000300)) r5 = perf_event_open(&(0x7f00004e7000)={0x2, 0x78, 0xdf}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f0000000340)="63707526352121000000010000039cd30e35cca01d3d0b0a1c60666f8dcc6d5c76fd2e9e09626b31deea1b0d3b81b62cd5b4223726b5797482fb1d83e6f82e2d6d0af3b128e9604401695c8d6c866c68a8fc80de2c4b099a06ef2b72590cf82c59249a74f41af3d61afdd00427799b7ce4b70845ed9780731957b75bf0253e4d4df598be5e3d7121a60f70013200bbbe9d7235af657010520b26afa8247f3756ed4c4a34cf9040d5540acac2865fc1ce8ded62538de97482f4317a7772e66f88e5e3e7476378c091498dfde4bb73bf0a004b9ee55ba00a0f") bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0xa1ffbc8b97c588f, 0x1, 0x8f8, 0x40, 0x10, r4, 0x7}, 0x27) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000100)) 2018/04/18 07:41:09 executing program 7: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x100}, 0x2c) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x9) close(r0) gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={r2, 0x28, &(0x7f0000000740)}, 0x10) r3 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r4}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00'}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/18 07:41:09 executing program 0: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x100}, 0x2c) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x9) close(r0) gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={r2, 0x28, &(0x7f0000000740)}, 0x10) r3 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r4}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r5}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/18 07:41:09 executing program 1: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x5, 0x0) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400)={0xffffffff, 0x4, 0x8}, 0xc) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000004c0)={r2, &(0x7f0000000440)="3c26b17c0adc01bbcf6bad36085d4cd0bc5e029ba2049e86d8c8450750d7c6188209bed9823b4dba783c18030e76c717bb5915b91e1a29f84ff061b764679945191af189225959bfdfcbb2ffc9226fc162a25fa4fb2b3ba906292220c669f97bd3047cbcb3a3978dcaccd93cecca08506d1510ce93664bdd7e4c9dec"}, 0x10) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000001c0)=0x9, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000500)={r1}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xffffffffffff8000) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x541b, &(0x7f0000000040)) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000380)={r1}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r6 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00', 0x0, 0x8}, 0x10) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000200)) recvmsg$kcm(r3, &(0x7f00000003c0)={&(0x7f0000000240)=@nfc, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)=""/102, 0x66}], 0x1, &(0x7f0000000380), 0x0, 0xefd}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000180)={r5, r6}) 2018/04/18 07:41:09 executing program 2: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004, 0x4000009d}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r1, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x59616d61, 0xffffffffffffffff, 0x1, &(0x7f0000000000)) socketpair$inet_icmp(0x59616d61, 0xffffffffffffffff, 0x1, &(0x7f0000000000)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080)="c6f76a8242485cf4ed18c359fa1ea5f94d1fdac2c3d328106e8ccebe0c55049a4dfdafc9132446dfa1c79123e83045935b1308f4ed81", &(0x7f0000000180)="d83cdfe4a2f6bf3ebfabed19ad8b5ca72c1a22173bd77fd8335dcb0709b5388a53fc391c4df5df13f88e927993ce58d2799ee4874487f0b5924fbf21c3fdfd6a54726ad2d63a9738f6af6881399fca21a85469a94d4cf7f7c64decb9890d16bde7ddd24b1273101854f105dd53f1efe828877f8f4459c4155cf936119cf1c8af"}, 0x20) 2018/04/18 07:41:09 executing program 5: socket$kcm(0xa, 0x3, 0x11) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004, 0x202}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x13, 0x541b, 0x6f2000, &(0x7f00000003c0)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) 2018/04/18 07:41:09 executing program 6: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1100000000000004, 0x7, 0xffffffffffffffff, 0xfffffffffffffffe}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=ANY=[@ANYBLOB="18000010000000000000000008000000711000000000000000000000002db591458bd907efc248ec"], &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f0000000080)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000180)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x3d, &(0x7f00000001c0)}, 0x10) socketpair$inet_icmp(0x2, 0x930000, 0x1, &(0x7f0000000000)) 2018/04/18 07:41:09 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x7f, 0x7, 0x5, 0x1}, 0x2c) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000000640)={&(0x7f0000000400)=@can={0x0, 0x0}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000480)=""/177, 0xb1}], 0x1, &(0x7f0000000900)=""/163, 0xa3, 0x3ff}, 0x40002043) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x6, 0x11, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x7}, [@map={0x18, 0x8, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x12}, @jmp={0x5, 0x3, 0x0, 0x2, 0x7, 0x80, 0x1}, @ldst={0x1, 0x2, 0x1, 0x5, 0x7, 0xfffffff0, 0xffffffffffffffff}, @jmp={0x5, 0x1, 0xefea9cfc27771adf, 0xf, 0xa, 0xfffffff4}, @ldst={0x1, 0x2, 0x1, 0xf, 0x0, 0x30, 0xffffffffffffffff}, @map={0x18, 0x3, 0x1, 0x0, r0}], {0x95}}, &(0x7f0000000140)='GPL\x00', 0x1, 0x9c, &(0x7f0000000200)=""/156, 0x0, 0x1, [], r1}, 0x48) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000bc0)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r0, &(0x7f0000000100)="ce", &(0x7f00000009c0)="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"}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x0, 0x0, 0xc8c}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)={0xb, 0x1, 0x1, 0x8, 0x18, 0xffffffffffffffff, 0x8f6e}, 0x2c) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000b40)={&(0x7f0000000b00)='./file0\x00', 0x0, 0x18}, 0x10) mount(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='vfat\x00', 0x80000, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r0, &(0x7f00000001c0)='*', &(0x7f00000002c0)=""/209}, 0x18) 2018/04/18 07:41:09 executing program 7: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x100}, 0x2c) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x9) close(r0) gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={r2, 0x28, &(0x7f0000000740)}, 0x10) r3 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r4}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00'}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/18 07:41:10 executing program 7: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x100}, 0x2c) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x9) close(r0) gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={r2, 0x28, &(0x7f0000000740)}, 0x10) r3 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r4}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r5}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/18 07:41:10 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x7}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000000)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392de40ff1fb630000000000000006fdc24e95e12aa7748f9f393e72be98c66f"}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x50, &(0x7f00000000c0)}, 0x10) r0 = socket$kcm(0x29, 0x0, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000080)={r1}) socketpair$inet_icmp(0x20659000, 0x6f2000, 0x2, &(0x7f0000000000)) 2018/04/18 07:41:10 executing program 6: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffff9c, 0x50, &(0x7f0000000080)={0x0, 0x0}}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000240)='./file0\x00', 0x0, 0x18}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000140)=r0, 0x4) socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f0000002240)={0xffffffffffffffff}) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000002280)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r1, &(0x7f0000002880)={&(0x7f00000022c0)=@pppol2tpin6={0x18, 0x1, {0x0, r2, 0x4, 0x0, 0x2, 0x4, {0xa, 0x4e24, 0x200, @mcast2={0xff, 0x2, [], 0x1}}}}, 0x80, &(0x7f0000002540)=[{&(0x7f0000002340)="2ea24fee3d6f3e51ee20f48e037af271c75bf73993a66b70a6227f819aca3db90d1f54e9d877b2f9689b6f69edef06075d53b56a54ff165c4df9fd83f8e754d9652ebb030cf02bccc2a38a83196e1e7bd2fa265f6f30457e527cf22c41cc43cb7b753f6c891dd6cc1ae481ef7112f31e58189fffc9736257464d36056617e0b2de94cb6298a178106655091cff57ee1aa0a7bf2ca5a566be8eb833058305e5704375a1f6ddfc047350a64c90917fcc2c2c2f464f20ef783da61619eb38d1a7474b3d5fb5bb3e13858d648c", 0xcb}], 0x1, &(0x7f0000002900)=ANY=[], 0x0, 0x20004000}, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000180)=r0, 0x4) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x3, 0x209e1f, 0x400008000000001, 0x4}, 0x399) recvmsg(0xffffffffffffff9c, &(0x7f0000000580)={&(0x7f0000000380)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000000900)=[{&(0x7f0000000400)=""/136, 0x88}, {&(0x7f00000004c0)=""/138, 0x8a}, {&(0x7f0000000600)=""/208, 0xd0}, {&(0x7f0000000700)=""/98, 0x62}, {&(0x7f0000000780)=""/245, 0xf5}, {&(0x7f0000000880)=""/108, 0x6c}], 0x6, 0x0, 0x0, 0x7fffffff}, 0x2) sendmsg(r4, &(0x7f0000002200)={&(0x7f0000000980)=@l2={0x1f, 0x1, {0x9, 0x6, 0x9, 0x0, 0x8, 0x5}}, 0x80, &(0x7f0000001e80)=[{&(0x7f0000000a00)="bc01a193012b59da28c48e5996ce877d736d2097392933bde83810162f76184d0793acd274d444dcc4e7b3f0281b26229fac369d83d75655c79c40c24646417f87bbf959f1b35507be9ccee188dfde84242e28d78297ccaf89da23d766eb9476b206c2aacee53df1f50f9b16ca465b0a05eccd52845c", 0x76}, {&(0x7f0000000c40)="e2ef1f50bc652a470b03886d9c870f64b4cbbf45cceec360b53adf220eeea91d71b69f6d3ffe5242e035a0bb0a527d02a8b136372bd79d29ba88d2ceb58c5ffe04bf66ac48c76147b79171174365688e8f9e6b467dcb46c5aa02732bdaba9a17d47f36de538b00091be8348f3d5c18baef015e323d6a1d8567ea8fc9f9299926f86941032396dde9288a00b9e41f9968a86b01de83f55bdc2de72846f1ca59f488d249d22be56891e431f597e70942b5b51f1ffcf7beb66b5df8cfdb9d5b3dfce41ad7460e8482bf28cbcadd6d987e076ffb773600254cb0106d21be2f6a22f1f4ba02bf499b65141afa0206e9", 0xed}], 0x2, &(0x7f0000001f00)=ANY=[@ANYBLOB="f0000000000000001101000001000000c73989c37ff14cf7c473a0fcce54d004dabaaa77db78c1c137dfd03f6b3eaaf3b46ba5acc5a93469fbef5838a617be81a6d5d5b85f71c2a71af2d73c3d929c12612c000000005b6c1611623c987bb7ce27d9974a16b27f5775c5e30891d3d9aaf242b66fb823bab5c6957b50f7f82088c22ae236cd3904aff6126fe0846d77d43cb2f2b970ce5897e7fed4409937f49494b3b76bc98c93c1671d20b81f5cc8b2d9e3845fec89d71590cba07618dca57acc7ea56d0f9b391837cb55ae1368d6eeeebbc8f9fd002cfc1ede83a94babdc2b2f79d5547f689cded364665901c6237ce80000000000000018010000000000004a67f8e35ce8f9c4d5f2822d8c86624ecbd99feae36fe41ab3ad35cdc580d33cb10b0dad85bea678267e4d882b10eb52397b600012414515bd35fa525de1455d62383fac92bfd536fb0dbd67b145d2d527a97a791ae6fb1fd07dd69153f16e40d2f89da3d208464b2080be856b09297fffcf5ce377fb6ef2ba0dd94a02865d1c5230a82b7172154129369086eb1b3370797e203beff53c2f2b06136af7622ccb18f6e7507f78d109193a52d6e66b11fefeed473d9822037386cc974e4bce60dd336b769970c631f9a07acc8a4a3db3a0a75646ac0000000040000000000000003f01000008000000d9cc2d3bf306a7a6e211a128c99987ee00cfb639b2763a1fea0061897dae18f1cb19a460682c58e80b9125b9dce70000"], 0x218, 0x40000}, 0x20040000) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', r3}, 0x10) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0x0, 0x0}) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000001c0)=0x1ff, 0x4) 2018/04/18 07:41:10 executing program 4: socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89a1, &(0x7f00000000c0)='lo\x00') 2018/04/18 07:41:10 executing program 3: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0xa}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000000300)=ANY=[@ANYBLOB="18efffffff00000000000090000000007110000000000000000000000000000095000000a7ef4397d5d99bb4ba01c8d624baf33200000000dd089ba97c0671bb9a61d45d7786157262b1aa46beab7639abcf28ae65118fddce2e77d18f4ed9f7c7bd3693bc0e785d4c88def7a338bb3d91f76be48bd449c259e9049f44e6f0c8f78f23399a211f95d39dd7a819079aece89a901d73ce9f403b5341f7150f1d528590eb1e96fb"], &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r0, 0x0, 0xe, 0x1, &(0x7f0000000240)="d5d7c1c43e1e3c22bf9188192bd5", &(0x7f0000000280)=""/1, 0xfffffffffffffffc}, 0x28) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) socketpair(0x3, 0x7, 0x3, &(0x7f0000002ac0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000002b00)={r1}) sendmsg(r1, &(0x7f0000002a80)={&(0x7f00000003c0)=@nl=@proc={0x10, 0x0, 0x25dfdbfb, 0x12000000}, 0x80, &(0x7f00000027c0)=[{&(0x7f0000000440)="f5a836098a1570f411e2df1494c6c5a6cb5f9938130ae1974743d27840e8b39400c71b2bd3edc939a2f28c47c1c243fd8e1b69a36a7d8dc0a51ef34192e36127fa11b999c3008294a9260ef6e0267c35b673e388167818740361fe6943ca7b898d3c751a315797c89781e2b267c743a079a3f4966f5411f2aad96a02934c12be3bf3481bc4e1b81af3214a9aaa5af35e5294294476da2822b5f56eed446b3be3a8eac36569042690f8e3e8c210e91eb8d57115", 0xb3}, {&(0x7f0000000500)="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", 0x1000}, {&(0x7f0000001500)="c2601521ef29d38e9587ac57ff1120af7508feb3f3bc149ff88586864b6207cfefaa3f9ddf9a78910d8c0f3bb8c36455c1f5c9552b716607f8aaaba1541ef180637df804772879c4a0c38b55115d1aa906ab97b05a73ce465eac398d6efa1b8adfe93666cf2cce71fdc3e17fb51a4b98966ad1b4f7fb836acf0127ec", 0x7c}, {&(0x7f0000001580)="8b4bcbe591c233cec6fc292a9ebce52550f4f1d8ba5fe3750faf8ed44241c1e8d95eb58783c77eac703b5078ee11cf5d0fae374d6f98369d6e025544e0267d254e8528b478f84618e1ada4bdc7e3ce5ca4c652320a5aa3cd39322a535413b0a760ec114926279c901c8040e7ab555d8a7f525fff9b6e96d4aab5ac78f0746b44c3636e0fb6367f0802163f2512", 0x8d}, {&(0x7f0000001640)="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", 0x1000}, {&(0x7f0000002640)="4df855d39f563f0aad5e3439d391c8c1e085e9e55010a6296e65eb83a4936cce24d611908798229cdea8016fa3caef37490665f499f1b6a233237383148657ecb455ae9977530a79e375be3af45a3ffa6afeaae2a22e7a53f7fd82cc6607451cdcab212066", 0x65}, {&(0x7f00000026c0)="573712a061cf0322ff19dcaffa06f0cad4143c6e795b86188ee32071eda1", 0x1e}, {&(0x7f0000002700)="b6989e3b62cf1fd913bb661b4338c1d003586bb281556c00cc5c71788806ab781091bbbc498c9abce45f57d0ce49", 0x2e}, {&(0x7f0000002740)="c0", 0x1}, {&(0x7f0000002780)="a8a14f9dd5e42688e7836751bb145608369b056bdaec3e03d2", 0x19}], 0xa, &(0x7f0000002880)=[{0x100, 0x10f, 0x6, "d721ed92830030b4b9a29a643a60a5d4eb4ae0bcac404a4a7f400065a859cd28735ea826a441e067f18187749fa84e213c766e8b364e9cb4d03735205bfefca3e26ed4973c49510f1a46ff2ff32544b61dd038f03d566737d3e7310089dc47f67dc99adc37ec955b12a5ad9a2ec65e06e284518e511fa65a8cd3236a685897ff5a73a21554df6d9327380007449f89e8a69f0317b840ba41e7bc9f6432efaf9def8c4803c3b13cd80c6f5dae212f3f078131f4ea15ca5b002653324ddc6a6eb1085db0210b39f892f4f631c69701ccfba87f17da032ffc875b2478b8cc0d3b987915498cd343ec9ceb"}, {0x100, 0x110, 0x8000, "11bce2a53a6434da8815fb865abb18484bc04057c3941af8a646b72e0d16a8ba58f5d7511f30dbf840a998aef1168979467087cd88b8730067f5eb64d7e4729db0e5d528201aa95dc841d3dbc70adc768baff75d858ef7adafad5b22020290ed56fcb88436dcff27b0d797e0ff30d12d1ed37ceeaf8a6b7194078aeb5b9992b5be1db532f1b31cca1f396f396b307da762f076e6643a3257a33bea60c03bf98cfaa4ef13bc959eeb8ae832f5b7ca7514a740d9dddec664a1d3d6b99fd53893aef85da2f37a3f93d13135b697f33587a3848c1d66790ac8f088d1c4adab725c5a03ae6873e5ebf4b493fd081118842b38"}], 0x200, 0x20000000}, 0x40) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={r0, 0x50, &(0x7f0000000180)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x20004000, 0x705000, 0x8, &(0x7f0000000000)) 2018/04/18 07:41:10 executing program 2: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004, 0x4000009d}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x59616d61, 0xffffffffffffffff, 0x1, &(0x7f0000000000)) socketpair$inet_icmp(0x59616d61, 0xffffffffffffffff, 0x1, &(0x7f0000000000)) 2018/04/18 07:41:10 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000040)) sendmsg(r0, &(0x7f0000001ec0)={&(0x7f00000018c0)=@nl=@unspec, 0x80, &(0x7f0000001dc0), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000290000003700000028220000000000009d233d9c771b1166aca7e12cd471766f66c60fce8005a0a4c54e6678f106c16aa2ac42552fa86d0c38fccf052d9cb7c6e7108019122a21fd474ce356430508044f0aa80ea75c42fc7cd3d1b4fd0dc4e528fb73f80173a4647f636cc0d5682d02d2750cb3175f5d5f2920d22677af37a823a94bef2ddc06b8"], 0x18}, 0x0) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000080)) 2018/04/18 07:41:10 executing program 1: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x5, 0x0) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400)={0xffffffff, 0x4, 0x8}, 0xc) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000004c0)={r2, &(0x7f0000000440)="3c26b17c0adc01bbcf6bad36085d4cd0bc5e029ba2049e86d8c8450750d7c6188209bed9823b4dba783c18030e76c717bb5915b91e1a29f84ff061b764679945191af189225959bfdfcbb2ffc9226fc162a25fa4fb2b3ba906292220c669f97bd3047cbcb3a3978dcaccd93cecca08506d1510ce93664bdd7e4c9dec"}, 0x10) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000001c0)=0x9, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000500)={r1}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xffffffffffff8000) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x541b, &(0x7f0000000040)) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000380)={r1}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r6 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00', 0x0, 0x8}, 0x10) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000200)) recvmsg$kcm(r3, &(0x7f00000003c0)={&(0x7f0000000240)=@nfc, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)=""/102, 0x66}], 0x1, &(0x7f0000000380), 0x0, 0xefd}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000180)={r5, r6}) 2018/04/18 07:41:11 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0x0, 0x0}) socket$kcm(0x29, 0x2, 0x0) socketpair(0x0, 0x6, 0x6, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080), 0x4) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) socket$kcm(0xa, 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x9, 0x0, 0x4, 0x0, 0xffffffffffffffff, 0x7ce9}, 0xfffffffffffffee2) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r2, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x16, 0x29, 0x6, &(0x7f0000000400)) 2018/04/18 07:41:11 executing program 0: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0xfa}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x6, 0xfffffffe, 0xfffffffc, &(0x7f0000000180)) 2018/04/18 07:41:11 executing program 2: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004, 0x4000009d}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x59616d61, 0xffffffffffffffff, 0x1, &(0x7f0000000000)) 2018/04/18 07:41:11 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4c}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x36, &(0x7f00001a7f05)=""/251}, 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0x0, 0x0}) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000140)=r0, 0x4) sendmsg(r1, &(0x7f00000001c0)={&(0x7f0000000040)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2=0xe0000002}}}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000280)="b3de34dfcc92d69cf02fea202ce6f530bb475fc5787f40d9f48dc32e97703dfb09982dc39e08407ea3a857576451f26ed4acb889cf9a2c5e31e0aa0fb6e74b31f5fd49a19a69fa0de86b6bef44b1003845b9c144173675a6d4d3e30a8dd30d7fdf11c70eb17db2444042ea7db5ed563a77d5e1bd8a0d368e3b626126bac8345dacd995abd4ecb11393d155b92b0d054318c2c6d809960183bb6037f4192a2b15c108d69d5f9e53c8a3bec93ac40728f4130a88588ce35310795d8f192bea43d15a8810b5889bfa6761bd86df6a00000000000000000000000000000000", 0xdd}], 0x1, &(0x7f0000000000), 0x0, 0x400000e}, 0x40040) 2018/04/18 07:41:11 executing program 5: socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f00000000c0)) r0 = socket$kcm(0x2, 0x5, 0x0) sendmsg(r0, &(0x7f0000000840)={&(0x7f0000000040)=@vsock={0x28, 0x0, 0x0, @any=0xffffffff}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000000)="e5", 0x1}], 0x1, &(0x7f0000000280)=[{0x20, 0x84, 0x2, "1c0404020000000000"}], 0x20}, 0x0) 2018/04/18 07:41:11 executing program 6: r0 = socket$kcm(0x2, 0x7, 0x0) sendmsg(r0, &(0x7f0000003340)={0x0, 0xfffffffffffffff9, &(0x7f0000000000), 0x0, &(0x7f0000002140), 0x0, 0x80}, 0x0) recvmsg(r0, &(0x7f00000030c0)={&(0x7f0000002e40)=@can={0x0, 0x0}, 0x80, &(0x7f0000003000)=[{&(0x7f0000005380)=""/4096, 0x1000}, {&(0x7f0000002ec0)=""/150, 0x96}, {&(0x7f0000006380)=""/4096, 0x1000}, {&(0x7f0000002f80)=""/88, 0x58}, {&(0x7f0000007380)=""/4096, 0x1000}], 0x5, &(0x7f0000003080)=""/44, 0x2c, 0xfff}, 0x40) sendmsg$kcm(r0, &(0x7f0000003300)={&(0x7f0000003100)=@ll={0x11, 0x17, r1, 0x1, 0x369, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x80, &(0x7f000000a400)=[{&(0x7f0000003180)='z\x00F?', 0x4}, {&(0x7f0000008380)="31595a2a4861ee17cc67b581a9b15cca499ad9fbdbcd9886f5c59576f8fba7b7519e4131cf487560ec3534ba6f3c6e0ce88622792a68ba0e2256da2eb9ac4e8f0333cbb4154430b92dcf2ff5f59efd2dee8ae8c7cab37170a666735393c3b5f0d94c1fb8e0cc2c3545bd685282dc45b2f13603b605869a9f60fe0b9c6caf3514167e5ef98076d306499b5c05beed0e24e690afb93b48abbd8ef41b4b3f49a03af4a38599df45ae0d2631511f8a347f27578fd67c91a18202acbb9b52495a91eb3f2857d9bd83f09230e10bd027dfcb7b86a7508e8fb408f1584fbed33551a99f277952df7bd789dff9b43b7e6a02b72fa8114d172af827a44f7c78f2e686094f9f4044203c589c19b3f1e4b9778d629d35017d3d486d11a3e62d59192ed76ebe78a175fe5b96ca0b6e9e80bc0fb38780be40618a1e7d6e53b3fe849772064a35151da1267db89733292a3d2f00a8075fd5dde503e66e54fb6699b2db4a72798bb366b6897add64af5583e261978ba57665543ca92221bbb620ba5f08e2cc4e69263c07c2e7178453685f200e7cf81d3586ca5d95bbc88faf7c888acc5319ca6f453538856853e3e9c6098a48ee506814f92a7e201de9d268aba4060d8d42616816fbfaaaf64cd92b98937bc62ff230f089b98fd1810a0b400a1a8c50b1f4c62409eeefcaec1916427633517615e88460159be28219d394d5524dc811c9580dbf53e0d15a999c049824805e3b8ceeca017d02f6f334019fad1906282c73b5f2e90003602cb9b5d02853747dc58fe9509716c1b5fd3bb7034da20d74cb145b7df7faea4640740333c7e315c200fa273d77c85c6dfda9fc3f6637a42b836e446839b82f072d64d48621621b1b5b8ca63cc2258c62925712635a74eaf9da5d3f43f714a6860bf19882a7eb5575ce4451d837f049b5322aa125a7a9438ed9bacb882168517f73d9ec81bd7eab7e806a5146b8fa2dfd0238d9c38a4f395d1e0ba440416018e25eec4a1f182613f688ead3f4539f1ab2ff3091eb392aa32fe8756507476ee8b20f48541054db66204a3dc018acb4b9a72a1398d7a537927e90bfb62379039b34c1c7c8e1ba06a36c53454980654e295c62fb1b9eb153bfd2a8951dda0a29d5dcb4772593cf8f24d74f0b3e3079915192efe0c1a728771147b3163989771168a131d5c497fc01dd8bdecdcc8a2509480270399ba883445c07a9860476ddb80d7da9564515f2581b5da211d0e19e3b356c509a75786c4ebb354933fb64b4649b8bbe28211ed2f9f5a7098de5bf01377530a48960ec35a570ede7d48e87ed54916f33eac2d44fd1e7728e82c22b5dfe4d5465e12ee7e7563186c8f2e4ddfa1eb0b677df9c89190d329bf4aab11aa5969cc10480a70140d3851cd955383c1b8fa7dc9917b5e454984ab1ace1939a8d12cc7d6ed7d8038ddd6632736407305ee2ec3f107df7819dafc1da6ce028ca1ca382bb52ab9a308d5f0db0f995a6b1966048d452afd4473644cf86029ac60d64c3b9a65ebe83659eea1c748943d2633a67811c7e09f7041d5bc8875d9c9b9a9e12f3eabb056999e949caee5536db8bde06daa29c0d3e33cc03a39793975106f4e0af01b2abf5f32ef98148d05804bae1a29b6226056b9dcbe0cc80c53383937a761998c6752b6fc0df6dc0bc640bdcbaec7eb6a5a8bd28cf4a6871e80f12064f4ac18f192f2a290cf3fc6ae1d2eafce38c067bb83a684f4903718c136f2ea7038781430e8a43f7fe04070cf933eda92e4c1ca8b29c024fec964853602a2e702d6445d9073a3c5c8e9826236c7869b403df913f575a599582385be69dc5abc02a8bdfef77ea4181d1d70cdfe610216a2b3485e1a79dcbb256a156969acc8afa50b1134804e39b0e71da74b7fb67a10d7c4c76c8efb2cfd841040a66b2495c7e17f30eab2f17e09c3bb0da594713bf149d3947b5b183e624a08cb51e339eb640d908623d9db8acef878cd64b2cb0715b2fc9bd6379d73fc58253d0d0540f887d4b32348a42e8ad9414dd287f97febcfba4e3174b6d8a0c28719e6b4b8e88ef31e502efeff04050416c2b5111f7ec86efbf5dc86be55f441d8128519f7cb1b4893719f956162eb2d49e0538bbc00fd3e20b9e123f6b30a915f0f3ab119adef3efe1a47dc032138938f55d843028efb11bc4bfd478c4c90f8c2e750bb5a52fa3c6b35134f621854140ecb3bf24d882a2a5dfdb4257cf14735b8e0373018a982bc700c8f68a624f9e0b86dbbd2febd309a589f78dac5fb9c8f0a7bb8c20998e012f1f48cae4a0c7b65cb5a7377ecbba79ba6104321e2926987e4bfd8b463970dedcb820f59a614cb37483ae3dafb3da504da122dcb5ec72ffe3345612d8e6f3bed51fe9701b22fc3dddb09ec859142672c2e4cc4eb39339eccbf0dd65861c33995b0d98cdd350d624f6713c8cc0826914ce37c0a48bfd2e741d4410c3e4a949f27ad06f5f7a17db527316027121f8806b952bd27b1f5c81cb7eb56a86fdee43a24e582536d9b5979f6af45db46875a5baaedc5f5b2269f03b58835dcf6c3f3af60166864eeda7eff21c802be0ec88902b8653bacced3089d58b445d40d2930729a52d601e50e2120b725f96106c35774159131c70a827659e8ba1cf2e1e591943360aced195e79c165688cedff8980243040eb188213ef95c3895108ed544777aa44641f4aa086ba76a5557dd71575ada0a103e019c372cfe0a15d944d87c3dd4a1feb46be199878071bda80e0d3f87003a2295b25fcef2d47ee2bb057aa370a58ab6f3787eca74d5287bca37ad9adc473795554e7f5637fbc583265ac05f39aaeed699fd4243a91dfba91b5bf0951aa522438dd2d85257a1d5c7e6d3c53180fdb7c8605dbe070916e05bdeea1efcab3f47327071a463c2bf11085fa942f165d6a0b0cb4f4b63b931a784d46fc759c529b65e2ef2344cec0c7444d1cb5c9d3c1a639f4d10e21be35e74907c1900e166ea35443f9f8a818b28fc660ba7aa4b296722fe91dda3bbb09d94e925ff570e0b3508f5de47965ff72944cc938385283bc9f65643a8a9a7803a49ec54356757e61c597f8999c3be7cc6366dc859670a8221dbd206c864ecd63785e5d20930ac85e35e988c61cb9b6177272d49c8a79c41b72083ec795226844f8a251a3ad1341d2b078fe911a2a463f221250611701d79b800578aefafcb0aab7e73c0d60d9aaf874c10b34feab5438c5151bcf441e353f0c40bb3a9f4d4903551738f40e7eca443e1841713f0f7f4d406bec065065195064ce0ff44c27b88b8314d95202bac05330e6155564c79d7d676b748b918104b40f925bda90a109e602277b5f3c3dc09d245351b6c6c64e66113de177a084484b5425b7b19552121f51d591a741d5005d7438259b44693f70920f2b8923f91050c9b8f44cbef855213a970ac7f0b1653c21db12230d8337d0b7ea62c27c86e818c4aba9dd97bd6caee26cc7d358edf4cdc35f843aff0c98b61d95414f1634af0bced2d6a224967b1b800f50d4261aadf46c5d20c0eb84c83bde49bb3ef7e48afc1714883931a0d4ccd4779027869cbf783c93e592627dcca14c158b899524b6e5086007c94e87235b44afa5fca34c9e38e1259be1377e6a90e170c790ae458922ef9d4fc95de64cd1c4fd1f56dffe399cc9ba22e7f9af9764e3b58a8557f6557f309a75f989af597d3809213384f33b56e8387f796fc61b17327094a7b2443d9c09aa592d974767ac7bdf2c93577b383cbe7b3cc1f7d17e132fe7d035d658226a6880ed1a51700c59e8ef5617feb05bbbb6bca827918db91c6577a3b091d4830b6626ac1054bbc91f19cfbc02c092f58b7d08a5a275b07fec65432742880b7466fdbc7d6e66ba1661f4bff546b006e7ff8b2cb7400814090f6859379936a9c74d69c087ab6b63986ccaa39d01b4765650941fae1475297d4833b10d26a82ecedd355d007bd13fd144ffa9461e945d82ecce91262472f49e95de294c2076675800412ffd3103afc35333432464a3f018399bee3e69f3a4257ef4255e2668b799b99242592de4ba5a5f5c1fc2eb5ef2feca304bdf7494ddd82e8243d86551ba323797a3730ec6b8c9602e7b74a3267c886ba44b2b983d1694a80857e57d0860cbad0abe7f78e9a05cf1280939d2e0a6ab63508dd651e1eeed73b56d6af798f3745b4e129748c89b63cb33d0c6dfee5261a76ec7dd72e69321ea5d0b375c8708de49b124ba3af497cfc1b206fa69178868e89f1357b1d7a63aa8711039293fd057b1b88f7976386d3533a66311384a9be5f9187bf3953e933450573d6619889c8f1afc3ded45c1d1c86fa4fb9456049cfc823cb9880f8869e5feda40f85c43335951bfa5435abafe102ea53efd724b146bc46d61f0d8c5dbeba1acee821c492eec3f5e2417601ac87109e6844cd4b3283fc65d77d4cb9ba15ba664d7a9580015e7f72a48052dfbb8292cce28408ba1eff3136d3384ba7d3149aae0f61c12e8afaf7808f414898e89f8599517aec57b31fd95572da66928811530b6a28e81d94615ec0dd6775ff13b5c158cd6a0ffeac45a5c93bd9bf70ed3a2a64bd88889141bfe7b51c7f574ca4e3f9db9799e8ed7cf359cc4fde6b20c62baefa9923cd0b149f2c1797c3da921d3f01387d73827d99b8c0e6e60a70af3f179aabb4a13a31ccda75c1fb48c4840f7b25e10034036ac7e27fc2391e062f631be3db2cc4e2c5188f3ea4eaa17fec99edbdaaedf87b8533b32e47e76e55b6ec40d7877ecc8242c1251c584f50d5c3c5e48b64549e03692af8f805f0c388c998810a4caf3baf50371f565235df3b5fb7ce65b4faaf63db592f2b698506c88128a5e07461a58c6e2f9f044435a64985a40948cfe055ab01300d93b56375e083db3f8ec8ef34e077d04fb8fd7b04b8b2372d06150798ded84c8004627dd4b0c2dd969ee69554bf2ba2d0be1f016cc52afd843d121b07baef5ac8792c67d50228b5ee647f59ef696ff936c404b3476c0626963d2e8e3652d776cad435f4fce1f881f57b580f2cec12b4de6ca2105a96f9667bcbd7b821a02058e750613ed3772db72d20f59576fd73f8ac7d920edccd50ac6037034bd2555a4ba71830d965bef94f4374cfad7f8c788aaecfb63e7ed2db8a3f7a3db991512c0020b7a41788a3bef70ae9ff3bb5378c311ca7bbe4c420a5e51f7c5a05f49bf81f004321ebb6d7c1fd16bc09c480739711ee4b25bdbab278632b8f336438c93eb5ece5db634232a6445e2417b7021a3eeff40375f7da778d0aebdef60cbd8012facdb4907bc8be73c7f29453909d19df37ccf3a9e3cfb36c456f63806b9d0ede2ad40691584c13993f98324c73dd3644e95249096eaf6eebc73b88b5f946461d8ed38c36df1ad9f5177aa1a8567754e639d48ab19c6afcf5ae424d49c31e2b99575aa8a87bcfcb843490df896040b3e2df3f9c6de1961f1b10b109b88e7d6379675178cd7079fd947b5a5bd02718de6afa78beb0f3b3f7dc38517cf24230fd25304b95b5c0ae2e11f324eb2edff3c21e0676e1b2eddb0db3391cece9333e20fe6fb1dee0daeaf484c1c8fba91ee8bab4875ea42ec36aa271afbbc1a9023f06a74a3f35339412719eb83ab20d00e67a8a64d244342b3806f88acfc378b6ba6b4537e7f9f3397fa3100f14378d31bb0eb732501fea70b62875412da68f02f479730f633678afac51dc1226e4c426f70c3e7d2f183c38a1d2b8a3886713a21fdf67527d08ad7f4f32492b550378e9dabd176c47d1073b98cc11221d90a941354fa0673e3708854d", 0x1000}, {&(0x7f00000031c0)="8c4c29e29d8249ce6a167aa91541fac80872a3fb911a300eaa596c0443e4bed40a743062a8f8ec5daf2c562c14dd7f242ab889e90779ef5435ceadb3acd5ac78d1b3a98c1f2f43b2049deda51056a8948dbffca3507f141a0557d820856409c5e05a11816030b118abec43edbda73aa0e4f9cc467b7442055ba08e7e938263f1b4248a6f298eb791551af674b266eefbde33786b9f52137baa1b765cbdcff7fd0274cefe2eed479d61dea3ddb75925892f8b6e3d82cdb42db876720aa04778268cfe376a0f768b8b615a89f3336224b407a15a48fcf035c12a", 0xd9}, {&(0x7f00000032c0)="7c7f6b481616c79f1e16", 0xa}, {&(0x7f0000009380)="ce5b55f3ff87f6dc3d35094c10356aedb7e421d74cd0f90b9403b77120475a14876d5ae71ad839b97348efcd9580ab6174a271a8d2f629da39613bbf16d9c75f1960f462dab4b1cf8610922a29a9ee157b303c623546eed2979ecb61e060", 0x5e}, {&(0x7f0000009400)="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", 0x1000}], 0x6, &(0x7f000000a480)=[{0x110, 0x10a, 0x10000, "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"}], 0x110, 0x20000804}, 0x800) recvmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)=""/32, 0x20}, {&(0x7f0000000040)=""/168, 0xa8}], 0x2, &(0x7f0000000140)=""/23, 0x17, 0x1}, 0x0) 2018/04/18 07:41:11 executing program 7: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x100}, 0x2c) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x9) close(r0) gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={r2, 0x28, &(0x7f0000000740)}, 0x10) r3 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r4}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r5}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/18 07:41:11 executing program 1: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x100}, 0x2c) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x9) close(r0) gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={r2, 0x28, &(0x7f0000000740)}, 0x10) r3 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r4}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r5}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/18 07:41:11 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000014c0)={&(0x7f0000000080)=@vsock={0x0, 0x0, 0x0, @host}, 0x80, &(0x7f0000000180)=[{&(0x7f0000002b80)=""/4096, 0x1000}, {&(0x7f0000000280)=""/107, 0x6b}, {&(0x7f0000003b80)=""/4096, 0x1000}], 0x3, &(0x7f0000001480)}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg(r1, &(0x7f00000016c0)={&(0x7f0000000200)=@generic, 0x80, &(0x7f0000001880)=[{&(0x7f0000001700)=""/97, 0x61}, {&(0x7f0000000300)=""/254, 0xfe}, {&(0x7f0000000400)=""/4096, 0x1000}, {&(0x7f0000000100)=""/3, 0x3}, {&(0x7f0000001400)=""/81, 0x51}, {&(0x7f0000001780)=""/254, 0xfe}, {&(0x7f0000000180)}, {&(0x7f0000001580)=""/155, 0xfffffd92}], 0x8, &(0x7f0000001b80)=""/4096, 0x371}, 0x40002100) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x9) sendmsg(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x28a, &(0x7f0000000000)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000040)=0x7fff) close(r0) bpf$MAP_CREATE(0x0, &(0x7f0000001480)={0xf, 0xe06, 0x14c, 0x3, 0x4, 0xffffffffffffffff, 0xffff}, 0x2c) bpf$OBJ_GET_MAP(0x7, &(0x7f0000001540)={&(0x7f0000001500)='./file0\x00', 0x0, 0x8}, 0x10) 2018/04/18 07:41:11 executing program 5: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffff}, 0xc) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000000040)) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000280)={&(0x7f0000000240)='./file0\x00'}, 0x10) r0 = perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x4b3b, 0xffffffff, 0x7ff, 0x0, 0x5, 0x41200, 0x4, 0x8, 0x0, 0x5, 0x100000001, 0x101, 0x1f5, 0xa6a, 0xffffffffffff2aa5, 0x200, 0x8, 0xeb54, 0x1, 0x9b20, 0x101, 0x7, 0x80000001, 0xff, 0x4, 0x10000, 0x0, 0x4, 0x0, 0x1, 0xfffffffffffff05e, 0x80000001, 0x8000, 0x8, 0x3, 0x0, 0x401, 0x6, @perf_config_ext={0x3, 0x6}, 0x4000, 0x7, 0x7, 0x0, 0x4, 0x101}, 0x0, 0x5, 0xffffffffffffff9c, 0xa) r1 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x314d, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, r0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000040)='bpf\x00') mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='nfsd\x00', 0x1021, &(0x7f0000000200)) 2018/04/18 07:41:11 executing program 2: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004, 0x4000009d}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x59616d61, 0xffffffffffffffff, 0x1, &(0x7f0000000000)) 2018/04/18 07:41:11 executing program 3: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004, 0x100200000026}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000003c0)) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x8, &(0x7f0000000180)=ANY=[@ANYBLOB="1800fbb2b7fa5492516e5a4890dc888e61d11ca16a8821435ea15062b00000000000000800000000000000711000000000000000000000000000009500000000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x40000000000000, 0xfb, &(0x7f0000000200)=""/251}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x2, 0x930000, 0x6f2000, &(0x7f0000002580)) socketpair$inet_icmp(0x2, 0x705000, 0x6f2000, &(0x7f0000000000)) 2018/04/18 07:41:11 executing program 6: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f0000000100)="6c6f00966fd651b159a9c84a2c60d29800000020") socketpair(0x1b, 0x80f, 0x1, &(0x7f00000000c0)) 2018/04/18 07:41:11 executing program 7: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x100}, 0x2c) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x9) close(r0) gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={r2, 0x28, &(0x7f0000000740)}, 0x10) r3 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r4}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r5}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/18 07:41:11 executing program 2: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004, 0x4000009d}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x59616d61, 0xffffffffffffffff, 0x1, &(0x7f0000000000)) 2018/04/18 07:41:11 executing program 5: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000000)) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x104}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000000200)=ANY=[@ANYBLOB="18000000000000000000002000000000711000000000000000000400000000e9550800000000000000730929df6fe02ecbecfe58459a2b076d905b3a686e37856cbf6edefe82e2f1318b"], &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) socketpair$inet6_icmp(0xa, 0x2, 0x3a, &(0x7f0000000080)) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000007d80)={&(0x7f0000007bc0)=@hci={0x0, 0x0}, 0x80, &(0x7f0000007d00)=[{&(0x7f0000007c40)=""/192, 0xc0}], 0x1, &(0x7f0000007d40)}, 0x2040) bpf$PROG_LOAD(0x5, &(0x7f0000007dc0)={0x4, 0xc, &(0x7f0000000280)=@raw=[@map={0x18, 0x7, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x3d}, @alu={0x7, 0x7, 0x3, 0xf, 0x8, 0x4, 0x10}, @ldst={0x3, 0x3, 0x3, 0xf, 0xe, 0x8, 0xe1345b0718b408f}, @exit={0x95}, @call={0x85, 0x0, 0x0, 0x1f}], &(0x7f0000000180)='GPL\x00', 0x6, 0x79, &(0x7f0000000300)=""/121, 0x41000, 0x1, [], r2}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r1, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0xffffff9c, 0x730000, 0x1, &(0x7f00000001c0)) 2018/04/18 07:41:12 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x21e}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r1, 0x50, &(0x7f00000000c0)}, 0x10) socketpair(0xd, 0x6, 0x3, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r2, &(0x7f0000000540)={&(0x7f0000000180)=@pppol2tpv3in6={0x18, 0x1, {0x0, r0, 0x2, 0x4, 0x0, 0x1, {0xa, 0x4e24, 0x7a, @remote={0xfe, 0x80, [], 0xbb}, 0x7}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f00000002c0)="2f2dc71438e55ef1fc7ecd631420dd2313792c70f27bfc38ca28b00e94573d043a0578aa56cf2862bb73b882a1b09dbe5cf3e4ca14f0ab27cb3ab16ce1d430d8bc6660f54c9f75cf97588b4ad1cb7a88aae42455b989ef72c4b43441be29c75c96e6ff53df391ee92d626600ecd9c2cb6f764427718a59ffe449390e059753c0ba2af9e48fd849c6e46bade4c06e198bccdbfce67ecd584b201e98c515bcbe0371831eb7eeaab27fe36cc4e14bed12ccd5fd4b11351a143d6deee2d50d55752df447da10efe3fe32a593f6692b08c8cd2752196bcc3ca21b9c8819163ff41fd2663f57265f80c8", 0xe7}, {&(0x7f0000000080)="7293843da5316356e087e39197856c2ef8886d560df9cdd98ed03533dec680595dff", 0x22}, {&(0x7f0000000200)="951680c163f37ac9ed7d1dea91ab318c553702918fec5c0f2f5929384290d9745c90bb2afa", 0x25}, {&(0x7f0000000240)="8150d2e99889c424ab23d0ba217d90c857dbe0b184bb47087d7744b2e312d0e001220f2d88bc03c784e3311881eed80e0c9a8f6f91f3afe971", 0x39}], 0x4, &(0x7f0000000400)=[{0x10, 0x114, 0x7}, {0x110, 0x116, 0x1, "ad8b9a7d6c8a2f651ba0e4d9e47a38e5e5414b6d963f0a10d77ac5c468ef9bfe6bdbcb54729e99f4191d3d8b39ac6cfc7dee878bbb6bbb4cf407ba920abc4fd5de07b6f0045880bca13d96208205a24d209db4136cf4b7888714a3bc3f1e9e64c54a1f8b275aa7d90e1d869024dd2958153c0b95a34315a5f6e45b04f2561da2bec98bb8a7191581f19236116e69e54affec8054decc1edd665c8bad7e7d3e463c6859b66029631a9315b489345ccfc9b158f3f0437b5286504ea089aedb6a005f08ac607853feac283f509729a13558b7ed4216e74aa029b8615a5e74e0aa2609c55f140bab561f17e761074591ae5eca8908d3599741014340ae10b6c7"}], 0x120, 0x20000040}, 0x81) socketpair$inet_icmp(0x7fffffffefff, 0x730000, 0x1, &(0x7f0000000280)) 2018/04/18 07:41:12 executing program 2: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004, 0x4000009d}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) socketpair$inet_icmp(0x59616d61, 0xffffffffffffffff, 0x1, &(0x7f0000000000)) socketpair$inet_icmp(0x59616d61, 0xffffffffffffffff, 0x1, &(0x7f0000000000)) 2018/04/18 07:41:12 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x1, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="8500980000000000b51c1a98083b029712000000000000009500000000000000c988dbee643644620f1d6cd75ebbab3c47ee4feb60c8d848dab1864f863ff4e7a979bbc4936bafd7aef05ad02392871b54ee0d92304b2e183589967a9d666de71ea25b304f41f1b2833aaf298c0576c1d9241a63d9e36c91f1ffd75cb88fdf62b3ed3648ab1cec1f7ee6793a50c56d08149a5efbf8d0019a9db9d9895c1e25fff03bbdc85aebdde9844fda395d0590e7c5d4c558f88f43028ac1c42f7e94e3004064f3"], &(0x7f0000e6bffc)="47ff3300", 0x5, 0x24, &(0x7f000000d000)=""/153}, 0x48) 2018/04/18 07:41:12 executing program 7: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x100}, 0x2c) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x9) close(r0) gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={r2, 0x28, &(0x7f0000000740)}, 0x10) r3 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r4}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r5}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/18 07:41:12 executing program 4: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x100}, 0x2c) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x9) close(r0) gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={r2, 0x28, &(0x7f0000000740)}, 0x10) r3 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r4}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r5}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/18 07:41:12 executing program 0: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x100}, 0x2c) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x9) close(r0) gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={r2, 0x28, &(0x7f0000000740)}, 0x10) r3 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r4}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r5}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/18 07:41:12 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) mount(&(0x7f0000000180)='./file0/bus\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='sysfs\x00', 0x0, &(0x7f00000004c0)) close(r1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0x5a, 0xab, &(0x7f0000000080)="8d55a0dfccce95d335d54cb30a59bcc49111cf9e50c6efbbb36a0f77acc510c7ee7d1acc37686f15ca9b8eb9b59827dac297903b991b45c4d8c32be7aa399d7531491fd01f214e87b039714190abe6f338531ce5aeb11b9be479", &(0x7f00000001c0)=""/171, 0x401, 0x2}, 0x28) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000280), 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r1, 0x84, 0x77, &(0x7f0000000180), 0x127) 2018/04/18 07:41:12 executing program 1: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x100}, 0x2c) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x9) close(r0) gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={r2, 0x28, &(0x7f0000000740)}, 0x10) r3 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r4}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r5}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/18 07:41:12 executing program 3: r0 = socket$kcm(0x2, 0x5, 0x0) sendmsg(r0, &(0x7f00000001c0)={&(0x7f00000002c0)=@in={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000140)='x', 0x1}], 0x1}, 0x0) socketpair(0x5, 0x80a, 0x6, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000180)={r1, &(0x7f0000000340)="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", &(0x7f0000000440)=""/213}, 0x18) sendmsg(r0, &(0x7f0000000840)={&(0x7f0000000040)=@in={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x80, &(0x7f0000000200), 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="200000000000000084000000020000001c041a02000007000000009c00000000"], 0x20}, 0x0) close(r0) 2018/04/18 07:41:12 executing program 2: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004, 0x4000009d}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) socketpair$inet_icmp(0x59616d61, 0xffffffffffffffff, 0x1, &(0x7f0000000000)) socketpair$inet_icmp(0x59616d61, 0xffffffffffffffff, 0x1, &(0x7f0000000000)) 2018/04/18 07:41:12 executing program 5: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000004bc0)={0xffffffffffffff9c}) sendmsg$kcm(r0, &(0x7f0000005380)={&(0x7f0000004c00)=@un=@abs={0x1, 0x0, 0x4e24}, 0x80, &(0x7f0000005000)=[{&(0x7f0000004c80)="ec73aff988a47ef5df5b23750fef758151606a33b09c5188a485d2a49e6368b577ebf5a3badc5a06fef7a73d095b3e3db611593a66d3fde5833f6d05078bb744c13281fa58c9e3c35e75930ceb5b36a3a3d8ce4912b24aa6ac0187266ece9f5e909beb961a5b465f7d392da862b760a1d9e90c45a6c3285fbfca89c6c56127168ab54563ba6ff06227a71484d5ed3db1d4b49e200f923b3295c069c9496971b5f6f8b95f5a2ea603f6942a10ca305b06b88de40cdd4887b0b6386e360e4aacc8754a41d2db88fee566b7c305f00f509d8e70b47a02ea9e", 0xd7}, {&(0x7f0000004d80)="d3ed54b0ea7fbdac032a3a80ac4fb935a9761ab8302f61680b9f97d6a9e450f64ae381c525aaaa071599d283868af0fd507faa60f530a36d661016666fc3205010ab6467c273b0317aec6faa727675a3075fb5102f55678cd3a485831c8f473c46a2c32a28da24b7f1611fa86fe898437e373e06a229701e4b8fa01f57b91f8026cf7fe9d5df857ddc36d4dafa771e6b04f9176a71596022c0197f791b9caa52a8882e29d6bdda93a328829e100013efcc969521e536d9a259b7086cf0016111f92659f8f0aceb11a1fe943ee89f47548674f21ee76addd94282d48ffd1dbe1f9f7e04db78fd9ecf9fac420c5db2b37a2bb5e67630", 0xf5}, {&(0x7f0000004e80)="f4243e1a5e08623bf85a776e4a833e3ba28a6300ffd42368bc795c5b2106edf6475fd718a9e29c202cb964ed621170c45e4bd131d6030622d5650ec84f3b884ad6dae643686be57796e9a886c0fcec8e", 0x50}, {&(0x7f0000004f00)="f0f8ec8a89a8a96e7c33d506019f7cb0505c787558348bf5e8470bc0111181e4b566c059581597535cf0bfe4d51f9bf6edcc55aa5fa6e7a3b01539207a15e3ce4417449d4d997ba49cdf6e5e5731e6e810e6702b831ba43da9987ad227d04c1863d35cd3219ba1f9e6918a681473ecedde8e569cf684535dd29e21d82af80b24530fd14fb35fd6a50512b42f934fc3e0eb1046898e4b48dcade3c1be45fb78c4d89d2fd55c9bf74c47e0bc3b19d787dbe4520634bc717d04f17a489d4694053a87f8894f6b8ae20cde4c5c873512ef40ab73933a06b82926", 0xd8}], 0x4, &(0x7f0000005040)=ANY=[@ANYBLOB="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"], 0x318, 0x4}, 0x8000) socketpair(0x1a, 0x3, 0x7fffffff, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000004c0)='\x00') r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x7f, 0x7, 0x5, 0x1}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000000)={r3, &(0x7f0000000380), &(0x7f0000000140)=""/145}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r3}, 0x20) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000540)={&(0x7f0000000500)='./file0/file0\x00', r2}, 0x10) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={0xffffffffffffffff, &(0x7f0000000000)="827021baca", &(0x7f0000000080)=""/98}, 0x18) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00', r3}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={r3, &(0x7f0000000180), &(0x7f0000000080)=""/140}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r3, &(0x7f0000000000), &(0x7f0000000080)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000400)={r3, &(0x7f0000000180)="01", &(0x7f0000000300)}, 0x20) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000280)={&(0x7f0000000240)='./file0\x00', r3}, 0x10) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000200)={r3, &(0x7f0000000180)}, 0x10) r4 = perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0x8001, 0xffffffff, 0x100, 0x1000, 0x0, 0x7f, 0x8, 0x3, 0x0, 0x4, 0x1, 0xcd56, 0x4ea, 0x7, 0x8, 0x3, 0x7, 0xffffffff, 0x77e6, 0x0, 0x2, 0xff, 0x7ff, 0x3, 0x1, 0x0, 0x8, 0x80000001, 0x2, 0x2, 0x3, 0x1, 0x4d4757ef, 0x9, 0x7fffffff, 0x7ebe2321, 0x0, 0x2, 0x0, @perf_config_ext={0x1000, 0x7f}, 0x1, 0x5, 0x4, 0x4, 0x4, 0x100000001, 0xffffffff80000001}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) socketpair(0x8, 0x803, 0xfffffffffffff801, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r4, 0x2405, r5) socketpair$ax25(0x3, 0x3, 0x7, &(0x7f0000000580)) socketpair$inet(0x2, 0x802, 0xffffffff, &(0x7f0000000440)) 2018/04/18 07:41:12 executing program 6: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4d}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0xf, 0x1000, &(0x7f0000000140)="e98c5c12e7bbe1016bc7fa3166b9cb", &(0x7f0000000300)=""/4096}, 0x28) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={r0, 0x50, &(0x7f0000000040)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r0, 0x266, &(0x7f00000001c0)={0x0, 0x0}}, 0x9d0f37b91163f442) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)=r1, 0x4) 2018/04/18 07:41:12 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x101d}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000200)=ANY=[@ANYBLOB]) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x5, &(0x7f0000346fc8)=ANY=[@ANYBLOB="18000000000000000000000000000000720ac0ff00000000000000000000000f9500000000000000"], &(0x7f0000000000)='GPL\x00', 0x6, 0x2ed, &(0x7f00001a7f05)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x6) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r1, 0x0, 0xe, 0xb6, &(0x7f0000000040)="03e43ae3e0e0e4a1b4d6dcfbf56a", &(0x7f0000000100)=""/182}, 0x28) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0x50, &(0x7f0000000140)}, 0x10) mount(&(0x7f0000000500)='./file0/file0\x00', &(0x7f0000000540)='./file0\x00', &(0x7f0000000700)='ext2\x00', 0x80800, &(0x7f0000000740)="25f2b93fc087c8f3a2c5649215dbcd6c0c847569208c6a938a939973bf673cbfaa690bcc315b1ce461aa0410f56c34cd28a546e8b1a52b174fed767bd36e23f1d07764b36f773aa15648") socketpair(0x11, 0x5, 0x4, &(0x7f0000000580)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x8) sendmsg$kcm(r2, &(0x7f00000004c0)={&(0x7f00000002c0)=@pptp={0x18, 0x2, {0x0, @rand_addr=0x47b}}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000340)="f32fe7ed336bc27c91a10d925cdf9666f5cd18152de9f231827cdfa86fb1efb1173be2638d972ee5853a8ecd500311dd5bc4dbdb389e6d2da60e329eb730ef07f4911b68abbc0c50b0deacacc3c9388fc3f421b86a2e260983809a73ee35ec4c47756ff8903fb23607fbc9bdd5eeb71aea3e3008ce3220eaaf12400df5b3a29e27d7556c77879c2584e64b8d979221dc47", 0x91}, {&(0x7f0000000400)="d57b87e079d15f855eb5a22d1aab90e6ce91124a7ec9b62740f774610b077a439fda3bf4c616cb1922e5f917d2f5d6eef42c5212860387a6d57032fda783f0c83d26c22fa77a339568948659c926c62fb0f46343eca1c37c97e096423b", 0x5d}], 0x2, 0x0, 0x0, 0x24004084}, 0x20040080) recvmsg$kcm(r2, &(0x7f00000006c0)={&(0x7f00000005c0)=@nfc_llcp, 0x80, &(0x7f0000000680)=[{&(0x7f0000000640)=""/47, 0x2f}], 0x1, 0x0, 0x0, 0x5}, 0x2140) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000840)={r2, 0x50, &(0x7f0000000900)}, 0x4) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000240)='./file0/file0\x00', 0x0, 0x18}, 0x10) 2018/04/18 07:41:12 executing program 7: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x100}, 0x2c) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x9) close(r0) gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={r2, 0x28, &(0x7f0000000740)}, 0x10) r3 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r4}, 0x10) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r5}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/18 07:41:12 executing program 1: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x100}, 0x2c) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x9) close(r0) gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={r2, 0x28, &(0x7f0000000740)}, 0x10) r3 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r4}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r5}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/18 07:41:12 executing program 2: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004, 0x4000009d}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) socketpair$inet_icmp(0x59616d61, 0xffffffffffffffff, 0x1, &(0x7f0000000000)) socketpair$inet_icmp(0x59616d61, 0xffffffffffffffff, 0x1, &(0x7f0000000000)) 2018/04/18 07:41:12 executing program 4: r0 = socket$kcm(0xa, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={&(0x7f0000000100)=@in6={0xa, 0x4e24, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x1}, 0x80, &(0x7f0000000080), 0x0, &(0x7f0000000000)}, 0x0) socketpair(0xb, 0x80007, 0x5, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000080)={&(0x7f0000000180)='./file0\x00', r1}, 0xffffffffffffff30) 2018/04/18 07:41:12 executing program 5: socket$kcm(0x2, 0x4000000805, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x1}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=ANY=[@ANYBLOB="18000000000000000000000000ebffff701000000000000000000000000000009500000000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xf, 0x8, 0x9, 0x100, 0x12, r0, 0x5}, 0x2c) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r1, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x13, 0x400000, 0x705000, &(0x7f0000000180)) [ 180.338129] 9pnet_virtio: no channels available for device ./file0 2018/04/18 07:41:12 executing program 6: socketpair(0xfffffffffffffffd, 0x0, 0x0, &(0x7f0000000000)) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) r1 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x22, &(0x7f0000000000)=r0, 0x301) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000080)) 2018/04/18 07:41:12 executing program 2: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004, 0x4000009d}, 0x2c) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x59616d61, 0xffffffffffffffff, 0x1, &(0x7f0000000000)) socketpair$inet_icmp(0x59616d61, 0xffffffffffffffff, 0x1, &(0x7f0000000000)) [ 180.426826] 9pnet_virtio: no channels available for device ./file0 2018/04/18 07:41:12 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0xa4}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r1, 0x0, 0xe, 0x83, &(0x7f0000000000)="7116800001000000000000de78bc", &(0x7f0000000200)=""/131}, 0x28) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r0, &(0x7f0000000040)="ffbb319b0ce6e88616ace11bdc6cf29e6dcf0db7192a8cb2da504981a9f7c172bb34eb64d9756c59bd1e", &(0x7f0000000080)=""/112}, 0x18) 2018/04/18 07:41:12 executing program 7: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x100}, 0x2c) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x9) close(r0) gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={r2, 0x28, &(0x7f0000000740)}, 0x10) r3 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r4}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/18 07:41:12 executing program 4: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x100}, 0x2c) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x9) close(r0) gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={r2, 0x28, &(0x7f0000000740)}, 0x10) r3 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r4}, 0x10) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r5}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/18 07:41:13 executing program 0: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004, 0x4000009c}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x25, 0x6f2000, 0x1, &(0x7f0000000080)) 2018/04/18 07:41:13 executing program 6: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000440)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0xee}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000a400000000046bfee8a790f07f6f0e4f727000000000000000071100000938e000000000000000000009500000000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r1, 0x50, &(0x7f00000000c0)}, 0x10) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r0, &(0x7f0000000040)="6405b544f53ae2"}, 0x10) socketpair$inet_icmp(0x7fff00000004, 0x705007, 0x3bfc, &(0x7f00000001c0)) 2018/04/18 07:41:13 executing program 2: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004, 0x4000009d}, 0x2c) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x59616d61, 0xffffffffffffffff, 0x1, &(0x7f0000000000)) socketpair$inet_icmp(0x59616d61, 0xffffffffffffffff, 0x1, &(0x7f0000000000)) 2018/04/18 07:41:13 executing program 1: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x100}, 0x2c) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x9) close(r0) gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={r2, 0x28, &(0x7f0000000740)}, 0x10) r3 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r4}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r5}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/18 07:41:13 executing program 7: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x100}, 0x2c) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x9) close(r0) gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={r2, 0x28, &(0x7f0000000740)}, 0x10) r3 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r4}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/18 07:41:13 executing program 5: socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x5452, &(0x7f0000000040)='-\x00') perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r1, &(0x7f0000948000)={0x0, 0x0, &(0x7f00005dc000)=[{&(0x7f0000d43000), 0xffffff1b}], 0x1, &(0x7f0000d43000)}, 0x0) sendmsg$kcm(r1, &(0x7f0000000500)={&(0x7f0000000400)=@rc={0x1f}, 0xa, &(0x7f00000004c0), 0x0, &(0x7f00000019c0)}, 0x80d4) 2018/04/18 07:41:13 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) socketpair$inet6(0xa, 0x6, 0x7, &(0x7f0000000000)) close(r1) socket$kcm(0xa, 0x3, 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000100)={&(0x7f00000000c0)='./file0\x00', r0}, 0xffffffffffffff4b) setsockopt$sock_attach_bpf(r1, 0x29, 0x38, &(0x7f0000000180), 0x127) socketpair(0x0, 0x0, 0x1be3, &(0x7f0000000080)) 2018/04/18 07:41:13 executing program 4: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x100}, 0x2c) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x9) close(r0) gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={r2, 0x28, &(0x7f0000000740)}, 0x10) r3 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r4}, 0x10) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r5}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/18 07:41:13 executing program 6: socketpair(0xb, 0x3, 0x81, &(0x7f00000002c0)={0xffffffffffffffff}) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000008400)={&(0x7f0000008200)=@can={0x0, 0x0}, 0x80, &(0x7f0000008300)=[{&(0x7f0000008280)=""/120, 0x78}], 0x1, &(0x7f0000008340)=""/178, 0xb2, 0x7fffffff}, 0x40002000) bpf$PROG_LOAD(0x5, &(0x7f0000008440)={0x4, 0xf, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff00000000, 0x0, 0x0, 0x0, 0x8001}, [@map={0x18, 0x8, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x3b}, @call={0x85, 0x0, 0x0, 0x3c}, @ldst={0x86be6a3cf78184ab, 0x3, 0x3, 0x1, 0x9, 0xffffffff, 0x4}, @ldst={0x0, 0x2, 0x1, 0x4, 0x0, 0x30, 0xffffffffffffffff}, @generic={0x8001, 0x6, 0x6}], {0x95}}, &(0x7f0000000440)='GPL\x00', 0xa91f, 0x19, &(0x7f0000000480)=""/25, 0x41f00, 0x1, [], r1}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18020000ffffffff0000000000100000850000002c00000005000000000000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x1, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x28, &(0x7f0000000100)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280)={r3, 0x9, 0x18}, 0xc) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r2, 0x0, 0xe, 0x9, &(0x7f0000000300)="15a13f65fe6600440d778cd3ab46", &(0x7f0000000340)=""/9, 0x8b0}, 0x28) 2018/04/18 07:41:13 executing program 2: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004, 0x4000009d}, 0x2c) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x59616d61, 0xffffffffffffffff, 0x1, &(0x7f0000000000)) socketpair$inet_icmp(0x59616d61, 0xffffffffffffffff, 0x1, &(0x7f0000000000)) 2018/04/18 07:41:13 executing program 5: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004, 0xe}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000000)={r0, &(0x7f0000000180)="80e080b8853e1d9d60aa381b18ec3065777ccc684bd173aabde99aea23d3d5bc9fa499fdff797039d3a3379663490ecc694ac23760f669c02ecbf6e8036f9e2227eb29bdd107992a2f7c1de1c8ebb17e459e8ef5e9879be13159ef8e59a36c0a1399d7706f41c97ce1ae6661ea43cedbc5eac59da892b3d9c5447558dcc212005799b2671dcae999ef53e0a9bd06e03f78a137c7e46f96d3c5967efb07c9d2d54f0b1e7e80ea5688d77667a98be1dc88e1513094d4c5a9d76301", &(0x7f0000000240)=""/107}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r1, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x6f2000, 0x6f2000, 0x1, &(0x7f0000000080)) 2018/04/18 07:41:13 executing program 0: ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x5) gettid() perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x4e}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0xffffffffffffff11, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x12, 0x2, 0x1, &(0x7f0000000180)) 2018/04/18 07:41:13 executing program 7: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x100}, 0x2c) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x9) close(r0) gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={r2, 0x28, &(0x7f0000000740)}, 0x10) r3 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r4}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/18 07:41:13 executing program 2: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x59616d61, 0xffffffffffffffff, 0x1, &(0x7f0000000000)) socketpair$inet_icmp(0x59616d61, 0xffffffffffffffff, 0x1, &(0x7f0000000000)) 2018/04/18 07:41:13 executing program 4: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x100}, 0x2c) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x9) close(r0) gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={r2, 0x28, &(0x7f0000000740)}, 0x10) r3 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r4}, 0x10) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r5}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/18 07:41:13 executing program 3: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x7, 0x38}, 0x2c) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffff9c, 0x50, &(0x7f0000000180)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)=r0, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r1, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x20001f00, 0x20000002, 0x1, &(0x7f0000000000)) 2018/04/18 07:41:13 executing program 6: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x7, 0x2}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x6f2000, 0x5460, 0x6f2000, &(0x7f00000001c0)) socketpair$inet_icmp(0x6f2000, 0x930000, 0x705000, &(0x7f00000002c0)={0xffffffffffffffff}) close(r1) 2018/04/18 07:41:13 executing program 1: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x100}, 0x2c) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x9) close(r0) gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={r2, 0x28, &(0x7f0000000740)}, 0x10) r3 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r4}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r5}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/18 07:41:13 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18020000000200000000000000000000850000003600000005000000000000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x1, 0xce, &(0x7f0000000180)=""/206}, 0x48) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000080)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0xffffffffffffff0a, &(0x7f0000000400)="222fea09601182605aecc6378847", &(0x7f00000000c0)=""/18}, 0x28) 2018/04/18 07:41:13 executing program 6: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x100000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000640)="0ce8a4cf2db83d43") 2018/04/18 07:41:13 executing program 2: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x59616d61, 0xffffffffffffffff, 0x1, &(0x7f0000000000)) socketpair$inet_icmp(0x59616d61, 0xffffffffffffffff, 0x1, &(0x7f0000000000)) 2018/04/18 07:41:13 executing program 0: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000004, 0x40000134}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000003c0)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) socketpair(0x10, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000380)={&(0x7f0000000180)=@pppoe={0x0, 0x0, {0x0, @link_local}}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000200)}, {&(0x7f0000000240)=""/143, 0x8f}], 0x2, &(0x7f0000000340)=""/64, 0x40, 0x8}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0xffffffffffffff11, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000540)={r2, 0x50, &(0x7f00000004c0)}, 0x10) socketpair$inet_icmp(0x6f2000, 0x6f2000, 0x1, &(0x7f0000000080)) 2018/04/18 07:41:13 executing program 7: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x100}, 0x2c) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x9) close(r0) gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={r2, 0x28, &(0x7f0000000740)}, 0x10) r3 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000440)=0x5bc6) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r4}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/18 07:41:13 executing program 3: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x7, 0xb1fd, 0x3, 0x8001, 0x0, 0x5, 0x0, 0x5, 0x9, 0x200, 0x7, 0xfffffffffffffff7, 0x992f, 0x1, 0x5, 0x200, 0x1, 0x4, 0x7, 0x7607bb680000000, 0x876d, 0x10001, 0x5, 0x6, 0x7, 0x7, 0x1, 0x3, 0x1, 0x5, 0x1, 0x0, 0x38d, 0x4, 0x9, 0x7, 0x0, 0x6, 0x0, @perf_config_ext={0x28ba}, 0x1000, 0x2, 0x1, 0x6, 0xfffffffffffffffb, 0x0, 0x9}, 0xffffffffffffffff, 0x6, 0xffffffffffffff9c, 0x1) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x8, 0x10000, 0x200, 0x8, 0x0, 0x10001, 0x88000, 0x1, 0x5, 0x7, 0x3, 0x1ff, 0x7, 0x9, 0xfffffffffffffff8, 0x7fff, 0x9, 0x6, 0xbe, 0x100, 0x0, 0x6d9, 0x7fffffff, 0xffffffff, 0x80, 0x2, 0x1, 0x0, 0x7, 0x10000, 0x1, 0x0, 0x80, 0x0, 0x6, 0x7, 0x0, 0x3, 0x6, @perf_config_ext={0x9, 0x20000000000}, 0x800, 0xffff, 0x3, 0x0, 0x6, 0x5, 0x1}, 0x0, 0x2, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0xfffffffffffffffd, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x69ca87e4ce240cf7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000001c0)) 2018/04/18 07:41:14 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001c80)={&(0x7f0000001600)=@can={0x0, 0x0}, 0x80, &(0x7f0000001b00)=[{&(0x7f0000001680)=""/188, 0xbc}, {&(0x7f0000001740)=""/81, 0x51}, {&(0x7f00000017c0)=""/131, 0x83}, {&(0x7f0000001880)=""/119, 0x77}, {&(0x7f0000001900)=""/237, 0xed}, {&(0x7f0000001a00)=""/61, 0x3d}, {&(0x7f0000001a40)=""/173, 0xad}], 0x7, &(0x7f0000001b80)=""/219, 0xdb, 0x8}, 0x120) bpf$PROG_LOAD(0x5, &(0x7f0000003000)={0x0, 0x3, &(0x7f000000c000)=@framed={{0x18}, [], {0x95}}, &(0x7f0000008000)='syzkaller\x00', 0x5, 0xffffffffffffff89, &(0x7f0000008000)=""/127, 0x0, 0x1, [], r0}, 0xfffffffffffffebd) bpf$PROG_LOAD(0x5, &(0x7f0000001fb8)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000000000ccdb2abccdae20782da53e000000000800070000000000000000000000000000009500000000000000"], &(0x7f0000007000)='syzkaller\x00', 0x5, 0xfefa, &(0x7f000000df19)=""/231}, 0x274) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000000)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f0000000040)='./file0\x00', 0x0, 0x8}, 0x10) 2018/04/18 07:41:14 executing program 4: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x100}, 0x2c) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x9) close(r0) gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={r2, 0x28, &(0x7f0000000740)}, 0x10) r3 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r4}, 0x10) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r5}, 0x10) 2018/04/18 07:41:14 executing program 0: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x100}, 0x2c) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x9) close(r0) gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={r2, 0x28, &(0x7f0000000740)}, 0x10) r3 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r4}, 0x10) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r5}, 0x10) 2018/04/18 07:41:14 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000040)=0x6, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r1, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) recvmsg(r0, &(0x7f0000002240)={&(0x7f00000000c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff}}, 0x32, &(0x7f0000002180), 0x0, &(0x7f00000021c0)=""/69, 0x45}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x89e1, &(0x7f0000000000)) 2018/04/18 07:41:14 executing program 2: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x59616d61, 0xffffffffffffffff, 0x1, &(0x7f0000000000)) socketpair$inet_icmp(0x59616d61, 0xffffffffffffffff, 0x1, &(0x7f0000000000)) 2018/04/18 07:41:14 executing program 1: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x100}, 0x2c) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x9) close(r0) gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={r2, 0x28, &(0x7f0000000740)}, 0x10) r3 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r4}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r5}, 0x10) 2018/04/18 07:41:14 executing program 5: socketpair(0x0, 0x2, 0x80000001, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0xd4, 0x10}, 