0000c0)='selinuxfs\x00', 0x1000, &(0x7f0000000100)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='minix\x00', 0x10020, &(0x7f0000000240)) 2018/03/31 05:13:27 executing program 2: socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000040)={0x7, 0x70, 0x1, 0xaabc, 0x2, 0x2, 0x0, 0xec, 0x4800, 0x1, 0x3a6b72c9, 0xffffffffffff8000, 0xfff, 0x7, 0x2, 0x7, 0xff, 0x1, 0x2, 0x9, 0x1, 0x0, 0x5, 0x75, 0x2, 0x7, 0x8, 0x4, 0x0, 0xdbce, 0xffff, 0xfaf, 0x1, 0xe7, 0xd0eb, 0x28a5, 0x9, 0x4, 0x0, 0x7, 0x2, @perf_config_ext={0x1, 0x8000}, 0x489, 0x6, 0xff, 0x0, 0x9d, 0x8, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f00000000c0)={0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000140)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r2 = getpid() r3 = perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x8, 0x4, 0x4, 0x1, 0x0, 0x401, 0x100, 0x7, 0xcfc0, 0x7, 0x0, 0x7, 0x30, 0x7, 0x7, 0xfff, 0x7, 0x9, 0xff, 0x9, 0xf, 0x0, 0x3, 0x100000000, 0x3, 0x8, 0xffff, 0x2, 0x0, 0xff, 0x6f, 0x3, 0x5, 0x800, 0x81, 0x0, 0x0, 0x9, 0x1, @perf_bp={&(0x7f0000000180), 0x1}, 0x11815, 0x9, 0x1, 0x1, 0x101, 0x5, 0x1e892fee}, r2, 0x9, r1, 0x1) r4 = perf_event_open(&(0x7f0000000280)={0x5, 0x70, 0xe00000000000, 0x9, 0x800, 0x6, 0x0, 0x7ff, 0x10200, 0xb, 0xe3, 0x5, 0x1, 0x4, 0x9b0f, 0x1f8a, 0x401, 0x1, 0xe975, 0x7, 0x437, 0x9, 0x7f, 0x20, 0x1, 0x2, 0x3, 0x5, 0x200, 0x1, 0x8, 0x401, 0x401, 0x2, 0x8, 0xfff, 0xf3c8, 0xf23, 0x0, 0x7fffffff, 0x0, @perf_bp={&(0x7f0000000240), 0x9}, 0x828, 0x3, 0x5, 0x1, 0x0, 0xc37, 0x6}, r2, 0x4, r1, 0x2) r5 = perf_event_open(&(0x7f0000000300)={0x4, 0x70, 0xff, 0x3, 0x7f, 0x7, 0x0, 0x40, 0x4a240, 0x2, 0xffffffffffffcc27, 0xb8, 0x2, 0x7, 0x9, 0x800, 0x3, 0x7d4d, 0xf7, 0xfffffffffffffffa, 0x9, 0x4, 0x3, 0x90be, 0x9, 0xfffffffffffffffc, 0x6, 0x3ff, 0xab6b, 0x8001, 0x5, 0x2, 0x9, 0x732, 0x400, 0x55000000000, 0x1ff, 0x6, 0x0, 0x0, 0x2, @perf_config_ext={0x6, 0xffffffff}, 0x40, 0x80000001, 0x7fff, 0x2, 0x1, 0x6, 0x5}, r2, 0xf, r4, 0xa) r6 = perf_event_open(&(0x7f00000003c0)={0x7, 0x70, 0xc87d, 0x6, 0x5, 0x80000001, 0x0, 0x3, 0x1, 0xb, 0xffffffff, 0x9, 0x584, 0x31b, 0x7, 0x2, 0x3, 0x544, 0x100000001, 0x9, 0x1, 0x100, 0x3, 0x1, 0x7, 0x0, 0x7, 0x5, 0xbb, 0x40, 0x7, 0x8, 0x81, 0xc5a, 0x0, 0x7, 0x1f, 0x815, 0x0, 0xffff, 0x2, @perf_bp={&(0x7f0000000380), 0x8}, 0x4, 0x5, 0xc95, 0x0, 0x7ff, 0x7b02, 0x7}, r2, 0x10, r1, 0xb) ioctl$PERF_EVENT_IOC_DISABLE(r3, 0x2401, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0x4) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = perf_event_open(&(0x7f0000000480)={0x7, 0x70, 0x7, 0xdbff, 0x3, 0x3f, 0x0, 0x8, 0x0, 0xc, 0x8, 0x0, 0xf43, 0x101, 0x6, 0x5, 0x6, 0x9, 0x200, 0xfffffffffffffffd, 0x4, 0x6, 0x6e, 0x20, 0x1b3, 0x1fe, 0x7ff, 0x3, 0x8000, 0x5, 0x0, 0x0, 0x0, 0x5, 0x22d2, 0x401, 0x68, 0xa1ce, 0x0, 0x4, 0x0, @perf_config_ext={0x2fb, 0x4}, 0x2000, 0xd33, 0x6, 0x697c4c7d75b7b6da, 0x171f, 0x9, 0x9}, r2, 0x6, r5, 0x1) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x9, 0x6, 0x101, 0x8, 0x0, 0x200, 0x2000, 0xf, 0x0, 0x5, 0x6, 0x3, 0x2, 0x0, 0x8001, 0x8, 0x3, 0x5, 0x17, 0x7, 0x4, 0x400, 0xffffffff, 0x7, 0x8000, 0x2, 0x100, 0x0, 0x7, 0x95de, 0x2, 0x1, 0x2, 0xd432, 0x3ff, 0x8599, 0x0, 0x3ff, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x10080, 0x7, 0xe7e, 0x7, 0x5, 0x7, 0x9}, r2, 0x0, r3, 0x8) close(r7) ioctl$PERF_EVENT_IOC_DISABLE(r9, 0x2401, 0x1) r10 = gettid() ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f00000005c0)={r0}) ioctl$sock_kcm_SIOCKCMUNATTACH(r11, 0x89e1, &(0x7f0000000600)={r8}) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000640)) r12 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)={0x4, 0x7, 0x7f, 0x9787, 0x1c, 0xffffffffffffffff, 0x5}, 0x2c) recvmsg$kcm(r11, &(0x7f0000009440)={&(0x7f0000009300)=@can={0x0, 0x0}, 0x80, &(0x7f00000093c0)=[{&(0x7f0000009380)=""/16, 0x10}], 0x1, &(0x7f0000009400)=""/18, 0x12, 0x3bc1}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000009480)={0xf, 0x13, &(0x7f00000006c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [@ldst={0x3, 0x2, 0x1, 0x2, 0x7, 0xffffffff, 0x4}, @map={0x18, 0x0, 0x1, 0x0, r12}, @alu={0x7, 0x5, 0xf, 0x6, 0xe, 0x2, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4}, @jmp={0x5, 0x7a4c, 0x0, 0x3, 0x9, 0xffffffff, 0xfffffffffffffff0}, @alu={0x4, 0x20, 0x9, 0x9, 0x5, 0xfffffffe, 0x4}, @jmp={0x5, 0x81, 0x9, 0x7, 0x6, 0xfffffffe, 0xfffffffffffffff0}, @jmp={0x5, 0x3, 0x3, 0x0, 0x2, 0x2, 0xffffffffffffffff}], {0x95}}, &(0x7f0000000780)='GPL\x00', 0x4, 0x77, &(0x7f00000007c0)=""/119, 0x0, 0x1, [], r13}, 0x48) mount(&(0x7f0000009500)='./file0\x00', &(0x7f0000009540)='./file0\x00', &(0x7f0000009580)='cramfs\x00', 0x5020, &(0x7f00000095c0)="22f464f8fef2b95976576e903efe99229584aaf55fa0d91223905d4a68c0c7d18bf26de6fec0660b0c36945200da04f802d9059dd5f6d2f0eca450f4fdd46ed2b411588d802f0d1d02be65816332b2754d686e927593deb8ee3ed17a24d749db81290c33836bcc9b7d93084c53d0744e81deb8b83d9b23565d6db4cb746eb15b20f7b806f0b5a02676d90260a61b00e9ec0b4b8bf07d5f93b3feda8299586c3936f743c764205de278c25a6fff98") perf_event_open(&(0x7f00000096c0)={0x1, 0x70, 0x3, 0xa8e, 0x1000, 0xe57a, 0x0, 0x6, 0x2100b, 0x2, 0x9, 0xdb1b, 0xfffffffffffffffa, 0xa7f8, 0x3, 0x2, 0x800, 0x800, 0x2, 0x0, 0x3f, 0x3, 0x8000000000000, 0x3, 0x20, 0x6, 0x3, 0xfffffffffffff318, 0xffffffffffff0001, 0xfffffffffffffffe, 0x12, 0x1, 0x101, 0x8, 0x100, 0x1, 0x3, 0x8, 0x0, 0x3ff, 0x7, @perf_bp={&(0x7f0000009680), 0x3}, 0x9, 0x6, 0xfffffffffffffff7, 0x0, 0x0, 0x49, 0xfffffffffffff3b8}, r10, 0xe, r5, 0x8) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000009880)={r12, &(0x7f0000009740)="8ba447000764036f17624e623896639a3e2456b901aedcdb4221cea83c3b2c94575967a34ec104bbebeaf6a6b50494e6763f41056d2ca84f906fa48d72590e81334926fab48e", &(0x7f00000097c0)=""/170}, 0x18) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r4, 0x2405, r6) bpf$PROG_LOAD(0x5, &(0x7f00000099c0)={0x7, 0x4, &(0x7f00000098c0)=@raw=[@ldst={0x3, 0x3, 0x6, 0xd, 0x7, 0x26}, @ldst={0x0, 0x2, 0x0, 0xa, 0x0, 0x4, 0xffffffffffffffff}], &(0x7f0000009900)='GPL\x00', 0x5, 0x5d, &(0x7f0000009940)=""/93, 0x41f00, 0x1, [], r13}, 0x48) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000009b40)={r8, &(0x7f0000009a40)="402c0b8b20e0ae84bb", &(0x7f0000009a80)=""/178}, 0x18) 2018/03/31 05:13:27 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x70, 0x3, 0x100, 0x2, 0x2, 0x0, 0xffffffff00000001, 0x1080, 0x8, 0x0, 0x89, 0x5, 0x29e5, 0x3, 0x20, 0x5, 0x2, 0x9, 0xac3, 0x6, 0x80000000, 0x4, 0x0, 0x7f, 0x0, 0x4, 0x9, 0x6, 0x2, 0x0, 0x6, 0x0, 0x5, 0x2, 0x3, 0x3ff, 0x8, 0x0, 0x5, 0x1, @perf_config_ext={0x7, 0x7}, 0x300a, 0x7, 0x8, 0x3, 0x1b, 0x1800000, 0x4}, 0x0, 0x3, 0xffffffffffffff9c, 0x1) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x9) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x7f, 0x7, 0x5, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r1, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) bpf$MAP_CREATE(0x4, &(0x7f0000000880)={0x13, 0x0, 0x0, 0x0, 0x20000000, 0x0}, 0x2c) 2018/03/31 05:13:27 executing program 1: r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg$kcm(r0, &(0x7f00000016c0)={&(0x7f00000013c0)=@sco={0x1f}, 0x8, &(0x7f0000001540)=[{&(0x7f00000014c0)='<', 0x1}], 0x1, &(0x7f0000001580)}, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001780), 0x10) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f00000002c0)='./file0/file0\x00', 0x0, 0x18}, 0xc) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000240)={r2, &(0x7f0000000080)="d626db7083acaa37c4dcba0e1a496f77ee12c70f57b65f5f358815079f324743e231e737537c43e0e18f2a83d0ca013ae918c37e60e33a5674ccffc1fcd375ee785712d998330b8a7674630722d5bebb1fea0d766801358d9bce945a007366a55f67a568ec251dab742f59efffe32a2cf7d8c43c16212583805e01e1cf0aada35bc6b2bfdf5fe625b080d30e8cb1ddcee759c8d5f02c34c63590cd28f5f3e048e2ec80440f2e248cea0e218a8a9874fd1a89a820b5460fd0fc646b7f4af2a3712d72442eef0617080b0ce7ca029b86127b1cbcdf4137ca286a531154a7f8b07e75fcc4498492194a9aa10ba722f61b93155cf6", &(0x7f0000000180)="21480a117c84ddd154358de704dadf3e694a63f017879be629297cde3154be5c5bc4854de558b08cf248e9394c4cd0fd6908dff832351bbf445c73cb2948fe0d58d8dde19845a9c18a80b3c26c0d274b7a114fd2e6c8d131595d8eee4bbc05b6eaf13d791a9e32d18517cda3068d7deae57c8b6665d6154432e785d3d8c2b71e001279db61b460f90beee73ea6bedad4a2b2a10493ab7b"}, 0x20) sendmsg$kcm(r1, &(0x7f00000042c0)={&(0x7f0000001ac0)=@pptp={0x18, 0x2, {0x0, @multicast1=0xe0000001}}, 0xfffffffffffffd61, &(0x7f0000002e80)=[{&(0x7f0000002dc0)="95", 0x1}], 0x1, &(0x7f0000002f00)}, 0x0) sendmsg$kcm(r0, &(0x7f0000006200)={&(0x7f0000004a40)=@un=@file={0x0, './file0/file0\x00'}, 0x10, &(0x7f0000005cc0)=[{&(0x7f0000005c40)="e4", 0x1}], 0x1, &(0x7f0000005d40)}, 0x0) socket$kcm(0x29, 0x2, 0x0) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000280)) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000300)={&(0x7f0000000000)='./file0/file0\x00', r2}, 0x10) 2018/03/31 05:13:27 executing program 6 (fault-call:17 fault-nth:38): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x0, 0x101, 0x4, 0x0, 0x1, r0, 0x0, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r2 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)={0xffffffffffffffff}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r2, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x0, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0", 0xc9}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000280)={&(0x7f0000000680)='./file0\x00'}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r1}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r3) gettid() close(0xffffffffffffffff) 2018/03/31 05:13:27 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', 0x0, 0x10}, 0x10) mount(&(0x7f0000df7000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='squashfs\x00', 0x1, &(0x7f00000000c0)="f749a7f7573c9d9d300e7ecb98559c1f90953ad7ada68554f9121abbd3509ae459faf3f2090c8ac774f44a74afe2a8698266c269e8b30513d0d7948bc257b7e5b913962f3300a2e64b0fe0f1b94b7a362f07ffe10749d2290eddf5d0e5") 2018/03/31 05:13:27 executing program 2: socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000040)={0x7, 0x70, 0x1, 0xaabc, 0x2, 0x2, 0x0, 0xec, 0x4800, 0x1, 0x3a6b72c9, 0xffffffffffff8000, 0xfff, 0x7, 0x2, 0x7, 0xff, 0x1, 0x2, 0x9, 0x1, 0x0, 0x5, 0x75, 0x2, 0x7, 0x8, 0x4, 0x0, 0xdbce, 0xffff, 0xfaf, 0x1, 0xe7, 0xd0eb, 0x28a5, 0x9, 0x4, 0x0, 0x7, 0x2, @perf_config_ext={0x1, 0x8000}, 0x489, 0x6, 0xff, 0x0, 0x9d, 0x8, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f00000000c0)={0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000140)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r2 = getpid() r3 = perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x8, 0x4, 0x4, 0x1, 0x0, 0x401, 0x100, 0x7, 0xcfc0, 0x7, 0x0, 0x7, 0x30, 0x7, 0x7, 0xfff, 0x7, 0x9, 0xff, 0x9, 0xf, 0x0, 0x3, 0x100000000, 0x3, 0x8, 0xffff, 0x2, 0x3, 0x0, 0x6f, 0x3, 0x5, 0x800, 0x81, 0x0, 0x0, 0x9, 0x1, @perf_bp={&(0x7f0000000180), 0x1}, 0x11815, 0x9, 0x1, 0x1, 0x101, 0x5, 0x1e892fee}, r2, 0x9, r1, 0x1) r4 = perf_event_open(&(0x7f0000000280)={0x5, 0x70, 0xe00000000000, 0x9, 0x800, 0x6, 0x0, 0x7ff, 0x10200, 0xb, 0xe3, 0x5, 0x1, 0x4, 0x9b0f, 0x1f8a, 0x401, 0x1, 0xe975, 0x7, 0x437, 0x9, 0x7f, 0x20, 0x1, 0x2, 0x3, 0x5, 0x200, 0x1, 0x8, 0x401, 0x401, 0x2, 0x8, 0xfff, 0xf3c8, 0xf23, 0x0, 0x7fffffff, 0x0, @perf_bp={&(0x7f0000000240), 0x9}, 0x828, 0x3, 0x5, 0x1, 0x0, 0xc37, 0x6}, r2, 0x4, r1, 0x2) r5 = perf_event_open(&(0x7f0000000300)={0x4, 0x70, 0xff, 0x3, 0x7f, 0x7, 0x0, 0x40, 0x4a240, 0x2, 0xffffffffffffcc27, 0xb8, 0x2, 0x7, 0x9, 0x800, 0x3, 0x7d4d, 0xf7, 0xfffffffffffffffa, 0x9, 0x4, 0x3, 0x90be, 0x9, 0xfffffffffffffffc, 0x6, 0x3ff, 0xab6b, 0x8001, 0x5, 0x2, 0x9, 0x732, 0x400, 0x55000000000, 0x1ff, 0x6, 0x0, 0x0, 0x2, @perf_config_ext={0x6, 0xffffffff}, 0x40, 0x80000001, 0x7fff, 0x2, 0x1, 0x6, 0x5}, r2, 0xf, r4, 0xa) r6 = perf_event_open(&(0x7f00000003c0)={0x7, 0x70, 0xc87d, 0x6, 0x5, 0x80000001, 0x0, 0x3, 0x1, 0xb, 0xffffffff, 0x9, 0x584, 0x31b, 0x7, 0x2, 0x3, 0x544, 0x100000001, 0x9, 0x1, 0x100, 0x3, 0x1, 0x7, 0x0, 0x7, 0x5, 0xbb, 0x40, 0x7, 0x8, 0x81, 0xc5a, 0x0, 0x7, 0x1f, 0x815, 0x0, 0xffff, 0x2, @perf_bp={&(0x7f0000000380), 0x8}, 0x4, 0x5, 0xc95, 0x0, 0x7ff, 0x7b02, 0x7}, r2, 0x10, r1, 0xb) ioctl$PERF_EVENT_IOC_DISABLE(r3, 0x2401, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0x4) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = perf_event_open(&(0x7f0000000480)={0x7, 0x70, 0x7, 0xdbff, 0x3, 0x3f, 0x0, 0x8, 0x0, 0xc, 0x8, 0x0, 0xf43, 0x101, 0x6, 0x5, 0x6, 0x9, 0x200, 0xfffffffffffffffd, 0x4, 0x6, 0x6e, 0x20, 0x1b3, 0x1fe, 0x7ff, 0x3, 0x8000, 0x5, 0x0, 0x0, 0x0, 0x5, 0x22d2, 0x401, 0x68, 0xa1ce, 0x0, 0x4, 0x0, @perf_config_ext={0x2fb, 0x4}, 0x2000, 0xd33, 0x6, 0x697c4c7d75b7b6da, 0x171f, 0x9, 0x9}, r2, 0x6, r5, 0x1) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x9, 0x6, 0x101, 0x8, 0x0, 0x200, 0x2000, 0xf, 0x0, 0x5, 0x6, 0x3, 0x2, 0x0, 0x8001, 0x8, 0x3, 0x5, 0x17, 0x7, 0x4, 0x400, 0xffffffff, 0x7, 0x8000, 0x2, 0x100, 0x0, 0x7, 0x95de, 0x2, 0x1, 0x2, 0xd432, 0x3ff, 0x8599, 0x0, 0x3ff, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x10080, 0x7, 0xe7e, 0x7, 0x5, 0x7, 0x9}, r2, 0x0, r3, 0x8) close(r7) ioctl$PERF_EVENT_IOC_DISABLE(r9, 0x2401, 0x1) r10 = gettid() ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f00000005c0)={r0}) ioctl$sock_kcm_SIOCKCMUNATTACH(r11, 0x89e1, &(0x7f0000000600)={r8}) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000640)) r12 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)={0x4, 0x7, 0x7f, 0x9787, 0x1c, 0xffffffffffffffff, 0x5}, 0x2c) recvmsg$kcm(r11, &(0x7f0000009440)={&(0x7f0000009300)=@can={0x0, 0x0}, 0x80, &(0x7f00000093c0)=[{&(0x7f0000009380)=""/16, 0x10}], 0x1, &(0x7f0000009400)=""/18, 0x12, 0x3bc1}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000009480)={0xf, 0x13, &(0x7f00000006c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [@ldst={0x3, 0x2, 0x1, 0x2, 0x7, 0xffffffff, 0x4}, @map={0x18, 0x0, 0x1, 0x0, r12}, @alu={0x7, 0x5, 0xf, 0x6, 0xe, 0x2, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4}, @jmp={0x5, 0x7a4c, 0x0, 0x3, 0x9, 0xffffffff, 0xfffffffffffffff0}, @alu={0x4, 0x20, 0x9, 0x9, 0x5, 0xfffffffe, 0x4}, @jmp={0x5, 0x81, 0x9, 0x7, 0x6, 0xfffffffe, 0xfffffffffffffff0}, @jmp={0x5, 0x3, 0x3, 0x0, 0x2, 0x2, 0xffffffffffffffff}], {0x95}}, &(0x7f0000000780)='GPL\x00', 0x4, 0x77, &(0x7f00000007c0)=""/119, 0x0, 0x1, [], r13}, 0x48) mount(&(0x7f0000009500)='./file0\x00', &(0x7f0000009540)='./file0\x00', &(0x7f0000009580)='cramfs\x00', 0x5020, &(0x7f00000095c0)="22f464f8fef2b95976576e903efe99229584aaf55fa0d91223905d4a68c0c7d18bf26de6fec0660b0c36945200da04f802d9059dd5f6d2f0eca450f4fdd46ed2b411588d802f0d1d02be65816332b2754d686e927593deb8ee3ed17a24d749db81290c33836bcc9b7d93084c53d0744e81deb8b83d9b23565d6db4cb746eb15b20f7b806f0b5a02676d90260a61b00e9ec0b4b8bf07d5f93b3feda8299586c3936f743c764205de278c25a6fff98") perf_event_open(&(0x7f00000096c0)={0x1, 0x70, 0x3, 0xa8e, 0x1000, 0xe57a, 0x0, 0x6, 0x2100b, 0x2, 0x9, 0xdb1b, 0xfffffffffffffffa, 0xa7f8, 0x3, 0x2, 0x800, 0x800, 0x2, 0x0, 0x3f, 0x3, 0x8000000000000, 0x3, 0x20, 0x6, 0x3, 0xfffffffffffff318, 0xffffffffffff0001, 0xfffffffffffffffe, 0x12, 0x1, 0x101, 0x8, 0x100, 0x1, 0x3, 0x8, 0x0, 0x3ff, 0x7, @perf_bp={&(0x7f0000009680), 0x3}, 0x9, 0x6, 0xfffffffffffffff7, 0x0, 0x0, 0x49, 0xfffffffffffff3b8}, r10, 0xe, r5, 0x8) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000009880)={r12, &(0x7f0000009740)="8ba447000764036f17624e623896639a3e2456b901aedcdb4221cea83c3b2c94575967a34ec104bbebeaf6a6b50494e6763f41056d2ca84f906fa48d72590e81334926fab48e", &(0x7f00000097c0)=""/170}, 0x18) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r4, 0x2405, r6) bpf$PROG_LOAD(0x5, &(0x7f00000099c0)={0x7, 0x4, &(0x7f00000098c0)=@raw=[@ldst={0x3, 0x3, 0x6, 0xd, 0x7, 0x26}, @ldst={0x0, 0x2, 0x0, 0xa, 0x0, 0x4, 0xffffffffffffffff}], &(0x7f0000009900)='GPL\x00', 0x5, 0x5d, &(0x7f0000009940)=""/93, 0x41f00, 0x1, [], r13}, 0x48) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000009b40)={r8, &(0x7f0000009a40)="402c0b8b20e0ae84bb", &(0x7f0000009a80)=""/178}, 0x18) 2018/03/31 05:13:27 executing program 0: r0 = perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, @perf_config_ext={0xffffffffffffffff}, 0x200000400, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f00007fc000)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = perf_event_open(&(0x7f00003a8000)={0x2, 0x78, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = getpid() r3 = perf_event_open(&(0x7f0000000740)={0x4, 0x70, 0x0, 0x5, 0x1, 0x9, 0x0, 0x8, 0x8000, 0x8, 0x4, 0x0, 0xbc7f, 0x6, 0x8001, 0x2, 0x1, 0x50, 0x3, 0xb873, 0x9, 0x80000000, 0x80, 0x4e8000000000, 0x1, 0x7, 0x235c00000000000, 0x5, 0x80000000, 0x800, 0x0, 0x6, 0x3, 0x5, 0x8000, 0x7ff, 0x7, 0x6, 0x0, 0x51, 0x0, @perf_config_ext={0x100, 0x1}, 0x20800, 0xdb2, 0x3f, 0x0, 0xffff, 0x3, 0x401}, r2, 0x8, r1, 0x9) socketpair$inet6(0xa, 0x5, 0xffffffffffffffff, &(0x7f0000000080)={0xffffffffffffffff}) r5 = getpid() ioctl$PERF_EVENT_IOC_DISABLE(r3, 0x2401, 0x84b) perf_event_open(&(0x7f0000000240)={0x3, 0x70, 0x8c00000000000000, 0xd90, 0x4, 0x0, 0x0, 0x6, 0x8000, 0x9, 0x5, 0x8, 0x8001, 0x7, 0x5, 0x1, 0x1, 0xfffffffffffffffd, 0x1, 0xd1, 0xa, 0x20, 0x0, 0x6, 0xfff, 0xfffffffffffff000, 0x2, 0x9, 0x5, 0x9, 0x4, 0x80000000, 0x81, 0x6c, 0x9, 0x200000000000, 0x8003, 0x200, 0x0, 0x4, 0x5, @perf_bp={&(0x7f0000000200), 0x4}, 0x4, 0x1, 0x8c85, 0x7, 0x8, 0x7, 0x7}, r5, 0x7, r0, 0x8) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000580)) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x800) sendmsg(r4, &(0x7f0000000540)={&(0x7f00000000c0)=@pptp={0x18, 0x2, {0x2, @loopback=0x7f000001}}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000140)="c81c202530d57db5faa0bafb94a7a20a989179686dc5a768fb065fe3ed951004068b95d0ae05c2f761168a5a541331cbc3ebaf9e40519494697062b29014cb7f9b229e4ab3d1721e5218b6cfbdc318e4aa72fae242815dd3478639e39eef1bf20bbe6fc20993af18a1a47ac7eaeb12d2259e272912dd3af20f5f66614688a5e7873627cdd1614dd90d1ba649305a584e0bbe9537e851abe610b46444c4961f9b561257e34d183f358916dcf9d2f0c2ff504ed0187c9d5574c5edef20", 0xbc}], 0x1, &(0x7f0000000500), 0x0, 0x40}, 0x0) socketpair(0x2, 0x5, 0x0, &(0x7f0000000600)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000640)={&(0x7f00000005c0)='./file0\x00', r6}, 0x10) sendmsg(r6, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000007c0)="015e159585b864271f945ed31495955ef4a729d0fc5c42550f1688a307c806461c6c07d885245c199dd2af693b62fd8cdd36d9e929d2bf5127649fd951f300b426754ae0c99610fa45313be60f002d62ef1456b132903cba76293be1a464db74907e872c52fb44155c04bc2c52a46273355d6a6242c8aeb91c45b4cedd203b5274a7bb971f4c17057e570b6ba5468c7cade186f7c2339f79ec69a18836636b6e5fdf6a59bbcf44b7843364365554b921e7f67803577e9eaa0c774311163ea1ae505b81cf417c3985e658491a5e6f833993e0c858ee99b640d1a2e7ed8908423a38113db43685b530922c8ac979671e3ac26cb7a3fb3fd254", 0xf8}], 0x1, &(0x7f0000000ac0)=ANY=[@ANYBLOB="28000000000000003f010000010000004bd93c19808aa3f92907318ea168ba9d50d25cf7a0000000"], 0x28, 0x4}, 0x14) gettid() perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x3d76601d, 0x6, 0x6, 0x3, 0x0, 0xbf, 0x8000, 0x5, 0x200, 0x8, 0x4, 0x10001, 0x400, 0x3, 0x0, 0x80000001, 0x0, 0xe0, 0x9, 0x7, 0x0, 0x3, 0x5, 0x5, 0x6, 0x8, 0x4, 0x115, 0x4a, 0x5, 0x368, 0x4, 0x3, 0x3aa, 0x0, 0xce6, 0x0, 0x7fff, 0x7, @perf_bp={&(0x7f00000002c0), 0x8}, 0x10080, 0x1, 0x8d83, 0x7, 0x2, 0x1, 0x7ff}, r5, 0x5, r0, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000340)="6370752630000006fdfeff003c12b8d0cc69bf7fffcc364d7878b2fe44897367ffa75134df22ad89c89b0df602d72272e82ad32838002955c2db00000000000000050fb902ae9f2109333b00e30335ecfd7e89bff18829cb97541bd006bf3dcf376e93a15906083ba783fa3e7318893c26819bee569f728184be5efc06cc650d421908182b69c3730e559e2b6ca237f264987ed574e36cd3efd745ead1044fd7e82f7f65b71c79a10e2e605929cf8ccab2eadac54d1c3e7dae98996be67c10d7c236cde0355ab2fb0aaaaccdb64cd11d4db1b927234daae71562f2c40fa04b9aa17664350a37eb52480895070000008a0fc021db95d80d9b") sendmsg(r4, &(0x7f0000002ec0)={&(0x7f0000000680)=@un=@file={0x1, './file0\x00'}, 0x80, &(0x7f0000001980)=[{&(0x7f0000000700)="6f4adbbb63dc", 0x6}], 0x1, &(0x7f00000008c0)=ANY=[], 0x0, 0x40}, 0x20000050) gettid() [ 180.265953] FAULT_INJECTION: forcing a failure. [ 180.265953] name failslab, interval 1, probability 0, space 0, times 0 [ 180.278307] CPU: 0 PID: 15351 Comm: syz-executor6 Not tainted 4.16.0-rc6+ #42 [ 180.285573] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 180.294918] Call Trace: [ 180.297501] dump_stack+0x194/0x24d [ 180.301125] ? arch_local_irq_restore+0x53/0x53 [ 180.305797] ? __save_stack_trace+0x7e/0xd0 [ 180.310122] should_fail+0x8c0/0xa40 [ 180.313837] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 180.318938] ? kasan_kmalloc+0xad/0xe0 [ 180.322826] ? kmem_cache_alloc_trace+0x136/0x740 [ 180.327664] ? __memcg_init_list_lru_node+0x169/0x270 [ 180.332851] ? __list_lru_init+0x544/0x750 [ 180.337079] ? sget_userns+0x6b1/0xe40 [ 180.340960] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 180.345709] ? do_mount+0xea4/0x2bb0 [ 180.349415] ? SyS_mount+0xab/0x120 [ 180.353036] ? do_syscall_64+0x281/0x940 [ 180.357097] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 180.362460] ? find_held_lock+0x35/0x1d0 [ 180.366523] ? __lock_is_held+0xb6/0x140 [ 180.370590] ? check_same_owner+0x320/0x320 [ 180.374912] ? rcu_note_context_switch+0x710/0x710 [ 180.379845] should_failslab+0xec/0x120 [ 180.383817] kmem_cache_alloc_trace+0x4b/0x740 [ 180.388393] ? __kmalloc_node+0x33/0x70 [ 180.392362] ? __kmalloc_node+0x33/0x70 [ 180.396337] ? rcu_read_lock_sched_held+0x108/0x120 [ 180.401358] __memcg_init_list_lru_node+0x169/0x270 [ 180.406365] ? list_lru_add+0x7c0/0x7c0 [ 180.410318] ? __kmalloc_node+0x47/0x70 [ 180.414275] __list_lru_init+0x544/0x750 [ 180.418315] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 180.424178] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 180.429173] ? lockdep_init_map+0x9/0x10 [ 180.433217] sget_userns+0x6b1/0xe40 [ 180.436908] ? set_anon_super+0x20/0x20 [ 180.440867] ? put_filp+0x90/0x90 [ 180.444307] ? destroy_unused_super.part.6+0xd0/0xd0 [ 180.449396] ? alloc_vfsmnt+0x762/0x9c0 [ 180.453352] ? path_lookupat+0x238/0xba0 [ 180.457389] ? mnt_free_id.isra.21+0x50/0x50 [ 180.461773] ? trace_hardirqs_off+0x10/0x10 [ 180.466073] ? putname+0xee/0x130 [ 180.469502] ? cap_capable+0x1b5/0x230 [ 180.473404] ? security_capable+0x8e/0xc0 [ 180.477534] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 180.482706] ? ns_capable_common+0xcf/0x160 [ 180.487009] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 180.492186] mount_ns+0x6d/0x190 [ 180.495537] rpc_mount+0x9e/0xd0 [ 180.498879] mount_fs+0x66/0x2d0 [ 180.502222] vfs_kern_mount.part.26+0xc6/0x4a0 [ 180.506778] ? may_umount+0xa0/0xa0 [ 180.510390] ? _raw_read_unlock+0x22/0x30 [ 180.514521] ? __get_fs_type+0x8a/0xc0 [ 180.518395] do_mount+0xea4/0x2bb0 [ 180.521913] ? __might_fault+0x110/0x1d0 [ 180.525955] ? copy_mount_string+0x40/0x40 [ 180.530165] ? check_same_owner+0x320/0x320 [ 180.534466] ? __check_object_size+0x8b/0x530 [ 180.538940] ? __might_sleep+0x95/0x190 [ 180.542899] ? kasan_check_write+0x14/0x20 [ 180.547119] ? _copy_from_user+0x99/0x110 [ 180.551260] ? memdup_user+0x5e/0x90 [ 180.554959] ? copy_mount_options+0x1f7/0x2e0 [ 180.559443] SyS_mount+0xab/0x120 [ 180.562878] ? copy_mnt_ns+0xb30/0xb30 [ 180.566744] do_syscall_64+0x281/0x940 [ 180.570616] ? vmalloc_sync_all+0x30/0x30 [ 180.574752] ? finish_task_switch+0x1c1/0x7e0 [ 180.579228] ? syscall_return_slowpath+0x550/0x550 [ 180.584139] ? syscall_return_slowpath+0x2ac/0x550 [ 180.589044] ? prepare_exit_to_usermode+0x350/0x350 [ 180.594041] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 180.599382] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 180.604202] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 180.609366] RIP: 0033:0x454e79 [ 180.612530] RSP: 002b:00007fc28ac9cc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 180.620212] RAX: ffffffffffffffda RBX: 00007fc28ac9d6d4 RCX: 0000000000454e79 [ 180.627456] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 180.634701] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 180.641948] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000016 [ 180.649194] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000026 [ 180.674395] EXT4-fs (sda1): re-mounted. Opts: [ 180.691879] devpts: called with bogus options 2018/03/31 05:13:28 executing program 3: mkdir(&(0x7f00000014c0)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000100)='iso9660\x00', 0xffffffdfffffffff, &(0x7f0000000180)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000080)={0xffffffffffffffff}) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000811ffa)='bdev\x00', 0x100000, &(0x7f0000000dc0)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='msdos\x00', 0x12000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xf, 0x4, 0x28000000000004, 0x1, 0x2}, 0x2c) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000180)) mount(&(0x7f00002b9ff8)='./file0\x00', &(0x7f0000cbeff8)='./file0\x00', &(0x7f00005f7ffa)='ramfs\x00', 0x80000, &(0x7f000002f000)) socketpair$inet(0x2, 0x1, 0x400, &(0x7f00000000c0)) socketpair(0x1b, 0x7, 0x7, &(0x7f0000000500)) recvmsg(r0, &(0x7f00000004c0)={&(0x7f00000001c0)=@alg, 0x80, &(0x7f0000000400)=[{&(0x7f0000000240)=""/88, 0x58}, {&(0x7f00000002c0)=""/168, 0xa8}, {&(0x7f0000000140)=""/53, 0x35}, {&(0x7f0000000380)=""/122, 0x7a}], 0x4, &(0x7f0000000440)=""/90, 0x5a, 0x8}, 0x1) mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f00000e7000)) 2018/03/31 05:13:28 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x0, 0x2, &(0x7f0000000080)=@raw=[@alu={0x0, 0x0, 0x0, 0x7, 0xf, 0xfffffffd}], &(0x7f00000000c0)='GPL\x00', 0x8, 0x12, &(0x7f0000000100)=""/18, 0x41f00}, 0x48) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x10, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0x11}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)=@vsock, 0xfffffffffffffda6, &(0x7f00000000c0)=[{&(0x7f0000000180)=""/154, 0x9a}], 0x1, &(0x7f0000000240)=""/105, 0x69}, 0x0) close(r0) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x28a, &(0x7f0000000000)}, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x0, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000006240)={0x0, 0xb, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x1}, [@alu={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x9}, @initr0={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, @jmp={0x5, 0xffffffff, 0x7, 0xf, 0x0, 0x0, 0xffffffffffffffff}, @initr0={0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x7}], {0x95}}, &(0x7f0000000340)="4750dfc4a62f2bfd3890d02e15bc20c686bf838237f6d3beeb1dd89afff3391ccf83367e7ea1", 0x0, 0x75, &(0x7f00000004c0)=""/117, 0x41100, 0x1}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x0, r2, 0x0, [0x115]}, 0x2c) socketpair(0x0, 0x1, 0x0, &(0x7f000000dff8)) close(r3) 2018/03/31 05:13:28 executing program 6 (fault-call:17 fault-nth:39): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x0, 0x101, 0x4, 0x0, 0x1, r0, 0x0, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r2 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)={0xffffffffffffffff}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r2, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x0, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0", 0xc9}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000280)={&(0x7f0000000680)='./file0\x00'}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r1}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r3) gettid() close(0xffffffffffffffff) 2018/03/31 05:13:28 executing program 7: socketpair(0x3, 0xb, 0x4000000000000, &(0x7f0000000100)={0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000640)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, r0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000007c0)="63707526303c3206fd0000013c12b8d0cc69bf6821cc1b4d7878b2fe2d897367ffa75134df22ad070000000000000072e82ad3283820f255c2db0000e3ff000000050fad02ae9f2109182b00e3033578fd7e89b8f17129cb97541bd003bf3dcf376e938f59a1083ba783fa3e7318893cae") mkdir(&(0x7f0000000280)='./file0\x00', 0x8) socketpair(0x8, 0xb, 0x2, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = getpid() perf_event_open(&(0x7f0000000300)={0x6, 0x70, 0x8, 0xffff, 0x3, 0xd60e, 0x0, 0x9, 0x80002, 0x4, 0x400, 0x6, 0x7, 0x20, 0x8000, 0x1, 0x7f, 0x5, 0x9, 0x0, 0xc3d6, 0x4, 0xf8, 0x80000001, 0x2, 0x7ff, 0x9, 0x7, 0xba40, 0x10001, 0x2800000000, 0x7, 0x3ff, 0x9, 0x9, 0x8001, 0x8, 0x5, 0x0, 0x7f, 0x0, @perf_config_ext={0x101, 0x1}, 0x20, 0x9, 0x7, 0x3, 0x10001, 0x8, 0x5}, r4, 0x4, r3, 0x1) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000000380)) recvmsg$kcm(r3, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/202, 0xffffffd7}], 0x1, &(0x7f0000000500)=""/32, 0x20, 0x8}, 0x2000) ioctl$PERF_EVENT_IOC_ID(r3, 0x80082407, &(0x7f00000002c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={r2, 0x0, 0x4f, 0xfffffffffffffdaa, &(0x7f0000000080)="3aa63f076ca38f0a6645493b372b70b8c1eccd0df86b224170c1a385b008981f9d1e901e114586bff8b2b0b6e1fd04c3f970f1a5c835592086493b740c25c6693a88204fe8f22d982bd9cafad9250c", &(0x7f00000001c0)=""/187, 0x4, 0x1000000000002}, 0x644bc5b6ee3c0056) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000005c0)="63707526303c3206fd0000013c12b8d0cc69bf6821cc1b4d7878b2fe2d897367ffa75134df22ad070000000000000072e82ad3283820f255c2db0000e3ff000000050fad02ae9f2109182b00e3033578fd7e89b8f17129cb97541bd003bf3dcf376e938f59a1083ba783fa3e7318893cae") ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x6) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000140)) 2018/03/31 05:13:28 executing program 1: mkdir(&(0x7f0000000000)='./file1\x00', 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000001480)={0x7, 0x5, &(0x7f0000001380)=ANY=[@ANYBLOB="18000000d8090b000000000001000000d17f02000104000000000000000000009500000009000000"], &(0x7f00000013c0)='syzkaller\x00', 0x6, 0x6e, &(0x7f0000001400)=""/110, 0x41000}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001580)={r0, 0x50, &(0x7f0000001500)}, 0x10) r1 = perf_event_open(&(0x7f0000001200)={0x4, 0x70, 0x1ff, 0x8000, 0xd8e, 0x7, 0x0, 0x1000, 0x4000, 0x9, 0x0, 0xf2, 0x4afb, 0xfffffffffffffae6, 0x4, 0x9, 0x4, 0xffff, 0x7, 0x8, 0x10001, 0x1, 0xb7, 0x1f, 0x380, 0x4, 0xf5, 0x7fff, 0x9, 0x6, 0x1, 0xfffffffffffffff9, 0x400, 0x7, 0xffffffffffffffff, 0x67b3c7da, 0xa0c, 0xffffffffffffff81, 0x0, 0x5d6c, 0x2, @perf_bp={&(0x7f0000000ec0), 0x9}, 0x2000, 0x80000001, 0x81, 0x1, 0xfffffffffffffffb, 0x3, 0x6e24}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0xa) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001300)={0xf, 0x9, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x4}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x2}, @ldst={0x0, 0x3, 0x7, 0x3, 0x3, 0xffffffc6, 0xffffffffffffffff}, @jmp={0x5, 0x7, 0x7, 0xa, 0x4, 0xfffffff8, 0x4}], {0x95}}, &(0x7f00000012c0)='syzkaller\x00', 0x4, 0x1000, &(0x7f0000002040)=""/4096, 0x41100, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000700)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000140)={r3}) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000052c0)={&(0x7f0000004f40)=@ll={0x11, 0x5da1e49052ee8435, 0x0, 0x1, 0x5, 0x6, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x18}}, 0x80, &(0x7f0000005200)=[{&(0x7f0000004fc0)="0a295dc2bdcaec4195822c4d6f66913da9651c9633f186fda68f8a6dcaa27b675eeedec48472e8b7de209853495c14bae1bfa27314749c3b45a0d2e830c3f13c0c3956fcc43926d45994c98c24dcc9bc246c986fadd44bf04f4471ae5c4b26339220def5e661ede600dadacdb8aa87f2", 0x70}], 0x1, &(0x7f0000005240)=ANY=[]}, 0x0) mount(&(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0)='./file1\x00', &(0x7f0000000280)='autofs\x00', 0x3, &(0x7f0000000240)='\x00') socketpair(0x10, 0x2, 0x9, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r4, &(0x7f00000006c0)={&(0x7f0000000300)=@alg={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x80, &(0x7f0000000980)=[{&(0x7f0000000380)="3df7035790bd4760f20fb15d76e20b5e6d54661a8ae79aaeb7fb572c22357bb7014a5bf268e235f06129417a56dac22f42004e41f2e37b81fdeb4233c8da700471859ba683a78d1aabe6ba3efe7ca574a86f919201cd3be7cbd786c1bdecaa0e96477cc0e454c8e7a812f30447c5e3d13741b8110e7534c70605e7bc9337025278285a4b384c37b66788812e6cee4a554bc40a2ac67a136ac1ebcb4f75390d5aa40c0e64fe6b0854181328796b17d74426c36799c97cb9ef8fa2e78c41380e23494c5db5ff177a67d3b797905a7eb6a6dfced22da96f900e5198de1c64c7ceee0a8675ec8cfe746f5e59eba3c3", 0xed}], 0x1, &(0x7f0000000a40), 0x0, 0x800}, 0x0) close(r5) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) r6 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000100)={&(0x7f0000000080)='./file1/file0\x00', 0x0, 0x10}, 0x4) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000a00)) close(0xffffffffffffffff) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x80, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}], 0x1, &(0x7f0000000180)=""/105, 0x69}, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000004c0)={&(0x7f0000000480)='./file1/file0\x00', 0x0, 0x18}, 0x10) recvmsg$kcm(r4, &(0x7f0000000dc0)={&(0x7f0000000b00)=@hci, 0x80, &(0x7f0000000c00)=[{&(0x7f00000015c0)=""/240, 0xf0}, {&(0x7f0000000b80)=""/69, 0x45}, {&(0x7f00000009c0)}], 0x3, &(0x7f0000005300)=""/4096, 0x1000, 0x7}, 0x10000) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xa, &(0x7f0000000500)=ANY=[@ANYBLOB="180000000000000000000000000000000500000000000000000000000000000095000000ec0000008e2e4f6f914d67da1a112777fddc6f9bd679fb6ae7fa7baec77c1bd3b2000000000000000000000000"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000005c0)={r6, 0x0, 0x47, 0xe8, &(0x7f0000000800)="4781b70353d67cac5095d77f10f2ac3633e35407ba4cb5b60521c7ab1bf6bc6d65b1b2108667397965030c990ff0699f1f548f0c4dd2b59b9a480ec8c39632a32057db81cd994f", &(0x7f0000000880)=""/232}, 0x28) sendmsg$kcm(r5, &(0x7f0000000f00)={0x0, 0x0, &(0x7f0000000e00)=[{&(0x7f0000000a40)="7181d9aea18c8c1657cb361633e121a09f8f4bf91d73615f9a38dc8ae5f0eb3a354fabed078a1861d66dc7cdbe1fd14230c1510910228321ed340dc5f4d25f192d47195f3cde2a4594d7735f86897e7f4d1630647433a2548b6122f85c8a6d5c67e8ff52ac2e6dd230b0d2936393d6bb74a3e10ed683f5ceefe75c488fe8de22f70d34e43a9808", 0x87}, {&(0x7f0000000c40)="07225ff6d7fea277b593746b19d4413395f9fc1216cd0966c29a5ce34b4725b40e9c7269347bfbdfe8992afb5b0ec915b9ee7d5baf248d138f54d7b972d127e99a5561896c04c59d845aa0e3923413084d47090ad876a2721124115d6a206cba898d1d13abce8bf535cc55b47a2cb17fe18e072217a98f76f5288695d56aa2359e7ca9ab8d15e313544627aefa252388477ac61429c440249c4acbb6f28f4d63e14ce013bbb59fb0063f6c99ec2c232c1778d3f7f5a96362817eb59f313055575c455324c3d59aef6933ae296c3b15fb5aa7acc63714e9b370fe1a7ac341074e1a", 0xe1}], 0x2, &(0x7f0000000f40)=ANY=[]}, 0x800) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000740)=r7, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000680)={r4, 0x0, 0x6d, 0x63, &(0x7f0000000780)="611fd17bae8aa02ba4c9ad8cfe96b40fad456dc726fbf59eb3bca0feaedcfcb5f1809f621bf00f3e51e16a1806b4b44091840c5e5dcb0e63e55c3c003e51805b74bc006cf441096cdc97149b1f20e0eac6928391e671eeecc294774111547b6529923bb05fe643b5cd34aeb4ea", &(0x7f0000000600)=""/99, 0xfffffffffffff800, 0x9}, 0x28) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000580)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000e80)={r6, 0x0, 0x93, 0xb3, &(0x7f0000001080)="972859eab371f93db346cfd8334cd15e0661cc0d1c2395789864adacfea4ffb4e255764e24b6923016ea47778df94266c08ff56a923fa4e168d35bf850722a8622519416e3d0c6797565f80304630993296c459460081ef111f5f2b8d33c30ee7459271b3a51c8e049c275931fae57804d3d635197d42ee3364b1c761c1c2eaba0c432f58fc69076dc4c32bb848864b1cd7180", &(0x7f0000001140)=""/179, 0x4, 0x1f}, 0x28) [ 180.757866] devpts: called with bogus options 2018/03/31 05:13:28 executing program 2: socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000040)={0x7, 0x70, 0x1, 0xaabc, 0x2, 0x2, 0x0, 0xec, 0x4800, 0x1, 0x3a6b72c9, 0xffffffffffff8000, 0xfff, 0x7, 0x2, 0x7, 0xff, 0x1, 0x2, 0x9, 0x1, 0x0, 0x5, 0x75, 0x2, 0x7, 0x8, 0x4, 0x0, 0xdbce, 0xffff, 0xfaf, 0x1, 0xe7, 0xd0eb, 0x28a5, 0x9, 0x4, 0x0, 0x7, 0x2, @perf_config_ext={0x1, 0x8000}, 0x489, 0x6, 0xff, 0x0, 0x9d, 0x8, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f00000000c0)={0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000140)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r2 = getpid() r3 = perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x8, 0x4, 0x4, 0x1, 0x0, 0x401, 0x100, 0x7, 0xcfc0, 0x7, 0x0, 0x7, 0x30, 0x7, 0x7, 0xfff, 0x7, 0x9, 0xff, 0x9, 0xf, 0x0, 0x3, 0x100000000, 0x3, 0x8, 0xffff, 0x2, 0x3, 0x0, 0x6f, 0x3, 0x5, 0x800, 0x81, 0x0, 0x0, 0x9, 0x1, @perf_bp={&(0x7f0000000180), 0x1}, 0x11815, 0x9, 0x1, 0x1, 0x101, 0x5, 0x1e892fee}, r2, 0x9, r1, 0x1) r4 = perf_event_open(&(0x7f0000000280)={0x5, 0x70, 0xe00000000000, 0x9, 0x800, 0x6, 0x0, 0x7ff, 0x10200, 0xb, 0xe3, 0x5, 0x1, 0x4, 0x9b0f, 0x1f8a, 0x401, 0x1, 0xe975, 0x7, 0x437, 0x9, 0x7f, 0x20, 0x1, 0x2, 0x3, 0x5, 0x200, 0x1, 0x8, 0x401, 0x401, 0x2, 0x8, 0xfff, 0xf3c8, 0xf23, 0x0, 0x7fffffff, 0x0, @perf_bp={&(0x7f0000000240), 0x9}, 0x828, 0x3, 0x5, 0x1, 0x0, 0xc37, 0x6}, r2, 0x4, r1, 0x2) r5 = perf_event_open(&(0x7f0000000300)={0x4, 0x70, 0xff, 0x3, 0x7f, 0x7, 0x0, 0x40, 0x4a240, 0x2, 0xffffffffffffcc27, 0xb8, 0x2, 0x7, 0x9, 0x800, 0x3, 0x7d4d, 0xf7, 0xfffffffffffffffa, 0x9, 0x4, 0x3, 0x90be, 0x9, 0xfffffffffffffffc, 0x6, 0x3ff, 0xab6b, 0x8001, 0x5, 0x2, 0x9, 0x732, 0x400, 0x55000000000, 0x1ff, 0x6, 0x0, 0x0, 0x2, @perf_config_ext={0x6, 0xffffffff}, 0x40, 0x80000001, 0x7fff, 0x2, 0x1, 0x6, 0x5}, r2, 0xf, r4, 0xa) r6 = perf_event_open(&(0x7f00000003c0)={0x7, 0x70, 0xc87d, 0x6, 0x5, 0x80000001, 0x0, 0x3, 0x1, 0xb, 0xffffffff, 0x9, 0x584, 0x31b, 0x7, 0x2, 0x3, 0x544, 0x100000001, 0x9, 0x1, 0x100, 0x3, 0x1, 0x7, 0x0, 0x7, 0x5, 0xbb, 0x40, 0x7, 0x8, 0x81, 0xc5a, 0x0, 0x7, 0x1f, 0x815, 0x0, 0xffff, 0x2, @perf_bp={&(0x7f0000000380), 0x8}, 0x4, 0x5, 0xc95, 0x0, 0x7ff, 0x7b02, 0x7}, r2, 0x10, r1, 0xb) ioctl$PERF_EVENT_IOC_DISABLE(r3, 0x2401, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0x4) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = perf_event_open(&(0x7f0000000480)={0x7, 0x70, 0x7, 0xdbff, 0x3, 0x3f, 0x0, 0x8, 0x0, 0xc, 0x8, 0x0, 0xf43, 0x101, 0x6, 0x5, 0x6, 0x9, 0x200, 0xfffffffffffffffd, 0x4, 0x6, 0x6e, 0x20, 0x1b3, 0x1fe, 0x7ff, 0x3, 0x8000, 0x5, 0x0, 0x0, 0x0, 0x5, 0x22d2, 0x401, 0x68, 0xa1ce, 0x0, 0x4, 0x0, @perf_config_ext={0x2fb, 0x4}, 0x2000, 0xd33, 0x6, 0x697c4c7d75b7b6da, 0x171f, 0x9, 0x9}, r2, 0x6, r5, 0x1) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x9, 0x6, 0x101, 0x8, 0x0, 0x200, 0x2000, 0xf, 0x0, 0x5, 0x6, 0x3, 0x2, 0x0, 0x8001, 0x8, 0x3, 0x5, 0x17, 0x7, 0x4, 0x400, 0xffffffff, 0x7, 0x8000, 0x2, 0x100, 0x0, 0x7, 0x95de, 0x2, 0x1, 0x2, 0xd432, 0x3ff, 0x8599, 0x0, 0x3ff, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x10080, 0x7, 0xe7e, 0x7, 0x5, 0x7, 0x9}, r2, 0x0, r3, 0x8) close(r7) ioctl$PERF_EVENT_IOC_DISABLE(r9, 0x2401, 0x1) r10 = gettid() ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f00000005c0)={r0}) ioctl$sock_kcm_SIOCKCMUNATTACH(r11, 0x89e1, &(0x7f0000000600)={r8}) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000640)) r12 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)={0x4, 0x7, 0x7f, 0x9787, 0x1c, 0xffffffffffffffff, 0x5}, 0x2c) recvmsg$kcm(r11, &(0x7f0000009440)={&(0x7f0000009300)=@can={0x0, 0x0}, 0x80, &(0x7f00000093c0)=[{&(0x7f0000009380)=""/16, 0x10}], 0x1, &(0x7f0000009400)=""/18, 0x12, 0x3bc1}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000009480)={0xf, 0x13, &(0x7f00000006c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [@ldst={0x3, 0x2, 0x1, 0x2, 0x7, 0xffffffff, 0x4}, @map={0x18, 0x0, 0x1, 0x0, r12}, @alu={0x7, 0x5, 0xf, 0x6, 0xe, 0x2, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4}, @jmp={0x5, 0x7a4c, 0x0, 0x3, 0x9, 0xffffffff, 0xfffffffffffffff0}, @alu={0x4, 0x20, 0x9, 0x9, 0x5, 0xfffffffe, 0x4}, @jmp={0x5, 0x81, 0x9, 0x7, 0x6, 0xfffffffe, 0xfffffffffffffff0}, @jmp={0x5, 0x3, 0x3, 0x0, 0x2, 0x2, 0xffffffffffffffff}], {0x95}}, &(0x7f0000000780)='GPL\x00', 0x4, 0x77, &(0x7f00000007c0)=""/119, 0x0, 0x1, [], r13}, 0x48) mount(&(0x7f0000009500)='./file0\x00', &(0x7f0000009540)='./file0\x00', &(0x7f0000009580)='cramfs\x00', 0x5020, &(0x7f00000095c0)="22f464f8fef2b95976576e903efe99229584aaf55fa0d91223905d4a68c0c7d18bf26de6fec0660b0c36945200da04f802d9059dd5f6d2f0eca450f4fdd46ed2b411588d802f0d1d02be65816332b2754d686e927593deb8ee3ed17a24d749db81290c33836bcc9b7d93084c53d0744e81deb8b83d9b23565d6db4cb746eb15b20f7b806f0b5a02676d90260a61b00e9ec0b4b8bf07d5f93b3feda8299586c3936f743c764205de278c25a6fff98") perf_event_open(&(0x7f00000096c0)={0x1, 0x70, 0x3, 0xa8e, 0x1000, 0xe57a, 0x0, 0x6, 0x2100b, 0x2, 0x9, 0xdb1b, 0xfffffffffffffffa, 0xa7f8, 0x3, 0x2, 0x800, 0x800, 0x2, 0x0, 0x3f, 0x3, 0x8000000000000, 0x3, 0x20, 0x6, 0x3, 0xfffffffffffff318, 0xffffffffffff0001, 0xfffffffffffffffe, 0x12, 0x1, 0x101, 0x8, 0x100, 0x1, 0x3, 0x8, 0x0, 0x3ff, 0x7, @perf_bp={&(0x7f0000009680), 0x3}, 0x9, 0x6, 0xfffffffffffffff7, 0x0, 0x0, 0x49, 0xfffffffffffff3b8}, r10, 0xe, r5, 0x8) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000009880)={r12, &(0x7f0000009740)="8ba447000764036f17624e623896639a3e2456b901aedcdb4221cea83c3b2c94575967a34ec104bbebeaf6a6b50494e6763f41056d2ca84f906fa48d72590e81334926fab48e", &(0x7f00000097c0)=""/170}, 0x18) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r4, 0x2405, r6) bpf$PROG_LOAD(0x5, &(0x7f00000099c0)={0x7, 0x4, &(0x7f00000098c0)=@raw=[@ldst={0x3, 0x3, 0x6, 0xd, 0x7, 0x26}, @ldst={0x0, 0x2, 0x0, 0xa, 0x0, 0x4, 0xffffffffffffffff}], &(0x7f0000009900)='GPL\x00', 0x5, 0x5d, &(0x7f0000009940)=""/93, 0x41f00, 0x1, [], r13}, 0x48) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000009b40)={r8, &(0x7f0000009a40)="402c0b8b20e0ae84bb", &(0x7f0000009a80)=""/178}, 0x18) 2018/03/31 05:13:28 executing program 4: mount(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='ncpfs\x00', 0x80802, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x50, &(0x7f0000000700)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780)=r0, 0x4) mount(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='./file0\x00', &(0x7f00000006c0)='btrfs\x00', 0x89402, &(0x7f0000000900)="e196efa3cb748d2a6600968b76295ff919bc3877b18eb8d265a35493fcf34fdc965cd5c837d2389c6e2ec6088abe8daaa8ca23f9298fc94dc26874bc4d4567afea1ca0879cdf21e915005a83e96b1002af29091d2176abbb7fec088a67f2e1390f32adaf2f252d24510870f8df7186936f4d88957eb8fcda78b7383a7d24db701d524557ee7324433e70d9ffa185098325f9e657d3c29cf6a35843cb96780269db1c735d55938af5c60e1e4ba25928697277b0fdf356b62399b4c8826d09bfca7d6078c19b") ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0xffffffff) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6f3, 0x0, 0x6, 0x0, 0x0, 0xfffdffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x22, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000f6bffb)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000400)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000540)={r1, 0x50}, 0xfffffe74) close(r1) perf_event_open(&(0x7f0000348f88)={0x2, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x28, 0x2, 0x0, &(0x7f0000000000)={0x0}) mkdir(&(0x7f0000000100)='./file0\x00', 0x1000000000) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='selinuxfs\x00', 0x1000, &(0x7f0000000100)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='minix\x00', 0x10020, &(0x7f0000000240)) 2018/03/31 05:13:28 executing program 0: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x4) r3 = perf_event_open(&(0x7f00000000c0)={0x4, 0x70, 0x0, 0x7ff, 0x92, 0x401, 0x0, 0x6, 0x2, 0xa, 0x5, 0xe3ec, 0x4, 0xffff, 0x100000001, 0x1, 0x8b3c, 0x1ff, 0x3d0, 0x1, 0x80000001, 0x3f, 0x3, 0x8, 0x9, 0x9, 0x2, 0x7d, 0x42e, 0x7fff, 0x2, 0x5, 0x1, 0x0, 0xd87, 0x80000000, 0x49ef, 0x1, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000080), 0x1}, 0x1803, 0xfffffffffffff1a7, 0x0, 0x6, 0x5, 0x0, 0xffea}, 0x0, 0x4, r0, 0x1) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xf, 0x2, 0x1f, 0x0, 0x1c, 0xffffffffffffff9c}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000240)={&(0x7f0000000180)='./file0\x00', r4}, 0x10) close(r3) r5 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x101, 0x800, 0x3, 0x101, 0x0, 0x2, 0x10040, 0x2, 0x5, 0x4d49, 0x6, 0x200, 0x10000, 0x5, 0x1, 0xfffffffffffff801, 0x0, 0x80000000, 0x162, 0x8000, 0x400, 0x101, 0x93, 0x8000, 0xff, 0x3, 0x200, 0x400, 0x40, 0x10000, 0x8, 0x3, 0x7fffffff, 0x5, 0x1, 0x1f, 0x0, 0x100, 0x0, @perf_bp={&(0x7f00000002c0), 0x9}, 0x20000, 0x9, 0x8, 0x0, 0x2, 0xffffffffffffff5c, 0x6}, r2, 0xa, r1, 0x8) close(r0) mount(&(0x7f0000000400)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000440)="1d2e366679938d4d7b7abcd0f97a94e5d2d23b6a153b534a8bc0c04b6873662e1b18f1078b077df3e55aeb75dd04d3697d8e7c3850e817cdbd4e15afe488a1fcca6957c1fb7d368664909e10ce5d9c2f25e1d2f4c1a750ffd391b660b387882247f7ab6fe3a4d9035bfd632a4d5dc7c0dae1132ac56fb476ff0245d4e536865ca47a868a1b84624f1f4181401fe82b21a5513cfc1f837a1e08cda5c4ae6d7092d96f8f3e170a6095f3a0fe83d8", 0x20020, &(0x7f0000000500)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb1104058d8843") close(r1) socketpair(0x11, 0x6, 0x7fff, &(0x7f00000005c0)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x6) perf_event_open(&(0x7f0000000380)={0x0, 0x70, 0x9, 0xffff, 0x1000, 0x3ff, 0x0, 0xffffffff80000000, 0x40000, 0x8, 0x1000, 0x3, 0x1, 0x4, 0x0, 0x1e64a00000000, 0x8001, 0x6, 0xffffffff, 0x4, 0x6, 0x242, 0x2, 0xa4, 0x8, 0xfff, 0xf77f, 0x401, 0x5727, 0x3, 0x80000000, 0xffffffffffff7fff, 0x6, 0xffffffffffffffa7, 0x8, 0xffffffff7fffffff, 0xff, 0x8, 0x0, 0x4, 0x4, @perf_config_ext={0xade4, 0x5}, 0x10000, 0x8, 0x6, 0x7, 0x2, 0x6, 0x2}, r2, 0x5, r0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0x5) socketpair(0x3, 0x1, 0x174f1f0c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={r4, 0x28, &(0x7f0000000280)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000640)={r8, 0x35bf5e58, 0x18}, 0xc) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40042409, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x40082404, &(0x7f0000000600)) [ 180.809977] autofs4:pid:15390:autofs4_fill_super: called with bogus options [ 180.825598] EXT4-fs (sda1): re-mounted. Opts: [ 180.847636] FAULT_INJECTION: forcing a failure. [ 180.847636] name failslab, interval 1, probability 0, space 0, times 0 2018/03/31 05:13:28 executing program 2: socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000040)={0x7, 0x70, 0x1, 0xaabc, 0x2, 0x2, 0x0, 0xec, 0x4800, 0x1, 0x3a6b72c9, 0xffffffffffff8000, 0xfff, 0x7, 0x2, 0x7, 0xff, 0x1, 0x2, 0x9, 0x1, 0x0, 0x5, 0x75, 0x2, 0x7, 0x8, 0x4, 0x0, 0xdbce, 0xffff, 0xfaf, 0x1, 0xe7, 0xd0eb, 0x28a5, 0x9, 0x4, 0x0, 0x7, 0x2, @perf_config_ext={0x1, 0x8000}, 0x489, 0x6, 0xff, 0x0, 0x9d, 0x8, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f00000000c0)={0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000140)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r2 = getpid() r3 = perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x8, 0x4, 0x4, 0x1, 0x0, 0x401, 0x100, 0x7, 0xcfc0, 0x7, 0x0, 0x7, 0x30, 0x7, 0x7, 0xfff, 0x7, 0x9, 0xff, 0x9, 0xf, 0x0, 0x3, 0x100000000, 0x3, 0x8, 0xffff, 0x2, 0x3, 0x0, 0x6f, 0x3, 0x5, 0x800, 0x81, 0x0, 0x0, 0x9, 0x1, @perf_bp={&(0x7f0000000180), 0x1}, 0x11815, 0x9, 0x1, 0x1, 0x101, 0x5, 0x1e892fee}, r2, 0x9, r1, 0x1) r4 = perf_event_open(&(0x7f0000000280)={0x5, 0x70, 0xe00000000000, 0x9, 0x800, 0x6, 0x0, 0x7ff, 0x10200, 0xb, 0xe3, 0x5, 0x1, 0x4, 0x9b0f, 0x1f8a, 0x401, 0x1, 0xe975, 0x7, 0x437, 0x9, 0x7f, 0x20, 0x1, 0x2, 0x3, 0x5, 0x200, 0x1, 0x8, 0x401, 0x401, 0x2, 0x8, 0xfff, 0xf3c8, 0xf23, 0x0, 0x7fffffff, 0x0, @perf_bp={&(0x7f0000000240), 0x9}, 0x828, 0x3, 0x5, 0x1, 0x0, 0xc37, 0x6}, r2, 0x4, r1, 0x2) r5 = perf_event_open(&(0x7f0000000300)={0x4, 0x70, 0xff, 0x3, 0x7f, 0x7, 0x0, 0x40, 0x4a240, 0x2, 0xffffffffffffcc27, 0xb8, 0x2, 0x7, 0x9, 0x800, 0x3, 0x7d4d, 0xf7, 0xfffffffffffffffa, 0x9, 0x4, 0x3, 0x90be, 0x9, 0xfffffffffffffffc, 0x6, 0x3ff, 0xab6b, 0x8001, 0x5, 0x2, 0x9, 0x732, 0x400, 0x55000000000, 0x1ff, 0x6, 0x0, 0x0, 0x2, @perf_config_ext={0x6, 0xffffffff}, 0x40, 0x80000001, 0x7fff, 0x2, 0x1, 0x6, 0x5}, r2, 0xf, r4, 0xa) r6 = perf_event_open(&(0x7f00000003c0)={0x7, 0x70, 0xc87d, 0x6, 0x5, 0x80000001, 0x0, 0x3, 0x1, 0xb, 0xffffffff, 0x9, 0x584, 0x31b, 0x7, 0x2, 0x3, 0x544, 0x100000001, 0x9, 0x1, 0x100, 0x3, 0x1, 0x7, 0x0, 0x7, 0x5, 0xbb, 0x40, 0x7, 0x8, 0x81, 0xc5a, 0x0, 0x7, 0x1f, 0x815, 0x0, 0xffff, 0x2, @perf_bp={&(0x7f0000000380), 0x8}, 0x4, 0x5, 0xc95, 0x0, 0x7ff, 0x7b02, 0x7}, r2, 0x10, r1, 0xb) ioctl$PERF_EVENT_IOC_DISABLE(r3, 0x2401, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0x4) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = perf_event_open(&(0x7f0000000480)={0x7, 0x70, 0x7, 0xdbff, 0x3, 0x3f, 0x0, 0x8, 0x0, 0xc, 0x8, 0x0, 0xf43, 0x101, 0x6, 0x5, 0x6, 0x9, 0x200, 0xfffffffffffffffd, 0x4, 0x6, 0x6e, 0x20, 0x1b3, 0x1fe, 0x7ff, 0x3, 0x8000, 0x5, 0x0, 0x0, 0x0, 0x5, 0x22d2, 0x401, 0x68, 0xa1ce, 0x0, 0x4, 0x0, @perf_config_ext={0x2fb, 0x4}, 0x2000, 0xd33, 0x6, 0x697c4c7d75b7b6da, 0x171f, 0x9, 0x9}, r2, 0x6, r5, 0x1) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x9, 0x6, 0x101, 0x8, 0x0, 0x200, 0x2000, 0xf, 0x0, 0x5, 0x6, 0x3, 0x2, 0x0, 0x8001, 0x8, 0x3, 0x5, 0x17, 0x7, 0x4, 0x400, 0xffffffff, 0x7, 0x8000, 0x2, 0x100, 0x0, 0x7, 0x95de, 0x2, 0x1, 0x2, 0xd432, 0x3ff, 0x8599, 0x0, 0x3ff, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x10080, 0x7, 0xe7e, 0x7, 0x5, 0x7, 0x9}, r2, 0x0, r3, 0x8) close(r7) ioctl$PERF_EVENT_IOC_DISABLE(r9, 0x2401, 0x1) r10 = gettid() ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f00000005c0)={r0}) ioctl$sock_kcm_SIOCKCMUNATTACH(r11, 0x89e1, &(0x7f0000000600)={r8}) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000640)) r12 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)={0x4, 0x7, 0x7f, 0x9787, 0x1c, 0xffffffffffffffff, 0x5}, 0x2c) recvmsg$kcm(r11, &(0x7f0000009440)={&(0x7f0000009300)=@can={0x0, 0x0}, 0x80, &(0x7f00000093c0)=[{&(0x7f0000009380)=""/16, 0x10}], 0x1, &(0x7f0000009400)=""/18, 0x12, 0x3bc1}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000009480)={0xf, 0x13, &(0x7f00000006c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [@ldst={0x3, 0x2, 0x1, 0x2, 0x7, 0xffffffff, 0x4}, @map={0x18, 0x0, 0x1, 0x0, r12}, @alu={0x7, 0x5, 0xf, 0x6, 0xe, 0x2, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4}, @jmp={0x5, 0x7a4c, 0x0, 0x3, 0x9, 0xffffffff, 0xfffffffffffffff0}, @alu={0x4, 0x20, 0x9, 0x9, 0x5, 0xfffffffe, 0x4}, @jmp={0x5, 0x81, 0x9, 0x7, 0x6, 0xfffffffe, 0xfffffffffffffff0}, @jmp={0x5, 0x3, 0x3, 0x0, 0x2, 0x2, 0xffffffffffffffff}], {0x95}}, &(0x7f0000000780)='GPL\x00', 0x4, 0x77, &(0x7f00000007c0)=""/119, 0x0, 0x1, [], r13}, 0x48) mount(&(0x7f0000009500)='./file0\x00', &(0x7f0000009540)='./file0\x00', &(0x7f0000009580)='cramfs\x00', 0x5020, &(0x7f00000095c0)="22f464f8fef2b95976576e903efe99229584aaf55fa0d91223905d4a68c0c7d18bf26de6fec0660b0c36945200da04f802d9059dd5f6d2f0eca450f4fdd46ed2b411588d802f0d1d02be65816332b2754d686e927593deb8ee3ed17a24d749db81290c33836bcc9b7d93084c53d0744e81deb8b83d9b23565d6db4cb746eb15b20f7b806f0b5a02676d90260a61b00e9ec0b4b8bf07d5f93b3feda8299586c3936f743c764205de278c25a6fff98") perf_event_open(&(0x7f00000096c0)={0x1, 0x70, 0x3, 0xa8e, 0x1000, 0xe57a, 0x0, 0x6, 0x2100b, 0x2, 0x9, 0xdb1b, 0xfffffffffffffffa, 0xa7f8, 0x3, 0x2, 0x800, 0x800, 0x2, 0x0, 0x3f, 0x3, 0x8000000000000, 0x3, 0x20, 0x6, 0x3, 0xfffffffffffff318, 0xffffffffffff0001, 0xfffffffffffffffe, 0x12, 0x1, 0x101, 0x8, 0x100, 0x1, 0x3, 0x8, 0x0, 0x3ff, 0x7, @perf_bp={&(0x7f0000009680), 0x3}, 0x9, 0x6, 0xfffffffffffffff7, 0x0, 0x0, 0x49, 0xfffffffffffff3b8}, r10, 0xe, r5, 0x8) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000009880)={r12, &(0x7f0000009740)="8ba447000764036f17624e623896639a3e2456b901aedcdb4221cea83c3b2c94575967a34ec104bbebeaf6a6b50494e6763f41056d2ca84f906fa48d72590e81334926fab48e", &(0x7f00000097c0)=""/170}, 0x18) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r4, 0x2405, r6) bpf$PROG_LOAD(0x5, &(0x7f00000099c0)={0x7, 0x4, &(0x7f00000098c0)=@raw=[@ldst={0x3, 0x3, 0x6, 0xd, 0x7, 0x26}, @ldst={0x0, 0x2, 0x0, 0xa, 0x0, 0x4, 0xffffffffffffffff}], &(0x7f0000009900)='GPL\x00', 0x5, 0x5d, &(0x7f0000009940)=""/93, 0x41f00, 0x1, [], r13}, 0x48) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000009b40)={r8, &(0x7f0000009a40)="402c0b8b20e0ae84bb", &(0x7f0000009a80)=""/178}, 0x18) [ 180.858995] CPU: 1 PID: 15391 Comm: syz-executor6 Not tainted 4.16.0-rc6+ #42 [ 180.866275] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 180.875626] Call Trace: [ 180.878223] dump_stack+0x194/0x24d [ 180.881853] ? arch_local_irq_restore+0x53/0x53 [ 180.886520] ? __save_stack_trace+0x7e/0xd0 [ 180.890848] should_fail+0x8c0/0xa40 [ 180.893743] autofs4:pid:15390:autofs4_fill_super: called with bogus options [ 180.894559] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 180.894573] ? kasan_kmalloc+0xad/0xe0 2018/03/31 05:13:28 executing program 2: socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000040)={0x7, 0x70, 0x1, 0xaabc, 0x2, 0x2, 0x0, 0xec, 0x4800, 0x1, 0x3a6b72c9, 0xffffffffffff8000, 0xfff, 0x7, 0x2, 0x7, 0xff, 0x1, 0x2, 0x9, 0x1, 0x0, 0x5, 0x75, 0x2, 0x7, 0x8, 0x4, 0x0, 0xdbce, 0xffff, 0xfaf, 0x1, 0xe7, 0xd0eb, 0x28a5, 0x9, 0x4, 0x0, 0x7, 0x2, @perf_config_ext={0x1, 0x8000}, 0x489, 0x6, 0xff, 0x0, 0x9d, 0x8, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f00000000c0)={0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000140)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r2 = getpid() r3 = perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x8, 0x4, 0x4, 0x1, 0x0, 0x401, 0x100, 0x7, 0xcfc0, 0x7, 0x0, 0x7, 0x30, 0x7, 0x7, 0xfff, 0x7, 0x9, 0xff, 