[....] Starting enhanced syslogd: rsyslogd[ 15.969818] audit: type=1400 audit(1520294842.405:5): avc: denied { syslog } for pid=3994 comm="rsyslogd" capability=34 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 [?25l[?1c7[ ok 8[?25h[?0c. Starting mcstransd: [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 18.074564] audit: type=1400 audit(1520294844.510:6): avc: denied { map } for pid=4133 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 Warning: Permanently added '10.128.0.36' (ECDSA) to the list of known hosts. 2018/03/06 00:07:30 fuzzer started [ 24.348056] audit: type=1400 audit(1520294850.783:7): avc: denied { map } for pid=4144 comm="syz-fuzzer" path="/root/syz-fuzzer" dev="sda1" ino=16479 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 2018/03/06 00:07:31 dialing manager at 10.128.0.26:35897 [ 26.923108] can: request_module (can-proto-0) failed. [ 26.932251] can: request_module (can-proto-0) failed. 2018/03/06 00:07:33 kcov=true, comps=true [ 27.182046] audit: type=1400 audit(1520294853.617:8): avc: denied { map } for pid=4144 comm="syz-fuzzer" path="/sys/kernel/debug/kcov" dev="debugfs" ino=62 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 2018/03/06 00:07:33 executing program 7: socketpair(0x1e, 0x0, 0x92d7, &(0x7f0000000140)) 2018/03/06 00:07:33 executing program 0: mkdir(&(0x7f0000001c40)='./file0\x00', 0x0) mount(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)='./file0\x00', &(0x7f0000000000)='devpts\x00', 0x3, &(0x7f0000000040)) mount(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000003c0)="a4ca6636a61f559ad30a6b8355174bf9ac461748005738c024ab1e5b5f5757eae6787bb18b6d0e27d4d9e9849faf05be4d80ddab26b8d52ffd607598c90a7a2cc6739e0c2dcc7e7d3ce0a4a0eb884dfaf516b683eb14d9ac66c1e0ea914e6ae42bd58749c58b230b556c4037852d293f9732bfda9340f8007481922bfdaf115ea30a12810843cd7373d2e943f7f1bd22460e3e69dea1c599944a9223e0f6ad977ae44d9b6b1244fce0e329cb798644c34940ee0fc13913bac3cc01c1a1e8eea187f642535c3a34c35f40ec43c08c35a52d03d74492e8f2d5616d62f0ac32ee86860eda08b82112271fe0ef337df21505e8c69b1f2b5665317bdb3576fd804c89c49a95f6a7af86401f1516c14636fba6d04538686aed7deb0232d6f5323e1eb8e4bb2179069d7a2baa48bdb6fbcebd0d7550fbe2f9a304df47e5e184739507f69580354a7791f6b95867c4005c86f3572f8f4ed603005d000000", 0x23, &(0x7f0000000040)) 2018/03/06 00:07:33 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x3, 0x4, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000040)='8', &(0x7f0000000100)}, 0x20) 2018/03/06 00:07:33 executing program 1: socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000140)) 2018/03/06 00:07:33 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0xcf}, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={r0, 0x50}, 0xa) 2018/03/06 00:07:33 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f000000a500)={&(0x7f0000000040)=ANY=[], 0x0, &(0x7f000000a380)=[{&(0x7f000000a180)="14d687f8fc5edffa44597b0ec0b5feabbf03c90fb422f10f1d261b1e55c05b62c2616c71c65ea520859500331d233673189fcb55a7df24f377c15c321bdce00464a7b6f7dc6542b21f3b726181df484012b9f67e35d42d7cc0", 0x59}], 0x1, &(0x7f000000a440)=[]}, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/03/06 00:07:33 executing program 6: mkdir(&(0x7f00004ee000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x1, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, @perf_bp={&(0x7f0000496fff), 0x800000}, 0x0, 0x20000000, 0x10000000006, 0x400010}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00009f8000)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f00005f7ffb)='nfs4\x00', 0x0, &(0x7f000000a000)) 2018/03/06 00:07:33 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x40049409, r0) [ 27.223961] audit: type=1400 audit(1520294853.659:9): avc: denied { map } for pid=4144 comm="syz-fuzzer" path="/root/syzkaller-shm389629694" dev="sda1" ino=16481 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:file_t:s0 tclass=file permissive=1 [ 27.260637] IPVS: ftp: loaded support on port[0] = 21 [ 27.352484] IPVS: ftp: loaded support on port[0] = 21 [ 27.386439] IPVS: ftp: loaded support on port[0] = 21 [ 27.419733] IPVS: ftp: loaded support on port[0] = 21 [ 27.427430] audit: type=1400 audit(1520294853.863:10): avc: denied { map_create } for pid=4208 comm="syz-executor4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 27.450950] audit: type=1400 audit(1520294853.886:11): avc: denied { map_read map_write } for pid=4208 comm="syz-executor4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 27.462781] IPVS: ftp: loaded support on port[0] = 21 [ 27.508437] IPVS: ftp: loaded support on port[0] = 21 [ 27.519970] audit: type=1400 audit(1520294853.955:12): avc: denied { prog_load } for pid=4214 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 27.553763] audit: type=1400 audit(1520294853.989:13): avc: denied { prog_run } for pid=4214 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 27.581998] IPVS: ftp: loaded support on port[0] = 21 [ 27.594508] SELinux: unknown mount option [ 27.625931] IPVS: ftp: loaded support on port[0] = 21 2018/03/06 00:07:34 executing program 7: socketpair(0x1e, 0x0, 0x92d7, &(0x7f0000000140)) 2018/03/06 00:07:34 executing program 1: socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000140)) 2018/03/06 00:07:34 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x3, 0x4, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000040)='8', &(0x7f0000000100)}, 0x20) 2018/03/06 00:07:34 executing program 0: mkdir(&(0x7f0000001c40)='./file0\x00', 0x0) mount(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)='./file0\x00', &(0x7f0000000000)='devpts\x00', 0x3, &(0x7f0000000040)) mount(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000003c0)="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", 0x23, &(0x7f0000000040)) 2018/03/06 00:07:34 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0xcf}, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={r0, 0x50}, 0xa) 2018/03/06 00:07:34 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f000000a500)={&(0x7f0000000040)=ANY=[], 0x0, &(0x7f000000a380)=[{&(0x7f000000a180)="14d687f8fc5edffa44597b0ec0b5feabbf03c90fb422f10f1d261b1e55c05b62c2616c71c65ea520859500331d233673189fcb55a7df24f377c15c321bdce00464a7b6f7dc6542b21f3b726181df484012b9f67e35d42d7cc0", 0x59}], 0x1, &(0x7f000000a440)=[]}, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/03/06 00:07:34 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x40049409, r0) 2018/03/06 00:07:34 executing program 6: mkdir(&(0x7f00004ee000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x1, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, @perf_bp={&(0x7f0000496fff), 0x800000}, 0x0, 0x20000000, 0x10000000006, 0x400010}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00009f8000)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f00005f7ffb)='nfs4\x00', 0x0, &(0x7f000000a000)) 2018/03/06 00:07:34 executing program 1: socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000140)) 2018/03/06 00:07:34 executing program 7: socketpair(0x1e, 0x0, 0x92d7, &(0x7f0000000140)) 2018/03/06 00:07:34 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x3, 0x4, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000040)='8', &(0x7f0000000100)}, 0x20) 2018/03/06 00:07:34 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x40049409, r0) [ 27.718181] SELinux: unknown mount option 2018/03/06 00:07:34 executing program 1: socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000140)) 2018/03/06 00:07:34 executing program 6: mkdir(&(0x7f00004ee000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x1, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, @perf_bp={&(0x7f0000496fff), 0x800000}, 0x0, 0x20000000, 0x10000000006, 0x400010}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00009f8000)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f00005f7ffb)='nfs4\x00', 0x0, &(0x7f000000a000)) 2018/03/06 00:07:34 executing program 0: mkdir(&(0x7f0000001c40)='./file0\x00', 0x0) mount(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)='./file0\x00', &(0x7f0000000000)='devpts\x00', 0x3, &(0x7f0000000040)) mount(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000003c0)="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", 0x23, &(0x7f0000000040)) 2018/03/06 00:07:34 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0xcf}, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={r0, 0x50}, 0xa) 2018/03/06 00:07:34 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f000000a500)={&(0x7f0000000040)=ANY=[], 0x0, &(0x7f000000a380)=[{&(0x7f000000a180)="14d687f8fc5edffa44597b0ec0b5feabbf03c90fb422f10f1d261b1e55c05b62c2616c71c65ea520859500331d233673189fcb55a7df24f377c15c321bdce00464a7b6f7dc6542b21f3b726181df484012b9f67e35d42d7cc0", 0x59}], 0x1, &(0x7f000000a440)=[]}, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/03/06 00:07:34 executing program 7: socketpair(0x1e, 0x0, 0x92d7, &(0x7f0000000140)) 2018/03/06 00:07:34 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x40049409, r0) 2018/03/06 00:07:34 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x3, 0x4, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000040)='8', &(0x7f0000000100)}, 0x20) 2018/03/06 00:07:34 executing program 7: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x40049409, r0) 2018/03/06 00:07:34 executing program 1: mkdir(&(0x7f00004ee000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x1, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, @perf_bp={&(0x7f0000496fff), 0x800000}, 0x0, 0x20000000, 0x10000000006, 0x400010}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00009f8000)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f00005f7ffb)='nfs4\x00', 0x0, &(0x7f000000a000)) 2018/03/06 00:07:34 executing program 0: mkdir(&(0x7f0000001c40)='./file0\x00', 0x0) mount(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)='./file0\x00', &(0x7f0000000000)='devpts\x00', 0x3, &(0x7f0000000040)) mount(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000003c0)="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", 0x23, &(0x7f0000000040)) 2018/03/06 00:07:34 executing program 6: mkdir(&(0x7f00004ee000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x1, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, @perf_bp={&(0x7f0000496fff), 0x800000}, 0x0, 0x20000000, 0x10000000006, 0x400010}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00009f8000)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f00005f7ffb)='nfs4\x00', 0x0, &(0x7f000000a000)) [ 27.803830] SELinux: unknown mount option 2018/03/06 00:07:34 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0xcf}, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={r0, 0x50}, 0xa) 2018/03/06 00:07:34 executing program 5: mkdir(&(0x7f00004ee000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x1, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, @perf_bp={&(0x7f0000496fff), 0x800000}, 0x0, 0x20000000, 0x10000000006, 0x400010}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00009f8000)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f00005f7ffb)='nfs4\x00', 0x0, &(0x7f000000a000)) 2018/03/06 00:07:34 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f000000a500)={&(0x7f0000000040)=ANY=[], 0x0, &(0x7f000000a380)=[{&(0x7f000000a180)="14d687f8fc5edffa44597b0ec0b5feabbf03c90fb422f10f1d261b1e55c05b62c2616c71c65ea520859500331d233673189fcb55a7df24f377c15c321bdce00464a7b6f7dc6542b21f3b726181df484012b9f67e35d42d7cc0", 0x59}], 0x1, &(0x7f000000a440)=[]}, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/03/06 00:07:34 executing program 4: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f000000a500)={&(0x7f0000000040)=ANY=[], 0x0, &(0x7f000000a380)=[{&(0x7f000000a180)="14d687f8fc5edffa44597b0ec0b5feabbf03c90fb422f10f1d261b1e55c05b62c2616c71c65ea520859500331d233673189fcb55a7df24f377c15c321bdce00464a7b6f7dc6542b21f3b726181df484012b9f67e35d42d7cc0", 0x59}], 0x1, &(0x7f000000a440)=[]}, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/03/06 00:07:34 executing program 7: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x40049409, r0) 2018/03/06 00:07:34 executing program 1: mkdir(&(0x7f00004ee000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x1, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, @perf_bp={&(0x7f0000496fff), 0x800000}, 0x0, 0x20000000, 0x10000000006, 0x400010}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00009f8000)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f00005f7ffb)='nfs4\x00', 0x0, &(0x7f000000a000)) 2018/03/06 00:07:34 executing program 6: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f000000a500)={&(0x7f0000000040)=ANY=[], 0x0, &(0x7f000000a380)=[{&(0x7f000000a180)="14d687f8fc5edffa44597b0ec0b5feabbf03c90fb422f10f1d261b1e55c05b62c2616c71c65ea520859500331d233673189fcb55a7df24f377c15c321bdce00464a7b6f7dc6542b21f3b726181df484012b9f67e35d42d7cc0", 0x59}], 0x1, &(0x7f000000a440)=[]}, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/03/06 00:07:34 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0xcf}, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={r0, 0x50}, 0xa) 2018/03/06 00:07:34 executing program 7: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x40049409, r0) 2018/03/06 00:07:34 executing program 5: mkdir(&(0x7f00004ee000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x1, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, @perf_bp={&(0x7f0000496fff), 0x800000}, 0x0, 0x20000000, 0x10000000006, 0x400010}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00009f8000)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f00005f7ffb)='nfs4\x00', 0x0, &(0x7f000000a000)) 2018/03/06 00:07:34 executing program 4: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f000000a500)={&(0x7f0000000040)=ANY=[], 0x0, &(0x7f000000a380)=[{&(0x7f000000a180)="14d687f8fc5edffa44597b0ec0b5feabbf03c90fb422f10f1d261b1e55c05b62c2616c71c65ea520859500331d233673189fcb55a7df24f377c15c321bdce00464a7b6f7dc6542b21f3b726181df484012b9f67e35d42d7cc0", 0x59}], 0x1, &(0x7f000000a440)=[]}, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) [ 27.903302] SELinux: unknown mount option [ 27.911519] SELinux: unknown mount option 2018/03/06 00:07:34 executing program 7: mkdir(&(0x7f0000001c40)='./file0\x00', 0x0) mount(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)='./file0\x00', &(0x7f0000000000)='devpts\x00', 0x3, &(0x7f0000000040)) mount(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000003c0)="a4ca6636a61f559ad30a6b8355174bf9ac461748005738c024ab1e5b5f5757eae6787bb18b6d0e27d4d9e9849faf05be4d80ddab26b8d52ffd607598c90a7a2cc6739e0c2dcc7e7d3ce0a4a0eb884dfaf516b683eb14d9ac66c1e0ea914e6ae42bd58749c58b230b556c4037852d293f9732bfda9340f8007481922bfdaf115ea30a12810843cd7373d2e943f7f1bd22460e3e69dea1c599944a9223e0f6ad977ae44d9b6b1244fce0e329cb798644c34940ee0fc13913bac3cc01c1a1e8eea187f642535c3a34c35f40ec43c08c35a52d03d74492e8f2d5616d62f0ac32ee86860eda08b82112271fe0ef337df21505e8c69b1f2b5665317bdb3576fd804c89c49a95f6a7af86401f1516c14636fba6d04538686aed7deb0232d6f5323e1eb8e4bb2179069d7a2baa48bdb6fbcebd0d7550fbe2f9a304df47e5e184739507f69580354a7791f6b95867c4005c86f3572f8f4ed603005d000000", 0x23, &(0x7f0000000040)) 2018/03/06 00:07:34 executing program 3: mkdir(&(0x7f0000001c40)='./file0\x00', 0x0) mount(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)='./file0\x00', &(0x7f0000000000)='devpts\x00', 0x3, &(0x7f0000000040)) mount(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000003c0)="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", 0x23, &(0x7f0000000040)) 2018/03/06 00:07:34 executing program 1: mkdir(&(0x7f00004ee000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x1, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, @perf_bp={&(0x7f0000496fff), 0x800000}, 0x0, 0x20000000, 0x10000000006, 0x400010}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00009f8000)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f00005f7ffb)='nfs4\x00', 0x0, &(0x7f000000a000)) 2018/03/06 00:07:34 executing program 4: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f000000a500)={&(0x7f0000000040)=ANY=[], 0x0, &(0x7f000000a380)=[{&(0x7f000000a180)="14d687f8fc5edffa44597b0ec0b5feabbf03c90fb422f10f1d261b1e55c05b62c2616c71c65ea520859500331d233673189fcb55a7df24f377c15c321bdce00464a7b6f7dc6542b21f3b726181df484012b9f67e35d42d7cc0", 0x59}], 0x1, &(0x7f000000a440)=[]}, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/03/06 00:07:34 executing program 5: mkdir(&(0x7f00004ee000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x1, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, @perf_bp={&(0x7f0000496fff), 0x800000}, 0x0, 0x20000000, 0x10000000006, 0x400010}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00009f8000)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f00005f7ffb)='nfs4\x00', 0x0, &(0x7f000000a000)) 2018/03/06 00:07:34 executing program 6: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f000000a500)={&(0x7f0000000040)=ANY=[], 0x0, &(0x7f000000a380)=[{&(0x7f000000a180)="14d687f8fc5edffa44597b0ec0b5feabbf03c90fb422f10f1d261b1e55c05b62c2616c71c65ea520859500331d233673189fcb55a7df24f377c15c321bdce00464a7b6f7dc6542b21f3b726181df484012b9f67e35d42d7cc0", 0x59}], 0x1, &(0x7f000000a440)=[]}, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/03/06 00:07:34 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0xcf}, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={r0, 0x50}, 0xa) [ 27.972298] SELinux: unknown mount option [ 27.986301] SELinux: unknown mount option 2018/03/06 00:07:34 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x3, 0x4, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000040)='8', &(0x7f0000000100)}, 0x20) 2018/03/06 00:07:34 executing program 7: mkdir(&(0x7f0000001c40)='./file0\x00', 0x0) mount(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)='./file0\x00', &(0x7f0000000000)='devpts\x00', 0x3, &(0x7f0000000040)) mount(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000003c0)="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", 0x23, &(0x7f0000000040)) 2018/03/06 00:07:34 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x3, 0x4, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000040)='8', &(0x7f0000000100)}, 0x20) 2018/03/06 00:07:34 executing program 3: mkdir(&(0x7f0000001c40)='./file0\x00', 0x0) mount(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)='./file0\x00', &(0x7f0000000000)='devpts\x00', 0x3, &(0x7f0000000040)) mount(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000003c0)="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", 0x23, &(0x7f0000000040)) 2018/03/06 00:07:34 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0xcf}, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={r0, 0x50}, 0xa) 2018/03/06 00:07:34 executing program 1: perf_event_open(&(0x7f0000000000)={0x5, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x918, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1140}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 28.061345] SELinux: unknown mount option [ 28.097349] SELinux: unknown mount option 2018/03/06 00:07:34 executing program 7: mkdir(&(0x7f0000001c40)='./file0\x00', 0x0) mount(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)='./file0\x00', &(0x7f0000000000)='devpts\x00', 0x3, &(0x7f0000000040)) mount(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000003c0)="a4ca6636a61f559ad30a6b8355174bf9ac461748005738c024ab1e5b5f5757eae6787bb18b6d0e27d4d9e9849faf05be4d80ddab26b8d52ffd607598c90a7a2cc6739e0c2dcc7e7d3ce0a4a0eb884dfaf516b683eb14d9ac66c1e0ea914e6ae42bd58749c58b230b556c4037852d293f9732bfda9340f8007481922bfdaf115ea30a12810843cd7373d2e943f7f1bd22460e3e69dea1c599944a9223e0f6ad977ae44d9b6b1244fce0e329cb798644c34940ee0fc13913bac3cc01c1a1e8eea187f642535c3a34c35f40ec43c08c35a52d03d74492e8f2d5616d62f0ac32ee86860eda08b82112271fe0ef337df21505e8c69b1f2b5665317bdb3576fd804c89c49a95f6a7af86401f1516c14636fba6d04538686aed7deb0232d6f5323e1eb8e4bb2179069d7a2baa48bdb6fbcebd0d7550fbe2f9a304df47e5e184739507f69580354a7791f6b95867c4005c86f3572f8f4ed603005d000000", 0x23, &(0x7f0000000040)) 2018/03/06 00:07:34 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x3, 0x4, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000040)='8', &(0x7f0000000100)}, 0x20) 2018/03/06 00:07:34 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0xc, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="8500000015000000b5000000000000009500000000000000"], &(0x7f0000000080)="47ff3300", 0x2, 0x99, &(0x7f000000d000)=""/153}, 0x48) 2018/03/06 00:07:34 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r0, 0x0) 2018/03/06 00:07:34 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000831000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f00000013c0)='mqueue.', 0x0, &(0x7f0000001400)) 2018/03/06 00:07:34 executing program 6: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f000000a500)={&(0x7f0000000040)=ANY=[], 0x0, &(0x7f000000a380)=[{&(0x7f000000a180)="14d687f8fc5edffa44597b0ec0b5feabbf03c90fb422f10f1d261b1e55c05b62c2616c71c65ea520859500331d233673189fcb55a7df24f377c15c321bdce00464a7b6f7dc6542b21f3b726181df484012b9f67e35d42d7cc0", 0x59}], 0x1, &(0x7f000000a440)=[]}, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/03/06 00:07:34 executing program 3: mkdir(&(0x7f0000001c40)='./file0\x00', 0x0) mount(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)='./file0\x00', &(0x7f0000000000)='devpts\x00', 0x3, &(0x7f0000000040)) mount(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000003c0)="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", 0x23, &(0x7f0000000040)) 2018/03/06 00:07:34 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r0, 0x0) 2018/03/06 00:07:34 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0xc, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="8500000015000000b5000000000000009500000000000000"], &(0x7f0000000080)="47ff3300", 0x2, 0x99, &(0x7f000000d000)=""/153}, 0x48) 2018/03/06 00:07:34 executing program 1: perf_event_open(&(0x7f0000000000)={0x5, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x918, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1140}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/03/06 00:07:34 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000831000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f00000013c0)='mqueue.', 0x0, &(0x7f0000001400)) 2018/03/06 00:07:34 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x1ff, 0x379c, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) 2018/03/06 00:07:34 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r0, 0x0) 2018/03/06 00:07:34 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r0, 0x0) 2018/03/06 00:07:34 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r0, 0x0) 2018/03/06 00:07:34 executing program 1: perf_event_open(&(0x7f0000000000)={0x5, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x918, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1140}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 28.222056] SELinux: unknown mount option 2018/03/06 00:07:34 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0xc, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="8500000015000000b5000000000000009500000000000000"], &(0x7f0000000080)="47ff3300", 0x2, 0x99, &(0x7f000000d000)=""/153}, 0x48) 2018/03/06 00:07:34 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x1ff, 0x379c, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) 2018/03/06 00:07:34 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000831000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f00000013c0)='mqueue.', 0x0, &(0x7f0000001400)) 2018/03/06 00:07:34 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r0, 0x0) 2018/03/06 00:07:34 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x1ff, 0x379c, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) 2018/03/06 00:07:34 executing program 1: perf_event_open(&(0x7f0000000000)={0x5, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x918, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1140}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/03/06 00:07:34 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000831000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f00000013c0)='mqueue.', 0x0, &(0x7f0000001400)) 2018/03/06 00:07:34 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r0, 0x0) 2018/03/06 00:07:34 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000831000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f00000013c0)='mqueue.', 0x0, &(0x7f0000001400)) 2018/03/06 00:07:34 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x83, 0xb, 0x1ff}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000001240)={r0, &(0x7f00000001c0), &(0x7f00000011c0)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000000)={r0, &(0x7f0000000180)="01", &(0x7f00000011c0)=""/66}, 0x18) 2018/03/06 00:07:34 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x1ff, 0x379c, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) 2018/03/06 00:07:34 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x7}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x20}], {0x95}}, &(0x7f0000000000)='GPL\x00', 0xfffffffffffffffc, 0xfc6a, &(0x7f00001a7f05)=""/251}, 0x48) 2018/03/06 00:07:34 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0xc, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="8500000015000000b5000000000000009500000000000000"], &(0x7f0000000080)="47ff3300", 0x2, 0x99, &(0x7f000000d000)=""/153}, 0x48) 2018/03/06 00:07:34 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000831000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f00000013c0)='mqueue.', 0x0, &(0x7f0000001400)) 2018/03/06 00:07:34 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x1ff, 0x379c, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) 2018/03/06 00:07:34 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000831000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f00000013c0)='mqueue.', 0x0, &(0x7f0000001400)) 2018/03/06 00:07:34 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x1ff, 0x379c, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) 2018/03/06 00:07:34 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x7}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x20}], {0x95}}, &(0x7f0000000000)='GPL\x00', 0xfffffffffffffffc, 0xfc6a, &(0x7f00001a7f05)=""/251}, 0x48) 2018/03/06 00:07:34 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x83, 0xb, 0x1ff}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000001240)={r0, &(0x7f00000001c0), &(0x7f00000011c0)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000000)={r0, &(0x7f0000000180)="01", &(0x7f00000011c0)=""/66}, 0x18) 2018/03/06 00:07:34 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000831000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f00000013c0)='mqueue.', 0x0, &(0x7f0000001400)) 2018/03/06 00:07:34 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x1ff, 0x379c, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) 2018/03/06 00:07:34 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x83, 0xb, 0x1ff}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000001240)={r0, &(0x7f00000001c0), &(0x7f00000011c0)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000000)={r0, &(0x7f0000000180)="01", &(0x7f00000011c0)=""/66}, 0x18) 2018/03/06 00:07:34 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x83, 0xb, 0x1ff}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000001240)={r0, &(0x7f00000001c0), &(0x7f00000011c0)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000000)={r0, &(0x7f0000000180)="01", &(0x7f00000011c0)=""/66}, 0x18) 2018/03/06 00:07:34 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000831000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f00000013c0)='mqueue.', 0x0, &(0x7f0000001400)) 2018/03/06 00:07:34 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x83, 0xb, 0x1ff}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000001240)={r0, &(0x7f00000001c0), &(0x7f00000011c0)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000000)={r0, &(0x7f0000000180)="01", &(0x7f00000011c0)=""/66}, 0x18) 2018/03/06 00:07:34 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x7}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x20}], {0x95}}, &(0x7f0000000000)='GPL\x00', 0xfffffffffffffffc, 0xfc6a, &(0x7f00001a7f05)=""/251}, 0x48) 2018/03/06 00:07:34 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xb, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="85000000220000000700000000009b009500000000000000"], &(0x7f00000001c0)="73797a6b616c6c65720001be826e8f833152f795b4d9f4bc3ea582523aed371b084fccfc3d2ef2cbe65d30642ca8dcd0f8479be52e66937908f1d8112489e8099d9d4edb806d81189c0fbb6818d028546c35d3363d54db0db780f54977ae6359d617c1d233d8e18abfc75f9a76cd8e1f77583bc02f07a33de6f304e95db82fd4da55ebd25162df6f88e7d1bb0654ffb31e008967", 0x1, 0x99, &(0x7f000000d000)=""/153}, 0x48) 2018/03/06 00:07:34 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x83, 0xb, 0x1ff}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000001240)={r0, &(0x7f00000001c0), &(0x7f00000011c0)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000000)={r0, &(0x7f0000000180)="01", &(0x7f00000011c0)=""/66}, 0x18) 2018/03/06 00:07:34 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x83, 0xb, 0x1ff}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000001240)={r0, &(0x7f00000001c0), &(0x7f00000011c0)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000000)={r0, &(0x7f0000000180)="01", &(0x7f00000011c0)=""/66}, 0x18) 2018/03/06 00:07:34 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x83, 0xb, 0x1ff}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000001240)={r0, &(0x7f00000001c0), &(0x7f00000011c0)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000000)={r0, &(0x7f0000000180)="01", &(0x7f00000011c0)=""/66}, 0x18) 2018/03/06 00:07:34 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0xd5}, 0x3eb) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r0, 0x0, 0xf, 0x83, &(0x7f0000000100)="714b80797dbc5ff1de3086de78ea71", &(0x7f0000000200)=""/131}, 0x28) 2018/03/06 00:07:34 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x7}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x20}], {0x95}}, &(0x7f0000000000)='GPL\x00', 0xfffffffffffffffc, 0xfc6a, &(0x7f00001a7f05)=""/251}, 0x48) 2018/03/06 00:07:34 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x7}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xf, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0xfa}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 2018/03/06 00:07:34 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xb, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="85000000220000000700000000009b009500000000000000"], &(0x7f00000001c0)="73797a6b616c6c65720001be826e8f833152f795b4d9f4bc3ea582523aed371b084fccfc3d2ef2cbe65d30642ca8dcd0f8479be52e66937908f1d8112489e8099d9d4edb806d81189c0fbb6818d028546c35d3363d54db0db780f54977ae6359d617c1d233d8e18abfc75f9a76cd8e1f77583bc02f07a33de6f304e95db82fd4da55ebd25162df6f88e7d1bb0654ffb31e008967", 0x1, 0x99, &(0x7f000000d000)=""/153}, 0x48) 2018/03/06 00:07:34 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000831000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f00000013c0)='mqueue.', 0x0, &(0x7f0000001400)) 2018/03/06 00:07:34 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x83, 0xb, 0x1ff}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000001240)={r0, &(0x7f00000001c0), &(0x7f00000011c0)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000000)={r0, &(0x7f0000000180)="01", &(0x7f00000011c0)=""/66}, 0x18) 2018/03/06 00:07:34 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c, 0x5ccee620}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0xb, 0x5, &(0x7f0000000040)=@framed={{0x18}, [@call={0x85, 0x0, 0x0, 0x27}], {0x95}}, &(0x7f0000000080)='syzkaller\x00', 0x9, 0xc3, &(0x7f00000000c0)=""/195}, 0x48) 2018/03/06 00:07:35 executing program 5: perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)=@l2, 0x80, &(0x7f0000000180)=[{&(0x7f0000000040)=""/131, 0x83}], 0x1, &(0x7f0000000380)=""/4096, 0x1000}, 0x0) socketpair$inet(0x2, 0x0, 0x6, &(0x7f0000001400)) sendmsg(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000100)=[], 0x0, &(0x7f00000018c0)=[{0x98, 0x0, 0x0, "352ddb57571e3c59d39b4f05bd1f98e7937a6da18915b8c3bd07ed3b1f8e989e9c639ed73677bcc194278a2800759740ac9c8a0e7c4b445fc4363f9f54cd42ccb3ae19d988e62e108ab5ee774891ba4adb8c439559901ef61b8c323701dcf178effbcefd53e6fee8c1b498078a1c197970661a603d0545eacfd3f23c4c536daa08e28f"}, {0xc0, 0x0, 0x0, "5b36b40757580f9a57fecc0f51be106ba94d4e8f2d6bf2eb23f0ebf1f8709ed94e93d361b03e4162ecff8072fa78742b862152de65b83f4de693fea119ba701cacb35e8bf8e15afdc566f509eea6b31525860f37d45dee62fd03406384b82475b81d688f804b333a9fc1d39a88fe4dc5a2301e78098ed09a56ef6bf90b4ddc314017330dfeee1aed1bc93005b459451deb465a11e47f5b229a1cbcba96a95fa8e2cb363a1a1f1fd926"}, {0x18, 0x0, 0x8, "9eb47dc7"}], 0x170}, 0xfffffffffffffffc) 2018/03/06 00:07:35 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c, 0x5ccee620}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0xb, 0x5, &(0x7f0000000040)=@framed={{0x18}, [@call={0x85, 0x0, 0x0, 0x27}], {0x95}}, &(0x7f0000000080)='syzkaller\x00', 0x9, 0xc3, &(0x7f00000000c0)=""/195}, 0x48) 2018/03/06 00:07:35 executing program 4: socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000)=[], 0x0, &(0x7f0000298000)=[{0x18, 0x1, 0x1, "13"}], 0x18}, 0x0) 2018/03/06 00:07:35 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xb, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="85000000220000000700000000009b009500000000000000"], &(0x7f00000001c0)="73797a6b616c6c65720001be826e8f833152f795b4d9f4bc3ea582523aed371b084fccfc3d2ef2cbe65d30642ca8dcd0f8479be52e66937908f1d8112489e8099d9d4edb806d81189c0fbb6818d028546c35d3363d54db0db780f54977ae6359d617c1d233d8e18abfc75f9a76cd8e1f77583bc02f07a33de6f304e95db82fd4da55ebd25162df6f88e7d1bb0654ffb31e008967", 0x1, 0x99, &(0x7f000000d000)=""/153}, 0x48) 2018/03/06 00:07:35 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x7}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xf, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0xfa}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 2018/03/06 00:07:35 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0xd5}, 0x3eb) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r0, 0x0, 0xf, 0x83, &(0x7f0000000100)="714b80797dbc5ff1de3086de78ea71", &(0x7f0000000200)=""/131}, 0x28) 2018/03/06 00:07:35 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0xd5}, 0x3eb) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r0, 0x0, 0xf, 0x83, &(0x7f0000000100)="714b80797dbc5ff1de3086de78ea71", &(0x7f0000000200)=""/131}, 0x28) 2018/03/06 00:07:35 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x83, 0xb, 0x1ff}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000001240)={r0, &(0x7f00000001c0), &(0x7f00000011c0)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000000)={r0, &(0x7f0000000180)="01", &(0x7f00000011c0)=""/66}, 0x18) 2018/03/06 00:07:35 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xb, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="85000000220000000700000000009b009500000000000000"], &(0x7f00000001c0)="73797a6b616c6c65720001be826e8f833152f795b4d9f4bc3ea582523aed371b084fccfc3d2ef2cbe65d30642ca8dcd0f8479be52e66937908f1d8112489e8099d9d4edb806d81189c0fbb6818d028546c35d3363d54db0db780f54977ae6359d617c1d233d8e18abfc75f9a76cd8e1f77583bc02f07a33de6f304e95db82fd4da55ebd25162df6f88e7d1bb0654ffb31e008967", 0x1, 0x99, &(0x7f000000d000)=""/153}, 0x48) 2018/03/06 00:07:35 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0xd5}, 0x3eb) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r0, 0x0, 0xf, 0x83, &(0x7f0000000100)="714b80797dbc5ff1de3086de78ea71", &(0x7f0000000200)=""/131}, 0x28) 2018/03/06 00:07:35 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x7}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xf, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0xfa}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 2018/03/06 00:07:35 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c, 0x5ccee620}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0xb, 0x5, &(0x7f0000000040)=@framed={{0x18}, [@call={0x85, 0x0, 0x0, 0x27}], {0x95}}, &(0x7f0000000080)='syzkaller\x00', 0x9, 0xc3, &(0x7f00000000c0)=""/195}, 0x48) 2018/03/06 00:07:35 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0xd5}, 0x3eb) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r0, 0x0, 0xf, 0x83, &(0x7f0000000100)="714b80797dbc5ff1de3086de78ea71", &(0x7f0000000200)=""/131}, 0x28) 2018/03/06 00:07:35 executing program 5: perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)=@l2, 0x80, &(0x7f0000000180)=[{&(0x7f0000000040)=""/131, 0x83}], 0x1, &(0x7f0000000380)=""/4096, 0x1000}, 0x0) socketpair$inet(0x2, 0x0, 0x6, &(0x7f0000001400)) sendmsg(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000100)=[], 0x0, &(0x7f00000018c0)=[{0x98, 0x0, 0x0, "352ddb57571e3c59d39b4f05bd1f98e7937a6da18915b8c3bd07ed3b1f8e989e9c639ed73677bcc194278a2800759740ac9c8a0e7c4b445fc4363f9f54cd42ccb3ae19d988e62e108ab5ee774891ba4adb8c439559901ef61b8c323701dcf178effbcefd53e6fee8c1b498078a1c197970661a603d0545eacfd3f23c4c536daa08e28f"}, {0xc0, 0x0, 0x0, "5b36b40757580f9a57fecc0f51be106ba94d4e8f2d6bf2eb23f0ebf1f8709ed94e93d361b03e4162ecff8072fa78742b862152de65b83f4de693fea119ba701cacb35e8bf8e15afdc566f509eea6b31525860f37d45dee62fd03406384b82475b81d688f804b333a9fc1d39a88fe4dc5a2301e78098ed09a56ef6bf90b4ddc314017330dfeee1aed1bc93005b459451deb465a11e47f5b229a1cbcba96a95fa8e2cb363a1a1f1fd926"}, {0x18, 0x0, 0x8, "9eb47dc7"}], 0x170}, 0xfffffffffffffffc) 2018/03/06 00:07:35 executing program 4: socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000)=[], 0x0, &(0x7f0000298000)=[{0x18, 0x1, 0x1, "13"}], 0x18}, 0x0) 2018/03/06 00:07:35 executing program 6: perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)=@l2, 0x80, &(0x7f0000000180)=[{&(0x7f0000000040)=""/131, 0x83}], 0x1, &(0x7f0000000380)=""/4096, 0x1000}, 0x0) socketpair$inet(0x2, 0x0, 0x6, &(0x7f0000001400)) sendmsg(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000100)=[], 0x0, &(0x7f00000018c0)=[{0x98, 0x0, 0x0, "352ddb57571e3c59d39b4f05bd1f98e7937a6da18915b8c3bd07ed3b1f8e989e9c639ed73677bcc194278a2800759740ac9c8a0e7c4b445fc4363f9f54cd42ccb3ae19d988e62e108ab5ee774891ba4adb8c439559901ef61b8c323701dcf178effbcefd53e6fee8c1b498078a1c197970661a603d0545eacfd3f23c4c536daa08e28f"}, {0xc0, 0x0, 0x0, "5b36b40757580f9a57fecc0f51be106ba94d4e8f2d6bf2eb23f0ebf1f8709ed94e93d361b03e4162ecff8072fa78742b862152de65b83f4de693fea119ba701cacb35e8bf8e15afdc566f509eea6b31525860f37d45dee62fd03406384b82475b81d688f804b333a9fc1d39a88fe4dc5a2301e78098ed09a56ef6bf90b4ddc314017330dfeee1aed1bc93005b459451deb465a11e47f5b229a1cbcba96a95fa8e2cb363a1a1f1fd926"}, {0x18, 0x0, 0x8, "9eb47dc7"}], 0x170}, 0xfffffffffffffffc) 2018/03/06 00:07:35 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0xd5}, 0x3eb) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r0, 0x0, 0xf, 0x83, &(0x7f0000000100)="714b80797dbc5ff1de3086de78ea71", &(0x7f0000000200)=""/131}, 0x28) 2018/03/06 00:07:35 executing program 0: socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000)=[], 0x0, &(0x7f0000298000)=[{0x18, 0x1, 0x1, "13"}], 0x18}, 0x0) 2018/03/06 00:07:35 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c, 0x5ccee620}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0xb, 0x5, &(0x7f0000000040)=@framed={{0x18}, [@call={0x85, 0x0, 0x0, 0x27}], {0x95}}, &(0x7f0000000080)='syzkaller\x00', 0x9, 0xc3, &(0x7f00000000c0)=""/195}, 0x48) 2018/03/06 00:07:35 executing program 5: perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)=@l2, 0x80, &(0x7f0000000180)=[{&(0x7f0000000040)=""/131, 0x83}], 0x1, &(0x7f0000000380)=""/4096, 0x1000}, 0x0) socketpair$inet(0x2, 0x0, 0x6, &(0x7f0000001400)) sendmsg(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000100)=[], 0x0, &(0x7f00000018c0)=[{0x98, 0x0, 0x0, "352ddb57571e3c59d39b4f05bd1f98e7937a6da18915b8c3bd07ed3b1f8e989e9c639ed73677bcc194278a2800759740ac9c8a0e7c4b445fc4363f9f54cd42ccb3ae19d988e62e108ab5ee774891ba4adb8c439559901ef61b8c323701dcf178effbcefd53e6fee8c1b498078a1c197970661a603d0545eacfd3f23c4c536daa08e28f"}, {0xc0, 0x0, 0x0, "5b36b40757580f9a57fecc0f51be106ba94d4e8f2d6bf2eb23f0ebf1f8709ed94e93d361b03e4162ecff8072fa78742b862152de65b83f4de693fea119ba701cacb35e8bf8e15afdc566f509eea6b31525860f37d45dee62fd03406384b82475b81d688f804b333a9fc1d39a88fe4dc5a2301e78098ed09a56ef6bf90b4ddc314017330dfeee1aed1bc93005b459451deb465a11e47f5b229a1cbcba96a95fa8e2cb363a1a1f1fd926"}, {0x18, 0x0, 0x8, "9eb47dc7"}], 0x170}, 0xfffffffffffffffc) 2018/03/06 00:07:35 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x7}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xf, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0xfa}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 2018/03/06 00:07:35 executing program 6: perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)=@l2, 0x80, &(0x7f0000000180)=[{&(0x7f0000000040)=""/131, 0x83}], 0x1, &(0x7f0000000380)=""/4096, 0x1000}, 0x0) socketpair$inet(0x2, 0x0, 0x6, &(0x7f0000001400)) sendmsg(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000100)=[], 0x0, &(0x7f00000018c0)=[{0x98, 0x0, 0x0, "352ddb57571e3c59d39b4f05bd1f98e7937a6da18915b8c3bd07ed3b1f8e989e9c639ed73677bcc194278a2800759740ac9c8a0e7c4b445fc4363f9f54cd42ccb3ae19d988e62e108ab5ee774891ba4adb8c439559901ef61b8c323701dcf178effbcefd53e6fee8c1b498078a1c197970661a603d0545eacfd3f23c4c536daa08e28f"}, {0xc0, 0x0, 0x0, "5b36b40757580f9a57fecc0f51be106ba94d4e8f2d6bf2eb23f0ebf1f8709ed94e93d361b03e4162ecff8072fa78742b862152de65b83f4de693fea119ba701cacb35e8bf8e15afdc566f509eea6b31525860f37d45dee62fd03406384b82475b81d688f804b333a9fc1d39a88fe4dc5a2301e78098ed09a56ef6bf90b4ddc314017330dfeee1aed1bc93005b459451deb465a11e47f5b229a1cbcba96a95fa8e2cb363a1a1f1fd926"}, {0x18, 0x0, 0x8, "9eb47dc7"}], 0x170}, 0xfffffffffffffffc) 2018/03/06 00:07:35 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0xd5}, 0x3eb) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r0, 0x0, 0xf, 0x83, &(0x7f0000000100)="714b80797dbc5ff1de3086de78ea71", &(0x7f0000000200)=""/131}, 0x28) 2018/03/06 00:07:35 executing program 0: socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000)=[], 0x0, &(0x7f0000298000)=[{0x18, 0x1, 0x1, "13"}], 0x18}, 0x0) 2018/03/06 00:07:35 executing program 4: socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000)=[], 0x0, &(0x7f0000298000)=[{0x18, 0x1, 0x1, "13"}], 0x18}, 0x0) 2018/03/06 00:07:35 executing program 1: socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000)=[], 0x0, &(0x7f0000298000)=[{0x18, 0x1, 0x1, "13"}], 0x18}, 0x0) 2018/03/06 00:07:35 executing program 7: socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000)=[], 0x0, &(0x7f0000298000)=[{0x18, 0x1, 0x1, "13"}], 0x18}, 0x0) 2018/03/06 00:07:35 executing program 2: perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)=@l2, 0x80, &(0x7f0000000180)=[{&(0x7f0000000040)=""/131, 0x83}], 0x1, &(0x7f0000000380)=""/4096, 0x1000}, 0x0) socketpair$inet(0x2, 0x0, 0x6, &(0x7f0000001400)) sendmsg(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000100)=[], 0x0, &(0x7f00000018c0)=[{0x98, 0x0, 0x0, "352ddb57571e3c59d39b4f05bd1f98e7937a6da18915b8c3bd07ed3b1f8e989e9c639ed73677bcc194278a2800759740ac9c8a0e7c4b445fc4363f9f54cd42ccb3ae19d988e62e108ab5ee774891ba4adb8c439559901ef61b8c323701dcf178effbcefd53e6fee8c1b498078a1c197970661a603d0545eacfd3f23c4c536daa08e28f"}, {0xc0, 0x0, 0x0, "5b36b40757580f9a57fecc0f51be106ba94d4e8f2d6bf2eb23f0ebf1f8709ed94e93d361b03e4162ecff8072fa78742b862152de65b83f4de693fea119ba701cacb35e8bf8e15afdc566f509eea6b31525860f37d45dee62fd03406384b82475b81d688f804b333a9fc1d39a88fe4dc5a2301e78098ed09a56ef6bf90b4ddc314017330dfeee1aed1bc93005b459451deb465a11e47f5b229a1cbcba96a95fa8e2cb363a1a1f1fd926"}, {0x18, 0x0, 0x8, "9eb47dc7"}], 0x170}, 0xfffffffffffffffc) 2018/03/06 00:07:35 executing program 5: perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)=@l2, 0x80, &(0x7f0000000180)=[{&(0x7f0000000040)=""/131, 0x83}], 0x1, &(0x7f0000000380)=""/4096, 0x1000}, 0x0) socketpair$inet(0x2, 0x0, 0x6, &(0x7f0000001400)) sendmsg(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000100)=[], 0x0, &(0x7f00000018c0)=[{0x98, 0x0, 0x0, "352ddb57571e3c59d39b4f05bd1f98e7937a6da18915b8c3bd07ed3b1f8e989e9c639ed73677bcc194278a2800759740ac9c8a0e7c4b445fc4363f9f54cd42ccb3ae19d988e62e108ab5ee774891ba4adb8c439559901ef61b8c323701dcf178effbcefd53e6fee8c1b498078a1c197970661a603d0545eacfd3f23c4c536daa08e28f"}, {0xc0, 0x0, 0x0, "5b36b40757580f9a57fecc0f51be106ba94d4e8f2d6bf2eb23f0ebf1f8709ed94e93d361b03e4162ecff8072fa78742b862152de65b83f4de693fea119ba701cacb35e8bf8e15afdc566f509eea6b31525860f37d45dee62fd03406384b82475b81d688f804b333a9fc1d39a88fe4dc5a2301e78098ed09a56ef6bf90b4ddc314017330dfeee1aed1bc93005b459451deb465a11e47f5b229a1cbcba96a95fa8e2cb363a1a1f1fd926"}, {0x18, 0x0, 0x8, "9eb47dc7"}], 0x170}, 0xfffffffffffffffc) 2018/03/06 00:07:35 executing program 4: socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000)=[], 0x0, &(0x7f0000298000)=[{0x18, 0x1, 0x1, "13"}], 0x18}, 0x0) 2018/03/06 00:07:35 executing program 3: perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)=@l2, 0x80, &(0x7f0000000180)=[{&(0x7f0000000040)=""/131, 0x83}], 0x1, &(0x7f0000000380)=""/4096, 0x1000}, 0x0) socketpair$inet(0x2, 0x0, 0x6, &(0x7f0000001400)) sendmsg(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000100)=[], 0x0, &(0x7f00000018c0)=[{0x98, 0x0, 0x0, "352ddb57571e3c59d39b4f05bd1f98e7937a6da18915b8c3bd07ed3b1f8e989e9c639ed73677bcc194278a2800759740ac9c8a0e7c4b445fc4363f9f54cd42ccb3ae19d988e62e108ab5ee774891ba4adb8c439559901ef61b8c323701dcf178effbcefd53e6fee8c1b498078a1c197970661a603d0545eacfd3f23c4c536daa08e28f"}, {0xc0, 0x0, 0x0, "5b36b40757580f9a57fecc0f51be106ba94d4e8f2d6bf2eb23f0ebf1f8709ed94e93d361b03e4162ecff8072fa78742b862152de65b83f4de693fea119ba701cacb35e8bf8e15afdc566f509eea6b31525860f37d45dee62fd03406384b82475b81d688f804b333a9fc1d39a88fe4dc5a2301e78098ed09a56ef6bf90b4ddc314017330dfeee1aed1bc93005b459451deb465a11e47f5b229a1cbcba96a95fa8e2cb363a1a1f1fd926"}, {0x18, 0x0, 0x8, "9eb47dc7"}], 0x170}, 0xfffffffffffffffc) 2018/03/06 00:07:35 executing program 6: perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)=@l2, 0x80, &(0x7f0000000180)=[{&(0x7f0000000040)=""/131, 0x83}], 0x1, &(0x7f0000000380)=""/4096, 0x1000}, 0x0) socketpair$inet(0x2, 0x0, 0x6, &(0x7f0000001400)) sendmsg(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000100)=[], 0x0, &(0x7f00000018c0)=[{0x98, 0x0, 0x0, "352ddb57571e3c59d39b4f05bd1f98e7937a6da18915b8c3bd07ed3b1f8e989e9c639ed73677bcc194278a2800759740ac9c8a0e7c4b445fc4363f9f54cd42ccb3ae19d988e62e108ab5ee774891ba4adb8c439559901ef61b8c323701dcf178effbcefd53e6fee8c1b498078a1c197970661a603d0545eacfd3f23c4c536daa08e28f"}, {0xc0, 0x0, 0x0, "5b36b40757580f9a57fecc0f51be106ba94d4e8f2d6bf2eb23f0ebf1f8709ed94e93d361b03e4162ecff8072fa78742b862152de65b83f4de693fea119ba701cacb35e8bf8e15afdc566f509eea6b31525860f37d45dee62fd03406384b82475b81d688f804b333a9fc1d39a88fe4dc5a2301e78098ed09a56ef6bf90b4ddc314017330dfeee1aed1bc93005b459451deb465a11e47f5b229a1cbcba96a95fa8e2cb363a1a1f1fd926"}, {0x18, 0x0, 0x8, "9eb47dc7"}], 0x170}, 0xfffffffffffffffc) 2018/03/06 00:07:35 executing program 1: socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000)=[], 0x0, &(0x7f0000298000)=[{0x18, 0x1, 0x1, "13"}], 0x18}, 0x0) 2018/03/06 00:07:35 executing program 0: socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000)=[], 0x0, &(0x7f0000298000)=[{0x18, 0x1, 0x1, "13"}], 0x18}, 0x0) 2018/03/06 00:07:35 executing program 2: perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)=@l2, 0x80, &(0x7f0000000180)=[{&(0x7f0000000040)=""/131, 0x83}], 0x1, &(0x7f0000000380)=""/4096, 0x1000}, 0x0) socketpair$inet(0x2, 0x0, 0x6, &(0x7f0000001400)) sendmsg(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000100)=[], 0x0, &(0x7f00000018c0)=[{0x98, 0x0, 0x0, "352ddb57571e3c59d39b4f05bd1f98e7937a6da18915b8c3bd07ed3b1f8e989e9c639ed73677bcc194278a2800759740ac9c8a0e7c4b445fc4363f9f54cd42ccb3ae19d988e62e108ab5ee774891ba4adb8c439559901ef61b8c323701dcf178effbcefd53e6fee8c1b498078a1c197970661a603d0545eacfd3f23c4c536daa08e28f"}, {0xc0, 0x0, 0x0, "5b36b40757580f9a57fecc0f51be106ba94d4e8f2d6bf2eb23f0ebf1f8709ed94e93d361b03e4162ecff8072fa78742b862152de65b83f4de693fea119ba701cacb35e8bf8e15afdc566f509eea6b31525860f37d45dee62fd03406384b82475b81d688f804b333a9fc1d39a88fe4dc5a2301e78098ed09a56ef6bf90b4ddc314017330dfeee1aed1bc93005b459451deb465a11e47f5b229a1cbcba96a95fa8e2cb363a1a1f1fd926"}, {0x18, 0x0, 0x8, "9eb47dc7"}], 0x170}, 0xfffffffffffffffc) 2018/03/06 00:07:35 executing program 7: socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000)=[], 0x0, &(0x7f0000298000)=[{0x18, 0x1, 0x1, "13"}], 0x18}, 0x0) 2018/03/06 00:07:35 executing program 7: socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000)=[], 0x0, &(0x7f0000298000)=[{0x18, 0x1, 0x1, "13"}], 0x18}, 0x0) 2018/03/06 00:07:35 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xa, 0xff, 0x6, 0x9, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={r0, 0xffffffffffffffff, 0x4}, 0x10) 2018/03/06 00:07:35 executing program 3: perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)=@l2, 0x80, &(0x7f0000000180)=[{&(0x7f0000000040)=""/131, 0x83}], 0x1, &(0x7f0000000380)=""/4096, 0x1000}, 0x0) socketpair$inet(0x2, 0x0, 0x6, &(0x7f0000001400)) sendmsg(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000100)=[], 0x0, &(0x7f00000018c0)=[{0x98, 0x0, 0x0, "352ddb57571e3c59d39b4f05bd1f98e7937a6da18915b8c3bd07ed3b1f8e989e9c639ed73677bcc194278a2800759740ac9c8a0e7c4b445fc4363f9f54cd42ccb3ae19d988e62e108ab5ee774891ba4adb8c439559901ef61b8c323701dcf178effbcefd53e6fee8c1b498078a1c197970661a603d0545eacfd3f23c4c536daa08e28f"}, {0xc0, 0x0, 0x0, "5b36b40757580f9a57fecc0f51be106ba94d4e8f2d6bf2eb23f0ebf1f8709ed94e93d361b03e4162ecff8072fa78742b862152de65b83f4de693fea119ba701cacb35e8bf8e15afdc566f509eea6b31525860f37d45dee62fd03406384b82475b81d688f804b333a9fc1d39a88fe4dc5a2301e78098ed09a56ef6bf90b4ddc314017330dfeee1aed1bc93005b459451deb465a11e47f5b229a1cbcba96a95fa8e2cb363a1a1f1fd926"}, {0x18, 0x0, 0x8, "9eb47dc7"}], 0x170}, 0xfffffffffffffffc) 2018/03/06 00:07:35 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0xd5}, 0x3eb) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r0, 0x0, 0xf, 0x83, &(0x7f0000000100)="714b80797dbc5ff1de3086de78ea71", &(0x7f0000000200)=""/131}, 0x28) 2018/03/06 00:07:35 executing program 0: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1000, 0x0) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) mount(&(0x7f0000000840)='.', &(0x7f0000000880)='.', &(0x7f00000008c0)='coda\x00', 0x5018, 0x0) mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f00000e7000)) 2018/03/06 00:07:35 executing program 1: socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000)=[], 0x0, &(0x7f0000298000)=[{0x18, 0x1, 0x1, "13"}], 0x18}, 0x0) 2018/03/06 00:07:35 executing program 2: perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)=@l2, 0x80, &(0x7f0000000180)=[{&(0x7f0000000040)=""/131, 0x83}], 0x1, &(0x7f0000000380)=""/4096, 0x1000}, 0x0) socketpair$inet(0x2, 0x0, 0x6, &(0x7f0000001400)) sendmsg(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000100)=[], 0x0, &(0x7f00000018c0)=[{0x98, 0x0, 0x0, "352ddb57571e3c59d39b4f05bd1f98e7937a6da18915b8c3bd07ed3b1f8e989e9c639ed73677bcc194278a2800759740ac9c8a0e7c4b445fc4363f9f54cd42ccb3ae19d988e62e108ab5ee774891ba4adb8c439559901ef61b8c323701dcf178effbcefd53e6fee8c1b498078a1c197970661a603d0545eacfd3f23c4c536daa08e28f"}, {0xc0, 0x0, 0x0, "5b36b40757580f9a57fecc0f51be106ba94d4e8f2d6bf2eb23f0ebf1f8709ed94e93d361b03e4162ecff8072fa78742b862152de65b83f4de693fea119ba701cacb35e8bf8e15afdc566f509eea6b31525860f37d45dee62fd03406384b82475b81d688f804b333a9fc1d39a88fe4dc5a2301e78098ed09a56ef6bf90b4ddc314017330dfeee1aed1bc93005b459451deb465a11e47f5b229a1cbcba96a95fa8e2cb363a1a1f1fd926"}, {0x18, 0x0, 0x8, "9eb47dc7"}], 0x170}, 0xfffffffffffffffc) 2018/03/06 00:07:35 executing program 5: socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r0) sendmsg$kcm(r1, &(0x7f0000002700)={&(0x7f0000000040)=@l2={0x1f}, 0xe, &(0x7f0000001480)=[], 0x0, &(0x7f0000000040)=[]}, 0x0) 2018/03/06 00:07:35 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xa, 0xff, 0x6, 0x9, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={r0, 0xffffffffffffffff, 0x4}, 0x10) 2018/03/06 00:07:35 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0xd5}, 0x3eb) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r0, 0x0, 0xf, 0x83, &(0x7f0000000100)="714b80797dbc5ff1de3086de78ea71", &(0x7f0000000200)=""/131}, 0x28) 2018/03/06 00:07:35 executing program 5: socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r0) sendmsg$kcm(r1, &(0x7f0000002700)={&(0x7f0000000040)=@l2={0x1f}, 0xe, &(0x7f0000001480)=[], 0x0, &(0x7f0000000040)=[]}, 0x0) 2018/03/06 00:07:35 executing program 7: socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r0) sendmsg$kcm(r1, &(0x7f0000002700)={&(0x7f0000000040)=@l2={0x1f}, 0xe, &(0x7f0000001480)=[], 0x0, &(0x7f0000000040)=[]}, 0x0) 2018/03/06 00:07:35 executing program 1: socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r0) sendmsg$kcm(r1, &(0x7f0000002700)={&(0x7f0000000040)=@l2={0x1f}, 0xe, &(0x7f0000001480)=[], 0x0, &(0x7f0000000040)=[]}, 0x0) 2018/03/06 00:07:35 executing program 3: perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)=@l2, 0x80, &(0x7f0000000180)=[{&(0x7f0000000040)=""/131, 0x83}], 0x1, &(0x7f0000000380)=""/4096, 0x1000}, 0x0) socketpair$inet(0x2, 0x0, 0x6, &(0x7f0000001400)) sendmsg(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000100)=[], 0x0, &(0x7f00000018c0)=[{0x98, 0x0, 0x0, "352ddb57571e3c59d39b4f05bd1f98e7937a6da18915b8c3bd07ed3b1f8e989e9c639ed73677bcc194278a2800759740ac9c8a0e7c4b445fc4363f9f54cd42ccb3ae19d988e62e108ab5ee774891ba4adb8c439559901ef61b8c323701dcf178effbcefd53e6fee8c1b498078a1c197970661a603d0545eacfd3f23c4c536daa08e28f"}, {0xc0, 0x0, 0x0, "5b36b40757580f9a57fecc0f51be106ba94d4e8f2d6bf2eb23f0ebf1f8709ed94e93d361b03e4162ecff8072fa78742b862152de65b83f4de693fea119ba701cacb35e8bf8e15afdc566f509eea6b31525860f37d45dee62fd03406384b82475b81d688f804b333a9fc1d39a88fe4dc5a2301e78098ed09a56ef6bf90b4ddc314017330dfeee1aed1bc93005b459451deb465a11e47f5b229a1cbcba96a95fa8e2cb363a1a1f1fd926"}, {0x18, 0x0, 0x8, "9eb47dc7"}], 0x170}, 0xfffffffffffffffc) 2018/03/06 00:07:35 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xa, 0xff, 0x6, 0x9, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={r0, 0xffffffffffffffff, 0x4}, 0x10) 2018/03/06 00:07:35 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xa, 0xff, 0x6, 0x9, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={r0, 0xffffffffffffffff, 0x4}, 0x10) 2018/03/06 00:07:35 executing program 0: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1000, 0x0) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) mount(&(0x7f0000000840)='.', &(0x7f0000000880)='.', &(0x7f00000008c0)='coda\x00', 0x5018, 0x0) mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f00000e7000)) 2018/03/06 00:07:35 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0xd5}, 0x3eb) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r0, 0x0, 0xf, 0x83, &(0x7f0000000100)="714b80797dbc5ff1de3086de78ea71", &(0x7f0000000200)=""/131}, 0x28) 2018/03/06 00:07:35 executing program 7: socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r0) sendmsg$kcm(r1, &(0x7f0000002700)={&(0x7f0000000040)=@l2={0x1f}, 0xe, &(0x7f0000001480)=[], 0x0, &(0x7f0000000040)=[]}, 0x0) 2018/03/06 00:07:35 executing program 5: socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r0) sendmsg$kcm(r1, &(0x7f0000002700)={&(0x7f0000000040)=@l2={0x1f}, 0xe, &(0x7f0000001480)=[], 0x0, &(0x7f0000000040)=[]}, 0x0) 2018/03/06 00:07:35 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xa, 0xff, 0x6, 0x9, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={r0, 0xffffffffffffffff, 0x4}, 0x10) 2018/03/06 00:07:35 executing program 6: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1000, 0x0) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) mount(&(0x7f0000000840)='.', &(0x7f0000000880)='.', &(0x7f00000008c0)='coda\x00', 0x5018, 0x0) mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f00000e7000)) 2018/03/06 00:07:35 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xa, 0xff, 0x6, 0x9, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={r0, 0xffffffffffffffff, 0x4}, 0x10) 2018/03/06 00:07:35 executing program 7: socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r0) sendmsg$kcm(r1, &(0x7f0000002700)={&(0x7f0000000040)=@l2={0x1f}, 0xe, &(0x7f0000001480)=[], 0x0, &(0x7f0000000040)=[]}, 0x0) 2018/03/06 00:07:35 executing program 4: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1000, 0x0) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) mount(&(0x7f0000000840)='.', &(0x7f0000000880)='.', &(0x7f00000008c0)='coda\x00', 0x5018, 0x0) mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f00000e7000)) 2018/03/06 00:07:35 executing program 1: socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r0) sendmsg$kcm(r1, &(0x7f0000002700)={&(0x7f0000000040)=@l2={0x1f}, 0xe, &(0x7f0000001480)=[], 0x0, &(0x7f0000000040)=[]}, 0x0) 2018/03/06 00:07:35 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1000, 0x0) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) mount(&(0x7f0000000840)='.', &(0x7f0000000880)='.', &(0x7f00000008c0)='coda\x00', 0x5018, 0x0) mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f00000e7000)) 2018/03/06 00:07:35 executing program 0: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1000, 0x0) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) mount(&(0x7f0000000840)='.', &(0x7f0000000880)='.', &(0x7f00000008c0)='coda\x00', 0x5018, 0x0) mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f00000e7000)) 2018/03/06 00:07:35 executing program 5: socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r0) sendmsg$kcm(r1, &(0x7f0000002700)={&(0x7f0000000040)=@l2={0x1f}, 0xe, &(0x7f0000001480)=[], 0x0, &(0x7f0000000040)=[]}, 0x0) 2018/03/06 00:07:35 executing program 1: socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r0) sendmsg$kcm(r1, &(0x7f0000002700)={&(0x7f0000000040)=@l2={0x1f}, 0xe, &(0x7f0000001480)=[], 0x0, &(0x7f0000000040)=[]}, 0x0) 2018/03/06 00:07:35 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xa, 0xff, 0x6, 0x9, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={r0, 0xffffffffffffffff, 0x4}, 0x10) 2018/03/06 00:07:35 executing program 7: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1000, 0x0) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) mount(&(0x7f0000000840)='.', &(0x7f0000000880)='.', &(0x7f00000008c0)='coda\x00', 0x5018, 0x0) mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f00000e7000)) 2018/03/06 00:07:35 executing program 5: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1000, 0x0) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) mount(&(0x7f0000000840)='.', &(0x7f0000000880)='.', &(0x7f00000008c0)='coda\x00', 0x5018, 0x0) mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f00000e7000)) 2018/03/06 00:07:35 executing program 4: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1000, 0x0) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) mount(&(0x7f0000000840)='.', &(0x7f0000000880)='.', &(0x7f00000008c0)='coda\x00', 0x5018, 0x0) mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f00000e7000)) 2018/03/06 00:07:35 executing program 6: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1000, 0x0) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) mount(&(0x7f0000000840)='.', &(0x7f0000000880)='.', &(0x7f00000008c0)='coda\x00', 0x5018, 0x0) mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f00000e7000)) 2018/03/06 00:07:35 executing program 2: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) 2018/03/06 00:07:35 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1000, 0x0) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) mount(&(0x7f0000000840)='.', &(0x7f0000000880)='.', &(0x7f00000008c0)='coda\x00', 0x5018, 0x0) mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f00000e7000)) 2018/03/06 00:07:35 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x83, 0xb, 0x1ff, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000001100)={r0, &(0x7f0000000080), &(0x7f0000000100)}, 0x20) 2018/03/06 00:07:35 executing program 5: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1000, 0x0) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) mount(&(0x7f0000000840)='.', &(0x7f0000000880)='.', &(0x7f00000008c0)='coda\x00', 0x5018, 0x0) mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f00000e7000)) 2018/03/06 00:07:35 executing program 0: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1000, 0x0) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) mount(&(0x7f0000000840)='.', &(0x7f0000000880)='.', &(0x7f00000008c0)='coda\x00', 0x5018, 0x0) mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f00000e7000)) 2018/03/06 00:07:35 executing program 2: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) 2018/03/06 00:07:36 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x83, 0xb, 0x1ff, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000001100)={r0, &(0x7f0000000080), &(0x7f0000000100)}, 0x20) 2018/03/06 00:07:36 executing program 7: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1000, 0x0) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) mount(&(0x7f0000000840)='.', &(0x7f0000000880)='.', &(0x7f00000008c0)='coda\x00', 0x5018, 0x0) mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f00000e7000)) 2018/03/06 00:07:36 executing program 2: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) 2018/03/06 00:07:36 executing program 5: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1000, 0x0) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) mount(&(0x7f0000000840)='.', &(0x7f0000000880)='.', &(0x7f00000008c0)='coda\x00', 0x5018, 0x0) mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f00000e7000)) 2018/03/06 00:07:36 executing program 4: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1000, 0x0) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) mount(&(0x7f0000000840)='.', &(0x7f0000000880)='.', &(0x7f00000008c0)='coda\x00', 0x5018, 0x0) mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f00000e7000)) 2018/03/06 00:07:36 executing program 6: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1000, 0x0) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) mount(&(0x7f0000000840)='.', &(0x7f0000000880)='.', &(0x7f00000008c0)='coda\x00', 0x5018, 0x0) mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f00000e7000)) 2018/03/06 00:07:36 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1000, 0x0) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) mount(&(0x7f0000000840)='.', &(0x7f0000000880)='.', &(0x7f00000008c0)='coda\x00', 0x5018, 0x0) mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f00000e7000)) 2018/03/06 00:07:36 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x83, 0xb, 0x1ff, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000001100)={r0, &(0x7f0000000080), &(0x7f0000000100)}, 0x20) 2018/03/06 00:07:36 executing program 2: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) 2018/03/06 00:07:36 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x83, 0xb, 0x1ff, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000001100)={r0, &(0x7f0000000080), &(0x7f0000000100)}, 0x20) 2018/03/06 00:07:36 executing program 7: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1000, 0x0) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) mount(&(0x7f0000000840)='.', &(0x7f0000000880)='.', &(0x7f00000008c0)='coda\x00', 0x5018, 0x0) mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f00000e7000)) 2018/03/06 00:07:36 