0x100, 0x0, 0x6, 0x0, @perf_config_ext={0x4, 0x2}, 0x20, 0x3ff, 0x0, 0x7, 0x3, 0x5, 0xfa5e}, r6, 0xd, r7, 0x2) bpf$OBJ_GET_MAP(0x7, &(0x7f0000001f00)={&(0x7f0000001ec0)='./file0\x00'}, 0x10) socketpair$inet6_sctp(0xa, 0x0, 0x84, &(0x7f0000001f40)) ioctl$PERF_EVENT_IOC_DISABLE(r10, 0x2401, 0xbad) r11 = perf_event_open(&(0x7f0000001fc0)={0x3, 0x70, 0xff, 0x2f, 0x2, 0x7, 0x0, 0x40, 0x80000, 0x1, 0x8, 0x6, 0xfffffffffffffffb, 0x7, 0x2, 0x10000, 0x6, 0x5, 0x0, 0x10, 0x6, 0xc58, 0x7f, 0x3, 0x2, 0x3, 0x5, 0x80000000800000, 0x7, 0xfff, 0x16, 0x2b65, 0x9, 0x69244395, 0x10000, 0x4, 0x9, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000001f80), 0x8}, 0x100, 0x8, 0x51b4, 0x4, 0x800, 0xb7, 0x4800}, r6, 0x8, r8, 0x1) r12 = gettid() socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000002040)) perf_event_open(&(0x7f0000002080)={0x0, 0x70, 0x100, 0x0, 0x2, 0x401, 0x0, 0x6, 0x1, 0x6, 0x656, 0x5, 0xfffffffffffff973, 0xffffffffffffffff, 0x9, 0x7, 0x3, 0x3ff, 0x1c000000, 0x10000, 0x6, 0x20, 0x6, 0x1, 0x1, 0x4, 0x2, 0x20, 0x9, 0xed5, 0x847, 0x1000, 0x0, 0x0, 0x102bed3b, 0x9, 0x7fffffff, 0x6, 0x0, 0x24, 0x0, @perf_config_ext={0x100000001, 0x6}, 0x200, 0x800000010000000, 0x7, 0x7, 0x1000, 0xf3, 0xe87}, r12, 0xf, r11, 0x8) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000002100)) perf_event_open(&(0x7f0000002180)={0x4, 0x70, 0x0, 0x8, 0xff, 0x0, 0x0, 0xfffffffffffffff9, 0x10001, 0x3, 0xffffffffffffff00, 0x93eb, 0x1, 0x4e5e, 0x8001, 0x0, 0x7, 0x1f4, 0x80000001, 0x99b, 0x4, 0x8, 0xed8, 0x3f, 0xec9, 0x6, 0x1, 0x4ab8, 0x8, 0x2, 0xdd, 0x9, 0xffffffffffffffff, 0x8000, 0x0, 0x6, 0xffff, 0x8, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000002140), 0xf}, 0x400, 0x5, 0x7, 0x4, 0x7, 0x4}, r12, 0x3, r7, 0x8) [ 364.755351] FAULT_INJECTION: forcing a failure. [ 364.755351] name failslab, interval 1, probability 0, space 0, times 0 [ 364.766690] CPU: 1 PID: 10385 Comm: syz-executor7 Not tainted 4.16.0-rc6+ #43 [ 364.773967] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 364.783313] Call Trace: [ 364.785891] dump_stack+0x194/0x24d [ 364.789500] ? arch_local_irq_restore+0x53/0x53 [ 364.794157] should_fail+0x8c0/0xa40 [ 364.797853] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 364.802940] ? lock_release+0xa40/0xa40 [ 364.806896] ? unwind_dump+0x4d0/0x4d0 [ 364.810774] ? find_held_lock+0x35/0x1d0 [ 364.814831] ? check_same_owner+0x320/0x320 [ 364.819137] ? rcu_note_context_switch+0x710/0x710 [ 364.824052] should_failslab+0xec/0x120 [ 364.828010] kmem_cache_alloc+0x47/0x760 [ 364.832063] getname_flags+0xcb/0x580 [ 364.835846] user_path_at_empty+0x2d/0x50 [ 364.839977] do_mount+0x15f/0x2bb0 [ 364.843501] ? copy_mount_string+0x40/0x40 [ 364.847717] ? rcu_pm_notify+0xc0/0xc0 [ 364.851591] ? copy_mount_options+0x5f/0x2e0 [ 364.855980] ? rcu_read_lock_sched_held+0x108/0x120 [ 364.860976] ? kmem_cache_alloc_trace+0x459/0x740 [ 364.865802] ? kasan_check_write+0x14/0x20 [ 364.870024] ? _copy_from_user+0x99/0x110 [ 364.874158] ? copy_mount_options+0x1f7/0x2e0 [ 364.878637] SyS_mount+0xab/0x120 [ 364.882067] ? copy_mnt_ns+0xb30/0xb30 [ 364.885934] do_syscall_64+0x281/0x940 [ 364.889800] ? vmalloc_sync_all+0x30/0x30 [ 364.893926] ? _raw_spin_unlock_irq+0x27/0x70 [ 364.898403] ? finish_task_switch+0x1c1/0x7e0 [ 364.902881] ? syscall_return_slowpath+0x550/0x550 [ 364.907792] ? syscall_return_slowpath+0x2ac/0x550 [ 364.912701] ? prepare_exit_to_usermode+0x350/0x350 [ 364.917698] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 364.923049] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 364.927877] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 364.933047] RIP: 0033:0x454e79 [ 364.936216] RSP: 002b:00007fd81e272c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 364.943906] RAX: ffffffffffffffda RBX: 00007fd81e2736d4 RCX: 0000000000454e79 [ 364.951156] RDX: 0000000020000780 RSI: 0000000020000ac0 RDI: 0000000020000000 [ 364.958406] RBP: 000000000072bea0 R08: 0000000020000b00 R09: 0000000000000000 [ 364.965654] R10: 0000000000037002 R11: 0000000000000246 R12: 0000000000000016 [ 364.972901] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000003 [ 365.008952] FAULT_INJECTION: forcing a failure. [ 365.008952] name failslab, interval 1, probability 0, space 0, times 0 [ 365.020293] CPU: 0 PID: 10396 Comm: syz-executor1 Not tainted 4.16.0-rc6+ #43 [ 365.027559] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 365.036903] Call Trace: [ 365.039497] dump_stack+0x194/0x24d [ 365.043128] ? arch_local_irq_restore+0x53/0x53 [ 365.047798] ? __save_stack_trace+0x7e/0xd0 [ 365.052126] should_fail+0x8c0/0xa40 [ 365.055840] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 365.060945] ? kasan_kmalloc+0xad/0xe0 [ 365.064830] ? kmem_cache_alloc_trace+0x136/0x740 [ 365.069666] ? __memcg_init_list_lru_node+0x169/0x270 [ 365.074857] ? __list_lru_init+0x544/0x750 [ 365.079095] ? sget_userns+0x6b1/0xe40 [ 365.082982] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 365.087735] ? do_mount+0xea4/0x2bb0 [ 365.091991] ? SyS_mount+0xab/0x120 [ 365.095603] ? do_syscall_64+0x281/0x940 [ 365.099641] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 365.104987] ? find_held_lock+0x35/0x1d0 [ 365.109034] ? __lock_is_held+0xb6/0x140 [ 365.113079] ? check_same_owner+0x320/0x320 [ 365.117392] ? rcu_note_context_switch+0x710/0x710 [ 365.122306] should_failslab+0xec/0x120 [ 365.126264] kmem_cache_alloc_trace+0x4b/0x740 [ 365.130839] ? __kmalloc_node+0x33/0x70 [ 365.134788] ? __kmalloc_node+0x33/0x70 [ 365.138736] ? rcu_read_lock_sched_held+0x108/0x120 [ 365.143727] __memcg_init_list_lru_node+0x169/0x270 [ 365.148720] ? list_lru_add+0x7c0/0x7c0 [ 365.152668] ? __kmalloc_node+0x47/0x70 [ 365.156630] __list_lru_init+0x544/0x750 [ 365.160668] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 365.166527] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 365.171521] ? lockdep_init_map+0x9/0x10 [ 365.175559] sget_userns+0x6b1/0xe40 [ 365.179248] ? set_anon_super+0x20/0x20 [ 365.183198] ? put_filp+0x90/0x90 [ 365.186624] ? destroy_unused_super.part.6+0xd0/0xd0 [ 365.191707] ? alloc_vfsmnt+0x762/0x9c0 [ 365.195669] ? path_lookupat+0x238/0xba0 [ 365.199704] ? mnt_free_id.isra.21+0x50/0x50 [ 365.204086] ? trace_hardirqs_off+0x10/0x10 [ 365.208394] ? putname+0xee/0x130 [ 365.211823] ? cap_capable+0x1b5/0x230 [ 365.215688] ? security_capable+0x8e/0xc0 [ 365.219821] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 365.224994] ? ns_capable_common+0xcf/0x160 [ 365.229293] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 365.234456] mount_ns+0x6d/0x190 [ 365.237807] rpc_mount+0x9e/0xd0 [ 365.241150] mount_fs+0x66/0x2d0 [ 365.244502] vfs_kern_mount.part.26+0xc6/0x4a0 [ 365.249072] ? may_umount+0xa0/0xa0 [ 365.252673] ? _raw_read_unlock+0x22/0x30 [ 365.256797] ? __get_fs_type+0x8a/0xc0 [ 365.260657] do_mount+0xea4/0x2bb0 [ 365.264172] ? __might_fault+0x110/0x1d0 [ 365.268209] ? copy_mount_string+0x40/0x40 [ 365.272426] ? check_same_owner+0x320/0x320 [ 365.276730] ? __check_object_size+0x8b/0x530 [ 365.281220] ? __might_sleep+0x95/0x190 [ 365.285179] ? kasan_check_write+0x14/0x20 [ 365.289396] ? _copy_from_user+0x99/0x110 [ 365.293518] ? memdup_user+0x5e/0x90 [ 365.297205] ? copy_mount_options+0x1f7/0x2e0 [ 365.301677] SyS_mount+0xab/0x120 [ 365.305114] ? copy_mnt_ns+0xb30/0xb30 [ 365.308985] do_syscall_64+0x281/0x940 [ 365.312852] ? vmalloc_sync_all+0x30/0x30 [ 365.316984] ? _raw_spin_unlock_irq+0x27/0x70 [ 365.321461] ? finish_task_switch+0x1c1/0x7e0 [ 365.325933] ? syscall_return_slowpath+0x550/0x550 [ 365.330837] ? syscall_return_slowpath+0x2ac/0x550 [ 365.335753] ? prepare_exit_to_usermode+0x350/0x350 [ 365.340745] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 365.346085] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 365.350923] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 365.356091] RIP: 0033:0x454e79 [ 365.359256] RSP: 002b:00007fed74635c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 365.366949] RAX: ffffffffffffffda RBX: 00007fed746366d4 RCX: 0000000000454e79 [ 365.374195] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 365.381439] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 365.388684] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000016 [ 365.395928] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000019 2018/03/31 09:08:26 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x5, 0x0, 0x0, 0x5}, 0x2c) r1 = bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x13, 0x0, 0x0, 0x0, 0x20000003, 0x0}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x3e83, 0x8, r1}, 0x2c) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x50, &(0x7f0000000140)={0x0, 0x0}}, 0x10) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, r2, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) socketpair(0x4, 0x1, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000480)={r5, &(0x7f0000000440)="3068306ef4a0ff8256b6430a042a9b"}, 0x10) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x0, 0x8, 0x0, 0x0, r0, 0x6}, 0x2c) socketpair(0x8, 0x2, 0x0, &(0x7f0000000040)) r6 = gettid() bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=r3, 0x4) perf_event_open(&(0x7f00000003c0)={0x7, 0x70, 0x7fff, 0x5, 0x6, 0x8000, 0x0, 0x1000, 0x0, 0x7, 0x1000, 0x1, 0xffffffff, 0x3, 0xaf99, 0x40, 0x8001, 0xfffffffffffffffa, 0x1, 0x80000000, 0xe6d1, 0x4, 0x8001, 0x9, 0x1f, 0xfffffffffffffc00, 0x0, 0x0, 0x7ff, 0x15ac000000000000, 0x0, 0x3, 0x1, 0xfffffffffffffffe, 0x9, 0xff, 0x1, 0x2, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000002c0)}, 0x8004, 0x3, 0x6, 0x1, 0x5, 0xb03c, 0x5}, r6, 0xc, 0xffffffffffffffff, 0xb) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000280)={0xffffffffffffffff, 0xffffff8f, &(0x7f0000000300)}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000600)={0xffffffffffffffff, &(0x7f00000004c0)="648d1c6e4e7374f62b21f1c71a7cd05c41e2a0bf36f2f23f5761a39646321c3b5e4e670bd9a8f7a3fc36d594c1799d7dec6f0ba644a16abd532529ac63497998169000b2e491e82f659738895262b6fc9c79d8e6736c91136937b9", &(0x7f0000000540)="0c39cf9403045550ce39840a2a90ca20bc744608140dcd6c55d855533bb97417ef0cd19e1990bf245f0f38ab76b7f283d20500e75742ca4151b5489f5848a6b6104b0334b5427d07a3464ecffbfda64068c2d7ea6c230ba9040eebaec2030d19884f9f815ab793bd836fdb9c142a7aa9510939e2d3b5e6f57fa56f5464911bd939ca0ab0a1c19407fc9b1b974b94401f7c82bce0926bd5"}, 0x20) 2018/03/31 09:08:26 executing program 7 (fault-call:26 fault-nth:4): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)={0xffffffffffffffff}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x0, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r5 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x0, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f00000009c0)={r4}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg(r3, &(0x7f0000000cc0)={&(0x7f0000000400)=@ethernet={0x1}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000580)="4589496d6a3bfcccae07dc729c52ee6bdf10d9cf221f605c25f790103018703b9a67491f96c3f9f8d07204ee4adf21acce1afdaedaba1228b4d33c3fa702a46b1329a0e52eea6a7908fd375ace47", 0x4e}], 0x1, &(0x7f0000000700), 0x0, 0x40000}, 0x4044080) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000740)={0xffffffffffffffff, &(0x7f0000000700)="ec1b815b5cc95d6e0dff859791e3341b8790dcb187f25418f8003a2b3bf345"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") close(0xffffffffffffffff) 2018/03/31 09:08:26 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)={0xffffffffffffffff}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x0, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r6 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f00000009c0)={r4}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) ioctl$PERF_EVENT_IOC_RESET(r4, 0x2403, 0x2) sendmsg(r3, &(0x7f0000000cc0)={&(0x7f0000000400)=@ethernet={0x1}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000580)="4589496d6a3bfcccae07dc729c52ee6bdf10d9cf221f605c25f790103018703b9a67491f96c3f9f8d07204ee4adf21acce1afdaedaba1228b4d33c3fa702a46b1329a0e52eea6a7908fd375ace47", 0x4e}], 0x1, &(0x7f0000000700), 0x0, 0x40000}, 0x4044080) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000280)={r5, &(0x7f0000000700)="ec1b815b5cc95d6e0dff859791e3341b"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)={0x3, 0x40000100, 0x56c96e7a, 0xea, 0x1, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") close(0xffffffffffffffff) 2018/03/31 09:08:26 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x5, 0x100000000209e20, 0x8000000001, 0x5}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x13, 0x0, 0x7ffff9, 0x0, 0x20000003, 0x0}, 0x2c) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x13, 0x0, 0x0, 0x0, 0x20000003, 0x0}, 0x2c) 2018/03/31 09:08:26 executing program 1 (fault-call:20 fault-nth:26): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)={0xffffffffffffffff}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x0, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r5 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f00000009c0)={r4}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg(r3, &(0x7f0000000cc0)={&(0x7f0000000400)=@ethernet={0x1}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000580)="4589496d6a3bfcccae07dc729c52ee6bdf10d9cf221f605c25f790103018703b9a67491f96c3f9f8d07204ee4adf21acce1afdaedaba1228b4d33c3fa702a46b1329a0e52eea6a7908fd375ace47", 0x4e}], 0x1, &(0x7f0000000700), 0x0, 0x40000}, 0x4044080) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000740)={0xffffffffffffffff, &(0x7f0000000700)="ec1b815b5cc95d6e0dff859791e3341b8790dcb187f25418f8003a2b3bf345dc"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") close(0xffffffffffffffff) 2018/03/31 09:08:26 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000a40)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x0, 0x0) socketpair(0x2, 0x0, 0x0, &(0x7f0000000640)={0xffffffffffffffff}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r6 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x0, 0x10000, 0x1182, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f00000009c0)={r4}) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000280)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000a00)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg(r3, &(0x7f0000000cc0)={&(0x7f0000000400)=@ethernet={0x1}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000580)="4589496d6a3bfcccae07dc729c52ee6bdf10d9cf221f605c25f790103018703b9a67491f96c3f9f8d07204ee4adf21acce1afdaedaba1228b4d33c3fa702a46b1329a0e52eea6a7908fd375ace47", 0x4e}], 0x1, &(0x7f0000000700), 0x0, 0x40000}, 0x4044080) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000740)={r5, &(0x7f0000000700)="ec1b815b5cc95d6e0dff859791e3341b8790dcb187f25418f8003a2b3bf345dc"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x0, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") close(0xffffffffffffffff) 2018/03/31 09:08:26 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x5, 0x100000000209e20, 0x8000000001, 0x5}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x13, 0x0, 0x7ffff9, 0x0, 0x20000003, 0x0}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xe, 0x0, 0x7f, 0x3e83, 0x8, r0, 0x1f}, 0x2c) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x50, &(0x7f0000000140)={0x0, 0x0}}, 0x10) socket$kcm(0x29, 0x2, 0x0) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) socketpair(0x4, 0x1, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={r2, 0x50, &(0x7f0000000780)}, 0x10) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r3, 0x2401, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000480)={r4, &(0x7f0000000440)="3068306ef4a0ff8256b6430a042a9b"}, 0x10) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40042409, 0x1) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r3) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x0, 0x8, 0x0, 0x0, r0, 0x6}, 0x2c) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)) perf_event_open(&(0x7f000025c000)={0x5, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = gettid() r7 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0xfff, 0x100000001, 0xfffffffffffffffb, 0x0, 0x8001, 0x0, 0x1, 0x0, 0xfffffffffffffff9, 0x0, 0x9, 0x9, 0x5, 0x8, 0x1, 0x8106, 0x0, 0x14000000000, 0x80000000, 0x1, 0x5, 0x0, 0x40, 0x2839, 0x1d, 0x800, 0x7, 0x0, 0x0, 0x5, 0x7, 0x0, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x4}, 0x0, 0x0, 0xff, 0x0, 0x3, 0x8, 0x3}, r6, 0x2, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=r1, 0x4) perf_event_open(&(0x7f00000003c0)={0x7, 0x70, 0x7fff, 0x5, 0x6, 0x6, 0x0, 0x400000001000, 0x0, 0xb, 0x1000, 0x3, 0xffffffff, 0x1002, 0x4000af99, 0x40, 0x8001, 0xfffffffffffffffa, 0x1, 0x80000000, 0xe6d1, 0x4, 0x8001, 0x9, 0x1f, 0xfffffffffffffc00, 0x0, 0x0, 0xffffffffffffff50, 0x15ac000000000000, 0x0, 0x3, 0x1, 0xfffffffffffffffe, 0x9, 0xff, 0x1, 0x2, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000002c0), 0x8}, 0x0, 0xa2d2, 0x6, 0x1, 0x5, 0xb03c, 0x5}, r6, 0xc, r7, 0x9) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)={0x8, 0x6bcb8e63, 0x0, 0x59ad, 0x12, r0, 0x8001}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000880)={r0, &(0x7f0000000840), &(0x7f00000008c0)=""/70}, 0x375) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000280)={0xffffffffffffffff, 0xffffff8f, &(0x7f0000000300)}, 0x10) recvmsg$kcm(r3, &(0x7f00000011c0)={&(0x7f0000000f40)=@can={0x0, 0x0}, 0x80, &(0x7f00000010c0)=[{&(0x7f0000000fc0)=""/223, 0xdf}], 0x1, &(0x7f0000001100)=""/184, 0xb8, 0xfffffffffffeffff}, 0x40002042) ioctl$PERF_EVENT_IOC_SET_BPF(r8, 0x40042408, r3) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0xf, 0xa, &(0x7f0000000540)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x6}, @jmp={0x5, 0x5, 0x3, 0x6, 0x0, 0x158, 0x1}, @jmp={0x5, 0x5, 0x6, 0xb, 0x2, 0x4, 0xffffffffffffffff}, @map={0x18, 0xb, 0x1, 0x0, r5}, @alu={0x4, 0x8, 0xb, 0xd, 0x9, 0x16, 0xffffffffffffffff}], &(0x7f00000005c0)='syzkaller\x00', 0x1, 0xe0, &(0x7f0000000680)=""/224, 0x41f00, 0x1, [], r9}, 0x48) 2018/03/31 09:08:26 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xf, 0x5, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x80000000}, [@map={0x18, 0x1, 0x1, 0x0, 0x1}], {0x95}}, &(0x7f0000000040)='syzkaller\x00', 0x3, 0x10, &(0x7f0000000080)=""/16, 0x41000, 0x2f3100a785778bd1}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000001c0)={r0, 0x50, &(0x7f0000000140)}, 0x10) close(r0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000780)={&(0x7f0000000240)=@ax25, 0x80, &(0x7f0000000600)=[{&(0x7f00000002c0)=""/114, 0x72}, {&(0x7f0000000340)=""/133, 0x85}, {&(0x7f0000000400)=""/23, 0x17}, {&(0x7f0000000440)=""/59, 0x3b}, {&(0x7f0000000480)=""/114, 0x72}, {&(0x7f0000000500)=""/45, 0x2d}, {&(0x7f0000000540)=""/83, 0x53}, {&(0x7f00000005c0)}], 0x8, &(0x7f0000000680)=""/214, 0xd6, 0x100}, 0x40) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000007c0)={0xffffffffffffffff}) recvmsg(r2, &(0x7f00000019c0)={&(0x7f0000000800)=@ax25, 0x80, &(0x7f00000018c0)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000001880)=""/18, 0x12}], 0x2, &(0x7f0000001900)=""/184, 0xb8, 0x3}, 0x1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001a80)={r4, 0x50, &(0x7f0000001a00)}, 0x10) r5 = perf_event_open(&(0x7f0000001b00)={0x2, 0x70, 0x6, 0x8, 0x80000000, 0x10001, 0x0, 0x7ff, 0x4, 0xa, 0x200, 0x20, 0x72, 0x5, 0x0, 0x0, 0x5, 0x8f, 0x9ed, 0xff, 0x0, 0xa58, 0x7f, 0xf2f, 0x4503, 0x6, 0x81, 0x5, 0x1ff, 0xffffffff00000000, 0x2, 0x5, 0x9000000000000, 0xfffffffffffffffa, 0x8, 0x10001, 0x731ab510, 0x9, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000001ac0), 0x1}, 0x80, 0x2b4, 0x200, 0x3, 0x6, 0x9, 0x4}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0x20000) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000001b80)) r6 = getpid() r7 = perf_event_open(&(0x7f0000001c00)={0x1, 0x70, 0x0, 0xfff, 0x4, 0x80000000, 0x0, 0x3, 0x40, 0xa, 0x7, 0x7, 0x7, 0x4800000000000000, 0x7, 0x6, 0x62b, 0x8, 0x9, 0x100000000, 0x1, 0x0, 0x5, 0xd199, 0x1f, 0x10000, 0xff80000000000000, 0x3, 0x4, 0x8, 0x80000001, 0x8000, 0x7fff, 0x4, 0x16, 0x7, 0x40, 0x8, 0x0, 0x5, 0x50031dd1e89e26d1, @perf_bp={&(0x7f0000001bc0), 0x2}, 0x10000, 0x3a, 0x80000001, 0x1, 0x2c, 0x3ff, 0x6}, r6, 0x6, r3, 0x3) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000001c80)=r0, 0x4) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000001cc0)) ioctl$PERF_EVENT_IOC_REFRESH(r7, 0x2402, 0xffffffff) r8 = perf_event_open(&(0x7f0000001d00)={0x0, 0x70, 0x7, 0x400, 0x100, 0xac, 0x0, 0x100000000, 0xc2800, 0xa, 0x33e3, 0x2, 0x10001, 0x8, 0x5, 0x100000001, 0x2e9, 0x2, 0xc1, 0xf2, 0x2, 0x9, 0xffff, 0x7, 0x1, 0x0, 0x8000, 0x800, 0xfffffffffffffffa, 0x40, 0x0, 0x3, 0x6, 0xfa4, 0x7, 0xffffffffffff8000, 0x0, 0x0, 0x0, 0x8000, 0x3, @perf_config_ext={0x400}, 0x100, 0xa264, 0x4, 0x7, 0x2, 0x1000, 0x92}, r6, 0x5, r7, 0x1) socketpair(0x7, 0x6, 0x1, &(0x7f0000001d80)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000001e00)={&(0x7f0000001dc0)='./file0\x00', r9}, 0x10) r10 = perf_event_open(&(0x7f0000001e40)={0x4, 0x70, 0x5, 0x4, 0x8, 0x6, 0x0, 0x2, 0x1425, 0xb, 0x0, 0xcc9, 0x400, 0x57f90db4, 0x80000000, 0x7, 0x1000, 0x0, 0x8, 0x8000, 0xffffffff, 0x400, 0x1, 0x6, 0x40, 0x2, 0x10000, 0x8, 0x9, 0xfffffffffffffff8, 0x9, 0x4, 0x3, 0x400, 0x3, 0x9, 0x3, 0x100, 0x0, 0x6, 0x0, @perf_config_ext={0x4, 0x2}, 0x20, 0x3ff, 0x0, 0x7, 0x3, 0x5, 0xfa5e}, r6, 0xd, r7, 0x2) bpf$OBJ_GET_MAP(0x7, &(0x7f0000001f00)={&(0x7f0000001ec0)='./file0\x00'}, 0x10) socketpair$inet6_sctp(0xa, 0x0, 0x84, &(0x7f0000001f40)) ioctl$PERF_EVENT_IOC_DISABLE(r10, 0x2401, 0xbad) r11 = perf_event_open(&(0x7f0000001fc0)={0x3, 0x70, 0xff, 0x2f, 0x2, 0x7, 0x0, 0x40, 0x80000, 0x1, 0x8, 0x6, 0xfffffffffffffffb, 0x7, 0x2, 0x10000, 0x6, 0x5, 0x0, 0x10, 0x6, 0xc58, 0x7f, 0x3, 0x2, 0x3, 0x5, 0x80000000800000, 0x7, 0xfff, 0x16, 0x2b65, 0x9, 0x69244395, 0x10000, 0x4, 0x9, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000001f80), 0x8}, 0x100, 0x8, 0x51b4, 0x4, 0x800, 0xb7, 0x4800}, r6, 0x8, r8, 0x1) r12 = gettid() socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000002040)) perf_event_open(&(0x7f0000002080)={0x0, 0x70, 0x100, 0x0, 0x2, 0x401, 0x0, 0x6, 0x1, 0x6, 0x656, 0x5, 0xfffffffffffff973, 0xffffffffffffffff, 0x9, 0x7, 0x3, 0x3ff, 0x1c000000, 0x10000, 0x6, 0x20, 0x6, 0x1, 0x1, 0x4, 0x2, 0x20, 0x9, 0xed5, 0x847, 0x1000, 0x0, 0x0, 0x102bed3b, 0x9, 0x7fffffff, 0x6, 0x0, 0x24, 0x0, @perf_config_ext={0x100000001, 0x6}, 0x200, 0x800000010000000, 0x7, 0x7, 0x1000, 0xf3, 0xe87}, r12, 0xf, r11, 0x8) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000002100)) perf_event_open(&(0x7f0000002180)={0x4, 0x70, 0x0, 0x8, 0xff, 0x0, 0x0, 0xfffffffffffffff9, 0x10001, 0x3, 0xffffffffffffff00, 0x93eb, 0x1, 0x4e5e, 0x8001, 0x0, 0x7, 0x1f4, 0x80000001, 0x99b, 0x4, 0x8, 0xed8, 0x3f, 0xec9, 0x6, 0x1, 0x4ab8, 0x8, 0x2, 0xdd, 0x9, 0xffffffffffffffff, 0x8000, 0x0, 0x6, 0xffff, 0x8, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000002140), 0xf}, 0x400, 0x5, 0x7, 0x4, 0x7, 0x4}, r12, 0x3, r7, 0x8) [ 365.559124] FAULT_INJECTION: forcing a failure. [ 365.559124] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 365.570963] CPU: 0 PID: 10415 Comm: syz-executor7 Not tainted 4.16.0-rc6+ #43 [ 365.578234] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 365.587679] Call Trace: [ 365.590253] dump_stack+0x194/0x24d [ 365.593862] ? arch_local_irq_restore+0x53/0x53 [ 365.598517] should_fail+0x8c0/0xa40 [ 365.602216] ? perf_trace_lock_acquire+0xe3/0x980 [ 365.607044] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 365.612130] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 365.617302] ? perf_trace_lock+0x900/0x900 [ 365.621517] ? print_irqtrace_events+0x270/0x270 [ 365.626252] ? trace_hardirqs_off+0x10/0x10 [ 365.630554] ? lock_acquire+0x1d5/0x580 [ 365.634513] ? perf_trace_lock_acquire+0xe3/0x980 [ 365.639345] ? perf_trace_lock+0x900/0x900 [ 365.643563] ? should_fail+0x23b/0xa40 [ 365.647434] __alloc_pages_nodemask+0x327/0xdd0 [ 365.652083] ? lock_release+0xa40/0xa40 [ 365.656041] ? __alloc_pages_slowpath+0x2d10/0x2d10 [ 365.661041] ? find_held_lock+0x35/0x1d0 [ 365.665098] ? check_same_owner+0x320/0x320 [ 365.669405] cache_grow_begin+0x72/0x640 [ 365.673450] kmem_cache_alloc+0x400/0x760 [ 365.677579] ? map_files_get_link+0x3a0/0x3a0 [ 365.682058] getname_flags+0xcb/0x580 [ 365.685841] user_path_at_empty+0x2d/0x50 [ 365.689970] do_mount+0x15f/0x2bb0 [ 365.693495] ? copy_mount_string+0x40/0x40 [ 365.697711] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 365.702708] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 365.707453] ? retint_kernel+0x10/0x10 [ 365.711329] ? copy_mount_options+0x175/0x2e0 [ 365.715804] ? copy_mount_options+0x1f7/0x2e0 [ 365.720280] SyS_mount+0xab/0x120 [ 365.723713] ? copy_mnt_ns+0xb30/0xb30 [ 365.727579] do_syscall_64+0x281/0x940 [ 365.731443] ? vmalloc_sync_all+0x30/0x30 [ 365.735571] ? _raw_spin_unlock_irq+0x27/0x70 [ 365.740045] ? finish_task_switch+0x1c1/0x7e0 [ 365.744521] ? syscall_return_slowpath+0x550/0x550 [ 365.749430] ? syscall_return_slowpath+0x2ac/0x550 [ 365.754338] ? prepare_exit_to_usermode+0x350/0x350 [ 365.759334] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 365.764680] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 365.769509] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 365.774675] RIP: 0033:0x454e79 [ 365.777844] RSP: 002b:00007fd81e272c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 365.785530] RAX: ffffffffffffffda RBX: 00007fd81e2736d4 RCX: 0000000000454e79 [ 365.792780] RDX: 0000000020000780 RSI: 0000000020000ac0 RDI: 0000000020000000 [ 365.800031] RBP: 000000000072bea0 R08: 0000000020000b00 R09: 0000000000000000 2018/03/31 09:08:26 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x0, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) ioctl$PERF_EVENT_IOC_RESET(r5, 0x2403, 0x2) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f00000009c0)={r4}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) ioctl$PERF_EVENT_IOC_RESET(r4, 0x2403, 0x2) sendmsg(r3, &(0x7f0000000cc0)={&(0x7f0000000400)=@ethernet={0x1}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000580)="4589496d6a3bfcccae07dc729c52ee6bdf10d9cf221f605c25f790103018703b9a67491f96c3f9f8d07204ee4adf21acce1afdaedaba1228b4d33c3fa702a46b1329a0e52eea6a7908fd375ace47", 0x4e}], 0x1, &(0x7f0000000700), 0x0, 0x40000}, 0x4044080) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000280)={r6, &(0x7f0000000700)="ec1b815b5cc95d6e0dff859791e3341b"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)={0x3, 0x40000100, 0x56c96e7a, 0xea, 0x1, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") close(0xffffffffffffffff) 2018/03/31 09:08:26 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x5, 0x0, 0x0, 0x5}, 0x2c) r1 = bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x13, 0x0, 0x0, 0x0, 0x20000003, 0x0}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x3e83, 0x8, r1}, 0x2c) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x50, &(0x7f0000000140)={0x0, 0x0}}, 0x10) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, r2, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) socketpair(0x4, 0x1, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000480)={r5, &(0x7f0000000440)="3068306ef4a0ff8256b6430a042a9b"}, 0x10) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x0, 0x8, 0x0, 0x0, r0, 0x6}, 0x2c) socketpair(0x8, 0x2, 0x0, &(0x7f0000000040)) r6 = gettid() bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=r3, 0x4) perf_event_open(&(0x7f00000003c0)={0x7, 0x70, 0x7fff, 0x5, 0x6, 0x8000, 0x0, 0x1000, 0x0, 0x7, 0x1000, 0x1, 0xffffffff, 0x3, 0xaf99, 0x40, 0x8001, 0xfffffffffffffffa, 0x1, 0x80000000, 0xe6d1, 0x4, 0x8001, 0x9, 0x1f, 0xfffffffffffffc00, 0x0, 0x0, 0x7ff, 0x15ac000000000000, 0x0, 0x3, 0x1, 0xfffffffffffffffe, 0x9, 0xff, 0x1, 0x2, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000002c0), 0x8}, 0x0, 0x3, 0x6, 0x1, 0x5, 0xb03c, 0x5}, r6, 0xc, 0xffffffffffffffff, 