, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000001fc0)) sendmsg(0xffffffffffffffff, &(0x7f00000024c0)={&(0x7f0000002040)=@un=@file={0x0, './file0\x00'}, 0x80, &(0x7f0000001f40)=[{&(0x7f00000020c0)="73c7575b94a72990e177f86ed4835a72a65c1a6c6831eeb0c48163a47ab63bcb605c8450cc4798ff6521c2aa722d1a7105c8a07e6c", 0x35}], 0x1, &(0x7f0000002500)=ANY=[], 0x0, 0x40000}, 0x20000000) r2 = gettid() r3 = perf_event_open(&(0x7f0000001ac0)={0x1, 0x70, 0xffffffff, 0x835, 0x9, 0xffffffffffffff5f, 0x0, 0x1000, 0x42000, 0x3, 0x8, 0x80, 0x1, 0x4, 0x100000001, 0x9, 0xff, 0x8, 0x1000, 0x7, 0x7f, 0x200, 0xb715, 0x3, 0x7fffffff, 0xf0a, 0x40, 0x8000, 0x8, 0x7, 0x0, 0x4, 0x6, 0x100, 0x7, 0x335, 0x3ff, 0x58, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000001a80), 0xe}, 0x0, 0x80000000, 0x82, 0x7, 0x5, 0x3, 0x80000001}, r2, 0xd, r1, 0x8) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000200)='mqueue\x00', 0x0, &(0x7f000000a000)) r4 = getpid() r5 = bpf$PROG_LOAD(0x5, &(0x7f0000002500)={0xf, 0x7, &(0x7f0000001940)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, [@ldst={0x3, 0x3, 0x3, 0x4, 0x3, 0x2, 0xffffffffffffffff}, @exit={0x95}], {0x95}}, &(0x7f0000001980)='GPL\x00', 0xff, 0x1000, &(0x7f00000039c0)=""/4096, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000019c0)={&(0x7f0000000180)='./file0\x00', r5}, 0x10) perf_event_open(&(0x7f0000001a00)={0x0, 0x70, 0x0, 0x8, 0x0, 0x3, 0x0, 0xb8, 0x1000, 0x0, 0x3, 0x4, 0xfff, 0x4, 0x4dae, 0x40, 0x100000001, 0x6, 0x4, 0x0, 0x3, 0x753c, 0x6, 0x100, 0x1de, 0x6, 0x4, 0x1, 0x6, 0x4, 0x7, 0x3, 0x7fff, 0x80000000, 0x3, 0x8, 0x81, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x7, 0x4}, 0x801, 0x400, 0x1, 0x4, 0x1, 0x9, 0x80000001}, r4, 0x7, r1, 0xb) r6 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000004000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000001c00)='./file0\x00', &(0x7f0000001c40)='./file0\x00', &(0x7f0000001c80)='devpts\x00', 0x40, &(0x7f0000001cc0)="be623dfd58807ac0b2f86f052863a5f30adc0bce173ebcf648cefd7d64732aeb5b94e6af3ab33e53669ba6d304d067dad4b1ff3ed87f18fd170aac904e8f105e80e22881717c98752a9cd7cfb06d102877e3b36b2624d22427331755a9514b225d25999ed605ffe4188630db2e7ddcc57f6316b60c4f3845d9dfcbbde5e49af627b48d7c9bd743b536de31a9ba3010cb6714c9b90a50537be55ca12a18e6541bff5a82d293e7734ea9c90707899663bd96b3bcce5887bf0bd35963c5adc39ddcb6f2a0a02b01661242046cb54ef1aec5a486b69e006305064124867bf79f4dc11798e214b61575168b79887122e0a3461f703c077f902c0a") socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r7, &(0x7f0000001800)={&(0x7f0000000240)=@alg, 0x80, &(0x7f0000000740)=[{&(0x7f00000002c0)=""/83, 0x53}, {&(0x7f0000000340)=""/27, 0x1b}, {&(0x7f0000000380)}, {&(0x7f00000003c0)=""/40, 0x28}, {&(0x7f0000000400)=""/144, 0x90}, {&(0x7f00000004c0)=""/200, 0xc8}, {&(0x7f00000005c0)=""/60, 0x3c}, {&(0x7f0000000600)=""/105, 0x69}, {&(0x7f0000000680)=""/127, 0x7f}, {&(0x7f0000000700)=""/8, 0x8}], 0xa, &(0x7f0000000800)=""/4096, 0x1000}, 0x10000) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000002340)=0xf60) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000003900)={&(0x7f0000003400)=@can={0x0, 0x0}, 0x80, &(0x7f0000003840)=[{&(0x7f0000003480)=""/194, 0xc2}, {&(0x7f0000003580)=""/250, 0xfa}, {&(0x7f0000003680)=""/100, 0x64}, {&(0x7f0000003700)=""/14, 0xe}, {&(0x7f0000003740)=""/159, 0x9f}, {&(0x7f0000003800)=""/15, 0xf}], 0x6, &(0x7f00000038c0)=""/29, 0x1d, 0x5}, 0x3) bpf$PROG_LOAD(0x5, &(0x7f0000003940)={0x4, 0x9, &(0x7f0000001840)=ANY=[@ANYBLOB="18000000030000000000000003000000dfd00c00fcffffff0000000000000000000803000101000000810000000000000001f0fff0ffffff000000000000000095000000000017d2"], &(0x7f0000000380)='GPL\x00', 0xf172, 0x4b, &(0x7f00000018c0)=""/75, 0x41f00, 0x1, [], r8}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000000c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001f00)={0xffffffffffffffff, 0x0, 0xf6, 0x22, &(0x7f0000001dc0)="9ef9482ea02fd36d0a768986a7ebe7a627dc88937e7073e3521858dfa0d5e02f571a01cfdfa76e048e5f956ea5da60b90e02a6c3d3687ed61ec9ab5b682c02498bddef38de9ce8c753e41e78f414d16202a033b6c7752711a5f56924e7846d6dcde2f71026e1eb0319b5e60f6b1ec67fca31c3cf1691d3af91a19f56be5a10ff337a53ba13dd3d75e1555211954b92ec0082d02b7b4cdddc021cbe84e4af8f20788977e3416918843e6c92b2ebf7b8b33ecbd4c7c9a9d5036c3e3e538748a32f1a28eb77818ca1878ffdd445dcdb8a40e6221e0fc474428449dfe93c62bbc69996aa9b34488c1da4f6f7c2275305a6a4fb256c1a516d", &(0x7f0000001ec0)=""/34, 0x1f, 0x1}, 0x28) close(r6) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x3441, &(0x7f0000000080)) mount(&(0x7f00000021c0)='./file0/file0\x00', &(0x7f0000002200)='./file0/file0\x00', &(0x7f0000002240)='fuse\x00', 0x2000000, &(0x7f0000002280)="9b3923bfddc346e9fa2aeaffae6ca386d8d50ba83ab72218340d3c30c045a89ac016797652ba04f1a203cfceccb458dbfd9fd03c4a80ef9a40dc7a4f24b6619d04a58186466fd8465757d9ee053c082cdfa957e7efab6191761847cca59c017493ef5e3d22432cf0b4ebef") ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f00000023c0)=ANY=[@ANYBLOB="07000000000000000000000000000000000000000000000000000000000000000000000067eb0ecf1cfa4ffd89aa7e339417beb7d332a5c996e59875644dd1e3a690110400bc751bb0435977d90fcbb2b83c27812d818991d125e9c0f199be2bc7f01aa0a5cb9b9f99438aa0f1ae3d50201f7bb276536f567f03f062994da292b6db0000000000000000000000000000a93536f303000000000000002a27f6ae1258ebb5079c1bab4f1f6f11ee8ce2e590855a3af38e4bb871ef8400000000000000000000"]) mount(&(0x7f0000001b40)='./file0\x00', &(0x7f0000001b80)='./file0/file0\x00', &(0x7f0000002100)='vfat\x00', 0x0, &(0x7f0000002140)="98980e21ac8b46c0b7bedeee39e6bd9ae4088d6ab47dc9dc76a39e299ce3783aa33e482e450484961fd3e3c5b178fafbe54440e19512ea4298652ed129d4241d9d116d8a5c2b931d350f0c989f8a288fc9e56c") mount(&(0x7f0000df7000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='hugetlbfs\x00', 0x200, &(0x7f00000001c0)) mkdir(&(0x7f00000004c0)='./file0/file0\x00', 0x0) socketpair$inet(0x2, 0x0, 0x1f, &(0x7f0000000080)) 2018/03/31 08:25:51 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000000003042df87"]) r1 = perf_event_open(&(0x7f0000348f88)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r2}, 0x10) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) mount(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f00000002c0)='devpts\x00', 0x800000, &(0x7f0000000300)="7b18f1563c67659c49445440cbb57f32c0f4710f0219046399f3e8a25c5d4975e2b42f404b14937bd42d9874bdd132eef77f584d5151c9a97470a0d77a0c24a85e319673350e16b039bf474ec320") socketpair(0x3, 0x800, 0x81, &(0x7f00000003c0)) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') 2018/03/31 08:25:51 executing program 1: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={0xffffffffffffffff, &(0x7f0000000700), &(0x7f00000009c0)=""/161}, 0x18) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x0, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") 2018/03/31 08:25:51 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) socketpair(0x0, 0x4, 0x6, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) socketpair(0xf, 0x3, 0x2, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000080)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r1, &(0x7f00000000c0)="2d0c86ed4bd875360d92798f8717d9623016096786d2f7be60b3d23ceb4be42156914c30c6385bf5c19afed53aaa3c9ced975af570b40fd9805349fd987ad1c4630caadbada02bd7cc3d0f509556a827ccc0f76c8b509a2164220ed6849d818bf15147eda1d3c456f2d07f3fd881399bad93058d975a69316814f31c24fc0b88c59f6df37a13f0eab7a87a3a1d444e7cb97d4c21e92486a9ea6c67ff88892d3dfebe5950abc1f249e067ad435dee43ca9bf0f5c973f1", &(0x7f00000001c0)=""/144}, 0x18) 2018/03/31 08:25:51 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x0, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r4 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f00000009c0)="3949bcf20271c219f64b9e3fbd45bfae692375440912d5a576c2d82299018de50363f2cf30a439b45c2738869283b7900c1e030013700557a768d5cc05cb9ed624684f4dfdae73a8148b29b2978222576dabbcb3556bcf35a8f66fa68ceb0b834ec5120ac749dc0cc5aab7b0197711785349b1673ff5159bc1a40df6c779950e0747a25ce77a10f68b663a87fc993224a79b583eac02a2171f076ff3", 0x1000, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") gettid() close(0xffffffffffffffff) 2018/03/31 08:25:51 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000348f88)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r2}, 0x10) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') [ 208.697561] devpts: called with bogus options [ 208.717399] devpts: called with bogus options 2018/03/31 08:25:51 executing program 1: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={0xffffffffffffffff, &(0x7f0000000700), &(0x7f00000009c0)=""/161}, 0x18) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)) [ 208.756597] devpts: called with bogus options [ 208.760396] hugetlbfs: Bad mount option: "" [ 208.788315] devpts: called with bogus options 2018/03/31 08:25:51 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000348f88)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r2}, 0x10) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) mount(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f00000002c0)='devpts\x00', 0x800000, &(0x7f0000000300)="7b18f1563c67659c49445440cbb57f32c0f4710f0219046399f3e8a25c5d4975e2b42f404b14937bd42d9874bdd132eef77f584d5151c9a97470a0d77a0c24a85e319673350e16b039bf474ec320") ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x40) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x5) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') 2018/03/31 08:25:51 executing program 7: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x80000000000, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000001fc0)) sendmsg(0xffffffffffffffff, &(0x7f00000024c0)={&(0x7f0000002040)=@un=@file={0x0, './file0\x00'}, 0x80, &(0x7f0000001f40)=[{&(0x7f00000020c0)="73c7575b94a72990e177f86ed4835a72a65c1a6c6831eeb0c48163a47ab63bcb605c8450cc4798ff6521c2aa722d1a7105c8a07e6c", 0x35}], 0x1, &(0x7f0000002500)=ANY=[], 0x0, 0x40000}, 0x20000000) r2 = gettid() r3 = perf_event_open(&(0x7f0000001ac0)={0x1, 0x70, 0xffffffff, 0x835, 0x9, 0xffffffffffffff5f, 0x0, 0x1000, 0x42000, 0x3, 0x8, 0x80, 0x1, 0x4, 0x100000001, 0x9, 0xff, 0x8, 0x1000, 0x7, 0x7f, 0x200, 0xb715, 0x3, 0x7fffffff, 0xf0a, 0x40, 0x8000, 0x8, 0x7, 0xffffffffffffff74, 0x0, 0x6, 0x100, 0x7, 0x335, 0x3ff, 0x58, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000001a80), 0xe}, 0x0, 0x80000000, 0x82, 0x7, 0x5, 0x3, 0x80000001}, r2, 0xd, r1, 0x8) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000200)='mqueue\x00', 0x0, &(0x7f000000a000)) r4 = getpid() r5 = bpf$PROG_LOAD(0x5, &(0x7f0000002500)={0xf, 0x7, &(0x7f0000001940)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, [@ldst={0x3, 0x3, 0x3, 0x4, 0x3, 0x2, 0xffffffffffffffff}, @exit={0x95}], {0x95}}, &(0x7f0000001980)='GPL\x00', 0xff, 0x1000, &(0x7f00000039c0)=""/4096, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000019c0)={&(0x7f0000000180)='./file0\x00', r5}, 0x10) perf_event_open(&(0x7f0000001a00)={0x0, 0x70, 0x0, 0x8, 0x0, 0x3, 0x0, 0xb8, 0x1000, 0x0, 0x3, 0x4, 0xfff, 0x4, 0x4dae, 0x40, 0x100000001, 0x6, 0x4, 0x0, 0x3, 0x753c, 0x6, 0x100, 0x1de, 0x6, 0x4, 0x1, 0x6, 0x4, 0x7, 0x3, 0x7fff, 0x80000000, 0x3, 0x8, 0x81, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x7, 0x4}, 0x801, 0x400, 0x1, 0x4, 0x1, 0x9, 0x80000001}, r4, 0x7, r1, 0xb) r6 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000004000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000001c00)='./file0\x00', &(0x7f0000001c40)='./file0\x00', &(0x7f0000001c80)='devpts\x00', 0x40, &(0x7f0000001cc0)="be623dfd58807ac0b2f86f052863a5f30adc0bce173ebcf648cefd7d64732aeb5b94e6af3ab33e53669ba6d304d067dad4b1ff3ed87f18fd170aac904e8f105e80e22881717c98752a9cd7cfb06d102877e3b36b2624d22427331755a9514b225d25999ed605ffe4188630db2e7ddcc57f6316b60c4f3845d9dfcbbde5e49af627b48d7c9bd743b536de31a9ba3010cb6714c9b90a50537be55ca12a18e6541bff5a82d293e7734ea9c90707899663bd96b3bcce5887bf0bd35963c5adc39ddcb6f2a0a02b01661242046cb54ef1aec5a486b69e006305064124867bf79f4dc11798e214b61575168b79887122e0a3461f703c077f902c0a") socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r7, &(0x7f0000001800)={&(0x7f0000000240)=@alg, 0x80, &(0x7f0000000740)=[{&(0x7f00000002c0)=""/83, 0x53}, {&(0x7f0000000340)=""/27, 0x1b}, {&(0x7f0000000380)}, {&(0x7f00000003c0)=""/40, 0x28}, {&(0x7f0000000400)=""/144, 0x90}, {&(0x7f00000004c0)=""/200, 0xc8}, {&(0x7f00000005c0)=""/60, 0x3c}, {&(0x7f0000000600)=""/105, 0x69}, {&(0x7f0000000680)=""/127, 0x7f}, {&(0x7f0000000700)=""/8, 0x8}], 0xa, &(0x7f0000000800)=""/4096, 0x1000}, 0x10000) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000002340)=0xf60) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000003900)={&(0x7f0000003400)=@can={0x0, 0x0}, 0x80, &(0x7f0000003840)=[{&(0x7f0000003480)=""/194, 0xc2}, {&(0x7f0000003580)=""/250, 0xfa}, {&(0x7f0000003680)=""/100, 0x64}, {&(0x7f0000003700)=""/14, 0xe}, {&(0x7f0000003740)=""/159, 0x9f}, {&(0x7f0000003800)=""/15, 0xf}], 0x6, &(0x7f00000038c0)=""/29, 0x1d, 0x5}, 0x3) bpf$PROG_LOAD(0x5, &(0x7f0000003940)={0x4, 0x9, &(0x7f0000001840)=ANY=[@ANYBLOB="18000000030000000000000003000000dfd00c00fcffffff0000000000000000000803000101000000810000000000000001f0fff0ffffff000000000000000095000000000017d2"], &(0x7f0000000380)='GPL\x00', 0xf172, 0x4b, &(0x7f00000018c0)=""/75, 0x41f00, 0x1, [], r8}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000000c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001f00)={0xffffffffffffffff, 0x0, 0xf6, 0x22, &(0x7f0000001dc0)="9ef9482ea02fd36d0a768986a7ebe7a627dc88937e7073e3521858dfa0d5e02f571a01cfdfa76e048e5f956ea5da60b90e02a6c3d3687ed61ec9ab5b682c02498bddef38de9ce8c753e41e78f414d16202a033b6c7752711a5f56924e7846d6dcde2f71026e1eb0319b5e60f6b1ec67fca31c3cf1691d3af91a19f56be5a10ff337a53ba13dd3d75e1555211954b92ec0082d02b7b4cdddc021cbe84e4af8f20788977e3416918843e6c92b2ebf7b8b33ecbd4c7c9a9d5036c3e3e538748a32f1a28eb77818ca1878ffdd445dcdb8a40e6221e0fc474428449dfe93c62bbc69996aa9b34488c1da4f6f7c2275305a6a4fb256c1a516d", &(0x7f0000001ec0)=""/34, 0x1f, 0x1}, 0x28) close(r6) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x3441, &(0x7f0000000080)) mount(&(0x7f00000021c0)='./file0/file0\x00', &(0x7f0000002200)='./file0/file0\x00', &(0x7f0000002240)='fuse\x00', 0x2000000, &(0x7f0000002280)="9b3923bfddc346e9fa2aeaffae6ca386d8d50ba83ab72218340d3c30c045a89ac016797652ba04f1a203cfceccb458dbfd9fd03c4a80ef9a40dc7a4f24b6619d04a58186466fd8465757d9ee053c082cdfa957e7efab6191761847cca59c017493ef5e3d22432cf0b4ebef") ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f00000023c0)=ANY=[@ANYBLOB="07000000000000000000000000000000000000000000000000000000000000000000000067eb0ecf1cfa4ffd89aa7e339417beb7d332a5c996e59875644dd1e3a690110400bc751bb0435977d90fcbb2b83c27812d818991d125e9c0f199be2bc7f01aa0a5cb9b9f99438aa0f1ae3d50201f7bb276536f567f03f062994da292b6db0000000000000000000000000000a93536f303000000000000002a27f6ae1258ebb5079c1bab4f1f6f11ee8ce2e590855a3af38e4bb871ef8400000000000000000000"]) mount(&(0x7f0000001b40)='./file0\x00', &(0x7f0000001b80)='./file0/file0\x00', &(0x7f0000002100)='vfat\x00', 0x0, &(0x7f0000002140)="98980e21ac8b46c0b7bedeee39e6bd9ae4088d6ab47dc9dc76a39e299ce3783aa33e482e450484961fd3e3c5b178fafbe54440e19512ea4298652ed129d4241d9d116d8a5c2b931d350f0c989f8a288fc9e56c") mount(&(0x7f0000df7000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='hugetlbfs\x00', 0x200, &(0x7f00000001c0)) mkdir(&(0x7f00000004c0)='./file0/file0\x00', 0x0) socketpair$inet(0x2, 0x0, 0x1f, &(0x7f0000000080)) 2018/03/31 08:25:51 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000000003042df8700"]) r1 = perf_event_open(&(0x7f0000348f88)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r2}, 0x10) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) mount(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f00000002c0)='devpts\x00', 0x800000, &(0x7f0000000300)="7b18f1563c67659c49445440cbb57f32c0f4710f0219046399f3e8a25c5d4975e2b42f404b14937bd42d9874bdd132eef77f584d5151c9a97470a0d77a0c24a85e319673350e16b039bf474ec320") socketpair(0x3, 0x800, 0x81, &(0x7f00000003c0)) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') 2018/03/31 08:25:51 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x0, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r4 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f00000009c0)="3949bcf20271c219f64b9e3fbd45bfae692375440912d5a576c2d82299018de50363f2cf30a439b45c2738869283b7900c1e030013700557a768d5cc05cb9ed624684f4dfdae73a8148b29b2978222576dabbcb3556bcf35a8f66fa68ceb0b834ec5120ac749dc0cc5aab7b0197711785349b1673ff5159bc1a40df6c779950e0747a25ce77a10f68b663a87fc993224a79b583eac02a2171f076ff3", 0x1000, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") gettid() close(0xffffffffffffffff) 2018/03/31 08:25:51 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) socketpair(0x0, 0x4, 0x6, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', 0x0, 0x10}, 0x10) 2018/03/31 08:25:51 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000348f88)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r2}, 0x10) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') 2018/03/31 08:25:51 executing program 6: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffd, 0x200, 0x7, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = getpid() r2 = perf_event_open(&(0x7f0000000080)={0x6, 0x70, 0x6, 0x3, 0x7, 0x6, 0x0, 0x5, 0x4000, 0x0, 0x8, 0x6, 0x5, 0x1, 0x6, 0x8, 0x10000, 0x0, 0x5, 0x9, 0x1f, 0xa8, 0x4, 0x10000, 0x6, 0x2, 0x3, 0x1000, 0x0, 0x8, 0x8001, 0x5, 0x6, 0xfffffffffffff800, 0x6, 0xff, 0x0, 0x6, 0x0, 0x8000, 0x1, @perf_bp={&(0x7f0000000000), 0x2}, 0x2002, 0x8001, 0x8, 0x0, 0x8, 0xffff, 0xff}, r1, 0x7, r0, 0xb) mkdir(&(0x7f0000000100)='./file0/file0\x00', 0xffffffffffffffff) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000001c0)={r2, 0x28, &(0x7f0000000140)}, 0x10) socketpair(0x3, 0x5, 0x6, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x1) close(r0) socketpair(0xf, 0x3, 0x2, &(0x7f0000000040)) [ 209.064914] devpts: called with bogus options [ 209.079630] hugetlbfs: Bad mount option: "" [ 209.113728] devpts: called with bogus options [ 209.116510] devpts: called with bogus options [ 209.148320] devpts: called with bogus options 2018/03/31 08:25:52 executing program 1: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={0xffffffffffffffff, &(0x7f0000000700), &(0x7f00000009c0)=""/161}, 0x18) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)) 2018/03/31 08:25:52 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = socket$kcm(0x29, 0x7, 0x0) socketpair(0x4, 0x2, 0x8, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000e80)={&(0x7f0000000e40)='./file0\x00', 0x0, 0x8}, 0x10) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000ec0)={r1, r2}) socketpair(0x2, 0x0, 0x6, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet(0x2, 0xa, 0xcece, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40042409, 0x1) socketpair(0xf, 0x3, 0x2, &(0x7f0000000040)) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0\x00', r3}, 0x10) sendmsg$kcm(r4, &(0x7f00000003c0)={&(0x7f00000001c0)=@ax25={0x3, {"0ce52943b8f422"}, 0xffff}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000240)="56dd6cf91c805d78fd57d40fe8481d5323182bf1eafa64c728c9bde08c615761b60e1fcc4d37d059feb1fa8ad74d10c489ea412e391b5005457811b1fe63dc829802c4db49fabe25bd8329caccdcd13c16f6c8bcbcdf5982bdc8d2e843bb1f592913fbe477dbbf0c9fac23c68e0c8e7d6395c02eba32e15b975ff757955163cc83f54b4e71", 0x85}], 0x1, &(0x7f0000000340)=[{0x68, 0x0, 0x2, "ac276bdc372a77e93e53c5437ae8ccf6bcff337510c1217596bfea2e36805b431d5d5a69d02cfe70cfbda1b25f4006d6e2f444e126678cc5b1c0d7387cf677da6ffbc402ae31e57382820dc781278142096369464c7b4721"}], 0x68, 0x4}, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0x0, 0x10}, 0x10) 2018/03/31 08:25:52 executing program 7: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x80000000000, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000001fc0)) sendmsg(0xffffffffffffffff, &(0x7f00000024c0)={&(0x7f0000002040)=@un=@file={0x0, './file0\x00'}, 0x80, &(0x7f0000001f40)=[{&(0x7f00000020c0)="73c7575b94a72990e177f86ed4835a72a65c1a6c6831eeb0c48163a47ab63bcb605c8450cc4798ff6521c2aa722d1a7105c8a07e6c", 0x35}], 0x1, &(0x7f0000002500)=ANY=[], 0x0, 0x40000}, 0x20000000) r2 = gettid() r3 = perf_event_open(&(0x7f0000001ac0)={0x1, 0x70, 0xffffffff, 0x835, 0x9, 0xffffffffffffff5f, 0x0, 0x1000, 0x42000, 0x3, 0x8, 0x80, 0x1, 0x4, 0x100000001, 0x9, 0xff, 0x8, 0x1000, 0x7, 0x7f, 0x200, 0xb715, 0x3, 0x7fffffff, 0xf0a, 0x40, 0x8000, 0x8, 0x7, 0xffffffffffffff74, 0x4, 0x0, 0x100, 0x7, 0x335, 0x3ff, 0x58, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000001a80), 0xe}, 0x0, 0x80000000, 0x82, 0x7, 0x5, 0x3, 0x80000001}, r2, 0xd, r1, 0x8) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000200)='mqueue\x00', 0x0, &(0x7f000000a000)) r4 = getpid() r5 = bpf$PROG_LOAD(0x5, &(0x7f0000002500)={0xf, 0x7, &(0x7f0000001940)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, [@ldst={0x3, 0x3, 0x3, 0x4, 0x3, 0x2, 0xffffffffffffffff}, @exit={0x95}], {0x95}}, &(0x7f0000001980)='GPL\x00', 0xff, 0x1000, &(0x7f00000039c0)=""/4096, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000019c0)={&(0x7f0000000180)='./file0\x00', r5}, 0x10) perf_event_open(&(0x7f0000001a00)={0x0, 0x70, 0x0, 0x8, 0x0, 0x3, 0x0, 0xb8, 0x1000, 0x0, 0x3, 0x4, 0xfff, 0x4, 0x4dae, 0x40, 0x100000001, 0x6, 0x4, 0x0, 0x3, 0x753c, 0x6, 0x100, 0x1de, 0x6, 0x4, 0x1, 0x6, 0x4, 0x7, 0x3, 0x7fff, 0x80000000, 0x3, 0x8, 0x81, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x7, 0x4}, 0x801, 0x400, 0x1, 0x4, 0x1, 0x9, 0x80000001}, r4, 0x7, r1, 0xb) r6 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000004000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000001c00)='./file0\x00', &(0x7f0000001c40)='./file0\x00', &(0x7f0000001c80)='devpts\x00', 0x40, &(0x7f0000001cc0)="be623dfd58807ac0b2f86f052863a5f30adc0bce173ebcf648cefd7d64732aeb5b94e6af3ab33e53669ba6d304d067dad4b1ff3ed87f18fd170aac904e8f105e80e22881717c98752a9cd7cfb06d102877e3b36b2624d22427331755a9514b225d25999ed605ffe4188630db2e7ddcc57f6316b60c4f3845d9dfcbbde5e49af627b48d7c9bd743b536de31a9ba3010cb6714c9b90a50537be55ca12a18e6541bff5a82d293e7734ea9c90707899663bd96b3bcce5887bf0bd35963c5adc39ddcb6f2a0a02b01661242046cb54ef1aec5a486b69e006305064124867bf79f4dc11798e214b61575168b79887122e0a3461f703c077f902c0a") socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r7, &(0x7f0000001800)={&(0x7f0000000240)=@alg, 0x80, &(0x7f0000000740)=[{&(0x7f00000002c0)=""/83, 0x53}, {&(0x7f0000000340)=""/27, 0x1b}, {&(0x7f0000000380)}, {&(0x7f00000003c0)=""/40, 0x28}, {&(0x7f0000000400)=""/144, 0x90}, {&(0x7f00000004c0)=""/200, 0xc8}, {&(0x7f00000005c0)=""/60, 0x3c}, {&(0x7f0000000600)=""/105, 0x69}, {&(0x7f0000000680)=""/127, 0x7f}, {&(0x7f0000000700)=""/8, 0x8}], 0xa, &(0x7f0000000800)=""/4096, 0x1000}, 0x10000) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000002340)=0xf60) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000003900)={&(0x7f0000003400)=@can={0x0, 0x0}, 0x80, &(0x7f0000003840)=[{&(0x7f0000003480)=""/194, 0xc2}, {&(0x7f0000003580)=""/250, 0xfa}, {&(0x7f0000003680)=""/100, 0x64}, {&(0x7f0000003700)=""/14, 0xe}, {&(0x7f0000003740)=""/159, 0x9f}, {&(0x7f0000003800)=""/15, 0xf}], 0x6, &(0x7f00000038c0)=""/29, 0x1d, 0x5}, 0x3) bpf$PROG_LOAD(0x5, &(0x7f0000003940)={0x4, 0x9, &(0x7f0000001840)=ANY=[@ANYBLOB="18000000030000000000000003000000dfd00c00fcffffff0000000000000000000803000101000000810000000000000001f0fff0ffffff000000000000000095000000000017d2"], &(0x7f0000000380)='GPL\x00', 0xf172, 0x4b, &(0x7f00000018c0)=""/75, 0x41f00, 0x1, [], r8}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000000c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001f00)={0xffffffffffffffff, 0x0, 0xf6, 0x22, &(0x7f0000001dc0)="9ef9482ea02fd36d0a768986a7ebe7a627dc88937e7073e3521858dfa0d5e02f571a01cfdfa76e048e5f956ea5da60b90e02a6c3d3687ed61ec9ab5b682c02498bddef38de9ce8c753e41e78f414d16202a033b6c7752711a5f56924e7846d6dcde2f71026e1eb0319b5e60f6b1ec67fca31c3cf1691d3af91a19f56be5a10ff337a53ba13dd3d75e1555211954b92ec0082d02b7b4cdddc021cbe84e4af8f20788977e3416918843e6c92b2ebf7b8b33ecbd4c7c9a9d5036c3e3e538748a32f1a28eb77818ca1878ffdd445dcdb8a40e6221e0fc474428449dfe93c62bbc69996aa9b34488c1da4f6f7c2275305a6a4fb256c1a516d", &(0x7f0000001ec0)=""/34, 0x1f, 0x1}, 0x28) close(r6) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x3441, &(0x7f0000000080)) mount(&(0x7f00000021c0)='./file0/file0\x00', &(0x7f0000002200)='./file0/file0\x00', &(0x7f0000002240)='fuse\x00', 0x2000000, &(0x7f0000002280)="9b3923bfddc346e9fa2aeaffae6ca386d8d50ba83ab72218340d3c30c045a89ac016797652ba04f1a203cfceccb458dbfd9fd03c4a80ef9a40dc7a4f24b6619d04a58186466fd8465757d9ee053c082cdfa957e7efab6191761847cca59c017493ef5e3d22432cf0b4ebef") ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f00000023c0)=ANY=[@ANYBLOB="07000000000000000000000000000000000000000000000000000000000000000000000067eb0ecf1cfa4ffd89aa7e339417beb7d332a5c996e59875644dd1e3a690110400bc751bb0435977d90fcbb2b83c27812d818991d125e9c0f199be2bc7f01aa0a5cb9b9f99438aa0f1ae3d50201f7bb276536f567f03f062994da292b6db0000000000000000000000000000a93536f303000000000000002a27f6ae1258ebb5079c1bab4f1f6f11ee8ce2e590855a3af38e4bb871ef8400000000000000000000"]) mount(&(0x7f0000001b40)='./file0\x00', &(0x7f0000001b80)='./file0/file0\x00', &(0x7f0000002100)='vfat\x00', 0x0, &(0x7f0000002140)="98980e21ac8b46c0b7bedeee39e6bd9ae4088d6ab47dc9dc76a39e299ce3783aa33e482e450484961fd3e3c5b178fafbe54440e19512ea4298652ed129d4241d9d116d8a5c2b931d350f0c989f8a288fc9e56c") mount(&(0x7f0000df7000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='hugetlbfs\x00', 0x200, &(0x7f00000001c0)) mkdir(&(0x7f00000004c0)='./file0/file0\x00', 0x0) socketpair$inet(0x2, 0x0, 0x1f, &(0x7f0000000080)) 2018/03/31 08:25:52 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000348f88)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00'}, 0x10) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') 2018/03/31 08:25:52 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) socketpair(0x0, 0x4, 0x6, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) socketpair(0xf, 0x3, 0x2, &(0x7f0000000040)) 2018/03/31 08:25:52 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x0, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r4 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f00000009c0)="3949bcf20271c219f64b9e3fbd45bfae692375440912d5a576c2d82299018de50363f2cf30a439b45c2738869283b7900c1e030013700557a768d5cc05cb9ed624684f4dfdae73a8148b29b2978222576dabbcb3556bcf35a8f66fa68ceb0b834ec5120ac749dc0cc5aab7b0197711785349b1673ff5159bc1a40df6c779950e0747a25ce77a10f68b663a87fc993224a79b583eac02a2171f076ff3", 0x1000, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") gettid() close(0xffffffffffffffff) 2018/03/31 08:25:52 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000000003042df8700"]) r1 = perf_event_open(&(0x7f0000348f88)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r2}, 0x10) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) mount(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f00000002c0)='devpts\x00', 0x800000, &(0x7f0000000300)="7b18f1563c67659c49445440cbb57f32c0f4710f0219046399f3e8a25c5d4975e2b42f404b14937bd42d9874bdd132eef77f584d5151c9a97470a0d77a0c24a85e319673350e16b039bf474ec320") socketpair(0x3, 0x800, 0x81, &(0x7f00000003c0)) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') 2018/03/31 08:25:52 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000348f88)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffff9c, &(0x7f0000007400)={&(0x7f0000007240)=@hci={0x0, 0x0}, 0x80, &(0x7f0000007380)=[{&(0x7f00000072c0)=""/56, 0x38}, {&(0x7f0000007300)=""/127, 0x7f}], 0x2, &(0x7f00000073c0)=""/63, 0x3f, 0x290f}, 0x12120) bpf$PROG_LOAD(0x5, &(0x7f0000007440)={0xb, 0x9, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000c0ff3f000000a8080000003560b100fcffffff0000000000000000743f1000000000000000000000000000180000002000000000000000060000009500000000000000"], &(0x7f0000000400)='GPL\x00', 0xcb, 0xd9, &(0x7f0000000500)=""/217, 0x40f00, 0x1, [], r2}, 0x48) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r3}, 0x10) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) mount(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f00000002c0)='devpts\x00', 0x800000, &(0x7f0000000300)="7b18f1563c67659c49445440cbb57f32c0f4710f0219046399f3e8a25c5d4975e2b42f404b14937bd42d9874bdd132eef77f584d5151c9a97470a0d77a0c24a85e319673350e16b039bf474ec320") ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') 2018/03/31 08:25:52 executing program 1: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={0xffffffffffffffff, &(0x7f0000000700), &(0x7f00000009c0)=""/161}, 0x18) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)) [ 209.396640] devpts: called with bogus options [ 209.409243] devpts: called with bogus options [ 209.426820] devpts: called with bogus options 2018/03/31 08:25:52 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000348f88)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00'}, 0x10) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') 2018/03/31 08:25:52 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000348f88)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f0000000500)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000400)="003f9d7fa860856459bb804a844b4b8da6100003c0ac0b77d9f9e8090000008373043e", 0x0, &(0x7f0000000380)="9d804454f120be8825c86c7c0803000047e217c9e759976d379f5c726fe1e5") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r2}, 0x10) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) mount(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f00000002c0)='devpts\x00', 0x800000, &(0x7f0000000300)="7b18f1563c67659c49445440cbb57f32c0f4710f0219046399f3e8a25c5d4975e2b42f404b14937bd42d9874bdd132eef77f584d5151c9a97470a0d77a0c24a85e319673350e16b039bf474ec320") ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') [ 209.455899] devpts: called with bogus options [ 209.467766] hugetlbfs: Bad mount option: "" 2018/03/31 08:25:52 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000000003042df8700"]) r1 = perf_event_open(&(0x7f0000348f88)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r2}, 0x10) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) mount(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f00000002c0)='devpts\x00', 0x800000, &(0x7f0000000300)="7b18f1563c67659c49445440cbb57f32c0f4710f0219046399f3e8a25c5d4975e2b42f404b14937bd42d9874bdd132eef77f584d5151c9a97470a0d77a0c24a85e319673350e16b039bf474ec320") socketpair(0x3, 0x800, 0x81, &(0x7f00000003c0)) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') 2018/03/31 08:25:52 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x0, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r4 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f00000009c0)="3949bcf20271c219f64b9e3fbd45bfae692375440912d5a576c2d82299018de50363f2cf30a439b45c2738869283b7900c1e030013700557a768d5cc05cb9ed624684f4dfdae73a8148b29b2978222576dabbcb3556bcf35a8f66fa68ceb0b834ec5120ac749dc0cc5aab7b0197711785349b1673ff5159bc1a40df6c779950e0747a25ce77a10f68b663a87fc993224a79b583eac02a2171f076ff3", 0x1000, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129") gettid() close(0xffffffffffffffff) 2018/03/31 08:25:52 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x4) socketpair(0x0, 0x4, 0x6, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) 2018/03/31 08:25:52 executing program 7: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x80000000000, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000001fc0)) sendmsg(0xffffffffffffffff, &(0x7f00000024c0)={&(0x7f0000002040)=@un=@file={0x0, './file0\x00'}, 0x80, &(0x7f0000001f40)=[{&(0x7f00000020c0)="73c7575b94a72990e177f86ed4835a72a65c1a6c6831eeb0c48163a47ab63bcb605c8450cc4798ff6521c2aa722d1a7105c8a07e6c", 0x35}], 0x1, &(0x7f0000002500)=ANY=[], 0x0, 0x40000}, 0x20000000) r2 = gettid() r3 = perf_event_open(&(0x7f0000001ac0)={0x1, 0x70, 0xffffffff, 0x835, 0x9, 0xffffffffffffff5f, 0x0, 0x1000, 0x42000, 0x3, 0x8, 0x80, 0x1, 0x4, 0x100000001, 0x9, 0xff, 0x8, 0x1000, 0x7, 0x7f, 0x200, 0xb715, 0x3, 0x7fffffff, 0xf0a, 0x40, 0x8000, 0x8, 0x7, 0xffffffffffffff74, 0x4, 0x6, 0x0, 0x7, 0x335, 0x3ff, 0x58, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000001a80), 0xe}, 0x0, 0x80000000, 0x82, 0x7, 0x5, 0x3, 0x80000001}, r2, 0xd, r1, 0x8) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000200)='mqueue\x00', 0x0, &(0x7f000000a000)) r4 = getpid() r5 = bpf$PROG_LOAD(0x5, &(0x7f0000002500)={0xf, 0x7, &(0x7f0000001940)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, [@ldst={0x3, 0x3, 0x3, 0x4, 0x3, 0x2, 0xffffffffffffffff}, @exit={0x95}], {0x95}}, &(0x7f0000001980)='GPL\x00', 0xff, 0x1000, &(0x7f00000039c0)=""/4096, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000019c0)={&(0x7f0000000180)='./file0\x00', r5}, 0x10) perf_event_open(&(0x7f0000001a00)={0x0, 0x70, 0x0, 0x8, 0x0, 0x3, 0x0, 0xb8, 0x1000, 0x0, 0x3, 0x4, 0xfff, 0x4, 0x4dae, 0x40, 0x100000001, 0x6, 0x4, 0x0, 0x3, 0x753c, 0x6, 0x100, 0x1de, 0x6, 0x4, 0x1, 0x6, 0x4, 0x7, 0x3, 0x7fff, 0x80000000, 0x3, 0x8, 0x81, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x7, 0x4}, 0x801, 0x400, 0x1, 0x4, 0x1, 0x9, 0x80000001}, r4, 0x7, r1, 0xb) r6 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000004000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000001c00)='./file0\x00', &(0x7f0000001c40)='./file0\x00', &(0x7f0000001c80)='devpts\x00', 0x40, &(0x7f0000001cc0)="be623dfd58807ac0b2f86f052863a5f30adc0bce173ebcf648cefd7d64732aeb5b94e6af3ab33e53669ba6d304d067dad4b1ff3ed87f18fd170aac904e8f105e80e22881717c98752a9cd7cfb06d102877e3b36b2624d22427331755a9514b225d25999ed605ffe4188630db2e7ddcc57f6316b60c4f3845d9dfcbbde5e49af627b48d7c9bd743b536de31a9ba3010cb6714c9b90a50537be55ca12a18e6541bff5a82d293e7734ea9c90707899663bd96b3bcce5887bf0bd35963c5adc39ddcb6f2a0a02b01661242046cb54ef1aec5a486b69e006305064124867bf79f4dc11798e214b61575168b79887122e0a3461f703c077f902c0a") socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r7, &(0x7f0000001800)={&(0x7f0000000240)=@alg, 0x80, &(0x7f0000000740)=[{&(0x7f00000002c0)=""/83, 0x53}, {&(0x7f0000000340)=""/27, 0x1b}, {&(0x7f0000000380)}, {&(0x7f00000003c0)=""/40, 0x28}, {&(0x7f0000000400)=""/144, 0x90}, {&(0x7f00000004c0)=""/200, 0xc8}, {&(0x7f00000005c0)=""/60, 0x3c}, {&(0x7f0000000600)=""/105, 0x69}, {&(0x7f0000000680)=""/127, 0x7f}, {&(0x7f0000000700)=""/8, 0x8}], 0xa, &(0x7f0000000800)=""/4096, 0x1000}, 0x10000) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000002340)=0xf60) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000003900)={&(0x7f0000003400)=@can={0x0, 0x0}, 0x80, &(0x7f0000003840)=[{&(0x7f0000003480)=""/194, 0xc2}, {&(0x7f0000003580)=""/250, 0xfa}, {&(0x7f0000003680)=""/100, 0x64}, {&(0x7f0000003700)=""/14, 0xe}, {&(0x7f0000003740)=""/159, 0x9f}, {&(0x7f0000003800)=""/15, 0xf}], 0x6, &(0x7f00000038c0)=""/29, 0x1d, 0x5}, 0x3) bpf$PROG_LOAD(0x5, &(0x7f0000003940)={0x4, 0x9, &(0x7f0000001840)=ANY=[@ANYBLOB="18000000030000000000000003000000dfd00c00fcffffff0000000000000000000803000101000000810000000000000001f0fff0ffffff000000000000000095000000000017d2"], &(0x7f0000000380)='GPL\x00', 0xf172, 0x4b, &(0x7f00000018c0)=""/75, 0x41f00, 0x1, [], r8}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000000c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001f00)={0xffffffffffffffff, 0x0, 0xf6, 0x22, &(0x7f0000001dc0)="9ef9482ea02fd36d0a768986a7ebe7a627dc88937e7073e3521858dfa0d5e02f571a01cfdfa76e048e5f956ea5da60b90e02a6c3d3687ed61ec9ab5b682c02498bddef38de9ce8c753e41e78f414d16202a033b6c7752711a5f56924e7846d6dcde2f71026e1eb0319b5e60f6b1ec67fca31c3cf1691d3af91a19f56be5a10ff337a53ba13dd3d75e1555211954b92ec0082d02b7b4cdddc021cbe84e4af8f20788977e3416918843e6c92b2ebf7b8b33ecbd4c7c9a9d5036c3e3e538748a32f1a28eb77818ca1878ffdd445dcdb8a40e6221e0fc474428449dfe93c62bbc69996aa9b34488c1da4f6f7c2275305a6a4fb256c1a516d", &(0x7f0000001ec0)=""/34, 0x1f, 0x1}, 0x28) close(r6) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x3441, &(0x7f0000000080)) mount(&(0x7f00000021c0)='./file0/file0\x00', &(0x7f0000002200)='./file0/file0\x00', &(0x7f0000002240)='fuse\x00', 0x2000000, &(0x7f0000002280)="9b3923bfddc346e9fa2aeaffae6ca386d8d50ba83ab72218340d3c30c045a89ac016797652ba04f1a203cfceccb458dbfd9fd03c4a80ef9a40dc7a4f24b6619d04a58186466fd8465757d9ee053c082cdfa957e7efab6191761847cca59c017493ef5e3d22432cf0b4ebef") ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f00000023c0)=ANY=[@ANYBLOB="07000000000000000000000000000000000000000000000000000000000000000000000067eb0ecf1cfa4ffd89aa7e339417beb7d332a5c996e59875644dd1e3a690110400bc751bb0435977d90fcbb2b83c27812d818991d125e9c0f199be2bc7f01aa0a5cb9b9f99438aa0f1ae3d50201f7bb276536f567f03f062994da292b6db0000000000000000000000000000a93536f303000000000000002a27f6ae1258ebb5079c1bab4f1f6f11ee8ce2e590855a3af38e4bb871ef8400000000000000000000"]) mount(&(0x7f0000001b40)='./file0\x00', &(0x7f0000001b80)='./file0/file0\x00', &(0x7f0000002100)='vfat\x00', 0x0, &(0x7f0000002140)="98980e21ac8b46c0b7bedeee39e6bd9ae4088d6ab47dc9dc76a39e299ce3783aa33e482e450484961fd3e3c5b178fafbe54440e19512ea4298652ed129d4241d9d116d8a5c2b931d350f0c989f8a288fc9e56c") mount(&(0x7f0000df7000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='hugetlbfs\x00', 0x200, &(0x7f00000001c0)) mkdir(&(0x7f00000004c0)='./file0/file0\x00', 0x0) socketpair$inet(0x2, 0x0, 0x1f, &(0x7f0000000080)) [ 209.692290] devpts: called with bogus options [ 209.795289] devpts: called with bogus options [ 209.817986] hugetlbfs: Bad mount option: "" 2018/03/31 08:25:52 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000348f88)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) socketpair(0x0, 0x4, 0x6, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) socketpair(0xf, 0x3, 0x2, &(0x7f0000000040)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xb1, 0xed, &(0x7f0000000080)="c1360ea4f2c30581d2f2414db463218191424cbf1d3e3aca42584d53511bdb35c0398b70f527f3dcb9c7fdfa8d34e2e69b522d7784f01cc7687f9929a663fe08f2ca3e3a96be3284812b0c5525c52cfd09e687de1873d5c18d3783414c102caee3ccd8d9d19f7481952670cd196fb6dde5f0a4abcf1d1eff8b05940a7fe641efc256d95db96b9674ebf41058cc76de4bd085478eb799e0c98e9e40624a7bfcf00ae1e063955a01486e9f3773b42ebe74fe", &(0x7f00000001c0)=""/237, 0x9f7f, 0xfffffffffffffff7}, 0x28) 2018/03/31 08:25:52 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000348f88)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00'}, 0x10) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') 2018/03/31 08:25:52 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000000003042df8700"]) r1 = perf_event_open(&(0x7f0000348f88)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r2}, 0x10) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) mount(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f00000002c0)='devpts\x00', 0x800000, &(0x7f0000000300)="7b18f1563c67659c49445440cbb57f32c0f4710f0219046399f3e8a25c5d4975e2b42f404b14937bd42d9874bdd132eef77f584d5151c9a97470a0d77a0c24a85e319673350e16b039bf474ec320") socketpair(0x3, 0x800, 0x81, &(0x7f00000003c0)) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') 2018/03/31 08:25:52 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) socketpair(0x0, 0x4, 0x6, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) socketpair(0xf, 0x3, 0x2, &(0x7f0000000040)) 2018/03/31 08:25:52 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x0, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r4 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f00000009c0)="3949bcf20271c219f64b9e3fbd45bfae692375440912d5a576c2d82299018de50363f2cf30a439b45c2738869283b7900c1e030013700557a768d5cc05cb9ed624684f4dfdae73a8148b29b2978222576dabbcb3556bcf35a8f66fa68ceb0b834ec5120ac749dc0cc5aab7b0197711785349b1673ff5159bc1a40df6c779950e0747a25ce77a10f68b663a87fc993224a79b583eac02a2171f076ff3", 0x1000, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129") gettid() close(0xffffffffffffffff) 2018/03/31 08:25:52 executing program 1 (fault-call:8 fault-nth:0): perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={0xffffffffffffffff, &(0x7f0000000700), &(0x7f00000009c0)=""/161}, 0x18) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)) 2018/03/31 08:25:52 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000348f88)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r2}, 0x10) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f00000002c0)='devpts\x00', 0x800000, &(0x7f0000000300)="7b18f1563c67659c49445440cbb57f32c0f4710f0219046399f3e8a25c5d4975e2b42f404b14937bd42d9874bdd132eef77f584d5151c9a97470a0d77a0c24a85e319673350e16b039bf474ec320") ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x40) mount(&(0x7f0000000400)='./file0\x00', &(0x7f0000000440)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000180)={r3}) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000001dc0)={r2, &(0x7f0000001d00)="73735e9b426e91c16c1a99faba49ba2bce98509431733749b5c76bfee594e3ddae2ab140667be35b59a3837378f08f5c86c9483ba974c5135af5afe879010e164a3b5c215373302d565867481944e305d2f43a2f38f4b294e336f783", &(0x7f0000001d80)=""/42}, 0x18) sendmsg$kcm(r4, &(0x7f0000001cc0)={&(0x7f0000000500)=@generic={0x11, "f78aced86cd8548e19fe2c5f582aeb249cd2b87a794389468ef8e30f717989e5a409b196c2c9863b53673a2f78f0117b16820621d61e85d3448ffb5ca5cca346f882fa2ea8dd501975792c782f3543f10acf69c4e441c1a9a914a0b67875db9d6135084a837b3205f688b8eaec9b497a9ece8f6dce624d33b70abc8c0236"}, 0x80, &(0x7f0000001c00)=[{&(0x7f0000000580)="4dcb0933857fe07f36406afc1180e449fb998ea548ad0ba87a065d1a3ce70d36e9beaa03ee0ad706563efb0be858f773e65cfe3a773ba3f23bbd44a8d9177578cb5157422a8137fc506fee2387e1dde0f73448a6991fee5bcb0ee8f916a75f302dfe36015c5e1243d4de08d48f26bc921949", 0x72}, {&(0x7f0000000600)="b35c68f52502013fae187c6c175984fec89ca27db349aeaca4a064b9bc5cabf19f7764bad8e965b48901e1a742ffcc563c4f4a2ac73562b101b94d555a606d7fad655ea1dc7629363483a3cdf84456beca249fbe80b92a67d19ab9e1b7091cb949613dfb11efd7fb926cfcd63d9ccb9b4fcdbcd1c5706bc04e5e1ad4d96de47b7686060002f3e6eb0e30e90ab06b0fb223536ef2403084f97ff32af87a95ae20fc", 0xa1}, {&(0x7f00000006c0)="78ec6edfb76f8062c95e77e62321b4c5b9a0b5ddfa3cad2c1ff41b8945137920cdf66b93a75a6ef9dfb3dd857cc9006fd25117e5c2c8ebf5b7a9e5adb5d6b88c3a0a2cf4b092f1207b60a095cd0bf2da6ea5505a3387bd5f039044bfe20cd3370b2bc219b9de1399c0d09a53d5fd55d5cfa2304811bfd3b11b5b7005ec845b5f8863bdd5a7c6e4f93862e2eafbc271abe0649e954f0f3d28e303bf184f4aed34c8b82243570bd5e8d80a8e39bd28578164bbe6401b057bdcb9c715c70de5f3750fad20cd45c8129143af9075f40dd77a3c27704701e6b709cf", 0xd9}, {&(0x7f00000007c0)="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", 0x1000}, {&(0x7f00000017c0)="1cbc3257ed36d9a01b57f7d959f70eaead97436e854fcba0a43d423cd6f1771bd3ac27b2675bcb4702847e305c7fc3c21e6b128afb1e242b5c9850530978db5f4077d03e0e2237b71cbefd6de533383374448764ca554b9dd9c504d02b0cac3cfaa5a2e0ef9b9a6426a1190879899567811bf8b04201627320b55059decc2ad0586c429b3c546377eccce0c6aad3dc615b8b057e10cc1d540ea57b6fa84bad7a0864d52ff680f8ee823f39a9b4588207479e81e7e309c764b397cd4033830b2554fb29571d0708dd4082fd77ab", 0xcd}, {&(0x7f00000018c0)="502c05a16bdf2555fd9f60995468a4bf89c56262d5fd533c0e775c3493b71659aa9048e926b9c18c91f9295fa3a988aad95f827c522a4eda51d1945e5b9c21afb7d6035b4d68f153a4a504c93e822c68a72641494a6cbb96d6bdd1b49880f0a33951194c43c7647bf7099fc73bcdd24b547c2e411a110091775b530571fedf5c94e80caab3aaa2e8d1781f6d4c97d92465e6132c34275e6827f56b563d7cec059b773133488e1e5db7eb84ec2f70fd01762dc065ded8d0d2b5500b8b9eef54f54c0dd7ba0f90ca7f1d70260f3fb27ba9027bbe8c09f76ca079", 0xd9}, {&(0x7f00000019c0)="9618698c3ba1f8ec4baa3122cc6246e4103f3ca667f3ee8b472197254ec01fce187ae543234cde014e84e65f0767c38dad775b531edca41e66c8608c8cefa86c333a8ba2f49cdd5b07d8261cd455e9ab3f651ee1273b0100fadbe70fd354e4a59028d4b48936721f6962bf73c7254fd3a8da6c4c9f3ecef6ddf0f17e16727e47d1aed6aa91d710a876f4b027da3e1fb0", 0x90}, {&(0x7f0000001a80)="f11282bc416065155bb8529a89cddfa3d2aa7de644eb1db03dd7e4fcb386abbaaf43ac78501b6498e98443032870f8c643a587d2fd2982b183f3ff0d64", 0x3d}, {&(0x7f0000001ac0)="2c2ff408d8489fe39ba35a665f3c6ab449ae33bf20e2404a60fdfcfb2f4da05e9417cab335c4de16c932c7819bdb6d93f573eaae1e470222575e4309793ea661c12515c935479acd3b46cb87f30360ec89c8d20de80fe63b8a23f9986e756f27f6460f137cb8219d8bd94ad7f334a353574b38b47968a99c77957ee09b9423dcdc86381cfc00b38afd581e0a56942355f3bea1e86fda82e7dee4ae7486ebb2e6c4ace0dadd319c76", 0xa8}, {&(0x7f0000001b80)="c75108a84c4a54ea459ccb436f61bc15477cb5d3179b39539633563a727e7447ed36519b5443af544bbc12052a861ed6e8494bc3e970882b7c83dd68c03d48fe1728b69111e147dc5ffa827bac68cd893d28e808f2ae7bf2ab4cae144674ee6d19c9bcde19cf291dd22d", 0x6a}], 0xa, 0x0, 0x0, 0x4}, 0x91) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000003c0)={r2, 0x28, &(0x7f0000000380)}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') 2018/03/31 08:25:52 executing program 7: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x80000000000, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000001fc0)) sendmsg(0xffffffffffffffff, &(0x7f00000024c0)={&(0x7f0000002040)=@un=@file={0x0, './file0\x00'}, 0x80, &(0x7f0000001f40)=[{&(0x7f00000020c0)="73c7575b94a72990e177f86ed4835a72a65c1a6c6831eeb0c48163a47ab63bcb605c8450cc4798ff6521c2aa722d1a7105c8a07e6c", 0x35}], 0x1, &(0x7f0000002500)=ANY=[], 0x0, 0x40000}, 0x20000000) r2 = gettid() r3 = perf_event_open(&(0x7f0000001ac0)={0x1, 0x70, 0xffffffff, 0x835, 0x9, 0xffffffffffffff5f, 0x0, 0x1000, 0x42000, 0x3, 0x8, 0x80, 0x1, 0x4, 0x100000001, 0x9, 0xff, 0x8, 0x1000, 0x7, 0x7f, 0x200, 0xb715, 0x3, 0x7fffffff, 0xf0a, 0x40, 0x8000, 0x8, 0x7, 0xffffffffffffff74, 0x4, 0x6, 0x100, 0x0, 0x335, 0x3ff, 0x58, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000001a80), 0xe}, 0x0, 0x80000000, 0x82, 0x7, 0x5, 0x3, 0x80000001}, r2, 0xd, r1, 0x8) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000200)='mqueue\x00', 0x0, &(0x7f000000a000)) r4 = getpid() r5 = bpf$PROG_LOAD(0x5, &(0x7f0000002500)={0xf, 0x7, &(0x7f0000001940)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, [@ldst={0x3, 0x3, 0x3, 0x4, 0x3, 0x2, 0xffffffffffffffff}, @exit={0x95}], {0x95}}, &(0x7f0000001980)='GPL\x00', 0xff, 0x1000, &(0x7f00000039c0)=""/4096, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000019c0)={&(0x7f0000000180)='./file0\x00', r5}, 0x10) perf_event_open(&(0x7f0000001a00)={0x0, 0x70, 0x0, 0x8, 0x0, 0x3, 0x0, 0xb8, 0x1000, 0x0, 0x3, 0x4, 0xfff, 0x4, 0x4dae, 0x40, 0x100000001, 0x6, 0x4, 0x0, 0x3, 0x753c, 0x6, 0x100, 0x1de, 0x6, 0x4, 0x1, 0x6, 0x4, 0x7, 0x3, 0x7fff, 0x80000000, 0x3, 0x8, 0x81, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x7, 0x4}, 0x801, 0x400, 0x1, 0x4, 0x1, 0x9, 0x80000001}, r4, 0x7, r1, 0xb) r6 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000004000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000001c00)='./file0\x00', &(0x7f0000001c40)='./file0\x00', &(0x7f0000001c80)='devpts\x00', 0x40, &(0x7f0000001cc0)="be623dfd58807ac0b2f86f052863a5f30adc0bce173ebcf648cefd7d64732aeb5b94e6af3ab33e53669ba6d304d067dad4b1ff3ed87f18fd170aac904e8f105e80e22881717c98752a9cd7cfb06d102877e3b36b2624d22427331755a9514b225d25999ed605ffe4188630db2e7ddcc57f6316b60c4f3845d9dfcbbde5e49af627b48d7c9bd743b536de31a9ba3010cb6714c9b90a50537be55ca12a18e6541bff5a82d293e7734ea9c90707899663bd96b3bcce5887bf0bd35963c5adc39ddcb6f2a0a02b01661242046cb54ef1aec5a486b69e006305064124867bf79f4dc11798e214b61575168b79887122e0a3461f703c077f902c0a") socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r7, &(0x7f0000001800)={&(0x7f0000000240)=@alg, 0x80, &(0x7f0000000740)=[{&(0x7f00000002c0)=""/83, 0x53}, {&(0x7f0000000340)=""/27, 0x1b}, {&(0x7f0000000380)}, {&(0x7f00000003c0)=""/40, 0x28}, {&(0x7f0000000400)=""/144, 0x90}, {&(0x7f00000004c0)=""/200, 0xc8}, {&(0x7f00000005c0)=""/60, 0x3c}, {&(0x7f0000000600)=""/105, 0x69}, {&(0x7f0000000680)=""/127, 0x7f}, {&(0x7f0000000700)=""/8, 0x8}], 0xa, &(0x7f0000000800)=""/4096, 0x1000}, 0x10000) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000002340)=0xf60) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000003900)={&(0x7f0000003400)=@can={0x0, 0x0}, 0x80, &(0x7f0000003840)=[{&(0x7f0000003480)=""/194, 0xc2}, {&(0x7f0000003580)=""/250, 0xfa}, {&(0x7f0000003680)=""/100, 0x64}, {&(0x7f0000003700)=""/14, 0xe}, {&(0x7f0000003740)=""/159, 0x9f}, {&(0x7f0000003800)=""/15, 0xf}], 0x6, &(0x7f00000038c0)=""/29, 0x1d, 0x5}, 0x3) bpf$PROG_LOAD(0x5, &(0x7f0000003940)={0x4, 0x9, &(0x7f0000001840)=ANY=[@ANYBLOB="18000000030000000000000003000000dfd00c00fcffffff0000000000000000000803000101000000810000000000000001f0fff0ffffff000000000000000095000000000017d2"], &(0x7f0000000380)='GPL\x00', 0xf172, 0x4b, &(0x7f00000018c0)=""/75, 0x41f00, 0x1, [], r8}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000000c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001f00)={0xffffffffffffffff, 0x0, 0xf6, 0x22, &(0x7f0000001dc0)="9ef9482ea02fd36d0a768986a7ebe7a627dc88937e7073e3521858dfa0d5e02f571a01cfdfa76e048e5f956ea5da60b90e02a6c3d3687ed61ec9ab5b682c02498bddef38de9ce8c753e41e78f414d16202a033b6c7752711a5f56924e7846d6dcde2f71026e1eb0319b5e60f6b1ec67fca31c3cf1691d3af91a19f56be5a10ff337a53ba13dd3d75e1555211954b92ec0082d02b7b4cdddc021cbe84e4af8f20788977e3416918843e6c92b2ebf7b8b33ecbd4c7c9a9d5036c3e3e538748a32f1a28eb77818ca1878ffdd445dcdb8a40e6221e0fc474428449dfe93c62bbc69996aa9b34488c1da4f6f7c2275305a6a4fb256c1a516d", &(0x7f0000001ec0)=""/34, 0x1f, 0x1}, 0x28) close(r6) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x3441, &(0x7f0000000080)) mount(&(0x7f00000021c0)='./file0/file0\x00', &(0x7f0000002200)='./file0/file0\x00', &(0x7f0000002240)='fuse\x00', 0x2000000, &(0x7f0000002280)="9b3923bfddc346e9fa2aeaffae6ca386d8d50ba83ab72218340d3c30c045a89ac016797652ba04f1a203cfceccb458dbfd9fd03c4a80ef9a40dc7a4f24b6619d04a58186466fd8465757d9ee053c082cdfa957e7efab6191761847cca59c017493ef5e3d22432cf0b4ebef") ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f00000023c0)=ANY=[@ANYBLOB="07000000000000000000000000000000000000000000000000000000000000000000000067eb0ecf1cfa4ffd89aa7e339417beb7d332a5c996e59875644dd1e3a690110400bc751bb0435977d90fcbb2b83c27812d818991d125e9c0f199be2bc7f01aa0a5cb9b9f99438aa0f1ae3d50201f7bb276536f567f03f062994da292b6db0000000000000000000000000000a93536f303000000000000002a27f6ae1258ebb5079c1bab4f1f6f11ee8ce2e590855a3af38e4bb871ef8400000000000000000000"]) mount(&(0x7f0000001b40)='./file0\x00', &(0x7f0000001b80)='./file0/file0\x00', &(0x7f0000002100)='vfat\x00', 0x0, &(0x7f0000002140)="98980e21ac8b46c0b7bedeee39e6bd9ae4088d6ab47dc9dc76a39e299ce3783aa33e482e450484961fd3e3c5b178fafbe54440e19512ea4298652ed129d4241d9d116d8a5c2b931d350f0c989f8a288fc9e56c") mount(&(0x7f0000df7000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='hugetlbfs\x00', 0x200, &(0x7f00000001c0)) mkdir(&(0x7f00000004c0)='./file0/file0\x00', 0x0) socketpair$inet(0x2, 0x0, 0x1f, &(0x7f0000000080)) 2018/03/31 08:25:52 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x0, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r4 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f00000009c0)="3949bcf20271c219f64b9e3fbd45bfae692375440912d5a576c2d82299018de50363f2cf30a439b45c2738869283b7900c1e030013700557a768d5cc05cb9ed624684f4dfdae73a8148b29b2978222576dabbcb3556bcf35a8f66fa68ceb0b834ec5120ac749dc0cc5aab7b0197711785349b1673ff5159bc1a40df6c779950e0747a25ce77a10f68b663a87fc993224a79b583eac02a2171f076ff3", 0x1000, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129") gettid() close(0xffffffffffffffff) 2018/03/31 08:25:52 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000348f88)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r2}, 0x10) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') [ 209.939970] FAULT_INJECTION: forcing a failure. [ 209.939970] name failslab, interval 1, probability 0, space 0, times 0 [ 209.951277] CPU: 1 PID: 15521 Comm: syz-executor1 Not tainted 4.16.0-rc6+ #43 [ 209.958548] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 209.967898] Call Trace: [ 209.970489] dump_stack+0x194/0x24d [ 209.974122] ? arch_local_irq_restore+0x53/0x53 [ 209.978802] should_fail+0x8c0/0xa40 [ 209.982520] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 209.987626] ? lock_downgrade+0x980/0x980 [ 209.991770] ? get_pid_task+0xbc/0x140 [ 209.995659] ? proc_fail_nth_write+0x9b/0x1d0 [ 210.000161] ? map_files_get_link+0x3a0/0x3a0 [ 210.004650] ? find_held_lock+0x35/0x1d0 [ 210.008704] ? check_same_owner+0x320/0x320 [ 210.013023] ? rcu_note_context_switch+0x710/0x710 [ 210.018102] should_failslab+0xec/0x120 [ 210.022078] __kmalloc_track_caller+0x5f/0x760 [ 210.026662] ? strncpy_from_user+0x430/0x430 [ 210.031072] ? strndup_user+0x62/0xb0 [ 210.034885] memdup_user+0x2c/0x90 [ 210.038437] strndup_user+0x62/0xb0 [ 210.042073] SyS_mount+0x3c/0x120 [ 210.045526] ? copy_mnt_ns+0xb30/0xb30 [ 210.049412] do_syscall_64+0x281/0x940 [ 210.053284] ? vmalloc_sync_all+0x30/0x30 [ 210.057422] ? _raw_spin_unlock_irq+0x27/0x70 [ 210.061915] ? finish_task_switch+0x1c1/0x7e0 [ 210.066405] ? syscall_return_slowpath+0x550/0x550 [ 210.071315] ? syscall_return_slowpath+0x2ac/0x550 [ 210.076231] ? prepare_exit_to_usermode+0x350/0x350 [ 210.081237] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 210.086582] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 210.091419] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 210.096582] RIP: 0033:0x454e79 [ 210.099748] RSP: 002b:00007f50b9ba4c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 210.107437] RAX: ffffffffffffffda RBX: 00007f50b9ba56d4 RCX: 0000000000454e79 [ 210.114691] RDX: 0000000020000780 RSI: 0000000020000ac0 RDI: 0000000020000000 [ 210.121937] RBP: 000000000072bea0 R08: 0000000020000b00 R09: 0000000000000000 [ 210.129184] R10: 0000000000037002 R11: 0000000000000246 R12: 0000000000000015 2018/03/31 08:25:52 executing program 1 (fault-call:8 fault-nth:1): perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={0xffffffffffffffff, &(0x7f0000000700), &(0x7f00000009c0)=""/161}, 0x18) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)) [ 210.136430] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000000 2018/03/31 08:25:53 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) socketpair(0x0, 0x4, 0x6, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) socketpair(0x0, 0x0, 0x9b4, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000080)) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f00000000c0)={r2}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) 2018/03/31 08:25:53 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) socketpair(0x0, 0x4, 0x6, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x9963) socketpair(0xf, 0x3, 0x2, &(0x7f0000000040)) [ 210.182916] devpts: called with bogus options [ 210.193744] devpts: called with bogus options [ 210.222856] devpts: called with bogus options 2018/03/31 08:25:53 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000000003042df8700"]) r1 = perf_event_open(&(0x7f0000348f88)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r2}, 0x10) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) mount(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f00000002c0)='devpts\x00', 0x800000, &(0x7f0000000300)="7b18f1563c67659c49445440cbb57f32c0f4710f0219046399f3e8a25c5d4975e2b42f404b14937bd42d9874bdd132eef77f584d5151c9a97470a0d77a0c24a85e319673350e16b039bf474ec320") socketpair(0x3, 0x800, 0x81, &(0x7f00000003c0)) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') 2018/03/31 08:25:53 executing program 3 (fault-call:10 fault-nth:0): r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000348f88)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r2}, 0x10) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) mount(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f00000002c0)='devpts\x00', 0x800000, &(0x7f0000000300)) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') [ 210.242466] devpts: called with bogus options [ 210.266586] hugetlbfs: Bad mount option: "" 2018/03/31 08:25:53 executing program 7: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x80000000000, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000001fc0)) sendmsg(0xffffffffffffffff, &(0x7f00000024c0)={&(0x7f0000002040)=@un=@file={0x0, './file0\x00'}, 0x80, &(0x7f0000001f40)=[{&(0x7f00000020c0)="73c7575b94a72990e177f86ed4835a72a65c1a6c6831eeb0c48163a47ab63bcb605c8450cc4798ff6521c2aa722d1a7105c8a07e6c", 0x35}], 0x1, &(0x7f0000002500)=ANY=[], 0x0, 0x40000}, 0x20000000) r2 = gettid() r3 = perf_event_open(&(0x7f0000001ac0)={0x1, 0x70, 0xffffffff, 0x835, 0x9, 0xffffffffffffff5f, 0x0, 0x1000, 0x42000, 0x3, 0x8, 0x80, 0x1, 0x4, 0x100000001, 0x9, 0xff, 0x8, 0x1000, 0x7, 0x7f, 0x200, 0xb715, 0x3, 0x7fffffff, 0xf0a, 0x40, 0x8000, 0x8, 0x7, 0xffffffffffffff74, 0x4, 0x6, 0x100, 0x7, 0x0, 0x3ff, 0x58, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000001a80), 0xe}, 0x0, 0x80000000, 0x82, 0x7, 0x5, 0x3, 0x80000001}, r2, 0xd, r1, 0x8) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000200)='mqueue\x00', 0x0, &(0x7f000000a000)) r4 = getpid() r5 = bpf$PROG_LOAD(0x5, &(0x7f0000002500)={0xf, 0x7, &(0x7f0000001940)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, [@ldst={0x3, 0x3, 0x3, 0x4, 0x3, 0x2, 0xffffffffffffffff}, @exit={0x95}], {0x95}}, &(0x7f0000001980)='GPL\x00', 0xff, 0x1000, &(0x7f00000039c0)=""/4096, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000019c0)={&(0x7f0000000180)='./file0\x00', r5}, 0x10) perf_event_open(&(0x7f0000001a00)={0x0, 0x70, 0x0, 0x8, 0x0, 0x3, 0x0, 0xb8, 0x1000, 0x0, 0x3, 0x4, 0xfff, 0x4, 0x4dae, 0x40, 0x100000001, 0x6, 0x4, 0x0, 0x3, 0x753c, 0x6, 0x100, 0x1de, 0x6, 0x4, 0x1, 0x6, 0x4, 0x7, 0x3, 0x7fff, 0x80000000, 0x3, 0x8, 0x81, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x7, 0x4}, 0x801, 0x400, 0x1, 0x4, 0x1, 0x9, 0x80000001}, r4, 0x7, r1, 0xb) r6 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000004000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000001c00)='./file0\x00', &(0x7f0000001c40)='./file0\x00', &(0x7f0000001c80)='devpts\x00', 0x40, &(0x7f0000001cc0)="be623dfd58807ac0b2f86f052863a5f30adc0bce173ebcf648cefd7d64732aeb5b94e6af3ab33e53669ba6d304d067dad4b1ff3ed87f18fd170aac904e8f105e80e22881717c98752a9cd7cfb06d102877e3b36b2624d22427331755a9514b225d25999ed605ffe4188630db2e7ddcc57f6316b60c4f3845d9dfcbbde5e49af627b48d7c9bd743b536de31a9ba3010cb6714c9b90a50537be55ca12a18e6541bff5a82d293e7734ea9c90707899663bd96b3bcce5887bf0bd35963c5adc39ddcb6f2a0a02b01661242046cb54ef1aec5a486b69e006305064124867bf79f4dc11798e214b61575168b79887122e0a3461f703c077f902c0a") socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r7, &(0x7f0000001800)={&(0x7f0000000240)=@alg, 0x80, &(0x7f0000000740)=[{&(0x7f00000002c0)=""/83, 0x53}, {&(0x7f0000000340)=""/27, 0x1b}, {&(0x7f0000000380)}, {&(0x7f00000003c0)=""/40, 0x28}, {&(0x7f0000000400)=""/144, 0x90}, {&(0x7f00000004c0)=""/200, 0xc8}, {&(0x7f00000005c0)=""/60, 0x3c}, {&(0x7f0000000600)=""/105, 0x69}, {&(0x7f0000000680)=""/127, 0x7f}, {&(0x7f0000000700)=""/8, 0x8}], 0xa, &(0x7f0000000800)=""/4096, 0x1000}, 0x10000) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000002340)=0xf60) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000003900)={&(0x7f0000003400)=@can={0x0, 0x0}, 0x80, &(0x7f0000003840)=[{&(0x7f0000003480)=""/194, 0xc2}, {&(0x7f0000003580)=""/250, 0xfa}, {&(0x7f0000003680)=""/100, 0x64}, {&(0x7f0000003700)=""/14, 0xe}, {&(0x7f0000003740)=""/159, 0x9f}, {&(0x7f0000003800)=""/15, 0xf}], 0x6, &(0x7f00000038c0)=""/29, 0x1d, 0x5}, 0x3) bpf$PROG_LOAD(0x5, &(0x7f0000003940)={0x4, 0x9, &(0x7f0000001840)=ANY=[@ANYBLOB="18000000030000000000000003000000dfd00c00fcffffff0000000000000000000803000101000000810000000000000001f0fff0ffffff000000000000000095000000000017d2"], &(0x7f0000000380)='GPL\x00', 0xf172, 0x4b, &(0x7f00000018c0)=""/75, 0x41f00, 0x1, [], r8}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000000c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001f00)={0xffffffffffffffff, 0x0, 0xf6, 0x22, &(0x7f0000001dc0)="9ef9482ea02fd36d0a768986a7ebe7a627dc88937e7073e3521858dfa0d5e02f571a01cfdfa76e048e5f956ea5da60b90e02a6c3d3687ed61ec9ab5b682c02498bddef38de9ce8c753e41e78f414d16202a033b6c7752711a5f56924e7846d6dcde2f71026e1eb0319b5e60f6b1ec67fca31c3cf1691d3af91a19f56be5a10ff337a53ba13dd3d75e1555211954b92ec0082d02b7b4cdddc021cbe84e4af8f20788977e3416918843e6c92b2ebf7b8b33ecbd4c7c9a9d5036c3e3e538748a32f1a28eb77818ca1878ffdd445dcdb8a40e6221e0fc474428449dfe93c62bbc69996aa9b34488c1da4f6f7c2275305a6a4fb256c1a516d", &(0x7f0000001ec0)=""/34, 0x1f, 0x1}, 0x28) close(r6) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x3441, &(0x7f0000000080)) mount(&(0x7f00000021c0)='./file0/file0\x00', &(0x7f0000002200)='./file0/file0\x00', &(0x7f0000002240)='fuse\x00', 0x2000000, &(0x7f0000002280)="9b3923bfddc346e9fa2aeaffae6ca386d8d50ba83ab72218340d3c30c045a89ac016797652ba04f1a203cfceccb458dbfd9fd03c4a80ef9a40dc7a4f24b6619d04a58186466fd8465757d9ee053c082cdfa957e7efab6191761847cca59c017493ef5e3d22432cf0b4ebef") ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f00000023c0)=ANY=[@ANYBLOB="07000000000000000000000000000000000000000000000000000000000000000000000067eb0ecf1cfa4ffd89aa7e339417beb7d332a5c996e59875644dd1e3a690110400bc751bb0435977d90fcbb2b83c27812d818991d125e9c0f199be2bc7f01aa0a5cb9b9f99438aa0f1ae3d50201f7bb276536f567f03f062994da292b6db0000000000000000000000000000a93536f303000000000000002a27f6ae1258ebb5079c1bab4f1f6f11ee8ce2e590855a3af38e4bb871ef8400000000000000000000"]) mount(&(0x7f0000001b40)='./file0\x00', &(0x7f0000001b80)='./file0/file0\x00', &(0x7f0000002100)='vfat\x00', 0x0, &(0x7f0000002140)="98980e21ac8b46c0b7bedeee39e6bd9ae4088d6ab47dc9dc76a39e299ce3783aa33e482e450484961fd3e3c5b178fafbe54440e19512ea4298652ed129d4241d9d116d8a5c2b931d350f0c989f8a288fc9e56c") mount(&(0x7f0000df7000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='hugetlbfs\x00', 0x200, &(0x7f00000001c0)) mkdir(&(0x7f00000004c0)='./file0/file0\x00', 0x0) socketpair$inet(0x2, 0x0, 0x1f, &(0x7f0000000080)) [ 210.448888] FAULT_INJECTION: forcing a failure. [ 210.448888] name failslab, interval 1, probability 0, space 0, times 0 [ 210.460261] CPU: 1 PID: 15559 Comm: syz-executor1 Not tainted 4.16.0-rc6+ #43 [ 210.467521] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 210.476853] Call Trace: [ 210.479433] dump_stack+0x194/0x24d [ 210.483069] ? arch_local_irq_restore+0x53/0x53 [ 210.488250] ? __save_stack_trace+0x7e/0xd0 [ 210.492565] should_fail+0x8c0/0xa40 [ 210.496255] ? trace_event_raw_event_lock+0x340/0x340 [ 210.501436] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 210.506536] ? kasan_kmalloc+0xad/0xe0 [ 210.510408] ? __kmalloc_track_caller+0x15e/0x760 [ 210.515238] ? memdup_user+0x2c/0x90 [ 210.518939] ? strndup_user+0x62/0xb0 [ 210.522720] ? SyS_mount+0x3c/0x120 [ 210.526329] ? proc_fail_nth_write+0x9b/0x1d0 [ 210.530805] ? map_files_get_link+0x3a0/0x3a0 [ 210.535284] ? find_held_lock+0x35/0x1d0 [ 210.539342] ? check_same_owner+0x320/0x320 [ 210.543651] ? rcu_note_context_switch+0x710/0x710 [ 210.548566] ? __check_object_size+0x8b/0x530 [ 210.553047] should_failslab+0xec/0x120 [ 210.557006] __kmalloc_track_caller+0x5f/0x760 [ 210.561579] ? strncpy_from_user+0x430/0x430 [ 210.565971] ? strndup_user+0x62/0xb0 [ 210.569753] ? _copy_from_user+0x99/0x110 [ 210.573885] memdup_user+0x2c/0x90 [ 210.577408] strndup_user+0x62/0xb0 [ 210.581025] SyS_mount+0x6b/0x120 [ 210.584458] ? copy_mnt_ns+0xb30/0xb30 [ 210.588328] do_syscall_64+0x281/0x940 [ 210.592196] ? vmalloc_sync_all+0x30/0x30 [ 210.596326] ? _raw_spin_unlock_irq+0x27/0x70 [ 210.600803] ? finish_task_switch+0x1c1/0x7e0 [ 210.605280] ? syscall_return_slowpath+0x550/0x550 [ 210.610195] ? syscall_return_slowpath+0x2ac/0x550 [ 210.615107] ? prepare_exit_to_usermode+0x350/0x350 [ 210.620108] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 210.625455] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 210.630284] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 210.635451] RIP: 0033:0x454e79 [ 210.638621] RSP: 002b:00007f50b9ba4c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 210.646314] RAX: ffffffffffffffda RBX: 00007f50b9ba56d4 RCX: 0000000000454e79 [ 210.653571] RDX: 0000000020000780 RSI: 0000000020000ac0 RDI: 0000000020000000 [ 210.660824] RBP: 000000000072bea0 R08: 0000000020000b00 R09: 0000000000000000 [ 210.668075] R10: 0000000000037002 R11: 0000000000000246 R12: 0000000000000015 [ 210.675326] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000001 [ 210.736404] FAULT_INJECTION: forcing a failure. [ 210.736404] name failslab, interval 1, probability 0, space 0, times 0 [ 210.747693] CPU: 1 PID: 15566 Comm: syz-executor3 Not tainted 4.16.0-rc6+ #43 [ 210.754964] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 210.764309] Call Trace: [ 210.766897] dump_stack+0x194/0x24d [ 210.770523] ? arch_local_irq_restore+0x53/0x53 [ 210.775191] should_fail+0x8c0/0xa40 [ 210.778907] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 210.782046] devpts: called with bogus options [ 210.784004] ? lock_downgrade+0x980/0x980 [ 210.784018] ? get_pid_task+0xbc/0x140 [ 210.784032] ? proc_fail_nth_write+0x9b/0x1d0 [ 210.784044] ? map_files_get_link+0x3a0/0x3a0 [ 210.784057] ? find_held_lock+0x35/0x1d0 [ 210.784082] ? check_same_owner+0x320/0x320 [ 210.784088] ? __lock_is_held+0xb6/0x140 [ 210.784100] ? rcu_note_context_switch+0x710/0x710 [ 210.822800] should_failslab+0xec/0x120 [ 210.826759] __kmalloc_track_caller+0x5f/0x760 [ 210.831337] ? strncpy_from_user+0x430/0x430 [ 210.835754] ? strndup_user+0x62/0xb0 [ 210.839565] memdup_user+0x2c/0x90 [ 210.843114] strndup_user+0x62/0xb0 [ 210.846742] SyS_mount+0x3c/0x120 [ 210.850192] ? copy_mnt_ns+0xb30/0xb30 [ 210.854086] do_syscall_64+0x281/0x940 [ 210.857973] ? vmalloc_sync_all+0x30/0x30 [ 210.862124] ? _raw_spin_unlock_irq+0x27/0x70 [ 210.866618] ? finish_task_switch+0x1c1/0x7e0 [ 210.871114] ? syscall_return_slowpath+0x550/0x550 [ 210.876044] ? syscall_return_slowpath+0x2ac/0x550 [ 210.880973] ? prepare_exit_to_usermode+0x350/0x350 [ 210.885989] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 210.891349] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 210.896197] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 210.901382] RIP: 0033:0x454e79 [ 210.904563] RSP: 002b:00007fbfd4b96c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 210.912272] RAX: ffffffffffffffda RBX: 00007fbfd4b976d4 RCX: 0000000000454e79 [ 210.919538] RDX: 0000000020000100 RSI: 0000000020000180 RDI: 0000000020000100 [ 210.926804] RBP: 000000000072bea0 R08: 0000000020000040 R09: 0000000000000000 [ 210.934069] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 210.941324] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000000 [ 210.989836] devpts: called with bogus options [ 211.001894] hugetlbfs: Bad mount option: "" 2018/03/31 08:25:53 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000348f88)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r2}, 0x10) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') 2018/03/31 08:25:53 executing program 4 (fault-call:1 fault-nth:0): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x0, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r4 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f00000009c0)="3949bcf20271c219f64b9e3fbd45bfae692375440912d5a576c2d82299018de50363f2cf30a439b45c2738869283b7900c1e030013700557a768d5cc05cb9ed624684f4dfdae73a8148b29b2978222576dabbcb3556bcf35a8f66fa68ceb0b834ec5120ac749dc0cc5aab7b0197711785349b1673ff5159bc1a40df6c779950e0747a25ce77a10f68b663a87fc993224a79b583eac02a2171f076ff3", 0x1000, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) 2018/03/31 08:25:53 executing program 1 (fault-call:8 fault-nth:2): perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={0xffffffffffffffff, &(0x7f0000000700), &(0x7f00000009c0)=""/161}, 0x18) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)) 2018/03/31 08:25:53 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000000003042df8700"]) r1 = perf_event_open(&(0x7f0000348f88)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r2}, 0x10) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) mount(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f00000002c0)='devpts\x00', 0x800000, &(0x7f0000000300)="7b18f1563c67659c49445440cbb57f32c0f4710f0219046399f3e8a25c5d4975e2b42f404b14937bd42d9874bdd132eef77f584d5151c9a97470a0d77a0c24a85e319673350e16b039bf474ec320") socketpair(0x3, 0x800, 0x81, &(0x7f00000003c0)) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') 2018/03/31 08:25:53 executing program 3 (fault-call:10 fault-nth:1): r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000348f88)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r2}, 0x10) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) mount(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f00000002c0)='devpts\x00', 0x800000, &(0x7f0000000300)) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') 2018/03/31 08:25:53 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x10) socketpair(0x0, 0x4, 0x6, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) socketpair(0xf, 0x3, 0x2, &(0x7f0000000040)) 2018/03/31 08:25:53 executing program 7: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x80000000000, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000001fc0)) sendmsg(0xffffffffffffffff, &(0x7f00000024c0)={&(0x7f0000002040)=@un=@file={0x0, './file0\x00'}, 0x80, &(0x7f0000001f40)=[{&(0x7f00000020c0)="73c7575b94a72990e177f86ed4835a72a65c1a6c6831eeb0c48163a47ab63bcb605c8450cc4798ff6521c2aa722d1a7105c8a07e6c", 0x35}], 0x1, &(0x7f0000002500)=ANY=[], 0x0, 0x40000}, 0x20000000) r2 = gettid() r3 = perf_event_open(&(0x7f0000001ac0)={0x1, 0x70, 0xffffffff, 0x835, 0x9, 0xffffffffffffff5f, 0x0, 0x1000, 0x42000, 0x3, 0x8, 0x80, 0x1, 0x4, 0x100000001, 0x9, 0xff, 0x8, 0x1000, 0x7, 0x7f, 0x200, 0xb715, 0x3, 0x7fffffff, 0xf0a, 0x40, 0x8000, 0x8, 0x7, 0xffffffffffffff74, 0x4, 0x6, 0x100, 0x7, 0x335, 0x0, 0x58, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000001a80), 0xe}, 0x0, 0x80000000, 0x82, 0x7, 0x5, 0x3, 0x80000001}, r2, 0xd, r1, 0x8) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000200)='mqueue\x00', 0x0, &(0x7f000000a000)) r4 = getpid() r5 = bpf$PROG_LOAD(0x5, &(0x7f0000002500)={0xf, 0x7, &(0x7f0000001940)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, [@ldst={0x3, 0x3, 0x3, 0x4, 0x3, 0x2, 0xffffffffffffffff}, @exit={0x95}], {0x95}}, &(0x7f0000001980)='GPL\x00', 0xff, 0x1000, &(0x7f00000039c0)=""/4096, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000019c0)={&(0x7f0000000180)='./file0\x00', r5}, 0x10) perf_event_open(&(0x7f0000001a00)={0x0, 0x70, 0x0, 0x8, 0x0, 0x3, 0x0, 0xb8, 0x1000, 0x0, 0x3, 0x4, 0xfff, 0x4, 0x4dae, 0x40, 0x100000001, 0x6, 0x4, 0x0, 0x3, 0x753c, 0x6, 0x100, 0x1de, 0x6, 0x4, 0x1, 0x6, 0x4, 0x7, 0x3, 0x7fff, 0x80000000, 0x3, 0x8, 0x81, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x7, 0x4}, 0x801, 0x400, 0x1, 0x4, 0x1, 0x9, 0x80000001}, r4, 0x7, r1, 0xb) r6 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000004000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000001c00)='./file0\x00', &(0x7f0000001c40)='./file0\x00', &(0x7f0000001c80)='devpts\x00', 0x40, &(0x7f0000001cc0)="be623dfd58807ac0b2f86f052863a5f30adc0bce173ebcf648cefd7d64732aeb5b94e6af3ab33e53669ba6d304d067dad4b1ff3ed87f18fd170aac904e8f105e80e22881717c98752a9cd7cfb06d102877e3b36b2624d22427331755a9514b225d25999ed605ffe4188630db2e7ddcc57f6316b60c4f3845d9dfcbbde5e49af627b48d7c9bd743b536de31a9ba3010cb6714c9b90a50537be55ca12a18e6541bff5a82d293e7734ea9c90707899663bd96b3bcce5887bf0bd35963c5adc39ddcb6f2a0a02b01661242046cb54ef1aec5a486b69e006305064124867bf79f4dc11798e214b61575168b79887122e0a3461f703c077f902c0a") socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r7, &(0x7f0000001800)={&(0x7f0000000240)=@alg, 0x80, &(0x7f0000000740)=[{&(0x7f00000002c0)=""/83, 0x53}, {&(0x7f0000000340)=""/27, 0x1b}, {&(0x7f0000000380)}, {&(0x7f00000003c0)=""/40, 0x28}, {&(0x7f0000000400)=""/144, 0x90}, {&(0x7f00000004c0)=""/200, 0xc8}, {&(0x7f00000005c0)=""/60, 0x3c}, {&(0x7f0000000600)=""/105, 0x69}, {&(0x7f0000000680)=""/127, 0x7f}, {&(0x7f0000000700)=""/8, 0x8}], 0xa, &(0x7f0000000800)=""/4096, 0x1000}, 0x10000) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000002340)=0xf60) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000003900)={&(0x7f0000003400)=@can={0x0, 0x0}, 0x80, &(0x7f0000003840)=[{&(0x7f0000003480)=""/194, 0xc2}, {&(0x7f0000003580)=""/250, 0xfa}, {&(0x7f0000003680)=""/100, 0x64}, {&(0x7f0000003700)=""/14, 0xe}, {&(0x7f0000003740)=""/159, 0x9f}, {&(0x7f0000003800)=""/15, 0xf}], 0x6, &(0x7f00000038c0)=""/29, 0x1d, 0x5}, 0x3) bpf$PROG_LOAD(0x5, &(0x7f0000003940)={0x4, 0x9, &(0x7f0000001840)=ANY=[@ANYBLOB="18000000030000000000000003000000dfd00c00fcffffff0000000000000000000803000101000000810000000000000001f0fff0ffffff000000000000000095000000000017d2"], &(0x7f0000000380)='GPL\x00', 0xf172, 0x4b, &(0x7f00000018c0)=""/75, 0x41f00, 0x1, [], r8}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000000c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001f00)={0xffffffffffffffff, 0x0, 0xf6, 0x22, &(0x7f0000001dc0)="9ef9482ea02fd36d0a768986a7ebe7a627dc88937e7073e3521858dfa0d5e02f571a01cfdfa76e048e5f956ea5da60b90e02a6c3d3687ed61ec9ab5b682c02498bddef38de9ce8c753e41e78f414d16202a033b6c7752711a5f56924e7846d6dcde2f71026e1eb0319b5e60f6b1ec67fca31c3cf1691d3af91a19f56be5a10ff337a53ba13dd3d75e1555211954b92ec0082d02b7b4cdddc021cbe84e4af8f20788977e3416918843e6c92b2ebf7b8b33ecbd4c7c9a9d5036c3e3e538748a32f1a28eb77818ca1878ffdd445dcdb8a40e6221e0fc474428449dfe93c62bbc69996aa9b34488c1da4f6f7c2275305a6a4fb256c1a516d", &(0x7f0000001ec0)=""/34, 0x1f, 0x1}, 0x28) close(r6) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x3441, &(0x7f0000000080)) mount(&(0x7f00000021c0)='./file0/file0\x00', &(0x7f0000002200)='./file0/file0\x00', &(0x7f0000002240)='fuse\x00', 0x2000000, &(0x7f0000002280)="9b3923bfddc346e9fa2aeaffae6ca386d8d50ba83ab72218340d3c30c045a89ac016797652ba04f1a203cfceccb458dbfd9fd03c4a80ef9a40dc7a4f24b6619d04a58186466fd8465757d9ee053c082cdfa957e7efab6191761847cca59c017493ef5e3d22432cf0b4ebef") ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f00000023c0)=ANY=[@ANYBLOB="07000000000000000000000000000000000000000000000000000000000000000000000067eb0ecf1cfa4ffd89aa7e339417beb7d332a5c996e59875644dd1e3a690110400bc751bb0435977d90fcbb2b83c27812d818991d125e9c0f199be2bc7f01aa0a5cb9b9f99438aa0f1ae3d50201f7bb276536f567f03f062994da292b6db0000000000000000000000000000a93536f303000000000000002a27f6ae1258ebb5079c1bab4f1f6f11ee8ce2e590855a3af38e4bb871ef8400000000000000000000"]) mount(&(0x7f0000001b40)='./file0\x00', &(0x7f0000001b80)='./file0/file0\x00', &(0x7f0000002100)='vfat\x00', 0x0, &(0x7f0000002140)="98980e21ac8b46c0b7bedeee39e6bd9ae4088d6ab47dc9dc76a39e299ce3783aa33e482e450484961fd3e3c5b178fafbe54440e19512ea4298652ed129d4241d9d116d8a5c2b931d350f0c989f8a288fc9e56c") mount(&(0x7f0000df7000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='hugetlbfs\x00', 0x200, &(0x7f00000001c0)) mkdir(&(0x7f00000004c0)='./file0/file0\x00', 0x0) socketpair$inet(0x2, 0x0, 0x1f, &(0x7f0000000080)) 2018/03/31 08:25:53 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) socketpair(0x4000000000000000, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x4001) socketpair(0xf, 0x3, 0x2, &(0x7f0000000040)) socketpair(0x1, 0x80003, 0xffffffffffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r0, 0x28, &(0x7f0000000080)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100)={r2, 0x5, 0x10}, 0xc) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x1) [ 211.103872] FAULT_INJECTION: forcing a failure. [ 211.103872] name failslab, interval 1, probability 0, space 0, times 0 [ 211.115197] CPU: 1 PID: 15595 Comm: syz-executor4 Not tainted 4.16.0-rc6+ #43 [ 211.122472] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 211.131825] Call Trace: [ 211.134408] dump_stack+0x194/0x24d [ 211.138029] ? arch_local_irq_restore+0x53/0x53 [ 211.142693] should_fail+0x8c0/0xa40 [ 211.146392] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 211.151479] ? __fget+0x36b/0x5b0 [ 211.154935] ? find_held_lock+0x35/0x1d0 [ 211.158994] ? check_same_owner+0x320/0x320 [ 211.163303] ? rcu_note_context_switch+0x710/0x710 [ 211.168211] ? lock_downgrade+0x980/0x980 [ 211.172345] should_failslab+0xec/0x120 [ 211.176303] kmem_cache_alloc_trace+0x4b/0x740 [ 211.180869] ? __bpf_map_get+0xb1/0x130 [ 211.184826] bpf_map_meta_alloc+0x10a/0x3b0 [ 211.189129] htab_of_map_alloc+0x41/0xd0 [ 211.193169] ? htab_map_alloc+0x1020/0x1020 [ 211.197468] SyS_bpf+0x93b/0x4980 [ 211.200899] ? trace_hardirqs_off+0x10/0x10 [ 211.205201] ? __fdget_pos+0x12b/0x190 [ 211.209070] ? bpf_prog_get+0x20/0x20 [ 211.212852] ? __lock_acquire+0x664/0x3e00 [ 211.217064] ? check_same_owner+0x320/0x320 [ 211.221384] ? find_held_lock+0x35/0x1d0 [ 211.225429] ? trace_hardirqs_off+0x10/0x10 [ 211.229732] ? _parse_integer+0xe9/0x140 [ 211.233777] ? trace_hardirqs_off+0x10/0x10 [ 211.238078] ? _parse_integer+0x140/0x140 [ 211.242205] ? check_same_owner+0x320/0x320 [ 211.246509] ? find_held_lock+0x35/0x1d0 [ 211.250550] ? trace_hardirqs_off+0x10/0x10 [ 211.254856] ? get_pid_task+0x93/0x140 [ 211.258724] ? lock_downgrade+0x980/0x980 [ 211.262859] ? find_held_lock+0x35/0x1d0 [ 211.266908] ? __f_unlock_pos+0x19/0x20 [ 211.270862] ? lock_downgrade+0x980/0x980 [ 211.274989] ? get_pid_task+0xbc/0x140 [ 211.278871] ? proc_fail_nth_write+0x9b/0x1d0 [ 211.283350] ? map_files_get_link+0x3a0/0x3a0 [ 211.287826] ? handle_mm_fault+0x35b/0xb10 [ 211.292047] ? find_held_lock+0x35/0x1d0 [ 211.296093] ? __mutex_unlock_slowpath+0xe9/0xac0 [ 211.300914] ? vfs_write+0x374/0x510 [ 211.304605] ? wait_for_completion+0x770/0x770 [ 211.309170] ? __lock_is_held+0xb6/0x140 [ 211.313222] ? __sb_end_write+0xa0/0xd0 [ 211.317179] ? fput+0xd2/0x140 [ 211.320354] ? SyS_write+0x184/0x220 [ 211.324053] ? do_syscall_64+0xb7/0x940 [ 211.328015] ? bpf_prog_get+0x20/0x20 [ 211.331811] do_syscall_64+0x281/0x940 [ 211.335681] ? vmalloc_sync_all+0x30/0x30 [ 211.339805] ? _raw_spin_unlock_irq+0x27/0x70 [ 211.344280] ? finish_task_switch+0x1c1/0x7e0 [ 211.348768] ? syscall_return_slowpath+0x550/0x550 [ 211.353679] ? syscall_return_slowpath+0x2ac/0x550 [ 211.358588] ? prepare_exit_to_usermode+0x350/0x350 [ 211.363587] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 211.368934] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 211.373760] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 211.378928] RIP: 0033:0x454e79 [ 211.382098] RSP: 002b:00007f0d1e01cc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 211.389788] RAX: ffffffffffffffda RBX: 00007f0d1e01d6d4 RCX: 0000000000454e79 [ 211.397042] RDX: 000000000000002c RSI: 0000000020011000 RDI: 0000000000000000 [ 211.404290] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 211.411539] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 211.418788] R13: 000000000000003c R14: 00000000006f2640 R15: 0000000000000000 [ 211.437216] devpts: called with bogus options 2018/03/31 08:25:54 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000348f88)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r2}, 0x10) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') 2018/03/31 08:25:54 executing program 4 (fault-call:1 fault-nth:1): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x0, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r4 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f00000009c0)="3949bcf20271c219f64b9e3fbd45bfae692375440912d5a576c2d82299018de50363f2cf30a439b45c2738869283b7900c1e030013700557a768d5cc05cb9ed624684f4dfdae73a8148b29b2978222576dabbcb3556bcf35a8f66fa68ceb0b834ec5120ac749dc0cc5aab7b0197711785349b1673ff5159bc1a40df6c779950e0747a25ce77a10f68b663a87fc993224a79b583eac02a2171f076ff3", 0x1000, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) [ 211.460761] FAULT_INJECTION: forcing a failure. [ 211.460761] name failslab, interval 1, probability 0, space 0, times 0 [ 211.472057] CPU: 1 PID: 15596 Comm: syz-executor1 Not tainted 4.16.0-rc6+ #43 [ 211.479365] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 211.488713] Call Trace: [ 211.491301] dump_stack+0x194/0x24d [ 211.494938] ? arch_local_irq_restore+0x53/0x53 [ 211.499610] should_fail+0x8c0/0xa40 [ 211.503320] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 211.508430] ? __kmalloc_track_caller+0x15e/0x760 [ 211.513271] ? strndup_user+0x62/0xb0 [ 211.517059] ? SyS_mount+0x6b/0x120 [ 211.520671] ? trace_hardirqs_off+0x10/0x10 [ 211.524979] ? proc_fail_nth_write+0x9b/0x1d0 [ 211.529465] ? map_files_get_link+0x3a0/0x3a0 [ 211.533951] ? find_held_lock+0x35/0x1d0 [ 211.538014] ? check_same_owner+0x320/0x320 [ 211.542318] ? lock_release+0xa40/0xa40 [ 211.546273] ? check_same_owner+0x320/0x320 [ 211.550575] ? rcu_note_context_switch+0x710/0x710 [ 211.555495] should_failslab+0xec/0x120 [ 211.559453] kmem_cache_alloc_trace+0x4b/0x740 [ 211.564023] ? kasan_check_write+0x14/0x20 [ 211.568247] ? _copy_from_user+0x99/0x110 [ 211.572383] copy_mount_options+0x5f/0x2e0 [ 211.576603] SyS_mount+0x87/0x120 [ 211.580039] ? copy_mnt_ns+0xb30/0xb30 [ 211.583911] do_syscall_64+0x281/0x940 [ 211.587779] ? vmalloc_sync_all+0x30/0x30 [ 211.591908] ? _raw_spin_unlock_irq+0x27/0x70 [ 211.596383] ? finish_task_switch+0x1c1/0x7e0 [ 211.600891] ? syscall_return_slowpath+0x550/0x550 [ 211.605800] ? syscall_return_slowpath+0x2ac/0x550 [ 211.610711] ? prepare_exit_to_usermode+0x350/0x350 [ 211.615711] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 211.621061] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 211.625892] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 211.631062] RIP: 0033:0x454e79 [ 211.634232] RSP: 002b:00007f50b9ba4c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 211.641923] RAX: ffffffffffffffda RBX: 00007f50b9ba56d4 RCX: 0000000000454e79 [ 211.649172] RDX: 0000000020000780 RSI: 0000000020000ac0 RDI: 0000000020000000 2018/03/31 08:25:54 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000000003042df8700"]) r1 = perf_event_open(&(0x7f0000348f88)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r2}, 0x10) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) mount(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f00000002c0)='devpts\x00', 0x800000, &(0x7f0000000300)="7b18f1563c67659c49445440cbb57f32c0f4710f0219046399f3e8a25c5d4975e2b42f404b14937bd42d9874bdd132eef77f584d5151c9a97470a0d77a0c24a85e319673350e16b039bf474ec320") socketpair(0x3, 0x800, 0x81, &(0x7f00000003c0)) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') 2018/03/31 08:25:54 executing program 1 (fault-call:8 fault-nth:3): perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={0xffffffffffffffff, &(0x7f0000000700), &(0x7f00000009c0)=""/161}, 0x18) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)) [ 211.656420] RBP: 000000000072bea0 R08: 0000000020000b00 R09: 0000000000000000 [ 211.663669] R10: 0000000000037002 R11: 0000000000000246 R12: 0000000000000015 [ 211.670920] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000002 [ 211.739905] FAULT_INJECTION: forcing a failure. [ 211.739905] name failslab, interval 1, probability 0, space 0, times 0 [ 211.751263] CPU: 0 PID: 15606 Comm: syz-executor3 Not tainted 4.16.0-rc6+ #43 [ 211.758524] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 211.767855] Call Trace: [ 211.770434] dump_stack+0x194/0x24d [ 211.774060] ? arch_local_irq_restore+0x53/0x53 [ 211.778713] ? __save_stack_trace+0x7e/0xd0 [ 211.783026] should_fail+0x8c0/0xa40 [ 211.786729] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 211.791808] ? kasan_kmalloc+0xad/0xe0 [ 211.795676] ? __kmalloc_track_caller+0x15e/0x760 [ 211.800495] ? memdup_user+0x2c/0x90 [ 211.804188] ? strndup_user+0x62/0xb0 [ 211.807967] ? SyS_mount+0x3c/0x120 [ 211.811576] ? proc_fail_nth_write+0x9b/0x1d0 [ 211.816053] ? map_files_get_link+0x3a0/0x3a0 [ 211.820529] ? find_held_lock+0x35/0x1d0 [ 211.824578] ? check_same_owner+0x320/0x320 [ 211.828883] ? rcu_note_context_switch+0x710/0x710 [ 211.833791] ? __check_object_size+0x8b/0x530 [ 211.838267] should_failslab+0xec/0x120 [ 211.842232] __kmalloc_track_caller+0x5f/0x760 [ 211.846792] ? strncpy_from_user+0x430/0x430 [ 211.851177] ? strndup_user+0x62/0xb0 [ 211.854955] ? _copy_from_user+0x99/0x110 [ 211.859092] memdup_user+0x2c/0x90 [ 