0x9, 0xf, 0x0, 0x3, 0x100000000, 0x3, 0x8, 0xffff, 0x2, 0x3, 0xff, 0x0, 0x3, 0x5, 0x800, 0x81, 0x0, 0x0, 0x9, 0x1, @perf_bp={&(0x7f0000000180), 0x1}, 0x11815, 0x9, 0x1, 0x1, 0x101, 0x5, 0x1e892fee}, r2, 0x9, r1, 0x1) r4 = perf_event_open(&(0x7f0000000280)={0x5, 0x70, 0xe00000000000, 0x9, 0x800, 0x6, 0x0, 0x7ff, 0x10200, 0xb, 0xe3, 0x5, 0x1, 0x4, 0x9b0f, 0x1f8a, 0x401, 0x1, 0xe975, 0x7, 0x437, 0x9, 0x7f, 0x20, 0x1, 0x2, 0x3, 0x5, 0x200, 0x1, 0x8, 0x401, 0x401, 0x2, 0x8, 0xfff, 0xf3c8, 0xf23, 0x0, 0x7fffffff, 0x0, @perf_bp={&(0x7f0000000240), 0x9}, 0x828, 0x3, 0x5, 0x1, 0x0, 0xc37, 0x6}, r2, 0x4, r1, 0x2) r5 = perf_event_open(&(0x7f0000000300)={0x4, 0x70, 0xff, 0x3, 0x7f, 0x7, 0x0, 0x40, 0x4a240, 0x2, 0xffffffffffffcc27, 0xb8, 0x2, 0x7, 0x9, 0x800, 0x3, 0x7d4d, 0xf7, 0xfffffffffffffffa, 0x9, 0x4, 0x3, 0x90be, 0x9, 0xfffffffffffffffc, 0x6, 0x3ff, 0xab6b, 0x8001, 0x5, 0x2, 0x9, 0x732, 0x400, 0x55000000000, 0x1ff, 0x6, 0x0, 0x0, 0x2, @perf_config_ext={0x6, 0xffffffff}, 0x40, 0x80000001, 0x7fff, 0x2, 0x1, 0x6, 0x5}, r2, 0xf, r4, 0xa) r6 = perf_event_open(&(0x7f00000003c0)={0x7, 0x70, 0xc87d, 0x6, 0x5, 0x80000001, 0x0, 0x3, 0x1, 0xb, 0xffffffff, 0x9, 0x584, 0x31b, 0x7, 0x2, 0x3, 0x544, 0x100000001, 0x9, 0x1, 0x100, 0x3, 0x1, 0x7, 0x0, 0x7, 0x5, 0xbb, 0x40, 0x7, 0x8, 0x81, 0xc5a, 0x0, 0x7, 0x1f, 0x815, 0x0, 0xffff, 0x2, @perf_bp={&(0x7f0000000380), 0x8}, 0x4, 0x5, 0xc95, 0x0, 0x7ff, 0x7b02, 0x7}, r2, 0x10, r1, 0xb) ioctl$PERF_EVENT_IOC_DISABLE(r3, 0x2401, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0x4) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = perf_event_open(&(0x7f0000000480)={0x7, 0x70, 0x7, 0xdbff, 0x3, 0x3f, 0x0, 0x8, 0x0, 0xc, 0x8, 0x0, 0xf43, 0x101, 0x6, 0x5, 0x6, 0x9, 0x200, 0xfffffffffffffffd, 0x4, 0x6, 0x6e, 0x20, 0x1b3, 0x1fe, 0x7ff, 0x3, 0x8000, 0x5, 0x0, 0x0, 0x0, 0x5, 0x22d2, 0x401, 0x68, 0xa1ce, 0x0, 0x4, 0x0, @perf_config_ext={0x2fb, 0x4}, 0x2000, 0xd33, 0x6, 0x697c4c7d75b7b6da, 0x171f, 0x9, 0x9}, r2, 0x6, r5, 0x1) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x9, 0x6, 0x101, 0x8, 0x0, 0x200, 0x2000, 0xf, 0x0, 0x5, 0x6, 0x3, 0x2, 0x0, 0x8001, 0x8, 0x3, 0x5, 0x17, 0x7, 0x4, 0x400, 0xffffffff, 0x7, 0x8000, 0x2, 0x100, 0x0, 0x7, 0x95de, 0x2, 0x1, 0x2, 0xd432, 0x3ff, 0x8599, 0x0, 0x3ff, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x10080, 0x7, 0xe7e, 0x7, 0x5, 0x7, 0x9}, r2, 0x0, r3, 0x8) close(r7) ioctl$PERF_EVENT_IOC_DISABLE(r9, 0x2401, 0x1) r10 = gettid() ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f00000005c0)={r0}) ioctl$sock_kcm_SIOCKCMUNATTACH(r11, 0x89e1, &(0x7f0000000600)={r8}) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000640)) r12 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)={0x4, 0x7, 0x7f, 0x9787, 0x1c, 0xffffffffffffffff, 0x5}, 0x2c) recvmsg$kcm(r11, &(0x7f0000009440)={&(0x7f0000009300)=@can={0x0, 0x0}, 0x80, &(0x7f00000093c0)=[{&(0x7f0000009380)=""/16, 0x10}], 0x1, &(0x7f0000009400)=""/18, 0x12, 0x3bc1}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000009480)={0xf, 0x13, &(0x7f00000006c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [@ldst={0x3, 0x2, 0x1, 0x2, 0x7, 0xffffffff, 0x4}, @map={0x18, 0x0, 0x1, 0x0, r12}, @alu={0x7, 0x5, 0xf, 0x6, 0xe, 0x2, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4}, @jmp={0x5, 0x7a4c, 0x0, 0x3, 0x9, 0xffffffff, 0xfffffffffffffff0}, @alu={0x4, 0x20, 0x9, 0x9, 0x5, 0xfffffffe, 0x4}, @jmp={0x5, 0x81, 0x9, 0x7, 0x6, 0xfffffffe, 0xfffffffffffffff0}, @jmp={0x5, 0x3, 0x3, 0x0, 0x2, 0x2, 0xffffffffffffffff}], {0x95}}, &(0x7f0000000780)='GPL\x00', 0x4, 0x77, &(0x7f00000007c0)=""/119, 0x0, 0x1, [], r13}, 0x48) mount(&(0x7f0000009500)='./file0\x00', &(0x7f0000009540)='./file0\x00', &(0x7f0000009580)='cramfs\x00', 0x5020, &(0x7f00000095c0)="22f464f8fef2b95976576e903efe99229584aaf55fa0d91223905d4a68c0c7d18bf26de6fec0660b0c36945200da04f802d9059dd5f6d2f0eca450f4fdd46ed2b411588d802f0d1d02be65816332b2754d686e927593deb8ee3ed17a24d749db81290c33836bcc9b7d93084c53d0744e81deb8b83d9b23565d6db4cb746eb15b20f7b806f0b5a02676d90260a61b00e9ec0b4b8bf07d5f93b3feda8299586c3936f743c764205de278c25a6fff98") perf_event_open(&(0x7f00000096c0)={0x1, 0x70, 0x3, 0xa8e, 0x1000, 0xe57a, 0x0, 0x6, 0x2100b, 0x2, 0x9, 0xdb1b, 0xfffffffffffffffa, 0xa7f8, 0x3, 0x2, 0x800, 0x800, 0x2, 0x0, 0x3f, 0x3, 0x8000000000000, 0x3, 0x20, 0x6, 0x3, 0xfffffffffffff318, 0xffffffffffff0001, 0xfffffffffffffffe, 0x12, 0x1, 0x101, 0x8, 0x100, 0x1, 0x3, 0x8, 0x0, 0x3ff, 0x7, @perf_bp={&(0x7f0000009680), 0x3}, 0x9, 0x6, 0xfffffffffffffff7, 0x0, 0x0, 0x49, 0xfffffffffffff3b8}, r10, 0xe, r5, 0x8) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000009880)={r12, &(0x7f0000009740)="8ba447000764036f17624e623896639a3e2456b901aedcdb4221cea83c3b2c94575967a34ec104bbebeaf6a6b50494e6763f41056d2ca84f906fa48d72590e81334926fab48e", &(0x7f00000097c0)=""/170}, 0x18) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r4, 0x2405, r6) bpf$PROG_LOAD(0x5, &(0x7f00000099c0)={0x7, 0x4, &(0x7f00000098c0)=@raw=[@ldst={0x3, 0x3, 0x6, 0xd, 0x7, 0x26}, @ldst={0x0, 0x2, 0x0, 0xa, 0x0, 0x4, 0xffffffffffffffff}], &(0x7f0000009900)='GPL\x00', 0x5, 0x5d, &(0x7f0000009940)=""/93, 0x41f00, 0x1, [], r13}, 0x48) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000009b40)={r8, &(0x7f0000009a40)="402c0b8b20e0ae84bb", &(0x7f0000009a80)=""/178}, 0x18) 2018/03/31 05:13:28 executing program 2: socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000040)={0x7, 0x70, 0x1, 0xaabc, 0x2, 0x2, 0x0, 0xec, 0x4800, 0x1, 0x3a6b72c9, 0xffffffffffff8000, 0xfff, 0x7, 0x2, 0x7, 0xff, 0x1, 0x2, 0x9, 0x1, 0x0, 0x5, 0x75, 0x2, 0x7, 0x8, 0x4, 0x0, 0xdbce, 0xffff, 0xfaf, 0x1, 0xe7, 0xd0eb, 0x28a5, 0x9, 0x4, 0x0, 0x7, 0x2, @perf_config_ext={0x1, 0x8000}, 0x489, 0x6, 0xff, 0x0, 0x9d, 0x8, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f00000000c0)={0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000140)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r2 = getpid() r3 = perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x8, 0x4, 0x4, 0x1, 0x0, 0x401, 0x100, 0x7, 0xcfc0, 0x7, 0x0, 0x7, 0x30, 0x7, 0x7, 0xfff, 0x7, 0x9, 0xff, 0x9, 0xf, 0x0, 0x3, 0x100000000, 0x3, 0x8, 0xffff, 0x2, 0x3, 0xff, 0x0, 0x3, 0x5, 0x800, 0x81, 0x0, 0x0, 0x9, 0x1, @perf_bp={&(0x7f0000000180), 0x1}, 0x11815, 0x9, 0x1, 0x1, 0x101, 0x5, 0x1e892fee}, r2, 0x9, r1, 0x1) r4 = perf_event_open(&(0x7f0000000280)={0x5, 0x70, 0xe00000000000, 0x9, 0x800, 0x6, 0x0, 0x7ff, 0x10200, 0xb, 0xe3, 0x5, 0x1, 0x4, 0x9b0f, 0x1f8a, 0x401, 0x1, 0xe975, 0x7, 0x437, 0x9, 0x7f, 0x20, 0x1, 0x2, 0x3, 0x5, 0x200, 0x1, 0x8, 0x401, 0x401, 0x2, 0x8, 0xfff, 0xf3c8, 0xf23, 0x0, 0x7fffffff, 0x0, @perf_bp={&(0x7f0000000240), 0x9}, 0x828, 0x3, 0x5, 0x1, 0x0, 0xc37, 0x6}, r2, 0x4, r1, 0x2) r5 = perf_event_open(&(0x7f0000000300)={0x4, 0x70, 0xff, 0x3, 0x7f, 0x7, 0x0, 0x40, 0x4a240, 0x2, 0xffffffffffffcc27, 0xb8, 0x2, 0x7, 0x9, 0x800, 0x3, 0x7d4d, 0xf7, 0xfffffffffffffffa, 0x9, 0x4, 0x3, 0x90be, 0x9, 0xfffffffffffffffc, 0x6, 0x3ff, 0xab6b, 0x8001, 0x5, 0x2, 0x9, 0x732, 0x400, 0x55000000000, 0x1ff, 0x6, 0x0, 0x0, 0x2, @perf_config_ext={0x6, 0xffffffff}, 0x40, 0x80000001, 0x7fff, 0x2, 0x1, 0x6, 0x5}, r2, 0xf, r4, 0xa) r6 = perf_event_open(&(0x7f00000003c0)={0x7, 0x70, 0xc87d, 0x6, 0x5, 0x80000001, 0x0, 0x3, 0x1, 0xb, 0xffffffff, 0x9, 0x584, 0x31b, 0x7, 0x2, 0x3, 0x544, 0x100000001, 0x9, 0x1, 0x100, 0x3, 0x1, 0x7, 0x0, 0x7, 0x5, 0xbb, 0x40, 0x7, 0x8, 0x81, 0xc5a, 0x0, 0x7, 0x1f, 0x815, 0x0, 0xffff, 0x2, @perf_bp={&(0x7f0000000380), 0x8}, 0x4, 0x5, 0xc95, 0x0, 0x7ff, 0x7b02, 0x7}, r2, 0x10, r1, 0xb) ioctl$PERF_EVENT_IOC_DISABLE(r3, 0x2401, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0x4) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = perf_event_open(&(0x7f0000000480)={0x7, 0x70, 0x7, 0xdbff, 0x3, 0x3f, 0x0, 0x8, 0x0, 0xc, 0x8, 0x0, 0xf43, 0x101, 0x6, 0x5, 0x6, 0x9, 0x200, 0xfffffffffffffffd, 0x4, 0x6, 0x6e, 0x20, 0x1b3, 0x1fe, 0x7ff, 0x3, 0x8000, 0x5, 0x0, 0x0, 0x0, 0x5, 0x22d2, 0x401, 0x68, 0xa1ce, 0x0, 0x4, 0x0, @perf_config_ext={0x2fb, 0x4}, 0x2000, 0xd33, 0x6, 0x697c4c7d75b7b6da, 0x171f, 0x9, 0x9}, r2, 0x6, r5, 0x1) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x9, 0x6, 0x101, 0x8, 0x0, 0x200, 0x2000, 0xf, 0x0, 0x5, 0x6, 0x3, 0x2, 0x0, 0x8001, 0x8, 0x3, 0x5, 0x17, 0x7, 0x4, 0x400, 0xffffffff, 0x7, 0x8000, 0x2, 0x100, 0x0, 0x7, 0x95de, 0x2, 0x1, 0x2, 0xd432, 0x3ff, 0x8599, 0x0, 0x3ff, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x10080, 0x7, 0xe7e, 0x7, 0x5, 0x7, 0x9}, r2, 0x0, r3, 0x8) close(r7) ioctl$PERF_EVENT_IOC_DISABLE(r9, 0x2401, 0x1) r10 = gettid() ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f00000005c0)={r0}) ioctl$sock_kcm_SIOCKCMUNATTACH(r11, 0x89e1, &(0x7f0000000600)={r8}) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000640)) r12 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)={0x4, 0x7, 0x7f, 0x9787, 0x1c, 0xffffffffffffffff, 0x5}, 0x2c) recvmsg$kcm(r11, &(0x7f0000009440)={&(0x7f0000009300)=@can={0x0, 0x0}, 0x80, &(0x7f00000093c0)=[{&(0x7f0000009380)=""/16, 0x10}], 0x1, &(0x7f0000009400)=""/18, 0x12, 0x3bc1}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000009480)={0xf, 0x13, &(0x7f00000006c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [@ldst={0x3, 0x2, 0x1, 0x2, 0x7, 0xffffffff, 0x4}, @map={0x18, 0x0, 0x1, 0x0, r12}, @alu={0x7, 0x5, 0xf, 0x6, 0xe, 0x2, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4}, @jmp={0x5, 0x7a4c, 0x0, 0x3, 0x9, 0xffffffff, 0xfffffffffffffff0}, @alu={0x4, 0x20, 0x9, 0x9, 0x5, 0xfffffffe, 0x4}, @jmp={0x5, 0x81, 0x9, 0x7, 0x6, 0xfffffffe, 0xfffffffffffffff0}, @jmp={0x5, 0x3, 0x3, 0x0, 0x2, 0x2, 0xffffffffffffffff}], {0x95}}, &(0x7f0000000780)='GPL\x00', 0x4, 0x77, &(0x7f00000007c0)=""/119, 0x0, 0x1, [], r13}, 0x48) mount(&(0x7f0000009500)='./file0\x00', &(0x7f0000009540)='./file0\x00', &(0x7f0000009580)='cramfs\x00', 0x5020, &(0x7f00000095c0)="22f464f8fef2b95976576e903efe99229584aaf55fa0d91223905d4a68c0c7d18bf26de6fec0660b0c36945200da04f802d9059dd5f6d2f0eca450f4fdd46ed2b411588d802f0d1d02be65816332b2754d686e927593deb8ee3ed17a24d749db81290c33836bcc9b7d93084c53d0744e81deb8b83d9b23565d6db4cb746eb15b20f7b806f0b5a02676d90260a61b00e9ec0b4b8bf07d5f93b3feda8299586c3936f743c764205de278c25a6fff98") perf_event_open(&(0x7f00000096c0)={0x1, 0x70, 0x3, 0xa8e, 0x1000, 0xe57a, 0x0, 0x6, 0x2100b, 0x2, 0x9, 0xdb1b, 0xfffffffffffffffa, 0xa7f8, 0x3, 0x2, 0x800, 0x800, 0x2, 0x0, 0x3f, 0x3, 0x8000000000000, 0x3, 0x20, 0x6, 0x3, 0xfffffffffffff318, 0xffffffffffff0001, 0xfffffffffffffffe, 0x12, 0x1, 0x101, 0x8, 0x100, 0x1, 0x3, 0x8, 0x0, 0x3ff, 0x7, @perf_bp={&(0x7f0000009680), 0x3}, 0x9, 0x6, 0xfffffffffffffff7, 0x0, 0x0, 0x49, 0xfffffffffffff3b8}, r10, 0xe, r5, 0x8) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000009880)={r12, &(0x7f0000009740)="8ba447000764036f17624e623896639a3e2456b901aedcdb4221cea83c3b2c94575967a34ec104bbebeaf6a6b50494e6763f41056d2ca84f906fa48d72590e81334926fab48e", &(0x7f00000097c0)=""/170}, 0x18) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r4, 0x2405, r6) bpf$PROG_LOAD(0x5, &(0x7f00000099c0)={0x7, 0x4, &(0x7f00000098c0)=@raw=[@ldst={0x3, 0x3, 0x6, 0xd, 0x7, 0x26}, @ldst={0x0, 0x2, 0x0, 0xa, 0x0, 0x4, 0xffffffffffffffff}], &(0x7f0000009900)='GPL\x00', 0x5, 0x5d, &(0x7f0000009940)=""/93, 0x41f00, 0x1, [], r13}, 0x48) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000009b40)={r8, &(0x7f0000009a40)="402c0b8b20e0ae84bb", &(0x7f0000009a80)=""/178}, 0x18) [ 180.894585] ? kmem_cache_alloc_trace+0x136/0x740 [ 180.915453] ? __memcg_init_list_lru_node+0x169/0x270 [ 180.920642] ? __list_lru_init+0x544/0x750 [ 180.924870] ? sget_userns+0x6b1/0xe40 [ 180.928755] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 180.933503] ? do_mount+0xea4/0x2bb0 [ 180.937213] ? SyS_mount+0xab/0x120 [ 180.940841] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 180.946209] ? find_held_lock+0x35/0x1d0 [ 180.950274] ? __lock_is_held+0xb6/0x140 [ 180.954344] ? check_same_owner+0x320/0x320 2018/03/31 05:13:28 executing program 2: socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000040)={0x7, 0x70, 0x1, 0xaabc, 0x2, 0x2, 0x0, 0xec, 0x4800, 0x1, 0x3a6b72c9, 0xffffffffffff8000, 0xfff, 0x7, 0x2, 0x7, 0xff, 0x1, 0x2, 0x9, 0x1, 0x0, 0x5, 0x75, 0x2, 0x7, 0x8, 0x4, 0x0, 0xdbce, 0xffff, 0xfaf, 0x1, 0xe7, 0xd0eb, 0x28a5, 0x9, 0x4, 0x0, 0x7, 0x2, @perf_config_ext={0x1, 0x8000}, 0x489, 0x6, 0xff, 0x0, 0x9d, 0x8, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f00000000c0)={0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000140)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r2 = getpid() r3 = perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x8, 0x4, 0x4, 0x1, 0x0, 0x401, 0x100, 0x7, 0xcfc0, 0x7, 0x0, 0x7, 0x30, 0x7, 0x7, 0xfff, 0x7, 0x9, 0xff, 0x9, 0xf, 0x0, 0x3, 0x100000000, 0x3, 0x8, 0xffff, 0x2, 0x3, 0xff, 0x0, 0x3, 0x5, 0x800, 0x81, 0x0, 0x0, 0x9, 0x1, @perf_bp={&(0x7f0000000180), 0x1}, 0x11815, 0x9, 0x1, 0x1, 0x101, 0x5, 0x1e892fee}, r2, 0x9, r1, 0x1) r4 = perf_event_open(&(0x7f0000000280)={0x5, 0x70, 0xe00000000000, 0x9, 0x800, 0x6, 0x0, 0x7ff, 0x10200, 0xb, 0xe3, 0x5, 0x1, 0x4, 0x9b0f, 0x1f8a, 0x401, 0x1, 0xe975, 0x7, 0x437, 0x9, 0x7f, 0x20, 0x1, 0x2, 0x3, 0x5, 0x200, 0x1, 0x8, 0x401, 0x401, 0x2, 0x8, 0xfff, 0xf3c8, 0xf23, 0x0, 0x7fffffff, 0x0, @perf_bp={&(0x7f0000000240), 0x9}, 0x828, 0x3, 0x5, 0x1, 0x0, 0xc37, 0x6}, r2, 0x4, r1, 0x2) r5 = perf_event_open(&(0x7f0000000300)={0x4, 0x70, 0xff, 0x3, 0x7f, 0x7, 0x0, 0x40, 0x4a240, 0x2, 0xffffffffffffcc27, 0xb8, 0x2, 0x7, 0x9, 0x800, 0x3, 0x7d4d, 0xf7, 0xfffffffffffffffa, 0x9, 0x4, 0x3, 0x90be, 0x9, 0xfffffffffffffffc, 0x6, 0x3ff, 0xab6b, 0x8001, 0x5, 0x2, 0x9, 0x732, 0x400, 0x55000000000, 0x1ff, 0x6, 0x0, 0x0, 0x2, @perf_config_ext={0x6, 0xffffffff}, 0x40, 0x80000001, 0x7fff, 0x2, 0x1, 0x6, 0x5}, r2, 0xf, r4, 0xa) r6 = perf_event_open(&(0x7f00000003c0)={0x7, 0x70, 0xc87d, 0x6, 0x5, 0x80000001, 0x0, 0x3, 0x1, 0xb, 0xffffffff, 0x9, 0x584, 0x31b, 0x7, 0x2, 0x3, 0x544, 0x100000001, 0x9, 0x1, 0x100, 0x3, 0x1, 0x7, 0x0, 0x7, 0x5, 0xbb, 0x40, 0x7, 0x8, 0x81, 0xc5a, 0x0, 0x7, 0x1f, 0x815, 0x0, 0xffff, 0x2, @perf_bp={&(0x7f0000000380), 0x8}, 0x4, 0x5, 0xc95, 0x0, 0x7ff, 0x7b02, 0x7}, r2, 0x10, r1, 0xb) ioctl$PERF_EVENT_IOC_DISABLE(r3, 0x2401, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0x4) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = perf_event_open(&(0x7f0000000480)={0x7, 0x70, 0x7, 0xdbff, 0x3, 0x3f, 0x0, 0x8, 0x0, 0xc, 0x8, 0x0, 0xf43, 0x101, 0x6, 0x5, 0x6, 0x9, 0x200, 0xfffffffffffffffd, 0x4, 0x6, 0x6e, 0x20, 0x1b3, 0x1fe, 0x7ff, 0x3, 0x8000, 0x5, 0x0, 0x0, 0x0, 0x5, 0x22d2, 0x401, 0x68, 0xa1ce, 0x0, 0x4, 0x0, @perf_config_ext={0x2fb, 0x4}, 0x2000, 0xd33, 0x6, 0x697c4c7d75b7b6da, 0x171f, 0x9, 0x9}, r2, 0x6, r5, 0x1) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x9, 0x6, 0x101, 0x8, 0x0, 0x200, 0x2000, 0xf, 0x0, 0x5, 0x6, 0x3, 0x2, 0x0, 0x8001, 0x8, 0x3, 0x5, 0x17, 0x7, 0x4, 0x400, 0xffffffff, 0x7, 0x8000, 0x2, 0x100, 0x0, 0x7, 0x95de, 0x2, 0x1, 0x2, 0xd432, 0x3ff, 0x8599, 0x0, 0x3ff, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x10080, 0x7, 0xe7e, 0x7, 0x5, 0x7, 0x9}, r2, 0x0, r3, 0x8) close(r7) ioctl$PERF_EVENT_IOC_DISABLE(r9, 0x2401, 0x1) r10 = gettid() ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f00000005c0)={r0}) ioctl$sock_kcm_SIOCKCMUNATTACH(r11, 0x89e1, &(0x7f0000000600)={r8}) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000640)) r12 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)={0x4, 0x7, 0x7f, 0x9787, 0x1c, 0xffffffffffffffff, 0x5}, 0x2c) recvmsg$kcm(r11, &(0x7f0000009440)={&(0x7f0000009300)=@can={0x0, 0x0}, 0x80, &(0x7f00000093c0)=[{&(0x7f0000009380)=""/16, 0x10}], 0x1, &(0x7f0000009400)=""/18, 0x12, 0x3bc1}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000009480)={0xf, 0x13, &(0x7f00000006c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [@ldst={0x3, 0x2, 0x1, 0x2, 0x7, 0xffffffff, 0x4}, @map={0x18, 0x0, 0x1, 0x0, r12}, @alu={0x7, 0x5, 0xf, 0x6, 0xe, 0x2, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4}, @jmp={0x5, 0x7a4c, 0x0, 0x3, 0x9, 0xffffffff, 0xfffffffffffffff0}, @alu={0x4, 0x20, 0x9, 0x9, 0x5, 0xfffffffe, 0x4}, @jmp={0x5, 0x81, 0x9, 0x7, 0x6, 0xfffffffe, 0xfffffffffffffff0}, @jmp={0x5, 0x3, 0x3, 0x0, 0x2, 0x2, 0xffffffffffffffff}], {0x95}}, &(0x7f0000000780)='GPL\x00', 0x4, 0x77, &(0x7f00000007c0)=""/119, 0x0, 0x1, [], r13}, 0x48) mount(&(0x7f0000009500)='./file0\x00', &(0x7f0000009540)='./file0\x00', &(0x7f0000009580)='cramfs\x00', 0x5020, &(0x7f00000095c0)="22f464f8fef2b95976576e903efe99229584aaf55fa0d91223905d4a68c0c7d18bf26de6fec0660b0c36945200da04f802d9059dd5f6d2f0eca450f4fdd46ed2b411588d802f0d1d02be65816332b2754d686e927593deb8ee3ed17a24d749db81290c33836bcc9b7d93084c53d0744e81deb8b83d9b23565d6db4cb746eb15b20f7b806f0b5a02676d90260a61b00e9ec0b4b8bf07d5f93b3feda8299586c3936f743c764205de278c25a6fff98") perf_event_open(&(0x7f00000096c0)={0x1, 0x70, 0x3, 0xa8e, 0x1000, 0xe57a, 0x0, 0x6, 0x2100b, 0x2, 0x9, 0xdb1b, 0xfffffffffffffffa, 0xa7f8, 0x3, 0x2, 0x800, 0x800, 0x2, 0x0, 0x3f, 0x3, 0x8000000000000, 0x3, 0x20, 0x6, 0x3, 0xfffffffffffff318, 0xffffffffffff0001, 0xfffffffffffffffe, 0x12, 0x1, 0x101, 0x8, 0x100, 0x1, 0x3, 0x8, 0x0, 0x3ff, 0x7, @perf_bp={&(0x7f0000009680), 0x3}, 0x9, 0x6, 0xfffffffffffffff7, 0x0, 0x0, 0x49, 0xfffffffffffff3b8}, r10, 0xe, r5, 0x8) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000009880)={r12, &(0x7f0000009740)="8ba447000764036f17624e623896639a3e2456b901aedcdb4221cea83c3b2c94575967a34ec104bbebeaf6a6b50494e6763f41056d2ca84f906fa48d72590e81334926fab48e", &(0x7f00000097c0)=""/170}, 0x18) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r4, 0x2405, r6) bpf$PROG_LOAD(0x5, &(0x7f00000099c0)={0x7, 0x4, &(0x7f00000098c0)=@raw=[@ldst={0x3, 0x3, 0x6, 0xd, 0x7, 0x26}, @ldst={0x0, 0x2, 0x0, 0xa, 0x0, 0x4, 0xffffffffffffffff}], &(0x7f0000009900)='GPL\x00', 0x5, 0x5d, &(0x7f0000009940)=""/93, 0x41f00, 0x1, [], r13}, 0x48) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000009b40)={r8, &(0x7f0000009a40)="402c0b8b20e0ae84bb", &(0x7f0000009a80)=""/178}, 0x18) 2018/03/31 05:13:28 executing program 7: r0 = perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x3, 0x0, 0x4, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)={r1}) socketpair(0x4, 0x1, 0x5, &(0x7f0000000100)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) socketpair(0x6, 0x2, 0x1, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x3f, 0x9, 0x100000000, 0xff, 0x0, 0x247, 0x0, 0x8, 0x8, 0x100, 0x2, 0x9, 0x6, 0xa66b, 0x6, 0x7e, 0x8, 0x7, 0xfffffffffffff2b3, 0x0, 0x2, 0x2, 0x0, 0x71, 0xfffffffffffffffe, 0x254e, 0x8, 0x8, 0x1000, 0x2, 0x401, 0x7, 0x3c5, 0x5, 0x1ff, 0x3, 0x0, 0x8, 0x2, @perf_config_ext={0x1f, 0x8d9}, 0x20000, 0x6, 0x100000000, 0x3, 0x80000800, 0x8, 0x4}, 0x0, 0x1, r2, 0x0) perf_event_open(&(0x7f000025c000)={0x5, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f00000000c0)='user\x00') perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, @perf_bp, 0x8010000200000004, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0/file0\x00', 0x181) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, &(0x7f0000000080)) mount(&(0x7f0000dba000)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x400, &(0x7f000000a000)) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f00000003c0)={0xffffffffffffff9c}) r7 = gettid() perf_event_open(&(0x7f00000001c0)={0x5, 0x70, 0x4, 0x2, 0x0, 0x3, 0x0, 0x10000, 0x800, 0xe, 0x40, 0x2, 0xff, 0xfffffffffffffbff, 0x0, 0x7fffffff, 0x8, 0x4, 0x2, 0x80, 0x6, 0x20, 0x200, 0x9, 0xffff, 0x6, 0x300000, 0xe5, 0x6, 0x8, 0x4, 0x200, 0x20, 0x3, 0x2, 0xcad, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_config_ext={0x1, 0xfffffffffffffc01}, 0x820, 0x1, 0x2879, 0x6, 0xf36, 0xffff, 0x80000000}, r7, 0xe, r0, 0xa) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x400) recvmsg$kcm(r6, &(0x7f0000004980)={&(0x7f0000003700)=@generic, 0x80, &(0x7f0000004840)=[{&(0x7f0000003780)=""/4096, 0x1000}, {&(0x7f0000004780)=""/131, 0xfffffffffffffefe}], 0x2, &(0x7f0000004880)=""/251, 0xfb, 0x2}, 0x40000140) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mkdir(&(0x7f0000000440)='./file1\x00', 0x6) mkdir(&(0x7f0000000480)='./file0\x00', 0x42) perf_event_open(&(0x7f000001d000)={0x5, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r5) r8 = getpid() perf_event_open(&(0x7f0000000080)={0x4, 0x70, 0x0, 0x8, 0xfff, 0x6, 0x0, 0x42e4, 0x20000, 0xd, 0x4, 0x1ff000000000000, 0xffffffff, 0x0, 0x1, 0x2, 0x0, 0xa, 0xd79, 0x5e6a, 0x1, 0x1, 0x7, 0x4, 0x8, 0xfff, 0x1f, 0x1f, 0x5, 0x7ff, 0xf0d5, 0x188, 0x4, 0x8001, 0xfffffffffffffff7, 0x1000, 0x2368000, 0x8, 0x0, 0x2, 0x2000000, @perf_bp={&(0x7f0000000040), 0xc}, 0x20, 0x8, 0x0, 0x2, 0x7f, 0x5, 0x6}, r8, 0x9, r0, 0x2) bpf$MAP_CREATE(0x0, &(0x7f0000000380)={0xd, 0x400, 0x7bcc, 0xe52, 0xc, 0xffffffffffffffff, 0x5}, 0x2c) 2018/03/31 05:13:28 executing program 4: mount(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='ncpfs\x00', 0x80802, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x50, &(0x7f0000000700)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780)=r0, 0x4) mount(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='./file0\x00', &(0x7f00000006c0)='btrfs\x00', 0x89402, &(0x7f0000000900)="e196efa3cb748d2a6600968b76295ff919bc3877b18eb8d265a35493fcf34fdc965cd5c837d2389c6e2ec6088abe8daaa8ca23f9298fc94dc26874bc4d4567afea1ca0879cdf21e915005a83e96b1002af29091d2176abbb7fec088a67f2e1390f32adaf2f252d24510870f8df7186936f4d88957eb8fcda78b7383a7d24db701d524557ee7324433e70d9ffa185098325f9e657d3c29cf6a35843cb96780269db1c735d55938af5c60e1e4ba25928697277b0fdf356b62399b4c8826d09bfca7d6078c19b4995195ea814b1") ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0xffffffff) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6f3, 0x0, 0x6, 0x0, 0x0, 0xfffdffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x22, &(0x7f00000007c0)=ANY=[@ANYBLOB="18000000000000000000000000000000000000000020f37b176532826618e8210d55b6b9f796a5cf4309ac945b17b6ec55aad627fce3173f275427d49a02c531c5316326ec3569ef7771eee96dc62f79bb386acf26001097f7673e6b395ee0cac49bf5bbe2db74ffbe760e50b31e653a89e733b2832d3e4e73d9720448a1d74be25a5dbcc32519fc1400391454104d5b5d9b14c5560730768138a9a0e109f34a16cc067edc5d7a0b0912aa587035de0ad6624124ad9467ed6aac80ad02b778f8319fef183facaa39c4519babbd000000000000009d9d8436042fc1b8d6e779a1531ba51c8c8811c745b829a97e3e2d0f13ea630503c6a765fae62d43095c1669d81251d3a6718f867abdfb0b907d24394fd24b2ea273"], &(0x7f0000f6bffb)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000400)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000540)={r1, 0x50}, 0xfffffe74) close(r1) perf_event_open(&(0x7f0000348f88)={0x2, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x28, 0x2, 0x0, &(0x7f0000000000)={0x0}) mkdir(&(0x7f0000000100)='./file0\x00', 0x1000000000) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='selinuxfs\x00', 0x1000, &(0x7f0000000100)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='minix\x00', 0x10020, &(0x7f0000000240)) [ 180.958664] ? rcu_note_context_switch+0x710/0x710 [ 180.963588] should_failslab+0xec/0x120 [ 180.967566] kmem_cache_alloc_trace+0x4b/0x740 [ 180.972151] ? __kmalloc_node+0x33/0x70 [ 180.976120] ? __kmalloc_node+0x33/0x70 [ 180.980086] ? rcu_read_lock_sched_held+0x108/0x120 [ 180.985098] __memcg_init_list_lru_node+0x169/0x270 [ 180.990111] ? list_lru_add+0x7c0/0x7c0 [ 180.994073] ? __kmalloc_node+0x47/0x70 [ 180.998045] __list_lru_init+0x544/0x750 [ 181.002103] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 2018/03/31 05:13:28 executing program 2: socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000040)={0x7, 0x70, 0x1, 0xaabc, 0x2, 0x2, 0x0, 0xec, 0x4800, 0x1, 0x3a6b72c9, 0xffffffffffff8000, 0xfff, 0x7, 0x2, 0x7, 0xff, 0x1, 0x2, 0x9, 0x1, 0x0, 0x5, 0x75, 0x2, 0x7, 0x8, 0x4, 0x0, 0xdbce, 0xffff, 0xfaf, 0x1, 0xe7, 0xd0eb, 0x28a5, 0x9, 0x4, 0x0, 0x7, 0x2, @perf_config_ext={0x1, 0x8000}, 0x489, 0x6, 0xff, 0x0, 0x9d, 0x8, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f00000000c0)={0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000140)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r2 = getpid() r3 = perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x8, 0x4, 0x4, 0x1, 0x0, 0x401, 0x100, 0x7, 0xcfc0, 0x7, 0x0, 0x7, 0x30, 0x7, 0x7, 0xfff, 0x7, 0x9, 0xff, 0x9, 0xf, 0x0, 0x3, 0x100000000, 0x3, 0x8, 0xffff, 0x2, 0x3, 0xff, 0x6f, 0x0, 0x5, 0x800, 0x81, 0x0, 0x0, 0x9, 0x1, @perf_bp={&(0x7f0000000180), 0x1}, 0x11815, 0x9, 0x1, 0x1, 0x101, 0x5, 0x1e892fee}, r2, 0x9, r1, 0x1) r4 = perf_event_open(&(0x7f0000000280)={0x5, 0x70, 0xe00000000000, 0x9, 0x800, 0x6, 0x0, 0x7ff, 0x10200, 0xb, 0xe3, 0x5, 0x1, 0x4, 0x9b0f, 0x1f8a, 0x401, 0x1, 0xe975, 0x7, 0x437, 0x9, 0x7f, 0x20, 0x1, 0x2, 0x3, 0x5, 0x200, 0x1, 0x8, 0x401, 0x401, 0x2, 0x8, 0xfff, 0xf3c8, 0xf23, 0x0, 0x7fffffff, 0x0, @perf_bp={&(0x7f0000000240), 0x9}, 0x828, 0x3, 0x5, 0x1, 0x0, 0xc37, 0x6}, r2, 0x4, r1, 0x2) r5 = perf_event_open(&(0x7f0000000300)={0x4, 0x70, 0xff, 0x3, 0x7f, 0x7, 0x0, 0x40, 0x4a240, 0x2, 0xffffffffffffcc27, 0xb8, 0x2, 0x7, 0x9, 0x800, 0x3, 0x7d4d, 0xf7, 0xfffffffffffffffa, 0x9, 0x4, 0x3, 0x90be, 0x9, 0xfffffffffffffffc, 0x6, 0x3ff, 0xab6b, 0x8001, 0x5, 0x2, 0x9, 0x732, 0x400, 0x55000000000, 0x1ff, 0x6, 0x0, 0x0, 0x2, @perf_config_ext={0x6, 0xffffffff}, 0x40, 0x80000001, 0x7fff, 0x2, 0x1, 0x6, 0x5}, r2, 0xf, r4, 0xa) r6 = perf_event_open(&(0x7f00000003c0)={0x7, 0x70, 0xc87d, 0x6, 0x5, 0x80000001, 0x0, 0x3, 0x1, 0xb, 0xffffffff, 0x9, 0x584, 0x31b, 0x7, 0x2, 0x3, 0x544, 0x100000001, 0x9, 0x1, 0x100, 0x3, 0x1, 0x7, 0x0, 0x7, 0x5, 0xbb, 0x40, 0x7, 0x8, 0x81, 0xc5a, 0x0, 0x7, 0x1f, 0x815, 0x0, 0xffff, 0x2, @perf_bp={&(0x7f0000000380), 0x8}, 0x4, 0x5, 0xc95, 0x0, 0x7ff, 0x7b02, 0x7}, r2, 0x10, r1, 0xb) ioctl$PERF_EVENT_IOC_DISABLE(r3, 0x2401, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0x4) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = perf_event_open(&(0x7f0000000480)={0x7, 0x70, 0x7, 0xdbff, 0x3, 0x3f, 0x0, 0x8, 0x0, 0xc, 0x8, 0x0, 0xf43, 0x101, 0x6, 0x5, 0x6, 0x9, 0x200, 0xfffffffffffffffd, 0x4, 0x6, 0x6e, 0x20, 0x1b3, 0x1fe, 0x7ff, 0x3, 0x8000, 0x5, 0x0, 0x0, 0x0, 0x5, 0x22d2, 0x401, 0x68, 0xa1ce, 0x0, 0x4, 0x0, @perf_config_ext={0x2fb, 0x4}, 0x2000, 0xd33, 0x6, 0x697c4c7d75b7b6da, 0x171f, 0x9, 0x9}, r2, 0x6, r5, 0x1) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x9, 0x6, 0x101, 0x8, 0x0, 0x200, 0x2000, 0xf, 0x0, 0x5, 0x6, 0x3, 0x2, 0x0, 0x8001, 0x8, 0x3, 0x5, 0x17, 0x7, 0x4, 0x400, 0xffffffff, 0x7, 0x8000, 0x2, 0x100, 0x0, 0x7, 0x95de, 0x2, 0x1, 0x2, 0xd432, 0x3ff, 0x8599, 0x0, 0x3ff, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x10080, 0x7, 0xe7e, 0x7, 0x5, 0x7, 0x9}, r2, 0x0, r3, 0x8) close(r7) ioctl$PERF_EVENT_IOC_DISABLE(r9, 0x2401, 0x1) r10 = gettid() ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f00000005c0)={r0}) ioctl$sock_kcm_SIOCKCMUNATTACH(r11, 0x89e1, &(0x7f0000000600)={r8}) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000640)) r12 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)={0x4, 0x7, 0x7f, 0x9787, 0x1c, 0xffffffffffffffff, 0x5}, 0x2c) recvmsg$kcm(r11, &(0x7f0000009440)={&(0x7f0000009300)=@can={0x0, 0x0}, 0x80, &(0x7f00000093c0)=[{&(0x7f0000009380)=""/16, 0x10}], 0x1, &(0x7f0000009400)=""/18, 0x12, 0x3bc1}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000009480)={0xf, 0x13, &(0x7f00000006c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [@ldst={0x3, 0x2, 0x1, 0x2, 0x7, 0xffffffff, 0x4}, @map={0x18, 0x0, 0x1, 0x0, r12}, @alu={0x7, 0x5, 0xf, 0x6, 0xe, 0x2, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4}, @jmp={0x5, 0x7a4c, 0x0, 0x3, 0x9, 0xffffffff, 0xfffffffffffffff0}, @alu={0x4, 0x20, 0x9, 0x9, 0x5, 0xfffffffe, 0x4}, @jmp={0x5, 0x81, 0x9, 0x7, 0x6, 0xfffffffe, 0xfffffffffffffff0}, @jmp={0x5, 0x3, 0x3, 0x0, 0x2, 0x2, 0xffffffffffffffff}], {0x95}}, &(0x7f0000000780)='GPL\x00', 0x4, 0x77, &(0x7f00000007c0)=""/119, 0x0, 0x1, [], r13}, 0x48) mount(&(0x7f0000009500)='./file0\x00', &(0x7f0000009540)='./file0\x00', &(0x7f0000009580)='cramfs\x00', 0x5020, &(0x7f00000095c0)="22f464f8fef2b95976576e903efe99229584aaf55fa0d91223905d4a68c0c7d18bf26de6fec0660b0c36945200da04f802d9059dd5f6d2f0eca450f4fdd46ed2b411588d802f0d1d02be65816332b2754d686e927593deb8ee3ed17a24d749db81290c33836bcc9b7d93084c53d0744e81deb8b83d9b23565d6db4cb746eb15b20f7b806f0b5a02676d90260a61b00e9ec0b4b8bf07d5f93b3feda8299586c3936f743c764205de278c25a6fff98") perf_event_open(&(0x7f00000096c0)={0x1, 0x70, 0x3, 0xa8e, 0x1000, 0xe57a, 0x0, 0x6, 0x2100b, 0x2, 0x9, 0xdb1b, 0xfffffffffffffffa, 0xa7f8, 0x3, 0x2, 0x800, 0x800, 0x2, 0x0, 0x3f, 0x3, 0x8000000000000, 0x3, 0x20, 0x6, 0x3, 0xfffffffffffff318, 0xffffffffffff0001, 0xfffffffffffffffe, 0x12, 0x1, 0x101, 0x8, 0x100, 0x1, 0x3, 0x8, 0x0, 0x3ff, 0x7, @perf_bp={&(0x7f0000009680), 0x3}, 0x9, 0x6, 0xfffffffffffffff7, 0x0, 0x0, 0x49, 0xfffffffffffff3b8}, r10, 0xe, r5, 0x8) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000009880)={r12, &(0x7f0000009740)="8ba447000764036f17624e623896639a3e2456b901aedcdb4221cea83c3b2c94575967a34ec104bbebeaf6a6b50494e6763f41056d2ca84f906fa48d72590e81334926fab48e", &(0x7f00000097c0)=""/170}, 0x18) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r4, 0x2405, r6) bpf$PROG_LOAD(0x5, &(0x7f00000099c0)={0x7, 0x4, &(0x7f00000098c0)=@raw=[@ldst={0x3, 0x3, 0x6, 0xd, 0x7, 0x26}, @ldst={0x0, 0x2, 0x0, 0xa, 0x0, 0x4, 0xffffffffffffffff}], &(0x7f0000009900)='GPL\x00', 0x5, 0x5d, &(0x7f0000009940)=""/93, 0x41f00, 0x1, [], r13}, 0x48) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000009b40)={r8, &(0x7f0000009a40)="402c0b8b20e0ae84bb", &(0x7f0000009a80)=""/178}, 0x18) 2018/03/31 05:13:28 executing program 2: socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000040)={0x7, 0x70, 0x1, 0xaabc, 0x2, 0x2, 0x0, 0xec, 0x4800, 0x1, 0x3a6b72c9, 0xffffffffffff8000, 0xfff, 0x7, 0x2, 0x7, 0xff, 0x1, 0x2, 0x9, 0x1, 0x0, 0x5, 0x75, 0x2, 0x7, 0x8, 0x4, 0x0, 0xdbce, 0xffff, 0xfaf, 0x1, 0xe7, 0xd0eb, 0x28a5, 0x9, 0x4, 0x0, 0x7, 0x2, @perf_config_ext={0x1, 0x8000}, 0x489, 0x6, 0xff, 0x0, 0x9d, 0x8, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f00000000c0)={0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000140)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r2 = getpid() r3 = perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x8, 0x4, 0x4, 0x1, 0x0, 0x401, 0x100, 0x7, 0xcfc0, 0x7, 0x0, 0x7, 0x30, 0x7, 0x7, 0xfff, 0x7, 0x9, 0xff, 0x9, 0xf, 0x0, 0x3, 0x100000000, 0x3, 0x8, 0xffff, 0x2, 0x3, 0xff, 0x6f, 0x0, 0x5, 0x800, 0x81, 0x0, 0x0, 0x9, 0x1, @perf_bp={&(0x7f0000000180), 0x1}, 0x11815, 0x9, 0x1, 0x1, 0x101, 0x5, 0x1e892fee}, r2, 0x9, r1, 0x1) r4 = perf_event_open(&(0x7f0000000280)={0x5, 0x70, 0xe00000000000, 0x9, 0x800, 0x6, 0x0, 0x7ff, 0x10200, 0xb, 0xe3, 0x5, 0x1, 0x4, 0x9b0f, 0x1f8a, 0x401, 0x1, 0xe975, 0x7, 0x437, 0x9, 0x7f, 0x20, 0x1, 0x2, 0x3, 0x5, 0x200, 0x1, 0x8, 0x401, 0x401, 0x2, 0x8, 0xfff, 0xf3c8, 0xf23, 0x0, 0x7fffffff, 0x0, @perf_bp={&(0x7f0000000240), 0x9}, 0x828, 0x3, 0x5, 0x1, 0x0, 0xc37, 0x6}, r2, 0x4, r1, 0x2) r5 = perf_event_open(&(0x7f0000000300)={0x4, 0x70, 0xff, 0x3, 0x7f, 0x7, 0x0, 0x40, 0x4a240, 0x2, 0xffffffffffffcc27, 0xb8, 0x2, 0x7, 0x9, 0x800, 0x3, 0x7d4d, 0xf7, 0xfffffffffffffffa, 0x9, 0x4, 0x3, 0x90be, 0x9, 0xfffffffffffffffc, 0x6, 0x3ff, 0xab6b, 0x8001, 0x5, 0x2, 0x9, 0x732, 0x400, 0x55000000000, 0x1ff, 0x6, 0x0, 0x0, 0x2, @perf_config_ext={0x6, 0xffffffff}, 0x40, 0x80000001, 0x7fff, 0x2, 0x1, 0x6, 0x5}, r2, 0xf, r4, 0xa) r6 = perf_event_open(&(0x7f00000003c0)={0x7, 0x70, 0xc87d, 0x6, 0x5, 0x80000001, 0x0, 0x3, 0x1, 0xb, 0xffffffff, 0x9, 0x584, 0x31b, 0x7, 0x2, 0x3, 0x544, 0x100000001, 0x9, 0x1, 0x100, 0x3, 0x1, 0x7, 0x0, 0x7, 0x5, 0xbb, 0x40, 0x7, 0x8, 0x81, 0xc5a, 0x0, 0x7, 0x1f, 0x815, 0x0, 0xffff, 0x2, @perf_bp={&(0x7f0000000380), 0x8}, 0x4, 0x5, 0xc95, 0x0, 0x7ff, 0x7b02, 0x7}, r2, 0x10, r1, 0xb) ioctl$PERF_EVENT_IOC_DISABLE(r3, 0x2401, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0x4) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = perf_event_open(&(0x7f0000000480)={0x7, 0x70, 0x7, 0xdbff, 0x3, 0x3f, 0x0, 0x8, 0x0, 0xc, 0x8, 0x0, 0xf43, 0x101, 0x6, 0x5, 0x6, 0x9, 0x200, 0xfffffffffffffffd, 0x4, 0x6, 0x6e, 0x20, 0x1b3, 0x1fe, 0x7ff, 0x3, 0x8000, 0x5, 0x0, 0x0, 0x0, 0x5, 0x22d2, 0x401, 0x68, 0xa1ce, 0x0, 0x4, 0x0, @perf_config_ext={0x2fb, 0x4}, 0x2000, 0xd33, 0x6, 0x697c4c7d75b7b6da, 0x171f, 0x9, 0x9}, r2, 0x6, r5, 0x1) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x9, 0x6, 0x101, 0x8, 0x0, 0x200, 0x2000, 0xf, 0x0, 0x5, 0x6, 0x3, 0x2, 0x0, 0x8001, 0x8, 0x3, 0x5, 0x17, 0x7, 0x4, 0x400, 0xffffffff, 0x7, 0x8000, 0x2, 0x100, 0x0, 0x7, 0x95de, 0x2, 0x1, 0x2, 0xd432, 0x3ff, 0x8599, 0x0, 0x3ff, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x10080, 0x7, 0xe7e, 0x7, 0x5, 0x7, 0x9}, r2, 0x0, r3, 0x8) close(r7) ioctl$PERF_EVENT_IOC_DISABLE(r9, 0x2401, 0x1) r10 = gettid() ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f00000005c0)={r0}) ioctl$sock_kcm_SIOCKCMUNATTACH(r11, 0x89e1, &(0x7f0000000600)={r8}) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000640)) r12 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)={0x4, 0x7, 0x7f, 0x9787, 0x1c, 0xffffffffffffffff, 0x5}, 0x2c) recvmsg$kcm(r11, &(0x7f0000009440)={&(0x7f0000009300)=@can={0x0, 0x0}, 0x80, &(0x7f00000093c0)=[{&(0x7f0000009380)=""/16, 0x10}], 0x1, &(0x7f0000009400)=""/18, 0x12, 0x3bc1}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000009480)={0xf, 0x13, &(0x7f00000006c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [@ldst={0x3, 0x2, 0x1, 0x2, 0x7, 0xffffffff, 0x4}, @map={0x18, 0x0, 0x1, 0x0, r12}, @alu={0x7, 0x5, 0xf, 0x6, 0xe, 0x2, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4}, @jmp={0x5, 0x7a4c, 0x0, 0x3, 0x9, 0xffffffff, 0xfffffffffffffff0}, @alu={0x4, 0x20, 0x9, 0x9, 0x5, 0xfffffffe, 0x4}, @jmp={0x5, 0x81, 0x9, 0x7, 0x6, 0xfffffffe, 0xfffffffffffffff0}, @jmp={0x5, 0x3, 0x3, 0x0, 0x2, 0x2, 0xffffffffffffffff}], {0x95}}, &(0x7f0000000780)='GPL\x00', 0x4, 0x77, &(0x7f00000007c0)=""/119, 0x0, 0x1, [], r13}, 0x48) mount(&(0x7f0000009500)='./file0\x00', &(0x7f0000009540)='./file0\x00', &(0x7f0000009580)='cramfs\x00', 0x5020, &(0x7f00000095c0)="22f464f8fef2b95976576e903efe99229584aaf55fa0d91223905d4a68c0c7d18bf26de6fec0660b0c36945200da04f802d9059dd5f6d2f0eca450f4fdd46ed2b411588d802f0d1d02be65816332b2754d686e927593deb8ee3ed17a24d749db81290c33836bcc9b7d93084c53d0744e81deb8b83d9b23565d6db4cb746eb15b20f7b806f0b5a02676d90260a61b00e9ec0b4b8bf07d5f93b3feda8299586c3936f743c764205de278c25a6fff98") perf_event_open(&(0x7f00000096c0)={0x1, 0x70, 0x3, 0xa8e, 0x1000, 0xe57a, 0x0, 0x6, 0x2100b, 0x2, 0x9, 0xdb1b, 0xfffffffffffffffa, 0xa7f8, 0x3, 0x2, 0x800, 0x800, 0x2, 0x0, 0x3f, 0x3, 0x8000000000000, 0x3, 0x20, 0x6, 0x3, 0xfffffffffffff318, 0xffffffffffff0001, 0xfffffffffffffffe, 0x12, 0x1, 0x101, 0x8, 0x100, 0x1, 0x3, 0x8, 0x0, 0x3ff, 0x7, @perf_bp={&(0x7f0000009680), 0x3}, 0x9, 0x6, 0xfffffffffffffff7, 0x0, 0x0, 0x49, 0xfffffffffffff3b8}, r10, 0xe, r5, 0x8) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000009880)={r12, &(0x7f0000009740)="8ba447000764036f17624e623896639a3e2456b901aedcdb4221cea83c3b2c94575967a34ec104bbebeaf6a6b50494e6763f41056d2ca84f906fa48d72590e81334926fab48e", &(0x7f00000097c0)=""/170}, 0x18) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r4, 0x2405, r6) bpf$PROG_LOAD(0x5, &(0x7f00000099c0)={0x7, 0x4, &(0x7f00000098c0)=@raw=[@ldst={0x3, 0x3, 0x6, 0xd, 0x7, 0x26}, @ldst={0x0, 0x2, 0x0, 0xa, 0x0, 0x4, 0xffffffffffffffff}], &(0x7f0000009900)='GPL\x00', 0x5, 0x5d, &(0x7f0000009940)=""/93, 0x41f00, 0x1, [], r13}, 0x48) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000009b40)={r8, &(0x7f0000009a40)="402c0b8b20e0ae84bb", &(0x7f0000009a80)=""/178}, 0x18) [ 181.007982] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 181.012991] ? lockdep_init_map+0x9/0x10 [ 181.017047] sget_userns+0x6b1/0xe40 [ 181.020755] ? set_anon_super+0x20/0x20 [ 181.024726] ? put_filp+0x90/0x90 [ 181.028174] ? destroy_unused_super.part.6+0xd0/0xd0 [ 181.033273] ? alloc_vfsmnt+0x762/0x9c0 [ 181.037240] ? path_lookupat+0x238/0xba0 [ 181.041294] ? mnt_free_id.isra.21+0x50/0x50 [ 181.045699] ? trace_hardirqs_off+0x10/0x10 [ 181.050019] ? putname+0xee/0x130 [ 181.053472] ? cap_capable+0x1b5/0x230 [ 181.057355] ? security_capable+0x8e/0xc0 [ 181.061534] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 181.066719] ? ns_capable_common+0xcf/0x160 [ 181.071041] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 181.076225] mount_ns+0x6d/0x190 [ 181.079592] rpc_mount+0x9e/0xd0 [ 181.082955] mount_fs+0x66/0x2d0 [ 181.086315] vfs_kern_mount.part.26+0xc6/0x4a0 [ 181.090890] ? may_umount+0xa0/0xa0 [ 181.094506] ? _raw_read_unlock+0x22/0x30 [ 181.098643] ? __get_fs_type+0x8a/0xc0 [ 181.102515] do_mount+0xea4/0x2bb0 [ 181.106032] ? __might_fault+0x110/0x1d0 [ 181.110070] ? copy_mount_string+0x40/0x40 [ 181.114287] ? __check_object_size+0x8b/0x530 [ 181.118774] ? __might_sleep+0x95/0x190 [ 181.122733] ? kasan_check_write+0x14/0x20 [ 181.126954] ? _copy_from_user+0x99/0x110 [ 181.131085] ? memdup_user+0x5e/0x90 [ 181.134787] ? copy_mount_options+0x1f7/0x2e0 [ 181.139265] SyS_mount+0xab/0x120 [ 181.142692] ? copy_mnt_ns+0xb30/0xb30 [ 181.146564] do_syscall_64+0x281/0x940 [ 181.150429] ? vmalloc_sync_all+0x30/0x30 [ 181.154551] ? _raw_spin_unlock_irq+0x27/0x70 [ 181.159026] ? finish_task_switch+0x1c1/0x7e0 [ 181.163500] ? syscall_return_slowpath+0x550/0x550 [ 181.168413] ? syscall_return_slowpath+0x2ac/0x550 [ 181.173324] ? prepare_exit_to_usermode+0x350/0x350 [ 181.178321] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 181.183680] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 181.188510] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 181.193681] RIP: 0033:0x454e79 [ 181.196859] RSP: 002b:00007fc28ac9cc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 181.204553] RAX: ffffffffffffffda RBX: 00007fc28ac9d6d4 RCX: 0000000000454e79 [ 181.211810] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 181.219058] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 181.226315] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000016 [ 181.233559] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000027 [ 181.312887] EXT4-fs (sda1): re-mounted. Opts: [ 181.343353] rpcbind: RPC call returned error 22 [ 181.359929] rpcbind: RPC call returned error 22 [ 181.398643] rpcbind: RPC call returned error 22 [ 181.413969] rpcbind: RPC call returned error 22 2018/03/31 05:13:29 executing program 6 (fault-call:17 fault-nth:40): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x0, 0x101, 0x4, 0x0, 0x1, r0, 0x0, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r2 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)={0xffffffffffffffff}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r2, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x0, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0", 0xc9}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000280)={&(0x7f0000000680)='./file0\x00'}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r1}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r3) gettid() close(0xffffffffffffffff) 2018/03/31 05:13:29 executing program 3: bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000880)=0x8, 0x4) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', 0x0, 0x10}, 0x10) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000600)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x7f, 0x7, 0x5, 0x1, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r1, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={0xffffffffffffffff, &(0x7f0000000000)="827021baca", &(0x7f0000000080)=""/98}, 0x18) r2 = perf_event_open(&(0x7f0000000480)={0x3, 0x70, 0x2, 0x1, 0x7, 0x1, 0x0, 0xdf00, 0x8, 0x1, 0x5, 0x9, 0x1, 0x8, 0x8001, 0x18000000000, 0x8, 0x8000, 0x7, 0x3ff, 0x1, 0x0, 0x7, 0xff, 0x3, 0x9, 0x6, 0x0, 0x3, 0x6, 0x2, 0x7, 0x7, 0x40, 0x9, 0x6, 0x9, 0x7, 0x0, 0x4, 0x5, @perf_config_ext={0x81, 0x62}, 0x800, 0x7, 0x76, 0x3, 0x1, 0x62f7, 0x30000000000000}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0x8) mkdir(&(0x7f0000000540)='./file0\x00', 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={r1, &(0x7f0000000180), &(0x7f0000000080)=""/140}, 0x18) socketpair$inet6_icmp(0xa, 0x2, 0x3a, &(0x7f0000000840)) bpf$MAP_CREATE(0x0, &(0x7f0000000440)={0x1f, 0x100000000, 0x6, 0xfffffffffffffffc, 0x15, r0, 0x1}, 0x2c) socketpair(0x5, 0x80000, 0x6, &(0x7f0000000500)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r1, &(0x7f0000000000), &(0x7f0000000300)="6c0bf12c7b5fd78823b1ac203f537fd204c4bd4bfc29644472addbdae4deb6ec0a33c46d12aa2347ad03e8d10fe847bce181376d9576341e8cf623c3899b72b4742aba53d21a4041284b89c478e75bcf0879ff4dcf3074109ec28604f88962f494ba52ea01ef43f41415d5d0dc2d58e3de764139dde4e6ceaa1ceff1c8f7f281cb9a12306eedcb5005f6604b26f0cce8c9f6d22ff8fb0ac6ca70a2e88996023c5f9a0d0aa5b261390d580cf650"}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000800)={r0, &(0x7f0000000640)="428f5854a7345bd6f975f30f4c6de01b8eade9e70fa65a56c35f3990f3b65b1551e29bcd4ea3fda1346576ee449c5d1c6b2de6bf1cc95c3640b58bca1e266d25940df46e7007d8483713f0c169f7a159a4d650d2c52ead31a460e74468c270f1163d19f67a828be0c402b9b3010dfbf81203024bb4dee6b05df74345b7ea04eecba3769c298c9e887d152585d53522696a9c9102f112912dca0898c637c8d655766ae20d67f9687d24e13b88fdcf2837fd1804568fa1d02e8550bd25da120e558c68ffa56f385c6d", &(0x7f0000000740)="c3020935d81657d224ea8fc14306cff1bbb04fd7fe59c21e8f7a6ee28c7595649b34bdcdd125869a19e30032958356488714f70b9490d49774c5687ca81735e7038aaefa5c01cfe4c38e4b5e177520f0cefbf1a280a1ed12a6d6698be8d724ceabb54410fab17b3ba76b7ae11f49b598fdcbe2925cff9bc19d8366fa7ba48224e29165ddedab13f8e13192edd47cb63b47f8f6c136fcaf30db1c89f2d45be4a6367e40837b8afb09732a3d0f1d84765f01a1c9c7", 0x2}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={r1, 0x28, &(0x7f00000003c0)}, 0x10) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000180)={r1, &(0x7f00000003c0), &(0x7f0000000200)=""/208}, 0x18) 2018/03/31 05:13:29 executing program 4: mount(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='ncpfs\x00', 0x80802, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x50, &(0x7f0000000700)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780)=r0, 0x4) mount(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='./file0\x00', &(0x7f00000006c0)='btrfs\x00', 0x89402, &(0x7f0000000900)="e196efa3cb748d2a6600968b76295ff919bc3877b18eb8d265a35493fcf34fdc965cd5c837d2389c6e2ec6088abe8daaa8ca23f9298fc94dc26874bc4d4567afea1ca0879cdf21e915005a83e96b1002af29091d2176abbb7fec088a67f2e1390f32adaf2f252d24510870f8df7186936f4d88957eb8fcda78b7383a7d24db701d524557ee7324433e70d9ffa185098325f9e657d3c29cf6a35843cb96780269db1c735d55938af5c60e1e4ba25928697277b0fdf356b62399b4c8826d09bfca7d6078c19b4995195ea814b1") ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0xffffffff) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6f3, 0x0, 0x6, 0x0, 0x0, 0xfffdffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x22, &(0x7f00000007c0)=ANY=[@ANYBLOB="18000000000000000000000000000000000000000020f37b176532826618e8210d55b6b9f796a5cf4309ac945b17b6ec55aad627fce3173f275427d49a02c531c5316326ec3569ef7771eee96dc62f79bb386acf26001097f7673e6b395ee0cac49bf5bbe2db74ffbe760e50b31e653a89e733b2832d3e4e73d9720448a1d74be25a5dbcc32519fc1400391454104d5b5d9b14c5560730768138a9a0e109f34a16cc067edc5d7a0b0912aa587035de0ad6624124ad9467ed6aac80ad02b778f8319fef183facaa39c4519babbd000000000000009d9d8436042fc1b8d6e779a1531ba51c8c8811c745b829a97e3e2d0f13ea630503c6a765fae62d43095c1669d81251d3a6718f867abdfb0b907d24394fd24b2ea273"], &(0x7f0000f6bffb)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000400)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000540)={r1, 0x50}, 0xfffffe74) close(r1) perf_event_open(&(0x7f0000348f88)={0x2, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x28, 0x2, 0x0, &(0x7f0000000000)={0x0}) mkdir(&(0x7f0000000100)='./file0\x00', 0x1000000000) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='selinuxfs\x00', 0x1000, &(0x7f0000000100)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='minix\x00', 0x10020, &(0x7f0000000240)) 2018/03/31 05:13:29 executing program 0: mkdir(&(0x7f0000000040)='./file0/', 0x0) mkdir(&(0x7f0000000440)='./file0/', 0x10) mount(&(0x7f0000000000)='./file0//file0/file0\x00', &(0x7f0000000080)='./file0//file0\x00', &(0x7f00000000c0)='ext4\x00', 0x14, &(0x7f0000000100)="67f54e15fd22a03af4c48bb0a72446b355f31da2aeb83981c9e5e6032c0e87a02f46e86524251c253315e71fd349fecded0ac4190162c62aeecebc5b89a337093427095ca85a3f14cbe82780c4105a12b0e2c2c76396791e17354981a681c772b4db820eb7513024c6282be78221e31f8816c84b036a327dcf81da3f94ea031d07ff39b2565b33ff2ea84673e55071a6e16ab025554f4338e4d2c29f703349165781f4b8e9d6fdb7f8f7a8170509f5") r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)=0xffffffff, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000340)={&(0x7f00000002c0)='./file0//file0/file0\x00', r0}, 0x10) socketpair(0xa, 0xe, 0x456, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000280)={&(0x7f00000001c0)='./file0/', r1}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000380)={&(0x7f0000000240)='./file0/', 0x0, 0x18}, 0x10) 2018/03/31 05:13:29 executing program 5: perf_event_open(&(0x7f0000271000)={0x20000000002, 0x70, 0x7, 0x80000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x4) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000100)={&(0x7f0000000080)='./file0\x00', 0x0, 0x10}, 0x10) mount(&(0x7f0000002640)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='selinuxfs\x00', 0x1000, &(0x7f0000000100)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='squashfs\x00', 0x20, 0x0) 2018/03/31 05:13:29 executing program 7: socketpair(0x40, 0x805, 0x8, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_DISABLE(r1, 0x2401, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[]) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000140)="637075263058fd0000413c12b8d0cc69bf6821cc1b4d0700000000000000ffa75134df22ad070000000000000072682ad3283820f255c2db0000e3ff0000050fad02ae9f217e89b8f10200cb97541bd003bf3dcf376e060059a1083ba783fa3e7318893cae000000") ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000000)='_\x00') ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000100)) 2018/03/31 05:13:29 executing program 2: socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000040)={0x7, 0x70, 0x1, 0xaabc, 0x2, 0x2, 0x0, 0xec, 0x4800, 0x1, 0x3a6b72c9, 0xffffffffffff8000, 0xfff, 0x7, 0x2, 0x7, 0xff, 0x1, 0x2, 0x9, 0x1, 0x0, 0x5, 0x75, 0x2, 0x7, 0x8, 0x4, 0x0, 0xdbce, 0xffff, 0xfaf, 0x1, 0xe7, 0xd0eb, 0x28a5, 0x9, 0x4, 0x0, 0x7, 0x2, @perf_config_ext={0x1, 0x8000}, 0x489, 0x6, 0xff, 0x0, 0x9d, 0x8, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f00000000c0)={0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000140)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r2 = getpid() r3 = perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x8, 0x4, 0x4, 0x1, 0x0, 0x401, 0x100, 0x7, 0xcfc0, 0x7, 0x0, 0x7, 0x30, 0x7, 0x7, 0xfff, 0x7, 0x9, 0xff, 0x9, 0xf, 0x0, 0x3, 0x100000000, 0x3, 0x8, 0xffff, 0x2, 0x3, 0xff, 0x6f, 0x0, 0x5, 0x800, 0x81, 0x0, 0x0, 0x9, 0x1, @perf_bp={&(0x7f0000000180), 0x1}, 0x11815, 0x9, 0x1, 0x1, 0x101, 0x5, 0x1e892fee}, r2, 0x9, r1, 0x1) r4 = perf_event_open(&(0x7f0000000280)={0x5, 0x70, 0xe00000000000, 0x9, 0x800, 0x6, 0x0, 0x7ff, 0x10200, 0xb, 0xe3, 0x5, 0x1, 0x4, 0x9b0f, 0x1f8a, 0x401, 0x1, 0xe975, 0x7, 0x437, 0x9, 0x7f, 0x20, 0x1, 0x2, 0x3, 0x5, 0x200, 0x1, 0x8, 0x401, 0x401, 0x2, 0x8, 0xfff, 0xf3c8, 0xf23, 0x0, 0x7fffffff, 0x0, @perf_bp={&(0x7f0000000240), 0x9}, 0x828, 0x3, 0x5, 0x1, 0x0, 0xc37, 0x6}, r2, 0x4, r1, 0x2) r5 = perf_event_open(&(0x7f0000000300)={0x4, 0x70, 0xff, 0x3, 0x7f, 0x7, 0x0, 0x40, 0x4a240, 0x2, 0xffffffffffffcc27, 0xb8, 0x2, 0x7, 0x9, 0x800, 0x3, 0x7d4d, 0xf7, 0xfffffffffffffffa, 0x9, 0x4, 0x3, 0x90be, 0x9, 0xfffffffffffffffc, 0x6, 0x3ff, 0xab6b, 0x8001, 0x5, 0x2, 0x9, 0x732, 0x400, 0x55000000000, 0x1ff, 0x6, 0x0, 0x0, 0x2, @perf_config_ext={0x6, 0xffffffff}, 0x40, 0x80000001, 0x7fff, 0x2, 0x1, 0x6, 0x5}, r2, 0xf, r4, 0xa) r6 = perf_event_open(&(0x7f00000003c0)={0x7, 0x70, 0xc87d, 0x6, 0x5, 0x80000001, 0x0, 0x3, 0x1, 0xb, 0xffffffff, 0x9, 0x584, 0x31b, 0x7, 0x2, 0x3, 0x544, 0x100000001, 0x9, 0x1, 0x100, 0x3, 0x1, 0x7, 0x0, 0x7, 0x5, 0xbb, 0x40, 0x7, 0x8, 0x81, 0xc5a, 0x0, 0x7, 0x1f, 0x815, 0x0, 0xffff, 0x2, @perf_bp={&(0x7f0000000380), 0x8}, 0x4, 0x5, 0xc95, 0x0, 0x7ff, 0x7b02, 0x7}, r2, 0x10, r1, 0xb) ioctl$PERF_EVENT_IOC_DISABLE(r3, 0x2401, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0x4) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = perf_event_open(&(0x7f0000000480)={0x7, 0x70, 0x7, 0xdbff, 0x3, 0x3f, 0x0, 0x8, 0x0, 0xc, 0x8, 0x0, 0xf43, 0x101, 0x6, 0x5, 0x6, 0x9, 0x200, 0xfffffffffffffffd, 0x4, 0x6, 0x6e, 0x20, 0x1b3, 0x1fe, 0x7ff, 0x3, 0x8000, 0x5, 0x0, 0x0, 0x0, 0x5, 0x22d2, 0x401, 0x68, 0xa1ce, 0x0, 0x4, 0x0, @perf_config_ext={0x2fb, 0x4}, 0x2000, 0xd33, 0x6, 0x697c4c7d75b7b6da, 0x171f, 0x9, 0x9}, r2, 0x6, r5, 0x1) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x9, 0x6, 0x101, 0x8, 0x0, 0x200, 0x2000, 0xf, 0x0, 0x5, 0x6, 0x3, 0x2, 0x0, 0x8001, 0x8, 0x3, 0x5, 0x17, 0x7, 0x4, 0x400, 0xffffffff, 0x7, 0x8000, 0x2, 0x100, 0x0, 0x7, 0x95de, 0x2, 0x1, 0x2, 0xd432, 0x3ff, 0x8599, 0x0, 0x3ff, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x10080, 0x7, 0xe7e, 0x7, 0x5, 0x7, 0x9}, r2, 0x0, r3, 0x8) close(r7) ioctl$PERF_EVENT_IOC_DISABLE(r9, 0x2401, 0x1) r10 = gettid() ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f00000005c0)={r0}) ioctl$sock_kcm_SIOCKCMUNATTACH(r11, 0x89e1, &(0x7f0000000600)={r8}) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000640)) r12 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)={0x4, 0x7, 0x7f, 0x9787, 0x1c, 0xffffffffffffffff, 0x5}, 0x2c) recvmsg$kcm(r11, &(0x7f0000009440)={&(0x7f0000009300)=@can={0x0, 0x0}, 0x80, &(0x7f00000093c0)=[{&(0x7f0000009380)=""/16, 0x10}], 0x1, &(0x7f0000009400)=""/18, 0x12, 0x3bc1}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000009480)={0xf, 0x13, &(0x7f00000006c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [@ldst={0x3, 0x2, 0x1, 0x2, 0x7, 0xffffffff, 0x4}, @map={0x18, 0x0, 0x1, 0x0, r12}, @alu={0x7, 0x5, 0xf, 0x6, 0xe, 0x2, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4}, @jmp={0x5, 0x7a4c, 0x0, 0x3, 0x9, 0xffffffff, 0xfffffffffffffff0}, @alu={0x4, 0x20, 0x9, 0x9, 0x5, 0xfffffffe, 0x4}, @jmp={0x5, 0x81, 0x9, 0x7, 0x6, 0xfffffffe, 0xfffffffffffffff0}, @jmp={0x5, 0x3, 0x3, 0x0, 0x2, 0x2, 0xffffffffffffffff}], {0x95}}, &(0x7f0000000780)='GPL\x00', 0x4, 0x77, &(0x7f00000007c0)=""/119, 0x0, 0x1, [], r13}, 0x48) mount(&(0x7f0000009500)='./file0\x00', &(0x7f0000009540)='./file0\x00', &(0x7f0000009580)='cramfs\x00', 0x5020, &(0x7f00000095c0)="22f464f8fef2b95976576e903efe99229584aaf55fa0d91223905d4a68c0c7d18bf26de6fec0660b0c36945200da04f802d9059dd5f6d2f0eca450f4fdd46ed2b411588d802f0d1d02be65816332b2754d686e927593deb8ee3ed17a24d749db81290c33836bcc9b7d93084c53d0744e81deb8b83d9b23565d6db4cb746eb15b20f7b806f0b5a02676d90260a61b00e9ec0b4b8bf07d5f93b3feda8299586c3936f743c764205de278c25a6fff98") perf_event_open(&(0x7f00000096c0)={0x1, 0x70, 0x3, 0xa8e, 0x1000, 0xe57a, 0x0, 0x6, 0x2100b, 0x2, 0x9, 0xdb1b, 0xfffffffffffffffa, 0xa7f8, 0x3, 0x2, 0x800, 0x800, 0x2, 0x0, 0x3f, 0x3, 0x8000000000000, 0x3, 0x20, 0x6, 0x3, 0xfffffffffffff318, 0xffffffffffff0001, 0xfffffffffffffffe, 0x12, 0x1, 0x101, 0x8, 0x100, 0x1, 0x3, 0x8, 0x0, 0x3ff, 0x7, @perf_bp={&(0x7f0000009680), 0x3}, 0x9, 0x6, 0xfffffffffffffff7, 0x0, 0x0, 0x49, 0xfffffffffffff3b8}, r10, 0xe, r5, 0x8) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000009880)={r12, &(0x7f0000009740)="8ba447000764036f17624e623896639a3e2456b901aedcdb4221cea83c3b2c94575967a34ec104bbebeaf6a6b50494e6763f41056d2ca84f906fa48d72590e81334926fab48e", &(0x7f00000097c0)=""/170}, 0x18) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r4, 0x2405, r6) bpf$PROG_LOAD(0x5, &(0x7f00000099c0)={0x7, 0x4, &(0x7f00000098c0)=@raw=[@ldst={0x3, 0x3, 0x6, 0xd, 0x7, 0x26}, @ldst={0x0, 0x2, 0x0, 0xa, 0x0, 0x4, 0xffffffffffffffff}], &(0x7f0000009900)='GPL\x00', 0x5, 0x5d, &(0x7f0000009940)=""/93, 0x41f00, 0x1, [], r13}, 0x48) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000009b40)={r8, &(0x7f0000009a40)="402c0b8b20e0ae84bb", &(0x7f0000009a80)=""/178}, 0x18) 2018/03/31 05:13:29 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x4, 0x70, 0xfffffffffffffffd, 0x8, 0x8000, 0x1, 0x0, 0x401, 0x2, 0xc, 0x7ff, 0x7, 0x3, 0x33ac978e, 0x800, 0x5, 0x1cb6, 0x5, 0x3, 0x55, 0x1, 0x0, 0x2, 0x3, 0x8, 0x1ff, 0x9, 0x9, 0x1, 0x1, 0x80000000000, 0x1ff, 0x2, 0xffffffffffffff01, 0x3, 0x4, 0x3f, 0x0, 0x0, 0xffff, 0x2, @perf_bp={&(0x7f0000000000), 0x4}, 0x100, 0x1ff, 0x3, 0x4, 0x604c, 0x3, 0x5d5}, 0x0, 0xe, 0xffffffffffffffff, 0x1) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000100)={&(0x7f00000000c0)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x6) socketpair$packet(0x11, 0x3, 0x300, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$ax25(0x3, 0x5, 0xce, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x9) socketpair$inet6(0xa, 0x807, 0x7f, &(0x7f00000001c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0xea93) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x200) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000200)=r3, 0x4) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000240)={0xffffffffffffffff}) sendmsg(r2, &(0x7f0000001b40)={&(0x7f0000000280)=@pppol2tp={0x18, 0x1, {0x0, r4, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0xc}}, 0x1, 0x2, 0x1}}, 0x80, &(0x7f0000001a80)=[{&(0x7f0000000300)="19740ad8ed738dbc25252b1982a7a1e9637a8032bffb9bc9b2375fcad0763699d8d11411cabb6456533869a7026f480fea0a3e2538681ece681ab2a24a59c2bd5261ae611b5ff2f529e01787ad5ba9a3b8184ab45a9a4b5cee91fe112ab2e4ab15b7d81dd5dfebcb1a1d0b3f922dba67307a50c855215cf1162e45f10c7953ca07889c368719689dbab5cba2bbe7564d6a1813969d833148fb5f515f98f312156c54f30b59e543d4ddad3344d68e3d56683292236d8668def3cb8936cbfb58a0603f68259647be805fa21ace12f755447d530d7a8f765e662c1942", 