0xb) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000280)={0xffffffffffffffff, 0xffffff8f, &(0x7f0000000300)}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000600)={0xffffffffffffffff, &(0x7f00000004c0)="648d1c6e4e7374f62b21f1c71a7cd05c41e2a0bf36f2f23f5761a39646321c3b5e4e670bd9a8f7a3fc36d594c1799d7dec6f0ba644a16abd532529ac63497998169000b2e491e82f659738895262b6fc9c79d8e6736c91136937b9", &(0x7f0000000540)="0c39cf9403045550ce39840a2a90ca20bc744608140dcd6c55d855533bb97417ef0cd19e1990bf245f0f38ab76b7f283d20500e75742ca4151b5489f5848a6b6104b0334b5427d07a3464ecffbfda64068c2d7ea6c230ba9040eebaec2030d19884f9f815ab793bd836fdb9c142a7aa9510939e2d3b5e6f57fa56f5464911bd939ca0ab0a1c19407fc9b1b974b94401f7c82bce0926bd5"}, 0x20) [ 365.807279] R10: 0000000000037002 R11: 0000000000000246 R12: 0000000000000016 [ 365.814527] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000004 [ 365.828782] FAULT_INJECTION: forcing a failure. [ 365.828782] name failslab, interval 1, probability 0, space 0, times 0 [ 365.840192] CPU: 0 PID: 10431 Comm: syz-executor1 Not tainted 4.16.0-rc6+ #43 [ 365.847467] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 365.856827] Call Trace: 2018/03/31 09:08:26 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xf, 0x5, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x80000000}, [@map={0x18, 0x1, 0x1, 0x0, 0x1}], {0x95}}, &(0x7f0000000040)='syzkaller\x00', 0x3, 0x10, &(0x7f0000000080)=""/16, 0x41000, 0x2f3100a785778bd1}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000001c0)={r0, 0x50, &(0x7f0000000140)}, 0x10) close(r0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000780)={&(0x7f0000000240)=@ax25, 0x80, &(0x7f0000000600)=[{&(0x7f00000002c0)=""/114, 0x72}, {&(0x7f0000000340)=""/133, 0x85}, {&(0x7f0000000400)=""/23, 0x17}, {&(0x7f0000000440)=""/59, 0x3b}, {&(0x7f0000000480)=""/114, 0x72}, {&(0x7f0000000500)=""/45, 0x2d}, {&(0x7f0000000540)=""/83, 0x53}, {&(0x7f00000005c0)}], 0x8, &(0x7f0000000680)=""/214, 0xd6, 0x100}, 0x40) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000007c0)={0xffffffffffffffff}) recvmsg(r2, &(0x7f00000019c0)={&(0x7f0000000800)=@ax25, 0x80, &(0x7f00000018c0)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000001880)=""/18, 0x12}], 0x2, &(0x7f0000001900)=""/184, 0xb8, 0x3}, 0x1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001a80)={r4, 0x50, &(0x7f0000001a00)}, 0x10) r5 = perf_event_open(&(0x7f0000001b00)={0x2, 0x70, 0x6, 0x8, 0x80000000, 0x10001, 0x0, 0x7ff, 0x4, 0xa, 0x200, 0x20, 0x72, 0x5, 0x0, 0x0, 0x5, 0x8f, 0x9ed, 0xff, 0x0, 0xa58, 0x7f, 0xf2f, 0x4503, 0x6, 0x81, 0x5, 0x1ff, 0xffffffff00000000, 0x2, 0x5, 0x9000000000000, 0xfffffffffffffffa, 0x8, 0x10001, 0x731ab510, 0x9, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000001ac0), 0x1}, 0x80, 0x2b4, 0x200, 0x3, 0x6, 0x9, 0x4}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0x20000) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000001b80)) r6 = getpid() r7 = perf_event_open(&(0x7f0000001c00)={0x1, 0x70, 0x0, 0xfff, 0x4, 0x80000000, 0x0, 0x3, 0x40, 0xa, 0x7, 0x7, 0x7, 0x4800000000000000, 0x7, 0x6, 0x62b, 0x8, 0x9, 0x100000000, 0x1, 0x0, 0x5, 0xd199, 0x1f, 0x10000, 0xff80000000000000, 0x3, 0x4, 0x8, 0x80000001, 0x8000, 0x7fff, 0x4, 0x16, 0x7, 0x40, 0x8, 0x0, 0x5, 0x50031dd1e89e26d1, @perf_bp={&(0x7f0000001bc0), 0x2}, 0x10000, 0x3a, 0x80000001, 0x1, 0x2c, 0x3ff, 0x6}, r6, 0x6, r3, 0x3) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000001c80)=r0, 0x4) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000001cc0)) ioctl$PERF_EVENT_IOC_REFRESH(r7, 0x2402, 0xffffffff) r8 = perf_event_open(&(0x7f0000001d00)={0x0, 0x70, 0x7, 0x400, 0x100, 0xac, 0x0, 0x100000000, 0xc2800, 0xa, 0x33e3, 0x2, 0x10001, 0x8, 0x5, 0x100000001, 0x2e9, 0x2, 0xc1, 0xf2, 0x2, 0x9, 0xffff, 0x7, 0x1, 0x0, 0x8000, 0x800, 0xfffffffffffffffa, 0x40, 0x0, 0x3, 0x6, 0xfa4, 0x7, 0xffffffffffff8000, 0x0, 0x0, 0x0, 0x8000, 0x3, @perf_config_ext={0x400}, 0x100, 0xa264, 0x4, 0x7, 0x2, 0x1000, 0x92}, r6, 0x5, r7, 0x1) socketpair(0x7, 0x6, 0x1, &(0x7f0000001d80)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000001e00)={&(0x7f0000001dc0)='./file0\x00', r9}, 0x10) r10 = perf_event_open(&(0x7f0000001e40)={0x4, 0x70, 0x5, 0x4, 0x8, 0x6, 0x0, 0x2, 0x1425, 0xb, 0x0, 0xcc9, 0x400, 0x57f90db4, 0x80000000, 0x7, 0x1000, 0x0, 0x8, 0x8000, 0xffffffff, 0x400, 0x1, 0x6, 0x40, 0x2, 0x10000, 0x8, 0x9, 0xfffffffffffffff8, 0x9, 0x4, 0x3, 0x400, 0x3, 0x9, 0x3, 0x100, 0x0, 0x6, 0x0, @perf_config_ext={0x4, 0x2}, 0x20, 0x3ff, 0x0, 0x7, 0x3, 0x5, 0xfa5e}, r6, 0xd, r7, 0x2) bpf$OBJ_GET_MAP(0x7, &(0x7f0000001f00)={&(0x7f0000001ec0)='./file0\x00'}, 0x10) socketpair$inet6_sctp(0xa, 0x0, 0x84, &(0x7f0000001f40)) ioctl$PERF_EVENT_IOC_DISABLE(r10, 0x2401, 0xbad) r11 = perf_event_open(&(0x7f0000001fc0)={0x3, 0x70, 0xff, 0x2f, 0x2, 0x7, 0x0, 0x40, 0x80000, 0x1, 0x8, 0x6, 0xfffffffffffffffb, 0x7, 0x2, 0x10000, 0x6, 0x5, 0x0, 0x10, 0x6, 0xc58, 0x7f, 0x3, 0x2, 0x3, 0x5, 0x80000000800000, 0x7, 0xfff, 0x16, 0x2b65, 0x9, 0x69244395, 0x10000, 0x4, 0x9, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000001f80), 0x8}, 0x100, 0x8, 0x51b4, 0x4, 0x800, 0xb7, 0x4800}, r6, 0x8, r8, 0x1) r12 = gettid() socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000002040)) perf_event_open(&(0x7f0000002080)={0x0, 0x70, 0x100, 0x0, 0x2, 0x401, 0x0, 0x6, 0x1, 0x6, 0x656, 0x5, 0xfffffffffffff973, 0xffffffffffffffff, 0x9, 0x7, 0x3, 0x3ff, 0x1c000000, 0x10000, 0x6, 0x20, 0x6, 0x1, 0x1, 0x4, 0x2, 0x20, 0x9, 0xed5, 0x847, 0x1000, 0x0, 0x0, 0x102bed3b, 0x9, 0x7fffffff, 0x6, 0x0, 0x24, 0x0, @perf_config_ext={0x100000001, 0x6}, 0x200, 0x800000010000000, 0x7, 0x7, 0x1000, 0xf3, 0xe87}, r12, 0xf, r11, 0x8) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000002100)) perf_event_open(&(0x7f0000002180)={0x4, 0x70, 0x0, 0x8, 0xff, 0x0, 0x0, 0xfffffffffffffff9, 0x10001, 0x3, 0xffffffffffffff00, 0x93eb, 0x1, 0x4e5e, 0x8001, 0xfffffffffffffff8, 0x0, 0x1f4, 0x80000001, 0x99b, 0x4, 0x8, 0xed8, 0x3f, 0xec9, 0x6, 0x1, 0x4ab8, 0x8, 0x2, 0xdd, 0x9, 0xffffffffffffffff, 0x8000, 0x0, 0x6, 0xffff, 0x8, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000002140), 0xf}, 0x400, 0x5, 0x7, 0x4, 0x7, 0x4}, r12, 0x3, r7, 0x8) [ 365.859421] dump_stack+0x194/0x24d [ 365.863059] ? arch_local_irq_restore+0x53/0x53 [ 365.867735] ? __save_stack_trace+0x7e/0xd0 [ 365.872070] should_fail+0x8c0/0xa40 [ 365.875793] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 365.880906] ? kasan_kmalloc+0xad/0xe0 [ 365.884793] ? kmem_cache_alloc_trace+0x136/0x740 [ 365.889628] ? __memcg_init_list_lru_node+0x169/0x270 [ 365.894812] ? __list_lru_init+0x544/0x750 [ 365.899054] ? sget_userns+0x6b1/0xe40 [ 365.902948] ? vfs_kern_mount.part.26+0xc6/0x4a0 2018/03/31 09:08:26 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xf, 0x5, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x80000000}, [@map={0x18, 0x1, 0x1, 0x0, 0x1}], {0x95}}, &(0x7f0000000040)='syzkaller\x00', 0x3, 0x10, &(0x7f0000000080)=""/16, 0x41000, 0x2f3100a785778bd1}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000001c0)={r0, 0x50, &(0x7f0000000140)}, 0x10) close(r0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000780)={&(0x7f0000000240)=@ax25, 0x80, &(0x7f0000000600)=[{&(0x7f00000002c0)=""/114, 0x72}, {&(0x7f0000000340)=""/133, 0x85}, {&(0x7f0000000400)=""/23, 0x17}, {&(0x7f0000000440)=""/59, 0x3b}, {&(0x7f0000000480)=""/114, 0x72}, {&(0x7f0000000500)=""/45, 0x2d}, {&(0x7f0000000540)=""/83, 0x53}, {&(0x7f00000005c0)}], 0x8, &(0x7f0000000680)=""/214, 0xd6, 0x100}, 0x40) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000007c0)={0xffffffffffffffff}) recvmsg(r2, &(0x7f00000019c0)={&(0x7f0000000800)=@ax25, 0x80, &(0x7f00000018c0)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000001880)=""/18, 0x12}], 0x2, &(0x7f0000001900)=""/184, 0xb8, 0x3}, 0x1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001a80)={r4, 0x50, &(0x7f0000001a00)}, 0x10) r5 = perf_event_open(&(0x7f0000001b00)={0x2, 0x70, 0x6, 0x8, 0x80000000, 0x10001, 0x0, 0x7ff, 0x4, 0xa, 0x200, 0x20, 0x72, 0x5, 0x0, 0x0, 0x5, 0x8f, 0x9ed, 0xff, 0x0, 0xa58, 0x7f, 0xf2f, 0x4503, 0x6, 0x81, 0x5, 0x1ff, 0xffffffff00000000, 0x2, 0x5, 0x9000000000000, 0xfffffffffffffffa, 0x8, 0x10001, 0x731ab510, 0x9, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000001ac0), 0x1}, 0x80, 0x2b4, 0x200, 0x3, 0x6, 0x9, 0x4}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0x20000) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000001b80)) r6 = getpid() r7 = perf_event_open(&(0x7f0000001c00)={0x1, 0x70, 0x0, 0xfff, 0x4, 0x80000000, 0x0, 0x3, 0x40, 0xa, 0x7, 0x7, 0x7, 0x4800000000000000, 0x7, 0x6, 0x62b, 0x8, 0x9, 0x100000000, 0x1, 0x0, 0x5, 0xd199, 0x1f, 0x10000, 0xff80000000000000, 0x3, 0x4, 0x8, 0x80000001, 0x8000, 0x7fff, 0x4, 0x16, 0x7, 0x40, 0x8, 0x0, 0x5, 0x50031dd1e89e26d1, @perf_bp={&(0x7f0000001bc0), 0x2}, 0x10000, 0x3a, 0x80000001, 0x1, 0x2c, 0x3ff, 0x6}, r6, 0x6, r3, 0x3) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000001c80)=r0, 0x4) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000001cc0)) ioctl$PERF_EVENT_IOC_REFRESH(r7, 0x2402, 0xffffffff) r8 = perf_event_open(&(0x7f0000001d00)={0x0, 0x70, 0x7, 0x400, 0x100, 0xac, 0x0, 0x100000000, 0xc2800, 0xa, 0x33e3, 0x2, 0x10001, 0x8, 0x5, 0x100000001, 0x2e9, 0x2, 0xc1, 0xf2, 0x2, 0x9, 0xffff, 0x7, 0x1, 0x0, 0x8000, 0x800, 0xfffffffffffffffa, 0x40, 0x0, 0x3, 0x6, 0xfa4, 0x7, 0xffffffffffff8000, 0x0, 0x0, 0x0, 0x8000, 0x3, @perf_config_ext={0x400}, 0x100, 0xa264, 0x4, 0x7, 0x2, 0x1000, 0x92}, r6, 0x5, r7, 0x1) socketpair(0x7, 0x6, 0x1, &(0x7f0000001d80)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000001e00)={&(0x7f0000001dc0)='./file0\x00', r9}, 0x10) r10 = perf_event_open(&(0x7f0000001e40)={0x4, 0x70, 0x5, 0x4, 0x8, 0x6, 0x0, 0x2, 0x1425, 0xb, 0x0, 0xcc9, 0x400, 0x57f90db4, 0x80000000, 0x7, 0x1000, 0x0, 0x8, 0x8000, 0xffffffff, 0x400, 0x1, 0x6, 0x40, 0x2, 0x10000, 0x8, 0x9, 0xfffffffffffffff8, 0x9, 0x4, 0x3, 0x400, 0x3, 0x9, 0x3, 0x100, 0x0, 0x6, 0x0, @perf_config_ext={0x4, 0x2}, 0x20, 0x3ff, 0x0, 0x7, 0x3, 0x5, 0xfa5e}, r6, 0xd, r7, 0x2) bpf$OBJ_GET_MAP(0x7, &(0x7f0000001f00)={&(0x7f0000001ec0)='./file0\x00'}, 0x10) socketpair$inet6_sctp(0xa, 0x0, 0x84, &(0x7f0000001f40)) ioctl$PERF_EVENT_IOC_DISABLE(r10, 0x2401, 0xbad) r11 = perf_event_open(&(0x7f0000001fc0)={0x3, 0x70, 0xff, 0x2f, 0x2, 0x7, 0x0, 0x40, 0x80000, 0x1, 0x8, 0x6, 0xfffffffffffffffb, 0x7, 0x2, 0x10000, 0x6, 0x5, 0x0, 0x10, 0x6, 0xc58, 0x7f, 0x3, 0x2, 0x3, 0x5, 0x80000000800000, 0x7, 0xfff, 0x16, 0x2b65, 0x9, 0x69244395, 0x10000, 0x4, 0x9, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000001f80), 0x8}, 0x100, 0x8, 0x51b4, 0x4, 0x800, 0xb7, 0x4800}, r6, 0x8, r8, 0x1) r12 = gettid() socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000002040)) perf_event_open(&(0x7f0000002080)={0x0, 0x70, 0x100, 0x0, 0x2, 0x401, 0x0, 0x6, 0x1, 0x6, 0x656, 0x5, 0xfffffffffffff973, 0xffffffffffffffff, 0x9, 0x7, 0x3, 0x3ff, 0x1c000000, 0x10000, 0x6, 0x20, 0x6, 0x1, 0x1, 0x4, 0x2, 0x20, 0x9, 0xed5, 0x847, 0x1000, 0x0, 0x0, 0x102bed3b, 0x9, 0x7fffffff, 0x6, 0x0, 0x24, 0x0, @perf_config_ext={0x100000001, 0x6}, 0x200, 0x800000010000000, 0x7, 0x7, 0x1000, 0xf3, 0xe87}, r12, 0xf, r11, 0x8) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000002100)) perf_event_open(&(0x7f0000002180)={0x4, 0x70, 0x0, 0x8, 0xff, 0x0, 0x0, 0xfffffffffffffff9, 0x10001, 0x3, 0xffffffffffffff00, 0x93eb, 0x1, 0x4e5e, 0x8001, 0xfffffffffffffff8, 0x0, 0x1f4, 0x80000001, 0x99b, 0x4, 0x8, 0xed8, 0x3f, 0xec9, 0x6, 0x1, 0x4ab8, 0x8, 0x2, 0xdd, 0x9, 0xffffffffffffffff, 0x8000, 0x0, 0x6, 0xffff, 0x8, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000002140), 0xf}, 0x400, 0x5, 0x7, 0x4, 0x7, 0x4}, r12, 0x3, r7, 0x8) [ 365.907705] ? do_mount+0xea4/0x2bb0 [ 365.911420] ? SyS_mount+0xab/0x120 [ 365.915049] ? do_syscall_64+0x281/0x940 [ 365.919115] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 365.924487] ? find_held_lock+0x35/0x1d0 [ 365.928553] ? __lock_is_held+0xb6/0x140 [ 365.932622] ? check_same_owner+0x320/0x320 [ 365.936953] ? rcu_note_context_switch+0x710/0x710 [ 365.941891] should_failslab+0xec/0x120 [ 365.945870] kmem_cache_alloc_trace+0x4b/0x740 [ 365.950458] ? __kmalloc_node+0x33/0x70 [ 365.954437] ? __kmalloc_node+0x33/0x70 2018/03/31 09:08:26 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xf, 0x5, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x80000000}, [@map={0x18, 0x1, 0x1, 0x0, 0x1}], {0x95}}, &(0x7f0000000040)='syzkaller\x00', 0x3, 0x10, &(0x7f0000000080)=""/16, 0x41000, 0x2f3100a785778bd1}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000001c0)={r0, 0x50, &(0x7f0000000140)}, 0x10) close(r0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000780)={&(0x7f0000000240)=@ax25, 0x80, &(0x7f0000000600)=[{&(0x7f00000002c0)=""/114, 0x72}, {&(0x7f0000000340)=""/133, 0x85}, {&(0x7f0000000400)=""/23, 0x17}, {&(0x7f0000000440)=""/59, 0x3b}, {&(0x7f0000000480)=""/114, 0x72}, {&(0x7f0000000500)=""/45, 0x2d}, {&(0x7f0000000540)=""/83, 0x53}, {&(0x7f00000005c0)}], 0x8, &(0x7f0000000680)=""/214, 0xd6, 0x100}, 0x40) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000007c0)={0xffffffffffffffff}) recvmsg(r2, &(0x7f00000019c0)={&(0x7f0000000800)=@ax25, 0x80, &(0x7f00000018c0)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000001880)=""/18, 0x12}], 0x2, &(0x7f0000001900)=""/184, 0xb8, 0x3}, 0x1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001a80)={r4, 0x50, &(0x7f0000001a00)}, 0x10) r5 = perf_event_open(&(0x7f0000001b00)={0x2, 0x70, 0x6, 0x8, 0x80000000, 0x10001, 0x0, 0x7ff, 0x4, 0xa, 0x200, 0x20, 0x72, 0x5, 0x0, 0x0, 0x5, 0x8f, 0x9ed, 0xff, 0x0, 0xa58, 0x7f, 0xf2f, 0x4503, 0x6, 0x81, 0x5, 0x1ff, 0xffffffff00000000, 0x2, 0x5, 0x9000000000000, 0xfffffffffffffffa, 0x8, 0x10001, 0x731ab510, 0x9, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000001ac0), 0x1}, 0x80, 0x2b4, 0x200, 0x3, 0x6, 0x9, 0x4}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0x20000) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000001b80)) r6 = getpid() r7 = perf_event_open(&(0x7f0000001c00)={0x1, 0x70, 0x0, 0xfff, 0x4, 0x80000000, 0x0, 0x3, 0x40, 0xa, 0x7, 0x7, 0x7, 0x4800000000000000, 0x7, 0x6, 0x62b, 0x8, 0x9, 0x100000000, 0x1, 0x0, 0x5, 0xd199, 0x1f, 0x10000, 0xff80000000000000, 0x3, 0x4, 0x8, 0x80000001, 0x8000, 0x7fff, 0x4, 0x16, 0x7, 0x40, 0x8, 0x0, 0x5, 0x50031dd1e89e26d1, @perf_bp={&(0x7f0000001bc0), 0x2}, 0x10000, 0x3a, 0x80000001, 0x1, 0x2c, 0x3ff, 0x6}, r6, 0x6, r3, 0x3) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000001c80)=r0, 0x4) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000001cc0)) ioctl$PERF_EVENT_IOC_REFRESH(r7, 0x2402, 0xffffffff) r8 = perf_event_open(&(0x7f0000001d00)={0x0, 0x70, 0x7, 0x400, 0x100, 0xac, 0x0, 0x100000000, 0xc2800, 0xa, 0x33e3, 0x2, 0x10001, 0x8, 0x5, 0x100000001, 0x2e9, 0x2, 0xc1, 0xf2, 0x2, 0x9, 0xffff, 0x7, 0x1, 0x0, 0x8000, 0x800, 0xfffffffffffffffa, 0x40, 0x0, 0x3, 0x6, 0xfa4, 0x7, 0xffffffffffff8000, 0x0, 0x0, 0x0, 0x8000, 0x3, @perf_config_ext={0x400}, 0x100, 0xa264, 0x4, 0x7, 0x2, 0x1000, 0x92}, r6, 0x5, r7, 0x1) socketpair(0x7, 0x6, 0x1, &(0x7f0000001d80)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000001e00)={&(0x7f0000001dc0)='./file0\x00', r9}, 0x10) r10 = perf_event_open(&(0x7f0000001e40)={0x4, 0x70, 0x5, 0x4, 0x8, 0x6, 0x0, 0x2, 0x1425, 0xb, 0x0, 0xcc9, 0x400, 0x57f90db4, 0x80000000, 0x7, 0x1000, 0x0, 0x8, 0x8000, 0xffffffff, 0x400, 0x1, 0x6, 0x40, 0x2, 0x10000, 0x8, 0x9, 0xfffffffffffffff8, 0x9, 0x4, 0x3, 0x400, 0x3, 0x9, 0x3, 0x100, 0x0, 0x6, 0x0, @perf_config_ext={0x4, 0x2}, 0x20, 0x3ff, 0x0, 0x7, 0x3, 0x5, 0xfa5e}, r6, 0xd, r7, 0x2) bpf$OBJ_GET_MAP(0x7, &(0x7f0000001f00)={&(0x7f0000001ec0)='./file0\x00'}, 0x10) socketpair$inet6_sctp(0xa, 0x0, 0x84, &(0x7f0000001f40)) ioctl$PERF_EVENT_IOC_DISABLE(r10, 0x2401, 0xbad) r11 = perf_event_open(&(0x7f0000001fc0)={0x3, 0x70, 0xff, 0x2f, 0x2, 0x7, 0x0, 0x40, 0x80000, 0x1, 0x8, 0x6, 0xfffffffffffffffb, 0x7, 0x2, 0x10000, 0x6, 0x5, 0x0, 0x10, 0x6, 0xc58, 0x7f, 0x3, 0x2, 0x3, 0x5, 0x80000000800000, 0x7, 0xfff, 0x16, 0x2b65, 0x9, 0x69244395, 0x10000, 0x4, 0x9, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000001f80), 0x8}, 0x100, 0x8, 0x51b4, 0x4, 0x800, 0xb7, 0x4800}, r6, 0x8, r8, 0x1) r12 = gettid() socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000002040)) perf_event_open(&(0x7f0000002080)={0x0, 0x70, 0x100, 0x0, 0x2, 0x401, 0x0, 0x6, 0x1, 0x6, 0x656, 0x5, 0xfffffffffffff973, 0xffffffffffffffff, 0x9, 0x7, 0x3, 0x3ff, 0x1c000000, 0x10000, 0x6, 0x20, 0x6, 0x1, 0x1, 0x4, 0x2, 0x20, 0x9, 0xed5, 0x847, 0x1000, 0x0, 0x0, 0x102bed3b, 0x9, 0x7fffffff, 0x6, 0x0, 0x24, 0x0, @perf_config_ext={0x100000001, 0x6}, 0x200, 0x800000010000000, 0x7, 0x7, 0x1000, 0xf3, 0xe87}, r12, 0xf, r11, 0x8) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000002100)) perf_event_open(&(0x7f0000002180)={0x4, 0x70, 0x0, 0x8, 0xff, 0x0, 0x0, 0xfffffffffffffff9, 0x10001, 0x3, 0xffffffffffffff00, 0x93eb, 0x1, 0x4e5e, 0x8001, 0xfffffffffffffff8, 0x0, 0x1f4, 0x80000001, 0x99b, 0x4, 0x8, 0xed8, 0x3f, 0xec9, 0x6, 0x1, 0x4ab8, 0x8, 0x2, 0xdd, 0x9, 0xffffffffffffffff, 0x8000, 0x0, 0x6, 0xffff, 0x8, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000002140), 0xf}, 0x400, 0x5, 0x7, 0x4, 0x7, 0x4}, r12, 0x3, r7, 0x8) [ 365.958419] ? rcu_read_lock_sched_held+0x108/0x120 [ 365.963446] __memcg_init_list_lru_node+0x169/0x270 [ 365.968470] ? list_lru_add+0x7c0/0x7c0 [ 365.972447] ? __kmalloc_node+0x47/0x70 [ 365.976430] __list_lru_init+0x544/0x750 [ 365.980493] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 365.986377] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 365.991403] ? lockdep_init_map+0x9/0x10 [ 365.995478] sget_userns+0x6b1/0xe40 [ 365.999199] ? set_anon_super+0x20/0x20 [ 366.003186] ? put_filp+0x90/0x90 2018/03/31 09:08:26 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xf, 0x5, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x80000000}, [@map={0x18, 0x1, 0x1, 0x0, 0x1}], {0x95}}, &(0x7f0000000040)='syzkaller\x00', 0x3, 0x10, &(0x7f0000000080)=""/16, 0x41000, 0x2f3100a785778bd1}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000001c0)={r0, 0x50, &(0x7f0000000140)}, 0x10) close(r0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000780)={&(0x7f0000000240)=@ax25, 0x80, &(0x7f0000000600)=[{&(0x7f00000002c0)=""/114, 0x72}, {&(0x7f0000000340)=""/133, 0x85}, {&(0x7f0000000400)=""/23, 0x17}, {&(0x7f0000000440)=""/59, 0x3b}, {&(0x7f0000000480)=""/114, 0x72}, {&(0x7f0000000500)=""/45, 0x2d}, {&(0x7f0000000540)=""/83, 0x53}, {&(0x7f00000005c0)}], 0x8, &(0x7f0000000680)=""/214, 0xd6, 0x100}, 0x40) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000007c0)={0xffffffffffffffff}) recvmsg(r2, &(0x7f00000019c0)={&(0x7f0000000800)=@ax25, 0x80, &(0x7f00000018c0)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000001880)=""/18, 0x12}], 0x2, &(0x7f0000001900)=""/184, 0xb8, 0x3}, 0x1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001a80)={r4, 0x50, &(0x7f0000001a00)}, 0x10) r5 = perf_event_open(&(0x7f0000001b00)={0x2, 0x70, 0x6, 0x8, 0x80000000, 0x10001, 0x0, 0x7ff, 0x4, 0xa, 0x200, 0x20, 0x72, 0x5, 0x0, 0x0, 0x5, 0x8f, 0x9ed, 0xff, 0x0, 0xa58, 0x7f, 0xf2f, 0x4503, 0x6, 0x81, 0x5, 0x1ff, 0xffffffff00000000, 0x2, 0x5, 0x9000000000000, 0xfffffffffffffffa, 0x8, 0x10001, 0x731ab510, 0x9, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000001ac0), 0x1}, 0x80, 0x2b4, 0x200, 0x3, 0x6, 0x9, 0x4}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0x20000) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000001b80)) r6 = getpid() r7 = perf_event_open(&(0x7f0000001c00)={0x1, 0x70, 0x0, 0xfff, 0x4, 0x80000000, 0x0, 0x3, 0x40, 0xa, 0x7, 0x7, 0x7, 0x4800000000000000, 0x7, 0x6, 0x62b, 0x8, 0x9, 0x100000000, 0x1, 0x0, 0x5, 0xd199, 0x1f, 0x10000, 0xff80000000000000, 0x3, 0x4, 0x8, 0x80000001, 0x8000, 0x7fff, 0x4, 0x16, 0x7, 0x40, 0x8, 0x0, 0x5, 0x50031dd1e89e26d1, @perf_bp={&(0x7f0000001bc0), 0x2}, 0x10000, 0x3a, 0x80000001, 0x1, 0x2c, 0x3ff, 0x6}, r6, 0x6, r3, 0x3) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000001c80)=r0, 0x4) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000001cc0)) ioctl$PERF_EVENT_IOC_REFRESH(r7, 0x2402, 0xffffffff) r8 = perf_event_open(&(0x7f0000001d00)={0x0, 0x70, 0x7, 0x400, 0x100, 0xac, 0x0, 0x100000000, 0xc2800, 0xa, 0x33e3, 0x2, 0x10001, 0x8, 0x5, 0x100000001, 0x2e9, 0x2, 0xc1, 0xf2, 0x2, 0x9, 0xffff, 0x7, 0x1, 0x0, 0x8000, 0x800, 0xfffffffffffffffa, 0x40, 0x0, 0x3, 0x6, 0xfa4, 0x7, 0xffffffffffff8000, 0x0, 0x0, 0x0, 0x8000, 0x3, @perf_config_ext={0x400}, 0x100, 0xa264, 0x4, 0x7, 0x2, 0x1000, 0x92}, r6, 0x5, r7, 0x1) socketpair(0x7, 0x6, 0x1, &(0x7f0000001d80)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000001e00)={&(0x7f0000001dc0)='./file0\x00', r9}, 0x10) r10 = perf_event_open(&(0x7f0000001e40)={0x4, 0x70, 0x5, 0x4, 0x8, 0x6, 0x0, 0x2, 0x1425, 0xb, 0x0, 0xcc9, 0x400, 0x57f90db4, 0x80000000, 0x7, 0x1000, 0x0, 0x8, 0x8000, 0xffffffff, 0x400, 0x1, 0x6, 0x40, 0x2, 0x10000, 0x8, 0x9, 0xfffffffffffffff8, 0x9, 0x4, 0x3, 0x400, 0x3, 0x9, 0x3, 0x100, 0x0, 0x6, 0x0, @perf_config_ext={0x4, 0x2}, 0x20, 0x3ff, 0x0, 0x7, 0x3, 0x5, 0xfa5e}, r6, 0xd, r7, 0x2) bpf$OBJ_GET_MAP(0x7, &(0x7f0000001f00)={&(0x7f0000001ec0)='./file0\x00'}, 0x10) socketpair$inet6_sctp(0xa, 0x0, 0x84, &(0x7f0000001f40)) ioctl$PERF_EVENT_IOC_DISABLE(r10, 0x2401, 0xbad) r11 = perf_event_open(&(0x7f0000001fc0)={0x3, 0x70, 0xff, 0x2f, 0x2, 0x7, 0x0, 0x40, 0x80000, 0x1, 0x8, 0x6, 0xfffffffffffffffb, 0x7, 0x2, 0x10000, 0x6, 0x5, 0x0, 0x10, 0x6, 0xc58, 0x7f, 0x3, 0x2, 0x3, 0x5, 0x80000000800000, 0x7, 0xfff, 0x16, 0x2b65, 0x9, 0x69244395, 0x10000, 0x4, 0x9, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000001f80), 0x8}, 0x100, 0x8, 0x51b4, 0x4, 0x800, 0xb7, 0x4800}, r6, 0x8, r8, 0x1) r12 = gettid() socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000002040)) perf_event_open(&(0x7f0000002080)={0x0, 0x70, 0x100, 0x0, 0x2, 0x401, 0x0, 0x6, 0x1, 0x6, 0x656, 0x5, 0xfffffffffffff973, 0xffffffffffffffff, 0x9, 0x7, 0x3, 0x3ff, 0x1c000000, 0x10000, 0x6, 0x20, 0x6, 0x1, 0x1, 0x4, 0x2, 0x20, 0x9, 0xed5, 0x847, 0x1000, 0x0, 0x0, 0x102bed3b, 0x9, 0x7fffffff, 0x6, 0x0, 0x24, 0x0, @perf_config_ext={0x100000001, 0x6}, 0x200, 0x800000010000000, 0x7, 0x7, 0x1000, 0xf3, 0xe87}, r12, 0xf, r11, 0x8) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000002100)) perf_event_open(&(0x7f0000002180)={0x4, 0x70, 0x0, 0x8, 0xff, 0x0, 0x0, 0xfffffffffffffff9, 0x10001, 0x3, 0xffffffffffffff00, 0x93eb, 0x1, 0x4e5e, 0x8001, 0xfffffffffffffff8, 0x7, 0x0, 0x80000001, 0x99b, 0x4, 0x8, 0xed8, 0x3f, 0xec9, 0x6, 0x1, 0x4ab8, 0x8, 0x2, 0xdd, 0x9, 0xffffffffffffffff, 0x8000, 0x0, 0x6, 0xffff, 0x8, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000002140), 0xf}, 0x400, 0x5, 0x7, 0x4, 0x7, 0x4}, r12, 0x3, r7, 0x8) [ 366.006642] ? destroy_unused_super.part.6+0xd0/0xd0 [ 366.011744] ? alloc_vfsmnt+0x762/0x9c0 [ 366.015715] ? path_lookupat+0x238/0xba0 [ 366.019775] ? mnt_free_id.isra.21+0x50/0x50 [ 366.024181] ? trace_hardirqs_off+0x10/0x10 [ 366.028498] ? putname+0xee/0x130 [ 366.031955] ? cap_capable+0x1b5/0x230 [ 366.035845] ? security_capable+0x8e/0xc0 [ 366.039995] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 366.045187] ? ns_capable_common+0xcf/0x160 [ 366.049512] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 366.054699] mount_ns+0x6d/0x190 [ 366.058068] rpc_mount+0x9e/0xd0 [ 366.061432] mount_fs+0x66/0x2d0 [ 366.064797] vfs_kern_mount.part.26+0xc6/0x4a0 [ 366.069375] ? may_umount+0xa0/0xa0 [ 366.072998] ? _raw_read_unlock+0x22/0x30 [ 366.077142] ? __get_fs_type+0x8a/0xc0 [ 366.081040] do_mount+0xea4/0x2bb0 [ 366.084577] ? __might_fault+0x110/0x1d0 [ 366.088641] ? copy_mount_string+0x40/0x40 [ 366.092869] ? check_same_owner+0x320/0x320 [ 366.097192] ? __check_object_size+0x8b/0x530 [ 366.101686] ? __might_sleep+0x95/0x190 [ 366.105656] ? kasan_check_write+0x14/0x20 [ 366.109876] ? _copy_from_user+0x99/0x110 [ 366.114006] ? memdup_user+0x5e/0x90 [ 366.117703] ? copy_mount_options+0x1f7/0x2e0 [ 366.122180] SyS_mount+0xab/0x120 [ 366.125607] ? copy_mnt_ns+0xb30/0xb30 [ 366.129472] do_syscall_64+0x281/0x940 [ 366.133336] ? vmalloc_sync_all+0x30/0x30 [ 366.137470] ? _raw_spin_unlock_irq+0x27/0x70 [ 366.141956] ? finish_task_switch+0x1c1/0x7e0 [ 366.146433] ? syscall_return_slowpath+0x550/0x550 [ 366.151348] ? syscall_return_slowpath+0x2ac/0x550 [ 366.156273] ? prepare_exit_to_usermode+0x350/0x350 [ 366.161270] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 366.166631] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 366.171460] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 366.176631] RIP: 0033:0x454e79 [ 366.179807] RSP: 002b:00007fed74635c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 366.187501] RAX: ffffffffffffffda RBX: 00007fed746366d4 RCX: 0000000000454e79 [ 366.194751] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 366.201997] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 366.209247] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000016 [ 366.216499] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000001a 2018/03/31 09:08:26 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xf, 0x5, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x80000000}, [@map={0x18, 0x1, 0x1, 0x0, 0x1}], {0x95}}, &(0x7f0000000040)='syzkaller\x00', 0x3, 0x10, &(0x7f0000000080)=""/16, 0x41000, 0x2f3100a785778bd1}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000001c0)={r0, 0x50, &(0x7f0000000140)}, 0x10) close(r0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000780)={&(0x7f0000000240)=@ax25, 0x80, &(0x7f0000000600)=[{&(0x7f00000002c0)=""/114, 0x72}, {&(0x7f0000000340)=""/133, 0x85}, {&(0x7f0000000400)=""/23, 0x17}, {&(0x7f0000000440)=""/59, 0x3b}, {&(0x7f0000000480)=""/114, 0x72}, {&(0x7f0000000500)=""/45, 0x2d}, {&(0x7f0000000540)=""/83, 0x53}, {&(0x7f00000005c0)}], 0x8, &(0x7f0000000680)=""/214, 0xd6, 0x100}, 0x40) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000007c0)={0xffffffffffffffff}) recvmsg(r2, &(0x7f00000019c0)={&(0x7f0000000800)=@ax25, 0x80, &(0x7f00000018c0)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000001880)=""/18, 0x12}], 0x2, &(0x7f0000001900)=""/184, 0xb8, 0x3}, 0x1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001a80)={r4, 0x50, &(0x7f0000001a00)}, 0x10) r5 = perf_event_open(&(0x7f0000001b00)={0x2, 0x70, 0x6, 0x8, 0x80000000, 0x10001, 0x0, 0x7ff, 0x4, 0xa, 0x200, 0x20, 0x72, 0x5, 0x0, 0x0, 0x5, 0x8f, 0x9ed, 0xff, 0x0, 0xa58, 0x7f, 0xf2f, 0x4503, 0x6, 0x81, 0x5, 0x1ff, 0xffffffff00000000, 0x2, 0x5, 0x9000000000000, 0xfffffffffffffffa, 0x8, 0x10001, 0x731ab510, 0x9, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000001ac0), 0x1}, 0x80, 0x2b4, 0x200, 0x3, 0x6, 0x9, 0x4}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0x20000) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000001b80)) r6 = getpid() r7 = perf_event_open(&(0x7f0000001c00)={0x1, 0x70, 0x0, 0xfff, 0x4, 0x80000000, 0x0, 0x3, 0x40, 0xa, 0x7, 0x7, 0x7, 0x4800000000000000, 0x7, 0x6, 0x62b, 0x8, 0x9, 0x100000000, 0x1, 0x0, 0x5, 0xd199, 0x1f, 0x10000, 0xff80000000000000, 0x3, 0x4, 0x8, 0x80000001, 0x8000, 0x7fff, 0x4, 0x16, 0x7, 0x40, 0x8, 0x0, 0x5, 0x50031dd1e89e26d1, @perf_bp={&(0x7f0000001bc0), 0x2}, 0x10000, 0x3a, 0x80000001, 0x1, 0x2c, 0x3ff, 0x6}, r6, 0x6, r3, 0x3) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000001c80)=r0, 0x4) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000001cc0)) ioctl$PERF_EVENT_IOC_REFRESH(r7, 0x2402, 0xffffffff) r8 = perf_event_open(&(0x7f0000001d00)={0x0, 0x70, 0x7, 0x400, 0x100, 0xac, 0x0, 0x100000000, 0xc2800, 0xa, 0x33e3, 0x2, 0x10001, 0x8, 0x5, 0x100000001, 0x2e9, 0x2, 0xc1, 0xf2, 0x2, 0x9, 0xffff, 0x7, 0x1, 0x0, 0x8000, 0x800, 0xfffffffffffffffa, 0x40, 0x0, 0x3, 0x6, 0xfa4, 0x7, 0xffffffffffff8000, 0x0, 0x0, 0x0, 0x8000, 0x3, @perf_config_ext={0x400}, 0x100, 0xa264, 0x4, 0x7, 0x2, 0x1000, 0x92}, r6, 0x5, r7, 0x1) socketpair(0x7, 0x6, 0x1, &(0x7f0000001d80)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000001e00)={&(0x7f0000001dc0)='./file0\x00', r9}, 