211.862610] strndup_user+0x62/0xb0 [ 211.866224] SyS_mount+0x6b/0x120 [ 211.869662] ? copy_mnt_ns+0xb30/0xb30 [ 211.873528] do_syscall_64+0x281/0x940 [ 211.877395] ? vmalloc_sync_all+0x30/0x30 [ 211.881521] ? _raw_spin_unlock_irq+0x27/0x70 [ 211.885995] ? finish_task_switch+0x1c1/0x7e0 [ 211.890482] ? syscall_return_slowpath+0x550/0x550 [ 211.895391] ? syscall_return_slowpath+0x2ac/0x550 [ 211.900300] ? prepare_exit_to_usermode+0x350/0x350 [ 211.905300] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 211.910641] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 211.915475] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 211.920640] RIP: 0033:0x454e79 [ 211.923805] RSP: 002b:00007fbfd4b96c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 211.931491] RAX: ffffffffffffffda RBX: 00007fbfd4b976d4 RCX: 0000000000454e79 2018/03/31 08:25:54 executing program 3 (fault-call:10 fault-nth:2): r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000348f88)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r2}, 0x10) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) mount(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f00000002c0)='devpts\x00', 0x800000, &(0x7f0000000300)) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') 2018/03/31 08:25:54 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000080)=',%\x00') bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000140)='./file0\x00', 0x0, 0x10}, 0x10) perf_event_open(&(0x7f0000348f88)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_icmp(0xa, 0x2, 0x3a, &(0x7f0000000380)) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) mkdir(&(0x7f0000000100)='./file0\x00', 0x8) socketpair(0x0, 0x4, 0x6, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) socketpair(0x0, 0x2, 0x2, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f00000000c0)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={r1, 0x28, &(0x7f0000000200)}, 0x10) [ 211.938738] RDX: 0000000020000100 RSI: 0000000020000180 RDI: 0000000020000100 [ 211.945985] RBP: 000000000072bea0 R08: 0000000020000040 R09: 0000000000000000 [ 211.953238] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 211.960492] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000001 2018/03/31 08:25:54 executing program 6: socketpair(0x1, 0x807, 0x9, &(0x7f0000000080)={0xffffffffffffffff}) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000000)) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) socketpair(0x0, 0x4, 0x6, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x20) socketpair(0xf, 0x3, 0x2, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x8) [ 212.143579] devpts: called with bogus options [ 212.179231] FAULT_INJECTION: forcing a failure. [ 212.179231] name failslab, interval 1, probability 0, space 0, times 0 [ 212.185557] hugetlbfs: Bad mount option: "" [ 212.190600] CPU: 1 PID: 15623 Comm: syz-executor4 Not tainted 4.16.0-rc6+ #43 [ 212.202214] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 212.211564] Call Trace: [ 212.214169] dump_stack+0x194/0x24d [ 212.217797] ? arch_local_irq_restore+0x53/0x53 [ 212.222474] should_fail+0x8c0/0xa40 [ 212.226187] ? __save_stack_trace+0x7e/0xd0 [ 212.230508] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 212.235621] ? save_stack+0xa3/0xd0 [ 212.239252] ? save_stack+0x43/0xd0 [ 212.242887] ? find_held_lock+0x35/0x1d0 [ 212.246968] ? check_same_owner+0x320/0x320 [ 212.251296] ? rcu_note_context_switch+0x710/0x710 [ 212.256236] should_failslab+0xec/0x120 [ 212.260213] kmem_cache_alloc_trace+0x4b/0x740 [ 212.264806] htab_map_alloc+0xae/0x1020 [ 212.268788] ? fput+0xd2/0x140 [ 212.271990] htab_of_map_alloc+0x59/0xd0 [ 212.276050] ? htab_map_alloc+0x1020/0x1020 [ 212.280373] SyS_bpf+0x93b/0x4980 [ 212.283837] ? bpf_prog_get+0x20/0x20 [ 212.287646] ? finish_task_switch+0x1c1/0x7e0 [ 212.292148] ? lock_downgrade+0x980/0x980 [ 212.296314] ? lock_release+0xa40/0xa40 [ 212.300291] ? do_raw_spin_trylock+0x190/0x190 [ 212.304878] ? compat_start_thread+0x80/0x80 [ 212.309284] ? _raw_spin_unlock_irq+0x27/0x70 [ 212.313788] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 212.316322] FAULT_INJECTION: forcing a failure. [ 212.316322] name failslab, interval 1, probability 0, space 0, times 0 [ 212.318798] ? trace_hardirqs_on+0xd/0x10 [ 212.318811] ? _raw_spin_unlock_irq+0x27/0x70 [ 212.318823] ? finish_task_switch+0x1c1/0x7e0 [ 212.318832] ? finish_task_switch+0x182/0x7e0 [ 212.318846] ? copy_overflow+0x20/0x20 [ 212.318873] ? __schedule+0x903/0x1ec0 [ 212.318890] ? __sched_text_start+0x8/0x8 [ 212.318901] ? get_pid_task+0xbc/0x140 [ 212.318916] ? proc_fail_nth_write+0x9b/0x1d0 [ 212.367795] ? map_files_get_link+0x3a0/0x3a0 [ 212.372279] ? handle_mm_fault+0x35b/0xb10 [ 212.376502] ? find_held_lock+0x35/0x1d0 [ 212.380553] ? __mutex_unlock_slowpath+0xe9/0xac0 [ 212.385378] ? vfs_write+0x374/0x510 [ 212.389074] ? wait_for_completion+0x770/0x770 [ 212.393641] ? schedule+0xf5/0x430 [ 212.397167] ? __schedule+0x1ec0/0x1ec0 [ 212.401135] ? __sb_end_write+0xa0/0xd0 [ 212.405095] ? exit_to_usermode_loop+0x8c/0x2f0 [ 212.409751] ? trace_hardirqs_off+0xd/0x10 [ 212.413978] ? do_syscall_64+0xb7/0x940 [ 212.417941] ? bpf_prog_get+0x20/0x20 [ 212.421728] do_syscall_64+0x281/0x940 [ 212.425860] ? vmalloc_sync_all+0x30/0x30 [ 212.429991] ? _raw_spin_unlock_irq+0x27/0x70 [ 212.434471] ? finish_task_switch+0x1c1/0x7e0 [ 212.438952] ? syscall_return_slowpath+0x550/0x550 [ 212.443864] ? syscall_return_slowpath+0x2ac/0x550 [ 212.448775] ? prepare_exit_to_usermode+0x350/0x350 [ 212.453777] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 212.459127] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 212.463959] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 212.469130] RIP: 0033:0x454e79 [ 212.472306] RSP: 002b:00007f0d1e01cc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 212.479999] RAX: ffffffffffffffda RBX: 00007f0d1e01d6d4 RCX: 0000000000454e79 [ 212.487253] RDX: 000000000000002c RSI: 0000000020011000 RDI: 0000000000000000 [ 212.494990] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 212.502247] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 212.509501] R13: 000000000000003c R14: 00000000006f2640 R15: 0000000000000001 [ 212.516775] CPU: 0 PID: 15635 Comm: syz-executor3 Not tainted 4.16.0-rc6+ #43 2018/03/31 08:25:55 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000348f88)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r2}, 0x10) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x0) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') [ 212.524054] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 212.533401] Call Trace: [ 212.535993] dump_stack+0x194/0x24d [ 212.539619] ? arch_local_irq_restore+0x53/0x53 [ 212.544296] should_fail+0x8c0/0xa40 [ 212.548010] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 212.553199] ? __kmalloc_track_caller+0x15e/0x760 [ 212.558043] ? strndup_user+0x62/0xb0 [ 212.561850] ? SyS_mount+0x6b/0x120 [ 212.565466] ? trace_hardirqs_off+0x10/0x10 [ 212.569768] ? proc_fail_nth_write+0x9b/0x1d0 [ 212.574241] ? map_files_get_link+0x3a0/0x3a0 [ 212.578731] ? find_held_lock+0x35/0x1d0 [ 212.582803] ? check_same_owner+0x320/0x320 [ 212.587117] ? lock_release+0xa40/0xa40 [ 212.591082] ? rcu_note_context_switch+0x710/0x710 [ 212.596007] should_failslab+0xec/0x120 [ 212.599981] kmem_cache_alloc_trace+0x4b/0x740 [ 212.604553] ? kasan_check_write+0x14/0x20 [ 212.608783] ? _copy_from_user+0x99/0x110 [ 212.612935] copy_mount_options+0x5f/0x2e0 [ 212.617158] SyS_mount+0x87/0x120 [ 212.620590] ? copy_mnt_ns+0xb30/0xb30 [ 212.624459] do_syscall_64+0x281/0x940 [ 212.628323] ? vmalloc_sync_all+0x30/0x30 [ 212.632456] ? _raw_spin_unlock_irq+0x27/0x70 [ 212.636950] ? finish_task_switch+0x1c1/0x7e0 [ 212.641443] ? syscall_return_slowpath+0x550/0x550 [ 212.646369] ? syscall_return_slowpath+0x2ac/0x550 [ 212.651284] ? prepare_exit_to_usermode+0x350/0x350 [ 212.656677] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 212.662032] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 212.666874] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 212.672056] RIP: 0033:0x454e79 2018/03/31 08:25:55 executing program 7: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x80000000000, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000001fc0)) sendmsg(0xffffffffffffffff, &(0x7f00000024c0)={&(0x7f0000002040)=@un=@file={0x0, './file0\x00'}, 0x80, &(0x7f0000001f40)=[{&(0x7f00000020c0)="73c7575b94a72990e177f86ed4835a72a65c1a6c6831eeb0c48163a47ab63bcb605c8450cc4798ff6521c2aa722d1a7105c8a07e6c", 0x35}], 0x1, &(0x7f0000002500)=ANY=[], 0x0, 0x40000}, 0x20000000) r2 = gettid() r3 = perf_event_open(&(0x7f0000001ac0)={0x1, 0x70, 0xffffffff, 0x835, 0x9, 0xffffffffffffff5f, 0x0, 0x1000, 0x42000, 0x3, 0x8, 0x80, 0x1, 0x4, 0x100000001, 0x9, 0xff, 0x8, 0x1000, 0x7, 0x7f, 0x200, 0xb715, 0x3, 0x7fffffff, 0xf0a, 0x40, 0x8000, 0x8, 0x7, 0xffffffffffffff74, 0x4, 0x6, 0x100, 0x7, 0x335, 0x3ff, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000001a80), 0xe}, 0x0, 0x80000000, 0x82, 0x7, 0x5, 0x3, 0x80000001}, r2, 0xd, r1, 0x8) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000200)='mqueue\x00', 0x0, &(0x7f000000a000)) r4 = getpid() r5 = bpf$PROG_LOAD(0x5, &(0x7f0000002500)={0xf, 0x7, &(0x7f0000001940)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, [@ldst={0x3, 0x3, 0x3, 0x4, 0x3, 0x2, 0xffffffffffffffff}, @exit={0x95}], {0x95}}, &(0x7f0000001980)='GPL\x00', 0xff, 0x1000, &(0x7f00000039c0)=""/4096, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000019c0)={&(0x7f0000000180)='./file0\x00', r5}, 0x10) perf_event_open(&(0x7f0000001a00)={0x0, 0x70, 0x0, 0x8, 0x0, 0x3, 0x0, 0xb8, 0x1000, 0x0, 0x3, 0x4, 0xfff, 0x4, 0x4dae, 0x40, 0x100000001, 0x6, 0x4, 0x0, 0x3, 0x753c, 0x6, 0x100, 0x1de, 0x6, 0x4, 0x1, 0x6, 0x4, 0x7, 0x3, 0x7fff, 0x80000000, 0x3, 0x8, 0x81, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x7, 0x4}, 0x801, 0x400, 0x1, 0x4, 0x1, 0x9, 0x80000001}, r4, 0x7, r1, 0xb) r6 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000004000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000001c00)='./file0\x00', &(0x7f0000001c40)='./file0\x00', &(0x7f0000001c80)='devpts\x00', 0x40, &(0x7f0000001cc0)="be623dfd58807ac0b2f86f052863a5f30adc0bce173ebcf648cefd7d64732aeb5b94e6af3ab33e53669ba6d304d067dad4b1ff3ed87f18fd170aac904e8f105e80e22881717c98752a9cd7cfb06d102877e3b36b2624d22427331755a9514b225d25999ed605ffe4188630db2e7ddcc57f6316b60c4f3845d9dfcbbde5e49af627b48d7c9bd743b536de31a9ba3010cb6714c9b90a50537be55ca12a18e6541bff5a82d293e7734ea9c90707899663bd96b3bcce5887bf0bd35963c5adc39ddcb6f2a0a02b01661242046cb54ef1aec5a486b69e006305064124867bf79f4dc11798e214b61575168b79887122e0a3461f703c077f902c0a") socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r7, &(0x7f0000001800)={&(0x7f0000000240)=@alg, 0x80, &(0x7f0000000740)=[{&(0x7f00000002c0)=""/83, 0x53}, {&(0x7f0000000340)=""/27, 0x1b}, {&(0x7f0000000380)}, {&(0x7f00000003c0)=""/40, 0x28}, {&(0x7f0000000400)=""/144, 0x90}, {&(0x7f00000004c0)=""/200, 0xc8}, {&(0x7f00000005c0)=""/60, 0x3c}, {&(0x7f0000000600)=""/105, 0x69}, {&(0x7f0000000680)=""/127, 0x7f}, {&(0x7f0000000700)=""/8, 0x8}], 0xa, &(0x7f0000000800)=""/4096, 0x1000}, 0x10000) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000002340)=0xf60) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000003900)={&(0x7f0000003400)=@can={0x0, 0x0}, 0x80, &(0x7f0000003840)=[{&(0x7f0000003480)=""/194, 0xc2}, {&(0x7f0000003580)=""/250, 0xfa}, {&(0x7f0000003680)=""/100, 0x64}, {&(0x7f0000003700)=""/14, 0xe}, {&(0x7f0000003740)=""/159, 0x9f}, {&(0x7f0000003800)=""/15, 0xf}], 0x6, &(0x7f00000038c0)=""/29, 0x1d, 0x5}, 0x3) bpf$PROG_LOAD(0x5, &(0x7f0000003940)={0x4, 0x9, &(0x7f0000001840)=ANY=[@ANYBLOB="18000000030000000000000003000000dfd00c00fcffffff0000000000000000000803000101000000810000000000000001f0fff0ffffff000000000000000095000000000017d2"], &(0x7f0000000380)='GPL\x00', 0xf172, 0x4b, &(0x7f00000018c0)=""/75, 0x41f00, 0x1, [], r8}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000000c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001f00)={0xffffffffffffffff, 0x0, 0xf6, 0x22, &(0x7f0000001dc0)="9ef9482ea02fd36d0a768986a7ebe7a627dc88937e7073e3521858dfa0d5e02f571a01cfdfa76e048e5f956ea5da60b90e02a6c3d3687ed61ec9ab5b682c02498bddef38de9ce8c753e41e78f414d16202a033b6c7752711a5f56924e7846d6dcde2f71026e1eb0319b5e60f6b1ec67fca31c3cf1691d3af91a19f56be5a10ff337a53ba13dd3d75e1555211954b92ec0082d02b7b4cdddc021cbe84e4af8f20788977e3416918843e6c92b2ebf7b8b33ecbd4c7c9a9d5036c3e3e538748a32f1a28eb77818ca1878ffdd445dcdb8a40e6221e0fc474428449dfe93c62bbc69996aa9b34488c1da4f6f7c2275305a6a4fb256c1a516d", &(0x7f0000001ec0)=""/34, 0x1f, 0x1}, 0x28) close(r6) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x3441, &(0x7f0000000080)) mount(&(0x7f00000021c0)='./file0/file0\x00', &(0x7f0000002200)='./file0/file0\x00', &(0x7f0000002240)='fuse\x00', 0x2000000, &(0x7f0000002280)="9b3923bfddc346e9fa2aeaffae6ca386d8d50ba83ab72218340d3c30c045a89ac016797652ba04f1a203cfceccb458dbfd9fd03c4a80ef9a40dc7a4f24b6619d04a58186466fd8465757d9ee053c082cdfa957e7efab6191761847cca59c017493ef5e3d22432cf0b4ebef") ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f00000023c0)=ANY=[@ANYBLOB="07000000000000000000000000000000000000000000000000000000000000000000000067eb0ecf1cfa4ffd89aa7e339417beb7d332a5c996e59875644dd1e3a690110400bc751bb0435977d90fcbb2b83c27812d818991d125e9c0f199be2bc7f01aa0a5cb9b9f99438aa0f1ae3d50201f7bb276536f567f03f062994da292b6db0000000000000000000000000000a93536f303000000000000002a27f6ae1258ebb5079c1bab4f1f6f11ee8ce2e590855a3af38e4bb871ef8400000000000000000000"]) mount(&(0x7f0000001b40)='./file0\x00', &(0x7f0000001b80)='./file0/file0\x00', &(0x7f0000002100)='vfat\x00', 0x0, &(0x7f0000002140)="98980e21ac8b46c0b7bedeee39e6bd9ae4088d6ab47dc9dc76a39e299ce3783aa33e482e450484961fd3e3c5b178fafbe54440e19512ea4298652ed129d4241d9d116d8a5c2b931d350f0c989f8a288fc9e56c") mount(&(0x7f0000df7000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='hugetlbfs\x00', 0x200, &(0x7f00000001c0)) mkdir(&(0x7f00000004c0)='./file0/file0\x00', 0x0) socketpair$inet(0x2, 0x0, 0x1f, &(0x7f0000000080)) [ 212.675222] RSP: 002b:00007fbfd4b96c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 212.682909] RAX: ffffffffffffffda RBX: 00007fbfd4b976d4 RCX: 0000000000454e79 [ 212.690161] RDX: 0000000020000100 RSI: 0000000020000180 RDI: 0000000020000100 [ 212.697420] RBP: 000000000072bea0 R08: 0000000020000040 R09: 0000000000000000 [ 212.704673] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 212.711940] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000002 [ 212.754190] FAULT_INJECTION: forcing a failure. [ 212.754190] name failslab, interval 1, probability 0, space 0, times 0 [ 212.765458] CPU: 1 PID: 15631 Comm: syz-executor1 Not tainted 4.16.0-rc6+ #43 [ 212.772731] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 212.782091] Call Trace: [ 212.784667] dump_stack+0x194/0x24d [ 212.788281] ? arch_local_irq_restore+0x53/0x53 [ 212.792946] should_fail+0x8c0/0xa40 [ 212.796651] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 212.801757] ? lock_release+0xa40/0xa40 [ 212.805730] ? unwind_dump+0x4d0/0x4d0 [ 212.809628] ? find_held_lock+0x35/0x1d0 [ 212.813696] ? check_same_owner+0x320/0x320 [ 212.818006] ? rcu_note_context_switch+0x710/0x710 [ 212.822930] should_failslab+0xec/0x120 [ 212.826907] kmem_cache_alloc+0x47/0x760 [ 212.830970] ? map_files_get_link+0x3a0/0x3a0 [ 212.835468] getname_flags+0xcb/0x580 [ 212.839276] user_path_at_empty+0x2d/0x50 [ 212.843434] do_mount+0x15f/0x2bb0 [ 212.846984] ? copy_mount_string+0x40/0x40 [ 212.851219] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 212.856240] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 212.861004] ? retint_kernel+0x10/0x10 [ 212.864906] ? copy_mount_options+0x18b/0x2e0 [ 212.869402] ? copy_mount_options+0x191/0x2e0 [ 212.873901] ? copy_mount_options+0x1f7/0x2e0 [ 212.878398] SyS_mount+0xab/0x120 [ 212.881854] ? copy_mnt_ns+0xb30/0xb30 [ 212.885743] do_syscall_64+0x281/0x940 [ 212.889631] ? vmalloc_sync_all+0x30/0x30 [ 212.893781] ? _raw_spin_unlock_irq+0x27/0x70 [ 212.898278] ? finish_task_switch+0x1c1/0x7e0 [ 212.902780] ? syscall_return_slowpath+0x550/0x550 [ 212.907701] ? syscall_return_slowpath+0x2ac/0x550 [ 212.912630] ? prepare_exit_to_usermode+0x350/0x350 [ 212.917646] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 212.923004] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 212.927856] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 212.933042] RIP: 0033:0x454e79 [ 212.936220] RSP: 002b:00007f50b9ba4c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 212.943922] RAX: ffffffffffffffda RBX: 00007f50b9ba56d4 RCX: 0000000000454e79 2018/03/31 08:25:55 executing program 3 (fault-call:10 fault-nth:3): r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000348f88)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r2}, 0x10) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) mount(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f00000002c0)='devpts\x00', 0x800000, &(0x7f0000000300)) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') 2018/03/31 08:25:55 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000348f88)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r2}, 0x10) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x0) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') [ 212.951176] RDX: 0000000020000780 RSI: 0000000020000ac0 RDI: 0000000020000000 [ 212.958435] RBP: 000000000072bea0 R08: 0000000020000b00 R09: 0000000000000000 [ 212.965700] R10: 0000000000037002 R11: 0000000000000246 R12: 0000000000000015 [ 212.972965] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000003 [ 213.019925] devpts: called with bogus options [ 213.164684] FAULT_INJECTION: forcing a failure. [ 213.164684] name failslab, interval 1, probability 0, space 0, times 0 [ 213.172969] devpts: called with bogus options [ 213.175960] CPU: 0 PID: 15663 Comm: syz-executor3 Not tainted 4.16.0-rc6+ #43 [ 213.185807] hugetlbfs: Bad mount option: "" [ 213.187689] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 213.187695] Call Trace: [ 213.187714] dump_stack+0x194/0x24d [ 213.187729] ? arch_local_irq_restore+0x53/0x53 [ 213.187753] should_fail+0x8c0/0xa40 [ 213.216019] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 213.221123] ? lock_release+0xa40/0xa40 [ 213.225082] ? unwind_dump+0x4d0/0x4d0 [ 213.228955] ? find_held_lock+0x35/0x1d0 [ 213.233020] ? check_same_owner+0x320/0x320 [ 213.237329] ? rcu_note_context_switch+0x710/0x710 [ 213.242248] should_failslab+0xec/0x120 [ 213.246204] kmem_cache_alloc+0x47/0x760 [ 213.250254] ? map_files_get_link+0x3a0/0x3a0 [ 213.254740] getname_flags+0xcb/0x580 [ 213.258525] user_path_at_empty+0x2d/0x50 [ 213.262655] do_mount+0x15f/0x2bb0 [ 213.266181] ? copy_mount_string+0x40/0x40 [ 213.270396] ? rcu_pm_notify+0xc0/0xc0 [ 213.274271] ? copy_mount_options+0x5f/0x2e0 [ 213.278672] ? rcu_read_lock_sched_held+0x108/0x120 [ 213.283674] ? kmem_cache_alloc_trace+0x459/0x740 [ 213.288501] ? kasan_check_write+0x14/0x20 [ 213.292719] ? _copy_from_user+0x99/0x110 [ 213.296861] ? copy_mount_options+0x1f7/0x2e0 [ 213.301338] SyS_mount+0xab/0x120 [ 213.304776] ? copy_mnt_ns+0xb30/0xb30 [ 213.308647] do_syscall_64+0x281/0x940 [ 213.312512] ? vmalloc_sync_all+0x30/0x30 [ 213.316641] ? _raw_spin_unlock_irq+0x27/0x70 [ 213.321117] ? finish_task_switch+0x1c1/0x7e0 [ 213.325591] ? syscall_return_slowpath+0x550/0x550 [ 213.330502] ? syscall_return_slowpath+0x2ac/0x550 [ 213.335410] ? prepare_exit_to_usermode+0x350/0x350 [ 213.340407] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 213.345754] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 213.350583] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 213.355750] RIP: 0033:0x454e79 [ 213.358923] RSP: 002b:00007fbfd4b96c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 213.366614] RAX: ffffffffffffffda RBX: 00007fbfd4b976d4 RCX: 0000000000454e79 [ 213.373864] RDX: 0000000020000100 RSI: 0000000020000180 RDI: 0000000020000100 [ 213.381124] RBP: 000000000072bea0 R08: 0000000020000040 R09: 0000000000000000 [ 213.388383] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 213.395637] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000003 2018/03/31 08:25:56 executing program 4 (fault-call:1 fault-nth:2): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x0, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r4 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f00000009c0)="3949bcf20271c219f64b9e3fbd45bfae692375440912d5a576c2d82299018de50363f2cf30a439b45c2738869283b7900c1e030013700557a768d5cc05cb9ed624684f4dfdae73a8148b29b2978222576dabbcb3556bcf35a8f66fa68ceb0b834ec5120ac749dc0cc5aab7b0197711785349b1673ff5159bc1a40df6c779950e0747a25ce77a10f68b663a87fc993224a79b583eac02a2171f076ff3", 0x1000, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) 2018/03/31 08:25:56 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) socketpair(0x0, 0x4, 0x6, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000100)='./file0\x00', 0x1a1) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) socketpair(0xf, 0x3, 0x2, &(0x7f0000000040)) bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00', 0x0, 0x10}, 0x10) 2018/03/31 08:25:56 executing program 1 (fault-call:8 fault-nth:4): perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={0xffffffffffffffff, &(0x7f0000000700), &(0x7f00000009c0)=""/161}, 0x18) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)) 2018/03/31 08:25:56 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000000003042df8700"]) r1 = perf_event_open(&(0x7f0000348f88)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r2}, 0x10) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) mount(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f00000002c0)='devpts\x00', 0x800000, &(0x7f0000000300)="7b18f1563c67659c49445440cbb57f32c0f4710f0219046399f3e8a25c5d4975e2b42f404b14937bd42d9874bdd132eef77f584d5151c9a97470a0d77a0c24a85e319673350e16b039bf474ec320") socketpair(0x3, 0x800, 0x81, &(0x7f00000003c0)) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') 2018/03/31 08:25:56 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) socketpair(0x0, 0x4, 0x6, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) socketpair(0x800f, 0x40003, 0x1, &(0x7f0000000080)) socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f0000000000)) 2018/03/31 08:25:56 executing program 7: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x80000000000, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000001fc0)) sendmsg(0xffffffffffffffff, &(0x7f00000024c0)={&(0x7f0000002040)=@un=@file={0x0, './file0\x00'}, 0x80, &(0x7f0000001f40)=[{&(0x7f00000020c0)="73c7575b94a72990e177f86ed4835a72a65c1a6c6831eeb0c48163a47ab63bcb605c8450cc4798ff6521c2aa722d1a7105c8a07e6c", 0x35}], 0x1, &(0x7f0000002500)=ANY=[], 0x0, 0x40000}, 0x20000000) r2 = gettid() r3 = perf_event_open(&(0x7f0000001ac0)={0x1, 0x70, 0xffffffff, 0x835, 0x9, 0xffffffffffffff5f, 0x0, 0x1000, 0x42000, 0x3, 0x8, 0x80, 0x1, 0x4, 0x100000001, 0x9, 0xff, 0x8, 0x1000, 0x7, 0x7f, 0x200, 0xb715, 0x3, 0x7fffffff, 0xf0a, 0x40, 0x8000, 0x8, 0x7, 0xffffffffffffff74, 0x4, 0x6, 0x100, 0x7, 0x335, 0x3ff, 0x58, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000001a80), 0xe}, 0x0, 0x80000000, 0x82, 0x7, 0x5, 0x3, 0x80000001}, r2, 0xd, r1, 0x8) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000200)='mqueue\x00', 0x0, &(0x7f000000a000)) r4 = getpid() r5 = bpf$PROG_LOAD(0x5, &(0x7f0000002500)={0xf, 0x7, &(0x7f0000001940)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, [@ldst={0x3, 0x3, 0x3, 0x4, 0x3, 0x2, 0xffffffffffffffff}, @exit={0x95}], {0x95}}, &(0x7f0000001980)='GPL\x00', 0xff, 0x1000, &(0x7f00000039c0)=""/4096, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000019c0)={&(0x7f0000000180)='./file0\x00', r5}, 0x10) perf_event_open(&(0x7f0000001a00)={0x0, 0x70, 0x0, 0x8, 0x0, 0x3, 0x0, 0xb8, 0x1000, 0x0, 0x3, 0x4, 0xfff, 0x4, 0x4dae, 0x40, 0x100000001, 0x6, 0x4, 0x0, 0x3, 0x753c, 0x6, 0x100, 0x1de, 0x6, 0x4, 0x1, 0x6, 0x4, 0x7, 0x3, 0x7fff, 0x80000000, 0x3, 0x8, 0x81, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x7, 0x4}, 0x801, 0x400, 0x1, 0x4, 0x1, 0x9, 0x80000001}, r4, 0x7, r1, 0xb) r6 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000004000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000001c00)='./file0\x00', &(0x7f0000001c40)='./file0\x00', &(0x7f0000001c80)='devpts\x00', 0x40, &(0x7f0000001cc0)="be623dfd58807ac0b2f86f052863a5f30adc0bce173ebcf648cefd7d64732aeb5b94e6af3ab33e53669ba6d304d067dad4b1ff3ed87f18fd170aac904e8f105e80e22881717c98752a9cd7cfb06d102877e3b36b2624d22427331755a9514b225d25999ed605ffe4188630db2e7ddcc57f6316b60c4f3845d9dfcbbde5e49af627b48d7c9bd743b536de31a9ba3010cb6714c9b90a50537be55ca12a18e6541bff5a82d293e7734ea9c90707899663bd96b3bcce5887bf0bd35963c5adc39ddcb6f2a0a02b01661242046cb54ef1aec5a486b69e006305064124867bf79f4dc11798e214b61575168b79887122e0a3461f703c077f902c0a") socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r7, &(0x7f0000001800)={&(0x7f0000000240)=@alg, 0x80, &(0x7f0000000740)=[{&(0x7f00000002c0)=""/83, 0x53}, {&(0x7f0000000340)=""/27, 0x1b}, {&(0x7f0000000380)}, {&(0x7f00000003c0)=""/40, 0x28}, {&(0x7f0000000400)=""/144, 0x90}, {&(0x7f00000004c0)=""/200, 0xc8}, {&(0x7f00000005c0)=""/60, 0x3c}, {&(0x7f0000000600)=""/105, 0x69}, {&(0x7f0000000680)=""/127, 0x7f}, {&(0x7f0000000700)=""/8, 0x8}], 0xa, &(0x7f0000000800)=""/4096, 0x1000}, 0x10000) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000002340)=0xf60) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000003900)={&(0x7f0000003400)=@can={0x0, 0x0}, 0x80, &(0x7f0000003840)=[{&(0x7f0000003480)=""/194, 0xc2}, {&(0x7f0000003580)=""/250, 0xfa}, {&(0x7f0000003680)=""/100, 0x64}, {&(0x7f0000003700)=""/14, 0xe}, {&(0x7f0000003740)=""/159, 0x9f}, {&(0x7f0000003800)=""/15, 0xf}], 0x6, &(0x7f00000038c0)=""/29, 0x1d, 0x5}, 0x3) bpf$PROG_LOAD(0x5, &(0x7f0000003940)={0x4, 0x9, &(0x7f0000001840)=ANY=[@ANYBLOB="18000000030000000000000003000000dfd00c00fcffffff0000000000000000000803000101000000810000000000000001f0fff0ffffff000000000000000095000000000017d2"], &(0x7f0000000380)='GPL\x00', 0xf172, 0x4b, &(0x7f00000018c0)=""/75, 0x41f00, 0x1, [], r8}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000000c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001f00)={0xffffffffffffffff, 0x0, 0xf6, 0x22, &(0x7f0000001dc0)="9ef9482ea02fd36d0a768986a7ebe7a627dc88937e7073e3521858dfa0d5e02f571a01cfdfa76e048e5f956ea5da60b90e02a6c3d3687ed61ec9ab5b682c02498bddef38de9ce8c753e41e78f414d16202a033b6c7752711a5f56924e7846d6dcde2f71026e1eb0319b5e60f6b1ec67fca31c3cf1691d3af91a19f56be5a10ff337a53ba13dd3d75e1555211954b92ec0082d02b7b4cdddc021cbe84e4af8f20788977e3416918843e6c92b2ebf7b8b33ecbd4c7c9a9d5036c3e3e538748a32f1a28eb77818ca1878ffdd445dcdb8a40e6221e0fc474428449dfe93c62bbc69996aa9b34488c1da4f6f7c2275305a6a4fb256c1a516d", &(0x7f0000001ec0)=""/34, 0x1f, 0x1}, 0x28) close(r6) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x3441, &(0x7f0000000080)) mount(&(0x7f00000021c0)='./file0/file0\x00', &(0x7f0000002200)='./file0/file0\x00', &(0x7f0000002240)='fuse\x00', 0x2000000, &(0x7f0000002280)="9b3923bfddc346e9fa2aeaffae6ca386d8d50ba83ab72218340d3c30c045a89ac016797652ba04f1a203cfceccb458dbfd9fd03c4a80ef9a40dc7a4f24b6619d04a58186466fd8465757d9ee053c082cdfa957e7efab6191761847cca59c017493ef5e3d22432cf0b4ebef") ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f00000023c0)=ANY=[@ANYBLOB="07000000000000000000000000000000000000000000000000000000000000000000000067eb0ecf1cfa4ffd89aa7e339417beb7d332a5c996e59875644dd1e3a690110400bc751bb0435977d90fcbb2b83c27812d818991d125e9c0f199be2bc7f01aa0a5cb9b9f99438aa0f1ae3d50201f7bb276536f567f03f062994da292b6db0000000000000000000000000000a93536f303000000000000002a27f6ae1258ebb5079c1bab4f1f6f11ee8ce2e590855a3af38e4bb871ef8400000000000000000000"]) mount(&(0x7f0000001b40)='./file0\x00', &(0x7f0000001b80)='./file0/file0\x00', &(0x7f0000002100)='vfat\x00', 0x0, &(0x7f0000002140)="98980e21ac8b46c0b7bedeee39e6bd9ae4088d6ab47dc9dc76a39e299ce3783aa33e482e450484961fd3e3c5b178fafbe54440e19512ea4298652ed129d4241d9d116d8a5c2b931d350f0c989f8a288fc9e56c") mount(&(0x7f0000df7000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='hugetlbfs\x00', 0x200, &(0x7f00000001c0)) mkdir(&(0x7f00000004c0)='./file0/file0\x00', 0x0) socketpair$inet(0x2, 0x0, 0x1f, &(0x7f0000000080)) 2018/03/31 08:25:56 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000348f88)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r2}, 0x10) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x0) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') 2018/03/31 08:25:56 executing program 3 (fault-call:10 fault-nth:4): r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000348f88)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r2}, 0x10) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) mount(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f00000002c0)='devpts\x00', 0x800000, &(0x7f0000000300)) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') [ 213.492994] FAULT_INJECTION: forcing a failure. [ 213.492994] name failslab, interval 1, probability 0, space 0, times 0 [ 213.504427] CPU: 0 PID: 15679 Comm: syz-executor4 Not tainted 4.16.0-rc6+ #43 [ 213.511695] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 213.521036] Call Trace: [ 213.523620] dump_stack+0x194/0x24d [ 213.527238] ? arch_local_irq_restore+0x53/0x53 [ 213.531905] should_fail+0x8c0/0xa40 [ 213.535608] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 213.540694] ? is_bpf_text_address+0xa4/0x120 [ 213.545177] ? kernel_text_address+0xd1/0xe0 [ 213.549576] ? __unwind_start+0x169/0x330 [ 213.553701] ? __kernel_text_address+0xd/0x40 [ 213.558175] ? find_held_lock+0x35/0x1d0 [ 213.562230] ? check_same_owner+0x320/0x320 [ 213.566527] ? save_stack+0xa3/0xd0 [ 213.570141] ? rcu_note_context_switch+0x710/0x710 [ 213.575058] ? save_stack+0x43/0xd0 [ 213.578672] ? _atomic_dec_and_lock+0xe8/0x1a0 [ 213.583243] should_failslab+0xec/0x120 [ 213.587218] kmem_cache_alloc_node_trace+0x5a/0x760 [ 213.592225] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 213.597219] ? trace_hardirqs_on+0xd/0x10 [ 213.601346] ? free_uid+0x15d/0x480 [ 213.604955] __get_vm_area_node+0xae/0x340 [ 213.609193] __vmalloc_node_range+0xa3/0x650 [ 213.613593] ? htab_map_alloc+0x7bc/0x1020 [ 213.617819] ? bpf_map_init_from_attr+0x320/0x320 [ 213.622641] ? htab_map_alloc+0x7bc/0x1020 [ 213.626863] __vmalloc_node_flags_caller+0x50/0x60 [ 213.631776] ? htab_map_alloc+0x7bc/0x1020 [ 213.636005] bpf_map_area_alloc+0x62/0x80 [ 213.640141] htab_map_alloc+0x7bc/0x1020 [ 213.644189] htab_of_map_alloc+0x59/0xd0 [ 213.648226] ? htab_map_alloc+0x1020/0x1020 [ 213.652523] SyS_bpf+0x93b/0x4980 [ 213.655956] ? bpf_prog_get+0x20/0x20 [ 213.659737] ? finish_task_switch+0x1c1/0x7e0 [ 213.664216] ? lock_downgrade+0x980/0x980 [ 213.668349] ? lock_release+0xa40/0xa40 [ 213.672300] ? do_raw_spin_trylock+0x190/0x190 [ 213.676857] ? compat_start_thread+0x80/0x80 [ 213.681244] ? _raw_spin_unlock_irq+0x27/0x70 [ 213.685725] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 213.690717] ? trace_hardirqs_on+0xd/0x10 [ 213.694849] ? _raw_spin_unlock_irq+0x27/0x70 [ 213.699325] ? finish_task_switch+0x1c1/0x7e0 [ 213.703805] ? finish_task_switch+0x182/0x7e0 [ 213.708287] ? copy_overflow+0x20/0x20 [ 213.712160] ? __schedule+0x903/0x1ec0 [ 213.716038] ? __sched_text_start+0x8/0x8 [ 213.720180] ? get_pid_task+0xbc/0x140 [ 213.724055] ? proc_fail_nth_write+0x9b/0x1d0 [ 213.728525] ? map_files_get_link+0x3a0/0x3a0 [ 213.733008] ? handle_mm_fault+0x35b/0xb10 [ 213.737229] ? find_held_lock+0x35/0x1d0 [ 213.741279] ? __mutex_unlock_slowpath+0xe9/0xac0 [ 213.746102] ? vfs_write+0x374/0x510 [ 213.749795] ? wait_for_completion+0x770/0x770 [ 213.754361] ? schedule+0xf5/0x430 [ 213.757886] ? retint_kernel+0x10/0x10 [ 213.761767] ? __schedule+0x1ec0/0x1ec0 [ 213.765720] ? __sb_end_write+0x84/0xd0 [ 213.769682] ? __sb_end_write+0xa0/0xd0 [ 213.773635] ? exit_to_usermode_loop+0x8c/0x2f0 [ 213.778280] ? trace_hardirqs_off+0xd/0x10 [ 213.782505] ? do_syscall_64+0xb7/0x940 [ 213.786472] ? bpf_prog_get+0x20/0x20 [ 213.790257] do_syscall_64+0x281/0x940 [ 213.794132] ? vmalloc_sync_all+0x30/0x30 [ 213.798272] ? _raw_spin_unlock_irq+0x27/0x70 [ 213.802745] ? finish_task_switch+0x1c1/0x7e0 [ 213.807230] ? syscall_return_slowpath+0x550/0x550 [ 213.812142] ? syscall_return_slowpath+0x2ac/0x550 [ 213.817059] ? prepare_exit_to_usermode+0x350/0x350 [ 213.822060] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 213.827410] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 213.832235] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 213.837399] RIP: 0033:0x454e79 [ 213.840572] RSP: 002b:00007f0d1e01cc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 213.848270] RAX: ffffffffffffffda RBX: 00007f0d1e01d6d4 RCX: 0000000000454e79 [ 213.855522] RDX: 000000000000002c RSI: 0000000020011000 RDI: 0000000000000000 [ 213.862775] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 213.870037] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 213.877287] R13: 000000000000003c R14: 00000000006f2640 R15: 0000000000000002 [ 213.892987] FAULT_INJECTION: forcing a failure. [ 213.892987] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 213.904817] CPU: 1 PID: 15680 Comm: syz-executor1 Not tainted 4.16.0-rc6+ #43 [ 213.912081] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 213.921415] Call Trace: [ 213.923996] dump_stack+0x194/0x24d [ 213.927615] ? arch_local_irq_restore+0x53/0x53 [ 213.932273] should_fail+0x8c0/0xa40 [ 213.935980] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 213.941087] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 213.946269] ? trace_event_raw_event_lock+0x340/0x340 [ 213.951448] ? perf_trace_lock+0x900/0x900 [ 213.955672] ? print_irqtrace_events+0x270/0x270 [ 213.960411] ? trace_hardirqs_off+0x10/0x10 [ 213.964724] ? lock_acquire+0x1d5/0x580 [ 213.968688] ? perf_trace_lock+0xd6/0x900 [ 213.972820] ? perf_trace_lock_acquire+0xe3/0x980 [ 213.977662] ? trace_event_raw_event_lock+0x340/0x340 [ 213.982833] ? perf_trace_lock+0x900/0x900 [ 213.987055] ? should_fail+0x23b/0xa40 [ 213.990942] __alloc_pages_nodemask+0x327/0xdd0 [ 213.995591] ? lock_release+0xa40/0xa40 [ 213.999556] ? __alloc_pages_slowpath+0x2d10/0x2d10 [ 214.004570] ? find_held_lock+0x35/0x1d0 [ 214.008631] ? check_same_owner+0x320/0x320 [ 214.012945] cache_grow_begin+0x72/0x640 [ 214.017000] kmem_cache_alloc+0x400/0x760 [ 214.021149] ? map_files_get_link+0x3a0/0x3a0 [ 214.025635] getname_flags+0xcb/0x580 [ 214.029417] user_path_at_empty+0x2d/0x50 [ 214.033546] do_mount+0x15f/0x2bb0 [ 214.037077] ? copy_mount_string+0x40/0x40 [ 214.041305] ? rcu_pm_notify+0xc0/0xc0 [ 214.045187] ? copy_mount_options+0x5f/0x2e0 [ 214.049588] ? rcu_read_lock_sched_held+0x108/0x120 [ 214.054593] ? kmem_cache_alloc_trace+0x459/0x740 [ 214.059426] ? kasan_check_write+0x14/0x20 [ 214.063649] ? _copy_from_user+0x99/0x110 [ 214.067777] ? copy_mount_options+0x1f7/0x2e0 [ 214.072254] SyS_mount+0xab/0x120 [ 214.075683] ? copy_mnt_ns+0xb30/0xb30 [ 214.079570] do_syscall_64+0x281/0x940 [ 214.083448] ? vmalloc_sync_all+0x30/0x30 [ 214.087578] ? _raw_spin_unlock_irq+0x27/0x70 [ 214.092054] ? finish_task_switch+0x1c1/0x7e0 [ 214.096535] ? syscall_return_slowpath+0x550/0x550 [ 214.101452] ? syscall_return_slowpath+0x2ac/0x550 [ 214.106357] ? prepare_exit_to_usermode+0x350/0x350 [ 214.111351] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 214.116704] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 214.121535] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 214.126698] RIP: 0033:0x454e79 [ 214.129863] RSP: 002b:00007f50b9ba4c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 214.137547] RAX: ffffffffffffffda RBX: 00007f50b9ba56d4 RCX: 0000000000454e79 2018/03/31 08:25:57 executing program 1 (fault-call:8 fault-nth:5): perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={0xffffffffffffffff, &(0x7f0000000700), &(0x7f00000009c0)=""/161}, 0x18) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)) [ 214.144794] RDX: 0000000020000780 RSI: 0000000020000ac0 RDI: 0000000020000000 [ 214.152042] RBP: 000000000072bea0 R08: 0000000020000b00 R09: 0000000000000000 [ 214.159294] R10: 0000000000037002 R11: 0000000000000246 R12: 0000000000000015 [ 214.166554] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000004 [ 214.184801] devpts: called with bogus options 2018/03/31 08:25:57 executing program 4 (fault-call:1 fault-nth:3): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x0, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r4 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f00000009c0)="3949bcf20271c219f64b9e3fbd45bfae692375440912d5a576c2d82299018de50363f2cf30a439b45c2738869283b7900c1e030013700557a768d5cc05cb9ed624684f4dfdae73a8148b29b2978222576dabbcb3556bcf35a8f66fa68ceb0b834ec5120ac749dc0cc5aab7b0197711785349b1673ff5159bc1a40df6c779950e0747a25ce77a10f68b663a87fc993224a79b583eac02a2171f076ff3", 0x1000, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) 2018/03/31 08:25:57 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000000003042df8700"]) r1 = perf_event_open(&(0x7f0000348f88)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r2}, 0x10) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) mount(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f00000002c0)='devpts\x00', 0x800000, &(0x7f0000000300)="7b18f1563c67659c49445440cbb57f32c0f4710f0219046399f3e8a25c5d4975e2b42f404b14937bd42d9874bdd132eef77f584d5151c9a97470a0d77a0c24a85e319673350e16b039bf474ec320") socketpair(0x3, 0x800, 0x81, &(0x7f00000003c0)) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') 2018/03/31 08:25:57 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x78d80de9) perf_event_open(&(0x7f0000348f88)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000001fc0)) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000002000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r2, &(0x7f00000024c0)={&(0x7f0000002040)=@un=@file={0x0, './file0\x00'}, 0x80, &(0x7f0000001f40)=[{&(0x7f00000020c0)="73c7575b94a72990e177f86ed4835a72a65c1a6c6831eeb0c48163a47ab63bcb605c8450cc4798ff6521c2aa722d1a7105c8a07e6c", 0x35}], 0x1, &(0x7f0000002500)=ANY=[], 0x0, 0x40000}, 0x20000000) r3 = gettid() r4 = perf_event_open(&(0x7f0000001ac0)={0x1, 0x70, 0xffffffff, 0x835, 0x9, 0xffffffffffffff5f, 0x0, 0x1000, 0x42000, 0x3, 0x8, 0x80, 0x1, 0x4, 0x100000001, 0x9, 0xff, 0x8, 0x1000, 0x7, 0x7f, 0x200, 0x0, 0x3, 0x7fffffff, 0xf0a, 0x40, 0x8000, 0x8, 0x7, 0xffffffffffffff74, 0x4, 0x6, 0x100, 0x7, 0x335, 0x3ff, 0x58, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000001a80), 0xe}, 0x244, 0x80000000, 0x82, 0x7, 0x5, 0x3, 0x80000001}, r3, 0xd, r1, 0x8) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000200)='mqueue\x00', 0x0, &(0x7f000000a000)) r5 = getpid() perf_event_open(&(0x7f0000001a00)={0x0, 0x70, 0x0, 0x8, 0x0, 0x3, 0x0, 0xb8, 0x1000, 0x0, 0x3, 0x4, 0xfff, 0x4, 0x4dae, 0x40, 0x100000001, 0x6, 0x4, 0x0, 0x3, 0x753c, 0x6, 0x100, 0x1de, 0x6, 0x4, 0x1, 0x6, 0x4, 0x7, 0x3, 0x7fff, 0x80000000, 0x3, 0x8, 0x81, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x7, 0x4}, 0x801, 0x400, 0x1, 0x4, 0x1, 0x9, 0x80000001}, r5, 0x7, r1, 0xb) r6 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000004000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_icmp(0xa, 0x2, 0x3a, &(0x7f0000002380)) mount(&(0x7f0000001c00)='./file0\x00', &(0x7f0000001c40)='./file0\x00', &(0x7f0000001c80)='devpts\x00', 0x40, &(0x7f0000001cc0)="be623dfd58807ac0b2f86f052863a5f30adc0bce173ebcf648cefd7d64732aeb5b94e6af3ab33e53669ba6d304d067dad4b1ff3ed87f18fd170aac904e8f105e80e22881717c98752a9cd7cfb06d102877e3b36b2624d22427331755a9514b225d25999ed605ffe4188630db2e7ddcc57f6316b60c4f3845d9dfcbbde5e49af627b48d7c9bd743b536de31a9ba3010cb6714c9b90a50537be55ca12a18e6541bff5a82d293e7734ea9c90707899663bd96b3bcce5887bf0bd35963c5adc39ddcb6f2a0a02b01661242046cb54ef1aec5a486b69e006305064124867bf79f4dc11798e214b61575168b79887122e0a3461f703c077f902c0a") socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r7, &(0x7f0000001800)={&(0x7f0000000240)=@alg, 0x80, &(0x7f0000000740)=[{&(0x7f00000002c0)=""/83, 0x53}, {&(0x7f0000000340)=""/27, 0x1b}, {&(0x7f0000000380)}, {&(0x7f00000003c0)=""/40, 0x28}, {&(0x7f0000000400)=""/144, 0x90}, {&(0x7f00000004c0)=""/200, 0xc8}, {&(0x7f00000005c0)=""/60, 0x3c}, {&(0x7f0000000600)=""/105, 0x69}, {&(0x7f0000000680)=""/127, 0x7f}, {&(0x7f0000000700)=""/8, 0x8}], 0xa, &(0x7f0000000800)=""/4096, 0x1000}, 0x10000) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000002340)=0xf60) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000003900)={&(0x7f0000003400)=@can={0x0, 0x0}, 0x80, &(0x7f0000003840)=[{&(0x7f0000003480)=""/194, 0xc2}, {&(0x7f0000003580)=""/250, 0xfa}, {&(0x7f0000003680)=""/100, 0x64}, {&(0x7f0000003700)=""/14, 0xe}, {&(0x7f0000003740)=""/159, 0x9f}, {&(0x7f0000003800)=""/15, 0xf}], 0x6, &(0x7f00000038c0)=""/29, 0x1d, 0x5}, 0x3) bpf$PROG_LOAD(0x5, &(0x7f0000003940)={0x4, 0x9, &(0x7f0000001840)=ANY=[@ANYBLOB="18000000030000000000000003000000dfd00c00fcffffff0000000000000000000803000101000000000000000000003d01f0fff0ffffff000000000000000095000000000017d2"], &(0x7f0000000380)='GPL\x00', 0xf172, 0x4b, &(0x7f00000018c0)=""/75, 0x41f00, 0x1, [], r8}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000000c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001f00)={0xffffffffffffffff, 0x0, 0xf6, 0x22, &(0x7f0000001dc0)="9ef9482ea02fd36d0a768986a7ebe7a627dc88937e7073e3521858dfa0d5e02f571a01cfdfa76e048e5f956ea5da60b90e02a6c3d3687ed61ec9ab5b682c02498bddef38de9ce8c753e41e78f414d16202a033b6c7752711a5f56924e7846d6dcde2f71026e1eb0319b5e60f6b1ec67fca31c3cf1691d3af91a19f56be5a10ff337a53ba13dd3d75e1555211954b92ec0082d02b7b4cdddc021cbe84e4af8f20788977e3416918843e6c92b2ebf7b8b33ecbd4c7c9a9d5036c3e3e538748a32f1a28eb77818ca1878ffdd445dcdb8a40e6221e0fc474428449dfe93c62bbc69996aa9b34488c1da4f6f7c2275305a6a4fb256c1a516d", &(0x7f0000001ec0)=""/34, 0x1f, 0x1}, 0x28) close(r6) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000001bc0)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x3441, &(0x7f0000000080)) mount(&(0x7f00000021c0)='./file0/file0\x00', &(0x7f0000002200)='./file0/file0\x00', &(0x7f0000002240)='fuse\x00', 0x2000000, &(0x7f0000002280)="9b3923bfddc346e9fa2aeaffae6ca386d8d50ba83ab72218340d3c30c045a89ac016797652ba04f1a203cfceccb458dbfd9fd03c4a80ef9a40dc7a4f24b6619d04a58186466fd8465757d9ee053c082cdfa957e7efab6191761847cca59c017493ef5e3d22432cf0b4ebef") ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000001940)=ANY=[@ANYBLOB="07000000000000000000000000000000000000000000000000000000000000000000000067eb0ecf1c127df7274c9ea1675e02fa4ffd89aa7e339417beb7d332a5c996e59875644dd1e3a690110400bc751bb0435977d90fcbb2b83c27812d818991d125e9c0f199be2bc7f01aa0a5cb9b9f99438aa0f1ae3d50201f7bb276536f567f03f062994da292b6db0000000000000000000000000000"]) mkdir(&(0x7f0000000680)='./file0\x00', 0x20000000) 2018/03/31 08:25:57 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) socketpair(0x0, 0x4, 0x6, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000000)={r0}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) socketpair(0xf, 0x3, 0x2, &(0x7f0000000040)) [ 214.349688] devpts: called with bogus options [ 214.371782] hugetlbfs: Bad mount option: "" [ 214.411561] FAULT_INJECTION: forcing a failure. [ 214.411561] name failslab, interval 1, probability 0, space 0, times 0 [ 214.422873] CPU: 0 PID: 15704 Comm: syz-executor3 Not tainted 4.16.0-rc6+ #43 [ 214.430152] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 214.439502] Call Trace: [ 214.442091] dump_stack+0x194/0x24d [ 214.445708] ? arch_local_irq_restore+0x53/0x53 [ 214.450369] should_fail+0x8c0/0xa40 [ 214.454086] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 214.459190] ? lock_release+0xa40/0xa40 [ 214.463148] ? unwind_dump+0x4d0/0x4d0 [ 214.467032] ? find_held_lock+0x35/0x1d0 [ 214.471096] ? check_same_owner+0x320/0x320 [ 214.475403] ? rcu_note_context_switch+0x710/0x710 [ 214.480319] should_failslab+0xec/0x120 [ 214.484280] kmem_cache_alloc+0x47/0x760 [ 214.488343] ? find_held_lock+0x35/0x1d0 [ 214.492393] getname_flags+0xcb/0x580 [ 214.496180] user_path_at_empty+0x2d/0x50 [ 214.500313] do_mount+0x15f/0x2bb0 [ 214.503846] ? copy_mount_string+0x40/0x40 [ 214.508068] ? rcu_pm_notify+0xc0/0xc0 [ 214.512207] ? copy_mount_options+0x5f/0x2e0 [ 214.516597] ? rcu_read_lock_sched_held+0x108/0x120 [ 214.521597] ? kmem_cache_alloc_trace+0x459/0x740 [ 214.526420] ? kasan_check_write+0x14/0x20 [ 214.530643] ? copy_mount_options+0x1f7/0x2e0 [ 214.535125] SyS_mount+0xab/0x120 [ 214.538560] ? copy_mnt_ns+0xb30/0xb30 [ 214.542430] do_syscall_64+0x281/0x940 [ 214.546295] ? vmalloc_sync_all+0x30/0x30 [ 214.550422] ? _raw_spin_unlock_irq+0x27/0x70 [ 214.554902] ? finish_task_switch+0x1c1/0x7e0 [ 214.559384] ? syscall_return_slowpath+0x550/0x550 [ 214.564293] ? syscall_return_slowpath+0x2ac/0x550 [ 214.569206] ? prepare_exit_to_usermode+0x350/0x350 [ 214.574203] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 214.579551] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 214.584378] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 214.589545] RIP: 0033:0x454e79 [ 214.592715] RSP: 002b:00007fbfd4b96c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 214.600408] RAX: ffffffffffffffda RBX: 00007fbfd4b976d4 RCX: 0000000000454e79 [ 214.607659] RDX: 0000000020000100 RSI: 0000000020000180 RDI: 0000000020000100 [ 214.614909] RBP: 000000000072bea0 R08: 0000000020000040 R09: 0000000000000000 [ 214.622160] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 214.629411] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000004 [ 214.836541] devpts: called with bogus options [ 214.837585] FAULT_INJECTION: forcing a failure. [ 214.837585] name failslab, interval 1, probability 0, space 0, times 0 [ 214.847774] FAULT_INJECTION: forcing a failure. [ 214.847774] name failslab, interval 1, probability 0, space 0, times 0 [ 214.852359] CPU: 1 PID: 15716 Comm: syz-executor1 Not tainted 4.16.0-rc6+ #43 [ 214.852367] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 214.852372] Call Trace: [ 214.852388] dump_stack+0x194/0x24d [ 214.852403] ? arch_local_irq_restore+0x53/0x53 [ 214.890959] should_fail+0x8c0/0xa40 [ 214.894658] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 214.899750] ? path_lookupat+0x238/0xba0 [ 214.903802] ? find_held_lock+0x35/0x1d0 [ 214.907862] ? check_same_owner+0x320/0x320 [ 214.912167] ? filename_parentat+0x550/0x550 [ 214.916563] ? rcu_note_context_switch+0x710/0x710 [ 214.921471] ? strncpy_from_user+0x323/0x430 [ 214.925867] should_failslab+0xec/0x120 [ 214.929825] kmem_cache_alloc+0x47/0x760 [ 214.933868] ? cap_capable+0x1b5/0x230 [ 214.937746] getname_kernel+0x54/0x340 [ 214.941618] kern_path+0x1e/0x40 [ 214.944967] do_mount+0xc79/0x2bb0 [ 214.948505] ? copy_mount_string+0x40/0x40 [ 214.952723] ? rcu_pm_notify+0xc0/0xc0 [ 214.956599] ? copy_mount_options+0x5f/0x2e0 [ 214.960989] ? rcu_read_lock_sched_held+0x108/0x120 [ 214.965989] ? kmem_cache_alloc_trace+0x459/0x740 [ 214.970824] ? copy_mount_options+0x1f7/0x2e0 [ 214.975304] SyS_mount+0xab/0x120 [ 214.978744] ? copy_mnt_ns+0xb30/0xb30 [ 214.982617] do_syscall_64+0x281/0x940 [ 214.986490] ? trace_event_raw_event_sys_exit+0x260/0x260 [ 214.992013] ? syscall_return_slowpath+0x550/0x550 [ 214.996927] ? retint_kernel+0x10/0x10 [ 215.000802] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 215.006152] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 215.010985] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 215.016160] RIP: 0033:0x454e79 [ 215.019331] RSP: 002b:00007f50b9ba4c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 215.027027] RAX: ffffffffffffffda RBX: 00007f50b9ba56d4 RCX: 0000000000454e79 [ 215.034282] RDX: 0000000020000780 RSI: 0000000020000ac0 RDI: 0000000020000000 [ 215.041534] RBP: 000000000072bea0 R08: 0000000020000b00 R09: 0000000000000000 [ 215.048786] R10: 0000000000037002 R11: 0000000000000246 R12: 0000000000000015 [ 215.056039] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000005 [ 215.063311] CPU: 0 PID: 15720 Comm: syz-executor4 Not tainted 4.16.0-rc6+ #43 [ 215.070601] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 215.079948] Call Trace: [ 215.082529] dump_stack+0x194/0x24d [ 215.086147] ? arch_local_irq_restore+0x53/0x53 [ 215.090796] ? unwind_dump+0x4d0/0x4d0 [ 215.094663] should_fail+0x8c0/0xa40 [ 215.098364] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 215.103458] ? kernel_text_address+0xd1/0xe0 [ 215.107848] ? __kernel_text_address+0xd/0x40 [ 215.112323] ? unwind_get_return_address+0x61/0xa0 [ 215.117227] ? __save_stack_trace+0x7e/0xd0 [ 215.121531] ? find_held_lock+0x35/0x1d0 [ 215.125576] ? check_same_owner+0x320/0x320 [ 215.129878] ? rcu_note_context_switch+0x710/0x710 [ 215.134799] should_failslab+0xec/0x120 [ 215.138771] kmem_cache_alloc_node_trace+0x5a/0x760 [ 215.143771] ? rcu_note_context_switch+0x710/0x710 [ 215.148695] alloc_vmap_area+0x11c/0x8c0 [ 215.152746] ? __get_vm_area_node+0xae/0x340 [ 215.157139] ? purge_vmap_area_lazy+0x40/0x40 [ 215.161616] ? trace_hardirqs_on+0xd/0x10 [ 215.165749] ? free_uid+0x15d/0x480 [ 215.169370] __get_vm_area_node+0xe8/0x340 [ 215.173590] __vmalloc_node_range+0xa3/0x650 [ 215.177976] ? htab_map_alloc+0x7bc/0x1020 [ 215.182192] ? bpf_map_init_from_attr+0x320/0x320 [ 215.187021] ? htab_map_alloc+0x7bc/0x1020 [ 215.191248] __vmalloc_node_flags_caller+0x50/0x60 [ 215.196161] ? htab_map_alloc+0x7bc/0x1020 [ 215.200372] bpf_map_area_alloc+0x62/0x80 [ 215.204497] htab_map_alloc+0x7bc/0x1020 [ 215.208554] htab_of_map_alloc+0x59/0xd0 [ 215.212599] ? htab_map_alloc+0x1020/0x1020 [ 215.216897] SyS_bpf+0x93b/0x4980 [ 215.220326] ? trace_hardirqs_off+0x10/0x10 [ 215.224622] ? __fdget_pos+0x12b/0x190 [ 215.228492] ? bpf_prog_get+0x20/0x20 [ 215.232270] ? trace_event_raw_event_lock+0x340/0x340 [ 215.237436] ? perf_trace_lock+0x900/0x900 [ 215.241652] ? find_held_lock+0x35/0x1d0 [ 215.245701] ? perf_trace_lock+0xd6/0x900 [ 215.249836] ? trace_event_raw_event_lock+0x340/0x340 [ 215.255009] ? _parse_integer+0x140/0x140 [ 215.259156] ? find_held_lock+0x35/0x1d0 [ 215.263199] ? trace_hardirqs_off+0x10/0x10 [ 215.267500] ? get_pid_task+0x93/0x140 [ 215.271363] ? perf_trace_lock+0xd6/0x900 [ 215.275488] ? find_held_lock+0x35/0x1d0 [ 215.279527] ? __f_unlock_pos+0x19/0x20 [ 215.283477] ? lock_downgrade+0x980/0x980 [ 215.287600] ? get_pid_task+0xbc/0x140 [ 215.291476] ? proc_fail_nth_write+0x9b/0x1d0 [ 215.295959] ? map_files_get_link+0x3a0/0x3a0 [ 215.300440] ? handle_mm_fault+0x35b/0xb10 [ 215.304657] ? find_held_lock+0x35/0x1d0 [ 215.308707] ? __mutex_unlock_slowpath+0xe9/0xac0 [ 215.313532] ? vfs_write+0x374/0x510 [ 215.317240] ? wait_for_completion+0x770/0x770 [ 215.321817] ? __sb_end_write+0xa0/0xd0 [ 215.325771] ? fput+0xd2/0x140 [ 215.328942] ? SyS_write+0x184/0x220 [ 215.332637] ? do_syscall_64+0xb7/0x940 [ 215.336600] ? bpf_prog_get+0x20/0x20 [ 215.340384] do_syscall_64+0x281/0x940 [ 215.344254] ? vmalloc_sync_all+0x30/0x30 [ 215.348386] ? _raw_spin_unlock_irq+0x27/0x70 [ 215.352859] ? finish_task_switch+0x1c1/0x7e0 [ 215.357339] ? syscall_return_slowpath+0x550/0x550 [ 215.362255] ? syscall_return_slowpath+0x2ac/0x550 [ 215.367605] ? prepare_exit_to_usermode+0x350/0x350 [ 215.372612] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 215.377957] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 215.382782] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 215.387949] RIP: 0033:0x454e79 [ 215.391112] RSP: 002b:00007f0d1e01cc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 215.398795] RAX: ffffffffffffffda RBX: 00007f0d1e01d6d4 RCX: 0000000000454e79 [ 215.406046] RDX: 000000000000002c RSI: 0000000020011000 RDI: 0000000000000000 [ 215.413299] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 215.420554] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 215.427812] R13: 000000000000003c R14: 00000000006f2640 R15: 0000000000000003 [ 215.442647] devpts: called with bogus options [ 215.516826] devpts: called with bogus options 2018/03/31 08:25:58 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000348f88)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r2}, 0x10) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='\x00') 2018/03/31 08:25:58 executing program 3 (fault-call:10 fault-nth:5): r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000348f88)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r2}, 0x10) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) mount(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f00000002c0)='devpts\x00', 0x800000, &(0x7f0000000300)) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') 2018/03/31 08:25:58 executing program 7: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x80000000000, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000001fc0)) sendmsg(0xffffffffffffffff, &(0x7f00000024c0)={&(0x7f0000002040)=@un=@file={0x0, './file0\x00'}, 0x80, &(0x7f0000001f40)=[{&(0x7f00000020c0)="73c7575b94a72990e177f86ed4835a72a65c1a6c6831eeb0c48163a47ab63bcb605c8450cc4798ff6521c2aa722d1a7105c8a07e6c", 0x35}], 0x1, &(0x7f0000002500)=ANY=[], 0x0, 0x40000}, 0x20000000) r2 = gettid() r3 = perf_event_open(&(0x7f0000001ac0)={0x1, 0x70, 0xffffffff, 0x835, 0x9, 0xffffffffffffff5f, 0x0, 0x1000, 0x42000, 0x3, 0x8, 0x80, 0x1, 0x4, 0x100000001, 0x9, 0xff, 0x8, 0x1000, 0x7, 0x7f, 0x200, 0xb715, 0x3, 0x7fffffff, 0xf0a, 0x40, 0x8000, 0x8, 0x7, 0xffffffffffffff74, 0x4, 0x6, 0x100, 0x7, 0x335, 0x3ff, 0x58, 0x0, 0x4, 0x0, @perf_bp={&(0x7f0000001a80), 0xe}, 0x0, 0x80000000, 0x82, 0x7, 0x5, 0x3, 0x80000001}, r2, 0xd, r1, 0x8) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000200)='mqueue\x00', 0x0, &(0x7f000000a000)) r4 = getpid() r5 = bpf$PROG_LOAD(0x5, &(0x7f0000002500)={0xf, 0x7, &(0x7f0000001940)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, [@ldst={0x3, 0x3, 0x3, 0x4, 0x3, 0x2, 0xffffffffffffffff}, @exit={0x95}], {0x95}}, &(0x7f0000001980)='GPL\x00', 0xff, 0x1000, &(0x7f00000039c0)=""/4096, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000019c0)={&(0x7f0000000180)='./file0\x00', r5}, 0x10) perf_event_open(&(0x7f0000001a00)={0x0, 0x70, 0x0, 0x8, 0x0, 0x3, 0x0, 0xb8, 0x1000, 0x0, 0x3, 0x4, 0xfff, 0x4, 0x4dae, 0x40, 0x100000001, 0x6, 0x4, 0x0, 0x3, 0x753c, 0x6, 0x100, 0x1de, 0x6, 0x4, 0x1, 0x6, 0x4, 0x7, 0x3, 0x7fff, 0x80000000, 0x3, 0x8, 0x81, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x7, 0x4}, 0x801, 0x400, 0x1, 0x4, 0x1, 0x9, 0x80000001}, r4, 0x7, r1, 0xb) r6 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000004000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000001c00)='./file0\x00', &(0x7f0000001c40)='./file0\x00', &(0x7f0000001c80)='devpts\x00', 0x40, &(0x7f0000001cc0)="be623dfd58807ac0b2f86f052863a5f30adc0bce173ebcf648cefd7d64732aeb5b94e6af3ab33e53669ba6d304d067dad4b1ff3ed87f18fd170aac904e8f105e80e22881717c98752a9cd7cfb06d102877e3b36b2624d22427331755a9514b225d25999ed605ffe4188630db2e7ddcc57f6316b60c4f3845d9dfcbbde5e49af627b48d7c9bd743b536de31a9ba3010cb6714c9b90a50537be55ca12a18e6541bff5a82d293e7734ea9c90707899663bd96b3bcce5887bf0bd35963c5adc39ddcb6f2a0a02b01661242046cb54ef1aec5a486b69e006305064124867bf79f4dc11798e214b61575168b79887122e0a3461f703c077f902c0a") socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r7, &(0x7f0000001800)={&(0x7f0000000240)=@alg, 0x80, &(0x7f0000000740)=[{&(0x7f00000002c0)=""/83, 0x53}, {&(0x7f0000000340)=""/27, 0x1b}, {&(0x7f0000000380)}, {&(0x7f00000003c0)=""/40, 0x28}, {&(0x7f0000000400)=""/144, 0x90}, {&(0x7f00000004c0)=""/200, 0xc8}, {&(0x7f00000005c0)=""/60, 0x3c}, {&(0x7f0000000600)=""/105, 0x69}, {&(0x7f0000000680)=""/127, 0x7f}, {&(0x7f0000000700)=""/8, 0x8}], 0xa, &(0x7f0000000800)=""/4096, 0x1000}, 0x10000) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000002340)=0xf60) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000003900)={&(0x7f0000003400)=@can={0x0, 0x0}, 0x80, &(0x7f0000003840)=[{&(0x7f0000003480)=""/194, 0xc2}, {&(0x7f0000003580)=""/250, 0xfa}, {&(0x7f0000003680)=""/100, 0x64}, {&(0x7f0000003700)=""/14, 0xe}, {&(0x7f0000003740)=""/159, 0x9f}, {&(0x7f0000003800)=""/15, 0xf}], 0x6, &(0x7f00000038c0)=""/29, 0x1d, 0x5}, 0x3) bpf$PROG_LOAD(0x5, &(0x7f0000003940)={0x4, 0x9, &(0x7f0000001840)=ANY=[@ANYBLOB="18000000030000000000000003000000dfd00c00fcffffff0000000000000000000803000101000000810000000000000001f0fff0ffffff000000000000000095000000000017d2"], &(0x7f0000000380)='GPL\x00', 0xf172, 0x4b, &(0x7f00000018c0)=""/75, 0x41f00, 0x1, [], r8}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000000c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001f00)={0xffffffffffffffff, 0x0, 0xf6, 0x22, &(0x7f0000001dc0)="9ef9482ea02fd36d0a768986a7ebe7a627dc88937e7073e3521858dfa0d5e02f571a01cfdfa76e048e5f956ea5da60b90e02a6c3d3687ed61ec9ab5b682c02498bddef38de9ce8c753e41e78f414d16202a033b6c7752711a5f56924e7846d6dcde2f71026e1eb0319b5e60f6b1ec67fca31c3cf1691d3af91a19f56be5a10ff337a53ba13dd3d75e1555211954b92ec0082d02b7b4cdddc021cbe84e4af8f20788977e3416918843e6c92b2ebf7b8b33ecbd4c7c9a9d5036c3e3e538748a32f1a28eb77818ca1878ffdd445dcdb8a40e6221e0fc474428449dfe93c62bbc69996aa9b34488c1da4f6f7c2275305a6a4fb256c1a516d", &(0x7f0000001ec0)=""/34, 0x1f, 0x1}, 0x28) close(r6) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x3441, &(0x7f0000000080)) mount(&(0x7f00000021c0)='./file0/file0\x00', &(0x7f0000002200)='./file0/file0\x00', &(0x7f0000002240)='fuse\x00', 0x2000000, &(0x7f0000002280)="9b3923bfddc346e9fa2aeaffae6ca386d8d50ba83ab72218340d3c30c045a89ac016797652ba04f1a203cfceccb458dbfd9fd03c4a80ef9a40dc7a4f24b6619d04a58186466fd8465757d9ee053c082cdfa957e7efab6191761847cca59c017493ef5e3d22432cf0b4ebef") ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f00000023c0)=ANY=[@ANYBLOB="07000000000000000000000000000000000000000000000000000000000000000000000067eb0ecf1cfa4ffd89aa7e339417beb7d332a5c996e59875644dd1e3a690110400bc751bb0435977d90fcbb2b83c27812d818991d125e9c0f199be2bc7f01aa0a5cb9b9f99438aa0f1ae3d50201f7bb276536f567f03f062994da292b6db0000000000000000000000000000a93536f303000000000000002a27f6ae1258ebb5079c1bab4f1f6f11ee8ce2e590855a3af38e4bb871ef8400000000000000000000"]) mount(&(0x7f0000001b40)='./file0\x00', &(0x7f0000001b80)='./file0/file0\x00', &(0x7f0000002100)='vfat\x00', 0x0, &(0x7f0000002140)="98980e21ac8b46c0b7bedeee39e6bd9ae4088d6ab47dc9dc76a39e299ce3783aa33e482e450484961fd3e3c5b178fafbe54440e19512ea4298652ed129d4241d9d116d8a5c2b931d350f0c989f8a288fc9e56c") mount(&(0x7f0000df7000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='hugetlbfs\x00', 0x200, &(0x7f00000001c0)) mkdir(&(0x7f00000004c0)='./file0/file0\x00', 0x0) socketpair$inet(0x2, 0x0, 0x1f, &(0x7f0000000080)) 2018/03/31 08:25:58 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) socketpair(0x0, 0x4, 0x6, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000080)={0x0, r0, 0x1, 0x2}, 0x14) socketpair(0xf, 0x3, 0x2, &(0x7f0000000040)) 2018/03/31 08:25:58 executing program 1 (fault-call:8 fault-nth:6): perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={0xffffffffffffffff, &(0x7f0000000700), &(0x7f00000009c0)=""/161}, 0x18) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)) 2018/03/31 08:25:58 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000000003042df8700"]) r1 = perf_event_open(&(0x7f0000348f88)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1000) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r2}, 0x10) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) mount(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f00000002c0)='devpts\x00', 0x800000, &(0x7f0000000300)="7b18f1563c67659c49445440cbb57f32c0f4710f0219046399f3e8a25c5d4975e2b42f404b14937bd42d9874bdd132eef77f584d5151c9a97470a0d77a0c24a85e319673350e16b039bf474ec320") socketpair(0x3, 0x800, 0x81, &(0x7f00000003c0)) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') 2018/03/31 08:25:58 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) socketpair(0x0, 0x4, 0x6, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) socketpair(0xf, 0x3, 0x2, &(0x7f0000000040)) 2018/03/31 08:25:58 executing program 4 (fault-call:1 fault-nth:4): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x0, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r4 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f00000009c0)="3949bcf20271c219f64b9e3fbd45bfae692375440912d5a576c2d82299018de50363f2cf30a439b45c2738869283b7900c1e030013700557a768d5cc05cb9ed624684f4dfdae73a8148b29b2978222576dabbcb3556bcf35a8f66fa68ceb0b834ec5120ac749dc0cc5aab7b0197711785349b1673ff5159bc1a40df6c779950e0747a25ce77a10f68b663a87fc993224a79b583eac02a2171f076ff3", 0x1000, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) [ 215.674545] FAULT_INJECTION: forcing a failure. [ 215.674545] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 215.686379] CPU: 0 PID: 15735 Comm: syz-executor3 Not tainted 4.16.0-rc6+ #43 [ 215.693648] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 215.702989] Call Trace: [ 215.705559] dump_stack+0x194/0x24d [ 215.709165] ? arch_local_irq_restore+0x53/0x53 [ 215.713819] should_fail+0x8c0/0xa40 [ 215.717518] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 215.722610] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 215.727781] ? trace_event_raw_event_lock+0x340/0x340 [ 215.732957] ? perf_trace_lock+0x900/0x900 [ 215.737173] ? print_irqtrace_events+0x270/0x270 [ 215.741923] ? trace_hardirqs_off+0x10/0x10 [ 215.746224] ? lock_acquire+0x1d5/0x580 [ 215.750176] ? perf_trace_lock+0xd6/0x900 [ 215.754298] ? perf_trace_lock_acquire+0xe3/0x980 [ 215.759119] ? trace_event_raw_event_lock+0x340/0x340 [ 215.764284] ? perf_trace_lock+0x900/0x900 [ 215.768499] ? should_fail+0x23b/0xa40 [ 215.772368] __alloc_pages_nodemask+0x327/0xdd0 [ 215.777022] ? lock_release+0xa40/0xa40 [ 215.780981] ? __alloc_pages_slowpath+0x2d10/0x2d10 [ 215.785981] ? find_held_lock+0x35/0x1d0 [ 215.790046] ? check_same_owner+0x320/0x320 [ 215.794354] cache_grow_begin+0x72/0x640 [ 215.798400] kmem_cache_alloc+0x400/0x760 [ 215.802528] getname_flags+0xcb/0x580 [ 215.806318] user_path_at_empty+0x2d/0x50 [ 215.810447] do_mount+0x15f/0x2bb0 [ 215.813967] ? copy_mount_string+0x40/0x40 [ 215.818187] ? rcu_pm_notify+0xc0/0xc0 [ 215.822071] ? copy_mount_options+0x5f/0x2e0 [ 215.826471] ? rcu_read_lock_sched_held+0x108/0x120 [ 215.831472] ? kmem_cache_alloc_trace+0x459/0x740 [ 215.836292] ? kasan_check_write+0x14/0x20 [ 215.840508] ? copy_mount_options+0x1f7/0x2e0 [ 215.844981] SyS_mount+0xab/0x120 [ 215.848411] ? copy_mnt_ns+0xb30/0xb30 [ 215.852281] do_syscall_64+0x281/0x940 [ 215.856151] ? vmalloc_sync_all+0x30/0x30 [ 215.860280] ? _raw_spin_unlock_irq+0x27/0x70 [ 215.864758] ? finish_task_switch+0x1c1/0x7e0 [ 215.869240] ? syscall_return_slowpath+0x550/0x550 [ 215.874145] ? syscall_return_slowpath+0x2ac/0x550 [ 215.879056] ? prepare_exit_to_usermode+0x350/0x350 [ 215.884049] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 215.889403] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 215.894226] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 215.899389] RIP: 0033:0x454e79 [ 215.902554] RSP: 002b:00007fbfd4b96c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 215.910246] RAX: ffffffffffffffda RBX: 00007fbfd4b976d4 RCX: 0000000000454e79 [ 215.917491] RDX: 0000000020000100 RSI: 0000000020000180 RDI: 0000000020000100 2018/03/31 08:25:58 executing program 3 (fault-call:10 fault-nth:6): r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000348f88)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r2}, 0x10) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) mount(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f00000002c0)='devpts\x00', 0x800000, &(0x7f0000000300)) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') [ 215.924735] RBP: 000000000072bea0 R08: 0000000020000040 R09: 0000000000000000 [ 215.931981] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 215.939234] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000005 2018/03/31 08:25:58 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000348f88)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r2}, 0x10) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='\x00') [ 216.026461] devpts: called with bogus options [ 216.063984] FAULT_INJECTION: forcing a failure. [ 216.063984] name failslab, interval 1, probability 0, space 0, times 0 [ 216.075264] CPU: 1 PID: 15743 Comm: syz-executor1 Not tainted 4.16.0-rc6+ #43 [ 216.078293] hugetlbfs: Bad mount option: "" [ 216.082532] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 216.082539] Call Trace: [ 216.082557] dump_stack+0x194/0x24d [ 216.082572] ? arch_local_irq_restore+0x53/0x53 [ 216.082594] should_fail+0x8c0/0xa40 [ 216.082608] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 216.082625] ? path_lookupat+0x238/0xba0 [ 216.082648] ? find_held_lock+0x35/0x1d0 [ 216.124168] ? check_same_owner+0x320/0x320 [ 216.127412] devpts: called with bogus options [ 216.128501] ? filename_parentat+0x550/0x550 [ 216.128518] ? rcu_note_context_switch+0x710/0x710 [ 216.128530] ? strncpy_from_user+0x323/0x430 [ 216.128547] should_failslab+0xec/0x120 [ 216.128559] kmem_cache_alloc+0x47/0x760 [ 216.128567] ? cap_capable+0x1b5/0x230 [ 216.128583] getname_kernel+0x54/0x340 [ 216.140843] FAULT_INJECTION: forcing a failure. [ 216.140843] name failslab, interval 1, probability 0, space 0, times 0 [ 216.142381] kern_path+0x1e/0x40 [ 216.142395] do_mount+0xc79/0x2bb0 [ 216.142412] ? copy_mount_string+0x40/0x40 [ 216.142422] ? rcu_pm_notify+0xc0/0xc0 [ 216.142439] ? copy_mount_options+0x5f/0x2e0 [ 216.193019] ? rcu_read_lock_sched_held+0x108/0x120 [ 216.198026] ? kmem_cache_alloc_trace+0x459/0x740 [ 216.202856] ? kasan_check_write+0x14/0x20 [ 216.207079] ? copy_mount_options+0x1f7/0x2e0 [ 216.211560] SyS_mount+0xab/0x120 [ 216.214998] ? copy_mnt_ns+0xb30/0xb30 [ 216.218874] do_syscall_64+0x281/0x940 [ 216.222753] ? vmalloc_sync_all+0x30/0x30 [ 216.226889] ? _raw_spin_unlock_irq+0x27/0x70 [ 216.231371] ? finish_task_switch+0x1c1/0x7e0 [ 216.235850] ? syscall_return_slowpath+0x550/0x550 [ 216.240769] ? syscall_return_slowpath+0x2ac/0x550 [ 216.245689] ? prepare_exit_to_usermode+0x350/0x350 [ 216.250689] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 216.256040] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 216.260871] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 216.266043] RIP: 0033:0x454e79 [ 216.269216] RSP: 002b:00007f50b9ba4c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 216.276912] RAX: ffffffffffffffda RBX: 00007f50b9ba56d4 RCX: 0000000000454e79 [ 216.284186] RDX: 0000000020000780 RSI: 0000000020000ac0 RDI: 0000000020000000 [ 216.291438] RBP: 000000000072bea0 R08: 0000000020000b00 R09: 0000000000000000 [ 216.298691] R10: 0000000000037002 R11: 0000000000000246 R12: 0000000000000015 [ 216.305956] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000006 [ 216.313229] CPU: 0 PID: 15748 Comm: syz-executor4 Not tainted 4.16.0-rc6+ #43 [ 216.320502] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 216.329842] Call Trace: [ 216.332410] dump_stack+0x194/0x24d [ 216.336024] ? arch_local_irq_restore+0x53/0x53 [ 216.340686] should_fail+0x8c0/0xa40 [ 216.344377] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 216.349456] ? perf_trace_lock+0x900/0x900 [ 216.353675] ? find_held_lock+0x35/0x1d0 [ 216.357723] ? trace_hardirqs_off+0x10/0x10 [ 216.362040] ? alloc_vmap_area+0x59e/0x8c0 [ 216.366261] ? find_held_lock+0x35/0x1d0 [ 216.370309] ? check_same_owner+0x320/0x320 [ 216.374610] ? rcu_note_context_switch+0x710/0x710 [ 216.379513] ? lock_release+0xa40/0xa40 [ 216.383466] should_failslab+0xec/0x120 [ 216.387423] kmem_cache_alloc_node_trace+0x5a/0x760 [ 216.392414] ? free_uid+0x15d/0x480 [ 216.396034] __kmalloc_node+0x33/0x70 [ 216.399823] __vmalloc_node_range+0x1a1/0x650 [ 216.404302] ? bpf_map_init_from_attr+0x320/0x320 [ 216.409121] ? htab_map_alloc+0x7bc/0x1020 [ 216.413332] __vmalloc_node_flags_caller+0x50/0x60 [ 216.418240] ? htab_map_alloc+0x7bc/0x1020 [ 216.422452] bpf_map_area_alloc+0x62/0x80 [ 216.426576] htab_map_alloc+0x7bc/0x1020 [ 216.430635] htab_of_map_alloc+0x59/0xd0 [ 216.434695] ? htab_map_alloc+0x1020/0x1020 [ 216.439000] SyS_bpf+0x93b/0x4980 [ 216.442449] ? trace_hardirqs_off+0x10/0x10 [ 216.446758] ? __fdget_pos+0x12b/0x190 [ 216.450624] ? bpf_prog_get+0x20/0x20 [ 216.454402] ? trace_event_raw_event_lock+0x340/0x340 [ 216.459568] ? perf_trace_lock+0x900/0x900 [ 216.463780] ? find_held_lock+0x35/0x1d0 [ 216.467819] ? perf_trace_lock+0xd6/0x900 [ 216.471946] ? trace_event_raw_event_lock+0x340/0x340 [ 216.477122] ? _parse_integer+0x140/0x140 [ 216.481265] ? find_held_lock+0x35/0x1d0 [ 216.485319] ? trace_hardirqs_off+0x10/0x10 [ 216.489641] ? get_pid_task+0x93/0x140 [ 216.493524] ? perf_trace_lock+0xd6/0x900 [ 216.497691] ? find_held_lock+0x35/0x1d0 [ 216.501744] ? __f_unlock_pos+0x19/0x20 [ 216.505706] ? lock_downgrade+0x980/0x980 [ 216.509831] ? get_pid_task+0xbc/0x140 [ 216.513700] ? proc_fail_nth_write+0x9b/0x1d0 [ 216.518182] ? map_files_get_link+0x3a0/0x3a0 [ 216.522678] ? handle_mm_fault+0x35b/0xb10 [ 216.526911] ? find_held_lock+0x35/0x1d0 [ 216.530969] ? __mutex_unlock_slowpath+0xe9/0xac0 [ 216.535805] ? vfs_write+0x374/0x510 [ 216.539513] ? wait_for_completion+0x770/0x770 [ 216.544114] ? __sb_end_write+0xa0/0xd0 [ 216.548090] ? fput+0xd2/0x140 [ 216.551278] ? SyS_write+0x184/0x220 [ 216.554983] ? do_syscall_64+0xb7/0x940 [ 216.558943] ? bpf_prog_get+0x20/0x20 [ 216.562727] do_syscall_64+0x281/0x940 [ 216.566591] ? vmalloc_sync_all+0x30/0x30 [ 216.570721] ? _raw_spin_unlock_irq+0x27/0x70 [ 216.575197] ? finish_task_switch+0x1c1/0x7e0 [ 216.579676] ? syscall_return_slowpath+0x550/0x550 [ 216.584585] ? syscall_return_slowpath+0x2ac/0x550 [ 216.589495] ? prepare_exit_to_usermode+0x350/0x350 [ 216.594490] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 216.599837] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 216.604667] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 216.609835] RIP: 0033:0x454e79 2018/03/31 08:25:59 executing program 7: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x80000000000, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000001fc0)) sendmsg(0xffffffffffffffff, &(0x7f00000024c0)={&(0x7f0000002040)=@un=@file={0x0, './file0\x00'}, 0x80, &(0x7f0000001f40)=[{&(0x7f00000020c0)="73c7575b94a72990e177f86ed4835a72a65c1a6c6831eeb0c48163a47ab63bcb605c8450cc4798ff6521c2aa722d1a7105c8a07e6c", 0x35}], 0x1, &(0x7f0000002500)=ANY=[], 0x0, 0x40000}, 0x20000000) r2 = gettid() r3 = perf_event_open(&(0x7f0000001ac0)={0x1, 0x70, 0xffffffff, 0x835, 0x9, 0xffffffffffffff5f, 0x0, 0x1000, 0x42000, 0x3, 0x8, 0x80, 0x1, 0x4, 0x100000001, 0x9, 0xff, 0x8, 0x1000, 0x7, 0x7f, 0x200, 0xb715, 0x3, 0x7fffffff, 0xf0a, 0x40, 0x8000, 0x8, 0x7, 0xffffffffffffff74, 0x4, 0x6, 0x100, 0x7, 0x335, 0x3ff, 0x58, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000001a80)}, 0x0, 0x80000000, 0x82, 0x7, 0x5, 0x3, 0x80000001}, r2, 0xd, r1, 0x8) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000200)='mqueue\x00', 0x0, &(0x7f000000a000)) r4 = getpid() r5 = bpf$PROG_LOAD(0x5, &(0x7f0000002500)={0xf, 0x7, &(0x7f0000001940)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, [@ldst={0x3, 0x3, 0x3, 0x4, 0x3, 0x2, 0xffffffffffffffff}, @exit={0x95}], {0x95}}, &(0x7f0000001980)='GPL\x00', 0xff, 0x1000, &(0x7f00000039c0)=""/4096, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000019c0)={&(0x7f0000000180)='./file0\x00', r5}, 0x10) perf_event_open(&(0x7f0000001a00)={0x0, 0x70, 0x0, 0x8, 0x0, 0x3, 0x0, 0xb8, 0x1000, 0x0, 0x3, 0x4, 0xfff, 0x4, 0x4dae, 0x40, 0x100000001, 0x6, 0x4, 0x0, 0x3, 0x753c, 0x6, 0x100, 0x1de, 0x6, 0x4, 0x1, 0x6, 0x4, 0x7, 0x3, 0x7fff, 0x80000000, 0x3, 0x8, 0x81, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x7, 0x4}, 0x801, 0x400, 0x1, 0x4, 0x1, 0x9, 0x80000001}, r4, 0x7, r1, 0xb) r6 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000004000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000001c00)='./file0\x00', &(0x7f0000001c40)='./file0\x00', &(0x7f0000001c80)='devpts\x00', 0x40, &(0x7f0000001cc0)="be623dfd58807ac0b2f86f052863a5f30adc0bce173ebcf648cefd7d64732aeb5b94e6af3ab33e53669ba6d304d067dad4b1ff3ed87f18fd170aac904e8f105e80e22881717c98752a9cd7cfb06d102877e3b36b2624d22427331755a9514b225d25999ed605ffe4188630db2e7ddcc57f6316b60c4f3845d9dfcbbde5e49af627b48d7c9bd743b536de31a9ba3010cb6714c9b90a50537be55ca12a18e6541bff5a82d293e7734ea9c90707899663bd96b3bcce5887bf0bd35963c5adc39ddcb6f2a0a02b01661242046cb54ef1aec5a486b69e006305064124867bf79f4dc11798e214b61575168b79887122e0a3461f703c077f902c0a") socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r7, &(0x7f0000001800)={&(0x7f0000000240)=@alg, 0x80, &(0x7f0000000740)=[{&(0x7f00000002c0)=""/83, 0x53}, {&(0x7f0000000340)=""/27, 0x1b}, {&(0x7f0000000380)}, {&(0x7f00000003c0)=""/40, 0x28}, {&(0x7f0000000400)=""/144, 0x90}, {&(0x7f00000004c0)=""/200, 0xc8}, {&(0x7f00000005c0)=""/60, 0x3c}, {&(0x7f0000000600)=""/105, 0x69}, {&(0x7f0000000680)=""/127, 0x7f}, {&(0x7f0000000700)=""/8, 0x8}], 0xa, &(0x7f0000000800)=""/4096, 0x1000}, 0x10000) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000002340)=0xf60) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000003900)={&(0x7f0000003400)=@can={0x0, 0x0}, 0x80, &(0x7f0000003840)=[{&(0x7f0000003480)=""/194, 0xc2}, {&(0x7f0000003580)=""/250, 0xfa}, {&(0x7f0000003680)=""/100, 0x64}, {&(0x7f0000003700)=""/14, 0xe}, {&(0x7f0000003740)=""/159, 0x9f}, {&(0x7f0000003800)=""/15, 0xf}], 0x6, &(0x7f00000038c0)=""/29, 0x1d, 0x5}, 0x3) bpf$PROG_LOAD(0x5, &(0x7f0000003940)={0x4, 0x9, &(0x7f0000001840)=ANY=[@ANYBLOB="18000000030000000000000003000000dfd00c00fcffffff0000000000000000000803000101000000810000000000000001f0fff0ffffff000000000000000095000000000017d2"], &(0x7f0000000380)='GPL\x00', 0xf172, 0x4b, &(0x7f00000018c0)=""/75, 0x41f00, 0x1, [], r8}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000000c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001f00)={0xffffffffffffffff, 0x0, 0xf6, 0x22, &(0x7f0000001dc0)="9ef9482ea02fd36d0a768986a7ebe7a627dc88937e7073e3521858dfa0d5e02f571a01cfdfa76e048e5f956ea5da60b90e02a6c3d3687ed61ec9ab5b682c02498bddef38de9ce8c753e41e78f414d16202a033b6c7752711a5f56924e7846d6dcde2f71026e1eb0319b5e60f6b1ec67fca31c3cf1691d3af91a19f56be5a10ff337a53ba13dd3d75e1555211954b92ec0082d02b7b4cdddc021cbe84e4af8f20788977e3416918843e6c92b2ebf7b8b33ecbd4c7c9a9d5036c3e3e538748a32f1a28eb77818ca1878ffdd445dcdb8a40e6221e0fc474428449dfe93c62bbc69996aa9b34488c1da4f6f7c2275305a6a4fb256c1a516d", &(0x7f0000001ec0)=""/34, 0x1f, 0x1}, 0x28) close(r6) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x3441, &(0x7f0000000080)) mount(&(0x7f00000021c0)='./file0/file0\x00', &(0x7f0000002200)='./file0/file0\x00', &(0x7f0000002240)='fuse\x00', 0x2000000, &(0x7f0000002280)="9b3923bfddc346e9fa2aeaffae6ca386d8d50ba83ab72218340d3c30c045a89ac016797652ba04f1a203cfceccb458dbfd9fd03c4a80ef9a40dc7a4f24b6619d04a58186466fd8465757d9ee053c082cdfa957e7efab6191761847cca59c017493ef5e3d22432cf0b4ebef") ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f00000023c0)=ANY=[@ANYBLOB="07000000000000000000000000000000000000000000000000000000000000000000000067eb0ecf1cfa4ffd89aa7e339417beb7d332a5c996e59875644dd1e3a690110400bc751bb0435977d90fcbb2b83c27812d818991d125e9c0f199be2bc7f01aa0a5cb9b9f99438aa0f1ae3d50201f7bb276536f567f03f062994da292b6db0000000000000000000000000000a93536f303000000000000002a27f6ae1258ebb5079c1bab4f1f6f11ee8ce2e590855a3af38e4bb871ef8400000000000000000000"]) mount(&(0x7f0000001b40)='./file0\x00', &(0x7f0000001b80)='./file0/file0\x00', &(0x7f0000002100)='vfat\x00', 0x0, &(0x7f0000002140)="98980e21ac8b46c0b7bedeee39e6bd9ae4088d6ab47dc9dc76a39e299ce3783aa33e482e450484961fd3e3c5b178fafbe54440e19512ea4298652ed129d4241d9d116d8a5c2b931d350f0c989f8a288fc9e56c") mount(&(0x7f0000df7000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='hugetlbfs\x00', 0x200, &(0x7f00000001c0)) mkdir(&(0x7f00000004c0)='./file0/file0\x00', 0x0) socketpair$inet(0x2, 0x0, 0x1f, &(0x7f0000000080)) 2018/03/31 08:25:59 executing program 1 (fault-call:8 fault-nth:7): perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={0xffffffffffffffff, &(0x7f0000000700), &(0x7f00000009c0)=""/161}, 0x18) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)) [ 216.613004] RSP: 002b:00007f0d1e01cc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 216.620702] RAX: ffffffffffffffda RBX: 00007f0d1e01d6d4 RCX: 0000000000454e79 [ 216.627963] RDX: 000000000000002c RSI: 0000000020011000 RDI: 0000000000000000 [ 216.635218] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 216.642468] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 216.649719] R13: 000000000000003c R14: 00000000006f2640 R15: 0000000000000004 2018/03/31 08:25:59 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000000003042df8700"]) r1 = perf_event_open(&(0x7f0000348f88)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1000) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r2}, 0x10) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) mount(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f00000002c0)='devpts\x00', 0x800000, &(0x7f0000000300)="7b18f1563c67659c49445440cbb57f32c0f4710f0219046399f3e8a25c5d4975e2b42f404b14937bd42d9874bdd132eef77f584d5151c9a97470a0d77a0c24a85e319673350e16b039bf474ec320") socketpair(0x3, 0x800, 0x81, &(0x7f00000003c0)) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') 2018/03/31 08:25:59 executing program 4 (fault-call:1 fault-nth:5): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x0, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r4 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f00000009c0)="3949bcf20271c219f64b9e3fbd45bfae692375440912d5a576c2d82299018de50363f2cf30a439b45c2738869283b7900c1e030013700557a768d5cc05cb9ed624684f4dfdae73a8148b29b2978222576dabbcb3556bcf35a8f66fa68ceb0b834ec5120ac749dc0cc5aab7b0197711785349b1673ff5159bc1a40df6c779950e0747a25ce77a10f68b663a87fc993224a79b583eac02a2171f076ff3", 0x1000, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) 2018/03/31 08:25:59 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) socketpair(0x0, 0x4, 0x6, &(0x7f0000000180)) socketpair(0xf, 0x3, 0x2, &(0x7f0000000040)) [ 216.850073] FAULT_INJECTION: forcing a failure. [ 216.850073] name failslab, interval 1, probability 0, space 0, times 0 [ 216.861425] CPU: 0 PID: 15763 Comm: syz-executor3 Not tainted 4.16.0-rc6+ #43 [ 216.868686] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 216.878021] Call Trace: [ 216.880600] dump_stack+0x194/0x24d [ 216.884211] ? arch_local_irq_restore+0x53/0x53 [ 216.888859] ? __unwind_start+0x169/0x330 [ 216.892983] ? __kernel_text_address+0xd/0x40 [ 216.897464] should_fail+0x8c0/0xa40 [ 216.901163] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 216.906260] ? save_stack+0xa3/0xd0 [ 216.909862] ? save_stack+0x43/0xd0 [ 216.913464] ? kasan_kmalloc+0xad/0xe0 [ 216.917333] ? kasan_slab_alloc+0x12/0x20 [ 216.921462] ? kmem_cache_alloc+0x12e/0x760 [ 216.925756] ? alloc_vfsmnt+0xe0/0x9c0 [ 216.930286] ? vfs_kern_mount.part.26+0x84/0x4a0 [ 216.935103] ? do_mount+0xea4/0x2bb0 [ 216.938793] ? find_held_lock+0x35/0x1d0 [ 216.942846] ? check_same_owner+0x320/0x320 [ 216.947147] ? rcu_note_context_switch+0x710/0x710 [ 216.952059] should_failslab+0xec/0x120 [ 216.956013] __kmalloc_track_caller+0x5f/0x760 [ 216.960579] ? do_raw_spin_trylock+0x190/0x190 [ 216.965139] ? kstrdup_const+0x39/0x50 [ 216.969009] kstrdup+0x39/0x70 [ 216.972189] kstrdup_const+0x39/0x50 [ 216.975895] alloc_vfsmnt+0x1a5/0x9c0 [ 216.979680] ? path_lookupat+0x238/0xba0 [ 216.983714] ? mnt_free_id.isra.21+0x50/0x50 [ 216.988118] ? trace_hardirqs_off+0x10/0x10 [ 216.992422] ? putname+0xee/0x130 [ 216.995853] ? putname+0xee/0x130 [ 216.999286] ? rcu_read_lock_sched_held+0x108/0x120 [ 217.004285] ? find_held_lock+0x35/0x1d0 [ 217.008322] ? __get_fs_type+0x8a/0xc0 [ 217.012186] ? lock_downgrade+0x980/0x980 [ 217.016312] ? module_unload_free+0x5b0/0x5b0 [ 217.020796] ? lock_release+0xa40/0xa40 [ 217.024743] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 217.029735] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 217.034477] vfs_kern_mount.part.26+0x84/0x4a0 [ 217.039041] ? may_umount+0xa0/0xa0 [ 217.042656] ? _raw_read_unlock+0x22/0x30 [ 217.046777] ? __get_fs_type+0x8a/0xc0 [ 217.050650] do_mount+0xea4/0x2bb0 [ 217.054165] ? copy_mount_string+0x40/0x40 [ 217.058382] ? rcu_pm_notify+0xc0/0xc0 [ 217.062247] ? copy_mount_options+0x5f/0x2e0 [ 217.066630] ? rcu_read_lock_sched_held+0x108/0x120 [ 217.071623] ? kmem_cache_alloc_trace+0x459/0x740 [ 217.076441] ? kasan_check_write+0x14/0x20 [ 217.080653] ? _copy_from_user+0x99/0x110 [ 217.084774] ? copy_mount_options+0x1f7/0x2e0 [ 217.089247] SyS_mount+0xab/0x120 [ 217.092673] ? copy_mnt_ns+0xb30/0xb30 [ 217.096535] do_syscall_64+0x281/0x940 [ 217.100395] ? vmalloc_sync_all+0x30/0x30 [ 217.104514] ? _raw_spin_unlock_irq+0x27/0x70 [ 217.108982] ? finish_task_switch+0x1c1/0x7e0 [ 217.113461] ? syscall_return_slowpath+0x550/0x550 [ 217.118368] ? syscall_return_slowpath+0x2ac/0x550 [ 217.123269] ? prepare_exit_to_usermode+0x350/0x350 [ 217.128259] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 217.133602] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 217.138427] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 217.143587] RIP: 0033:0x454e79 2018/03/31 08:26:00 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) socketpair(0x0, 0x4, 0x6, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) socketpair(0xf, 0x3, 0x2, &(0x7f0000000040)) [ 217.146751] RSP: 002b:00007fbfd4b96c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 217.154434] RAX: ffffffffffffffda RBX: 00007fbfd4b976d4 RCX: 0000000000454e79 [ 217.161678] RDX: 0000000020000100 RSI: 0000000020000180 RDI: 0000000020000100 [ 217.168929] RBP: 000000000072bea0 R08: 0000000020000040 R09: 0000000000000000 [ 217.176175] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 217.183417] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000006 [ 217.403485] FAULT_INJECTION: forcing a failure. [ 217.403485] name failslab, interval 1, probability 0, space 0, times 0 [ 217.414919] CPU: 1 PID: 15776 Comm: syz-executor1 Not tainted 4.16.0-rc6+ #43 [ 217.422192] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 217.431543] Call Trace: [ 217.434140] dump_stack+0x194/0x24d [ 217.437777] ? arch_local_irq_restore+0x53/0x53 [ 217.442447] ? print_irqtrace_events+0x270/0x270 [ 217.447211] should_fail+0x8c0/0xa40 [ 217.450926] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 217.456043] ? find_held_lock+0x35/0x1d0 [ 217.460111] ? __lock_is_held+0xb6/0x140 [ 217.464189] ? check_same_owner+0x320/0x320 [ 217.468517] ? rcu_note_context_switch+0x710/0x710 [ 217.473452] should_failslab+0xec/0x120 [ 217.477428] kmem_cache_alloc+0x47/0x760 [ 217.481504] alloc_vfsmnt+0xe0/0x9c0 [ 217.485215] ? trace_hardirqs_off+0x10/0x10 [ 217.489539] ? mnt_free_id.isra.21+0x50/0x50 [ 217.493966] ? perf_trace_lock+0xd6/0x900 [ 217.498106] ? perf_trace_lock_acquire+0xe3/0x980 [ 217.502948] ? trace_event_raw_event_lock+0x340/0x340 [ 217.508145] ? perf_trace_lock+0x900/0x900 [ 217.512375] ? lock_downgrade+0x980/0x980 [ 217.516527] ? trace_hardirqs_off+0x10/0x10 [ 217.520840] ? do_raw_spin_trylock+0x190/0x190 [ 217.525409] ? trace_event_raw_event_lock+0x340/0x340 [ 217.530598] clone_mnt+0x118/0x11d0 [ 217.534227] ? find_held_lock+0x35/0x1d0 [ 217.538455] ? mark_mounts_for_expiry+0x7f0/0x7f0 [ 217.543293] ? is_subdir+0x259/0x430 [ 217.547007] ? lock_downgrade+0x980/0x980 [ 217.551159] ? lock_release+0xa40/0xa40 [ 217.555141] ? is_subdir+0x144/0x430 [ 217.558854] ? is_subdir+0x29b/0x430 [ 217.562572] ? d_move+0x90/0x90 [ 217.565856] ? get_mountpoint+0xc9/0x3c0 [ 217.569914] ? rcu_read_lock_sched_held+0x108/0x120 [ 217.574925] copy_tree+0x379/0xa40 [ 217.578459] ? down_read+0x150/0x150 [ 217.582173] ? to_mnt_ns+0x20/0x20 [ 217.585699] ? lock_mount+0xf4/0x2c0 [ 217.589398] do_mount+0x1fb9/0x2bb0 [ 217.593022] ? copy_mount_string+0x40/0x40 [ 217.597250] ? rcu_pm_notify+0xc0/0xc0 [ 