0x2c) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000180)='./file0\x00'}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000080aa4d3cec000000000000000000000000007110f57e00000000000049e0000000009500000000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r3, 0x0, 0xe, 0x83, &(0x7f0000000100)="714b80797dbc5ff1de3086de78ea", &(0x7f0000000200)=""/131}, 0x28) 2018/04/18 07:41:14 executing program 6: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004, 0x4000009d}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r0, &(0x7f0000000180)="09318998c0018de9db1073d1e8e7c6755dc66084a5fddcbc35e76fe91b090fa7f344d8d2bc5bd50f7ab532f46162f73ed7b1c84a1375aa7c7c7cf41e503d803871bf1dc40b693de7828c76989f66ee1c882be98e383279f92b84bbce640b25ef66576bfc6475f691e2bb43c427d9da250eb182ca21e73463c2bcb9d186044fdc687119fe61e72c5f173090ef192b8708541123ff64bb0f149b6dac0b16ed6318dabd70a5864d84792e7f248b89b3660394a2edd06285a4e46266bbe62d4e56c74df609c5f725ef17c06653fa62f9d897185ac4d9ada9f3b3cdf3de7286a089a5d9cae0d5cab3752f8c1df760b52bfe29"}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=ANY=[@ANYBLOB="18000002000000000000000000000000711000000000000000000000000000009500000000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r1, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x7, 0x2, 0x1, &(0x7f0000000000)) 2018/04/18 07:41:14 executing program 4: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x100}, 0x2c) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x9) close(r0) gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={r2, 0x28, &(0x7f0000000740)}, 0x10) r3 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r4}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/18 07:41:14 executing program 7: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x100}, 0x2c) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x9) close(r0) gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={r2, 0x28, &(0x7f0000000740)}, 0x10) r3 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000440)=0x5bc6) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r4}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/18 07:41:14 executing program 6: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000000)={0xffffffffffffff9c}) sendmsg$kcm(r0, &(0x7f0000001340)={&(0x7f0000000a40)=@ax25={0x3, {"24bdc57022408e"}, 0xf32c}, 0x80, &(0x7f0000001000)=[{&(0x7f0000000ac0)="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", 0xfe}, {&(0x7f0000001f00)="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", 0x1000}, {&(0x7f0000000bc0)="db850819649915eb50a7363cc6a57d40cf51170b5a066c5074d1b9cca39f5c8e425de54f782e4e827572a0ccff30d29e0a567da66d03c776cab1456bcdb80bdbff39ad53cb84669cd343c8016383205f5d67a25f9dfa642c59f73c998dffb06ad0c4521f048700a8f7e96d1ec93fc33d745b04d6c42f5f79a81cf22a128409b6edd638e675", 0x85}, {&(0x7f0000000c80)="7d9d5f6a2df1b9f95dd23ceb041c3bd4c3c796f077ea808ecee88e2a1f75314cb0f160e368a111f3db1af7abfb6b6f513fb66e115891094177f6ea1f9708f0c1e75e60976cd7fe43359a52d8144c4720e1bb3181cdd79af2aff56eb0cbd4cc1c22a7416e0dd573dd591807273591f7e44734fb1d4d81388409f4df7b387ee067ec49feb0a12bf93e7aee298654ce8886f977e9929cf5d56af4ca886fa350a9e0af208a7cb1f8462e6dcfd56a7fdba2d9", 0xb0}, {&(0x7f0000000d40)="aca2847bdc52c791c0634235038ffb60294dd8261fad9b90cbb8e14df76b1319e980e8a5082781f5c6af4282a76d4dc00b4e5562de0cfa5f8c4e0e20f848c01a490cb247b118c21a42625892db7ba7cd3986e5ab6ea47779596650663ff5a748f1144c5081c4c0edf991b8a5b9a91998bfa4ab623ce5fbdf4be7d15e3ce72b6157a3cc7721fe", 0x86}, {&(0x7f0000000e00)="3f5eea7bd4ac0c64d3329b80c0ba07f90a223eb1f93659ddaa0e25bdcc7ea3", 0x1f}, {&(0x7f0000000e40)="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", 0xfb}, {&(0x7f0000002f00)="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", 0x1000}, {&(0x7f0000000f40)="e9c1b39d4d16362e94e3f4ea46735666accfff2708c486d338aca89249ebf084b6baf579c140228971d46d8a409dd37f1f3478ec10e57ef40a6fb077c4a9c7228e24b37b89faac40ebac42845aeaf9e9acd559cc2e99f21b561af263d496394ec2c0e30a90458d072fa2c5c3a92873748b9ba37504ac83dd661b7fe57c49d4226c7c979d967fa2043653a1d1e32294df3331e753543d39fe9b05a5caadd68871ca0690a7ba31", 0xa6}], 0x9, &(0x7f00000010c0)=[{0x110, 0x117, 0x4, "003de62e904376b5389b21321e44ba48723693c4ced6e7335466f4f1e12c77a421f5ddead2a50d83958cf71851696a987eb104857e08b15eb4ddb59d201993158feb1880cc3d26394e6553406778605c2b560999b716d5a12572c6a29394f0aca4101957303b65a2f5ce647a0d9118a18f3a23a32db1df517e8df0b30714c48642053eca8f847ca8b07085029415d5ba38f3382e9f8d45670dcfb66343e11ab9aae9c1998dcdf7eb1458551af4597257e5b2bd17d6e8ac976c7eb0876958b597e7faaf67e9fa59a07f9f6a4ac1f9569f34ab1678bef91c14048aef843a6a6ad9e8f4c995bd14c7067f30f7fba9855bc7b4951095dd9423e34c898f"}, {0xd0, 0x108, 0xf4d, "5485ab0acc9889338d927f4cb00a3eba2f149929b2fc027b80c2d6ff2821306831d053334025829e7181f564b8d92f34cad6425634a10323aacff21c9c282e0bce912d34638075b0c4ceb64395d4a8261a713421448ccc64792c36e9204c0c86bd590be44f3502a9483dfb654e0322bd3562427f33f4ed0abcc4790ddc3ed9e778ef12d50d8511ceb184d932fac30236b383c67a3c4aac279fa826acdc514677071bab1ccc9a7176fead943035f0f47ac7ea3b601aa0c8911f"}, {0xa0, 0x104, 0x4, "e640f0aaf2c98905713b4c3a69198d186cb050c8b604c650ac6fc03fe18741c87f13ea317a56161c6d4fb48ea6c09c604c5e90eec5dc76b9176aa6cf2b56e3c65619d5e10f6f4c9504cb1db505fe55f8fbafb64f75ef4f0d77fc96842dab37c6b230a9550138ce2193ba22bc0064991923a77179241da4164ba33b414afa3b5a7efd875813284ac6b24f34011e"}], 0x280, 0x801}, 0x40004) recvmsg$kcm(r0, &(0x7f0000001840)={&(0x7f0000001380)=@can, 0x80, &(0x7f0000001c00)=[{&(0x7f0000001400)=""/214, 0xd6}, {&(0x7f0000001500)=""/191, 0xbf}, {&(0x7f00000015c0)=""/184, 0xb8}, {&(0x7f0000001680)=""/51, 0x33}, {&(0x7f00000016c0)=""/219, 0xdb}, {&(0x7f00000017c0)=""/78, 0x4e}, {&(0x7f0000001940)=""/198, 0xc6}, {&(0x7f0000001a40)=""/173, 0xad}, {&(0x7f0000001b00)=""/203, 0xcb}], 0x9, &(0x7f0000001cc0)=""/229, 0xe5, 0xffffffff80000000}, 0x40000000) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f00000009c0)={&(0x7f00000001c0)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000240)=""/70, 0x46}, {&(0x7f00000002c0)=""/219, 0xdb}, {&(0x7f00000003c0)=""/175, 0xaf}, {&(0x7f0000000480)=""/69, 0x45}, {&(0x7f0000000500)=""/237, 0xed}, {&(0x7f0000000600)=""/147, 0x93}, {&(0x7f00000006c0)=""/176, 0xb0}, {&(0x7f0000000780)=""/235, 0xeb}], 0x8, &(0x7f0000000900)=""/160, 0xa0, 0xd99}, 0x40000000) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080), 0x4) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1, r2}) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000000a00)) r3 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r3, &(0x7f0000001ec0)={&(0x7f00000018c0)=@nl=@unspec, 0x80, &(0x7f0000001dc0), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000290000003600001b28a200000000ff9db4d74a7a0000fd648ccb8ffc503b72f08c2a4d01923e8ffa270a628806ef00c8dd79ef799ce9b9f9af2fbeb2dca303cc2c6f57ef15a99d9f49ff0acb69b2cbf4d21fed6deb60ce8c4bec8cd3b5e6919c72949be44ea9b0d6d1abfa37619883a88e9eff3404f345ff57a500882f54cc610a6931d67aeb501f02e9ff839ef1e20d69906b5e08b8a844f8001649dd36cb1d2f00000000000000000000000000"], 0x18}, 0x0) 2018/04/18 07:41:14 executing program 7: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x100}, 0x2c) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x9) close(r0) gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={r2, 0x28, &(0x7f0000000740)}, 0x10) r3 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000440)=0x5bc6) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r4}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/18 07:41:14 executing program 0: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r0) socket$kcm(0xa, 0x3, 0x11) socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000000000)) setsockopt$sock_attach_bpf(r0, 0x29, 0x8, &(0x7f0000000180), 0x127) 2018/04/18 07:41:14 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004, 0x4000009d}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x59616d61, 0xffffffffffffffff, 0x1, &(0x7f0000000000)) socketpair$inet_icmp(0x59616d61, 0xffffffffffffffff, 0x1, &(0x7f0000000000)) 2018/04/18 07:41:14 executing program 1: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x100}, 0x2c) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x9) close(r0) gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={r2, 0x28, &(0x7f0000000740)}, 0x10) r3 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r4}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r5}, 0x10) 2018/04/18 07:41:14 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xe, 0x4000000000000004, 0x4, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f]}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000480)={r0, &(0x7f0000000140), &(0x7f0000000180)="03d8"}, 0x20) mkdir(&(0x7f0000000240)='./file0\x00', 0x40) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000001c0)={r0, 0x28, &(0x7f0000000140)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={r1, 0x200}, 0xc) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='bdev\x00', 0x4000, &(0x7f0000000100)="7095fdc51c0379ca409a") 2018/04/18 07:41:14 executing program 4: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x100}, 0x2c) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x9) close(r0) gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={r2, 0x28, &(0x7f0000000740)}, 0x10) r3 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r4}, 0x10) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r5}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/18 07:41:14 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x14a}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=ANY=[@ANYBLOB="18000000000000000000000000000000711000000000000000000000000008009500000000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x0, 0xffffffffffffff11, &(0x7f00001a7f05)=""/251}, 0x18) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x4, 0x705000, 0x1, &(0x7f0000000000)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={r0, 0x50, &(0x7f0000000180)}, 0x10) 2018/04/18 07:41:14 executing program 6: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004, 0x4000009d}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=ANY=[@ANYBLOB="18000000000000080000000000000000711000000000000000000000000000009500000010000002"], &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x28, 0x6f2000, 0x1, &(0x7f0000000000)) 2018/04/18 07:41:14 executing program 0: bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000180)=0x9, 0x4) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x83, 0xb, 0x1ff, 0x1}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000011c0)={0x7, 0x2, &(0x7f0000000000)=@raw=[@map={0x18, 0x0, 0x1, 0x0, r0}], &(0x7f0000000080)='syzkaller\x00', 0x8000, 0xbb, &(0x7f00000000c0)=""/187}, 0x48) socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f0000000380)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r1, 0x0, 0x4b, 0xbb, &(0x7f0000000200)="c21b373a7ecceedee47001401bb736e89de17afd7bb99daa6dee179e950e18101c61f07fce7044b6ad4121185f92c69182e9ee6074bff39d5b626b3f5be0204a92528e4ae4564a90096d22", &(0x7f0000000280)=""/187, 0x7, 0xe31a}, 0x28) 2018/04/18 07:41:14 executing program 3: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000440)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x67}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={r0, 0x28}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0xffffffffffffff11, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r1, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x7fff00000008, 0x2, 0x1a6c, &(0x7f00000001c0)) 2018/04/18 07:41:14 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004, 0x4000009d}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x59616d61, 0xffffffffffffffff, 0x1, &(0x7f0000000000)) socketpair$inet_icmp(0x59616d61, 0xffffffffffffffff, 0x1, &(0x7f0000000000)) 2018/04/18 07:41:14 executing program 7: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x100}, 0x2c) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x9) close(r0) gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={r2, 0x28, &(0x7f0000000740)}, 0x10) perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r3}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/18 07:41:14 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x7, 0x13f}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000000)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5914ae2fdc24e95e12aa8daccf7f43e72be9cc66f"}, 0x10) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r0, &(0x7f0000000180)="7055966f964fb56dacb9692059231a295ae7ac1df47e9947056e790c8f433ccad1b711cafe9d6e44669d713cb988da0f4e854895107ee357cc4c3400ffde06dc818692d4f4b66652e9611cc129772e408f7bc3c26277dd832d96a65647456bb5", &(0x7f0000000200)=""/14}, 0x18) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000140)={&(0x7f0000000080)='./file0\x00', r0}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={r1, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x2, 0x7ffffffff000, 0x1, &(0x7f0000000040)) 2018/04/18 07:41:14 executing program 4: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x100}, 0x2c) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x9) close(r0) gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={r2, 0x28, &(0x7f0000000740)}, 0x10) r3 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r4}, 0x10) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00'}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/18 07:41:14 executing program 0: socketpair$inet(0x2, 0x1, 0xd542, &(0x7f0000000000)) r0 = perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x1, 0x10000, 0x20, 0x0, 0x0, 0x6, 0x20, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x4, 0x8000, 0x1, 0x4, 0x9, 0x4, 0x4, 0x8001, 0x5, 0x4, 0x3, 0x8, 0xf3e, 0x8, 0x1, 0x2, 0x9, 0x3580000000000000, 0x7f, 0x8, 0xe9, 0x100000001, 0x48c3, 0xc6, 0x6c, 0x0, 0x7, 0x2, @perf_config_ext={0x8e4f, 0x3}, 0x8, 0x84d, 0x3, 0x1, 0x9, 0x4f8, 0x1d6b}, 0x0, 0xc, 0xffffffffffffff9c, 0x8) socketpair$inet(0x2, 0xa, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001680)={0x8, 0x2, &(0x7f0000000080)=@raw=[@ldst={0x3, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1}], &(0x7f0000001700)="47504c008b9b0436e51268cfa4f2b5bfac834092a635b2e57e6c085cda744fedb82dcc0eca0921a92076dec038482677a2c94cef5a626468e68236d64824ea9d92b84c8c29b95fd45f6fda8c423e18c7782baebf89fd22cc0c2d32", 0x6, 0xbf, &(0x7f0000000200)=""/191}, 0x48) 2018/04/18 07:41:14 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x4, 0x70, 0x100000000, 0x6, 0xfffffffffffffffd, 0x1000, 0x0, 0x7ff, 0x100, 0x4, 0x2, 0x2, 0x7, 0x7ff, 0x10001, 0x3, 0x5, 0x3, 0x6, 0x100000001, 0x4, 0xfffffffffffffff9, 0x8e8, 0x6a92, 0x7, 0x101, 0x6, 0x400, 0x8, 0x3, 0x1, 0xab, 0x100000000, 0x7, 0x100, 0x9, 0x2, 0x4, 0x0, 0x6450a4a, 0x2, @perf_bp={&(0x7f0000000100), 0x8}, 0x8, 0x3, 0x6, 0x5, 0x4, 0x742, 0x3f}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000280)='procsecurity\x00') r1 = perf_event_open(&(0x7f0000c72000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fe, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcd4, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x95d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000000200)={0x0, 0xfffffffffffffdb9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000040), 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xed}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/18 07:41:14 executing program 1: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x100}, 0x2c) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x9) close(r0) gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={r2, 0x28, &(0x7f0000000740)}, 0x10) r3 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r4}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) 2018/04/18 07:41:14 executing program 5: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0x50, &(0x7f0000000100)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000180)=r0, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xc, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="850000002200000007005e8c89b0dccfb57832630000e50000f91b030707c8806f54000000934f9781c2971aa5cf63a1e97ac2a2067ee6dc532b64d4d918f434b58c91b2e151afcc9d8b164be6a6450911576550e13935a621b65073ae08f4f54c5cb65b52d65ab0c307c92bddbb2ebb8774bab8bea89f130eed6fa3b4f8f46e336694395bfbed31ca3475f403f2fd78c0cdaf99fbcbf98e20acd328e067e1a3da002dbfe024edad892015909b45348d4d57d66c075f887a68594bfb5821b5e677a9ab88e6f0e16c622df2616e522cccfc17f621cc8278de818164b21b70a0e6de9c24ab8990d58aa870d19ce6a2"], &(0x7f0000000480)="73797a6b616c6c65720001be826e8f833152f795b4d9f4bc3ea582523aed371b084fccfc3d2ef2cbe65d30642ca8dcd0f8479be52e66937908f1d811248901009d9d4edb806d81189c0fbb6818d028546c35d3363d54db0db780f54977ae6359d617c1d233d8e18abfc75f9a76cd8e1f77583bc02f07a33de6f304e95db82fd4da55ebd25162df6f88e7d1bb0654ffb31e00896775d07e643294f42572c5c6afe73b327c265d3da17b9b836403a9848ed53b6a03675e3abe7fcbcc7f7e3e20a3247b3140d507ce0cac979cd37dc2fb7f0a6f3047c62b2b38196e9f5720f37c75293d4397af", 0x1, 0x99, &(0x7f000000d000)=""/153}, 0x48) r1 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000001780)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f00000017c0)={r2}) 2018/04/18 07:41:14 executing program 6: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x7, 0x97}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x7, 0xfffffffc, 0xcce0ecd, &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x7, 0x39}, 0xffffffffffffff75) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r1, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x705000, 0x2, 0xe, &(0x7f0000000000)) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000080)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r2, 0x50, &(0x7f00000000c0)}, 0x10) 2018/04/18 07:41:14 executing program 0: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x20000000, 0x6f2000, 0xe, &(0x7f0000000000)) socketpair$inet_icmp(0x20004000, 0x2, 0x1, &(0x7f0000000080)) socketpair$inet_icmp(0x20000000, 0x6f2000, 0x4, &(0x7f0000000000)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00'}, 0x10) 2018/04/18 07:41:14 executing program 5: socketpair(0x1, 0x3, 0x0, &(0x7f0000000000)={0x0, 0x0}) sendmsg(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000001500)}, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x0, 0x3, &(0x7f0000346fc8)=@framed={{0x18}, [], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) close(r0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) sendmsg(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000040)}, 0x0) 2018/04/18 07:41:14 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004, 0x4000009d}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x59616d61, 0xffffffffffffffff, 0x1, &(0x7f0000000000)) socketpair$inet_icmp(0x59616d61, 0xffffffffffffffff, 0x1, &(0x7f0000000000)) 2018/04/18 07:41:14 executing program 7: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x100}, 0x2c) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x9) close(r0) gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={r2, 0x28, &(0x7f0000000740)}, 0x10) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r3}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/18 07:41:14 executing program 4: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x100}, 0x2c) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x9) close(r0) gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={r2, 0x28, &(0x7f0000000740)}, 0x10) r3 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r4}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/18 07:41:14 executing program 1: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x100}, 0x2c) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x9) close(r0) gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={r2, 0x28, &(0x7f0000000740)}, 0x10) r3 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r4}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) 2018/04/18 07:41:14 executing program 3: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x100}, 0x2c) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x9) close(r0) gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={r2, 0x28, &(0x7f0000000740)}, 0x10) r3 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r4}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) 2018/04/18 07:41:15 executing program 0: socket$kcm(0x29, 0x7, 0x0) r0 = getpid() bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004, 0x4000009f}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r2, 0x50, &(0x7f00000000c0)}, 0x10) perf_event_open(&(0x7f0000000180)={0x4, 0x70, 0xfffffffffffeffff, 0x2, 0x3c, 0x6, 0x0, 0x100000001, 0x40000, 0x3, 0x4, 0xfffffffffffffff7, 0x800, 0x0, 0x0, 0x5bb, 0x6, 0x7, 0x0, 0x2, 0x49c, 0x7, 0x2, 0xff, 0x5, 0x7c6, 0x55e4, 0x0, 0x0, 0x0, 0x6, 0x8d00, 0x400, 0x8d, 0x0, 0x4, 0xffffffffffffffff, 0x8, 0x0, 0x9, 0x5, @perf_config_ext={0x401, 0x785f}, 0x1, 0xa2, 0x100000001, 0x7, 0x3, 0x9, 0x1}, r0, 0xa, r1, 0x6e5e348346b67de0) socketpair$inet_icmp(0x730000, 0x6f2000, 0x1, &(0x7f0000000080)) 2018/04/18 07:41:15 executing program 5: perf_event_open(&(0x7f0000000000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8820, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) socketpair(0xb, 0x800, 0x19d1, &(0x7f0000000080)) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000100)) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x5, &(0x7f0000000000)=@framed={{0x18}, [@call={0x85, 0x0, 0x0, 0x19}], {0x95}}, &(0x7f00000000c0)='GPL\x00', 0xe6, 0xfb, &(0x7f0000000300)=""/251}, 0xffffff9d) 2018/04/18 07:41:15 executing program 2: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004, 0x4000009d}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x59616d61, 0xffffffffffffffff, 0x1, &(0x7f0000000000)) socketpair$inet_icmp(0x59616d61, 0xffffffffffffffff, 0x1, &(0x7f0000000000)) 2018/04/18 07:41:15 executing program 7: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x100}, 0x2c) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x9) close(r0) gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r2}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/18 07:41:15 executing program 4: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x100}, 0x2c) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x9) close(r0) gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={r2, 0x28, &(0x7f0000000740)}, 0x10) r3 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r4}, 0x10) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r5}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/18 07:41:15 executing program 3: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x100}, 0x2c) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x9) close(r0) gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={r2, 0x28, &(0x7f0000000740)}, 0x10) r3 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r4}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/18 07:41:15 executing program 1: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x100}, 0x2c) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x9) close(r0) gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={r2, 0x28, &(0x7f0000000740)}, 0x10) r3 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r4}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) 2018/04/18 07:41:15 executing program 0: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000880)=0x27c0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000001c0)={&(0x7f0000000080)='./file0\x00', r1}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r2, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x13, 0x2, 0xfffffffe, &(0x7f0000000180)={0xffffffffffffffff}) recvmsg(r3, &(0x7f00000007c0)={&(0x7f0000000200)=@ax25, 0x80, &(0x7f0000000700)=[{&(0x7f0000000280)=""/203, 0xcb}, {&(0x7f0000000380)}, {&(0x7f00000003c0)=""/153, 0x99}, {&(0x7f0000000480)=""/143, 0x8f}, {&(0x7f0000000540)=""/92, 0x5c}, {&(0x7f00000005c0)=""/4, 0x4}, {&(0x7f0000000600)=""/240, 0xf0}], 0x7, &(0x7f0000000780)=""/33, 0x21, 0x3}, 0x41) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000800)={r1, 0x28, &(0x7f0000000380)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000840)={r4, 0x1, 0x8}, 0xc) 2018/04/18 07:41:15 executing program 1: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x100}, 0x2c) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x9) close(r0) gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={r2, 0x28, &(0x7f0000000740)}, 0x10) r3 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r4}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) 2018/04/18 07:41:15 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x221}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) socketpair(0xb4a93aa66eb57fef, 0x0, 0x800, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x80000001) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x7fffffffefff, 0x400000, 0x1, &(0x7f0000000280)) 2018/04/18 07:41:15 executing program 2: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004, 0x4000009d}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x59616d61, 0xffffffffffffffff, 0x1, &(0x7f0000000000)) socketpair$inet_icmp(0x59616d61, 0xffffffffffffffff, 0x1, &(0x7f0000000000)) 2018/04/18 07:41:15 executing program 6: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x7, 0x97}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x7, 0xfffffffc, 0xcce0ecd, &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x7, 0x39}, 0xffffffffffffff75) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r1, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x705000, 0x2, 0xe, &(0x7f0000000000)) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000080)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r2, 0x50, &(0x7f00000000c0)}, 0x10) 2018/04/18 07:41:15 executing program 0: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000004, 0x40000134}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000000)={r0, &(0x7f0000000180)="b634752240129045711bb80145df5d5c39a12f238782b2a6ca04a453f6a9c6f59718cfaab04d6695869a4accebdf7ed262f72d1b82c76985d5bd1733488ecdb3b483a6f97d94db71833235fdf697e89d31546d8fb46ec5818946acafdfd8bbd431f9ed9314ff64e410"}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0xffffffffffffff11, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r1, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x6f2000, 0x6f2000, 0x1, &(0x7f0000000080)) 2018/04/18 07:41:15 executing program 7: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x100}, 0x2c) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x9) close(r0) gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r2}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/18 07:41:15 executing program 3: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) socketpair(0xa, 0x5, 0x2f6, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x9f9, 0x0, 0x4, 0x145, r1}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={r2, 0x28, &(0x7f0000000140)}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=ANY=[@ANYBLOB="18000000000000000000000000000000711000000010000000000000000000009500000000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x0, 0xffffffffffffff11, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000001c0)={r3, 0x50, &(0x7f00000000c0)}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000003c0)={&(0x7f0000000380)='./file0\x00', r2}, 0xbd5fe2c1719d57fb) socketpair$inet_icmp(0x6f3000, 0x2, 0x1, &(0x7f0000000000)) recvmsg$kcm(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000200)=""/20, 0x14}], 0x1, &(0x7f0000000280)=""/35, 0x23, 0x3}, 0x40) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) 2018/04/18 07:41:15 executing program 4: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x100}, 0x2c) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x9) close(r0) gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={r2, 0x28, &(0x7f0000000740)}, 0x10) r3 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00'}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r4}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/18 07:41:15 executing program 0: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0xffffffff, 0xfffffffffffffe00, 0x10}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000440)={r0, &(0x7f0000000200)="115bbad4aae674e8d485221b5eceb6e3e47b2fabb879718c31fe472ad7fe8ee90000e8000000000000", &(0x7f0000000340)=""/210}, 0x18) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x106d}, 0xfffffffffffffec3) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xffffffffffffffff, 0x5, &(0x7f0000000140)=ANY=[@ANYRES64=r0, @ANYPTR64=&(0x7f0000000600)=ANY=[@ANYPTR=&(0x7f00000000c0)=ANY=[@ANYBLOB="afc9bab4ad", @ANYPTR, @ANYRES16], @ANYBLOB="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", @ANYRES32=r0, @ANYPTR64=&(0x7f0000000480)=ANY=[@ANYRES32=r0, @ANYPTR64, @ANYBLOB="4976b733561cc46b077a6be195b62aa392bc0b6398df49bfb69f5004a70f1234599208c8f54c81a4a8f5a0a377c7f1361b3e9a326a7831b346d6a54f4ee96f11c199ec9a04edc919afd4da9c8477194c8827244d4abe6390a55566e08efb1a0b8b940a91df411c538c5d16246cc32edf41bb19b568a8b8f1ebfbb0fb8dbb7b842e51961464e643036bd13e9e6a8c3fb35bb7cc636b77e8696ddd5100ddfbbb2d99ef2efeb6715307495b731756d0a2baeb7f0d1970ebb1db96a6bb007623fd6ca0075cb8ed0bd4d5be0ecca89d00435411f17d38d21c060fc09df9576164589da87992cf511d7da02f30f464a500000000000000000000", @ANYRES16=r1, @ANYPTR64, @ANYBLOB="ee4c2fdfe8466f54818aa0f1fcd32fef0986db8c9851a6c2264f70f939a5fe17b96664e02fefaeb11259cce5f22033a2155f11b9eabd81f64953c3c2", @ANYPTR64, @ANYRES16=r1], @ANYPTR=&(0x7f0000000100)=ANY=[@ANYPTR, @ANYRES64=r0]], @ANYPTR], &(0x7f0000000180)='syzkaller\x00', 0x5c6e, 0xb1, &(0x7f00001a7f05)=""/251, 0xfffffffffffffffc}, 0xfffffffffffffce2) socket$kcm(0x29, 0x7, 0x0) 2018/04/18 07:41:15 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0xe6}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x2, 0x3, 0x730000, &(0x7f0000000180)) 2018/04/18 07:41:15 executing program 2: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004, 0x4000009d}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x59616d61, 0xffffffffffffffff, 0x1, &(0x7f0000000000)) socketpair$inet_icmp(0x59616d61, 0xffffffffffffffff, 0x1, &(0x7f0000000000)) 2018/04/18 07:41:15 executing program 7: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x100}, 0x2c) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x9) close(r0) gettid() socket$kcm(0x29, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/18 07:41:15 executing program 5: socketpair(0x10, 0xa, 0x7, &(0x7f0000000000)={0xffffffffffffffff}) socketpair(0x10, 0x800, 0x80, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004, 0x202}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000efc3e6017397d6790000000000000000009500000000040010"], &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r2, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x2, 0x8004700b, 0x1f4, &(0x7f00000001c0)) 2018/04/18 07:41:16 executing program 1: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x100}, 0x2c) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x9) close(r0) gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={r2, 0x28, &(0x7f0000000740)}, 0x10) r3 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r4}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) 2018/04/18 07:41:16 executing program 4: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x100}, 0x2c) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x9) close(r0) gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={r2, 0x28, &(0x7f0000000740)}, 0x10) r3 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000440)=0x5bc6) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r4}, 0x10) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r5}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/18 07:41:16 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x118}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000000)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x6f2000, 0x400000, 0x400008, &(0x7f0000000480)) 2018/04/18 07:41:16 executing program 2: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004, 0x4000009d}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x59616d61, 0xffffffffffffffff, 0x1, &(0x7f0000000000)) socketpair$inet_icmp(0x59616d61, 0xffffffffffffffff, 0x1, &(0x7f0000000000)) 2018/04/18 07:41:16 executing program 7: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x100}, 0x2c) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x9) close(r0) gettid() socket$kcm(0x29, 0x0, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/18 07:41:16 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r0, 0x28, &(0x7f0000000080)}, 0x10) socket$kcm(0xa, 0x6, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x1b, &(0x7f0000000180), 0x127) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={r1, &(0x7f0000000100)="96edba6d49844f7e5cf0117d5b72ca50020f7be725c09f5a4b142ac6e7e19566aa50002dd163ad03a31ad5046a03e38ca7c86ac2e6eff30ddeca3b5ec1f7fd30f18bfa97d2964a21d2f302e2b47ae660430262ffaacb0c", &(0x7f00000001c0)=""/64}, 0x18) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)) 2018/04/18 07:41:16 executing program 6: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x69}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb630000000000000006fdc24e95e12aa7748f9f393e72be9cc66f"}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000000)) socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f0000000a00)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0x0, 0x0}) setsockopt$sock_attach_bpf(r1, 0x1, 0x19, &(0x7f0000000100), 0x4) 2018/04/18 07:41:16 executing program 5: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0xffffffffffffffff, 0x0, 0x4000000000006291, 0xe}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0xffffffffffffff11, &(0x7f00001a7f05)=""/251}, 0x18) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f00000005c0)) 2018/04/18 07:41:16 executing program 2: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004, 0x4000009d}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x59616d61, 0xffffffffffffffff, 0x1, &(0x7f0000000000)) socketpair$inet_icmp(0x59616d61, 0xffffffffffffffff, 0x1, &(0x7f0000000000)) 2018/04/18 07:41:16 executing program 0: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00', 0x0, 0x10}, 0x10) close(r0) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000000)) socket$kcm(0xa, 0x3, 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00', r0}, 0x10) setsockopt$sock_attach_bpf(r0, 0x29, 0x4c, &(0x7f0000000180), 0xfffffffffffffe1e) 2018/04/18 07:41:16 executing program 7: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x100}, 0x2c) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x9) close(r0) gettid() mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/18 07:41:16 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000200)) close(r2) socket$kcm(0xa, 0x40000000000005, 0x0) setsockopt$sock_attach_bpf(r2, 0x84, 0x78, &(0x7f0000001340)=r2, 0x4) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x9) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x9, 0x10, &(0x7f0000000080)=@raw=[@alu={0x7, 0x6, 0x0, 0x4, 0x3, 0xffffffff, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x7, 0x0, 0x5, 0x0, 0xfffffffffffffffd}, @map={0x18, 0x9, 0x1, 0x0, r1}, @jmp={0x5, 0x8001, 0x5, 0x2, 0x2, 0x100}, @alu={0x7, 0x8, 0xf, 0x0, 0xe, 0x6, 0x10}, @call={0x85, 0x0, 0x0, 0x5}, @map={0x18, 0xf, 0x1, 0x0, r1}, @ldst={0x0, 0x3, 0x1, 0x5, 0x7, 0x1, 0xfffffffffffffff0}], &(0x7f0000000000)='syzkaller\x00', 0xd1f, 0x68, &(0x7f0000000100)=""/104, 0x40f00, 0x1}, 0x48) 2018/04/18 07:41:16 executing program 3: r0 = socket$kcm(0x2, 0x1, 0x0) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000080)={r1, &(0x7f00000001c0)="9ea1235cb4cbf53339d2908145fd2b1f41a86448c60f6ed3b474bd3e479f59c5e2df37e1573bb36954f797ca899d0ac992faacbff4b9c1071c1ff87de68137ed838cecc1604ad9065da221d6333517d7f874685eb58b90b54fc4ae6bd11f1e1956b4d7509aceadd69257a54621d2a0bf8b8421f89fd061fb279366b6ed0f8e138ebcdb2dca31502700ea31b7d03548e5c975d00db4270b6e56ed9f7b236877403b4838b9c05e95c3fa0353a6aebdf2992e047f3c6d33aa671aad5935496de05b67f6fb94f25a978618ae09ea219426d2ed8431f97880a49dd4", &(0x7f00000002c0)=""/107}, 0x18) sendmsg(r0, &(0x7f0000000840)={&(0x7f0000000140)=@in={0x2}, 0x80, &(0x7f0000000080), 0x0, &(0x7f00000000c0)=[{0x38, 0x10b, 0x7, "3ba432c50fb9f59bb788a66de2ce71241ff317e37a484aa52572a78b29b9f53b18ecf9be9059c0"}], 0x38}, 0x2044ffe0) 2018/04/18 07:41:16 executing program 6: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000340)) sendmsg(r0, &(0x7f0000000380)={&(0x7f0000000200)=@l2={0x1f, 0x3, {0x5, 0x1, 0x6c91c2ee, 0x7fffffff, 0x6, 0xa3b}, 0x652, 0x5}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000280)="78e441a85d3083b20bd35b157316ef832d8af8b21582aa5bb6762e9a6700590342609b30c98c1e59d31ffee5c13e00cd076a959079dab8f18d3d196366642c55c58c63402d4b7ec8424ae2953013f6d0fc4e7d1054d0071b7b801c392520369b2fe251a8a2688776f720abc88292a61e", 0x70}], 0x1, &(0x7f0000000340), 0x0, 0x800}, 0x1) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0xbc) mkdir(&(0x7f00000001c0)='./file0\x00', 0x70) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00', r0}, 0x10) 2018/04/18 07:41:16 executing program 1: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x100}, 0x2c) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x9) close(r0) gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={r2, 0x28, &(0x7f0000000740)}, 0x10) r3 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r4}, 0x10) 2018/04/18 07:41:16 executing program 4: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x100}, 0x2c) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x9) close(r0) gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={r2, 0x28, &(0x7f0000000740)}, 0x10) perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r3}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r4}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/18 07:41:16 executing program 0: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x100) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x7, 0x97}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x7, 0xfffffffc, 0xcce0ecd, &(0x7f0000000240)) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x7, 0x39}, 0xffffffffffffff75) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r1, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x705000, 0x2, 0xe, &(0x7f0000000000)) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f00000001c0)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r2, 0x50, &(0x7f00000000c0)}, 0x10) 2018/04/18 07:41:16 executing program 2: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004, 0x4000009d}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x59616d61, 0xffffffffffffffff, 0x1, &(0x7f0000000000)) socketpair$inet_icmp(0x59616d61, 0xffffffffffffffff, 0x1, &(0x7f0000000000)) 2018/04/18 07:41:16 executing program 4: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x100}, 0x2c) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x9) close(r0) gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={r2, 0x28, &(0x7f0000000740)}, 0x10) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r3}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r4}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/18 07:41:16 executing program 6: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000002780)={0x0, 0x0}) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080), 0x63, &(0x7f00000000c0)}, 0x0) socketpair$inet(0x2, 0x80807, 0xffff, &(0x7f0000000040)) perf_event_open(&(0x7f0000001180)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x10, &(0x7f0000000100), 0x4) sendmsg(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)="dc", 0x1}], 0x1, &(0x7f0000000480)=ANY=[]}, 0x0) recvmsg$kcm(r1, &(0x7f0000007500)={&(0x7f0000006f00)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, 0x80, &(0x7f0000004a40)=[{&(0x7f00000039c0)=""/4096, 0x1000}], 0x1, &(0x7f0000004ac0)=""/136, 0x88}, 0x0) 2018/04/18 07:41:16 executing program 7: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x100}, 0x2c) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x9) close(r0) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/18 07:41:16 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x7, 0x0, 0x0, 0x0, 0x1}], {0x95}}, &(0x7f000031cff6)='syzkaller\x00', 0x5c6e, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) close(r0) 2018/04/18 07:41:16 executing program 1: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x100}, 0x2c) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x9) close(r0) gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={r2, 0x28, &(0x7f0000000740)}, 0x10) r3 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/18 07:41:16 executing program 3: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004, 0x4000009d}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r1, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet6_icmp(0xa, 0x2, 0x3a, &(0x7f0000001640)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f00000016c0)=r1, 0x4) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001700)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={r0, 0x28, &(0x7f0000000080)={0x0, 0x0}}, 0x10) r4 = socket$kcm(0x29, 0x2, 0x0) recvmsg$kcm(r4, &(0x7f0000001680)={&(0x7f0000000200)=@in={0x0, 0x0, @dev}, 0x80, &(0x7f00000015c0)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/129, 0x81}, {&(0x7f0000001340)=""/156, 0x9c}, {&(0x7f0000001400)=""/94, 0x5e}, {&(0x7f0000001480)=""/22, 0x16}, {&(0x7f00000014c0)=""/211, 0xd3}], 0x6, &(0x7f0000001640), 0x0, 0x2}, 0x8c39a3eaabe36f2c) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={r3, 0x6, 0x10}, 0xc) socketpair$inet_icmp(0x59616d61, 0xffffffffffffffff, 0x1, &(0x7f0000000000)) socketpair$inet_icmp(0x59616d61, 0xffffffffffffffff, 0x1, &(0x7f0000000000)) 2018/04/18 07:41:16 executing program 2: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8dacc"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004, 0x4000009d}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x59616d61, 0xffffffffffffffff, 0x1, &(0x7f0000000000)) socketpair$inet_icmp(0x59616d61, 0xffffffffffffffff, 0x1, &(0x7f0000000000)) 2018/04/18 07:41:16 executing program 5: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0xe5}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000b520433f24d137d800000000000000000000000000000000000000000000cb17bd7a7efc8c73787beda46a6956088d484a33ff091640403aa02daf1cce2cf7c293f8883056726f68a5d8ca6f3a8fb809"], &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000200)={&(0x7f0000000080)='./file0\x00', 0x0, 0x8}, 0x10) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000000)) socketpair$inet_icmp(0xa, 0x2a98ccd0, 0x400000, &(0x7f0000000480)) 2018/04/18 07:41:16 executing program 6: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000f97ff8)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair(0x8, 0x5, 0x112, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000240)=0x4) sendmsg(r1, &(0x7f0000e64fc8)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)=[{0x18, 0x1, 0x1, '\x00'}], 0x18}, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000180)={0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) perf_event_open(&(0x7f00000000c0)={0x7, 0x70, 0x0, 0xaca, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x5, 0xfff, 0x0, 0x100, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x111267dc7c34bb8a}}, 0x0, 0x0, r0, 0x0) 2018/04/18 07:41:16 executing program 7: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x100}, 0x2c) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x9) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/18 07:41:16 executing program 4: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x100}, 0x2c) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x9) close(r0) gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={r2, 0x28, &(0x7f0000000740)}, 0x10) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r3}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r4}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/18 07:41:16 executing program 1: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x100}, 0x2c) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x9) close(r0) gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={r2, 0x28, &(0x7f0000000740)}, 0x10) r3 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/18 07:41:16 executing program 3: recvmsg(0xffffffffffffffff, &(0x7f0000346fc8)={&(0x7f0000000040)=@ll, 0x14, &(0x7f0000ca3000)=[{&(0x7f00000b4000)=""/15, 0xf}, {&(0x7f0000f6afa9)=""/87, 0x57}, {&(0x7f00008e3f35)=""/203, 0xfffffffffffffe5b}, {&(0x7f0000cd5ffe)=""/2, 0x2}], 0x163, &(0x7f0000a01f13)=""/237, 0xed}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x9, 0x1fffffffffffffea, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x201a7f1b, 0x0, 0x6, 0x1}], {0x95}}, &(0x7f0000f59000)='GPL\x00', 0x40, 0x40f, &(0x7f0000000140)=""/251}, 0x7a) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x100000000, 0x9, 0x9, 0x0, 0x51, 0x2, 0x9, 0x7f, 0xffffffff, 0xffffffffffffa9f2, 0x1, 0x8, 0x6, 0x7f, 0x8, 0x7, 0xa641, 0x100000000, 0x8000, 0x401, 0x4b8, 0x8, 0x6, 0x80000001, 0x5, 0x2, 0x1ff, 0xf33d, 0x81, 0x1ff, 0x40, 0x2, 0x800000000, 0xa839378, 0x6, 0x0, 0x1000, 0x1, @perf_bp={&(0x7f0000000000), 0x4}, 0x20000, 0x81, 0x52, 0x7, 0x9, 0x9, 0x8001}, 0x0, 0xd, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x5) 2018/04/18 07:41:16 executing program 2: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8dacc"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004, 0x4000009d}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x59616d61, 0xffffffffffffffff, 0x1, &(0x7f0000000000)) socketpair$inet_icmp(0x59616d61, 0xffffffffffffffff, 0x1, &(0x7f0000000000)) 2018/04/18 07:41:16 executing program 0: socketpair(0xb, 0x1, 0x8, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000001c0)={0x0, r0, 0x4, 0x2}, 0x14) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0\x00', r0}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x47}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x9, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000eea873140000000000000061150400000000000000000000000000950000000000000092447f666d5fe0d09e796664a9e134ba03f19ee027d45382db7e60cd1caf555cc7b83c3fb71287f4b95e4cd96218fd07ac8a8e30f0c5aa311245e6e6c17df6da2e98fb5caeb5899e0ba0f79cfd9df2ce9ab767d6724dc8e5393aac1a32b8fc05f6744eb496af21c887e848681355e617cd66f03b157f9c77e75d8825075ed3dc0f384e765588414ff2b2fa6fcb267e980000000000000000000000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 2018/04/18 07:41:16 executing program 5: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x7, 0x83}, 0x22) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r1, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x4000f0, 0x6f6000, 0x1, &(0x7f0000000a80)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r0, 0x28, &(0x7f0000000000)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={r2, 0x8000000000000, 0x18}, 0xc) 2018/04/18 07:41:16 executing program 3: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000000)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x7, 0x139}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000040)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x6f2000, 0x2, 0x1, &(0x7f0000000440)) 2018/04/18 07:41:16 executing program 7: perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x100}, 0x2c) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/18 07:41:16 executing program 2: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8dacc"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004, 0x4000009d}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x59616d61, 0xffffffffffffffff, 0x1, &(0x7f0000000000)) socketpair$inet_icmp(0x59616d61, 0xffffffffffffffff, 0x1, &(0x7f0000000000)) 2018/04/18 07:41:16 executing program 5: r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000001ec0)={&(0x7f00000018c0)=@nl=@unspec, 0x80, &(0x7f0000001dc0), 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="180000000000000029000000050000002802020000000000"], 0x18}, 0x0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000000)) 2018/04/18 07:41:16 executing program 1: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x100}, 0x2c) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x9) close(r0) gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={r2, 0x28, &(0x7f0000000740)}, 0x10) r3 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/18 07:41:16 executing program 6: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000f97ff8)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair(0x8, 0x5, 0x112, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000240)=0x4) sendmsg(r1, &(0x7f0000e64fc8)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)=[{0x18, 0x1, 0x1, '\x00'}], 0x18}, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000180)={0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) perf_event_open(&(0x7f00000000c0)={0x7, 0x70, 0x0, 0xaca, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x5, 0xfff, 0x0, 0x100, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x111267dc7c34bb8a}}, 0x0, 0x0, r0, 0x0) 2018/04/18 07:41:17 executing program 4: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x100}, 0x2c) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x9) close(r0) gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r2}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r3}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/18 07:41:17 executing program 0: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000f97ff8)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair(0x8, 0x5, 0x112, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000240)=0x4) sendmsg(r1, &(0x7f0000e64fc8)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)=[{0x18, 0x1, 0x1, '\x00'}], 0x18}, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000180)={0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) perf_event_open(&(0x7f00000000c0)={0x7, 0x70, 0x0, 0xaca, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x5, 0xfff, 0x0, 0x100, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x111267dc7c34bb8a}}, 0x0, 0x0, r0, 0x0) 2018/04/18 07:41:17 executing program 3: socketpair(0x1, 0x1, 0x800, &(0x7f0000000140)={0x0, 0x0}) sendmsg(r1, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000240)="3fd5a182af2045217b08714b8f50e61816203a05daa7d9df4fa229261a5c889e56c743b1a0fc3c6d1e2dee7f9c7ea1f13ab3a01a97d1dcf30abbde539f38843f0ab865d3a8504217b8b30e7f2b3c7f91b3505e6bded3b0015424b0226303ab2aef0cb886b6c051a8500a", 0x6a}, {&(0x7f00000003c0)="8b4fc2fe2ed65ff5bb2921ecb535bcc5492f919e2a114c9de0538748af74547e0518ecd28a6cccf6272b4f9428ed0a40f28fa0bf2896d870a09b3ac7cb44493ea9d3ada605db3f754ede456d9f5ead7178d388829294b0d84549b2216718ab597e05c43e52f8dbffeeb1d484a7b5fd09b97380f1b8efa0cea86ff723f3b8c372405b4b3cbbb17eb54732a69439900bd76ae4d91c0bd2b34906dec0515066a94411384766789a64a9d629619c22f9d2a2b24b443a6fc16f4837b83b19494176a5bb54230f96944c9bce737725e91ecc83", 0xd0}, {&(0x7f00000004c0)="15eb35a4da6a1757d8a3c96e0b5c8cdcf313489537826f4a531db8fa668046bf13f9c37ef86d257e5e7b98ba4be6f879bd796b7bcaffd74caf5c5b7e72ad29e9a6022a459e65cbc9c9afe082ec205ff64c461e1661d85f985120c55c70b68208f200aceb162340659bf795ceff0d35a63879a9952684e33a45881f7f3c9338432d9613686616173ad1c6187ba22bc38f3640bb1316653e", 0x97}, {&(0x7f00000002c0)="26b846d0c8f895d906a3d5f02c5c8443306c8a50d54e83f71365e52da521605bb5555f6d84a04c962c25ac19069ab227da660a65b444ebe480874dc1ad9c1d4e9ca30ea5c67c806c", 0x48}, {&(0x7f0000000580)="0282c5c4f4d0b011c99b2b495c5e980e3efed704ec6b836f19783106e366e62a1d0b178b12488c458faddbad7f615b9af21727db669b1c833c0e3f20214733e9ea17e6a2b56cce252945f6d12cd7291afd83d314fe5dae1ec2e0654280181340af2d6afc13b9cd894afd0f2bcbdae0b5cb603537a8bcd36bbfd68b58e43557ff84ea0929a1af09d3d4dc9cf20199a6510a56f4f6f166ef1c45f16211e1d12786621bdc44", 0xa4}], 0x5, &(0x7f0000000800)=[{0x38, 0x100, 0x10000, "3f392787fcd540ec5a542d605207b0f7b9c5c9f89b0cc5d5e1e46863736fcb1758"}, {0xe0, 0x13f, 0x6, "405b2826f99e9e17584ef29b07642268e4df1fc639147bde87cc6e7715382506f64e3eb5b54f6724cb41bebebb7f027176997878660ed2559fca4d1688af0da647fb105e3c328cb98c511f2198a9d2524932a7821c516617c0869c6c2d4d3b1e059cb8eb832d811f776887c0ce4d93ee1004528ec7f7ccf841156747eb8946ba8c5018a6ef94679bb96690aea88d4bfbde7339a3eb56cd7fa640b60f859035788d0f4b8542761c63684cf87eec36065a547dbe67043a55235c06fb5c2449777c73556cffaa672ce9dcce5a3ca2"}], 0x118, 0x4000000}, 0x4000080) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000006c0)={r0, &(0x7f0000000700)="8509347c67c3e47baf7b5100b5764701000000000000009305c864d3edf29230527f01c3b410e806b13f87c658361c5e9f210d7c94b0ffbd9f4c0000008617d2f4117f9bc9fa5584e6576001a92adba0232a1b0192ed5407564f5f0af73c589b3fe88ccf1d7c9d750651b86600678962161ad847a59cccff6b073b6e40706da109a0ea13a9ee642fd166b650647beb31dbd5af1f408b048c93914f020c21c8d1720483d10e05000000000000007dc9304f7e383dba8f088a7e1d9ba202daa0420ebaa08bca97652636d515b9ce418bbd475195ee0ab22d6867595d56402c17c814d961a95649000000000000000000", &(0x7f0000000340)=""/76}, 0xffffffffffffff0f) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004, 0x202}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="0000000000000000007110000000000000000000000000000095000000000000000000000000000000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r2, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x13, 0x541b, 0x6f2000, &(0x7f0000000180)) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r1, &(0x7f00000001c0)="81b4663bff7496dfb81d9f16d4416583f7505c96915ce8e29bd845ca8393732d3d0452b8ebbe316cb5c12e0b3be1e9f16887e46bf533d1d0d5a86c8100a76a42eef9531670dc52bd3f1c376e347b3d8ae8601b1da64e74a6a259a7a91353d4cf3c68bbb5b24855d037bb602812c31a8676cbef44d41420a58e0e29fdca46afbc"}, 0x10) 2018/04/18 07:41:17 executing program 5: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000004, 0x40000124}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x1, &(0x7f00000002c0)=ANY=[@ANYRES64=r0], &(0x7f0000f6bffb)='GPL\x00', 0x9, 0xfb, &(0x7f00001a7f05)=""/251, 0x0, 0x1}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000000)={r1, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0xb, 0x174e8b6d, 0xfffffffc, &(0x7f0000000180)) 2018/04/18 07:41:17 executing program 2: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004, 0x4000009d}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x59616d61, 0xffffffffffffffff, 0x1, &(0x7f0000000000)) socketpair$inet_icmp(0x59616d61, 0xffffffffffffffff, 0x1, &(0x7f0000000000)) 2018/04/18 07:41:17 executing program 1: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x100}, 0x2c) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x9) close(r0) gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={r2, 0x28, &(0x7f0000000740)}, 0x10) r3 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r4}, 0x10) 2018/04/18 07:41:17 executing program 7: perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x100}, 0x2c) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/18 07:41:17 executing program 6: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000f97ff8)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair(0x8, 0x5, 0x112, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000240)=0x4) sendmsg(r1, &(0x7f0000e64fc8)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)=[{0x18, 0x1, 0x1, '\x00'}], 0x18}, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000180)={0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) perf_event_open(&(0x7f00000000c0)={0x7, 0x70, 0x0, 0xaca, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x5, 0xfff, 0x0, 0x100, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x111267dc7c34bb8a}}, 0x0, 0x0, r0, 0x0) 2018/04/18 07:41:17 executing program 4: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x100}, 0x2c) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x9) close(r0) gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={r2, 0x28, &(0x7f0000000740)}, 0x10) perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r3}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r4}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/18 07:41:17 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040), 0x4) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x1) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, r0, 0x0) 2018/04/18 07:41:17 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x10ad}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xc, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x7, 0x1f, 0x1, 0x1, 0x1}], {0x95}}, &(0x7f0000000000)='syzkaller\x00', 0x5c6e, 0x362b, &(0x7f0000000000)=""/251}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x3, &(0x7f0000000140)=@framed={{0x18}, [], {0x95}}, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x97, &(0x7f0000000280)=""/151}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r1, 0x0, 0xe, 0x84, &(0x7f0000000340)="4e77582ae86bc806202d7ead41a4", &(0x7f0000000400)=""/132}, 0x28) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000380)={r0, &(0x7f00000004c0)="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", &(0x7f00000014c0)=""/229}, 0x18) socketpair$inet(0x2, 0x3, 0x10001, &(0x7f0000000100)) 2018/04/18 07:41:17 executing program 2: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004, 0x4000009d}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x59616d61, 0xffffffffffffffff, 0x1, &(0x7f0000000000)) socketpair$inet_icmp(0x59616d61, 0xffffffffffffffff, 0x1, &(0x7f0000000000)) 2018/04/18 07:41:17 executing program 1: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x100}, 0x2c) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x9) close(r0) gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={r2, 0x28, &(0x7f0000000740)}, 0x10) r3 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r4}, 0x10) 2018/04/18 07:41:17 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x7, 0x223}, 0xfffffffffffffec2) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='nfsd\x00', 0x100000c, &(0x7f0000000200)="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") socketpair(0x11, 0x7, 0xb16c, &(0x7f0000001200)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x76d6) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8dbccf7393e72be9cc66f"}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f0000000080)) 2018/04/18 07:41:17 executing program 2: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004, 0x4000009d}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x59616d61, 0xffffffffffffffff, 0x1, &(0x7f0000000000)) socketpair$inet_icmp(0x59616d61, 0xffffffffffffffff, 0x1, &(0x7f0000000000)) 2018/04/18 07:41:17 executing program 3: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x80000000004, 0x40000111}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', r0}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=ANY=[@ANYBLOB="18000000000000000000000000000000511000000000000000000000000000009500000000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x0, 0xffffffffffffff11, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000000)={r1, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x6f2000, 0x18, 0x1, &(0x7f0000000080)) 2018/04/18 07:41:17 executing program 5: r0 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet(0x2, 0x80005, 0x5, &(0x7f0000000440)={0xffffffffffffffff}) socketpair(0x5, 0x5, 0x3ff, &(0x7f0000000480)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f00000004c0)={r1, r2}) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004, 0x42}, 0x2c) socketpair(0x1a, 0x80004, 0x17, &(0x7f0000000000)) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=ANY=[@ANYBLOB="18000000000000008000000000000000711000000000000000000000000000009500000000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r3, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0xf, 0x400000, 0x3, &(0x7f0000000080)) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4), 0x2c) 2018/04/18 07:41:17 executing program 0: bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0x0, 0x3, 0x18}, 0xc) socketpair$inet6(0xa, 0x5, 0x2, &(0x7f0000000040)) socketpair(0x11, 0x0, 0x758, &(0x7f0000000200)) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000380)={0xffffffff, 0x33, 0x10}, 0xc) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000003c0)={r0, &(0x7f0000000300)="b82283392dc50ff1fb235a5849d2f5916ae2fdc24e95e12a0e03d461393e72be9cc66f0114472944cb9adce33bd2764dc266ff4bbf45116de2b3819aadfb0dd9874891964594b4914d60f0a5d0d5eb4eadbca6c55b8060b79dbc46a11494"}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r1, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x730000, 0x6f2000, 0x6f2001, &(0x7f0000000080)) 2018/04/18 07:41:17 executing program 6: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000f97ff8)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair(0x8, 0x5, 0x112, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000240)=0x4) sendmsg(r1, &(0x7f0000e64fc8)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)=[{0x18, 0x1, 0x1, '\x00'}], 0x18}, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000180)={0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) perf_event_open(&(0x7f00000000c0)={0x7, 0x70, 0x0, 0xaca, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x5, 0xfff, 0x0, 0x100, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x111267dc7c34bb8a}}, 0x0, 0x0, r0, 0x0) 2018/04/18 07:41:17 executing program 4: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x100}, 0x2c) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x9) close(r0) gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={r2, 0x28, &(0x7f0000000740)}, 0x10) perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r3}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r4}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/18 07:41:17 executing program 1: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x100}, 0x2c) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x9) close(r0) gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={r2, 0x28, &(0x7f0000000740)}, 0x10) r3 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r4}, 0x10) 2018/04/18 07:41:17 executing program 7: perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/18 07:41:17 executing program 2: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9c"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004, 0x4000009d}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x59616d61, 0xffffffffffffffff, 0x1, &(0x7f0000000000)) socketpair$inet_icmp(0x59616d61, 0xffffffffffffffff, 0x1, &(0x7f0000000000)) 2018/04/18 07:41:17 executing program 3: mkdir(&(0x7f00000002c0)='./file0/\x00', 0x100) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x34}, 0x16) mount(&(0x7f0000000180)='./file0/', &(0x7f00000001c0)='./file0/', &(0x7f0000000200)='proc\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0/', 0x0) 2018/04/18 07:41:17 executing program 6: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000f97ff8)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair(0x8, 0x5, 0x112, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000240)=0x4) sendmsg(r1, &(0x7f0000e64fc8)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)=[{0x18, 0x1, 0x1, '\x00'}], 0x18}, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000180)={0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) 2018/04/18 07:41:17 executing program 7: perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/18 07:41:17 executing program 4: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x100}, 0x2c) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x9) close(r0) gettid() socket$kcm(0x29, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x10) perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r1}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r2}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/18 07:41:17 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x12c}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={r1, 0x50, &(0x7f0000000200)}, 0x10) close(r1) socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f0000000080)={0xffffffffffffffff}) close(r2) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x541b, 0x2000930000) 2018/04/18 07:41:17 executing program 1: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x100}, 0x2c) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x9) close(r0) gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={r2, 0x28, &(0x7f0000000740)}, 0x10) r3 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00'}, 0x10) 2018/04/18 07:41:17 executing program 5: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000100)) mkdir(&(0x7f00000000c0)='//file1\x00', 0x0) mkdir(&(0x7f0000000080)='./file1\x00', 0x0) mount(&(0x7f0000000300)='./file1\x00', &(0x7f0000000340)='//file1\x00', &(0x7f0000000040)="bac01bfc8779c240a925370a0080000a000014c249b6ed6442", 0x0, 0x0) 2018/04/18 07:41:17 executing program 2: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9c"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004, 0x4000009d}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x59616d61, 0xffffffffffffffff, 0x1, &(0x7f0000000000)) socketpair$inet_icmp(0x59616d61, 0xffffffffffffffff, 0x1, &(0x7f0000000000)) 2018/04/18 07:41:17 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0xfd, 0x6, 0x2, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000001140)={r0, &(0x7f0000000040), &(0x7f0000000140)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000440)={r0, &(0x7f0000000100)='!', &(0x7f0000000200)=""/135}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000040)="a85e72edd0e058ca5fc208eaec0141d75f7687a4c967b761caca6ba8fd019acdb8bc39246aa8bada9043394a04c538cc31530386401330519085fec6d8c7fd3c4b823427284422631c3c37d707697073f6e99022aa872fadacaab4a0c616895aaf468a36a45e64b2fa1af7bcc72d130443b1fd9adaaeac423f697308560dd84dc71b9db3e21770374900b4f5c1b78fd69c2be447bab0781d839e92f4cf9a81b654b4f51446c91d1b3de193a6285d82e2316a6e", &(0x7f00000002c0)="95d752621aceff6b243f95bf2088e3321c4f504fa86226980dda63ec3bb96879dd1a8a57571cf740672b3bfc87ce5181fccc9175746ac07bc2e4f9d12edd48acfff2fd6a574994acd9a92a793066527ee392365d48935e73a04b88c269e67a73b65aefd7f337efe1c669f21acc5889cd9db3f2a2277b68e2a421889e7a43935705f841741150debf015650aae205fffc4c8e78e05f52c7625342c5e9107bd451c73b2516404d9ecaa24a79d017653e66feddb0776ece2c9efcce47ca5a6fe718cc7dee25c2752e8b623acb32b324b51844e76c9ff6e87fed38263b935c279635248700622a788eb6dd68dd738064d7e7e67875cc4a31419f"}, 0x20) 2018/04/18 07:41:18 executing program 7: mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/18 07:41:18 executing program 6: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000f97ff8)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair(0x8, 0x5, 