0x10) r10 = perf_event_open(&(0x7f0000001e40)={0x4, 0x70, 0x5, 0x4, 0x8, 0x6, 0x0, 0x2, 0x1425, 0xb, 0x0, 0xcc9, 0x400, 0x57f90db4, 0x80000000, 0x7, 0x1000, 0x0, 0x8, 0x8000, 0xffffffff, 0x400, 0x1, 0x6, 0x40, 0x2, 0x10000, 0x8, 0x9, 0xfffffffffffffff8, 0x9, 0x4, 0x3, 0x400, 0x3, 0x9, 0x3, 0x100, 0x0, 0x6, 0x0, @perf_config_ext={0x4, 0x2}, 0x20, 0x3ff, 0x0, 0x7, 0x3, 0x5, 0xfa5e}, r6, 0xd, r7, 0x2) bpf$OBJ_GET_MAP(0x7, &(0x7f0000001f00)={&(0x7f0000001ec0)='./file0\x00'}, 0x10) socketpair$inet6_sctp(0xa, 0x0, 0x84, &(0x7f0000001f40)) ioctl$PERF_EVENT_IOC_DISABLE(r10, 0x2401, 0xbad) r11 = perf_event_open(&(0x7f0000001fc0)={0x3, 0x70, 0xff, 0x2f, 0x2, 0x7, 0x0, 0x40, 0x80000, 0x1, 0x8, 0x6, 0xfffffffffffffffb, 0x7, 0x2, 0x10000, 0x6, 0x5, 0x0, 0x10, 0x6, 0xc58, 0x7f, 0x3, 0x2, 0x3, 0x5, 0x80000000800000, 0x7, 0xfff, 0x16, 0x2b65, 0x9, 0x69244395, 0x10000, 0x4, 0x9, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000001f80), 0x8}, 0x100, 0x8, 0x51b4, 0x4, 0x800, 0xb7, 0x4800}, r6, 0x8, r8, 0x1) r12 = gettid() socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000002040)) perf_event_open(&(0x7f0000002080)={0x0, 0x70, 0x100, 0x0, 0x2, 0x401, 0x0, 0x6, 0x1, 0x6, 0x656, 0x5, 0xfffffffffffff973, 0xffffffffffffffff, 0x9, 0x7, 0x3, 0x3ff, 0x1c000000, 0x10000, 0x6, 0x20, 0x6, 0x1, 0x1, 0x4, 0x2, 0x20, 0x9, 0xed5, 0x847, 0x1000, 0x0, 0x0, 0x102bed3b, 0x9, 0x7fffffff, 0x6, 0x0, 0x24, 0x0, @perf_config_ext={0x100000001, 0x6}, 0x200, 0x800000010000000, 0x7, 0x7, 0x1000, 0xf3, 0xe87}, r12, 0xf, r11, 0x8) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000002100)) perf_event_open(&(0x7f0000002180)={0x4, 0x70, 0x0, 0x8, 0xff, 0x0, 0x0, 0xfffffffffffffff9, 0x10001, 0x3, 0xffffffffffffff00, 0x93eb, 0x1, 0x4e5e, 0x8001, 0xfffffffffffffff8, 0x7, 0x0, 0x80000001, 0x99b, 0x4, 0x8, 0xed8, 0x3f, 0xec9, 0x6, 0x1, 0x4ab8, 0x8, 0x2, 0xdd, 0x9, 0xffffffffffffffff, 0x8000, 0x0, 0x6, 0xffff, 0x8, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000002140), 0xf}, 0x400, 0x5, 0x7, 0x4, 0x7, 0x4}, r12, 0x3, r7, 0x8) 2018/03/31 09:08:26 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x5, 0x100000000209e20, 0x8000000001, 0x5}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x13, 0x0, 0x7ffff9, 0x0, 0x20000003, 0x0}, 0x2c) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x13, 0x0, 0x0, 0x0, 0x20000003, 0x0}, 0x2c) 2018/03/31 09:08:26 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x5, 0x100000000209e20, 0x8000000001, 0x5}, 0x2c) r1 = bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x13, 0x0, 0x7ffff9, 0x0, 0x20000003, 0x0}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xe, 0x0, 0x7f, 0x3e83, 0x8, r1, 0x80000000}, 0x2c) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x50, &(0x7f0000000140)={0x0, 0x0}}, 0x10) r4 = socket$kcm(0x29, 0x2, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) socketpair(0x4, 0x1, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000005c0)={r2, &(0x7f0000000940)="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", &(0x7f00000004c0)=""/215}, 0x18) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r5, 0x2401, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000480)={r6, &(0x7f0000000440)="3068306ef4a0ff8256b6430a042a9b"}, 0x10) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r6, 0x40042409, 0x1) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, r5) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x0, 0x8, 0x0, 0x0, r0, 0x6}, 0x2c) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x5, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r8 = gettid() r9 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0xfff, 0x100000001, 0xfffffffffffffffb, 0x0, 0x8001, 0x0, 0x1, 0x0, 0xfffffffffffffff9, 0x0, 0x9, 0x9, 0x5, 0x8, 0x1, 0x8106, 0x0, 0x14000000000, 0x80000000, 0x1, 0x5, 0x0, 0x40, 0x2839, 0x1d, 0x800, 0x7, 0x0, 0x0, 0x5, 0x7, 0x0, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x4}, 0x0, 0x0, 0xff, 0x0, 0x3, 0x8, 0x3}, r8, 0x2, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=r3, 0x4) ioctl$sock_kcm_SIOCKCMATTACH(r5, 0x89e0, &(0x7f0000000600)={r4, r7}) perf_event_open(&(0x7f00000003c0)={0x7, 0x70, 0x7fff, 0x5, 0x6, 0x8000, 0x0, 0x1000, 0x0, 0x7, 0x1000, 0x1, 0xffffffff, 0x3, 0xaf99, 0x40, 0x8001, 0xfffffffffffffffa, 0x1, 0x80000000, 0xe6d1, 0x4, 0x8001, 0x9, 0x1f, 0xfffffffffffffc00, 0x0, 0x0, 0x7ff, 0x15ac000000000000, 0x0, 0x3, 0x1, 0xfffffffffffffffe, 0x9, 0xff, 0x1, 0x2, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000002c0), 0x8}, 0x0, 0x3, 0x6, 0x1, 0x5, 0xb03c, 0x5}, r8, 0xc, r9, 0xb) bpf$MAP_CREATE(0x0, &(0x7f0000000640)={0x8, 0x6bcb8e63, 0x0, 0x59ad, 0x12, r0, 0x8001}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000880)={r0, &(0x7f0000000840), &(0x7f00000008c0)=""/70}, 0x375) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000280)={0xffffffffffffffff, 0xffffff8f, &(0x7f0000000300)}, 0x10) 2018/03/31 09:08:26 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x0, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) ioctl$PERF_EVENT_IOC_RESET(r5, 0x2403, 0x2) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f00000009c0)={r4}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) ioctl$PERF_EVENT_IOC_RESET(r4, 0x2403, 0x2) sendmsg(r3, &(0x7f0000000cc0)={&(0x7f0000000400)=@ethernet={0x1}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000580)="4589496d6a3bfcccae07dc729c52ee6bdf10d9cf221f605c25f790103018703b9a67491f96c3f9f8d07204ee4adf21acce1afdaedaba1228b4d33c3fa702a46b1329a0e52eea6a7908fd375ace47", 0x4e}], 0x1, &(0x7f0000000700), 0x0, 0x40000}, 0x4044080) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000280)={r6, &(0x7f0000000700)="ec1b815b5cc95d6e0dff859791e3341b"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)={0x3, 0x40000100, 0x56c96e7a, 0xea, 0x1, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") close(0xffffffffffffffff) 2018/03/31 09:08:26 executing program 1 (fault-call:20 fault-nth:27): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)={0xffffffffffffffff}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x0, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r5 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f00000009c0)={r4}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg(r3, &(0x7f0000000cc0)={&(0x7f0000000400)=@ethernet={0x1}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000580)="4589496d6a3bfcccae07dc729c52ee6bdf10d9cf221f605c25f790103018703b9a67491f96c3f9f8d07204ee4adf21acce1afdaedaba1228b4d33c3fa702a46b1329a0e52eea6a7908fd375ace47", 0x4e}], 0x1, &(0x7f0000000700), 0x0, 0x40000}, 0x4044080) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000740)={0xffffffffffffffff, &(0x7f0000000700)="ec1b815b5cc95d6e0dff859791e3341b8790dcb187f25418f8003a2b3bf345dc"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") close(0xffffffffffffffff) 2018/03/31 09:08:26 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x5, 0x0, 0x0, 0x5}, 0x2c) r1 = bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x13, 0x0, 0x0, 0x0, 0x20000003, 0x0}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x3e83, 0x8, r1}, 0x2c) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x50, &(0x7f0000000140)={0x0, 0x0}}, 0x10) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, r2, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) socketpair(0x4, 0x1, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000480)={r5, &(0x7f0000000440)="3068306ef4a0ff8256b6430a042a9b"}, 0x10) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x0, 0x8, 0x0, 0x0, r0, 0x6}, 0x2c) socketpair(0x8, 0x2, 0x0, &(0x7f0000000040)) r6 = gettid() bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=r3, 0x4) perf_event_open(&(0x7f00000003c0)={0x7, 0x70, 0x7fff, 0x5, 0x6, 0x8000, 0x0, 0x1000, 0x0, 0x7, 0x1000, 0x1, 0xffffffff, 0x3, 0xaf99, 0x40, 0x8001, 0xfffffffffffffffa, 0x1, 0x80000000, 0xe6d1, 0x4, 0x8001, 0x9, 0x1f, 0xfffffffffffffc00, 0x0, 0x0, 0x7ff, 0x15ac000000000000, 0x0, 0x3, 0x1, 0xfffffffffffffffe, 0x9, 0xff, 0x1, 0x2, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000002c0), 0x8}, 0x0, 0x3, 0x6, 0x1, 0x5, 0xb03c, 0x5}, r6, 0xc, 0xffffffffffffffff, 0xb) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000280)={0xffffffffffffffff, 0xffffff8f, &(0x7f0000000300)}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000600)={0xffffffffffffffff, &(0x7f00000004c0)="648d1c6e4e7374f62b21f1c71a7cd05c41e2a0bf36f2f23f5761a39646321c3b5e4e670bd9a8f7a3fc36d594c1799d7dec6f0ba644a16abd532529ac63497998169000b2e491e82f659738895262b6fc9c79d8e6736c91136937b9", &(0x7f0000000540)="0c39cf9403045550ce39840a2a90ca20bc744608140dcd6c55d855533bb97417ef0cd19e1990bf245f0f38ab76b7f283d20500e75742ca4151b5489f5848a6b6104b0334b5427d07a3464ecffbfda64068c2d7ea6c230ba9040eebaec2030d19884f9f815ab793bd836fdb9c142a7aa9510939e2d3b5e6f57fa56f5464911bd939ca0ab0a1c19407fc9b1b974b94401f7c82bce0926bd5"}, 0x20) 2018/03/31 09:08:26 executing program 7 (fault-call:26 fault-nth:5): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)={0xffffffffffffffff}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x0, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r5 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x0, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f00000009c0)={r4}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg(r3, &(0x7f0000000cc0)={&(0x7f0000000400)=@ethernet={0x1}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000580)="4589496d6a3bfcccae07dc729c52ee6bdf10d9cf221f605c25f790103018703b9a67491f96c3f9f8d07204ee4adf21acce1afdaedaba1228b4d33c3fa702a46b1329a0e52eea6a7908fd375ace47", 0x4e}], 0x1, &(0x7f0000000700), 0x0, 0x40000}, 0x4044080) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000740)={0xffffffffffffffff, &(0x7f0000000700)="ec1b815b5cc95d6e0dff859791e3341b8790dcb187f25418f8003a2b3bf345"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") close(0xffffffffffffffff) 2018/03/31 09:08:26 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000a40)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x0, 0x0) socketpair(0x2, 0x0, 0x0, &(0x7f0000000640)={0xffffffffffffffff}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r6 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x0, 0x10000, 0x1182, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f00000009c0)={r4}) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000280)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000a00)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg(r3, &(0x7f0000000cc0)={&(0x7f0000000400)=@ethernet={0x1}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000580)="4589496d6a3bfcccae07dc729c52ee6bdf10d9cf221f605c25f790103018703b9a67491f96c3f9f8d07204ee4adf21acce1afdaedaba1228b4d33c3fa702a46b1329a0e52eea6a7908fd375ace47", 0x4e}], 0x1, &(0x7f0000000700), 0x0, 0x40000}, 0x4044080) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000740)={r5, &(0x7f0000000700)="ec1b815b5cc95d6e0dff859791e3341b8790dcb187f25418f8003a2b3bf345dc"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x0, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") close(0xffffffffffffffff) [ 366.428770] FAULT_INJECTION: forcing a failure. [ 366.428770] name failslab, interval 1, probability 0, space 0, times 0 [ 366.440113] CPU: 1 PID: 10483 Comm: syz-executor1 Not tainted 4.16.0-rc6+ #43 [ 366.447386] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 366.456735] Call Trace: [ 366.459312] dump_stack+0x194/0x24d [ 366.462922] ? arch_local_irq_restore+0x53/0x53 [ 366.467572] ? __save_stack_trace+0x7e/0xd0 [ 366.471882] should_fail+0x8c0/0xa40 [ 366.475578] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 366.480660] ? kasan_kmalloc+0xad/0xe0 [ 366.484532] ? kmem_cache_alloc_trace+0x136/0x740 [ 366.489355] ? __memcg_init_list_lru_node+0x169/0x270 [ 366.494521] ? __list_lru_init+0x544/0x750 [ 366.498734] ? sget_userns+0x6b1/0xe40 [ 366.502604] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 366.507342] ? do_mount+0xea4/0x2bb0 [ 366.511035] ? SyS_mount+0xab/0x120 [ 366.514652] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 366.520002] ? find_held_lock+0x35/0x1d0 [ 366.524051] ? __lock_is_held+0xb6/0x140 [ 366.528102] ? check_same_owner+0x320/0x320 [ 366.532406] ? rcu_note_context_switch+0x710/0x710 [ 366.537320] should_failslab+0xec/0x120 [ 366.541274] kmem_cache_alloc_trace+0x4b/0x740 [ 366.545837] ? __kmalloc_node+0x33/0x70 [ 366.549791] ? __kmalloc_node+0x33/0x70 [ 366.553747] ? rcu_read_lock_sched_held+0x108/0x120 [ 366.558748] __memcg_init_list_lru_node+0x169/0x270 [ 366.563749] ? list_lru_add+0x7c0/0x7c0 [ 366.567708] ? __kmalloc_node+0x47/0x70 [ 366.571675] __list_lru_init+0x544/0x750 [ 366.575727] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 366.581594] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 366.586598] ? lockdep_init_map+0x9/0x10 [ 366.590646] sget_userns+0x6b1/0xe40 [ 366.594338] ? set_anon_super+0x20/0x20 [ 366.598296] ? put_filp+0x90/0x90 [ 366.601730] ? destroy_unused_super.part.6+0xd0/0xd0 [ 366.606811] ? alloc_vfsmnt+0x762/0x9c0 [ 366.610764] ? path_lookupat+0x238/0xba0 [ 366.614802] ? mnt_free_id.isra.21+0x50/0x50 [ 366.619193] ? trace_hardirqs_off+0x10/0x10 [ 366.623495] ? putname+0xee/0x130 [ 366.626930] ? cap_capable+0x1b5/0x230 [ 366.630801] ? security_capable+0x8e/0xc0 [ 366.634936] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 366.640106] ? ns_capable_common+0xcf/0x160 [ 366.644413] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 366.649584] mount_ns+0x6d/0x190 [ 366.652934] rpc_mount+0x9e/0xd0 [ 366.656285] mount_fs+0x66/0x2d0 [ 366.659636] vfs_kern_mount.part.26+0xc6/0x4a0 [ 366.664200] ? may_umount+0xa0/0xa0 [ 366.667807] ? _raw_read_unlock+0x22/0x30 [ 366.671934] ? __get_fs_type+0x8a/0xc0 [ 366.675804] do_mount+0xea4/0x2bb0 [ 366.679321] ? __might_fault+0x110/0x1d0 [ 366.683365] ? copy_mount_string+0x40/0x40 [ 366.687580] ? __check_object_size+0x8b/0x530 [ 366.692058] ? __might_sleep+0x95/0x190 [ 366.696023] ? kasan_check_write+0x14/0x20 [ 366.700241] ? _copy_from_user+0x99/0x110 [ 366.704375] ? memdup_user+0x5e/0x90 [ 366.708067] ? copy_mount_options+0x1f7/0x2e0 [ 366.712542] SyS_mount+0xab/0x120 [ 366.715972] ? copy_mnt_ns+0xb30/0xb30 [ 366.719843] do_syscall_64+0x281/0x940 [ 366.723710] ? vmalloc_sync_all+0x30/0x30 [ 366.727838] ? _raw_spin_unlock_irq+0x27/0x70 [ 366.732314] ? finish_task_switch+0x1c1/0x7e0 [ 366.736789] ? syscall_return_slowpath+0x550/0x550 [ 366.741700] ? syscall_return_slowpath+0x2ac/0x550 [ 366.746614] ? prepare_exit_to_usermode+0x350/0x350 [ 366.751631] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 366.756976] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 366.761806] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 366.766976] RIP: 0033:0x454e79 [ 366.770143] RSP: 002b:00007fed74635c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 366.777832] RAX: ffffffffffffffda RBX: 00007fed746366d4 RCX: 0000000000454e79 [ 366.785080] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 366.792328] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 366.799576] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000016 [ 366.806827] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000001b [ 366.816424] FAULT_INJECTION: forcing a failure. [ 366.816424] name failslab, interval 1, probability 0, space 0, times 0 [ 366.827782] CPU: 0 PID: 10481 Comm: syz-executor7 Not tainted 4.16.0-rc6+ #43 [ 366.835054] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 366.844405] Call Trace: [ 366.847003] dump_stack+0x194/0x24d [ 366.850637] ? arch_local_irq_restore+0x53/0x53 [ 366.855303] ? lookup_fast+0x392/0xfa0 [ 366.859197] should_fail+0x8c0/0xa40 [ 366.862908] ? __lock_acquire+0x664/0x3e00 [ 366.867142] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 366.872252] ? debug_check_no_locks_freed+0x3c0/0x3c0 2018/03/31 09:08:27 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xf, 0x5, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x80000000}, [@map={0x18, 0x1, 0x1, 0x0, 0x1}], {0x95}}, &(0x7f0000000040)='syzkaller\x00', 0x3, 0x10, &(0x7f0000000080)=""/16, 0x41000, 0x2f3100a785778bd1}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000001c0)={r0, 0x50, &(0x7f0000000140)}, 0x10) close(r0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000780)={&(0x7f0000000240)=@ax25, 0x80, &(0x7f0000000600)=[{&(0x7f00000002c0)=""/114, 0x72}, {&(0x7f0000000340)=""/133, 0x85}, {&(0x7f0000000400)=""/23, 0x17}, {&(0x7f0000000440)=""/59, 0x3b}, {&(0x7f0000000480)=""/114, 0x72}, {&(0x7f0000000500)=""/45, 0x2d}, {&(0x7f0000000540)=""/83, 0x53}, {&(0x7f00000005c0)}], 0x8, &(0x7f0000000680)=""/214, 0xd6, 0x100}, 0x40) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000007c0)={0xffffffffffffffff}) recvmsg(r2, &(0x7f00000019c0)={&(0x7f0000000800)=@ax25, 0x80, &(0x7f00000018c0)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000001880)=""/18, 0x12}], 0x2, &(0x7f0000001900)=""/184, 0xb8, 0x3}, 0x1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001a80)={r4, 0x50, &(0x7f0000001a00)}, 0x10) r5 = perf_event_open(&(0x7f0000001b00)={0x2, 0x70, 0x6, 0x8, 0x80000000, 0x10001, 0x0, 0x7ff, 0x4, 0xa, 0x200, 0x20, 0x72, 0x5, 0x0, 0x0, 0x5, 0x8f, 0x9ed, 0xff, 0x0, 0xa58, 0x7f, 0xf2f, 0x4503, 0x6, 0x81, 0x5, 0x1ff, 0xffffffff00000000, 0x2, 0x5, 0x9000000000000, 0xfffffffffffffffa, 0x8, 0x10001, 0x731ab510, 0x9, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000001ac0), 0x1}, 0x80, 0x2b4, 0x200, 0x3, 0x6, 0x9, 0x4}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0x20000) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000001b80)) r6 = getpid() r7 = perf_event_open(&(0x7f0000001c00)={0x1, 0x70, 0x0, 0xfff, 0x4, 0x80000000, 0x0, 0x3, 0x40, 0xa, 0x7, 0x7, 0x7, 0x4800000000000000, 0x7, 0x6, 0x62b, 0x8, 0x9, 0x100000000, 0x1, 0x0, 0x5, 0xd199, 0x1f, 0x10000, 0xff80000000000000, 0x3, 0x4, 0x8, 0x80000001, 0x8000, 0x7fff, 0x4, 0x16, 0x7, 0x40, 0x8, 0x0, 0x5, 0x50031dd1e89e26d1, @perf_bp={&(0x7f0000001bc0), 0x2}, 0x10000, 0x3a, 0x80000001, 0x1, 0x2c, 0x3ff, 0x6}, r6, 0x6, r3, 0x3) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000001c80)=r0, 0x4) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000001cc0)) ioctl$PERF_EVENT_IOC_REFRESH(r7, 0x2402, 0xffffffff) r8 = perf_event_open(&(0x7f0000001d00)={0x0, 0x70, 0x7, 0x400, 0x100, 0xac, 0x0, 0x100000000, 0xc2800, 0xa, 0x33e3, 0x2, 0x10001, 0x8, 0x5, 0x100000001, 0x2e9, 0x2, 0xc1, 0xf2, 0x2, 0x9, 0xffff, 0x7, 0x1, 0x0, 0x8000, 0x800, 0xfffffffffffffffa, 0x40, 0x0, 0x3, 0x6, 0xfa4, 0x7, 0xffffffffffff8000, 0x0, 0x0, 0x0, 0x8000, 0x3, @perf_config_ext={0x400}, 0x100, 0xa264, 0x4, 0x7, 0x2, 0x1000, 0x92}, r6, 0x5, r7, 0x1) socketpair(0x7, 0x6, 0x1, &(0x7f0000001d80)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000001e00)={&(0x7f0000001dc0)='./file0\x00', r9}, 0x10) r10 = perf_event_open(&(0x7f0000001e40)={0x4, 0x70, 0x5, 0x4, 0x8, 0x6, 0x0, 0x2, 0x1425, 0xb, 0x0, 0xcc9, 0x400, 0x57f90db4, 0x80000000, 0x7, 0x1000, 0x0, 0x8, 0x8000, 0xffffffff, 0x400, 0x1, 0x6, 0x40, 0x2, 0x10000, 0x8, 0x9, 0xfffffffffffffff8, 0x9, 0x4, 0x3, 0x400, 0x3, 0x9, 0x3, 0x100, 0x0, 0x6, 0x0, @perf_config_ext={0x4, 0x2}, 0x20, 0x3ff, 0x0, 0x7, 0x3, 0x5, 0xfa5e}, r6, 0xd, r7, 0x2) bpf$OBJ_GET_MAP(0x7, &(0x7f0000001f00)={&(0x7f0000001ec0)='./file0\x00'}, 0x10) socketpair$inet6_sctp(0xa, 0x0, 0x84, &(0x7f0000001f40)) ioctl$PERF_EVENT_IOC_DISABLE(r10, 0x2401, 0xbad) r11 = perf_event_open(&(0x7f0000001fc0)={0x3, 0x70, 0xff, 0x2f, 0x2, 0x7, 0x0, 0x40, 0x80000, 0x1, 0x8, 0x6, 0xfffffffffffffffb, 0x7, 0x2, 0x10000, 0x6, 0x5, 0x0, 0x10, 0x6, 0xc58, 0x7f, 0x3, 0x2, 0x3, 0x5, 0x80000000800000, 0x7, 0xfff, 0x16, 0x2b65, 0x9, 0x69244395, 0x10000, 0x4, 0x9, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000001f80), 0x8}, 0x100, 0x8, 0x51b4, 0x4, 0x800, 0xb7, 0x4800}, r6, 0x8, r8, 0x1) r12 = gettid() socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000002040)) perf_event_open(&(0x7f0000002080)={0x0, 0x70, 0x100, 0x0, 0x2, 0x401, 0x0, 0x6, 0x1, 0x6, 0x656, 0x5, 0xfffffffffffff973, 0xffffffffffffffff, 0x9, 0x7, 0x3, 0x3ff, 0x1c000000, 0x10000, 0x6, 0x20, 0x6, 0x1, 0x1, 0x4, 0x2, 0x20, 0x9, 0xed5, 0x847, 0x1000, 0x0, 0x0, 0x102bed3b, 0x9, 0x7fffffff, 0x6, 0x0, 0x24, 0x0, @perf_config_ext={0x100000001, 0x6}, 0x200, 0x800000010000000, 0x7, 0x7, 0x1000, 0xf3, 0xe87}, r12, 0xf, r11, 0x8) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000002100)) perf_event_open(&(0x7f0000002180)={0x4, 0x70, 0x0, 0x8, 0xff, 0x0, 0x0, 0xfffffffffffffff9, 0x10001, 0x3, 0xffffffffffffff00, 0x93eb, 0x1, 0x4e5e, 0x8001, 0xfffffffffffffff8, 0x7, 0x0, 0x80000001, 0x99b, 0x4, 0x8, 0xed8, 0x3f, 0xec9, 0x6, 0x1, 0x4ab8, 0x8, 0x2, 0xdd, 0x9, 0xffffffffffffffff, 0x8000, 0x0, 0x6, 0xffff, 0x8, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000002140), 0xf}, 0x400, 0x5, 0x7, 0x4, 0x7, 0x4}, r12, 0x3, r7, 0x8) 2018/03/31 09:08:27 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x5, 0x0, 0x0, 0x5}, 0x2c) r1 = bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x13, 0x0, 0x0, 0x0, 0x20000003, 0x0}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x3e83, 0x8, r1}, 0x2c) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x50, &(0x7f0000000140)={0x0, 0x0}}, 0x10) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, r2, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) socketpair(0x4, 0x1, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000480)={r5, &(0x7f0000000440)="3068306ef4a0ff8256b6430a042a9b"}, 0x10) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x0, 0x8, 0x0, 0x0, r0, 0x6}, 0x2c) socketpair(0x8, 0x2, 0x0, &(0x7f0000000040)) r6 = gettid() bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=r3, 0x4) perf_event_open(&(0x7f00000003c0)={0x7, 0x70, 0x7fff, 0x5, 0x6, 0x8000, 0x0, 0x1000, 0x0, 0x7, 0x1000, 0x1, 0xffffffff, 0x3, 0xaf99, 0x40, 0x8001, 0xfffffffffffffffa, 0x1, 0x80000000, 0xe6d1, 0x4, 0x8001, 0x9, 0x1f, 0xfffffffffffffc00, 0x0, 0x0, 0x7ff, 0x15ac000000000000, 0x0, 0x3, 0x1, 0xfffffffffffffffe, 0x9, 0xff, 0x1, 0x2, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000002c0), 0x8}, 0x0, 0x3, 0x6, 0x1, 0x5, 0xb03c, 0x5}, r6, 0xc, 0xffffffffffffffff, 0xb) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000280)={0xffffffffffffffff, 0xffffff8f, &(0x7f0000000300)}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000600)={0xffffffffffffffff, &(0x7f00000004c0)="648d1c6e4e7374f62b21f1c71a7cd05c41e2a0bf36f2f23f5761a39646321c3b5e4e670bd9a8f7a3fc36d594c1799d7dec6f0ba644a16abd532529ac63497998169000b2e491e82f659738895262b6fc9c79d8e6736c91136937b9", &(0x7f0000000540)="0c39cf9403045550ce39840a2a90ca20bc744608140dcd6c55d855533bb97417ef0cd19e1990bf245f0f38ab76b7f283d20500e75742ca4151b5489f5848a6b6104b0334b5427d07a3464ecffbfda64068c2d7ea6c230ba9040eebaec2030d19884f9f815ab793bd836fdb9c142a7aa9510939e2d3b5e6f57fa56f5464911bd939ca0ab0a1c19407fc9b1b974b94401f7c82bce0926bd5"}, 0x20) [ 366.877443] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 366.882633] ? find_held_lock+0x35/0x1d0 [ 366.886690] ? __lock_is_held+0xb6/0x140 [ 366.890752] ? check_same_owner+0x320/0x320 [ 366.895067] ? print_irqtrace_events+0x270/0x270 [ 366.899824] ? rcu_note_context_switch+0x710/0x710 [ 366.904753] ? is_bpf_text_address+0x7b/0x120 [ 366.909256] should_failslab+0xec/0x120 [ 366.913233] kmem_cache_alloc+0x47/0x760 [ 366.917289] ? unwind_dump+0x4d0/0x4d0 [ 366.921181] alloc_vfsmnt+0xe0/0x9c0 [ 366.924899] ? mnt_free_id.isra.21+0x50/0x50 [ 366.929312] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 366.934502] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 366.939697] ? save_stack+0xa3/0xd0 [ 366.943325] ? save_stack+0x43/0xd0 [ 366.946956] ? __kasan_slab_free+0x11a/0x170 [ 366.951365] ? kasan_slab_free+0xe/0x10 [ 366.955334] ? kmem_cache_free+0x83/0x2a0 [ 366.959482] ? putname+0xee/0x130 [ 366.962932] ? filename_lookup+0x315/0x500 [ 366.967163] ? kern_path+0x33/0x40 [ 366.970701] ? do_mount+0xc79/0x2bb0 [ 366.974407] ? SyS_mount+0xab/0x120 2018/03/31 09:08:27 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x5, 0x0, 0x0, 0x5}, 0x2c) r1 = bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x13, 0x0, 0x0, 0x0, 0x20000003, 0x0}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x3e83, 0x8, r1}, 0x2c) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x50, &(0x7f0000000140)={0x0, 0x0}}, 0x10) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, r2, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) socketpair(0x4, 0x1, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000480)={r5, &(0x7f0000000440)="3068306ef4a0ff8256b6430a042a9b"}, 0x10) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x0, 0x8, 0x0, 0x0, r0, 0x6}, 0x2c) socketpair(0x8, 0x2, 0x0, &(0x7f0000000040)) r6 = gettid() bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=r3, 0x4) perf_event_open(&(0x7f00000003c0)={0x7, 0x70, 0x7fff, 0x5, 0x6, 0x8000, 0x0, 0x1000, 0x0, 0x7, 0x1000, 0x1, 0xffffffff, 0x3, 0xaf99, 0x40, 0x8001, 0xfffffffffffffffa, 0x1, 0x80000000, 0xe6d1, 0x4, 0x8001, 0x9, 0x1f, 0xfffffffffffffc00, 0x0, 0x0, 0x7ff, 0x15ac000000000000, 0x0, 0x3, 0x1, 0xfffffffffffffffe, 0x9, 0xff, 0x1, 0x2, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000002c0), 0x8}, 0x8004, 0x0, 0x6, 0x1, 0x5, 0xb03c, 0x5}, r6, 0xc, 0xffffffffffffffff, 0xb) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000280)={0xffffffffffffffff, 0xffffff8f, &(0x7f0000000300)}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000600)={0xffffffffffffffff, &(0x7f00000004c0)="648d1c6e4e7374f62b21f1c71a7cd05c41e2a0bf36f2f23f5761a39646321c3b5e4e670bd9a8f7a3fc36d594c1799d7dec6f0ba644a16abd532529ac63497998169000b2e491e82f659738895262b6fc9c79d8e6736c91136937b9", &(0x7f0000000540)="0c39cf9403045550ce39840a2a90ca20bc744608140dcd6c55d855533bb97417ef0cd19e1990bf245f0f38ab76b7f283d20500e75742ca4151b5489f5848a6b6104b0334b5427d07a3464ecffbfda64068c2d7ea6c230ba9040eebaec2030d19884f9f815ab793bd836fdb9c142a7aa9510939e2d3b5e6f57fa56f5464911bd939ca0ab0a1c19407fc9b1b974b94401f7c82bce0926bd5"}, 0x20) 2018/03/31 09:08:27 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x5, 0x100000000209e20, 0x8000000001, 0x5}, 0x2c) r1 = bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x13, 0x0, 0x7ffff9, 0x0, 0x20000003, 0x0}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xe, 0x0, 0x7f, 0x3e83, 0x8, r1, 0x80000000}, 0x2c) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x50, &(0x7f0000000140)={0x0, 0x0}}, 0x10) socket$kcm(0x29, 0x2, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r4 = perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) socketpair(0x4, 0x1, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r5, 0x2401, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000480)={r6, &(0x7f0000000440)="3068306ef4a0ff8256b6430a042a9b"}, 0x10) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r6, 0x40042409, 0x1) r7 = getpid() perf_event_open(&(0x7f0000000940)={0x1, 0x70, 0x1, 0x0, 0x120000000000, 0x1ff, 0x0, 0x1, 0x20209, 0x1, 0x5, 0x1cc, 0x101, 0x9, 0x7fff, 0x10, 0x180000000000000, 0xff, 0x9e, 0x3, 0x60e, 0x6, 0xfff, 0x79, 0x1, 0x2, 0x1, 0x1, 0x8, 0xcc1, 0x5, 0x9, 0x2, 0x2, 0x8, 0x8, 0x5, 0xfffffffffffffff8, 0x0, 0x4, 0x2, @perf_config_ext={0x0, 0x2}, 0x22082, 0xffffffffffffff84, 0x5, 0x7, 0x7fff, 0xffff, 0x747d}, r7, 0x0, r4, 0x8) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, r5) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x0, 0x8, 0x0, 0x0, r0, 0x6}, 0x2c) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)) r8 = perf_event_open(&(0x7f000025c000)={0x5, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r9 = gettid() r10 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0xfff, 0x100000001, 0xfffffffffffffffb, 0x0, 0x8001, 0x0, 0x1, 0x0, 0xfffffffffffffff9, 0x0, 0x9, 0x9, 0x5, 0x8, 0x1, 0x8106, 0x0, 0x14000000000, 0x80000000, 0x1, 0x5, 0x0, 0x40, 0x2839, 0x1d, 0x800, 0x7, 0x0, 0x0, 0x5, 0x7, 0x0, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x4}, 0x0, 0x0, 0xff, 0x0, 0x3, 0x8, 