217.601141] ? copy_mount_options+0x5f/0x2e0 [ 217.605540] ? kmem_cache_alloc_trace+0x459/0x740 [ 217.610379] ? kasan_check_write+0x14/0x20 [ 217.614604] ? _copy_from_user+0x99/0x110 [ 217.618746] ? copy_mount_options+0x1f7/0x2e0 [ 217.623243] SyS_mount+0xab/0x120 [ 217.626693] ? copy_mnt_ns+0xb30/0xb30 [ 217.630580] do_syscall_64+0x281/0x940 [ 217.634465] ? vmalloc_sync_all+0x30/0x30 [ 217.638608] ? _raw_spin_unlock_irq+0x27/0x70 [ 217.643090] ? finish_task_switch+0x1c1/0x7e0 [ 217.647577] ? syscall_return_slowpath+0x550/0x550 [ 217.652509] ? syscall_return_slowpath+0x2ac/0x550 [ 217.657442] ? prepare_exit_to_usermode+0x350/0x350 [ 217.662460] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 217.667825] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 217.672672] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 217.677858] RIP: 0033:0x454e79 [ 217.681037] RSP: 002b:00007f50b9ba4c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 217.688747] RAX: ffffffffffffffda RBX: 00007f50b9ba56d4 RCX: 0000000000454e79 [ 217.696006] RDX: 0000000020000780 RSI: 0000000020000ac0 RDI: 0000000020000000 [ 217.703269] RBP: 000000000072bea0 R08: 0000000020000b00 R09: 0000000000000000 [ 217.710530] R10: 0000000000037002 R11: 0000000000000246 R12: 0000000000000015 [ 217.717782] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000007 [ 217.728726] devpts: called with bogus options [ 217.763931] devpts: called with bogus options [ 217.792814] hugetlbfs: Bad mount option: "" 2018/03/31 08:26:00 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000348f88)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r2}, 0x10) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='\x00') 2018/03/31 08:26:00 executing program 3 (fault-call:10 fault-nth:7): r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000348f88)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r2}, 0x10) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) mount(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f00000002c0)='devpts\x00', 0x800000, &(0x7f0000000300)) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') 2018/03/31 08:26:00 executing program 1 (fault-call:8 fault-nth:8): perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={0xffffffffffffffff, &(0x7f0000000700), &(0x7f00000009c0)=""/161}, 0x18) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)) 2018/03/31 08:26:00 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x0, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r4 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f00000009c0)="3949bcf20271c219f64b9e3fbd45bfae692375440912d5a576c2d82299018de50363f2cf30a439b45c2738869283b7900c1e030013700557a768d5cc05cb9ed624684f4dfdae73a8148b29b2978222576dabbcb3556bcf35a8f66fa68ceb0b834ec5120ac749dc0cc5aab7b0197711785349b1673ff5159bc1a40df6c779950e0747a25ce77a10f68b663a87fc993224a79b583eac02a2171f076ff3", 0x1000, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) 2018/03/31 08:26:00 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x80) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) socketpair(0x0, 0x4, 0x6, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000100)={r1, &(0x7f00000000c0)="9ec888c7b18d67989a2b95"}, 0x10) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) socketpair(0xf, 0x3, 0x2, &(0x7f0000000040)) 2018/03/31 08:26:00 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000000003042df8700"]) r1 = perf_event_open(&(0x7f0000348f88)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1000) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r2}, 0x10) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) mount(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f00000002c0)='devpts\x00', 0x800000, &(0x7f0000000300)="7b18f1563c67659c49445440cbb57f32c0f4710f0219046399f3e8a25c5d4975e2b42f404b14937bd42d9874bdd132eef77f584d5151c9a97470a0d77a0c24a85e319673350e16b039bf474ec320") socketpair(0x3, 0x800, 0x81, &(0x7f00000003c0)) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') 2018/03/31 08:26:00 executing program 6: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0x50, &(0x7f0000000080)={0x0, 0x0}}, 0xffffffffffffff86) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)=r0, 0x4) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) socketpair(0x0, 0x4, 0x6, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f00000001c0)) socketpair(0xf, 0x3, 0x2, &(0x7f0000000040)) socketpair$packet(0x11, 0x3, 0x300, &(0x7f0000000140)) 2018/03/31 08:26:00 executing program 7: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x80000000000, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000001fc0)) sendmsg(0xffffffffffffffff, &(0x7f00000024c0)={&(0x7f0000002040)=@un=@file={0x0, './file0\x00'}, 0x80, &(0x7f0000001f40)=[{&(0x7f00000020c0)="73c7575b94a72990e177f86ed4835a72a65c1a6c6831eeb0c48163a47ab63bcb605c8450cc4798ff6521c2aa722d1a7105c8a07e6c", 0x35}], 0x1, &(0x7f0000002500)=ANY=[], 0x0, 0x40000}, 0x20000000) r2 = gettid() r3 = perf_event_open(&(0x7f0000001ac0)={0x1, 0x70, 0xffffffff, 0x835, 0x9, 0xffffffffffffff5f, 0x0, 0x1000, 0x42000, 0x3, 0x8, 0x80, 0x1, 0x4, 0x100000001, 0x9, 0xff, 0x8, 0x1000, 0x7, 0x7f, 0x200, 0xb715, 0x3, 0x7fffffff, 0xf0a, 0x40, 0x8000, 0x8, 0x7, 0xffffffffffffff74, 0x4, 0x6, 0x100, 0x7, 0x335, 0x3ff, 0x58, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000001a80), 0xe}, 0x0, 0x0, 0x82, 0x7, 0x5, 0x3, 0x80000001}, r2, 0xd, r1, 0x8) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000200)='mqueue\x00', 0x0, &(0x7f000000a000)) r4 = getpid() r5 = bpf$PROG_LOAD(0x5, &(0x7f0000002500)={0xf, 0x7, &(0x7f0000001940)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, [@ldst={0x3, 0x3, 0x3, 0x4, 0x3, 0x2, 0xffffffffffffffff}, @exit={0x95}], {0x95}}, &(0x7f0000001980)='GPL\x00', 0xff, 0x1000, &(0x7f00000039c0)=""/4096, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000019c0)={&(0x7f0000000180)='./file0\x00', r5}, 0x10) perf_event_open(&(0x7f0000001a00)={0x0, 0x70, 0x0, 0x8, 0x0, 0x3, 0x0, 0xb8, 0x1000, 0x0, 0x3, 0x4, 0xfff, 0x4, 0x4dae, 0x40, 0x100000001, 0x6, 0x4, 0x0, 0x3, 0x753c, 0x6, 0x100, 0x1de, 0x6, 0x4, 0x1, 0x6, 0x4, 0x7, 0x3, 0x7fff, 0x80000000, 0x3, 0x8, 0x81, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x7, 0x4}, 0x801, 0x400, 0x1, 0x4, 0x1, 0x9, 0x80000001}, r4, 0x7, r1, 0xb) r6 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000004000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000001c00)='./file0\x00', &(0x7f0000001c40)='./file0\x00', &(0x7f0000001c80)='devpts\x00', 0x40, &(0x7f0000001cc0)="be623dfd58807ac0b2f86f052863a5f30adc0bce173ebcf648cefd7d64732aeb5b94e6af3ab33e53669ba6d304d067dad4b1ff3ed87f18fd170aac904e8f105e80e22881717c98752a9cd7cfb06d102877e3b36b2624d22427331755a9514b225d25999ed605ffe4188630db2e7ddcc57f6316b60c4f3845d9dfcbbde5e49af627b48d7c9bd743b536de31a9ba3010cb6714c9b90a50537be55ca12a18e6541bff5a82d293e7734ea9c90707899663bd96b3bcce5887bf0bd35963c5adc39ddcb6f2a0a02b01661242046cb54ef1aec5a486b69e006305064124867bf79f4dc11798e214b61575168b79887122e0a3461f703c077f902c0a") socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r7, &(0x7f0000001800)={&(0x7f0000000240)=@alg, 0x80, &(0x7f0000000740)=[{&(0x7f00000002c0)=""/83, 0x53}, {&(0x7f0000000340)=""/27, 0x1b}, {&(0x7f0000000380)}, {&(0x7f00000003c0)=""/40, 0x28}, {&(0x7f0000000400)=""/144, 0x90}, {&(0x7f00000004c0)=""/200, 0xc8}, {&(0x7f00000005c0)=""/60, 0x3c}, {&(0x7f0000000600)=""/105, 0x69}, {&(0x7f0000000680)=""/127, 0x7f}, {&(0x7f0000000700)=""/8, 0x8}], 0xa, &(0x7f0000000800)=""/4096, 0x1000}, 0x10000) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000002340)=0xf60) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000003900)={&(0x7f0000003400)=@can={0x0, 0x0}, 0x80, &(0x7f0000003840)=[{&(0x7f0000003480)=""/194, 0xc2}, {&(0x7f0000003580)=""/250, 0xfa}, {&(0x7f0000003680)=""/100, 0x64}, {&(0x7f0000003700)=""/14, 0xe}, {&(0x7f0000003740)=""/159, 0x9f}, {&(0x7f0000003800)=""/15, 0xf}], 0x6, &(0x7f00000038c0)=""/29, 0x1d, 0x5}, 0x3) bpf$PROG_LOAD(0x5, &(0x7f0000003940)={0x4, 0x9, &(0x7f0000001840)=ANY=[@ANYBLOB="18000000030000000000000003000000dfd00c00fcffffff0000000000000000000803000101000000810000000000000001f0fff0ffffff000000000000000095000000000017d2"], &(0x7f0000000380)='GPL\x00', 0xf172, 0x4b, &(0x7f00000018c0)=""/75, 0x41f00, 0x1, [], r8}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000000c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001f00)={0xffffffffffffffff, 0x0, 0xf6, 0x22, &(0x7f0000001dc0)="9ef9482ea02fd36d0a768986a7ebe7a627dc88937e7073e3521858dfa0d5e02f571a01cfdfa76e048e5f956ea5da60b90e02a6c3d3687ed61ec9ab5b682c02498bddef38de9ce8c753e41e78f414d16202a033b6c7752711a5f56924e7846d6dcde2f71026e1eb0319b5e60f6b1ec67fca31c3cf1691d3af91a19f56be5a10ff337a53ba13dd3d75e1555211954b92ec0082d02b7b4cdddc021cbe84e4af8f20788977e3416918843e6c92b2ebf7b8b33ecbd4c7c9a9d5036c3e3e538748a32f1a28eb77818ca1878ffdd445dcdb8a40e6221e0fc474428449dfe93c62bbc69996aa9b34488c1da4f6f7c2275305a6a4fb256c1a516d", &(0x7f0000001ec0)=""/34, 0x1f, 0x1}, 0x28) close(r6) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x3441, &(0x7f0000000080)) mount(&(0x7f00000021c0)='./file0/file0\x00', &(0x7f0000002200)='./file0/file0\x00', &(0x7f0000002240)='fuse\x00', 0x2000000, &(0x7f0000002280)="9b3923bfddc346e9fa2aeaffae6ca386d8d50ba83ab72218340d3c30c045a89ac016797652ba04f1a203cfceccb458dbfd9fd03c4a80ef9a40dc7a4f24b6619d04a58186466fd8465757d9ee053c082cdfa957e7efab6191761847cca59c017493ef5e3d22432cf0b4ebef") ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f00000023c0)=ANY=[@ANYBLOB="07000000000000000000000000000000000000000000000000000000000000000000000067eb0ecf1cfa4ffd89aa7e339417beb7d332a5c996e59875644dd1e3a690110400bc751bb0435977d90fcbb2b83c27812d818991d125e9c0f199be2bc7f01aa0a5cb9b9f99438aa0f1ae3d50201f7bb276536f567f03f062994da292b6db0000000000000000000000000000a93536f303000000000000002a27f6ae1258ebb5079c1bab4f1f6f11ee8ce2e590855a3af38e4bb871ef8400000000000000000000"]) mount(&(0x7f0000001b40)='./file0\x00', &(0x7f0000001b80)='./file0/file0\x00', &(0x7f0000002100)='vfat\x00', 0x0, &(0x7f0000002140)="98980e21ac8b46c0b7bedeee39e6bd9ae4088d6ab47dc9dc76a39e299ce3783aa33e482e450484961fd3e3c5b178fafbe54440e19512ea4298652ed129d4241d9d116d8a5c2b931d350f0c989f8a288fc9e56c") mount(&(0x7f0000df7000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='hugetlbfs\x00', 0x200, &(0x7f00000001c0)) mkdir(&(0x7f00000004c0)='./file0/file0\x00', 0x0) socketpair$inet(0x2, 0x0, 0x1f, &(0x7f0000000080)) [ 217.941340] FAULT_INJECTION: forcing a failure. [ 217.941340] name failslab, interval 1, probability 0, space 0, times 0 [ 217.952646] CPU: 0 PID: 15803 Comm: syz-executor3 Not tainted 4.16.0-rc6+ #43 [ 217.959911] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 217.969238] Call Trace: [ 217.971804] dump_stack+0x194/0x24d [ 217.975502] ? arch_local_irq_restore+0x53/0x53 [ 217.980159] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 217.985323] ? pcpu_alloc+0x146/0x1120 [ 217.989189] should_fail+0x8c0/0xa40 [ 217.992876] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 217.997957] ? find_held_lock+0x35/0x1d0 [ 218.001997] ? find_held_lock+0x35/0x1d0 [ 218.006048] ? check_same_owner+0x320/0x320 [ 218.010358] ? rcu_note_context_switch+0x710/0x710 [ 218.015263] ? find_held_lock+0x35/0x1d0 [ 218.019301] should_failslab+0xec/0x120 [ 218.023252] kmem_cache_alloc_trace+0x4b/0x740 [ 218.027808] ? lock_downgrade+0x980/0x980 [ 218.031929] ? lock_release+0xa40/0xa40 [ 218.035880] kernfs_mount_ns+0xb5/0x8b0 [ 218.039833] ? kernfs_super_ns+0x70/0x70 [ 218.043876] sysfs_mount+0xc2/0x1c0 [ 218.047478] ? sysfs_kill_sb+0x40/0x40 [ 218.051344] ? alloc_pages_current+0xbe/0x1e0 [ 218.055820] ? security_sb_copy_data+0x81/0xb0 [ 218.060380] mount_fs+0x66/0x2d0 [ 218.063727] vfs_kern_mount.part.26+0xc6/0x4a0 [ 218.068294] ? may_umount+0xa0/0xa0 [ 218.071910] ? _raw_read_unlock+0x22/0x30 [ 218.076043] ? __get_fs_type+0x8a/0xc0 [ 218.079906] do_mount+0xea4/0x2bb0 [ 218.083423] ? copy_mount_string+0x40/0x40 [ 218.087638] ? rcu_pm_notify+0xc0/0xc0 [ 218.091504] ? copy_mount_options+0x5f/0x2e0 [ 218.095883] ? rcu_read_lock_sched_held+0x108/0x120 [ 218.100875] ? kmem_cache_alloc_trace+0x459/0x740 [ 218.105704] ? copy_mount_options+0x1f7/0x2e0 [ 218.110182] SyS_mount+0xab/0x120 [ 218.113620] ? copy_mnt_ns+0xb30/0xb30 [ 218.117480] do_syscall_64+0x281/0x940 [ 218.121340] ? vmalloc_sync_all+0x30/0x30 [ 218.125469] ? _raw_spin_unlock_irq+0x27/0x70 [ 218.130038] ? finish_task_switch+0x1c1/0x7e0 [ 218.134515] ? syscall_return_slowpath+0x550/0x550 [ 218.139419] ? syscall_return_slowpath+0x2ac/0x550 [ 218.144324] ? prepare_exit_to_usermode+0x350/0x350 [ 218.149329] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 218.154668] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 218.159489] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 218.164663] RIP: 0033:0x454e79 [ 218.167828] RSP: 002b:00007fbfd4b96c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 218.175510] RAX: ffffffffffffffda RBX: 00007fbfd4b976d4 RCX: 0000000000454e79 [ 218.182755] RDX: 0000000020000100 RSI: 0000000020000180 RDI: 0000000020000100 2018/03/31 08:26:01 executing program 2 (fault-call:9 fault-nth:0): r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000348f88)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r2}, 0x10) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') 2018/03/31 08:26:01 executing program 3 (fault-call:10 fault-nth:8): r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000348f88)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r2}, 0x10) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) mount(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f00000002c0)='devpts\x00', 0x800000, &(0x7f0000000300)) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') [ 218.190006] RBP: 000000000072bea0 R08: 0000000020000040 R09: 0000000000000000 [ 218.197257] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 218.204499] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000007 [ 218.331261] FAULT_INJECTION: forcing a failure. [ 218.331261] name failslab, interval 1, probability 0, space 0, times 0 [ 218.342592] CPU: 0 PID: 15810 Comm: syz-executor1 Not tainted 4.16.0-rc6+ #43 [ 218.349880] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 218.359229] Call Trace: [ 218.361814] dump_stack+0x194/0x24d [ 218.365433] ? arch_local_irq_restore+0x53/0x53 [ 218.370107] should_fail+0x8c0/0xa40 [ 218.373819] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 218.378915] ? trace_event_raw_event_lock+0x340/0x340 [ 218.384101] ? kasan_slab_alloc+0x12/0x20 [ 218.388243] ? alloc_vfsmnt+0xe0/0x9c0 [ 218.392113] ? clone_mnt+0x118/0x11d0 [ 218.395894] ? copy_tree+0x133/0xa40 [ 218.399605] ? find_held_lock+0x35/0x1d0 [ 218.403665] ? __lock_is_held+0xb6/0x140 [ 218.407720] ? check_same_owner+0x320/0x320 [ 218.412041] ? rcu_note_context_switch+0x710/0x710 [ 218.416976] should_failslab+0xec/0x120 [ 218.420937] __kmalloc_track_caller+0x5f/0x760 [ 218.425506] ? do_raw_spin_trylock+0x190/0x190 [ 218.430098] ? kstrdup_const+0x39/0x50 [ 218.433977] kstrdup+0x39/0x70 [ 218.437167] kstrdup_const+0x39/0x50 [ 218.440869] alloc_vfsmnt+0x1a5/0x9c0 [ 218.444654] ? mnt_free_id.isra.21+0x50/0x50 [ 218.449050] ? perf_trace_run_bpf_submit+0x206/0x330 [ 218.454138] ? perf_trace_run_bpf_submit+0x206/0x330 [ 218.459227] ? perf_trace_run_bpf_submit+0x20d/0x330 [ 218.464312] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 218.469514] ? perf_tp_event+0xae0/0xae0 [ 218.473566] ? memset+0x31/0x40 [ 218.476832] ? perf_trace_lock+0x4d6/0x900 [ 218.481057] ? do_syscall_64+0x281/0x940 [ 218.485121] ? trace_event_raw_event_lock+0x340/0x340 [ 218.490313] clone_mnt+0x118/0x11d0 [ 218.493927] ? mark_mounts_for_expiry+0x7f0/0x7f0 [ 218.498759] ? trace_hardirqs_off+0x10/0x10 [ 218.503086] ? get_mountpoint+0xb7/0x3c0 [ 218.507139] ? lock_downgrade+0x980/0x980 [ 218.511273] ? __lock_is_held+0xb6/0x140 [ 218.515334] ? get_mountpoint+0xc9/0x3c0 [ 218.519383] ? rcu_read_lock_sched_held+0x108/0x120 [ 218.524382] copy_tree+0x133/0xa40 [ 218.527913] ? down_read+0x150/0x150 [ 218.531620] ? to_mnt_ns+0x20/0x20 [ 218.535160] ? lock_mount+0xf4/0x2c0 [ 218.538866] do_mount+0x1fb9/0x2bb0 [ 218.542485] ? copy_mount_string+0x40/0x40 [ 218.546715] ? rcu_pm_notify+0xc0/0xc0 [ 218.551039] ? copy_mount_options+0x5f/0x2e0 [ 218.555439] ? kmem_cache_alloc_trace+0x459/0x740 [ 218.560266] ? kasan_check_write+0x14/0x20 [ 218.564484] ? _copy_from_user+0x99/0x110 [ 218.568625] ? copy_mount_options+0x1f7/0x2e0 [ 218.573112] SyS_mount+0xab/0x120 [ 218.576564] ? copy_mnt_ns+0xb30/0xb30 [ 218.580446] do_syscall_64+0x281/0x940 [ 218.584315] ? vmalloc_sync_all+0x30/0x30 [ 218.588442] ? _raw_spin_unlock_irq+0x27/0x70 [ 218.592921] ? finish_task_switch+0x1c1/0x7e0 [ 218.597400] ? syscall_return_slowpath+0x550/0x550 [ 218.602310] ? syscall_return_slowpath+0x2ac/0x550 [ 218.607220] ? prepare_exit_to_usermode+0x350/0x350 [ 218.612237] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 218.617606] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 218.622454] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 218.627625] RIP: 0033:0x454e79 2018/03/31 08:26:01 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) gettid() perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x17, 0x7, 0x7, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x2, 0xa, 0x9fd9, &(0x7f0000000180)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f00000001c0)={r3}) socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x3441, &(0x7f0000000080)) socketpair$inet6_icmp(0xa, 0x2, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r5, &(0x7f00000003c0)={&(0x7f00000000c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f0000001700), 0x9, &(0x7f00000017c0)=""/4096, 0x1000}, 0x20) r7 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000002800), 0x4) ioctl$sock_kcm_SIOCKCMATTACH(r6, 0x89e0, &(0x7f0000002840)={r4, r7}) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000027c0)) mkdir(&(0x7f0000002880)='./file0\x00', 0x181) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x0, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r9 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) sendmsg$kcm(r9, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r8}, 0x10) 2018/03/31 08:26:01 executing program 1 (fault-call:8 fault-nth:9): perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={0xffffffffffffffff, &(0x7f0000000700), &(0x7f00000009c0)=""/161}, 0x18) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)) [ 218.630801] RSP: 002b:00007f50b9ba4c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 218.638504] RAX: ffffffffffffffda RBX: 00007f50b9ba56d4 RCX: 0000000000454e79 [ 218.645932] RDX: 0000000020000780 RSI: 0000000020000ac0 RDI: 0000000020000000 [ 218.653186] RBP: 000000000072bea0 R08: 0000000020000b00 R09: 0000000000000000 [ 218.660729] R10: 0000000000037002 R11: 0000000000000246 R12: 0000000000000015 [ 218.668000] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000008 2018/03/31 08:26:01 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000040)) perf_event_open(&(0x7f0000348f88)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) socketpair(0xfffffffffffffffc, 0x1, 0x3, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) recvmsg(r0, &(0x7f0000000640)={&(0x7f0000000080)=@generic, 0x80, &(0x7f0000000580)=[{&(0x7f00000001c0)=""/232, 0xe8}, {&(0x7f00000002c0)=""/215, 0xd7}, {&(0x7f0000000100)=""/128, 0x80}, {&(0x7f00000003c0)=""/26, 0x1a}, {&(0x7f0000000400)=""/166, 0xa6}, {&(0x7f00000004c0)=""/138, 0x8a}], 0x6, &(0x7f0000000600)=""/41, 0x29, 0x7fffffff}, 0x40000002) [ 218.797091] devpts: called with bogus options 2018/03/31 08:26:01 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000000003042df8700"]) r1 = perf_event_open(&(0x7f0000348f88)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r2}, 0x10) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) mount(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f00000002c0)='devpts\x00', 0x800000, &(0x7f0000000300)="7b18f1563c67659c49445440cbb57f32c0f4710f0219046399f3e8a25c5d4975e2b42f404b14937bd42d9874bdd132eef77f584d5151c9a97470a0d77a0c24a85e319673350e16b039bf474ec320") socketpair(0x3, 0x800, 0x81, &(0x7f00000003c0)) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') [ 218.825833] devpts: called with bogus options [ 218.860348] hugetlbfs: Bad mount option: "" 2018/03/31 08:26:01 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) socketpair(0x0, 0x4, 0x6, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x3) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000100)={&(0x7f00000000c0)='./file0\x00', r0}, 0xa5c081a0) gettid() socketpair(0xf, 0x3, 0x2, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000000)={r2}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r1, 0x50, &(0x7f00000001c0)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000240)=r3, 0x4) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000080)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', r2}, 0x10) 2018/03/31 08:26:01 executing program 7: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x80000000000, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000001fc0)) sendmsg(0xffffffffffffffff, &(0x7f00000024c0)={&(0x7f0000002040)=@un=@file={0x0, './file0\x00'}, 0x80, &(0x7f0000001f40)=[{&(0x7f00000020c0)="73c7575b94a72990e177f86ed4835a72a65c1a6c6831eeb0c48163a47ab63bcb605c8450cc4798ff6521c2aa722d1a7105c8a07e6c", 0x35}], 0x1, &(0x7f0000002500)=ANY=[], 0x0, 0x40000}, 0x20000000) r2 = gettid() r3 = perf_event_open(&(0x7f0000001ac0)={0x1, 0x70, 0xffffffff, 0x835, 0x9, 0xffffffffffffff5f, 0x0, 0x1000, 0x42000, 0x3, 0x8, 0x80, 0x1, 0x4, 0x100000001, 0x9, 0xff, 0x8, 0x1000, 0x7, 0x7f, 0x200, 0xb715, 0x3, 0x7fffffff, 0xf0a, 0x40, 0x8000, 0x8, 0x7, 0xffffffffffffff74, 0x4, 0x6, 0x100, 0x7, 0x335, 0x3ff, 0x58, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000001a80), 0xe}, 0x0, 0x80000000, 0x0, 0x7, 0x5, 0x3, 0x80000001}, r2, 0xd, r1, 0x8) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000200)='mqueue\x00', 0x0, &(0x7f000000a000)) r4 = getpid() r5 = bpf$PROG_LOAD(0x5, &(0x7f0000002500)={0xf, 0x7, &(0x7f0000001940)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, [@ldst={0x3, 0x3, 0x3, 0x4, 0x3, 0x2, 0xffffffffffffffff}, @exit={0x95}], {0x95}}, &(0x7f0000001980)='GPL\x00', 0xff, 0x1000, &(0x7f00000039c0)=""/4096, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000019c0)={&(0x7f0000000180)='./file0\x00', r5}, 0x10) perf_event_open(&(0x7f0000001a00)={0x0, 0x70, 0x0, 0x8, 0x0, 0x3, 0x0, 0xb8, 0x1000, 0x0, 0x3, 0x4, 0xfff, 0x4, 0x4dae, 0x40, 0x100000001, 0x6, 0x4, 0x0, 0x3, 0x753c, 0x6, 0x100, 0x1de, 0x6, 0x4, 0x1, 0x6, 0x4, 0x7, 0x3, 0x7fff, 0x80000000, 0x3, 0x8, 0x81, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x7, 0x4}, 0x801, 0x400, 0x1, 0x4, 0x1, 0x9, 0x80000001}, r4, 0x7, r1, 0xb) r6 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000004000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000001c00)='./file0\x00', &(0x7f0000001c40)='./file0\x00', &(0x7f0000001c80)='devpts\x00', 0x40, &(0x7f0000001cc0)="be623dfd58807ac0b2f86f052863a5f30adc0bce173ebcf648cefd7d64732aeb5b94e6af3ab33e53669ba6d304d067dad4b1ff3ed87f18fd170aac904e8f105e80e22881717c98752a9cd7cfb06d102877e3b36b2624d22427331755a9514b225d25999ed605ffe4188630db2e7ddcc57f6316b60c4f3845d9dfcbbde5e49af627b48d7c9bd743b536de31a9ba3010cb6714c9b90a50537be55ca12a18e6541bff5a82d293e7734ea9c90707899663bd96b3bcce5887bf0bd35963c5adc39ddcb6f2a0a02b01661242046cb54ef1aec5a486b69e006305064124867bf79f4dc11798e214b61575168b79887122e0a3461f703c077f902c0a") socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r7, &(0x7f0000001800)={&(0x7f0000000240)=@alg, 0x80, &(0x7f0000000740)=[{&(0x7f00000002c0)=""/83, 0x53}, {&(0x7f0000000340)=""/27, 0x1b}, {&(0x7f0000000380)}, {&(0x7f00000003c0)=""/40, 0x28}, {&(0x7f0000000400)=""/144, 0x90}, {&(0x7f00000004c0)=""/200, 0xc8}, {&(0x7f00000005c0)=""/60, 0x3c}, {&(0x7f0000000600)=""/105, 0x69}, {&(0x7f0000000680)=""/127, 0x7f}, {&(0x7f0000000700)=""/8, 0x8}], 0xa, &(0x7f0000000800)=""/4096, 0x1000}, 0x10000) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000002340)=0xf60) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000003900)={&(0x7f0000003400)=@can={0x0, 0x0}, 0x80, &(0x7f0000003840)=[{&(0x7f0000003480)=""/194, 0xc2}, {&(0x7f0000003580)=""/250, 0xfa}, {&(0x7f0000003680)=""/100, 0x64}, {&(0x7f0000003700)=""/14, 0xe}, {&(0x7f0000003740)=""/159, 0x9f}, {&(0x7f0000003800)=""/15, 0xf}], 0x6, &(0x7f00000038c0)=""/29, 0x1d, 0x5}, 0x3) bpf$PROG_LOAD(0x5, &(0x7f0000003940)={0x4, 0x9, &(0x7f0000001840)=ANY=[@ANYBLOB="18000000030000000000000003000000dfd00c00fcffffff0000000000000000000803000101000000810000000000000001f0fff0ffffff000000000000000095000000000017d2"], &(0x7f0000000380)='GPL\x00', 0xf172, 0x4b, &(0x7f00000018c0)=""/75, 0x41f00, 0x1, [], r8}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000000c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001f00)={0xffffffffffffffff, 0x0, 0xf6, 0x22, &(0x7f0000001dc0)="9ef9482ea02fd36d0a768986a7ebe7a627dc88937e7073e3521858dfa0d5e02f571a01cfdfa76e048e5f956ea5da60b90e02a6c3d3687ed61ec9ab5b682c02498bddef38de9ce8c753e41e78f414d16202a033b6c7752711a5f56924e7846d6dcde2f71026e1eb0319b5e60f6b1ec67fca31c3cf1691d3af91a19f56be5a10ff337a53ba13dd3d75e1555211954b92ec0082d02b7b4cdddc021cbe84e4af8f20788977e3416918843e6c92b2ebf7b8b33ecbd4c7c9a9d5036c3e3e538748a32f1a28eb77818ca1878ffdd445dcdb8a40e6221e0fc474428449dfe93c62bbc69996aa9b34488c1da4f6f7c2275305a6a4fb256c1a516d", &(0x7f0000001ec0)=""/34, 0x1f, 0x1}, 0x28) close(r6) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x3441, &(0x7f0000000080)) mount(&(0x7f00000021c0)='./file0/file0\x00', &(0x7f0000002200)='./file0/file0\x00', &(0x7f0000002240)='fuse\x00', 0x2000000, &(0x7f0000002280)="9b3923bfddc346e9fa2aeaffae6ca386d8d50ba83ab72218340d3c30c045a89ac016797652ba04f1a203cfceccb458dbfd9fd03c4a80ef9a40dc7a4f24b6619d04a58186466fd8465757d9ee053c082cdfa957e7efab6191761847cca59c017493ef5e3d22432cf0b4ebef") ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f00000023c0)=ANY=[@ANYBLOB="07000000000000000000000000000000000000000000000000000000000000000000000067eb0ecf1cfa4ffd89aa7e339417beb7d332a5c996e59875644dd1e3a690110400bc751bb0435977d90fcbb2b83c27812d818991d125e9c0f199be2bc7f01aa0a5cb9b9f99438aa0f1ae3d50201f7bb276536f567f03f062994da292b6db0000000000000000000000000000a93536f303000000000000002a27f6ae1258ebb5079c1bab4f1f6f11ee8ce2e590855a3af38e4bb871ef8400000000000000000000"]) mount(&(0x7f0000001b40)='./file0\x00', &(0x7f0000001b80)='./file0/file0\x00', &(0x7f0000002100)='vfat\x00', 0x0, &(0x7f0000002140)="98980e21ac8b46c0b7bedeee39e6bd9ae4088d6ab47dc9dc76a39e299ce3783aa33e482e450484961fd3e3c5b178fafbe54440e19512ea4298652ed129d4241d9d116d8a5c2b931d350f0c989f8a288fc9e56c") mount(&(0x7f0000df7000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='hugetlbfs\x00', 0x200, &(0x7f00000001c0)) mkdir(&(0x7f00000004c0)='./file0/file0\x00', 0x0) socketpair$inet(0x2, 0x0, 0x1f, &(0x7f0000000080)) [ 218.983386] FAULT_INJECTION: forcing a failure. [ 218.983386] name failslab, interval 1, probability 0, space 0, times 0 [ 218.994753] CPU: 1 PID: 15837 Comm: syz-executor2 Not tainted 4.16.0-rc6+ #43 [ 219.002016] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 219.010721] FAULT_INJECTION: forcing a failure. [ 219.010721] name failslab, interval 1, probability 0, space 0, times 0 [ 219.011357] Call Trace: [ 219.011373] dump_stack+0x194/0x24d [ 219.011386] ? arch_local_irq_restore+0x53/0x53 [ 219.011401] should_fail+0x8c0/0xa40 [ 219.037086] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 219.042175] ? lock_downgrade+0x980/0x980 [ 219.046306] ? get_pid_task+0xbc/0x140 [ 219.050175] ? proc_fail_nth_write+0x9b/0x1d0 [ 219.054653] ? map_files_get_link+0x3a0/0x3a0 [ 219.059132] ? find_held_lock+0x35/0x1d0 [ 219.063185] ? check_same_owner+0x320/0x320 [ 219.067497] ? __lock_is_held+0xb6/0x140 [ 219.071540] ? rcu_note_context_switch+0x710/0x710 [ 219.076452] should_failslab+0xec/0x120 [ 219.080409] __kmalloc_track_caller+0x5f/0x760 [ 219.085061] ? strncpy_from_user+0x430/0x430 [ 219.089454] ? strndup_user+0x62/0xb0 [ 219.093239] memdup_user+0x2c/0x90 [ 219.096762] strndup_user+0x62/0xb0 [ 219.100369] SyS_mount+0x3c/0x120 [ 219.103806] ? copy_mnt_ns+0xb30/0xb30 [ 219.107675] do_syscall_64+0x281/0x940 [ 219.111543] ? vmalloc_sync_all+0x30/0x30 [ 219.115671] ? _raw_spin_unlock_irq+0x27/0x70 [ 219.120149] ? finish_task_switch+0x1c1/0x7e0 [ 219.124638] ? syscall_return_slowpath+0x550/0x550 [ 219.129548] ? syscall_return_slowpath+0x2ac/0x550 [ 219.134458] ? prepare_exit_to_usermode+0x350/0x350 [ 219.139478] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 219.144823] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 219.149651] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 219.154827] RIP: 0033:0x454e79 [ 219.157996] RSP: 002b:00007f3ee2ac1c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 219.165700] RAX: ffffffffffffffda RBX: 00007f3ee2ac26d4 RCX: 0000000000454e79 [ 219.172985] RDX: 0000000020000100 RSI: 0000000020000180 RDI: 0000000020000100 [ 219.180239] RBP: 000000000072bea0 R08: 0000000020000040 R09: 0000000000000000 [ 219.187488] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 219.194738] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000000 [ 219.202006] CPU: 0 PID: 15838 Comm: syz-executor3 Not tainted 4.16.0-rc6+ #43 [ 219.209276] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 219.218619] Call Trace: [ 219.221204] dump_stack+0x194/0x24d [ 219.224828] ? arch_local_irq_restore+0x53/0x53 [ 219.229498] should_fail+0x8c0/0xa40 2018/03/31 08:26:02 executing program 2 (fault-call:9 fault-nth:1): r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000348f88)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r2}, 0x10) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') [ 219.233212] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 219.238317] ? lock_downgrade+0x980/0x980 [ 219.242463] ? lock_release+0xa40/0xa40 [ 219.246426] ? unwind_next_frame.part.6+0x1a6/0xb40 [ 219.251423] ? find_held_lock+0x35/0x1d0 [ 219.255464] ? check_same_owner+0x320/0x320 [ 219.259762] ? sget_userns+0x27d/0xe40 [ 219.263624] ? rcu_note_context_switch+0x710/0x710 [ 219.268529] should_failslab+0xec/0x120 [ 219.272480] kmem_cache_alloc_trace+0x4b/0x740 [ 219.277048] ? sysfs_mount+0xc2/0x1c0 [ 219.280837] ? mount_fs+0x66/0x2d0 [ 219.284360] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 219.289096] ? do_mount+0xea4/0x2bb0 [ 219.292786] ? SyS_mount+0xab/0x120 [ 219.296386] ? do_syscall_64+0x281/0x940 [ 219.300425] sget_userns+0x2a3/0xe40 [ 219.304114] ? kernfs_sop_show_path+0x190/0x190 [ 219.308761] ? kernfs_sop_show_options+0x180/0x180 [ 219.313674] ? destroy_unused_super.part.6+0xd0/0xd0 [ 219.318760] ? check_same_owner+0x320/0x320 [ 219.323070] ? rcu_pm_notify+0xc0/0xc0 [ 219.326937] ? kernfs_mount_ns+0xb5/0x8b0 [ 219.331061] ? rcu_read_lock_sched_held+0x108/0x120 [ 219.336054] ? kmem_cache_alloc_trace+0x459/0x740 [ 219.340879] ? lock_downgrade+0x980/0x980 [ 219.345020] kernfs_mount_ns+0x13d/0x8b0 [ 219.349069] ? kernfs_super_ns+0x70/0x70 [ 219.353117] sysfs_mount+0xc2/0x1c0 [ 219.356718] ? sysfs_kill_sb+0x40/0x40 [ 219.360582] ? alloc_pages_current+0xbe/0x1e0 [ 219.365060] ? security_sb_copy_data+0x81/0xb0 [ 219.369623] mount_fs+0x66/0x2d0 [ 219.372966] vfs_kern_mount.part.26+0xc6/0x4a0 [ 219.377522] ? may_umount+0xa0/0xa0 [ 219.381125] ? _raw_read_unlock+0x22/0x30 [ 219.385249] ? __get_fs_type+0x8a/0xc0 [ 219.389112] do_mount+0xea4/0x2bb0 [ 219.392637] ? copy_mount_string+0x40/0x40 [ 219.396854] ? rcu_pm_notify+0xc0/0xc0 [ 219.400717] ? copy_mount_options+0x5f/0x2e0 [ 219.405100] ? rcu_read_lock_sched_held+0x108/0x120 [ 219.410093] ? kmem_cache_alloc_trace+0x459/0x740 [ 219.414920] ? kasan_check_write+0x14/0x20 [ 219.419132] ? _copy_from_user+0x99/0x110 [ 219.423253] ? copy_mount_options+0x1f7/0x2e0 [ 219.427722] SyS_mount+0xab/0x120 [ 219.431154] ? copy_mnt_ns+0xb30/0xb30 [ 219.435036] do_syscall_64+0x281/0x940 [ 219.438903] ? vmalloc_sync_all+0x30/0x30 [ 219.443035] ? _raw_spin_unlock_irq+0x27/0x70 [ 219.447515] ? finish_task_switch+0x1c1/0x7e0 [ 219.451993] ? syscall_return_slowpath+0x550/0x550 [ 219.456901] ? syscall_return_slowpath+0x2ac/0x550 [ 219.461804] ? prepare_exit_to_usermode+0x350/0x350 [ 219.466798] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 219.472147] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 219.476970] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 219.482139] RIP: 0033:0x454e79 [ 219.485314] RSP: 002b:00007fbfd4b96c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 219.493006] RAX: ffffffffffffffda RBX: 00007fbfd4b976d4 RCX: 0000000000454e79 [ 219.500258] RDX: 0000000020000100 RSI: 0000000020000180 RDI: 0000000020000100 [ 219.507505] RBP: 000000000072bea0 R08: 0000000020000040 R09: 0000000000000000 [ 219.514750] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 219.521997] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000008 [ 219.658241] FAULT_INJECTION: forcing a failure. [ 219.658241] name failslab, interval 1, probability 0, space 0, times 0 [ 219.669498] CPU: 1 PID: 15845 Comm: syz-executor1 Not tainted 4.16.0-rc6+ #43 [ 219.676753] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 219.686083] Call Trace: [ 219.688662] dump_stack+0x194/0x24d [ 219.692287] ? arch_local_irq_restore+0x53/0x53 [ 219.696941] ? print_irqtrace_events+0x270/0x270 [ 219.701694] should_fail+0x8c0/0xa40 [ 219.705388] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 219.710479] ? find_held_lock+0x35/0x1d0 [ 219.714530] ? __lock_is_held+0xb6/0x140 [ 219.718589] ? check_same_owner+0x320/0x320 [ 219.722902] ? rcu_note_context_switch+0x710/0x710 [ 219.727816] should_failslab+0xec/0x120 [ 219.731783] kmem_cache_alloc+0x47/0x760 [ 219.735831] alloc_vfsmnt+0xe0/0x9c0 [ 219.739532] ? trace_hardirqs_off+0x10/0x10 [ 219.743841] ? mnt_free_id.isra.21+0x50/0x50 [ 219.748239] ? perf_trace_lock+0xd6/0x900 [ 219.752364] ? perf_trace_lock_acquire+0xe3/0x980 [ 219.757206] ? trace_event_raw_event_lock+0x340/0x340 [ 219.762387] ? perf_trace_lock+0x900/0x900 [ 219.766608] ? lock_downgrade+0x980/0x980 [ 219.770739] ? trace_hardirqs_off+0x10/0x10 [ 219.775049] ? do_raw_spin_trylock+0x190/0x190 [ 219.779609] ? trace_event_raw_event_lock+0x340/0x340 [ 219.784785] clone_mnt+0x118/0x11d0 [ 219.788389] ? find_held_lock+0x35/0x1d0 [ 219.792435] ? mark_mounts_for_expiry+0x7f0/0x7f0 [ 219.797266] ? is_subdir+0x259/0x430 [ 219.800964] ? lock_downgrade+0x980/0x980 [ 219.805106] ? lock_release+0xa40/0xa40 [ 219.809081] ? is_subdir+0x144/0x430 [ 219.812779] ? is_subdir+0x29b/0x430 [ 219.816477] ? d_move+0x90/0x90 [ 219.819751] ? get_mountpoint+0xc9/0x3c0 [ 219.823804] ? rcu_read_lock_sched_held+0x108/0x120 [ 219.828801] copy_tree+0x379/0xa40 [ 219.832333] ? down_read+0x150/0x150 [ 219.836038] ? to_mnt_ns+0x20/0x20 [ 219.839576] ? lock_mount+0xf4/0x2c0 [ 219.843277] do_mount+0x1fb9/0x2bb0 [ 219.846885] ? copy_mount_string+0x40/0x40 [ 219.851098] ? rcu_pm_notify+0xc0/0xc0 [ 219.854981] ? copy_mount_options+0x5f/0x2e0 [ 219.859385] ? kmem_cache_alloc_trace+0x459/0x740 [ 219.864218] ? kasan_check_write+0x14/0x20 [ 219.868439] ? _copy_from_user+0x99/0x110 [ 219.872753] ? copy_mount_options+0x1f7/0x2e0 [ 219.877257] SyS_mount+0xab/0x120 [ 219.880694] ? copy_mnt_ns+0xb30/0xb30 [ 219.884560] do_syscall_64+0x281/0x940 [ 219.888426] ? vmalloc_sync_all+0x30/0x30 [ 219.892555] ? _raw_spin_unlock_irq+0x27/0x70 [ 219.897045] ? finish_task_switch+0x1c1/0x7e0 [ 219.901528] ? syscall_return_slowpath+0x550/0x550 [ 219.906449] ? syscall_return_slowpath+0x2ac/0x550 [ 219.911365] ? prepare_exit_to_usermode+0x350/0x350 [ 219.916362] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 219.921726] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 219.926556] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 219.931730] RIP: 0033:0x454e79 [ 219.934908] RSP: 002b:00007f50b9ba4c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 219.942607] RAX: ffffffffffffffda RBX: 00007f50b9ba56d4 RCX: 0000000000454e79 [ 219.949862] RDX: 0000000020000780 RSI: 0000000020000ac0 RDI: 0000000020000000 [ 219.957116] RBP: 000000000072bea0 R08: 0000000020000b00 R09: 0000000000000000 [ 219.964362] R10: 0000000000037002 R11: 0000000000000246 R12: 0000000000000015 [ 219.971609] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000009 [ 220.091703] devpts: called with bogus options [ 220.163883] FAULT_INJECTION: forcing a failure. [ 220.163883] name failslab, interval 1, probability 0, space 0, times 0 [ 220.175226] CPU: 0 PID: 15867 Comm: syz-executor2 Not tainted 4.16.0-rc6+ #43 [ 220.182501] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 220.191841] Call Trace: [ 220.194413] dump_stack+0x194/0x24d [ 220.198033] ? arch_local_irq_restore+0x53/0x53 [ 220.202686] ? __save_stack_trace+0x7e/0xd0 [ 220.206993] should_fail+0x8c0/0xa40 [ 220.210701] ? trace_event_raw_event_lock+0x340/0x340 [ 220.215871] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 220.220965] ? kasan_kmalloc+0xad/0xe0 [ 220.224837] ? __kmalloc_track_caller+0x15e/0x760 [ 220.229659] ? memdup_user+0x2c/0x90 [ 220.233355] ? strndup_user+0x62/0xb0 [ 220.237131] ? SyS_mount+0x3c/0x120 [ 220.240753] ? proc_fail_nth_write+0x9b/0x1d0 [ 220.245232] ? map_files_get_link+0x3a0/0x3a0 [ 220.249714] ? find_held_lock+0x35/0x1d0 [ 220.253768] ? check_same_owner+0x320/0x320 [ 220.258076] ? rcu_note_context_switch+0x710/0x710 [ 220.262984] ? __check_object_size+0x8b/0x530 [ 220.267461] should_failslab+0xec/0x120 [ 220.271424] __kmalloc_track_caller+0x5f/0x760 [ 220.275993] ? strncpy_from_user+0x430/0x430 [ 220.280395] ? strndup_user+0x62/0xb0 [ 220.284198] ? _copy_from_user+0x99/0x110 [ 220.288335] memdup_user+0x2c/0x90 [ 220.291864] strndup_user+0x62/0xb0 [ 220.295472] SyS_mount+0x6b/0x120 [ 220.298903] ? copy_mnt_ns+0xb30/0xb30 [ 220.302770] do_syscall_64+0x281/0x940 [ 220.306636] ? vmalloc_sync_all+0x30/0x30 [ 220.310764] ? _raw_spin_unlock_irq+0x27/0x70 [ 220.315238] ? finish_task_switch+0x1c1/0x7e0 [ 220.319712] ? syscall_return_slowpath+0x550/0x550 [ 220.324618] ? syscall_return_slowpath+0x2ac/0x550 [ 220.329533] ? prepare_exit_to_usermode+0x350/0x350 [ 220.334535] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 220.339878] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 220.344700] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 220.349863] RIP: 0033:0x454e79 [ 220.353032] RSP: 002b:00007f3ee2ac1c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 220.360725] RAX: ffffffffffffffda RBX: 00007f3ee2ac26d4 RCX: 0000000000454e79 [ 220.367969] RDX: 0000000020000100 RSI: 0000000020000180 RDI: 0000000020000100 [ 220.375222] RBP: 000000000072bea0 R08: 0000000020000040 R09: 0000000000000000 [ 220.382469] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 220.389715] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000001 [ 220.470125] devpts: called with bogus options [ 220.510610] hugetlbfs: Bad mount option: "" 2018/03/31 08:26:03 executing program 3 (fault-call:10 fault-nth:9): r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000348f88)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r2}, 0x10) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) mount(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f00000002c0)='devpts\x00', 0x800000, &(0x7f0000000300)) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') 2018/03/31 08:26:03 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) socketpair(0x0, 0x4, 0x6, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) recvmsg(r0, &(0x7f0000001440)={&(0x7f0000000080)=@generic, 0x80, &(0x7f0000001380)=[{&(0x7f0000000100)=""/85, 0x55}, {&(0x7f00000001c0)=""/225, 0xe1}, {&(0x7f00000002c0)=""/32, 0x20}, {&(0x7f0000000300)=""/75, 0x4b}, {&(0x7f0000000380)=""/4096, 0x1000}], 0x5, &(0x7f0000001400)=""/24, 0x18, 0x81}, 0x20) socketpair(0xf, 0x3, 0x2, &(0x7f0000000040)) 2018/03/31 08:26:03 executing program 7: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x80000000000, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000001fc0)) sendmsg(0xffffffffffffffff, &(0x7f00000024c0)={&(0x7f0000002040)=@un=@file={0x0, './file0\x00'}, 0x80, &(0x7f0000001f40)=[{&(0x7f00000020c0)="73c7575b94a72990e177f86ed4835a72a65c1a6c6831eeb0c48163a47ab63bcb605c8450cc4798ff6521c2aa722d1a7105c8a07e6c", 0x35}], 0x1, &(0x7f0000002500)=ANY=[], 0x0, 0x40000}, 0x20000000) r2 = gettid() r3 = perf_event_open(&(0x7f0000001ac0)={0x1, 0x70, 0xffffffff, 0x835, 0x9, 0xffffffffffffff5f, 0x0, 0x1000, 0x42000, 0x3, 0x8, 0x80, 0x1, 0x4, 0x100000001, 0x9, 0xff, 0x8, 0x1000, 0x7, 0x7f, 0x200, 0xb715, 0x3, 0x7fffffff, 0xf0a, 0x40, 0x8000, 0x8, 0x7, 0xffffffffffffff74, 0x4, 0x6, 0x100, 0x7, 0x335, 0x3ff, 0x58, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000001a80), 0xe}, 0x0, 0x80000000, 0x82, 0x0, 0x5, 0x3, 0x80000001}, r2, 0xd, r1, 0x8) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000200)='mqueue\x00', 0x0, &(0x7f000000a000)) r4 = getpid() r5 = bpf$PROG_LOAD(0x5, &(0x7f0000002500)={0xf, 0x7, &(0x7f0000001940)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, [@ldst={0x3, 0x3, 0x3, 0x4, 0x3, 0x2, 0xffffffffffffffff}, @exit={0x95}], {0x95}}, &(0x7f0000001980)='GPL\x00', 0xff, 0x1000, &(0x7f00000039c0)=""/4096, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000019c0)={&(0x7f0000000180)='./file0\x00', r5}, 0x10) perf_event_open(&(0x7f0000001a00)={0x0, 0x70, 0x0, 0x8, 0x0, 0x3, 0x0, 0xb8, 0x1000, 0x0, 0x3, 0x4, 0xfff, 0x4, 0x4dae, 0x40, 0x100000001, 0x6, 0x4, 0x0, 0x3, 0x753c, 0x6, 0x100, 0x1de, 0x6, 0x4, 0x1, 0x6, 0x4, 0x7, 0x3, 0x7fff, 0x80000000, 0x3, 0x8, 0x81, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x7, 0x4}, 0x801, 0x400, 0x1, 0x4, 0x1, 0x9, 0x80000001}, r4, 0x7, r1, 0xb) r6 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000004000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000001c00)='./file0\x00', &(0x7f0000001c40)='./file0\x00', &(0x7f0000001c80)='devpts\x00', 0x40, &(0x7f0000001cc0)="be623dfd58807ac0b2f86f052863a5f30adc0bce173ebcf648cefd7d64732aeb5b94e6af3ab33e53669ba6d304d067dad4b1ff3ed87f18fd170aac904e8f105e80e22881717c98752a9cd7cfb06d102877e3b36b2624d22427331755a9514b225d25999ed605ffe4188630db2e7ddcc57f6316b60c4f3845d9dfcbbde5e49af627b48d7c9bd743b536de31a9ba3010cb6714c9b90a50537be55ca12a18e6541bff5a82d293e7734ea9c90707899663bd96b3bcce5887bf0bd35963c5adc39ddcb6f2a0a02b01661242046cb54ef1aec5a486b69e006305064124867bf79f4dc11798e214b61575168b79887122e0a3461f703c077f902c0a") socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r7, &(0x7f0000001800)={&(0x7f0000000240)=@alg, 0x80, &(0x7f0000000740)=[{&(0x7f00000002c0)=""/83, 0x53}, {&(0x7f0000000340)=""/27, 0x1b}, {&(0x7f0000000380)}, {&(0x7f00000003c0)=""/40, 0x28}, {&(0x7f0000000400)=""/144, 0x90}, {&(0x7f00000004c0)=""/200, 0xc8}, {&(0x7f00000005c0)=""/60, 0x3c}, {&(0x7f0000000600)=""/105, 0x69}, {&(0x7f0000000680)=""/127, 0x7f}, {&(0x7f0000000700)=""/8, 0x8}], 0xa, &(0x7f0000000800)=""/4096, 0x1000}, 0x10000) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000002340)=0xf60) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000003900)={&(0x7f0000003400)=@can={0x0, 0x0}, 0x80, &(0x7f0000003840)=[{&(0x7f0000003480)=""/194, 0xc2}, {&(0x7f0000003580)=""/250, 0xfa}, {&(0x7f0000003680)=""/100, 0x64}, {&(0x7f0000003700)=""/14, 0xe}, {&(0x7f0000003740)=""/159, 0x9f}, {&(0x7f0000003800)=""/15, 0xf}], 0x6, &(0x7f00000038c0)=""/29, 0x1d, 0x5}, 0x3) bpf$PROG_LOAD(0x5, &(0x7f0000003940)={0x4, 0x9, &(0x7f0000001840)=ANY=[@ANYBLOB="18000000030000000000000003000000dfd00c00fcffffff0000000000000000000803000101000000810000000000000001f0fff0ffffff000000000000000095000000000017d2"], &(0x7f0000000380)='GPL\x00', 0xf172, 0x4b, &(0x7f00000018c0)=""/75, 0x41f00, 0x1, [], r8}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000000c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001f00)={0xffffffffffffffff, 0x0, 0xf6, 0x22, &(0x7f0000001dc0)="9ef9482ea02fd36d0a768986a7ebe7a627dc88937e7073e3521858dfa0d5e02f571a01cfdfa76e048e5f956ea5da60b90e02a6c3d3687ed61ec9ab5b682c02498bddef38de9ce8c753e41e78f414d16202a033b6c7752711a5f56924e7846d6dcde2f71026e1eb0319b5e60f6b1ec67fca31c3cf1691d3af91a19f56be5a10ff337a53ba13dd3d75e1555211954b92ec0082d02b7b4cdddc021cbe84e4af8f20788977e3416918843e6c92b2ebf7b8b33ecbd4c7c9a9d5036c3e3e538748a32f1a28eb77818ca1878ffdd445dcdb8a40e6221e0fc474428449dfe93c62bbc69996aa9b34488c1da4f6f7c2275305a6a4fb256c1a516d", &(0x7f0000001ec0)=""/34, 0x1f, 0x1}, 0x28) close(r6) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x3441, &(0x7f0000000080)) mount(&(0x7f00000021c0)='./file0/file0\x00', &(0x7f0000002200)='./file0/file0\x00', &(0x7f0000002240)='fuse\x00', 0x2000000, &(0x7f0000002280)="9b3923bfddc346e9fa2aeaffae6ca386d8d50ba83ab72218340d3c30c045a89ac016797652ba04f1a203cfceccb458dbfd9fd03c4a80ef9a40dc7a4f24b6619d04a58186466fd8465757d9ee053c082cdfa957e7efab6191761847cca59c017493ef5e3d22432cf0b4ebef") ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f00000023c0)=ANY=[@ANYBLOB="07000000000000000000000000000000000000000000000000000000000000000000000067eb0ecf1cfa4ffd89aa7e339417beb7d332a5c996e59875644dd1e3a690110400bc751bb0435977d90fcbb2b83c27812d818991d125e9c0f199be2bc7f01aa0a5cb9b9f99438aa0f1ae3d50201f7bb276536f567f03f062994da292b6db0000000000000000000000000000a93536f303000000000000002a27f6ae1258ebb5079c1bab4f1f6f11ee8ce2e590855a3af38e4bb871ef8400000000000000000000"]) mount(&(0x7f0000001b40)='./file0\x00', &(0x7f0000001b80)='./file0/file0\x00', &(0x7f0000002100)='vfat\x00', 0x0, &(0x7f0000002140)="98980e21ac8b46c0b7bedeee39e6bd9ae4088d6ab47dc9dc76a39e299ce3783aa33e482e450484961fd3e3c5b178fafbe54440e19512ea4298652ed129d4241d9d116d8a5c2b931d350f0c989f8a288fc9e56c") mount(&(0x7f0000df7000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='hugetlbfs\x00', 0x200, &(0x7f00000001c0)) mkdir(&(0x7f00000004c0)='./file0/file0\x00', 0x0) socketpair$inet(0x2, 0x0, 0x1f, &(0x7f0000000080)) 2018/03/31 08:26:03 executing program 1 (fault-call:8 fault-nth:10): perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={0xffffffffffffffff, &(0x7f0000000700), &(0x7f00000009c0)=""/161}, 0x18) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)) 2018/03/31 08:26:03 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000000003042df8700"]) r1 = perf_event_open(&(0x7f0000348f88)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r2}, 0x10) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) mount(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f00000002c0)='devpts\x00', 0x800000, &(0x7f0000000300)="7b18f1563c67659c49445440cbb57f32c0f4710f0219046399f3e8a25c5d4975e2b42f404b14937bd42d9874bdd132eef77f584d5151c9a97470a0d77a0c24a85e319673350e16b039bf474ec320") socketpair(0x3, 0x800, 0x81, &(0x7f00000003c0)) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') 2018/03/31 08:26:03 executing program 6: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) socketpair(0x0, 0x4, 0x6, &(0x7f0000000180)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) socketpair(0x13, 0x80002, 0x1000000003, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$kcm(r2, &(0x7f00000009c0)={&(0x7f00000006c0)=@hci={0x0, 0x0}, 0x80, &(0x7f0000000900)=[{&(0x7f0000000740)=""/212, 0xd4}, {&(0x7f0000000840)=""/82, 0x52}, {&(0x7f00000008c0)=""/22, 0x16}], 0x3, &(0x7f0000000940)=""/114, 0x72, 0x7}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0xd, 0x8, &(0x7f0000000040)=@raw=[@call={0x85, 0x0, 0x0, 0x14}, @initr0={0x18, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x185}, @call={0x85, 0x0, 0x0, 0xf}, @call={0x85, 0x0, 0x0, 0x17}], &(0x7f0000000280)='GPL\x00', 0x1, 0xbc, &(0x7f00000002c0)=""/188, 0x40f00, 0x1, [], r3}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r1, 0x0, 0xa3, 0xa3, &(0x7f00000000c0)="52cc4dc9bce1114a3263a02a32998da7249d69ef8cb6dd4170543aee4f3d008cc1158c0bda56b65f601b674f947e8fecb5f71ee8d7445202f9fb4f0c251206fe5290a992019d97baf6462ed4d5b0225cb081fb1a6aeef836a2d08320ee1093c7090b20d2086610fb3b0ea68d667dfce61f56e771a766197b10a5bb5080ec985d4acacd51c1003137d7a6ea9eeaa376d8690226c1740dde801e6074afb4b05e527bd449", &(0x7f00000001c0)=""/163, 0x7, 0xc5}, 0x28) 2018/03/31 08:26:03 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x0, 0x1, 0x11, 0xffffffffffffffff, 0x20}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r4 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000280)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000200)='./file0\x00', 0x0, 0x8}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000400)='./file0/file0\x00', &(0x7f00000002c0)='fuseblk\x00', 0xa11800, &(0x7f0000000380)) mount(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f00000009c0)="3949bcf20271c219f64b9e3fbd45bfae692375440912d5a576c2d82299018de50363f2cf30a439b45c2738869283b7900c1e030013700557a768d5cc05cb9ed624684f4dfdae73a8148b29b2978222576dabbcb3556bcf35a8f66fa68ceb0b834ec5120ac749dc0cc5aab7b0197711785349b1673ff5159bc1a40df6c779950e0747a25ce77a10f68b663a87fc993224a79b583eac02a2171f076ff3", 0x1000, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) 2018/03/31 08:26:03 executing program 2 (fault-call:9 fault-nth:2): r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000348f88)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r2}, 0x10) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') [ 220.662474] FAULT_INJECTION: forcing a failure. [ 220.662474] name failslab, interval 1, probability 0, space 0, times 0 [ 220.673874] CPU: 1 PID: 15889 Comm: syz-executor3 Not tainted 4.16.0-rc6+ #43 [ 220.681152] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 220.690513] Call Trace: [ 220.693106] dump_stack+0x194/0x24d [ 220.694306] devpts: called with bogus options [ 220.696730] ? arch_local_irq_restore+0x53/0x53 [ 220.696755] should_fail+0x8c0/0xa40 [ 220.696769] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 220.696797] ? kasan_kmalloc+0xad/0xe0 [ 220.706811] FAULT_INJECTION: forcing a failure. [ 220.706811] name failslab, interval 1, probability 0, space 0, times 0 [ 220.709619] ? __kmalloc+0x162/0x760 [ 220.709631] ? __list_lru_init+0xcf/0x750 [ 220.709648] ? find_held_lock+0x35/0x1d0 [ 220.709664] ? __lock_is_held+0xb6/0x140 [ 220.709685] ? check_same_owner+0x320/0x320 [ 220.749988] ? rcu_note_context_switch+0x710/0x710 [ 220.754916] should_failslab+0xec/0x120 [ 220.758880] kmem_cache_alloc_node_trace+0x5a/0x760 [ 220.763878] ? mark_held_locks+0xaf/0x100 [ 220.768016] ? __raw_spin_lock_init+0x1c/0x100 [ 220.772590] __kmalloc_node+0x33/0x70 [ 220.776378] kvmalloc_node+0x99/0xd0 [ 220.780080] __list_lru_init+0x5d5/0x750 [ 220.784127] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 220.789998] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 220.795004] ? __lockdep_init_map+0xe4/0x650 [ 220.799405] ? lockdep_init_map+0x9/0x10 [ 220.803452] sget_userns+0x691/0xe40 [ 220.807151] ? kernfs_sop_show_path+0x190/0x190 [ 220.811806] ? kernfs_sop_show_options+0x180/0x180 [ 220.816720] ? destroy_unused_super.part.6+0xd0/0xd0 [ 220.821816] ? check_same_owner+0x320/0x320 [ 220.826119] ? rcu_pm_notify+0xc0/0xc0 [ 220.829999] ? rcu_read_lock_sched_held+0x108/0x120 [ 220.835005] ? kmem_cache_alloc_trace+0x459/0x740 [ 220.839837] ? lock_downgrade+0x980/0x980 [ 220.843976] kernfs_mount_ns+0x13d/0x8b0 [ 220.848030] ? kernfs_super_ns+0x70/0x70 [ 220.852084] sysfs_mount+0xc2/0x1c0 [ 220.855696] ? sysfs_kill_sb+0x40/0x40 [ 220.859570] ? alloc_pages_current+0xbe/0x1e0 [ 220.864054] ? security_sb_copy_data+0x81/0xb0 [ 220.868799] mount_fs+0x66/0x2d0 [ 220.872151] vfs_kern_mount.part.26+0xc6/0x4a0 [ 220.876717] ? may_umount+0xa0/0xa0 [ 220.880328] ? _raw_read_unlock+0x22/0x30 [ 220.884459] ? __get_fs_type+0x8a/0xc0 [ 220.888336] do_mount+0xea4/0x2bb0 [ 220.891867] ? copy_mount_string+0x40/0x40 [ 220.896084] ? rcu_pm_notify+0xc0/0xc0 [ 220.899959] ? copy_mount_options+0x5f/0x2e0 [ 220.904357] ? rcu_read_lock_sched_held+0x108/0x120 [ 220.909356] ? kmem_cache_alloc_trace+0x459/0x740 [ 220.914195] ? kasan_check_write+0x14/0x20 [ 220.918415] ? _copy_from_user+0x99/0x110 [ 220.922552] ? copy_mount_options+0x1f7/0x2e0 [ 220.927035] SyS_mount+0xab/0x120 [ 220.930472] ? copy_mnt_ns+0xb30/0xb30 [ 220.934349] do_syscall_64+0x281/0x940 [ 220.938217] ? vmalloc_sync_all+0x30/0x30 [ 220.942351] ? _raw_spin_unlock_irq+0x27/0x70 [ 220.946834] ? finish_task_switch+0x1c1/0x7e0 [ 220.951316] ? syscall_return_slowpath+0x550/0x550 [ 220.956240] ? syscall_return_slowpath+0x2ac/0x550 [ 220.961157] ? prepare_exit_to_usermode+0x350/0x350 [ 220.966159] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 220.971512] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 220.976346] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 220.981519] RIP: 0033:0x454e79 [ 220.984692] RSP: 002b:00007fbfd4b96c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 220.992394] RAX: ffffffffffffffda RBX: 00007fbfd4b976d4 RCX: 0000000000454e79 [ 220.999646] RDX: 0000000020000100 RSI: 0000000020000180 RDI: 0000000020000100 [ 221.006900] RBP: 000000000072bea0 R08: 0000000020000040 R09: 0000000000000000 [ 221.014155] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 221.021483] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000009 [ 221.028757] CPU: 0 PID: 15898 Comm: syz-executor2 Not tainted 4.16.0-rc6+ #43 [ 221.036034] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 221.045381] Call Trace: [ 221.047954] dump_stack+0x194/0x24d [ 221.051570] ? arch_local_irq_restore+0x53/0x53 [ 221.056231] should_fail+0x8c0/0xa40 [ 221.059928] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 221.065015] ? __kmalloc_track_caller+0x15e/0x760 [ 221.069842] ? strndup_user+0x62/0xb0 [ 221.073623] ? SyS_mount+0x6b/0x120 [ 221.077233] ? trace_hardirqs_off+0x10/0x10 [ 221.081560] ? proc_fail_nth_write+0x9b/0x1d0 [ 221.086037] ? map_files_get_link+0x3a0/0x3a0 [ 221.090521] ? find_held_lock+0x35/0x1d0 [ 221.094582] ? check_same_owner+0x320/0x320 [ 221.098880] ? lock_release+0xa40/0xa40 [ 221.102837] ? rcu_note_context_switch+0x710/0x710 [ 221.107755] should_failslab+0xec/0x120 [ 221.111711] kmem_cache_alloc_trace+0x4b/0x740 [ 221.116274] ? kasan_check_write+0x14/0x20 [ 221.120505] ? _copy_from_user+0x99/0x110 [ 221.124638] copy_mount_options+0x5f/0x2e0 [ 221.128859] SyS_mount+0x87/0x120 [ 221.132290] ? copy_mnt_ns+0xb30/0xb30 [ 221.136159] do_syscall_64+0x281/0x940 [ 221.140029] ? vmalloc_sync_all+0x30/0x30 [ 221.144157] ? trace_event_raw_event_sys_exit+0x260/0x260 [ 221.149677] ? syscall_return_slowpath+0x550/0x550 [ 221.154586] ? syscall_return_slowpath+0x2ac/0x550 [ 221.159507] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 221.164854] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 221.169681] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 221.174852] RIP: 0033:0x454e79 [ 221.178024] RSP: 002b:00007f3ee2ac1c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 221.185720] RAX: ffffffffffffffda RBX: 00007f3ee2ac26d4 RCX: 0000000000454e79 [ 221.192969] RDX: 0000000020000100 RSI: 0000000020000180 RDI: 0000000020000100 [ 221.200218] RBP: 000000000072bea0 R08: 0000000020000040 R09: 0000000000000000 [ 221.207468] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 2018/03/31 08:26:04 executing program 1: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={0xffffffffffffffff, &(0x7f0000000700), &(0x7f00000009c0)=""/161}, 0x18) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)) 2018/03/31 08:26:04 executing program 3 (fault-call:10 fault-nth:10): r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000348f88)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r2}, 0x10) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) mount(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f00000002c0)='devpts\x00', 0x800000, &(0x7f0000000300)) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') 2018/03/31 08:26:04 executing program 2 (fault-call:9 fault-nth:3): r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000348f88)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r2}, 0x10) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') 2018/03/31 08:26:04 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x0, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r4 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f00000009c0)="3949bcf20271c219f64b9e3fbd45bfae692375440912d5a576c2d82299018de50363f2cf30a439b45c2738869283b7900c1e030013700557a768d5cc05cb9ed624684f4dfdae73a8148b29b2978222576dabbcb3556bcf35a8f66fa68ceb0b834ec5120ac749dc0cc5aab7b0197711785349b1673ff5159bc1a40df6c779950e0747a25ce77a10f68b663a87fc993224a79b583eac02a2171f076ff3", 0x1000, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) [ 221.214727] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000002 2018/03/31 08:26:04 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000000003042df8700"]) r1 = perf_event_open(&(0x7f0000348f88)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r2}, 0x10) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) mount(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f00000002c0)='devpts\x00', 0x800000, &(0x7f0000000300)="7b18f1563c67659c49445440cbb57f32c0f4710f0219046399f3e8a25c5d4975e2b42f404b14937bd42d9874bdd132eef77f584d5151c9a97470a0d77a0c24a85e319673350e16b039bf474ec320") socketpair(0x3, 0x800, 0x81, &(0x7f00000003c0)) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') 2018/03/31 08:26:04 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000348f88)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f0000000200)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xb, 0x3ba, 0x7fffffff, 0x4000, 0x2, 0xffffffffffffffff, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000240)={r1, &(0x7f0000000100)="6c26c0e121ce98b876864867b6dabcd77ace4dd7c00726b485eb7281de50063b34bb24997bd1d307daed2641da5719e7ec3f523473b0255d0f8060b897c64fe3cd83a0eabf7cc3917d6f3d89798b71d3ea1e548963a2f0f29f9565d0242c7a214651beb3e4df977093b32612e1526599230845c0615e", &(0x7f00000001c0)="257a8feb2e94248fefdaa3e5a7490263efb05a340aa863b15f16886eaca44b2fe7acc1f2d980130a34a27d8c", 0x1}, 0x20) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x552d) socketpair(0xb, 0x80000, 0x6, &(0x7f0000000280)) socketpair(0x0, 0x4, 0x6, &(0x7f0000000180)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x7fffffffff) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000000c0)=0x100, 0x4) socketpair(0xf, 0x4, 0x2, &(0x7f0000000040)) 2018/03/31 08:26:04 executing program 6: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000001c0)) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) socketpair(0x0, 0x4, 0x6, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000000)={r1}) socketpair(0xf, 0x3, 0x2, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x9) close(r3) [ 221.472444] devpts: called with bogus options [ 221.506994] hugetlbfs: Bad mount option: "" [ 221.610562] FAULT_INJECTION: forcing a failure. [ 221.610562] name failslab, interval 1, probability 0, space 0, times 0 [ 221.621857] CPU: 0 PID: 15928 Comm: syz-executor3 Not tainted 4.16.0-rc6+ #43 [ 221.629122] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 221.638464] Call Trace: [ 221.641046] dump_stack+0x194/0x24d [ 221.644676] ? arch_local_irq_restore+0x53/0x53 [ 221.649346] should_fail+0x8c0/0xa40 [ 221.653056] ? is_bpf_text_address+0xa4/0x120 [ 221.657542] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 221.662626] ? __kernel_text_address+0xd/0x40 [ 221.667113] ? unwind_get_return_address+0x61/0xa0 [ 221.672052] ? find_held_lock+0x35/0x1d0 [ 221.676114] ? __lock_is_held+0xb6/0x140 [ 221.680173] ? check_same_owner+0x320/0x320 [ 221.684490] ? rcu_note_context_switch+0x710/0x710 [ 221.689412] should_failslab+0xec/0x120 [ 221.693371] kmem_cache_alloc_trace+0x4b/0x740 [ 221.697940] ? __kmalloc_node+0x33/0x70 [ 221.701899] ? __kmalloc_node+0x33/0x70 [ 221.705861] ? rcu_read_lock_sched_held+0x108/0x120 [ 221.710870] __memcg_init_list_lru_node+0x169/0x270 [ 221.715876] ? list_lru_add+0x7c0/0x7c0 [ 221.719832] ? __kmalloc_node+0x47/0x70 [ 221.723790] __list_lru_init+0x544/0x750 [ 221.727836] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 221.733712] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 221.738718] ? __lockdep_init_map+0xe4/0x650 [ 221.743140] ? lockdep_init_map+0x9/0x10 [ 221.747193] sget_userns+0x691/0xe40 [ 221.750894] ? kernfs_sop_show_path+0x190/0x190 [ 221.755562] ? kernfs_sop_show_options+0x180/0x180 [ 221.760474] ? destroy_unused_super.part.6+0xd0/0xd0 [ 221.765564] ? check_same_owner+0x320/0x320 [ 221.769872] ? rcu_pm_notify+0xc0/0xc0 [ 221.773746] ? rcu_read_lock_sched_held+0x108/0x120 [ 221.778829] ? kmem_cache_alloc_trace+0x459/0x740 [ 221.783659] ? lock_downgrade+0x980/0x980 [ 221.787795] kernfs_mount_ns+0x13d/0x8b0 [ 221.791866] ? kernfs_super_ns+0x70/0x70 [ 221.795916] sysfs_mount+0xc2/0x1c0 [ 221.799531] ? sysfs_kill_sb+0x40/0x40 [ 221.803401] ? alloc_pages_current+0xbe/0x1e0 [ 221.807877] ? security_sb_copy_data+0x81/0xb0 [ 221.812439] mount_fs+0x66/0x2d0 [ 221.815792] vfs_kern_mount.part.26+0xc6/0x4a0 [ 221.820370] ? may_umount+0xa0/0xa0 [ 221.823993] ? _raw_read_unlock+0x22/0x30 [ 221.828125] ? __get_fs_type+0x8a/0xc0 [ 221.831992] do_mount+0xea4/0x2bb0 [ 221.835517] ? copy_mount_string+0x40/0x40 [ 221.839733] ? rcu_pm_notify+0xc0/0xc0 [ 221.843602] ? copy_mount_options+0x5f/0x2e0 [ 221.847989] ? rcu_read_lock_sched_held+0x108/0x120 [ 221.853000] ? kmem_cache_alloc_trace+0x459/0x740 [ 221.857829] ? kasan_check_write+0x14/0x20 [ 221.862054] ? _copy_from_user+0x99/0x110 [ 221.866202] ? copy_mount_options+0x1f7/0x2e0 [ 221.870683] SyS_mount+0xab/0x120 [ 221.874120] ? copy_mnt_ns+0xb30/0xb30 [ 221.877986] do_syscall_64+0x281/0x940 [ 221.881864] ? vmalloc_sync_all+0x30/0x30 [ 221.886001] ? _raw_spin_unlock_irq+0x27/0x70 [ 221.890486] ? finish_task_switch+0x1c1/0x7e0 [ 221.894969] ? syscall_return_slowpath+0x550/0x550 [ 221.899892] ? syscall_return_slowpath+0x2ac/0x550 [ 221.904812] ? prepare_exit_to_usermode+0x350/0x350 [ 221.909828] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 221.915189] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 221.920045] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 221.925213] RIP: 0033:0x454e79 [ 221.928399] RSP: 002b:00007fbfd4b96c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 221.936103] RAX: ffffffffffffffda RBX: 00007fbfd4b976d4 RCX: 0000000000454e79 [ 221.943365] RDX: 0000000020000100 RSI: 0000000020000180 RDI: 0000000020000100 [ 221.950625] RBP: 000000000072bea0 R08: 0000000020000040 R09: 0000000000000000 [ 221.957872] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 221.965123] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000000a [ 221.980500] FAULT_INJECTION: forcing a failure. [ 221.980500] name failslab, interval 1, probability 0, space 0, times 0 [ 221.991735] CPU: 1 PID: 15931 Comm: syz-executor2 Not tainted 4.16.0-rc6+ #43 [ 221.998983] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 222.008311] Call Trace: [ 222.010877] dump_stack+0x194/0x24d [ 222.014501] ? arch_local_irq_restore+0x53/0x53 [ 222.019153] should_fail+0x8c0/0xa40 [ 222.022843] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 222.027921] ? lock_release+0xa40/0xa40 [ 222.031873] ? unwind_dump+0x4d0/0x4d0 [ 222.035739] ? find_held_lock+0x35/0x1d0 [ 222.039784] ? check_same_owner+0x320/0x320 [ 222.044082] ? rcu_note_context_switch+0x710/0x710 [ 222.048993] should_failslab+0xec/0x120 [ 222.052945] kmem_cache_alloc+0x47/0x760 [ 222.056988] ? map_files_get_link+0x3a0/0x3a0 [ 222.061466] getname_flags+0xcb/0x580 [ 222.065243] user_path_at_empty+0x2d/0x50 [ 222.069370] do_mount+0x15f/0x2bb0 [ 222.072889] ? copy_mount_string+0x40/0x40 [ 222.077109] ? rcu_pm_notify+0xc0/0xc0 [ 222.080982] ? copy_mount_options+0x5f/0x2e0 [ 222.085363] ? rcu_read_lock_sched_held+0x108/0x120 [ 222.090352] ? kmem_cache_alloc_trace+0x459/0x740 [ 222.095169] ? kasan_check_write+0x14/0x20 [ 222.099378] ? _copy_from_user+0x99/0x110 [ 222.103504] ? copy_mount_options+0x1f7/0x2e0 [ 222.107976] SyS_mount+0xab/0x120 [ 222.111401] ? copy_mnt_ns+0xb30/0xb30 [ 222.115266] do_syscall_64+0x281/0x940 [ 222.119129] ? vmalloc_sync_all+0x30/0x30 [ 222.123253] ? _raw_spin_unlock_irq+0x27/0x70 [ 222.127724] ? finish_task_switch+0x1c1/0x7e0 [ 222.132193] ? syscall_return_slowpath+0x550/0x550 [ 222.137104] ? syscall_return_slowpath+0x2ac/0x550 [ 222.142013] ? prepare_exit_to_usermode+0x350/0x350 [ 222.147014] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 222.152361] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 222.157179] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 222.162341] RIP: 0033:0x454e79 [ 222.165507] RSP: 002b:00007f3ee2ac1c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 222.173190] RAX: ffffffffffffffda RBX: 00007f3ee2ac26d4 RCX: 0000000000454e79 [ 222.180434] RDX: 0000000020000100 RSI: 0000000020000180 RDI: 0000000020000100 [ 222.187676] RBP: 000000000072bea0 R08: 0000000020000040 R09: 0000000000000000 [ 222.194920] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 222.202163] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000003 [ 222.211978] devpts: called with bogus options 2018/03/31 08:26:05 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) socketpair(0x0, 0x4, 0x6, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000000)=0x5) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) socketpair(0xf, 0x3, 0x2, &(0x7f0000000040)) 2018/03/31 08:26:05 executing program 1: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000c00)) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f00000000c0)={0xffffffffffffffff}) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)={&(0x7f0000000a80)='./file0/file0\x00', 0x0, 0x8}, 0x10) mount(&(0x7f0000000b40)='./file0/file0\x00', &(0x7f0000000bc0)='./file0\x00', &(0x7f0000000d00)='fuse\x00', 0x10000, &(0x7f0000000c40)="fe9c2685edd00fbb01c9aa30e10eb048d5888829ca4f67451184d11ce1885593cf3725c6a92c7e5e8e054bb66b28e8a6aa43e7573fc9684c0c2a36258393aee873cbd0f25addb536dbfb89eb34cac74ca7e776a78d013a4eb736222485ae0b5e92e42c6938879d963bdf0300fc4ebfc5c7d91db457c5a57edfc2661deb6ba3825ddef8ff6d2dc7a1a647cf24436051b320e692fa8f053f510fdd587656f1c2639e03049fa276ed") recvmsg(r1, &(0x7f0000000240)={&(0x7f00000002c0)=@un=@abs, 0x80, &(0x7f0000000700)=[{&(0x7f0000000100)=""/54, 0x36}, {&(0x7f0000000500)=""/194, 0xc2}, {&(0x7f0000000340)=""/111, 0x6f}, {&(0x7f0000000600)=""/199, 0xc7}, {&(0x7f0000000180)=""/56, 0x38}, {&(0x7f0000000400)=""/142, 0x8e}, {&(0x7f00000007c0)=""/228, 0xe4}], 0x7, &(0x7f00000008c0)=""/244, 0xf4, 0x40}, 0x10001) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={0xffffffffffffffff, &(0x7f0000000700), &(0x7f00000009c0)=""/161}, 0x18) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)) 2018/03/31 08:26:05 executing program 3 (fault-call:10 fault-nth:11): r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000348f88)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r2}, 0x10) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) mount(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f00000002c0)='devpts\x00', 0x800000, &(0x7f0000000300)) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') 2018/03/31 08:26:05 executing program 7: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x80000000000, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000001fc0)) sendmsg(0xffffffffffffffff, &(0x7f00000024c0)={&(0x7f0000002040)=@un=@file={0x0, './file0\x00'}, 0x80, &(0x7f0000001f40)=[{&(0x7f00000020c0)="73c7575b94a72990e177f86ed4835a72a65c1a6c6831eeb0c48163a47ab63bcb605c8450cc4798ff6521c2aa722d1a7105c8a07e6c", 0x35}], 0x1, &(0x7f0000002500)=ANY=[], 0x0, 0x40000}, 0x20000000) r2 = gettid() r3 = perf_event_open(&(0x7f0000001ac0)={0x1, 0x70, 0xffffffff, 0x835, 0x9, 0xffffffffffffff5f, 0x0, 0x1000, 0x42000, 0x3, 0x8, 0x80, 0x1, 0x4, 0x100000001, 0x9, 0xff, 0x8, 0x1000, 0x7, 0x7f, 0x200, 0xb715, 0x3, 0x7fffffff, 0xf0a, 0x40, 0x8000, 0x8, 0x7, 0xffffffffffffff74, 0x4, 0x6, 0x100, 0x7, 0x335, 0x3ff, 0x58, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000001a80), 0xe}, 0x0, 0x80000000, 0x82, 0x7, 0x0, 0x3, 0x80000001}, r2, 0xd, r1, 0x8) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000200)='mqueue\x00', 0x0, &(0x7f000000a000)) r4 = getpid() r5 = bpf$PROG_LOAD(0x5, &(0x7f0000002500)={0xf, 0x7, &(0x7f0000001940)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, [@ldst={0x3, 0x3, 0x3, 0x4, 0x3, 0x2, 0xffffffffffffffff}, @exit={0x95}], {0x95}}, &(0x7f0000001980)='GPL\x00', 0xff, 0x1000, &(0x7f00000039c0)=""/4096, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000019c0)={&(0x7f0000000180)='./file0\x00', r5}, 0x10) perf_event_open(&(0x7f0000001a00)={0x0, 0x70, 0x0, 0x8, 0x0, 0x3, 0x0, 0xb8, 0x1000, 0x0, 0x3, 0x4, 0xfff, 0x4, 0x4dae, 0x40, 0x100000001, 0x6, 0x4, 0x0, 0x3, 0x753c, 0x6, 0x100, 0x1de, 0x6, 0x4, 0x1, 0x6, 0x4, 0x7, 0x3, 0x7fff, 0x80000000, 0x3, 0x8, 0x81, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x7, 0x4}, 0x801, 0x400, 0x1, 0x4, 0x1, 0x9, 0x80000001}, r4, 0x7, r1, 0xb) r6 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000004000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000001c00)='./file0\x00', &(0x7f0000001c40)='./file0\x00', &(0x7f0000001c80)='devpts\x00', 0x40, &(0x7f0000001cc0)="be623dfd58807ac0b2f86f052863a5f30adc0bce173ebcf648cefd7d64732aeb5b94e6af3ab33e53669ba6d304d067dad4b1ff3ed87f18fd170aac904e8f105e80e22881717c98752a9cd7cfb06d102877e3b36b2624d22427331755a9514b225d25999ed605ffe4188630db2e7ddcc57f6316b60c4f3845d9dfcbbde5e49af627b48d7c9bd743b536de31a9ba3010cb6714c9b90a50537be55ca12a18e6541bff5a82d293e7734ea9c90707899663bd96b3bcce5887bf0bd35963c5adc39ddcb6f2a0a02b01661242046cb54ef1aec5a486b69e006305064124867bf79f4dc11798e214b61575168b79887122e0a3461f703c077f902c0a") socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r7, &(0x7f0000001800)={&(0x7f0000000240)=@alg, 0x80, &(0x7f0000000740)=[{&(0x7f00000002c0)=""/83, 0x53}, {&(0x7f0000000340)=""/27, 0x1b}, {&(0x7f0000000380)}, {&(0x7f00000003c0)=""/40, 0x28}, {&(0x7f0000000400)=""/144, 0x90}, {&(0x7f00000004c0)=""/200, 0xc8}, {&(0x7f00000005c0)=""/60, 0x3c}, {&(0x7f0000000600)=""/105, 0x69}, {&(0x7f0000000680)=""/127, 0x7f}, {&(0x7f0000000700)=""/8, 0x8}], 0xa, &(0x7f0000000800)=""/4096, 0x1000}, 0x10000) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000002340)=0xf60) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000003900)={&(0x7f0000003400)=@can={0x0, 0x0}, 0x80, &(0x7f0000003840)=[{&(0x7f0000003480)=""/194, 0xc2}, {&(0x7f0000003580)=""/250, 0xfa}, {&(0x7f0000003680)=""/100, 0x64}, {&(0x7f0000003700)=""/14, 0xe}, {&(0x7f0000003740)=""/159, 0x9f}, {&(0x7f0000003800)=""/15, 0xf}], 0x6, &(0x7f00000038c0)=""/29, 0x1d, 0x5}, 0x3) bpf$PROG_LOAD(0x5, &(0x7f0000003940)={0x4, 0x9, &(0x7f0000001840)=ANY=[@ANYBLOB="18000000030000000000000003000000dfd00c00fcffffff0000000000000000000803000101000000810000000000000001f0fff0ffffff000000000000000095000000000017d2"], &(0x7f0000000380)='GPL\x00', 0xf172, 0x4b, &(0x7f00000018c0)=""/75, 0x41f00, 0x1, [], r8}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000000c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001f00)={0xffffffffffffffff, 0x0, 0xf6, 0x22, &(0x7f0000001dc0)="9ef9482ea02fd36d0a768986a7ebe7a627dc88937e7073e3521858dfa0d5e02f571a01cfdfa76e048e5f956ea5da60b90e02a6c3d3687ed61ec9ab5b682c02498bddef38de9ce8c753e41e78f414d16202a033b6c7752711a5f56924e7846d6dcde2f71026e1eb0319b5e60f6b1ec67fca31c3cf1691d3af91a19f56be5a10ff337a53ba13dd3d75e1555211954b92ec0082d02b7b4cdddc021cbe84e4af8f20788977e3416918843e6c92b2ebf7b8b33ecbd4c7c9a9d5036c3e3e538748a32f1a28eb77818ca1878ffdd445dcdb8a40e6221e0fc474428449dfe93c62bbc69996aa9b34488c1da4f6f7c2275305a6a4fb256c1a516d", &(0x7f0000001ec0)=""/34, 0x1f, 0x1}, 0x28) close(r6) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x3441, &(0x7f0000000080)) mount(&(0x7f00000021c0)='./file0/file0\x00', &(0x7f0000002200)='./file0/file0\x00', &(0x7f0000002240)='fuse\x00', 0x2000000, &(0x7f0000002280)="9b3923bfddc346e9fa2aeaffae6ca386d8d50ba83ab72218340d3c30c045a89ac016797652ba04f1a203cfceccb458dbfd9fd03c4a80ef9a40dc7a4f24b6619d04a58186466fd8465757d9ee053c082cdfa957e7efab6191761847cca59c017493ef5e3d22432cf0b4ebef") ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f00000023c0)=ANY=[@ANYBLOB="07000000000000000000000000000000000000000000000000000000000000000000000067eb0ecf1cfa4ffd89aa7e339417beb7d332a5c996e59875644dd1e3a690110400bc751bb0435977d90fcbb2b83c27812d818991d125e9c0f199be2bc7f01aa0a5cb9b9f99438aa0f1ae3d50201f7bb276536f567f03f062994da292b6db0000000000000000000000000000a93536f303000000000000002a27f6ae1258ebb5079c1bab4f1f6f11ee8ce2e590855a3af38e4bb871ef8400000000000000000000"]) mount(&(0x7f0000001b40)='./file0\x00', &(0x7f0000001b80)='./file0/file0\x00', &(0x7f0000002100)='vfat\x00', 0x0, &(0x7f0000002140)="98980e21ac8b46c0b7bedeee39e6bd9ae4088d6ab47dc9dc76a39e299ce3783aa33e482e450484961fd3e3c5b178fafbe54440e19512ea4298652ed129d4241d9d116d8a5c2b931d350f0c989f8a288fc9e56c") mount(&(0x7f0000df7000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='hugetlbfs\x00', 0x200, &(0x7f00000001c0)) mkdir(&(0x7f00000004c0)='./file0/file0\x00', 0x0) socketpair$inet(0x2, 0x0, 0x1f, &(0x7f0000000080)) 2018/03/31 08:26:05 executing program 2 (fault-call:9 fault-nth:4): r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000348f88)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r2}, 0x10) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') 2018/03/31 08:26:05 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000348f88)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) socketpair(0x0, 0x4, 0x6, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000480)={&(0x7f0000000440)='./file0\x00'}, 0x10) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0x3) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x0, 0x8}, 0x10) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x1) socketpair(0x9, 0x3, 0x2, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f00000005c0)={0x1, 0x0, [0x0]}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x1d07) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg(r1, &(0x7f0000000140)={&(0x7f0000000080)=@in={0x0, 0x0, @multicast2}, 0x80, &(0x7f0000000100)=[{&(0x7f00000001c0)=""/129, 0x81}, {&(0x7f0000000280)=""/150, 0x96}], 0x2, &(0x7f0000000340)=""/245, 0xf5, 0x4}, 0x40000000) 2018/03/31 08:26:05 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1, 0x80000000}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x0, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000200)={0xffffffffffffff9c, 0x50, &(0x7f0000000280)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)=r4, 0x4) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r5 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, 0xffffffffffffffff) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000380)) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0xff, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f00000009c0)="3949bcf20271c219f64b9e3fbd45bfae692375440912d5a576c2d82299018de50363f2cf30a439b45c2738869283b7900c1e030013700557a768d5cc05cb9ed624684f4dfdae73a8148b29b2978222576dabbcb3556bcf35a8f66fa68ceb0b834ec5120ac749dc0cc5aab7b0197711785349b1673ff5159bc1a40df6c779950e0747a25ce77a10f68b663a87fc993224a79b583eac02a2171f076ff3", 0x1000, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) 2018/03/31 08:26:05 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000000003042df8700"]) r1 = perf_event_open(&(0x7f0000348f88)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x0, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r2}, 0x10) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) mount(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f00000002c0)='devpts\x00', 0x800000, &(0x7f0000000300)="7b18f1563c67659c49445440cbb57f32c0f4710f0219046399f3e8a25c5d4975e2b42f404b14937bd42d9874bdd132eef77f584d5151c9a97470a0d77a0c24a85e319673350e16b039bf474ec320") socketpair(0x3, 0x800, 0x81, &(0x7f00000003c0)) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') [ 222.600683] FAULT_INJECTION: forcing a failure. [ 222.600683] name failslab, interval 1, probability 0, space 0, times 0 [ 222.612012] CPU: 1 PID: 15962 Comm: syz-executor3 Not tainted 4.16.0-rc6+ #43 [ 222.619281] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 222.628622] Call Trace: [ 222.630474] FAULT_INJECTION: forcing a failure. [ 222.630474] name failslab, interval 1, probability 0, space 0, times 0 [ 222.631205] dump_stack+0x194/0x24d [ 222.631222] ? arch_local_irq_restore+0x53/0x53 [ 222.631243] should_fail+0x8c0/0xa40 [ 222.631257] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 222.631268] ? find_next_zero_bit+0xe3/0x110 [ 222.631278] ? trace_hardirqs_off+0x10/0x10 [ 222.631291] ? __lock_is_held+0xb6/0x140 [ 222.672202] ? find_held_lock+0x35/0x1d0 [ 222.676255] ? __lock_is_held+0xb6/0x140 [ 222.680309] ? check_same_owner+0x320/0x320 [ 222.684617] ? rcu_note_context_switch+0x710/0x710 [ 222.689532] ? rcu_note_context_switch+0x710/0x710 [ 222.694454] should_failslab+0xec/0x120 [ 222.698411] __kmalloc+0x63/0x760 [ 222.701848] ? lockdep_init_map+0x9/0x10 [ 222.705889] ? debug_mutex_init+0x2d/0x60 [ 222.710020] ? __list_lru_init+0xcf/0x750 [ 222.714154] __list_lru_init+0xcf/0x750 [ 222.718115] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 222.723983] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 222.728982] ? __lockdep_init_map+0xe4/0x650 [ 222.733375] ? lockdep_init_map+0x9/0x10 [ 222.737420] sget_userns+0x691/0xe40 [ 222.741117] ? kernfs_sop_show_path+0x190/0x190 [ 222.745772] ? kernfs_sop_show_options+0x180/0x180 [ 222.750687] ? destroy_unused_super.part.6+0xd0/0xd0 [ 222.755780] ? check_same_owner+0x320/0x320 [ 222.760087] ? rcu_pm_notify+0xc0/0xc0 [ 222.763967] ? rcu_read_lock_sched_held+0x108/0x120 [ 222.768965] ? kmem_cache_alloc_trace+0x459/0x740 [ 222.773792] ? lock_downgrade+0x980/0x980 [ 222.777928] kernfs_mount_ns+0x13d/0x8b0 [ 222.781979] ? kernfs_super_ns+0x70/0x70 [ 222.786031] sysfs_mount+0xc2/0x1c0 [ 222.789641] ? sysfs_kill_sb+0x40/0x40 [ 222.793513] ? alloc_pages_current+0xbe/0x1e0 [ 222.797994] ? security_sb_copy_data+0x81/0xb0 [ 222.802565] mount_fs+0x66/0x2d0 [ 222.805918] vfs_kern_mount.part.26+0xc6/0x4a0 [ 222.810485] ? may_umount+0xa0/0xa0 [ 222.814097] ? _raw_read_unlock+0x22/0x30 [ 222.818227] ? __get_fs_type+0x8a/0xc0 [ 222.822103] do_mount+0xea4/0x2bb0 [ 222.825630] ? copy_mount_string+0x40/0x40 [ 222.829849] ? rcu_pm_notify+0xc0/0xc0 [ 222.833741] ? copy_mount_options+0x5f/0x2e0 [ 222.838131] ? rcu_read_lock_sched_held+0x108/0x120 [ 222.843131] ? kmem_cache_alloc_trace+0x459/0x740 [ 222.847961] ? kasan_check_write+0x14/0x20 [ 222.852182] ? copy_mount_options+0x1f7/0x2e0 [ 222.856665] SyS_mount+0xab/0x120 [ 222.860100] ? copy_mnt_ns+0xb30/0xb30 [ 222.863972] do_syscall_64+0x281/0x940 [ 222.867843] ? vmalloc_sync_all+0x30/0x30 [ 222.871976] ? _raw_spin_unlock_irq+0x27/0x70 [ 222.876453] ? finish_task_switch+0x1c1/0x7e0 [ 222.880933] ? syscall_return_slowpath+0x550/0x550 [ 222.885872] ? syscall_return_slowpath+0x2ac/0x550 [ 222.890785] ? prepare_exit_to_usermode+0x350/0x350 [ 222.895784] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 222.901144] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 222.905977] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 222.911147] RIP: 0033:0x454e79 [ 222.914321] RSP: 002b:00007fbfd4b96c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 222.922015] RAX: ffffffffffffffda RBX: 00007fbfd4b976d4 RCX: 0000000000454e79 [ 222.929358] RDX: 0000000020000100 RSI: 0000000020000180 RDI: 0000000020000100 [ 222.936610] RBP: 000000000072bea0 R08: 0000000020000040 R09: 0000000000000000 [ 222.943862] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 2018/03/31 08:26:05 executing program 1: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x5, 0x9, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd91f}, [@call={0x85, 0x0, 0x0, 0x7}, @ldst={0x2, 0x3, 0x7, 0x0, 0x7, 0xfffffff0, 0xfffffffffffffffc}, @generic={0x55, 0xc44, 0x793, 0x7ff}], {0x95}}, &(0x7f0000000180)='GPL\x00', 0x98, 0xd0, &(0x7f00000002c0)=""/208, 0x0, 0x1}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000980)={r1, 0x50, &(0x7f0000000900)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000240)={r1, 0x50, &(0x7f0000000500)}, 0x10) socketpair$inet(0x2, 0x7, 0x9, &(0x7f0000000480)={0xffffffffffffffff}) sendmsg(r2, &(0x7f00000008c0)={&(0x7f0000000580)=@pppoe={0x18, 0x0, {0x0, @random="ce60c8c7c68a", 'vlan0\x00'}}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000600)="046537dc425ae0ce482ccd223580f22e42f1eb42d229a27bebc728760ef09607fc849d3c5a9f184d53f6126efe161e7b2bb1d29211245e6d5c5ef92553226658a03f3b11af825e4d15383673f6e4a37950c1940cbce5c80fc3e8767ac08b46354359a0687bad45db7fbe5a20ea3baac20b2f0d3770cfa92d7cc0d4cfd040d20fa700d472b6737469c45fd5002fe2770ed2d10edf50c38fb857125979b164a3c7a362ee080fdf2b57098ad0c559c5f37d1825e27ba9a888ab4513408668cfc692387bc33024b79ef76982d5824473346c00c0df6e6b0e37a3981a7df3ec0e2b8e70660bd061ce4ed12c71d897085170a96aa2b1", 0xf3}, {&(0x7f0000000700)="3d1426fa2de39b583c1a799ad1bf3164bd4e36a5da4b98a6b0545e87d49d5da3eb865e2cd73119d9a0a9dbd4ec35d29a11f30ac8f7f15e9b928344f06f4f6d2eb47cce842ff29b5933e0e5c7d29848399f2598bc14951c49d8d072b63223687be80afbe450183a74f333623f", 0x6c}, {&(0x7f00000007c0)="b1c014ab6e8ea3aadd97acf7eab8a0389867e9da0c7d260629452e9cfc752c159f3200d5e87e8b9d2c45263194724503d91158ea62f27bff457431cf675aea93ba9e91f3ea8f1e123b1081040a6e426194c21ec536fe976ffb412e6ebf99da7c3dee502ba9d8e341e2b5fb8aa01232fb06f0459fa16c1890e4c2942358fbec2fee5e1d75d34917cbaf796fc9d194a311c268b5d8ed0f84b66fe5", 0x9a}], 0x3, &(0x7f0000000bc0)=[{0x58, 0x10b, 0x7, "dc255006396b48d092e802452b9b1356c2884bb0fb5a7b80a4f46b2d13d83b0deeb136d73e012e1c4792f46a6e7a06288f474df255275ad4569fb045f2a8e875564ea72285dc1d71"}, {0xe0, 0x10f, 0x7fff, "d5d7ed0f65c35bb65328b1724dba672176542a5a6ddb63909635b61ab9cd2db4f36e55dc923880372d038f94044063a9c7ad48be27c3906e324778b1f04eab7ed1d3ad57b35c70a6ff9b29eff62a18ab2029eef750a067a1b7d30699d3c757b747640faadd4108fa45f558b85937ebf17aeea612ed0d977da769acb21123870a32a0e6a4b17965ae64004118bfc739a2f62a09cb80b2edd6cde6a2917d131d366c3383ab21a1930ce278df490f34d97e18ebb92a6e4172548373f6cf44f4179871e60c01b6a0a03c941de8d9"}, {0xe8, 0x102, 0x986, "abf2b900dac06166ae6839eca960423b9aebdfbf9899bd9cc0ca0cdec3ddc56cecd5cc11af8bc19c20aedda37148963ea5c8ab1b45143cb153a9744bb2514abae22a5aca4ced6342f66389fcf57fce6e588e2715b64c5172a462bdc30b46b44ebb5cf52bee382149719a4690f8c7e9292a46dd94fac91f1d3404f616d29b666c8a4fb36364e95d7bea38c3a0b7644bd62f5b7de3307fbe4170e89da811c71b15776cfb82fd87d4e766a7044545ede37ffc3307d9f838541b7c78a4c0b50a63c7a1df00878df197a1fde1bec36a11a5d866"}, {0xc0, 0xff, 0x2, "95176e3f67ca0b79e7db8b3ea39818f368f719bf6d1c2c66b5d884407fb7aba3e212f2fb4042a9acadcc9b9b20d918e84a494d2d78761bc2be6979498933fa517afb555e38304a1fa24ea59a9983736f8fa5c86c1a252135b1f162b5c42de5f140c6a5b6733251fc8b3466f610962dd44e68b6e06422f6ef180c01232b657012aa1cf15fed4874811e6f62a9a278cc78b95d7351395c3630b344d310befe66e2a7d1d8ffc7d889ade5417c4e95f4f5"}, {0x50, 0x107, 0x1, "c2001dcb0ad4d01493307b1bf5e10be57637b05e33b2b0c6c530e092fe49180700ffc260319c94ae662c09d55b15c774e4f727a4b726ef2acf581c25"}, {0xe0, 0x114, 0xb9, "ecd80e63d1b35dab6c85cca6f9b65f8cb55a7258763aadbf63324113762f1d87be065505b03d1486d919c7fb0b4ab1589148948c57a9a442eac46d93d53d160322b3cafb3b03455cbd543b7c967ff6667dfd9b9de86b1ba82a69b1837f19b26e2d9afee63bc09d991704f6e6794e3614f1f3f66746f3075039d69230e6130cb288c35e6b58b10f15aff0f3cc6389dacda9fe537c339b88345340b70820456242d9567c3a39bd2631034262cf95addeac448519196f3d6da135c82b55b800e89e6a6ec6ae23e834e4ef07"}, {0x98, 0x0, 0x9, "af4a894d7033fb2c8402d1d7156d89d07695e0baa60e32ee38e4aaa236db3f5ef3f3ff865ca408dfc147c2ec2be640a1f483913bb2152d33df102186ef8e8d9073aea7e2b9294fb64b653a26472a5d6c3a748bb119bbe52fc9e75e96c58c044b43e83039488db212ff5027c72afd52fd9ff01f4a844372525e2a773bf7c1e51ddca1136931559cf6"}, {0xf0, 0x10e, 0x7, "04b376959005f4f0261731a5d625b3bd5357ed044ef088366531f9daf604e5f2a7889cb3fe06712d51bf2cf4fcd2118ce3cfccd2d318693c5596842c47a553b2b564e6a8d7a2e651a2a3b9d2d27e1fe9555ede5be3f4a41894c292d0ed0a2bcf8ca28f692c692f21664f2dbdecd324a61346de24fcfb08321ae67e12e17602e89d93fece8ea25dd5267a9e50cecafd21b0f217ea5a5206fff6e21184deac185ebacb893441e5852d563cb80f3e421acf463c267774164bfee9e4f19b83be09ab6890b3c82f6000147e17eaec0c5a3efe39bea3b819bba890fa83f2"}], 