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000)=[], 0x0, &(0x7f0000298000)=[]}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x4e20, 0x0, @ipv4={[], [0xff, 0xff], @empty}}}}, 0x3a, &(0x7f0000000400)=[]}, 0x0) close(r0) close(r1) 2018/03/06 00:07:36 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x83, 0xb, 0x1ff, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000001100)={r0, &(0x7f0000000080), &(0x7f0000000100)}, 0x20) 2018/03/06 00:07:36 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x83, 0xb, 0x1ff, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000001100)={r0, &(0x7f0000000080), &(0x7f0000000100)}, 0x20) 2018/03/06 00:07:36 executing program 7: socketpair(0x1e, 0x801, 0x0, &(0x7f0000000000)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000000)=@vsock={0x0, 0x0, 0x0, @any}, 0x10, &(0x7f0000000040)=[], 0x1dd, &(0x7f00000000c0)=""/105, 0xffffff2c}, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)=[], 0x28a, &(0x7f0000000000)=[]}, 0x0) recvmsg$kcm(r0, &(0x7f0000000280)={&(0x7f0000000240)=@ipx, 0x10, &(0x7f0000002180)=[{&(0x7f0000000d00)=""/148, 0x4c}, {&(0x7f0000000dc0)=""/222, 0x3d6}, {&(0x7f0000000ec0)=""/4096, 0xfffffe2b}, {&(0x7f0000001ec0)=""/255, 0xff}, {&(0x7f0000001fc0)=""/140, 0x8c}, {&(0x7f0000002080)=""/77, 0x4d}, {&(0x7f0000000280)=""/50, 0x32}, {&(0x7f0000002100)=""/107, 0x6b}], 0x8, &(0x7f0000002200)=""/89, 0x59}, 0x0) 2018/03/06 00:07:36 executing program 6: mkdir(&(0x7f0000000e00)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f00000002c0)) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000001c0)='rpc_pipefs\x00', 0x0, &(0x7f0000000200)) 2018/03/06 00:07:36 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x3, 0x4, 0x4, 0x1, 0x0, 0x1}, 0x2c) perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f00000011c0)={0xc, 0x5, &(0x7f0000000000)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95}}, &(0x7f0000000180)='GPL\x00', 0xbeeb, 0x1000, &(0x7f00000001c0)=""/4096, 0x0, 0x1}, 0x48) 2018/03/06 00:07:36 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x83, 0xb, 0x1ff, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000001100)={r0, &(0x7f0000000080), &(0x7f0000000100)}, 0x20) 2018/03/06 00:07:36 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x83, 0xb, 0x1ff, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000001100)={r0, &(0x7f0000000080), &(0x7f0000000100)}, 0x20) 2018/03/06 00:07:36 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x83, 0xb, 0x1ff, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000001100)={r0, &(0x7f0000000080), &(0x7f0000000100)}, 0x20) 2018/03/06 00:07:36 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x83, 0xb, 0x1ff, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000001100)={r0, &(0x7f0000000080), &(0x7f0000000100)}, 0x20) 2018/03/06 00:07:36 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x83, 0xb, 0x1ff, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000001100)={r0, &(0x7f0000000080), &(0x7f0000000100)}, 0x20) 2018/03/06 00:07:36 executing program 6: mkdir(&(0x7f0000000e00)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f00000002c0)) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000001c0)='rpc_pipefs\x00', 0x0, &(0x7f0000000200)) 2018/03/06 00:07:36 executing program 1: mkdir(&(0x7f0000000e00)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f00000002c0)) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000001c0)='rpc_pipefs\x00', 0x0, &(0x7f0000000200)) 2018/03/06 00:07:36 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x3, 0x4, 0x4, 0x1, 0x0, 0x1}, 0x2c) perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f00000011c0)={0xc, 0x5, &(0x7f0000000000)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95}}, &(0x7f0000000180)='GPL\x00', 0xbeeb, 0x1000, &(0x7f00000001c0)=""/4096, 0x0, 0x1}, 0x48) 2018/03/06 00:07:36 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x3, 0x4, 0x4, 0x1, 0x0, 0x1}, 0x2c) perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f00000011c0)={0xc, 0x5, &(0x7f0000000000)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95}}, &(0x7f0000000180)='GPL\x00', 0xbeeb, 0x1000, &(0x7f00000001c0)=""/4096, 0x0, 0x1}, 0x48) 2018/03/06 00:07:36 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000)=[], 0x0, &(0x7f0000298000)=[]}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x4e20, 0x0, @ipv4={[], [0xff, 0xff], @empty}}}}, 0x3a, &(0x7f0000000400)=[]}, 0x0) close(r0) close(r1) 2018/03/06 00:07:36 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x83, 0xb, 0x1ff, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000001100)={r0, &(0x7f0000000080), &(0x7f0000000100)}, 0x20) 2018/03/06 00:07:36 executing program 7: socketpair(0x1e, 0x801, 0x0, &(0x7f0000000000)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000000)=@vsock={0x0, 0x0, 0x0, @any}, 0x10, &(0x7f0000000040)=[], 0x1dd, &(0x7f00000000c0)=""/105, 0xffffff2c}, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)=[], 0x28a, &(0x7f0000000000)=[]}, 0x0) recvmsg$kcm(r0, &(0x7f0000000280)={&(0x7f0000000240)=@ipx, 0x10, &(0x7f0000002180)=[{&(0x7f0000000d00)=""/148, 0x4c}, {&(0x7f0000000dc0)=""/222, 0x3d6}, {&(0x7f0000000ec0)=""/4096, 0xfffffe2b}, {&(0x7f0000001ec0)=""/255, 0xff}, {&(0x7f0000001fc0)=""/140, 0x8c}, {&(0x7f0000002080)=""/77, 0x4d}, {&(0x7f0000000280)=""/50, 0x32}, {&(0x7f0000002100)=""/107, 0x6b}], 0x8, &(0x7f0000002200)=""/89, 0x59}, 0x0) 2018/03/06 00:07:36 executing program 6: mkdir(&(0x7f0000000e00)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f00000002c0)) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000001c0)='rpc_pipefs\x00', 0x0, &(0x7f0000000200)) 2018/03/06 00:07:36 executing program 7: socketpair(0x1e, 0x801, 0x0, &(0x7f0000000000)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000000)=@vsock={0x0, 0x0, 0x0, @any}, 0x10, &(0x7f0000000040)=[], 0x1dd, &(0x7f00000000c0)=""/105, 0xffffff2c}, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)=[], 0x28a, &(0x7f0000000000)=[]}, 0x0) recvmsg$kcm(r0, &(0x7f0000000280)={&(0x7f0000000240)=@ipx, 0x10, &(0x7f0000002180)=[{&(0x7f0000000d00)=""/148, 0x4c}, {&(0x7f0000000dc0)=""/222, 0x3d6}, {&(0x7f0000000ec0)=""/4096, 0xfffffe2b}, {&(0x7f0000001ec0)=""/255, 0xff}, {&(0x7f0000001fc0)=""/140, 0x8c}, {&(0x7f0000002080)=""/77, 0x4d}, {&(0x7f0000000280)=""/50, 0x32}, {&(0x7f0000002100)=""/107, 0x6b}], 0x8, &(0x7f0000002200)=""/89, 0x59}, 0x0) 2018/03/06 00:07:36 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x83, 0xb, 0x1ff, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000001100)={r0, &(0x7f0000000080), &(0x7f0000000100)}, 0x20) 2018/03/06 00:07:36 executing program 4: socketpair(0x1e, 0x801, 0x0, &(0x7f0000000000)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000000)=@vsock={0x0, 0x0, 0x0, @any}, 0x10, &(0x7f0000000040)=[], 0x1dd, &(0x7f00000000c0)=""/105, 0xffffff2c}, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)=[], 0x28a, &(0x7f0000000000)=[]}, 0x0) recvmsg$kcm(r0, &(0x7f0000000280)={&(0x7f0000000240)=@ipx, 0x10, &(0x7f0000002180)=[{&(0x7f0000000d00)=""/148, 0x4c}, {&(0x7f0000000dc0)=""/222, 0x3d6}, {&(0x7f0000000ec0)=""/4096, 0xfffffe2b}, {&(0x7f0000001ec0)=""/255, 0xff}, {&(0x7f0000001fc0)=""/140, 0x8c}, {&(0x7f0000002080)=""/77, 0x4d}, {&(0x7f0000000280)=""/50, 0x32}, {&(0x7f0000002100)=""/107, 0x6b}], 0x8, &(0x7f0000002200)=""/89, 0x59}, 0x0) 2018/03/06 00:07:36 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x3, 0x4, 0x4, 0x1, 0x0, 0x1}, 0x2c) perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f00000011c0)={0xc, 0x5, &(0x7f0000000000)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95}}, &(0x7f0000000180)='GPL\x00', 0xbeeb, 0x1000, &(0x7f00000001c0)=""/4096, 0x0, 0x1}, 0x48) 2018/03/06 00:07:36 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x3, 0x4, 0x4, 0x1, 0x0, 0x1}, 0x2c) perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f00000011c0)={0xc, 0x5, &(0x7f0000000000)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95}}, &(0x7f0000000180)='GPL\x00', 0xbeeb, 0x1000, &(0x7f00000001c0)=""/4096, 0x0, 0x1}, 0x48) 2018/03/06 00:07:36 executing program 1: mkdir(&(0x7f0000000e00)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f00000002c0)) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000001c0)='rpc_pipefs\x00', 0x0, &(0x7f0000000200)) 2018/03/06 00:07:36 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000)=[], 0x0, &(0x7f0000298000)=[]}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x4e20, 0x0, @ipv4={[], [0xff, 0xff], @empty}}}}, 0x3a, &(0x7f0000000400)=[]}, 0x0) close(r0) close(r1) 2018/03/06 00:07:36 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000)=[], 0x0, &(0x7f0000298000)=[]}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x4e20, 0x0, @ipv4={[], [0xff, 0xff], @empty}}}}, 0x3a, &(0x7f0000000400)=[]}, 0x0) close(r0) close(r1) 2018/03/06 00:07:36 executing program 7: socketpair(0x1e, 0x801, 0x0, &(0x7f0000000000)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000000)=@vsock={0x0, 0x0, 0x0, @any}, 0x10, &(0x7f0000000040)=[], 0x1dd, &(0x7f00000000c0)=""/105, 0xffffff2c}, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)=[], 0x28a, &(0x7f0000000000)=[]}, 0x0) recvmsg$kcm(r0, &(0x7f0000000280)={&(0x7f0000000240)=@ipx, 0x10, &(0x7f0000002180)=[{&(0x7f0000000d00)=""/148, 0x4c}, {&(0x7f0000000dc0)=""/222, 0x3d6}, {&(0x7f0000000ec0)=""/4096, 0xfffffe2b}, {&(0x7f0000001ec0)=""/255, 0xff}, {&(0x7f0000001fc0)=""/140, 0x8c}, {&(0x7f0000002080)=""/77, 0x4d}, {&(0x7f0000000280)=""/50, 0x32}, {&(0x7f0000002100)=""/107, 0x6b}], 0x8, &(0x7f0000002200)=""/89, 0x59}, 0x0) 2018/03/06 00:07:36 executing program 4: socketpair(0x1e, 0x801, 0x0, &(0x7f0000000000)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000000)=@vsock={0x0, 0x0, 0x0, @any}, 0x10, &(0x7f0000000040)=[], 0x1dd, &(0x7f00000000c0)=""/105, 0xffffff2c}, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)=[], 0x28a, &(0x7f0000000000)=[]}, 0x0) recvmsg$kcm(r0, &(0x7f0000000280)={&(0x7f0000000240)=@ipx, 0x10, &(0x7f0000002180)=[{&(0x7f0000000d00)=""/148, 0x4c}, {&(0x7f0000000dc0)=""/222, 0x3d6}, {&(0x7f0000000ec0)=""/4096, 0xfffffe2b}, {&(0x7f0000001ec0)=""/255, 0xff}, {&(0x7f0000001fc0)=""/140, 0x8c}, {&(0x7f0000002080)=""/77, 0x4d}, {&(0x7f0000000280)=""/50, 0x32}, {&(0x7f0000002100)=""/107, 0x6b}], 0x8, &(0x7f0000002200)=""/89, 0x59}, 0x0) 2018/03/06 00:07:36 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x3, 0x4, 0x4, 0x1, 0x0, 0x1}, 0x2c) perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f00000011c0)={0xc, 0x5, &(0x7f0000000000)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95}}, &(0x7f0000000180)='GPL\x00', 0xbeeb, 0x1000, &(0x7f00000001c0)=""/4096, 0x0, 0x1}, 0x48) 2018/03/06 00:07:36 executing program 2: socketpair(0x1e, 0x801, 0x0, &(0x7f0000000000)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000000)=@vsock={0x0, 0x0, 0x0, @any}, 0x10, &(0x7f0000000040)=[], 0x1dd, &(0x7f00000000c0)=""/105, 0xffffff2c}, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)=[], 0x28a, &(0x7f0000000000)=[]}, 0x0) recvmsg$kcm(r0, &(0x7f0000000280)={&(0x7f0000000240)=@ipx, 0x10, &(0x7f0000002180)=[{&(0x7f0000000d00)=""/148, 0x4c}, {&(0x7f0000000dc0)=""/222, 0x3d6}, {&(0x7f0000000ec0)=""/4096, 0xfffffe2b}, {&(0x7f0000001ec0)=""/255, 0xff}, {&(0x7f0000001fc0)=""/140, 0x8c}, {&(0x7f0000002080)=""/77, 0x4d}, {&(0x7f0000000280)=""/50, 0x32}, {&(0x7f0000002100)=""/107, 0x6b}], 0x8, &(0x7f0000002200)=""/89, 0x59}, 0x0) 2018/03/06 00:07:36 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x3, 0x4, 0x4, 0x1, 0x0, 0x1}, 0x2c) perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f00000011c0)={0xc, 0x5, &(0x7f0000000000)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95}}, &(0x7f0000000180)='GPL\x00', 0xbeeb, 0x1000, &(0x7f00000001c0)=""/4096, 0x0, 0x1}, 0x48) [ 30.803828] IPVS: ftp: loaded support on port[0] = 21 [ 31.617764] IPVS: ftp: loaded support on port[0] = 21 2018/03/06 00:07:38 executing program 6: mkdir(&(0x7f0000000e00)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f00000002c0)) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000001c0)='rpc_pipefs\x00', 0x0, &(0x7f0000000200)) 2018/03/06 00:07:38 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x30000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000001c0)) 2018/03/06 00:07:38 executing program 2: socketpair(0x1e, 0x801, 0x0, &(0x7f0000000000)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000000)=@vsock={0x0, 0x0, 0x0, @any}, 0x10, &(0x7f0000000040)=[], 0x1dd, &(0x7f00000000c0)=""/105, 0xffffff2c}, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)=[], 0x28a, &(0x7f0000000000)=[]}, 0x0) recvmsg$kcm(r0, &(0x7f0000000280)={&(0x7f0000000240)=@ipx, 0x10, &(0x7f0000002180)=[{&(0x7f0000000d00)=""/148, 0x4c}, {&(0x7f0000000dc0)=""/222, 0x3d6}, {&(0x7f0000000ec0)=""/4096, 0xfffffe2b}, {&(0x7f0000001ec0)=""/255, 0xff}, {&(0x7f0000001fc0)=""/140, 0x8c}, {&(0x7f0000002080)=""/77, 0x4d}, {&(0x7f0000000280)=""/50, 0x32}, {&(0x7f0000002100)=""/107, 0x6b}], 0x8, &(0x7f0000002200)=""/89, 0x59}, 0x0) 2018/03/06 00:07:38 executing program 4: socketpair(0x1e, 0x801, 0x0, &(0x7f0000000000)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000000)=@vsock={0x0, 0x0, 0x0, @any}, 0x10, &(0x7f0000000040)=[], 0x1dd, &(0x7f00000000c0)=""/105, 0xffffff2c}, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)=[], 0x28a, &(0x7f0000000000)=[]}, 0x0) recvmsg$kcm(r0, &(0x7f0000000280)={&(0x7f0000000240)=@ipx, 0x10, &(0x7f0000002180)=[{&(0x7f0000000d00)=""/148, 0x4c}, {&(0x7f0000000dc0)=""/222, 0x3d6}, {&(0x7f0000000ec0)=""/4096, 0xfffffe2b}, {&(0x7f0000001ec0)=""/255, 0xff}, {&(0x7f0000001fc0)=""/140, 0x8c}, {&(0x7f0000002080)=""/77, 0x4d}, {&(0x7f0000000280)=""/50, 0x32}, {&(0x7f0000002100)=""/107, 0x6b}], 0x8, &(0x7f0000002200)=""/89, 0x59}, 0x0) 2018/03/06 00:07:38 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000)=[], 0x0, &(0x7f0000298000)=[]}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x4e20, 0x0, @ipv4={[], [0xff, 0xff], @empty}}}}, 0x3a, &(0x7f0000000400)=[]}, 0x0) close(r0) close(r1) 2018/03/06 00:07:38 executing program 5: mkdir(&(0x7f0000000e00)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f00000002c0)) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000001c0)='rpc_pipefs\x00', 0x0, &(0x7f0000000200)) 2018/03/06 00:07:38 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000)=[], 0x0, &(0x7f0000298000)=[]}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x4e20, 0x0, @ipv4={[], [0xff, 0xff], @empty}}}}, 0x3a, &(0x7f0000000400)=[]}, 0x0) close(r0) close(r1) 2018/03/06 00:07:38 executing program 1: mkdir(&(0x7f0000000e00)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f00000002c0)) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000001c0)='rpc_pipefs\x00', 0x0, &(0x7f0000000200)) 2018/03/06 00:07:38 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000)=[], 0x0, &(0x7f0000298000)=[]}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x4e20, 0x0, @ipv4={[], [0xff, 0xff], @empty}}}}, 0x3a, &(0x7f0000000400)=[]}, 0x0) close(r0) close(r1) 2018/03/06 00:07:38 executing program 2: socketpair(0x1e, 0x801, 0x0, &(0x7f0000000000)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000000)=@vsock={0x0, 0x0, 0x0, @any}, 0x10, &(0x7f0000000040)=[], 0x1dd, &(0x7f00000000c0)=""/105, 0xffffff2c}, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)=[], 0x28a, &(0x7f0000000000)=[]}, 0x0) recvmsg$kcm(r0, &(0x7f0000000280)={&(0x7f0000000240)=@ipx, 0x10, &(0x7f0000002180)=[{&(0x7f0000000d00)=""/148, 0x4c}, {&(0x7f0000000dc0)=""/222, 0x3d6}, {&(0x7f0000000ec0)=""/4096, 0xfffffe2b}, {&(0x7f0000001ec0)=""/255, 0xff}, {&(0x7f0000001fc0)=""/140, 0x8c}, {&(0x7f0000002080)=""/77, 0x4d}, {&(0x7f0000000280)=""/50, 0x32}, {&(0x7f0000002100)=""/107, 0x6b}], 0x8, &(0x7f0000002200)=""/89, 0x59}, 0x0) 2018/03/06 00:07:38 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x10, 0x4, 0x4, 0x5, 0x0, 0x1}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000100)={r0, &(0x7f0000000040)='U'}, 0x10) 2018/03/06 00:07:38 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000)=[], 0x0, &(0x7f0000298000)=[]}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x4e20, 0x0, @ipv4={[], [0xff, 0xff], @empty}}}}, 0x3a, &(0x7f0000000400)=[]}, 0x0) close(r0) close(r1) 2018/03/06 00:07:38 executing program 5: mkdir(&(0x7f0000000e00)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f00000002c0)) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000001c0)='rpc_pipefs\x00', 0x0, &(0x7f0000000200)) 2018/03/06 00:07:38 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x30000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000001c0)) 2018/03/06 00:07:38 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x30000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000001c0)) 2018/03/06 00:07:38 executing program 5: mkdir(&(0x7f0000000e00)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f00000002c0)) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000001c0)='rpc_pipefs\x00', 0x0, &(0x7f0000000200)) [ 32.522985] IPVS: ftp: loaded support on port[0] = 21 [ 32.549919] IPVS: ftp: loaded support on port[0] = 21 [ 33.442841] IPVS: ftp: loaded support on port[0] = 21 2018/03/06 00:07:39 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000)=[], 0x0, &(0x7f0000298000)=[]}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x4e20, 0x0, @ipv4={[], [0xff, 0xff], @empty}}}}, 0x3a, &(0x7f0000000400)=[]}, 0x0) close(r0) close(r1) 2018/03/06 00:07:39 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x5, 0x100000000209e20, 0x8000000001, 0x5}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r0, &(0x7f0000000340), &(0x7f0000000240)}, 0x20) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x13, 0x0, 0x7ffff9, 0x0, 0x20000003, 0x0}, 0x2c) 2018/03/06 00:07:39 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x30000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000001c0)) 2018/03/06 00:07:39 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x30000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000001c0)) 2018/03/06 00:07:39 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x10, 0x4, 0x4, 0x5, 0x0, 0x1}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000100)={r0, &(0x7f0000000040)='U'}, 0x10) 2018/03/06 00:07:39 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x10, 0x4, 0x4, 0x5, 0x0, 0x1}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000100)={r0, &(0x7f0000000040)='U'}, 0x10) 2018/03/06 00:07:39 executing program 6: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x6, 0x3, &(0x7f0000dbc000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2, 0xffffffb5}, [], {0x95}}, &(0x7f0000e6bffc)='GPL\x00', 0x2, 0x1d2, &(0x7f000000d000)=""/153}, 0x29d) 2018/03/06 00:07:39 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000)=[], 0x0, &(0x7f0000298000)=[]}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x4e20, 0x0, @ipv4={[], [0xff, 0xff], @empty}}}}, 0x3a, &(0x7f0000000400)=[]}, 0x0) close(r0) close(r1) 2018/03/06 00:07:39 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x10, 0x4, 0x4, 0x5, 0x0, 0x1}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000100)={r0, &(0x7f0000000040)='U'}, 0x10) 2018/03/06 00:07:39 executing program 3: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x28, &(0x7f0000000040)}, 0x10) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x10, 0x4, 0x4, 0x5, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r0, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) 2018/03/06 00:07:39 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x30000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000001c0)) 2018/03/06 00:07:39 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x10, 0x4, 0x4, 0x5, 0x0, 0x1}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000100)={r0, &(0x7f0000000040)='U'}, 0x10) 2018/03/06 00:07:39 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)=@raw=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x76, &(0x7f0000000080)=""/118}, 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x6, 0x4, 0x7, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000040), &(0x7f0000000100)}, 0x20) 2018/03/06 00:07:40 executing program 6: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x7}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x2, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x201a7f1b, 0x0, 0x201a7fd7, 0x1}], {0x95}}, &(0x7f0000000000)='GPL\x00', 0x3ff, 0xfb, &(0x7f00001a7f05)=""/251, 0x41000}, 0x48) 2018/03/06 00:07:40 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x5, 0x100000000209e20, 0x8000000001, 0x5}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r0, &(0x7f0000000340), &(0x7f0000000240)}, 0x20) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x13, 0x0, 0x7ffff9, 0x0, 0x20000003, 0x0}, 0x2c) [ 34.300371] IPVS: ftp: loaded support on port[0] = 21 2018/03/06 00:07:41 executing program 6: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x7}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x2, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x201a7f1b, 0x0, 0x201a7fd7, 0x1}], {0x95}}, &(0x7f0000000000)='GPL\x00', 0x3ff, 0xfb, &(0x7f00001a7f05)=""/251, 0x41000}, 0x48) 2018/03/06 00:07:41 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x30000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000001c0)) 2018/03/06 00:07:41 executing program 3: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x28, &(0x7f0000000040)}, 0x10) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x10, 0x4, 0x4, 0x5, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r0, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) 2018/03/06 00:07:41 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)=@raw=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x76, &(0x7f0000000080)=""/118}, 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x6, 0x4, 0x7, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000040), &(0x7f0000000100)}, 0x20) 2018/03/06 00:07:41 executing program 7: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x5, 0x100000000209e20, 0x8000000001, 0x5}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r0, &(0x7f0000000340), &(0x7f0000000240)}, 0x20) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x13, 0x0, 0x7ffff9, 0x0, 0x20000003, 0x0}, 0x2c) 2018/03/06 00:07:41 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x5, 0x100000000209e20, 0x8000000001, 0x5}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r0, &(0x7f0000000340), &(0x7f0000000240)}, 0x20) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x13, 0x0, 0x7ffff9, 0x0, 0x20000003, 0x0}, 0x2c) 2018/03/06 00:07:41 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x9, 0x3, &(0x7f0000dbc000)=ANY=[@ANYBLOB="850000000800000027000000000000009500020000000000"], &(0x7f0000000000)='GPL\x00', 0x1, 0x99, &(0x7f0000000580)=""/153}, 0x48) 2018/03/06 00:07:41 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x10, 0x4, 0x4, 0x5, 0x0, 0x1}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000100)={r0, &(0x7f0000000040)='U'}, 0x10) [ 35.107870] IPVS: ftp: loaded support on port[0] = 21 2018/03/06 00:07:41 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)=@raw=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x76, &(0x7f0000000080)=""/118}, 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x6, 0x4, 0x7, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000040), &(0x7f0000000100)}, 0x20) 2018/03/06 00:07:41 executing program 6: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x7}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x2, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x201a7f1b, 0x0, 0x201a7fd7, 0x1}], {0x95}}, &(0x7f0000000000)='GPL\x00', 0x3ff, 0xfb, &(0x7f00001a7f05)=""/251, 0x41000}, 0x48) 2018/03/06 00:07:41 executing program 3: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x28, &(0x7f0000000040)}, 0x10) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x10, 0x4, 0x4, 0x5, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r0, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) 2018/03/06 00:07:41 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x10, 0x4, 0x4, 0x5, 0x0, 0x1}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000100)={r0, &(0x7f0000000040)='U'}, 0x10) 2018/03/06 00:07:41 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x5, 0x9, 0x5, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000180), &(0x7f00000001c0), 0x2}, 0x20) 2018/03/06 00:07:41 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x5, 0x100000000209e20, 0x8000000001, 0x5}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r0, &(0x7f0000000340), &(0x7f0000000240)}, 0x20) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x13, 0x0, 0x7ffff9, 0x0, 0x20000003, 0x0}, 0x2c) 2018/03/06 00:07:41 executing program 1: bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={0xffffffffffffffff, 0x7, 0x0, 0x0, &(0x7f00000000c0)=[]}, 0x20) 2018/03/06 00:07:41 executing program 7: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x5, 0x100000000209e20, 0x8000000001, 0x5}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r0, &(0x7f0000000340), &(0x7f0000000240)}, 0x20) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x13, 0x0, 0x7ffff9, 0x0, 0x20000003, 0x0}, 0x2c) 2018/03/06 00:07:41 executing program 6: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x7}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x2, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x201a7f1b, 0x0, 0x201a7fd7, 0x1}], {0x95}}, &(0x7f0000000000)='GPL\x00', 0x3ff, 0xfb, &(0x7f00001a7f05)=""/251, 0x41000}, 0x48) 2018/03/06 00:07:41 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x5, 0x9, 0x5, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000180), &(0x7f00000001c0), 0x2}, 0x20) 2018/03/06 00:07:41 executing program 3: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x28, &(0x7f0000000040)}, 0x10) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x10, 0x4, 0x4, 0x5, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r0, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) 2018/03/06 00:07:41 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)=@raw=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x76, &(0x7f0000000080)=""/118}, 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x6, 0x4, 0x7, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000040), &(0x7f0000000100)}, 0x20) 2018/03/06 00:07:41 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000000)='vboxnet0{system*\x00') 2018/03/06 00:07:41 executing program 1: bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={0xffffffffffffffff, 0x7, 0x0, 0x0, &(0x7f00000000c0)=[]}, 0x20) 2018/03/06 00:07:41 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0xa, 0x5, 0x800, 0x7, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), &(0x7f0000000140)}, 0x20) 2018/03/06 00:07:41 executing program 7: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x5, 0x100000000209e20, 0x8000000001, 0x5}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r0, &(0x7f0000000340), &(0x7f0000000240)}, 0x20) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x13, 0x0, 0x7ffff9, 0x0, 0x20000003, 0x0}, 0x2c) 2018/03/06 00:07:41 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x0, 0x0, &(0x7f0000000140)) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xe, 0x4, 0x4, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f]}, 0x2c) socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f0000000000)) 2018/03/06 00:07:41 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) mkdir(&(0x7f0000000000)='./file1\x00', 0x0) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000811ffa)='bdev\x00', 0x100000, &(0x7f0000444000)) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1003, 0x0) mount(&(0x7f00002b9ff8)='./file0\x00', &(0x7f0000cbeff8)='./file0\x00', &(0x7f00005f7ffa)='ramfs\x00', 0x80000, &(0x7f000002f000)) mount(&(0x7f0000000040)='.', &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)='binfmt_misc\x00', 0x0, &(0x7f0000000100)) mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f00000e7000)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='anon_inodefs\x00', 0x2000, &(0x7f0000000240)) mount(&(0x7f0000adcff8)='./file0\x00', &(0x7f0000e08fff)='.', &(0x7f00005e9000)='cifs\x00', 0x2000, &(0x7f0000ad5000)) 2018/03/06 00:07:41 executing program 0: perf_event_open(&(0x7f0000940000)={0x2, 0x78, 0xd68, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00003a8000)={0x2, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x1, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, @perf_bp={&(0x7f0000496fff), 0x800000}, 0x0, 0x20000000, 0x10000000006, 0x400010}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='cgroup2\x00', 0x0, &(0x7f0000000400)) mount(&(0x7f00009f8000)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f00005f7ffb)='nfs4\x00', 0x0, &(0x7f000000a000)) 2018/03/06 00:07:41 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x5, 0x9, 0x5, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000180), &(0x7f00000001c0), 0x2}, 0x20) 2018/03/06 00:07:41 executing program 1: bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={0xffffffffffffffff, 0x7, 0x0, 0x0, &(0x7f00000000c0)=[]}, 0x20) 2018/03/06 00:07:41 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000000)='vboxnet0{system*\x00') 2018/03/06 00:07:41 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0xa, 0x5, 0x800, 0x7, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), &(0x7f0000000140)}, 0x20) 2018/03/06 00:07:41 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x0, 0x0, &(0x7f0000000140)) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xe, 0x4, 0x4, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f]}, 0x2c) socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f0000000000)) 2018/03/06 00:07:41 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x0, 0x0, &(0x7f0000000140)) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xe, 0x4, 0x4, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f]}, 0x2c) socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f0000000000)) 2018/03/06 00:07:41 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x5, 0x9, 0x5, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000180), &(0x7f00000001c0), 0x2}, 0x20) [ 35.399719] cgroup: cgroup2: unknown option "" 2018/03/06 00:07:41 executing program 1: bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={0xffffffffffffffff, 0x7, 0x0, 0x0, &(0x7f00000000c0)=[]}, 0x20) 2018/03/06 00:07:41 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000000)='vboxnet0{system*\x00') 2018/03/06 00:07:41 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0xa, 0x5, 0x800, 0x7, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), &(0x7f0000000140)}, 0x20) 2018/03/06 00:07:41 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x0, 0x0, &(0x7f0000000140)) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xe, 0x4, 0x4, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f]}, 0x2c) socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f0000000000)) 2018/03/06 00:07:41 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) mkdir(&(0x7f0000000000)='./file1\x00', 0x0) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000811ffa)='bdev\x00', 0x100000, &(0x7f0000444000)) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1003, 0x0) mount(&(0x7f00002b9ff8)='./file0\x00', &(0x7f0000cbeff8)='./file0\x00', &(0x7f00005f7ffa)='ramfs\x00', 0x80000, &(0x7f000002f000)) mount(&(0x7f0000000040)='.', &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)='binfmt_misc\x00', 0x0, &(0x7f0000000100)) mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f00000e7000)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='anon_inodefs\x00', 0x2000, &(0x7f0000000240)) mount(&(0x7f0000adcff8)='./file0\x00', &(0x7f0000e08fff)='.', &(0x7f00005e9000)='cifs\x00', 0x2000, &(0x7f0000ad5000)) 2018/03/06 00:07:41 executing program 4: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) mkdir(&(0x7f0000000000)='./file1\x00', 0x0) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000811ffa)='bdev\x00', 0x100000, &(0x7f0000444000)) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1003, 0x0) mount(&(0x7f00002b9ff8)='./file0\x00', &(0x7f0000cbeff8)='./file0\x00', &(0x7f00005f7ffa)='ramfs\x00', 0x80000, &(0x7f000002f000)) mount(&(0x7f0000000040)='.', &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)='binfmt_misc\x00', 0x0, &(0x7f0000000100)) mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f00000e7000)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='anon_inodefs\x00', 0x2000, &(0x7f0000000240)) mount(&(0x7f0000adcff8)='./file0\x00', &(0x7f0000e08fff)='.', &(0x7f00005e9000)='cifs\x00', 0x2000, &(0x7f0000ad5000)) 2018/03/06 00:07:41 executing program 0: perf_event_open(&(0x7f0000940000)={0x2, 0x78, 0xd68, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00003a8000)={0x2, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x1, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, @perf_bp={&(0x7f0000496fff), 0x800000}, 0x0, 0x20000000, 0x10000000006, 0x400010}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='cgroup2\x00', 0x0, &(0x7f0000000400)) mount(&(0x7f00009f8000)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f00005f7ffb)='nfs4\x00', 0x0, &(0x7f000000a000)) 2018/03/06 00:07:41 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x0, 0x0, &(0x7f0000000140)) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xe, 0x4, 0x4, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f]}, 0x2c) socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f0000000000)) [ 35.456354] cgroup: cgroup2: unknown option "" 2018/03/06 00:07:41 executing program 1: perf_event_open(&(0x7f0000940000)={0x2, 0x78, 0xd68, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00003a8000)={0x2, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x1, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, @perf_bp={&(0x7f0000496fff), 0x800000}, 0x0, 0x20000000, 0x10000000006, 0x400010}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='cgroup2\x00', 0x0, &(0x7f0000000400)) mount(&(0x7f00009f8000)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f00005f7ffb)='nfs4\x00', 0x0, &(0x7f000000a000)) 2018/03/06 00:07:41 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0xa, 0x5, 0x800, 0x7, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), &(0x7f0000000140)}, 0x20) 2018/03/06 00:07:41 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x0, 0x0, &(0x7f0000000140)) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xe, 0x4, 0x4, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f]}, 0x2c) socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f0000000000)) 2018/03/06 00:07:41 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000000)='vboxnet0{system*\x00') 2018/03/06 00:07:41 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x0, 0x0, &(0x7f0000000140)) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xe, 0x4, 0x4, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f]}, 0x2c) socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f0000000000)) [ 35.527545] cgroup: cgroup2: unknown option "" 2018/03/06 00:07:42 executing program 0: perf_event_open(&(0x7f0000940000)={0x2, 0x78, 0xd68, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00003a8000)={0x2, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x1, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, @perf_bp={&(0x7f0000496fff), 0x800000}, 0x0, 0x20000000, 0x10000000006, 0x400010}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='cgroup2\x00', 0x0, &(0x7f0000000400)) mount(&(0x7f00009f8000)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f00005f7ffb)='nfs4\x00', 0x0, &(0x7f000000a000)) 2018/03/06 00:07:42 executing program 4: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) mkdir(&(0x7f0000000000)='./file1\x00', 0x0) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000811ffa)='bdev\x00', 0x100000, &(0x7f0000444000)) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1003, 0x0) mount(&(0x7f00002b9ff8)='./file0\x00', &(0x7f0000cbeff8)='./file0\x00', &(0x7f00005f7ffa)='ramfs\x00', 0x80000, &(0x7f000002f000)) mount(&(0x7f0000000040)='.', &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)='binfmt_misc\x00', 0x0, &(0x7f0000000100)) mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f00000e7000)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='anon_inodefs\x00', 0x2000, &(0x7f0000000240)) mount(&(0x7f0000adcff8)='./file0\x00', &(0x7f0000e08fff)='.', &(0x7f00005e9000)='cifs\x00', 0x2000, &(0x7f0000ad5000)) 2018/03/06 00:07:42 executing program 2: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) mkdir(&(0x7f0000000000)='./file1\x00', 0x0) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000811ffa)='bdev\x00', 0x100000, &(0x7f0000444000)) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1003, 0x0) mount(&(0x7f00002b9ff8)='./file0\x00', &(0x7f0000cbeff8)='./file0\x00', &(0x7f00005f7ffa)='ramfs\x00', 0x80000, &(0x7f000002f000)) mount(&(0x7f0000000040)='.', &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)='binfmt_misc\x00', 0x0, &(0x7f0000000100)) mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f00000e7000)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='anon_inodefs\x00', 0x2000, &(0x7f0000000240)) mount(&(0x7f0000adcff8)='./file0\x00', &(0x7f0000e08fff)='.', &(0x7f00005e9000)='cifs\x00', 0x2000, &(0x7f0000ad5000)) [ 35.594100] cgroup: cgroup2: unknown option "" [ 35.616661] cgroup: cgroup2: unknown option "" 2018/03/06 00:07:42 executing program 2: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) mkdir(&(0x7f0000000000)='./file1\x00', 0x0) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000811ffa)='bdev\x00', 0x100000, &(0x7f0000444000)) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1003, 0x0) mount(&(0x7f00002b9ff8)='./file0\x00', &(0x7f0000cbeff8)='./file0\x00', &(0x7f00005f7ffa)='ramfs\x00', 0x80000, &(0x7f000002f000)) mount(&(0x7f0000000040)='.', &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)='binfmt_misc\x00', 0x0, &(0x7f0000000100)) mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f00000e7000)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='anon_inodefs\x00', 0x2000, &(0x7f0000000240)) mount(&(0x7f0000adcff8)='./file0\x00', &(0x7f0000e08fff)='.', &(0x7f00005e9000)='cifs\x00', 0x2000, &(0x7f0000ad5000)) 2018/03/06 00:07:42 executing program 4: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) mkdir(&(0x7f0000000000)='./file1\x00', 0x0) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000811ffa)='bdev\x00', 0x100000, &(0x7f0000444000)) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1003, 0x0) mount(&(0x7f00002b9ff8)='./file0\x00', &(0x7f0000cbeff8)='./file0\x00', &(0x7f00005f7ffa)='ramfs\x00', 0x80000, &(0x7f000002f000)) mount(&(0x7f0000000040)='.', &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)='binfmt_misc\x00', 0x0, &(0x7f0000000100)) mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f00000e7000)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='anon_inodefs\x00', 0x2000, &(0x7f0000000240)) mount(&(0x7f0000adcff8)='./file0\x00', &(0x7f0000e08fff)='.', &(0x7f00005e9000)='cifs\x00', 0x2000, &(0x7f0000ad5000)) 2018/03/06 00:07:42 executing program 6: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) mkdir(&(0x7f0000000000)='./file1\x00', 0x0) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000811ffa)='bdev\x00', 0x100000, &(0x7f0000444000)) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1003, 0x0) mount(&(0x7f00002b9ff8)='./file0\x00', &(0x7f0000cbeff8)='./file0\x00', &(0x7f00005f7ffa)='ramfs\x00', 0x80000, &(0x7f000002f000)) mount(&(0x7f0000000040)='.', &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)='binfmt_misc\x00', 0x0, &(0x7f0000000100)) mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f00000e7000)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='anon_inodefs\x00', 0x2000, &(0x7f0000000240)) mount(&(0x7f0000adcff8)='./file0\x00', &(0x7f0000e08fff)='.', &(0x7f00005e9000)='cifs\x00', 0x2000, &(0x7f0000ad5000)) 2018/03/06 00:07:42 executing program 5: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) mkdir(&(0x7f0000000000)='./file1\x00', 0x0) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000811ffa)='bdev\x00', 0x100000, &(0x7f0000444000)) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1003, 0x0) mount(&(0x7f00002b9ff8)='./file0\x00', &(0x7f0000cbeff8)='./file0\x00', &(0x7f00005f7ffa)='ramfs\x00', 0x80000, &(0x7f000002f000)) mount(&(0x7f0000000040)='.', &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)='binfmt_misc\x00', 0x0, &(0x7f0000000100)) mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f00000e7000)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='anon_inodefs\x00', 0x2000, &(0x7f0000000240)) mount(&(0x7f0000adcff8)='./file0\x00', &(0x7f0000e08fff)='.', &(0x7f00005e9000)='cifs\x00', 0x2000, &(0x7f0000ad5000)) 2018/03/06 00:07:42 executing program 1: perf_event_open(&(0x7f0000940000)={0x2, 0x78, 0xd68, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00003a8000)={0x2, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x1, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, @perf_bp={&(0x7f0000496fff), 0x800000}, 0x0, 0x20000000, 0x10000000006, 0x400010}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='cgroup2\x00', 0x0, &(0x7f0000000400)) mount(&(0x7f00009f8000)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f00005f7ffb)='nfs4\x00', 0x0, &(0x7f000000a000)) 2018/03/06 00:07:42 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) mkdir(&(0x7f0000000000)='./file1\x00', 0x0) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000811ffa)='bdev\x00', 0x100000, &(0x7f0000444000)) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1003, 0x0) mount(&(0x7f00002b9ff8)='./file0\x00', &(0x7f0000cbeff8)='./file0\x00', &(0x7f00005f7ffa)='ramfs\x00', 0x80000, &(0x7f000002f000)) mount(&(0x7f0000000040)='.', &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)='binfmt_misc\x00', 0x0, &(0x7f0000000100)) mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f00000e7000)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='anon_inodefs\x00', 0x2000, &(0x7f0000000240)) mount(&(0x7f0000adcff8)='./file0\x00', &(0x7f0000e08fff)='.', &(0x7f00005e9000)='cifs\x00', 0x2000, &(0x7f0000ad5000)) 2018/03/06 00:07:42 executing program 7: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) mkdir(&(0x7f0000000000)='./file1\x00', 0x0) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000811ffa)='bdev\x00', 0x100000, &(0x7f0000444000)) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1003, 0x0) mount(&(0x7f00002b9ff8)='./file0\x00', &(0x7f0000cbeff8)='./file0\x00', &(0x7f00005f7ffa)='ramfs\x00', 0x80000, &(0x7f000002f000)) mount(&(0x7f0000000040)='.', &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)='binfmt_misc\x00', 0x0, &(0x7f0000000100)) mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f00000e7000)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='anon_inodefs\x00', 0x2000, &(0x7f0000000240)) mount(&(0x7f0000adcff8)='./file0\x00', &(0x7f0000e08fff)='.', &(0x7f00005e9000)='cifs\x00', 0x2000, &(0x7f0000ad5000)) 2018/03/06 00:07:42 executing program 0: perf_event_open(&(0x7f0000940000)={0x2, 0x78, 0xd68, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00003a8000)={0x2, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x1, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, @perf_bp={&(0x7f0000496fff), 0x800000}, 0x0, 0x20000000, 0x10000000006, 0x400010}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='cgroup2\x00', 0x0, &(0x7f0000000400)) mount(&(0x7f00009f8000)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f00005f7ffb)='nfs4\x00', 0x0, &(0x7f000000a000)) 2018/03/06 00:07:42 executing program 2: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) mkdir(&(0x7f0000000000)='./file1\x00', 0x0) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000811ffa)='bdev\x00', 0x100000, &(0x7f0000444000)) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1003, 0x0) mount(&(0x7f00002b9ff8)='./file0\x00', &(0x7f0000cbeff8)='./file0\x00', &(0x7f00005f7ffa)='ramfs\x00', 0x80000, &(0x7f000002f000)) mount(&(0x7f0000000040)='.', &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)='binfmt_misc\x00', 0x0, &(0x7f0000000100)) mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f00000e7000)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='anon_inodefs\x00', 0x2000, &(0x7f0000000240)) mount(&(0x7f0000adcff8)='./file0\x00', &(0x7f0000e08fff)='.', &(0x7f00005e9000)='cifs\x00', 0x2000, &(0x7f0000ad5000)) 2018/03/06 00:07:42 executing program 1: perf_event_open(&(0x7f0000940000)={0x2, 0x78, 0xd68, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00003a8000)={0x2, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x1, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, @perf_bp={&(0x7f0000496fff), 0x800000}, 0x0, 0x20000000, 0x10000000006, 0x400010}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='cgroup2\x00', 0x0, &(0x7f0000000400)) mount(&(0x7f00009f8000)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f00005f7ffb)='nfs4\x00', 0x0, &(0x7f000000a000)) [ 35.752255] cgroup: cgroup2: unknown option "" [ 35.771796] cgroup: cgroup2: unknown option "" 2018/03/06 00:07:42 executing program 7: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) mkdir(&(0x7f0000000000)='./file1\x00', 0x0) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000811ffa)='bdev\x00', 0x100000, &(0x7f0000444000)) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1003, 0x0) mount(&(0x7f00002b9ff8)='./file0\x00', &(0x7f0000cbeff8)='./file0\x00', &(0x7f00005f7ffa)='ramfs\x00', 0x80000, &(0x7f000002f000)) mount(&(0x7f0000000040)='.', &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)='binfmt_misc\x00', 0x0, &(0x7f0000000100)) mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f00000e7000)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='anon_inodefs\x00', 0x2000, &(0x7f0000000240)) mount(&(0x7f0000adcff8)='./file0\x00', &(0x7f0000e08fff)='.', &(0x7f00005e9000)='cifs\x00', 0x2000, &(0x7f0000ad5000)) 2018/03/06 00:07:42 executing program 5: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) mkdir(&(0x7f0000000000)='./file1\x00', 0x0) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000811ffa)='bdev\x00', 0x100000, &(0x7f0000444000)) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1003, 0x0) mount(&(0x7f00002b9ff8)='./file0\x00', &(0x7f0000cbeff8)='./file0\x00', &(0x7f00005f7ffa)='ramfs\x00', 0x80000, &(0x7f000002f000)) mount(&(0x7f0000000040)='.', &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)='binfmt_misc\x00', 0x0, &(0x7f0000000100)) mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f00000e7000)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='anon_inodefs\x00', 0x2000, &(0x7f0000000240)) mount(&(0x7f0000adcff8)='./file0\x00', &(0x7f0000e08fff)='.', &(0x7f00005e9000)='cifs\x00', 0x2000, &(0x7f0000ad5000)) 2018/03/06 00:07:42 executing program 0: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) mkdir(&(0x7f0000000000)='./file1\x00', 0x0) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000811ffa)='bdev\x00', 0x100000, &(0x7f0000444000)) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1003, 0x0) mount(&(0x7f00002b9ff8)='./file0\x00', &(0x7f0000cbeff8)='./file0\x00', &(0x7f00005f7ffa)='ramfs\x00', 0x80000, &(0x7f000002f000)) mount(&(0x7f0000000040)='.', &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)='binfmt_misc\x00', 0x0, &(0x7f0000000100)) mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f00000e7000)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='anon_inodefs\x00', 0x2000, &(0x7f0000000240)) mount(&(0x7f0000adcff8)='./file0\x00', &(0x7f0000e08fff)='.', &(0x7f00005e9000)='cifs\x00', 0x2000, &(0x7f0000ad5000)) 2018/03/06 00:07:42 executing program 6: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) mkdir(&(0x7f0000000000)='./file1\x00', 0x0) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000811ffa)='bdev\x00', 0x100000, &(0x7f0000444000)) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1003, 0x0) mount(&(0x7f00002b9ff8)='./file0\x00', &(0x7f0000cbeff8)='./file0\x00', &(0x7f00005f7ffa)='ramfs\x00', 0x80000, &(0x7f000002f000)) mount(&(0x7f0000000040)='.', &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)='binfmt_misc\x00', 0x0, &(0x7f0000000100)) mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f00000e7000)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='anon_inodefs\x00', 0x2000, &(0x7f0000000240)) mount(&(0x7f0000adcff8)='./file0\x00', &(0x7f0000e08fff)='.', &(0x7f00005e9000)='cifs\x00', 0x2000, &(0x7f0000ad5000)) 2018/03/06 00:07:42 executing program 5: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) mkdir(&(0x7f0000000000)='./file1\x00', 0x0) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000811ffa)='bdev\x00', 0x100000, &(0x7f0000444000)) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1003, 0x0) mount(&(0x7f00002b9ff8)='./file0\x00', &(0x7f0000cbeff8)='./file0\x00', &(0x7f00005f7ffa)='ramfs\x00', 0x80000, &(0x7f000002f000)) mount(&(0x7f0000000040)='.', &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)='binfmt_misc\x00', 0x0, &(0x7f0000000100)) mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f00000e7000)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='anon_inodefs\x00', 0x2000, &(0x7f0000000240)) mount(&(0x7f0000adcff8)='./file0\x00', &(0x7f0000e08fff)='.', &(0x7f00005e9000)='cifs\x00', 0x2000, &(0x7f0000ad5000)) [ 35.866364] cgroup: cgroup2: unknown option "" [ 36.565974] IPVS: ftp: loaded support on port[0] = 21 [ 36.592620] IPVS: ftp: loaded support on port[0] = 21 [ 36.630072] IPVS: ftp: loaded support on port[0] = 21 [ 38.096567] IPVS: ftp: loaded support on port[0] = 21 2018/03/06 00:07:44 executing program 7: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) mkdir(&(0x7f0000000000)='./file1\x00', 0x0) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000811ffa)='bdev\x00', 0x100000, &(0x7f0000444000)) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1003, 0x0) mount(&(0x7f00002b9ff8)='./file0\x00', &(0x7f0000cbeff8)='./file0\x00', &(0x7f00005f7ffa)='ramfs\x00', 0x80000, &(0x7f000002f000)) mount(&(0x7f0000000040)='.', &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)='binfmt_misc\x00', 0x0, &(0x7f0000000100)) mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f00000e7000)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='anon_inodefs\x00', 0x2000, &(0x7f0000000240)) mount(&(0x7f0000adcff8)='./file0\x00', &(0x7f0000e08fff)='.', &(0x7f00005e9000)='cifs\x00', 0x2000, &(0x7f0000ad5000)) 2018/03/06 00:07:44 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='(,\'selfvboxnet0&)bdev+.\x00') 2018/03/06 00:07:44 executing program 6: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) mkdir(&(0x7f0000000000)='./file1\x00', 0x0) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000811ffa)='bdev\x00', 0x100000, &(0x7f0000444000)) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1003, 0x0) mount(&(0x7f00002b9ff8)='./file0\x00', &(0x7f0000cbeff8)='./file0\x00', &(0x7f00005f7ffa)='ramfs\x00', 0x80000, &(0x7f000002f000)) mount(&(0x7f0000000040)='.', &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)='binfmt_misc\x00', 0x0, &(0x7f0000000100)) mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f00000e7000)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='anon_inodefs\x00', 0x2000, &(0x7f0000000240)) mount(&(0x7f0000adcff8)='./file0\x00', &(0x7f0000e08fff)='.', &(0x7f00005e9000)='cifs\x00', 0x2000, &(0x7f0000ad5000)) 2018/03/06 00:07:44 executing program 0: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) mkdir(&(0x7f0000000000)='./file1\x00', 0x0) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000811ffa)='bdev\x00', 0x100000, &(0x7f0000444000)) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1003, 0x0) mount(&(0x7f00002b9ff8)='./file0\x00', &(0x7f0000cbeff8)='./file0\x00', &(0x7f00005f7ffa)='ramfs\x00', 0x80000, &(0x7f000002f000)) mount(&(0x7f0000000040)='.', &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)='binfmt_misc\x00', 0x0, &(0x7f0000000100)) mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f00000e7000)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='anon_inodefs\x00', 0x2000, &(0x7f0000000240)) mount(&(0x7f0000adcff8)='./file0\x00', &(0x7f0000e08fff)='.', &(0x7f00005e9000)='cifs\x00', 0x2000, &(0x7f0000ad5000)) 2018/03/06 00:07:44 executing program 4: r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg$kcm(r0, &(0x7f00000016c0)={&(0x7f00000013c0)=@sco={0x1f}, 0x8, &(0x7f0000001540)=[{&(0x7f00000014c0)='<', 0x1}], 0x1, &(0x7f0000001580)=[]}, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001780), 0x10) sendmsg$kcm(r1, &(0x7f00000042c0)={&(0x7f0000001ac0)=@pptp={0x18, 0x2, {0x0, @multicast1=0xe0000001}}, 0x20, &(0x7f0000002e80)=[{&(0x7f0000002dc0)="95", 0x1}], 0x1, &(0x7f0000002f00)=[]}, 0x0) sendmsg$kcm(r0, &(0x7f0000006200)={&(0x7f0000004a40)=@un=@file={0x0, './file0/file0\x00'}, 0x10, &(0x7f0000005cc0)=[{&(0x7f0000005c40)="e4", 0x1}], 0x1, &(0x7f0000005d40)=[]}, 0x0) 2018/03/06 00:07:44 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x0, 0x0, &(0x7f0000000140)) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xe, 0x4, 0x4, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f]}, 0x2c) socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f0000000000)) 2018/03/06 00:07:44 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000000000)) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x0, &(0x7f00000e7000)) socketpair$inet6(0xa, 0x6, 0xf9, &(0x7f0000001480)) 2018/03/06 00:07:44 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) mkdir(&(0x7f0000000000)='./file1\x00', 0x0) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000811ffa)='bdev\x00', 0x100000, &(0x7f0000444000)) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1003, 0x0) mount(&(0x7f00002b9ff8)='./file0\x00', &(0x7f0000cbeff8)='./file0\x00', &(0x7f00005f7ffa)='ramfs\x00', 0x80000, &(0x7f000002f000)) mount(&(0x7f0000000040)='.', &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)='binfmt_misc\x00', 0x0, &(0x7f0000000100)) mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f00000e7000)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='anon_inodefs\x00', 0x2000, &(0x7f0000000240)) mount(&(0x7f0000adcff8)='./file0\x00', &(0x7f0000e08fff)='.', &(0x7f00005e9000)='cifs\x00', 0x2000, &(0x7f0000ad5000)) 2018/03/06 00:07:44 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x0, 0x0, &(0x7f0000000140)) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xe, 0x4, 0x4, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f]}, 0x2c) socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f0000000000)) 2018/03/06 00:07:44 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x0, 0x0, &(0x7f0000000140)) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xe, 0x4, 0x4, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f]}, 0x2c) socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f0000000000)) 2018/03/06 00:07:44 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=@raw=[], &(0x7f0000003ff6)='syzkaller\x00', 0x0, 0xc3, &(0x7f0000000200)=""/195}, 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x3, 0x4, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000040), &(0x7f0000000100)}, 0x20) 2018/03/06 00:07:44 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=@raw=[], &(0x7f0000003ff6)='syzkaller\x00', 0x0, 0xc3, &(0x7f0000000200)=""/195}, 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x3, 0x4, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000040), &(0x7f0000000100)}, 0x20) [ 39.138450] IPVS: ftp: loaded support on port[0] = 21 [ 39.165764] IPVS: ftp: loaded support on port[0] = 21 [ 39.980649] IPVS: ftp: loaded support on port[0] = 21 [ 40.006306] IPVS: ftp: loaded support on port[0] = 21 [ 40.038772] IPVS: ftp: loaded support on port[0] = 21 [ 40.074981] IPVS: ftp: loaded support on port[0] = 21 [ 40.106992] IPVS: ftp: loaded support on port[0] = 21 2018/03/06 00:07:46 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=@raw=[], &(0x7f0000003ff6)='syzkaller\x00', 0x0, 0xc3, &(0x7f0000000200)=""/195}, 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x3, 0x4, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000040), &(0x7f0000000100)}, 0x20) 2018/03/06 00:07:46 executing program 7: perf_event_open(&(0x7f0000b39f88)={0x7, 0x78, 0x10005}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/03/06 00:07:46 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x7}], {0x95}}, &(0x7f000031cff6)='syzkaller\x00', 0x5c6e, 0x220, &(0x7f00001a7f05)=""/251}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0xc, &(0x7f0000000000)="e6a95e8c2a860798874ce3331037", &(0x7f0000000040)=""/12}, 0x28) 2018/03/06 00:07:46 executing program 2: perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000377ff8)='.', &(0x7f0000000200)='.', &(0x7f0000000240)='ceph\x00', 0x0, &(0x7f0000000100)) 2018/03/06 00:07:46 executing program 6: mount(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)='devtmpfs\x00', 0x0, &(0x7f0000000340)) r0 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x6, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x45}, [], {0x95}}, &(0x7f0000e6bffc)='GPL\x00', 0x2, 0xfe99, &(0x7f000000d000)=""/153}, 0x2e) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0xb2, &(0x7f0000000000)="bcce1e6b0ad6fff53055839c86a4", &(0x7f0000000080)=""/178}, 0x28) 2018/03/06 00:07:46 executing program 4: r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg$kcm(r0, &(0x7f00000016c0)={&(0x7f00000013c0)=@sco={0x1f}, 0x8, &(0x7f0000001540)=[{&(0x7f00000014c0)='<', 0x1}], 0x1, &(0x7f0000001580)=[]}, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001780), 0x10) sendmsg$kcm(r1, &(0x7f00000042c0)={&(0x7f0000001ac0)=@pptp={0x18, 0x2, {0x0, @multicast1=0xe0000001}}, 0x20, &(0x7f0000002e80)=[{&(0x7f0000002dc0)="95", 0x1}], 0x1, &(0x7f0000002f00)=[]}, 0x0) sendmsg$kcm(r0, &(0x7f0000006200)={&(0x7f0000004a40)=@un=@file={0x0, './file0/file0\x00'}, 0x10, &(0x7f0000005cc0)=[{&(0x7f0000005c40)="e4", 0x1}], 0x1, &(0x7f0000005d40)=[]}, 0x0) 2018/03/06 00:07:46 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000000000)) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x0, &(0x7f00000e7000)) socketpair$inet6(0xa, 0x6, 0xf9, &(0x7f0000001480)) 2018/03/06 00:07:46 executing program 0: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) mkdir(&(0x7f0000000000)='./file1\x00', 0x0) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000811ffa)='bdev\x00', 0x100000, &(0x7f0000444000)) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1003, 0x0) mount(&(0x7f00002b9ff8)='./file0\x00', &(0x7f0000cbeff8)='./file0\x00', &(0x7f00005f7ffa)='ramfs\x00', 0x80000, &(0x7f000002f000)) mount(&(0x7f0000000040)='.', &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)='binfmt_misc\x00', 0x0, &(0x7f0000000100)) mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f00000e7000)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='anon_inodefs\x00', 0x2000, &(0x7f0000000240)) mount(&(0x7f0000adcff8)='./file0\x00', &(0x7f0000e08fff)='.', &(0x7f00005e9000)='cifs\x00', 0x2000, &(0x7f0000ad5000)) 2018/03/06 00:07:46 executing program 4: r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg$kcm(r0, &(0x7f00000016c0)={&(0x7f00000013c0)=@sco={0x1f}, 0x8, &(0x7f0000001540)=[{&(0x7f00000014c0)='<', 0x1}], 0x1, &(0x7f0000001580)=[]}, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001780), 0x10) sendmsg$kcm(r1, &(0x7f00000042c0)={&(0x7f0000001ac0)=@pptp={0x18, 0x2, {0x0, @multicast1=0xe0000001}}, 0x20, &(0x7f0000002e80)=[{&(0x7f0000002dc0)="95", 0x1}], 0x1, &(0x7f0000002f00)=[]}, 0x0) sendmsg$kcm(r0, &(0x7f0000006200)={&(0x7f0000004a40)=@un=@file={0x0, './file0/file0\x00'}, 0x10, &(0x7f0000005cc0)=[{&(0x7f0000005c40)="e4", 0x1}], 0x1, &(0x7f0000005d40)=[]}, 0x0) 2018/03/06 00:07:46 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=@raw=[], &(0x7f0000003ff6)='syzkaller\x00', 0x0, 0xc3, &(0x7f0000000200)=""/195}, 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x3, 0x4, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000040), &(0x7f0000000100)}, 0x20) 2018/03/06 00:07:46 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000000000)) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x0, &(0x7f00000e7000)) socketpair$inet6(0xa, 0x6, 0xf9, &(0x7f0000001480)) 2018/03/06 00:07:46 executing program 4: r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg$kcm(r0, &(0x7f00000016c0)={&(0x7f00000013c0)=@sco={0x1f}, 0x8, &(0x7f0000001540)=[{&(0x7f00000014c0)='<', 0x1}], 0x1, &(0x7f0000001580)=[]}, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001780), 0x10) sendmsg$kcm(r1, &(0x7f00000042c0)={&(0x7f0000001ac0)=@pptp={0x18, 0x2, {0x0, @multicast1=0xe0000001}}, 0x20, &(0x7f0000002e80)=[{&(0x7f0000002dc0)="95", 0x1}], 0x1, &(0x7f0000002f00)=[]}, 0x0) sendmsg$kcm(r0, &(0x7f0000006200)={&(0x7f0000004a40)=@un=@file={0x0, './file0/file0\x00'}, 0x10, &(0x7f0000005cc0)=[{&(0x7f0000005c40)="e4", 0x1}], 0x1, &(0x7f0000005d40)=[]}, 0x0) 2018/03/06 00:07:46 executing program 2: perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000377ff8)='.', &(0x7f0000000200)='.', &(0x7f0000000240)='ceph\x00', 0x0, &(0x7f0000000100)) 2018/03/06 00:07:46 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000000000)) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x0, &(0x7f00000e7000)) socketpair$inet6(0xa, 0x6, 0xf9, &(0x7f0000001480)) 2018/03/06 00:07:46 executing program 4: perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000377ff8)='.', &(0x7f0000000200)='.', &(0x7f0000000240)='ceph\x00', 0x0, &(0x7f0000000100)) 2018/03/06 00:07:46 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000000000)) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x0, &(0x7f00000e7000)) socketpair$inet6(0xa, 0x6, 0xf9, &(0x7f0000001480)) 2018/03/06 00:07:46 executing program 2: perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000377ff8)='.', &(0x7f0000000200)='.', &(0x7f0000000240)='ceph\x00', 0x0, &(0x7f0000000100)) [ 42.139153] IPVS: ftp: loaded support on port[0] = 21 [ 42.164692] IPVS: ftp: loaded support on port[0] = 21 [ 42.195568] IPVS: ftp: loaded support on port[0] = 21 [ 42.230423] IPVS: ftp: loaded support on port[0] = 21 2018/03/06 00:07:48 executing program 6: mount(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)='devtmpfs\x00', 0x0, &(0x7f0000000340)) r0 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x6, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x45}, [], {0x95}}, &(0x7f0000e6bffc)='GPL\x00', 0x2, 0xfe99, &(0x7f000000d000)=""/153}, 0x2e) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0xb2, &(0x7f0000000000)="bcce1e6b0ad6fff53055839c86a4", &(0x7f0000000080)=""/178}, 0x28) 2018/03/06 00:07:48 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000000000)) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x0, &(0x7f00000e7000)) socketpair$inet6(0xa, 0x6, 0xf9, &(0x7f0000001480)) 2018/03/06 00:07:48 executing program 7: perf_event_open(&(0x7f0000b39f88)={0x7, 0x78, 0x10005}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/03/06 00:07:48 executing program 4: perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000377ff8)='.', &(0x7f0000000200)='.', &(0x7f0000000240)='ceph\x00', 0x0, &(0x7f0000000100)) 2018/03/06 00:07:48 executing program 2: perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000377ff8)='.', &(0x7f0000000200)='.', &(0x7f0000000240)='ceph\x00', 0x0, &(0x7f0000000100)) 2018/03/06 00:07:48 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x7}], {0x95}}, &(0x7f000031cff6)='syzkaller\x00', 0x5c6e, 0x220, &(0x7f00001a7f05)=""/251}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0xc, &(0x7f0000000000)="e6a95e8c2a860798874ce3331037", &(0x7f0000000040)=""/12}, 0x28) 2018/03/06 00:07:48 