0xdb}, {&(0x7f0000000500)="a18627efc4323621f9de7c0be2447493ebc8d2b4063a322f6f3b82b2d0ea91f63c9c0de15e1f89f16c199fbb0996d1b8479fc7b4596442e1", 0x38}, {&(0x7f0000000640)="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", 0x1000}, {&(0x7f0000001740)="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", 0xfe}, {&(0x7f0000001940)="f243a8f43a64f3ee1ea651e79f380c994a2d95c68c96cd3a8742d4577c2153c64822b0a7", 0x24}], 0x5, 0x0, 0x0, 0x4840}, 0x80) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000001b80)) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r5) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001c00)={0xffffffffffffff9c, 0x28, &(0x7f0000001bc0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001c40)={r6, 0x20, 0x18}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001d00)={r4, 0x50, &(0x7f0000001c80)={0x0, 0x0}}, 0x10) r8 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001d40)=r7, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001d80)) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000001dc0)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000001e00)='\x00') ioctl$PERF_EVENT_IOC_REFRESH(r4, 0x2402, 0x0) r9 = gettid() perf_event_open(&(0x7f0000001e80)={0x0, 0x70, 0x2, 0x3, 0xee9e, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1000, 0xfff, 0x4, 0x6, 0x0, 0xd3, 0x3, 0x100000001, 0x2, 0xb500, 0x20, 0x5, 0x0, 0x8, 0x4, 0xb8e4, 0x9, 0x2, 0x1, 0x6, 0x8000, 0x8505, 0x2, 0x800, 0x20, 0x8, 0x6, 0x3, 0x0, 0x10, 0x0, @perf_bp={&(0x7f0000001e40)}, 0x400, 0x20000000000, 0x7, 0x7, 0x0, 0xffffffffffffffff, 0x1000}, r9, 0x9, r0, 0x1) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000001f00)) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000001f40)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000002000)={r8, 0x50, &(0x7f0000001f80)}, 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000002080)={&(0x7f0000002040)='./file0/file0\x00', r1}, 0x10) [ 181.661919] FAULT_INJECTION: forcing a failure. [ 181.661919] name failslab, interval 1, probability 0, space 0, times 0 [ 181.673236] CPU: 0 PID: 15460 Comm: syz-executor6 Not tainted 4.16.0-rc6+ #42 [ 181.673522] EXT4-fs (sda1): re-mounted. Opts: (null) [ 181.680500] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 181.680505] Call Trace: [ 181.680521] dump_stack+0x194/0x24d [ 181.680534] ? arch_local_irq_restore+0x53/0x53 [ 181.680543] ? __save_stack_trace+0x7e/0xd0 [ 181.680560] should_fail+0x8c0/0xa40 [ 181.680572] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 181.680583] ? kasan_kmalloc+0xad/0xe0 [ 181.722816] ? kmem_cache_alloc_trace+0x136/0x740 [ 181.727660] ? __memcg_init_list_lru_node+0x169/0x270 [ 181.731856] EXT4-fs (sda1): re-mounted. Opts: (null) [ 181.732849] ? __list_lru_init+0x544/0x750 [ 181.732861] ? sget_userns+0x6b1/0xe40 [ 181.732872] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 181.732881] ? do_mount+0xea4/0x2bb0 [ 181.732889] ? SyS_mount+0xab/0x120 [ 181.732898] ? do_syscall_64+0x281/0x940 [ 181.732906] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 181.732920] ? find_held_lock+0x35/0x1d0 [ 181.771599] ? __lock_is_held+0xb6/0x140 [ 181.775662] ? check_same_owner+0x320/0x320 [ 181.779986] ? rcu_note_context_switch+0x710/0x710 [ 181.784907] should_failslab+0xec/0x120 [ 181.788865] kmem_cache_alloc_trace+0x4b/0x740 [ 181.793421] ? __kmalloc_node+0x33/0x70 [ 181.797368] ? __kmalloc_node+0x33/0x70 [ 181.801320] ? rcu_read_lock_sched_held+0x108/0x120 [ 181.806314] __memcg_init_list_lru_node+0x169/0x270 [ 181.811311] ? list_lru_add+0x7c0/0x7c0 [ 181.815259] ? __kmalloc_node+0x47/0x70 [ 181.819210] __list_lru_init+0x544/0x750 [ 181.823248] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 181.829110] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 181.834107] ? lockdep_init_map+0x9/0x10 [ 181.838147] sget_userns+0x6b1/0xe40 [ 181.841833] ? set_anon_super+0x20/0x20 [ 181.845783] ? put_filp+0x90/0x90 [ 181.849212] ? destroy_unused_super.part.6+0xd0/0xd0 [ 181.854292] ? alloc_vfsmnt+0x762/0x9c0 [ 181.858244] ? path_lookupat+0x238/0xba0 [ 181.862284] ? mnt_free_id.isra.21+0x50/0x50 [ 181.866667] ? trace_hardirqs_off+0x10/0x10 [ 181.870963] ? putname+0xee/0x130 [ 181.874394] ? cap_capable+0x1b5/0x230 [ 181.878258] ? security_capable+0x8e/0xc0 [ 181.882385] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 181.887549] ? ns_capable_common+0xcf/0x160 [ 181.891848] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 181.897035] mount_ns+0x6d/0x190 [ 181.900380] rpc_mount+0x9e/0xd0 [ 181.903724] mount_fs+0x66/0x2d0 [ 181.907066] vfs_kern_mount.part.26+0xc6/0x4a0 [ 181.911624] ? may_umount+0xa0/0xa0 [ 181.915226] ? _raw_read_unlock+0x22/0x30 [ 181.919349] ? __get_fs_type+0x8a/0xc0 [ 181.923215] do_mount+0xea4/0x2bb0 [ 181.926729] ? __might_fault+0x110/0x1d0 [ 181.930768] ? copy_mount_string+0x40/0x40 [ 181.934976] ? check_same_owner+0x320/0x320 [ 181.939272] ? __check_object_size+0x8b/0x530 [ 181.943743] ? __might_sleep+0x95/0x190 [ 181.947697] ? kasan_check_write+0x14/0x20 [ 181.951905] ? _copy_from_user+0x99/0x110 [ 181.956038] ? memdup_user+0x5e/0x90 [ 181.959724] ? copy_mount_options+0x1f7/0x2e0 [ 181.964197] SyS_mount+0xab/0x120 [ 181.967625] ? copy_mnt_ns+0xb30/0xb30 [ 181.971488] do_syscall_64+0x281/0x940 [ 181.975348] ? vmalloc_sync_all+0x30/0x30 [ 181.979470] ? _raw_spin_unlock_irq+0x27/0x70 [ 181.983943] ? finish_task_switch+0x1c1/0x7e0 [ 181.988413] ? syscall_return_slowpath+0x550/0x550 [ 181.993319] ? syscall_return_slowpath+0x2ac/0x550 [ 181.998223] ? prepare_exit_to_usermode+0x350/0x350 [ 182.003214] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 182.008556] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 182.013378] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 182.018542] RIP: 0033:0x454e79 [ 182.021708] RSP: 002b:00007fc28ac9cc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 182.029392] RAX: ffffffffffffffda RBX: 00007fc28ac9d6d4 RCX: 0000000000454e79 [ 182.036635] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 182.043878] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 182.051121] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000016 2018/03/31 05:13:29 executing program 2: socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000040)={0x7, 0x70, 0x1, 0xaabc, 0x2, 0x2, 0x0, 0xec, 0x4800, 0x1, 0x3a6b72c9, 0xffffffffffff8000, 0xfff, 0x7, 0x2, 0x7, 0xff, 0x1, 0x2, 0x9, 0x1, 0x0, 0x5, 0x75, 0x2, 0x7, 0x8, 0x4, 0x0, 0xdbce, 0xffff, 0xfaf, 0x1, 0xe7, 0xd0eb, 0x28a5, 0x9, 0x4, 0x0, 0x7, 0x2, @perf_config_ext={0x1, 0x8000}, 0x489, 0x6, 0xff, 0x0, 0x9d, 0x8, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f00000000c0)={0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000140)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r2 = getpid() r3 = perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x8, 0x4, 0x4, 0x1, 0x0, 0x401, 0x100, 0x7, 0xcfc0, 0x7, 0x0, 0x7, 0x30, 0x7, 0x7, 0xfff, 0x7, 0x9, 0xff, 0x9, 0xf, 0x0, 0x3, 0x100000000, 0x3, 0x8, 0xffff, 0x2, 0x3, 0xff, 0x6f, 0x3, 0x0, 0x800, 0x81, 0x0, 0x0, 0x9, 0x1, @perf_bp={&(0x7f0000000180), 0x1}, 0x11815, 0x9, 0x1, 0x1, 0x101, 0x5, 0x1e892fee}, r2, 0x9, r1, 0x1) r4 = perf_event_open(&(0x7f0000000280)={0x5, 0x70, 0xe00000000000, 0x9, 0x800, 0x6, 0x0, 0x7ff, 0x10200, 0xb, 0xe3, 0x5, 0x1, 0x4, 0x9b0f, 0x1f8a, 0x401, 0x1, 0xe975, 0x7, 0x437, 0x9, 0x7f, 0x20, 0x1, 0x2, 0x3, 0x5, 0x200, 0x1, 0x8, 0x401, 0x401, 0x2, 0x8, 0xfff, 0xf3c8, 0xf23, 0x0, 0x7fffffff, 0x0, @perf_bp={&(0x7f0000000240), 0x9}, 0x828, 0x3, 0x5, 0x1, 0x0, 0xc37, 0x6}, r2, 0x4, r1, 0x2) r5 = perf_event_open(&(0x7f0000000300)={0x4, 0x70, 0xff, 0x3, 0x7f, 0x7, 0x0, 0x40, 0x4a240, 0x2, 0xffffffffffffcc27, 0xb8, 0x2, 0x7, 0x9, 0x800, 0x3, 0x7d4d, 0xf7, 0xfffffffffffffffa, 0x9, 0x4, 0x3, 0x90be, 0x9, 0xfffffffffffffffc, 0x6, 0x3ff, 0xab6b, 0x8001, 0x5, 0x2, 0x9, 0x732, 0x400, 0x55000000000, 0x1ff, 0x6, 0x0, 0x0, 0x2, @perf_config_ext={0x6, 0xffffffff}, 0x40, 0x80000001, 0x7fff, 0x2, 0x1, 0x6, 0x5}, r2, 0xf, r4, 0xa) r6 = perf_event_open(&(0x7f00000003c0)={0x7, 0x70, 0xc87d, 0x6, 0x5, 0x80000001, 0x0, 0x3, 0x1, 0xb, 0xffffffff, 0x9, 0x584, 0x31b, 0x7, 0x2, 0x3, 0x544, 0x100000001, 0x9, 0x1, 0x100, 0x3, 0x1, 0x7, 0x0, 0x7, 0x5, 0xbb, 0x40, 0x7, 0x8, 0x81, 0xc5a, 0x0, 0x7, 0x1f, 0x815, 0x0, 0xffff, 0x2, @perf_bp={&(0x7f0000000380), 0x8}, 0x4, 0x5, 0xc95, 0x0, 0x7ff, 0x7b02, 0x7}, r2, 0x10, r1, 0xb) ioctl$PERF_EVENT_IOC_DISABLE(r3, 0x2401, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0x4) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = perf_event_open(&(0x7f0000000480)={0x7, 0x70, 0x7, 0xdbff, 0x3, 0x3f, 0x0, 0x8, 0x0, 0xc, 0x8, 0x0, 0xf43, 0x101, 0x6, 0x5, 0x6, 0x9, 0x200, 0xfffffffffffffffd, 0x4, 0x6, 0x6e, 0x20, 0x1b3, 0x1fe, 0x7ff, 0x3, 0x8000, 0x5, 0x0, 0x0, 0x0, 0x5, 0x22d2, 0x401, 0x68, 0xa1ce, 0x0, 0x4, 0x0, @perf_config_ext={0x2fb, 0x4}, 0x2000, 0xd33, 0x6, 0x697c4c7d75b7b6da, 0x171f, 0x9, 0x9}, r2, 0x6, r5, 0x1) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x9, 0x6, 0x101, 0x8, 0x0, 0x200, 0x2000, 0xf, 0x0, 0x5, 0x6, 0x3, 0x2, 0x0, 0x8001, 0x8, 0x3, 0x5, 0x17, 0x7, 0x4, 0x400, 0xffffffff, 0x7, 0x8000, 0x2, 0x100, 0x0, 0x7, 0x95de, 0x2, 0x1, 0x2, 0xd432, 0x3ff, 0x8599, 0x0, 0x3ff, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x10080, 0x7, 0xe7e, 0x7, 0x5, 0x7, 0x9}, r2, 0x0, r3, 0x8) close(r7) ioctl$PERF_EVENT_IOC_DISABLE(r9, 0x2401, 0x1) r10 = gettid() ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f00000005c0)={r0}) ioctl$sock_kcm_SIOCKCMUNATTACH(r11, 0x89e1, &(0x7f0000000600)={r8}) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000640)) r12 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)={0x4, 0x7, 0x7f, 0x9787, 0x1c, 0xffffffffffffffff, 0x5}, 0x2c) recvmsg$kcm(r11, &(0x7f0000009440)={&(0x7f0000009300)=@can={0x0, 0x0}, 0x80, &(0x7f00000093c0)=[{&(0x7f0000009380)=""/16, 0x10}], 0x1, &(0x7f0000009400)=""/18, 0x12, 0x3bc1}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000009480)={0xf, 0x13, &(0x7f00000006c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [@ldst={0x3, 0x2, 0x1, 0x2, 0x7, 0xffffffff, 0x4}, @map={0x18, 0x0, 0x1, 0x0, r12}, @alu={0x7, 0x5, 0xf, 0x6, 0xe, 0x2, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4}, @jmp={0x5, 0x7a4c, 0x0, 0x3, 0x9, 0xffffffff, 0xfffffffffffffff0}, @alu={0x4, 0x20, 0x9, 0x9, 0x5, 0xfffffffe, 0x4}, @jmp={0x5, 0x81, 0x9, 0x7, 0x6, 0xfffffffe, 0xfffffffffffffff0}, @jmp={0x5, 0x3, 0x3, 0x0, 0x2, 0x2, 0xffffffffffffffff}], {0x95}}, &(0x7f0000000780)='GPL\x00', 0x4, 0x77, &(0x7f00000007c0)=""/119, 0x0, 0x1, [], r13}, 0x48) mount(&(0x7f0000009500)='./file0\x00', &(0x7f0000009540)='./file0\x00', &(0x7f0000009580)='cramfs\x00', 0x5020, &(0x7f00000095c0)="22f464f8fef2b95976576e903efe99229584aaf55fa0d91223905d4a68c0c7d18bf26de6fec0660b0c36945200da04f802d9059dd5f6d2f0eca450f4fdd46ed2b411588d802f0d1d02be65816332b2754d686e927593deb8ee3ed17a24d749db81290c33836bcc9b7d93084c53d0744e81deb8b83d9b23565d6db4cb746eb15b20f7b806f0b5a02676d90260a61b00e9ec0b4b8bf07d5f93b3feda8299586c3936f743c764205de278c25a6fff98") perf_event_open(&(0x7f00000096c0)={0x1, 0x70, 0x3, 0xa8e, 0x1000, 0xe57a, 0x0, 0x6, 0x2100b, 0x2, 0x9, 0xdb1b, 0xfffffffffffffffa, 0xa7f8, 0x3, 0x2, 0x800, 0x800, 0x2, 0x0, 0x3f, 0x3, 0x8000000000000, 0x3, 0x20, 0x6, 0x3, 0xfffffffffffff318, 0xffffffffffff0001, 0xfffffffffffffffe, 0x12, 0x1, 0x101, 0x8, 0x100, 0x1, 0x3, 0x8, 0x0, 0x3ff, 0x7, @perf_bp={&(0x7f0000009680), 0x3}, 0x9, 0x6, 0xfffffffffffffff7, 0x0, 0x0, 0x49, 0xfffffffffffff3b8}, r10, 0xe, r5, 0x8) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000009880)={r12, &(0x7f0000009740)="8ba447000764036f17624e623896639a3e2456b901aedcdb4221cea83c3b2c94575967a34ec104bbebeaf6a6b50494e6763f41056d2ca84f906fa48d72590e81334926fab48e", &(0x7f00000097c0)=""/170}, 0x18) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r4, 0x2405, r6) bpf$PROG_LOAD(0x5, &(0x7f00000099c0)={0x7, 0x4, &(0x7f00000098c0)=@raw=[@ldst={0x3, 0x3, 0x6, 0xd, 0x7, 0x26}, @ldst={0x0, 0x2, 0x0, 0xa, 0x0, 0x4, 0xffffffffffffffff}], &(0x7f0000009900)='GPL\x00', 0x5, 0x5d, &(0x7f0000009940)=""/93, 0x41f00, 0x1, [], r13}, 0x48) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000009b40)={r8, &(0x7f0000009a40)="402c0b8b20e0ae84bb", &(0x7f0000009a80)=""/178}, 0x18) 2018/03/31 05:13:29 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0xcf}, 0xfffffffffffffd40) mount(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='ncpfs\x00', 0x80802, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x50, &(0x7f0000000700)={0x0, 0x0}}, 0x10) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780)=r1, 0x4) mount(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='./file0\x00', &(0x7f00000006c0)='btrfs\x00', 0x89402, &(0x7f0000000900)="e196efa3cb748d2a6600968b76295ff919bc3877b18eb8d265a35493fcf34fdc965cd5c837d2389c6e2ec6088abe8daaa8ca23f9298fc94dc26874bc4d4567afea1ca0879cdf21e915005a83e96b1002af29091d2176abbb7fec088a67f2e1390f32adaf2f252d24510870f8df7186936f4d88957eb8fcda78b7383a7d24db701d524557ee7324433e70d9ffa185098325f9e657d3c29cf6a35843cb96780269db1c735d55938af5c60e1e4ba25928697277b0fdf356b62399b4c8826d09bfca7d6078c19b4995195ea814b1bb40c06210ec4a97f9") bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a80)={r2, 0x50, &(0x7f0000000a00)}, 0x10) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0xffffffff) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x22, &(0x7f0000000ac0)=ANY=[@ANYBLOB="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"], &(0x7f0000f6bffb)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000400)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000540)={r3, 0x50}, 0xfffffe74) close(r3) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='gfs2meta\x00', 0x1114440, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x28, 0x2, 0x0, &(0x7f0000000000)={0x0}) mkdir(&(0x7f0000000100)='./file0\x00', 0x1000000000) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='selinuxfs\x00', 0x1000, &(0x7f0000000100)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='minix\x00', 0x10020, &(0x7f0000000240)) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={r3, r4, 0x0, 0x2}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000600)={0x7, 0xec, 0x800, 0xcb, 0xa, 0xffffffffffffffff, 0x1f}, 0x2c) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000000c0)) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='debugfs\x00', 0x1010020, &(0x7f00000003c0)="29c5") socketpair(0x5, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r5}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) 2018/03/31 05:13:29 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0x0, 0x0}) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4982, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80}, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, 0xffffffffffffffff) close(r1) recvmsg(r0, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000800), 0x1f0, &(0x7f0000000040)=""/93, 0xfffffffffffffc1c}, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x1, 0xa, &(0x7f0000000500)=ANY=[@ANYBLOB="000001f8ffffffffffff00003b5f3392b0f6f49bb69c9af539f505266e51e0390d19f4facba34108f9f9acd171d764ca86ab7bacb1d37596b64e4162a44fc1027ed69cdc98f313a398614ba117000000"], &(0x7f0000000480)='GPL\x00', 0x0, 0xfb, &(0x7f0000000300)=""/251}, 0x48) mkdir(&(0x7f0000000680)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='fuseblk\x00', 0x0, &(0x7f0000000200)) mount(&(0x7f0000df7000)='./file0\x00', &(0x7f0000000980)='./file0\x00', &(0x7f0000000800)="68356765746cdd06838b675cd5b2e35e848627b418bc46a2aca7508a71270ba60e179cf50eb1ebd5d6f2a152b14ba04557b4db311a507da6b1a538075aa06d34cb1bf931396427efd4610c", 0x200, &(0x7f00000001c0)) socketpair$inet(0x2, 0xa, 0xfffffffffffffffd, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r3, &(0x7f00000007c0)={&(0x7f0000000140)=@pppoe={0x18, 0x0, {0x3, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, 'ip_vti0\x00'}}, 0x80, &(0x7f00000006c0)=[{&(0x7f00000001c0)="7726d56bf8f8907b663c07d9697287a472b3a307df44177e59bb7bc152e3984c2897bea7f29ab2de6024da59924673eb37b421b0084a6276c8", 0x39}], 0x1, 0x0, 0x0, 0x4000010}, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000580)={0xffffffffffffffff}) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000005c0)=0x7, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={r2, 0x50, &(0x7f0000000000)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=r5, 0x4) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffff9c, 0x40042408, 0xffffffffffffffff) recvmsg(r4, &(0x7f0000000b00)={&(0x7f0000000740)=@vsock, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000880)=""/228, 0xe4}], 0x1, &(0x7f0000000a40)=""/140, 0x8c}, 0x0) socketpair(0xa, 0xa, 0x63ed, &(0x7f00000004c0)) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000100)=r2, 0x4) 2018/03/31 05:13:29 executing program 2: socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000040)={0x7, 0x70, 0x1, 0xaabc, 0x2, 0x2, 0x0, 0xec, 0x4800, 0x1, 0x3a6b72c9, 0xffffffffffff8000, 0xfff, 0x7, 0x2, 0x7, 0xff, 0x1, 0x2, 0x9, 0x1, 0x0, 0x5, 0x75, 0x2, 0x7, 0x8, 0x4, 0x0, 0xdbce, 0xffff, 0xfaf, 0x1, 0xe7, 0xd0eb, 0x28a5, 0x9, 0x4, 0x0, 0x7, 0x2, @perf_config_ext={0x1, 0x8000}, 0x489, 0x6, 0xff, 0x0, 0x9d, 0x8, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f00000000c0)={0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000140)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r2 = getpid() r3 = perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x8, 0x4, 0x4, 0x1, 0x0, 0x401, 0x100, 0x7, 0xcfc0, 0x7, 0x0, 0x7, 0x30, 0x7, 0x7, 0xfff, 0x7, 0x9, 0xff, 0x9, 0xf, 0x0, 0x3, 0x100000000, 0x3, 0x8, 0xffff, 0x2, 0x3, 0xff, 0x6f, 0x3, 0x0, 0x800, 0x81, 0x0, 0x0, 0x9, 0x1, @perf_bp={&(0x7f0000000180), 0x1}, 0x11815, 0x9, 0x1, 0x1, 0x101, 0x5, 0x1e892fee}, r2, 0x9, r1, 0x1) r4 = perf_event_open(&(0x7f0000000280)={0x5, 0x70, 0xe00000000000, 0x9, 0x800, 0x6, 0x0, 0x7ff, 0x10200, 0xb, 0xe3, 0x5, 0x1, 0x4, 0x9b0f, 0x1f8a, 0x401, 0x1, 0xe975, 0x7, 0x437, 0x9, 0x7f, 0x20, 0x1, 0x2, 0x3, 0x5, 0x200, 0x1, 0x8, 0x401, 0x401, 0x2, 0x8, 0xfff, 0xf3c8, 0xf23, 0x0, 0x7fffffff, 0x0, @perf_bp={&(0x7f0000000240), 0x9}, 0x828, 0x3, 0x5, 0x1, 0x0, 0xc37, 0x6}, r2, 0x4, r1, 0x2) r5 = perf_event_open(&(0x7f0000000300)={0x4, 0x70, 0xff, 0x3, 0x7f, 0x7, 0x0, 0x40, 0x4a240, 0x2, 0xffffffffffffcc27, 0xb8, 0x2, 0x7, 0x9, 0x800, 0x3, 0x7d4d, 0xf7, 0xfffffffffffffffa, 0x9, 0x4, 0x3, 0x90be, 0x9, 0xfffffffffffffffc, 0x6, 0x3ff, 0xab6b, 0x8001, 0x5, 0x2, 0x9, 0x732, 0x400, 0x55000000000, 0x1ff, 0x6, 0x0, 0x0, 0x2, @perf_config_ext={0x6, 0xffffffff}, 0x40, 0x80000001, 0x7fff, 0x2, 0x1, 0x6, 0x5}, r2, 0xf, r4, 0xa) r6 = perf_event_open(&(0x7f00000003c0)={0x7, 0x70, 0xc87d, 0x6, 0x5, 0x80000001, 0x0, 0x3, 0x1, 0xb, 0xffffffff, 0x9, 0x584, 0x31b, 0x7, 0x2, 0x3, 0x544, 0x100000001, 0x9, 0x1, 0x100, 0x3, 0x1, 0x7, 0x0, 0x7, 0x5, 0xbb, 0x40, 0x7, 0x8, 0x81, 0xc5a, 0x0, 0x7, 0x1f, 0x815, 0x0, 0xffff, 0x2, @perf_bp={&(0x7f0000000380), 0x8}, 0x4, 0x5, 0xc95, 0x0, 0x7ff, 0x7b02, 0x7}, r2, 0x10, r1, 0xb) ioctl$PERF_EVENT_IOC_DISABLE(r3, 0x2401, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0x4) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = perf_event_open(&(0x7f0000000480)={0x7, 0x70, 0x7, 0xdbff, 0x3, 0x3f, 0x0, 0x8, 0x0, 0xc, 0x8, 0x0, 0xf43, 0x101, 0x6, 0x5, 0x6, 0x9, 0x200, 0xfffffffffffffffd, 0x4, 0x6, 0x6e, 0x20, 0x1b3, 0x1fe, 0x7ff, 0x3, 0x8000, 0x5, 0x0, 0x0, 0x0, 0x5, 0x22d2, 0x401, 0x68, 0xa1ce, 0x0, 0x4, 0x0, @perf_config_ext={0x2fb, 0x4}, 0x2000, 0xd33, 0x6, 0x697c4c7d75b7b6da, 0x171f, 0x9, 0x9}, r2, 0x6, r5, 0x1) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x9, 0x6, 0x101, 0x8, 0x0, 0x200, 0x2000, 0xf, 0x0, 0x5, 0x6, 0x3, 0x2, 0x0, 0x8001, 0x8, 0x3, 0x5, 0x17, 0x7, 0x4, 0x400, 0xffffffff, 0x7, 0x8000, 0x2, 0x100, 0x0, 0x7, 0x95de, 0x2, 0x1, 0x2, 0xd432, 0x3ff, 0x8599, 0x0, 0x3ff, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x10080, 0x7, 0xe7e, 0x7, 0x5, 0x7, 0x9}, r2, 0x0, r3, 0x8) close(r7) ioctl$PERF_EVENT_IOC_DISABLE(r9, 0x2401, 0x1) r10 = gettid() ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f00000005c0)={r0}) ioctl$sock_kcm_SIOCKCMUNATTACH(r11, 0x89e1, &(0x7f0000000600)={r8}) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000640)) r12 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)={0x4, 0x7, 0x7f, 0x9787, 0x1c, 0xffffffffffffffff, 0x5}, 0x2c) recvmsg$kcm(r11, &(0x7f0000009440)={&(0x7f0000009300)=@can={0x0, 0x0}, 0x80, &(0x7f00000093c0)=[{&(0x7f0000009380)=""/16, 0x10}], 0x1, &(0x7f0000009400)=""/18, 0x12, 0x3bc1}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000009480)={0xf, 0x13, &(0x7f00000006c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [@ldst={0x3, 0x2, 0x1, 0x2, 0x7, 0xffffffff, 0x4}, @map={0x18, 0x0, 0x1, 0x0, r12}, @alu={0x7, 0x5, 0xf, 0x6, 0xe, 0x2, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4}, @jmp={0x5, 0x7a4c, 0x0, 0x3, 0x9, 0xffffffff, 0xfffffffffffffff0}, @alu={0x4, 0x20, 0x9, 0x9, 0x5, 0xfffffffe, 0x4}, @jmp={0x5, 0x81, 0x9, 0x7, 0x6, 0xfffffffe, 0xfffffffffffffff0}, @jmp={0x5, 0x3, 0x3, 0x0, 0x2, 0x2, 0xffffffffffffffff}], {0x95}}, &(0x7f0000000780)='GPL\x00', 0x4, 0x77, &(0x7f00000007c0)=""/119, 0x0, 0x1, [], r13}, 0x48) mount(&(0x7f0000009500)='./file0\x00', &(0x7f0000009540)='./file0\x00', &(0x7f0000009580)='cramfs\x00', 0x5020, &(0x7f00000095c0)="22f464f8fef2b95976576e903efe99229584aaf55fa0d91223905d4a68c0c7d18bf26de6fec0660b0c36945200da04f802d9059dd5f6d2f0eca450f4fdd46ed2b411588d802f0d1d02be65816332b2754d686e927593deb8ee3ed17a24d749db81290c33836bcc9b7d93084c53d0744e81deb8b83d9b23565d6db4cb746eb15b20f7b806f0b5a02676d90260a61b00e9ec0b4b8bf07d5f93b3feda8299586c3936f743c764205de278c25a6fff98") perf_event_open(&(0x7f00000096c0)={0x1, 0x70, 0x3, 0xa8e, 0x1000, 0xe57a, 0x0, 0x6, 0x2100b, 0x2, 0x9, 0xdb1b, 0xfffffffffffffffa, 0xa7f8, 0x3, 0x2, 0x800, 0x800, 0x2, 0x0, 0x3f, 0x3, 0x8000000000000, 0x3, 0x20, 0x6, 0x3, 0xfffffffffffff318, 0xffffffffffff0001, 0xfffffffffffffffe, 0x12, 0x1, 0x101, 0x8, 0x100, 0x1, 0x3, 0x8, 0x0, 0x3ff, 0x7, @perf_bp={&(0x7f0000009680), 0x3}, 0x9, 0x6, 0xfffffffffffffff7, 0x0, 0x0, 0x49, 0xfffffffffffff3b8}, r10, 0xe, r5, 0x8) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000009880)={r12, &(0x7f0000009740)="8ba447000764036f17624e623896639a3e2456b901aedcdb4221cea83c3b2c94575967a34ec104bbebeaf6a6b50494e6763f41056d2ca84f906fa48d72590e81334926fab48e", &(0x7f00000097c0)=""/170}, 0x18) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r4, 0x2405, r6) bpf$PROG_LOAD(0x5, &(0x7f00000099c0)={0x7, 0x4, &(0x7f00000098c0)=@raw=[@ldst={0x3, 0x3, 0x6, 0xd, 0x7, 0x26}, @ldst={0x0, 0x2, 0x0, 0xa, 0x0, 0x4, 0xffffffffffffffff}], &(0x7f0000009900)='GPL\x00', 0x5, 0x5d, &(0x7f0000009940)=""/93, 0x41f00, 0x1, [], r13}, 0x48) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000009b40)={r8, &(0x7f0000009a40)="402c0b8b20e0ae84bb", &(0x7f0000009a80)=""/178}, 0x18) [ 182.058367] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000028 2018/03/31 05:13:29 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x5, 0x100000000209e20, 0x0, 0x5}, 0x2c) r1 = bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x13, 0x0, 0x7ffff9, 0x0, 0x20000003, 0x0}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xe, 0x0, 0x7f, 0x0, 0x8, r1, 0x80000000}, 0x2c) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x50, &(0x7f0000000140)}, 0x10) socket$kcm(0x29, 0x2, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r2 = perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0xfff) socketpair(0x4, 0x1, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) socketpair(0x0, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r6, &(0x7f0000000700)={&(0x7f0000000300)=@in6={0x0, 0x0, 0x0, @mcast2}, 0x80, &(0x7f00000005c0)=[{&(0x7f00000003c0)=""/217, 0xd9}, {&(0x7f00000000c0)=""/33, 0x21}, {&(0x7f0000000280)=""/37, 0x25}, {&(0x7f00000004c0)=""/219, 0xdb}], 0x4, &(0x7f0000000600)=""/202, 0xca, 0x81}, 0x40002000) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={r5, &(0x7f0000000080)="b02e82b8cc655398979911284b03a01b4483911b050efd8d0c3567c7ffc01b87f7598b19d6a70d55bc2541b249d4ef0aeae229574b1438", &(0x7f0000000940)="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", 0x2}, 0x20) ioctl$PERF_EVENT_IOC_DISABLE(r3, 0x2401, 0x100000000) perf_event_open(&(0x7f000025c000)={0x5, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r7 = gettid() perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7, 0xfff, 0x100000001, 0xfffffffffffffffb, 0x0, 0x8001, 0x0, 0x1, 0x0, 0xfffffffffffffff9, 0x0, 0x9, 0x9, 0x5, 0x8, 0x1, 0x8106, 0x0, 0x14000000000, 0x80000000, 0x1, 0x5, 0x0, 0x40, 0x2839, 0x1d, 0x800, 0x7, 0x8, 0x3, 0x5, 0x7, 0x8, 0x1, 0x3, 0x0, 0x0, 0x758, 0x4, @perf_bp={&(0x7f00000001c0), 0x4}, 0x0, 0x0, 0xff, 0x0, 0x3, 0x8, 0x3}, r7, 0x2, r3, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000840)={r4, &(0x7f0000000780)="50b839aa83a5efc06d2fbb17963b13996cc8f58064d2f319454106668580248e6b8ab93ac8c0ae446069a332b674023055461fea45e5dc4a118899270a8c21774a4fbfeb2497bdf6aade3caa675806ee4d2699a5842383b791b21e13ae7839e6ed300fc90c10fc9e1f836498fd74a91c1b94575f3948c7dab96b00c9ec1d09a94da51f6a2d9ed9077468019c952c45d40b44efbf232fb9b698bb0dd3", &(0x7f0000001940)=""/233}, 0x18) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000880)={r0, &(0x7f0000000840), &(0x7f00000008c0)=""/70}, 0x375) ioctl$PERF_EVENT_IOC_RESET(r5, 0x2403, 0x100000001) socketpair(0x15, 0x3, 0x3, &(0x7f0000000740)) [ 182.105455] EXT4-fs (sda1): re-mounted. Opts: 2018/03/31 05:13:29 executing program 3: socketpair(0x13, 0x6, 0x6, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) [ 182.141474] EXT4-fs (sda1): re-mounted. Opts: 2018/03/31 05:13:29 executing program 2: socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000040)={0x7, 0x70, 0x1, 0xaabc, 0x2, 0x2, 0x0, 0xec, 0x4800, 0x1, 0x3a6b72c9, 0xffffffffffff8000, 0xfff, 0x7, 0x2, 0x7, 0xff, 0x1, 0x2, 0x9, 0x1, 0x0, 0x5, 0x75, 0x2, 0x7, 0x8, 0x4, 0x0, 0xdbce, 0xffff, 0xfaf, 0x1, 0xe7, 0xd0eb, 0x28a5, 0x9, 0x4, 0x0, 0x7, 0x2, @perf_config_ext={0x1, 0x8000}, 0x489, 0x6, 0xff, 0x0, 0x9d, 0x8, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f00000000c0)={0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000140)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r2 = getpid() r3 = perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x8, 0x4, 0x4, 0x1, 0x0, 0x401, 0x100, 0x7, 0xcfc0, 0x7, 0x0, 0x7, 0x30, 0x7, 0x7, 0xfff, 0x7, 0x9, 0xff, 0x9, 0xf, 0x0, 0x3, 0x100000000, 0x3, 0x8, 0xffff, 0x2, 0x3, 0xff, 0x6f, 0x3, 0x0, 0x800, 0x81, 0x0, 0x0, 0x9, 0x1, @perf_bp={&(0x7f0000000180), 0x1}, 0x11815, 0x9, 0x1, 0x1, 0x101, 0x5, 0x1e892fee}, r2, 0x9, r1, 0x1) r4 = perf_event_open(&(0x7f0000000280)={0x5, 0x70, 0xe00000000000, 0x9, 0x800, 0x6, 0x0, 0x7ff, 0x10200, 0xb, 0xe3, 0x5, 0x1, 0x4, 0x9b0f, 0x1f8a, 0x401, 0x1, 0xe975, 0x7, 0x437, 0x9, 0x7f, 0x20, 0x1, 0x2, 0x3, 0x5, 0x200, 0x1, 0x8, 0x401, 0x401, 0x2, 0x8, 0xfff, 0xf3c8, 0xf23, 0x0, 0x7fffffff, 0x0, @perf_bp={&(0x7f0000000240), 0x9}, 0x828, 0x3, 0x5, 0x1, 0x0, 0xc37, 0x6}, r2, 0x4, r1, 0x2) r5 = perf_event_open(&(0x7f0000000300)={0x4, 0x70, 0xff, 0x3, 0x7f, 0x7, 0x0, 0x40, 0x4a240, 0x2, 0xffffffffffffcc27, 0xb8, 0x2, 0x7, 0x9, 0x800, 0x3, 0x7d4d, 0xf7, 0xfffffffffffffffa, 0x9, 0x4, 0x3, 0x90be, 0x9, 0xfffffffffffffffc, 0x6, 0x3ff, 0xab6b, 0x8001, 0x5, 0x2, 0x9, 0x732, 0x400, 0x55000000000, 0x1ff, 0x6, 0x0, 0x0, 0x2, @perf_config_ext={0x6, 0xffffffff}, 0x40, 0x80000001, 0x7fff, 0x2, 0x1, 0x6, 0x5}, r2, 0xf, r4, 0xa) r6 = perf_event_open(&(0x7f00000003c0)={0x7, 0x70, 0xc87d, 0x6, 0x5, 0x80000001, 0x0, 0x3, 0x1, 0xb, 0xffffffff, 0x9, 0x584, 0x31b, 0x7, 0x2, 0x3, 0x544, 0x100000001, 0x9, 0x1, 0x100, 0x3, 0x1, 0x7, 0x0, 0x7, 0x5, 0xbb, 0x40, 0x7, 0x8, 0x81, 0xc5a, 0x0, 0x7, 0x1f, 0x815, 0x0, 0xffff, 0x2, @perf_bp={&(0x7f0000000380), 0x8}, 0x4, 0x5, 0xc95, 0x0, 0x7ff, 0x7b02, 0x7}, r2, 0x10, r1, 0xb) ioctl$PERF_EVENT_IOC_DISABLE(r3, 0x2401, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0x4) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = perf_event_open(&(0x7f0000000480)={0x7, 0x70, 0x7, 0xdbff, 0x3, 0x3f, 0x0, 0x8, 0x0, 0xc, 0x8, 0x0, 0xf43, 0x101, 0x6, 0x5, 0x6, 0x9, 0x200, 0xfffffffffffffffd, 0x4, 0x6, 0x6e, 0x20, 0x1b3, 0x1fe, 0x7ff, 0x3, 0x8000, 0x5, 0x0, 0x0, 0x0, 0x5, 0x22d2, 0x401, 0x68, 0xa1ce, 0x0, 0x4, 0x0, @perf_config_ext={0x2fb, 0x4}, 0x2000, 0xd33, 0x6, 0x697c4c7d75b7b6da, 0x171f, 0x9, 0x9}, r2, 0x6, r5, 0x1) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x9, 0x6, 0x101, 0x8, 0x0, 0x200, 0x2000, 0xf, 0x0, 0x5, 0x6, 0x3, 0x2, 0x0, 0x8001, 0x8, 0x3, 0x5, 0x17, 0x7, 0x4, 0x400, 0xffffffff, 0x7, 0x8000, 0x2, 0x100, 0x0, 0x7, 0x95de, 0x2, 0x1, 0x2, 0xd432, 0x3ff, 0x8599, 0x0, 0x3ff, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x10080, 0x7, 0xe7e, 0x7, 0x5, 0x7, 0x9}, r2, 0x0, r3, 0x8) close(r7) ioctl$PERF_EVENT_IOC_DISABLE(r9, 0x2401, 0x1) r10 = gettid() ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f00000005c0)={r0}) ioctl$sock_kcm_SIOCKCMUNATTACH(r11, 0x89e1, &(0x7f0000000600)={r8}) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000640)) r12 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)={0x4, 0x7, 0x7f, 0x9787, 0x1c, 0xffffffffffffffff, 0x5}, 0x2c) recvmsg$kcm(r11, &(0x7f0000009440)={&(0x7f0000009300)=@can={0x0, 0x0}, 0x80, &(0x7f00000093c0)=[{&(0x7f0000009380)=""/16, 0x10}], 0x1, &(0x7f0000009400)=""/18, 0x12, 0x3bc1}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000009480)={0xf, 0x13, &(0x7f00000006c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [@ldst={0x3, 0x2, 0x1, 0x2, 0x7, 0xffffffff, 0x4}, @map={0x18, 0x0, 0x1, 0x0, r12}, @alu={0x7, 0x5, 0xf, 0x6, 0xe, 0x2, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4}, @jmp={0x5, 0x7a4c, 0x0, 0x3, 0x9, 0xffffffff, 0xfffffffffffffff0}, @alu={0x4, 0x20, 0x9, 0x9, 0x5, 0xfffffffe, 0x4}, @jmp={0x5, 0x81, 0x9, 0x7, 0x6, 0xfffffffe, 0xfffffffffffffff0}, @jmp={0x5, 0x3, 0x3, 0x0, 0x2, 0x2, 0xffffffffffffffff}], {0x95}}, &(0x7f0000000780)='GPL\x00', 0x4, 0x77, &(0x7f00000007c0)=""/119, 0x0, 0x1, [], r13}, 0x48) mount(&(0x7f0000009500)='./file0\x00', &(0x7f0000009540)='./file0\x00', &(0x7f0000009580)='cramfs\x00', 0x5020, &(0x7f00000095c0)="22f464f8fef2b95976576e903efe99229584aaf55fa0d91223905d4a68c0c7d18bf26de6fec0660b0c36945200da04f802d9059dd5f6d2f0eca450f4fdd46ed2b411588d802f0d1d02be65816332b2754d686e927593deb8ee3ed17a24d749db81290c33836bcc9b7d93084c53d0744e81deb8b83d9b23565d6db4cb746eb15b20f7b806f0b5a02676d90260a61b00e9ec0b4b8bf07d5f93b3feda8299586c3936f743c764205de278c25a6fff98") perf_event_open(&(0x7f00000096c0)={0x1, 0x70, 0x3, 0xa8e, 0x1000, 0xe57a, 0x0, 0x6, 0x2100b, 0x2, 0x9, 0xdb1b, 0xfffffffffffffffa, 0xa7f8, 0x3, 0x2, 0x800, 0x800, 0x2, 0x0, 0x3f, 0x3, 0x8000000000000, 0x3, 0x20, 0x6, 0x3, 0xfffffffffffff318, 0xffffffffffff0001, 0xfffffffffffffffe, 0x12, 0x1, 0x101, 0x8, 0x100, 0x1, 0x3, 0x8, 0x0, 0x3ff, 0x7, @perf_bp={&(0x7f0000009680), 0x3}, 0x9, 0x6, 0xfffffffffffffff7, 0x0, 0x0, 0x49, 0xfffffffffffff3b8}, r10, 0xe, r5, 0x8) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000009880)={r12, &(0x7f0000009740)="8ba447000764036f17624e623896639a3e2456b901aedcdb4221cea83c3b2c94575967a34ec104bbebeaf6a6b50494e6763f41056d2ca84f906fa48d72590e81334926fab48e", &(0x7f00000097c0)=""/170}, 0x18) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r4, 0x2405, r6) bpf$PROG_LOAD(0x5, &(0x7f00000099c0)={0x7, 0x4, &(0x7f00000098c0)=@raw=[@ldst={0x3, 0x3, 0x6, 0xd, 0x7, 0x26}, @ldst={0x0, 0x2, 0x0, 0xa, 0x0, 0x4, 0xffffffffffffffff}], &(0x7f0000009900)='GPL\x00', 0x5, 0x5d, &(0x7f0000009940)=""/93, 0x41f00, 0x1, [], r13}, 0x48) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000009b40)={r8, &(0x7f0000009a40)="402c0b8b20e0ae84bb", &(0x7f0000009a80)=""/178}, 0x18) [ 182.180549] EXT4-fs (sda1): Unrecognized mount option ")Å" or missing value [ 182.291961] EXT4-fs (sda1): Unrecognized mount option "ÿÿÿÿÿÿÿÿ" or missing value [ 182.334327] EXT4-fs (sda1): Unrecognized mount option ")Å" or missing value 2018/03/31 05:13:29 executing program 4: mount(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='ncpfs\x00', 0x80802, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x50, &(0x7f0000000700)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780)=r0, 0x4) mount(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='./file0\x00', &(0x7f00000006c0)='btrfs\x00', 0x89402, &(0x7f0000000900)="e196efa3cb748d2a6600968b76295ff919bc3877b18eb8d265a35493fcf34fdc965cd5c837d2389c6e2ec6088abe8daaa8ca23f9298fc94dc26874bc4d4567afea1ca0879cdf21e915005a83e96b1002af29091d2176abbb7fec088a67f2e1390f32adaf2f252d24510870f8df7186936f4d88957eb8fcda78b7383a7d24db701d524557ee7324433e70d9ffa185098325f9e657d3c29cf6a35843cb96780269db1c735d55938af5c60e1e4ba25928697277b0fdf356b62399b4c8826d09bfca7d6078c19b4995195ea814b1") ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0xffffffff) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6f3, 0x0, 0x6, 0x0, 0x0, 0xfffdffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x22, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000f6bffb)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000400)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000540)={r1, 0x50}, 0xfffffe74) close(r1) perf_event_open(&(0x7f0000348f88)={0x2, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x28, 0x2, 0x0, &(0x7f0000000000)={0x0}) mkdir(&(0x7f0000000100)='./file0\x00', 0x1000000000) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='selinuxfs\x00', 0x1000, &(0x7f0000000100)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='minix\x00', 0x10020, &(0x7f0000000240)) 2018/03/31 05:13:29 executing program 7: r0 = getpid() socketpair(0x3, 0x800, 0x1, &(0x7f0000002880)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffff0001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x1}, r0, 0xfffffffffffffffd, r1, 0x0) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0xc377) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x139, &(0x7f00000007c0), 0x0, &(0x7f0000000100)=""/63, 0x3f, 0xfffffffffffffffc}, 0xfffffffffffffffe) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000140)=0x6) r4 = gettid() mkdir(&(0x7f000075bff8)='./file0\x00', 0x0) socketpair(0x10, 0x800, 0x0, &(0x7f0000001100)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = perf_event_open(&(0x7f0000001340)={0x7, 0x70, 0xfffffffffffffff9, 0x9, 0x5, 0xff, 0x0, 0x7fff, 0x0, 0x1, 0x3, 0x6, 0x457, 0x3, 0x5, 0x3, 0x9, 0xb0, 0x40, 0x1, 0x1dc, 0x2, 0x0, 0x8001, 0x1, 0x0, 0x6, 0x4, 0x0, 0xff, 0x9, 0x7fff, 0x100000000, 0x8, 0x7, 0x6ad, 0xffffffffffffff14, 0x9, 0x0, 0x39, 0x4, @perf_config_ext={0x6, 0x80000000}, 0x400, 0xfffffffffffffff8, 0xffffffffffffff81, 0x3, 0x2, 0x6, 0xb75}, r4, 0x7, r6, 0x8) perf_event_open(&(0x7f0000002800)={0x3, 0x70, 0x1ff, 0x20fc3ce4, 0x1, 0x40, 0x0, 0x3, 0x18, 0x8, 0x30, 0x8, 0x400, 0x5, 0x2, 0xfffffffffffffffc, 0x10000, 0xffff, 0x1, 0x9949, 0x71d6, 0x6, 0x3, 0x0, 0x7, 0x8, 0x1, 0x1a, 0x101, 0x8, 0x3, 0x7, 0x1, 0x2, 0x401, 0x4, 0x2, 0x3, 0x0, 0x1, 0x1, @perf_config_ext={0x7, 0x5d3}, 0x1600, 0x74, 0x8, 0x7, 0x9, 0x7, 0x7}, r0, 0xe, r5, 0x1) recvmsg$kcm(r5, &(0x7f0000001300)={0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000001140)=""/131, 0x83}], 0x1, &(0x7f0000001240)=""/134, 0x86, 0xfff}, 0x2000) perf_event_open(&(0x7f000000a000)={0x1, 0x78, 0x0, 0x0, 0xb140, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x800000, 0x0, @perf_bp={&(0x7f0000000000), 0x800000}, 0x0, 0x20000000, 0x6, 0x400010, 0x100}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000002700)='./file2\x00', 0x3) bpf$OBJ_GET_PROG(0x7, &(0x7f0000002680)={&(0x7f0000002640)='./file1\x00', 0x0, 0x8}, 0x10) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)='sysv\x00', 0x0, &(0x7f0000000100)="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") mount(&(0x7f00009f8000)='./file0\x00', &(0x7f0000a3bff8)='./file0\x00', &(0x7f00000026c0)='nfs4\x00', 0x0, &(0x7f000000a000)) socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f0000000180)={0xffffffffffffffff}) perf_event_open(&(0x7f00000001c0)={0x3, 0x70, 0x4594dab1, 0x0, 0xc600000000000000, 0x1, 0x0, 0xd53f, 0x80008, 0x0, 0x8001, 0x44d1, 0x3, 0x1, 0x10001, 0x100, 0x40, 0x7, 0x15c000000000000, 0x0, 0x42, 0x7, 0x1, 0x8, 0x1, 0x7, 0x0, 0x81, 0x3, 0x5, 0x4, 0x1, 0x5, 0x7a52, 0xfffffffffffffff8, 0x1, 0x0, 0xffff, 0x0, 0x2, 0x1, @perf_config_ext={0x1ff}, 0x430, 0x0, 0x100000000, 0x1, 0x0, 0x890b, 0x80000000}, r4, 0x5, r3, 0x1) recvmsg$kcm(r6, &(0x7f0000002600)={0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000013c0)=""/113, 0x71}, {&(0x7f0000001440)=""/4096, 0x1000}, {&(0x7f0000002440)=""/15, 0xf}, {&(0x7f0000002480)=""/227, 0xe3}], 0x4, &(0x7f00000025c0)=""/61, 0x3d, 0x7fffffff}, 0x2001) perf_event_open(&(0x7f0000002780)={0x4, 0x70, 0x9, 0x3, 0x2, 0x0, 0x0, 0x5, 0x40000, 0x4, 0x3, 0x8, 0x0, 0x4, 0x7fffffff, 0x63, 0x3, 0x80, 0x9, 0x468e, 0x10000, 0x11, 0x5, 0xff, 0x20, 0x20, 0x2, 0x40, 0x400, 0x0, 0x5, 0x557, 0x9, 0x9e, 0x3ff, 0x1, 0x0, 0x1, 0x0, 0x3, 0x4, @perf_bp={&(0x7f0000002740)}, 0x0, 0x1, 0x4, 0x2, 0x401, 0x6, 0x1f}, r0, 0xc, r7, 0x1) socketpair$inet(0x2, 0x5, 0xffff, &(0x7f0000005000)) perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000100)}, 0x20) sendmsg$kcm(r5, &(0x7f0000004fc0)={&(0x7f00000028c0)=@pppol2tpin6={0x18, 0x1, {0x0, r8, 0x1, 0x2, 0x3, 0x4, {0xa, 0x4e20, 0x5, @mcast2={0xff, 0x2, [], 0x1}, 0x9}}}, 0x80, &(0x7f0000003d40)=[{&(0x7f0000002940)="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", 0x1000}, {&(0x7f0000003940)="6f8fc86efa8ccdc46dae3b24bffb6f31d1daab18e12cd412e68daf07a344da7c3fcc2cef1b0f192ab89b6298d1e95578f4224aeb0179615f41c74ff3c6124a74a3339c341fb5e33d0a858d3f107280af002304aacc7e8b987a5a2ef3a4db4c9265d62430b29b6962b318f6101d9b832fffe4d28df0bc93ff3685eff8ad22dd9afbe345c5af588431d79c25bf00bfd966b19deee7a6c1779213f3ecacaea48e50704ccfadfb56f0dc5b2af2d0a2606b5783bec258108efe4164c4083978c917c05ee06e5902797e3a4b4cf743381e55083a532c687589990eb72718d4be55e43d83aa8ae43bd38b29f341d9e39001bf", 0xef}, {&(0x7f0000003a40)="9b1eb9967ee623dd4f9f0b61d3026efba56ee17bdba47c0b0f55f2c0670f602481a0d1899f40572d3189be571cebada8801c30351a19928f1815cb988f9e23d9738c789e8eabc4ede3f59177bed3fea897c1c19cd601f6f8af1683eb024a8be5b882c67ad0af64a32436f567cea73ade2d831be80bafdb926c4578e1ca2f52b786c0fef3be76357be946c4881744a890abc6b4ae4952bf1ef217d70b838743ae640c9efaf3049f07a791", 0xaa}, {&(0x7f0000003b00)="0c10cfbeafb141bea440399a2d7d3386073f56db71d77bae2b3e5840bb72b3b2131c1f3594675a88a8a65ee4", 0x2c}, {&(0x7f0000003b40)="4f0cf195d4a98ec13fce0f0d61779247600167c2f374d6a82176fbb3574a49405d190523caf27613bd99772deed49e329b01f3d76b1799e9cecf9b7c21088bdb4e6303d61421f505e7d8e61542654ecb0b1f4a716f457be9bdbc8e9e604d0412c1a4226ca84e7ba37f5705ccf36800ed985a7fec59e936e7ebcaafff67cc2825323e52a026a4cbfe7e81fb3c63385f637ed840f1b91aad277d5348951d13df48f5f1d7ff781589466547bd1e95684274e8bcbc466e1ee476dc0e0de82fd0de8118aede9039cadb97c72e10a894876de6dde9", 0xd2}, {&(0x7f0000003c40)="2b774a992b54dd310f2494e7a1cbacbb10f3c2597ec04a3cba93c821220fd29aa52c00a28a16188ef17037cc904e36431b04072258171ca8dde4d4d58072ea8b90b8ef5471975340e5fd9d514820dbcd739163bd4fe3ed8dc74a37f6ef02a8569316c2230f148a538819c76fd4fc6d4a5b29daf1f95dcedce1e510c454187bc335f4904f08605721608e5c91042a7553acc372e35f46569c568765d9d0168860f053d85fdf52e22ec03442e37d9a1aa997f507ef7e69b0d2dcb76c34870640c19ccb13ad7a59267747728e5123e5e8a0153bbb7fb01d939fc24e9c9da012dd85a8f932ba7b7f614fadad7e0e0c775adf20e2ab5c146ab9", 0xf7}], 0x6, &(0x7f0000003dc0)=[{0x1010, 0x10e, 0x9, "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"}, {0x20, 0xff, 0x7, "a5cc6260c81c1b1ed0c6"}, {0xf8, 0x118, 0x1, "93ef84b93820ca88cf7bd35815e0da6674ebb10ea1a71a49f5668fd2556cee4ebdae93b273ee9f137971dcf59a677da236398fc4590fee28ab64b8c5debf62a60a250bf64cd5dfe3328f04c347727e58ddd4785074e931eab16a483bd2cbdf3265ba97b0a73cfd27122f4209b3537816a66c259277158c1271c8148a7bb5cc29fb140a77e0977e99a951c5e67cf1317ccd0181523c9813b4acad8997313225420b81b0cb2104d41f4e5aae2df9d3fafefc12c37b9adc621733956e2bd71f5064314371c3e1b734257f42c2cb95a4827fe8233f3cf905160ae55528015ee26d0ea8"}, {0xa0, 0x11f, 0x8000, "d631a2864c7259fe192424897c42d8b6e7dad3a63515c6a75b061372c750dd2af890da4fabc7ef193760a8e750ea5c87e1e1a0b40fb14175c4cfc2807d9996e7b502e11aeb5383baefa5f737457bc4379b6a2909c7ba00e22c20d37c1629226411e481b745bc31d32e9c085411d2cd16a363e84e5265a1743a7c708248064caf6c7fb30f60598faaff"}], 0x11c8, 0x800}, 0x40) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000001140)={0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) 2018/03/31 05:13:29 executing program 6 (fault-call:17 fault-nth:41): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x0, 0x101, 0x4, 0x0, 0x1, r0, 0x0, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r2 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)={0xffffffffffffffff}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r2, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x0, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0", 0xc9}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000280)={&(0x7f0000000680)='./file0\x00'}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r1}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r3) gettid() close(0xffffffffffffffff) 2018/03/31 05:13:29 executing program 5: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x3c, 0xed0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x80) r1 = getpid() socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000500)) r2 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3ff, 0x3, 0x552, 0x5, 0x0, 0x200, 0x5, 0x7, 0x2, 0x6, 0x4, 0x2, 0x2, 0x6, 0x38cfc777, 0x80, 0x2, 0x0, 0x9, 0x80, 0x4, 0x9, 0x6, 0x2, 0xdf, 0x2, 0x10000, 0x9, 0xfffe000, 0x1, 0x3f, 0x9, 0x4fe, 0x12b, 0x0, 0xb, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x1f}, 0x1004, 0x3, 0x40, 0x5, 0xfffffffffffffffe, 0x6, 0xd52}, r1, 0xa, r0, 0x1) mkdir(&(0x7f0000000040)='./file0\x00', 0x18) mkdir(&(0x7f0000000100)='./file0/file0\x00', 0x0) socketpair(0x5, 0x5, 0x400, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x2, 0x4, &(0x7f00000001c0)=@raw=[@generic={0x0, 0x6, 0xffff, 0x1}, @map={0x18, 0x6, 0x1, 0x0, r3}], &(0x7f0000000200)='GPL\x00', 0xba36, 0x62, &(0x7f0000000280)=""/98, 0x40f00}, 0x48) mount(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='affs\x00', 0x400, 0x0) perf_event_open(&(0x7f0000000480)={0x3, 0x70, 0x3ff, 0x7, 0x800, 0x4, 0x0, 0x101, 0x4000, 0x8, 0x8001, 0x800, 0xffffffff80000000, 0x6, 0x7, 0x6, 0xff, 0x8, 0xbb4, 0x7, 0x3, 0xad3, 0x8, 0x6, 0x6, 0x1, 0x6, 0x7fffffff, 0x42, 0x9, 0xffffffffffffff00, 0x7, 0x5, 0x2, 0x1, 0x90af, 0x7345, 0x8001, 0x0, 0x9, 0x7, @perf_bp={&(0x7f0000000440), 0xf}, 0x0, 0xffffffff, 0x5, 0x4, 0xc8, 0x8, 0x4}, r1, 0x6, r2, 0x0) 2018/03/31 05:13:29 executing program 3: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x401}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = getpid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x6, 0xcb7, 0x4, 0x4, 0x0, 0x4, 0x84080, 0x4, 0x800, 0x10000, 0x1, 0x2218, 0x8001, 0x0, 0x4, 0x40, 0x80000001, 0x7, 0x1, 0x7fffffff, 0x3, 0xa0a5, 0xfffffffffffffffc, 0xb, 0x100, 0xfffffffffffffffe, 0x7, 0xffffffff, 0x3, 0x0, 0x8, 0xffffffff, 0x5, 0x3, 0x0, 0x5, 0x0, 0x80000000, 0x4, @perf_bp={&(0x7f0000000000), 0xc}, 0x1, 0x8, 0xffffffff, 0x3, 0x7f}, r1, 0xf, r0, 0xb) 2018/03/31 05:13:29 executing program 2: socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000040)={0x7, 0x70, 0x1, 0xaabc, 0x2, 0x2, 0x0, 0xec, 0x4800, 0x1, 0x3a6b72c9, 0xffffffffffff8000, 0xfff, 0x7, 0x2, 0x7, 0xff, 0x1, 0x2, 0x9, 0x1, 0x0, 0x5, 0x75, 0x2, 0x7, 0x8, 0x4, 0x0, 0xdbce, 0xffff, 0xfaf, 0x1, 0xe7, 0xd0eb, 0x28a5, 0x9, 0x4, 0x0, 0x7, 0x2, @perf_config_ext={0x1, 0x8000}, 0x489, 0x6, 0xff, 0x0, 0x9d, 0x8, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f00000000c0)={0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000140)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r2 = getpid() r3 = perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x8, 0x4, 0x4, 0x1, 0x0, 0x401, 0x100, 0x7, 0xcfc0, 0x7, 0x0, 0x7, 0x30, 0x7, 0x7, 0xfff, 0x7, 0x9, 0xff, 0x9, 0xf, 0x0, 0x3, 0x100000000, 0x3, 0x8, 0xffff, 0x2, 0x3, 0xff, 0x6f, 0x3, 0x5, 0x0, 0x81, 0x0, 0x0, 0x9, 0x1, @perf_bp={&(0x7f0000000180), 0x1}, 0x11815, 0x9, 0x1, 0x1, 0x101, 0x5, 0x1e892fee}, r2, 0x9, r1, 0x1) r4 = perf_event_open(&(0x7f0000000280)={0x5, 0x70, 0xe00000000000, 0x9, 0x800, 0x6, 0x0, 0x7ff, 0x10200, 0xb, 0xe3, 0x5, 0x1, 0x4, 0x9b0f, 0x1f8a, 0x401, 0x1, 0xe975, 0x7, 0x437, 0x9, 0x7f, 0x20, 0x1, 0x2, 0x3, 0x5, 0x200, 0x1, 0x8, 0x401, 0x401, 0x2, 0x8, 0xfff, 0xf3c8, 0xf23, 0x0, 0x7fffffff, 0x0, @perf_bp={&(0x7f0000000240), 0x9}, 0x828, 0x3, 0x5, 0x1, 0x0, 0xc37, 0x6}, r2, 0x4, r1, 0x2) r5 = perf_event_open(&(0x7f0000000300)={0x4, 0x70, 0xff, 0x3, 0x7f, 0x7, 0x0, 0x40, 0x4a240, 0x2, 0xffffffffffffcc27, 0xb8, 0x2, 0x7, 0x9, 0x800, 0x3, 0x7d4d, 0xf7, 0xfffffffffffffffa, 0x9, 0x4, 0x3, 0x90be, 0x9, 0xfffffffffffffffc, 0x6, 0x3ff, 0xab6b, 0x8001, 0x5, 0x2, 0x9, 0x732, 0x400, 0x55000000000, 0x1ff, 0x6, 0x0, 0x0, 0x2, @perf_config_ext={0x6, 0xffffffff}, 0x40, 0x80000001, 0x7fff, 0x2, 0x1, 0x6, 0x5}, r2, 0xf, r4, 0xa) r6 = perf_event_open(&(0x7f00000003c0)={0x7, 0x70, 0xc87d, 0x6, 0x5, 0x80000001, 0x0, 0x3, 0x1, 0xb, 0xffffffff, 0x9, 0x584, 0x31b, 0x7, 0x2, 0x3, 0x544, 0x100000001, 0x9, 0x1, 0x100, 0x3, 0x1, 0x7, 0x0, 0x7, 0x5, 0xbb, 0x40, 0x7, 0x8, 0x81, 0xc5a, 0x0, 0x7, 0x1f, 0x815, 0x0, 0xffff, 0x2, @perf_bp={&(0x7f0000000380), 0x8}, 0x4, 0x5, 0xc95, 0x0, 0x7ff, 0x7b02, 0x7}, r2, 0x10, r1, 0xb) ioctl$PERF_EVENT_IOC_DISABLE(r3, 0x2401, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0x4) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = perf_event_open(&(0x7f0000000480)={0x7, 0x70, 0x7, 0xdbff, 0x3, 0x3f, 0x0, 0x8, 0x0, 0xc, 0x8, 0x0, 0xf43, 0x101, 0x6, 0x5, 0x6, 0x9, 0x200, 0xfffffffffffffffd, 0x4, 0x6, 0x6e, 0x20, 0x1b3, 0x1fe, 0x7ff, 0x3, 0x8000, 0x5, 0x0, 0x0, 0x0, 0x5, 0x22d2, 0x401, 0x68, 0xa1ce, 0x0, 0x4, 0x0, @perf_config_ext={0x2fb, 0x4}, 0x2000, 0xd33, 0x6, 0x697c4c7d75b7b6da, 0x171f, 0x9, 0x9}, r2, 0x6, r5, 0x1) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x9, 0x6, 0x101, 0x8, 0x0, 0x200, 0x2000, 0xf, 0x0, 0x5, 0x6, 0x3, 0x2, 0x0, 0x8001, 0x8, 0x3, 0x5, 0x17, 0x7, 0x4, 0x400, 0xffffffff, 0x7, 0x8000, 0x2, 0x100, 0x0, 0x7, 0x95de, 0x2, 0x1, 0x2, 0xd432, 0x3ff, 0x8599, 0x0, 0x3ff, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x10080, 0x7, 0xe7e, 0x7, 0x5, 0x7, 0x9}, r2, 0x0, r3, 0x8) close(r7) ioctl$PERF_EVENT_IOC_DISABLE(r9, 0x2401, 0x1) r10 = gettid() ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f00000005c0)={r0}) ioctl$sock_kcm_SIOCKCMUNATTACH(r11, 0x89e1, &(0x7f0000000600)={r8}) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000640)) r12 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)={0x4, 0x7, 0x7f, 0x9787, 0x1c, 0xffffffffffffffff, 0x5}, 0x2c) recvmsg$kcm(r11, &(0x7f0000009440)={&(0x7f0000009300)=@can={0x0, 0x0}, 0x80, &(0x7f00000093c0)=[{&(0x7f0000009380)=""/16, 0x10}], 0x1, &(0x7f0000009400)=""/18, 0x12, 0x3bc1}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000009480)={0xf, 0x13, &(0x7f00000006c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [@ldst={0x3, 0x2, 0x1, 0x2, 0x7, 0xffffffff, 0x4}, @map={0x18, 0x0, 0x1, 0x0, r12}, @alu={0x7, 0x5, 0xf, 0x6, 0xe, 0x2, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4}, @jmp={0x5, 0x7a4c, 0x0, 0x3, 0x9, 0xffffffff, 0xfffffffffffffff0}, @alu={0x4, 0x20, 0x9, 0x9, 0x5, 0xfffffffe, 0x4}, @jmp={0x5, 0x81, 0x9, 0x7, 0x6, 0xfffffffe, 0xfffffffffffffff0}, @jmp={0x5, 0x3, 0x3, 0x0, 0x2, 0x2, 0xffffffffffffffff}], {0x95}}, &(0x7f0000000780)='GPL\x00', 0x4, 0x77, &(0x7f00000007c0)=""/119, 0x0, 0x1, [], r13}, 0x48) mount(&(0x7f0000009500)='./file0\x00', &(0x7f0000009540)='./file0\x00', &(0x7f0000009580)='cramfs\x00', 0x5020, &(0x7f00000095c0)="22f464f8fef2b95976576e903efe99229584aaf55fa0d91223905d4a68c0c7d18bf26de6fec0660b0c36945200da04f802d9059dd5f6d2f0eca450f4fdd46ed2b411588d802f0d1d02be65816332b2754d686e927593deb8ee3ed17a24d749db81290c33836bcc9b7d93084c53d0744e81deb8b83d9b23565d6db4cb746eb15b20f7b806f0b5a02676d90260a61b00e9ec0b4b8bf07d5f93b3feda8299586c3936f743c764205de278c25a6fff98") perf_event_open(&(0x7f00000096c0)={0x1, 0x70, 0x3, 0xa8e, 0x1000, 0xe57a, 0x0, 0x6, 0x2100b, 0x2, 0x9, 0xdb1b, 0xfffffffffffffffa, 0xa7f8, 0x3, 0x2, 0x800, 0x800, 0x2, 0x0, 0x3f, 0x3, 0x8000000000000, 0x3, 0x20, 0x6, 0x3, 0xfffffffffffff318, 0xffffffffffff0001, 0xfffffffffffffffe, 0x12, 0x1, 0x101, 0x8, 0x100, 0x1, 0x3, 0x8, 0x0, 0x3ff, 0x7, @perf_bp={&(0x7f0000009680), 0x3}, 0x9, 0x6, 0xfffffffffffffff7, 0x0, 0x0, 0x49, 0xfffffffffffff3b8}, r10, 0xe, r5, 0x8) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000009880)={r12, &(0x7f0000009740)="8ba447000764036f17624e623896639a3e2456b901aedcdb4221cea83c3b2c94575967a34ec104bbebeaf6a6b50494e6763f41056d2ca84f906fa48d72590e81334926fab48e", &(0x7f00000097c0)=""/170}, 0x18) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r4, 0x2405, r6) bpf$PROG_LOAD(0x5, &(0x7f00000099c0)={0x7, 0x4, &(0x7f00000098c0)=@raw=[@ldst={0x3, 0x3, 0x6, 0xd, 0x7, 0x26}, @ldst={0x0, 0x2, 0x0, 0xa, 0x0, 0x4, 0xffffffffffffffff}], &(0x7f0000009900)='GPL\x00', 0x5, 0x5d, &(0x7f0000009940)=""/93, 0x41f00, 0x1, [], r13}, 0x48) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000009b40)={r8, &(0x7f0000009a40)="402c0b8b20e0ae84bb", &(0x7f0000009a80)=""/178}, 0x18) 2018/03/31 05:13:29 executing program 0: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)={0xffffffffffffffff}) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x10, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000002280)=[{&(0x7f0000002080)="6473095618d49f3c876dddc158d28754747e28b08806c762f27ac95d98710bb615d8009c580df2fdde0481d1323e6ad33521d552220c1c17484bfb499e7b6f56bfed1f0462fd0d5fd7d5f18bbc210a874943ed8ed76a124441c3b9e9c2286812efde7b664e1a20dbc5796e0b1002b7573a253b7782eaa71803b1f75c9f5033ff52798ed7de1ecef2037287c240b1a0cc54f3ecc9ec70ce9b5df747dc7657a24d5faa258e4f0c9050b1bd4e8d961db61f1dfd99fcf5161c4e9d2abc4f5264b49ef61ba187b4caddd938d58245a4e8de1c522c42", 0x47a}, {&(0x7f00000022c0)="12c400c9992a8cf6b5442877e06d2d1c6a4a49e5fcb3cf975598fdeb2ef0088c76a6a3b9a2e6565130dde09cad441437dbd52573d576ad44e91ee5603a40985f38c0c07e11bbfef75dc1551f29c320f62f24e9382e9d133679c9a12f2533c0b199aa055a83b7ebb52989bfff20a0d1c5aa7bcbd87619b8868973fdabde1536f22262951b4a419c517365404ede0cf1e523aacb0fffbd50a28cf30f9616127dd08c66fa9290453062c0908e72ad387cf2fe9223a6ccf7f934b791a831ed97c1f32c374c33f1818b", 0xc7}, {&(0x7f0000001c40)="605f22662ad1ad0ca162d88194e8948cef29fbc5d1ac05b7024cbc8b59b0cccf14827b89", 0x24}, {&(0x7f0000001d00)="6608b2c0d562c6826ea7619bd3e7469b747ff98618a03635f802a6", 0x1b}], 0x4, &(0x7f0000001800), 0x0, 0x20000080}, 0x40) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000001a00)) getpid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={r1, 0x50, &(0x7f0000000000)={0x0, 0x0}}, 0xffffffffffffff34) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)=r2, 0x4) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001d80)) mkdir(&(0x7f0000002180)='./file0/file0\x00', 0x142) bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001, 0x1}, 0x2c) socketpair(0x8, 0x2, 0x0, &(0x7f0000001d40)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001bc0)={0x0, 0x70, 0x0, 0x22, 0x2, 0xf5, 0x0, 0x1, 0x20008, 0x4, 0x9, 0x9, 0x1, 0x6, 0x401, 0x7, 0x51, 0x0, 0x5, 0x1, 0x7, 0x6, 0x10001, 0x0, 0x100, 0x7fff, 0x0, 0x3ff, 0x0, 0xd643, 0xffffffff, 0x0, 0xf2f3, 0x9, 0x8d, 0x7, 0x1ff, 0x5, 0x0, 0x7fff, 0x6, @perf_config_ext={0xffffffff00000001, 0x1}, 0x1000, 0x0, 0x5, 0x6, 0x4, 0x80000000, 0xffffffffffffffc4}, 0x0, 0xc, 0xffffffffffffffff, 0x1) r5 = gettid() perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x3, 0xc85, 0x0, 0x1, 0x0, 0x401, 0x0, 0x1, 0x712000000000000, 0x7, 0x56d29a0f, 0x1, 0x0, 0x2, 0x20, 0x7, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x9, 0x5, 0x1, 0x3e69b47c, 0x5, 0x7fff, 0x1, 0x5, 0x4f, 0x1000, 0x0, 0x4, 0x0, 0x0, 0x4, 0xffffffff, 0x0, 0x2, 0x2, @perf_config_ext={0x0, 0x8}, 0x20200, 0xf88, 0x0, 0x1, 0x92d5, 0x1, 0x5}, r5, 0xd, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000280)=r4, 0x27) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000080)='./file0\x00', r4}, 0xb) perf_event_open(&(0x7f0000001c80)={0x2, 0x70, 0x3ab, 0x3, 0xbf7e, 0xffffffff, 0x0, 0x0, 0x4000, 0x4, 0x2, 0xec, 0x3ff, 0x8, 0xba, 0x973, 0x6, 0x433, 0x6, 0x0, 0x3, 0x5, 0x1, 0x4, 0x7, 0x5, 0x20, 0xa593, 0x4, 0x1000, 0x4722, 0x3, 0x40, 0xdd, 0x20, 0x1, 0x1, 0x6, 0x0, 0x2, 0x0, @perf_config_ext={0x9}, 0x10000, 0xfffffffffffffffb, 0x401, 0x7, 0x3, 0x9, 0x3}, r5, 0xf, r4, 0x8) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00', 0x0, 0x10}, 0x10) perf_event_open(&(0x7f0000000480)={0x1c218abbd1b2c600, 0x70, 0x5, 0x0, 0xe9d, 0x9, 0x0, 0x80000001, 0x1408, 0x0, 0x10001, 0x1ff, 0xfff, 0x80000000, 0x5, 0x3, 0x81, 0x6, 0x9151, 0x40, 0x2, 0xfda, 0x7, 0x3, 0x1, 0x100000000, 0x4, 0x2, 0xffffffffffffe17f, 0x0, 0x1, 0x3, 0x1, 0x6, 0x7, 0x2, 0x3, 0x7fff, 0x0, 0xfffffffffffffffb, 0x1, @perf_bp={&(0x7f0000000440), 0xf}, 0x1000, 0x1000, 0xb36, 0x7, 0x5f9, 0x8a, 0x40}, r5, 0xd, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) recvmsg$kcm(r4, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f0000000980)=""/4096, 0x1000}, {&(0x7f0000001980)=""/59, 0x3b}, {&(0x7f00000019c0)=""/66, 0x42}], 0x3, &(0x7f0000001a80)=""/195, 0xc3, 0x2}, 0x2102) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x1) sendmsg$kcm(r4, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000001fc0)=[{&(0x7f00000003c0)="fa7674aa63c283e047b5e7fdcd7f70f53132974b74d9b6a30ff0086f924d7ec8fbedb7743b87b53368dd", 