0x598, 0x4000}, 0x20000001) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={0xffffffffffffffff, &(0x7f0000000700), &(0x7f00000009c0)=""/161}, 0x18) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)) [ 222.951113] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000000b [ 222.958384] CPU: 0 PID: 15967 Comm: syz-executor2 Not tainted 4.16.0-rc6+ #43 [ 222.965658] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 222.975007] Call Trace: [ 222.977596] dump_stack+0x194/0x24d [ 222.981227] ? arch_local_irq_restore+0x53/0x53 [ 222.984779] devpts: called with bogus options [ 222.985898] should_fail+0x8c0/0xa40 [ 222.985913] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 222.985931] ? lock_release+0xa40/0xa40 [ 222.999472] hugetlbfs: Bad mount option: "" [ 223.003150] ? unwind_dump+0x4d0/0x4d0 [ 223.003169] ? find_held_lock+0x35/0x1d0 [ 223.003198] ? check_same_owner+0x320/0x320 [ 223.003213] ? rcu_note_context_switch+0x710/0x710 [ 223.003229] should_failslab+0xec/0x120 [ 223.003241] kmem_cache_alloc+0x47/0x760 [ 223.003255] ? find_held_lock+0x35/0x1d0 [ 223.036819] getname_flags+0xcb/0x580 [ 223.040654] user_path_at_empty+0x2d/0x50 [ 223.044792] do_mount+0x15f/0x2bb0 [ 223.048318] ? copy_mount_string+0x40/0x40 [ 223.052535] ? rcu_pm_notify+0xc0/0xc0 [ 223.056410] ? copy_mount_options+0x5f/0x2e0 [ 223.060799] ? rcu_read_lock_sched_held+0x108/0x120 [ 223.065796] ? kmem_cache_alloc_trace+0x459/0x740 [ 223.070621] ? kasan_check_write+0x14/0x20 [ 223.074842] ? copy_mount_options+0x1f7/0x2e0 [ 223.079322] SyS_mount+0xab/0x120 [ 223.082757] ? copy_mnt_ns+0xb30/0xb30 [ 223.086627] do_syscall_64+0x281/0x940 [ 223.090496] ? vmalloc_sync_all+0x30/0x30 [ 223.094623] ? _raw_spin_unlock_irq+0x27/0x70 [ 223.099102] ? finish_task_switch+0x1c1/0x7e0 [ 223.103578] ? syscall_return_slowpath+0x550/0x550 [ 223.108489] ? syscall_return_slowpath+0x2ac/0x550 [ 223.113397] ? prepare_exit_to_usermode+0x350/0x350 [ 223.118393] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 223.123742] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 223.128569] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 223.133737] RIP: 0033:0x454e79 [ 223.136904] RSP: 002b:00007f3ee2ac1c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 223.144595] RAX: ffffffffffffffda RBX: 00007f3ee2ac26d4 RCX: 0000000000454e79 2018/03/31 08:26:06 executing program 7: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x80000000000, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000001fc0)) sendmsg(0xffffffffffffffff, &(0x7f00000024c0)={&(0x7f0000002040)=@un=@file={0x0, './file0\x00'}, 0x80, &(0x7f0000001f40)=[{&(0x7f00000020c0)="73c7575b94a72990e177f86ed4835a72a65c1a6c6831eeb0c48163a47ab63bcb605c8450cc4798ff6521c2aa722d1a7105c8a07e6c", 0x35}], 0x1, &(0x7f0000002500)=ANY=[], 0x0, 0x40000}, 0x20000000) r2 = gettid() r3 = perf_event_open(&(0x7f0000001ac0)={0x1, 0x70, 0xffffffff, 0x835, 0x9, 0xffffffffffffff5f, 0x0, 0x1000, 0x42000, 0x3, 0x8, 0x80, 0x1, 0x4, 0x100000001, 0x9, 0xff, 0x8, 0x1000, 0x7, 0x7f, 0x200, 0xb715, 0x3, 0x7fffffff, 0xf0a, 0x40, 0x8000, 0x8, 0x7, 0xffffffffffffff74, 0x4, 0x6, 0x100, 0x7, 0x335, 0x3ff, 0x58, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000001a80), 0xe}, 0x0, 0x80000000, 0x82, 0x7, 0x5, 0x0, 0x80000001}, r2, 0xd, r1, 0x8) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000200)='mqueue\x00', 0x0, &(0x7f000000a000)) r4 = getpid() r5 = bpf$PROG_LOAD(0x5, &(0x7f0000002500)={0xf, 0x7, &(0x7f0000001940)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, [@ldst={0x3, 0x3, 0x3, 0x4, 0x3, 0x2, 0xffffffffffffffff}, @exit={0x95}], {0x95}}, &(0x7f0000001980)='GPL\x00', 0xff, 0x1000, &(0x7f00000039c0)=""/4096, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000019c0)={&(0x7f0000000180)='./file0\x00', r5}, 0x10) perf_event_open(&(0x7f0000001a00)={0x0, 0x70, 0x0, 0x8, 0x0, 0x3, 0x0, 0xb8, 0x1000, 0x0, 0x3, 0x4, 0xfff, 0x4, 0x4dae, 0x40, 0x100000001, 0x6, 0x4, 0x0, 0x3, 0x753c, 0x6, 0x100, 0x1de, 0x6, 0x4, 0x1, 0x6, 0x4, 0x7, 0x3, 0x7fff, 0x80000000, 0x3, 0x8, 0x81, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x7, 0x4}, 0x801, 0x400, 0x1, 0x4, 0x1, 0x9, 0x80000001}, r4, 0x7, r1, 0xb) r6 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000004000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000001c00)='./file0\x00', &(0x7f0000001c40)='./file0\x00', &(0x7f0000001c80)='devpts\x00', 0x40, &(0x7f0000001cc0)="be623dfd58807ac0b2f86f052863a5f30adc0bce173ebcf648cefd7d64732aeb5b94e6af3ab33e53669ba6d304d067dad4b1ff3ed87f18fd170aac904e8f105e80e22881717c98752a9cd7cfb06d102877e3b36b2624d22427331755a9514b225d25999ed605ffe4188630db2e7ddcc57f6316b60c4f3845d9dfcbbde5e49af627b48d7c9bd743b536de31a9ba3010cb6714c9b90a50537be55ca12a18e6541bff5a82d293e7734ea9c90707899663bd96b3bcce5887bf0bd35963c5adc39ddcb6f2a0a02b01661242046cb54ef1aec5a486b69e006305064124867bf79f4dc11798e214b61575168b79887122e0a3461f703c077f902c0a") socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r7, &(0x7f0000001800)={&(0x7f0000000240)=@alg, 0x80, &(0x7f0000000740)=[{&(0x7f00000002c0)=""/83, 0x53}, {&(0x7f0000000340)=""/27, 0x1b}, {&(0x7f0000000380)}, {&(0x7f00000003c0)=""/40, 0x28}, {&(0x7f0000000400)=""/144, 0x90}, {&(0x7f00000004c0)=""/200, 0xc8}, {&(0x7f00000005c0)=""/60, 0x3c}, {&(0x7f0000000600)=""/105, 0x69}, {&(0x7f0000000680)=""/127, 0x7f}, {&(0x7f0000000700)=""/8, 0x8}], 0xa, &(0x7f0000000800)=""/4096, 0x1000}, 0x10000) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000002340)=0xf60) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000003900)={&(0x7f0000003400)=@can={0x0, 0x0}, 0x80, &(0x7f0000003840)=[{&(0x7f0000003480)=""/194, 0xc2}, {&(0x7f0000003580)=""/250, 0xfa}, {&(0x7f0000003680)=""/100, 0x64}, {&(0x7f0000003700)=""/14, 0xe}, {&(0x7f0000003740)=""/159, 0x9f}, {&(0x7f0000003800)=""/15, 0xf}], 0x6, &(0x7f00000038c0)=""/29, 0x1d, 0x5}, 0x3) bpf$PROG_LOAD(0x5, &(0x7f0000003940)={0x4, 0x9, &(0x7f0000001840)=ANY=[@ANYBLOB="18000000030000000000000003000000dfd00c00fcffffff0000000000000000000803000101000000810000000000000001f0fff0ffffff000000000000000095000000000017d2"], &(0x7f0000000380)='GPL\x00', 0xf172, 0x4b, &(0x7f00000018c0)=""/75, 0x41f00, 0x1, [], r8}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000000c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001f00)={0xffffffffffffffff, 0x0, 0xf6, 0x22, &(0x7f0000001dc0)="9ef9482ea02fd36d0a768986a7ebe7a627dc88937e7073e3521858dfa0d5e02f571a01cfdfa76e048e5f956ea5da60b90e02a6c3d3687ed61ec9ab5b682c02498bddef38de9ce8c753e41e78f414d16202a033b6c7752711a5f56924e7846d6dcde2f71026e1eb0319b5e60f6b1ec67fca31c3cf1691d3af91a19f56be5a10ff337a53ba13dd3d75e1555211954b92ec0082d02b7b4cdddc021cbe84e4af8f20788977e3416918843e6c92b2ebf7b8b33ecbd4c7c9a9d5036c3e3e538748a32f1a28eb77818ca1878ffdd445dcdb8a40e6221e0fc474428449dfe93c62bbc69996aa9b34488c1da4f6f7c2275305a6a4fb256c1a516d", &(0x7f0000001ec0)=""/34, 0x1f, 0x1}, 0x28) close(r6) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x3441, &(0x7f0000000080)) mount(&(0x7f00000021c0)='./file0/file0\x00', &(0x7f0000002200)='./file0/file0\x00', &(0x7f0000002240)='fuse\x00', 0x2000000, &(0x7f0000002280)="9b3923bfddc346e9fa2aeaffae6ca386d8d50ba83ab72218340d3c30c045a89ac016797652ba04f1a203cfceccb458dbfd9fd03c4a80ef9a40dc7a4f24b6619d04a58186466fd8465757d9ee053c082cdfa957e7efab6191761847cca59c017493ef5e3d22432cf0b4ebef") ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f00000023c0)=ANY=[@ANYBLOB="07000000000000000000000000000000000000000000000000000000000000000000000067eb0ecf1cfa4ffd89aa7e339417beb7d332a5c996e59875644dd1e3a690110400bc751bb0435977d90fcbb2b83c27812d818991d125e9c0f199be2bc7f01aa0a5cb9b9f99438aa0f1ae3d50201f7bb276536f567f03f062994da292b6db0000000000000000000000000000a93536f303000000000000002a27f6ae1258ebb5079c1bab4f1f6f11ee8ce2e590855a3af38e4bb871ef8400000000000000000000"]) mount(&(0x7f0000001b40)='./file0\x00', &(0x7f0000001b80)='./file0/file0\x00', &(0x7f0000002100)='vfat\x00', 0x0, &(0x7f0000002140)="98980e21ac8b46c0b7bedeee39e6bd9ae4088d6ab47dc9dc76a39e299ce3783aa33e482e450484961fd3e3c5b178fafbe54440e19512ea4298652ed129d4241d9d116d8a5c2b931d350f0c989f8a288fc9e56c") mount(&(0x7f0000df7000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='hugetlbfs\x00', 0x200, &(0x7f00000001c0)) mkdir(&(0x7f00000004c0)='./file0/file0\x00', 0x0) socketpair$inet(0x2, 0x0, 0x1f, &(0x7f0000000080)) 2018/03/31 08:26:06 executing program 2 (fault-call:9 fault-nth:5): r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000348f88)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r2}, 0x10) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') 2018/03/31 08:26:06 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000000003042df8700"]) r1 = perf_event_open(&(0x7f0000348f88)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x0, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r2}, 0x10) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) mount(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f00000002c0)='devpts\x00', 0x800000, &(0x7f0000000300)="7b18f1563c67659c49445440cbb57f32c0f4710f0219046399f3e8a25c5d4975e2b42f404b14937bd42d9874bdd132eef77f584d5151c9a97470a0d77a0c24a85e319673350e16b039bf474ec320") socketpair(0x3, 0x800, 0x81, &(0x7f00000003c0)) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') 2018/03/31 08:26:06 executing program 3 (fault-call:10 fault-nth:12): r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000348f88)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r2}, 0x10) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) mount(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f00000002c0)='devpts\x00', 0x800000, &(0x7f0000000300)) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') [ 223.151842] RDX: 0000000020000100 RSI: 0000000020000180 RDI: 0000000020000100 [ 223.159090] RBP: 000000000072bea0 R08: 0000000020000040 R09: 0000000000000000 [ 223.166340] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 223.173590] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000004 2018/03/31 08:26:06 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x3, 0x300, &(0x7f0000000340)) socketpair(0x1d, 0x1, 0x3, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000580)=0x10000) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x0, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r4 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r4, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r6 = perf_event_open(&(0x7f0000000500)={0x3, 0x239, 0x2367, 0x10008000, 0x1, 0x6, 0x0, 0x78b1, 0x800, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x8, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x6, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r3, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000440)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r5}, 0xffffffffffffffb9) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000200)={r3, &(0x7f0000000280)="3b4096861e6aeca6ccb84f1bfd28b71fe5cd39502d5111d386f497a003326fa66d2d6fe0cda4d9f95b22d04ddfc547fd5790a76c87c0541ead0bd5dcf07e9711840a9527d35f77bb3a92daad67e86ecdce83d8cdb3218c26a8c094152efcbe64e07b4ba510a837"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f00000009c0)="3949bcf20271c219f64b9e3fbd45bfae692375440912d5a576c2d82299018de50363f2cf30a439b45c2738869283b7900c1e030013700557a768d5cc05cb9ed624684f4dfdae73a8148b29b2978222576dabbcb3556bcf35a8f66fa68ceb0b834ec5120ac749dc0cc5aab7b0197711785349b1673ff5159bc1a40df6c779950e0747a25ce77a10f68b663a87fc993224a79b583eac02a2171f076ff3", 0x1000, &(0x7f0000000200)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x40082406, &(0x7f0000000c00)="667573c267a44c50b5e439df9a58458a4ef56500") 2018/03/31 08:26:06 executing program 0: r0 = socket$kcm(0x29, 0x7, 0x0) sendmsg$kcm(r0, &(0x7f0000002c00)={0x0, 0x0, &(0x7f0000002ac0)=[{&(0x7f0000002a00)="319d6e6247d1e59d5812bc49ad43b85954f58f6feffb1ee181b3692b39c1d4816f0be2ddc7a39dbf511437c4e99493464c07ff4873c7b127890bc82742f99359587d379be6ae315d612a5f34f89c5d67e294c5b9ef479b11820f4a7518e36ad69d1c242555caed407774a112e382959c77a7188cfae88644f4f667417617a72c62c3d71fe826a1c8fe48b02b259215072197", 0x92}], 0x1, &(0x7f0000002b00)=[{0xd8, 0x0, 0x600000000000000, "921ab7b737c62cde7ff827b1377ccdd80d10b0659f6d31da3b019ad9021bb9cdcbf7160e3fd9d9cad1e973a176f38f7bbac5a133ae36d198410e0645dd20bcde9e1b6883ed7e0fdfec399dcf38ba1c04c7d4f69da4dd6704f09ac3f35666b3c0cf31d68a5843505cd0795a9d8e0bcd2c1a377dcd560e09c3be1e6c1df1eb2bd0b941231719cc67a5dbe139b89feb3f79f8e485d6a5ae68f75382539b68d41ea4dc0c5e6573394c8fe583e041525051cadd92624f350d2930463d76bd1eb8d3d3706d2bff"}], 0xd8, 0x8000}, 0x40805) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) socketpair(0x0, 0x4, 0x6, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) socketpair(0xf, 0x3, 0x2, &(0x7f0000000040)) socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000000080)) 2018/03/31 08:26:06 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) socketpair(0x0, 0x4, 0x101, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000180)) socketpair(0xf, 0x3, 0x2, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000000)={r2, 0x50, &(0x7f0000000080)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)=r3, 0x4) [ 223.629538] devpts: called with bogus options [ 223.666339] FAULT_INJECTION: forcing a failure. [ 223.666339] name failslab, interval 1, probability 0, space 0, times 0 [ 223.672890] hugetlbfs: Bad mount option: "" [ 223.677619] CPU: 1 PID: 16004 Comm: syz-executor2 Not tainted 4.16.0-rc6+ #43 [ 223.677628] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 223.677633] Call Trace: [ 223.677650] dump_stack+0x194/0x24d [ 223.677665] ? arch_local_irq_restore+0x53/0x53 [ 223.677678] ? finish_task_switch+0x1c1/0x7e0 [ 223.677689] ? finish_task_switch+0x182/0x7e0 [ 223.677708] should_fail+0x8c0/0xa40 [ 223.677721] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 223.677745] ? __sched_text_start+0x8/0x8 [ 223.677755] ? find_held_lock+0x35/0x1d0 [ 223.677781] ? check_same_owner+0x320/0x320 [ 223.739832] ? putname+0xee/0x130 [ 223.743286] ? filename_lookup+0x315/0x500 [ 223.747529] ? user_path_at_empty+0x40/0x50 [ 223.751855] ? do_syscall_64+0x281/0x940 [ 223.755925] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 223.755969] FAULT_INJECTION: forcing a failure. [ 223.755969] name failslab, interval 1, probability 0, space 0, times 0 [ 223.761291] should_failslab+0xec/0x120 [ 223.761305] kmem_cache_alloc+0x47/0x760 [ 223.761316] ? perf_trace_lock+0xd6/0x900 [ 223.761328] ? perf_trace_lock_acquire+0xe3/0x980 [ 223.761341] ? free_obj_work+0x690/0x690 [ 223.761356] alloc_vfsmnt+0xe0/0x9c0 [ 223.761365] ? path_lookupat+0x238/0xba0 [ 223.761375] ? mnt_free_id.isra.21+0x50/0x50 [ 223.761387] ? trace_hardirqs_off+0x10/0x10 [ 223.761399] ? putname+0xee/0x130 [ 223.761420] ? rcu_read_lock_sched_held+0x108/0x120 [ 223.818370] ? find_held_lock+0x35/0x1d0 [ 223.822424] ? __get_fs_type+0x8a/0xc0 [ 223.826295] ? lock_downgrade+0x980/0x980 [ 223.830443] ? module_unload_free+0x5b0/0x5b0 [ 223.834928] ? lock_release+0xa40/0xa40 [ 223.838893] ? mpi_resize+0x200/0x200 [ 223.842686] vfs_kern_mount.part.26+0x84/0x4a0 [ 223.847255] ? may_umount+0xa0/0xa0 [ 223.850866] ? _raw_read_unlock+0x22/0x30 [ 223.855000] ? __get_fs_type+0x8a/0xc0 [ 223.858880] do_mount+0xea4/0x2bb0 [ 223.862418] ? copy_mount_string+0x40/0x40 [ 223.866637] ? rcu_pm_notify+0xc0/0xc0 [ 223.870517] ? copy_mount_options+0x5f/0x2e0 [ 223.874912] ? rcu_read_lock_sched_held+0x108/0x120 [ 223.879917] ? kmem_cache_alloc_trace+0x459/0x740 [ 223.884745] ? kasan_check_write+0x14/0x20 [ 223.888967] ? _copy_from_user+0x99/0x110 [ 223.893103] ? copy_mount_options+0x1f7/0x2e0 [ 223.897587] SyS_mount+0xab/0x120 [ 223.901024] ? copy_mnt_ns+0xb30/0xb30 [ 223.904898] do_syscall_64+0x281/0x940 [ 223.908773] ? vmalloc_sync_all+0x30/0x30 [ 223.912908] ? _raw_spin_unlock_irq+0x27/0x70 [ 223.917391] ? finish_task_switch+0x1c1/0x7e0 [ 223.921871] ? syscall_return_slowpath+0x550/0x550 [ 223.926785] ? syscall_return_slowpath+0x2ac/0x550 [ 223.931700] ? prepare_exit_to_usermode+0x350/0x350 [ 223.936702] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 223.942054] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 223.946889] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 223.952066] RIP: 0033:0x454e79 [ 223.955238] RSP: 002b:00007f3ee2ac1c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 223.962936] RAX: ffffffffffffffda RBX: 00007f3ee2ac26d4 RCX: 0000000000454e79 [ 223.970192] RDX: 0000000020000100 RSI: 0000000020000180 RDI: 0000000020000100 [ 223.977446] RBP: 000000000072bea0 R08: 0000000020000040 R09: 0000000000000000 [ 223.984698] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 223.991949] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000005 [ 223.999226] CPU: 0 PID: 16003 Comm: syz-executor3 Not tainted 4.16.0-rc6+ #43 [ 224.006497] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 224.015844] Call Trace: [ 224.018433] dump_stack+0x194/0x24d [ 224.022066] ? arch_local_irq_restore+0x53/0x53 [ 224.026746] should_fail+0x8c0/0xa40 [ 224.030457] ? is_bpf_text_address+0xa4/0x120 [ 224.034942] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 224.040029] ? __kernel_text_address+0xd/0x40 [ 224.044502] ? unwind_get_return_address+0x61/0xa0 [ 224.049419] ? find_held_lock+0x35/0x1d0 [ 224.053460] ? __lock_is_held+0xb6/0x140 [ 224.057501] ? check_same_owner+0x320/0x320 [ 224.061801] ? rcu_note_context_switch+0x710/0x710 2018/03/31 08:26:06 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000000003042df8700"]) r1 = perf_event_open(&(0x7f0000348f88)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x0, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r2}, 0x10) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) mount(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f00000002c0)='devpts\x00', 0x800000, &(0x7f0000000300)="7b18f1563c67659c49445440cbb57f32c0f4710f0219046399f3e8a25c5d4975e2b42f404b14937bd42d9874bdd132eef77f584d5151c9a97470a0d77a0c24a85e319673350e16b039bf474ec320") socketpair(0x3, 0x800, 0x81, &(0x7f00000003c0)) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') [ 224.066709] should_failslab+0xec/0x120 [ 224.070660] kmem_cache_alloc_trace+0x4b/0x740 [ 224.075227] ? __kmalloc_node+0x33/0x70 [ 224.079182] ? __kmalloc_node+0x33/0x70 [ 224.083131] ? rcu_read_lock_sched_held+0x108/0x120 [ 224.088137] __memcg_init_list_lru_node+0x169/0x270 [ 224.093136] ? list_lru_add+0x7c0/0x7c0 [ 224.097084] ? __kmalloc_node+0x47/0x70 [ 224.101049] __list_lru_init+0x544/0x750 [ 224.105110] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 224.110992] ? trace_hardirqs_on_caller+0x421/0x5c0 2018/03/31 08:26:06 executing program 2 (fault-call:9 fault-nth:6): r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000348f88)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r2}, 0x10) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') [ 224.116003] ? __lockdep_init_map+0xe4/0x650 [ 224.120409] ? lockdep_init_map+0x9/0x10 [ 224.124462] sget_userns+0x691/0xe40 [ 224.128160] ? kernfs_sop_show_path+0x190/0x190 [ 224.132830] ? kernfs_sop_show_options+0x180/0x180 [ 224.137739] ? destroy_unused_super.part.6+0xd0/0xd0 [ 224.142827] ? check_same_owner+0x320/0x320 [ 224.147131] ? rcu_pm_notify+0xc0/0xc0 [ 224.151011] ? rcu_read_lock_sched_held+0x108/0x120 [ 224.156017] ? kmem_cache_alloc_trace+0x459/0x740 [ 224.160848] ? lock_downgrade+0x980/0x980 [ 224.164996] kernfs_mount_ns+0x13d/0x8b0 [ 224.169051] ? kernfs_super_ns+0x70/0x70 [ 224.173096] sysfs_mount+0xc2/0x1c0 [ 224.176698] ? sysfs_kill_sb+0x40/0x40 [ 224.180569] ? alloc_pages_current+0xbe/0x1e0 [ 224.185050] ? security_sb_copy_data+0x81/0xb0 [ 224.189612] mount_fs+0x66/0x2d0 [ 224.192959] vfs_kern_mount.part.26+0xc6/0x4a0 [ 224.197530] ? may_umount+0xa0/0xa0 [ 224.201139] ? _raw_read_unlock+0x22/0x30 [ 224.205275] ? __get_fs_type+0x8a/0xc0 [ 224.209160] do_mount+0xea4/0x2bb0 [ 224.212687] ? copy_mount_string+0x40/0x40 [ 224.216909] ? rcu_pm_notify+0xc0/0xc0 [ 224.220795] ? copy_mount_options+0x5f/0x2e0 [ 224.225196] ? rcu_read_lock_sched_held+0x108/0x120 [ 224.230201] ? kmem_cache_alloc_trace+0x459/0x740 [ 224.235037] ? copy_mount_options+0x1f7/0x2e0 [ 224.239525] SyS_mount+0xab/0x120 [ 224.242971] ? copy_mnt_ns+0xb30/0xb30 [ 224.246845] do_syscall_64+0x281/0x940 [ 224.250717] ? vmalloc_sync_all+0x30/0x30 [ 224.254843] ? _raw_spin_unlock_irq+0x27/0x70 [ 224.259322] ? finish_task_switch+0x1c1/0x7e0 [ 224.263815] ? syscall_return_slowpath+0x550/0x550 [ 224.268736] ? syscall_return_slowpath+0x2ac/0x550 [ 224.273654] ? prepare_exit_to_usermode+0x350/0x350 [ 224.278659] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 224.284014] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 224.288848] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 224.294017] RIP: 0033:0x454e79 [ 224.297196] RSP: 002b:00007fbfd4b96c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 224.304902] RAX: ffffffffffffffda RBX: 00007fbfd4b976d4 RCX: 0000000000454e79 [ 224.312165] RDX: 0000000020000100 RSI: 0000000020000180 RDI: 0000000020000100 2018/03/31 08:26:07 executing program 3 (fault-call:10 fault-nth:13): r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000348f88)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r2}, 0x10) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) mount(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f00000002c0)='devpts\x00', 0x800000, &(0x7f0000000300)) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') [ 224.319423] RBP: 000000000072bea0 R08: 0000000020000040 R09: 0000000000000000 [ 224.326673] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 224.333922] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000000c [ 224.398093] can: request_module (can-proto-3) failed. [ 224.491933] can: request_module (can-proto-3) failed. [ 224.707516] FAULT_INJECTION: forcing a failure. [ 224.707516] name failslab, interval 1, probability 0, space 0, times 0 [ 224.718830] CPU: 1 PID: 16041 Comm: syz-executor2 Not tainted 4.16.0-rc6+ #43 [ 224.726094] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 224.735443] Call Trace: [ 224.738032] dump_stack+0x194/0x24d [ 224.740201] FAULT_INJECTION: forcing a failure. [ 224.740201] name failslab, interval 1, probability 0, space 0, times 0 [ 224.741655] ? arch_local_irq_restore+0x53/0x53 [ 224.741668] ? __unwind_start+0x169/0x330 [ 224.741679] ? __kernel_text_address+0xd/0x40 [ 224.741695] should_fail+0x8c0/0xa40 [ 224.741705] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 224.741722] ? save_stack+0xa3/0xd0 [ 224.778496] ? save_stack+0x43/0xd0 [ 224.782104] ? kasan_kmalloc+0xad/0xe0 [ 224.785973] ? kasan_slab_alloc+0x12/0x20 [ 224.790100] ? kmem_cache_alloc+0x12e/0x760 [ 224.794404] ? alloc_vfsmnt+0xe0/0x9c0 [ 224.798274] ? vfs_kern_mount.part.26+0x84/0x4a0 [ 224.803010] ? do_mount+0xea4/0x2bb0 [ 224.806714] ? find_held_lock+0x35/0x1d0 [ 224.810771] ? check_same_owner+0x320/0x320 [ 224.815078] ? rcu_note_context_switch+0x710/0x710 [ 224.819992] should_failslab+0xec/0x120 [ 224.823949] __kmalloc_track_caller+0x5f/0x760 [ 224.828517] ? do_raw_spin_trylock+0x190/0x190 [ 224.833083] ? kstrdup_const+0x39/0x50 [ 224.836956] kstrdup+0x39/0x70 [ 224.840131] kstrdup_const+0x39/0x50 [ 224.843827] alloc_vfsmnt+0x1a5/0x9c0 [ 224.847608] ? path_lookupat+0x238/0xba0 [ 224.851651] ? mnt_free_id.isra.21+0x50/0x50 [ 224.856044] ? trace_hardirqs_off+0x10/0x10 [ 224.860349] ? putname+0xee/0x130 [ 224.863787] ? putname+0xee/0x130 [ 224.867221] ? rcu_read_lock_sched_held+0x108/0x120 [ 224.872220] ? find_held_lock+0x35/0x1d0 [ 224.876269] ? __get_fs_type+0x8a/0xc0 [ 224.880140] ? lock_downgrade+0x980/0x980 [ 224.884274] ? module_unload_free+0x5b0/0x5b0 [ 224.888751] ? lock_release+0xa40/0xa40 [ 224.892710] ? mpi_resize+0x200/0x200 [ 224.896494] vfs_kern_mount.part.26+0x84/0x4a0 [ 224.901059] ? may_umount+0xa0/0xa0 [ 224.904671] ? _raw_read_unlock+0x22/0x30 [ 224.908799] ? __get_fs_type+0x8a/0xc0 [ 224.912672] do_mount+0xea4/0x2bb0 [ 224.916196] ? copy_mount_string+0x40/0x40 [ 224.920413] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 224.925414] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 224.930155] ? retint_kernel+0x10/0x10 [ 224.934033] ? __sanitizer_cov_trace_pc+0x1/0x50 [ 224.938771] ? copy_mount_options+0x1f7/0x2e0 [ 224.943250] SyS_mount+0xab/0x120 [ 224.946685] ? copy_mnt_ns+0xb30/0xb30 [ 224.950554] do_syscall_64+0x281/0x940 [ 224.954423] ? vmalloc_sync_all+0x30/0x30 [ 224.958553] ? _raw_spin_unlock_irq+0x27/0x70 [ 224.963031] ? finish_task_switch+0x1c1/0x7e0 [ 224.967695] ? syscall_return_slowpath+0x550/0x550 [ 224.972611] ? syscall_return_slowpath+0x2ac/0x550 [ 224.977525] ? prepare_exit_to_usermode+0x350/0x350 [ 224.982525] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 224.987876] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 224.992705] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 224.997881] RIP: 0033:0x454e79 [ 225.001053] RSP: 002b:00007f3ee2ac1c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 225.008758] RAX: ffffffffffffffda RBX: 00007f3ee2ac26d4 RCX: 0000000000454e79 [ 225.016010] RDX: 0000000020000100 RSI: 0000000020000180 RDI: 0000000020000100 [ 225.023265] RBP: 000000000072bea0 R08: 0000000020000040 R09: 0000000000000000 [ 225.030514] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 225.037768] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000006 [ 225.045036] CPU: 0 PID: 16045 Comm: syz-executor3 Not tainted 4.16.0-rc6+ #43 [ 225.052298] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 225.061640] Call Trace: [ 225.064212] dump_stack+0x194/0x24d [ 225.067813] ? arch_local_irq_restore+0x53/0x53 [ 225.072469] ? __save_stack_trace+0x7e/0xd0 [ 225.076771] should_fail+0x8c0/0xa40 [ 225.080459] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 225.085537] ? kasan_kmalloc+0xad/0xe0 [ 225.089400] ? kmem_cache_alloc_trace+0x136/0x740 [ 225.094215] ? __memcg_init_list_lru_node+0x169/0x270 [ 225.099380] ? __list_lru_init+0x544/0x750 [ 225.103585] ? sget_userns+0x691/0xe40 [ 225.107445] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 225.112172] ? do_mount+0xea4/0x2bb0 [ 225.115857] ? SyS_mount+0xab/0x120 [ 225.119457] ? do_syscall_64+0x281/0x940 [ 225.123491] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 225.128830] ? find_held_lock+0x35/0x1d0 [ 225.132867] ? __lock_is_held+0xb6/0x140 [ 225.136907] ? check_same_owner+0x320/0x320 [ 225.141202] ? rcu_note_context_switch+0x710/0x710 [ 225.146116] should_failslab+0xec/0x120 [ 225.150077] kmem_cache_alloc_trace+0x4b/0x740 [ 225.154631] ? __kmalloc_node+0x33/0x70 [ 225.158579] ? __kmalloc_node+0x33/0x70 [ 225.162533] ? rcu_read_lock_sched_held+0x108/0x120 [ 225.167532] __memcg_init_list_lru_node+0x169/0x270 [ 225.172524] ? list_lru_add+0x7c0/0x7c0 [ 225.176475] ? __kmalloc_node+0x47/0x70 [ 225.180426] __list_lru_init+0x544/0x750 [ 225.184462] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 225.190320] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 225.195310] ? __lockdep_init_map+0xe4/0x650 [ 225.199697] ? lockdep_init_map+0x9/0x10 [ 225.203735] sget_userns+0x691/0xe40 [ 225.207423] ? kernfs_sop_show_path+0x190/0x190 [ 225.212069] ? kernfs_sop_show_options+0x180/0x180 [ 225.216973] ? destroy_unused_super.part.6+0xd0/0xd0 [ 225.222053] ? check_same_owner+0x320/0x320 [ 225.226358] ? rcu_pm_notify+0xc0/0xc0 [ 225.230224] ? rcu_read_lock_sched_held+0x108/0x120 [ 225.235212] ? kmem_cache_alloc_trace+0x459/0x740 [ 225.240032] ? lock_downgrade+0x980/0x980 [ 225.244167] kernfs_mount_ns+0x13d/0x8b0 [ 225.248206] ? kernfs_super_ns+0x70/0x70 [ 225.252251] sysfs_mount+0xc2/0x1c0 [ 225.255854] ? sysfs_kill_sb+0x40/0x40 [ 225.259723] ? alloc_pages_current+0xbe/0x1e0 [ 225.264201] ? security_sb_copy_data+0x81/0xb0 [ 225.268765] mount_fs+0x66/0x2d0 [ 225.272116] vfs_kern_mount.part.26+0xc6/0x4a0 [ 225.276680] ? may_umount+0xa0/0xa0 [ 225.280280] ? _raw_read_unlock+0x22/0x30 [ 225.284404] ? __get_fs_type+0x8a/0xc0 [ 225.288276] do_mount+0xea4/0x2bb0 [ 225.291797] ? copy_mount_string+0x40/0x40 [ 225.296008] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 225.301009] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 225.306883] ? retint_kernel+0x10/0x10 [ 225.310747] ? copy_mount_options+0x18b/0x2e0 [ 225.315219] ? __sanitizer_cov_trace_pc+0xa/0x50 [ 225.319950] ? copy_mount_options+0x1f7/0x2e0 [ 225.324433] SyS_mount+0xab/0x120 [ 225.327867] ? copy_mnt_ns+0xb30/0xb30 [ 225.331738] do_syscall_64+0x281/0x940 [ 225.335603] ? vmalloc_sync_all+0x30/0x30 [ 225.339726] ? _raw_spin_unlock_irq+0x27/0x70 [ 225.344195] ? finish_task_switch+0x1c1/0x7e0 [ 225.348667] ? syscall_return_slowpath+0x550/0x550 [ 225.353570] ? syscall_return_slowpath+0x2ac/0x550 [ 225.358472] ? prepare_exit_to_usermode+0x350/0x350 [ 225.363464] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 225.368802] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 225.373623] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 225.378787] RIP: 0033:0x454e79 [ 225.381949] RSP: 002b:00007fbfd4b96c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 225.389640] RAX: ffffffffffffffda RBX: 00007fbfd4b976d4 RCX: 0000000000454e79 [ 225.396892] RDX: 0000000020000100 RSI: 0000000020000180 RDI: 0000000020000100 2018/03/31 08:26:08 executing program 6: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) socketpair(0x0, 0x4, 0x1006, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) close(r0) socketpair(0xf, 0x3, 0x2, &(0x7f0000000040)) 2018/03/31 08:26:08 executing program 1: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0xffffffffffffc9a9) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={0xffffffffffffffff, &(0x7f0000000700), &(0x7f00000009c0)=""/161}, 0x18) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)) 2018/03/31 08:26:08 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) socketpair(0x0, 0x4, 0x6, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x7) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x102d}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x7, 0x1f, 0x1, 0x1, 0x1}], {0x95}}, &(0x7f000031cff6)='syzkaller\x00', 0x5c6e, 0x1be, &(0x7f00001a7f05)=""/251}, 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={r2, 0x28, &(0x7f0000000000)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={r3, 0x1ff, 0x10}, 0xc) socketpair(0xf, 0x3, 0x2, &(0x7f0000000040)) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000000080)) 2018/03/31 08:26:08 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000000003042df8700"]) r1 = perf_event_open(&(0x7f0000348f88)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x0, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r2}, 0x10) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) mount(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f00000002c0)='devpts\x00', 0x800000, &(0x7f0000000300)="7b18f1563c67659c49445440cbb57f32c0f4710f0219046399f3e8a25c5d4975e2b42f404b14937bd42d9874bdd132eef77f584d5151c9a97470a0d77a0c24a85e319673350e16b039bf474ec320") socketpair(0x3, 0x800, 0x81, &(0x7f00000003c0)) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') 2018/03/31 08:26:08 executing program 7: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x80000000000, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000001fc0)) sendmsg(0xffffffffffffffff, &(0x7f00000024c0)={&(0x7f0000002040)=@un=@file={0x0, './file0\x00'}, 0x80, &(0x7f0000001f40)=[{&(0x7f00000020c0)="73c7575b94a72990e177f86ed4835a72a65c1a6c6831eeb0c48163a47ab63bcb605c8450cc4798ff6521c2aa722d1a7105c8a07e6c", 0x35}], 0x1, &(0x7f0000002500)=ANY=[], 0x0, 0x40000}, 0x20000000) r2 = gettid() r3 = perf_event_open(&(0x7f0000001ac0)={0x1, 0x70, 0xffffffff, 0x835, 0x9, 0xffffffffffffff5f, 0x0, 0x1000, 0x42000, 0x3, 0x8, 0x80, 0x1, 0x4, 0x100000001, 0x9, 0xff, 0x8, 0x1000, 0x7, 0x7f, 0x200, 0xb715, 0x3, 0x7fffffff, 0xf0a, 0x40, 0x8000, 0x8, 0x7, 0xffffffffffffff74, 0x4, 0x6, 0x100, 0x7, 0x335, 0x3ff, 0x58, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000001a80), 0xe}, 0x0, 0x80000000, 0x82, 0x7, 0x5, 0x3}, r2, 0xd, r1, 0x8) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000200)='mqueue\x00', 0x0, &(0x7f000000a000)) r4 = getpid() r5 = bpf$PROG_LOAD(0x5, &(0x7f0000002500)={0xf, 0x7, &(0x7f0000001940)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, [@ldst={0x3, 0x3, 0x3, 0x4, 0x3, 0x2, 0xffffffffffffffff}, @exit={0x95}], {0x95}}, &(0x7f0000001980)='GPL\x00', 0xff, 0x1000, &(0x7f00000039c0)=""/4096, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000019c0)={&(0x7f0000000180)='./file0\x00', r5}, 0x10) perf_event_open(&(0x7f0000001a00)={0x0, 0x70, 0x0, 0x8, 0x0, 0x3, 0x0, 0xb8, 0x1000, 0x0, 0x3, 0x4, 0xfff, 0x4, 0x4dae, 0x40, 0x100000001, 0x6, 0x4, 0x0, 0x3, 0x753c, 0x6, 0x100, 0x1de, 0x6, 0x4, 0x1, 0x6, 0x4, 0x7, 0x3, 0x7fff, 0x80000000, 0x3, 0x8, 0x81, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x7, 0x4}, 0x801, 0x400, 0x1, 0x4, 0x1, 0x9, 0x80000001}, r4, 0x7, r1, 0xb) r6 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000004000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000001c00)='./file0\x00', &(0x7f0000001c40)='./file0\x00', &(0x7f0000001c80)='devpts\x00', 0x40, &(0x7f0000001cc0)="be623dfd58807ac0b2f86f052863a5f30adc0bce173ebcf648cefd7d64732aeb5b94e6af3ab33e53669ba6d304d067dad4b1ff3ed87f18fd170aac904e8f105e80e22881717c98752a9cd7cfb06d102877e3b36b2624d22427331755a9514b225d25999ed605ffe4188630db2e7ddcc57f6316b60c4f3845d9dfcbbde5e49af627b48d7c9bd743b536de31a9ba3010cb6714c9b90a50537be55ca12a18e6541bff5a82d293e7734ea9c90707899663bd96b3bcce5887bf0bd35963c5adc39ddcb6f2a0a02b01661242046cb54ef1aec5a486b69e006305064124867bf79f4dc11798e214b61575168b79887122e0a3461f703c077f902c0a") socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r7, &(0x7f0000001800)={&(0x7f0000000240)=@alg, 0x80, &(0x7f0000000740)=[{&(0x7f00000002c0)=""/83, 0x53}, {&(0x7f0000000340)=""/27, 0x1b}, {&(0x7f0000000380)}, {&(0x7f00000003c0)=""/40, 0x28}, {&(0x7f0000000400)=""/144, 0x90}, {&(0x7f00000004c0)=""/200, 0xc8}, {&(0x7f00000005c0)=""/60, 0x3c}, {&(0x7f0000000600)=""/105, 0x69}, {&(0x7f0000000680)=""/127, 0x7f}, {&(0x7f0000000700)=""/8, 0x8}], 0xa, &(0x7f0000000800)=""/4096, 0x1000}, 0x10000) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000002340)=0xf60) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000003900)={&(0x7f0000003400)=@can={0x0, 0x0}, 0x80, &(0x7f0000003840)=[{&(0x7f0000003480)=""/194, 0xc2}, {&(0x7f0000003580)=""/250, 0xfa}, {&(0x7f0000003680)=""/100, 0x64}, {&(0x7f0000003700)=""/14, 0xe}, {&(0x7f0000003740)=""/159, 0x9f}, {&(0x7f0000003800)=""/15, 0xf}], 0x6, &(0x7f00000038c0)=""/29, 0x1d, 0x5}, 0x3) bpf$PROG_LOAD(0x5, &(0x7f0000003940)={0x4, 0x9, &(0x7f0000001840)=ANY=[@ANYBLOB="18000000030000000000000003000000dfd00c00fcffffff0000000000000000000803000101000000810000000000000001f0fff0ffffff000000000000000095000000000017d2"], &(0x7f0000000380)='GPL\x00', 0xf172, 0x4b, &(0x7f00000018c0)=""/75, 0x41f00, 0x1, [], r8}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000000c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001f00)={0xffffffffffffffff, 0x0, 0xf6, 0x22, &(0x7f0000001dc0)="9ef9482ea02fd36d0a768986a7ebe7a627dc88937e7073e3521858dfa0d5e02f571a01cfdfa76e048e5f956ea5da60b90e02a6c3d3687ed61ec9ab5b682c02498bddef38de9ce8c753e41e78f414d16202a033b6c7752711a5f56924e7846d6dcde2f71026e1eb0319b5e60f6b1ec67fca31c3cf1691d3af91a19f56be5a10ff337a53ba13dd3d75e1555211954b92ec0082d02b7b4cdddc021cbe84e4af8f20788977e3416918843e6c92b2ebf7b8b33ecbd4c7c9a9d5036c3e3e538748a32f1a28eb77818ca1878ffdd445dcdb8a40e6221e0fc474428449dfe93c62bbc69996aa9b34488c1da4f6f7c2275305a6a4fb256c1a516d", &(0x7f0000001ec0)=""/34, 0x1f, 0x1}, 0x28) close(r6) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x3441, &(0x7f0000000080)) mount(&(0x7f00000021c0)='./file0/file0\x00', &(0x7f0000002200)='./file0/file0\x00', &(0x7f0000002240)='fuse\x00', 0x2000000, &(0x7f0000002280)="9b3923bfddc346e9fa2aeaffae6ca386d8d50ba83ab72218340d3c30c045a89ac016797652ba04f1a203cfceccb458dbfd9fd03c4a80ef9a40dc7a4f24b6619d04a58186466fd8465757d9ee053c082cdfa957e7efab6191761847cca59c017493ef5e3d22432cf0b4ebef") ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f00000023c0)=ANY=[@ANYBLOB="07000000000000000000000000000000000000000000000000000000000000000000000067eb0ecf1cfa4ffd89aa7e339417beb7d332a5c996e59875644dd1e3a690110400bc751bb0435977d90fcbb2b83c27812d818991d125e9c0f199be2bc7f01aa0a5cb9b9f99438aa0f1ae3d50201f7bb276536f567f03f062994da292b6db0000000000000000000000000000a93536f303000000000000002a27f6ae1258ebb5079c1bab4f1f6f11ee8ce2e590855a3af38e4bb871ef8400000000000000000000"]) mount(&(0x7f0000001b40)='./file0\x00', &(0x7f0000001b80)='./file0/file0\x00', &(0x7f0000002100)='vfat\x00', 0x0, &(0x7f0000002140)="98980e21ac8b46c0b7bedeee39e6bd9ae4088d6ab47dc9dc76a39e299ce3783aa33e482e450484961fd3e3c5b178fafbe54440e19512ea4298652ed129d4241d9d116d8a5c2b931d350f0c989f8a288fc9e56c") mount(&(0x7f0000df7000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='hugetlbfs\x00', 0x200, &(0x7f00000001c0)) mkdir(&(0x7f00000004c0)='./file0/file0\x00', 0x0) socketpair$inet(0x2, 0x0, 0x1f, &(0x7f0000000080)) 2018/03/31 08:26:08 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x0, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)={0xffffffffffffffff}) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r5 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) ioctl$sock_kcm_SIOCKCMCLONE(r6, 0x89e2, &(0x7f0000000380)={r3}) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)={0xffffffffffffffff}) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f00000009c0)="3949bcf20271c219f64b9e3fbd45bfae692375440912d5a576c2d82299018de50363f2cf30a439b45c2738869283b7900c1e030013700557a768d5cc05cb9ed624684f4dfdae73a8148b29b2978222576dabbcb3556bcf35a8f66fa68ceb0b834ec5120ac749dc0cc5aab7b0197711785349b1673ff5159bc1a40df6c779950e0747a25ce77a10f68b663a87fc993224a79b583eac02a2171f076ff3", 0x1000, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40042409, 0x0) ioctl$PERF_EVENT_IOC_RESET(r4, 0x2403, 0x7) recvmsg(r7, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000c00)=""/160, 0xa0}], 0x1, &(0x7f0000000cc0)=""/161, 0xa1, 0x100000001}, 0x1) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00', r6}, 0x10) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000400)=0x7fffffff, 0x4) 2018/03/31 08:26:08 executing program 3 (fault-call:10 fault-nth:14): r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000348f88)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r2}, 0x10) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) mount(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f00000002c0)='devpts\x00', 0x800000, &(0x7f0000000300)) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') 2018/03/31 08:26:08 executing program 2 (fault-call:9 fault-nth:7): r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000348f88)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r2}, 0x10) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') [ 225.404148] RBP: 000000000072bea0 R08: 0000000020000040 R09: 0000000000000000 [ 225.411392] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 225.418646] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000000d 2018/03/31 08:26:08 executing program 1: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={0xffffffffffffffff, &(0x7f0000000700), &(0x7f00000009c0)=""/161}, 0x18) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000000c0)) 2018/03/31 08:26:08 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000000200)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x0, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r4 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f00000009c0)="3949bcf20271c219f64b9e3fbd45bfae692375440912d5a576c2d82299018de50363f2cf30a439b45c2738869283b7900c1e030013700557a768d5cc05cb9ed624684f4dfdae73a8148b29b2978222576dabbcb3556bcf35a8f66fa68ceb0b834ec5120ac749dc0cc5aab7b0197711785349b1673ff5159bc1a40df6c779950e0747a25ce77a10f68b663a87fc993224a79b583eac02a2171f076ff3", 0x1000, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) [ 225.635181] devpts: called with bogus options 2018/03/31 08:26:08 executing program 6: socketpair(0xf, 0x3, 0x1, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000200)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) socketpair(0xa, 0x4, 0x6, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f00000000c0)={r3, r2}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x0) r4 = gettid() perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x2, 0xffffffffffffffae, 0x100000001, 0x6, 0x0, 0x0, 0xc0000, 0xd, 0x0, 0x62e4541f, 0x5, 0x1, 0x51c, 0x100, 0x4, 0x401, 0x9, 0x4, 0x4, 0x6, 0xfe1, 0x2, 0x8, 0x6, 0x100, 0x10001, 0x2, 0xfff, 0x9c0, 0x2, 0x9, 0xffffffff, 0x8, 0x20, 0x0, 0x7fffffff, 0x0, 0xfffffffffffffffc, 0x4, @perf_config_ext={0x474, 0x100000000}, 0x2, 0x7, 0x3, 0x1, 0x5, 0x5e, 0x1}, r4, 0xa, r3, 0x3) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0\x00', r3}, 0x3d8) socketpair(0xf, 0x3, 0x2, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r5, 0x50, &(0x7f0000000280)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)=r6, 0x4) [ 225.702150] hugetlbfs: Bad mount option: "" 2018/03/31 08:26:08 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socketpair(0x0, 0x4, 0x6, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) socketpair(0xf, 0x3, 0x2, &(0x7f0000000040)) [ 225.791643] FAULT_INJECTION: forcing a failure. [ 225.791643] name failslab, interval 1, probability 0, space 0, times 0 [ 225.802956] CPU: 1 PID: 16078 Comm: syz-executor3 Not tainted 4.16.0-rc6+ #43 [ 225.810224] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 225.812794] FAULT_INJECTION: forcing a failure. [ 225.812794] name failslab, interval 1, probability 0, space 0, times 0 [ 225.819578] Call Trace: [ 225.819598] dump_stack+0x194/0x24d [ 225.819613] ? arch_local_irq_restore+0x53/0x53 [ 225.819624] ? __save_stack_trace+0x7e/0xd0 [ 225.819646] should_fail+0x8c0/0xa40 [ 225.819658] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 225.819670] ? kasan_kmalloc+0xad/0xe0 [ 225.819679] ? kmem_cache_alloc_trace+0x136/0x740 [ 225.819690] ? __memcg_init_list_lru_node+0x169/0x270 [ 225.819699] ? __list_lru_init+0x544/0x750 [ 225.819710] ? sget_userns+0x691/0xe40 [ 225.819721] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 225.819729] ? do_mount+0xea4/0x2bb0 [ 225.819736] ? SyS_mount+0xab/0x120 [ 225.819746] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 225.819761] ? find_held_lock+0x35/0x1d0 [ 225.819775] ? __lock_is_held+0xb6/0x140 [ 225.819800] ? check_same_owner+0x320/0x320 [ 225.906474] ? rcu_note_context_switch+0x710/0x710 [ 225.911398] should_failslab+0xec/0x120 [ 225.915360] kmem_cache_alloc_trace+0x4b/0x740 [ 225.919925] ? __kmalloc_node+0x33/0x70 [ 225.923881] ? __kmalloc_node+0x33/0x70 [ 225.927840] ? rcu_read_lock_sched_held+0x108/0x120 [ 225.932850] __memcg_init_list_lru_node+0x169/0x270 [ 225.937854] ? list_lru_add+0x7c0/0x7c0 [ 225.941809] ? __kmalloc_node+0x47/0x70 [ 225.945772] __list_lru_init+0x544/0x750 [ 225.949818] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 225.955687] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 225.960686] ? __lockdep_init_map+0xe4/0x650 [ 225.965077] ? lockdep_init_map+0x9/0x10 [ 225.969122] sget_userns+0x691/0xe40 [ 225.972817] ? kernfs_sop_show_path+0x190/0x190 [ 225.977473] ? kernfs_sop_show_options+0x180/0x180 [ 225.982388] ? destroy_unused_super.part.6+0xd0/0xd0 [ 225.987483] ? check_same_owner+0x320/0x320 [ 225.991787] ? rcu_pm_notify+0xc0/0xc0 [ 225.995663] ? rcu_read_lock_sched_held+0x108/0x120 [ 226.000660] ? kmem_cache_alloc_trace+0x459/0x740 [ 226.005483] ? lock_downgrade+0x980/0x980 [ 226.009622] kernfs_mount_ns+0x13d/0x8b0 [ 226.013670] ? kernfs_super_ns+0x70/0x70 [ 226.017720] sysfs_mount+0xc2/0x1c0 [ 226.021330] ? sysfs_kill_sb+0x40/0x40 [ 226.025202] ? alloc_pages_current+0xbe/0x1e0 [ 226.029696] ? security_sb_copy_data+0x81/0xb0 [ 226.034263] mount_fs+0x66/0x2d0 [ 226.037615] vfs_kern_mount.part.26+0xc6/0x4a0 [ 226.042180] ? may_umount+0xa0/0xa0 [ 226.045790] ? _raw_read_unlock+0x22/0x30 [ 226.049922] ? __get_fs_type+0x8a/0xc0 [ 226.053796] do_mount+0xea4/0x2bb0 [ 226.057323] ? copy_mount_string+0x40/0x40 [ 226.061539] ? rcu_pm_notify+0xc0/0xc0 [ 226.065416] ? copy_mount_options+0x5f/0x2e0 [ 226.069803] ? rcu_read_lock_sched_held+0x108/0x120 [ 226.074806] ? kmem_cache_alloc_trace+0x459/0x740 [ 226.079662] ? kasan_check_write+0x14/0x20 [ 226.083881] ? _copy_from_user+0x99/0x110 [ 226.088014] ? copy_mount_options+0x1f7/0x2e0 [ 226.092495] SyS_mount+0xab/0x120 [ 226.095928] ? copy_mnt_ns+0xb30/0xb30 [ 226.099808] do_syscall_64+0x281/0x940 [ 226.103678] ? vmalloc_sync_all+0x30/0x30 [ 226.107807] ? _raw_spin_unlock_irq+0x27/0x70 [ 226.112285] ? finish_task_switch+0x1c1/0x7e0 [ 226.116779] ? syscall_return_slowpath+0x550/0x550 [ 226.121690] ? syscall_return_slowpath+0x2ac/0x550 [ 226.126602] ? prepare_exit_to_usermode+0x350/0x350 [ 226.131600] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 226.136952] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 226.141786] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 226.146957] RIP: 0033:0x454e79 [ 226.150128] RSP: 002b:00007fbfd4b96c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 226.157826] RAX: ffffffffffffffda RBX: 00007fbfd4b976d4 RCX: 0000000000454e79 [ 226.165078] RDX: 0000000020000100 RSI: 0000000020000180 RDI: 0000000020000100 [ 226.172330] RBP: 000000000072bea0 R08: 0000000020000040 R09: 0000000000000000 [ 226.179584] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 226.186837] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000000e [ 226.194107] CPU: 0 PID: 16079 Comm: syz-executor2 Not tainted 4.16.0-rc6+ #43 [ 226.201382] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 226.210731] Call Trace: [ 226.213312] dump_stack+0x194/0x24d [ 226.216928] ? arch_local_irq_restore+0x53/0x53 [ 226.221579] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 226.226758] should_fail+0x8c0/0xa40 [ 226.230458] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 226.235547] ? perf_trace_lock+0xd6/0x900 [ 226.239675] ? perf_trace_lock_acquire+0xe3/0x980 [ 226.244500] ? find_held_lock+0x35/0x1d0 [ 226.248560] ? check_same_owner+0x320/0x320 [ 226.252866] ? rcu_note_context_switch+0x710/0x710 [ 226.257774] ? find_held_lock+0x35/0x1d0 [ 226.261822] should_failslab+0xec/0x120 [ 226.265778] kmem_cache_alloc_trace+0x4b/0x740 [ 226.270343] ? lock_downgrade+0x980/0x980 [ 226.274475] ? lock_release+0xa40/0xa40 [ 226.278435] kernfs_mount_ns+0xb5/0x8b0 [ 226.282403] ? kernfs_super_ns+0x70/0x70 [ 226.286454] sysfs_mount+0xc2/0x1c0 [ 226.290062] ? sysfs_kill_sb+0x40/0x40 [ 226.293929] ? alloc_pages_current+0xbe/0x1e0 [ 226.298409] ? security_sb_copy_data+0x81/0xb0 [ 226.302974] mount_fs+0x66/0x2d0 [ 226.306329] vfs_kern_mount.part.26+0xc6/0x4a0 [ 226.310892] ? may_umount+0xa0/0xa0 [ 226.314502] ? _raw_read_unlock+0x22/0x30 [ 226.318632] ? __get_fs_type+0x8a/0xc0 [ 226.322504] do_mount+0xea4/0x2bb0 [ 226.326039] ? copy_mount_string+0x40/0x40 [ 226.330259] ? rcu_pm_notify+0xc0/0xc0 [ 226.334132] ? copy_mount_options+0x5f/0x2e0 [ 226.338520] ? rcu_read_lock_sched_held+0x108/0x120 [ 226.343517] ? kmem_cache_alloc_trace+0x459/0x740 [ 226.348344] ? kasan_check_write+0x14/0x20 [ 226.352559] ? _copy_from_user+0x99/0x110 [ 226.356691] ? copy_mount_options+0x1f7/0x2e0 [ 226.361168] SyS_mount+0xab/0x120 [ 226.364601] ? copy_mnt_ns+0xb30/0xb30 [ 226.368470] do_syscall_64+0x281/0x940 [ 226.372338] ? vmalloc_sync_all+0x30/0x30 [ 226.376466] ? _raw_spin_unlock_irq+0x27/0x70 [ 226.380943] ? finish_task_switch+0x1c1/0x7e0 [ 226.385419] ? syscall_return_slowpath+0x550/0x550 [ 226.390332] ? syscall_return_slowpath+0x2ac/0x550 [ 226.395241] ? prepare_exit_to_usermode+0x350/0x350 [ 226.400238] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 226.405586] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 226.410414] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 226.415584] RIP: 0033:0x454e79 [ 226.418751] RSP: 002b:00007f3ee2ac1c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 226.426441] RAX: ffffffffffffffda RBX: 00007f3ee2ac26d4 RCX: 0000000000454e79 [ 226.433691] RDX: 0000000020000100 RSI: 0000000020000180 RDI: 0000000020000100 2018/03/31 08:26:09 executing program 7: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x80000000000, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000001fc0)) sendmsg(0xffffffffffffffff, &(0x7f00000024c0)={&(0x7f0000002040)=@un=@file={0x0, './file0\x00'}, 0x80, &(0x7f0000001f40)=[{&(0x7f00000020c0)="73c7575b94a72990e177f86ed4835a72a65c1a6c6831eeb0c48163a47ab63bcb605c8450cc4798ff6521c2aa722d1a7105c8a07e6c", 0x35}], 0x1, &(0x7f0000002500)=ANY=[], 0x0, 0x40000}, 0x20000000) r2 = gettid() r3 = perf_event_open(&(0x7f0000001ac0)={0x1, 0x70, 0xffffffff, 0x835, 0x9, 0xffffffffffffff5f, 0x0, 0x1000, 0x42000, 0x3, 0x8, 0x80, 0x1, 0x4, 0x100000001, 0x9, 0xff, 0x8, 0x1000, 0x7, 0x7f, 0x200, 0xb715, 0x3, 0x7fffffff, 0xf0a, 0x40, 0x8000, 0x8, 0x7, 0xffffffffffffff74, 0x4, 0x6, 0x100, 0x7, 0x335, 0x3ff, 0x58, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000001a80), 0xe}, 0x0, 0x80000000, 0x82, 0x7, 0x5, 0x3, 0x80000001}, 0x0, 0xd, r1, 0x8) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000200)='mqueue\x00', 0x0, &(0x7f000000a000)) r4 = getpid() r5 = bpf$PROG_LOAD(0x5, &(0x7f0000002500)={0xf, 0x7, &(0x7f0000001940)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, [@ldst={0x3, 0x3, 0x3, 0x4, 0x3, 0x2, 0xffffffffffffffff}, @exit={0x95}], {0x95}}, &(0x7f0000001980)='GPL\x00', 0xff, 0x1000, &(0x7f00000039c0)=""/4096, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000019c0)={&(0x7f0000000180)='./file0\x00', r5}, 0x10) perf_event_open(&(0x7f0000001a00)={0x0, 0x70, 0x0, 0x8, 0x0, 0x3, 0x0, 0xb8, 0x1000, 0x0, 0x3, 0x4, 0xfff, 0x4, 0x4dae, 0x40, 0x100000001, 0x6, 0x4, 0x0, 0x3, 0x753c, 0x6, 0x100, 0x1de, 0x6, 0x4, 0x1, 0x6, 0x4, 0x7, 0x3, 0x7fff, 0x80000000, 0x3, 0x8, 0x81, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x7, 0x4}, 0x801, 0x400, 0x1, 0x4, 0x1, 0x9, 0x80000001}, r4, 0x7, r1, 0xb) r6 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000004000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000001c00)='./file0\x00', &(0x7f0000001c40)='./file0\x00', &(0x7f0000001c80)='devpts\x00', 0x40, &(0x7f0000001cc0)="be623dfd58807ac0b2f86f052863a5f30adc0bce173ebcf648cefd7d64732aeb5b94e6af3ab33e53669ba6d304d067dad4b1ff3ed87f18fd170aac904e8f105e80e22881717c98752a9cd7cfb06d102877e3b36b2624d22427331755a9514b225d25999ed605ffe4188630db2e7ddcc57f6316b60c4f3845d9dfcbbde5e49af627b48d7c9bd743b536de31a9ba3010cb6714c9b90a50537be55ca12a18e6541bff5a82d293e7734ea9c90707899663bd96b3bcce5887bf0bd35963c5adc39ddcb6f2a0a02b01661242046cb54ef1aec5a486b69e006305064124867bf79f4dc11798e214b61575168b79887122e0a3461f703c077f902c0a") socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r7, &(0x7f0000001800)={&(0x7f0000000240)=@alg, 0x80, &(0x7f0000000740)=[{&(0x7f00000002c0)=""/83, 0x53}, {&(0x7f0000000340)=""/27, 0x1b}, {&(0x7f0000000380)}, {&(0x7f00000003c0)=""/40, 0x28}, {&(0x7f0000000400)=""/144, 0x90}, {&(0x7f00000004c0)=""/200, 0xc8}, {&(0x7f00000005c0)=""/60, 0x3c}, {&(0x7f0000000600)=""/105, 0x69}, {&(0x7f0000000680)=""/127, 0x7f}, {&(0x7f0000000700)=""/8, 0x8}], 0xa, &(0x7f0000000800)=""/4096, 0x1000}, 0x10000) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000002340)=0xf60) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000003900)={&(0x7f0000003400)=@can={0x0, 0x0}, 0x80, &(0x7f0000003840)=[{&(0x7f0000003480)=""/194, 0xc2}, {&(0x7f0000003580)=""/250, 0xfa}, {&(0x7f0000003680)=""/100, 0x64}, {&(0x7f0000003700)=""/14, 0xe}, {&(0x7f0000003740)=""/159, 0x9f}, {&(0x7f0000003800)=""/15, 0xf}], 0x6, &(0x7f00000038c0)=""/29, 0x1d, 0x5}, 0x3) bpf$PROG_LOAD(0x5, &(0x7f0000003940)={0x4, 0x9, &(0x7f0000001840)=ANY=[@ANYBLOB="18000000030000000000000003000000dfd00c00fcffffff0000000000000000000803000101000000810000000000000001f0fff0ffffff000000000000000095000000000017d2"], &(0x7f0000000380)='GPL\x00', 0xf172, 0x4b, &(0x7f00000018c0)=""/75, 0x41f00, 0x1, [], r8}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000000c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001f00)={0xffffffffffffffff, 0x0, 0xf6, 0x22, &(0x7f0000001dc0)="9ef9482ea02fd36d0a768986a7ebe7a627dc88937e7073e3521858dfa0d5e02f571a01cfdfa76e048e5f956ea5da60b90e02a6c3d3687ed61ec9ab5b682c02498bddef38de9ce8c753e41e78f414d16202a033b6c7752711a5f56924e7846d6dcde2f71026e1eb0319b5e60f6b1ec67fca31c3cf1691d3af91a19f56be5a10ff337a53ba13dd3d75e1555211954b92ec0082d02b7b4cdddc021cbe84e4af8f20788977e3416918843e6c92b2ebf7b8b33ecbd4c7c9a9d5036c3e3e538748a32f1a28eb77818ca1878ffdd445dcdb8a40e6221e0fc474428449dfe93c62bbc69996aa9b34488c1da4f6f7c2275305a6a4fb256c1a516d", &(0x7f0000001ec0)=""/34, 0x1f, 0x1}, 0x28) close(r6) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x3441, &(0x7f0000000080)) mount(&(0x7f00000021c0)='./file0/file0\x00', &(0x7f0000002200)='./file0/file0\x00', &(0x7f0000002240)='fuse\x00', 0x2000000, &(0x7f0000002280)="9b3923bfddc346e9fa2aeaffae6ca386d8d50ba83ab72218340d3c30c045a89ac016797652ba04f1a203cfceccb458dbfd9fd03c4a80ef9a40dc7a4f24b6619d04a58186466fd8465757d9ee053c082cdfa957e7efab6191761847cca59c017493ef5e3d22432cf0b4ebef") ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f00000023c0)=ANY=[@ANYBLOB="07000000000000000000000000000000000000000000000000000000000000000000000067eb0ecf1cfa4ffd89aa7e339417beb7d332a5c996e59875644dd1e3a690110400bc751bb0435977d90fcbb2b83c27812d818991d125e9c0f199be2bc7f01aa0a5cb9b9f99438aa0f1ae3d50201f7bb276536f567f03f062994da292b6db0000000000000000000000000000a93536f303000000000000002a27f6ae1258ebb5079c1bab4f1f6f11ee8ce2e590855a3af38e4bb871ef8400000000000000000000"]) mount(&(0x7f0000001b40)='./file0\x00', &(0x7f0000001b80)='./file0/file0\x00', &(0x7f0000002100)='vfat\x00', 0x0, &(0x7f0000002140)="98980e21ac8b46c0b7bedeee39e6bd9ae4088d6ab47dc9dc76a39e299ce3783aa33e482e450484961fd3e3c5b178fafbe54440e19512ea4298652ed129d4241d9d116d8a5c2b931d350f0c989f8a288fc9e56c") mount(&(0x7f0000df7000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='hugetlbfs\x00', 0x200, &(0x7f00000001c0)) mkdir(&(0x7f00000004c0)='./file0/file0\x00', 0x0) socketpair$inet(0x2, 0x0, 0x1f, &(0x7f0000000080)) [ 226.440941] RBP: 000000000072bea0 R08: 0000000020000040 R09: 0000000000000000 [ 226.448191] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 226.455441] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000007 [ 226.825668] devpts: called with bogus options [ 226.850700] hugetlbfs: Bad mount option: "" 2018/03/31 08:26:09 executing program 3 (fault-call:10 fault-nth:15): r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000348f88)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r2}, 0x10) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) mount(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f00000002c0)='devpts\x00', 0x800000, &(0x7f0000000300)) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') 2018/03/31 08:26:09 executing program 7: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x80000000000, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000001fc0)) sendmsg(0xffffffffffffffff, &(0x7f00000024c0)={&(0x7f0000002040)=@un=@file={0x0, './file0\x00'}, 0x80, &(0x7f0000001f40)=[{&(0x7f00000020c0)="73c7575b94a72990e177f86ed4835a72a65c1a6c6831eeb0c48163a47ab63bcb605c8450cc4798ff6521c2aa722d1a7105c8a07e6c", 0x35}], 0x1, &(0x7f0000002500)=ANY=[], 0x0, 0x40000}, 0x20000000) r2 = gettid() r3 = perf_event_open(&(0x7f0000001ac0)={0x1, 0x70, 0xffffffff, 0x835, 0x9, 0xffffffffffffff5f, 0x0, 0x1000, 0x42000, 0x3, 0x8, 0x80, 0x1, 0x4, 0x100000001, 0x9, 0xff, 0x8, 0x1000, 0x7, 0x7f, 0x200, 0xb715, 0x3, 0x7fffffff, 0xf0a, 0x40, 0x8000, 0x8, 0x7, 0xffffffffffffff74, 0x4, 0x6, 0x100, 0x7, 0x335, 0x3ff, 0x58, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000001a80), 0xe}, 0x0, 0x80000000, 0x82, 0x7, 0x5, 0x3, 0x80000001}, r2, 0x0, r1, 0x8) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000200)='mqueue\x00', 0x0, &(0x7f000000a000)) r4 = getpid() r5 = bpf$PROG_LOAD(0x5, &(0x7f0000002500)={0xf, 0x7, &(0x7f0000001940)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, [@ldst={0x3, 0x3, 0x3, 0x4, 0x3, 0x2, 0xffffffffffffffff}, @exit={0x95}], {0x95}}, &(0x7f0000001980)='GPL\x00', 0xff, 0x1000, &(0x7f00000039c0)=""/4096, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000019c0)={&(0x7f0000000180)='./file0\x00', r5}, 0x10) perf_event_open(&(0x7f0000001a00)={0x0, 0x70, 0x0, 0x8, 0x0, 0x3, 0x0, 0xb8, 0x1000, 0x0, 0x3, 0x4, 0xfff, 0x4, 0x4dae, 0x40, 0x100000001, 0x6, 0x4, 0x0, 0x3, 0x753c, 0x6, 0x100, 0x1de, 0x6, 0x4, 0x1, 0x6, 0x4, 0x7, 0x3, 0x7fff, 0x80000000, 0x3, 0x8, 0x81, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x7, 0x4}, 0x801, 0x400, 0x1, 0x4, 0x1, 0x9, 0x80000001}, r4, 0x7, r1, 0xb) r6 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000004000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000001c00)='./file0\x00', &(0x7f0000001c40)='./file0\x00', &(0x7f0000001c80)='devpts\x00', 0x40, &(0x7f0000001cc0)="be623dfd58807ac0b2f86f052863a5f30adc0bce173ebcf648cefd7d64732aeb5b94e6af3ab33e53669ba6d304d067dad4b1ff3ed87f18fd170aac904e8f105e80e22881717c98752a9cd7cfb06d102877e3b36b2624d22427331755a9514b225d25999ed605ffe4188630db2e7ddcc57f6316b60c4f3845d9dfcbbde5e49af627b48d7c9bd743b536de31a9ba3010cb6714c9b90a50537be55ca12a18e6541bff5a82d293e7734ea9c90707899663bd96b3bcce5887bf0bd35963c5adc39ddcb6f2a0a02b01661242046cb54ef1aec5a486b69e006305064124867bf79f4dc11798e214b61575168b79887122e0a3461f703c077f902c0a") socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r7, &(0x7f0000001800)={&(0x7f0000000240)=@alg, 0x80, &(0x7f0000000740)=[{&(0x7f00000002c0)=""/83, 0x53}, {&(0x7f0000000340)=""/27, 0x1b}, {&(0x7f0000000380)}, {&(0x7f00000003c0)=""/40, 0x28}, {&(0x7f0000000400)=""/144, 0x90}, {&(0x7f00000004c0)=""/200, 0xc8}, {&(0x7f00000005c0)=""/60, 0x3c}, {&(0x7f0000000600)=""/105, 0x69}, {&(0x7f0000000680)=""/127, 0x7f}, {&(0x7f0000000700)=""/8, 0x8}], 0xa, &(0x7f0000000800)=""/4096, 0x1000}, 0x10000) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000002340)=0xf60) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000003900)={&(0x7f0000003400)=@can={0x0, 0x0}, 0x80, &(0x7f0000003840)=[{&(0x7f0000003480)=""/194, 0xc2}, {&(0x7f0000003580)=""/250, 0xfa}, {&(0x7f0000003680)=""/100, 0x64}, {&(0x7f0000003700)=""/14, 0xe}, {&(0x7f0000003740)=""/159, 0x9f}, {&(0x7f0000003800)=""/15, 0xf}], 0x6, &(0x7f00000038c0)=""/29, 0x1d, 0x5}, 0x3) bpf$PROG_LOAD(0x5, &(0x7f0000003940)={0x4, 0x9, &(0x7f0000001840)=ANY=[@ANYBLOB="18000000030000000000000003000000dfd00c00fcffffff0000000000000000000803000101000000810000000000000001f0fff0ffffff000000000000000095000000000017d2"], &(0x7f0000000380)='GPL\x00', 0xf172, 0x4b, &(0x7f00000018c0)=""/75, 0x41f00, 0x1, [], r8}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000000c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001f00)={0xffffffffffffffff, 0x0, 0xf6, 0x22, &(0x7f0000001dc0)="9ef9482ea02fd36d0a768986a7ebe7a627dc88937e7073e3521858dfa0d5e02f571a01cfdfa76e048e5f956ea5da60b90e02a6c3d3687ed61ec9ab5b682c02498bddef38de9ce8c753e41e78f414d16202a033b6c7752711a5f56924e7846d6dcde2f71026e1eb0319b5e60f6b1ec67fca31c3cf1691d3af91a19f56be5a10ff337a53ba13dd3d75e1555211954b92ec0082d02b7b4cdddc021cbe84e4af8f20788977e3416918843e6c92b2ebf7b8b33ecbd4c7c9a9d5036c3e3e538748a32f1a28eb77818ca1878ffdd445dcdb8a40e6221e0fc474428449dfe93c62bbc69996aa9b34488c1da4f6f7c2275305a6a4fb256c1a516d", &(0x7f0000001ec0)=""/34, 0x1f, 0x1}, 0x28) close(r6) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x3441, &(0x7f0000000080)) mount(&(0x7f00000021c0)='./file0/file0\x00', &(0x7f0000002200)='./file0/file0\x00', &(0x7f0000002240)='fuse\x00', 0x2000000, &(0x7f0000002280)="9b3923bfddc346e9fa2aeaffae6ca386d8d50ba83ab72218340d3c30c045a89ac016797652ba04f1a203cfceccb458dbfd9fd03c4a80ef9a40dc7a4f24b6619d04a58186466fd8465757d9ee053c082cdfa957e7efab6191761847cca59c017493ef5e3d22432cf0b4ebef") ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f00000023c0)=ANY=[@ANYBLOB="07000000000000000000000000000000000000000000000000000000000000000000000067eb0ecf1cfa4ffd89aa7e339417beb7d332a5c996e59875644dd1e3a690110400bc751bb0435977d90fcbb2b83c27812d818991d125e9c0f199be2bc7f01aa0a5cb9b9f99438aa0f1ae3d50201f7bb276536f567f03f062994da292b6db0000000000000000000000000000a93536f303000000000000002a27f6ae1258ebb5079c1bab4f1f6f11ee8ce2e590855a3af38e4bb871ef8400000000000000000000"]) mount(&(0x7f0000001b40)='./file0\x00', &(0x7f0000001b80)='./file0/file0\x00', &(0x7f0000002100)='vfat\x00', 0x0, &(0x7f0000002140)="98980e21ac8b46c0b7bedeee39e6bd9ae4088d6ab47dc9dc76a39e299ce3783aa33e482e450484961fd3e3c5b178fafbe54440e19512ea4298652ed129d4241d9d116d8a5c2b931d350f0c989f8a288fc9e56c") mount(&(0x7f0000df7000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='hugetlbfs\x00', 0x200, &(0x7f00000001c0)) mkdir(&(0x7f00000004c0)='./file0/file0\x00', 0x0) socketpair$inet(0x2, 0x0, 0x1f, &(0x7f0000000080)) 2018/03/31 08:26:09 executing program 1: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f00000000c0)='./file0\x00', r0}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000180)='vmnet0keyring\x00') mount(&(0x7f0000000200)='./file0/file0\x00', &(0x7f0000000040)='./file0/file1\x00', &(0x7f0000000580)="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", 0x40, &(0x7f00000007c0)="cacac5bea75f8433c5a47060f95980271d4a2abee1f0f89696be47f095659d1606784b7d9df9e90c218eb8b197f746e6e8113f4f60a5cd87a9d619fa5f48f0cfb1edebd56066fe8892d7224b25f52ea77e2c1d024022fcce65e7a89a6ace9ff4f5974d22d45b8ff5c6345a95be32070ed1d5b55e3fa57d6035c752292b9199282c8da18d5bfcc7f6a1ab048595a01e1287b61fb38bfcfcc1aff40be633858f8921310b7d84a7fa2373ff81c6f6") bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={0xffffffffffffffff, &(0x7f0000000700), &(0x7f00000009c0)=""/161}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x8, 0x100, 0x200, 0x6108, 0x3, 0xffffffffffffffff, 0x6}, 0x2c) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)) 2018/03/31 08:26:09 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x0, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r6 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000200)={0x0, r4, 0x0, 0x2}, 0x14) mount(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f00000009c0)="3949bcf20271c219f64b9e3fbd45bfae692375440912d5a576c2d82299018de50363f2cf30a439b45c2738869283b7900c1e030013700557a768d5cc05cb9ed624684f4dfdae73a8148b29b2978222576dabbcb3556bcf35a8f66fa68ceb0b834ec5120ac749dc0cc5aab7b0197711785349b1673ff5159bc1a40df6c779950e0747a25ce77a10f68b663a87fc993224a79b583eac02a2171f076ff3", 0x1000, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0x10001) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) 2018/03/31 08:26:09 executing program 6: socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000000)) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) socketpair(0x0, 0x4, 0x6, &(0x7f0000000180)) socketpair(0xf, 0x3, 0x2, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000140)={&(0x7f0000000080)=@in6, 0x80, &(0x7f0000000100)=[{&(0x7f00000001c0)=""/169, 0xa9}, {&(0x7f0000000280)=""/250, 0xfa}], 0x2, &(0x7f0000000380)=""/218, 0xda, 0x2400000000000000}, 0x10100) 2018/03/31 08:26:09 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0xfffffffffffffffe, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x44d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) socketpair(0x0, 0x4, 0x6, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000080)) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x10400, &(0x7f00000001c0)="b0083604c34f7841898924b1edb684da4adc547d8fd065e46ec681a24fe6cf5b0c39712d134bf23f25989bae5e9f042fd88062f0dd5b461e391f2beb50e3b53a1b1ca567a1cd9bee00e6d84edc11f6eb8fe251b50d6862e8aebe706e96b7e9dfab42fb06780374f15b9bff1c86d0b1d68610bde3fc7a01c49706f2c78959fac06a62702c2865fd9aeec60b44c0138726b74f3b32d4df4f08") socketpair(0xf, 0x3, 0x2, &(0x7f0000000040)) 2018/03/31 08:26:09 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000000003042df8700"]) r1 = perf_event_open(&(0x7f0000348f88)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x0, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r2}, 0x10) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) mount(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f00000002c0)='devpts\x00', 0x800000, &(0x7f0000000300)="7b18f1563c67659c49445440cbb57f32c0f4710f0219046399f3e8a25c5d4975e2b42f404b14937bd42d9874bdd132eef77f584d5151c9a97470a0d77a0c24a85e319673350e16b039bf474ec320") socketpair(0x3, 0x800, 0x81, &(0x7f00000003c0)) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') 2018/03/31 08:26:09 executing program 2 (fault-call:9 fault-nth:8): r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000348f88)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r2}, 0x10) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') [ 226.970782] FAULT_INJECTION: forcing a failure. [ 226.970782] name failslab, interval 1, probability 0, space 0, times 0 [ 226.973927] FAULT_INJECTION: forcing a failure. [ 226.973927] name failslab, interval 1, probability 0, space 0, times 0 [ 226.982109] CPU: 1 PID: 16130 Comm: syz-executor2 Not tainted 4.16.0-rc6+ #43 [ 227.000539] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 227.009880] Call Trace: [ 227.012456] dump_stack+0x194/0x24d [ 227.016071] ? arch_local_irq_restore+0x53/0x53 [ 227.020737] should_fail+0x8c0/0xa40 [ 227.024446] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 227.029540] ? perf_trace_lock+0x900/0x900 [ 227.033761] ? lock_release+0xa40/0xa40 [ 227.037731] ? find_held_lock+0x35/0x1d0 [ 227.041801] ? check_same_owner+0x320/0x320 [ 227.046107] ? sget_userns+0x27d/0xe40 [ 227.049980] ? rcu_note_context_switch+0x710/0x710 [ 227.054899] should_failslab+0xec/0x120 [ 227.058861] kmem_cache_alloc_trace+0x4b/0x740 [ 227.063427] ? sysfs_mount+0xc2/0x1c0 [ 227.067210] ? mount_fs+0x66/0x2d0 [ 227.070733] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 227.075472] ? do_mount+0xea4/0x2bb0 [ 227.079167] ? SyS_mount+0xab/0x120 [ 227.082777] ? do_syscall_64+0x281/0x940 [ 227.086829] sget_userns+0x2a3/0xe40 [ 227.090532] ? kernfs_sop_show_path+0x190/0x190 [ 227.095189] ? kernfs_sop_show_options+0x180/0x180 [ 227.100107] ? destroy_unused_super.part.6+0xd0/0xd0 [ 227.105204] ? check_same_owner+0x320/0x320 [ 227.109512] ? rcu_pm_notify+0xc0/0xc0 [ 227.113391] ? kernfs_mount_ns+0xb5/0x8b0 [ 227.117523] ? rcu_read_lock_sched_held+0x108/0x120 [ 227.122522] ? kmem_cache_alloc_trace+0x459/0x740 [ 227.127351] ? lock_downgrade+0x980/0x980 [ 227.131492] kernfs_mount_ns+0x13d/0x8b0 [ 227.135539] ? kernfs_super_ns+0x70/0x70 [ 227.139592] sysfs_mount+0xc2/0x1c0 [ 227.143204] ? sysfs_kill_sb+0x40/0x40 [ 227.147076] ? alloc_pages_current+0xbe/0x1e0 [ 227.151556] ? security_sb_copy_data+0x81/0xb0 [ 227.156122] mount_fs+0x66/0x2d0 [ 227.159479] vfs_kern_mount.part.26+0xc6/0x4a0 [ 227.164048] ? may_umount+0xa0/0xa0 [ 227.167661] ? _raw_read_unlock+0x22/0x30 [ 227.171814] ? __get_fs_type+0x8a/0xc0 [ 227.175689] do_mount+0xea4/0x2bb0 [ 227.179215] ? retint_kernel+0x10/0x10 [ 227.183089] ? copy_mount_string+0x40/0x40 [ 227.187311] ? rcu_pm_notify+0xc0/0xc0 [ 227.191188] ? copy_mount_options+0x5f/0x2e0 [ 227.195607] ? rcu_read_lock_sched_held+0x108/0x120 [ 227.200613] ? kmem_cache_alloc_trace+0x459/0x740 [ 227.205441] ? kasan_check_write+0x14/0x20 [ 227.209660] ? _copy_from_user+0x99/0x110 [ 227.213798] ? copy_mount_options+0x1f7/0x2e0 [ 227.218279] SyS_mount+0xab/0x120 [ 227.221716] ? copy_mnt_ns+0xb30/0xb30 [ 227.225590] do_syscall_64+0x281/0x940 [ 227.229460] ? vmalloc_sync_all+0x30/0x30 [ 227.233589] ? _raw_spin_unlock_irq+0x27/0x70 [ 227.238071] ? finish_task_switch+0x1c1/0x7e0 [ 227.242553] ? syscall_return_slowpath+0x550/0x550 [ 227.247469] ? syscall_return_slowpath+0x2ac/0x550 [ 227.252384] ? prepare_exit_to_usermode+0x350/0x350 [ 227.257385] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 227.262740] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 227.267575] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 227.272747] RIP: 0033:0x454e79 [ 227.275920] RSP: 002b:00007f3ee2ac1c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 227.283616] RAX: ffffffffffffffda RBX: 00007f3ee2ac26d4 RCX: 0000000000454e79 [ 227.290873] RDX: 0000000020000100 RSI: 0000000020000180 RDI: 0000000020000100 [ 227.298126] RBP: 000000000072bea0 R08: 0000000020000040 R09: 0000000000000000 [ 227.305380] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 227.312633] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000008 [ 227.319908] CPU: 0 PID: 16128 Comm: syz-executor3 Not tainted 4.16.0-rc6+ #43 [ 227.327184] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 227.336532] Call Trace: [ 227.339119] dump_stack+0x194/0x24d [ 227.342742] ? arch_local_irq_restore+0x53/0x53 [ 227.347398] ? __save_stack_trace+0x7e/0xd0 [ 227.351709] should_fail+0x8c0/0xa40 [ 227.355406] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 227.360491] ? kasan_kmalloc+0xad/0xe0 [ 227.364356] ? kmem_cache_alloc_trace+0x136/0x740 [ 227.369178] ? __memcg_init_list_lru_node+0x169/0x270 [ 227.374345] ? __list_lru_init+0x544/0x750 [ 227.378559] ? sget_userns+0x691/0xe40 [ 227.382428] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 227.387160] ? do_mount+0xea4/0x2bb0 [ 227.390851] ? SyS_mount+0xab/0x120 [ 227.394461] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 227.399809] ? find_held_lock+0x35/0x1d0 [ 227.403856] ? __lock_is_held+0xb6/0x140 [ 227.407909] ? check_same_owner+0x320/0x320 [ 227.412217] ? rcu_note_context_switch+0x710/0x710 [ 227.417654] should_failslab+0xec/0x120 [ 227.421609] kmem_cache_alloc_trace+0x4b/0x740 [ 227.426171] ? __kmalloc_node+0x33/0x70 [ 227.430122] ? __kmalloc_node+0x33/0x70 [ 227.434076] ? rcu_read_lock_sched_held+0x108/0x120 [ 227.439089] __memcg_init_list_lru_node+0x169/0x270 [ 227.444088] ? list_lru_add+0x7c0/0x7c0 [ 227.448041] ? __kmalloc_node+0x47/0x70 [ 227.452018] __list_lru_init+0x544/0x750 [ 227.456067] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 227.461932] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 227.466930] ? __lockdep_init_map+0xe4/0x650 [ 227.471321] ? lockdep_init_map+0x9/0x10 [ 227.475365] sget_userns+0x691/0xe40 [ 227.479069] ? kernfs_sop_show_path+0x190/0x190 [ 227.483722] ? kernfs_sop_show_options+0x180/0x180 [ 227.488633] ? destroy_unused_super.part.6+0xd0/0xd0 [ 227.493723] ? check_same_owner+0x320/0x320 [ 227.498031] ? rcu_pm_notify+0xc0/0xc0 [ 227.501908] ? rcu_read_lock_sched_held+0x108/0x120 [ 227.506904] ? kmem_cache_alloc_trace+0x459/0x740 [ 227.511736] ? lock_downgrade+0x980/0x980 [ 227.515874] kernfs_mount_ns+0x13d/0x8b0 [ 227.519919] ? kernfs_super_ns+0x70/0x70 [ 227.523969] sysfs_mount+0xc2/0x1c0 [ 227.527574] ? sysfs_kill_sb+0x40/0x40 [ 227.531444] ? alloc_pages_current+0xbe/0x1e0 [ 227.535923] ? security_sb_copy_data+0x81/0xb0 [ 227.540489] mount_fs+0x66/0x2d0 [ 227.543839] vfs_kern_mount.part.26+0xc6/0x4a0 [ 227.548402] ? may_umount+0xa0/0xa0 [ 227.552013] ? _raw_read_unlock+0x22/0x30 [ 227.556148] ? __get_fs_type+0x8a/0xc0 [ 227.560026] do_mount+0xea4/0x2bb0 [ 227.563558] ? copy_mount_string+0x40/0x40 [ 227.567787] ? rcu_pm_notify+0xc0/0xc0 [ 227.571664] ? copy_mount_options+0x5f/0x2e0 [ 227.576052] ? rcu_read_lock_sched_held+0x108/0x120 [ 227.581050] ? kmem_cache_alloc_trace+0x459/0x740 [ 227.585874] ? kasan_check_write+0x14/0x20 [ 227.590090] ? _copy_from_user+0x99/0x110 [ 227.594224] ? copy_mount_options+0x1f7/0x2e0 [ 227.598700] SyS_mount+0xab/0x120 [ 227.602131] ? copy_mnt_ns+0xb30/0xb30 [ 227.606001] do_syscall_64+0x281/0x940 [ 227.609872] ? vmalloc_sync_all+0x30/0x30 [ 227.613999] ? _raw_spin_unlock_irq+0x27/0x70 [ 227.618481] ? finish_task_switch+0x1c1/0x7e0 [ 227.622957] ? syscall_return_slowpath+0x550/0x550 [ 227.627868] ? syscall_return_slowpath+0x2ac/0x550 [ 227.632780] ? prepare_exit_to_usermode+0x350/0x350 [ 227.637777] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 227.643123] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 227.647949] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 227.653115] RIP: 0033:0x454e79 [ 227.656292] RSP: 002b:00007fbfd4b96c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 227.663982] RAX: ffffffffffffffda RBX: 00007fbfd4b976d4 RCX: 0000000000454e79 2018/03/31 08:26:10 executing program 2 (fault-call:9 fault-nth:9): r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000348f88)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r2}, 0x10) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') 2018/03/31 08:26:10 executing program 1: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000005d40)={&(0x7f0000004a00)=@hci={0x0, 0x0}, 0x80, &(0x7f0000005cc0)=[{&(0x7f0000004a80)=""/117, 0x75}, {&(0x7f0000004b00)=""/4096, 0x1000}, {&(0x7f0000005b00)=""/35, 0x23}, {&(0x7f0000005b40)=""/220, 0xdc}, {&(0x7f0000005c40)=""/43, 0x2b}, {&(0x7f0000005c80)=""/55, 0x37}], 0x6, 0x0, 0x0, 0x7112}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000005d80)={0xf, 0x13, &(0x7f0000000600)=ANY=[@ANYBLOB="18000000000800a617a8020004000000000000000000000000020100dd6af6fff0ffffff000000000000000018130000eff1bec2cfe2e8382cba98037afa4fbec2efebab8462b17f69444329830b4ee411664b89af08e5511d3d4765c4bec58b53d925c451a03b312e5e55dda789c9de547e46653bbbbad2c7f1b30fc78bbb8794578e6fd3f281cd8abc89ffffc7cf369720000000004f8a54730ad6d3445e652530a8517f17dfc878a67042410d13863b2fc0f193808d3fb0ddb8478a36045ca9a1a17c3061197a52d4defc3d058b3bb27c905e349fb3ccb45a", @ANYRES32=r0, @ANYBLOB="00000000000000008465fcff10000000000000000000000095000000000000000000000000000000850000001e00000000000000000000002c352000050000000000000000000000fd0f0000ffffffff00000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00', 0x8, 0xd2, &(0x7f0000000500)=""/210, 0x41100, 0x1, [], r1}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={0xffffffffffffffff, &(0x7f00000002c0)="50f282feb35a92ed3455ca60fd1140628a32fd442e296742eb6d7a25a14a49d585c36beddcf5c3323e8981bd8f0439346c2897e93673606f56cd6dd7273ef805d9773eac6153db4879d1859098754ca62807f57c0e1137535a80f35c10e5e69bc39130240b2f3b4f9848829c85491abdd1f9d646710f38db9861c9e78298435938d4e18b272fb800b21ce2d36ac73f60a4f8d63a", &(0x7f00000009c0)=""/161}, 0x18) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000100)) 2018/03/31 08:26:10 executing program 3 (fault-call:10 fault-nth:16): r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000348f88)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r2}, 0x10) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) mount(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f00000002c0)='devpts\x00', 0x800000, &(0x7f0000000300)) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') [ 227.671230] RDX: 0000000020000100 RSI: 0000000020000180 RDI: 0000000020000100 [ 227.678479] RBP: 000000000072bea0 R08: 0000000020000040 R09: 0000000000000000 [ 227.685728] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 227.692975] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000000f 2018/03/31 08:26:10 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0xfffffffffffffffd) socketpair(0x0, 0x4, 0x6, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) socketpair(0xf, 0x3, 0x2, &(0x7f0000000040)) 2018/03/31 08:26:10 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000000003042df8700"]) r1 = perf_event_open(&(0x7f0000348f88)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x0, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r2}, 0x10) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) mount(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f00000002c0)='devpts\x00', 0x800000, &(0x7f0000000300)="7b18f1563c67659c49445440cbb57f32c0f4710f0219046399f3e8a25c5d4975e2b42f404b14937bd42d9874bdd132eef77f584d5151c9a97470a0d77a0c24a85e319673350e16b039bf474ec320") socketpair(0x3, 0x800, 0x81, &(0x7f00000003c0)) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') 2018/03/31 08:26:10 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x0, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r5 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000200)=0x3) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f00000009c0)="3949bcf20271c219f64b9e3fbd45bfae692375440912d5a576c2d82299018de50363f2cf30a439b45c2738869283b7900c1e030013700557a768d5cc05cb9ed624684f4dfdae73a8148b29b2978222576dabbcb3556bcf35a8f66fa68ceb0b834ec5120ac749dc0cc5aab7b0197711785349b1673ff5159bc1a40df6c779950e0747a25ce77a10f68b663a87fc993224a79b583eac02a2171f076ff3", 0x1000, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) 2018/03/31 08:26:10 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0xf, 0x9, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000ff03000000000000040000007debc0ff000000000000000000001f00d2a6fcff10000000000000000000000018000000d4af000000000000010000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0x10001, 0xb5, &(0x7f0000000200)=""/181, 0x0, 0x1}, 0x48) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000003c0)=r0, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000340)={&(0x7f00000000c0)='./file0/file0\x00', r0}, 0x10) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) socketpair(0x0, 0x4, 0x6, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x1) socketpair$inet(0x2, 0x80805, 0x9, &(0x7f0000000080)) socketpair(0xf, 0x3, 0x2, &(0x7f0000000040)) [ 227.954821] devpts: called with bogus options [ 228.001824] FAULT_INJECTION: forcing a failure. [ 228.001824] name failslab, interval 1, probability 0, space 0, times 0 [ 228.013204] CPU: 0 PID: 16157 Comm: syz-executor2 Not tainted 4.16.0-rc6+ #43 [ 228.020481] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 228.029825] Call Trace: [ 228.032393] dump_stack+0x194/0x24d [ 228.036009] ? arch_local_irq_restore+0x53/0x53 [ 228.040672] should_fail+0x8c0/0xa40 [ 228.044364] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 228.049455] ? find_next_zero_bit+0xe3/0x110 [ 228.053854] ? trace_hardirqs_off+0x10/0x10 [ 228.058163] ? __lock_is_held+0xb6/0x140 [ 228.062217] ? find_held_lock+0x35/0x1d0 [ 228.066329] ? __lock_is_held+0xb6/0x140 [ 228.066933] hugetlbfs: Bad mount option: "" [ 228.070399] ? check_same_owner+0x320/0x320 [ 228.070415] ? rcu_note_context_switch+0x710/0x710 [ 228.070426] ? rcu_note_context_switch+0x710/0x710 [ 228.070445] should_failslab+0xec/0x120 [ 228.070456] __kmalloc+0x63/0x760 [ 228.070468] ? lockdep_init_map+0x9/0x10 [ 228.070480] ? debug_mutex_init+0x2d/0x60 [ 228.104567] ? __list_lru_init+0xcf/0x750 [ 228.108701] __list_lru_init+0xcf/0x750 [ 228.112664] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 228.118533] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 228.123541] ? __lockdep_init_map+0xe4/0x650 [ 228.127933] ? lockdep_init_map+0x9/0x10 [ 228.131978] sget_userns+0x691/0xe40 [ 228.135671] ? kernfs_sop_show_path+0x190/0x190 [ 228.140328] ? kernfs_sop_show_options+0x180/0x180 [ 228.145238] ? destroy_unused_super.part.6+0xd0/0xd0 [ 228.150334] ? check_same_owner+0x320/0x320 [ 228.154634] ? rcu_pm_notify+0xc0/0xc0 [ 228.158511] ? rcu_read_lock_sched_held+0x108/0x120 [ 228.163506] ? kmem_cache_alloc_trace+0x459/0x740 [ 228.168325] ? lock_downgrade+0x980/0x980 [ 228.172461] kernfs_mount_ns+0x13d/0x8b0 [ 228.176526] ? kernfs_super_ns+0x70/0x70 [ 228.180576] sysfs_mount+0xc2/0x1c0 [ 228.184182] ? sysfs_kill_sb+0x40/0x40 [ 228.188050] ? alloc_pages_current+0xbe/0x1e0 [ 228.192877] ? security_sb_copy_data+0x81/0xb0 [ 228.197443] mount_fs+0x66/0x2d0 [ 228.200795] vfs_kern_mount.part.26+0xc6/0x4a0 [ 228.205370] ? may_umount+0xa0/0xa0 [ 228.208980] ? _raw_read_unlock+0x22/0x30 [ 228.213108] ? __get_fs_type+0x8a/0xc0 [ 228.216981] do_mount+0xea4/0x2bb0 [ 228.220507] ? copy_mount_string+0x40/0x40 [ 228.224722] ? rcu_pm_notify+0xc0/0xc0 [ 228.228597] ? copy_mount_options+0x5f/0x2e0 [ 228.232983] ? rcu_read_lock_sched_held+0x108/0x120 [ 228.237980] ? kmem_cache_alloc_trace+0x459/0x740 [ 228.242807] ? kasan_check_write+0x14/0x20 [ 228.247024] ? _copy_from_user+0x99/0x110 [ 228.251156] ? copy_mount_options+0x1f7/0x2e0 [ 228.255632] SyS_mount+0xab/0x120 [ 228.259063] ? copy_mnt_ns+0xb30/0xb30 [ 228.262933] do_syscall_64+0x281/0x940 [ 228.266799] ? vmalloc_sync_all+0x30/0x30 [ 228.270924] ? _raw_spin_unlock_irq+0x27/0x70 [ 228.275398] ? finish_task_switch+0x1c1/0x7e0 [ 228.279876] ? syscall_return_slowpath+0x550/0x550 [ 228.284788] ? syscall_return_slowpath+0x2ac/0x550 [ 228.289700] ? prepare_exit_to_usermode+0x350/0x350 [ 228.294698] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 228.300045] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 228.304874] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 228.310043] RIP: 0033:0x454e79 [ 228.313211] RSP: 002b:00007f3ee2ac1c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 228.320901] RAX: ffffffffffffffda RBX: 00007f3ee2ac26d4 RCX: 0000000000454e79 [ 228.328151] RDX: 0000000020000100 RSI: 0000000020000180 RDI: 0000000020000100 [ 228.335398] RBP: 000000000072bea0 R08: 0000000020000040 R09: 0000000000000000 [ 228.342646] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 2018/03/31 08:26:11 executing program 7: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x80000000000, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000001fc0)) sendmsg(0xffffffffffffffff, &(0x7f00000024c0)={&(0x7f0000002040)=@un=@file={0x0, './file0\x00'}, 0x80, &(0x7f0000001f40)=[{&(0x7f00000020c0)="73c7575b94a72990e177f86ed4835a72a65c1a6c6831eeb0c48163a47ab63bcb605c8450cc4798ff6521c2aa722d1a7105c8a07e6c", 0x35}], 0x1, &(0x7f0000002500)=ANY=[], 0x0, 0x40000}, 0x20000000) r2 = gettid() r3 = perf_event_open(&(0x7f0000001ac0)={0x1, 0x70, 0xffffffff, 0x835, 0x9, 0xffffffffffffff5f, 0x0, 0x1000, 0x42000, 0x3, 0x8, 0x80, 0x1, 0x4, 0x100000001, 0x9, 0xff, 0x8, 0x1000, 0x7, 0x7f, 0x200, 0xb715, 0x3, 0x7fffffff, 0xf0a, 0x40, 0x8000, 0x8, 0x7, 0xffffffffffffff74, 0x4, 0x6, 0x100, 0x7, 0x335, 0x3ff, 0x58, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000001a80), 0xe}, 0x0, 0x80000000, 0x82, 0x7, 0x5, 0x3, 0x80000001}, r2, 0xd, 0xffffffffffffffff, 0x8) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000200)='mqueue\x00', 0x0, &(0x7f000000a000)) r4 = getpid() r5 = bpf$PROG_LOAD(0x5, &(0x7f0000002500)={0xf, 0x7, &(0x7f0000001940)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, [@ldst={0x3, 0x3, 0x3, 0x4, 0x3, 0x2, 0xffffffffffffffff}, @exit={0x95}], {0x95}}, &(0x7f0000001980)='GPL\x00', 0xff, 0x1000, &(0x7f00000039c0)=""/4096, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000019c0)={&(0x7f0000000180)='./file0\x00', r5}, 0x10) perf_event_open(&(0x7f0000001a00)={0x0, 0x70, 0x0, 0x8, 0x0, 0x3, 0x0, 0xb8, 0x1000, 0x0, 0x3, 0x4, 0xfff, 0x4, 0x4dae, 0x40, 0x100000001, 0x6, 0x4, 0x0, 0x3, 0x753c, 0x6, 0x100, 0x1de, 0x6, 0x4, 0x1, 0x6, 0x4, 0x7, 0x3, 0x7fff, 0x80000000, 0x3, 0x8, 0x81, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x7, 0x4}, 0x801, 0x400, 0x1, 0x4, 0x1, 0x9, 0x80000001}, r4, 0x7, r1, 0xb) r6 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000004000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000001c00)='./file0\x00', &(0x7f0000001c40)='./file0\x00', &(0x7f0000001c80)='devpts\x00', 0x40, &(0x7f0000001cc0)="be623dfd58807ac0b2f86f052863a5f30adc0bce173ebcf648cefd7d64732aeb5b94e6af3ab33e53669ba6d304d067dad4b1ff3ed87f18fd170aac904e8f105e80e22881717c98752a9cd7cfb06d102877e3b36b2624d22427331755a9514b225d25999ed605ffe4188630db2e7ddcc57f6316b60c4f3845d9dfcbbde5e49af627b48d7c9bd743b536de31a9ba3010cb6714c9b90a50537be55ca12a18e6541bff5a82d293e7734ea9c90707899663bd96b3bcce5887bf0bd35963c5adc39ddcb6f2a0a02b01661242046cb54ef1aec5a486b69e006305064124867bf79f4dc11798e214b61575168b79887122e0a3461f703c077f902c0a") socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r7, &(0x7f0000001800)={&(0x7f0000000240)=@alg, 0x80, &(0x7f0000000740)=[{&(0x7f00000002c0)=""/83, 0x53}, {&(0x7f0000000340)=""/27, 0x1b}, {&(0x7f0000000380)}, {&(0x7f00000003c0)=""/40, 0x28}, {&(0x7f0000000400)=""/144, 