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000000000)) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x0, &(0x7f00000e7000)) socketpair$inet6(0xa, 0x6, 0xf9, &(0x7f0000001480)) 2018/03/06 00:07:48 executing program 0: mount(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)='devtmpfs\x00', 0x0, &(0x7f0000000340)) r0 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x6, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x45}, [], {0x95}}, &(0x7f0000e6bffc)='GPL\x00', 0x2, 0xfe99, &(0x7f000000d000)=""/153}, 0x2e) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0xb2, &(0x7f0000000000)="bcce1e6b0ad6fff53055839c86a4", &(0x7f0000000080)=""/178}, 0x28) 2018/03/06 00:07:48 executing program 6: mount(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)='devtmpfs\x00', 0x0, &(0x7f0000000340)) r0 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x6, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x45}, [], {0x95}}, &(0x7f0000e6bffc)='GPL\x00', 0x2, 0xfe99, &(0x7f000000d000)=""/153}, 0x2e) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0xb2, &(0x7f0000000000)="bcce1e6b0ad6fff53055839c86a4", &(0x7f0000000080)=""/178}, 0x28) 2018/03/06 00:07:48 executing program 0: mount(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)='devtmpfs\x00', 0x0, &(0x7f0000000340)) r0 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x6, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x45}, [], {0x95}}, &(0x7f0000e6bffc)='GPL\x00', 0x2, 0xfe99, &(0x7f000000d000)=""/153}, 0x2e) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0xb2, &(0x7f0000000000)="bcce1e6b0ad6fff53055839c86a4", &(0x7f0000000080)=""/178}, 0x28) 2018/03/06 00:07:48 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x7}], {0x95}}, &(0x7f000031cff6)='syzkaller\x00', 0x5c6e, 0x220, &(0x7f00001a7f05)=""/251}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0xc, &(0x7f0000000000)="e6a95e8c2a860798874ce3331037", &(0x7f0000000040)=""/12}, 0x28) 2018/03/06 00:07:48 executing program 4: perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000377ff8)='.', &(0x7f0000000200)='.', &(0x7f0000000240)='ceph\x00', 0x0, &(0x7f0000000100)) 2018/03/06 00:07:48 executing program 7: perf_event_open(&(0x7f0000b39f88)={0x7, 0x78, 0x10005}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/03/06 00:07:48 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x7}], {0x95}}, &(0x7f000031cff6)='syzkaller\x00', 0x5c6e, 0x220, &(0x7f00001a7f05)=""/251}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0xc, &(0x7f0000000000)="e6a95e8c2a860798874ce3331037", &(0x7f0000000040)=""/12}, 0x28) 2018/03/06 00:07:48 executing program 5: perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000377ff8)='.', &(0x7f0000000200)='.', &(0x7f0000000240)='ceph\x00', 0x0, &(0x7f0000000100)) 2018/03/06 00:07:48 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000000000)) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x0, &(0x7f00000e7000)) socketpair$inet6(0xa, 0x6, 0xf9, &(0x7f0000001480)) 2018/03/06 00:07:48 executing program 6: mount(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)='devtmpfs\x00', 0x0, &(0x7f0000000340)) r0 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x6, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x45}, [], {0x95}}, &(0x7f0000e6bffc)='GPL\x00', 0x2, 0xfe99, &(0x7f000000d000)=""/153}, 0x2e) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0xb2, &(0x7f0000000000)="bcce1e6b0ad6fff53055839c86a4", &(0x7f0000000080)=""/178}, 0x28) 2018/03/06 00:07:48 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x7}], {0x95}}, &(0x7f000031cff6)='syzkaller\x00', 0x5c6e, 0x220, &(0x7f00001a7f05)=""/251}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0xc, &(0x7f0000000000)="e6a95e8c2a860798874ce3331037", &(0x7f0000000040)=""/12}, 0x28) 2018/03/06 00:07:48 executing program 7: perf_event_open(&(0x7f0000b39f88)={0x7, 0x78, 0x10005}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/03/06 00:07:48 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x7}], {0x95}}, &(0x7f000031cff6)='syzkaller\x00', 0x5c6e, 0x220, &(0x7f00001a7f05)=""/251}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0xc, &(0x7f0000000000)="e6a95e8c2a860798874ce3331037", &(0x7f0000000040)=""/12}, 0x28) 2018/03/06 00:07:48 executing program 7: socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)=@l2, 0xe, &(0x7f0000000180)=[{&(0x7f0000000040)=""/131, 0xfe78}, {&(0x7f0000000000)=""/3, 0x3}, {&(0x7f0000000180)=""/138, 0x8a}, {&(0x7f0000000240)=""/233, 0xe9}], 0x4, &(0x7f0000000380)=""/4096, 0x946}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000002a80)={&(0x7f0000000340)=@nfc={0x27, 0x7fff, 0x1ff}, 0x10, &(0x7f0000002780)=[], 0x0, &(0x7f0000002800)=[]}, 0x0) sendmsg(r0, &(0x7f00000004c0)={0x0, 0x380, &(0x7f0000000100)=[], 0xa7, &(0x7f0000000200)=[]}, 0x0) 2018/03/06 00:07:48 executing program 4: recvmsg(0xffffffffffffffff, &(0x7f0000000fc8)={&(0x7f000000a000)=@pptp={0x0, 0x0, {0x0, @multicast1}}, 0x20, &(0x7f0000003000)=[{&(0x7f000000afc4)=""/60, 0x3c}, {&(0x7f000000a000)=""/159, 0x9f}], 0x2}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001fb8)={0x1, 0x5, &(0x7f0000003000)=@framed={{0x18}, [@alu={0x5, 0x0, 0xb, 0x0, 0x0, 0x1}], {0x95}}, &(0x7f0000002ff6)='syzkaller\x00', 0x7dd, 0xfdad, &(0x7f0000002f19)=""/231}, 0x48) 2018/03/06 00:07:48 executing program 3: recvmsg(0xffffffffffffffff, &(0x7f0000016000)={&(0x7f000000b000)=@can, 0x10, &(0x7f0000002000)=[{&(0x7f0000000000)=""/237, 0x3c7}, {&(0x7f0000000fdb)=""/37, 0x17f}], 0x96b0cf4a6d2225a0, 0x0, 0xb5}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f000000a000)='syzkaller\x00', 0x1, 0xc3, &(0x7f0000011000)=""/195}, 0x48) 2018/03/06 00:07:49 executing program 5: perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000377ff8)='.', &(0x7f0000000200)='.', &(0x7f0000000240)='ceph\x00', 0x0, &(0x7f0000000100)) 2018/03/06 00:07:49 executing program 6: recvmsg(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000000140)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f0000000000)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0x17d}], 0x2, &(0x7f000000c000)=""/105, 0x69}, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x6e, &(0x7f0000000080)="3447f36cbc3563f8dee5d01dbcef", &(0x7f00000000c0)=""/110}, 0x28) 2018/03/06 00:07:49 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x7}], {0x95}}, &(0x7f000031cff6)='syzkaller\x00', 0x5c6e, 0x220, &(0x7f00001a7f05)=""/251}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0xc, &(0x7f0000000000)="e6a95e8c2a860798874ce3331037", &(0x7f0000000040)=""/12}, 0x28) 2018/03/06 00:07:49 executing program 4: recvmsg(0xffffffffffffffff, &(0x7f0000000fc8)={&(0x7f000000a000)=@pptp={0x0, 0x0, {0x0, @multicast1}}, 0x20, &(0x7f0000003000)=[{&(0x7f000000afc4)=""/60, 0x3c}, {&(0x7f000000a000)=""/159, 0x9f}], 0x2}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001fb8)={0x1, 0x5, &(0x7f0000003000)=@framed={{0x18}, [@alu={0x5, 0x0, 0xb, 0x0, 0x0, 0x1}], {0x95}}, &(0x7f0000002ff6)='syzkaller\x00', 0x7dd, 0xfdad, &(0x7f0000002f19)=""/231}, 0x48) 2018/03/06 00:07:49 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x7}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xe, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0xfa}], {0x95}}, &(0x7f0000000040)="47504c009f4e092eeb734b21846fb61227367b5410325d9be7addb4677c8c4a9f654c48b0fc37494541853573cc9de9e148a7151aec80ec9e505dacd021b193a593df82982dd0788b9a44deb515fe500538fb31a4275b7936ca800b8e81b9b22cdde482006338b", 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) [ 43.282102] IPVS: ftp: loaded support on port[0] = 21 2018/03/06 00:07:49 executing program 0: mount(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)='devtmpfs\x00', 0x0, &(0x7f0000000340)) r0 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x6, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x45}, [], {0x95}}, &(0x7f0000e6bffc)='GPL\x00', 0x2, 0xfe99, &(0x7f000000d000)=""/153}, 0x2e) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0xb2, &(0x7f0000000000)="bcce1e6b0ad6fff53055839c86a4", &(0x7f0000000080)=""/178}, 0x28) 2018/03/06 00:07:49 executing program 3: recvmsg(0xffffffffffffffff, &(0x7f0000016000)={&(0x7f000000b000)=@can, 0x10, &(0x7f0000002000)=[{&(0x7f0000000000)=""/237, 0x3c7}, {&(0x7f0000000fdb)=""/37, 0x17f}], 0x96b0cf4a6d2225a0, 0x0, 0xb5}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f000000a000)='syzkaller\x00', 0x1, 0xc3, &(0x7f0000011000)=""/195}, 0x48) 2018/03/06 00:07:49 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000000000)) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x0, &(0x7f00000e7000)) socketpair$inet6(0xa, 0x6, 0xf9, &(0x7f0000001480)) 2018/03/06 00:07:49 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x7}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xe, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0xfa}], {0x95}}, &(0x7f0000000040)="47504c009f4e092eeb734b21846fb61227367b5410325d9be7addb4677c8c4a9f654c48b0fc37494541853573cc9de9e148a7151aec80ec9e505dacd021b193a593df82982dd0788b9a44deb515fe500538fb31a4275b7936ca800b8e81b9b22cdde482006338b", 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 2018/03/06 00:07:49 executing program 3: recvmsg(0xffffffffffffffff, &(0x7f0000016000)={&(0x7f000000b000)=@can, 0x10, &(0x7f0000002000)=[{&(0x7f0000000000)=""/237, 0x3c7}, {&(0x7f0000000fdb)=""/37, 0x17f}], 0x96b0cf4a6d2225a0, 0x0, 0xb5}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f000000a000)='syzkaller\x00', 0x1, 0xc3, &(0x7f0000011000)=""/195}, 0x48) 2018/03/06 00:07:49 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000280)='./file0/file0\x00', &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='devtmpfs\x00', 0x0, &(0x7f0000000340)="f4") 2018/03/06 00:07:49 executing program 4: recvmsg(0xffffffffffffffff, &(0x7f0000000fc8)={&(0x7f000000a000)=@pptp={0x0, 0x0, {0x0, @multicast1}}, 0x20, &(0x7f0000003000)=[{&(0x7f000000afc4)=""/60, 0x3c}, {&(0x7f000000a000)=""/159, 0x9f}], 0x2}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001fb8)={0x1, 0x5, &(0x7f0000003000)=@framed={{0x18}, [@alu={0x5, 0x0, 0xb, 0x0, 0x0, 0x1}], {0x95}}, &(0x7f0000002ff6)='syzkaller\x00', 0x7dd, 0xfdad, &(0x7f0000002f19)=""/231}, 0x48) 2018/03/06 00:07:49 executing program 6: recvmsg(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000000140)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f0000000000)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0x17d}], 0x2, &(0x7f000000c000)=""/105, 0x69}, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x6e, &(0x7f0000000080)="3447f36cbc3563f8dee5d01dbcef", &(0x7f00000000c0)=""/110}, 0x28) 2018/03/06 00:07:49 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x7}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xe, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0xfa}], {0x95}}, &(0x7f0000000040)="47504c009f4e092eeb734b21846fb61227367b5410325d9be7addb4677c8c4a9f654c48b0fc37494541853573cc9de9e148a7151aec80ec9e505dacd021b193a593df82982dd0788b9a44deb515fe500538fb31a4275b7936ca800b8e81b9b22cdde482006338b", 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 2018/03/06 00:07:49 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) 2018/03/06 00:07:49 executing program 4: recvmsg(0xffffffffffffffff, &(0x7f0000000fc8)={&(0x7f000000a000)=@pptp={0x0, 0x0, {0x0, @multicast1}}, 0x20, &(0x7f0000003000)=[{&(0x7f000000afc4)=""/60, 0x3c}, {&(0x7f000000a000)=""/159, 0x9f}], 0x2}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001fb8)={0x1, 0x5, &(0x7f0000003000)=@framed={{0x18}, [@alu={0x5, 0x0, 0xb, 0x0, 0x0, 0x1}], {0x95}}, &(0x7f0000002ff6)='syzkaller\x00', 0x7dd, 0xfdad, &(0x7f0000002f19)=""/231}, 0x48) 2018/03/06 00:07:49 executing program 5: perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000377ff8)='.', &(0x7f0000000200)='.', &(0x7f0000000240)='ceph\x00', 0x0, &(0x7f0000000100)) 2018/03/06 00:07:49 executing program 3: recvmsg(0xffffffffffffffff, &(0x7f0000016000)={&(0x7f000000b000)=@can, 0x10, &(0x7f0000002000)=[{&(0x7f0000000000)=""/237, 0x3c7}, {&(0x7f0000000fdb)=""/37, 0x17f}], 0x96b0cf4a6d2225a0, 0x0, 0xb5}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f000000a000)='syzkaller\x00', 0x1, 0xc3, &(0x7f0000011000)=""/195}, 0x48) [ 43.425151] tmpfs: No value for mount option 'ô' [ 43.478663] tmpfs: No value for mount option 'ô' 2018/03/06 00:07:49 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000000000)) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x0, &(0x7f00000e7000)) socketpair$inet6(0xa, 0x6, 0xf9, &(0x7f0000001480)) 2018/03/06 00:07:49 executing program 6: recvmsg(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000000140)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f0000000000)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0x17d}], 0x2, &(0x7f000000c000)=""/105, 0x69}, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x6e, &(0x7f0000000080)="3447f36cbc3563f8dee5d01dbcef", &(0x7f00000000c0)=""/110}, 0x28) 2018/03/06 00:07:49 executing program 4: socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)=[], 0x28a, &(0x7f0000000000)=[]}, 0x0) sendmsg$kcm(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="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", 0x22e}], 0x1, &(0x7f0000001200)=[]}, 0x0) recvmsg(r0, &(0x7f0000001440)={&(0x7f0000000040)=@sco, 0x8, &(0x7f00000013c0)=[{&(0x7f0000000000)=""/66}, {&(0x7f0000000080)=""/52}, {&(0x7f00000000c0)=""/120}, {&(0x7f0000000200)=""/4096}, {&(0x7f0000001200)=""/120}, {&(0x7f0000001280)=""/177}, {&(0x7f0000000180)=""/17, 0x384}, {&(0x7f0000001340)=""/2}, {&(0x7f0000001380)=""/16}], 0x133, 0x0, 0x301}, 0x0) 2018/03/06 00:07:49 executing program 3: perf_event_open(&(0x7f0000940000)={0x2, 0x306, 0xece, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) socketpair$ax25(0x3, 0x3, 0x0, &(0x7f0000000080)) 2018/03/06 00:07:49 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x7}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xe, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0xfa}], {0x95}}, &(0x7f0000000040)="47504c009f4e092eeb734b21846fb61227367b5410325d9be7addb4677c8c4a9f654c48b0fc37494541853573cc9de9e148a7151aec80ec9e505dacd021b193a593df82982dd0788b9a44deb515fe500538fb31a4275b7936ca800b8e81b9b22cdde482006338b", 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 2018/03/06 00:07:49 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x1a) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mkdir(&(0x7f0000000180)='./file0/file1\x00', 0x0) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000240)='./file0/file1\x00', &(0x7f00000002c0)='tmpfs\x00', 0x0, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2018/03/06 00:07:49 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000280)='./file0/file0\x00', &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='devtmpfs\x00', 0x0, &(0x7f0000000340)="f4") 2018/03/06 00:07:49 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000003000)={0x0, 0x1ffffffffffffe3d, &(0x7f0000008000)=@framed={{0x18}, [], {0x95}}, &(0x7f0000008000)='syzkaller\x00', 0x25, 0x7f, &(0x7f0000008000)=""/127}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000001fb8)={0x1, 0x5, &(0x7f0000003000)=@framed={{0x18}, [@alu={0x5, 0x0, 0x48, 0x0, 0x0, 0x0, 0xfffffffffffffffd}], {0x95}}, &(0x7f0000002ff6)='syzkaller\x00', 0x7e0, 0xe7, &(0x7f0000002f19)=""/231}, 0x47) 2018/03/06 00:07:50 executing program 7: perf_event_open(&(0x7f0000940000)={0x2, 0x78, 0xd60, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='rootfs\x00', 0x1000, &(0x7f00000002c0)) 2018/03/06 00:07:50 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000280)='./file0/file0\x00', &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='devtmpfs\x00', 0x0, &(0x7f0000000340)="f4") [ 43.563384] audit: type=1400 audit(1520294869.998:14): avc: denied { associate } for pid=5226 comm="syz-executor0" name="file0" scontext=unconfined_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=filesystem permissive=1 [ 44.432307] IPVS: ftp: loaded support on port[0] = 21 2018/03/06 00:07:50 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x1a) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mkdir(&(0x7f0000000180)='./file0/file1\x00', 0x0) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000240)='./file0/file1\x00', &(0x7f00000002c0)='tmpfs\x00', 0x0, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2018/03/06 00:07:50 executing program 6: recvmsg(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000000140)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f0000000000)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0x17d}], 0x2, &(0x7f000000c000)=""/105, 0x69}, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x6e, &(0x7f0000000080)="3447f36cbc3563f8dee5d01dbcef", &(0x7f00000000c0)=""/110}, 0x28) 2018/03/06 00:07:50 executing program 4: socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)=[], 0x28a, &(0x7f0000000000)=[]}, 0x0) sendmsg$kcm(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="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", 0x22e}], 0x1, &(0x7f0000001200)=[]}, 0x0) recvmsg(r0, &(0x7f0000001440)={&(0x7f0000000040)=@sco, 0x8, &(0x7f00000013c0)=[{&(0x7f0000000000)=""/66}, {&(0x7f0000000080)=""/52}, {&(0x7f00000000c0)=""/120}, {&(0x7f0000000200)=""/4096}, {&(0x7f0000001200)=""/120}, {&(0x7f0000001280)=""/177}, {&(0x7f0000000180)=""/17, 0x384}, {&(0x7f0000001340)=""/2}, {&(0x7f0000001380)=""/16}], 0x133, 0x0, 0x301}, 0x0) 2018/03/06 00:07:50 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000003000)={0x0, 0x1ffffffffffffe3d, &(0x7f0000008000)=@framed={{0x18}, [], {0x95}}, &(0x7f0000008000)='syzkaller\x00', 0x25, 0x7f, &(0x7f0000008000)=""/127}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000001fb8)={0x1, 0x5, &(0x7f0000003000)=@framed={{0x18}, [@alu={0x5, 0x0, 0x48, 0x0, 0x0, 0x0, 0xfffffffffffffffd}], {0x95}}, &(0x7f0000002ff6)='syzkaller\x00', 0x7e0, 0xe7, &(0x7f0000002f19)=""/231}, 0x47) 2018/03/06 00:07:50 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x7, 0x1f, 0x201a7f1a, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 2018/03/06 00:07:50 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000280)='./file0/file0\x00', &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='devtmpfs\x00', 0x0, &(0x7f0000000340)="f4") 2018/03/06 00:07:50 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)) 2018/03/06 00:07:50 executing program 1: perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}, 0x200000400, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000935000)='./file0\x00', 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f00007fc000)='nfs\x00', 0x0, &(0x7f000000a000)) [ 44.462708] tmpfs: No value for mount option 'ô' 2018/03/06 00:07:50 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x7, 0x1f, 0x201a7f1a, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 2018/03/06 00:07:50 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000003000)={0x0, 0x1ffffffffffffe3d, &(0x7f0000008000)=@framed={{0x18}, [], {0x95}}, &(0x7f0000008000)='syzkaller\x00', 0x25, 0x7f, &(0x7f0000008000)=""/127}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000001fb8)={0x1, 0x5, &(0x7f0000003000)=@framed={{0x18}, [@alu={0x5, 0x0, 0x48, 0x0, 0x0, 0x0, 0xfffffffffffffffd}], {0x95}}, &(0x7f0000002ff6)='syzkaller\x00', 0x7e0, 0xe7, &(0x7f0000002f19)=""/231}, 0x47) 2018/03/06 00:07:50 executing program 4: socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)=[], 0x28a, &(0x7f0000000000)=[]}, 0x0) sendmsg$kcm(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="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", 0x22e}], 0x1, &(0x7f0000001200)=[]}, 0x0) recvmsg(r0, &(0x7f0000001440)={&(0x7f0000000040)=@sco, 0x8, &(0x7f00000013c0)=[{&(0x7f0000000000)=""/66}, {&(0x7f0000000080)=""/52}, {&(0x7f00000000c0)=""/120}, {&(0x7f0000000200)=""/4096}, {&(0x7f0000001200)=""/120}, {&(0x7f0000001280)=""/177}, {&(0x7f0000000180)=""/17, 0x384}, {&(0x7f0000001340)=""/2}, {&(0x7f0000001380)=""/16}], 0x133, 0x0, 0x301}, 0x0) 2018/03/06 00:07:50 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x1a) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mkdir(&(0x7f0000000180)='./file0/file1\x00', 0x0) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000240)='./file0/file1\x00', &(0x7f00000002c0)='tmpfs\x00', 0x0, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2018/03/06 00:07:50 executing program 3: r0 = getpid() perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x103de, 0x0, 0x0, 0x0, 0x0, 0x1, 0x40, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000380)}}, r0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$kcm(r1, &(0x7f0000000880)={0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000500)=""/162, 0xa2}], 0x1, &(0x7f0000000840)=""/37, 0x25}, 0x0) sendmsg(r2, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000000100)="bf", 0x1}], 0x1, &(0x7f0000001180)=[]}, 0x0) 2018/03/06 00:07:51 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x1a) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mkdir(&(0x7f0000000180)='./file0/file1\x00', 0x0) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000240)='./file0/file1\x00', &(0x7f00000002c0)='tmpfs\x00', 0x0, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2018/03/06 00:07:51 executing program 6: perf_event_open(&(0x7f000025c000)={0x7, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 2018/03/06 00:07:51 executing program 1: perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}, 0x200000400, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000935000)='./file0\x00', 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f00007fc000)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/03/06 00:07:51 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000003000)={0x0, 0x1ffffffffffffe3d, &(0x7f0000008000)=@framed={{0x18}, [], {0x95}}, &(0x7f0000008000)='syzkaller\x00', 0x25, 0x7f, &(0x7f0000008000)=""/127}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000001fb8)={0x1, 0x5, &(0x7f0000003000)=@framed={{0x18}, [@alu={0x5, 0x0, 0x48, 0x0, 0x0, 0x0, 0xfffffffffffffffd}], {0x95}}, &(0x7f0000002ff6)='syzkaller\x00', 0x7e0, 0xe7, &(0x7f0000002f19)=""/231}, 0x47) 2018/03/06 00:07:51 executing program 4: socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)=[], 0x28a, &(0x7f0000000000)=[]}, 0x0) sendmsg$kcm(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="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", 0x22e}], 0x1, &(0x7f0000001200)=[]}, 0x0) recvmsg(r0, &(0x7f0000001440)={&(0x7f0000000040)=@sco, 0x8, &(0x7f00000013c0)=[{&(0x7f0000000000)=""/66}, {&(0x7f0000000080)=""/52}, {&(0x7f00000000c0)=""/120}, {&(0x7f0000000200)=""/4096}, {&(0x7f0000001200)=""/120}, {&(0x7f0000001280)=""/177}, {&(0x7f0000000180)=""/17, 0x384}, {&(0x7f0000001340)=""/2}, {&(0x7f0000001380)=""/16}], 0x133, 0x0, 0x301}, 0x0) 2018/03/06 00:07:51 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x7, 0x1f, 0x201a7f1a, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 2018/03/06 00:07:51 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x10, 0x4, 0x4, 0x5, 0x0, 0x1}, 0x2c) 2018/03/06 00:07:51 executing program 4: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000000)='usermd5sum!\x00') mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/03/06 00:07:51 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x7, 0x1f, 0x201a7f1a, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 2018/03/06 00:07:51 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x10, 0x4, 0x4, 0x5, 0x0, 0x1}, 0x2c) 2018/03/06 00:07:51 executing program 6: perf_event_open(&(0x7f000025c000)={0x7, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 2018/03/06 00:07:51 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x1a) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mkdir(&(0x7f0000000180)='./file0/file1\x00', 0x0) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000240)='./file0/file1\x00', &(0x7f00000002c0)='tmpfs\x00', 0x0, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2018/03/06 00:07:51 executing program 1: perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}, 0x200000400, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000935000)='./file0\x00', 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f00007fc000)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/03/06 00:07:51 executing program 3: r0 = getpid() perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x103de, 0x0, 0x0, 0x0, 0x0, 0x1, 0x40, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000380)}}, r0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$kcm(r1, &(0x7f0000000880)={0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000500)=""/162, 0xa2}], 0x1, &(0x7f0000000840)=""/37, 0x25}, 0x0) sendmsg(r2, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000000100)="bf", 0x1}], 0x1, &(0x7f0000001180)=[]}, 0x0) [ 45.393312] IPVS: ftp: loaded support on port[0] = 21 2018/03/06 00:07:51 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x1a) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mkdir(&(0x7f0000000180)='./file0/file1\x00', 0x0) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000240)='./file0/file1\x00', &(0x7f00000002c0)='tmpfs\x00', 0x0, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2018/03/06 00:07:51 executing program 6: perf_event_open(&(0x7f000025c000)={0x7, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 2018/03/06 00:07:51 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='sysfs\x00', 0x0, &(0x7f0000000180)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0/bus\x00', &(0x7f0000000200)='configfs\x00', 0x0, &(0x7f0000000240)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000000)='./file0/bus/file0\x00'}, 0x10) 2018/03/06 00:07:51 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x10, 0x4, 0x4, 0x5, 0x0, 0x1}, 0x2c) 2018/03/06 00:07:51 executing program 1: perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}, 0x200000400, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000935000)='./file0\x00', 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f00007fc000)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/03/06 00:07:51 executing program 4: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) gettid() mount(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, &(0x7f00000000c0)) mount(&(0x7f0000dba000)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) perf_event_open(&(0x7f00000000c0)={0x0, 0x78, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x808, 0x0, 0x100000001, 0x20000009, 0x0, 0x0, 0x0, 0x0, 0x4, 0x4, 0x0, 0x8, 0x0, 0x2, 0x0, 0xfffffffffffffffc, 0x62bb, 0x0, 0x3, 0x200, 0x3, 0x6, 0x0, 0x0, 0x0, 0x7, 0x1385, 0x0, 0x0, 0x9, 0x0, 0x5cd, 0x0, @perf_config_ext={0x200, 0x3}, 0x20000, 0x0, 0x0, 0x8}, 0x0, 0x0, r0, 0x7) perf_event_open(&(0x7f000000a000)={0x1, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, @perf_bp={&(0x7f0000496fff), 0x800000}, 0x0, 0x20000000, 0x10000000006, 0x400010}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) mount(&(0x7f00009f8000)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f00005f7ffb)='nfs4\x00', 0x0, &(0x7f000000a000)) 2018/03/06 00:07:51 executing program 0: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000001340)="f7") 2018/03/06 00:07:51 executing program 3: r0 = getpid() perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x103de, 0x0, 0x0, 0x0, 0x0, 0x1, 0x40, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000380)}}, r0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$kcm(r1, &(0x7f0000000880)={0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000500)=""/162, 0xa2}], 0x1, &(0x7f0000000840)=""/37, 0x25}, 0x0) sendmsg(r2, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000000100)="bf", 0x1}], 0x1, &(0x7f0000001180)=[]}, 0x0) 2018/03/06 00:07:51 executing program 6: perf_event_open(&(0x7f000025c000)={0x7, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 2018/03/06 00:07:51 executing program 0: close(0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x1, 0x5, 0x9}, 0x14) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={0xffffffffffffffff, &(0x7f0000000100), &(0x7f0000000200)}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x100000001, 0x0, r0}, 0x1c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00005f1000)={r1, &(0x7f0000eed000), &(0x7f0000b88000)="13"}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000500)={r1, &(0x7f0000000000), &(0x7f0000000440)=""/129}, 0x18) 2018/03/06 00:07:51 executing program 1: mkdir(&(0x7f0000001c40)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='overlay\x00', 0x8000, 0x0) 2018/03/06 00:07:51 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='sysfs\x00', 0x0, &(0x7f0000000180)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0/bus\x00', &(0x7f0000000200)='configfs\x00', 0x0, &(0x7f0000000240)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000000)='./file0/bus/file0\x00'}, 0x10) 2018/03/06 00:07:51 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x10, 0x4, 0x4, 0x5, 0x0, 0x1}, 0x2c) 2018/03/06 00:07:51 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='sysfs\x00', 0x0, &(0x7f0000000180)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0/bus\x00', &(0x7f0000000200)='configfs\x00', 0x0, &(0x7f0000000240)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000000)='./file0/bus/file0\x00'}, 0x10) 2018/03/06 00:07:51 executing program 4: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) gettid() mount(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, &(0x7f00000000c0)) mount(&(0x7f0000dba000)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) perf_event_open(&(0x7f00000000c0)={0x0, 0x78, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x808, 0x0, 0x100000001, 0x20000009, 0x0, 0x0, 0x0, 0x0, 0x4, 0x4, 0x0, 0x8, 0x0, 0x2, 0x0, 0xfffffffffffffffc, 0x62bb, 0x0, 0x3, 0x200, 0x3, 0x6, 0x0, 0x0, 0x0, 0x7, 0x1385, 0x0, 0x0, 0x9, 0x0, 0x5cd, 0x0, @perf_config_ext={0x200, 0x3}, 0x20000, 0x0, 0x0, 0x8}, 0x0, 0x0, r0, 0x7) perf_event_open(&(0x7f000000a000)={0x1, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, @perf_bp={&(0x7f0000496fff), 0x800000}, 0x0, 0x20000000, 0x10000000006, 0x400010}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) mount(&(0x7f00009f8000)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f00005f7ffb)='nfs4\x00', 0x0, &(0x7f000000a000)) 2018/03/06 00:07:51 executing program 3: r0 = getpid() perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x103de, 0x0, 0x0, 0x0, 0x0, 0x1, 0x40, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000380)}}, r0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$kcm(r1, &(0x7f0000000880)={0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000500)=""/162, 0xa2}], 0x1, &(0x7f0000000840)=""/37, 0x25}, 0x0) sendmsg(r2, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000000100)="bf", 0x1}], 0x1, &(0x7f0000001180)=[]}, 0x0) 2018/03/06 00:07:52 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x1a) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mkdir(&(0x7f0000000180)='./file0/file1\x00', 0x0) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000240)='./file0/file1\x00', &(0x7f00000002c0)='tmpfs\x00', 0x0, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2018/03/06 00:07:52 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) gettid() mount(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, &(0x7f00000000c0)) mount(&(0x7f0000dba000)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) perf_event_open(&(0x7f00000000c0)={0x0, 0x78, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x808, 0x0, 0x100000001, 0x20000009, 0x0, 0x0, 0x0, 0x0, 0x4, 0x4, 0x0, 0x8, 0x0, 0x2, 0x0, 0xfffffffffffffffc, 0x62bb, 0x0, 0x3, 0x200, 0x3, 0x6, 0x0, 0x0, 0x0, 0x7, 0x1385, 0x0, 0x0, 0x9, 0x0, 0x5cd, 0x0, @perf_config_ext={0x200, 0x3}, 0x20000, 0x0, 0x0, 0x8}, 0x0, 0x0, r0, 0x7) perf_event_open(&(0x7f000000a000)={0x1, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, @perf_bp={&(0x7f0000496fff), 0x800000}, 0x0, 0x20000000, 0x10000000006, 0x400010}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) mount(&(0x7f00009f8000)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f00005f7ffb)='nfs4\x00', 0x0, &(0x7f000000a000)) 2018/03/06 00:07:52 executing program 3: close(0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x1, 0x5, 0x9}, 0x14) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={0xffffffffffffffff, &(0x7f0000000100), &(0x7f0000000200)}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x100000001, 0x0, r0}, 0x1c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00005f1000)={r1, &(0x7f0000eed000), &(0x7f0000b88000)="13"}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000500)={r1, &(0x7f0000000000), &(0x7f0000000440)=""/129}, 0x18) 2018/03/06 00:07:52 executing program 1: close(0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x1, 0x5, 0x9}, 0x14) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={0xffffffffffffffff, &(0x7f0000000100), &(0x7f0000000200)}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x100000001, 0x0, r0}, 0x1c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00005f1000)={r1, &(0x7f0000eed000), &(0x7f0000b88000)="13"}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000500)={r1, &(0x7f0000000000), &(0x7f0000000440)=""/129}, 0x18) 2018/03/06 00:07:52 executing program 4: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) gettid() mount(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, &(0x7f00000000c0)) mount(&(0x7f0000dba000)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) perf_event_open(&(0x7f00000000c0)={0x0, 0x78, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x808, 0x0, 0x100000001, 0x20000009, 0x0, 0x0, 0x0, 0x0, 0x4, 0x4, 0x0, 0x8, 0x0, 0x2, 0x0, 0xfffffffffffffffc, 0x62bb, 0x0, 0x3, 0x200, 0x3, 0x6, 0x0, 0x0, 0x0, 0x7, 0x1385, 0x0, 0x0, 0x9, 0x0, 0x5cd, 0x0, @perf_config_ext={0x200, 0x3}, 0x20000, 0x0, 0x0, 0x8}, 0x0, 0x0, r0, 0x7) perf_event_open(&(0x7f000000a000)={0x1, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, @perf_bp={&(0x7f0000496fff), 0x800000}, 0x0, 0x20000000, 0x10000000006, 0x400010}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) mount(&(0x7f00009f8000)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f00005f7ffb)='nfs4\x00', 0x0, &(0x7f000000a000)) 2018/03/06 00:07:52 executing program 0: close(0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x1, 0x5, 0x9}, 0x14) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={0xffffffffffffffff, &(0x7f0000000100), &(0x7f0000000200)}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x100000001, 0x0, r0}, 0x1c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00005f1000)={r1, &(0x7f0000eed000), &(0x7f0000b88000)="13"}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000500)={r1, &(0x7f0000000000), &(0x7f0000000440)=""/129}, 0x18) 2018/03/06 00:07:52 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='sysfs\x00', 0x0, &(0x7f0000000180)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0/bus\x00', &(0x7f0000000200)='configfs\x00', 0x0, &(0x7f0000000240)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000000)='./file0/bus/file0\x00'}, 0x10) 2018/03/06 00:07:52 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='sysfs\x00', 0x0, &(0x7f0000000180)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0/bus\x00', &(0x7f0000000200)='configfs\x00', 0x0, &(0x7f0000000240)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000000)='./file0/bus/file0\x00'}, 0x10) 2018/03/06 00:07:52 executing program 0: close(0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x1, 0x5, 0x9}, 0x14) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={0xffffffffffffffff, &(0x7f0000000100), &(0x7f0000000200)}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x100000001, 0x0, r0}, 0x1c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00005f1000)={r1, &(0x7f0000eed000), &(0x7f0000b88000)="13"}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000500)={r1, &(0x7f0000000000), &(0x7f0000000440)=""/129}, 0x18) 2018/03/06 00:07:52 executing program 1: close(0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x1, 0x5, 0x9}, 0x14) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={0xffffffffffffffff, &(0x7f0000000100), &(0x7f0000000200)}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x100000001, 0x0, r0}, 0x1c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00005f1000)={r1, &(0x7f0000eed000), &(0x7f0000b88000)="13"}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000500)={r1, &(0x7f0000000000), &(0x7f0000000440)=""/129}, 0x18) 2018/03/06 00:07:52 executing program 3: close(0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x1, 0x5, 0x9}, 0x14) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={0xffffffffffffffff, &(0x7f0000000100), &(0x7f0000000200)}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x100000001, 0x0, r0}, 0x1c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00005f1000)={r1, &(0x7f0000eed000), &(0x7f0000b88000)="13"}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000500)={r1, &(0x7f0000000000), &(0x7f0000000440)=""/129}, 0x18) 2018/03/06 00:07:52 executing program 0: close(0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x1, 0x5, 0x9}, 0x14) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={0xffffffffffffffff, &(0x7f0000000100), &(0x7f0000000200)}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x100000001, 0x0, r0}, 0x1c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00005f1000)={r1, &(0x7f0000eed000), &(0x7f0000b88000)="13"}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000500)={r1, &(0x7f0000000000), &(0x7f0000000440)=""/129}, 0x18) 2018/03/06 00:07:52 executing program 1: close(0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x1, 0x5, 0x9}, 0x14) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={0xffffffffffffffff, &(0x7f0000000100), &(0x7f0000000200)}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x100000001, 0x0, r0}, 0x1c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00005f1000)={r1, &(0x7f0000eed000), &(0x7f0000b88000)="13"}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000500)={r1, &(0x7f0000000000), &(0x7f0000000440)=""/129}, 0x18) 2018/03/06 00:07:52 executing program 3: close(0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x1, 0x5, 0x9}, 0x14) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={0xffffffffffffffff, &(0x7f0000000100), &(0x7f0000000200)}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x100000001, 0x0, r0}, 0x1c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00005f1000)={r1, &(0x7f0000eed000), &(0x7f0000b88000)="13"}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000500)={r1, &(0x7f0000000000), &(0x7f0000000440)=""/129}, 0x18) [ 46.434419] IPVS: ftp: loaded support on port[0] = 21 [ 46.460947] IPVS: ftp: loaded support on port[0] = 21 [ 47.564545] IPVS: ftp: loaded support on port[0] = 21 2018/03/06 00:07:54 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='sysfs\x00', 0x0, &(0x7f0000000180)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0/bus\x00', &(0x7f0000000200)='configfs\x00', 0x0, &(0x7f0000000240)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000000)='./file0/bus/file0\x00'}, 0x10) 2018/03/06 00:07:54 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x78, 0x3de, 0x0, 0x0, 0x0, 0x0, 0x1, 0xa096, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f00000001c0)={0x0, 0xf2, &(0x7f0000000200)=[], 0x12d, &(0x7f0000000000)=""/251, 0xffffffffffffffc9}, 0x0) sendmsg(r1, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000000100)="bf", 0x1}], 0x1, &(0x7f0000001180)=[]}, 0x0) 2018/03/06 00:07:54 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f00000007c0)={0xf, 0x4, 0x0, 0x2}, 0x2c) 2018/03/06 00:07:54 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) gettid() mount(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, &(0x7f00000000c0)) mount(&(0x7f0000dba000)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) perf_event_open(&(0x7f00000000c0)={0x0, 0x78, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x808, 0x0, 0x100000001, 0x20000009, 0x0, 0x0, 0x0, 0x0, 0x4, 0x4, 0x0, 0x8, 0x0, 0x2, 0x0, 0xfffffffffffffffc, 0x62bb, 0x0, 0x3, 0x200, 0x3, 0x6, 0x0, 0x0, 0x0, 0x7, 0x1385, 0x0, 0x0, 0x9, 0x0, 0x5cd, 0x0, @perf_config_ext={0x200, 0x3}, 0x20000, 0x0, 0x0, 0x8}, 0x0, 0x0, r0, 0x7) perf_event_open(&(0x7f000000a000)={0x1, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, @perf_bp={&(0x7f0000496fff), 0x800000}, 0x0, 0x20000000, 0x10000000006, 0x400010}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) mount(&(0x7f00009f8000)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f00005f7ffb)='nfs4\x00', 0x0, &(0x7f000000a000)) 2018/03/06 00:07:54 executing program 1: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) gettid() mount(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, &(0x7f00000000c0)) mount(&(0x7f0000dba000)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) perf_event_open(&(0x7f00000000c0)={0x0, 0x78, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x808, 0x0, 0x100000001, 0x20000009, 0x0, 0x0, 0x0, 0x0, 0x4, 0x4, 0x0, 0x8, 0x0, 0x2, 0x0, 0xfffffffffffffffc, 0x62bb, 0x0, 0x3, 0x200, 0x3, 0x6, 0x0, 0x0, 0x0, 0x7, 0x1385, 0x0, 0x0, 0x9, 0x0, 0x5cd, 0x0, @perf_config_ext={0x200, 0x3}, 0x20000, 0x0, 0x0, 0x8}, 0x0, 0x0, r0, 0x7) perf_event_open(&(0x7f000000a000)={0x1, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, @perf_bp={&(0x7f0000496fff), 0x800000}, 0x0, 0x20000000, 0x10000000006, 0x400010}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) mount(&(0x7f00009f8000)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f00005f7ffb)='nfs4\x00', 0x0, &(0x7f000000a000)) 2018/03/06 00:07:54 executing program 4: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) gettid() mount(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, &(0x7f00000000c0)) mount(&(0x7f0000dba000)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) perf_event_open(&(0x7f00000000c0)={0x0, 0x78, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x808, 0x0, 0x100000001, 0x20000009, 0x0, 0x0, 0x0, 0x0, 0x4, 0x4, 0x0, 0x8, 0x0, 0x2, 0x0, 0xfffffffffffffffc, 0x62bb, 0x0, 0x3, 0x200, 0x3, 0x6, 0x0, 0x0, 0x0, 0x7, 0x1385, 0x0, 0x0, 0x9, 0x0, 0x5cd, 0x0, @perf_config_ext={0x200, 0x3}, 0x20000, 0x0, 0x0, 0x8}, 0x0, 0x0, r0, 0x7) perf_event_open(&(0x7f000000a000)={0x1, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, @perf_bp={&(0x7f0000496fff), 0x800000}, 0x0, 0x20000000, 0x10000000006, 0x400010}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) mount(&(0x7f00009f8000)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f00005f7ffb)='nfs4\x00', 0x0, &(0x7f000000a000)) 2018/03/06 00:07:54 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) gettid() mount(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, &(0x7f00000000c0)) mount(&(0x7f0000dba000)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) perf_event_open(&(0x7f00000000c0)={0x0, 0x78, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x808, 0x0, 0x100000001, 0x20000009, 0x0, 0x0, 0x0, 0x0, 0x4, 0x4, 0x0, 0x8, 0x0, 0x2, 0x0, 0xfffffffffffffffc, 0x62bb, 0x0, 0x3, 0x200, 0x3, 0x6, 0x0, 0x0, 0x0, 0x7, 0x1385, 0x0, 0x0, 0x9, 0x0, 0x5cd, 0x0, @perf_config_ext={0x200, 0x3}, 0x20000, 0x0, 0x0, 0x8}, 0x0, 0x0, r0, 0x7) perf_event_open(&(0x7f000000a000)={0x1, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, @perf_bp={&(0x7f0000496fff), 0x800000}, 0x0, 0x20000000, 0x10000000006, 0x400010}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) mount(&(0x7f00009f8000)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f00005f7ffb)='nfs4\x00', 0x0, &(0x7f000000a000)) 2018/03/06 00:07:54 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='sysfs\x00', 0x0, &(0x7f0000000180)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0/bus\x00', &(0x7f0000000200)='configfs\x00', 0x0, &(0x7f0000000240)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000000)='./file0/bus/file0\x00'}, 0x10) 2018/03/06 00:07:54 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) gettid() mount(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, &(0x7f00000000c0)) mount(&(0x7f0000dba000)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) perf_event_open(&(0x7f00000000c0)={0x0, 0x78, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x808, 0x0, 0x100000001, 0x20000009, 0x0, 0x0, 0x0, 0x0, 0x4, 0x4, 0x0, 0x8, 0x0, 0x2, 0x0, 0xfffffffffffffffc, 0x62bb, 0x0, 0x3, 0x200, 0x3, 0x6, 0x0, 0x0, 0x0, 0x7, 0x1385, 0x0, 0x0, 0x9, 0x0, 0x5cd, 0x0, @perf_config_ext={0x200, 0x3}, 0x20000, 0x0, 0x0, 0x8}, 0x0, 0x0, r0, 0x7) perf_event_open(&(0x7f000000a000)={0x1, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, @perf_bp={&(0x7f0000496fff), 0x800000}, 0x0, 0x20000000, 0x10000000006, 0x400010}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) mount(&(0x7f00009f8000)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f00005f7ffb)='nfs4\x00', 0x0, &(0x7f000000a000)) [ 49.583122] IPVS: ftp: loaded support on port[0] = 21 [ 49.609143] IPVS: ftp: loaded support on port[0] = 21 [ 49.645716] IPVS: ftp: loaded support on port[0] = 21 2018/03/06 00:07:56 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f00000007c0)={0xf, 0x4, 0x0, 0x2}, 0x2c) 2018/03/06 00:07:56 executing program 6: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x2bb3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) 2018/03/06 00:07:56 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) gettid() mount(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, &(0x7f00000000c0)) mount(&(0x7f0000dba000)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) perf_event_open(&(0x7f00000000c0)={0x0, 0x78, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x808, 0x0, 0x100000001, 0x20000009, 0x0, 0x0, 0x0, 0x0, 0x4, 0x4, 0x0, 0x8, 0x0, 0x2, 0x0, 0xfffffffffffffffc, 0x62bb, 0x0, 0x3, 0x200, 0x3, 0x6, 0x0, 0x0, 0x0, 0x7, 0x1385, 0x0, 0x0, 0x9, 0x0, 0x5cd, 0x0, @perf_config_ext={0x200, 0x3}, 0x20000, 0x0, 0x0, 0x8}, 0x0, 0x0, r0, 0x7) perf_event_open(&(0x7f000000a000)={0x1, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, @perf_bp={&(0x7f0000496fff), 0x800000}, 0x0, 0x20000000, 0x10000000006, 0x400010}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) mount(&(0x7f00009f8000)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f00005f7ffb)='nfs4\x00', 0x0, &(0x7f000000a000)) 2018/03/06 00:07:56 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x78, 0x3de, 0x0, 0x0, 0x0, 0x0, 0x1, 0xa096, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f00000001c0)={0x0, 0xf2, &(0x7f0000000200)=[], 0x12d, &(0x7f0000000000)=""/251, 0xffffffffffffffc9}, 0x0) sendmsg(r1, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000000100)="bf", 0x1}], 0x1, &(0x7f0000001180)=[]}, 0x0) 2018/03/06 00:07:56 executing program 1: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) gettid() mount(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, &(0x7f00000000c0)) mount(&(0x7f0000dba000)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) perf_event_open(&(0x7f00000000c0)={0x0, 0x78, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x808, 0x0, 0x100000001, 0x20000009, 0x0, 0x0, 0x0, 0x0, 0x4, 0x4, 0x0, 0x8, 0x0, 0x2, 0x0, 0xfffffffffffffffc, 0x62bb, 0x0, 0x3, 0x200, 0x3, 0x6, 0x0, 0x0, 0x0, 0x7, 0x1385, 0x0, 0x0, 0x9, 0x0, 0x5cd, 0x0, @perf_config_ext={0x200, 0x3}, 0x20000, 0x0, 0x0, 0x8}, 0x0, 0x0, r0, 0x7) perf_event_open(&(0x7f000000a000)={0x1, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, @perf_bp={&(0x7f0000496fff), 0x800000}, 0x0, 0x20000000, 0x10000000006, 0x400010}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) mount(&(0x7f00009f8000)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f00005f7ffb)='nfs4\x00', 0x0, &(0x7f000000a000)) 2018/03/06 00:07:56 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x78, 0x3de, 0x0, 0x0, 0x0, 0x0, 0x1, 0xa096, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f00000001c0)={0x0, 0xf2, &(0x7f0000000200)=[], 0x12d, &(0x7f0000000000)=""/251, 0xffffffffffffffc9}, 0x0) sendmsg(r1, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000000100)="bf", 0x1}], 0x1, &(0x7f0000001180)=[]}, 0x0) 2018/03/06 00:07:56 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) gettid() mount(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, &(0x7f00000000c0)) mount(&(0x7f0000dba000)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) perf_event_open(&(0x7f00000000c0)={0x0, 0x78, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x808, 0x0, 0x100000001, 0x20000009, 0x0, 0x0, 0x0, 0x0, 0x4, 0x4, 0x0, 0x8, 0x0, 0x2, 0x0, 0xfffffffffffffffc, 0x62bb, 0x0, 0x3, 0x200, 0x3, 0x6, 0x0, 0x0, 0x0, 0x7, 0x1385, 0x0, 0x0, 0x9, 0x0, 0x5cd, 0x0, @perf_config_ext={0x200, 0x3}, 0x20000, 0x0, 0x0, 0x8}, 0x0, 0x0, r0, 0x7) perf_event_open(&(0x7f000000a000)={0x1, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, @perf_bp={&(0x7f0000496fff), 0x800000}, 0x0, 0x20000000, 0x10000000006, 0x400010}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) mount(&(0x7f00009f8000)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f00005f7ffb)='nfs4\x00', 0x0, &(0x7f000000a000)) 2018/03/06 00:07:56 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x78, 0x3de, 0x0, 0x0, 0x0, 0x0, 0x1, 0xa096, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f00000001c0)={0x0, 0xf2, &(0x7f0000000200)=[], 0x12d, &(0x7f0000000000)=""/251, 0xffffffffffffffc9}, 0x0) sendmsg(r1, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000000100)="bf", 0x1}], 0x1, &(0x7f0000001180)=[]}, 0x0) 2018/03/06 00:07:56 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f00000007c0)={0xf, 0x4, 0x0, 0x2}, 0x2c) 2018/03/06 00:07:56 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x78, 0x3de, 0x0, 0x0, 0x0, 0x0, 0x1, 0xa096, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f00000001c0)={0x0, 0xf2, &(0x7f0000000200)=[], 0x12d, &(0x7f0000000000)=""/251, 0xffffffffffffffc9}, 0x0) sendmsg(r1, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000000100)="bf", 0x1}], 0x1, &(0x7f0000001180)=[]}, 0x0) 2018/03/06 00:07:56 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f00000007c0)={0xf, 0x4, 0x0, 0x2}, 0x2c) 2018/03/06 00:07:56 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x78, 0x3de, 0x0, 0x0, 0x0, 0x0, 0x1, 0xa096, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f00000001c0)={0x0, 0xf2, &(0x7f0000000200)=[], 0x12d, &(0x7f0000000000)=""/251, 0xffffffffffffffc9}, 0x0) sendmsg(r1, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000000100)="bf", 0x1}], 0x1, &(0x7f0000001180)=[]}, 0x0) 2018/03/06 00:07:56 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xe, 0x4, 0x4, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f]}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000000c0)={r0, &(0x7f0000000080)}, 0x10) 2018/03/06 00:07:56 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xe, 0x4, 0x4, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f]}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000000c0)={r0, &(0x7f0000000080)}, 0x10) 2018/03/06 00:07:56 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x78, 0x3de, 0x0, 0x0, 0x0, 0x0, 0x1, 0xa096, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f00000001c0)={0x0, 0xf2, &(0x7f0000000200)=[], 0x12d, &(0x7f0000000000)=""/251, 0xffffffffffffffc9}, 0x0) sendmsg(r1, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000000100)="bf", 0x1}], 0x1, &(0x7f0000001180)=[]}, 0x0) 2018/03/06 00:07:56 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xe, 0x4, 0x4, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f]}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000000c0)={r0, &(0x7f0000000080)}, 0x10) 2018/03/06 00:07:56 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xe, 0x4, 0x4, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f]}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000000c0)={r0, &(0x7f0000000080)}, 0x10) [ 50.550152] IPVS: ftp: loaded support on port[0] = 21 [ 50.577785] IPVS: ftp: loaded support on port[0] = 21 2018/03/06 00:07:57 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x98b2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000291000)={0x1, 0x2, &(0x7f000084cff0)=@raw=[@alu], &(0x7f000092e000)='GPL\x00', 0x1, 0xf7, &(0x7f00006f8000)=""/247}, 0x23) [ 50.605667] IPVS: ftp: loaded support on port[0] = 21 2018/03/06 00:07:57 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0xc0189436, &(0x7f0000000000)) 2018/03/06 00:07:57 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file1\x00', 0x0) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file1\x00', &(0x7f0000000140)='mqueue\x00', 0x0, &(0x7f0000000200)) [ 51.622098] IPVS: ftp: loaded support on port[0] = 21 [ 51.648490] IPVS: ftp: loaded support on port[0] = 21 [ 51.679056] IPVS: ftp: loaded support on port[0] = 21 2018/03/06 00:07:58 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x78, 0x3de, 0x0, 0x0, 0x0, 0x0, 0x1, 0xa096, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f00000001c0)={0x0, 0xf2, &(0x7f0000000200)=[], 0x12d, &(0x7f0000000000)=""/251, 0xffffffffffffffc9}, 0x0) sendmsg(r1, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000000100)="bf", 0x1}], 0x1, &(0x7f0000001180)=[]}, 0x0) 2018/03/06 00:07:58 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x78, 0x3de, 0x0, 0x0, 0x0, 0x0, 0x1, 0xa096, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f00000001c0)={0x0, 0xf2, &(0x7f0000000200)=[], 0x12d, &(0x7f0000000000)=""/251, 0xffffffffffffffc9}, 0x0) sendmsg(r1, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000000100)="bf", 0x1}], 0x1, &(0x7f0000001180)=[]}, 0x0) 2018/03/06 00:07:58 executing program 1: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) gettid() mount(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, &(0x7f00000000c0)) mount(&(0x7f0000dba000)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) perf_event_open(&(0x7f00000000c0)={0x0, 0x78, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x808, 0x0, 0x100000001, 0x20000009, 0x0, 0x0, 0x0, 0x0, 0x4, 0x4, 0x0, 0x8, 0x0, 0x2, 0x0, 0xfffffffffffffffc, 0x62bb, 0x0, 0x3, 0x200, 0x3, 0x6, 0x0, 0x0, 0x0, 0x7, 0x1385, 0x0, 0x0, 0x9, 0x0, 0x5cd, 0x0, @perf_config_ext={0x200, 0x3}, 0x20000, 0x0, 0x0, 0x8}, 0x0, 0x0, r0, 0x7) perf_event_open(&(0x7f000000a000)={0x1, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, @perf_bp={&(0x7f0000496fff), 0x800000}, 0x0, 0x20000000, 0x10000000006, 0x400010}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) mount(&(0x7f00009f8000)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f00005f7ffb)='nfs4\x00', 0x0, &(0x7f000000a000)) 2018/03/06 00:07:58 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0xc0189436, &(0x7f0000000000)) 2018/03/06 00:07:58 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x98b2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000291000)={0x1, 0x2, &(0x7f000084cff0)=@raw=[@alu], &(0x7f000092e000)='GPL\x00', 0x1, 0xf7, &(0x7f00006f8000)=""/247}, 0x23) 2018/03/06 00:07:58 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xc, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="85000000220000000700000000009b009500000000000000"], &(0x7f00000001c0)="73797a6b616c6c65720001be826e8f833152f795b4d9f4bc3ea582523aed371b084fccfc3d2ef2cbe65d30642ca8dcd0f8479be52e66937908f1d8112489e8099d9d4edb806d81189c0fbb6818d028546c35d3363d54db0db780f54977ae6359d617c1d233d8e18abfc75f9a76cd8e1f77583bc02f07a33de6f304e95db82fd4da55ebd25162df6f88e7d1bb0654ffb31e008967", 0x1, 0x99, &(0x7f000000d000)=""/153}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x1000, &(0x7f0000000480)="288b6692b5c352f6677525060800", &(0x7f0000000580)=""/4096}, 0x28) 2018/03/06 00:07:58 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0xc0189436, &(0x7f0000000000)) 2018/03/06 00:07:58 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file1\x00', 0x0) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file1\x00', &(0x7f0000000140)='mqueue\x00', 0x0, &(0x7f0000000200)) 2018/03/06 00:07:58 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x98b2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000291000)={0x1, 0x2, &(0x7f000084cff0)=@raw=[@alu], &(0x7f000092e000)='GPL\x00', 0x1, 0xf7, &(0x7f00006f8000)=""/247}, 0x23) 2018/03/06 00:07:58 executing program 1: mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f00000000c0)="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") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x1, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000496fff)}, 0x0, 0x20000100, 0x10000000006, 0x400010}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00009f8000)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f00005f7ffb)='nfs4\x00', 0x0, &(0x7f000000a000)) 2018/03/06 00:07:58 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0xc0189436, &(0x7f0000000000)) 2018/03/06 00:07:58 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x78, 0x3de, 0x0, 0x0, 0x0, 0x0, 0x1, 0xa096, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f00000001c0)={0x0, 0xf2, &(0x7f0000000200)=[], 0x12d, &(0x7f0000000000)=""/251, 0xffffffffffffffc9}, 0x0) sendmsg(r1, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000000100)="bf", 0x1}], 0x1, &(0x7f0000001180)=[]}, 0x0) 2018/03/06 00:07:58 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file1\x00', 0x0) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file1\x00', &(0x7f0000000140)='mqueue\x00', 0x0, &(0x7f0000000200)) 2018/03/06 00:07:58 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0xc0189436, &(0x7f0000000000)) 2018/03/06 00:07:58 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000)=[], 0x0, &(0x7f0000298000)=[{0x18, 0x1, 0x1, "13"}], 0x18}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r1) sendmsg(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000300)=[], 0x0, &(0x7f0000000340)=[]}, 0x0) close(r2) 2018/03/06 00:07:58 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x98b2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000291000)={0x1, 0x2, &(0x7f000084cff0)=@raw=[@alu], &(0x7f000092e000)='GPL\x00', 0x1, 0xf7, &(0x7f00006f8000)=""/247}, 0x23) 2018/03/06 00:07:58 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file1\x00', 0x0) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file1\x00', &(0x7f0000000140)='mqueue\x00', 0x0, &(0x7f0000000200)) 2018/03/06 00:07:58 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x6, 0x4, 0x841d, 0x200}, 0x2c) 2018/03/06 00:07:58 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x9, 0x7f, 0x9, 0x7fc}, 0x2c) [ 52.683809] IPVS: ftp: loaded support on port[0] = 21 [ 53.611343] IPVS: ftp: loaded support on port[0] = 21 [ 53.637143] IPVS: ftp: loaded support on port[0] = 21 2018/03/06 00:08:00 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0xc0189436, &(0x7f0000000000)) 2018/03/06 00:08:00 executing program 4: perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x10) 2018/03/06 00:08:00 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xc, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="85000000220000000700000000009b009500000000000000"], &(0x7f00000001c0)="73797a6b616c6c65720001be826e8f833152f795b4d9f4bc3ea582523aed371b084fccfc3d2ef2cbe65d30642ca8dcd0f8479be52e66937908f1d8112489e8099d9d4edb806d81189c0fbb6818d028546c35d3363d54db0db780f54977ae6359d617c1d233d8e18abfc75f9a76cd8e1f77583bc02f07a33de6f304e95db82fd4da55ebd25162df6f88e7d1bb0654ffb31e008967", 0x1, 0x99, &(0x7f000000d000)=""/153}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x1000, &(0x7f0000000480)="288b6692b5c352f6677525060800", &(0x7f0000000580)=""/4096}, 0x28) 2018/03/06 00:08:00 executing program 6: recvmsg(0xffffffffffffffff, &(0x7f0000687fe4)={&(0x7f0000814000)=@nfc_llcp, 0x58, &(0x7f00007defe0)=[], 0x20000000000001eb, &(0x7f0000813f65)=""/155, 0x9b}, 0xfffffffffffffffc) 2018/03/06 00:08:00 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x7}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x2, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x1f, 0x7, 0x0, 0x1, 0x1c}], {0x95}}, &(0x7f0000000180)='GPL\x00i', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251, 0x41000}, 0x48) 2018/03/06 00:08:00 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x6, 0x4, 0x841d, 0x200}, 0x2c) 2018/03/06 00:08:00 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000)=[], 0x0, &(0x7f0000298000)=[{0x18, 0x1, 0x1, "13"}], 0x18}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r1) sendmsg(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000300)=[], 0x0, &(0x7f0000000340)=[]}, 0x0) close(r2) 2018/03/06 00:08:00 executing program 1: mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f00000000c0)="833f8293a5dd9232f472d5e37766b45428ffd97f738d772be144e293300f3c3001a956036d2340124b657b69c3ddf816890aacc74aec66eca568f37181535e3355b69e35c0ccfd75a16e73cfcd5fa952ed320268b8b408374cff19bb19fabf288773c40c05e5ce3d3fd1e66ef5e7b10c670aace0b45dfca4196d9bbcb57e4df10c1086d2e62178a116edb6ec9cdaac932e1e81a3095fc678a6c6a3fac3c93e678bcb3d44385d103ef4e4c52d8049091862645e272ed3d0c9afdd068e28a0dd7a88e755c8bcc6ee6ebab1c9028a29195266bf1a053d69eeb382b24a4973d263b4a2b978171776bc28b52d43bacb0ea0fc4c8049835fe86ad8204988c2600b8f7b210f592e7c3f775ed687f4363c711be4866a95f37c8396344b48b56a0b71a2cbc490c0e62a050fd91deec1725a1e157c1452570720a6ea61aab0d2a910c235e1") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x1, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000496fff)}, 0x0, 0x20000100, 0x10000000006, 0x400010}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00009f8000)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f00005f7ffb)='nfs4\x00', 0x0, &(0x7f000000a000)) 2018/03/06 00:08:00 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0xc0189436, &(0x7f0000000000)) 2018/03/06 00:08:00 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000)=[], 0x0, &(0x7f0000298000)=[{0x18, 0x1, 0x1, "13"}], 0x18}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r1) sendmsg(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000300)=[], 0x0, &(0x7f0000000340)=[]}, 0x0) close(r2) 2018/03/06 00:08:00 executing program 6: recvmsg(0xffffffffffffffff, &(0x7f0000687fe4)={&(0x7f0000814000)=@nfc_llcp, 0x58, &(0x7f00007defe0)=[], 0x20000000000001eb, &(0x7f0000813f65)=""/155, 0x9b}, 0xfffffffffffffffc) 2018/03/06 00:08:00 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x6, 0x4, 0x841d, 0x200}, 0x2c) 2018/03/06 00:08:00 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000)=[], 0x0, &(0x7f0000298000)=[{0x18, 0x1, 0x1, "13"}], 0x18}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r1) sendmsg(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000300)=[], 0x0, &(0x7f0000000340)=[]}, 0x0) close(r2) 2018/03/06 00:08:00 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x7}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x2, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x1f, 0x7, 0x0, 0x1, 0x1c}], {0x95}}, &(0x7f0000000180)='GPL\x00i', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251, 0x41000}, 0x48) 2018/03/06 00:08:00 executing program 1: mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f00000000c0)="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") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x1, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000496fff)}, 0x0, 0x20000100, 0x10000000006, 0x400010}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00009f8000)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f00005f7ffb)='nfs4\x00', 0x0, &(0x7f000000a000)) 2018/03/06 00:08:00 executing program 6: recvmsg(0xffffffffffffffff, &(0x7f0000687fe4)={&(0x7f0000814000)=@nfc_llcp, 0x58, &(0x7f00007defe0)=[], 0x20000000000001eb, &(0x7f0000813f65)=""/155, 0x9b}, 0xfffffffffffffffc) 2018/03/06 00:08:00 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x6, 0x4, 0x841d, 0x200}, 0x2c) 2018/03/06 00:08:00 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000)=[], 0x0, &(0x7f0000298000)=[{0x18, 0x1, 0x1, "13"}], 0x18}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r1) sendmsg(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000300)=[], 