0x2a}, {&(0x7f0000000400)="31b3", 0x2}, {&(0x7f0000000500)="8a4450997f5d52ed41d97c2e490e0b67755819422b091c78a03ffbe7732bac0a3fc3e07a09c6e9f48f8f3020d182a369e7dad12e2d6fc46667ffe818c80b2d84fc972ae71bb2be89614c38427d438cc42a43", 0x52}, {&(0x7f0000000580)="91899c1388a0de8fcd41094334429479a30d258cfe4ebc927ef6169f", 0x1c}, {&(0x7f00000005c0)="857a9a95aab414f92709263f24fb446cdbaab98aa6acca1af4a543f687cfdb356a15b73043fd0ebe", 0x28}, {&(0x7f0000000600)="ed5efb30b961704a3e3e886038904014b65f88468bd93598f59b181944bcb804b1d1e67cf950ea010c104bcaa8a08cdbb8f1f950ed23cc39b0499b", 0x3b}, {&(0x7f0000000740)="3b064855f28988e284f52d6f5de48b9b2ac1d828b350165bdaa440f06a7165dc474d9e67dcf57620378a54a54a0680cbbe794b93c6eeb9ff30c9a49391770dc0927360884302fd7181e2e0b62054a895d6656569d9ee15f3f3", 0x59}, {&(0x7f00000007c0)="4be05b74b7e64615dae519d39de87cb8793d50b620b2791e48cf0b0e8b466953f6f8a78f6f81028b7f37f29bb16bddc22dc719dd57cbff687c2c5712357067f580381c2e73fdc792e86ce5b437f1beb17d22e5214eec27c29d3048611bbf026f17b2c1fea09eda52ec4a317c75240b88c0922aca05677d1322a74abadf0fcba09ba1cf6e80587a973e7e78ed6844caf111be57b19ead1df6a29a84977ca0852e24102f7cc42586b0fc5758cdff2793a973cebd023174a0781f4359df0b31693d05680d7097038a14a9559258e6b423e127d4ca475bdffeed6e963d93f91e2483f259f4012c3adf94b4163963aa2e4672d03e4226", 0xf4}, {&(0x7f0000001e00)="a1d9d3e36efc74e52c45a239009b5d7cd432e4dacf1f488a3f3ece01846b65bf56d96359ae14c0545db83f2f70b9934db5aad22a219553dbdfe8b048e6e969ebb04b9a8b9f68f4cbae09cc493fb91c53b27394293697d616eb71bc6a2dabbea31e99158cd5cc8e081feb2042894d203604efcdcbb445f845a61d22d63c224ad8e05895780f5bc015419c125da5b26ae4f64a542ceb7ffc73886faec02dcdbd3debf88e551e2716eebf6587bc736caac5b74335c795c904574b3fb8cbbdfa97b9cacaa684263302693d4bd9b7cbcbc157b08dd61b7313407b7ca77c8dc84601d8184074329b1e321b4d197d40ed0e0313", 0xf0}, {&(0x7f00000008c0)="be551237e4e41f30933d249da1b8159786ae6627867767f6bc6bda9b623e38f7cb5c6c50816a129ba387c49bc61e55fde635f02afaedcb2fa83f6760b3b35dbdb558cfce4c4aa9030245b03c770d994871c1e321c51d80737a2755a67bdd4c398f9c8810ead6ab642920f2d59081b91c4c823e2a8a9f0a365117dfe49105b9f87e2e5f73b50bc1992971f8a90099554dbed8d9408b61999d16ca65aba44d63608f8814c1c79dd76f632c3afd7e6a4c", 0xaf}], 0xa}, 0x4) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fusectl\x00', 0x4000, 0x0) mount(&(0x7f0000000680)='./file0/file1\x00', &(0x7f00000006c0)='./file1\x00', &(0x7f0000000700)='aufs\x00', 0x8, &(0x7f0000001f00)="62314d6edd70ce2d8fe1794b762352023f3716a622508def3e247dac3f72e9398d7cf3f821e44d736f95fb02b757ea17f7cfcf09bb039e8a278c25b949c176cfd98b2f1a759124b5593ae7d2c19b3da5f3e5529e472732d6e0df3ac6608b25618c9e3ae9847d99caee1e0d194548cd7c6e46729486bc83aa733fc440c68179f45a9fb7f7de5cf73235cabc2e3630f7") 2018/03/31 05:13:29 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xe, 0x1, 0x4, 0x1, 0x10}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000001140)={r0, &(0x7f00000000c0), &(0x7f00000010c0)=""/113}, 0x18) 2018/03/31 05:13:29 executing program 3: r0 = gettid() r1 = perf_event_open(&(0x7f0000000400)={0x3, 0x70, 0x6, 0x3f, 0x0, 0x8, 0x0, 0x8, 0x20000, 0x0, 0x3, 0x7ff000000000000, 0x3, 0x3f, 0x1, 0x3, 0x0, 0x8001, 0x9, 0x7f, 0x8, 0x0, 0x7f, 0x8, 0x7, 0x5, 0x2, 0x2, 0x3, 0x7fffffff, 0x80000001, 0x7, 0x0, 0x7, 0x1, 0x20, 0x10000, 0x868, 0x0, 0x7fff, 0x6, @perf_bp={&(0x7f0000000300), 0x2}, 0x2000, 0x4, 0xbf12, 0x3, 0x9, 0x1, 0x90f}, 0x0, 0xb, 0xffffffffffffff9c, 0x1) perf_event_open(&(0x7f0000000380)={0x5, 0x70, 0x1, 0xabb6, 0xfffffffffffffffa, 0x5, 0x0, 0x5, 0x841, 0x1, 0x2aa2c782, 0x9257, 0x6, 0xfffffffffffffffb, 0x3, 0x5, 0x100000000, 0xfffffffffffffff9, 0x0, 0x26b, 0x6, 0x9b5, 0x101, 0x1f, 0xfffffffffffffb6d, 0x52, 0xfffffffffffffffc, 0x3, 0x2, 0x7e77, 0x7230f05, 0x8, 0x800, 0x8001, 0x91, 0x4, 0x624, 0x7, 0x0, 0x3, 0x1, @perf_bp={&(0x7f00000002c0), 0xb}, 0x0, 0xfff, 0x7, 0x5, 0x1, 0x9b, 0x4}, r0, 0x7, r1, 0x2) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000480)={0xb, 0x40, 0xa9, 0x8, 0x1, 0x1, 0x1}, 0xffffffffffffff16) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x200, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x2, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r2}, @call={0x85, 0x0, 0x0, 0xc}], &(0x7f0000000140)='GPL\x00', 0x41, 0xa7, &(0x7f00000004c0)=""/167, 0x41000}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x1000, 0x6, 0x2, 0x0, r2}, 0x2c) 2018/03/31 05:13:29 executing program 2: socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000040)={0x7, 0x70, 0x1, 0xaabc, 0x2, 0x2, 0x0, 0xec, 0x4800, 0x1, 0x3a6b72c9, 0xffffffffffff8000, 0xfff, 0x7, 0x2, 0x7, 0xff, 0x1, 0x2, 0x9, 0x1, 0x0, 0x5, 0x75, 0x2, 0x7, 0x8, 0x4, 0x0, 0xdbce, 0xffff, 0xfaf, 0x1, 0xe7, 0xd0eb, 0x28a5, 0x9, 0x4, 0x0, 0x7, 0x2, @perf_config_ext={0x1, 0x8000}, 0x489, 0x6, 0xff, 0x0, 0x9d, 0x8, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f00000000c0)={0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000140)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r2 = getpid() r3 = perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x8, 0x4, 0x4, 0x1, 0x0, 0x401, 0x100, 0x7, 0xcfc0, 0x7, 0x0, 0x7, 0x30, 0x7, 0x7, 0xfff, 0x7, 0x9, 0xff, 0x9, 0xf, 0x0, 0x3, 0x100000000, 0x3, 0x8, 0xffff, 0x2, 0x3, 0xff, 0x6f, 0x3, 0x5, 0x0, 0x81, 0x0, 0x0, 0x9, 0x1, @perf_bp={&(0x7f0000000180), 0x1}, 0x11815, 0x9, 0x1, 0x1, 0x101, 0x5, 0x1e892fee}, r2, 0x9, r1, 0x1) r4 = perf_event_open(&(0x7f0000000280)={0x5, 0x70, 0xe00000000000, 0x9, 0x800, 0x6, 0x0, 0x7ff, 0x10200, 0xb, 0xe3, 0x5, 0x1, 0x4, 0x9b0f, 0x1f8a, 0x401, 0x1, 0xe975, 0x7, 0x437, 0x9, 0x7f, 0x20, 0x1, 0x2, 0x3, 0x5, 0x200, 0x1, 0x8, 0x401, 0x401, 0x2, 0x8, 0xfff, 0xf3c8, 0xf23, 0x0, 0x7fffffff, 0x0, @perf_bp={&(0x7f0000000240), 0x9}, 0x828, 0x3, 0x5, 0x1, 0x0, 0xc37, 0x6}, r2, 0x4, r1, 0x2) r5 = perf_event_open(&(0x7f0000000300)={0x4, 0x70, 0xff, 0x3, 0x7f, 0x7, 0x0, 0x40, 0x4a240, 0x2, 0xffffffffffffcc27, 0xb8, 0x2, 0x7, 0x9, 0x800, 0x3, 0x7d4d, 0xf7, 0xfffffffffffffffa, 0x9, 0x4, 0x3, 0x90be, 0x9, 0xfffffffffffffffc, 0x6, 0x3ff, 0xab6b, 0x8001, 0x5, 0x2, 0x9, 0x732, 0x400, 0x55000000000, 0x1ff, 0x6, 0x0, 0x0, 0x2, @perf_config_ext={0x6, 0xffffffff}, 0x40, 0x80000001, 0x7fff, 0x2, 0x1, 0x6, 0x5}, r2, 0xf, r4, 0xa) r6 = perf_event_open(&(0x7f00000003c0)={0x7, 0x70, 0xc87d, 0x6, 0x5, 0x80000001, 0x0, 0x3, 0x1, 0xb, 0xffffffff, 0x9, 0x584, 0x31b, 0x7, 0x2, 0x3, 0x544, 0x100000001, 0x9, 0x1, 0x100, 0x3, 0x1, 0x7, 0x0, 0x7, 0x5, 0xbb, 0x40, 0x7, 0x8, 0x81, 0xc5a, 0x0, 0x7, 0x1f, 0x815, 0x0, 0xffff, 0x2, @perf_bp={&(0x7f0000000380), 0x8}, 0x4, 0x5, 0xc95, 0x0, 0x7ff, 0x7b02, 0x7}, r2, 0x10, r1, 0xb) ioctl$PERF_EVENT_IOC_DISABLE(r3, 0x2401, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0x4) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = perf_event_open(&(0x7f0000000480)={0x7, 0x70, 0x7, 0xdbff, 0x3, 0x3f, 0x0, 0x8, 0x0, 0xc, 0x8, 0x0, 0xf43, 0x101, 0x6, 0x5, 0x6, 0x9, 0x200, 0xfffffffffffffffd, 0x4, 0x6, 0x6e, 0x20, 0x1b3, 0x1fe, 0x7ff, 0x3, 0x8000, 0x5, 0x0, 0x0, 0x0, 0x5, 0x22d2, 0x401, 0x68, 0xa1ce, 0x0, 0x4, 0x0, @perf_config_ext={0x2fb, 0x4}, 0x2000, 0xd33, 0x6, 0x697c4c7d75b7b6da, 0x171f, 0x9, 0x9}, r2, 0x6, r5, 0x1) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x9, 0x6, 0x101, 0x8, 0x0, 0x200, 0x2000, 0xf, 0x0, 0x5, 0x6, 0x3, 0x2, 0x0, 0x8001, 0x8, 0x3, 0x5, 0x17, 0x7, 0x4, 0x400, 0xffffffff, 0x7, 0x8000, 0x2, 0x100, 0x0, 0x7, 0x95de, 0x2, 0x1, 0x2, 0xd432, 0x3ff, 0x8599, 0x0, 0x3ff, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x10080, 0x7, 0xe7e, 0x7, 0x5, 0x7, 0x9}, r2, 0x0, r3, 0x8) close(r7) ioctl$PERF_EVENT_IOC_DISABLE(r9, 0x2401, 0x1) r10 = gettid() ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f00000005c0)={r0}) ioctl$sock_kcm_SIOCKCMUNATTACH(r11, 0x89e1, &(0x7f0000000600)={r8}) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000640)) r12 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)={0x4, 0x7, 0x7f, 0x9787, 0x1c, 0xffffffffffffffff, 0x5}, 0x2c) recvmsg$kcm(r11, &(0x7f0000009440)={&(0x7f0000009300)=@can={0x0, 0x0}, 0x80, &(0x7f00000093c0)=[{&(0x7f0000009380)=""/16, 0x10}], 0x1, &(0x7f0000009400)=""/18, 0x12, 0x3bc1}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000009480)={0xf, 0x13, &(0x7f00000006c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [@ldst={0x3, 0x2, 0x1, 0x2, 0x7, 0xffffffff, 0x4}, @map={0x18, 0x0, 0x1, 0x0, r12}, @alu={0x7, 0x5, 0xf, 0x6, 0xe, 0x2, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4}, @jmp={0x5, 0x7a4c, 0x0, 0x3, 0x9, 0xffffffff, 0xfffffffffffffff0}, @alu={0x4, 0x20, 0x9, 0x9, 0x5, 0xfffffffe, 0x4}, @jmp={0x5, 0x81, 0x9, 0x7, 0x6, 0xfffffffe, 0xfffffffffffffff0}, @jmp={0x5, 0x3, 0x3, 0x0, 0x2, 0x2, 0xffffffffffffffff}], {0x95}}, &(0x7f0000000780)='GPL\x00', 0x4, 0x77, &(0x7f00000007c0)=""/119, 0x0, 0x1, [], r13}, 0x48) mount(&(0x7f0000009500)='./file0\x00', &(0x7f0000009540)='./file0\x00', &(0x7f0000009580)='cramfs\x00', 0x5020, &(0x7f00000095c0)="22f464f8fef2b95976576e903efe99229584aaf55fa0d91223905d4a68c0c7d18bf26de6fec0660b0c36945200da04f802d9059dd5f6d2f0eca450f4fdd46ed2b411588d802f0d1d02be65816332b2754d686e927593deb8ee3ed17a24d749db81290c33836bcc9b7d93084c53d0744e81deb8b83d9b23565d6db4cb746eb15b20f7b806f0b5a02676d90260a61b00e9ec0b4b8bf07d5f93b3feda8299586c3936f743c764205de278c25a6fff98") perf_event_open(&(0x7f00000096c0)={0x1, 0x70, 0x3, 0xa8e, 0x1000, 0xe57a, 0x0, 0x6, 0x2100b, 0x2, 0x9, 0xdb1b, 0xfffffffffffffffa, 0xa7f8, 0x3, 0x2, 0x800, 0x800, 0x2, 0x0, 0x3f, 0x3, 0x8000000000000, 0x3, 0x20, 0x6, 0x3, 0xfffffffffffff318, 0xffffffffffff0001, 0xfffffffffffffffe, 0x12, 0x1, 0x101, 0x8, 0x100, 0x1, 0x3, 0x8, 0x0, 0x3ff, 0x7, @perf_bp={&(0x7f0000009680), 0x3}, 0x9, 0x6, 0xfffffffffffffff7, 0x0, 0x0, 0x49, 0xfffffffffffff3b8}, r10, 0xe, r5, 0x8) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000009880)={r12, &(0x7f0000009740)="8ba447000764036f17624e623896639a3e2456b901aedcdb4221cea83c3b2c94575967a34ec104bbebeaf6a6b50494e6763f41056d2ca84f906fa48d72590e81334926fab48e", &(0x7f00000097c0)=""/170}, 0x18) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r4, 0x2405, r6) bpf$PROG_LOAD(0x5, &(0x7f00000099c0)={0x7, 0x4, &(0x7f00000098c0)=@raw=[@ldst={0x3, 0x3, 0x6, 0xd, 0x7, 0x26}, @ldst={0x0, 0x2, 0x0, 0xa, 0x0, 0x4, 0xffffffffffffffff}], &(0x7f0000009900)='GPL\x00', 0x5, 0x5d, &(0x7f0000009940)=""/93, 0x41f00, 0x1, [], r13}, 0x48) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000009b40)={r8, &(0x7f0000009a40)="402c0b8b20e0ae84bb", &(0x7f0000009a80)=""/178}, 0x18) 2018/03/31 05:13:29 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file1\x00', 0x0) mount(&(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0)='./file1\x00', &(0x7f0000000280)='autofs\x00', 0x0, &(0x7f0000000240)) sendmsg(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f00000002c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x3, 0x2, 0x2, 0x4, {0xa, 0x4e22, 0x4, @mcast2={0xff, 0x2, [], 0x1}, 0x2}}}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000340)="0e5da397cea96cc2b053e252ce4ba8d68ee59b3fedf48846a194bfbfe5c20bad5ffeb85ab26e4d3359875936f5b0aed981abae60cd1c402c0343b90d4d070e1d2c69d5ac371daa08e16065b5cea26fca5ff38a115367ed4413229d62fcd6ed3dce076f258f4804690109dcbda5e89cc1ad010995142a2e20de4b494d63e19a20a90719e9cf19ee8fa3690d285b7aa831df0ab6a48c6199b769085af371e1a4f5ba96567a8e2c255d8641c5f2700bf9", 0xaf}], 0x1, &(0x7f00000007c0)=ANY=[]}, 0x0) mkdir(&(0x7f00000006c0)='./file0\x00', 0x4000000001) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100)={&(0x7f0000000080)='./file1\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000140)={&(0x7f0000000040)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000400)='nfs4\x00', 0x200000, &(0x7f0000000440)="f441b44c34b4c9bc40b26121b6193428b87c40fd06e06a15e4344945b1137c6c75478b75cab7ba10153461e0f40906e4852bfa45d70001251ebd0ff9") mount(&(0x7f0000000480)='./file1\x00', &(0x7f0000000500)='./file1\x00', &(0x7f0000000540)='bpf\x00', 0x100000, &(0x7f0000000580)="33567c82144ad8753ed1121d17030e2d4ba0712ebad27b29958de42e3166032f5f0d52fafe1137e85999c52de7ef1c69d12cef59cd5f6811452b38fc6f39a2688e95a85cb5d9067d0d8fa73b83137582b843fbfdce1a22cc424f7ab7a656d30679916654587ad0b45d7850054f5a30b9") 2018/03/31 05:13:29 executing program 4: mount(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='ncpfs\x00', 0x80802, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x50, &(0x7f0000000700)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780)=r0, 0x4) mount(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='./file0\x00', &(0x7f00000006c0)='btrfs\x00', 0x89402, &(0x7f0000000900)="e196efa3cb748d2a6600968b76295ff919bc3877b18eb8d265a35493fcf34fdc965cd5c837d2389c6e2ec6088abe8daaa8ca23f9298fc94dc26874bc4d4567afea1ca0879cdf21e915005a83e96b1002af29091d2176abbb7fec088a67f2e1390f32adaf2f252d24510870f8df7186936f4d88957eb8fcda78b7383a7d24db701d524557ee7324433e70d9ffa185098325f9e657d3c29cf6a35843cb96780269db1c735d55938af5c60e1e4ba25928697277b0fdf356b62399b4c8826d09bfca7d6078c19b4995195ea814b1bb40c0") ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0xffffffff) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6f3, 0x0, 0x6, 0x0, 0x0, 0xfffdffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x22, &(0x7f00000007c0)=ANY=[@ANYBLOB="18000000000000000000000000000000000000000020f37b176532826618e8210d55b6b9f796a5cf4309ac945b17b6ec55aad627fce3173f275427d49a02c531c5316326ec3569ef7771eee96dc62f79bb386acf26001097f7673e6b395ee0cac49bf5bbe2db74ffbe760e50b31e653a89e733b2832d3e4e73d9720448a1d74be25a5dbcc32519fc1400391454104d5b5d9b14c5560730768138a9a0e109f34a16cc067edc5d7a0b0912aa587035de0ad6624124ad9467ed6aac80ad02b778f8319fef183facaa39c4519babbd000000000000009d9d8436042fc1b8d6e779a1531ba51c8c8811c745b829a97e3e2d0f13ea630503c6a765fae62d43095c1669d81251d3a6718f867abdfb0b907d24394fd24b2ea273"], &(0x7f0000f6bffb)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000400)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000540)={r1, 0x50}, 0xfffffe74) close(r1) perf_event_open(&(0x7f0000348f88)={0x2, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x28, 0x2, 0x0, &(0x7f0000000000)={0x0}) mkdir(&(0x7f0000000100)='./file0\x00', 0x1000000000) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='selinuxfs\x00', 0x1000, &(0x7f0000000100)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='minix\x00', 0x10020, &(0x7f0000000240)) 2018/03/31 05:13:30 executing program 0: perf_event_open(&(0x7f0000000040)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x21fd, 0x0, 0x0, 0xef71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x9, 0x6, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000000)='./file0\x00', r0}, 0x10) socketpair(0x9, 0x80000, 0x4, &(0x7f0000000140)) 2018/03/31 05:13:30 executing program 2: socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000040)={0x7, 0x70, 0x1, 0xaabc, 0x2, 0x2, 0x0, 0xec, 0x4800, 0x1, 0x3a6b72c9, 0xffffffffffff8000, 0xfff, 0x7, 0x2, 0x7, 0xff, 0x1, 0x2, 0x9, 0x1, 0x0, 0x5, 0x75, 0x2, 0x7, 0x8, 0x4, 0x0, 0xdbce, 0xffff, 0xfaf, 0x1, 0xe7, 0xd0eb, 0x28a5, 0x9, 0x4, 0x0, 0x7, 0x2, @perf_config_ext={0x1, 0x8000}, 0x489, 0x6, 0xff, 0x0, 0x9d, 0x8, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f00000000c0)={0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000140)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r2 = getpid() r3 = perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x8, 0x4, 0x4, 0x1, 0x0, 0x401, 0x100, 0x7, 0xcfc0, 0x7, 0x0, 0x7, 0x30, 0x7, 0x7, 0xfff, 0x7, 0x9, 0xff, 0x9, 0xf, 0x0, 0x3, 0x100000000, 0x3, 0x8, 0xffff, 0x2, 0x3, 0xff, 0x6f, 0x3, 0x5, 0x0, 0x81, 0x0, 0x0, 0x9, 0x1, @perf_bp={&(0x7f0000000180), 0x1}, 0x11815, 0x9, 0x1, 0x1, 0x101, 0x5, 0x1e892fee}, r2, 0x9, r1, 0x1) r4 = perf_event_open(&(0x7f0000000280)={0x5, 0x70, 0xe00000000000, 0x9, 0x800, 0x6, 0x0, 0x7ff, 0x10200, 0xb, 0xe3, 0x5, 0x1, 0x4, 0x9b0f, 0x1f8a, 0x401, 0x1, 0xe975, 0x7, 0x437, 0x9, 0x7f, 0x20, 0x1, 0x2, 0x3, 0x5, 0x200, 0x1, 0x8, 0x401, 0x401, 0x2, 0x8, 0xfff, 0xf3c8, 0xf23, 0x0, 0x7fffffff, 0x0, @perf_bp={&(0x7f0000000240), 0x9}, 0x828, 0x3, 0x5, 0x1, 0x0, 0xc37, 0x6}, r2, 0x4, r1, 0x2) r5 = perf_event_open(&(0x7f0000000300)={0x4, 0x70, 0xff, 0x3, 0x7f, 0x7, 0x0, 0x40, 0x4a240, 0x2, 0xffffffffffffcc27, 0xb8, 0x2, 0x7, 0x9, 0x800, 0x3, 0x7d4d, 0xf7, 0xfffffffffffffffa, 0x9, 0x4, 0x3, 0x90be, 0x9, 0xfffffffffffffffc, 0x6, 0x3ff, 0xab6b, 0x8001, 0x5, 0x2, 0x9, 0x732, 0x400, 0x55000000000, 0x1ff, 0x6, 0x0, 0x0, 0x2, @perf_config_ext={0x6, 0xffffffff}, 0x40, 0x80000001, 0x7fff, 0x2, 0x1, 0x6, 0x5}, r2, 0xf, r4, 0xa) r6 = perf_event_open(&(0x7f00000003c0)={0x7, 0x70, 0xc87d, 0x6, 0x5, 0x80000001, 0x0, 0x3, 0x1, 0xb, 0xffffffff, 0x9, 0x584, 0x31b, 0x7, 0x2, 0x3, 0x544, 0x100000001, 0x9, 0x1, 0x100, 0x3, 0x1, 0x7, 0x0, 0x7, 0x5, 0xbb, 0x40, 0x7, 0x8, 0x81, 0xc5a, 0x0, 0x7, 0x1f, 0x815, 0x0, 0xffff, 0x2, @perf_bp={&(0x7f0000000380), 0x8}, 0x4, 0x5, 0xc95, 0x0, 0x7ff, 0x7b02, 0x7}, r2, 0x10, r1, 0xb) ioctl$PERF_EVENT_IOC_DISABLE(r3, 0x2401, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0x4) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = perf_event_open(&(0x7f0000000480)={0x7, 0x70, 0x7, 0xdbff, 0x3, 0x3f, 0x0, 0x8, 0x0, 0xc, 0x8, 0x0, 0xf43, 0x101, 0x6, 0x5, 0x6, 0x9, 0x200, 0xfffffffffffffffd, 0x4, 0x6, 0x6e, 0x20, 0x1b3, 0x1fe, 0x7ff, 0x3, 0x8000, 0x5, 0x0, 0x0, 0x0, 0x5, 0x22d2, 0x401, 0x68, 0xa1ce, 0x0, 0x4, 0x0, @perf_config_ext={0x2fb, 0x4}, 0x2000, 0xd33, 0x6, 0x697c4c7d75b7b6da, 0x171f, 0x9, 0x9}, r2, 0x6, r5, 0x1) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x9, 0x6, 0x101, 0x8, 0x0, 0x200, 0x2000, 0xf, 0x0, 0x5, 0x6, 0x3, 0x2, 0x0, 0x8001, 0x8, 0x3, 0x5, 0x17, 0x7, 0x4, 0x400, 0xffffffff, 0x7, 0x8000, 0x2, 0x100, 0x0, 0x7, 0x95de, 0x2, 0x1, 0x2, 0xd432, 0x3ff, 0x8599, 0x0, 0x3ff, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x10080, 0x7, 0xe7e, 0x7, 0x5, 0x7, 0x9}, r2, 0x0, r3, 0x8) close(r7) ioctl$PERF_EVENT_IOC_DISABLE(r9, 0x2401, 0x1) r10 = gettid() ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f00000005c0)={r0}) ioctl$sock_kcm_SIOCKCMUNATTACH(r11, 0x89e1, &(0x7f0000000600)={r8}) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000640)) r12 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)={0x4, 0x7, 0x7f, 0x9787, 0x1c, 0xffffffffffffffff, 0x5}, 0x2c) recvmsg$kcm(r11, &(0x7f0000009440)={&(0x7f0000009300)=@can={0x0, 0x0}, 0x80, &(0x7f00000093c0)=[{&(0x7f0000009380)=""/16, 0x10}], 0x1, &(0x7f0000009400)=""/18, 0x12, 0x3bc1}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000009480)={0xf, 0x13, &(0x7f00000006c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [@ldst={0x3, 0x2, 0x1, 0x2, 0x7, 0xffffffff, 0x4}, @map={0x18, 0x0, 0x1, 0x0, r12}, @alu={0x7, 0x5, 0xf, 0x6, 0xe, 0x2, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4}, @jmp={0x5, 0x7a4c, 0x0, 0x3, 0x9, 0xffffffff, 0xfffffffffffffff0}, @alu={0x4, 0x20, 0x9, 0x9, 0x5, 0xfffffffe, 0x4}, @jmp={0x5, 0x81, 0x9, 0x7, 0x6, 0xfffffffe, 0xfffffffffffffff0}, @jmp={0x5, 0x3, 0x3, 0x0, 0x2, 0x2, 0xffffffffffffffff}], {0x95}}, &(0x7f0000000780)='GPL\x00', 0x4, 0x77, &(0x7f00000007c0)=""/119, 0x0, 0x1, [], r13}, 0x48) mount(&(0x7f0000009500)='./file0\x00', &(0x7f0000009540)='./file0\x00', &(0x7f0000009580)='cramfs\x00', 0x5020, &(0x7f00000095c0)="22f464f8fef2b95976576e903efe99229584aaf55fa0d91223905d4a68c0c7d18bf26de6fec0660b0c36945200da04f802d9059dd5f6d2f0eca450f4fdd46ed2b411588d802f0d1d02be65816332b2754d686e927593deb8ee3ed17a24d749db81290c33836bcc9b7d93084c53d0744e81deb8b83d9b23565d6db4cb746eb15b20f7b806f0b5a02676d90260a61b00e9ec0b4b8bf07d5f93b3feda8299586c3936f743c764205de278c25a6fff98") perf_event_open(&(0x7f00000096c0)={0x1, 0x70, 0x3, 0xa8e, 0x1000, 0xe57a, 0x0, 0x6, 0x2100b, 0x2, 0x9, 0xdb1b, 0xfffffffffffffffa, 0xa7f8, 0x3, 0x2, 0x800, 0x800, 0x2, 0x0, 0x3f, 0x3, 0x8000000000000, 0x3, 0x20, 0x6, 0x3, 0xfffffffffffff318, 0xffffffffffff0001, 0xfffffffffffffffe, 0x12, 0x1, 0x101, 0x8, 0x100, 0x1, 0x3, 0x8, 0x0, 0x3ff, 0x7, @perf_bp={&(0x7f0000009680), 0x3}, 0x9, 0x6, 0xfffffffffffffff7, 0x0, 0x0, 0x49, 0xfffffffffffff3b8}, r10, 0xe, r5, 0x8) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000009880)={r12, &(0x7f0000009740)="8ba447000764036f17624e623896639a3e2456b901aedcdb4221cea83c3b2c94575967a34ec104bbebeaf6a6b50494e6763f41056d2ca84f906fa48d72590e81334926fab48e", &(0x7f00000097c0)=""/170}, 0x18) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r4, 0x2405, r6) bpf$PROG_LOAD(0x5, &(0x7f00000099c0)={0x7, 0x4, &(0x7f00000098c0)=@raw=[@ldst={0x3, 0x3, 0x6, 0xd, 0x7, 0x26}, @ldst={0x0, 0x2, 0x0, 0xa, 0x0, 0x4, 0xffffffffffffffff}], &(0x7f0000009900)='GPL\x00', 0x5, 0x5d, &(0x7f0000009940)=""/93, 0x41f00, 0x1, [], r13}, 0x48) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000009b40)={r8, &(0x7f0000009a40)="402c0b8b20e0ae84bb", &(0x7f0000009a80)=""/178}, 0x18) 2018/03/31 05:13:30 executing program 7: r0 = perf_event_open(&(0x7f0000001bc0)={0x3, 0x70, 0x6, 0x22, 0x2, 0xf5, 0x0, 0x1, 0x20008, 0x4, 0x9, 0x9, 0x1, 0x6, 0x401, 0x7, 0x51, 0x0, 0x5, 0x1, 0x7, 0x6, 0x10001, 0x0, 0x100, 0x7fff, 0x0, 0x3ff, 0x0, 0xd643, 0xffffffff, 0xfff, 0xf2f3, 0x9, 0x8d, 0x7, 0x1ff, 0x5, 0x0, 0x7fff, 0x6, @perf_config_ext={0xffffffff00000001, 0x1}, 0x1000, 0x2, 0x5, 0x6, 0x4, 0x80000000, 0xffffffffffffffc4}, 0x0, 0xc, 0xffffffffffffffff, 0x1) r1 = gettid() r2 = perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x3, 0xc85, 0x3ff, 0x1, 0x0, 0x401, 0x0, 0x1, 0x712000000000000, 0x7, 0x56d29a0f, 0x1, 0x0, 0x2, 0x20, 0x7, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x9, 0x5, 0x1, 0x3e69b47c, 0x5, 0x7fff, 0x1, 0x5, 0x4f, 0x1000, 0x0, 0x4, 0x0, 0x0, 0x4, 0xffffffff, 0x0, 0x2, 0x2, @perf_config_ext={0x0, 0x8}, 0x20200, 0xf88, 0x0, 0x1, 0x92d5, 0x1, 0x5}, r1, 0xd, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000280)=r0, 0xfffffe49) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000080)='./file0\x00'}, 0xb) perf_event_open(&(0x7f0000001c80)={0x2, 0x70, 0x3ab, 0x3, 0xbf7e, 0xffffffff, 0x0, 0x0, 0x4000, 0x4, 0x2, 0xec, 0x3ff, 0x8, 0xba, 0x973, 0x6, 0x433, 0x6, 0x0, 0x3, 0x5, 0x1, 0x4, 0x7, 0x5, 0x20, 0xa593, 0x4, 0x1000, 0x4722, 0x3, 0x40, 0xdd, 0x20, 0x1, 0x1, 0x6, 0x0, 0x2, 0x0, @perf_config_ext={0x9}, 0x10000, 0xfffffffffffffffb, 0x401, 0x7, 0x3, 0x9, 0x3}, r1, 0xf, 0xffffffffffffffff, 0x8) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00', 0x0, 0x10}, 0x10) perf_event_open(&(0x7f0000000480)={0x1c218abbd1b2c600, 0x70, 0x5, 0x0, 0xe9d, 0x9, 0x0, 0x80000001, 0x1408, 0x0, 0x10001, 0x1ff, 0xfff, 0x80000000, 0x5, 0x3, 0x81, 0x6, 0x9151, 0x40, 0x2, 0xfda, 0x0, 0x3, 0x1, 0x100000000, 0x4, 0x2, 0xffffffffffffe17f, 0x0, 0x1, 0x3, 0x1, 0x6, 0x7, 0x2, 0x3, 0x7fff, 0x0, 0xfffffffffffffffb, 0x1, @perf_bp={&(0x7f0000000440), 0xf}, 0x1000, 0x1000, 0xb36, 0x7, 0x5f9, 0x8a, 0x40}, r1, 0xd, r2, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f0000000980)=""/4096, 0x1000}, {&(0x7f0000001980)=""/59, 0x3b}, {&(0x7f00000019c0)=""/66, 0x42}], 0x3, &(0x7f0000001a80)=""/195, 0xc3, 0x2}, 0x2102) mount(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='udf\x00', 0x1000020, 0x0) mkdir(&(0x7f0000000380)='./file0/file0\x00', 0x2000000) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fusectl\x00', 0x4000, 0x0) mount(&(0x7f0000001d00)='./file1\x00', &(0x7f0000001d80)='./file0\x00', &(0x7f0000001dc0)='affs\x00', 0x800040, &(0x7f0000001e00)="39ef282caa985216c941be0013a569575f8b267468fe262194491b76dc736e1b4eb9e85bd685609c27f529ef08aff500d3910886a523046831d8c1731e93f35a150a5e2d31d2f90a1662699756b8408eb725f6b128416920a8111c2e5eb71e90008543ca6fd6e14006c64b644e6e73865ab19393ac4a2ca4ae2f83c961a534eda4a1b65dda0645296a5c171c92118a7319a700d9d422b0b720501f621e310a4ca0e1197ee66f7553b67ef1ddd0368e128eba449e35cef95b4a03b6a5c42a7e0292bf43e16df2e950d5") socketpair$inet(0x2, 0x3, 0x5, &(0x7f0000000680)) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000800)) recvmsg(0xffffffffffffffff, &(0x7f0000003b80)={&(0x7f0000003880)=@can={0x0, 0x0}, 0x80, &(0x7f0000003a40)=[{&(0x7f0000003900)=""/12, 0xc}, {&(0x7f0000003940)=""/19, 0x13}, {&(0x7f0000003980)=""/119, 0x77}, {&(0x7f0000003a00)=""/51, 0x33}, {&(0x7f0000006000)=""/4096, 0x1000}], 0x5, &(0x7f0000003ac0)=""/133, 0x85, 0x1}, 0x10002) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0xf, 0x3, &(0x7f0000000180)=ANY=[@ANYBLOB="85100000010000009522e600000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00', 0x2, 0x99, &(0x7f00000001c0)=""/153, 0x0, 0x1, [], r3}, 0x48) r4 = getpid() r5 = perf_event_open(&(0x7f0000000280)={0x7, 0x70, 0x5, 0x0, 0x40, 0x8e, 0x0, 0x101, 0x100, 0xe, 0xff, 0x2, 0x10001, 0x3cf, 0x7, 0x1, 0x6, 0x800, 0x0, 0xffb, 0x400000000000000, 0x7, 0x80000000, 0x20, 0x5, 0x97, 0x1, 0x8, 0x10000, 0x0, 0x8, 0x0, 0x9, 0x5, 0x6, 0x8, 0x100000001, 0x2, 0x0, 0x9, 0x7, @perf_config_ext={0x40, 0x3}, 0x30121, 0x5, 0x71, 0x3, 0x6, 0x8, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x1) perf_event_open(&(0x7f0000000200)={0x5, 0x70, 0x8001, 0x3, 0xdf6f, 0x8, 0x0, 0x7f, 0xc8000, 0x1, 0x7b1866b0, 0x3, 0x4, 0x2, 0x0, 0x40, 0x10000, 0xfffffffffffffffd, 0xff, 0x41, 0x3, 0xed68, 0x8, 0x7, 0x3, 0x4, 0x4, 0x3ff, 0xfffffffffffffffa, 0xfcfd, 0x1, 0x7, 0x7f, 0x101, 0x3, 0x1, 0x400, 0x0, 0x0, 0x2, 0x6, @perf_bp={&(0x7f00000001c0), 0x5}, 0x189, 0x1000, 0x9, 0x2, 0x7, 0x3}, r4, 0xd, r5, 0x0) perf_event_open(&(0x7f0000014f88)={0x1, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000014f88)={0x1, 0x78, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x3, &(0x7f0000002000)=ANY=[@ANYBLOB="18000800040000040000009d0dffa5489f16720000000000"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100), 0xfffffc61) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='./file0\x00', &(0x7f0000000500)='pstore\x00', 0x1004, &(0x7f0000000540)="8e3ed6874ad59b52e470be5b6694a276b3bf66f9c184a314ac1ea945c50fc000d968364491dd9053717b62902f21218c163d0c09d29c8d") bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x13, 0x5, 0x0, 0xcc10, 0x4, 0xffffffffffffffff, 0x6}, 0x2c) [ 182.554285] autofs4:pid:15566:autofs4_fill_super: called with bogus options [ 182.589818] autofs4:pid:15573:autofs4_fill_super: called with bogus options [ 182.649239] FAULT_INJECTION: forcing a failure. [ 182.649239] name failslab, interval 1, probability 0, space 0, times 0 [ 182.660554] CPU: 0 PID: 15574 Comm: syz-executor6 Not tainted 4.16.0-rc6+ #42 [ 182.667822] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 182.677169] Call Trace: [ 182.679757] dump_stack+0x194/0x24d [ 182.683389] ? arch_local_irq_restore+0x53/0x53 [ 182.688052] ? __save_stack_trace+0x7e/0xd0 [ 182.692368] should_fail+0x8c0/0xa40 [ 182.696068] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 182.701156] ? kasan_kmalloc+0xad/0xe0 [ 182.705027] ? kmem_cache_alloc_trace+0x136/0x740 [ 182.709852] ? __memcg_init_list_lru_node+0x169/0x270 [ 182.715027] ? __list_lru_init+0x544/0x750 [ 182.719239] ? sget_userns+0x6b1/0xe40 [ 182.723108] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 182.727841] ? do_mount+0xea4/0x2bb0 [ 182.731527] ? SyS_mount+0xab/0x120 [ 182.735127] ? do_syscall_64+0x281/0x940 [ 182.739165] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 182.744505] ? find_held_lock+0x35/0x1d0 [ 182.748543] ? __lock_is_held+0xb6/0x140 [ 182.752586] ? check_same_owner+0x320/0x320 [ 182.756885] ? rcu_note_context_switch+0x710/0x710 [ 182.761796] should_failslab+0xec/0x120 [ 182.765749] kmem_cache_alloc_trace+0x4b/0x740 [ 182.770307] ? __kmalloc_node+0x33/0x70 [ 182.774258] ? __kmalloc_node+0x33/0x70 [ 182.778208] ? rcu_read_lock_sched_held+0x108/0x120 [ 182.783199] __memcg_init_list_lru_node+0x169/0x270 [ 182.788193] ? list_lru_add+0x7c0/0x7c0 [ 182.792143] ? __kmalloc_node+0x47/0x70 [ 182.796098] __list_lru_init+0x544/0x750 [ 182.800137] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 182.805998] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 182.811002] ? lockdep_init_map+0x9/0x10 [ 182.815048] sget_userns+0x6b1/0xe40 [ 182.818735] ? set_anon_super+0x20/0x20 [ 182.822684] ? put_filp+0x90/0x90 [ 182.826112] ? destroy_unused_super.part.6+0xd0/0xd0 [ 182.831192] ? alloc_vfsmnt+0x762/0x9c0 [ 182.835143] ? path_lookupat+0x238/0xba0 [ 182.839181] ? mnt_free_id.isra.21+0x50/0x50 [ 182.843567] ? trace_hardirqs_off+0x10/0x10 [ 182.847863] ? putname+0xee/0x130 [ 182.851292] ? cap_capable+0x1b5/0x230 [ 182.855159] ? security_capable+0x8e/0xc0 [ 182.859593] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 182.864763] ? ns_capable_common+0xcf/0x160 [ 182.869061] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 182.874227] mount_ns+0x6d/0x190 [ 182.877579] rpc_mount+0x9e/0xd0 [ 182.880920] mount_fs+0x66/0x2d0 [ 182.884266] vfs_kern_mount.part.26+0xc6/0x4a0 [ 182.888823] ? may_umount+0xa0/0xa0 [ 182.892424] ? _raw_read_unlock+0x22/0x30 [ 182.896547] ? __get_fs_type+0x8a/0xc0 [ 182.900410] do_mount+0xea4/0x2bb0 [ 182.903925] ? __might_fault+0x110/0x1d0 [ 182.907968] ? copy_mount_string+0x40/0x40 [ 182.912178] ? check_same_owner+0x320/0x320 [ 182.916476] ? __check_object_size+0x8b/0x530 [ 182.920951] ? __might_sleep+0x95/0x190 [ 182.924906] ? kasan_check_write+0x14/0x20 [ 182.929119] ? _copy_from_user+0x99/0x110 [ 182.933243] ? memdup_user+0x5e/0x90 [ 182.936936] ? copy_mount_options+0x1f7/0x2e0 [ 182.941405] SyS_mount+0xab/0x120 [ 182.944831] ? copy_mnt_ns+0xb30/0xb30 [ 182.948694] do_syscall_64+0x281/0x940 [ 182.952555] ? vmalloc_sync_all+0x30/0x30 [ 182.956677] ? _raw_spin_unlock_irq+0x27/0x70 [ 182.961148] ? finish_task_switch+0x1c1/0x7e0 [ 182.965620] ? syscall_return_slowpath+0x550/0x550 [ 182.970524] ? syscall_return_slowpath+0x2ac/0x550 [ 182.975427] ? prepare_exit_to_usermode+0x350/0x350 [ 182.980425] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 182.985768] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 182.990588] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 182.995754] RIP: 0033:0x454e79 [ 182.998919] RSP: 002b:00007fc28ac9cc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 183.006607] RAX: ffffffffffffffda RBX: 00007fc28ac9d6d4 RCX: 0000000000454e79 [ 183.013851] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 183.021095] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 183.028338] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000016 [ 183.035582] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000029 2018/03/31 05:13:30 executing program 7: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xc, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="850100002200800007000000060000eeffffff0000000000"], &(0x7f00000001c0)="73797a6b616c6c65720001be826e8f833152f795b4d9f4bc3ea582523aed371b084fccfc3d2ef2cbe65d30642ca8dcd0f8479be52e66937908f1d8112489e8099d9d4edb806d81189c0fbb6818d028546c35d3363d54db0db780f54977ae6359d617c1d233d8e18abfc75f9a76cd8e1f77583bc02f07a33de6f304e95db82fd4da55ebd25162df6f88e7d1bb0654ffb31e008967", 0x1, 0x99, &(0x7f000000d000)=""/153}, 0x48) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340), 0x4) mkdir(&(0x7f0000000300)='./file0\x00', 0x102) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x2000000, &(0x7f0000000380)="96e308615f0eed0dbe629b82d35f5daa19a71e49054c401437042b437ce2ba85be7e24450b029848cb314790e85fd105b4df62e06e5322dacb6b9f994552ebbade84a1a7a4213c849e87d87207dbbbe1ca7faf2ea822cda11803a057c4a19ca714") bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0xfffffffffffffd60, 0x18, &(0x7f0000000100)="0aac1ac205286e83e0e5504088ca6bb0ad3a85d820c157cf864703db1efb", &(0x7f0000000180)=""/24, 0x6, 0x81}, 0x28) 2018/03/31 05:13:30 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x400000000003e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x3, 0x0, 0x0, 0xc66, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x2}, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100), 0xc) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xc, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000740)='./file0/file0\x00', &(0x7f00000002c0)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000000)) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000140)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000340)='./file0\x00', &(0x7f0000000300)='cramfs\x00', 0x1, &(0x7f0000000480)="89e9f7f7b96d783e45837a1511d511fefee4ca08000000000000003f176c7ce18a6c193e6e9127078cff70a2259b3cfd11415a30a50b731b3b1e109b80d2fe9eff7346d3b9a004ffd3af82d3a5d971") bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={0xffffffffffffffff, 0x0, 0x0, 0x86, &(0x7f0000000300), &(0x7f0000000380)=""/134}, 0x28) 2018/03/31 05:13:30 executing program 3: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00', 0x0, 0x18}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000710fec)={0x2, 0x4, 0x222, 0x10000009, 0x0, r0}, 0x24c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r1, &(0x7f0000400f43), &(0x7f00002c2fe3)=""/29}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0xffffffffffffffff, 0x100000000, 0xd3, 0x10, r1, 0x9}, 0x2c) 2018/03/31 05:13:30 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) r2 = getpid() r3 = perf_event_open(&(0x7f0000000580)={0x5, 0x70, 0xb8, 0x4, 0x3d3, 0x7, 0x0, 0x9, 0xc201, 0x4, 0xb25, 0x3ff, 0x9, 0x8001, 0x2, 0x7fffffff, 0xfffffffffffffffa, 0x9, 0x40, 0xdf1, 0x401, 0xfffffffffffffff8, 0x40, 0x1, 0x46, 0x3fc4, 0x2f0, 0x101, 0x5, 0x4, 0x101, 0x80, 0x5, 0x0, 0x6, 0x4, 0x9, 0xfffffffffffffffd, 0x0, 0x100, 0x0, @perf_bp={&(0x7f0000000280), 0x8}, 0x24, 0x2, 0x7, 0x6, 0x3, 0x9, 0x9}, 0x0, 0x10, 0xffffffffffffff9c, 0x1) perf_event_open(&(0x7f0000000400)={0x3, 0x70, 0x792, 0x399a, 0x0, 0x8a, 0x0, 0x5, 0x200, 0x8, 0x80000001, 0x3ff, 0x80, 0x40000000000000, 0x8000, 0x0, 0x3, 0x3, 0x5, 0x6, 0xbdf, 0x8, 0x3, 0x7, 0x2, 0x4, 0x7, 0x1, 0x100000001, 0x3, 0x4c6, 0x340, 0x5, 0x7, 0x7, 0x0, 0x100000000, 0xbdf, 0x0, 0x7fffffff, 0x4, @perf_bp={&(0x7f0000000200), 0x1}, 0x4010, 0x1, 0x0, 0x2, 0x1, 0xc87, 0x400}, r2, 0xc, r3, 0x2) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r5 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r5, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r7 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x0, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x0, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r4, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r7, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r4}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000380)={0x7, 0x4, 0x81, 0x1, 0x8, r6, 0x7f}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) 2018/03/31 05:13:30 executing program 4: mount(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='ncpfs\x00', 0x80802, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x50, &(0x7f0000000700)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780)=r0, 0x4) mount(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='./file0\x00', &(0x7f00000006c0)='btrfs\x00', 0x89402, &(0x7f0000000900)="e196efa3cb748d2a6600968b76295ff919bc3877b18eb8d265a35493fcf34fdc965cd5c837d2389c6e2ec6088abe8daaa8ca23f9298fc94dc26874bc4d4567afea1ca0879cdf21e915005a83e96b1002af29091d2176abbb7fec088a67f2e1390f32adaf2f252d24510870f8df7186936f4d88957eb8fcda78b7383a7d24db701d524557ee7324433e70d9ffa185098325f9e657d3c29cf6a35843cb96780269db1c735d55938af5c60e1e4ba25928697277b0fdf356b62399b4c8826d09bfca7d6078c19b4995195ea814b1bb40c0") ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0xffffffff) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6f3, 0x0, 0x6, 0x0, 0x0, 0xfffdffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x22, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000f6bffb)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000400)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000540)={r1, 0x50}, 0xfffffe74) close(r1) perf_event_open(&(0x7f0000348f88)={0x2, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x28, 0x2, 0x0, &(0x7f0000000000)={0x0}) mkdir(&(0x7f0000000100)='./file0\x00', 0x1000000000) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='selinuxfs\x00', 0x1000, &(0x7f0000000100)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='minix\x00', 0x10020, &(0x7f0000000240)) 2018/03/31 05:13:30 executing program 2: socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000040)={0x7, 0x70, 0x1, 0xaabc, 0x2, 0x2, 0x0, 0xec, 0x4800, 0x1, 0x3a6b72c9, 0xffffffffffff8000, 0xfff, 0x7, 0x2, 0x7, 0xff, 0x1, 0x2, 0x9, 0x1, 0x0, 0x5, 0x75, 0x2, 0x7, 0x8, 0x4, 0x0, 0xdbce, 0xffff, 0xfaf, 0x1, 0xe7, 0xd0eb, 0x28a5, 0x9, 0x4, 0x0, 0x7, 0x2, @perf_config_ext={0x1, 0x8000}, 0x489, 0x6, 0xff, 0x0, 0x9d, 0x8, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f00000000c0)={0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000140)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r2 = getpid() r3 = perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x8, 0x4, 0x4, 0x1, 0x0, 0x401, 0x100, 0x7, 0xcfc0, 0x7, 0x0, 0x7, 0x30, 0x7, 0x7, 0xfff, 0x7, 0x9, 0xff, 0x9, 0xf, 0x0, 0x3, 0x100000000, 0x3, 0x8, 0xffff, 0x2, 0x3, 0xff, 0x6f, 0x3, 0x5, 0x800, 0x0, 0x0, 0x0, 0x9, 0x1, @perf_bp={&(0x7f0000000180), 0x1}, 0x11815, 0x9, 0x1, 0x1, 0x101, 0x5, 0x1e892fee}, r2, 0x9, r1, 0x1) r4 = perf_event_open(&(0x7f0000000280)={0x5, 0x70, 0xe00000000000, 0x9, 0x800, 0x6, 0x0, 0x7ff, 0x10200, 0xb, 0xe3, 0x5, 0x1, 0x4, 0x9b0f, 0x1f8a, 0x401, 0x1, 0xe975, 0x7, 0x437, 0x9, 0x7f, 0x20, 0x1, 0x2, 0x3, 0x5, 0x200, 0x1, 0x8, 0x401, 0x401, 0x2, 0x8, 0xfff, 0xf3c8, 0xf23, 0x0, 0x7fffffff, 0x0, @perf_bp={&(0x7f0000000240), 0x9}, 0x828, 0x3, 0x5, 0x1, 0x0, 0xc37, 0x6}, r2, 0x4, r1, 0x2) r5 = perf_event_open(&(0x7f0000000300)={0x4, 0x70, 0xff, 0x3, 0x7f, 0x7, 0x0, 0x40, 0x4a240, 0x2, 0xffffffffffffcc27, 0xb8, 0x2, 0x7, 0x9, 0x800, 0x3, 0x7d4d, 0xf7, 0xfffffffffffffffa, 0x9, 0x4, 0x3, 0x90be, 0x9, 0xfffffffffffffffc, 0x6, 0x3ff, 0xab6b, 0x8001, 0x5, 0x2, 0x9, 0x732, 0x400, 0x55000000000, 0x1ff, 0x6, 0x0, 0x0, 0x2, @perf_config_ext={0x6, 0xffffffff}, 0x40, 0x80000001, 0x7fff, 0x2, 0x1, 0x6, 0x5}, r2, 0xf, r4, 0xa) r6 = perf_event_open(&(0x7f00000003c0)={0x7, 0x70, 0xc87d, 0x6, 0x5, 0x80000001, 0x0, 0x3, 0x1, 0xb, 0xffffffff, 0x9, 0x584, 0x31b, 0x7, 0x2, 0x3, 0x544, 0x100000001, 0x9, 0x1, 0x100, 0x3, 0x1, 0x7, 0x0, 0x7, 0x5, 0xbb, 0x40, 0x7, 0x8, 0x81, 0xc5a, 0x0, 0x7, 0x1f, 0x815, 0x0, 0xffff, 0x2, @perf_bp={&(0x7f0000000380), 0x8}, 0x4, 0x5, 0xc95, 0x0, 0x7ff, 0x7b02, 0x7}, r2, 0x10, r1, 0xb) ioctl$PERF_EVENT_IOC_DISABLE(r3, 0x2401, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0x4) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = perf_event_open(&(0x7f0000000480)={0x7, 0x70, 0x7, 0xdbff, 0x3, 0x3f, 0x0, 0x8, 0x0, 0xc, 0x8, 0x0, 0xf43, 0x101, 0x6, 0x5, 0x6, 0x9, 0x200, 0xfffffffffffffffd, 0x4, 0x6, 0x6e, 0x20, 0x1b3, 0x1fe, 0x7ff, 0x3, 0x8000, 0x5, 0x0, 0x0, 0x0, 0x5, 0x22d2, 0x401, 0x68, 0xa1ce, 0x0, 0x4, 0x0, @perf_config_ext={0x2fb, 0x4}, 0x2000, 0xd33, 0x6, 0x697c4c7d75b7b6da, 0x171f, 0x9, 0x9}, r2, 0x6, r5, 0x1) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x9, 0x6, 0x101, 0x8, 0x0, 0x200, 0x2000, 0xf, 0x0, 0x5, 0x6, 0x3, 0x2, 0x0, 0x8001, 0x8, 0x3, 0x5, 0x17, 0x7, 0x4, 0x400, 0xffffffff, 0x7, 0x8000, 0x2, 0x100, 0x0, 0x7, 0x95de, 0x2, 0x1, 0x2, 0xd432, 0x3ff, 0x8599, 0x0, 0x3ff, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x10080, 0x7, 0xe7e, 0x7, 0x5, 0x7, 0x9}, r2, 0x0, r3, 0x8) close(r7) ioctl$PERF_EVENT_IOC_DISABLE(r9, 0x2401, 0x1) r10 = gettid() ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f00000005c0)={r0}) ioctl$sock_kcm_SIOCKCMUNATTACH(r11, 0x89e1, &(0x7f0000000600)={r8}) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000640)) r12 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)={0x4, 0x7, 0x7f, 0x9787, 0x1c, 0xffffffffffffffff, 0x5}, 0x2c) recvmsg$kcm(r11, &(0x7f0000009440)={&(0x7f0000009300)=@can={0x0, 0x0}, 0x80, &(0x7f00000093c0)=[{&(0x7f0000009380)=""/16, 0x10}], 0x1, &(0x7f0000009400)=""/18, 0x12, 0x3bc1}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000009480)={0xf, 0x13, &(0x7f00000006c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [@ldst={0x3, 0x2, 0x1, 0x2, 0x7, 0xffffffff, 0x4}, @map={0x18, 0x0, 0x1, 0x0, r12}, @alu={0x7, 0x5, 0xf, 0x6, 0xe, 0x2, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4}, @jmp={0x5, 0x7a4c, 0x0, 0x3, 0x9, 0xffffffff, 0xfffffffffffffff0}, @alu={0x4, 0x20, 0x9, 0x9, 0x5, 0xfffffffe, 0x4}, @jmp={0x5, 0x81, 0x9, 0x7, 0x6, 0xfffffffe, 0xfffffffffffffff0}, @jmp={0x5, 0x3, 0x3, 0x0, 0x2, 0x2, 0xffffffffffffffff}], {0x95}}, &(0x7f0000000780)='GPL\x00', 0x4, 0x77, &(0x7f00000007c0)=""/119, 0x0, 0x1, [], r13}, 0x48) mount(&(0x7f0000009500)='./file0\x00', &(0x7f0000009540)='./file0\x00', &(0x7f0000009580)='cramfs\x00', 0x5020, &(0x7f00000095c0)="22f464f8fef2b95976576e903efe99229584aaf55fa0d91223905d4a68c0c7d18bf26de6fec0660b0c36945200da04f802d9059dd5f6d2f0eca450f4fdd46ed2b411588d802f0d1d02be65816332b2754d686e927593deb8ee3ed17a24d749db81290c33836bcc9b7d93084c53d0744e81deb8b83d9b23565d6db4cb746eb15b20f7b806f0b5a02676d90260a61b00e9ec0b4b8bf07d5f93b3feda8299586c3936f743c764205de278c25a6fff98") perf_event_open(&(0x7f00000096c0)={0x1, 0x70, 0x3, 0xa8e, 0x1000, 0xe57a, 0x0, 0x6, 0x2100b, 0x2, 0x9, 0xdb1b, 0xfffffffffffffffa, 0xa7f8, 0x3, 0x2, 0x800, 0x800, 0x2, 0x0, 0x3f, 0x3, 0x8000000000000, 0x3, 0x20, 0x6, 0x3, 0xfffffffffffff318, 0xffffffffffff0001, 0xfffffffffffffffe, 0x12, 0x1, 0x101, 0x8, 0x100, 0x1, 0x3, 0x8, 0x0, 0x3ff, 0x7, @perf_bp={&(0x7f0000009680), 0x3}, 0x9, 0x6, 0xfffffffffffffff7, 0x0, 0x0, 0x49, 0xfffffffffffff3b8}, r10, 0xe, r5, 0x8) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000009880)={r12, &(0x7f0000009740)="8ba447000764036f17624e623896639a3e2456b901aedcdb4221cea83c3b2c94575967a34ec104bbebeaf6a6b50494e6763f41056d2ca84f906fa48d72590e81334926fab48e", &(0x7f00000097c0)=""/170}, 0x18) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r4, 0x2405, r6) bpf$PROG_LOAD(0x5, &(0x7f00000099c0)={0x7, 0x4, &(0x7f00000098c0)=@raw=[@ldst={0x3, 0x3, 0x6, 0xd, 0x7, 0x26}, @ldst={0x0, 0x2, 0x0, 0xa, 0x0, 0x4, 0xffffffffffffffff}], &(0x7f0000009900)='GPL\x00', 0x5, 0x5d, &(0x7f0000009940)=""/93, 0x41f00, 0x1, [], r13}, 0x48) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000009b40)={r8, &(0x7f0000009a40)="402c0b8b20e0ae84bb", &(0x7f0000009a80)=""/178}, 0x18) 2018/03/31 05:13:30 executing program 6 (fault-call:17 fault-nth:42): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x0, 0x101, 0x4, 0x0, 0x1, r0, 0x0, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r2 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)={0xffffffffffffffff}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r2, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x0, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0", 0xc9}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000280)={&(0x7f0000000680)='./file0\x00'}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r1}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r3) gettid() close(0xffffffffffffffff) 2018/03/31 05:13:30 executing program 0: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0xff, 0x6, 0x9, 0x0, 0xffffffffffffff9c}, 0x2c) recvmsg(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000280)=@l2, 0x80, &(0x7f0000000580), 0x0, &(0x7f0000000600)=""/15, 0xf}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000001140)={r1, &(0x7f0000000040), &(0x7f0000000140)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r1, &(0x7f0000000040), &(0x7f0000000100), 0x1}, 0x20) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000040)={0x1, 0x0, [0x0]}) [ 183.189401] FAULT_INJECTION: forcing a failure. [ 183.189401] name failslab, interval 1, probability 0, space 0, times 0 [ 183.200707] CPU: 0 PID: 15615 Comm: syz-executor6 Not tainted 4.16.0-rc6+ #42 [ 183.207978] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 183.217326] Call Trace: [ 183.219920] dump_stack+0x194/0x24d [ 183.223553] ? arch_local_irq_restore+0x53/0x53 [ 183.228222] ? __save_stack_trace+0x7e/0xd0 [ 183.232551] should_fail+0x8c0/0xa40 [ 183.236272] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 183.241378] ? kasan_kmalloc+0xad/0xe0 [ 183.245259] ? kmem_cache_alloc_trace+0x136/0x740 [ 183.250096] ? __memcg_init_list_lru_node+0x169/0x270 [ 183.255269] ? __list_lru_init+0x544/0x750 [ 183.259487] ? sget_userns+0x6b1/0xe40 [ 183.263358] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 183.268092] ? do_mount+0xea4/0x2bb0 [ 183.271783] ? SyS_mount+0xab/0x120 [ 183.275390] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 183.280739] ? find_held_lock+0x35/0x1d0 [ 183.284784] ? __lock_is_held+0xb6/0x140 [ 183.288835] ? check_same_owner+0x320/0x320 [ 183.293147] ? rcu_note_context_switch+0x710/0x710 [ 183.298068] should_failslab+0xec/0x120 [ 183.302033] kmem_cache_alloc_trace+0x4b/0x740 [ 183.306597] ? __kmalloc_node+0x33/0x70 [ 183.310549] ? __kmalloc_node+0x33/0x70 [ 183.314505] ? rcu_read_lock_sched_held+0x108/0x120 [ 183.319508] __memcg_init_list_lru_node+0x169/0x270 [ 183.324520] ? list_lru_add+0x7c0/0x7c0 [ 183.328479] ? __kmalloc_node+0x47/0x70 [ 183.332438] __list_lru_init+0x544/0x750 [ 183.336485] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 183.342353] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 183.347360] ? lockdep_init_map+0x9/0x10 [ 183.351405] sget_userns+0x6b1/0xe40 [ 183.355098] ? set_anon_super+0x20/0x20 [ 183.359059] ? put_filp+0x90/0x90 [ 183.362495] ? destroy_unused_super.part.6+0xd0/0xd0 [ 183.367578] ? alloc_vfsmnt+0x762/0x9c0 [ 183.371531] ? path_lookupat+0x238/0xba0 [ 183.375572] ? mnt_free_id.isra.21+0x50/0x50 [ 183.379967] ? trace_hardirqs_off+0x10/0x10 [ 183.384273] ? putname+0xee/0x130 [ 183.387710] ? cap_capable+0x1b5/0x230 [ 183.391580] ? security_capable+0x8e/0xc0 [ 183.395715] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 183.400889] ? ns_capable_common+0xcf/0x160 [ 183.405244] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 183.410412] mount_ns+0x6d/0x190 [ 183.413761] rpc_mount+0x9e/0xd0 [ 183.417113] mount_fs+0x66/0x2d0 [ 183.420466] vfs_kern_mount.part.26+0xc6/0x4a0 [ 183.425036] ? may_umount+0xa0/0xa0 [ 183.428643] ? _raw_read_unlock+0x22/0x30 [ 183.432774] ? __get_fs_type+0x8a/0xc0 [ 183.436645] do_mount+0xea4/0x2bb0 [ 183.440167] ? __might_fault+0x110/0x1d0 [ 183.444216] ? copy_mount_string+0x40/0x40 [ 183.448431] ? __check_object_size+0x8b/0x530 [ 183.452913] ? __might_sleep+0x95/0x190 [ 183.456874] ? kasan_check_write+0x14/0x20 [ 183.461095] ? _copy_from_user+0x99/0x110 [ 183.465227] ? memdup_user+0x5e/0x90 [ 183.468922] ? copy_mount_options+0x1f7/0x2e0 [ 183.473403] SyS_mount+0xab/0x120 [ 183.476834] ? copy_mnt_ns+0xb30/0xb30 [ 183.480702] do_syscall_64+0x281/0x940 [ 183.484570] ? vmalloc_sync_all+0x30/0x30 [ 183.488695] ? _raw_spin_unlock_irq+0x27/0x70 [ 183.493185] ? finish_task_switch+0x1c1/0x7e0 [ 183.497659] ? syscall_return_slowpath+0x550/0x550 [ 183.502571] ? syscall_return_slowpath+0x2ac/0x550 [ 183.507480] ? prepare_exit_to_usermode+0x350/0x350 [ 183.512476] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 183.517822] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 183.522651] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 183.527820] RIP: 0033:0x454e79 [ 183.530990] RSP: 002b:00007fc28ac9cc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 183.538684] RAX: ffffffffffffffda RBX: 00007fc28ac9d6d4 RCX: 0000000000454e79 [ 183.545935] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 183.553185] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 183.560433] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000016 [ 183.567681] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000002a 2018/03/31 05:13:31 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000200060000009500000000000000c643cc6551f2802cc0102c90b3b5dc0a6a3da195fd02553bf0d013"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000080)={0x0, r0, 0x4, 0x3}, 0xffffffffffffff35) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000180)='syzkaller\x00') bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000003c0)={r0, 0x0, 0x7, 0xc5, &(0x7f0000000200)="5c374ec915428e", &(0x7f00000002c0)=""/197, 0x1000}, 0x28) 2018/03/31 05:13:31 executing program 7: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000d1cff8)={0x5, 0x100, 0x100, 0x2}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000269fb8)={0x1, 0x5, &(0x7f00000affc8)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95}}, &(0x7f000039cff6)='syzkaller\x00', 0x8, 0x1000, &(0x7f000039c000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f000039efd8)={0xffffffffffffffff, 0x0, 0xfffffffffffffda3, 0x33, &(0x7f0000942000), &(0x7f00003a3fcd)=""/51}, 0xffffffffffffff5c) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f000032a000)={r1, 0x50, &(0x7f000039efb0)}, 0x10) 2018/03/31 05:13:31 executing program 2: socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000040)={0x7, 0x70, 0x1, 0xaabc, 0x2, 0x2, 0x0, 0xec, 0x4800, 0x1, 0x3a6b72c9, 0xffffffffffff8000, 0xfff, 0x7, 0x2, 0x7, 0xff, 0x1, 0x2, 0x9, 0x1, 0x0, 0x5, 0x75, 0x2, 0x7, 0x8, 0x4, 0x0, 0xdbce, 0xffff, 0xfaf, 0x1, 0xe7, 0xd0eb, 0x28a5, 0x9, 0x4, 0x0, 0x7, 0x2, @perf_config_ext={0x1, 0x8000}, 0x489, 0x6, 0xff, 0x0, 0x9d, 0x8, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f00000000c0)={0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000140)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r2 = getpid() r3 = perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x8, 0x4, 0x4, 0x1, 0x0, 0x401, 0x100, 0x7, 0xcfc0, 0x7, 0x0, 0x7, 0x30, 0x7, 0x7, 0xfff, 0x7, 0x9, 0xff, 0x9, 0xf, 0x0, 0x3, 0x100000000, 0x3, 0x8, 0xffff, 0x2, 0x3, 0xff, 0x6f, 0x3, 0x5, 0x800, 0x0, 0x0, 0x0, 0x9, 0x1, @perf_bp={&(0x7f0000000180), 0x1}, 0x11815, 0x9, 0x1, 0x1, 0x101, 0x5, 0x1e892fee}, r2, 0x9, r1, 0x1) r4 = perf_event_open(&(0x7f0000000280)={0x5, 0x70, 0xe00000000000, 0x9, 0x800, 0x6, 0x0, 0x7ff, 0x10200, 0xb, 0xe3, 0x5, 0x1, 0x4, 0x9b0f, 0x1f8a, 0x401, 0x1, 0xe975, 0x7, 0x437, 0x9, 0x7f, 0x20, 0x1, 0x2, 0x3, 0x5, 0x200, 0x1, 0x8, 0x401, 0x401, 0x2, 0x8, 0xfff, 0xf3c8, 0xf23, 0x0, 0x7fffffff, 0x0, @perf_bp={&(0x7f0000000240), 0x9}, 0x828, 0x3, 0x5, 0x1, 0x0, 0xc37, 0x6}, r2, 0x4, r1, 0x2) r5 = perf_event_open(&(0x7f0000000300)={0x4, 0x70, 0xff, 0x3, 0x7f, 0x7, 0x0, 0x40, 0x4a240, 0x2, 0xffffffffffffcc27, 0xb8, 0x2, 0x7, 0x9, 0x800, 0x3, 0x7d4d, 0xf7, 0xfffffffffffffffa, 0x9, 0x4, 0x3, 0x90be, 0x9, 0xfffffffffffffffc, 0x6, 0x3ff, 0xab6b, 0x8001, 0x5, 0x2, 0x9, 0x732, 0x400, 0x55000000000, 0x1ff, 0x6, 0x0, 0x0, 0x2, @perf_config_ext={0x6, 0xffffffff}, 0x40, 0x80000001, 0x7fff, 0x2, 0x1, 0x6, 0x5}, r2, 0xf, r4, 0xa) r6 = perf_event_open(&(0x7f00000003c0)={0x7, 0x70, 0xc87d, 0x6, 0x5, 0x80000001, 0x0, 0x3, 0x1, 0xb, 0xffffffff, 0x9, 0x584, 0x31b, 0x7, 0x2, 0x3, 0x544, 0x100000001, 0x9, 0x1, 0x100, 0x3, 0x1, 0x7, 0x0, 0x7, 0x5, 0xbb, 0x40, 0x7, 0x8, 0x81, 0xc5a, 0x0, 0x7, 0x1f, 0x815, 0x0, 0xffff, 0x2, @perf_bp={&(0x7f0000000380), 0x8}, 0x4, 0x5, 0xc95, 0x0, 0x7ff, 0x7b02, 0x7}, r2, 0x10, r1, 0xb) ioctl$PERF_EVENT_IOC_DISABLE(r3, 0x2401, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0x4) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = perf_event_open(&(0x7f0000000480)={0x7, 0x70, 0x7, 0xdbff, 0x3, 0x3f, 0x0, 0x8, 0x0, 0xc, 0x8, 0x0, 0xf43, 0x101, 0x6, 0x5, 0x6, 0x9, 0x200, 0xfffffffffffffffd, 0x4, 0x6, 0x6e, 0x20, 0x1b3, 0x1fe, 0x7ff, 0x3, 0x8000, 0x5, 0x0, 0x0, 0x0, 0x5, 0x22d2, 0x401, 0x68, 0xa1ce, 0x0, 0x4, 0x0, @perf_config_ext={0x2fb, 0x4}, 0x2000, 0xd33, 0x6, 0x697c4c7d75b7b6da, 0x171f, 0x9, 0x9}, r2, 0x6, r5, 0x1) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x9, 0x6, 0x101, 0x8, 0x0, 0x200, 0x2000, 0xf, 0x0, 0x5, 0x6, 0x3, 0x2, 0x0, 0x8001, 0x8, 0x3, 0x5, 0x17, 0x7, 0x4, 0x400, 0xffffffff, 0x7, 0x8000, 0x2, 0x100, 0x0, 0x7, 0x95de, 0x2, 0x1, 0x2, 0xd432, 0x3ff, 0x8599, 0x0, 0x3ff, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x10080, 0x7, 0xe7e, 0x7, 0x5, 0x7, 0x9}, r2, 0x0, r3, 0x8) close(r7) ioctl$PERF_EVENT_IOC_DISABLE(r9, 0x2401, 0x1) r10 = gettid() ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f00000005c0)={r0}) ioctl$sock_kcm_SIOCKCMUNATTACH(r11, 0x89e1, &(0x7f0000000600)={r8}) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000640)) r12 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)={0x4, 0x7, 0x7f, 0x9787, 0x1c, 0xffffffffffffffff, 0x5}, 0x2c) recvmsg$kcm(r11, &(0x7f0000009440)={&(0x7f0000009300)=@can={0x0, 0x0}, 0x80, &(0x7f00000093c0)=[{&(0x7f0000009380)=""/16, 0x10}], 0x1, &(0x7f0000009400)=""/18, 0x12, 0x3bc1}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000009480)={0xf, 0x13, &(0x7f00000006c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [@ldst={0x3, 0x2, 0x1, 0x2, 0x7, 0xffffffff, 0x4}, @map={0x18, 0x0, 0x1, 0x0, r12}, @alu={0x7, 0x5, 0xf, 0x6, 0xe, 0x2, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4}, @jmp={0x5, 0x7a4c, 0x0, 0x3, 0x9, 0xffffffff, 0xfffffffffffffff0}, @alu={0x4, 0x20, 0x9, 0x9, 0x5, 0xfffffffe, 0x4}, @jmp={0x5, 0x81, 0x9, 0x7, 0x6, 0xfffffffe, 0xfffffffffffffff0}, @jmp={0x5, 0x3, 0x3, 0x0, 0x2, 0x2, 0xffffffffffffffff}], {0x95}}, &(0x7f0000000780)='GPL\x00', 0x4, 0x77, &(0x7f00000007c0)=""/119, 0x0, 0x1, [], r13}, 0x48) mount(&(0x7f0000009500)='./file0\x00', &(0x7f0000009540)='./file0\x00', &(0x7f0000009580)='cramfs\x00', 0x5020, &(0x7f00000095c0)="22f464f8fef2b95976576e903efe99229584aaf55fa0d91223905d4a68c0c7d18bf26de6fec0660b0c36945200da04f802d9059dd5f6d2f0eca450f4fdd46ed2b411588d802f0d1d02be65816332b2754d686e927593deb8ee3ed17a24d749db81290c33836bcc9b7d93084c53d0744e81deb8b83d9b23565d6db4cb746eb15b20f7b806f0b5a02676d90260a61b00e9ec0b4b8bf07d5f93b3feda8299586c3936f743c764205de278c25a6fff98") perf_event_open(&(0x7f00000096c0)={0x1, 0x70, 0x3, 0xa8e, 0x1000, 0xe57a, 0x0, 0x6, 0x2100b, 0x2, 0x9, 0xdb1b, 0xfffffffffffffffa, 0xa7f8, 0x3, 0x2, 0x800, 0x800, 0x2, 0x0, 0x3f, 0x3, 0x8000000000000, 0x3, 0x20, 0x6, 0x3, 0xfffffffffffff318, 0xffffffffffff0001, 