0x112, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000240)=0x4) sendmsg(r1, &(0x7f0000e64fc8)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)=[{0x18, 0x1, 0x1, '\x00'}], 0x18}, 0x0) 2018/04/18 07:41:18 executing program 4: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x100}, 0x2c) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x9) close(r0) gettid() socket$kcm(0x29, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x10) perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r1}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r2}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/18 07:41:18 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000100)) mkdir(&(0x7f00000000c0)='//file1\x00', 0x0) mkdir(&(0x7f0000000080)='./file1\x00', 0x0) mount(&(0x7f0000000300)='./file1\x00', &(0x7f0000000340)='//file1\x00', &(0x7f0000000040)="bac01bfc8779c240a925370a0080000a000014c249b6ed6442", 0x0, 0x0) 2018/04/18 07:41:18 executing program 2: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9c"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004, 0x4000009d}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x59616d61, 0xffffffffffffffff, 0x1, &(0x7f0000000000)) socketpair$inet_icmp(0x59616d61, 0xffffffffffffffff, 0x1, &(0x7f0000000000)) 2018/04/18 07:41:18 executing program 1: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x100}, 0x2c) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x9) close(r0) gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={r2, 0x28, &(0x7f0000000740)}, 0x10) r3 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00'}, 0x10) 2018/04/18 07:41:18 executing program 7: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/18 07:41:18 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x28}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000001500)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x100) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000000)="6c6f00966fd651b159a9c84a2c60d298ed236687") 2018/04/18 07:41:18 executing program 5: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000100)) mkdir(&(0x7f00000000c0)='//file1\x00', 0x0) mkdir(&(0x7f0000000080)='./file1\x00', 0x0) mount(&(0x7f0000000300)='./file1\x00', &(0x7f0000000340)='//file1\x00', &(0x7f0000000040)="bac01bfc8779c240a925370a0080000a000014c249b6ed6442", 0x0, 0x0) 2018/04/18 07:41:18 executing program 6: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000f97ff8)) socketpair(0x8, 0x5, 0x112, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000240)=0x4) 2018/04/18 07:41:18 executing program 4: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x100}, 0x2c) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x9) close(r0) gettid() socket$kcm(0x29, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x10) perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r1}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r2}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) [ 185.870597] device lo entered promiscuous mode 2018/04/18 07:41:18 executing program 7: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x0, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/18 07:41:18 executing program 2: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc6"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004, 0x4000009d}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x59616d61, 0xffffffffffffffff, 0x1, &(0x7f0000000000)) socketpair$inet_icmp(0x59616d61, 0xffffffffffffffff, 0x1, &(0x7f0000000000)) 2018/04/18 07:41:18 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000f97ff8)) socketpair(0x8, 0x5, 0x112, &(0x7f00000001c0)) 2018/04/18 07:41:18 executing program 5: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000100)) mkdir(&(0x7f00000000c0)='//file1\x00', 0x0) mkdir(&(0x7f0000000080)='./file1\x00', 0x0) mount(&(0x7f0000000300)='./file1\x00', &(0x7f0000000340)='//file1\x00', &(0x7f0000000040)="bac01bfc8779c240a925370a0080000a000014c249b6ed6442", 0x0, 0x0) 2018/04/18 07:41:18 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000100)) mkdir(&(0x7f00000000c0)='//file1\x00', 0x0) mkdir(&(0x7f0000000080)='./file1\x00', 0x0) mount(&(0x7f0000000300)='./file1\x00', &(0x7f0000000340)='//file1\x00', &(0x7f0000000040)="bac01bfc8779c240a925370a0080000a000014c249b6ed6442", 0x0, 0x0) 2018/04/18 07:41:18 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0xfffffffffffffff4) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0xa}, 0x24) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r1, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x20000000, 0x20000002, 0x1, &(0x7f0000000000)) close(r0) socket$kcm(0xa, 0x1, 0x0) setsockopt$sock_attach_bpf(r0, 0x6, 0x1b, &(0x7f0000000180), 0x127) 2018/04/18 07:41:18 executing program 1: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x100}, 0x2c) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x9) close(r0) gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={r2, 0x28, &(0x7f0000000740)}, 0x10) r3 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00'}, 0x10) 2018/04/18 07:41:18 executing program 4: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x100}, 0x2c) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x9) close(r0) gettid() r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={r2, 0x28, &(0x7f0000000740)}, 0x10) perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r3}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r4}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/18 07:41:18 executing program 7: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x0, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/18 07:41:18 executing program 2: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc6"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004, 0x4000009d}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x59616d61, 0xffffffffffffffff, 0x1, &(0x7f0000000000)) socketpair$inet_icmp(0x59616d61, 0xffffffffffffffff, 0x1, &(0x7f0000000000)) 2018/04/18 07:41:18 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8, 0x5, 0x112, &(0x7f00000001c0)) 2018/04/18 07:41:18 executing program 5: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000100)) mkdir(&(0x7f00000000c0)='//file1\x00', 0x0) mkdir(&(0x7f0000000080)='./file1\x00', 0x0) mount(&(0x7f0000000300)='./file1\x00', &(0x7f0000000340)='//file1\x00', &(0x7f0000000040)="bac01bfc8779c240a925370a0080000a000014c249b6ed6442", 0x0, 0x0) 2018/04/18 07:41:18 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000100)) mkdir(&(0x7f00000000c0)='//file1\x00', 0x0) mkdir(&(0x7f0000000080)='./file1\x00', 0x0) mount(&(0x7f0000000300)='./file1\x00', &(0x7f0000000340)='//file1\x00', &(0x7f0000000040)="bac01bfc8779c240a925370a0080000a000014c249b6ed6442", 0x0, 0x0) 2018/04/18 07:41:18 executing program 3: r0 = perf_event_open(&(0x7f0000000300)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xffffffffffffff00, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = getpid() perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0xffff, 0x5b800000000, 0x101, 0x1, 0x0, 0x5, 0xb50, 0xe, 0x0, 0x2, 0x3, 0xfffffffffffffffc, 0x5d, 0x80000000, 0x5, 0x8, 0x8, 0x1, 0xbb, 0x7fff, 0x1133, 0x6, 0x100000001, 0xb6, 0x5, 0x6, 0x0, 0x4, 0x8, 0x5, 0xb1, 0x4, 0x42, 0xfffffffffffffff8, 0x3, 0x0, 0x0, 0x1, 0x1, @perf_config_ext={0x0, 0x100000000}, 0x400, 0x6, 0x1ff, 0x7, 0x1ff, 0x8, 0xfffffffffffffff7}, r1, 0xd, r0, 0x1) 2018/04/18 07:41:18 executing program 4: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x100}, 0x2c) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x9) close(r0) socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={r2, 0x28, &(0x7f0000000740)}, 0x10) perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r3}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r4}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/18 07:41:18 executing program 1: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x100}, 0x2c) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x9) close(r0) gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={r2, 0x28, &(0x7f0000000740)}, 0x10) r3 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000440)=0x5bc6) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r4}, 0x10) 2018/04/18 07:41:18 executing program 7: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x0, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/18 07:41:18 executing program 3: socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f00000000c0)) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="1802000000ffffff000000004010000085000000360000ab7d833400000000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x1, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x12, &(0x7f0000000400)="222fea09601182605aecc6378847", &(0x7f00000003c0)=""/18}, 0x28) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000080)) 2018/04/18 07:41:18 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8, 0x5, 0x112, &(0x7f00000001c0)) 2018/04/18 07:41:18 executing program 2: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc6"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004, 0x4000009d}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x59616d61, 0xffffffffffffffff, 0x1, &(0x7f0000000000)) socketpair$inet_icmp(0x59616d61, 0xffffffffffffffff, 0x1, &(0x7f0000000000)) 2018/04/18 07:41:18 executing program 5: mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) mkdir(&(0x7f0000000000)='./file1\x00', 0x0) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000811ffa)='bdev\x00', 0x0, &(0x7f0000444000)) mount(&(0x7f00002b9ff8)='./file0\x00', &(0x7f0000cbeff8)='./file0\x00', &(0x7f00005f7ffa)='ramfs\x00', 0x0, &(0x7f0000000100)) mount(&(0x7f0000000040)='.', &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)='binfmt_misc\x00', 0x0, &(0x7f0000000100)) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6(0xa, 0x80800, 0x7992676d, &(0x7f0000000040)) perf_event_open(&(0x7f0000940000)={0x2, 0x78, 0xd68, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='rootfs\x00', 0x1000, &(0x7f00000002c0)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000500)='nsfs\x00', 0x20, &(0x7f00000004c0)) socketpair(0x0, 0x0, 0x1, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000380)={&(0x7f0000001840)='./file1\x00'}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000004c0)={r2, 0x0, 0x73, 0x5c, &(0x7f0000000540)="cb40a10eceab2673b1b10d32d602b6ac99ba57e642e7a39d975d5c600ef96b6e08944aa442042b81748d5db438c5dd2ccc931b2ec8c73dabe7c57247e3af08bb6918a53833a062c8edf39a8ceab36f5f7fa05695dbca78013b888f942ce32ebeee45b45a6e2928a7339dc857541e75c261f6d8", &(0x7f0000000600)=""/92, 0x7, 0x5}, 0x28) mount(&(0x7f0000000800)='./file1\x00', &(0x7f0000000840)='./file0\x00', &(0x7f0000000880)='overlay\x00', 0x10000, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000680)={r1, 0x50, &(0x7f00000003c0)}, 0x10) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000480), 0x4) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) mount(&(0x7f0000000140)='./file1\x00', &(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)='xfs\x00', 0x220004a, &(0x7f00000002c0)="93cdd250f3245eb3353ca2d4abefe0db64b49641f396ea3563c4737336b1cd1c16ca6a4871828e1c6cb804b15664d769f0d01cf492333fa6ce0bb5abdaeef401de3c0c8239b5135612d2a21c27832a54cd4f4373c32da205c3e1a9460d3c7ebc3750db872bca9c584abda344c9d09fe3af550453283729f6744e420272cbbae11c1c417c1115a296ced13e7479da37430e169ea770c7a47af3d8c55da50b7f4ea1917b67b1d201d2a469ec4f4555faea") ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f00000000c0)) mkdir(&(0x7f0000000080)='./file0\x00', 0x201000000004) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100)={0x0, 0x3, 0x8}, 0xc) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r4, 0x28, &(0x7f00000001c0)={0x0, 0x0}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r3, 0x50, &(0x7f0000000940)}, 0x7) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000240)={r5, 0x200, 0x8}, 0xc) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0xc, &(0x7f0000000140)}, 0x10) mount(&(0x7f00000005c0)='.', &(0x7f0000000780)='.', &(0x7f00000007c0)='fusectl\x00', 0x2000000, &(0x7f00000008c0)="b460702c483e13e722d3928c60589d4dbd93d2e709871b00572e48092c480f3ab6cd099b1e4aec331ec53a8e6732d7de12932a39de481b814bdbc0b0f12aa82fe015573b1fdcb156a6fb6e4915adff821ac766764024da2a95fe1b844ee082") socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000000)) mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x0, &(0x7f00000e7000)) 2018/04/18 07:41:18 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000100)) mkdir(&(0x7f00000000c0)='//file1\x00', 0x0) mkdir(&(0x7f0000000080)='./file1\x00', 0x0) 2018/04/18 07:41:18 executing program 1: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x100}, 0x2c) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x9) close(r0) gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={r2, 0x28, &(0x7f0000000740)}, 0x10) r3 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000440)=0x5bc6) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r4}, 0x10) 2018/04/18 07:41:18 executing program 4: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x100}, 0x2c) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x9) gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={r2, 0x28, &(0x7f0000000740)}, 0x10) perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r3}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r4}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/18 07:41:19 executing program 2: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x0, 0x4000009d}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x59616d61, 0xffffffffffffffff, 0x1, &(0x7f0000000000)) socketpair$inet_icmp(0x59616d61, 0xffffffffffffffff, 0x1, &(0x7f0000000000)) 2018/04/18 07:41:19 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) socket$kcm(0xa, 0xffffffffffffffff, 0x0) recvmsg$kcm(r1, &(0x7f0000003600)={0x0, 0x0, &(0x7f0000003480)=[{&(0x7f0000000180)=""/102, 0x66}, {&(0x7f0000000200)=""/33, 0x21}, {&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/4096, 0x1000}, {&(0x7f0000002280)=""/224, 0xe0}, {&(0x7f0000002380)=""/4096, 0x1000}, {&(0x7f0000003380)=""/202, 0x495}], 0x7, &(0x7f0000003500)=""/214, 0xd6, 0x6}, 0x40000120) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0xffff) setsockopt$sock_attach_bpf(r1, 0x1, 0x7, &(0x7f0000000240), 0x1e3) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={r0, 0x49, &(0x7f0000003740)={0x0, 0x0}}, 0xfffffffffffffe02) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f00000000c0)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000003640)=r2, 0xffffffffffffffec) [ 186.693352] EXT4-fs (sda1): re-mounted. Opts: [ 186.795835] overlayfs: missing 'lowerdir' [ 186.863307] overlayfs: missing 'lowerdir' 2018/04/18 07:41:20 executing program 7: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x0, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/18 07:41:20 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8, 0x5, 0x112, &(0x7f00000001c0)) 2018/04/18 07:41:20 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000100)) mkdir(&(0x7f00000000c0)='//file1\x00', 0x0) 2018/04/18 07:41:20 executing program 4: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x100}, 0x2c) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) close(r0) gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={r2, 0x28, &(0x7f0000000740)}, 0x10) perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r3}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r4}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/18 07:41:20 executing program 2: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x0, 0x4000009d}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x59616d61, 0xffffffffffffffff, 0x1, &(0x7f0000000000)) socketpair$inet_icmp(0x59616d61, 0xffffffffffffffff, 0x1, &(0x7f0000000000)) 2018/04/18 07:41:20 executing program 1: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x100}, 0x2c) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x9) close(r0) gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={r2, 0x28, &(0x7f0000000740)}, 0x10) r3 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000440)=0x5bc6) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r4}, 0x10) 2018/04/18 07:41:20 executing program 3: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=ANY=[@ANYBLOB="18000000000000000000000000000000711000000000000000000001000000009500000000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={r0, &(0x7f00000001c0)="87f08a98640421c34c61136d4eabeca369edc50fd1c7aaa48e632c14095447ba441eb32ec7ef595eaf341ca7e439190a578e182cf9b6eaf098e2376bb587edb20378fa195dcb1f0b534905f16dc946cdc827a45e86ed8ba80efd586e04be8765689e9d28022a2d97c77e075ab65301e4fa133ab8e619e4362bc4db2695770144195a101c73d3bb8185507fa9b165bd0ec4dad89dec8f79325ae7266de443edaab9d9c1beac75e2aebc2fb661f47a5d08290534c96733f3c13b5eb009266238d9c93d145c3e", &(0x7f00000002c0)=""/93}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r1, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x13, 0x7fffffffefff, 0xfffffffe, &(0x7f0000000180)) 2018/04/18 07:41:20 executing program 5: socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000040)) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000100)='cpu&+5\x00') socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000000)) 2018/04/18 07:41:20 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000100)) mkdir(&(0x7f00000000c0)='//file1\x00', 0x0) 2018/04/18 07:41:20 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x78, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000001c0)="4c74093f1d849520abc47aa6caa468ea965f9fe126b160b756cc63a15949c1d1032f956071a2b1656433e86759cdfdcdd63f0a4ba1969c0464951fcdc362fcc4f12c8b9bd69c1a504179a39bfc706f28a19bd49e1abe577d75e9f52721e37a7d97aa4a2913b21058a504ee5cd2ffe4b5f31b5b5ce8234ef68a396c731698af571c3635b2135b16d0468021c8a809d5ecb51ff0ab0841ca5a5a1f8b96cf") 2018/04/18 07:41:20 executing program 2: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x0, 0x4000009d}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x59616d61, 0xffffffffffffffff, 0x1, &(0x7f0000000000)) socketpair$inet_icmp(0x59616d61, 0xffffffffffffffff, 0x1, &(0x7f0000000000)) 2018/04/18 07:41:20 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000f97ff8)) socketpair(0x8, 0x5, 0x112, &(0x7f00000001c0)) 2018/04/18 07:41:20 executing program 7: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x0, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/18 07:41:20 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)) r0 = socket$kcm(0xa, 0x20008000000005, 0x0) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000040)) sendmsg(r0, &(0x7f0000001600)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14}}}, 0x80, &(0x7f0000000640)=[{&(0x7f0000000000)="f0", 0x1}], 0x1, &(0x7f0000000b80)=ANY=[], 0x0, 0x10}, 0x4040041) 2018/04/18 07:41:20 executing program 4: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x100}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x9) close(r0) gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={r2, 0x28, &(0x7f0000000740)}, 0x10) perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r3}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r4}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/18 07:41:20 executing program 1: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x100}, 0x2c) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x9) close(r0) gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={r2, 0x28, &(0x7f0000000740)}, 0x10) perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r3}, 0x10) 2018/04/18 07:41:20 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000f97ff8)) socketpair(0x8, 0x5, 0x112, &(0x7f00000001c0)) 2018/04/18 07:41:20 executing program 5: r0 = socket$kcm(0xa, 0x3, 0x11) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000040)) sendmsg(r0, &(0x7f0000001ec0)={&(0x7f00000018c0)=@nl=@unspec, 0x80, &(0x7f0000001dc0), 0x0, &(0x7f0000001e40)=[{0x10, 0x29}], 0x10}, 0x0) socketpair(0x5, 0x7, 0x5, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x2) 2018/04/18 07:41:20 executing program 7: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x0, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/18 07:41:20 executing program 2: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x59616d61, 0xffffffffffffffff, 0x1, &(0x7f0000000000)) socketpair$inet_icmp(0x59616d61, 0xffffffffffffffff, 0x1, &(0x7f0000000000)) 2018/04/18 07:41:20 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000100)) 2018/04/18 07:41:20 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000f97ff8)) socketpair(0x8, 0x5, 0x112, &(0x7f00000001c0)) 2018/04/18 07:41:20 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000f97ff8)) socketpair(0x8, 0x5, 0x112, &(0x7f00000001c0)) 2018/04/18 07:41:20 executing program 7: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x0, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/18 07:41:20 executing program 5: socketpair(0x0, 0x7, 0x3, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) r1 = socket$kcm(0xa, 0x400000000000003, 0x11) sendmsg$kcm(r1, &(0x7f0000003880)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x2, [], 0x1}, 0x3f000000}, 0x80, &(0x7f0000000080)}, 0x0) socketpair$inet(0x2, 0x805, 0x401, &(0x7f0000000080)) 2018/04/18 07:41:20 executing program 2: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x59616d61, 0xffffffffffffffff, 0x1, &(0x7f0000000000)) socketpair$inet_icmp(0x59616d61, 0xffffffffffffffff, 0x1, &(0x7f0000000000)) 2018/04/18 07:41:20 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000100)) 2018/04/18 07:41:20 executing program 4: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x9) close(r0) gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={r2, 0x28, &(0x7f0000000740)}, 0x10) perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r3}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r4}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/18 07:41:20 executing program 1: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x100}, 0x2c) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x9) close(r0) gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={r2, 0x28, &(0x7f0000000740)}, 0x10) perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r3}, 0x10) 2018/04/18 07:41:20 executing program 6: perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000f97ff8)) socketpair(0x8, 0x5, 0x112, &(0x7f00000001c0)) 2018/04/18 07:41:20 executing program 3: r0 = socket$kcm(0x2, 0xa, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x107d}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x7, 0x1f, 0x1, 0x1, 0x1}], {0x95}}, &(0x7f0000000000)='syzkaller\x00', 0x5c6c, 0x453, &(0x7f00001a7f05)=""/251, 0x41f00}, 0xffffffffffffffd7) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8906, &(0x7f0000000000)='em1:\x00') close(r0) 2018/04/18 07:41:20 executing program 7: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x0, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/18 07:41:20 executing program 2: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x59616d61, 0xffffffffffffffff, 0x1, &(0x7f0000000000)) socketpair$inet_icmp(0x59616d61, 0xffffffffffffffff, 0x1, &(0x7f0000000000)) 2018/04/18 07:41:20 executing program 0: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000100)) 2018/04/18 07:41:20 executing program 6: perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000f97ff8)) socketpair(0x8, 0x5, 0x112, &(0x7f00000001c0)) 2018/04/18 07:41:20 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xb6cb}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f00000001c0)=ANY=[@ANYBLOB="010000ae4e97a12f015dfca9fe3993000000000000000000"]) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0xffffffff, 0x8, 0x8}, 0xc) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000000c0)={r1, &(0x7f0000000080)="33f16cd91dea3b5cf08c2c3d818706628445f6"}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00', 0x0, 0x18}, 0x10) 2018/04/18 07:41:20 executing program 1: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x100}, 0x2c) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x9) close(r0) gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={r2, 0x28, &(0x7f0000000740)}, 0x10) perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r3}, 0x10) 2018/04/18 07:41:20 executing program 4: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x9) close(r0) gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={r2, 0x28, &(0x7f0000000740)}, 0x10) perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r3}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r4}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/18 07:41:20 executing program 0: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000100)) 2018/04/18 07:41:21 executing program 6: perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000f97ff8)) socketpair(0x8, 0x5, 0x112, &(0x7f00000001c0)) 2018/04/18 07:41:21 executing program 7: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x0, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/18 07:41:21 executing program 3: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x280000000000004, 0x13}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x2, 0x705000, 0x1, &(0x7f0000000000)) socket$kcm(0x29, 0x7, 0x0) 2018/04/18 07:41:21 executing program 2: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004, 0x4000009d}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x0, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x59616d61, 0xffffffffffffffff, 0x1, &(0x7f0000000000)) socketpair$inet_icmp(0x59616d61, 0xffffffffffffffff, 0x1, &(0x7f0000000000)) 2018/04/18 07:41:21 executing program 4: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x9) close(r0) gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={r2, 0x28, &(0x7f0000000740)}, 0x10) perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r3}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r4}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/18 07:41:21 executing program 0: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000100)) 2018/04/18 07:41:21 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0x0, 0x0}) socket$kcm(0x29, 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) socket$kcm(0xa, 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x21e}, 0x35e) socketpair(0xa, 0x3, 0x800000000000000, &(0x7f0000000000)={0xffffffffffffffff}) socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f00000001c0)) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000080)=r1, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000000200)=ANY=[@ANYBLOB="000000000000711000000000000000000005d7000000950700000000000000000000000000000000b319329061a8b45962c867d968ec4e45c4ec3e59c87d8f17710e74375ad6131c76ef3bb172d70cff14df7c"], &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251, 0xfffffffffffffffc}, 0xffffffffffffffe7) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r2, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x16, 0x88, 0x30, &(0x7f0000000180)) 2018/04/18 07:41:21 executing program 1: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x100}, 0x2c) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x9) close(r0) gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={r2, 0x28, &(0x7f0000000740)}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r3}, 0x10) 2018/04/18 07:41:21 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000003000)={0x0, 0x1ffffffffffffe3d, &(0x7f0000000040)=ANY=[@ANYBLOB="1800e7c7de92f4875f190000000000000000000000000000b33a39a329288226adbd7a859bb6ca7d14fb9bd4a45048a2b55829f8ecb5737ffda69df8dec7c4bbc120f9d7f7a7480c7f62920cafef679c6c0e5597a8de9eab229ff9877ddfd368e11e82983245fee50f42750c43d66b9277e3db96f150a9c128de9e2413e6633be99892d21c64769364076c533a4f4b38f017b2b8f6a810e04e3e"], &(0x7f0000008000)='syzkaller\x00', 0x25, 0x7f, &(0x7f0000008000)=""/127}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000001fb8)={0x1, 0x5, &(0x7f0000003000)=@raw=[@call={0x85, 0x0, 0x0, 0x32}, @generic={0xfffffffffffff61e, 0x207, 0x407c, 0x1}], &(0x7f0000002ff6)='syzkaller\x00', 0x7e0, 0xe7, &(0x7f0000002f19)=""/231, 0x0, 0x1}, 0xfffffffffffffe72) socketpair(0x9, 0xa, 0x80000001, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) 2018/04/18 07:41:21 executing program 2: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004, 0x4000009d}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x0, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x59616d61, 0xffffffffffffffff, 0x1, &(0x7f0000000000)) socketpair$inet_icmp(0x59616d61, 0xffffffffffffffff, 0x1, &(0x7f0000000000)) 2018/04/18 07:41:21 executing program 7: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x0, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/18 07:41:21 executing program 4: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x9) close(r0) gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={r2, 0x28, &(0x7f0000000740)}, 0x10) perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r3}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r4}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/18 07:41:21 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000f97ff8)) socketpair(0x8, 0x5, 0x112, &(0x7f00000001c0)) 2018/04/18 07:41:21 executing program 7: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x0, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/18 07:41:21 executing program 2: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004, 0x4000009d}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x0, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x59616d61, 0xffffffffffffffff, 0x1, &(0x7f0000000000)) socketpair$inet_icmp(0x59616d61, 0xffffffffffffffff, 0x1, &(0x7f0000000000)) 2018/04/18 07:41:21 executing program 0: perf_event_open(&(0x7f0000348f88)={0x0, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000100)) 2018/04/18 07:41:21 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000f97ff8)) socketpair(0x8, 0x5, 0x112, &(0x7f00000001c0)) 2018/04/18 07:41:21 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000040)={0x4, 0x0, [0x0, 0x0, 0x0, 0x0]}) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0)=0xffffffff, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x7, 0xd, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, [@generic={0x7, 0x7, 0xf9, 0x7ff}, @generic={0x0, 0x34, 0x1ff, 0xf780}, @jmp={0x5, 0x63ae, 0xa, 0x9, 0xb, 0xfffffff4, 0xfffffffffffffffc}, @ldst={0x3, 0x3, 0x2, 0x8, 0x0, 0x18, 0xffffffffffffffff}, @initr0={0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x7e1e}], {0x95}}, &(0x7f0000000100)='syzkaller\x00', 0x9, 0x98, &(0x7f0000000140)=""/152, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000380)={&(0x7f0000000340)='./file0\x00', r2}, 0x10) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000280)={0x0, r3, 0x0, 0x3}, 0x14) 2018/04/18 07:41:21 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x9) close(0xffffffffffffffff) gettid() socket$kcm(0x29, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r0, 0x9}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={r1, 0x28, &(0x7f0000000740)}, 0x10) perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r2}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r3}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/18 07:41:21 executing program 1: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x100}, 0x2c) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x9) close(r0) gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r2}, 0x10) 2018/04/18 07:41:21 executing program 2: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004, 0x4000009d}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=@framed={{0x18}, [], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x59616d61, 0xffffffffffffffff, 0x1, &(0x7f0000000000)) socketpair$inet_icmp(0x59616d61, 0xffffffffffffffff, 0x1, &(0x7f0000000000)) 2018/04/18 07:41:21 executing program 7: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x0, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/18 07:41:21 executing program 0: perf_event_open(&(0x7f0000348f88)={0x0, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000100)) 2018/04/18 07:41:21 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x48}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f00000001c0)='GPL\x00', 0x0, 0xffffffffffffff89, &(0x7f00001a7f05)=""/251}, 0x48) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x2, 0x409, 0x7fffffffefff, &(0x7f0000000000)) 2018/04/18 07:41:21 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000f97ff8)) socketpair(0x8, 0x5, 0x112, &(0x7f00000001c0)) 2018/04/18 07:41:21 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x9) close(0xffffffffffffffff) gettid() socket$kcm(0x29, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r0, 0x9}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={r1, 0x28, &(0x7f0000000740)}, 0x10) perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r2}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r3}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/18 07:41:21 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000180)={r0, &(0x7f00000003c0)="031f821686a8f525d1819bd8e0e369902aa427", &(0x7f00000002c0)=""/190}, 0x18) close(r1) r2 = socket$kcm(0xa, 0x7, 0x0) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r1, 0x2401, 0x3) setsockopt$sock_attach_bpf(r1, 0x6, 0x5, &(0x7f0000000140)=r0, 0x4) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000000)) 2018/04/18 07:41:21 executing program 7: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/18 07:41:21 executing program 1: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x100}, 0x2c) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x9) close(r0) gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r2}, 0x10) 2018/04/18 07:41:21 executing program 2: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004, 0x4000009d}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=@framed={{0x18}, [], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x59616d61, 0xffffffffffffffff, 0x1, &(0x7f0000000000)) socketpair$inet_icmp(0x59616d61, 0xffffffffffffffff, 0x1, &(0x7f0000000000)) 2018/04/18 07:41:21 executing program 0: perf_event_open(&(0x7f0000348f88)={0x0, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000100)) 2018/04/18 07:41:21 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000f97ff8)) socketpair(0x8, 0x5, 0x112, &(0x7f00000001c0)) 2018/04/18 07:41:21 executing program 5: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0xa}, 0x24) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000711000000000000000000000000040009500000000000000136b8213fcb90f6158972b903d8473f4e10315cb42c77d80427d4336c5b9fa0db0424f64bc4ee884a6f9f86b1adb12854835da609ef595cbed151cce7384516d694a4e2dfe989c7bf387fa8def8509ddbda04ed7b4956bcc3ceb6cb57e945ac49381cfe204252b33033c7a97f841"], &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r1, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x20000000, 0x20000002, 0x1, &(0x7f0000000000)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000080)=r0, 0x4) close(r0) socket$kcm(0xa, 0x1, 0x0) 2018/04/18 07:41:21 executing program 2: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004, 0x4000009d}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=@framed={{0x18}, [], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x59616d61, 0xffffffffffffffff, 0x1, &(0x7f0000000000)) socketpair$inet_icmp(0x59616d61, 0xffffffffffffffff, 0x1, &(0x7f0000000000)) 2018/04/18 07:41:21 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) close(0xffffffffffffffff) gettid() socket$kcm(0x29, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r0, 0x9}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={r1, 0x28, &(0x7f0000000740)}, 0x10) perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r2}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r3}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/18 07:41:21 executing program 7: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/18 07:41:21 executing program 1: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x100}, 0x2c) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x9) close(r0) gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r2}, 0x10) 2018/04/18 07:41:21 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0xa, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="850000000800001045000000800000009500000000000000"], &(0x7f0000000000)='@pH \x00', 0x10000002, 0x35b, &(0x7f0000000000)=""/153}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x3, 0x5, &(0x7f0000000100)=@framed={{0x18}, [@call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f000000c8c0)='syzkaller\x00', 0xd1b, 0x4b4, &(0x7f00000001c0)=""/228}, 0x48) r2 = perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x4, 0x1, 0xe1, 0x0, 0xfffffffffffffffe, 0x10000, 0x8, 0x9, 0x3, 0x5, 0xffffffffffff598b, 0x7, 0x9, 0x1, 0x3, 0x7, 0x1, 0x7, 0x101, 0x10001, 0x3, 0x2, 0x3, 0x4c00, 0x0, 0x4, 0xaf4d, 0x29, 0x5, 0x80000000, 0x31, 0x5, 0x3ff, 0x73b, 0x7ff, 0x0, 0x9, 0x2, @perf_bp={&(0x7f00000002c0), 0xe}, 0x220c, 0x1716, 0x10001, 0x6, 0x400, 0xff, 0x60a}, 0x0, 0x5, r1, 0x8) r3 = getpid() perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x100, 0x444, 0x1, 0x9, 0x0, 0x8, 0x10210, 0xb, 0x6, 0x9c, 0x40, 0x4, 0x7, 0x1ff, 0x7faf, 0x2, 0x4, 0x4, 0x1ff, 0x3, 0xc000000000000000, 0x2b9, 0x3, 0x366cafeb, 0x1ff, 0x2, 0x401, 0x1f, 0x8c9, 0x9, 0x4, 0x9, 0xf5, 0x4, 0x1ff, 0x7fffffff, 0x0, 0x1000, 0x2, @perf_config_ext={0x4, 0x5}, 0x2, 0x40, 0x0, 0x3, 0x1000, 0x5, 0x9}, r3, 0x2, r2, 0x2) r4 = perf_event_open(&(0x7f0000000400)={0x2, 0x70, 0x4, 0x24000, 0x4, 0x0, 0x0, 0x40, 0x40000, 0xd, 0x10000, 0x40, 0xffff, 0x2, 0x800, 0xa21, 0x8001, 0x0, 0x5, 0x5, 0x5, 0x7fff, 0x0, 0x8, 0xfffffffffffffff8, 0x2d9a00000, 0x7fff, 0x2, 0x5, 0x10000, 0x7ff, 0x4, 0x2, 0x7, 0xffffffffffffff19, 0x6, 0x8001, 0x2, 0x0, 0x4, 0x6, @perf_config_ext={0x6, 0x3}, 0x88, 0x401, 0x1, 0x0, 0x4, 0x1f, 0x34}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0xb) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r4) r5 = perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0xc2d, 0x4, 0xed1a, 0x7f, 0x0, 0x400, 0x10, 0x1, 0x57, 0x100000000, 0xfffffffffffff952, 0x7e4a, 0xe611, 0x96c2, 0x6, 0x5, 0x1, 0x7, 0x4, 0x1, 0x800, 0xffffffffffffff80, 0x80, 0x40, 0x1800000, 0x20, 0x0, 0x8, 0x100000000, 0xfffffffffffff801, 0xfff, 0xcad, 0x8000, 0x8000, 0x8, 0x2, 0x0, 0x6e1e, 0x4, @perf_config_ext={0x9e, 0x5}, 0x8000, 0xb0c, 0x140000, 0x7, 0x9, 0x3, 0x7}, 0xffffffffffffffff, 0x10, 0xffffffffffffff9c, 0x1) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, r0) 2018/04/18 07:41:22 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000100)) 2018/04/18 07:41:22 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000f97ff8)) socketpair(0x8, 0x5, 0x112, &(0x7f00000001c0)) 2018/04/18 07:41:22 executing program 2: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004, 0x4000009d}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x0, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x59616d61, 0xffffffffffffffff, 0x1, &(0x7f0000000000)) socketpair$inet_icmp(0x59616d61, 0xffffffffffffffff, 0x1, &(0x7f0000000000)) 2018/04/18 07:41:22 executing program 7: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/18 07:41:22 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)) socketpair$unix(0x1, 0x80000000005, 0x0, &(0x7f0000000040)={0x0, 0x0}) perf_event_open(&(0x7f000025c000)={0x2, 0xffffffffffffff4b, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8946, &(0x7f0000000100)="6c6f00966fd651b159a9c84a2c60d29800000020") 2018/04/18 07:41:22 executing program 3: r0 = socket$kcm(0x2, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000780)="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", 0x1000}, {&(0x7f00000000c0)="5d9b17a15bfb3a65b38f6690962fd1c266a8f3b1563b3ae4783e79dd30e023096a654b7af5d7d90a503889ea042f9737bf206f3de9a705107c3434a3ae657feeaaf32021baae92db3c7bdd86147a6075d7745afe1758b6ce933c9e5a535b17184326a4cd8d9ffea6ca38d31b4113d0c92659e1c14796d2b359813bfc31ca8d10506507066764264ab46d3d5d504cec3339f9244bd4c848894727dd2015adfa2feec12d36a8db82dd02778b47490768b61cfe18f80d4caa89f201f1e682a1c4a23a0bd9a3723a4906a43e513444fffd50bd62f6", 0xd3}], 0x2, &(0x7f0000000200)=[{0x80, 0x102, 0x9a, "84a877df218a3719e9002aec84b86c5550e898b84d05e739e43d1e1c8c4145f11948f88ddae3d163bc7803e056a46285a6ac39683d0125df36b490162cfb12db6391b12fd024763736b428ff012f7237836fea194453de132b5034f9701dbe0339d8c1d486116617e205"}], 0x80, 0x8000}, 0x4000081) sendmsg$kcm(r0, &(0x7f0000000740)={&(0x7f0000000000)=@in={0x2, 0x4e23, @multicast2=0xe0000002}, 0x80, &(0x7f0000000200), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="300000000000000000000000070000008921eeb35cd8bd7fcc0c1b988e1c9d86c39351f17f9b04b22b00000000000000"], 0x30}, 0x0) 2018/04/18 07:41:22 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000100)) 2018/04/18 07:41:22 executing program 1: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x100}, 0x2c) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x9) close(r0) gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={r2, 0x28, &(0x7f0000000740)}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r3}, 0x10) 2018/04/18 07:41:22 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) close(0xffffffffffffffff) gettid() socket$kcm(0x29, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r0, 0x9}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={r1, 0x28, &(0x7f0000000740)}, 0x10) perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r2}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r3}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/18 07:41:22 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000f97ff8)) socketpair(0x8, 0x5, 0x112, &(0x7f00000001c0)) 2018/04/18 07:41:22 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000100)) 2018/04/18 07:41:22 executing program 2: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004, 0x4000009d}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x0, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x59616d61, 0xffffffffffffffff, 0x1, &(0x7f0000000000)) socketpair$inet_icmp(0x59616d61, 0xffffffffffffffff, 0x1, &(0x7f0000000000)) 2018/04/18 07:41:22 executing program 7: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00'}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/18 07:41:22 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) close(0xffffffffffffffff) gettid() socket$kcm(0x29, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r0, 0x9}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={r1, 0x28, &(0x7f0000000740)}, 0x10) perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r2}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r3}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/18 07:41:22 executing program 3: r0 = socket$kcm(0x2, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000780)="99d38a0b68aa6d664d9493e2027609372da970b4983295a9ec50ba7e3ecd705b8f7df685761cd27082fbcb623906c616766819124e74deec11cb89aff3f6af300befba7a74b197fa86a3fe2ce66b92c16fcbe5977fb17db043078350b33ea1175b332c425a6127d645c7f6c992a9519846481d6726c91d0269a7ec2e4fc4bf00817a4ee8cb9cbd0fc9873581ec22801b5d2e97287e240e0702269a5f58e99d7d5a09ce457012c769fd9ee0c095eb95db5766c78ee276e11623d339ff5f7363af17658bb810d10b3fe1146dd4272844a1a9f2fd16bf43f53244f18d111f2651246094d8e9d4b9777c6d0c9e753f25a9cbed9d30dde848e8b0b9084aa610543cff17ba8e308ff22c06bdbccf6c268d07eb5d1a6fc9f0376dd285f68deae9d6a8e531a676530da57f886710bc7d3c49b3c87024c2ed7c8fbfa9b0d52678b67d8bbfa36cd53792476a8dfa6e02eb35df7a9d041d3ba5fcb6718f0481de97a32911dc18102393610dd8ea9490e37a6552a7ded571f60edb27bafa1f81534014228403e7da8295aa3e35984276e58bb488e3f8477cf159e2cd459a493aac811bd79aa3b8e82de61322b82723b66cc9abd79bf10cf1419173bedaae8c5d4e6b8f94ff98fad97d4e36d89cb298bfac1ae3c8048d543f0849d8fb87ac112617f8c270680dc13e0c1ab8730bcb816b585ffde58ab2e2c5b5ab837ee0170d4256ee65b0e20ca037252bc8d4a5d3151b2dab80536b0ca257dbd6b43634a9f27ffbee54837606c789d7fb9f057cfb181b493b17cee654984e57684c8100a4e89eecb2ecceae6a083f3f2cba401efd562cd93695469d581065a280308e96aecfdd3aecd4fc6813718f28a350691cbf239863e10dac613f8689c4bcc5f6b6c43b4e0f2148d5ad375cccf76c2aae973df6ebe48c47db39fb6b01edd00a892a4664cb25d88164b9eee802f6650b7ac8cc3d476693ecad99096f9e7fad9791d2fc2ea7061f074deef62438349bf29a941f768326e115e12d45e01841a41754da055984edfcdea2c98607a228d3e6960a513447a8041a428bc53b58678b3ec67b0df21bcbb1489a63e4bcb10b26bd4ae8ddb5ee03ebdafa8c397367c608a1a9ebc8a64e1b8c1ee30283712e10eca8bf7615bd60542316992420f9c49f973f9438c0eda62d686268f247e870372c22c3fe6eb187132bd7959a9c07381c2775a3f0d806a1d3ea8ad246b5129f9632725c94536a9f4a6179dbe8c52ee05819dbbe3ca2b5b0824db7b59292e6fdddd261447f1ed5f7cc4b6afb9e1e5b1fb973fbe95748121c639a0ad29adc6841387f18751625b566b75bb8fc01be0c23a8f31b7c09cc4e1cde0abcfe8ab2199231e1ba6f7c668d12216c72ae2bc4681a460fc2ac95b4a1c9c33b039ae4141f63adece24ced1c7c3f0fa284c29b1102f9fb0ba12b30548ce1c8c3dcb5e643ad693e7aadf6ed9fc45fe57689e48c6fd5fe427ee497f9743a045a9380d9928713f1b5fde03d5c83885268ff55227156c37a78e8e7306c883cd55816937fa6e65f05de580a4b60b92b46052a4eec1bd40d9e1bbbaa03da0cb0087578dcbaa23ad42d64e5fb1a7605f4334c533df5dee80dee764a68a70687d3668d9fe4f0e1af4e05dbf71e57ba55bdfeec991b9e0a2ae03d66295462e967bdc1a9b81a1965a65d9a4b73b31ae7ae74ec52f9e1a82bab410bc2690dae23e602f0528c58210f724d34c7f85c383b2d64b1fdecb71d3d103bde4ff6d87134b7b59d3369421fe687905f8770be5ae98b9f85550a163d9550160c34b8750c9351e8a11891063eb08313f95e078569f86e9bf274b57175be55e22d16d60c80f31c46cb7eecc478dab1a70999341979b76ff861e56f74ad1e739f5496cd51ba43b608754f47a21ea979f8eb4d5e7ff281a1cfe5d972591e45e23fc6911d1f865952d4f6f74dc5b1d0d88618c4d90593e190fab4f44f7368f416a29a35068fe7e31d5310bf6b373f7950171dda1e09dfbcc4e72789a4380911da74ee9c1b8c5617a7fbeb674e020de5f29b186a88ed52d09beed0ed814eb5b66cdf7ac2c117a3f3ed5048d6dccb275d3d4bd73d34c6a2018e854c51cc6740e73d52a54ea2b699dbf1dde6ffb5a249b0230d19b0b13b579009ae81e89e64e13d41a64ad2835a16a2fca8032060ddb019fd914f8c4c2d8b3149b8a0fcd08d08fcbca7bbec7a838e36468a7afd31b3fb27d8e8130fd14688e7802e6838f09bef3c43cbee195ce1ae2d5838bb9ce90959c23ed74d40781a3fd7bff51718d4093d2fab72f4f6ef8aaf460d8297a8b6284062f34c7e413f140d251db2ba6d80315120a5d6c896a970fe081c945448742906f0070758971543eb6a6b70bc0f148ea9963cca8f06c24f7567f899403d1c24dff070e05346a766ec1043ed0015b53a1ee2f291b7d4158bc75e81a36449c93bf0ef8a99435fbedb8ea9e8219c9c13d2a9106a2cc121a5dccd29d4f413eb36bd49ef36432e9d6cf970ee98efca801a54ac7391617342051325bf4dcb573a03b8ca889bdcf2be869e41c417e8fafc0108085c5b0854b899fa517134390b2c54f29d7b49f16eb449b3bfbb9bf88867b44ff10c63b7380ae8437a3f9d1d62d27b108177cda2535fd7b6cb3accde8ec6b2269fa9d84b0b05b685ad91c0610da91f12b9c143a5d0fb7b58821de200f74c1a2be696442063544dbf07296ce930a631f80c02c8af70fcaf23286d007d7ac4bc22477a8f5b9d25e9d087a173e1bf03b23337228e2818ed85b4d01736dd73b2973b69c12f377171662ec03fe53ae54edb670af7680b5690d9a86c57593598b4bd322f069224cf49efa5beabfdf8e108d3534cfa278706e02b85989111fc7eb8233fcf246424e04a29c31118e983571883283a9f0faacbfc3057e3c1ad1eb8d888b86e3667159fb3d529912f145fbed7c7296546a73246887f3bfcdff7808ad89395d9dbcdef3f116be28eb19982f73e09fd0014197c68e9463fd484ee1e0600375c4ec31e1775d7b9ed58c7e2d0feeea463409d3b27d7573341b6f749605ede37270e7669fe914b7f0a8fc8a85cfd29ff1553bf7f5730359ad6a78858d5212141213550ceb6c8ccde5e5080a6bc1964ce16e48551dc9c163f28a847968bf9930cf062e394831e077834fade99ce8629dbd79d5c0ead78b1857353ddf19fa765802c87b0ce30a1ff01d8b088ecad7d0cddc322370eebbce58dda102a1bb908f6967ce988c4b78ec82fa1ed912a513a9adc022f4005b86b87b016d35405e9990c52a20a2d31c67ee187f7b664651268821479a8f8d0ab755e8f64d37a51b1fbd2a97139d0726854ec654c65d0d40a6cc095dd850f1efc8cac0bdcd027a063021192b67192768dbf6dfc6cff2250455809b801e4e9a010d6fb75fbb270b0dccc00f7acbf9ba68fe0705285b3eb30558cb2d0d4a35867d7b3dbfe3fc52ac031c3b278f122b776b7621879151644a6baa79c32c39803f32215a083aa981d5f3482cb8a6dc0bdd05de2539bedba68a8a43418a5c6b1a588657e9a60fa52dcdf911aa155c16ee27d7102c6708d9cc0c62245d95e8d2f50603e2d51222946b10667723a2f243db293ac10a5b5157b830bdbbdba29ce9f78b1dda5137d00b8236f9e04d1d645c45f777729d1b57056b98fea3874745d99733887565889f44f0f9afdc625b443803a1da0f564034e0fd07232bacf26f56b615879498071fdde77cd52c290006501e934fe46b6701cf4baabf87c8639cc56803c4289efc5df2dad40081ee1c226384bff3fc4ab25072bc7cf6fb4932a5df367ceec1860ac4e64ab6bbb2d2047a9af7147a7e91ebe8df05facb76fcdaf79053c34dea0a8584d990462acbbdef88186b71b68f9cf8edc717bed5e23262fcb0afce4a7b5169452e504c906826b40b43c1aa41ab0fea4efc3fb39ddba1ab6a881ed39ada79c9d1715f595e84487fa94ddfd06280b0cb073aaec6d1fcb405114aa8f8e2fc250ce5e5c120e046ec9aa8bb233fbcfe51d4878de52f2f6c7dfa974a2d30cef28af45094e47583650b8a1fb0e67a4da875730397d3cbd180aa3e8d77b8e25d985833f14782b8a7b28514c107e3018e64278225e8f09c807ec9f9230a507a2a086f7cc4471faa44405ce2844fa8746bb2311e77b4492bfa98b325a6a1f09f7759d530ff9817d79ca415d05632d66d023d87dad111f38b5d87cc3fdcdb9ce6dd453f4fb8fb491c2afc90283210b7cc9f34b9c145770ea4abbb673dfdc6b27c8f1646eca404c2258ba5e1ad3ef66b08bc518079b483d155955b95240e40da4f258f6af3d691a832cfd8f330bd95ff7a49bc620b2b35cbcb03c84764b9397d01f1cc98fb649910920f0eb55ad11d17bec71825d3e89c604b6431d148f5c313a987a6946189b54bee40d971da117561f440fb6993ce2ca156a9d10ae45d04c6ea6d22ca98176eb83a32f5239c826890e3a367f3a98ba98830647365120eb882f0ebdf9c078da82fea7ccd9c3e4578f1c7ecb723c6822fd01e4dcb9792cc2b8320e9d14ac06378bdf8f85ce4076daa53ca9ecd9a1a11fc9f4af3399685371c585df19a3497b8b89ec8a78687d28ffb6edcdb48ac311ef495f893f3503cfd9a148be53e3107c4204b1f3689d799a18286a678c9d8a75f6071b910c4e8977c656349ca426c556fff3a9d1867501fcf055544bdc77b43c2ec9c63b9ccb3fad111593d645441e6e4cb7bf686b1b7df8d14ab23918eb576b28c47f6744171a21b70db623a18717b0238d8f0a38af5ec8cc77d65549790d36db968e9b9e274ec522048fcdecac53b052d75ffdaf250b4322cd5297b2dedc1d2c6358a36e70a44d72b5183efd874e99f4cda7887411e1ddd21e84fff3db4138572d74f56fac8237872a9c0ca77ab746b76a553835945a753a2a5c0c95f544e6847349f79929b617f169cb162e7018b6194a546fd885e578d1a1de6b2291c6a80a9451f47717faadcd06588d54ac560783e9eda48e0d5e47c961e804e265cb8cc1d4c35a7e9bf8e3ba2120e004e0ad83f67381e6d26953eda42c26587422d3d77538a9814d4973ceb5bec2289fd07243f1bf8c76059e4e60b88ede8722e25975de36027a1fdffb5a63f912a39d87b698b84a1c39c65eea0a8768997b3ba92260ed39e6e5c48bef42d5706a2e4bf9b777505fc38c2ad23327251aa92b930c5e060d0e879c8225709edaf3ed6e60419525ae3684488fc41db51eeda289c15bc6d85ff984eaa588a03e0f0cb7ff683af3dd8d1511828c8c4d998da66fabc240b79911ccd5f348e4da2bc1a9d12f383f76bbd10816794ad3f1dda1ffa402966908d34f9d519ca62aa5d00001af9c65e20aa02a093c1ecd3bfc523ce98524ff9114790484ceca5e073a2100fc6f85188f6b0218a1644928be11d288f7ca0dbaa682cc4deb23b5803bbdc4b22a0c3ffcbe9d5e6062c322e9ca717384a28c77b362e2618c5048cbab086e2802004d326b335f9b798f296a18987a1382ce609f4127fcac9fd4db28874fd6b160bc053ea100ff2254960b6c5bc587e0972abc46a5ff35e541179a5f57697f453cb9f1ee70b17aaabecc77f3b8ff1e42e98d2c065ab8adbde92d9ec85faae5d5c3d4104310d90bea65ef04bd9a04516db5e66201787670ce731bb0b0a9da52709e1d745b5715f1097170ca84185327fdf91340830d155ca31f2aab85e9ee206392ba3da189e502fda1f625c6ad880877ef8500a377a71b62ce9ffeabcb5072837dd9f52c9eb6d7cbe35abc035fb87c754b5d08057b5d76f0766198fe72dfd6033c540ef9", 0x1000}, {&(0x7f00000000c0)="5d9b17a15bfb3a65b38f6690962fd1c266a8f3b1563b3ae4783e79dd30e023096a654b7af5d7d90a503889ea042f9737bf206f3de9a705107c3434a3ae657feeaaf32021baae92db3c7bdd86147a6075d7745afe1758b6ce933c9e5a535b17184326a4cd8d9ffea6ca38d31b4113d0c92659e1c14796d2b359813bfc31ca8d10506507066764264ab46d3d5d504cec3339f9244bd4c848894727dd2015adfa2feec12d36a8db82dd02778b47490768b61cfe18f80d4caa89f201f1e682a1c4a23a0bd9a3723a4906a43e513444fffd50bd62f6", 0xd3}], 0x2, &(0x7f0000000200)=[{0x80, 0x102, 0x9a, "84a877df218a3719e9002aec84b86c5550e898b84d05e739e43d1e1c8c4145f11948f88ddae3d163bc7803e056a46285a6ac39683d0125df36b490162cfb12db6391b12fd024763736b428ff012f7237836fea194453de132b5034f9701dbe0339d8c1d486116617e205"}], 0x80, 0x8000}, 0x4000081) sendmsg$kcm(r0, &(0x7f0000000740)={&(0x7f0000000000)=@in={0x2, 0x4e23, @multicast2=0xe0000002}, 0x80, &(0x7f0000000200), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="300000000000000000000000070000008921eeb35cd8bd7fcc0c1b988e1c9d86c39351f17f9b04b22b00000000000000"], 0x30}, 0x0) 2018/04/18 07:41:22 executing program 5: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0xffffffffffffffff, 0x64, 0x7, 0x97}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0xfa}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r1, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0xf, 0xfffffffe, 0xfffffffc, &(0x7f0000000180)) socketpair$inet_icmp(0x3, 0x400000, 0x8, &(0x7f0000000280)) 2018/04/18 07:41:22 executing program 1: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x100}, 0x2c) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x9) close(r0) gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={r2, 0x28, &(0x7f0000000740)}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r3}, 0x10) 2018/04/18 07:41:22 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000f97ff8)) socketpair(0x0, 0x5, 0x112, &(0x7f00000001c0)) 2018/04/18 07:41:22 executing program 0 (fault-call:1 fault-nth:0): perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000100)) 2018/04/18 07:41:22 executing program 2: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004, 0x4000009d}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x0, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x59616d61, 0xffffffffffffffff, 0x1, &(0x7f0000000000)) socketpair$inet_icmp(0x59616d61, 0xffffffffffffffff, 0x1, &(0x7f0000000000)) 2018/04/18 07:41:22 executing program 7: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00'}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/18 07:41:22 executing program 3: r0 = socket$kcm(0x2, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000780)="99d38a0b68aa6d664d9493e2027609372da970b4983295a9ec50ba7e3ecd705b8f7df685761cd27082fbcb623906c616766819124e74deec11cb89aff3f6af300befba7a74b197fa86a3fe2ce66b92c16fcbe5977fb17db043078350b33ea1175b332c425a6127d645c7f6c992a9519846481d6726c91d0269a7ec2e4fc4bf00817a4ee8cb9cbd0fc9873581ec22801b5d2e97287e240e0702269a5f58e99d7d5a09ce457012c769fd9ee0c095eb95db5766c78ee276e11623d339ff5f7363af17658bb810d10b3fe1146dd4272844a1a9f2fd16bf43f53244f18d111f2651246094d8e9d4b9777c6d0c9e753f25a9cbed9d30dde848e8b0b9084aa610543cff17ba8e308ff22c06bdbccf6c268d07eb5d1a6fc9f0376dd285f68deae9d6a8e531a676530da57f886710bc7d3c49b3c87024c2ed7c8fbfa9b0d52678b67d8bbfa36cd53792476a8dfa6e02eb35df7a9d041d3ba5fcb6718f0481de97a32911dc18102393610dd8ea9490e37a6552a7ded571f60edb27bafa1f81534014228403e7da8295aa3e35984276e58bb488e3f8477cf159e2cd459a493aac811bd79aa3b8e82de61322b82723b66cc9abd79bf10cf1419173bedaae8c5d4e6b8f94ff98fad97d4e36d89cb298bfac1ae3c8048d543f0849d8fb87ac112617f8c270680dc13e0c1ab8730bcb816b585ffde58ab2e2c5b5ab837ee0170d4256ee65b0e20ca037252bc8d4a5d3151b2dab80536b0ca257dbd6b43634a9f27ffbee54837606c789d7fb9f057cfb181b493b17cee654984e57684c8100a4e89eecb2ecceae6a083f3f2cba401efd562cd93695469d581065a280308e96aecfdd3aecd4fc6813718f28a350691cbf239863e10dac613f8689c4bcc5f6b6c43b4e0f2148d5ad375cccf76c2aae973df6ebe48c47db39fb6b01edd00a892a4664cb25d88164b9eee802f6650b7ac8cc3d476693ecad99096f9e7fad9791d2fc2ea7061f074deef62438349bf29a941f768326e115e12d45e01841a41754da055984edfcdea2c98607a228d3e6960a513447a8041a428bc53b58678b3ec67b0df21bcbb1489a63e4bcb10b26bd4ae8ddb5ee03ebdafa8c397367c608a1a9ebc8a64e1b8c1ee30283712e10eca8bf7615bd60542316992420f9c49f973f9438c0eda62d686268f247e870372c22c3fe6eb187132bd7959a9c07381c2775a3f0d806a1d3ea8ad246b5129f9632725c94536a9f4a6179dbe8c52ee05819dbbe3ca2b5b0824db7b59292e6fdddd261447f1ed5f7cc4b6afb9e1e5b1fb973fbe95748121c639a0ad29adc6841387f18751625b566b75bb8fc01be0c23a8f31b7c09cc4e1cde0abcfe8ab2199231e1ba6f7c668d12216c72ae2bc4681a460fc2ac95b4a1c9c33b039ae4141f63adece24ced1c7c3f0fa284c29b1102f9fb0ba12b30548ce1c8c3dcb5e643ad693e7aadf6ed9fc45fe57689e48c6fd5fe427ee497f9743a045a9380d9928713f1b5fde03d5c83885268ff55227156c37a78e8e7306c883cd55816937fa6e65f05de580a4b60b92b46052a4eec1bd40d9e1bbbaa03da0cb0087578dcbaa23ad42d64e5fb1a7605f4334c533df5dee80dee764a68a70687d3668d9fe4f0e1af4e05dbf71e57ba55bdfeec991b9e0a2ae03d66295462e967bdc1a9b81a1965a65d9a4b73b31ae7ae74ec52f9e1a82bab410bc2690dae23e602f0528c58210f724d34c7f85c383b2d64b1fdecb71d3d103bde4ff6d87134b7b59d3369421fe687905f8770be5ae98b9f85550a163d9550160c34b8750c9351e8a11891063eb08313f95e078569f86e9bf274b57175be55e22d16d60c80f31c46cb7eecc478dab1a70999341979b76ff861e56f74ad1e739f5496cd51ba43b608754f47a21ea979f8eb4d5e7ff281a1cfe5d972591e45e23fc6911d1f865952d4f6f74dc5b1d0d88618c4d90593e190fab4f44f7368f416a29a35068fe7e31d5310bf6b373f7950171dda1e09dfbcc4e72789a4380911da74ee9c1b8c5617a7fbeb674e020de5f29b186a88ed52d09beed0ed814eb5b66cdf7ac2c117a3f3ed5048d6dccb275d3d4bd73d34c6a2018e854c51cc6740e73d52a54ea2b699dbf1dde6ffb5a249b0230d19b0b13b579009ae81e89e64e13d41a64ad2835a16a2fca8032060ddb019fd914f8c4c2d8b3149b8a0fcd08d08fcbca7bbec7a838e36468a7afd31b3fb27d8e8130fd14688e7802e6838f09bef3c43cbee195ce1ae2d5838bb9ce90959c23ed74d40781a3fd7bff51718d4093d2fab72f4f6ef8aaf460d8297a8b6284062f34c7e413f140d251db2ba6d80315120a5d6c896a970fe081c945448742906f0070758971543eb6a6b70bc0f148ea9963cca8f06c24f7567f899403d1c24dff070e05346a766ec1043ed0015b53a1ee2f291b7d4158bc75e81a36449c93bf0ef8a99435fbedb8ea9e8219c9c13d2a9106a2cc121a5dccd29d4f413eb36bd49ef36432e9d6cf970ee98efca801a54ac7391617342051325bf4dcb573a03b8ca889bdcf2be869e41c417e8fafc0108085c5b0854b899fa517134390b2c54f29d7b49f16eb449b3bfbb9bf88867b44ff10c63b7380ae8437a3f9d1d62d27b108177cda2535fd7b6cb3accde8ec6b2269fa9d84b0b05b685ad91c0610da91f12b9c143a5d0fb7b58821de200f74c1a2be696442063544dbf07296ce930a631f80c02c8af70fcaf23286d007d7ac4bc22477a8f5b9d25e9d087a173e1bf03b23337228e2818ed85b4d01736dd73b2973b69c12f377171662ec03fe53ae54edb670af7680b5690d9a86c57593598b4bd322f069224cf49efa5beabfdf8e108d3534cfa278706e02b85989111fc7eb8233fcf246424e04a29c31118e983571883283a9f0faacbfc3057e3c1ad1eb8d888b86e3667159fb3d529912f145fbed7c7296546a73246887f3bfcdff7808ad89395d9dbcdef3f116be28eb19982f73e09fd0014197c68e9463fd484ee1e0600375c4ec31e1775d7b9ed58c7e2d0feeea463409d3b27d7573341b6f749605ede37270e7669fe914b7f0a8fc8a85cfd29ff1553bf7f5730359ad6a78858d5212141213550ceb6c8ccde5e5080a6bc1964ce16e48551dc9c163f28a847968bf9930cf062e394831e077834fade99ce8629dbd79d5c0ead78b1857353ddf19fa765802c87b0ce30a1ff01d8b088ecad7d0cddc322370eebbce58dda102a1bb908f6967ce988c4b78ec82fa1ed912a513a9adc022f4005b86b87b016d35405e9990c52a20a2d31c67ee187f7b664651268821479a8f8d0ab755e8f64d37a51b1fbd2a97139d0726854ec654c65d0d40a6cc095dd850f1efc8cac0bdcd027a063021192b67192768dbf6dfc6cff2250455809b801e4e9a010d6fb75fbb270b0dccc00f7acbf9ba68fe0705285b3eb30558cb2d0d4a35867d7b3dbfe3fc52ac031c3b278f122b776b7621879151644a6baa79c32c39803f32215a083aa981d5f3482cb8a6dc0bdd05de2539bedba68a8a43418a5c6b1a588657e9a60fa52dcdf911aa155c16ee27d7102c6708d9cc0c62245d95e8d2f50603e2d51222946b10667723a2f243db293ac10a5b5157b830bdbbdba29ce9f78b1dda5137d00b8236f9e04d1d645c45f777729d1b57056b98fea3874745d99733887565889f44f0f9afdc625b443803a1da0f564034e0fd07232bacf26f56b615879498071fdde77cd52c290006501e934fe46b6701cf4baabf87c8639cc56803c4289efc5df2dad40081ee1c226384bff3fc4ab25072bc7cf6fb4932a5df367ceec1860ac4e64ab6bbb2d2047a9af7147a7e91ebe8df05facb76fcdaf79053c34dea0a8584d990462acbbdef88186b71b68f9cf8edc717bed5e23262fcb0afce4a7b5169452e504c906826b40b43c1aa41ab0fea4efc3fb39ddba1ab6a881ed39ada79c9d1715f595e84487fa94ddfd06280b0cb073aaec6d1fcb405114aa8f8e2fc250ce5e5c120e046ec9aa8bb233fbcfe51d4878de52f2f6c7dfa974a2d30cef28af45094e47583650b8a1fb0e67a4da875730397d3cbd180aa3e8d77b8e25d985833f14782b8a7b28514c107e3018e64278225e8f09c807ec9f9230a507a2a086f7cc4471faa44405ce2844fa8746bb2311e77b4492bfa98b325a6a1f09f7759d530ff9817d79ca415d05632d66d023d87dad111f38b5d87cc3fdcdb9ce6dd453f4fb8fb491c2afc90283210b7cc9f34b9c145770ea4abbb673dfdc6b27c8f1646eca404c2258ba5e1ad3ef66b08bc518079b483d155955b95240e40da4f258f6af3d691a832cfd8f330bd95ff7a49bc620b2b35cbcb03c84764b9397d01f1cc98fb649910920f0eb55ad11d17bec71825d3e89c604b6431d148f5c313a987a6946189b54bee40d971da117561f440fb6993ce2ca156a9d10ae45d04c6ea6d22ca98176eb83a32f5239c826890e3a367f3a98ba98830647365120eb882f0ebdf9c078da82fea7ccd9c3e4578f1c7ecb723c6822fd01e4dcb9792cc2b8320e9d14ac06378bdf8f85ce4076daa53ca9ecd9a1a11fc9f4af3399685371c585df19a3497b8b89ec8a78687d28ffb6edcdb48ac311ef495f893f3503cfd9a148be53e3107c4204b1f3689d799a18286a678c9d8a75f6071b910c4e8977c656349ca426c556fff3a9d1867501fcf055544bdc77b43c2ec9c63b9ccb3fad111593d645441e6e4cb7bf686b1b7df8d14ab23918eb576b28c47f6744171a21b70db623a18717b0238d8f0a38af5ec8cc77d65549790d36db968e9b9e274ec522048fcdecac53b052d75ffdaf250b4322cd5297b2dedc1d2c6358a36e70a44d72b5183efd874e99f4cda7887411e1ddd21e84fff3db4138572d74f56fac8237872a9c0ca77ab746b76a553835945a753a2a5c0c95f544e6847349f79929b617f169cb162e7018b6194a546fd885e578d1a1de6b2291c6a80a9451f47717faadcd06588d54ac560783e9eda48e0d5e47c961e804e265cb8cc1d4c35a7e9bf8e3ba2120e004e0ad83f67381e6d26953eda42c26587422d3d77538a9814d4973ceb5bec2289fd07243f1bf8c76059e4e60b88ede8722e25975de36027a1fdffb5a63f912a39d87b698b84a1c39c65eea0a8768997b3ba92260ed39e6e5c48bef42d5706a2e4bf9b777505fc38c2ad23327251aa92b930c5e060d0e879c8225709edaf3ed6e60419525ae3684488fc41db51eeda289c15bc6d85ff984eaa588a03e0f0cb7ff683af3dd8d1511828c8c4d998da66fabc240b79911ccd5f348e4da2bc1a9d12f383f76bbd10816794ad3f1dda1ffa402966908d34f9d519ca62aa5d00001af9c65e20aa02a093c1ecd3bfc523ce98524ff9114790484ceca5e073a2100fc6f85188f6b0218a1644928be11d288f7ca0dbaa682cc4deb23b5803bbdc4b22a0c3ffcbe9d5e6062c322e9ca717384a28c77b362e2618c5048cbab086e2802004d326b335f9b798f296a18987a1382ce609f4127fcac9fd4db28874fd6b160bc053ea100ff2254960b6c5bc587e0972abc46a5ff35e541179a5f57697f453cb9f1ee70b17aaabecc77f3b8ff1e42e98d2c065ab8adbde92d9ec85faae5d5c3d4104310d90bea65ef04bd9a04516db5e66201787670ce731bb0b0a9da52709e1d745b5715f1097170ca84185327fdf91340830d155ca31f2aab85e9ee206392ba3da189e502fda1f625c6ad880877ef8500a377a71b62ce9ffeabcb5072837dd9f52c9eb6d7cbe35abc035fb87c754b5d08057b5d76f0766198fe72dfd6033c540ef9", 0x1000}, {&(0x7f00000000c0)="5d9b17a15bfb3a65b38f6690962fd1c266a8f3b1563b3ae4783e79dd30e023096a654b7af5d7d90a503889ea042f9737bf206f3de9a705107c3434a3ae657feeaaf32021baae92db3c7bdd86147a6075d7745afe1758b6ce933c9e5a535b17184326a4cd8d9ffea6ca38d31b4113d0c92659e1c14796d2b359813bfc31ca8d10506507066764264ab46d3d5d504cec3339f9244bd4c848894727dd2015adfa2feec12d36a8db82dd02778b47490768b61cfe18f80d4caa89f201f1e682a1c4a23a0bd9a3723a4906a43e513444fffd50bd62f6", 0xd3}], 0x2, &(0x7f0000000200)=[{0x80, 0x102, 0x9a, "84a877df218a3719e9002aec84b86c5550e898b84d05e739e43d1e1c8c4145f11948f88ddae3d163bc7803e056a46285a6ac39683d0125df36b490162cfb12db6391b12fd024763736b428ff012f7237836fea194453de132b5034f9701dbe0339d8c1d486116617e205"}], 0x80, 0x8000}, 0x4000081) sendmsg$kcm(r0, &(0x7f0000000740)={&(0x7f0000000000)=@in={0x2, 0x4e23, @multicast2=0xe0000002}, 0x80, &(0x7f0000000200), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="300000000000000000000000070000008921eeb35cd8bd7fcc0c1b988e1c9d86c39351f17f9b04b22b00000000000000"], 0x30}, 0x0) 2018/04/18 07:41:22 executing program 5: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r1) socket$kcm(0xa, 0x1, 0x0) setsockopt$sock_attach_bpf(r1, 0x6, 0x7, &(0x7f0000000140)=r0, 0x4) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000080)={r2}) 2018/04/18 07:41:22 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x9) close(0xffffffffffffffff) gettid() socket$kcm(0x29, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x0, 0x1ff, 0x7fff, 0x100000043}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r0, 0x9}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={r1, 0x28, &(0x7f0000000740)}, 0x10) perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r2}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r3}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/18 07:41:22 executing program 1: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x100}, 0x2c) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x9) close(r0) gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={r2, 0x28, &(0x7f0000000740)}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r3}, 0x10) [ 190.229502] FAULT_INJECTION: forcing a failure. [ 190.229502] name failslab, interval 1, probability 0, space 0, times 1 [ 190.241118] CPU: 1 PID: 17580 Comm: syz-executor0 Not tainted 4.16.0+ #3 [ 190.247973] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 190.257346] Call Trace: [ 190.259955] dump_stack+0x1b9/0x294 [ 190.263603] ? dump_stack_print_info.cold.2+0x52/0x52 [ 190.268804] ? perf_trace_lock_acquire+0xe3/0x980 [ 190.273659] ? memcg_kmem_charge_memcg+0x74/0x110 2018/04/18 07:41:22 executing program 7: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00'}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/18 07:41:22 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x2}, 0xffffffffffffffdc) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=ANY=[@ANYBLOB="18000000000000000000000001000000711000000000000000000000040000009500000000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x142, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x730000, 0x2, 0x10, &(0x7f0000000700)) socketpair$inet_icmp(0x730000, 0x2, 0x11, &(0x7f00000006c0)) [ 190.278524] should_fail.cold.4+0xa/0x1a [ 190.282602] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 190.287809] ? graph_lock+0x170/0x170 [ 190.291619] ? find_held_lock+0x36/0x1c0 [ 190.295693] ? __lock_is_held+0xb5/0x140 [ 190.299788] ? check_same_owner+0x320/0x320 [ 190.304120] ? rcu_note_context_switch+0x710/0x710 [ 190.309066] __should_failslab+0x124/0x180 [ 190.313313] should_failslab+0x9/0x14 [ 190.317125] kmem_cache_alloc+0x2af/0x760 [ 190.321287] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 2018/04/18 07:41:22 executing program 2: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004, 0x4000009d}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x0, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x59616d61, 0xffffffffffffffff, 0x1, &(0x7f0000000000)) socketpair$inet_icmp(0x59616d61, 0xffffffffffffffff, 0x1, &(0x7f0000000000)) 2018/04/18 07:41:22 executing program 5: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f0000000100), 0x4) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x7) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000080)=@nl=@unspec, 0x80, &(0x7f0000000180)=[{&(0x7f0000000480)="d201d56334e2248a62268f0474dad5ff8c8a9604ca8e52c5e41d255321be307c2468c9eb24114b88", 0x28}], 0x1, &(0x7f00000002c0)}, 0x0) [ 190.326846] ptlock_alloc+0x20/0x80 [ 190.330493] pte_alloc_one+0x6b/0x120 [ 190.334315] do_huge_pmd_anonymous_page+0x858/0x1e30 [ 190.339443] ? __thp_get_unmapped_area+0x180/0x180 [ 190.344389] ? __lock_acquire+0x7f5/0x5140 [ 190.348651] ? debug_check_no_locks_freed+0x310/0x310 [ 190.353863] ? debug_check_no_locks_freed+0x310/0x310 [ 190.359086] ? perf_trace_lock+0xd6/0x900 [ 190.363243] ? perf_trace_lock_acquire+0xe3/0x980 [ 190.368102] ? pud_val+0x80/0xf0 [ 190.371481] ? pmd_val+0xf0/0xf0 [ 190.374857] ? perf_trace_lock+0x900/0x900 [ 190.379102] ? debug_check_no_locks_freed+0x310/0x310 [ 190.384312] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 190.389868] __handle_mm_fault+0x290b/0x4150 [ 190.394295] ? vm_insert_mixed_mkwrite+0x40/0x40 [ 190.399060] ? graph_lock+0x170/0x170 [ 190.402881] ? find_held_lock+0x36/0x1c0 [ 190.406966] ? lock_downgrade+0x8e0/0x8e0 [ 190.411148] ? handle_mm_fault+0x8c0/0xc70 [ 190.415405] handle_mm_fault+0x53a/0xc70 [ 190.419490] ? __handle_mm_fault+0x4150/0x4150 [ 190.424086] ? find_vma+0x34/0x190 2018/04/18 07:41:22 executing program 2: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004, 0x4000009d}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x0, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x59616d61, 0xffffffffffffffff, 0x1, &(0x7f0000000000)) socketpair$inet_icmp(0x59616d61, 0xffffffffffffffff, 0x1, &(0x7f0000000000)) 2018/04/18 07:41:22 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x2) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x1b}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=ANY=[@ANYBLOB="18000000000000000000000000000000711000000000000000000000000000009500000080000000"], &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r1, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x705000, 0x2, 0x20000000, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x9) [ 190.427641] __do_page_fault+0x60b/0xe40 [ 190.431719] ? mm_fault_error+0x380/0x380 [ 190.435897] ? graph_lock+0x170/0x170 [ 190.439711] do_page_fault+0xee/0x8a7 [ 190.443604] ? __alloc_fd+0x346/0x700 [ 190.447413] ? vmalloc_sync_all+0x30/0x30 [ 190.451572] ? find_held_lock+0x36/0x1c0 [ 190.455659] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 190.460516] page_fault+0x25/0x50 [ 190.463989] RIP: 0010:__put_user_4+0x1c/0x30 [ 190.468397] RSP: 0018:ffff8801a4e37ce0 EFLAGS: 00010297 [ 190.473767] RAX: 0000000000000015 RBX: 00007fffffffeffd RCX: 0000000020000100 [ 190.481043] RDX: 000000000000004d RSI: ffffffff81a43043 RDI: 0000000000000282 [ 190.488319] RBP: ffff8801a4e37dd0 R08: 1ffff100349c6f79 R09: ffff8801a4e37a08 [ 190.495594] R10: 0000000000000003 R11: 0000000000000000 R12: 0000000000000015 [ 190.502870] R13: 0000000020000100 R14: 0000000000000002 R15: dffffc0000000000 [ 190.510168] ? __might_fault+0x1a3/0x1e0 [ 190.514257] ? __sys_socketpair+0x120/0x6b0 [ 190.518594] ? SyS_socket+0x30/0x30 [ 190.522238] ? ksys_write+0x1a6/0x250 [ 190.526053] ? SyS_read+0x30/0x30 2018/04/18 07:41:22 executing program 2: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004, 0x4000009d}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x0, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x59616d61, 0xffffffffffffffff, 0x1, &(0x7f0000000000)) socketpair$inet_icmp(0x59616d61, 0xffffffffffffffff, 0x1, &(0x7f0000000000)) 2018/04/18 07:41:22 executing program 5: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000240)={0xffffffffffffffff, 0x50, &(0x7f00000001c0)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280)=r0, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0xd9}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=ANY=[@ANYBLOB="18000000000000000000000000000000711000000000000000000000020000009500000000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r1, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x2, 0x730000, 0x2, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000080)={r3}) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000180)={r2}) [ 190.529509] ? mm_fault_error+0x380/0x380 [ 190.533672] SyS_socketpair+0x2c/0x40 [ 190.537473] ? __sys_socketpair+0x6b0/0x6b0 [ 190.541807] do_syscall_64+0x29e/0x9d0 [ 190.545701] ? vmalloc_sync_all+0x30/0x30 [ 190.549857] ? _raw_spin_unlock_irq+0x27/0x70 [ 190.554363] ? finish_task_switch+0x1ca/0x810 [ 190.558871] ? syscall_return_slowpath+0x5c0/0x5c0 [ 190.563813] ? syscall_return_slowpath+0x30f/0x5c0 [ 190.568760] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 190.574142] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 190.579005] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 190.584201] RIP: 0033:0x455329 [ 190.587399] RSP: 002b:00007f9ecb9f6c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 190.595122] RAX: ffffffffffffffda RBX: 00007f9ecb9f76d4 RCX: 0000000000455329 [ 190.602397] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 000000000000000a [ 190.609674] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 190.616947] R10: 0000000020000100 R11: 0000000000000246 R12: 0000000000000014 [ 190.624228] R13: 000000000000063f R14: 00000000006fc688 R15: 0000000000000000 2018/04/18 07:41:23 executing program 2: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004, 0x4000009d}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x59616d61, 0xffffffffffffffff, 0x1, &(0x7f0000000000)) socketpair$inet_icmp(0x59616d61, 0xffffffffffffffff, 0x1, &(0x7f0000000000)) 2018/04/18 07:41:23 executing program 0 (fault-call:1 fault-nth:1): perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000100)) 2018/04/18 07:41:23 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000f97ff8)) socketpair(0x0, 0x5, 0x112, &(0x7f00000001c0)) 2018/04/18 07:41:23 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0x0, 0x0}) socket$kcm(0x29, 0x2, 0x0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f00000001c0)='./file0\x00', 0x0, 0x18}, 0x10) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000300)=r1, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000340)={0x0, 0x0}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) socket$kcm(0xa, 0x5, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8946, &(0x7f0000000100)="6c6f00966fd651b159a9c84a2c60d29800000020") 2018/04/18 07:41:23 executing program 3: r0 = socket$kcm(0x2, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000780)="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", 0x1000}, {&(0x7f00000000c0)="5d9b17a15bfb3a65b38f6690962fd1c266a8f3b1563b3ae4783e79dd30e023096a654b7af5d7d90a503889ea042f9737bf206f3de9a705107c3434a3ae657feeaaf32021baae92db3c7bdd86147a6075d7745afe1758b6ce933c9e5a535b17184326a4cd8d9ffea6ca38d31b4113d0c92659e1c14796d2b359813bfc31ca8d10506507066764264ab46d3d5d504cec3339f9244bd4c848894727dd2015adfa2feec12d36a8db82dd02778b47490768b61cfe18f80d4caa89f201f1e682a1c4a23a0bd9a3723a4906a43e513444fffd50bd62f6", 0xd3}], 0x2, &(0x7f0000000200)=[{0x80, 0x102, 0x9a, "84a877df218a3719e9002aec84b86c5550e898b84d05e739e43d1e1c8c4145f11948f88ddae3d163bc7803e056a46285a6ac39683d0125df36b490162cfb12db6391b12fd024763736b428ff012f7237836fea194453de132b5034f9701dbe0339d8c1d486116617e205"}], 0x80, 0x8000}, 0x4000081) sendmsg$kcm(r0, &(0x7f0000000740)={&(0x7f0000000000)=@in={0x2, 0x4e23, @multicast2=0xe0000002}, 0x80, &(0x7f0000000200), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="300000000000000000000000070000008921eeb35cd8bd7fcc0c1b988e1c9d86c39351f17f9b04b22b00000000000000"], 0x30}, 0x0) 2018/04/18 07:41:23 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x9) close(0xffffffffffffffff) gettid() socket$kcm(0x29, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x0, 0x7fff, 0x100000043}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r0, 0x9}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={r1, 0x28, &(0x7f0000000740)}, 0x10) perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r2}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r3}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/18 07:41:23 executing program 1: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x100}, 0x2c) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x9) close(r0) gettid() socket$kcm(0x29, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r1}, 0x10) [ 190.882629] FAULT_INJECTION: forcing a failure. [ 190.882629] name failslab, interval 1, probability 0, space 0, times 0 [ 190.894155] CPU: 1 PID: 17639 Comm: syz-executor0 Not tainted 4.16.0+ #3 [ 190.901004] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 190.910368] Call Trace: [ 190.912976] dump_stack+0x1b9/0x294 [ 190.916625] ? dump_stack_print_info.cold.2+0x52/0x52 [ 190.921829] ? perf_trace_lock_acquire+0xe3/0x980 [ 190.926689] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 190.932257] should_fail.cold.4+0xa/0x1a [ 190.936350] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 190.941473] ? graph_lock+0x170/0x170 [ 190.945286] ? find_held_lock+0x36/0x1c0 [ 190.949371] ? find_held_lock+0x36/0x1c0 [ 190.953472] ? check_same_owner+0x320/0x320 [ 190.957803] ? handle_mm_fault+0x55a/0xc70 [ 190.962052] ? rcu_note_context_switch+0x710/0x710 [ 190.966995] ? __handle_mm_fault+0x4150/0x4150 [ 190.971597] __should_failslab+0x124/0x180 [ 190.975849] should_failslab+0x9/0x14 [ 190.979660] kmem_cache_alloc+0x2af/0x760 [ 190.983818] ? zap_class+0x720/0x720 [ 190.987552] sock_alloc_inode+0x6f/0x300 [ 190.991630] ? sock_destroy_inode+0x70/0x70 [ 190.995960] ? graph_lock+0x170/0x170 [ 190.999785] ? sock_destroy_inode+0x70/0x70 [ 191.004120] alloc_inode+0x63/0x190 [ 191.007824] new_inode_pseudo+0x69/0x1a0 [ 191.011898] ? prune_icache_sb+0x1a0/0x1a0 [ 191.016145] ? find_held_lock+0x36/0x1c0 [ 191.020246] sock_alloc+0x41/0x270 [ 191.023805] __sock_create+0x161/0x920 [ 191.027710] ? kernel_sock_ip_overhead+0x570/0x570 [ 191.032653] ? retint_kernel+0x10/0x10 [ 191.036568] ? __might_sleep+0x95/0x190 [ 191.040564] __sys_socketpair+0x1eb/0x6b0 [ 191.044724] ? SyS_socket+0x30/0x30 [ 191.048367] ? ksys_write+0x1a6/0x250 [ 191.052185] ? SyS_read+0x30/0x30 [ 191.055648] ? mm_fault_error+0x380/0x380 [ 191.059815] SyS_socketpair+0x2c/0x40 [ 191.063618] ? __sys_socketpair+0x6b0/0x6b0 [ 191.067952] do_syscall_64+0x29e/0x9d0 [ 191.071849] ? vmalloc_sync_all+0x30/0x30 [ 191.076003] ? _raw_spin_unlock_irq+0x27/0x70 [ 191.080507] ? finish_task_switch+0x1ca/0x810 [ 191.085009] ? syscall_return_slowpath+0x5c0/0x5c0 [ 191.090046] ? syscall_return_slowpath+0x30f/0x5c0 [ 191.094994] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 191.100377] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 191.105239] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 191.110427] RIP: 0033:0x455329 [ 191.113598] RSP: 002b:00007f9ecb9f6c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 191.121289] RAX: ffffffffffffffda RBX: 00007f9ecb9f76d4 RCX: 0000000000455329 2018/04/18 07:41:23 executing program 1: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x100}, 0x2c) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x9) close(r0) gettid() socket$kcm(0x29, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r1}, 0x10) 2018/04/18 07:41:23 executing program 7 (fault-call:4 fault-nth:0): mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/18 07:41:23 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x9) close(0xffffffffffffffff) gettid() socket$kcm(0x29, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x0, 0x100000043}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r0, 0x9}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={r1, 0x28, &(0x7f0000000740)}, 0x10) perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r2}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r3}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/18 07:41:23 executing program 2: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004, 0x4000009d}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x59616d61, 0xffffffffffffffff, 0x1, &(0x7f0000000000)) socketpair$inet_icmp(0x59616d61, 0xffffffffffffffff, 0x1, &(0x7f0000000000)) 2018/04/18 07:41:23 executing program 3: r0 = socket$kcm(0x2, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000740)={&(0x7f0000000000)=@in={0x2, 0x4e23, @multicast2=0xe0000002}, 0x80, &(0x7f0000000200), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="300000000000000000000000070000008921eeb35cd8bd7fcc0c1b988e1c9d86c39351f17f9b04b22b00000000000000"], 0x30}, 0x0) 2018/04/18 07:41:23 executing program 5: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0xc1}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0xffffffffffffff11, &(0x7f00001a7f05)=""/251}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x7a}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=ANY=[@ANYBLOB="18000000000000000000000000000000711000000002000000000000000000001a0eadd600000000"], &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r1, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f0000000000)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x13, 0x730000, 0x705000, &(0x7f0000000180)) 2018/04/18 07:41:23 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000f97ff8)) socketpair(0x0, 0x5, 0x112, &(0x7f00000001c0)) 2018/04/18 07:41:23 executing program 0 (fault-call:1 fault-nth:2): perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000100)) [ 191.128540] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 000000000000000a [ 191.135791] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 191.143043] R10: 0000000020000100 R11: 0000000000000246 R12: 0000000000000014 [ 191.150305] R13: 000000000000063f R14: 00000000006fc688 R15: 0000000000000001 [ 191.157649] socket: no more sockets [ 191.225567] FAULT_INJECTION: forcing a failure. [ 191.225567] name failslab, interval 1, probability 0, space 0, times 0 [ 191.236898] CPU: 1 PID: 17650 Comm: syz-executor7 Not tainted 4.16.0+ #3 [ 191.243747] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 191.253108] Call Trace: [ 191.255712] dump_stack+0x1b9/0x294 [ 191.259375] ? dump_stack_print_info.cold.2+0x52/0x52 [ 191.264579] ? perf_trace_lock_acquire+0xe3/0x980 [ 191.269430] ? perf_trace_lock+0xd6/0x900 2018/04/18 07:41:23 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x9) close(0xffffffffffffffff) gettid() socket$kcm(0x29, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r0, 0x9}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={r1, 0x28, &(0x7f0000000740)}, 0x10) perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r2}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r3}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/18 07:41:23 executing program 3: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000000)=@in={0x2, 0x4e23, @multicast2=0xe0000002}, 0x80, &(0x7f0000000200), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="300000000000000000000000070000008921eeb35cd8bd7fcc0c1b988e1c9d86c39351f17f9b04b22b00000000000000"], 0x30}, 0x0) [ 191.273600] should_fail.cold.4+0xa/0x1a [ 191.277678] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 191.282796] ? lock_downgrade+0x8e0/0x8e0 [ 191.286958] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 191.292517] ? proc_fail_nth_write+0x96/0x1f0 [ 191.297035] ? find_held_lock+0x36/0x1c0 [ 191.301137] ? check_same_owner+0x320/0x320 [ 191.305477] ? rcu_note_context_switch+0x710/0x710 [ 191.310429] __should_failslab+0x124/0x180 [ 191.314674] should_failslab+0x9/0x14 [ 191.318467] __kmalloc_track_caller+0x2c4/0x760 [ 191.323129] ? strncpy_from_user+0x500/0x500 [ 191.327532] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 191.333063] ? strndup_user+0x77/0xd0 [ 191.336855] memdup_user+0x2c/0xa0 [ 191.340386] strndup_user+0x77/0xd0 [ 191.344005] ksys_mount+0x3c/0x140 [ 191.347530] SyS_mount+0x35/0x50 [ 191.350882] ? ksys_mount+0x140/0x140 [ 191.354672] do_syscall_64+0x29e/0x9d0 [ 191.358544] ? vmalloc_sync_all+0x30/0x30 [ 191.362681] ? _raw_spin_unlock_irq+0x27/0x70 [ 191.367163] ? finish_task_switch+0x1ca/0x810 [ 191.371652] ? syscall_return_slowpath+0x5c0/0x5c0 [ 191.376568] ? syscall_return_slowpath+0x30f/0x5c0 [ 191.381487] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 191.386843] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 191.391680] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 191.396862] RIP: 0033:0x455329 [ 191.400037] RSP: 002b:00007fdcd2ef2c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 191.407735] RAX: ffffffffffffffda RBX: 00007fdcd2ef36d4 RCX: 0000000000455329 [ 191.414993] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 2018/04/18 07:41:23 executing program 2: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004, 0x4000009d}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x59616d61, 0xffffffffffffffff, 0x1, &(0x7f0000000000)) socketpair$inet_icmp(0x59616d61, 0xffffffffffffffff, 0x1, &(0x7f0000000000)) [ 191.422247] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 191.429500] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 191.436755] R13: 00000000000003fb R14: 00000000006f9028 R15: 0000000000000000 [ 191.463216] FAULT_INJECTION: forcing a failure. [ 191.463216] name failslab, interval 1, probability 0, space 0, times 0 [ 191.474561] CPU: 0 PID: 17668 Comm: syz-executor0 Not tainted 4.16.0+ #3 [ 191.481422] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 191.490798] Call Trace: [ 191.493422] dump_stack+0x1b9/0x294 [ 191.497092] ? dump_stack_print_info.cold.2+0x52/0x52 [ 191.502336] ? perf_trace_lock_acquire+0xe3/0x980 [ 191.507223] should_fail.cold.4+0xa/0x1a [ 191.511315] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 191.516443] ? save_stack+0x43/0xd0 [ 191.520090] ? kasan_kmalloc+0xc4/0xe0 [ 191.523996] ? kmem_cache_alloc+0x12e/0x760 [ 191.528342] ? sock_alloc_inode+0x6f/0x300 [ 191.532593] ? alloc_inode+0x63/0x190 [ 191.536408] ? new_inode_pseudo+0x69/0x1a0 [ 191.540662] ? __sock_create+0x161/0x920 [ 191.544745] ? __sys_socketpair+0x1eb/0x6b0 [ 191.549092] ? do_syscall_64+0x29e/0x9d0 [ 191.553171] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 191.558570] ? find_held_lock+0x36/0x1c0 [ 191.562725] ? check_same_owner+0x320/0x320 [ 191.567068] ? rcu_is_watching+0x85/0x140 [ 191.571242] ? rcu_note_context_switch+0x710/0x710 [ 191.576208] __should_failslab+0x124/0x180 [ 191.580472] should_failslab+0x9/0x14 [ 191.584295] kmem_cache_alloc_trace+0x2cb/0x780 [ 191.588985] ? kmem_cache_alloc+0x5fa/0x760 [ 191.593335] ? zap_class+0x720/0x720 [ 191.597085] sock_alloc_inode+0xb3/0x300 [ 191.601194] ? sock_destroy_inode+0x70/0x70 [ 191.605531] ? graph_lock+0x170/0x170 [ 191.609337] ? sock_destroy_inode+0x70/0x70 [ 191.613675] alloc_inode+0x63/0x190 [ 191.617317] new_inode_pseudo+0x69/0x1a0 [ 191.621374] ? prune_icache_sb+0x1a0/0x1a0 [ 191.625599] ? find_held_lock+0x36/0x1c0 [ 191.629671] sock_alloc+0x41/0x270 [ 191.633210] __sock_create+0x161/0x920 [ 191.637096] ? kernel_sock_ip_overhead+0x570/0x570 [ 191.642021] ? retint_kernel+0x10/0x10 [ 191.645909] ? __might_sleep+0x95/0x190 [ 191.649886] __sys_socketpair+0x1eb/0x6b0 [ 191.654026] ? SyS_socket+0x30/0x30 [ 191.657646] ? ksys_write+0x1a6/0x250 [ 191.661444] ? SyS_read+0x30/0x30 [ 191.664889] ? mm_fault_error+0x380/0x380 [ 191.669040] SyS_socketpair+0x2c/0x40 [ 191.672832] ? __sys_socketpair+0x6b0/0x6b0 [ 191.677149] do_syscall_64+0x29e/0x9d0 [ 191.681025] ? vmalloc_sync_all+0x30/0x30 [ 191.685161] ? _raw_spin_unlock_irq+0x27/0x70 [ 191.689649] ? finish_task_switch+0x1ca/0x810 [ 191.694140] ? syscall_return_slowpath+0x5c0/0x5c0 [ 191.699062] ? syscall_return_slowpath+0x30f/0x5c0 [ 191.703995] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 191.709359] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 191.714201] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 191.719381] RIP: 0033:0x455329 2018/04/18 07:41:23 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000f97ff8)) socketpair(0x8, 0x0, 0x112, &(0x7f00000001c0)) 2018/04/18 07:41:23 executing program 3: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000000)=@in={0x2, 0x4e23, @multicast2=0xe0000002}, 0x80, &(0x7f0000000200), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="300000000000000000000000070000008921eeb35cd8bd7fcc0c1b988e1c9d86c39351f17f9b04b22b00000000000000"], 0x30}, 0x0) 2018/04/18 07:41:23 executing program 2: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004, 0x4000009d}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x59616d61, 0xffffffffffffffff, 0x1, &(0x7f0000000000)) socketpair$inet_icmp(0x59616d61, 0xffffffffffffffff, 0x1, &(0x7f0000000000)) 2018/04/18 07:41:23 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000f97ff8)) socketpair(0x8, 0x0, 0x112, &(0x7f00000001c0)) [ 191.722557] RSP: 002b:00007f9ecb9f6c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 191.730258] RAX: ffffffffffffffda RBX: 00007f9ecb9f76d4 RCX: 0000000000455329 [ 191.737515] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 000000000000000a [ 191.744773] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 191.752030] R10: 0000000020000100 R11: 0000000000000246 R12: 0000000000000014 [ 191.759289] R13: 000000000000063f R14: 00000000006fc688 R15: 0000000000000002 [ 191.766967] socket: no more sockets 2018/04/18 07:41:24 executing program 3: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000000)=@in={0x2, 0x4e23, @multicast2=0xe0000002}, 0x80, &(0x7f0000000200), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="300000000000000000000000070000008921eeb35cd8bd7fcc0c1b988e1c9d86c39351f17f9b04b22b00000000000000"], 0x30}, 0x0) 2018/04/18 07:41:24 executing program 1: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x100}, 0x2c) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x9) close(r0) gettid() socket$kcm(0x29, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r1}, 0x10) 2018/04/18 07:41:24 executing program 7 (fault-call:4 fault-nth:1): mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/18 07:41:24 executing program 0 (fault-call:1 fault-nth:3): perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000100)) 2018/04/18 07:41:24 executing program 1: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x100}, 0x2c) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x9) close(r0) gettid() r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={r2, 0x28, &(0x7f0000000740)}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r3}, 0x10) 2018/04/18 07:41:24 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x9) close(0xffffffffffffffff) gettid() socket$kcm(0x29, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0x0, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r0, 0x9}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={r1, 0x28, &(0x7f0000000740)}, 0x10) perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r2}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r3}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/18 07:41:24 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000f97ff8)) socketpair(0x8, 0x0, 0x112, &(0x7f00000001c0)) 2018/04/18 07:41:24 executing program 2: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004, 0x4000009d}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x59616d61, 0xffffffffffffffff, 0x1, &(0x7f0000000000)) socketpair$inet_icmp(0x59616d61, 0xffffffffffffffff, 0x1, &(0x7f0000000000)) 2018/04/18 07:41:24 executing program 3: r0 = socket$kcm(0x2, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000740)={&(0x7f0000000000)=@in={0x2, 0x4e23, @multicast2=0xe0000002}, 0x80, &(0x7f0000000200), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="300000000000000000000000070000008921eeb35cd8bd7fcc0c1b988e1c9d86c39351f17f9b04b22b00000000000000"], 0x30}, 0x0) [ 192.120198] FAULT_INJECTION: forcing a failure. [ 192.120198] name failslab, interval 1, probability 0, space 0, times 0 [ 192.131522] CPU: 1 PID: 17705 Comm: syz-executor7 Not tainted 4.16.0+ #3 [ 192.138376] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 192.147736] Call Trace: [ 192.150342] dump_stack+0x1b9/0x294 [ 192.153994] ? dump_stack_print_info.cold.2+0x52/0x52 [ 192.159211] ? perf_trace_lock_acquire+0xe3/0x980 [ 192.164081] should_fail.cold.4+0xa/0x1a 2018/04/18 07:41:24 executing program 5: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0xc1}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0xffffffffffffff11, &(0x7f00001a7f05)=""/251}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x7a}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=ANY=[@ANYBLOB="18000000000000000000000000000000711000000002000000000000000000001a0eadd600000000"], &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r1, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f0000000000)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x13, 0x730000, 0x705000, &(0x7f0000000180)) [ 192.168168] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 192.173296] ? save_stack+0x43/0xd0 [ 192.176936] ? kasan_kmalloc+0xc4/0xe0 [ 192.180834] ? __kmalloc_track_caller+0x14a/0x760 [ 192.185688] ? memdup_user+0x2c/0xa0 [ 192.189407] ? strndup_user+0x77/0xd0 [ 192.193201] ? graph_lock+0x170/0x170 [ 192.197002] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 192.202362] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 192.207899] ? proc_fail_nth_write+0x96/0x1f0 [ 192.212387] ? proc_cwd_link+0x1d0/0x1d0 [ 192.216439] ? find_held_lock+0x36/0x1c0 [ 192.220499] ? check_same_owner+0x320/0x320 [ 192.224808] ? lock_release+0xa10/0xa10 [ 192.228791] ? rcu_note_context_switch+0x710/0x710 [ 192.233711] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 192.238715] ? __check_object_size+0x95/0x5d9 [ 192.243203] __should_failslab+0x124/0x180 [ 192.247426] should_failslab+0x9/0x14 [ 192.251210] __kmalloc_track_caller+0x2c4/0x760 [ 192.255869] ? strncpy_from_user+0x500/0x500 [ 192.260266] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 192.265788] ? strndup_user+0x77/0xd0 [ 192.269574] memdup_user+0x2c/0xa0 [ 192.273202] strndup_user+0x77/0xd0 [ 192.276816] ksys_mount+0x73/0x140 [ 192.280343] SyS_mount+0x35/0x50 [ 192.283699] ? ksys_mount+0x140/0x140 [ 192.287487] do_syscall_64+0x29e/0x9d0 [ 192.291362] ? vmalloc_sync_all+0x30/0x30 [ 192.295494] ? _raw_spin_unlock_irq+0x27/0x70 [ 192.299980] ? finish_task_switch+0x1ca/0x810 [ 192.304475] ? syscall_return_slowpath+0x5c0/0x5c0 [ 192.309389] ? syscall_return_slowpath+0x30f/0x5c0 [ 192.314308] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 192.319661] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 192.324491] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 192.329665] RIP: 0033:0x455329 [ 192.332837] RSP: 002b:00007fdcd2ef2c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 192.340529] RAX: ffffffffffffffda RBX: 00007fdcd2ef36d4 RCX: 0000000000455329 [ 192.347781] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 192.355035] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 192.362288] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 192.369549] R13: 00000000000003fb R14: 00000000006f9028 R15: 0000000000000001 [ 192.397485] FAULT_INJECTION: forcing a failure. [ 192.397485] name failslab, interval 1, probability 0, space 0, times 0 [ 192.408903] CPU: 0 PID: 17720 Comm: syz-executor0 Not tainted 4.16.0+ #3 [ 192.415782] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 192.425154] Call Trace: [ 192.427773] dump_stack+0x1b9/0x294 [ 192.431436] ? dump_stack_print_info.cold.2+0x52/0x52 [ 192.436650] ? perf_trace_lock_acquire+0xe3/0x980 [ 192.441525] should_fail.cold.4+0xa/0x1a [ 192.445595] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 192.450722] ? print_usage_bug+0xc0/0xc0 [ 192.454782] ? print_usage_bug+0xc0/0xc0 [ 192.458845] ? find_held_lock+0x36/0x1c0 [ 192.462928] ? check_same_owner+0x320/0x320 [ 192.467250] ? rcu_note_context_switch+0x710/0x710 [ 192.472169] ? perf_tp_event+0xc30/0xc30 [ 192.476227] __should_failslab+0x124/0x180 [ 192.480456] should_failslab+0x9/0x14 [ 192.484253] kmem_cache_alloc+0x2af/0x760 [ 192.488400] ? perf_trace_lock+0x495/0x900 [ 192.492631] sk_prot_alloc+0x69/0x2e0 [ 192.496432] sk_alloc+0x104/0x17b0 [ 192.499976] ? sock_def_error_report+0x710/0x710 [ 192.504730] ? graph_lock+0x170/0x170 [ 192.508540] ? perf_trace_lock+0x495/0x900 [ 192.512768] ? perf_trace_lock_acquire+0xe3/0x980 [ 192.517611] ? find_held_lock+0x36/0x1c0 [ 192.521678] ? lock_downgrade+0x8e0/0x8e0 [ 192.525833] ? rcu_is_watching+0x85/0x140 [ 192.529987] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 192.535166] ? find_held_lock+0x36/0x1c0 [ 192.539239] inet6_create+0x4f0/0x1240 [ 192.543131] ? inet6_net_init+0x870/0x870 [ 192.547281] ? rcu_is_watching+0x85/0x140 [ 192.551423] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 192.556620] __sock_create+0x526/0x920 [ 192.560508] ? kernel_sock_ip_overhead+0x570/0x570 [ 192.565441] ? __might_sleep+0x95/0x190 [ 192.569414] __sys_socketpair+0x1eb/0x6b0 [ 192.573555] ? SyS_socket+0x30/0x30 [ 192.577177] ? ksys_write+0x1a6/0x250 [ 192.580981] ? SyS_read+0x30/0x30 [ 192.584425] ? mm_fault_error+0x380/0x380 [ 192.588573] SyS_socketpair+0x2c/0x40 [ 192.592363] ? __sys_socketpair+0x6b0/0x6b0 [ 192.596682] do_syscall_64+0x29e/0x9d0 [ 192.600562] ? vmalloc_sync_all+0x30/0x30 [ 192.604722] ? _raw_spin_unlock_irq+0x27/0x70 [ 192.609209] ? finish_task_switch+0x1ca/0x810 [ 192.613701] ? syscall_return_slowpath+0x5c0/0x5c0 [ 192.618627] ? syscall_return_slowpath+0x30f/0x5c0 [ 192.623555] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 192.628915] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 192.633759] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 192.638936] RIP: 0033:0x455329 [ 192.642123] RSP: 002b:00007f9ecb9f6c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 192.649826] RAX: ffffffffffffffda RBX: 00007f9ecb9f76d4 RCX: 0000000000455329 [ 192.657087] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 000000000000000a [ 192.664346] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 2018/04/18 07:41:25 executing program 1: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x100}, 0x2c) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x9) close(r0) gettid() r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={r2, 0x28, &(0x7f0000000740)}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r3}, 0x10) 2018/04/18 07:41:25 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000f97ff8)) socketpair(0x8, 0x5, 0x0, &(0x7f00000001c0)) 2018/04/18 07:41:25 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x9) close(0xffffffffffffffff) gettid() socket$kcm(0x29, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0x0, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r0, 0x9}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={r1, 0x28, &(0x7f0000000740)}, 0x10) perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r2}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r3}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) [ 192.671604] R10: 0000000020000100 R11: 0000000000000246 R12: 0000000000000014 [ 192.678861] R13: 000000000000063f R14: 00000000006fc688 R15: 0000000000000003 2018/04/18 07:41:25 executing program 3: r0 = socket$kcm(0x2, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000740)={&(0x7f0000000000)=@in={0x2, 0x4e23, @multicast2=0xe0000002}, 0x80, &(0x7f0000000200), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="300000000000000000000000070000008921eeb35cd8bd7fcc0c1b988e1c9d86c39351f17f9b04b22b00000000000000"], 0x30}, 0x0) 2018/04/18 07:41:25 executing program 7 (fault-call:4 fault-nth:2): mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/18 07:41:25 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000000080)) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0xb, 0x0, 0x0, 0x4, 0x2}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r1, 0x50, &(0x7f00000000c0)}, 0x10) r2 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) socketpair$inet_icmp(0x6f2000, 0x400000, 0x400008, &(0x7f0000000480)) close(r2) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3ff) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000180)={0x3, 0x0, [0x0, 0x0, 0x0]}) 2018/04/18 07:41:25 executing program 6 (fault-call:2 fault-nth:0): perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000f97ff8)) socketpair(0x8, 0x5, 0x0, &(0x7f00000001c0)) 2018/04/18 07:41:25 executing program 1: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x100}, 0x2c) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x9) close(r0) gettid() r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={r2, 0x28, &(0x7f0000000740)}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r3}, 0x10) 2018/04/18 07:41:25 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x9) close(0xffffffffffffffff) gettid() socket$kcm(0x29, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x0, 0xffffffffffff36f1, 0x1ff, 0x18, r0, 0x9}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={r1, 0x28, &(0x7f0000000740)}, 0x10) perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r2}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r3}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/18 07:41:25 executing program 3: r0 = socket$kcm(0x2, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000740)={&(0x7f0000000000)=@in={0x2, 0x4e23, @multicast2=0xe0000002}, 0x80, &(0x7f0000000200), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="300000000000000000000000070000008921eeb35cd8bd7fcc0c1b988e1c9d86c39351f17f9b04b22b00000000000000"], 0x30}, 0x0) 2018/04/18 07:41:25 executing program 0 (fault-call:1 fault-nth:4): perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000100)) 2018/04/18 07:41:25 executing program 2: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004, 0x4000009d}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x59616d61, 0xffffffffffffffff, 0x1, &(0x7f0000000000)) socketpair$inet_icmp(0x59616d61, 0xffffffffffffffff, 0x1, &(0x7f0000000000)) [ 192.979465] FAULT_INJECTION: forcing a failure. [ 192.979465] name failslab, interval 1, probability 0, space 0, times 0 [ 192.990793] CPU: 1 PID: 17749 Comm: syz-executor6 Not tainted 4.16.0+ #3 [ 192.997646] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 193.007092] Call Trace: [ 193.009697] dump_stack+0x1b9/0x294 [ 193.013341] ? dump_stack_print_info.cold.2+0x52/0x52 [ 193.018545] ? perf_trace_lock_acquire+0xe3/0x980 [ 193.023399] ? zap_class+0x720/0x720 [ 193.027134] should_fail.cold.4+0xa/0x1a [ 193.031224] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 193.036356] ? perf_trace_lock+0xd6/0x900 [ 193.040543] ? find_held_lock+0x36/0x1c0 [ 193.044629] ? check_same_owner+0x320/0x320 [ 193.048949] ? rcu_note_context_switch+0x710/0x710 [ 193.053883] __should_failslab+0x124/0x180 [ 193.058111] should_failslab+0x9/0x14 [ 193.061900] kmem_cache_alloc+0x2af/0x760 [ 193.066036] ? zap_class+0x720/0x720 [ 193.069748] sock_alloc_inode+0x6f/0x300 [ 193.073796] ? sock_destroy_inode+0x70/0x70 [ 193.078100] ? graph_lock+0x170/0x170 [ 193.081891] ? sock_destroy_inode+0x70/0x70 [ 193.086201] alloc_inode+0x63/0x190 [ 193.089814] new_inode_pseudo+0x69/0x1a0 [ 193.093859] ? prune_icache_sb+0x1a0/0x1a0 [ 193.098078] ? find_held_lock+0x36/0x1c0 [ 193.102132] sock_alloc+0x41/0x270 [ 193.105660] __sock_create+0x161/0x920 [ 193.109545] ? kernel_sock_ip_overhead+0x570/0x570 [ 193.114467] ? __might_sleep+0x95/0x190 [ 193.118439] __sys_socketpair+0x1eb/0x6b0 [ 193.122577] ? SyS_socket+0x30/0x30 [ 193.126202] ? ksys_write+0x1a6/0x250 [ 193.130000] ? SyS_read+0x30/0x30 [ 193.133440] ? mm_fault_error+0x380/0x380 [ 193.137579] SyS_socketpair+0x2c/0x40 [ 193.141368] ? __sys_socketpair+0x6b0/0x6b0 [ 193.145678] do_syscall_64+0x29e/0x9d0 [ 193.149549] ? vmalloc_sync_all+0x30/0x30 [ 193.153681] ? _raw_spin_unlock_irq+0x27/0x70 [ 193.158177] ? finish_task_switch+0x1ca/0x810 [ 193.162663] ? syscall_return_slowpath+0x5c0/0x5c0 [ 193.167578] ? syscall_return_slowpath+0x30f/0x5c0 [ 193.172498] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 193.177853] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 193.182685] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 193.187860] RIP: 0033:0x455329 [ 193.191033] RSP: 002b:00007f3a54620c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 193.198727] RAX: ffffffffffffffda RBX: 00007f3a546216d4 RCX: 0000000000455329 [ 193.205995] RDX: 0000000000000000 RSI: 0000000000000005 RDI: 0000000000000008 [ 193.213248] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 193.220502] R10: 00000000200001c0 R11: 0000000000000246 R12: 0000000000000014 [ 193.227760] R13: 0000000000000636 R14: 00000000006fc5b0 R15: 0000000000000000 [ 193.235213] socket: no more sockets [ 193.246440] FAULT_INJECTION: forcing a failure. [ 193.246440] name failslab, interval 1, probability 0, space 0, times 0 [ 193.257760] CPU: 0 PID: 17746 Comm: syz-executor7 Not tainted 4.16.0+ #3 [ 193.259483] FAULT_INJECTION: forcing a failure. [ 193.259483] name failslab, interval 1, probability 0, space 0, times 0 [ 193.264604] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 193.264613] Call Trace: [ 193.264639] dump_stack+0x1b9/0x294 [ 193.264661] ? dump_stack_print_info.cold.2+0x52/0x52 [ 193.264685] ? perf_trace_lock_acquire+0xe3/0x980 [ 193.301396] should_fail.cold.4+0xa/0x1a [ 193.305464] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 193.310564] ? kasan_kmalloc+0xc4/0xe0 [ 193.314443] ? __kmalloc_track_caller+0x14a/0x760 [ 193.319281] ? memdup_user+0x2c/0xa0 [ 193.322989] ? strndup_user+0x77/0xd0 [ 193.326785] ? graph_lock+0x170/0x170 [ 193.330586] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 193.336121] ? proc_fail_nth_write+0x96/0x1f0 [ 193.340615] ? find_held_lock+0x36/0x1c0 [ 193.344699] ? check_same_owner+0x320/0x320 [ 193.349013] ? lock_release+0xa10/0xa10 [ 193.352985] ? rcu_note_context_switch+0x710/0x710 [ 193.357907] ? __check_object_size+0x95/0x5d9 [ 193.362400] __should_failslab+0x124/0x180 [ 193.366630] should_failslab+0x9/0x14 [ 193.370425] kmem_cache_alloc_trace+0x2cb/0x780 [ 193.375092] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 193.380623] ? _copy_from_user+0xdf/0x150 [ 193.384785] copy_mount_options+0x5f/0x380 [ 193.389019] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 193.394552] ksys_mount+0xd0/0x140 [ 193.398087] SyS_mount+0x35/0x50 [ 193.401444] ? ksys_mount+0x140/0x140 [ 193.405242] do_syscall_64+0x29e/0x9d0 [ 193.409126] ? vmalloc_sync_all+0x30/0x30 [ 193.413276] ? _raw_spin_unlock_irq+0x27/0x70 [ 193.417766] ? finish_task_switch+0x1ca/0x810 [ 193.422259] ? syscall_return_slowpath+0x5c0/0x5c0 [ 193.427185] ? syscall_return_slowpath+0x30f/0x5c0 [ 193.432199] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 193.437563] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 193.442404] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 193.447586] RIP: 0033:0x455329 [ 193.450767] RSP: 002b:00007fdcd2ef2c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 193.458469] RAX: ffffffffffffffda RBX: 00007fdcd2ef36d4 RCX: 0000000000455329 [ 193.465731] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 193.472992] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 2018/04/18 07:41:25 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x2}, 0x2c) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r0) socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x84, 0x6, &(0x7f0000000180), 0x84) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000000)) [ 193.480252] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 193.487512] R13: 00000000000003fb R14: 00000000006f9028 R15: 0000000000000002 [ 193.494795] CPU: 1 PID: 17764 Comm: syz-executor0 Not tainted 4.16.0+ #3 [ 193.501641] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 193.511001] Call Trace: [ 193.513602] dump_stack+0x1b9/0x294 [ 193.517247] ? dump_stack_print_info.cold.2+0x52/0x52 [ 193.522445] ? perf_trace_lock_acquire+0xe3/0x980 [ 193.527311] should_fail.cold.4+0xa/0x1a 2018/04/18 07:41:25 executing program 5: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001200)={&(0x7f00000011c0)='./file0\x00', 0x0, 0x8}, 0x10) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000001300)={r0, &(0x7f0000001240)="45f916", &(0x7f0000001280)=""/121}, 0x18) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x125}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000001500)={r0, &(0x7f0000001340)="ba0e66ca451f39b155a0d4e0826a5e724d12170c3348f5f3e21d0d028e92356dd084dd7c29be3f5248ff92bae0688849902873f7ea8de94886f12c6d78fc6e43a3a103607fdb42d2624e2e251e64068b6ec98bb95779b8fa5b1828a15a957dd8a6e1c81edd1e02d13fb7484837f04c61a4f59ed2170d8678aaa347057beb5b35835cf2875d2c5bcfa35a1a5ceacdf00579501e3e018d0fd44c8a8592274b4229384c3f5f564d6eb149fa00458f9a08ebfbcb3718f66e1ceb2404eccddc6b03ed9eede5", &(0x7f0000001440)="597c0a276f6dd58b5cb9c2e4e26a27d98d6464fbf7d0432eba0532e96076eab5298dd309c20ad174f3b7c33eb3ff6104e3559167057415e93bb16a05de72d811447901919afee11f79423d7d814dfafd8a8a8cd670e5f0058347bc18ee7ae6a3d7a8136c55d1201d654943ad9642aa001caeef5bfa7ab80f19b6d8cf5da773ad6954b7a4e97c8c131a5a893d5df36f5aca94612718d0d8b97a76e8c428627a3d", 0x2}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r2, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0xb, 0xfffffffc, 0xcce0ecd, &(0x7f0000000180)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r1, &(0x7f0000000000)="19131f5e7210c97713185526723d50d14f93e2a081a0afba5dd4f33a310b691bb6b91de0d93e9e35839b84359b03fbc4aa5b795c8ae92cda2f46c38929a9", &(0x7f00000001c0)="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"}, 0x20) [ 193.531392] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 193.536510] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 193.541711] ? kasan_check_read+0x11/0x20 [ 193.545956] ? rcu_is_watching+0x85/0x140 [ 193.550121] ? find_held_lock+0x36/0x1c0 [ 193.554223] ? check_same_owner+0x320/0x320 [ 193.558548] ? __lockdep_init_map+0x105/0x590 [ 193.563053] ? rcu_note_context_switch+0x710/0x710 [ 193.567996] __should_failslab+0x124/0x180 [ 193.572246] should_failslab+0x9/0x14 [ 193.576052] kmem_cache_alloc+0x2af/0x760 [ 193.580205] ? __raw_spin_lock_init+0x1c/0x100 [ 193.584798] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 193.589834] sock_alloc_inode+0x6f/0x300 [ 193.593910] ? sock_destroy_inode+0x70/0x70 [ 193.598244] ? udp_init_sock+0x30/0x100 [ 193.602233] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 193.607779] ? inet6_create+0xc04/0x1240 [ 193.611844] ? sock_destroy_inode+0x70/0x70 [ 193.616157] alloc_inode+0x63/0x190 [ 193.619773] new_inode_pseudo+0x69/0x1a0 [ 193.623819] ? prune_icache_sb+0x1a0/0x1a0 [ 193.628479] ? rcu_is_watching+0x85/0x140 [ 193.632618] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 193.637800] sock_alloc+0x41/0x270 [ 193.641328] __sock_create+0x161/0x920 [ 193.645205] ? kernel_sock_ip_overhead+0x570/0x570 [ 193.650127] ? __might_sleep+0x95/0x190 [ 193.654101] __sys_socketpair+0x27b/0x6b0 [ 193.658234] ? SyS_socket+0x30/0x30 [ 193.661861] ? SyS_read+0x30/0x30 [ 193.665299] ? mm_fault_error+0x380/0x380 [ 193.669436] SyS_socketpair+0x2c/0x40 [ 193.673222] ? __sys_socketpair+0x6b0/0x6b0 [ 193.677530] do_syscall_64+0x29e/0x9d0 [ 193.681404] ? vmalloc_sync_all+0x30/0x30 [ 193.685539] ? _raw_spin_unlock_irq+0x27/0x70 [ 193.690022] ? finish_task_switch+0x1ca/0x810 [ 193.694507] ? syscall_return_slowpath+0x5c0/0x5c0 [ 193.699425] ? syscall_return_slowpath+0x30f/0x5c0 [ 193.704346] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 193.709700] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 193.714533] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 193.719710] RIP: 0033:0x455329 [ 193.722887] RSP: 002b:00007f9ecb9f6c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 2018/04/18 07:41:26 executing program 1: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x100}, 0x2c) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x9) close(r0) socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={r2, 0x28, &(0x7f0000000740)}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r3}, 0x10) [ 193.730580] RAX: ffffffffffffffda RBX: 00007f9ecb9f76d4 RCX: 0000000000455329 [ 193.737834] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 000000000000000a [ 193.745086] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 193.752339] R10: 0000000020000100 R11: 0000000000000246 R12: 0000000000000014 [ 193.759593] R13: 000000000000063f R14: 00000000006fc688 R15: 0000000000000004 [ 193.767161] socket: no more sockets 2018/04/18 07:41:26 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x9) close(0xffffffffffffffff) gettid() socket$kcm(0x29, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x0, 0xffffffffffff36f1, 0x1ff, 0x18, r0, 0x9}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={r1, 0x28, &(0x7f0000000740)}, 0x10) perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r2}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r3}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/18 07:41:26 executing program 3: r0 = socket$kcm(0x2, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000000)=@in={0x2, 0x4e23, @multicast2=0xe0000002}, 0x80, &(0x7f0000000200), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="300000000000000000000000070000008921eeb35cd8bd7fcc0c1b988e1c9d86c39351f17f9b04b22b00000000000000"], 0x30}, 0x0) 2018/04/18 07:41:26 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000240)=@in6={0xa, 0x0, 0x0, @loopback={0xfc00000000000000, 0x1}}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000500)="be", 0x1}], 0x1}, 0x40) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1f, 0x0, 0x0, 0x0, 0x1, 0xffffffffffffff9c, 0x4}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0\x00', r0}, 0x10) 2018/04/18 07:41:26 executing program 1: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x100}, 0x2c) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x9) close(r0) socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={r2, 0x28, &(0x7f0000000740)}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r3}, 0x10) 2018/04/18 07:41:26 executing program 7 (fault-call:4 fault-nth:3): mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/18 07:41:26 executing program 6 (fault-call:2 fault-nth:1): perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000f97ff8)) socketpair(0x8, 0x5, 0x0, &(0x7f00000001c0)) 2018/04/18 07:41:26 executing program 0 (fault-call:1 fault-nth:5): perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000100)) 2018/04/18 07:41:26 executing program 2 (fault-call:5 fault-nth:0): bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004, 0x4000009d}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x59616d61, 0xffffffffffffffff, 0x1, &(0x7f0000000000)) socketpair$inet_icmp(0x59616d61, 0xffffffffffffffff, 0x1, &(0x7f0000000000)) [ 193.993898] FAULT_INJECTION: forcing a failure. [ 193.993898] name failslab, interval 1, probability 0, space 0, times 0 [ 194.002947] FAULT_INJECTION: forcing a failure. [ 194.002947] name failslab, interval 1, probability 0, space 0, times 0 [ 194.005211] CPU: 0 PID: 17793 Comm: syz-executor7 Not tainted 4.16.0+ #3 [ 194.023208] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 194.032555] Call Trace: [ 194.035147] dump_stack+0x1b9/0x294 [ 194.038776] ? dump_stack_print_info.cold.2+0x52/0x52 [ 194.043959] ? perf_trace_lock_acquire+0xe3/0x980 [ 194.048799] ? find_held_lock+0x36/0x1c0 [ 194.052866] should_fail.cold.4+0xa/0x1a [ 194.056928] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 194.062035] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 194.067226] ? find_held_lock+0x36/0x1c0 [ 194.071306] ? check_same_owner+0x320/0x320 [ 194.075629] ? rcu_note_context_switch+0x710/0x710 [ 194.080558] ? save_stack+0xa9/0xd0 [ 194.084182] __should_failslab+0x124/0x180 [ 194.088414] should_failslab+0x9/0x14 [ 194.092210] kmem_cache_alloc+0x2af/0x760 [ 194.096361] getname_flags+0xd0/0x5a0 [ 194.100162] user_path_at_empty+0x2d/0x50 [ 194.104307] do_mount+0x172/0x3070 [ 194.107847] ? copy_mount_string+0x40/0x40 [ 194.112077] ? rcu_pm_notify+0xc0/0xc0 [ 194.115967] ? copy_mount_options+0x5f/0x380 [ 194.120372] ? rcu_read_lock_sched_held+0x108/0x120 [ 194.125384] ? kmem_cache_alloc_trace+0x616/0x780 [ 194.130225] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 194.135755] ? _copy_from_user+0xdf/0x150 [ 194.139904] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 194.145434] ? copy_mount_options+0x285/0x380 [ 194.149930] ksys_mount+0x12d/0x140 [ 194.153551] SyS_mount+0x35/0x50 [ 194.156909] ? ksys_mount+0x140/0x140 [ 194.160706] do_syscall_64+0x29e/0x9d0 [ 194.164590] ? vmalloc_sync_all+0x30/0x30 [ 194.168732] ? _raw_spin_unlock_irq+0x27/0x70 [ 194.173226] ? finish_task_switch+0x1ca/0x810 [ 194.177716] ? syscall_return_slowpath+0x5c0/0x5c0 [ 194.182646] ? syscall_return_slowpath+0x30f/0x5c0 [ 194.187575] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 194.192936] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 194.197780] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 194.202962] RIP: 0033:0x455329 [ 194.206145] RSP: 002b:00007fdcd2ef2c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 194.213850] RAX: ffffffffffffffda RBX: 00007fdcd2ef36d4 RCX: 0000000000455329 [ 194.221112] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 194.228373] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 194.235635] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 194.242899] R13: 00000000000003fb R14: 00000000006f9028 R15: 0000000000000003 [ 194.250184] CPU: 1 PID: 17794 Comm: syz-executor6 Not tainted 4.16.0+ #3 [ 194.257031] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 194.266387] Call Trace: [ 194.268974] dump_stack+0x1b9/0x294 [ 194.272604] ? dump_stack_print_info.cold.2+0x52/0x52 [ 194.277787] ? perf_trace_lock_acquire+0xe3/0x980 [ 194.282630] ? __save_stack_trace+0x7e/0xd0 [ 194.286948] should_fail.cold.4+0xa/0x1a [ 194.291005] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 194.296096] ? save_stack+0x43/0xd0 [ 194.299711] ? kasan_kmalloc+0xc4/0xe0 [ 194.303584] ? kasan_slab_alloc+0x12/0x20 [ 194.307715] ? kmem_cache_alloc+0x12e/0x760 [ 194.312025] ? sock_alloc_inode+0x6f/0x300 [ 194.316245] ? alloc_inode+0x63/0x190 [ 194.320035] ? new_inode_pseudo+0x69/0x1a0 [ 194.324253] ? __sock_create+0x161/0x920 [ 194.328297] ? __sys_socketpair+0x1eb/0x6b0 [ 194.332603] ? do_syscall_64+0x29e/0x9d0 [ 194.336649] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 194.342007] ? find_held_lock+0x36/0x1c0 [ 194.346072] ? check_same_owner+0x320/0x320 [ 194.350378] ? rcu_is_watching+0x85/0x140 [ 194.354511] ? rcu_note_context_switch+0x710/0x710 [ 194.359432] __should_failslab+0x124/0x180 [ 194.363655] should_failslab+0x9/0x14 [ 194.367448] kmem_cache_alloc_trace+0x2cb/0x780 [ 194.372100] ? kmem_cache_alloc+0x5fa/0x760 [ 194.376406] ? zap_class+0x720/0x720 [ 194.380460] sock_alloc_inode+0xb3/0x300 [ 194.384507] ? sock_destroy_inode+0x70/0x70 [ 194.388811] ? graph_lock+0x170/0x170 [ 194.392609] ? sock_destroy_inode+0x70/0x70 [ 194.396916] alloc_inode+0x63/0x190 [ 194.400530] new_inode_pseudo+0x69/0x1a0 [ 194.404578] ? prune_icache_sb+0x1a0/0x1a0 [ 194.408796] ? find_held_lock+0x36/0x1c0 [ 194.412848] sock_alloc+0x41/0x270 [ 194.416373] __sock_create+0x161/0x920 [ 194.420252] ? kernel_sock_ip_overhead+0x570/0x570 [ 194.425171] ? __might_sleep+0x95/0x190 [ 194.429143] __sys_socketpair+0x1eb/0x6b0 [ 194.433278] ? SyS_socket+0x30/0x30 [ 194.436893] ? ksys_write+0x1a6/0x250 [ 194.440682] ? SyS_read+0x30/0x30 [ 194.444120] ? mm_fault_error+0x380/0x380 [ 194.448256] ? syscall_slow_exit_work+0x4f0/0x4f0 [ 194.453090] SyS_socketpair+0x2c/0x40 [ 194.456878] ? __sys_socketpair+0x6b0/0x6b0 [ 194.461187] do_syscall_64+0x29e/0x9d0 [ 194.465057] ? vmalloc_sync_all+0x30/0x30 [ 194.469189] ? finish_task_switch+0x1ca/0x810 [ 194.473671] ? syscall_return_slowpath+0x5c0/0x5c0 [ 194.478585] ? syscall_return_slowpath+0x30f/0x5c0 [ 194.483506] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 194.488861] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 194.493693] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 194.498864] RIP: 0033:0x455329 [ 194.502039] RSP: 002b:00007f3a54620c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 194.509732] RAX: ffffffffffffffda RBX: 00007f3a546216d4 RCX: 0000000000455329 [ 194.516990] RDX: 0000000000000000 RSI: 0000000000000005 RDI: 0000000000000008 [ 194.524243] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 194.531498] R10: 00000000200001c0 R11: 0000000000000246 R12: 0000000000000014 [ 194.538753] R13: 0000000000000636 R14: 00000000006fc5b0 R15: 0000000000000001 [ 194.546262] socket: no more sockets [ 194.581424] FAULT_INJECTION: forcing a failure. [ 194.581424] name failslab, interval 1, probability 0, space 0, times 0 [ 194.592875] CPU: 0 PID: 17802 Comm: syz-executor0 Not tainted 4.16.0+ #3 [ 194.599738] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 194.609111] Call Trace: [ 194.611723] dump_stack+0x1b9/0x294 [ 194.615384] ? dump_stack_print_info.cold.2+0x52/0x52 [ 194.620601] ? perf_trace_lock_acquire+0xe3/0x980 [ 194.625500] should_fail.cold.4+0xa/0x1a [ 194.629600] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 194.634734] ? save_stack+0x43/0xd0 [ 194.638354] ? kasan_kmalloc+0xc4/0xe0 [ 194.642242] ? kmem_cache_alloc+0x12e/0x760 [ 194.646559] ? sock_alloc_inode+0x6f/0x300 [ 194.650783] ? alloc_inode+0x63/0x190 [ 194.654575] ? new_inode_pseudo+0x69/0x1a0 [ 194.658807] ? __sock_create+0x161/0x920 [ 194.662855] ? __sys_socketpair+0x27b/0x6b0 [ 194.667169] ? do_syscall_64+0x29e/0x9d0 [ 194.671221] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 194.676586] ? find_held_lock+0x36/0x1c0 [ 194.680672] ? check_same_owner+0x320/0x320 [ 194.684991] ? rcu_is_watching+0x85/0x140 [ 194.689133] ? rcu_note_context_switch+0x710/0x710 [ 194.694064] __should_failslab+0x124/0x180 [ 194.698295] should_failslab+0x9/0x14 [ 194.702089] kmem_cache_alloc_trace+0x2cb/0x780 [ 194.706749] ? kmem_cache_alloc+0x5fa/0x760 [ 194.711061] ? __raw_spin_lock_init+0x1c/0x100 [ 194.715659] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 194.720678] sock_alloc_inode+0xb3/0x300 [ 194.724735] ? sock_destroy_inode+0x70/0x70 [ 194.729054] ? udp_init_sock+0x30/0x100 [ 194.733030] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 194.738560] ? inet6_create+0xc04/0x1240 [ 194.742615] ? sock_destroy_inode+0x70/0x70 [ 194.746935] alloc_inode+0x63/0x190 [ 194.750563] new_inode_pseudo+0x69/0x1a0 [ 194.754616] ? prune_icache_sb+0x1a0/0x1a0 [ 194.758841] ? rcu_is_watching+0x85/0x140 [ 194.762990] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 194.768180] sock_alloc+0x41/0x270 [ 194.771714] __sock_create+0x161/0x920 [ 194.775603] ? kernel_sock_ip_overhead+0x570/0x570 [ 194.780536] ? __might_sleep+0x95/0x190 [ 194.784510] __sys_socketpair+0x27b/0x6b0 [ 194.788659] ? SyS_socket+0x30/0x30 [ 194.792287] ? SyS_read+0x30/0x30 [ 194.796430] ? mm_fault_error+0x380/0x380 [ 194.800585] SyS_socketpair+0x2c/0x40 [ 194.804375] ? __sys_socketpair+0x6b0/0x6b0 [ 194.808689] do_syscall_64+0x29e/0x9d0 [ 194.812573] ? vmalloc_sync_all+0x30/0x30 [ 194.816717] ? kasan_check_write+0x14/0x20 [ 194.820946] ? syscall_return_slowpath+0x5c0/0x5c0 [ 194.825873] ? syscall_return_slowpath+0x30f/0x5c0 [ 194.830808] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 194.836343] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 194.841186] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 194.846364] RIP: 0033:0x455329 [ 194.849549] RSP: 002b:00007f9ecb9f6c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 194.857254] RAX: ffffffffffffffda RBX: 00007f9ecb9f76d4 RCX: 0000000000455329 [ 194.864513] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 000000000000000a [ 194.871771] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 2018/04/18 07:41:27 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x9) close(0xffffffffffffffff) gettid() socket$kcm(0x29, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x0, 0x0, 0x1ff, 0x18, r0, 0x9}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={r1, 0x28, &(0x7f0000000740)}, 0x10) perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r2}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r3}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/18 07:41:27 executing program 3: r0 = socket$kcm(0x2, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000000)=@in={0x2, 0x4e23, @multicast2=0xe0000002}, 0x80, &(0x7f0000000200), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="300000000000000000000000070000008921eeb35cd8bd7fcc0c1b988e1c9d86c39351f17f9b04b22b00000000000000"], 0x30}, 0x0) 2018/04/18 07:41:27 executing program 7 (fault-call:4 fault-nth:4): mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) [ 194.879032] R10: 0000000020000100 R11: 0000000000000246 R12: 0000000000000014 [ 194.886289] R13: 000000000000063f R14: 00000000006fc688 R15: 0000000000000005 [ 194.893886] socket: no more sockets 2018/04/18 07:41:27 executing program 5: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)=0xffffffff, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000340)={&(0x7f00000002c0)='./file0\x00', r0}, 0x10) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', 0x0, 0x18}, 0x10) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r1, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849b5f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004, 0x4000009f}, 0xfffffffffffffe77) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f00000001c0), &(0x7f0000000000)="fa03"}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r2, 0x50, &(0x7f00000000c0)}, 0xfffffffffffffd61) socketpair$inet_icmp(0x20000000, 0x2, 0x1, &(0x7f0000000180)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000280)={&(0x7f0000000240)='./file0\x00', 0x0, 0x8}, 0x10) [ 195.040768] FAULT_INJECTION: forcing a failure. [ 195.040768] name failslab, interval 1, probability 0, space 0, times 0 [ 195.052072] CPU: 0 PID: 17817 Comm: syz-executor7 Not tainted 4.16.0+ #3 [ 195.058920] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 195.068284] Call Trace: [ 195.070887] dump_stack+0x1b9/0x294 [ 195.074526] ? dump_stack_print_info.cold.2+0x52/0x52 [ 195.079709] ? perf_trace_lock_acquire+0xe3/0x980 [ 195.084540] ? find_held_lock+0x36/0x1c0 [ 195.088598] should_fail.cold.4+0xa/0x1a [ 195.092655] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 195.097754] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 195.102942] ? find_held_lock+0x36/0x1c0 [ 195.107022] ? check_same_owner+0x320/0x320 [ 195.111338] ? rcu_note_context_switch+0x710/0x710 [ 195.116255] ? save_stack+0xa9/0xd0 [ 195.119876] __should_failslab+0x124/0x180 [ 195.124102] should_failslab+0x9/0x14 [ 195.127891] kmem_cache_alloc+0x2af/0x760 [ 195.132029] ? find_held_lock+0x36/0x1c0 [ 195.136087] getname_flags+0xd0/0x5a0 [ 195.139879] user_path_at_empty+0x2d/0x50 [ 195.144019] do_mount+0x172/0x3070 [ 195.147549] ? do_raw_spin_unlock+0x9e/0x2e0 [ 195.151948] ? copy_mount_string+0x40/0x40 [ 195.156172] ? rcu_pm_notify+0xc0/0xc0 [ 195.160055] ? copy_mount_options+0x5f/0x380 [ 195.164448] ? rcu_read_lock_sched_held+0x108/0x120 [ 195.169450] ? kmem_cache_alloc_trace+0x616/0x780 [ 195.174282] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 195.179812] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 195.185338] ? copy_mount_options+0x285/0x380 [ 195.189825] ksys_mount+0x12d/0x140 [ 195.193440] SyS_mount+0x35/0x50 [ 195.196806] ? ksys_mount+0x140/0x140 [ 195.200599] do_syscall_64+0x29e/0x9d0 [ 195.204478] ? vmalloc_sync_all+0x30/0x30 [ 195.208613] ? _raw_spin_unlock_irq+0x27/0x70 [ 195.213102] ? finish_task_switch+0x1ca/0x810 [ 195.217587] ? syscall_return_slowpath+0x5c0/0x5c0 [ 195.222592] ? syscall_return_slowpath+0x30f/0x5c0 [ 195.227514] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 195.232871] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 195.237709] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 195.242885] RIP: 0033:0x455329 [ 195.246059] RSP: 002b:00007fdcd2ef2c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 195.253759] RAX: ffffffffffffffda RBX: 00007fdcd2ef36d4 RCX: 0000000000455329 [ 195.261015] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 195.268274] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 195.275537] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 195.282790] R13: 00000000000003fb R14: 00000000006f9028 R15: 0000000000000004 2018/04/18 07:41:27 executing program 3: r0 = socket$kcm(0x2, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000000)=@in={0x2, 0x4e23, @multicast2=0xe0000002}, 0x80, &(0x7f0000000200), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="300000000000000000000000070000008921eeb35cd8bd7fcc0c1b988e1c9d86c39351f17f9b04b22b00000000000000"], 0x30}, 0x0) 2018/04/18 07:41:27 executing program 1: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x100}, 0x2c) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x9) close(r0) socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={r2, 0x28, &(0x7f0000000740)}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r3}, 0x10) 2018/04/18 07:41:27 executing program 6 (fault-call:2 fault-nth:2): perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000f97ff8)) socketpair(0x8, 0x5, 0x0, &(0x7f00000001c0)) 2018/04/18 07:41:27 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x9) close(0xffffffffffffffff) gettid() socket$kcm(0x29, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x0, 0xffffffffffff36f1, 0x0, 0x18, r0, 0x9}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={r1, 0x28, &(0x7f0000000740)}, 0x10) perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r2}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r3}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/18 07:41:27 executing program 5: perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x55}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x730000, 0x2, 0x10, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004, 0x15}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=ANY=[@ANYBLOB="18000000060000000100000000000000711800000000000000000000000000009500000000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r1, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x730000, 0x4, 0x11, &(0x7f0000000080)) 2018/04/18 07:41:27 executing program 2: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004, 0x4000009d}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x59616d61, 0xffffffffffffffff, 0x1, &(0x7f0000000000)) socketpair$inet_icmp(0x59616d61, 0xffffffffffffffff, 0x1, &(0x7f0000000000)) 2018/04/18 07:41:27 executing program 7 (fault-call:4 fault-nth:5): mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/18 07:41:27 executing program 0 (fault-call:1 fault-nth:6): perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000100)) [ 195.446262] FAULT_INJECTION: forcing a failure. [ 195.446262] name failslab, interval 1, probability 0, space 0, times 0 [ 195.457616] CPU: 1 PID: 17842 Comm: syz-executor7 Not tainted 4.16.0+ #3 [ 195.464464] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 195.473825] Call Trace: [ 195.476432] dump_stack+0x1b9/0x294 [ 195.480081] ? dump_stack_print_info.cold.2+0x52/0x52 [ 195.485282] ? perf_trace_lock_acquire+0xe3/0x980 [ 195.490148] should_fail.cold.4+0xa/0x1a 2018/04/18 07:41:27 executing program 3: r0 = socket$kcm(0x2, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000740)={&(0x7f0000000000)=@in={0x2, 0x0, @multicast2=0xe0000002}, 0x80, &(0x7f0000000200), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="300000000000000000000000070000008921eeb35cd8bd7fcc0c1b988e1c9d86c39351f17f9b04b22b00000000000000"], 0x30}, 0x0) 2018/04/18 07:41:27 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x9) close(0xffffffffffffffff) gettid() socket$kcm(0x29, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x0, 0xffffffffffff36f1, 0x0, 0x0, r0, 0x9}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={r1, 0x28, &(0x7f0000000740)}, 0x10) perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r2}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r3}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/18 07:41:27 executing program 3: r0 = socket$kcm(0x2, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000740)={&(0x7f0000000000)=@in={0x2, 0x0, @multicast2=0xe0000002}, 0x80, &(0x7f0000000200), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="300000000000000000000000070000008921eeb35cd8bd7fcc0c1b988e1c9d86c39351f17f9b04b22b00000000000000"], 0x30}, 0x0) [ 195.494225] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 195.499345] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 195.504558] ? is_bpf_text_address+0xd7/0x170 [ 195.509065] ? find_held_lock+0x36/0x1c0 [ 195.513161] ? check_same_owner+0x320/0x320 [ 195.517489] ? kasan_slab_free+0xe/0x10 [ 195.521467] ? kmem_cache_free+0x86/0x2d0 [ 195.525618] ? putname+0xf2/0x130 [ 195.529082] ? rcu_note_context_switch+0x710/0x710 [ 195.534022] ? ksys_mount+0x12d/0x140 [ 195.537829] ? SyS_mount+0x35/0x50 [ 195.541378] ? do_syscall_64+0x29e/0x9d0 2018/04/18 07:41:27 executing program 2: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004, 0x4000009d}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x59616d61, 0xffffffffffffffff, 0x1, &(0x7f0000000000)) socketpair$inet_icmp(0x7, 0xffffffffffffffff, 0x1, &(0x7f0000000000)) [ 195.545454] __should_failslab+0x124/0x180 [ 195.549700] should_failslab+0x9/0x14 [ 195.553505] kmem_cache_alloc+0x2af/0x760 [ 195.557657] ? perf_trace_lock+0xd6/0x900 [ 195.561812] ? perf_trace_lock_acquire+0xe3/0x980 [ 195.566670] alloc_vfsmnt+0xe0/0x9d0 [ 195.570399] ? mnt_free_id.isra.27+0x60/0x60 [ 195.574820] ? kasan_check_read+0x11/0x20 [ 195.578979] ? graph_lock+0x170/0x170 [ 195.582791] ? rcu_pm_notify+0xc0/0xc0 [ 195.586684] ? trace_hardirqs_off+0xd/0x10 [ 195.590933] ? putname+0xf2/0x130 [ 195.594398] ? putname+0xf2/0x130 [ 195.597861] ? find_held_lock+0x36/0x1c0 [ 195.601942] ? lock_downgrade+0x8e0/0x8e0 [ 195.606100] ? module_unload_free+0x5b0/0x5b0 [ 195.610600] ? lock_release+0xa10/0xa10 [ 195.614568] ? mpi_free.cold.1+0x19/0x19 [ 195.618621] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 195.624152] vfs_kern_mount.part.34+0x88/0x4d0 [ 195.629187] ? may_umount+0xb0/0xb0 [ 195.632803] ? _raw_read_unlock+0x22/0x30 [ 195.636935] ? __get_fs_type+0x97/0xc0 [ 195.640809] do_mount+0x564/0x3070 [ 195.644336] ? copy_mount_string+0x40/0x40 [ 195.648557] ? rcu_pm_notify+0xc0/0xc0 [ 195.652435] ? copy_mount_options+0x5f/0x380 [ 195.656833] ? rcu_read_lock_sched_held+0x108/0x120 [ 195.661836] ? kmem_cache_alloc_trace+0x616/0x780 [ 195.666666] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 195.672190] ? _copy_from_user+0xdf/0x150 [ 195.676327] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 195.681846] ? copy_mount_options+0x285/0x380 [ 195.686326] ksys_mount+0x12d/0x140 [ 195.689941] SyS_mount+0x35/0x50 [ 195.693292] ? ksys_mount+0x140/0x140 [ 195.697078] do_syscall_64+0x29e/0x9d0 [ 195.700965] ? vmalloc_sync_all+0x30/0x30 [ 195.705103] ? _raw_spin_unlock_irq+0x27/0x70 [ 195.709590] ? finish_task_switch+0x1ca/0x810 [ 195.714070] ? syscall_return_slowpath+0x5c0/0x5c0 [ 195.718991] ? syscall_return_slowpath+0x30f/0x5c0 [ 195.723911] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 195.729267] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 195.734098] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 195.739272] RIP: 0033:0x455329 