0x0, &(0x7f0000000340)=[]}, 0x0) close(r2) 2018/03/06 00:08:00 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xc, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="85000000220000000700000000009b009500000000000000"], &(0x7f00000001c0)="73797a6b616c6c65720001be826e8f833152f795b4d9f4bc3ea582523aed371b084fccfc3d2ef2cbe65d30642ca8dcd0f8479be52e66937908f1d8112489e8099d9d4edb806d81189c0fbb6818d028546c35d3363d54db0db780f54977ae6359d617c1d233d8e18abfc75f9a76cd8e1f77583bc02f07a33de6f304e95db82fd4da55ebd25162df6f88e7d1bb0654ffb31e008967", 0x1, 0x99, &(0x7f000000d000)=""/153}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x1000, &(0x7f0000000480)="288b6692b5c352f6677525060800", &(0x7f0000000580)=""/4096}, 0x28) 2018/03/06 00:08:00 executing program 1: mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f00000000c0)="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") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x1, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000496fff)}, 0x0, 0x20000100, 0x10000000006, 0x400010}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00009f8000)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f00005f7ffb)='nfs4\x00', 0x0, &(0x7f000000a000)) 2018/03/06 00:08:00 executing program 6: recvmsg(0xffffffffffffffff, &(0x7f0000687fe4)={&(0x7f0000814000)=@nfc_llcp, 0x58, &(0x7f00007defe0)=[], 0x20000000000001eb, &(0x7f0000813f65)=""/155, 0x9b}, 0xfffffffffffffffc) 2018/03/06 00:08:00 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000)=[], 0x0, &(0x7f0000298000)=[{0x18, 0x1, 0x1, "13"}], 0x18}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r1) sendmsg(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000300)=[], 0x0, &(0x7f0000000340)=[]}, 0x0) close(r2) 2018/03/06 00:08:00 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x7}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x2, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x1f, 0x7, 0x0, 0x1, 0x1c}], {0x95}}, &(0x7f0000000180)='GPL\x00i', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251, 0x41000}, 0x48) 2018/03/06 00:08:00 executing program 3: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000c41000)={0x0, 0x0, &(0x7f0000153000)=[], 0x0, &(0x7f0000231f05)=""/251, 0xfb}, 0x0) close(r1) 2018/03/06 00:08:00 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000)=[], 0x0, &(0x7f0000298000)=[{0x18, 0x1, 0x1, "13"}], 0x18}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r1) sendmsg(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000300)=[], 0x0, &(0x7f0000000340)=[]}, 0x0) close(r2) 2018/03/06 00:08:00 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000)=[], 0x0, &(0x7f0000298000)=[{0x18, 0x1, 0x1, "13"}], 0x18}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r1) sendmsg(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000300)=[], 0x0, &(0x7f0000000340)=[]}, 0x0) close(r2) 2018/03/06 00:08:00 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000)=[], 0x0, &(0x7f0000298000)=[{0x18, 0x1, 0x1, "13"}], 0x18}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r1) sendmsg(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000300)=[], 0x0, &(0x7f0000000340)=[]}, 0x0) close(r2) 2018/03/06 00:08:00 executing program 6: mkdir(&(0x7f0000651000)='./file0\x00', 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000100)="9b") 2018/03/06 00:08:00 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xc, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="85000000220000000700000000009b009500000000000000"], &(0x7f00000001c0)="73797a6b616c6c65720001be826e8f833152f795b4d9f4bc3ea582523aed371b084fccfc3d2ef2cbe65d30642ca8dcd0f8479be52e66937908f1d8112489e8099d9d4edb806d81189c0fbb6818d028546c35d3363d54db0db780f54977ae6359d617c1d233d8e18abfc75f9a76cd8e1f77583bc02f07a33de6f304e95db82fd4da55ebd25162df6f88e7d1bb0654ffb31e008967", 0x1, 0x99, &(0x7f000000d000)=""/153}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x1000, &(0x7f0000000480)="288b6692b5c352f6677525060800", &(0x7f0000000580)=""/4096}, 0x28) 2018/03/06 00:08:00 executing program 1: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x7e, 0x6, 0x1, 0x11}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mkdir(&(0x7f0000000180)='./file0/file1\x00', 0x0) mount(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000240)='./file0/file1\x00', &(0x7f00000002c0)='tmpfs\x00', 0x0, 0x0) mount(&(0x7f0000000280)='./file0/file1\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='configfs\x00', 0x44000, &(0x7f0000000380)) 2018/03/06 00:08:00 executing program 3: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000c41000)={0x0, 0x0, &(0x7f0000153000)=[], 0x0, &(0x7f0000231f05)=""/251, 0xfb}, 0x0) close(r1) 2018/03/06 00:08:00 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x7}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x2, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x1f, 0x7, 0x0, 0x1, 0x1c}], {0x95}}, &(0x7f0000000180)='GPL\x00i', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251, 0x41000}, 0x48) 2018/03/06 00:08:00 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}, 0x0, 0x0, 0x7fffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/03/06 00:08:00 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000)=[], 0x0, &(0x7f0000298000)=[{0x18, 0x1, 0x1, "13"}], 0x18}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r1) sendmsg(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000300)=[], 0x0, &(0x7f0000000340)=[]}, 0x0) close(r2) 2018/03/06 00:08:00 executing program 6: mkdir(&(0x7f0000651000)='./file0\x00', 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000100)="9b") 2018/03/06 00:08:00 executing program 7: bpf$PROG_LOAD(0x5, &(0x7f000000efb8)={0x0, 0xe, &(0x7f0000001f90)=@raw=[@exit={0x95}, @alu, @initr0={0x18}, @generic, @call={0x85}, @call={0x85}, @call={0x85}], &(0x7f0000011ffc)='GPL\x00', 0x0, 0x1b4, &(0x7f000000a000)=""/182}, 0xfffffffffffffd15) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x5, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x25}, [@ldst={0x3, 0x0, 0x2e}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) [ 53.929569] 9pnet_virtio: no channels available for device ./file0 2018/03/06 00:08:00 executing program 7: bpf$PROG_LOAD(0x5, &(0x7f000000efb8)={0x0, 0xe, &(0x7f0000001f90)=@raw=[@exit={0x95}, @alu, @initr0={0x18}, @generic, @call={0x85}, @call={0x85}, @call={0x85}], &(0x7f0000011ffc)='GPL\x00', 0x0, 0x1b4, &(0x7f000000a000)=""/182}, 0xfffffffffffffd15) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x5, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x25}, [@ldst={0x3, 0x0, 0x2e}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 2018/03/06 00:08:00 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}, 0x0, 0x0, 0x7fffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 53.982438] 9pnet_virtio: no channels available for device ./file0 2018/03/06 00:08:00 executing program 6: mkdir(&(0x7f0000651000)='./file0\x00', 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000100)="9b") 2018/03/06 00:08:00 executing program 3: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000c41000)={0x0, 0x0, &(0x7f0000153000)=[], 0x0, &(0x7f0000231f05)=""/251, 0xfb}, 0x0) close(r1) 2018/03/06 00:08:00 executing program 4: recvmsg(0xffffffffffffffff, &(0x7f000000e5b4)={&(0x7f0000000000)=@can, 0x1, &(0x7f0000002000)=[{&(0x7f0000000000)=""/237, 0xed}, {&(0x7f0000000fdb)=""/37, 0x9f}], 0x1, 0x0, 0x2aa}, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10}, [@jmp={0x5}], {0x95}}, &(0x7f000001bff6)='syzkaller\x00', 0x1, 0x1d2, &(0x7f0000011000)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0x0, 0xe, 0x84, &(0x7f0000000100)="416fe71f79ef42537532367622c1", &(0x7f0000000700)=""/132}, 0x28) 2018/03/06 00:08:00 executing program 2: bpf$MAP_CREATE(0x18, &(0x7f000000c000)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c}, 0x2c) 2018/03/06 00:08:00 executing program 1: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x7e, 0x6, 0x1, 0x11}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mkdir(&(0x7f0000000180)='./file0/file1\x00', 0x0) mount(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000240)='./file0/file1\x00', &(0x7f00000002c0)='tmpfs\x00', 0x0, 0x0) mount(&(0x7f0000000280)='./file0/file1\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='configfs\x00', 0x44000, &(0x7f0000000380)) 2018/03/06 00:08:00 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x7e, 0x6, 0x1, 0x11}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mkdir(&(0x7f0000000180)='./file0/file1\x00', 0x0) mount(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000240)='./file0/file1\x00', &(0x7f00000002c0)='tmpfs\x00', 0x0, 0x0) mount(&(0x7f0000000280)='./file0/file1\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='configfs\x00', 0x44000, &(0x7f0000000380)) 2018/03/06 00:08:00 executing program 7: bpf$PROG_LOAD(0x5, &(0x7f000000efb8)={0x0, 0xe, &(0x7f0000001f90)=@raw=[@exit={0x95}, @alu, @initr0={0x18}, @generic, @call={0x85}, @call={0x85}, @call={0x85}], &(0x7f0000011ffc)='GPL\x00', 0x0, 0x1b4, &(0x7f000000a000)=""/182}, 0xfffffffffffffd15) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x5, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x25}, [@ldst={0x3, 0x0, 0x2e}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 2018/03/06 00:08:00 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}, 0x0, 0x0, 0x7fffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/03/06 00:08:00 executing program 2: bpf$MAP_CREATE(0x18, &(0x7f000000c000)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c}, 0x2c) 2018/03/06 00:08:00 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x7e, 0x6, 0x1, 0x11}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mkdir(&(0x7f0000000180)='./file0/file1\x00', 0x0) mount(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000240)='./file0/file1\x00', &(0x7f00000002c0)='tmpfs\x00', 0x0, 0x0) mount(&(0x7f0000000280)='./file0/file1\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='configfs\x00', 0x44000, &(0x7f0000000380)) 2018/03/06 00:08:00 executing program 7: bpf$PROG_LOAD(0x5, &(0x7f000000efb8)={0x0, 0xe, &(0x7f0000001f90)=@raw=[@exit={0x95}, @alu, @initr0={0x18}, @generic, @call={0x85}, @call={0x85}, @call={0x85}], &(0x7f0000011ffc)='GPL\x00', 0x0, 0x1b4, &(0x7f000000a000)=""/182}, 0xfffffffffffffd15) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x5, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x25}, [@ldst={0x3, 0x0, 0x2e}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 2018/03/06 00:08:00 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}, 0x0, 0x0, 0x7fffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/03/06 00:08:00 executing program 4: recvmsg(0xffffffffffffffff, &(0x7f000000e5b4)={&(0x7f0000000000)=@can, 0x1, &(0x7f0000002000)=[{&(0x7f0000000000)=""/237, 0xed}, {&(0x7f0000000fdb)=""/37, 0x9f}], 0x1, 0x0, 0x2aa}, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10}, [@jmp={0x5}], {0x95}}, &(0x7f000001bff6)='syzkaller\x00', 0x1, 0x1d2, &(0x7f0000011000)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0x0, 0xe, 0x84, &(0x7f0000000100)="416fe71f79ef42537532367622c1", &(0x7f0000000700)=""/132}, 0x28) 2018/03/06 00:08:00 executing program 1: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x7e, 0x6, 0x1, 0x11}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mkdir(&(0x7f0000000180)='./file0/file1\x00', 0x0) mount(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000240)='./file0/file1\x00', &(0x7f00000002c0)='tmpfs\x00', 0x0, 0x0) mount(&(0x7f0000000280)='./file0/file1\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='configfs\x00', 0x44000, &(0x7f0000000380)) [ 54.089699] 9pnet_virtio: no channels available for device ./file0 2018/03/06 00:08:00 executing program 6: recvmsg(0xffffffffffffffff, &(0x7f0000346fc8)={&(0x7f0000baefec)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @empty}, 0x14, &(0x7f0000ca3000)=[{&(0x7f0000846000)=""/15, 0xf}, {&(0x7f0000f6afa9)=""/87, 0xfffffffffffffddb}, {&(0x7f00008e3f35)=""/203, 0xffffffffffffffeb}, {&(0x7f0000f75ffe)=""/2, 0x4f}], 0x11f, &(0x7f0000a01f13)=""/237, 0xed}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, [@alu={0x7, 0x83, 0x2}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f00007a9000)=""/251}, 0x48) 2018/03/06 00:08:00 executing program 2: bpf$MAP_CREATE(0x18, &(0x7f000000c000)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c}, 0x2c) 2018/03/06 00:08:00 executing program 3: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000c41000)={0x0, 0x0, &(0x7f0000153000)=[], 0x0, &(0x7f0000231f05)=""/251, 0xfb}, 0x0) close(r1) 2018/03/06 00:08:00 executing program 7: mkdir(&(0x7f00005fcff8)='./file0\x00', 0x0) mount(&(0x7f0000340ff8)='./file0\x00', &(0x7f0000ff8ff8)='./file0\x00', &(0x7f0000426000)='tmpfs\x00', 0x0, &(0x7f0000ece000)=',') 2018/03/06 00:08:00 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000340)='\\?L') 2018/03/06 00:08:00 executing program 4: recvmsg(0xffffffffffffffff, &(0x7f000000e5b4)={&(0x7f0000000000)=@can, 0x1, &(0x7f0000002000)=[{&(0x7f0000000000)=""/237, 0xed}, {&(0x7f0000000fdb)=""/37, 0x9f}], 0x1, 0x0, 0x2aa}, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10}, [@jmp={0x5}], {0x95}}, &(0x7f000001bff6)='syzkaller\x00', 0x1, 0x1d2, &(0x7f0000011000)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0x0, 0xe, 0x84, &(0x7f0000000100)="416fe71f79ef42537532367622c1", &(0x7f0000000700)=""/132}, 0x28) 2018/03/06 00:08:00 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x7}], {0x95}}, &(0x7f000031cff6)='syzkaller\x00', 0x5c6e, 0x220, &(0x7f00001a7f05)=""/251}, 0x48) 2018/03/06 00:08:00 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x7e, 0x6, 0x1, 0x11}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mkdir(&(0x7f0000000180)='./file0/file1\x00', 0x0) mount(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000240)='./file0/file1\x00', &(0x7f00000002c0)='tmpfs\x00', 0x0, 0x0) mount(&(0x7f0000000280)='./file0/file1\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='configfs\x00', 0x44000, &(0x7f0000000380)) 2018/03/06 00:08:00 executing program 2: bpf$MAP_CREATE(0x18, &(0x7f000000c000)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c}, 0x2c) 2018/03/06 00:08:00 executing program 6: recvmsg(0xffffffffffffffff, &(0x7f0000346fc8)={&(0x7f0000baefec)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @empty}, 0x14, &(0x7f0000ca3000)=[{&(0x7f0000846000)=""/15, 0xf}, {&(0x7f0000f6afa9)=""/87, 0xfffffffffffffddb}, {&(0x7f00008e3f35)=""/203, 0xffffffffffffffeb}, {&(0x7f0000f75ffe)=""/2, 0x4f}], 0x11f, &(0x7f0000a01f13)=""/237, 0xed}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, [@alu={0x7, 0x83, 0x2}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f00007a9000)=""/251}, 0x48) 2018/03/06 00:08:00 executing program 1: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x7e, 0x6, 0x1, 0x11}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mkdir(&(0x7f0000000180)='./file0/file1\x00', 0x0) mount(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000240)='./file0/file1\x00', &(0x7f00000002c0)='tmpfs\x00', 0x0, 0x0) mount(&(0x7f0000000280)='./file0/file1\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='configfs\x00', 0x44000, &(0x7f0000000380)) 2018/03/06 00:08:00 executing program 5: perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x800000000000005, 0x0, &(0x7f0000000140)={0x0, 0x0}) sendmsg(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)=[], 0x0, &(0x7f0000000080)=[]}, 0x0) 2018/03/06 00:08:00 executing program 7: mkdir(&(0x7f00005fcff8)='./file0\x00', 0x0) mount(&(0x7f0000340ff8)='./file0\x00', &(0x7f0000ff8ff8)='./file0\x00', &(0x7f0000426000)='tmpfs\x00', 0x0, &(0x7f0000ece000)=',') 2018/03/06 00:08:00 executing program 4: recvmsg(0xffffffffffffffff, &(0x7f000000e5b4)={&(0x7f0000000000)=@can, 0x1, &(0x7f0000002000)=[{&(0x7f0000000000)=""/237, 0xed}, {&(0x7f0000000fdb)=""/37, 0x9f}], 0x1, 0x0, 0x2aa}, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10}, [@jmp={0x5}], {0x95}}, &(0x7f000001bff6)='syzkaller\x00', 0x1, 0x1d2, &(0x7f0000011000)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0x0, 0xe, 0x84, &(0x7f0000000100)="416fe71f79ef42537532367622c1", &(0x7f0000000700)=""/132}, 0x28) 2018/03/06 00:08:00 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x8, 0x80000001}, 0x13) [ 54.221986] overlayfs: unrecognized mount option "\?L" or missing value 2018/03/06 00:08:00 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000001040)='./file0\x00', &(0x7f0000001080)='rootfs\x00', 0x294000, &(0x7f0000000040)) 2018/03/06 00:08:00 executing program 6: recvmsg(0xffffffffffffffff, &(0x7f0000346fc8)={&(0x7f0000baefec)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @empty}, 0x14, &(0x7f0000ca3000)=[{&(0x7f0000846000)=""/15, 0xf}, {&(0x7f0000f6afa9)=""/87, 0xfffffffffffffddb}, {&(0x7f00008e3f35)=""/203, 0xffffffffffffffeb}, {&(0x7f0000f75ffe)=""/2, 0x4f}], 0x11f, &(0x7f0000a01f13)=""/237, 0xed}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, [@alu={0x7, 0x83, 0x2}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f00007a9000)=""/251}, 0x48) 2018/03/06 00:08:00 executing program 5: perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x800000000000005, 0x0, &(0x7f0000000140)={0x0, 0x0}) sendmsg(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)=[], 0x0, &(0x7f0000000080)=[]}, 0x0) 2018/03/06 00:08:00 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x9, 0x3, &(0x7f0000dbc000)=ANY=[@ANYBLOB="850000000700000027000000000000009500020000000000"], &(0x7f0000000000)='GPL\x00', 0x1, 0x99, &(0x7f0000000580)=""/153}, 0x48) 2018/03/06 00:08:00 executing program 7: mkdir(&(0x7f00005fcff8)='./file0\x00', 0x0) mount(&(0x7f0000340ff8)='./file0\x00', &(0x7f0000ff8ff8)='./file0\x00', &(0x7f0000426000)='tmpfs\x00', 0x0, &(0x7f0000ece000)=',') 2018/03/06 00:08:00 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x8, 0x80000001}, 0x13) 2018/03/06 00:08:00 executing program 4: mkdir(&(0x7f0000ac6000)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f000000aff8)='./file0\x00', &(0x7f0000cd3000)='ramfs\x00', 0x1, &(0x7f000056a0e2)) mount(&(0x7f0000802ff8)='./file0\x00', &(0x7f0000b16000)='./file0\x00', &(0x7f0000905000)='devtmpfs\x00', 0x85030, &(0x7f0000e99f87)) mount(&(0x7f0000df2000)='./file0/file0\x00', &(0x7f0000a16ff8)='./file0\x00', &(0x7f0000df2ffd)='\x00v\t', 0x7fffd, &(0x7f0000751000)) 2018/03/06 00:08:00 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x7}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x5, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x1f, 0x7, 0x0, 0x1, 0x1c}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 2018/03/06 00:08:00 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000001040)='./file0\x00', &(0x7f0000001080)='rootfs\x00', 0x294000, &(0x7f0000000040)) 2018/03/06 00:08:00 executing program 6: recvmsg(0xffffffffffffffff, &(0x7f0000346fc8)={&(0x7f0000baefec)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @empty}, 0x14, &(0x7f0000ca3000)=[{&(0x7f0000846000)=""/15, 0xf}, {&(0x7f0000f6afa9)=""/87, 0xfffffffffffffddb}, {&(0x7f00008e3f35)=""/203, 0xffffffffffffffeb}, {&(0x7f0000f75ffe)=""/2, 0x4f}], 0x11f, &(0x7f0000a01f13)=""/237, 0xed}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, [@alu={0x7, 0x83, 0x2}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f00007a9000)=""/251}, 0x48) 2018/03/06 00:08:00 executing program 7: mkdir(&(0x7f00005fcff8)='./file0\x00', 0x0) mount(&(0x7f0000340ff8)='./file0\x00', &(0x7f0000ff8ff8)='./file0\x00', &(0x7f0000426000)='tmpfs\x00', 0x0, &(0x7f0000ece000)=',') 2018/03/06 00:08:00 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x9, 0x3, &(0x7f0000dbc000)=ANY=[@ANYBLOB="850000000700000027000000000000009500020000000000"], &(0x7f0000000000)='GPL\x00', 0x1, 0x99, &(0x7f0000000580)=""/153}, 0x48) 2018/03/06 00:08:00 executing program 5: perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x800000000000005, 0x0, &(0x7f0000000140)={0x0, 0x0}) sendmsg(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)=[], 0x0, &(0x7f0000000080)=[]}, 0x0) 2018/03/06 00:08:00 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000001040)='./file0\x00', &(0x7f0000001080)='rootfs\x00', 0x294000, &(0x7f0000000040)) 2018/03/06 00:08:00 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x8, 0x80000001}, 0x13) 2018/03/06 00:08:00 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x7}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x5, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x1f, 0x7, 0x0, 0x1, 0x1c}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 2018/03/06 00:08:00 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x0, 0x4}, 0x3d1) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000028000)={0xffffffffffffffff, &(0x7f0000000200), &(0x7f0000000240)}, 0x20) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0/bus\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='sysfs\x00', 0x0, &(0x7f0000000180)) mkdir(&(0x7f0000000240)='./file0/bus\x00', 0x0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='cpuset\x00', 0x20, &(0x7f0000000240)) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100), 0xc) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000180)={0xffffffffffffffff, r0}) close(0xffffffffffffffff) 2018/03/06 00:08:00 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x9, 0x3, &(0x7f0000dbc000)=ANY=[@ANYBLOB="850000000700000027000000000000009500020000000000"], &(0x7f0000000000)='GPL\x00', 0x1, 0x99, &(0x7f0000000580)=""/153}, 0x48) 2018/03/06 00:08:00 executing program 5: perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x800000000000005, 0x0, &(0x7f0000000140)={0x0, 0x0}) sendmsg(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)=[], 0x0, &(0x7f0000000080)=[]}, 0x0) 2018/03/06 00:08:00 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000)=[], 0x0, &(0x7f0000298000)=[{0x18, 0x1, 0x1, "13"}], 0x18}, 0x0) 2018/03/06 00:08:00 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x8, 0x80000001}, 0x13) 2018/03/06 00:08:00 executing program 4: mkdir(&(0x7f0000ac6000)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f000000aff8)='./file0\x00', &(0x7f0000cd3000)='ramfs\x00', 0x1, &(0x7f000056a0e2)) mount(&(0x7f0000802ff8)='./file0\x00', &(0x7f0000b16000)='./file0\x00', &(0x7f0000905000)='devtmpfs\x00', 0x85030, &(0x7f0000e99f87)) mount(&(0x7f0000df2000)='./file0/file0\x00', &(0x7f0000a16ff8)='./file0\x00', &(0x7f0000df2ffd)='\x00v\t', 0x7fffd, &(0x7f0000751000)) 2018/03/06 00:08:00 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000001040)='./file0\x00', &(0x7f0000001080)='rootfs\x00', 0x294000, &(0x7f0000000040)) 2018/03/06 00:08:00 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x7}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x5, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x1f, 0x7, 0x0, 0x1, 0x1c}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 2018/03/06 00:08:00 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x0, 0x4}, 0x3d1) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000028000)={0xffffffffffffffff, &(0x7f0000000200), &(0x7f0000000240)}, 0x20) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0/bus\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='sysfs\x00', 0x0, &(0x7f0000000180)) mkdir(&(0x7f0000000240)='./file0/bus\x00', 0x0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='cpuset\x00', 0x20, &(0x7f0000000240)) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100), 0xc) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000180)={0xffffffffffffffff, r0}) close(0xffffffffffffffff) 2018/03/06 00:08:00 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x9, 0x3, &(0x7f0000dbc000)=ANY=[@ANYBLOB="850000000700000027000000000000009500020000000000"], &(0x7f0000000000)='GPL\x00', 0x1, 0x99, &(0x7f0000000580)=""/153}, 0x48) 2018/03/06 00:08:00 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000003000)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x5}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000001fb8)={0x1, 0x5, &(0x7f0000003000)=@framed={{0x18}, [@alu={0x4, 0x0, 0x0, 0x7a}], {0x95}}, &(0x7f0000002ff6)='syzkaller\x00', 0x7e0, 0xe7, &(0x7f0000002f19)=""/231}, 0x48) 2018/03/06 00:08:00 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x0, 0x4}, 0x3d1) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000028000)={0xffffffffffffffff, &(0x7f0000000200), &(0x7f0000000240)}, 0x20) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0/bus\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='sysfs\x00', 0x0, &(0x7f0000000180)) mkdir(&(0x7f0000000240)='./file0/bus\x00', 0x0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='cpuset\x00', 0x20, &(0x7f0000000240)) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100), 0xc) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000180)={0xffffffffffffffff, r0}) close(0xffffffffffffffff) 2018/03/06 00:08:00 executing program 4: mkdir(&(0x7f0000ac6000)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f000000aff8)='./file0\x00', &(0x7f0000cd3000)='ramfs\x00', 0x1, &(0x7f000056a0e2)) mount(&(0x7f0000802ff8)='./file0\x00', &(0x7f0000b16000)='./file0\x00', &(0x7f0000905000)='devtmpfs\x00', 0x85030, &(0x7f0000e99f87)) mount(&(0x7f0000df2000)='./file0/file0\x00', &(0x7f0000a16ff8)='./file0\x00', &(0x7f0000df2ffd)='\x00v\t', 0x7fffd, &(0x7f0000751000)) 2018/03/06 00:08:00 executing program 6: mkdir(&(0x7f0000ac6000)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f000000aff8)='./file0\x00', &(0x7f0000cd3000)='ramfs\x00', 0x1, &(0x7f000056a0e2)) mount(&(0x7f0000802ff8)='./file0\x00', &(0x7f0000b16000)='./file0\x00', &(0x7f0000905000)='devtmpfs\x00', 0x85030, &(0x7f0000e99f87)) mount(&(0x7f0000df2000)='./file0/file0\x00', &(0x7f0000a16ff8)='./file0\x00', &(0x7f0000df2ffd)='\x00v\t', 0x7fffd, &(0x7f0000751000)) 2018/03/06 00:08:00 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4c}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x36, &(0x7f00001a7f05)=""/251}, 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0x0, 0x0}) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000100)=r0, 0x4) sendmsg(r1, &(0x7f0000000040)={&(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x4e20, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}}}}, 0x26, &(0x7f0000000540)=[{&(0x7f0000000380)="bfcd135ff833ef70f7a4e944e9e57b569e88370f9428e9820bcce0d48dc9aa2c0a2afc085d6411df037d61b17cf1274c440b6066f6e15a8f892b264350da", 0x3e}], 0x1, &(0x7f00000005c0)=[], 0x0, 0x40000}, 0x40040) 2018/03/06 00:08:01 executing program 6: mkdir(&(0x7f0000ac6000)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f000000aff8)='./file0\x00', &(0x7f0000cd3000)='ramfs\x00', 0x1, &(0x7f000056a0e2)) mount(&(0x7f0000802ff8)='./file0\x00', &(0x7f0000b16000)='./file0\x00', &(0x7f0000905000)='devtmpfs\x00', 0x85030, &(0x7f0000e99f87)) mount(&(0x7f0000df2000)='./file0/file0\x00', &(0x7f0000a16ff8)='./file0\x00', &(0x7f0000df2ffd)='\x00v\t', 0x7fffd, &(0x7f0000751000)) 2018/03/06 00:08:01 executing program 4: mkdir(&(0x7f0000ac6000)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f000000aff8)='./file0\x00', &(0x7f0000cd3000)='ramfs\x00', 0x1, &(0x7f000056a0e2)) mount(&(0x7f0000802ff8)='./file0\x00', &(0x7f0000b16000)='./file0\x00', &(0x7f0000905000)='devtmpfs\x00', 0x85030, &(0x7f0000e99f87)) mount(&(0x7f0000df2000)='./file0/file0\x00', &(0x7f0000a16ff8)='./file0\x00', &(0x7f0000df2ffd)='\x00v\t', 0x7fffd, &(0x7f0000751000)) 2018/03/06 00:08:01 executing program 1: socketpair(0x29, 0x5, 0xfffffffffffffffd, &(0x7f0000000100)) 2018/03/06 00:08:01 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x7}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x5, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x1f, 0x7, 0x0, 0x1, 0x1c}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 2018/03/06 00:08:01 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000003000)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x5}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000001fb8)={0x1, 0x5, &(0x7f0000003000)=@framed={{0x18}, [@alu={0x4, 0x0, 0x0, 0x7a}], {0x95}}, &(0x7f0000002ff6)='syzkaller\x00', 0x7e0, 0xe7, &(0x7f0000002f19)=""/231}, 0x48) 2018/03/06 00:08:01 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x0, 0x4}, 0x3d1) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000028000)={0xffffffffffffffff, &(0x7f0000000200), &(0x7f0000000240)}, 0x20) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0/bus\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='sysfs\x00', 0x0, &(0x7f0000000180)) mkdir(&(0x7f0000000240)='./file0/bus\x00', 0x0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='cpuset\x00', 0x20, &(0x7f0000000240)) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100), 0xc) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000180)={0xffffffffffffffff, r0}) close(0xffffffffffffffff) 2018/03/06 00:08:01 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4c}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x36, &(0x7f00001a7f05)=""/251}, 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0x0, 0x0}) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000100)=r0, 0x4) sendmsg(r1, &(0x7f0000000040)={&(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x4e20, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}}}}, 0x26, &(0x7f0000000540)=[{&(0x7f0000000380)="bfcd135ff833ef70f7a4e944e9e57b569e88370f9428e9820bcce0d48dc9aa2c0a2afc085d6411df037d61b17cf1274c440b6066f6e15a8f892b264350da", 0x3e}], 0x1, &(0x7f00000005c0)=[], 0x0, 0x40000}, 0x40040) 2018/03/06 00:08:01 executing program 6: mkdir(&(0x7f0000ac6000)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f000000aff8)='./file0\x00', &(0x7f0000cd3000)='ramfs\x00', 0x1, &(0x7f000056a0e2)) mount(&(0x7f0000802ff8)='./file0\x00', &(0x7f0000b16000)='./file0\x00', &(0x7f0000905000)='devtmpfs\x00', 0x85030, &(0x7f0000e99f87)) mount(&(0x7f0000df2000)='./file0/file0\x00', &(0x7f0000a16ff8)='./file0\x00', &(0x7f0000df2ffd)='\x00v\t', 0x7fffd, &(0x7f0000751000)) 2018/03/06 00:08:01 executing program 1: socketpair(0x29, 0x5, 0xfffffffffffffffd, &(0x7f0000000100)) 2018/03/06 00:08:01 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x1, 0x5, &(0x7f0000000040)=@framed={{0x18}, [@generic={0x9}], {0x95}}, &(0x7f0000000100)='syzkaller\x00', 0x8000, 0x8a, &(0x7f0000000140)=""/138}, 0x48) [ 56.251122] IPVS: ftp: loaded support on port[0] = 21 [ 56.277681] IPVS: ftp: loaded support on port[0] = 21 2018/03/06 00:08:02 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000003000)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x5}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000001fb8)={0x1, 0x5, &(0x7f0000003000)=@framed={{0x18}, [@alu={0x4, 0x0, 0x0, 0x7a}], {0x95}}, &(0x7f0000002ff6)='syzkaller\x00', 0x7e0, 0xe7, &(0x7f0000002f19)=""/231}, 0x48) 2018/03/06 00:08:02 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x0, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x3}, 0x14) 2018/03/06 00:08:02 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4c}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x36, &(0x7f00001a7f05)=""/251}, 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0x0, 0x0}) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000100)=r0, 0x4) sendmsg(r1, &(0x7f0000000040)={&(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x4e20, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}}}}, 0x26, &(0x7f0000000540)=[{&(0x7f0000000380)="bfcd135ff833ef70f7a4e944e9e57b569e88370f9428e9820bcce0d48dc9aa2c0a2afc085d6411df037d61b17cf1274c440b6066f6e15a8f892b264350da", 0x3e}], 0x1, &(0x7f00000005c0)=[], 0x0, 0x40000}, 0x40040) 2018/03/06 00:08:02 executing program 1: socketpair(0x29, 0x5, 0xfffffffffffffffd, &(0x7f0000000100)) 2018/03/06 00:08:02 executing program 6: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='pstore\x00', 0x2000020, &(0x7f0000000200)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0/file0\x00'}, 0x10) 2018/03/06 00:08:02 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x1, 0x5, &(0x7f0000000040)=@framed={{0x18}, [@generic={0x9}], {0x95}}, &(0x7f0000000100)='syzkaller\x00', 0x8000, 0x8a, &(0x7f0000000140)=""/138}, 0x48) 2018/03/06 00:08:02 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x0, 0x4}, 0x3d1) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000028000)={0xffffffffffffffff, &(0x7f0000000200), &(0x7f0000000240)}, 0x20) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0/bus\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='sysfs\x00', 0x0, &(0x7f0000000180)) mkdir(&(0x7f0000000240)='./file0/bus\x00', 0x0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='cpuset\x00', 0x20, &(0x7f0000000240)) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100), 0xc) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000180)={0xffffffffffffffff, r0}) close(0xffffffffffffffff) 2018/03/06 00:08:02 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x0, 0x4}, 0x3d1) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000028000)={0xffffffffffffffff, &(0x7f0000000200), &(0x7f0000000240)}, 0x20) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0/bus\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='sysfs\x00', 0x0, &(0x7f0000000180)) mkdir(&(0x7f0000000240)='./file0/bus\x00', 0x0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='cpuset\x00', 0x20, &(0x7f0000000240)) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100), 0xc) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000180)={0xffffffffffffffff, r0}) close(0xffffffffffffffff) 2018/03/06 00:08:02 executing program 1: socketpair(0x29, 0x5, 0xfffffffffffffffd, &(0x7f0000000100)) 2018/03/06 00:08:02 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4c}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x36, &(0x7f00001a7f05)=""/251}, 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0x0, 0x0}) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000100)=r0, 0x4) sendmsg(r1, &(0x7f0000000040)={&(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x4e20, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}}}}, 0x26, &(0x7f0000000540)=[{&(0x7f0000000380)="bfcd135ff833ef70f7a4e944e9e57b569e88370f9428e9820bcce0d48dc9aa2c0a2afc085d6411df037d61b17cf1274c440b6066f6e15a8f892b264350da", 0x3e}], 0x1, &(0x7f00000005c0)=[], 0x0, 0x40000}, 0x40040) 2018/03/06 00:08:02 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x0, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x3}, 0x14) [ 57.919848] IPVS: ftp: loaded support on port[0] = 21 2018/03/06 00:08:04 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x0, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x3}, 0x14) 2018/03/06 00:08:04 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x1, 0x5, &(0x7f0000000040)=@framed={{0x18}, [@generic={0x9}], {0x95}}, &(0x7f0000000100)='syzkaller\x00', 0x8000, 0x8a, &(0x7f0000000140)=""/138}, 0x48) 2018/03/06 00:08:04 executing program 1: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000100)=0x9) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={0xffffffffffffffff, 0x0, 0x0, 0x9c, &(0x7f00000000c0), &(0x7f0000000100)=""/156}, 0x26f) 2018/03/06 00:08:04 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x0, 0x4}, 0x3d1) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000028000)={0xffffffffffffffff, &(0x7f0000000200), &(0x7f0000000240)}, 0x20) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0/bus\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='sysfs\x00', 0x0, &(0x7f0000000180)) mkdir(&(0x7f0000000240)='./file0/bus\x00', 0x0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='cpuset\x00', 0x20, &(0x7f0000000240)) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100), 0xc) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000180)={0xffffffffffffffff, r0}) close(0xffffffffffffffff) 2018/03/06 00:08:04 executing program 6: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='pstore\x00', 0x2000020, &(0x7f0000000200)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0/file0\x00'}, 0x10) 2018/03/06 00:08:04 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x100000000209e20, 0x8000000001, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000204fe0)={r0, &(0x7f0000932000), &(0x7f00009ee000)}, 0x4aa) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000140), &(0x7f0000000180)}, 0x20) 2018/03/06 00:08:04 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000003000)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x5}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000001fb8)={0x1, 0x5, &(0x7f0000003000)=@framed={{0x18}, [@alu={0x4, 0x0, 0x0, 0x7a}], {0x95}}, &(0x7f0000002ff6)='syzkaller\x00', 0x7e0, 0xe7, &(0x7f0000002f19)=""/231}, 0x48) 2018/03/06 00:08:04 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, &(0x7f000001e000)={&(0x7f000000fff0)=@can, 0x10, &(0x7f0000002000)=[{&(0x7f0000000000)=""/237, 0xed}, {&(0x7f0000000fdb)=""/37, 0x25}], 0x2}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000519fb8)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000835ff6)='syzkaller\x00', 0x0, 0x25c, &(0x7f000075ef3d)=""/195}, 0x13) 2018/03/06 00:08:04 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x1, 0x5, &(0x7f0000000040)=@framed={{0x18}, [@generic={0x9}], {0x95}}, &(0x7f0000000100)='syzkaller\x00', 0x8000, 0x8a, &(0x7f0000000140)=""/138}, 0x48) 2018/03/06 00:08:04 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xa, 0x9, 0x2, 0xffffffff, 0x2}, 0x71) 2018/03/06 00:08:04 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x5, 0x100000000209e20, 0x8000000001, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r0, &(0x7f0000000340), &(0x7f0000000240)}, 0x20) 2018/03/06 00:08:04 executing program 6: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='pstore\x00', 0x2000020, &(0x7f0000000200)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0/file0\x00'}, 0x10) 2018/03/06 00:08:04 executing program 1: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000100)=0x9) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={0xffffffffffffffff, 0x0, 0x0, 0x9c, &(0x7f00000000c0), &(0x7f0000000100)=""/156}, 0x26f) 2018/03/06 00:08:04 executing program 3: perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3, 0x0, r0, 0x0, [0x115]}, 0x2c) 2018/03/06 00:08:04 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x100000000209e20, 0x8000000001, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000204fe0)={r0, &(0x7f0000932000), &(0x7f00009ee000)}, 0x4aa) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000140), &(0x7f0000000180)}, 0x20) 2018/03/06 00:08:04 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x0, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x3}, 0x14) 2018/03/06 00:08:04 executing program 0: r0 = perf_event_open(&(0x7f00003a8000)={0x2, 0x78, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000140)="637075263058fd0000413c12b8d0cc69bf6821cc1b4d0700000000000000ffa75134df22ad070000000000000072682ad3283820f255c2db0000e3ff0000050fad02ae9f217e89b8f10200cb97541bd003bf3dcf376e060059a1083ba783fa3e7318893cae000000") [ 58.837047] IPVS: ftp: loaded support on port[0] = 21 [ 58.863741] IPVS: ftp: loaded support on port[0] = 21 2018/03/06 00:08:05 executing program 6: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='pstore\x00', 0x2000020, &(0x7f0000000200)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0/file0\x00'}, 0x10) 2018/03/06 00:08:05 executing program 1: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000100)=0x9) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={0xffffffffffffffff, 0x0, 0x0, 0x9c, &(0x7f00000000c0), &(0x7f0000000100)=""/156}, 0x26f) 2018/03/06 00:08:05 executing program 0: r0 = perf_event_open(&(0x7f00003a8000)={0x2, 0x78, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000140)="637075263058fd0000413c12b8d0cc69bf6821cc1b4d0700000000000000ffa75134df22ad070000000000000072682ad3283820f255c2db0000e3ff0000050fad02ae9f217e89b8f10200cb97541bd003bf3dcf376e060059a1083ba783fa3e7318893cae000000") 2018/03/06 00:08:05 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x100000000209e20, 0x8000000001, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000204fe0)={r0, &(0x7f0000932000), &(0x7f00009ee000)}, 0x4aa) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000140), &(0x7f0000000180)}, 0x20) 2018/03/06 00:08:05 executing program 4: perf_event_open(&(0x7f0000000000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0xd, 0x5, &(0x7f0000000040)=@framed={{0x18}, [@call={0x85, 0x0, 0x0, 0x35}], {0x95}}, &(0x7f0000000080)='GPL\x00', 0x7, 0xc6, &(0x7f00000000c0)=""/198}, 0x48) 2018/03/06 00:08:05 executing program 3: perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3, 0x0, r0, 0x0, [0x115]}, 0x2c) 2018/03/06 00:08:05 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, &(0x7f000001e000)={&(0x7f000000fff0)=@can, 0x10, &(0x7f0000002000)=[{&(0x7f0000000000)=""/237, 0xed}, {&(0x7f0000000fdb)=""/37, 0x25}], 0x2}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000519fb8)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000835ff6)='syzkaller\x00', 0x0, 0x25c, &(0x7f000075ef3d)=""/195}, 0x13) 2018/03/06 00:08:05 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xa, 0x9, 0x2, 0xffffffff, 0x2}, 0x71) 2018/03/06 00:08:05 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xa, 0x9, 0x2, 0xffffffff, 0x2}, 0x71) 2018/03/06 00:08:05 executing program 6: mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffbffeffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/03/06 00:08:05 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x5d}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x6, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x4}], {0x95}}, &(0x7f0000000100)='GPL\x00', 0xfffffffffffffffc, 0xe5, &(0x7f0000000000)=""/251}, 0x48) 2018/03/06 00:08:05 executing program 1: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000100)=0x9) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={0xffffffffffffffff, 0x0, 0x0, 0x9c, &(0x7f00000000c0), &(0x7f0000000100)=""/156}, 0x26f) 2018/03/06 00:08:05 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xa, 0x9, 0x2, 0xffffffff, 0x2}, 0x71) 2018/03/06 00:08:05 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x100000000209e20, 0x8000000001, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000204fe0)={r0, &(0x7f0000932000), &(0x7f00009ee000)}, 0x4aa) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000140), &(0x7f0000000180)}, 0x20) 2018/03/06 00:08:05 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x7}, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x10000000000006, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000000180)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 2018/03/06 00:08:05 executing program 0: r0 = perf_event_open(&(0x7f00003a8000)={0x2, 0x78, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000140)="637075263058fd0000413c12b8d0cc69bf6821cc1b4d0700000000000000ffa75134df22ad070000000000000072682ad3283820f255c2db0000e3ff0000050fad02ae9f217e89b8f10200cb97541bd003bf3dcf376e060059a1083ba783fa3e7318893cae000000") 2018/03/06 00:08:05 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x7}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xb, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x201a7f1b, 0x0, 0x201a7fd7, 0x1}], {0x95}}, &(0x7f0000f59000)='GPL\x00', 0x3ff, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 2018/03/06 00:08:05 executing program 3: perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3, 0x0, r0, 0x0, [0x115]}, 0x2c) 2018/03/06 00:08:05 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x40, &(0x7f0000000100)) 2018/03/06 00:08:05 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, &(0x7f000001e000)={&(0x7f000000fff0)=@can, 0x10, &(0x7f0000002000)=[{&(0x7f0000000000)=""/237, 0xed}, {&(0x7f0000000fdb)=""/37, 0x25}], 0x2}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000519fb8)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000835ff6)='syzkaller\x00', 0x0, 0x25c, &(0x7f000075ef3d)=""/195}, 0x13) 2018/03/06 00:08:05 executing program 6: r0 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={&(0x7f0000000000)=@in6={0xa, 0x4e20, 0x0, @mcast1={0xff, 0x1, [], 0x1}}, 0x80, &(0x7f0000000040)=[{&(0x7f0000000100)="db", 0x1}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f0000001a40)={&(0x7f00000001c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x4e20, 0x0, @local={0xfe, 0x80, [], 0xaa}}}}, 0x80, &(0x7f0000001580)=[{&(0x7f0000001500)="ee", 0x1}], 0x1, &(0x7f00000015c0)=[]}, 0x0) close(r0) 2018/03/06 00:08:05 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x4, 0x78, 0x0, 0x2, 0x100, 0x7fffffff, 0x0, 0x1, 0x4041, 0x7, 0x4, 0x1, 0x8, 0x4, 0x9d, 0x2, 0x800, 0x7, 0x1000, 0xdda, 0x100000000, 0x9, 0x100000001, 0x7f, 0x9, 0x3f, 0x1000, 0x0, 0x3a, 0x3, 0x4e, 0x6, 0x6, 0x51c0e54e, 0x9, 0x80, 0x2, 0xcb, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000040), 0x2}, 0x440, 0x8e, 0x6, 0x0, 0x80000000, 0x6, 0x9}, 0xffffffffffffffff, 0xe3, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x6c44b893) perf_event_open(&(0x7f000025c000)={0x2, 0x2c, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffff3d3c}, 0x0, 0x0, 0xffffffffffffffff, 0x2) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) [ 59.026955] rpcbind: RPC call returned error 22 [ 59.041984] rpcbind: RPC call returned error 22 2018/03/06 00:08:05 executing program 0: r0 = perf_event_open(&(0x7f00003a8000)={0x2, 0x78, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000140)="637075263058fd0000413c12b8d0cc69bf6821cc1b4d0700000000000000ffa75134df22ad070000000000000072682ad3283820f255c2db0000e3ff0000050fad02ae9f217e89b8f10200cb97541bd003bf3dcf376e060059a1083ba783fa3e7318893cae000000") 2018/03/06 00:08:05 executing program 5: socketpair(0x28, 0x0, 0xa, &(0x7f0000000000)) 2018/03/06 00:08:05 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)=[], 0x28a, &(0x7f0000000000)=[]}, 0x0) sendmsg$kcm(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="ad9c18ff779ca8efe7e74440c3e48f134c4a37cc1c", 0x15}], 0x1, &(0x7f0000001200)=ANY=[]}, 0x0) recvmsg(r0, &(0x7f0000000180)={&(0x7f0000000000)=@generic, 0x80, &(0x7f0000000100)=[{&(0x7f0000000200)=""/247, 0xf7}, {&(0x7f0000000080)=""/116, 0x74}], 0x2}, 0x0) recvmsg(r0, &(0x7f0000001440)={&(0x7f0000000040)=@sco, 0x8, &(0x7f00000013c0)=[{&(0x7f0000000000)=""/66}, {&(0x7f0000000080)=""/52}, {&(0x7f00000000c0)=""/120}, {&(0x7f0000000200)=""/4096}, {&(0x7f0000001200)=""/120}, {&(0x7f0000001280)=""/177}, {&(0x7f0000000180)=""/17}, {&(0x7f0000001340)=""/2}, {&(0x7f0000001380)=""/16}], 0x133, 0x0, 0x301}, 0x0) 2018/03/06 00:08:05 executing program 7: perf_event_open(&(0x7f0000940000)={0x2, 0x78, 0xd68, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='rootfs\x00', 0x1000, &(0x7f00000002c0)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000140)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='nsfs\x00', 0x20, &(0x7f0000000140)) 2018/03/06 00:08:05 executing program 6: r0 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={&(0x7f0000000000)=@in6={0xa, 0x4e20, 0x0, @mcast1={0xff, 0x1, [], 0x1}}, 0x80, &(0x7f0000000040)=[{&(0x7f0000000100)="db", 0x1}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f0000001a40)={&(0x7f00000001c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x4e20, 0x0, @local={0xfe, 0x80, [], 0xaa}}}}, 0x80, &(0x7f0000001580)=[{&(0x7f0000001500)="ee", 0x1}], 0x1, &(0x7f00000015c0)=[]}, 0x0) close(r0) 2018/03/06 00:08:05 executing program 3: perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3, 0x0, r0, 0x0, [0x115]}, 0x2c) 2018/03/06 00:08:05 executing program 4: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000100)={0xffffffffffffffff, &(0x7f0000000040)="0cdb1604c3fccf7123c457633b2fb22931e40cc0e7dc26d374c5809c9964a435e94b42da42e058d465efc25c8eee1f27ed8f6138084e3873aa257f20b3c3c2b9f25be7dac0d6ac32bf688571bb63e6bfeb89fd6eb23d43dd1c"}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x5, &(0x7f0000000080)=@framed={{0x18}, [@call={0x85, 0x0, 0x0, 0x1d}], {0x95}}, &(0x7f00000000c0)='GPL\x00', 0x101, 0xd1, &(0x7f0000000100)=""/209}, 0x48) 2018/03/06 00:08:05 executing program 5: r0 = getpid() r1 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0x0}) recvmsg(r2, &(0x7f0000005180)={&(0x7f0000001280)=@can, 0x33aea70f64d85f99, &(0x7f0000001240)=[], 0x0, &(0x7f00000013c0)=""/93, 0x5d}, 0x0) close(r1) [ 59.121290] xprt_adjust_timeout: rq_timeout = 0! 2018/03/06 00:08:05 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, &(0x7f000001e000)={&(0x7f000000fff0)=@can, 0x10, &(0x7f0000002000)=[{&(0x7f0000000000)=""/237, 0xed}, {&(0x7f0000000fdb)=""/37, 0x25}], 0x2}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000519fb8)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000835ff6)='syzkaller\x00', 0x0, 0x25c, &(0x7f000075ef3d)=""/195}, 0x13) 2018/03/06 00:08:05 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r0) 2018/03/06 00:08:05 executing program 6: r0 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={&(0x7f0000000000)=@in6={0xa, 0x4e20, 0x0, @mcast1={0xff, 0x1, [], 0x1}}, 0x80, &(0x7f0000000040)=[{&(0x7f0000000100)="db", 0x1}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f0000001a40)={&(0x7f00000001c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x4e20, 0x0, @local={0xfe, 0x80, [], 0xaa}}}}, 0x80, &(0x7f0000001580)=[{&(0x7f0000001500)="ee", 0x1}], 0x1, &(0x7f00000015c0)=[]}, 0x0) close(r0) 2018/03/06 00:08:05 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x2, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x5, 0x3c}, [], {0x95}}, &(0x7f00000000c0)='GPL\x00', 0x78549241, 0x44a, &(0x7f0000000000)=""/153, 0x41000}, 0x48) 2018/03/06 00:08:05 executing program 1: bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], 0x4000000000000027}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xf, 0x5, &(0x7f0000000080)=@framed={{0x18}, [@call={0x85, 0x0, 0x0, 0xf}], {0x95}}, &(0x7f00000000c0)='syzkaller\x00', 0x1, 0xc6, &(0x7f0000000100)=""/198}, 0x48) 2018/03/06 00:08:05 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xe, 0x4, 0x4, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f]}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000480)={r0, &(0x7f0000000080)="f4bb495bbbe2a5c356fa6b78f9d23c4c2fc42dbd46a1dd9b1c17a23c33e733cfd59d793ed122c6971eafe7ba6931859cc26494db5dfbd2699ac02912c93e457c4b5e3ad34c0e19de3eb3f7a48bde842465775d8711a224a82094d3dfd92ae3bdc99a44fac3fd80f660ce3e3a2a76026615cfc317a068151d419cc5071e9b362fdef0dc9b9b805cf0d1c1d54ef5ea2948074ddd27bb967207b506bad248fb47f668fe", &(0x7f0000000380)}, 0x20) 2018/03/06 00:08:05 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg(r0, &(0x7f0000001440)={&(0x7f0000000040)=@sco, 0x8, &(0x7f00000002c0)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x1}, 0x40002140) 2018/03/06 00:08:05 executing program 0: perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}, 0x200000400, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000935000)='./file0\x00', 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f00007fc000)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/03/06 00:08:05 executing program 7: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0xe, 0x3, &(0x7f0000dbc000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2, 0xffffffb5}, [], {0x95}}, &(0x7f0000000000)='syzkaller\x00', 0x3, 0x99, &(0x7f0000000240)=""/153}, 0x48) 2018/03/06 00:08:05 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000dec000)={0x6, 0x4, 0x338d, 0x7}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000100)={r0, &(0x7f0000000240)="a9dd8a71a18ade1112018000005f39cd0a5d7af44fec8b4497c6dc0500000000000000859f2a2d0ce4c54e1546c437498e832f1c2ef75c08b488e2ff9c56aa0d10dc4f43d29bedb45f0c3fbd03be1bb23e63f9ffaf80a22def34c402cb92"}, 0x10) [ 59.217564] EXT4-fs (sda1): Unrecognized mount option "" or missing value [ 59.228519] EXT4-fs (sda1): Unrecognized mount option "" or missing value 2018/03/06 00:08:05 executing program 6: r0 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={&(0x7f0000000000)=@in6={0xa, 0x4e20, 0x0, @mcast1={0xff, 0x1, [], 0x1}}, 0x80, &(0x7f0000000040)=[{&(0x7f0000000100)="db", 0x1}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f0000001a40)={&(0x7f00000001c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x4e20, 0x0, @local={0xfe, 0x80, [], 0xaa}}}}, 0x80, &(0x7f0000001580)=[{&(0x7f0000001500)="ee", 0x1}], 0x1, &(0x7f00000015c0)=[]}, 0x0) close(r0) 2018/03/06 00:08:05 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xa, 0xff, 0x6, 0x9, 0x2, 0xffffffffffffff9c}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000001140)={r0, &(0x7f0000000040), &(0x7f0000000140)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r0, &(0x7f0000000040), &(0x7f0000000240)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000340)={r0, &(0x7f0000000180), &(0x7f0000000300)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000004c0)={r0, &(0x7f0000000180), &(0x7f00000003c0)=""/244}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000300)={r0, &(0x7f0000000180), &(0x7f0000000200)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r0, &(0x7f0000000040), &(0x7f0000000240)}, 0x20) 2018/03/06 00:08:05 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4d, 0xc}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 2018/03/06 00:08:05 executing program 3: mkdir(&(0x7f0000000580)='./file0\x00', 0x0) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x0, &(0x7f00000005c0)) perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f00000004c0)="16913fff01000000000053196ffb28fd00a017dfef59c682f962aafd3a1cbb42021ac01b802b8ad9058846f166c6ce19a1d00fc17728006e04de138d98c9db7e77fa", 0x140025, &(0x7f00000001c0)) 2018/03/06 00:08:05 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000331000)={0x1, 0x2, 0x7f, 0x9, 0x0, 0x0, 0x0, [0x1e2, 0x1eeb]}, 0x2c) 2018/03/06 00:08:05 executing program 0: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) 2018/03/06 00:08:05 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x9, 0xa, 0x1, 0xfff}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000040), &(0x7f00000000c0)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r0, &(0x7f0000000040)}, 0x10) 2018/03/06 00:08:05 executing program 7: perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001840)='./file0\x00', 0x0) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='selinuxfs\x00', 0x1000, &(0x7f0000000100)) mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000180)="070000c80000000000", 0x20020, 0x0) 2018/03/06 00:08:05 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000003000)={0x0, 0x1ffffffffffffe3d, &(0x7f0000008000)=@framed={{0x18}, [], {0x95}}, &(0x7f0000008000)='syzkaller\x00', 0x25, 0x7f, &(0x7f0000008000)=""/127}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000001fb8)={0x1, 0x5, &(0x7f0000003000)=@framed={{0x18}, [@alu={0x5, 0x0, 0xffffff85, 0x7a}], {0x95}}, &(0x7f0000002ff6)='syzkaller\x00', 0x7e0, 0x1f5, &(0x7f0000002f19)=""/231}, 0x47) 2018/03/06 00:08:05 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000004000)={0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080), 0x2}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000003fec)={0x1, 0x2, 0x4, 0x8}, 0x187) [ 59.380255] EXT4-fs (sda1): re-mounted. Opts: (null) 2018/03/06 00:08:05 executing program 1: bpf$PROG_LOAD(0x2, &(0x7f0000000fb8)={0x0, 0x3, &(0x7f0000000000)=@framed={{0x18}, [], {0x95}}, &(0x7f0000000ff6)='syzkaller\x00', 0x0, 0xdb, &(0x7f0000000f25)=""/219}, 0x48) 2018/03/06 00:08:05 executing program 5: recvmsg(0xffffffffffffffff, &(0x7f0000346fc8)={&(0x7f0000baefec)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @empty}, 0x14, &(0x7f0000ca3000)=[{&(0x7f00000b4000)=""/15, 0xf}, {&(0x7f0000f6afa9)=""/87, 0x57}, {&(0x7f00008e3f35)=""/203, 0xcb}, {&(0x7f0000cd5ffe)=""/2, 0x2}], 0x4, &(0x7f0000a01f13)=""/237, 0xed}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x9, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x201a7f1b, 0x0, 0x6, 0x1, 0x0, 0x40}], {0x95}}, &(0x7f0000f59000)='GPL\x00', 0x40, 0xfb, &(0x7f0000000140)=""/251}, 0xb4) 2018/03/06 00:08:05 executing program 2: perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3df, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0x0, 0x0}) recvmsg(r0, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000440)=[], 0x0, &(0x7f0000005100)=""/93, 0x5d}, 0x0) sendmsg(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="e9", 0x1}], 0x1, &(0x7f0000000180)=[]}, 0x0) 2018/03/06 00:08:05 executing program 7: perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001840)='./file0\x00', 0x0) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='selinuxfs\x00', 0x1000, &(0x7f0000000100)) mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000180)="070000c80000000000", 0x20020, 0x0) 2018/03/06 00:08:05 executing program 3: recvmsg(0xffffffffffffffff, &(0x7f0000000fc8)={&(0x7f000000a000)=@pptp={0x0, 0x0, {0x0, @multicast1}}, 0x20, &(0x7f0000003000)=[{&(0x7f000000afc4)=""/60, 0x3c}, {&(0x7f000000a000)=""/159, 0x95}], 0x2}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001fb8)={0x1, 0x5, &(0x7f0000003000)=@framed={{0x18}, [@alu={0x5, 0x0, 0xb, 0x0, 0x0, 0x1}], {0x95}}, &(0x7f0000002ff6)='syzkaller\x00', 0x7dd, 0xfdad, &(0x7f0000002f19)=""/231}, 0x48) 2018/03/06 00:08:05 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xa, 0x104, 0x7, 0xffffffff00000001}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000380)={r0, &(0x7f0000000040), &(0x7f00000002c0)=""/168}, 0x18) 2018/03/06 00:08:05 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000004000)={0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080), 0x2}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000003fec)={0x1, 0x2, 0x4, 0x8}, 0x187) 2018/03/06 00:08:05 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0xa, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 2018/03/06 00:08:05 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) 2018/03/06 00:08:05 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000000), 0x8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 2018/03/06 00:08:05 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0xf, 0x5, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000006110060000000000ac270526000000009500000000000000"], &(0x7f00000000c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000001780)=""/251}, 0x48) 2018/03/06 00:08:05 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000004000)={0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080), 0x2}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000003fec)={0x1, 0x2, 0x4, 0x8}, 0x187) [ 59.455076] EXT4-fs (sda1): re-mounted. Opts: (null) 2018/03/06 00:08:05 executing program 7: perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001840)='./file0\x00', 0x0) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='selinuxfs\x00', 0x1000, &(0x7f0000000100)) mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000180)="070000c80000000000", 0x20020, 0x0) 2018/03/06 00:08:05 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xa, 0x1ff, 0x8000, 0x100000043}, 0x2c) 2018/03/06 00:08:05 executing program 2: perf_event_open(&(0x7f0000014f88)={0x1, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000014f88)={0x1, 0x78, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/03/06 00:08:06 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) 2018/03/06 00:08:06 executing program 6: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000df7000)='./file0\x00', &(0x7f0000c7f000)='./file0\x00', &(0x7f00000000c0)='nfs4\x00', 0x0, &(0x7f0000000080)='v') 2018/03/06 00:08:06 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x7, 0x0, 0x0, 0x0, 0x1}], {0x95}}, &(0x7f000031cff6)='syzkaller\x00', 0x5c6e, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 2018/03/06 00:08:06 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xa, 0x1ff, 0x8000, 0x100000043}, 0x2c) 2018/03/06 00:08:06 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='selinuxfs\x00', 0x0, &(0x7f0000000100)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000001600)='./file0\x00', &(0x7f0000000200)='aufs\x00', 0x10023, &(0x7f0000001500)) 2018/03/06 00:08:06 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x1a) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mkdir(&(0x7f0000000180)='./file0/file1\x00', 0x0) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000240)='./file0/file1\x00', &(0x7f00000002c0)='tmpfs\x00', 0x0, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2018/03/06 00:08:06 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000004000)={0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080), 0x2}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000003fec)={0x1, 0x2, 0x4, 0x8}, 0x187) 2018/03/06 00:08:06 executing program 7: perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001840)='./file0\x00', 0x0) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='selinuxfs\x00', 0x1000, &(0x7f0000000100)) mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000180)="070000c80000000000", 0x20020, 0x0) [ 59.564213] EXT4-fs (sda1): re-mounted. Opts: (null) 2018/03/06 00:08:06 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x102d}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x6, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0x3bc, &(0x7f00001a7f05)=""/251}, 0x46) 2018/03/06 00:08:06 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001840)='./file0\x00', 0x0) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='selinuxfs\x00', 0x1000, &(0x7f0000000340)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='squashfs\x00', 0x20, 0x0) 2018/03/06 00:08:06 executing program 6: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x47}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x61}, [@call={0x85, 0x0, 0x0, 0x2f}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 2018/03/06 00:08:06 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xa, 0x1ff, 0x8000, 0x100000043}, 0x2c) 2018/03/06 00:08:06 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)={&(0x7f0000000000)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) 2018/03/06 00:08:06 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) 2018/03/06 00:08:06 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x102d}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x6, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0x3bc, &(0x7f00001a7f05)=""/251}, 0x46) [ 59.637695] EXT4-fs (sda1): re-mounted. Opts: (null) 2018/03/06 00:08:06 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='selinuxfs\x00', 0x0, &(0x7f0000000100)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000001600)='./file0\x00', &(0x7f0000000200)='aufs\x00', 0x10023, &(0x7f0000001500)) 2018/03/06 00:08:06 executing program 6: r0 = perf_event_open(&(0x7f000054df88)={0x2, 0x78, 0x0, 0x303, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000271000)={0x20000000002, 0x78, 0x0, 0x80000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, r0, 0x0) perf_event_open(&(0x7f000057c000)={0x2, 0x78, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r1, 0x0) 2018/03/06 00:08:06 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xa, 0x1ff, 0x8000, 0x100000043}, 0x2c) [ 59.678978] EXT4-fs (sda1): re-mounted. Opts: (null) 2018/03/06 00:08:06 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x1a) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mkdir(&(0x7f0000000180)='./file0/file1\x00', 0x0) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000240)='./file0/file1\x00', &(0x7f00000002c0)='tmpfs\x00', 0x0, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2018/03/06 00:08:06 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x102d}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x6, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0x3bc, &(0x7f00001a7f05)=""/251}, 0x46) 2018/03/06 00:08:06 executing program 0: socketpair(0x18, 0x0, 0x2, &(0x7f00000000c0)) 2018/03/06 00:08:06 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x1a) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mkdir(&(0x7f0000000180)='./file0/file1\x00', 