0xfffffffffffffffe, 0x12, 0x1, 0x101, 0x8, 0x100, 0x1, 0x3, 0x8, 0x0, 0x3ff, 0x7, @perf_bp={&(0x7f0000009680), 0x3}, 0x9, 0x6, 0xfffffffffffffff7, 0x0, 0x0, 0x49, 0xfffffffffffff3b8}, r10, 0xe, r5, 0x8) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000009880)={r12, &(0x7f0000009740)="8ba447000764036f17624e623896639a3e2456b901aedcdb4221cea83c3b2c94575967a34ec104bbebeaf6a6b50494e6763f41056d2ca84f906fa48d72590e81334926fab48e", &(0x7f00000097c0)=""/170}, 0x18) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r4, 0x2405, r6) bpf$PROG_LOAD(0x5, &(0x7f00000099c0)={0x7, 0x4, &(0x7f00000098c0)=@raw=[@ldst={0x3, 0x3, 0x6, 0xd, 0x7, 0x26}, @ldst={0x0, 0x2, 0x0, 0xa, 0x0, 0x4, 0xffffffffffffffff}], &(0x7f0000009900)='GPL\x00', 0x5, 0x5d, &(0x7f0000009940)=""/93, 0x41f00, 0x1, [], r13}, 0x48) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000009b40)={r8, &(0x7f0000009a40)="402c0b8b20e0ae84bb", &(0x7f0000009a80)=""/178}, 0x18) 2018/03/31 05:13:31 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x5, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x80000001}, [@jmp={0x5, 0x4, 0x7, 0xa, 0x0, 0x18, 0x1}], {0x95}}, &(0x7f0000000280)='syzkaller\x00', 0xff, 0xab, &(0x7f00000002c0)=""/171, 0x41100, 0x1}, 0x48) socketpair(0x7, 0x801, 0x3, &(0x7f0000000780)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000d40)={0x4, 0x0, [0x0, 0x0, 0x0, 0x0]}) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r1, 0x0, 0x7, 0x6e, &(0x7f0000000080)="3447f36cbc3563", &(0x7f00000000c0)=""/110}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0x0, 0x0}) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4982, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) recvmsg(r2, &(0x7f0000005180)={&(0x7f0000004ac0)=@can={0x0, 0x0}, 0x10, &(0x7f0000000800), 0x1f0, &(0x7f0000000040)=""/93, 0xfffffffffffffc1c}, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x1, 0x3, &(0x7f0000346fc8)=@framed={{0x18}, [], {0x95}}, &(0x7f0000000480)='GPL\x00', 0x0, 0x1a9, &(0x7f0000000b40)=""/251}, 0x15) mkdir(&(0x7f0000000680)='./file0\x00', 0x0) socketpair(0xa, 0x0, 0x9, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMUNATTACH(r6, 0x89e1, &(0x7f0000000700)={r2}) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='fuseblk\x00', 0x0, &(0x7f0000000100)) mount(&(0x7f0000df7000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='hugetlbfs\x00', 0x0, &(0x7f00000001c0)) socketpair$inet(0x2, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r8, &(0x7f00000007c0)={&(0x7f0000000140)=@pppoe={0x18, 0x0, {0x3, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, 'ip_vti0\x00'}}, 0x80, &(0x7f00000006c0)=[{&(0x7f00000001c0)="7726d56bf8f8907b663c07d9697287a472b3a307df44177e59bb7bc152e3984c2897bea7f29ab2de6024da59924673eb37b421b0084a6276c8", 0x39}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={r5, 0x50}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0xb, 0x17, &(0x7f0000000980)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x80000001}, [@generic={0x200, 0x0, 0x1, 0x3}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x9}, @jmp={0x5, 0x7, 0xf, 0x5, 0x7, 0x0, 0x4}, @map={0x18, 0x3, 0x1, 0x0, r7}, @exit={0x95}, @map={0x18, 0x7, 0x1, 0x0, r7}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x66d}, @ldst={0x0, 0x2, 0x2, 0x7, 0xe, 0xfffffffe}, @call={0x85, 0x0, 0x0, 0xd}, @generic={0x3, 0x2, 0x9, 0x1cd}], {0x95}}, &(0x7f0000000740)='syzkaller\x00', 0x9, 0xfb, &(0x7f0000000c40)=""/251, 0x40f00, 0x1, [], r4}, 0x48) recvmsg(0xffffffffffffffff, &(0x7f0000000b00)={&(0x7f0000000580)=@vsock, 0xfffffffffffffd4b, &(0x7f0000000600)=[{&(0x7f0000000880)=""/228, 0xe4}, {&(0x7f00000004c0)=""/133, 0x85}], 0x2, &(0x7f0000000a40)=""/140, 0x71}, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000100)=r5, 0x4) 2018/03/31 05:13:31 executing program 6 (fault-call:17 fault-nth:43): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x0, 0x101, 0x4, 0x0, 0x1, r0, 0x0, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r2 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)={0xffffffffffffffff}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r2, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x0, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0", 0xc9}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000280)={&(0x7f0000000680)='./file0\x00'}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r1}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r3) gettid() close(0xffffffffffffffff) 2018/03/31 05:13:31 executing program 4: mount(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='ncpfs\x00', 0x80802, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x50, &(0x7f0000000700)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780)=r0, 0x4) mount(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='./file0\x00', &(0x7f00000006c0)='btrfs\x00', 0x89402, &(0x7f0000000900)="e196efa3cb748d2a6600968b76295ff919bc3877b18eb8d265a35493fcf34fdc965cd5c837d2389c6e2ec6088abe8daaa8ca23f9298fc94dc26874bc4d4567afea1ca0879cdf21e915005a83e96b1002af29091d2176abbb7fec088a67f2e1390f32adaf2f252d24510870f8df7186936f4d88957eb8fcda78b7383a7d24db701d524557ee7324433e70d9ffa185098325f9e657d3c29cf6a35843cb96780269db1c735d55938af5c60e1e4ba25928697277b0fdf356b62399b4c8826d09bfca7d6078c19b4995195ea814b1bb40c0") ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0xffffffff) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6f3, 0x0, 0x6, 0x0, 0x0, 0xfffdffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x22, &(0x7f00000007c0)=ANY=[@ANYBLOB="18000000000000000000000000000000000000000020f37b176532826618e8210d55b6b9f796a5cf4309ac945b17b6ec55aad627fce3173f275427d49a02c531c5316326ec3569ef7771eee96dc62f79bb386acf26001097f7673e6b395ee0cac49bf5bbe2db74ffbe760e50b31e653a89e733b2832d3e4e73d9720448a1d74be25a5dbcc32519fc1400391454104d5b5d9b14c5560730768138a9a0e109f34a16cc067edc5d7a0b0912aa587035de0ad6624124ad9467ed6aac80ad02b778f8319fef183facaa39c4519babbd000000000000009d9d8436042fc1b8d6e779a1531ba51c8c8811c745b829a97e3e2d0f13ea630503c6a765fae62d43095c1669d81251d3a6718f867abdfb0b907d24394fd24b2ea273"], &(0x7f0000f6bffb)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000400)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000540)={r1, 0x50}, 0xfffffe74) close(r1) perf_event_open(&(0x7f0000348f88)={0x2, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x28, 0x2, 0x0, &(0x7f0000000000)={0x0}) mkdir(&(0x7f0000000100)='./file0\x00', 0x1000000000) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='selinuxfs\x00', 0x1000, &(0x7f0000000100)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='minix\x00', 0x10020, &(0x7f0000000240)) 2018/03/31 05:13:31 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x1, 0x3, &(0x7f0000002000)=@framed={{0x18}, [], {0x95, 0x71}}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0xc3, &(0x7f0000006f3d)=""/195}, 0x48) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000280)={&(0x7f0000000040)=@nfc_llcp, 0x80, &(0x7f0000000140)=[{&(0x7f00000000c0)=""/112, 0x70}], 0x1, &(0x7f0000000180)=""/240, 0xf0}, 0x2100) socketpair$inet(0x2, 0x80002, 0x10001, &(0x7f00000002c0)) 2018/03/31 05:13:31 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xc, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="85000000220000000700000000009b4095000000000000007555acacf2a88ee4688e7850eada417541a765d17f66818c4503036e8eb92f1a57647ffb62e1d6aa22549d1e4723ad77f31c852e6efbeda21fb2ee706172f4b4dca840b8451079e44273772cb144ca34826d49826b7947aafd69df6fd3fb3bbc79ef31e117139b05829ff345d8ea25"], &(0x7f0000000480)="73797a6b616c6c65720001be826e8f833152f795b4d9f4bc3ea582523aed371b084fccfc3d2ef2cbe65d30642ca8dcd0f8479be52e66937908f1d811248901009d9d4edb806d81189c0fbb6818d028546c35d3363d54db0db780f54977ae6359d617c1d233d8e18abfc75f9a76cd8e1f77583bc02f07a33de6f304e95db82fd4da55ebd25162df6f88e7d1bb0654ffb31e00896775d07e643294f42572c5c6afe73b327c265d3da17b9b836403a9848ed53b6a03675e3abe7fcbcc7f7e3e20a3247b3140d507ce0cac979cd37dc2fb7f0a6f3047c62b2b38196e9f5720f37c75293d4397af", 0x1, 0x99, &(0x7f000000d000)=""/153}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000200)={r0, 0x0, 0x36, 0xff6e, &(0x7f0000000240)="288b6671d7af52f647750501080089f30000000000005f2f66ad8769233d07f5b685c111af0a05a9854928c0c88e10fb6dff83b9c438", &(0x7f0000001800)=""/4096}, 0x28) 2018/03/31 05:13:31 executing program 2: socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000040)={0x7, 0x70, 0x1, 0xaabc, 0x2, 0x2, 0x0, 0xec, 0x4800, 0x1, 0x3a6b72c9, 0xffffffffffff8000, 0xfff, 0x7, 0x2, 0x7, 0xff, 0x1, 0x2, 0x9, 0x1, 0x0, 0x5, 0x75, 0x2, 0x7, 0x8, 0x4, 0x0, 0xdbce, 0xffff, 0xfaf, 0x1, 0xe7, 0xd0eb, 0x28a5, 0x9, 0x4, 0x0, 0x7, 0x2, @perf_config_ext={0x1, 0x8000}, 0x489, 0x6, 0xff, 0x0, 0x9d, 0x8, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f00000000c0)={0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000140)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r2 = getpid() r3 = perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x8, 0x4, 0x4, 0x1, 0x0, 0x401, 0x100, 0x7, 0xcfc0, 0x7, 0x0, 0x7, 0x30, 0x7, 0x7, 0xfff, 0x7, 0x9, 0xff, 0x9, 0xf, 0x0, 0x3, 0x100000000, 0x3, 0x8, 0xffff, 0x2, 0x3, 0xff, 0x6f, 0x3, 0x5, 0x800, 0x0, 0x0, 0x0, 0x9, 0x1, @perf_bp={&(0x7f0000000180), 0x1}, 0x11815, 0x9, 0x1, 0x1, 0x101, 0x5, 0x1e892fee}, r2, 0x9, r1, 0x1) r4 = perf_event_open(&(0x7f0000000280)={0x5, 0x70, 0xe00000000000, 0x9, 0x800, 0x6, 0x0, 0x7ff, 0x10200, 0xb, 0xe3, 0x5, 0x1, 0x4, 0x9b0f, 0x1f8a, 0x401, 0x1, 0xe975, 0x7, 0x437, 0x9, 0x7f, 0x20, 0x1, 0x2, 0x3, 0x5, 0x200, 0x1, 0x8, 0x401, 0x401, 0x2, 0x8, 0xfff, 0xf3c8, 0xf23, 0x0, 0x7fffffff, 0x0, @perf_bp={&(0x7f0000000240), 0x9}, 0x828, 0x3, 0x5, 0x1, 0x0, 0xc37, 0x6}, r2, 0x4, r1, 0x2) r5 = perf_event_open(&(0x7f0000000300)={0x4, 0x70, 0xff, 0x3, 0x7f, 0x7, 0x0, 0x40, 0x4a240, 0x2, 0xffffffffffffcc27, 0xb8, 0x2, 0x7, 0x9, 0x800, 0x3, 0x7d4d, 0xf7, 0xfffffffffffffffa, 0x9, 0x4, 0x3, 0x90be, 0x9, 0xfffffffffffffffc, 0x6, 0x3ff, 0xab6b, 0x8001, 0x5, 0x2, 0x9, 0x732, 0x400, 0x55000000000, 0x1ff, 0x6, 0x0, 0x0, 0x2, @perf_config_ext={0x6, 0xffffffff}, 0x40, 0x80000001, 0x7fff, 0x2, 0x1, 0x6, 0x5}, r2, 0xf, r4, 0xa) r6 = perf_event_open(&(0x7f00000003c0)={0x7, 0x70, 0xc87d, 0x6, 0x5, 0x80000001, 0x0, 0x3, 0x1, 0xb, 0xffffffff, 0x9, 0x584, 0x31b, 0x7, 0x2, 0x3, 0x544, 0x100000001, 0x9, 0x1, 0x100, 0x3, 0x1, 0x7, 0x0, 0x7, 0x5, 0xbb, 0x40, 0x7, 0x8, 0x81, 0xc5a, 0x0, 0x7, 0x1f, 0x815, 0x0, 0xffff, 0x2, @perf_bp={&(0x7f0000000380), 0x8}, 0x4, 0x5, 0xc95, 0x0, 0x7ff, 0x7b02, 0x7}, r2, 0x10, r1, 0xb) ioctl$PERF_EVENT_IOC_DISABLE(r3, 0x2401, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0x4) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = perf_event_open(&(0x7f0000000480)={0x7, 0x70, 0x7, 0xdbff, 0x3, 0x3f, 0x0, 0x8, 0x0, 0xc, 0x8, 0x0, 0xf43, 0x101, 0x6, 0x5, 0x6, 0x9, 0x200, 0xfffffffffffffffd, 0x4, 0x6, 0x6e, 0x20, 0x1b3, 0x1fe, 0x7ff, 0x3, 0x8000, 0x5, 0x0, 0x0, 0x0, 0x5, 0x22d2, 0x401, 0x68, 0xa1ce, 0x0, 0x4, 0x0, @perf_config_ext={0x2fb, 0x4}, 0x2000, 0xd33, 0x6, 0x697c4c7d75b7b6da, 0x171f, 0x9, 0x9}, r2, 0x6, r5, 0x1) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x9, 0x6, 0x101, 0x8, 0x0, 0x200, 0x2000, 0xf, 0x0, 0x5, 0x6, 0x3, 0x2, 0x0, 0x8001, 0x8, 0x3, 0x5, 0x17, 0x7, 0x4, 0x400, 0xffffffff, 0x7, 0x8000, 0x2, 0x100, 0x0, 0x7, 0x95de, 0x2, 0x1, 0x2, 0xd432, 0x3ff, 0x8599, 0x0, 0x3ff, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x10080, 0x7, 0xe7e, 0x7, 0x5, 0x7, 0x9}, r2, 0x0, r3, 0x8) close(r7) ioctl$PERF_EVENT_IOC_DISABLE(r9, 0x2401, 0x1) r10 = gettid() ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f00000005c0)={r0}) ioctl$sock_kcm_SIOCKCMUNATTACH(r11, 0x89e1, &(0x7f0000000600)={r8}) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000640)) r12 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)={0x4, 0x7, 0x7f, 0x9787, 0x1c, 0xffffffffffffffff, 0x5}, 0x2c) recvmsg$kcm(r11, &(0x7f0000009440)={&(0x7f0000009300)=@can={0x0, 0x0}, 0x80, &(0x7f00000093c0)=[{&(0x7f0000009380)=""/16, 0x10}], 0x1, &(0x7f0000009400)=""/18, 0x12, 0x3bc1}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000009480)={0xf, 0x13, &(0x7f00000006c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [@ldst={0x3, 0x2, 0x1, 0x2, 0x7, 0xffffffff, 0x4}, @map={0x18, 0x0, 0x1, 0x0, r12}, @alu={0x7, 0x5, 0xf, 0x6, 0xe, 0x2, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4}, @jmp={0x5, 0x7a4c, 0x0, 0x3, 0x9, 0xffffffff, 0xfffffffffffffff0}, @alu={0x4, 0x20, 0x9, 0x9, 0x5, 0xfffffffe, 0x4}, @jmp={0x5, 0x81, 0x9, 0x7, 0x6, 0xfffffffe, 0xfffffffffffffff0}, @jmp={0x5, 0x3, 0x3, 0x0, 0x2, 0x2, 0xffffffffffffffff}], {0x95}}, &(0x7f0000000780)='GPL\x00', 0x4, 0x77, &(0x7f00000007c0)=""/119, 0x0, 0x1, [], r13}, 0x48) mount(&(0x7f0000009500)='./file0\x00', &(0x7f0000009540)='./file0\x00', &(0x7f0000009580)='cramfs\x00', 0x5020, &(0x7f00000095c0)="22f464f8fef2b95976576e903efe99229584aaf55fa0d91223905d4a68c0c7d18bf26de6fec0660b0c36945200da04f802d9059dd5f6d2f0eca450f4fdd46ed2b411588d802f0d1d02be65816332b2754d686e927593deb8ee3ed17a24d749db81290c33836bcc9b7d93084c53d0744e81deb8b83d9b23565d6db4cb746eb15b20f7b806f0b5a02676d90260a61b00e9ec0b4b8bf07d5f93b3feda8299586c3936f743c764205de278c25a6fff98") perf_event_open(&(0x7f00000096c0)={0x1, 0x70, 0x3, 0xa8e, 0x1000, 0xe57a, 0x0, 0x6, 0x2100b, 0x2, 0x9, 0xdb1b, 0xfffffffffffffffa, 0xa7f8, 0x3, 0x2, 0x800, 0x800, 0x2, 0x0, 0x3f, 0x3, 0x8000000000000, 0x3, 0x20, 0x6, 0x3, 0xfffffffffffff318, 0xffffffffffff0001, 0xfffffffffffffffe, 0x12, 0x1, 0x101, 0x8, 0x100, 0x1, 0x3, 0x8, 0x0, 0x3ff, 0x7, @perf_bp={&(0x7f0000009680), 0x3}, 0x9, 0x6, 0xfffffffffffffff7, 0x0, 0x0, 0x49, 0xfffffffffffff3b8}, r10, 0xe, r5, 0x8) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000009880)={r12, &(0x7f0000009740)="8ba447000764036f17624e623896639a3e2456b901aedcdb4221cea83c3b2c94575967a34ec104bbebeaf6a6b50494e6763f41056d2ca84f906fa48d72590e81334926fab48e", &(0x7f00000097c0)=""/170}, 0x18) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r4, 0x2405, r6) bpf$PROG_LOAD(0x5, &(0x7f00000099c0)={0x7, 0x4, &(0x7f00000098c0)=@raw=[@ldst={0x3, 0x3, 0x6, 0xd, 0x7, 0x26}, @ldst={0x0, 0x2, 0x0, 0xa, 0x0, 0x4, 0xffffffffffffffff}], &(0x7f0000009900)='GPL\x00', 0x5, 0x5d, &(0x7f0000009940)=""/93, 0x41f00, 0x1, [], r13}, 0x48) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000009b40)={r8, &(0x7f0000009a40)="402c0b8b20e0ae84bb", &(0x7f0000009a80)=""/178}, 0x18) 2018/03/31 05:13:31 executing program 3: socketpair(0xc, 0x5, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x20) getpid() r2 = gettid() r3 = perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x3, 0xc85, 0x3ff, 0x1, 0x0, 0x401, 0x0, 0x1, 0x712000000000000, 0x7, 0x56d29a0f, 0x1, 0xffffffff80000001, 0x2, 0x20, 0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x9, 0x5, 0x1, 0x3e69b47c, 0x5, 0x7fff, 0xf981, 0x5, 0x4f, 0x1000, 0x0, 0x1, 0x0, 0x0, 0x4, 0xffffffff, 0x0, 0x2, 0x2, @perf_config_ext={0x0, 0x8}, 0x20200, 0xf88, 0x0, 0x1, 0x92d5, 0x1, 0x5}, r2, 0xd, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000a40)=r0, 0x4) mount(&(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000280)='./file0/file1\x00', &(0x7f00000006c0)='efs\x00', 0x8, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000380)='./file0/file1\x00', r1}, 0xd) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00', 0x0, 0x10}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000a80)={&(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x8}, 0x10) perf_event_open(&(0x7f0000000480)={0x1c218abbd1b2c600, 0x70, 0x5, 0x0, 0xe9d, 0x9, 0x0, 0x80000001, 0x1408, 0x0, 0x10001, 0x1ff, 0xfff, 0x80000000, 0x5, 0x3, 0x81, 0x6, 0x9151, 0x40, 0x2, 0xfda, 0x7, 0x3, 0x1, 0x100000000, 0x4, 0x2, 0xffffffffffffe17f, 0x0, 0x1, 0x3, 0x1, 0x6, 0x7, 0x2, 0x3, 0x7fff, 0x0, 0xfffffffffffffffb, 0x1, @perf_bp={&(0x7f0000000440), 0xf}, 0x1000, 0x1000, 0xb36, 0x7, 0x0, 0x8a, 0x40}, r2, 0xd, r3, 0x0) r5 = perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500)={0x0, r4, 0x5, 0x1}, 0x14) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000400)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000d80)="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", 0x0, 0x0) recvmsg$kcm(r4, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f00000020c0)=""/4096, 0x1000}, {&(0x7f0000001980)=""/59, 0x3b}, {&(0x7f00000019c0)=""/66, 0x42}], 0x3, &(0x7f0000001a80)=""/195, 0xc3}, 0x2102) mount(&(0x7f0000000b00)='./file1\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000001d40)='reiserfs\x00', 0x100040, 0x0) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fusectl\x00', 0x4000, 0x0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000001f80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) perf_event_open(&(0x7f000000a000)={0x0, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r5, 0xc008240a, &(0x7f0000001100)=ANY=[@ANYBLOB="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"]) mkdir(&(0x7f00000001c0)='./file0\x00', 0x4) sendmsg(r6, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000500)}], 0x1, 0x0, 0x0, 0x8000}, 0x1) recvmsg$kcm(r1, &(0x7f0000000640)={&(0x7f0000000580)=@l2, 0x80, &(0x7f0000000600)=[{&(0x7f0000000800)=""/175, 0xaf}], 0x1, &(0x7f00000008c0)=""/186, 0xba, 0x5}, 0x40) mount(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000c00)='hostfs\x00', 0x806beed795c5a2e2, 0x0) 2018/03/31 05:13:31 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0xfd, 0x6, 0x2, 0x0, 0xffffffffffffff9c}, 0x2c) r1 = getpid() r2 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x80}, r1, 0xfffffffffffffffd, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0xc377) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x139, &(0x7f00000007c0), 0x0, &(0x7f0000000100)=""/63, 0x3f, 0xfffffffffffffffc}, 0xfffffffffffffffe) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000140)=0x6) r4 = gettid() mkdir(&(0x7f000075bff8)='./file0\x00', 0x0) socketpair(0x10, 0x800, 0x0, &(0x7f0000001100)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = perf_event_open(&(0x7f0000001340)={0x7, 0x70, 0xfffffffffffffff9, 0x9, 0x5, 0xff, 0x0, 0x7fff, 0x0, 0x1, 0x400003, 0x6, 0x457, 0x3, 0x5, 0x3, 0x9, 0xb0, 0x40, 0x1, 0x1dc, 0x2, 0x0, 0x8001, 0x1, 0x0, 0x6, 0x4, 0x0, 0xff, 0x9, 0x7fff, 0x100000000, 0x8, 0x7, 0x6ad, 0xffffffffffffff14, 0x9, 0x0, 0x39, 0x4, @perf_config_ext={0x6, 0x80000000}, 0x400, 0xfffffffffffffff8, 0xffffffffffffff81, 0x3, 0x2, 0x6, 0xb75}, r4, 0x7, r6, 0x8) recvmsg$kcm(r5, &(0x7f0000001300)={0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000001140)=""/131, 0x83}], 0x1, &(0x7f0000001240)=""/134, 0x86}, 0x2000) perf_event_open(&(0x7f000000a000)={0x1, 0x78, 0x0, 0x0, 0xb140, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x800000, 0x0, @perf_bp={&(0x7f0000000000), 0x800000}, 0x0, 0x20000000, 0x6, 0x400010, 0x100}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000002700)='./file2\x00', 0x3) bpf$OBJ_GET_PROG(0x7, &(0x7f0000002680)={&(0x7f0000002640)='./file1\x00', 0x0, 0x8}, 0x10) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)='sysv\x00', 0x0, &(0x7f0000000100)="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") mount(&(0x7f00009f8000)='./file0\x00', &(0x7f0000a3bff8)='./file0\x00', &(0x7f00000026c0)='nfs4\x00', 0x0, &(0x7f000000a000)) socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f0000000180)) perf_event_open(&(0x7f00000001c0)={0x3, 0x70, 0x4594dab1, 0x0, 0xc600000000000000, 0x1, 0x0, 0xd53f, 0x80008, 0x0, 0x8001, 0x44d1, 0x3, 0x1, 0x10001, 0x100, 0x40, 0x7, 0x15c000000000000, 0x0, 0x42, 0x7, 0x1, 0x8, 0x1, 0x7, 0x0, 0x81, 0x3, 0x5, 0x4, 0x1, 0x5, 0x7a52, 0xfffffffffffffff8, 0x1, 0x0, 0xffff, 0x0, 0x2, 0x1, @perf_config_ext={0x1ff}, 0x430, 0x0, 0x100000000, 0x1, 0x0, 0x890b, 0x80000000}, r4, 0x5, r3, 0x1) recvmsg$kcm(r6, &(0x7f0000002600)={0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000013c0)=""/113, 0x71}, {&(0x7f0000001440)=""/4096, 0x1000}, {&(0x7f0000002440)=""/15, 0xf}, {&(0x7f0000002480)=""/227, 0xe3}], 0x4, &(0x7f00000025c0)=""/61, 0x3d, 0x7fffffff}, 0x0) perf_event_open(&(0x7f0000002780)={0x4, 0x70, 0x9, 0x3, 0x2, 0x0, 0x0, 0x5, 0x40000, 0x4, 0x3, 0x8, 0x0, 0x4, 0x7fffffff, 0x63, 0x3, 0x80, 0x9, 0x468e, 0x10000, 0x11, 0x5, 0xff, 0x20, 0x20, 0x2, 0x40, 0x400, 0x0, 0x5, 0x557, 0x9, 0x9e, 0x3ff, 0x1, 0x0, 0x1, 0x0, 0x3, 0x4, @perf_bp={&(0x7f0000002740)}, 0x0, 0x1, 0x4, 0x2, 0x401, 0x6, 0x1f}, r1, 0xc, r7, 0x1) perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r0, &(0x7f0000000040), &(0x7f0000000100)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000001140)={r0, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) 2018/03/31 05:13:31 executing program 4: mount(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='ncpfs\x00', 0x80802, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x50, &(0x7f0000000700)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780)=r0, 0x4) mount(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='./file0\x00', &(0x7f00000006c0)='btrfs\x00', 0x89402, &(0x7f0000000900)="e196efa3cb748d2a6600968b76295ff919bc3877b18eb8d265a35493fcf34fdc965cd5c837d2389c6e2ec6088abe8daaa8ca23f9298fc94dc26874bc4d4567afea1ca0879cdf21e915005a83e96b1002af29091d2176abbb7fec088a67f2e1390f32adaf2f252d24510870f8df7186936f4d88957eb8fcda78b7383a7d24db701d524557ee7324433e70d9ffa185098325f9e657d3c29cf6a35843cb96780269db1c735d55938af5c60e1e4ba25928697277b0fdf356b62399b4c8826d09bfca7d6078c19b4995195ea814b1bb40c06210") ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0xffffffff) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6f3, 0x0, 0x6, 0x0, 0x0, 0xfffdffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x22, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000f6bffb)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000400)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000540)={r1, 0x50}, 0xfffffe74) close(r1) perf_event_open(&(0x7f0000348f88)={0x2, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x28, 0x2, 0x0, &(0x7f0000000000)={0x0}) mkdir(&(0x7f0000000100)='./file0\x00', 0x1000000000) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='selinuxfs\x00', 0x1000, &(0x7f0000000100)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='minix\x00', 0x10020, &(0x7f0000000240)) 2018/03/31 05:13:31 executing program 1: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000001fc0)) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000002300)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r1, &(0x7f00000024c0)={&(0x7f0000002040)=@un=@file={0x0, './file0\x00'}, 0x80, &(0x7f0000001f40)=[{&(0x7f00000020c0)="73c7575b94a72990e177f86ed4835a72a65c1a6c6831eeb0c48163a47ab63bcb605c8450cc4798ff6521c2aa722d1a7105c8a07e6c", 0x35}], 0x1, &(0x7f0000002500)=ANY=[], 0x0, 0x40000}, 0x20000000) r2 = gettid() r3 = perf_event_open(&(0x7f0000001ac0)={0x1, 0x70, 0xffffffff, 0x835, 0x7, 0xffffffffffffff5f, 0x0, 0x1000, 0x42000, 0x3, 0x8, 0x80, 0x1, 0x4, 0x100000001, 0x9, 0xff, 0x8, 0x1000, 0x7, 0x7f, 0x200, 0xb715, 0x3, 0x7fffffff, 0xf0a, 0x40, 0x8000, 0x8, 0x7, 0xffffffffffffff74, 0x4, 0x6, 0x100, 0x7, 0x335, 0x3ff, 0x58, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000001a80), 0xe}, 0x244, 0x80000000, 0x82, 0x7, 0x5, 0x3, 0x80000001}, r2, 0xd, r0, 0x8) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000200)='mqueue\x00', 0x8000, &(0x7f000000a000)) r4 = getpid() bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x3, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x5, 0x3c}, [], {0x95}}, &(0x7f00000000c0)='GPL\x00', 0x78549241, 0x2a9, &(0x7f0000000000)=""/153}, 0x48) perf_event_open(&(0x7f0000001a00)={0x0, 0x70, 0x0, 0x8, 0x0, 0x3, 0x0, 0xb8, 0x1000, 0x0, 0x3, 0x4, 0xfff, 0x4, 0x4dae, 0x40, 0x100000001, 0x6, 0x0, 0x0, 0x3, 0x753c, 0x6, 0x100, 0x1de, 0x6, 0x4, 0x1, 0x6, 0x4, 0x7, 0x3, 0x7fff, 0x80000000, 0x3, 0x8, 0x81, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x7, 0x4}, 0x801, 0x400, 0x1, 0x4, 0x1, 0x9, 0x80000001}, r4, 0x7, r0, 0xb) r5 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000004000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_icmp(0xa, 0x2, 0x3a, &(0x7f0000001880)) mount(&(0x7f0000001c00)='./file0\x00', &(0x7f0000001c40)='./file0\x00', &(0x7f0000001c80)='devpts\x00', 0x40, &(0x7f0000001cc0)="be623dfd58807ac0b2f86f052863a5f30adc0bce173ebcf648cefd7d64732aeb5b94e6af3ab33e53669ba6d304d067dad4b1ff3ed87f18fd170aac904e8f105e80e22881717c98752a9cd7cfb06d102877e3b36b2624d22427331755a9514b225d25999ed605ffe4188630db2e7ddcc57f6316b60c4f3845d9dfcbbde5e49af627b48d7c9bd743b536de31a9ba3010cb6714c9b90a50537be55ca12a18e6541bff5a82d293e7734ea9c90707899663bd96b3bcce5887bf0bd35963c5adc39ddcb6f2a0a02b01661242046cb54ef1aec5a486b69e006305064124867bf79f4dc11798e214b61575168b79887122e0a3461f703c077f902c0a") socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r6, &(0x7f0000001800)={&(0x7f0000000240)=@alg, 0x80, &(0x7f0000000740)=[{&(0x7f00000002c0)=""/83, 0x53}, {&(0x7f0000000340)=""/27, 0x1b}, {&(0x7f0000000380)}, {&(0x7f00000003c0)=""/40, 0x28}, {&(0x7f0000000400)=""/144, 0x90}, {&(0x7f00000004c0)=""/200, 0xc8}, {&(0x7f00000005c0)=""/60, 0x3c}, {&(0x7f0000000600)=""/105, 0x69}, {&(0x7f0000000680)=""/127, 0x7f}, {&(0x7f0000000700)=""/8, 0x8}], 0xa, &(0x7f0000000800)=""/4096, 0x1000}, 0x10000) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000002340)=0xf60) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000003900)={&(0x7f0000003400)=@can={0x0, 0x0}, 0x80, &(0x7f0000003840)=[{&(0x7f0000003480)=""/194, 0xc2}, {&(0x7f0000003580)=""/250, 0xfa}, {&(0x7f0000003680)=""/100, 0x64}, {&(0x7f0000003700)=""/14, 0xe}, {&(0x7f0000003740)=""/159, 0x9f}, {&(0x7f0000003800)=""/15, 0xf}], 0x6, &(0x7f00000000c0)=""/29, 0x1d, 0x5}, 0x3) bpf$PROG_LOAD(0x5, &(0x7f0000003940)={0x4, 0x9, &(0x7f00000023c0)=ANY=[@ANYBLOB="1800000003ec787e0c00fcffffff0000000000000000000803000101000000000000040000003d01f0fff0ff4ba59f560000000000009d000000000017d24eddc0df9dfc9d964bcf938550688b585fd1a03860d184d9ee6ad2e2591196f31e187d23936db6f9c426c66f785cd5170de3f660e72af0c8affc5d3897c26a28f8acabfd1e0259c88accd47586930d542cab875b4b2fe275bbc115abd2f1e6"], &(0x7f0000000380)='GPL\x00', 0xf172, 0x4b, &(0x7f00000018c0)=""/75, 0x41f00, 0x1, [], r7}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000002480)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001f00)={0xffffffffffffffff, 0x0, 0xf6, 0x22, &(0x7f0000001dc0)="9ef9482ea02fd36d0a768986a7ebe7a627dc88937e7073e3521858dfa0d5e02f571a01cfdfa76e048e5f956ea5da60b90e02a6c3d3687ed61ec9ab5b682c02498bddef38de9ce8c753e41e78f414d16202a033b6c7752711a5f56924e7846d6dcde2f71026e1eb0319b5e60f6b1ec67fca31c3cf1691d3af91a19f56be5a10ff337a53ba13dd3d75e1555211954b92ec0082d02b7b4cdddc021cbe84e4af8f20788977e3416918843e6c92b2ebf7b8b33ecbd4c7c9a9d5036c3e3e538748a32f1a28eb77818ca1878ffdd445dcdb8a40e6221e0fc474428449dfe93c62bbc69996aa9b34488c1da4f6f7c2275305a6a4fb256c1a516d", &(0x7f0000001ec0)=""/34, 0x1f, 0x1}, 0x28) close(r5) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000001bc0)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x3441, &(0x7f0000000080)) mount(&(0x7f00000021c0)='./file0/file0\x00', &(0x7f0000002200)='./file0/file0\x00', &(0x7f0000002240)='fuse\x00', 0x2000000, &(0x7f0000002280)="9b3923bfddc346e9fa2aeaffae6ca386d8d50ba83ab72218340d3c30c045a89ac016797652ba04f1a203cfceccb458dbfd9fd03c4a80ef9a40dc7a4f24b6619d04a58186466fd8465757d9ee053c082cdfa957e7efab6191761847cca59c017493ef5e3d22432cf0b4ebef") ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000001940)=ANY=[@ANYBLOB="07000000000000000000000000000000000000000000000000000000000000000000000067eb0ecf1c127df7274c9ea1675e02fa4ffd89aa7e339417beb7e59875644dd1e3a690110400bc751bb0435977d90fcbb2b83c27812d818991d125e9c0f199be2bc7f01aa0a5cb9b76536f567f03f062994da292b6db0000000000000000000000000000000000000000000000000000000000000000"]) mount(&(0x7f0000001b40)='./file0\x00', &(0x7f0000001b80)='./file0/file0\x00', &(0x7f0000002100)='vfat\x00', 0x0, &(0x7f0000002140)="98980e21ac8b46c0b7bedeee39e6bd9ae4088d6ab47dc9dc76a39e299ce3783aa33e482e450484961fd3e3c5b178fafbe54440e19512ea4298652ed129d4241d9d116d8a5c2b931d350f0c989f8a288fc9e56c") mount(&(0x7f0000df7000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='hugetlbfs\x00', 0x200, &(0x7f00000001c0)) mkdir(&(0x7f00000004c0)='./file0/file0\x00', 0x0) socketpair$inet(0x2, 0x0, 0x1f, &(0x7f0000000080)) 2018/03/31 05:13:31 executing program 7: r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x39, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x7f, 0x7, 0x5, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x6, 0x7ff, 0x9, 0x7, 0x1, r1, 0x200}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', r1}, 0x10) r2 = getpid() perf_event_open(&(0x7f0000000140)={0x6, 0x70, 0x8, 0x2, 0x6, 0x5b93, 0x0, 0x8, 0x52000, 0x1, 0x9, 0x9926, 0x100000001, 0x2e0e, 0x401, 0x1ff, 0x10000, 0x80000001, 0xff, 0x8, 0x5, 0x9, 0x5, 0x7, 0x40, 0x3, 0x0, 0x10000, 0x200, 0xfffffffffffff2e3, 0xffffffff, 0x9, 0x3, 0xff, 0x9, 0x0, 0x92, 0x1ff, 0x0, 0xffff, 0x0, @perf_bp={&(0x7f0000000100), 0x2}, 0x482, 0x310, 0x9, 0x7, 0xb0, 0x4b3, 0x181a}, r2, 0xc, r0, 0x0) 2018/03/31 05:13:31 executing program 2: socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000040)={0x7, 0x70, 0x1, 0xaabc, 0x2, 0x2, 0x0, 0xec, 0x4800, 0x1, 0x3a6b72c9, 0xffffffffffff8000, 0xfff, 0x7, 0x2, 0x7, 0xff, 0x1, 0x2, 0x9, 0x1, 0x0, 0x5, 0x75, 0x2, 0x7, 0x8, 0x4, 0x0, 0xdbce, 0xffff, 0xfaf, 0x1, 0xe7, 0xd0eb, 0x28a5, 0x9, 0x4, 0x0, 0x7, 0x2, @perf_config_ext={0x1, 0x8000}, 0x489, 0x6, 0xff, 0x0, 0x9d, 0x8, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f00000000c0)={0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000140)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r2 = getpid() r3 = perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x8, 0x4, 0x4, 0x1, 0x0, 0x401, 0x100, 0x7, 0xcfc0, 0x7, 0x0, 0x7, 0x30, 0x7, 0x7, 0xfff, 0x7, 0x9, 0xff, 0x9, 0xf, 0x0, 0x3, 0x100000000, 0x3, 0x8, 0xffff, 0x2, 0x3, 0xff, 0x6f, 0x3, 0x5, 0x800, 0x81, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000180), 0x1}, 0x11815, 0x9, 0x1, 0x1, 0x101, 0x5, 0x1e892fee}, r2, 0x9, r1, 0x1) r4 = perf_event_open(&(0x7f0000000280)={0x5, 0x70, 0xe00000000000, 0x9, 0x800, 0x6, 0x0, 0x7ff, 0x10200, 0xb, 0xe3, 0x5, 0x1, 0x4, 0x9b0f, 0x1f8a, 0x401, 0x1, 0xe975, 0x7, 0x437, 0x9, 0x7f, 0x20, 0x1, 0x2, 0x3, 0x5, 0x200, 0x1, 0x8, 0x401, 0x401, 0x2, 0x8, 0xfff, 0xf3c8, 0xf23, 0x0, 0x7fffffff, 0x0, @perf_bp={&(0x7f0000000240), 0x9}, 0x828, 0x3, 0x5, 0x1, 0x0, 0xc37, 0x6}, r2, 0x4, r1, 0x2) r5 = perf_event_open(&(0x7f0000000300)={0x4, 0x70, 0xff, 0x3, 0x7f, 0x7, 0x0, 0x40, 0x4a240, 0x2, 0xffffffffffffcc27, 0xb8, 0x2, 0x7, 0x9, 0x800, 0x3, 0x7d4d, 0xf7, 0xfffffffffffffffa, 0x9, 0x4, 0x3, 0x90be, 0x9, 0xfffffffffffffffc, 0x6, 0x3ff, 0xab6b, 0x8001, 0x5, 0x2, 0x9, 0x732, 0x400, 0x55000000000, 0x1ff, 0x6, 0x0, 0x0, 0x2, @perf_config_ext={0x6, 0xffffffff}, 0x40, 0x80000001, 0x7fff, 0x2, 0x1, 0x6, 0x5}, r2, 0xf, r4, 0xa) r6 = perf_event_open(&(0x7f00000003c0)={0x7, 0x70, 0xc87d, 0x6, 0x5, 0x80000001, 0x0, 0x3, 0x1, 0xb, 0xffffffff, 0x9, 0x584, 0x31b, 0x7, 0x2, 0x3, 0x544, 0x100000001, 0x9, 0x1, 0x100, 0x3, 0x1, 0x7, 0x0, 0x7, 0x5, 0xbb, 0x40, 0x7, 0x8, 0x81, 0xc5a, 0x0, 0x7, 0x1f, 0x815, 0x0, 0xffff, 0x2, @perf_bp={&(0x7f0000000380), 0x8}, 0x4, 0x5, 0xc95, 0x0, 0x7ff, 0x7b02, 0x7}, r2, 0x10, r1, 0xb) ioctl$PERF_EVENT_IOC_DISABLE(r3, 0x2401, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0x4) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = perf_event_open(&(0x7f0000000480)={0x7, 0x70, 0x7, 0xdbff, 0x3, 0x3f, 0x0, 0x8, 0x0, 0xc, 0x8, 0x0, 0xf43, 0x101, 0x6, 0x5, 0x6, 0x9, 0x200, 0xfffffffffffffffd, 0x4, 0x6, 0x6e, 0x20, 0x1b3, 0x1fe, 0x7ff, 0x3, 0x8000, 0x5, 0x0, 0x0, 0x0, 0x5, 0x22d2, 0x401, 0x68, 0xa1ce, 0x0, 0x4, 0x0, @perf_config_ext={0x2fb, 0x4}, 0x2000, 0xd33, 0x6, 0x697c4c7d75b7b6da, 0x171f, 0x9, 0x9}, r2, 0x6, r5, 0x1) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x9, 0x6, 0x101, 0x8, 0x0, 0x200, 0x2000, 0xf, 0x0, 0x5, 0x6, 0x3, 0x2, 0x0, 0x8001, 0x8, 0x3, 0x5, 0x17, 0x7, 0x4, 0x400, 0xffffffff, 0x7, 0x8000, 0x2, 0x100, 0x0, 0x7, 0x95de, 0x2, 0x1, 0x2, 0xd432, 0x3ff, 0x8599, 0x0, 0x3ff, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x10080, 0x7, 0xe7e, 0x7, 0x5, 0x7, 0x9}, r2, 0x0, r3, 0x8) close(r7) ioctl$PERF_EVENT_IOC_DISABLE(r9, 0x2401, 0x1) r10 = gettid() ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f00000005c0)={r0}) ioctl$sock_kcm_SIOCKCMUNATTACH(r11, 0x89e1, &(0x7f0000000600)={r8}) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000640)) r12 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)={0x4, 0x7, 0x7f, 0x9787, 0x1c, 0xffffffffffffffff, 0x5}, 0x2c) recvmsg$kcm(r11, &(0x7f0000009440)={&(0x7f0000009300)=@can={0x0, 0x0}, 0x80, &(0x7f00000093c0)=[{&(0x7f0000009380)=""/16, 0x10}], 0x1, &(0x7f0000009400)=""/18, 0x12, 0x3bc1}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000009480)={0xf, 0x13, &(0x7f00000006c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [@ldst={0x3, 0x2, 0x1, 0x2, 0x7, 0xffffffff, 0x4}, @map={0x18, 0x0, 0x1, 0x0, r12}, @alu={0x7, 0x5, 0xf, 0x6, 0xe, 0x2, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4}, @jmp={0x5, 0x7a4c, 0x0, 0x3, 0x9, 0xffffffff, 0xfffffffffffffff0}, @alu={0x4, 0x20, 0x9, 0x9, 0x5, 0xfffffffe, 0x4}, @jmp={0x5, 0x81, 0x9, 0x7, 0x6, 0xfffffffe, 0xfffffffffffffff0}, @jmp={0x5, 0x3, 0x3, 0x0, 0x2, 0x2, 0xffffffffffffffff}], {0x95}}, &(0x7f0000000780)='GPL\x00', 0x4, 0x77, &(0x7f00000007c0)=""/119, 0x0, 0x1, [], r13}, 0x48) mount(&(0x7f0000009500)='./file0\x00', &(0x7f0000009540)='./file0\x00', &(0x7f0000009580)='cramfs\x00', 0x5020, &(0x7f00000095c0)="22f464f8fef2b95976576e903efe99229584aaf55fa0d91223905d4a68c0c7d18bf26de6fec0660b0c36945200da04f802d9059dd5f6d2f0eca450f4fdd46ed2b411588d802f0d1d02be65816332b2754d686e927593deb8ee3ed17a24d749db81290c33836bcc9b7d93084c53d0744e81deb8b83d9b23565d6db4cb746eb15b20f7b806f0b5a02676d90260a61b00e9ec0b4b8bf07d5f93b3feda8299586c3936f743c764205de278c25a6fff98") perf_event_open(&(0x7f00000096c0)={0x1, 0x70, 0x3, 0xa8e, 0x1000, 0xe57a, 0x0, 0x6, 0x2100b, 0x2, 0x9, 0xdb1b, 0xfffffffffffffffa, 0xa7f8, 0x3, 0x2, 0x800, 0x800, 0x2, 0x0, 0x3f, 0x3, 0x8000000000000, 0x3, 0x20, 0x6, 0x3, 0xfffffffffffff318, 0xffffffffffff0001, 0xfffffffffffffffe, 0x12, 0x1, 0x101, 0x8, 0x100, 0x1, 0x3, 0x8, 0x0, 0x3ff, 0x7, @perf_bp={&(0x7f0000009680), 0x3}, 0x9, 0x6, 0xfffffffffffffff7, 0x0, 0x0, 0x49, 0xfffffffffffff3b8}, r10, 0xe, r5, 0x8) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000009880)={r12, &(0x7f0000009740)="8ba447000764036f17624e623896639a3e2456b901aedcdb4221cea83c3b2c94575967a34ec104bbebeaf6a6b50494e6763f41056d2ca84f906fa48d72590e81334926fab48e", &(0x7f00000097c0)=""/170}, 0x18) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r4, 0x2405, r6) bpf$PROG_LOAD(0x5, &(0x7f00000099c0)={0x7, 0x4, &(0x7f00000098c0)=@raw=[@ldst={0x3, 0x3, 0x6, 0xd, 0x7, 0x26}, @ldst={0x0, 0x2, 0x0, 0xa, 0x0, 0x4, 0xffffffffffffffff}], &(0x7f0000009900)='GPL\x00', 0x5, 0x5d, &(0x7f0000009940)=""/93, 0x41f00, 0x1, [], r13}, 0x48) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000009b40)={r8, &(0x7f0000009a40)="402c0b8b20e0ae84bb", &(0x7f0000009a80)=""/178}, 0x18) 2018/03/31 05:13:31 executing program 7: r0 = perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x3, 0x3, 0x4, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)={r1}) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0xfff) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair(0x4, 0x1, 0x5, &(0x7f0000000100)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) socketpair(0x6, 0x2, 0x1, &(0x7f0000000400)={0xffffffffffffffff}) r5 = getpid() perf_event_open(&(0x7f00000002c0)={0x8000000000000001, 0x70, 0x3f, 0x9, 0x100000000, 0xff, 0x0, 0x247, 0x0, 0x8, 0x8, 0x47ff, 0x2, 0x9, 0x9, 0xa66b, 0x6, 0x7e, 0x8, 0xa, 0xfffffffffffff2b7, 0x0, 0x2, 0x2, 0x0, 0x71, 0xfffffffffffffffe, 0x254e, 0x3, 0x8, 0x1000, 0x2, 0x401, 0x7, 0x3c5, 0x5, 0x1ff, 0x3, 0x0, 0x8, 0x2, @perf_config_ext={0x1f, 0x8d9}, 0x20000, 0x6, 0x100000000, 0x3, 0x800, 0x8, 0x4}, r5, 0x1, r2, 0x2) perf_event_open(&(0x7f000025c000)={0x5, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = gettid() perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7, 0xfff, 0x100000001, 0xfffffffffffffffb, 0x0, 0x8001, 0x0, 0x1, 0x0, 0xfffffffffffffff9, 0x0, 0x9, 0x9, 0x5, 0x8, 0x1, 0x8106, 0x1, 0x14000000000, 0x80000000, 0x1, 0x5, 0x0, 0x40, 0x2839, 0x1d, 0x800, 0x7, 0x8, 0x3, 0x5, 0x7, 0x8, 0x1, 0x3, 0x1, 0x0, 0x758, 0x4, @perf_bp={&(0x7f00000001c0), 0x4}, 0x801, 0x4, 0xff, 0x6, 0x3, 0x8, 0x3}, r6, 0x2, r3, 0x3) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f00000000c0)='user\x00') perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, @perf_bp, 0x8010000200000004, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, &(0x7f0000000080)) mount(&(0x7f0000dba000)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000000380)='nfs\x00', 0x0, &(0x7f000000a000)) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f00000003c0)={0xffffffffffffff9c}) recvmsg$kcm(r7, &(0x7f0000004980)={&(0x7f0000003700)=@generic, 0x80, &(0x7f0000004840)=[{&(0x7f0000003780)=""/4096, 0x1000}, {&(0x7f0000004780)=""/131, 0x83}], 0x2, &(0x7f0000004880)=""/251, 0xfb, 0x2}, 0x2000) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mkdir(&(0x7f0000000340)='./file0\x00', 0x2) perf_event_open(&(0x7f000001d000)={0x5, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = getpid() perf_event_open(&(0x7f0000000080)={0x4, 0x70, 0x9, 0x8, 0xfff, 0x6, 0x0, 0x42e4, 0x20000, 0xd, 0x4, 0x1ff000000000000, 0xffffffff, 0x0, 0x1, 0x2, 0x0, 0xa, 0xd79, 0x5e6a, 0x1, 0x1, 0x7, 0x4, 0x8, 0xfff, 0x1f, 0x1f, 0x5, 0x7ff, 0xf0d5, 0x188, 0x4, 0x8001, 0xfffffffffffffff7, 0x1000, 0x2368000, 0x8, 0x0, 0x2, 0x2000000, @perf_bp={&(0x7f0000000040), 0xc}, 0x20, 0x8, 0x0, 0x2, 0x7f, 0x5, 0x6}, r8, 0x9, r0, 0x2) 2018/03/31 05:13:31 executing program 4: mount(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='ncpfs\x00', 0x80802, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x50, &(0x7f0000000700)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780)=r0, 0x4) mount(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='./file0\x00', &(0x7f00000006c0)='btrfs\x00', 0x89402, &(0x7f0000000900)="e196efa3cb748d2a6600968b76295ff919bc3877b18eb8d265a35493fcf34fdc965cd5c837d2389c6e2ec6088abe8daaa8ca23f9298fc94dc26874bc4d4567afea1ca0879cdf21e915005a83e96b1002af29091d2176abbb7fec088a67f2e1390f32adaf2f252d24510870f8df7186936f4d88957eb8fcda78b7383a7d24db701d524557ee7324433e70d9ffa185098325f9e657d3c29cf6a35843cb96780269db1c735d55938af5c60e1e4ba25928697277b0fdf356b62399b4c8826d09bfca7d6078c19b4995195ea814b1bb40c06210") ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0xffffffff) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6f3, 0x0, 0x6, 0x0, 0x0, 0xfffdffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x22, &(0x7f00000007c0)=ANY=[@ANYBLOB="18000000000000000000000000000000000000000020f37b176532826618e8210d55b6b9f796a5cf4309ac945b17b6ec55aad627fce3173f275427d49a02c531c5316326ec3569ef7771eee96dc62f79bb386acf26001097f7673e6b395ee0cac49bf5bbe2db74ffbe760e50b31e653a89e733b2832d3e4e73d9720448a1d74be25a5dbcc32519fc1400391454104d5b5d9b14c5560730768138a9a0e109f34a16cc067edc5d7a0b0912aa587035de0ad6624124ad9467ed6aac80ad02b778f8319fef183facaa39c4519babbd000000000000009d9d8436042fc1b8d6e779a1531ba51c8c8811c745b829a97e3e2d0f13ea630503c6a765fae62d43095c1669d81251d3a6718f867abdfb0b907d24394fd24b2ea273"], &(0x7f0000f6bffb)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000400)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000540)={r1, 0x50}, 0xfffffe74) close(r1) perf_event_open(&(0x7f0000348f88)={0x2, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x28, 0x2, 0x0, &(0x7f0000000000)={0x0}) mkdir(&(0x7f0000000100)='./file0\x00', 0x1000000000) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='selinuxfs\x00', 0x1000, &(0x7f0000000100)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='minix\x00', 0x10020, &(0x7f0000000240)) [ 183.875921] devpts: called with bogus options [ 183.953294] hugetlbfs: Bad mount option: "" [ 183.966350] FAULT_INJECTION: forcing a failure. [ 183.966350] name failslab, interval 1, probability 0, space 0, times 0 [ 183.977712] CPU: 0 PID: 15651 Comm: syz-executor6 Not tainted 4.16.0-rc6+ #42 [ 183.984995] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 183.994347] Call Trace: [ 183.996937] dump_stack+0x194/0x24d [ 184.000569] ? arch_local_irq_restore+0x53/0x53 [ 184.005238] ? __save_stack_trace+0x7e/0xd0 [ 184.009567] should_fail+0x8c0/0xa40 [ 184.013285] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 184.018392] ? kasan_kmalloc+0xad/0xe0 [ 184.022278] ? kmem_cache_alloc_trace+0x136/0x740 [ 184.027122] ? __memcg_init_list_lru_node+0x169/0x270 [ 184.032319] ? __list_lru_init+0x544/0x750 [ 184.036544] ? sget_userns+0x6b1/0xe40 [ 184.040430] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 184.045181] ? do_mount+0xea4/0x2bb0 [ 184.048891] ? SyS_mount+0xab/0x120 2018/03/31 05:13:31 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xa, 0x40000000000005, 0x403, 0x4, 0x2, 0xffffffffffffffff, 0x0, [0x140]}, 0x2c) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)) socketpair(0x17, 0x80000, 0x100, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x1) r2 = gettid() perf_event_open(&(0x7f0000000180)={0x5, 0x70, 0x8, 0x9, 0x5, 0xf4, 0x0, 0x8, 0x40900, 0x0, 0x3, 0x7fff, 0xdc, 0x9d, 0x1000, 0x7, 0x200, 0x5, 0x6, 0x7, 0xdd, 0xada300000000, 0x5, 0x10000, 0x24000000000000, 0x0, 0x3ff, 0x4082, 0x7fffffff, 0x8, 0x400, 0x1, 0x1, 0x8, 0x224, 0x7, 0x5a, 0x6, 0x0, 0x2, 0x0, @perf_bp={&(0x7f0000000140), 0xa}, 0x1904, 0x3, 0x0, 0x3, 0x1f, 0x800, 0x48}, r2, 0x6, r0, 0x2) r3 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000004ce00036cca7000000d8c6bb18c29a248c00000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r5) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=@framed={{0x18}, [], {0x95}}, &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r6) mkdir(&(0x7f0000000000)='./file0\x00', 0xe4) 2018/03/31 05:13:31 executing program 2: socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000040)={0x7, 0x70, 0x1, 0xaabc, 0x2, 0x2, 0x0, 0xec, 0x4800, 0x1, 0x3a6b72c9, 0xffffffffffff8000, 0xfff, 0x7, 0x2, 0x7, 0xff, 0x1, 0x2, 0x9, 0x1, 0x0, 0x5, 0x75, 0x2, 0x7, 0x8, 0x4, 0x0, 0xdbce, 0xffff, 0xfaf, 0x1, 0xe7, 0xd0eb, 0x28a5, 0x9, 0x4, 0x0, 0x7, 0x2, @perf_config_ext={0x1, 0x8000}, 0x489, 0x6, 0xff, 0x0, 0x9d, 0x8, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f00000000c0)={0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000140)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r2 = getpid() r3 = perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x8, 0x4, 0x4, 0x1, 0x0, 0x401, 0x100, 0x7, 0xcfc0, 0x7, 0x0, 0x7, 0x30, 0x7, 0x7, 0xfff, 0x7, 0x9, 0xff, 0x9, 0xf, 0x0, 0x3, 0x100000000, 0x3, 0x8, 0xffff, 0x2, 0x3, 0xff, 0x6f, 0x3, 0x5, 0x800, 0x81, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000180), 0x1}, 0x11815, 0x9, 0x1, 0x1, 0x101, 0x5, 0x1e892fee}, r2, 0x9, r1, 0x1) r4 = perf_event_open(&(0x7f0000000280)={0x5, 0x70, 0xe00000000000, 0x9, 0x800, 0x6, 0x0, 0x7ff, 0x10200, 0xb, 0xe3, 0x5, 0x1, 0x4, 0x9b0f, 0x1f8a, 0x401, 0x1, 0xe975, 0x7, 0x437, 0x9, 0x7f, 0x20, 0x1, 0x2, 0x3, 0x5, 0x200, 0x1, 0x8, 0x401, 0x401, 0x2, 0x8, 0xfff, 0xf3c8, 0xf23, 0x0, 0x7fffffff, 0x0, @perf_bp={&(0x7f0000000240), 0x9}, 0x828, 0x3, 0x5, 0x1, 0x0, 0xc37, 0x6}, r2, 0x4, r1, 0x2) r5 = perf_event_open(&(0x7f0000000300)={0x4, 0x70, 0xff, 0x3, 0x7f, 0x7, 0x0, 0x40, 0x4a240, 0x2, 0xffffffffffffcc27, 0xb8, 0x2, 0x7, 0x9, 0x800, 0x3, 0x7d4d, 0xf7, 0xfffffffffffffffa, 0x9, 0x4, 0x3, 0x90be, 0x9, 0xfffffffffffffffc, 0x6, 0x3ff, 0xab6b, 0x8001, 0x5, 0x2, 0x9, 0x732, 0x400, 0x55000000000, 0x1ff, 0x6, 0x0, 0x0, 0x2, @perf_config_ext={0x6, 0xffffffff}, 0x40, 0x80000001, 0x7fff, 0x2, 0x1, 0x6, 0x5}, r2, 0xf, r4, 0xa) r6 = perf_event_open(&(0x7f00000003c0)={0x7, 0x70, 0xc87d, 0x6, 0x5, 0x80000001, 0x0, 0x3, 0x1, 0xb, 0xffffffff, 0x9, 0x584, 0x31b, 0x7, 0x2, 0x3, 0x544, 0x100000001, 0x9, 0x1, 0x100, 0x3, 0x1, 0x7, 0x0, 0x7, 0x5, 0xbb, 0x40, 0x7, 0x8, 0x81, 0xc5a, 0x0, 0x7, 0x1f, 0x815, 0x0, 0xffff, 0x2, @perf_bp={&(0x7f0000000380), 0x8}, 0x4, 0x5, 0xc95, 0x0, 0x7ff, 0x7b02, 0x7}, r2, 0x10, r1, 0xb) ioctl$PERF_EVENT_IOC_DISABLE(r3, 0x2401, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0x4) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = perf_event_open(&(0x7f0000000480)={0x7, 0x70, 0x7, 0xdbff, 0x3, 0x3f, 0x0, 0x8, 0x0, 0xc, 0x8, 0x0, 0xf43, 0x101, 0x6, 0x5, 0x6, 0x9, 0x200, 0xfffffffffffffffd, 0x4, 0x6, 0x6e, 0x20, 0x1b3, 0x1fe, 0x7ff, 0x3, 0x8000, 0x5, 0x0, 0x0, 0x0, 0x5, 0x22d2, 0x401, 0x68, 0xa1ce, 0x0, 0x4, 0x0, @perf_config_ext={0x2fb, 0x4}, 0x2000, 0xd33, 0x6, 0x697c4c7d75b7b6da, 0x171f, 0x9, 0x9}, r2, 0x6, r5, 0x1) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x9, 0x6, 0x101, 0x8, 0x0, 0x200, 0x2000, 0xf, 0x0, 0x5, 0x6, 0x3, 0x2, 0x0, 0x8001, 0x8, 0x3, 0x5, 0x17, 0x7, 0x4, 0x400, 0xffffffff, 0x7, 0x8000, 0x2, 0x100, 0x0, 0x7, 0x95de, 0x2, 0x1, 0x2, 0xd432, 0x3ff, 0x8599, 0x0, 0x3ff, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x10080, 0x7, 0xe7e, 0x7, 0x5, 0x7, 0x9}, r2, 0x0, r3, 0x8) close(r7) ioctl$PERF_EVENT_IOC_DISABLE(r9, 0x2401, 0x1) r10 = gettid() ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f00000005c0)={r0}) ioctl$sock_kcm_SIOCKCMUNATTACH(r11, 0x89e1, &(0x7f0000000600)={r8}) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000640)) r12 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)={0x4, 0x7, 0x7f, 0x9787, 0x1c, 0xffffffffffffffff, 0x5}, 0x2c) recvmsg$kcm(r11, &(0x7f0000009440)={&(0x7f0000009300)=@can={0x0, 0x0}, 0x80, &(0x7f00000093c0)=[{&(0x7f0000009380)=""/16, 0x10}], 0x1, &(0x7f0000009400)=""/18, 0x12, 0x3bc1}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000009480)={0xf, 0x13, &(0x7f00000006c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [@ldst={0x3, 0x2, 0x1, 0x2, 0x7, 0xffffffff, 0x4}, @map={0x18, 0x0, 0x1, 0x0, r12}, @alu={0x7, 0x5, 0xf, 0x6, 0xe, 0x2, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4}, @jmp={0x5, 0x7a4c, 0x0, 0x3, 0x9, 0xffffffff, 0xfffffffffffffff0}, @alu={0x4, 0x20, 0x9, 0x9, 0x5, 0xfffffffe, 0x4}, @jmp={0x5, 0x81, 0x9, 0x7, 0x6, 0xfffffffe, 0xfffffffffffffff0}, @jmp={0x5, 0x3, 0x3, 0x0, 0x2, 0x2, 0xffffffffffffffff}], {0x95}}, &(0x7f0000000780)='GPL\x00', 0x4, 0x77, &(0x7f00000007c0)=""/119, 0x0, 0x1, [], r13}, 0x48) mount(&(0x7f0000009500)='./file0\x00', &(0x7f0000009540)='./file0\x00', &(0x7f0000009580)='cramfs\x00', 0x5020, &(0x7f00000095c0)="22f464f8fef2b95976576e903efe99229584aaf55fa0d91223905d4a68c0c7d18bf26de6fec0660b0c36945200da04f802d9059dd5f6d2f0eca450f4fdd46ed2b411588d802f0d1d02be65816332b2754d686e927593deb8ee3ed17a24d749db81290c33836bcc9b7d93084c53d0744e81deb8b83d9b23565d6db4cb746eb15b20f7b806f0b5a02676d90260a61b00e9ec0b4b8bf07d5f93b3feda8299586c3936f743c764205de278c25a6fff98") perf_event_open(&(0x7f00000096c0)={0x1, 0x70, 0x3, 0xa8e, 0x1000, 0xe57a, 0x0, 0x6, 0x2100b, 0x2, 0x9, 0xdb1b, 0xfffffffffffffffa, 0xa7f8, 0x3, 0x2, 0x800, 0x800, 0x2, 0x0, 0x3f, 0x3, 0x8000000000000, 0x3, 0x20, 0x6, 0x3, 0xfffffffffffff318, 0xffffffffffff0001, 0xfffffffffffffffe, 0x12, 0x1, 0x101, 0x8, 0x100, 0x1, 0x3, 0x8, 0x0, 0x3ff, 0x7, @perf_bp={&(0x7f0000009680), 0x3}, 0x9, 0x6, 0xfffffffffffffff7, 0x0, 0x0, 0x49, 0xfffffffffffff3b8}, r10, 0xe, r5, 0x8) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000009880)={r12, &(0x7f0000009740)="8ba447000764036f17624e623896639a3e2456b901aedcdb4221cea83c3b2c94575967a34ec104bbebeaf6a6b50494e6763f41056d2ca84f906fa48d72590e81334926fab48e", &(0x7f00000097c0)=""/170}, 0x18) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r4, 0x2405, r6) bpf$PROG_LOAD(0x5, &(0x7f00000099c0)={0x7, 0x4, &(0x7f00000098c0)=@raw=[@ldst={0x3, 0x3, 0x6, 0xd, 0x7, 0x26}, @ldst={0x0, 0x2, 0x0, 0xa, 0x0, 0x4, 0xffffffffffffffff}], &(0x7f0000009900)='GPL\x00', 0x5, 0x5d, &(0x7f0000009940)=""/93, 0x41f00, 0x1, [], r13}, 0x48) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000009b40)={r8, &(0x7f0000009a40)="402c0b8b20e0ae84bb", &(0x7f0000009a80)=""/178}, 0x18) [ 184.052513] ? do_syscall_64+0x281/0x940 [ 184.056571] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 184.061940] ? find_held_lock+0x35/0x1d0 [ 184.066013] ? __lock_is_held+0xb6/0x140 [ 184.070085] ? check_same_owner+0x320/0x320 [ 184.074407] ? rcu_note_context_switch+0x710/0x710 [ 184.079340] should_failslab+0xec/0x120 [ 184.083318] kmem_cache_alloc_trace+0x4b/0x740 [ 184.087899] ? __kmalloc_node+0x33/0x70 [ 184.091869] ? __kmalloc_node+0x33/0x70 [ 184.095851] ? rcu_read_lock_sched_held+0x108/0x120 [ 184.100878] __memcg_init_list_lru_node+0x169/0x270 [ 184.105896] ? list_lru_add+0x7c0/0x7c0 [ 184.109870] ? __kmalloc_node+0x47/0x70 [ 184.113853] __list_lru_init+0x544/0x750 [ 184.117921] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 184.123811] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 184.126762] rpcbind: RPC call returned error 22 [ 184.128834] ? lockdep_init_map+0x9/0x10 [ 184.128850] sget_userns+0x6b1/0xe40 [ 184.128859] ? set_anon_super+0x20/0x20 [ 184.128874] ? put_filp+0x90/0x90 [ 184.128887] ? destroy_unused_super.part.6+0xd0/0xd0 [ 184.128896] ? alloc_vfsmnt+0x762/0x9c0 [ 184.128906] ? path_lookupat+0x238/0xba0 [ 184.139751] rpcbind: RPC call returned error 22 [ 184.141295] ? mnt_free_id.isra.21+0x50/0x50 [ 184.141310] ? trace_hardirqs_off+0x10/0x10 [ 184.141326] ? putname+0xee/0x130 [ 184.141342] ? cap_capable+0x1b5/0x230 [ 184.141357] ? security_capable+0x8e/0xc0 [ 184.141372] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 184.141382] ? ns_capable_common+0xcf/0x160 [ 184.141394] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 184.141407] mount_ns+0x6d/0x190 [ 184.166335] devpts: called with bogus options [ 184.166541] rpc_mount+0x9e/0xd0 [ 184.166558] mount_fs+0x66/0x2d0 [ 184.182191] hugetlbfs: Bad mount option: "" [ 184.182553] vfs_kern_mount.part.26+0xc6/0x4a0 [ 184.182564] ? may_umount+0xa0/0xa0 [ 184.182573] ? _raw_read_unlock+0x22/0x30 [ 184.182586] ? __get_fs_type+0x8a/0xc0 [ 184.236369] do_mount+0xea4/0x2bb0 [ 184.239892] ? __might_fault+0x110/0x1d0 [ 184.243940] ? copy_mount_string+0x40/0x40 [ 184.248154] ? check_same_owner+0x320/0x320 [ 184.252454] ? __check_object_size+0x8b/0x530 [ 184.256934] ? __might_sleep+0x95/0x190 [ 184.260895] ? kasan_check_write+0x14/0x20 [ 184.265109] ? _copy_from_user+0x99/0x110 [ 184.269240] ? memdup_user+0x5e/0x90 [ 184.272933] ? copy_mount_options+0x1f7/0x2e0 [ 184.277408] SyS_mount+0xab/0x120 [ 184.280839] ? copy_mnt_ns+0xb30/0xb30 [ 184.284708] do_syscall_64+0x281/0x940 [ 184.288576] ? vmalloc_sync_all+0x30/0x30 [ 184.292704] ? _raw_spin_unlock_irq+0x27/0x70 [ 184.297182] ? finish_task_switch+0x1c1/0x7e0 [ 184.301659] ? syscall_return_slowpath+0x550/0x550 [ 184.306570] ? syscall_return_slowpath+0x2ac/0x550 [ 184.311484] ? prepare_exit_to_usermode+0x350/0x350 [ 184.316482] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 184.321834] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 184.326663] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 184.331831] RIP: 0033:0x454e79 [ 184.335000] RSP: 002b:00007fc28ac9cc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 184.342695] RAX: ffffffffffffffda RBX: 00007fc28ac9d6d4 RCX: 0000000000454e79 [ 184.349942] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 184.357193] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 184.364441] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000016 [ 184.371687] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000002b [ 184.390848] rpcbind: RPC call returned error 22 [ 184.401568] rpcbind: RPC call returned error 22 2018/03/31 05:13:32 executing program 1: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x40000000003e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000811ffa)='bdev\x00', 0x0, &(0x7f0000444000)) 2018/03/31 05:13:32 executing program 6 (fault-call:17 fault-nth:44): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x0, 0x101, 0x4, 0x0, 0x1, r0, 0x0, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r2 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)={0xffffffffffffffff}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r2, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x0, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0", 0xc9}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000280)={&(0x7f0000000680)='./file0\x00'}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r1}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r3) gettid() close(0xffffffffffffffff) 2018/03/31 05:13:32 executing program 7: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x78, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000240)="4c74093f1d849520abc47aa6caa468ea96579fe126b160b756cc63a15949c1d1032f956071a2b1656433e86759cdfdcdd63f0a4ba1969c0464821fcdc362fcc4f12c8b9bd69c1a504179a39bfc706f28a19bd49e1abe577d75e9f52721e37a7d97aa4a293d6bc20e13b21058a504ee5cd2ffe4b5f31b5b54e8234ef68a396c731698af571c3635b2135b16d0468021c8a809d5ecb51ff0ab0841ca5a5a1f8b96cf0a203e9d81741d3a4f75e365da316a80500dd1f03090818358ebd6330fb8cebe1dd8288f") r1 = getpid() perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x1, 0xffffffff, 0x1, 0x1375, 0x0, 0x7fffffff, 0x8002, 0x9, 0xe4f, 0x10000, 0x5, 0x4, 0x7f, 0x9, 0x800, 0x2, 0x8000, 0xbc, 0x8000, 0x8, 0x1f, 0x7, 0x150, 0x5c270e2a, 0x8, 0x3ff, 0x200, 0xadd, 0x3, 0x2, 0x2f, 0x5, 0x6, 0x3f, 0xfffffffffffffff7, 0x6, 0x0, 0x6, 0x3, @perf_bp={&(0x7f0000000000), 0xc}, 0x20, 0x1000, 0x8000, 0x1, 0x3, 0xffffffffffffedac, 0x2}, r1, 0x4, r0, 0x3) perf_event_open(&(0x7f00000001c0)={0x3, 0x70, 0x9b6, 0x5, 0x4, 0xf900, 0x0, 0x8000, 0x8, 0x9, 0x6, 0xfffffffffffffffd, 0x7, 0xffffffff00000001, 0x8000, 