2018/04/18 07:41:28 executing program 1: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x100}, 0x2c) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x9) gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={r2, 0x28, &(0x7f0000000740)}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r3}, 0x10) 2018/04/18 07:41:28 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000f97ff8)) socketpair(0x8, 0x5, 0x0, &(0x7f00000001c0)) 2018/04/18 07:41:28 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004, 0xa2}, 0x2c) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) recvmsg(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000240)=@can, 0x80, &(0x7f0000000880), 0x0, &(0x7f0000000900)=""/142, 0x8e}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f00000009c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}}, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000a40)}], 0x1}, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f0000000200)) [ 195.742442] RSP: 002b:00007fdcd2ef2c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 195.750135] RAX: ffffffffffffffda RBX: 00007fdcd2ef36d4 RCX: 0000000000455329 [ 195.757398] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 195.764651] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 195.771902] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 195.779153] R13: 00000000000003fb R14: 00000000006f9028 R15: 0000000000000005 [ 195.814374] FAULT_INJECTION: forcing a failure. [ 195.814374] name failslab, interval 1, probability 0, space 0, times 0 [ 195.825721] CPU: 0 PID: 17838 Comm: syz-executor0 Not tainted 4.16.0+ #3 [ 195.832575] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 195.841944] Call Trace: [ 195.844542] dump_stack+0x1b9/0x294 [ 195.848174] ? dump_stack_print_info.cold.2+0x52/0x52 [ 195.853362] ? perf_trace_lock_acquire+0xe3/0x980 [ 195.858216] should_fail.cold.4+0xa/0x1a [ 195.862275] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 195.867369] ? print_usage_bug+0xc0/0xc0 [ 195.871426] ? print_usage_bug+0xc0/0xc0 [ 195.875488] ? find_held_lock+0x36/0x1c0 [ 195.879575] ? check_same_owner+0x320/0x320 [ 195.883896] ? rcu_note_context_switch+0x710/0x710 [ 195.888815] ? perf_tp_event+0xc30/0xc30 [ 195.892873] __should_failslab+0x124/0x180 [ 195.897102] should_failslab+0x9/0x14 [ 195.900896] kmem_cache_alloc+0x2af/0x760 [ 195.905044] ? perf_trace_lock+0x495/0x900 [ 195.909276] sk_prot_alloc+0x69/0x2e0 [ 195.913075] sk_alloc+0x104/0x17b0 [ 195.916614] ? sock_def_error_report+0x710/0x710 [ 195.921366] ? graph_lock+0x170/0x170 [ 195.925164] ? perf_trace_lock+0x495/0x900 [ 195.929392] ? perf_trace_lock_acquire+0xe3/0x980 [ 195.934235] ? find_held_lock+0x36/0x1c0 [ 195.938308] ? lock_downgrade+0x8e0/0x8e0 [ 195.942462] ? rcu_is_watching+0x85/0x140 [ 195.946606] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 195.951787] ? find_held_lock+0x36/0x1c0 [ 195.955854] inet6_create+0x4f0/0x1240 [ 195.959744] ? inet6_net_init+0x870/0x870 [ 195.963885] ? rcu_is_watching+0x85/0x140 [ 195.968026] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 195.973221] __sock_create+0x526/0x920 [ 195.977111] ? kernel_sock_ip_overhead+0x570/0x570 [ 195.982042] ? __might_sleep+0x95/0x190 [ 195.986020] __sys_socketpair+0x27b/0x6b0 [ 195.990162] ? SyS_socket+0x30/0x30 [ 195.993791] ? SyS_read+0x30/0x30 [ 195.997233] ? mm_fault_error+0x380/0x380 [ 196.001382] SyS_socketpair+0x2c/0x40 [ 196.005172] ? __sys_socketpair+0x6b0/0x6b0 [ 196.009487] do_syscall_64+0x29e/0x9d0 [ 196.013364] ? vmalloc_sync_all+0x30/0x30 [ 196.017502] ? kasan_check_write+0x14/0x20 [ 196.021735] ? syscall_return_slowpath+0x5c0/0x5c0 [ 196.026659] ? syscall_return_slowpath+0x30f/0x5c0 [ 196.031585] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 196.036962] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 196.041812] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 196.046994] RIP: 0033:0x455329 [ 196.050175] RSP: 002b:00007f9ecb9f6c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 196.057877] RAX: ffffffffffffffda RBX: 00007f9ecb9f76d4 RCX: 0000000000455329 2018/04/18 07:41:28 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x9) close(0xffffffffffffffff) gettid() socket$kcm(0x29, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x0, 0xffffffffffff36f1, 0x0, 0x0, r0, 0x9}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={r1, 0x28, &(0x7f0000000740)}, 0x10) perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r2}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r3}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/18 07:41:28 executing program 3: r0 = socket$kcm(0x2, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000740)={&(0x7f0000000000)=@in={0x2, 0x0, @multicast2=0xe0000002}, 0x80, &(0x7f0000000200), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="300000000000000000000000070000008921eeb35cd8bd7fcc0c1b988e1c9d86c39351f17f9b04b22b00000000000000"], 0x30}, 0x0) [ 196.065135] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 000000000000000a [ 196.072401] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 196.079662] R10: 0000000020000100 R11: 0000000000000246 R12: 0000000000000014 [ 196.086920] R13: 000000000000063f R14: 00000000006fc688 R15: 0000000000000006 2018/04/18 07:41:28 executing program 7 (fault-call:4 fault-nth:6): mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/18 07:41:28 executing program 2: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004, 0x4000009d}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x59616d61, 0xffffffffffffffff, 0x1, &(0x7f0000000000)) socketpair$inet_icmp(0x8, 0xffffffffffffffff, 0x1, &(0x7f0000000000)) 2018/04/18 07:41:28 executing program 3: r0 = socket$kcm(0x2, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000740)={&(0x7f0000000000)=@in={0x2, 0x4e23, @multicast2=0xe0000002}, 0x80, &(0x7f0000000200), 0x0, &(0x7f0000000080)=ANY=[]}, 0x0) [ 196.311139] FAULT_INJECTION: forcing a failure. [ 196.311139] name failslab, interval 1, probability 0, space 0, times 0 [ 196.322473] CPU: 1 PID: 17877 Comm: syz-executor7 Not tainted 4.16.0+ #3 [ 196.329324] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 196.338688] Call Trace: [ 196.341297] dump_stack+0x1b9/0x294 [ 196.344947] ? dump_stack_print_info.cold.2+0x52/0x52 [ 196.350149] ? perf_trace_lock_acquire+0xe3/0x980 [ 196.355008] ? kernel_text_address+0x79/0xf0 [ 196.359431] ? __unwind_start+0x166/0x330 [ 196.363607] should_fail.cold.4+0xa/0x1a [ 196.367694] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 196.372811] ? perf_trace_lock+0xd6/0x900 [ 196.376979] ? perf_trace_lock_acquire+0xe3/0x980 [ 196.381820] ? zap_class+0x720/0x720 [ 196.385527] ? find_held_lock+0x36/0x1c0 [ 196.389596] ? check_same_owner+0x320/0x320 [ 196.393916] ? rcu_note_context_switch+0x710/0x710 [ 196.398846] __should_failslab+0x124/0x180 [ 196.403073] should_failslab+0x9/0x14 [ 196.406862] __kmalloc_track_caller+0x2c4/0x760 [ 196.411521] ? kasan_check_read+0x11/0x20 [ 196.415665] ? do_raw_spin_unlock+0x9e/0x2e0 [ 196.420062] ? kstrdup_const+0x66/0x80 [ 196.423935] kstrdup+0x39/0x70 [ 196.427115] kstrdup_const+0x66/0x80 [ 196.430816] alloc_vfsmnt+0x1b3/0x9d0 [ 196.434608] ? mnt_free_id.isra.27+0x60/0x60 [ 196.439006] ? kasan_check_read+0x11/0x20 [ 196.443139] ? graph_lock+0x170/0x170 [ 196.446924] ? rcu_pm_notify+0xc0/0xc0 [ 196.450795] ? trace_hardirqs_off+0xd/0x10 [ 196.455016] ? putname+0xf2/0x130 [ 196.458458] ? putname+0xf2/0x130 [ 196.461901] ? find_held_lock+0x36/0x1c0 [ 196.465957] ? lock_downgrade+0x8e0/0x8e0 [ 196.470111] ? module_unload_free+0x5b0/0x5b0 [ 196.474598] ? lock_release+0xa10/0xa10 [ 196.478572] ? mpi_free.cold.1+0x19/0x19 [ 196.482621] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 196.488147] vfs_kern_mount.part.34+0x88/0x4d0 [ 196.492720] ? may_umount+0xb0/0xb0 [ 196.496333] ? _raw_read_unlock+0x22/0x30 [ 196.500470] ? __get_fs_type+0x97/0xc0 [ 196.504347] do_mount+0x564/0x3070 [ 196.507877] ? copy_mount_string+0x40/0x40 [ 196.512106] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 196.516853] ? retint_kernel+0x10/0x10 [ 196.520741] ? copy_mount_options+0x1a1/0x380 [ 196.525223] ? __sanitizer_cov_trace_pc+0x3b/0x50 [ 196.530055] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 196.535578] ? copy_mount_options+0x285/0x380 [ 196.540063] ksys_mount+0x12d/0x140 [ 196.543678] SyS_mount+0x35/0x50 [ 196.547029] ? ksys_mount+0x140/0x140 [ 196.550816] do_syscall_64+0x29e/0x9d0 [ 196.554688] ? vmalloc_sync_all+0x30/0x30 [ 196.558819] ? _raw_spin_unlock_irq+0x27/0x70 [ 196.563302] ? finish_task_switch+0x1ca/0x810 [ 196.567787] ? syscall_return_slowpath+0x5c0/0x5c0 [ 196.572705] ? syscall_return_slowpath+0x30f/0x5c0 [ 196.577622] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 196.582985] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 196.587822] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 196.592999] RIP: 0033:0x455329 [ 196.596173] RSP: 002b:00007fdcd2ef2c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 196.603868] RAX: ffffffffffffffda RBX: 00007fdcd2ef36d4 RCX: 0000000000455329 [ 196.611121] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 196.618377] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 196.625631] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 196.632890] R13: 00000000000003fb R14: 00000000006f9028 R15: 0000000000000006 2018/04/18 07:41:29 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000f97ff8)) socketpair(0x2, 0x5, 0x0, &(0x7f00000001c0)) 2018/04/18 07:41:29 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004, 0xa2}, 0x2c) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) recvmsg(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000240)=@can, 0x80, &(0x7f0000000880), 0x0, &(0x7f0000000900)=""/142, 0x8e}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f00000009c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}}, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000a40)}], 0x1}, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f0000000200)) 2018/04/18 07:41:29 executing program 1: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x100}, 0x2c) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x9) gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={r2, 0x28, &(0x7f0000000740)}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r3}, 0x10) 2018/04/18 07:41:29 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x9) close(0xffffffffffffffff) gettid() socket$kcm(0x29, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x0, 0xffffffffffff36f1, 0x0, 0x0, r0, 0x9}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={r1, 0x28, &(0x7f0000000740)}, 0x10) perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r2}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r3}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/18 07:41:29 executing program 3: r0 = socket$kcm(0x2, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000740)={&(0x7f0000000000)=@in={0x2, 0x4e23, @multicast2=0xe0000002}, 0x80, &(0x7f0000000200), 0x0, &(0x7f0000000080)=ANY=[]}, 0x0) 2018/04/18 07:41:29 executing program 0 (fault-call:1 fault-nth:7): perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000100)) 2018/04/18 07:41:29 executing program 2: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004, 0x4000009d}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x59616d61, 0xffffffffffffffff, 0x1, &(0x7f0000000000)) socketpair$inet_icmp(0x17, 0xffffffffffffffff, 0x1, &(0x7f0000000000)) 2018/04/18 07:41:29 executing program 7 (fault-call:4 fault-nth:7): mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) [ 196.790244] FAULT_INJECTION: forcing a failure. [ 196.790244] name failslab, interval 1, probability 0, space 0, times 0 [ 196.803273] CPU: 0 PID: 17903 Comm: syz-executor7 Not tainted 4.16.0+ #3 [ 196.810135] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 196.819502] Call Trace: [ 196.822102] dump_stack+0x1b9/0x294 [ 196.825749] ? dump_stack_print_info.cold.2+0x52/0x52 [ 196.830953] ? perf_trace_lock_acquire+0xe3/0x980 [ 196.835822] should_fail.cold.4+0xa/0x1a [ 196.839902] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 196.845021] ? zap_class+0x720/0x720 [ 196.848762] ? find_held_lock+0x36/0x1c0 [ 196.852861] ? check_same_owner+0x320/0x320 [ 196.857197] ? rcu_note_context_switch+0x710/0x710 [ 196.862150] __should_failslab+0x124/0x180 [ 196.866401] should_failslab+0x9/0x14 [ 196.870216] kmem_cache_alloc_trace+0x2cb/0x780 [ 196.874899] ? kasan_check_write+0x14/0x20 [ 196.879148] ? do_raw_spin_lock+0xc1/0x200 [ 196.883401] sget_userns+0x1c7/0xf20 [ 196.887123] ? set_anon_super+0x20/0x20 [ 196.891113] ? get_empty_filp.cold.7+0x3e/0x3e [ 196.895710] ? destroy_unused_super.part.9+0x100/0x100 [ 196.900995] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 196.906006] ? kasan_check_read+0x11/0x20 [ 196.910143] ? rcu_pm_notify+0xc0/0xc0 [ 196.914018] ? trace_hardirqs_off+0xd/0x10 [ 196.918242] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 196.923769] ? cap_capable+0x1f9/0x260 [ 196.927647] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 196.933177] ? security_capable+0x99/0xc0 [ 196.937315] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 196.942838] ? ns_capable_common+0x13f/0x170 [ 196.947247] mount_ns+0x8f/0x1d0 [ 196.950610] ? rpc_pipe_release+0xb70/0xb70 [ 196.954921] rpc_mount+0x9e/0xd0 [ 196.958274] mount_fs+0xae/0x328 [ 196.961636] vfs_kern_mount.part.34+0xd4/0x4d0 [ 196.966215] ? may_umount+0xb0/0xb0 [ 196.969829] ? _raw_read_unlock+0x22/0x30 [ 196.973965] ? __get_fs_type+0x97/0xc0 [ 196.977849] do_mount+0x564/0x3070 [ 196.981380] ? copy_mount_string+0x40/0x40 [ 196.985606] ? rcu_pm_notify+0xc0/0xc0 [ 196.989485] ? copy_mount_options+0x5f/0x380 [ 196.993877] ? rcu_read_lock_sched_held+0x108/0x120 [ 196.998882] ? kmem_cache_alloc_trace+0x616/0x780 [ 197.003719] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 197.009247] ? copy_mount_options+0x285/0x380 [ 197.013737] ksys_mount+0x12d/0x140 [ 197.017349] SyS_mount+0x35/0x50 [ 197.020698] ? ksys_mount+0x140/0x140 [ 197.024659] do_syscall_64+0x29e/0x9d0 [ 197.028533] ? vmalloc_sync_all+0x30/0x30 [ 197.032673] ? _raw_spin_unlock_irq+0x27/0x70 [ 197.037153] ? finish_task_switch+0x1ca/0x810 [ 197.041634] ? syscall_return_slowpath+0x5c0/0x5c0 [ 197.046550] ? syscall_return_slowpath+0x30f/0x5c0 [ 197.051475] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 197.056829] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 197.061661] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 197.066839] RIP: 0033:0x455329 [ 197.070011] RSP: 002b:00007fdcd2ef2c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 197.077704] RAX: ffffffffffffffda RBX: 00007fdcd2ef36d4 RCX: 0000000000455329 2018/04/18 07:41:29 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000100)) 2018/04/18 07:41:29 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000f97ff8)) socketpair(0x2b, 0x5, 0x0, &(0x7f00000001c0)) 2018/04/18 07:41:29 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x9) close(0xffffffffffffffff) gettid() socket$kcm(0x29, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x0, 0xffffffffffff36f1, 0x0, 0x18, 0xffffffffffffffff, 0x9}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={r1, 0x28, &(0x7f0000000740)}, 0x10) perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r2}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r3}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) [ 197.084957] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 197.092213] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 197.099473] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 197.106725] R13: 00000000000003fb R14: 00000000006f9028 R15: 0000000000000007 2018/04/18 07:41:29 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_udp(0x2, 0x2, 0x0, &(0x7f0000000100)) 2018/04/18 07:41:29 executing program 3: r0 = socket$kcm(0x2, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000740)={&(0x7f0000000000)=@in={0x2, 0x4e23, @multicast2=0xe0000002}, 0x80, &(0x7f0000000200), 0x0, &(0x7f0000000080)=ANY=[]}, 0x0) 2018/04/18 07:41:29 executing program 1: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x100}, 0x2c) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x9) gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={r2, 0x28, &(0x7f0000000740)}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r3}, 0x10) 2018/04/18 07:41:29 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000f97ff8)) socketpair(0x8, 0xa, 0x0, &(0x7f00000001c0)) 2018/04/18 07:41:29 executing program 2: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004, 0x4000009d}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x59616d61, 0xffffffffffffffff, 0x1, &(0x7f0000000000)) socketpair$inet_icmp(0x18, 0xffffffffffffffff, 0x1, &(0x7f0000000000)) 2018/04/18 07:41:29 executing program 3: r0 = socket$kcm(0x2, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000740)={&(0x7f0000000000)=@in={0x2, 0x4e23, @multicast2=0xe0000002}, 0x80, &(0x7f0000000200), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB]}, 0x0) 2018/04/18 07:41:29 executing program 7 (fault-call:4 fault-nth:8): mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/18 07:41:29 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_udp(0x2b, 0x2, 0x0, &(0x7f0000000100)) 2018/04/18 07:41:29 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x9) close(0xffffffffffffffff) gettid() socket$kcm(0x29, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x0, 0xffffffffffff36f1, 0x0, 0x18, 0xffffffffffffffff, 0x9}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={r1, 0x28, &(0x7f0000000740)}, 0x10) perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r2}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r3}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/18 07:41:29 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004, 0xa2}, 0x2c) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) recvmsg(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000240)=@can, 0x80, &(0x7f0000000880), 0x0, &(0x7f0000000900)=""/142, 0x8e}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f00000009c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}}, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000a40)}], 0x1}, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f0000000200)) 2018/04/18 07:41:29 executing program 1: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x100}, 0x2c) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) close(r0) gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={r2, 0x28, &(0x7f0000000740)}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r3}, 0x10) [ 197.477344] FAULT_INJECTION: forcing a failure. [ 197.477344] name failslab, interval 1, probability 0, space 0, times 0 [ 197.488953] CPU: 0 PID: 17946 Comm: syz-executor7 Not tainted 4.16.0+ #3 [ 197.495805] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 197.505164] Call Trace: [ 197.507763] dump_stack+0x1b9/0x294 [ 197.511408] ? dump_stack_print_info.cold.2+0x52/0x52 [ 197.516610] ? perf_trace_lock_acquire+0xe3/0x980 [ 197.521475] should_fail.cold.4+0xa/0x1a [ 197.525551] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 197.530668] ? graph_lock+0x170/0x170 [ 197.534482] ? wait_for_completion+0x870/0x870 [ 197.539084] ? graph_lock+0x170/0x170 [ 197.542894] ? find_next_zero_bit+0x111/0x140 [ 197.547407] ? find_held_lock+0x36/0x1c0 [ 197.551486] ? __lock_is_held+0xb5/0x140 [ 197.555585] ? check_same_owner+0x320/0x320 [ 197.559922] ? __might_sleep+0x95/0x190 [ 197.563909] ? rcu_note_context_switch+0x710/0x710 [ 197.568857] __should_failslab+0x124/0x180 [ 197.573112] should_failslab+0x9/0x14 [ 197.576920] __kmalloc+0x2c8/0x760 [ 197.580471] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 197.585498] ? __lockdep_init_map+0x105/0x590 [ 197.590005] ? __list_lru_init+0xdd/0x790 [ 197.594174] __list_lru_init+0xdd/0x790 [ 197.598167] ? list_lru_destroy+0x4c0/0x4c0 [ 197.602498] ? mark_held_locks+0xc9/0x160 [ 197.606664] ? __raw_spin_lock_init+0x1c/0x100 [ 197.611260] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 197.616285] ? __lockdep_init_map+0x105/0x590 [ 197.620803] ? lockdep_init_map+0x9/0x10 [ 197.624883] sget_userns+0x6d9/0xf20 [ 197.628610] ? set_anon_super+0x20/0x20 [ 197.632606] ? get_empty_filp.cold.7+0x3e/0x3e [ 197.637200] ? destroy_unused_super.part.9+0x100/0x100 [ 197.642492] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 197.647519] ? kasan_check_read+0x11/0x20 [ 197.651680] ? rcu_pm_notify+0xc0/0xc0 [ 197.655578] ? trace_hardirqs_off+0xd/0x10 [ 197.659827] ? cap_capable+0x1f9/0x260 [ 197.663732] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 197.669280] ? security_capable+0x99/0xc0 [ 197.673444] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 197.678992] ? ns_capable_common+0x13f/0x170 [ 197.683411] mount_ns+0x8f/0x1d0 [ 197.686788] ? rpc_pipe_release+0xb70/0xb70 [ 197.691124] rpc_mount+0x9e/0xd0 [ 197.694508] mount_fs+0xae/0x328 [ 197.697890] vfs_kern_mount.part.34+0xd4/0x4d0 [ 197.702484] ? may_umount+0xb0/0xb0 [ 197.706122] ? _raw_read_unlock+0x22/0x30 [ 197.710277] ? __get_fs_type+0x97/0xc0 [ 197.714181] do_mount+0x564/0x3070 [ 197.717743] ? copy_mount_string+0x40/0x40 [ 197.721987] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 197.727015] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 197.731786] ? retint_kernel+0x10/0x10 [ 197.735687] ? copy_mount_options+0x1a1/0x380 [ 197.740188] ? copy_mount_options+0x1a4/0x380 [ 197.744691] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 197.750231] ? copy_mount_options+0x285/0x380 [ 197.754739] ksys_mount+0x12d/0x140 [ 197.758371] SyS_mount+0x35/0x50 [ 197.761900] ? ksys_mount+0x140/0x140 [ 197.765693] do_syscall_64+0x29e/0x9d0 [ 197.769570] ? vmalloc_sync_all+0x30/0x30 [ 197.773708] ? _raw_spin_unlock_irq+0x27/0x70 [ 197.778191] ? finish_task_switch+0x1ca/0x810 [ 197.782847] ? syscall_return_slowpath+0x5c0/0x5c0 [ 197.787763] ? syscall_return_slowpath+0x30f/0x5c0 [ 197.792684] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 197.798038] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 197.802870] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 197.808044] RIP: 0033:0x455329 [ 197.811217] RSP: 002b:00007fdcd2ef2c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 197.818918] RAX: ffffffffffffffda RBX: 00007fdcd2ef36d4 RCX: 0000000000455329 2018/04/18 07:41:29 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000f97ff8)) socketpair(0x8, 0x5, 0x4, &(0x7f00000001c0)) 2018/04/18 07:41:29 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_udp(0xa, 0x4, 0x0, &(0x7f0000000100)) 2018/04/18 07:41:29 executing program 3: r0 = socket$kcm(0x2, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000740)={&(0x7f0000000000)=@in={0x2, 0x4e23, @multicast2=0xe0000002}, 0x80, &(0x7f0000000200), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB]}, 0x0) 2018/04/18 07:41:30 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000f97ff8)) socketpair(0x8, 0x5, 0x14, &(0x7f00000001c0)) 2018/04/18 07:41:30 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_udp(0xa, 0xa, 0x0, &(0x7f0000000100)) 2018/04/18 07:41:30 executing program 3: r0 = socket$kcm(0x2, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000740)={&(0x7f0000000000)=@in={0x2, 0x4e23, @multicast2=0xe0000002}, 0x80, &(0x7f0000000200), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB]}, 0x0) [ 197.826180] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 197.833435] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 197.840694] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 197.847946] R13: 00000000000003fb R14: 00000000006f9028 R15: 0000000000000008 2018/04/18 07:41:30 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000f97ff8)) socketpair(0x8, 0x5, 0xfeffffff00000000, &(0x7f00000001c0)) 2018/04/18 07:41:30 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_udp(0xa, 0x3, 0x0, &(0x7f0000000100)) 2018/04/18 07:41:30 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x9) close(0xffffffffffffffff) gettid() socket$kcm(0x29, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x0, 0xffffffffffff36f1, 0x0, 0x18}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={r0, 0x28, &(0x7f0000000740)}, 0x10) perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r1}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r2}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/18 07:41:30 executing program 2: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004, 0x4000009d}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x59616d61, 0xffffffffffffffff, 0x1, &(0x7f0000000000)) socketpair$inet_icmp(0x1b, 0xffffffffffffffff, 0x1, &(0x7f0000000000)) 2018/04/18 07:41:30 executing program 3: r0 = socket$kcm(0x2, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000740)={&(0x7f0000000000)=@in={0x2, 0x4e23, @multicast2=0xe0000002}, 0x80, &(0x7f0000000200), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="300000000000000000000000070000008921eeb35cd8bd7f"], 0x18}, 0x0) 2018/04/18 07:41:30 executing program 1: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x100}, 0x2c) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) close(r0) gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={r2, 0x28, &(0x7f0000000740)}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r3}, 0x10) 2018/04/18 07:41:30 executing program 5: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x100}, 0x2c) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) close(r0) gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={r2, 0x28, &(0x7f0000000740)}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r3}, 0x10) 2018/04/18 07:41:30 executing program 7 (fault-call:4 fault-nth:9): mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) [ 198.119464] FAULT_INJECTION: forcing a failure. [ 198.119464] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 198.131327] CPU: 0 PID: 17993 Comm: syz-executor7 Not tainted 4.16.0+ #3 [ 198.139654] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 198.149016] Call Trace: [ 198.151620] dump_stack+0x1b9/0x294 [ 198.155269] ? dump_stack_print_info.cold.2+0x52/0x52 [ 198.160473] ? graph_lock+0x170/0x170 [ 198.164302] should_fail.cold.4+0xa/0x1a [ 198.168378] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 198.173503] ? debug_check_no_locks_freed+0x310/0x310 [ 198.178722] ? pcpu_next_fit_region.constprop.23+0x334/0x410 [ 198.184541] ? perf_trace_lock+0xd6/0x900 [ 198.188703] ? perf_trace_lock_acquire+0xe3/0x980 [ 198.193569] ? zap_class+0x720/0x720 [ 198.197301] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 198.202854] ? should_fail+0x21b/0xbcd [ 198.206760] __alloc_pages_nodemask+0x34e/0xd70 [ 198.211435] ? zap_class+0x720/0x720 [ 198.215170] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 198.220206] ? find_held_lock+0x36/0x1c0 [ 198.224311] ? check_same_owner+0x320/0x320 [ 198.228651] cache_grow_begin+0x72/0x6c0 [ 198.232734] kmem_cache_alloc_trace+0x6a5/0x780 [ 198.237416] ? kasan_check_write+0x14/0x20 [ 198.241662] ? do_raw_spin_lock+0xc1/0x200 [ 198.245916] sget_userns+0x1c7/0xf20 [ 198.249638] ? set_anon_super+0x20/0x20 [ 198.253625] ? get_empty_filp.cold.7+0x3e/0x3e [ 198.258222] ? destroy_unused_super.part.9+0x100/0x100 [ 198.263517] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 198.268559] ? kasan_check_read+0x11/0x20 [ 198.272719] ? rcu_pm_notify+0xc0/0xc0 [ 198.276615] ? trace_hardirqs_off+0xd/0x10 [ 198.280860] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 198.286405] ? cap_capable+0x1f9/0x260 [ 198.290312] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 198.295858] ? security_capable+0x99/0xc0 [ 198.300021] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 198.305571] ? ns_capable_common+0x13f/0x170 [ 198.309992] mount_ns+0x8f/0x1d0 [ 198.313365] ? rpc_pipe_release+0xb70/0xb70 [ 198.317701] rpc_mount+0x9e/0xd0 [ 198.321078] mount_fs+0xae/0x328 [ 198.324460] vfs_kern_mount.part.34+0xd4/0x4d0 [ 198.329055] ? may_umount+0xb0/0xb0 [ 198.332687] ? _raw_read_unlock+0x22/0x30 [ 198.336841] ? __get_fs_type+0x97/0xc0 [ 198.340743] do_mount+0x564/0x3070 [ 198.344297] ? do_raw_spin_unlock+0x9e/0x2e0 [ 198.348721] ? copy_mount_string+0x40/0x40 [ 198.352965] ? rcu_pm_notify+0xc0/0xc0 [ 198.356869] ? copy_mount_options+0x5f/0x380 [ 198.361288] ? rcu_read_lock_sched_held+0x108/0x120 2018/04/18 07:41:30 executing program 2: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004, 0x4000009d}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x59616d61, 0xffffffffffffffff, 0x1, &(0x7f0000000000)) socketpair$inet_icmp(0x1c, 0xffffffffffffffff, 0x1, &(0x7f0000000000)) 2018/04/18 07:41:30 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000f97ff8)) socketpair(0x8, 0x5, 0x100000000000000, &(0x7f00000001c0)) 2018/04/18 07:41:30 executing program 3: r0 = socket$kcm(0x2, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000740)={&(0x7f0000000000)=@in={0x2, 0x4e23, @multicast2=0xe0000002}, 0x80, &(0x7f0000000200), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="300000000000000000000000070000008921eeb35cd8bd7f"], 0x18}, 0x0) 2018/04/18 07:41:30 executing program 3: r0 = socket$kcm(0x2, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000740)={&(0x7f0000000000)=@in={0x2, 0x4e23, @multicast2=0xe0000002}, 0x80, &(0x7f0000000200), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="300000000000000000000000070000008921eeb35cd8bd7f"], 0x18}, 0x0) 2018/04/18 07:41:30 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000f97ff8)) socketpair(0x8, 0x5, 0x400000000000000, &(0x7f00000001c0)) 2018/04/18 07:41:30 executing program 3: r0 = socket$kcm(0x2, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000740)={&(0x7f0000000000)=@in={0x2, 0x4e23, @multicast2=0xe0000002}, 0x80, &(0x7f0000000200), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="300000000000000000000000070000008921eeb35cd8bd7fcc0c1b988e1c9d86c39351f1"], 0x24}, 0x0) [ 198.366317] ? kmem_cache_alloc_trace+0x616/0x780 [ 198.371257] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 198.376806] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 198.382348] ? copy_mount_options+0x285/0x380 [ 198.386868] ksys_mount+0x12d/0x140 [ 198.390507] SyS_mount+0x35/0x50 [ 198.393879] ? ksys_mount+0x140/0x140 [ 198.397693] do_syscall_64+0x29e/0x9d0 [ 198.401586] ? vmalloc_sync_all+0x30/0x30 [ 198.405740] ? _raw_spin_unlock_irq+0x27/0x70 [ 198.410246] ? finish_task_switch+0x1ca/0x810 [ 198.414752] ? syscall_return_slowpath+0x5c0/0x5c0 2018/04/18 07:41:30 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x9) close(0xffffffffffffffff) gettid() socket$kcm(0x29, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x0, 0xffffffffffff36f1, 0x0, 0x18}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x10) perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r1}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r2}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) [ 198.419693] ? syscall_return_slowpath+0x30f/0x5c0 [ 198.424635] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 198.430012] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 198.434876] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 198.440073] RIP: 0033:0x455329 [ 198.443264] RSP: 002b:00007fdcd2ef2c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 198.450982] RAX: ffffffffffffffda RBX: 00007fdcd2ef36d4 RCX: 0000000000455329 [ 198.458256] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 198.465531] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 198.472811] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 198.480091] R13: 00000000000003fb R14: 00000000006f9028 R15: 0000000000000009 2018/04/18 07:41:31 executing program 3: r0 = socket$kcm(0x2, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000740)={&(0x7f0000000000)=@in={0x2, 0x4e23, @multicast2=0xe0000002}, 0x80, &(0x7f0000000200), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="300000000000000000000000070000008921eeb35cd8bd7fcc0c1b988e1c9d86c39351f1"], 0x24}, 0x0) 2018/04/18 07:41:31 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000f97ff8)) socketpair(0x8, 0x5, 0x1000000, &(0x7f00000001c0)) 2018/04/18 07:41:31 executing program 2: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004, 0x4000009d}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x59616d61, 0xffffffffffffffff, 0x1, &(0x7f0000000000)) socketpair$inet_icmp(0x2f, 0xffffffffffffffff, 0x1, &(0x7f0000000000)) 2018/04/18 07:41:31 executing program 5: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x100}, 0x2c) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) close(r0) gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={r2, 0x28, &(0x7f0000000740)}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r3}, 0x10) 2018/04/18 07:41:31 executing program 7 (fault-call:4 fault-nth:10): mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/18 07:41:31 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_udp(0xa, 0x2, 0xe100000000000000, &(0x7f0000000100)) 2018/04/18 07:41:31 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x9) close(0xffffffffffffffff) gettid() socket$kcm(0x29, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x0, 0xffffffffffff36f1, 0x0, 0x18}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x10) perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r1}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r2}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/18 07:41:31 executing program 1: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x100}, 0x2c) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) close(r0) gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={r2, 0x28, &(0x7f0000000740)}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r3}, 0x10) [ 198.697788] FAULT_INJECTION: forcing a failure. [ 198.697788] name failslab, interval 1, probability 0, space 0, times 0 [ 198.709130] CPU: 0 PID: 18054 Comm: syz-executor7 Not tainted 4.16.0+ #3 [ 198.715976] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 198.725326] Call Trace: [ 198.727909] dump_stack+0x1b9/0x294 [ 198.731529] ? dump_stack_print_info.cold.2+0x52/0x52 [ 198.736707] ? perf_trace_lock_acquire+0xe3/0x980 [ 198.741537] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 198.746765] should_fail.cold.4+0xa/0x1a [ 198.750820] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 198.755911] ? unwind_get_return_address+0x61/0xa0 [ 198.760841] ? __save_stack_trace+0x7e/0xd0 [ 198.765146] ? graph_lock+0x170/0x170 [ 198.769112] ? find_held_lock+0x36/0x1c0 [ 198.773164] ? __lock_is_held+0xb5/0x140 [ 198.777228] ? check_same_owner+0x320/0x320 [ 198.781542] ? rcu_note_context_switch+0x710/0x710 [ 198.786895] __should_failslab+0x124/0x180 [ 198.791118] should_failslab+0x9/0x14 [ 198.795393] kmem_cache_alloc_trace+0x2cb/0x780 [ 198.800052] ? __kmalloc_node+0x33/0x70 [ 198.804010] ? __kmalloc_node+0x33/0x70 [ 198.807972] ? rcu_read_lock_sched_held+0x108/0x120 [ 198.812993] __memcg_init_list_lru_node+0x17d/0x2c0 [ 198.818000] ? kvfree_rcu+0x20/0x20 [ 198.821613] ? __kmalloc_node+0x47/0x70 [ 198.825580] __list_lru_init+0x456/0x790 [ 198.829632] ? list_lru_destroy+0x4c0/0x4c0 [ 198.833941] ? mark_held_locks+0xc9/0x160 [ 198.838079] ? __raw_spin_lock_init+0x1c/0x100 [ 198.842647] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 198.847657] ? __lockdep_init_map+0x105/0x590 [ 198.852147] ? lockdep_init_map+0x9/0x10 [ 198.856196] sget_userns+0x6d9/0xf20 [ 198.859892] ? set_anon_super+0x20/0x20 [ 198.863857] ? get_empty_filp.cold.7+0x3e/0x3e [ 198.868424] ? destroy_unused_super.part.9+0x100/0x100 [ 198.873689] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 198.878695] ? kasan_check_read+0x11/0x20 [ 198.882832] ? rcu_pm_notify+0xc0/0xc0 [ 198.886706] ? trace_hardirqs_off+0xd/0x10 [ 198.890926] ? cap_capable+0x1f9/0x260 [ 198.894803] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 198.900322] ? security_capable+0x99/0xc0 [ 198.904457] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 198.909983] ? ns_capable_common+0x13f/0x170 [ 198.914380] mount_ns+0x8f/0x1d0 [ 198.917736] ? rpc_pipe_release+0xb70/0xb70 [ 198.922044] rpc_mount+0x9e/0xd0 [ 198.925404] mount_fs+0xae/0x328 [ 198.928761] vfs_kern_mount.part.34+0xd4/0x4d0 [ 198.933330] ? may_umount+0xb0/0xb0 [ 198.936940] ? _raw_read_unlock+0x22/0x30 [ 198.941074] ? __get_fs_type+0x97/0xc0 [ 198.944953] do_mount+0x564/0x3070 [ 198.948485] ? copy_mount_string+0x40/0x40 [ 198.952704] ? rcu_pm_notify+0xc0/0xc0 [ 198.956597] ? copy_mount_options+0x5f/0x380 [ 198.960997] ? rcu_read_lock_sched_held+0x108/0x120 [ 198.966001] ? kmem_cache_alloc_trace+0x616/0x780 [ 198.970830] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 198.976351] ? _copy_from_user+0xdf/0x150 [ 198.980486] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 198.986007] ? copy_mount_options+0x285/0x380 [ 198.990492] ksys_mount+0x12d/0x140 [ 198.994103] SyS_mount+0x35/0x50 [ 198.997451] ? ksys_mount+0x140/0x140 [ 199.001241] do_syscall_64+0x29e/0x9d0 [ 199.005115] ? vmalloc_sync_all+0x30/0x30 [ 199.009254] ? _raw_spin_unlock_irq+0x27/0x70 [ 199.013739] ? finish_task_switch+0x1ca/0x810 [ 199.018224] ? syscall_return_slowpath+0x5c0/0x5c0 [ 199.023138] ? syscall_return_slowpath+0x30f/0x5c0 [ 199.028059] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 199.033411] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 199.038246] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 199.043424] RIP: 0033:0x455329 2018/04/18 07:41:31 executing program 3: r0 = socket$kcm(0x2, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000740)={&(0x7f0000000000)=@in={0x2, 0x4e23, @multicast2=0xe0000002}, 0x80, &(0x7f0000000200), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="300000000000000000000000070000008921eeb35cd8bd7fcc0c1b988e1c9d86c39351f1"], 0x24}, 0x0) [ 199.046595] RSP: 002b:00007fdcd2ef2c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 199.054297] RAX: ffffffffffffffda RBX: 00007fdcd2ef36d4 RCX: 0000000000455329 [ 199.061552] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 199.068807] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 199.076062] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 199.083314] R13: 00000000000003fb R14: 00000000006f9028 R15: 000000000000000a 2018/04/18 07:41:31 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000f97ff8)) socketpair(0x8, 0x5, 0xfeffffff, &(0x7f00000001c0)) 2018/04/18 07:41:31 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x9) close(0xffffffffffffffff) gettid() socket$kcm(0x29, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x0, 0xffffffffffff36f1, 0x0, 0x18}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x10) perf_event_open(&(0x7f0000000500)={0x0, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/18 07:41:31 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x2200000000000000, &(0x7f0000000100)) 2018/04/18 07:41:31 executing program 3: r0 = socket$kcm(0x2, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000740)={&(0x7f0000000000)=@in={0x2, 0x4e23, @multicast2=0xe0000002}, 0x80, &(0x7f0000000200), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="300000000000000000000000070000008921eeb35cd8bd7fcc0c1b988e1c9d86c39351f17f9b04b22b00"], 0x2a}, 0x0) 2018/04/18 07:41:31 executing program 1: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x100}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x9) close(r0) gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={r2, 0x28, &(0x7f0000000740)}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r3}, 0x10) 2018/04/18 07:41:31 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000f97ff8)) socketpair(0x8, 0x5, 0x15, &(0x7f00000001c0)) 2018/04/18 07:41:31 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x4700, &(0x7f0000000100)) 2018/04/18 07:41:31 executing program 7 (fault-call:4 fault-nth:11): mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/18 07:41:31 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x9) close(0xffffffffffffffff) gettid() socket$kcm(0x29, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x0, 0xffffffffffff36f1, 0x0, 0x18}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x10) perf_event_open(&(0x7f0000000500)={0x0, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) [ 199.475973] FAULT_INJECTION: forcing a failure. [ 199.475973] name failslab, interval 1, probability 0, space 0, times 0 [ 199.487372] CPU: 0 PID: 18099 Comm: syz-executor7 Not tainted 4.16.0+ #3 [ 199.494216] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 199.503569] Call Trace: [ 199.506151] dump_stack+0x1b9/0x294 [ 199.509772] ? dump_stack_print_info.cold.2+0x52/0x52 [ 199.514956] ? perf_trace_lock_acquire+0xe3/0x980 [ 199.519792] ? __save_stack_trace+0x7e/0xd0 [ 199.524111] should_fail.cold.4+0xa/0x1a [ 199.528165] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 199.533256] ? save_stack+0x43/0xd0 [ 199.536870] ? kasan_kmalloc+0xc4/0xe0 [ 199.540745] ? kmem_cache_alloc_trace+0x152/0x780 [ 199.545576] ? __memcg_init_list_lru_node+0x17d/0x2c0 [ 199.550768] ? __list_lru_init+0x456/0x790 [ 199.554993] ? sget_userns+0x6d9/0xf20 [ 199.558879] ? graph_lock+0x170/0x170 [ 199.562670] ? do_mount+0x564/0x3070 [ 199.566377] ? ksys_mount+0x12d/0x140 [ 199.570162] ? SyS_mount+0x35/0x50 [ 199.573690] ? do_syscall_64+0x29e/0x9d0 [ 199.577749] ? find_held_lock+0x36/0x1c0 [ 199.581805] ? __lock_is_held+0xb5/0x140 [ 199.585869] ? check_same_owner+0x320/0x320 [ 199.590183] ? rcu_note_context_switch+0x710/0x710 [ 199.595115] __should_failslab+0x124/0x180 [ 199.599344] should_failslab+0x9/0x14 [ 199.603131] kmem_cache_alloc_trace+0x2cb/0x780 [ 199.607784] ? __kmalloc_node+0x33/0x70 [ 199.611743] ? __kmalloc_node+0x33/0x70 [ 199.615707] ? rcu_read_lock_sched_held+0x108/0x120 [ 199.620731] __memcg_init_list_lru_node+0x17d/0x2c0 [ 199.625741] ? kvfree_rcu+0x20/0x20 [ 199.629367] ? __kmalloc_node+0x47/0x70 [ 199.633345] __list_lru_init+0x456/0x790 [ 199.637398] ? list_lru_destroy+0x4c0/0x4c0 [ 199.641710] ? mark_held_locks+0xc9/0x160 [ 199.645856] ? __raw_spin_lock_init+0x1c/0x100 [ 199.650425] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 199.655436] ? __lockdep_init_map+0x105/0x590 [ 199.659928] ? lockdep_init_map+0x9/0x10 [ 199.663985] sget_userns+0x6d9/0xf20 [ 199.667693] ? set_anon_super+0x20/0x20 [ 199.671656] ? get_empty_filp.cold.7+0x3e/0x3e [ 199.676228] ? destroy_unused_super.part.9+0x100/0x100 [ 199.681498] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 199.686509] ? kasan_check_read+0x11/0x20 [ 199.690651] ? rcu_pm_notify+0xc0/0xc0 [ 199.694527] ? trace_hardirqs_off+0xd/0x10 [ 199.698760] ? cap_capable+0x1f9/0x260 [ 199.702641] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 199.708168] ? security_capable+0x99/0xc0 [ 199.712308] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 199.717831] ? ns_capable_common+0x13f/0x170 [ 199.722232] mount_ns+0x8f/0x1d0 [ 199.725587] ? rpc_pipe_release+0xb70/0xb70 [ 199.729897] rpc_mount+0x9e/0xd0 [ 199.733255] mount_fs+0xae/0x328 [ 199.736616] vfs_kern_mount.part.34+0xd4/0x4d0 [ 199.741190] ? may_umount+0xb0/0xb0 [ 199.744805] ? _raw_read_unlock+0x22/0x30 [ 199.748942] ? __get_fs_type+0x97/0xc0 [ 199.752822] do_mount+0x564/0x3070 [ 199.756356] ? copy_mount_string+0x40/0x40 [ 199.760578] ? rcu_pm_notify+0xc0/0xc0 [ 199.764461] ? copy_mount_options+0x5f/0x380 [ 199.768855] ? rcu_read_lock_sched_held+0x108/0x120 [ 199.773857] ? kmem_cache_alloc_trace+0x616/0x780 [ 199.778700] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 199.784224] ? copy_mount_options+0x285/0x380 [ 199.788710] ksys_mount+0x12d/0x140 [ 199.792324] SyS_mount+0x35/0x50 [ 199.795674] ? ksys_mount+0x140/0x140 [ 199.799467] do_syscall_64+0x29e/0x9d0 [ 199.803343] ? vmalloc_sync_all+0x30/0x30 [ 199.807483] ? _raw_spin_unlock_irq+0x27/0x70 [ 199.811967] ? finish_task_switch+0x1ca/0x810 [ 199.816458] ? syscall_return_slowpath+0x5c0/0x5c0 [ 199.821378] ? syscall_return_slowpath+0x30f/0x5c0 [ 199.826301] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 199.831656] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 199.836491] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 199.841666] RIP: 0033:0x455329 [ 199.844843] RSP: 002b:00007fdcd2ef2c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 199.852540] RAX: ffffffffffffffda RBX: 00007fdcd2ef36d4 RCX: 0000000000455329 [ 199.859798] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 199.867054] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 199.874307] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 199.881562] R13: 00000000000003fb R14: 00000000006f9028 R15: 000000000000000b 2018/04/18 07:41:32 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000f97ff8)) socketpair(0x8, 0x5, 0x1400, &(0x7f00000001c0)) 2018/04/18 07:41:32 executing program 1: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x100}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x9) close(r0) gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={r2, 0x28, &(0x7f0000000740)}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r3}, 0x10) 2018/04/18 07:41:32 executing program 2: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004, 0x4000009d}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000000000000000000000000000711000000000000000000000bb01859e3abadcbc950000000000000000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r1, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x59616d61, 0xffffffffffffffff, 0x1, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r2, &(0x7f0000002a40)={&(0x7f0000000340)=@nfc_llcp={0x27, 0x0, 0x2, 0x7, 0x1, 0x9, "4cde779857cc994d1a41dfb5a47f1b8bbf77546ff5c30346fd4366ca0a2bde049a64aefa1189f8fb1220370ade3ca4dcf55271de78bf773be38e7e4c26b922", 0x10}, 0x80, &(0x7f0000002800)=[{&(0x7f00000003c0)="0b573ea6cd623496b08323305b76ff9564fd78645ed32512114db31cd0fd6821acb628659fa25f2a0da751ba28ee123e71e92279f7b283e0b7c029a0a32179c5720107c3a263", 0x46}, {&(0x7f0000000440)="fefa1f56ca014631e2ba46dbcdebc24241cd4e9e88c47e1ffefb7f4106ba6266771adfd8d6f83e29fb80d7a1a3f49589ace02f8e0c841f9aa02b34c7c410a63b17c3c42bc1007eaefe3ea073", 0x4c}, {&(0x7f00000004c0)="f384c2413356c6a736a77c7023c64b06803ed3dc217ec4d65db8fe4381a2c5c8ee4fc1bd8e35094957782a52f50e1b37b8b78036ef8b504cfefaccb63e27865f4398715f43f8d6f06c0ed142379f1f67b48c3d405ed3571b00071af6543eb149c07cd204a0da3de63a8bcb188002b9cf3a", 0x71}, {&(0x7f0000000540)="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", 0x1000}, {&(0x7f0000001540)="abb595d8b4f874da1112f74d52d71574c3ef2ab3f72f3506a0dbdef72f1058ff539e16a58dd7886c3ed16328c10bac6ab5f01568db4f0a0c69484cda90104ee132adbe98090f3dfd017504f321fc8f6b735403313dcacfe4f9c2c4c420fac285c180c4de2ed36976b7e30c009c774c1011fd0e73c2e384ce201da82226ad263ee64a29aa8ffd95bf83d89b1fae3f525215d1f7ef795b8e55d828e45804aaafc92c5c5ea4b6e4f37343021bba438c101eeb8642e98975c7d5a82fe41d0a2663357d6a1803339ccfde1c", 0xc9}, {&(0x7f0000001640)="bcd3ef9e39d3ee9a52b2fd906bad3632ecb5652954b12db6985a91a04bfcd7a6915eed003bbcb3e91a81b1f8abe9e22ab2f5a9ea8cf965d5753a7d38d6feb0e46bc508b3afe88a4053278ee743b10b57b7293824b2b28089a2e6a3f8475b0d7bf79e817d03c46be6cc0fa36d948255afd72a0b2173bde254439fdad412dd35b29fd1f08524e21457bf09b32454b1d2dda57aace303c559", 0x97}, {&(0x7f0000001700)="f84f57a3d7d604127038891e9604768138aed5f49c0264ed57fbb7b1f3af20804a139d1451491a627e36c265f6fd337a82f3dfe171f7691f9caef194b4d8e293ba1d039033afe6e8cb934eafb0dbd656ed3c5ebf6ee5e1221af35174c9653ac586e3d86baa91cad5a4e5393e7e9ceffd61cab16184e0a8a84c6dea0bffa512227462f0c99cc9f5ba46796757f41dba479062834eaf0237d6acd72944a1ff49f2a9442673696540402d76cefb5c27afa38736913c9858ec795124222dbb3cdf0ba36e57186820969e9e3debbcea9389250a99ef3ab638d28d6d745cb6056df682ab967986cbb7adc438b3b5e1c800e6a08ea6e78e9622a0809431b930da77ed0cb87d8d3567a91f307d9020a6f2f00c13de2e56f77fb5ce3422c837ddbdadaa0359c01b14c6002a25f903666da20917fbd05420065d9d23aa72cc18f513b5963d89bff0e15676eb8b1b2c1a64e8b7091f5d8901fc52f77407e38e180f3075b9042a57b315a27be57d9a66036372d8d9fda80bb1f88853b3f083ca241f88a7467efbf689353920ff56e79fc000ddf7958b7d02b8c8f28121fa64f54393b452c2712b83d5c750cbbd7a62bcf614cae4e9d2687119cfa24d834a6691ac4c66752ae3405715add62f14bf69f05ef61b558f910933da054f9b0d4b03c7919ceaa12ce4b7aae4ec125cca307b6eaf1969ef877834a3426268f56aa36e2240ae479d76201dc77de63f7a8e668847e0a2bb1bca159ba0c03e41bf604868a143d2277c93f2b6d775b104faad6cb6a0ccfb48a379b9a7c6549d6a75d755311a77234ff64cb6d6a567fd3b103cf59bf7f1fa0a6b759ff0ae14a2b4341c6637ff2fe0bd0466026eb52dd8d25709e53f6dadaf14a6f6f2b3004b501706683d795117f71292582311451f0342a2b5312646301a1dbc22c972dbd8fb2da33f9c05d83374d8bf8a4fa98092eb78d969ed8db3a5f46f8aa9b0ad894244ac31edd76eb431bf7a05a96fb640dcc4606c222730a0cf2ae956728caef2b8998d7ed8612d54fb5d9c2e7703f4f9fd76ce445553c56b1f86b9a5e8bc463bf994ef49327607a5b25119b2e231bd5b16abc7a936971a3d1e9dd6f640fe57af04163e2bf4e08aab759cdf9a266d83f3b9295ed75dff85545e2e66b1a19d8ca6112bead7881be01356d1683f262450214d2054173a0f09e6fc3f243696da5dbe33fd20dc90d1265528cb71f8782e1d7de47c4bd3649af658a622d0ca174430c4acac8ea08c2cae764a6a5cbeaa4fb3ce151150422b6241dfbfb900298e2978314c7da0664d28fe3e3b43d0b3f9ab8862bc2f71182e5bc81f3d1c2be2dee8d9ab7ce5e3ede04d7ba6c2d569298fd307619fe5bf91af883d7117a3975302527b68396418145ca5f254bf58d230d56e833727f2ba8dd4bf00ed54d85431baf505acc2f0f7f03fba4908ffd4d87b16143f1c024a5facc49532feb97d3502854aa2d72ab9f94bf39c29c689841200da81556c5cda4653eb5dd0e8a190f16e2b30a15ef808c46b2260c617f049cf9295594870922388b407048a902cc0c1f0b85ac89283b616bebaa931499443dd9a57b4a2daa47278af42191906f7e3e63c0d13cedebc253bac1ccd3c392bce9e64bcce1ba576b1a73c0d42cc7a71920dd5785216086b7f8727985d7db9030fb04ce065cedf2f888ddd5be920ef3846af4553e95a9d0470638d7e665af8fffa2091e44c9e06844f3dedd220ba2855d77c5f1b42d352b1b7eb28cf28d954682936f07714989a6b7b07cd4683eb226fdd14f4f947495b335495f929d99834612d97df80637598973bc961ddcc6deffd6e5e812cc49e8160af7c4d83324a64bd3483de723b8b7f9b8a261b73233df8f073db858d88740e06ea581eb518b1cb463dbf6971202a9ed4c74d1abfe7cbe69eaaeeb84edc954105826dbb2b0fa93ce14572a32275b6df3e4b5f4c56d5e650e66a3a1e98ae63a6f0e39d6c8fcdc58ea2d67e0daa910788071afc98aba1229a67917f400149752dd060882f57ee56234cdad134f9c9736329bf96c237a14379f9274546273d2401dc50641eae813e48bbaa3f277370673e195044c82774be011ad0c438d515104ab312f0c91a81960492b19527afce10e96402f9178a1108990e6953c419ef45e4170be155f645c127663f910ea081aa068aa46dc455f2f9d5508c1076c85a0ef27d7b29aaae587330c46697ed5533253d6720412bd5c0a4610754878630eda3c4e4b39f82c16578fc50c3a3b0f310bf9b00c0772dddb60506a49a6f795e76ccec8eccb78cd409f0cbba762604cc8ef8978c642e31505d0d63ba1648f8eec54ce098379652e97f9b70d5f86b149fee1bc080363788ca5fb6661f9445aa3d4befff90cc861ff971b912e33723149a4ab9075158158f33e17e82e30dcb898ec25cf7193f7d516b69ebd7bdd6c29cfbc918c87455ffa737c888362ca1e64d3b414e236354fc609563aee9cfb9348107f1ba87fc5b4ffd0ce6fb0897a0870e79c5d77c68ec2a927508ca0ba8beb6332ae7cf746ca5e93d3e1634fa6e1584e4f7fa1fae76ee32eb2aafeaf8d0711ef5c266619242ba69fcca6981c80741c6b3302986d7f453481054af150d8b3d44fe9ac8880e3feb81e505ad88e7da65b79cf73c6cf2f096baa10775ea66333c7af0ddd40e6428582e945942f8ed3919f852c96a10594608b1b1649bc2ca973df5ba347944e86bbe53097626778ce3b07df89c13fc21aad955eca07c2bfca4defeb6ca67eac4c7dee64607c55857bdd2ef72f12f8cbf8abe13409fdd1e5fc856b1edff45a19a42788cd32651b9d242f7f45a4b5e7009ac11c18e74fc562a0cabaf90de42c9563e60eda702b7fe167a4efa36ca7c1e8be8858aa6eb620a47e269d480d7ed28003bffaf6133b881c332ed05dd714ee9acc5d1c398be7d5ff0a4ad3cf7555e3938febbb65a60e8b005c895aaf30ad3b115a53284837d616d137a9d6875824112ebdaee6bd3215c482376df025eeedfada01a2141782ac7d4ef266b73571ea142f6975d5a0f93004b3bf343b2424aecc78cdf5202ddedcd72bd53d1074d85eea777798733877208fcc91f1ec425a7d73d289c0a41146fee23c84f866071095caffde2220732a3a682d09713585d2d965478917e6bbb4ff79012cee4d6bc00e9c71823b8f0649eac40d875104f9fb24c253ad2d9cb7653c2c18fcaad0b9448661ef140e39a8cee2a6375bf5155ecdcce425a22c480e619bbcae24e9e63948084846fe4fd15be886ae5ed55adf2634334e54240b9511acb1f903f9af58a00a78a165d01c478fb6046b38c918bfa7839a3829d8cfb1b4cbe0fd17fbffd16b1e4c55aad70f4309169786904b401abe23b59bd7ad70480e0dbec68f1e22c132c46bd541a45045e808e5fc24304aa506a523d50b9e5ca4984bf7df91bac113875a9ac7f0947484ecd466e9679fe198437760cc69ccac198883687158806641d5eee30e67c141df047c1f7d5fe2d062258ae754f9f949dc30ea88e0db60d110435313bfa7dd1bf13c4fd48e4ca2cc7369f2611430e20d56a54ff6076d7166bcb8318f73490f925e2419dca4ea43f48a6a8a74588c9ca95d03a0819270754bd081f53c6930938080a87ab711388b43d1154c40c440e2df83eb49ba7c9ad44069bf2a8e4ce28bacc8d786c85f1d2368e4fd55e1793c36fc252edf8b771bf37411cd9ba03f9c0fd79a21d04bd264cceb933e12d03504232fb9b1cf374c04c6d898283d06359f97a8666b3985daf9bdee70a847a2f6919eb099c1dfdee5067f041a2a5c98b754f749c25aa6d7083c1b0560543485ac1243ccccbcb2eb4821016668f067989f7a08a3595bae57fab8c6808c20b3e9cd0019e55951b0f96e7fb69a05e40f9f06ce7fdeeac560ef3c901f9bf544e21f8c8dacfd39d00916f05389b3314bc8ece88bc95545ddc5cfc2a96f6da91735b551fd09b3a39512fc0929e2b9fbaaf0457426bebd1c873e18aeabe1bac1a35b6a83f2488a3c35a7e3b84e26c8bfa123d8b2468c61e5ddd60dc803fbe93a54d3ece1ea1018542e03a2d14bb804122983c7d08d4a6094e40185b2d31118c2df8a7fc5e1b847d60bbd9cfa074eb314eb366b172354047b92486d86215fa60ecc5b7b5a699b3cba131d2289c4a9069e7b10e918d6ade6404fd63b07ae1f2ebb9dc484b28024a90e8e4b93ff042bfc708ea08a30731196c5d354497b93612c249ca603604cea50a1570a64d708db87b3508c993b61606fcd5247bd1d9eca6b90bb07e4aaa51b147736cd4070e76133235fdfaa0020f231da1e46e28e804521f6b8bc8556b527e2edc9364718530fa14397fa342d234ee8b81fb4905bfc0a54df7682454f7d608aee07001ee40f7d01fe24c71b02510e49b68c0a26305b0a9a32b20238199453e30725d3ed7b397aa8a16be45725e17c6e3c7e0ab89d2540426eacadec447d3697644575a3f6381ee19ac81bf3a0697248f040b2ded5855b2fd8512c0abc0a02e7ffb55cc5086a61b955395aa86dd616640430db7c4fbd2d8e03e46c9a254fc2d3051fcb4d570b1220ec474e0420b267cecaeeda1e08cbefcf2a935ed59e63a2cb58950aa05e327bf9546192eba307e550bbeadcd56e84f74c3ffaf3832ada21fa219d312cb38ca2d495ed43bf4991fedd7f1e1dc57c9becc18767d57bcc53edcefe9cf98f138ff6be126e415bff5f58813e8c21210fded39bc1f771c7443708a84a7909230012860038ef158913bf4c5b505ee64cbef3ab6246e0445398bf5e4829cfa2fa89ba1e3be60baefab3d2f999b0dce59686daa723bfd71136443f9520034f6a13d28fdf4bed6ef21202f32a531ea25e144fe7f2e094f6229fe5f8e3be8ea8347b1cfc4e0ac0fc39de51386be8b5c5c324c8f453ac1e39163c828dee7a9207e3bcc807b14fb787ac4d276fb067c716a58e106823e50076c713e5e90a3dca887bc425477f04aa610e7608e2782e6da0f290c1ade88ac5afeced454e349f63d91d669a079b85c750e40c69c8b06239f7d838dad2bb5e725a72063f7e3b0d6bbab20cc9a8886d4037e215feddfab39252e6752274bc1b4ac871b198e9b009e838f0f839db6686ec5e80bd28a4a6d60a922626c1ca7e26bb30d3b03e2ed3c3921daf67241026deb2269a54749ae1285660b2218aceec14e49290f5afebc5d762f7240df9968beabbba1b4e6993285d4fb7efc60fecd4beb26fb4318f738e185a2ec14223bcf9f1056c0134f0f442aa4a88de64d6178680ccd3244362a51b730e89b33e6e339cf517f2804c2e0eec2ae89cc070d2084a1fec6563f0ba5e0714ad3cbaabc62f59cebd1c6a777d58220a8e8d57515970774765d66bba700bca67d3ca65fb0b23673db410485ac35ba248d04f555d13c7959f7a23eb195c3cabb58205453f33ed03a7a5c05e92c8973d05ec35d8bad8b967b2f0af1d7079a19943489cf334b79e7e007cdda414b98e4a6be4c51e5f8d2127a681efe1bb875a9ec8733bced9a364af14040ef01d523cfc42d1bfd32c0310e1be3697a256a86259dfc55fffc5b1717d0e7335ee9055087cf463841823eccd225de23d715f75723b72c648daefd885ed0dadd7f8c7e0dbdede77406b7045df2f30e149cfa9e44f3c6c69ed83582ee4536c9c6bdde8265c3ecc5ff4203a1905575cdc2938d48bb32eef7a52a092f0b144378ede8776f3d4b125c70b510a83c91ffeb4dfbc50606106a0a2c2f8644da78b38439fa4bce2ebf4803da6ef2eff6ecf7566da5cdad8b1d64450b3fc1d54d5075d271661028", 0x1000}, {&(0x7f0000002700)="462dc3793559767d2041e6cd4447bd2d5078e6809fdf257be0213ff251662e1c006f44b3db4e2902933b059caf952fe1dae45022ba86718a6fef775ec4b8437bcd8c04b7499bc6ec3217e86153f8b8d3a57fd83ccacc49b7e31f618bd9134a315fc32bbc5124a6d9cb7c6f4e7878a0502553d548c520f53541eac72eaa9f42c584604fc7f9caa56aca84e719836e6c4af70ec16b79f907cbde1677bae4444d57792cd2c1f1e271af9480f3d517dd3fc33a1b3840229c094f01306e7779267a4106ea75a18a08fc5700", 0xc9}], 0x8, &(0x7f0000002880)=[{0xf0, 0x11f, 0x6, "a156ac614bd44a31b51397127de8bd428481b67e31761fe6f0319e0d54d629c53d767f7167ae9b4dcbed11134de15aee4f3b28b172b60802131af86d35984f1268f2088d451acaddd6394d5b9536e79af13e88fa995223d59a3c15a4638e849dddd53f8a48e550536fded9a5f4f7ffca82112d28f48782fed4ede057aa886b00668e1dd28ddd6c893169dd64e95562c4e7ee103992732cdf66e8925e08cb0b87e19957b09a105c470f71a4bb4097336f9d5fe8e2e620482f4cb71c3d62301596ab0a73e9eea63e3077120cf32bab0823ae48909d246a6aeb53ce2c"}, {0x88, 0x9f, 0x4, "5dba7fee6f2e2d2408836ed14a326e6b78249e1366cd32dde9ffaf0e2c940645bb0089353e6ce9b6f2a6008fc710f853eccd956b2df40c4a3e9401973a0cabef73a2aee52b9e9300090cb923e18a4570181b4359f69d673d23a020af011b5e84d0091672294ffdb6eecd944c2b35e80269d4"}, {0x28, 0x109, 0x20, "6bd974ab08935a7b7cf44a7a0d37d402b598"}], 0x1a0, 0x40}, 0x4000004) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000300)={r0, &(0x7f0000000180)="1fea62d359358e4c7ef6f72567d86574fb2b3d5e3fbb0486c73e6765aa71f53ebd03c583dff32403f5aeb44e63335878f3f87f65acb1755e72e2e0270cb2e7ef88e02d69c8d3ffd0d4153cd588a2dbb0d84591070b07d61d33d30d1b9fdcb12ffbc527c34fe88a01b69216187f2dd58950f02653c7f14a84fce6c629349532ff2f1eedd4dafc4c1e88ffff16b14a4876d3b5337e7078ba53749761f75dd583d1f57462b5426c42162b548bd44c113d4da4239ede3c1b8f", &(0x7f0000000240)="b5bd7c26582952c0c70b10013f4711dd46fe19be21a23d2f104f331743de5a1b6e747b58919965f114d31c76b7a62178eca8c110c11f6a82afa3caac9e1a5416625438ac339c41f33073fadd7490ba78b22aecdc48c134d38f37d67300b2c2609d511b20a8c73906757afc88602fc6907bc3f508748c86e6e4dfc36f1315334059b794006a9a9ee96b84c3", 0x2}, 0x20) socketpair$inet_icmp(0x59616d61, 0xffffffffffffffff, 0x1, &(0x7f0000000000)) 2018/04/18 07:41:32 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x9) close(0xffffffffffffffff) gettid() socket$kcm(0x29, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x0, 0xffffffffffff36f1, 0x0, 0x18}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x10) perf_event_open(&(0x7f0000000500)={0x0, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/18 07:41:32 executing program 7 (fault-call:4 fault-nth:12): mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/18 07:41:32 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x92, &(0x7f0000000100)) 2018/04/18 07:41:32 executing program 5: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x100}, 0x2c) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) close(r0) gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={r2, 0x28, &(0x7f0000000740)}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r3}, 0x10) 2018/04/18 07:41:32 executing program 3: r0 = socket$kcm(0x2, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000740)={&(0x7f0000000000)=@in={0x2, 0x4e23, @multicast2=0xe0000002}, 0x80, &(0x7f0000000200), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="300000000000000000000000070000008921eeb35cd8bd7fcc0c1b988e1c9d86c39351f17f9b04b22b00"], 0x2a}, 0x0) 2018/04/18 07:41:32 executing program 3: r0 = socket$kcm(0x2, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000740)={&(0x7f0000000000)=@in={0x2, 0x4e23, @multicast2=0xe0000002}, 0x80, &(0x7f0000000200), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="300000000000000000000000070000008921eeb35cd8bd7fcc0c1b988e1c9d86c39351f17f9b04b22b00"], 0x2a}, 0x0) 2018/04/18 07:41:32 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000f97ff8)) socketpair(0x8, 0x5, 0x15000000, &(0x7f00000001c0)) [ 200.026951] FAULT_INJECTION: forcing a failure. [ 200.026951] name failslab, interval 1, probability 0, space 0, times 0 [ 200.038343] CPU: 0 PID: 18123 Comm: syz-executor7 Not tainted 4.16.0+ #3 [ 200.045191] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 200.054549] Call Trace: [ 200.057154] dump_stack+0x1b9/0x294 [ 200.060801] ? dump_stack_print_info.cold.2+0x52/0x52 [ 200.066001] ? perf_trace_lock_acquire+0xe3/0x980 [ 200.070859] ? __save_stack_trace+0x7e/0xd0 2018/04/18 07:41:32 executing program 2: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000200)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f6716b120058b424d5c611a4b0abd0117e97c440ed143e626e0629fc1902d4eaa9c6dad31cd9ec2e7350746c9f2372b5f945742b222a25e15bead9a"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004, 0x4000009d}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x59616d61, 0xffffffffffffffff, 0x1, &(0x7f0000000000)) socketpair$inet_icmp(0x59616d61, 0xffffffffffffffff, 0x1, &(0x7f0000000000)) [ 200.075206] should_fail.cold.4+0xa/0x1a [ 200.079284] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 200.084404] ? save_stack+0x43/0xd0 [ 200.088042] ? kasan_kmalloc+0xc4/0xe0 [ 200.091937] ? kmem_cache_alloc_trace+0x152/0x780 [ 200.096792] ? __memcg_init_list_lru_node+0x17d/0x2c0 [ 200.101994] ? __list_lru_init+0x456/0x790 [ 200.106240] ? sget_userns+0x6d9/0xf20 [ 200.110140] ? graph_lock+0x170/0x170 [ 200.113945] ? do_mount+0x564/0x3070 [ 200.117668] ? ksys_mount+0x12d/0x140 [ 200.121476] ? SyS_mount+0x35/0x50 [ 200.125048] ? do_syscall_64+0x29e/0x9d0 [ 200.129121] ? find_held_lock+0x36/0x1c0 [ 200.133198] ? __lock_is_held+0xb5/0x140 [ 200.137290] ? check_same_owner+0x320/0x320 [ 200.141632] ? rcu_note_context_switch+0x710/0x710 [ 200.146580] __should_failslab+0x124/0x180 [ 200.150834] should_failslab+0x9/0x14 [ 200.154645] kmem_cache_alloc_trace+0x2cb/0x780 [ 200.159326] ? __kmalloc_node+0x33/0x70 [ 200.163320] ? __kmalloc_node+0x33/0x70 [ 200.167302] ? rcu_read_lock_sched_held+0x108/0x120 [ 200.172324] __memcg_init_list_lru_node+0x17d/0x2c0 [ 200.177336] ? kvfree_rcu+0x20/0x20 [ 200.180955] ? __kmalloc_node+0x47/0x70 [ 200.184926] __list_lru_init+0x456/0x790 [ 200.188982] ? list_lru_destroy+0x4c0/0x4c0 [ 200.193293] ? mark_held_locks+0xc9/0x160 [ 200.197429] ? __raw_spin_lock_init+0x1c/0x100 [ 200.201999] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 200.207003] ? __lockdep_init_map+0x105/0x590 [ 200.211488] ? lockdep_init_map+0x9/0x10 [ 200.215538] sget_userns+0x6d9/0xf20 [ 200.219233] ? set_anon_super+0x20/0x20 [ 200.223194] ? get_empty_filp.cold.7+0x3e/0x3e [ 200.227771] ? destroy_unused_super.part.9+0x100/0x100 [ 200.233041] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 200.238044] ? kasan_check_read+0x11/0x20 [ 200.242178] ? rcu_pm_notify+0xc0/0xc0 [ 200.246052] ? trace_hardirqs_off+0xd/0x10 [ 200.250274] ? cap_capable+0x1f9/0x260 [ 200.254152] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 200.259677] ? security_capable+0x99/0xc0 [ 200.263817] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 200.269346] ? ns_capable_common+0x13f/0x170 [ 200.273745] mount_ns+0x8f/0x1d0 [ 200.277097] ? rpc_pipe_release+0xb70/0xb70 [ 200.281406] rpc_mount+0x9e/0xd0 [ 200.284758] mount_fs+0xae/0x328 [ 200.288119] vfs_kern_mount.part.34+0xd4/0x4d0 [ 200.292691] ? may_umount+0xb0/0xb0 [ 200.296304] ? _raw_read_unlock+0x22/0x30 [ 200.300435] ? __get_fs_type+0x97/0xc0 [ 200.304313] do_mount+0x564/0x3070 [ 200.307845] ? copy_mount_string+0x40/0x40 [ 200.312062] ? rcu_pm_notify+0xc0/0xc0 [ 200.315938] ? copy_mount_options+0x5f/0x380 [ 200.320329] ? rcu_read_lock_sched_held+0x108/0x120 [ 200.325333] ? kmem_cache_alloc_trace+0x616/0x780 [ 200.330164] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 200.335684] ? _copy_from_user+0xdf/0x150 [ 200.339820] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 200.345342] ? copy_mount_options+0x285/0x380 [ 200.349826] ksys_mount+0x12d/0x140 [ 200.353448] SyS_mount+0x35/0x50 [ 200.356884] ? ksys_mount+0x140/0x140 [ 200.360674] do_syscall_64+0x29e/0x9d0 [ 200.364544] ? vmalloc_sync_all+0x30/0x30 [ 200.368678] ? finish_task_switch+0x1ca/0x810 [ 200.373161] ? syscall_return_slowpath+0x5c0/0x5c0 [ 200.378076] ? syscall_return_slowpath+0x30f/0x5c0 [ 200.382999] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 200.388351] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 200.393191] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 200.398366] RIP: 0033:0x455329 [ 200.401537] RSP: 002b:00007fdcd2ef2c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 200.409230] RAX: ffffffffffffffda RBX: 00007fdcd2ef36d4 RCX: 0000000000455329 [ 200.416483] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 2018/04/18 07:41:32 executing program 3: r0 = socket$kcm(0x2, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000740)={&(0x7f0000000000)=@in={0x2, 0x4e23, @multicast2=0xe0000002}, 0x80, &(0x7f0000000200), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="300000000000000000000000070000008921eeb35cd8bd7fcc0c1b988e1c9d86c39351f17f9b04b22b00000000"], 0x2d}, 0x0) 2018/04/18 07:41:32 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000f97ff8)) socketpair(0x8, 0x5, 0x1500, &(0x7f00000001c0)) [ 200.423739] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 200.430994] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 200.438252] R13: 00000000000003fb R14: 00000000006f9028 R15: 000000000000000c 2018/04/18 07:41:32 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x2e000000, &(0x7f0000000100)) 2018/04/18 07:41:32 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x9) close(0xffffffffffffffff) gettid() socket$kcm(0x29, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x0, 0xffffffffffff36f1, 0x0, 0x18}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x10) perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x0, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/18 07:41:33 executing program 5: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x100}, 0x2c) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) close(r0) gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={r2, 0x28, &(0x7f0000000740)}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)) 2018/04/18 07:41:33 executing program 1: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x9) close(r0) gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={r2, 0x28, &(0x7f0000000740)}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r3}, 0x10) 2018/04/18 07:41:33 executing program 3: r0 = socket$kcm(0x2, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000740)={&(0x7f0000000000)=@in={0x2, 0x4e23, @multicast2=0xe0000002}, 0x80, &(0x7f0000000200), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="300000000000000000000000070000008921eeb35cd8bd7fcc0c1b988e1c9d86c39351f17f9b04b22b00000000"], 0x2d}, 0x0) 2018/04/18 07:41:33 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000f97ff8)) socketpair(0x8, 0x5, 0x4000000, &(0x7f00000001c0)) 2018/04/18 07:41:33 executing program 3: r0 = socket$kcm(0x2, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000740)={&(0x7f0000000000)=@in={0x2, 0x4e23, @multicast2=0xe0000002}, 0x80, &(0x7f0000000200), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="300000000000000000000000070000008921eeb35cd8bd7fcc0c1b988e1c9d86c39351f17f9b04b22b00000000"], 0x2d}, 0x0) 2018/04/18 07:41:33 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x9) close(0xffffffffffffffff) gettid() socket$kcm(0x29, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x0, 0xffffffffffff36f1, 0x0, 