0x0) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000240)='./file0/file1\x00', &(0x7f00000002c0)='tmpfs\x00', 0x0, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2018/03/06 00:08:06 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) 2018/03/06 00:08:06 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x1a) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mkdir(&(0x7f0000000180)='./file0/file1\x00', 0x0) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000240)='./file0/file1\x00', &(0x7f00000002c0)='tmpfs\x00', 0x0, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2018/03/06 00:08:06 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x102d}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x6, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0x3bc, &(0x7f00001a7f05)=""/251}, 0x46) 2018/03/06 00:08:06 executing program 6: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x1a) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mkdir(&(0x7f0000000180)='./file0/file1\x00', 0x0) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000240)='./file0/file1\x00', &(0x7f00000002c0)='tmpfs\x00', 0x0, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2018/03/06 00:08:06 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='selinuxfs\x00', 0x0, &(0x7f0000000100)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000001600)='./file0\x00', &(0x7f0000000200)='aufs\x00', 0x10023, &(0x7f0000001500)) 2018/03/06 00:08:06 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x5, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000dbc000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0xffffff9c}, [], {0x95}}, &(0x7f0000000000)="47ff3300", 0x1, 0x99, &(0x7f0000000000)=""/153}, 0x48) 2018/03/06 00:08:06 executing program 0: perf_event_open(&(0x7f000025c000)={0x1000002, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f0000000100)="8b") [ 59.961036] tmpfs: No value for mount option '‹' 2018/03/06 00:08:06 executing program 6: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x1a) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mkdir(&(0x7f0000000180)='./file0/file1\x00', 0x0) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000240)='./file0/file1\x00', &(0x7f00000002c0)='tmpfs\x00', 0x0, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2018/03/06 00:08:06 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x1a) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mkdir(&(0x7f0000000180)='./file0/file1\x00', 0x0) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000240)='./file0/file1\x00', &(0x7f00000002c0)='tmpfs\x00', 0x0, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2018/03/06 00:08:06 executing program 1: r0 = perf_event_open(&(0x7f0000aaa000)={0x40000000000002, 0x78, 0x12, 0x1000000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=@framed={{0x18}, [], {0x95}}, &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) 2018/03/06 00:08:06 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x1a) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mkdir(&(0x7f0000000180)='./file0/file1\x00', 0x0) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000240)='./file0/file1\x00', &(0x7f00000002c0)='tmpfs\x00', 0x0, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2018/03/06 00:08:06 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1e, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, [], {0x95}}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x51, &(0x7f00000000c0)=""/81}, 0x48) 2018/03/06 00:08:06 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0xc5, 0x8}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r0, 0x0, 0x16, 0x83, &(0x7f0000000000)="7116800001000000000000de78bc3afc54a701f2c4a6", &(0x7f0000000200)=""/131}, 0x28) 2018/03/06 00:08:06 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='selinuxfs\x00', 0x0, &(0x7f0000000100)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000001600)='./file0\x00', &(0x7f0000000200)='aufs\x00', 0x10023, &(0x7f0000001500)) 2018/03/06 00:08:06 executing program 0: perf_event_open(&(0x7f000025c000)={0x1000002, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f0000000100)="8b") 2018/03/06 00:08:06 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x3, 0x4, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000040)='8', &(0x7f0000000100)}, 0x20) 2018/03/06 00:08:06 executing program 6: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x1a) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mkdir(&(0x7f0000000180)='./file0/file1\x00', 0x0) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000240)='./file0/file1\x00', &(0x7f00000002c0)='tmpfs\x00', 0x0, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2018/03/06 00:08:06 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0x0, 0x0}) recvmsg(r0, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000440)=[], 0x0, &(0x7f0000005100)=""/93, 0x5d}, 0x0) sendmsg(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="e9", 0x1}], 0x1, &(0x7f0000000180)=[]}, 0x0) 2018/03/06 00:08:06 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x1, 0x5, 0x9}, 0x14) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xd, 0x6, 0x4, 0x100000001, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00005f1000)={r1, &(0x7f0000eed000), &(0x7f0000b88000)="13"}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r1, &(0x7f0000000000), &(0x7f0000000040)=""/129}, 0x18) 2018/03/06 00:08:06 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x1a) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mkdir(&(0x7f0000000180)='./file0/file1\x00', 0x0) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000240)='./file0/file1\x00', &(0x7f00000002c0)='tmpfs\x00', 0x0, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) [ 60.095827] tmpfs: No value for mount option '‹' 2018/03/06 00:08:06 executing program 7: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001140)=[], 0x0, &(0x7f0000000140)=[{0x10}, {0x10}], 0x20}, 0x0) 2018/03/06 00:08:06 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000002000)={0x0, 0x0, &(0x7f0000ac3000)=@raw=[], &(0x7f0000000080)="47505d04", 0x17, 0x67, &(0x7f0000004f99)=""/103}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@call={0x85, 0x0, 0x0, 0x7}], {0x95}}, &(0x7f000000a000)='syzkaller\x00', 0x1, 0xc3, &(0x7f0000011f3d)=""/195}, 0x48) 2018/03/06 00:08:06 executing program 0: perf_event_open(&(0x7f000025c000)={0x1000002, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f0000000100)="8b") 2018/03/06 00:08:06 executing program 6: r0 = perf_event_open(&(0x7f00004e7000)={0x2, 0x78, 0xdf}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000080)="e3aa01fbbdc2cb48015fd9b3cb3a6009f36518059c44953ebcd14997c62f34cc0852ef60df0faf3c72e0dafe3872d0779063267197fd60ade9edb6d80ee1a60c05480259b48628b4791e9b69") 2018/03/06 00:08:06 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet(0x1e, 0x802, 0x0, &(0x7f0000000000)={0x0}) sendmsg(r0, &(0x7f000055d000)={&(0x7f0000f18000)=@in={0x1e, 0x4e20, @multicast1=0xe0000001}, 0x10, &(0x7f00001f5f60)=[], 0x0, &(0x7f0000f18000)=[]}, 0x0) 2018/03/06 00:08:06 executing program 7: socket$kcm(0x29, 0x0, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='autofs\x00', 0x0, &(0x7f0000000100)) 2018/03/06 00:08:06 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x1, 0x5, 0x9}, 0x14) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xd, 0x6, 0x4, 0x100000001, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00005f1000)={r1, &(0x7f0000eed000), &(0x7f0000b88000)="13"}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r1, &(0x7f0000000000), &(0x7f0000000040)=""/129}, 0x18) [ 60.205666] tmpfs: No value for mount option '‹' [ 60.260477] autofs4:pid:6075:autofs4_fill_super: called with bogus options 2018/03/06 00:08:06 executing program 0: perf_event_open(&(0x7f000025c000)={0x1000002, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f0000000100)="8b") 2018/03/06 00:08:06 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0x0, 0x0}) recvmsg(r0, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000440)=[], 0x0, &(0x7f0000005100)=""/93, 0x5d}, 0x0) sendmsg(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="e9", 0x1}], 0x1, &(0x7f0000000180)=[]}, 0x0) 2018/03/06 00:08:06 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='hugetlbfs\x00', 0x0, &(0x7f0000000100)) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x0) 2018/03/06 00:08:06 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x1, 0x5, 0x9}, 0x14) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xd, 0x6, 0x4, 0x100000001, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00005f1000)={r1, &(0x7f0000eed000), &(0x7f0000b88000)="13"}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r1, &(0x7f0000000000), &(0x7f0000000040)=""/129}, 0x18) 2018/03/06 00:08:06 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x1, 0x5, 0x9}, 0x14) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xd, 0x6, 0x4, 0x100000001, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00005f1000)={r1, &(0x7f0000eed000), &(0x7f0000b88000)="13"}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r1, &(0x7f0000000000), &(0x7f0000000040)=""/129}, 0x18) 2018/03/06 00:08:06 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9}, 0x3d1) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000028000)={r0, &(0x7f0000000200), &(0x7f0000000240)="13"}, 0x20) close(r0) 2018/03/06 00:08:06 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x4, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x3, 0xffffffb5}, [], {0x95}}, &(0x7f0000e6bffc)="47ff3300", 0x20000000000006, 0x273, &(0x7f0000000000)=""/153}, 0x48) 2018/03/06 00:08:06 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x7f, 0x7, 0x5, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r0, &(0x7f0000000080)='L', &(0x7f00000000c0)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r0, &(0x7f00000001c0)='*v', &(0x7f00000002c0)=""/209}, 0x18) 2018/03/06 00:08:06 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='9p\x00', 0x0, &(0x7f0000000380)) [ 60.387743] tmpfs: No value for mount option '‹' 2018/03/06 00:08:06 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0x0, 0x0}) recvmsg(r0, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000440)=[], 0x0, &(0x7f0000005100)=""/93, 0x5d}, 0x0) sendmsg(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="e9", 0x1}], 0x1, &(0x7f0000000180)=[]}, 0x0) 2018/03/06 00:08:06 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x1, 0x5, 0x9}, 0x14) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xd, 0x6, 0x4, 0x100000001, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00005f1000)={r1, &(0x7f0000eed000), &(0x7f0000b88000)="13"}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r1, &(0x7f0000000000), &(0x7f0000000040)=""/129}, 0x18) 2018/03/06 00:08:06 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x1, 0x5, 0x9}, 0x14) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xd, 0x6, 0x4, 0x100000001, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00005f1000)={r1, &(0x7f0000eed000), &(0x7f0000b88000)="13"}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r1, &(0x7f0000000000), &(0x7f0000000040)=""/129}, 0x18) 2018/03/06 00:08:06 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='hugetlbfs\x00', 0x0, &(0x7f0000000100)) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x0) 2018/03/06 00:08:06 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000002240)={0xe}, 0x2c) 2018/03/06 00:08:06 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xc, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="85000000220000000700000000009b009500000000000000"], &(0x7f00000001c0)="73797a6b616c6c65720001be826e8f833152f795b4d9f4bc3ea582523aed371b084fccfc3d2ef2cbe65d30642ca8dcd0f8479be52e66937908f1d8112489e8099d9d4edb806d81189c0fbb6818d028546c35d3363d54db0db780f54977ae6359d617c1d233d8e18abfc75f9a76cd8e1f77583bc02f07a33de6f304e95db82fd4da55ebd25162df6f88e7d1bb0654ffb31e008967", 0x1, 0x99, &(0x7f000000d000)=""/153}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000500)={r0, 0x0, 0x12, 0xb6, &(0x7f0000000380)="227976ac0f08fe67c936835588a8b674d234", &(0x7f0000000440)=""/182}, 0x28) 2018/03/06 00:08:06 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0x0, 0x0}) recvmsg(r0, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000440)=[], 0x0, &(0x7f0000005100)=""/93, 0x5d}, 0x0) sendmsg(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="e9", 0x1}], 0x1, &(0x7f0000000180)=[]}, 0x0) [ 60.464485] 9pnet_virtio: no channels available for device ./file0 2018/03/06 00:08:06 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='hugetlbfs\x00', 0x0, &(0x7f0000000100)) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x0) 2018/03/06 00:08:06 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x1, 0x5, 0x9}, 0x14) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xd, 0x6, 0x4, 0x100000001, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00005f1000)={r1, &(0x7f0000eed000), &(0x7f0000b88000)="13"}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r1, &(0x7f0000000000), &(0x7f0000000040)=""/129}, 0x18) 2018/03/06 00:08:06 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f00000004c0)={&(0x7f0000000000)=ANY=[], 0x0, &(0x7f0000000540)=[]}, 0x0) recvmsg(r0, &(0x7f0000000300)={&(0x7f0000000080)=@hci, 0xc, &(0x7f00000001c0)=[], 0x0, &(0x7f0000000200)=""/221, 0xdd}, 0x0) close(r1) 2018/03/06 00:08:06 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xc, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="85000000220000000700000000009b009500000000000000"], &(0x7f00000001c0)="73797a6b616c6c65720001be826e8f833152f795b4d9f4bc3ea582523aed371b084fccfc3d2ef2cbe65d30642ca8dcd0f8479be52e66937908f1d8112489e8099d9d4edb806d81189c0fbb6818d028546c35d3363d54db0db780f54977ae6359d617c1d233d8e18abfc75f9a76cd8e1f77583bc02f07a33de6f304e95db82fd4da55ebd25162df6f88e7d1bb0654ffb31e008967", 0x1, 0x99, &(0x7f000000d000)=""/153}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000500)={r0, 0x0, 0x12, 0xb6, &(0x7f0000000380)="227976ac0f08fe67c936835588a8b674d234", &(0x7f0000000440)=""/182}, 0x28) [ 60.509231] 9pnet_virtio: no channels available for device ./file0 2018/03/06 00:08:07 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x10, 0x4, 0x4, 0x5, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r0, &(0x7f0000000040)="7f", &(0x7f0000000080)}, 0x20) 2018/03/06 00:08:07 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000002240)={0xe}, 0x2c) 2018/03/06 00:08:07 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xc, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="85000000220000000700000000009b009500000000000000"], &(0x7f00000001c0)="73797a6b616c6c65720001be826e8f833152f795b4d9f4bc3ea582523aed371b084fccfc3d2ef2cbe65d30642ca8dcd0f8479be52e66937908f1d8112489e8099d9d4edb806d81189c0fbb6818d028546c35d3363d54db0db780f54977ae6359d617c1d233d8e18abfc75f9a76cd8e1f77583bc02f07a33de6f304e95db82fd4da55ebd25162df6f88e7d1bb0654ffb31e008967", 0x1, 0x99, &(0x7f000000d000)=""/153}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000500)={r0, 0x0, 0x12, 0xb6, &(0x7f0000000380)="227976ac0f08fe67c936835588a8b674d234", &(0x7f0000000440)=""/182}, 0x28) 2018/03/06 00:08:07 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='hugetlbfs\x00', 0x0, &(0x7f0000000100)) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x0) 2018/03/06 00:08:07 executing program 4: r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000005f40)={0xffffffffffffffff}) recvmsg$kcm(r1, &(0x7f0000007380)={&(0x7f0000005f80)=@ipx, 0x10, &(0x7f0000000340)=[], 0x0, &(0x7f0000000580)=""/190, 0xbe}, 0x0) sendmsg$kcm(r1, &(0x7f0000000040)={&(0x7f00000000c0)=@in6={0xa, 0x4e20, 0x0, @dev={0xfe, 0x80}}, 0x1c, &(0x7f000000bec0)=[{&(0x7f000000be40)="f7", 0x1}], 0x1, &(0x7f000000bf00)=[]}, 0x0) 2018/03/06 00:08:07 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000831000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f00000013c0)='mqueue.', 0x0, &(0x7f0000001400)) 2018/03/06 00:08:07 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000600)={0xf, 0x8000000000004, 0x4, 0x3}, 0x2c) bpf$MAP_CREATE(0x4, &(0x7f0000000880)={0x13, 0x0, 0x0, 0x0, 0x20000000, 0x0}, 0x2c) 2018/03/06 00:08:07 executing program 1: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100), 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002940)={0xffffffffffffffff, 0x0, 0x0, 0x1000, &(0x7f0000001840), &(0x7f0000001940)=""/4096}, 0x28) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000002980)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002b40)={0xffffffffffffffff, 0x0, 0x0, 0x82, &(0x7f0000002a00), &(0x7f0000002a80)=""/130}, 0x28) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000002b80)) mkdir(&(0x7f0000002bc0)='./file0\x00', 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000002c00)) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000002c40)) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000006680)={&(0x7f0000005cc0)=@can, 0x10, &(0x7f0000006500)=[], 0x0, &(0x7f00000065c0)=""/175, 0xaf}, 0x10140) 2018/03/06 00:08:07 executing program 6: socketpair(0x1d, 0x0, 0x9, &(0x7f0000000040)) [ 60.672988] audit: type=1400 audit(1520294887.108:15): avc: denied { read } for pid=6136 comm="syz-executor4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:unlabeled_t:s0 tclass=socket permissive=1 2018/03/06 00:08:07 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000002240)={0xe}, 0x2c) 2018/03/06 00:08:07 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='sysfs\x00', 0x0, &(0x7f0000000180)) mkdir(&(0x7f0000000000)='./file0/bus/file0\x00', 0x0) mkdir(&(0x7f00000007c0)='./file0/bus\x00', 0x0) 2018/03/06 00:08:07 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0xb, 0x3, &(0x7f0000dbc000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2, 0xffffffb5}, [], {0x95}}, &(0x7f0000e6bffc)='GPL\x00', 0x3, 0x1d2, &(0x7f000000d000)=""/153}, 0x48) 2018/03/06 00:08:07 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xc, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="85000000220000000700000000009b009500000000000000"], &(0x7f00000001c0)="73797a6b616c6c65720001be826e8f833152f795b4d9f4bc3ea582523aed371b084fccfc3d2ef2cbe65d30642ca8dcd0f8479be52e66937908f1d8112489e8099d9d4edb806d81189c0fbb6818d028546c35d3363d54db0db780f54977ae6359d617c1d233d8e18abfc75f9a76cd8e1f77583bc02f07a33de6f304e95db82fd4da55ebd25162df6f88e7d1bb0654ffb31e008967", 0x1, 0x99, &(0x7f000000d000)=""/153}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000500)={r0, 0x0, 0x12, 0xb6, &(0x7f0000000380)="227976ac0f08fe67c936835588a8b674d234", &(0x7f0000000440)=""/182}, 0x28) 2018/03/06 00:08:07 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x5, 0x9, 0x5, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000180), &(0x7f00000001c0), 0x2}, 0x20) 2018/03/06 00:08:07 executing program 1: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100), 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002940)={0xffffffffffffffff, 0x0, 0x0, 0x1000, &(0x7f0000001840), &(0x7f0000001940)=""/4096}, 0x28) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000002980)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002b40)={0xffffffffffffffff, 0x0, 0x0, 0x82, &(0x7f0000002a00), &(0x7f0000002a80)=""/130}, 0x28) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000002b80)) mkdir(&(0x7f0000002bc0)='./file0\x00', 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000002c00)) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000002c40)) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000006680)={&(0x7f0000005cc0)=@can, 0x10, &(0x7f0000006500)=[], 0x0, &(0x7f00000065c0)=""/175, 0xaf}, 0x10140) 2018/03/06 00:08:07 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000002240)={0xe}, 0x2c) [ 60.705625] audit: type=1400 audit(1520294887.141:16): avc: denied { write } for pid=6136 comm="syz-executor4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:unlabeled_t:s0 tclass=socket permissive=1 2018/03/06 00:08:07 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x1, 0x3, &(0x7f0000c91000)=ANY=[@ANYBLOB="850000002e00000027000000000022009500000000000000"], &(0x7f0000000000)="f4206cd55d3174fccd51d063ca3dda5cbf5a01cc7ea92c43b604ffc53727d2d60f55ddeb757cf36a8457125ab48bcbcce4011a423df186cc8d8e6e9a66b1a0a6035a2fc0578cf5aad8b3a24a9c646a37eb26c6212ffc9658f152194b880765d169d550beb059984a10c2", 0x1, 0x99, &(0x7f000000d000)=""/153}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001680)={r0, 0x0, 0xe, 0x3a, &(0x7f0000001540)="1f783960671c928fc80b2fc32ee7", &(0x7f0000001640)=""/58}, 0x28) 2018/03/06 00:08:07 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000005fe0)={0xffffffffffffffff, &(0x7f0000000000)="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", &(0x7f0000004f48)}, 0x20) bpf$OBJ_GET_PROG(0x7, &(0x7f0000006000)={&(0x7f0000005ffa)='./file0\x00'}, 0x10) 2018/03/06 00:08:07 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='sysfs\x00', 0x0, &(0x7f0000000180)) mkdir(&(0x7f0000000000)='./file0/bus/file0\x00', 0x0) mkdir(&(0x7f00000007c0)='./file0/bus\x00', 0x0) 2018/03/06 00:08:07 executing program 1: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100), 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002940)={0xffffffffffffffff, 0x0, 0x0, 0x1000, &(0x7f0000001840), &(0x7f0000001940)=""/4096}, 0x28) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000002980)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002b40)={0xffffffffffffffff, 0x0, 0x0, 0x82, &(0x7f0000002a00), &(0x7f0000002a80)=""/130}, 0x28) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000002b80)) mkdir(&(0x7f0000002bc0)='./file0\x00', 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000002c00)) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000002c40)) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000006680)={&(0x7f0000005cc0)=@can, 0x10, &(0x7f0000006500)=[], 0x0, &(0x7f00000065c0)=""/175, 0xaf}, 0x10140) 2018/03/06 00:08:07 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c, 0x5ccee620}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0xe, 0x5, &(0x7f0000000040)=@framed={{0x18}, [@call={0x85, 0x0, 0x0, 0x27}], {0x95}}, &(0x7f0000000080)='syzkaller\x00', 0x9, 0xc3, &(0x7f00000000c0)=""/195}, 0x48) 2018/03/06 00:08:07 executing program 6: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='sysfs\x00', 0x0, &(0x7f0000000180)) mkdir(&(0x7f0000000000)='./file0/bus/file0\x00', 0x0) mkdir(&(0x7f00000007c0)='./file0/bus\x00', 0x0) 2018/03/06 00:08:07 executing program 5: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) 2018/03/06 00:08:07 executing program 7: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x7f, 0x7, 0x5, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={0xffffffffffffffff, &(0x7f0000000000)="827021baca", &(0x7f0000000080)=""/98}, 0x18) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={r0, &(0x7f0000000180), &(0x7f0000000080)=""/140}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000), &(0x7f0000000080)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000080)={r0, &(0x7f0000000000), &(0x7f0000000280)=""/208}, 0x18) 2018/03/06 00:08:07 executing program 5: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) 2018/03/06 00:08:07 executing program 6: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='sysfs\x00', 0x0, &(0x7f0000000180)) mkdir(&(0x7f0000000000)='./file0/bus/file0\x00', 0x0) mkdir(&(0x7f00000007c0)='./file0/bus\x00', 0x0) 2018/03/06 00:08:07 executing program 7: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xe, 0x4, 0x4, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f]}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000000c0)={r0, &(0x7f0000000140)="6aa5", &(0x7f0000000080)=""/51}, 0x18) 2018/03/06 00:08:07 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xa, 0x100, 0x7, 0xffffffff00000001}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r0, &(0x7f0000000080), &(0x7f0000000100)}, 0x20) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000100), &(0x7f0000000180)}, 0x20) 2018/03/06 00:08:08 executing program 1: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100), 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002940)={0xffffffffffffffff, 0x0, 0x0, 0x1000, &(0x7f0000001840), &(0x7f0000001940)=""/4096}, 0x28) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000002980)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002b40)={0xffffffffffffffff, 0x0, 0x0, 0x82, &(0x7f0000002a00), &(0x7f0000002a80)=""/130}, 0x28) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000002b80)) mkdir(&(0x7f0000002bc0)='./file0\x00', 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000002c00)) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000002c40)) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000006680)={&(0x7f0000005cc0)=@can, 0x10, &(0x7f0000006500)=[], 0x0, &(0x7f00000065c0)=""/175, 0xaf}, 0x10140) 2018/03/06 00:08:08 executing program 7: perf_event_open(&(0x7f0000000240)={0x7, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='selinuxfs\x00', 0x1000, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='minix\x00', 0x10020, &(0x7f0000000240)) 2018/03/06 00:08:08 executing program 6: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='sysfs\x00', 0x0, &(0x7f0000000180)) mkdir(&(0x7f0000000000)='./file0/bus/file0\x00', 0x0) mkdir(&(0x7f00000007c0)='./file0/bus\x00', 0x0) 2018/03/06 00:08:08 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xa, 0x100, 0x7, 0xffffffff00000001}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r0, &(0x7f0000000080), &(0x7f0000000100)}, 0x20) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000100), &(0x7f0000000180)}, 0x20) 2018/03/06 00:08:08 executing program 0: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000c41000)={0x0, 0x0, &(0x7f0000153000)=[], 0x0, &(0x7f0000231f05)=""/251, 0xfb}, 0x0) close(r1) 2018/03/06 00:08:08 executing program 5: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) 2018/03/06 00:08:08 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='sysfs\x00', 0x0, &(0x7f0000000180)) mkdir(&(0x7f0000000000)='./file0/bus/file0\x00', 0x0) mkdir(&(0x7f00000007c0)='./file0/bus\x00', 0x0) 2018/03/06 00:08:08 executing program 4: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000811ffa)='bdev\x00', 0x100000, &(0x7f0000444000)) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1000, 0x0) mount(&(0x7f00002b9ff8)='./file0\x00', &(0x7f0000cbeff8)='./file0\x00', &(0x7f00005f7ffa)='ramfs\x00', 0x80000, &(0x7f000002f000)) mount(&(0x7f0000000840)='.', &(0x7f0000000880)='.', &(0x7f00000008c0)='coda\x00', 0x5018, 0x0) mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f00000e7000)) [ 62.368097] IPVS: ftp: loaded support on port[0] = 21 2018/03/06 00:08:08 executing program 5: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) 2018/03/06 00:08:08 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='sysfs\x00', 0x0, &(0x7f0000000180)) mkdir(&(0x7f0000000000)='./file0/bus/file0\x00', 0x0) mkdir(&(0x7f00000007c0)='./file0/bus\x00', 0x0) 2018/03/06 00:08:08 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xa, 0x100, 0x7, 0xffffffff00000001}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r0, &(0x7f0000000080), &(0x7f0000000100)}, 0x20) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000100), &(0x7f0000000180)}, 0x20) 2018/03/06 00:08:08 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x0, 0x1f, 0x1, 0x0, 0x1}], {0x95}}, &(0x7f000031cff6)='syzkaller\x00', 0x5c6e, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 2018/03/06 00:08:08 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xa, 0xff, 0x6, 0x9, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000001140)={r0, &(0x7f0000000040), &(0x7f0000000140)}, 0x20) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000280)={r0, &(0x7f0000000040), &(0x7f0000000100)}, 0x20) 2018/03/06 00:08:08 executing program 4: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000811ffa)='bdev\x00', 0x100000, &(0x7f0000444000)) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1000, 0x0) mount(&(0x7f00002b9ff8)='./file0\x00', &(0x7f0000cbeff8)='./file0\x00', &(0x7f00005f7ffa)='ramfs\x00', 0x80000, &(0x7f000002f000)) mount(&(0x7f0000000840)='.', &(0x7f0000000880)='.', &(0x7f00000008c0)='coda\x00', 0x5018, 0x0) mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f00000e7000)) 2018/03/06 00:08:08 executing program 7: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000811ffa)='bdev\x00', 0x100000, &(0x7f0000444000)) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1000, 0x0) mount(&(0x7f00002b9ff8)='./file0\x00', &(0x7f0000cbeff8)='./file0\x00', &(0x7f00005f7ffa)='ramfs\x00', 0x80000, &(0x7f000002f000)) mount(&(0x7f0000000840)='.', &(0x7f0000000880)='.', &(0x7f00000008c0)='coda\x00', 0x5018, 0x0) mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f00000e7000)) 2018/03/06 00:08:08 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xa, 0x100, 0x7, 0xffffffff00000001}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r0, &(0x7f0000000080), &(0x7f0000000100)}, 0x20) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000100), &(0x7f0000000180)}, 0x20) [ 63.223419] IPVS: ftp: loaded support on port[0] = 21 [ 63.251897] IPVS: ftp: loaded support on port[0] = 21 2018/03/06 00:08:09 executing program 4: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000811ffa)='bdev\x00', 0x100000, &(0x7f0000444000)) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1000, 0x0) mount(&(0x7f00002b9ff8)='./file0\x00', &(0x7f0000cbeff8)='./file0\x00', &(0x7f00005f7ffa)='ramfs\x00', 0x80000, &(0x7f000002f000)) mount(&(0x7f0000000840)='.', &(0x7f0000000880)='.', &(0x7f00000008c0)='coda\x00', 0x5018, 0x0) mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f00000e7000)) 2018/03/06 00:08:09 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000002c0)={0xf, 0x0, 0x0, 0x6}, 0x2c) 2018/03/06 00:08:09 executing program 7: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000811ffa)='bdev\x00', 0x100000, &(0x7f0000444000)) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1000, 0x0) mount(&(0x7f00002b9ff8)='./file0\x00', &(0x7f0000cbeff8)='./file0\x00', &(0x7f00005f7ffa)='ramfs\x00', 0x80000, &(0x7f000002f000)) mount(&(0x7f0000000840)='.', &(0x7f0000000880)='.', &(0x7f00000008c0)='coda\x00', 0x5018, 0x0) mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f00000e7000)) 2018/03/06 00:08:09 executing program 0: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={0xffffffffffffffff, 0x0, 0x19, 0x19, &(0x7f0000000100)="36efa5861d4261daa01c6e345916d2b3f42683fa40c5885ccf", &(0x7f0000000280)=""/25}, 0x28) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0xc, 0x5, &(0x7f0000000100)=@framed={{0x18}, [@call={0x85, 0x0, 0x0, 0x1a}], {0x95}}, &(0x7f0000000140)='syzkaller\x00', 0x2, 0x89, &(0x7f0000000280)=""/137}, 0x48) 2018/03/06 00:08:09 executing program 6: mount(&(0x7f0000000040)='./file2\x00', &(0x7f0000000080)='./file1\x00', &(0x7f0000000180)='omfs\x00', 0x0, &(0x7f00000001c0)="7082ad866a196fb69c9c3123b7bb6ce7c057b67c171212f7766584b2aa13f4792fe8d0883185b314b617f6739acdf04ceca5b998511adb8bf5d95f7b17e5d48831e0ee57790eb72f9f92fb13dc1e1247e16e0fede613b5bfc975369206a2f9b0277d247c188af17ca59d31bb42f63bc58f9dcba5940dae3d401f9afe5bcba4820f5995a56bbc1549fbb36172cb1e9020612230ba02a1d1ddb8f743e5d1929a34292c") mkdir(&(0x7f0000000000)='./file1\x00', 0x0) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file1\x00', &(0x7f0000000140)='mqueue\x00', 0x0, &(0x7f0000000200)) 2018/03/06 00:08:09 executing program 1: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000001440)={0xffffffffffffff9c}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000014c0)) perf_event_open(&(0x7f0000000080)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x5024, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) 2018/03/06 00:08:09 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x3, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="8500000015000000b5000000000000009500000000000000"], &(0x7f0000000040)="73797a6b616c6c82720082c0d4c7ad5782a84a0106d1d9ea76b4e59f6113a4519e1b23905208ad91571206e4e1afcc26ac11796bd16ab98cbb5cfe6c6ee521805c21c5d955cd50ddbb9d8d6195dcc1d5cc00000000000000000000000000000000", 0x1, 0x99, &(0x7f000000d000)=""/153}, 0x48) 2018/03/06 00:08:09 executing program 5: socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0x0, 0x0}) recvmsg(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000280)=@l2, 0xe, &(0x7f0000000180)=[], 0x0, &(0x7f0000002480)=""/4096, 0x1000}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f000001c580)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x1006a, &(0x7f000001cbc0)=[], 0x0, &(0x7f0000001380)=""/4096, 0x1000}, 0x0) sendmsg(r0, &(0x7f00000004c0)={0x0, 0x380, &(0x7f0000000100)=[], 0xa7, &(0x7f0000000200)=[]}, 0x0) 2018/03/06 00:08:09 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x3, &(0x7f0000346fc8)=@framed={{0x18}, [], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000980)=r0, 0x4) sendmsg(r2, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000)=[], 0x0, &(0x7f0000298000)=[]}, 0x0) 2018/03/06 00:08:09 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000c3000)={0xf, 0x4, 0x4, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f]}, 0x2c) socketpair(0x1, 0x400000000803, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000000)={r1, &(0x7f0000000200)}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000022c0)={r0, &(0x7f0000000040)}, 0x20) 2018/03/06 00:08:09 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x8, 0xdae}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000100)={r0, &(0x7f0000000040)}, 0x10) 2018/03/06 00:08:09 executing program 1: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000001440)={0xffffffffffffff9c}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000014c0)) perf_event_open(&(0x7f0000000080)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x5024, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) 2018/03/06 00:08:09 executing program 7: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000811ffa)='bdev\x00', 0x100000, &(0x7f0000444000)) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1000, 0x0) mount(&(0x7f00002b9ff8)='./file0\x00', &(0x7f0000cbeff8)='./file0\x00', &(0x7f00005f7ffa)='ramfs\x00', 0x80000, &(0x7f000002f000)) mount(&(0x7f0000000840)='.', &(0x7f0000000880)='.', &(0x7f00000008c0)='coda\x00', 0x5018, 0x0) mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f00000e7000)) 2018/03/06 00:08:09 executing program 0: socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000040)) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000831000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f00000013c0)='mqueue.', 0x0, &(0x7f0000001400)) [ 64.925379] IPVS: ftp: loaded support on port[0] = 21 [ 64.951944] IPVS: ftp: loaded support on port[0] = 21 2018/03/06 00:08:11 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x1, 0x3, &(0x7f0000001fe8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffffbc, 0x0, 0x68}, [], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0xc3, &(0x7f0000009f3d)=""/195}, 0x48) 2018/03/06 00:08:11 executing program 5: socketpair$unix(0x1, 0x4000000000000001, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000001500)={&(0x7f0000000000)=ANY=[], 0x0, &(0x7f0000000000)=[], 0x0, &(0x7f00000059c0)=""/4096, 0x8c4}, 0x0) sendmsg(r1, &(0x7f0000e91000)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000280)='*', 0x1}], 0x1, &(0x7f0000000000)=[]}, 0x0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)=""/4, 0x4}], 0x1, &(0x7f0000000180)=""/67, 0x43}, 0x0) 2018/03/06 00:08:11 executing program 4: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000811ffa)='bdev\x00', 0x100000, &(0x7f0000444000)) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1000, 0x0) mount(&(0x7f00002b9ff8)='./file0\x00', &(0x7f0000cbeff8)='./file0\x00', &(0x7f00005f7ffa)='ramfs\x00', 0x80000, &(0x7f000002f000)) mount(&(0x7f0000000840)='.', &(0x7f0000000880)='.', &(0x7f00000008c0)='coda\x00', 0x5018, 0x0) mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f00000e7000)) 2018/03/06 00:08:11 executing program 1: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000001440)={0xffffffffffffff9c}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000014c0)) perf_event_open(&(0x7f0000000080)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x5024, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) 2018/03/06 00:08:11 executing program 0: r0 = perf_event_open(&(0x7f00004e7000)={0x2, 0x78, 0xdf}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000000c0)='cpu&5"\x00\x00\x00\x00\x00\x00\x00\x00') socketpair(0x1e, 0x5, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(r1, &(0x7f0000000480)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/205, 0xcd}], 0x1, &(0x7f0000000440)=""/17, 0x11}, 0x0) close(r2) 2018/03/06 00:08:11 executing program 7: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='rootfs\x00', 0x1000, &(0x7f0000000280)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000140)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='nsfs\x00', 0x20, &(0x7f0000000140)) 2018/03/06 00:08:11 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x3, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="8500000015000000b5000000000000009500000000000000"], &(0x7f0000000040)="73797a6b616c6c82720082c0d4c7ad5782a84a0106d1d9ea76b4e59f6113a4519e1b23905208ad91571206e4e1afcc26ac11796bd16ab98cbb5cfe6c6ee521805c21c5d955cd50ddbb9d8d6195dcc1d5cc00000000000000000000000000000000", 0x1, 0x99, &(0x7f000000d000)=""/153}, 0x48) 2018/03/06 00:08:11 executing program 6: mount(&(0x7f0000000040)='./file2\x00', &(0x7f0000000080)='./file1\x00', &(0x7f0000000180)='omfs\x00', 0x0, &(0x7f00000001c0)="7082ad866a196fb69c9c3123b7bb6ce7c057b67c171212f7766584b2aa13f4792fe8d0883185b314b617f6739acdf04ceca5b998511adb8bf5d95f7b17e5d48831e0ee57790eb72f9f92fb13dc1e1247e16e0fede613b5bfc975369206a2f9b0277d247c188af17ca59d31bb42f63bc58f9dcba5940dae3d401f9afe5bcba4820f5995a56bbc1549fbb36172cb1e9020612230ba02a1d1ddb8f743e5d1929a34292c") mkdir(&(0x7f0000000000)='./file1\x00', 0x0) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file1\x00', &(0x7f0000000140)='mqueue\x00', 0x0, &(0x7f0000000200)) 2018/03/06 00:08:11 executing program 2: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(r1, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x1, &(0x7f0000000400)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x10, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0x11}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)=@vsock={0x0, 0x0, 0x0, @any}, 0xfffffffffffffda6, &(0x7f00000000c0)=[{&(0x7f0000000180)=""/154, 0x9a}], 0x1, &(0x7f0000000240)=""/105, 0x69}, 0x0) close(r0) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)=[], 0x28a, &(0x7f0000000000)=[]}, 0x0) 2018/03/06 00:08:11 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x3, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="8500000015000000b5000000000000009500000000000000"], &(0x7f0000000040)="73797a6b616c6c82720082c0d4c7ad5782a84a0106d1d9ea76b4e59f6113a4519e1b23905208ad91571206e4e1afcc26ac11796bd16ab98cbb5cfe6c6ee521805c21c5d955cd50ddbb9d8d6195dcc1d5cc00000000000000000000000000000000", 0x1, 0x99, &(0x7f000000d000)=""/153}, 0x48) 2018/03/06 00:08:11 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4c}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x36, &(0x7f00001a7f05)=""/251}, 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0x0, 0x0}) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000100)=r0, 0x4) sendmsg(r1, &(0x7f0000000880)={&(0x7f00000001c0)=@un=@abs, 0x80, &(0x7f0000000600)=[{&(0x7f00000004c0)="e2b9086d931f35f5e55256305fd1287f1abae9bbb3368ab34f560efa3ec5960b46f603cf3a05d5a066e62a4d44733c96aedb579409c6ab18b3c0e5f8fe38693345d01031240a277144ab80e625dae4f818a6503ad2b4b846aaca37a856f640946a0f8fe117b41d5d61540b57eac53b4c753b9bdcb897c40191e7aa5854c7ac4967f52579cc46080d125a", 0x8a}], 0x1, &(0x7f0000000680)=[{0x88, 0x3b, 0x8, "134419dddbebf52a20a6ee0221ffffcb407da1527d273e594eb00ca7d72bbb32d3e2225ac2b818018887edd0d0862f7ae7e7f4fcc58b6e25b169a161b1bd5e7f4614d7d3f7eb48c8406592e2f3f91c1f365265632306d50dab41f339f62a731c2a35e322048c23899cded53f38aa7291f1a8"}, {0xd0, 0x10d, 0x3, "5fddb8065cf5e6bd24664ae11928d37d9d3c6e94c3b975b0ee9ca22c66ecb8fd8401a668bac91121d7eb6eae6feb12878039889915f774000758319a18ec534fca15ece519c4549da9c9dade2c1f54d373c639768b6f9a70211233f054871bfb805378089a0133da3d793930cf8a0a829e981e4e5fd1a88a0462153922a069f9a63cf3d58f38ac33c121f781caece9afa4d64981d7d477a1deb86201da915d5551cd972609c1674528309c9088ba54b08ffbcc14fb438d5b0c36afccb8"}], 0x158, 0x10}, 0x0) 2018/03/06 00:08:11 executing program 6: mount(&(0x7f0000000040)='./file2\x00', &(0x7f0000000080)='./file1\x00', &(0x7f0000000180)='omfs\x00', 0x0, &(0x7f00000001c0)="7082ad866a196fb69c9c3123b7bb6ce7c057b67c171212f7766584b2aa13f4792fe8d0883185b314b617f6739acdf04ceca5b998511adb8bf5d95f7b17e5d48831e0ee57790eb72f9f92fb13dc1e1247e16e0fede613b5bfc975369206a2f9b0277d247c188af17ca59d31bb42f63bc58f9dcba5940dae3d401f9afe5bcba4820f5995a56bbc1549fbb36172cb1e9020612230ba02a1d1ddb8f743e5d1929a34292c") mkdir(&(0x7f0000000000)='./file1\x00', 0x0) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file1\x00', &(0x7f0000000140)='mqueue\x00', 0x0, &(0x7f0000000200)) 2018/03/06 00:08:11 executing program 7: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/03/06 00:08:11 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xa, 0xff, 0x1f, 0x9, 0x10, 0xffffffffffffff9c}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000002c0)={r0, &(0x7f0000000180), &(0x7f0000000200)=""/150}, 0x18) [ 65.033907] EXT4-fs (sda1): Unrecognized mount option "" or missing value 2018/03/06 00:08:11 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x3, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="8500000015000000b5000000000000009500000000000000"], &(0x7f0000000040)="73797a6b616c6c82720082c0d4c7ad5782a84a0106d1d9ea76b4e59f6113a4519e1b23905208ad91571206e4e1afcc26ac11796bd16ab98cbb5cfe6c6ee521805c21c5d955cd50ddbb9d8d6195dcc1d5cc00000000000000000000000000000000", 0x1, 0x99, &(0x7f000000d000)=""/153}, 0x48) 2018/03/06 00:08:11 executing program 5: mkdir(&(0x7f0000ac6000)='./file0\x00', 0x0) mount(&(0x7f00000012c0)='./file0/file0\x00', &(0x7f0000001300)='./file0\x00', &(0x7f0000001340)='configfs\x00', 0x0, &(0x7f0000001380)) mkdir(&(0x7f0000000100)='./file0/file0\x00', 0x0) 2018/03/06 00:08:11 executing program 6: mount(&(0x7f0000000040)='./file2\x00', &(0x7f0000000080)='./file1\x00', &(0x7f0000000180)='omfs\x00', 0x0, &(0x7f00000001c0)="7082ad866a196fb69c9c3123b7bb6ce7c057b67c171212f7766584b2aa13f4792fe8d0883185b314b617f6739acdf04ceca5b998511adb8bf5d95f7b17e5d48831e0ee57790eb72f9f92fb13dc1e1247e16e0fede613b5bfc975369206a2f9b0277d247c188af17ca59d31bb42f63bc58f9dcba5940dae3d401f9afe5bcba4820f5995a56bbc1549fbb36172cb1e9020612230ba02a1d1ddb8f743e5d1929a34292c") mkdir(&(0x7f0000000000)='./file1\x00', 0x0) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file1\x00', &(0x7f0000000140)='mqueue\x00', 0x0, &(0x7f0000000200)) 2018/03/06 00:08:11 executing program 1: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000001440)={0xffffffffffffff9c}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000014c0)) perf_event_open(&(0x7f0000000080)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x5024, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) 2018/03/06 00:08:11 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x6, 0x3, &(0x7f0000dbc000)=ANY=[@ANYBLOB="85000000330000009c000000000000009500000000000000"], &(0x7f0000000000)="47ff3300", 0x1, 0x99, &(0x7f0000000000)=""/153}, 0x48) 2018/03/06 00:08:11 executing program 6: perf_event_open(&(0x7f0000940000)={0x2, 0x78, 0xd68, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f00000001c0)) 2018/03/06 00:08:11 executing program 2: perf_event_open(&(0x7f0000000200)={0x5, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000000), 0x8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 2018/03/06 00:08:11 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) 2018/03/06 00:08:11 executing program 0: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(r1, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x1, &(0x7f0000000400)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x10, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0x11}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)=@vsock={0x0, 0x0, 0x0, @any}, 0xfffffffffffffda6, &(0x7f00000000c0)=[{&(0x7f0000000180)=""/154, 0x9a}], 0x1, &(0x7f0000000240)=""/105, 0x69}, 0x0) close(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)=[], 0x28a, &(0x7f0000000000)=[]}, 0x0) 2018/03/06 00:08:11 executing program 4: socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)=@l2, 0xe, &(0x7f0000000180)=[{&(0x7f0000000040)=""/131, 0xfe78}, {&(0x7f0000000000)=""/3, 0x3}, {&(0x7f0000000180)=""/138, 0x8a}, {&(0x7f0000000240)=""/233, 0xe9}], 0x4, &(0x7f0000000380)=""/4096, 0x946}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000002a80)={&(0x7f0000000340)=@nfc={0x27, 0x7fff, 0x1ff}, 0x10, &(0x7f0000002780)=[], 0x0, &(0x7f0000002800)=[]}, 0x0) sendmsg(r0, &(0x7f00000004c0)={0x0, 0x380, &(0x7f0000000100)=[], 0xa7, &(0x7f0000000200)=[]}, 0x0) 2018/03/06 00:08:11 executing program 7: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x7f, 0x7, 0x5, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000040)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={0xffffffffffffffff, &(0x7f0000000000)="827021baca", &(0x7f0000000080)=""/98}, 0x18) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={r0, &(0x7f0000000180), &(0x7f0000000080)=""/140}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000), &(0x7f0000000080)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000400)={r0, &(0x7f0000000180), &(0x7f0000000300)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000200)={r0, &(0x7f0000000180)}, 0x10) 2018/03/06 00:08:11 executing program 1: r0 = perf_event_open(&(0x7f00003a8000)={0x2, 0x78, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000422000)="6370752635000206fd00000183") ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000048000)='vmnet0vboxnet0\x00') 2018/03/06 00:08:11 executing program 2: socketpair(0x100000000000028, 0x801, 0x0, &(0x7f0000000000)) 2018/03/06 00:08:11 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x3, 0x0, &(0x7f0000000000)={0x0, 0x0}) sendmsg(r0, &(0x7f0000001600)={0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000000180)}], 0x1, &(0x7f0000001580)=[]}, 0x0) close(r0) sendmsg(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000001c0)=[], 0x0, &(0x7f0000000200)=[]}, 0x0) 2018/03/06 00:08:11 executing program 5: socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0x0, 0x0}) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)=[], 0x0, &(0x7f0000000100)=""/31, 0x1f}, 0x0) close(r0) 2018/03/06 00:08:11 executing program 0: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(r1, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x1, &(0x7f0000000400)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x10, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0x11}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)=@vsock={0x0, 0x0, 0x0, @any}, 0xfffffffffffffda6, &(0x7f00000000c0)=[{&(0x7f0000000180)=""/154, 0x9a}], 0x1, &(0x7f0000000240)=""/105, 0x69}, 0x0) close(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)=[], 0x28a, &(0x7f0000000000)=[]}, 0x0) 2018/03/06 00:08:11 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xe, 0x4, 0x4, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f]}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000240)={0xffffffffffffffff, &(0x7f00000000c0), &(0x7f00000001c0)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000480)={r0, &(0x7f0000000300), &(0x7f0000000240)="06"}, 0x20) [ 66.030404] IPVS: ftp: loaded support on port[0] = 21 2018/03/06 00:08:12 executing program 2: perf_event_open(&(0x7f00000001c0)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='devtmpfs\x00', 0x0, &(0x7f0000000100)) 2018/03/06 00:08:12 executing program 4: socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)=@l2, 0xe, &(0x7f0000000180)=[{&(0x7f0000000040)=""/131, 0xfe78}, {&(0x7f0000000000)=""/3, 0x3}, {&(0x7f0000000180)=""/138, 0x8a}, {&(0x7f0000000240)=""/233, 0xe9}], 0x4, &(0x7f0000000380)=""/4096, 0x946}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000002a80)={&(0x7f0000000340)=@nfc={0x27, 0x7fff, 0x1ff}, 0x10, &(0x7f0000002780)=[], 0x0, &(0x7f0000002800)=[]}, 0x0) sendmsg(r0, &(0x7f00000004c0)={0x0, 0x380, &(0x7f0000000100)=[], 0xa7, &(0x7f0000000200)=[]}, 0x0) 2018/03/06 00:08:12 executing program 6: perf_event_open(&(0x7f0000940000)={0x1, 0x78, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x2801}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/03/06 00:08:12 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x3, 0x0, &(0x7f0000000000)={0x0, 0x0}) sendmsg(r0, &(0x7f0000001600)={0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000000180)}], 0x1, &(0x7f0000001580)=[]}, 0x0) close(r0) sendmsg(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000001c0)=[], 0x0, &(0x7f0000000200)=[]}, 0x0) 2018/03/06 00:08:12 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x7}], {0x95}}, &(0x7f000031cff6)='syzkaller\x00', 0x5c6e, 0x220, &(0x7f00001a7f05)=""/251}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0xc, &(0x7f0000000000)="e6a95e8c2a860798874ce3331037", &(0x7f0000000040)=""/12}, 0x28) 2018/03/06 00:08:12 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0xec9a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/03/06 00:08:12 executing program 5: socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0x0, 0x0}) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)=[], 0x0, &(0x7f0000000100)=""/31, 0x1f}, 0x0) close(r0) 2018/03/06 00:08:12 executing program 0: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(r1, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x1, &(0x7f0000000400)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x10, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0x11}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)=@vsock={0x0, 0x0, 0x0, @any}, 0xfffffffffffffda6, &(0x7f00000000c0)=[{&(0x7f0000000180)=""/154, 0x9a}], 0x1, &(0x7f0000000240)=""/105, 0x69}, 0x0) close(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)=[], 0x28a, &(0x7f0000000000)=[]}, 0x0) 2018/03/06 00:08:12 executing program 4: socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)=@l2, 0xe, &(0x7f0000000180)=[{&(0x7f0000000040)=""/131, 0xfe78}, {&(0x7f0000000000)=""/3, 0x3}, {&(0x7f0000000180)=""/138, 0x8a}, {&(0x7f0000000240)=""/233, 0xe9}], 0x4, &(0x7f0000000380)=""/4096, 0x946}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000002a80)={&(0x7f0000000340)=@nfc={0x27, 0x7fff, 0x1ff}, 0x10, &(0x7f0000002780)=[], 0x0, &(0x7f0000002800)=[]}, 0x0) sendmsg(r0, &(0x7f00000004c0)={0x0, 0x380, &(0x7f0000000100)=[], 0xa7, &(0x7f0000000200)=[]}, 0x0) 2018/03/06 00:08:12 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/03/06 00:08:12 executing program 2: perf_event_open(&(0x7f00000001c0)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='devtmpfs\x00', 0x0, &(0x7f0000000100)) 2018/03/06 00:08:12 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000080)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040)=0xffffffff, 0x4) 2018/03/06 00:08:12 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x3, 0x0, &(0x7f0000000000)={0x0, 0x0}) sendmsg(r0, &(0x7f0000001600)={0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000000180)}], 0x1, &(0x7f0000001580)=[]}, 0x0) close(r0) sendmsg(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000001c0)=[], 0x0, &(0x7f0000000200)=[]}, 0x0) 2018/03/06 00:08:12 executing program 1: perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x75, 0x2}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x36, &(0x7f00001a7f05)=""/251}, 0x18) 2018/03/06 00:08:12 executing program 4: socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)=@l2, 0xe, &(0x7f0000000180)=[{&(0x7f0000000040)=""/131, 0xfe78}, {&(0x7f0000000000)=""/3, 0x3}, {&(0x7f0000000180)=""/138, 0x8a}, {&(0x7f0000000240)=""/233, 0xe9}], 0x4, &(0x7f0000000380)=""/4096, 0x946}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000002a80)={&(0x7f0000000340)=@nfc={0x27, 0x7fff, 0x1ff}, 0x10, &(0x7f0000002780)=[], 0x0, &(0x7f0000002800)=[]}, 0x0) sendmsg(r0, &(0x7f00000004c0)={0x0, 0x380, &(0x7f0000000100)=[], 0xa7, &(0x7f0000000200)=[]}, 0x0) 2018/03/06 00:08:12 executing program 5: socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0x0, 0x0}) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)=[], 0x0, &(0x7f0000000100)=""/31, 0x1f}, 0x0) close(r0) 2018/03/06 00:08:12 executing program 7: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)=@raw=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x76, &(0x7f0000000080)=""/118}, 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x6, 0x4, 0x7, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000040), &(0x7f0000000100)}, 0x20) 2018/03/06 00:08:12 executing program 2: perf_event_open(&(0x7f00000001c0)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='devtmpfs\x00', 0x0, &(0x7f0000000100)) 2018/03/06 00:08:12 executing program 0: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(r1, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x1, &(0x7f0000000400)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x10, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0x11}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)=@vsock={0x0, 0x0, 0x0, @any}, 0xfffffffffffffda6, &(0x7f00000000c0)=[{&(0x7f0000000180)=""/154, 0x9a}], 0x1, &(0x7f0000000240)=""/105, 0x69}, 0x0) close(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)=[], 0x28a, &(0x7f0000000000)=[]}, 0x0) 2018/03/06 00:08:12 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x3, 0x0, &(0x7f0000000000)={0x0, 0x0}) sendmsg(r0, &(0x7f0000001600)={0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000000180)}], 0x1, &(0x7f0000001580)=[]}, 0x0) close(r0) sendmsg(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000001c0)=[], 0x0, &(0x7f0000000200)=[]}, 0x0) [ 66.993386] IPVS: ftp: loaded support on port[0] = 21 2018/03/06 00:08:13 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000080)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040)=0xffffffff, 0x4) 2018/03/06 00:08:13 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x7f, 0x7, 0x5, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000040)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={r0, &(0x7f00000003c0), &(0x7f0000000440)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000200)={r0, &(0x7f0000000180)}, 0x10) 2018/03/06 00:08:13 executing program 4: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=@framed={{0x18}, [], {0x95}}, &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 2018/03/06 00:08:13 executing program 5: socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0x0, 0x0}) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)=[], 0x0, &(0x7f0000000100)=""/31, 0x1f}, 0x0) close(r0) 2018/03/06 00:08:13 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0xb, 0x1e, 0x8000, 0x8, 0x1}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={r0, 0x28, &(0x7f0000000140)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={r1, 0x6}, 0xc) 2018/03/06 00:08:13 executing program 3: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x28, &(0x7f0000000040)}, 0x10) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x10, 0x4, 0x4, 0x5, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r0, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) 2018/03/06 00:08:13 executing program 2: perf_event_open(&(0x7f00000001c0)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='devtmpfs\x00', 0x0, &(0x7f0000000100)) 2018/03/06 00:08:13 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x9, 0x3, &(0x7f0000000140)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0xffffff9c}, [], {0x95}}, &(0x7f0000000000)='GPL\x00', 0x80003ff, 0x99, &(0x7f000000d000)=""/153}, 0x48) 2018/03/06 00:08:13 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000080)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040)=0xffffffff, 0x4) 2018/03/06 00:08:13 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='(,\'selfvboxnet0&)bdev+.\x00') 2018/03/06 00:08:13 executing program 2: r0 = perf_event_open(&(0x7f0000271000)={0x20000000002, 0x78, 0x0, 0x80000002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000057c000)={0x2, 0x78, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) 2018/03/06 00:08:13 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x8, 0x7}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r0, 0x28, &(0x7f0000000040)={0x0, 0x0}}, 0x10) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={r1}, 0xc) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r2, &(0x7f00000000c0), &(0x7f0000000240)=""/4096}, 0x18) [ 67.838760] IPVS: ftp: loaded support on port[0] = 21 2018/03/06 00:08:14 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x7, 0x4, 0x380, 0x5eda, 0x0, 0xffffffffffffff9c}, 0x2c) 2018/03/06 00:08:14 executing program 5: perf_event_open(&(0x7f0000940000)={0x2, 0x78, 0x37ba, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) 2018/03/06 00:08:14 executing program 7: mkdir(&(0x7f0000000e00)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f00000002c0)) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000001c0)='rpc_pipefs\x00', 0x0, &(0x7f0000000200)) 2018/03/06 00:08:14 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000080)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040)=0xffffffff, 0x4) 2018/03/06 00:08:14 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000009e40)={0xd}, 0x2c) 2018/03/06 00:08:14 executing program 2: perf_event_open(&(0x7f00006d7000)={0x1, 0x78, 0x5, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/03/06 00:08:14 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x8, 0x7}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r0, 0x28, &(0x7f0000000040)={0x0, 0x0}}, 0x10) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={r1}, 0xc) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r2, &(0x7f00000000c0), &(0x7f0000000240)=""/4096}, 0x18) 2018/03/06 00:08:14 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='(,\'selfvboxnet0&)bdev+.\x00') 2018/03/06 00:08:14 executing program 5: perf_event_open(&(0x7f0000940000)={0x2, 0x78, 0x37ba, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) 2018/03/06 00:08:14 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='(,\'selfvboxnet0&)bdev+.\x00') 2018/03/06 00:08:14 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000c3000)={0xf, 0x4, 0x4, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f]}, 0x380) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000022c0)={r0, &(0x7f0000000040), &(0x7f0000000040)}, 0x20) 2018/03/06 00:08:14 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x8, 0x7}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r0, 0x28, &(0x7f0000000040)={0x0, 0x0}}, 0x10) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={r1}, 0xc) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r2, &(0x7f00000000c0), &(0x7f0000000240)=""/4096}, 0x18) 2018/03/06 00:08:14 executing program 4: socketpair(0x1e, 0x5, 0x0, &(0x7f0000000140)={0x0}) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000040)}], 0x1, &(0x7f0000000180)=[{0x10, 0x0, 0x7}], 0x10}, 0x0) 2018/03/06 00:08:14 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)={&(0x7f0000000000)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000300)='hugetlbfs\x00', 0x0, 0x0) 2018/03/06 00:08:14 executing program 7: mkdir(&(0x7f0000000e00)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f00000002c0)) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000001c0)='rpc_pipefs\x00', 0x0, &(0x7f0000000200)) 2018/03/06 00:08:14 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x8, 0x7}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r0, 0x28, &(0x7f0000000040)={0x0, 0x0}}, 0x10) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={r1}, 0xc) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r2, &(0x7f00000000c0), &(0x7f0000000240)=""/4096}, 0x18) 2018/03/06 00:08:14 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x7f, 0x7, 0x5, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={0xffffffffffffffff, &(0x7f0000000000)="827021baca", &(0x7f0000000080)=""/98}, 0x18) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={r0, &(0x7f0000000180), &(0x7f0000000080)=""/140}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000), &(0x7f0000000080)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000080)={r0, &(0x7f0000000340), &(0x7f0000000200)=""/208}, 0x18) 2018/03/06 00:08:14 executing program 5: perf_event_open(&(0x7f0000940000)={0x2, 0x78, 0x37ba, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) 2018/03/06 00:08:14 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x1, 0x5, 0x9}, 0x14) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xd, 0x6, 0x4, 0x100000001, 0x0, r0}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000480)={r1, &(0x7f0000000380), &(0x7f0000000400)=""/72}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00005f1000)={0xffffffffffffffff, &(0x7f00000004c0), &(0x7f0000b88000)}, 0x20) 2018/03/06 00:08:14 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='(,\'selfvboxnet0&)bdev+.