0x7, 0x101, 0x4, 0x199efd9, 0xffffffff, 0xb5, 0xfffffffffffffffa, 0x6, 0x9, 0x22c, 0x0, 0xfffffffffffffffc, 0x800, 0x400, 0x9, 0x6, 0x9, 0x7, 0xfffffffffffffffe, 0x8, 0x8, 0x0, 0x2, 0x0, 0x8, 0x2, @perf_config_ext={0x7fff, 0x4}, 0x0, 0x400040, 0x5, 0x7, 0x4, 0x5, 0x8}, r1, 0x2, r0, 0x8) getpid() 2018/03/31 05:13:32 executing program 4: mount(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='ncpfs\x00', 0x80802, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x50, &(0x7f0000000700)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780)=r0, 0x4) mount(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='./file0\x00', &(0x7f00000006c0)='btrfs\x00', 0x89402, &(0x7f0000000900)="e196efa3cb748d2a6600968b76295ff919bc3877b18eb8d265a35493fcf34fdc965cd5c837d2389c6e2ec6088abe8daaa8ca23f9298fc94dc26874bc4d4567afea1ca0879cdf21e915005a83e96b1002af29091d2176abbb7fec088a67f2e1390f32adaf2f252d24510870f8df7186936f4d88957eb8fcda78b7383a7d24db701d524557ee7324433e70d9ffa185098325f9e657d3c29cf6a35843cb96780269db1c735d55938af5c60e1e4ba25928697277b0fdf356b62399b4c8826d09bfca7d6078c19b4995195ea814b1bb40c06210") ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0xffffffff) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6f3, 0x0, 0x6, 0x0, 0x0, 0xfffdffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x22, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000f6bffb)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000400)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000540)={r1, 0x50}, 0xfffffe74) close(r1) perf_event_open(&(0x7f0000348f88)={0x2, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x28, 0x2, 0x0, &(0x7f0000000000)={0x0}) mkdir(&(0x7f0000000100)='./file0\x00', 0x1000000000) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='selinuxfs\x00', 0x1000, &(0x7f0000000100)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='minix\x00', 0x10020, &(0x7f0000000240)) 2018/03/31 05:13:32 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000001fc0)) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000002000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r1, &(0x7f00000024c0)={&(0x7f0000002040)=@un=@file={0x0, './file0\x00'}, 0x80, &(0x7f0000001f40)=[{&(0x7f00000020c0)="73c7575b94a72990e177f86ed4835a72a65c1a6c6831eeb0c48163a47ab63bcb605c8450cc4798ff6521c2aa722d1a7105c8a07e6c", 0x35}], 0x1, &(0x7f0000002500)=ANY=[], 0x0, 0x40000}, 0x20000000) r2 = gettid() r3 = perf_event_open(&(0x7f0000001ac0)={0x1, 0x70, 0xffffffff, 0x835, 0x9, 0xffffffffffffff5f, 0x0, 0x1000, 0x42000, 0x3, 0x8, 0x80, 0x1, 0x4, 0x100000001, 0x9, 0xff, 0x8, 0x1000, 0x7, 0x7f, 0x200, 0xb715, 0x3, 0x7fffffff, 0xf0a, 0x40, 0x8000, 0x8, 0x7, 0xffffffffffffff74, 0x4, 0x6, 0x100, 0x7, 0x335, 0x3ff, 0x58, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000001a80), 0xe}, 0x244, 0x80000000, 0x82, 0x7, 0x5, 0x3, 0x80000001}, r2, 0xd, r0, 0x8) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='mqueue\x00', 0x0, &(0x7f0000000240)="c5bdea9b496391f52deac807dd7df46031af762f74c804ff9be6610ef03a40b76e2b31347f50d272559c1f5d8738f3b2f28afe97f3e743dc178404f8f06f6aa31c13fa8a730ea9ac9c0200e87aa393a4274f4412787475fb77c5e4d5d04fecf1ff0a5589f11f11f3") getpid() r4 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000004000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_icmp(0xa, 0x2, 0x3a, &(0x7f0000002380)) mount(&(0x7f0000001c00)='./file0\x00', &(0x7f0000001c40)='./file0\x00', &(0x7f0000001c80)='devpts\x00', 0x40, &(0x7f0000001cc0)="be623dfd58807ac0b2f86f052863a5f30adc0bce173ebcf648cefd7d64732aeb5b94e6af3ab33e53669ba6d304d067dad4b1ff3ed87f18fd170aac904e8f105e80e22881717c98752a9cd7cfb06d102877e3b36b2624d22427331755a9514b225d25999ed605ffe4188630db2e7ddcc57f6316b60c4f3845d9dfcbbde5e49af627b48d7c9bd743b536de31a9ba3010cb6714c9b90a50537be55ca12a18e6541bff5a82d293e7734ea9c90707899663bd96b3bcce5887bf0bd35963c5adc39ddcb6f2a0a02b01661242046cb54ef1aec5a486b69e006305064124867bf79f4dc11798e214b61575168b79887122e0a3461f703c077f902c0a") socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000002340)=0xf60) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000003900)={&(0x7f0000003400)=@can={0x0, 0x0}, 0x80, &(0x7f0000003840)=[{&(0x7f0000003480)=""/194, 0xc2}, {&(0x7f0000003580)=""/250, 0xfa}, {&(0x7f0000003680)=""/100, 0x64}, {&(0x7f0000003700)=""/14, 0xe}, {&(0x7f0000003740)=""/159, 0x9f}, {&(0x7f0000003800)=""/15, 0xf}], 0x6, &(0x7f00000038c0)=""/29, 0x1d, 0x5}, 0x3) bpf$PROG_LOAD(0x5, &(0x7f0000003940)={0x4, 0x9, &(0x7f0000001840)=ANY=[@ANYBLOB="18000000030000000000000003000000dfd00c00fcffffff0000000000000000000803000101000000000000000000003d01f0fff0ffffff000000000000000095000000000017d2"], &(0x7f0000000380)='GPL\x00', 0xf172, 0x4b, &(0x7f00000018c0)=""/75, 0x41f00, 0x1, [], r5}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000000c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001f00)={0xffffffffffffffff, 0x0, 0xf6, 0x22, &(0x7f0000001dc0)="9ef9482ea02fd36d0a768986a7ebe7a627dc88937e7073e3521858dfa0d5e02f571a01cfdfa76e048e5f956ea5da60b90e02a6c3d3687ed61ec9ab5b682c02498bddef38de9ce8c753e41e78f414d16202a033b6c7752711a5f56924e7846d6dcde2f71026e1eb0319b5e60f6b1ec67fca31c3cf1691d3af91a19f56be5a10ff337a53ba13dd3d75e1555211954b92ec0082d02b7b4cdddc021cbe84e4af8f20788977e3416918843e6c92b2ebf7b8b33ecbd4c7c9a9d5036c3e3e538748a32f1a28eb77818ca1878ffdd445dcdb8a40e6221e0fc474428449dfe93c62bbc69996aa9b34488c1da4f6f7c2275305a6a4fb256c1a516d", &(0x7f0000001ec0)=""/34, 0x1f, 0x1}, 0x28) close(r4) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000001bc0)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x3441, &(0x7f0000000080)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000180)) mount(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000002200)='./file0/file0\x00', &(0x7f0000002240)='fuse\x00', 0x2000000, &(0x7f0000002280)="9b3923bfddc346e9fa2aeaffae6ca386d8d50ba83ab72218340d3c30c045a89ac016797652ba04f1a203cfceccb458dbfd9fd03c4a80ef9a40dc7a4f24b6619d04a58186466fd8465757d9ee053c082cdfa957e7efab6191761847cca59c017493ef5e3d22432cf0b4ebef") ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f00000003c0)=ANY=[@ANYBLOB="07000000000000000000000000000000000000000000000000000000000000000000000067eb0ecf1c127df7274c9ea1675e02fa4ffd89aa7e339417beb7d332a5c996e59875644dd1e3a690110400bc711bb0435977d9a384089e266e2be8818991f125e9c0f199be2bc7f01aa0a5cb9b9f99438aa0f1ae3d50201f5eb276536f567f03f062994da292b6db0000000000000000000000000000b018ebd16633e23aaeb0537a6c0c5327f90c755ccd5c3bba13b14d9366cc52ddfbbef604f8302ee803829785c31c97bfcae3ec93cf8c4f732d1b58640435c8e4c7b60017a1f78d92e75019c50604daef51885b9c1fe8a2b92fab87e41c2196"]) mkdir(&(0x7f0000000680)='./file0\x00', 0x0) mount(&(0x7f0000001b40)='./file0\x00', &(0x7f0000001b80)='./file0/file0\x00', &(0x7f0000002100)='vfat\x00', 0x0, &(0x7f0000002140)="98980e21ac8b46c0b7bedeee39e6bd9ae4088d6ab47dc9dc76a39e299ce3783aa33e482e450484961fd3e3c5b178fafbe54440e19512ea4298652ed129d4241d9d116d8a5c2b931d350f0c989f8a288fc9e56c") mkdir(&(0x7f00000004c0)='./file0/file0\x00', 0x0) socketpair$inet(0x2, 0x0, 0x1f, &(0x7f0000000080)) 2018/03/31 05:13:32 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5421, &(0x7f0000000040)='-\x00') r1 = gettid() perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x3, 0xffffffff, 0x8, 0x7ff, 0x0, 0xffffffffffffffa6, 0x10100, 0x0, 0x1, 0xffffffff, 0x3f, 0x8, 0xffffffff, 0x6, 0x100, 0x71d, 0x100000001, 0x8, 0x4, 0x1, 0x3, 0x5, 0x4, 0x80000001, 0x7fff, 0x8, 0x100000001, 0xffffffff, 0x5, 0x0, 0x800, 0x1, 0xffff, 0xfffffffffffffff8, 0xd2, 0x66, 0x0, 0x7ff, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x80, 0x7, 0x7, 0x7, 0xffff, 0x2, 0x6a}, r1, 0xd, r0, 0x8) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1ff) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000080)) 2018/03/31 05:13:32 executing program 5: socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x5452, &(0x7f0000000040)='-\x00') recvmsg(r0, &(0x7f0000000300)={&(0x7f0000000080)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000100)=""/196, 0xc4}], 0x1, &(0x7f0000000240)=""/129, 0x81, 0x1}, 0x40002042) perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r1, &(0x7f0000948000)={0x0, 0x0, &(0x7f00005dc000)=[{&(0x7f0000d43000), 0xffffff1b}], 0x1, &(0x7f0000d43000)}, 0x0) sendmsg$kcm(r0, &(0x7f0000001840)={&(0x7f0000000340)=@pppoe={0x18, 0x0, {0x2, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 'erspan0\x00'}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000540)="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", 0xff}, {&(0x7f0000000480)="187ea516c020aaf92a62db6eaa6e0bfbc7804d963251c92c536f794be1f304379a0ab44d0520e2eee6d4ed3f292ca7d6fa081d901143681f13f5c52a9bda7f1c29dc2afd439061ad08ddc7a034c43e6fb229be6e87e2a9db21e0b663aac54a3bc8055c7b4341fc378fbb38", 0x6b}], 0x2, &(0x7f0000001880)=ANY=[@ANYBLOB="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"], 0x11d0, 0x4040000}, 0x40084) sendmsg$kcm(r1, &(0x7f0000000500)={&(0x7f0000000400)=@rc={0x1f}, 0xa, &(0x7f00000004c0), 0x0, &(0x7f00000019c0)}, 0x80d4) close(r0) [ 184.675823] hugetlbfs: Bad mount option: "w&Õkøø{f<Ùir‡¤r³£ßD~Y»{ÁRã˜L(—¾§òš²Þ`$ÚY’Fsë7´!°JbvÈ" 2018/03/31 05:13:32 executing program 2: socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000040)={0x7, 0x70, 0x1, 0xaabc, 0x2, 0x2, 0x0, 0xec, 0x4800, 0x1, 0x3a6b72c9, 0xffffffffffff8000, 0xfff, 0x7, 0x2, 0x7, 0xff, 0x1, 0x2, 0x9, 0x1, 0x0, 0x5, 0x75, 0x2, 0x7, 0x8, 0x4, 0x0, 0xdbce, 0xffff, 0xfaf, 0x1, 0xe7, 0xd0eb, 0x28a5, 0x9, 0x4, 0x0, 0x7, 0x2, @perf_config_ext={0x1, 0x8000}, 0x489, 0x6, 0xff, 0x0, 0x9d, 0x8, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f00000000c0)={0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000140)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r2 = getpid() r3 = perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x8, 0x4, 0x4, 0x1, 0x0, 0x401, 0x100, 0x7, 0xcfc0, 0x7, 0x0, 0x7, 0x30, 0x7, 0x7, 0xfff, 0x7, 0x9, 0xff, 0x9, 0xf, 0x0, 0x3, 0x100000000, 0x3, 0x8, 0xffff, 0x2, 0x3, 0xff, 0x6f, 0x3, 0x5, 0x800, 0x81, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000180), 0x1}, 0x11815, 0x9, 0x1, 0x1, 0x101, 0x5, 0x1e892fee}, r2, 0x9, r1, 0x1) r4 = perf_event_open(&(0x7f0000000280)={0x5, 0x70, 0xe00000000000, 0x9, 0x800, 0x6, 0x0, 0x7ff, 0x10200, 0xb, 0xe3, 0x5, 0x1, 0x4, 0x9b0f, 0x1f8a, 0x401, 0x1, 0xe975, 0x7, 0x437, 0x9, 0x7f, 0x20, 0x1, 0x2, 0x3, 0x5, 0x200, 0x1, 0x8, 0x401, 0x401, 0x2, 0x8, 0xfff, 0xf3c8, 0xf23, 0x0, 0x7fffffff, 0x0, @perf_bp={&(0x7f0000000240), 0x9}, 0x828, 0x3, 0x5, 0x1, 0x0, 0xc37, 0x6}, r2, 0x4, r1, 0x2) r5 = perf_event_open(&(0x7f0000000300)={0x4, 0x70, 0xff, 0x3, 0x7f, 0x7, 0x0, 0x40, 0x4a240, 0x2, 0xffffffffffffcc27, 0xb8, 0x2, 0x7, 0x9, 0x800, 0x3, 0x7d4d, 0xf7, 0xfffffffffffffffa, 0x9, 0x4, 0x3, 0x90be, 0x9, 0xfffffffffffffffc, 0x6, 0x3ff, 0xab6b, 0x8001, 0x5, 0x2, 0x9, 0x732, 0x400, 0x55000000000, 0x1ff, 0x6, 0x0, 0x0, 0x2, @perf_config_ext={0x6, 0xffffffff}, 0x40, 0x80000001, 0x7fff, 0x2, 0x1, 0x6, 0x5}, r2, 0xf, r4, 0xa) r6 = perf_event_open(&(0x7f00000003c0)={0x7, 0x70, 0xc87d, 0x6, 0x5, 0x80000001, 0x0, 0x3, 0x1, 0xb, 0xffffffff, 0x9, 0x584, 0x31b, 0x7, 0x2, 0x3, 0x544, 0x100000001, 0x9, 0x1, 0x100, 0x3, 0x1, 0x7, 0x0, 0x7, 0x5, 0xbb, 0x40, 0x7, 0x8, 0x81, 0xc5a, 0x0, 0x7, 0x1f, 0x815, 0x0, 0xffff, 0x2, @perf_bp={&(0x7f0000000380), 0x8}, 0x4, 0x5, 0xc95, 0x0, 0x7ff, 0x7b02, 0x7}, r2, 0x10, r1, 0xb) ioctl$PERF_EVENT_IOC_DISABLE(r3, 0x2401, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0x4) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = perf_event_open(&(0x7f0000000480)={0x7, 0x70, 0x7, 0xdbff, 0x3, 0x3f, 0x0, 0x8, 0x0, 0xc, 0x8, 0x0, 0xf43, 0x101, 0x6, 0x5, 0x6, 0x9, 0x200, 0xfffffffffffffffd, 0x4, 0x6, 0x6e, 0x20, 0x1b3, 0x1fe, 0x7ff, 0x3, 0x8000, 0x5, 0x0, 0x0, 0x0, 0x5, 0x22d2, 0x401, 0x68, 0xa1ce, 0x0, 0x4, 0x0, @perf_config_ext={0x2fb, 0x4}, 0x2000, 0xd33, 0x6, 0x697c4c7d75b7b6da, 0x171f, 0x9, 0x9}, r2, 0x6, r5, 0x1) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x9, 0x6, 0x101, 0x8, 0x0, 0x200, 0x2000, 0xf, 0x0, 0x5, 0x6, 0x3, 0x2, 0x0, 0x8001, 0x8, 0x3, 0x5, 0x17, 0x7, 0x4, 0x400, 0xffffffff, 0x7, 0x8000, 0x2, 0x100, 0x0, 0x7, 0x95de, 0x2, 0x1, 0x2, 0xd432, 0x3ff, 0x8599, 0x0, 0x3ff, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x10080, 0x7, 0xe7e, 0x7, 0x5, 0x7, 0x9}, r2, 0x0, r3, 0x8) close(r7) ioctl$PERF_EVENT_IOC_DISABLE(r9, 0x2401, 0x1) r10 = gettid() ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f00000005c0)={r0}) ioctl$sock_kcm_SIOCKCMUNATTACH(r11, 0x89e1, &(0x7f0000000600)={r8}) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000640)) r12 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)={0x4, 0x7, 0x7f, 0x9787, 0x1c, 0xffffffffffffffff, 0x5}, 0x2c) recvmsg$kcm(r11, &(0x7f0000009440)={&(0x7f0000009300)=@can={0x0, 0x0}, 0x80, &(0x7f00000093c0)=[{&(0x7f0000009380)=""/16, 0x10}], 0x1, &(0x7f0000009400)=""/18, 0x12, 0x3bc1}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000009480)={0xf, 0x13, &(0x7f00000006c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [@ldst={0x3, 0x2, 0x1, 0x2, 0x7, 0xffffffff, 0x4}, @map={0x18, 0x0, 0x1, 0x0, r12}, @alu={0x7, 0x5, 0xf, 0x6, 0xe, 0x2, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4}, @jmp={0x5, 0x7a4c, 0x0, 0x3, 0x9, 0xffffffff, 0xfffffffffffffff0}, @alu={0x4, 0x20, 0x9, 0x9, 0x5, 0xfffffffe, 0x4}, @jmp={0x5, 0x81, 0x9, 0x7, 0x6, 0xfffffffe, 0xfffffffffffffff0}, @jmp={0x5, 0x3, 0x3, 0x0, 0x2, 0x2, 0xffffffffffffffff}], {0x95}}, &(0x7f0000000780)='GPL\x00', 0x4, 0x77, &(0x7f00000007c0)=""/119, 0x0, 0x1, [], r13}, 0x48) mount(&(0x7f0000009500)='./file0\x00', &(0x7f0000009540)='./file0\x00', &(0x7f0000009580)='cramfs\x00', 0x5020, &(0x7f00000095c0)="22f464f8fef2b95976576e903efe99229584aaf55fa0d91223905d4a68c0c7d18bf26de6fec0660b0c36945200da04f802d9059dd5f6d2f0eca450f4fdd46ed2b411588d802f0d1d02be65816332b2754d686e927593deb8ee3ed17a24d749db81290c33836bcc9b7d93084c53d0744e81deb8b83d9b23565d6db4cb746eb15b20f7b806f0b5a02676d90260a61b00e9ec0b4b8bf07d5f93b3feda8299586c3936f743c764205de278c25a6fff98") perf_event_open(&(0x7f00000096c0)={0x1, 0x70, 0x3, 0xa8e, 0x1000, 0xe57a, 0x0, 0x6, 0x2100b, 0x2, 0x9, 0xdb1b, 0xfffffffffffffffa, 0xa7f8, 0x3, 0x2, 0x800, 0x800, 0x2, 0x0, 0x3f, 0x3, 0x8000000000000, 0x3, 0x20, 0x6, 0x3, 0xfffffffffffff318, 0xffffffffffff0001, 0xfffffffffffffffe, 0x12, 0x1, 0x101, 0x8, 0x100, 0x1, 0x3, 0x8, 0x0, 0x3ff, 0x7, @perf_bp={&(0x7f0000009680), 0x3}, 0x9, 0x6, 0xfffffffffffffff7, 0x0, 0x0, 0x49, 0xfffffffffffff3b8}, r10, 0xe, r5, 0x8) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000009880)={r12, &(0x7f0000009740)="8ba447000764036f17624e623896639a3e2456b901aedcdb4221cea83c3b2c94575967a34ec104bbebeaf6a6b50494e6763f41056d2ca84f906fa48d72590e81334926fab48e", &(0x7f00000097c0)=""/170}, 0x18) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r4, 0x2405, r6) bpf$PROG_LOAD(0x5, &(0x7f00000099c0)={0x7, 0x4, &(0x7f00000098c0)=@raw=[@ldst={0x3, 0x3, 0x6, 0xd, 0x7, 0x26}, @ldst={0x0, 0x2, 0x0, 0xa, 0x0, 0x4, 0xffffffffffffffff}], &(0x7f0000009900)='GPL\x00', 0x5, 0x5d, &(0x7f0000009940)=""/93, 0x41f00, 0x1, [], r13}, 0x48) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000009b40)={r8, &(0x7f0000009a40)="402c0b8b20e0ae84bb", &(0x7f0000009a80)=""/178}, 0x18) [ 184.750582] FAULT_INJECTION: forcing a failure. [ 184.750582] name failslab, interval 1, probability 0, space 0, times 0 [ 184.761874] CPU: 0 PID: 15732 Comm: syz-executor6 Not tainted 4.16.0-rc6+ #42 [ 184.769148] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 184.778497] Call Trace: [ 184.781083] dump_stack+0x194/0x24d [ 184.784714] ? arch_local_irq_restore+0x53/0x53 [ 184.789380] ? __save_stack_trace+0x7e/0xd0 [ 184.793711] should_fail+0x8c0/0xa40 [ 184.797436] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 184.802536] ? kasan_kmalloc+0xad/0xe0 [ 184.806409] ? kmem_cache_alloc_trace+0x136/0x740 [ 184.811237] ? __memcg_init_list_lru_node+0x169/0x270 [ 184.816415] ? __list_lru_init+0x544/0x750 [ 184.820644] ? sget_userns+0x6b1/0xe40 [ 184.824518] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 184.829251] ? do_mount+0xea4/0x2bb0 [ 184.832944] ? SyS_mount+0xab/0x120 [ 184.836550] ? do_syscall_64+0x281/0x940 [ 184.840590] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 184.845937] ? find_held_lock+0x35/0x1d0 [ 184.849983] ? __lock_is_held+0xb6/0x140 [ 184.854043] ? check_same_owner+0x320/0x320 [ 184.858350] ? rcu_note_context_switch+0x710/0x710 [ 184.863601] should_failslab+0xec/0x120 [ 184.867561] kmem_cache_alloc_trace+0x4b/0x740 [ 184.872122] ? __kmalloc_node+0x33/0x70 [ 184.876085] __memcg_init_list_lru_node+0x169/0x270 [ 184.881084] ? list_lru_add+0x7c0/0x7c0 [ 184.885040] ? __kmalloc_node+0x47/0x70 [ 184.889001] __list_lru_init+0x544/0x750 [ 184.893055] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 184.898923] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 184.903925] ? lockdep_init_map+0x9/0x10 [ 184.907971] sget_userns+0x6b1/0xe40 [ 184.911662] ? set_anon_super+0x20/0x20 [ 184.915620] ? put_filp+0x90/0x90 [ 184.919054] ? destroy_unused_super.part.6+0xd0/0xd0 [ 184.924136] ? alloc_vfsmnt+0x762/0x9c0 [ 184.928090] ? path_lookupat+0x238/0xba0 [ 184.932132] ? mnt_free_id.isra.21+0x50/0x50 [ 184.936522] ? trace_hardirqs_off+0x10/0x10 [ 184.940824] ? putname+0xee/0x130 [ 184.944263] ? cap_capable+0x1b5/0x230 [ 184.948135] ? security_capable+0x8e/0xc0 [ 184.952268] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 184.957442] ? ns_capable_common+0xcf/0x160 [ 184.961751] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 184.966920] mount_ns+0x6d/0x190 [ 184.970273] rpc_mount+0x9e/0xd0 [ 184.973622] mount_fs+0x66/0x2d0 [ 184.976972] vfs_kern_mount.part.26+0xc6/0x4a0 [ 184.981534] ? may_umount+0xa0/0xa0 [ 184.985143] ? _raw_read_unlock+0x22/0x30 [ 184.989271] ? __get_fs_type+0x8a/0xc0 [ 184.993142] do_mount+0xea4/0x2bb0 [ 184.996662] ? __might_fault+0x110/0x1d0 [ 185.000707] ? copy_mount_string+0x40/0x40 [ 185.004922] ? check_same_owner+0x320/0x320 [ 185.009225] ? __check_object_size+0x8b/0x530 [ 185.013706] ? __might_sleep+0x95/0x190 [ 185.017665] ? kasan_check_write+0x14/0x20 [ 185.021888] ? _copy_from_user+0x99/0x110 [ 185.026025] ? memdup_user+0x5e/0x90 [ 185.029719] ? copy_mount_options+0x1f7/0x2e0 [ 185.034196] SyS_mount+0xab/0x120 [ 185.037628] ? copy_mnt_ns+0xb30/0xb30 [ 185.041497] do_syscall_64+0x281/0x940 [ 185.045362] ? vmalloc_sync_all+0x30/0x30 [ 185.049488] ? _raw_spin_unlock_irq+0x27/0x70 [ 185.053964] ? finish_task_switch+0x1c1/0x7e0 [ 185.058439] ? syscall_return_slowpath+0x550/0x550 [ 185.063347] ? syscall_return_slowpath+0x2ac/0x550 [ 185.068256] ? prepare_exit_to_usermode+0x350/0x350 [ 185.073255] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 185.078601] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 185.083428] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 185.088599] RIP: 0033:0x454e79 [ 185.091768] RSP: 002b:00007fc28ac9cc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 2018/03/31 05:13:32 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x7}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x4, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000073010000000000000000000000000000950000000000000081e762196c7502c00f8cfc3215ab3535f84dd26711b55165ef684066efd274607af59888ef7e1b2f6118f5a1d7948ee48d2e89c4c54e4ef727fb531d80a5b1ec990ce232a825bf829b09c54f1e9ecc4b323d2dc6d0876d382edbc0b7069d7cf36a46e923dd4f4bcda14d79328d63a213d98085995d1d737589553caafa4f2e104aa1e3163bc52cb0f459f979f3005f60f47e38b3cc716d4b7c28"], &(0x7f0000f59000)='GPL\x00', 0x3ff, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 2018/03/31 05:13:32 executing program 4: mount(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='ncpfs\x00', 0x80802, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x50, &(0x7f0000000700)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780)=r0, 0x4) mount(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='./file0\x00', &(0x7f00000006c0)='btrfs\x00', 0x89402, &(0x7f0000000900)="e196efa3cb748d2a6600968b76295ff919bc3877b18eb8d265a35493fcf34fdc965cd5c837d2389c6e2ec6088abe8daaa8ca23f9298fc94dc26874bc4d4567afea1ca0879cdf21e915005a83e96b1002af29091d2176abbb7fec088a67f2e1390f32adaf2f252d24510870f8df7186936f4d88957eb8fcda78b7383a7d24db701d524557ee7324433e70d9ffa185098325f9e657d3c29cf6a35843cb96780269db1c735d55938af5c60e1e4ba25928697277b0fdf356b62399b4c8826d09bfca7d6078c19b4995195ea814b1bb40c06210ec") ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6f3, 0x0, 0x6, 0x0, 0x0, 0xfffdffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x22, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000f6bffb)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000400)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000540)={r1, 0x50}, 0xfffffe74) close(r1) perf_event_open(&(0x7f0000348f88)={0x2, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x28, 0x2, 0x0, &(0x7f0000000000)={0x0}) mkdir(&(0x7f0000000100)='./file0\x00', 0x1000000000) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='selinuxfs\x00', 0x1000, &(0x7f0000000100)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='minix\x00', 0x10020, &(0x7f0000000240)) [ 185.099456] RAX: ffffffffffffffda RBX: 00007fc28ac9d6d4 RCX: 0000000000454e79 [ 185.106706] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 185.113956] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 185.121203] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000016 [ 185.128451] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000002c 2018/03/31 05:13:32 executing program 2: socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000040)={0x7, 0x70, 0x1, 0xaabc, 0x2, 0x2, 0x0, 0xec, 0x4800, 0x1, 0x3a6b72c9, 0xffffffffffff8000, 0xfff, 0x7, 0x2, 0x7, 0xff, 0x1, 0x2, 0x9, 0x1, 0x0, 0x5, 0x75, 0x2, 0x7, 0x8, 0x4, 0x0, 0xdbce, 0xffff, 0xfaf, 0x1, 0xe7, 0xd0eb, 0x28a5, 0x9, 0x4, 0x0, 0x7, 0x2, @perf_config_ext={0x1, 0x8000}, 0x489, 0x6, 0xff, 0x0, 0x9d, 0x8, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f00000000c0)={0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000140)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r2 = getpid() r3 = perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x8, 0x4, 0x4, 0x1, 0x0, 0x401, 0x100, 0x7, 0xcfc0, 0x7, 0x0, 0x7, 0x30, 0x7, 0x7, 0xfff, 0x7, 0x9, 0xff, 0x9, 0xf, 0x0, 0x3, 0x100000000, 0x3, 0x8, 0xffff, 0x2, 0x3, 0xff, 0x6f, 0x3, 0x5, 0x800, 0x81, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000180), 0x1}, 0x11815, 0x9, 0x1, 0x1, 0x101, 0x5, 0x1e892fee}, r2, 0x9, r1, 0x1) r4 = perf_event_open(&(0x7f0000000280)={0x5, 0x70, 0xe00000000000, 0x9, 0x800, 0x6, 0x0, 0x7ff, 0x10200, 0xb, 0xe3, 0x5, 0x1, 0x4, 0x9b0f, 0x1f8a, 0x401, 0x1, 0xe975, 0x7, 0x437, 0x9, 0x7f, 0x20, 0x1, 0x2, 0x3, 0x5, 0x200, 0x1, 0x8, 0x401, 0x401, 0x2, 0x8, 0xfff, 0xf3c8, 0xf23, 0x0, 0x7fffffff, 0x0, @perf_bp={&(0x7f0000000240), 0x9}, 0x828, 0x3, 0x5, 0x1, 0x0, 0xc37, 0x6}, r2, 0x4, r1, 0x2) r5 = perf_event_open(&(0x7f0000000300)={0x4, 0x70, 0xff, 0x3, 0x7f, 0x7, 0x0, 0x40, 0x4a240, 0x2, 0xffffffffffffcc27, 0xb8, 0x2, 0x7, 0x9, 0x800, 0x3, 0x7d4d, 0xf7, 0xfffffffffffffffa, 0x9, 0x4, 0x3, 0x90be, 0x9, 0xfffffffffffffffc, 0x6, 0x3ff, 0xab6b, 0x8001, 0x5, 0x2, 0x9, 0x732, 0x400, 0x55000000000, 0x1ff, 0x6, 0x0, 0x0, 0x2, @perf_config_ext={0x6, 0xffffffff}, 0x40, 0x80000001, 0x7fff, 0x2, 0x1, 0x6, 0x5}, r2, 0xf, r4, 0xa) r6 = perf_event_open(&(0x7f00000003c0)={0x7, 0x70, 0xc87d, 0x6, 0x5, 0x80000001, 0x0, 0x3, 0x1, 0xb, 0xffffffff, 0x9, 0x584, 0x31b, 0x7, 0x2, 0x3, 0x544, 0x100000001, 0x9, 0x1, 0x100, 0x3, 0x1, 0x7, 0x0, 0x7, 0x5, 0xbb, 0x40, 0x7, 0x8, 0x81, 0xc5a, 0x0, 0x7, 0x1f, 0x815, 0x0, 0xffff, 0x2, @perf_bp={&(0x7f0000000380), 0x8}, 0x4, 0x5, 0xc95, 0x0, 0x7ff, 0x7b02, 0x7}, r2, 0x10, r1, 0xb) ioctl$PERF_EVENT_IOC_DISABLE(r3, 0x2401, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0x4) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = perf_event_open(&(0x7f0000000480)={0x7, 0x70, 0x7, 0xdbff, 0x3, 0x3f, 0x0, 0x8, 0x0, 0xc, 0x8, 0x0, 0xf43, 0x101, 0x6, 0x5, 0x6, 0x9, 0x200, 0xfffffffffffffffd, 0x4, 0x6, 0x6e, 0x20, 0x1b3, 0x1fe, 0x7ff, 0x3, 0x8000, 0x5, 0x0, 0x0, 0x0, 0x5, 0x22d2, 0x401, 0x68, 0xa1ce, 0x0, 0x4, 0x0, @perf_config_ext={0x2fb, 0x4}, 0x2000, 0xd33, 0x6, 0x697c4c7d75b7b6da, 0x171f, 0x9, 0x9}, r2, 0x6, r5, 0x1) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x9, 0x6, 0x101, 0x8, 0x0, 0x200, 0x2000, 0xf, 0x0, 0x5, 0x6, 0x3, 0x2, 0x0, 0x8001, 0x8, 0x3, 0x5, 0x17, 0x7, 0x4, 0x400, 0xffffffff, 0x7, 0x8000, 0x2, 0x100, 0x0, 0x7, 0x95de, 0x2, 0x1, 0x2, 0xd432, 0x3ff, 0x8599, 0x0, 0x3ff, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x10080, 0x7, 0xe7e, 0x7, 0x5, 0x7, 0x9}, r2, 0x0, r3, 0x8) close(r7) ioctl$PERF_EVENT_IOC_DISABLE(r9, 0x2401, 0x1) r10 = gettid() ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f00000005c0)={r0}) ioctl$sock_kcm_SIOCKCMUNATTACH(r11, 0x89e1, &(0x7f0000000600)={r8}) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000640)) r12 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)={0x4, 0x7, 0x7f, 0x9787, 0x1c, 0xffffffffffffffff, 0x5}, 0x2c) recvmsg$kcm(r11, &(0x7f0000009440)={&(0x7f0000009300)=@can={0x0, 0x0}, 0x80, &(0x7f00000093c0)=[{&(0x7f0000009380)=""/16, 0x10}], 0x1, &(0x7f0000009400)=""/18, 0x12, 0x3bc1}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000009480)={0xf, 0x13, &(0x7f00000006c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [@ldst={0x3, 0x2, 0x1, 0x2, 0x7, 0xffffffff, 0x4}, @map={0x18, 0x0, 0x1, 0x0, r12}, @alu={0x7, 0x5, 0xf, 0x6, 0xe, 0x2, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4}, @jmp={0x5, 0x7a4c, 0x0, 0x3, 0x9, 0xffffffff, 0xfffffffffffffff0}, @alu={0x4, 0x20, 0x9, 0x9, 0x5, 0xfffffffe, 0x4}, @jmp={0x5, 0x81, 0x9, 0x7, 0x6, 0xfffffffe, 0xfffffffffffffff0}, @jmp={0x5, 0x3, 0x3, 0x0, 0x2, 0x2, 0xffffffffffffffff}], {0x95}}, &(0x7f0000000780)='GPL\x00', 0x4, 0x77, &(0x7f00000007c0)=""/119, 0x0, 0x1, [], r13}, 0x48) mount(&(0x7f0000009500)='./file0\x00', &(0x7f0000009540)='./file0\x00', &(0x7f0000009580)='cramfs\x00', 0x5020, &(0x7f00000095c0)="22f464f8fef2b95976576e903efe99229584aaf55fa0d91223905d4a68c0c7d18bf26de6fec0660b0c36945200da04f802d9059dd5f6d2f0eca450f4fdd46ed2b411588d802f0d1d02be65816332b2754d686e927593deb8ee3ed17a24d749db81290c33836bcc9b7d93084c53d0744e81deb8b83d9b23565d6db4cb746eb15b20f7b806f0b5a02676d90260a61b00e9ec0b4b8bf07d5f93b3feda8299586c3936f743c764205de278c25a6fff98") perf_event_open(&(0x7f00000096c0)={0x1, 0x70, 0x3, 0xa8e, 0x1000, 0xe57a, 0x0, 0x6, 0x2100b, 0x2, 0x9, 0xdb1b, 0xfffffffffffffffa, 0xa7f8, 0x3, 0x2, 0x800, 0x800, 0x2, 0x0, 0x3f, 0x3, 0x8000000000000, 0x3, 0x20, 0x6, 0x3, 0xfffffffffffff318, 0xffffffffffff0001, 0xfffffffffffffffe, 0x12, 0x1, 0x101, 0x8, 0x100, 0x1, 0x3, 0x8, 0x0, 0x3ff, 0x7, @perf_bp={&(0x7f0000009680), 0x3}, 0x9, 0x6, 0xfffffffffffffff7, 0x0, 0x0, 0x49, 0xfffffffffffff3b8}, r10, 0xe, r5, 0x8) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000009880)={r12, &(0x7f0000009740)="8ba447000764036f17624e623896639a3e2456b901aedcdb4221cea83c3b2c94575967a34ec104bbebeaf6a6b50494e6763f41056d2ca84f906fa48d72590e81334926fab48e", &(0x7f00000097c0)=""/170}, 0x18) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r4, 0x2405, r6) bpf$PROG_LOAD(0x5, &(0x7f00000099c0)={0x7, 0x4, &(0x7f00000098c0)=@raw=[@ldst={0x3, 0x3, 0x6, 0xd, 0x7, 0x26}, @ldst={0x0, 0x2, 0x0, 0xa, 0x0, 0x4, 0xffffffffffffffff}], &(0x7f0000009900)='GPL\x00', 0x5, 0x5d, &(0x7f0000009940)=""/93, 0x41f00, 0x1, [], r13}, 0x48) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000009b40)={r8, &(0x7f0000009a40)="402c0b8b20e0ae84bb", &(0x7f0000009a80)=""/178}, 0x18) 2018/03/31 05:13:32 executing program 7: socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) sendmsg$kcm(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="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", 0x1cc}], 0x1, &(0x7f0000001200)}, 0x0) recvmsg(r0, &(0x7f0000001440)={&(0x7f0000000040)=@sco, 0x80, &(0x7f00000013c0)}, 0x0) recvmsg(r1, &(0x7f0000000540)={&(0x7f0000000400)=@hci, 0x80, &(0x7f0000000480)=[{&(0x7f0000000ac0)=""/192, 0xc0}], 0x1, &(0x7f00000004c0)=""/47, 0x2f, 0x80000000}, 0x10000) recvmsg(r1, &(0x7f0000002d00)={0x0, 0x0, &(0x7f0000002bc0)=[{&(0x7f0000002800)=""/123, 0x7b}, {&(0x7f0000002880)=""/12, 0xc}, {&(0x7f00000028c0)=""/139, 0x8b}, {&(0x7f0000002980)=""/168, 0xa8}, {&(0x7f0000002a40)=""/108, 0x6c}, {&(0x7f0000002ac0)=""/207, 0xcf}], 0x6, &(0x7f0000002c40)=""/163, 0xa3, 0x9}, 0x2) mkdir(&(0x7f0000000a00)='./file0\x00', 0x2000000000) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='sysfs\x00', 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r1) mount(&(0x7f0000000080)='./file0/file0\x00', &(0x7f00000001c0)='./file0/bus\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000280)) socketpair(0x1000000008, 0x0, 0x40, &(0x7f0000000280)) mount(&(0x7f0000000180)='./file0/bus\x00', &(0x7f0000000240)='./file0/bus\x00', &(0x7f0000000980)="ff15f96673debf110c933a8338f639c7e76d69e432264fab7bbb821823bd5304dad968e01afb639b3a09810d6676c402924c10f9c2f1c5c40fba438f00f50b2e6aaaed923f1fed2c1befca81b0b320d4b1ebb0973f9b794fb359dc68ac9d340af789a66ae51117e7335b55d26530c51cd78dbeabe42b", 0x61, 0x0) mount(&(0x7f0000000d00)='./file1\x00', &(0x7f0000000d40)='./file0\x00', &(0x7f0000000a80)='sockfs\x00', 0x22, &(0x7f0000000dc0)) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x10, 0x2000000004, 0x4, 0x4, 0x0, 0xffffffffffffffff, 0x1, [0x4]}, 0x2c) mkdir(&(0x7f0000001500)='./file0/bus\x00', 0x40) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0), 0xc) mount(&(0x7f0000000580)='./file0/file0\x00', &(0x7f0000000a40)='./file0/file0\x00', &(0x7f0000000b80)='nfs\x00', 0x40, &(0x7f0000000bc0)="6143bb3ba1195b64f898be7de09c88879f227ebcc3d1ecdab6616a29f81e0bd43f13b722f820585d04fbd432503bcf027f36ef1d7dcb13936d6861ffb6730b60b2c8e685b4eda4baa86ed8e17e0788f163340cc55af00f1de8cd9d70e7319a1288e92e165909c59607ac23920ca0ebe5eb8edd057cdc2ed64a5a2aff79") socketpair(0x5, 0x0, 0x1, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg$kcm(r2, &(0x7f0000000940)={&(0x7f0000002680)=@un=@abs, 0x80, &(0x7f0000000840)=[{&(0x7f00000005c0)=""/32, 0x20}, {&(0x7f0000000600)=""/45, 0x2d}, {&(0x7f0000000640)=""/159, 0x9f}, {&(0x7f0000000700)=""/135, 0x87}, {&(0x7f00000007c0)=""/121, 0x62}], 0x5, &(0x7f00000008c0)=""/99, 0x63, 0x4}, 0x20) sendmsg(r1, &(0x7f00000027c0)={&(0x7f0000001480)=@ipx={0x4, 0x5, 0x0, "26b6f7f245e1"}, 0x80, &(0x7f0000002500), 0x0, &(0x7f0000001540)=ANY=[]}, 0x4000000) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001740)={&(0x7f0000001700)='./file0/bus\x00', 0x0, 0x8}, 0x10) sendmsg(r1, &(0x7f0000001800)={&(0x7f0000001540)=@in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x16}}, 0x80, &(0x7f0000001780)=[{&(0x7f00000015c0)="a82501ba779e76396ab2c3be363cff7a86a9ba4ee4a6c1774ec5322fcf01be5d4562722ba6cd33ee", 0x28}], 0x1, &(0x7f00000017c0)=[{0x28, 0x10f, 0x8, "0dae12dfd98ab338818d77d132c8403186e0539e"}], 0x28, 0x400c004}, 0x8800) [ 185.199423] devpts: called with bogus options [ 185.345121] devpts: called with bogus options 2018/03/31 05:13:33 executing program 4: mount(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='ncpfs\x00', 0x80802, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x50, &(0x7f0000000700)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780)=r0, 0x4) mount(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='./file0\x00', &(0x7f00000006c0)='btrfs\x00', 0x89402, &(0x7f0000000900)="e196efa3cb748d2a6600968b76295ff919bc3877b18eb8d265a35493fcf34fdc965cd5c837d2389c6e2ec6088abe8daaa8ca23f9298fc94dc26874bc4d4567afea1ca0879cdf21e915005a83e96b1002af29091d2176abbb7fec088a67f2e1390f32adaf2f252d24510870f8df7186936f4d88957eb8fcda78b7383a7d24db701d524557ee7324433e70d9ffa185098325f9e657d3c29cf6a35843cb96780269db1c735d55938af5c60e1e4ba25928697277b0fdf356b62399b4c8826d09bfca7d6078c19b4995195ea814b1bb40c06210ec") ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6f3, 0x0, 0x6, 0x0, 0x0, 0xfffdffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x22, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000f6bffb)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000400)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000540)={r1, 0x50}, 0xfffffe74) close(r1) perf_event_open(&(0x7f0000348f88)={0x2, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x28, 0x2, 0x0, &(0x7f0000000000)={0x0}) mkdir(&(0x7f0000000100)='./file0\x00', 0x1000000000) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='selinuxfs\x00', 0x1000, &(0x7f0000000100)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='minix\x00', 0x10020, &(0x7f0000000240)) 2018/03/31 05:13:33 executing program 7: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f00000003c0), 0x2}, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair(0x15, 0x3, 0x7, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f00000002c0)=r3, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9}, 0x3d1) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) r4 = socket$kcm(0x29, 0x3000000000000a, 0x0) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000040)) recvmsg$kcm(r1, &(0x7f0000001e00)={&(0x7f00000000c0)=@pppol2tpv3in6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000001ac0)=""/80, 0x50}, {&(0x7f0000001b40)=""/146, 0x195}, {&(0x7f0000001c00)=""/84, 0xfffffffffffffca5}, {&(0x7f0000001c80)=""/33, 0x21}], 0x1000000000000214, &(0x7f0000001d00)=""/233, 0xe9, 0x8000}, 0x2000) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r4, &(0x7f0000000480)="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"}, 0x10) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x10) 2018/03/31 05:13:33 executing program 1: r0 = socket$kcm(0x29, 0x2, 0x0) socketpair$ax25(0x3, 0x2, 0xc7, &(0x7f0000000300)) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=@raw, &(0x7f00000000c0)='GPL\x00', 0x9b7de6f, 0x12, &(0x7f0000000100)=""/18, 0x41f00}, 0x48) socketpair(0x1e, 0x1, 0x4, &(0x7f0000000140)={0x0, 0x0}) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x10, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0x11}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)=@vsock, 0xfffffffffffffda6, &(0x7f00000000c0)=[{&(0x7f0000000180)=""/154, 0x9a}], 0x1, &(0x7f0000000240)=""/105, 0x69}, 0x0) recvmsg$kcm(r0, &(0x7f0000000d40)={&(0x7f0000000700)=@l2, 0x80, &(0x7f0000000bc0)=[{&(0x7f0000000780)=""/212, 0xd4}, {&(0x7f0000000880)=""/94, 0x5e}, {&(0x7f0000000900)=""/179, 0xb3}, {&(0x7f0000000a00)=""/236, 0xec}, {&(0x7f0000000b00)=""/134, 0x86}], 0x5, &(0x7f0000000c40)=""/218, 0xda, 0x86}, 0x20) close(r1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={r2, 0x28, &(0x7f0000000340)}, 0x10) sendmsg(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x28a, &(0x7f0000000000)}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x0, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000006240)={0x0, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000004000000000000000010000000000ffff090000000000000000000000180000000000000000000000"], &(0x7f00000003c0)='GPL\x00', 0x0, 0x75, &(0x7f00000004c0)=""/117, 0x41100, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x0, 0xffffffffffffffff, 0x0, [0x115]}, 0x2c) socketpair(0x0, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r5, &(0x7f00000009c0)={&(0x7f0000000440)=@nl=@unspec, 0x80, &(0x7f0000000640)=[{&(0x7f0000000540)="4e04cddb8ac72d53be6434b6f5b13c911b53b31886fde3cd3a737bf703c7242b7641b55026d5c81d391c0e8ac8ee1067853ba37a2723061149c070fe109f647b7234c19ae26cb87dd899615ef9a433d9dd703c16ca8b5454bc615f229dd5796841a859d2904d4390622354115d278b2a1990ae8c96ea609605c9736983308a35af8c879c479c34779c11bb3708e35a4bdae491e3bb17ff94ca96183a6a32b1f73db859ee1f5bf4892e66cb6cda0d6df3b9b3fb14b28a1934086b52553df68992e3bcc9e9a6621420c793b6aa9ecc748469d2448bd67b99dfe11c4d71740c31", 0xdf}], 0x1, &(0x7f0000000a80)=ANY=[], 0x0, 0x40000}, 0x5) close(r3) close(r4) 2018/03/31 05:13:33 executing program 2: socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000040)={0x7, 0x70, 0x1, 0xaabc, 0x2, 0x2, 0x0, 0xec, 0x4800, 0x1, 0x3a6b72c9, 0xffffffffffff8000, 0xfff, 0x7, 0x2, 0x7, 0xff, 0x1, 0x2, 0x9, 0x1, 0x0, 0x5, 0x75, 0x2, 0x7, 0x8, 0x4, 0x0, 0xdbce, 0xffff, 0xfaf, 0x1, 0xe7, 0xd0eb, 0x28a5, 0x9, 0x4, 0x0, 0x7, 0x2, @perf_config_ext={0x1, 0x8000}, 0x489, 0x6, 0xff, 0x0, 0x9d, 0x8, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f00000000c0)={0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000140)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r2 = getpid() r3 = perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x8, 0x4, 0x4, 0x1, 0x0, 0x401, 0x100, 0x7, 0xcfc0, 0x7, 0x0, 0x7, 0x30, 0x7, 0x7, 0xfff, 0x7, 0x9, 0xff, 0x9, 0xf, 0x0, 0x3, 0x100000000, 0x3, 0x8, 0xffff, 0x2, 0x3, 0xff, 0x6f, 0x3, 0x5, 0x800, 0x81, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000180), 0x1}, 0x11815, 0x9, 0x1, 0x1, 0x101, 0x5, 0x1e892fee}, r2, 0x9, r1, 0x1) r4 = perf_event_open(&(0x7f0000000280)={0x5, 0x70, 0xe00000000000, 0x9, 0x800, 0x6, 0x0, 0x7ff, 0x10200, 0xb, 0xe3, 0x5, 0x1, 0x4, 0x9b0f, 0x1f8a, 0x401, 0x1, 0xe975, 0x7, 0x437, 0x9, 0x7f, 0x20, 0x1, 0x2, 0x3, 0x5, 0x200, 0x1, 0x8, 0x401, 0x401, 0x2, 0x8, 0xfff, 0xf3c8, 0xf23, 0x0, 0x7fffffff, 0x0, @perf_bp={&(0x7f0000000240), 0x9}, 0x828, 0x3, 0x5, 0x1, 0x0, 0xc37, 0x6}, r2, 0x4, r1, 0x2) r5 = perf_event_open(&(0x7f0000000300)={0x4, 0x70, 0xff, 0x3, 0x7f, 0x7, 0x0, 0x40, 0x4a240, 0x2, 0xffffffffffffcc27, 0xb8, 0x2, 0x7, 0x9, 0x800, 0x3, 0x7d4d, 0xf7, 0xfffffffffffffffa, 0x9, 0x4, 0x3, 0x90be, 0x9, 0xfffffffffffffffc, 0x6, 0x3ff, 0xab6b, 0x8001, 0x5, 0x2, 0x9, 0x732, 0x400, 0x55000000000, 0x1ff, 0x6, 0x0, 0x0, 0x2, @perf_config_ext={0x6, 0xffffffff}, 0x40, 0x80000001, 0x7fff, 0x2, 0x1, 0x6, 0x5}, r2, 0xf, r4, 0xa) r6 = perf_event_open(&(0x7f00000003c0)={0x7, 0x70, 0xc87d, 0x6, 0x5, 0x80000001, 0x0, 0x3, 0x1, 0xb, 0xffffffff, 0x9, 0x584, 0x31b, 0x7, 0x2, 0x3, 0x544, 0x100000001, 0x9, 0x1, 0x100, 0x3, 0x1, 0x7, 0x0, 0x7, 0x5, 0xbb, 0x40, 0x7, 0x8, 0x81, 0xc5a, 0x0, 0x7, 0x1f, 0x815, 0x0, 0xffff, 0x2, @perf_bp={&(0x7f0000000380), 0x8}, 0x4, 0x5, 0xc95, 0x0, 0x7ff, 0x7b02, 0x7}, r2, 0x10, r1, 0xb) ioctl$PERF_EVENT_IOC_DISABLE(r3, 0x2401, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0x4) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = perf_event_open(&(0x7f0000000480)={0x7, 0x70, 0x7, 0xdbff, 0x3, 0x3f, 0x0, 0x8, 0x0, 0xc, 0x8, 0x0, 0xf43, 0x101, 0x6, 0x5, 0x6, 0x9, 0x200, 0xfffffffffffffffd, 0x4, 0x6, 0x6e, 0x20, 0x1b3, 0x1fe, 0x7ff, 0x3, 0x8000, 0x5, 0x0, 0x0, 0x0, 0x5, 0x22d2, 0x401, 0x68, 0xa1ce, 0x0, 0x4, 0x0, @perf_config_ext={0x2fb, 0x4}, 0x2000, 0xd33, 0x6, 0x697c4c7d75b7b6da, 0x171f, 0x9, 0x9}, r2, 0x6, r5, 0x1) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x9, 0x6, 0x101, 0x8, 0x0, 0x200, 0x2000, 0xf, 0x0, 0x5, 0x6, 0x3, 0x2, 0x0, 0x8001, 0x8, 0x3, 0x5, 0x17, 0x7, 0x4, 0x400, 0xffffffff, 0x7, 0x8000, 0x2, 0x100, 0x0, 0x7, 0x95de, 0x2, 0x1, 0x2, 0xd432, 0x3ff, 0x8599, 0x0, 0x3ff, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x10080, 0x7, 0xe7e, 0x7, 0x5, 0x7, 0x9}, r2, 0x0, r3, 0x8) close(r7) ioctl$PERF_EVENT_IOC_DISABLE(r9, 0x2401, 0x1) r10 = gettid() ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f00000005c0)={r0}) ioctl$sock_kcm_SIOCKCMUNATTACH(r11, 0x89e1, &(0x7f0000000600)={r8}) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000640)) r12 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)={0x4, 0x7, 0x7f, 0x9787, 0x1c, 0xffffffffffffffff, 0x5}, 0x2c) recvmsg$kcm(r11, &(0x7f0000009440)={&(0x7f0000009300)=@can={0x0, 0x0}, 0x80, &(0x7f00000093c0)=[{&(0x7f0000009380)=""/16, 0x10}], 0x1, &(0x7f0000009400)=""/18, 0x12, 0x3bc1}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000009480)={0xf, 0x13, &(0x7f00000006c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [@ldst={0x3, 0x2, 0x1, 0x2, 0x7, 0xffffffff, 0x4}, @map={0x18, 0x0, 0x1, 0x0, r12}, @alu={0x7, 0x5, 0xf, 0x6, 0xe, 0x2, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4}, @jmp={0x5, 0x7a4c, 0x0, 0x3, 0x9, 0xffffffff, 0xfffffffffffffff0}, @alu={0x4, 0x20, 0x9, 0x9, 0x5, 0xfffffffe, 0x4}, @jmp={0x5, 0x81, 0x9, 0x7, 0x6, 0xfffffffe, 0xfffffffffffffff0}, @jmp={0x5, 0x3, 0x3, 0x0, 0x2, 0x2, 0xffffffffffffffff}], {0x95}}, &(0x7f0000000780)='GPL\x00', 0x4, 0x77, &(0x7f00000007c0)=""/119, 0x0, 0x1, [], r13}, 0x48) mount(&(0x7f0000009500)='./file0\x00', &(0x7f0000009540)='./file0\x00', &(0x7f0000009580)='cramfs\x00', 0x5020, &(0x7f00000095c0)="22f464f8fef2b95976576e903efe99229584aaf55fa0d91223905d4a68c0c7d18bf26de6fec0660b0c36945200da04f802d9059dd5f6d2f0eca450f4fdd46ed2b411588d802f0d1d02be65816332b2754d686e927593deb8ee3ed17a24d749db81290c33836bcc9b7d93084c53d0744e81deb8b83d9b23565d6db4cb746eb15b20f7b806f0b5a02676d90260a61b00e9ec0b4b8bf07d5f93b3feda8299586c3936f743c764205de278c25a6fff98") perf_event_open(&(0x7f00000096c0)={0x1, 0x70, 0x3, 0xa8e, 0x1000, 0xe57a, 0x0, 0x6, 0x2100b, 0x2, 0x9, 0xdb1b, 0xfffffffffffffffa, 0xa7f8, 0x3, 0x2, 0x800, 0x800, 0x2, 0x0, 0x3f, 0x3, 0x8000000000000, 0x3, 0x20, 0x6, 0x3, 0xfffffffffffff318, 0xffffffffffff0001, 0xfffffffffffffffe, 0x12, 0x1, 0x101, 0x8, 0x100, 0x1, 0x3, 0x8, 0x0, 0x3ff, 0x7, @perf_bp={&(0x7f0000009680), 0x3}, 0x9, 0x6, 0xfffffffffffffff7, 0x0, 0x0, 0x49, 0xfffffffffffff3b8}, r10, 0xe, r5, 0x8) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000009880)={r12, &(0x7f0000009740)="8ba447000764036f17624e623896639a3e2456b901aedcdb4221cea83c3b2c94575967a34ec104bbebeaf6a6b50494e6763f41056d2ca84f906fa48d72590e81334926fab48e", &(0x7f00000097c0)=""/170}, 0x18) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r4, 0x2405, r6) bpf$PROG_LOAD(0x5, &(0x7f00000099c0)={0x7, 0x4, &(0x7f00000098c0)=@raw=[@ldst={0x3, 0x3, 0x6, 0xd, 0x7, 0x26}, @ldst={0x0, 0x2, 0x0, 0xa, 0x0, 0x4, 0xffffffffffffffff}], &(0x7f0000009900)='GPL\x00', 0x5, 0x5d, &(0x7f0000009940)=""/93, 0x41f00, 0x1, [], r13}, 0x48) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000009b40)={r8, &(0x7f0000009a40)="402c0b8b20e0ae84bb", &(0x7f0000009a80)=""/178}, 0x18) 2018/03/31 05:13:33 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x4, 0x0, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x1e, 0x0, 0x3, 0x6, 0x1, r0, 0x6773}, 0x2c) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1, 0x2, 0x7, 0x8001, 0x10, 0xffffffffffffffff, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000580)={0xffffffffffffffff, &(0x7f00000004c0)="a3261c57", &(0x7f0000000500)="cd8249bf39d6176ef7346799ac199e6cf9e7fe02418812a394d9c874384d4ba7bd9d3b261f1a018d54c20e688a5dc8a23babc41d618eab351795754d5fa3ad", 0x2}, 0x20) sendmsg(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080), 0x1e}], 0x1000000000000020}, 0x8000) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000780)={r0, &(0x7f0000000680), &(0x7f00000006c0)=""/166}, 0x18) mount(&(0x7f0000000440)='./file0\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='pstore\x00', 0x4, &(0x7f0000000640)="afb63e3ff55419f9e9572aabeb90d8184a20d3c850fa576f0f0d376978dcd77395a8eb26002ef5146d") mkdir(&(0x7f0000000300)='./file0\x00', 0x60) r2 = perf_event_open(&(0x7f0000000200)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000000), 0x8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) close(r2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000003700)={&(0x7f0000000280)=@pppoe={0x0, 0x0, {0x0, @broadcast}}, 0x80, &(0x7f00000036c0)=[{&(0x7f0000003400)=""/251, 0xfb}, {&(0x7f0000003500)=""/14, 0xe}, {&(0x7f0000003540)=""/107, 0x6b}, {&(0x7f00000035c0)=""/211, 0xd3}], 0x4, 0x0, 0x0, 0x3ff}, 0x1) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000180)) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000dec000)={0x6, 0x4, 0x338d, 0x7}, 0x2c) r5 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)=0xffffffff, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000480)={r5, 0x0, 0xdb, 0x63, &(0x7f00000008c0)="2d332a404dc37881688d32bc3572008bc6b4e9ace098dd0e54b157770be0fafda0c4af57365005c83d5b5a4583cc70f0b6ad117be4de7cb2d56a14e7f7a698444d477803d63cb6bbc95a859c89a18826320b9f731d802b08baf4dffe7251cd346d0ba0345e9e0bd66dec556d324453fec014ebb05231c12b1dd9e930a953307495641e843fc09231fe589fc77ade0f1d6498dcb99a5ef9692ec69be93cb6cefdd2e05b4854c6da382f9db6835611fbe26bcaa21bfd44addab712d8059a236217c1c01cf8fe92b507583059fb47d399449887ef41944955debaa90d", &(0x7f0000000380)=""/99, 0x9, 0x2ae}, 0x28) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f00000001c0)) bpf$MAP_CREATE(0x0, &(0x7f00000007c0)={0xf, 0x100000001, 0x3, 0x5, 0x2, 0xffffffffffffffff, 0x9}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000c88000)={r4, &(0x7f0000847f95), &(0x7f000089b000)}, 0x18) socketpair(0x10, 0x5, 0x3f, &(0x7f0000000840)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMUNATTACH(r6, 0x89e1, &(0x7f0000000880)={r3}) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000800)) 2018/03/31 05:13:33 executing program 3: socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000140)={&(0x7f0000000200)=@nl=@proc, 0x80, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x8}, 0x23) mkdir(&(0x7f0000000000)='./file0\x00', 0x2) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)='ext2\x00', 0x800, &(0x7f0000000180)='\x00') r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000300)={&(0x7f00000000c0)='./file0\x00', r1}, 0x10) 2018/03/31 05:13:33 executing program 6 (fault-call:17 fault-nth:45): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x0, 0x101, 0x4, 0x0, 0x1, r0, 0x0, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r2 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)={0xffffffffffffffff}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r2, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x0, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0", 0xc9}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000280)={&(0x7f0000000680)='./file0\x00'}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r1}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r3) gettid() close(0xffffffffffffffff) 2018/03/31 05:13:33 executing program 0: socketpair(0x0, 0x0, 0x0, &(0x7f00000000c0)) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000180)={0xffffffffffffffff, &(0x7f0000000140)}, 0x10) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0xb343, 0x0, 0x0, 0x0, 0x5, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='devtmpfs\x00', 0x0, &(0x7f0000000100)) [ 186.470731] EXT4-fs: 8 callbacks suppressed [ 186.470739] EXT4-fs (sda1): re-mounted. Opts: [ 186.513373] FAULT_INJECTION: forcing a failure. [ 186.513373] name failslab, interval 1, probability 0, space 0, times 0 [ 186.524699] CPU: 0 PID: 15788 Comm: syz-executor6 Not tainted 4.16.0-rc6+ #42 [ 186.531968] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 186.538568] tmpfs: No value for mount option './file0' [ 186.541309] Call Trace: [ 186.541329] dump_stack+0x194/0x24d [ 186.541343] ? arch_local_irq_restore+0x53/0x53 [ 186.541354] ? __save_stack_trace+0x7e/0xd0 [ 186.541373] should_fail+0x8c0/0xa40 [ 186.565469] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 186.570563] ? kasan_kmalloc+0xad/0xe0 [ 186.574435] ? kmem_cache_alloc_trace+0x136/0x740 [ 186.579260] ? __memcg_init_list_lru_node+0x169/0x270 [ 186.584428] ? __list_lru_init+0x544/0x750 [ 186.588640] ? sget_userns+0x6b1/0xe40 [ 186.592505] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 186.597235] ? do_mount+0xea4/0x2bb0 [ 186.600924] ? SyS_mount+0xab/0x120 [ 186.604528] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 186.609874] ? find_held_lock+0x35/0x1d0 [ 186.613913] ? __lock_is_held+0xb6/0x140 [ 186.617959] ? check_same_owner+0x320/0x320 [ 186.622260] ? rcu_note_context_switch+0x710/0x710 [ 186.627171] should_failslab+0xec/0x120 [ 186.631126] kmem_cache_alloc_trace+0x4b/0x740 [ 186.635684] ? __kmalloc_node+0x33/0x70 [ 186.639636] ? __kmalloc_node+0x33/0x70 [ 186.643585] ? rcu_read_lock_sched_held+0x108/0x120 [ 186.648583] __memcg_init_list_lru_node+0x169/0x270 [ 186.653577] ? list_lru_add+0x7c0/0x7c0 [ 186.657529] ? __kmalloc_node+0x47/0x70 [ 186.661483] __list_lru_init+0x544/0x750 [ 186.665522] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 186.671381] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 186.676375] ? lockdep_init_map+0x9/0x10 [ 186.680412] sget_userns+0x6b1/0xe40 [ 186.684101] ? set_anon_super+0x20/0x20 [ 186.688053] ? put_filp+0x90/0x90 [ 186.691496] ? destroy_unused_super.part.6+0xd0/0xd0 [ 186.696582] ? alloc_vfsmnt+0x762/0x9c0 [ 186.700534] ? path_lookupat+0x238/0xba0 [ 186.704570] ? mnt_free_id.isra.21+0x50/0x50 [ 186.708957] ? trace_hardirqs_off+0x10/0x10 [ 186.713255] ? putname+0xee/0x130 [ 186.716688] ? cap_capable+0x1b5/0x230 [ 186.720553] ? security_capable+0x8e/0xc0 [ 186.724683] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 186.729849] ? ns_capable_common+0xcf/0x160 [ 186.734147] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 186.739312] mount_ns+0x6d/0x190 [ 186.742657] rpc_mount+0x9e/0xd0 [ 186.746003] mount_fs+0x66/0x2d0 [ 186.749356] vfs_kern_mount.part.26+0xc6/0x4a0 [ 186.753912] ? may_umount+0xa0/0xa0 [ 186.757517] ? _raw_read_unlock+0x22/0x30 [ 186.761640] ? __get_fs_type+0x8a/0xc0 [ 186.765504] do_mount+0xea4/0x2bb0 [ 186.769025] ? __might_fault+0x110/0x1d0 [ 186.773067] ? copy_mount_string+0x40/0x40 [ 186.777280] ? __check_object_size+0x8b/0x530 [ 186.781758] ? __might_sleep+0x95/0x190 [ 186.785715] ? kasan_check_write+0x14/0x20 [ 186.789925] ? _copy_from_user+0x99/0x110 [ 186.794049] ? memdup_user+0x5e/0x90 [ 186.797740] ? copy_mount_options+0x1f7/0x2e0 [ 186.802211] SyS_mount+0xab/0x120 [ 186.805641] ? copy_mnt_ns+0xb30/0xb30 [ 186.809506] do_syscall_64+0x281/0x940 [ 186.813371] ? vmalloc_sync_all+0x30/0x30 [ 186.817496] ? trace_event_raw_event_sys_exit+0x260/0x260 [ 186.823013] ? syscall_return_slowpath+0x550/0x550 [ 186.827921] ? syscall_return_slowpath+0x2ac/0x550 [ 186.832831] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 186.838169] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 186.842991] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 186.848158] RIP: 0033:0x454e79 [ 186.851335] RSP: 002b:00007fc28ac9cc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 2018/03/31 05:13:33 executing program 4: mount(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='ncpfs\x00', 0x80802, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x50, &(0x7f0000000700)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780)=r0, 0x4) mount(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='./file0\x00', &(0x7f00000006c0)='btrfs\x00', 0x89402, &(0x7f0000000900)="e196efa3cb748d2a6600968b76295ff919bc3877b18eb8d265a35493fcf34fdc965cd5c837d2389c6e2ec6088abe8daaa8ca23f9298fc94dc26874bc4d4567afea1ca0879cdf21e915005a83e96b1002af29091d2176abbb7fec088a67f2e1390f32adaf2f252d24510870f8df7186936f4d88957eb8fcda78b7383a7d24db701d524557ee7324433e70d9ffa185098325f9e657d3c29cf6a35843cb96780269db1c735d55938af5c60e1e4ba25928697277b0fdf356b62399b4c8826d09bfca7d6078c19b4995195ea814b1bb40c06210ec") ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6f3, 0x0, 0x6, 0x0, 0x0, 0xfffdffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x22, &(0x7f00000007c0)=ANY=[@ANYBLOB="18000000000000000000000000000000000000000020f37b176532826618e8210d55b6b9f796a5cf4309ac945b17b6ec55aad627fce3173f275427d49a02c531c5316326ec3569ef7771eee96dc62f79bb386acf26001097f7673e6b395ee0cac49bf5bbe2db74ffbe760e50b31e653a89e733b2832d3e4e73d9720448a1d74be25a5dbcc32519fc1400391454104d5b5d9b14c5560730768138a9a0e109f34a16cc067edc5d7a0b0912aa587035de0ad6624124ad9467ed6aac80ad02b778f8319fef183facaa39c4519babbd000000000000009d9d8436042fc1b8d6e779a1531ba51c8c8811c745b829a97e3e2d0f13ea630503c6a765fae62d43095c1669d81251d3a6718f867abdfb0b907d24394fd24b2ea273"], &(0x7f0000f6bffb)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000400)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000540)={r1, 0x50}, 0xfffffe74) close(r1) perf_event_open(&(0x7f0000348f88)={0x2, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x28, 0x2, 0x0, &(0x7f0000000000)={0x0}) mkdir(&(0x7f0000000100)='./file0\x00', 0x1000000000) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='selinuxfs\x00', 0x1000, &(0x7f0000000100)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='minix\x00', 0x10020, &(0x7f0000000240)) 2018/03/31 05:13:33 executing program 2: socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000040)={0x7, 0x70, 0x1, 0xaabc, 0x2, 0x2, 0x0, 0xec, 0x4800, 0x1, 0x3a6b72c9, 0xffffffffffff8000, 0xfff, 0x7, 0x2, 0x7, 0xff, 0x1, 0x2, 0x9, 0x1, 0x0, 0x5, 0x75, 0x2, 0x7, 0x8, 0x4, 0x0, 0xdbce, 0xffff, 0xfaf, 0x1, 0xe7, 0xd0eb, 0x28a5, 0x9, 0x4, 0x0, 0x7, 0x2, @perf_config_ext={0x1, 0x8000}, 0x489, 0x6, 0xff, 0x0, 0x9d, 0x8, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f00000000c0)={0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000140)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r2 = getpid() r3 = perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x8, 0x4, 0x4, 0x1, 0x0, 0x401, 0x100, 0x7, 0xcfc0, 0x7, 0x0, 0x7, 0x30, 0x7, 0x7, 0xfff, 0x7, 0x9, 0xff, 0x9, 0xf, 0x0, 0x3, 0x100000000, 0x3, 0x8, 0xffff, 0x2, 0x3, 0xff, 0x6f, 0x3, 0x5, 0x800, 0x81, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000180), 0x1}, 0x11815, 0x9, 0x1, 0x1, 0x101, 0x5, 0x1e892fee}, r2, 0x9, r1, 0x1) r4 = perf_event_open(&(0x7f0000000280)={0x5, 0x70, 0xe00000000000, 0x9, 0x800, 0x6, 0x0, 0x7ff, 0x10200, 0xb, 0xe3, 0x5, 0x1, 0x4, 0x9b0f, 0x1f8a, 0x401, 0x1, 0xe975, 0x7, 0x437, 0x9, 0x7f, 0x20, 0x1, 0x2, 0x3, 0x5, 0x200, 0x1, 0x8, 0x401, 0x401, 0x2, 0x8, 0xfff, 0xf3c8, 0xf23, 0x0, 0x7fffffff, 0x0, @perf_bp={&(0x7f0000000240), 0x9}, 0x828, 0x3, 0x5, 0x1, 0x0, 0xc37, 0x6}, r2, 0x4, r1, 0x2) r5 = perf_event_open(&(0x7f0000000300)={0x4, 0x70, 0xff, 0x3, 0x7f, 0x7, 0x0, 0x40, 0x4a240, 0x2, 