0x90}, {&(0x7f00000004c0)=""/200, 0xc8}, {&(0x7f00000005c0)=""/60, 0x3c}, {&(0x7f0000000600)=""/105, 0x69}, {&(0x7f0000000680)=""/127, 0x7f}, {&(0x7f0000000700)=""/8, 0x8}], 0xa, &(0x7f0000000800)=""/4096, 0x1000}, 0x10000) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000002340)=0xf60) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000003900)={&(0x7f0000003400)=@can={0x0, 0x0}, 0x80, &(0x7f0000003840)=[{&(0x7f0000003480)=""/194, 0xc2}, {&(0x7f0000003580)=""/250, 0xfa}, {&(0x7f0000003680)=""/100, 0x64}, {&(0x7f0000003700)=""/14, 0xe}, {&(0x7f0000003740)=""/159, 0x9f}, {&(0x7f0000003800)=""/15, 0xf}], 0x6, &(0x7f00000038c0)=""/29, 0x1d, 0x5}, 0x3) bpf$PROG_LOAD(0x5, &(0x7f0000003940)={0x4, 0x9, &(0x7f0000001840)=ANY=[@ANYBLOB="18000000030000000000000003000000dfd00c00fcffffff0000000000000000000803000101000000810000000000000001f0fff0ffffff000000000000000095000000000017d2"], &(0x7f0000000380)='GPL\x00', 0xf172, 0x4b, &(0x7f00000018c0)=""/75, 0x41f00, 0x1, [], r8}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000000c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001f00)={0xffffffffffffffff, 0x0, 0xf6, 0x22, &(0x7f0000001dc0)="9ef9482ea02fd36d0a768986a7ebe7a627dc88937e7073e3521858dfa0d5e02f571a01cfdfa76e048e5f956ea5da60b90e02a6c3d3687ed61ec9ab5b682c02498bddef38de9ce8c753e41e78f414d16202a033b6c7752711a5f56924e7846d6dcde2f71026e1eb0319b5e60f6b1ec67fca31c3cf1691d3af91a19f56be5a10ff337a53ba13dd3d75e1555211954b92ec0082d02b7b4cdddc021cbe84e4af8f20788977e3416918843e6c92b2ebf7b8b33ecbd4c7c9a9d5036c3e3e538748a32f1a28eb77818ca1878ffdd445dcdb8a40e6221e0fc474428449dfe93c62bbc69996aa9b34488c1da4f6f7c2275305a6a4fb256c1a516d", &(0x7f0000001ec0)=""/34, 0x1f, 0x1}, 0x28) close(r6) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x3441, &(0x7f0000000080)) mount(&(0x7f00000021c0)='./file0/file0\x00', &(0x7f0000002200)='./file0/file0\x00', &(0x7f0000002240)='fuse\x00', 0x2000000, &(0x7f0000002280)="9b3923bfddc346e9fa2aeaffae6ca386d8d50ba83ab72218340d3c30c045a89ac016797652ba04f1a203cfceccb458dbfd9fd03c4a80ef9a40dc7a4f24b6619d04a58186466fd8465757d9ee053c082cdfa957e7efab6191761847cca59c017493ef5e3d22432cf0b4ebef") ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f00000023c0)=ANY=[@ANYBLOB="07000000000000000000000000000000000000000000000000000000000000000000000067eb0ecf1cfa4ffd89aa7e339417beb7d332a5c996e59875644dd1e3a690110400bc751bb0435977d90fcbb2b83c27812d818991d125e9c0f199be2bc7f01aa0a5cb9b9f99438aa0f1ae3d50201f7bb276536f567f03f062994da292b6db0000000000000000000000000000a93536f303000000000000002a27f6ae1258ebb5079c1bab4f1f6f11ee8ce2e590855a3af38e4bb871ef8400000000000000000000"]) mount(&(0x7f0000001b40)='./file0\x00', &(0x7f0000001b80)='./file0/file0\x00', &(0x7f0000002100)='vfat\x00', 0x0, &(0x7f0000002140)="98980e21ac8b46c0b7bedeee39e6bd9ae4088d6ab47dc9dc76a39e299ce3783aa33e482e450484961fd3e3c5b178fafbe54440e19512ea4298652ed129d4241d9d116d8a5c2b931d350f0c989f8a288fc9e56c") mount(&(0x7f0000df7000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='hugetlbfs\x00', 0x200, &(0x7f00000001c0)) mkdir(&(0x7f00000004c0)='./file0/file0\x00', 0x0) socketpair$inet(0x2, 0x0, 0x1f, &(0x7f0000000080)) 2018/03/31 08:26:11 executing program 2 (fault-call:9 fault-nth:10): r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000348f88)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r2}, 0x10) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') [ 228.349893] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000009 [ 228.454852] FAULT_INJECTION: forcing a failure. [ 228.454852] name failslab, interval 1, probability 0, space 0, times 0 [ 228.466139] CPU: 1 PID: 16168 Comm: syz-executor3 Not tainted 4.16.0-rc6+ #43 [ 228.473405] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 228.482746] Call Trace: [ 228.485316] dump_stack+0x194/0x24d [ 228.489372] ? arch_local_irq_restore+0x53/0x53 [ 228.494035] ? __save_stack_trace+0x7e/0xd0 [ 228.498360] should_fail+0x8c0/0xa40 [ 228.502057] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 228.507140] ? kasan_kmalloc+0xad/0xe0 [ 228.511011] ? kmem_cache_alloc_trace+0x136/0x740 [ 228.515840] ? __memcg_init_list_lru_node+0x169/0x270 [ 228.521006] ? __list_lru_init+0x544/0x750 [ 228.525232] ? sget_userns+0x691/0xe40 [ 228.529113] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 228.533861] ? do_mount+0xea4/0x2bb0 [ 228.537555] ? SyS_mount+0xab/0x120 [ 228.541170] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 228.546524] ? find_held_lock+0x35/0x1d0 [ 228.550572] ? __lock_is_held+0xb6/0x140 [ 228.554616] ? check_same_owner+0x320/0x320 [ 228.558929] ? rcu_note_context_switch+0x710/0x710 [ 228.563840] should_failslab+0xec/0x120 [ 228.567802] kmem_cache_alloc_trace+0x4b/0x740 [ 228.572371] ? __kmalloc_node+0x33/0x70 [ 228.576326] ? __kmalloc_node+0x33/0x70 [ 228.580281] ? rcu_read_lock_sched_held+0x108/0x120 [ 228.585282] __memcg_init_list_lru_node+0x169/0x270 [ 228.590279] ? list_lru_add+0x7c0/0x7c0 [ 228.594245] ? __kmalloc_node+0x47/0x70 [ 228.598219] __list_lru_init+0x544/0x750 [ 228.602273] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 228.608147] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 228.613150] ? __lockdep_init_map+0xe4/0x650 [ 228.617536] ? lockdep_init_map+0x9/0x10 [ 228.621580] sget_userns+0x691/0xe40 [ 228.625281] ? kernfs_sop_show_path+0x190/0x190 [ 228.629929] ? kernfs_sop_show_options+0x180/0x180 [ 228.634834] ? destroy_unused_super.part.6+0xd0/0xd0 [ 228.639918] ? check_same_owner+0x320/0x320 [ 228.644218] ? rcu_pm_notify+0xc0/0xc0 [ 228.648089] ? rcu_read_lock_sched_held+0x108/0x120 [ 228.653081] ? kmem_cache_alloc_trace+0x459/0x740 [ 228.657904] ? lock_downgrade+0x980/0x980 [ 228.662045] kernfs_mount_ns+0x13d/0x8b0 [ 228.666101] ? kernfs_super_ns+0x70/0x70 [ 228.670145] sysfs_mount+0xc2/0x1c0 [ 228.673776] ? sysfs_kill_sb+0x40/0x40 [ 228.677648] ? alloc_pages_current+0xbe/0x1e0 [ 228.682121] ? security_sb_copy_data+0x81/0xb0 [ 228.686681] mount_fs+0x66/0x2d0 [ 228.690038] vfs_kern_mount.part.26+0xc6/0x4a0 [ 228.694605] ? may_umount+0xa0/0xa0 [ 228.698215] ? _raw_read_unlock+0x22/0x30 [ 228.702349] ? __get_fs_type+0x8a/0xc0 [ 228.706221] do_mount+0xea4/0x2bb0 [ 228.709744] ? copy_mount_string+0x40/0x40 [ 228.713970] ? rcu_pm_notify+0xc0/0xc0 [ 228.717852] ? copy_mount_options+0x5f/0x2e0 [ 228.722245] ? rcu_read_lock_sched_held+0x108/0x120 [ 228.727255] ? kmem_cache_alloc_trace+0x459/0x740 [ 228.732098] ? copy_mount_options+0x1f7/0x2e0 [ 228.736579] SyS_mount+0xab/0x120 [ 228.740008] ? copy_mnt_ns+0xb30/0xb30 [ 228.743882] do_syscall_64+0x281/0x940 [ 228.747755] ? vmalloc_sync_all+0x30/0x30 [ 228.751892] ? _raw_spin_unlock_irq+0x27/0x70 [ 228.756372] ? finish_task_switch+0x1c1/0x7e0 [ 228.760843] ? syscall_return_slowpath+0x550/0x550 [ 228.765765] ? syscall_return_slowpath+0x2ac/0x550 [ 228.770681] ? prepare_exit_to_usermode+0x350/0x350 [ 228.775681] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 228.781033] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 228.785859] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 228.791030] RIP: 0033:0x454e79 [ 228.794202] RSP: 002b:00007fbfd4b96c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 2018/03/31 08:26:11 executing program 3 (fault-call:10 fault-nth:17): r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000348f88)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r2}, 0x10) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) mount(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f00000002c0)='devpts\x00', 0x800000, &(0x7f0000000300)) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') [ 228.801885] RAX: ffffffffffffffda RBX: 00007fbfd4b976d4 RCX: 0000000000454e79 [ 228.809131] RDX: 0000000020000100 RSI: 0000000020000180 RDI: 0000000020000100 [ 228.816378] RBP: 000000000072bea0 R08: 0000000020000040 R09: 0000000000000000 [ 228.823624] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 228.831221] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000010 [ 229.066665] FAULT_INJECTION: forcing a failure. [ 229.066665] name failslab, interval 1, probability 0, space 0, times 0 [ 229.077987] CPU: 0 PID: 16193 Comm: syz-executor2 Not tainted 4.16.0-rc6+ #43 [ 229.085268] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 229.094628] Call Trace: [ 229.097234] dump_stack+0x194/0x24d [ 229.100870] ? arch_local_irq_restore+0x53/0x53 [ 229.105553] should_fail+0x8c0/0xa40 [ 229.109275] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 229.114393] ? kasan_kmalloc+0xad/0xe0 [ 229.117455] devpts: called with bogus options [ 229.118276] ? __kmalloc+0x162/0x760 [ 229.118288] ? __list_lru_init+0xcf/0x750 [ 229.118303] ? find_held_lock+0x35/0x1d0 [ 229.118318] ? __lock_is_held+0xb6/0x140 [ 229.138681] ? check_same_owner+0x320/0x320 [ 229.142983] ? rcu_note_context_switch+0x710/0x710 [ 229.147894] should_failslab+0xec/0x120 [ 229.151855] kmem_cache_alloc_node_trace+0x5a/0x760 [ 229.156857] ? mark_held_locks+0xaf/0x100 [ 229.160999] ? __raw_spin_lock_init+0x1c/0x100 [ 229.165568] __kmalloc_node+0x33/0x70 [ 229.169363] kvmalloc_node+0x99/0xd0 [ 229.173070] __list_lru_init+0x5d5/0x750 [ 229.177121] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 229.182995] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 229.188001] ? __lockdep_init_map+0xe4/0x650 [ 229.192396] ? lockdep_init_map+0x9/0x10 [ 229.196435] sget_userns+0x691/0xe40 [ 229.200126] ? kernfs_sop_show_path+0x190/0x190 [ 229.204773] ? kernfs_sop_show_options+0x180/0x180 [ 229.209681] ? destroy_unused_super.part.6+0xd0/0xd0 [ 229.214765] ? check_same_owner+0x320/0x320 [ 229.219063] ? rcu_pm_notify+0xc0/0xc0 [ 229.222930] ? rcu_read_lock_sched_held+0x108/0x120 [ 229.227928] ? kmem_cache_alloc_trace+0x459/0x740 [ 229.232764] ? lock_downgrade+0x980/0x980 [ 229.236897] kernfs_mount_ns+0x13d/0x8b0 [ 229.240937] ? kernfs_super_ns+0x70/0x70 [ 229.244987] sysfs_mount+0xc2/0x1c0 [ 229.248591] ? sysfs_kill_sb+0x40/0x40 [ 229.252464] ? alloc_pages_current+0xbe/0x1e0 [ 229.256945] ? security_sb_copy_data+0x81/0xb0 [ 229.261510] mount_fs+0x66/0x2d0 [ 229.264855] vfs_kern_mount.part.26+0xc6/0x4a0 [ 229.269415] ? may_umount+0xa0/0xa0 [ 229.273026] ? _raw_read_unlock+0x22/0x30 [ 229.277164] ? __get_fs_type+0x8a/0xc0 [ 229.281045] do_mount+0xea4/0x2bb0 [ 229.284567] ? copy_mount_string+0x40/0x40 [ 229.288778] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 229.293771] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 229.298507] ? retint_kernel+0x10/0x10 [ 229.302379] ? audit_kill_trees+0x430/0x430 [ 229.306686] ? copy_mount_options+0x1f7/0x2e0 [ 229.311169] SyS_mount+0xab/0x120 [ 229.314598] ? copy_mnt_ns+0xb30/0xb30 [ 229.318473] do_syscall_64+0x281/0x940 [ 229.322340] ? vmalloc_sync_all+0x30/0x30 [ 229.326470] ? _raw_spin_unlock_irq+0x27/0x70 [ 229.330944] ? finish_task_switch+0x1c1/0x7e0 [ 229.335429] ? syscall_return_slowpath+0x550/0x550 [ 229.340338] ? syscall_return_slowpath+0x2ac/0x550 [ 229.345255] ? prepare_exit_to_usermode+0x350/0x350 [ 229.350268] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 229.355616] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 229.360442] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 229.365609] RIP: 0033:0x454e79 [ 229.368783] RSP: 002b:00007f3ee2ac1c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 229.376491] RAX: ffffffffffffffda RBX: 00007f3ee2ac26d4 RCX: 0000000000454e79 [ 229.383746] RDX: 0000000020000100 RSI: 0000000020000180 RDI: 0000000020000100 [ 229.391000] RBP: 000000000072bea0 R08: 0000000020000040 R09: 0000000000000000 [ 229.398257] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 229.405515] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000000a [ 229.421615] hugetlbfs: Bad mount option: "" [ 229.493165] FAULT_INJECTION: forcing a failure. [ 229.493165] name failslab, interval 1, probability 0, space 0, times 0 [ 229.504430] CPU: 1 PID: 16201 Comm: syz-executor3 Not tainted 4.16.0-rc6+ #43 [ 229.511698] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 229.521053] Call Trace: [ 229.523638] dump_stack+0x194/0x24d [ 229.527262] ? arch_local_irq_restore+0x53/0x53 [ 229.531931] ? __save_stack_trace+0x7e/0xd0 [ 229.536261] should_fail+0x8c0/0xa40 [ 229.539973] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 229.545073] ? kasan_kmalloc+0xad/0xe0 [ 229.548959] ? kmem_cache_alloc_trace+0x136/0x740 [ 229.553788] ? __memcg_init_list_lru_node+0x169/0x270 [ 229.558973] ? __list_lru_init+0x544/0x750 [ 229.563205] ? sget_userns+0x691/0xe40 [ 229.567095] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 229.571839] ? do_mount+0xea4/0x2bb0 [ 229.575533] ? SyS_mount+0xab/0x120 [ 229.579154] ? do_syscall_64+0x281/0x940 [ 229.583202] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 229.588549] ? find_held_lock+0x35/0x1d0 [ 229.592600] ? __lock_is_held+0xb6/0x140 [ 229.596647] ? check_same_owner+0x320/0x320 [ 229.600954] ? rcu_note_context_switch+0x710/0x710 [ 229.605867] should_failslab+0xec/0x120 [ 229.609839] kmem_cache_alloc_trace+0x4b/0x740 [ 229.614418] ? __kmalloc_node+0x33/0x70 [ 229.618378] ? __kmalloc_node+0x33/0x70 [ 229.622351] ? rcu_read_lock_sched_held+0x108/0x120 [ 229.627364] __memcg_init_list_lru_node+0x169/0x270 [ 229.632371] ? list_lru_add+0x7c0/0x7c0 [ 229.636336] ? __kmalloc_node+0x47/0x70 [ 229.640304] __list_lru_init+0x544/0x750 [ 229.644354] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 229.650227] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 229.655243] ? __lockdep_init_map+0xe4/0x650 [ 229.659639] ? lockdep_init_map+0x9/0x10 [ 229.663680] sget_userns+0x691/0xe40 [ 229.667381] ? kernfs_sop_show_path+0x190/0x190 [ 229.672040] ? kernfs_sop_show_options+0x180/0x180 [ 229.676948] ? destroy_unused_super.part.6+0xd0/0xd0 [ 229.682038] ? check_same_owner+0x320/0x320 [ 229.686341] ? rcu_pm_notify+0xc0/0xc0 [ 229.690212] ? rcu_read_lock_sched_held+0x108/0x120 [ 229.695206] ? kmem_cache_alloc_trace+0x459/0x740 [ 229.700036] ? lock_downgrade+0x980/0x980 [ 229.704176] kernfs_mount_ns+0x13d/0x8b0 [ 229.708219] ? kernfs_super_ns+0x70/0x70 [ 229.712260] sysfs_mount+0xc2/0x1c0 [ 229.715871] ? sysfs_kill_sb+0x40/0x40 [ 229.719746] ? alloc_pages_current+0xbe/0x1e0 [ 229.724239] ? security_sb_copy_data+0x81/0xb0 [ 229.728807] mount_fs+0x66/0x2d0 [ 229.732154] vfs_kern_mount.part.26+0xc6/0x4a0 [ 229.736727] ? may_umount+0xa0/0xa0 [ 229.740342] ? _raw_read_unlock+0x22/0x30 [ 229.744471] ? __get_fs_type+0x8a/0xc0 [ 229.748349] do_mount+0xea4/0x2bb0 [ 229.751878] ? copy_mount_string+0x40/0x40 [ 229.756101] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 229.761112] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 229.765866] ? retint_kernel+0x10/0x10 [ 229.769737] ? copy_mount_options+0x183/0x2e0 [ 229.774222] ? copy_mount_options+0x1f7/0x2e0 [ 229.778711] SyS_mount+0xab/0x120 [ 229.782142] ? copy_mnt_ns+0xb30/0xb30 [ 229.786014] do_syscall_64+0x281/0x940 [ 229.789889] ? vmalloc_sync_all+0x30/0x30 [ 229.794019] ? _raw_spin_unlock_irq+0x27/0x70 [ 229.798498] ? finish_task_switch+0x1c1/0x7e0 [ 229.803582] ? syscall_return_slowpath+0x550/0x550 [ 229.808498] ? syscall_return_slowpath+0x2ac/0x550 [ 229.813417] ? prepare_exit_to_usermode+0x350/0x350 [ 229.818416] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 229.823761] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 229.828588] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 229.833755] RIP: 0033:0x454e79 [ 229.836920] RSP: 002b:00007fbfd4b96c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 2018/03/31 08:26:12 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000000003042df8700"]) r1 = perf_event_open(&(0x7f0000348f88)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x0, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r2}, 0x10) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) mount(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f00000002c0)='devpts\x00', 0x800000, &(0x7f0000000300)="7b18f1563c67659c49445440cbb57f32c0f4710f0219046399f3e8a25c5d4975e2b42f404b14937bd42d9874bdd132eef77f584d5151c9a97470a0d77a0c24a85e319673350e16b039bf474ec320") socketpair(0x3, 0x800, 0x81, &(0x7f00000003c0)) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') 2018/03/31 08:26:12 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x0, 0x1, 0x11}, 0x2c) socketpair$inet6_icmp(0xa, 0x2, 0x3a, &(0x7f0000000200)) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r4 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000280)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f00000009c0)="3949bcf20271c219f64b9e3fbd45bfae692375440912d5a576c2d82299018de50363f2cf30a439b45c2738869283b7900c1e030013700557a768d5cc05cb9ed624684f4dfdae73a8148b29b2978222576dabbcb3556bcf35a8f66fa68ceb0b834ec5120ac749dc0cc5aab7b0197711785349b1673ff5159bc1a40df6c779950e0747a25ce77a10f68b663a87fc993224a79b583eac02a2171f076ff3", 0x1000, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) 2018/03/31 08:26:12 executing program 1: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x6f6c51de) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={0xffffffffffffffff, &(0x7f0000000700), &(0x7f00000009c0)=""/161}, 0x18) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)) 2018/03/31 08:26:12 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) socketpair(0x0, 0x4, 0x6, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) socketpair(0xf, 0x3, 0x2, &(0x7f0000000040)) 2018/03/31 08:26:12 executing program 2 (fault-call:9 fault-nth:11): r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000348f88)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r2}, 0x10) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') 2018/03/31 08:26:12 executing program 3 (fault-call:10 fault-nth:18): r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000348f88)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r2}, 0x10) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) mount(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f00000002c0)='devpts\x00', 0x800000, &(0x7f0000000300)) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') 2018/03/31 08:26:12 executing program 7: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x80000000000, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000001fc0)) sendmsg(0xffffffffffffffff, &(0x7f00000024c0)={&(0x7f0000002040)=@un=@file={0x0, './file0\x00'}, 0x80, &(0x7f0000001f40)=[{&(0x7f00000020c0)="73c7575b94a72990e177f86ed4835a72a65c1a6c6831eeb0c48163a47ab63bcb605c8450cc4798ff6521c2aa722d1a7105c8a07e6c", 0x35}], 0x1, &(0x7f0000002500)=ANY=[], 0x0, 0x40000}, 0x20000000) r2 = gettid() r3 = perf_event_open(&(0x7f0000001ac0)={0x1, 0x70, 0xffffffff, 0x835, 0x9, 0xffffffffffffff5f, 0x0, 0x1000, 0x42000, 0x3, 0x8, 0x80, 0x1, 0x4, 0x100000001, 0x9, 0xff, 0x8, 0x1000, 0x7, 0x7f, 0x200, 0xb715, 0x3, 0x7fffffff, 0xf0a, 0x40, 0x8000, 0x8, 0x7, 0xffffffffffffff74, 0x4, 0x6, 0x100, 0x7, 0x335, 0x3ff, 0x58, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000001a80), 0xe}, 0x0, 0x80000000, 0x82, 0x7, 0x5, 0x3, 0x80000001}, r2, 0xd, r1, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000200)='mqueue\x00', 0x0, &(0x7f000000a000)) r4 = getpid() r5 = bpf$PROG_LOAD(0x5, &(0x7f0000002500)={0xf, 0x7, &(0x7f0000001940)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, [@ldst={0x3, 0x3, 0x3, 0x4, 0x3, 0x2, 0xffffffffffffffff}, @exit={0x95}], {0x95}}, &(0x7f0000001980)='GPL\x00', 0xff, 0x1000, &(0x7f00000039c0)=""/4096, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000019c0)={&(0x7f0000000180)='./file0\x00', r5}, 0x10) perf_event_open(&(0x7f0000001a00)={0x0, 0x70, 0x0, 0x8, 0x0, 0x3, 0x0, 0xb8, 0x1000, 0x0, 0x3, 0x4, 0xfff, 0x4, 0x4dae, 0x40, 0x100000001, 0x6, 0x4, 0x0, 0x3, 0x753c, 0x6, 0x100, 0x1de, 0x6, 0x4, 0x1, 0x6, 0x4, 0x7, 0x3, 0x7fff, 0x80000000, 0x3, 0x8, 0x81, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x7, 0x4}, 0x801, 0x400, 0x1, 0x4, 0x1, 0x9, 0x80000001}, r4, 0x7, r1, 0xb) r6 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000004000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000001c00)='./file0\x00', &(0x7f0000001c40)='./file0\x00', &(0x7f0000001c80)='devpts\x00', 0x40, &(0x7f0000001cc0)="be623dfd58807ac0b2f86f052863a5f30adc0bce173ebcf648cefd7d64732aeb5b94e6af3ab33e53669ba6d304d067dad4b1ff3ed87f18fd170aac904e8f105e80e22881717c98752a9cd7cfb06d102877e3b36b2624d22427331755a9514b225d25999ed605ffe4188630db2e7ddcc57f6316b60c4f3845d9dfcbbde5e49af627b48d7c9bd743b536de31a9ba3010cb6714c9b90a50537be55ca12a18e6541bff5a82d293e7734ea9c90707899663bd96b3bcce5887bf0bd35963c5adc39ddcb6f2a0a02b01661242046cb54ef1aec5a486b69e006305064124867bf79f4dc11798e214b61575168b79887122e0a3461f703c077f902c0a") socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r7, &(0x7f0000001800)={&(0x7f0000000240)=@alg, 0x80, &(0x7f0000000740)=[{&(0x7f00000002c0)=""/83, 0x53}, {&(0x7f0000000340)=""/27, 0x1b}, {&(0x7f0000000380)}, {&(0x7f00000003c0)=""/40, 0x28}, {&(0x7f0000000400)=""/144, 0x90}, {&(0x7f00000004c0)=""/200, 0xc8}, {&(0x7f00000005c0)=""/60, 0x3c}, {&(0x7f0000000600)=""/105, 0x69}, {&(0x7f0000000680)=""/127, 0x7f}, {&(0x7f0000000700)=""/8, 0x8}], 0xa, &(0x7f0000000800)=""/4096, 0x1000}, 0x10000) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000002340)=0xf60) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000003900)={&(0x7f0000003400)=@can={0x0, 0x0}, 0x80, &(0x7f0000003840)=[{&(0x7f0000003480)=""/194, 0xc2}, {&(0x7f0000003580)=""/250, 0xfa}, {&(0x7f0000003680)=""/100, 0x64}, {&(0x7f0000003700)=""/14, 0xe}, {&(0x7f0000003740)=""/159, 0x9f}, {&(0x7f0000003800)=""/15, 0xf}], 0x6, &(0x7f00000038c0)=""/29, 0x1d, 0x5}, 0x3) bpf$PROG_LOAD(0x5, &(0x7f0000003940)={0x4, 0x9, &(0x7f0000001840)=ANY=[@ANYBLOB="18000000030000000000000003000000dfd00c00fcffffff0000000000000000000803000101000000810000000000000001f0fff0ffffff000000000000000095000000000017d2"], &(0x7f0000000380)='GPL\x00', 0xf172, 0x4b, &(0x7f00000018c0)=""/75, 0x41f00, 0x1, [], r8}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000000c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001f00)={0xffffffffffffffff, 0x0, 0xf6, 0x22, &(0x7f0000001dc0)="9ef9482ea02fd36d0a768986a7ebe7a627dc88937e7073e3521858dfa0d5e02f571a01cfdfa76e048e5f956ea5da60b90e02a6c3d3687ed61ec9ab5b682c02498bddef38de9ce8c753e41e78f414d16202a033b6c7752711a5f56924e7846d6dcde2f71026e1eb0319b5e60f6b1ec67fca31c3cf1691d3af91a19f56be5a10ff337a53ba13dd3d75e1555211954b92ec0082d02b7b4cdddc021cbe84e4af8f20788977e3416918843e6c92b2ebf7b8b33ecbd4c7c9a9d5036c3e3e538748a32f1a28eb77818ca1878ffdd445dcdb8a40e6221e0fc474428449dfe93c62bbc69996aa9b34488c1da4f6f7c2275305a6a4fb256c1a516d", &(0x7f0000001ec0)=""/34, 0x1f, 0x1}, 0x28) close(r6) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x3441, &(0x7f0000000080)) mount(&(0x7f00000021c0)='./file0/file0\x00', &(0x7f0000002200)='./file0/file0\x00', &(0x7f0000002240)='fuse\x00', 0x2000000, &(0x7f0000002280)="9b3923bfddc346e9fa2aeaffae6ca386d8d50ba83ab72218340d3c30c045a89ac016797652ba04f1a203cfceccb458dbfd9fd03c4a80ef9a40dc7a4f24b6619d04a58186466fd8465757d9ee053c082cdfa957e7efab6191761847cca59c017493ef5e3d22432cf0b4ebef") ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f00000023c0)=ANY=[@ANYBLOB="07000000000000000000000000000000000000000000000000000000000000000000000067eb0ecf1cfa4ffd89aa7e339417beb7d332a5c996e59875644dd1e3a690110400bc751bb0435977d90fcbb2b83c27812d818991d125e9c0f199be2bc7f01aa0a5cb9b9f99438aa0f1ae3d50201f7bb276536f567f03f062994da292b6db0000000000000000000000000000a93536f303000000000000002a27f6ae1258ebb5079c1bab4f1f6f11ee8ce2e590855a3af38e4bb871ef8400000000000000000000"]) mount(&(0x7f0000001b40)='./file0\x00', &(0x7f0000001b80)='./file0/file0\x00', &(0x7f0000002100)='vfat\x00', 0x0, &(0x7f0000002140)="98980e21ac8b46c0b7bedeee39e6bd9ae4088d6ab47dc9dc76a39e299ce3783aa33e482e450484961fd3e3c5b178fafbe54440e19512ea4298652ed129d4241d9d116d8a5c2b931d350f0c989f8a288fc9e56c") mount(&(0x7f0000df7000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='hugetlbfs\x00', 0x200, &(0x7f00000001c0)) mkdir(&(0x7f00000004c0)='./file0/file0\x00', 0x0) socketpair$inet(0x2, 0x0, 0x1f, &(0x7f0000000080)) 2018/03/31 08:26:12 executing program 6: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x5) socketpair(0x0, 0x4, 0x6, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) socketpair(0xf, 0x3, 0x2, &(0x7f0000000040)) [ 229.844605] RAX: ffffffffffffffda RBX: 00007fbfd4b976d4 RCX: 0000000000454e79 [ 229.851854] RDX: 0000000020000100 RSI: 0000000020000180 RDI: 0000000020000100 [ 229.859104] RBP: 000000000072bea0 R08: 0000000020000040 R09: 0000000000000000 [ 229.866355] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 229.873606] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000011 2018/03/31 08:26:12 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000000003042df8700"]) r1 = perf_event_open(&(0x7f0000348f88)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x0, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r2}, 0x10) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) mount(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f00000002c0)='devpts\x00', 0x800000, &(0x7f0000000300)="7b18f1563c67659c49445440cbb57f32c0f4710f0219046399f3e8a25c5d4975e2b42f404b14937bd42d9874bdd132eef77f584d5151c9a97470a0d77a0c24a85e319673350e16b039bf474ec320") socketpair(0x3, 0x800, 0x81, &(0x7f00000003c0)) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') 2018/03/31 08:26:12 executing program 1: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000000c0)='vmnet0keyring\x00') r1 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) r2 = gettid() perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x100000001, 0x7fff, 0x9, 0x4, 0x0, 0x8, 0x0, 0x5, 0x0, 0x89ea, 0xffffffffffffffff, 0x6, 0xb95, 0x4, 0x2, 0x0, 0x8b2, 0x0, 0x8, 0x5e0b, 0x81, 0x9, 0x2, 0x1000000000000000, 0x0, 0x0, 0x86d, 0x1, 0x118b, 0xa96, 0x5, 0x5, 0xfffffffffffffffa, 0x101, 0x6, 0xfffffffffffffff8, 0x0, 0x401, 0x1, @perf_bp={&(0x7f0000000100), 0x4}, 0x20200, 0x8080, 0xbef, 0x0, 0x6, 0x7f, 0xffffffff}, r2, 0x10, r0, 0x2) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) socketpair(0x4, 0x80807, 0x3, &(0x7f0000000640)={0xffffffffffffffff}) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000680)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, &(0x7f00000006c0)={r4}) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={0xffffffffffffffff, &(0x7f0000000700), &(0x7f00000009c0)=""/161}, 0x18) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)) 2018/03/31 08:26:12 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0xfffffffffffffffd) socketpair(0xf, 0x80002, 0x20, &(0x7f0000000980)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000001c80)={r0}) recvmsg$kcm(r1, &(0x7f0000004280)={&(0x7f0000001cc0)=@can, 0x80, &(0x7f00000041c0)=[{&(0x7f0000001d40)=""/241, 0xf1}, {&(0x7f0000001e40)=""/177, 0xb1}, {&(0x7f0000001f00)=""/4096, 0x1000}, {&(0x7f0000002f00)}, {&(0x7f0000002f40)=""/4096, 0x1000}, {&(0x7f0000003f40)=""/223, 0xdf}, {&(0x7f0000004040)=""/130, 0x82}, {&(0x7f0000004100)=""/49, 0x31}, {&(0x7f0000004140)=""/92, 0x5c}], 0x9, 0x0, 0x0, 0xffff}, 0x102) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r2, &(0x7f0000000940)={&(0x7f00000000c0)=@sco, 0x80, &(0x7f0000000800)=[{&(0x7f00000001c0)=""/216, 0xd8}, {&(0x7f00000002c0)=""/121, 0x79}, {&(0x7f0000000340)=""/87, 0x57}, {&(0x7f00000003c0)=""/160, 0xa0}, {&(0x7f0000000480)=""/177, 0xb1}, {&(0x7f0000000540)=""/245, 0xf5}, {&(0x7f0000000640)=""/235, 0xeb}, {&(0x7f0000000740)=""/149, 0x95}, {&(0x7f0000000140)=""/42, 0x2a}], 0x9, &(0x7f00000008c0)=""/124, 0x7c, 0x2a}, 0x0) socketpair(0x0, 0x4, 0x6, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x1) socketpair(0xf, 0x3, 0x2, &(0x7f0000000040)) 2018/03/31 08:26:12 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x0, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0xd7, 0x20004805}, 0x4010) r4 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f00000009c0)="3949bcf20271c219f64b9e3fbd45bfae692375440912d5a576c2d82299018de50363f2cf30a439b45c2738869283b7900c1e030013700557a768d5cc05cb9ed624684f4dfdae73a8148b29b2978222576dabbcb3556bcf35a8f66fa68ceb0b834ec5120ac749dc0cc5aab7b0197711785349b1673ff5159bc1a40df6c779950e0747a25ce77a10f68b663a87fc993224a79b583eac02a2171f076ff3", 0x1000, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) [ 230.097212] FAULT_INJECTION: forcing a failure. [ 230.097212] name failslab, interval 1, probability 0, space 0, times 0 [ 230.108500] CPU: 0 PID: 16231 Comm: syz-executor2 Not tainted 4.16.0-rc6+ #43 [ 230.115754] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 230.125086] Call Trace: [ 230.127657] dump_stack+0x194/0x24d [ 230.131275] ? arch_local_irq_restore+0x53/0x53 [ 230.135939] should_fail+0x8c0/0xa40 [ 230.139653] ? is_bpf_text_address+0xa4/0x120 [ 230.144130] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 230.149217] ? __kernel_text_address+0xd/0x40 [ 230.153711] ? unwind_get_return_address+0x61/0xa0 [ 230.158637] ? find_held_lock+0x35/0x1d0 [ 230.162694] ? __lock_is_held+0xb6/0x140 [ 230.166744] ? check_same_owner+0x320/0x320 [ 230.171047] ? rcu_note_context_switch+0x710/0x710 [ 230.175969] should_failslab+0xec/0x120 [ 230.179932] kmem_cache_alloc_trace+0x4b/0x740 [ 230.184494] ? __kmalloc_node+0x33/0x70 [ 230.188449] ? __kmalloc_node+0x33/0x70 [ 230.192413] ? rcu_read_lock_sched_held+0x108/0x120 [ 230.197419] __memcg_init_list_lru_node+0x169/0x270 [ 230.202415] ? list_lru_add+0x7c0/0x7c0 [ 230.206368] ? __kmalloc_node+0x47/0x70 [ 230.210335] __list_lru_init+0x544/0x750 [ 230.214378] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 230.220257] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 230.225263] ? __lockdep_init_map+0xe4/0x650 [ 230.229651] ? lockdep_init_map+0x9/0x10 [ 230.233699] sget_userns+0x691/0xe40 [ 230.237392] ? kernfs_sop_show_path+0x190/0x190 [ 230.242051] ? kernfs_sop_show_options+0x180/0x180 [ 230.246967] ? destroy_unused_super.part.6+0xd0/0xd0 [ 230.252051] ? check_same_owner+0x320/0x320 [ 230.256352] ? rcu_pm_notify+0xc0/0xc0 [ 230.260233] ? rcu_read_lock_sched_held+0x108/0x120 [ 230.265227] ? kmem_cache_alloc_trace+0x459/0x740 [ 230.270057] ? lock_downgrade+0x980/0x980 [ 230.274207] kernfs_mount_ns+0x13d/0x8b0 [ 230.278251] ? kernfs_super_ns+0x70/0x70 [ 230.282301] sysfs_mount+0xc2/0x1c0 [ 230.285906] ? sysfs_kill_sb+0x40/0x40 [ 230.289771] ? alloc_pages_current+0xbe/0x1e0 [ 230.294246] ? security_sb_copy_data+0x81/0xb0 [ 230.298808] mount_fs+0x66/0x2d0 [ 230.302152] vfs_kern_mount.part.26+0xc6/0x4a0 [ 230.306710] ? may_umount+0xa0/0xa0 [ 230.310314] ? _raw_read_unlock+0x22/0x30 [ 230.314443] ? __get_fs_type+0x8a/0xc0 [ 230.318309] do_mount+0xea4/0x2bb0 [ 230.321853] ? copy_mount_string+0x40/0x40 [ 230.326074] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 230.331073] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 230.335809] ? retint_kernel+0x10/0x10 [ 230.339677] ? copy_mount_options+0x149/0x2e0 [ 230.344149] ? __sanitizer_cov_trace_pc+0x3b/0x50 [ 230.348970] ? copy_mount_options+0x1f7/0x2e0 [ 230.353443] SyS_mount+0xab/0x120 [ 230.356871] ? copy_mnt_ns+0xb30/0xb30 [ 230.360738] do_syscall_64+0x281/0x940 [ 230.364609] ? vmalloc_sync_all+0x30/0x30 [ 230.368746] ? _raw_spin_unlock_irq+0x27/0x70 [ 230.373239] ? finish_task_switch+0x1c1/0x7e0 [ 230.377720] ? syscall_return_slowpath+0x550/0x550 [ 230.382625] ? syscall_return_slowpath+0x2ac/0x550 [ 230.387541] ? prepare_exit_to_usermode+0x350/0x350 [ 230.392552] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 230.397903] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 230.402739] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 230.407913] RIP: 0033:0x454e79 [ 230.411078] RSP: 002b:00007f3ee2ac1c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 230.418771] RAX: ffffffffffffffda RBX: 00007f3ee2ac26d4 RCX: 0000000000454e79 [ 230.426027] RDX: 0000000020000100 RSI: 0000000020000180 RDI: 0000000020000100 [ 230.433282] RBP: 000000000072bea0 R08: 0000000020000040 R09: 0000000000000000 [ 230.440528] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 230.447774] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000000b [ 230.468296] devpts: called with bogus options [ 230.489984] hugetlbfs: Bad mount option: "" [ 230.503630] FAULT_INJECTION: forcing a failure. [ 230.503630] name failslab, interval 1, probability 0, space 0, times 0 [ 230.514917] CPU: 1 PID: 16234 Comm: syz-executor3 Not tainted 4.16.0-rc6+ #43 [ 230.522186] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 230.531533] Call Trace: [ 230.534118] dump_stack+0x194/0x24d [ 230.537738] ? arch_local_irq_restore+0x53/0x53 [ 230.542390] ? __save_stack_trace+0x7e/0xd0 [ 230.546702] should_fail+0x8c0/0xa40 [ 230.550398] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 230.555484] ? kasan_kmalloc+0xad/0xe0 [ 230.559350] ? kmem_cache_alloc_trace+0x136/0x740 [ 230.564175] ? __memcg_init_list_lru_node+0x169/0x270 [ 230.569342] ? __list_lru_init+0x544/0x750 [ 230.573558] ? sget_userns+0x691/0xe40 [ 230.577429] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 230.583293] ? do_mount+0xea4/0x2bb0 [ 230.586987] ? SyS_mount+0xab/0x120 [ 230.590597] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 230.595948] ? find_held_lock+0x35/0x1d0 [ 230.599995] ? __lock_is_held+0xb6/0x140 [ 230.604057] ? check_same_owner+0x320/0x320 [ 230.608368] ? rcu_note_context_switch+0x710/0x710 [ 230.613286] should_failslab+0xec/0x120 [ 230.617244] kmem_cache_alloc_trace+0x4b/0x740 [ 230.621807] ? __kmalloc_node+0x33/0x70 [ 230.625761] ? __kmalloc_node+0x33/0x70 [ 230.629717] ? rcu_read_lock_sched_held+0x108/0x120 [ 230.634719] __memcg_init_list_lru_node+0x169/0x270 [ 230.639720] ? list_lru_add+0x7c0/0x7c0 [ 230.643681] ? __kmalloc_node+0x47/0x70 [ 230.647644] __list_lru_init+0x544/0x750 [ 230.651695] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 230.657573] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 230.662571] ? __lockdep_init_map+0xe4/0x650 [ 230.666962] ? lockdep_init_map+0x9/0x10 [ 230.671008] sget_userns+0x691/0xe40 [ 230.674710] ? kernfs_sop_show_path+0x190/0x190 [ 230.679364] ? kernfs_sop_show_options+0x180/0x180 [ 230.684286] ? destroy_unused_super.part.6+0xd0/0xd0 [ 230.689379] ? check_same_owner+0x320/0x320 [ 230.693684] ? rcu_pm_notify+0xc0/0xc0 [ 230.697559] ? rcu_read_lock_sched_held+0x108/0x120 [ 230.702557] ? kmem_cache_alloc_trace+0x459/0x740 [ 230.707378] ? lock_downgrade+0x980/0x980 [ 230.711513] kernfs_mount_ns+0x13d/0x8b0 [ 230.715557] ? kernfs_super_ns+0x70/0x70 [ 230.719607] sysfs_mount+0xc2/0x1c0 [ 230.723213] ? sysfs_kill_sb+0x40/0x40 [ 230.727082] ? alloc_pages_current+0xbe/0x1e0 [ 230.731647] ? security_sb_copy_data+0x81/0xb0 [ 230.736215] mount_fs+0x66/0x2d0 [ 230.739564] vfs_kern_mount.part.26+0xc6/0x4a0 [ 230.744126] ? may_umount+0xa0/0xa0 [ 230.747736] ? _raw_read_unlock+0x22/0x30 [ 230.751864] ? __get_fs_type+0x8a/0xc0 [ 230.755738] do_mount+0xea4/0x2bb0 [ 230.759265] ? copy_mount_string+0x40/0x40 [ 230.763480] ? rcu_pm_notify+0xc0/0xc0 [ 230.767352] ? copy_mount_options+0x5f/0x2e0 [ 230.771738] ? rcu_read_lock_sched_held+0x108/0x120 [ 230.776733] ? kmem_cache_alloc_trace+0x459/0x740 [ 230.781556] ? kasan_check_write+0x14/0x20 [ 230.785771] ? _copy_from_user+0x99/0x110 [ 230.789900] ? copy_mount_options+0x1f7/0x2e0 [ 230.794378] SyS_mount+0xab/0x120 [ 230.797809] ? copy_mnt_ns+0xb30/0xb30 [ 230.801680] do_syscall_64+0x281/0x940 [ 230.805545] ? vmalloc_sync_all+0x30/0x30 [ 230.809676] ? _raw_spin_unlock_irq+0x27/0x70 [ 230.814162] ? finish_task_switch+0x1c1/0x7e0 [ 230.818637] ? syscall_return_slowpath+0x550/0x550 [ 230.823551] ? syscall_return_slowpath+0x2ac/0x550 [ 230.828459] ? prepare_exit_to_usermode+0x350/0x350 [ 230.833458] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 230.838814] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 230.843641] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 230.848822] RIP: 0033:0x454e79 [ 230.851990] RSP: 002b:00007fbfd4b96c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 230.859686] RAX: ffffffffffffffda RBX: 00007fbfd4b976d4 RCX: 0000000000454e79 [ 230.866934] RDX: 0000000020000100 RSI: 0000000020000180 RDI: 0000000020000100 [ 230.874184] RBP: 000000000072bea0 R08: 0000000020000040 R09: 0000000000000000 [ 230.881431] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 230.888681] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000012 2018/03/31 08:26:14 executing program 6: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) socketpair(0x0, 0x4, 0x6, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x1) recvmsg(r2, &(0x7f00000003c0)={&(0x7f0000000200)=@pppol2tp, 0x80, &(0x7f00000002c0)=[{&(0x7f0000000280)=""/46, 0x2e}], 0x1, &(0x7f0000000300)=""/157, 0x9d, 0x87d00000}, 0x1) socketpair(0xf, 0x3, 0x2, &(0x7f0000000040)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000080)=r3, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r1, 0x0, 0x0, 0xbd, &(0x7f0000000080), &(0x7f00000000c0)=""/189, 0x3, 0x7f3b}, 0x28) 2018/03/31 08:26:14 executing program 2 (fault-call:9 fault-nth:12): r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000348f88)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r2}, 0x10) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') 2018/03/31 08:26:14 executing program 7: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x80000000000, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000001fc0)) sendmsg(0xffffffffffffffff, &(0x7f00000024c0)={&(0x7f0000002040)=@un=@file={0x0, './file0\x00'}, 0x80, &(0x7f0000001f40)=[{&(0x7f00000020c0)="73c7575b94a72990e177f86ed4835a72a65c1a6c6831eeb0c48163a47ab63bcb605c8450cc4798ff6521c2aa722d1a7105c8a07e6c", 0x35}], 0x1, &(0x7f0000002500)=ANY=[], 0x0, 0x40000}, 0x20000000) r2 = gettid() r3 = perf_event_open(&(0x7f0000001ac0)={0x1, 0x70, 0xffffffff, 0x835, 0x9, 0xffffffffffffff5f, 0x0, 0x1000, 0x42000, 0x3, 0x8, 0x80, 0x1, 0x4, 0x100000001, 0x9, 0xff, 0x8, 0x1000, 0x7, 0x7f, 0x200, 0xb715, 0x3, 0x7fffffff, 0xf0a, 0x40, 0x8000, 0x8, 0x7, 0xffffffffffffff74, 0x4, 0x6, 0x100, 0x7, 0x335, 0x3ff, 0x58, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000001a80), 0xe}, 0x0, 0x80000000, 0x82, 0x7, 0x5, 0x3, 0x80000001}, r2, 0xd, r1, 0x8) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000200)='mqueue\x00', 0x0, &(0x7f000000a000)) r4 = getpid() r5 = bpf$PROG_LOAD(0x5, &(0x7f0000002500)={0x0, 0x7, &(0x7f0000001940)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, [@ldst={0x3, 0x3, 0x3, 0x4, 0x3, 0x2, 0xffffffffffffffff}, @exit={0x95}], {0x95}}, &(0x7f0000001980)='GPL\x00', 0xff, 0x1000, &(0x7f00000039c0)=""/4096, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000019c0)={&(0x7f0000000180)='./file0\x00', r5}, 0x10) perf_event_open(&(0x7f0000001a00)={0x0, 0x70, 0x0, 0x8, 0x0, 0x3, 0x0, 0xb8, 0x1000, 0x0, 0x3, 0x4, 0xfff, 0x4, 0x4dae, 0x40, 0x100000001, 0x6, 0x4, 0x0, 0x3, 0x753c, 0x6, 0x100, 0x1de, 0x6, 0x4, 0x1, 0x6, 0x4, 0x7, 0x3, 0x7fff, 0x80000000, 0x3, 0x8, 0x81, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x7, 0x4}, 0x801, 0x400, 0x1, 0x4, 0x1, 0x9, 0x80000001}, r4, 0x7, r1, 0xb) r6 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000004000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000001c00)='./file0\x00', &(0x7f0000001c40)='./file0\x00', &(0x7f0000001c80)='devpts\x00', 0x40, &(0x7f0000001cc0)="be623dfd58807ac0b2f86f052863a5f30adc0bce173ebcf648cefd7d64732aeb5b94e6af3ab33e53669ba6d304d067dad4b1ff3ed87f18fd170aac904e8f105e80e22881717c98752a9cd7cfb06d102877e3b36b2624d22427331755a9514b225d25999ed605ffe4188630db2e7ddcc57f6316b60c4f3845d9dfcbbde5e49af627b48d7c9bd743b536de31a9ba3010cb6714c9b90a50537be55ca12a18e6541bff5a82d293e7734ea9c90707899663bd96b3bcce5887bf0bd35963c5adc39ddcb6f2a0a02b01661242046cb54ef1aec5a486b69e006305064124867bf79f4dc11798e214b61575168b79887122e0a3461f703c077f902c0a") socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r7, &(0x7f0000001800)={&(0x7f0000000240)=@alg, 0x80, &(0x7f0000000740)=[{&(0x7f00000002c0)=""/83, 0x53}, {&(0x7f0000000340)=""/27, 0x1b}, {&(0x7f0000000380)}, {&(0x7f00000003c0)=""/40, 0x28}, {&(0x7f0000000400)=""/144, 0x90}, {&(0x7f00000004c0)=""/200, 0xc8}, {&(0x7f00000005c0)=""/60, 0x3c}, {&(0x7f0000000600)=""/105, 0x69}, {&(0x7f0000000680)=""/127, 0x7f}, {&(0x7f0000000700)=""/8, 0x8}], 0xa, &(0x7f0000000800)=""/4096, 0x1000}, 0x10000) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000002340)=0xf60) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000003900)={&(0x7f0000003400)=@can={0x0, 0x0}, 0x80, &(0x7f0000003840)=[{&(0x7f0000003480)=""/194, 0xc2}, {&(0x7f0000003580)=""/250, 0xfa}, {&(0x7f0000003680)=""/100, 0x64}, {&(0x7f0000003700)=""/14, 0xe}, {&(0x7f0000003740)=""/159, 0x9f}, {&(0x7f0000003800)=""/15, 0xf}], 0x6, &(0x7f00000038c0)=""/29, 0x1d, 0x5}, 0x3) bpf$PROG_LOAD(0x5, &(0x7f0000003940)={0x4, 0x9, &(0x7f0000001840)=ANY=[@ANYBLOB="18000000030000000000000003000000dfd00c00fcffffff0000000000000000000803000101000000810000000000000001f0fff0ffffff000000000000000095000000000017d2"], &(0x7f0000000380)='GPL\x00', 0xf172, 0x4b, &(0x7f00000018c0)=""/75, 0x41f00, 0x1, [], r8}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000000c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001f00)={0xffffffffffffffff, 0x0, 0xf6, 0x22, &(0x7f0000001dc0)="9ef9482ea02fd36d0a768986a7ebe7a627dc88937e7073e3521858dfa0d5e02f571a01cfdfa76e048e5f956ea5da60b90e02a6c3d3687ed61ec9ab5b682c02498bddef38de9ce8c753e41e78f414d16202a033b6c7752711a5f56924e7846d6dcde2f71026e1eb0319b5e60f6b1ec67fca31c3cf1691d3af91a19f56be5a10ff337a53ba13dd3d75e1555211954b92ec0082d02b7b4cdddc021cbe84e4af8f20788977e3416918843e6c92b2ebf7b8b33ecbd4c7c9a9d5036c3e3e538748a32f1a28eb77818ca1878ffdd445dcdb8a40e6221e0fc474428449dfe93c62bbc69996aa9b34488c1da4f6f7c2275305a6a4fb256c1a516d", &(0x7f0000001ec0)=""/34, 0x1f, 0x1}, 0x28) close(r6) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x3441, &(0x7f0000000080)) mount(&(0x7f00000021c0)='./file0/file0\x00', &(0x7f0000002200)='./file0/file0\x00', &(0x7f0000002240)='fuse\x00', 0x2000000, &(0x7f0000002280)="9b3923bfddc346e9fa2aeaffae6ca386d8d50ba83ab72218340d3c30c045a89ac016797652ba04f1a203cfceccb458dbfd9fd03c4a80ef9a40dc7a4f24b6619d04a58186466fd8465757d9ee053c082cdfa957e7efab6191761847cca59c017493ef5e3d22432cf0b4ebef") ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f00000023c0)=ANY=[@ANYBLOB="07000000000000000000000000000000000000000000000000000000000000000000000067eb0ecf1cfa4ffd89aa7e339417beb7d332a5c996e59875644dd1e3a690110400bc751bb0435977d90fcbb2b83c27812d818991d125e9c0f199be2bc7f01aa0a5cb9b9f99438aa0f1ae3d50201f7bb276536f567f03f062994da292b6db0000000000000000000000000000a93536f303000000000000002a27f6ae1258ebb5079c1bab4f1f6f11ee8ce2e590855a3af38e4bb871ef8400000000000000000000"]) mount(&(0x7f0000001b40)='./file0\x00', &(0x7f0000001b80)='./file0/file0\x00', &(0x7f0000002100)='vfat\x00', 0x0, &(0x7f0000002140)="98980e21ac8b46c0b7bedeee39e6bd9ae4088d6ab47dc9dc76a39e299ce3783aa33e482e450484961fd3e3c5b178fafbe54440e19512ea4298652ed129d4241d9d116d8a5c2b931d350f0c989f8a288fc9e56c") mount(&(0x7f0000df7000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='hugetlbfs\x00', 0x200, &(0x7f00000001c0)) mkdir(&(0x7f00000004c0)='./file0/file0\x00', 0x0) socketpair$inet(0x2, 0x0, 0x1f, &(0x7f0000000080)) 2018/03/31 08:26:14 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x0, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r4 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f00000009c0)="3949bcf20271c219f64b9e3fbd45bfae692375440912d5a576c2d82299018de50363f2cf30a439b45c2738869283b7900c1e030013700557a768d5cc05cb9ed624684f4dfdae73a8148b29b2978222576dabbcb3556bcf35a8f66fa68ceb0b834ec5120ac749dc0cc5aab7b0197711785349b1673ff5159bc1a40df6c779950e0747a25ce77a10f68b663a87fc993224a79b583eac02a2171f076ff3", 0x1000, &(0x7f0000000200)) mkdir(&(0x7f0000000200)='./file1\x00', 0x8866b739049863e6) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) 2018/03/31 08:26:14 executing program 3 (fault-call:10 fault-nth:19): r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000348f88)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r2}, 0x10) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) mount(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f00000002c0)='devpts\x00', 0x800000, &(0x7f0000000300)) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') 2018/03/31 08:26:14 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000000003042df8700"]) r1 = perf_event_open(&(0x7f0000348f88)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x0, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r2}, 0x10) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) mount(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f00000002c0)='devpts\x00', 0x800000, &(0x7f0000000300)="7b18f1563c67659c49445440cbb57f32c0f4710f0219046399f3e8a25c5d4975e2b42f404b14937bd42d9874bdd132eef77f584d5151c9a97470a0d77a0c24a85e319673350e16b039bf474ec320") socketpair(0x3, 0x800, 0x81, &(0x7f00000003c0)) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') 2018/03/31 08:26:14 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) socketpair(0x1, 0x0, 0x3, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000300)='\x00') ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) recvmsg(r1, &(0x7f00000002c0)={&(0x7f0000000080)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast1}}}, 0x80, &(0x7f0000000140)=[{&(0x7f0000000100)=""/41, 0x29}], 0x1, &(0x7f00000001c0)=""/239, 0xef, 0x10000}, 0x40000000) ioctl$PERF_EVENT_IOC_DISABLE(r1, 0x2401, 0x6) socketpair(0xf, 0x3, 0x2, &(0x7f0000000040)) 2018/03/31 08:26:14 executing program 1: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100)={&(0x7f00000000c0)='./file0\x00', 0x0, 0x18}, 0x10) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={0xffffffffffffffff, &(0x7f0000000700), &(0x7f00000009c0)=""/161}, 0x18) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)) [ 231.368412] FAULT_INJECTION: forcing a failure. [ 231.368412] name failslab, interval 1, probability 0, space 0, times 0 [ 231.377302] FAULT_INJECTION: forcing a failure. [ 231.377302] name failslab, interval 1, probability 0, space 0, times 0 [ 231.379709] CPU: 1 PID: 16273 Comm: syz-executor2 Not tainted 4.16.0-rc6+ #43 [ 231.398146] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 231.407486] Call Trace: [ 231.410066] dump_stack+0x194/0x24d [ 231.413683] ? arch_local_irq_restore+0x53/0x53 [ 231.418340] ? __save_stack_trace+0x7e/0xd0 [ 231.422661] should_fail+0x8c0/0xa40 [ 231.426366] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 231.431456] ? kasan_kmalloc+0xad/0xe0 [ 231.435331] ? kmem_cache_alloc_trace+0x136/0x740 [ 231.440159] ? __memcg_init_list_lru_node+0x169/0x270 [ 231.445333] ? __list_lru_init+0x544/0x750 [ 231.449556] ? sget_userns+0x691/0xe40 [ 231.453441] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 231.458180] ? do_mount+0xea4/0x2bb0 [ 231.461877] ? SyS_mount+0xab/0x120 [ 231.465491] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 231.470869] ? find_held_lock+0x35/0x1d0 [ 231.474920] ? __lock_is_held+0xb6/0x140 [ 231.478974] ? check_same_owner+0x320/0x320 [ 231.483285] ? rcu_note_context_switch+0x710/0x710 [ 231.488208] should_failslab+0xec/0x120 [ 231.492171] kmem_cache_alloc_trace+0x4b/0x740 [ 231.496738] ? __kmalloc_node+0x33/0x70 [ 231.500697] ? __kmalloc_node+0x33/0x70 [ 231.504663] ? rcu_read_lock_sched_held+0x108/0x120 [ 231.509667] __memcg_init_list_lru_node+0x169/0x270 [ 231.514672] ? list_lru_add+0x7c0/0x7c0 [ 231.518630] ? __kmalloc_node+0x47/0x70 [ 231.522613] __list_lru_init+0x544/0x750 [ 231.526671] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 231.532541] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 231.537544] ? __lockdep_init_map+0xe4/0x650 [ 231.541938] ? lockdep_init_map+0x9/0x10 [ 231.545988] sget_userns+0x691/0xe40 [ 231.549690] ? kernfs_sop_show_path+0x190/0x190 [ 231.554347] ? kernfs_sop_show_options+0x180/0x180 [ 231.559274] ? destroy_unused_super.part.6+0xd0/0xd0 [ 231.564372] ? check_same_owner+0x320/0x320 [ 231.568681] ? rcu_pm_notify+0xc0/0xc0 [ 231.572561] ? rcu_read_lock_sched_held+0x108/0x120 [ 231.577560] ? kmem_cache_alloc_trace+0x459/0x740 [ 231.582385] ? lock_downgrade+0x980/0x980 [ 231.586526] kernfs_mount_ns+0x13d/0x8b0 [ 231.590576] ? kernfs_super_ns+0x70/0x70 [ 231.594634] sysfs_mount+0xc2/0x1c0 [ 231.598249] ? sysfs_kill_sb+0x40/0x40 [ 231.602124] ? alloc_pages_current+0xbe/0x1e0 [ 231.606610] ? security_sb_copy_data+0x81/0xb0 [ 231.611183] mount_fs+0x66/0x2d0 [ 231.614538] vfs_kern_mount.part.26+0xc6/0x4a0 [ 231.619108] ? may_umount+0xa0/0xa0 [ 231.622722] ? _raw_read_unlock+0x22/0x30 [ 231.626856] ? __get_fs_type+0x8a/0xc0 [ 231.630734] do_mount+0xea4/0x2bb0 [ 231.634263] ? copy_mount_string+0x40/0x40 [ 231.638482] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 231.643484] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 231.648232] ? retint_kernel+0x10/0x10 [ 231.652109] ? copy_mount_options+0x18b/0x2e0 [ 231.656590] ? audit_kill_trees+0x430/0x430 [ 231.660899] ? copy_mount_options+0x1f7/0x2e0 [ 231.665384] SyS_mount+0xab/0x120 [ 231.668821] ? copy_mnt_ns+0xb30/0xb30 [ 231.672699] do_syscall_64+0x281/0x940 [ 231.676568] ? vmalloc_sync_all+0x30/0x30 [ 231.680702] ? _raw_spin_unlock_irq+0x27/0x70 [ 231.685185] ? finish_task_switch+0x1c1/0x7e0 [ 231.689668] ? syscall_return_slowpath+0x550/0x550 [ 231.694582] ? syscall_return_slowpath+0x2ac/0x550 [ 231.699497] ? prepare_exit_to_usermode+0x350/0x350 [ 231.704498] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 231.709849] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 231.714685] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 231.719857] RIP: 0033:0x454e79 [ 231.723029] RSP: 002b:00007f3ee2ac1c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 231.730724] RAX: ffffffffffffffda RBX: 00007f3ee2ac26d4 RCX: 0000000000454e79 [ 231.737978] RDX: 0000000020000100 RSI: 0000000020000180 RDI: 0000000020000100 [ 231.745232] RBP: 000000000072bea0 R08: 0000000020000040 R09: 0000000000000000 [ 231.752488] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 231.759915] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000000c 2018/03/31 08:26:14 executing program 2 (fault-call:9 fault-nth:13): r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000348f88)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r2}, 0x10) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') [ 231.767185] CPU: 0 PID: 16270 Comm: syz-executor3 Not tainted 4.16.0-rc6+ #43 [ 231.774460] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 231.783811] Call Trace: [ 231.786399] dump_stack+0x194/0x24d [ 231.790032] ? arch_local_irq_restore+0x53/0x53 [ 231.795394] ? __save_stack_trace+0x7e/0xd0 [ 231.799724] should_fail+0x8c0/0xa40 [ 231.803436] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 231.808529] ? kasan_kmalloc+0xad/0xe0 [ 231.812409] ? kmem_cache_alloc_trace+0x136/0x740 [ 231.817244] ? __memcg_init_list_lru_node+0x169/0x270 [ 231.822526] ? __list_lru_init+0x544/0x750 [ 231.826755] ? sget_userns+0x691/0xe40 [ 231.830645] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 231.833755] devpts: called with bogus options [ 231.835393] ? do_mount+0xea4/0x2bb0 [ 231.835402] ? SyS_mount+0xab/0x120 [ 231.835415] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 231.835433] ? find_held_lock+0x35/0x1d0 [ 231.846169] hugetlbfs: Bad mount option: "" [ 231.847224] ? __lock_is_held+0xb6/0x140 [ 231.847248] ? check_same_owner+0x320/0x320 2018/03/31 08:26:14 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000000003042df8700"]) r1 = perf_event_open(&(0x7f0000348f88)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x0, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r2}, 0x10) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) mount(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f00000002c0)='devpts\x00', 0x800000, &(0x7f0000000300)="7b18f1563c67659c49445440cbb57f32c0f4710f0219046399f3e8a25c5d4975e2b42f404b14937bd42d9874bdd132eef77f584d5151c9a97470a0d77a0c24a85e319673350e16b039bf474ec320") socketpair(0x3, 0x800, 0x81, &(0x7f00000003c0)) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') [ 231.847263] ? rcu_note_context_switch+0x710/0x710 [ 231.847281] should_failslab+0xec/0x120 [ 231.847293] kmem_cache_alloc_trace+0x4b/0x740 [ 231.847301] ? __kmalloc_node+0x33/0x70 [ 231.847312] ? __kmalloc_node+0x33/0x70 [ 231.890755] ? rcu_read_lock_sched_held+0x108/0x120 [ 231.895752] __memcg_init_list_lru_node+0x169/0x270 [ 231.900757] ? list_lru_add+0x7c0/0x7c0 [ 231.904714] ? __kmalloc_node+0x47/0x70 [ 231.908667] __list_lru_init+0x544/0x750 [ 231.912705] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 231.918575] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 231.923575] ? __lockdep_init_map+0xe4/0x650 [ 231.927961] ? lockdep_init_map+0x9/0x10 [ 231.932012] sget_userns+0x691/0xe40 [ 231.935710] ? kernfs_sop_show_path+0x190/0x190 [ 231.940365] ? kernfs_sop_show_options+0x180/0x180 [ 231.945288] ? destroy_unused_super.part.6+0xd0/0xd0 [ 231.950376] ? check_same_owner+0x320/0x320 [ 231.954675] ? rcu_pm_notify+0xc0/0xc0 [ 231.958556] ? rcu_read_lock_sched_held+0x108/0x120 [ 231.963558] ? kmem_cache_alloc_trace+0x459/0x740 [ 231.968386] ? lock_downgrade+0x980/0x980 [ 231.972524] kernfs_mount_ns+0x13d/0x8b0 [ 231.976583] ? kernfs_super_ns+0x70/0x70 [ 231.980624] sysfs_mount+0xc2/0x1c0 [ 231.984230] ? sysfs_kill_sb+0x40/0x40 [ 231.988105] ? alloc_pages_current+0xbe/0x1e0 [ 231.992605] ? security_sb_copy_data+0x81/0xb0 [ 231.997186] mount_fs+0x66/0x2d0 [ 232.000546] vfs_kern_mount.part.26+0xc6/0x4a0 [ 232.005115] ? may_umount+0xa0/0xa0 [ 232.008733] ? _raw_read_unlock+0x22/0x30 [ 232.012863] ? __get_fs_type+0x8a/0xc0 [ 232.016736] do_mount+0xea4/0x2bb0 [ 232.020267] ? copy_mount_string+0x40/0x40 [ 232.024484] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 232.029491] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 232.034240] ? retint_kernel+0x10/0x10 [ 232.038124] ? copy_mount_options+0x149/0x2e0 [ 232.042608] ? __sanitizer_cov_trace_pc+0x2b/0x50 [ 232.047453] ? copy_mount_options+0x1f7/0x2e0 [ 232.051935] SyS_mount+0xab/0x120 [ 232.055365] ? copy_mnt_ns+0xb30/0xb30 [ 232.059242] do_syscall_64+0x281/0x940 [ 232.063107] ? trace_event_raw_event_sys_exit+0x260/0x260 [ 232.068625] ? syscall_return_slowpath+0x550/0x550 [ 232.073533] ? syscall_return_slowpath+0x2ac/0x550 [ 232.078454] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 232.083812] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 232.088650] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 232.093828] RIP: 0033:0x454e79 [ 232.097000] RSP: 002b:00007fbfd4b96c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 232.104701] RAX: ffffffffffffffda RBX: 00007fbfd4b976d4 RCX: 0000000000454e79 [ 232.111959] RDX: 0000000020000100 RSI: 0000000020000180 RDI: 0000000020000100 2018/03/31 08:26:14 executing program 3 (fault-call:10 fault-nth:20): r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000348f88)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r2}, 0x10) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) mount(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f00000002c0)='devpts\x00', 0x800000, &(0x7f0000000300)) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') 2018/03/31 08:26:14 executing program 7: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x80000000000, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000001fc0)) sendmsg(0xffffffffffffffff, &(0x7f00000024c0)={&(0x7f0000002040)=@un=@file={0x0, './file0\x00'}, 0x80, &(0x7f0000001f40)=[{&(0x7f00000020c0)="73c7575b94a72990e177f86ed4835a72a65c1a6c6831eeb0c48163a47ab63bcb605c8450cc4798ff6521c2aa722d1a7105c8a07e6c", 0x35}], 0x1, &(0x7f0000002500)=ANY=[], 0x0, 0x40000}, 0x20000000) r2 = gettid() r3 = perf_event_open(&(0x7f0000001ac0)={0x1, 0x70, 0xffffffff, 0x835, 0x9, 0xffffffffffffff5f, 0x0, 0x1000, 0x42000, 0x3, 0x8, 0x80, 0x1, 0x4, 0x100000001, 0x9, 0xff, 0x8, 0x1000, 0x7, 0x7f, 0x200, 0xb715, 0x3, 0x7fffffff, 0xf0a, 0x40, 0x8000, 0x8, 0x7, 0xffffffffffffff74, 0x4, 0x6, 0x100, 0x7, 0x335, 0x3ff, 0x58, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000001a80), 0xe}, 0x0, 0x80000000, 0x82, 0x7, 0x5, 0x3, 0x80000001}, r2, 0xd, r1, 0x8) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000200)='mqueue\x00', 0x0, &(0x7f000000a000)) r4 = getpid() r5 = bpf$PROG_LOAD(0x5, &(0x7f0000002500)={0xf, 0x7, &(0x7f0000001940)=@framed={{0x18}, [@ldst={0x3, 0x3, 0x3, 0x4, 0x3, 0x2, 0xffffffffffffffff}, @exit={0x95}], {0x95}}, &(0x7f0000001980)='GPL\x00', 0xff, 0x1000, &(0x7f00000039c0)=""/4096, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000019c0)={&(0x7f0000000180)='./file0\x00', r5}, 0x10) perf_event_open(&(0x7f0000001a00)={0x0, 0x70, 0x0, 0x8, 0x0, 0x3, 0x0, 0xb8, 0x1000, 0x0, 0x3, 0x4, 0xfff, 0x4, 0x4dae, 0x40, 0x100000001, 0x6, 0x4, 0x0, 0x3, 0x753c, 0x6, 0x100, 0x1de, 0x6, 0x4, 0x1, 0x6, 0x4, 0x7, 0x3, 0x7fff, 0x80000000, 0x3, 0x8, 0x81, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x7, 0x4}, 0x801, 0x400, 0x1, 0x4, 0x1, 0x9, 0x80000001}, r4, 0x7, r1, 0xb) r6 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000004000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000001c00)='./file0\x00', &(0x7f0000001c40)='./file0\x00', &(0x7f0000001c80)='devpts\x00', 0x40, &(0x7f0000001cc0)="be623dfd58807ac0b2f86f052863a5f30adc0bce173ebcf648cefd7d64732aeb5b94e6af3ab33e53669ba6d304d067dad4b1ff3ed87f18fd170aac904e8f105e80e22881717c98752a9cd7cfb06d102877e3b36b2624d22427331755a9514b225d25999ed605ffe4188630db2e7ddcc57f6316b60c4f3845d9dfcbbde5e49af627b48d7c9bd743b536de31a9ba3010cb6714c9b90a50537be55ca12a18e6541bff5a82d293e7734ea9c90707899663bd96b3bcce5887bf0bd35963c5adc39ddcb6f2a0a02b01661242046cb54ef1aec5a486b69e006305064124867bf79f4dc11798e214b61575168b79887122e0a3461f703c077f902c0a") socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r7, &(0x7f0000001800)={&(0x7f0000000240)=@alg, 0x80, &(0x7f0000000740)=[{&(0x7f00000002c0)=""/83, 0x53}, {&(0x7f0000000340)=""/27, 0x1b}, {&(0x7f0000000380)}, {&(0x7f00000003c0)=""/40, 0x28}, {&(0x7f0000000400)=""/144, 0x90}, {&(0x7f00000004c0)=""/200, 0xc8}, {&(0x7f00000005c0)=""/60, 0x3c}, {&(0x7f0000000600)=""/105, 0x69}, {&(0x7f0000000680)=""/127, 0x7f}, {&(0x7f0000000700)=""/8, 0x8}], 0xa, &(0x7f0000000800)=""/4096, 0x1000}, 0x10000) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000002340)=0xf60) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000003900)={&(0x7f0000003400)=@can={0x0, 0x0}, 0x80, &(0x7f0000003840)=[{&(0x7f0000003480)=""/194, 0xc2}, {&(0x7f0000003580)=""/250, 0xfa}, {&(0x7f0000003680)=""/100, 0x64}, {&(0x7f0000003700)=""/14, 0xe}, {&(0x7f0000003740)=""/159, 0x9f}, {&(0x7f0000003800)=""/15, 0xf}], 0x6, &(0x7f00000038c0)=""/29, 0x1d, 0x5}, 0x3) bpf$PROG_LOAD(0x5, &(0x7f0000003940)={0x4, 0x9, &(0x7f0000001840)=ANY=[@ANYBLOB="18000000030000000000000003000000dfd00c00fcffffff0000000000000000000803000101000000810000000000000001f0fff0ffffff000000000000000095000000000017d2"], &(0x7f0000000380)='GPL\x00', 0xf172, 0x4b, &(0x7f00000018c0)=""/75, 0x41f00, 0x1, [], r8}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000000c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001f00)={0xffffffffffffffff, 0x0, 0xf6, 0x22, &(0x7f0000001dc0)="9ef9482ea02fd36d0a768986a7ebe7a627dc88937e7073e3521858dfa0d5e02f571a01cfdfa76e048e5f956ea5da60b90e02a6c3d3687ed61ec9ab5b682c02498bddef38de9ce8c753e41e78f414d16202a033b6c7752711a5f56924e7846d6dcde2f71026e1eb0319b5e60f6b1ec67fca31c3cf1691d3af91a19f56be5a10ff337a53ba13dd3d75e1555211954b92ec0082d02b7b4cdddc021cbe84e4af8f20788977e3416918843e6c92b2ebf7b8b33ecbd4c7c9a9d5036c3e3e538748a32f1a28eb77818ca1878ffdd445dcdb8a40e6221e0fc474428449dfe93c62bbc69996aa9b34488c1da4f6f7c2275305a6a4fb256c1a516d", &(0x7f0000001ec0)=""/34, 0x1f, 0x1}, 0x28) close(r6) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x3441, &(0x7f0000000080)) mount(&(0x7f00000021c0)='./file0/file0\x00', &(0x7f0000002200)='./file0/file0\x00', &(0x7f0000002240)='fuse\x00', 0x2000000, &(0x7f0000002280)="9b3923bfddc346e9fa2aeaffae6ca386d8d50ba83ab72218340d3c30c045a89ac016797652ba04f1a203cfceccb458dbfd9fd03c4a80ef9a40dc7a4f24b6619d04a58186466fd8465757d9ee053c082cdfa957e7efab6191761847cca59c017493ef5e3d22432cf0b4ebef") ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f00000023c0)=ANY=[@ANYBLOB="07000000000000000000000000000000000000000000000000000000000000000000000067eb0ecf1cfa4ffd89aa7e339417beb7d332a5c996e59875644dd1e3a690110400bc751bb0435977d90fcbb2b83c27812d818991d125e9c0f199be2bc7f01aa0a5cb9b9f99438aa0f1ae3d50201f7bb276536f567f03f062994da292b6db0000000000000000000000000000a93536f303000000000000002a27f6ae1258ebb5079c1bab4f1f6f11ee8ce2e590855a3af38e4bb871ef8400000000000000000000"]) mount(&(0x7f0000001b40)='./file0\x00', &(0x7f0000001b80)='./file0/file0\x00', &(0x7f0000002100)='vfat\x00', 0x0, &(0x7f0000002140)="98980e21ac8b46c0b7bedeee39e6bd9ae4088d6ab47dc9dc76a39e299ce3783aa33e482e450484961fd3e3c5b178fafbe54440e19512ea4298652ed129d4241d9d116d8a5c2b931d350f0c989f8a288fc9e56c") mount(&(0x7f0000df7000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='hugetlbfs\x00', 0x200, &(0x7f00000001c0)) mkdir(&(0x7f00000004c0)='./file0/file0\x00', 0x0) socketpair$inet(0x2, 0x0, 0x1f, &(0x7f0000000080)) [ 232.119217] RBP: 000000000072bea0 R08: 0000000020000040 R09: 0000000000000000 [ 232.126464] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 232.133719] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000013 2018/03/31 08:26:15 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00', 0x0, 0x18}, 0x10) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='sysv\x00', 0x10000, &(0x7f00000001c0)="bc3154398ed0126d7374f611f27541deadcaa99379707b2d5ebbbc2aad99fa480f9d35a74671a3a4c618f77a752464b5d33e760da1984abb5740e9b5fa939e7111413ca83e522195677bd796f1a5e809afc5b64d1cfdeec7af0dc45dc759d4245388b2fde9b19409c57c1b3167e32f642c1fd37042c38388e18415fd838cf1621e5e8c1e7c491ea147d0f9685df67979a7d84c6cfcb5104c76a96ac71f43c75aafc719071891003ff8814f3a77ec8729f8b31501f10a36d8fdf64d14305688cca1d7213450993aae396a00f8e96a1b849c46068e7dd95dfd5c02eb735a2b6d385825ce4d5e") socketpair(0x0, 0x4, 0x6, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) socketpair(0xf, 0x3, 0x2, &(0x7f0000000040)) 2018/03/31 08:26:15 executing program 1: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) socketpair$inet6(0xa, 0x1, 0x0, &(0x7f0000000180)) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7f, 0x3, 0x1, 0x11}, 0x2c) r2 = perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000c72000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r2, 0x0) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={0xffffffffffffffff, &(0x7f0000000700), &(0x7f00000009c0)=""/161}, 0x18) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000380)) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f00000000c0)='./file0\x00', r1}, 0x10) mount(&(0x7f0000000240)='./file0/file0\x00', &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='pstore\x00', 0x200010, &(0x7f0000000340)="04c3348794dedd87414a09957c2ad3f4b04f58624a35980ca1e429bf7f136b000b4b666f5c8d5911fb9921bc22deaef9eef3d704") ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000400)) 2018/03/31 08:26:15 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x0, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r4 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f00000009c0)="3949bcf20271c219f64b9e3fbd45bfae692375440912d5a576c2d82299018de50363f2cf30a439b45c2738869283b7900c1e030013700557a768d5cc05cb9ed624684f4dfdae73a8148b29b2978222576dabbcb3556bcf35a8f66fa68ceb0b834ec5120ac749dc0cc5aab7b0197711785349b1673ff5159bc1a40df6c779950e0747a25ce77a10f68b663a87fc993224a79b583eac02a2171f076ff3", 0x1000, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000200)=0xfff) gettid() close(0xffffffffffffffff) 2018/03/31 08:26:15 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000348f88)={0x0, 0x70, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) socketpair(0x0, 0x4, 0x6, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) socketpair(0xf, 0x3, 0x2, &(0x7f0000000040)) r2 = gettid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0xf39, 0x3, 0x1, 0x1, 0x0, 0x800, 0x2c0, 0xe, 0x7, 0x30000000, 0x8000, 0x7fffffff, 0x80, 0xfffffffffffffe00, 0xd3, 0x3, 0xba426d9, 0x752, 0x8, 0x1, 0xfff, 0x3cc, 0x9ab5, 0x0, 0xe0, 0x80000000, 0x4, 0x6, 0x62, 0x8e, 0x3, 0x0, 0x3, 0x8001, 0x80000000, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000080), 0x8}, 0x404, 0x3ff, 0x3, 0x7, 0x7, 0x7, 0x7}, r2, 0x0, r0, 0x2) [ 232.504142] FAULT_INJECTION: forcing a failure. [ 232.504142] name failslab, interval 1, probability 0, space 0, times 0 [ 232.515472] CPU: 1 PID: 16304 Comm: syz-executor2 Not tainted 4.16.0-rc6+ #43 [ 232.522755] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 232.532118] Call Trace: [ 232.534720] dump_stack+0x194/0x24d [ 232.538352] ? arch_local_irq_restore+0x53/0x53 [ 232.543022] ? __save_stack_trace+0x7e/0xd0 [ 232.547351] should_fail+0x8c0/0xa40 [ 232.551058] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 232.556152] ? kasan_kmalloc+0xad/0xe0 [ 232.560028] ? kmem_cache_alloc_trace+0x136/0x740 [ 232.564904] ? __memcg_init_list_lru_node+0x169/0x270 [ 232.570092] ? __list_lru_init+0x544/0x750 [ 232.574308] ? sget_userns+0x691/0xe40 [ 232.578180] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 232.582913] ? do_mount+0xea4/0x2bb0 [ 232.586616] ? SyS_mount+0xab/0x120 [ 232.590226] ? do_syscall_64+0x281/0x940 [ 232.594270] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 232.599623] ? find_held_lock+0x35/0x1d0 [ 232.603668] ? __lock_is_held+0xb6/0x140 [ 232.607719] ? check_same_owner+0x320/0x320 [ 232.612028] ? rcu_note_context_switch+0x710/0x710 [ 232.616946] should_failslab+0xec/0x120 [ 232.620901] kmem_cache_alloc_trace+0x4b/0x740 [ 232.625462] ? __kmalloc_node+0x33/0x70 [ 232.629417] ? __kmalloc_node+0x33/0x70 [ 232.633374] ? rcu_read_lock_sched_held+0x108/0x120 [ 232.638376] __memcg_init_list_lru_node+0x169/0x270 [ 232.643377] ? list_lru_add+0x7c0/0x7c0 [ 232.647332] ? __kmalloc_node+0x47/0x70 [ 232.651293] __list_lru_init+0x544/0x750 [ 232.655356] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 232.661225] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 232.666224] ? __lockdep_init_map+0xe4/0x650 [ 232.670616] ? lockdep_init_map+0x9/0x10 [ 232.674661] sget_userns+0x691/0xe40 [ 232.678355] ? kernfs_sop_show_path+0x190/0x190 [ 232.683009] ? kernfs_sop_show_options+0x180/0x180 [ 232.687946] ? destroy_unused_super.part.6+0xd0/0xd0 [ 232.693126] ? check_same_owner+0x320/0x320 [ 232.697431] ? rcu_pm_notify+0xc0/0xc0 [ 232.701309] ? rcu_read_lock_sched_held+0x108/0x120 [ 232.706308] ? kmem_cache_alloc_trace+0x459/0x740 [ 232.711130] ? lock_downgrade+0x980/0x980 [ 232.715266] kernfs_mount_ns+0x13d/0x8b0 [ 232.719310] ? kernfs_super_ns+0x70/0x70 [ 232.723358] sysfs_mount+0xc2/0x1c0 [ 232.726967] ? sysfs_kill_sb+0x40/0x40 [ 232.730838] ? alloc_pages_current+0xbe/0x1e0 [ 232.735316] ? security_sb_copy_data+0x81/0xb0 [ 232.739882] mount_fs+0x66/0x2d0 [ 232.743233] vfs_kern_mount.part.26+0xc6/0x4a0 [ 232.747797] ? may_umount+0xa0/0xa0 [ 232.751408] ? _raw_read_unlock+0x22/0x30 [ 232.755539] ? __get_fs_type+0x8a/0xc0 [ 232.759413] do_mount+0xea4/0x2bb0 [ 232.762940] ? copy_mount_string+0x40/0x40 [ 232.767174] ? rcu_pm_notify+0xc0/0xc0 [ 232.771050] ? copy_mount_options+0x5f/0x2e0 [ 232.775439] ? rcu_read_lock_sched_held+0x108/0x120 [ 232.780434] ? kmem_cache_alloc_trace+0x459/0x740 [ 232.785259] ? kasan_check_write+0x14/0x20 [ 232.789475] ? _copy_from_user+0x99/0x110 [ 232.793610] ? copy_mount_options+0x1f7/0x2e0 [ 232.798094] SyS_mount+0xab/0x120 [ 232.801528] ? copy_mnt_ns+0xb30/0xb30 [ 232.805400] do_syscall_64+0x281/0x940 [ 232.809267] ? vmalloc_sync_all+0x30/0x30 [ 232.813396] ? _raw_spin_unlock_irq+0x27/0x70 [ 232.817873] ? finish_task_switch+0x1c1/0x7e0 [ 232.822349] ? syscall_return_slowpath+0x550/0x550 [ 232.827260] ? syscall_return_slowpath+0x2ac/0x550 [ 232.832168] ? prepare_exit_to_usermode+0x350/0x350 [ 232.837167] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 232.842513] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 232.847340] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 232.852521] RIP: 0033:0x454e79 2018/03/31 08:26:15 executing program 2 (fault-call:9 fault-nth:14): r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000348f88)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r2}, 0x10) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') [ 232.855690] RSP: 002b:00007f3ee2ac1c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 232.863380] RAX: ffffffffffffffda RBX: 00007f3ee2ac26d4 RCX: 0000000000454e79 [ 232.870631] RDX: 0000000020000100 RSI: 0000000020000180 RDI: 0000000020000100 [ 232.877881] RBP: 000000000072bea0 R08: 0000000020000040 R09: 0000000000000000 [ 232.885131] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 232.892380] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000000d 2018/03/31 08:26:15 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000000003042df8700"]) r1 = perf_event_open(&(0x7f0000348f88)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x0, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r2}, 0x10) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) mount(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f00000002c0)='devpts\x00', 0x800000, &(0x7f0000000300)="7b18f1563c67659c49445440cbb57f32c0f4710f0219046399f3e8a25c5d4975e2b42f404b14937bd42d9874bdd132eef77f584d5151c9a97470a0d77a0c24a85e319673350e16b039bf474ec320") socketpair(0x3, 0x800, 0x81, &(0x7f00000003c0)) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') [ 232.952861] FAULT_INJECTION: forcing a failure. [ 232.952861] name failslab, interval 1, probability 0, space 0, times 0 [ 232.964216] CPU: 0 PID: 16309 Comm: syz-executor3 Not tainted 4.16.0-rc6+ #43 [ 232.971496] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 232.980855] Call Trace: [ 232.983451] dump_stack+0x194/0x24d [ 232.987080] ? arch_local_irq_restore+0x53/0x53 [ 232.991750] ? __save_stack_trace+0x7e/0xd0 [ 232.991853] devpts: called with bogus options [ 232.996071] should_fail+0x8c0/0xa40 [ 232.996094] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 232.996108] ? kasan_kmalloc+0xad/0xe0 [ 232.996119] ? kmem_cache_alloc_trace+0x136/0x740 [ 232.996130] ? __memcg_init_list_lru_node+0x169/0x270 [ 233.006809] hugetlbfs: Bad mount option: "" [ 233.009395] ? __list_lru_init+0x544/0x750 [ 233.009405] ? sget_userns+0x691/0xe40 [ 233.009420] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 233.009429] ? do_mount+0xea4/0x2bb0 [ 233.009438] ? SyS_mount+0xab/0x120 [ 233.009450] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 233.009467] ? find_held_lock+0x35/0x1d0 [ 233.009481] ? __lock_is_held+0xb6/0x140 [ 233.061291] ? check_same_owner+0x320/0x320 [ 233.065597] ? rcu_note_context_switch+0x710/0x710 [ 233.070512] should_failslab+0xec/0x120 [ 233.074468] kmem_cache_alloc_trace+0x4b/0x740 [ 233.079037] ? __kmalloc_node+0x33/0x70 [ 233.082993] ? __kmalloc_node+0x33/0x70 [ 233.086949] ? rcu_read_lock_sched_held+0x108/0x120 [ 233.091950] __memcg_init_list_lru_node+0x169/0x270 [ 233.096949] ? list_lru_add+0x7c0/0x7c0 [ 233.100901] ? __kmalloc_node+0x47/0x70 [ 233.104861] __list_lru_init+0x544/0x750 [ 233.108905] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 233.114772] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 233.119770] ? __lockdep_init_map+0xe4/0x650 [ 233.124161] ? lockdep_init_map+0x9/0x10 [ 233.128207] sget_userns+0x691/0xe40 [ 233.131902] ? kernfs_sop_show_path+0x190/0x190 [ 233.136553] ? kernfs_sop_show_options+0x180/0x180 [ 233.141465] ? destroy_unused_super.part.6+0xd0/0xd0 [ 233.146565] ? check_same_owner+0x320/0x320 [ 233.150868] ? rcu_pm_notify+0xc0/0xc0 [ 233.154743] ? rcu_read_lock_sched_held+0x108/0x120 [ 233.159740] ? kmem_cache_alloc_trace+0x459/0x740 [ 233.164561] ? lock_downgrade+0x980/0x980 [ 233.168698] kernfs_mount_ns+0x13d/0x8b0 [ 233.172742] ? kernfs_super_ns+0x70/0x70 [ 233.176790] sysfs_mount+0xc2/0x1c0 [ 233.180399] ? sysfs_kill_sb+0x40/0x40 [ 233.184267] ? alloc_pages_current+0xbe/0x1e0 [ 233.188747] ? security_sb_copy_data+0x81/0xb0 [ 233.193311] mount_fs+0x66/0x2d0 [ 233.196661] vfs_kern_mount.part.26+0xc6/0x4a0 [ 233.201222] ? may_umount+0xa0/0xa0 [ 233.204827] ? _raw_read_unlock+0x22/0x30 [ 233.208955] ? __get_fs_type+0x8a/0xc0 [ 233.212829] do_mount+0xea4/0x2bb0 [ 233.216355] ? copy_mount_string+0x40/0x40 [ 233.220572] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 233.225574] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 233.230317] ? retint_kernel+0x10/0x10 [ 233.234191] ? copy_mount_options+0x18b/0x2e0 [ 233.238668] ? copy_mount_options+0x191/0x2e0 [ 233.243145] ? copy_mount_options+0x1f7/0x2e0 [ 233.247627] SyS_mount+0xab/0x120 [ 233.251059] ? copy_mnt_ns+0xb30/0xb30 [ 233.254934] do_syscall_64+0x281/0x940 [ 233.258821] ? vmalloc_sync_all+0x30/0x30 [ 233.262949] ? _raw_spin_unlock_irq+0x27/0x70 [ 233.267424] ? finish_task_switch+0x1c1/0x7e0 [ 233.271899] ? syscall_return_slowpath+0x550/0x550 [ 233.276808] ? syscall_return_slowpath+0x2ac/0x550 [ 233.281717] ? prepare_exit_to_usermode+0x350/0x350 [ 233.286717] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 233.292064] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 233.296893] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 233.302064] RIP: 0033:0x454e79 [ 233.305237] RSP: 002b:00007fbfd4b96c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 233.312926] RAX: ffffffffffffffda RBX: 00007fbfd4b976d4 RCX: 0000000000454e79 [ 233.320175] RDX: 0000000020000100 RSI: 0000000020000180 RDI: 0000000020000100 [ 233.327425] RBP: 000000000072bea0 R08: 0000000020000040 R09: 0000000000000000 [ 233.334677] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 233.341929] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000014 [ 233.665339] FAULT_INJECTION: forcing a failure. [ 233.665339] name failslab, interval 1, probability 0, space 0, times 0 [ 233.676629] CPU: 0 PID: 16344 Comm: syz-executor2 Not tainted 4.16.0-rc6+ #43 [ 233.683895] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 233.693227] Call Trace: [ 233.695789] dump_stack+0x194/0x24d [ 233.699392] ? arch_local_irq_restore+0x53/0x53 [ 233.704046] ? __save_stack_trace+0x7e/0xd0 [ 233.708351] should_fail+0x8c0/0xa40 [ 233.712044] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 233.717127] ? kasan_kmalloc+0xad/0xe0 [ 233.720986] ? kmem_cache_alloc_trace+0x136/0x740 [ 233.725803] ? __memcg_init_list_lru_node+0x169/0x270 [ 233.730964] ? __list_lru_init+0x544/0x750 [ 233.735172] ? sget_userns+0x691/0xe40 [ 233.739041] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 233.743773] ? do_mount+0xea4/0x2bb0 [ 233.747459] ? SyS_mount+0xab/0x120 [ 233.751067] ? do_syscall_64+0x281/0x940 [ 233.755102] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 233.760441] ? find_held_lock+0x35/0x1d0 [ 233.764481] ? __lock_is_held+0xb6/0x140 [ 233.768518] ? check_same_owner+0x320/0x320 [ 233.772816] ? rcu_note_context_switch+0x710/0x710 [ 233.777720] should_failslab+0xec/0x120 [ 233.781669] kmem_cache_alloc_trace+0x4b/0x740 [ 233.786223] ? __kmalloc_node+0x33/0x70 [ 233.790170] ? __kmalloc_node+0x33/0x70 [ 233.794116] ? rcu_read_lock_sched_held+0x108/0x120 [ 233.799107] __memcg_init_list_lru_node+0x169/0x270 [ 233.804098] ? list_lru_add+0x7c0/0x7c0 [ 233.808069] ? __kmalloc_node+0x47/0x70 [ 233.812027] __list_lru_init+0x544/0x750 [ 233.816067] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 233.821926] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 233.826914] ? __lockdep_init_map+0xe4/0x650 [ 233.831297] ? lockdep_init_map+0x9/0x10 [ 233.835332] sget_userns+0x691/0xe40 [ 233.839029] ? kernfs_sop_show_path+0x190/0x190 [ 233.843673] ? kernfs_sop_show_options+0x180/0x180 [ 233.848575] ? destroy_unused_super.part.6+0xd0/0xd0 [ 233.853655] ? check_same_owner+0x320/0x320 [ 233.857950] ? rcu_pm_notify+0xc0/0xc0 [ 233.861813] ? rcu_read_lock_sched_held+0x108/0x120 [ 233.866811] ? kmem_cache_alloc_trace+0x459/0x740 [ 233.871629] ? lock_downgrade+0x980/0x980 [ 233.875753] kernfs_mount_ns+0x13d/0x8b0 [ 233.879800] ? kernfs_super_ns+0x70/0x70 [ 233.883841] sysfs_mount+0xc2/0x1c0 [ 233.887454] ? sysfs_kill_sb+0x40/0x40 [ 233.891319] ? alloc_pages_current+0xbe/0x1e0 [ 233.895789] ? security_sb_copy_data+0x81/0xb0 [ 233.900346] mount_fs+0x66/0x2d0 [ 233.903695] vfs_kern_mount.part.26+0xc6/0x4a0 [ 233.908249] ? may_umount+0xa0/0xa0 [ 233.911849] ? _raw_read_unlock+0x22/0x30 [ 233.915969] ? __get_fs_type+0x8a/0xc0 [ 233.919829] do_mount+0xea4/0x2bb0 [ 233.923346] ? copy_mount_string+0x40/0x40 [ 233.927555] ? rcu_pm_notify+0xc0/0xc0 [ 233.931417] ? copy_mount_options+0x5f/0x2e0 [ 233.935797] ? rcu_read_lock_sched_held+0x108/0x120 [ 233.940784] ? kmem_cache_alloc_trace+0x459/0x740 [ 233.945603] ? kasan_check_write+0x14/0x20 [ 233.949811] ? _copy_from_user+0x99/0x110 [ 233.953935] ? copy_mount_options+0x1f7/0x2e0 [ 233.958404] SyS_mount+0xab/0x120 [ 233.961827] ? copy_mnt_ns+0xb30/0xb30 [ 233.965688] do_syscall_64+0x281/0x940 [ 233.969546] ? vmalloc_sync_all+0x30/0x30 [ 233.973668] ? _raw_spin_unlock_irq+0x27/0x70 [ 233.978142] ? finish_task_switch+0x1c1/0x7e0 [ 233.982611] ? syscall_return_slowpath+0x550/0x550 [ 233.987519] ? syscall_return_slowpath+0x2ac/0x550 [ 233.992425] ? prepare_exit_to_usermode+0x350/0x350 [ 233.997419] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 234.002757] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 234.007583] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 234.012750] RIP: 0033:0x454e79 2018/03/31 08:26:16 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x0, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r4 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000002c0)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socket$kcm(0x29, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000340)) mount(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f00000009c0)="3949bcf20271c219f64b9e3fbd45bfae692375440912d5a576c2d82299018de50363f2cf30a439b45c2738869283b7900c1e030013700557a768d5cc05cb9ed624684f4dfdae73a8148b29b2978222576dabbcb3556bcf35a8f66fa68ceb0b834ec5120ac749dc0cc5aab7b0197711785349b1673ff5159bc1a40df6c779950e0747a25ce77a10f68b663a87fc993224a79b583eac02a2171f076ff3", 0x1000, &(0x7f0000000200)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000280)) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) 2018/03/31 08:26:16 executing program 3 (fault-call:10 fault-nth:21): r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000348f88)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r2}, 0x10) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) mount(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f00000002c0)='devpts\x00', 0x800000, &(0x7f0000000300)) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') 2018/03/31 08:26:16 executing program 6: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0xa0) socketpair(0x2, 0x5, 0xffff, &(0x7f0000000080)) socketpair(0x0, 0x4, 0x6, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x1) socketpair(0xf, 0x3, 0x2, &(0x7f0000000040)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000100)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_DISABLE(r1, 0x2401, 0x9) 2018/03/31 08:26:16 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) socketpair(0x0, 0x4, 0x6, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) socketpair(0x9, 0x3, 0x2, &(0x7f0000000080)) 2018/03/31 08:26:16 executing program 7: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x80000000000, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000001fc0)) sendmsg(0xffffffffffffffff, &(0x7f00000024c0)={&(0x7f0000002040)=@un=@file={0x0, './file0\x00'}, 0x80, &(0x7f0000001f40)=[{&(0x7f00000020c0)="73c7575b94a72990e177f86ed4835a72a65c1a6c6831eeb0c48163a47ab63bcb605c8450cc4798ff6521c2aa722d1a7105c8a07e6c", 0x35}], 0x1, &(0x7f0000002500)=ANY=[], 0x0, 0x40000}, 0x20000000) r2 = gettid() r3 = perf_event_open(&(0x7f0000001ac0)={0x1, 0x70, 0xffffffff, 0x835, 0x9, 0xffffffffffffff5f, 0x0, 0x1000, 0x42000, 0x3, 0x8, 0x80, 0x1, 0x4, 0x100000001, 0x9, 0xff, 0x8, 0x1000, 0x7, 0x7f, 0x200, 0xb715, 0x3, 0x7fffffff, 0xf0a, 0x40, 0x8000, 0x8, 0x7, 0xffffffffffffff74, 0x4, 0x6, 0x100, 0x7, 0x335, 0x3ff, 0x58, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000001a80), 0xe}, 0x0, 0x80000000, 0x82, 0x7, 0x5, 0x3, 0x80000001}, r2, 0xd, r1, 0x8) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000200)='mqueue\x00', 0x0, &(0x7f000000a000)) r4 = getpid() r5 = bpf$PROG_LOAD(0x5, &(0x7f0000002500)={0xf, 0x5, &(0x7f0000001940)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, [@exit={0x95}], {0x95}}, &(0x7f0000001980)='GPL\x00', 0xff, 0x1000, &(0x7f00000039c0)=""/4096, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000019c0)={&(0x7f0000000180)='./file0\x00', r5}, 0x10) perf_event_open(&(0x7f0000001a00)={0x0, 0x70, 0x0, 0x8, 0x0, 0x3, 0x0, 0xb8, 0x1000, 0x0, 0x3, 0x4, 0xfff, 0x4, 0x4dae, 0x40, 0x100000001, 0x6, 0x4, 0x0, 0x3, 0x753c, 0x6, 0x100, 0x1de, 0x6, 0x4, 0x1, 0x6, 0x4, 0x7, 0x3, 0x7fff, 0x80000000, 0x3, 0x8, 0x81, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x7, 0x4}, 0x801, 0x400, 0x1, 0x4, 0x1, 0x9, 0x80000001}, r4, 0x7, r1, 0xb) r6 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000004000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000001c00)='./file0\x00', &(0x7f0000001c40)='./file0\x00', &(0x7f0000001c80)='devpts\x00', 0x40, &(0x7f0000001cc0)="be623dfd58807ac0b2f86f052863a5f30adc0bce173ebcf648cefd7d64732aeb5b94e6af3ab33e53669ba6d304d067dad4b1ff3ed87f18fd170aac904e8f105e80e22881717c98752a9cd7cfb06d102877e3b36b2624d22427331755a9514b225d25999ed605ffe4188630db2e7ddcc57f6316b60c4f3845d9dfcbbde5e49af627b48d7c9bd743b536de31a9ba3010cb6714c9b90a50537be55ca12a18e6541bff5a82d293e7734ea9c90707899663bd96b3bcce5887bf0bd35963c5adc39ddcb6f2a0a02b01661242046cb54ef1aec5a486b69e006305064124867bf79f4dc11798e214b61575168b79887122e0a3461f703c077f902c0a") socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r7, &(0x7f0000001800)={&(0x7f0000000240)=@alg, 0x80, &(0x7f0000000740)=[{&(0x7f00000002c0)=""/83, 0x53}, {&(0x7f0000000340)=""/27, 0x1b}, {&(0x7f0000000380)}, {&(0x7f00000003c0)=""/40, 0x28}, {&(0x7f0000000400)=""/144, 0x90}, {&(0x7f00000004c0)=""/200, 0xc8}, {&(0x7f00000005c0)=""/60, 0x3c}, {&(0x7f0000000600)=""/105, 0x69}, {&(0x7f0000000680)=""/127, 0x7f}, {&(0x7f0000000700)=""/8, 0x8}], 0xa, &(0x7f0000000800)=""/4096, 0x1000}, 0x10000) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000002340)=0xf60) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000003900)={&(0x7f0000003400)=@can={0x0, 0x0}, 0x80, &(0x7f0000003840)=[{&(0x7f0000003480)=""/194, 0xc2}, {&(0x7f0000003580)=""/250, 0xfa}, {&(0x7f0000003680)=""/100, 0x64}, {&(0x7f0000003700)=""/14, 0xe}, {&(0x7f0000003740)=""/159, 0x9f}, {&(0x7f0000003800)=""/15, 0xf}], 0x6, &(0x7f00000038c0)=""/29, 0x1d, 0x5}, 0x3) bpf$PROG_LOAD(0x5, &(0x7f0000003940)={0x4, 0x9, &(0x7f0000001840)=ANY=[@ANYBLOB="18000000030000000000000003000000dfd00c00fcffffff0000000000000000000803000101000000810000000000000001f0fff0ffffff000000000000000095000000000017d2"], &(0x7f0000000380)='GPL\x00', 0xf172, 0x4b, &(0x7f00000018c0)=""/75, 0x41f00, 0x1, [], r8}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000000c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001f00)={0xffffffffffffffff, 0x0, 0xf6, 0x22, &(0x7f0000001dc0)="9ef9482ea02fd36d0a768986a7ebe7a627dc88937e7073e3521858dfa0d5e02f571a01cfdfa76e048e5f956ea5da60b90e02a6c3d3687ed61ec9ab5b682c02498bddef38de9ce8c753e41e78f414d16202a033b6c7752711a5f56924e7846d6dcde2f71026e1eb0319b5e60f6b1ec67fca31c3cf1691d3af91a19f56be5a10ff337a53ba13dd3d75e1555211954b92ec0082d02b7b4cdddc021cbe84e4af8f20788977e3416918843e6c92b2ebf7b8b33ecbd4c7c9a9d5036c3e3e538748a32f1a28eb77818ca1878ffdd445dcdb8a40e6221e0fc474428449dfe93c62bbc69996aa9b34488c1da4f6f7c2275305a6a4fb256c1a516d", &(0x7f0000001ec0)=""/34, 0x1f, 0x1}, 0x28) close(r6) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x3441, &(0x7f0000000080)) mount(&(0x7f00000021c0)='./file0/file0\x00', &(0x7f0000002200)='./file0/file0\x00', &(0x7f0000002240)='fuse\x00', 