\x00') 2018/03/06 00:08:14 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)={&(0x7f0000000000)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000300)='hugetlbfs\x00', 0x0, 0x0) 2018/03/06 00:08:14 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000c3000)={0x10, 0x4, 0x4, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x305f]}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000000c0)={r0, &(0x7f0000000000), &(0x7f0000000040)=""/123}, 0x18) 2018/03/06 00:08:14 executing program 7: mkdir(&(0x7f0000000e00)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f00000002c0)) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000001c0)='rpc_pipefs\x00', 0x0, &(0x7f0000000200)) 2018/03/06 00:08:14 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f00000007c0)={0xf, 0x4, 0x0, 0x2}, 0x2c) 2018/03/06 00:08:14 executing program 1: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0xc0189436, &(0x7f0000000040)="8872613ddf4cf4fb378b89205192c6e1d72e81d3") 2018/03/06 00:08:14 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xc, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="85000000220000000700000000009b009500000000000000"], &(0x7f00000001c0)="73797a6b616c6c65720001be826e8f833152f795b4d9f4bc3ea582523aed371b084fccfc3d2ef2cbe65d30642ca8dcd0f8479be52e66937908f1d8112489e8099d9d4edb806d81189c0fbb6818d028546c35d3363d54db0db780f54977ae6359d617c1d233d8e18abfc75f9a76cd8e1f77583bc02f07a33de6f304e95db82fd4da55ebd25162df6f88e7d1bb0654ffb31e008967", 0x1, 0x99, &(0x7f000000d000)=""/153}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0x22, 0x1000, &(0x7f0000001280)="288b6692b5c352f6677525060800893cb07d54c70000000000000000000000000000", &(0x7f0000000280)=""/4096}, 0x28) 2018/03/06 00:08:14 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='sysfs\x00', 0x0, &(0x7f0000000180)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000180)={&(0x7f0000000040)='./file0/bus/file0\x00'}, 0x10) 2018/03/06 00:08:14 executing program 5: perf_event_open(&(0x7f0000940000)={0x2, 0x78, 0x37ba, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) 2018/03/06 00:08:14 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x3, &(0x7f0000002000)=@framed={{0x18}, [], {0x95}}, &(0x7f000001bff6)='syzkaller\x00', 0x1, 0xc3, &(0x7f0000000240)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0xfffffffffffffdf9, &(0x7f0000000180), &(0x7f0000000340)=""/183}, 0x12) 2018/03/06 00:08:14 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)={&(0x7f0000000000)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000300)='hugetlbfs\x00', 0x0, 0x0) 2018/03/06 00:08:14 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x84, 0x7, 0xffffffff00000001, 0x1}, 0x1e3) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r0, &(0x7f0000000000), &(0x7f0000000100)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f00000001c0)="c5", &(0x7f0000000280)}, 0x20) 2018/03/06 00:08:14 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x84, 0x7, 0xffffffff00000001}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000100)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000000)={r0, &(0x7f0000000100)}, 0x10) 2018/03/06 00:08:14 executing program 4: perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000280)='cpu&5 \x00\x00\x00\x00\x00\x00\x00\x00') [ 68.874814] IPVS: ftp: loaded support on port[0] = 21 2018/03/06 00:08:15 executing program 2: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000480)={0xffffffffffffffff, 0x0, 0x0, 0xaf, &(0x7f00000002c0), &(0x7f00000003c0)=""/175}, 0x28) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300), 0x2f9) 2018/03/06 00:08:15 executing program 0: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000000)='mqueue\x00', 0x0, &(0x7f0000000040)) 2018/03/06 00:08:15 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x9, 0xb, 0x20001, 0x2}, 0x2c) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000040), &(0x7f00000000c0)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r0, &(0x7f0000000040)}, 0x10) 2018/03/06 00:08:15 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0/bus\x00', &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f00000003c0)) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000001c0)='rpc_pipefs\x00', 0x0, &(0x7f0000000200)) 2018/03/06 00:08:15 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x1, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x35}, [], {0x95}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153}, 0x3e) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000200)={r0, 0x0, 0xe, 0xff, &(0x7f0000000000)="dd74dbc79bdf28df3c4ac39597fc", &(0x7f0000000100)=""/255, 0x0, 0x20}, 0x28) 2018/03/06 00:08:15 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)={&(0x7f0000000000)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000300)='hugetlbfs\x00', 0x0, 0x0) 2018/03/06 00:08:15 executing program 1: mkdir(&(0x7f0000001000)='./file0\x00', 0x0) 2018/03/06 00:08:15 executing program 7: mkdir(&(0x7f0000000e00)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f00000002c0)) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000001c0)='rpc_pipefs\x00', 0x0, &(0x7f0000000200)) 2018/03/06 00:08:15 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r0, 0x0) 2018/03/06 00:08:15 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x3, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x45}, [], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x5, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 2018/03/06 00:08:15 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0xb, 0x3, &(0x7f0000000140)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0xc, 0xffffffb5}, [], {0x95}}, &(0x7f00000000c0)='GPL\x00', 0xa3f, 0x99, &(0x7f0000000000)=""/153}, 0x48) 2018/03/06 00:08:15 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x1, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x35}, [], {0x95}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153}, 0x3e) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000200)={r0, 0x0, 0xe, 0xff, &(0x7f0000000000)="dd74dbc79bdf28df3c4ac39597fc", &(0x7f0000000100)=""/255, 0x0, 0x20}, 0x28) 2018/03/06 00:08:15 executing program 7: r0 = socket$kcm(0x29, 0x5, 0x0) r1 = getpid() perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r1, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) recvmsg$kcm(r0, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001240)=[], 0x0, &(0x7f0000001280)=""/219, 0xdb}, 0x0) recvmsg(r2, &(0x7f0000005180)={&(0x7f00000001c0)=ANY=[], 0x0, &(0x7f0000005040)=[], 0x0, &(0x7f0000005100)=""/93, 0x5d}, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3de}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r3, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="e9", 0x1}], 0x1, &(0x7f0000000180)=[]}, 0x0) 2018/03/06 00:08:15 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000003000)={0x0, 0x1ffffffffffffe3d, &(0x7f0000008000)=@framed={{0x18}, [], {0x95}}, &(0x7f0000008000)='syzkaller\x00', 0x25, 0x7f, &(0x7f0000008000)=""/127}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000001fb8)={0x1, 0x5, &(0x7f0000003000)=@framed={{0x18}, [@alu={0x5, 0x0, 0xffffff85}], {0x95}}, &(0x7f0000002ff6)='syzkaller\x00', 0x7e0, 0x1f5, &(0x7f0000002f19)=""/231}, 0x47) 2018/03/06 00:08:15 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x10cd}, 0xfffffffffffffef6) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x7, 0x1f, 0x1, 0x1, 0x1}], {0x95}}, &(0x7f000031cff6)='syzkaller\x00', 0x5c6e, 0x412, &(0x7f00001a7f05)=""/251}, 0x48) 2018/03/06 00:08:15 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x1, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x35}, [], {0x95}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153}, 0x3e) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000200)={r0, 0x0, 0xe, 0xff, &(0x7f0000000000)="dd74dbc79bdf28df3c4ac39597fc", &(0x7f0000000100)=""/255, 0x0, 0x20}, 0x28) 2018/03/06 00:08:15 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x1, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x35}, [], {0x95}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153}, 0x3e) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000200)={r0, 0x0, 0xe, 0xff, &(0x7f0000000000)="dd74dbc79bdf28df3c4ac39597fc", &(0x7f0000000100)=""/255, 0x0, 0x20}, 0x28) [ 69.770729] IPVS: ftp: loaded support on port[0] = 21 [ 70.720160] IPVS: ftp: loaded support on port[0] = 21 [ 70.745782] IPVS: ftp: loaded support on port[0] = 21 2018/03/06 00:08:17 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x100, 0x7, 0xffffffff00000001}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000040), &(0x7f00000000c0)}, 0x20) 2018/03/06 00:08:17 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x1, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x35}, [], {0x95}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153}, 0x3e) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000200)={r0, 0x0, 0xe, 0xff, &(0x7f0000000000)="dd74dbc79bdf28df3c4ac39597fc", &(0x7f0000000100)=""/255, 0x0, 0x20}, 0x28) 2018/03/06 00:08:17 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x10cd}, 0xfffffffffffffef6) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x7, 0x1f, 0x1, 0x1, 0x1}], {0x95}}, &(0x7f000031cff6)='syzkaller\x00', 0x5c6e, 0x412, &(0x7f00001a7f05)=""/251}, 0x48) 2018/03/06 00:08:17 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x1, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x35}, [], {0x95}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153}, 0x3e) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000200)={r0, 0x0, 0xe, 0xff, &(0x7f0000000000)="dd74dbc79bdf28df3c4ac39597fc", &(0x7f0000000100)=""/255, 0x0, 0x20}, 0x28) 2018/03/06 00:08:17 executing program 7: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0xc0189436, &(0x7f0000000000)) 2018/03/06 00:08:17 executing program 4: perf_event_open(&(0x7f0000ff3f88)={0x1, 0x78, 0x200000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0xc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/03/06 00:08:17 executing program 0: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000000)='mqueue\x00', 0x0, &(0x7f0000000040)) 2018/03/06 00:08:17 executing program 6: socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000)=[], 0x0, &(0x7f0000298000)=[{0x18, 0x1, 0x1, "13"}], 0x18}, 0x0) 2018/03/06 00:08:17 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x9, 0x4, 0x800, 0x7}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r0, &(0x7f0000000000), &(0x7f0000000180)=""/224}, 0x18) 2018/03/06 00:08:17 executing program 7: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000300)={&(0x7f00000001c0)=@nl=@unspec, 0x80, &(0x7f0000000140)=[]}, 0x42) 2018/03/06 00:08:17 executing program 0: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000000)='mqueue\x00', 0x0, &(0x7f0000000040)) 2018/03/06 00:08:17 executing program 3: r0 = socket$kcm(0x29, 0x5, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x8983, &(0x7f0000000100)) socketpair(0x3, 0x0, 0x0, &(0x7f0000000140)) 2018/03/06 00:08:17 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000fc7000)={0x5, 0xa, 0x4000000000080, 0x2, 0x1}, 0x14) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000b9bfe3)={r0, &(0x7f0000fca000)='X', &(0x7f0000002000)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f000051e000)={r0, &(0x7f0000fc5000), &(0x7f0000950000)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000fccff0)={r0, &(0x7f0000fce000)}, 0x10) 2018/03/06 00:08:17 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x10cd}, 0xfffffffffffffef6) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x7, 0x1f, 0x1, 0x1, 0x1}], {0x95}}, &(0x7f000031cff6)='syzkaller\x00', 0x5c6e, 0x412, &(0x7f00001a7f05)=""/251}, 0x48) 2018/03/06 00:08:17 executing program 0: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000000)='mqueue\x00', 0x0, &(0x7f0000000040)) [ 70.856292] audit: type=1400 audit(1520294897.291:17): avc: denied { ioctl } for pid=6592 comm="syz-executor3" path="socket:[20180]" dev="sockfs" ino=20180 ioctlcmd=0x8983 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=sock_file permissive=1 2018/03/06 00:08:17 executing program 7: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x6, 0x800, 0x7}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000040), &(0x7f0000000100)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r0, &(0x7f0000000040)}, 0x10) 2018/03/06 00:08:17 executing program 3: r0 = socket$kcm(0x29, 0x5, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x8983, &(0x7f0000000100)) socketpair(0x3, 0x0, 0x0, &(0x7f0000000140)) 2018/03/06 00:08:17 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x10cd}, 0xfffffffffffffef6) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x7, 0x1f, 0x1, 0x1, 0x1}], {0x95}}, &(0x7f000031cff6)='syzkaller\x00', 0x5c6e, 0x412, &(0x7f00001a7f05)=""/251}, 0x48) 2018/03/06 00:08:17 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x1, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x35}, [], {0x95}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153}, 0x3e) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000200)={r0, 0x0, 0xe, 0xff, &(0x7f0000000000)="dd74dbc79bdf28df3c4ac39597fc", &(0x7f0000000100)=""/255, 0x0, 0x20}, 0x28) 2018/03/06 00:08:17 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x7, 0x1f, 0x0, 0x0, 0x0, 0x3}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 2018/03/06 00:08:17 executing program 6: socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000)=[], 0x0, &(0x7f0000298000)=[{0x18, 0x1, 0x1, "13"}], 0x18}, 0x0) 2018/03/06 00:08:17 executing program 4: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000d04000)='./file1\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000811ffa)='bdev\x00', 0x20000, &(0x7f0000000080)) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1000, 0x0) 2018/03/06 00:08:17 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x7, 0x1f, 0x0, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 2018/03/06 00:08:17 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000016000)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0xd0}], {0x95}}, &(0x7f000000bff6)='syzkaller\x00', 0x1, 0xd1, &(0x7f0000006f2f)=""/209}, 0x48) 2018/03/06 00:08:17 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x84, 0x7, 0xffffffff00000001}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000000), &(0x7f0000000100)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000080)={r0, &(0x7f0000000000), &(0x7f00000001c0)=""/129}, 0x18) 2018/03/06 00:08:17 executing program 0: socket$kcm(0x29, 0x2, 0x0) 2018/03/06 00:08:17 executing program 3: r0 = socket$kcm(0x29, 0x5, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x8983, &(0x7f0000000100)) socketpair(0x3, 0x0, 0x0, &(0x7f0000000140)) 2018/03/06 00:08:17 executing program 4: perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0xfc69, 0x402}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/03/06 00:08:17 executing program 7: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x100000000000006, 0x4, 0x4, 0x100000001}, 0x2c) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00005f1000)={r0, &(0x7f0000eed000), &(0x7f0000b88000)}, 0x20) 2018/03/06 00:08:17 executing program 1: recvmsg(0xffffffffffffffff, &(0x7f0000346fc8)={&(0x7f0000baefec)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @empty}, 0x14, &(0x7f0000000180)=[{&(0x7f00000b4000)=""/15, 0xf}, {&(0x7f0000f6afa9)=""/87, 0x57}, {&(0x7f00008e3f35)=""/203, 0xffffffffffffff91}, {&(0x7f0000cd5ffe)=""/2, 0xfffffffffffffecb}], 0x4, &(0x7f0000a01f13)=""/237, 0xed}, 0x0) r0 = getpid() r1 = perf_event_open(&(0x7f0000000380)={0x5, 0x78, 0x7fff, 0x100, 0x8001, 0x800000000000, 0x0, 0xc28a, 0x80000, 0x8, 0x9, 0x3f, 0x2fd, 0x100000000, 0xfff, 0x80, 0x200, 0x5, 0xb4, 0x2, 0x1ff, 0xc3, 0x100, 0xffffffffffffff7f, 0x5, 0xd3, 0x0, 0x8, 0x7, 0x2c6, 0x7fffffff, 0x3, 0x800, 0x1, 0xc7, 0xcc, 0x9, 0x8, 0x0, 0xffffffffffffff59, 0x1, @perf_bp={&(0x7f0000000240), 0x9}, 0x20000, 0x20, 0xa2, 0x1, 0x7f, 0xff, 0x7}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x5, 0x78, 0x4, 0x8, 0x8, 0x4, 0x0, 0x81, 0x80000, 0xa, 0x5, 0x800, 0x7, 0x10001, 0x0, 0x1, 0x7bb7, 0x10000, 0x98, 0x9, 0x9, 0x4, 0x2, 0x8, 0x5, 0x7, 0x1ff, 0x3, 0x3, 0x40, 0x2, 0x7, 0x0, 0x3, 0x8, 0xff, 0xffff, 0xffffffffffff8000, 0x0, 0x76c0, 0x6, @perf_config_ext={0x8, 0x5}, 0x1020, 0x401, 0x8000, 0x7, 0x7fff, 0xfffffffffffffffd, 0x4}, r0, 0x6, r1, 0xd) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xe, 0x2000023e, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x200003fb, 0xfb, &(0x7f0000000280)=""/251}, 0x48) 2018/03/06 00:08:17 executing program 6: socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000)=[], 0x0, &(0x7f0000298000)=[{0x18, 0x1, 0x1, "13"}], 0x18}, 0x0) 2018/03/06 00:08:17 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x401, 0xd62a, 0x1, 0xc, 0xffffffffffffffff, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xb, 0x104, 0x4, 0x7, 0x800000001, r0, 0x0, [0x115]}, 0x2c) 2018/03/06 00:08:17 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0xcf}, 0xfffffffffffffd40) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={r0, 0x50, &(0x7f0000000000)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=r1, 0x4) 2018/03/06 00:08:17 executing program 1: perf_event_open(&(0x7f0000014f88)={0x1, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000014f88)={0x1, 0x78, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x6) 2018/03/06 00:08:17 executing program 3: r0 = socket$kcm(0x29, 0x5, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x8983, &(0x7f0000000100)) socketpair(0x3, 0x0, 0x0, &(0x7f0000000140)) 2018/03/06 00:08:17 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x9, 0xb, 0x20001, 0x2}, 0x2c) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000)="a69885267a596501248ad557845faac8000f815dee04b51efa47", &(0x7f00000000c0)}, 0x20) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x7, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000090000000000000081000000181300008d0c2bd6090a30b72dc8170b59d59e5b147f4a94d8125f6b3534de78fd6467703449fcb98483d525bcf4c5cbb3e01f07bfb0ac7113936ea2ffa48e57c304982c5f4635718bdacb959d0d819e04865e57d8f523f23e96200e86b6", @ANYRES32=r0, @ANYBLOB="00000000000000009500000000000000000000ab15c6a4c6d25999ba00000000080000000000000000f7f669298bd6c1a42857bd7be7167fdd17a5a5ad8c3a84a2d22151d2fdce550aa17058bc8178a45139545fb831115f9dab09fdc0ef36f761a08fe37dddf46db5027fd4d32572e11dd4faace41132583f373c379fc204636c5d9d95779685727dfa68683ae290e0e3a2eafc8ed04fa6bfd7d97e01ac035613e55a2f17c11570e2"], &(0x7f0000000180)='GPL\x00', 0x8371, 0x6, &(0x7f00000001c0)=""/6, 0x40f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000100)={r0, &(0x7f0000000040)}, 0x10) 2018/03/06 00:08:17 executing program 6: socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000)=[], 0x0, &(0x7f0000298000)=[{0x18, 0x1, 0x1, "13"}], 0x18}, 0x0) 2018/03/06 00:08:17 executing program 4: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x83, 0xb, 0x1ff, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x3) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f00000000c0)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000140)={&(0x7f0000000080)='./file0\x00', r2}, 0x10) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x10001) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000001100)={r1, &(0x7f0000000080), &(0x7f0000000100)}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000200)={r2, 0x50, &(0x7f0000000180)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000240)=r3, 0x4) 2018/03/06 00:08:17 executing program 7: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x2, 0xa, 0x1f, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r1, &(0x7f0000000280)={&(0x7f0000000080)=@pppoe={0x18, 0x0, {0x1, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, 'bcsh0\x00'}}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000100)="6d70bc928555aa6e19dd190cec70efe963a508da8c39251272ba524cfb719f851e0d442565d59726bd6a3317455961a771167ea1c502399c4f9e7e4f02", 0x3d}, {&(0x7f0000000140)="83a91029e83b80901b1b45f9a8224de847d467aae51ab3289ad745a4db1fec7c5c3d0b9494e5ff0927d1025250efb96d3971a3eb83c368af1811c0f19337f4169bf25ea503a55eba08c4e39cda0500af389b0cc76a9ac246a02cc4c41c6189d51d17e5a205b9ab7b95e6fecb0d451f80fb4fc83e499370cdf7c91885ba15e39a9ede2a99e41e558244d09e00b65bdc78cc7f9056440634df0e843f9ce86dc8ce7065d247aa2334461e9caa4a975e7d423a", 0xb1}, {&(0x7f0000000300)="746f83583e79a3e59fb2d850804a858dd9dd5182efed795c271bb6369c761b83987ed8bcc9b5b76fed3b76f2f96bd22a583562dbf78953e36b32a928d4a5dc8d04c3b8a3c83cbf2503e79868ccb6e53b58f7c832a87c14465c95bc9e57a68595ae6e8689f15f905086400dad717a5696969e8dcea1df862fe8f25d64dbd62d0c532454dcd75a164510b4fdb764c1acd0649627a6e8c96638ea2d9d6637f8b5fbe280db986a071b7b1bf8d5e10375abf2", 0xb0}], 0x3, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x288, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) socketpair(0x1, 0x3, 0x100000001, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f00000002c0)) socketpair$inet6_icmp(0xa, 0x2, 0x3a, &(0x7f0000000680)) 2018/03/06 00:08:17 executing program 1: socketpair(0x5, 0x6, 0x100000001, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000100)={r1}) perf_event_open(&(0x7f0000000000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$inet6(0xa, 0x803, 0xff, &(0x7f0000000180)) 2018/03/06 00:08:17 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000000a000)={0x1, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, @perf_bp={&(0x7f0000496fff), 0x800000}, 0x0, 0x20000000, 0x10000000006, 0x400010}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00009f8000)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f00005f7ffb)='nfs4\x00', 0x0, &(0x7f000000a000)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) r1 = getpid() ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) perf_event_open(&(0x7f0000000040)={0x3, 0x78, 0x6, 0x6569d48e, 0xfffffffffffffff9, 0xfff, 0x0, 0x7fffffff, 0x8020, 0x1, 0x6, 0x0, 0x22, 0x1, 0x5, 0x4, 0x34d, 0x1, 0x5, 0x3c41, 0x20, 0x3, 0xfb2f, 0xa4, 0x100, 0x7fffffff, 0x80, 0x6, 0x4, 0xe4bc, 0xffffffffffffff01, 0x81, 0x7, 0xffffffff, 0x3, 0xfff, 0xfffffffffffff1d7, 0x9, 0x0, 0x4, 0x6, @perf_config_ext={0x8001, 0x8}, 0x18002, 0x1f, 0x400, 0x7, 0x1f, 0x101, 0x3}, r1, 0x7, r0, 0x1) 2018/03/06 00:08:17 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3de, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000140)=0xd156) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[], 0x0, &(0x7f0000000000)=""/251, 0xfb}, 0x0) sendmsg(r2, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000000100)="bf", 0x1}], 0x1, &(0x7f0000001180)=[]}, 0x0) recvmsg(r1, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000180)=""/88, 0x58}, {&(0x7f0000000200)=""/6, 0x6}, {&(0x7f0000000240)=""/62, 0x3e}, {&(0x7f0000000280)=""/94, 0x5e}, {&(0x7f0000000300)=""/88, 0x58}, {&(0x7f0000000380)=""/17, 0x11}, {&(0x7f0000002480)=""/4096, 0x1000}], 0x7, &(0x7f0000000440)=""/199, 0xc7, 0x6}, 0x20) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000580)=r1, 0x4) 2018/03/06 00:08:17 executing program 5: recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000009cc0)={&(0x7f0000009ac0)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x80, &(0x7f0000009c40)=[{&(0x7f0000009b40)=""/161, 0xa1}, {&(0x7f0000009c00)=""/20, 0x14}], 0x2, &(0x7f0000009c80), 0x0, 0x5}, 0x40000000) bpf$PROG_LOAD(0x5, &(0x7f0000009d00)={0x7, 0x11, &(0x7f0000000100)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffffffffffcc, 0x0, 0x0, 0x0, 0x101}, [@generic={0x401, 0xfffffffe0, 0x8, 0x4}, @jmp={0x5, 0x1ff, 0xb, 0x0, 0x5, 0x30, 0xffffffffffffffff}, @initr0={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401}, @initr0={0x18, 0x0, 0x0, 0x0, 0xc8}, @alu={0x7, 0x9, 0x9, 0x0, 0xb, 0xc, 0xffffffffffffffff}, @exit={0x95}, @generic={0xffffffff80000001, 0x9c, 0x0, 0x9ff}], {0x95}}, &(0x7f0000000040)='GPL\x00', 0x2, 0x88, &(0x7f0000000240)=""/136, 0x41000, 0x1, [], r0}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x1, 0x81, 0x7, 0xffffffff00000001}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f0000000100), &(0x7f0000001100)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000200)={r1, &(0x7f0000000100), &(0x7f00000001c0)=""/40}, 0xfffffffffffffffc) [ 71.142955] syz-executor7 uses obsolete (PF_INET,SOCK_PACKET) 2018/03/06 00:08:17 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000180)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0x25}, [], {0x95}}, &(0x7f00000000c0)='GPL\x00', 0x6, 0x376, &(0x7f0000000140)=""/153}, 0x48) r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x78, 0x3, 0x6, 0x4, 0x1, 0x0, 0xffff, 0x208, 0x3, 0x9, 0x3, 0x2, 0xf1e9, 0x2, 0x9, 0x100000001, 0xcd7b, 0x8, 0x1, 0x5, 0x101, 0x1, 0x8, 0x9, 0x401, 0x4, 0x6, 0x9, 0x7, 0x9, 0x1, 0x6, 0xba, 0x80, 0x3, 0x1ff, 0x4, 0x0, 0xffffffffffff8000, 0x1, @perf_bp={&(0x7f0000000000), 0x2}, 0x104, 0x4, 0xffffffffffffffe1, 0x3, 0x400, 0x5, 0x4}, 0x0, 0x3, 0xffffffffffffff9c, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x3f) 2018/03/06 00:08:17 executing program 7: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x9, 0x5, 0x800, 0x7}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000000), &(0x7f0000000080)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000180)="5f6e1d521d2a2ba6747123acafc05f73d801ac2b87b89d62566fb9de4ea605f1f582a802e21bf1c5a4ee289c4946cfebedccd8d5759b62882a6ef2657f90c0e3e1c777e21e4fa999628f9de7f9950ce11b0643cd7ab0da18b5cebc6e01ad16bd03b02651d4b110f896e63e7a67bc234f851033bfc09af469fdb8f5c2b1ac48dc374164e77f77f86669e9d9438fe2ab6e06dd01a31ba389be345752deb1", &(0x7f0000000d40)=""/224}, 0x332) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000380), &(0x7f0000000400)=""/138}, 0x18) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000240)) socketpair(0x1b, 0x6, 0xfffffffffffffbff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r1, &(0x7f0000000cc0)={&(0x7f0000000280)=@llc={0x1a, 0x201, 0x9, 0x6fcb, 0x5, 0x20, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x80, &(0x7f0000000980)=[{&(0x7f0000000300)="9f48287302c2aa6ddc9f233ee324cc7b9b3deff4bb7219e87deb25511367190db09fed129c9ffd07ee3446052e828c57dfdd97cb17998d54eb726f73c35ae8333b5ac19cf9300e5e0847c626203a6908cb8ad8197c45dd2a6b21a3aa4112d92416a6323d079304b902efbd55778c521e3941071def352de67e804bf8224b9d40a4d6b27f36ff3b9c2a", 0x89}, {&(0x7f00000000c0)="d702dc1c4cdce7ebcadc6667734fff85904e28c1ffc6f0a1374951ebf5bd1ff1fdcd62562dc04a", 0x27}, {&(0x7f00000004c0)="b5a1da83084351453f27b894bc786b276425d6d85b576c99cbf7a1a0be638b55b5d0a3d31690344a2603b5d3797cc60bd595d20d8ca33158ffd9f0b70f162a6124927af9676b9923342afdbfb2047e7ec33fe3d368c7b05cb9f631c2e4e78dc0f094ca7753aa5bd0cb1b0f4abad0bc30b729024e1bbf0ebdc55a5e62bc71a0dea0834f7831d308abaf95eb8bcf74b0969953ce8659f7987cac67216f1c70441d5f20f3c9253b3d8401377f7a39edc5345b599c5cefe6662eff38824f", 0xbc}, {&(0x7f0000000580)="11d92fd2d7db8c5721a80cae0dbf922da6bf96a94724728e47bce77115c64846e4dff8d0bd260d4306036b337d35fa5d02ed6f9eed0029fcf1af8869608414038c81b6b63fb674cdd854780e45c04b07606b23f801f2c2eeec00c6cb4fd5f49b6fc3bea1", 0x64}, {&(0x7f0000000600)="db02eb546ecdea9430cc46d35b5da04e96e7bdda45f30ee52d9d6144a7673c0d7e12a45c36dd77d6bf53e6e5b154dc11dc0cca82e4d3a8b653158aee44cd6aa9120337b47961f8f90d84ff1d7a8ca63aed7ad66b12e62751", 0x58}, {&(0x7f0000000680)="9324d1cfa5c0537223a6c193da43182af3e351c55c684c73784ea9fbffccb8b0fc29391500012bcb390936d1f0c0b744e447df0a8ecf69497a21a8ceb31ab828e280a775411a4814387a95194532efca77ad782ddac510d25c502a9806ec9d2af8bd5824fd3397e2010b16cfa551210ae2dd10072ec66dd46a273dd53c49bfd3777e324cc95822cda733c2618d772b46409314bb6f42a6312250e1ca2c7e02532550a050df7f730ee70e4b630bf3aca71aa5c2fa3e", 0xb5}, {&(0x7f0000000740)="03daee318a19c77c1b97233ac2d1ef4e1c770b0206f3d4d5cfd4aa95935cfa2c6f1071bf8c0b3821800f9b868cd7e5552d520aaa9d68642fbe3cee131ba6c6017e9d02ac1a01b65c99dab5ed1e5fbdcb22c5fd6fc7baa1cd23c069baa4dd326484cb2280b14ae959438c1775ccbfc3d4e597ad78a6bbb1d0362fc0691de969c8dc27f3006794d4a74505d4dbaa81e17ac419453db8186eeb75599aa9a9c4", 0x9e}, {&(0x7f0000000800)="57d2fed4f47b02a490a81830c7a50b98187d0ce51523d6604dc0921027ab572b2f5fad72373ec1c2652742fe03d05401ab586c5fbc5075378407d2d7cfa9b83f88fca76b44b16adc3c1f7066ec96fc99c8da2efeee8abfaba812bcfae875520dbacace80602a543a908613757f204b5aa5064521aec013247e0806c127c3fbec3fcb0075638b07d862508b61d549d0c705c48880044c574081eb3394877e9ad3422d18d5f9725c009e81fb8fff7381c9edd30bcf97af3283a36c36138d6df5a488fc0af17dade73e2e6768d0f7b15b4509e10100f7870a3d3f", 0xd9}, {&(0x7f00000003c0)="6c52de9bd09e687c81215d0ec75a24738dd3c6fb6c0091a154f960a159a7627f6081e46f5c512f2c2c650a75237f9a2b6a4f6917d0fdfe9391ae37942d", 0x3d}, {&(0x7f0000000900)="f9dd8d30f17e11672707e5e2dc875d77faa71128d6226439957f63f8f606a6ac064c8cd33a9e7bcc013a12d7099e1905ae4819e9f2cd770291c0b077a13453e9989d40b1a7cff61805c705da28e9a3656be1f81c0d350fc6e19e25b24b5e1c6e971aa4468e1fc4cd431b5ef87fe69bfc3b538b", 0x73}], 0xa, &(0x7f0000000a40)=[{0x60, 0x111, 0x8, "18f66546d118ef02ea55a553ac834eaa65d28c847307f1a8bb50797ce1ed1e041a4344f5cd151285a3db0496e95e2b4d1bc6a6f8e47cbb111c94ff11e45283b713d9fdfb2cf1decb567ba08d0b"}, {0x98, 0x11f, 0x8, "8ccc0449388e3399c77909033dbc56afbd3b335c509dc03fb091214e9ef4e706d899e3e854cf4781ce9c9b207e44db9891d8b9afe9c69d5104d716bfdfcec296b312b61de017907af1b34a5739fc1338a03c0b7b88b1ce6e4dfeb7c109b95380c27ff7b4ae580c77c34a9f75d7863cb21b31dc6c1a60434c4ac04d02fe1aebdb3b76aa367592"}, {0x98, 0x115, 0x7f, "5f6c9bebf9473978312c006bd32f04ee6ed40afd43bf6fc43aded1146db6f36d885c51ddcdb1b8dc195493dd6c2ff6bc22cd75f9c615ac738ad1daa63627af8b2eb9c4161970b78be9fdb356fd82aa562188cdbcdf69fadc1c09629cec2ae5079e3bd344fdb9e38fdefba4da62702a76806f3648de0b75f63a7e0b8c46862a4effd83702b563"}, {0xf0, 0x10a, 0x100, "0ab5e3398e2b3f1ca1cf4507014cb84b81a3c7d77d9d2076cbe6d5d100f61b3ba43821a33f9241012bd05e0d372aaab4de8ce7f244ebac325db591479e8bdc0a963dca9e2de4ee6fc3c8a44119221efec12347c148320785bdd1dfb3a5d64aa89035ca5b27740ae3fdc76298eda4dd87bb6272ab76293d9c11d4ec1a5e8dacf96e2597c306796c3fd7757249099db6eef4ef11367156fb8e49b5a20add06269d03849ca8d0e1e0596e0556d35c2703c59206fb24725528f68cf195441d22485e0aa4393585ce045babd6e41ea69275144da2a8fc6d6a7f0c3c543a43db"}], 0x280, 0x4000}, 0x10) 2018/03/06 00:08:17 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x10, 0x4, 0x4, 0x100000001}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r0, &(0x7f0000000040), &(0x7f0000000080), 0x1}, 0x20) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000003c0)=@pppol2tpv3in6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @dev}}}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)=""/101, 0x65}], 0x1, &(0x7f0000000500)=""/184, 0xb8, 0x8}, 0x40010000) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000940)={0xffffffffffffffff}) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000040)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={r0, 0x28, &(0x7f00000000c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={r3, 0x6c5, 0x18}, 0xc) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000080)={r1}) r4 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000980)=0xffffffff, 0x4) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f00000009c0)={r2, r4}) 2018/03/06 00:08:17 executing program 6: mkdir(&(0x7f0000024000)='./file0\x00', 0x0) mount(&(0x7f0000018000)='./file0\x00', &(0x7f000001c000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x1, &(0x7f000000a000)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f000013b000)={0x0}) sendmsg(r0, &(0x7f0000b5bfc8)={&(0x7f00009c3ff6)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000042000)=[], 0x0, &(0x7f0000641a38)=[]}, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='tmpfs\x00', 0x200080, &(0x7f00000000c0)="c34e74473cbb02acf6d07165d1ee058b883494b9a5e99826b0ba13a80c9d76bdd6ebeb1d266182cf5d88a4cc8e2c9a030abe56f0f71b8c411e") 2018/03/06 00:08:17 executing program 5: socketpair(0x1, 0x3, 0x0, &(0x7f0000000000)={0x0}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000040)="1226db691d0cb998e6407d45ffd285ad7a1734e2", &(0x7f0000000100)=""/4096}, 0x18) sendmsg$kcm(r0, &(0x7f0000002780)={0x0, 0x0, &(0x7f0000002400)=[], 0x0, &(0x7f0000000040)=[{0x18, 0x1, 0x1, "a0"}], 0x18}, 0x0) 2018/03/06 00:08:17 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x1, 0x7f, 0xa, 0x5, 0x4}, 0x29b) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) socketpair$inet(0x2, 0x1, 0x7, &(0x7f0000000040)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r0, &(0x7f00000001c0)='*v', &(0x7f00000002c0)=""/209}, 0x18) 2018/03/06 00:08:17 executing program 7: socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000040)) socketpair$inet6(0xa, 0x2, 0x4007, &(0x7f00000001c0)) sendmsg(0xffffffffffffffff, &(0x7f00000016c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000180)="cf77", 0x2}], 0x1, &(0x7f00000002c0)=[]}, 0x0) mkdir(&(0x7f0000000180)='.', 0x0) r0 = perf_event_open(&(0x7f00000000c0)={0x7, 0x78, 0x7, 0x2, 0x80, 0x2, 0x0, 0x2, 0x20000, 0xc, 0x7fffffff, 0xff, 0x49, 0x5e2, 0x100000001, 0x3, 0x6, 0x988e, 0x6, 0x539, 0x6, 0x0, 0x2, 0x7, 0x100000001, 0x3f, 0x0, 0xfff, 0x0, 0x0, 0x1, 0x2, 0x7, 0xfffffffffffffffd, 0x9, 0x401, 0x200, 0x7, 0x0, 0x3f, 0x3, @perf_bp={&(0x7f0000000080)}, 0x20004, 0xf11, 0xfffffffffffffffa, 0x1, 0x5, 0x2, 0xfff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x6) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) 2018/03/06 00:08:17 executing program 0: mkdir(&(0x7f0000ac6000)='./file0\x00', 0x0) r0 = socket$kcm(0x29, 0x7, 0x0) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)={&(0x7f0000000080)='./file0/file0\x00', 0x0, 0x8}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000040)='./file0\x00', r1}, 0x10) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000580)={0xffffffffffffffff}) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x4, 0x7, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0xffff}, [@call={0x85, 0x0, 0x0, 0x18}, @generic={0x101, 0x5, 0x100000001, 0x80000001}], {0x95}}, &(0x7f0000000600)='GPL\x00', 0x7f, 0x3, &(0x7f0000000640)=""/3, 0x41100, 0x1}, 0x48) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000700)={r2, r3}) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='tracefs\x00', 0x0, &(0x7f0000000300)) mkdir(&(0x7f0000000000)='./file0/file0\x00', 0x0) 2018/03/06 00:08:17 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c, 0x5ccee620}, 0x2c) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffff, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={r0, 0x50, &(0x7f0000000240)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={r0, 0x50, &(0x7f0000000380)}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0xc, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180009030000000000000095100000000094000000aaa63e26a5a729efc3b83723b4be71d1522c76f9221f0550629c395aa465327fe96cd71b58091b4468248fdd394bde1393048e4515b7d38d2ded13211dba802d814d4039a6203945fc9420c53d4491af96c87e50ed1171907c126200"], &(0x7f0000000080)='syzkaller\x00', 0x9, 0xc3, &(0x7f00000000c0)=""/195}, 0x48) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000440)={r1, r1, 0x1, 0x1}, 0x10) [ 71.272811] tmpfs: No value for mount option 'ÃNtG<»¬öÐqeÑ4”¹¥é˜&°º¨ v½Öëë&a‚Ï]ˆ¤ÌŽ' 2018/03/06 00:08:17 executing program 5: r0 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000300)={&(0x7f0000000040)='..', 0x0, 0x10}, 0x10) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000380)={r0, 0x3, 0x0, 0x4, &(0x7f0000000340)=[0x0], 0x1}, 0x20) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001840)={&(0x7f0000000140)=@pptp={0x0, 0x0, {0x0, @broadcast}}, 0x80, &(0x7f00000002c0)=[{&(0x7f00000000c0)=""/46, 0x2e}, {&(0x7f0000000100)=""/64, 0x40}, {&(0x7f00000001c0)=""/195, 0xc3}], 0x3, &(0x7f00000017c0)=""/101, 0x65, 0x400}, 0x4000000060) mount(&(0x7f00000019c0)='..', &(0x7f0000145ffe)='..', &(0x7f0000c31000)="e8653fdd4c4eb6", 0x9000, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x3f) 2018/03/06 00:08:17 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x6}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={r0, &(0x7f0000000040)="47e07ad083ddc924fb6a1d29215dac7844ad84d040082249496e4bebb08bfd52dba01df682c2ba906ea7b70fbe3969a485e5ab7ff481518ef659efcf0bcae595dec18d83dbcb06906866f3c7072fd080c2fc6c7f68d9fe9329ee79d0b59ab3ba9725a8451fab6974a7ed6238783ed333e6ee61630256e1c6c1d6930d0054a92df8a4da5d520fff9baf47eb40a81d08e7d78d2c13c0e5a91c52b6f67a1f5463c4dc21f127c4f615c4cdae0e00acd032b21ee69b4dd0fe699558b270546869f05b", &(0x7f0000000100)=""/218}, 0xffffffffffffff37) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x5, &(0x7f00000002c0)=@framed={{0x18}, [@alu={0x201a7ffa, 0x0, 0x201a7fd7, 0xa, 0x0, 0xffffffc0}], {0x95}}, &(0x7f0000000000)='GPL\x00', 0x6, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000280)={r0, &(0x7f0000000240)="536b28139073f2f95fe87b8a24988579f5e597a07e"}, 0x10) 2018/03/06 00:08:17 executing program 1: perf_event_open(&(0x7f0000940000)={0x2, 0x78, 0xd68, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='rootfs\x00', 0x1000, &(0x7f00000002c0)) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xf, 0x14, &(0x7f00000002c0)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1}, @alu={0x7, 0x0, 0xb, 0xf, 0xa, 0xfffffff4, 0xffffffffffffffff}, @exit={0x95}, @generic={0x1, 0x7, 0x6, 0x10001}, @ldst={0x0, 0x3, 0x7, 0x0, 0x0, 0x30, 0x4}, @call={0x85, 0x0, 0x0, 0x7}, @alu={0x7, 0x4, 0xa, 0x9, 0x3, 0x0, 0xfffffffffffffff8}, @jmp={0x5, 0xdb74, 0xf, 0x4, 0xb, 0x6}, @exit={0x95}, @exit={0x95}], &(0x7f0000000180)='syzkaller\x00', 0x1, 0xa0, &(0x7f0000000380)=""/160, 0x41100}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000001c0)={&(0x7f0000000140)='./file1\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='nsfs\x00', 0x20, &(0x7f0000000140)) [ 71.320780] tmpfs: No value for mount option 'ÃNtG<»¬öÐqeÑ4”¹¥é˜&°º¨ v½Öëë&a‚Ï]ˆ¤ÌŽ' 2018/03/06 00:08:17 executing program 3: perf_event_open(&(0x7f0000940000)={0x2, 0x78, 0xd68, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='rootfs\x00', 0x1000, &(0x7f00000002c0)) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xf, 0x14, &(0x7f00000002c0)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1}, @alu={0x7, 0x0, 0xb, 0xf, 0xa, 0xfffffff4, 0xffffffffffffffff}, @exit={0x95}, @generic={0x1, 0x7, 0x6, 0x10001}, @ldst={0x0, 0x3, 0x7, 0x0, 0x0, 0x30, 0x4}, @call={0x85, 0x0, 0x0, 0x7}, @alu={0x7, 0x4, 0xa, 0x9, 0x3, 0x0, 0xfffffffffffffff8}, @jmp={0x5, 0xdb74, 0xf, 0x4, 0xb, 0x6}, @exit={0x95}, @exit={0x95}], &(0x7f0000000180)='syzkaller\x00', 0x1, 0xa0, &(0x7f0000000380)=""/160, 0x41100}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000001c0)={&(0x7f0000000140)='./file1\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='nsfs\x00', 0x20, &(0x7f0000000140)) 2018/03/06 00:08:17 executing program 6: socketpair(0x29, 0x5, 0xfffffffffffffffd, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x5) 2018/03/06 00:08:17 executing program 4: close(0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0xe, 0x1, &(0x7f0000000000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0x25}, [], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x10000, 0x99, &(0x7f0000001f00)=""/153}, 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0xb, 0xf12, 0xfff, 0xaed3, 0xa, 0xffffffffffffff9c, 0x3}, 0x2c) recvmsg(0xffffffffffffffff, &(0x7f0000001700)={&(0x7f0000000340)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000001600)=[{&(0x7f00000003c0)=""/86, 0x56}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/105, 0x69}, {&(0x7f00000014c0)=""/96, 0x60}, {&(0x7f0000001540)=""/145, 0x91}], 0x5, &(0x7f0000001680)=""/123, 0x7b}, 0x10000) bpf$PROG_LOAD(0x5, &(0x7f0000001740)={0xd, 0x13, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x6}, [@generic={0x0, 0x6, 0x8, 0x4}, @ldst={0x1, 0xaebdb49d311457a8, 0x6, 0x0, 0x0, 0x100, 0xfffffffffffffffc}, @map={0x18, 0x7, 0x1, 0x0, r0}, @map={0x18, 0xf, 0x1, 0x0, r0}, @initr0={0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x98}, @jmp={0x5, 0x7, 0xd, 0x7, 0x2, 0x3c, 0xffffffffffffffff}, @alu={0x7, 0xff, 0xf, 0x7, 0x7, 0x30, 0x10}, @initr0={0x18, 0x0, 0x0, 0x0, 0x4788, 0x0, 0x0, 0x0, 0x4}], {0x95}}, &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x10, &(0x7f00000001c0)=""/16, 0x41f00, 0x1, [], r1}, 0x48) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000240)={r0, &(0x7f0000000140)="f8d57f4e1c61d3786f69a46a2ac6432e073e36a83ff536532eaa8bc17e51735916313e9f0192ae451929c939aa0506a573244a2b50da8a28d354b66c0aea8a9d9be9ec6e0745a349a5d0d2462163e72a3859b42187", &(0x7f00000001c0), 0x2}, 0x20) 2018/03/06 00:08:17 executing program 7: mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000401, 0xfffffffffffffffd, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x10, 0x80001, 0x6, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="9ceba8ff2442c5441368342956e4bcae517e58d6f5d0cfb7eba4b28589ac6065a3e6916826f9192c4deb5351579e2b1484621cc7f8d37763b95bab2de4b73a17cc5a50de3e19215d849f20878f273b3b1481fc3fd14000d994dd51b2c59ff82b9d9dac0f3a1a871e481e0b49f593eaec067c7f803647a79059495a96ece9b1ba7b1cf3a9998cab95c572a1832caa6eaff83861565a230844896ae0701b31ebc3b2e7e7caeae97d3f9bf55e92b241d90b219d6605ce489d1af0cc9f6a1bea319b751e145cbf0f8b61f08bbb6a1be2916a334eac8aa5e548345a02be806bd8f2460701b64cdeb38faa59036463", 0xec}], 0x1, &(0x7f0000000180)=[{0xe8, 0x102, 0x0, "48f7794a2f5e2075f2a71eb99e035aaebf5809fd3e09424d65e46665a7a87728c095abb391bf763f927e79d56495b29d95a779aab43f3fee8dd65302b19ceab9bc4825db2c61efa9b80ca034a8aaef16765f071db0bcfa5622bbe840591cbd6719db4ffc59f99c0a279d4429b8d4839c53e05d34653cdc1b905ab169e061669ae535750785eeb0364dc1e837f2897dafe4105b879d5fe0095c4af9e835c8b3c5f809217a1021046880f358bbfc5143c263ed384d6477812a9a4625d8bb821d44ce720e75551a171de7973c541dec7bc01ffea59b"}, {0x88, 0x11b, 0x4, "b9f7c0a63db5feb224fb101aa7237d2c6b02ed7a4a3e5b36f4f3ef5784e3a5cdc975d52cf40b48bab098e0a3cdecbc85ba580c2a53cf797a1f9ba09af47be57a9f6b7ef6f03553746cc957dff671ac4cf080100e398be0ebdab88b96ff36158ea5ee2b9a625b8ddc13d74dbc186c7378aae7ca"}, {0x100, 0x10e, 0x3, "c9f16a8d8b93aa8efd08dd58e6f20e64e7659ce2027b821079533eb64b5ca5f61a1e89a33b87f893e2be119d41be77ec1a90d97a92e8d189c65e2419c4bab0ddb02fc601e16840bc896b5599f8d6b69bd7264fea114a9729a909385d407d02ef988d3d511d56403feb130470acc837f33412d60a3b8ded7e586be80404236417bd8b65930b1a69593b882324f87ddbe4e05897a6097e69612a69606d621c33727001468671f46dcdeb657046f9a7dbd6216fcd230d656b33bea74c22c5d13646a99c34599fab25ac946fbaab1694bab5f6b48b70dc90f63a610b17e5dfa017046a9c57f4814b83cf8e"}, {0x110, 0x18f, 0x4, "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"}, {0xc0, 0x11f, 0x8, "b41a0d2be79a473598d92d160995d2ba9ea0cdccb4e48de4486c400da2e96d47eb83cbdb8cde207bb7f416aa50e5b7ddcd45b3a660c18324a436d560d5b1703e7615647d64fdd5fe11d778d52be6112e257b01bf18b410d5195d86ba23d5f0e8ab7023cf6d664a9e4d9dca18a75c91d6e63285fd12e7c159f29e2ad4dc4a31104b619d909633b6c531de78f49431ad100c59c1fac852285fe0d902a3bccbd048ea7db8d9ff5c4b35610437de"}], 0x440, 0x4008004}, 0x4040000) mount(&(0x7f0000dba000)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) [ 71.368944] EXT4-fs (sda1): Unrecognized mount option "./file1" or missing value 2018/03/06 00:08:17 executing program 0: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000140)={0xffffffffffffffff}) sendmsg$kcm(r0, &(0x7f0000000280)={&(0x7f0000000180)=@ethernet={0x306, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000300)="a0266067fc1f2df8aafd36b51e116b40682c9f43cc7e936a8762b688c3856a6f9b6fe1fb2ab950d73cc2186b00f2bbc3b8e6afc589f9aa6744581f06eb7776dfe9fe90780f513091ef26dd11db67ece18b602d5ca4fd025c56db0deb352d5c5c7fcc792e7f9d6d9a24341ed0194b5ff7d247f5c0e2a7f9df09780ef738d160b7d117606cc1e1f2795e29fc53b56a78008fa74eefc65d35e01f5044b4954e1dc7617cf4aa08e61140095cb845385bce3f47431eaa8f7621f45804f4e13e7fdd467334e4840f3da129e6abfa8fc1390989378f58433c95a9492274c2e8268479b92dcd15fd657a", 0xe6}, {&(0x7f0000000400)="e2696e21d111ae1099b143fbc03166db0aa089fce36d9dd6a340b827c41953a24f2c7a06a0a253b8b515c5e0eb266ae3628c0ec3b63db6977ac6b50189268a09d6bc08e2acf1fe495fe540de1e4b01287eee623dc13648a7e04a9edfa8c8befb804e2af445ec1ed072a65ee9bfd69324253dba561ed65877be7c28046f9b1bed1f136f59b4e37fc9ae1d2002d385b442e4b92e2d8e3d85b88e117681b2bf828d5948d4e3abe59f30cdc48dd331a9df9b35d1a1555e6c13864257635638ca229ccc", 0xc1}], 0x2, &(0x7f0000000240)=[], 0x0, 0x8000}, 0x4) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)=',') bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000001700)=0xff, 0x4) sendmsg$kcm(r0, &(0x7f0000001680)={&(0x7f0000000500)=@nfc={0x27, 0x1, 0x0, 0x7}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000580)="a889a1f700bc69b310a9fe64f3d2e5b8c98c5b37c1acc83fe2e7daf1b73152996ae0ba0471fc7b3ade35df42ee5d40245187e50a9fa986a2a7ec3d6fdb361fc3c54fa9b89f5d0a8d9f4204391084eb242a1b04ed35fc77ea5da706ba9108d6b3e5362bd7", 0x64}], 0x1, &(0x7f0000000600)=[{0x1010, 0x10c, 0x0, "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"}, {0x70, 0x1, 0x7, "d273ddf1d9876f9189aa15192f2b2943fe036c232124e4b3041c18abe4b16b6ec664ed8335d63bb13d1fb2407134f32de4c0c130caa471426d3a8c6a53df72222ef12c3cca90c5e8169a5b1334619b6dbd4c49a77940ae7d5d"}], 0x1080}, 0x40000) socketpair$packet(0x11, 0x3, 0x300, &(0x7f0000000000)) 2018/03/06 00:08:17 executing program 2: r0 = socket$kcm(0x29, 0x5, 0x0) r1 = getpid() perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r1, 0x0, 0xffffffffffffffff, 0x0) recvmsg(r0, &(0x7f0000000200)={&(0x7f0000000180)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/159, 0x9f}, {&(0x7f00000004c0)=""/4096, 0x1000}, {&(0x7f00000014c0)=""/245, 0xf5}], 0x3, 0x0, 0x0, 0x7}, 0x40000002) recvmsg$kcm(r0, &(0x7f00000003c0)={&(0x7f0000000080)=@nl=@unspec, 0x80, &(0x7f0000000380)=[{&(0x7f0000000280)=""/113, 0x71}], 0x1}, 0x103) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) recvmsg(r2, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000005040)=[], 0x0, &(0x7f0000005100)=""/93, 0x5d}, 0x0) sendmsg(r3, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="e9", 0x1}], 0x1, &(0x7f0000000180)=[]}, 0x0) 2018/03/06 00:08:17 executing program 1: perf_event_open(&(0x7f0000940000)={0x2, 0x78, 0xd68, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='rootfs\x00', 0x1000, &(0x7f00000002c0)) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xf, 0x14, &(0x7f00000002c0)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1}, @alu={0x7, 0x0, 0xb, 0xf, 0xa, 0xfffffff4, 0xffffffffffffffff}, @exit={0x95}, @generic={0x1, 0x7, 0x6, 0x10001}, @ldst={0x0, 0x3, 0x7, 0x0, 0x0, 0x30, 0x4}, @call={0x85, 0x0, 0x0, 0x7}, @alu={0x7, 0x4, 0xa, 0x9, 0x3, 0x0, 0xfffffffffffffff8}, @jmp={0x5, 0xdb74, 0xf, 0x4, 0xb, 0x6}, @exit={0x95}, @exit={0x95}], &(0x7f0000000180)='syzkaller\x00', 0x1, 0xa0, &(0x7f0000000380)=""/160, 0x41100}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000001c0)={&(0x7f0000000140)='./file1\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='nsfs\x00', 0x20, &(0x7f0000000140)) 2018/03/06 00:08:17 executing program 5: socketpair$inet(0x2, 0x4, 0xfffffffffffff000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000003280)={&(0x7f0000002e40)=@hci={0x0, 0x0}, 0x80, &(0x7f0000003200)=[{&(0x7f0000002ec0)=""/67, 0x43}, {&(0x7f0000002f40)=""/142, 0x8e}, {&(0x7f0000003000)=""/112, 0x70}, {&(0x7f0000003080)=""/180, 0xb4}, {&(0x7f0000003140)=""/174, 0xae}], 0x5, 0x0, 0x0, 0x5}, 0x103) bpf$PROG_LOAD(0x5, &(0x7f00000032c0)={0x0, 0xf, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x9959}, [@ldst={0x0, 0x0, 0x1, 0x5, 0xd, 0x0, 0x8}, @jmp={0x5, 0x1000, 0xf, 0xe, 0x4, 0xfffffffe}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x10000}, @ldst={0x1, 0x3, 0x6, 0x2, 0x7, 0x18, 0x14}, @ldst={0x3, 0x3, 0x0, 0xf, 0x2, 0x1c, 0x1c}, @ldst={0x3, 0x3, 0x3, 0x5, 0xd, 0xffffffff, 0xfffffffffffffffc}], {0x95}}, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xe5, &(0x7f0000000140)=""/229, 0x40f00, 0x1, [], r1}, 0x48) perf_event_open(&(0x7f0000014f88)={0x1, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000014f88)={0x1, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000240)=0x5, 0x4) close(r2) 2018/03/06 00:08:17 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x3, 0x7e, 0x2, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffff9c, 0x50, &(0x7f0000000280)={0x0, 0x0}}, 0x10) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)=r1, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r2, 0x0, 0xcf, 0x47, &(0x7f0000000340)="a7af9fcff0d5dbed8ef33b8edc009ba98146eb7927b1e31d956ac65b4d7792f21c14b81036b1d57e9e20feefa7d01c68e591c74b0f536778e38943f1a46ef64058b1dbc9974c1bb7fc8e494601304ae1e3e3c57eef1a2ae0e7dbd745252f5260518530e95c62bf26fd72b133d3c0cac0845a48d504be3c49ebba4af0dde3acae7d1746f7889efd75732b4f00a6795d6657c09d60748bfcab3f15a6f15a55373992175578226aa21ea5d7e9d3799c79fd09b2bc3a120ae355497cd96f41392faa5507b728858f5e5b744843a44d5a90", &(0x7f0000000500)=""/71, 0x69dd}, 0x28) socketpair(0x2, 0x80001, 0x3, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_DISABLE(r3, 0x2401, 0x100000001) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file0/file0\x00', &(0x7f0000000240)='tmpfs\x00', 0x0, 0x0) 2018/03/06 00:08:17 executing program 1: perf_event_open(&(0x7f0000940000)={0x2, 0x78, 0xd68, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='rootfs\x00', 0x1000, &(0x7f00000002c0)) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xf, 0x14, &(0x7f00000002c0)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1}, @alu={0x7, 0x0, 0xb, 0xf, 0xa, 0xfffffff4, 0xffffffffffffffff}, @exit={0x95}, @generic={0x1, 0x7, 0x6, 0x10001}, @ldst={0x0, 0x3, 0x7, 0x0, 0x0, 0x30, 0x4}, @call={0x85, 0x0, 0x0, 0x7}, @alu={0x7, 0x4, 0xa, 0x9, 0x3, 0x0, 0xfffffffffffffff8}, @jmp={0x5, 0xdb74, 0xf, 0x4, 0xb, 0x6}, @exit={0x95}, @exit={0x95}], &(0x7f0000000180)='syzkaller\x00', 0x1, 0xa0, &(0x7f0000000380)=""/160, 0x41100}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000001c0)={&(0x7f0000000140)='./file1\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='nsfs\x00', 0x20, &(0x7f0000000140)) [ 71.465476] EXT4-fs (sda1): Unrecognized mount option "./file1" or missing value [ 71.479407] rpcbind: RPC call returned error 22 [ 71.494422] EXT4-fs (sda1): Unrecognized mount option "./file1" or missing value [ 71.502324] rpcbind: RPC call returned error 22 [ 71.550196] EXT4-fs (sda1): Unrecognized mount option "./file1" or missing value [ 72.563923] IPVS: ftp: loaded support on port[0] = 21 2018/03/06 00:08:19 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000)=[], 0x0, &(0x7f0000298000)=[]}, 0x0) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000000)) recvmsg(r0, &(0x7f00000004c0)={&(0x7f0000000080)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @local}}}, 0x32, &(0x7f0000000540)=[]}, 0x0) close(r1) sendmsg$kcm(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="83aeecf2ebcece16b9c51ecc8aafe4dab68200db2697f4949387a2897a9dd4f2de2d32f6936d0a688a0bf2604bd48774a48980", 0x33}, {&(0x7f0000000100)="de77407f0f578545cdbab69e98c0750b18e5", 0x12}], 0x2, &(0x7f0000000180)=[{0x90, 0x10d, 0x4, "7350571428a4e428cced1274c233e757c31fa9ef6c4a3bd9a62945f84783ccb3e3aff13db829836ffff69fb86cd7942aabcffb06859090e86c5111c08a4ebfb9013cccaaa1049a739a7a085881bd687a565134a66c8247238e425878eb30177e936826798d04f840169bf77a3385a4a53577de9f6073854cb06d42c976"}, {0x98, 0x113, 0x3, "b875a4ef1ccdf56573c984ddce55714f36cfeb7c7b01634ffe4e4e5a685ff28e6441db8bb9adafb825ec88baf4f8b4c54fae9c31d17e3a2921113d161ea9a0e1987282f7b9ce65541deac8949e3a37dd2c725cc1be37d908668baab5f58569b42ce89cdcc9228701433a3cd98a79de62a61afc216fa2e2baf08044cd287d0e552e8e99e621"}], 0x128, 0x40}, 0x40) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x8}, 0x10) 2018/03/06 00:08:19 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x3, 0x4, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040)=0xffffffff, 0x4) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) bpf$PROG_LOAD(0x5, &(0x7f00000011c0)={0xc, 0x5, &(0x7f0000000000)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95}}, &(0x7f0000000180)='GPL\x00', 0xbeeb, 0x1000, &(0x7f00000001c0)=""/4096, 0x0, 0x1}, 0x48) 2018/03/06 00:08:19 executing program 7: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000fc7000)={0x5, 0xa, 0x4000000000080, 0x2}, 0x14) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r0, &(0x7f00000001c0)="9363173300c668afc89edffecc4b71ddc28c6e74ca16c9292410e2f78c490a2ca53a45ecacd1589731c4d1fe609d50cd205813622bc06e6e3ab6653cb1327e30d500a2f75aadf2acb9198540e98ee769fa691074c0a6ca2c5a4ac57961249e39fadd26f6045674de247b7a053c98f6055a570b1b14ec3cac5e18c883350625565585f01743b39b16767507f47cdfe5164b841321eb5fc959efc7dc15d382dde0758d0cf342f02109358f0ccc9b74b1755c18f63e23373956797e59bba04bb140a3bc74a42f8c1c574a2e633fd8b830b6f149f0", &(0x7f00000000c0)=""/145}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000fc5000), &(0x7f0000950000)}, 0x20) r1 = gettid() perf_event_open(&(0x7f0000000300)={0x2, 0x78, 0x1f, 0x4, 0x16, 0x7, 0x0, 0x9, 0x8000, 0x6, 0x9cb6, 0x20, 0x1, 0x1f, 0xa4ba, 0x9, 0x4, 0x401, 0x49, 0x1f, 0x1f, 0x100, 0x100000001, 0x4, 0x4, 0x9b, 0x1, 0x7, 0x2, 0x8, 0x8, 0x7fff, 0xffff, 0x7, 0x3ff, 0xc0b, 0x1146, 0x1, 0x0, 0x7, 0x5, @perf_config_ext={0x10001, 0x6}, 0x8, 0x3, 0x3, 0x7, 0xb1a, 0x7fffffff, 0x5}, r1, 0x1, r0, 0x4) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000180)={r0, &(0x7f0000000100), &(0x7f0000000000)=""/148}, 0x18) 2018/03/06 00:08:19 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x1ff, 0x379c, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f00000000c0)) 2018/03/06 00:08:19 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x3, 0x7e, 0x2, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffff9c, 0x50, &(0x7f0000000280)={0x0, 0x0}}, 0x10) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)=r1, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r2, 0x0, 0xcf, 0x47, &(0x7f0000000340)="a7af9fcff0d5dbed8ef33b8edc009ba98146eb7927b1e31d956ac65b4d7792f21c14b81036b1d57e9e20feefa7d01c68e591c74b0f536778e38943f1a46ef64058b1dbc9974c1bb7fc8e494601304ae1e3e3c57eef1a2ae0e7dbd745252f5260518530e95c62bf26fd72b133d3c0cac0845a48d504be3c49ebba4af0dde3acae7d1746f7889efd75732b4f00a6795d6657c09d60748bfcab3f15a6f15a55373992175578226aa21ea5d7e9d3799c79fd09b2bc3a120ae355497cd96f41392faa5507b728858f5e5b744843a44d5a90", &(0x7f0000000500)=""/71, 0x69dd}, 0x28) socketpair(0x2, 0x80001, 0x3, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_DISABLE(r3, 0x2401, 0x100000001) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file0/file0\x00', &(0x7f0000000240)='tmpfs\x00', 0x0, 0x0) 2018/03/06 00:08:19 executing program 1: perf_event_open(&(0x7f0000940000)={0x2, 0x78, 0xd68, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='rootfs\x00', 0x1000, &(0x7f00000002c0)) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xf, 0x14, &(0x7f00000002c0)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1}, @alu={0x7, 0x0, 0xb, 0xf, 0xa, 0xfffffff4, 0xffffffffffffffff}, @exit={0x95}, @generic={0x1, 0x7, 0x6, 0x10001}, @ldst={0x0, 0x3, 0x7, 0x0, 0x0, 0x30, 0x4}, @call={0x85, 0x0, 0x0, 0x7}, @alu={0x7, 0x4, 0xa, 0x9, 0x3, 0x0, 0xfffffffffffffff8}, @jmp={0x5, 0xdb74, 0xf, 0x4, 0xb, 0x6}, @exit={0x95}, @exit={0x95}], &(0x7f0000000180)='syzkaller\x00', 0x1, 0xa0, &(0x7f0000000380)=""/160, 0x41100}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000001c0)={&(0x7f0000000140)='./file1\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='nsfs\x00', 0x20, &(0x7f0000000140)) 2018/03/06 00:08:19 executing program 0: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000140)={0xffffffffffffffff}) sendmsg$kcm(r0, &(0x7f0000000280)={&(0x7f0000000180)=@ethernet={0x306, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000300)="a0266067fc1f2df8aafd36b51e116b40682c9f43cc7e936a8762b688c3856a6f9b6fe1fb2ab950d73cc2186b00f2bbc3b8e6afc589f9aa6744581f06eb7776dfe9fe90780f513091ef26dd11db67ece18b602d5ca4fd025c56db0deb352d5c5c7fcc792e7f9d6d9a24341ed0194b5ff7d247f5c0e2a7f9df09780ef738d160b7d117606cc1e1f2795e29fc53b56a78008fa74eefc65d35e01f5044b4954e1dc7617cf4aa08e61140095cb845385bce3f47431eaa8f7621f45804f4e13e7fdd467334e4840f3da129e6abfa8fc1390989378f58433c95a9492274c2e8268479b92dcd15fd657a", 0xe6}, {&(0x7f0000000400)="e2696e21d111ae1099b143fbc03166db0aa089fce36d9dd6a340b827c41953a24f2c7a06a0a253b8b515c5e0eb266ae3628c0ec3b63db6977ac6b50189268a09d6bc08e2acf1fe495fe540de1e4b01287eee623dc13648a7e04a9edfa8c8befb804e2af445ec1ed072a65ee9bfd69324253dba561ed65877be7c28046f9b1bed1f136f59b4e37fc9ae1d2002d385b442e4b92e2d8e3d85b88e117681b2bf828d5948d4e3abe59f30cdc48dd331a9df9b35d1a1555e6c13864257635638ca229ccc", 0xc1}], 0x2, &(0x7f0000000240)=[], 0x0, 0x8000}, 0x4) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)=',') bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000001700)=0xff, 0x4) sendmsg$kcm(r0, &(0x7f0000001680)={&(0x7f0000000500)=@nfc={0x27, 0x1, 0x0, 0x7}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000580)="a889a1f700bc69b310a9fe64f3d2e5b8c98c5b37c1acc83fe2e7daf1b73152996ae0ba0471fc7b3ade35df42ee5d40245187e50a9fa986a2a7ec3d6fdb361fc3c54fa9b89f5d0a8d9f4204391084eb242a1b04ed35fc77ea5da706ba9108d6b3e5362bd7", 0x64}], 0x1, &(0x7f0000000600)=[{0x1010, 0x10c, 0x0, "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"}, {0x70, 0x1, 0x7, "d273ddf1d9876f9189aa15192f2b2943fe036c232124e4b3041c18abe4b16b6ec664ed8335d63bb13d1fb2407134f32de4c0c130caa471426d3a8c6a53df72222ef12c3cca90c5e8169a5b1334619b6dbd4c49a77940ae7d5d"}], 0x1080}, 0x40000) socketpair$packet(0x11, 0x3, 0x300, &(0x7f0000000000)) 2018/03/06 00:08:19 executing program 2: r0 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x10000018}, 0xffffffffffffff5d) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={r0, 0x50, &(0x7f00000001c0)}, 0x10) socketpair$ax25(0x3, 0x7, 0x6, &(0x7f0000000080)) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x105d}, 0xffffffffffffffd6) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='f2fs\x00', 0x12004, &(0x7f0000000240)="b378f2378989e33f32e190c2a70fb151e3ecd8fd75a03ab7607542487d3655d68f3575dd3f16a3b8a8fd0ac1f8e9720dc9c516e35105b8e814586a44ca6aa937281644fd202f08e9b9") bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=ANY=[@ANYBLOB="1800000000000000000000001bbf00000800180000000000000000ebca5b64449500000000000000"], &(0x7f000031cff6)='syzkaller\x00', 0x5c6e, 0x438, &(0x7f00001a7f05)=""/251}, 0x48) 2018/03/06 00:08:19 executing program 7: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x78, 0xf85, 0x5, 0x7ef000000000, 0x80000001, 0x0, 0x80, 0x1, 0x1, 0x101, 0x9, 0x101, 0xff, 0x9, 0x0, 0x4, 0x9, 0x0, 0x10000, 0x5, 0x7, 0x8000, 0x7fffffff, 0x100, 0x40, 0x7fff, 0x5, 0x7, 0x200, 0x80000001, 0x395d812d, 0x227, 0x19a2fb07, 0x6e, 0x1, 0x2, 0xfff, 0x0, 0x18, 0x6, @perf_config_ext={0x7fff, 0x7fff}, 0x100, 0x9, 0x3, 0x7, 0x8, 0x3, 0xfffffffffffffff9}, 0xffffffffffffffff, 0x7fff, 0xffffffffffffff9c, 0x1) socketpair(0xa, 0x80000, 0x8, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x4, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="85000000130000003c0000000090f7109447878bbc2d6a8a65b5a74b32623469262c724769332a55d54e5a085b5b1986303a5e133ce4c701f370e8fb5c6c80aea31b55ba5fabbbdb7d7e0168d78338fcefa5e8ac7d2849cd1cf2ae02a37d385ab13ba00edde1cc42b1a380e2d087ef27d06a957695e8ef55700e8cb07d17be134c4669768bf9ac3e89b16befb509098fc80f4fb77ebf6f19dd2f781969b6c58b7d762d10e700ed5bc481e974b1c036f6b5989a610272ac9f06518d5c870706a632a1c14ac0748ed7336087721f64af5ac0a27ac5db678f61"], &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x99, &(0x7f000000d000)=""/153}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x0, 0xe, 0x57, &(0x7f0000000000)="8171c3ebee7dd21b83cbc7322f2e", &(0x7f0000000040)=""/87}, 0x28) 2018/03/06 00:08:19 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x3, 0x4, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r0, &(0x7f0000000000)='/'}, 0x10) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0, &(0x7f00000000c0)="2292754a30326c419f21a59d16bf3dd1a9846beb4d3b53e6ce8f58d06da854b89e47db04b71e406fbd72b36920371eb543198e06c4b25fe6c7c2dfbf9962aaf7f17863c54feb3594f29a70d8c2afb9e5eb748cef81874b86b09ed7a1da9a6ad2b4ab7ef182cce700ee29595c0f4b9e4ddfe36b1c825f0c34175b3ae7aa395e82026ec512b9aaf63af0348410c5f855f8b1344824598346afe42b32d720839e4363ca0328b5fefbadf46b8b649e"}, 0x10) 2018/03/06 00:08:19 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x1ff, 0x379c, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f00000000c0)) 2018/03/06 00:08:19 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000000a000)={0x1, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, @perf_bp={&(0x7f0000496fff), 0x800000}, 0x0, 0x20000000, 0x10000000006, 0x400010}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) mount(&(0x7f00009f8000)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f00005f7ffb)='nfs4\x00', 0x0, &(0x7f000000a000)) 2018/03/06 00:08:19 executing program 1: perf_event_open(&(0x7f0000940000)={0x2, 0x78, 0xd68, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='rootfs\x00', 0x1000, &(0x7f00000002c0)) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xf, 0x14, &(0x7f00000002c0)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1}, @alu={0x7, 0x0, 0xb, 0xf, 0xa, 0xfffffff4, 0xffffffffffffffff}, @exit={0x95}, @generic={0x1, 0x7, 0x6, 0x10001}, @ldst={0x0, 0x3, 0x7, 0x0, 0x0, 0x30, 0x4}, @call={0x85, 0x0, 0x0, 0x7}, @alu={0x7, 0x4, 0xa, 0x9, 0x3, 0x0, 0xfffffffffffffff8}, @jmp={0x5, 0xdb74, 0xf, 0x4, 0xb, 0x6}, @exit={0x95}, @exit={0x95}], &(0x7f0000000180)='syzkaller\x00', 0x1, 0xa0, &(0x7f0000000380)=""/160, 0x41100}, 0x48) mount(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='nsfs\x00', 0x20, &(0x7f0000000140)) 2018/03/06 00:08:19 executing program 5: socketpair(0x18, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000007c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$kcm(0x29, 0x5, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r2, &(0x7f0000001f40)={&(0x7f0000000380)=@can={0x1d}, 0x10, &(0x7f0000000040)=[{&(0x7f0000000980)="a6", 0x1}], 0x1, &(0x7f0000000180)=ANY=[@ANYBLOB="300000000000000000005f8cbd86bdd36b64d6dadca5e9de859c5e42064ff2c378e2640aa3862589ef808119c0daedae71106c3c6db1cfa33888e7881cb4da58ef7df03f4150db012eda2f6041a2df4abf1ca3bc3ef331138ef9e8b2ab8701c60b1c1b13ed03d0312f3060c090c8924ece68703df76a874cd04c8b9a43a11fffc8f1ed804acdfff1af581d45a43aa22215cf1aa3fb55f3b9a5a37957b7afb1e0119a821cab3124c2308a3c79b4e984fba7db000000000000"], 0x30}, 0x0) close(r0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000240)={r1}) sendmsg(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000080)="5f7a4a521b5f09ed7675786e01569f9480f7add59b3d0ed1e540785b5b13c6000d82120ddc949e203bba657fe25388fa1f4e6a655e2300e6466b96942379c8a8231bfcbdb30f42b2fc2db7dccd64ee43ce7044b8e43c883bc165c8ab1a50c1a62ca30001ae891bbf05093724e2daaac227cef4cdbbc6dd6b6b98b50143b142129c20c1082faa2ff8500271d3bf49df92da6f0d3229c0f5983ecf60993f0eb90d56fa197f7059793f", 0xa8}, {&(0x7f0000000140)="6e7f95223227a0ec79b7a4c3fe5f2198b2dbd322", 0x14}, {&(0x7f0000000280)="27781b78fb2b693376faed57e4290e27ce9a9b319e097ecbec8640aa39e0fe48cd85acc1b73268ee618662b0ba2f7ae34ad1526a8c6f261cf04c8df0a82d5614ec535ab205a63831bb47fd0575a45158d9aa5b2e36e0ddf808a1565f49d99bc5c4d257ff5acb276b34a56776cd0c479ac1d74296682469a2de770351392d4465deccfde87ca51a898544e109bf737a6e228082537e506fb73ef8d8f6f27356499806aad6d03ab5aaa563846d8203243b43a5a10ab36ac32dcae85f80a0bb4aebfb56794ad573ef63fbc9f42a4a", 0xcd}, {&(0x7f0000000400)="8f6c2cfa0916563a3c5596ef125ab4a2d89305c53e491dcd76b2feaa4d48b01e264ac4ed2eaa674a077b1e9964a2bfd301cad8756040c177d8b71016a21a1573bfce56534bd93dcd497d35179013221d3f3a5c9383", 0x55}, {&(0x7f0000000480)="918092f8a25bbd27e4cf7afcb60c8148fbfb3c2feed2eeb26f179182322c87bd2502ff0cbed6699b97de60bd9fe54d484757308438eb85bf72514a89027933da1b7f1b1d707003452e", 0x49}, {&(0x7f0000000500)="6975d156127bd94f463f97010986fc8446d2e97175c14db7eb96eeb6a8aba17f3820c756171447cf8e2a3d15171cdae86cd29db3873de62cb766da4c9108d64046dc4514df0b9bea1ebfdf81490431bd55b37d9e528bffe7306842d428b66a3966bcd76dd55a35ce915e18a4123078aa69eaad185809366a0c72bd7748f7", 0x7e}], 0x6, &(0x7f00000009c0)=[{0x90, 0x114, 0x1, "a9c49e09574bc94ac69cb7c6275011b2427c3f4c81fbd0bea631271d2ce3716d1259545c280fdf905f82f508351e4cef08d6daf2b5f7af488ebc44d9e2cf4ff391e26977343aca937c2665fa87f310aaaf84f420d910030b39d7ef861c469ab1e792f84d69bf577c369b11b67bbe521ddb1c1494e641ece5baa083"}, {0x110, 0x11d, 0x5, "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"}, {0xc8, 0x1ff, 0x80000001, "85d035d108f9cb37ac75ffba3c0c4f85e5ac36927f530002381b7d9a91bf581b44dbb3eb1d5594bf376db5e67855c7b71a5f55b8ba7e87becee399109c64f7f31af5e277d5361e6a9b498c1599867fe9969772c5670bdbe85e926454ac550dd9384a1aba0dcc57fea55091cf2e6ea5edb035a7f969bfcbca70f13b6e3cff951c4ff639a3d2d65337c16ef0cb651db2416976ccf401f0a4e8f2cc927adb22a1b2070beef471e40f217652fe4c4fb90b7e3c6f112396fe2687"}, {0x98, 0x115, 0x2, "ec131fbb1f01a934a22c1078bedfe3ead367c9c5547aedb60013b553264e9ec5c4f36290aa9398c54ad1426a0aa95dcf7aedc8742cbd170efd4ce9fd3f88e2f429836a2c3dad77cde4822b928b21fc05709b9c75f19da7fdf2cae7bbd47a058646968a8dd8f2bf38c43543a7eb1492447342998c2fd0eee974389631e3ccae4696a59f"}, {0x40, 0x0, 0x4, "a1441c83de8c00614b6e5b4a69764b7c79b0118443933ebc3940f62417eff2304df54507b3afe7b67d6c34"}, {0xb8, 0x116, 0x1, "9d7eae5ad448017182f5bf1645d0374d064b6b1b8a49fdb8300bb7b23f2d325a92fd00ddc18bf9c0fcf1c6a442222099822ba833489efeb1dec7005429095bf0631cc3bb8f853ade2b95f19a8c2a473e136406cc4a04312533958df9a587a22784c4d11d3f5bf5e0a83984e8365dd9d643173c6b0c4faa19edf737dac7eb534965b6c761ea05ed5c9ab188eb5fca05ad3c26f8f00418c0c662b37c6c6c1daa99846f535e9c"}, {0x28, 0x10b, 0x0, "43282a2f0ff60770591e0c1ce698a9927f9f7c89ec619b08"}, {0x1010, 0x10b, 