0xffffffffffffcc27, 0xb8, 0x2, 0x7, 0x9, 0x800, 0x3, 0x7d4d, 0xf7, 0xfffffffffffffffa, 0x9, 0x4, 0x3, 0x90be, 0x9, 0xfffffffffffffffc, 0x6, 0x3ff, 0xab6b, 0x8001, 0x5, 0x2, 0x9, 0x732, 0x400, 0x55000000000, 0x1ff, 0x6, 0x0, 0x0, 0x2, @perf_config_ext={0x6, 0xffffffff}, 0x40, 0x80000001, 0x7fff, 0x2, 0x1, 0x6, 0x5}, r2, 0xf, r4, 0xa) r6 = perf_event_open(&(0x7f00000003c0)={0x7, 0x70, 0xc87d, 0x6, 0x5, 0x80000001, 0x0, 0x3, 0x1, 0xb, 0xffffffff, 0x9, 0x584, 0x31b, 0x7, 0x2, 0x3, 0x544, 0x100000001, 0x9, 0x1, 0x100, 0x3, 0x1, 0x7, 0x0, 0x7, 0x5, 0xbb, 0x40, 0x7, 0x8, 0x81, 0xc5a, 0x0, 0x7, 0x1f, 0x815, 0x0, 0xffff, 0x2, @perf_bp={&(0x7f0000000380), 0x8}, 0x4, 0x5, 0xc95, 0x0, 0x7ff, 0x7b02, 0x7}, r2, 0x10, r1, 0xb) ioctl$PERF_EVENT_IOC_DISABLE(r3, 0x2401, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0x4) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = perf_event_open(&(0x7f0000000480)={0x7, 0x70, 0x7, 0xdbff, 0x3, 0x3f, 0x0, 0x8, 0x0, 0xc, 0x8, 0x0, 0xf43, 0x101, 0x6, 0x5, 0x6, 0x9, 0x200, 0xfffffffffffffffd, 0x4, 0x6, 0x6e, 0x20, 0x1b3, 0x1fe, 0x7ff, 0x3, 0x8000, 0x5, 0x0, 0x0, 0x0, 0x5, 0x22d2, 0x401, 0x68, 0xa1ce, 0x0, 0x4, 0x0, @perf_config_ext={0x2fb, 0x4}, 0x2000, 0xd33, 0x6, 0x697c4c7d75b7b6da, 0x171f, 0x9, 0x9}, r2, 0x6, r5, 0x1) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x9, 0x6, 0x101, 0x8, 0x0, 0x200, 0x2000, 0xf, 0x0, 0x5, 0x6, 0x3, 0x2, 0x0, 0x8001, 0x8, 0x3, 0x5, 0x17, 0x7, 0x4, 0x400, 0xffffffff, 0x7, 0x8000, 0x2, 0x100, 0x0, 0x7, 0x95de, 0x2, 0x1, 0x2, 0xd432, 0x3ff, 0x8599, 0x0, 0x3ff, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x10080, 0x7, 0xe7e, 0x7, 0x5, 0x7, 0x9}, r2, 0x0, r3, 0x8) close(r7) ioctl$PERF_EVENT_IOC_DISABLE(r9, 0x2401, 0x1) r10 = gettid() ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f00000005c0)={r0}) ioctl$sock_kcm_SIOCKCMUNATTACH(r11, 0x89e1, &(0x7f0000000600)={r8}) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000640)) r12 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)={0x4, 0x7, 0x7f, 0x9787, 0x1c, 0xffffffffffffffff, 0x5}, 0x2c) recvmsg$kcm(r11, &(0x7f0000009440)={&(0x7f0000009300)=@can={0x0, 0x0}, 0x80, &(0x7f00000093c0)=[{&(0x7f0000009380)=""/16, 0x10}], 0x1, &(0x7f0000009400)=""/18, 0x12, 0x3bc1}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000009480)={0xf, 0x13, &(0x7f00000006c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [@ldst={0x3, 0x2, 0x1, 0x2, 0x7, 0xffffffff, 0x4}, @map={0x18, 0x0, 0x1, 0x0, r12}, @alu={0x7, 0x5, 0xf, 0x6, 0xe, 0x2, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4}, @jmp={0x5, 0x7a4c, 0x0, 0x3, 0x9, 0xffffffff, 0xfffffffffffffff0}, @alu={0x4, 0x20, 0x9, 0x9, 0x5, 0xfffffffe, 0x4}, @jmp={0x5, 0x81, 0x9, 0x7, 0x6, 0xfffffffe, 0xfffffffffffffff0}, @jmp={0x5, 0x3, 0x3, 0x0, 0x2, 0x2, 0xffffffffffffffff}], {0x95}}, &(0x7f0000000780)='GPL\x00', 0x4, 0x77, &(0x7f00000007c0)=""/119, 0x0, 0x1, [], r13}, 0x48) mount(&(0x7f0000009500)='./file0\x00', &(0x7f0000009540)='./file0\x00', &(0x7f0000009580)='cramfs\x00', 0x5020, &(0x7f00000095c0)="22f464f8fef2b95976576e903efe99229584aaf55fa0d91223905d4a68c0c7d18bf26de6fec0660b0c36945200da04f802d9059dd5f6d2f0eca450f4fdd46ed2b411588d802f0d1d02be65816332b2754d686e927593deb8ee3ed17a24d749db81290c33836bcc9b7d93084c53d0744e81deb8b83d9b23565d6db4cb746eb15b20f7b806f0b5a02676d90260a61b00e9ec0b4b8bf07d5f93b3feda8299586c3936f743c764205de278c25a6fff98") perf_event_open(&(0x7f00000096c0)={0x1, 0x70, 0x3, 0xa8e, 0x1000, 0xe57a, 0x0, 0x6, 0x2100b, 0x2, 0x9, 0xdb1b, 0xfffffffffffffffa, 0xa7f8, 0x3, 0x2, 0x800, 0x800, 0x2, 0x0, 0x3f, 0x3, 0x8000000000000, 0x3, 0x20, 0x6, 0x3, 0xfffffffffffff318, 0xffffffffffff0001, 0xfffffffffffffffe, 0x12, 0x1, 0x101, 0x8, 0x100, 0x1, 0x3, 0x8, 0x0, 0x3ff, 0x7, @perf_bp={&(0x7f0000009680), 0x3}, 0x9, 0x6, 0xfffffffffffffff7, 0x0, 0x0, 0x49, 0xfffffffffffff3b8}, r10, 0xe, r5, 0x8) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000009880)={r12, &(0x7f0000009740)="8ba447000764036f17624e623896639a3e2456b901aedcdb4221cea83c3b2c94575967a34ec104bbebeaf6a6b50494e6763f41056d2ca84f906fa48d72590e81334926fab48e", &(0x7f00000097c0)=""/170}, 0x18) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r4, 0x2405, r6) bpf$PROG_LOAD(0x5, &(0x7f00000099c0)={0x7, 0x4, &(0x7f00000098c0)=@raw=[@ldst={0x3, 0x3, 0x6, 0xd, 0x7, 0x26}, @ldst={0x0, 0x2, 0x0, 0xa, 0x0, 0x4, 0xffffffffffffffff}], &(0x7f0000009900)='GPL\x00', 0x5, 0x5d, &(0x7f0000009940)=""/93, 0x41f00, 0x1, [], r13}, 0x48) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000009b40)={r8, &(0x7f0000009a40)="402c0b8b20e0ae84bb", &(0x7f0000009a80)=""/178}, 0x18) 2018/03/31 05:13:34 executing program 3: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0x28, &(0x7f0000000080)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100)={r0, 0xfffffffffffff000, 0x10}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x7}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x7, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x1f, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x9, 0x32d, &(0x7f00001a7f05)=""/251}, 0x48) [ 186.859348] RAX: ffffffffffffffda RBX: 00007fc28ac9d6d4 RCX: 0000000000454e79 [ 186.866600] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 186.873844] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 186.881088] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000016 [ 186.888331] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000002d 2018/03/31 05:13:34 executing program 2: socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000040)={0x7, 0x70, 0x1, 0xaabc, 0x2, 0x2, 0x0, 0xec, 0x4800, 0x1, 0x3a6b72c9, 0xffffffffffff8000, 0xfff, 0x7, 0x2, 0x7, 0xff, 0x1, 0x2, 0x9, 0x1, 0x0, 0x5, 0x75, 0x2, 0x7, 0x8, 0x4, 0x0, 0xdbce, 0xffff, 0xfaf, 0x1, 0xe7, 0xd0eb, 0x28a5, 0x9, 0x4, 0x0, 0x7, 0x2, @perf_config_ext={0x1, 0x8000}, 0x489, 0x6, 0xff, 0x0, 0x9d, 0x8, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f00000000c0)={0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000140)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r2 = getpid() r3 = perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x8, 0x4, 0x4, 0x1, 0x0, 0x401, 0x100, 0x7, 0xcfc0, 0x7, 0x0, 0x7, 0x30, 0x7, 0x7, 0xfff, 0x7, 0x9, 0xff, 0x9, 0xf, 0x0, 0x3, 0x100000000, 0x3, 0x8, 0xffff, 0x2, 0x3, 0xff, 0x6f, 0x3, 0x5, 0x800, 0x81, 0x0, 0x0, 0x9, 0x1, @perf_bp={&(0x7f0000000180)}, 0x11815, 0x9, 0x1, 0x1, 0x101, 0x5, 0x1e892fee}, r2, 0x9, r1, 0x1) r4 = perf_event_open(&(0x7f0000000280)={0x5, 0x70, 0xe00000000000, 0x9, 0x800, 0x6, 0x0, 0x7ff, 0x10200, 0xb, 0xe3, 0x5, 0x1, 0x4, 0x9b0f, 0x1f8a, 0x401, 0x1, 0xe975, 0x7, 0x437, 0x9, 0x7f, 0x20, 0x1, 0x2, 0x3, 0x5, 0x200, 0x1, 0x8, 0x401, 0x401, 0x2, 0x8, 0xfff, 0xf3c8, 0xf23, 0x0, 0x7fffffff, 0x0, @perf_bp={&(0x7f0000000240), 0x9}, 0x828, 0x3, 0x5, 0x1, 0x0, 0xc37, 0x6}, r2, 0x4, r1, 0x2) r5 = perf_event_open(&(0x7f0000000300)={0x4, 0x70, 0xff, 0x3, 0x7f, 0x7, 0x0, 0x40, 0x4a240, 0x2, 0xffffffffffffcc27, 0xb8, 0x2, 0x7, 0x9, 0x800, 0x3, 0x7d4d, 0xf7, 0xfffffffffffffffa, 0x9, 0x4, 0x3, 0x90be, 0x9, 0xfffffffffffffffc, 0x6, 0x3ff, 0xab6b, 0x8001, 0x5, 0x2, 0x9, 0x732, 0x400, 0x55000000000, 0x1ff, 0x6, 0x0, 0x0, 0x2, @perf_config_ext={0x6, 0xffffffff}, 0x40, 0x80000001, 0x7fff, 0x2, 0x1, 0x6, 0x5}, r2, 0xf, r4, 0xa) r6 = perf_event_open(&(0x7f00000003c0)={0x7, 0x70, 0xc87d, 0x6, 0x5, 0x80000001, 0x0, 0x3, 0x1, 0xb, 0xffffffff, 0x9, 0x584, 0x31b, 0x7, 0x2, 0x3, 0x544, 0x100000001, 0x9, 0x1, 0x100, 0x3, 0x1, 0x7, 0x0, 0x7, 0x5, 0xbb, 0x40, 0x7, 0x8, 0x81, 0xc5a, 0x0, 0x7, 0x1f, 0x815, 0x0, 0xffff, 0x2, @perf_bp={&(0x7f0000000380), 0x8}, 0x4, 0x5, 0xc95, 0x0, 0x7ff, 0x7b02, 0x7}, r2, 0x10, r1, 0xb) ioctl$PERF_EVENT_IOC_DISABLE(r3, 0x2401, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0x4) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = perf_event_open(&(0x7f0000000480)={0x7, 0x70, 0x7, 0xdbff, 0x3, 0x3f, 0x0, 0x8, 0x0, 0xc, 0x8, 0x0, 0xf43, 0x101, 0x6, 0x5, 0x6, 0x9, 0x200, 0xfffffffffffffffd, 0x4, 0x6, 0x6e, 0x20, 0x1b3, 0x1fe, 0x7ff, 0x3, 0x8000, 0x5, 0x0, 0x0, 0x0, 0x5, 0x22d2, 0x401, 0x68, 0xa1ce, 0x0, 0x4, 0x0, @perf_config_ext={0x2fb, 0x4}, 0x2000, 0xd33, 0x6, 0x697c4c7d75b7b6da, 0x171f, 0x9, 0x9}, r2, 0x6, r5, 0x1) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x9, 0x6, 0x101, 0x8, 0x0, 0x200, 0x2000, 0xf, 0x0, 0x5, 0x6, 0x3, 0x2, 0x0, 0x8001, 0x8, 0x3, 0x5, 0x17, 0x7, 0x4, 0x400, 0xffffffff, 0x7, 0x8000, 0x2, 0x100, 0x0, 0x7, 0x95de, 0x2, 0x1, 0x2, 0xd432, 0x3ff, 0x8599, 0x0, 0x3ff, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x10080, 0x7, 0xe7e, 0x7, 0x5, 0x7, 0x9}, r2, 0x0, r3, 0x8) close(r7) ioctl$PERF_EVENT_IOC_DISABLE(r9, 0x2401, 0x1) r10 = gettid() ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f00000005c0)={r0}) ioctl$sock_kcm_SIOCKCMUNATTACH(r11, 0x89e1, &(0x7f0000000600)={r8}) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000640)) r12 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)={0x4, 0x7, 0x7f, 0x9787, 0x1c, 0xffffffffffffffff, 0x5}, 0x2c) recvmsg$kcm(r11, &(0x7f0000009440)={&(0x7f0000009300)=@can={0x0, 0x0}, 0x80, &(0x7f00000093c0)=[{&(0x7f0000009380)=""/16, 0x10}], 0x1, &(0x7f0000009400)=""/18, 0x12, 0x3bc1}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000009480)={0xf, 0x13, &(0x7f00000006c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [@ldst={0x3, 0x2, 0x1, 0x2, 0x7, 0xffffffff, 0x4}, @map={0x18, 0x0, 0x1, 0x0, r12}, @alu={0x7, 0x5, 0xf, 0x6, 0xe, 0x2, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4}, @jmp={0x5, 0x7a4c, 0x0, 0x3, 0x9, 0xffffffff, 0xfffffffffffffff0}, @alu={0x4, 0x20, 0x9, 0x9, 0x5, 0xfffffffe, 0x4}, @jmp={0x5, 0x81, 0x9, 0x7, 0x6, 0xfffffffe, 0xfffffffffffffff0}, @jmp={0x5, 0x3, 0x3, 0x0, 0x2, 0x2, 0xffffffffffffffff}], {0x95}}, &(0x7f0000000780)='GPL\x00', 0x4, 0x77, &(0x7f00000007c0)=""/119, 0x0, 0x1, [], r13}, 0x48) mount(&(0x7f0000009500)='./file0\x00', &(0x7f0000009540)='./file0\x00', &(0x7f0000009580)='cramfs\x00', 0x5020, &(0x7f00000095c0)="22f464f8fef2b95976576e903efe99229584aaf55fa0d91223905d4a68c0c7d18bf26de6fec0660b0c36945200da04f802d9059dd5f6d2f0eca450f4fdd46ed2b411588d802f0d1d02be65816332b2754d686e927593deb8ee3ed17a24d749db81290c33836bcc9b7d93084c53d0744e81deb8b83d9b23565d6db4cb746eb15b20f7b806f0b5a02676d90260a61b00e9ec0b4b8bf07d5f93b3feda8299586c3936f743c764205de278c25a6fff98") perf_event_open(&(0x7f00000096c0)={0x1, 0x70, 0x3, 0xa8e, 0x1000, 0xe57a, 0x0, 0x6, 0x2100b, 0x2, 0x9, 0xdb1b, 0xfffffffffffffffa, 0xa7f8, 0x3, 0x2, 0x800, 0x800, 0x2, 0x0, 0x3f, 0x3, 0x8000000000000, 0x3, 0x20, 0x6, 0x3, 0xfffffffffffff318, 0xffffffffffff0001, 0xfffffffffffffffe, 0x12, 0x1, 0x101, 0x8, 0x100, 0x1, 0x3, 0x8, 0x0, 0x3ff, 0x7, @perf_bp={&(0x7f0000009680), 0x3}, 0x9, 0x6, 0xfffffffffffffff7, 0x0, 0x0, 0x49, 0xfffffffffffff3b8}, r10, 0xe, r5, 0x8) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000009880)={r12, &(0x7f0000009740)="8ba447000764036f17624e623896639a3e2456b901aedcdb4221cea83c3b2c94575967a34ec104bbebeaf6a6b50494e6763f41056d2ca84f906fa48d72590e81334926fab48e", &(0x7f00000097c0)=""/170}, 0x18) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r4, 0x2405, r6) bpf$PROG_LOAD(0x5, &(0x7f00000099c0)={0x7, 0x4, &(0x7f00000098c0)=@raw=[@ldst={0x3, 0x3, 0x6, 0xd, 0x7, 0x26}, @ldst={0x0, 0x2, 0x0, 0xa, 0x0, 0x4, 0xffffffffffffffff}], &(0x7f0000009900)='GPL\x00', 0x5, 0x5d, &(0x7f0000009940)=""/93, 0x41f00, 0x1, [], r13}, 0x48) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000009b40)={r8, &(0x7f0000009a40)="402c0b8b20e0ae84bb", &(0x7f0000009a80)=""/178}, 0x18) 2018/03/31 05:13:34 executing program 7: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00', 0x0, 0x8}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x2, 0x8, &(0x7f0000000100)=@raw=[@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3, 0x1127, 0x8}, @map={0x18, 0x0, 0x1, 0x0, r0}, @exit={0x95}], &(0x7f0000000140)='syzkaller\x00', 0x2, 0x89, &(0x7f0000000180)=""/137, 0x41100, 0x1}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r1, 0x0, 0x98, 0x9a, &(0x7f00000002c0)="43677d27d31486812a73aa965014bbc316648880bf3877331f489ae59d5b3a650e3d6d5554ee355a0a195092ff6b2be3dd7536112f91804f0a7b1d39cb22ae724b20dcba2331be5d192fe953e757ed12f9485f6e970547a2b0772f2d4b0b11b72f4c290ee61c876d5ca5eebb425cb6d4dbaf30a97e30dfcb02cf857c0abb25880edbd9259e9412a98083b5fdb3695c687c1272747754efb7", &(0x7f0000000380)=""/154, 0x7, 0x400}, 0x28) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x7f, 0x7, 0x5, 0x1, r0}, 0x2c) close(r2) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x5}, 0x10) 2018/03/31 05:13:34 executing program 0: socketpair(0x0, 0x6, 0x1, &(0x7f00000014c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000001500)='\x00') bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r1, &(0x7f00000031c0)="9ef6c9dab9b50686c9421d605e72472ee710ea067b5a28008baa791f61faec9d88062ae890490a4dfe4b68040fcb474e4ab388702e", &(0x7f00000000c0)=""/21}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000001480)) socketpair(0xf, 0x0, 0xa8, &(0x7f0000000180)={0xffffffffffffffff}) socketpair(0x5, 0x6, 0x9, &(0x7f0000003200)={0xffffffffffffffff}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000019c0)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000001680)={0xffffffffffffffff, &(0x7f0000001580)="987d8d2c8cef65f2ce7a3126dbd22e992f920a8e267a0efed1925ac42ed50dcb7786605524e70e399340577ad7edc0f2af2d6be93f4ad6c51d27d3bfae9a1dedccaf1401dc6daef002d79cc475b6b1", &(0x7f0000001600)=""/93}, 0x18) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000018c0)={r0, &(0x7f00000017c0)="68183ac2a1a47993e020111e8e0059d19515e15cf20ebe7b662310a50f09add03913e3bfbfae80d3a0663c20b01e2cfcfcdf13e7c174f61fc621344328af29d8907374d685acb251111427bed4a9bc9c7de460d34cf7a7c7908a61ed58b80f77c4a7004db3a6322ae3765de6e2a8d511a102d497cc32848a4718077cad1a130c8ece50346ff1af51ffb748cdc77a0abc2b", &(0x7f0000001880)=""/5}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001740)={r5, 0x50, &(0x7f00000016c0)}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0xc, 0x14, &(0x7f0000001900)=ANY=[@ANYBLOB="180200000074cdd470f167b7ed870000ff0000000002800000312d000027d30a8fc69af6fda2ba788dc9d1aa0006000500613b7d566ea957d3b9173345d2cee12f9bef71c49de82bff2c57ed95c24a73f61395425cd06240c9c086506fa9eeb0b005c018899748a26d10237d6d931c694566bfdde18fdb278d26475bf88e73bbf8b27dc701d0cb1be9a1b5086c20141e69113bba39369690054a8bbf7eeb6294b2ac52d3"], &(0x7f00000000c0)="00007bf056c718041899f95b1a", 0x0, 0xce, &(0x7f0000000100)=""/206}, 0x48) sendmsg$kcm(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="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", 0x1cc}], 0x1, &(0x7f0000001200)}, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001a40)={r0, 0x28, &(0x7f0000001a00)}, 0x10) recvmsg(r4, &(0x7f0000001440)={&(0x7f0000000040)=@sco, 0x80, &(0x7f00000013c0)=[{&(0x7f0000000000)=""/66, 0x42}, {&(0x7f0000000080)=""/52, 0x34}, {&(0x7f0000000200)=""/4096, 0x1000}, {&(0x7f0000001200)=""/120, 0x78}, {&(0x7f0000001280)=""/177, 0xb1}, {&(0x7f0000000180)=""/17, 0x11}, {&(0x7f0000001340)=""/2, 0x2}, {&(0x7f0000001380)=""/16, 0x10}], 0x8}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x0) socketpair$unix(0x1, 0x8000100008, 0x0, &(0x7f0000003180)) socketpair(0xa, 0x80005, 0x2, &(0x7f0000001a80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r6, 0x40042409, 0x1) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001540)={0xc, 0x401, 0x1, 0x1, 0x3, r3}, 0x2c) sendmsg$kcm(r6, &(0x7f0000003100)={&(0x7f0000001ac0)=@ipx={0x4, 0x0, 0xfffffffffffffffd, "a81adb709509", 0xffff}, 0x80, &(0x7f0000001e00)=[{&(0x7f0000001b40)="bc5cdac10369713c287c2b8ba0d60c931834eb33f5906196268f55c4e549e61e2f671459fe9e4270925e7c62cf722297924aeddb961a542622323ac7f52baa4cd6f16e288ec3dbb35d4515868007bc7f33907ab3142859aff94f7ec0a6f1b338b68355b77a8e51a2b05ce16dd019158f584a5ea4254d2da8e67ab71417b7ed0e42fb7948eb56193ff8f9d129e150f4ba2870b6686c99f37dc1136e64d993767b0b9aa0", 0xa3}, {&(0x7f0000001c00)="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", 0xfe}, {&(0x7f0000001d00)="3af52e3bd4c4bcf73f5fc8590759976af660d562f061079f06161e6b4eb424d408330b9a3b10260b8ab5881b3ad73ad225c25450f112fbc241c0ddd4c42ac5351f2439e4e68db178c20449845b148d396beb3c417c4a012fda56e3a568a55b6e8c8df4afbf89444cffaf37c163fb2faa6e692ac9ab6b692913ec1825dd98f08c453c57f092e8029c024ba825808cff8946252321f06025d9a1881ed8863f6c557fe342f9f2242954bd5377b741f07a4b1e4261d607bcb583398ae58d9f9276d364a67800", 0xc4}, {&(0x7f0000001780)="ea4e1fadb10db66446a2739ae10339888ca71ccc893de992def7ab5cfd254173c87b152178382f6b48e569e368f7a9", 0x2f}], 0x4, &(0x7f0000001e40)=[{0x40, 0x1ff, 0x1, "2b2b60cd8fd95bd590551eeaee7eb9946aaeab78154caebed325bc981131445e3221b4966e69caf2d97101b1"}, {0x108, 0x0, 0x3, "839482c291eb64ba4e211af44bb6fbe84d8b2d975e289ce54c534a6744ef3e0fe324c212bee0e5d81bb2958dfbb786dab5dda9df022ab49be97d670fc40c352258fb1e7ff9712b73ecaba8a6252cf960ba8f75972c2470f33a1a268ee54fdf4c59f0eb45d8a48e18be2245149531e60de050e6e8f43cf8acb0494276ab6a595e678bf2359f634ef2ed0c3e000a6a97e514b738ba4ddf7d98b5df0ce044689e3ec3e1050f23cda42a8ff57a35722a0f5e76325338d7d2cb2aef93a727d8ca24488d42e5812a62c1b5b05d54317257629a637ea90e0c7879fc8b8b063f45c53998c02a6ee7940f92ceb22517cb1908804c4f2b0727bf91825d"}, {0xa8, 0x11e, 0x10001, "b8c620871b55d6b09a136aeb96f99c141be7dd60f945be42a8ffdc09cab8f2d15357d8b9100f42a7a4b897173cbb2c081fb548c97dba359412d6f22869027de835354ed7f9a473997a94505c2f36f0a4bbc57c65ffa66ae8e50ace25e454abb6505d55d9c7cc9f50e99864a86e7d25b1c3e0d095092475efec158b7685ac54758231a76b3a8d8f755ba21ac162ba9ca4088e189e597667"}, {0x1010, 0x11f, 0x2f, "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"}, {0xa8, 0x100, 0x5, "8ac3f34ca6b59a433aa5e6b6a6a5b43a26446b785c8a923c3d8f3a8b22ecce036a9d01f9ea65cd0d96e2f525277244c5436a59841b6d9c73e91f0596a5e0b61352729a4004c0ce6d64ada7ecf6aa65ca8ec25a4a723590d8d58050254350eb0aa90dd816282de4b872d4e8188fea168077262de73c63b211aab5b82dc2455b478a1576379efde3795e165f0c114e075e76a3"}, {0x10, 0x117, 0x8000}], 0x12b8, 0x40}, 0x20000040) [ 186.959100] EXT4-fs (sda1): re-mounted. Opts: 2018/03/31 05:13:34 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x5, 0x100000000209e20, 0x0, 0x5}, 0x2c) r1 = bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x13, 0x0, 0x7ffff9, 0x0, 0x20000003, 0x0}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xe, 0x0, 0x7f, 0x0, 0x8, r1, 0x80000000}, 0x2c) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x50, &(0x7f0000000140)}, 0x10) socket$kcm(0x29, 0x2, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r3 = perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x22401, &(0x7f00000000c0)="bad17b73cd440e6e03319fc2559023c8bcee23149b60f9452d99f90ffe251b6ac27429c369bac46308c002348bf7481c6087d1e3127f8cd430") ioctl$PERF_EVENT_IOC_REFRESH(r3, 0x2402, 0xfff) socketpair(0x4, 0x1, 0x5, &(0x7f0000000100)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) socketpair(0x0, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={r5, &(0x7f0000000080)="b02e82b8cc655398979911284b03a01b4483911b050efd8d0c3567c7ffc01b87f7598b19d6a70d55bc2541b249d4ef0aeae229574b1438", &(0x7f0000000940)="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", 0x2}, 0x20) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x100000000) perf_event_open(&(0x7f000025c000)={0x5, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r7 = getpid() perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xd000, 0x400, 0x4, 0x2, 0x0, 0x1, 0x4, 0x1, 0xffffffffffffffe1, 0x6, 0x503, 0x6, 0x4, 0x96, 0x0, 0x8000, 0x20, 0x1, 0x6, 0xdc, 0xe4, 0x401, 0xfffffffffffffffe, 0x8, 0x9, 0x3, 0x9bc, 0x5, 0x8, 0x200, 0xd04a, 0x6, 0x3, 0x8001, 0xff, 0x1, 0x0, 0x2b621cf4, 0x5, @perf_config_ext={0x3, 0xffff}, 0x141, 0x80000001, 0x800, 0x2, 0x0, 0x0, 0x10001}, r7, 0x3, r6, 0x1) r8 = gettid() perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7, 0xfff, 0x100000001, 0xfffffffffffffffb, 0x0, 0x8001, 0x0, 0x1, 0x0, 0xfffffffffffffff9, 0x0, 0x9, 0x9, 0x5, 0x8, 0x1, 0x8106, 0x0, 0x14000000000, 0x80000000, 0x1, 0x5, 0x0, 0x40, 0x2839, 0x1d, 0x800, 0x7, 0x8, 0x3, 0x5, 0x7, 0x8, 0x1, 0x3, 0x0, 0x0, 0x758, 0x4, @perf_bp={&(0x7f00000001c0), 0x4}, 0x0, 0x0, 0xff, 0x0, 0x3, 0x8, 0x3}, r8, 0x2, r4, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000280)={r2, &(0x7f00000003c0)="07ba8a5a425b4f74778a011e779c26c9eaf812652dd7bd3cc405c5483e72b073ead30f7291f0e2897a6819f2a2aaf2d4598cd4c20e9e24d0f0b1b021783c895b32a975613135126bc21fb2d6e0cbb39ee230d350ad2c7cb5575e80aca5861958723335f0be"}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000880)={r0, &(0x7f0000000840), &(0x7f00000008c0)=""/70}, 0x375) 2018/03/31 05:13:34 executing program 7: recvmsg(0xffffffffffffff9c, &(0x7f0000014900)={&(0x7f0000014700)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000014840)=[{&(0x7f0000014780)=""/30, 0x1e}, {&(0x7f00000147c0)=""/109, 0x6d}], 0x2, &(0x7f0000014880)=""/118, 0x76, 0x402}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x3, &(0x7f0000002000)=@framed={{0x18}, [], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195, 0x0, 0x0, [], r0}, 0x48) r2 = socket$kcm(0x29, 0x10000000000002, 0x0) r3 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f00000000c0)=r1, 0x4) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000001840)) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000100)=r1, 0x4) sendmsg(r1, &(0x7f0000001800)={&(0x7f0000000140)=@hci={0x1f, r0, 0x3}, 0x80, &(0x7f00000015c0)=[{&(0x7f0000000080)="4815f120", 0x4}, {&(0x7f00000001c0)="819435dd83a30c522df529b37aa335b3c403ada45b3c10bc6cee2fa57272d2500280426fd7afe740447d0b22faf9c5e7967038cb126effa6245f142e481dba28fa8755f764283f2052130f3df56ea54c6cb9922dd7165493d1dabf97a572d7cfb8672bb96eaa224ac0aaf9d7d922a4709e2df6e0ed9fa27d781a35f3c4bdf53da545a5c8b4e0b463acfef28c36d99ce27421afd5b5fe722602e21a8432b955785a532e51614249128f68df248ff050abfc571fd668cea2983fc429b1f5ea1c5ef62c80e7f25931946f20ee77534b064ee72456e2495584a020ed61a25035a1a37edde306eb3abf1c711bc6d7efa434deaa2e46413967", 0xf6}, {&(0x7f00000002c0)="1be95f19e23e81241e553a275eed1df97ddb4d984e03f1ebe5809ed62545eb9f4e40119daae4cfaeb4adef5838a71081135fd1681ca6906ff3025e224d04a44f576d92a81e0c58589382c2f3ff0792ec497f7043b4536eca3a9a05d6f9ca1ff2fbabb999a429cd724d30325634b9a2d3fe776c02848e0f8bea95178ea119e4628b78d35cb5468b5fee0ac63069e7ec8be0c0adf088da5a040561a03d6935363823cb65ea7fa491a3a90295f9175a8f88992154e13614b35070469643d76ad9208338", 0xc2}, {&(0x7f00000003c0)="71d3ace4cbef1131d40b8ee4c0297b81bfbf40b1e891e86f817c5abdc3d7379b7b0a4a218c25d90e8e5690e6a2380e1ee1e3200ca7279dcfe34d60012eca674f404f440ca36cb676e7b32423c691c926924c45256163b596b924b439fb89464e826a7aaf94313f3c126191f52b3f5fa149c9cb3ce88e235696870964eef30411faf6bc7bc94f797b91c1916d1e687fadf4f7f6e0c89f06b484acd2b9f1929461648749f05e6f788979051c4ce7255f343cdadd9176fad48e9244750ec22d1dde7557df110c2d05ee3d895a28df979acd557a2e21", 0xd4}, {&(0x7f00000004c0)="d5d89f688d11ebf4eef50d4302548b5a590566a856894b33095b5925f0fd5c3b2f6c0f6bed6062", 0x27}, {&(0x7f0000000500)="f9530ee46bb89bff05edfab49acb7d1064f615434a11c2cffed0778906fef51d403fb5fce6f78d5a9d4f36df07bbb5646e7417ecbe423cfb8e0c007d93c8bcbd40d8365b7a60d679ff112d5ff06a0deef74091fa4163c2421e458a4b64e8f042be10aeaa3b52e24ba8efebb9245aea009a9a89b962d3eb1489929601b1e28ce2b0d6eb6d491acb940f9055a47a80b5cbf3b62ed566aa1090b2e3a083ad567e8262ec751b153503c764a2a2a54f943e2ae36556732f71fc469d", 0xb9}, {&(0x7f00000005c0)="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", 0x1000}], 0x7, &(0x7f0000001640)=[{0x20, 0x103, 0x1000, "c1fbc7cca13f5e601d"}, {0xf8, 0x4e66b38639b61c76, 0x94, "e8b554a65fad051fe845664e96e0a52c73cf6a2112740dec4c3fe91af36837960e0dd47e44c797d6420442ccbecfa9da64a684935eec7d084006f903b891735f1109dead3054a301c4b3174c17cfb9c6796bb87c9844c921537e41bc1893912fc800e7dae63d10e36a46adc4f2be6119f178bbffe10938864c0070404d00d6290f0ccad8e037bd56f52270a27767582dc3e3cd2df16541c429a57d2f45cc9a9d4460e23bcb55bed07d25d13d288aa1a1c758669f17e712e53044fc1647d24017adb8afec1dbce4792b71cd4b6d168a6456125880bc843ae63c5079ed22fbb2117ee6b736"}, {0xa0, 0x29, 0x1, "f8e00310f23734bcabe17bb2c01eb303afdfbc575fadfc7e48ed99a9bfd1b0437491be10a0b117311b60e98c7f7f09aea367e1d30dfdd48debb9c9d5a6fbee5ae0b21eab2c2d8e641f041ee312bb642921a65a82d13c698fe4c9e47c7e47c9b65a253eea28beba917671e551cdbfc9c3139198120085b5952e32bcbf67de8d7cbbd6947e69a7de2cd2c3"}], 0x1b8}, 0x1) 2018/03/31 05:13:34 executing program 4: mount(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='ncpfs\x00', 0x80802, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x50, &(0x7f0000000700)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780)=r0, 0x4) mount(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='./file0\x00', &(0x7f00000006c0)='btrfs\x00', 0x89402, &(0x7f0000000900)="e196efa3cb748d2a6600968b76295ff919bc3877b18eb8d265a35493fcf34fdc965cd5c837d2389c6e2ec6088abe8daaa8ca23f9298fc94dc26874bc4d4567afea1ca0879cdf21e915005a83e96b1002af29091d2176abbb7fec088a67f2e1390f32adaf2f252d24510870f8df7186936f4d88957eb8fcda78b7383a7d24db701d524557ee7324433e70d9ffa185098325f9e657d3c29cf6a35843cb96780269db1c735d55938af5c60e1e4ba25928697277b0fdf356b62399b4c8826d09bfca7d6078c19b4995195ea814b1bb40c06210ec") ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0xffffffff) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e2, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6f3, 0x0, 0x6, 0x0, 0x0, 0xfffdffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x22, &(0x7f00000007c0)=ANY=[@ANYBLOB="18000000000000000000000000000000000000000020f37b176532826618e8210d55b6b9f796a5cf4309ac945b17b6ec55aad627fce3173f275427d49a02c531c5316326ec3569ef7771eee96dc62f79bb386acf26001097f7673e6b395ee0cac49bf5bbe2db74ffbe760e50b31e653a89e733b2832d3e4e73d9720448a1d74be25a5dbcc32519fc1400391454104d5b5d9b14c5560730768138a9a0e109f34a16cc067edc5d7a0b0912aa587035de0ad6624124ad9467ed6aac80ad02b778f8319fef183facaa39c4519babbd000000000000009d9d8436042fc1b8d6e779a1531ba51c8c8811c745b829a97e3e2d0f13ea630503c6a765fae62d43095c1669d81251d3a6718f867abdfb0b907d24394fd24b2ea273"], &(0x7f0000f6bffb)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000400)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000540)={r1, 0x50}, 0xfffffe74) close(r1) perf_event_open(&(0x7f0000348f88)={0x2, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x28, 0x2, 0x0, &(0x7f0000000000)={0x0}) mkdir(&(0x7f0000000100)='./file0\x00', 0x1000000000) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='selinuxfs\x00', 0x1000, &(0x7f0000000100)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='minix\x00', 0x10020, &(0x7f0000000240)) 2018/03/31 05:13:34 executing program 2: socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000040)={0x7, 0x70, 0x1, 0xaabc, 0x2, 0x2, 0x0, 0xec, 0x4800, 0x1, 0x3a6b72c9, 0xffffffffffff8000, 0xfff, 0x7, 0x2, 0x7, 0xff, 0x1, 0x2, 0x9, 0x1, 0x0, 0x5, 0x75, 0x2, 0x7, 0x8, 0x4, 0x0, 0xdbce, 0xffff, 0xfaf, 0x1, 0xe7, 0xd0eb, 0x28a5, 0x9, 0x4, 0x0, 0x7, 0x2, @perf_config_ext={0x1, 0x8000}, 0x489, 0x6, 0xff, 0x0, 0x9d, 0x8, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f00000000c0)={0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000140)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r2 = getpid() r3 = perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x8, 0x4, 0x4, 0x1, 0x0, 0x401, 0x100, 0x7, 0xcfc0, 0x7, 0x0, 0x7, 0x30, 0x7, 0x7, 0xfff, 0x7, 0x9, 0xff, 0x9, 0xf, 0x0, 0x3, 0x100000000, 0x3, 0x8, 0xffff, 0x2, 0x3, 0xff, 0x6f, 0x3, 0x5, 0x800, 0x81, 0x0, 0x0, 0x9, 0x1, @perf_bp={&(0x7f0000000180)}, 0x11815, 0x9, 0x1, 0x1, 0x101, 0x5, 0x1e892fee}, r2, 0x9, r1, 0x1) r4 = perf_event_open(&(0x7f0000000280)={0x5, 0x70, 0xe00000000000, 0x9, 0x800, 0x6, 0x0, 0x7ff, 0x10200, 0xb, 0xe3, 0x5, 0x1, 0x4, 0x9b0f, 0x1f8a, 0x401, 0x1, 0xe975, 0x7, 0x437, 0x9, 0x7f, 0x20, 0x1, 0x2, 0x3, 0x5, 0x200, 0x1, 0x8, 0x401, 0x401, 0x2, 0x8, 0xfff, 0xf3c8, 0xf23, 0x0, 0x7fffffff, 0x0, @perf_bp={&(0x7f0000000240), 0x9}, 0x828, 0x3, 0x5, 0x1, 0x0, 0xc37, 0x6}, r2, 0x4, r1, 0x2) r5 = perf_event_open(&(0x7f0000000300)={0x4, 0x70, 0xff, 0x3, 0x7f, 0x7, 0x0, 0x40, 0x4a240, 0x2, 0xffffffffffffcc27, 0xb8, 0x2, 0x7, 0x9, 0x800, 0x3, 0x7d4d, 0xf7, 0xfffffffffffffffa, 0x9, 0x4, 0x3, 0x90be, 0x9, 0xfffffffffffffffc, 0x6, 0x3ff, 0xab6b, 0x8001, 0x5, 0x2, 0x9, 0x732, 0x400, 0x55000000000, 0x1ff, 0x6, 0x0, 0x0, 0x2, @perf_config_ext={0x6, 0xffffffff}, 0x40, 0x80000001, 0x7fff, 0x2, 0x1, 0x6, 0x5}, r2, 0xf, r4, 0xa) r6 = perf_event_open(&(0x7f00000003c0)={0x7, 0x70, 0xc87d, 0x6, 0x5, 0x80000001, 0x0, 0x3, 0x1, 0xb, 0xffffffff, 0x9, 0x584, 0x31b, 0x7, 0x2, 0x3, 0x544, 0x100000001, 0x9, 0x1, 0x100, 0x3, 0x1, 0x7, 0x0, 0x7, 0x5, 0xbb, 0x40, 0x7, 0x8, 0x81, 0xc5a, 0x0, 0x7, 0x1f, 0x815, 0x0, 0xffff, 0x2, @perf_bp={&(0x7f0000000380), 0x8}, 0x4, 0x5, 0xc95, 0x0, 0x7ff, 0x7b02, 0x7}, r2, 0x10, r1, 0xb) ioctl$PERF_EVENT_IOC_DISABLE(r3, 0x2401, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0x4) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = perf_event_open(&(0x7f0000000480)={0x7, 0x70, 0x7, 0xdbff, 0x3, 0x3f, 0x0, 0x8, 0x0, 0xc, 0x8, 0x0, 0xf43, 0x101, 0x6, 0x5, 0x6, 0x9, 0x200, 0xfffffffffffffffd, 0x4, 0x6, 0x6e, 0x20, 0x1b3, 0x1fe, 0x7ff, 0x3, 0x8000, 0x5, 0x0, 0x0, 0x0, 0x5, 0x22d2, 0x401, 0x68, 0xa1ce, 0x0, 0x4, 0x0, @perf_config_ext={0x2fb, 0x4}, 0x2000, 0xd33, 0x6, 0x697c4c7d75b7b6da, 0x171f, 0x9, 0x9}, r2, 0x6, r5, 0x1) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x9, 0x6, 0x101, 0x8, 0x0, 0x200, 0x2000, 0xf, 0x0, 0x5, 0x6, 0x3, 0x2, 0x0, 0x8001, 0x8, 0x3, 0x5, 0x17, 0x7, 0x4, 0x400, 0xffffffff, 0x7, 0x8000, 0x2, 0x100, 0x0, 0x7, 0x95de, 0x2, 0x1, 0x2, 0xd432, 0x3ff, 0x8599, 0x0, 0x3ff, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x10080, 0x7, 0xe7e, 0x7, 0x5, 0x7, 0x9}, r2, 0x0, r3, 0x8) close(r7) ioctl$PERF_EVENT_IOC_DISABLE(r9, 0x2401, 0x1) r10 = gettid() ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f00000005c0)={r0}) ioctl$sock_kcm_SIOCKCMUNATTACH(r11, 0x89e1, &(0x7f0000000600)={r8}) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000640)) r12 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)={0x4, 0x7, 0x7f, 0x9787, 0x1c, 0xffffffffffffffff, 0x5}, 0x2c) recvmsg$kcm(r11, &(0x7f0000009440)={&(0x7f0000009300)=@can={0x0, 0x0}, 0x80, &(0x7f00000093c0)=[{&(0x7f0000009380)=""/16, 0x10}], 0x1, &(0x7f0000009400)=""/18, 0x12, 0x3bc1}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000009480)={0xf, 0x13, &(0x7f00000006c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [@ldst={0x3, 0x2, 0x1, 0x2, 0x7, 0xffffffff, 0x4}, @map={0x18, 0x0, 0x1, 0x0, r12}, @alu={0x7, 0x5, 0xf, 0x6, 0xe, 0x2, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4}, @jmp={0x5, 0x7a4c, 0x0, 0x3, 0x9, 0xffffffff, 0xfffffffffffffff0}, @alu={0x4, 0x20, 0x9, 0x9, 0x5, 0xfffffffe, 0x4}, @jmp={0x5, 0x81, 0x9, 0x7, 0x6, 0xfffffffe, 0xfffffffffffffff0}, @jmp={0x5, 0x3, 0x3, 0x0, 0x2, 0x2, 0xffffffffffffffff}], {0x95}}, &(0x7f0000000780)='GPL\x00', 0x4, 0x77, &(0x7f00000007c0)=""/119, 0x0, 0x1, [], r13}, 0x48) mount(&(0x7f0000009500)='./file0\x00', &(0x7f0000009540)='./file0\x00', &(0x7f0000009580)='cramfs\x00', 0x5020, &(0x7f00000095c0)="22f464f8fef2b95976576e903efe99229584aaf55fa0d91223905d4a68c0c7d18bf26de6fec0660b0c36945200da04f802d9059dd5f6d2f0eca450f4fdd46ed2b411588d802f0d1d02be65816332b2754d686e927593deb8ee3ed17a24d749db81290c33836bcc9b7d93084c53d0744e81deb8b83d9b23565d6db4cb746eb15b20f7b806f0b5a02676d90260a61b00e9ec0b4b8bf07d5f93b3feda8299586c3936f743c764205de278c25a6fff98") perf_event_open(&(0x7f00000096c0)={0x1, 0x70, 0x3, 0xa8e, 0x1000, 0xe57a, 0x0, 0x6, 0x2100b, 0x2, 0x9, 0xdb1b, 0xfffffffffffffffa, 0xa7f8, 0x3, 0x2, 0x800, 0x800, 0x2, 0x0, 0x3f, 0x3, 0x8000000000000, 0x3, 0x20, 0x6, 0x3, 0xfffffffffffff318, 0xffffffffffff0001, 0xfffffffffffffffe, 0x12, 0x1, 0x101, 0x8, 0x100, 0x1, 0x3, 0x8, 0x0, 0x3ff, 0x7, @perf_bp={&(0x7f0000009680), 0x3}, 0x9, 0x6, 0xfffffffffffffff7, 0x0, 0x0, 0x49, 0xfffffffffffff3b8}, r10, 0xe, r5, 0x8) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000009880)={r12, &(0x7f0000009740)="8ba447000764036f17624e623896639a3e2456b901aedcdb4221cea83c3b2c94575967a34ec104bbebeaf6a6b50494e6763f41056d2ca84f906fa48d72590e81334926fab48e", &(0x7f00000097c0)=""/170}, 0x18) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r4, 0x2405, r6) bpf$PROG_LOAD(0x5, &(0x7f00000099c0)={0x7, 0x4, &(0x7f00000098c0)=@raw=[@ldst={0x3, 0x3, 0x6, 0xd, 0x7, 0x26}, @ldst={0x0, 0x2, 0x0, 0xa, 0x0, 0x4, 0xffffffffffffffff}], &(0x7f0000009900)='GPL\x00', 0x5, 0x5d, &(0x7f0000009940)=""/93, 0x41f00, 0x1, [], r13}, 0x48) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000009b40)={r8, &(0x7f0000009a40)="402c0b8b20e0ae84bb", &(0x7f0000009a80)=""/178}, 0x18) [ 187.115234] EXT4-fs (sda1): re-mounted. Opts: 2018/03/31 05:13:34 executing program 1: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000080)) getpid() 2018/03/31 05:13:34 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socketpair$ax25(0x3, 0x7, 0xcf, &(0x7f0000000080)={0xffffffffffffffff}) sendmsg(r0, &(0x7f00000000c0)={&(0x7f0000000180)=@nfc_llcp={0x27, 0x0, 0x2, 0x4, 0xc7f, 0x2c9, "a303807654ce4613fd4054fb44dff5b2db665c942572a5878fff5cdc958f8c5d4657243a50e657a2b7df4a3d6cc7f3e18291c6a0d7bfa8a26f53060703a867", 0x3d}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000200)="35917aab88d76a2441388ede8c65a1ca0b152358638faaac6e4dd36f6dd222a4c461632b59b17392848ad9639ca8cc77228bb478ac51044a787188739fbac329884f3119f8da14198e36891045a07093", 0x50}, {&(0x7f0000000280)="f579262deac98c74ca1e05506fab1928c6eba2645f35b1dbd3e77062a460a9aed0b410153c6e9f682d66bf6d8dee8f520c2a91cba606a16875ff25aa7c1271de221bc40f5a9e00841e58ed64eca4bc5465d920ae992b179347f2eeaa47a828ba46be441624c5453f8064a9b03fc3e16a11dc1549743ff8cc95733b089a66e616d7300025b0d1136ef0208871195b22d23901c24b353112817d69a6c943e234f31cd977f8eadfaf85fb63a2d1a90e707ceae8fd29d0d9cb60876820ebd3bbeca87b99b01e7c4bdb548a0079cc6a61987879d0ff5086541138dc95cab74558349c36e37c7ef4c47e8f34e6", 0xea}, {&(0x7f0000000380)="d1fa5bdafe8861c4e1ef60f8e8aea187f726db99fae7d2269d5974d6c19e867d3f6d7662480cd8333e39d0eaea6e5af642adcc3bb52b5b88372ec788e68126de61b2bdde05f08c359fa58ffd72299666e947252dc8a040be223ab9401b7729fab065078405d575db5ac1fe9e7ae733a619f32b1784ee856d169d3be2db953ca233b8d7676cfe1044603c6a5aee45114afca66f50c9f06bab44e299d8d339e7e56e2e889b2543109cbee132581c314c659a3d", 0xb2}, {&(0x7f0000000440)="e613a191771781718c2797d33c826df11bec82d64ade98afb6a9d98290f9f1adb88363ec1f73dd4cd6db3766ffd0fb40a4bf79a5d058b138e8af731f54f961f5540f608caeccab36732c7b215afd377fd9a3ab6f607755442f0ba5e555404e61e20131c84b7c325fbf5066efd72db8554482be3c4ade9203b44d0427474a839abaac9c82dfad86a35a58", 0x8a}, {&(0x7f0000000500)="9b070e2f670fddce1bbcb9a1ec822af355833e7257b14290801716177112e4598f72975746c17a54d8b17042506117998d9950fdfe2b0360a4e736c9bd8037a251321bf2022652e4a3c8780ec94bf8e002dd66a71b7d134cb3ffa598c0adb39e388cf97c7a5bbc12b1e64a0ed8f9e463f8e00dabb6e9536a3abe6550b0", 0x7d}], 0x5, &(0x7f0000000600)=[{0x50, 0x104, 0x3, "bd8faac9637ad1de7b653cb3b06003a79c8f1d19145f5919467164038acecdd82c184072bf12e3d1cce5e6d371a4e42977e4c6a15871218d7a76"}, {0x108, 0x19f, 0x8, "bf038ef15358519c954f10fc50a7d1dc4ff3c5bc3849df2b01a117dcb9c8e03b39aac4d533eff5a13b8826321c032e196e89e0c2fd6bbafc22d7f1e66239241087d5cfa34512e38dd292994ced872835fbedb05d3cfbb876237fe110ffc61299db7f6b0b913e19e717ae4d8731e0d6de560704fb9809d65e429975d2213818777a501d6ed11e5daf8a126b515e90ef295993bfbb6b98a8b3b2f242fd17c156149ce65ebac21cbb19de4c6a26668601f395c9006512812bc5ae2c385ce038e3b0af2c356d1668e974d9d8f871865e9f1d059652cca9b2c0a563e406e90b5e25a956c0b5c12ef4f57911bbc5f114aca7f852ff55810c"}], 0x158, 0x4}, 0x20000894) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000100)="7300040000000002650060", 0x2000, &(0x7f0000000040)='\x00') 2018/03/31 05:13:34 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xa, 0xff, 0x6, 0xb, 0x2, 0xffffffffffffff9c}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000001140)={r0, &(0x7f0000000040), &(0x7f0000000140)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000040), &(0x7f0000000100)='U'}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r0, &(0x7f0000000380)="b1", &(0x7f0000000080)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r0, &(0x7f0000000040), &(0x7f0000000200)="d1"}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000200), &(0x7f00000000c0)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000340)={r0, &(0x7f0000000280), &(0x7f0000000300)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000240)={r0, &(0x7f0000000040), &(0x7f0000000080)=""/23}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000300)={r0, &(0x7f0000000180), &(0x7f0000000200)}, 0x20) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000040)={0xffffffffffffffff}) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair(0x2, 0x3, 0x400, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f00000003c0)={r2, r3}) 2018/03/31 05:13:34 executing program 2: socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000040)={0x7, 0x70, 0x1, 0xaabc, 0x2, 0x2, 0x0, 0xec, 0x4800, 0x1, 0x3a6b72c9, 0xffffffffffff8000, 0xfff, 0x7, 0x2, 0x7, 0xff, 0x1, 0x2, 0x9, 0x1, 0x0, 0x5, 0x75, 0x2, 0x7, 0x8, 0x4, 0x0, 0xdbce, 0xffff, 0xfaf, 0x1, 0xe7, 0xd0eb, 0x28a5, 0x9, 0x4, 0x0, 0x7, 0x2, @perf_config_ext={0x1, 0x8000}, 0x489, 0x6, 0xff, 0x0, 0x9d, 0x8, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f00000000c0)={0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000140)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r2 = getpid() r3 = perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x8, 0x4, 0x4, 0x1, 0x0, 0x401, 0x100, 0x7, 0xcfc0, 0x7, 0x0, 0x7, 0x30, 0x7, 0x7, 0xfff, 0x7, 0x9, 0xff, 0x9, 0xf, 0x0, 0x3, 0x100000000, 0x3, 0x8, 0xffff, 0x2, 0x3, 0xff, 0x6f, 0x3, 0x5, 0x800, 0x81, 0x0, 0x0, 0x9, 0x1, @perf_bp={&(0x7f0000000180)}, 0x11815, 0x9, 0x1, 0x1, 0x101, 0x5, 0x1e892fee}, r2, 0x9, r1, 0x1) r4 = perf_event_open(&(0x7f0000000280)={0x5, 0x70, 0xe00000000000, 0x9, 0x800, 0x6, 0x0, 0x7ff, 0x10200, 0xb, 0xe3, 0x5, 0x1, 0x4, 0x9b0f, 0x1f8a, 0x401, 0x1, 0xe975, 0x7, 0x437, 0x9, 0x7f, 0x20, 0x1, 0x2, 0x3, 0x5, 0x200, 0x1, 0x8, 0x401, 0x401, 0x2, 0x8, 0xfff, 0xf3c8, 0xf23, 0x0, 0x7fffffff, 0x0, @perf_bp={&(0x7f0000000240), 0x9}, 0x828, 0x3, 0x5, 0x1, 0x0, 0xc37, 0x6}, r2, 0x4, r1, 0x2) r5 = perf_event_open(&(0x7f0000000300)={0x4, 0x70, 0xff, 0x3, 0x7f, 0x7, 0x0, 0x40, 0x4a240, 0x2, 0xffffffffffffcc27, 0xb8, 0x2, 0x7, 0x9, 0x800, 0x3, 0x7d4d, 0xf7, 0xfffffffffffffffa, 0x9, 0x4, 0x3, 0x90be, 0x9, 0xfffffffffffffffc, 0x6, 0x3ff, 0xab6b, 0x8001, 0x5, 0x2, 0x9, 0x732, 0x400, 0x55000000000, 0x1ff, 0x6, 0x0, 0x0, 0x2, @perf_config_ext={0x6, 0xffffffff}, 0x40, 0x80000001, 0x7fff, 0x2, 0x1, 0x6, 0x5}, r2, 0xf, r4, 0xa) r6 = perf_event_open(&(0x7f00000003c0)={0x7, 0x70, 0xc87d, 0x6, 0x5, 0x80000001, 0x0, 0x3, 0x1, 0xb, 0xffffffff, 0x9, 0x584, 0x31b, 0x7, 0x2, 0x3, 0x544, 0x100000001, 0x9, 0x1, 0x100, 0x3, 0x1, 0x7, 0x0, 0x7, 0x5, 0xbb, 0x40, 0x7, 0x8, 0x81, 0xc5a, 0x0, 0x7, 0x1f, 0x815, 0x0, 0xffff, 0x2, @perf_bp={&(0x7f0000000380), 0x8}, 0x4, 0x5, 0xc95, 0x0, 0x7ff, 0x7b02, 0x7}, r2, 0x10, r1, 0xb) ioctl$PERF_EVENT_IOC_DISABLE(r3, 0x2401, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0x4) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = perf_event_open(&(0x7f0000000480)={0x7, 0x70, 0x7, 0xdbff, 0x3, 0x3f, 0x0, 0x8, 0x0, 0xc, 0x8, 0x0, 0xf43, 0x101, 0x6, 0x5, 0x6, 0x9, 0x200, 0xfffffffffffffffd, 0x4, 0x6, 0x6e, 0x20, 0x1b3, 0x1fe, 0x7ff, 0x3, 0x8000, 0x5, 0x0, 0x0, 0x0, 0x5, 0x22d2, 0x401, 0x68, 0xa1ce, 0x0, 0x4, 0x0, @perf_config_ext={0x2fb, 0x4}, 0x2000, 0xd33, 0x6, 0x697c4c7d75b7b6da, 0x171f, 0x9, 0x9}, r2, 0x6, r5, 0x1) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x9, 0x6, 0x101, 0x8, 0x0, 0x200, 0x2000, 0xf, 0x0, 0x5, 0x6, 0x3, 0x2, 0x0, 0x8001, 0x8, 0x3, 0x5, 0x17, 0x7, 0x4, 0x400, 0xffffffff, 0x7, 0x8000, 0x2, 0x100, 0x0, 0x7, 0x95de, 0x2, 0x1, 0x2, 0xd432, 0x3ff, 0x8599, 0x0, 0x3ff, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x10080, 0x7, 0xe7e, 0x7, 0x5, 0x7, 0x9}, r2, 0x0, r3, 0x8) close(r7) ioctl$PERF_EVENT_IOC_DISABLE(r9, 0x2401, 0x1) r10 = gettid() ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f00000005c0)={r0}) ioctl$sock_kcm_SIOCKCMUNATTACH(r11, 0x89e1, &(0x7f0000000600)={r8}) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000640)) r12 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)={0x4, 0x7, 0x7f, 0x9787, 0x1c, 0xffffffffffffffff, 0x5}, 0x2c) recvmsg$kcm(r11, &(0x7f0000009440)={&(0x7f0000009300)=@can={0x0, 0x0}, 0x80, &(0x7f00000093c0)=[{&(0x7f0000009380)=""/16, 0x10}], 0x1, &(0x7f0000009400)=""/18, 0x12, 0x3bc1}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000009480)={0xf, 0x13, &(0x7f00000006c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [@ldst={0x3, 0x2, 0x1, 0x2, 0x7, 0xffffffff, 0x4}, @map={0x18, 0x0, 0x1, 0x0, r12}, @alu={0x7, 0x5, 0xf, 0x6, 0xe, 0x2, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4}, @jmp={0x5, 0x7a4c, 0x0, 0x3, 0x9, 0xffffffff, 0xfffffffffffffff0}, @alu={0x4, 0x20, 0x9, 0x9, 0x5, 0xfffffffe, 0x4}, @jmp={0x5, 0x81, 0x9, 0x7, 0x6, 0xfffffffe, 0xfffffffffffffff0}, @jmp={0x5, 0x3, 0x3, 0x0, 0x2, 0x2, 0xffffffffffffffff}], {0x95}}, &(0x7f0000000780)='GPL\x00', 0x4, 0x77, &(0x7f00000007c0)=""/119, 0x0, 0x1, [], r13}, 0x48) mount(&(0x7f0000009500)='./file0\x00', &(0x7f0000009540)='./file0\x00', &(0x7f0000009580)='cramfs\x00', 0x5020, &(0x7f00000095c0)="22f464f8fef2b95976576e903efe99229584aaf55fa0d91223905d4a68c0c7d18bf26de6fec0660b0c36945200da04f802d9059dd5f6d2f0eca450f4fdd46ed2b411588d802f0d1d02be65816332b2754d686e927593deb8ee3ed17a24d749db81290c33836bcc9b7d93084c53d0744e81deb8b83d9b23565d6db4cb746eb15b20f7b806f0b5a02676d90260a61b00e9ec0b4b8bf07d5f93b3feda8299586c3936f743c764205de278c25a6fff98") perf_event_open(&(0x7f00000096c0)={0x1, 0x70, 0x3, 0xa8e, 0x1000, 0xe57a, 0x0, 0x6, 0x2100b, 0x2, 0x9, 0xdb1b, 0xfffffffffffffffa, 0xa7f8, 0x3, 0x2, 0x800, 0x800, 0x2, 0x0, 0x3f, 0x3, 0x8000000000000, 0x3, 0x20, 0x6, 0x3, 0xfffffffffffff318, 0xffffffffffff0001, 0xfffffffffffffffe, 0x12, 0x1, 0x101, 0x8, 0x100, 0x1, 0x3, 0x8, 0x0, 0x3ff, 0x7, @perf_bp={&(0x7f0000009680), 0x3}, 0x9, 0x6, 0xfffffffffffffff7, 0x0, 0x0, 0x49, 0xfffffffffffff3b8}, r10, 0xe, r5, 0x8) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000009880)={r12, &(0x7f0000009740)="8ba447000764036f17624e623896639a3e2456b901aedcdb4221cea83c3b2c94575967a34ec104bbebeaf6a6b50494e6763f41056d2ca84f906fa48d72590e81334926fab48e", &(0x7f00000097c0)=""/170}, 0x18) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r4, 0x2405, r6) bpf$PROG_LOAD(0x5, &(0x7f00000099c0)={0x7, 0x4, &(0x7f00000098c0)=@raw=[@ldst={0x3, 0x3, 0x6, 0xd, 0x7, 0x26}, @ldst={0x0, 0x2, 0x0, 0xa, 0x0, 0x4, 0xffffffffffffffff}], &(0x7f0000009900)='GPL\x00', 0x5, 0x5d, &(0x7f0000009940)=""/93, 0x41f00, 0x1, [], r13}, 0x48) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000009b40)={r8, &(0x7f0000009a40)="402c0b8b20e0ae84bb", &(0x7f0000009a80)=""/178}, 0x18) 2018/03/31 05:13:34 executing program 4: mount(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='ncpfs\x00', 0x80802, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x50, &(0x7f0000000700)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780)=r0, 0x4) mount(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='./file0\x00', &(0x7f00000006c0)='btrfs\x00', 0x89402, &(0x7f0000000900)="e196efa3cb748d2a6600968b76295ff919bc3877b18eb8d265a35493fcf34fdc965cd5c837d2389c6e2ec6088abe8daaa8ca23f9298fc94dc26874bc4d4567afea1ca0879cdf21e915005a83e96b1002af29091d2176abbb7fec088a67f2e1390f32adaf2f252d24510870f8df7186936f4d88957eb8fcda78b7383a7d24db701d524557ee7324433e70d9ffa185098325f9e657d3c29cf6a35843cb96780269db1c735d55938af5c60e1e4ba25928697277b0fdf356b62399b4c8826d09bfca7d6078c19b4995195ea814b1bb40c06210ec") ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0xffffffff) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e2, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6f3, 0x0, 0x6, 0x0, 0x0, 0xfffdffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x22, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000f6bffb)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000400)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000540)={r1, 0x50}, 0xfffffe74) close(r1) perf_event_open(&(0x7f0000348f88)={0x2, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x28, 0x2, 0x0, &(0x7f0000000000)={0x0}) mkdir(&(0x7f0000000100)='./file0\x00', 0x1000000000) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='selinuxfs\x00', 0x1000, &(0x7f0000000100)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='minix\x00', 0x10020, &(0x7f0000000240)) 2018/03/31 05:13:34 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xc, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="85000000220000000700000000009b009500000000000000"], &(0x7f00000001c0)="73797a6b616c6c65720001be826e8f833152f795b4d9f4bc3ea582523aed371b084fccfc3d2ef2cbe65d30642ca8dcd0f8479be52e66937908f1d8112489e8099d9d4edb806d81189c0fbb6818d028546c35d3363d54db0db780f54977ae6359d617c1d233d8e18abfc75f9a76cd8e1f77583bc02f07a33de6f304e95db82fd4da55ebd25162df6f88e7d1bb0654ffb31e008967", 0x1, 0x99, &(0x7f000000d000)=""/153}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xd, 0x20, 0x3a4, 0x4, 0x3, r0, 0x1}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x9, 0x100, 0x2, 0x8d, 0x8, 0xffffffffffffff9c, 0x100}, 0x2c) recvmsg(0xffffffffffffffff, &(0x7f0000006640)={&(0x7f0000005380)=@can={0x0, 0x0}, 0x80, &(0x7f0000006540)=[{&(0x7f0000005400)=""/4096, 0x1000}, {&(0x7f0000006400)=""/21, 0x15}, {&(0x7f0000006440)=""/151, 0x97}, {&(0x7f0000006500)=""/16, 0x10}], 0x4, &(0x7f0000006580)=""/175, 0xaf, 0x3}, 0x40000000) bpf$PROG_LOAD(0x5, &(0x7f0000006680)={0x4, 0x11, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100000000, 0x0, 0x0, 0x0, 0x7ff}, [@generic={0x6, 0x8, 0xff, 0x6}, @exit={0x95}, @alu={0x7, 0x401, 0xa, 0x2, 0x7, 0xfffffff0}, @map={0x18, 0x5, 0x1, 0x0, r1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x8}, @map={0x18, 0x3, 0x1, 0x0, r2}, @alu={0x4, 0x401, 0xa, 0xd, 0x1, 0x0, 0x1}], {0x95}}, &(0x7f0000000140)='syzkaller\x00', 0x5000000000000, 0xbb, &(0x7f0000000340)=""/187, 0x41f00, 0x1, [], r3}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0x5a, 0x1000, &(0x7f00000004c0)="288b6692b5c352f6677525060800893cb07d54c70000ec2900000000000000000000e2dd808d74894022937a86b590cb2fee781704502d7c6b75031da1aa66129195bd04942c70ee687a7b7c813c19749001d131eb1d5ed1eeb9", &(0x7f0000001280)=""/4096}, 0x28) 2018/03/31 05:13:34 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000200), &(0x7f0000000040)="13", 0x40000000}, 0x20) 2018/03/31 05:13:34 executing program 6 (fault-call:17 fault-nth:46): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x0, 0x101, 0x4, 0x0, 0x1, r0, 0x0, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r2 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)={0xffffffffffffffff}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r2, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x0, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0", 0xc9}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000280)={&(0x7f0000000680)='./file0\x00'}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r1}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r3) gettid() close(0xffffffffffffffff) [ 187.564611] FAULT_INJECTION: forcing a failure. [ 187.564611] name failslab, interval 1, probability 0, space 0, times 0 [ 187.575878] CPU: 0 PID: 15883 Comm: syz-executor6 Not tainted 4.16.0-rc6+ #42 [ 187.583149] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 187.592498] Call Trace: [ 187.592831] EXT4-fs (sda1): re-mounted. Opts: [ 187.595080] dump_stack+0x194/0x24d [ 187.595095] ? arch_local_irq_restore+0x53/0x53 [ 187.595106] ? __save_stack_trace+0x7e/0xd0 [ 187.595126] should_fail+0x8c0/0xa40 [ 187.595140] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 187.595153] ? kasan_kmalloc+0xad/0xe0 [ 187.624904] ? kmem_cache_alloc_trace+0x136/0x740 [ 187.629727] ? __memcg_init_list_lru_node+0x169/0x270 [ 187.634893] ? __list_lru_init+0x544/0x750 [ 187.639104] ? sget_userns+0x6b1/0xe40 [ 187.642986] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 187.647725] ? do_mount+0xea4/0x2bb0 [ 187.651419] ? SyS_mount+0xab/0x120 [ 187.655033] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 187.660384] ? find_held_lock+0x35/0x1d0 [ 187.664431] ? __lock_is_held+0xb6/0x140 [ 187.668489] ? check_same_owner+0x320/0x320 [ 187.672798] ? rcu_note_context_switch+0x710/0x710 [ 187.677715] should_failslab+0xec/0x120 [ 187.681671] kmem_cache_alloc_trace+0x4b/0x740 [ 187.686233] ? __kmalloc_node+0x33/0x70 [ 187.690187] ? __kmalloc_node+0x33/0x70 [ 187.694141] ? rcu_read_lock_sched_held+0x108/0x120 [ 187.699142] __memcg_init_list_lru_node+0x169/0x270 [ 187.704139] ? list_lru_add+0x7c0/0x7c0 [ 187.708094] ? __kmalloc_node+0x47/0x70 [ 187.712055] __list_lru_init+0x544/0x750 [ 187.716102] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 187.721970] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 187.726972] ? lockdep_init_map+0x9/0x10 [ 187.731031] sget_userns+0x6b1/0xe40 [ 187.734744] ? set_anon_super+0x20/0x20 [ 187.738702] ? put_filp+0x90/0x90 [ 187.742135] ? destroy_unused_super.part.6+0xd0/0xd0 [ 187.747219] ? alloc_vfsmnt+0x762/0x9c0 [ 187.751173] ? path_lookupat+0x238/0xba0 [ 187.755216] ? mnt_free_id.isra.21+0x50/0x50 [ 187.759609] ? trace_hardirqs_off+0x10/0x10 [ 187.763913] ? putname+0xee/0x130 [ 187.767353] ? cap_capable+0x1b5/0x230 [ 187.771226] ? security_capable+0x8e/0xc0 [ 187.775357] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 187.780529] ? ns_capable_common+0xcf/0x160 [ 187.784835] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 187.790006] mount_ns+0x6d/0x190 [ 187.793361] rpc_mount+0x9e/0xd0 [ 187.796710] mount_fs+0x66/0x2d0 [ 187.800059] vfs_kern_mount.part.26+0xc6/0x4a0 [ 187.804624] ? may_umount+0xa0/0xa0 [ 187.808233] ? _raw_read_unlock+0x22/0x30 [ 187.812363] ? __get_fs_type+0x8a/0xc0 [ 187.816236] do_mount+0xea4/0x2bb0 [ 187.819756] ? __might_fault+0x110/0x1d0 [ 187.823800] ? copy_mount_string+0x40/0x40 [ 187.828019] ? __check_object_size+0x8b/0x530 [ 187.832510] ? __might_sleep+0x95/0x190 [ 187.836469] ? kasan_check_write+0x14/0x20 [ 187.840685] ? _copy_from_user+0x99/0x110 [ 187.844819] ? memdup_user+0x5e/0x90 [ 187.848518] ? copy_mount_options+0x1f7/0x2e0 [ 187.852997] SyS_mount+0xab/0x120 [ 187.856436] ? copy_mnt_ns+0xb30/0xb30 [ 187.860306] do_syscall_64+0x281/0x940 [ 187.864170] ? vmalloc_sync_all+0x30/0x30 [ 187.868300] ? trace_event_raw_event_sys_exit+0x260/0x260 [ 187.873816] ? syscall_return_slowpath+0x550/0x550 [ 187.878726] ? syscall_return_slowpath+0x2ac/0x550 [ 187.883641] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 187.888987] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 187.893817] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 187.898985] RIP: 0033:0x454e79 [ 187.902155] RSP: 002b:00007fc28ac9cc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 2018/03/31 05:13:35 executing program 2: socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000040)={0x7, 0x70, 0x1, 0xaabc, 0x2, 0x2, 0x0, 0xec, 0x4800, 0x1, 0x3a6b72c9, 0xffffffffffff8000, 0xfff, 0x7, 0x2, 0x7, 0xff, 0x1, 0x2, 0x9, 0x1, 0x0, 0x5, 0x75, 0x2, 0x7, 0x8, 0x4, 0x0, 0xdbce, 0xffff, 0xfaf, 0x1, 0xe7, 0xd0eb, 0x28a5, 0x9, 0x4, 0x0, 0x7, 0x2, @perf_config_ext={0x1, 0x8000}, 0x489, 0x6, 0xff, 0x0, 0x9d, 0x8, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f00000000c0)={0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000140)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r2 = getpid() r3 = perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x8, 0x4, 0x4, 0x1, 0x0, 0x401, 0x100, 0x7, 0xcfc0, 0x7, 0x0, 0x7, 0x30, 0x7, 0x7, 0xfff, 0x7, 0x9, 0xff, 0x9, 0xf, 0x0, 0x3, 0x100000000, 0x3, 0x8, 0xffff, 0x2, 0x3, 0xff, 0x6f, 0x3, 0x5, 0x800, 0x81, 0x0, 0x0, 0x9, 0x1, @perf_bp={&(0x7f0000000180), 0x1}, 0x0, 0x9, 0x1, 0x1, 0x101, 0x5, 0x1e892fee}, r2, 0x9, r1, 0x1) r4 = perf_event_open(&(0x7f0000000280)={0x5, 0x70, 0xe00000000000, 0x9, 0x800, 0x6, 0x0, 0x7ff, 0x10200, 0xb, 0xe3, 0x5, 0x1, 0x4, 0x9b0f, 0x1f8a, 0x401, 0x1, 0xe975, 0x7, 0x437, 0x9, 0x7f, 0x20, 0x1, 0x2, 0x3, 0x5, 0x200, 0x1, 0x8, 0x401, 0x401, 0x2, 0x8, 0xfff, 0xf3c8, 0xf23, 0x0, 0x7fffffff, 0x0, @perf_bp={&(0x7f0000000240), 0x9}, 0x828, 0x3, 0x5, 0x1, 0x0, 0xc37, 0x6}, r2, 0x4, r1, 0x2) r5 = perf_event_open(&(0x7f0000000300)={0x4, 0x70, 0xff, 0x3, 0x7f, 0x7, 0x0, 0x40, 0x4a240, 0x2, 0xffffffffffffcc27, 0xb8, 0x2, 0x7, 0x9, 0x800, 0x3, 0x7d4d, 0xf7, 0xfffffffffffffffa, 0x9, 0x4, 0x3, 0x90be, 0x9, 0xfffffffffffffffc, 0x6, 0x3ff, 0xab6b, 0x8001, 0x5, 0x2, 0x9, 0x732, 0x400, 0x55000000000, 0x1ff, 0x6, 0x0, 0x0, 0x2, @perf_config_ext={0x6, 0xffffffff}, 0x40, 0x80000001, 0x7fff, 0x2, 0x1, 0x6, 0x5}, r2, 0xf, r4, 0xa) r6 = perf_event_open(&(0x7f00000003c0)={0x7, 0x70, 0xc87d, 0x6, 0x5, 0x80000001, 0x0, 0x3, 0x1, 0xb, 0xffffffff, 0x9, 0x584, 0x31b, 0x7, 0x2, 0x3, 0x544, 0x100000001, 0x9, 0x1, 0x100, 0x3, 0x1, 0x7, 0x0, 0x7, 0x5, 0xbb, 0x40, 0x7, 0x8, 0x81, 0xc5a, 0x0, 0x7, 0x1f, 0x815, 0x0, 0xffff, 0x2, @perf_bp={&(0x7f0000000380), 0x8}, 0x4, 0x5, 0xc95, 0x0, 0x7ff, 0x7b02, 0x7}, r2, 0x10, r1, 0xb) ioctl$PERF_EVENT_IOC_DISABLE(r3, 0x2401, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0x4) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = perf_event_open(&(0x7f0000000480)={0x7, 0x70, 0x7, 0xdbff, 0x3, 0x3f, 0x0, 0x8, 0x0, 0xc, 0x8, 0x0, 0xf43, 0x101, 0x6, 0x5, 0x6, 0x9, 0x200, 0xfffffffffffffffd, 0x4, 0x6, 0x6e, 0x20, 0x1b3, 0x1fe, 0x7ff, 0x3, 0x8000, 0x5, 0x0, 0x0, 0x0, 0x5, 0x22d2, 0x401, 0x68, 0xa1ce, 0x0, 0x4, 0x0, @perf_config_ext={0x2fb, 0x4}, 0x2000, 0xd33, 0x6, 0x697c4c7d75b7b6da, 0x171f, 0x9, 0x9}, r2, 0x6, r5, 0x1) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x9, 