0x2000000, &(0x7f0000002280)="9b3923bfddc346e9fa2aeaffae6ca386d8d50ba83ab72218340d3c30c045a89ac016797652ba04f1a203cfceccb458dbfd9fd03c4a80ef9a40dc7a4f24b6619d04a58186466fd8465757d9ee053c082cdfa957e7efab6191761847cca59c017493ef5e3d22432cf0b4ebef") ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f00000023c0)=ANY=[@ANYBLOB="07000000000000000000000000000000000000000000000000000000000000000000000067eb0ecf1cfa4ffd89aa7e339417beb7d332a5c996e59875644dd1e3a690110400bc751bb0435977d90fcbb2b83c27812d818991d125e9c0f199be2bc7f01aa0a5cb9b9f99438aa0f1ae3d50201f7bb276536f567f03f062994da292b6db0000000000000000000000000000a93536f303000000000000002a27f6ae1258ebb5079c1bab4f1f6f11ee8ce2e590855a3af38e4bb871ef8400000000000000000000"]) mount(&(0x7f0000001b40)='./file0\x00', &(0x7f0000001b80)='./file0/file0\x00', &(0x7f0000002100)='vfat\x00', 0x0, &(0x7f0000002140)="98980e21ac8b46c0b7bedeee39e6bd9ae4088d6ab47dc9dc76a39e299ce3783aa33e482e450484961fd3e3c5b178fafbe54440e19512ea4298652ed129d4241d9d116d8a5c2b931d350f0c989f8a288fc9e56c") mount(&(0x7f0000df7000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='hugetlbfs\x00', 0x200, &(0x7f00000001c0)) mkdir(&(0x7f00000004c0)='./file0/file0\x00', 0x0) socketpair$inet(0x2, 0x0, 0x1f, &(0x7f0000000080)) 2018/03/31 08:26:16 executing program 2 (fault-call:9 fault-nth:15): r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000348f88)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r2}, 0x10) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') 2018/03/31 08:26:16 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000000003042df8700"]) r1 = perf_event_open(&(0x7f0000348f88)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x0, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r2}, 0x10) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) mount(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f00000002c0)='devpts\x00', 0x800000, &(0x7f0000000300)="7b18f1563c67659c49445440cbb57f32c0f4710f0219046399f3e8a25c5d4975e2b42f404b14937bd42d9874bdd132eef77f584d5151c9a97470a0d77a0c24a85e319673350e16b039bf474ec320") socketpair(0x3, 0x800, 0x81, &(0x7f00000003c0)) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') 2018/03/31 08:26:16 executing program 1: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f00000000c0)={0xffffffffffffff9c}) socketpair$inet6_icmp(0xa, 0x2, 0x3a, &(0x7f0000000400)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000440)={r2}) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={0xffffffffffffffff, &(0x7f0000000700), &(0x7f00000009c0)=""/161}, 0x18) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)) [ 234.015913] RSP: 002b:00007f3ee2ac1c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 234.023593] RAX: ffffffffffffffda RBX: 00007f3ee2ac26d4 RCX: 0000000000454e79 [ 234.030835] RDX: 0000000020000100 RSI: 0000000020000180 RDI: 0000000020000100 [ 234.038077] RBP: 000000000072bea0 R08: 0000000020000040 R09: 0000000000000000 [ 234.045321] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 234.052932] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000000e [ 234.232393] FAULT_INJECTION: forcing a failure. [ 234.232393] name failslab, interval 1, probability 0, space 0, times 0 [ 234.243673] CPU: 1 PID: 16360 Comm: syz-executor3 Not tainted 4.16.0-rc6+ #43 [ 234.250948] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 234.260294] Call Trace: [ 234.262876] dump_stack+0x194/0x24d [ 234.266506] ? arch_local_irq_restore+0x53/0x53 [ 234.271188] should_fail+0x8c0/0xa40 [ 234.274912] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 234.280018] ? trace_event_raw_event_lock+0x340/0x340 [ 234.285212] ? trace_hardirqs_off+0x10/0x10 [ 234.289535] ? lock_downgrade+0x980/0x980 [ 234.293689] ? trace_hardirqs_off+0x10/0x10 [ 234.298012] ? find_held_lock+0x35/0x1d0 [ 234.302081] ? __lock_is_held+0xb6/0x140 [ 234.306153] ? check_same_owner+0x320/0x320 [ 234.306792] devpts: called with bogus options [ 234.310471] ? rcu_note_context_switch+0x710/0x710 [ 234.310485] ? rcu_note_context_switch+0x710/0x710 [ 234.310505] should_failslab+0xec/0x120 [ 234.310516] __kmalloc+0x63/0x760 [ 234.310531] ? __kmalloc_node+0x47/0x70 [ 234.310547] ? __list_lru_init+0xcf/0x750 [ 234.310561] __list_lru_init+0xcf/0x750 [ 234.310578] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 234.310590] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 234.310607] ? lockdep_init_map+0x9/0x10 [ 234.310620] sget_userns+0x6b1/0xe40 [ 234.310634] ? kernfs_sop_show_path+0x190/0x190 [ 234.367647] ? kernfs_sop_show_options+0x180/0x180 [ 234.372577] ? destroy_unused_super.part.6+0xd0/0xd0 [ 234.377688] ? check_same_owner+0x320/0x320 [ 234.378329] hugetlbfs: Bad mount option: "" [ 234.382000] ? rcu_pm_notify+0xc0/0xc0 [ 234.382022] ? rcu_read_lock_sched_held+0x108/0x120 [ 234.382034] ? kmem_cache_alloc_trace+0x459/0x740 [ 234.382044] ? lock_downgrade+0x980/0x980 [ 234.382065] kernfs_mount_ns+0x13d/0x8b0 [ 234.382079] ? kernfs_super_ns+0x70/0x70 [ 234.382098] sysfs_mount+0xc2/0x1c0 [ 234.382108] ? sysfs_kill_sb+0x40/0x40 [ 234.382120] ? alloc_pages_current+0xbe/0x1e0 [ 234.382134] ? security_sb_copy_data+0x81/0xb0 [ 234.382147] mount_fs+0x66/0x2d0 [ 234.382162] vfs_kern_mount.part.26+0xc6/0x4a0 [ 234.382173] ? may_umount+0xa0/0xa0 [ 234.382185] ? _raw_read_unlock+0x22/0x30 [ 234.382196] ? __get_fs_type+0x8a/0xc0 [ 234.382211] do_mount+0xea4/0x2bb0 [ 234.382227] ? copy_mount_string+0x40/0x40 [ 234.382236] ? rcu_pm_notify+0xc0/0xc0 [ 234.382254] ? copy_mount_options+0x5f/0x2e0 [ 234.382263] ? rcu_read_lock_sched_held+0x108/0x120 [ 234.382275] ? kmem_cache_alloc_trace+0x459/0x740 [ 234.474462] ? kasan_check_write+0x14/0x20 [ 234.478697] ? _copy_from_user+0x99/0x110 [ 234.482849] ? copy_mount_options+0x1f7/0x2e0 [ 234.487891] SyS_mount+0xab/0x120 [ 234.491348] ? copy_mnt_ns+0xb30/0xb30 [ 234.495253] do_syscall_64+0x281/0x940 [ 234.499147] ? vmalloc_sync_all+0x30/0x30 [ 234.503300] ? _raw_spin_unlock_irq+0x27/0x70 [ 234.507795] ? finish_task_switch+0x1c1/0x7e0 [ 234.512292] ? syscall_return_slowpath+0x550/0x550 [ 234.517238] ? syscall_return_slowpath+0x2ac/0x550 [ 234.522187] ? prepare_exit_to_usermode+0x350/0x350 [ 234.527209] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 2018/03/31 08:26:17 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) socketpair(0x0, 0x4, 0x6, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000000480)={&(0x7f0000000080)=@ethernet={0x306, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000100)="f824404b855b338ca925f7d8f9f706cf929ade3171deb7cc671bbaa6cecf59d18d88fd6875223deabaf2532f812370c42a92b8fa735a44b03f4c07cccc60a3", 0x3f}, {&(0x7f00000001c0)="0d87f22c2d2cc8f9265163ce456803c5448ded168a294b57756e288211469cf038224cef7aec400df7f7b3c4197f18f088c464df21d1ea3267b4743d2daa5389fa3c0c056c04e221e0c5dfd1094cb76a7608b7aad99d25cd40874997d64a3aa547d2eb1d0c2e28e3f3012a40d999d2efd8d2f847c792811d77e2b607aaae835425c5d8448fbfa6ca01393864a9f98860656197ca1d47c32a782823a5384e777f391705568531676425c3164e4f348bd0185bb45b389fee", 0xb7}, {&(0x7f0000000140)="8e41bd3f5eba39ea7f31235b9cb095e124e644a0ff4cd49455d254d8570784b36074d6399b4fc8ae803a3bd38a8e69e15e1f5bf707a5222fc2b23c93", 0x3c}, {&(0x7f0000000280)="e9452cac9a7cddfe424dc7bc52fcbf55cdb51bdb335b72d21d16e74df38e690643bab9f3feb7b10916d0a475dcaedaea4f088c74cdbae5748fc88b7050dd1f97966d7d7d1bdbd1b253a3309c93edec12b69f98cb72207f9e7fdd345b87b8a13480b0d2e368d54c5613b82f75f3d2cf04ee0ecffa68ae187ec48368b217a01562e9a86750f55a0af6ef6f6e0a3152b6563f08fbe40dcc60a7ddc41d537a3c2c9d12c16c64bb74d8ac8e643837af337743fec6237ab4206dba406202c14916e2e91e8319fd2cbc549088d7c38732dc2d502f709835f3867c51e3ea00b2dee0be964a57381272740a84bd92c3e03c586e", 0xef}], 0x4, &(0x7f0000000800)=ANY=[@ANYBLOB="b8000000000000008400000009000000f90c422c4ec0690b62679bd380474b1e1142c5137c0ff0779c9bb0fd462d6d2db0df14e85e3fe13282bd4f649b6af75e626da8261a132c3b93b2ea058643a3f5011554947b420609ae5b44278c73fc8c3001938ec7d98aea9cfea08ca0fc450c9ea3f6d89e2c5ebe6c652c167336ac07d06089b4819a5bd114a028d1d9129ba0a546001c1d277a5c36510bae4a09b7e7d0572d04e12359e05c2b697572fb7fb3d300000000000000c6dc20ad59d7c58f44695bcf0b4fc55d4ac71126a0e0a20ad076a8c244429e86899884909cbc6cfc6ae91f298dfd831c994f0cf1ec414f11be0129a74f927393b3"], 0xb8, 0x10}, 0x20000000) recvmsg$kcm(r0, &(0x7f00000007c0)={&(0x7f00000004c0)=@vsock, 0x80, &(0x7f0000000700)=[{&(0x7f0000000540)=""/125, 0x7d}, {&(0x7f00000005c0)=""/160, 0xa0}, {&(0x7f0000000680)=""/109, 0x6d}], 0x3, &(0x7f0000000740)=""/67, 0x43, 0x40}, 0x12021) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) socketpair(0xf, 0x3, 0x2, &(0x7f0000000040)) [ 234.532583] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 234.537571] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 234.542764] RIP: 0033:0x454e79 [ 234.545957] RSP: 002b:00007fbfd4b96c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 234.553755] RAX: ffffffffffffffda RBX: 00007fbfd4b976d4 RCX: 0000000000454e79 [ 234.561023] RDX: 0000000020000100 RSI: 0000000020000180 RDI: 0000000020000100 [ 234.566251] FAULT_INJECTION: forcing a failure. [ 234.566251] name failslab, interval 1, probability 0, space 0, times 0 [ 234.568283] RBP: 000000000072bea0 R08: 0000000020000040 R09: 0000000000000000 [ 234.568290] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 234.568296] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000015 [ 234.601528] CPU: 0 PID: 16376 Comm: syz-executor2 Not tainted 4.16.0-rc6+ #43 [ 234.608795] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 234.618398] Call Trace: [ 234.620983] dump_stack+0x194/0x24d [ 234.624610] ? arch_local_irq_restore+0x53/0x53 [ 234.629271] ? __save_stack_trace+0x7e/0xd0 [ 234.633597] should_fail+0x8c0/0xa40 [ 234.637317] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 234.642419] ? kasan_kmalloc+0xad/0xe0 [ 234.646309] ? kmem_cache_alloc_trace+0x136/0x740 [ 234.651149] ? __memcg_init_list_lru_node+0x169/0x270 [ 234.656785] ? __list_lru_init+0x544/0x750 [ 234.661018] ? sget_userns+0x691/0xe40 [ 234.664916] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 234.669656] ? do_mount+0xea4/0x2bb0 [ 234.673355] ? SyS_mount+0xab/0x120 [ 234.676970] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 234.682332] ? find_held_lock+0x35/0x1d0 [ 234.686383] ? __lock_is_held+0xb6/0x140 [ 234.690441] ? check_same_owner+0x320/0x320 [ 234.694748] ? rcu_note_context_switch+0x710/0x710 [ 234.699664] should_failslab+0xec/0x120 [ 234.703620] kmem_cache_alloc_trace+0x4b/0x740 [ 234.708190] ? __kmalloc_node+0x33/0x70 [ 234.712149] ? __kmalloc_node+0x33/0x70 [ 234.716101] ? rcu_read_lock_sched_held+0x108/0x120 [ 234.721098] __memcg_init_list_lru_node+0x169/0x270 [ 234.726106] ? list_lru_add+0x7c0/0x7c0 [ 234.730076] ? __kmalloc_node+0x47/0x70 [ 234.734050] __list_lru_init+0x544/0x750 [ 234.738102] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 234.743972] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 234.748982] ? __lockdep_init_map+0xe4/0x650 [ 234.753385] ? lockdep_init_map+0x9/0x10 [ 234.757441] sget_userns+0x691/0xe40 [ 234.761147] ? kernfs_sop_show_path+0x190/0x190 [ 234.765811] ? kernfs_sop_show_options+0x180/0x180 [ 234.770728] ? destroy_unused_super.part.6+0xd0/0xd0 [ 234.775817] ? check_same_owner+0x320/0x320 [ 234.780128] ? rcu_pm_notify+0xc0/0xc0 [ 234.784008] ? rcu_read_lock_sched_held+0x108/0x120 [ 234.789015] ? kmem_cache_alloc_trace+0x459/0x740 [ 234.793846] ? lock_downgrade+0x980/0x980 [ 234.797982] kernfs_mount_ns+0x13d/0x8b0 [ 234.802035] ? kernfs_super_ns+0x70/0x70 [ 234.806085] sysfs_mount+0xc2/0x1c0 [ 234.809696] ? sysfs_kill_sb+0x40/0x40 [ 234.813568] ? alloc_pages_current+0xbe/0x1e0 [ 234.818046] ? security_sb_copy_data+0x81/0xb0 [ 234.822608] mount_fs+0x66/0x2d0 [ 234.825965] vfs_kern_mount.part.26+0xc6/0x4a0 [ 234.830531] ? may_umount+0xa0/0xa0 [ 234.834141] ? _raw_read_unlock+0x22/0x30 [ 234.838275] ? __get_fs_type+0x8a/0xc0 [ 234.842150] do_mount+0xea4/0x2bb0 [ 234.845680] ? copy_mount_string+0x40/0x40 [ 234.849905] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 234.854914] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 234.859664] ? retint_kernel+0x10/0x10 [ 234.863540] ? copy_mount_options+0x18b/0x2e0 [ 234.868035] ? audit_kill_trees+0x430/0x430 [ 234.872345] ? copy_mount_options+0x1f7/0x2e0 [ 234.876831] SyS_mount+0xab/0x120 [ 234.880271] ? copy_mnt_ns+0xb30/0xb30 [ 234.884151] do_syscall_64+0x281/0x940 [ 234.888031] ? trace_event_raw_event_sys_exit+0x260/0x260 [ 234.893557] ? syscall_return_slowpath+0x550/0x550 [ 234.898470] ? syscall_return_slowpath+0x2ac/0x550 [ 234.903398] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 234.908751] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 234.913584] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 234.918748] RIP: 0033:0x454e79 [ 234.921918] RSP: 002b:00007f3ee2ac1c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 2018/03/31 08:26:17 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x0, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)={0xffffffffffffffff}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000380)={r4, &(0x7f0000000c00)="2c177ac294dbf93191bfa18590b2e2715352fb3823ae69102cb4c8a42127d9f5f5850106330f94589e08ed52d7c01a189062dff6268a87c398c089ce27a09b6d0e9bc7218e9086dae21bd4f53b50a63ecd33c04129be05f00905f8b1242a21228270851b1241278c84e8c203aa96e639ef88bdc261fd6fe35d58c06e16355ea9bdc06ee97c4762c742ed3d0fbaeabfae3a777ea73c81b940512beb779c40dbd42e46c931", &(0x7f0000000cc0)=""/234}, 0x18) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r5 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000200)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f00000009c0)="3949bcf20271c219f64b9e3fbd45bfae692375440912d5a576c2d82299018de50363f2cf30a439b45c2738869283b7900c1e030013700557a768d5cc05cb9ed624684f4dfdae73a8148b29b2978222576dabbcb3556bcf35a8f66fa68ceb0b834ec5120ac749dc0cc5aab7b0197711785349b1673ff5159bc1a40df6c779950e0747a25ce77a10f68b663a87fc993224a79b583eac02a2171f076ff3", 0x1000, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() mount(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000340)='qnx4\x00', 0x3000c00, &(0x7f0000000400)="450175f21f053bb8ec30f674f8e071b0dfc4cc76c9b75f72356a86dcb439b3937dede1dad507d8e618ccd75961575b47c94cb376e662ca361f310e5dfce18a03fdb21fdd3c11ec405fd1aa900f6ebb9bf1fdd435f2d231593efeeb1041844f1fc09ef9990d8e837529edca2c9f") close(0xffffffffffffffff) [ 234.929624] RAX: ffffffffffffffda RBX: 00007f3ee2ac26d4 RCX: 0000000000454e79 [ 234.936883] RDX: 0000000020000100 RSI: 0000000020000180 RDI: 0000000020000100 [ 234.944134] RBP: 000000000072bea0 R08: 0000000020000040 R09: 0000000000000000 [ 234.951384] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 234.958642] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000000f 2018/03/31 08:26:17 executing program 3 (fault-call:10 fault-nth:22): r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000348f88)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r2}, 0x10) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) mount(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f00000002c0)='devpts\x00', 0x800000, &(0x7f0000000300)) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') 2018/03/31 08:26:17 executing program 7: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x80000000000, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000001fc0)) sendmsg(0xffffffffffffffff, &(0x7f00000024c0)={&(0x7f0000002040)=@un=@file={0x0, './file0\x00'}, 0x80, &(0x7f0000001f40)=[{&(0x7f00000020c0)="73c7575b94a72990e177f86ed4835a72a65c1a6c6831eeb0c48163a47ab63bcb605c8450cc4798ff6521c2aa722d1a7105c8a07e6c", 0x35}], 0x1, &(0x7f0000002500)=ANY=[], 0x0, 0x40000}, 0x20000000) r2 = gettid() r3 = perf_event_open(&(0x7f0000001ac0)={0x1, 0x70, 0xffffffff, 0x835, 0x9, 0xffffffffffffff5f, 0x0, 0x1000, 0x42000, 0x3, 0x8, 0x80, 0x1, 0x4, 0x100000001, 0x9, 0xff, 0x8, 0x1000, 0x7, 0x7f, 0x200, 0xb715, 0x3, 0x7fffffff, 0xf0a, 0x40, 0x8000, 0x8, 0x7, 0xffffffffffffff74, 0x4, 0x6, 0x100, 0x7, 0x335, 0x3ff, 0x58, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000001a80), 0xe}, 0x0, 0x80000000, 0x82, 0x7, 0x5, 0x3, 0x80000001}, r2, 0xd, r1, 0x8) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000200)='mqueue\x00', 0x0, &(0x7f000000a000)) r4 = getpid() r5 = bpf$PROG_LOAD(0x5, &(0x7f0000002500)={0xf, 0x7, &(0x7f0000001940)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, [@ldst={0x0, 0x3, 0x3, 0x4, 0x3, 0x2, 0xffffffffffffffff}, @exit={0x95}], {0x95}}, &(0x7f0000001980)='GPL\x00', 0xff, 0x1000, &(0x7f00000039c0)=""/4096, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000019c0)={&(0x7f0000000180)='./file0\x00', r5}, 0x10) perf_event_open(&(0x7f0000001a00)={0x0, 0x70, 0x0, 0x8, 0x0, 0x3, 0x0, 0xb8, 0x1000, 0x0, 0x3, 0x4, 0xfff, 0x4, 0x4dae, 0x40, 0x100000001, 0x6, 0x4, 0x0, 0x3, 0x753c, 0x6, 0x100, 0x1de, 0x6, 0x4, 0x1, 0x6, 0x4, 0x7, 0x3, 0x7fff, 0x80000000, 0x3, 0x8, 0x81, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x7, 0x4}, 0x801, 0x400, 0x1, 0x4, 0x1, 0x9, 0x80000001}, r4, 0x7, r1, 0xb) r6 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000004000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000001c00)='./file0\x00', &(0x7f0000001c40)='./file0\x00', &(0x7f0000001c80)='devpts\x00', 0x40, &(0x7f0000001cc0)="be623dfd58807ac0b2f86f052863a5f30adc0bce173ebcf648cefd7d64732aeb5b94e6af3ab33e53669ba6d304d067dad4b1ff3ed87f18fd170aac904e8f105e80e22881717c98752a9cd7cfb06d102877e3b36b2624d22427331755a9514b225d25999ed605ffe4188630db2e7ddcc57f6316b60c4f3845d9dfcbbde5e49af627b48d7c9bd743b536de31a9ba3010cb6714c9b90a50537be55ca12a18e6541bff5a82d293e7734ea9c90707899663bd96b3bcce5887bf0bd35963c5adc39ddcb6f2a0a02b01661242046cb54ef1aec5a486b69e006305064124867bf79f4dc11798e214b61575168b79887122e0a3461f703c077f902c0a") socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r7, &(0x7f0000001800)={&(0x7f0000000240)=@alg, 0x80, &(0x7f0000000740)=[{&(0x7f00000002c0)=""/83, 0x53}, {&(0x7f0000000340)=""/27, 0x1b}, {&(0x7f0000000380)}, {&(0x7f00000003c0)=""/40, 0x28}, {&(0x7f0000000400)=""/144, 0x90}, {&(0x7f00000004c0)=""/200, 0xc8}, {&(0x7f00000005c0)=""/60, 0x3c}, {&(0x7f0000000600)=""/105, 0x69}, {&(0x7f0000000680)=""/127, 0x7f}, {&(0x7f0000000700)=""/8, 0x8}], 0xa, &(0x7f0000000800)=""/4096, 0x1000}, 0x10000) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000002340)=0xf60) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000003900)={&(0x7f0000003400)=@can={0x0, 0x0}, 0x80, &(0x7f0000003840)=[{&(0x7f0000003480)=""/194, 0xc2}, {&(0x7f0000003580)=""/250, 0xfa}, {&(0x7f0000003680)=""/100, 0x64}, {&(0x7f0000003700)=""/14, 0xe}, {&(0x7f0000003740)=""/159, 0x9f}, {&(0x7f0000003800)=""/15, 0xf}], 0x6, &(0x7f00000038c0)=""/29, 0x1d, 0x5}, 0x3) bpf$PROG_LOAD(0x5, &(0x7f0000003940)={0x4, 0x9, &(0x7f0000001840)=ANY=[@ANYBLOB="18000000030000000000000003000000dfd00c00fcffffff0000000000000000000803000101000000810000000000000001f0fff0ffffff000000000000000095000000000017d2"], &(0x7f0000000380)='GPL\x00', 0xf172, 0x4b, &(0x7f00000018c0)=""/75, 0x41f00, 0x1, [], r8}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000000c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001f00)={0xffffffffffffffff, 0x0, 0xf6, 0x22, &(0x7f0000001dc0)="9ef9482ea02fd36d0a768986a7ebe7a627dc88937e7073e3521858dfa0d5e02f571a01cfdfa76e048e5f956ea5da60b90e02a6c3d3687ed61ec9ab5b682c02498bddef38de9ce8c753e41e78f414d16202a033b6c7752711a5f56924e7846d6dcde2f71026e1eb0319b5e60f6b1ec67fca31c3cf1691d3af91a19f56be5a10ff337a53ba13dd3d75e1555211954b92ec0082d02b7b4cdddc021cbe84e4af8f20788977e3416918843e6c92b2ebf7b8b33ecbd4c7c9a9d5036c3e3e538748a32f1a28eb77818ca1878ffdd445dcdb8a40e6221e0fc474428449dfe93c62bbc69996aa9b34488c1da4f6f7c2275305a6a4fb256c1a516d", &(0x7f0000001ec0)=""/34, 0x1f, 0x1}, 0x28) close(r6) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x3441, &(0x7f0000000080)) mount(&(0x7f00000021c0)='./file0/file0\x00', &(0x7f0000002200)='./file0/file0\x00', &(0x7f0000002240)='fuse\x00', 0x2000000, &(0x7f0000002280)="9b3923bfddc346e9fa2aeaffae6ca386d8d50ba83ab72218340d3c30c045a89ac016797652ba04f1a203cfceccb458dbfd9fd03c4a80ef9a40dc7a4f24b6619d04a58186466fd8465757d9ee053c082cdfa957e7efab6191761847cca59c017493ef5e3d22432cf0b4ebef") ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f00000023c0)=ANY=[@ANYBLOB="07000000000000000000000000000000000000000000000000000000000000000000000067eb0ecf1cfa4ffd89aa7e339417beb7d332a5c996e59875644dd1e3a690110400bc751bb0435977d90fcbb2b83c27812d818991d125e9c0f199be2bc7f01aa0a5cb9b9f99438aa0f1ae3d50201f7bb276536f567f03f062994da292b6db0000000000000000000000000000a93536f303000000000000002a27f6ae1258ebb5079c1bab4f1f6f11ee8ce2e590855a3af38e4bb871ef8400000000000000000000"]) mount(&(0x7f0000001b40)='./file0\x00', &(0x7f0000001b80)='./file0/file0\x00', &(0x7f0000002100)='vfat\x00', 0x0, &(0x7f0000002140)="98980e21ac8b46c0b7bedeee39e6bd9ae4088d6ab47dc9dc76a39e299ce3783aa33e482e450484961fd3e3c5b178fafbe54440e19512ea4298652ed129d4241d9d116d8a5c2b931d350f0c989f8a288fc9e56c") mount(&(0x7f0000df7000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='hugetlbfs\x00', 0x200, &(0x7f00000001c0)) mkdir(&(0x7f00000004c0)='./file0/file0\x00', 0x0) socketpair$inet(0x2, 0x0, 0x1f, &(0x7f0000000080)) 2018/03/31 08:26:17 executing program 1: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={0xffffffffffffffff, &(0x7f0000000700), &(0x7f00000009c0)=""/161}, 0x18) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)) 2018/03/31 08:26:17 executing program 2 (fault-call:9 fault-nth:16): r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000348f88)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r2}, 0x10) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') 2018/03/31 08:26:17 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000000003042df8700"]) r1 = perf_event_open(&(0x7f0000348f88)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r2}, 0x10) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) mount(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f00000002c0)='devpts\x00', 0x800000, &(0x7f0000000300)="7b18f1563c67659c49445440cbb57f32c0f4710f0219046399f3e8a25c5d4975e2b42f404b14937bd42d9874bdd132eef77f584d5151c9a97470a0d77a0c24a85e319673350e16b039bf474ec320") socketpair(0x3, 0x800, 0x81, &(0x7f00000003c0)) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') 2018/03/31 08:26:17 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) socketpair(0x0, 0x4, 0x6, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) socketpair(0x0, 0x80006, 0x2, &(0x7f0000000040)) 2018/03/31 08:26:17 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000348f88)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) socketpair$ax25(0x3, 0x7, 0x6, &(0x7f0000000100)={0xffffffffffffffff}) recvmsg(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f00000001c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000240)=""/241, 0xf1}, {&(0x7f0000000140)=""/47, 0x2f}, {&(0x7f0000000340)=""/233, 0xe9}, {&(0x7f0000000440)=""/34, 0x22}, {&(0x7f0000000480)=""/35, 0x23}, {&(0x7f00000004c0)=""/41, 0x29}, {&(0x7f0000000500)=""/82, 0x52}], 0x7, &(0x7f0000000600)=""/174, 0xae, 0x6}, 0x100) sendmsg(r1, &(0x7f0000000a40)={&(0x7f0000000700)=@hci={0x1f, r2, 0x2}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000780)="8ae2490dc8f1a0b52e6ce17a999fc09ee9914c9454c3eef2bac55514c51357d9daefe33f1682f5da076d2f07d0040bf122dad1435821354c9b7790d65e77073b28c69eb04f673b1815f38856beef5990569fc8d67559dc61b39ffe4fbb0913ba5e3ffc520c0fb5e0514653528077686a7d1f966ac566c0e4da276e4470a3", 0x7e}], 0x1, &(0x7f0000000840)=[{0x110, 0x1bf, 0x100, "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"}, {0xe0, 0x11f, 0x9, "fc07eb8c2bea0267b8bcbc9fbdb971eb4256533cd83b23eb0566261aba4aa06f2cd9a568c20c636f24b969a43b39d2e4580114fc50ca41f82e7ecaa7f37d421285954eeb27d6432c5ce3db3b82df67daf6d4f738d3bd8d2b4f2aef2c4e261e5ff9d60115e95191973bc3e5fdec85b8113783943b24f2c09f227c68828dedede1152b54eb42c3e66dce278e71f11714b72c9537b4cb082d206547fe16a9cc74b053b3366e2c0ea214223f4a38554073a0e8b560f84607dea66ed97d2dae44dcf763507d8e89817a9a2ef3fb6e4527ee"}], 0x1f0, 0x4}, 0x80) close(r0) socketpair(0x0, 0x4, 0x6, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x1) socketpair(0xf, 0x3, 0x2, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00', r4}, 0x10) [ 235.343839] FAULT_INJECTION: forcing a failure. [ 235.343839] name failslab, interval 1, probability 0, space 0, times 0 [ 235.355152] CPU: 1 PID: 16405 Comm: syz-executor3 Not tainted 4.16.0-rc6+ #43 [ 235.362415] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 235.371762] Call Trace: [ 235.374338] dump_stack+0x194/0x24d [ 235.377957] ? arch_local_irq_restore+0x53/0x53 [ 235.382623] should_fail+0x8c0/0xa40 [ 235.386321] ? is_bpf_text_address+0xa4/0x120 [ 235.390801] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 235.395885] ? __kernel_text_address+0xd/0x40 [ 235.400364] ? unwind_get_return_address+0x61/0xa0 [ 235.405284] ? find_held_lock+0x35/0x1d0 [ 235.409327] ? __lock_is_held+0xb6/0x140 [ 235.413376] ? check_same_owner+0x320/0x320 [ 235.417680] ? rcu_note_context_switch+0x710/0x710 [ 235.422594] should_failslab+0xec/0x120 [ 235.426548] kmem_cache_alloc_trace+0x4b/0x740 [ 235.431111] ? __kmalloc_node+0x33/0x70 [ 235.435068] ? __kmalloc_node+0x33/0x70 [ 235.439027] ? rcu_read_lock_sched_held+0x108/0x120 [ 235.444039] __memcg_init_list_lru_node+0x169/0x270 [ 235.449042] ? list_lru_add+0x7c0/0x7c0 [ 235.452997] ? __kmalloc_node+0x47/0x70 [ 235.456959] __list_lru_init+0x544/0x750 [ 235.461027] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 235.466896] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 235.471895] ? lockdep_init_map+0x9/0x10 [ 235.475940] sget_userns+0x6b1/0xe40 [ 235.479632] ? kernfs_sop_show_path+0x190/0x190 [ 235.484284] ? kernfs_sop_show_options+0x180/0x180 [ 235.489195] ? destroy_unused_super.part.6+0xd0/0xd0 [ 235.494284] ? check_same_owner+0x320/0x320 [ 235.498584] ? rcu_pm_notify+0xc0/0xc0 [ 235.502457] ? rcu_read_lock_sched_held+0x108/0x120 [ 235.507452] ? kmem_cache_alloc_trace+0x459/0x740 [ 235.512285] ? lock_downgrade+0x980/0x980 [ 235.516421] kernfs_mount_ns+0x13d/0x8b0 [ 235.520463] ? kernfs_super_ns+0x70/0x70 [ 235.524511] sysfs_mount+0xc2/0x1c0 [ 235.528119] ? sysfs_kill_sb+0x40/0x40 [ 235.531989] ? alloc_pages_current+0xbe/0x1e0 [ 235.536471] ? security_sb_copy_data+0x81/0xb0 [ 235.541038] mount_fs+0x66/0x2d0 [ 235.544389] vfs_kern_mount.part.26+0xc6/0x4a0 [ 235.548961] ? may_umount+0xa0/0xa0 [ 235.552567] ? _raw_read_unlock+0x22/0x30 [ 235.556706] ? __get_fs_type+0x8a/0xc0 [ 235.560576] do_mount+0xea4/0x2bb0 [ 235.564104] ? copy_mount_string+0x40/0x40 [ 235.568317] ? rcu_pm_notify+0xc0/0xc0 [ 235.572191] ? copy_mount_options+0x5f/0x2e0 [ 235.576576] ? rcu_read_lock_sched_held+0x108/0x120 [ 235.581569] ? kmem_cache_alloc_trace+0x459/0x740 [ 235.586397] ? copy_mount_options+0x1f7/0x2e0 [ 235.590872] SyS_mount+0xab/0x120 [ 235.594301] ? copy_mnt_ns+0xb30/0xb30 [ 235.598170] do_syscall_64+0x281/0x940 [ 235.602039] ? vmalloc_sync_all+0x30/0x30 [ 235.606165] ? _raw_spin_unlock_irq+0x27/0x70 [ 235.610642] ? finish_task_switch+0x1c1/0x7e0 [ 235.615117] ? syscall_return_slowpath+0x550/0x550 [ 235.620034] ? syscall_return_slowpath+0x2ac/0x550 [ 235.624943] ? prepare_exit_to_usermode+0x350/0x350 [ 235.629940] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 235.635286] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 235.640111] entry_SYSCALL_64_after_hwframe+0x42/0xb7 2018/03/31 08:26:18 executing program 3 (fault-call:10 fault-nth:23): r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000348f88)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r2}, 0x10) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) mount(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f00000002c0)='devpts\x00', 0x800000, &(0x7f0000000300)) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') [ 235.645278] RIP: 0033:0x454e79 [ 235.648459] RSP: 002b:00007fbfd4b96c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 235.656149] RAX: ffffffffffffffda RBX: 00007fbfd4b976d4 RCX: 0000000000454e79 [ 235.663397] RDX: 0000000020000100 RSI: 0000000020000180 RDI: 0000000020000100 [ 235.670645] RBP: 000000000072bea0 R08: 0000000020000040 R09: 0000000000000000 [ 235.677894] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 235.685141] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000016 [ 235.729122] FAULT_INJECTION: forcing a failure. [ 235.729122] name failslab, interval 1, probability 0, space 0, times 0 [ 235.740477] CPU: 1 PID: 16415 Comm: syz-executor2 Not tainted 4.16.0-rc6+ #43 [ 235.747748] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 235.757091] Call Trace: [ 235.759667] dump_stack+0x194/0x24d [ 235.763299] ? arch_local_irq_restore+0x53/0x53 [ 235.767965] ? __save_stack_trace+0x7e/0xd0 [ 235.772297] should_fail+0x8c0/0xa40 [ 235.776017] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 235.781116] ? kasan_kmalloc+0xad/0xe0 [ 235.785078] ? kmem_cache_alloc_trace+0x136/0x740 [ 235.789920] ? __memcg_init_list_lru_node+0x169/0x270 [ 235.795111] ? __list_lru_init+0x544/0x750 [ 235.799369] ? sget_userns+0x691/0xe40 [ 235.803259] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 235.808016] ? do_mount+0xea4/0x2bb0 [ 235.811728] ? SyS_mount+0xab/0x120 [ 235.815361] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 235.820731] ? find_held_lock+0x35/0x1d0 [ 235.824804] ? __lock_is_held+0xb6/0x140 [ 235.828879] ? check_same_owner+0x320/0x320 [ 235.833208] ? rcu_note_context_switch+0x710/0x710 [ 235.838142] should_failslab+0xec/0x120 [ 235.842120] kmem_cache_alloc_trace+0x4b/0x740 [ 235.846703] ? __kmalloc_node+0x33/0x70 [ 235.850680] ? __kmalloc_node+0x33/0x70 [ 235.854659] ? rcu_read_lock_sched_held+0x108/0x120 [ 235.859684] __memcg_init_list_lru_node+0x169/0x270 [ 235.864705] ? list_lru_add+0x7c0/0x7c0 [ 235.867793] devpts: called with bogus options [ 235.868672] ? __kmalloc_node+0x47/0x70 [ 235.868693] __list_lru_init+0x544/0x750 [ 235.868712] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 235.868726] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 235.868738] ? __lockdep_init_map+0xe4/0x650 [ 235.868752] ? lockdep_init_map+0x9/0x10 [ 235.868765] sget_userns+0x691/0xe40 [ 235.868775] ? kernfs_sop_show_path+0x190/0x190 [ 235.868790] ? kernfs_sop_show_options+0x180/0x180 [ 235.868802] ? destroy_unused_super.part.6+0xd0/0xd0 [ 235.868821] ? check_same_owner+0x320/0x320 [ 235.868832] ? rcu_pm_notify+0xc0/0xc0 [ 235.868850] ? rcu_read_lock_sched_held+0x108/0x120 [ 235.868861] ? kmem_cache_alloc_trace+0x459/0x740 [ 235.889852] hugetlbfs: Bad mount option: "" [ 235.892229] ? lock_downgrade+0x980/0x980 [ 235.892251] kernfs_mount_ns+0x13d/0x8b0 [ 235.892265] ? kernfs_super_ns+0x70/0x70 [ 235.892284] sysfs_mount+0xc2/0x1c0 [ 235.892295] ? sysfs_kill_sb+0x40/0x40 [ 235.892308] ? alloc_pages_current+0xbe/0x1e0 [ 235.892323] ? security_sb_copy_data+0x81/0xb0 [ 235.892337] mount_fs+0x66/0x2d0 [ 235.892351] vfs_kern_mount.part.26+0xc6/0x4a0 [ 235.892362] ? may_umount+0xa0/0xa0 [ 235.892375] ? _raw_read_unlock+0x22/0x30 [ 235.892386] ? __get_fs_type+0x8a/0xc0 [ 235.892401] do_mount+0xea4/0x2bb0 [ 235.892416] ? copy_mount_string+0x40/0x40 [ 235.892427] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 236.002541] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 236.007297] ? retint_kernel+0x10/0x10 [ 236.011181] ? copy_mount_options+0x149/0x2e0 [ 236.015666] ? __sanitizer_cov_trace_pc+0x48/0x50 [ 236.020518] ? copy_mount_options+0x1f7/0x2e0 [ 236.025007] SyS_mount+0xab/0x120 [ 236.028447] ? copy_mnt_ns+0xb30/0xb30 [ 236.032319] do_syscall_64+0x281/0x940 [ 236.036194] ? vmalloc_sync_all+0x30/0x30 [ 236.040332] ? _raw_spin_unlock_irq+0x27/0x70 [ 236.044807] ? finish_task_switch+0x1c1/0x7e0 [ 236.049292] ? syscall_return_slowpath+0x550/0x550 [ 236.054217] ? syscall_return_slowpath+0x2ac/0x550 [ 236.059128] ? prepare_exit_to_usermode+0x350/0x350 [ 236.064140] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 236.069498] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 236.074337] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 236.079522] RIP: 0033:0x454e79 [ 236.082705] RSP: 002b:00007f3ee2ac1c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 236.090416] RAX: ffffffffffffffda RBX: 00007f3ee2ac26d4 RCX: 0000000000454e79 [ 236.097682] RDX: 0000000020000100 RSI: 0000000020000180 RDI: 0000000020000100 [ 236.104950] RBP: 000000000072bea0 R08: 0000000020000040 R09: 0000000000000000 [ 236.112208] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 236.119464] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000010 [ 236.298601] FAULT_INJECTION: forcing a failure. [ 236.298601] name failslab, interval 1, probability 0, space 0, times 0 [ 236.309957] CPU: 0 PID: 16439 Comm: syz-executor3 Not tainted 4.16.0-rc6+ #43 [ 236.317229] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 236.326563] Call Trace: [ 236.329132] dump_stack+0x194/0x24d [ 236.332737] ? arch_local_irq_restore+0x53/0x53 [ 236.337383] ? __save_stack_trace+0x7e/0xd0 [ 236.341688] should_fail+0x8c0/0xa40 [ 236.345377] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 236.350458] ? kasan_kmalloc+0xad/0xe0 [ 236.354322] ? kmem_cache_alloc_trace+0x136/0x740 [ 236.359140] ? __memcg_init_list_lru_node+0x169/0x270 [ 236.364304] ? __list_lru_init+0x544/0x750 [ 236.368516] ? sget_userns+0x6b1/0xe40 [ 236.372380] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 236.377109] ? do_mount+0xea4/0x2bb0 [ 236.380795] ? SyS_mount+0xab/0x120 [ 236.384407] ? do_syscall_64+0x281/0x940 [ 236.388453] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 236.393796] ? find_held_lock+0x35/0x1d0 [ 236.397835] ? __lock_is_held+0xb6/0x140 [ 236.401875] ? check_same_owner+0x320/0x320 [ 236.406175] ? rcu_note_context_switch+0x710/0x710 [ 236.411092] should_failslab+0xec/0x120 [ 236.415045] kmem_cache_alloc_trace+0x4b/0x740 [ 236.419602] ? __kmalloc_node+0x33/0x70 [ 236.423550] ? __kmalloc_node+0x33/0x70 [ 236.427497] ? rcu_read_lock_sched_held+0x108/0x120 [ 236.432489] __memcg_init_list_lru_node+0x169/0x270 [ 236.437478] ? list_lru_add+0x7c0/0x7c0 [ 236.441440] ? __kmalloc_node+0x47/0x70 [ 236.445391] __list_lru_init+0x544/0x750 [ 236.449429] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 236.455289] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 236.460282] ? lockdep_init_map+0x9/0x10 [ 236.464318] sget_userns+0x6b1/0xe40 [ 236.468012] ? kernfs_sop_show_path+0x190/0x190 [ 236.472665] ? kernfs_sop_show_options+0x180/0x180 [ 236.477571] ? destroy_unused_super.part.6+0xd0/0xd0 [ 236.482652] ? check_same_owner+0x320/0x320 [ 236.486947] ? rcu_pm_notify+0xc0/0xc0 [ 236.490816] ? rcu_read_lock_sched_held+0x108/0x120 [ 236.495820] ? kmem_cache_alloc_trace+0x459/0x740 [ 236.500645] ? lock_downgrade+0x980/0x980 [ 236.504774] kernfs_mount_ns+0x13d/0x8b0 [ 236.508809] ? kernfs_super_ns+0x70/0x70 [ 236.512850] sysfs_mount+0xc2/0x1c0 [ 236.516451] ? sysfs_kill_sb+0x40/0x40 [ 236.520314] ? alloc_pages_current+0xbe/0x1e0 [ 236.524796] ? security_sb_copy_data+0x81/0xb0 [ 236.529353] mount_fs+0x66/0x2d0 [ 236.532693] vfs_kern_mount.part.26+0xc6/0x4a0 [ 236.537262] ? may_umount+0xa0/0xa0 [ 236.540865] ? _raw_read_unlock+0x22/0x30 [ 236.544989] ? __get_fs_type+0x8a/0xc0 [ 236.548853] do_mount+0xea4/0x2bb0 [ 236.552369] ? copy_mount_string+0x40/0x40 [ 236.556576] ? rcu_pm_notify+0xc0/0xc0 [ 236.560447] ? copy_mount_options+0x5f/0x2e0 [ 236.564839] ? rcu_read_lock_sched_held+0x108/0x120 [ 236.569830] ? kmem_cache_alloc_trace+0x459/0x740 [ 236.574645] ? kasan_check_write+0x14/0x20 [ 236.578852] ? _copy_from_user+0x99/0x110 [ 236.582983] ? copy_mount_options+0x1f7/0x2e0 [ 236.587452] SyS_mount+0xab/0x120 [ 236.590880] ? copy_mnt_ns+0xb30/0xb30 [ 236.594743] do_syscall_64+0x281/0x940 [ 236.598604] ? vmalloc_sync_all+0x30/0x30 [ 236.602731] ? _raw_spin_unlock_irq+0x27/0x70 [ 236.607207] ? finish_task_switch+0x1c1/0x7e0 [ 236.611678] ? syscall_return_slowpath+0x550/0x550 [ 236.616580] ? syscall_return_slowpath+0x2ac/0x550 [ 236.621483] ? prepare_exit_to_usermode+0x350/0x350 [ 236.626474] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 236.631813] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 236.636630] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 236.641800] RIP: 0033:0x454e79 2018/03/31 08:26:19 executing program 7: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x80000000000, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000001fc0)) sendmsg(0xffffffffffffffff, &(0x7f00000024c0)={&(0x7f0000002040)=@un=@file={0x0, './file0\x00'}, 0x80, &(0x7f0000001f40)=[{&(0x7f00000020c0)="73c7575b94a72990e177f86ed4835a72a65c1a6c6831eeb0c48163a47ab63bcb605c8450cc4798ff6521c2aa722d1a7105c8a07e6c", 0x35}], 0x1, &(0x7f0000002500)=ANY=[], 0x0, 0x40000}, 0x20000000) r2 = gettid() r3 = perf_event_open(&(0x7f0000001ac0)={0x1, 0x70, 0xffffffff, 0x835, 0x9, 0xffffffffffffff5f, 0x0, 0x1000, 0x42000, 0x3, 0x8, 0x80, 0x1, 0x4, 0x100000001, 0x9, 0xff, 0x8, 0x1000, 0x7, 0x7f, 0x200, 0xb715, 0x3, 0x7fffffff, 0xf0a, 0x40, 0x8000, 0x8, 0x7, 0xffffffffffffff74, 0x4, 0x6, 0x100, 0x7, 0x335, 0x3ff, 0x58, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000001a80), 0xe}, 0x0, 0x80000000, 0x82, 0x7, 0x5, 0x3, 0x80000001}, r2, 0xd, r1, 0x8) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000200)='mqueue\x00', 0x0, &(0x7f000000a000)) r4 = getpid() r5 = bpf$PROG_LOAD(0x5, &(0x7f0000002500)={0xf, 0x7, &(0x7f0000001940)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, [@ldst={0x3, 0x0, 0x3, 0x4, 0x3, 0x2, 0xffffffffffffffff}, @exit={0x95}], {0x95}}, &(0x7f0000001980)='GPL\x00', 0xff, 0x1000, &(0x7f00000039c0)=""/4096, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000019c0)={&(0x7f0000000180)='./file0\x00', r5}, 0x10) perf_event_open(&(0x7f0000001a00)={0x0, 0x70, 0x0, 0x8, 0x0, 0x3, 0x0, 0xb8, 0x1000, 0x0, 0x3, 0x4, 0xfff, 0x4, 0x4dae, 0x40, 0x100000001, 0x6, 0x4, 0x0, 0x3, 0x753c, 0x6, 0x100, 0x1de, 0x6, 0x4, 0x1, 0x6, 0x4, 0x7, 0x3, 0x7fff, 0x80000000, 0x3, 0x8, 0x81, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x7, 0x4}, 0x801, 0x400, 0x1, 0x4, 0x1, 0x9, 0x80000001}, r4, 0x7, r1, 0xb) r6 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000004000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000001c00)='./file0\x00', &(0x7f0000001c40)='./file0\x00', &(0x7f0000001c80)='devpts\x00', 0x40, &(0x7f0000001cc0)="be623dfd58807ac0b2f86f052863a5f30adc0bce173ebcf648cefd7d64732aeb5b94e6af3ab33e53669ba6d304d067dad4b1ff3ed87f18fd170aac904e8f105e80e22881717c98752a9cd7cfb06d102877e3b36b2624d22427331755a9514b225d25999ed605ffe4188630db2e7ddcc57f6316b60c4f3845d9dfcbbde5e49af627b48d7c9bd743b536de31a9ba3010cb6714c9b90a50537be55ca12a18e6541bff5a82d293e7734ea9c90707899663bd96b3bcce5887bf0bd35963c5adc39ddcb6f2a0a02b01661242046cb54ef1aec5a486b69e006305064124867bf79f4dc11798e214b61575168b79887122e0a3461f703c077f902c0a") socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r7, &(0x7f0000001800)={&(0x7f0000000240)=@alg, 0x80, &(0x7f0000000740)=[{&(0x7f00000002c0)=""/83, 0x53}, {&(0x7f0000000340)=""/27, 0x1b}, {&(0x7f0000000380)}, {&(0x7f00000003c0)=""/40, 0x28}, {&(0x7f0000000400)=""/144, 0x90}, {&(0x7f00000004c0)=""/200, 0xc8}, {&(0x7f00000005c0)=""/60, 0x3c}, {&(0x7f0000000600)=""/105, 0x69}, {&(0x7f0000000680)=""/127, 0x7f}, {&(0x7f0000000700)=""/8, 0x8}], 0xa, &(0x7f0000000800)=""/4096, 0x1000}, 0x10000) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000002340)=0xf60) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000003900)={&(0x7f0000003400)=@can={0x0, 0x0}, 0x80, &(0x7f0000003840)=[{&(0x7f0000003480)=""/194, 0xc2}, {&(0x7f0000003580)=""/250, 0xfa}, {&(0x7f0000003680)=""/100, 0x64}, {&(0x7f0000003700)=""/14, 0xe}, {&(0x7f0000003740)=""/159, 0x9f}, {&(0x7f0000003800)=""/15, 0xf}], 0x6, &(0x7f00000038c0)=""/29, 0x1d, 0x5}, 0x3) bpf$PROG_LOAD(0x5, &(0x7f0000003940)={0x4, 0x9, &(0x7f0000001840)=ANY=[@ANYBLOB="18000000030000000000000003000000dfd00c00fcffffff0000000000000000000803000101000000810000000000000001f0fff0ffffff000000000000000095000000000017d2"], &(0x7f0000000380)='GPL\x00', 0xf172, 0x4b, &(0x7f00000018c0)=""/75, 0x41f00, 0x1, [], r8}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000000c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001f00)={0xffffffffffffffff, 0x0, 0xf6, 0x22, &(0x7f0000001dc0)="9ef9482ea02fd36d0a768986a7ebe7a627dc88937e7073e3521858dfa0d5e02f571a01cfdfa76e048e5f956ea5da60b90e02a6c3d3687ed61ec9ab5b682c02498bddef38de9ce8c753e41e78f414d16202a033b6c7752711a5f56924e7846d6dcde2f71026e1eb0319b5e60f6b1ec67fca31c3cf1691d3af91a19f56be5a10ff337a53ba13dd3d75e1555211954b92ec0082d02b7b4cdddc021cbe84e4af8f20788977e3416918843e6c92b2ebf7b8b33ecbd4c7c9a9d5036c3e3e538748a32f1a28eb77818ca1878ffdd445dcdb8a40e6221e0fc474428449dfe93c62bbc69996aa9b34488c1da4f6f7c2275305a6a4fb256c1a516d", &(0x7f0000001ec0)=""/34, 0x1f, 0x1}, 0x28) close(r6) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x3441, &(0x7f0000000080)) mount(&(0x7f00000021c0)='./file0/file0\x00', &(0x7f0000002200)='./file0/file0\x00', &(0x7f0000002240)='fuse\x00', 0x2000000, &(0x7f0000002280)="9b3923bfddc346e9fa2aeaffae6ca386d8d50ba83ab72218340d3c30c045a89ac016797652ba04f1a203cfceccb458dbfd9fd03c4a80ef9a40dc7a4f24b6619d04a58186466fd8465757d9ee053c082cdfa957e7efab6191761847cca59c017493ef5e3d22432cf0b4ebef") ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f00000023c0)=ANY=[@ANYBLOB="07000000000000000000000000000000000000000000000000000000000000000000000067eb0ecf1cfa4ffd89aa7e339417beb7d332a5c996e59875644dd1e3a690110400bc751bb0435977d90fcbb2b83c27812d818991d125e9c0f199be2bc7f01aa0a5cb9b9f99438aa0f1ae3d50201f7bb276536f567f03f062994da292b6db0000000000000000000000000000a93536f303000000000000002a27f6ae1258ebb5079c1bab4f1f6f11ee8ce2e590855a3af38e4bb871ef8400000000000000000000"]) mount(&(0x7f0000001b40)='./file0\x00', &(0x7f0000001b80)='./file0/file0\x00', &(0x7f0000002100)='vfat\x00', 0x0, &(0x7f0000002140)="98980e21ac8b46c0b7bedeee39e6bd9ae4088d6ab47dc9dc76a39e299ce3783aa33e482e450484961fd3e3c5b178fafbe54440e19512ea4298652ed129d4241d9d116d8a5c2b931d350f0c989f8a288fc9e56c") mount(&(0x7f0000df7000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='hugetlbfs\x00', 0x200, &(0x7f00000001c0)) mkdir(&(0x7f00000004c0)='./file0/file0\x00', 0x0) socketpair$inet(0x2, 0x0, 0x1f, &(0x7f0000000080)) 2018/03/31 08:26:19 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000000003042df8700"]) r1 = perf_event_open(&(0x7f0000348f88)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r2}, 0x10) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) mount(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f00000002c0)='devpts\x00', 0x800000, &(0x7f0000000300)="7b18f1563c67659c49445440cbb57f32c0f4710f0219046399f3e8a25c5d4975e2b42f404b14937bd42d9874bdd132eef77f584d5151c9a97470a0d77a0c24a85e319673350e16b039bf474ec320") socketpair(0x3, 0x800, 0x81, &(0x7f00000003c0)) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') 2018/03/31 08:26:19 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) socketpair(0x0, 0x4, 0x6, &(0x7f0000000180)) socketpair(0xf, 0x3, 0x2, &(0x7f0000000040)) 2018/03/31 08:26:19 executing program 1: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000100)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={0xffffffffffffffff, &(0x7f0000000700), &(0x7f00000009c0)=""/161}, 0x18) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f00000000c0)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)) 2018/03/31 08:26:19 executing program 2 (fault-call:9 fault-nth:17): r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000348f88)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r2}, 0x10) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') 2018/03/31 08:26:19 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x0, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) socketpair(0x9, 0x1, 0x0, &(0x7f0000000280)) r4 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000380)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000200)=0x4) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)={0xffffffffffffffff}) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f00000009c0)="3949bcf20271c219f64b9e3fbd45bfae692375440912d5a576c2d82299018de50363f2cf30a439b45c2738869283b7900c1e030013700557a768d5cc05cb9ed624684f4dfdae73a8148b29b2978222576dabbcb3556bcf35a8f66fa68ceb0b834ec5120ac749dc0cc5aab7b0197711785349b1673ff5159bc1a40df6c779950e0747a25ce77a10f68b663a87fc993224a79b583eac02a2171f076ff3", 0x1000, &(0x7f0000000200)) mount(&(0x7f0000000e80)='./file0/file0\x00', &(0x7f0000000ec0)='./file0\x00', &(0x7f0000000f00)='exofs\x00', 0x109400, &(0x7f0000000f40)="a8cd67fbd2117709a93d34f9a819b902e143ff46106b6b2b1f9882fa293e2ee958197873e22eb9ec18b09703a53de28baeface8c0121325baf9dc4071d111ae271cd0fabcae0b8cdc16dff9a8c4f592889521fc75848ec26ac89f41ecc6094bdcfbadbf282a3da0f9e39b46eb56bd2c45618781fbb590da30ac1086e108751fda226cb5f068f7a8d98b295fc1d129445a6d4d9e05d35b5e6296a124e14b6c7cc087b1d574c7100ed0fbafdfc2d95c3cba89352e9e5f47616d878be") ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) recvmsg(r5, &(0x7f00000005c0)={&(0x7f0000000400)=@nfc, 0x80, &(0x7f0000000700)=[{&(0x7f00000002c0)=""/56, 0x38}, {&(0x7f0000000340)=""/61, 0x3d}, {&(0x7f0000000c00)=""/173, 0xad}, {&(0x7f0000000580)=""/57, 0x39}, {&(0x7f0000000cc0)=""/145, 0x91}, {&(0x7f0000000d80)=""/149, 0x95}], 0x6, 0x0, 0x0, 0x7ff}, 0x2) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000e40)={&(0x7f0000000a80)='./file0/file0\x00', r0}, 0x10) 2018/03/31 08:26:19 executing program 3 (fault-call:10 fault-nth:24): r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000348f88)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r2}, 0x10) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) mount(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f00000002c0)='devpts\x00', 0x800000, &(0x7f0000000300)) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') 2018/03/31 08:26:19 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000348f88)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) socketpair(0x0, 0x4, 0x6, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f00000000c0)={r2, r1}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) socketpair(0xf, 0x3, 0x2, &(0x7f0000000040)) [ 236.644982] RSP: 002b:00007fbfd4b96c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 236.652674] RAX: ffffffffffffffda RBX: 00007fbfd4b976d4 RCX: 0000000000454e79 [ 236.660371] RDX: 0000000020000100 RSI: 0000000020000180 RDI: 0000000020000100 [ 236.667615] RBP: 000000000072bea0 R08: 0000000020000040 R09: 0000000000000000 [ 236.674860] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 236.682105] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000017 [ 236.840681] FAULT_INJECTION: forcing a failure. [ 236.840681] name failslab, interval 1, probability 0, space 0, times 0 [ 236.852007] CPU: 1 PID: 16450 Comm: syz-executor2 Not tainted 4.16.0-rc6+ #43 [ 236.859266] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 236.868613] Call Trace: [ 236.871203] dump_stack+0x194/0x24d [ 236.874830] ? arch_local_irq_restore+0x53/0x53 [ 236.879491] ? __save_stack_trace+0x7e/0xd0 [ 236.883804] should_fail+0x8c0/0xa40 [ 236.887513] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 236.892613] ? kasan_kmalloc+0xad/0xe0 [ 236.896489] ? kmem_cache_alloc_trace+0x136/0x740 [ 236.901317] ? __memcg_init_list_lru_node+0x169/0x270 [ 236.906498] ? __list_lru_init+0x544/0x750 [ 236.910720] ? sget_userns+0x691/0xe40 [ 236.914603] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 236.919347] ? do_mount+0xea4/0x2bb0 [ 236.923044] ? SyS_mount+0xab/0x120 [ 236.926665] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 236.932028] ? find_held_lock+0x35/0x1d0 [ 236.936083] ? __lock_is_held+0xb6/0x140 [ 236.940150] ? check_same_owner+0x320/0x320 [ 236.944475] ? rcu_note_context_switch+0x710/0x710 [ 236.949396] should_failslab+0xec/0x120 [ 236.953360] kmem_cache_alloc_trace+0x4b/0x740 [ 236.957925] ? __kmalloc_node+0x33/0x70 [ 236.961893] ? __kmalloc_node+0x33/0x70 [ 236.965854] ? rcu_read_lock_sched_held+0x108/0x120 [ 236.970853] __memcg_init_list_lru_node+0x169/0x270 [ 236.975856] ? list_lru_add+0x7c0/0x7c0 [ 236.979823] ? __kmalloc_node+0x47/0x70 [ 236.983790] __list_lru_init+0x544/0x750 [ 236.987833] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 236.993696] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 236.998699] ? __lockdep_init_map+0xe4/0x650 [ 237.003101] ? lockdep_init_map+0x9/0x10 [ 237.007155] sget_userns+0x691/0xe40 [ 237.010858] ? kernfs_sop_show_path+0x190/0x190 [ 237.015518] ? kernfs_sop_show_options+0x180/0x180 [ 237.020433] ? destroy_unused_super.part.6+0xd0/0xd0 [ 237.025520] ? check_same_owner+0x320/0x320 [ 237.029817] ? rcu_pm_notify+0xc0/0xc0 [ 237.033702] ? rcu_read_lock_sched_held+0x108/0x120 [ 237.038704] ? kmem_cache_alloc_trace+0x459/0x740 [ 237.043522] ? lock_downgrade+0x980/0x980 [ 237.047663] kernfs_mount_ns+0x13d/0x8b0 [ 237.051715] ? kernfs_super_ns+0x70/0x70 [ 237.055776] sysfs_mount+0xc2/0x1c0 [ 237.059398] ? sysfs_kill_sb+0x40/0x40 [ 237.063279] ? alloc_pages_current+0xbe/0x1e0 [ 237.067774] ? security_sb_copy_data+0x81/0xb0 [ 237.072348] mount_fs+0x66/0x2d0 [ 237.075713] vfs_kern_mount.part.26+0xc6/0x4a0 [ 237.080290] ? may_umount+0xa0/0xa0 [ 237.083915] ? _raw_read_unlock+0x22/0x30 [ 237.088050] ? __get_fs_type+0x8a/0xc0 [ 237.091930] do_mount+0xea4/0x2bb0 [ 237.095472] ? copy_mount_string+0x40/0x40 [ 237.099701] ? rcu_pm_notify+0xc0/0xc0 [ 237.103576] ? copy_mount_options+0x5f/0x2e0 [ 237.107965] ? rcu_read_lock_sched_held+0x108/0x120 [ 237.112981] ? kmem_cache_alloc_trace+0x459/0x740 [ 237.117804] ? kasan_check_write+0x14/0x20 [ 237.122032] ? _copy_from_user+0x99/0x110 [ 237.126165] ? copy_mount_options+0x1f7/0x2e0 [ 237.130638] SyS_mount+0xab/0x120 [ 237.134077] ? copy_mnt_ns+0xb30/0xb30 [ 237.137957] do_syscall_64+0x281/0x940 [ 237.141837] ? vmalloc_sync_all+0x30/0x30 [ 237.145976] ? _raw_spin_unlock_irq+0x27/0x70 [ 237.150453] ? finish_task_switch+0x1c1/0x7e0 [ 237.154934] ? syscall_return_slowpath+0x550/0x550 [ 237.159852] ? syscall_return_slowpath+0x2ac/0x550 [ 237.164772] ? prepare_exit_to_usermode+0x350/0x350 [ 237.169775] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 237.175131] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 237.179966] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 237.185146] RIP: 0033:0x454e79 2018/03/31 08:26:20 executing program 2 (fault-call:9 fault-nth:18): r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000348f88)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r2}, 0x10) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') [ 237.188325] RSP: 002b:00007f3ee2ac1c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 237.196028] RAX: ffffffffffffffda RBX: 00007f3ee2ac26d4 RCX: 0000000000454e79 [ 237.203285] RDX: 0000000020000100 RSI: 0000000020000180 RDI: 0000000020000100 [ 237.210538] RBP: 000000000072bea0 R08: 0000000020000040 R09: 0000000000000000 [ 237.217790] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 237.225046] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000011 2018/03/31 08:26:20 executing program 1: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x17, 0xfffffffffffffff7, 0x4, 0x4, 0x0, 0x1, 0x86d}, 0x2c) recvmsg(0xffffffffffffffff, &(0x7f000000b240)={&(0x7f0000009dc0)=@can={0x0, 0x0}, 0x80, &(0x7f000000b0c0)=[{&(0x7f0000009e40)=""/4096, 0x1000}, {&(0x7f000000ae40)=""/50, 0x32}, {&(0x7f000000ae80)=""/85, 0x55}, {&(0x7f000000af00)=""/112, 0x70}, {&(0x7f000000af80)=""/185, 0xb9}, {&(0x7f000000b040)=""/1, 0x1}, {&(0x7f000000b080)=""/52, 0x34}], 0x7, &(0x7f000000b140)=""/229, 0xe5, 0x1}, 0x2042) bpf$PROG_LOAD(0x5, &(0x7f000000b280)={0x2, 0xe, &(0x7f0000000500)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x2}, @map={0x18, 0x7, 0x1, 0x0, r1}, @alu={0x4, 0x5, 0xb, 0xb, 0xa, 0x40, 0xfffffffffffffff0}, @ldst={0x3, 0x1, 0x2, 0x2, 0xd, 0xfffffff8, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x400}, @exit={0x95}, @initr0={0x18, 0x0, 0x0, 0x0, 0x4d, 0x0, 0x0, 0x0, 0x8}], &(0x7f0000000480)='GPL\x00', 0x2, 0xad, &(0x7f0000000700)=""/173, 0x41f00, 0x1, [], r2}, 0x48) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000005c0)={r1, &(0x7f00000007c0)="07e5d40e40376386aff7502e0dcb5f48b52798428947bf452eab12b165683915dc624427b4f3a034bdf78ff57d6bc2b8fe5a59b0342617bdf2834121a002f70fb91302ee99a1534d04a1d82157b9ea13a44ba9df48ef75c01a13c21787c1ad10d24aa8b559261ad47ff5b01e2812c8df8b533399e5b9423d4541a19f870ad6a9058975e36a99525c578aae5255", &(0x7f0000000880)="80f9dc7ef4e6f045ae7db04c23e904060479177a54463d93cde0f7a010453b9070cb1da818e9cbf526a60ae4da80112e3641bc9e71d4d65b55792fa284f1630101add6aae102e0f7735b85aa00e2663e07b526f8ab332aebc2ed03dfcdfcffd21a915274e7f9274bc8", 0x1}, 0x20) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0xf, 0x4, 0x3, 0xa4, 0x10, 0xffffffffffffffff, 0x5}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000600)='./file0/file2\x00', r3}, 0xffffffffffffff28) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x8000000000000001, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000100)={&(0x7f00000000c0)='./file0/file1\x00', r4}, 0x2a2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000300)='./file0/file1\x00', &(0x7f0000000340)='./file0/file2\x00', &(0x7f0000000380)='fuse\x00', 0x40000, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f00000002c0)=ANY=[@ANYBLOB="0000000000e83dc94e05981ac384124622537b4266187a5c57de0267375604ebe4a67621c4bb64bdbed825a7880e10842a3793"]) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={0xffffffffffffffff, &(0x7f0000000640)="7199b0ffd2eb631a55d305308816fb6f9516384ed55e978a1d9dc46f91609f1198527df4913c94ca9685eb9c63fea893fc9d51ae3ab574e2549cea1e4f45f700f956c2ffba83b32fc0583a2f7353d582b66b873d4f69a13140ec6c6d9a0101000000000000db8dae0c95e5565d61286b26552fc228da6095a364be85225431878f9433bd19734521604cda5a26aa186ae038eb", &(0x7f00000009c0)=""/161}, 0x18) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000000ac0)='./file0/file2\x00', &(0x7f0000000180)='iso9660\x00', 0x100012, &(0x7f0000000b00)) [ 237.310640] devpts: called with bogus options 2018/03/31 08:26:20 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) socketpair(0x0, 0x4, 0x6, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000000)=0x3) socketpair(0xf, 0x3, 0x2, &(0x7f0000000040)) 2018/03/31 08:26:20 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000000003042df8700"]) r1 = perf_event_open(&(0x7f0000348f88)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r2}, 0x10) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) mount(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f00000002c0)='devpts\x00', 0x800000, &(0x7f0000000300)="7b18f1563c67659c49445440cbb57f32c0f4710f0219046399f3e8a25c5d4975e2b42f404b14937bd42d9874bdd132eef77f584d5151c9a97470a0d77a0c24a85e319673350e16b039bf474ec320") socketpair(0x3, 0x800, 0x81, &(0x7f00000003c0)) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') 2018/03/31 08:26:20 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x0, 0x1, 0x11, 0xffffffffffffffff, 0x2}, 0xffffffffffffff73) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)={0xffffffffffffffff}) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r5 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000200)={r4, &(0x7f0000000280)="e66ad9e5cf37f8219bf05eaa69ab3fbc3e5e5e0066b69ae67612da727615ea51e16d3faf40e725422d45fe158827380efaa6b9773d576197c94737ce07379d2f2bce0e2ce5be07ad575d0edbeaa6db5bd4fc468feda5c295e54a4257a52ace956e204d21883945"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f00000009c0)="3949bcf20271c219f64b9e3fbd45bfae692375440912d5a576c2d82299018de50363f2cf30a439b45c2738869283b7900c1e030013700557a768d5cc05cb9ed624684f4dfdae73a8148b29b2978222576dabbcb3556bcf35a8f66fa68ceb0b834ec5120ac749dc0cc5aab7b0197711785349b1673ff5159bc1a40df6c779950e0747a25ce77a10f68b663a87fc993224a79b583eac02a2171f076ff3", 0x1000, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) [ 237.340518] hugetlbfs: Bad mount option: "" [ 237.501814] FAULT_INJECTION: forcing a failure. [ 237.501814] name failslab, interval 1, probability 0, space 0, times 0 [ 237.513139] CPU: 0 PID: 16475 Comm: syz-executor3 Not tainted 4.16.0-rc6+ #43 [ 237.520410] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 237.529752] Call Trace: [ 237.532317] dump_stack+0x194/0x24d [ 237.535922] ? arch_local_irq_restore+0x53/0x53 [ 237.540571] ? __save_stack_trace+0x7e/0xd0 [ 237.544869] should_fail+0x8c0/0xa40 [ 237.548560] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 237.553638] ? kasan_kmalloc+0xad/0xe0 [ 237.557498] ? kmem_cache_alloc_trace+0x136/0x740 [ 237.562313] ? __memcg_init_list_lru_node+0x169/0x270 [ 237.567475] ? __list_lru_init+0x544/0x750 [ 237.571682] ? sget_userns+0x6b1/0xe40 [ 237.575544] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 237.580271] ? do_mount+0xea4/0x2bb0 [ 237.583958] ? SyS_mount+0xab/0x120 [ 237.587558] ? do_syscall_64+0x281/0x940 [ 237.591594] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 237.596939] ? find_held_lock+0x35/0x1d0 [ 237.600987] ? __lock_is_held+0xb6/0x140 [ 237.605042] ? check_same_owner+0x320/0x320 [ 237.609343] ? rcu_note_context_switch+0x710/0x710 [ 237.614427] should_failslab+0xec/0x120 [ 237.618380] kmem_cache_alloc_trace+0x4b/0x740 [ 237.622948] ? __kmalloc_node+0x33/0x70 [ 237.626897] ? __kmalloc_node+0x33/0x70 [ 237.630939] ? rcu_read_lock_sched_held+0x108/0x120 [ 237.635945] __memcg_init_list_lru_node+0x169/0x270 [ 237.640943] ? list_lru_add+0x7c0/0x7c0 [ 237.644891] ? __kmalloc_node+0x47/0x70 [ 237.648841] __list_lru_init+0x544/0x750 [ 237.652879] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 237.658737] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 237.663729] ? lockdep_init_map+0x9/0x10 [ 237.667764] sget_userns+0x6b1/0xe40 [ 237.671451] ? kernfs_sop_show_path+0x190/0x190 [ 237.676096] ? kernfs_sop_show_options+0x180/0x180 [ 237.681000] ? destroy_unused_super.part.6+0xd0/0xd0 [ 237.686088] ? check_same_owner+0x320/0x320 [ 237.690382] ? rcu_pm_notify+0xc0/0xc0 [ 237.694256] ? rcu_read_lock_sched_held+0x108/0x120 [ 237.699252] ? kmem_cache_alloc_trace+0x459/0x740 [ 237.704074] ? lock_downgrade+0x980/0x980 [ 237.708200] kernfs_mount_ns+0x13d/0x8b0 [ 237.712235] ? kernfs_super_ns+0x70/0x70 [ 237.716271] sysfs_mount+0xc2/0x1c0 [ 237.719872] ? sysfs_kill_sb+0x40/0x40 [ 237.723735] ? alloc_pages_current+0xbe/0x1e0 [ 237.728206] ? security_sb_copy_data+0x81/0xb0 [ 237.732761] mount_fs+0x66/0x2d0 [ 237.736103] vfs_kern_mount.part.26+0xc6/0x4a0 [ 237.740657] ? may_umount+0xa0/0xa0 [ 237.744256] ? _raw_read_unlock+0x22/0x30 [ 237.748381] ? __get_fs_type+0x8a/0xc0 [ 237.752242] do_mount+0xea4/0x2bb0 [ 237.755757] ? copy_mount_string+0x40/0x40 [ 237.759966] ? rcu_pm_notify+0xc0/0xc0 [ 237.763828] ? copy_mount_options+0x5f/0x2e0 [ 237.768209] ? rcu_read_lock_sched_held+0x108/0x120 [ 237.773198] ? kmem_cache_alloc_trace+0x459/0x740 [ 237.778018] ? kasan_check_write+0x14/0x20 [ 237.782232] ? _copy_from_user+0x99/0x110 [ 237.786355] ? copy_mount_options+0x1f7/0x2e0 [ 237.790827] SyS_mount+0xab/0x120 [ 237.794256] ? copy_mnt_ns+0xb30/0xb30 [ 237.798121] do_syscall_64+0x281/0x940 [ 237.801984] ? vmalloc_sync_all+0x30/0x30 [ 237.806108] ? _raw_spin_unlock_irq+0x27/0x70 [ 237.810578] ? finish_task_switch+0x1c1/0x7e0 [ 237.815048] ? syscall_return_slowpath+0x550/0x550 [ 237.819953] ? syscall_return_slowpath+0x2ac/0x550 [ 237.824857] ? prepare_exit_to_usermode+0x350/0x350 [ 237.829848] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 237.835198] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 237.840028] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 237.845194] RIP: 0033:0x454e79 [ 237.848358] RSP: 002b:00007fbfd4b96c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 237.856042] RAX: ffffffffffffffda RBX: 00007fbfd4b976d4 RCX: 0000000000454e79 [ 237.863286] RDX: 0000000020000100 RSI: 0000000020000180 RDI: 0000000020000100 [ 237.870537] RBP: 000000000072bea0 R08: 0000000020000040 R09: 0000000000000000 [ 237.877778] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 237.885024] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000018 [ 238.009346] FAULT_INJECTION: forcing a failure. [ 238.009346] name failslab, interval 1, probability 0, space 0, times 0 [ 238.020646] CPU: 1 PID: 16480 Comm: syz-executor2 Not tainted 4.16.0-rc6+ #43 [ 238.027915] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 238.037252] Call Trace: [ 238.039827] dump_stack+0x194/0x24d [ 238.043442] ? arch_local_irq_restore+0x53/0x53 [ 238.048097] ? __save_stack_trace+0x7e/0xd0 [ 238.052412] should_fail+0x8c0/0xa40 [ 238.056110] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 238.061324] ? kasan_kmalloc+0xad/0xe0 [ 238.065197] ? kmem_cache_alloc_trace+0x136/0x740 [ 238.070035] ? __memcg_init_list_lru_node+0x169/0x270 [ 238.075204] ? __list_lru_init+0x544/0x750 [ 238.079425] ? sget_userns+0x691/0xe40 [ 238.083298] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 238.088039] ? do_mount+0xea4/0x2bb0 [ 238.091738] ? SyS_mount+0xab/0x120 [ 238.095344] ? do_syscall_64+0x281/0x940 [ 238.099389] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 238.104761] ? find_held_lock+0x35/0x1d0 [ 238.108809] ? __lock_is_held+0xb6/0x140 [ 238.112857] ? check_same_owner+0x320/0x320 [ 238.117167] ? rcu_note_context_switch+0x710/0x710 [ 238.122080] should_failslab+0xec/0x120 [ 238.126045] kmem_cache_alloc_trace+0x4b/0x740 [ 238.130612] ? __kmalloc_node+0x33/0x70 [ 238.134576] ? __kmalloc_node+0x33/0x70 [ 238.138539] ? rcu_read_lock_sched_held+0x108/0x120 [ 238.143538] __memcg_init_list_lru_node+0x169/0x270 [ 238.148534] ? list_lru_add+0x7c0/0x7c0 [ 238.152489] ? __kmalloc_node+0x47/0x70 [ 238.156530] __list_lru_init+0x544/0x750 [ 238.160570] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 238.166436] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 238.171440] ? __lockdep_init_map+0xe4/0x650 [ 238.175841] ? lockdep_init_map+0x9/0x10 [ 238.179882] sget_userns+0x691/0xe40 [ 238.183756] ? kernfs_sop_show_path+0x190/0x190 [ 238.188406] ? kernfs_sop_show_options+0x180/0x180 [ 238.193313] ? destroy_unused_super.part.6+0xd0/0xd0 [ 238.198393] ? check_same_owner+0x320/0x320 [ 238.202706] ? rcu_pm_notify+0xc0/0xc0 [ 238.206583] ? rcu_read_lock_sched_held+0x108/0x120 [ 238.211583] ? kmem_cache_alloc_trace+0x459/0x740 [ 238.216412] ? lock_downgrade+0x980/0x980 [ 238.220562] kernfs_mount_ns+0x13d/0x8b0 [ 238.224611] ? kernfs_super_ns+0x70/0x70 [ 238.228652] sysfs_mount+0xc2/0x1c0 [ 238.232254] ? sysfs_kill_sb+0x40/0x40 [ 238.236124] ? alloc_pages_current+0xbe/0x1e0 [ 238.240596] ? security_sb_copy_data+0x81/0xb0 [ 238.245158] mount_fs+0x66/0x2d0 [ 238.248502] vfs_kern_mount.part.26+0xc6/0x4a0 [ 238.253062] ? may_umount+0xa0/0xa0 [ 238.256664] ? _raw_read_unlock+0x22/0x30 [ 238.260791] ? __get_fs_type+0x8a/0xc0 [ 238.264657] do_mount+0xea4/0x2bb0 [ 238.268177] ? copy_mount_string+0x40/0x40 [ 238.272390] ? rcu_pm_notify+0xc0/0xc0 [ 238.276259] ? copy_mount_options+0x5f/0x2e0 [ 238.280641] ? rcu_read_lock_sched_held+0x108/0x120 [ 238.285633] ? kmem_cache_alloc_trace+0x459/0x740 [ 238.290452] ? kasan_check_write+0x14/0x20 [ 238.294674] ? copy_mount_options+0x1f7/0x2e0 [ 238.299146] SyS_mount+0xab/0x120 [ 238.302574] ? copy_mnt_ns+0xb30/0xb30 [ 238.306444] do_syscall_64+0x281/0x940 [ 238.310314] ? vmalloc_sync_all+0x30/0x30 [ 238.314441] ? _raw_spin_unlock_irq+0x27/0x70 [ 238.318915] ? finish_task_switch+0x1c1/0x7e0 [ 238.323387] ? syscall_return_slowpath+0x550/0x550 [ 238.328294] ? syscall_return_slowpath+0x2ac/0x550 [ 238.333199] ? prepare_exit_to_usermode+0x350/0x350 [ 238.338197] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 238.343538] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 238.348364] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 238.353530] RIP: 0033:0x454e79 [ 238.356693] RSP: 002b:00007f3ee2ac1c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 238.364376] RAX: ffffffffffffffda RBX: 00007f3ee2ac26d4 RCX: 0000000000454e79 [ 238.371626] RDX: 0000000020000100 RSI: 0000000020000180 RDI: 0000000020000100 [ 238.378873] RBP: 000000000072bea0 R08: 0000000020000040 R09: 0000000000000000 [ 238.386121] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 238.393373] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000012 2018/03/31 08:26:21 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x10004, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000001380)={0x7, 0x5, &(0x7f0000000300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3ff}, [@ldst={0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0xfffffffffffffff0}], {0x95}}, &(0x7f0000000340)='GPL\x00', 0xfffffffffffffff8, 0x1000, &(0x7f0000000380)=""/4096, 0x41f00, 0xb7fe64167b6a38d5}, 0x48) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000001400)={0x0, r0, 0x4, 0x3}, 0x14) socketpair(0x0, 0x4, 0x6, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='fusectl\x00', 0x20, &(0x7f0000000240)="2ffaba4778610d9c20e695432388597629d6e49e44ccaa7d43870ce3d07b04a2a6fa8c83e64446413846f2d697d3bd6b3f6add5217d4cde4502607690fc4a2dfe30411a0b647ae99a60506850b670a557d89a13842b02283e35fa58ff5224d16efa46c251eb47ad2a28df682b485acdb87ab8321d5543c712c4268fd0b21cdca5a8c75fcd52816d90a6258df85") ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) socketpair(0xf, 0x3, 0x2, &(0x7f0000000040)) 2018/03/31 08:26:21 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x0, 0x1, 0x11}, 0x2c) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='./file0/file0\x00', &(0x7f0000000380)='minix\x00', 0x20000, &(0x7f0000000400)="0cc86a0f82cdfd2ab239ddc536ee4750d7fceb3a3c50ae8b56cdc9678d31f8d019cae9d1a960b50d74d7636abceefb3f1476f3889acf2b027dddb7e05f94fa790313bec2d2ebbaff6f3ba075aefe2c900af59c6000c4") mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r5 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r4, 0x2405, r5) bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xc, 0x100, 0x0, 0x20000ea, 0x10, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f00000009c0)="3949bcf20271c219f64b9e3fbd45bfae692375440912d5a576c2d82299018de50363f2cf30a439b45c2738869283b7900c1e030013700557a768d5cc05cb9ed624684f4dfdae73a8148b29b2978222576dabbcb3556bcf35a8f66fa68ceb0b834ec5120ac749dc0cc5aab7b0197711785349b1673ff5159bc1a40df6c779950e0747a25ce77a10f68b663a87fc993224a79b583eac02a2171f076ff3", 0x1000, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x2400, 0x80) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000280)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) 2018/03/31 08:26:21 executing program 7: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x80000000000, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000001fc0)) sendmsg(0xffffffffffffffff, &(0x7f00000024c0)={&(0x7f0000002040)=@un=@file={0x0, './file0\x00'}, 0x80, &(0x7f0000001f40)=[{&(0x7f00000020c0)="73c7575b94a72990e177f86ed4835a72a65c1a6c6831eeb0c48163a47ab63bcb605c8450cc4798ff6521c2aa722d1a7105c8a07e6c", 0x35}], 0x1, &(0x7f0000002500)=ANY=[], 0x0, 0x40000}, 0x20000000) r2 = gettid() r3 = perf_event_open(&(0x7f0000001ac0)={0x1, 0x70, 0xffffffff, 0x835, 0x9, 0xffffffffffffff5f, 0x0, 0x1000, 0x42000, 0x3, 0x8, 0x80, 0x1, 0x4, 0x100000001, 0x9, 0xff, 0x8, 0x1000, 0x7, 0x7f, 0x200, 0xb715, 0x3, 0x7fffffff, 0xf0a, 0x40, 0x8000, 0x8, 0x7, 0xffffffffffffff74, 0x4, 0x6, 0x100, 0x7, 0x335, 0x3ff, 0x58, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000001a80), 0xe}, 0x0, 0x80000000, 0x82, 0x7, 0x5, 0x3, 0x80000001}, r2, 0xd, r1, 0x8) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000200)='mqueue\x00', 0x0, &(0x7f000000a000)) r4 = getpid() r5 = bpf$PROG_LOAD(0x5, &(0x7f0000002500)={0xf, 0x7, &(0x7f0000001940)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, [@ldst={0x3, 0x3, 0x0, 0x4, 0x3, 0x2, 0xffffffffffffffff}, @exit={0x95}], {0x95}}, &(0x7f0000001980)='GPL\x00', 0xff, 0x1000, &(0x7f00000039c0)=""/4096, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000019c0)={&(0x7f0000000180)='./file0\x00', r5}, 0x10) perf_event_open(&(0x7f0000001a00)={0x0, 0x70, 0x0, 0x8, 0x0, 0x3, 0x0, 0xb8, 0x1000, 0x0, 0x3, 0x4, 0xfff, 0x4, 0x4dae, 0x40, 0x100000001, 0x6, 0x4, 0x0, 0x3, 0x753c, 0x6, 0x100, 0x1de, 0x6, 0x4, 0x1, 0x6, 0x4, 0x7, 0x3, 0x7fff, 0x80000000, 0x3, 0x8, 0x81, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x7, 0x4}, 0x801, 0x400, 0x1, 0x4, 0x1, 0x9, 0x80000001}, r4, 0x7, r1, 0xb) r6 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000004000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000001c00)='./file0\x00', &(0x7f0000001c40)='./file0\x00', &(0x7f0000001c80)='devpts\x00', 0x40, &(0x7f0000001cc0)="be623dfd58807ac0b2f86f052863a5f30adc0bce173ebcf648cefd7d64732aeb5b94e6af3ab33e53669ba6d304d067dad4b1ff3ed87f18fd170aac904e8f105e80e22881717c98752a9cd7cfb06d102877e3b36b2624d22427331755a9514b225d25999ed605ffe4188630db2e7ddcc57f6316b60c4f3845d9dfcbbde5e49af627b48d7c9bd743b536de31a9ba3010cb6714c9b90a50537be55ca12a18e6541bff5a82d293e7734ea9c90707899663bd96b3bcce5887bf0bd35963c5adc39ddcb6f2a0a02b01661242046cb54ef1aec5a486b69e006305064124867bf79f4dc11798e214b61575168b79887122e0a3461f703c077f902c0a") socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r7, &(0x7f0000001800)={&(0x7f0000000240)=@alg, 0x80, &(0x7f0000000740)=[{&(0x7f00000002c0)=""/83, 0x53}, {&(0x7f0000000340)=""/27, 0x1b}, {&(0x7f0000000380)}, {&(0x7f00000003c0)=""/40, 0x28}, {&(0x7f0000000400)=""/144, 0x90}, {&(0x7f00000004c0)=""/200, 0xc8}, {&(0x7f00000005c0)=""/60, 0x3c}, {&(0x7f0000000600)=""/105, 0x69}, {&(0x7f0000000680)=""/127, 0x7f}, {&(0x7f0000000700)=""/8, 0x8}], 0xa, &(0x7f0000000800)=""/4096, 0x1000}, 0x10000) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000002340)=0xf60) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000003900)={&(0x7f0000003400)=@can={0x0, 0x0}, 0x80, &(0x7f0000003840)=[{&(0x7f0000003480)=""/194, 0xc2}, {&(0x7f0000003580)=""/250, 0xfa}, {&(0x7f0000003680)=""/100, 0x64}, {&(0x7f0000003700)=""/14, 0xe}, {&(0x7f0000003740)=""/159, 0x9f}, {&(0x7f0000003800)=""/15, 0xf}], 0x6, &(0x7f00000038c0)=""/29, 0x1d, 0x5}, 0x3) bpf$PROG_LOAD(0x5, &(0x7f0000003940)={0x4, 0x9, &(0x7f0000001840)=ANY=[@ANYBLOB="18000000030000000000000003000000dfd00c00fcffffff0000000000000000000803000101000000810000000000000001f0fff0ffffff000000000000000095000000000017d2"], &(0x7f0000000380)='GPL\x00', 0xf172, 0x4b, &(0x7f00000018c0)=""/75, 0x41f00, 0x1, [], r8}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000000c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001f00)={0xffffffffffffffff, 0x0, 0xf6, 0x22, &(0x7f0000001dc0)="9ef9482ea02fd36d0a768986a7ebe7a627dc88937e7073e3521858dfa0d5e02f571a01cfdfa76e048e5f956ea5da60b90e02a6c3d3687ed61ec9ab5b682c02498bddef38de9ce8c753e41e78f414d16202a033b6c7752711a5f56924e7846d6dcde2f71026e1eb0319b5e60f6b1ec67fca31c3cf1691d3af91a19f56be5a10ff337a53ba13dd3d75e1555211954b92ec0082d02b7b4cdddc021cbe84e4af8f20788977e3416918843e6c92b2ebf7b8b33ecbd4c7c9a9d5036c3e3e538748a32f1a28eb77818ca1878ffdd445dcdb8a40e6221e0fc474428449dfe93c62bbc69996aa9b34488c1da4f6f7c2275305a6a4fb256c1a516d", &(0x7f0000001ec0)=""/34, 0x1f, 0x1}, 0x28) close(r6) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x3441, &(0x7f0000000080)) mount(&(0x7f00000021c0)='./file0/file0\x00', &(0x7f0000002200)='./file0/file0\x00', &(0x7f0000002240)='fuse\x00', 0x2000000, &(0x7f0000002280)="9b3923bfddc346e9fa2aeaffae6ca386d8d50ba83ab72218340d3c30c045a89ac016797652ba04f1a203cfceccb458dbfd9fd03c4a80ef9a40dc7a4f24b6619d04a58186466fd8465757d9ee053c082cdfa957e7efab6191761847cca59c017493ef5e3d22432cf0b4ebef") ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f00000023c0)=ANY=[@ANYBLOB="07000000000000000000000000000000000000000000000000000000000000000000000067eb0ecf1cfa4ffd89aa7e339417beb7d332a5c996e59875644dd1e3a690110400bc751bb0435977d90fcbb2b83c27812d818991d125e9c0f199be2bc7f01aa0a5cb9b9f99438aa0f1ae3d50201f7bb276536f567f03f062994da292b6db0000000000000000000000000000a93536f303000000000000002a27f6ae1258ebb5079c1bab4f1f6f11ee8ce2e590855a3af38e4bb871ef8400000000000000000000"]) mount(&(0x7f0000001b40)='./file0\x00', &(0x7f0000001b80)='./file0/file0\x00', &(0x7f0000002100)='vfat\x00', 0x0, &(0x7f0000002140)="98980e21ac8b46c0b7bedeee39e6bd9ae4088d6ab47dc9dc76a39e299ce3783aa33e482e450484961fd3e3c5b178fafbe54440e19512ea4298652ed129d4241d9d116d8a5c2b931d350f0c989f8a288fc9e56c") mount(&(0x7f0000df7000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='hugetlbfs\x00', 0x200, &(0x7f00000001c0)) mkdir(&(0x7f00000004c0)='./file0/file0\x00', 0x0) socketpair$inet(0x2, 0x0, 0x1f, &(0x7f0000000080)) 2018/03/31 08:26:21 executing program 3 (fault-call:10 fault-nth:25): r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000348f88)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r2}, 0x10) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) mount(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f00000002c0)='devpts\x00', 0x800000, &(0x7f0000000300)) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') 2018/03/31 08:26:21 executing program 2 (fault-call:9 fault-nth:19): r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000348f88)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r2}, 0x10) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') 2018/03/31 08:26:21 executing program 1: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000880)='\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) sendmsg(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000700)=[{&(0x7f00000002c0)="726c9f49ffd1a8ee1cc7427d7955f6488edbfa5d902e4d2cb65cd2ca2179cf452ef6929600cd7eb3fb5b3ba57b8ba99a85f8d1bae5a9c683b3b63325c790d9fba2e46015b7d3e86e1f0f737e357ef7efee9e5020fd258e86b8f758800be793bcafe53843c6a9", 0x66}, {&(0x7f0000000500)="d72d171699672c744de3381180d88be355096e71c75376147f8ffeac2ec2fb31543a78192e812cb75b406afb958679e5b1069eae034d61fcc4d81c7748e0e03aa5b4255934477559527e3b678eb89977f1f95f570253c34191d8e380559f1d99c37265146c4d85c4400ce66a43658a3493ae64dcfd387d6d44752679cd77351ad4ae2c80a4f16ab09f692f1388949b71a82525f28c9aa98a44205f054a3e44d0801794dc2c488122b1cad5d04375bc228885ea7421ce0166f2475ffb51c417b3117a44eeb854520307b8079c72f081ba7628147663088c75decac58847ec8f9b", 0xe0}, {&(0x7f0000000600)="ed96ab77872a2ab0afc05d6cfb81b0a85632c3632a0aa154068935da87d3ad6debf8b5c9df23b12d51fafcc504e5900c532fd48beb6e95ede52f2039ec8dd1eeabc1bfcbf54f35d649e9bfd30da4109c29edd94894efcfe202170b67d1219b0b2cb9828342121aedebe456d43313d38b6d6896798816f9da89111194410e5a5c92b1b45ade7194e7c04d004f7c9c8ea963abc3e9fed2e82911ec6ebc7c0488d9ecf8a9de2f1e7d89b1b6e99894dd32bd7a21a74afc4f8b207a5d49c95139e27dfb814705ca4c0f36846006f815efb182f78b5088cd2c22943114d7f99bb5cdbcafd5370ed2e133ee473215e3178b9b0aa190b6", 0xf3}, {&(0x7f0000000340)="c057ef312810bad1dc099892bc15e0ae6fbfa56ff68a3f29a1e3a8d4629ce0def996caf9af91065b1749f226d088b9acb8e59bb197b882063e2f80380d72840e0d1944c351c87a79ff40cbb2cfba7d26716667a8cad9", 0x56}, {&(0x7f0000000400)="9f440414735298c7983396ec01bda8412db3841b5e6cd138838d1f03003c9aed8a19f48c38a11640f2f85231b28ee2b40b40eaa207cfc2edd5fa32eb0aea9d779618c8cd5a052b6e5d019393ef0ffc80d0d606c3912defa159135224a673e7a22e0a2788ef450bdaf4f69a00f996cad33a915817ae691da44ecdc6880916e240433242d5fed40a475b24f2b6d9002491d861179764d9d64c0e3908ff7479622e2f633298ad0eb57c16565a6715a94afdec3ac88b468121c1f5298603ba", 0xbd}, {&(0x7f00000007c0)="2b79022e8b1e57be6af2901eabb934cf0fa9b9788401aa1e028fc46c9a3d244e28e39c3467479f891f9e004596035bcf3618b8746ef061c58815c521e136424934ef28544215d747f3043b2bf0f0b769825093329bbfead9c2f148e256496eb829f2d60ab6dec296dcd9d794a938dac46d9bf804ec42018039f11f494d2d7792c7441794197692bb3083c3df620b44d62a4985c48a8c26fb7aa4344a7c52c31da0916dfff49dd9c1df703c", 0xab}], 0x6, 0x0, 0x0, 0x1}, 0x4000000) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={0xffffffffffffffff, &(0x7f0000000700), &(0x7f00000009c0)=""/161}, 0x18) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f00000000c0)='./file0/file0\x00', r1}, 0x10) 2018/03/31 08:26:21 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000000003042df8700"]) r1 = perf_event_open(&(0x7f0000348f88)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00'}, 0x10) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) mount(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f00000002c0)='devpts\x00', 0x800000, &(0x7f0000000300)="7b18f1563c67659c49445440cbb57f32c0f4710f0219046399f3e8a25c5d4975e2b42f404b14937bd42d9874bdd132eef77f584d5151c9a97470a0d77a0c24a85e319673350e16b039bf474ec320") socketpair(0x3, 0x800, 0x81, &(0x7f00000003c0)) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') 2018/03/31 08:26:21 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) socketpair(0x0, 0x4000000004, 0x6, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000000)='./file0\x00'}, 0x10) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={r1, 0x50, &(0x7f0000000140)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)=r2, 0x4) socketpair(0xf, 0x3, 0x2, &(0x7f0000000040)) 2018/03/31 08:26:21 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) socketpair(0x0, 0x4, 0x6, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) socketpair(0xf, 0x3, 0x2, &(0x7f0000000040)) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000080)=0x5, 0x4) [ 238.729290] devpts: called with bogus options [ 238.746243] hugetlbfs: Bad mount option: "" [ 238.808592] FAULT_INJECTION: forcing a failure. [ 238.808592] name failslab, interval 1, probability 0, space 0, times 0 [ 238.819924] CPU: 0 PID: 16510 Comm: syz-executor3 Not tainted 4.16.0-rc6+ #43 [ 238.827190] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 238.836539] Call Trace: [ 238.839117] dump_stack+0x194/0x24d [ 238.842725] ? arch_local_irq_restore+0x53/0x53 [ 238.847392] should_fail+0x8c0/0xa40 [ 238.851097] ? is_bpf_text_address+0xa4/0x120 [ 238.855573] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 238.860669] ? __kernel_text_address+0xd/0x40 [ 238.865163] ? unwind_get_return_address+0x61/0xa0 [ 238.870089] ? find_held_lock+0x35/0x1d0 [ 238.874143] ? __lock_is_held+0xb6/0x140 [ 238.878200] ? check_same_owner+0x320/0x320 [ 238.882501] ? rcu_note_context_switch+0x710/0x710 [ 238.887412] should_failslab+0xec/0x120 [ 238.891367] kmem_cache_alloc_trace+0x4b/0x740 [ 238.895929] ? __kmalloc_node+0x33/0x70 [ 238.899909] ? __kmalloc_node+0x33/0x70 [ 238.903868] ? rcu_read_lock_sched_held+0x108/0x120 [ 238.908871] __memcg_init_list_lru_node+0x169/0x270 [ 238.913870] ? list_lru_add+0x7c0/0x7c0 [ 238.917828] ? __kmalloc_node+0x47/0x70 [ 238.921796] __list_lru_init+0x544/0x750 [ 238.925848] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 238.931714] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 238.936716] ? lockdep_init_map+0x9/0x10 [ 238.940760] sget_userns+0x6b1/0xe40 [ 238.944460] ? kernfs_sop_show_path+0x190/0x190 [ 238.949111] ? kernfs_sop_show_options+0x180/0x180 [ 238.954022] ? destroy_unused_super.part.6+0xd0/0xd0 [ 238.959110] ? check_same_owner+0x320/0x320 [ 238.963407] ? rcu_pm_notify+0xc0/0xc0 [ 238.967292] ? rcu_read_lock_sched_held+0x108/0x120 [ 238.972291] ? kmem_cache_alloc_trace+0x459/0x740 [ 238.977111] ? lock_downgrade+0x980/0x980 [ 238.981241] kernfs_mount_ns+0x13d/0x8b0 [ 238.985287] ? kernfs_super_ns+0x70/0x70 [ 238.989342] sysfs_mount+0xc2/0x1c0 [ 238.992959] ? sysfs_kill_sb+0x40/0x40 [ 238.996823] ? alloc_pages_current+0xbe/0x1e0 [ 239.001298] ? security_sb_copy_data+0x81/0xb0 [ 239.005857] mount_fs+0x66/0x2d0 [ 239.009207] vfs_kern_mount.part.26+0xc6/0x4a0 [ 239.013770] ? may_umount+0xa0/0xa0 [ 239.017377] ? _raw_read_unlock+0x22/0x30 [ 239.021509] ? __get_fs_type+0x8a/0xc0 [ 239.025385] do_mount+0xea4/0x2bb0 [ 239.028905] ? copy_mount_string+0x40/0x40 [ 239.033118] ? rcu_pm_notify+0xc0/0xc0 [ 239.036996] ? copy_mount_options+0x5f/0x2e0 [ 239.041395] ? rcu_read_lock_sched_held+0x108/0x120 [ 239.046395] ? kmem_cache_alloc_trace+0x459/0x740 [ 239.051214] ? kasan_check_write+0x14/0x20 [ 239.055428] ? copy_mount_options+0x1f7/0x2e0 [ 239.059903] SyS_mount+0xab/0x120 [ 239.063331] ? copy_mnt_ns+0xb30/0xb30 [ 239.067195] do_syscall_64+0x281/0x940 [ 239.071069] ? vmalloc_sync_all+0x30/0x30 [ 239.075200] ? _raw_spin_unlock_irq+0x27/0x70 [ 239.079675] ? finish_task_switch+0x1c1/0x7e0 [ 239.084147] ? syscall_return_slowpath+0x550/0x550 [ 239.089062] ? syscall_return_slowpath+0x2ac/0x550 [ 239.093976] ? prepare_exit_to_usermode+0x350/0x350 [ 239.098984] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 239.104342] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 239.109171] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 239.114338] RIP: 0033:0x454e79 [ 239.117519] RSP: 002b:00007fbfd4b96c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 239.125206] RAX: ffffffffffffffda RBX: 00007fbfd4b976d4 RCX: 0000000000454e79 [ 239.132459] RDX: 0000000020000100 RSI: 0000000020000180 RDI: 0000000020000100 [ 239.139714] RBP: 000000000072bea0 R08: 0000000020000040 R09: 0000000000000000 [ 239.146971] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 2018/03/31 08:26:21 executing program 3 (fault-call:10 fault-nth:26): r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000348f88)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r2}, 0x10) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) mount(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f00000002c0)='devpts\x00', 0x800000, &(0x7f0000000300)) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') [ 239.154219] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000019 2018/03/31 08:26:22 executing program 7: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x80000000000, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000001fc0)) sendmsg(0xffffffffffffffff, &(0x7f00000024c0)={&(0x7f0000002040)=@un=@file={0x0, './file0\x00'}, 0x80, &(0x7f0000001f40)=[{&(0x7f00000020c0)="73c7575b94a72990e177f86ed4835a72a65c1a6c6831eeb0c48163a47ab63bcb605c8450cc4798ff6521c2aa722d1a7105c8a07e6c", 0x35}], 0x1, &(0x7f0000002500)=ANY=[], 0x0, 0x40000}, 0x20000000) r2 = gettid() r3 = perf_event_open(&(0x7f0000001ac0)={0x1, 0x70, 0xffffffff, 0x835, 0x9, 0xffffffffffffff5f, 0x0, 0x1000, 0x42000, 0x3, 0x8, 0x80, 0x1, 0x4, 0x100000001, 0x9, 0xff, 0x8, 0x1000, 0x7, 0x7f, 0x200, 0xb715, 0x3, 0x7fffffff, 0xf0a, 0x40, 0x8000, 0x8, 0x7, 0xffffffffffffff74, 0x4, 0x6, 0x100, 0x7, 0x335, 0x3ff, 0x58, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000001a80), 0xe}, 0x0, 0x80000000, 0x82, 0x7, 0x5, 0x3, 0x80000001}, r2, 0xd, r1, 0x8) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000200)='mqueue\x00', 0x0, &(0x7f000000a000)) r4 = getpid() r5 = bpf$PROG_LOAD(0x5, &(0x7f0000002500)={0xf, 0x7, &(0x7f0000001940)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, [@ldst={0x3, 0x3, 0x3, 0x0, 0x3, 0x2, 0xffffffffffffffff}, @exit={0x95}], {0x95}}, &(0x7f0000001980)='GPL\x00', 0xff, 0x1000, &(0x7f00000039c0)=""/4096, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000019c0)={&(0x7f0000000180)='./file0\x00', r5}, 0x10) perf_event_open(&(0x7f0000001a00)={0x0, 0x70, 0x0, 0x8, 0x0, 0x3, 0x0, 0xb8, 0x1000, 0x0, 0x3, 0x4, 0xfff, 0x4, 0x4dae, 0x40, 0x100000001, 0x6, 0x4, 0x0, 0x3, 0x753c, 0x6, 0x100, 0x1de, 0x6, 0x4, 0x1, 0x6, 0x4, 0x7, 0x3, 0x7fff, 0x80000000, 0x3, 0x8, 0x81, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x7, 0x4}, 0x801, 0x400, 0x1, 0x4, 0x1, 0x9, 0x80000001}, r4, 0x7, r1, 0xb) r6 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000004000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000001c00)='./file0\x00', &(0x7f0000001c40)='./file0\x00', &(0x7f0000001c80)='devpts\x00', 0x40, &(0x7f0000001cc0)="be623dfd58807ac0b2f86f052863a5f30adc0bce173ebcf648cefd7d64732aeb5b94e6af3ab33e53669ba6d304d067dad4b1ff3ed87f18fd170aac904e8f105e80e22881717c98752a9cd7cfb06d102877e3b36b2624d22427331755a9514b225d25999ed605ffe4188630db2e7ddcc57f6316b60c4f3845d9dfcbbde5e49af627b48d7c9bd743b536de31a9ba3010cb6714c9b90a50537be55ca12a18e6541bff5a82d293e7734ea9c90707899663bd96b3bcce5887bf0bd35963c5adc39ddcb6f2a0a02b01661242046cb54ef1aec5a486b69e006305064124867bf79f4dc11798e214b61575168b79887122e0a3461f703c077f902c0a") socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r7, &(0x7f0000001800)={&(0x7f0000000240)=@alg, 0x80, &(0x7f0000000740)=[{&(0x7f00000002c0)=""/83, 0x53}, {&(0x7f0000000340)=""/27, 0x1b}, {&(0x7f0000000380)}, {&(0x7f00000003c0)=""/40, 