0x6, "332508d71256b2c1a1bfb1b17279ee8bd757380ec16d158776c5d06126e6a403979440f555be91b6d7470d7528a930250943a6edeb221b12b825b21da525d05f1b056c28b7e2120ee6edb3303bb2af223c69d5b7d3d51352b68aa048d69ff7c29ed8e93c53f04e6d51ffa0dc8d3ddba74f83a7d89930cedf4d6cee045eb1555a23e88e2c81c0a91b2b2b0ee98363ea11eab73e8eb8f5fc8b5047ce621b5397287569ba100bed70bccbda37f0424bcd4727265ee15e4df769a703b51637fc76e063dd4e14b8e8540b31d982660b4ef2c15ce117f2ad4c62f2732c3b4c4f077e014d35a7d88a354fbdb5589a45abde071b8cbfba8a9f35a4ef4f87f1410762fa8c45fe191fb217ac3bcc65e1ce03172705d25f63b54ee03b34ed344ad3ad77ea89284d49d6b6bf60df6e32994b67ac2c3b8e246c32b48e83c6fa7f3222076c1d73bf957377dcd49654a8e9097fcbebbb76fe542dada841832908128ef74dbe903b239eb544131d3f899e330450595be38a005a122a3277073d5f824c962295f08a8e0500130d32922dda50b2be1c034ed3087dbcd72ef3429eda4171de21d069367c0641878c712508420287fb9575e59429522a460acce96282701d5911dbcef9f05b6ffce0102cbe69fc2cbf72286092a41f6dd34f9614eafccb65acad496156c7282c1c24d37ff77f6cd2c2ee768c43d36b7402ce6bde89419e8ef71e81221e58f7cc0935b9239c26294edc9551c7b153a6e81f0d0fb15ec3b8c5acd3b0544efdc3647b761442efb159a0687d47fb5adc87e9c82460bf6453653fb28e90d65c4b852cdc8cd29ba0ac9228c5a1a7e9a76020307c27cab7fef6ee0a2c7d4e54ef9b072c3f045b0225e9b9c300713b4a67935bac77b228a5b54e6f952b37fe5f7a1e404f68e9c42edf856df7754053baf9cd35f3eb3529444a538d6d57e3ed626ad875a674ba4101298b8e72ac90d0f3a6a052bd155c9fc3dc93e34b5e9b8c38836d128e7e3659393b61234caa96ec831d7c9733092caff0792b57008a70c782837a324cee94f8b13f150ab5e90f985b4b0d05b7e511205ecf3f4ecfee15869f02ad8d7c80f03e27aa63798fd043ecc94945b6d92b572c22ca9fdb4085d90b312b8ea2bba107611ae337451ed1fac571b03015b512c7d807b61beca6ef70fc48498f846074fe741d74bceeabeb9095ab631c050fcb1230c2ea279ed430289b332ea57940e393d4058463d8bd0d44a553264fffbc7a1f3f8ff059348c70775bc472b4dc326236130813e7e8bafdd86439ed9f8b7304f76c8a285eb88fffe25ec6798f41add0c0cc7ded345c0d39439f6361bf05224eb63d6b093b1985bf6b200c16445697d0339c2961109834a5b97f1738de803cc1f63e9698beaeba6f40877611237daa413bbfddcbc9dd151d8ebe9a8b01370a7be1d7968c8186e9d6b979cfd7514e8c43563729a0d2c7496464fb1bc955d7d4864cdaa0aa1a81d2a0ac12e5b9a4b4b2ba3b83eb8bc6cb9ab2ad3a9ed54bfc750a371c4b16af9df2cb1b5c1c39d95c32d9e546d08722eeae9566fd3f1bb503862edfddfd5f134be6ca6db2b4035be90e458435cce913767a6981ef4d87d58e984df24532c93c288591be98f451e9b37a338f622f4049fa9d0ab873b6a1f99ea456c2f6775c79269a488dafc08472cb67ffd7920d37bb877d30a6cb05269abfbdd49a78ca74dc3f898b88978eff68eb4527a9b96355c3fe19f7fab6889f72f0ce49f9d85178d0a5c36ba319f936782ee92585241d1c06b524fac2fa8144471768e06b800a30593734f90af1297200a7acc4bce300221af33379a7ad206f2a0f63e9e31913bc841d25e4f19c7f88dbe3550adf861502cd672c698d2f306250d8bddf6a2bfd16e3c7560b7a30be190897ea0a02e95c61216487026476a8293e904143fa43160fd5f1dcc41b06ffeca93183776c068761d8a21c29b636fcf9b935146671a7006bc553fc5475b21bdb2a902fa0ae0d296a0f5afa8057304824679fc5420b96184b2defea0e0600bd45255a13a3cae06a344a24122bdd3812dd8a829779309a7c34d590b7a6ccd9faaa9fdaa351a8a0fc2e4c994dcd31dbbddefe2565656739a9bd89506f9153bf283d7ba453045c01ec38608aa39ccfdd0699c1ec32e092104d7cd495b4065989731085f4e729ade86e3f8c667177986d52e87823f6620228ec3b3c9fb29e9ab3c364c6c1e097850c7b2454b8c2df6409d45d0918a54c49761ed4b187d66cf0034153dffb1af99e47f7c7f3f8e5e4ca14bcbf511212cbe19975dde80a3b407c334dfa78cbd4977a23e4e9d61e5540c036cf54c47db8d0510db0a1e2ab43c83c9cf0a1ae6cef50e95d32c7375f06aa8f138866d79f9a66bcfa24d808012615dc736922819978aa89db1d3b39db85500b461c7248ac88f280c8407e7f30ee7fdd923c6ec699c71caffd8390ab50fa39961961d03938279696db693957d12b0b66252da7917858f4c7967af3b7275a2705096022dc20fb16fad45d655ffbd2304b9062796429ec0a739f48080352c65ad25eaf0dd042c882a2775c4a7e16f1f90f276cbbd4bd4aa01b667db03a5697ac5523533655940bda6fd7844bc9172366f85d404d8cf33e2b7066932589d58298667148886b47dc867aa97750fe28f2efd5f387bd67fdd7cfafe1bb8fd01b84e3ee9ca37809dcb5b7b18edf6807fc0346dc3fbfab381a88975667107e080e14d0f86cfe417a6c4b597ce773168f8d6b80da4d2c90fec2aa9d4f185b453d8f048b8b859ca7b2c3dd73eea0ebf32c15a0a0560b32c6a3cc23f5f8072919209c5aa5b6da8cf6a3dbff39c3b06948e4a7a56febb1f58b6068d8d6a3bf4579945151823baf4a954657bb648be0e1a7e3a1356128c24e867cefc4c6f66509a78a7226b0695e6decfcfca31da4f0d41e98baf89334cc094fe8739370229ea6a9e4cbe422d5cd056be03922b1d9c5230700a9e8ea6b7d61cedba89968db5b0fe5d66cb4f344fff70139bfd3d03cbde367ba3edcdb21da81cd7c5371896ee8e804b6709f8a5d28dc00e05d60daf89c1df82f82ba1e97b1006a39ea733ac32cb23321cadc674fb09dc8c3de66d10e753bc105de7b05d439c0dd3d9565eaa073ae660f75723595970c7da3118e8b36c5f5445079d080bed97f1472865b5796d289c212825560d62660f7435b9d7503a9a90bc564649641a67b3a62932be996f678a1a8ea5134837318cd2bfbcf94d0c7984e7aba662ef5a4d1cb2ebf02443fa91b1a8268f240a74434973205e2448e37e488d878f10443a5cd3486c418531a27807f6f93f48ead969c42870f0a2a4c8cd7fd7a0fd64a48027497e3392eea4854b8db2e5bd1edf3cca03eefd7be943c39c16fe0a99dff83a6795c2b25c9477085c6e6ba8199ae3ad1e8521044d51301cb33661aa869afb1cae3b0bd2bfd7c40754c584ec62f0f42eae855fe45c4e21147787c4b4530d5c590fd29bb010ad638a19ac5978877e2761cc12b25191bdf9318c3ad8e016547291d54737b7be13d6df255c65fd45cbe1c625189f1283d0ce6763b90be15c8319f95d19811cbf3f3dc1327b11ad9345c023fe8f6a6adeca8d00a0c072e136b2b81b004178fd5991fad2c0dd5dd7f46f1b3924c848f0b32f0e42b9c48302208494cda0ad86456fadb4cb7510525321ea7dfcf9b701085fddc03846f65261402df40a221fdab60e5adea91056c4fcc9212fa9298baee9f9dbacb29fb9b7c63bcf9af42521d2eb39eb5f945e04be1075a065ef1937558cf426d3744a35fa1b314ce7a4321d0c5a4b5f8b2a8751731ffca3e7cb635c3e9e0ddd741647d4c0136b19b8da3b9c4fe97ada03e212c4fe9ff3875d5bd9136e88fd246941b095503736499bcf8ea3d7f96a38ac77b1c7a1d2e8bc26f051d34d1dc55d9d98bea84481af3f3701ccc8b736462013998aa5c5b9b7d18e13c5e9577789d026917d42d9095df0995c21c258b0c988d1b7f711c7ca14801c38e2ea7281d60cfe4a3715e4eadff05ca32a7bf0bea63c9c26eedaeca8582df6facd14e3401cbfd84f6c3166989c85f4e5a0afd033c6e94d37b25174f7749865359704df97af5b67582df8027b6fb87b6cb5ec67af0e3dd63e7447e036fa4643ee4d9852210f82deddeceb9c4d30c9dab2b26193971225d95b8c412f29542c1641786a9e0cfce01858aa6f027084a1241f04d19fc18ca252bfa3faba7d323a4672ee1a89bbc2bead9ff910df886ffbc1b4e19bd5cb2d642cb5a02c4d69d219e6ba54afb8255aaa556fbe1372287de3c8d52b5db60cf59964f25e3384b782a35de5872cad038467449b215f6a28b7043a8df651a97814ed5a403dc6cb50877552557ee413fa6eb2ba5df2c001de1e8721e1702aa220a5bcec23969d032ab6c1b671cbb98e749f64940feffabc493b722754145e31a28f5a710aba8def09de6cb9f3750b1abf0e43f9fe083542bbba3ca365870ff22929aa2e38357bdff6da7ae1a0350edd2ace0c808002f75a10cb8f03e49bd3ddc1deb45e53ee3f3ebe27beb6d479b369f374e25e2051deb27f575836485143109c57db8938bf6f5bcb91a44a5d9ab3cb89ad2964f2795bc0f64ccd3e7ba4b0f5c39722530ba4b7315538c5daeafc3728c9f1f0d876fb9a478ea6b9ce28c75109f384d5c4dcb121336edc65af3c2169fbc3da79bfbcc72e56ffd13b7d9971d70627ed885967501fef6db0046003a164ea969c8e3f0ae59e0df19a2344e10956dd8e330b3a6c25a4a2ea8a458773c4cd38678e33459acbeb2eb269fdc3833a72ffc4a4a30e2eb5b5a4742ac995ed3d6bc5bb72a5ebfe5d83973cfa67c8ebb5ddcbd437e00be10fc00f574bc665965ff991d83627e4654e1a66bff7272e1c1c25bd73576a336f5aff9fb24eb289d1097f13fa71b6f3ca8554c7db441c94677459f720ecc21a1081d6d63707bc9dcd4d30dacfe7cf33b730b1dabb841d11003a0252c9c77367d94a5992cb3c80ab8c0406e2055675f04fe730f4621f03889d4c9fde3aefdb5c54c82ac39baacd0b3683556e06e3ad2e7f3bb391c80ff074b41dc13b88662d3953a7819b893a27be5bb40b82d8e68b2842783f984f6971c9419f8720080ac933ef3722f7e01b80dd9990b17c2828886ae88f97cd10de531ab2c18aca2e00e335a3de50a2a155c7d35abfe786743be93e2f7e1fde6b8865578c4ed6e3eaa8cce629c528d41eb25ccd47dfd9c82a96f24dfeb1019e1dee6db7e5b0f22a3785124b8af251452d71bd98e9d5aa9a4ce7fb7a235a1748db2466069e2f4b219344f2c1be48646ea6480e0019729f090574d6b01245c4828063bb2214cd4f5a046a1607692300b8a53675cd560f072d20d647f37ac0946a5e4a4075475fe1c8c0c9b4c9ee7f25ff1c10d5e7f250b693431d4e0bae337a9a1af3d1055c89a3f1c5d27cd5edde978f336c4a4e1f77e95ad8b1db1fa2bf7877e8567893531cb9cf29fb4986ccf9a984c115345cc588b8512208e3402f797ea1aea9d9a9a4fa9ab5010dfd551c19c2f699767d9f4c1ccd4e9497b0affcc2255073ecc3514521b61f640c85409e3f5d8d9e6fe86908e1297d7068d7d7dbb7d32a7e42073dd69ead67fb35d16e639363fc286365d18ca2e969a86adabd07762103af1b4530d36cc56f4eefe61a2fd8fe8b7394ca534409f4f6944920f12f31dfa1691e00f9c5e73e6340f570c7bfd2452bce56d941720e5f27802c5e7b457399c0bfcc6481d97bbc7a849b19b75e7a6046b900d4118ec663dc4a87bd7f4f4337014338b53d6c4c57e"}], 0x1430, 0x24000000}, 0x40000) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000640)={r2, r3}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000680)) [ 72.656115] EXT4-fs (sda1): Unrecognized mount option "./file1" or missing value 2018/03/06 00:08:19 executing program 4: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000180)) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000000080)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f00000000c0)='./file0\x00', r0}, 0x10) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000140)) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xe, 0x3, &(0x7f0000dbc000)=ANY=[@ANYBLOB="85000300000000000000eeffffff84000003000000ff0000"], &(0x7f0000e6bffc)="47ff3300", 0x5, 0x99, &(0x7f000000d000)=""/153}, 0x253) 2018/03/06 00:08:19 executing program 6: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = getpid() r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0xc, 0x2, &(0x7f0000000080)=@raw=[@ldst={0x1, 0x3, 0x6, 0xe, 0x4, 0xfffffff4, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x12, &(0x7f0000000100)=""/18, 0x40f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) r3 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x1}, r1, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x78, 0x100000000, 0x7, 0x3, 0x3, 0x0, 0xe98, 0x0, 0xb, 0xcacd, 0x1, 0x7, 0xcd, 0x100000000, 0x23, 0x6, 0x9, 0x4, 0x2, 0x7, 0x6, 0x200, 0xfffffffffffffffc, 0x4, 0x3, 0x8, 0x180000, 0xfffffffffffffff7, 0x8, 0x100, 0x8000000000000000, 0x8, 0x7fffffff, 0x6, 0x0, 0x7, 0xfff8000000000000, 0x0, 0x0, 0x5, @perf_bp={&(0x7f00000001c0), 0x8}, 0x21000, 0x1, 0x6, 0x6, 0x1f, 0x1, 0x20}, r1, 0x3, r3, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000040)=0x5) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, r3) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280)={0x0, 0x4, 0x10}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000004c0)={r4, &(0x7f00000002c0)="31b41624814fd5a2c8a921cba392229df22dbca8bee57f9b76e8003ec8e92926216bf57c70d3d5a184ce57b927be32a6a56a8c4d7324fa24c2f4985e4231cf196203bf72841878dee7f3b484edceffc19f20ac4e365e4eb7ae635ff7ab431a03962706c32c67aa87a6fb9aaeee4ce5f69f31c7f9fa96207304c060da3c57e34d8f1758e0d668236cfcb61acc6394f0e80037ada48d1463f0a791f82325228e773179a1b1f1793a31e4ef7fadcd833721da48fe6d24f280a1f72f3281c66136d4bd04b9de1ab792e56f26ab981a9cb44fd9d30980605d6ea64bd3f1d251740c3b914cc146adb9b0082dcc7d6ded1b744dcec1bd3264d8bbbd", &(0x7f00000003c0)=""/214}, 0x18) 2018/03/06 00:08:19 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x3, 0x4000000000081, 0x6, 0xffffffff00000001, 0x8}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000000)={r0, &(0x7f0000000380)}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', r0}, 0x10) 2018/03/06 00:08:19 executing program 7: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x17, 0x0, 0xff, 0x2, 0x4, 0xffffffffffffffff, 0x8}, 0x2c) close(r0) recvmsg(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000540)=@pppol2tpv3in6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @empty}}}, 0x80, &(0x7f0000000800)=[{&(0x7f00000005c0)=""/112, 0x70}, {&(0x7f0000000640)=""/21, 0x15}, {&(0x7f0000000680)=""/191, 0xbf}, {&(0x7f0000000740)=""/168, 0xa8}], 0x4, 0x0, 0x0, 0x100000001}, 0x40) recvmsg$kcm(r1, &(0x7f0000000e00)={&(0x7f0000000880)=@nfc, 0x80, &(0x7f0000000d80)=[{&(0x7f0000000900)=""/22, 0x16}, {&(0x7f0000000940)=""/49, 0x31}, {&(0x7f0000000980)=""/199, 0xc7}, {&(0x7f0000000a80)=""/216, 0xd8}, {&(0x7f0000001700)=""/4096, 0x1000}, {&(0x7f0000000b80)=""/206, 0xce}, {&(0x7f0000000c80)=""/238, 0xee}], 0x7, &(0x7f0000002700)=""/4096, 0x1000, 0x200}, 0x2) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000040)) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000000)='.', 0x0, 0x8}, 0xf0288d3605fb5758) sendmsg(0xffffffffffffffff, &(0x7f00000016c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000180)="cf77", 0x2}], 0x1, &(0x7f00000002c0)=[]}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000001c0)={r2, 0x50, &(0x7f0000000100)}, 0x10) mkdir(&(0x7f0000000180)='.', 0x0) 2018/03/06 00:08:19 executing program 0: r0 = getpid() perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0x0}) recvmsg(r1, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000005040)=[], 0x0, &(0x7f0000005100)=""/93, 0x5d}, 0x0) socketpair$inet6_icmp(0xa, 0x2, 0x3a, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x78, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/03/06 00:08:19 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0xe, 0x3, &(0x7f0000dbc000)=ANY=[], &(0x7f0000000000)='syzkaller\x00', 0xfffffffffffffffb, 0xfffffffffffffef8, &(0x7f0000000240)=""/153, 0x40f00}, 0x48) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000200)={&(0x7f0000000080)=@in6={0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000001740)=[{&(0x7f0000000300)=""/4096, 0x1000}, {&(0x7f0000000100)=""/203, 0xcb}, {&(0x7f0000001300)=""/255, 0xff}, {&(0x7f0000001400)=""/183, 0xb7}, {&(0x7f00000014c0)=""/199, 0xc7}, {&(0x7f00000015c0)=""/225, 0xe1}, {&(0x7f00000016c0)=""/74, 0x4a}], 0x7, &(0x7f00000017c0)=""/235, 0xeb, 0x5}, 0x2000) 2018/03/06 00:08:19 executing program 5: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0xffffffff, 0x5, 0x10}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xf, 0xf, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x6}, [@ldst={0x2, 0x1, 0x0, 0x6, 0xb, 0x6, 0x4}, @jmp={0x5, 0x1ff, 0xd, 0x1, 0x6, 0xfffffffe, 0xfffffffffffffff0}, @jmp={0x5, 0xffffffff, 0x1, 0x5, 0x3, 0x10, 0x1}, @call={0x85, 0x0, 0x0, 0x2c}, @map={0x18, 0x3, 0x1, 0x0, r1}, @generic={0x8, 0x2, 0x5, 0x80000000}], {0x95}}, &(0x7f0000000140)='syzkaller\x00', 0xfff, 0x96, &(0x7f0000000180)=""/150, 0x41100}, 0x48) socketpair(0x18, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xffffffff) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r2) 2018/03/06 00:08:19 executing program 4: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000180)) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000000080)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f00000000c0)='./file0\x00', r0}, 0x10) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000140)) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xe, 0x3, &(0x7f0000dbc000)=ANY=[@ANYBLOB="85000300000000000000eeffffff84000003000000ff0000"], &(0x7f0000e6bffc)="47ff3300", 0x5, 0x99, &(0x7f000000d000)=""/153}, 0x253) 2018/03/06 00:08:19 executing program 1: perf_event_open(&(0x7f0000940000)={0x2, 0x78, 0xd68, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='rootfs\x00', 0x1000, &(0x7f00000002c0)) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xf, 0x14, &(0x7f00000002c0)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1}, @alu={0x7, 0x0, 0xb, 0xf, 0xa, 0xfffffff4, 0xffffffffffffffff}, @exit={0x95}, @generic={0x1, 0x7, 0x6, 0x10001}, @ldst={0x0, 0x3, 0x7, 0x0, 0x0, 0x30, 0x4}, @call={0x85, 0x0, 0x0, 0x7}, @alu={0x7, 0x4, 0xa, 0x9, 0x3, 0x0, 0xfffffffffffffff8}, @jmp={0x5, 0xdb74, 0xf, 0x4, 0xb, 0x6}, @exit={0x95}, @exit={0x95}], &(0x7f0000000180)='syzkaller\x00', 0x1, 0xa0, &(0x7f0000000380)=""/160, 0x41100}, 0x48) mount(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='nsfs\x00', 0x20, &(0x7f0000000140)) 2018/03/06 00:08:19 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) mkdir(&(0x7f0000000000)='./file1\x00', 0x0) socketpair(0x0, 0x804, 0x74d0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r0, &(0x7f0000000b00)={&(0x7f0000000240)=@nl=@kern={0x10, 0x0, 0x0, 0x8020000}, 0x80, &(0x7f00000006c0)=[{&(0x7f00000002c0)="e1667d1ae3b5e7f9068b04", 0xb}, {&(0x7f0000000300)="a73fa6a4cc5b850a215e0913b553e1dd42d8bacf5ed67d1000c923e2fcd4f8b721fc434a454fba01306583ac6726104e7b518bca880a", 0x36}, {&(0x7f0000000340)="a36b4d86f432b38958951ef24bd4de791a7e3ceee06b7923c93e38fce9f60c8ef121d5482d8d3cfe1b", 0x29}, {&(0x7f0000000380)="b917af6a57b415846c68271b68c905ec7f8b61961dd78268c3ebf41022d02866ef0cdfc64a4d85e8d4047c144dec09acc317e8ec16b1771c9e4d3a28c94f002f6555193e6339d8d2c245cdc27d89496be4bca203e7e79cb7b47f126138ad54ff026399e838a44c0a959a435e87eb5f63cbad9e8921e794c49a0a9e5c12255c2a8a4db22a80c4448ff9c8bb0e4b84ccdf6daf9db801b84d", 0x97}, {&(0x7f0000000440)="a9a411053389dfeeffdf375b35a27e0a78e50f39b554a8cd11955d0026b6df0dc53a9b2fdb795b2df9703f7854daa4384210e28b0df5c08ed3f0878c117a0814329a4dfefb", 0x45}, {&(0x7f00000004c0)="4e49f89786811ede11304a0ff918f3e1c444903c5747a02a985b73014bec8fe39f1c4362bb6b1d466d4201b3410f871bf01275dd9993bf0b384c084839bb808be9179b2db6e00c3ed9964d87fc2200e1a0380f8cde407bd2f72c34827e8c3467321bcef99a59b1cfe33eab6003f255f4f8f9cc41b114089da82e9d1215d15eaafc08a0d47d7a2b0b6bfdeebad61ffb85e2d24679809132a2", 0x1ac}, {&(0x7f0000000580)="194b3cf91e3979f6e518db798d0ed2fd7a0ed00063f6f2281072266ba88739fa213f375d185a4ebdd1660135295a89841b821a0083db9fa1f1596518a41468e25335b3dc39b3c0f4098e0718557fa9e0cdb485c6cbe0fb4f65ad862125424727c2ffd203a364f5e7c0e5a8f3ff71971cb2340d7507c2ffcc63db4c6e7a246916fd81b639bf98ae20ca9a5eb551b4e0eb3c514424a75f4175", 0x98}, {&(0x7f0000000640)="63858f0043413bb8d43d52d1613fcc760dff176b725f5d56c38a464a13f4e2c5d1212d93330b4ad6df9140f22d741788a65c7c69b262a5574bbdc4315128285ceabc2ff9fd717baa7c4b890e0ca86324f5c69974", 0xffffffe8}], 0x8, &(0x7f0000000b40)=[{0xf8, 0x10d, 0x100, "eff6600d118bfe86eb91c29990c6057a06a6c3ad673846a5e15061e2fcca53952c5b0d25435ed02fc84b0c6773abff3e6acd06bc9ec881c8fc17f1c0b84e9decddd99be553306e00853fbb8a2afdb2233aaeac41db38c73c3eff3a803c21e7b019085f7e05009bddef8a473de0d9e1f0552dae7ae672cbb11e0b02360d809ee21114929fc19df52a451b3c2eb8689754f6c1de04bf10eeec849d4f2636370be28da9447dcac115955f791a876b2dbd80d458b2b512a83d29c7425324c6c6cafee0a451c6598887072b9d0dad5b52a42395940c8b6846efff3fc37e1b44efd2730537bdb16ed0478715c42672521eb976"}, {0xa0, 0x10d, 0x1, "e3c708029c3cfe24bcb9036679218285fdb7b4d2d2c10e1883c15ca6a7f5d08c569fb83fbd8644e70a338be02624a04e77d042d87233db452cf36daed7fd1e5b7c557b22796b076e2836b3c528c2184d1988b49de7996a19d170272bc504b7c53e3379a958dbc856bb732cf4e25885b20abc30546ad2c8f77ed43f4bb9fa46785aa403aab0ed04560ee03c"}, {0x28, 0x10a, 0xffffffff, "2c426d6b9cf931cee6f9a1f7c74fb3ca36be48b9ec72f497"}, {0xf0, 0x6, 0xffff, "1270bfa382b3d285e317943e4047ce0c31f89e7b24bd603b34ce8070ee0553f7c96a2ff4c765366e4d88f99e485042bbd15a662362f8e8d7d6c0146956c000d17dae6b212501580f2422fb68000178a815eb3ae3d9e8e9ee68560946dd77b7f9fa0bd4c8b9eef893fccf2044321f65dc0e07a7b99cd7955d77cd4b73c8d01ac79b737e0e9b3b29f5d44dab8bd4d93291e9b89eff00257a4638847520ebe6b1ea73bfc1d2d1263c43df2128a3b7e370f4ec2e056023a475713f17699fb8e8dae1baf91886a5f115790f3737fb2d7f3030c47a209b1bdc4242ad"}, {0x20, 0x102, 0x0, "0523f0e6b2cc9f8f8520f0d5cb0bee33"}, {0x60, 0x10c, 0x85, "af89efb7b971b12e21de351cfaefb200a8cca5eb5375200200de4720c0071e867d27a8ee224ecc2a9ea4d207e5ec8c732413d796ac7b43876727d46477cd14da7608aa522650270167b7f9c6c345"}, {0x78, 0x1, 0xffffffffffffffff, "a3cb1a25ba817482886ca56695c093958efb922c911d4c9a023e7ec3f9ec79197f47811b04fabe52df7bb880329d3cc62740dc4d770c0ff1e41409990f78b5cb4da9fa3c5b6370b139cb776c8a1bed948b09414e3b20b11e10a36bedda39e3555623f4f7b1"}], 0x3a8, 0x800}, 0x40001) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000811ffa)='bdev\x00', 0x100000, &(0x7f0000444000)) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000740)) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffff, 0x4, 0x18}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0xd, 0x2, 0x7fffffff, 0x80, 0x2, r2, 0x100}, 0x2c) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000007c0)={r1, 0x0, 0x1, 0x9, &(0x7f0000000780)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa}, 0x20) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000000040)='./file1\x00', &(0x7f0000fdb000)='ubifs\x00', 0x4001000, 0x0) mount(&(0x7f00002b9ff8)='./file0\x00', &(0x7f0000cbeff8)='./file0\x00', &(0x7f00005f7ffa)='ramfs\x00', 0x80000, &(0x7f000002f000)) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file1\x00', &(0x7f0000000140)='mqueue\x00', 0x0, &(0x7f0000000200)) mount(&(0x7f0000000100)='./file1\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000180)='qnx4\x00', 0x40000, &(0x7f00000001c0)) [ 72.801297] EXT4-fs (sda1): re-mounted. Opts: 2018/03/06 00:08:19 executing program 6: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000005c0)=0xffffffff, 0x4) close(r0) r1 = perf_event_open(&(0x7f00000000c0)={0x3, 0x78, 0xfffffffffffffffc, 0xffffffffffff4d4a, 0x4c, 0xfb98, 0x0, 0xff, 0x80084, 0x1, 0x2, 0x5, 0x0, 0x5, 0xa7, 0x80000000, 0x2, 0x200, 0x40, 0x4, 0x2, 0x6e3, 0xc0, 0x5, 0x8000, 0x3, 0x7, 0x1, 0x6, 0xfffffffffffffffc, 0x1e748bc0, 0x5, 0x8, 0x8, 0x780, 0x3, 0x3, 0x2, 0x0, 0x8001, 0x7, @perf_bp={&(0x7f0000000000), 0xc}, 0x23000, 0x3, 0xfffffffffffffffc, 0x5, 0x8000, 0x2a19, 0x4}, 0xffffffffffffffff, 0x6fca, 0xffffffffffffff9c, 0xb) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x8}, 0x10) recvmsg(0xffffffffffffff9c, &(0x7f00000136c0)={&(0x7f0000000400)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, 0x80, &(0x7f00000003c0)=[{&(0x7f00000004c0)=""/228, 0xe4}, {&(0x7f0000000480)=""/43, 0x2b}], 0x10000000000001b3, &(0x7f0000013600)=""/184, 0xb8, 0x80000000}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000013700)={0xf, 0x6, &(0x7f0000000280)=@raw=[@generic={0x3, 0x0, 0xff, 0x7}, @map={0x18, 0xc, 0x1, 0x0, r2}, @map={0x18, 0x0, 0x1, 0x0, r2}], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x38, &(0x7f0000000300)=""/56, 0x40f00, 0x1, [], r3}, 0x48) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r2, &(0x7f0000000200)="0c222b2c039de6837ec5fb504a5e497d8f7787a78a1151"}, 0x10) socketpair(0x13, 0x80000080003, 0xeffffffffffff7fe, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r5) socketpair$inet6(0xa, 0x4, 0x2, &(0x7f0000000380)) perf_event_open(&(0x7f0000000040)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x21fd, 0x0, 0x0, 0xef71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000680)={r4, 0x50, &(0x7f0000000600)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000006c0)=r6, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000740)={&(0x7f0000000700)='./file0\x00', r2}, 0x10) socketpair(0x0, 0x805, 0x8, &(0x7f0000000340)) 2018/03/06 00:08:19 executing program 4: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000180)) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000000080)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f00000000c0)='./file0\x00', r0}, 0x10) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000140)) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xe, 0x3, &(0x7f0000dbc000)=ANY=[@ANYBLOB="85000300000000000000eeffffff84000003000000ff0000"], &(0x7f0000e6bffc)="47ff3300", 0x5, 0x99, &(0x7f000000d000)=""/153}, 0x253) 2018/03/06 00:08:19 executing program 0: r0 = getpid() perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0x0}) recvmsg(r1, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000005040)=[], 0x0, &(0x7f0000005100)=""/93, 0x5d}, 0x0) socketpair$inet6_icmp(0xa, 0x2, 0x3a, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x78, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/03/06 00:08:19 executing program 7: mkdir(&(0x7f00004ee000)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file1\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='squashfs\x00', 0x804080, &(0x7f00000000c0)="823fd71435498dc150c95a9e56acb373fca677a99d8b34e0a818cd87b469bd83c5b20bbbb75d23dff177ca28619e8116d8eadd72b83b36f6fd140b58e441c3047eb328eabb6fb326f746d3959ff3c34843e77e1f5727d9baf63b1d0ce0ec63bcb7c19e004b95551cf3495cc8d907123db592a17c45b2c6761ef5ee2c5007a60c60bcf0ac9075b88e4e84ce0394d839bdb33bb5e739a784fafb2538d85347f78a62fdfadb998155093e8b825ad21f15388296ca0c27ef9ca97d49ffbfdf39c18da7f7134fbd66b52c") perf_event_open(&(0x7f000000a000)={0x1, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000496fff), 0x800000}, 0x0, 0x20000000, 0x10000000006, 0x400010}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00009f8000)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f00005f7ffb)='nfs4\x00', 0x0, &(0x7f000000a000)) 2018/03/06 00:08:19 executing program 2: r0 = perf_event_open(&(0x7f0000000000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x918, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1140, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00', r1}, 0x10) 2018/03/06 00:08:19 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x10, 0x4, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000001140)={r0, &(0x7f00000000c0), &(0x7f00000010c0)=""/113}, 0x18) [ 72.868211] EXT4-fs (sda1): re-mounted. Opts: 2018/03/06 00:08:19 executing program 1: perf_event_open(&(0x7f0000940000)={0x2, 0x78, 0xd68, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='rootfs\x00', 0x1000, &(0x7f00000002c0)) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xf, 0x14, &(0x7f00000002c0)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1}, @alu={0x7, 0x0, 0xb, 0xf, 0xa, 0xfffffff4, 0xffffffffffffffff}, @exit={0x95}, @generic={0x1, 0x7, 0x6, 0x10001}, @ldst={0x0, 0x3, 0x7, 0x0, 0x0, 0x30, 0x4}, @call={0x85, 0x0, 0x0, 0x7}, @alu={0x7, 0x4, 0xa, 0x9, 0x3, 0x0, 0xfffffffffffffff8}, @jmp={0x5, 0xdb74, 0xf, 0x4, 0xb, 0x6}, @exit={0x95}, @exit={0x95}], &(0x7f0000000180)='syzkaller\x00', 0x1, 0xa0, &(0x7f0000000380)=""/160, 0x41100}, 0x48) mount(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='nsfs\x00', 0x20, &(0x7f0000000140)) 2018/03/06 00:08:19 executing program 0: socket$kcm(0x29, 0x1000d, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040), 0x4) 2018/03/06 00:08:19 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x7}, 0x2c) r1 = socket$kcm(0x29, 0x0, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040), 0x4) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000080)={r2, r3}) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xb, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x201a7f1b, 0x0, 0x201a7fd7, 0x1}], {0x95}}, &(0x7f0000f59000)='GPL\x00', 0x3ff, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={r0, 0x28, &(0x7f00000000c0)}, 0x10) 2018/03/06 00:08:19 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x20) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={0xffffffff, 0x2, 0x18}, 0xffffffd8) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000180)={&(0x7f0000000040)='./file0\x00', r1}, 0x10) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00'}, 0x10) perf_event_open(&(0x7f00000000c0)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x20000009, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, @perf_config_ext={0x200, 0x3}, 0x20000}, 0x0, 0x0, 0xffffffffffffffff, 0x7) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x50, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)=r3, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000001980)={r2}) 2018/03/06 00:08:19 executing program 2: mkdir(&(0x7f00004ee000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000000a000)={0x1, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000496fff)}, 0x0, 0x0, 0x10000000006, 0x400010, 0x4000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x8) mount(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f00005f7ffb)='\x00\x00\x00\x00\x00', 0x8, &(0x7f0000000180)="d11dc201a49ad448813ab237dae981d78479f8a348e22663c792fe730a40f7056e1fc4df6683d1a093aa3293460000d7") ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x7) 2018/03/06 00:08:19 executing program 4: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000180)) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000000080)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f00000000c0)='./file0\x00', r0}, 0x10) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000140)) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xe, 0x3, &(0x7f0000dbc000)=ANY=[@ANYBLOB="85000300000000000000eeffffff84000003000000ff0000"], &(0x7f0000e6bffc)="47ff3300", 0x5, 0x99, &(0x7f000000d000)=""/153}, 0x253) 2018/03/06 00:08:19 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet(0x2, 0xa, 0x7, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001740)={&(0x7f0000001700)='./file0\x00', 0x0, 0x10}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000001780)={0xf, 0x6, 0xfffffffffffffffe, 0xfa, 0x0, r2, 0x3ff}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000001940)={&(0x7f0000001900)='./file0\x00', r1}, 0x10) recvmsg(r0, &(0x7f00000016c0)={&(0x7f00000000c0)=@in6={0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000001540)=[{&(0x7f0000000140)=""/32, 0x20}, {&(0x7f0000000200)=""/131, 0x83}, {&(0x7f00000002c0)=""/4096, 0x1000}, {&(0x7f0000000180)=""/19, 0x13}, {&(0x7f00000012c0)=""/20, 0x14}, {&(0x7f0000001300)=""/205, 0xcd}, {&(0x7f0000001400)=""/224, 0xe0}, {&(0x7f0000001500)=""/32, 0x20}], 0x8, &(0x7f00000015c0)=""/217, 0xd9, 0xffff}, 0x40) mount(&(0x7f00000001c0)='./file0\x00', &(0x7f0000c7f000)='./file0\x00', &(0x7f0000df9000)='nfs4\x00', 0x0, &(0x7f0000590ffe)='v4') bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001a00)={0xffffffffffffff9c, 0x50, &(0x7f0000001980)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001a40)=r3, 0x4) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001b40)={r2, &(0x7f0000001a80)="c1e196738ad88838e950f83194bf5e855c0167667544da16d837b41f700b1e56178260b88c35371ceb0f3ead863283c4f4658d73a24154c6b38a17c409de7b26e655757400f116a50e8a55ce53da28fc7cbf0c8e2487", &(0x7f0000001b00)=""/25}, 0x18) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000001800)={&(0x7f00000017c0)='./file0/file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000018c0)={r4, 0x50, &(0x7f0000001840)}, 0x10) [ 73.020209] EXT4-fs (sda1): re-mounted. Opts: 2018/03/06 00:08:19 executing program 6: r0 = socket$kcm(0x29, 0x5, 0x0) socketpair(0xb, 0x3, 0x67, &(0x7f0000000300)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0x0, 0x0}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={0x1, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={r2, 0xe000000000000, 0x10}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000380)={&(0x7f0000000340)='./file0\x00', 0x0, 0x8}, 0x10) socketpair(0x5, 0x80000, 0x0, &(0x7f00000003c0)) recvmsg$kcm(r0, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001240)=[], 0x0, &(0x7f0000001280)=""/219, 0xdb}, 0x0) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0x0, 0x10}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000001c0)={&(0x7f00000000c0)='./file0\x00', r3}, 0x10) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)='O', 0x1}], 0x1, &(0x7f00000013c0)=[]}, 0x80) 2018/03/06 00:08:19 executing program 5: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={0xffffffffffffff9c}) r1 = socket$kcm(0x29, 0x2, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001180)={0xe, 0xd, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x9, 0x1, 0x0, 0x1}, @generic={0xebc, 0xd1, 0x800, 0x9}, @exit={0x95}, @call={0x85, 0x0, 0x0, 0x2e}, @map={0x18, 0x0, 0x1, 0x0, 0xffffffffffffff9c}], {0x95}}, &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x1000, &(0x7f0000000180)=""/4096, 0x41100, 0x1}, 0x48) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000100)={r1, r2}) socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r3, &(0x7f0000001240)={0x0, 0xfffffffffffffe9e, &(0x7f0000001140)=[], 0x0, &(0x7f0000001200)=ANY=[@ANYBLOB="1000000000000000000000000000000000000000"], 0x14}, 0x0) 2018/03/06 00:08:19 executing program 4: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000180)) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000000080)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f00000000c0)='./file0\x00', r0}, 0x10) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000140)) 2018/03/06 00:08:19 executing program 1: perf_event_open(&(0x7f0000940000)={0x2, 0x78, 0xd68, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='rootfs\x00', 0x1000, &(0x7f00000002c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000001c0)={&(0x7f0000000140)='./file1\x00'}, 0x10) mount(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='nsfs\x00', 0x20, &(0x7f0000000140)) 2018/03/06 00:08:19 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f00000001c0)) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000280)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0xfffffffffffffda7) r1 = socket$kcm(0x29, 0x7, 0x0) recvmsg(r1, &(0x7f00000028c0)={&(0x7f0000002740)=@hci={0x0, 0x0}, 0x80, &(0x7f0000002800)=[{&(0x7f00000027c0)=""/9, 0x9}], 0x1, &(0x7f0000002840)=""/117, 0x75, 0xfc5}, 0x100) sendmsg$kcm(r1, &(0x7f0000000b40)={&(0x7f0000000780)=@ll={0x11, 0xf7, r2, 0x1, 0x97, 0x6, @empty}, 0xfffffffffffffe1a, &(0x7f0000000240)=[{&(0x7f0000000800)="7ee1b0c9d1795e4c08ec24d549b8001687701df8b1b1bb0dc9b88e1e3c3a9dd26917126daf8ea71471e868b7b133e4fd9063a14ea39ab713b464acb65cc3cbf659e8e21a0f7e865c", 0x48}, {&(0x7f0000000880)="57ad4014ee64bd919801e6041daadbac4a016d0c70a73ad8cb2b98621f4409fa4bcf7c6718d9f8fe5ff9eea9a365700abd6ccc77fe2df68af33af83557f5ab15824d81b7769945319f3a428423e580f5492496d2c65659e50d517a4eea4293ae870f96ca43d1c41ea4422806a27586ea24055ed0b015f82c151822e53ab43ed9b20c5b7be409ccb366bd39288cbc49d9fb940ce2061dc8e0199e88366aa2fb00fa446114531665f4ab6616d7be60a60fa1f2be6169cff0b157566b09474a0daa8beedd8b17952d4a47", 0xc9}], 0x2, &(0x7f00000009c0)=[{0x78, 0x197, 0x9, "7726fad24c43c8fe028dc623fa00266265ca1a382705bcbd08e8302b92ef34e1563963f582763e1e689ed3bc654a8866fadecf64057192c3c6ca52723c278478188aebe289b673162a4850bdaa29ee9907b918527b8582b442015ad082d8a892f2858c"}, {0x28, 0x29, 0x7fff, "ffd79bdbc64ba82c80e1c46d2c80d3fe112572"}, {0x40, 0x114, 0x10001, "9cd1568c54a1f552bd1d1f784eec520bbae70248747d07c0c49d2c55a5e4367aba25ae0bf243a8f291bd378bc5c7c3"}, {0x78, 0x88, 0xff, "c74bf062faf246824ce2d534078f1256995b17f074b4feca64bf139ea3ac8cf008902d20c0e426db7db753e2ddf08ee9379cf302c9b5fb8a513eed34fd3913576ad4ccf6a2c4d3a41165fa6cd18aaacee6651ff24147ca6472a330b667f7e0933cfb9f0f5f"}], 0x158}, 0x4000) mount(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='cifs\x00', 0x140025, &(0x7f00000001c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000000)={&(0x7f0000000040)='./file0/file0\x00', 0x0, 0x8}, 0x10) socketpair(0x3, 0x5, 0x3f, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000200)={r3, r4, 0x7, 0x3}, 0x10) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000400)={r3, &(0x7f00000002c0)="f665ca0f5914c2d7690fdbd22a629431c73300c0a50cc4ede9637ad8ce6e5c688dfb5851506781b48fbdc9c4f39fafb65a6351bc1d60c8b0c987c6e9c14ee2fdf7ea5307ca9a099c6dafc94c7bd40a978c519e6e8d640401a9908bac073897f53bec07321bb9bb30b2858e000b317a6aedaba94599752fb20125f326fdd750e8f9878fd4a7e2d94623815414b901f01ed8ad1f064aece1a5caa0110b6e7583fd9063132a00f0c49be473b8a525", &(0x7f0000000380)=""/114}, 0x18) 2018/03/06 00:08:19 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)={&(0x7f0000000000)='./file0/file0\x00', r0}, 0x10) socketpair$unix(0x1, 0xc4b3192cec419f9, 0x0, &(0x7f0000000180)) mount(&(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) 2018/03/06 00:08:19 executing program 7: perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001840)='./file0\x00', 0x0) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='selinuxfs\x00', 0x1000, &(0x7f0000000100)) mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000180)="070000c80000000000", 0x20020, 0x0) 2018/03/06 00:08:19 executing program 0: r0 = getpid() r1 = socket$kcm(0x29, 0x0, 0x0) socketpair$inet(0x2, 0x800, 0x4, &(0x7f0000002280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f00000022c0)={r2}) getpid() r3 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0x0, 0xffffffffffffffff}) recvmsg(r4, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000005040)=[], 0x0, &(0x7f0000005100)=""/93, 0x5d}, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000240)='./file0\x00', 0x0, 0x8}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r3, &(0x7f0000000040)="48be386c997020df47eb0bf5cd462aa01e67c840230ea14c87cf6901de570cdf5230e22767ffb435ebe03e77d0d57139b497a78ed7a000bc26d41c7aa55c3e2ba529225d1bb395210048768cc802a80f7f744238b38ab210ce363385a061d46206c8c7137bf21b91a737ba3da7f468d1c6e48fd122fd715097bd1eaae62290e71aa453440e788e2cfb50a1e5e50a17da902f61c9f6669382a28f0120e61886c3fc54cb855cd0f91c4eb359fa38d9c3becc", &(0x7f0000000100)="6909566f176a4876f356f6cb269d88d58bc14aa68928cb2edfaa0f011e1cd9389809967d2112d348f99025a061facbe652abb417daa8e8c43b87b99b0cdffebedade19d27ef42ef455b37d0bb6c8fa6e5e2cf4e24ca4e37ad774cea2665f3d29c4d037db0ad841fff25d620110d04817d4486c031e3b8d3dd06c6d4c670af63fbe4cf758521d9551c1cad13fd1b39dfc40d84b9d7bbb373b83c6a5658b301e95aebe39cab68784d34f7cdbb6bcf84c7522e9d3d6b7e90a2b74f724a0cfe492c2097b6836828e708a31e0a7297f0b54d10b84e251cb23a0c7e500b5d830a0844622d788372f64eac67ba6fc", 0x3}, 0x20) recvmsg(r4, &(0x7f00000018c0)={0x0, 0x0, &(0x7f0000001780)=[{&(0x7f00000002c0)=""/27, 0x1b}, {&(0x7f0000000300)=""/29, 0x1d}, {&(0x7f0000000340)=""/178, 0xb2}, {&(0x7f0000000400)=""/67, 0x43}, {&(0x7f0000000480)=""/71, 0x47}, {&(0x7f0000000500)=""/4096, 0x1000}, {&(0x7f0000001500)=""/234, 0xea}, {&(0x7f0000001600)=""/198, 0xc6}, {&(0x7f0000001700)=""/113, 0x71}], 0x9, &(0x7f0000001840)=""/88, 0x58, 0x5}, 0x2) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001940)={r5, 0x28, &(0x7f0000001900)}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000001980)={r4}) sendmsg$kcm(r6, &(0x7f0000001dc0)={&(0x7f00000019c0)=@pppol2tpv3={0x18, 0x1, {0x0, r5, {0x2, 0x4e20, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x1, 0x4, 0x1, 0x2}}, 0x80, &(0x7f0000001b40)=[{&(0x7f0000001a40)="d512292375493aea5414def2d09f86ac1e2b908254273256ae49688a2e1fde1812a19279a096a77bd524c18d98318a205e86530b09cb0304f200c7b92908309e2262cde85a0752e0dd17b3e3a9ab859f779f401a6d423fe17e5ac3e162d56da93777da768e7d4e0c1f2689f9e275aa3df19d1cc7a210cdb41a6ff1ed83a273977146ff52b711996f25ecbbc982d08c6db541d0542a6cd8d145453eced55900c689a98518908bee1ec0a36efb5de487f127570ac499b453b737813524c3eee23b598c15399527d7cebf61484139aa08550878f54feb6064b3326cc308da2911d473c5fce446160ec90767af35f44673740ea3b85f", 0xf4}], 0x1, &(0x7f0000001b80)=[{0xe8, 0x3a, 0xba4, "37ed89f85d8ff35ab03aa3ac6cf3e903077ed6f354f0b34e833c1ec582d25102a668f723ca98b5ec722d5a65fbe9f054a085d70297b74c1d3b96d60435a85bebc3247877186b0fe9408606216182bbb8b38eb22b4623937a14f3bcf449005aaedbc3e112a7ca119df072a09ba02330bc4a2af36a340b056c9babe2b54c6126fbc990bfc7b19d98ac32fb69ecd9f625e2d131335f3a197a79bec64d642157915508b654e0450972c98b60a65d902f2b736f00be8d2ca16581d259f38a07eeda685ab9bdebc8fbe11189e57dc9b9f1806f9d336a"}, {0x68, 0x0, 0x5, "c88c07b2bb4097d58b059dbb32a37974b66ab8a6707dbc8a4682d73ace2d2963ca3c7eb257542c3901017ec2e89f24d7e0a45b7a2f850199eae2eccb8a04d4e14a9c7245997118638838dd306862a769107ca1569ead"}, {0x38, 0x110, 0x4, "ae61cb59570941b8892a4d52342a5c499a971f1c0cee02e6fb8a735d6faed31f7b1537"}, {0xa8, 0x1ff, 0x3, "42a1672ceb312feb136856147a271e917fb4b2c4c336ebc09ae50930c7f934dd6dd5aae77a06d25cc2cca39d60655b04998afc58f2ca2b38853f18312e5d6772d20499f7d17075f894c1c46335abed361406c8a605eafd7e0d9a4bc7ef7ab4cf9dc7f98cf630fcca8b9fe26bd3ff0c88f1602a387fc2554504a2abccb68043ebe9c37dcdd706e5ad6fa7d14adb8a08fc793a3f"}], 0x230, 0x881}, 0x8804) 2018/03/06 00:08:19 executing program 4: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000180)) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000000080)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f00000000c0)='./file0\x00', r0}, 0x10) 2018/03/06 00:08:19 executing program 5: recvmsg(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f00000001c0)=@can, 0x10, &(0x7f0000002000)=[{&(0x7f0000000040)=""/237, 0xed}, {&(0x7f0000000200)=""/37, 0x64}], 0x2}, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x3, &(0x7f0000002000)=@framed={{0x18}, [], {0x95}}, &(0x7f000001bff6)='syzkaller\x00', 0x1, 0xc3, &(0x7f0000000240)=""/195}, 0x48) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000340)={r1, r0}) r2 = perf_event_open(&(0x7f0000000140)={0x5, 0x78, 0x9, 0xd, 0x100, 0x4, 0x0, 0x0, 0x10000, 0x1, 0x9, 0x4, 0x1, 0x7fffffff, 0x5c, 0x1f, 0x9, 0x9, 0x7, 0x3, 0x4b, 0xa00000000000000, 0x7f, 0x401, 0xfffffffffffffffc, 0x962, 0x100000000, 0x4, 0x80000000, 0x5, 0x0, 0x4, 0x6, 0x3f, 0x5, 0x7, 0xcc1, 0xffffffffffffffff, 0x0, 0x4, 0x6, @perf_config_ext={0x1, 0x6000000000000000}, 0x800, 0xf77, 0x7, 0x3, 0x1f6, 0x3, 0x10001}, 0xffffffffffffffff, 0x6, 0xffffffffffffff9c, 0x2) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000440)={r1, r0}) r3 = perf_event_open(&(0x7f00000003c0)={0x1, 0x78, 0x7, 0xffff, 0x720f, 0x3, 0x0, 0xe7b, 0x100, 0x4, 0x3, 0x6, 0x6, 0x3d7, 0x7, 0xffffffffffff5eed, 0x0, 0x0, 0x3f2c000000, 0x5, 0xec65, 0x7fb, 0x7806, 0x2, 0x6, 0x0, 0xfffffffffffff3b6, 0x2, 0xc8, 0xe68a, 0x1ff, 0x1, 0x9000000000000000, 0x8d, 0x2, 0xfffffffffffffffa, 0x40, 0x3f, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000380), 0x1}, 0x4, 0x2, 0x1526, 0x7, 0x506, 0x6, 0x6}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) [ 73.131865] EXT4-fs (sda1): re-mounted. Opts: (null) [ 73.137504] EXT4-fs (sda1): Unrecognized mount option "./file1" or missing value 2018/03/06 00:08:19 executing program 1: perf_event_open(&(0x7f0000940000)={0x2, 0x78, 0xd68, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000001c0)={&(0x7f0000000140)='./file1\x00'}, 0x10) mount(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='nsfs\x00', 0x20, &(0x7f0000000140)) 2018/03/06 00:08:19 executing program 3: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x78, 0xd68, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000140)={0x1, 0x0, [0x0]}) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='rootfs\x00', 0x1000, &(0x7f00000002c0)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='nsfs\x00', 0x20, &(0x7f0000000140)) 2018/03/06 00:08:19 executing program 7: perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001840)='./file0\x00', 0x0) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='selinuxfs\x00', 0x1000, &(0x7f0000000100)) mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000180)="070000c80000000000", 0x20020, 0x0) 2018/03/06 00:08:19 executing program 4: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000180)) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000000080)) 2018/03/06 00:08:19 executing program 5: recvmsg(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f00000001c0)=@can, 0x10, &(0x7f0000002000)=[{&(0x7f0000000040)=""/237, 0xed}, {&(0x7f0000000200)=""/37, 0x64}], 0x2}, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x3, &(0x7f0000002000)=@framed={{0x18}, [], {0x95}}, &(0x7f000001bff6)='syzkaller\x00', 0x1, 0xc3, &(0x7f0000000240)=""/195}, 0x48) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000340)={r1, r0}) r2 = perf_event_open(&(0x7f0000000140)={0x5, 0x78, 0x9, 0xd, 0x100, 0x4, 0x0, 0x0, 0x10000, 0x1, 0x9, 0x4, 0x1, 0x7fffffff, 0x5c, 0x1f, 0x9, 0x9, 0x7, 0x3, 0x4b, 0xa00000000000000, 0x7f, 0x401, 0xfffffffffffffffc, 0x962, 0x100000000, 0x4, 0x80000000, 0x5, 0x0, 0x4, 0x6, 0x3f, 0x5, 0x7, 0xcc1, 0xffffffffffffffff, 0x0, 0x4, 0x6, @perf_config_ext={0x1, 0x6000000000000000}, 0x800, 0xf77, 0x7, 0x3, 0x1f6, 0x3, 0x10001}, 0xffffffffffffffff, 0x6, 0xffffffffffffff9c, 0x2) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000440)={r1, r0}) r3 = perf_event_open(&(0x7f00000003c0)={0x1, 0x78, 0x7, 0xffff, 0x720f, 0x3, 0x0, 0xe7b, 0x100, 0x4, 0x3, 0x6, 0x6, 0x3d7, 0x7, 0xffffffffffff5eed, 0x0, 0x0, 0x3f2c000000, 0x5, 0xec65, 0x7fb, 0x7806, 0x2, 0x6, 0x0, 0xfffffffffffff3b6, 0x2, 0xc8, 0xe68a, 0x1ff, 0x1, 0x9000000000000000, 0x8d, 0x2, 0xfffffffffffffffa, 0x40, 0x3f, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000380), 0x1}, 0x4, 0x2, 0x1526, 0x7, 0x506, 0x6, 0x6}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) 2018/03/06 00:08:19 executing program 2: socketpair$inet6_icmp(0xa, 0x2, 0x3a, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0), 0x4) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000200)={r1, r2, 0x3, 0x3}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000002c0)={r1}) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000300)={r0}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000240)='./file0\x00', 0x0, 0x18}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x9, 0x2, &(0x7f0000dbc000)=ANY=[@ANYBLOB="85009579ce83bde9b468b1f8699f0002000000"], &(0x7f0000000000)='\x00\x00\x00\x00', 0x1, 0x2e3, &(0x7f00000000c0)=""/153}, 0x48) 2018/03/06 00:08:19 executing program 0: r0 = getpid() r1 = socket$kcm(0x29, 0x0, 0x0) socketpair$inet(0x2, 0x800, 0x4, &(0x7f0000002280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f00000022c0)={r2}) getpid() r3 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0x0, 0xffffffffffffffff}) recvmsg(r4, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000005040)=[], 0x0, &(0x7f0000005100)=""/93, 0x5d}, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000240)='./file0\x00', 0x0, 0x8}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r3, &(0x7f0000000040)="48be386c997020df47eb0bf5cd462aa01e67c840230ea14c87cf6901de570cdf5230e22767ffb435ebe03e77d0d57139b497a78ed7a000bc26d41c7aa55c3e2ba529225d1bb395210048768cc802a80f7f744238b38ab210ce363385a061d46206c8c7137bf21b91a737ba3da7f468d1c6e48fd122fd715097bd1eaae62290e71aa453440e788e2cfb50a1e5e50a17da902f61c9f6669382a28f0120e61886c3fc54cb855cd0f91c4eb359fa38d9c3becc", &(0x7f0000000100)="6909566f176a4876f356f6cb269d88d58bc14aa68928cb2edfaa0f011e1cd9389809967d2112d348f99025a061facbe652abb417daa8e8c43b87b99b0cdffebedade19d27ef42ef455b37d0bb6c8fa6e5e2cf4e24ca4e37ad774cea2665f3d29c4d037db0ad841fff25d620110d04817d4486c031e3b8d3dd06c6d4c670af63fbe4cf758521d9551c1cad13fd1b39dfc40d84b9d7bbb373b83c6a5658b301e95aebe39cab68784d34f7cdbb6bcf84c7522e9d3d6b7e90a2b74f724a0cfe492c2097b6836828e708a31e0a7297f0b54d10b84e251cb23a0c7e500b5d830a0844622d788372f64eac67ba6fc", 0x3}, 0x20) recvmsg(r4, &(0x7f00000018c0)={0x0, 0x0, &(0x7f0000001780)=[{&(0x7f00000002c0)=""/27, 0x1b}, {&(0x7f0000000300)=""/29, 0x1d}, {&(0x7f0000000340)=""/178, 0xb2}, {&(0x7f0000000400)=""/67, 0x43}, {&(0x7f0000000480)=""/71, 0x47}, {&(0x7f0000000500)=""/4096, 0x1000}, {&(0x7f0000001500)=""/234, 0xea}, {&(0x7f0000001600)=""/198, 0xc6}, {&(0x7f0000001700)=""/113, 0x71}], 0x9, &(0x7f0000001840)=""/88, 0x58, 0x5}, 0x2) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001940)={r5, 0x28, &(0x7f0000001900)}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000001980)={r4}) sendmsg$kcm(r6, &(0x7f0000001dc0)={&(0x7f00000019c0)=@pppol2tpv3={0x18, 0x1, {0x0, r5, {0x2, 0x4e20, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x1, 0x4, 0x1, 0x2}}, 0x80, &(0x7f0000001b40)=[{&(0x7f0000001a40)="d512292375493aea5414def2d09f86ac1e2b908254273256ae49688a2e1fde1812a19279a096a77bd524c18d98318a205e86530b09cb0304f200c7b92908309e2262cde85a0752e0dd17b3e3a9ab859f779f401a6d423fe17e5ac3e162d56da93777da768e7d4e0c1f2689f9e275aa3df19d1cc7a210cdb41a6ff1ed83a273977146ff52b711996f25ecbbc982d08c6db541d0542a6cd8d145453eced55900c689a98518908bee1ec0a36efb5de487f127570ac499b453b737813524c3eee23b598c15399527d7cebf61484139aa08550878f54feb6064b3326cc308da2911d473c5fce446160ec90767af35f44673740ea3b85f", 0xf4}], 0x1, &(0x7f0000001b80)=[{0xe8, 0x3a, 0xba4, "37ed89f85d8ff35ab03aa3ac6cf3e903077ed6f354f0b34e833c1ec582d25102a668f723ca98b5ec722d5a65fbe9f054a085d70297b74c1d3b96d60435a85bebc3247877186b0fe9408606216182bbb8b38eb22b4623937a14f3bcf449005aaedbc3e112a7ca119df072a09ba02330bc4a2af36a340b056c9babe2b54c6126fbc990bfc7b19d98ac32fb69ecd9f625e2d131335f3a197a79bec64d642157915508b654e0450972c98b60a65d902f2b736f00be8d2ca16581d259f38a07eeda685ab9bdebc8fbe11189e57dc9b9f1806f9d336a"}, {0x68, 0x0, 0x5, "c88c07b2bb4097d58b059dbb32a37974b66ab8a6707dbc8a4682d73ace2d2963ca3c7eb257542c3901017ec2e89f24d7e0a45b7a2f850199eae2eccb8a04d4e14a9c7245997118638838dd306862a769107ca1569ead"}, {0x38, 0x110, 0x4, "ae61cb59570941b8892a4d52342a5c499a971f1c0cee02e6fb8a735d6faed31f7b1537"}, {0xa8, 0x1ff, 0x3, "42a1672ceb312feb136856147a271e917fb4b2c4c336ebc09ae50930c7f934dd6dd5aae77a06d25cc2cca39d60655b04998afc58f2ca2b38853f18312e5d6772d20499f7d17075f894c1c46335abed361406c8a605eafd7e0d9a4bc7ef7ab4cf9dc7f98cf630fcca8b9fe26bd3ff0c88f1602a387fc2554504a2abccb68043ebe9c37dcdd706e5ad6fa7d14adb8a08fc793a3f"}], 0x230, 0x881}, 0x8804) 2018/03/06 00:08:19 executing program 6: socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000800)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000d40)={&(0x7f0000000840)=@in={0x0, 0x0, @local}, 0x80, &(0x7f0000000000)=[{&(0x7f00000008c0)=""/162, 0xa2}, {&(0x7f0000000980)=""/229, 0xe5}, {&(0x7f0000000a80)=""/97, 0x61}, {&(0x7f0000000b00)=""/249, 0xf9}], 0x4, &(0x7f0000000c40)=""/237, 0xed}, 0x41) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000040)) socketpair(0x11, 0x80005, 0x3, &(0x7f0000000100)) 2018/03/06 00:08:19 executing program 1: perf_event_open(&(0x7f0000940000)={0x2, 0x78, 0xd68, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000001c0)={&(0x7f0000000140)='./file1\x00'}, 0x10) mount(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='nsfs\x00', 0x20, &(0x7f0000000140)) 2018/03/06 00:08:19 executing program 7: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x3, 0x4, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000005100)={0x6, 0x5, &(0x7f0000000040)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95}}, &(0x7f00000000c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f0000001240)=""/4096}, 0x7) bpf$PROG_LOAD(0x5, &(0x7f00000011c0)={0xc, 0x5, &(0x7f0000000000)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95}}, &(0x7f0000000180)='GPL\x00', 0xbeeb, 0x1000, &(0x7f00000001c0)=""/4096}, 0x48) 2018/03/06 00:08:19 executing program 4: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000180)) 2018/03/06 00:08:19 executing program 5: socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000000)) mount(&(0x7f0000000140)='.', &(0x7f0000000180)='.', &(0x7f00000001c0)='tmpfs\x00', 0x0, &(0x7f0000000200)="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") mkdir(&(0x7f0000000280)='.', 0x0) 2018/03/06 00:08:19 executing program 1: perf_event_open(&(0x7f0000940000)={0x2, 0x78, 0xd68, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000001c0)={&(0x7f0000000140)='./file1\x00'}, 0x10) mount(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='nsfs\x00', 0x20, &(0x7f0000000140)) 2018/03/06 00:08:19 executing program 2: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100)={&(0x7f00000000c0)='./file0\x00', 0x0, 0x8}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xf, 0x400000000000000, 0x3ffdcf, 0xa92, 0x0, r0}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) socket$kcm(0x29, 0x7, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x5, 0x78, 0x37, 0x1f, 0xc7, 0x8, 0x0, 0x3, 0x80, 0x8, 0x3f, 0x1, 0x1f000, 0xda, 0xff, 0x2, 0x1ff, 0x8, 0x4, 0x6, 0xf34, 0xf2, 0x1, 0xef21, 0x9, 0x5, 0x4, 0x8, 0x7, 0x9, 0xc84, 0x7f, 0x3, 0x80000001, 0x3800000, 0x1f3, 0x9, 0x10000, 0x0, 0x1ff, 0x5, @perf_config_ext={0x80000000, 0x9}, 0x10000, 0x2, 0x8, 0x7, 0x4, 0x1ff, 0x1}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x7) 2018/03/06 00:08:19 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x7f, 0x7, 0x5, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000040)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', 0x0, 0x8}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x5, 0x13, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x9f3}, [@ldst={0x2, 0x3, 0x2, 0x1, 0x0, 0xffffffff, 0xc}, @call={0x85, 0x0, 0x0, 0xb}, @ldst={0x3, 0x0, 0x1, 0x9, 0xa, 0xffffffcc, 0x9}, @exit={0x95}, @alu={0x4, 0x34b3dbb5, 0x4, 0x1, 0x8, 0xfffffffe, 0xffffffffffffffff}, @alu={0x4, 0x8001, 0xd, 0x1, 0x0, 0xfffffff4, 0x2563a40af438d669}, @call={0x85, 0x0, 0x0, 0x1e}, @ldst={0x0, 0x2, 0x7, 0xf, 0xb, 0xc, 0x1}], {0x95}}, &(0x7f0000000300)='syzkaller\x00', 0x3, 0x37, &(0x7f0000000340)=""/55, 0x41100, 0x1}, 0x48) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000400)={0x0, r1, 0x3, 0x3}, 0x14) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r0, &(0x7f0000000080)='L', &(0x7f00000000c0)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000040), &(0x7f0000000080)=""/145}, 0x18) 2018/03/06 00:08:19 executing program 7: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x3, 0x4, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000005100)={0x6, 0x5, &(0x7f0000000040)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95}}, &(0x7f00000000c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f0000001240)=""/4096}, 0x7) bpf$PROG_LOAD(0x5, &(0x7f00000011c0)={0xc, 0x5, &(0x7f0000000000)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95}}, &(0x7f0000000180)='GPL\x00', 0xbeeb, 0x1000, &(0x7f00000001c0)=""/4096}, 0x48) 2018/03/06 00:08:19 executing program 3: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x78, 0xd68, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000140)={0x1, 0x0, [0x0]}) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='rootfs\x00', 0x1000, &(0x7f00000002c0)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='nsfs\x00', 0x20, &(0x7f0000000140)) 2018/03/06 00:08:19 executing program 4 (fault-call:0 fault-nth:0): socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000180)) 2018/03/06 00:08:19 executing program 1: perf_event_open(&(0x7f0000940000)={0x2, 0x78, 0xd68, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='rootfs\x00', 0x1000, &(0x7f00000002c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000001c0)={&(0x7f0000000140)='./file1\x00'}, 0x10) mount(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='nsfs\x00', 0x20, &(0x7f0000000140)) 2018/03/06 00:08:19 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x649) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f00000000c0)={0x6, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) socketpair(0x9, 0x80f, 0xfff, &(0x7f0000000000)={0xffffffffffffffff}) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000080)={0x0, r1, 0x7}, 0x14) mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x0, &(0x7f00000e7000)) socketpair$inet6(0xa, 0x6, 0xf9, &(0x7f0000001480)) 2018/03/06 00:08:19 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x4, &(0x7f0000001fd8)=ANY=[@ANYBLOB="b40000000000000025000000000000010fa00000000000000000000000000000950000000000"], &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) socketpair(0x3, 0x1, 0x401, &(0x7f0000000080)={0xffffffffffffffff}) socketpair(0xa, 0x0, 0x7, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000100)={r1}) 2018/03/06 00:08:19 executing program 6: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x9, 0x5, &(0x7f0000346fc8)=ANY=[@ANYBLOB="18000000000000000000000000000000611001800000000020000000000000009500000000000000"], &(0x7f00000000c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000001780)=""/251}, 0x48) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000100)={&(0x7f0000000140)='./file0\x00', 0x0, 0x8}, 0x10) 2018/03/06 00:08:19 executing program 2: socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000540)={0xffffffffffffffff}) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000580), 0x4) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f00000005c0)=r1, 0xfffffffffffffe9c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0xff, 0x6, 0x9, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000001140)={r2, &(0x7f0000000040), &(0x7f0000000140)}, 0x20) recvmsg(0xffffffffffffff9c, &(0x7f0000000480)={&(0x7f0000000140)=@can={0x0, 0x0}, 0x80, &(0x7f0000000440)=[{&(0x7f0000000200)=""/240, 0xf0}, {&(0x7f0000000300)=""/123, 0x7b}, {&(0x7f0000000380)=""/129, 0x81}], 0x3, 0x0, 0x0, 0x7fffffff}, 0x40010021) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xf, 0x7, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000008000000000000000000010077870100f1ffffff0000000051530021a83a89ff0000000000000001000000009500000000000000"], &(0x7f0000000080)='GPL\x00', 0xfffffffffffffffd, 0x6f, &(0x7f00000000c0)=""/111, 0x41000, 0x0, [], r3}, 0x48) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r2, &(0x7f0000000040), &(0x7f0000000100), 0x1}, 0x20) [ 73.400886] tmpfs: No value for mount option 'ë éL' [ 73.410501] tmpfs: No value for mount option 'ë éL' [ 73.465995] FAULT_INJECTION: forcing a failure. [ 73.465995] name failslab, interval 1, probability 0, space 0, times 1 [ 73.477580] CPU: 1 PID: 7001 Comm: syz-executor4 Not tainted 4.16.0-rc2+ #24 [ 73.484773] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 73.494126] Call Trace: [ 73.496723] dump_stack+0x194/0x24d [ 73.500365] ? arch_local_irq_restore+0x53/0x53 [ 73.505065] should_fail+0x8c0/0xa40 [ 73.508802] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 73.513955] ? lock_pin_lock+0x360/0x360 [ 73.518039] ? lock_page_memcg+0x2af/0x380 [ 73.522299] ? find_held_lock+0x35/0x1d0 [ 73.526385] ? __lock_is_held+0xb6/0x140 [ 73.530496] ? trace_event_raw_event_sched_switch+0x810/0x810 [ 73.536416] ? rcu_note_context_switch+0x710/0x710 [ 73.541372] should_failslab+0xec/0x120 [ 73.545362] kmem_cache_alloc+0x47/0x760 [ 73.549435] ? alloc_set_pte+0x1102/0x1880 [ 73.553689] ? __might_sleep+0x95/0x190 [ 73.557690] __anon_vma_prepare+0xbc/0x6b0 [ 73.561943] ? anon_vma_fork+0x870/0x870 2018/03/06 00:08:19 executing program 1: perf_event_open(&(0x7f0000940000)={0x2, 0x78, 0xd68, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='rootfs\x00', 0x1000, &(0x7f00000002c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000001c0)={&(0x7f0000000140)='./file1\x00'}, 0x10) mount(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='nsfs\x00', 0x20, &(0x7f0000000140)) 2018/03/06 00:08:19 executing program 6: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x9, 0x5, &(0x7f0000346fc8)=ANY=[@ANYBLOB="18000000000000000000000000000000611001800000000020000000000000009500000000000000"], &(0x7f00000000c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000001780)=""/251}, 0x48) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000100)={&(0x7f0000000140)='./file0\x00', 0x0, 0x8}, 0x10) 2018/03/06 00:08:19 executing program 1: perf_event_open(&(0x7f0000940000)={0x2, 0x78, 0xd68, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='rootfs\x00', 0x1000, &(0x7f00000002c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000001c0)={&(0x7f0000000140)='./file1\x00'}, 0x10) mount(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='nsfs\x00', 0x20, &(0x7f0000000140)) 2018/03/06 00:08:19 executing program 6: perf_event_open(&(0x7f0000940000)={0x2, 0x78, 0xd68, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='rootfs\x00', 0x1000, &(0x7f00000002c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000001c0)={&(0x7f0000000140)='./file1\x00'}, 0x10) mount(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='nsfs\x00', 0x20, &(0x7f0000000140)) [ 73.566038] ? print_irqtrace_events+0x270/0x270 [ 73.570803] ? print_irqtrace_events+0x270/0x270 [ 73.575563] ? rb_insert_color+0x1580/0x1580 [ 73.579983] ? lockdep_on+0x50/0x50 [ 73.583630] do_huge_pmd_anonymous_page+0x1124/0x1b00 [ 73.588821] ? filemap_map_pages+0x919/0x15d0 [ 73.593330] ? __thp_get_unmapped_area+0x130/0x130 [ 73.598242] ? __lock_acquire+0x664/0x3e00 [ 73.602458] ? __lock_acquire+0x664/0x3e00 [ 73.606674] ? __is_insn_slot_addr+0x1fc/0x330 [ 73.611255] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 73.616430] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 73.621605] ? __lock_acquire+0x664/0x3e00 [ 73.625833] ? check_noncircular+0x20/0x20 [ 73.630056] ? __lock_is_held+0xb6/0x140 [ 73.634109] ? __lock_acquire+0x664/0x3e00 [ 73.638372] ? __lock_is_held+0xb6/0x140 [ 73.642433] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 73.647608] ? set_next_entity+0x2fb/0xcf0 [ 73.651834] __handle_mm_fault+0x18d7/0x3b60 [ 73.656236] ? __pmd_alloc+0x4e0/0x4e0 [ 73.660106] ? check_noncircular+0x20/0x20 [ 73.664339] ? find_held_lock+0x35/0x1d0 [ 73.668397] ? handle_mm_fault+0x35b/0xb00 [ 73.672617] ? lock_downgrade+0x980/0x980 [ 73.676772] ? handle_mm_fault+0x2f8/0xb00 [ 73.680999] handle_mm_fault+0x44a/0xb00 [ 73.685042] ? trace_event_raw_event_sched_switch+0x810/0x810 [ 73.690931] ? __handle_mm_fault+0x3b60/0x3b60 [ 73.695494] ? vmacache_find+0x5f/0x280 [ 73.699448] ? vmacache_update+0xfe/0x130 [ 73.703584] ? find_vma+0x30/0x150 [ 73.707120] __do_page_fault+0x5c9/0xc90 [ 73.711266] ? mm_fault_error+0x2c0/0x2c0 [ 73.715404] ? __lock_is_held+0xb6/0x140 [ 73.719448] ? check_noncircular+0x20/0x20 [ 73.723673] do_page_fault+0xee/0x730 [ 73.727460] ? __do_page_fault+0xc90/0xc90 [ 73.731685] ? find_held_lock+0x35/0x1d0 [ 73.735742] ? __might_fault+0x110/0x1d0 [ 73.739794] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 73.744631] page_fault+0x62/0x90 [ 73.748066] RIP: 0010:__put_user_4+0x1c/0x30 [ 73.752449] RSP: 0018:ffff8801b3cdfd08 EFLAGS: 00010293 [ 73.757800] RAX: 0000000000000014 RBX: 00007fffffffeffd RCX: 0000000020000180 [ 73.765054] RDX: 000000000000004d RSI: ffffc90004ef4000 RDI: 0000000000000282 [ 73.772309] RBP: ffff8801b3cdfe00 R08: 0000000000000000 R09: 1ffff1003679bf7e [ 73.779573] R10: ffff8801b3cdfbb8 R11: 0000000000000000 R12: 1ffff1003679bfa7 [ 73.786828] R13: 0000000000000014 R14: 0000000000000002 R15: 0000000000000015 [ 73.794120] ? SyS_socketpair+0xfd/0x6f0 [ 73.798174] ? SyS_socket+0x1d0/0x1d0 [ 73.801969] ? exit_to_usermode_loop+0x198/0x2f0 [ 73.806721] ? trace_event_raw_event_sys_exit+0x260/0x260 [ 73.812250] ? do_syscall_64+0xb6/0x940 [ 73.816220] ? SyS_socket+0x1d0/0x1d0 [ 73.820010] do_syscall_64+0x280/0x940 [ 73.823891] ? __do_page_fault+0xc90/0xc90 [ 73.828117] ? trace_event_raw_event_sys_exit+0x260/0x260 [ 73.833641] ? syscall_return_slowpath+0x550/0x550 [ 73.838559] ? syscall_return_slowpath+0x2ac/0x550 [ 73.843484] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 73.848842] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 73.853682] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 73.858862] RIP: 0033:0x453e69 [ 73.862037] RSP: 002b:00007f02ce7dbc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 73.869726] RAX: ffffffffffffffda RBX: 00007f02ce7dc6d4 RCX: 0000000000453e69 [ 73.876996] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 000000000000000a [ 73.884252] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 73.891504] R10: 0000000020000180 R11: 0000000000000246 R12: 0000000000000013 [ 73.898843] R13: 0000000000000602 R14: 00000000006f90d0 R15: 0000000000000000 2018/03/06 00:08:20 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='rootfs\x00', 0x1000, &(0x7f00000002c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000001c0)={&(0x7f0000000140)='./file1\x00'}, 0x10) mount(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='nsfs\x00', 0x20, &(0x7f0000000140)) 2018/03/06 00:08:20 executing program 6: perf_event_open(&(0x7f0000940000)={0x2, 0x78, 0xd68, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='rootfs\x00', 0x1000, &(0x7f00000002c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000001c0)={&(0x7f0000000140)='./file1\x00'}, 0x10) mount(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='nsfs\x00', 0x20, &(0x7f0000000140)) 2018/03/06 00:08:20 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x78, 0xd68, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='rootfs\x00', 0x1000, &(0x7f00000002c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000001c0)={&(0x7f0000000140)='./file1\x00'}, 0x10) mount(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='nsfs\x00', 0x20, &(0x7f0000000140)) 2018/03/06 00:08:20 executing program 5: socketpair(0x1e, 0x0, 0x1ff, &(0x7f0000000140)) 2018/03/06 00:08:20 executing program 3: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x78, 0xd68, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000140)={0x1, 0x0, [0x0]}) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='rootfs\x00', 0x1000, &(0x7f00000002c0)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='nsfs\x00', 0x20, &(0x7f0000000140)) 2018/03/06 00:08:20 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x649) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f00000000c0)={0x6, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) socketpair(0x9, 0x80f, 0xfff, &(0x7f0000000000)={0xffffffffffffffff}) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000080)={0x0, r1, 0x7}, 0x14) mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x0, &(0x7f00000e7000)) socketpair$inet6(0xa, 0x6, 0xf9, &(0x7f0000001480)) 2018/03/06 00:08:20 executing program 7: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x3, 0x4, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000005100)={0x6, 0x5, &(0x7f0000000040)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95}}, &(0x7f00000000c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f0000001240)=""/4096}, 0x7) bpf$PROG_LOAD(0x5, &(0x7f00000011c0)={0xc, 0x5, &(0x7f0000000000)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95}}, &(0x7f0000000180)='GPL\x00', 0xbeeb, 0x1000, &(0x7f00000001c0)=""/4096}, 0x48) 2018/03/06 00:08:20 executing program 4: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000180)) 2018/03/06 00:08:20 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x78, 0xd68, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='rootfs\x00', 0x1000, &(0x7f00000002c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000001c0)={&(0x7f0000000140)='./file1\x00'}, 0x10) mount(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='nsfs\x00', 0x20, &(0x7f0000000140)) 2018/03/06 00:08:20 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x649) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f00000000c0)={0x6, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) socketpair(0x9, 0x80f, 0xfff, &(0x7f0000000000)={0xffffffffffffffff}) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000080)={0x0, r1, 0x7}, 0x14) mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x0, &(0x7f00000e7000)) socketpair$inet6(0xa, 0x6, 0xf9, &(0x7f0000001480)) 2018/03/06 00:08:20 executing program 3: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x78, 0xd68, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000140)={0x1, 0x0, [0x0]}) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='rootfs\x00', 0x1000, &(0x7f00000002c0)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='nsfs\x00', 0x20, &(0x7f0000000140)) 2018/03/06 00:08:20 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='rootfs\x00', 0x0, &(0x7f00000002c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000001c0)={&(0x7f0000000140)='./file1\x00'}, 0x10) mount(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='nsfs\x00', 0x20, &(0x7f0000000140)) 2018/03/06 00:08:20 executing program 4: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) close(r0) 2018/03/06 00:08:20 executing program 6: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xe, 0x2000000006, 0x4, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x4]}, 0x2c) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) 2018/03/06 00:08:20 executing program 7: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x3, 0x4, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000005100)={0x6, 0x5, &(0x7f0000000040)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95}}, &(0x7f00000000c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f0000001240)=""/4096}, 0x7) bpf$PROG_LOAD(0x5, &(0x7f00000011c0)={0xc, 0x5, &(0x7f0000000000)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95}}, &(0x7f0000000180)='GPL\x00', 0xbeeb, 0x1000, &(0x7f00000001c0)=""/4096}, 0x48) 2018/03/06 00:08:20 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x78, 0xd68, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='rootfs\x00', 0x1000, &(0x7f00000002c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000001c0)={&(0x7f0000000140)='./file1\x00'}, 0x10) mount(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='nsfs\x00', 0x20, &(0x7f0000000140)) 2018/03/06 00:08:20 executing program 4: socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000000)) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000180)) 2018/03/06 00:08:20 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x649) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f00000000c0)={0x6, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) socketpair(0x9, 0x80f, 0xfff, &(0x7f0000000000)={0xffffffffffffffff}) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000080)={0x0, r1, 0x7}, 0x14) mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x0, &(0x7f00000e7000)) socketpair$inet6(0xa, 0x6, 0xf9, &(0x7f0000001480)) 2018/03/06 00:08:20 executing program 6: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) close(r0) 2018/03/06 00:08:20 executing program 7: bpf$PROG_LOAD(0x5, &(0x7f0000007000)={0x0, 0x3, &(0x7f0000009000)=@framed={{0x18}, [], {0x95}}, &(0x7f0000001000)='GPL\x00', 0x0, 0x3d, &(0x7f0000009000)=""/61}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000fd4)={0xe}, 0xfffffda3) 2018/03/06 00:08:20 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x649) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f00000000c0)={0x6, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) socketpair(0x9, 0x80f, 0xfff, &(0x7f0000000000)={0xffffffffffffffff}) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000080)={0x0, r1, 0x7}, 0x14) mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x0, &(0x7f00000e7000)) socketpair$inet6(0xa, 0x6, 0xf9, &(0x7f0000001480)) 2018/03/06 00:08:20 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x78, 0xd68, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='rootfs\x00', 0x1000, &(0x7f00000002c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000001c0)={&(0x7f0000000140)='./file1\x00'}, 0x10) 2018/03/06 00:08:20 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='rootfs\x00', 0x0, &(0x7f00000002c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000001c0)={&(0x7f0000000140)='./file1\x00'}, 0x10) mount(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='nsfs\x00', 0x20, &(0x7f0000000140)) 2018/03/06 00:08:20 executing program 3: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x78, 0xd68, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000140)={0x1, 0x0, [0x0]}) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='nsfs\x00', 0x20, &(0x7f0000000140)) 2018/03/06 00:08:20 executing program 4: socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000000)) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000180)) 2018/03/06 00:08:20 executing program 0: socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000000)) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000180)) 2018/03/06 00:08:20 executing program 6: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) close(r0) 2018/03/06 00:08:20 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='rootfs\x00', 0x0, &(0x7f00000002c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000001c0)={&(0x7f0000000140)='./file1\x00'}, 0x10) mount(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='nsfs\x00', 0x20, &(0x7f0000000140)) 2018/03/06 00:08:20 executing program 7: r0 = perf_event_open(&(0x7f0000000100)={0x7, 0x78, 0x12, 0x3, 0x1, 0xfffffffffffffff8, 0x0, 0x0, 0x100, 0xa, 0xffffffff, 0x80, 0x7ff, 0x1, 0x4, 0x6, 0xffffffff, 0x5, 0x200, 0x3, 0x9, 0x5, 0x1, 0x80000001, 0x3, 0x8, 0x1000, 0x1, 0x401, 0x3f9696d9, 0x4, 0xc64, 0xfff, 0x8001, 0x9, 0x3, 0x4, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000000), 0x2}, 0x9840, 0x5, 0x6, 0x7, 0x88b, 0x1, 0x8}, 0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000180)) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000240)) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00'}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x78, 0x0, 0x2000000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f00000000c0)='ppp1.