0x3}, r9, 0x2, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=r3, 0x4) perf_event_open(&(0x7f00000003c0)={0x7, 0x70, 0x7fff, 0x5, 0x6, 0x8000, 0x0, 0x1000, 0x0, 0x7, 0x1000, 0x1, 0xffffffff, 0x3, 0xaf99, 0x40, 0x8001, 0xfffffffffffffffa, 0x1, 0x80000000, 0xe6d1, 0x4, 0x8001, 0x9, 0x1f, 0xfffffffffffffc00, 0x0, 0x0, 0x7ff, 0x15ac000000000000, 0x0, 0x3, 0x1, 0xfffffffffffffffe, 0x9, 0xff, 0x1, 0x2, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000002c0), 0x8}, 0x0, 0x3, 0x6, 0x1, 0x5, 0xb03c, 0x5}, r9, 0xc, r10, 0xb) bpf$MAP_CREATE(0x0, &(0x7f0000000640)={0x8, 0x6bcb8e63, 0x0, 0x59ad, 0x12, r0, 0x8001}, 0x2c) recvmsg(r8, &(0x7f0000005ac0)={&(0x7f0000004900)=@hci={0x0, 0x0}, 0x80, &(0x7f0000005a00)=[{&(0x7f0000004980)=""/4096, 0x1000}, {&(0x7f0000005980)=""/39, 0x27}, {&(0x7f00000059c0)=""/30, 0x1e}], 0x3, &(0x7f0000005a40)=""/88, 0x58, 0x1}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000005b00)={0xb, 0x15, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x2}, [@map={0x18, 0xe, 0x1, 0x0, r2}, @exit={0x95}, @call={0x85, 0x0, 0x0, 0x9}, @initr0={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101}, @exit={0x95}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x2f}, @exit={0x95}, @ldst={0x1, 0x1, 0x0, 0xd, 0xa, 0x107, 0x18}], {0x95}}, &(0x7f0000000780)='syzkaller\x00', 0x8, 0x93, &(0x7f00000007c0)=""/147, 0x41f00, 0x1, [], r11}, 0x48) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000880)={r0, &(0x7f0000000840), &(0x7f00000008c0)=""/70}, 0x375) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000280)={0xffffffffffffffff, 0xffffff8f, &(0x7f0000000300)}, 0x10) recvmsg$kcm(r6, &(0x7f0000002700)={&(0x7f0000002580)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f00000026c0)=[{&(0x7f0000002600)=""/165, 0xa5}], 0x1}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000002740)={0xb, 0xc, &(0x7f00000004c0)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0xfffffffffffffffa}, @map={0x18, 0x0, 0x1, 0x0, r1}, @ldst={0x2, 0x3, 0x6, 0xa, 0x4, 0xffffffc0, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x18}, @alu={0x4, 0x400, 0xb, 0xa, 0x0, 0xfffffff8}, @exit={0x95}], &(0x7f0000000540)='syzkaller\x00', 0x81, 0xc8, &(0x7f0000000680)=""/200, 0x41000, 0x1, [], r12}, 0x48) [ 366.978029] ? do_syscall_64+0x281/0x940 [ 366.982096] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 366.987456] ? debug_check_no_obj_freed+0x3da/0xf1f [ 366.992474] ? lockref_get_not_dead+0x66/0x80 [ 366.996973] clone_mnt+0x118/0x11d0 [ 367.000597] ? mark_mounts_for_expiry+0x7f0/0x7f0 [ 367.005440] ? trace_hardirqs_off+0x10/0x10 [ 367.009759] ? get_mountpoint+0xb7/0x3c0 [ 367.013816] ? lock_downgrade+0x980/0x980 [ 367.017962] ? __lock_is_held+0xb6/0x140 [ 367.022025] ? get_mountpoint+0xc9/0x3c0 [ 367.026085] ? rcu_read_lock_sched_held+0x108/0x120 2018/03/31 09:08:27 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xf, 0x5, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x80000000}, [@map={0x18, 0x1, 0x1, 0x0, 0x1}], {0x95}}, &(0x7f0000000040)='syzkaller\x00', 0x3, 0x10, &(0x7f0000000080)=""/16, 0x41000, 0x2f3100a785778bd1}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000001c0)={r0, 0x50, &(0x7f0000000140)}, 0x10) close(r0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000780)={&(0x7f0000000240)=@ax25, 0x80, &(0x7f0000000600)=[{&(0x7f00000002c0)=""/114, 0x72}, {&(0x7f0000000340)=""/133, 0x85}, {&(0x7f0000000400)=""/23, 0x17}, {&(0x7f0000000440)=""/59, 0x3b}, {&(0x7f0000000480)=""/114, 0x72}, {&(0x7f0000000500)=""/45, 0x2d}, {&(0x7f0000000540)=""/83, 0x53}, {&(0x7f00000005c0)}], 0x8, &(0x7f0000000680)=""/214, 0xd6, 0x100}, 0x40) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000007c0)={0xffffffffffffffff}) recvmsg(r2, &(0x7f00000019c0)={&(0x7f0000000800)=@ax25, 0x80, &(0x7f00000018c0)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000001880)=""/18, 0x12}], 0x2, &(0x7f0000001900)=""/184, 0xb8, 0x3}, 0x1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001a80)={r4, 0x50, &(0x7f0000001a00)}, 0x10) r5 = perf_event_open(&(0x7f0000001b00)={0x2, 0x70, 0x6, 0x8, 0x80000000, 0x10001, 0x0, 0x7ff, 0x4, 0xa, 0x200, 0x20, 0x72, 0x5, 0x0, 0x0, 0x5, 0x8f, 0x9ed, 0xff, 0x0, 0xa58, 0x7f, 0xf2f, 0x4503, 0x6, 0x81, 0x5, 0x1ff, 0xffffffff00000000, 0x2, 0x5, 0x9000000000000, 0xfffffffffffffffa, 0x8, 0x10001, 0x731ab510, 0x9, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000001ac0), 0x1}, 0x80, 0x2b4, 0x200, 0x3, 0x6, 0x9, 0x4}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0x20000) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000001b80)) r6 = getpid() r7 = perf_event_open(&(0x7f0000001c00)={0x1, 0x70, 0x0, 0xfff, 0x4, 0x80000000, 0x0, 0x3, 0x40, 0xa, 0x7, 0x7, 0x7, 0x4800000000000000, 0x7, 0x6, 0x62b, 0x8, 0x9, 0x100000000, 0x1, 0x0, 0x5, 0xd199, 0x1f, 0x10000, 0xff80000000000000, 0x3, 0x4, 0x8, 0x80000001, 0x8000, 0x7fff, 0x4, 0x16, 0x7, 0x40, 0x8, 0x0, 0x5, 0x50031dd1e89e26d1, @perf_bp={&(0x7f0000001bc0), 0x2}, 0x10000, 0x3a, 0x80000001, 0x1, 0x2c, 0x3ff, 0x6}, r6, 0x6, r3, 0x3) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000001c80)=r0, 0x4) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000001cc0)) ioctl$PERF_EVENT_IOC_REFRESH(r7, 0x2402, 0xffffffff) r8 = perf_event_open(&(0x7f0000001d00)={0x0, 0x70, 0x7, 0x400, 0x100, 0xac, 0x0, 0x100000000, 0xc2800, 0xa, 0x33e3, 0x2, 0x10001, 0x8, 0x5, 0x100000001, 0x2e9, 0x2, 0xc1, 0xf2, 0x2, 0x9, 0xffff, 0x7, 0x1, 0x0, 0x8000, 0x800, 0xfffffffffffffffa, 0x40, 0x0, 0x3, 0x6, 0xfa4, 0x7, 0xffffffffffff8000, 0x0, 0x0, 0x0, 0x8000, 0x3, @perf_config_ext={0x400}, 0x100, 0xa264, 0x4, 0x7, 0x2, 0x1000, 0x92}, r6, 0x5, r7, 0x1) socketpair(0x7, 0x6, 0x1, &(0x7f0000001d80)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000001e00)={&(0x7f0000001dc0)='./file0\x00', r9}, 0x10) r10 = perf_event_open(&(0x7f0000001e40)={0x4, 0x70, 0x5, 0x4, 0x8, 0x6, 0x0, 0x2, 0x1425, 0xb, 0x0, 0xcc9, 0x400, 0x57f90db4, 0x80000000, 0x7, 0x1000, 0x0, 0x8, 0x8000, 0xffffffff, 0x400, 0x1, 0x6, 0x40, 0x2, 0x10000, 0x8, 0x9, 0xfffffffffffffff8, 0x9, 0x4, 0x3, 0x400, 0x3, 0x9, 0x3, 0x100, 0x0, 0x6, 0x0, @perf_config_ext={0x4, 0x2}, 0x20, 0x3ff, 0x0, 0x7, 0x3, 0x5, 0xfa5e}, r6, 0xd, r7, 0x2) bpf$OBJ_GET_MAP(0x7, &(0x7f0000001f00)={&(0x7f0000001ec0)='./file0\x00'}, 0x10) socketpair$inet6_sctp(0xa, 0x0, 0x84, &(0x7f0000001f40)) ioctl$PERF_EVENT_IOC_DISABLE(r10, 0x2401, 0xbad) r11 = perf_event_open(&(0x7f0000001fc0)={0x3, 0x70, 0xff, 0x2f, 0x2, 0x7, 0x0, 0x40, 0x80000, 0x1, 0x8, 0x6, 0xfffffffffffffffb, 0x7, 0x2, 0x10000, 0x6, 0x5, 0x0, 0x10, 0x6, 0xc58, 0x7f, 0x3, 0x2, 0x3, 0x5, 0x80000000800000, 0x7, 0xfff, 0x16, 0x2b65, 0x9, 0x69244395, 0x10000, 0x4, 0x9, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000001f80), 0x8}, 0x100, 0x8, 0x51b4, 0x4, 0x800, 0xb7, 0x4800}, r6, 0x8, r8, 0x1) r12 = gettid() socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000002040)) perf_event_open(&(0x7f0000002080)={0x0, 0x70, 0x100, 0x0, 0x2, 0x401, 0x0, 0x6, 0x1, 0x6, 0x656, 0x5, 0xfffffffffffff973, 0xffffffffffffffff, 0x9, 0x7, 0x3, 0x3ff, 0x1c000000, 0x10000, 0x6, 0x20, 0x6, 0x1, 0x1, 0x4, 0x2, 0x20, 0x9, 0xed5, 0x847, 0x1000, 0x0, 0x0, 0x102bed3b, 0x9, 0x7fffffff, 0x6, 0x0, 0x24, 0x0, @perf_config_ext={0x100000001, 0x6}, 0x200, 0x800000010000000, 0x7, 0x7, 0x1000, 0xf3, 0xe87}, r12, 0xf, r11, 0x8) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000002100)) perf_event_open(&(0x7f0000002180)={0x4, 0x70, 0x0, 0x8, 0xff, 0x0, 0x0, 0xfffffffffffffff9, 0x10001, 0x3, 0xffffffffffffff00, 0x93eb, 0x1, 0x4e5e, 0x8001, 0xfffffffffffffff8, 0x7, 0x1f4, 0x0, 0x99b, 0x4, 0x8, 0xed8, 0x3f, 0xec9, 0x6, 0x1, 0x4ab8, 0x8, 0x2, 0xdd, 0x9, 0xffffffffffffffff, 0x8000, 0x0, 0x6, 0xffff, 0x8, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000002140), 0xf}, 0x400, 0x5, 0x7, 0x4, 0x7, 0x4}, r12, 0x3, r7, 0x8) [ 367.031103] copy_tree+0x133/0xa40 [ 367.034639] ? down_read+0x150/0x150 [ 367.038348] ? to_mnt_ns+0x20/0x20 [ 367.041879] ? lock_mount+0xf4/0x2c0 [ 367.045589] do_mount+0x1fb9/0x2bb0 [ 367.049215] ? copy_mount_string+0x40/0x40 [ 367.053444] ? rcu_pm_notify+0xc0/0xc0 [ 367.057332] ? copy_mount_options+0x5f/0x2e0 [ 367.061742] ? kmem_cache_alloc_trace+0x459/0x740 [ 367.066585] ? kasan_check_write+0x14/0x20 [ 367.070818] ? _copy_from_user+0x99/0x110 [ 367.074964] ? copy_mount_options+0x1f7/0x2e0 [ 367.079459] SyS_mount+0xab/0x120 [ 367.082913] ? copy_mnt_ns+0xb30/0xb30 [ 367.086803] do_syscall_64+0x281/0x940 [ 367.091220] ? vmalloc_sync_all+0x30/0x30 [ 367.095364] ? _raw_spin_unlock_irq+0x27/0x70 [ 367.099860] ? finish_task_switch+0x1c1/0x7e0 [ 367.104385] ? syscall_return_slowpath+0x550/0x550 [ 367.109326] ? syscall_return_slowpath+0x2ac/0x550 [ 367.114269] ? prepare_exit_to_usermode+0x350/0x350 [ 367.119291] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 367.124657] ? trace_hardirqs_off_thunk+0x1a/0x1c 2018/03/31 09:08:27 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x5, 0x100000000209e20, 0x8000000001, 0x5}, 0x2c) r1 = bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x13, 0x0, 0x7ffff9, 0x0, 0x20000003, 0x0}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xe, 0x0, 0x7f, 0x3e83, 0x8, r1, 0x80000000}, 0x2c) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000500)=0xffffffff, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000540)={r2, 0x50, &(0x7f0000000140)={0x0, 0x0}}, 0x140) socket$kcm(0x29, 0x2, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) socketpair(0x4, 0x1, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000480)={r5, &(0x7f0000000440)="3068306ef4a0ff8256b6430a042a9b"}, 0x10) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x1) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r4) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x0, 0x8, 0x0, 0x0, r0, 0x6}, 0x2c) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)) perf_event_open(&(0x7f000025c000)={0x5, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = gettid() r7 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0xfff, 0x100000001, 0xfffffffffffffffb, 0x0, 0x8001, 0x0, 0x1, 0x0, 0xfffffffffffffff9, 0x0, 0x9, 0x9, 0x5, 0x8, 0x1, 0x8106, 0x0, 0x14000000000, 0x80000000, 0x1, 0x5, 0x0, 0x40, 0x2839, 0x1d, 0x800, 0x7, 0x0, 0x0, 0x5, 0x7, 0x0, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x4}, 0x0, 0x0, 0xff, 0x0, 0x3, 0x8, 0x3}, r6, 0x2, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=r3, 0x4) perf_event_open(&(0x7f00000003c0)={0x7, 0x70, 0x7fff, 0x5, 0x6, 0x8000, 0x0, 0x1000, 0x0, 0x7, 0x1000, 0x1, 0xffffffff, 0x3, 0xaf99, 0x40, 0x8001, 0xfffffffffffffffa, 0x1, 0x80000000, 0xe6d1, 0x4, 0x8001, 0x9, 0x1f, 0xfffffffffffffc00, 0x0, 0x0, 0x7ff, 0x15ac000000000000, 0x0, 0x3, 0x1, 0xfffffffffffffffe, 0x9, 0xff, 0x1, 0x2, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000002c0), 0x8}, 0x0, 0x3, 0x6, 0x1, 0x5, 0xb03c, 0x5}, r6, 0xc, r7, 0xb) bpf$MAP_CREATE(0x0, &(0x7f0000000640)={0x8, 0x6bcb8e63, 0x0, 0x59ad, 0x12, r0, 0x8001}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000880)={r0, &(0x7f0000000840), &(0x7f00000008c0)=""/70}, 0x375) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000280)={0xffffffffffffffff, 0xffffff8f, &(0x7f0000000300)}, 0x10) 2018/03/31 09:08:27 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x5, 0x100000000209e20, 0x8000000001, 0x5}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x13, 0x0, 0x7ffff9, 0x0, 0x20000003, 0x0}, 0x2c) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x13, 0x0, 0x0, 0x0, 0x20000003, 0x0}, 0x2c) [ 367.129510] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 367.134694] RIP: 0033:0x454e79 [ 367.137876] RSP: 002b:00007fd81e272c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 367.145580] RAX: ffffffffffffffda RBX: 00007fd81e2736d4 RCX: 0000000000454e79 [ 367.152845] RDX: 0000000020000780 RSI: 0000000020000ac0 RDI: 0000000020000000 [ 367.160109] RBP: 000000000072bea0 R08: 0000000020000b00 R09: 0000000000000000 [ 367.167375] R10: 0000000000037002 R11: 0000000000000246 R12: 0000000000000016 [ 367.174642] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000005 2018/03/31 09:08:27 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x5, 0x0, 0x0, 0x5}, 0x2c) r1 = bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x13, 0x0, 0x0, 0x0, 0x20000003, 0x0}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x3e83, 0x8, r1}, 0x2c) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x50, &(0x7f0000000140)={0x0, 0x0}}, 0x10) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, r2, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) socketpair(0x4, 0x1, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000480)={r5, &(0x7f0000000440)="3068306ef4a0ff8256b6430a042a9b"}, 0x10) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x0, 0x8, 0x0, 0x0, r0, 0x6}, 0x2c) socketpair(0x8, 0x2, 0x0, &(0x7f0000000040)) r6 = gettid() bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=r3, 0x4) perf_event_open(&(0x7f00000003c0)={0x7, 0x70, 0x7fff, 0x5, 0x6, 0x8000, 0x0, 0x1000, 0x0, 0x7, 0x1000, 0x1, 0xffffffff, 0x3, 0xaf99, 0x40, 0x8001, 0xfffffffffffffffa, 0x1, 0x80000000, 0xe6d1, 0x4, 0x8001, 0x9, 0x1f, 0xfffffffffffffc00, 0x0, 0x0, 0x7ff, 0x15ac000000000000, 0x0, 0x3, 0x1, 0xfffffffffffffffe, 0x9, 0xff, 0x1, 0x2, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000002c0), 0x8}, 0x8004, 0x0, 0x6, 0x1, 0x5, 0xb03c, 0x5}, r6, 0xc, 0xffffffffffffffff, 0xb) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000280)={0xffffffffffffffff, 0xffffff8f, &(0x7f0000000300)}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000600)={0xffffffffffffffff, &(0x7f00000004c0)="648d1c6e4e7374f62b21f1c71a7cd05c41e2a0bf36f2f23f5761a39646321c3b5e4e670bd9a8f7a3fc36d594c1799d7dec6f0ba644a16abd532529ac63497998169000b2e491e82f659738895262b6fc9c79d8e6736c91136937b9", &(0x7f0000000540)="0c39cf9403045550ce39840a2a90ca20bc744608140dcd6c55d855533bb97417ef0cd19e1990bf245f0f38ab76b7f283d20500e75742ca4151b5489f5848a6b6104b0334b5427d07a3464ecffbfda64068c2d7ea6c230ba9040eebaec2030d19884f9f815ab793bd836fdb9c142a7aa9510939e2d3b5e6f57fa56f5464911bd939ca0ab0a1c19407fc9b1b974b94401f7c82bce0926bd5"}, 0x20) 2018/03/31 09:08:27 executing program 1 (fault-call:20 fault-nth:28): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)={0xffffffffffffffff}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x0, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r5 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f00000009c0)={r4}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg(r3, &(0x7f0000000cc0)={&(0x7f0000000400)=@ethernet={0x1}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000580)="4589496d6a3bfcccae07dc729c52ee6bdf10d9cf221f605c25f790103018703b9a67491f96c3f9f8d07204ee4adf21acce1afdaedaba1228b4d33c3fa702a46b1329a0e52eea6a7908fd375ace47", 0x4e}], 0x1, &(0x7f0000000700), 0x0, 0x40000}, 0x4044080) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000740)={0xffffffffffffffff, &(0x7f0000000700)="ec1b815b5cc95d6e0dff859791e3341b8790dcb187f25418f8003a2b3bf345dc"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") close(0xffffffffffffffff) 2018/03/31 09:08:27 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000a40)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x0, 0x0) socketpair(0x2, 0x0, 0x0, &(0x7f0000000640)={0xffffffffffffffff}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r6 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x0, 0x10000, 0x1182, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f00000009c0)={r4}) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000280)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000a00)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg(r3, &(0x7f0000000cc0)={&(0x7f0000000400)=@ethernet={0x1}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000580)="4589496d6a3bfcccae07dc729c52ee6bdf10d9cf221f605c25f790103018703b9a67491f96c3f9f8d07204ee4adf21acce1afdaedaba1228b4d33c3fa702a46b1329a0e52eea6a7908fd375ace47", 0x4e}], 0x1, &(0x7f0000000700), 0x0, 0x40000}, 0x4044080) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000740)={r5, &(0x7f0000000700)="ec1b815b5cc95d6e0dff859791e3341b8790dcb187f25418f8003a2b3bf345dc"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x0, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") close(0xffffffffffffffff) 2018/03/31 09:08:27 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x0, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) ioctl$PERF_EVENT_IOC_RESET(r5, 0x2403, 0x2) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f00000009c0)={r4}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) ioctl$PERF_EVENT_IOC_RESET(r4, 0x2403, 0x2) sendmsg(r3, &(0x7f0000000cc0)={&(0x7f0000000400)=@ethernet={0x1}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000580)="4589496d6a3bfcccae07dc729c52ee6bdf10d9cf221f605c25f790103018703b9a67491f96c3f9f8d07204ee4adf21acce1afdaedaba1228b4d33c3fa702a46b1329a0e52eea6a7908fd375ace47", 0x4e}], 0x1, &(0x7f0000000700), 0x0, 0x40000}, 0x4044080) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000280)={r6, &(0x7f0000000700)="ec1b815b5cc95d6e0dff859791e3341b"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)={0x3, 0x40000100, 0x56c96e7a, 0xea, 0x1, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") close(0xffffffffffffffff) 2018/03/31 09:08:27 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xf, 0x5, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x80000000}, [@map={0x18, 0x1, 0x1, 0x0, 0x1}], {0x95}}, &(0x7f0000000040)='syzkaller\x00', 0x3, 0x10, &(0x7f0000000080)=""/16, 0x41000, 0x2f3100a785778bd1}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000001c0)={r0, 0x50, &(0x7f0000000140)}, 0x10) close(r0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000780)={&(0x7f0000000240)=@ax25, 0x80, &(0x7f0000000600)=[{&(0x7f00000002c0)=""/114, 0x72}, {&(0x7f0000000340)=""/133, 0x85}, {&(0x7f0000000400)=""/23, 0x17}, {&(0x7f0000000440)=""/59, 0x3b}, {&(0x7f0000000480)=""/114, 0x72}, {&(0x7f0000000500)=""/45, 0x2d}, {&(0x7f0000000540)=""/83, 0x53}, {&(0x7f00000005c0)}], 0x8, &(0x7f0000000680)=""/214, 0xd6, 0x100}, 0x40) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000007c0)={0xffffffffffffffff}) recvmsg(r2, &(0x7f00000019c0)={&(0x7f0000000800)=@ax25, 0x80, &(0x7f00000018c0)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000001880)=""/18, 0x12}], 0x2, &(0x7f0000001900)=""/184, 0xb8, 0x3}, 0x1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001a80)={r4, 0x50, &(0x7f0000001a00)}, 0x10) r5 = perf_event_open(&(0x7f0000001b00)={0x2, 0x70, 0x6, 0x8, 0x80000000, 0x10001, 0x0, 0x7ff, 0x4, 0xa, 0x200, 0x20, 0x72, 0x5, 0x0, 0x0, 0x5, 0x8f, 0x9ed, 0xff, 0x0, 0xa58, 0x7f, 0xf2f, 0x4503, 0x6, 0x81, 0x5, 0x1ff, 0xffffffff00000000, 0x2, 0x5, 0x9000000000000, 0xfffffffffffffffa, 0x8, 0x10001, 0x731ab510, 0x9, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000001ac0), 0x1}, 0x80, 0x2b4, 0x200, 0x3, 0x6, 0x9, 0x4}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0x20000) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000001b80)) r6 = getpid() r7 = perf_event_open(&(0x7f0000001c00)={0x1, 0x70, 0x0, 0xfff, 0x4, 0x80000000, 0x0, 0x3, 0x40, 0xa, 0x7, 0x7, 0x7, 0x4800000000000000, 0x7, 0x6, 0x62b, 0x8, 0x9, 0x100000000, 0x1, 0x0, 0x5, 0xd199, 0x1f, 0x10000, 0xff80000000000000, 0x3, 0x4, 0x8, 0x80000001, 0x8000, 0x7fff, 0x4, 0x16, 0x7, 0x40, 0x8, 0x0, 0x5, 0x50031dd1e89e26d1, @perf_bp={&(0x7f0000001bc0), 0x2}, 0x10000, 0x3a, 0x80000001, 0x1, 0x2c, 0x3ff, 0x6}, r6, 0x6, r3, 0x3) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000001c80)=r0, 0x4) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000001cc0)) ioctl$PERF_EVENT_IOC_REFRESH(r7, 0x2402, 0xffffffff) r8 = perf_event_open(&(0x7f0000001d00)={0x0, 0x70, 0x7, 0x400, 0x100, 0xac, 0x0, 0x100000000, 0xc2800, 0xa, 0x33e3, 0x2, 0x10001, 0x8, 0x5, 0x100000001, 0x2e9, 0x2, 0xc1, 0xf2, 0x2, 0x9, 0xffff, 0x7, 0x1, 0x0, 0x8000, 0x800, 0xfffffffffffffffa, 0x40, 0x0, 0x3, 0x6, 0xfa4, 0x7, 0xffffffffffff8000, 0x0, 0x0, 0x0, 0x8000, 0x3, @perf_config_ext={0x400}, 0x100, 0xa264, 0x4, 0x7, 0x2, 0x1000, 0x92}, r6, 0x5, r7, 0x1) socketpair(0x7, 0x6, 0x1, &(0x7f0000001d80)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000001e00)={&(0x7f0000001dc0)='./file0\x00', r9}, 0x10) r10 = perf_event_open(&(0x7f0000001e40)={0x4, 0x70, 0x5, 0x4, 0x8, 0x6, 0x0, 0x2, 0x1425, 0xb, 0x0, 0xcc9, 0x400, 0x57f90db4, 0x80000000, 0x7, 0x1000, 0x0, 0x8, 0x8000, 0xffffffff, 0x400, 0x1, 0x6, 0x40, 0x2, 0x10000, 0x8, 0x9, 0xfffffffffffffff8, 0x9, 0x4, 0x3, 0x400, 0x3, 0x9, 0x3, 0x100, 0x0, 0x6, 0x0, @perf_config_ext={0x4, 0x2}, 0x20, 0x3ff, 0x0, 0x7, 0x3, 0x5, 0xfa5e}, r6, 0xd, r7, 0x2) bpf$OBJ_GET_MAP(0x7, &(0x7f0000001f00)={&(0x7f0000001ec0)='./file0\x00'}, 0x10) socketpair$inet6_sctp(0xa, 0x0, 0x84, &(0x7f0000001f40)) ioctl$PERF_EVENT_IOC_DISABLE(r10, 0x2401, 0xbad) r11 = perf_event_open(&(0x7f0000001fc0)={0x3, 0x70, 0xff, 0x2f, 0x2, 0x7, 0x0, 0x40, 0x80000, 0x1, 0x8, 0x6, 0xfffffffffffffffb, 0x7, 0x2, 0x10000, 0x6, 0x5, 0x0, 0x10, 0x6, 0xc58, 0x7f, 0x3, 0x2, 0x3, 0x5, 0x80000000800000, 0x7, 0xfff, 0x16, 0x2b65, 0x9, 0x69244395, 0x10000, 0x4, 0x9, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000001f80), 0x8}, 0x100, 0x8, 0x51b4, 0x4, 0x800, 0xb7, 0x4800}, r6, 0x8, r8, 0x1) r12 = gettid() socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000002040)) perf_event_open(&(0x7f0000002080)={0x0, 0x70, 0x100, 0x0, 0x2, 0x401, 0x0, 0x6, 0x1, 0x6, 0x656, 0x5, 0xfffffffffffff973, 0xffffffffffffffff, 0x9, 0x7, 0x3, 0x3ff, 0x1c000000, 0x10000, 0x6, 0x20, 0x6, 0x1, 0x1, 0x4, 0x2, 0x20, 0x9, 0xed5, 0x847, 0x1000, 0x0, 0x0, 0x102bed3b, 0x9, 0x7fffffff, 0x6, 0x0, 0x24, 0x0, @perf_config_ext={0x100000001, 0x6}, 0x200, 0x800000010000000, 0x7, 0x7, 0x1000, 0xf3, 0xe87}, r12, 0xf, r11, 0x8) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000002100)) perf_event_open(&(0x7f0000002180)={0x4, 0x70, 0x0, 0x8, 0xff, 0x0, 0x0, 0xfffffffffffffff9, 0x10001, 0x3, 0xffffffffffffff00, 0x93eb, 0x1, 0x4e5e, 0x8001, 0xfffffffffffffff8, 0x7, 0x1f4, 0x0, 0x99b, 0x4, 0x8, 0xed8, 0x3f, 0xec9, 0x6, 0x1, 0x4ab8, 0x8, 0x2, 0xdd, 0x9, 0xffffffffffffffff, 0x8000, 0x0, 0x6, 0xffff, 0x8, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000002140), 0xf}, 0x400, 0x5, 0x7, 0x4, 0x7, 0x4}, r12, 0x3, r7, 0x8) 2018/03/31 09:08:27 executing program 7 (fault-call:26 fault-nth:6): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)={0xffffffffffffffff}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x0, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r5 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x0, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f00000009c0)={r4}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg(r3, &(0x7f0000000cc0)={&(0x7f0000000400)=@ethernet={0x1}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000580)="4589496d6a3bfcccae07dc729c52ee6bdf10d9cf221f605c25f790103018703b9a67491f96c3f9f8d07204ee4adf21acce1afdaedaba1228b4d33c3fa702a46b1329a0e52eea6a7908fd375ace47", 0x4e}], 0x1, &(0x7f0000000700), 0x0, 0x40000}, 0x4044080) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000740)={0xffffffffffffffff, &(0x7f0000000700)="ec1b815b5cc95d6e0dff859791e3341b8790dcb187f25418f8003a2b3bf345"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") close(0xffffffffffffffff) [ 367.368226] FAULT_INJECTION: forcing a failure. [ 367.368226] name failslab, interval 1, probability 0, space 0, times 0 [ 367.379538] CPU: 1 PID: 10548 Comm: syz-executor1 Not tainted 4.16.0-rc6+ #43 [ 367.386821] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 367.396176] Call Trace: [ 367.398768] dump_stack+0x194/0x24d [ 367.402408] ? arch_local_irq_restore+0x53/0x53 [ 367.407080] ? __save_stack_trace+0x7e/0xd0 [ 367.411412] should_fail+0x8c0/0xa40 [ 367.415134] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 367.420245] ? kasan_kmalloc+0xad/0xe0 [ 367.424131] ? kmem_cache_alloc_trace+0x136/0x740 [ 367.428957] ? __memcg_init_list_lru_node+0x169/0x270 [ 367.434127] ? __list_lru_init+0x544/0x750 [ 367.438341] ? sget_userns+0x6b1/0xe40 [ 367.442209] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 367.446943] ? do_mount+0xea4/0x2bb0 [ 367.450633] ? SyS_mount+0xab/0x120 [ 367.454245] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 367.459595] ? find_held_lock+0x35/0x1d0 [ 367.463643] ? __lock_is_held+0xb6/0x140 [ 367.467698] ? check_same_owner+0x320/0x320 [ 367.472003] ? rcu_note_context_switch+0x710/0x710 [ 367.476925] should_failslab+0xec/0x120 [ 367.480883] kmem_cache_alloc_trace+0x4b/0x740 [ 367.485445] ? __kmalloc_node+0x33/0x70 [ 367.489398] ? __kmalloc_node+0x33/0x70 [ 367.493354] ? rcu_read_lock_sched_held+0x108/0x120 [ 367.498355] __memcg_init_list_lru_node+0x169/0x270 [ 367.503354] ? list_lru_add+0x7c0/0x7c0 [ 367.507308] ? __kmalloc_node+0x47/0x70 [ 367.511267] __list_lru_init+0x544/0x750 [ 367.515311] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 367.521183] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 367.526187] ? lockdep_init_map+0x9/0x10 [ 367.530230] sget_userns+0x6b1/0xe40 [ 367.533922] ? set_anon_super+0x20/0x20 [ 367.537880] ? put_filp+0x90/0x90 [ 367.541314] ? destroy_unused_super.part.6+0xd0/0xd0 [ 367.546396] ? alloc_vfsmnt+0x762/0x9c0 [ 367.550352] ? path_lookupat+0x238/0xba0 [ 367.554392] ? mnt_free_id.isra.21+0x50/0x50 [ 367.558781] ? trace_hardirqs_off+0x10/0x10 [ 367.563084] ? putname+0xee/0x130 [ 367.566523] ? cap_capable+0x1b5/0x230 [ 367.570395] ? security_capable+0x8e/0xc0 [ 367.574526] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 367.579696] ? ns_capable_common+0xcf/0x160 [ 367.584000] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 367.589171] mount_ns+0x6d/0x190 [ 367.592519] rpc_mount+0x9e/0xd0 [ 367.595870] mount_fs+0x66/0x2d0 [ 367.599220] vfs_kern_mount.part.26+0xc6/0x4a0 [ 367.603781] ? may_umount+0xa0/0xa0 [ 367.607389] ? _raw_read_unlock+0x22/0x30 [ 367.611520] ? __get_fs_type+0x8a/0xc0 [ 367.615401] do_mount+0xea4/0x2bb0 [ 367.618920] ? __might_fault+0x110/0x1d0 [ 367.622968] ? copy_mount_string+0x40/0x40 [ 367.627181] ? __check_object_size+0x8b/0x530 [ 367.631661] ? __might_sleep+0x95/0x190 [ 367.635622] ? kasan_check_write+0x14/0x20 [ 367.639836] ? _copy_from_user+0x99/0x110 [ 367.643969] ? memdup_user+0x5e/0x90 [ 367.647660] ? copy_mount_options+0x1f7/0x2e0 [ 367.652138] SyS_mount+0xab/0x120 [ 367.655571] ? copy_mnt_ns+0xb30/0xb30 [ 367.659440] do_syscall_64+0x281/0x940 [ 367.663306] ? vmalloc_sync_all+0x30/0x30 [ 367.667432] ? _raw_spin_unlock_irq+0x27/0x70 [ 367.671910] ? finish_task_switch+0x1c1/0x7e0 [ 367.676385] ? syscall_return_slowpath+0x550/0x550 [ 367.681295] ? syscall_return_slowpath+0x2ac/0x550 [ 367.686204] ? prepare_exit_to_usermode+0x350/0x350 [ 367.691202] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 367.696549] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 367.701373] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 367.706539] RIP: 0033:0x454e79 [ 367.709708] RSP: 002b:00007fed74635c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 2018/03/31 09:08:27 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x5, 0x100000000209e20, 0x8000000001, 0x5}, 0x2c) r1 = bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x13, 0x0, 0x7ffff9, 0x0, 0x20000003, 0x0}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xe, 0x0, 0x7f, 0x3e83, 0x8, r1, 0x80000000}, 0x2c) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x50, &(0x7f0000000140)={0x0, 0x0}}, 0x10) socket$kcm(0x29, 0x2, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) socketpair(0x4, 0x1, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r3, 0x2401, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000480)={r4, &(0x7f0000000440)="3068306ef4a0ff8256b6430a042a9b"}, 0x10) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40042409, 0x1) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r3) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x0, 0x8, 0x0, 0x0, r0, 0x6}, 