0x18}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x10) perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x0, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/18 07:41:33 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_udp(0xa, 0x2, 0xae01, &(0x7f0000000100)) 2018/04/18 07:41:33 executing program 5: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x100}, 0x2c) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) close(r0) gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={r2, 0x28, &(0x7f0000000740)}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00'}, 0x10) 2018/04/18 07:41:33 executing program 1: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x9) close(r0) gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={r2, 0x28, &(0x7f0000000740)}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r3}, 0x10) 2018/04/18 07:41:33 executing program 7 (fault-call:4 fault-nth:13): mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/18 07:41:33 executing program 2: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000080)='./file0\x00', 0x0, 0x8}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004, 0x4000009d}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x59616d61, 0xffffffffffffffff, 0x1, &(0x7f0000000000)) socketpair$inet_icmp(0x59616d61, 0xffffffffffffffff, 0x1, &(0x7f0000000000)) 2018/04/18 07:41:33 executing program 3: r0 = socket$kcm(0x2, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000740)={&(0x7f0000000000)=@in={0x2, 0x4e23, @multicast2=0xe0000002}, 0x80, &(0x7f0000000200), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="300000000000000000000000070000008921eeb35cd8bd7fcc0c1b988e1c9d86c39351f17f9b04b22b000000000000"], 0x2f}, 0x0) [ 200.926306] FAULT_INJECTION: forcing a failure. [ 200.926306] name failslab, interval 1, probability 0, space 0, times 0 [ 200.937695] CPU: 0 PID: 18190 Comm: syz-executor7 Not tainted 4.16.0+ #3 [ 200.944549] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 200.953908] Call Trace: [ 200.956498] dump_stack+0x1b9/0x294 [ 200.960138] ? dump_stack_print_info.cold.2+0x52/0x52 [ 200.965314] ? perf_trace_lock_acquire+0xe3/0x980 [ 200.970154] ? __save_stack_trace+0x7e/0xd0 [ 200.974474] should_fail.cold.4+0xa/0x1a [ 200.978529] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 200.983623] ? save_stack+0x43/0xd0 [ 200.987239] ? kasan_kmalloc+0xc4/0xe0 [ 200.991125] ? kmem_cache_alloc_trace+0x152/0x780 [ 200.995962] ? __memcg_init_list_lru_node+0x17d/0x2c0 [ 201.001146] ? __list_lru_init+0x456/0x790 [ 201.005367] ? sget_userns+0x6d9/0xf20 [ 201.009252] ? graph_lock+0x170/0x170 [ 201.013040] ? do_mount+0x564/0x3070 [ 201.016741] ? ksys_mount+0x12d/0x140 [ 201.020527] ? SyS_mount+0x35/0x50 [ 201.024057] ? do_syscall_64+0x29e/0x9d0 [ 201.028111] ? find_held_lock+0x36/0x1c0 [ 201.032165] ? __lock_is_held+0xb5/0x140 [ 201.036230] ? check_same_owner+0x320/0x320 [ 201.040543] ? rcu_note_context_switch+0x710/0x710 [ 201.045465] __should_failslab+0x124/0x180 [ 201.049710] should_failslab+0x9/0x14 [ 201.053504] kmem_cache_alloc_trace+0x2cb/0x780 [ 201.058159] ? __kmalloc_node+0x33/0x70 [ 201.062118] ? __kmalloc_node+0x33/0x70 [ 201.066082] ? rcu_read_lock_sched_held+0x108/0x120 [ 201.071095] __memcg_init_list_lru_node+0x17d/0x2c0 [ 201.076107] ? kvfree_rcu+0x20/0x20 [ 201.079725] ? __kmalloc_node+0x47/0x70 [ 201.083696] __list_lru_init+0x456/0x790 [ 201.087755] ? list_lru_destroy+0x4c0/0x4c0 [ 201.092064] ? mark_held_locks+0xc9/0x160 [ 201.096202] ? __raw_spin_lock_init+0x1c/0x100 [ 201.100773] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 201.105778] ? __lockdep_init_map+0x105/0x590 [ 201.110265] ? lockdep_init_map+0x9/0x10 [ 201.114317] sget_userns+0x6d9/0xf20 [ 201.118018] ? set_anon_super+0x20/0x20 [ 201.121988] ? get_empty_filp.cold.7+0x3e/0x3e [ 201.126561] ? destroy_unused_super.part.9+0x100/0x100 [ 201.131832] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 201.136838] ? kasan_check_read+0x11/0x20 [ 201.140982] ? rcu_pm_notify+0xc0/0xc0 [ 201.144857] ? trace_hardirqs_off+0xd/0x10 [ 201.149080] ? cap_capable+0x1f9/0x260 [ 201.152962] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 201.158496] ? security_capable+0x99/0xc0 [ 201.162636] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 201.168163] ? ns_capable_common+0x13f/0x170 [ 201.172562] mount_ns+0x8f/0x1d0 [ 201.175919] ? rpc_pipe_release+0xb70/0xb70 [ 201.180234] rpc_mount+0x9e/0xd0 [ 201.183590] mount_fs+0xae/0x328 [ 201.186952] vfs_kern_mount.part.34+0xd4/0x4d0 [ 201.191537] ? may_umount+0xb0/0xb0 [ 201.195151] ? _raw_read_unlock+0x22/0x30 [ 201.199289] ? __get_fs_type+0x97/0xc0 [ 201.203171] do_mount+0x564/0x3070 [ 201.206707] ? copy_mount_string+0x40/0x40 [ 201.210931] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 201.215677] ? retint_kernel+0x10/0x10 [ 201.219569] ? __sanitizer_cov_trace_const_cmp2+0x20/0x20 [ 201.225099] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 201.230623] ? copy_mount_options+0x285/0x380 [ 201.235111] ksys_mount+0x12d/0x140 [ 201.238726] SyS_mount+0x35/0x50 [ 201.242079] ? ksys_mount+0x140/0x140 [ 201.245869] do_syscall_64+0x29e/0x9d0 [ 201.249745] ? vmalloc_sync_all+0x30/0x30 [ 201.253879] ? _raw_spin_unlock_irq+0x27/0x70 [ 201.258361] ? finish_task_switch+0x1ca/0x810 [ 201.262844] ? syscall_return_slowpath+0x5c0/0x5c0 [ 201.267761] ? syscall_return_slowpath+0x30f/0x5c0 [ 201.272684] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 201.278039] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 201.282876] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 201.288052] RIP: 0033:0x455329 [ 201.291229] RSP: 002b:00007fdcd2ef2c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 201.298925] RAX: ffffffffffffffda RBX: 00007fdcd2ef36d4 RCX: 0000000000455329 [ 201.306179] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 201.313434] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 201.320690] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 2018/04/18 07:41:33 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000f97ff8)) socketpair(0x8, 0x5, 0x1400000000000000, &(0x7f00000001c0)) 2018/04/18 07:41:33 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x9) close(0xffffffffffffffff) gettid() socket$kcm(0x29, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x0, 0xffffffffffff36f1, 0x0, 0x18}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x10) perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x0, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/18 07:41:33 executing program 2: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004, 0x4000009d}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000240)={r0, &(0x7f0000000180)="7df2c3e2c5be061658547bb88962dfba22db7424b119f453b323b196cf93bd3272ef437d315119f76c6e1c5924a3c7b034fa90001d826170d6ea4de7413dca15ddaf061bc274ff205672405a7427e430953fb8342dcf017783333464e874ba12a22340b0f607da6e240fc8cfd2d0a708a8558e4dcba5a91839a2df7de0487f15e6bc5db2321cd5aa6a4ae8", &(0x7f0000000080)=""/2}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r1, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x59616d61, 0xffffffffffffffff, 0x1, &(0x7f0000000000)) [ 201.327943] R13: 00000000000003fb R14: 00000000006f9028 R15: 000000000000000d 2018/04/18 07:41:33 executing program 3: r0 = socket$kcm(0x2, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000740)={&(0x7f0000000000)=@in={0x2, 0x4e23, @multicast2=0xe0000002}, 0x80, &(0x7f0000000200), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="300000000000000000000000070000008921eeb35cd8bd7fcc0c1b988e1c9d86c39351f17f9b04b22b000000000000"], 0x2f}, 0x0) 2018/04/18 07:41:33 executing program 1: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x9) close(r0) gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={r2, 0x28, &(0x7f0000000740)}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r3}, 0x10) 2018/04/18 07:41:33 executing program 5: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x100}, 0x2c) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) close(r0) gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={r2, 0x28, &(0x7f0000000740)}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000440)=0x5bc6) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r3}, 0x10) 2018/04/18 07:41:34 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x9) close(0xffffffffffffffff) gettid() socket$kcm(0x29, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x0, 0xffffffffffff36f1, 0x0, 0x18}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x10) perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x0, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/18 07:41:34 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x4000, &(0x7f0000000100)) 2018/04/18 07:41:34 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000f97ff8)) socketpair(0x8, 0x5, 0x1500000000000000, &(0x7f00000001c0)) 2018/04/18 07:41:34 executing program 2: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004, 0x4000009d}, 0x2c) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000080)) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r1, 0x50, &(0x7f00000000c0)}, 0x10) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000001200)={r0, &(0x7f0000000180)="d53097b0c5a5eaf4598664e425049dae01336e7e4bdba27be428e1f64f737fb22ba8c3816e2179b5c2972a69634e00fb32ceab7402727eec971d611604058856427ca4b48c3db2341d2870049ca819ed432883d6ca66f9a34e30aa4d8db4372c22394ad9534966dedd4e02b240dd9349fe4ac45f16b6b068b0c2c7fb", &(0x7f0000000200)=""/4096}, 0x18) socketpair$inet_icmp(0x59616d61, 0xffffffffffffffff, 0x1, &(0x7f0000000000)) socketpair$inet_icmp(0x59616d61, 0xffffffffffffffff, 0x1, &(0x7f0000000000)) 2018/04/18 07:41:34 executing program 3: r0 = socket$kcm(0x2, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000740)={&(0x7f0000000000)=@in={0x2, 0x4e23, @multicast2=0xe0000002}, 0x80, &(0x7f0000000200), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="300000000000000000000000070000008921eeb35cd8bd7fcc0c1b988e1c9d86c39351f17f9b04b22b000000000000"], 0x2f}, 0x0) 2018/04/18 07:41:34 executing program 1: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x9) close(r0) gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={r2, 0x28, &(0x7f0000000740)}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r3}, 0x10) 2018/04/18 07:41:34 executing program 7 (fault-call:4 fault-nth:14): mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/18 07:41:34 executing program 5: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x100}, 0x2c) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) close(r0) gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={r2, 0x28, &(0x7f0000000740)}, 0x10) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r3}, 0x10) [ 201.713482] FAULT_INJECTION: forcing a failure. [ 201.713482] name failslab, interval 1, probability 0, space 0, times 0 [ 201.724915] CPU: 1 PID: 18243 Comm: syz-executor7 Not tainted 4.16.0+ #3 [ 201.731765] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 201.741127] Call Trace: [ 201.743728] dump_stack+0x1b9/0x294 [ 201.747380] ? dump_stack_print_info.cold.2+0x52/0x52 [ 201.752581] ? perf_trace_lock_acquire+0xe3/0x980 [ 201.757438] ? __save_stack_trace+0x7e/0xd0 [ 201.761791] should_fail.cold.4+0xa/0x1a [ 201.765873] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 201.770998] ? save_stack+0x43/0xd0 [ 201.774641] ? kasan_kmalloc+0xc4/0xe0 [ 201.778538] ? kmem_cache_alloc_trace+0x152/0x780 [ 201.783400] ? __memcg_init_list_lru_node+0x17d/0x2c0 [ 201.788602] ? __list_lru_init+0x456/0x790 [ 201.792850] ? sget_userns+0x6d9/0xf20 [ 201.796750] ? graph_lock+0x170/0x170 [ 201.800563] ? do_mount+0x564/0x3070 [ 201.804286] ? ksys_mount+0x12d/0x140 [ 201.808091] ? SyS_mount+0x35/0x50 [ 201.811644] ? do_syscall_64+0x29e/0x9d0 [ 201.815718] ? find_held_lock+0x36/0x1c0 [ 201.819794] ? __lock_is_held+0xb5/0x140 [ 201.823892] ? check_same_owner+0x320/0x320 [ 201.828233] ? rcu_note_context_switch+0x710/0x710 [ 201.833188] __should_failslab+0x124/0x180 [ 201.837438] should_failslab+0x9/0x14 [ 201.841259] kmem_cache_alloc_trace+0x2cb/0x780 [ 201.846196] ? __kmalloc_node+0x33/0x70 [ 201.850181] ? __kmalloc_node+0x33/0x70 [ 201.854169] ? rcu_read_lock_sched_held+0x108/0x120 [ 201.859207] __memcg_init_list_lru_node+0x17d/0x2c0 [ 201.864242] ? kvfree_rcu+0x20/0x20 [ 201.867878] ? __kmalloc_node+0x47/0x70 [ 201.871880] __list_lru_init+0x456/0x790 [ 201.875962] ? list_lru_destroy+0x4c0/0x4c0 [ 201.880299] ? mark_held_locks+0xc9/0x160 [ 201.884458] ? __raw_spin_lock_init+0x1c/0x100 [ 201.889053] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 201.894082] ? __lockdep_init_map+0x105/0x590 [ 201.898592] ? lockdep_init_map+0x9/0x10 [ 201.902665] sget_userns+0x6d9/0xf20 [ 201.906384] ? set_anon_super+0x20/0x20 2018/04/18 07:41:34 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x2a01, &(0x7f0000000100)) 2018/04/18 07:41:34 executing program 3 (fault-call:1 fault-nth:0): r0 = socket$kcm(0x2, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000740)={&(0x7f0000000000)=@in={0x2, 0x4e23, @multicast2=0xe0000002}, 0x80, &(0x7f0000000200), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="300000000000000000000000070000008921eeb35cd8bd7fcc0c1b988e1c9d86c39351f17f9b04b22b00000000000000"], 0x30}, 0x0) 2018/04/18 07:41:34 executing program 2: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004, 0x4000009d}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f00000013c0)=ANY=[@ANYBLOB="18000000000000000000000000000000711000000000000000000000000000001329f2927d279c244a86f73995000000007f0000a751e4a45933d872e850821486c010fff7ebd940f36d75d1971fe1fdbf53fb678ad4db8a9132407ea9197ed1cb8539004ff4b86c1425aa6fc982a701e3c91a524c2238d97ea041117cc74b384a09e7bbdecab3647287b9871fdd66b6b16d6ade64f44454685eeeb0a3120d206638c124024a996e404b78dceceb1f486cfadb8cc3"], &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000180)="e286affa94a204da293cc503e512ac4dd036afbbdbdf02b3af6513fe954155393b0f699932e6a947b28954dcfbbed64f64e6859faf84afe76152d885e6547e67d253ecdeb1b58a0de3d4f1da1d333c5cd5178ba892dd94fa3682985018c969f07533344caa51ea51bf7d5b6aac0184f45af2101a30e50a5ab3bafc7f76049c5d673fbac5d1c4727397d4d366c69af575e5e8b42e1b0fd85030256c186feea61910e45f2412ef61c6c6efba42ea41c72e709e146be15a76aec3f6ee0faa53ef4cb6dc349e80ca9eb719982dca8e3784e754076bb35a3af3cf6bd1332c8044ae0b32c2360af846fe661f71bab6e9286e0a9cac4eae8bc5179d0dab951dfd795be8ed268f67deadddb242d7cfaf71636f829b33f515d3bdbf4c87bda88ce58c8c90fd2185857b5042eef6bf397daf04dd1ee7ba9be78cf5c96f06b8a0ac30777660b244a1a87a24a9600156a58ca998eb4dfa90865ecdf433bb5ffdcb5d483a8c61ff9dc7c0a222deb17c98f36e3b66b0aa2d404811fcb06dacc5be9db1dced5cf81c3e22a65ae819372ab53280b3aa6984d221515de81175687a7242f8768e69c7458df15c83a95ca4f5da3da6bb4e6c866290f946e070a194e29b9a248cd2f0cacbe91f14499d7a30a136b2d0cb7d74bdee606b9f1a56fa3567df3e17bfe8bee8cb790c09625b6d614eb6acd5a7656d90028235b6bc24eec1e78e92336cacbf9873fffa4faabd94c3110f1d140a9497bcfef22c18bd202a8166cf1582e38e8cdf8638dc0f0316e643225224a23033bc36dd8bd5bcb29e898dc849099f5c8c52e0d028982f318a408dce1c6f5014e13a3e5bb9e09c638a086b71032cdf5f1578cdd3a98b1b01d2cf5df72400b070f5875d97ae58a3a0a5d68d17909689b090a0ecba97d97af8a5f81f361a9a9970b23cc1dfa2ddd12b09cf7b89023b18d531113bd8be000213721f583c6b4c602cb2ea3fdfd135833a17a493268d2a566f243ee1ba96dda498cbc160113e05462610c74abcdb0350f953f82eea9eb628d468dbdcfca9253c648dca920a3b4504b2b45ea4d17fa827183aab9e86bacf1bc34e7f7e7462a648a51eeab5b1a1d07c7533da3037886bdca9216c57b9ff1fc767fae04d993291ade25cd7431a9399a4ba6875e0e7f2ec364af7e65115557fa4e7de3feef91495ce03b004a9fe8200f3c8cb96ee8c1fd723f548274e3964396dca6fc92865ea20be4a403c4a4241b39e42cf981400c9bf5ed8c11e571aa0b0e53dfc85857e1d34d4f3e393cd4d500d468e8eae88a6567f6570c215fed8d6c6cb11e612ef05804a58f5d46ad0d12e8fe4b1c07e0bcc5f1dcef7472e7e5508c9959ab814eadca691d8a618c9212c1afc65bd20cf6c2203a8d9540577871fafefe1338208e388de825e38138b22e31c1f69d33dedadfd4e070d4ed9f544044c33bb921c7ca331c2dc2bd175dfa178c4618a6a30d5e10e6da886b846b2cd514bc65c4f65fea519579db47a24510e8e6ccfeb45dcb7cfad04d2ac03dd923e2258ab588d7851415af3fb4e92b7583408c12a270a546f41702fcb52f2f172eb3790b66c9f87640aee876e81e1890b385d57784401612cc81a9103dede74c2a21a58c3972cceaf1e4cddd9c375bf0540a93f42e018f933631054dae6727d705b1656f06ad2e06e7eb03e85b0f0b150e41b4827dbad4b256da8e61daee2fd40dbd4fe0eeff9298d52b5577a1fa0c6a425a255b9398a2116ab993549327d7ca6e1b1c3a3adf55d0c8a04fb7ea17f4d24aea1ba495f947043e78666b0ad67088e15251e35f49ae579c66cfe511a806d3232b051ac5f6e7d5b5b74664616437509062fa21ad1afa9128f78eb1141517aa7c40b5792ec6d16b0ba811da7970872523bad4495a45320b8b479d2413639cd6f9c79685c5d0deb1d22c0021b13893e56dfefd7ddee7589d2e3a417777071dda6238d080d2ba07ab89b93596418a24de1c5387d1fdf3ee1aec6faab3ee53bb5b8dc36b3fc7e00a2af9611391323ba5b101a9629e429bf58e82c78a622dd9777266fdd174ab83568cffa9d87617af817ff894854b5f14a76738a58c9a467ee1e48821c889c50be923d8e1b75b553e1bf1dbfc5533bf63610a694c9cd0a3d151149f331bf09313ba3e5b3e08361ee63944cfd8568855a46a65f4968d0bea582d1d96044b402e6b519f1452589cc4861aeeb873a7ae6471882673802063fec2f0d9735202b07d7f27e15349321c46646c902c773fb38c56f76fa3998037be0aa94953557ccae69e240ceb50380e08f102e1274e9ad23ef798a8e4ee59d2eec8968dfcea45062471e4a6be1514d9d30b723aaf76f53645c919e1fd1f2300ede3cf45c6f32086864bbf5b15bcbcd5842c2cdf4db35e10c89f751e309890c87a6db139019dcc150ee7e2e9a595c43f915ce09635eff9383e9409973be820c09420404505de1c098b653773e8d1b5ba783dcb0c162dae01fc81f6db18a6cf5382a13e600c7fe083453f06973b7e8a3b47dba866c604a2229db12a92296f1653351a0b3786745ac4333a56b14082f867ea1a3c2adae5e52a3fc0f436ba79da0a96d0f05d48eddf4b470682e2e016e4b38bc69d5ee48f8c4d8fd35fe091a2f11c244b46b78a381bd5bcd36b35e809f48b1e3e939a9bb548cc1494f5b063ab4549b60fc4261c3c5950d926cd5e503b52bb47262926e0f70be2211f030dae4cc638eefaa5fe7b54e0140d2734158a1ef99c717518e2f09b4c7acbb8573aa2a2d0d03910f326a6e43913f19741474a40ca42010e431f380f1b9afc57851123e70d3b46bf2752df0660dbf2364f8340717e624ab90e5ca89da00a0d698013e39395941e339948cf816d75e1f6bce03c2c37f18f286230196f0e232f3acd896ec5e0b804cf4e1f54a7894db5f44e2a4c01d52e02c699f3dc1bcfa9e8daa19f56dd1d4ee6dc0ec45ca36faa2628e4cd1871c52f48a2c2dc59ae218eaea810fc3f7cf78894ecdb3c9200801f614a01ab1e99d910025d80168fd0b0717a17495fcc6515eee34b4c399ed705672766241a12cc4819cfc0ee8ca9c3eabdd2514d40de709f417e47ff9c78f3a7896149006656d0591cad4b9ad265bb187c7af486e7af1a56b7a72abe6c487d662318ffc5329aeaa0d9c14c022a6531c6780b9a3036359413a91a979c40097d05300ce10e332648b0e046b8e9d6d9d44cb6a51c283ca273726c460a0ec55fc9142655bcc495c0906919b04b02e70c2da226056714ed88dcf4a26f306163ddd5741d0b1224632f23058214e555740f5defb7e1bf8b8a026cc2695e430bafc1e8155b1f105e9a711c97957ca1d824f20ab56c3c2cf3fd63d7c557d07712cf5c3a2166cda54f5c7ab9a83f543d43a14144231dd08bdc2b0a34fd0e2a0d95169aeaa4e3abd0d889d2c4dd0ff92f66271f73f145382b9cee83fcc6deeac02e376a790f21c465443d57b3341b180b96e42c0531375cb129a20957fc7d57f3f3150a8180c55fd63a6ee1a3a564e63ab54a2181498ac80eb038ddd02456e995621e66ce929f9ed8e89061884f6adf33ce7d37055f365f1ffebc8ffc819feafca7653bc9e849dde931a25bac1ff3d15efd0f609c43efeeacf77748a160a23ab371b9cb353193cd56ae5f3e531ef5b0a25f9962e96060649023584a3c6e4c314c48348a6039d1fe2142dbfb80df0d226c9fb43d71e212c4af24322e06b0a5c915faa7a65f70a762f91d3029abd9448032b73c3e6a5d40a18b3eae126b71acfea25ca858ca81d9021eb6183cef52ffd4b40161225a848dce4d602f56e013b3dbf7e3c2ca8f2e276e2ce8b550591c0f81bd9c77d59c07adc9d55173aa4f4bc907f34838e4ac2492716e5c483be267fedae80a82e5cb030adc9925f6d4078288a02264441126f870f0ec18d2f525e9f427d8221be2418c64f0ec19c710f0d9cda2ced04760ee9ec07f6f76459cd9193eeb75cf1d104446534e64c0e0bca253b71e8fcb457cc6cf5cdfb3ef8251f98b31ee3cedd6eb81bd4d3e0d8cd3e341fc299d4ce2590678297d5172d359a10b1ca4f52b131208c726defe266de54f6dfd25072121ef7d519837df8944f4d2972060e0cbfcf6c55885760e77d6960d1e5e4884e1a68511a2776852d5ee5dd117ed969254165c06388273989d98b884ff48b132e063d34937a5a3ae2cd7d14bfe758065b41ce5cd7feb6a44621a5c9d25b0fc76a48ce8a1f6f2c5530921dc3d528e90065ba4897d07c9f52e5d99667d28f0820c6ffea56d9abebedbb52308cba1077bb8165983c8027c309c8ddaaccfcc04d4b4460f9c84e16340ca4519618a551be1d949a2fc4ca225fb71a9018f9d89566122ee8ad99ea109963978d3a284620739f1d3d9fcd6c641876b8ffccd52764064d7505b44a58e215c2616adfe6c32bccb6d5bca296e65ae788d403f535622aaf791ac804edbf11104b82fc8b9816f61ce840430828bb14186e4c7008da643395b246285c83c06ec52ccacc704e92c140eeae48b196e8212dbf8863e388a3f642ed2da9890bc301a80a4db79844953fc7b1dd29491452b5a7a42c26f05e7fc944ea6506bc3453e175e5361a243f8767a312f2dd0bb430f47945081b74437beff8d3252f3fd440ee0cc03d475c645d028c5460dd110fff2188cfc3be489f8df54e373abd91402f639da5d85432af5ebdb869250cdd5289c9f3d262bb8c3a0c62e13e5117297986144a759dde14d71f57831493d61709491abe63f5f7fa7aa06fab76c5627eb23df3732737452f1e34c7a783cf96c3d8621e322483fedbeff35f05f9a3d932b080d262dd80395cc2c6f61867d60b9a09322545f697900856bd516705e5f49ad594b1e213ac44952773175279802396149f9542a505980ba56e555a14bdd3d819187ff645ecbefdf33a6e45949f5fca157e30f08a712b0c8f2367903ac4fc201f2ed6329f387c7319d186d850a9357211bcab415c639f7bf5246bf0f22d5a2e26dba77aa7a3edf885c254591d158aefa25d6827969ac9cfab59e915ba5a9d11a58a5a5b6a9d41d20787e6fba978081a683fe608e4c77e1e050a6d8423b1f497fdc1b61e24647f7f6162f66247f899affaf526672f4e3346e666287849147d2df0b5340779b52684b48b182a2ddb5d9fffd900fd3c04e1122bde8212ece3c85f11ee962bd67619168040b27c9994d39efdd2df897c6e993334572d09474f83a58419cb88dd83d2b84e7731f0854284c2063aad279b13781abd8c7965c87e346eeff7b457a30fe47eced03b0b2fd0606abe740008cb48e1f3601eeae7605da44d8a278e7c7286fdc422854050d07dcd24dc3346447f104157d74d67381e7905b9338082d80c29d4ee0db6655a9e3adef117470967030a87769c7b044287c79e96b2a40572744d330e65eb219bf3e4a4b1645a31fe88908ea051d0cbd061af343c6e4ab4cb3efeebbda56cae807700bda8c8f13bfb263fd9c3fa515aca8776376eefe802e6a576ab98a4e8f37dd827258d2d123e04cb37fdc511aad94f64eb6c9ece6277a5d591379170e897eb38f8c11ae9dae1698d92025422e222f0cdb1bd4d24121c55265b8270538cda419c1e678cef9fd82e7ed57e4d59be23a7b6e7c036fffaaed45fe142964f8433fd345f410cd00d29d8daa1ebd3722dd635af090310ea91d6de8805a4a4b9573751bd6bf7ad7faf6c8514038f538273ed4535c518a2b98e155af1c3a668caefa0e0b9420f1a58c9c228dda534795d62117a187113f709963e4f53c1087bb00ac199e1e691b414e3948fe4a059c232cd", &(0x7f0000001180)="5fef04c4df3b8dd1370504a872d7a91c7a962246f9198c102ede7ae1e2115ca1add22fe4846f6ce29f13385f854fab78df1266dacb581099816e4557f28efeaed87638ca18876ea8a20d09044cf8a682c86c06d5ddb56a5c6c53af3c", 0x1}, 0x20) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000001200)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r1, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x59616d61, 0xffffffffffffffff, 0x1, &(0x7f0000000000)) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000001280)) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000001240)) socketpair$inet_icmp(0x59616d61, 0xffffffffffffffff, 0x1, &(0x7f0000000000)) socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000001380)) 2018/04/18 07:41:34 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x9) close(0xffffffffffffffff) gettid() socket$kcm(0x29, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x0, 0xffffffffffff36f1, 0x0, 0x18}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x10) perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x0, 0x0, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/18 07:41:34 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000f97ff8)) socketpair(0x8, 0x5, 0x1000000000000, &(0x7f00000001c0)) [ 201.910374] ? get_empty_filp.cold.7+0x3e/0x3e [ 201.914971] ? destroy_unused_super.part.9+0x100/0x100 [ 201.920264] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 201.925290] ? kasan_check_read+0x11/0x20 [ 201.929449] ? rcu_pm_notify+0xc0/0xc0 [ 201.933341] ? trace_hardirqs_off+0xd/0x10 [ 201.937592] ? cap_capable+0x1f9/0x260 [ 201.941498] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 201.947045] ? security_capable+0x99/0xc0 [ 201.951207] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 201.956757] ? ns_capable_common+0x13f/0x170 [ 201.961183] mount_ns+0x8f/0x1d0 2018/04/18 07:41:34 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x1400000000000000, &(0x7f0000000100)) [ 201.964557] ? rpc_pipe_release+0xb70/0xb70 [ 201.968889] rpc_mount+0x9e/0xd0 [ 201.972267] mount_fs+0xae/0x328 [ 201.975649] vfs_kern_mount.part.34+0xd4/0x4d0 [ 201.980248] ? may_umount+0xb0/0xb0 [ 201.983886] ? _raw_read_unlock+0x22/0x30 [ 201.988047] ? __get_fs_type+0x97/0xc0 [ 201.991948] do_mount+0x564/0x3070 [ 201.995505] ? copy_mount_string+0x40/0x40 [ 201.999744] ? rcu_pm_notify+0xc0/0xc0 [ 202.003648] ? copy_mount_options+0x5f/0x380 [ 202.008064] ? rcu_read_lock_sched_held+0x108/0x120 [ 202.013089] ? kmem_cache_alloc_trace+0x616/0x780 [ 202.017946] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 202.023494] ? _copy_from_user+0xdf/0x150 [ 202.027658] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 202.033214] ? copy_mount_options+0x285/0x380 [ 202.037727] ksys_mount+0x12d/0x140 [ 202.041363] SyS_mount+0x35/0x50 [ 202.044738] ? ksys_mount+0x140/0x140 [ 202.048553] do_syscall_64+0x29e/0x9d0 [ 202.052442] ? vmalloc_sync_all+0x30/0x30 [ 202.056583] ? _raw_spin_unlock_irq+0x27/0x70 [ 202.061072] ? finish_task_switch+0x1ca/0x810 [ 202.065561] ? syscall_return_slowpath+0x5c0/0x5c0 [ 202.070482] ? syscall_return_slowpath+0x30f/0x5c0 [ 202.075415] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 202.080775] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 202.085611] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 202.090789] RIP: 0033:0x455329 [ 202.093968] RSP: 002b:00007fdcd2ef2c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 202.101672] RAX: ffffffffffffffda RBX: 00007fdcd2ef36d4 RCX: 0000000000455329 [ 202.108928] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 202.116182] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 202.123437] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 202.130699] R13: 00000000000003fb R14: 00000000006f9028 R15: 000000000000000e [ 202.143744] FAULT_INJECTION: forcing a failure. [ 202.143744] name failslab, interval 1, probability 0, space 0, times 0 [ 202.155054] CPU: 0 PID: 18255 Comm: syz-executor3 Not tainted 4.16.0+ #3 [ 202.161898] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 202.171258] Call Trace: [ 202.173861] dump_stack+0x1b9/0x294 [ 202.177501] ? dump_stack_print_info.cold.2+0x52/0x52 [ 202.182705] ? perf_trace_lock_acquire+0xe3/0x980 [ 202.187565] ? perf_trace_lock_acquire+0xe3/0x980 [ 202.192430] should_fail.cold.4+0xa/0x1a [ 202.196508] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 202.201619] ? graph_lock+0x170/0x170 [ 202.205437] ? perf_trace_lock_acquire+0xe3/0x980 [ 202.210298] ? find_held_lock+0x36/0x1c0 2018/04/18 07:41:34 executing program 7 (fault-call:4 fault-nth:15): mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) [ 202.214394] ? check_same_owner+0x320/0x320 [ 202.218732] ? rcu_note_context_switch+0x710/0x710 [ 202.223682] __should_failslab+0x124/0x180 [ 202.227929] should_failslab+0x9/0x14 [ 202.231742] __kmalloc+0x2c8/0x760 [ 202.235296] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 202.240845] ? sock_kmalloc+0x14e/0x1d0 [ 202.244826] sock_kmalloc+0x14e/0x1d0 [ 202.248620] ? __sk_mem_schedule+0xe0/0xe0 [ 202.252853] ? __fget+0x40c/0x650 [ 202.256302] ___sys_sendmsg+0x2de/0x940 [ 202.260287] ? copy_msghdr_from_user+0x560/0x560 [ 202.265040] ? lock_downgrade+0x8e0/0x8e0 [ 202.269183] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 202.274706] ? proc_fail_nth_write+0x96/0x1f0 [ 202.279272] ? __fget_light+0x2ef/0x430 [ 202.283239] ? fget_raw+0x20/0x20 [ 202.286676] ? find_held_lock+0x36/0x1c0 [ 202.290741] ? kasan_check_write+0x14/0x20 [ 202.295003] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 202.300543] ? sockfd_lookup_light+0xc5/0x160 [ 202.305042] __sys_sendmsg+0x115/0x270 [ 202.308927] ? SyS_shutdown+0x30/0x30 [ 202.312727] ? __sb_end_write+0xac/0xe0 [ 202.316691] ? fput+0x130/0x1a0 [ 202.319953] ? ksys_write+0x1a6/0x250 [ 202.323744] ? ksys_ioctl+0x81/0xd0 [ 202.327357] SyS_sendmsg+0x29/0x30 [ 202.330878] ? __sys_sendmsg+0x270/0x270 [ 202.334922] do_syscall_64+0x29e/0x9d0 [ 202.338791] ? vmalloc_sync_all+0x30/0x30 [ 202.342921] ? kasan_check_write+0x14/0x20 [ 202.347138] ? syscall_return_slowpath+0x5c0/0x5c0 [ 202.352057] ? syscall_return_slowpath+0x30f/0x5c0 [ 202.356990] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 202.362344] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 202.367173] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 202.372341] RIP: 0033:0x455329 [ 202.375509] RSP: 002b:00007f03c92b3c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 202.383200] RAX: ffffffffffffffda RBX: 00007f03c92b46d4 RCX: 0000000000455329 [ 202.390449] RDX: 0000000000000000 RSI: 0000000020000740 RDI: 0000000000000013 [ 202.397702] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 202.404959] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 202.412225] R13: 00000000000004e9 R14: 00000000006fa678 R15: 0000000000000000 [ 202.477417] FAULT_INJECTION: forcing a failure. [ 202.477417] name failslab, interval 1, probability 0, space 0, times 0 [ 202.488729] CPU: 1 PID: 18271 Comm: syz-executor7 Not tainted 4.16.0+ #3 [ 202.495577] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 202.504935] Call Trace: [ 202.507546] dump_stack+0x1b9/0x294 [ 202.511191] ? dump_stack_print_info.cold.2+0x52/0x52 [ 202.516376] ? perf_trace_lock_acquire+0xe3/0x980 [ 202.521210] ? __save_stack_trace+0x7e/0xd0 [ 202.525530] should_fail.cold.4+0xa/0x1a [ 202.529586] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 202.534678] ? save_stack+0x43/0xd0 [ 202.538291] ? kasan_kmalloc+0xc4/0xe0 [ 202.542163] ? kmem_cache_alloc_trace+0x152/0x780 [ 202.547001] ? __memcg_init_list_lru_node+0x17d/0x2c0 [ 202.552180] ? __list_lru_init+0x456/0x790 [ 202.556403] ? sget_userns+0x6d9/0xf20 [ 202.560290] ? graph_lock+0x170/0x170 [ 202.564079] ? do_mount+0x564/0x3070 [ 202.567777] ? ksys_mount+0x12d/0x140 [ 202.571561] ? SyS_mount+0x35/0x50 [ 202.575090] ? do_syscall_64+0x29e/0x9d0 [ 202.579146] ? find_held_lock+0x36/0x1c0 [ 202.583199] ? __lock_is_held+0xb5/0x140 [ 202.587265] ? check_same_owner+0x320/0x320 [ 202.591576] ? rcu_note_context_switch+0x710/0x710 [ 202.596510] __should_failslab+0x124/0x180 [ 202.600734] should_failslab+0x9/0x14 [ 202.604531] kmem_cache_alloc_trace+0x2cb/0x780 [ 202.609185] ? __kmalloc_node+0x33/0x70 [ 202.613151] ? __kmalloc_node+0x33/0x70 [ 202.617114] ? rcu_read_lock_sched_held+0x108/0x120 [ 202.622128] __memcg_init_list_lru_node+0x17d/0x2c0 [ 202.627137] ? kvfree_rcu+0x20/0x20 [ 202.630753] ? __kmalloc_node+0x47/0x70 [ 202.634722] __list_lru_init+0x456/0x790 [ 202.638778] ? list_lru_destroy+0x4c0/0x4c0 [ 202.643090] ? mark_held_locks+0xc9/0x160 [ 202.647227] ? __raw_spin_lock_init+0x1c/0x100 [ 202.651800] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 202.656805] ? __lockdep_init_map+0x105/0x590 [ 202.661288] ? lockdep_init_map+0x9/0x10 [ 202.665343] sget_userns+0x6d9/0xf20 [ 202.669044] ? set_anon_super+0x20/0x20 [ 202.673014] ? get_empty_filp.cold.7+0x3e/0x3e [ 202.677584] ? destroy_unused_super.part.9+0x100/0x100 [ 202.682854] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 202.687862] ? kasan_check_read+0x11/0x20 [ 202.692008] ? rcu_pm_notify+0xc0/0xc0 [ 202.695879] ? trace_hardirqs_off+0xd/0x10 [ 202.700105] ? cap_capable+0x1f9/0x260 [ 202.703993] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 202.709522] ? security_capable+0x99/0xc0 [ 202.713661] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 202.719186] ? ns_capable_common+0x13f/0x170 [ 202.723585] mount_ns+0x8f/0x1d0 [ 202.726942] ? rpc_pipe_release+0xb70/0xb70 [ 202.731273] rpc_mount+0x9e/0xd0 [ 202.734629] mount_fs+0xae/0x328 [ 202.738001] vfs_kern_mount.part.34+0xd4/0x4d0 [ 202.742576] ? may_umount+0xb0/0xb0 [ 202.746192] ? _raw_read_unlock+0x22/0x30 [ 202.750327] ? __get_fs_type+0x97/0xc0 [ 202.754208] do_mount+0x564/0x3070 [ 202.757739] ? do_raw_spin_unlock+0x9e/0x2e0 [ 202.762139] ? copy_mount_string+0x40/0x40 [ 202.766368] ? rcu_pm_notify+0xc0/0xc0 [ 202.770252] ? copy_mount_options+0x5f/0x380 [ 202.774647] ? rcu_read_lock_sched_held+0x108/0x120 [ 202.779651] ? kmem_cache_alloc_trace+0x616/0x780 [ 202.784484] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 202.790017] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 202.795550] ? copy_mount_options+0x285/0x380 [ 202.800038] ksys_mount+0x12d/0x140 [ 202.803654] SyS_mount+0x35/0x50 [ 202.807011] ? ksys_mount+0x140/0x140 [ 202.810803] do_syscall_64+0x29e/0x9d0 [ 202.814677] ? vmalloc_sync_all+0x30/0x30 [ 202.818816] ? syscall_slow_exit_work+0x4f0/0x4f0 [ 202.823660] ? syscall_return_slowpath+0x5c0/0x5c0 [ 202.828579] ? syscall_return_slowpath+0x30f/0x5c0 [ 202.833501] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 202.838873] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 202.843709] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 202.848884] RIP: 0033:0x455329 [ 202.852059] RSP: 002b:00007fdcd2ef2c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 202.859759] RAX: ffffffffffffffda RBX: 00007fdcd2ef36d4 RCX: 0000000000455329 [ 202.867016] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 202.874272] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 202.881528] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 202.888785] R13: 00000000000003fb R14: 00000000006f9028 R15: 000000000000000f 2018/04/18 07:41:35 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x9) close(0xffffffffffffffff) gettid() socket$kcm(0x29, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x0, 0xffffffffffff36f1, 0x0, 0x18}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x10) perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x0, 0x0, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/18 07:41:35 executing program 2: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004, 0x4000009d}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x59616d61, 0xffffffffffffffff, 0x1, &(0x7f0000000000)) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000080)) socketpair$inet_icmp(0x59616d61, 0xffffffffffffffff, 0x1, &(0x7f0000000000)) 2018/04/18 07:41:35 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000f97ff8)) socketpair(0x8, 0x5, 0x14000000, &(0x7f00000001c0)) 2018/04/18 07:41:35 executing program 3 (fault-call:1 fault-nth:1): r0 = socket$kcm(0x2, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000740)={&(0x7f0000000000)=@in={0x2, 0x4e23, @multicast2=0xe0000002}, 0x80, &(0x7f0000000200), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="300000000000000000000000070000008921eeb35cd8bd7fcc0c1b988e1c9d86c39351f17f9b04b22b00000000000000"], 0x30}, 0x0) 2018/04/18 07:41:35 executing program 5: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x100}, 0x2c) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) close(r0) gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r2}, 0x10) 2018/04/18 07:41:35 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x9) close(0xffffffffffffffff) gettid() socket$kcm(0x29, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r0, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={r1, 0x28, &(0x7f0000000740)}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r2}, 0x10) 2018/04/18 07:41:35 executing program 7 (fault-call:4 fault-nth:16): mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/18 07:41:35 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x2f, &(0x7f0000000100)) [ 202.985458] FAULT_INJECTION: forcing a failure. [ 202.985458] name failslab, interval 1, probability 0, space 0, times 0 [ 202.996794] CPU: 0 PID: 18279 Comm: syz-executor3 Not tainted 4.16.0+ #3 [ 203.003638] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 203.013002] Call Trace: [ 203.015593] dump_stack+0x1b9/0x294 [ 203.019211] ? dump_stack_print_info.cold.2+0x52/0x52 [ 203.024396] ? perf_trace_lock_acquire+0xe3/0x980 [ 203.029232] should_fail.cold.4+0xa/0x1a [ 203.033282] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 203.038371] ? debug_check_no_locks_freed+0x310/0x310 [ 203.043547] ? find_held_lock+0x36/0x1c0 [ 203.047594] ? graph_lock+0x170/0x170 [ 203.051383] ? find_held_lock+0x36/0x1c0 [ 203.055445] ? check_same_owner+0x320/0x320 [ 203.059747] ? perf_trace_lock+0x900/0x900 [ 203.063969] ? rcu_note_context_switch+0x710/0x710 [ 203.068893] __should_failslab+0x124/0x180 [ 203.073114] should_failslab+0x9/0x14 [ 203.076896] __kmalloc+0x2c8/0x760 [ 203.080425] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 203.085430] ? ip_options_get+0x34/0xa0 [ 203.089395] ip_options_get+0x34/0xa0 [ 203.093203] ip_cmsg_send+0x784/0x900 [ 203.097000] udp_sendmsg+0x161d/0x3370 [ 203.100874] ? ip_reply_glue_bits+0xc0/0xc0 [ 203.105195] ? udp4_lib_lookup2+0x340/0x340 [ 203.110201] ? lock_downgrade+0x8e0/0x8e0 [ 203.114336] ? kasan_check_read+0x11/0x20 [ 203.118468] ? do_raw_spin_unlock+0x9e/0x2e0 [ 203.122864] ? __local_bh_enable_ip+0x161/0x230 [ 203.127527] ? release_sock+0x1e2/0x2b0 [ 203.131484] ? trace_hardirqs_on+0xd/0x10 [ 203.135615] ? __local_bh_enable_ip+0x161/0x230 [ 203.140268] ? _raw_spin_unlock_bh+0x30/0x40 [ 203.144749] ? release_sock+0x1e2/0x2b0 [ 203.148708] ? __release_sock+0x3a0/0x3a0 [ 203.152844] ? udp_v4_get_port+0x132/0x180 [ 203.157067] inet_sendmsg+0x19f/0x690 [ 203.160855] ? ipip_gro_receive+0x100/0x100 [ 203.165158] ? __might_sleep+0x95/0x190 [ 203.169121] ? security_socket_sendmsg+0x94/0xc0 [ 203.173861] ? ipip_gro_receive+0x100/0x100 [ 203.178171] sock_sendmsg+0xd5/0x120 [ 203.181878] ___sys_sendmsg+0x805/0x940 [ 203.185840] ? copy_msghdr_from_user+0x560/0x560 [ 203.190582] ? lock_downgrade+0x8e0/0x8e0 [ 203.194717] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 203.200249] ? proc_fail_nth_write+0x96/0x1f0 [ 203.204741] ? __fget_light+0x2ef/0x430 [ 203.208702] ? fget_raw+0x20/0x20 [ 203.212138] ? find_held_lock+0x36/0x1c0 [ 203.216192] ? kasan_check_write+0x14/0x20 [ 203.220424] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 203.225950] ? sockfd_lookup_light+0xc5/0x160 [ 203.230432] __sys_sendmsg+0x115/0x270 [ 203.234308] ? SyS_shutdown+0x30/0x30 [ 203.238091] ? __sb_end_write+0xac/0xe0 [ 203.242061] ? fput+0x130/0x1a0 [ 203.245327] ? ksys_write+0x1a6/0x250 [ 203.249126] ? ksys_ioctl+0x81/0xd0 [ 203.252742] SyS_sendmsg+0x29/0x30 [ 203.256266] ? __sys_sendmsg+0x270/0x270 [ 203.260320] do_syscall_64+0x29e/0x9d0 [ 203.264190] ? vmalloc_sync_all+0x30/0x30 [ 203.268321] ? _raw_spin_unlock_irq+0x27/0x70 [ 203.272799] ? finish_task_switch+0x1ca/0x810 [ 203.277282] ? syscall_return_slowpath+0x5c0/0x5c0 [ 203.282196] ? syscall_return_slowpath+0x30f/0x5c0 [ 203.287115] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 203.292467] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 203.297296] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 203.302468] RIP: 0033:0x455329 [ 203.305640] RSP: 002b:00007f03c92b3c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 203.313336] RAX: ffffffffffffffda RBX: 00007f03c92b46d4 RCX: 0000000000455329 [ 203.320589] RDX: 0000000000000000 RSI: 0000000020000740 RDI: 0000000000000013 [ 203.327839] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 203.335092] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 203.342343] R13: 00000000000004e9 R14: 00000000006fa678 R15: 0000000000000001 2018/04/18 07:41:35 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000f97ff8)) socketpair(0x8, 0x5, 0xfffffffe, &(0x7f00000001c0)) 2018/04/18 07:41:35 executing program 5: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x100}, 0x2c) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) close(r0) gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={r2, 0x28, &(0x7f0000000740)}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r3}, 0x10) [ 203.388474] FAULT_INJECTION: forcing a failure. [ 203.388474] name failslab, interval 1, probability 0, space 0, times 0 [ 203.399842] CPU: 0 PID: 18296 Comm: syz-executor7 Not tainted 4.16.0+ #3 [ 203.406701] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 203.416062] Call Trace: [ 203.418665] dump_stack+0x1b9/0x294 [ 203.422308] ? dump_stack_print_info.cold.2+0x52/0x52 [ 203.427514] ? perf_trace_lock_acquire+0xe3/0x980 [ 203.432371] ? __save_stack_trace+0x7e/0xd0 [ 203.436724] should_fail.cold.4+0xa/0x1a [ 203.440810] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 203.445928] ? save_stack+0x43/0xd0 [ 203.449566] ? kasan_kmalloc+0xc4/0xe0 [ 203.453471] ? kmem_cache_alloc_trace+0x152/0x780 [ 203.458336] ? __memcg_init_list_lru_node+0x17d/0x2c0 [ 203.463537] ? __list_lru_init+0x456/0x790 [ 203.467777] ? sget_userns+0x6d9/0xf20 [ 203.471671] ? graph_lock+0x170/0x170 [ 203.475477] ? do_mount+0x564/0x3070 [ 203.479192] ? ksys_mount+0x12d/0x140 [ 203.482996] ? SyS_mount+0x35/0x50 2018/04/18 07:41:35 executing program 5: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x100}, 0x2c) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) close(r0) gettid() socket$kcm(0x29, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r1}, 0x10) 2018/04/18 07:41:35 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000f97ff8)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair(0x3, 0x5, 0x8, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000080)=r1, 0x4) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f00000000c0)=0x8c) [ 203.486547] ? do_syscall_64+0x29e/0x9d0 [ 203.490624] ? find_held_lock+0x36/0x1c0 [ 203.494709] ? __lock_is_held+0xb5/0x140 [ 203.498797] ? check_same_owner+0x320/0x320 [ 203.503139] ? rcu_note_context_switch+0x710/0x710 [ 203.508091] __should_failslab+0x124/0x180 [ 203.512343] should_failslab+0x9/0x14 [ 203.516161] kmem_cache_alloc_trace+0x2cb/0x780 [ 203.520848] ? __kmalloc_node+0x33/0x70 [ 203.524834] ? __kmalloc_node+0x33/0x70 [ 203.528824] ? rcu_read_lock_sched_held+0x108/0x120 [ 203.533867] __memcg_init_list_lru_node+0x17d/0x2c0 2018/04/18 07:41:35 executing program 5: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x100}, 0x2c) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) close(r0) gettid() r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={r2, 0x28, &(0x7f0000000740)}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r3}, 0x10) [ 203.538897] ? kvfree_rcu+0x20/0x20 [ 203.542535] ? __kmalloc_node+0x47/0x70 [ 203.546532] __list_lru_init+0x456/0x790 [ 203.550608] ? list_lru_destroy+0x4c0/0x4c0 [ 203.554939] ? mark_held_locks+0xc9/0x160 [ 203.559095] ? __raw_spin_lock_init+0x1c/0x100 [ 203.563689] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 203.568716] ? __lockdep_init_map+0x105/0x590 [ 203.573222] ? lockdep_init_map+0x9/0x10 [ 203.577298] sget_userns+0x6d9/0xf20 [ 203.581018] ? set_anon_super+0x20/0x20 [ 203.585004] ? get_empty_filp.cold.7+0x3e/0x3e 2018/04/18 07:41:36 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000f97ff8)) socketpair(0x8, 0x5, 0x0, &(0x7f00000001c0)) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000080)) [ 203.589598] ? destroy_unused_super.part.9+0x100/0x100 [ 203.594886] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 203.599915] ? kasan_check_read+0x11/0x20 [ 203.604075] ? rcu_pm_notify+0xc0/0xc0 [ 203.607974] ? trace_hardirqs_off+0xd/0x10 [ 203.612224] ? cap_capable+0x1f9/0x260 [ 203.616125] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 203.621671] ? security_capable+0x99/0xc0 [ 203.625835] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 203.631386] ? ns_capable_common+0x13f/0x170 [ 203.635814] mount_ns+0x8f/0x1d0 [ 203.639189] ? rpc_pipe_release+0xb70/0xb70 [ 203.643516] rpc_mount+0x9e/0xd0 [ 203.646876] mount_fs+0xae/0x328 [ 203.650234] vfs_kern_mount.part.34+0xd4/0x4d0 [ 203.654804] ? may_umount+0xb0/0xb0 [ 203.658419] ? _raw_read_unlock+0x22/0x30 [ 203.662555] ? __get_fs_type+0x97/0xc0 [ 203.666438] do_mount+0x564/0x3070 [ 203.669968] ? copy_mount_string+0x40/0x40 [ 203.674196] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 203.678940] ? retint_kernel+0x10/0x10 [ 203.682820] ? copy_mount_options+0x1a1/0x380 [ 203.687302] ? __sanitizer_cov_trace_pc+0x48/0x50 [ 203.692131] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 203.697652] ? copy_mount_options+0x285/0x380 [ 203.702134] ksys_mount+0x12d/0x140 [ 203.705748] SyS_mount+0x35/0x50 [ 203.709097] ? ksys_mount+0x140/0x140 [ 203.712886] do_syscall_64+0x29e/0x9d0 [ 203.716756] ? vmalloc_sync_all+0x30/0x30 [ 203.720887] ? _raw_spin_unlock_irq+0x27/0x70 [ 203.725367] ? finish_task_switch+0x1ca/0x810 [ 203.729850] ? syscall_return_slowpath+0x5c0/0x5c0 [ 203.734767] ? syscall_return_slowpath+0x30f/0x5c0 [ 203.739682] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 203.745033] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 203.749867] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 203.755042] RIP: 0033:0x455329 [ 203.758214] RSP: 002b:00007fdcd2ef2c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 203.765910] RAX: ffffffffffffffda RBX: 00007fdcd2ef36d4 RCX: 0000000000455329 [ 203.773166] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 203.780421] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 203.787762] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 203.795013] R13: 00000000000003fb R14: 00000000006f9028 R15: 0000000000000010 2018/04/18 07:41:36 executing program 5: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x100}, 0x2c) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) close(r0) socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={r2, 0x28, &(0x7f0000000740)}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r3}, 0x10) 2018/04/18 07:41:36 executing program 6: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x18, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xd121, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000f97ff8)) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f00000000c0)={0x1, 0x0, [0x0]}) socketpair(0x8, 0x5, 0x0, &(0x7f00000001c0)) 2018/04/18 07:41:36 executing program 3: r0 = socket$kcm(0x2, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000740)={&(0x7f0000000000)=@in={0x2, 0x4e23, @multicast2=0xe0000002}, 0x80, &(0x7f0000000200), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="300000000000000000000000070000008921eeb35cd8bd7fcc0c1b988e1c9d86c39351f17f9b04b22b00000000000000"], 0x30}, 0x0) 2018/04/18 07:41:36 executing program 7 (fault-call:4 fault-nth:17): mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/18 07:41:36 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x9) close(0xffffffffffffffff) gettid() socket$kcm(0x29, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r0, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={r1, 0x28, &(0x7f0000000740)}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r2}, 0x10) 2018/04/18 07:41:36 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x9) close(0xffffffffffffffff) gettid() socket$kcm(0x29, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x0, 0xffffffffffff36f1, 0x0, 0x18}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x10) perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x0, 0x7ff, 0x0, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/18 07:41:36 executing program 2: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004, 0x4000009d}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000b0189a1e45a7000000000000c9b9b86e00000000000000000000000000009500e3cde020d650a046311ec34ff34652cbf9dd4b7ba8796b80297289e16a6bddb1c14d3cefb2552388a4cd7c11d163560cbdd018a218a82dddd0c6935149da4e3715782187d0cc13001e41adcf938b66d728fd9c08cd001c9f7ab61f8734"], &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x59616d61, 0xffffffffffffffff, 0x1, &(0x7f0000000000)) socketpair$inet_icmp(0x59616d61, 0xffffffffffffffff, 0x1, &(0x7f0000000000)) 2018/04/18 07:41:36 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x15010000, &(0x7f0000000100)) 2018/04/18 07:41:36 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x9) close(0xffffffffffffffff) gettid() socket$kcm(0x29, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x0, 0xffffffffffff36f1, 0x0, 0x18}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x10) perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x0, 0x7ff, 0xffffffff, 0x0, 0x0, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/18 07:41:36 executing program 6: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000f97ff8)) r1 = gettid() perf_event_open(&(0x7f00000000c0)={0x3, 0x70, 0x2, 0xfffffffffffffff8, 0x800, 0x2, 0x0, 0x7, 0x9008, 0xa, 0x7fffffff, 0x87, 0x2, 0x9, 0x6, 0x1c, 0x101, 0x5, 0x0, 0xfffffffffffffff9, 0x4, 0xffffffffe55fde7d, 0x3, 0x80000000, 0x200, 0x4, 0x1bd9, 0x5, 0x1, 0x4, 0x6, 0x401, 0x100000001, 0x100, 0x81, 0x3, 0x66, 0xc4, 0x0, 0x2a7, 0x6, @perf_bp={&(0x7f0000000080), 0x1}, 0x8800, 0x401, 0x1, 0x6, 0x8, 0x8000, 0x2}, r1, 0x7, r0, 0x1) socketpair(0x8, 0x5, 0x0, &(0x7f00000001c0)) 2018/04/18 07:41:36 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x8f01, &(0x7f0000000100)) 2018/04/18 07:41:36 executing program 2: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000180)={&(0x7f0000000080)='./file0\x00', 0x0, 0x18}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004, 0x4000009d}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x59616d61, 0xffffffffffffffff, 0x1, &(0x7f0000000000)) socketpair$inet_icmp(0x59616d61, 0xffffffffffffffff, 0x1, &(0x7f0000000000)) 2018/04/18 07:41:36 executing program 5: perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x100}, 0x2c) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) gettid() socket$kcm(0x29, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r0, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={r1, 0x28, &(0x7f0000000740)}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r2}, 0x10) 2018/04/18 07:41:36 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x9) close(0xffffffffffffffff) gettid() socket$kcm(0x29, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r0, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={r1, 0x28, &(0x7f0000000740)}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r2}, 0x10) 2018/04/18 07:41:36 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x9) close(0xffffffffffffffff) gettid() socket$kcm(0x29, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x0, 0xffffffffffff36f1, 0x0, 0x18}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x10) perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x0, 0x7ff, 0xffffffff, 0x0, 0x1, 0x0, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) [ 204.254360] FAULT_INJECTION: forcing a failure. [ 204.254360] name failslab, interval 1, probability 0, space 0, times 0 [ 204.265688] CPU: 1 PID: 18350 Comm: syz-executor7 Not tainted 4.16.0+ #3 [ 204.272538] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 204.281906] Call Trace: [ 204.284521] dump_stack+0x1b9/0x294 [ 204.288194] ? dump_stack_print_info.cold.2+0x52/0x52 [ 204.293398] ? perf_trace_lock_acquire+0xe3/0x980 [ 204.298255] ? __save_stack_trace+0x7e/0xd0 [ 204.302602] should_fail.cold.4+0xa/0x1a [ 204.306686] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 204.311801] ? save_stack+0x43/0xd0 [ 204.315439] ? kasan_kmalloc+0xc4/0xe0 [ 204.319338] ? kmem_cache_alloc_trace+0x152/0x780 [ 204.324193] ? __memcg_init_list_lru_node+0x17d/0x2c0 [ 204.329392] ? __list_lru_init+0x456/0x790 [ 204.333636] ? sget_userns+0x6d9/0xf20 [ 204.337538] ? graph_lock+0x170/0x170 [ 204.341346] ? do_mount+0x564/0x3070 [ 204.345071] ? ksys_mount+0x12d/0x140 [ 204.348879] ? SyS_mount+0x35/0x50 [ 204.352430] ? do_syscall_64+0x29e/0x9d0 [ 204.356502] ? find_held_lock+0x36/0x1c0 [ 204.360671] ? __lock_is_held+0xb5/0x140 [ 204.364764] ? check_same_owner+0x320/0x320 [ 204.369099] ? rcu_note_context_switch+0x710/0x710 [ 204.374044] __should_failslab+0x124/0x180 [ 204.378292] should_failslab+0x9/0x14 [ 204.382102] kmem_cache_alloc_trace+0x2cb/0x780 [ 204.386770] ? __kmalloc_node+0x33/0x70 [ 204.390731] ? __kmalloc_node+0x33/0x70 [ 204.394693] ? rcu_read_lock_sched_held+0x108/0x120 [ 204.399705] __memcg_init_list_lru_node+0x17d/0x2c0 [ 204.404722] ? kvfree_rcu+0x20/0x20 [ 204.408341] ? __kmalloc_node+0x47/0x70 [ 204.412312] __list_lru_init+0x456/0x790 [ 204.416370] ? list_lru_destroy+0x4c0/0x4c0 [ 204.420680] ? mark_held_locks+0xc9/0x160 [ 204.424822] ? __raw_spin_lock_init+0x1c/0x100 [ 204.429395] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 204.434400] ? __lockdep_init_map+0x105/0x590 [ 204.438885] ? lockdep_init_map+0x9/0x10 [ 204.442942] sget_userns+0x6d9/0xf20 [ 204.446645] ? set_anon_super+0x20/0x20 [ 204.450612] ? get_empty_filp.cold.7+0x3e/0x3e [ 204.455185] ? destroy_unused_super.part.9+0x100/0x100 [ 204.460453] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 204.465459] ? kasan_check_read+0x11/0x20 [ 204.469601] ? rcu_pm_notify+0xc0/0xc0 [ 204.473473] ? trace_hardirqs_off+0xd/0x10 [ 204.477701] ? cap_capable+0x1f9/0x260 [ 204.481584] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 204.487110] ? security_capable+0x99/0xc0 [ 204.491251] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 204.496783] ? ns_capable_common+0x13f/0x170 [ 204.501183] mount_ns+0x8f/0x1d0 [ 204.504542] ? rpc_pipe_release+0xb70/0xb70 [ 204.508854] rpc_mount+0x9e/0xd0 [ 204.512214] mount_fs+0xae/0x328 [ 204.515583] vfs_kern_mount.part.34+0xd4/0x4d0 [ 204.520161] ? may_umount+0xb0/0xb0 [ 204.523778] ? _raw_read_unlock+0x22/0x30 [ 204.527926] ? __get_fs_type+0x97/0xc0 [ 204.531809] do_mount+0x564/0x3070 [ 204.535341] ? copy_mount_string+0x40/0x40 [ 204.539561] ? rcu_pm_notify+0xc0/0xc0 [ 204.543443] ? copy_mount_options+0x5f/0x380 [ 204.547838] ? rcu_read_lock_sched_held+0x108/0x120 [ 204.552843] ? kmem_cache_alloc_trace+0x616/0x780 [ 204.557676] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 204.563208] ? _copy_from_user+0xdf/0x150 [ 204.567355] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 204.572879] ? copy_mount_options+0x285/0x380 [ 204.577375] ksys_mount+0x12d/0x140 [ 204.581000] SyS_mount+0x35/0x50 [ 204.584355] ? ksys_mount+0x140/0x140 [ 204.588145] do_syscall_64+0x29e/0x9d0 [ 204.592020] ? vmalloc_sync_all+0x30/0x30 [ 204.596155] ? _raw_spin_unlock_irq+0x27/0x70 [ 204.600637] ? finish_task_switch+0x1ca/0x810 [ 204.605122] ? syscall_return_slowpath+0x5c0/0x5c0 [ 204.610043] ? syscall_return_slowpath+0x30f/0x5c0 [ 204.614968] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 204.620333] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 204.625171] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 204.630346] RIP: 0033:0x455329 [ 204.633520] RSP: 002b:00007fdcd2ef2c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 204.641221] RAX: ffffffffffffffda RBX: 00007fdcd2ef36d4 RCX: 0000000000455329 [ 204.648475] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 2018/04/18 07:41:36 executing program 3: r0 = socket$kcm(0x2, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000740)={&(0x7f0000000000)=@in={0xa, 0x4e23, @multicast2=0xe0000002}, 0x80, &(0x7f0000000200), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="300000000000000000000000070000008921eeb35cd8bd7fcc0c1b988e1c9d86c39351f17f9b04b22b00000000000000"], 0x30}, 0x0) 2018/04/18 07:41:36 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_udp(0xa, 0x2, 0xf900, &(0x7f0000000100)) [ 204.655730] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 204.662988] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 204.670246] R13: 00000000000003fb R14: 00000000006f9028 R15: 0000000000000011 2018/04/18 07:41:37 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x9) close(0xffffffffffffffff) gettid() socket$kcm(0x29, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x0, 0xffffffffffff36f1, 0x0, 0x18}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x10) perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x0, 0x7ff, 0xffffffff, 0x0, 0x1, 0x0, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/18 07:41:37 executing program 2: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004, 0x4000009d}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) socketpair$inet(0x2, 0x6, 0x3, &(0x7f0000000080)) socketpair(0x2, 0xb, 0x12, &(0x7f0000000180)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f00000001c0)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x59616d61, 0xffffffffffffffff, 0x1, &(0x7f0000000000)) 2018/04/18 07:41:37 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000f97ff8)) socketpair(0x8, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00', r0}, 0x10) 2018/04/18 07:41:37 executing program 3: r0 = socket$kcm(0x2, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000740)={&(0x7f0000000000)=@in={0x1000000a, 0x4e23, @multicast2=0xe0000002}, 0x80, &(0x7f0000000200), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="300000000000000000000000070000008921eeb35cd8bd7fcc0c1b988e1c9d86c39351f17f9b04b22b00000000000000"], 0x30}, 0x0) 2018/04/18 07:41:37 executing program 7 (fault-call:4 fault-nth:18): mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/18 07:41:37 executing program 5: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x100}, 0x2c) close(r0) gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={r2, 0x28, &(0x7f0000000740)}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r3}, 0x10) 2018/04/18 07:41:37 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_udp(0xa, 0x2, 0xc601, &(0x7f0000000100)) 2018/04/18 07:41:37 executing program 1: r0 = perf_event_open(&(0x7f0000348f88)={0x0, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x9) close(r0) gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={r2, 0x28, &(0x7f0000000740)}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r3}, 0x10) 2018/04/18 07:41:37 executing program 3: r0 = socket$kcm(0x2, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000740)={&(0x7f0000000000)=@in={0x2, 0x4e23, @multicast2=0xe000000a}, 0x80, &(0x7f0000000200), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="300000000000000000000000070000008921eeb35cd8bd7fcc0c1b988e1c9d86c39351f17f9b04b22b00000000000000"], 0x30}, 0x0) 2018/04/18 07:41:37 executing program 6: r0 = gettid() perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, r0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000100)) socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f0000000080)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) socketpair(0x8, 0x5, 0x0, &(0x7f00000001c0)) 2018/04/18 07:41:37 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x9) close(0xffffffffffffffff) gettid() socket$kcm(0x29, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x0, 0xffffffffffff36f1, 0x0, 0x18}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x10) perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x0, 0x7ff, 0xffffffff, 0x0, 0x1, 0x0, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/18 07:41:37 executing program 5: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) close(r0) gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={r2, 0x28, &(0x7f0000000740)}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r3}, 0x10) 2018/04/18 07:41:37 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x102, &(0x7f0000000100)) 2018/04/18 07:41:37 executing program 2: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004, 0x4000009d}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=ANY=[@ANYBLOB="18000000000000000000000000000000711088410000000000000000000004000000000000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x59616d61, 0xffffffffffffffff, 0x1, &(0x7f0000000000)) socketpair$inet_icmp(0x59616d61, 0xffffffffffffffff, 0x1, &(0x7f0000000000)) 2018/04/18 07:41:37 executing program 1: r0 = perf_event_open(&(0x7f0000348f88)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x9) close(r0) gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={r2, 0x28, &(0x7f0000000740)}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r3}, 0x10) 2018/04/18 07:41:37 executing program 3: r0 = socket$kcm(0x2, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000740)={&(0x7f0000000000)=@in={0x2, 0x4e23, @multicast2=0xe0000002, [0x2000000]}, 0x80, &(0x7f0000000200), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="300000000000000000000000070000008921eeb35cd8bd7fcc0c1b988e1c9d86c39351f17f9b04b22b00000000000000"], 0x30}, 0x0) 2018/04/18 07:41:37 executing program 6: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000100)) socketpair(0x8, 0x5, 0x40, &(0x7f00000001c0)) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = getpid() close(r1) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x4c9, 0x3534, 0x1, 0x9, 0x0, 0x7, 0x200, 0x8, 0x4, 0x1ff, 0x9, 0x5, 0xd, 0x401, 0x7, 0x0, 0x40, 0x4, 0x6, 0x46, 0x5, 0xdf52, 0x1, 0x9, 0x8, 0x4, 0x4c, 0x5, 0x0, 0x8, 0x8, 0x8000, 0x6, 0x1000, 0xfff, 0x7, 0x0, 0x5, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x4000, 0x6d8, 0x8, 0x2, 0xfffffffffffff801, 0xfffffffffffffff8, 0xc1}, r2, 0x10, r0, 0x8) 2018/04/18 07:41:37 executing program 5: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x100}, 0x2c) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) close(r0) gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={r2, 0x28, &(0x7f0000000740)}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r3}, 0x10) 2018/04/18 07:41:37 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x9) close(0xffffffffffffffff) gettid() socket$kcm(0x29, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x0, 0xffffffffffff36f1, 0x0, 0x18}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x10) perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x0, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x0, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/18 07:41:37 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_udp(0xa, 0x2, 0xf700000000000000, &(0x7f0000000100)) [ 205.364870] FAULT_INJECTION: forcing a failure. [ 205.364870] name failslab, interval 1, probability 0, space 0, times 0 [ 205.376189] CPU: 0 PID: 18459 Comm: syz-executor7 Not tainted 4.16.0+ #3 [ 205.383042] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 205.392405] Call Trace: [ 205.395009] dump_stack+0x1b9/0x294 [ 205.398633] ? dump_stack_print_info.cold.2+0x52/0x52 [ 205.403810] ? perf_trace_lock_acquire+0xe3/0x980 [ 205.408643] ? __save_stack_trace+0x7e/0xd0 [ 205.412966] should_fail.cold.4+0xa/0x1a [ 205.417026] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 205.422121] ? save_stack+0x43/0xd0 [ 205.425738] ? kasan_kmalloc+0xc4/0xe0 [ 205.429612] ? kmem_cache_alloc_trace+0x152/0x780 [ 205.434446] ? __memcg_init_list_lru_node+0x17d/0x2c0 [ 205.439623] ? __list_lru_init+0x456/0x790 [ 205.443842] ? sget_userns+0x6d9/0xf20 [ 205.447716] ? graph_lock+0x170/0x170 [ 205.451506] ? do_mount+0x564/0x3070 [ 205.455202] ? ksys_mount+0x12d/0x140 [ 205.458991] ? SyS_mount+0x35/0x50 [ 205.462522] ? do_syscall_64+0x29e/0x9d0 [ 205.466575] ? find_held_lock+0x36/0x1c0 [ 205.470628] ? __lock_is_held+0xb5/0x140 [ 205.474693] ? check_same_owner+0x320/0x320 [ 205.479009] ? rcu_note_context_switch+0x710/0x710 [ 205.483932] __should_failslab+0x124/0x180 [ 205.488158] should_failslab+0x9/0x14 [ 205.491946] kmem_cache_alloc_trace+0x2cb/0x780 [ 205.496602] ? __kmalloc_node+0x33/0x70 [ 205.500561] ? __kmalloc_node+0x33/0x70 [ 205.504522] ? rcu_read_lock_sched_held+0x108/0x120 [ 205.509540] __memcg_init_list_lru_node+0x17d/0x2c0 [ 205.514546] ? kvfree_rcu+0x20/0x20 [ 205.518163] ? __kmalloc_node+0x47/0x70 [ 205.522133] __list_lru_init+0x456/0x790 [ 205.526188] ? list_lru_destroy+0x4c0/0x4c0 [ 205.530498] ? mark_held_locks+0xc9/0x160 [ 205.534638] ? __raw_spin_lock_init+0x1c/0x100 [ 205.539210] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 205.544216] ? __lockdep_init_map+0x105/0x590 [ 205.548704] ? lockdep_init_map+0x9/0x10 [ 205.552770] sget_userns+0x6d9/0xf20 [ 205.556470] ? set_anon_super+0x20/0x20 [ 205.560437] ? get_empty_filp.cold.7+0x3e/0x3e [ 205.565010] ? destroy_unused_super.part.9+0x100/0x100 [ 205.570278] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 205.575285] ? kasan_check_read+0x11/0x20 [ 205.579423] ? rcu_pm_notify+0xc0/0xc0 [ 205.583296] ? trace_hardirqs_off+0xd/0x10 [ 205.587607] ? cap_capable+0x1f9/0x260 [ 205.591489] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 205.597012] ? security_capable+0x99/0xc0 [ 205.601157] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 205.606684] ? ns_capable_common+0x13f/0x170 [ 205.611087] mount_ns+0x8f/0x1d0 [ 205.614444] ? rpc_pipe_release+0xb70/0xb70 [ 205.618764] rpc_mount+0x9e/0xd0 [ 205.622119] mount_fs+0xae/0x328 [ 205.625482] vfs_kern_mount.part.34+0xd4/0x4d0 [ 205.630081] ? may_umount+0xb0/0xb0 [ 205.633699] ? _raw_read_unlock+0x22/0x30 [ 205.637836] ? __get_fs_type+0x97/0xc0 [ 205.641723] do_mount+0x564/0x3070 [ 205.645254] ? do_raw_spin_unlock+0x9e/0x2e0 [ 205.649653] ? copy_mount_string+0x40/0x40 [ 205.653882] ? rcu_pm_notify+0xc0/0xc0 [ 205.657781] ? copy_mount_options+0x5f/0x380 [ 205.662176] ? rcu_read_lock_sched_held+0x108/0x120 [ 205.667179] ? kmem_cache_alloc_trace+0x616/0x780 [ 205.672012] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 205.677541] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 205.683065] ? copy_mount_options+0x285/0x380 [ 205.687551] ksys_mount+0x12d/0x140 [ 205.691167] SyS_mount+0x35/0x50 [ 205.694517] ? ksys_mount+0x140/0x140 [ 205.698309] do_syscall_64+0x29e/0x9d0 [ 205.702187] ? syscall_slow_exit_work+0x4f0/0x4f0 [ 205.707022] ? syscall_return_slowpath+0x5c0/0x5c0 [ 205.711941] ? syscall_return_slowpath+0x30f/0x5c0 [ 205.716864] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 205.722235] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 205.727079] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 205.732261] RIP: 0033:0x455329 [ 205.735443] RSP: 002b:00007fdcd2ef2c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 205.743141] RAX: ffffffffffffffda RBX: 00007fdcd2ef36d4 RCX: 0000000000455329 [ 205.750400] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 205.757657] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 2018/04/18 07:41:38 executing program 2: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004, 0x4000009d}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x59616d61, 0xffffffffffffffff, 0x1, &(0x7f0000000180)) socketpair$inet_icmp(0x59616d61, 0xffffffffffffffff, 0x1, &(0x7f0000000000)) 2018/04/18 07:41:38 executing program 3: r0 = socket$kcm(0x2, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000740)={&(0x7f0000000000)=@in={0x2, 0x4e23, @multicast2=0xe0000002, [0x40000]}, 0x80, &(0x7f0000000200), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="300000000000000000000000070000008921eeb35cd8bd7fcc0c1b988e1c9d86c39351f17f9b04b22b00000000000000"], 0x30}, 0x0) 2018/04/18 07:41:38 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x9) close(0xffffffffffffffff) gettid() socket$kcm(0x29, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x0, 0xffffffffffff36f1, 0x0, 0x18}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x10) perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x0, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x0, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/18 