&}[ppp0\x00') 2018/03/06 00:08:20 executing program 0: socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000000)) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000180)) 2018/03/06 00:08:20 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x78, 0xd68, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='rootfs\x00', 0x1000, &(0x7f00000002c0)) 2018/03/06 00:08:20 executing program 6: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) close(r0) 2018/03/06 00:08:20 executing program 4: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)=0xffffffff, 0x4) socketpair(0x1d, 0x803, 0x2, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) r2 = perf_event_open(&(0x7f0000001380)={0x0, 0x78, 0x5e, 0x100, 0xfffffffffffffff8, 0x2, 0x0, 0x5, 0x11, 0x4, 0x6, 0x0, 0x101, 0x80000001, 0x4, 0x2, 0x9, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0xaa4c, 0x2, 0x6, 0x3, 0x6000, 0x0, 0x9, 0x3, 0x1, 0x9b5, 0x10001, 0x6, 0x9, 0xacce, 0x4, 0x8, 0x5, 0x0, 0x2, 0x5, @perf_bp={&(0x7f0000001340), 0x8}, 0xa200, 0x2, 0x8, 0x5, 0x0, 0x7, 0xe0}, 0x0, 0xc8, 0xffffffffffffff9c, 0x1) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000001400)={0x4, 0x0, [0x0, 0x0, 0x0, 0x0]}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001440)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000001c0)}, 0x10) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001300)={r0, r0, 0x3, 0x1}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000012c0)={r0, 0x0, 0x6f, 0x1000, &(0x7f0000000240)="7e81ae6d0b10cc005286f763484c41d1fcf80bf1bc24985e942b379a89f5937b5ecede18cf146ec93bdfa67e718e133a9b8bb83161a0f01e272ce41059ab34aa2d926f487c4c32f5bfbcb32f55620d1639a82cd73bc403473b79cc7e7f7b7639faff8ac0be836513faa94568670e90", &(0x7f00000002c0)=""/4096, 0x1ff, 0x3}, 0x28) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) socketpair(0x4, 0x0, 0x8, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r3, r5, 0x1, 0x1}, 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r4, 0x2405, r4) 2018/03/06 00:08:20 executing program 3: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x78, 0xd68, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000140)={0x1, 0x0, [0x0]}) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='nsfs\x00', 0x20, &(0x7f0000000140)) 2018/03/06 00:08:20 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='rootfs\x00', 0x1000, &(0x7f00000002c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000001c0)={&(0x7f0000000140)='./file1\x00'}, 0x10) mount(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='nsfs\x00', 0x0, &(0x7f0000000140)) 2018/03/06 00:08:20 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x78, 0xd68, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/03/06 00:08:20 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x649) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f00000000c0)={0x6, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) socketpair(0x9, 0x80f, 0xfff, &(0x7f0000000000)={0xffffffffffffffff}) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000080)={0x0, r1, 0x7}, 0x14) mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x0, &(0x7f00000e7000)) socketpair$inet6(0xa, 0x6, 0xf9, &(0x7f0000001480)) 2018/03/06 00:08:20 executing program 0: socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000000)) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000180)) 2018/03/06 00:08:20 executing program 6: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) 2018/03/06 00:08:20 executing program 3: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x78, 0xd68, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000140)={0x1, 0x0, [0x0]}) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='nsfs\x00', 0x20, &(0x7f0000000140)) 2018/03/06 00:08:20 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='rootfs\x00', 0x1000, &(0x7f00000002c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000001c0)={&(0x7f0000000140)='./file1\x00'}, 0x10) mount(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='nsfs\x00', 0x0, &(0x7f0000000140)) 2018/03/06 00:08:20 executing program 4: socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000000)) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000140)) 2018/03/06 00:08:20 executing program 7: r0 = perf_event_open(&(0x7f0000000100)={0x7, 0x78, 0x12, 0x3, 0x1, 0xfffffffffffffff8, 0x0, 0x0, 0x100, 0xa, 0xffffffff, 0x80, 0x7ff, 0x1, 0x4, 0x6, 0xffffffff, 0x5, 0x200, 0x3, 0x9, 0x5, 0x1, 0x80000001, 0x3, 0x8, 0x1000, 0x1, 0x401, 0x3f9696d9, 0x4, 0xc64, 0xfff, 0x8001, 0x9, 0x3, 0x4, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000000), 0x2}, 0x9840, 0x5, 0x6, 0x7, 0x88b, 0x1, 0x8}, 0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000180)) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000240)) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00'}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x78, 0x0, 0x2000000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f00000000c0)='ppp1.&}[ppp0\x00') 2018/03/06 00:08:20 executing program 2: perf_event_open(&(0x7f0000940000)={0x0, 0x78, 0xd68, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/03/06 00:08:20 executing program 6: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000000)) 2018/03/06 00:08:20 executing program 3: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x78, 0xd68, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000140)={0x1, 0x0, [0x0]}) mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='rootfs\x00', 0x1000, &(0x7f00000002c0)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='nsfs\x00', 0x20, &(0x7f0000000140)) 2018/03/06 00:08:20 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='rootfs\x00', 0x1000, &(0x7f00000002c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000001c0)={&(0x7f0000000140)='./file1\x00'}, 0x10) mount(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='nsfs\x00', 0x0, &(0x7f0000000140)) 2018/03/06 00:08:20 executing program 6 (fault-call:0 fault-nth:0): socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000000)) 2018/03/06 00:08:20 executing program 0: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffff, 0x5, 0x18}, 0xc) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0, &(0x7f0000000100)="f5b4801e1d258b7dcda80d4155d3d68d5bc5f378199bd53c30658da965b3823e7d8e364c0f88f79f29b619a02e5aee4234dcd17cd24a0c98647547f893a8cea41ef733b9626005506a1a76693d06cfa92b5a5d82b476d744b2b74222f62bb11bf6700a0644508eebb22e33d4a122c667e388088f1b0fb57394bb12b9954c22d8fb11e426774958127d33ca28e244d40d7d16a565bcfa511f56f5bb91b6490980c9cc610dbc7119a9cb30e658c2fc11a601"}, 0x10) socketpair$inet_sctp(0x2, 0x40000000000005, 0x84, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r1}) bpf$MAP_CREATE(0x0, &(0x7f0000001180)={0x2, 0x4, 0x6879, 0xb, 0x0, 0xffffffffffffffff, 0x0, [0x4]}, 0x2c) 2018/03/06 00:08:20 executing program 4: socketpair(0x5, 0x6, 0x4, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f0000001780)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x1) gettid() ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f00000017c0)={r2}) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000180)) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)=0xfff, 0x4) 2018/03/06 00:08:20 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x78, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/03/06 00:08:20 executing program 7: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x1, 0x3, &(0x7f0000000040)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x5, 0x3c}, [], {0x95}}, &(0x7f0000000000)='GPL\x00', 0x1, 0x99, &(0x7f00000000c0)=""/153, 0x40f00}, 0x48) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000200)={r0, 0x0, 0x1, 0x6, &(0x7f0000000080)=[0x0, 0x0, 0x0], 0x3}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={r0, 0x50, &(0x7f0000000240)}, 0x10) 2018/03/06 00:08:20 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x649) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f00000000c0)={0x6, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) socketpair(0x9, 0x80f, 0xfff, &(0x7f0000000000)={0xffffffffffffffff}) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000080)={0x0, r1, 0x7}, 0x14) mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x0, &(0x7f00000e7000)) [ 74.448652] FAULT_INJECTION: forcing a failure. [ 74.448652] name failslab, interval 1, probability 0, space 0, times 0 [ 74.460348] CPU: 1 PID: 7173 Comm: syz-executor6 Not tainted 4.16.0-rc2+ #24 [ 74.467531] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 74.476869] Call Trace: [ 74.479446] dump_stack+0x194/0x24d [ 74.483094] ? arch_local_irq_restore+0x53/0x53 [ 74.487776] should_fail+0x8c0/0xa40 [ 74.491571] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 74.496663] ? lock_pin_lock+0x360/0x360 [ 74.500706] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 74.505892] ? lock_page_memcg+0x2af/0x380 [ 74.510121] ? find_held_lock+0x35/0x1d0 [ 74.514178] ? __lock_is_held+0xb6/0x140 [ 74.518251] ? trace_event_raw_event_sched_switch+0x810/0x810 [ 74.524127] ? rcu_note_context_switch+0x710/0x710 [ 74.529062] should_failslab+0xec/0x120 [ 74.533026] kmem_cache_alloc+0x47/0x760 [ 74.537070] ? alloc_set_pte+0x1102/0x1880 [ 74.541294] ? __might_sleep+0x95/0x190 [ 74.545266] __anon_vma_prepare+0xbc/0x6b0 [ 74.549492] ? anon_vma_fork+0x870/0x870 [ 74.553537] ? reacquire_held_locks+0x1f9/0x3e0 [ 74.558195] ? print_irqtrace_events+0x270/0x270 [ 74.562938] ? print_irqtrace_events+0x270/0x270 [ 74.567800] do_huge_pmd_anonymous_page+0x1124/0x1b00 [ 74.572977] ? filemap_map_pages+0x919/0x15d0 [ 74.577470] ? __thp_get_unmapped_area+0x130/0x130 [ 74.582381] ? __lock_acquire+0x664/0x3e00 [ 74.586604] ? __lock_acquire+0x664/0x3e00 [ 74.590830] ? __lock_is_held+0xb6/0x140 [ 74.594915] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 74.600097] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 74.605360] ? __lock_acquire+0x664/0x3e00 [ 74.609597] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 74.614790] ? __lock_acquire+0x664/0x3e00 [ 74.619007] ? check_noncircular+0x20/0x20 [ 74.623264] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 74.628458] __handle_mm_fault+0x18d7/0x3b60 [ 74.632876] ? __pmd_alloc+0x4e0/0x4e0 [ 74.636846] ? check_noncircular+0x20/0x20 [ 74.641071] ? check_noncircular+0x20/0x20 [ 74.645292] ? __fdget_pos+0x12b/0x190 [ 74.649181] ? find_held_lock+0x35/0x1d0 [ 74.653249] ? handle_mm_fault+0x35b/0xb00 [ 74.657475] ? lock_downgrade+0x980/0x980 [ 74.661641] ? handle_mm_fault+0x2f8/0xb00 [ 74.665874] handle_mm_fault+0x44a/0xb00 [ 74.669917] ? trace_event_raw_event_sched_switch+0x810/0x810 [ 74.675843] ? __handle_mm_fault+0x3b60/0x3b60 [ 74.680420] ? vmacache_find+0x5f/0x280 [ 74.684377] ? vmacache_update+0xfe/0x130 [ 74.688516] ? find_vma+0x30/0x150 [ 74.692051] __do_page_fault+0x5c9/0xc90 [ 74.696116] ? mm_fault_error+0x2c0/0x2c0 [ 74.700254] ? __lock_is_held+0xb6/0x140 [ 74.704308] ? __f_unlock_pos+0x19/0x20 [ 74.708269] ? check_noncircular+0x20/0x20 [ 74.712504] do_page_fault+0xee/0x730 [ 74.716305] ? __do_page_fault+0xc90/0xc90 [ 74.720540] ? find_held_lock+0x35/0x1d0 [ 74.724607] ? __might_fault+0x110/0x1d0 [ 74.728676] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 74.733537] page_fault+0x62/0x90 [ 74.736979] RIP: 0010:__put_user_4+0x1c/0x30 [ 74.741374] RSP: 0018:ffff8801af3c7d08 EFLAGS: 00010297 [ 74.746724] RAX: 0000000000000014 RBX: 00007fffffffeffd RCX: 0000000020000000 [ 74.753978] RDX: 000000000000004d RSI: ffffc90001540000 RDI: 0000000000000282 [ 74.761261] RBP: ffff8801af3c7e00 R08: 0000000000000000 R09: 1ffff10035e78f7e [ 74.768521] R10: ffff8801af3c7bb8 R11: 0000000000000000 R12: 1ffff10035e78fa7 [ 74.775781] R13: 0000000000000014 R14: 0000000000000002 R15: 0000000000000015 [ 74.783092] ? SyS_socketpair+0xfd/0x6f0 [ 74.787153] ? SyS_socket+0x1d0/0x1d0 [ 74.790947] ? SyS_write+0x184/0x220 [ 74.794655] ? SyS_read+0x220/0x220 [ 74.798275] ? do_syscall_64+0xb6/0x940 [ 74.802250] ? SyS_socket+0x1d0/0x1d0 [ 74.806049] do_syscall_64+0x280/0x940 [ 74.809923] ? __do_page_fault+0xc90/0xc90 [ 74.814145] ? _raw_spin_unlock_irq+0x27/0x70 [ 74.818629] ? finish_task_switch+0x1c1/0x7e0 [ 74.823110] ? syscall_return_slowpath+0x550/0x550 [ 74.828034] ? syscall_return_slowpath+0x2ac/0x550 [ 74.832959] ? prepare_exit_to_usermode+0x350/0x350 [ 74.837967] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 74.843331] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 74.848173] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 74.853348] RIP: 0033:0x453e69 [ 74.856523] RSP: 002b:00007f19f4a48c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 74.864218] RAX: ffffffffffffffda RBX: 00007f19f4a496d4 RCX: 0000000000453e69 [ 74.872079] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 000000000000000a [ 74.879340] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 74.886604] R10: 0000000020000000 R11: 0000000000000246 R12: 0000000000000013 [ 74.893866] R13: 0000000000000602 R14: 00000000006f90d0 R15: 0000000000000000 2018/03/06 00:08:21 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x649) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f00000000c0)={0x6, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) socketpair(0x9, 0x80f, 0xfff, &(0x7f0000000000)={0xffffffffffffffff}) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000080)={0x0, r1, 0x7}, 0x14) 2018/03/06 00:08:21 executing program 3: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x78, 0xd68, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000140)={0x1, 0x0, [0x0]}) mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='rootfs\x00', 0x1000, &(0x7f00000002c0)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='nsfs\x00', 0x20, &(0x7f0000000140)) 2018/03/06 00:08:21 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/03/06 00:08:21 executing program 1 (fault-call:3 fault-nth:0): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='rootfs\x00', 0x1000, &(0x7f00000002c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000001c0)={&(0x7f0000000140)='./file1\x00'}, 0x10) mount(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='nsfs\x00', 0x20, &(0x7f0000000140)) 2018/03/06 00:08:21 executing program 7: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x7e, 0x6, 0x1, 0x10000001, 0xffffffffffffffff, 0x2}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000000c0)={r0, &(0x7f0000000240), &(0x7f0000000080)=""/44}, 0xfffffffffffffea5) 2018/03/06 00:08:21 executing program 6 (fault-call:0 fault-nth:1): socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000000)) 2018/03/06 00:08:21 executing program 0: r0 = perf_event_open(&(0x7f000054df88)={0x2, 0x78, 0x0, 0x301, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x0) perf_event_open(&(0x7f0000271000)={0x20000000002, 0x78, 0x0, 0x80000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, r0, 0x0) perf_event_open(&(0x7f000057c000)={0x2, 0x78, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0xffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) 2018/03/06 00:08:21 executing program 4: socketpair(0x1d, 0x8000e, 0x1, &(0x7f0000000740)={0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000780)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f00000007c0)={r1}) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000001c0)) 2018/03/06 00:08:21 executing program 7: socketpair(0x0, 0x0, 0x1, &(0x7f0000000000)={0xffffffffffffffff}) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x0, 0x9, 0xfffffffffffffffe, 0x8001, 0x4, r0, 0x7}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x105d}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x7, 0x1f, 0x1, 0x1, 0x1}], {0x95}}, &(0x7f000031cff6)='syzkaller\x00', 0x5c6e, 0x438, &(0x7f00001a7f05)=""/251}, 0x48) [ 74.980300] FAULT_INJECTION: forcing a failure. [ 74.980300] name failslab, interval 1, probability 0, space 0, times 0 [ 74.991942] CPU: 1 PID: 7196 Comm: syz-executor6 Not tainted 4.16.0-rc2+ #24 [ 74.999129] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 75.008484] Call Trace: [ 75.011070] dump_stack+0x194/0x24d [ 75.014694] ? arch_local_irq_restore+0x53/0x53 [ 75.019376] should_fail+0x8c0/0xa40 [ 75.023089] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 75.028196] ? kasan_kmalloc+0xad/0xe0 [ 75.032068] ? kmem_cache_alloc+0x12e/0x760 [ 75.036399] ? __anon_vma_prepare+0xbc/0x6b0 [ 75.040799] ? do_huge_pmd_anonymous_page+0x1124/0x1b00 [ 75.046150] ? __handle_mm_fault+0x18d7/0x3b60 [ 75.050721] ? handle_mm_fault+0x44a/0xb00 [ 75.054955] ? __put_user_4+0x1c/0x30 [ 75.058752] ? do_syscall_64+0x280/0x940 [ 75.062801] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 75.068162] ? lock_page_memcg+0x2af/0x380 [ 75.072407] ? find_held_lock+0x35/0x1d0 [ 75.076485] ? __lock_is_held+0xb6/0x140 [ 75.080565] ? trace_event_raw_event_sched_switch+0x810/0x810 [ 75.086444] ? rcu_note_context_switch+0x710/0x710 [ 75.091419] should_failslab+0xec/0x120 [ 75.095402] kmem_cache_alloc+0x47/0x760 [ 75.099458] ? alloc_set_pte+0x1102/0x1880 [ 75.103702] __anon_vma_prepare+0x39d/0x6b0 [ 75.108020] ? anon_vma_fork+0x870/0x870 [ 75.112089] ? reacquire_held_locks+0x1f9/0x3e0 [ 75.116752] ? print_irqtrace_events+0x270/0x270 [ 75.121498] ? print_irqtrace_events+0x270/0x270 [ 75.126274] do_huge_pmd_anonymous_page+0x1124/0x1b00 [ 75.131454] ? filemap_map_pages+0x919/0x15d0 [ 75.135953] ? __thp_get_unmapped_area+0x130/0x130 [ 75.140874] ? __lock_acquire+0x664/0x3e00 [ 75.145100] ? __lock_acquire+0x664/0x3e00 [ 75.149320] ? __lock_is_held+0xb6/0x140 [ 75.153398] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 75.158580] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 75.163757] ? __lock_acquire+0x664/0x3e00 [ 75.167996] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 75.173202] ? __lock_acquire+0x664/0x3e00 [ 75.177430] ? check_noncircular+0x20/0x20 [ 75.181692] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 75.186908] __handle_mm_fault+0x18d7/0x3b60 [ 75.191320] ? __pmd_alloc+0x4e0/0x4e0 [ 75.195201] ? check_noncircular+0x20/0x20 [ 75.199424] ? check_noncircular+0x20/0x20 [ 75.203641] ? __fdget_pos+0x12b/0x190 [ 75.207530] ? find_held_lock+0x35/0x1d0 [ 75.211604] ? handle_mm_fault+0x35b/0xb00 [ 75.215834] ? lock_downgrade+0x980/0x980 [ 75.220005] ? handle_mm_fault+0x2f8/0xb00 [ 75.224256] handle_mm_fault+0x44a/0xb00 [ 75.228320] ? trace_event_raw_event_sched_switch+0x810/0x810 [ 75.234201] ? __handle_mm_fault+0x3b60/0x3b60 [ 75.238784] ? vmacache_find+0x5f/0x280 [ 75.242755] ? vmacache_update+0xfe/0x130 [ 75.246896] ? find_vma+0x30/0x150 [ 75.250434] __do_page_fault+0x5c9/0xc90 [ 75.254499] ? mm_fault_error+0x2c0/0x2c0 [ 75.258635] ? __lock_is_held+0xb6/0x140 [ 75.262691] ? __f_unlock_pos+0x19/0x20 [ 75.266659] ? check_noncircular+0x20/0x20 [ 75.270898] do_page_fault+0xee/0x730 [ 75.274693] ? __do_page_fault+0xc90/0xc90 [ 75.278946] ? find_held_lock+0x35/0x1d0 [ 75.283017] ? __might_fault+0x110/0x1d0 [ 75.287074] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 75.291922] page_fault+0x62/0x90 [ 75.295361] RIP: 0010:__put_user_4+0x1c/0x30 [ 75.299749] RSP: 0018:ffff8801ced7fd08 EFLAGS: 00010297 [ 75.305097] RAX: 0000000000000014 RBX: 00007fffffffeffd RCX: 0000000020000000 [ 75.312353] RDX: 000000000000004d RSI: ffffc90001540000 RDI: 0000000000000282 [ 75.319607] RBP: ffff8801ced7fe00 R08: 0000000000000000 R09: 1ffff10039daff7e [ 75.326857] R10: ffff8801ced7fbb8 R11: 0000000000000000 R12: 1ffff10039daffa7 [ 75.334107] R13: 0000000000000014 R14: 0000000000000002 R15: 0000000000000015 [ 75.341409] ? SyS_socketpair+0xfd/0x6f0 [ 75.345466] ? SyS_socket+0x1d0/0x1d0 [ 75.349262] ? SyS_write+0x184/0x220 [ 75.352969] ? SyS_read+0x220/0x220 [ 75.356588] ? do_syscall_64+0xb6/0x940 [ 75.360559] ? SyS_socket+0x1d0/0x1d0 [ 75.364347] do_syscall_64+0x280/0x940 [ 75.368221] ? __do_page_fault+0xc90/0xc90 [ 75.372442] ? _raw_spin_unlock_irq+0x27/0x70 [ 75.376927] ? finish_task_switch+0x1c1/0x7e0 [ 75.381412] ? syscall_return_slowpath+0x550/0x550 [ 75.386329] ? syscall_return_slowpath+0x2ac/0x550 [ 75.391505] ? prepare_exit_to_usermode+0x350/0x350 [ 75.396508] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 75.401868] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 75.406722] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 75.411894] RIP: 0033:0x453e69 [ 75.415064] RSP: 002b:00007f19f4a48c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 75.422758] RAX: ffffffffffffffda RBX: 00007f19f4a496d4 RCX: 0000000000453e69 [ 75.430010] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 000000000000000a [ 75.437268] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 75.444523] R10: 0000000020000000 R11: 0000000000000246 R12: 0000000000000013 [ 75.451778] R13: 0000000000000602 R14: 00000000006f90d0 R15: 0000000000000001 [ 75.462164] FAULT_INJECTION: forcing a failure. [ 75.462164] name failslab, interval 1, probability 0, space 0, times 0 [ 75.473474] CPU: 1 PID: 7193 Comm: syz-executor1 Not tainted 4.16.0-rc2+ #24 [ 75.480655] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 75.489992] Call Trace: [ 75.492569] dump_stack+0x194/0x24d [ 75.496183] ? arch_local_irq_restore+0x53/0x53 [ 75.500848] should_fail+0x8c0/0xa40 [ 75.504549] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 75.509639] ? lock_downgrade+0x980/0x980 [ 75.513781] ? get_pid_task+0xbc/0x140 [ 75.517658] ? proc_fail_nth_write+0x9b/0x1d0 [ 75.522136] ? map_files_get_link+0x3a0/0x3a0 [ 75.526622] ? find_held_lock+0x35/0x1d0 [ 75.530696] ? trace_event_raw_event_sched_switch+0x810/0x810 [ 75.536571] ? __lock_is_held+0xb6/0x140 [ 75.540620] ? rcu_note_context_switch+0x710/0x710 [ 75.545556] should_failslab+0xec/0x120 [ 75.549521] __kmalloc_track_caller+0x5f/0x760 [ 75.554095] ? strncpy_from_user+0x430/0x430 [ 75.558486] ? strndup_user+0x62/0xb0 [ 75.562280] memdup_user+0x2c/0x90 [ 75.565806] strndup_user+0x62/0xb0 [ 75.569421] SyS_mount+0x3c/0x120 [ 75.572856] ? copy_mnt_ns+0xb30/0xb30 [ 75.576729] do_syscall_64+0x280/0x940 [ 75.580600] ? __do_page_fault+0xc90/0xc90 [ 75.584817] ? _raw_spin_unlock_irq+0x27/0x70 [ 75.589296] ? finish_task_switch+0x1c1/0x7e0 [ 75.593775] ? syscall_return_slowpath+0x550/0x550 [ 75.598702] ? syscall_return_slowpath+0x2ac/0x550 [ 75.603615] ? prepare_exit_to_usermode+0x350/0x350 [ 75.608613] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 75.613967] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 75.618805] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 75.623975] RIP: 0033:0x453e69 2018/03/06 00:08:22 executing program 2 (fault-call:0 fault-nth:0): perf_event_open(&(0x7f0000940000)={0x2, 0x78, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/03/06 00:08:22 executing program 6 (fault-call:0 fault-nth:2): socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000000)) [ 75.627145] RSP: 002b:00007f6bcb4e9c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 75.634836] RAX: ffffffffffffffda RBX: 00007f6bcb4ea6d4 RCX: 0000000000453e69 [ 75.642089] RDX: 0000000020000100 RSI: 00000000200000c0 RDI: 0000000020000040 [ 75.649341] RBP: 000000000072bea0 R08: 0000000020000140 R09: 0000000000000000 [ 75.656595] R10: 0000000000000020 R11: 0000000000000246 R12: 0000000000000013 [ 75.663848] R13: 00000000000003eb R14: 00000000006f5ea8 R15: 0000000000000000 2018/03/06 00:08:22 executing program 7: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={0x0, 0x4, 0x8}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r0, &(0x7f0000000180)="51481bd49cba1fa39fe4451db2af6d02", &(0x7f00000001c0)=""/193}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1e, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, [], {0x95}}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x51, &(0x7f00000000c0)=""/81}, 0x48) recvmsg$kcm(0xffffffffffffffff, &(0x7f000000c300)={&(0x7f000000c0c0)=@can={0x0, 0x0}, 0x80, &(0x7f000000c280)=[{&(0x7f000000c140)=""/143, 0x8f}, {&(0x7f000000c200)=""/99, 0x63}], 0x2, &(0x7f000000c2c0)=""/37, 0x25, 0x17}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000c340)={0x4, 0x5, &(0x7f0000000300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x1}, [@ldst={0x0, 0x2, 0x6, 0x9, 0xa, 0x80, 0x4}], {0x95}}, &(0x7f0000000340)='syzkaller\x00', 0x3, 0x6f, &(0x7f0000000380)=""/111, 0x41100, 0x1, [], r1}, 0x48) 2018/03/06 00:08:22 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='rootfs\x00', 0x1000, &(0x7f00000002c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000001c0)={&(0x7f0000000140)='./file1\x00'}, 0x10) mount(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='nsfs\x00', 0x20, &(0x7f0000000140)) [ 75.689007] FAULT_INJECTION: forcing a failure. [ 75.689007] name failslab, interval 1, probability 0, space 0, times 0 [ 75.700566] CPU: 0 PID: 7214 Comm: syz-executor2 Not tainted 4.16.0-rc2+ #24 [ 75.707756] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 75.717197] Call Trace: [ 75.719795] dump_stack+0x194/0x24d [ 75.720796] FAULT_INJECTION: forcing a failure. [ 75.720796] name failslab, interval 1, probability 0, space 0, times 0 [ 75.723443] ? arch_local_irq_restore+0x53/0x53 [ 75.723499] should_fail+0x8c0/0xa40 [ 75.723524] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 75.748149] ? __lock_acquire+0x664/0x3e00 [ 75.752389] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 75.758181] ? find_held_lock+0x35/0x1d0 [ 75.762246] ? __lock_is_held+0xb6/0x140 [ 75.766323] ? trace_event_raw_event_sched_switch+0x810/0x810 [ 75.772628] ? print_irqtrace_events+0x270/0x270 [ 75.777380] ? rcu_note_context_switch+0x710/0x710 [ 75.782817] should_failslab+0xec/0x120 [ 75.787598] kmem_cache_alloc_trace+0x4b/0x740 [ 75.792186] ? __lock_acquire+0x664/0x3e00 [ 75.796427] perf_event_alloc+0x200/0x2b00 [ 75.801135] ? __perf_install_in_context+0x2d0/0x2d0 [ 75.806230] ? __might_sleep+0x95/0x190 [ 75.810200] ? SYSC_perf_event_open+0x1345/0x2f10 [ 75.815036] ? __mutex_lock+0x16f/0x1a80 [ 75.819088] ? SYSC_perf_event_open+0x1345/0x2f10 [ 75.823922] ? expand_files+0x4fd/0x910 [ 75.827904] ? mutex_lock_io_nested+0x1900/0x1900 [ 75.832749] ? perf_trace_lock_acquire+0xe3/0x980 [ 75.837578] ? __alloc_fd+0x29b/0x750 [ 75.841371] ? perf_trace_lock_acquire+0xe3/0x980 [ 75.846212] ? perf_trace_lock+0x900/0x900 [ 75.850454] ? check_noncircular+0x20/0x20 [ 75.854686] ? check_noncircular+0x20/0x20 [ 75.858919] ? _raw_spin_unlock+0x22/0x30 [ 75.863057] ? __alloc_fd+0x29b/0x750 [ 75.866874] ? find_held_lock+0x35/0x1d0 [ 75.870952] ? ptrace_may_access+0x3a/0x50 [ 75.875178] ? lock_downgrade+0x980/0x980 [ 75.879326] ? lock_release+0xa40/0xa40 [ 75.883285] ? lock_downgrade+0x980/0x980 [ 75.887425] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 75.892342] ? __ptrace_may_access+0x426/0x810 [ 75.897617] ? do_raw_spin_trylock+0x190/0x190 [ 75.902192] ? ptrace_getsiginfo+0x190/0x190 [ 75.907090] ? get_unused_fd_flags+0x121/0x190 [ 75.911684] SYSC_perf_event_open+0x842/0x2f10 [ 75.916267] ? find_held_lock+0x35/0x1d0 [ 75.920342] ? perf_event_set_output+0x5a0/0x5a0 [ 75.925097] ? __lock_is_held+0xb6/0x140 [ 75.929184] ? __sb_end_write+0xa0/0xd0 [ 75.933174] ? SyS_read+0x220/0x220 [ 75.936802] SyS_perf_event_open+0x39/0x50 [ 75.941029] ? perf_bp_event+0x2e0/0x2e0 [ 75.945084] do_syscall_64+0x280/0x940 [ 75.948962] ? __do_page_fault+0xc90/0xc90 [ 75.953185] ? _raw_spin_unlock_irq+0x27/0x70 [ 75.957673] ? finish_task_switch+0x1c1/0x7e0 [ 75.962175] ? syscall_return_slowpath+0x550/0x550 [ 75.967097] ? syscall_return_slowpath+0x2ac/0x550 [ 75.972023] ? prepare_exit_to_usermode+0x350/0x350 [ 75.977039] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 75.982405] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 75.987269] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 75.992445] RIP: 0033:0x453e69 [ 75.995620] RSP: 002b:00007f294ee07c68 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 76.003316] RAX: ffffffffffffffda RBX: 00007f294ee086d4 RCX: 0000000000453e69 [ 76.010570] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020940000 [ 76.017824] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 76.025082] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000013 [ 76.032337] R13: 0000000000000440 R14: 00000000006f66a0 R15: 0000000000000000 [ 76.039631] CPU: 1 PID: 7219 Comm: syz-executor6 Not tainted 4.16.0-rc2+ #24 [ 76.046820] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 76.056175] Call Trace: [ 76.058785] dump_stack+0x194/0x24d [ 76.062429] ? arch_local_irq_restore+0x53/0x53 [ 76.067109] ? is_bpf_text_address+0xa4/0x120 [ 76.071614] ? kernel_text_address+0x102/0x140 [ 76.076227] should_fail+0x8c0/0xa40 [ 76.079952] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 76.085064] ? save_stack+0xa3/0xd0 [ 76.088711] ? find_held_lock+0x35/0x1d0 [ 76.092764] ? __lock_is_held+0xb6/0x140 [ 76.096831] ? trace_event_raw_event_sched_switch+0x810/0x810 [ 76.102697] ? __anon_vma_prepare+0x34a/0x6b0 [ 76.107185] ? rcu_note_context_switch+0x710/0x710 [ 76.112118] should_failslab+0xec/0x120 [ 76.116083] kmem_cache_alloc+0x47/0x760 [ 76.120132] ? lock_release+0xa40/0xa40 [ 76.124102] __khugepaged_enter+0xbd/0x540 [ 76.128316] ? up_read+0x40/0x40 [ 76.131667] ? khugepaged+0x14f0/0x14f0 [ 76.135643] ? __anon_vma_prepare+0x34f/0x6b0 [ 76.140123] ? anon_vma_fork+0x870/0x870 [ 76.144186] ? print_irqtrace_events+0x270/0x270 [ 76.148943] do_huge_pmd_anonymous_page+0x10d6/0x1b00 [ 76.154121] ? filemap_map_pages+0x919/0x15d0 [ 76.158606] ? __thp_get_unmapped_area+0x130/0x130 [ 76.163531] ? __lock_acquire+0x664/0x3e00 [ 76.167781] ? __lock_acquire+0x664/0x3e00 [ 76.172005] ? __lock_is_held+0xb6/0x140 [ 76.176087] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 76.181264] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 76.186434] ? __lock_acquire+0x664/0x3e00 [ 76.190681] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 76.195866] ? __lock_acquire+0x664/0x3e00 [ 76.200091] ? perf_trace_lock_acquire+0xe3/0x980 [ 76.204920] ? perf_trace_lock_acquire+0xe3/0x980 [ 76.209758] ? perf_trace_lock+0x900/0x900 [ 76.213983] ? perf_trace_lock+0x900/0x900 [ 76.218217] __handle_mm_fault+0x18d7/0x3b60 [ 76.222615] ? __pmd_alloc+0x4e0/0x4e0 [ 76.226481] ? check_noncircular+0x20/0x20 [ 76.230698] ? check_noncircular+0x20/0x20 [ 76.234912] ? __fdget_pos+0x12b/0x190 [ 76.238785] ? find_held_lock+0x35/0x1d0 [ 76.242838] ? handle_mm_fault+0x35b/0xb00 [ 76.247059] ? lock_downgrade+0x980/0x980 [ 76.251205] ? handle_mm_fault+0x2f8/0xb00 [ 76.255436] handle_mm_fault+0x44a/0xb00 [ 76.259492] ? trace_event_raw_event_sched_switch+0x810/0x810 [ 76.265370] ? __handle_mm_fault+0x3b60/0x3b60 [ 76.269932] ? vmacache_find+0x5f/0x280 [ 76.273886] ? vmacache_update+0xfe/0x130 [ 76.278035] ? find_vma+0x30/0x150 [ 76.281572] __do_page_fault+0x5c9/0xc90 [ 76.285628] ? mm_fault_error+0x2c0/0x2c0 [ 76.289779] ? __lock_is_held+0xb6/0x140 [ 76.293835] ? __f_unlock_pos+0x19/0x20 [ 76.297797] ? check_noncircular+0x20/0x20 [ 76.302043] do_page_fault+0xee/0x730 [ 76.305842] ? __do_page_fault+0xc90/0xc90 [ 76.310072] ? find_held_lock+0x35/0x1d0 [ 76.314120] ? __might_fault+0x110/0x1d0 [ 76.318166] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 76.322998] page_fault+0x62/0x90 [ 76.326440] RIP: 0010:__put_user_4+0x1c/0x30 [ 76.330822] RSP: 0018:ffff8801af227d08 EFLAGS: 00010297 [ 76.336180] RAX: 0000000000000014 RBX: 00007fffffffeffd RCX: 0000000020000000 [ 76.343429] RDX: 000000000000004d RSI: ffffc90001540000 RDI: 0000000000000282 [ 76.350677] RBP: ffff8801af227e00 R08: 0000000000000000 R09: 1ffff10035e44f7e [ 76.357924] R10: ffff8801af227bb8 R11: 0000000000000000 R12: 1ffff10035e44fa7 [ 76.365172] R13: 0000000000000014 R14: 0000000000000002 R15: 0000000000000015 [ 76.372536] ? SyS_socketpair+0xfd/0x6f0 [ 76.376583] ? SyS_socket+0x1d0/0x1d0 [ 76.380360] ? SyS_write+0x184/0x220 [ 76.384069] ? SyS_read+0x220/0x220 [ 76.387684] ? do_syscall_64+0xb6/0x940 [ 76.391643] ? SyS_socket+0x1d0/0x1d0 [ 76.395434] do_syscall_64+0x280/0x940 [ 76.399301] ? __do_page_fault+0xc90/0xc90 [ 76.403513] ? _raw_spin_unlock_irq+0x27/0x70 [ 76.408177] ? finish_task_switch+0x1c1/0x7e0 [ 76.412666] ? syscall_return_slowpath+0x550/0x550 [ 76.417578] ? syscall_return_slowpath+0x2ac/0x550 [ 76.422488] ? prepare_exit_to_usermode+0x350/0x350 [ 76.427489] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 76.432838] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 76.437672] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 76.442840] RIP: 0033:0x453e69 [ 76.446007] RSP: 002b:00007f19f4a48c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 76.453706] RAX: ffffffffffffffda RBX: 00007f19f4a496d4 RCX: 0000000000453e69 [ 76.460961] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 000000000000000a [ 76.468218] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 76.475467] R10: 0000000020000000 R11: 0000000000000246 R12: 0000000000000013 [ 76.482976] R13: 0000000000000602 R14: 00000000006f90d0 R15: 0000000000000002 2018/03/06 00:08:22 executing program 2 (fault-call:0 fault-nth:1): perf_event_open(&(0x7f0000940000)={0x2, 0x78, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/03/06 00:08:22 executing program 4: r0 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={r0, 0xfffffffffffffe09, &(0x7f0000000200)={0x0, 0x0}}, 0x7a) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0x2c, 0xa3, &(0x7f0000000080)="d547679287b86b7ba1547eb1619404501fe5fa86a5aa22c0db9ca70bfebe529b07f151a060b424e5fbdc2ebd", &(0x7f00000000c0)=""/163, 0x7, 0x7fffffff}, 0x28) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000001c0)) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000002c0)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)=r1, 0x4) 2018/03/06 00:08:22 executing program 7: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000013000)={0x4, 0x2000000100000080, 0x7, 0x1000000000000008}, 0x2c) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000000), 0x4) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f000000b000)={r0, &(0x7f0000014000)='A\b', &(0x7f0000012000)}, 0x20) socketpair(0x8, 0x0, 0x19de, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='affs\x00', 0x8000, &(0x7f00000001c0)="96d0f55bece04d4f7321f106c3e6bbc136fba2eb95e22fa7b9bc275d916acc632733bce56b4ac8f6d068f219782736118c2f9452eb5ddea23c1283470d36a860208274a4ebcfcfe52054975c6be9ddabf5f6a32087c69fb8ea03a8ca") ioctl$PERF_EVENT_IOC_DISABLE(r1, 0x2401, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f000000b000)={r0, &(0x7f0000000040)="bd662e4b11852616275e500feaba664c9d3d395a7674c38cc168bd4fb530f2efff2a0b0b3baa446b061ef9acd32d168d9152a11c10d472ba368d771adc07d2de41a3cd932d9af6ba26d491cb09ad3e4827cc425d970e72cb1a3e32a709c5ff63a58cedf0667169d64acbe42c", &(0x7f000000cff6), 0xfffffffffffffffe}, 0x4a) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f000000a000)={r0, &(0x7f0000008000), &(0x7f0000016f02)=""/254}, 0x18) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000280)={&(0x7f0000000240)='./file0\x00', 0x0, 0x8}, 0x10) 2018/03/06 00:08:22 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x7f, 0x7, 0x5, 0x1}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r0, 0x28, &(0x7f0000000000)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000000c0)={r1}, 0xc) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f00000000c0), &(0x7f0000000100)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={0xffffffffffffffff, &(0x7f0000000180), &(0x7f0000000240)}, 0x20) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000200)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000), &(0x7f0000000080)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000180)={r0, &(0x7f00000000c0)}, 0x10) 2018/03/06 00:08:22 executing program 6: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000000)) 2018/03/06 00:08:22 executing program 3: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x78, 0xd68, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000140)={0x1, 0x0, [0x0]}) mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='rootfs\x00', 0x1000, &(0x7f00000002c0)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='nsfs\x00', 0x20, &(0x7f0000000140)) 2018/03/06 00:08:22 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='rootfs\x00', 0x1000, &(0x7f00000002c0)) socketpair(0x15, 0xa, 0x1, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x8}, 0x10) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000003200)={&(0x7f0000002000)=@hci={0x0, 0x0}, 0x80, &(0x7f00000030c0)=[{&(0x7f0000002080)=""/4096, 0x1000}, {&(0x7f0000003080)}], 0x2, &(0x7f0000003100)=""/193, 0xc1, 0xfff}, 0x10040) sendmsg$kcm(r0, &(0x7f0000004680)={&(0x7f0000003240)=@hci={0x1f, r1, 0x1}, 0x80, &(0x7f0000003480)=[{&(0x7f00000032c0)="ddca9cd153872bcef5c2e6765bd836826f26ba13e756a0014d67d5de3439354c1e42fcca81df187f416802b1d41f98e5e79b689a6cbf2759cf", 0x39}, {&(0x7f0000003300)="4bad9c216080f4e8299b819bc740cc6add858ceabaae594fe76589d7cff624ab7dc3aad4369d3232ef2d934d3b0c208afe6d8aabbb450f19c9f5483826226cf2ee765efb1af0a3d71e938882e83442547400704f7eab79ff5892092e54d79f2337d7d1414516ce8289f68f375a6aad97b7a8c105c48b44908e76340af4f522211810cb1e50e68acab81a8cec5f88270bb5a134c0a9c300daffc07dcc4c3e6ba2ced0acb195f528e0a7673712b0d20c52661cce400e355ad27e8a", 0xba}, {&(0x7f00000033c0)="1b862fea30814fc9a5dd79e3817b8a9c888a301c225ce87060d8efa2c67e7f156863abc3c7ab0dc9c551faebd6301ac0f1295528400f1fd0f563656d1149d9e63a5e5b1f14fd37b3d0eb82ee0700a66aa3a40f0d8040594bfde8831e3ea63cf5116d7d605be1e56becfb4b34c5095b9cab4d2fdce5556842451e8be67fdbbfbe8f4f1f0d73ef323900284a5b13b30a879a4ba59c3e22c56d5f8607dc58631f335b30f2c290fb1d", 0xa7}], 0x3, &(0x7f00000034c0)=[{0xc8, 0x107, 0x8af2, "034c4a6c218866fa306abc8a665097e2f29021dd84e7e3e43a8a0bbdc48b4c4460a1e19f4851079172018d01a917dea1e9ae168a360598c434c7d407a294500ba2defc3ce8f9f28325fdfbb383b1d9436fbe5f4dbba58be239ff16d1131930b4c66dec628c8486084f89ed885f5bcb86db5d12123335026bd551e0cb9e0aec99a278f276d44321c3a09af53c8ab78d117288522253c8f02fe3765581161c2a977516a98481fa7bf144dfa7247d9420fd0a9328c78455"}, {0x28, 0x108, 0x200, "68db12b65f1b1ca95dea13220d111e8ab561881b55685ef3"}, {0x1010, 0x10c, 0x4, "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"}, {0x30, 0x1ff, 0x20, "33f7b5433f0521f1a8aaaabac97ab7fa86af9ad89edac04592"}, {0x48, 0x13f, 0x100000001, "b52dabc317e9ce5cac4910d2ee75ca43ebc49389abd6d8b0af4afb6e1dd02f0d6bd9f3112cca454e173b025a493f7df84c2e350e411c66d0"}, {0x18, 0x3730be27a2d32854, 0x6, "6a0695c7e502"}], 0x1190}, 0x815) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000001c0)={&(0x7f0000000140)='./file1\x00'}, 0x10) mount(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='nsfs\x00', 0x20, &(0x7f0000000140)) 2018/03/06 00:08:22 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x649) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f00000000c0)={0x6, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) socketpair(0x9, 0x80f, 0xfff, &(0x7f0000000000)={0xffffffffffffffff}) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000080)={0x0, r1, 0x7}, 0x14) [ 76.507351] EXT4-fs: 7 callbacks suppressed [ 76.507358] EXT4-fs (sda1): Unrecognized mount option "./file1" or missing value [ 76.532312] FAULT_INJECTION: forcing a failure. [ 76.532312] name failslab, interval 1, probability 0, space 0, times 0 [ 76.543780] CPU: 1 PID: 7228 Comm: syz-executor2 Not tainted 4.16.0-rc2+ #24 [ 76.550969] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 76.560327] Call Trace: [ 76.562926] dump_stack+0x194/0x24d [ 76.566571] ? arch_local_irq_restore+0x53/0x53 [ 76.571259] ? check_noncircular+0x20/0x20 [ 76.575504] ? mutex_lock_io_nested+0x1900/0x1900 [ 76.580367] should_fail+0x8c0/0xa40 [ 76.584101] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 76.589216] ? __mutex_unlock_slowpath+0xe9/0xac0 [ 76.594071] ? check_noncircular+0x20/0x20 [ 76.598309] ? wait_for_completion+0x770/0x770 [ 76.602911] ? find_held_lock+0x35/0x1d0 2018/03/06 00:08:23 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0xa, 0x100, 0x4, 0x0, 0x4, 0xffffffffffffffff, 0xa94}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000380)={r0, &(0x7f0000000200)="fddbd2b2a5d04790a72d810205de356d84a764682afe6f913c27c5c6069f38f90e0a55858adb9603ba2fa341ef900af875d09b1ef570c37aefa616a98642567d86bf3c90fc4977f5b2332d20b03166e0b1662def665bdf72e3f9ebb4a3b1338274b6a4883e654d1d56ed369ea4a53c210f72a1b5df9f2e99391292edbdd0b387c2bc8a732b986bd67fc84d823fe8add3f2021c5f7ff7bc23826a6cc81058f730d9fdb172b4a71860d64354194f1b1ea875a1c207c7e90ed47e74adadcad123af2700d580c716b8755012fbbb125e3b7bb7825e4431be01b450381e692fc168b261bdb42cab16", &(0x7f0000000300)="d3f2f0e9be689ce6168185363359e80390968540e6e57ab50b50d7bdede2c417ee78217baf235ccea4f293cf220ad3c560fa956d61a4b86795ee7ece3ca81dac2cf9bbfde3b404f25be2dcd644e422c35241962b066ceb293f0939c1190b8ad47a40c9c0", 0x1}, 0x20) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000440)) socketpair(0x5, 0x3, 0x8, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0xfff) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f0000000080)={0x1, 0x78, 0x7fffffff, 0x4, 0xfffffffffffff001, 0x7fff, 0x0, 0x100000001, 0x8000, 0x6, 0x8, 0x3, 0x8, 0x100000000, 0x1, 0x80000001, 0x4, 0x7, 0x0, 0x7fffffff, 0x8, 0x10001, 0x74, 0x0, 0x800, 0x2, 0x7, 0x100, 0x80000000, 0x6, 0xfffffffffffffbff, 0x1, 0x3, 0x1f, 0x81, 0x46, 0x4, 0x200, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000040), 0x1}, 0x0, 0xfffffffffffffff9, 0x8000, 0x0, 0x0, 0x7, 0x8}, 0x0, 0x400, 0xffffffffffffff9c, 0x8) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000580)={r1, &(0x7f00000003c0)="28a53f92151993a6678c1196ac6aef70d09a82243601b1f62cd6934eb8e01e3db2f9aff1f52ee1785a66b42d64b0a6842806aba18281b87b6401b65d46d93e9b705475773f9fe6b8737578c0073dd4899ad9842c0f759bea8769b8c14071fd", &(0x7f0000000480)=""/204}, 0x18) socketpair$inet(0x2, 0x6, 0x5, &(0x7f0000000180)) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000140)) 2018/03/06 00:08:23 executing program 0: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', 0x0, 0x10}, 0x10) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f00004e7000)={0x2, 0x78, 0xdf}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000000c0)='cpu&"5\x00\x00\x00\x00\x00\x00\x00\x00') mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/03/06 00:08:23 executing program 7: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={0xffffffffffffff9c, 0x28, &(0x7f0000000040)={0x0, 0x0}}, 0x10) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000000c0)={r0, 0x8, 0x10}, 0xc) socketpair(0xa8, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = getpid() ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f00000001c0)={0x6, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) perf_event_open(&(0x7f0000000100)={0x3, 0x78, 0x5, 0x9, 0xf0449de, 0x4a050c19, 0x0, 0xffffffff, 0x200, 0xe, 0x0, 0xfff, 0x6, 0x0, 0x0, 0x7fffffff, 0x8, 0x4, 0x15c0, 0x5, 0x80000001, 0x9, 0x4, 0xaa, 0x0, 0x7, 0x4, 0x1, 0x401, 0x10000, 0x1ff, 0x6, 0xb2, 0x3, 0xd95, 0x3, 0x7, 0x7fffffff, 0x0, 0x5, 0x2, @perf_config_ext={0x1, 0x7}, 0x20, 0xfffffffffffffffe, 0x6, 0x0, 0xfffffffffffffffe, 0x6, 0x9}, r4, 0x1, r1, 0xa) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x1) getpid() ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f0000000180)={0x0, 0x0, []}) 2018/03/06 00:08:23 executing program 4: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r0, r0, 0x4, 0x2}, 0x10) [ 76.607001] ? __lock_is_held+0xb6/0x140 [ 76.611095] ? trace_event_raw_event_sched_switch+0x810/0x810 [ 76.616987] ? pcpu_alloc+0x146/0x10e0 [ 76.620883] ? rcu_note_context_switch+0x710/0x710 [ 76.625832] should_failslab+0xec/0x120 [ 76.629815] kmem_cache_alloc_trace+0x4b/0x740 [ 76.634398] ? __lock_is_held+0xb6/0x140 [ 76.638463] ? do_syscall_64+0x280/0x940 [ 76.642553] tracepoint_probe_register_prio+0x6f9/0x9a0 [ 76.647930] ? perf_trace_alarmtimer_suspend+0x6b0/0x6b0 2018/03/06 00:08:23 executing program 7: r0 = socket$kcm(0x29, 0x7, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$kcm(r0, &(0x7f0000001640)={&(0x7f0000000400)=@ax25={0x3, {"0d567c8ad5ced2"}, 0x1}, 0x80, &(0x7f0000001580)=[{&(0x7f0000000480)="f02b27313e6cb3653f6f9cc5bf78f23ad63d76b97bdd0a6a650783b3102da920ba00e5db78753ce5712e22a02dbb29525f5f77b6406d4a979d2baf3354ca3f9cd30ed76d467d0c8cd3a3b639f43f8776c859109fb73fec1aa7832227bbdfa1bed8df8ce783e100fff1cee779e7d5657c124aa4864a5bde8daff1c3bb2ae6b86f8ac1ac6556bd805b42b4018c4fb9991c7f21492128cc36aa0430889d9ffe7cb359a719473b8e4aaf79f3f2c37c38c6192152957382b18640e71f3532b35c40fcd5a585ec8c7c8507f8c9d1d6ba840c23d4c71b5a0a58cd78f86fbc254a32596fddfc57d953ccad8ed0", 0xe9}, {&(0x7f0000000580)="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", 0x1000}], 0x2, &(0x7f00000015c0)=[{0x58, 0x11, 0x6, "1e94fe34ca3df2b9c05ea616b2dbbd975b31a73d66b46d123bba86025b9b32dc13a97105214a85e3b08a2344dfc2a33fc9bcf5f298e18f9dc98d39f0981a764eb63009"}], 0x58, 0x4000000}, 0x20008000) socketpair(0x1f, 0x8000e, 0x9, &(0x7f0000001680)={0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001740)={r2, 0x50, &(0x7f00000016c0)}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000140)={0xffffffffffffffff}) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)={&(0x7f0000000000)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg(r1, &(0x7f00000003c0)={&(0x7f0000000180)=@hci, 0x80, &(0x7f00000002c0)=[{&(0x7f0000000200)=""/46, 0x2e}, {&(0x7f0000000240)=""/94, 0x5e}], 0x2, &(0x7f0000000300)=""/133, 0x85}, 0x40000021) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000000100)={r1, r4}) close(r1) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000080)) 2018/03/06 00:08:23 executing program 4: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000180)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair(0x8, 0x6, 0x9, &(0x7f0000000a40)={0xffffffffffffffff}) socket$kcm(0x29, 0x5, 0x0) socketpair$ax25(0x3, 0x2, 0xc3, &(0x7f0000000a80)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x200) sendmsg(r0, &(0x7f0000000940)={&(0x7f0000000080)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x2, 0x1, 0x4, 0x3, {0xa, 0x4e22, 0x3f, @remote={0xfe, 0x80, [], 0xbb}, 0x7}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000100)="d06fe06aa8d10a536444074f37ee1d7992d0a05675c08255da23d52111fca5337b32ddff635cc5ac0877d35914c061e00cdde8824f07caab29f5dc5103e6aadc46988a63c8242829188e315e4efce78cf4237a4045a944576f80", 0x5a}, {&(0x7f00000001c0)="34b27c08261af3d4fd357c63ad305311301d4ae59570e69bfadd9140cc00d80e1512af7e098334ca9f4d5a7d62b5412b", 0x30}, {&(0x7f0000000200)="7d23d14de748988ba1a07e9bf2168280aa195c72d2f324decdafe9d0cd9bae44b759699573d56787d617ef13db4faceda2c967d38aed8fe7da20a6d173b380a91fd308294425d52ae9c72bd3c12cb10e259c4a753f4a4bed66d7781d01a08ec434973650980dd7544b5012abbefba55c379ccb597e5b0517ea405b2ac8bf26", 0x7f}, {&(0x7f0000000280)="6d485490251145f6ecc8860bf861eb428b39a54a1486eb2aae18074a82ce18f3c8d617633707d2c2c5b50908f5681cee1dba57edb986879935e0053c07e024624fda16bb7133d23ee304585a0786d3fbbd32915dca966317ff044a9f135c0afae49aadd25e509e89fa150fc457615003446b3b1b095cd679384ccabf2ba91c03011f6a3758b09b2a883ae2593766235821eb6a91cd7288ba508ee63dd55d300e79add9c185a50ccbeb98ce440bdecd94305985908f921ac501", 0xb9}, {&(0x7f0000000340)="472b69ac72fb435e1bc150bbd8a6aa2f8e49b814519bf39a366238ca1f63b49f71935f65c161dc2746fff923c3937ac33c1350c7fcc15c0c87a494a192dcd3927e51c114", 0x44}], 0x5, &(0x7f0000000440)=[{0x100, 0x117, 0x54c, "d32be04cbecca4fa6007a3c6ba23ce5a1e438a4053a2f362dcbfad5b54006358ed674709bceeb6b27368646f0ea813298effe4ab805f995390b4edad1a817f33bfbb8063433d25a3280ba792f5a34d8d8dd2e7d38a18b9f122da6cb10f023e751678ad35ba164a9272e968d818c2300f2154bd6a112681a32e281bc21154f84a99aacd007dd8c442176b41a7344eb04c4566aad776b6e029d1a1177288da383493a0adbeba226f791bebdf752828b22aa13f208b6d235b9102dd535c3e192b7c7f7829ba0eaa383b5beb5a5bc9353722e8dbe2cfeeda6a9dffa7b6f3140a7e1ed3ae1a6bddc7d3ac64485eeb580820"}, {0xc0, 0x6, 0x0, "e12b3e63dd4cbc193901a8efb1e7ff1c043e7e3abeb3191750b677a793cfce213354d5dfc019cf5d8ed52eba796b7fdd603b1f899899a885741f5d083ec95d326309cc4645de830c5beac36b9ff57e5973133fd3efc7884fe092a93a2aee2a3304097e382f8633d7e76ebeb5c6d1f96c5c3ac903ca148d7ab0b5087cdb009c7aded1f506e0ea670e0d44f2aa5b61a96a30fce674a3d360541c00d3bcbcc89a7273c77b2f0be3dda330413a8db5e474"}, {0x110, 0x10b, 0x101, "5d441d8588e04341c52b6c1e65bc487c62e65ca75bc108fd78421a4ae6b7d0d9553933721db523c17f2157238d7aa85457a82bf8843c7d132322832cf79533c077a9b26b7aa9533db8ec387aeae7607409f16dbec736db4bd8b05e21abd8db8abc81955c168d65bd53cfd5b14d4f7a8981960b486f3fb593ba97419c40165d87f9f14df42fbbf0b1031b4af5a6302a09c0f0e4125cdc83241eb02fd52bf5ce707b039947473b2d8effeac3c2f3699c9e5e4d348af6cdf9be2d4c934dcabe183b11b217a390a6c8b13b2d5bb87cd5836ca3bf2e4f6901e9ed7a08306ee94bba8ea38cfeec1697184a7d66a7638ee1b85f3ef960e4d44104696bc8bd98b5c5"}, {0x60, 0x113, 0xffff, "8f9bb914a8d78f6ef1b95b03f63b8e73232659a2e38a8bcf77841951718cb4f5b4b74db21a7b4bdd5f5c580f306d9d8938511e0b37d2fc9a9caf06ed5b5716cda554eee3e722cd575a1e7c65"}, {0x40, 0x11f, 0xab2, "dd99d492ea34f4bdf14871e92ff38af1be8d301f6863eb340aef2533c99d39b5144a5b823a4ecc9eb13c8ea6"}, {0xd8, 0x11e, 0x6, "3e07c187fcfdecef65f6775f2dea99634b7aacc8bd9ddcda431f1345f21c03ac2a22cf9eed6663ab589446f58b1d9680f1e2e73ad3c6043df1f5e074e2888c81cc0ab534bfe7b37b44367df942817c4589ab571e6c2e2fb26e73629968e78a17d84a82a19b4ef1709d33357020c578451b1aebc841d0864ffc45a435f0a9740a4dc3ae61e4e0a29c80671904fe4534f6ff746b8ef544ec0911b58a0a6ee215bd5127d8881a134b40ba798cacc01c466d4f102d89ac2e397ccca3b133006cabad9a"}, {0x98, 0x0, 0x0, "d4b3f50cde31a3170b5b7f4e13956aade8236866daa76c3269504bae7e38358576108fe4b9476c3856ec2066acaa7e1cf9e40038195b90cc5f35f19d6b8726fe2847e337390b9c8adf72e61da8c4caefb2f8f5890126c909cd7b9d6feb2b54cda1aa513a8b4262bddc66df89a67908df8d38427f4d5271a2e50384c96c3467fbb5d159f4e56804f1"}], 0x4e0, 0x41}, 0x810) perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) mkdir(&(0x7f0000000980)='./file0\x00', 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000a00)={&(0x7f00000009c0)='./file0\x00', 0x0, 0x18}, 0x10) [ 76.653405] ? tracepoint_module_notify+0x780/0x780 [ 76.658435] ? module_unload_free+0x5b0/0x5b0 [ 76.662942] ? perf_trace_alarmtimer_suspend+0x6b0/0x6b0 [ 76.668411] ? perf_trace_alarmtimer_suspend+0x6b0/0x6b0 [ 76.673979] tracepoint_probe_register+0x2a/0x40 [ 76.678748] trace_event_reg+0x167/0x320 [ 76.682815] perf_trace_init+0x4ef/0xab0 [ 76.686880] ? refcount_inc_not_zero+0xfe/0x180 [ 76.691576] perf_tp_event_init+0x7d/0xf0 [ 76.695734] perf_try_init_event+0xc9/0x2a0 [ 76.700067] perf_event_alloc+0x1cc6/0x2b00 [ 76.704676] ? __perf_install_in_context+0x2d0/0x2d0 [ 76.709787] ? __might_sleep+0x95/0x190 [ 76.713774] ? SYSC_perf_event_open+0x1345/0x2f10 [ 76.718622] ? __mutex_lock+0x16f/0x1a80 [ 76.722689] ? SYSC_perf_event_open+0x1345/0x2f10 [ 76.727536] ? expand_files+0x4fd/0x910 [ 76.731555] ? lock_downgrade+0x980/0x980 [ 76.735714] ? lock_release+0xa40/0xa40 [ 76.739703] ? do_raw_spin_trylock+0x190/0x190 [ 76.744306] ? _raw_spin_unlock+0x22/0x30 [ 76.748464] ? __alloc_fd+0x29b/0x750 [ 76.752295] ? ptrace_may_access+0x3a/0x50 [ 76.756550] ? lock_release+0xa40/0xa40 [ 76.760536] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 76.765472] ? __ptrace_may_access+0x426/0x810 [ 76.770062] ? do_raw_spin_trylock+0x190/0x190 [ 76.774652] ? ptrace_getsiginfo+0x190/0x190 [ 76.779063] ? get_unused_fd_flags+0x121/0x190 [ 76.783672] SYSC_perf_event_open+0x842/0x2f10 [ 76.788267] ? find_held_lock+0x35/0x1d0 [ 76.792356] ? perf_event_set_output+0x5a0/0x5a0 [ 76.797130] ? __lock_is_held+0xb6/0x140 [ 76.801206] ? __sb_end_write+0xa0/0xd0 [ 76.805277] ? SyS_read+0x220/0x220 [ 76.808894] SyS_perf_event_open+0x39/0x50 [ 76.813124] ? perf_bp_event+0x2e0/0x2e0 [ 76.817170] do_syscall_64+0x280/0x940 [ 76.821044] ? __do_page_fault+0xc90/0xc90 [ 76.825281] ? finish_task_switch+0x1c1/0x7e0 [ 76.829775] ? syscall_return_slowpath+0x550/0x550 [ 76.834697] ? syscall_return_slowpath+0x2ac/0x550 [ 76.839627] ? prepare_exit_to_usermode+0x350/0x350 [ 76.844654] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 76.850012] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 76.854853] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 76.860032] RIP: 0033:0x453e69 [ 76.863216] RSP: 002b:00007f294ee07c68 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 76.870903] RAX: ffffffffffffffda RBX: 00007f294ee086d4 RCX: 0000000000453e69 [ 76.878156] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020940000 [ 76.885415] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 76.892675] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000013 [ 76.899934] R13: 0000000000000440 R14: 00000000006f66a0 R15: 0000000000000001 [ 76.907379] WARNING: CPU: 1 PID: 7228 at kernel/tracepoint.c:210 tracepoint_probe_register_prio+0x397/0x9a0 [ 76.917259] Kernel panic - not syncing: panic_on_warn set ... [ 76.917259] [ 76.924621] CPU: 1 PID: 7228 Comm: syz-executor2 Not tainted 4.16.0-rc2+ #24 [ 76.932459] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 76.941804] Call Trace: [ 76.944376] dump_stack+0x194/0x24d [ 76.947995] ? arch_local_irq_restore+0x53/0x53 [ 76.952653] ? dump_stack+0x220/0x24d [ 76.956442] ? vsnprintf+0x1ed/0x1900 [ 76.960234] panic+0x1e4/0x41c [ 76.963420] ? refcount_error_report+0x214/0x214 [ 76.969057] ? show_regs_print_info+0x18/0x18 [ 76.973564] ? __warn+0x1c1/0x200 [ 76.977017] ? tracepoint_probe_register_prio+0x397/0x9a0 [ 76.982832] __warn+0x1dc/0x200 [ 76.986122] ? wait_for_completion+0x770/0x770 [ 76.990695] ? tracepoint_probe_register_prio+0x397/0x9a0 [ 76.996228] report_bug+0x211/0x2d0 [ 76.999858] fixup_bug.part.11+0x37/0x80 [ 77.003906] do_error_trap+0x2d7/0x3e0 [ 77.007791] ? math_error+0x400/0x400 [ 77.011599] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 77.016432] do_invalid_op+0x1b/0x20 [ 77.020128] invalid_op+0x58/0x80 [ 77.023562] RIP: 0010:tracepoint_probe_register_prio+0x397/0x9a0 [ 77.029697] RSP: 0018:ffff8801b2d5f468 EFLAGS: 00010246 [ 77.035043] RAX: 0000000000010000 RBX: 00000000fffffff4 RCX: ffffffff817364c7 [ 77.042306] RDX: 0000000000010000 RSI: ffffc90002f67000 RDI: 0000000000000282 [ 77.049566] RBP: ffff8801b2d5f570 R08: 1ffff100365abde1 R09: 0000000000000000 [ 77.056823] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 77.064082] R13: dffffc0000000000 R14: 0000000000000000 R15: ffff8801b2d5f548 [ 77.071355] ? tracepoint_probe_register_prio+0x397/0x9a0 [ 77.076892] ? tracepoint_probe_register_prio+0x397/0x9a0 [ 77.082419] ? perf_trace_alarmtimer_suspend+0x6b0/0x6b0 [ 77.087856] ? tracepoint_module_notify+0x780/0x780 [ 77.092864] ? module_unload_free+0x5b0/0x5b0 [ 77.097358] ? perf_trace_alarmtimer_suspend+0x6b0/0x6b0 [ 77.102796] ? perf_trace_alarmtimer_suspend+0x6b0/0x6b0 [ 77.108232] tracepoint_probe_register+0x2a/0x40 [ 77.112979] trace_event_reg+0x167/0x320 [ 77.117034] perf_trace_init+0x4ef/0xab0 [ 77.121091] ? refcount_inc_not_zero+0xfe/0x180 [ 77.125763] perf_tp_event_init+0x7d/0xf0 [ 77.129899] perf_try_init_event+0xc9/0x2a0 [ 77.134216] perf_event_alloc+0x1cc6/0x2b00 [ 77.138541] ? __perf_install_in_context+0x2d0/0x2d0 [ 77.143632] ? __might_sleep+0x95/0x190 [ 77.147589] ? SYSC_perf_event_open+0x1345/0x2f10 [ 77.152412] ? __mutex_lock+0x16f/0x1a80 [ 77.156465] ? SYSC_perf_event_open+0x1345/0x2f10 [ 77.161288] ? expand_files+0x4fd/0x910 [ 77.165261] ? lock_downgrade+0x980/0x980 [ 77.169402] ? lock_release+0xa40/0xa40 [ 77.173364] ? do_raw_spin_trylock+0x190/0x190 [ 77.177936] ? _raw_spin_unlock+0x22/0x30 [ 77.182064] ? __alloc_fd+0x29b/0x750 [ 77.185861] ? ptrace_may_access+0x3a/0x50 [ 77.190084] ? lock_release+0xa40/0xa40 [ 77.194046] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 77.198967] ? __ptrace_may_access+0x426/0x810 [ 77.203530] ? do_raw_spin_trylock+0x190/0x190 [ 77.208097] ? ptrace_getsiginfo+0x190/0x190 [ 77.212487] ? get_unused_fd_flags+0x121/0x190 [ 77.217096] SYSC_perf_event_open+0x842/0x2f10 [ 77.221676] ? find_held_lock+0x35/0x1d0 [ 77.225751] ? perf_event_set_output+0x5a0/0x5a0 [ 77.230502] ? __lock_is_held+0xb6/0x140 [ 77.234565] ? __sb_end_write+0xa0/0xd0 [ 77.238541] ? SyS_read+0x220/0x220 [ 77.242171] SyS_perf_event_open+0x39/0x50 [ 77.246390] ? perf_bp_event+0x2e0/0x2e0 [ 77.250432] do_syscall_64+0x280/0x940 [ 77.254301] ? __do_page_fault+0xc90/0xc90 [ 77.258525] ? finish_task_switch+0x1c1/0x7e0 [ 77.263039] ? syscall_return_slowpath+0x550/0x550 [ 77.267960] ? syscall_return_slowpath+0x2ac/0x550 [ 77.272885] ? prepare_exit_to_usermode+0x350/0x350 [ 77.277906] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 77.283260] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 77.288101] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 77.293276] RIP: 0033:0x453e69 [ 77.296450] RSP: 002b:00007f294ee07c68 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 77.304139] RAX: ffffffffffffffda RBX: 00007f294ee086d4 RCX: 0000000000453e69 [ 77.311388] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020940000 [ 77.318638] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 77.325899] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000013 [ 77.333159] R13: 0000000000000440 R14: 00000000006f66a0 R15: 0000000000000001 [ 77.341028] Dumping ftrace buffer: [ 77.344732] (ftrace buffer empty) [ 77.348431] Kernel Offset: disabled [ 77.352039] Rebooting in 86400 seconds..