0x28}, {&(0x7f0000000400)=""/144, 0x90}, {&(0x7f00000004c0)=""/200, 0xc8}, {&(0x7f00000005c0)=""/60, 0x3c}, {&(0x7f0000000600)=""/105, 0x69}, {&(0x7f0000000680)=""/127, 0x7f}, {&(0x7f0000000700)=""/8, 0x8}], 0xa, &(0x7f0000000800)=""/4096, 0x1000}, 0x10000) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000002340)=0xf60) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000003900)={&(0x7f0000003400)=@can={0x0, 0x0}, 0x80, &(0x7f0000003840)=[{&(0x7f0000003480)=""/194, 0xc2}, {&(0x7f0000003580)=""/250, 0xfa}, {&(0x7f0000003680)=""/100, 0x64}, {&(0x7f0000003700)=""/14, 0xe}, {&(0x7f0000003740)=""/159, 0x9f}, {&(0x7f0000003800)=""/15, 0xf}], 0x6, &(0x7f00000038c0)=""/29, 0x1d, 0x5}, 0x3) bpf$PROG_LOAD(0x5, &(0x7f0000003940)={0x4, 0x9, &(0x7f0000001840)=ANY=[@ANYBLOB="18000000030000000000000003000000dfd00c00fcffffff0000000000000000000803000101000000810000000000000001f0fff0ffffff000000000000000095000000000017d2"], &(0x7f0000000380)='GPL\x00', 0xf172, 0x4b, &(0x7f00000018c0)=""/75, 0x41f00, 0x1, [], r8}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000000c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001f00)={0xffffffffffffffff, 0x0, 0xf6, 0x22, &(0x7f0000001dc0)="9ef9482ea02fd36d0a768986a7ebe7a627dc88937e7073e3521858dfa0d5e02f571a01cfdfa76e048e5f956ea5da60b90e02a6c3d3687ed61ec9ab5b682c02498bddef38de9ce8c753e41e78f414d16202a033b6c7752711a5f56924e7846d6dcde2f71026e1eb0319b5e60f6b1ec67fca31c3cf1691d3af91a19f56be5a10ff337a53ba13dd3d75e1555211954b92ec0082d02b7b4cdddc021cbe84e4af8f20788977e3416918843e6c92b2ebf7b8b33ecbd4c7c9a9d5036c3e3e538748a32f1a28eb77818ca1878ffdd445dcdb8a40e6221e0fc474428449dfe93c62bbc69996aa9b34488c1da4f6f7c2275305a6a4fb256c1a516d", &(0x7f0000001ec0)=""/34, 0x1f, 0x1}, 0x28) close(r6) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x3441, &(0x7f0000000080)) mount(&(0x7f00000021c0)='./file0/file0\x00', &(0x7f0000002200)='./file0/file0\x00', &(0x7f0000002240)='fuse\x00', 0x2000000, &(0x7f0000002280)="9b3923bfddc346e9fa2aeaffae6ca386d8d50ba83ab72218340d3c30c045a89ac016797652ba04f1a203cfceccb458dbfd9fd03c4a80ef9a40dc7a4f24b6619d04a58186466fd8465757d9ee053c082cdfa957e7efab6191761847cca59c017493ef5e3d22432cf0b4ebef") ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f00000023c0)=ANY=[@ANYBLOB="07000000000000000000000000000000000000000000000000000000000000000000000067eb0ecf1cfa4ffd89aa7e339417beb7d332a5c996e59875644dd1e3a690110400bc751bb0435977d90fcbb2b83c27812d818991d125e9c0f199be2bc7f01aa0a5cb9b9f99438aa0f1ae3d50201f7bb276536f567f03f062994da292b6db0000000000000000000000000000a93536f303000000000000002a27f6ae1258ebb5079c1bab4f1f6f11ee8ce2e590855a3af38e4bb871ef8400000000000000000000"]) mount(&(0x7f0000001b40)='./file0\x00', &(0x7f0000001b80)='./file0/file0\x00', &(0x7f0000002100)='vfat\x00', 0x0, &(0x7f0000002140)="98980e21ac8b46c0b7bedeee39e6bd9ae4088d6ab47dc9dc76a39e299ce3783aa33e482e450484961fd3e3c5b178fafbe54440e19512ea4298652ed129d4241d9d116d8a5c2b931d350f0c989f8a288fc9e56c") mount(&(0x7f0000df7000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='hugetlbfs\x00', 0x200, &(0x7f00000001c0)) mkdir(&(0x7f00000004c0)='./file0/file0\x00', 0x0) socketpair$inet(0x2, 0x0, 0x1f, &(0x7f0000000080)) [ 239.287348] FAULT_INJECTION: forcing a failure. [ 239.287348] name failslab, interval 1, probability 0, space 0, times 0 [ 239.298696] CPU: 1 PID: 16518 Comm: syz-executor2 Not tainted 4.16.0-rc6+ #43 [ 239.305993] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 239.315439] Call Trace: [ 239.318024] dump_stack+0x194/0x24d [ 239.321656] ? arch_local_irq_restore+0x53/0x53 [ 239.326316] ? __save_stack_trace+0x7e/0xd0 [ 239.330641] should_fail+0x8c0/0xa40 [ 239.334368] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 239.339463] ? kasan_kmalloc+0xad/0xe0 [ 239.343342] ? kmem_cache_alloc_trace+0x136/0x740 [ 239.348174] ? __memcg_init_list_lru_node+0x169/0x270 [ 239.353348] ? __list_lru_init+0x544/0x750 [ 239.357565] ? sget_userns+0x691/0xe40 [ 239.361442] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 239.366289] ? do_mount+0xea4/0x2bb0 [ 239.370001] ? SyS_mount+0xab/0x120 [ 239.373616] ? do_syscall_64+0x281/0x940 [ 239.377667] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 239.383036] ? find_held_lock+0x35/0x1d0 [ 239.387084] ? __lock_is_held+0xb6/0x140 [ 239.391135] ? check_same_owner+0x320/0x320 [ 239.395451] ? rcu_note_context_switch+0x710/0x710 [ 239.400402] should_failslab+0xec/0x120 [ 239.404362] kmem_cache_alloc_trace+0x4b/0x740 [ 239.408928] ? __kmalloc_node+0x33/0x70 [ 239.412883] ? __kmalloc_node+0x33/0x70 [ 239.416932] ? rcu_read_lock_sched_held+0x108/0x120 [ 239.421931] __memcg_init_list_lru_node+0x169/0x270 [ 239.426942] ? list_lru_add+0x7c0/0x7c0 [ 239.430916] ? __kmalloc_node+0x47/0x70 [ 239.434895] __list_lru_init+0x544/0x750 [ 239.438958] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 239.444832] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 239.449832] ? __lockdep_init_map+0xe4/0x650 [ 239.454224] ? lockdep_init_map+0x9/0x10 [ 239.458271] sget_userns+0x691/0xe40 [ 239.461967] ? kernfs_sop_show_path+0x190/0x190 [ 239.466619] ? kernfs_sop_show_options+0x180/0x180 [ 239.471528] ? destroy_unused_super.part.6+0xd0/0xd0 [ 239.476621] ? check_same_owner+0x320/0x320 [ 239.480924] ? rcu_pm_notify+0xc0/0xc0 [ 239.484802] ? rcu_read_lock_sched_held+0x108/0x120 [ 239.489798] ? kmem_cache_alloc_trace+0x459/0x740 [ 239.494620] ? lock_downgrade+0x980/0x980 [ 239.498761] kernfs_mount_ns+0x13d/0x8b0 [ 239.502806] ? kernfs_super_ns+0x70/0x70 [ 239.506856] sysfs_mount+0xc2/0x1c0 [ 239.510464] ? sysfs_kill_sb+0x40/0x40 [ 239.514332] ? alloc_pages_current+0xbe/0x1e0 [ 239.518822] ? security_sb_copy_data+0x81/0xb0 [ 239.523388] mount_fs+0x66/0x2d0 [ 239.526738] vfs_kern_mount.part.26+0xc6/0x4a0 [ 239.531696] ? may_umount+0xa0/0xa0 [ 239.535305] ? _raw_read_unlock+0x22/0x30 [ 239.540911] ? __get_fs_type+0x8a/0xc0 [ 239.544785] do_mount+0xea4/0x2bb0 [ 239.548311] ? copy_mount_string+0x40/0x40 [ 239.552524] ? rcu_pm_notify+0xc0/0xc0 [ 239.556398] ? copy_mount_options+0x5f/0x2e0 [ 239.560788] ? rcu_read_lock_sched_held+0x108/0x120 [ 239.565785] ? kmem_cache_alloc_trace+0x459/0x740 [ 239.570609] ? kasan_check_write+0x14/0x20 [ 239.574828] ? copy_mount_options+0x1f7/0x2e0 [ 239.579306] SyS_mount+0xab/0x120 [ 239.582740] ? copy_mnt_ns+0xb30/0xb30 [ 239.586611] do_syscall_64+0x281/0x940 [ 239.590476] ? vmalloc_sync_all+0x30/0x30 [ 239.594605] ? _raw_spin_unlock_irq+0x27/0x70 [ 239.599080] ? finish_task_switch+0x1c1/0x7e0 [ 239.603555] ? syscall_return_slowpath+0x550/0x550 [ 239.608466] ? syscall_return_slowpath+0x2ac/0x550 [ 239.613376] ? prepare_exit_to_usermode+0x350/0x350 [ 239.618374] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 239.623723] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 239.628554] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 239.633724] RIP: 0033:0x454e79 [ 239.636891] RSP: 002b:00007f3ee2ac1c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 239.644582] RAX: ffffffffffffffda RBX: 00007f3ee2ac26d4 RCX: 0000000000454e79 [ 239.651831] RDX: 0000000020000100 RSI: 0000000020000180 RDI: 0000000020000100 [ 239.659092] RBP: 000000000072bea0 R08: 0000000020000040 R09: 0000000000000000 [ 239.666343] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 239.673596] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000013 2018/03/31 08:26:22 executing program 2 (fault-call:9 fault-nth:20): r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000348f88)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r2}, 0x10) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') 2018/03/31 08:26:22 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000000003042df8700"]) r1 = perf_event_open(&(0x7f0000348f88)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00'}, 0x10) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) mount(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f00000002c0)='devpts\x00', 0x800000, &(0x7f0000000300)="7b18f1563c67659c49445440cbb57f32c0f4710f0219046399f3e8a25c5d4975e2b42f404b14937bd42d9874bdd132eef77f584d5151c9a97470a0d77a0c24a85e319673350e16b039bf474ec320") socketpair(0x3, 0x800, 0x81, &(0x7f00000003c0)) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') 2018/03/31 08:26:22 executing program 1: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={0xffffffffffffffff, &(0x7f0000000700), &(0x7f00000009c0)=""/161}, 0x18) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)) 2018/03/31 08:26:22 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)={0xffffffffffffffff}) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x0, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r4 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r4, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r6 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r3, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r3}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f00000009c0)="3949bcf20271c219f64b9e3fbd45bfae692375440912d5a576c2d82299018de50363f2cf30a439b45c2738869283b7900c1e030013700557a768d5cc05cb9ed624684f4dfdae73a8148b29b2978222576dabbcb3556bcf35a8f66fa68ceb0b834ec5120ac749dc0cc5aab7b0197711785349b1673ff5159bc1a40df6c779950e0747a25ce77a10f68b663a87fc993224a79b583eac02a2171f076ff3", 0x1000, &(0x7f0000000200)) ioctl$sock_kcm_SIOCKCMATTACH(r5, 0x89e0, &(0x7f0000000200)={r2, r5}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) 2018/03/31 08:26:22 executing program 6: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x400000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x85, 0x0, 0x0, 0x2, 0x0, 0x1000000000000000, 0x0, 0xfff, 0x0, 0x4, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1}, 0x20300, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f00000001c0)=ANY=[@ANYBLOB="041db1f4cdd98ab5270000008000f370bb0004925c7f22000043052e6891152f103328c8d5beebe8459ca926916671efaa6e1478a417171aab32206cb54ce7c45f5e795333e23efd8d371491995ad415c3d4df49bbe5a1ef80d19442c4160300000000000000fa2290ff0699433a76a3cad4b3494f35ba6701f22add7097ae39668936d225341f055c247c4794b33932f46e665df4a37fa69ee2b3777cfb515e61406c3cde03c45e6eeb8e21e4317fd4b0bbb1f3b67b291c2500861333"]) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) socketpair(0x0, 0x4, 0x6, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) socketpair(0xf, 0x3, 0x2, &(0x7f0000000040)) 2018/03/31 08:26:22 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) socketpair(0x0, 0x4, 0x6, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) socketpair(0xf, 0x3, 0x2, &(0x7f0000000040)) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000080)={0x0, r0, 0x7, 0x1}, 0x14) [ 240.031766] FAULT_INJECTION: forcing a failure. [ 240.031766] name failslab, interval 1, probability 0, space 0, times 0 [ 240.043184] CPU: 0 PID: 16549 Comm: syz-executor3 Not tainted 4.16.0-rc6+ #43 [ 240.047860] devpts: called with bogus options [ 240.050458] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 240.050464] Call Trace: [ 240.050482] dump_stack+0x194/0x24d [ 240.050499] ? arch_local_irq_restore+0x53/0x53 [ 240.075135] ? __save_stack_trace+0x7e/0xd0 [ 240.079453] should_fail+0x8c0/0xa40 [ 240.083159] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 240.088244] ? kasan_kmalloc+0xad/0xe0 [ 240.092109] ? kmem_cache_alloc_trace+0x136/0x740 [ 240.096931] ? __memcg_init_list_lru_node+0x169/0x270 [ 240.102102] ? __list_lru_init+0x544/0x750 [ 240.106314] ? sget_userns+0x6b1/0xe40 [ 240.110183] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 240.114920] ? do_mount+0xea4/0x2bb0 [ 240.118618] ? SyS_mount+0xab/0x120 [ 240.122239] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 240.127588] ? find_held_lock+0x35/0x1d0 [ 240.131630] ? __lock_is_held+0xb6/0x140 [ 240.135691] ? check_same_owner+0x320/0x320 [ 240.140008] ? rcu_note_context_switch+0x710/0x710 [ 240.144941] should_failslab+0xec/0x120 [ 240.148906] kmem_cache_alloc_trace+0x4b/0x740 [ 240.153466] ? __kmalloc_node+0x33/0x70 [ 240.157417] ? __kmalloc_node+0x33/0x70 [ 240.161377] ? rcu_read_lock_sched_held+0x108/0x120 [ 240.166386] __memcg_init_list_lru_node+0x169/0x270 [ 240.171381] ? list_lru_add+0x7c0/0x7c0 [ 240.175335] ? __kmalloc_node+0x47/0x70 [ 240.179291] __list_lru_init+0x544/0x750 [ 240.183331] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 240.189196] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 240.194195] ? lockdep_init_map+0x9/0x10 [ 240.198245] sget_userns+0x6b1/0xe40 [ 240.201948] ? kernfs_sop_show_path+0x190/0x190 [ 240.206608] ? kernfs_sop_show_options+0x180/0x180 [ 240.211536] ? destroy_unused_super.part.6+0xd0/0xd0 [ 240.216624] ? check_same_owner+0x320/0x320 [ 240.220937] ? rcu_pm_notify+0xc0/0xc0 [ 240.224807] ? rcu_read_lock_sched_held+0x108/0x120 [ 240.229798] ? kmem_cache_alloc_trace+0x459/0x740 [ 240.234618] ? lock_downgrade+0x980/0x980 [ 240.238753] kernfs_mount_ns+0x13d/0x8b0 [ 240.242801] ? kernfs_super_ns+0x70/0x70 [ 240.246853] sysfs_mount+0xc2/0x1c0 [ 240.250459] ? sysfs_kill_sb+0x40/0x40 [ 240.254327] ? alloc_pages_current+0xbe/0x1e0 [ 240.258800] ? security_sb_copy_data+0x81/0xb0 [ 240.263361] mount_fs+0x66/0x2d0 [ 240.266716] vfs_kern_mount.part.26+0xc6/0x4a0 [ 240.271276] ? may_umount+0xa0/0xa0 [ 240.274885] ? _raw_read_unlock+0x22/0x30 [ 240.279038] ? __get_fs_type+0x8a/0xc0 [ 240.282924] do_mount+0xea4/0x2bb0 [ 240.286454] ? copy_mount_string+0x40/0x40 [ 240.291027] ? rcu_pm_notify+0xc0/0xc0 [ 240.294905] ? copy_mount_options+0x5f/0x2e0 [ 240.299290] ? rcu_read_lock_sched_held+0x108/0x120 [ 240.304293] ? kmem_cache_alloc_trace+0x459/0x740 [ 240.309124] ? kasan_check_write+0x14/0x20 [ 240.313338] ? copy_mount_options+0x1f7/0x2e0 [ 240.317812] SyS_mount+0xab/0x120 [ 240.321253] ? copy_mnt_ns+0xb30/0xb30 [ 240.325133] do_syscall_64+0x281/0x940 [ 240.329016] ? vmalloc_sync_all+0x30/0x30 [ 240.333150] ? _raw_spin_unlock_irq+0x27/0x70 [ 240.337622] ? finish_task_switch+0x1c1/0x7e0 [ 240.342095] ? syscall_return_slowpath+0x550/0x550 [ 240.347001] ? syscall_return_slowpath+0x2ac/0x550 [ 240.351918] ? prepare_exit_to_usermode+0x350/0x350 [ 240.356924] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 240.362277] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 240.367111] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 240.372284] RIP: 0033:0x454e79 [ 240.375462] RSP: 002b:00007fbfd4b96c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 2018/03/31 08:26:23 executing program 3 (fault-call:10 fault-nth:27): r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000348f88)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r2}, 0x10) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) mount(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f00000002c0)='devpts\x00', 0x800000, &(0x7f0000000300)) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') [ 240.383162] RAX: ffffffffffffffda RBX: 00007fbfd4b976d4 RCX: 0000000000454e79 [ 240.390417] RDX: 0000000020000100 RSI: 0000000020000180 RDI: 0000000020000100 [ 240.397668] RBP: 000000000072bea0 R08: 0000000020000040 R09: 0000000000000000 [ 240.404919] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 240.412170] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000001a [ 240.452950] hugetlbfs: Bad mount option: "" [ 240.531470] FAULT_INJECTION: forcing a failure. [ 240.531470] name failslab, interval 1, probability 0, space 0, times 0 [ 240.542756] CPU: 0 PID: 16561 Comm: syz-executor2 Not tainted 4.16.0-rc6+ #43 [ 240.550030] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 240.559456] Call Trace: [ 240.562035] dump_stack+0x194/0x24d [ 240.565668] ? arch_local_irq_restore+0x53/0x53 [ 240.570319] ? __save_stack_trace+0x7e/0xd0 [ 240.574626] should_fail+0x8c0/0xa40 [ 240.578322] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 240.583405] ? kasan_kmalloc+0xad/0xe0 [ 240.587281] ? kmem_cache_alloc_trace+0x136/0x740 [ 240.592111] ? __memcg_init_list_lru_node+0x169/0x270 [ 240.597279] ? __list_lru_init+0x544/0x750 [ 240.601494] ? sget_userns+0x691/0xe40 [ 240.605366] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 240.610102] ? do_mount+0xea4/0x2bb0 [ 240.613797] ? SyS_mount+0xab/0x120 [ 240.617405] ? do_syscall_64+0x281/0x940 [ 240.621456] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 240.626825] ? find_held_lock+0x35/0x1d0 [ 240.630875] ? __lock_is_held+0xb6/0x140 [ 240.634922] ? check_same_owner+0x320/0x320 [ 240.639229] ? rcu_note_context_switch+0x710/0x710 [ 240.644141] should_failslab+0xec/0x120 [ 240.648095] kmem_cache_alloc_trace+0x4b/0x740 [ 240.652655] ? __kmalloc_node+0x33/0x70 [ 240.657048] ? __kmalloc_node+0x33/0x70 [ 240.661003] ? rcu_read_lock_sched_held+0x108/0x120 [ 240.666015] __memcg_init_list_lru_node+0x169/0x270 [ 240.671030] ? list_lru_add+0x7c0/0x7c0 [ 240.675001] ? __kmalloc_node+0x47/0x70 [ 240.678965] __list_lru_init+0x544/0x750 [ 240.683007] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 240.688882] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 240.693889] ? __lockdep_init_map+0xe4/0x650 [ 240.698284] ? lockdep_init_map+0x9/0x10 [ 240.702335] sget_userns+0x691/0xe40 [ 240.706033] ? kernfs_sop_show_path+0x190/0x190 [ 240.710695] ? kernfs_sop_show_options+0x180/0x180 [ 240.715609] ? destroy_unused_super.part.6+0xd0/0xd0 [ 240.720699] ? check_same_owner+0x320/0x320 [ 240.725015] ? rcu_pm_notify+0xc0/0xc0 [ 240.728892] ? rcu_read_lock_sched_held+0x108/0x120 [ 240.733883] ? kmem_cache_alloc_trace+0x459/0x740 [ 240.738704] ? lock_downgrade+0x980/0x980 [ 240.742839] kernfs_mount_ns+0x13d/0x8b0 [ 240.746885] ? kernfs_super_ns+0x70/0x70 [ 240.750959] sysfs_mount+0xc2/0x1c0 [ 240.754568] ? sysfs_kill_sb+0x40/0x40 [ 240.758440] ? alloc_pages_current+0xbe/0x1e0 [ 240.762914] ? security_sb_copy_data+0x81/0xb0 [ 240.767476] mount_fs+0x66/0x2d0 [ 240.770831] vfs_kern_mount.part.26+0xc6/0x4a0 [ 240.775403] ? may_umount+0xa0/0xa0 [ 240.779022] ? _raw_read_unlock+0x22/0x30 [ 240.783156] ? __get_fs_type+0x8a/0xc0 [ 240.787030] do_mount+0xea4/0x2bb0 [ 240.790558] ? copy_mount_string+0x40/0x40 [ 240.794769] ? rcu_pm_notify+0xc0/0xc0 [ 240.798637] ? copy_mount_options+0x5f/0x2e0 [ 240.803028] ? rcu_read_lock_sched_held+0x108/0x120 [ 240.808039] ? kmem_cache_alloc_trace+0x459/0x740 [ 240.812866] ? kasan_check_write+0x14/0x20 [ 240.817087] ? _copy_from_user+0x99/0x110 [ 240.821226] ? copy_mount_options+0x1f7/0x2e0 [ 240.825707] SyS_mount+0xab/0x120 [ 240.829145] ? copy_mnt_ns+0xb30/0xb30 [ 240.833038] do_syscall_64+0x281/0x940 [ 240.836904] ? vmalloc_sync_all+0x30/0x30 [ 240.841036] ? _raw_spin_unlock_irq+0x27/0x70 [ 240.845518] ? finish_task_switch+0x1c1/0x7e0 [ 240.849993] ? syscall_return_slowpath+0x550/0x550 [ 240.854902] ? syscall_return_slowpath+0x2ac/0x550 [ 240.859811] ? prepare_exit_to_usermode+0x350/0x350 [ 240.864810] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 240.870152] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 240.874977] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 240.880145] RIP: 0033:0x454e79 [ 240.883308] RSP: 002b:00007f3ee2ac1c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 240.890992] RAX: ffffffffffffffda RBX: 00007f3ee2ac26d4 RCX: 0000000000454e79 [ 240.898415] RDX: 0000000020000100 RSI: 0000000020000180 RDI: 0000000020000100 [ 240.905661] RBP: 000000000072bea0 R08: 0000000020000040 R09: 0000000000000000 [ 240.912912] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 240.920172] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000014 [ 241.224319] FAULT_INJECTION: forcing a failure. [ 241.224319] name failslab, interval 1, probability 0, space 0, times 0 [ 241.235632] CPU: 0 PID: 16585 Comm: syz-executor3 Not tainted 4.16.0-rc6+ #43 [ 241.242905] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 241.252256] Call Trace: [ 241.254842] dump_stack+0x194/0x24d [ 241.258462] ? arch_local_irq_restore+0x53/0x53 [ 241.263109] ? __save_stack_trace+0x7e/0xd0 [ 241.267408] should_fail+0x8c0/0xa40 [ 241.271095] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 241.276171] ? kasan_kmalloc+0xad/0xe0 [ 241.280035] ? kmem_cache_alloc_trace+0x136/0x740 [ 241.284851] ? __memcg_init_list_lru_node+0x169/0x270 [ 241.290029] ? __list_lru_init+0x544/0x750 [ 241.294242] ? sget_userns+0x6b1/0xe40 [ 241.298103] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 241.302830] ? do_mount+0xea4/0x2bb0 [ 241.306516] ? SyS_mount+0xab/0x120 [ 241.310120] ? do_syscall_64+0x281/0x940 [ 241.314157] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 241.319497] ? find_held_lock+0x35/0x1d0 [ 241.323534] ? __lock_is_held+0xb6/0x140 [ 241.327572] ? check_same_owner+0x320/0x320 [ 241.331871] ? rcu_note_context_switch+0x710/0x710 [ 241.336780] should_failslab+0xec/0x120 [ 241.340735] kmem_cache_alloc_trace+0x4b/0x740 [ 241.345299] ? __kmalloc_node+0x33/0x70 [ 241.349248] ? __kmalloc_node+0x33/0x70 [ 241.353196] ? rcu_read_lock_sched_held+0x108/0x120 [ 241.358187] __memcg_init_list_lru_node+0x169/0x270 [ 241.363187] ? list_lru_add+0x7c0/0x7c0 [ 241.367138] ? __kmalloc_node+0x47/0x70 [ 241.371088] __list_lru_init+0x544/0x750 [ 241.375125] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 241.380987] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 241.385983] ? lockdep_init_map+0x9/0x10 [ 241.390025] sget_userns+0x6b1/0xe40 [ 241.393718] ? kernfs_sop_show_path+0x190/0x190 [ 241.398366] ? kernfs_sop_show_options+0x180/0x180 [ 241.403270] ? destroy_unused_super.part.6+0xd0/0xd0 [ 241.408350] ? check_same_owner+0x320/0x320 [ 241.412646] ? rcu_pm_notify+0xc0/0xc0 [ 241.416509] ? rcu_read_lock_sched_held+0x108/0x120 [ 241.421505] ? kmem_cache_alloc_trace+0x459/0x740 [ 241.426329] ? lock_downgrade+0x980/0x980 [ 241.430453] kernfs_mount_ns+0x13d/0x8b0 [ 241.434488] ? kernfs_super_ns+0x70/0x70 [ 241.438522] sysfs_mount+0xc2/0x1c0 [ 241.442125] ? sysfs_kill_sb+0x40/0x40 [ 241.445987] ? alloc_pages_current+0xbe/0x1e0 [ 241.450461] ? security_sb_copy_data+0x81/0xb0 [ 241.455025] mount_fs+0x66/0x2d0 [ 241.458378] vfs_kern_mount.part.26+0xc6/0x4a0 [ 241.462939] ? may_umount+0xa0/0xa0 [ 241.466546] ? _raw_read_unlock+0x22/0x30 [ 241.470668] ? __get_fs_type+0x8a/0xc0 [ 241.474530] do_mount+0xea4/0x2bb0 [ 241.478045] ? copy_mount_string+0x40/0x40 [ 241.482253] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 241.487242] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 241.491973] ? retint_kernel+0x10/0x10 [ 241.495837] ? copy_mount_options+0x149/0x2e0 [ 241.500306] ? __sanitizer_cov_trace_pc+0x2b/0x50 [ 241.505120] ? copy_mount_options+0x1f7/0x2e0 [ 241.509588] SyS_mount+0xab/0x120 [ 241.513016] ? copy_mnt_ns+0xb30/0xb30 [ 241.516884] do_syscall_64+0x281/0x940 [ 241.520749] ? vmalloc_sync_all+0x30/0x30 [ 241.524879] ? _raw_spin_unlock_irq+0x27/0x70 [ 241.529347] ? finish_task_switch+0x1c1/0x7e0 [ 241.533818] ? syscall_return_slowpath+0x550/0x550 [ 241.538726] ? syscall_return_slowpath+0x2ac/0x550 [ 241.543627] ? prepare_exit_to_usermode+0x350/0x350 [ 241.548619] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 241.553958] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 241.558776] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 241.563944] RIP: 0033:0x454e79 [ 241.567458] RSP: 002b:00007fbfd4b96c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 2018/03/31 08:26:24 executing program 7: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x80000000000, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000001fc0)) sendmsg(0xffffffffffffffff, &(0x7f00000024c0)={&(0x7f0000002040)=@un=@file={0x0, './file0\x00'}, 0x80, &(0x7f0000001f40)=[{&(0x7f00000020c0)="73c7575b94a72990e177f86ed4835a72a65c1a6c6831eeb0c48163a47ab63bcb605c8450cc4798ff6521c2aa722d1a7105c8a07e6c", 0x35}], 0x1, &(0x7f0000002500)=ANY=[], 0x0, 0x40000}, 0x20000000) r2 = gettid() r3 = perf_event_open(&(0x7f0000001ac0)={0x1, 0x70, 0xffffffff, 0x835, 0x9, 0xffffffffffffff5f, 0x0, 0x1000, 0x42000, 0x3, 0x8, 0x80, 0x1, 0x4, 0x100000001, 0x9, 0xff, 0x8, 0x1000, 0x7, 0x7f, 0x200, 0xb715, 0x3, 0x7fffffff, 0xf0a, 0x40, 0x8000, 0x8, 0x7, 0xffffffffffffff74, 0x4, 0x6, 0x100, 0x7, 0x335, 0x3ff, 0x58, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000001a80), 0xe}, 0x0, 0x80000000, 0x82, 0x7, 0x5, 0x3, 0x80000001}, r2, 0xd, r1, 0x8) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000200)='mqueue\x00', 0x0, &(0x7f000000a000)) r4 = getpid() r5 = bpf$PROG_LOAD(0x5, &(0x7f0000002500)={0xf, 0x7, &(0x7f0000001940)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, [@ldst={0x3, 0x3, 0x3, 0x4, 0x0, 0x2, 0xffffffffffffffff}, @exit={0x95}], {0x95}}, &(0x7f0000001980)='GPL\x00', 0xff, 0x1000, &(0x7f00000039c0)=""/4096, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000019c0)={&(0x7f0000000180)='./file0\x00', r5}, 0x10) perf_event_open(&(0x7f0000001a00)={0x0, 0x70, 0x0, 0x8, 0x0, 0x3, 0x0, 0xb8, 0x1000, 0x0, 0x3, 0x4, 0xfff, 0x4, 0x4dae, 0x40, 0x100000001, 0x6, 0x4, 0x0, 0x3, 0x753c, 0x6, 0x100, 0x1de, 0x6, 0x4, 0x1, 0x6, 0x4, 0x7, 0x3, 0x7fff, 0x80000000, 0x3, 0x8, 0x81, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x7, 0x4}, 0x801, 0x400, 0x1, 0x4, 0x1, 0x9, 0x80000001}, r4, 0x7, r1, 0xb) r6 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000004000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000001c00)='./file0\x00', &(0x7f0000001c40)='./file0\x00', &(0x7f0000001c80)='devpts\x00', 0x40, &(0x7f0000001cc0)="be623dfd58807ac0b2f86f052863a5f30adc0bce173ebcf648cefd7d64732aeb5b94e6af3ab33e53669ba6d304d067dad4b1ff3ed87f18fd170aac904e8f105e80e22881717c98752a9cd7cfb06d102877e3b36b2624d22427331755a9514b225d25999ed605ffe4188630db2e7ddcc57f6316b60c4f3845d9dfcbbde5e49af627b48d7c9bd743b536de31a9ba3010cb6714c9b90a50537be55ca12a18e6541bff5a82d293e7734ea9c90707899663bd96b3bcce5887bf0bd35963c5adc39ddcb6f2a0a02b01661242046cb54ef1aec5a486b69e006305064124867bf79f4dc11798e214b61575168b79887122e0a3461f703c077f902c0a") socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r7, &(0x7f0000001800)={&(0x7f0000000240)=@alg, 0x80, &(0x7f0000000740)=[{&(0x7f00000002c0)=""/83, 0x53}, {&(0x7f0000000340)=""/27, 0x1b}, {&(0x7f0000000380)}, {&(0x7f00000003c0)=""/40, 0x28}, {&(0x7f0000000400)=""/144, 0x90}, {&(0x7f00000004c0)=""/200, 0xc8}, {&(0x7f00000005c0)=""/60, 0x3c}, {&(0x7f0000000600)=""/105, 0x69}, {&(0x7f0000000680)=""/127, 0x7f}, {&(0x7f0000000700)=""/8, 0x8}], 0xa, &(0x7f0000000800)=""/4096, 0x1000}, 0x10000) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000002340)=0xf60) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000003900)={&(0x7f0000003400)=@can={0x0, 0x0}, 0x80, &(0x7f0000003840)=[{&(0x7f0000003480)=""/194, 0xc2}, {&(0x7f0000003580)=""/250, 0xfa}, {&(0x7f0000003680)=""/100, 0x64}, {&(0x7f0000003700)=""/14, 0xe}, {&(0x7f0000003740)=""/159, 0x9f}, {&(0x7f0000003800)=""/15, 0xf}], 0x6, &(0x7f00000038c0)=""/29, 0x1d, 0x5}, 0x3) bpf$PROG_LOAD(0x5, &(0x7f0000003940)={0x4, 0x9, &(0x7f0000001840)=ANY=[@ANYBLOB="18000000030000000000000003000000dfd00c00fcffffff0000000000000000000803000101000000810000000000000001f0fff0ffffff000000000000000095000000000017d2"], &(0x7f0000000380)='GPL\x00', 0xf172, 0x4b, &(0x7f00000018c0)=""/75, 0x41f00, 0x1, [], r8}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000000c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001f00)={0xffffffffffffffff, 0x0, 0xf6, 0x22, &(0x7f0000001dc0)="9ef9482ea02fd36d0a768986a7ebe7a627dc88937e7073e3521858dfa0d5e02f571a01cfdfa76e048e5f956ea5da60b90e02a6c3d3687ed61ec9ab5b682c02498bddef38de9ce8c753e41e78f414d16202a033b6c7752711a5f56924e7846d6dcde2f71026e1eb0319b5e60f6b1ec67fca31c3cf1691d3af91a19f56be5a10ff337a53ba13dd3d75e1555211954b92ec0082d02b7b4cdddc021cbe84e4af8f20788977e3416918843e6c92b2ebf7b8b33ecbd4c7c9a9d5036c3e3e538748a32f1a28eb77818ca1878ffdd445dcdb8a40e6221e0fc474428449dfe93c62bbc69996aa9b34488c1da4f6f7c2275305a6a4fb256c1a516d", &(0x7f0000001ec0)=""/34, 0x1f, 0x1}, 0x28) close(r6) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x3441, &(0x7f0000000080)) mount(&(0x7f00000021c0)='./file0/file0\x00', &(0x7f0000002200)='./file0/file0\x00', &(0x7f0000002240)='fuse\x00', 0x2000000, &(0x7f0000002280)="9b3923bfddc346e9fa2aeaffae6ca386d8d50ba83ab72218340d3c30c045a89ac016797652ba04f1a203cfceccb458dbfd9fd03c4a80ef9a40dc7a4f24b6619d04a58186466fd8465757d9ee053c082cdfa957e7efab6191761847cca59c017493ef5e3d22432cf0b4ebef") ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f00000023c0)=ANY=[@ANYBLOB="07000000000000000000000000000000000000000000000000000000000000000000000067eb0ecf1cfa4ffd89aa7e339417beb7d332a5c996e59875644dd1e3a690110400bc751bb0435977d90fcbb2b83c27812d818991d125e9c0f199be2bc7f01aa0a5cb9b9f99438aa0f1ae3d50201f7bb276536f567f03f062994da292b6db0000000000000000000000000000a93536f303000000000000002a27f6ae1258ebb5079c1bab4f1f6f11ee8ce2e590855a3af38e4bb871ef8400000000000000000000"]) mount(&(0x7f0000001b40)='./file0\x00', &(0x7f0000001b80)='./file0/file0\x00', &(0x7f0000002100)='vfat\x00', 0x0, &(0x7f0000002140)="98980e21ac8b46c0b7bedeee39e6bd9ae4088d6ab47dc9dc76a39e299ce3783aa33e482e450484961fd3e3c5b178fafbe54440e19512ea4298652ed129d4241d9d116d8a5c2b931d350f0c989f8a288fc9e56c") mount(&(0x7f0000df7000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='hugetlbfs\x00', 0x200, &(0x7f00000001c0)) mkdir(&(0x7f00000004c0)='./file0/file0\x00', 0x0) socketpair$inet(0x2, 0x0, 0x1f, &(0x7f0000000080)) 2018/03/31 08:26:24 executing program 1: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f00000000c0)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={0xffffffffffffffff, &(0x7f0000000700), &(0x7f00000009c0)=""/161}, 0x18) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)) 2018/03/31 08:26:24 executing program 2 (fault-call:9 fault-nth:21): r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000348f88)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r2}, 0x10) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') 2018/03/31 08:26:24 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x0, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r4 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f00000009c0)="3949bcf20271c219f64b9e3fbd45bfae692375440912d5a576c2d82299018de50363f2cf30a439b45c2738869283b7900c1e030013700557a768d5cc05cb9ed624684f4dfdae73a8148b29b2978222576dabbcb3556bcf35a8f66fa68ceb0b834ec5120ac749dc0cc5aab7b0197711785349b1673ff5159bc1a40df6c779950e0747a25ce77a10f68b663a87fc993224a79b583eac02a2171f076ff3", 0x1000, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") socket$kcm(0x29, 0x2, 0x0) gettid() close(0xffffffffffffffff) 2018/03/31 08:26:24 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000000003042df8700"]) r1 = perf_event_open(&(0x7f0000348f88)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00'}, 0x10) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) mount(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f00000002c0)='devpts\x00', 0x800000, &(0x7f0000000300)="7b18f1563c67659c49445440cbb57f32c0f4710f0219046399f3e8a25c5d4975e2b42f404b14937bd42d9874bdd132eef77f584d5151c9a97470a0d77a0c24a85e319673350e16b039bf474ec320") socketpair(0x3, 0x800, 0x81, &(0x7f00000003c0)) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') 2018/03/31 08:26:24 executing program 3 (fault-call:10 fault-nth:28): r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000348f88)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r2}, 0x10) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) mount(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f00000002c0)='devpts\x00', 0x800000, &(0x7f0000000300)) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') 2018/03/31 08:26:24 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) socketpair(0x0, 0x4, 0x6, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000000)) socketpair(0xf, 0x3, 0x2, &(0x7f0000000040)) 2018/03/31 08:26:24 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000080)) socketpair(0x0, 0x4, 0x6, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) socketpair(0xf, 0x3, 0x2, &(0x7f0000000040)) [ 241.575149] RAX: ffffffffffffffda RBX: 00007fbfd4b976d4 RCX: 0000000000454e79 [ 241.582391] RDX: 0000000020000100 RSI: 0000000020000180 RDI: 0000000020000100 [ 241.589635] RBP: 000000000072bea0 R08: 0000000020000040 R09: 0000000000000000 [ 241.596895] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 241.604140] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000001b [ 241.795430] FAULT_INJECTION: forcing a failure. [ 241.795430] name failslab, interval 1, probability 0, space 0, times 0 [ 241.806717] CPU: 0 PID: 16602 Comm: syz-executor2 Not tainted 4.16.0-rc6+ #43 [ 241.813982] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 241.823331] Call Trace: [ 241.825920] dump_stack+0x194/0x24d [ 241.829542] ? arch_local_irq_restore+0x53/0x53 [ 241.834205] ? __save_stack_trace+0x7e/0xd0 [ 241.838535] should_fail+0x8c0/0xa40 [ 241.842237] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 241.847331] ? kasan_kmalloc+0xad/0xe0 [ 241.851205] ? kmem_cache_alloc_trace+0x136/0x740 [ 241.856032] ? __memcg_init_list_lru_node+0x169/0x270 [ 241.861217] ? __list_lru_init+0x544/0x750 [ 241.865438] ? sget_userns+0x691/0xe40 [ 241.869321] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 241.874063] ? do_mount+0xea4/0x2bb0 [ 241.877758] ? SyS_mount+0xab/0x120 [ 241.881382] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 241.886739] ? find_held_lock+0x35/0x1d0 [ 241.890795] ? __lock_is_held+0xb6/0x140 [ 241.894849] ? check_same_owner+0x320/0x320 [ 241.899155] ? rcu_note_context_switch+0x710/0x710 [ 241.904067] should_failslab+0xec/0x120 [ 241.908030] kmem_cache_alloc_trace+0x4b/0x740 [ 241.912605] ? __kmalloc_node+0x33/0x70 [ 241.916566] ? __kmalloc_node+0x33/0x70 [ 241.920523] ? rcu_read_lock_sched_held+0x108/0x120 [ 241.925524] __memcg_init_list_lru_node+0x169/0x270 [ 241.930532] ? list_lru_add+0x7c0/0x7c0 [ 241.934494] ? __kmalloc_node+0x47/0x70 [ 241.938458] __list_lru_init+0x544/0x750 [ 241.942509] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 241.948397] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 241.953406] ? __lockdep_init_map+0xe4/0x650 [ 241.957800] ? lockdep_init_map+0x9/0x10 [ 241.961853] sget_userns+0x691/0xe40 [ 241.965552] ? kernfs_sop_show_path+0x190/0x190 [ 241.970210] ? kernfs_sop_show_options+0x180/0x180 [ 241.975128] ? destroy_unused_super.part.6+0xd0/0xd0 [ 241.980222] ? check_same_owner+0x320/0x320 [ 241.984528] ? rcu_pm_notify+0xc0/0xc0 [ 241.988400] ? rcu_read_lock_sched_held+0x108/0x120 [ 241.993401] ? kmem_cache_alloc_trace+0x459/0x740 [ 241.998221] ? lock_downgrade+0x980/0x980 [ 242.002349] kernfs_mount_ns+0x13d/0x8b0 [ 242.006400] ? kernfs_super_ns+0x70/0x70 [ 242.010465] sysfs_mount+0xc2/0x1c0 [ 242.014085] ? sysfs_kill_sb+0x40/0x40 [ 242.017958] ? alloc_pages_current+0xbe/0x1e0 [ 242.022433] ? security_sb_copy_data+0x81/0xb0 [ 242.026995] mount_fs+0x66/0x2d0 [ 242.030355] vfs_kern_mount.part.26+0xc6/0x4a0 [ 242.034930] ? may_umount+0xa0/0xa0 [ 242.038536] ? _raw_read_unlock+0x22/0x30 [ 242.042673] ? __get_fs_type+0x8a/0xc0 [ 242.046549] do_mount+0xea4/0x2bb0 [ 242.050072] ? copy_mount_string+0x40/0x40 [ 242.054281] ? rcu_pm_notify+0xc0/0xc0 [ 242.058161] ? copy_mount_options+0x5f/0x2e0 [ 242.062556] ? rcu_read_lock_sched_held+0x108/0x120 [ 242.067562] ? kmem_cache_alloc_trace+0x459/0x740 [ 242.072384] ? kasan_check_write+0x14/0x20 [ 242.076605] ? copy_mount_options+0x1f7/0x2e0 [ 242.081086] SyS_mount+0xab/0x120 [ 242.084523] ? copy_mnt_ns+0xb30/0xb30 [ 242.088399] do_syscall_64+0x281/0x940 [ 242.092264] ? vmalloc_sync_all+0x30/0x30 [ 242.096388] ? _raw_spin_unlock_irq+0x27/0x70 [ 242.100867] ? finish_task_switch+0x1c1/0x7e0 [ 242.105345] ? syscall_return_slowpath+0x550/0x550 [ 242.110263] ? syscall_return_slowpath+0x2ac/0x550 [ 242.115187] ? prepare_exit_to_usermode+0x350/0x350 [ 242.120186] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 242.125541] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 242.130372] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 242.135544] RIP: 0033:0x454e79 [ 242.138719] RSP: 002b:00007f3ee2ac1c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 2018/03/31 08:26:25 executing program 2 (fault-call:9 fault-nth:22): r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000348f88)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r2}, 0x10) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') 2018/03/31 08:26:25 executing program 1: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f00000002c0)='./file0/file0\x00', r0}, 0x5) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={0xffffffffffffffff, &(0x7f0000000700), &(0x7f00000009c0)=""/161}, 0x18) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000240)='nfsd\x00', 0x20, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f00000000c0)) [ 242.146412] RAX: ffffffffffffffda RBX: 00007f3ee2ac26d4 RCX: 0000000000454e79 [ 242.153676] RDX: 0000000020000100 RSI: 0000000020000180 RDI: 0000000020000100 [ 242.160924] RBP: 000000000072bea0 R08: 0000000020000040 R09: 0000000000000000 [ 242.168173] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 242.175418] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000015 [ 242.185718] devpts: called with bogus options 2018/03/31 08:26:25 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x0, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000e40)="4f70c508ab78671b9fd01d23507a834656b6ab6a2a8d51c68b2f758c09a3551e80857ddb10226395a624d9be059613b4210400075d42e7f3ec117a8f0f306a50f2d784df4ed1b0aba67390491b2e7bc10d2536561e3921e7cc125733696d02e82081a41d4a2d70721c9eef6229b5bfc3cd1848467e4ba61daa8a46433c3bb9d888db704a2b94caa4409cb705a4bb80a0458c810445b1570d01a6c60376d9d3ddf3e44a87add51093051de07504db5d3bec9646be648b512774899ef4361cc68711769c0ee68e07233123cb6c9bf99b8a410d27228a58f9211c77e69430ab577f8a3eefeca50a9d0b26c1e02c9bb73649028e2d04670978ced13ab693362bedfa5c41088cd7693d92aeb172a2d208b8dd45b9947781c99aa0ec08bca3053c651aebbe") r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r4 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f00000009c0)="3949bcf20271c219f64b9e3fbd45bfae692375440912d5a576c2d82299018de50363f2cf30a439b45c2738869283b7900c1e030013700557a768d5cc05cb9ed624684f4dfdae73a8148b29b2978222576dabbcb3556bcf35a8f66fa68ceb0b834ec5120ac749dc0cc5aab7b0197711785349b1673ff5159bc1a40df6c779950e0747a25ce77a10f68b663a87fc993224a79b583eac02a2171f076ff3", 0x1000, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) 2018/03/31 08:26:25 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000000003042df8700"]) r1 = perf_event_open(&(0x7f0000348f88)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r2}, 0x10) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) mount(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, &(0x7f0000000300)="7b18f1563c67659c49445440cbb57f32c0f4710f0219046399f3e8a25c5d4975e2b42f404b14937bd42d9874bdd132eef77f584d5151c9a97470a0d77a0c24a85e319673350e16b039bf474ec320") socketpair(0x3, 0x800, 0x81, &(0x7f00000003c0)) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') [ 242.238400] hugetlbfs: Bad mount option: "" 2018/03/31 08:26:25 executing program 6: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000000)) socketpair(0x0, 0x4, 0x6, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) socketpair(0xf, 0x3, 0x2, &(0x7f0000000040)) 2018/03/31 08:26:25 executing program 7: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x80000000000, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000001fc0)) sendmsg(0xffffffffffffffff, &(0x7f00000024c0)={&(0x7f0000002040)=@un=@file={0x0, './file0\x00'}, 0x80, &(0x7f0000001f40)=[{&(0x7f00000020c0)="73c7575b94a72990e177f86ed4835a72a65c1a6c6831eeb0c48163a47ab63bcb605c8450cc4798ff6521c2aa722d1a7105c8a07e6c", 0x35}], 0x1, &(0x7f0000002500)=ANY=[], 0x0, 0x40000}, 0x20000000) r2 = gettid() r3 = perf_event_open(&(0x7f0000001ac0)={0x1, 0x70, 0xffffffff, 0x835, 0x9, 0xffffffffffffff5f, 0x0, 0x1000, 0x42000, 0x3, 0x8, 0x80, 0x1, 0x4, 0x100000001, 0x9, 0xff, 0x8, 0x1000, 0x7, 0x7f, 0x200, 0xb715, 0x3, 0x7fffffff, 0xf0a, 0x40, 0x8000, 0x8, 0x7, 0xffffffffffffff74, 0x4, 0x6, 0x100, 0x7, 0x335, 0x3ff, 0x58, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000001a80), 0xe}, 0x0, 0x80000000, 0x82, 0x7, 0x5, 0x3, 0x80000001}, r2, 0xd, r1, 0x8) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000200)='mqueue\x00', 0x0, &(0x7f000000a000)) r4 = getpid() r5 = bpf$PROG_LOAD(0x5, &(0x7f0000002500)={0xf, 0x7, &(0x7f0000001940)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, [@ldst={0x3, 0x3, 0x3, 0x4, 0x3, 0x0, 0xffffffffffffffff}, @exit={0x95}], {0x95}}, &(0x7f0000001980)='GPL\x00', 0xff, 0x1000, &(0x7f00000039c0)=""/4096, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000019c0)={&(0x7f0000000180)='./file0\x00', r5}, 0x10) perf_event_open(&(0x7f0000001a00)={0x0, 0x70, 0x0, 0x8, 0x0, 0x3, 0x0, 0xb8, 0x1000, 0x0, 0x3, 0x4, 0xfff, 0x4, 0x4dae, 0x40, 0x100000001, 0x6, 0x4, 0x0, 0x3, 0x753c, 0x6, 0x100, 0x1de, 0x6, 0x4, 0x1, 0x6, 0x4, 0x7, 0x3, 0x7fff, 0x80000000, 0x3, 0x8, 0x81, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x7, 0x4}, 0x801, 0x400, 0x1, 0x4, 0x1, 0x9, 0x80000001}, r4, 0x7, r1, 0xb) r6 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000004000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000001c00)='./file0\x00', &(0x7f0000001c40)='./file0\x00', &(0x7f0000001c80)='devpts\x00', 0x40, &(0x7f0000001cc0)="be623dfd58807ac0b2f86f052863a5f30adc0bce173ebcf648cefd7d64732aeb5b94e6af3ab33e53669ba6d304d067dad4b1ff3ed87f18fd170aac904e8f105e80e22881717c98752a9cd7cfb06d102877e3b36b2624d22427331755a9514b225d25999ed605ffe4188630db2e7ddcc57f6316b60c4f3845d9dfcbbde5e49af627b48d7c9bd743b536de31a9ba3010cb6714c9b90a50537be55ca12a18e6541bff5a82d293e7734ea9c90707899663bd96b3bcce5887bf0bd35963c5adc39ddcb6f2a0a02b01661242046cb54ef1aec5a486b69e006305064124867bf79f4dc11798e214b61575168b79887122e0a3461f703c077f902c0a") socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r7, &(0x7f0000001800)={&(0x7f0000000240)=@alg, 0x80, &(0x7f0000000740)=[{&(0x7f00000002c0)=""/83, 0x53}, {&(0x7f0000000340)=""/27, 0x1b}, {&(0x7f0000000380)}, {&(0x7f00000003c0)=""/40, 0x28}, {&(0x7f0000000400)=""/144, 0x90}, {&(0x7f00000004c0)=""/200, 0xc8}, {&(0x7f00000005c0)=""/60, 0x3c}, {&(0x7f0000000600)=""/105, 0x69}, {&(0x7f0000000680)=""/127, 0x7f}, {&(0x7f0000000700)=""/8, 0x8}], 0xa, &(0x7f0000000800)=""/4096, 0x1000}, 0x10000) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000002340)=0xf60) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000003900)={&(0x7f0000003400)=@can={0x0, 0x0}, 0x80, &(0x7f0000003840)=[{&(0x7f0000003480)=""/194, 0xc2}, {&(0x7f0000003580)=""/250, 0xfa}, {&(0x7f0000003680)=""/100, 0x64}, {&(0x7f0000003700)=""/14, 0xe}, {&(0x7f0000003740)=""/159, 0x9f}, {&(0x7f0000003800)=""/15, 0xf}], 0x6, &(0x7f00000038c0)=""/29, 0x1d, 0x5}, 0x3) bpf$PROG_LOAD(0x5, &(0x7f0000003940)={0x4, 0x9, &(0x7f0000001840)=ANY=[@ANYBLOB="18000000030000000000000003000000dfd00c00fcffffff0000000000000000000803000101000000810000000000000001f0fff0ffffff000000000000000095000000000017d2"], &(0x7f0000000380)='GPL\x00', 0xf172, 0x4b, &(0x7f00000018c0)=""/75, 0x41f00, 0x1, [], r8}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000000c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001f00)={0xffffffffffffffff, 0x0, 0xf6, 0x22, &(0x7f0000001dc0)="9ef9482ea02fd36d0a768986a7ebe7a627dc88937e7073e3521858dfa0d5e02f571a01cfdfa76e048e5f956ea5da60b90e02a6c3d3687ed61ec9ab5b682c02498bddef38de9ce8c753e41e78f414d16202a033b6c7752711a5f56924e7846d6dcde2f71026e1eb0319b5e60f6b1ec67fca31c3cf1691d3af91a19f56be5a10ff337a53ba13dd3d75e1555211954b92ec0082d02b7b4cdddc021cbe84e4af8f20788977e3416918843e6c92b2ebf7b8b33ecbd4c7c9a9d5036c3e3e538748a32f1a28eb77818ca1878ffdd445dcdb8a40e6221e0fc474428449dfe93c62bbc69996aa9b34488c1da4f6f7c2275305a6a4fb256c1a516d", &(0x7f0000001ec0)=""/34, 0x1f, 0x1}, 0x28) close(r6) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x3441, &(0x7f0000000080)) mount(&(0x7f00000021c0)='./file0/file0\x00', &(0x7f0000002200)='./file0/file0\x00', &(0x7f0000002240)='fuse\x00', 0x2000000, &(0x7f0000002280)="9b3923bfddc346e9fa2aeaffae6ca386d8d50ba83ab72218340d3c30c045a89ac016797652ba04f1a203cfceccb458dbfd9fd03c4a80ef9a40dc7a4f24b6619d04a58186466fd8465757d9ee053c082cdfa957e7efab6191761847cca59c017493ef5e3d22432cf0b4ebef") ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f00000023c0)=ANY=[@ANYBLOB="07000000000000000000000000000000000000000000000000000000000000000000000067eb0ecf1cfa4ffd89aa7e339417beb7d332a5c996e59875644dd1e3a690110400bc751bb0435977d90fcbb2b83c27812d818991d125e9c0f199be2bc7f01aa0a5cb9b9f99438aa0f1ae3d50201f7bb276536f567f03f062994da292b6db0000000000000000000000000000a93536f303000000000000002a27f6ae1258ebb5079c1bab4f1f6f11ee8ce2e590855a3af38e4bb871ef8400000000000000000000"]) mount(&(0x7f0000001b40)='./file0\x00', &(0x7f0000001b80)='./file0/file0\x00', &(0x7f0000002100)='vfat\x00', 0x0, &(0x7f0000002140)="98980e21ac8b46c0b7bedeee39e6bd9ae4088d6ab47dc9dc76a39e299ce3783aa33e482e450484961fd3e3c5b178fafbe54440e19512ea4298652ed129d4241d9d116d8a5c2b931d350f0c989f8a288fc9e56c") mount(&(0x7f0000df7000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='hugetlbfs\x00', 0x200, &(0x7f00000001c0)) mkdir(&(0x7f00000004c0)='./file0/file0\x00', 0x0) socketpair$inet(0x2, 0x0, 0x1f, &(0x7f0000000080)) [ 242.379713] FAULT_INJECTION: forcing a failure. [ 242.379713] name failslab, interval 1, probability 0, space 0, times 0 [ 242.391231] CPU: 0 PID: 16623 Comm: syz-executor3 Not tainted 4.16.0-rc6+ #43 [ 242.398520] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 242.407875] Call Trace: [ 242.410451] dump_stack+0x194/0x24d [ 242.414062] ? arch_local_irq_restore+0x53/0x53 [ 242.418711] ? __save_stack_trace+0x7e/0xd0 [ 242.423027] should_fail+0x8c0/0xa40 [ 242.426724] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 242.431808] ? kasan_kmalloc+0xad/0xe0 [ 242.435672] ? kmem_cache_alloc_trace+0x136/0x740 [ 242.440495] ? __memcg_init_list_lru_node+0x169/0x270 [ 242.445663] ? __list_lru_init+0x544/0x750 [ 242.449875] ? sget_userns+0x6b1/0xe40 [ 242.453745] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 242.458481] ? do_mount+0xea4/0x2bb0 [ 242.462172] ? SyS_mount+0xab/0x120 [ 242.465782] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 242.471129] ? find_held_lock+0x35/0x1d0 [ 242.475171] ? __lock_is_held+0xb6/0x140 [ 242.479220] ? check_same_owner+0x320/0x320 [ 242.483522] ? rcu_note_context_switch+0x710/0x710 [ 242.488463] should_failslab+0xec/0x120 [ 242.492424] kmem_cache_alloc_trace+0x4b/0x740 [ 242.496986] ? __kmalloc_node+0x33/0x70 [ 242.500938] ? __kmalloc_node+0x33/0x70 [ 242.504891] ? rcu_read_lock_sched_held+0x108/0x120 [ 242.509892] __memcg_init_list_lru_node+0x169/0x270 [ 242.514894] ? list_lru_add+0x7c0/0x7c0 [ 242.518853] ? __kmalloc_node+0x47/0x70 [ 242.522812] __list_lru_init+0x544/0x750 [ 242.526856] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 242.532721] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 242.537721] ? lockdep_init_map+0x9/0x10 [ 242.541767] sget_userns+0x6b1/0xe40 [ 242.545458] ? kernfs_sop_show_path+0x190/0x190 [ 242.550109] ? kernfs_sop_show_options+0x180/0x180 [ 242.555023] ? destroy_unused_super.part.6+0xd0/0xd0 [ 242.560114] ? check_same_owner+0x320/0x320 [ 242.564414] ? rcu_pm_notify+0xc0/0xc0 [ 242.568287] ? rcu_read_lock_sched_held+0x108/0x120 [ 242.573281] ? kmem_cache_alloc_trace+0x459/0x740 [ 242.578099] ? lock_downgrade+0x980/0x980 [ 242.582235] kernfs_mount_ns+0x13d/0x8b0 [ 242.586279] ? kernfs_super_ns+0x70/0x70 [ 242.590327] sysfs_mount+0xc2/0x1c0 [ 242.593934] ? sysfs_kill_sb+0x40/0x40 [ 242.597800] ? alloc_pages_current+0xbe/0x1e0 [ 242.602275] ? security_sb_copy_data+0x81/0xb0 [ 242.606837] mount_fs+0x66/0x2d0 [ 242.610185] vfs_kern_mount.part.26+0xc6/0x4a0 [ 242.614752] ? may_umount+0xa0/0xa0 [ 242.618360] ? _raw_read_unlock+0x22/0x30 [ 242.622486] ? __get_fs_type+0x8a/0xc0 [ 242.626354] do_mount+0xea4/0x2bb0 [ 242.629876] ? copy_mount_string+0x40/0x40 [ 242.634089] ? rcu_pm_notify+0xc0/0xc0 [ 242.637973] ? copy_mount_options+0x5f/0x2e0 [ 242.642358] ? rcu_read_lock_sched_held+0x108/0x120 [ 242.647353] ? kmem_cache_alloc_trace+0x459/0x740 [ 242.652176] ? kasan_check_write+0x14/0x20 [ 242.656874] ? _copy_from_user+0x99/0x110 [ 242.661008] ? copy_mount_options+0x1f7/0x2e0 [ 242.665491] SyS_mount+0xab/0x120 [ 242.668924] ? copy_mnt_ns+0xb30/0xb30 [ 242.672797] do_syscall_64+0x281/0x940 [ 242.676660] ? vmalloc_sync_all+0x30/0x30 [ 242.680787] ? _raw_spin_unlock_irq+0x27/0x70 [ 242.685264] ? finish_task_switch+0x1c1/0x7e0 [ 242.689737] ? syscall_return_slowpath+0x550/0x550 [ 242.694647] ? syscall_return_slowpath+0x2ac/0x550 [ 242.699557] ? prepare_exit_to_usermode+0x350/0x350 [ 242.704552] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 242.709896] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 242.714740] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 242.719916] RIP: 0033:0x454e79 [ 242.723086] RSP: 002b:00007fbfd4b96c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 2018/03/31 08:26:25 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x2}, 0x0, 0x0, 0x0, 0x3, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) socketpair(0x0, 0x4, 0x6, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) socketpair(0xf, 0x3, 0x2, &(0x7f0000000040)) 2018/03/31 08:26:25 executing program 3 (fault-call:10 fault-nth:29): r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000348f88)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r2}, 0x10) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) mount(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f00000002c0)='devpts\x00', 0x800000, &(0x7f0000000300)) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') [ 242.730775] RAX: ffffffffffffffda RBX: 00007fbfd4b976d4 RCX: 0000000000454e79 [ 242.738029] RDX: 0000000020000100 RSI: 0000000020000180 RDI: 0000000020000100 [ 242.745280] RBP: 000000000072bea0 R08: 0000000020000040 R09: 0000000000000000 [ 242.752529] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 242.759778] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000001c [ 242.979171] FAULT_INJECTION: forcing a failure. [ 242.979171] name failslab, interval 1, probability 0, space 0, times 0 [ 242.990480] CPU: 0 PID: 16634 Comm: syz-executor2 Not tainted 4.16.0-rc6+ #43 [ 242.997758] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 243.007116] Call Trace: [ 243.009706] dump_stack+0x194/0x24d [ 243.013336] ? arch_local_irq_restore+0x53/0x53 [ 243.017994] should_fail+0x8c0/0xa40 [ 243.021694] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 243.026787] ? save_stack+0x43/0xd0 [ 243.030393] ? kasan_kmalloc+0xad/0xe0 [ 243.034258] ? __kmalloc+0x162/0x760 [ 243.037950] ? __list_lru_init+0xcf/0x750 [ 243.042082] ? find_held_lock+0x35/0x1d0 [ 243.046129] ? __lock_is_held+0xb6/0x140 [ 243.050181] ? check_same_owner+0x320/0x320 [ 243.054487] ? rcu_note_context_switch+0x710/0x710 [ 243.059404] should_failslab+0xec/0x120 [ 243.063358] kmem_cache_alloc_node_trace+0x5a/0x760 [ 243.068353] ? mark_held_locks+0xaf/0x100 [ 243.072480] ? __raw_spin_lock_init+0x1c/0x100 [ 243.077046] __kmalloc_node+0x33/0x70 [ 243.080830] kvmalloc_node+0x99/0xd0 [ 243.084525] __list_lru_init+0x5d5/0x750 [ 243.088569] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 243.094432] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 243.099434] ? lockdep_init_map+0x9/0x10 [ 243.103476] sget_userns+0x6b1/0xe40 [ 243.107175] ? kernfs_sop_show_path+0x190/0x190 [ 243.111832] ? kernfs_sop_show_options+0x180/0x180 [ 243.116746] ? destroy_unused_super.part.6+0xd0/0xd0 [ 243.121839] ? check_same_owner+0x320/0x320 [ 243.126141] ? rcu_pm_notify+0xc0/0xc0 [ 243.130021] ? rcu_read_lock_sched_held+0x108/0x120 [ 243.135024] ? kmem_cache_alloc_trace+0x459/0x740 [ 243.139845] ? lock_downgrade+0x980/0x980 [ 243.143982] kernfs_mount_ns+0x13d/0x8b0 [ 243.148033] ? kernfs_super_ns+0x70/0x70 [ 243.152082] sysfs_mount+0xc2/0x1c0 [ 243.155691] ? sysfs_kill_sb+0x40/0x40 [ 243.159560] ? alloc_pages_current+0xbe/0x1e0 [ 243.164038] ? security_sb_copy_data+0x81/0xb0 [ 243.168603] mount_fs+0x66/0x2d0 [ 243.171952] vfs_kern_mount.part.26+0xc6/0x4a0 [ 243.176515] ? may_umount+0xa0/0xa0 [ 243.180121] ? _raw_read_unlock+0x22/0x30 [ 243.184248] ? __get_fs_type+0x8a/0xc0 [ 243.188118] do_mount+0xea4/0x2bb0 [ 243.191641] ? copy_mount_string+0x40/0x40 [ 243.195854] ? rcu_pm_notify+0xc0/0xc0 [ 243.199729] ? copy_mount_options+0x5f/0x2e0 [ 243.204115] ? rcu_read_lock_sched_held+0x108/0x120 [ 243.209112] ? kmem_cache_alloc_trace+0x459/0x740 [ 243.213936] ? kasan_check_write+0x14/0x20 [ 243.218149] ? _copy_from_user+0x99/0x110 [ 243.222281] ? copy_mount_options+0x1f7/0x2e0 [ 243.226759] SyS_mount+0xab/0x120 [ 243.230232] ? copy_mnt_ns+0xb30/0xb30 [ 243.234104] do_syscall_64+0x281/0x940 [ 243.237967] ? vmalloc_sync_all+0x30/0x30 [ 243.242091] ? _raw_spin_unlock_irq+0x27/0x70 [ 243.246568] ? finish_task_switch+0x1c1/0x7e0 [ 243.251044] ? syscall_return_slowpath+0x550/0x550 [ 243.255953] ? syscall_return_slowpath+0x2ac/0x550 [ 243.260862] ? prepare_exit_to_usermode+0x350/0x350 [ 243.265858] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 243.271203] ? trace_hardirqs_off_thunk+0x1a/0x1c 2018/03/31 08:26:26 executing program 1: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={0xffffffffffffffff, &(0x7f0000000700), &(0x7f00000009c0)=""/161}, 0x18) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)) r2 = getpid() r3 = perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x81, 0x4000000000000, 0x9, 0xff, 0x0, 0xf44, 0x5, 0x0, 0xfffffffffffffff9, 0x0, 0x69, 0x6, 0x7fff, 0x9, 0x2, 0x3, 0x80000000000000, 0x5, 0x80, 0x4000000000000000, 0x10, 0x101, 0x843, 0x2, 0x0, 0x1, 0x7, 0xb3c, 0x2, 0x5, 0x6, 0x800080000000, 0x8000, 0xfffffffffffffff7, 0x1000, 0x7ff, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000000c0), 0x5}, 0x0, 0x5ac, 0x80000000, 0x2, 0xfffffffffffff1ed, 0x1, 0xa23}, r2, 0xb, r0, 0x8) perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x6, 0x8, 0x3, 0xfc, 0x0, 0x4, 0x0, 0x0, 0x8, 0x4, 0x1f, 0x50e1, 0x101, 0x8, 0x9, 0x4, 0x5, 0xfd9, 0x8, 0x9, 0x7fff, 0x80000000, 0x5, 0x7, 0x4, 0x88, 0x4, 0x18, 0x5, 0xb1, 0x5ad, 0xa3, 0xad6, 0xffff, 0x7fffffff, 0x101, 0x0, 0x8, 0x6, @perf_config_ext={0x2, 0x2}, 0x818, 0xf751, 0x4, 0x6, 0x8, 0xfff, 0x99f0}, r2, 0x5, r3, 0x3) [ 243.276035] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 243.281201] RIP: 0033:0x454e79 [ 243.284369] RSP: 002b:00007f3ee2ac1c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 243.292069] RAX: ffffffffffffffda RBX: 00007f3ee2ac26d4 RCX: 0000000000454e79 [ 243.299318] RDX: 0000000020000100 RSI: 0000000020000180 RDI: 0000000020000100 [ 243.306565] RBP: 000000000072bea0 R08: 0000000020000040 R09: 0000000000000000 [ 243.313825] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 243.321073] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000016 [ 243.360182] devpts: called with bogus options [ 243.450918] devpts: called with bogus options [ 243.476828] FAULT_INJECTION: forcing a failure. [ 243.476828] name failslab, interval 1, probability 0, space 0, times 0 [ 243.477575] hugetlbfs: Bad mount option: "" [ 243.488265] CPU: 1 PID: 16656 Comm: syz-executor3 Not tainted 4.16.0-rc6+ #43 [ 243.488274] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 243.488279] Call Trace: [ 243.488296] dump_stack+0x194/0x24d [ 243.488312] ? arch_local_irq_restore+0x53/0x53 [ 243.488323] ? __save_stack_trace+0x7e/0xd0 [ 243.488344] should_fail+0x8c0/0xa40 [ 243.528171] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 243.533272] ? kasan_kmalloc+0xad/0xe0 [ 243.537156] ? kmem_cache_alloc_trace+0x136/0x740 [ 243.542002] ? __memcg_init_list_lru_node+0x169/0x270 [ 243.547193] ? __list_lru_init+0x544/0x750 [ 243.551436] ? sget_userns+0x6b1/0xe40 [ 243.555326] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 243.560082] ? do_mount+0xea4/0x2bb0 [ 243.563796] ? SyS_mount+0xab/0x120 [ 243.567423] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 243.572792] ? find_held_lock+0x35/0x1d0 [ 243.576861] ? __lock_is_held+0xb6/0x140 [ 243.580938] ? check_same_owner+0x320/0x320 [ 243.585261] ? rcu_note_context_switch+0x710/0x710 [ 243.590202] should_failslab+0xec/0x120 [ 243.594188] kmem_cache_alloc_trace+0x4b/0x740 [ 243.598773] ? __kmalloc_node+0x33/0x70 [ 243.602754] ? __kmalloc_node+0x33/0x70 [ 243.606729] ? rcu_read_lock_sched_held+0x108/0x120 [ 243.611753] __memcg_init_list_lru_node+0x169/0x270 [ 243.616782] ? list_lru_add+0x7c0/0x7c0 [ 243.620759] ? __kmalloc_node+0x47/0x70 [ 243.624736] __list_lru_init+0x544/0x750 [ 243.628798] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 243.634669] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 243.639670] ? lockdep_init_map+0x9/0x10 [ 243.643716] sget_userns+0x6b1/0xe40 [ 243.647411] ? kernfs_sop_show_path+0x190/0x190 [ 243.652066] ? kernfs_sop_show_options+0x180/0x180 [ 243.657064] ? destroy_unused_super.part.6+0xd0/0xd0 [ 243.662156] ? check_same_owner+0x320/0x320 [ 243.666459] ? rcu_pm_notify+0xc0/0xc0 [ 243.670336] ? rcu_read_lock_sched_held+0x108/0x120 [ 243.675345] ? kmem_cache_alloc_trace+0x459/0x740 [ 243.680427] ? lock_downgrade+0x980/0x980 [ 243.684565] kernfs_mount_ns+0x13d/0x8b0 [ 243.688786] ? kernfs_super_ns+0x70/0x70 [ 243.692839] sysfs_mount+0xc2/0x1c0 [ 243.696449] ? sysfs_kill_sb+0x40/0x40 [ 243.700318] ? alloc_pages_current+0xbe/0x1e0 [ 243.704800] ? security_sb_copy_data+0x81/0xb0 [ 243.709367] mount_fs+0x66/0x2d0 [ 243.712720] vfs_kern_mount.part.26+0xc6/0x4a0 [ 243.717283] ? may_umount+0xa0/0xa0 [ 243.720894] ? _raw_read_unlock+0x22/0x30 [ 243.725030] ? __get_fs_type+0x8a/0xc0 [ 243.728909] do_mount+0xea4/0x2bb0 [ 243.732435] ? copy_mount_string+0x40/0x40 [ 243.736651] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 243.741651] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 243.746394] ? retint_kernel+0x10/0x10 [ 243.750266] ? copy_mount_options+0x18b/0x2e0 [ 243.754741] ? copy_mount_options+0x191/0x2e0 [ 243.759219] ? copy_mount_options+0x1f7/0x2e0 [ 243.763713] SyS_mount+0xab/0x120 [ 243.767145] ? copy_mnt_ns+0xb30/0xb30 [ 243.771020] do_syscall_64+0x281/0x940 [ 243.774893] ? vmalloc_sync_all+0x30/0x30 [ 243.779026] ? _raw_spin_unlock_irq+0x27/0x70 [ 243.783507] ? finish_task_switch+0x1c1/0x7e0 [ 243.787982] ? syscall_return_slowpath+0x550/0x550 [ 243.792892] ? syscall_return_slowpath+0x2ac/0x550 [ 243.797801] ? prepare_exit_to_usermode+0x350/0x350 [ 243.802803] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 243.808153] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 243.812980] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 243.818152] RIP: 0033:0x454e79 [ 243.821322] RSP: 002b:00007fbfd4b96c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 243.829015] RAX: ffffffffffffffda RBX: 00007fbfd4b976d4 RCX: 0000000000454e79 [ 243.836282] RDX: 0000000020000100 RSI: 0000000020000180 RDI: 0000000020000100 [ 243.843531] RBP: 000000000072bea0 R08: 0000000020000040 R09: 0000000000000000 [ 243.850782] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 243.858038] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000001d 2018/03/31 08:26:26 executing program 2 (fault-call:9 fault-nth:23): r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000348f88)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r2}, 0x10) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') 2018/03/31 08:26:26 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x0, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r4 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000280)='fuseblk\x00', 0xa11800, &(0x7f0000000200)) mount(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f00000009c0)="3949bcf20271c219f64b9e3fbd45bfae692375440912d5a576c2d82299018de50363f2cf30a439b45c2738869283b7900c1e030013700557a768d5cc05cb9ed624684f4dfdae73a8148b29b2978222576dabbcb3556bcf35a8f66fa68ceb0b834ec5120ac749dc0cc5aab7b0197711785349b1673ff5159bc1a40df6c779950e0747a25ce77a10f68b663a87fc993224a79b583eac02a2171f076ff3", 0x1000, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) 2018/03/31 08:26:26 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000000003042df8700"]) r1 = perf_event_open(&(0x7f0000348f88)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r2}, 0x10) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) mount(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, &(0x7f0000000300)="7b18f1563c67659c49445440cbb57f32c0f4710f0219046399f3e8a25c5d4975e2b42f404b14937bd42d9874bdd132eef77f584d5151c9a97470a0d77a0c24a85e319673350e16b039bf474ec320") socketpair(0x3, 0x800, 0x81, &(0x7f00000003c0)) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') 2018/03/31 08:26:26 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) socketpair(0x0, 0x4, 0x6, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) socketpair(0xf, 0x3, 0x2, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000000)=0xf6) 2018/03/31 08:26:26 executing program 7: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x80000000000, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000001fc0)) sendmsg(0xffffffffffffffff, &(0x7f00000024c0)={&(0x7f0000002040)=@un=@file={0x0, './file0\x00'}, 0x80, &(0x7f0000001f40)=[{&(0x7f00000020c0)="73c7575b94a72990e177f86ed4835a72a65c1a6c6831eeb0c48163a47ab63bcb605c8450cc4798ff6521c2aa722d1a7105c8a07e6c", 0x35}], 0x1, &(0x7f0000002500)=ANY=[], 0x0, 0x40000}, 0x20000000) r2 = gettid() r3 = perf_event_open(&(0x7f0000001ac0)={0x1, 0x70, 0xffffffff, 0x835, 0x9, 0xffffffffffffff5f, 0x0, 0x1000, 0x42000, 0x3, 0x8, 0x80, 0x1, 0x4, 0x100000001, 0x9, 0xff, 0x8, 0x1000, 0x7, 0x7f, 0x200, 0xb715, 0x3, 0x7fffffff, 0xf0a, 0x40, 0x8000, 0x8, 0x7, 0xffffffffffffff74, 0x4, 0x6, 0x100, 0x7, 0x335, 0x3ff, 0x58, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000001a80), 0xe}, 0x0, 0x80000000, 0x82, 0x7, 0x5, 0x3, 0x80000001}, r2, 0xd, r1, 0x8) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000200)='mqueue\x00', 0x0, &(0x7f000000a000)) r4 = getpid() r5 = bpf$PROG_LOAD(0x5, &(0x7f0000002500)={0xf, 0x7, &(0x7f0000001940)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, [@ldst={0x3, 0x3, 0x3, 0x4, 0x3, 0x2}, @exit={0x95}], {0x95}}, &(0x7f0000001980)='GPL\x00', 0xff, 0x1000, &(0x7f00000039c0)=""/4096, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000019c0)={&(0x7f0000000180)='./file0\x00', r5}, 0x10) perf_event_open(&(0x7f0000001a00)={0x0, 0x70, 0x0, 0x8, 0x0, 0x3, 0x0, 0xb8, 0x1000, 0x0, 0x3, 0x4, 0xfff, 0x4, 0x4dae, 0x40, 0x100000001, 0x6, 0x4, 0x0, 0x3, 0x753c, 0x6, 0x100, 0x1de, 0x6, 0x4, 0x1, 0x6, 0x4, 0x7, 0x3, 0x7fff, 0x80000000, 0x3, 0x8, 0x81, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x7, 0x4}, 0x801, 0x400, 0x1, 0x4, 0x1, 0x9, 0x80000001}, r4, 0x7, r1, 0xb) r6 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000004000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000001c00)='./file0\x00', &(0x7f0000001c40)='./file0\x00', &(0x7f0000001c80)='devpts\x00', 0x40, &(0x7f0000001cc0)="be623dfd58807ac0b2f86f052863a5f30adc0bce173ebcf648cefd7d64732aeb5b94e6af3ab33e53669ba6d304d067dad4b1ff3ed87f18fd170aac904e8f105e80e22881717c98752a9cd7cfb06d102877e3b36b2624d22427331755a9514b225d25999ed605ffe4188630db2e7ddcc57f6316b60c4f3845d9dfcbbde5e49af627b48d7c9bd743b536de31a9ba3010cb6714c9b90a50537be55ca12a18e6541bff5a82d293e7734ea9c90707899663bd96b3bcce5887bf0bd35963c5adc39ddcb6f2a0a02b01661242046cb54ef1aec5a486b69e006305064124867bf79f4dc11798e214b61575168b79887122e0a3461f703c077f902c0a") socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r7, &(0x7f0000001800)={&(0x7f0000000240)=@alg, 0x80, &(0x7f0000000740)=[{&(0x7f00000002c0)=""/83, 0x53}, {&(0x7f0000000340)=""/27, 0x1b}, {&(0x7f0000000380)}, {&(0x7f00000003c0)=""/40, 0x28}, {&(0x7f0000000400)=""/144, 0x90}, {&(0x7f00000004c0)=""/200, 0xc8}, {&(0x7f00000005c0)=""/60, 0x3c}, {&(0x7f0000000600)=""/105, 0x69}, {&(0x7f0000000680)=""/127, 0x7f}, {&(0x7f0000000700)=""/8, 0x8}], 0xa, &(0x7f0000000800)=""/4096, 0x1000}, 0x10000) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000002340)=0xf60) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000003900)={&(0x7f0000003400)=@can={0x0, 0x0}, 0x80, &(0x7f0000003840)=[{&(0x7f0000003480)=""/194, 0xc2}, {&(0x7f0000003580)=""/250, 0xfa}, {&(0x7f0000003680)=""/100, 0x64}, {&(0x7f0000003700)=""/14, 0xe}, {&(0x7f0000003740)=""/159, 0x9f}, {&(0x7f0000003800)=""/15, 0xf}], 0x6, &(0x7f00000038c0)=""/29, 0x1d, 0x5}, 0x3) bpf$PROG_LOAD(0x5, &(0x7f0000003940)={0x4, 0x9, &(0x7f0000001840)=ANY=[@ANYBLOB="18000000030000000000000003000000dfd00c00fcffffff0000000000000000000803000101000000810000000000000001f0fff0ffffff000000000000000095000000000017d2"], &(0x7f0000000380)='GPL\x00', 0xf172, 0x4b, &(0x7f00000018c0)=""/75, 0x41f00, 0x1, [], r8}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000000c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001f00)={0xffffffffffffffff, 0x0, 0xf6, 0x22, &(0x7f0000001dc0)="9ef9482ea02fd36d0a768986a7ebe7a627dc88937e7073e3521858dfa0d5e02f571a01cfdfa76e048e5f956ea5da60b90e02a6c3d3687ed61ec9ab5b682c02498bddef38de9ce8c753e41e78f414d16202a033b6c7752711a5f56924e7846d6dcde2f71026e1eb0319b5e60f6b1ec67fca31c3cf1691d3af91a19f56be5a10ff337a53ba13dd3d75e1555211954b92ec0082d02b7b4cdddc021cbe84e4af8f20788977e3416918843e6c92b2ebf7b8b33ecbd4c7c9a9d5036c3e3e538748a32f1a28eb77818ca1878ffdd445dcdb8a40e6221e0fc474428449dfe93c62bbc69996aa9b34488c1da4f6f7c2275305a6a4fb256c1a516d", &(0x7f0000001ec0)=""/34, 0x1f, 0x1}, 0x28) close(r6) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x3441, &(0x7f0000000080)) mount(&(0x7f00000021c0)='./file0/file0\x00', &(0x7f0000002200)='./file0/file0\x00', &(0x7f0000002240)='fuse\x00', 0x2000000, &(0x7f0000002280)="9b3923bfddc346e9fa2aeaffae6ca386d8d50ba83ab72218340d3c30c045a89ac016797652ba04f1a203cfceccb458dbfd9fd03c4a80ef9a40dc7a4f24b6619d04a58186466fd8465757d9ee053c082cdfa957e7efab6191761847cca59c017493ef5e3d22432cf0b4ebef") ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f00000023c0)=ANY=[@ANYBLOB="07000000000000000000000000000000000000000000000000000000000000000000000067eb0ecf1cfa4ffd89aa7e339417beb7d332a5c996e59875644dd1e3a690110400bc751bb0435977d90fcbb2b83c27812d818991d125e9c0f199be2bc7f01aa0a5cb9b9f99438aa0f1ae3d50201f7bb276536f567f03f062994da292b6db0000000000000000000000000000a93536f303000000000000002a27f6ae1258ebb5079c1bab4f1f6f11ee8ce2e590855a3af38e4bb871ef8400000000000000000000"]) mount(&(0x7f0000001b40)='./file0\x00', &(0x7f0000001b80)='./file0/file0\x00', &(0x7f0000002100)='vfat\x00', 0x0, &(0x7f0000002140)="98980e21ac8b46c0b7bedeee39e6bd9ae4088d6ab47dc9dc76a39e299ce3783aa33e482e450484961fd3e3c5b178fafbe54440e19512ea4298652ed129d4241d9d116d8a5c2b931d350f0c989f8a288fc9e56c") mount(&(0x7f0000df7000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='hugetlbfs\x00', 0x200, &(0x7f00000001c0)) mkdir(&(0x7f00000004c0)='./file0/file0\x00', 0x0) socketpair$inet(0x2, 0x0, 0x1f, &(0x7f0000000080)) 2018/03/31 08:26:26 executing program 3 (fault-call:10 fault-nth:30): r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000348f88)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r2}, 0x10) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) mount(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f00000002c0)='devpts\x00', 0x800000, &(0x7f0000000300)) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') 2018/03/31 08:26:26 executing program 1: mkdir(&(0x7f00000002c0)='./file0\x00', 0x120) r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000380)={0x5, 0x2, 0x3f, 0x3ba9c8ff, 0xe, r0, 0x6c57}, 0x2c) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000180)={&(0x7f0000000100)='./file0/file0\x00', 0x0, 0x18}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000240)={&(0x7f00000000c0)='./file0\x00', r1}, 0x10) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={0xffffffffffffffff, &(0x7f0000000700), &(0x7f00000009c0)=""/161}, 0x18) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000300)='\x00') mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000340)='\x00') 2018/03/31 08:26:26 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) socketpair(0x0, 0x4, 0x6, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_icmp(0xa, 0x2, 0x3a, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) socketpair(0xf, 0x3, 0x2, &(0x7f0000000040)) [ 244.091380] devpts: called with bogus options [ 244.092998] FAULT_INJECTION: forcing a failure. [ 244.092998] name failslab, interval 1, probability 0, space 0, times 0 [ 244.107189] CPU: 1 PID: 16677 Comm: syz-executor2 Not tainted 4.16.0-rc6+ #43 [ 244.114467] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 244.123813] Call Trace: [ 244.126402] dump_stack+0x194/0x24d [ 244.130033] ? arch_local_irq_restore+0x53/0x53 [ 244.134724] should_fail+0x8c0/0xa40 [ 244.138439] ? is_bpf_text_address+0xa4/0x120 [ 244.142938] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 244.148041] ? __kernel_text_address+0xd/0x40 [ 244.152540] ? unwind_get_return_address+0x61/0xa0 [ 244.157477] ? find_held_lock+0x35/0x1d0 [ 244.161544] ? __lock_is_held+0xb6/0x140 [ 244.165611] ? check_same_owner+0x320/0x320 [ 244.169935] ? rcu_note_context_switch+0x710/0x710 [ 244.174870] should_failslab+0xec/0x120 [ 244.178847] kmem_cache_alloc_trace+0x4b/0x740 [ 244.183434] ? __kmalloc_node+0x33/0x70 [ 244.187406] ? __kmalloc_node+0x33/0x70 [ 244.191381] ? rcu_read_lock_sched_held+0x108/0x120 [ 244.196404] __memcg_init_list_lru_node+0x169/0x270 [ 244.201422] ? list_lru_add+0x7c0/0x7c0 [ 244.205395] ? __kmalloc_node+0x47/0x70 [ 244.209373] __list_lru_init+0x544/0x750 [ 244.213435] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 244.219321] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 244.224343] ? lockdep_init_map+0x9/0x10 [ 244.228408] sget_userns+0x6b1/0xe40 [ 244.232122] ? kernfs_sop_show_path+0x190/0x190 [ 244.236796] ? kernfs_sop_show_options+0x180/0x180 2018/03/31 08:26:27 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000000003042df8700"]) r1 = perf_event_open(&(0x7f0000348f88)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r2}, 0x10) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) mount(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, &(0x7f0000000300)="7b18f1563c67659c49445440cbb57f32c0f4710f0219046399f3e8a25c5d4975e2b42f404b14937bd42d9874bdd132eef77f584d5151c9a97470a0d77a0c24a85e319673350e16b039bf474ec320") socketpair(0x3, 0x800, 0x81, &(0x7f00000003c0)) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') [ 244.241726] ? destroy_unused_super.part.6+0xd0/0xd0 [ 244.246833] ? check_same_owner+0x320/0x320 [ 244.251154] ? rcu_pm_notify+0xc0/0xc0 [ 244.255049] ? rcu_read_lock_sched_held+0x108/0x120 [ 244.260062] ? kmem_cache_alloc_trace+0x459/0x740 [ 244.264898] ? lock_downgrade+0x980/0x980 [ 244.269051] kernfs_mount_ns+0x13d/0x8b0 [ 244.273098] ? kernfs_super_ns+0x70/0x70 [ 244.277152] sysfs_mount+0xc2/0x1c0 [ 244.280774] ? sysfs_kill_sb+0x40/0x40 [ 244.284643] ? alloc_pages_current+0xbe/0x1e0 [ 244.289123] ? security_sb_copy_data+0x81/0xb0 [ 244.293692] mount_fs+0x66/0x2d0 [ 244.297048] vfs_kern_mount.part.26+0xc6/0x4a0 [ 244.301612] ? may_umount+0xa0/0xa0 [ 244.305220] ? _raw_read_unlock+0x22/0x30 [ 244.309348] ? __get_fs_type+0x8a/0xc0 [ 244.313226] do_mount+0xea4/0x2bb0 [ 244.316752] ? copy_mount_string+0x40/0x40 [ 244.320971] ? rcu_pm_notify+0xc0/0xc0 [ 244.324848] ? copy_mount_options+0x5f/0x2e0 [ 244.329235] ? rcu_read_lock_sched_held+0x108/0x120 [ 244.334232] ? kmem_cache_alloc_trace+0x459/0x740 [ 244.339060] ? kasan_check_write+0x14/0x20 [ 244.343278] ? _copy_from_user+0x99/0x110 [ 244.347412] ? copy_mount_options+0x1f7/0x2e0 [ 244.351893] SyS_mount+0xab/0x120 [ 244.355326] ? copy_mnt_ns+0xb30/0xb30 [ 244.359201] do_syscall_64+0x281/0x940 [ 244.363068] ? vmalloc_sync_all+0x30/0x30 [ 244.367197] ? _raw_spin_unlock_irq+0x27/0x70 [ 244.372108] ? finish_task_switch+0x1c1/0x7e0 [ 244.376582] ? syscall_return_slowpath+0x550/0x550 [ 244.381488] ? syscall_return_slowpath+0x2ac/0x550 [ 244.386399] ? prepare_exit_to_usermode+0x350/0x350 [ 244.391396] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 244.396743] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 244.401570] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 244.406736] RIP: 0033:0x454e79 [ 244.409902] RSP: 002b:00007f3ee2ac1c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 244.417590] RAX: ffffffffffffffda RBX: 00007f3ee2ac26d4 RCX: 0000000000454e79 [ 244.424838] RDX: 0000000020000100 RSI: 0000000020000180 RDI: 0000000020000100 [ 244.432088] RBP: 000000000072bea0 R08: 0000000020000040 R09: 0000000000000000 [ 244.439334] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 244.446582] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000017 [ 244.476786] FAULT_INJECTION: forcing a failure. [ 244.476786] name failslab, interval 1, probability 0, space 0, times 0 [ 244.488836] CPU: 1 PID: 16690 Comm: syz-executor3 Not tainted 4.16.0-rc6+ #43 [ 244.496113] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 244.505463] Call Trace: [ 244.508057] dump_stack+0x194/0x24d [ 244.511689] ? arch_local_irq_restore+0x53/0x53 [ 244.516364] ? __save_stack_trace+0x7e/0xd0 [ 244.520699] should_fail+0x8c0/0xa40 [ 244.524422] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 244.529215] devpts: called with bogus options [ 244.529526] ? kasan_kmalloc+0xad/0xe0 [ 244.537879] ? kmem_cache_alloc_trace+0x136/0x740 2018/03/31 08:26:27 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x0, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r4 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f00000009c0)="3949bcf20271c219f64b9e3fbd45bfae692375440912d5a576c2d82299018de50363f2cf30a439b45c2738869283b7900c1e030013700557a768d5cc05cb9ed624684f4dfdae73a8148b29b2978222576dabbcb3556bcf35a8f66fa68ceb0b834ec5120ac749dc0cc5aab7b0197711785349b1673ff5159bc1a40df6c779950e0747a25ce77a10f68b663a87fc993224a79b583eac02a2171f076ff3", 0x1000, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x1, 0xa0, 0x2, 0xb0, 0x19, 0xffffffffffffffff, 0x3}, 0x2c) close(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f0000000280)='keyring\x00') [ 244.542722] ? __memcg_init_list_lru_node+0x169/0x270 [ 244.547908] ? __list_lru_init+0x544/0x750 [ 244.552144] ? sget_userns+0x6b1/0xe40 [ 244.556030] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 244.560785] ? do_mount+0xea4/0x2bb0 [ 244.564493] ? SyS_mount+0xab/0x120 [ 244.568118] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 244.573486] ? find_held_lock+0x35/0x1d0 [ 244.577568] ? __lock_is_held+0xb6/0x140 [ 244.581641] ? check_same_owner+0x320/0x320 [ 244.585972] ? rcu_note_context_switch+0x710/0x710 2018/03/31 08:26:27 executing program 2 (fault-call:9 fault-nth:24): r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000348f88)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r2}, 0x10) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') [ 244.590907] should_failslab+0xec/0x120 [ 244.594880] kmem_cache_alloc_trace+0x4b/0x740 [ 244.599462] ? __kmalloc_node+0x33/0x70 [ 244.603278] hugetlbfs: Bad mount option: "" [ 244.603428] ? __kmalloc_node+0x33/0x70 [ 244.603442] ? rcu_read_lock_sched_held+0x108/0x120 [ 244.603458] __memcg_init_list_lru_node+0x169/0x270 [ 244.621797] ? list_lru_add+0x7c0/0x7c0 [ 244.625764] ? __kmalloc_node+0x47/0x70 [ 244.629732] __list_lru_init+0x544/0x750 [ 244.633787] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 244.639679] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 244.644697] ? lockdep_init_map+0x9/0x10 [ 244.648742] sget_userns+0x6b1/0xe40 [ 244.651685] devpts: called with bogus options [ 244.652439] ? kernfs_sop_show_path+0x190/0x190 [ 244.652455] ? kernfs_sop_show_options+0x180/0x180 [ 244.652467] ? destroy_unused_super.part.6+0xd0/0xd0 [ 244.652486] ? check_same_owner+0x320/0x320 [ 244.652498] ? rcu_pm_notify+0xc0/0xc0 [ 244.680892] ? rcu_read_lock_sched_held+0x108/0x120 [ 244.685911] ? kmem_cache_alloc_trace+0x459/0x740 2018/03/31 08:26:27 executing program 7: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x80000000000, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000001fc0)) sendmsg(0xffffffffffffffff, &(0x7f00000024c0)={&(0x7f0000002040)=@un=@file={0x0, './file0\x00'}, 0x80, &(0x7f0000001f40)=[{&(0x7f00000020c0)="73c7575b94a72990e177f86ed4835a72a65c1a6c6831eeb0c48163a47ab63bcb605c8450cc4798ff6521c2aa722d1a7105c8a07e6c", 0x35}], 0x1, &(0x7f0000002500)=ANY=[], 0x0, 0x40000}, 0x20000000) r2 = gettid() r3 = perf_event_open(&(0x7f0000001ac0)={0x1, 0x70, 0xffffffff, 0x835, 0x9, 0xffffffffffffff5f, 0x0, 0x1000, 0x42000, 0x3, 0x8, 0x80, 0x1, 0x4, 0x100000001, 0x9, 0xff, 0x8, 0x1000, 0x7, 0x7f, 0x200, 0xb715, 0x3, 0x7fffffff, 0xf0a, 0x40, 0x8000, 0x8, 0x7, 0xffffffffffffff74, 0x4, 0x6, 0x100, 0x7, 0x335, 0x3ff, 0x58, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000001a80), 0xe}, 0x0, 0x80000000, 0x82, 0x7, 0x5, 0x3, 0x80000001}, r2, 0xd, r1, 0x8) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000200)='mqueue\x00', 0x0, &(0x7f000000a000)) r4 = getpid() r5 = bpf$PROG_LOAD(0x5, &(0x7f0000002500)={0xf, 0x5, &(0x7f0000001940)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, [@ldst={0x3, 0x3, 0x3, 0x4, 0x3, 0x2, 0xffffffffffffffff}], {0x95}}, &(0x7f0000001980)='GPL\x00', 0xff, 0x1000, &(0x7f00000039c0)=""/4096, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000019c0)={&(0x7f0000000180)='./file0\x00', r5}, 0x10) perf_event_open(&(0x7f0000001a00)={0x0, 0x70, 0x0, 0x8, 0x0, 0x3, 0x0, 0xb8, 0x1000, 0x0, 0x3, 0x4, 0xfff, 0x4, 0x4dae, 0x40, 0x100000001, 0x6, 0x4, 0x0, 0x3, 0x753c, 0x6, 0x100, 0x1de, 0x6, 0x4, 0x1, 0x6, 0x4, 0x7, 0x3, 0x7fff, 0x80000000, 0x3, 0x8, 0x81, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x7, 0x4}, 0x801, 0x400, 0x1, 0x4, 0x1, 0x9, 0x80000001}, r4, 0x7, r1, 0xb) r6 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000004000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000001c00)='./file0\x00', &(0x7f0000001c40)='./file0\x00', &(0x7f0000001c80)='devpts\x00', 0x40, &(0x7f0000001cc0)="be623dfd58807ac0b2f86f052863a5f30adc0bce173ebcf648cefd7d64732aeb5b94e6af3ab33e53669ba6d304d067dad4b1ff3ed87f18fd170aac904e8f105e80e22881717c98752a9cd7cfb06d102877e3b36b2624d22427331755a9514b225d25999ed605ffe4188630db2e7ddcc57f6316b60c4f3845d9dfcbbde5e49af627b48d7c9bd743b536de31a9ba3010cb6714c9b90a50537be55ca12a18e6541bff5a82d293e7734ea9c90707899663bd96b3bcce5887bf0bd35963c5adc39ddcb6f2a0a02b01661242046cb54ef1aec5a486b69e006305064124867bf79f4dc11798e214b61575168b79887122e0a3461f703c077f902c0a") socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r7, &(0x7f0000001800)={&(0x7f0000000240)=@alg, 0x80, &(0x7f0000000740)=[{&(0x7f00000002c0)=""/83, 0x53}, {&(0x7f0000000340)=""/27, 0x1b}, {&(0x7f0000000380)}, {&(0x7f00000003c0)=""/40, 0x28}, {&(0x7f0000000400)=""/144, 0x90}, {&(0x7f00000004c0)=""/200, 0xc8}, {&(0x7f00000005c0)=""/60, 0x3c}, {&(0x7f0000000600)=""/105, 0x69}, {&(0x7f0000000680)=""/127, 0x7f}, {&(0x7f0000000700)=""/8, 0x8}], 0xa, &(0x7f0000000800)=""/4096, 0x1000}, 0x10000) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000002340)=0xf60) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000003900)={&(0x7f0000003400)=@can={0x0, 0x0}, 0x80, &(0x7f0000003840)=[{&(0x7f0000003480)=""/194, 0xc2}, {&(0x7f0000003580)=""/250, 0xfa}, {&(0x7f0000003680)=""/100, 0x64}, {&(0x7f0000003700)=""/14, 0xe}, {&(0x7f0000003740)=""/159, 0x9f}, {&(0x7f0000003800)=""/15, 0xf}], 0x6, &(0x7f00000038c0)=""/29, 0x1d, 0x5}, 0x3) bpf$PROG_LOAD(0x5, &(0x7f0000003940)={0x4, 0x9, &(0x7f0000001840)=ANY=[@ANYBLOB="18000000030000000000000003000000dfd00c00fcffffff0000000000000000000803000101000000810000000000000001f0fff0ffffff000000000000000095000000000017d2"], &(0x7f0000000380)='GPL\x00', 0xf172, 0x4b, &(0x7f00000018c0)=""/75, 0x41f00, 0x1, [], r8}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000000c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001f00)={0xffffffffffffffff, 0x0, 0xf6, 0x22, &(0x7f0000001dc0)="9ef9482ea02fd36d0a768986a7ebe7a627dc88937e7073e3521858dfa0d5e02f571a01cfdfa76e048e5f956ea5da60b90e02a6c3d3687ed61ec9ab5b682c02498bddef38de9ce8c753e41e78f414d16202a033b6c7752711a5f56924e7846d6dcde2f71026e1eb0319b5e60f6b1ec67fca31c3cf1691d3af91a19f56be5a10ff337a53ba13dd3d75e1555211954b92ec0082d02b7b4cdddc021cbe84e4af8f20788977e3416918843e6c92b2ebf7b8b33ecbd4c7c9a9d5036c3e3e538748a32f1a28eb77818ca1878ffdd445dcdb8a40e6221e0fc474428449dfe93c62bbc69996aa9b34488c1da4f6f7c2275305a6a4fb256c1a516d", &(0x7f0000001ec0)=""/34, 0x1f, 0x1}, 0x28) close(r6) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x3441, &(0x7f0000000080)) mount(&(0x7f00000021c0)='./file0/file0\x00', &(0x7f0000002200)='./file0/file0\x00', &(0x7f0000002240)='fuse\x00', 0x2000000, &(0x7f0000002280)="9b3923bfddc346e9fa2aeaffae6ca386d8d50ba83ab72218340d3c30c045a89ac016797652ba04f1a203cfceccb458dbfd9fd03c4a80ef9a40dc7a4f24b6619d04a58186466fd8465757d9ee053c082cdfa957e7efab6191761847cca59c017493ef5e3d22432cf0b4ebef") ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f00000023c0)=ANY=[@ANYBLOB="07000000000000000000000000000000000000000000000000000000000000000000000067eb0ecf1cfa4ffd89aa7e339417beb7d332a5c996e59875644dd1e3a690110400bc751bb0435977d90fcbb2b83c27812d818991d125e9c0f199be2bc7f01aa0a5cb9b9f99438aa0f1ae3d50201f7bb276536f567f03f062994da292b6db0000000000000000000000000000a93536f303000000000000002a27f6ae1258ebb5079c1bab4f1f6f11ee8ce2e590855a3af38e4bb871ef8400000000000000000000"]) mount(&(0x7f0000001b40)='./file0\x00', &(0x7f0000001b80)='./file0/file0\x00', &(0x7f0000002100)='vfat\x00', 0x0, &(0x7f0000002140)="98980e21ac8b46c0b7bedeee39e6bd9ae4088d6ab47dc9dc76a39e299ce3783aa33e482e450484961fd3e3c5b178fafbe54440e19512ea4298652ed129d4241d9d116d8a5c2b931d350f0c989f8a288fc9e56c") mount(&(0x7f0000df7000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='hugetlbfs\x00', 0x200, &(0x7f00000001c0)) mkdir(&(0x7f00000004c0)='./file0/file0\x00', 0x0) socketpair$inet(0x2, 0x0, 0x1f, &(0x7f0000000080)) [ 244.690756] ? lock_downgrade+0x980/0x980 [ 244.694913] kernfs_mount_ns+0x13d/0x8b0 [ 244.698975] ? kernfs_super_ns+0x70/0x70 [ 244.703041] sysfs_mount+0xc2/0x1c0 [ 244.706665] ? sysfs_kill_sb+0x40/0x40 [ 244.710553] ? alloc_pages_current+0xbe/0x1e0 [ 244.715050] ? security_sb_copy_data+0x81/0xb0 [ 244.719630] mount_fs+0x66/0x2d0 [ 244.723001] vfs_kern_mount.part.26+0xc6/0x4a0 [ 244.727578] ? may_umount+0xa0/0xa0 [ 244.731205] ? _raw_read_unlock+0x22/0x30 [ 244.735349] ? __get_fs_type+0x8a/0xc0 [ 244.739240] do_mount+0xea4/0x2bb0 [ 244.742777] ? copy_mount_string+0x40/0x40 [ 244.747000] ? rcu_pm_notify+0xc0/0xc0 [ 244.750891] ? copy_mount_options+0x5f/0x2e0 [ 244.755297] ? rcu_read_lock_sched_held+0x108/0x120 [ 244.760308] ? kmem_cache_alloc_trace+0x459/0x740 [ 244.765142] ? kasan_check_write+0x14/0x20 [ 244.769365] ? _copy_from_user+0x99/0x110 [ 244.773503] ? copy_mount_options+0x1f7/0x2e0 [ 244.777987] SyS_mount+0xab/0x120 [ 244.781427] ? copy_mnt_ns+0xb30/0xb30 [ 244.785303] do_syscall_64+0x281/0x940 [ 244.789179] ? vmalloc_sync_all+0x30/0x30 2018/03/31 08:26:27 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000000003042df8700"]) r1 = perf_event_open(&(0x7f0000348f88)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r2}, 0x10) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) mount(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f00000002c0)='devpts\x00', 0x800000, &(0x7f0000000300)) socketpair(0x3, 0x800, 0x81, &(0x7f00000003c0)) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') [ 244.793313] ? _raw_spin_unlock_irq+0x27/0x70 [ 244.797807] ? finish_task_switch+0x1c1/0x7e0 [ 244.802294] ? syscall_return_slowpath+0x550/0x550 [ 244.807216] ? syscall_return_slowpath+0x2ac/0x550 [ 244.812143] ? prepare_exit_to_usermode+0x350/0x350 [ 244.817160] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 244.822526] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 244.827356] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 244.832530] RIP: 0033:0x454e79 [ 244.835706] RSP: 002b:00007fbfd4b96c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 2018/03/31 08:26:27 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080)={&(0x7f0000000000)='./file0\x00', 0x0, 0x10}, 0x10) socketpair(0x0, 0x4, 0x6, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) socketpair(0xf, 0x3, 0x2, &(0x7f0000000040)) [ 244.843398] RAX: ffffffffffffffda RBX: 00007fbfd4b976d4 RCX: 