07:41:38 executing program 1: r0 = perf_event_open(&(0x7f0000348f88)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x9) close(r0) gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={r2, 0x28, &(0x7f0000000740)}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r3}, 0x10) 2018/04/18 07:41:38 executing program 5: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x100}, 0x2c) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) close(0xffffffffffffffff) gettid() socket$kcm(0x29, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r0, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={r1, 0x28, &(0x7f0000000740)}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r2}, 0x10) 2018/04/18 07:41:38 executing program 7 (fault-call:4 fault-nth:19): mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/18 07:41:38 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_udp(0xa, 0x2, 0xe0010000, &(0x7f0000000100)) 2018/04/18 07:41:38 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000f97ff8)) socketpair(0x19, 0x5, 0x2, &(0x7f00000001c0)) [ 205.764914] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 205.772170] R13: 00000000000003fb R14: 00000000006f9028 R15: 0000000000000012 2018/04/18 07:41:38 executing program 2: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000080)) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004, 0x4000009d}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=ANY=[@ANYBLOB="1800000000000000000000000000000071100000000000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x59616d61, 0xffffffffffffffff, 0x1, &(0x7f0000000000)) socketpair$inet_icmp(0x59616d61, 0xffffffffffffffff, 0x1, &(0x7f0000000000)) socketpair(0x1d, 0x80000, 0xffffffff, &(0x7f0000000180)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_DISABLE(r1, 0x2401, 0xab01) 2018/04/18 07:41:38 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x9) close(0xffffffffffffffff) gettid() socket$kcm(0x29, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x0, 0xffffffffffff36f1, 0x0, 0x18}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x10) perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x0, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x0, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) [ 205.895158] FAULT_INJECTION: forcing a failure. [ 205.895158] name failslab, interval 1, probability 0, space 0, times 0 [ 205.906593] CPU: 0 PID: 18483 Comm: syz-executor7 Not tainted 4.16.0+ #3 [ 205.913442] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 205.922977] Call Trace: [ 205.925583] dump_stack+0x1b9/0x294 [ 205.929233] ? dump_stack_print_info.cold.2+0x52/0x52 [ 205.934438] ? perf_trace_lock_acquire+0xe3/0x980 [ 205.939311] should_fail.cold.4+0xa/0x1a [ 205.943404] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 205.948522] ? zap_class+0x720/0x720 [ 205.952251] ? print_usage_bug+0xc0/0xc0 [ 205.956328] ? graph_lock+0x170/0x170 [ 205.960138] ? lock_downgrade+0x8e0/0x8e0 [ 205.964304] ? find_held_lock+0x36/0x1c0 [ 205.968388] ? __lock_is_held+0xb5/0x140 [ 205.972484] ? check_same_owner+0x320/0x320 [ 205.976824] ? __might_sleep+0x95/0x190 [ 205.980914] ? rcu_note_context_switch+0x710/0x710 [ 205.985878] __should_failslab+0x124/0x180 [ 205.990130] should_failslab+0x9/0x14 2018/04/18 07:41:38 executing program 2: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004, 0x4000009d}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000000080)=ANY=[@ANYBLOB="18e1000000000000000000000000009500001cfb39327d06565c618bc3b08a000000000000000000000000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x59616d61, 0xffffffffffffffff, 0x1, &(0x7f0000000000)) socketpair$inet_icmp(0x59616d61, 0xffffffffffffffff, 0x1, &(0x7f0000000000)) [ 205.993939] __kmalloc+0x2c8/0x760 [ 205.997495] ? __kmalloc_node+0x47/0x70 [ 206.001484] ? __list_lru_init+0xdd/0x790 [ 206.005658] __list_lru_init+0xdd/0x790 [ 206.009650] ? list_lru_destroy+0x4c0/0x4c0 [ 206.013977] ? mark_held_locks+0xc9/0x160 [ 206.018137] ? __raw_spin_lock_init+0x1c/0x100 [ 206.022902] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 206.027936] ? lockdep_init_map+0x9/0x10 [ 206.032007] sget_userns+0x706/0xf20 [ 206.035728] ? set_anon_super+0x20/0x20 [ 206.039721] ? get_empty_filp.cold.7+0x3e/0x3e [ 206.044321] ? destroy_unused_super.part.9+0x100/0x100 [ 206.049621] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 206.054658] ? kasan_check_read+0x11/0x20 [ 206.058833] ? rcu_pm_notify+0xc0/0xc0 [ 206.062730] ? trace_hardirqs_off+0xd/0x10 [ 206.066981] ? cap_capable+0x1f9/0x260 [ 206.070891] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 206.076444] ? security_capable+0x99/0xc0 [ 206.080611] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 206.086151] ? ns_capable_common+0x13f/0x170 [ 206.090601] mount_ns+0x8f/0x1d0 [ 206.093981] ? rpc_pipe_release+0xb70/0xb70 [ 206.098314] rpc_mount+0x9e/0xd0 [ 206.101694] mount_fs+0xae/0x328 [ 206.105077] vfs_kern_mount.part.34+0xd4/0x4d0 [ 206.109673] ? may_umount+0xb0/0xb0 [ 206.113304] ? _raw_read_unlock+0x22/0x30 [ 206.117460] ? __get_fs_type+0x97/0xc0 [ 206.121361] do_mount+0x564/0x3070 [ 206.124921] ? copy_mount_string+0x40/0x40 [ 206.129162] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 206.134187] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 206.138954] ? retint_kernel+0x10/0x10 [ 206.142858] ? copy_mount_options+0x1f0/0x380 [ 206.147356] ? copy_mount_options+0x202/0x380 [ 206.151864] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 206.157409] ? copy_mount_options+0x285/0x380 [ 206.161919] ksys_mount+0x12d/0x140 [ 206.165557] SyS_mount+0x35/0x50 [ 206.168929] ? ksys_mount+0x140/0x140 [ 206.172770] do_syscall_64+0x29e/0x9d0 [ 206.176663] ? vmalloc_sync_all+0x30/0x30 [ 206.180815] ? _raw_spin_unlock_irq+0x27/0x70 [ 206.185320] ? finish_task_switch+0x1ca/0x810 [ 206.189832] ? syscall_return_slowpath+0x5c0/0x5c0 [ 206.194773] ? syscall_return_slowpath+0x30f/0x5c0 [ 206.199724] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 206.205106] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 206.209969] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 206.215166] RIP: 0033:0x455329 [ 206.218357] RSP: 002b:00007fdcd2ef2c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 206.226170] RAX: ffffffffffffffda RBX: 00007fdcd2ef36d4 RCX: 0000000000455329 [ 206.233449] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 206.240725] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 206.248002] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 206.255279] R13: 00000000000003fb R14: 00000000006f9028 R15: 0000000000000013 2018/04/18 07:41:38 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x9) close(0xffffffffffffffff) gettid() socket$kcm(0x29, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x0, 0xffffffffffff36f1, 0x0, 0x18}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x10) perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x0, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x0, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/18 07:41:38 executing program 3: r0 = socket$kcm(0x2, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000740)={&(0x7f0000000000)=@in={0x2, 0x4e23, @multicast2=0xe0000002, [0xffff0000]}, 0x80, &(0x7f0000000200), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="300000000000000000000000070000008921eeb35cd8bd7fcc0c1b988e1c9d86c39351f17f9b04b22b00000000000000"], 0x30}, 0x0) 2018/04/18 07:41:38 executing program 2: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004, 0x4000009d}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x1, 0x20000000000000f2, &(0x7f0000000200)=@raw=[@generic={0x3, 0x7, 0x6, 0x8000}, @call={0x85, 0x0, 0x0, 0x20}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x7}, @generic={0x2, 0x4, 0x3, 0x80}, @generic={0x6, 0x101, 0x4, 0x54d6a92e}], &(0x7f0000f6bffb)="475000fd", 0x566, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x59616d61, 0xffffffffffffffff, 0x1, &(0x7f0000000000)) socketpair$inet_icmp(0x59616d61, 0xffffffffffffffff, 0x1, &(0x7f0000000000)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000080)) 2018/04/18 07:41:38 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x58010000, &(0x7f0000000100)) 2018/04/18 07:41:38 executing program 5: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x100}, 0x2c) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) close(0xffffffffffffffff) gettid() socket$kcm(0x29, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r0, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={r1, 0x28, &(0x7f0000000740)}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r2}, 0x10) 2018/04/18 07:41:38 executing program 1: r0 = perf_event_open(&(0x7f0000348f88)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x9) close(r0) gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={r2, 0x28, &(0x7f0000000740)}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r3}, 0x10) 2018/04/18 07:41:38 executing program 6: socketpair(0x4, 0x1, 0x7, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f00000000c0)=0x8) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x400000000, 0x0, &(0x7f0000000100)) socketpair(0xa, 0x7, 0x0, &(0x7f00000001c0)) 2018/04/18 07:41:38 executing program 7 (fault-call:4 fault-nth:20): mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/18 07:41:38 executing program 3: r0 = socket$kcm(0x2, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000740)={&(0x7f0000000000)=@in={0x2, 0x4e23, @multicast2=0xe0000002, [0x4]}, 0x80, &(0x7f0000000200), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="300000000000000000000000070000008921eeb35cd8bd7fcc0c1b988e1c9d86c39351f17f9b04b22b00000000000000"], 0x30}, 0x0) [ 206.368845] FAULT_INJECTION: forcing a failure. [ 206.368845] name failslab, interval 1, probability 0, space 0, times 0 [ 206.380156] CPU: 1 PID: 18523 Comm: syz-executor7 Not tainted 4.16.0+ #3 [ 206.387000] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 206.396358] Call Trace: [ 206.398967] dump_stack+0x1b9/0x294 [ 206.402612] ? dump_stack_print_info.cold.2+0x52/0x52 [ 206.407810] ? perf_trace_lock_acquire+0xe3/0x980 [ 206.412678] should_fail.cold.4+0xa/0x1a [ 206.416759] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 206.421882] ? zap_class+0x720/0x720 [ 206.425608] ? print_usage_bug+0xc0/0xc0 [ 206.429680] ? graph_lock+0x170/0x170 [ 206.433506] ? lock_downgrade+0x8e0/0x8e0 [ 206.437674] ? find_held_lock+0x36/0x1c0 [ 206.441753] ? __lock_is_held+0xb5/0x140 [ 206.445840] ? check_same_owner+0x320/0x320 [ 206.450179] ? __might_sleep+0x95/0x190 [ 206.454168] ? rcu_note_context_switch+0x710/0x710 [ 206.459115] __should_failslab+0x124/0x180 [ 206.463364] should_failslab+0x9/0x14 [ 206.467175] __kmalloc+0x2c8/0x760 [ 206.470729] ? __kmalloc_node+0x47/0x70 [ 206.474716] ? __list_lru_init+0xdd/0x790 [ 206.478888] __list_lru_init+0xdd/0x790 [ 206.482883] ? list_lru_destroy+0x4c0/0x4c0 [ 206.487210] ? mark_held_locks+0xc9/0x160 [ 206.491371] ? __raw_spin_lock_init+0x1c/0x100 [ 206.495965] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 206.501006] ? lockdep_init_map+0x9/0x10 [ 206.505077] sget_userns+0x706/0xf20 [ 206.508789] ? set_anon_super+0x20/0x20 [ 206.512756] ? get_empty_filp.cold.7+0x3e/0x3e [ 206.517329] ? destroy_unused_super.part.9+0x100/0x100 [ 206.522600] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 206.527606] ? kasan_check_read+0x11/0x20 [ 206.531746] ? rcu_pm_notify+0xc0/0xc0 [ 206.535620] ? trace_hardirqs_off+0xd/0x10 [ 206.539846] ? cap_capable+0x1f9/0x260 [ 206.543731] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 206.549254] ? security_capable+0x99/0xc0 [ 206.553393] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 206.558935] ? ns_capable_common+0x13f/0x170 [ 206.563337] mount_ns+0x8f/0x1d0 [ 206.566700] ? rpc_pipe_release+0xb70/0xb70 [ 206.571016] rpc_mount+0x9e/0xd0 [ 206.574374] mount_fs+0xae/0x328 [ 206.577737] vfs_kern_mount.part.34+0xd4/0x4d0 [ 206.582313] ? may_umount+0xb0/0xb0 [ 206.585930] ? _raw_read_unlock+0x22/0x30 [ 206.590068] ? __get_fs_type+0x97/0xc0 [ 206.593949] do_mount+0x564/0x3070 [ 206.597485] ? copy_mount_string+0x40/0x40 [ 206.601706] ? rcu_pm_notify+0xc0/0xc0 [ 206.605588] ? copy_mount_options+0x5f/0x380 [ 206.609997] ? rcu_read_lock_sched_held+0x108/0x120 [ 206.615021] ? kmem_cache_alloc_trace+0x616/0x780 [ 206.619856] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 206.625386] ? _copy_from_user+0xdf/0x150 [ 206.629526] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 206.635052] ? copy_mount_options+0x285/0x380 [ 206.639539] ksys_mount+0x12d/0x140 [ 206.643157] SyS_mount+0x35/0x50 [ 206.646508] ? ksys_mount+0x140/0x140 [ 206.650301] do_syscall_64+0x29e/0x9d0 [ 206.654174] ? vmalloc_sync_all+0x30/0x30 [ 206.658310] ? _raw_spin_unlock_irq+0x27/0x70 [ 206.662797] ? finish_task_switch+0x1ca/0x810 [ 206.667282] ? syscall_return_slowpath+0x5c0/0x5c0 [ 206.672203] ? syscall_return_slowpath+0x30f/0x5c0 [ 206.677125] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 206.682484] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 206.687321] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 206.692495] RIP: 0033:0x455329 [ 206.695673] RSP: 002b:00007fdcd2ef2c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 206.703369] RAX: ffffffffffffffda RBX: 00007fdcd2ef36d4 RCX: 0000000000455329 [ 206.710626] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 2018/04/18 07:41:39 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x9) close(0xffffffffffffffff) gettid() socket$kcm(0x29, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x0, 0xffffffffffff36f1, 0x0, 0x18}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x10) perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x0, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x0, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/18 07:41:39 executing program 3: r0 = socket$kcm(0x2, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000740)={&(0x7f0000000000)=@in={0x2, 0x4e23, @multicast2=0xe0000002, [0x2]}, 0x80, &(0x7f0000000200), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="300000000000000000000000070000008921eeb35cd8bd7fcc0c1b988e1c9d86c39351f17f9b04b22b00000000000000"], 0x30}, 0x0) [ 206.717885] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 206.725139] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 206.732398] R13: 00000000000003fb R14: 00000000006f9028 R15: 0000000000000014 2018/04/18 07:41:39 executing program 5: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x100}, 0x2c) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) close(0xffffffffffffffff) gettid() socket$kcm(0x29, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r0, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={r1, 0x28, &(0x7f0000000740)}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r2}, 0x10) 2018/04/18 07:41:39 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x9) close(0xffffffffffffffff) gettid() socket$kcm(0x29, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x0, 0xffffffffffff36f1, 0x0, 0x18}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x10) perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x0, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x0, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/18 07:41:39 executing program 2: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004, 0x4000009d}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)={0x0, 0x0}}, 0x10) socketpair$inet_icmp(0x59616d61, 0xffffffffffffffff, 0x1, &(0x7f0000000000)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=r1, 0x4) socketpair$inet_icmp(0x59616d61, 0xffffffffffffffff, 0x1, &(0x7f0000000000)) 2018/04/18 07:41:39 executing program 1: r0 = perf_event_open(&(0x7f0000348f88)={0x0, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x9) close(r0) gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={r2, 0x28, &(0x7f0000000740)}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r3}, 0x10) 2018/04/18 07:41:39 executing program 3: r0 = socket$kcm(0x2, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000740)={&(0x7f0000000000)=@in={0x2, 0x4e23, @multicast2=0xe0000002, [0x100000000000000]}, 0x80, &(0x7f0000000200), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="300000000000000000000000070000008921eeb35cd8bd7fcc0c1b988e1c9d86c39351f17f9b04b22b00000000000000"], 0x30}, 0x0) 2018/04/18 07:41:39 executing program 7 (fault-call:4 fault-nth:21): mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/18 07:41:39 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_udp(0xa, 0x2, 0xd9000000, &(0x7f0000000100)) 2018/04/18 07:41:39 executing program 3: r0 = socket$kcm(0x2, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000740)={&(0x7f0000000000)=@in={0x2, 0x4e23, @multicast2=0xe0000002, [0x200000000000000]}, 0x80, &(0x7f0000000200), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="300000000000000000000000070000008921eeb35cd8bd7fcc0c1b988e1c9d86c39351f17f9b04b22b00000000000000"], 0x30}, 0x0) [ 207.010290] FAULT_INJECTION: forcing a failure. [ 207.010290] name failslab, interval 1, probability 0, space 0, times 0 [ 207.021719] CPU: 0 PID: 18554 Comm: syz-executor7 Not tainted 4.16.0+ #3 [ 207.028571] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 207.037929] Call Trace: [ 207.040536] dump_stack+0x1b9/0x294 [ 207.044186] ? dump_stack_print_info.cold.2+0x52/0x52 [ 207.049391] ? perf_trace_lock_acquire+0xe3/0x980 [ 207.054252] ? kernel_text_address+0x79/0xf0 2018/04/18 07:41:39 executing program 3: r0 = socket$kcm(0x2, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000740)={&(0x7f0000000000)=@in={0x2, 0x4e23, @multicast2=0xe0000002, [0x4000000000000]}, 0x80, &(0x7f0000000200), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="300000000000000000000000070000008921eeb35cd8bd7fcc0c1b988e1c9d86c39351f17f9b04b22b00000000000000"], 0x30}, 0x0) 2018/04/18 07:41:39 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x9) close(0xffffffffffffffff) gettid() socket$kcm(0x29, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x0, 0xffffffffffff36f1, 0x0, 0x18}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x10) perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x0, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x0, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) [ 207.058694] should_fail.cold.4+0xa/0x1a [ 207.062773] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 207.067898] ? graph_lock+0x170/0x170 [ 207.071704] ? save_stack+0x43/0xd0 [ 207.075342] ? kasan_kmalloc+0xc4/0xe0 [ 207.079248] ? __list_lru_init+0xdd/0x790 [ 207.083409] ? find_held_lock+0x36/0x1c0 [ 207.087485] ? __lock_is_held+0xb5/0x140 [ 207.091573] ? check_same_owner+0x320/0x320 [ 207.095908] ? rcu_note_context_switch+0x710/0x710 [ 207.100865] __should_failslab+0x124/0x180 [ 207.105119] should_failslab+0x9/0x14 [ 207.108934] kmem_cache_alloc_node_trace+0x26f/0x770 [ 207.114049] ? mark_held_locks+0xc9/0x160 [ 207.118214] ? __raw_spin_lock_init+0x1c/0x100 [ 207.122817] __kmalloc_node+0x33/0x70 [ 207.126634] kvmalloc_node+0x6b/0x100 [ 207.130450] __list_lru_init+0x559/0x790 [ 207.134531] ? list_lru_destroy+0x4c0/0x4c0 [ 207.138866] ? mark_held_locks+0xc9/0x160 [ 207.143034] ? __raw_spin_lock_init+0x1c/0x100 [ 207.147629] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 207.152666] ? lockdep_init_map+0x9/0x10 [ 207.156740] sget_userns+0x706/0xf20 2018/04/18 07:41:39 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x9) close(0xffffffffffffffff) gettid() socket$kcm(0x29, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x0, 0xffffffffffff36f1, 0x0, 0x18}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x10) perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x0, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x0, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) [ 207.160458] ? set_anon_super+0x20/0x20 [ 207.164445] ? get_empty_filp.cold.7+0x3e/0x3e [ 207.169038] ? destroy_unused_super.part.9+0x100/0x100 [ 207.174330] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 207.179364] ? kasan_check_read+0x11/0x20 [ 207.183523] ? rcu_pm_notify+0xc0/0xc0 [ 207.187417] ? trace_hardirqs_off+0xd/0x10 [ 207.191666] ? cap_capable+0x1f9/0x260 [ 207.195567] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 207.201113] ? security_capable+0x99/0xc0 [ 207.205277] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 207.210826] ? ns_capable_common+0x13f/0x170 [ 207.215251] mount_ns+0x8f/0x1d0 [ 207.218629] ? rpc_pipe_release+0xb70/0xb70 [ 207.222964] rpc_mount+0x9e/0xd0 [ 207.226350] mount_fs+0xae/0x328 [ 207.229736] vfs_kern_mount.part.34+0xd4/0x4d0 [ 207.234335] ? may_umount+0xb0/0xb0 [ 207.237975] ? _raw_read_unlock+0x22/0x30 [ 207.242134] ? __get_fs_type+0x97/0xc0 [ 207.246036] do_mount+0x564/0x3070 [ 207.249589] ? copy_mount_string+0x40/0x40 [ 207.253836] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 207.258607] ? retint_kernel+0x10/0x10 [ 207.262523] ? __sanitizer_cov_trace_const_cmp8+0xf/0x20 [ 207.267997] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 207.273547] ? copy_mount_options+0x285/0x380 [ 207.278053] ksys_mount+0x12d/0x140 [ 207.281694] SyS_mount+0x35/0x50 [ 207.285071] ? ksys_mount+0x140/0x140 [ 207.288883] do_syscall_64+0x29e/0x9d0 [ 207.292782] ? vmalloc_sync_all+0x30/0x30 [ 207.296937] ? _raw_spin_unlock_irq+0x27/0x70 [ 207.301448] ? finish_task_switch+0x1ca/0x810 [ 207.305959] ? syscall_return_slowpath+0x5c0/0x5c0 [ 207.310902] ? syscall_return_slowpath+0x30f/0x5c0 [ 207.315845] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 207.321229] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 207.326090] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 207.331286] RIP: 0033:0x455329 [ 207.334482] RSP: 002b:00007fdcd2ef2c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 207.342200] RAX: ffffffffffffffda RBX: 00007fdcd2ef36d4 RCX: 0000000000455329 [ 207.349480] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 207.356759] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 207.364037] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 207.371314] R13: 00000000000003fb R14: 00000000006f9028 R15: 0000000000000015 2018/04/18 07:41:39 executing program 1: r0 = perf_event_open(&(0x7f0000348f88)={0x0, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x9) close(r0) gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={r2, 0x28, &(0x7f0000000740)}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r3}, 0x10) 2018/04/18 07:41:39 executing program 2: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004, 0x4000009d}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0xfffffffffffffe79, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=r1, 0x4) socketpair$inet_icmp(0x59616d61, 0xffffffffffffffff, 0x1, &(0x7f0000000000)) socketpair$inet_icmp(0x59616d61, 0xffffffffffffffff, 0x1, &(0x7f0000000000)) 2018/04/18 07:41:39 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x9) close(0xffffffffffffffff) gettid() socket$kcm(0x29, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x0, 0xffffffffffff36f1, 0x0, 0x18}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x10) perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x0, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x0, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/18 07:41:39 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000f97ff8)) socketpair(0x8, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000080)="54969879dfd93f0ab94f7972fb07f2301ca99179638c65ab048d8d3a781d7f2365f2aa1eae87a56c4b114aa098cdda0ad0cf3d75eaaa5683ec347d820fb6d1898462811fa400aa04df777042e258f8ee9325d5878eb1247cc94383b3778d710bf74b58ad17e0a4ca9996fbc5bdc3", &(0x7f0000000100)="318700123fc14cbb6cc341b130cf87e57e29a674b16d38e474b42bdbe60b9d545a5c510fe9d49156c6bdebc6aa63febbcde4e65bf16e5fd3e7a8", 0x1}, 0x20) 2018/04/18 07:41:39 executing program 5: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8dacc"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x100}, 0x2c) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) close(0xffffffffffffffff) gettid() socket$kcm(0x29, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r0, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={r1, 0x28, &(0x7f0000000740)}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r2}, 0x10) 2018/04/18 07:41:39 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x6500, &(0x7f0000000100)) 2018/04/18 07:41:39 executing program 7 (fault-call:4 fault-nth:22): mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/18 07:41:39 executing program 3: r0 = socket$kcm(0x2, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000740)={&(0x7f0000000000)=@in={0x2, 0x4e23, @multicast2=0xe0000002, [0xffff000000000000]}, 0x80, &(0x7f0000000200), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="300000000000000000000000070000008921eeb35cd8bd7fcc0c1b988e1c9d86c39351f17f9b04b22b00000000000000"], 0x30}, 0x0) [ 207.524080] FAULT_INJECTION: forcing a failure. [ 207.524080] name failslab, interval 1, probability 0, space 0, times 0 [ 207.535520] CPU: 1 PID: 18608 Comm: syz-executor7 Not tainted 4.16.0+ #3 [ 207.542367] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 207.551727] Call Trace: [ 207.554338] dump_stack+0x1b9/0x294 [ 207.557990] ? dump_stack_print_info.cold.2+0x52/0x52 [ 207.563192] ? perf_trace_lock_acquire+0xe3/0x980 [ 207.568047] ? __save_stack_trace+0x7e/0xd0 [ 207.572398] should_fail.cold.4+0xa/0x1a [ 207.576482] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 207.581598] ? save_stack+0x43/0xd0 [ 207.585241] ? kasan_kmalloc+0xc4/0xe0 [ 207.589137] ? kmem_cache_alloc_trace+0x152/0x780 [ 207.593995] ? __memcg_init_list_lru_node+0x17d/0x2c0 [ 207.599197] ? __list_lru_init+0x456/0x790 [ 207.603442] ? sget_userns+0x706/0xf20 [ 207.607344] ? graph_lock+0x170/0x170 [ 207.611152] ? do_mount+0x564/0x3070 [ 207.614879] ? ksys_mount+0x12d/0x140 [ 207.618692] ? SyS_mount+0x35/0x50 [ 207.622247] ? do_syscall_64+0x29e/0x9d0 [ 207.626927] ? find_held_lock+0x36/0x1c0 [ 207.631013] ? __lock_is_held+0xb5/0x140 [ 207.635111] ? check_same_owner+0x320/0x320 [ 207.639455] ? rcu_note_context_switch+0x710/0x710 [ 207.644404] __should_failslab+0x124/0x180 [ 207.648655] should_failslab+0x9/0x14 [ 207.652467] kmem_cache_alloc_trace+0x2cb/0x780 [ 207.657151] ? __kmalloc_node+0x33/0x70 [ 207.661134] ? __kmalloc_node+0x33/0x70 [ 207.665125] ? rcu_read_lock_sched_held+0x108/0x120 [ 207.670168] __memcg_init_list_lru_node+0x17d/0x2c0 [ 207.675213] ? kvfree_rcu+0x20/0x20 [ 207.678868] ? __kmalloc_node+0x47/0x70 [ 207.682876] __list_lru_init+0x456/0x790 [ 207.686965] ? list_lru_destroy+0x4c0/0x4c0 [ 207.691300] ? mark_held_locks+0xc9/0x160 [ 207.695463] ? __raw_spin_lock_init+0x1c/0x100 [ 207.700059] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 207.705093] ? lockdep_init_map+0x9/0x10 [ 207.709166] sget_userns+0x706/0xf20 [ 207.712885] ? set_anon_super+0x20/0x20 [ 207.716876] ? get_empty_filp.cold.7+0x3e/0x3e 2018/04/18 07:41:39 executing program 3: r0 = socket$kcm(0x2, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000740)={&(0x7f0000000000)=@in={0x2, 0x4e23, @multicast2=0xe0000002, [0x1000000]}, 0x80, &(0x7f0000000200), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="300000000000000000000000070000008921eeb35cd8bd7fcc0c1b988e1c9d86c39351f17f9b04b22b00000000000000"], 0x30}, 0x0) 2018/04/18 07:41:39 executing program 1: r0 = perf_event_open(&(0x7f0000348f88)={0x0, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x9) close(r0) gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={r2, 0x28, &(0x7f0000000740)}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r3}, 0x10) 2018/04/18 07:41:40 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x8100000000000000, &(0x7f0000000100)) [ 207.721474] ? destroy_unused_super.part.9+0x100/0x100 [ 207.726765] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 207.731794] ? kasan_check_read+0x11/0x20 [ 207.735956] ? rcu_pm_notify+0xc0/0xc0 [ 207.739859] ? trace_hardirqs_off+0xd/0x10 [ 207.744104] ? cap_capable+0x1f9/0x260 [ 207.748008] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 207.753557] ? security_capable+0x99/0xc0 [ 207.757724] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 207.763268] ? ns_capable_common+0x13f/0x170 [ 207.767691] mount_ns+0x8f/0x1d0 [ 207.771153] ? rpc_pipe_release+0xb70/0xb70 [ 207.775485] rpc_mount+0x9e/0xd0 [ 207.778864] mount_fs+0xae/0x328 [ 207.782239] vfs_kern_mount.part.34+0xd4/0x4d0 [ 207.786837] ? may_umount+0xb0/0xb0 [ 207.790469] ? _raw_read_unlock+0x22/0x30 [ 207.794630] ? __get_fs_type+0x97/0xc0 [ 207.798531] do_mount+0x564/0x3070 [ 207.802070] ? copy_mount_string+0x40/0x40 [ 207.806292] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 207.811298] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 207.816049] ? retint_kernel+0x10/0x10 [ 207.819933] ? copy_mount_options+0x1f0/0x380 [ 207.824414] ? copy_mount_options+0x1f6/0x380 [ 207.828899] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 207.834682] ? copy_mount_options+0x285/0x380 [ 207.839172] ksys_mount+0x12d/0x140 [ 207.842801] SyS_mount+0x35/0x50 [ 207.846153] ? ksys_mount+0x140/0x140 [ 207.849945] do_syscall_64+0x29e/0x9d0 [ 207.853836] ? vmalloc_sync_all+0x30/0x30 [ 207.857973] ? _raw_spin_unlock_irq+0x27/0x70 [ 207.862467] ? finish_task_switch+0x1ca/0x810 [ 207.866960] ? syscall_return_slowpath+0x5c0/0x5c0 [ 207.871887] ? syscall_return_slowpath+0x30f/0x5c0 [ 207.876811] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 207.882172] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 207.887013] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 207.892188] RIP: 0033:0x455329 [ 207.895363] RSP: 002b:00007fdcd2ef2c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 207.903061] RAX: ffffffffffffffda RBX: 00007fdcd2ef36d4 RCX: 0000000000455329 [ 207.910318] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 207.917575] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 207.924841] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 207.932095] R13: 00000000000003fb R14: 00000000006f9028 R15: 0000000000000016 2018/04/18 07:41:40 executing program 3: r0 = socket$kcm(0x2, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000740)={&(0x7f0000000000)=@in={0x2, 0x4e23, @multicast2=0xe0000002, [0x0, 0x1000000]}, 0x80, &(0x7f0000000200), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="300000000000000000000000070000008921eeb35cd8bd7fcc0c1b988e1c9d86c39351f17f9b04b22b00000000000000"], 0x30}, 0x0) 2018/04/18 07:41:40 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x9) close(0xffffffffffffffff) gettid() socket$kcm(0x29, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x0, 0xffffffffffff36f1, 0x0, 0x18}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x10) perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x0, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0x0, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/18 07:41:40 executing program 5: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x100}, 0x2c) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) close(0xffffffffffffffff) gettid() socket$kcm(0x29, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r0, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={r1, 0x28, &(0x7f0000000740)}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r2}, 0x10) 2018/04/18 07:41:40 executing program 1: r0 = perf_event_open(&(0x7f0000348f88)={0x0, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) close(r0) gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={r2, 0x28, &(0x7f0000000740)}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r3}, 0x10) 2018/04/18 07:41:40 executing program 2: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004, 0x4000009d}, 0x2c) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000004480)={&(0x7f0000004240)=@can={0x0, 0x0}, 0x80, &(0x7f00000043c0)=[{&(0x7f00000042c0)=""/200, 0xc8}], 0x1, &(0x7f0000004400)=""/123, 0x7b, 0xb8c3}, 0x40000000) bpf$PROG_LOAD(0x5, &(0x7f00000044c0)={0xf, 0x13, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x3f}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0xffffffff}, @generic={0x1, 0x3, 0x401, 0x7}, @ldst={0x1, 0x3, 0x3, 0x0, 0x7, 0xfffffffc, 0x4}, @generic={0x2, 0x1, 0x0, 0x7}, @exit={0x95}, @ldst={0x3, 0x3, 0x3, 0x3, 0x8, 0x10, 0x10}, @initr0={0x18, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x4cc5}, @ldst={0x2, 0x3, 0x3, 0xa, 0x5, 0xc, 0xfffffffffffffff1}], {0x95}}, &(0x7f0000000140)='GPL\x00', 0x1, 0x1000, &(0x7f0000000280)=""/4096, 0x41000, 0x1, [], r0}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000001280)=ANY=[@ANYBLOB="18001acff14346c900000000000100000000000000ff70100002009262c702bcc02795eb000000000000e7ff00001a"], &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x59616d61, 0xffffffffffffffff, 0x1, &(0x7f0000000000)) socketpair$inet_icmp(0x59616d61, 0xffffffffffffffff, 0x1, &(0x7f0000000000)) 2018/04/18 07:41:40 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x182, &(0x7f0000000100)) 2018/04/18 07:41:40 executing program 7 (fault-call:4 fault-nth:23): mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/18 07:41:40 executing program 6: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000080)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000f97ff8)) socketpair(0x8, 0x5, 0x0, &(0x7f00000001c0)) [ 208.083226] FAULT_INJECTION: forcing a failure. [ 208.083226] name failslab, interval 1, probability 0, space 0, times 0 [ 208.094576] CPU: 0 PID: 18640 Comm: syz-executor7 Not tainted 4.16.0+ #3 [ 208.101425] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 208.110789] Call Trace: [ 208.113390] dump_stack+0x1b9/0x294 [ 208.117038] ? dump_stack_print_info.cold.2+0x52/0x52 [ 208.122240] ? perf_trace_lock_acquire+0xe3/0x980 [ 208.127100] ? kernel_text_address+0x79/0xf0 [ 208.131536] should_fail.cold.4+0xa/0x1a [ 208.135623] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 208.140745] ? graph_lock+0x170/0x170 [ 208.144559] ? save_stack+0x43/0xd0 [ 208.148197] ? kasan_kmalloc+0xc4/0xe0 [ 208.152097] ? __list_lru_init+0xdd/0x790 [ 208.156262] ? find_held_lock+0x36/0x1c0 [ 208.160346] ? __lock_is_held+0xb5/0x140 [ 208.164439] ? check_same_owner+0x320/0x320 [ 208.168778] ? rcu_note_context_switch+0x710/0x710 [ 208.173734] __should_failslab+0x124/0x180 [ 208.177983] should_failslab+0x9/0x14 [ 208.181796] kmem_cache_alloc_node_trace+0x26f/0x770 [ 208.186908] ? mark_held_locks+0xc9/0x160 [ 208.191071] ? __raw_spin_lock_init+0x1c/0x100 [ 208.195671] __kmalloc_node+0x33/0x70 [ 208.199484] kvmalloc_node+0x6b/0x100 [ 208.203299] __list_lru_init+0x559/0x790 [ 208.207383] ? list_lru_destroy+0x4c0/0x4c0 [ 208.211710] ? mark_held_locks+0xc9/0x160 [ 208.215879] ? __raw_spin_lock_init+0x1c/0x100 [ 208.220476] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 208.225510] ? lockdep_init_map+0x9/0x10 [ 208.229587] sget_userns+0x706/0xf20 [ 208.233307] ? set_anon_super+0x20/0x20 [ 208.237294] ? get_empty_filp.cold.7+0x3e/0x3e [ 208.241891] ? destroy_unused_super.part.9+0x100/0x100 [ 208.247182] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 208.252217] ? kasan_check_read+0x11/0x20 [ 208.256386] ? rcu_pm_notify+0xc0/0xc0 [ 208.260303] ? trace_hardirqs_off+0xd/0x10 [ 208.264559] ? cap_capable+0x1f9/0x260 [ 208.268464] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 208.274012] ? security_capable+0x99/0xc0 [ 208.278176] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 208.283728] ? ns_capable_common+0x13f/0x170 [ 208.288153] mount_ns+0x8f/0x1d0 [ 208.291533] ? rpc_pipe_release+0xb70/0xb70 [ 208.295868] rpc_mount+0x9e/0xd0 [ 208.299244] mount_fs+0xae/0x328 [ 208.302618] vfs_kern_mount.part.34+0xd4/0x4d0 [ 208.307211] ? may_umount+0xb0/0xb0 [ 208.310845] ? _raw_read_unlock+0x22/0x30 [ 208.314998] ? __get_fs_type+0x97/0xc0 [ 208.318900] do_mount+0x564/0x3070 [ 208.322448] ? do_raw_spin_unlock+0x9e/0x2e0 [ 208.326876] ? copy_mount_string+0x40/0x40 [ 208.331118] ? rcu_pm_notify+0xc0/0xc0 [ 208.335028] ? copy_mount_options+0x5f/0x380 [ 208.339447] ? rcu_read_lock_sched_held+0x108/0x120 [ 208.344470] ? kmem_cache_alloc_trace+0x616/0x780 [ 208.349327] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 208.354883] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 208.360429] ? copy_mount_options+0x285/0x380 [ 208.364936] ksys_mount+0x12d/0x140 [ 208.368582] SyS_mount+0x35/0x50 [ 208.371954] ? ksys_mount+0x140/0x140 [ 208.375765] do_syscall_64+0x29e/0x9d0 [ 208.379660] ? vmalloc_sync_all+0x30/0x30 [ 208.383812] ? _raw_spin_unlock_irq+0x27/0x70 [ 208.388317] ? finish_task_switch+0x1ca/0x810 [ 208.392829] ? syscall_return_slowpath+0x5c0/0x5c0 [ 208.397771] ? syscall_return_slowpath+0x30f/0x5c0 [ 208.402718] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 208.408103] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 208.412966] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 208.418160] RIP: 0033:0x455329 [ 208.421350] RSP: 002b:00007fdcd2ef2c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 2018/04/18 07:41:40 executing program 3: r0 = socket$kcm(0x2, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000740)={&(0x7f0000000000)=@in={0x2, 0x4e23, @multicast2=0xe0000002, [0x0, 0x2000000]}, 0x80, &(0x7f0000000200), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="300000000000000000000000070000008921eeb35cd8bd7fcc0c1b988e1c9d86c39351f17f9b04b22b00000000000000"], 0x30}, 0x0) 2018/04/18 07:41:40 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x2d000000, &(0x7f0000000100)) 2018/04/18 07:41:40 executing program 3: r0 = socket$kcm(0x2, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000740)={&(0x7f0000000000)=@in={0x2, 0x4e23, @multicast2=0xe0000002, [0x0, 0x40000]}, 0x80, &(0x7f0000000200), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="300000000000000000000000070000008921eeb35cd8bd7fcc0c1b988e1c9d86c39351f17f9b04b22b00000000000000"], 0x30}, 0x0) 2018/04/18 07:41:40 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_udp(0xa, 0x2, 0xde, &(0x7f0000000100)) 2018/04/18 07:41:40 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x9) close(0xffffffffffffffff) gettid() socket$kcm(0x29, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x0, 0xffffffffffff36f1, 0x0, 0x18}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x10) perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x0, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0x0, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/18 07:41:40 executing program 3: r0 = socket$kcm(0x2, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000740)={&(0x7f0000000000)=@in={0x2, 0x4e23, @multicast2=0xe0000002, [0x0, 0xffff0000]}, 0x80, &(0x7f0000000200), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="300000000000000000000000070000008921eeb35cd8bd7fcc0c1b988e1c9d86c39351f17f9b04b22b00000000000000"], 0x30}, 0x0) 2018/04/18 07:41:40 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) socketpair(0x8, 0x5, 0x4, &(0x7f00000001c0)) 2018/04/18 07:41:40 executing program 2: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004, 0x4000009d}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000001240)=ANY=[@ANYBLOB="06000000000000003f9dcc00000700000000000000000000000000000000000000000000000000000000000000000000"], &(0x7f0000001200)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251, 0x41000}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001380)={r1, 0x50, &(0x7f0000001300)}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000012c0)={&(0x7f0000001280)='./file0\x00', r0}, 0x10) recvmsg$kcm(0xffffffffffffff9c, &(0x7f000000b000)={&(0x7f000000ad40)=@can={0x0, 0x0}, 0x80, &(0x7f000000af40)=[{&(0x7f000000adc0)=""/158, 0x9e}, {&(0x7f000000ae80)=""/32, 0x20}, {&(0x7f000000aec0)=""/68, 0x44}], 0x3, &(0x7f000000af80)=""/71, 0x47, 0x7}, 0x10000) bpf$PROG_LOAD(0x5, &(0x7f000000b040)={0xf, 0x8, &(0x7f0000000180)=@raw=[@alu={0x7, 0x6, 0x3, 0xa, 0xf, 0xfffffffc, 0xffffffffffffffff}, @generic={0x5e8fa22b, 0x4, 0xdc7, 0x7}, @jmp={0x5, 0x0, 0x0, 0x5, 0x7, 0xffffffff, 0xffffffffffffffff}, @initr0={0x18, 0x0, 0x0, 0x0, 0x6c0}], &(0x7f00000001c0)='GPL\x00', 0x1, 0x1000, &(0x7f0000000200)=""/4096, 0x41100, 0x1, [], r2}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r1, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x59616d61, 0xffffffffffffffff, 0x1, &(0x7f0000000080)) socketpair$inet_icmp(0x59616d61, 0xffffffffffffffff, 0x1, &(0x7f0000000000)) [ 208.429073] RAX: ffffffffffffffda RBX: 00007fdcd2ef36d4 RCX: 0000000000455329 [ 208.436351] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 208.443624] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 208.450907] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 208.458187] R13: 00000000000003fb R14: 00000000006f9028 R15: 0000000000000017 2018/04/18 07:41:41 executing program 3: r0 = socket$kcm(0x2, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000740)={&(0x7f0000000000)=@in={0x2, 0x4e23, @multicast2=0xe0000002, [0x0, 0x4]}, 0x80, &(0x7f0000000200), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="300000000000000000000000070000008921eeb35cd8bd7fcc0c1b988e1c9d86c39351f17f9b04b22b00000000000000"], 0x30}, 0x0) 2018/04/18 07:41:41 executing program 6: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100)={&(0x7f00000000c0)='./file0\x00', 0x0, 0x7dd49e337deeed31}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0xf, 0x7f, 0x80, 0x3, 0x9, r1, 0x3ff}, 0x2c) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000f97ff8)) socketpair(0x8, 0x6, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x631) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x0) 2018/04/18 07:41:41 executing program 2: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004, 0x4000009d}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) recvmsg(r1, &(0x7f000000afc0)={&(0x7f000000ad80)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f000000af00)=[{&(0x7f000000ae00)=""/231, 0xe7}], 0x1, &(0x7f000000af40)=""/101, 0x380, 0x7ff}, 0x40000020) bpf$PROG_LOAD(0x5, &(0x7f000000b000)={0x0, 0xd, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xa5}, [@alu={0x7, 0x184, 0xb, 0xf, 0x7, 0xffffffc7, 0x8}, @jmp={0x5, 0xfff, 0xf, 0x8, 0x3, 0x15, 0x4}, @ldst={0x1, 0x3, 0x7, 0x1, 0x2, 0x2, 0x4}, @call={0x85, 0x0, 0x0, 0x14}, @jmp={0x5, 0x20, 0x0, 0x1, 0xa, 0x2, 0x8}], {0x95}}, &(0x7f0000000240)='syzkaller\x00', 0x4000, 0xbc, &(0x7f0000000280)=""/188, 0x41100, 0x1, [], r2}, 0x48) socketpair$inet_icmp(0x59616d61, 0xffffffffffffffff, 0x1, &(0x7f0000000000)) socketpair$inet_icmp(0x59616d61, 0xffffffffffffffff, 0x1, &(0x7f0000000000)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000080)) 2018/04/18 07:41:41 executing program 5: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9c"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x100}, 0x2c) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) close(0xffffffffffffffff) gettid() socket$kcm(0x29, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r0, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={r1, 0x28, &(0x7f0000000740)}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r2}, 0x10) 2018/04/18 07:41:41 executing program 7 (fault-call:4 fault-nth:24): mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/18 07:41:41 executing program 1: r0 = perf_event_open(&(0x7f0000348f88)={0x0, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) close(r0) gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={r2, 0x28, &(0x7f0000000740)}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r3}, 0x10) 2018/04/18 07:41:41 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_udp(0xa, 0x2, 0xe000000000000000, &(0x7f0000000100)) 2018/04/18 07:41:41 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x9) close(0xffffffffffffffff) gettid() socket$kcm(0x29, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x0, 0xffffffffffff36f1, 0x0, 0x18}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x10) perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x0, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0x0, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) [ 208.711684] FAULT_INJECTION: forcing a failure. [ 208.711684] name failslab, interval 1, probability 0, space 0, times 0 [ 208.723101] CPU: 0 PID: 18698 Comm: syz-executor7 Not tainted 4.16.0+ #3 [ 208.729955] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 208.739324] Call Trace: [ 208.741928] dump_stack+0x1b9/0x294 [ 208.745581] ? dump_stack_print_info.cold.2+0x52/0x52 [ 208.750791] ? perf_trace_lock_acquire+0xe3/0x980 [ 208.755653] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 208.760869] should_fail.cold.4+0xa/0x1a [ 208.764953] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 208.770075] ? unwind_get_return_address+0x61/0xa0 [ 208.775021] ? __save_stack_trace+0x7e/0xd0 [ 208.779357] ? graph_lock+0x170/0x170 [ 208.783181] ? find_held_lock+0x36/0x1c0 [ 208.787264] ? __lock_is_held+0xb5/0x140 [ 208.791353] ? check_same_owner+0x320/0x320 [ 208.796189] ? rcu_note_context_switch+0x710/0x710 [ 208.801126] __should_failslab+0x124/0x180 [ 208.805350] should_failslab+0x9/0x14 [ 208.809142] kmem_cache_alloc_trace+0x2cb/0x780 [ 208.813803] ? __kmalloc_node+0x33/0x70 [ 208.817764] ? __kmalloc_node+0x33/0x70 [ 208.821737] ? rcu_read_lock_sched_held+0x108/0x120 [ 208.826749] __memcg_init_list_lru_node+0x17d/0x2c0 [ 208.831757] ? kvfree_rcu+0x20/0x20 [ 208.835374] ? __kmalloc_node+0x47/0x70 [ 208.839346] __list_lru_init+0x456/0x790 [ 208.843401] ? list_lru_destroy+0x4c0/0x4c0 [ 208.847709] ? mark_held_locks+0xc9/0x160 [ 208.851847] ? __raw_spin_lock_init+0x1c/0x100 [ 208.856419] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 208.861429] ? lockdep_init_map+0x9/0x10 [ 208.865479] sget_userns+0x706/0xf20 [ 208.869179] ? set_anon_super+0x20/0x20 [ 208.873145] ? get_empty_filp.cold.7+0x3e/0x3e [ 208.877718] ? destroy_unused_super.part.9+0x100/0x100 [ 208.882993] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 208.888004] ? kasan_check_read+0x11/0x20 [ 208.892144] ? rcu_pm_notify+0xc0/0xc0 [ 208.896031] ? trace_hardirqs_off+0xd/0x10 [ 208.900258] ? cap_capable+0x1f9/0x260 [ 208.904143] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 208.909664] ? security_capable+0x99/0xc0 [ 208.913807] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 208.919335] ? ns_capable_common+0x13f/0x170 [ 208.923733] mount_ns+0x8f/0x1d0 [ 208.927091] ? rpc_pipe_release+0xb70/0xb70 [ 208.931402] rpc_mount+0x9e/0xd0 [ 208.934767] mount_fs+0xae/0x328 [ 208.938130] vfs_kern_mount.part.34+0xd4/0x4d0 [ 208.942701] ? may_umount+0xb0/0xb0 [ 208.946317] ? _raw_read_unlock+0x22/0x30 [ 208.950451] ? __get_fs_type+0x97/0xc0 [ 208.954335] do_mount+0x564/0x3070 [ 208.957863] ? do_raw_spin_unlock+0x9e/0x2e0 [ 208.962264] ? copy_mount_string+0x40/0x40 [ 208.966485] ? rcu_pm_notify+0xc0/0xc0 [ 208.970368] ? copy_mount_options+0x5f/0x380 [ 208.974764] ? rcu_read_lock_sched_held+0x108/0x120 [ 208.979768] ? kmem_cache_alloc_trace+0x616/0x780 [ 208.984600] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 208.990129] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 208.995654] ? copy_mount_options+0x285/0x380 [ 209.000143] ksys_mount+0x12d/0x140 [ 209.003762] SyS_mount+0x35/0x50 [ 209.007115] ? ksys_mount+0x140/0x140 [ 209.010906] do_syscall_64+0x29e/0x9d0 [ 209.014781] ? vmalloc_sync_all+0x30/0x30 [ 209.018916] ? _raw_spin_unlock_irq+0x27/0x70 [ 209.023401] ? finish_task_switch+0x1ca/0x810 [ 209.027887] ? syscall_return_slowpath+0x5c0/0x5c0 [ 209.032804] ? syscall_return_slowpath+0x30f/0x5c0 [ 209.037725] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 209.043084] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 209.047920] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 209.053096] RIP: 0033:0x455329 2018/04/18 07:41:41 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x9) close(0xffffffffffffffff) gettid() socket$kcm(0x29, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x0, 0xffffffffffff36f1, 0x0, 0x18}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x10) perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x0, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x0, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/18 07:41:41 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_udp(0xa, 0x2, 0xad01, &(0x7f0000000100)) 2018/04/18 07:41:41 executing program 3: r0 = socket$kcm(0x2, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000740)={&(0x7f0000000000)=@in={0x2, 0x4e23, @multicast2=0xe0000002, [0x0, 0x2]}, 0x80, &(0x7f0000000200), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="300000000000000000000000070000008921eeb35cd8bd7fcc0c1b988e1c9d86c39351f17f9b04b22b00000000000000"], 0x30}, 0x0) [ 209.056273] RSP: 002b:00007fdcd2ef2c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 209.063979] RAX: ffffffffffffffda RBX: 00007fdcd2ef36d4 RCX: 0000000000455329 [ 209.071239] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 209.078495] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 209.085752] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 209.093007] R13: 00000000000003fb R14: 00000000006f9028 R15: 0000000000000018 2018/04/18 07:41:41 executing program 2: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x8, 0x1000000000000004, 0x4000009d}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000000200)=ANY=[@ANYBLOB="1800000000000000000000000000000071100000000000000000000000000000950005edad000000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000003c0)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r1, 0x50, &(0x7f00000000c0)}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000380)={r0, &(0x7f0000000280)="c0ed520e0be764a538ecba913edcaa3bc923af0168f6962683f5f912573c8bb19c023d780f3f8d8c1c53cf7f088de82e4337d0d18c62c0454f6aaef218857bda", &(0x7f00000002c0)="b5ca0ff74ecf83c6f7544d1537f90fb6bb6f3ebd5f73fd9d33c6e5504d7a5fe13f02df2e6c418d8fd089a568395ef51dea55741018e321b18de06eb2dd7f6cb0b06d9f8d13cfb9e6640fd4521c9823385f77c4e036f9731d6082f1d4b497872ee4841c222782c9e3a300a445a573204e1788a690683ca849647c29e6660593dabb312a886681a82673ebd57abe00221eb92456b297898972964d9b6ebcdad2f6303ea31f7f793860fc7b825ac7b91308ad0960a6115eba906a38c4", 0x2}, 0x20) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000240)) socketpair$inet6(0xa, 0x3, 0x8, &(0x7f00000001c0)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={r0, 0x28, &(0x7f0000000080)}, 0x10) socketpair$inet_icmp(0x59616d61, 0xffffffffffffffff, 0x1, &(0x7f0000000000)) socketpair$inet_icmp(0x59616d61, 0xffffffffffffffff, 0x1, &(0x7f0000000000)) 2018/04/18 07:41:41 executing program 3: r0 = socket$kcm(0x2, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000740)={&(0x7f0000000000)=@in={0x2, 0x4e23, @multicast2=0xe0000002, [0x0, 0x4000000000000]}, 0x80, &(0x7f0000000200), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="300000000000000000000000070000008921eeb35cd8bd7fcc0c1b988e1c9d86c39351f17f9b04b22b00000000000000"], 0x30}, 0x0) 2018/04/18 07:41:41 executing program 5: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x100}, 0x2c) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) close(0xffffffffffffffff) gettid() socket$kcm(0x29, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r0, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={r1, 0x28, &(0x7f0000000740)}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r2}, 0x10) 2018/04/18 07:41:41 executing program 1: r0 = perf_event_open(&(0x7f0000348f88)={0x0, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) close(r0) gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={r2, 0x28, &(0x7f0000000740)}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r3}, 0x10) 2018/04/18 07:41:41 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x9) close(0xffffffffffffffff) gettid() socket$kcm(0x29, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x0, 0xffffffffffff36f1, 0x0, 0x18}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x10) perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x0, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x0, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/18 07:41:41 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00', 0x0, 0x18}, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000f97ff8)) socketpair(0x8, 0x5, 0x0, &(0x7f00000001c0)) 2018/04/18 07:41:41 executing program 3: r0 = socket$kcm(0x2, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000740)={&(0x7f0000000000)=@in={0x2, 0x4e23, @multicast2=0xe0000002, [0x0, 0xffff000000000000]}, 0x80, &(0x7f0000000200), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="300000000000000000000000070000008921eeb35cd8bd7fcc0c1b988e1c9d86c39351f17f9b04b22b00000000000000"], 0x30}, 0x0) 2018/04/18 07:41:41 executing program 7 (fault-call:4 fault-nth:25): mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/18 07:41:41 executing program 2: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004, 0x4000009d}, 0x2c) socketpair(0xb, 0x4, 0xc4bc, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r1, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x59616d61, 0xffffffffffffffff, 0x1, &(0x7f0000000000)) socketpair$inet_icmp(0x59616d61, 0xffffffffffffffff, 0x1, &(0x7f0000000000)) 2018/04/18 07:41:41 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_udp(0xa, 0x2, 0xf101, &(0x7f0000000100)) [ 209.457637] FAULT_INJECTION: forcing a failure. [ 209.457637] name failslab, interval 1, probability 0, space 0, times 0 [ 209.469088] CPU: 1 PID: 18746 Comm: syz-executor7 Not tainted 4.16.0+ #3 [ 209.475940] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 209.485298] Call Trace: [ 209.487889] dump_stack+0x1b9/0x294 [ 209.491518] ? dump_stack_print_info.cold.2+0x52/0x52 [ 209.496703] ? perf_trace_lock_acquire+0xe3/0x980 [ 209.501541] ? __save_stack_trace+0x7e/0xd0 [ 209.505866] should_fail.cold.4+0xa/0x1a [ 209.509921] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 209.515018] ? save_stack+0x43/0xd0 [ 209.518634] ? kasan_kmalloc+0xc4/0xe0 [ 209.522506] ? kmem_cache_alloc_trace+0x152/0x780 [ 209.527341] ? __memcg_init_list_lru_node+0x17d/0x2c0 [ 209.532522] ? __list_lru_init+0x456/0x790 [ 209.536742] ? sget_userns+0x706/0xf20 [ 209.540618] ? graph_lock+0x170/0x170 [ 209.544407] ? do_mount+0x564/0x3070 [ 209.548108] ? ksys_mount+0x12d/0x140 [ 209.551893] ? SyS_mount+0x35/0x50 [ 209.555421] ? do_syscall_64+0x29e/0x9d0 [ 209.559476] ? find_held_lock+0x36/0x1c0 [ 209.563541] ? __lock_is_held+0xb5/0x140 [ 209.567604] ? check_same_owner+0x320/0x320 [ 209.571918] ? rcu_note_context_switch+0x710/0x710 [ 209.576843] __should_failslab+0x124/0x180 [ 209.581071] should_failslab+0x9/0x14 [ 209.584860] kmem_cache_alloc_trace+0x2cb/0x780 [ 209.589516] ? __kmalloc_node+0x33/0x70 [ 209.593477] ? __kmalloc_node+0x33/0x70 [ 209.597441] ? rcu_read_lock_sched_held+0x108/0x120 [ 209.602626] __memcg_init_list_lru_node+0x17d/0x2c0 [ 209.607636] ? kvfree_rcu+0x20/0x20 [ 209.611250] ? __kmalloc_node+0x47/0x70 [ 209.615228] __list_lru_init+0x456/0x790 [ 209.619283] ? list_lru_destroy+0x4c0/0x4c0 [ 209.623594] ? mark_held_locks+0xc9/0x160 [ 209.628221] ? __raw_spin_lock_init+0x1c/0x100 [ 209.632801] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 209.637812] ? lockdep_init_map+0x9/0x10 [ 209.641866] sget_userns+0x706/0xf20 [ 209.645565] ? set_anon_super+0x20/0x20 [ 209.649531] ? get_empty_filp.cold.7+0x3e/0x3e [ 209.654101] ? destroy_unused_super.part.9+0x100/0x100 [ 209.659370] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 209.664387] ? kasan_check_read+0x11/0x20 [ 209.668531] ? rcu_pm_notify+0xc0/0xc0 [ 209.672404] ? trace_hardirqs_off+0xd/0x10 [ 209.676634] ? cap_capable+0x1f9/0x260 [ 209.680516] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 209.686040] ? security_capable+0x99/0xc0 [ 209.690180] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 209.695707] ? ns_capable_common+0x13f/0x170 [ 209.700108] mount_ns+0x8f/0x1d0 [ 209.703463] ? rpc_pipe_release+0xb70/0xb70 [ 209.707782] rpc_mount+0x9e/0xd0 [ 209.711148] mount_fs+0xae/0x328 [ 209.714511] vfs_kern_mount.part.34+0xd4/0x4d0 [ 209.719087] ? may_umount+0xb0/0xb0 [ 209.722702] ? _raw_read_unlock+0x22/0x30 [ 209.726847] ? __get_fs_type+0x97/0xc0 [ 209.730727] do_mount+0x564/0x3070 [ 209.734265] ? copy_mount_string+0x40/0x40 [ 209.738489] ? rcu_pm_notify+0xc0/0xc0 [ 209.742373] ? copy_mount_options+0x5f/0x380 [ 209.746772] ? rcu_read_lock_sched_held+0x108/0x120 [ 209.751777] ? kmem_cache_alloc_trace+0x616/0x780 [ 209.756612] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 209.762137] ? _copy_from_user+0xdf/0x150 [ 209.766285] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 209.771812] ? copy_mount_options+0x285/0x380 [ 209.776303] ksys_mount+0x12d/0x140 [ 209.779926] SyS_mount+0x35/0x50 [ 209.783281] ? ksys_mount+0x140/0x140 [ 209.787074] do_syscall_64+0x29e/0x9d0 [ 209.790951] ? vmalloc_sync_all+0x30/0x30 [ 209.795090] ? _raw_spin_unlock_irq+0x27/0x70 [ 209.799577] ? finish_task_switch+0x1ca/0x810 [ 209.804064] ? syscall_return_slowpath+0x5c0/0x5c0 [ 209.808992] ? syscall_return_slowpath+0x30f/0x5c0 [ 209.813920] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 209.819283] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 209.824125] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 209.829302] RIP: 0033:0x455329 [ 209.832478] RSP: 002b:00007fdcd2ef2c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 209.840183] RAX: ffffffffffffffda RBX: 00007fdcd2ef36d4 RCX: 0000000000455329 [ 209.847438] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 209.854692] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 209.861948] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 209.869204] R13: 00000000000003fb R14: 00000000006f9028 R15: 0000000000000019 2018/04/18 07:41:42 executing program 5: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x100}, 0x2c) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) close(0xffffffffffffffff) gettid() socket$kcm(0x29, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r0, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={r1, 0x28, &(0x7f0000000740)}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r2}, 0x10) 2018/04/18 07:41:42 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x9) close(0xffffffffffffffff) gettid() socket$kcm(0x29, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x0, 0xffffffffffff36f1, 0x0, 0x18}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x10) perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x0, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x0, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/18 07:41:42 executing program 1: r0 = perf_event_open(&(0x7f0000348f88)={0x0, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x9) close(0xffffffffffffffff) gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={r2, 0x28, &(0x7f0000000740)}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r3}, 0x10) 2018/04/18 07:41:42 executing program 3: r0 = socket$kcm(0x2, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000740)={&(0x7f0000000000)=@in={0x2, 0x4e23, @multicast2=0xe0000002, [0x0, 0x100000000000000]}, 0x80, &(0x7f0000000200), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="300000000000000000000000070000008921eeb35cd8bd7fcc0c1b988e1c9d86c39351f17f9b04b22b00000000000000"], 0x30}, 0x0) 2018/04/18 07:41:42 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x3d00000000000000, &(0x7f0000000100)) 2018/04/18 07:41:42 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000f97ff8)) 2018/04/18 07:41:42 executing program 2: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004, 0x4000009d}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x401ffe, 0x8, &(0x7f00000001c0)=@raw=[@call={0x85, 0x0, 0x0, 0x20}, @alu={0x4, 0x8, 0x5, 0x2, 0xd, 0x40, 0x4}, @jmp={0x5, 0x5, 0xc, 0x0, 0x7, 0xffffffff, 0xfffffffffffffffd}, @call={0x85, 0x0, 0x0, 0x12}], &(0x7f0000000200)="4c0000006955481d67f2b62e730f874200ebcf", 0x0, 0x4, &(0x7f00001a7f05)=""/251, 0x0, 0xffffffffffffffff}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x59616d61, 0xffffffffffffffff, 0x1, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair(0x4, 0x7, 0x3, &(0x7f0000000180)) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000280)) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f00000036c0)={r1}) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000080)={r2}) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f00000016c0)={r1, r0}) socketpair$inet6(0xa, 0xf, 0x7, &(0x7f0000000000)) socketpair$inet_icmp(0x59616d61, 0xffffffffffffffff, 0x1, &(0x7f00000002c0)) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000240)={0x0, r0, 0x3, 0x2}, 0x14) getpid() 2018/04/18 07:41:42 executing program 7 (fault-call:4 fault-nth:26): mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) [ 210.048041] FAULT_INJECTION: forcing a failure. [ 210.048041] name failslab, interval 1, probability 0, space 0, times 0 [ 210.059356] CPU: 0 PID: 18772 Comm: syz-executor7 Not tainted 4.16.0+ #3 [ 210.066203] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 210.075563] Call Trace: [ 210.078164] dump_stack+0x1b9/0x294 [ 210.081809] ? dump_stack_print_info.cold.2+0x52/0x52 [ 210.087010] ? perf_trace_lock_acquire+0xe3/0x980 [ 210.091870] ? __save_stack_trace+0x7e/0xd0 [ 210.096219] should_fail.cold.4+0xa/0x1a [ 210.100305] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 210.105417] ? save_stack+0x43/0xd0 [ 210.109056] ? kasan_kmalloc+0xc4/0xe0 [ 210.112953] ? kmem_cache_alloc_trace+0x152/0x780 [ 210.117806] ? __memcg_init_list_lru_node+0x17d/0x2c0 [ 210.123005] ? __list_lru_init+0x456/0x790 [ 210.127249] ? sget_userns+0x706/0xf20 [ 210.131149] ? graph_lock+0x170/0x170 [ 210.134959] ? do_mount+0x564/0x3070 [ 210.138678] ? ksys_mount+0x12d/0x140 [ 210.142487] ? SyS_mount+0x35/0x50 [ 210.146035] ? do_syscall_64+0x29e/0x9d0 [ 210.150112] ? find_held_lock+0x36/0x1c0 [ 210.154193] ? __lock_is_held+0xb5/0x140 [ 210.158286] ? check_same_owner+0x320/0x320 [ 210.162626] ? rcu_note_context_switch+0x710/0x710 [ 210.167577] __should_failslab+0x124/0x180 [ 210.171826] should_failslab+0x9/0x14 [ 210.175630] kmem_cache_alloc_trace+0x2cb/0x780 [ 210.180308] ? __kmalloc_node+0x33/0x70 [ 210.184275] ? __kmalloc_node+0x33/0x70 [ 210.188246] ? rcu_read_lock_sched_held+0x108/0x120 [ 210.193259] __memcg_init_list_lru_node+0x17d/0x2c0 [ 210.198267] ? kvfree_rcu+0x20/0x20 [ 210.201883] ? __kmalloc_node+0x47/0x70 [ 210.205853] __list_lru_init+0x456/0x790 [ 210.209908] ? list_lru_destroy+0x4c0/0x4c0 [ 210.214221] ? mark_held_locks+0xc9/0x160 [ 210.218361] ? __raw_spin_lock_init+0x1c/0x100 [ 210.222934] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 210.227942] ? lockdep_init_map+0x9/0x10 [ 210.232001] sget_userns+0x706/0xf20 [ 210.235700] ? set_anon_super+0x20/0x20 [ 210.239664] ? get_empty_filp.cold.7+0x3e/0x3e [ 210.244236] ? destroy_unused_super.part.9+0x100/0x100 [ 210.249503] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 210.254510] ? kasan_check_read+0x11/0x20 [ 210.258648] ? rcu_pm_notify+0xc0/0xc0 [ 210.262520] ? trace_hardirqs_off+0xd/0x10 [ 210.266745] ? cap_capable+0x1f9/0x260 [ 210.270631] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 210.276156] ? security_capable+0x99/0xc0 [ 210.280302] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 210.285825] ? ns_capable_common+0x13f/0x170 [ 210.290228] mount_ns+0x8f/0x1d0 [ 210.293585] ? rpc_pipe_release+0xb70/0xb70 [ 210.297898] rpc_mount+0x9e/0xd0 [ 210.301256] mount_fs+0xae/0x328 [ 210.304619] vfs_kern_mount.part.34+0xd4/0x4d0 [ 210.309191] ? may_umount+0xb0/0xb0 [ 210.312806] ? _raw_read_unlock+0x22/0x30 [ 210.316942] ? __get_fs_type+0x97/0xc0 [ 210.320833] do_mount+0x564/0x3070 [ 210.324364] ? do_raw_spin_unlock+0x9e/0x2e0 [ 210.328768] ? copy_mount_string+0x40/0x40 [ 210.332998] ? rcu_pm_notify+0xc0/0xc0 [ 210.336880] ? copy_mount_options+0x5f/0x380 [ 210.341281] ? rcu_read_lock_sched_held+0x108/0x120 [ 210.346290] ? kmem_cache_alloc_trace+0x616/0x780 [ 210.351125] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 210.356656] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 210.362181] ? copy_mount_options+0x285/0x380 [ 210.366665] ksys_mount+0x12d/0x140 [ 210.370292] SyS_mount+0x35/0x50 [ 210.373652] ? ksys_mount+0x140/0x140 [ 210.377445] do_syscall_64+0x29e/0x9d0 [ 210.381318] ? vmalloc_sync_all+0x30/0x30 [ 210.385451] ? _raw_spin_unlock_irq+0x27/0x70 [ 210.389933] ? finish_task_switch+0x1ca/0x810 [ 210.394421] ? syscall_return_slowpath+0x5c0/0x5c0 [ 210.399339] ? syscall_return_slowpath+0x30f/0x5c0 [ 210.404262] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 210.409621] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 210.414458] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 210.419631] RIP: 0033:0x455329 [ 210.422805] RSP: 002b:00007fdcd2ef2c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 210.430504] RAX: ffffffffffffffda RBX: 00007fdcd2ef36d4 RCX: 0000000000455329 [ 210.437758] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 2018/04/18 07:41:42 executing program 5: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x100}, 0x2c) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) close(0xffffffffffffffff) gettid() socket$kcm(0x29, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r0, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={r1, 0x28, &(0x7f0000000740)}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r2}, 0x10) 2018/04/18 07:41:42 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000f97ff8)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) socketpair(0x8, 0x5, 0x0, &(0x7f00000001c0)) 2018/04/18 07:41:42 executing program 3: r0 = socket$kcm(0x2, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000740)={&(0x7f0000000000)=@in={0x2, 0x4e23, @multicast2=0xe0000002, [0x0, 0x200000000000000]}, 0x80, &(0x7f0000000200), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="300000000000000000000000070000008921eeb35cd8bd7fcc0c1b988e1c9d86c39351f17f9b04b22b00000000000000"], 0x30}, 0x0) 2018/04/18 07:41:42 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_udp(0xa, 0x2, 0xbd010000, &(0x7f0000000100)) [ 210.445016] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 210.452279] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 210.459543] R13: 00000000000003fb R14: 00000000006f9028 R15: 000000000000001a 2018/04/18 07:41:42 executing program 1: r0 = perf_event_open(&(0x7f0000348f88)={0x0, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x9) close(0xffffffffffffffff) gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={r2, 0x28, &(0x7f0000000740)}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r3}, 0x10) 2018/04/18 07:41:42 executing program 6: socketpair(0x4, 0x0, 0x1f, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000000)={0x2000000002, 0x70, 0x3e5, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xe5, 