0x2c) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)) perf_event_open(&(0x7f000025c000)={0x5, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = gettid() r6 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0xfff, 0x100000001, 0xfffffffffffffffb, 0x0, 0x8001, 0x0, 0x1, 0x0, 0xfffffffffffffff9, 0x0, 0x9, 0x9, 0x5, 0x8, 0x1, 0x8106, 0x0, 0x14000000000, 0x80000000, 0x1, 0x5, 0x0, 0x40, 0x2839, 0x1d, 0x800, 0x7, 0x0, 0x0, 0x5, 0x7, 0x0, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x4}, 0x0, 0x0, 0xff, 0x0, 0x3, 0x8, 0x3}, r5, 0x2, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=r2, 0x4) perf_event_open(&(0x7f00000003c0)={0x7, 0x70, 0x7fff, 0x5, 0x6, 0x8000, 0x0, 0x1000, 0x0, 0x7, 0x1000, 0x1, 0xffffffff, 0x3, 0xaf99, 0x40, 0x8001, 0xfffffffffffffffa, 0x1, 0x80000000, 0xe6d1, 0x4, 0x8001, 0x9, 0x1f, 0xfffffffffffffc00, 0x0, 0x0, 0x7ff, 0x15ac000000000000, 0x0, 0x3, 0x1, 0xfffffffffffffffe, 0x9, 0xff, 0x1, 0x2, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000002c0), 0x8}, 0x0, 0x3, 0x6, 0x1, 0x5, 0xb03c, 0x5}, r5, 0xc, r6, 0xb) bpf$MAP_CREATE(0x0, &(0x7f0000000640)={0x8, 0x6bcb8e63, 0x0, 0x59ad, 0x12, r0, 0x8001}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000880)={r0, &(0x7f0000000840), &(0x7f00000008c0)=""/70}, 0x375) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000280)={0xffffffffffffffff, 0xffffff8f, &(0x7f0000000300)}, 0x10) [ 367.717397] RAX: ffffffffffffffda RBX: 00007fed746366d4 RCX: 0000000000454e79 [ 367.724645] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 367.731895] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 367.739146] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000016 [ 367.746395] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000001c [ 367.786649] FAULT_INJECTION: forcing a failure. [ 367.786649] name failslab, interval 1, probability 0, space 0, times 0 [ 367.797950] CPU: 1 PID: 10559 Comm: syz-executor7 Not tainted 4.16.0-rc6+ #43 [ 367.805223] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 367.814579] Call Trace: [ 367.817175] dump_stack+0x194/0x24d [ 367.820811] ? arch_local_irq_restore+0x53/0x53 [ 367.825492] ? lockref_get_not_dead+0x66/0x80 [ 367.830000] should_fail+0x8c0/0xa40 [ 367.833717] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 367.838823] ? path_lookupat+0x238/0xba0 [ 367.842894] ? find_held_lock+0x35/0x1d0 [ 367.846970] ? check_same_owner+0x320/0x320 [ 367.851282] ? filename_parentat+0x550/0x550 [ 367.855674] ? rcu_note_context_switch+0x710/0x710 [ 367.860584] ? strncpy_from_user+0x323/0x430 [ 367.864973] should_failslab+0xec/0x120 [ 367.868928] kmem_cache_alloc+0x47/0x760 [ 367.872971] ? cap_capable+0x1b5/0x230 [ 367.876858] getname_kernel+0x54/0x340 [ 367.880739] kern_path+0x1e/0x40 [ 367.884095] do_mount+0xc79/0x2bb0 [ 367.887629] ? copy_mount_string+0x40/0x40 [ 367.891854] ? rcu_pm_notify+0xc0/0xc0 [ 367.895743] ? copy_mount_options+0x5f/0x2e0 [ 367.900146] ? rcu_read_lock_sched_held+0x108/0x120 [ 367.905151] ? kmem_cache_alloc_trace+0x459/0x740 [ 367.909977] ? kasan_check_write+0x14/0x20 [ 367.914202] ? copy_mount_options+0x1f7/0x2e0 [ 367.918674] SyS_mount+0xab/0x120 [ 367.922470] ? copy_mnt_ns+0xb30/0xb30 [ 367.926347] do_syscall_64+0x281/0x940 [ 367.930219] ? vmalloc_sync_all+0x30/0x30 [ 367.934356] ? trace_event_raw_event_sys_exit+0x260/0x260 [ 367.939873] ? syscall_return_slowpath+0x550/0x550 [ 367.944787] ? syscall_return_slowpath+0x2ac/0x550 [ 367.949714] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 367.955063] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 367.959894] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 367.965059] RIP: 0033:0x454e79 [ 367.968222] RSP: 002b:00007fd81e272c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 367.975906] RAX: ffffffffffffffda RBX: 00007fd81e2736d4 RCX: 0000000000454e79 [ 367.983156] RDX: 0000000020000780 RSI: 0000000020000ac0 RDI: 0000000020000000 [ 367.990408] RBP: 000000000072bea0 R08: 0000000020000b00 R09: 0000000000000000 [ 367.997656] R10: 0000000000037002 R11: 0000000000000246 R12: 0000000000000016 [ 368.004906] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000006 2018/03/31 09:08:28 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x5, 0x0, 0x0, 0x5}, 0x2c) r1 = bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x13, 0x0, 0x0, 0x0, 0x20000003, 0x0}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x3e83, 0x8, r1}, 0x2c) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x50, &(0x7f0000000140)={0x0, 0x0}}, 0x10) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, r2, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) socketpair(0x4, 0x1, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000480)={r5, &(0x7f0000000440)="3068306ef4a0ff8256b6430a042a9b"}, 0x10) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x0, 0x8, 0x0, 0x0, r0, 0x6}, 0x2c) socketpair(0x8, 0x2, 0x0, &(0x7f0000000040)) r6 = gettid() bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=r3, 0x4) perf_event_open(&(0x7f00000003c0)={0x7, 0x70, 0x7fff, 0x5, 0x6, 0x8000, 0x0, 0x1000, 0x0, 0x7, 0x1000, 0x1, 0xffffffff, 0x3, 0xaf99, 0x40, 0x8001, 0xfffffffffffffffa, 0x1, 0x80000000, 0xe6d1, 0x4, 0x8001, 0x9, 0x1f, 0xfffffffffffffc00, 0x0, 0x0, 0x7ff, 0x15ac000000000000, 0x0, 0x3, 0x1, 0xfffffffffffffffe, 0x9, 0xff, 0x1, 0x2, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000002c0), 0x8}, 0x8004, 0x0, 0x6, 0x1, 0x5, 0xb03c, 0x5}, r6, 0xc, 0xffffffffffffffff, 0xb) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000280)={0xffffffffffffffff, 0xffffff8f, &(0x7f0000000300)}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000600)={0xffffffffffffffff, &(0x7f00000004c0)="648d1c6e4e7374f62b21f1c71a7cd05c41e2a0bf36f2f23f5761a39646321c3b5e4e670bd9a8f7a3fc36d594c1799d7dec6f0ba644a16abd532529ac63497998169000b2e491e82f659738895262b6fc9c79d8e6736c91136937b9", &(0x7f0000000540)="0c39cf9403045550ce39840a2a90ca20bc744608140dcd6c55d855533bb97417ef0cd19e1990bf245f0f38ab76b7f283d20500e75742ca4151b5489f5848a6b6104b0334b5427d07a3464ecffbfda64068c2d7ea6c230ba9040eebaec2030d19884f9f815ab793bd836fdb9c142a7aa9510939e2d3b5e6f57fa56f5464911bd939ca0ab0a1c19407fc9b1b974b94401f7c82bce0926bd5"}, 0x20) 2018/03/31 09:08:28 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x5, 0x100000000209e20, 0x8000000001, 0x5}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x13, 0x0, 0x7ffff9, 0x0, 0x20000003, 0x0}, 0x2c) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x13, 0x0, 0x7ffff9, 0x0, 0x0, 0x0}, 0x2c) 2018/03/31 09:08:28 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000a40)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x0, 0x0) socketpair(0x2, 0x0, 0x0, &(0x7f0000000640)={0xffffffffffffffff}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r6 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x0, 0x10000, 0x1182, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f00000009c0)={r4}) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000280)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000a00)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg(r3, &(0x7f0000000cc0)={&(0x7f0000000400)=@ethernet={0x1}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000580)="4589496d6a3bfcccae07dc729c52ee6bdf10d9cf221f605c25f790103018703b9a67491f96c3f9f8d07204ee4adf21acce1afdaedaba1228b4d33c3fa702a46b1329a0e52eea6a7908fd375ace47", 0x4e}], 0x1, &(0x7f0000000700), 0x0, 0x40000}, 0x4044080) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000740)={r5, &(0x7f0000000700)="ec1b815b5cc95d6e0dff859791e3341b8790dcb187f25418f8003a2b3bf345dc"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x0, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") close(0xffffffffffffffff) 2018/03/31 09:08:28 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x5, 0x100000000209e20, 0x8000000001, 0x5}, 0x2c) r1 = bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x13, 0x0, 0x7ffff9, 0x0, 0x20000003, 0x0}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xe, 0x0, 0x7f, 0x3e83, 0x8, r1, 0x80000000}, 0x2c) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x50, &(0x7f0000000140)={0x0, 0x0}}, 0x10) r3 = socket$kcm(0x29, 0x2, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r4 = perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) socketpair(0x4, 0x1, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r5, 0x2401, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000480)={r6, &(0x7f0000000440)="3068306ef4a0ff8256b6430a042a9b"}, 0x10) r7 = getpid() perf_event_open(&(0x7f0000000680)={0x3, 0x70, 0x0, 0x9, 0x200, 0x400, 0x0, 0x8000, 0x8000, 0x6, 0x7, 0x0, 0x9, 0x3ff, 0x2, 0x8, 0x1ff, 0x9, 0x9, 0x7, 0x0, 0x8, 0x6b8, 0xfffffffeffffffff, 0xffffffffffffff93, 0x4, 0xfffffffffffffffd, 0x6, 0x8b85, 0x3, 0x7, 0x7, 0x7, 0xffff, 0x9, 0x2, 0x6, 0x605c, 0x0, 0x4d13, 0x3, @perf_config_ext={0x5, 0x80}, 0x4, 0x5, 0x7fff, 0x6, 0x4242, 0x7, 0xfffffffffffffff9}, r7, 0x3, r4, 0xa) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r6, 0x40042409, 0x1) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, r5) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x0, 0x8, 0x0, 0x0, r0, 0x6}, 0x2c) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)) perf_event_open(&(0x7f000025c000)={0x5, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r8 = gettid() r9 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0xfff, 0x100000001, 0xfffffffffffffffb, 0x0, 0x8001, 0x0, 0x1, 0x0, 0xfffffffffffffff9, 0x0, 0x9, 0x9, 0x5, 0x8, 0x1, 0x8106, 0x0, 0x14000000000, 0x80000000, 0x1, 0x5, 0x0, 0x40, 0x2839, 0x1d, 0x800, 0x7, 0x0, 0x0, 0x5, 0x7, 0x0, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x4}, 0x0, 0x0, 0xff, 0x0, 0x3, 0x8, 0x3}, r8, 0x2, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=r2, 0x4) sendmsg$kcm(r3, &(0x7f00000005c0)={&(0x7f00000004c0)=@pppol2tp={0x18, 0x1, {0x0, r6, {0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}, 0x1, 0x4, 0x2, 0x4}}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000540)="8edf6f865d2cd4cd5d667e9cb8087f53494b73eb842459c98a4189d791c2b6487fb4d2e39b205a3164a41598a0325c26ab940a3ba71d3b", 0x37}], 0x1, &(0x7f0000000940)=[{0x60, 0x84, 0x5, "3711d024296633aadaae08c665a1edc2ee03668297a6d2e36b0dc35291c4077bd5aab5cb534e426eafa3c093ce3034ad8216b03d2e9d00debd470a1a005caae05f41457291e22b2bc901545a7ad8bc"}, {0x80, 0x10f, 0x4, "a7503e5eb24169fb0ea5d305ccb11f062a4c66eecb661a498a162944578b154c61248c07ab6d2cb4e87b9daceea8ab18ac4ef988e21aaaed42d05d2c770371ba4bc0c01ad193ceff55e0766bb053a374e1d38bdfb60d9d30da91ffe14cbed7734e26308c28ac710611df54ef6e610d"}, {0x18, 0x1ff, 0x200, "7e1c98ede2d351dc"}, {0xa8, 0x13f, 0x8, "a043b2bd3e049a677950253a521875598a80ff0851e3b8fe675edc6b26c3050111c776c0c9d4afdbb9a617f0524cfafee13fa4a026fa803ecc8ec30097bd22140ce0d72853344874cbd4ec9a8b4ca4ffc6493928a55dc26374cbc86ee1fe5dfecc564cb83ed3d96191905dc4af993eb4a8eca9677d723d6c4d1ec879de4e12db5d6773128209a217a1db7414020cb03d55daf5"}, {0x1010, 0x105, 0x42c895d, "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"}, {0x78, 0x11f, 0x3ff, "08ecf3be1ae2a9692bfb554cc6def3a23002bcdc9f3f4d20fb76bcaec3b7ed3f1ca679aaf6249a5bc84649f68df62fb59bcdc795db919f753bc1686ddfee66c1340fa092fe46f0dd5caf1fece4dcb25944daf84b4471233bc742fa618eab21c1b93c9cbd55d6"}], 0x1228, 0xd0}, 0xc010) perf_event_open(&(0x7f00000003c0)={0x7, 0x70, 0x7fff, 0x5, 0x6, 0x8000, 0x0, 0x1000, 0x0, 0x7, 0x1000, 0x1, 0xffffffff, 0x3, 0xaf99, 0x40, 0x8001, 0xfffffffffffffffa, 0x1, 0x80000000, 0xe6d1, 0x4, 0x8001, 0x9, 0x1f, 0xfffffffffffffc00, 0x0, 0x0, 0x7ff, 0x15ac000000000000, 0x0, 0x3, 0x1, 0xfffffffffffffffe, 0x9, 0xff, 0x1, 0x2, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000002c0), 0x8}, 0x0, 0x3, 0x6, 0x1, 0x5, 0xb03c, 0x5}, r8, 0xc, r9, 0xb) bpf$MAP_CREATE(0x0, &(0x7f0000000640)={0x8, 0x6bcb8e63, 0x0, 0x59ad, 0x12, r0, 0x8001}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000880)={r0, &(0x7f0000000840), &(0x7f00000008c0)=""/70}, 0x375) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000280)={0xffffffffffffffff, 0xffffff8f, &(0x7f0000000300)}, 0x10) 2018/03/31 09:08:28 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r7 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) ioctl$PERF_EVENT_IOC_RESET(r5, 0x2403, 0x2) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f00000009c0)={r4}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r7, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) ioctl$PERF_EVENT_IOC_RESET(r4, 0x2403, 0x2) sendmsg(r3, &(0x7f0000000cc0)={&(0x7f0000000400)=@ethernet={0x1}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000580)="4589496d6a3bfcccae07dc729c52ee6bdf10d9cf221f605c25f790103018703b9a67491f96c3f9f8d07204ee4adf21acce1afdaedaba1228b4d33c3fa702a46b1329a0e52eea6a7908fd375ace47", 0x4e}], 0x1, &(0x7f0000000700), 0x0, 0x40000}, 0x4044080) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000280)={r6, &(0x7f0000000700)="ec1b815b5cc95d6e0dff859791e3341b"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)={0x3, 0x40000100, 0x56c96e7a, 0xea, 0x1, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") close(0xffffffffffffffff) 2018/03/31 09:08:28 executing program 1 (fault-call:20 fault-nth:29): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)={0xffffffffffffffff}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x0, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r5 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f00000009c0)={r4}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg(r3, &(0x7f0000000cc0)={&(0x7f0000000400)=@ethernet={0x1}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000580)="4589496d6a3bfcccae07dc729c52ee6bdf10d9cf221f605c25f790103018703b9a67491f96c3f9f8d07204ee4adf21acce1afdaedaba1228b4d33c3fa702a46b1329a0e52eea6a7908fd375ace47", 0x4e}], 0x1, &(0x7f0000000700), 0x0, 0x40000}, 0x4044080) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000740)={0xffffffffffffffff, &(0x7f0000000700)="ec1b815b5cc95d6e0dff859791e3341b8790dcb187f25418f8003a2b3bf345dc"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") close(0xffffffffffffffff) 2018/03/31 09:08:28 executing program 7 (fault-call:26 fault-nth:7): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)={0xffffffffffffffff}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x0, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r5 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x0, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f00000009c0)={r4}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg(r3, &(0x7f0000000cc0)={&(0x7f0000000400)=@ethernet={0x1}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000580)="4589496d6a3bfcccae07dc729c52ee6bdf10d9cf221f605c25f790103018703b9a67491f96c3f9f8d07204ee4adf21acce1afdaedaba1228b4d33c3fa702a46b1329a0e52eea6a7908fd375ace47", 0x4e}], 0x1, &(0x7f0000000700), 0x0, 0x40000}, 0x4044080) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000740)={0xffffffffffffffff, &(0x7f0000000700)="ec1b815b5cc95d6e0dff859791e3341b8790dcb187f25418f8003a2b3bf345"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") close(0xffffffffffffffff) 2018/03/31 09:08:28 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xf, 0x5, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x80000000}, [@map={0x18, 0x1, 0x1, 0x0, 0x1}], {0x95}}, &(0x7f0000000040)='syzkaller\x00', 0x3, 0x10, &(0x7f0000000080)=""/16, 0x41000, 0x2f3100a785778bd1}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000001c0)={r0, 0x50, &(0x7f0000000140)}, 0x10) close(r0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000780)={&(0x7f0000000240)=@ax25, 0x80, &(0x7f0000000600)=[{&(0x7f00000002c0)=""/114, 0x72}, {&(0x7f0000000340)=""/133, 0x85}, {&(0x7f0000000400)=""/23, 0x17}, {&(0x7f0000000440)=""/59, 0x3b}, {&(0x7f0000000480)=""/114, 0x72}, {&(0x7f0000000500)=""/45, 0x2d}, {&(0x7f0000000540)=""/83, 0x53}, {&(0x7f00000005c0)}], 0x8, &(0x7f0000000680)=""/214, 0xd6, 0x100}, 0x40) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000007c0)={0xffffffffffffffff}) recvmsg(r2, &(0x7f00000019c0)={&(0x7f0000000800)=@ax25, 0x80, &(0x7f00000018c0)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000001880)=""/18, 0x12}], 0x2, &(0x7f0000001900)=""/184, 0xb8, 0x3}, 0x1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001a80)={r4, 0x50, &(0x7f0000001a00)}, 0x10) r5 = perf_event_open(&(0x7f0000001b00)={0x2, 0x70, 0x6, 0x8, 0x80000000, 0x10001, 0x0, 0x7ff, 0x4, 0xa, 0x200, 0x20, 0x72, 0x5, 0x0, 0x0, 0x5, 0x8f, 0x9ed, 0xff, 0x0, 0xa58, 0x7f, 0xf2f, 0x4503, 0x6, 0x81, 0x5, 0x1ff, 0xffffffff00000000, 0x2, 0x5, 0x9000000000000, 0xfffffffffffffffa, 0x8, 0x10001, 0x731ab510, 0x9, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000001ac0), 0x1}, 0x80, 0x2b4, 0x200, 0x3, 0x6, 0x9, 0x4}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0x20000) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000001b80)) r6 = getpid() r7 = perf_event_open(&(0x7f0000001c00)={0x1, 0x70, 0x0, 0xfff, 0x4, 0x80000000, 0x0, 0x3, 0x40, 0xa, 0x7, 0x7, 0x7, 0x4800000000000000, 0x7, 0x6, 0x62b, 0x8, 0x9, 0x100000000, 0x1, 0x0, 0x5, 0xd199, 0x1f, 0x10000, 0xff80000000000000, 0x3, 0x4, 0x8, 0x80000001, 0x8000, 0x7fff, 0x4, 0x16, 0x7, 0x40, 0x8, 0x0, 0x5, 0x50031dd1e89e26d1, @perf_bp={&(0x7f0000001bc0), 0x2}, 0x10000, 0x3a, 0x80000001, 0x1, 0x2c, 0x3ff, 0x6}, r6, 0x6, r3, 0x3) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000001c80)=r0, 0x4) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000001cc0)) ioctl$PERF_EVENT_IOC_REFRESH(r7, 0x2402, 0xffffffff) r8 = perf_event_open(&(0x7f0000001d00)={0x0, 0x70, 0x7, 0x400, 0x100, 0xac, 0x0, 0x100000000, 0xc2800, 0xa, 0x33e3, 0x2, 0x10001, 0x8, 0x5, 0x100000001, 0x2e9, 0x2, 0xc1, 0xf2, 0x2, 0x9, 0xffff, 0x7, 0x1, 0x0, 0x8000, 0x800, 0xfffffffffffffffa, 0x40, 0x0, 0x3, 0x6, 0xfa4, 0x7, 0xffffffffffff8000, 0x0, 0x0, 0x0, 0x8000, 0x3, @perf_config_ext={0x400}, 0x100, 0xa264, 0x4, 0x7, 0x2, 0x1000, 0x92}, r6, 0x5, r7, 0x1) socketpair(0x7, 0x6, 0x1, &(0x7f0000001d80)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000001e00)={&(0x7f0000001dc0)='./file0\x00', r9}, 0x10) r10 = perf_event_open(&(0x7f0000001e40)={0x4, 0x70, 0x5, 0x4, 0x8, 0x6, 0x0, 0x2, 0x1425, 0xb, 0x0, 0xcc9, 0x400, 0x57f90db4, 0x80000000, 0x7, 0x1000, 0x0, 0x8, 0x8000, 0xffffffff, 0x400, 0x1, 0x6, 0x40, 0x2, 0x10000, 0x8, 0x9, 0xfffffffffffffff8, 0x9, 0x4, 0x3, 0x400, 0x3, 0x9, 0x3, 0x100, 0x0, 0x6, 0x0, @perf_config_ext={0x4, 0x2}, 0x20, 0x3ff, 0x0, 0x7, 0x3, 0x5, 0xfa5e}, r6, 0xd, r7, 0x2) bpf$OBJ_GET_MAP(0x7, &(0x7f0000001f00)={&(0x7f0000001ec0)='./file0\x00'}, 0x10) socketpair$inet6_sctp(0xa, 0x0, 0x84, &(0x7f0000001f40)) ioctl$PERF_EVENT_IOC_DISABLE(r10, 0x2401, 0xbad) r11 = perf_event_open(&(0x7f0000001fc0)={0x3, 0x70, 0xff, 0x2f, 0x2, 0x7, 0x0, 0x40, 0x80000, 0x1, 0x8, 0x6, 0xfffffffffffffffb, 0x7, 0x2, 0x10000, 0x6, 0x5, 0x0, 0x10, 0x6, 0xc58, 0x7f, 0x3, 0x2, 0x3, 0x5, 0x80000000800000, 0x7, 0xfff, 0x16, 0x2b65, 0x9, 0x69244395, 0x10000, 0x4, 0x9, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000001f80), 0x8}, 0x100, 0x8, 0x51b4, 0x4, 0x800, 0xb7, 0x4800}, r6, 0x8, r8, 0x1) r12 = gettid() socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000002040)) perf_event_open(&(0x7f0000002080)={0x0, 0x70, 0x100, 0x0, 0x2, 0x401, 0x0, 0x6, 0x1, 0x6, 0x656, 0x5, 0xfffffffffffff973, 0xffffffffffffffff, 0x9, 0x7, 0x3, 0x3ff, 0x1c000000, 0x10000, 0x6, 0x20, 0x6, 0x1, 0x1, 0x4, 0x2, 0x20, 0x9, 0xed5, 0x847, 0x1000, 0x0, 0x0, 0x102bed3b, 0x9, 0x7fffffff, 0x6, 0x0, 0x24, 0x0, @perf_config_ext={0x100000001, 0x6}, 0x200, 0x800000010000000, 0x7, 0x7, 0x1000, 0xf3, 0xe87}, r12, 0xf, r11, 0x8) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000002100)) perf_event_open(&(0x7f0000002180)={0x4, 0x70, 0x0, 0x8, 0xff, 0x0, 0x0, 0xfffffffffffffff9, 0x10001, 0x3, 0xffffffffffffff00, 0x93eb, 0x1, 0x4e5e, 0x8001, 0xfffffffffffffff8, 0x7, 0x1f4, 0x0, 0x99b, 0x4, 0x8, 0xed8, 0x3f, 0xec9, 0x6, 0x1, 0x4ab8, 0x8, 0x2, 0xdd, 0x9, 0xffffffffffffffff, 0x8000, 0x0, 0x6, 0xffff, 0x8, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000002140), 0xf}, 0x400, 0x5, 0x7, 0x4, 0x7, 0x4}, r12, 0x3, r7, 0x8) [ 368.154986] FAULT_INJECTION: forcing a failure. [ 368.154986] name failslab, interval 1, probability 0, space 0, times 0 [ 368.166413] CPU: 1 PID: 10584 Comm: syz-executor1 Not tainted 4.16.0-rc6+ #43 [ 368.173695] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 368.183050] Call Trace: [ 368.185645] dump_stack+0x194/0x24d [ 368.189282] ? arch_local_irq_restore+0x53/0x53 [ 368.193953] ? __save_stack_trace+0x7e/0xd0 [ 368.198278] should_fail+0x8c0/0xa40 [ 368.201994] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 368.207096] ? kasan_kmalloc+0xad/0xe0 [ 368.210965] ? kmem_cache_alloc_trace+0x136/0x740 [ 368.215802] ? __memcg_init_list_lru_node+0x169/0x270 [ 368.220988] ? __list_lru_init+0x544/0x750 [ 368.225222] ? sget_userns+0x6b1/0xe40 [ 368.229118] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 368.233873] ? do_mount+0xea4/0x2bb0 [ 368.237589] ? SyS_mount+0xab/0x120 [ 368.241217] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 368.246573] ? find_held_lock+0x35/0x1d0 [ 368.250618] ? __lock_is_held+0xb6/0x140 [ 368.254660] ? check_same_owner+0x320/0x320 [ 368.258962] ? rcu_note_context_switch+0x710/0x710 [ 368.263871] should_failslab+0xec/0x120 [ 368.267821] kmem_cache_alloc_trace+0x4b/0x740 [ 368.272391] ? __kmalloc_node+0x33/0x70 [ 368.276350] ? __kmalloc_node+0x33/0x70 [ 368.280300] ? rcu_read_lock_sched_held+0x108/0x120 [ 368.285297] __memcg_init_list_lru_node+0x169/0x270 [ 368.290299] ? list_lru_add+0x7c0/0x7c0 [ 368.294255] ? __kmalloc_node+0x47/0x70 [ 368.298208] __list_lru_init+0x544/0x750 [ 368.302252] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 368.308124] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 368.313140] ? lockdep_init_map+0x9/0x10 [ 368.317183] sget_userns+0x6b1/0xe40 [ 368.320870] ? set_anon_super+0x20/0x20 [ 368.324822] ? put_filp+0x90/0x90 [ 368.328250] ? destroy_unused_super.part.6+0xd0/0xd0 [ 368.333329] ? alloc_vfsmnt+0x762/0x9c0 [ 368.337282] ? path_lookupat+0x238/0xba0 [ 368.341359] ? mnt_free_id.isra.21+0x50/0x50 [ 368.345769] ? trace_hardirqs_off+0x10/0x10 [ 368.350086] ? putname+0xee/0x130 2018/03/31 09:08:28 executing program 6: socketpair(0x5, 0x80007, 0x1, &(0x7f00000004c0)={0xffffffffffffffff}) bpf$MAP_CREATE(0x0, &(0x7f0000000540)={0x5, 0x4, 0x7f, 0xb3, 0x0, r0, 0x7c0a}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x5, 0x100000000209e20, 0x8000000001, 0x5}, 0x2c) r2 = bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x13, 0x0, 0x7ffff9, 0x0, 0x20000003, 0x0}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xe, 0x0, 0x7f, 0x3e83, 0x8, r2, 0x80000000}, 0x2c) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x50, &(0x7f0000000140)={0x0, 0x0}}, 0x10) socket$kcm(0x29, 0x2, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) socketpair(0x4, 0x1, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000480)={r5, &(0x7f0000000440)="3068306ef4a0ff8256b6430a042a9b"}, 0x10) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x1) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r4) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x0, 0x8, 0x0, 0x0, r1, 0x6}, 0x2c) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)) perf_event_open(&(0x7f000025c000)={0x5, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000580)=ANY=[@ANYBLOB="0200000000000000000000000ccfc7ac29d9a9f9f462634e54c11c48551415d5972e805d184b91e15054057ca6457c4a68b53198ef5533d49ba51968b083f0c6e2d462f93a926f9a06f0fa8176b08db18dab3211ecd2bd91cb71bfdfdba4506fc3c385d126bf52c216563ac14eed6fff982c"]) r6 = gettid() r7 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0xfff, 0x100000001, 0xfffffffffffffffb, 0x0, 0x8001, 0x0, 0x1, 0x0, 0xfffffffffffffff9, 0x0, 0x9, 0x9, 0x5, 0x8, 0x1, 0x8106, 0x0, 0x14000000000, 0x80000000, 0x1, 0x5, 0x0, 0x40, 0x2839, 0x1d, 0x800, 0x7, 0x0, 0x0, 0x5, 0x7, 0x0, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x4}, 0x0, 0x0, 0xff, 0x0, 0x3, 0x8, 0x3}, r6, 0x2, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=r3, 0x4) perf_event_open(&(0x7f00000003c0)={0x7, 0x70, 0x7fff, 0x5, 0x6, 0x8000, 0x0, 0x1000, 0x0, 0x7, 0x1000, 0x1, 0xffffffff, 0x3, 0xaf99, 0x40, 0x8001, 0xfffffffffffffffa, 0x1, 0x80000000, 0xe6d1, 0x4, 0x8001, 0x9, 0x1f, 0xfffffffffffffc00, 0x0, 0x0, 0x7ff, 0x15ac000000000000, 0x0, 0x3, 0x1, 0xfffffffffffffffe, 0x9, 0xff, 0x1, 0x2, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000002c0), 0x8}, 0x0, 0x3, 0x6, 0x1, 0x5, 0xb03c, 0x5}, r6, 0xc, r7, 0xb) bpf$MAP_CREATE(0x0, &(0x7f0000000640)={0x8, 0x6bcb8e63, 0x0, 0x59ad, 0x12, r1, 0x8001}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000880)={r1, &(0x7f0000000840), &(0x7f00000008c0)=""/70}, 0x375) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000280)={0xffffffffffffffff, 0xffffff8f, &(0x7f0000000300)}, 0x10) 2018/03/31 09:08:28 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x5, 0x0, 0x0, 0x5}, 0x2c) r1 = bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x13, 0x0, 0x0, 0x0, 0x20000003, 0x0}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x3e83, 0x8, r1}, 0x2c) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x50, &(0x7f0000000140)={0x0, 0x0}}, 0x10) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, r2, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) socketpair(0x4, 0x1, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000480)={r5, &(0x7f0000000440)="3068306ef4a0ff8256b6430a042a9b"}, 0x10) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x0, 0x8, 0x0, 0x0, r0, 0x6}, 0x2c) socketpair(0x8, 0x2, 0x0, &(0x7f0000000040)) r6 = gettid() bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=r3, 0x4) perf_event_open(&(0x7f00000003c0)={0x7, 0x70, 0x7fff, 0x5, 0x6, 0x8000, 0x0, 0x1000, 0x0, 0x7, 0x1000, 0x1, 0xffffffff, 0x3, 0xaf99, 0x40, 0x8001, 0xfffffffffffffffa, 0x1, 0x80000000, 0xe6d1, 0x4, 0x8001, 0x9, 0x1f, 0xfffffffffffffc00, 0x0, 0x0, 0x7ff, 0x15ac000000000000, 0x0, 0x3, 0x1, 0xfffffffffffffffe, 0x9, 0xff, 0x1, 0x2, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000002c0), 0x8}, 0x8004, 0x3, 0x0, 0x1, 0x5, 0xb03c, 0x5}, r6, 0xc, 0xffffffffffffffff, 0xb) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000280)={0xffffffffffffffff, 0xffffff8f, &(0x7f0000000300)}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000600)={0xffffffffffffffff, &(0x7f00000004c0)="648d1c6e4e7374f62b21f1c71a7cd05c41e2a0bf36f2f23f5761a39646321c3b5e4e670bd9a8f7a3fc36d594c1799d7dec6f0ba644a16abd532529ac63497998169000b2e491e82f659738895262b6fc9c79d8e6736c91136937b9", &(0x7f0000000540)="0c39cf9403045550ce39840a2a90ca20bc744608140dcd6c55d855533bb97417ef0cd19e1990bf245f0f38ab76b7f283d20500e75742ca4151b5489f5848a6b6104b0334b5427d07a3464ecffbfda64068c2d7ea6c230ba9040eebaec2030d19884f9f815ab793bd836fdb9c142a7aa9510939e2d3b5e6f57fa56f5464911bd939ca0ab0a1c19407fc9b1b974b94401f7c82bce0926bd5"}, 0x20) [ 368.353534] ? cap_capable+0x1b5/0x230 [ 368.357412] ? security_capable+0x8e/0xc0 [ 368.361556] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 368.366744] ? ns_capable_common+0xcf/0x160 [ 368.371064] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 368.376251] mount_ns+0x6d/0x190 [ 368.379620] rpc_mount+0x9e/0xd0 [ 368.382985] mount_fs+0x66/0x2d0 [ 368.386349] vfs_kern_mount.part.26+0xc6/0x4a0 [ 368.390927] ? may_umount+0xa0/0xa0 [ 368.394548] ? _raw_read_unlock+0x22/0x30 [ 368.398693] ? __get_fs_type+0x8a/0xc0 [ 368.402581] do_mount+0xea4/0x2bb0 2018/03/31 09:08:28 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xf, 0x5, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x80000000}, [@map={0x18, 0x1, 0x1, 0x0, 0x1}], {0x95}}, &(0x7f0000000040)='syzkaller\x00', 0x3, 0x10, &(0x7f0000000080)=""/16, 0x41000, 0x2f3100a785778bd1}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000001c0)={r0, 0x50, &(0x7f0000000140)}, 0x10) close(r0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000780)={&(0x7f0000000240)=@ax25, 0x80, &(0x7f0000000600)=[{&(0x7f00000002c0)=""/114, 0x72}, {&(0x7f0000000340)=""/133, 