0000000000454e79 [ 244.850656] RDX: 0000000020000100 RSI: 0000000020000180 RDI: 0000000020000100 [ 244.857919] RBP: 000000000072bea0 R08: 0000000020000040 R09: 0000000000000000 [ 244.865178] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 244.872445] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000001e 2018/03/31 08:26:27 executing program 3 (fault-call:10 fault-nth:31): r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000348f88)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r2}, 0x10) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) mount(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f00000002c0)='devpts\x00', 0x800000, &(0x7f0000000300)) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') 2018/03/31 08:26:27 executing program 1: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f00000000c0)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000200)='nfs4\x00', 0x20090, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={0xffffffffffffffff, &(0x7f0000000700), &(0x7f00000009c0)=""/161}, 0x18) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)) [ 245.038654] FAULT_INJECTION: forcing a failure. [ 245.038654] name failslab, interval 1, probability 0, space 0, times 0 [ 245.049967] CPU: 0 PID: 16719 Comm: syz-executor2 Not tainted 4.16.0-rc6+ #43 [ 245.057242] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 245.066581] Call Trace: [ 245.069151] dump_stack+0x194/0x24d [ 245.072756] ? arch_local_irq_restore+0x53/0x53 [ 245.077403] ? __save_stack_trace+0x7e/0xd0 [ 245.081713] should_fail+0x8c0/0xa40 [ 245.085405] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 245.090483] ? kasan_kmalloc+0xad/0xe0 [ 245.094355] ? kmem_cache_alloc_trace+0x136/0x740 [ 245.099176] ? __memcg_init_list_lru_node+0x169/0x270 [ 245.104339] ? __list_lru_init+0x544/0x750 [ 245.108548] ? sget_userns+0x6b1/0xe40 [ 245.112414] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 245.117141] ? do_mount+0xea4/0x2bb0 [ 245.120834] ? SyS_mount+0xab/0x120 [ 245.124449] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 245.129802] ? find_held_lock+0x35/0x1d0 [ 245.133856] ? __lock_is_held+0xb6/0x140 [ 245.137905] ? check_same_owner+0x320/0x320 [ 245.142213] ? rcu_note_context_switch+0x710/0x710 [ 245.147123] should_failslab+0xec/0x120 [ 245.151085] kmem_cache_alloc_trace+0x4b/0x740 [ 245.155646] ? __kmalloc_node+0x33/0x70 [ 245.159596] ? __kmalloc_node+0x33/0x70 [ 245.163544] ? rcu_read_lock_sched_held+0x108/0x120 [ 245.168538] __memcg_init_list_lru_node+0x169/0x270 [ 245.173542] ? list_lru_add+0x7c0/0x7c0 [ 245.177499] ? __kmalloc_node+0x47/0x70 [ 245.181450] __list_lru_init+0x544/0x750 [ 245.185489] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 245.191351] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 245.196344] ? lockdep_init_map+0x9/0x10 [ 245.200389] sget_userns+0x6b1/0xe40 [ 245.204078] ? kernfs_sop_show_path+0x190/0x190 [ 245.208745] ? kernfs_sop_show_options+0x180/0x180 [ 245.213664] ? destroy_unused_super.part.6+0xd0/0xd0 [ 245.218746] ? check_same_owner+0x320/0x320 [ 245.223053] ? rcu_pm_notify+0xc0/0xc0 [ 245.226927] ? rcu_read_lock_sched_held+0x108/0x120 [ 245.231918] ? kmem_cache_alloc_trace+0x459/0x740 [ 245.236739] ? lock_downgrade+0x980/0x980 [ 245.240876] kernfs_mount_ns+0x13d/0x8b0 [ 245.244921] ? kernfs_super_ns+0x70/0x70 [ 245.248969] sysfs_mount+0xc2/0x1c0 [ 245.252576] ? sysfs_kill_sb+0x40/0x40 [ 245.256451] ? alloc_pages_current+0xbe/0x1e0 [ 245.260929] ? security_sb_copy_data+0x81/0xb0 [ 245.265486] mount_fs+0x66/0x2d0 [ 245.268827] vfs_kern_mount.part.26+0xc6/0x4a0 [ 245.273385] ? may_umount+0xa0/0xa0 [ 245.276988] ? _raw_read_unlock+0x22/0x30 [ 245.281114] ? __get_fs_type+0x8a/0xc0 [ 245.284977] do_mount+0xea4/0x2bb0 [ 245.288495] ? copy_mount_string+0x40/0x40 [ 245.292710] ? rcu_pm_notify+0xc0/0xc0 [ 245.296576] ? copy_mount_options+0x5f/0x2e0 [ 245.300970] ? rcu_read_lock_sched_held+0x108/0x120 [ 245.305969] ? kmem_cache_alloc_trace+0x459/0x740 [ 245.310794] ? kasan_check_write+0x14/0x20 [ 245.315003] ? _copy_from_user+0x99/0x110 [ 245.319143] ? copy_mount_options+0x1f7/0x2e0 [ 245.323628] SyS_mount+0xab/0x120 [ 245.327059] ? copy_mnt_ns+0xb30/0xb30 [ 245.330921] do_syscall_64+0x281/0x940 [ 245.334785] ? vmalloc_sync_all+0x30/0x30 [ 245.338908] ? _raw_spin_unlock_irq+0x27/0x70 [ 245.343378] ? finish_task_switch+0x1c1/0x7e0 [ 245.347849] ? syscall_return_slowpath+0x550/0x550 [ 245.352754] ? syscall_return_slowpath+0x2ac/0x550 [ 245.357663] ? prepare_exit_to_usermode+0x350/0x350 [ 245.362660] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 245.368009] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 245.372927] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 245.378091] RIP: 0033:0x454e79 [ 245.381253] RSP: 002b:00007f3ee2ac1c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 245.388937] RAX: ffffffffffffffda RBX: 00007f3ee2ac26d4 RCX: 0000000000454e79 [ 245.396180] RDX: 0000000020000100 RSI: 0000000020000180 RDI: 0000000020000100 [ 245.403423] RBP: 000000000072bea0 R08: 0000000020000040 R09: 0000000000000000 [ 245.410669] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 245.417914] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000018 [ 245.430771] devpts: called with bogus options [ 245.489686] hugetlbfs: Bad mount option: "" [ 245.596201] FAULT_INJECTION: forcing a failure. [ 245.596201] name failslab, interval 1, probability 0, space 0, times 0 [ 245.607482] CPU: 1 PID: 16733 Comm: syz-executor3 Not tainted 4.16.0-rc6+ #43 [ 245.614752] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 245.624096] Call Trace: [ 245.626673] dump_stack+0x194/0x24d [ 245.630289] ? arch_local_irq_restore+0x53/0x53 [ 245.634942] ? __save_stack_trace+0x7e/0xd0 [ 245.639253] should_fail+0x8c0/0xa40 [ 245.642948] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 245.648035] ? kasan_kmalloc+0xad/0xe0 [ 245.651899] ? kmem_cache_alloc_trace+0x136/0x740 [ 245.656721] ? __memcg_init_list_lru_node+0x169/0x270 [ 245.661889] ? __list_lru_init+0x544/0x750 [ 245.666101] ? sget_userns+0x6b1/0xe40 [ 245.669969] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 245.674704] ? do_mount+0xea4/0x2bb0 [ 245.678392] ? SyS_mount+0xab/0x120 [ 245.682000] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 245.687354] ? find_held_lock+0x35/0x1d0 [ 245.691398] ? __lock_is_held+0xb6/0x140 [ 245.695447] ? check_same_owner+0x320/0x320 [ 245.699749] ? rcu_note_context_switch+0x710/0x710 [ 245.704665] should_failslab+0xec/0x120 [ 245.708620] kmem_cache_alloc_trace+0x4b/0x740 [ 245.713183] ? __kmalloc_node+0x33/0x70 [ 245.717132] ? __kmalloc_node+0x33/0x70 [ 245.721104] ? rcu_read_lock_sched_held+0x108/0x120 [ 245.726104] __memcg_init_list_lru_node+0x169/0x270 [ 245.731104] ? list_lru_add+0x7c0/0x7c0 [ 245.735061] ? __kmalloc_node+0x47/0x70 [ 245.739023] __list_lru_init+0x544/0x750 [ 245.743070] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 245.748936] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 245.753937] ? lockdep_init_map+0x9/0x10 [ 245.757979] sget_userns+0x6b1/0xe40 [ 245.761670] ? kernfs_sop_show_path+0x190/0x190 [ 245.766322] ? kernfs_sop_show_options+0x180/0x180 [ 245.771231] ? destroy_unused_super.part.6+0xd0/0xd0 [ 245.776320] ? check_same_owner+0x320/0x320 [ 245.780620] ? rcu_pm_notify+0xc0/0xc0 [ 245.784494] ? rcu_read_lock_sched_held+0x108/0x120 [ 245.789486] ? kmem_cache_alloc_trace+0x459/0x740 [ 245.794305] ? lock_downgrade+0x980/0x980 [ 245.798441] kernfs_mount_ns+0x13d/0x8b0 [ 245.802483] ? kernfs_super_ns+0x70/0x70 [ 245.806536] sysfs_mount+0xc2/0x1c0 [ 245.810146] ? sysfs_kill_sb+0x40/0x40 [ 245.814015] ? alloc_pages_current+0xbe/0x1e0 [ 245.818493] ? security_sb_copy_data+0x81/0xb0 [ 245.823053] mount_fs+0x66/0x2d0 [ 245.826403] vfs_kern_mount.part.26+0xc6/0x4a0 [ 245.830966] ? may_umount+0xa0/0xa0 [ 245.834570] ? _raw_read_unlock+0x22/0x30 [ 245.838699] ? __get_fs_type+0x8a/0xc0 [ 245.842570] do_mount+0xea4/0x2bb0 [ 245.846094] ? copy_mount_string+0x40/0x40 [ 245.850307] ? rcu_pm_notify+0xc0/0xc0 [ 245.854178] ? copy_mount_options+0x5f/0x2e0 [ 245.858565] ? rcu_read_lock_sched_held+0x108/0x120 [ 245.863559] ? kmem_cache_alloc_trace+0x459/0x740 [ 245.868384] ? kasan_check_write+0x14/0x20 [ 245.872596] ? _copy_from_user+0x99/0x110 [ 245.876732] ? copy_mount_options+0x1f7/0x2e0 [ 245.881210] SyS_mount+0xab/0x120 [ 245.884640] ? copy_mnt_ns+0xb30/0xb30 [ 245.888512] do_syscall_64+0x281/0x940 [ 245.892375] ? vmalloc_sync_all+0x30/0x30 [ 245.896502] ? _raw_spin_unlock_irq+0x27/0x70 [ 245.900976] ? finish_task_switch+0x1c1/0x7e0 [ 245.905448] ? syscall_return_slowpath+0x550/0x550 [ 245.910357] ? syscall_return_slowpath+0x2ac/0x550 [ 245.915265] ? prepare_exit_to_usermode+0x350/0x350 [ 245.920258] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 245.925604] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 245.930431] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 245.935600] RIP: 0033:0x454e79 [ 245.938765] RSP: 002b:00007fbfd4b96c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 245.946452] RAX: ffffffffffffffda RBX: 00007fbfd4b976d4 RCX: 0000000000454e79 [ 245.953701] RDX: 0000000020000100 RSI: 0000000020000180 RDI: 0000000020000100 [ 245.960946] RBP: 000000000072bea0 R08: 0000000020000040 R09: 0000000000000000 [ 245.968195] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 245.975439] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000001f 2018/03/31 08:26:28 executing program 1: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={0xffffffffffffffff, &(0x7f0000000700), &(0x7f00000002c0)=""/161}, 0x18) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)) 2018/03/31 08:26:28 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x0, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000c00)=[{0x1010, 0x101, 0x4, "d93684e7ef9d1ca0c4c88315b9ff94a0fface453cfb4c2480c55c53dfb5b83499ccb2cf661aa4186c8a66ffa8cbd00beece6e37a415f81d156c369c302177205f73b54d72000c0d630dde1f81746825be72f2b709dcdfe715812f40fda81b1715f974369195276f9ef5be0aa12b925ed703690539649c796d4b60b560fde1b4be6fc5cc699ea25a38099d7e38c2e403c6c08a9433613082b04038b17b768a3da6dc67f1980a3f0f9a1c4125b378b439f185dcd755cc5b7d5ddd143b0016e6d8c59f117a3dcd89645e633c832e6da979efcbf49516657272ed482e8a369421cef6ce88fe9de8783fb8fced055b95ee7a910261fabf0aab431286b892b23d1f0fc260a805ee2ae93554ea55e947b68ddd9ab47386c0771413aeaf239f63257eef7c9b46ba720e7fd08c657fce3e885a2c785e6f6c1c105eade3ece4a2b7a2d038c3ff02b94d14f6028985a39f2e67848adbed0c42f4843a7c4b209b1beebfc910908bd3fbf76baad747134702ffc70c86fd6ebe96bdea3f06a2f0b2267bc885534d3fe3db384ba153331ce5195971c063dd5d44bb326ba0c8ead15476276ecd75bf1e91ddb737c699e425cfcad332e4e380b181dfea4bf93dc9eac611d82f96c6f3acf941678eaf2bc3de74a11823b2501c385de11001de1231d50705ae1974c3a70047827961fec9eb09e1c898f71febff5a94eaad49df790d2fb3d9d07ae1eb9952e32749dbedd0e0ebdcd267c8bda67908390a249be6a38cbba0008b68d5af9cdde2c0b175b36a1c0f7b5563963be4074fd71b249141989f1282349500287977ce4e5caf213de84b7be4ba88b2d38df91dcc5b4f1d080cc64450890788db922e442b8b3cc65e36c8c361f6abd809c90b6ed100e733903b9ca37726c8b7fb9653a03e14a15202ab9109e05ae25bd46421ab7787f13068b6cf79b9154ad0a21fd792aab6bb4e6913d6b8f0e5fa8f948bf8b1d5abaa972edc2b1366bd62ee5a0aecf4e8137511bb882387f5774d7a7e6dca6cb232a603f81c772493e59f09d860bfe1f4b78fb25c161bdf533fd8922d4b9421a48ae3a9f4bf0a13bb5d4f1334c6b8674c2cf4dc5979954e45774294b4d361762a48e395594badf516dce94ea183458a8276c7ae004506b93ede6e24d2c57b8163092633f890a23a89a1f9855522a2903e7503acd10a857c17ddda737ab97bd9b8fd575a64506ef41ea6e7a7c2a5eea123aa7638426ce72c3da84f8556765691dafbf250e9fcd5fc62c51c2ac786545229530f57141c910c61a5af22e473e4c31c5a35000fe68885bca80dc294a8533464b4acf742f24c6318d78cdf5b8dfce3d59f3af5cab43461d4dfa5b3903517ccadcd07556e75ff622666746f6547699b9b95fdb4185e88e5ae714fd2ddcbadbe47fa8e47673b395c4ded676f6da5cdf49d3713308b46f770457aaea617ec5a35ff6bc2ba43e8d4d9ee8e903406b5783a373678ee1a23645b602d96e95ba8806ab791d792c11d1a22a63f009baebdbb937b9278a5b0321a0dceecf7e2f879c5c303ec7b24fdd39a840312a90971548d377adbbee315de2a4945e858bc6f140c6f00f2d9452b453c3bc6866fa54e3bae27ab58366cdbdf28972cb9111534f34439628c61a5baf5fc5151c65b581edec63b6d4df450efa33f1340f6a5c79c5c32331fcb7b72e84b626d30355ae1409dc62f8fa3d1b4f41946acfc1060587179c2286f1265892c8387966880b7af8cab93e8dd95009780fb196698ef2e7005b8f797b04cf8005fb968794090cd1436ff671536393af70e26a4e26198ce097f353868bb58858c44520fe866400a3322009e2fd1a9f2e1866f0c4b87517cea3ee3ba505dbc4834764dab59c2ad981547260542ad6d95cfaf4841ae084538d90c5e9fa05afb54d4cbdc116d4da77f152e9cab7a4df7966fd3f7f755e14235edc029bbc9647fb8185cab1c6fb0987d0d9fc09a36a7e4982280d94a5318afd5013893c620ae72f646a1e29867759aede3daa074b73298b05a466d3086034b5bb08ab16ef4a070eac55b751f46f11b7a20710835fb307725dfc3574f710427dd2d873f3ee9ca05ec1411eb3574453b95b6cec81bad1451634f86027fea6b84ab8f35e0fdbd4bdcfc14b421f77b0c380202f3ea7c13e1e54d07e6d83f25114e5361bc9a33cbd9e3308de94a99bdc9ee6819877c191e07f64e403078c3d4c80c039a6839dd3bfce8ff515775d122a20bc0d231a88f55f65b6060930f2349cb027075d0e4d44d3d2bb4fd0ad8949f9b6fa4968eca533ce77e3be01bb35c66d7ec4d86f178c2aad610b1da58a8c1e5e481763ca34863f2ffed5dc23bb1068c9d5771d8a6103b41c87f87694fab0be082194b73bee43731c31728b688bbf057446d7de66da0638893adbdbe3de0f133a8ac44cd0507f8e9d06f54009385be653f49c7d9348d6746ee19bc41250f9315f773dd2b593566ea320062b7f33a72623d5650caba12f17e2986071e458253d1b0b6dcca6dfc1c6afb303ddbb7e3453861a20f9e6f362d8bdf6d68355359457f5a7c3f93ff72b9b37fab9824972ff795de2a46d993599478206d8f7ad3b81f2c558fbb8045fc22aad0fd80804c70ec6a01c08bc69b29403fa2fe5bb019fb7863da9816b775380a1a866812c323bfcb0628597923dbc7331e856d0a70321babb2a6d22f7f979fa89444c8f2484954e45947616bb5206d98c1af4811d40fe71ac92a256cb8febb52d8bf6e4f36a181490425baf247c25e94823d27ebe4829a293e0ec3729c73091ab1802a1d81b63536d275de9a14f6b0d15d698877a0bbbff57efdac476799cec41f3b764c3d2a7f52abc5dc7505bf1f56056d384704aa8b91e7fd2b4a2b7b2eca3406e9e05d8b7618671d0c77677bdcf0ccebe5f58950d73a3653ebc270a695216e03053d2b8c92da59a73799b6d32e6c83c95bcfaa0fdc943cd163d10591aef6b8d993bd057d53a27aa1011ee17143b96e87cd0244b243ebe8a203c37fb1173d3224fff64298492099b22df9d351a903d3fdc6e5fc0dcd6d84e49073009fe4d53b04d3ad4af8f5f063beba7c87b974db957d441a59be1a77965518439d5dafc39f1d1fa8a4d32330d5dbaaab3dadc3089004646b4a0f4610e473da418102258b7c00690807a7def1011a5c5a741535b3f0d23204763a882b2b53fc1b3d5d6ab3d13ab74ab361b23c82c67f84fd77d5109c8eb2ef8bd8265fe4c5014033f9f651291c85eecfc09ae2e6456b01a7dbeeb76de1b4981e3e7ca9c11361d97c6f64c6c13c3ff6991f0f3c69802bb5070e0dec0f77bf56623b1fb8d1cd7462f2ec3a18ae943c13b2e4823ed193222e8b28931d203ee0b1f297d12553318dcb7cdd9daea49eb5a8ca37f78c5d9aa1a222a5eea31c9f8d25499bddb88b05e1c1f9461b6c737f85eb8d2bf5533baf3b6a065a346d0598944e70f3082245f36a4ac283dc1fac930dd466daaa848966d0eedec69def668d78dfb2a05b971b7df2621075a7ed9f0817278ef9da4c493dfcfe1d48453410d90ae94a234391a7d339cbe203cdd9f8b9c47a4dcb1ed1628ccfa13baaf62c63195c9b5aaa7c7b66b8233873b8dabddffadde9811d213a859fc75912929e789e51087a7169e9c8e1a9c80784b0f6904787ff465e53754f2fafad76d03d40c22059b3e0a249048e3a15d7835ed5c22d1785b3fc70d19dcb7eae428a2212423f75d6db40be3e867a3bfced5d99b9e2c7241a1f3e3d68a038325fa8e54749de5a8a9a944ef9a1623dd0496d1248c7c74ca611ccb8b1ec66375fb29fa89527b29f25df3f3feb69c03224af80310bb550ed46994599cbc4a582d357025bbc063d4a9769a54286aac683268d2a509ff5f3c0045673bb780bc0e5494967c5b3c9798bdb55fe13355c675f20d9b0fd9e022d7048f48645d23013b750525fc18556ef53574cd42e385842b5367ac05d0edb6e954972c1f17e8ddb5257115360e646b16ab2446627f8c73e15be5fe1486b382e1a78f7590012505aeae33df44c2cba64e772798c7570d67ea0a32bbadad43ae111fcd7a4774254859744b99ac50b23e66ebbca654fd4a73172908fee768418637b5bfbc5ab0149116ccf970e9529787150b8e8a23d7caa12614b94392554ac00af96ca812d5e08eddbcdfbfe642056a3d6c455683ee3d19537f4d4259294cf30512361f2e2147d9891d556de1b699ed2712c374b4831ace9f8b451127f2949a4e1e95d026f7a8e37242dc82f5cf68e99105f918bcd4745c44beb3b0b611bcf25fcfb61317b4f3abfa30e6c33b747c27f3318dd32f748da5259aaca9d125551768be655214af8d2eccc1c1759af139ccac522b2427491ca14e6c0497363d68e345072d97bf511c3137743ab5e0e90a07c3ef383d0933365e1f2ce2d09e65fea946d9136f3da309fa7d12d72ccf675da67443b5972ff11cedffc4f67e21e8dd5d1b66989a3f66d05e1b71257d8f1192290f1cc54764714fb11f31687ae83561018b8d8b82ef080e1f94200f91b0962a56e20f94aab2376628727e1957f4d39f273bb5c8851e90071ad13d6376e57a4d70ea6380ea2b1209ae7d49ec2a477d55c65f68b4b6588b0e1d51c586d4659c907a43f8c7d9bfc10dccc076d8aea6824cddb4f322c5a3da9bd8d240e8ad3a088ce6e5bcc3a912ce50f7ce4528e9d4f6c98bfb5cc6e770ecbee6d25b0bd16592892ac1df58b97a7f5bf6603594677f995176ccf1ba67dba8062bf6e20381f372d500a0fa660fca14189224450f498ec10be10c52379c9b2d3471d42552dee8f4d3f3debba75653c328344ee5bfdcfcbd1e47fb0c6fd4af17ced11270d92d8c8654f40940acfa19ccd9b1b901703a03429373d19f9256498976fe5f5311ad3cb4dbb078b32652d9fd6ff82ac6dcbc3ef4453b76b089db1fd87fbf9cbd18c6a7a7120512f85c1d8269031f43d93b4bdf26008525aa20db9b3fa31f7a76b9d57ddf046ad1edf3d78e222c35320b08192ab05d9a73afa1daae9f50ea889f35bff0abed8949fa4aa5b3e0f3ee571f8241d687fb91f91bdcf2cb5aa8da1523b209a06de3f19ebed17a6b8abb5e72186c33c4f92dd84856b07fb12362cd393cb78a36e883e37bc60a763c50044aeaa992b992b06534d0570e7ec3bebf13c20a094bbe0ae9ff139926671129d35a0c80cf24043e0b3cb2430dbb06e1f1f4f6105b5ace3689ca992731971ecbb91c3e1708106af56999fb36d76b4c36fd1125f4b650230d4a566209dd9c897fe8962b4123af123a5d22898c2363f5e3f7ed0b01f3ab249c9bba7e2b48b9cc3bc57e84933b39ae84052e6bab929c8352c71f906856ca5c715010a1eaf1844cebf1c351e3f0a20bdee08ff85c6fe3e09c42c156419cb9af54073faa085a531115c7c269a1f62a9290d3293f127f6836bbfac42cbb9668bb24f7e5f57a060704d4082523014df986f534435a5275290579a80d23f8edd2cf547470d0102f6f41bfef224311eb5e0c83c537d69e8bad50d728d68ad257cdc11f964af19401214c14b68d58eaf4dd428896e45cd9819754d00fa6b5185134b68d68cc1b0bfd883a62d851298a77dbf420ac56bc538e0d3f24f7afff4199fb833ff60a946245a18065c82157353e45122fef56a99aa678c9bef1bdbc7e200ba3e52e3bde31e376261e1746d2cbdef06842e396c6ed00f7d19b0dd8ef5dc0c8c002790e6e18a5ac695d03802100a25a0defe421af34413a0ec3ea501662902d56e68f59431fae49e04f956c8732fedbaef5907ef033e4792c91d4647f81679dd1a596e521"}], 0x1010, 0x20004805}, 0x4010) r4 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x82, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f00000009c0)="3949bcf20271c219f64b9e3fbd45bfae692375440912d5a576c2d82299018de50363f2cf30a439b45c2738869283b7900c1e030013700557a768d5cc05cb9ed624684f4dfdae73a8148b29b2978222576dabbcb3556bcf35a8f66fa68ceb0b834ec5120ac749dc0cc5aab7b0197711785349b1673ff5159bc1a40df6c779950e0747a25ce77a10f68b663a87fc993224a79b583eac02a2171f076ff3", 0x1000, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) 2018/03/31 08:26:28 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000000003042df8700"]) r1 = perf_event_open(&(0x7f0000348f88)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r2}, 0x10) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) mount(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f00000002c0)='devpts\x00', 0x800000, &(0x7f0000000300)) socketpair(0x3, 0x800, 0x81, &(0x7f00000003c0)) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') 2018/03/31 08:26:28 executing program 7: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x80000000000, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000001fc0)) sendmsg(0xffffffffffffffff, &(0x7f00000024c0)={&(0x7f0000002040)=@un=@file={0x0, './file0\x00'}, 0x80, &(0x7f0000001f40)=[{&(0x7f00000020c0)="73c7575b94a72990e177f86ed4835a72a65c1a6c6831eeb0c48163a47ab63bcb605c8450cc4798ff6521c2aa722d1a7105c8a07e6c", 0x35}], 0x1, &(0x7f0000002500)=ANY=[], 0x0, 0x40000}, 0x20000000) r2 = gettid() r3 = perf_event_open(&(0x7f0000001ac0)={0x1, 0x70, 0xffffffff, 0x835, 0x9, 0xffffffffffffff5f, 0x0, 0x1000, 0x42000, 0x3, 0x8, 0x80, 0x1, 0x4, 0x100000001, 0x9, 0xff, 0x8, 0x1000, 0x7, 0x7f, 0x200, 0xb715, 0x3, 0x7fffffff, 0xf0a, 0x40, 0x8000, 0x8, 0x7, 0xffffffffffffff74, 0x4, 0x6, 0x100, 0x7, 0x335, 0x3ff, 0x58, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000001a80), 0xe}, 0x0, 0x80000000, 0x82, 0x7, 0x5, 0x3, 0x80000001}, r2, 0xd, r1, 0x8) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000200)='mqueue\x00', 0x0, &(0x7f000000a000)) r4 = getpid() r5 = bpf$PROG_LOAD(0x5, &(0x7f0000002500)={0xf, 0x7, &(0x7f0000001940)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, [@ldst={0x3, 0x3, 0x3, 0x4, 0x3, 0x2, 0xffffffffffffffff}, @exit={0x95}], {0x95}}, &(0x7f0000001980)='GPL\x00', 0x0, 0x1000, &(0x7f00000039c0)=""/4096, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000019c0)={&(0x7f0000000180)='./file0\x00', r5}, 0x10) perf_event_open(&(0x7f0000001a00)={0x0, 0x70, 0x0, 0x8, 0x0, 0x3, 0x0, 0xb8, 0x1000, 0x0, 0x3, 0x4, 0xfff, 0x4, 0x4dae, 0x40, 0x100000001, 0x6, 0x4, 0x0, 0x3, 0x753c, 0x6, 0x100, 0x1de, 0x6, 0x4, 0x1, 0x6, 0x4, 0x7, 0x3, 0x7fff, 0x80000000, 0x3, 0x8, 0x81, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x7, 0x4}, 0x801, 0x400, 0x1, 0x4, 0x1, 0x9, 0x80000001}, r4, 0x7, r1, 0xb) r6 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000004000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000001c00)='./file0\x00', &(0x7f0000001c40)='./file0\x00', &(0x7f0000001c80)='devpts\x00', 0x40, &(0x7f0000001cc0)="be623dfd58807ac0b2f86f052863a5f30adc0bce173ebcf648cefd7d64732aeb5b94e6af3ab33e53669ba6d304d067dad4b1ff3ed87f18fd170aac904e8f105e80e22881717c98752a9cd7cfb06d102877e3b36b2624d22427331755a9514b225d25999ed605ffe4188630db2e7ddcc57f6316b60c4f3845d9dfcbbde5e49af627b48d7c9bd743b536de31a9ba3010cb6714c9b90a50537be55ca12a18e6541bff5a82d293e7734ea9c90707899663bd96b3bcce5887bf0bd35963c5adc39ddcb6f2a0a02b01661242046cb54ef1aec5a486b69e006305064124867bf79f4dc11798e214b61575168b79887122e0a3461f703c077f902c0a") socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r7, &(0x7f0000001800)={&(0x7f0000000240)=@alg, 0x80, &(0x7f0000000740)=[{&(0x7f00000002c0)=""/83, 0x53}, {&(0x7f0000000340)=""/27, 0x1b}, {&(0x7f0000000380)}, {&(0x7f00000003c0)=""/40, 0x28}, {&(0x7f0000000400)=""/144, 0x90}, {&(0x7f00000004c0)=""/200, 0xc8}, {&(0x7f00000005c0)=""/60, 0x3c}, {&(0x7f0000000600)=""/105, 0x69}, {&(0x7f0000000680)=""/127, 0x7f}, {&(0x7f0000000700)=""/8, 0x8}], 0xa, &(0x7f0000000800)=""/4096, 0x1000}, 0x10000) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000002340)=0xf60) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000003900)={&(0x7f0000003400)=@can={0x0, 0x0}, 0x80, &(0x7f0000003840)=[{&(0x7f0000003480)=""/194, 0xc2}, {&(0x7f0000003580)=""/250, 0xfa}, {&(0x7f0000003680)=""/100, 0x64}, {&(0x7f0000003700)=""/14, 0xe}, {&(0x7f0000003740)=""/159, 0x9f}, {&(0x7f0000003800)=""/15, 0xf}], 0x6, &(0x7f00000038c0)=""/29, 0x1d, 0x5}, 0x3) bpf$PROG_LOAD(0x5, &(0x7f0000003940)={0x4, 0x9, &(0x7f0000001840)=ANY=[@ANYBLOB="18000000030000000000000003000000dfd00c00fcffffff0000000000000000000803000101000000810000000000000001f0fff0ffffff000000000000000095000000000017d2"], &(0x7f0000000380)='GPL\x00', 0xf172, 0x4b, &(0x7f00000018c0)=""/75, 0x41f00, 0x1, [], r8}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000000c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001f00)={0xffffffffffffffff, 0x0, 0xf6, 0x22, &(0x7f0000001dc0)="9ef9482ea02fd36d0a768986a7ebe7a627dc88937e7073e3521858dfa0d5e02f571a01cfdfa76e048e5f956ea5da60b90e02a6c3d3687ed61ec9ab5b682c02498bddef38de9ce8c753e41e78f414d16202a033b6c7752711a5f56924e7846d6dcde2f71026e1eb0319b5e60f6b1ec67fca31c3cf1691d3af91a19f56be5a10ff337a53ba13dd3d75e1555211954b92ec0082d02b7b4cdddc021cbe84e4af8f20788977e3416918843e6c92b2ebf7b8b33ecbd4c7c9a9d5036c3e3e538748a32f1a28eb77818ca1878ffdd445dcdb8a40e6221e0fc474428449dfe93c62bbc69996aa9b34488c1da4f6f7c2275305a6a4fb256c1a516d", &(0x7f0000001ec0)=""/34, 0x1f, 0x1}, 0x28) close(r6) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x3441, &(0x7f0000000080)) mount(&(0x7f00000021c0)='./file0/file0\x00', &(0x7f0000002200)='./file0/file0\x00', &(0x7f0000002240)='fuse\x00', 0x2000000, &(0x7f0000002280)="9b3923bfddc346e9fa2aeaffae6ca386d8d50ba83ab72218340d3c30c045a89ac016797652ba04f1a203cfceccb458dbfd9fd03c4a80ef9a40dc7a4f24b6619d04a58186466fd8465757d9ee053c082cdfa957e7efab6191761847cca59c017493ef5e3d22432cf0b4ebef") ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f00000023c0)=ANY=[@ANYBLOB="07000000000000000000000000000000000000000000000000000000000000000000000067eb0ecf1cfa4ffd89aa7e339417beb7d332a5c996e59875644dd1e3a690110400bc751bb0435977d90fcbb2b83c27812d818991d125e9c0f199be2bc7f01aa0a5cb9b9f99438aa0f1ae3d50201f7bb276536f567f03f062994da292b6db0000000000000000000000000000a93536f303000000000000002a27f6ae1258ebb5079c1bab4f1f6f11ee8ce2e590855a3af38e4bb871ef8400000000000000000000"]) mount(&(0x7f0000001b40)='./file0\x00', &(0x7f0000001b80)='./file0/file0\x00', &(0x7f0000002100)='vfat\x00', 0x0, &(0x7f0000002140)="98980e21ac8b46c0b7bedeee39e6bd9ae4088d6ab47dc9dc76a39e299ce3783aa33e482e450484961fd3e3c5b178fafbe54440e19512ea4298652ed129d4241d9d116d8a5c2b931d350f0c989f8a288fc9e56c") mount(&(0x7f0000df7000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='hugetlbfs\x00', 0x200, &(0x7f00000001c0)) mkdir(&(0x7f00000004c0)='./file0/file0\x00', 0x0) socketpair$inet(0x2, 0x0, 0x1f, &(0x7f0000000080)) 2018/03/31 08:26:28 executing program 3 (fault-call:10 fault-nth:32): r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000348f88)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r2}, 0x10) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) mount(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f00000002c0)='devpts\x00', 0x800000, &(0x7f0000000300)) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') 2018/03/31 08:26:28 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) socketpair(0x0, 0x4, 0x6, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f0000001700)={0x1, 0x15, &(0x7f0000001540)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x1}, [@ldst={0x3, 0x3, 0x1, 0x5, 0x5, 0x140, 0x1}, @map={0x18, 0x1, 0x1, 0x0, r1}, @jmp={0x5, 0x3, 0x0, 0x5, 0x0, 0xfffffff0, 0xffffffffffffffff}, @jmp={0x5, 0x8, 0x8, 0x3, 0x0, 0x18, 0x8}, @exit={0x95}, @call={0x85, 0x0, 0x0, 0x1e}, @initr0={0x18, 0x0, 0x0, 0x0, 0x6788, 0x0, 0x0, 0x0, 0x88}, @generic={0x7, 0xffd, 0x5, 0xb0df}, @alu={0x7, 0x800, 0xf, 0x6, 0x3, 0xffffffe0, 0xffffffffffffffff}], {0x95}}, &(0x7f0000001600)='syzkaller\x00', 0x1000, 0xa1, &(0x7f0000001640)=""/161, 0x41100, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) socketpair(0xf, 0x3, 0x2, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000001500)={r0}) recvmsg$kcm(r3, &(0x7f00000014c0)={&(0x7f0000000080)=@l2, 0x80, &(0x7f0000001400)=[{&(0x7f0000000000)=""/35, 0x23}, {&(0x7f0000000100)=""/39, 0x27}, {&(0x7f00000001c0)=""/155, 0x9b}, {&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/88, 0x58}, {&(0x7f0000001300)=""/240, 0xf0}, {&(0x7f0000000140)=""/63, 0x3f}], 0x7, &(0x7f0000001480)=""/37, 0x25, 0x4}, 0x40000000) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r2) 2018/03/31 08:26:28 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000000c0)={0x0, 0x4, 0x18}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000080)='./file0\x00', r0}, 0x10) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) socketpair(0x0, 0x4, 0x6, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) socketpair(0xf, 0x3, 0x2, &(0x7f0000000040)) 2018/03/31 08:26:28 executing program 2 (fault-call:9 fault-nth:25): r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000348f88)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r2}, 0x10) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') [ 246.128771] FAULT_INJECTION: forcing a failure. [ 246.128771] name failslab, interval 1, probability 0, space 0, times 0 [ 246.140072] CPU: 1 PID: 16750 Comm: syz-executor2 Not tainted 4.16.0-rc6+ #43 [ 246.147349] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 246.156705] Call Trace: [ 246.159298] dump_stack+0x194/0x24d [ 246.162928] ? arch_local_irq_restore+0x53/0x53 [ 246.167594] ? __save_stack_trace+0x7e/0xd0 [ 246.171924] should_fail+0x8c0/0xa40 [ 246.175638] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 246.180738] ? kasan_kmalloc+0xad/0xe0 [ 246.184614] ? kmem_cache_alloc_trace+0x136/0x740 [ 246.189441] ? __memcg_init_list_lru_node+0x169/0x270 [ 246.194616] ? __list_lru_init+0x544/0x750 [ 246.198831] ? sget_userns+0x6b1/0xe40 [ 246.202702] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 246.207434] ? do_mount+0xea4/0x2bb0 [ 246.211138] ? SyS_mount+0xab/0x120 [ 246.214749] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 246.220098] ? find_held_lock+0x35/0x1d0 [ 246.224146] ? __lock_is_held+0xb6/0x140 [ 246.228196] ? check_same_owner+0x320/0x320 [ 246.232499] ? rcu_note_context_switch+0x710/0x710 [ 246.237414] should_failslab+0xec/0x120 [ 246.241367] kmem_cache_alloc_trace+0x4b/0x740 [ 246.245930] ? __kmalloc_node+0x33/0x70 [ 246.249881] ? __kmalloc_node+0x33/0x70 [ 246.253835] ? rcu_read_lock_sched_held+0x108/0x120 [ 246.258835] __memcg_init_list_lru_node+0x169/0x270 [ 246.263832] ? list_lru_add+0x7c0/0x7c0 [ 246.267784] ? __kmalloc_node+0x47/0x70 [ 246.271742] __list_lru_init+0x544/0x750 [ 246.275788] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 246.281657] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 246.286657] ? lockdep_init_map+0x9/0x10 [ 246.290701] sget_userns+0x6b1/0xe40 [ 246.294393] ? kernfs_sop_show_path+0x190/0x190 [ 246.299050] ? kernfs_sop_show_options+0x180/0x180 [ 246.303961] ? destroy_unused_super.part.6+0xd0/0xd0 [ 246.309054] ? check_same_owner+0x320/0x320 [ 246.313356] ? rcu_pm_notify+0xc0/0xc0 [ 246.317229] ? rcu_read_lock_sched_held+0x108/0x120 [ 246.322226] ? kmem_cache_alloc_trace+0x459/0x740 [ 246.327048] ? lock_downgrade+0x980/0x980 [ 246.331184] kernfs_mount_ns+0x13d/0x8b0 [ 246.335228] ? kernfs_super_ns+0x70/0x70 [ 246.339274] sysfs_mount+0xc2/0x1c0 [ 246.342882] ? sysfs_kill_sb+0x40/0x40 [ 246.346772] ? alloc_pages_current+0xbe/0x1e0 [ 246.351248] ? security_sb_copy_data+0x81/0xb0 [ 246.355814] mount_fs+0x66/0x2d0 [ 246.359164] vfs_kern_mount.part.26+0xc6/0x4a0 [ 246.363724] ? may_umount+0xa0/0xa0 [ 246.367330] ? _raw_read_unlock+0x22/0x30 [ 246.371455] ? __get_fs_type+0x8a/0xc0 [ 246.375324] do_mount+0xea4/0x2bb0 [ 246.378849] ? copy_mount_string+0x40/0x40 [ 246.383062] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 246.388061] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 246.392802] ? retint_kernel+0x10/0x10 [ 246.396673] ? copy_mount_options+0x18b/0x2e0 [ 246.401148] ? copy_mount_options+0x196/0x2e0 [ 246.405621] ? copy_mount_options+0x1f7/0x2e0 [ 246.410096] SyS_mount+0xab/0x120 [ 246.413531] ? copy_mnt_ns+0xb30/0xb30 [ 246.417399] do_syscall_64+0x281/0x940 [ 246.421262] ? vmalloc_sync_all+0x30/0x30 [ 246.425389] ? _raw_spin_unlock_irq+0x27/0x70 [ 246.429865] ? finish_task_switch+0x1c1/0x7e0 [ 246.434341] ? syscall_return_slowpath+0x550/0x550 [ 246.439248] ? syscall_return_slowpath+0x2ac/0x550 [ 246.444160] ? prepare_exit_to_usermode+0x350/0x350 [ 246.449154] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 246.454498] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 246.459323] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 246.464489] RIP: 0033:0x454e79 [ 246.467659] RSP: 002b:00007f3ee2ac1c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 246.475348] RAX: ffffffffffffffda RBX: 00007f3ee2ac26d4 RCX: 0000000000454e79 [ 246.482595] RDX: 0000000020000100 RSI: 0000000020000180 RDI: 0000000020000100 [ 246.490312] RBP: 000000000072bea0 R08: 0000000020000040 R09: 0000000000000000 [ 246.497561] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 246.504809] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000019 2018/03/31 08:26:29 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) socketpair(0xe, 0xfc153c734d570079, 0xac, &(0x7f00000004c0)={0xffffffffffffffff}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000002140)={0xc, 0x7, &(0x7f0000002040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0xfc61}, [@alu={0x7, 0x8, 0xf, 0xf, 0xa, 0xfffffffc, 0x8}, @call={0x85, 0x0, 0x0, 0x39}], {0x95}}, &(0x7f0000002080)='GPL\x00', 0x1, 0x1f, &(0x7f00000020c0)=""/31, 0x41100, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x0, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r5 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)={0xffffffffffffffff}) sendmsg$kcm(r5, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) sendmsg$kcm(r6, &(0x7f00000005c0)={&(0x7f0000000280)=@in6={0xa, 0x4e21, 0x3, @dev={0xfe, 0x80, [], 0xa}, 0xffffffffffff2f39}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000200)="71eade0f91aa77c179d1dc0afa0c0f3120433f8e44c680f60d142e54bcb19066", 0x20}, {&(0x7f0000000c00)="cc7bf4eeccb10af4944b267a34a32d53ec210f2e81bf224b152de365b022cb8baeab9d30118ee115aec37703281cc6c9cb5e436ee15992fb2bace974c661a3e009603f788a2b6081fc4ffb2e02f0d001b8a19c18fe3d8ba32449af22e17febede95818120e562e25ac26f10d7cbdf8841ec38ab74bf0f76e2bbd299b75454583f2e3666f2974", 0x86}, {&(0x7f0000000340)="c6685746472b8dd0cbbaf75a16913911a267b30919e66682a42cd83ca16d7bde237749af0eaa38edb1b4f21058f7bbbb1622d7d30290b438b354995a6aa7f53362e7dfcd4b078199a28d386b46678c80e2", 0x51}, {&(0x7f0000000cc0)="1b5762a0310aa08ef3041cb4e6c26c8a6c98f07ac5fcf3d7531318b8a4636cdd234b21b1897afb8909f33b8c75d0524ca2a60a6cd48ba1841912cdff047b897f69d48719575966ca1c5279acf51b6aa25436c1523bcc6d9bbf7323793f213188afdac6a8731aa2871af9b4b05fbd4b4333665b63c42d1d17cdd1751f3ec385e6e08adc71675588b043ce168ebf59b2b27c3eec7c74274b30693c99cd0919cdd347c9d04c05c443ba3ab68d89f3f26bb33330d78be70357ab88", 0xb9}, {&(0x7f0000000400)="b21d63f557aeefe1d2059989abb41694b245b58896efe74ac9dda9c2441f0f6c4b6b47665bdf76fcab2fbe4cc1cb00b6b8837b189ce6421a3661a11057197b6b4a4f4052cb007d8048bca766788882a8f7b9d6c939135e7610e9125a35fa7b", 0x5f}, {&(0x7f0000000580)="9094b7fc095cccd5f3f18ec83cd3958055760902c244e751b35b", 0x1a}, {&(0x7f0000000d80)="c7a75b4102048dfc6833bb5f0f1b339608b5f0a5cadc06e8849922b11ca38b14a4347f8cc37848598a74a7ab304b5d171280edf456491b3d98e0fb0ae7025f69071007c9deb379fcd39a33e12f40220ce37fdc6ab389e9ff1a84b8305e8964b73102f061a4ed3d18639e0a772b20c57b42f81dae7ccd91d1fc64909a176407b29b934888b59fdbdf7a95d3b8944843d036b426e0af6c5f235a9ebfe38aa636a1a9f1a137d78e65aa776ed337b335c2d552763e92f8923973d89d6f81c9f248040cbbf725e341a4b4112b879e2844077f818e53bc10", 0xd5}], 0x7, &(0x7f0000000e80)=[{0xd0, 0x118, 0x9, "8e1abbba9a218ad352f9c5f9b516eb96d668f6153e07dd670ab395b986a8e49f21338e5096784ddc0553f91f0407f40f406e9d8ea4e9e45a4870b554029d539fdc6f4270887495223fe63a54bcbd327f19c1e9654e3002b5f27bee6da82423b12b2b399158c2273f89b9928585e38b685c439d7c9931001ca2dd07086cd1c53b1fb17ee0e53d0853d4a19d0f89c4538109abaee57d0e8f924e24f1454499bb84ef65725dcfad5540acc20c04b4baeb21ab5044a84500e20f45d5f898e5b25f11"}, {0x1010, 0x88, 0xfd, "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"}, {0xc8, 0x119, 0x4, "12a8dc3a1f593962397b20467be376f06aa0288f401542b92cc899ab6f0421ebe4d783c32c1582faed63fe8559ca4e671b534d96a3e8690b0bbb22bd1be571cf4bf625e93bc5bc17cc4fcecc714ffc177521b91f79dbafb77dce97f33c97fe7d33b170f6ee4cbf5638a5d84e0f8b1179387a17844ff493b3ae84cd72ffb003feb5ca04258a788207ecd7161976e4c57142bb5d9db07989417f57d18de43db463cebebb6cf2a0749c857c41932bee56c125"}], 0x11a8, 0x4000}, 0x20000000) r7 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r4, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000002100)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r3}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r7, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r4}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f00000009c0)="3949bcf20271c219f64b9e3fbd45bfae692375440912d5a576c2d82299018de50363f2cf30a439b45c2738869283b7900c1e030013700557a768d5cc05cb9ed624684f4dfdae73a8148b29b2978222576dabbcb3556bcf35a8f66fa68ceb0b834ec5120ac749dc0cc5aab7b0197711785349b1673ff5159bc1a40df6c779950e0747a25ce77a10f68b663a87fc993224a79b583eac02a2171f076ff3", 0x1000, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) [ 246.546448] FAULT_INJECTION: forcing a failure. [ 246.546448] name failslab, interval 1, probability 0, space 0, times 0 [ 246.557827] CPU: 0 PID: 16757 Comm: syz-executor3 Not tainted 4.16.0-rc6+ #43 [ 246.565098] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 246.574445] Call Trace: [ 246.577035] dump_stack+0x194/0x24d [ 246.580665] ? arch_local_irq_restore+0x53/0x53 [ 246.585332] ? __save_stack_trace+0x7e/0xd0 [ 246.589648] should_fail+0x8c0/0xa40 2018/03/31 08:26:29 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000000003042df8700"]) r1 = perf_event_open(&(0x7f0000348f88)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r2}, 0x10) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) mount(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f00000002c0)='devpts\x00', 0x800000, &(0x7f0000000300)) socketpair(0x3, 0x800, 0x81, &(0x7f00000003c0)) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') [ 246.593352] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 246.598443] ? kasan_kmalloc+0xad/0xe0 [ 246.602313] ? kmem_cache_alloc_trace+0x136/0x740 [ 246.607147] ? __memcg_init_list_lru_node+0x169/0x270 [ 246.612330] ? __list_lru_init+0x544/0x750 [ 246.616561] ? sget_userns+0x6b1/0xe40 [ 246.620451] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 246.625181] ? do_mount+0xea4/0x2bb0 [ 246.628867] ? SyS_mount+0xab/0x120 [ 246.632479] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 246.637837] ? find_held_lock+0x35/0x1d0 [ 246.641884] ? __lock_is_held+0xb6/0x140 [ 246.645923] ? check_same_owner+0x320/0x320 [ 246.650221] ? rcu_note_context_switch+0x710/0x710 [ 246.655475] should_failslab+0xec/0x120 [ 246.659435] kmem_cache_alloc_trace+0x4b/0x740 [ 246.663998] ? __kmalloc_node+0x33/0x70 [ 246.667953] ? __kmalloc_node+0x33/0x70 [ 246.671903] ? rcu_read_lock_sched_held+0x108/0x120 [ 246.676909] __memcg_init_list_lru_node+0x169/0x270 [ 246.681911] ? list_lru_add+0x7c0/0x7c0 [ 246.685859] ? __kmalloc_node+0x47/0x70 [ 246.689820] __list_lru_init+0x544/0x750 [ 246.693864] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 246.699727] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 246.704723] ? lockdep_init_map+0x9/0x10 [ 246.708759] sget_userns+0x6b1/0xe40 [ 246.712448] ? kernfs_sop_show_path+0x190/0x190 [ 246.717092] ? kernfs_sop_show_options+0x180/0x180 [ 246.722011] ? destroy_unused_super.part.6+0xd0/0xd0 [ 246.727099] ? check_same_owner+0x320/0x320 [ 246.731400] ? rcu_pm_notify+0xc0/0xc0 [ 246.735271] ? rcu_read_lock_sched_held+0x108/0x120 [ 246.740260] ? kmem_cache_alloc_trace+0x459/0x740 [ 246.745085] ? lock_downgrade+0x980/0x980 [ 246.749216] kernfs_mount_ns+0x13d/0x8b0 [ 246.753262] ? kernfs_super_ns+0x70/0x70 [ 246.757300] sysfs_mount+0xc2/0x1c0 [ 246.760902] ? sysfs_kill_sb+0x40/0x40 [ 246.764767] ? alloc_pages_current+0xbe/0x1e0 [ 246.769251] ? security_sb_copy_data+0x81/0xb0 [ 246.773810] mount_fs+0x66/0x2d0 [ 246.777162] vfs_kern_mount.part.26+0xc6/0x4a0 [ 246.781724] ? may_umount+0xa0/0xa0 [ 246.785324] ? _raw_read_unlock+0x22/0x30 [ 246.789443] ? __get_fs_type+0x8a/0xc0 [ 246.793320] do_mount+0xea4/0x2bb0 [ 246.796842] ? copy_mount_string+0x40/0x40 [ 246.801061] ? rcu_pm_notify+0xc0/0xc0 [ 246.804931] ? copy_mount_options+0x5f/0x2e0 [ 246.809311] ? rcu_read_lock_sched_held+0x108/0x120 [ 246.814300] ? kmem_cache_alloc_trace+0x459/0x740 [ 246.819116] ? kasan_check_write+0x14/0x20 [ 246.823324] ? _copy_from_user+0x99/0x110 [ 246.827448] ? copy_mount_options+0x1f7/0x2e0 [ 246.831933] SyS_mount+0xab/0x120 [ 246.835361] ? copy_mnt_ns+0xb30/0xb30 [ 246.839225] do_syscall_64+0x281/0x940 [ 246.843084] ? vmalloc_sync_all+0x30/0x30 [ 246.847211] ? _raw_spin_unlock_irq+0x27/0x70 [ 246.851692] ? finish_task_switch+0x1c1/0x7e0 [ 246.856160] ? syscall_return_slowpath+0x550/0x550 [ 246.861070] ? syscall_return_slowpath+0x2ac/0x550 [ 246.865981] ? prepare_exit_to_usermode+0x350/0x350 [ 246.870978] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 246.876324] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 246.881143] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 246.886307] RIP: 0033:0x454e79 [ 246.889479] RSP: 002b:00007fbfd4b96c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 246.897161] RAX: ffffffffffffffda RBX: 00007fbfd4b976d4 RCX: 0000000000454e79 [ 246.904415] RDX: 0000000020000100 RSI: 0000000020000180 RDI: 0000000020000100 [ 246.911669] RBP: 000000000072bea0 R08: 0000000020000040 R09: 0000000000000000 [ 246.918914] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 246.926163] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000020 [ 246.964909] devpts: called with bogus options [ 246.993759] hugetlbfs: Bad mount option: "" 2018/03/31 08:26:30 executing program 2 (fault-call:9 fault-nth:26): r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000348f88)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r2}, 0x10) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') 2018/03/31 08:26:30 executing program 3 (fault-call:10 fault-nth:33): r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000348f88)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r2}, 0x10) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) mount(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f00000002c0)='devpts\x00', 0x800000, &(0x7f0000000300)) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') 2018/03/31 08:26:30 executing program 0: r0 = gettid() socketpair(0xa, 0x80001, 0x1, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0xc84, 0x8000, 0x3, 0xfffffffffffffff8, 0x0, 0xa6, 0x80808, 0x1, 0x2b, 0x4, 0x0, 0x8, 0xc25, 0x20, 0x80, 0x10001, 0x6, 0xffffffff, 0x7, 0x5, 0x9, 0x119800, 0x2, 0xb336, 0x9, 0xff, 0x3, 0x3, 0x4, 0x7, 0x7fff, 0x100000000, 0x8, 0x9, 0x7261, 0x1, 0x0, 0x80, 0x0, @perf_config_ext={0xffff, 0x9}, 0x800, 0x11, 0x12a, 0x7, 0x9, 0xea6, 0x8}, r0, 0x3, r1, 0x1) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x0, 0x4, 0x6, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0xfffffffffffffffa) socketpair(0xf, 0x3, 0x2, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000200)=r2, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f00000000c0)='bdev\x00') 2018/03/31 08:26:30 executing program 6: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) socketpair(0xa, 0x806, 0x4, &(0x7f0000001180)) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) socketpair(0x0, 0x5, 0x8, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001140)={r2, 0x50, &(0x7f00000010c0)}, 0x10) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x1) socketpair(0xf, 0x3, 0x2, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000001080)={r1, &(0x7f0000000080)="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"}, 0x10) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x1) 2018/03/31 08:26:30 executing program 1: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={0xffffffffffffffff, &(0x7f0000000700), &(0x7f00000009c0)=""/161}, 0x18) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000000c0)='fuse\x00') r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000100)='./file0/file0\x00', 0x0, 0x8}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) 2018/03/31 08:26:30 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000000003042df8700"]) r1 = perf_event_open(&(0x7f0000348f88)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r2}, 0x10) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) mount(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f00000002c0)='devpts\x00', 0x800000, &(0x7f0000000300)="7b18f1563c67659c49445440cbb57f32c0f4710f0219046399f3e8a25c5d4975e2b42f404b1493") socketpair(0x3, 0x800, 0x81, &(0x7f00000003c0)) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') 2018/03/31 08:26:30 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x0, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) close(r2) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r4 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f00000009c0)="3949bcf20271c219f64b9e3fbd45bfae692375440912d5a576c2d82299018de50363f2cf30a439b45c2738869283b7900c1e030013700557a768d5cc05cb9ed624684f4dfdae73a8148b29b2978222576dabbcb3556bcf35a8f66fa68ceb0b834ec5120ac749dc0cc5aab7b0197711785349b1673ff5159bc1a40df6c779950e0747a25ce77a10f68b663a87fc993224a79b583eac02a2171f076ff3", 0x1000, &(0x7f0000000200)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) 2018/03/31 08:26:30 executing program 7: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x80000000000, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000001fc0)) sendmsg(0xffffffffffffffff, &(0x7f00000024c0)={&(0x7f0000002040)=@un=@file={0x0, './file0\x00'}, 0x80, &(0x7f0000001f40)=[{&(0x7f00000020c0)="73c7575b94a72990e177f86ed4835a72a65c1a6c6831eeb0c48163a47ab63bcb605c8450cc4798ff6521c2aa722d1a7105c8a07e6c", 0x35}], 0x1, &(0x7f0000002500)=ANY=[], 0x0, 0x40000}, 0x20000000) r2 = gettid() r3 = perf_event_open(&(0x7f0000001ac0)={0x1, 0x70, 0xffffffff, 0x835, 0x9, 0xffffffffffffff5f, 0x0, 0x1000, 0x42000, 0x3, 0x8, 0x80, 0x1, 0x4, 0x100000001, 0x9, 0xff, 0x8, 0x1000, 0x7, 0x7f, 0x200, 0xb715, 0x3, 0x7fffffff, 0xf0a, 0x40, 0x8000, 0x8, 0x7, 0xffffffffffffff74, 0x4, 0x6, 0x100, 0x7, 0x335, 0x3ff, 0x58, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000001a80), 0xe}, 0x0, 0x80000000, 0x82, 0x7, 0x5, 0x3, 0x80000001}, r2, 0xd, r1, 0x8) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000200)='mqueue\x00', 0x0, &(0x7f000000a000)) r4 = getpid() r5 = bpf$PROG_LOAD(0x5, &(0x7f0000002500)={0xf, 0x7, &(0x7f0000001940)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, [@ldst={0x3, 0x3, 0x3, 0x4, 0x3, 0x2, 0xffffffffffffffff}, @exit={0x95}], {0x95}}, &(0x7f0000001980)='GPL\x00', 0xff, 0x1000, &(0x7f00000039c0)=""/4096, 0x0, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000019c0)={&(0x7f0000000180)='./file0\x00', r5}, 0x10) perf_event_open(&(0x7f0000001a00)={0x0, 0x70, 0x0, 0x8, 0x0, 0x3, 0x0, 0xb8, 0x1000, 0x0, 0x3, 0x4, 0xfff, 0x4, 0x4dae, 0x40, 0x100000001, 0x6, 0x4, 0x0, 0x3, 0x753c, 0x6, 0x100, 0x1de, 0x6, 0x4, 0x1, 0x6, 0x4, 0x7, 0x3, 0x7fff, 0x80000000, 0x3, 0x8, 0x81, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x7, 0x4}, 0x801, 0x400, 0x1, 0x4, 0x1, 0x9, 0x80000001}, r4, 0x7, r1, 0xb) r6 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000004000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000001c00)='./file0\x00', &(0x7f0000001c40)='./file0\x00', &(0x7f0000001c80)='devpts\x00', 0x40, &(0x7f0000001cc0)="be623dfd58807ac0b2f86f052863a5f30adc0bce173ebcf648cefd7d64732aeb5b94e6af3ab33e53669ba6d304d067dad4b1ff3ed87f18fd170aac904e8f105e80e22881717c98752a9cd7cfb06d102877e3b36b2624d22427331755a9514b225d25999ed605ffe4188630db2e7ddcc57f6316b60c4f3845d9dfcbbde5e49af627b48d7c9bd743b536de31a9ba3010cb6714c9b90a50537be55ca12a18e6541bff5a82d293e7734ea9c90707899663bd96b3bcce5887bf0bd35963c5adc39ddcb6f2a0a02b01661242046cb54ef1aec5a486b69e006305064124867bf79f4dc11798e214b61575168b79887122e0a3461f703c077f902c0a") socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r7, &(0x7f0000001800)={&(0x7f0000000240)=@alg, 0x80, &(0x7f0000000740)=[{&(0x7f00000002c0)=""/83, 0x53}, {&(0x7f0000000340)=""/27, 0x1b}, {&(0x7f0000000380)}, {&(0x7f00000003c0)=""/40, 0x28}, {&(0x7f0000000400)=""/144, 0x90}, {&(0x7f00000004c0)=""/200, 0xc8}, {&(0x7f00000005c0)=""/60, 0x3c}, {&(0x7f0000000600)=""/105, 0x69}, {&(0x7f0000000680)=""/127, 0x7f}, {&(0x7f0000000700)=""/8, 0x8}], 0xa, &(0x7f0000000800)=""/4096, 0x1000}, 0x10000) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000002340)=0xf60) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000003900)={&(0x7f0000003400)=@can={0x0, 0x0}, 0x80, &(0x7f0000003840)=[{&(0x7f0000003480)=""/194, 0xc2}, {&(0x7f0000003580)=""/250, 0xfa}, {&(0x7f0000003680)=""/100, 0x64}, {&(0x7f0000003700)=""/14, 0xe}, {&(0x7f0000003740)=""/159, 0x9f}, {&(0x7f0000003800)=""/15, 0xf}], 0x6, &(0x7f00000038c0)=""/29, 0x1d, 0x5}, 0x3) bpf$PROG_LOAD(0x5, &(0x7f0000003940)={0x4, 0x9, &(0x7f0000001840)=ANY=[@ANYBLOB="18000000030000000000000003000000dfd00c00fcffffff0000000000000000000803000101000000810000000000000001f0fff0ffffff000000000000000095000000000017d2"], &(0x7f0000000380)='GPL\x00', 0xf172, 0x4b, &(0x7f00000018c0)=""/75, 0x41f00, 0x1, [], r8}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000000c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001f00)={0xffffffffffffffff, 0x0, 0xf6, 0x22, &(0x7f0000001dc0)="9ef9482ea02fd36d0a768986a7ebe7a627dc88937e7073e3521858dfa0d5e02f571a01cfdfa76e048e5f956ea5da60b90e02a6c3d3687ed61ec9ab5b682c02498bddef38de9ce8c753e41e78f414d16202a033b6c7752711a5f56924e7846d6dcde2f71026e1eb0319b5e60f6b1ec67fca31c3cf1691d3af91a19f56be5a10ff337a53ba13dd3d75e1555211954b92ec0082d02b7b4cdddc021cbe84e4af8f20788977e3416918843e6c92b2ebf7b8b33ecbd4c7c9a9d5036c3e3e538748a32f1a28eb77818ca1878ffdd445dcdb8a40e6221e0fc474428449dfe93c62bbc69996aa9b34488c1da4f6f7c2275305a6a4fb256c1a516d", &(0x7f0000001ec0)=""/34, 0x1f, 0x1}, 0x28) close(r6) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x3441, &(0x7f0000000080)) mount(&(0x7f00000021c0)='./file0/file0\x00', &(0x7f0000002200)='./file0/file0\x00', &(0x7f0000002240)='fuse\x00', 0x2000000, &(0x7f0000002280)="9b3923bfddc346e9fa2aeaffae6ca386d8d50ba83ab72218340d3c30c045a89ac016797652ba04f1a203cfceccb458dbfd9fd03c4a80ef9a40dc7a4f24b6619d04a58186466fd8465757d9ee053c082cdfa957e7efab6191761847cca59c017493ef5e3d22432cf0b4ebef") ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f00000023c0)=ANY=[@ANYBLOB="07000000000000000000000000000000000000000000000000000000000000000000000067eb0ecf1cfa4ffd89aa7e339417beb7d332a5c996e59875644dd1e3a690110400bc751bb0435977d90fcbb2b83c27812d818991d125e9c0f199be2bc7f01aa0a5cb9b9f99438aa0f1ae3d50201f7bb276536f567f03f062994da292b6db0000000000000000000000000000a93536f303000000000000002a27f6ae1258ebb5079c1bab4f1f6f11ee8ce2e590855a3af38e4bb871ef8400000000000000000000"]) mount(&(0x7f0000001b40)='./file0\x00', &(0x7f0000001b80)='./file0/file0\x00', &(0x7f0000002100)='vfat\x00', 0x0, &(0x7f0000002140)="98980e21ac8b46c0b7bedeee39e6bd9ae4088d6ab47dc9dc76a39e299ce3783aa33e482e450484961fd3e3c5b178fafbe54440e19512ea4298652ed129d4241d9d116d8a5c2b931d350f0c989f8a288fc9e56c") mount(&(0x7f0000df7000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='hugetlbfs\x00', 0x200, &(0x7f00000001c0)) mkdir(&(0x7f00000004c0)='./file0/file0\x00', 0x0) socketpair$inet(0x2, 0x0, 0x1f, &(0x7f0000000080)) [ 247.340875] FAULT_INJECTION: forcing a failure. [ 247.340875] name failslab, interval 1, probability 0, space 0, times 0 [ 247.346362] FAULT_INJECTION: forcing a failure. [ 247.346362] name failslab, interval 1, probability 0, space 0, times 0 [ 247.352130] CPU: 1 PID: 16800 Comm: syz-executor3 Not tainted 4.16.0-rc6+ #43 [ 247.352138] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 247.352148] Call Trace: [ 247.382505] dump_stack+0x194/0x24d [ 247.386120] ? arch_local_irq_restore+0x53/0x53 [ 247.390774] ? __save_stack_trace+0x7e/0xd0 [ 247.395090] should_fail+0x8c0/0xa40 [ 247.398793] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 247.403880] ? kasan_kmalloc+0xad/0xe0 [ 247.407751] ? kmem_cache_alloc_trace+0x136/0x740 [ 247.412580] ? __memcg_init_list_lru_node+0x169/0x270 [ 247.417751] ? __list_lru_init+0x544/0x750 [ 247.421966] ? sget_userns+0x6b1/0xe40 [ 247.425836] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 247.430576] ? do_mount+0xea4/0x2bb0 [ 247.434273] ? SyS_mount+0xab/0x120 [ 247.437882] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 247.443236] ? find_held_lock+0x35/0x1d0 [ 247.447283] ? __lock_is_held+0xb6/0x140 [ 247.451337] ? check_same_owner+0x320/0x320 [ 247.455660] ? rcu_note_context_switch+0x710/0x710 [ 247.460586] should_failslab+0xec/0x120 [ 247.464549] kmem_cache_alloc_trace+0x4b/0x740 [ 247.469113] ? __kmalloc_node+0x33/0x70 [ 247.473084] __memcg_init_list_lru_node+0x169/0x270 [ 247.478091] ? list_lru_add+0x7c0/0x7c0 [ 247.482049] ? __kmalloc_node+0x47/0x70 [ 247.486020] __list_lru_init+0x544/0x750 [ 247.490069] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 247.495945] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 247.500950] ? lockdep_init_map+0x9/0x10 [ 247.504997] sget_userns+0x6b1/0xe40 [ 247.508696] ? kernfs_sop_show_path+0x190/0x190 [ 247.513350] ? kernfs_sop_show_options+0x180/0x180 [ 247.518262] ? destroy_unused_super.part.6+0xd0/0xd0 [ 247.523356] ? check_same_owner+0x320/0x320 [ 247.527663] ? rcu_pm_notify+0xc0/0xc0 [ 247.531544] ? rcu_read_lock_sched_held+0x108/0x120 [ 247.536545] ? kmem_cache_alloc_trace+0x459/0x740 [ 247.541371] ? lock_downgrade+0x980/0x980 [ 247.545510] kernfs_mount_ns+0x13d/0x8b0 [ 247.549560] ? kernfs_super_ns+0x70/0x70 [ 247.553611] sysfs_mount+0xc2/0x1c0 [ 247.557219] ? sysfs_kill_sb+0x40/0x40 [ 247.561093] ? alloc_pages_current+0xbe/0x1e0 [ 247.565579] ? security_sb_copy_data+0x81/0xb0 [ 247.570146] mount_fs+0x66/0x2d0 [ 247.573498] vfs_kern_mount.part.26+0xc6/0x4a0 [ 247.578069] ? may_umount+0xa0/0xa0 [ 247.581680] ? _raw_read_unlock+0x22/0x30 [ 247.585813] ? __get_fs_type+0x8a/0xc0 [ 247.589689] do_mount+0xea4/0x2bb0 [ 247.593216] ? copy_mount_string+0x40/0x40 [ 247.597434] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 247.602436] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 247.607183] ? retint_kernel+0x10/0x10 [ 247.611059] ? copy_mount_options+0x18b/0x2e0 [ 247.615539] ? copy_mount_options+0x196/0x2e0 [ 247.620020] ? copy_mount_options+0x1f7/0x2e0 [ 247.624501] SyS_mount+0xab/0x120 [ 247.627938] ? copy_mnt_ns+0xb30/0xb30 [ 247.631811] do_syscall_64+0x281/0x940 [ 247.635682] ? vmalloc_sync_all+0x30/0x30 [ 247.639809] ? _raw_spin_unlock_irq+0x27/0x70 [ 247.644289] ? finish_task_switch+0x1c1/0x7e0 [ 247.648768] ? syscall_return_slowpath+0x550/0x550 [ 247.653685] ? syscall_return_slowpath+0x2ac/0x550 [ 247.658598] ? prepare_exit_to_usermode+0x350/0x350 [ 247.663599] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 247.668949] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 247.673779] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 247.678953] RIP: 0033:0x454e79 [ 247.682123] RSP: 002b:00007fbfd4b96c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 247.689815] RAX: ffffffffffffffda RBX: 00007fbfd4b976d4 RCX: 0000000000454e79 [ 247.697072] RDX: 0000000020000100 RSI: 0000000020000180 RDI: 0000000020000100 [ 247.704322] RBP: 000000000072bea0 R08: 0000000020000040 R09: 0000000000000000 [ 247.711575] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 247.718825] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000021 [ 247.726102] CPU: 0 PID: 16801 Comm: syz-executor2 Not tainted 4.16.0-rc6+ #43 [ 247.733375] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 247.742721] Call Trace: [ 247.745308] dump_stack+0x194/0x24d [ 247.748934] ? arch_local_irq_restore+0x53/0x53 [ 247.753589] ? __save_stack_trace+0x7e/0xd0 [ 247.757892] should_fail+0x8c0/0xa40 [ 247.761585] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 247.766665] ? kasan_kmalloc+0xad/0xe0 [ 247.770524] ? kmem_cache_alloc_trace+0x136/0x740 [ 247.775344] ? __memcg_init_list_lru_node+0x169/0x270 [ 247.780506] ? __list_lru_init+0x544/0x750 [ 247.784712] ? sget_userns+0x6b1/0xe40 [ 247.788579] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 247.793310] ? do_mount+0xea4/0x2bb0 [ 247.797006] ? SyS_mount+0xab/0x120 [ 247.800616] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 247.805965] ? find_held_lock+0x35/0x1d0 [ 247.810014] ? __lock_is_held+0xb6/0x140 [ 247.814064] ? check_same_owner+0x320/0x320 [ 247.818372] ? rcu_note_context_switch+0x710/0x710 [ 247.823286] should_failslab+0xec/0x120 [ 247.827241] kmem_cache_alloc_trace+0x4b/0x740 [ 247.831797] ? __kmalloc_node+0x33/0x70 [ 247.835744] ? __kmalloc_node+0x33/0x70 [ 247.839692] ? rcu_read_lock_sched_held+0x108/0x120 [ 247.844689] __memcg_init_list_lru_node+0x169/0x270 [ 247.849682] ? list_lru_add+0x7c0/0x7c0 [ 247.853632] ? __kmalloc_node+0x47/0x70 [ 247.857587] __list_lru_init+0x544/0x750 [ 247.861629] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 247.867488] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 247.872482] ? lockdep_init_map+0x9/0x10 [ 247.876521] sget_userns+0x6b1/0xe40 [ 247.880207] ? kernfs_sop_show_path+0x190/0x190 [ 247.884862] ? kernfs_sop_show_options+0x180/0x180 [ 247.889768] ? destroy_unused_super.part.6+0xd0/0xd0 [ 247.894848] ? check_same_owner+0x320/0x320 [ 247.899143] ? rcu_pm_notify+0xc0/0xc0 [ 247.903018] ? rcu_read_lock_sched_held+0x108/0x120 [ 247.908027] ? kmem_cache_alloc_trace+0x459/0x740 [ 247.912844] ? lock_downgrade+0x980/0x980 [ 247.916976] kernfs_mount_ns+0x13d/0x8b0 [ 247.921021] ? kernfs_super_ns+0x70/0x70 [ 247.925068] sysfs_mount+0xc2/0x1c0 [ 247.928671] ? sysfs_kill_sb+0x40/0x40 [ 247.932539] ? alloc_pages_current+0xbe/0x1e0 [ 247.937022] ? security_sb_copy_data+0x81/0xb0 [ 247.941598] mount_fs+0x66/0x2d0 [ 247.944947] vfs_kern_mount.part.26+0xc6/0x4a0 [ 247.949504] ? may_umount+0xa0/0xa0 [ 247.953106] ? _raw_read_unlock+0x22/0x30 [ 247.957228] ? __get_fs_type+0x8a/0xc0 [ 247.961103] do_mount+0xea4/0x2bb0 [ 247.964631] ? copy_mount_string+0x40/0x40 [ 247.968847] ? rcu_pm_notify+0xc0/0xc0 [ 247.972712] ? copy_mount_options+0x5f/0x2e0 [ 247.977094] ? rcu_read_lock_sched_held+0x108/0x120 [ 247.982088] ? kmem_cache_alloc_trace+0x459/0x740 [ 247.986909] ? kasan_check_write+0x14/0x20 [ 247.991120] ? _copy_from_user+0x99/0x110 [ 247.995246] ? copy_mount_options+0x1f7/0x2e0 [ 247.999717] SyS_mount+0xab/0x120 [ 248.003153] ? copy_mnt_ns+0xb30/0xb30 [ 248.007039] do_syscall_64+0x281/0x940 [ 248.010910] ? vmalloc_sync_all+0x30/0x30 [ 248.015038] ? _raw_spin_unlock_irq+0x27/0x70 [ 248.019951] ? finish_task_switch+0x1c1/0x7e0 [ 248.024431] ? syscall_return_slowpath+0x550/0x550 [ 248.029334] ? syscall_return_slowpath+0x2ac/0x550 [ 248.034235] ? prepare_exit_to_usermode+0x350/0x350 [ 248.039226] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 248.044573] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 248.049395] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 248.054563] RIP: 0033:0x454e79 [ 248.057727] RSP: 002b:00007f3ee2ac1c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 248.065409] RAX: ffffffffffffffda RBX: 00007f3ee2ac26d4 RCX: 0000000000454e79 [ 248.072651] RDX: 0000000020000100 RSI: 0000000020000180 RDI: 0000000020000100 [ 248.079895] RBP: 000000000072bea0 R08: 0000000020000040 R09: 0000000000000000 [ 248.087140] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 2018/03/31 08:26:30 executing program 3 (fault-call:10 fault-nth:34): r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000348f88)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r2}, 0x10) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) mount(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f00000002c0)='devpts\x00', 0x800000, &(0x7f0000000300)) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') 2018/03/31 08:26:30 executing program 2 (fault-call:9 fault-nth:27): r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000348f88)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r2}, 0x10) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') 2018/03/31 08:26:30 executing program 1: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={0xffffffffffffffff, &(0x7f0000000700), &(0x7f00000009c0)=""/161}, 0x18) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000100)) [ 248.094391] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000001a [ 248.141379] devpts: called with bogus options [ 248.179529] hugetlbfs: Bad mount option: "" 2018/03/31 08:26:31 executing program 0: socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) socketpair(0x0, 0x4, 0x6, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) socketpair(0xf, 0x3, 0x2, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f00000000c0)={r0, r0}) 2018/03/31 08:26:31 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) socketpair(0x0, 0x4, 0x6, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x100) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="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", 0x1000}], 0x1, 0x0, 0x0, 0x4000880}, 0x4000800) socketpair(0xf, 0x3, 0x2, &(0x7f0000000040)) 2018/03/31 08:26:31 executing program 7: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x80000000000, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000001fc0)) sendmsg(0xffffffffffffffff, &(0x7f00000024c0)={&(0x7f0000002040)=@un=@file={0x0, './file0\x00'}, 0x80, &(0x7f0000001f40)=[{&(0x7f00000020c0)="73c7575b94a72990e177f86ed4835a72a65c1a6c6831eeb0c48163a47ab63bcb605c8450cc4798ff6521c2aa722d1a7105c8a07e6c", 0x35}], 0x1, &(0x7f0000002500)=ANY=[], 0x0, 0x40000}, 0x20000000) r2 = gettid() r3 = perf_event_open(&(0x7f0000001ac0)={0x1, 0x70, 0xffffffff, 0x835, 0x9, 0xffffffffffffff5f, 0x0, 0x1000, 0x42000, 0x3, 0x8, 0x80, 0x1, 0x4, 0x100000001, 0x9, 0xff, 0x8, 0x1000, 0x7, 0x7f, 0x200, 0xb715, 0x3, 0x7fffffff, 0xf0a, 0x40, 0x8000, 0x8, 0x7, 0xffffffffffffff74, 0x4, 0x6, 0x100, 0x7, 0x335, 0x3ff, 0x58, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000001a80), 0xe}, 0x0, 0x80000000, 0x82, 0x7, 0x5, 0x3, 0x80000001}, r2, 0xd, r1, 0x8) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000200)='mqueue\x00', 0x0, &(0x7f000000a000)) r4 = getpid() r5 = bpf$PROG_LOAD(0x5, &(0x7f0000002500)={0xf, 0x7, &(0x7f0000001940)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, [@ldst={0x3, 0x3, 0x3, 0x4, 0x3, 0x2, 0xffffffffffffffff}, @exit={0x95}], {0x95}}, &(0x7f0000001980)='GPL\x00', 0xff, 0x1000, &(0x7f00000039c0)=""/4096, 0x41f00}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000019c0)={&(0x7f0000000180)='./file0\x00', r5}, 0x10) perf_event_open(&(0x7f0000001a00)={0x0, 0x70, 0x0, 0x8, 0x0, 0x3, 0x0, 0xb8, 0x1000, 0x0, 0x3, 0x4, 0xfff, 0x4, 0x4dae, 0x40, 0x100000001, 0x6, 0x4, 0x0, 0x3, 0x753c, 0x6, 0x100, 0x1de, 0x6, 0x4, 0x1, 0x6, 0x4, 0x7, 0x3, 0x7fff, 0x80000000, 0x3, 0x8, 0x81, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x7, 0x4}, 0x801, 0x400, 0x1, 0x4, 0x1, 0x9, 0x80000001}, r4, 0x7, r1, 0xb) r6 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000004000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000001c00)='./file0\x00', &(0x7f0000001c40)='./file0\x00', &(0x7f0000001c80)='devpts\x00', 0x40, &(0x7f0000001cc0)="be623dfd58807ac0b2f86f052863a5f30adc0bce173ebcf648cefd7d64732aeb5b94e6af3ab33e53669ba6d304d067dad4b1ff3ed87f18fd170aac904e8f105e80e22881717c98752a9cd7cfb06d102877e3b36b2624d22427331755a9514b225d25999ed605ffe4188630db2e7ddcc57f6316b60c4f3845d9dfcbbde5e49af627b48d7c9bd743b536de31a9ba3010cb6714c9b90a50537be55ca12a18e6541bff5a82d293e7734ea9c90707899663bd96b3bcce5887bf0bd35963c5adc39ddcb6f2a0a02b01661242046cb54ef1aec5a486b69e006305064124867bf79f4dc11798e214b61575168b79887122e0a3461f703c077f902c0a") socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r7, &(0x7f0000001800)={&(0x7f0000000240)=@alg, 0x80, &(0x7f0000000740)=[{&(0x7f00000002c0)=""/83, 0x53}, {&(0x7f0000000340)=""/27, 0x1b}, {&(0x7f0000000380)}, {&(0x7f00000003c0)=""/40, 0x28}, {&(0x7f0000000400)=""/144, 0x90}, {&(0x7f00000004c0)=""/200, 0xc8}, {&(0x7f00000005c0)=""/60, 0x3c}, {&(0x7f0000000600)=""/105, 0x69}, {&(0x7f0000000680)=""/127, 0x7f}, {&(0x7f0000000700)=""/8, 0x8}], 0xa, &(0x7f0000000800)=""/4096, 0x1000}, 0x10000) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000002340)=0xf60) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000003900)={&(0x7f0000003400)=@can={0x0, 0x0}, 0x80, &(0x7f0000003840)=[{&(0x7f0000003480)=""/194, 0xc2}, {&(0x7f0000003580)=""/250, 0xfa}, {&(0x7f0000003680)=""/100, 0x64}, {&(0x7f0000003700)=""/14, 0xe}, {&(0x7f0000003740)=""/159, 0x9f}, {&(0x7f0000003800)=""/15, 0xf}], 0x6, &(0x7f00000038c0)=""/29, 0x1d, 0x5}, 0x3) bpf$PROG_LOAD(0x5, &(0x7f0000003940)={0x4, 0x9, &(0x7f0000001840)=ANY=[@ANYBLOB="18000000030000000000000003000000dfd00c00fcffffff0000000000000000000803000101000000810000000000000001f0fff0ffffff000000000000000095000000000017d2"], &(0x7f0000000380)='GPL\x00', 0xf172, 0x4b, &(0x7f00000018c0)=""/75, 0x41f00, 0x1, [], r8}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000000c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001f00)={0xffffffffffffffff, 0x0, 0xf6, 0x22, &(0x7f0000001dc0)="9ef9482ea02fd36d0a768986a7ebe7a627dc88937e7073e3521858dfa0d5e02f571a01cfdfa76e048e5f956ea5da60b90e02a6c3d3687ed61ec9ab5b682c02498bddef38de9ce8c753e41e78f414d16202a033b6c7752711a5f56924e7846d6dcde2f71026e1eb0319b5e60f6b1ec67fca31c3cf1691d3af91a19f56be5a10ff337a53ba13dd3d75e1555211954b92ec0082d02b7b4cdddc021cbe84e4af8f20788977e3416918843e6c92b2ebf7b8b33ecbd4c7c9a9d5036c3e3e538748a32f1a28eb77818ca1878ffdd445dcdb8a40e6221e0fc474428449dfe93c62bbc69996aa9b34488c1da4f6f7c2275305a6a4fb256c1a516d", &(0x7f0000001ec0)=""/34, 0x1f, 0x1}, 0x28) close(r6) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x3441, &(0x7f0000000080)) mount(&(0x7f00000021c0)='./file0/file0\x00', &(0x7f0000002200)='./file0/file0\x00', &(0x7f0000002240)='fuse\x00', 0x2000000, &(0x7f0000002280)="9b3923bfddc346e9fa2aeaffae6ca386d8d50ba83ab72218340d3c30c045a89ac016797652ba04f1a203cfceccb458dbfd9fd03c4a80ef9a40dc7a4f24b6619d04a58186466fd8465757d9ee053c082cdfa957e7efab6191761847cca59c017493ef5e3d22432cf0b4ebef") ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f00000023c0)=ANY=[@ANYBLOB="07000000000000000000000000000000000000000000000000000000000000000000000067eb0ecf1cfa4ffd89aa7e339417beb7d332a5c996e59875644dd1e3a690110400bc751bb0435977d90fcbb2b83c27812d818991d125e9c0f199be2bc7f01aa0a5cb9b9f99438aa0f1ae3d50201f7bb276536f567f03f062994da292b6db0000000000000000000000000000a93536f303000000000000002a27f6ae1258ebb5079c1bab4f1f6f11ee8ce2e590855a3af38e4bb871ef8400000000000000000000"]) mount(&(0x7f0000001b40)='./file0\x00', &(0x7f0000001b80)='./file0/file0\x00', &(0x7f0000002100)='vfat\x00', 0x0, &(0x7f0000002140)="98980e21ac8b46c0b7bedeee39e6bd9ae4088d6ab47dc9dc76a39e299ce3783aa33e482e450484961fd3e3c5b178fafbe54440e19512ea4298652ed129d4241d9d116d8a5c2b931d350f0c989f8a288fc9e56c") mount(&(0x7f0000df7000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='hugetlbfs\x00', 0x200, &(0x7f00000001c0)) mkdir(&(0x7f00000004c0)='./file0/file0\x00', 0x0) socketpair$inet(0x2, 0x0, 0x1f, &(0x7f0000000080)) [ 248.401575] devpts: called with bogus options 2018/03/31 08:26:31 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000200)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x0, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r4 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f00000009c0)="3949bcf20271c219f64b9e3fbd45bfae692375440912d5a576c2d82299018de50363f2cf30a439b45c2738869283b7900c1e030013700557a768d5cc05cb9ed624684f4dfdae73a8148b29b2978222576dabbcb3556bcf35a8f66fa68ceb0b834ec5120ac749dc0cc5aab7b0197711785349b1673ff5159bc1a40df6c779950e0747a25ce77a10f68b663a87fc993224a79b583eac02a2171f076ff3", 0x1000, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) 2018/03/31 08:26:31 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000000003042df8700"]) r1 = perf_event_open(&(0x7f0000348f88)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r2}, 0x10) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) mount(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f00000002c0)='devpts\x00', 0x800000, &(0x7f0000000300)="7b18f1563c67659c49445440cbb57f32c0f4710f0219046399f3e8a25c5d4975e2b42f404b1493") socketpair(0x3, 0x800, 0x81, &(0x7f00000003c0)) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') [ 248.478083] FAULT_INJECTION: forcing a failure. [ 248.478083] name failslab, interval 1, probability 0, space 0, times 0 [ 248.489616] CPU: 0 PID: 16846 Comm: syz-executor2 Not tainted 4.16.0-rc6+ #43 [ 248.496886] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 248.506215] Call Trace: [ 248.508780] dump_stack+0x194/0x24d [ 248.512485] ? arch_local_irq_restore+0x53/0x53 [ 248.517136] ? __save_stack_trace+0x7e/0xd0 [ 248.521455] should_fail+0x8c0/0xa40 [ 248.525159] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 248.530243] ? kasan_kmalloc+0xad/0xe0 [ 248.534103] ? kmem_cache_alloc_trace+0x136/0x740 [ 248.538921] ? __memcg_init_list_lru_node+0x169/0x270 [ 248.544100] ? __list_lru_init+0x544/0x750 [ 248.548315] ? sget_userns+0x6b1/0xe40 [ 248.552179] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 248.556908] ? do_mount+0xea4/0x2bb0 [ 248.560599] ? SyS_mount+0xab/0x120 [ 248.564206] ? do_syscall_64+0x281/0x940 [ 248.568246] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 248.573588] ? find_held_lock+0x35/0x1d0 [ 248.577639] ? __lock_is_held+0xb6/0x140 [ 248.581691] ? check_same_owner+0x320/0x320 [ 248.586002] ? rcu_note_context_switch+0x710/0x710 [ 248.590931] should_failslab+0xec/0x120 [ 248.594891] kmem_cache_alloc_trace+0x4b/0x740 [ 248.599449] ? __kmalloc_node+0x33/0x70 [ 248.603398] ? __kmalloc_node+0x33/0x70 [ 248.607358] ? rcu_read_lock_sched_held+0x108/0x120 [ 248.612361] __memcg_init_list_lru_node+0x169/0x270 [ 248.617360] ? list_lru_add+0x7c0/0x7c0 [ 248.621319] ? __kmalloc_node+0x47/0x70 [ 248.625269] __list_lru_init+0x544/0x750 [ 248.629316] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 248.635175] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 248.640165] ? lockdep_init_map+0x9/0x10 [ 248.644199] sget_userns+0x6b1/0xe40 [ 248.647886] ? kernfs_sop_show_path+0x190/0x190 [ 248.652550] ? kernfs_sop_show_options+0x180/0x180 [ 248.657900] ? destroy_unused_super.part.6+0xd0/0xd0 [ 248.662988] ? check_same_owner+0x320/0x320 [ 248.667286] ? rcu_pm_notify+0xc0/0xc0 [ 248.671151] ? rcu_read_lock_sched_held+0x108/0x120 [ 248.676141] ? kmem_cache_alloc_trace+0x459/0x740 [ 248.680961] ? lock_downgrade+0x980/0x980 [ 248.685095] kernfs_mount_ns+0x13d/0x8b0 [ 248.689130] ? kernfs_super_ns+0x70/0x70 [ 248.693170] sysfs_mount+0xc2/0x1c0 [ 248.696770] ? sysfs_kill_sb+0x40/0x40 [ 248.700631] ? alloc_pages_current+0xbe/0x1e0 [ 248.705104] ? security_sb_copy_data+0x81/0xb0 [ 248.709662] mount_fs+0x66/0x2d0 [ 248.713004] vfs_kern_mount.part.26+0xc6/0x4a0 [ 248.717569] ? may_umount+0xa0/0xa0 [ 248.721171] ? _raw_read_unlock+0x22/0x30 [ 248.725293] ? __get_fs_type+0x8a/0xc0 [ 248.729165] do_mount+0xea4/0x2bb0 [ 248.732690] ? copy_mount_string+0x40/0x40 [ 248.736907] ? rcu_pm_notify+0xc0/0xc0 [ 248.740772] ? copy_mount_options+0x5f/0x2e0 [ 248.745152] ? rcu_read_lock_sched_held+0x108/0x120 [ 248.750139] ? kmem_cache_alloc_trace+0x459/0x740 [ 248.754954] ? kasan_check_write+0x14/0x20 [ 248.759163] ? copy_mount_options+0x1f7/0x2e0 [ 248.763639] SyS_mount+0xab/0x120 [ 248.767074] ? copy_mnt_ns+0xb30/0xb30 [ 248.770938] do_syscall_64+0x281/0x940 [ 248.774796] ? vmalloc_sync_all+0x30/0x30 [ 248.778922] ? _raw_spin_unlock_irq+0x27/0x70 [ 248.783390] ? finish_task_switch+0x1c1/0x7e0 [ 248.787865] ? syscall_return_slowpath+0x550/0x550 [ 248.792777] ? syscall_return_slowpath+0x2ac/0x550 [ 248.797682] ? prepare_exit_to_usermode+0x350/0x350 [ 248.802677] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 248.808024] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 248.812850] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 248.818014] RIP: 0033:0x454e79 [ 248.821180] RSP: 002b:00007f3ee2ac1c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 2018/03/31 08:26:31 executing program 2 (fault-call:9 fault-nth:28): r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000348f88)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r2}, 0x10) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') 2018/03/31 08:26:31 executing program 1: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={0xffffffffffffffff, &(0x7f0000000700), &(0x7f00000009c0)=""/161}, 0x18) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x3) [ 248.828862] RAX: ffffffffffffffda RBX: 00007f3ee2ac26d4 RCX: 0000000000454e79 [ 248.836110] RDX: 0000000020000100 RSI: 0000000020000180 RDI: 0000000020000100 [ 248.843356] RBP: 000000000072bea0 R08: 0000000020000040 R09: 0000000000000000 [ 248.850604] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 248.857850] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000001b [ 248.924907] FAULT_INJECTION: forcing a failure. [ 248.924907] name failslab, interval 1, probability 0, space 0, times 0 [ 248.936363] CPU: 1 PID: 16849 Comm: syz-executor3 Not tainted 4.16.0-rc6+ #43 [ 248.943634] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 248.952976] Call Trace: [ 248.955553] dump_stack+0x194/0x24d [ 248.959164] ? arch_local_irq_restore+0x53/0x53 [ 248.963811] ? register_shrinker+0x230/0x2d0 [ 248.968219] should_fail+0x8c0/0xa40 [ 248.971916] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 248.977007] ? kernfs_mount_ns+0x45c/0x8b0 [ 248.981239] ? up_write+0x6b/0x120 [ 248.984766] ? find_held_lock+0x35/0x1d0 [ 248.988812] ? __lock_is_held+0xb6/0x140 [ 248.992863] ? check_same_owner+0x320/0x320 [ 248.997169] ? rcu_note_context_switch+0x710/0x710 [ 249.002084] ? lock_downgrade+0x980/0x980 [ 249.006216] should_failslab+0xec/0x120 [ 249.010167] kmem_cache_alloc+0x47/0x760 [ 249.014218] ? do_raw_spin_trylock+0x190/0x190 [ 249.018793] ? check_same_owner+0x320/0x320 [ 249.023105] alloc_inode+0x128/0x180 [ 249.026794] iget_locked+0x1da/0x550 [ 249.030494] ? ilookup+0x180/0x180 [ 249.034036] ? rcu_read_lock_sched_held+0x108/0x120 [ 249.039041] ? kmem_cache_alloc_trace+0x459/0x740 [ 249.043863] ? lock_downgrade+0x980/0x980 [ 249.047988] kernfs_get_inode+0x51/0x540 [ 249.052051] kernfs_mount_ns+0x4a3/0x8b0 [ 249.056105] ? kernfs_super_ns+0x70/0x70 [ 249.060172] sysfs_mount+0xc2/0x1c0 [ 249.063787] ? sysfs_kill_sb+0x40/0x40 [ 249.067656] ? alloc_pages_current+0xbe/0x1e0 [ 249.072145] ? security_sb_copy_data+0x81/0xb0 [ 249.076722] mount_fs+0x66/0x2d0 [ 249.080077] vfs_kern_mount.part.26+0xc6/0x4a0 [ 249.084647] ? may_umount+0xa0/0xa0 [ 249.088259] ? _raw_read_unlock+0x22/0x30 [ 249.092389] ? __get_fs_type+0x8a/0xc0 [ 249.096262] do_mount+0xea4/0x2bb0 [ 249.099785] ? copy_mount_string+0x40/0x40 [ 249.104002] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 249.109008] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 249.113756] ? retint_kernel+0x10/0x10 [ 249.117629] ? copy_mount_options+0x18b/0x2e0 [ 249.122101] ? copy_mount_options+0x196/0x2e0 [ 249.126574] ? copy_mount_options+0x1f7/0x2e0 [ 249.131054] SyS_mount+0xab/0x120 [ 249.134485] ? copy_mnt_ns+0xb30/0xb30 [ 249.138351] do_syscall_64+0x281/0x940 [ 249.142217] ? vmalloc_sync_all+0x30/0x30 [ 249.146342] ? _raw_spin_unlock_irq+0x27/0x70 [ 249.150817] ? finish_task_switch+0x1c1/0x7e0 [ 249.155291] ? syscall_return_slowpath+0x550/0x550 [ 249.160198] ? syscall_return_slowpath+0x2ac/0x550 [ 249.165105] ? prepare_exit_to_usermode+0x350/0x350 [ 249.170102] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 249.175446] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 249.180274] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 249.185442] RIP: 0033:0x454e79 [ 249.188609] RSP: 002b:00007fbfd4b96c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 249.196299] RAX: ffffffffffffffda RBX: 00007fbfd4b976d4 RCX: 0000000000454e79 [ 249.203549] RDX: 0000000020000100 RSI: 0000000020000180 RDI: 0000000020000100 [ 249.210798] RBP: 000000000072bea0 R08: 0000000020000040 R09: 0000000000000000 [ 249.218047] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 249.225295] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000022 [ 249.234513] kasan: CONFIG_KASAN_INLINE enabled [ 249.239379] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 249.246792] general protection fault: 0000 [#1] SMP KASAN [ 249.252329] Dumping ftrace buffer: [ 249.255851] (ftrace buffer empty) [ 249.259539] Modules linked in: [ 249.262716] CPU: 1 PID: 16849 Comm: syz-executor3 Not tainted 4.16.0-rc6+ #43 [ 249.269963] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 249.279307] RIP: 0010:__list_del_entry_valid+0x7e/0x150 [ 249.284621] devpts: called with bogus options [ 249.284654] RSP: 0018:ffff8801bcebf890 EFLAGS: 00010246 [ 249.294483] RAX: dffffc0000000000 RBX: 0000000000000000 RCX: 0000000000000000 [ 249.301738] RDX: 0000000000000000 RSI: ffff8801a1067e18 RDI: ffff8801a1067e20 [ 249.308997] RBP: ffff8801bcebf8a8 R08: ffffffff81d39d22 R09: 0000000000000004 [ 249.316259] R10: ffff8801bcebf8a8 R11: 0000000000000000 R12: 0000000000000000 [ 249.323516] R13: ffff8801b37c0540 R14: ffff8801bcebf938 R15: ffff8801a1067e18 [ 249.330765] FS: 00007fbfd4b97700(0000) GS:ffff8801db100000(0000) knlGS:0000000000000000 [ 249.338973] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 249.340708] FAULT_INJECTION: forcing a failure. [ 249.340708] name failslab, interval 1, probability 0, space 0, times 0 [ 249.344838] CR2: 0000000001ce0038 CR3: 00000001d791c001 CR4: 00000000001606e0 [ 249.344847] DR0: 0000000020000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 249.344852] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 249.344856] Call Trace: [ 249.344874] kernfs_kill_sb+0x9e/0x330 [ 249.344887] ? unregister_shrinker+0x22c/0x3a0 [ 249.344896] ? kernfs_mount_ns+0x8b0/0x8b0 [ 249.344904] ? perf_trace_mm_vmscan_writepage+0x790/0x790 [ 249.344914] ? kmem_cache_alloc_trace+0x459/0x740 [ 249.344925] sysfs_kill_sb+0x22/0x40 [ 249.344935] deactivate_locked_super+0x88/0xd0 [ 249.344945] kernfs_mount_ns+0x717/0x8b0 [ 249.344955] ? kernfs_super_ns+0x70/0x70 [ 249.344968] sysfs_mount+0xc2/0x1c0 [ 249.344977] ? sysfs_kill_sb+0x40/0x40 [ 249.344987] ? alloc_pages_current+0xbe/0x1e0 [ 249.345003] ? security_sb_copy_data+0x81/0xb0 [ 249.356185] CPU: 0 PID: 16861 Comm: syz-executor2 Not tainted 4.16.0-rc6+ #43 [ 249.363417] mount_fs+0x66/0x2d0 [ 249.370656] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 249.377902] vfs_kern_mount.part.26+0xc6/0x4a0 [ 249.380446] Call Trace: [ 249.384306] ? may_umount+0xa0/0xa0 [ 249.388857] dump_stack+0x194/0x24d [ 249.393059] ? _raw_read_unlock+0x22/0x30 [ 249.398563] ? arch_local_irq_restore+0x53/0x53 [ 249.403373] ? __get_fs_type+0x8a/0xc0 [ 249.407056] ? finish_task_switch+0x1c1/0x7e0 [ 249.411604] do_mount+0xea4/0x2bb0 [ 249.415634] ? finish_task_switch+0x182/0x7e0 [ 249.419667] ? copy_mount_string+0x40/0x40 [ 249.423267] should_fail+0x8c0/0xa40 [ 249.427120] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 249.431581] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 249.436132] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 249.443374] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 249.446709] ? retint_kernel+0x10/0x10 [ 249.456037] ? __sched_text_start+0x8/0x8 [ 249.460590] ? copy_mount_options+0x18b/0x2e0 [ 249.463140] ? trace_event_raw_event_lock+0x340/0x340 [ 249.466733] ? copy_mount_options+0x196/0x2e0 [ 249.470326] ? lock_acquire+0x1d5/0x580 [ 249.474440] ? copy_mount_options+0x1f7/0x2e0 [ 249.479074] ? lock_acquire+0x1d5/0x580 [ 249.482929] SyS_mount+0xab/0x120 [ 249.487393] ? fs_reclaim_acquire+0x20/0x20 [ 249.490899] ? copy_mnt_ns+0xb30/0xb30 [ 249.495361] ? lock_downgrade+0x980/0x980 [ 249.499563] do_syscall_64+0x281/0x940 [ 249.503243] ? lock_release+0xa40/0xa40 [ 249.508228] ? vmalloc_sync_all+0x30/0x30 [ 249.513298] ? check_same_owner+0x320/0x320 [ 249.518025] ? _raw_spin_unlock_irq+0x27/0x70 [ 249.522749] ? rcu_note_context_switch+0x710/0x710 [ 249.526607] ? finish_task_switch+0x1c1/0x7e0 [ 249.530725] should_failslab+0xec/0x120 [ 249.535188] ? syscall_return_slowpath+0x550/0x550 [ 249.540345] kmem_cache_alloc_trace+0x4b/0x740 [ 249.544810] ? syscall_return_slowpath+0x2ac/0x550 [ 249.548751] ? kasan_kmalloc+0xad/0xe0 [ 249.553215] ? prepare_exit_to_usermode+0x350/0x350 [ 249.557162] __memcg_init_list_lru_node+0x169/0x270 [ 249.560585] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 249.564874] ? list_lru_add+0x7c0/0x7c0 [ 249.568731] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 249.572844] ? __kmalloc_node+0x47/0x70 [ 249.576704] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 249.580646] __list_lru_init+0x544/0x750 [ 249.584760] RIP: 0033:0x454e79 [ 249.589050] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 249.593509] RSP: 002b:00007fbfd4b96c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 249.598418] ? __init_waitqueue_head+0x97/0x140 [ 249.602879] RAX: ffffffffffffffda RBX: 00007fbfd4b976d4 RCX: 0000000000454e79 [ 249.606822] ? init_wait_entry+0x1b0/0x1b0 [ 249.611717] RDX: 0000000020000100 RSI: 0000000020000180 RDI: 0000000020000100 [ 249.616274] ? lockdep_init_map+0x9/0x10 [ 249.621168] RBP: 000000000072bea0 R08: 0000000020000040 R09: 0000000000000000 [ 249.625024] sget_userns+0x6b1/0xe40 [ 249.630005] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 249.634992] ? kernfs_sop_show_path+0x190/0x190 [ 249.640321] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000022 [ 249.644268] ? kernfs_sop_show_options+0x180/0x180 [ 249.649079] Code: [ 249.653020] ? destroy_unused_super.part.6+0xd0/0xd0 [ 249.658173] 00 [ 249.662205] ? lock_downgrade+0x980/0x980 [ 249.665359] 00 [ 249.671218] ? lock_release+0xa40/0xa40 [ 249.678889] 00 [ 249.683530] ? check_same_owner+0x320/0x320 [ 249.690765] 00 [ 249.694972] ? rcu_note_context_switch+0x710/0x710 [ 249.702206] ad [ 249.706241] ? kasan_unpoison_shadow+0x35/0x50 [ 249.713474] de [ 249.717173] ? kasan_kmalloc+0xad/0xe0 [ 249.724407] 49 [ 249.729050] ? kmem_cache_alloc_trace+0x2e0/0x740 [ 249.736285] 39 [ 249.741184] ? lock_downgrade+0x980/0x980 [ 249.743297] c4 [ 249.748378] kernfs_mount_ns+0x13d/0x8b0 [ 249.750230] 74 [ 249.754350] ? kernfs_super_ns+0x70/0x70 [ 249.756202] 66 [ 249.760150] sysfs_mount+0xc2/0x1c0 [ 249.762005] 48 [ 249.766297] ? sysfs_kill_sb+0x40/0x40 [ 249.768150] b8 [ 249.773051] ? alloc_pages_current+0xbe/0x1e0 [ 249.774902] 00 [ 249.779459] ? security_sb_copy_data+0x81/0xb0 [ 249.781396] 02 [ 249.785256] mount_fs+0x66/0x2d0 [ 249.787112] 00 [ 249.791925] vfs_kern_mount.part.26+0xc6/0x4a0 [ 249.793777] 00 [ 249.797895] ? may_umount+0xa0/0xa0 [ 249.799751] 00 [ 249.803782] ? _raw_read_unlock+0x22/0x30 [ 249.805634] 00 [ 249.809665] ? __get_fs_type+0x8a/0xc0 [ 249.811516] ad [ 249.815117] do_mount+0xea4/0x2bb0 [ 249.816971] de [ 249.820832] ? copy_mount_string+0x40/0x40 [ 249.822681] 48 [ 249.827151] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 249.829004] 89 [ 249.833560] ? retint_kernel+0x10/0x10 [ 249.835414] da [ 249.838755] ? copy_mount_options+0x149/0x2e0 [ 249.840609] 48 [ 249.845164] ? __sanitizer_cov_trace_pc+0x48/0x50 [ 249.847017] 39 [ 249.850615] ? copy_mount_options+0x1f7/0x2e0 [ 249.852467] c3 [ 249.856586] SyS_mount+0xab/0x120 [ 249.858440] 74 [ 249.862299] ? copy_mnt_ns+0xb30/0xb30 [ 249.864152] 65 [ 249.867662] do_syscall_64+0x281/0x940 [ 249.869518] 48 [ 249.873723] ? vmalloc_sync_all+0x30/0x30 [ 249.875578] c1 [ 249.880305] ? _raw_spin_unlock_irq+0x27/0x70 [ 249.882158] ea [ 249.886015] ? finish_task_switch+0x1c1/0x7e0 [ 249.887870] 03 [ 249.892336] ? syscall_return_slowpath+0x550/0x550 [ 249.894188] 48 [ 249.899002] ? syscall_return_slowpath+0x2ac/0x550 [ 249.900854] b8 [ 249.905319] ? prepare_exit_to_usermode+0x350/0x350 [ 249.907175] 00 [ 249.910599] ? prepare_exit_to_usermode+0x227/0x350 [ 249.912452] 00 [ 249.916313] ? perf_trace_sys_enter+0xcb0/0xcb0 [ 249.918166] 00 2018/03/31 08:26:32 executing program 2 (fault-call:9 fault-nth:29): r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000348f88)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r2}, 0x10) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') [ 249.922027] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 249.923882] 00 [ 249.928006] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 249.929857] 00 [ 249.934320] RIP: 0033:0x454e79 [ 249.936173] fc [ 249.940632] RSP: 002b:00007f3ee2ac1c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 249.942492] ff df [ 249.947393] RAX: ffffffffffffffda RBX: 00007f3ee2ac26d4 RCX: 0000000000454e79 [ 249.949251] <80> [ 249.954149] RDX: 0000000020000100 RSI: 0000000020000180 RDI: 0000000020000100 [ 249.956005] 3c [ 249.960989] RBP: 000000000072bea0 R08: 0000000020000040 R09: 0000000000000000 [ 249.962849] 02 [ 249.967833] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 249.969687] 00 [ 249.974323] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000001c [ 249.976177] 75 7b 48 8b 13 48 39 f2 75 57 49 8d 7c 24 08 48 b8 [ 250.054631] RIP: __list_del_entry_valid+0x7e/0x150 RSP: ffff8801bcebf890 [ 250.061579] ---[ end trace 3b646b040d80f817 ]--- [ 250.066330] Kernel panic - not syncing: Fatal exception [ 250.072081] Dumping ftrace buffer: [ 250.075591] (ftrace buffer empty) [ 250.079273] Kernel Offset: disabled [ 250.082879] Rebooting in 86400 seconds..