0x7, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, r1, 0x0) recvmsg(r0, &(0x7f00000002c0)={&(0x7f00000000c0)=@l2, 0x80, &(0x7f0000000240)=[{&(0x7f0000000140)=""/98, 0x62}, {&(0x7f0000000200)=""/5, 0x5}], 0x2, &(0x7f0000000280)=""/42, 0x2a, 0x6}, 0x2042) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000f97ff8)) socketpair(0x8, 0x5, 0x0, &(0x7f00000001c0)) 2018/04/18 07:41:43 executing program 3: r0 = socket$kcm(0x2, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000740)={&(0x7f0000000000)=@in={0x2, 0x4e23, @multicast2=0xe0000002, [0x0, 0x0, 0x1000000]}, 0x80, &(0x7f0000000200), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="300000000000000000000000070000008921eeb35cd8bd7fcc0c1b988e1c9d86c39351f17f9b04b22b00000000000000"], 0x30}, 0x0) 2018/04/18 07:41:43 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x9) close(0xffffffffffffffff) gettid() socket$kcm(0x29, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x0, 0xffffffffffff36f1, 0x0, 0x18}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x10) perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x0, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x0, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/18 07:41:43 executing program 7 (fault-call:4 fault-nth:27): mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) [ 210.717376] FAULT_INJECTION: forcing a failure. [ 210.717376] name failslab, interval 1, probability 0, space 0, times 0 [ 210.728722] CPU: 0 PID: 18812 Comm: syz-executor7 Not tainted 4.16.0+ #3 [ 210.735570] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 210.744928] Call Trace: [ 210.747526] dump_stack+0x1b9/0x294 [ 210.751170] ? dump_stack_print_info.cold.2+0x52/0x52 [ 210.756365] ? perf_trace_lock_acquire+0xe3/0x980 [ 210.761203] ? __save_stack_trace+0x7e/0xd0 [ 210.765523] should_fail.cold.4+0xa/0x1a [ 210.769576] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 210.774666] ? save_stack+0x43/0xd0 [ 210.778282] ? kasan_kmalloc+0xc4/0xe0 [ 210.782159] ? kmem_cache_alloc_trace+0x152/0x780 [ 210.786996] ? __memcg_init_list_lru_node+0x17d/0x2c0 [ 210.792177] ? __list_lru_init+0x456/0x790 [ 210.796862] ? sget_userns+0x706/0xf20 [ 210.800743] ? graph_lock+0x170/0x170 [ 210.804542] ? do_mount+0x564/0x3070 [ 210.808244] ? ksys_mount+0x12d/0x140 [ 210.812037] ? SyS_mount+0x35/0x50 [ 210.815571] ? do_syscall_64+0x29e/0x9d0 [ 210.819626] ? find_held_lock+0x36/0x1c0 [ 210.823684] ? __lock_is_held+0xb5/0x140 [ 210.827760] ? check_same_owner+0x320/0x320 [ 210.832074] ? rcu_note_context_switch+0x710/0x710 [ 210.837004] __should_failslab+0x124/0x180 [ 210.841234] should_failslab+0x9/0x14 [ 210.845024] kmem_cache_alloc_trace+0x2cb/0x780 [ 210.849681] ? __kmalloc_node+0x33/0x70 [ 210.853644] ? __kmalloc_node+0x33/0x70 [ 210.857607] ? rcu_read_lock_sched_held+0x108/0x120 [ 210.862619] __memcg_init_list_lru_node+0x17d/0x2c0 [ 210.867630] ? kvfree_rcu+0x20/0x20 [ 210.871246] ? __kmalloc_node+0x47/0x70 [ 210.875219] __list_lru_init+0x456/0x790 [ 210.879279] ? list_lru_destroy+0x4c0/0x4c0 [ 210.883590] ? mark_held_locks+0xc9/0x160 [ 210.887731] ? __raw_spin_lock_init+0x1c/0x100 [ 210.892301] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 210.897312] ? lockdep_init_map+0x9/0x10 [ 210.901364] sget_userns+0x706/0xf20 [ 210.905063] ? set_anon_super+0x20/0x20 [ 210.909030] ? get_empty_filp.cold.7+0x3e/0x3e [ 210.913601] ? destroy_unused_super.part.9+0x100/0x100 [ 210.918886] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 210.923892] ? kasan_check_read+0x11/0x20 [ 210.928029] ? rcu_pm_notify+0xc0/0xc0 [ 210.931908] ? trace_hardirqs_off+0xd/0x10 [ 210.936136] ? cap_capable+0x1f9/0x260 [ 210.940018] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 210.945542] ? security_capable+0x99/0xc0 [ 210.949681] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 210.955204] ? ns_capable_common+0x13f/0x170 [ 210.959605] mount_ns+0x8f/0x1d0 [ 210.962962] ? rpc_pipe_release+0xb70/0xb70 [ 210.967283] rpc_mount+0x9e/0xd0 [ 210.970640] mount_fs+0xae/0x328 [ 210.974006] vfs_kern_mount.part.34+0xd4/0x4d0 [ 210.978578] ? may_umount+0xb0/0xb0 [ 210.982192] ? _raw_read_unlock+0x22/0x30 [ 210.986327] ? __get_fs_type+0x97/0xc0 [ 210.990208] do_mount+0x564/0x3070 [ 210.993740] ? copy_mount_string+0x40/0x40 [ 210.997976] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 211.002729] ? retint_kernel+0x10/0x10 [ 211.006613] ? copy_mount_options+0x1f0/0x380 [ 211.011095] ? __sanitizer_cov_trace_pc+0x48/0x50 [ 211.015927] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 211.021453] ? copy_mount_options+0x285/0x380 [ 211.025939] ksys_mount+0x12d/0x140 [ 211.029556] SyS_mount+0x35/0x50 [ 211.032908] ? ksys_mount+0x140/0x140 [ 211.036701] do_syscall_64+0x29e/0x9d0 [ 211.040574] ? vmalloc_sync_all+0x30/0x30 [ 211.044707] ? _raw_spin_unlock_irq+0x27/0x70 [ 211.049191] ? finish_task_switch+0x1ca/0x810 [ 211.053676] ? syscall_return_slowpath+0x5c0/0x5c0 [ 211.058592] ? syscall_return_slowpath+0x30f/0x5c0 [ 211.063514] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 211.068872] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 211.073706] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 211.078880] RIP: 0033:0x455329 [ 211.082054] RSP: 002b:00007fdcd2ef2c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 211.089752] RAX: ffffffffffffffda RBX: 00007fdcd2ef36d4 RCX: 0000000000455329 [ 211.097016] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 211.104296] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 211.111554] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 211.118811] R13: 00000000000003fb R14: 00000000006f9028 R15: 000000000000001b 2018/04/18 07:41:43 executing program 5: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x100}, 0x2c) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) close(0xffffffffffffffff) gettid() socket$kcm(0x29, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r0, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={r1, 0x28, &(0x7f0000000740)}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r2}, 0x10) 2018/04/18 07:41:43 executing program 2: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004, 0x4000009d}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f0000000180)}, 0x10) socketpair$inet_icmp(0x59616d61, 0xffffffffffffffff, 0x1, &(0x7f0000000000)) socketpair$inet_icmp(0x59616d61, 0xffffffffffffffff, 0x1, &(0x7f0000000000)) 2018/04/18 07:41:43 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000080)) socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f00000000c0)) socketpair(0x8, 0x5, 0x0, &(0x7f00000001c0)) 2018/04/18 07:41:43 executing program 3: r0 = socket$kcm(0x2, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000740)={&(0x7f0000000000)=@in={0x2, 0x4e23, @multicast2=0xe0000002, [0x0, 0x0, 0x2000000]}, 0x80, &(0x7f0000000200), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="300000000000000000000000070000008921eeb35cd8bd7fcc0c1b988e1c9d86c39351f17f9b04b22b00000000000000"], 0x30}, 0x0) 2018/04/18 07:41:43 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x68000000, &(0x7f0000000100)) 2018/04/18 07:41:43 executing program 1: r0 = perf_event_open(&(0x7f0000348f88)={0x0, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x9) close(0xffffffffffffffff) gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={r2, 0x28, &(0x7f0000000740)}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r3}, 0x10) 2018/04/18 07:41:43 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x9) close(0xffffffffffffffff) gettid() socket$kcm(0x29, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x0, 0xffffffffffff36f1, 0x0, 0x18}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x10) perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x0, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x0, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/18 07:41:43 executing program 7 (fault-call:4 fault-nth:28): mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) [ 211.255371] FAULT_INJECTION: forcing a failure. [ 211.255371] name failslab, interval 1, probability 0, space 0, times 0 [ 211.266779] CPU: 0 PID: 18826 Comm: syz-executor7 Not tainted 4.16.0+ #3 [ 211.273627] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 211.282988] Call Trace: [ 211.285593] dump_stack+0x1b9/0x294 [ 211.289236] ? dump_stack_print_info.cold.2+0x52/0x52 [ 211.294448] ? perf_trace_lock_acquire+0xe3/0x980 [ 211.299306] ? __save_stack_trace+0x7e/0xd0 [ 211.303653] should_fail.cold.4+0xa/0x1a [ 211.307739] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 211.312854] ? save_stack+0x43/0xd0 [ 211.316489] ? kasan_kmalloc+0xc4/0xe0 [ 211.320386] ? kmem_cache_alloc_trace+0x152/0x780 [ 211.325240] ? __memcg_init_list_lru_node+0x17d/0x2c0 [ 211.330426] ? __list_lru_init+0x456/0x790 [ 211.334647] ? sget_userns+0x706/0xf20 [ 211.338523] ? graph_lock+0x170/0x170 [ 211.342308] ? do_mount+0x564/0x3070 [ 211.346005] ? ksys_mount+0x12d/0x140 [ 211.349792] ? SyS_mount+0x35/0x50 [ 211.353320] ? do_syscall_64+0x29e/0x9d0 [ 211.357461] ? find_held_lock+0x36/0x1c0 [ 211.361523] ? __lock_is_held+0xb5/0x140 [ 211.365585] ? check_same_owner+0x320/0x320 [ 211.369896] ? rcu_note_context_switch+0x710/0x710 [ 211.374821] __should_failslab+0x124/0x180 [ 211.379045] should_failslab+0x9/0x14 [ 211.382834] kmem_cache_alloc_trace+0x2cb/0x780 [ 211.387488] ? __kmalloc_node+0x33/0x70 [ 211.391446] ? __kmalloc_node+0x33/0x70 [ 211.395410] ? rcu_read_lock_sched_held+0x108/0x120 [ 211.400423] __memcg_init_list_lru_node+0x17d/0x2c0 [ 211.405437] ? kvfree_rcu+0x20/0x20 [ 211.409053] ? __kmalloc_node+0x47/0x70 [ 211.413023] __list_lru_init+0x456/0x790 [ 211.417077] ? list_lru_destroy+0x4c0/0x4c0 [ 211.421386] ? mark_held_locks+0xc9/0x160 [ 211.425525] ? __raw_spin_lock_init+0x1c/0x100 [ 211.430102] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 211.435111] ? lockdep_init_map+0x9/0x10 [ 211.439167] sget_userns+0x706/0xf20 [ 211.442868] ? set_anon_super+0x20/0x20 [ 211.446832] ? get_empty_filp.cold.7+0x3e/0x3e [ 211.451401] ? destroy_unused_super.part.9+0x100/0x100 [ 211.456668] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 211.461677] ? kasan_check_read+0x11/0x20 [ 211.465814] ? rcu_pm_notify+0xc0/0xc0 [ 211.469693] ? trace_hardirqs_off+0xd/0x10 [ 211.473921] ? cap_capable+0x1f9/0x260 [ 211.477810] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 211.483336] ? security_capable+0x99/0xc0 [ 211.487474] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 211.493003] ? ns_capable_common+0x13f/0x170 [ 211.497401] mount_ns+0x8f/0x1d0 [ 211.500756] ? rpc_pipe_release+0xb70/0xb70 [ 211.505070] rpc_mount+0x9e/0xd0 [ 211.508425] mount_fs+0xae/0x328 [ 211.511787] vfs_kern_mount.part.34+0xd4/0x4d0 [ 211.516361] ? may_umount+0xb0/0xb0 [ 211.519977] ? _raw_read_unlock+0x22/0x30 [ 211.524117] ? __get_fs_type+0x97/0xc0 [ 211.528001] do_mount+0x564/0x3070 [ 211.531537] ? copy_mount_string+0x40/0x40 [ 211.535759] ? rcu_pm_notify+0xc0/0xc0 [ 211.539639] ? copy_mount_options+0x5f/0x380 [ 211.544040] ? rcu_read_lock_sched_held+0x108/0x120 [ 211.549044] ? kmem_cache_alloc_trace+0x616/0x780 [ 211.553884] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 211.559412] ? _copy_from_user+0xdf/0x150 [ 211.563551] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 211.569074] ? copy_mount_options+0x285/0x380 [ 211.573560] ksys_mount+0x12d/0x140 [ 211.577178] SyS_mount+0x35/0x50 [ 211.580532] ? ksys_mount+0x140/0x140 [ 211.584321] do_syscall_64+0x29e/0x9d0 [ 211.588197] ? vmalloc_sync_all+0x30/0x30 [ 211.592340] ? finish_task_switch+0x1ca/0x810 [ 211.596830] ? syscall_return_slowpath+0x5c0/0x5c0 [ 211.601748] ? syscall_return_slowpath+0x30f/0x5c0 [ 211.606668] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 211.612025] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 211.616863] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 211.622044] RIP: 0033:0x455329 [ 211.625218] RSP: 002b:00007fdcd2ef2c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 211.632928] RAX: ffffffffffffffda RBX: 00007fdcd2ef36d4 RCX: 0000000000455329 [ 211.640188] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 211.647445] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 2018/04/18 07:41:43 executing program 6: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000f97ff8)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x5) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xd, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000100000140000007f008dec0267feff0000000000eec97a97000000180000003ba3f95867d234de7fffffff18000000ff0f0000000000000200000051a323a3000000000000000000000000679f0c0000000000000000000000000095000000000000006e6a7d36e86d620b2fcd70cd470d1e11f07d73490200320523bf104f82e7000000000000"], &(0x7f0000000140)='syzkaller\x00', 0x400, 0xfffffe5e, &(0x7f0000000180)=""/53, 0x41000}, 0x48) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) socketpair(0x8, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000080)) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000280)) 2018/04/18 07:41:43 executing program 3: r0 = socket$kcm(0x2, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000740)={&(0x7f0000000000)=@in={0x2, 0x4e23, @multicast2=0xe0000002, [0x0, 0x0, 0xffff0000]}, 0x80, &(0x7f0000000200), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="300000000000000000000000070000008921eeb35cd8bd7fcc0c1b988e1c9d86c39351f17f9b04b22b00000000000000"], 0x30}, 0x0) [ 211.654703] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 211.661958] R13: 00000000000003fb R14: 00000000006f9028 R15: 000000000000001c 2018/04/18 07:41:44 executing program 2: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000180)="b82583392dc50ff1fb635a580ae2f5916ae2fdc24e95e32aa8daccf7393e72be9cc66f94c6af022b2df5a2e803c1d8fb196f00372d639ea547b14d3dc29be4d8c5a108a646720008d8fb0bf66f23026444b8441a3250bf"}, 0xfffffffffffffe10) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file1\x00', 0x0, 0x18}, 0x10) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000004c0)={r0, &(0x7f0000000440)="d5965ccb4617274db683012f9418e0bfea931699fd48d11766d4e70aa1b5e4131cef9a359d43e374b8bb1f60493385928742eb926cb67450f623c78211a05b41709a1a15456cd8e259a8020f428fe65e176f1785816173a75f9149596d5764a6b76e365344a6c1464942380376b897afa5981549c7bb72"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004, 0x4000009a}, 0x2c) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000002880)=0xe00000, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=ANY=[@ANYBLOB="00000000000000000000000018000000000000000000000095000000000000de"], &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r1, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x59616d61, 0xffffffffffffffff, 0x1, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet_icmp(0x59616d61, 0xffffffffffffffff, 0x1, &(0x7f0000000000)) r3 = gettid() r4 = perf_event_open(&(0x7f00000002c0)={0x7, 0x70, 0x3fb, 0x401, 0x101, 0x4, 0x0, 0x7, 0x20000, 0x8, 0x2, 0x240000000000, 0x8, 0x6, 0x800, 0x9, 0x7fffffff, 0x2, 0x4c17, 0x9, 0x8be5, 0x1, 0x9093, 0x40, 0x2, 0x8, 0x3, 0x1, 0xfffffffffffffffb, 0x1f, 0x6, 0x7, 0x7, 0xff, 0x1, 0x1, 0x0, 0xfff, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000280), 0x8}, 0x8000, 0x7f, 0x1, 0x7, 0x180000000000, 0x7}, 0x0, 0x3, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x100000001, 0x3, 0x7ff, 0x495, 0x0, 0xc573, 0x10008, 0x0, 0x1, 0x3, 0x9, 0x4, 0xca, 0xfffffffffffffffa, 0x8000, 0x6d7, 0x6, 0x20, 0x9, 0x1, 0xfff, 0x8, 0x1000, 0x3, 0x5, 0x8, 0x2, 0x8, 0x7, 0x6, 0x87e, 0xfffffffffffffffe, 0xffffffff, 0x3f, 0x1, 0x7, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000040)}, 0x1000, 0xffffffff, 0xffffffffffff1e62, 0x7, 0xbc3, 0xba4c28, 0x426e5b08}, r3, 0xa, r4, 0xb) sendmsg(r2, &(0x7f0000002840)={0x0, 0x0, &(0x7f0000002600)=[{&(0x7f0000000500)="91bafc32bfa7c9afbe72ca37174ca2170b80f8eddeaaec4a84ea3f371b4c95daae8332325f3c682d90a8ecc54b41afe86ba5d6a61eb2490c823eeebd1b12f6f8dda1b705ba92c61f87289d8883bfb1a4a40912ea0157295ba6fa07fd6176406ce0096330ed0f12cb3af11a0e91cfb49c474a23c3bc001ba5e1af28c7d057454ce467d8fb24c089b26cc4c65b4985b3d195cc432dfa297df3c1a25d9fc9dbafdc1675e8c540d53bcd6f20f69ed0f700bcb1ba75e213b6556a9db199ef3d0c1db8a4f6f820c3767180da86b48cdd831132ad47ecdb3fd06b1e3b62c94418890893d45982cc", 0xe4}, {&(0x7f0000000600)="99546be516be42f83753ded4a52603833471157fa0dbbcf5be4904ddedb2c9d02ee72923ea6fb65ee4a6e142fe4ae2df979de700e3cf9a75560aad95e88b89817b4b4455ca9ea36af317c83a78230a7a5f5a1c97e9d8eaffa37faf955df557ab667957a328f4bff4720869239e0a097ab2f2f7906fc0330b9098d1b17a005a380ae81d7c3eaf69b8b414327ec0ffe98efe8dca6e36353e3639fdbdb0ff8b047868f95a82f1de9a8e2f3855d61cf70f22346133fb1da45d49507e704403a60f1f5e4d17b1721fb33e9c3e7d8e4a7e210c1c53f5bdd6799fff8c199c71a509f8adb39d3cb5186dd747aed39db813e7bbf814b5644e3e70ac3dcc45b840ce2fc6d13c22938c59ec0b9a9aa8ef16c91ce78dab052c4d3fbec1513bc73a3dec143d880596e5bdde3124166316adaa945ce81c14d5a86f6d2da8bad59c3e91e8975f2ca6530f6a7179b289d4ba976f28787dc4a02bb79b3212c0221d0ec6dc8d7ef8ace60e7d7c28eb960975e7c6b6fe1b5a3a03cf19dee47bc390d803c266565eb1d2297164c1c7860cd5229c18ca9f59ab47838ed35db359fcff92639764b01f3b52bb8f36b7348177ed1fa5a393561e3d4e85eb38493f0df191860cda0cdbd68ad641bc8ad183a0640eeef487822f04fe387b04471eafd496f3aa7d48e1bf388e34d857440fcb6849539bd363c03462091352954d647ce8c51d94933a75b337a844ab80792baa87f65f0f6211fb6dc95944c5fec4f12b22c8bb77b11ed7db0af2235a1b2523ec0fb6c20eec82b01fffca93f3a2487eac1c3e42ce070da5cb58d25a9dee5b5cfc4ab0b9ec82e42a6c2767cb4ae2b6d9ae8903ba1da913193c9fde16190b10ce59750af875fce36b0390012d1efc8e1d58e5e0555279c4b369c7eb89222df3044e9bdaa736ba46c1b1383d49701171489161fb63e0d032015629da2692c7e49efc57c3ef165b9e1087bb9a9badd8261f901e811b6ccf3a0089adc9a3c7dc8f603dff016499f0307817e4513dc8394cf991b7acf4a6bfa50283893d0821988185ce198c4b08dcfb08e0a8c68cc2a3c67a450a9f83515883624c38db720dad183e431776f455e969566dc359dda5df7b97cf07d146dd7fa714a17ce8b791ddb03611df6165faf5406856fd170e7650d8fc9d8c0e42dcab5d27b918ad7e312f5860ec8463ec156bc0208d8651e60f013c9acca8877dffa5c2b25a33f9a4edde6e0fc6ba249e630cbfdd36232d8a1c4658508d1bc646bfb03acf80411906c403b96c4f7dfb436cff24580f51e3005fcb9d6032f655af43754b2e581064e39c7f7be3c243ebd01e773f5a7ad3ee7a52496217b0bc79e1fedc372b8e806781aa2a544e0b2627f7023385391ce4e8cc73e0bb73dc008fd9685c5686d6c8b77bae2dfb147f9e8cce90bf89455b2fd1c097f4f634dfca181eaea040ac281cfa821cf95afafcbdf8be28f5ecd9808986605e45f6584c34a8fd0130f6452df79a9b992fb0ff373315bf3a6502d619a0b563bcd9fb5f0ba7d30be242d6ffa0e531ef65bb60a464e7e0aa163f6b928ac32cff147e93d549b2a1f87f4fe1745836cbfd66882ce721c30896e010a1307cb377bfa2b2cf9a318e759b4f81e49ae7284688a6426a445f43ded43242605acf4bd40ca90c8266888ebfca4b79a5f0b1e2ac81eebb2799aae2b04232289fb856c0dcafc652592a6dc5fe097932917cfa59ea08856317bc8cbab5efdee2473bbb90ad857d3848ad34eb7c7a71c7e7ee00076d0afa66e50a0fb6a7c694ae1e07bf1412278c20768c767b016c9fc2c0e06f355563887c92f28ba3ba2e7a4db1c867c2b7a75a4218ea187ed8658d63f676864a2d4e3deda634574d9842ed31a80d2a7e3463d5e62941b6e328bc7fe067856056a8d7fc3d5fc97997f2dbe8dd4bb6a86772f3922c36a5ae036a310399a2b7ca653539ad2dbdd7ecc0a6f7e1e9a64f37b21371dce21ffceef309e616872542ad646b099c53e9e07993f4709090e93b97fe37bdd87e3e08d16e86ba8090691a727cca053c026c6feaec7ad4360c9a337702c9bb822b55f4423260afe8f5dbfaec5064ca8d34611fe491636215380fc79f27e3064fdeb3a5d85300759f18b1c77cd596718936a4982a2f2fe8799520f740e407cdd597c617006565eb3be0dd761824f8aea7070438cf614b20e4de1d3ab35dafa8adea9442af0584b80bb2783f48cf4361d2ae9124114075db98139c125a6f17a12ff8608234e727009f44b77fd6e2fae390d0faa8e043b2b97b0925c2b4311740ccf2713e9491b6a17b298a73d2a3e98eeced263263a7c29327ef72234151c5937fa485090b95bda827d82ed446d14eada18de2573004b2434b185d3ee262c827e298b3f4884c9fd7b266908a20c9ee9d793823a3efb1189cfaeb22f4dd9e7cde84d0d7b5218ce4fa241880f26942ff3044af1277b74bc841c0892557ad630f077c5dcf93ae592cb3e3fad3f7f0e6af8948ba2313e8b62833b70072811250e1407e0c9d2d26eafa7b611f86d1d9ec65f688fd3070fab1a79713db993436f5d3be00003171fece6bc552755a17939d66350bc5a721fd64f4639b52ed34d0f655c1991a5cc50f8ebae6a37f029c1ac879110714027038dcadbbafbd4c7794e8098604075c7124e1af517c3be995f80a949fbc5ee5fde24ec030ee2cf2f1368a4b43d005d83fb13c0c50f61e66f96e6fa0038025d8dd57a4d7aadad0e659537b342393cace993b58c03224b39ebe958b39c46542612c8c7b2887b5fd1d38f192bd81c9afded2a65ae21b359ca3ed5912d7290b41a7c375c884c6e3cb67b7a57cb3dc1364ac016ac131dfc8e5cbd2bb196dab5b663d4826a2c9bd43cd356bf527a4880887c2f4816f70a8c4211ae5fddc561e42ea7b871aa1bf3187fc52fdd3a3a7e822def273a25a618f8cefd585849bbf61f362201502613080fe613dfa3e77a4b513bf6a7f74fed9947b4d1a69096768def83eb287f53f76347cc376428122964fa9cd2b03d59ec7e99c8c33649b8c97b18e083f2cd27001943099769df2a7b3428a50a194026707cbe3666c3bc17aec1df26129ea802617a5639230c0688510cffbe1a80dc47ea576ef9250bd3b4d5fc5f38e73afdcee113b3b4a7553efaccb05b7d781f6bd421ca3b13f71efdbda20aa6fefe2417969ed0a0ba8c0e43f1fa657ce914bb3593370ab9f12a0ae89f4295569f5bbdc051d047df82623ae3583404f440e5bc695c5797c24d3585534e4c41dc02c2ab1a59a0b6a94e615f7837abbdaee19a09c14fe9be44907efbb40d3d3ec973456aabe6b9b2219b14683e893a33cbec3f5ce6f2f14147bd2582de1ee01ed6f37d253359d329194eece2dbaeba7e6eb956cd871f0bad8540394502fe6191e4dda3e25b57d35dbc435c06a5a6f4b97b2c0793dfa3e3554098bb00a3b59ddbe0731719ff9f7caa21ed09b3d31163b85374e2739783b0dba24652f4b89e29717e3fe52e1e9723a55343b09e4a545d364cc50ff97908c3f8d7724df6e5e844b88649cd463447d730bd0a331a77a261ef1af472e937d85b9e32871a22e53df22277ca66ea25831dd4a7c856cf32abe17bd1f388ef635c54f293097e4b83a6f48a592a63be741bd4d2f7a410c4ae8f2658dcc9ffed10b88b6410737d46e0a5ba4c71c95dd156498c57fb0b0bf9438f3afe6504436c16bef4b6407e584029c553ffea2fc0c1c7039ec58e1b03d4e5585760a74322b54c2a546f6b2afd3cc0a1109ead1661d867a312142d4a60068f3d7ce3bfd3f4de180170dc2ca99ba450619d03ef9d2d67c9f2abe34b54686ef81df0ff07e71b0e69dd38b46ef383aa4a49af534c4ead51d79ef6f8a7e9ba8b06e1f3240e50f02277fb15bd6e267a0a4703df7626c0c7cd20892207027edc2d11511c6d6d90631d7ca4b4956723ddef22266441053d932afba952b1d7659320bb464ae1e0925b33221fda8cddccc42a84089830b4b93e76be546018a73a6ead4650674ff7c139cf92a5e61fe6eeb31e725089cd47daee1773af992c2eac71c138eb0b2725867493648d5446492505e4888624918dc0b203bde706c438b2b93b986dca5830cfdc2a1e2eab6102c3a06723219a237369fe4d0efcd10daddc8a75646c6ebf7047102328515166a49c361403bc7c3666f54ea0b4c1c392673111da3d8a9558f02efa046abb43e3a060e7467dd83cc7f2851c4e684d0642034be66f58f4c81e0c930c3470d34c8c38d12ecd797873e7f1a2434b8a4b58d1f0ba3d2fa13bcd4aa22e64a76103de629fcd7f7fd2bf3d0ce074ba52bcf95ee67270d7a10095eec7b5f7a13abeac8504f83a5a5bbee4b7c921d5b079da45b53dc08e6b0e8ed14ee505b4a2b78f724d478af52144958b18fd99c5177e0779d6932a29f93ab0e43f94c1cac425ffdf4dcbb338cf670f3b0d82f18c70aa1672620c0e9fe438806a01f68516a0255012d999dda70e4ce28ce82382947e5045f2f1930513884ee6498a76fd63471f059a50e1712b136b1b2eb8d088de18767ca4a94c61b08589a34ebad13aaa61556fb9781400bf813b9f818a7f88b0e0c117f970c20ea435dc9ec548d41b153a5868ccac617d0088a700698365247e7b73d792e769c6a8e7bdfae66c23bbf6705b5cfb17758b9c6e8d814e4fbce7cf862e9a1cf729c7082c779dc3ae44e40b83243ff5adbdd9f62b11faaff92b06635988d9a5952ceeb2b5613da208c62a11f82864e00323543a88a2125e5775b5cd71c330b1795fb657124295a1f8768e0ce29412cc0f4db708091b51152534c264e5bfdf4281152156598aad4a2cfe154ccfa2b9f0ff4fd8c2ca684128aab6afb38d5e79c02b80d43c54449d49dceff4bc6410f62c02e881c8220a9f6006c241db8abace9ec68f8df2ec5c562645de670d618d03c0eae27167951e1fc7d048a1ecbe1f3c768db0c6c9fb199969e9cb3f64eafeefc36a8385af0b68fe38f8bc3e1952494549ca4a4df775fd137f28f3ac34a193c538f99bf60ccceb6a772cd328fa97352d108d7eb69d669c1816973fdbe1d3e0d9de00978abe5e9a5fca9b90ca0059eb614637b0f9b0657406b2bdf5ce1297da5c1621de0e1d703ed9a189fa686d6d7273cdb1f3ed816a39eddfa8f9941a64e2d71f24191d35d6f4f1d2bed8eb486f9f8d71a271be8ea909b14feceb3c739f945c5457894f8ba2186f65134ec3c5b699f86f2ebfce33d14949900da07b526b0cd0c717a685f570e9dfa63776b51c3a6b8accbf2d027af2e2eecf04c89d16017a9a0c5a79b85d59eb9753b9376ae7a777ff75dcf98255a0258811be655f42121e3216005b57c506dd96819d6c6fbdc520e1e1666fa71dfdf1a288bfe62f752857d3a63b4b655162911bcc5fa1d1b4bb1e486e855b4c8b96603a2558578d8a5006fea5249e3e37d9061d92862ff0bca2fbea5aa00f4bc08aed6f98aeb6a5f458c2a80da7b4b1826765ed9a17d27449867f6d437ff876e5cb7b2545c545e0e8c8ba7d9b433d904c0eeb782d8c90c92a490effce38eb2149ad74b89017a2d46e6caf853b2f7c77e990a3a9aa6ae35e85fc6949f181463c04ecdfca682b3d50cbfe2b89fb9272fa56d5e3a79105b37dfd25abbe5a26ce0da838169bc82cc57397a04d278a0a76251b9654081403d72d72c5d0cd1b218bc011d80725b441ce842a8a5178feb5a5bc4ccde15e22d86e28dca09bde5da6d497ac19a42773618228c3cebb5cf4d9e827d9188d61b94b01c1ba3fe6f69a25c94e41bdb8c7519ab6af3331beef3340f6c2e1a9a6281a6dfa4", 0x1000}, {&(0x7f0000001600)="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", 0x1000}], 0x3, &(0x7f0000002640)=[{0x40, 0x11, 0x9, "3677587142faba3a96d149b987e1b57ab74a1d84655d8d8bda440bd2840139eb9393071a897d1d2b14b734115e"}, {0x28, 0x100, 0x7fffffff, "9ac769368cddfd945a5d674cf62df9582957ed3ee7c46f"}, {0xc8, 0x105, 0x1ff, "a114be283b856e99f6541e8bad996c0298d20da35c89457f9900a57c5850161eac90add62ede0308e9d16f648f1d4bdbce507eedb288101ec9f9f2650e5c89f6cac89d53101373c3520b0ea4455f8669492dff879ce03029f57e6181f90805cbdf70bb284d982c7739d0ae49bba17334a43effc3f02da9c643dbaa27f0bfd5af1af56fa595353077c6e969dfc4f584dd9b2b282a454f674c80f00202258c4184c98b5d1b255ffc562838f527f1084a3a4c98"}, {0xa8, 0x117, 0x401, "ff89fc9f5351bfe07d50e540944ad5e111372acda3ba268f4c1f55bcb9e45cfaeb8fed6954d45a29d95f4086937351f36a6d22f1a700333f27a98f0e402207e9d4cc414acd0ad7e63f04b53c2aae3ec95343f705e94062857eb8bbef33b4b2eb1703cfd7ca32b4c81267c10a936aaa67526048ca96498fb220383bd997a6a159e84fbb6841322e5c6433f067954d0be1167d69db2fed73e6"}], 0x1d8, 0x8010}, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000380)={&(0x7f0000000340)='./file0\x00', r1}, 0x10) 2018/04/18 07:41:44 executing program 5: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9c"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x0, 0x100}, 0x2c) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) close(0xffffffffffffffff) gettid() socket$kcm(0x29, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r0, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={r1, 0x28, &(0x7f0000000740)}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r2}, 0x10) 2018/04/18 07:41:44 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x9) close(0xffffffffffffffff) gettid() socket$kcm(0x29, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x0, 0xffffffffffff36f1, 0x0, 0x18}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x10) perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x0, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x0, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/18 07:41:44 executing program 1: r0 = perf_event_open(&(0x7f0000348f88)={0x0, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x9) close(r0) gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x0, 0x1ff, 0x7fff, 0x100000043}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={r2, 0x28, &(0x7f0000000740)}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r3}, 0x10) 2018/04/18 07:41:44 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_udp(0xa, 0x2, 0xc001, &(0x7f0000000100)) 2018/04/18 07:41:44 executing program 7 (fault-call:4 fault-nth:29): mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/18 07:41:44 executing program 3: r0 = socket$kcm(0x2, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000740)={&(0x7f0000000000)=@in={0x2, 0x4e23, @multicast2=0xe0000002, [0x0, 0x0, 0x4]}, 0x80, &(0x7f0000000200), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="300000000000000000000000070000008921eeb35cd8bd7fcc0c1b988e1c9d86c39351f17f9b04b22b00000000000000"], 0x30}, 0x0) 2018/04/18 07:41:44 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000f97ff8)) socketpair(0x8, 0x5, 0x0, &(0x7f00000001c0)) socketpair$inet6_icmp(0xa, 0x2, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f00000019c0)={&(0x7f00000000c0)=@nl=@unspec, 0x80, &(0x7f0000000400)=[{&(0x7f0000000200)="fe668ed49872689b140c1a9c01311c8efee87b1b6012540cab0a3dde65c83f7b3e9c5dcc2d2b4310531012b9e54cd4bb4ab22d27e2618de88238b4dda378292a49a8e359c7342e906a9fb25afffee3430a2895f3058c10ce3e620bd26c032472d9bd71bb59a8126db7adac810979d257ea649e8987d94fd0d8a3437f8b6944a181f455dccc8fad2111a26a6f7d5a35dcf5aeaeb53d02fe4bafe5175eff71626dbd20b6fcdbeff56c64b8cbbf78d7", 0x366}, {&(0x7f0000000140)="66fa0aae65f1400fa13fade12fada7da6fa2d63e002aa852a0d17df8761e68bfe74fd7e25d6b43058b9893738c72e37273ac110f8d687f989bd4e8dc7b5b653dc72745b0f6fc0167fc0db02aeafe0af982dd28ec0d748ec2927d19f3d19f2dd5ff92f7e276cbf0bf", 0x68}, {&(0x7f00000002c0)}, {&(0x7f0000000300)="b6e880d9bdf10352", 0x8}, {&(0x7f0000000340)="819b8cef374465bd467f6cd882aa4ffe321f06", 0x13}, {&(0x7f0000000380)="545f7630174c6e998f86c1d3d08fc18c260d6f3795fdf5eeb1ab71166b365fb59cac8e265a7ae937c5653df77b92d1e97451190ecd2d42c71dc8e020dc886a9be2ec3e6f6c602851372a4b0968900789b20f6d8c0839a8b6a778bbe3ae5a5cf598d478187317ff0b", 0x68}], 0x6, &(0x7f0000000480)=[{0x70, 0x1, 0x401, "8b190ac7e9f78d4bde3f4b10ed01b5c16c60fd75313007bf254319c4e91e86028326327f24cd65acb9873b248d6d6416ede2ef3952d8d9ad83c28000d697a1ffffdd5dd00e5ad94ddfa9f3f9ccf8cfae4b04594ad3b60d51eae43402632b8bfd"}, {0xa8, 0x107, 0x7, "9b1ca3eb16c0fc820d50073c26873dbdd2d19f3ddf26fd79c76739a6236b8bf8405a33c3b57b98acf8a2cddf20a173cb485d4ce018ba8d051b8847bef5c014c719fdafda321e36fb8bc98723140c2b7750fcb6cec81c2543f60497d7b949a285cfaf4f3c90954d698b0ff5480cf074ec9b24812ec0faba1f8d503399b7348ca145e52d2a3897d5b11d027ddca64c4d4e0cb6"}, {0x78, 0x1bf, 0x7, "70fb6545f98bc15489bf58a0260ae9844f8100df6368c3a52d2dbf07f7d802ff0ed1ee774e23f6b97fc34959c59b972c3c512488939b207f7138055e20b6da39c003c63d06aa686cd18f6035a956b2bf3c13c5ae9098c564b00a05fba0c3b72a26702d2f"}, {0xe8, 0x19f, 0xff7fffff, "50465e12215299a98ad7f4a226bc0760e11cd68f28f343c0f1a898cae1889e817b72474aea123d6b2e0795bc4cb75292e00dce4e07081dc8f36e405313d3a22ba258b29f4fa2da164648d5ab5855d692bc14150c830f0125eb355ef47b2bf7ef54ef83f75fd74628b91dd6f56c87c44d2d6cf29d62cd94cba0ceaeeef31182ad03a86282bd12360cd372584e040b26866af1daa3af3e61f4e51a9e4491d8edb0946dad93f92cb8c9774214d059e991e7ed1ad212b936f8b0ad807bbbf28049d343bcca3298366158d11c16f2b370963faf386c414a"}, {0x60, 0x102, 0x3, "a57d51bb566d8651cc96a6cbe4f043d3ebf2aa5caf82360d8921d342dbf88b1ce7b66d352100256ac28a3b9443874b2dafd555511df5b3205177065be54f7b739bb053dbe9ce5ed73e471a3c7c4f"}, {0xe8, 0x105, 0x3, "e8ffb69629d0714aac4aeeae83f8e50e048b2b19faab66da509175fc429592c54c1ba27e80eff917e44d17edf0d8ca881bbcfac7b9157f95eff63f4ca1d09cb2eddc61b100dbccb5814edd4adc4625bb98c9209427f2c2fb1e88d2a9ba772a9fe3552d116b4a1298a691f636ba2e6b38fca7ec03db63aa3405c488d4169c6d8db34b4619abdbcb04e58bd7cc1a450aa98fe816b22a5d220740cf5589375382eebbd10f4be228a68669f113c938d9dd75fcb68e4d8feebf969447313ea54415c62777d7802b1b65f1233753b55089dd423d046224d251"}, {0x90, 0x0, 0x20, "305e2268d095abd4c04af6d5c355fb124007523f1be916b9794618bfac782f948094fad979901486c30a481a2ee078d288c26dc150409f79de5a8241454cbab650e51cc76d2a93ee26e2bb5b54b6e45ff6a579732215b51e442f34c37f00bdcbdcaea36083f707347072b294ecbaaff0580a6946bc288308132feb192b4d2d"}, {0x1010, 0xfffffffffffffffe, 0x2, "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"}, {0x68, 0x10b, 0x2, "f6b810af20487b3441a57792349c11edeca803f6dafd641249ae176372e55eab98f09f228b76a33cd64fc89eabaecb79621b2e66ab6e966fc437524d71c2b583009a96611f069d5bd85f4250ae16db76314e874add3fafad"}, {0x70, 0x11f, 0x2, "ae87aceda05db243a66081e5eea2ad53520af567fa73021adbf256e3be5ecd4dd79144069f10163504d7fcdeee790c447ba20c594835ab38648fd0ac29cccbd382ff6fe0f09438093b33601e41b1d72da4094dcea42084e68db606dc8f87"}], 0x1538, 0x1}, 0x20000000) 2018/04/18 07:41:44 executing program 2: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004, 0x4000009d, 0xffffffffffffffff, 0x200000}, 0xfffffffffffffcb4) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="18f700000000540000000000000000007110000000000000000000000000000095000000000000000200000000000000730544862f8cddd0644120097541c5c0d4acc44b472fae8d92d506ab14c6be1a8e7a93d0c69d0f0beb7ec0110745298c123d9ce83ff2658981397c3009547f0a82cbf248ad779453bf2693aa298d52963f3f77888de2f56af3f4a1da5ebeb59e4f271e58a4812182bc0218275b4b00000000000000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x59616d61, 0xffffffffffffffff, 0x1, &(0x7f0000000000)) socketpair$inet_icmp(0x59616d61, 0xffffffffffffffff, 0x1, &(0x7f0000000000)) 2018/04/18 07:41:44 executing program 5: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9c"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x0, 0x100}, 0x2c) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) close(0xffffffffffffffff) gettid() socket$kcm(0x29, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r0, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={r1, 0x28, &(0x7f0000000740)}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r2}, 0x10) 2018/04/18 07:41:44 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x9) close(0xffffffffffffffff) gettid() socket$kcm(0x29, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x0, 0xffffffffffff36f1, 0x0, 0x18}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x10) perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x0, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0x0, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/18 07:41:44 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x43, &(0x7f0000000100)) 2018/04/18 07:41:44 executing program 1: r0 = perf_event_open(&(0x7f0000348f88)={0x0, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x9) close(r0) gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x0, 0x1ff, 0x7fff, 0x100000043}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={r2, 0x28, &(0x7f0000000740)}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r3}, 0x10) [ 212.058777] FAULT_INJECTION: forcing a failure. [ 212.058777] name failslab, interval 1, probability 0, space 0, times 0 [ 212.070191] CPU: 1 PID: 18886 Comm: syz-executor7 Not tainted 4.16.0+ #3 [ 212.077133] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 212.086496] Call Trace: [ 212.089101] dump_stack+0x1b9/0x294 [ 212.092756] ? dump_stack_print_info.cold.2+0x52/0x52 [ 212.097961] ? perf_trace_lock_acquire+0xe3/0x980 [ 212.102818] ? __save_stack_trace+0x7e/0xd0 2018/04/18 07:41:44 executing program 3: r0 = socket$kcm(0x2, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000740)={&(0x7f0000000000)=@in={0x2, 0x4e23, @multicast2=0xe0000002, [0x0, 0x0, 0x2]}, 0x80, &(0x7f0000000200), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="300000000000000000000000070000008921eeb35cd8bd7fcc0c1b988e1c9d86c39351f17f9b04b22b00000000000000"], 0x30}, 0x0) 2018/04/18 07:41:44 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x9) close(0xffffffffffffffff) gettid() socket$kcm(0x29, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x0, 0xffffffffffff36f1, 0x0, 0x18}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x10) perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x0, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0x0, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) [ 212.107166] should_fail.cold.4+0xa/0x1a [ 212.111254] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 212.116373] ? save_stack+0x43/0xd0 [ 212.120020] ? kasan_kmalloc+0xc4/0xe0 [ 212.123918] ? kmem_cache_alloc_trace+0x152/0x780 [ 212.128780] ? __memcg_init_list_lru_node+0x17d/0x2c0 [ 212.133989] ? __list_lru_init+0x456/0x790 [ 212.138237] ? sget_userns+0x706/0xf20 [ 212.142139] ? graph_lock+0x170/0x170 [ 212.145948] ? do_mount+0x564/0x3070 [ 212.149675] ? ksys_mount+0x12d/0x140 [ 212.153481] ? SyS_mount+0x35/0x50 [ 212.157036] ? do_syscall_64+0x29e/0x9d0 [ 212.161112] ? find_held_lock+0x36/0x1c0 [ 212.165193] ? __lock_is_held+0xb5/0x140 [ 212.169285] ? check_same_owner+0x320/0x320 [ 212.173624] ? rcu_note_context_switch+0x710/0x710 [ 212.178575] __should_failslab+0x124/0x180 [ 212.182830] should_failslab+0x9/0x14 [ 212.186645] kmem_cache_alloc_trace+0x2cb/0x780 [ 212.191324] ? __kmalloc_node+0x33/0x70 [ 212.195315] ? __kmalloc_node+0x33/0x70 [ 212.199300] ? rcu_read_lock_sched_held+0x108/0x120 [ 212.204344] __memcg_init_list_lru_node+0x17d/0x2c0 2018/04/18 07:41:44 executing program 6: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000f97ff8)) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000080)) socketpair(0x8, 0x5, 0x0, &(0x7f00000001c0)) [ 212.209378] ? kvfree_rcu+0x20/0x20 [ 212.213019] ? __kmalloc_node+0x47/0x70 [ 212.217015] __list_lru_init+0x456/0x790 [ 212.221091] ? list_lru_destroy+0x4c0/0x4c0 [ 212.225423] ? mark_held_locks+0xc9/0x160 [ 212.229585] ? __raw_spin_lock_init+0x1c/0x100 [ 212.234181] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 212.239215] ? lockdep_init_map+0x9/0x10 [ 212.243292] sget_userns+0x706/0xf20 [ 212.247011] ? set_anon_super+0x20/0x20 [ 212.250996] ? get_empty_filp.cold.7+0x3e/0x3e [ 212.255589] ? destroy_unused_super.part.9+0x100/0x100 [ 212.260877] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 212.265903] ? kasan_check_read+0x11/0x20 [ 212.270064] ? rcu_pm_notify+0xc0/0xc0 [ 212.273961] ? trace_hardirqs_off+0xd/0x10 [ 212.278208] ? cap_capable+0x1f9/0x260 [ 212.282115] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 212.287678] ? security_capable+0x99/0xc0 [ 212.291842] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 212.297396] ? ns_capable_common+0x13f/0x170 [ 212.301824] mount_ns+0x8f/0x1d0 [ 212.305202] ? rpc_pipe_release+0xb70/0xb70 [ 212.309536] rpc_mount+0x9e/0xd0 [ 212.312918] mount_fs+0xae/0x328 [ 212.316306] vfs_kern_mount.part.34+0xd4/0x4d0 [ 212.320902] ? may_umount+0xb0/0xb0 [ 212.324538] ? _raw_read_unlock+0x22/0x30 [ 212.328696] ? __get_fs_type+0x97/0xc0 [ 212.332604] do_mount+0x564/0x3070 [ 212.336161] ? copy_mount_string+0x40/0x40 [ 212.340405] ? rcu_pm_notify+0xc0/0xc0 [ 212.344320] ? copy_mount_options+0x5f/0x380 [ 212.348740] ? rcu_read_lock_sched_held+0x108/0x120 [ 212.353775] ? kmem_cache_alloc_trace+0x616/0x780 [ 212.358633] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 212.364185] ? _copy_from_user+0xdf/0x150 [ 212.368348] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 212.373892] ? copy_mount_options+0x285/0x380 [ 212.378407] ksys_mount+0x12d/0x140 [ 212.382045] SyS_mount+0x35/0x50 [ 212.385414] ? ksys_mount+0x140/0x140 [ 212.389224] do_syscall_64+0x29e/0x9d0 [ 212.393116] ? vmalloc_sync_all+0x30/0x30 [ 212.397276] ? _raw_spin_unlock_irq+0x27/0x70 [ 212.401786] ? finish_task_switch+0x1ca/0x810 [ 212.406299] ? syscall_return_slowpath+0x5c0/0x5c0 [ 212.411239] ? syscall_return_slowpath+0x30f/0x5c0 [ 212.416185] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 212.421578] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 212.426439] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 212.431636] RIP: 0033:0x455329 [ 212.434834] RSP: 002b:00007fdcd2ef2c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 212.442552] RAX: ffffffffffffffda RBX: 00007fdcd2ef36d4 RCX: 0000000000455329 [ 212.449829] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 212.457100] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 212.464359] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 212.471617] R13: 00000000000003fb R14: 00000000006f9028 R15: 000000000000001d 2018/04/18 07:41:44 executing program 3: r0 = socket$kcm(0x2, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000740)={&(0x7f0000000000)=@in={0x2, 0x4e23, @multicast2=0xe0000002, [0x0, 0x0, 0x100000000000000]}, 0x80, &(0x7f0000000200), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="300000000000000000000000070000008921eeb35cd8bd7fcc0c1b988e1c9d86c39351f17f9b04b22b00000000000000"], 0x30}, 0x0) 2018/04/18 07:41:44 executing program 2: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004, 0x4000009d}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000711000000000000000b63194ed829110bc06c5e2a3a2000000000000009500000000000000319403ee94df40adbe3607a68fa88af80413f948ee209f3eb9ee4ac8e3c7047b2a71900be7a86bca1edb78bfef1127291e5c081e23b4766862b50fa5a008f71ad9f8bee012d7f8fdab8ab6"], &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r1, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x59616d61, 0xffffffffffffffff, 0x1, &(0x7f0000000000)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)) socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f0000000340)) socketpair$inet_icmp(0x59616d61, 0xffffffffffffffff, 0x1, &(0x7f0000000000)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={r0, &(0x7f0000000200)="b63af3becd7957c0f446d54ec729e701c61ad8a608ac427e7523dd506aa35cf5fed95da6aef31c8dfcdf1d9cfb26dabadf01ab5d3587a878f63b969fc18209e6733d2fee73cd0eb5e2c7d851d1c474900df7c4aa6a4b6d56d60dc2f9a5ac31dd268beb51ca4778", &(0x7f0000000280)="9cbf0c949c64b78fcb60e6d45337b27f512a5838696989dc4cf54e3f4e1521", 0x3}, 0x20) socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f0000000300)) 2018/04/18 07:41:44 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x9) close(0xffffffffffffffff) gettid() socket$kcm(0x29, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x0, 0xffffffffffff36f1, 0x0, 0x18}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x10) perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x0, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0x0, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/18 07:41:44 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x1, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000f97ff8)={0xffffffffffffffff}) close(r0) socketpair(0x8, 0x5, 0x0, &(0x7f00000001c0)) 2018/04/18 07:41:44 executing program 1: r0 = perf_event_open(&(0x7f0000348f88)={0x0, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x9) close(r0) gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x0, 0x1ff, 0x7fff, 0x100000043}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={r2, 0x28, &(0x7f0000000740)}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r3}, 0x10) 2018/04/18 07:41:44 executing program 5: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9c"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4}, 0x2c) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) close(0xffffffffffffffff) gettid() socket$kcm(0x29, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r0, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={r1, 0x28, &(0x7f0000000740)}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r2}, 0x10) 2018/04/18 07:41:44 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_udp(0xa, 0x2, 0xcd00000000000000, &(0x7f0000000100)) 2018/04/18 07:41:44 executing program 7 (fault-call:4 fault-nth:30): mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) [ 212.659218] FAULT_INJECTION: forcing a failure. [ 212.659218] name failslab, interval 1, probability 0, space 0, times 0 [ 212.670744] CPU: 0 PID: 18936 Comm: syz-executor7 Not tainted 4.16.0+ #3 [ 212.677601] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 212.686956] Call Trace: [ 212.689561] dump_stack+0x1b9/0x294 [ 212.693209] ? dump_stack_print_info.cold.2+0x52/0x52 [ 212.698413] ? perf_trace_lock_acquire+0xe3/0x980 [ 212.703266] ? __save_stack_trace+0x7e/0xd0 [ 212.707608] should_fail.cold.4+0xa/0x1a [ 212.711668] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 212.716769] ? save_stack+0x43/0xd0 [ 212.720384] ? kasan_kmalloc+0xc4/0xe0 [ 212.724257] ? kmem_cache_alloc_trace+0x152/0x780 [ 212.729090] ? __memcg_init_list_lru_node+0x17d/0x2c0 [ 212.734267] ? __list_lru_init+0x456/0x790 [ 212.738487] ? sget_userns+0x706/0xf20 [ 212.742362] ? graph_lock+0x170/0x170 [ 212.746150] ? do_mount+0x564/0x3070 [ 212.749852] ? ksys_mount+0x12d/0x140 [ 212.753641] ? SyS_mount+0x35/0x50 [ 212.757169] ? do_syscall_64+0x29e/0x9d0 [ 212.761228] ? find_held_lock+0x36/0x1c0 [ 212.765281] ? __lock_is_held+0xb5/0x140 [ 212.769346] ? check_same_owner+0x320/0x320 [ 212.773657] ? rcu_note_context_switch+0x710/0x710 [ 212.778582] __should_failslab+0x124/0x180 [ 212.782811] should_failslab+0x9/0x14 [ 212.786598] kmem_cache_alloc_trace+0x2cb/0x780 [ 212.791252] ? __kmalloc_node+0x33/0x70 [ 212.795663] ? __kmalloc_node+0x33/0x70 [ 212.799626] ? rcu_read_lock_sched_held+0x108/0x120 [ 212.804637] __memcg_init_list_lru_node+0x17d/0x2c0 [ 212.809647] ? kvfree_rcu+0x20/0x20 [ 212.813265] ? __kmalloc_node+0x47/0x70 [ 212.817239] __list_lru_init+0x456/0x790 [ 212.821305] ? list_lru_destroy+0x4c0/0x4c0 [ 212.825616] ? mark_held_locks+0xc9/0x160 [ 212.829754] ? __raw_spin_lock_init+0x1c/0x100 [ 212.834323] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 212.839336] ? lockdep_init_map+0x9/0x10 [ 212.843386] sget_userns+0x706/0xf20 [ 212.847086] ? set_anon_super+0x20/0x20 [ 212.851052] ? get_empty_filp.cold.7+0x3e/0x3e [ 212.855621] ? destroy_unused_super.part.9+0x100/0x100 [ 212.860890] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 212.865898] ? kasan_check_read+0x11/0x20 [ 212.870035] ? rcu_pm_notify+0xc0/0xc0 [ 212.873909] ? trace_hardirqs_off+0xd/0x10 [ 212.878135] ? cap_capable+0x1f9/0x260 [ 212.882019] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 212.887540] ? security_capable+0x99/0xc0 [ 212.891678] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 212.897203] ? ns_capable_common+0x13f/0x170 [ 212.901606] mount_ns+0x8f/0x1d0 [ 212.904962] ? rpc_pipe_release+0xb70/0xb70 [ 212.909279] rpc_mount+0x9e/0xd0 [ 212.912637] mount_fs+0xae/0x328 [ 212.916005] vfs_kern_mount.part.34+0xd4/0x4d0 [ 212.920578] ? may_umount+0xb0/0xb0 [ 212.924192] ? _raw_read_unlock+0x22/0x30 [ 212.928331] ? __get_fs_type+0x97/0xc0 [ 212.932213] do_mount+0x564/0x3070 [ 212.935748] ? copy_mount_string+0x40/0x40 [ 212.939973] ? rcu_pm_notify+0xc0/0xc0 [ 212.943858] ? copy_mount_options+0x5f/0x380 [ 212.948253] ? rcu_read_lock_sched_held+0x108/0x120 [ 212.953257] ? kmem_cache_alloc_trace+0x616/0x780 [ 212.958092] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 212.963628] ? _copy_from_user+0xdf/0x150 [ 212.967767] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 212.973291] ? copy_mount_options+0x285/0x380 [ 212.977776] ksys_mount+0x12d/0x140 [ 212.981396] SyS_mount+0x35/0x50 [ 212.984747] ? ksys_mount+0x140/0x140 [ 212.988540] do_syscall_64+0x29e/0x9d0 [ 212.992415] ? vmalloc_sync_all+0x30/0x30 [ 212.996549] ? _raw_spin_unlock_irq+0x27/0x70 [ 213.001032] ? finish_task_switch+0x1ca/0x810 [ 213.005515] ? syscall_return_slowpath+0x5c0/0x5c0 [ 213.010433] ? syscall_return_slowpath+0x30f/0x5c0 [ 213.015366] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 213.020723] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 213.025558] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 213.030735] RIP: 0033:0x455329 [ 213.033917] RSP: 002b:00007fdcd2ef2c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 213.041616] RAX: ffffffffffffffda RBX: 00007fdcd2ef36d4 RCX: 0000000000455329 [ 213.048872] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 2018/04/18 07:41:45 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000f97ff8)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x4, 0xffff, 0x8, 0x7, 0x17, 0xffffffffffffffff, 0x100000000}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000180)={r1, &(0x7f00000000c0)="50c88eacf20a7963ac71a5bb8d748136ce376576cb63dcc6aecd7a45506fef24e09ee48cbb3bf29ad889b76581dd82656bb1f3f712a0d4af9a42c6c952eec3e2ac7e2e9ca26f75dc39ffaa75c0b880d665751d79c18dd8f5ce8fc2a574e3608757c3d472c3fa42184e01f2531c4498ee187170ddb9a9cddfedd42b3304988b46ffc19de1e5d7c794bf5b800ab3460446cbc7875bc1146a41645f33a49504edfb30b1b7d8a909a94d784fd5c4eed0d58227b4cb3478", &(0x7f0000000200)=""/158}, 0x18) socketpair(0x8, 0x5, 0x0, &(0x7f00000001c0)) 2018/04/18 07:41:45 executing program 3: r0 = socket$kcm(0x2, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000740)={&(0x7f0000000000)=@in={0x2, 0x4e23, @multicast2=0xe0000002, [0x0, 0x0, 0x200000000000000]}, 0x80, &(0x7f0000000200), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="300000000000000000000000070000008921eeb35cd8bd7fcc0c1b988e1c9d86c39351f17f9b04b22b00000000000000"], 0x30}, 0x0) 2018/04/18 07:41:45 executing program 2: socketpair(0x13, 0x80807, 0x84b, &(0x7f0000000180)={0xffffffffffffffff}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0, &(0x7f0000000080)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x329) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004, 0x4000009d}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r1, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x59616d61, 0xffffffffffffffff, 0x1, &(0x7f0000000000)) socketpair$inet_icmp(0x59616d61, 0xffffffffffffffff, 0x1, &(0x7f0000000000)) 2018/04/18 07:41:45 executing program 1: r0 = perf_event_open(&(0x7f0000348f88)={0x0, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x9) close(r0) gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x0, 0x7fff, 0x100000043}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={r2, 0x28, &(0x7f0000000740)}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r3}, 0x10) 2018/04/18 07:41:45 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x9) close(0xffffffffffffffff) gettid() socket$kcm(0x29, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x0, 0xffffffffffff36f1, 0x0, 0x18}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x10) perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x0, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0x0, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) [ 213.056125] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 213.063382] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 213.070635] R13: 00000000000003fb R14: 00000000006f9028 R15: 000000000000001e 2018/04/18 07:41:45 executing program 5: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9c"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x100}, 0x2c) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) close(0xffffffffffffffff) gettid() socket$kcm(0x29, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x0, 0x1ff, 0x7fff, 0x100000043}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r0, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={r1, 0x28, &(0x7f0000000740)}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r2}, 0x10) 2018/04/18 07:41:45 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x1f3, &(0x7f0000000100)) 2018/04/18 07:41:45 executing program 3: r0 = socket$kcm(0x2, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000740)={&(0x7f0000000000)=@in={0x2, 0x4e23, @multicast2=0xe0000002, [0x0, 0x0, 0x4000000000000]}, 0x80, &(0x7f0000000200), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="300000000000000000000000070000008921eeb35cd8bd7fcc0c1b988e1c9d86c39351f17f9b04b22b00000000000000"], 0x30}, 0x0) 2018/04/18 07:41:45 executing program 6: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000f97ff8)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000000c0)='syzkaller\x00') r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xf, 0x13, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000180)='syzkaller\x00', 0x5c, 0x1000, &(0x7f0000003000)=""/4096, 0x40f00, 0x1}, 0x48) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)) socketpair(0x8, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair(0xfffffffffffffffe, 0x200080007, 0x1, &(0x7f00000002c0)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, &(0x7f0000000100)={r1}) recvmsg$kcm(r4, &(0x7f0000002fc0)={&(0x7f0000000ac0)=@nfc, 0x80, &(0x7f0000001f40)=[{&(0x7f0000000b40)=""/73, 0x49}, {&(0x7f0000000bc0)=""/112, 0x70}, {&(0x7f0000000c40)=""/9, 0x9}, {&(0x7f0000000c80)=""/51, 0x33}, {&(0x7f0000000cc0)=""/241, 0xf1}, {&(0x7f0000000dc0)=""/224, 0xe0}, {&(0x7f0000000ec0)=""/4096, 0x1000}, {&(0x7f0000001ec0)=""/121, 0x79}], 0x8, &(0x7f0000001fc0)=""/4096, 0x1000, 0x4}, 0x2000) 2018/04/18 07:41:45 executing program 1: r0 = perf_event_open(&(0x7f0000348f88)={0x0, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x9) close(r0) gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x0, 0x7fff, 0x100000043}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={r2, 0x28, &(0x7f0000000740)}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r3}, 0x10) 2018/04/18 07:41:45 executing program 5: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9c"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x100}, 0x2c) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) close(0xffffffffffffffff) gettid() socket$kcm(0x29, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x0, 0x1ff, 0x7fff, 0x100000043}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r0, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={r1, 0x28, &(0x7f0000000740)}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r2}, 0x10) 2018/04/18 07:41:45 executing program 2: socketpair$inet6_icmp(0xa, 0x2, 0x3a, &(0x7f0000000080)) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004, 0x4000009d}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="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"], &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x59616d61, 0xffffffffffffffff, 0x1, &(0x7f0000000000)) socketpair$inet_icmp(0x59616d61, 0xffffffffffffffff, 0x1, &(0x7f0000000000)) 2018/04/18 07:41:45 executing program 3: r0 = socket$kcm(0x2, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000740)={&(0x7f0000000000)=@in={0x2, 0x4e23, @multicast2=0xe0000002, [0x0, 0x0, 0xffff000000000000]}, 0x80, &(0x7f0000000200), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="300000000000000000000000070000008921eeb35cd8bd7fcc0c1b988e1c9d86c39351f17f9b04b22b00000000000000"], 0x30}, 0x0) 2018/04/18 07:41:45 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x9) close(0xffffffffffffffff) gettid() socket$kcm(0x29, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x0, 0xffffffffffff36f1, 0x0, 0x18}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x10) perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x0, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0x0, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/18 07:41:45 executing program 1: r0 = perf_event_open(&(0x7f0000348f88)={0x0, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x9) close(r0) gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x0, 0x7fff, 0x100000043}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={r2, 0x28, &(0x7f0000000740)}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r3}, 0x10) 2018/04/18 07:41:45 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000f97ff8)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)) socketpair(0x8, 0x5, 0x0, &(0x7f00000001c0)) 2018/04/18 07:41:45 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_udp(0xa, 0x2, 0xb500, &(0x7f0000000100)) 2018/04/18 07:41:45 executing program 7 (fault-call:4 fault-nth:31): mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/18 07:41:45 executing program 1: r0 = perf_event_open(&(0x7f0000348f88)={0x0, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x9) close(r0) gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x0, 0x100000043}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={r2, 0x28, &(0x7f0000000740)}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r3}, 0x10) [ 213.595318] FAULT_INJECTION: forcing a failure. [ 213.595318] name failslab, interval 1, probability 0, space 0, times 0 [ 213.606863] CPU: 0 PID: 19003 Comm: syz-executor7 Not tainted 4.16.0+ #3 [ 213.613716] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 213.623076] Call Trace: [ 213.625686] dump_stack+0x1b9/0x294 [ 213.629336] ? dump_stack_print_info.cold.2+0x52/0x52 [ 213.634534] ? perf_trace_lock_acquire+0xe3/0x980 [ 213.639395] should_fail.cold.4+0xa/0x1a [ 213.643451] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 213.648546] ? perf_trace_lock+0x900/0x900 [ 213.652773] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 213.658297] ? graph_lock+0x170/0x170 [ 213.662083] ? perf_trace_lock+0xd6/0x900 [ 213.666221] ? graph_lock+0x170/0x170 [ 213.670013] ? find_held_lock+0x36/0x1c0 [ 213.674067] ? __lock_is_held+0xb5/0x140 [ 213.678149] ? check_same_owner+0x320/0x320 [ 213.682459] ? lock_downgrade+0x8e0/0x8e0 [ 213.686597] ? rcu_note_context_switch+0x710/0x710 [ 213.691514] ? find_held_lock+0x36/0x1c0 [ 213.695570] __should_failslab+0x124/0x180 [ 213.699810] should_failslab+0x9/0x14 [ 213.703601] __kmalloc+0x2c8/0x760 [ 213.707132] ? lock_downgrade+0x8e0/0x8e0 [ 213.711270] ? register_shrinker+0x121/0x300 [ 213.715674] register_shrinker+0x121/0x300 [ 213.719899] ? do_raw_spin_trylock+0x1b0/0x1b0 [ 213.724471] ? shrink_slab+0xc0/0xc0 [ 213.728176] ? memcpy+0x45/0x50 [ 213.731454] sget_userns+0xc78/0xf20 [ 213.735155] ? set_anon_super+0x20/0x20 [ 213.739120] ? get_empty_filp.cold.7+0x3e/0x3e [ 213.743689] ? destroy_unused_super.part.9+0x100/0x100 [ 213.748961] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 213.753993] ? kasan_check_read+0x11/0x20 [ 213.758136] ? rcu_pm_notify+0xc0/0xc0 [ 213.762016] ? cap_capable+0x1f9/0x260 [ 213.765900] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 213.771423] ? security_capable+0x99/0xc0 [ 213.775560] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 213.781087] ? ns_capable_common+0x13f/0x170 [ 213.785484] mount_ns+0x8f/0x1d0 [ 213.788842] ? rpc_pipe_release+0xb70/0xb70 [ 213.793155] rpc_mount+0x9e/0xd0 [ 213.796512] mount_fs+0xae/0x328 [ 213.799873] vfs_kern_mount.part.34+0xd4/0x4d0 [ 213.804445] ? may_umount+0xb0/0xb0 [ 213.808057] ? _raw_read_unlock+0x22/0x30 [ 213.812201] ? __get_fs_type+0x97/0xc0 [ 213.816081] do_mount+0x564/0x3070 [ 213.819613] ? copy_mount_string+0x40/0x40 [ 213.823833] ? rcu_pm_notify+0xc0/0xc0 [ 213.827714] ? copy_mount_options+0x5f/0x380 [ 213.832114] ? rcu_read_lock_sched_held+0x108/0x120 [ 213.837119] ? kmem_cache_alloc_trace+0x616/0x780 [ 213.841953] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 213.847482] ? _copy_from_user+0xdf/0x150 [ 213.851624] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 213.857148] ? copy_mount_options+0x285/0x380 [ 213.861633] ksys_mount+0x12d/0x140 [ 213.865251] SyS_mount+0x35/0x50 [ 213.868601] ? ksys_mount+0x140/0x140 [ 213.872399] do_syscall_64+0x29e/0x9d0 [ 213.876274] ? syscall_slow_exit_work+0x4f0/0x4f0 [ 213.881107] ? syscall_return_slowpath+0x5c0/0x5c0 [ 213.886023] ? syscall_return_slowpath+0x30f/0x5c0 [ 213.890945] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 213.896302] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 213.901143] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 213.906318] RIP: 0033:0x455329 [ 213.909493] RSP: 002b:00007fdcd2ef2c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 213.917190] RAX: ffffffffffffffda RBX: 00007fdcd2ef36d4 RCX: 0000000000455329 [ 213.924455] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 213.931710] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 213.938967] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 2018/04/18 07:41:46 executing program 3: r0 = socket$kcm(0x2, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000740)={&(0x7f0000000000)=@in={0x2, 0x4e23, @multicast2=0xe0000002, [0x0, 0x0, 0x40000]}, 0x80, &(0x7f0000000200), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="300000000000000000000000070000008921eeb35cd8bd7fcc0c1b988e1c9d86c39351f17f9b04b22b00000000000000"], 0x30}, 0x0) 2018/04/18 07:41:46 executing program 2: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004, 0x4000009d}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=ANY=[@ANYBLOB="18000000000000200000000000000000711000000000000000000000000000009500000000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={r0, 0x50, &(0x7f0000000180)}, 0x10) socketpair$inet_icmp(0x59616d61, 0xffffffffffffffff, 0x1, &(0x7f0000000000)) socketpair$inet_icmp(0x59616d61, 0xffffffffffffffff, 0x1, &(0x7f0000000000)) 2018/04/18 07:41:46 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x9) close(0xffffffffffffffff) gettid() socket$kcm(0x29, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x0, 0xffffffffffff36f1, 0x0, 0x18}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x10) perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x0, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0x0, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/18 07:41:46 executing program 5: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9c"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x100}, 0x2c) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) close(0xffffffffffffffff) gettid() socket$kcm(0x29, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x0, 0x1ff, 0x7fff, 0x100000043}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r0, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={r1, 0x28, &(0x7f0000000740)}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r2}, 0x10) [ 213.946232] R13: 00000000000003fb R14: 00000000006f9028 R15: 000000000000001f 2018/04/18 07:41:46 executing program 1: r0 = perf_event_open(&(0x7f0000348f88)={0x0, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x9) close(r0) gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x0, 0x100000043}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={r2, 0x28, &(0x7f0000000740)}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r3}, 0x10) 2018/04/18 07:41:46 executing program 3: r0 = socket$kcm(0x2, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000740)={&(0x7f0000000000)=@in={0x2, 0x4e23, @multicast2=0xe0000002, [0x0, 0x0, 0x0, 0x4000000000000]}, 0x80, &(0x7f0000000200), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="300000000000000000000000070000008921eeb35cd8bd7fcc0c1b988e1c9d86c39351f17f9b04b22b00000000000000"], 0x30}, 0x0) 2018/04/18 07:41:46 executing program 5: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9c"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x100}, 0x2c) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) close(0xffffffffffffffff) gettid() socket$kcm(0x29, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x0, 0x7fff, 0x100000043}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r0, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={r1, 0x28, &(0x7f0000000740)}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r2}, 0x10) 2018/04/18 07:41:46 executing program 2: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004, 0x4000009d}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x59616d61, 0xffffffffffffffff, 0x1, &(0x7f0000000000)) socketpair(0xa, 0x4, 0x2, &(0x7f00000003c0)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)) socketpair$inet_icmp(0x59616d61, 0xffffffffffffffff, 0x1, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0xd, 0x13, &(0x7f0000000180)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x2}, [@alu={0x7, 0x348, 0xe, 0xf, 0x9, 0x20, 0x10}, @alu={0x7, 0x4, 0xb, 0x5, 0x6, 0x40, 0xffffffffffffffff}, @alu={0x7, 0x3, 0x7, 0x0, 0x7}, @ldst={0x3, 0x3, 0x0, 0x3, 0x0, 0xbe}, @alu={0x0, 0x9, 0xc, 0xa, 0xf, 0xfffffffe}, @ldst={0x0, 0x0, 0x0, 0xf, 0x1, 0xfffffff0, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x23}, @jmp={0x5, 0x0, 0xa, 0xf, 0xb, 0x6}], {0x95}}, &(0x7f0000000240)='GPL\x00', 0x5, 0x8d, &(0x7f0000000280)=""/141, 0x41f00, 0x1}, 0x48) [ 214.275471] ------------[ cut here ]------------ [ 214.280415] refcount_t: increment on 0; use-after-free. [ 214.286011] WARNING: CPU: 1 PID: 4537 at lib/refcount.c:153 refcount_inc+0x5d/0x70 [ 214.293727] Kernel panic - not syncing: panic_on_warn set ... [ 214.293727] [ 214.301084] CPU: 1 PID: 4537 Comm: syz-executor7 Not tainted 4.16.0+ #3 [ 214.307824] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 214.317160] Call Trace: [ 214.319749] dump_stack+0x1b9/0x294 [ 214.323370] ? dump_stack_print_info.cold.2+0x52/0x52 [ 214.328555] ? refcount_add+0x60/0x70 [ 214.332344] panic+0x22f/0x4de [ 214.335522] ? add_taint.cold.5+0x16/0x16 [ 214.339664] ? __warn.cold.8+0x148/0x1b3 [ 214.343714] ? __warn.cold.8+0x117/0x1b3 [ 214.347765] ? refcount_inc+0x5d/0x70 [ 214.351551] __warn.cold.8+0x163/0x1b3 [ 214.355426] ? refcount_inc+0x5d/0x70 [ 214.359477] report_bug+0x252/0x2d0 [ 214.363098] do_error_trap+0x1de/0x490 [ 214.366990] ? math_error+0x420/0x420 [ 214.371045] ? vprintk_default+0x28/0x30 [ 214.375095] ? vprintk_func+0x81/0xe7 [ 214.378883] ? printk+0x9e/0xba [ 214.382156] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 214.386995] do_invalid_op+0x1b/0x20 [ 214.390702] invalid_op+0x1b/0x40 [ 214.394150] RIP: 0010:refcount_inc+0x5d/0x70 [ 214.398539] RSP: 0018:ffff88019eaa7838 EFLAGS: 00010286 [ 214.403893] RAX: 000000000000002b RBX: 0000000000000000 RCX: ffffffff815f58cd [ 214.411146] RDX: 0000000000000000 RSI: ffffffff815fa581 RDI: ffff88019eaa7398 [ 214.418400] RBP: ffff88019eaa7840 R08: ffff88019ea9e040 R09: 0000000000000000 [ 214.425654] R10: 0000000000000000 R11: 0000000000000000 R12: ffff88019ac26a80 [ 214.432908] R13: ffff88019eaa7ac8 R14: 0000000000000040 R15: ffff88019e174180 [ 214.440179] ? console_unlock+0x8ad/0x1100 [ 214.444401] ? vprintk_func+0x81/0xe7 [ 214.448192] ? refcount_inc+0x5d/0x70 [ 214.451989] sk_alloc+0x450/0x17b0 [ 214.455521] ? sock_def_error_report+0x710/0x710 [ 214.460262] ? zap_class+0x720/0x720 [ 214.463966] ? graph_lock+0x170/0x170 [ 214.467762] ? do_raw_write_unlock.cold.8+0x3d/0x3d [ 214.472773] ? perf_trace_lock_acquire+0xe3/0x980 [ 214.477608] ? find_held_lock+0x36/0x1c0 [ 214.481669] ? lock_downgrade+0x8e0/0x8e0 [ 214.485817] ? rcu_is_watching+0x85/0x140 [ 214.489955] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 214.495137] ? find_held_lock+0x36/0x1c0 [ 214.499197] inet_create+0x4f8/0x1050 [ 214.503001] ? inet_accept+0x9e0/0x9e0 [ 214.506878] ? rcu_is_watching+0x85/0x140 [ 214.511018] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 214.516206] __sock_create+0x526/0x920 [ 214.520084] ? kernel_sock_ip_overhead+0x570/0x570 [ 214.525006] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 214.530531] ? do_rmdir+0x24e/0x610 [ 214.534156] ? SyS_mkdir+0x30/0x30 [ 214.537688] __sys_socket+0x100/0x250 [ 214.541476] ? move_addr_to_kernel+0x70/0x70 [ 214.545880] SyS_socket+0x24/0x30 [ 214.549320] ? __sys_socket+0x250/0x250 [ 214.553282] do_syscall_64+0x29e/0x9d0 [ 214.557157] ? vmalloc_sync_all+0x30/0x30 [ 214.561294] ? syscall_slow_exit_work+0x4f0/0x4f0 [ 214.566126] ? syscall_return_slowpath+0x5c0/0x5c0 [ 214.571042] ? syscall_return_slowpath+0x30f/0x5c0 [ 214.575965] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 214.581329] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 214.586169] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 214.591345] RIP: 0033:0x457e57 [ 214.594523] RSP: 002b:00007fff1432e178 EFLAGS: 00000202 ORIG_RAX: 0000000000000029 [ 214.602220] RAX: ffffffffffffffda RBX: 00000000000001f6 RCX: 0000000000457e57 [ 214.609476] RDX: 0000000000000006 RSI: 0000000000000001 RDI: 0000000000000002 [ 214.616731] RBP: 00000000000344c1 R08: 0000000000000000 R09: 0000000000000001 [ 214.623991] R10: 000000000000000a R11: 0000000000000202 R12: 0000000000000482 [ 214.631250] R13: 0000000000000005 R14: 0000000000000482 R15: 00000000000341f2 [ 214.639211] Dumping ftrace buffer: [ 214.642804] (ftrace buffer empty) [ 214.646493] Kernel Offset: disabled [ 214.650108] Rebooting in 86400 seconds..