0x85}, {&(0x7f0000000400)=""/23, 0x17}, {&(0x7f0000000440)=""/59, 0x3b}, {&(0x7f0000000480)=""/114, 0x72}, {&(0x7f0000000500)=""/45, 0x2d}, {&(0x7f0000000540)=""/83, 0x53}, {&(0x7f00000005c0)}], 0x8, &(0x7f0000000680)=""/214, 0xd6, 0x100}, 0x40) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000007c0)={0xffffffffffffffff}) recvmsg(r2, &(0x7f00000019c0)={&(0x7f0000000800)=@ax25, 0x80, &(0x7f00000018c0)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000001880)=""/18, 0x12}], 0x2, &(0x7f0000001900)=""/184, 0xb8, 0x3}, 0x1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001a80)={r4, 0x50, &(0x7f0000001a00)}, 0x10) r5 = perf_event_open(&(0x7f0000001b00)={0x2, 0x70, 0x6, 0x8, 0x80000000, 0x10001, 0x0, 0x7ff, 0x4, 0xa, 0x200, 0x20, 0x72, 0x5, 0x0, 0x0, 0x5, 0x8f, 0x9ed, 0xff, 0x0, 0xa58, 0x7f, 0xf2f, 0x4503, 0x6, 0x81, 0x5, 0x1ff, 0xffffffff00000000, 0x2, 0x5, 0x9000000000000, 0xfffffffffffffffa, 0x8, 0x10001, 0x731ab510, 0x9, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000001ac0), 0x1}, 0x80, 0x2b4, 0x200, 0x3, 0x6, 0x9, 0x4}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0x20000) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000001b80)) r6 = getpid() r7 = perf_event_open(&(0x7f0000001c00)={0x1, 0x70, 0x0, 0xfff, 0x4, 0x80000000, 0x0, 0x3, 0x40, 0xa, 0x7, 0x7, 0x7, 0x4800000000000000, 0x7, 0x6, 0x62b, 0x8, 0x9, 0x100000000, 0x1, 0x0, 0x5, 0xd199, 0x1f, 0x10000, 0xff80000000000000, 0x3, 0x4, 0x8, 0x80000001, 0x8000, 0x7fff, 0x4, 0x16, 0x7, 0x40, 0x8, 0x0, 0x5, 0x50031dd1e89e26d1, @perf_bp={&(0x7f0000001bc0), 0x2}, 0x10000, 0x3a, 0x80000001, 0x1, 0x2c, 0x3ff, 0x6}, r6, 0x6, r3, 0x3) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000001c80)=r0, 0x4) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000001cc0)) ioctl$PERF_EVENT_IOC_REFRESH(r7, 0x2402, 0xffffffff) r8 = perf_event_open(&(0x7f0000001d00)={0x0, 0x70, 0x7, 0x400, 0x100, 0xac, 0x0, 0x100000000, 0xc2800, 0xa, 0x33e3, 0x2, 0x10001, 0x8, 0x5, 0x100000001, 0x2e9, 0x2, 0xc1, 0xf2, 0x2, 0x9, 0xffff, 0x7, 0x1, 0x0, 0x8000, 0x800, 0xfffffffffffffffa, 0x40, 0x0, 0x3, 0x6, 0xfa4, 0x7, 0xffffffffffff8000, 0x0, 0x0, 0x0, 0x8000, 0x3, @perf_config_ext={0x400}, 0x100, 0xa264, 0x4, 0x7, 0x2, 0x1000, 0x92}, r6, 0x5, r7, 0x1) socketpair(0x7, 0x6, 0x1, &(0x7f0000001d80)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000001e00)={&(0x7f0000001dc0)='./file0\x00', r9}, 0x10) r10 = perf_event_open(&(0x7f0000001e40)={0x4, 0x70, 0x5, 0x4, 0x8, 0x6, 0x0, 0x2, 0x1425, 0xb, 0x0, 0xcc9, 0x400, 0x57f90db4, 0x80000000, 0x7, 0x1000, 0x0, 0x8, 0x8000, 0xffffffff, 0x400, 0x1, 0x6, 0x40, 0x2, 0x10000, 0x8, 0x9, 0xfffffffffffffff8, 0x9, 0x4, 0x3, 0x400, 0x3, 0x9, 0x3, 0x100, 0x0, 0x6, 0x0, @perf_config_ext={0x4, 0x2}, 0x20, 0x3ff, 0x0, 0x7, 0x3, 0x5, 0xfa5e}, r6, 0xd, r7, 0x2) bpf$OBJ_GET_MAP(0x7, &(0x7f0000001f00)={&(0x7f0000001ec0)='./file0\x00'}, 0x10) socketpair$inet6_sctp(0xa, 0x0, 0x84, &(0x7f0000001f40)) ioctl$PERF_EVENT_IOC_DISABLE(r10, 0x2401, 0xbad) r11 = perf_event_open(&(0x7f0000001fc0)={0x3, 0x70, 0xff, 0x2f, 0x2, 0x7, 0x0, 0x40, 0x80000, 0x1, 0x8, 0x6, 0xfffffffffffffffb, 0x7, 0x2, 0x10000, 0x6, 0x5, 0x0, 0x10, 0x6, 0xc58, 0x7f, 0x3, 0x2, 0x3, 0x5, 0x80000000800000, 0x7, 0xfff, 0x16, 0x2b65, 0x9, 0x69244395, 0x10000, 0x4, 0x9, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000001f80), 0x8}, 0x100, 0x8, 0x51b4, 0x4, 0x800, 0xb7, 0x4800}, r6, 0x8, r8, 0x1) r12 = gettid() socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000002040)) perf_event_open(&(0x7f0000002080)={0x0, 0x70, 0x100, 0x0, 0x2, 0x401, 0x0, 0x6, 0x1, 0x6, 0x656, 0x5, 0xfffffffffffff973, 0xffffffffffffffff, 0x9, 0x7, 0x3, 0x3ff, 0x1c000000, 0x10000, 0x6, 0x20, 0x6, 0x1, 0x1, 0x4, 0x2, 0x20, 0x9, 0xed5, 0x847, 0x1000, 0x0, 0x0, 0x102bed3b, 0x9, 0x7fffffff, 0x6, 0x0, 0x24, 0x0, @perf_config_ext={0x100000001, 0x6}, 0x200, 0x800000010000000, 0x7, 0x7, 0x1000, 0xf3, 0xe87}, r12, 0xf, r11, 0x8) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000002100)) perf_event_open(&(0x7f0000002180)={0x4, 0x70, 0x0, 0x8, 0xff, 0x0, 0x0, 0xfffffffffffffff9, 0x10001, 0x3, 0xffffffffffffff00, 0x93eb, 0x1, 0x4e5e, 0x8001, 0xfffffffffffffff8, 0x7, 0x1f4, 0x80000001, 0x0, 0x4, 0x8, 0xed8, 0x3f, 0xec9, 0x6, 0x1, 0x4ab8, 0x8, 0x2, 0xdd, 0x9, 0xffffffffffffffff, 0x8000, 0x0, 0x6, 0xffff, 0x8, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000002140), 0xf}, 0x400, 0x5, 0x7, 0x4, 0x7, 0x4}, r12, 0x3, r7, 0x8) [ 368.406122] ? __might_fault+0x110/0x1d0 [ 368.410182] ? copy_mount_string+0x40/0x40 [ 368.414413] ? __check_object_size+0x8b/0x530 [ 368.418903] ? __might_sleep+0x95/0x190 [ 368.422878] ? kasan_check_write+0x14/0x20 [ 368.427105] ? _copy_from_user+0x99/0x110 [ 368.431244] ? memdup_user+0x5e/0x90 [ 368.434951] ? copy_mount_options+0x1f7/0x2e0 [ 368.439442] SyS_mount+0xab/0x120 [ 368.442890] ? copy_mnt_ns+0xb30/0xb30 [ 368.446773] do_syscall_64+0x281/0x940 [ 368.450650] ? vmalloc_sync_all+0x30/0x30 [ 368.454796] ? _raw_spin_unlock_irq+0x27/0x70 [ 368.459285] ? finish_task_switch+0x1c1/0x7e0 [ 368.463778] ? syscall_return_slowpath+0x550/0x550 [ 368.468706] ? syscall_return_slowpath+0x2ac/0x550 [ 368.473635] ? prepare_exit_to_usermode+0x350/0x350 [ 368.478651] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 368.484013] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 368.488857] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 368.494035] RIP: 0033:0x454e79 [ 368.497211] RSP: 002b:00007fed74635c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 368.504908] RAX: ffffffffffffffda RBX: 00007fed746366d4 RCX: 0000000000454e79 [ 368.512167] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 368.519427] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 368.526694] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000016 [ 368.533955] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000001d [ 368.575077] FAULT_INJECTION: forcing a failure. [ 368.575077] name failslab, interval 1, probability 0, space 0, times 0 [ 368.586382] CPU: 0 PID: 10601 Comm: syz-executor7 Not tainted 4.16.0-rc6+ #43 [ 368.593654] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 368.603003] Call Trace: [ 368.605592] dump_stack+0x194/0x24d [ 368.609218] ? arch_local_irq_restore+0x53/0x53 [ 368.613876] ? lookup_fast+0x392/0xfa0 [ 368.617748] should_fail+0x8c0/0xa40 [ 368.621453] ? __lock_acquire+0x664/0x3e00 [ 368.625679] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 368.630766] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 368.635952] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 368.641143] ? find_held_lock+0x35/0x1d0 [ 368.645206] ? __lock_is_held+0xb6/0x140 [ 368.649272] ? check_same_owner+0x320/0x320 [ 368.653594] ? print_irqtrace_events+0x270/0x270 [ 368.658353] ? rcu_note_context_switch+0x710/0x710 [ 368.663273] ? is_bpf_text_address+0x7b/0x120 [ 368.667747] should_failslab+0xec/0x120 [ 368.671699] kmem_cache_alloc+0x47/0x760 [ 368.675736] ? unwind_dump+0x4d0/0x4d0 [ 368.679603] alloc_vfsmnt+0xe0/0x9c0 [ 368.683305] ? mnt_free_id.isra.21+0x50/0x50 [ 368.687713] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 368.692883] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 368.698057] ? save_stack+0xa3/0xd0 [ 368.701661] ? save_stack+0x43/0xd0 [ 368.705271] ? __kasan_slab_free+0x11a/0x170 [ 368.709672] ? kasan_slab_free+0xe/0x10 [ 368.713630] ? kmem_cache_free+0x83/0x2a0 [ 368.717751] ? putname+0xee/0x130 [ 368.721177] ? filename_lookup+0x315/0x500 [ 368.725383] ? kern_path+0x33/0x40 [ 368.728896] ? do_mount+0xc79/0x2bb0 [ 368.732582] ? SyS_mount+0xab/0x120 [ 368.736189] ? do_syscall_64+0x281/0x940 [ 368.740226] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 368.745567] ? debug_check_no_obj_freed+0x3da/0xf1f [ 368.750560] ? lockref_get_not_dead+0x66/0x80 [ 368.755041] clone_mnt+0x118/0x11d0 [ 368.758652] ? mark_mounts_for_expiry+0x7f0/0x7f0 [ 368.763470] ? trace_hardirqs_off+0x10/0x10 [ 368.767768] ? get_mountpoint+0xb7/0x3c0 [ 368.771803] ? lock_downgrade+0x980/0x980 [ 368.775930] ? __lock_is_held+0xb6/0x140 [ 368.779968] ? get_mountpoint+0xc9/0x3c0 [ 368.784002] ? rcu_read_lock_sched_held+0x108/0x120 [ 368.789000] copy_tree+0x133/0xa40 [ 368.792520] ? down_read+0x150/0x150 [ 368.796208] ? to_mnt_ns+0x20/0x20 [ 368.799722] ? lock_mount+0xf4/0x2c0 [ 368.803409] do_mount+0x1fb9/0x2bb0 [ 368.807019] ? copy_mount_string+0x40/0x40 [ 368.811235] ? rcu_pm_notify+0xc0/0xc0 [ 368.815098] ? copy_mount_options+0x5f/0x2e0 [ 368.819481] ? kmem_cache_alloc_trace+0x459/0x740 [ 368.824299] ? copy_mount_options+0x1f7/0x2e0 [ 368.828768] SyS_mount+0xab/0x120 [ 368.832195] ? copy_mnt_ns+0xb30/0xb30 [ 368.836057] do_syscall_64+0x281/0x940 [ 368.839917] ? vmalloc_sync_all+0x30/0x30 [ 368.844046] ? _raw_spin_unlock_irq+0x27/0x70 [ 368.848516] ? finish_task_switch+0x1c1/0x7e0 [ 368.852986] ? syscall_return_slowpath+0x550/0x550 [ 368.857892] ? syscall_return_slowpath+0x2ac/0x550 [ 368.862794] ? prepare_exit_to_usermode+0x350/0x350 [ 368.867784] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 368.873124] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 368.877944] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 368.883110] RIP: 0033:0x454e79 [ 368.886274] RSP: 002b:00007fd81e272c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 368.893966] RAX: ffffffffffffffda RBX: 00007fd81e2736d4 RCX: 0000000000454e79 [ 368.901210] RDX: 0000000020000780 RSI: 0000000020000ac0 RDI: 0000000020000000 [ 368.908453] RBP: 000000000072bea0 R08: 0000000020000b00 R09: 0000000000000000 [ 368.915699] R10: 0000000000037002 R11: 0000000000000246 R12: 0000000000000016 2018/03/31 09:08:29 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x5, 0x0, 0x0, 0x5}, 0x2c) r1 = bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x13, 0x0, 0x0, 0x0, 0x20000003, 0x0}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x3e83, 0x8, r1}, 0x2c) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x50, &(0x7f0000000140)={0x0, 0x0}}, 0x10) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, r2, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) socketpair(0x4, 0x1, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000480)={r5, &(0x7f0000000440)="3068306ef4a0ff8256b6430a042a9b"}, 0x10) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x0, 0x8, 0x0, 0x0, r0, 0x6}, 0x2c) socketpair(0x8, 0x2, 0x0, &(0x7f0000000040)) r6 = gettid() bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=r3, 0x4) perf_event_open(&(0x7f00000003c0)={0x7, 0x70, 0x7fff, 0x5, 0x6, 0x8000, 0x0, 0x1000, 0x0, 0x7, 0x1000, 0x1, 0xffffffff, 0x3, 0xaf99, 0x40, 0x8001, 0xfffffffffffffffa, 0x1, 0x80000000, 0xe6d1, 0x4, 0x8001, 0x9, 0x1f, 0xfffffffffffffc00, 0x0, 0x0, 0x7ff, 0x15ac000000000000, 0x0, 0x3, 0x1, 0xfffffffffffffffe, 0x9, 0xff, 0x1, 0x2, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000002c0), 0x8}, 0x8004, 0x3, 0x0, 0x1, 0x5, 0xb03c, 0x5}, r6, 0xc, 0xffffffffffffffff, 0xb) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000280)={0xffffffffffffffff, 0xffffff8f, &(0x7f0000000300)}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000600)={0xffffffffffffffff, &(0x7f00000004c0)="648d1c6e4e7374f62b21f1c71a7cd05c41e2a0bf36f2f23f5761a39646321c3b5e4e670bd9a8f7a3fc36d594c1799d7dec6f0ba644a16abd532529ac63497998169000b2e491e82f659738895262b6fc9c79d8e6736c91136937b9", &(0x7f0000000540)="0c39cf9403045550ce39840a2a90ca20bc744608140dcd6c55d855533bb97417ef0cd19e1990bf245f0f38ab76b7f283d20500e75742ca4151b5489f5848a6b6104b0334b5427d07a3464ecffbfda64068c2d7ea6c230ba9040eebaec2030d19884f9f815ab793bd836fdb9c142a7aa9510939e2d3b5e6f57fa56f5464911bd939ca0ab0a1c19407fc9b1b974b94401f7c82bce0926bd5"}, 0x20) [ 368.922944] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000007 2018/03/31 09:08:29 executing program 7 (fault-call:26 fault-nth:8): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)={0xffffffffffffffff}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x0, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r5 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x0, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f00000009c0)={r4}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg(r3, &(0x7f0000000cc0)={&(0x7f0000000400)=@ethernet={0x1}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000580)="4589496d6a3bfcccae07dc729c52ee6bdf10d9cf221f605c25f790103018703b9a67491f96c3f9f8d07204ee4adf21acce1afdaedaba1228b4d33c3fa702a46b1329a0e52eea6a7908fd375ace47", 0x4e}], 0x1, &(0x7f0000000700), 0x0, 0x40000}, 0x4044080) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000740)={0xffffffffffffffff, &(0x7f0000000700)="ec1b815b5cc95d6e0dff859791e3341b8790dcb187f25418f8003a2b3bf345"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") close(0xffffffffffffffff) 2018/03/31 09:08:29 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r7 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) ioctl$PERF_EVENT_IOC_RESET(r5, 0x2403, 0x2) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f00000009c0)={r4}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r7, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) ioctl$PERF_EVENT_IOC_RESET(r4, 0x2403, 0x2) sendmsg(r3, &(0x7f0000000cc0)={&(0x7f0000000400)=@ethernet={0x1}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000580)="4589496d6a3bfcccae07dc729c52ee6bdf10d9cf221f605c25f790103018703b9a67491f96c3f9f8d07204ee4adf21acce1afdaedaba1228b4d33c3fa702a46b1329a0e52eea6a7908fd375ace47", 0x4e}], 0x1, &(0x7f0000000700), 0x0, 0x40000}, 0x4044080) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000280)={r6, &(0x7f0000000700)="ec1b815b5cc95d6e0dff859791e3341b"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)={0x3, 0x40000100, 0x56c96e7a, 0xea, 0x1, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") close(0xffffffffffffffff) 2018/03/31 09:08:29 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xf, 0x5, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x80000000}, [@map={0x18, 0x1, 0x1, 0x0, 0x1}], {0x95}}, &(0x7f0000000040)='syzkaller\x00', 0x3, 0x10, &(0x7f0000000080)=""/16, 0x41000, 0x2f3100a785778bd1}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000001c0)={r0, 0x50, &(0x7f0000000140)}, 0x10) close(r0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000780)={&(0x7f0000000240)=@ax25, 0x80, &(0x7f0000000600)=[{&(0x7f00000002c0)=""/114, 0x72}, {&(0x7f0000000340)=""/133, 0x85}, {&(0x7f0000000400)=""/23, 0x17}, {&(0x7f0000000440)=""/59, 0x3b}, {&(0x7f0000000480)=""/114, 0x72}, {&(0x7f0000000500)=""/45, 0x2d}, {&(0x7f0000000540)=""/83, 0x53}, {&(0x7f00000005c0)}], 0x8, &(0x7f0000000680)=""/214, 0xd6, 0x100}, 0x40) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000007c0)={0xffffffffffffffff}) recvmsg(r2, &(0x7f00000019c0)={&(0x7f0000000800)=@ax25, 0x80, &(0x7f00000018c0)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000001880)=""/18, 0x12}], 0x2, &(0x7f0000001900)=""/184, 0xb8, 0x3}, 0x1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001a80)={r4, 0x50, &(0x7f0000001a00)}, 0x10) r5 = perf_event_open(&(0x7f0000001b00)={0x2, 0x70, 0x6, 0x8, 0x80000000, 0x10001, 0x0, 0x7ff, 0x4, 0xa, 0x200, 0x20, 0x72, 0x5, 0x0, 0x0, 0x5, 0x8f, 0x9ed, 0xff, 0x0, 0xa58, 0x7f, 0xf2f, 0x4503, 0x6, 0x81, 0x5, 0x1ff, 0xffffffff00000000, 0x2, 0x5, 0x9000000000000, 0xfffffffffffffffa, 0x8, 0x10001, 0x731ab510, 0x9, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000001ac0), 0x1}, 0x80, 0x2b4, 0x200, 0x3, 0x6, 0x9, 0x4}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0x20000) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000001b80)) r6 = getpid() r7 = perf_event_open(&(0x7f0000001c00)={0x1, 0x70, 0x0, 0xfff, 0x4, 0x80000000, 0x0, 0x3, 0x40, 0xa, 0x7, 0x7, 0x7, 0x4800000000000000, 0x7, 0x6, 0x62b, 0x8, 0x9, 0x100000000, 0x1, 0x0, 0x5, 0xd199, 0x1f, 0x10000, 0xff80000000000000, 0x3, 0x4, 0x8, 0x80000001, 0x8000, 0x7fff, 0x4, 0x16, 0x7, 0x40, 0x8, 0x0, 0x5, 0x50031dd1e89e26d1, @perf_bp={&(0x7f0000001bc0), 0x2}, 0x10000, 0x3a, 0x80000001, 0x1, 0x2c, 0x3ff, 0x6}, r6, 0x6, r3, 0x3) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000001c80)=r0, 0x4) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000001cc0)) ioctl$PERF_EVENT_IOC_REFRESH(r7, 0x2402, 0xffffffff) r8 = perf_event_open(&(0x7f0000001d00)={0x0, 0x70, 0x7, 0x400, 0x100, 0xac, 0x0, 0x100000000, 0xc2800, 0xa, 0x33e3, 0x2, 0x10001, 0x8, 0x5, 0x100000001, 0x2e9, 0x2, 0xc1, 0xf2, 0x2, 0x9, 0xffff, 0x7, 0x1, 0x0, 0x8000, 0x800, 0xfffffffffffffffa, 0x40, 0x0, 0x3, 0x6, 0xfa4, 0x7, 0xffffffffffff8000, 0x0, 0x0, 0x0, 0x8000, 0x3, @perf_config_ext={0x400}, 0x100, 0xa264, 0x4, 0x7, 0x2, 0x1000, 0x92}, r6, 0x5, r7, 0x1) socketpair(0x7, 0x6, 0x1, &(0x7f0000001d80)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000001e00)={&(0x7f0000001dc0)='./file0\x00', r9}, 0x10) r10 = perf_event_open(&(0x7f0000001e40)={0x4, 0x70, 0x5, 0x4, 0x8, 0x6, 0x0, 0x2, 0x1425, 0xb, 0x0, 0xcc9, 0x400, 0x57f90db4, 0x80000000, 0x7, 0x1000, 0x0, 0x8, 0x8000, 0xffffffff, 0x400, 0x1, 0x6, 0x40, 0x2, 0x10000, 0x8, 0x9, 0xfffffffffffffff8, 0x9, 0x4, 0x3, 0x400, 0x3, 0x9, 0x3, 0x100, 0x0, 0x6, 0x0, @perf_config_ext={0x4, 0x2}, 0x20, 0x3ff, 0x0, 0x7, 0x3, 0x5, 0xfa5e}, r6, 0xd, r7, 0x2) bpf$OBJ_GET_MAP(0x7, &(0x7f0000001f00)={&(0x7f0000001ec0)='./file0\x00'}, 0x10) socketpair$inet6_sctp(0xa, 0x0, 0x84, &(0x7f0000001f40)) ioctl$PERF_EVENT_IOC_DISABLE(r10, 0x2401, 0xbad) r11 = perf_event_open(&(0x7f0000001fc0)={0x3, 0x70, 0xff, 0x2f, 0x2, 0x7, 0x0, 0x40, 0x80000, 0x1, 0x8, 0x6, 0xfffffffffffffffb, 0x7, 0x2, 0x10000, 0x6, 0x5, 0x0, 0x10, 0x6, 0xc58, 0x7f, 0x3, 0x2, 0x3, 0x5, 0x80000000800000, 0x7, 0xfff, 0x16, 0x2b65, 0x9, 0x69244395, 0x10000, 0x4, 0x9, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000001f80), 0x8}, 0x100, 0x8, 0x51b4, 0x4, 0x800, 0xb7, 0x4800}, r6, 0x8, r8, 0x1) r12 = gettid() socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000002040)) perf_event_open(&(0x7f0000002080)={0x0, 0x70, 0x100, 0x0, 0x2, 0x401, 0x0, 0x6, 0x1, 0x6, 0x656, 0x5, 0xfffffffffffff973, 0xffffffffffffffff, 0x9, 0x7, 0x3, 0x3ff, 0x1c000000, 0x10000, 0x6, 0x20, 0x6, 0x1, 0x1, 0x4, 0x2, 0x20, 0x9, 0xed5, 0x847, 0x1000, 0x0, 0x0, 0x102bed3b, 0x9, 0x7fffffff, 0x6, 0x0, 0x24, 0x0, @perf_config_ext={0x100000001, 0x6}, 0x200, 0x800000010000000, 0x7, 0x7, 0x1000, 0xf3, 0xe87}, r12, 0xf, r11, 0x8) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000002100)) perf_event_open(&(0x7f0000002180)={0x4, 0x70, 0x0, 0x8, 0xff, 0x0, 0x0, 0xfffffffffffffff9, 0x10001, 0x3, 0xffffffffffffff00, 0x93eb, 0x1, 0x4e5e, 0x8001, 0xfffffffffffffff8, 0x7, 0x1f4, 0x80000001, 0x0, 0x4, 0x8, 0xed8, 0x3f, 0xec9, 0x6, 0x1, 0x4ab8, 0x8, 0x2, 0xdd, 0x9, 0xffffffffffffffff, 0x8000, 0x0, 0x6, 0xffff, 0x8, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000002140), 0xf}, 0x400, 0x5, 0x7, 0x4, 0x7, 0x4}, r12, 0x3, r7, 0x8) 2018/03/31 09:08:29 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x5, 0x100000000209e20, 0x8000000001, 0x5}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x13, 0x0, 0x7ffff9, 0x0, 0x20000003, 0x0}, 0x2c) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x13, 0x0, 0x7ffff9, 0x0, 0x0, 0x0}, 0x2c) 2018/03/31 09:08:29 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x5, 0x100000000209e20, 0x8000000001, 0x5}, 0x2c) r1 = bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x13, 0x0, 0x7ffff9, 0x0, 0x20000003, 0x0}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xe, 0x0, 0x7f, 0x3e83, 0x8, r1, 0x80000000}, 0x2c) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x50, &(0x7f0000000140)={0x0, 0x0}}, 0x10) socket$kcm(0x29, 0x2, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r3 = perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = getpid() perf_event_open(&(0x7f00000006c0)={0x7, 0x70, 0x0, 0x7fffffff000, 0x1, 0x8, 0x0, 0x7fff, 0x80004, 0x0, 0x401, 0x8, 0x100000001, 0x6, 0xfffffffffffffffb, 0xffff, 0x7, 0x10000, 0x1, 0x5, 0x4, 0x92, 0x0, 0x12000000000, 0x7, 0x7, 0x8000, 0x8, 0x6, 0xfffffffffffffffa, 0xffffffff, 0x100000001, 0x0, 0x9, 0xfff, 0x9, 0x2, 0x8001, 0x0, 0x8000, 0x0, @perf_bp={&(0x7f0000000680), 0x1}, 0x8, 0x1f, 0x3, 0x5, 0x80000000, 0x10001, 0xf3b}, r4, 0xc, r3, 0x8) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) socketpair(0x4, 0x1, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r5, 0x2401, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000480)={r6, &(0x7f0000000440)="3068306ef4a0ff8256b6430a042a9b"}, 0x10) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r6, 0x40042409, 0x1) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000001b40)={&(0x7f0000000000)='./file0\x00'}, 0x10) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) sendmsg(r8, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x28a, &(0x7f0000000000)}, 0x0) recvmsg$kcm(r8, &(0x7f0000002640)={0x0, 0x0, &(0x7f0000002600)}, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', r8}, 0x10) close(r7) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, r5) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x800000da, 0x8, 0x0, 0x0, r0, 0x6}, 0x2c) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)) perf_event_open(&(0x7f000025c000)={0x5, 0x70, 0x94a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x10040, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r9 = gettid() perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0xfff, 0x100000001, 0xfffffffffffffffb, 0x0, 0x8001, 0x0, 0x1, 0x0, 0xfffffffffffffff9, 0x0, 0x9, 0x9, 0x5, 0x8, 0x1, 0x8106, 0x0, 0x14000000000, 0x80000000, 0x1, 0x5, 0x0, 0x40, 0x2839, 0x1d, 0x800, 0x7, 0x0, 0x0, 0x5, 0x7, 0x0, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x4}, 0x0, 0x0, 0xff, 0x0, 0x3, 0x8, 0x3}, r9, 0x2, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000600)={r0, &(0x7f00000004c0)="283e9f9574703b99f54c49a2893112ac469faa2630eba9d7d8318073339bbc1c557e46d8083ff8cb46e990e5ff30477ae012599ef0a2b08f08d6620add156f75c7723ae68d010a4e97c28baf0d5b872cfdf8fd1c3e5f5c777c7066d852b85668c7b0c857e59e4eb42308cce9e8d7e7036501", &(0x7f0000000540)="1645ecc9ec8d868c4f687807cfed91184c366889066e26306eec925be02ba036938f35e8bac918854d6dac46f4575ec6a54ac25645224a3f7fd7af87662024ddab927be7fd61e573da58eea9a7633999a20e739c538638d60831d31918a4c976f3e9a3f77f9c4535a884786e176184899273ed4339b1ee3de643707b50cfdc487c5564af4fed0d81de9cf55167240dd96913721779b5985358513a3247800a48216ac0db9469c081ce51f609a655a5314962a305f57028ddc093"}, 0x20) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=r2, 0x4) 2018/03/31 09:08:29 executing program 1 (fault-call:20 fault-nth:30): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)={0xffffffffffffffff}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x0, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r5 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f00000009c0)={r4}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg(r3, &(0x7f0000000cc0)={&(0x7f0000000400)=@ethernet={0x1}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000580)="4589496d6a3bfcccae07dc729c52ee6bdf10d9cf221f605c25f790103018703b9a67491f96c3f9f8d07204ee4adf21acce1afdaedaba1228b4d33c3fa702a46b1329a0e52eea6a7908fd375ace47", 0x4e}], 0x1, &(0x7f0000000700), 0x0, 0x40000}, 0x4044080) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000740)={0xffffffffffffffff, &(0x7f0000000700)="ec1b815b5cc95d6e0dff859791e3341b8790dcb187f25418f8003a2b3bf345dc"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") close(0xffffffffffffffff) 2018/03/31 09:08:29 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000a40)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x0, 0x0) socketpair(0x2, 0x0, 0x0, &(0x7f0000000640)={0xffffffffffffffff}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r6 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x0, 0x10000, 0x1182, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f00000009c0)={r4}) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000280)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000a00)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg(r3, &(0x7f0000000cc0)={&(0x7f0000000400)=@ethernet={0x1}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000580)="4589496d6a3bfcccae07dc729c52ee6bdf10d9cf221f605c25f790103018703b9a67491f96c3f9f8d07204ee4adf21acce1afdaedaba1228b4d33c3fa702a46b1329a0e52eea6a7908fd375ace47", 0x4e}], 0x1, &(0x7f0000000700), 0x0, 0x40000}, 0x4044080) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000740)={r5, &(0x7f0000000700)="ec1b815b5cc95d6e0dff859791e3341b8790dcb187f25418f8003a2b3bf345dc"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x0, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") close(0xffffffffffffffff) [ 369.014079] FAULT_INJECTION: forcing a failure. [ 369.014079] name failslab, interval 1, probability 0, space 0, times 0 [ 369.025406] CPU: 0 PID: 10644 Comm: syz-executor1 Not tainted 4.16.0-rc6+ #43 [ 369.032681] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 369.042040] Call Trace: [ 369.044637] dump_stack+0x194/0x24d [ 369.048276] ? arch_local_irq_restore+0x53/0x53 [ 369.052944] ? __save_stack_trace+0x7e/0xd0 [ 369.057265] should_fail+0x8c0/0xa40 [ 369.060966] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 369.066051] ? kasan_kmalloc+0xad/0xe0 [ 369.069920] ? kmem_cache_alloc_trace+0x136/0x740 [ 369.074742] ? __memcg_init_list_lru_node+0x169/0x270 [ 369.079911] ? __list_lru_init+0x544/0x750 [ 369.084127] ? sget_userns+0x6b1/0xe40 [ 369.087996] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 369.093253] ? do_mount+0xea4/0x2bb0 [ 369.096949] ? SyS_mount+0xab/0x120 [ 369.100558] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 369.105910] ? find_held_lock+0x35/0x1d0 [ 369.109954] ? __lock_is_held+0xb6/0x140 [ 369.114007] ? check_same_owner+0x320/0x320 [ 369.118316] ? rcu_note_context_switch+0x710/0x710 [ 369.123232] should_failslab+0xec/0x120 [ 369.127191] kmem_cache_alloc_trace+0x4b/0x740 [ 369.131754] ? __kmalloc_node+0x33/0x70 [ 369.135707] ? __kmalloc_node+0x33/0x70 [ 369.139661] ? rcu_read_lock_sched_held+0x108/0x120 [ 369.144660] __memcg_init_list_lru_node+0x169/0x270 [ 369.149658] ? list_lru_add+0x7c0/0x7c0 [ 369.153612] ? __kmalloc_node+0x47/0x70 [ 369.157574] __list_lru_init+0x544/0x750 [ 369.161621] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 369.167487] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 369.172487] ? lockdep_init_map+0x9/0x10 [ 369.176529] sget_userns+0x6b1/0xe40 [ 369.180220] ? set_anon_super+0x20/0x20 [ 369.184179] ? put_filp+0x90/0x90 [ 369.187611] ? destroy_unused_super.part.6+0xd0/0xd0 [ 369.193044] ? alloc_vfsmnt+0x762/0x9c0 [ 369.197000] ? path_lookupat+0x238/0xba0 [ 369.201045] ? mnt_free_id.isra.21+0x50/0x50 [ 369.205436] ? trace_hardirqs_off+0x10/0x10 [ 369.209737] ? putname+0xee/0x130 [ 369.213171] ? cap_capable+0x1b5/0x230 [ 369.217042] ? security_capable+0x8e/0xc0 [ 369.221172] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 369.226340] ? ns_capable_common+0xcf/0x160 [ 369.230641] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 369.235806] mount_ns+0x6d/0x190 [ 369.239156] rpc_mount+0x9e/0xd0 [ 369.242502] mount_fs+0x66/0x2d0 [ 369.245850] vfs_kern_mount.part.26+0xc6/0x4a0 [ 369.250413] ? may_umount+0xa0/0xa0 [ 369.254023] ? _raw_read_unlock+0x22/0x30 [ 369.258154] ? __get_fs_type+0x8a/0xc0 [ 369.262029] do_mount+0xea4/0x2bb0 [ 369.265548] ? __might_fault+0x110/0x1d0 [ 369.269593] ? copy_mount_string+0x40/0x40 [ 369.273809] ? __check_object_size+0x8b/0x530 [ 369.278288] ? __might_sleep+0x95/0x190 [ 369.282246] ? kasan_check_write+0x14/0x20 [ 369.286465] ? _copy_from_user+0x99/0x110 [ 369.290593] ? memdup_user+0x5e/0x90 [ 369.294285] ? copy_mount_options+0x1f7/0x2e0 [ 369.298761] SyS_mount+0xab/0x120 [ 369.302191] ? copy_mnt_ns+0xb30/0xb30 [ 369.306060] do_syscall_64+0x281/0x940 [ 369.309925] ? vmalloc_sync_all+0x30/0x30 [ 369.314049] ? _raw_spin_unlock_irq+0x27/0x70 [ 369.318524] ? finish_task_switch+0x1c1/0x7e0 [ 369.322997] ? syscall_return_slowpath+0x550/0x550 [ 369.327912] ? syscall_return_slowpath+0x2ac/0x550 [ 369.332824] ? prepare_exit_to_usermode+0x350/0x350 [ 369.337819] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 369.343164] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 369.347990] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 369.353160] RIP: 0033:0x454e79 [ 369.356328] RSP: 002b:00007fed74635c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 2018/03/31 09:08:29 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x5, 0x100000000209e20, 0x8000000001, 0x5}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x13, 0x0, 0x7ffff9, 0x0, 0x20000003, 0x0}, 0x2c) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x13, 0x0, 0x7ffff9, 0x0, 0x0, 0x0}, 0x2c) [ 369.364019] RAX: ffffffffffffffda RBX: 00007fed746366d4 RCX: 0000000000454e79 [ 369.371270] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 369.378517] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 369.385767] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000016 [ 369.393015] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000001e [ 369.433231] FAULT_INJECTION: forcing a failure. [ 369.433231] name failslab, interval 1, probability 0, space 0, times 0 [ 369.444560] CPU: 0 PID: 10642 Comm: syz-executor7 Not tainted 4.16.0-rc6+ #43 [ 369.451835] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 369.461182] Call Trace: [ 369.463763] dump_stack+0x194/0x24d [ 369.467374] ? arch_local_irq_restore+0x53/0x53 [ 369.472028] ? lookup_fast+0x392/0xfa0 [ 369.475909] should_fail+0x8c0/0xa40 [ 369.479602] ? __lock_acquire+0x664/0x3e00 [ 369.483818] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 369.488906] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 369.494078] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 369.499251] ? find_held_lock+0x35/0x1d0 [ 369.503298] ? __lock_is_held+0xb6/0x140 [ 369.507349] ? check_same_owner+0x320/0x320 [ 369.511652] ? print_irqtrace_events+0x270/0x270 [ 369.516388] ? rcu_note_context_switch+0x710/0x710 [ 369.521298] ? is_bpf_text_address+0x7b/0x120 [ 369.525779] should_failslab+0xec/0x120 [ 369.529736] kmem_cache_alloc+0x47/0x760 [ 369.533777] ? unwind_dump+0x4d0/0x4d0 [ 369.537654] alloc_vfsmnt+0xe0/0x9c0 [ 369.541352] ? mnt_free_id.isra.21+0x50/0x50 [ 369.545748] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 369.550916] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 369.556095] ? save_stack+0xa3/0xd0 [ 369.559702] ? save_stack+0x43/0xd0 [ 369.563310] ? __kasan_slab_free+0x11a/0x170 [ 369.567697] ? kasan_slab_free+0xe/0x10 [ 369.571650] ? kmem_cache_free+0x83/0x2a0 [ 369.575774] ? putname+0xee/0x130 [ 369.579206] ? filename_lookup+0x315/0x500 [ 369.583421] ? kern_path+0x33/0x40 [ 369.586940] ? do_mount+0xc79/0x2bb0 [ 369.590630] ? SyS_mount+0xab/0x120 [ 369.594237] ? do_syscall_64+0x281/0x940 [ 369.598279] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 369.603621] ? debug_check_no_obj_freed+0x3da/0xf1f [ 369.608618] ? lockref_get_not_dead+0x66/0x80 [ 369.613102] clone_mnt+0x118/0x11d0 [ 369.616711] ? mark_mounts_for_expiry+0x7f0/0x7f0 [ 369.621542] ? trace_hardirqs_off+0x10/0x10 [ 369.625852] ? get_mountpoint+0xb7/0x3c0 [ 369.629900] ? lock_downgrade+0x980/0x980 [ 369.634038] ? __lock_is_held+0xb6/0x140 [ 369.638087] ? get_mountpoint+0xc9/0x3c0 [ 369.642127] ? rcu_read_lock_sched_held+0x108/0x120 [ 369.647126] copy_tree+0x133/0xa40 [ 369.650647] ? down_read+0x150/0x150 [ 369.654343] ? to_mnt_ns+0x20/0x20 [ 369.657866] ? lock_mount+0xf4/0x2c0 [ 369.661563] do_mount+0x1fb9/0x2bb0 [ 369.665172] ? copy_mount_string+0x40/0x40 [ 369.669383] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 369.674380] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 369.679126] ? copy_mount_options+0x149/0x2e0 [ 369.683601] ? copy_mount_options+0x14c/0x2e0 [ 369.688076] ? copy_mount_options+0x1f7/0x2e0 [ 369.692552] SyS_mount+0xab/0x120 [ 369.695985] ? copy_mnt_ns+0xb30/0xb30 [ 369.699858] do_syscall_64+0x281/0x940 [ 369.703725] ? vmalloc_sync_all+0x30/0x30 [ 369.707853] ? _raw_spin_unlock_irq+0x27/0x70 [ 369.712328] ? finish_task_switch+0x1c1/0x7e0 [ 369.716804] ? syscall_return_slowpath+0x550/0x550 [ 369.721711] ? syscall_return_slowpath+0x2ac/0x550 [ 369.726619] ? prepare_exit_to_usermode+0x350/0x350 [ 369.731614] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 369.736960] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 369.741796] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 369.746964] RIP: 0033:0x454e79 [ 369.750130] RSP: 002b:00007fd81e272c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 369.757821] RAX: ffffffffffffffda RBX: 00007fd81e2736d4 RCX: 0000000000454e79 [ 369.765073] RDX: 0000000020000780 RSI: 0000000020000ac0 RDI: 0000000020000000 [ 369.772323] RBP: 000000000072bea0 R08: 0000000020000b00 R09: 0000000000000000 2018/03/31 09:08:30 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r7 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) ioctl$PERF_EVENT_IOC_RESET(r5, 0x2403, 0x2) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f00000009c0)={r4}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r7, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) ioctl$PERF_EVENT_IOC_RESET(r4, 0x2403, 0x2) sendmsg(r3, &(0x7f0000000cc0)={&(0x7f0000000400)=@ethernet={0x1}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000580)="4589496d6a3bfcccae07dc729c52ee6bdf10d9cf221f605c25f790103018703b9a67491f96c3f9f8d07204ee4adf21acce1afdaedaba1228b4d33c3fa702a46b1329a0e52eea6a7908fd375ace47", 0x4e}], 0x1, &(0x7f0000000700), 0x0, 0x40000}, 0x4044080) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000280)={r6, &(0x7f0000000700)="ec1b815b5cc95d6e0dff859791e3341b"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)={0x3, 0x40000100, 0x56c96e7a, 0xea, 0x1, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") close(0xffffffffffffffff) 2018/03/31 09:08:30 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x5, 0x0, 0x0, 0x5}, 0x2c) r1 = bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x13, 0x0, 0x0, 0x0, 0x20000003, 0x0}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x3e83, 0x8, r1}, 0x2c) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x50, &(0x7f0000000140)={0x0, 0x0}}, 0x10) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, r2, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) socketpair(0x4, 0x1, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000480)={r5, &(0x7f0000000440)="3068306ef4a0ff8256b6430a042a9b"}, 0x10) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x0, 0x8, 0x0, 0x0, r0, 0x6}, 0x2c) socketpair(0x8, 0x2, 0x0, &(0x7f0000000040)) r6 = gettid() bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=r3, 0x4) perf_event_open(&(0x7f00000003c0)={0x7, 0x70, 0x7fff, 0x5, 0x6, 0x8000, 0x0, 0x1000, 0x0, 0x7, 0x1000, 0x1, 0xffffffff, 0x3, 0xaf99, 0x40, 0x8001, 0xfffffffffffffffa, 0x1, 0x80000000, 0xe6d1, 0x4, 0x8001, 0x9, 0x1f, 0xfffffffffffffc00, 0x0, 0x0, 0x7ff, 0x15ac000000000000, 0x0, 0x3, 0x1, 0xfffffffffffffffe, 0x9, 0xff, 0x1, 0x2, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000002c0), 0x8}, 0x8004, 0x3, 0x0, 0x1, 0x5, 0xb03c, 0x5}, r6, 0xc, 0xffffffffffffffff, 0xb) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000280)={0xffffffffffffffff, 0xffffff8f, &(0x7f0000000300)}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000600)={0xffffffffffffffff, &(0x7f00000004c0)="648d1c6e4e7374f62b21f1c71a7cd05c41e2a0bf36f2f23f5761a39646321c3b5e4e670bd9a8f7a3fc36d594c1799d7dec6f0ba644a16abd532529ac63497998169000b2e491e82f659738895262b6fc9c79d8e6736c91136937b9", &(0x7f0000000540)="0c39cf9403045550ce39840a2a90ca20bc744608140dcd6c55d855533bb97417ef0cd19e1990bf245f0f38ab76b7f283d20500e75742ca4151b5489f5848a6b6104b0334b5427d07a3464ecffbfda64068c2d7ea6c230ba9040eebaec2030d19884f9f815ab793bd836fdb9c142a7aa9510939e2d3b5e6f57fa56f5464911bd939ca0ab0a1c19407fc9b1b974b94401f7c82bce0926bd5"}, 0x20) 2018/03/31 09:08:30 executing program 7 (fault-call:26 fault-nth:9): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)={0xffffffffffffffff}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x0, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r5 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x0, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f00000009c0)={r4}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg(r3, &(0x7f0000000cc0)={&(0x7f0000000400)=@ethernet={0x1}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000580)="4589496d6a3bfcccae07dc729c52ee6bdf10d9cf221f605c25f790103018703b9a67491f96c3f9f8d07204ee4adf21acce1afdaedaba1228b4d33c3fa702a46b1329a0e52eea6a7908fd375ace47", 0x4e}], 0x1, &(0x7f0000000700), 0x0, 0x40000}, 0x4044080) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000740)={0xffffffffffffffff, &(0x7f0000000700)="ec1b815b5cc95d6e0dff859791e3341b8790dcb187f25418f8003a2b3bf345"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") close(0xffffffffffffffff) [ 369.779571] R10: 0000000000037002 R11: 0000000000000246 R12: 0000000000000016 [ 369.786817] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000008 2018/03/31 09:08:30 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xf, 0x5, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x80000000}, [@map={0x18, 0x1, 0x1, 0x0, 0x1}], {0x95}}, &(0x7f0000000040)='syzkaller\x00', 0x3, 0x10, &(0x7f0000000080)=""/16, 0x41000, 0x2f3100a785778bd1}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000001c0)={r0, 0x50, &(0x7f0000000140)}, 0x10) close(r0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000780)={&(0x7f0000000240)=@ax25, 0x80, &(0x7f0000000600)=[{&(0x7f00000002c0)=""/114, 0x72}, {&(0x7f0000000340)=""/133, 0x85}, {&(0x7f0000000400)=""/23, 0x17}, {&(0x7f0000000440)=""/59, 0x3b}, {&(0x7f0000000480)=""/114, 0x72}, {&(0x7f0000000500)=""/45, 0x2d}, {&(0x7f0000000540)=""/83, 0x53}, {&(0x7f00000005c0)}], 0x8, &(0x7f0000000680)=""/214, 0xd6, 0x100}, 0x40) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000007c0)={0xffffffffffffffff}) recvmsg(r2, &(0x7f00000019c0)={&(0x7f0000000800)=@ax25, 0x80, &(0x7f00000018c0)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000001880)=""/18, 0x12}], 0x2, &(0x7f0000001900)=""/184, 0xb8, 0x3}, 0x1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001a80)={r4, 0x50, &(0x7f0000001a00)}, 0x10) r5 = perf_event_open(&(0x7f0000001b00)={0x2, 0x70, 0x6, 0x8, 0x80000000, 0x10001, 0x0, 0x7ff, 0x4, 0xa, 0x200, 0x20, 0x72, 0x5, 0x0, 0x0, 0x5, 0x8f, 0x9ed, 0xff, 0x0, 0xa58, 0x7f, 0xf2f, 0x4503, 0x6, 0x81, 0x5, 0x1ff, 0xffffffff00000000, 0x2, 0x5, 0x9000000000000, 0xfffffffffffffffa, 0x8, 0x10001, 0x731ab510, 0x9, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000001ac0), 0x1}, 0x80, 0x2b4, 0x200, 0x3, 0x6, 0x9, 0x4}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0x20000) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000001b80)) r6 = getpid() r7 = perf_event_open(&(0x7f0000001c00)={0x1, 0x70, 0x0, 0xfff, 0x4, 0x80000000, 0x0, 0x3, 0x40, 0xa, 0x7, 0x7, 0x7, 0x4800000000000000, 0x7, 0x6, 0x62b, 0x8, 0x9, 0x100000000, 0x1, 0x0, 0x5, 0xd199, 0x1f, 0x10000, 0xff80000000000000, 0x3, 0x4, 0x8, 0x80000001, 0x8000, 0x7fff, 0x4, 0x16, 0x7, 0x40, 0x8, 0x0, 0x5, 0x50031dd1e89e26d1, @perf_bp={&(0x7f0000001bc0), 0x2}, 0x10000, 0x3a, 0x80000001, 0x1, 0x2c, 0x3ff, 0x6}, r6, 0x6, r3, 0x3) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000001c80)=r0, 0x4) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000001cc0)) ioctl$PERF_EVENT_IOC_REFRESH(r7, 0x2402, 0xffffffff) r8 = perf_event_open(&(0x7f0000001d00)={0x0, 0x70, 0x7, 0x400, 0x100, 0xac, 0x0, 0x100000000, 0xc2800, 0xa, 0x33e3, 0x2, 0x10001, 0x8, 0x5, 0x100000001, 0x2e9, 0x2, 0xc1, 0xf2, 0x2, 0x9, 0xffff, 0x7, 0x1, 0x0, 0x8000, 0x800, 0xfffffffffffffffa, 0x40, 0x0, 0x3, 0x6, 0xfa4, 0x7, 0xffffffffffff8000, 0x0, 0x0, 0x0, 0x8000, 0x3, @perf_config_ext={0x400}, 0x100, 0xa264, 0x4, 0x7, 0x2, 0x1000, 0x92}, r6, 0x5, r7, 0x1) socketpair(0x7, 0x6, 0x1, &(0x7f0000001d80)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000001e00)={&(0x7f0000001dc0)='./file0\x00', r9}, 0x10) r10 = perf_event_open(&(0x7f0000001e40)={0x4, 0x70, 0x5, 0x4, 0x8, 0x6, 0x0, 0x2, 0x1425, 0xb, 0x0, 0xcc9, 0x400, 0x57f90db4, 0x80000000, 0x7, 0x1000, 0x0, 0x8, 0x8000, 0xffffffff, 0x400, 0x1, 0x6, 0x40, 0x2, 0x10000, 0x8, 0x9, 0xfffffffffffffff8, 0x9, 0x4, 0x3, 0x400, 0x3, 0x9, 0x3, 0x100, 0x0, 0x6, 0x0, @perf_config_ext={0x4, 0x2}, 0x20, 0x3ff, 0x0, 0x7, 0x3, 0x5, 0xfa5e}, r6, 0xd, r7, 0x2) bpf$OBJ_GET_MAP(0x7, &(0x7f0000001f00)={&(0x7f0000001ec0)='./file0\x00'}, 0x10) socketpair$inet6_sctp(0xa, 0x0, 0x84, &(0x7f0000001f40)) ioctl$PERF_EVENT_IOC_DISABLE(r10, 0x2401, 0xbad) r11 = perf_event_open(&(0x7f0000001fc0)={0x3, 0x70, 0xff, 0x2f, 0x2, 0x7, 0x0, 0x40, 0x80000, 0x1, 0x8, 0x6, 0xfffffffffffffffb, 0x7, 0x2, 0x10000, 0x6, 0x5, 0x0, 0x10, 0x6, 0xc58, 0x7f, 0x3, 0x2, 0x3, 0x5, 0x80000000800000, 0x7, 0xfff, 0x16, 0x2b65, 0x9, 0x69244395, 0x10000, 0x4, 0x9, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000001f80), 0x8}, 0x100, 0x8, 0x51b4, 0x4, 0x800, 0xb7, 0x4800}, r6, 0x8, r8, 0x1) r12 = gettid() socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000002040)) perf_event_open(&(0x7f0000002080)={0x0, 0x70, 0x100, 0x0, 0x2, 0x401, 0x0, 0x6, 0x1, 0x6, 0x656, 0x5, 0xfffffffffffff973, 0xffffffffffffffff, 0x9, 0x7, 0x3, 0x3ff, 0x1c000000, 0x10000, 0x6, 0x20, 0x6, 0x1, 0x1, 0x4, 0x2, 0x20, 0x9, 0xed5, 0x847, 0x1000, 0x0, 0x0, 0x102bed3b, 0x9, 0x7fffffff, 0x6, 0x0, 0x24, 0x0, @perf_config_ext={0x100000001, 0x6}, 0x200, 0x800000010000000, 0x7, 0x7, 0x1000, 0xf3, 0xe87}, r12, 0xf, r11, 0x8) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000002100)) perf_event_open(&(0x7f0000002180)={0x4, 0x70, 0x0, 0x8, 0xff, 0x0, 0x0, 0xfffffffffffffff9, 0x10001, 0x3, 0xffffffffffffff00, 0x93eb, 0x1, 0x4e5e, 0x8001, 0xfffffffffffffff8, 0x7, 0x1f4, 0x80000001, 0x0, 0x4, 0x8, 0xed8, 0x3f, 0xec9, 0x6, 0x1, 0x4ab8, 0x8, 0x2, 0xdd, 0x9, 0xffffffffffffffff, 0x8000, 0x0, 0x6, 0xffff, 0x8, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000002140), 0xf}, 0x400, 0x5, 0x7, 0x4, 0x7, 0x4}, r12, 0x3, r7, 0x8) 2018/03/31 09:08:30 executing program 1 (fault-call:20 fault-nth:31): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)={0xffffffffffffffff}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x0, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r5 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f00000009c0)={r4}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg(r3, &(0x7f0000000cc0)={&(0x7f0000000400)=@ethernet={0x1}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000580)="4589496d6a3bfcccae07dc729c52ee6bdf10d9cf221f605c25f790103018703b9a67491f96c3f9f8d07204ee4adf21acce1afdaedaba1228b4d33c3fa702a46b1329a0e52eea6a7908fd375ace47", 0x4e}], 0x1, &(0x7f0000000700), 0x0, 0x40000}, 0x4044080) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000740)={0xffffffffffffffff, &(0x7f0000000700)="ec1b815b5cc95d6e0dff859791e3341b8790dcb187f25418f8003a2b3bf345dc"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") close(0xffffffffffffffff) 2018/03/31 09:08:30 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x5, 0x100000000209e20, 0x8000000001, 0x5}, 0x2c) r1 = bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x13, 0x0, 0x7ffff9, 0x0, 0x20000003, 0x0}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xe, 0x0, 0x7f, 0x3e83, 0x8, r1, 0x80000000}, 0x2c) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x50, &(0x7f0000000140)={0x0, 0x0}}, 0x10) socket$kcm(0x29, 0x2, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r3 = perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f00000004c0)='nfs\x00', 0x0, &(0x7f0000000500)="cdd6d952fb4c176405b17f6af00a38d770eadfa3ca72252a3749782006ce8436fabe088ac89f9fb3ae89f99ae80000010000000000bb9080b5a9fe26444ff029d20d2439f2872ac50d19527ac6d269329a3c7af2f2266ed0489efaea57bf942cd6ce45dcc206d812fe46c600a5b5a6cb11690de2bbf0f98923f11d4f21a00b12b80041baed553d40f5f807631323da57a140c2d2ac010000001cbad6b2580d14d30ec09157bd6cb91d9a5b967300e592b489028a66f04fd76c27087bf52d48b7affbca657aa593ac756b093f64000000000000") ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) socketpair(0x4, 0x1, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f0000000600)=ANY=[@ANYBLOB="010000ed0000000000000000"]) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000480)={r5, &(0x7f0000000440)="3068306ef4a0ff8256b6430a042a9b"}, 0x10) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x1) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r4) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x0, 0x8, 0x0, 0x0, r0, 0x6}, 0x2c) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)) perf_event_open(&(0x7f000025c000)={0x5, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = gettid() r7 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0xfff, 0x100000001, 0xfffffffffffffffb, 0x0, 0x8001, 0x0, 0x1, 0x0, 0xfffffffffffffff9, 0x0, 0x9, 0x9, 0x5, 0x8, 0x1, 0x8106, 0x0, 0x14000000000, 0x80000000, 0x1, 0x5, 0x0, 0x40, 0x2839, 0x1d, 0x800, 0x7, 0x0, 0x0, 0x5, 0x7, 0x0, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x4}, 0x0, 0x0, 0xff, 0x0, 0x3, 0x8, 0x3}, r6, 0x2, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=r2, 0x4) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000680)) perf_event_open(&(0x7f00000003c0)={0x7, 0x70, 0x7fff, 0x5, 0x6, 0x8000, 0x0, 0x1000, 0x0, 0x7, 0x1000, 0x1, 0xffffffff, 0x3, 0xaf99, 0x40, 0x8001, 0xfffffffffffffffa, 0x1, 0x80000000, 0xe6d1, 0x4, 0x8001, 0x9, 0x1f, 0xfffffffffffffc00, 0x0, 0x0, 0x7ff, 0x15ac000000000000, 0x0, 0x3, 0x1, 0xfffffffffffffffe, 0x9, 0xff, 0x1, 0x2, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000002c0), 0x8}, 0x0, 0x3, 0x6, 0x1, 0x5, 0xb03c, 0x5}, r6, 0xc, r7, 0xb) bpf$MAP_CREATE(0x0, &(0x7f0000000640)={0x8, 0x7fff, 0x7, 0x59ad, 0x12, r0, 0x8001}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000880)={r0, &(0x7f0000000840), &(0x7f00000008c0)=""/70}, 0x375) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000280)={0xffffffffffffffff, 0xffffff8f, &(0x7f0000000300)}, 0x10) [ 369.946478] FAULT_INJECTION: forcing a failure. [ 369.946478] name failslab, interval 1, probability 0, space 0, times 0 [ 369.957815] CPU: 0 PID: 10675 Comm: syz-executor7 Not tainted 4.16.0-rc6+ #43 [ 369.965095] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 369.974448] Call Trace: [ 369.977042] dump_stack+0x194/0x24d [ 369.980669] ? arch_local_irq_restore+0x53/0x53 [ 369.985333] ? print_irqtrace_events+0x270/0x270 [ 369.990101] should_fail+0x8c0/0xa40 [ 369.993834] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 369.998954] ? find_held_lock+0x35/0x1d0 [ 370.003024] ? __lock_is_held+0xb6/0x140 [ 370.007094] ? check_same_owner+0x320/0x320 [ 370.011418] ? rcu_note_context_switch+0x710/0x710 [ 370.016356] should_failslab+0xec/0x120 [ 370.020347] kmem_cache_alloc+0x47/0x760 [ 370.024420] alloc_vfsmnt+0xe0/0x9c0 [ 370.028129] ? trace_hardirqs_off+0x10/0x10 [ 370.032452] ? mnt_free_id.isra.21+0x50/0x50 [ 370.036872] ? find_held_lock+0x35/0x1d0 [ 370.040936] ? perf_trace_lock_acquire+0xe3/0x980 [ 370.045782] ? perf_trace_lock+0x900/0x900 [ 370.050014] ? lock_downgrade+0x980/0x980 [ 370.054160] ? lock_release+0xa40/0xa40 [ 370.058133] ? trace_hardirqs_off+0x10/0x10 [ 370.062455] ? do_raw_spin_trylock+0x190/0x190 [ 370.067047] clone_mnt+0x118/0x11d0 [ 370.070674] ? find_held_lock+0x35/0x1d0 [ 370.074738] ? mark_mounts_for_expiry+0x7f0/0x7f0 [ 370.079581] ? is_subdir+0x259/0x430 [ 370.083298] ? lock_downgrade+0x980/0x980 [ 370.087449] ? lock_release+0xa40/0xa40 [ 370.091431] ? is_subdir+0x144/0x430 2018/03/31 09:08:30 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000a40)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x0, 0x0) socketpair(0x2, 0x0, 0x0, &(0x7f0000000640)={0xffffffffffffffff}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r6 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x0, 0x10000, 0x1182, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f00000009c0)={r4}) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000280)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000a00)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg(r3, &(0x7f0000000cc0)={&(0x7f0000000400)=@ethernet={0x1}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000580)="4589496d6a3bfcccae07dc729c52ee6bdf10d9cf221f605c25f790103018703b9a67491f96c3f9f8d07204ee4adf21acce1afdaedaba1228b4d33c3fa702a46b1329a0e52eea6a7908fd375ace47", 0x4e}], 0x1, &(0x7f0000000700), 0x0, 0x40000}, 0x4044080) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000740)={r5, &(0x7f0000000700)="ec1b815b5cc95d6e0dff859791e3341b8790dcb187f25418f8003a2b3bf345dc"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x0, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") close(0xffffffffffffffff) 2018/03/31 09:08:30 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x5, 0x0, 0x0, 0x5}, 0x2c) r1 = bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x13, 0x0, 0x0, 0x0, 0x20000003, 0x0}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x3e83, 0x8, r1}, 0x2c) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x50, &(0x7f0000000140)={0x0, 0x0}}, 0x10) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, r2, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) socketpair(0x4, 0x1, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000480)={r5, &(0x7f0000000440)="3068306ef4a0ff8256b6430a042a9b"}, 0x10) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x0, 0x8, 0x0, 0x0, r0, 0x6}, 0x2c) socketpair(0x8, 0x2, 0x0, &(0x7f0000000040)) r6 = gettid() bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=r3, 0x4) perf_event_open(&(0x7f00000003c0)={0x7, 0x70, 0x7fff, 0x5, 0x6, 0x8000, 0x0, 0x1000, 0x0, 0x7, 0x1000, 0x1, 0xffffffff, 0x3, 0xaf99, 0x40, 0x8001, 0xfffffffffffffffa, 0x1, 0x80000000, 0xe6d1, 0x4, 0x8001, 0x9, 0x1f, 0xfffffffffffffc00, 0x0, 0x0, 0x7ff, 0x15ac000000000000, 0x0, 0x3, 0x1, 0xfffffffffffffffe, 0x9, 0xff, 0x1, 0x2, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000002c0), 0x8}, 0x8004, 0x3, 0x6, 0x0, 0x5, 0xb03c, 0x5}, r6, 0xc, 0xffffffffffffffff, 0xb) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000280)={0xffffffffffffffff, 0xffffff8f, &(0x7f0000000300)}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000600)={0xffffffffffffffff, &(0x7f00000004c0)="648d1c6e4e7374f62b21f1c71a7cd05c41e2a0bf36f2f23f5761a39646321c3b5e4e670bd9a8f7a3fc36d594c1799d7dec6f0ba644a16abd532529ac63497998169000b2e491e82f659738895262b6fc9c79d8e6736c91136937b9", &(0x7f0000000540)="0c39cf9403045550ce39840a2a90ca20bc744608140dcd6c55d855533bb97417ef0cd19e1990bf245f0f38ab76b7f283d20500e75742ca4151b5489f5848a6b6104b0334b5427d07a3464ecffbfda64068c2d7ea6c230ba9040eebaec2030d19884f9f815ab793bd836fdb9c142a7aa9510939e2d3b5e6f57fa56f5464911bd939ca0ab0a1c19407fc9b1b974b94401f7c82bce0926bd5"}, 0x20) 2018/03/31 09:08:30 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x5, 0x0, 0x0, 0x5}, 0x2c) r1 = bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x13, 0x0, 0x0, 0x0, 0x20000003, 0x0}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x3e83, 0x8, r1}, 0x2c) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x50, &(0x7f0000000140)={0x0, 0x0}}, 0x10) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, r2, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) socketpair(0x4, 0x1, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000480)={r5, &(0x7f0000000440)="3068306ef4a0ff8256b6430a042a9b"}, 0x10) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x0, 0x8, 0x0, 0x0, r0, 0x6}, 0x2c) socketpair(0x8, 0x2, 0x0, &(0x7f0000000040)) r6 = gettid() bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=r3, 0x4) perf_event_open(&(0x7f00000003c0)={0x7, 0x70, 0x7fff, 0x5, 0x6, 0x8000, 0x0, 0x1000, 0x0, 0x7, 0x1000, 0x1, 0xffffffff, 0x3, 0xaf99, 0x40, 0x8001, 0xfffffffffffffffa, 0x1, 0x80000000, 0xe6d1, 0x4, 0x8001, 0x9, 0x1f, 0xfffffffffffffc00, 0x0, 0x0, 0x7ff, 0x15ac000000000000, 0x0, 0x3, 0x1, 0xfffffffffffffffe, 0x9, 0xff, 0x1, 0x2, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000002c0), 0x8}, 0x8004, 0x3, 0x6, 0x0, 0x5, 0xb03c, 0x5}, r6, 0xc, 0xffffffffffffffff, 0xb) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000280)={0xffffffffffffffff, 0xffffff8f, &(0x7f0000000300)}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000600)={0xffffffffffffffff, &(0x7f00000004c0)="648d1c6e4e7374f62b21f1c71a7cd05c41e2a0bf36f2f23f5761a39646321c3b5e4e670bd9a8f7a3fc36d594c1799d7dec6f0ba644a16abd532529ac63497998169000b2e491e82f659738895262b6fc9c79d8e6736c91136937b9", &(0x7f0000000540)="0c39cf9403045550ce39840a2a90ca20bc744608140dcd6c55d855533bb97417ef0cd19e1990bf245f0f38ab76b7f283d20500e75742ca4151b5489f5848a6b6104b0334b5427d07a3464ecffbfda64068c2d7ea6c230ba9040eebaec2030d19884f9f815ab793bd836fdb9c142a7aa9510939e2d3b5e6f57fa56f5464911bd939ca0ab0a1c19407fc9b1b974b94401f7c82bce0926bd5"}, 0x20) 2018/03/31 09:08:30 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x5, 0x0, 0x0, 0x5}, 0x2c) r1 = bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x13, 0x0, 0x0, 0x0, 0x20000003, 0x0}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x3e83, 0x8, r1}, 0x2c) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x50, &(0x7f0000000140)={0x0, 0x0}}, 0x10) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, r2, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) socketpair(0x4, 0x1, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000480)={r5, &(0x7f0000000440)="3068306ef4a0ff8256b6430a042a9b"}, 0x10) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x0, 0x8, 0x0, 0x0, r0, 0x6}, 0x2c) socketpair(0x8, 0x2, 0x0, &(0x7f0000000040)) r6 = gettid() bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=r3, 0x4) perf_event_open(&(0x7f00000003c0)={0x7, 0x70, 0x7fff, 0x5, 0x6, 0x8000, 0x0, 0x1000, 0x0, 0x7, 0x1000, 0x1, 0xffffffff, 0x3, 0xaf99, 0x40, 0x8001, 0xfffffffffffffffa, 0x1, 0x80000000, 0xe6d1, 0x4, 0x8001, 0x9, 0x1f, 0xfffffffffffffc00, 0x0, 0x0, 0x7ff, 0x15ac000000000000, 0x0, 0x3, 0x1, 0xfffffffffffffffe, 0x9, 0xff, 0x1, 0x2, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000002c0), 0x8}, 0x8004, 0x3, 0x6, 0x0, 0x5, 0xb03c, 0x5}, r6, 0xc, 0xffffffffffffffff, 0xb) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000280)={0xffffffffffffffff, 0xffffff8f, &(0x7f0000000300)}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000600)={0xffffffffffffffff, &(0x7f00000004c0)="648d1c6e4e7374f62b21f1c71a7cd05c41e2a0bf36f2f23f5761a39646321c3b5e4e670bd9a8f7a3fc36d594c1799d7dec6f0ba644a16abd532529ac63497998169000b2e491e82f659738895262b6fc9c79d8e6736c91136937b9", &(0x7f0000000540)="0c39cf9403045550ce39840a2a90ca20bc744608140dcd6c55d855533bb97417ef0cd19e1990bf245f0f38ab76b7f283d20500e75742ca4151b5489f5848a6b6104b0334b5427d07a3464ecffbfda64068c2d7ea6c230ba9040eebaec2030d19884f9f815ab793bd836fdb9c142a7aa9510939e2d3b5e6f57fa56f5464911bd939ca0ab0a1c19407fc9b1b974b94401f7c82bce0926bd5"}, 0x20) [ 370.095149] ? is_subdir+0x29b/0x430 [ 370.098865] ? d_move+0x90/0x90 [ 370.102147] ? get_mountpoint+0xc9/0x3c0 [ 370.106206] ? rcu_read_lock_sched_held+0x108/0x120 [ 370.111225] copy_tree+0x379/0xa40 [ 370.114766] ? down_read+0x150/0x150 [ 370.118485] ? to_mnt_ns+0x20/0x20 [ 370.122032] ? lock_mount+0xf4/0x2c0 [ 370.125746] do_mount+0x1fb9/0x2bb0 [ 370.129372] ? copy_mount_string+0x40/0x40 [ 370.133600] ? rcu_pm_notify+0xc0/0xc0 [ 370.137486] ? copy_mount_options+0x5f/0x2e0 [ 370.141894] ? kmem_cache_alloc_trace+0x459/0x740 [ 370.146734] ? kasan_check_write+0x14/0x20 [ 370.150970] ? _copy_from_user+0x99/0x110 [ 370.155121] ? copy_mount_options+0x1f7/0x2e0 [ 370.159614] SyS_mount+0xab/0x120 [ 370.163062] ? copy_mnt_ns+0xb30/0xb30 [ 370.166951] do_syscall_64+0x281/0x940 [ 370.170836] ? vmalloc_sync_all+0x30/0x30 [ 370.174980] ? _raw_spin_unlock_irq+0x27/0x70 [ 370.179470] ? finish_task_switch+0x1c1/0x7e0 [ 370.183967] ? syscall_return_slowpath+0x550/0x550 [ 370.188895] ? syscall_return_slowpath+0x2ac/0x550 2018/03/31 09:08:30 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x5, 0x0, 0x0, 0x5}, 0x2c) r1 = bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x13, 0x0, 0x0, 0x0, 0x20000003, 0x0}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x3e83, 0x8, r1}, 0x2c) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x50, &(0x7f0000000140)={0x0, 0x0}}, 0x10) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, r2, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) socketpair(0x4, 0x1, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000480)={r5, &(0x7f0000000440)="3068306ef4a0ff8256b6430a042a9b"}, 0x10) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x0, 0x8, 0x0, 0x0, r0, 0x6}, 0x2c) socketpair(0x8, 0x2, 0x0, &(0x7f0000000040)) r6 = gettid() bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=r3, 0x4) perf_event_open(&(0x7f00000003c0)={0x7, 0x70, 0x7fff, 0x5, 0x6, 0x8000, 0x0, 0x1000, 0x0, 0x7, 0x1000, 0x1, 0xffffffff, 0x3, 0xaf99, 0x40, 0x8001, 0xfffffffffffffffa, 0x1, 0x80000000, 0xe6d1, 0x4, 0x8001, 0x9, 0x1f, 0xfffffffffffffc00, 0x0, 0x0, 0x7ff, 0x15ac000000000000, 0x0, 0x3, 0x1, 0xfffffffffffffffe, 0x9, 0xff, 0x1, 0x2, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000002c0), 0x8}, 0x8004, 0x3, 0x6, 0x1, 0x0, 0xb03c, 0x5}, r6, 0xc, 0xffffffffffffffff, 0xb) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000280)={0xffffffffffffffff, 0xffffff8f, &(0x7f0000000300)}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000600)={0xffffffffffffffff, &(0x7f00000004c0)="648d1c6e4e7374f62b21f1c71a7cd05c41e2a0bf36f2f23f5761a39646321c3b5e4e670bd9a8f7a3fc36d594c1799d7dec6f0ba644a16abd532529ac63497998169000b2e491e82f659738895262b6fc9c79d8e6736c91136937b9", &(0x7f0000000540)="0c39cf9403045550ce39840a2a90ca20bc744608140dcd6c55d855533bb97417ef0cd19e1990bf245f0f38ab76b7f283d20500e75742ca4151b5489f5848a6b6104b0334b5427d07a3464ecffbfda64068c2d7ea6c230ba9040eebaec2030d19884f9f815ab793bd836fdb9c142a7aa9510939e2d3b5e6f57fa56f5464911bd939ca0ab0a1c19407fc9b1b974b94401f7c82bce0926bd5"}, 0x20) [ 370.193833] ? prepare_exit_to_usermode+0x350/0x350 [ 370.198847] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 370.204211] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 370.209056] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 370.214238] RIP: 0033:0x454e79 [ 370.217422] RSP: 002b:00007fd81e272c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 370.225129] RAX: ffffffffffffffda RBX: 00007fd81e2736d4 RCX: 0000000000454e79 [ 370.232392] RDX: 0000000020000780 RSI: 0000000020000ac0 RDI: 0000000020000000 [ 370.239657] RBP: 000000000072bea0 R08: 0000000020000b00 R09: 0000000000000000 [ 370.246922] R10: 0000000000037002 R11: 0000000000000246 R12: 0000000000000016 [ 370.254190] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000009 2018/03/31 09:08:30 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x0, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r6 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) ioctl$PERF_EVENT_IOC_RESET(r5, 0x2403, 0x2) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f00000009c0)={r4}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) ioctl$PERF_EVENT_IOC_RESET(r4, 0x2403, 0x2) sendmsg(r3, &(0x7f0000000cc0)={&(0x7f0000000400)=@ethernet={0x1}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000580)="4589496d6a3bfcccae07dc729c52ee6bdf10d9cf221f605c25f790103018703b9a67491f96c3f9f8d07204ee4adf21acce1afdaedaba1228b4d33c3fa702a46b1329a0e52eea6a7908fd375ace47", 0x4e}], 0x1, &(0x7f0000000700), 0x0, 0x40000}, 0x4044080) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000280)={0xffffffffffffffff, &(0x7f0000000700)="ec1b815b5cc95d6e0dff859791e3341b"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)={0x3, 0x40000100, 0x56c96e7a, 0xea, 0x1, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") close(0xffffffffffffffff) [ 370.294528] FAULT_INJECTION: forcing a failure. [ 370.294528] name failslab, interval 1, probability 0, space 0, times 0 [ 370.306144] CPU: 1 PID: 10686 Comm: syz-executor1 Not tainted 4.16.0-rc6+ #43 [ 370.313429] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 370.322779] Call Trace: [ 370.325372] dump_stack+0x194/0x24d [ 370.329002] ? arch_local_irq_restore+0x53/0x53 [ 370.333674] ? find_held_lock+0x35/0x1d0 [ 370.337740] should_fail+0x8c0/0xa40 2018/03/31 09:08:30 executing program 7 (fault-call:26 fault-nth:10): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)={0xffffffffffffffff}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x0, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r5 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x0, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f00000009c0)={r4}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg(r3, &(0x7f0000000cc0)={&(0x7f0000000400)=@ethernet={0x1}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000580)="4589496d6a3bfcccae07dc729c52ee6bdf10d9cf221f605c25f790103018703b9a67491f96c3f9f8d07204ee4adf21acce1afdaedaba1228b4d33c3fa702a46b1329a0e52eea6a7908fd375ace47", 0x4e}], 0x1, &(0x7f0000000700), 0x0, 0x40000}, 0x4044080) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000740)={0xffffffffffffffff, &(0x7f0000000700)="ec1b815b5cc95d6e0dff859791e3341b8790dcb187f25418f8003a2b3bf345"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") close(0xffffffffffffffff) 2018/03/31 09:08:30 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x5, 0x0, 0x0, 0x5}, 0x2c) r1 = bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x13, 0x0, 0x0, 0x0, 0x20000003, 0x0}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x3e83, 0x8, r1}, 0x2c) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x50, &(0x7f0000000140)={0x0, 0x0}}, 0x10) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, r2, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) socketpair(0x4, 0x1, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000480)={r5, &(0x7f0000000440)="3068306ef4a0ff8256b6430a042a9b"}, 0x10) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x0, 0x8, 0x0, 0x0, r0, 0x6}, 0x2c) socketpair(0x8, 0x2, 0x0, &(0x7f0000000040)) r6 = gettid() bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=r3, 0x4) perf_event_open(&(0x7f00000003c0)={0x7, 0x70, 0x7fff, 0x5, 0x6, 0x8000, 0x0, 0x1000, 0x0, 0x7, 0x1000, 0x1, 0xffffffff, 0x3, 0xaf99, 0x40, 0x8001, 0xfffffffffffffffa, 0x1, 0x80000000, 0xe6d1, 0x4, 0x8001, 0x9, 0x1f, 0xfffffffffffffc00, 0x0, 0x0, 0x7ff, 0x15ac000000000000, 0x0, 0x3, 0x1, 0xfffffffffffffffe, 0x9, 0xff, 0x1, 0x2, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000002c0), 0x8}, 0x8004, 0x3, 0x6, 0x1, 0x0, 0xb03c, 0x5}, r6, 0xc, 0xffffffffffffffff, 0xb) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000280)={0xffffffffffffffff, 0xffffff8f, &(0x7f0000000300)}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000600)={0xffffffffffffffff, &(0x7f00000004c0)="648d1c6e4e7374f62b21f1c71a7cd05c41e2a0bf36f2f23f5761a39646321c3b5e4e670bd9a8f7a3fc36d594c1799d7dec6f0ba644a16abd532529ac63497998169000b2e491e82f659738895262b6fc9c79d8e6736c91136937b9", &(0x7f0000000540)="0c39cf9403045550ce39840a2a90ca20bc744608140dcd6c55d855533bb97417ef0cd19e1990bf245f0f38ab76b7f283d20500e75742ca4151b5489f5848a6b6104b0334b5427d07a3464ecffbfda64068c2d7ea6c230ba9040eebaec2030d19884f9f815ab793bd836fdb9c142a7aa9510939e2d3b5e6f57fa56f5464911bd939ca0ab0a1c19407fc9b1b974b94401f7c82bce0926bd5"}, 0x20) 2018/03/31 09:08:30 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xf, 0x5, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x80000000}, [@map={0x18, 0x1, 0x1, 0x0, 0x1}], {0x95}}, &(0x7f0000000040)='syzkaller\x00', 0x3, 0x10, &(0x7f0000000080)=""/16, 0x41000, 0x2f3100a785778bd1}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000001c0)={r0, 0x50, &(0x7f0000000140)}, 0x10) close(r0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000780)={&(0x7f0000000240)=@ax25, 0x80, &(0x7f0000000600)=[{&(0x7f00000002c0)=""/114, 0x72}, {&(0x7f0000000340)=""/133, 0x85}, {&(0x7f0000000400)=""/23, 0x17}, {&(0x7f0000000440)=""/59, 0x3b}, {&(0x7f0000000480)=""/114, 0x72}, {&(0x7f0000000500)=""/45, 0x2d}, {&(0x7f0000000540)=""/83, 0x53}, {&(0x7f00000005c0)}], 0x8, &(0x7f0000000680)=""/214, 0xd6, 0x100}, 0x40) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000007c0)={0xffffffffffffffff}) recvmsg(r2, &(0x7f00000019c0)={&(0x7f0000000800)=@ax25, 0x80, &(0x7f00000018c0)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000001880)=""/18, 0x12}], 0x2, &(0x7f0000001900)=""/184, 0xb8, 0x3}, 0x1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001a80)={r4, 0x50, &(0x7f0000001a00)}, 0x10) r5 = perf_event_open(&(0x7f0000001b00)={0x2, 0x70, 0x6, 0x8, 0x80000000, 0x10001, 0x0, 0x7ff, 0x4, 0xa, 0x200, 0x20, 0x72, 0x5, 0x0, 0x0, 0x5, 0x8f, 0x9ed, 0xff, 0x0, 0xa58, 0x7f, 0xf2f, 0x4503, 0x6, 0x81, 0x5, 0x1ff, 0xffffffff00000000, 0x2, 0x5, 0x9000000000000, 0xfffffffffffffffa, 0x8, 0x10001, 0x731ab510, 0x9, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000001ac0), 0x1}, 0x80, 0x2b4, 0x200, 0x3, 0x6, 0x9, 0x4}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0x20000) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000001b80)) r6 = getpid() r7 = perf_event_open(&(0x7f0000001c00)={0x1, 0x70, 0x0, 0xfff, 0x4, 0x80000000, 0x0, 0x3, 0x40, 0xa, 0x7, 0x7, 0x7, 0x4800000000000000, 0x7, 0x6, 0x62b, 0x8, 0x9, 0x100000000, 0x1, 0x0, 0x5, 0xd199, 0x1f, 0x10000, 0xff80000000000000, 0x3, 0x4, 0x8, 0x80000001, 0x8000, 0x7fff, 0x4, 0x16, 0x7, 0x40, 0x8, 0x0, 0x5, 0x50031dd1e89e26d1, @perf_bp={&(0x7f0000001bc0), 0x2}, 0x10000, 0x3a, 0x80000001, 0x1, 0x2c, 0x3ff, 0x6}, r6, 0x6, r3, 0x3) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000001c80)=r0, 0x4) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000001cc0)) ioctl$PERF_EVENT_IOC_REFRESH(r7, 0x2402, 0xffffffff) r8 = perf_event_open(&(0x7f0000001d00)={0x0, 0x70, 0x7, 0x400, 0x100, 0xac, 0x0, 0x100000000, 0xc2800, 0xa, 0x33e3, 0x2, 0x10001, 0x8, 0x5, 0x100000001, 0x2e9, 0x2, 0xc1, 0xf2, 0x2, 0x9, 0xffff, 0x7, 0x1, 0x0, 0x8000, 0x800, 0xfffffffffffffffa, 0x40, 0x0, 0x3, 0x6, 0xfa4, 0x7, 0xffffffffffff8000, 0x0, 0x0, 0x0, 0x8000, 0x3, @perf_config_ext={0x400}, 0x100, 0xa264, 0x4, 0x7, 0x2, 0x1000, 0x92}, r6, 0x5, r7, 0x1) socketpair(0x7, 0x6, 0x1, &(0x7f0000001d80)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000001e00)={&(0x7f0000001dc0)='./file0\x00', r9}, 0x10) r10 = perf_event_open(&(0x7f0000001e40)={0x4, 0x70, 0x5, 0x4, 0x8, 0x6, 0x0, 0x2, 0x1425, 0xb, 0x0, 0xcc9, 0x400, 0x57f90db4, 0x80000000, 0x7, 0x1000, 0x0, 0x8, 0x8000, 0xffffffff, 0x400, 0x1, 0x6, 0x40, 0x2, 0x10000, 0x8, 0x9, 0xfffffffffffffff8, 0x9, 0x4, 0x3, 0x400, 0x3, 0x9, 0x3, 0x100, 0x0, 0x6, 0x0, @perf_config_ext={0x4, 0x2}, 0x20, 0x3ff, 0x0, 0x7, 0x3, 0x5, 0xfa5e}, r6, 0xd, r7, 0x2) bpf$OBJ_GET_MAP(0x7, &(0x7f0000001f00)={&(0x7f0000001ec0)='./file0\x00'}, 0x10) socketpair$inet6_sctp(0xa, 0x0, 0x84, &(0x7f0000001f40)) ioctl$PERF_EVENT_IOC_DISABLE(r10, 0x2401, 0xbad) r11 = perf_event_open(&(0x7f0000001fc0)={0x3, 0x70, 0xff, 0x2f, 0x2, 0x7, 0x0, 0x40, 0x80000, 0x1, 0x8, 0x6, 0xfffffffffffffffb, 0x7, 0x2, 0x10000, 0x6, 0x5, 0x0, 0x10, 0x6, 0xc58, 0x7f, 0x3, 0x2, 0x3, 0x5, 0x80000000800000, 0x7, 0xfff, 0x16, 0x2b65, 0x9, 0x69244395, 0x10000, 0x4, 0x9, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000001f80), 0x8}, 0x100, 0x8, 0x51b4, 0x4, 0x800, 0xb7, 0x4800}, r6, 0x8, r8, 0x1) r12 = gettid() socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000002040)) perf_event_open(&(0x7f0000002080)={0x0, 0x70, 0x100, 0x0, 0x2, 0x401, 0x0, 0x6, 0x1, 0x6, 0x656, 0x5, 0xfffffffffffff973, 0xffffffffffffffff, 0x9, 0x7, 0x3, 0x3ff, 0x1c000000, 0x10000, 0x6, 0x20, 0x6, 0x1, 0x1, 0x4, 0x2, 0x20, 0x9, 0xed5, 0x847, 0x1000, 0x0, 0x0, 0x102bed3b, 0x9, 0x7fffffff, 0x6, 0x0, 0x24, 0x0, @perf_config_ext={0x100000001, 0x6}, 0x200, 0x800000010000000, 0x7, 0x7, 0x1000, 0xf3, 0xe87}, r12, 0xf, r11, 0x8) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000002100)) perf_event_open(&(0x7f0000002180)={0x4, 0x70, 0x0, 0x8, 0xff, 0x0, 0x0, 0xfffffffffffffff9, 0x10001, 0x3, 0xffffffffffffff00, 0x93eb, 0x1, 0x4e5e, 0x8001, 0xfffffffffffffff8, 0x7, 0x1f4, 0x80000001, 0x99b, 0x0, 0x8, 0xed8, 0x3f, 0xec9, 0x6, 0x1, 0x4ab8, 0x8, 0x2, 0xdd, 0x9, 0xffffffffffffffff, 0x8000, 0x0, 0x6, 0xffff, 0x8, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000002140), 0xf}, 0x400, 0x5, 0x7, 0x4, 0x7, 0x4}, r12, 0x3, r7, 0x8) [ 370.341452] ? __list_lru_init+0x352/0x750 [ 370.345692] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 370.350800] ? trace_hardirqs_off+0x10/0x10 [ 370.355125] ? find_next_zero_bit+0xe3/0x110 [ 370.359544] ? trace_hardirqs_off+0x10/0x10 [ 370.363867] ? find_held_lock+0x35/0x1d0 [ 370.367936] ? __lock_is_held+0xb6/0x140 [ 370.372005] ? check_same_owner+0x320/0x320 [ 370.376326] ? lock_downgrade+0x980/0x980 [ 370.380478] ? rcu_note_context_switch+0x710/0x710 [ 370.385404] ? find_held_lock+0x35/0x1d0 [ 370.389468] should_failslab+0xec/0x120 [ 370.393454] __kmalloc+0x63/0x760 [ 370.396912] ? lock_downgrade+0x980/0x980 [ 370.401063] ? register_shrinker+0x10e/0x2d0 [ 370.405477] ? trace_event_raw_event_module_request+0x320/0x320 [ 370.411540] register_shrinker+0x10e/0x2d0 [ 370.415779] ? __bpf_trace_mm_vmscan_wakeup_kswapd+0x40/0x40 [ 370.421575] ? memcpy+0x45/0x50 [ 370.424860] sget_userns+0xbbf/0xe40 [ 370.428677] ? set_anon_super+0x20/0x20 [ 370.432655] ? put_filp+0x90/0x90 [ 370.436116] ? destroy_unused_super.part.6+0xd0/0xd0 [ 370.441220] ? path_lookupat+0x238/0xba0 [ 370.445280] ? mnt_free_id.isra.21+0x50/0x50 [ 370.449695] ? trace_hardirqs_off+0x10/0x10 [ 370.454019] ? putname+0xee/0x130 [ 370.457474] ? cap_capable+0x1b5/0x230 [ 370.461367] ? security_capable+0x8e/0xc0 [ 370.465519] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 370.470706] ? ns_capable_common+0xcf/0x160 [ 370.475028] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 370.480214] mount_ns+0x6d/0x190 [ 370.483578] rpc_mount+0x9e/0xd0 [ 370.486939] mount_fs+0x66/0x2d0 [ 370.490306] vfs_kern_mount.part.26+0xc6/0x4a0 [ 370.494881] ? may_umount+0xa0/0xa0 [ 370.498504] ? _raw_read_unlock+0x22/0x30 [ 370.502649] ? __get_fs_type+0x8a/0xc0 [ 370.506532] do_mount+0xea4/0x2bb0 [ 370.510065] ? __might_fault+0x110/0x1d0 [ 370.514120] ? copy_mount_string+0x40/0x40 [ 370.518344] ? check_same_owner+0x320/0x320 [ 370.522662] ? __check_object_size+0x8b/0x530 [ 370.527159] ? __might_sleep+0x95/0x190 [ 370.531137] ? kasan_check_write+0x14/0x20 [ 370.535371] ? _copy_from_user+0x99/0x110 [ 370.539518] ? memdup_user+0x5e/0x90 [ 370.543228] ? copy_mount_options+0x1f7/0x2e0 [ 370.547720] SyS_mount+0xab/0x120 [ 370.551165] ? copy_mnt_ns+0xb30/0xb30 [ 370.555050] do_syscall_64+0x281/0x940 [ 370.558930] ? vmalloc_sync_all+0x30/0x30 [ 370.563071] ? _raw_spin_unlock_irq+0x27/0x70 [ 370.567563] ? finish_task_switch+0x1c1/0x7e0 [ 370.572057] ? syscall_return_slowpath+0x550/0x550 [ 370.576979] ? syscall_return_slowpath+0x2ac/0x550 [ 370.581898] ? prepare_exit_to_usermode+0x350/0x350 [ 370.586896] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 370.592242] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 370.597060] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 370.602229] RIP: 0033:0x454e79 [ 370.605394] RSP: 002b:00007fed74635c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 370.613080] RAX: ffffffffffffffda RBX: 00007fed746366d4 RCX: 0000000000454e79 [ 370.620329] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 370.627580] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 370.634835] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000016 2018/03/31 09:08:31 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xf, 0x5, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x80000000}, [@map={0x18, 0x1, 0x1, 0x0, 0x1}], {0x95}}, &(0x7f0000000040)='syzkaller\x00', 0x3, 0x10, &(0x7f0000000080)=""/16, 0x41000, 0x2f3100a785778bd1}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000001c0)={r0, 0x50, &(0x7f0000000140)}, 0x10) close(r0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000780)={&(0x7f0000000240)=@ax25, 0x80, &(0x7f0000000600)=[{&(0x7f00000002c0)=""/114, 0x72}, {&(0x7f0000000340)=""/133, 0x85}, {&(0x7f0000000400)=""/23, 0x17}, {&(0x7f0000000440)=""/59, 0x3b}, {&(0x7f0000000480)=""/114, 0x72}, {&(0x7f0000000500)=""/45, 0x2d}, {&(0x7f0000000540)=""/83, 0x53}, {&(0x7f00000005c0)}], 0x8, &(0x7f0000000680)=""/214, 0xd6, 0x100}, 0x40) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000007c0)={0xffffffffffffffff}) recvmsg(r2, &(0x7f00000019c0)={&(0x7f0000000800)=@ax25, 0x80, &(0x7f00000018c0)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000001880)=""/18, 0x12}], 0x2, &(0x7f0000001900)=""/184, 0xb8, 0x3}, 0x1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001a80)={r4, 0x50, &(0x7f0000001a00)}, 0x10) r5 = perf_event_open(&(0x7f0000001b00)={0x2, 0x70, 0x6, 0x8, 0x80000000, 0x10001, 0x0, 0x7ff, 0x4, 0xa, 0x200, 0x20, 0x72, 0x5, 0x0, 0x0, 0x5, 0x8f, 0x9ed, 0xff, 0x0, 0xa58, 0x7f, 0xf2f, 0x4503, 0x6, 0x81, 0x5, 0x1ff, 0xffffffff00000000, 0x2, 0x5, 0x9000000000000, 0xfffffffffffffffa, 0x8, 0x10001, 0x731ab510, 0x9, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000001ac0), 0x1}, 0x80, 0x2b4, 0x200, 0x3, 0x6, 0x9, 0x4}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0x20000) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000001b80)) r6 = getpid() r7 = perf_event_open(&(0x7f0000001c00)={0x1, 0x70, 0x0, 0xfff, 0x4, 0x80000000, 0x0, 0x3, 0x40, 0xa, 0x7, 0x7, 0x7, 0x4800000000000000, 0x7, 0x6, 0x62b, 0x8, 0x9, 0x100000000, 0x1, 0x0, 0x5, 0xd199, 0x1f, 0x10000, 0xff80000000000000, 0x3, 0x4, 0x8, 0x80000001, 0x8000, 0x7fff, 0x4, 0x16, 0x7, 0x40, 0x8, 0x0, 0x5, 0x50031dd1e89e26d1, @perf_bp={&(0x7f0000001bc0), 0x2}, 0x10000, 0x3a, 0x80000001, 0x1, 0x2c, 0x3ff, 0x6}, r6, 0x6, r3, 0x3) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000001c80)=r0, 0x4) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000001cc0)) ioctl$PERF_EVENT_IOC_REFRESH(r7, 0x2402, 0xffffffff) r8 = perf_event_open(&(0x7f0000001d00)={0x0, 0x70, 0x7, 0x400, 0x100, 0xac, 0x0, 0x100000000, 0xc2800, 0xa, 0x33e3, 0x2, 0x10001, 0x8, 0x5, 0x100000001, 0x2e9, 0x2, 0xc1, 0xf2, 0x2, 0x9, 0xffff, 0x7, 0x1, 0x0, 0x8000, 0x800, 0xfffffffffffffffa, 0x40, 0x0, 0x3, 0x6, 0xfa4, 0x7, 0xffffffffffff8000, 0x0, 0x0, 0x0, 0x8000, 0x3, @perf_config_ext={0x400}, 0x100, 0xa264, 0x4, 0x7, 0x2, 0x1000, 0x92}, r6, 0x5, r7, 0x1) socketpair(0x7, 0x6, 0x1, &(0x7f0000001d80)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000001e00)={&(0x7f0000001dc0)='./file0\x00', r9}, 0x10) r10 = perf_event_open(&(0x7f0000001e40)={0x4, 0x70, 0x5, 0x4, 0x8, 0x6, 0x0, 0x2, 0x1425, 0xb, 0x0, 0xcc9, 0x400, 0x57f90db4, 0x80000000, 0x7, 0x1000, 0x0, 0x8, 0x8000, 0xffffffff, 0x400, 0x1, 0x6, 0x40, 0x2, 0x10000, 0x8, 0x9, 0xfffffffffffffff8, 0x9, 0x4, 0x3, 0x400, 0x3, 0x9, 0x3, 0x100, 0x0, 0x6, 0x0, @perf_config_ext={0x4, 0x2}, 0x20, 0x3ff, 0x0, 0x7, 0x3, 0x5, 0xfa5e}, r6, 0xd, r7, 0x2) bpf$OBJ_GET_MAP(0x7, &(0x7f0000001f00)={&(0x7f0000001ec0)='./file0\x00'}, 0x10) socketpair$inet6_sctp(0xa, 0x0, 0x84, &(0x7f0000001f40)) ioctl$PERF_EVENT_IOC_DISABLE(r10, 0x2401, 0xbad) r11 = perf_event_open(&(0x7f0000001fc0)={0x3, 0x70, 0xff, 0x2f, 0x2, 0x7, 0x0, 0x40, 0x80000, 0x1, 0x8, 0x6, 0xfffffffffffffffb, 0x7, 0x2, 0x10000, 0x6, 0x5, 0x0, 0x10, 0x6, 0xc58, 0x7f, 0x3, 0x2, 0x3, 0x5, 0x80000000800000, 0x7, 0xfff, 0x16, 0x2b65, 0x9, 0x69244395, 0x10000, 0x4, 0x9, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000001f80), 0x8}, 0x100, 0x8, 0x51b4, 0x4, 0x800, 0xb7, 0x4800}, r6, 0x8, r8, 0x1) r12 = gettid() socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000002040)) perf_event_open(&(0x7f0000002080)={0x0, 0x70, 0x100, 0x0, 0x2, 0x401, 0x0, 0x6, 0x1, 0x6, 0x656, 0x5, 0xfffffffffffff973, 0xffffffffffffffff, 0x9, 0x7, 0x3, 0x3ff, 0x1c000000, 0x10000, 0x6, 0x20, 0x6, 0x1, 0x1, 0x4, 0x2, 0x20, 0x9, 0xed5, 0x847, 0x1000, 0x0, 0x0, 0x102bed3b, 0x9, 0x7fffffff, 0x6, 0x0, 0x24, 0x0, @perf_config_ext={0x100000001, 0x6}, 0x200, 0x800000010000000, 0x7, 0x7, 0x1000, 0xf3, 0xe87}, r12, 0xf, r11, 0x8) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000002100)) perf_event_open(&(0x7f0000002180)={0x4, 0x70, 0x0, 0x8, 0xff, 0x0, 0x0, 0xfffffffffffffff9, 0x10001, 0x3, 0xffffffffffffff00, 0x93eb, 0x1, 0x4e5e, 0x8001, 0xfffffffffffffff8, 0x7, 0x1f4, 0x80000001, 0x99b, 0x0, 0x8, 0xed8, 0x3f, 0xec9, 0x6, 0x1, 0x4ab8, 0x8, 0x2, 0xdd, 0x9, 0xffffffffffffffff, 0x8000, 0x0, 0x6, 0xffff, 0x8, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000002140), 0xf}, 0x400, 0x5, 0x7, 0x4, 0x7, 0x4}, r12, 0x3, r7, 0x8) [ 370.642080] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000001f [ 370.693195] FAULT_INJECTION: forcing a failure. [ 370.693195] name failslab, interval 1, probability 0, space 0, times 0 [ 370.704488] CPU: 0 PID: 10734 Comm: syz-executor7 Not tainted 4.16.0-rc6+ #43 [ 370.711769] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 370.721122] Call Trace: [ 370.723702] dump_stack+0x194/0x24d [ 370.727308] ? arch_local_irq_restore+0x53/0x53 [ 370.731961] ? print_irqtrace_events+0x270/0x270 [ 370.736697] ? print_irqtrace_events+0x270/0x270 [ 370.741458] should_fail+0x8c0/0xa40 [ 370.745162] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 370.750254] ? __lock_acquire+0x664/0x3e00 [ 370.754468] ? find_held_lock+0x35/0x1d0 [ 370.758507] ? __lock_is_held+0xb6/0x140 [ 370.762547] ? check_same_owner+0x320/0x320 [ 370.766845] ? rcu_note_context_switch+0x710/0x710 [ 370.771757] should_failslab+0xec/0x120 [ 370.775709] kmem_cache_alloc+0x47/0x760 [ 370.779748] alloc_vfsmnt+0xe0/0x9c0 [ 370.783438] ? trace_hardirqs_off+0x10/0x10 [ 370.787737] ? mnt_free_id.isra.21+0x50/0x50 [ 370.792130] ? find_held_lock+0x35/0x1d0 [ 370.796167] ? clone_mnt+0x74a/0x11d0 [ 370.799942] ? lock_downgrade+0x980/0x980 [ 370.804064] ? lock_downgrade+0x980/0x980 [ 370.808196] ? lock_release+0xa40/0xa40 [ 370.812153] ? trace_hardirqs_off+0x10/0x10 [ 370.816450] ? do_raw_spin_trylock+0x190/0x190 [ 370.821015] ? lockref_get_not_dead+0x66/0x80 [ 370.825500] clone_mnt+0x118/0x11d0 [ 370.829107] ? find_held_lock+0x35/0x1d0 [ 370.833142] ? mark_mounts_for_expiry+0x7f0/0x7f0 [ 370.837962] ? is_subdir+0x259/0x430 [ 370.841664] ? lock_downgrade+0x980/0x980 [ 370.845787] ? lock_release+0xa40/0xa40 [ 370.849738] ? is_subdir+0x144/0x430 [ 370.853431] ? is_subdir+0x29b/0x430 [ 370.857126] ? d_move+0x90/0x90 [ 370.860397] ? get_mountpoint+0xc9/0x3c0 [ 370.864439] ? rcu_read_lock_sched_held+0x108/0x120 [ 370.869432] copy_tree+0x379/0xa40 [ 370.872949] ? down_read+0x150/0x150 [ 370.876638] ? to_mnt_ns+0x20/0x20 [ 370.880156] ? lock_mount+0xf4/0x2c0 [ 370.883845] do_mount+0x1fb9/0x2bb0 [ 370.887449] ? copy_mount_string+0x40/0x40 [ 370.891658] ? rcu_pm_notify+0xc0/0xc0 [ 370.895523] ? copy_mount_options+0x5f/0x2e0 [ 370.899915] ? kmem_cache_alloc_trace+0x459/0x740 [ 370.904751] ? kasan_check_write+0x14/0x20 [ 370.908964] ? copy_mount_options+0x1f7/0x2e0 [ 370.913434] SyS_mount+0xab/0x120 [ 370.916861] ? copy_mnt_ns+0xb30/0xb30 [ 370.920727] do_syscall_64+0x281/0x940 [ 370.924592] ? vmalloc_sync_all+0x30/0x30 [ 370.928715] ? _raw_spin_unlock_irq+0x27/0x70 [ 370.933197] ? finish_task_switch+0x1c1/0x7e0 [ 370.937674] ? syscall_return_slowpath+0x550/0x550 [ 370.942586] ? syscall_return_slowpath+0x2ac/0x550 [ 370.947489] ? prepare_exit_to_usermode+0x350/0x350 [ 370.952480] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 370.957818] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 370.962642] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 370.967803] RIP: 0033:0x454e79 [ 370.970967] RSP: 002b:00007fd81e272c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 370.978649] RAX: ffffffffffffffda RBX: 00007fd81e2736d4 RCX: 0000000000454e79 [ 370.985891] RDX: 0000000020000780 RSI: 0000000020000ac0 RDI: 0000000020000000 [ 370.993142] RBP: 000000000072bea0 R08: 0000000020000b00 R09: 0000000000000000 [ 371.000398] R10: 0000000000037002 R11: 0000000000000246 R12: 0000000000000016 [ 371.007647] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000000a [ 371.020682] ------------[ cut here ]------------ [ 371.025475] refcount_t: increment on 0; use-after-free. [ 371.030971] WARNING: CPU: 0 PID: 4440 at lib/refcount.c:153 refcount_inc+0x47/0x50 [ 371.038665] Kernel panic - not syncing: panic_on_warn set ... [ 371.038665] [ 371.046003] CPU: 0 PID: 4440 Comm: syz-executor1 Not tainted 4.16.0-rc6+ #43 [ 371.053167] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 371.062494] Call Trace: [ 371.065058] dump_stack+0x194/0x24d [ 371.068661] ? arch_local_irq_restore+0x53/0x53 [ 371.073307] ? vsnprintf+0x1ed/0x1900 [ 371.077085] panic+0x1e4/0x41c [ 371.080252] ? refcount_error_report+0x214/0x214 [ 371.084991] ? show_regs_print_info+0x18/0x18 [ 371.089890] ? __warn+0x1c1/0x200 [ 371.093319] ? refcount_inc+0x47/0x50 [ 371.097095] __warn+0x1dc/0x200 [ 371.100346] ? refcount_inc+0x47/0x50 [ 371.104122] report_bug+0x1f4/0x2b0 [ 371.107730] fixup_bug.part.10+0x37/0x80 [ 371.111765] do_error_trap+0x2d7/0x3e0 [ 371.115628] ? vprintk_default+0x28/0x30 [ 371.119663] ? math_error+0x400/0x400 [ 371.123439] ? printk+0xaa/0xca [ 371.126690] ? show_regs_print_info+0x18/0x18 [ 371.131162] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 371.135980] do_invalid_op+0x1b/0x20 [ 371.139668] invalid_op+0x1b/0x40 [ 371.143095] RIP: 0010:refcount_inc+0x47/0x50 [ 371.147473] RSP: 0018:ffff8801aea57860 EFLAGS: 00010286 [ 371.152812] RAX: dffffc0000000008 RBX: ffff8801a9c1c084 RCX: ffffffff815b423e [ 371.160054] RDX: 0000000000000000 RSI: 1ffff10035d4aebc RDI: 1ffff10035d4ae91 [ 371.167298] RBP: ffff8801aea57868 R08: 0000000000000000 R09: 0000000000000000 [ 371.174541] R10: 0000000000000000 R11: 0000000000000000 R12: ffff8801aea57af8 [ 371.181785] R13: ffff8801a8f67513 R14: ffff8801a9c1c080 R15: ffff8801a8f67501 [ 371.189037] ? vprintk_func+0x5e/0xc0 [ 371.192817] sk_alloc+0x3f9/0x1440 [ 371.196332] ? sock_def_error_report+0x5e0/0x5e0 [ 371.201059] ? __raw_spin_lock_init+0x2d/0x100 [ 371.205615] ? trace_hardirqs_off+0x10/0x10 [ 371.209909] ? do_raw_write_unlock+0x290/0x290 [ 371.214463] ? trace_hardirqs_off+0x10/0x10 [ 371.218758] ? __raw_spin_lock_init+0x1c/0x100 [ 371.223314] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 371.228305] ? find_held_lock+0x35/0x1d0 [ 371.232343] ? inet_create+0x3fc/0xf50 [ 371.236204] ? lock_downgrade+0x980/0x980 [ 371.240326] ? lock_release+0xa40/0xa40 [ 371.244272] ? lock_downgrade+0x980/0x980 [ 371.248397] inet_create+0x47c/0xf50 [ 371.252086] ? ipip_gro_receive+0xf0/0xf0 [ 371.256207] ? __lock_is_held+0xb6/0x140 [ 371.260247] __sock_create+0x4d4/0x850 [ 371.264109] ? kernel_sock_ip_overhead+0x4c0/0x4c0 [ 371.269021] ? user_path_create+0x40/0x40 [ 371.273146] SyS_socket+0xeb/0x1d0 [ 371.276660] ? fillonedir+0x250/0x250 [ 371.280434] ? move_addr_to_kernel+0x60/0x60 [ 371.284815] ? getname_flags+0x256/0x580 [ 371.288851] ? do_syscall_64+0xb7/0x940 [ 371.292801] ? move_addr_to_kernel+0x60/0x60 [ 371.297186] do_syscall_64+0x281/0x940 [ 371.301047] ? vmalloc_sync_all+0x30/0x30 [ 371.305167] ? trace_event_raw_event_sys_exit+0x260/0x260 [ 371.310678] ? syscall_return_slowpath+0x550/0x550 [ 371.315580] ? syscall_return_slowpath+0x2ac/0x550 [ 371.320484] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 371.325820] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 371.330637] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 371.335801] RIP: 0033:0x4579a7 [ 371.338963] RSP: 002b:00007fffac99d558 EFLAGS: 00000202 ORIG_RAX: 0000000000000029 [ 371.346643] RAX: ffffffffffffffda RBX: 0000000000000480 RCX: 00000000004579a7 [ 371.353885] RDX: 0000000000000006 RSI: 0000000000000001 RDI: 0000000000000002 [ 371.361127] RBP: 000000000005a7fc R08: 0000000000000000 R09: 0000000000000001 [ 371.368370] R10: 000000000000000a R11: 0000000000000202 R12: 0000000000000a55 [ 371.375614] R13: 000000000000001c R14: 0000000000000a55 R15: 000000000005a529 [ 371.383455] Dumping ftrace buffer: [ 371.386977] (ftrace buffer empty) [ 371.390659] Kernel Offset: disabled [ 371.394259] Rebooting in 86400 seconds..