0x6, 0x101, 0x8, 0x0, 0x200, 0x2000, 0xf, 0x0, 0x5, 0x6, 0x3, 0x2, 0x0, 0x8001, 0x8, 0x3, 0x5, 0x17, 0x7, 0x4, 0x400, 0xffffffff, 0x7, 0x8000, 0x2, 0x100, 0x0, 0x7, 0x95de, 0x2, 0x1, 0x2, 0xd432, 0x3ff, 0x8599, 0x0, 0x3ff, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x10080, 0x7, 0xe7e, 0x7, 0x5, 0x7, 0x9}, r2, 0x0, r3, 0x8) close(r7) ioctl$PERF_EVENT_IOC_DISABLE(r9, 0x2401, 0x1) r10 = gettid() ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f00000005c0)={r0}) ioctl$sock_kcm_SIOCKCMUNATTACH(r11, 0x89e1, &(0x7f0000000600)={r8}) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000640)) r12 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)={0x4, 0x7, 0x7f, 0x9787, 0x1c, 0xffffffffffffffff, 0x5}, 0x2c) recvmsg$kcm(r11, &(0x7f0000009440)={&(0x7f0000009300)=@can={0x0, 0x0}, 0x80, &(0x7f00000093c0)=[{&(0x7f0000009380)=""/16, 0x10}], 0x1, &(0x7f0000009400)=""/18, 0x12, 0x3bc1}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000009480)={0xf, 0x13, &(0x7f00000006c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [@ldst={0x3, 0x2, 0x1, 0x2, 0x7, 0xffffffff, 0x4}, @map={0x18, 0x0, 0x1, 0x0, r12}, @alu={0x7, 0x5, 0xf, 0x6, 0xe, 0x2, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4}, @jmp={0x5, 0x7a4c, 0x0, 0x3, 0x9, 0xffffffff, 0xfffffffffffffff0}, @alu={0x4, 0x20, 0x9, 0x9, 0x5, 0xfffffffe, 0x4}, @jmp={0x5, 0x81, 0x9, 0x7, 0x6, 0xfffffffe, 0xfffffffffffffff0}, @jmp={0x5, 0x3, 0x3, 0x0, 0x2, 0x2, 0xffffffffffffffff}], {0x95}}, &(0x7f0000000780)='GPL\x00', 0x4, 0x77, &(0x7f00000007c0)=""/119, 0x0, 0x1, [], r13}, 0x48) mount(&(0x7f0000009500)='./file0\x00', &(0x7f0000009540)='./file0\x00', &(0x7f0000009580)='cramfs\x00', 0x5020, &(0x7f00000095c0)="22f464f8fef2b95976576e903efe99229584aaf55fa0d91223905d4a68c0c7d18bf26de6fec0660b0c36945200da04f802d9059dd5f6d2f0eca450f4fdd46ed2b411588d802f0d1d02be65816332b2754d686e927593deb8ee3ed17a24d749db81290c33836bcc9b7d93084c53d0744e81deb8b83d9b23565d6db4cb746eb15b20f7b806f0b5a02676d90260a61b00e9ec0b4b8bf07d5f93b3feda8299586c3936f743c764205de278c25a6fff98") perf_event_open(&(0x7f00000096c0)={0x1, 0x70, 0x3, 0xa8e, 0x1000, 0xe57a, 0x0, 0x6, 0x2100b, 0x2, 0x9, 0xdb1b, 0xfffffffffffffffa, 0xa7f8, 0x3, 0x2, 0x800, 0x800, 0x2, 0x0, 0x3f, 0x3, 0x8000000000000, 0x3, 0x20, 0x6, 0x3, 0xfffffffffffff318, 0xffffffffffff0001, 0xfffffffffffffffe, 0x12, 0x1, 0x101, 0x8, 0x100, 0x1, 0x3, 0x8, 0x0, 0x3ff, 0x7, @perf_bp={&(0x7f0000009680), 0x3}, 0x9, 0x6, 0xfffffffffffffff7, 0x0, 0x0, 0x49, 0xfffffffffffff3b8}, r10, 0xe, r5, 0x8) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000009880)={r12, &(0x7f0000009740)="8ba447000764036f17624e623896639a3e2456b901aedcdb4221cea83c3b2c94575967a34ec104bbebeaf6a6b50494e6763f41056d2ca84f906fa48d72590e81334926fab48e", &(0x7f00000097c0)=""/170}, 0x18) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r4, 0x2405, r6) bpf$PROG_LOAD(0x5, &(0x7f00000099c0)={0x7, 0x4, &(0x7f00000098c0)=@raw=[@ldst={0x3, 0x3, 0x6, 0xd, 0x7, 0x26}, @ldst={0x0, 0x2, 0x0, 0xa, 0x0, 0x4, 0xffffffffffffffff}], &(0x7f0000009900)='GPL\x00', 0x5, 0x5d, &(0x7f0000009940)=""/93, 0x41f00, 0x1, [], r13}, 0x48) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000009b40)={r8, &(0x7f0000009a40)="402c0b8b20e0ae84bb", &(0x7f0000009a80)=""/178}, 0x18) 2018/03/31 05:13:35 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f0000000040)='-\x00') ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0xfff) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000080)="5c766d6e65743124766d6e657431c82400") mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000380)={&(0x7f0000000340)='./file0\x00', r1}, 0x10) r3 = socket$kcm(0x29, 0x2, 0x0) r4 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000140)=0xffffffff, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r4, 0x1c, &(0x7f00000001c0)}, 0xa) sendmsg$kcm(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000000c0)="d8b5bfc0bf213a82557f2ecc43e35debbec630bae15d587e4c9b22f0b8f831bee81e1b6e622a3822460f22c064f8d47b7e5d96855716d25465db210eb65d", 0x3e}], 0x1, &(0x7f0000000140), 0x0, 0x4000000}, 0x1) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x4) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x8}, 0x10) socketpair(0x2, 0xa, 0x4, &(0x7f00000002c0)) close(r0) [ 187.909843] RAX: ffffffffffffffda RBX: 00007fc28ac9d6d4 RCX: 0000000000454e79 [ 187.917091] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 187.924342] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 187.931590] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000016 [ 187.938837] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000002e 2018/03/31 05:13:35 executing program 5: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x4, 0x4, 0x4, 0xc}, 0x2c) close(r0) r2 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000028000)={r1, &(0x7f0000000200), &(0x7f0000000240)="13"}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r2, &(0x7f0000000140)="609603c117b7e3389e52c79ae8fd000db10add54b420ef43a719c1572abc673f23cb5052a3d088fa0b1a9d32df88901c0d6119087c52d515e60752b9121088d77b7dd7ea758e066c97b2fe9baec5b16d4c76ec863a82c012d5a4c85bf9c8b200137d169040a198424ae4ef1b72bf5161d23e3f0396f3dc36c9362e0867b21904ef564e23872d1c7acca77f50234227b6c53e39dbdaa12b8887e06990426c0690ba6ea554419dc433d572e022e242c68456b2b32380f664863e63bdeadb2fd07d6cd16e546887e1f67487570bc850115f1749860e84f886f1208b24a42c478ea00e14e479e88f7a81", &(0x7f0000000280)="2173e83d64cb86c794341016fccb5997dae65183d71b2068439994c22aeda67585a19afbcbca1b8ad651848f384bc5d00efc0ce889c7c19bb7beed922f43f5ff90cd3724ba0704d32286a3a999c555665f20fe4f7947c91fdcfee6f805aa80fbee4a60ab54d51ef480ad272b4ad0c61d4e873d36ece478ebe90a07668b7b06b5a23badc6fc1f0bb3b2742f4c78062ea0512160c6bd1176beee9134571efa0fb366d85b9727ae680ddb8de4195f1ad26c6efa2f32608b4fa1f8d33ad30a5a4f23caa5461069d97115b6f91a1cd5f3d18cf53634de24324ef8ceb0682dd11c99166958", 0x3}, 0x20) 2018/03/31 05:13:35 executing program 7: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) close(r0) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000d80)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x80, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}], 0x1, &(0x7f0000000180)=""/105, 0x69}, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xa, &(0x7f0000000dc0)=ANY=[@ANYBLOB="18220000d600000000000200000000000000000056d82d761faf36eb00010001000000000000000007e3b330e3fa3966330f0417f591093ed0c2f4ffa5c1550bd043b0cf62cafd7ada9df78f18b43168a8318b"], &(0x7f0000003ff6)='syzkaller\x00', 0x0, 0xc3, &(0x7f0000386000)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000b40)={0xffffffffffffffff, 0x0, 0xb4, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2b", &(0x7f0000000340)=""/90, 0x2, 0x932a}, 0x28) recvmsg(r2, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100)=r3, 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b53596090ebcc07d8584f358be88fa") recvmsg(0xffffffffffffffff, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000a80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r4}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x10, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800), 0x0, 0x20000080}, 0x40) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000200)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001d80)) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001, 0x1}, 0x2c) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000d00)={r0, 0x50, &(0x7f0000000c80)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000d40)=r7, 0x4) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r6, &(0x7f0000000040)}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000dec000)={0x6, 0x4, 0x338d, 0x7}, 0x2c) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b80)={&(0x7f00000000c0)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000680)={0x0, r5, 0x3, 0x1}, 0x14) 2018/03/31 05:13:35 executing program 4: mount(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='ncpfs\x00', 0x80802, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x50, &(0x7f0000000700)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780)=r0, 0x4) mount(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='./file0\x00', &(0x7f00000006c0)='btrfs\x00', 0x89402, &(0x7f0000000900)="e196efa3cb748d2a6600968b76295ff919bc3877b18eb8d265a35493fcf34fdc965cd5c837d2389c6e2ec6088abe8daaa8ca23f9298fc94dc26874bc4d4567afea1ca0879cdf21e915005a83e96b1002af29091d2176abbb7fec088a67f2e1390f32adaf2f252d24510870f8df7186936f4d88957eb8fcda78b7383a7d24db701d524557ee7324433e70d9ffa185098325f9e657d3c29cf6a35843cb96780269db1c735d55938af5c60e1e4ba25928697277b0fdf356b62399b4c8826d09bfca7d6078c19b4995195ea814b1bb40c06210ec") ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0xffffffff) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e2, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6f3, 0x0, 0x6, 0x0, 0x0, 0xfffdffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x22, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000f6bffb)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000400)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000540)={r1, 0x50}, 0xfffffe74) close(r1) perf_event_open(&(0x7f0000348f88)={0x2, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x28, 0x2, 0x0, &(0x7f0000000000)={0x0}) mkdir(&(0x7f0000000100)='./file0\x00', 0x1000000000) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='selinuxfs\x00', 0x1000, &(0x7f0000000100)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='minix\x00', 0x10020, &(0x7f0000000240)) 2018/03/31 05:13:35 executing program 2: socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000040)={0x7, 0x70, 0x1, 0xaabc, 0x2, 0x2, 0x0, 0xec, 0x4800, 0x1, 0x3a6b72c9, 0xffffffffffff8000, 0xfff, 0x7, 0x2, 0x7, 0xff, 0x1, 0x2, 0x9, 0x1, 0x0, 0x5, 0x75, 0x2, 0x7, 0x8, 0x4, 0x0, 0xdbce, 0xffff, 0xfaf, 0x1, 0xe7, 0xd0eb, 0x28a5, 0x9, 0x4, 0x0, 0x7, 0x2, @perf_config_ext={0x1, 0x8000}, 0x489, 0x6, 0xff, 0x0, 0x9d, 0x8, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f00000000c0)={0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000140)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r2 = getpid() r3 = perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x8, 0x4, 0x4, 0x1, 0x0, 0x401, 0x100, 0x7, 0xcfc0, 0x7, 0x0, 0x7, 0x30, 0x7, 0x7, 0xfff, 0x7, 0x9, 0xff, 0x9, 0xf, 0x0, 0x3, 0x100000000, 0x3, 0x8, 0xffff, 0x2, 0x3, 0xff, 0x6f, 0x3, 0x5, 0x800, 0x81, 0x0, 0x0, 0x9, 0x1, @perf_bp={&(0x7f0000000180), 0x1}, 0x0, 0x9, 0x1, 0x1, 0x101, 0x5, 0x1e892fee}, r2, 0x9, r1, 0x1) r4 = perf_event_open(&(0x7f0000000280)={0x5, 0x70, 0xe00000000000, 0x9, 0x800, 0x6, 0x0, 0x7ff, 0x10200, 0xb, 0xe3, 0x5, 0x1, 0x4, 0x9b0f, 0x1f8a, 0x401, 0x1, 0xe975, 0x7, 0x437, 0x9, 0x7f, 0x20, 0x1, 0x2, 0x3, 0x5, 0x200, 0x1, 0x8, 0x401, 0x401, 0x2, 0x8, 0xfff, 0xf3c8, 0xf23, 0x0, 0x7fffffff, 0x0, @perf_bp={&(0x7f0000000240), 0x9}, 0x828, 0x3, 0x5, 0x1, 0x0, 0xc37, 0x6}, r2, 0x4, r1, 0x2) r5 = perf_event_open(&(0x7f0000000300)={0x4, 0x70, 0xff, 0x3, 0x7f, 0x7, 0x0, 0x40, 0x4a240, 0x2, 0xffffffffffffcc27, 0xb8, 0x2, 0x7, 0x9, 0x800, 0x3, 0x7d4d, 0xf7, 0xfffffffffffffffa, 0x9, 0x4, 0x3, 0x90be, 0x9, 0xfffffffffffffffc, 0x6, 0x3ff, 0xab6b, 0x8001, 0x5, 0x2, 0x9, 0x732, 0x400, 0x55000000000, 0x1ff, 0x6, 0x0, 0x0, 0x2, @perf_config_ext={0x6, 0xffffffff}, 0x40, 0x80000001, 0x7fff, 0x2, 0x1, 0x6, 0x5}, r2, 0xf, r4, 0xa) r6 = perf_event_open(&(0x7f00000003c0)={0x7, 0x70, 0xc87d, 0x6, 0x5, 0x80000001, 0x0, 0x3, 0x1, 0xb, 0xffffffff, 0x9, 0x584, 0x31b, 0x7, 0x2, 0x3, 0x544, 0x100000001, 0x9, 0x1, 0x100, 0x3, 0x1, 0x7, 0x0, 0x7, 0x5, 0xbb, 0x40, 0x7, 0x8, 0x81, 0xc5a, 0x0, 0x7, 0x1f, 0x815, 0x0, 0xffff, 0x2, @perf_bp={&(0x7f0000000380), 0x8}, 0x4, 0x5, 0xc95, 0x0, 0x7ff, 0x7b02, 0x7}, r2, 0x10, r1, 0xb) ioctl$PERF_EVENT_IOC_DISABLE(r3, 0x2401, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0x4) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = perf_event_open(&(0x7f0000000480)={0x7, 0x70, 0x7, 0xdbff, 0x3, 0x3f, 0x0, 0x8, 0x0, 0xc, 0x8, 0x0, 0xf43, 0x101, 0x6, 0x5, 0x6, 0x9, 0x200, 0xfffffffffffffffd, 0x4, 0x6, 0x6e, 0x20, 0x1b3, 0x1fe, 0x7ff, 0x3, 0x8000, 0x5, 0x0, 0x0, 0x0, 0x5, 0x22d2, 0x401, 0x68, 0xa1ce, 0x0, 0x4, 0x0, @perf_config_ext={0x2fb, 0x4}, 0x2000, 0xd33, 0x6, 0x697c4c7d75b7b6da, 0x171f, 0x9, 0x9}, r2, 0x6, r5, 0x1) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x9, 0x6, 0x101, 0x8, 0x0, 0x200, 0x2000, 0xf, 0x0, 0x5, 0x6, 0x3, 0x2, 0x0, 0x8001, 0x8, 0x3, 0x5, 0x17, 0x7, 0x4, 0x400, 0xffffffff, 0x7, 0x8000, 0x2, 0x100, 0x0, 0x7, 0x95de, 0x2, 0x1, 0x2, 0xd432, 0x3ff, 0x8599, 0x0, 0x3ff, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x10080, 0x7, 0xe7e, 0x7, 0x5, 0x7, 0x9}, r2, 0x0, r3, 0x8) close(r7) ioctl$PERF_EVENT_IOC_DISABLE(r9, 0x2401, 0x1) r10 = gettid() ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f00000005c0)={r0}) ioctl$sock_kcm_SIOCKCMUNATTACH(r11, 0x89e1, &(0x7f0000000600)={r8}) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000640)) r12 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)={0x4, 0x7, 0x7f, 0x9787, 0x1c, 0xffffffffffffffff, 0x5}, 0x2c) recvmsg$kcm(r11, &(0x7f0000009440)={&(0x7f0000009300)=@can={0x0, 0x0}, 0x80, &(0x7f00000093c0)=[{&(0x7f0000009380)=""/16, 0x10}], 0x1, &(0x7f0000009400)=""/18, 0x12, 0x3bc1}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000009480)={0xf, 0x13, &(0x7f00000006c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [@ldst={0x3, 0x2, 0x1, 0x2, 0x7, 0xffffffff, 0x4}, @map={0x18, 0x0, 0x1, 0x0, r12}, @alu={0x7, 0x5, 0xf, 0x6, 0xe, 0x2, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4}, @jmp={0x5, 0x7a4c, 0x0, 0x3, 0x9, 0xffffffff, 0xfffffffffffffff0}, @alu={0x4, 0x20, 0x9, 0x9, 0x5, 0xfffffffe, 0x4}, @jmp={0x5, 0x81, 0x9, 0x7, 0x6, 0xfffffffe, 0xfffffffffffffff0}, @jmp={0x5, 0x3, 0x3, 0x0, 0x2, 0x2, 0xffffffffffffffff}], {0x95}}, &(0x7f0000000780)='GPL\x00', 0x4, 0x77, &(0x7f00000007c0)=""/119, 0x0, 0x1, [], r13}, 0x48) mount(&(0x7f0000009500)='./file0\x00', &(0x7f0000009540)='./file0\x00', &(0x7f0000009580)='cramfs\x00', 0x5020, &(0x7f00000095c0)="22f464f8fef2b95976576e903efe99229584aaf55fa0d91223905d4a68c0c7d18bf26de6fec0660b0c36945200da04f802d9059dd5f6d2f0eca450f4fdd46ed2b411588d802f0d1d02be65816332b2754d686e927593deb8ee3ed17a24d749db81290c33836bcc9b7d93084c53d0744e81deb8b83d9b23565d6db4cb746eb15b20f7b806f0b5a02676d90260a61b00e9ec0b4b8bf07d5f93b3feda8299586c3936f743c764205de278c25a6fff98") perf_event_open(&(0x7f00000096c0)={0x1, 0x70, 0x3, 0xa8e, 0x1000, 0xe57a, 0x0, 0x6, 0x2100b, 0x2, 0x9, 0xdb1b, 0xfffffffffffffffa, 0xa7f8, 0x3, 0x2, 0x800, 0x800, 0x2, 0x0, 0x3f, 0x3, 0x8000000000000, 0x3, 0x20, 0x6, 0x3, 0xfffffffffffff318, 0xffffffffffff0001, 0xfffffffffffffffe, 0x12, 0x1, 0x101, 0x8, 0x100, 0x1, 0x3, 0x8, 0x0, 0x3ff, 0x7, @perf_bp={&(0x7f0000009680), 0x3}, 0x9, 0x6, 0xfffffffffffffff7, 0x0, 0x0, 0x49, 0xfffffffffffff3b8}, r10, 0xe, r5, 0x8) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000009880)={r12, &(0x7f0000009740)="8ba447000764036f17624e623896639a3e2456b901aedcdb4221cea83c3b2c94575967a34ec104bbebeaf6a6b50494e6763f41056d2ca84f906fa48d72590e81334926fab48e", &(0x7f00000097c0)=""/170}, 0x18) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r4, 0x2405, r6) bpf$PROG_LOAD(0x5, &(0x7f00000099c0)={0x7, 0x4, &(0x7f00000098c0)=@raw=[@ldst={0x3, 0x3, 0x6, 0xd, 0x7, 0x26}, @ldst={0x0, 0x2, 0x0, 0xa, 0x0, 0x4, 0xffffffffffffffff}], &(0x7f0000009900)='GPL\x00', 0x5, 0x5d, &(0x7f0000009940)=""/93, 0x41f00, 0x1, [], r13}, 0x48) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000009b40)={r8, &(0x7f0000009a40)="402c0b8b20e0ae84bb", &(0x7f0000009a80)=""/178}, 0x18) 2018/03/31 05:13:35 executing program 6 (fault-call:17 fault-nth:47): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x0, 0x101, 0x4, 0x0, 0x1, r0, 0x0, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r2 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)={0xffffffffffffffff}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r2, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x0, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0", 0xc9}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000280)={&(0x7f0000000680)='./file0\x00'}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r1}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r3) gettid() close(0xffffffffffffffff) 2018/03/31 05:13:35 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='hugetlbfs\x00', 0x0, &(0x7f0000000340)="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") mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000001380)='./file0\x00', &(0x7f0000001340)='proc\x00', 0x0, &(0x7f0000000240)) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) socketpair(0x10, 0x1, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000001640)={&(0x7f00000013c0)=@sco, 0x80, &(0x7f0000001580)=[{&(0x7f0000001440)=""/173, 0xad}, {&(0x7f0000001500)=""/75, 0x4b}], 0x2, &(0x7f00000015c0)=""/99, 0x63, 0x10001}, 0x2) close(r0) mount(&(0x7f0000000000)='./file0/bus\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x2000, &(0x7f00000002c0)) mkdir(&(0x7f0000001680)='./file0/bus\x00', 0x8c) bpf$OBJ_GET_MAP(0x7, &(0x7f0000001700)={&(0x7f00000001c0)='./file0/bus\x00', 0x0, 0x8}, 0x10) [ 188.154282] EXT4-fs (sda1): re-mounted. Opts: [ 188.167471] hugetlbfs: Bad mount option: "£Î ooPŸ¯2p‹I¸úbs%[ð4¡5ZMØ~éÚ·vTxEÆp Úõ\![ÆWÔ½ÎÙ™S9ÉelT¶Dûè²Uv3¹$òëK" [ 188.228514] FAULT_INJECTION: forcing a failure. [ 188.228514] name failslab, interval 1, probability 0, space 0, times 0 [ 188.239957] CPU: 1 PID: 15932 Comm: syz-executor6 Not tainted 4.16.0-rc6+ #42 [ 188.247248] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 188.256606] Call Trace: [ 188.259192] dump_stack+0x194/0x24d [ 188.262827] ? arch_local_irq_restore+0x53/0x53 [ 188.264344] hugetlbfs: Bad mount option: "£Î ooPŸ¯2p‹I¸úbs%[ð4¡5ZMØ~éÚ·vTxEÆp Úõ\![ÆWÔ½ÎÙ™S9ÉelT¶Dûè²Uv3¹$òëK" [ 188.267488] ? __save_stack_trace+0x7e/0xd0 [ 188.267509] should_fail+0x8c0/0xa40 [ 188.267522] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 188.267535] ? kasan_kmalloc+0xad/0xe0 [ 188.295306] ? kmem_cache_alloc_trace+0x136/0x740 [ 188.300143] ? __memcg_init_list_lru_node+0x169/0x270 [ 188.305323] ? __list_lru_init+0x544/0x750 [ 188.309552] ? sget_userns+0x6b1/0xe40 [ 188.313433] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 188.318179] ? do_mount+0xea4/0x2bb0 [ 188.321884] ? SyS_mount+0xab/0x120 [ 188.325510] ? do_syscall_64+0x281/0x940 [ 188.329565] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 188.334928] ? find_held_lock+0x35/0x1d0 [ 188.338992] ? __lock_is_held+0xb6/0x140 [ 188.343053] ? check_same_owner+0x320/0x320 [ 188.347371] ? rcu_note_context_switch+0x710/0x710 [ 188.352298] should_failslab+0xec/0x120 [ 188.356265] kmem_cache_alloc_trace+0x4b/0x740 [ 188.360841] ? __kmalloc_node+0x33/0x70 [ 188.364808] ? __kmalloc_node+0x33/0x70 [ 188.368777] ? rcu_read_lock_sched_held+0x108/0x120 [ 188.373791] __memcg_init_list_lru_node+0x169/0x270 [ 188.378810] ? list_lru_add+0x7c0/0x7c0 [ 188.382781] ? __kmalloc_node+0x47/0x70 [ 188.386755] __list_lru_init+0x544/0x750 [ 188.390814] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 188.396699] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 188.401714] ? lockdep_init_map+0x9/0x10 [ 188.405771] sget_userns+0x6b1/0xe40 [ 188.409478] ? set_anon_super+0x20/0x20 [ 188.413451] ? put_filp+0x90/0x90 [ 188.416903] ? destroy_unused_super.part.6+0xd0/0xd0 [ 188.422001] ? alloc_vfsmnt+0x762/0x9c0 [ 188.425968] ? path_lookupat+0x238/0xba0 [ 188.430018] ? mnt_free_id.isra.21+0x50/0x50 [ 188.434415] ? trace_hardirqs_off+0x10/0x10 [ 188.438718] ? putname+0xee/0x130 [ 188.442153] ? cap_capable+0x1b5/0x230 [ 188.446030] ? security_capable+0x8e/0xc0 [ 188.450161] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 188.455329] ? ns_capable_common+0xcf/0x160 [ 188.459634] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 188.464804] mount_ns+0x6d/0x190 [ 188.468152] rpc_mount+0x9e/0xd0 [ 188.471503] mount_fs+0x66/0x2d0 [ 188.474852] vfs_kern_mount.part.26+0xc6/0x4a0 [ 188.479415] ? may_umount+0xa0/0xa0 [ 188.483024] ? _raw_read_unlock+0x22/0x30 [ 188.487153] ? __get_fs_type+0x8a/0xc0 [ 188.491027] do_mount+0xea4/0x2bb0 [ 188.494546] ? __might_fault+0x110/0x1d0 [ 188.498593] ? copy_mount_string+0x40/0x40 [ 188.502805] ? check_same_owner+0x320/0x320 [ 188.507105] ? __check_object_size+0x8b/0x530 [ 188.511584] ? __might_sleep+0x95/0x190 [ 188.515549] ? kasan_check_write+0x14/0x20 [ 188.519763] ? _copy_from_user+0x99/0x110 [ 188.523892] ? memdup_user+0x5e/0x90 [ 188.527588] ? copy_mount_options+0x1f7/0x2e0 [ 188.532063] SyS_mount+0xab/0x120 [ 188.535494] ? copy_mnt_ns+0xb30/0xb30 [ 188.539362] do_syscall_64+0x281/0x940 [ 188.543228] ? trace_event_raw_event_sys_exit+0x260/0x260 [ 188.548743] ? syscall_return_slowpath+0x550/0x550 [ 188.553652] ? syscall_return_slowpath+0x2ac/0x550 [ 188.558566] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 188.563913] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 188.568740] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 188.573908] RIP: 0033:0x454e79 [ 188.577078] RSP: 002b:00007fc28ac9cc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 188.584765] RAX: ffffffffffffffda RBX: 00007fc28ac9d6d4 RCX: 0000000000454e79 [ 188.592015] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 188.599270] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 188.606521] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000016 [ 188.613768] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000002f 2018/03/31 05:13:36 executing program 7: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x4, 0x88c4, 0x209e20, 0x8000000001, 0x1}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r0, &(0x7f0000000000), &(0x7f00000000c0)=""/29}, 0x18) 2018/03/31 05:13:36 executing program 4: mount(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='ncpfs\x00', 0x80802, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x50, &(0x7f0000000700)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780)=r0, 0x4) mount(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='./file0\x00', &(0x7f00000006c0)='btrfs\x00', 0x89402, &(0x7f0000000900)="e196efa3cb748d2a6600968b76295ff919bc3877b18eb8d265a35493fcf34fdc965cd5c837d2389c6e2ec6088abe8daaa8ca23f9298fc94dc26874bc4d4567afea1ca0879cdf21e915005a83e96b1002af29091d2176abbb7fec088a67f2e1390f32adaf2f252d24510870f8df7186936f4d88957eb8fcda78b7383a7d24db701d524557ee7324433e70d9ffa185098325f9e657d3c29cf6a35843cb96780269db1c735d55938af5c60e1e4ba25928697277b0fdf356b62399b4c8826d09bfca7d6078c19b4995195ea814b1bb40c06210ec") ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0xffffffff) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6f3, 0x0, 0x6, 0x0, 0x0, 0xfffdffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x22, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000f6bffb)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000400)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000540)={r1, 0x50}, 0xfffffe74) close(r1) perf_event_open(&(0x7f0000348f88)={0x2, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x28, 0x2, 0x0, &(0x7f0000000000)={0x0}) mkdir(&(0x7f0000000100)='./file0\x00', 0x1000000000) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='selinuxfs\x00', 0x1000, &(0x7f0000000100)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='minix\x00', 0x10020, &(0x7f0000000240)) 2018/03/31 05:13:36 executing program 6 (fault-call:17 fault-nth:48): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x0, 0x101, 0x4, 0x0, 0x1, r0, 0x0, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r2 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)={0xffffffffffffffff}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r2, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x0, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0", 0xc9}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000280)={&(0x7f0000000680)='./file0\x00'}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r1}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r3) gettid() close(0xffffffffffffffff) 2018/03/31 05:13:36 executing program 1: r0 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00'}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r0, 0x0, 0x96, 0x5f, &(0x7f0000000180)="422741e503030ba5461259f9bfff5e2a30c672eccf9468f6953aa94526b8c8d825be437bd3b79e415764636cd52ddf3a08b5bf000d5897c9822f6315801882b78e48e58ccc390c1d9e874a3d80bec1ef83169aa230a257e58f5a5918771536d0ea519d0da9045e890dce4780ebe39ffc90024f3d9ccdb2fd783947d64f4d3a882eaeff0e86d07f70a1d2a458d40f64d929b6f8cf9a6b", &(0x7f0000000080)=""/95, 0x9, 0x13b5}, 0x28) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={0xffffffffffffffff, 0x0, 0x19, 0x19, &(0x7f0000000100)="36efa5861d4261daa01c6e345916d2b3f42683fa40c5885ccf", &(0x7f0000000280)=""/25}, 0x28) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000580)=0x3) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000003c0)={0xffffffffffffffff}) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r3 = gettid() r4 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0xca, 0x3f, 0x1, 0x0, 0x0, 0x4, 0x400, 0x4, 0xfffffffffffffffd, 0x1, 0x81, 0xbd26, 0x0, 0x7, 0x6, 0x153c0000000000, 0x5f7, 0x7fff, 0x81, 0x1, 0x7, 0x4, 0x100000000, 0x48000000000000, 0x8c, 0x6, 0x28, 0x1d2b, 0xfffffffffffffff9, 0x4, 0x4, 0x5, 0x1ff, 0x8, 0x4, 0x2, 0x0, 0x4, 0x2, @perf_config_ext={0x80008, 0xc679}, 0x80a0, 0x7, 0x1, 0x7, 0x4, 0x5, 0xff}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000480)={0x5, 0x70, 0x101, 0x7, 0x0, 0xd6, 0x0, 0x6, 0x1, 0x8, 0x8, 0x2, 0x7ff, 0x3, 0x4, 0x8, 0x9, 0x8, 0x7fff, 0x40, 0x5, 0x1f, 0xffff, 0x5, 0x0, 0xfffffffffffffff9, 0x7fffffff, 0xff, 0x5, 0x10001, 0xffff, 0x8000, 0x5, 0x7fff, 0x80000000, 0xfffffffffffffffe, 0x9, 0x4, 0x0, 0x10001, 0x1, @perf_config_ext={0x54ed, 0x200}, 0x180, 0xfa37, 0x187da919, 0x1, 0x6, 0x7, 0x8219}, r3, 0xb, r4, 0x1) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000440)={r2}) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0xc, 0x5, &(0x7f0000000100)=@framed={{0x18}, [@call={0x85, 0x0, 0x0, 0x1a}], {0x95}}, &(0x7f0000000140)='syzkaller\x00', 0x2, 0x89, &(0x7f0000000280)=""/137}, 0x48) 2018/03/31 05:13:36 executing program 2: socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000040)={0x7, 0x70, 0x1, 0xaabc, 0x2, 0x2, 0x0, 0xec, 0x4800, 0x1, 0x3a6b72c9, 0xffffffffffff8000, 0xfff, 0x7, 0x2, 0x7, 0xff, 0x1, 0x2, 0x9, 0x1, 0x0, 0x5, 0x75, 0x2, 0x7, 0x8, 0x4, 0x0, 0xdbce, 0xffff, 0xfaf, 0x1, 0xe7, 0xd0eb, 0x28a5, 0x9, 0x4, 0x0, 0x7, 0x2, @perf_config_ext={0x1, 0x8000}, 0x489, 0x6, 0xff, 0x0, 0x9d, 0x8, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f00000000c0)={0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000140)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r2 = getpid() r3 = perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x8, 0x4, 0x4, 0x1, 0x0, 0x401, 0x100, 0x7, 0xcfc0, 0x7, 0x0, 0x7, 0x30, 0x7, 0x7, 0xfff, 0x7, 0x9, 0xff, 0x9, 0xf, 0x0, 0x3, 0x100000000, 0x3, 0x8, 0xffff, 0x2, 0x3, 0xff, 0x6f, 0x3, 0x5, 0x800, 0x81, 0x0, 0x0, 0x9, 0x1, @perf_bp={&(0x7f0000000180), 0x1}, 0x0, 0x9, 0x1, 0x1, 0x101, 0x5, 0x1e892fee}, r2, 0x9, r1, 0x1) r4 = perf_event_open(&(0x7f0000000280)={0x5, 0x70, 0xe00000000000, 0x9, 0x800, 0x6, 0x0, 0x7ff, 0x10200, 0xb, 0xe3, 0x5, 0x1, 0x4, 0x9b0f, 0x1f8a, 0x401, 0x1, 0xe975, 0x7, 0x437, 0x9, 0x7f, 0x20, 0x1, 0x2, 0x3, 0x5, 0x200, 0x1, 0x8, 0x401, 0x401, 0x2, 0x8, 0xfff, 0xf3c8, 0xf23, 0x0, 0x7fffffff, 0x0, @perf_bp={&(0x7f0000000240), 0x9}, 0x828, 0x3, 0x5, 0x1, 0x0, 0xc37, 0x6}, r2, 0x4, r1, 0x2) r5 = perf_event_open(&(0x7f0000000300)={0x4, 0x70, 0xff, 0x3, 0x7f, 0x7, 0x0, 0x40, 0x4a240, 0x2, 0xffffffffffffcc27, 0xb8, 0x2, 0x7, 0x9, 0x800, 0x3, 0x7d4d, 0xf7, 0xfffffffffffffffa, 0x9, 0x4, 0x3, 0x90be, 0x9, 0xfffffffffffffffc, 0x6, 0x3ff, 0xab6b, 0x8001, 0x5, 0x2, 0x9, 0x732, 0x400, 0x55000000000, 0x1ff, 0x6, 0x0, 0x0, 0x2, @perf_config_ext={0x6, 0xffffffff}, 0x40, 0x80000001, 0x7fff, 0x2, 0x1, 0x6, 0x5}, r2, 0xf, r4, 0xa) r6 = perf_event_open(&(0x7f00000003c0)={0x7, 0x70, 0xc87d, 0x6, 0x5, 0x80000001, 0x0, 0x3, 0x1, 0xb, 0xffffffff, 0x9, 0x584, 0x31b, 0x7, 0x2, 0x3, 0x544, 0x100000001, 0x9, 0x1, 0x100, 0x3, 0x1, 0x7, 0x0, 0x7, 0x5, 0xbb, 0x40, 0x7, 0x8, 0x81, 0xc5a, 0x0, 0x7, 0x1f, 0x815, 0x0, 0xffff, 0x2, @perf_bp={&(0x7f0000000380), 0x8}, 0x4, 0x5, 0xc95, 0x0, 0x7ff, 0x7b02, 0x7}, r2, 0x10, r1, 0xb) ioctl$PERF_EVENT_IOC_DISABLE(r3, 0x2401, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0x4) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = perf_event_open(&(0x7f0000000480)={0x7, 0x70, 0x7, 0xdbff, 0x3, 0x3f, 0x0, 0x8, 0x0, 0xc, 0x8, 0x0, 0xf43, 0x101, 0x6, 0x5, 0x6, 0x9, 0x200, 0xfffffffffffffffd, 0x4, 0x6, 0x6e, 0x20, 0x1b3, 0x1fe, 0x7ff, 0x3, 0x8000, 0x5, 0x0, 0x0, 0x0, 0x5, 0x22d2, 0x401, 0x68, 0xa1ce, 0x0, 0x4, 0x0, @perf_config_ext={0x2fb, 0x4}, 0x2000, 0xd33, 0x6, 0x697c4c7d75b7b6da, 0x171f, 0x9, 0x9}, r2, 0x6, r5, 0x1) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x9, 0x6, 0x101, 0x8, 0x0, 0x200, 0x2000, 0xf, 0x0, 0x5, 0x6, 0x3, 0x2, 0x0, 0x8001, 0x8, 0x3, 0x5, 0x17, 0x7, 0x4, 0x400, 0xffffffff, 0x7, 0x8000, 0x2, 0x100, 0x0, 0x7, 0x95de, 0x2, 0x1, 0x2, 0xd432, 0x3ff, 0x8599, 0x0, 0x3ff, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x10080, 0x7, 0xe7e, 0x7, 0x5, 0x7, 0x9}, r2, 0x0, r3, 0x8) close(r7) ioctl$PERF_EVENT_IOC_DISABLE(r9, 0x2401, 0x1) r10 = gettid() ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f00000005c0)={r0}) ioctl$sock_kcm_SIOCKCMUNATTACH(r11, 0x89e1, &(0x7f0000000600)={r8}) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000640)) r12 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)={0x4, 0x7, 0x7f, 0x9787, 0x1c, 0xffffffffffffffff, 0x5}, 0x2c) recvmsg$kcm(r11, &(0x7f0000009440)={&(0x7f0000009300)=@can={0x0, 0x0}, 0x80, &(0x7f00000093c0)=[{&(0x7f0000009380)=""/16, 0x10}], 0x1, &(0x7f0000009400)=""/18, 0x12, 0x3bc1}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000009480)={0xf, 0x13, &(0x7f00000006c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [@ldst={0x3, 0x2, 0x1, 0x2, 0x7, 0xffffffff, 0x4}, @map={0x18, 0x0, 0x1, 0x0, r12}, @alu={0x7, 0x5, 0xf, 0x6, 0xe, 0x2, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4}, @jmp={0x5, 0x7a4c, 0x0, 0x3, 0x9, 0xffffffff, 0xfffffffffffffff0}, @alu={0x4, 0x20, 0x9, 0x9, 0x5, 0xfffffffe, 0x4}, @jmp={0x5, 0x81, 0x9, 0x7, 0x6, 0xfffffffe, 0xfffffffffffffff0}, @jmp={0x5, 0x3, 0x3, 0x0, 0x2, 0x2, 0xffffffffffffffff}], {0x95}}, &(0x7f0000000780)='GPL\x00', 0x4, 0x77, &(0x7f00000007c0)=""/119, 0x0, 0x1, [], r13}, 0x48) mount(&(0x7f0000009500)='./file0\x00', &(0x7f0000009540)='./file0\x00', &(0x7f0000009580)='cramfs\x00', 0x5020, &(0x7f00000095c0)="22f464f8fef2b95976576e903efe99229584aaf55fa0d91223905d4a68c0c7d18bf26de6fec0660b0c36945200da04f802d9059dd5f6d2f0eca450f4fdd46ed2b411588d802f0d1d02be65816332b2754d686e927593deb8ee3ed17a24d749db81290c33836bcc9b7d93084c53d0744e81deb8b83d9b23565d6db4cb746eb15b20f7b806f0b5a02676d90260a61b00e9ec0b4b8bf07d5f93b3feda8299586c3936f743c764205de278c25a6fff98") perf_event_open(&(0x7f00000096c0)={0x1, 0x70, 0x3, 0xa8e, 0x1000, 0xe57a, 0x0, 0x6, 0x2100b, 0x2, 0x9, 0xdb1b, 0xfffffffffffffffa, 0xa7f8, 0x3, 0x2, 0x800, 0x800, 0x2, 0x0, 0x3f, 0x3, 0x8000000000000, 0x3, 0x20, 0x6, 0x3, 0xfffffffffffff318, 0xffffffffffff0001, 0xfffffffffffffffe, 0x12, 0x1, 0x101, 0x8, 0x100, 0x1, 0x3, 0x8, 0x0, 0x3ff, 0x7, @perf_bp={&(0x7f0000009680), 0x3}, 0x9, 0x6, 0xfffffffffffffff7, 0x0, 0x0, 0x49, 0xfffffffffffff3b8}, r10, 0xe, r5, 0x8) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000009880)={r12, &(0x7f0000009740)="8ba447000764036f17624e623896639a3e2456b901aedcdb4221cea83c3b2c94575967a34ec104bbebeaf6a6b50494e6763f41056d2ca84f906fa48d72590e81334926fab48e", &(0x7f00000097c0)=""/170}, 0x18) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r4, 0x2405, r6) bpf$PROG_LOAD(0x5, &(0x7f00000099c0)={0x7, 0x4, &(0x7f00000098c0)=@raw=[@ldst={0x3, 0x3, 0x6, 0xd, 0x7, 0x26}, @ldst={0x0, 0x2, 0x0, 0xa, 0x0, 0x4, 0xffffffffffffffff}], &(0x7f0000009900)='GPL\x00', 0x5, 0x5d, &(0x7f0000009940)=""/93, 0x41f00, 0x1, [], r13}, 0x48) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000009b40)={r8, &(0x7f0000009a40)="402c0b8b20e0ae84bb", &(0x7f0000009a80)=""/178}, 0x18) 2018/03/31 05:13:36 executing program 5: socketpair(0x0, 0x0, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x32, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=@framed={{0x18}, [], {0x95}}, &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000180)={0x2, 0x0, [0x0, 0x0]}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000280)={&(0x7f0000000240)='./file0\x00', r0}, 0x10) 2018/03/31 05:13:36 executing program 3: socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x64, 0x3e3, 0x800000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x100, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) socketpair(0x3, 0x1, 0x4, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0xfff) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair(0x4, 0x1, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = getpid() perf_event_open(&(0x7f0000000b00)={0x0, 0x70, 0xbf4, 0x26bc, 0xe15f, 0xc2dd, 0x0, 0x9, 0xd5b3d265bfd9cc6f, 0x6, 0x84e2, 0x313, 0x7, 0x0, 0x7fffffff, 0xffffffff00000001, 0x2, 0x4, 0xff, 0x6, 0x6, 0x2, 0x8, 0x8, 0x7, 0x4, 0x4, 0x3, 0x97, 0x6, 0x7, 0x7, 0x7, 0x5, 0xffff, 0x2, 0x6, 0x5, 0x0, 0x7fffffff, 0x1, @perf_config_ext={0x4, 0xfffffffffffffff9}, 0x0, 0x1ff, 0x4, 0x0, 0x3, 0x8, 0x8}, r3, 0xb, r1, 0x2) recvmsg$kcm(r2, &(0x7f0000000ac0)={&(0x7f0000000340)=@pppoe, 0x80, &(0x7f0000000900)=[{&(0x7f00000003c0)=""/246, 0xf6}, {&(0x7f00000004c0)=""/36, 0x24}, {&(0x7f0000000500)=""/227, 0xe3}, {&(0x7f0000000600)=""/21, 0x15}, {&(0x7f0000000640)=""/68, 0x44}, {&(0x7f00000006c0)=""/75, 0x4b}, {&(0x7f0000000740)=""/208, 0xd0}, {&(0x7f0000000880)=""/85, 0x55}], 0x8, &(0x7f00000009c0)=""/199, 0xc7, 0x5e542a51}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x5, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = gettid() mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000840)='./file0\x00', &(0x7f0000000980)='fuse\x00', 0x188080, &(0x7f0000000c00)="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") mount(&(0x7f0000001c00)='./file0\x00', &(0x7f0000001c40)='./file0/file0\x00', &(0x7f0000001c80)='ufs\x00', 0x2000000, &(0x7f0000001cc0)="91eb6774f75917d63d533349eefa88d0497571c1de9194f093309d7a69c4950fcc95c973f8b18c5dabcb77b74a626923c32584a02954e77fb9a28b99524bf9e4734e9dba6ce9b559002ad428af1bb35342463e15a81670a82004a88146b055ef4ec82a6402af619fced1e6ccc6f1c0e0bb597e89d5f2f902fafff93165309564c82a37c219fa3fee31b7b67d57ad497d478a8ea7196d9ea4452aa8bdc8e9d90751ca8649249f6de35419e3") perf_event_open(&(0x7f0000000b80)={0x0, 0x70, 0x5e3e, 0x5, 0x4, 0x8000, 0x0, 0x7, 0x80000, 0x8, 0xcd3a, 0x20000000000000, 0x3, 0x8, 0x81, 0x5080, 0x401, 0x6, 0x7, 0x2, 0x0, 0x1, 0x10000, 0xffffffffa9aa2092, 0xffffffff903a1525, 0x7, 0x3, 0x0, 0x80, 0xbb5, 0x4, 0x8, 0x298, 0x6, 0x10000, 0x8, 0x400, 0xfffffffffffffff9, 0x0, 0x7, 0x1, @perf_bp={&(0x7f0000000180), 0x4}, 0x200, 0x100000000, 0x4e7c, 0x7, 0x1, 0x5a0, 0x2}, r3, 0xe, r2, 0x0) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7, 0xfff, 0x100000001, 0xfffffffffffffffb, 0x0, 0x8001, 0x0, 0x1, 0x0, 0xfffffffffffffff9, 0x0, 0x9, 0x9, 0x5, 0x8, 0x1, 0x8106, 0x0, 0x14000000000, 0x80000000, 0x1, 0x5, 0x0, 0x40, 0x2839, 0x1d, 0x800, 0x7, 0x8, 0x3, 0x5, 0x7, 0x8, 0x1, 0x3, 0x0, 0x0, 0x758, 0x4, @perf_bp={&(0x7f00000001c0), 0x4}, 0x0, 0x0, 0xff, 0x0, 0x3, 0x8, 0x3}, r5, 0x2, r1, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000300)=0x9, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f00000000c0)='user\x00') socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)) 2018/03/31 05:13:36 executing program 0: socketpair(0x2, 0x3, 0x4000000000000000, &(0x7f0000000100)={0x0, 0x0}) recvmsg(r0, &(0x7f0000000440)={&(0x7f0000000040)=@generic, 0x80, &(0x7f0000000340), 0x0, &(0x7f0000000380)=""/136, 0x88}, 0x0) recvmsg$kcm(r1, &(0x7f00000001c0)={&(0x7f0000000140)=@l2, 0x80, &(0x7f0000000000)=[{&(0x7f0000000480)=""/227, 0xe3}], 0x1, 0x0, 0x0, 0xae7f}, 0x4332856edf213b29) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xf, 0x2, 0x10001, 0x8, 0x1, r0, 0xddc3}, 0x2c) recvmsg$kcm(r0, &(0x7f000000ec80)={&(0x7f000000e900)=@can, 0x10, &(0x7f000000ebc0), 0x0, &(0x7f000000ec40)=""/28, 0x1c}, 0x0) recvmsg$kcm(r1, &(0x7f0000000280)={&(0x7f0000000040)=@alg, 0x58, &(0x7f00000001c0), 0x0, &(0x7f0000000200)=""/106, 0x6a}, 0x0) sendmsg$kcm(r0, &(0x7f0000002780)={0x0, 0x0, &(0x7f0000002400), 0x0, &(0x7f0000002480)}, 0xfffffffffffffffe) 2018/03/31 05:13:36 executing program 7: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xf, 0x27f4, 0x7, 0x3, 0x2, 0xffffffffffffff9c, 0x400}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x1f, 0x10000, 0x20df31c9, 0x2, 0x2, r0, 0x8}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x3, 0x24, 0x100, 0x1, 0xa, 0x1, 0xfffffffffffffffe}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={r2, 0xc, &(0x7f0000000040)}, 0x8) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x4, 0x100000001, 0x4, 0x5, 0x0, r1, 0x4}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00', r3}, 0x10) [ 188.705698] EXT4-fs (sda1): re-mounted. Opts: 2018/03/31 05:13:36 executing program 2: socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000040)={0x7, 0x70, 0x1, 0xaabc, 0x2, 0x2, 0x0, 0xec, 0x4800, 0x1, 0x3a6b72c9, 0xffffffffffff8000, 0xfff, 0x7, 0x2, 0x7, 0xff, 0x1, 0x2, 0x9, 0x1, 0x0, 0x5, 0x75, 0x2, 0x7, 0x8, 0x4, 0x0, 0xdbce, 0xffff, 0xfaf, 0x1, 0xe7, 0xd0eb, 0x28a5, 0x9, 0x4, 0x0, 0x7, 0x2, @perf_config_ext={0x1, 0x8000}, 0x489, 0x6, 0xff, 0x0, 0x9d, 0x8, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f00000000c0)={0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000140)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r2 = getpid() r3 = perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x8, 0x4, 0x4, 0x1, 0x0, 0x401, 0x100, 0x7, 0xcfc0, 0x7, 0x0, 0x7, 0x30, 0x7, 0x7, 0xfff, 0x7, 0x9, 0xff, 0x9, 0xf, 0x0, 0x3, 0x100000000, 0x3, 0x8, 0xffff, 0x2, 0x3, 0xff, 0x6f, 0x3, 0x5, 0x800, 0x81, 0x0, 0x0, 0x9, 0x1, @perf_bp={&(0x7f0000000180), 0x1}, 0x11815, 0x0, 0x1, 0x1, 0x101, 0x5, 0x1e892fee}, r2, 0x9, r1, 0x1) r4 = perf_event_open(&(0x7f0000000280)={0x5, 0x70, 0xe00000000000, 0x9, 0x800, 0x6, 0x0, 0x7ff, 0x10200, 0xb, 0xe3, 0x5, 0x1, 0x4, 0x9b0f, 0x1f8a, 0x401, 0x1, 0xe975, 0x7, 0x437, 0x9, 0x7f, 0x20, 0x1, 0x2, 0x3, 0x5, 0x200, 0x1, 0x8, 0x401, 0x401, 0x2, 0x8, 0xfff, 0xf3c8, 0xf23, 0x0, 0x7fffffff, 0x0, @perf_bp={&(0x7f0000000240), 0x9}, 0x828, 0x3, 0x5, 0x1, 0x0, 0xc37, 0x6}, r2, 0x4, r1, 0x2) r5 = perf_event_open(&(0x7f0000000300)={0x4, 0x70, 0xff, 0x3, 0x7f, 0x7, 0x0, 0x40, 0x4a240, 0x2, 0xffffffffffffcc27, 0xb8, 0x2, 0x7, 0x9, 0x800, 0x3, 0x7d4d, 0xf7, 0xfffffffffffffffa, 0x9, 0x4, 0x3, 0x90be, 0x9, 0xfffffffffffffffc, 0x6, 0x3ff, 0xab6b, 0x8001, 0x5, 0x2, 0x9, 0x732, 0x400, 0x55000000000, 0x1ff, 0x6, 0x0, 0x0, 0x2, @perf_config_ext={0x6, 0xffffffff}, 0x40, 0x80000001, 0x7fff, 0x2, 0x1, 0x6, 0x5}, r2, 0xf, r4, 0xa) r6 = perf_event_open(&(0x7f00000003c0)={0x7, 0x70, 0xc87d, 0x6, 0x5, 0x80000001, 0x0, 0x3, 0x1, 0xb, 0xffffffff, 0x9, 0x584, 0x31b, 0x7, 0x2, 0x3, 0x544, 0x100000001, 0x9, 0x1, 0x100, 0x3, 0x1, 0x7, 0x0, 0x7, 0x5, 0xbb, 0x40, 0x7, 0x8, 0x81, 0xc5a, 0x0, 0x7, 0x1f, 0x815, 0x0, 0xffff, 0x2, @perf_bp={&(0x7f0000000380), 0x8}, 0x4, 0x5, 0xc95, 0x0, 0x7ff, 0x7b02, 0x7}, r2, 0x10, r1, 0xb) ioctl$PERF_EVENT_IOC_DISABLE(r3, 0x2401, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0x4) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = perf_event_open(&(0x7f0000000480)={0x7, 0x70, 0x7, 0xdbff, 0x3, 0x3f, 0x0, 0x8, 0x0, 0xc, 0x8, 0x0, 0xf43, 0x101, 0x6, 0x5, 0x6, 0x9, 0x200, 0xfffffffffffffffd, 0x4, 0x6, 0x6e, 0x20, 0x1b3, 0x1fe, 0x7ff, 0x3, 0x8000, 0x5, 0x0, 0x0, 0x0, 0x5, 0x22d2, 0x401, 0x68, 0xa1ce, 0x0, 0x4, 0x0, @perf_config_ext={0x2fb, 0x4}, 0x2000, 0xd33, 0x6, 0x697c4c7d75b7b6da, 0x171f, 0x9, 0x9}, r2, 0x6, r5, 0x1) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x9, 0x6, 0x101, 0x8, 0x0, 0x200, 0x2000, 0xf, 0x0, 0x5, 0x6, 0x3, 0x2, 0x0, 0x8001, 0x8, 0x3, 0x5, 0x17, 0x7, 0x4, 0x400, 0xffffffff, 0x7, 0x8000, 0x2, 0x100, 0x0, 0x7, 0x95de, 0x2, 0x1, 0x2, 0xd432, 0x3ff, 0x8599, 0x0, 0x3ff, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x10080, 0x7, 0xe7e, 0x7, 0x5, 0x7, 0x9}, r2, 0x0, r3, 0x8) close(r7) ioctl$PERF_EVENT_IOC_DISABLE(r9, 0x2401, 0x1) r10 = gettid() ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f00000005c0)={r0}) ioctl$sock_kcm_SIOCKCMUNATTACH(r11, 0x89e1, &(0x7f0000000600)={r8}) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000640)) r12 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)={0x4, 0x7, 0x7f, 0x9787, 0x1c, 0xffffffffffffffff, 0x5}, 0x2c) recvmsg$kcm(r11, &(0x7f0000009440)={&(0x7f0000009300)=@can={0x0, 0x0}, 0x80, &(0x7f00000093c0)=[{&(0x7f0000009380)=""/16, 0x10}], 0x1, &(0x7f0000009400)=""/18, 0x12, 0x3bc1}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000009480)={0xf, 0x13, &(0x7f00000006c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [@ldst={0x3, 0x2, 0x1, 0x2, 0x7, 0xffffffff, 0x4}, @map={0x18, 0x0, 0x1, 0x0, r12}, @alu={0x7, 0x5, 0xf, 0x6, 0xe, 0x2, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4}, @jmp={0x5, 0x7a4c, 0x0, 0x3, 0x9, 0xffffffff, 0xfffffffffffffff0}, @alu={0x4, 0x20, 0x9, 0x9, 0x5, 0xfffffffe, 0x4}, @jmp={0x5, 0x81, 0x9, 0x7, 0x6, 0xfffffffe, 0xfffffffffffffff0}, @jmp={0x5, 0x3, 0x3, 0x0, 0x2, 0x2, 0xffffffffffffffff}], {0x95}}, &(0x7f0000000780)='GPL\x00', 0x4, 0x77, &(0x7f00000007c0)=""/119, 0x0, 0x1, [], r13}, 0x48) mount(&(0x7f0000009500)='./file0\x00', &(0x7f0000009540)='./file0\x00', &(0x7f0000009580)='cramfs\x00', 0x5020, &(0x7f00000095c0)="22f464f8fef2b95976576e903efe99229584aaf55fa0d91223905d4a68c0c7d18bf26de6fec0660b0c36945200da04f802d9059dd5f6d2f0eca450f4fdd46ed2b411588d802f0d1d02be65816332b2754d686e927593deb8ee3ed17a24d749db81290c33836bcc9b7d93084c53d0744e81deb8b83d9b23565d6db4cb746eb15b20f7b806f0b5a02676d90260a61b00e9ec0b4b8bf07d5f93b3feda8299586c3936f743c764205de278c25a6fff98") perf_event_open(&(0x7f00000096c0)={0x1, 0x70, 0x3, 0xa8e, 0x1000, 0xe57a, 0x0, 0x6, 0x2100b, 0x2, 0x9, 0xdb1b, 0xfffffffffffffffa, 0xa7f8, 0x3, 0x2, 0x800, 0x800, 0x2, 0x0, 0x3f, 0x3, 0x8000000000000, 0x3, 0x20, 0x6, 0x3, 0xfffffffffffff318, 0xffffffffffff0001, 0xfffffffffffffffe, 0x12, 0x1, 0x101, 0x8, 0x100, 0x1, 0x3, 0x8, 0x0, 0x3ff, 0x7, @perf_bp={&(0x7f0000009680), 0x3}, 0x9, 0x6, 0xfffffffffffffff7, 0x0, 0x0, 0x49, 0xfffffffffffff3b8}, r10, 0xe, r5, 0x8) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000009880)={r12, &(0x7f0000009740)="8ba447000764036f17624e623896639a3e2456b901aedcdb4221cea83c3b2c94575967a34ec104bbebeaf6a6b50494e6763f41056d2ca84f906fa48d72590e81334926fab48e", &(0x7f00000097c0)=""/170}, 0x18) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r4, 0x2405, r6) bpf$PROG_LOAD(0x5, &(0x7f00000099c0)={0x7, 0x4, &(0x7f00000098c0)=@raw=[@ldst={0x3, 0x3, 0x6, 0xd, 0x7, 0x26}, @ldst={0x0, 0x2, 0x0, 0xa, 0x0, 0x4, 0xffffffffffffffff}], &(0x7f0000009900)='GPL\x00', 0x5, 0x5d, &(0x7f0000009940)=""/93, 0x41f00, 0x1, [], r13}, 0x48) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000009b40)={r8, &(0x7f0000009a40)="402c0b8b20e0ae84bb", &(0x7f0000009a80)=""/178}, 0x18) [ 188.755700] FAULT_INJECTION: forcing a failure. [ 188.755700] name failslab, interval 1, probability 0, space 0, times 0 [ 188.767100] CPU: 1 PID: 15964 Comm: syz-executor6 Not tainted 4.16.0-rc6+ #42 [ 188.774375] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 188.783725] Call Trace: [ 188.786318] dump_stack+0x194/0x24d [ 188.789960] ? arch_local_irq_restore+0x53/0x53 [ 188.794631] ? __save_stack_trace+0x7e/0xd0 [ 188.798963] should_fail+0x8c0/0xa40 [ 188.802679] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 188.807783] ? kasan_kmalloc+0xad/0xe0 [ 188.811669] ? kmem_cache_alloc_trace+0x136/0x740 [ 188.816511] ? __memcg_init_list_lru_node+0x169/0x270 [ 188.821696] ? __list_lru_init+0x544/0x750 [ 188.825934] ? sget_userns+0x6b1/0xe40 [ 188.829822] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 188.834573] ? do_mount+0xea4/0x2bb0 [ 188.838281] ? SyS_mount+0xab/0x120 [ 188.841905] ? do_syscall_64+0x281/0x940 [ 188.845970] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 188.851332] ? find_held_lock+0x35/0x1d0 [ 188.855395] ? __lock_is_held+0xb6/0x140 [ 188.859461] ? check_same_owner+0x320/0x320 [ 188.863786] ? rcu_note_context_switch+0x710/0x710 [ 188.868720] should_failslab+0xec/0x120 [ 188.872685] kmem_cache_alloc_trace+0x4b/0x740 [ 188.877244] ? __kmalloc_node+0x33/0x70 [ 188.881194] ? __kmalloc_node+0x33/0x70 [ 188.885145] ? rcu_read_lock_sched_held+0x108/0x120 [ 188.890143] __memcg_init_list_lru_node+0x169/0x270 [ 188.895136] ? list_lru_add+0x7c0/0x7c0 [ 188.899085] ? __kmalloc_node+0x47/0x70 [ 188.903037] __list_lru_init+0x544/0x750 [ 188.907076] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 188.912940] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 188.917935] ? lockdep_init_map+0x9/0x10 [ 188.921977] sget_userns+0x6b1/0xe40 [ 188.925666] ? set_anon_super+0x20/0x20 [ 188.929621] ? put_filp+0x90/0x90 [ 188.933050] ? destroy_unused_super.part.6+0xd0/0xd0 [ 188.938128] ? alloc_vfsmnt+0x762/0x9c0 [ 188.942076] ? path_lookupat+0x238/0xba0 [ 188.946114] ? mnt_free_id.isra.21+0x50/0x50 [ 188.950500] ? trace_hardirqs_off+0x10/0x10 [ 188.954796] ? putname+0xee/0x130 [ 188.958228] ? cap_capable+0x1b5/0x230 [ 188.962093] ? security_capable+0x8e/0xc0 [ 188.966220] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 188.971387] ? ns_capable_common+0xcf/0x160 [ 188.975687] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 188.980852] mount_ns+0x6d/0x190 [ 188.984195] rpc_mount+0x9e/0xd0 [ 188.987540] mount_fs+0x66/0x2d0 [ 188.990881] vfs_kern_mount.part.26+0xc6/0x4a0 [ 188.995439] ? may_umount+0xa0/0xa0 [ 188.999041] ? _raw_read_unlock+0x22/0x30 [ 189.003163] ? __get_fs_type+0x8a/0xc0 [ 189.007029] do_mount+0xea4/0x2bb0 [ 189.010544] ? __might_fault+0x110/0x1d0 [ 189.014582] ? copy_mount_string+0x40/0x40 [ 189.018793] ? check_same_owner+0x320/0x320 [ 189.023091] ? __check_object_size+0x8b/0x530 [ 189.027564] ? __might_sleep+0x95/0x190 [ 189.031518] ? kasan_check_write+0x14/0x20 [ 189.035727] ? _copy_from_user+0x99/0x110 [ 189.039851] ? memdup_user+0x5e/0x90 [ 189.043540] ? copy_mount_options+0x1f7/0x2e0 [ 189.048018] SyS_mount+0xab/0x120 [ 189.051445] ? copy_mnt_ns+0xb30/0xb30 [ 189.055309] do_syscall_64+0x281/0x940 [ 189.059171] ? vmalloc_sync_all+0x30/0x30 [ 189.063295] ? _raw_spin_unlock_irq+0x27/0x70 [ 189.067766] ? finish_task_switch+0x1c1/0x7e0 [ 189.072235] ? syscall_return_slowpath+0x550/0x550 [ 189.077137] ? syscall_return_slowpath+0x2ac/0x550 [ 189.082041] ? prepare_exit_to_usermode+0x350/0x350 [ 189.087031] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 189.092371] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 189.097191] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 189.102353] RIP: 0033:0x454e79 2018/03/31 05:13:36 executing program 0: socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000700)={0xffffffffffffffff}) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000200)=@l2={0x1f, 0x8, {0x20, 0x1, 0x6, 0x0, 0x3, 0x9}, 0x1, 0x8000}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000280)="3c89b0082af806d4c90d900af0320c0137f66aec7a6170faeded68dfe1125c0965b971d3666257099555221569977d25306d", 0x32}, {&(0x7f00000002c0)="c4759101d412549a9bdeaee8fd438886f863b4f223c678d01321f17a761ed89112565adab78ded04c7e43386cc2f6760046b3dacc673857449f97661a7cf8553a2fe4638854dd57d014ff8735b1f692d22d87c6b08b08b66ac35de6caf46b539de58295d536a9853880663880a7042c8302fd68252508a026be225a45fb86ecdbe63", 0x82}], 0x2, &(0x7f00000003c0)=[{0x40, 0x84, 0x4, "cb93feb914db082181c381300f1a0ff41a6bafbe3e16ee8d4da6f4a2852ab2073a9dc625df67843a32d8ebd61f"}, {0xa8, 0x118, 0x101, "2afbb014df9e689291d978ff9b60a06001cdaeaa409d7b4ef7a38f54951e6c5aca0125d4f0971e8263bb1819b3be5033d09d170b177f73724e2d4bac5fd3dd68357227acbc6426d7f112a667cb5f9d5ff9bbaa5b519fdcdcf3bc9a41bd54c89ecabecbd069a2fe91f85f7b9bbc933ead5c64a9ce57e5e63565d83a0d459d17fdfd61b7b5ba7a83a183f76bc78abdf93206a242c6e6c26e2f"}, {0xd8, 0x112, 0x5e, "71533a585f18e127cd17b64529cab706bb73dc7a94d5b6edb7b35630120796f5877831a38d1d0b5c16a6410fb1c074a0f30b417b4b594c559e6b55ac594e83348968d06b24f2709da5fe8f526d734ccc952d24e0f7ad93dbb545f894feb5c7ea6d356c25fa41fab68eab8f3191530d7b8de511b1866dca0c4208f5cfca05b171bd28f69effe507951e11429534f8658254edeefb5d06ef25ae7cb6d8b2a3569ff9533ff0b12e1b45edfc660eafbfb5910aa9b64d4d9cfe6a09f06a095771bd9d8d1483db668cfb"}, {0x108, 0x109, 0xef1, "fce5dadd0cb6802b163c45bb2b614a9fa6393e9d644e326c1f13ca4f33dfaaf1e406bbe1598b920b86a13d2075cfbfb2b88fe41756935ef679d90be963cdb07738a9f37e27f26dd217cf7feaeff9a9a9fc36bb59f4601da4977be0effddad8721271ae5a5cdfc65d873d76f0ec7f9c9bb4866e2e1bd75d5de5b5306968d480b2d92b4ef6ce5ce2bc06c7d5d3f9b52f503a75c40a8cc74ae589b733cc93d9ccdd680eb91a21642297a70bdeaac8f23e7c1a6b84211e1117508d87e180d838eab86b94c5d335ffd0e3daed08087f9ff535facc14041600f10b8a8e2cbf496d85bf9d75fbc8e1acff39ab70c970a81248de2614fe06"}, {0x20, 0x112, 0xbb14, "1b4f7db1b3ece9d855"}], 0x2e8, 0x40004}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x10, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="85000000000000000700000000000000950000000000b300"], &(0x7f0000000000)='GPL\x00', 0x7ff, 0x99, &(0x7f00000000c0)=""/153}, 0x48) 2018/03/31 05:13:36 executing program 2: socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000040)={0x7, 0x70, 0x1, 0xaabc, 0x2, 0x2, 0x0, 0xec, 0x4800, 0x1, 0x3a6b72c9, 0xffffffffffff8000, 0xfff, 0x7, 0x2, 0x7, 0xff, 0x1, 0x2, 0x9, 0x1, 0x0, 0x5, 0x75, 0x2, 0x7, 0x8, 0x4, 0x0, 0xdbce, 0xffff, 0xfaf, 0x1, 0xe7, 0xd0eb, 0x28a5, 0x9, 0x4, 0x0, 0x7, 0x2, @perf_config_ext={0x1, 0x8000}, 0x489, 0x6, 0xff, 0x0, 0x9d, 0x8, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f00000000c0)={0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000140)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r2 = getpid() r3 = perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x8, 0x4, 0x4, 0x1, 0x0, 0x401, 0x100, 0x7, 0xcfc0, 0x7, 0x0, 0x7, 0x30, 0x7, 0x7, 0xfff, 0x7, 0x9, 0xff, 0x9, 0xf, 0x0, 0x3, 0x100000000, 0x3, 0x8, 0xffff, 0x2, 0x3, 0xff, 0x6f, 0x3, 0x5, 0x800, 0x81, 0x0, 0x0, 0x9, 0x1, @perf_bp={&(0x7f0000000180), 0x1}, 0x11815, 0x0, 0x1, 0x1, 0x101, 0x5, 0x1e892fee}, r2, 0x9, r1, 0x1) r4 = perf_event_open(&(0x7f0000000280)={0x5, 0x70, 0xe00000000000, 0x9, 0x800, 0x6, 0x0, 0x7ff, 0x10200, 0xb, 0xe3, 0x5, 0x1, 0x4, 0x9b0f, 0x1f8a, 0x401, 0x1, 0xe975, 0x7, 0x437, 0x9, 0x7f, 0x20, 0x1, 0x2, 0x3, 0x5, 0x200, 0x1, 0x8, 0x401, 0x401, 0x2, 0x8, 0xfff, 0xf3c8, 0xf23, 0x0, 0x7fffffff, 0x0, @perf_bp={&(0x7f0000000240), 0x9}, 0x828, 0x3, 0x5, 0x1, 0x0, 0xc37, 0x6}, r2, 0x4, r1, 0x2) r5 = perf_event_open(&(0x7f0000000300)={0x4, 0x70, 0xff, 0x3, 0x7f, 0x7, 0x0, 0x40, 0x4a240, 0x2, 0xffffffffffffcc27, 0xb8, 0x2, 0x7, 0x9, 0x800, 0x3, 0x7d4d, 0xf7, 0xfffffffffffffffa, 0x9, 0x4, 0x3, 0x90be, 0x9, 0xfffffffffffffffc, 0x6, 0x3ff, 0xab6b, 0x8001, 0x5, 0x2, 0x9, 0x732, 0x400, 0x55000000000, 0x1ff, 0x6, 0x0, 0x0, 0x2, @perf_config_ext={0x6, 0xffffffff}, 0x40, 0x80000001, 0x7fff, 0x2, 0x1, 0x6, 0x5}, r2, 0xf, r4, 0xa) r6 = perf_event_open(&(0x7f00000003c0)={0x7, 0x70, 0xc87d, 0x6, 0x5, 0x80000001, 0x0, 0x3, 0x1, 0xb, 0xffffffff, 0x9, 0x584, 0x31b, 0x7, 0x2, 0x3, 0x544, 0x100000001, 0x9, 0x1, 0x100, 0x3, 0x1, 0x7, 0x0, 0x7, 0x5, 0xbb, 0x40, 0x7, 0x8, 0x81, 0xc5a, 0x0, 0x7, 0x1f, 0x815, 0x0, 0xffff, 0x2, @perf_bp={&(0x7f0000000380), 0x8}, 0x4, 0x5, 0xc95, 0x0, 0x7ff, 0x7b02, 0x7}, r2, 0x10, r1, 0xb) ioctl$PERF_EVENT_IOC_DISABLE(r3, 0x2401, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0x4) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = perf_event_open(&(0x7f0000000480)={0x7, 0x70, 0x7, 0xdbff, 0x3, 0x3f, 0x0, 0x8, 0x0, 0xc, 0x8, 0x0, 0xf43, 0x101, 0x6, 0x5, 0x6, 0x9, 0x200, 0xfffffffffffffffd, 0x4, 0x6, 0x6e, 0x20, 0x1b3, 0x1fe, 0x7ff, 0x3, 0x8000, 0x5, 0x0, 0x0, 0x0, 0x5, 0x22d2, 0x401, 0x68, 0xa1ce, 0x0, 0x4, 0x0, @perf_config_ext={0x2fb, 0x4}, 0x2000, 0xd33, 0x6, 0x697c4c7d75b7b6da, 0x171f, 0x9, 0x9}, r2, 0x6, r5, 0x1) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x9, 0x6, 0x101, 0x8, 0x0, 0x200, 0x2000, 0xf, 0x0, 0x5, 0x6, 0x3, 0x2, 0x0, 0x8001, 0x8, 0x3, 0x5, 0x17, 0x7, 0x4, 0x400, 0xffffffff, 0x7, 0x8000, 0x2, 0x100, 0x0, 0x7, 0x95de, 0x2, 0x1, 0x2, 0xd432, 0x3ff, 0x8599, 0x0, 0x3ff, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x10080, 0x7, 0xe7e, 0x7, 0x5, 0x7, 0x9}, r2, 0x0, r3, 0x8) close(r7) ioctl$PERF_EVENT_IOC_DISABLE(r9, 0x2401, 0x1) r10 = gettid() ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f00000005c0)={r0}) ioctl$sock_kcm_SIOCKCMUNATTACH(r11, 0x89e1, &(0x7f0000000600)={r8}) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000640)) r12 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)={0x4, 0x7, 0x7f, 0x9787, 0x1c, 0xffffffffffffffff, 0x5}, 0x2c) recvmsg$kcm(r11, &(0x7f0000009440)={&(0x7f0000009300)=@can={0x0, 0x0}, 0x80, &(0x7f00000093c0)=[{&(0x7f0000009380)=""/16, 0x10}], 0x1, &(0x7f0000009400)=""/18, 0x12, 0x3bc1}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000009480)={0xf, 0x13, &(0x7f00000006c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [@ldst={0x3, 0x2, 0x1, 0x2, 0x7, 0xffffffff, 0x4}, @map={0x18, 0x0, 0x1, 0x0, r12}, @alu={0x7, 0x5, 0xf, 0x6, 0xe, 0x2, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4}, @jmp={0x5, 0x7a4c, 0x0, 0x3, 0x9, 0xffffffff, 0xfffffffffffffff0}, @alu={0x4, 0x20, 0x9, 0x9, 0x5, 0xfffffffe, 0x4}, @jmp={0x5, 0x81, 0x9, 0x7, 0x6, 0xfffffffe, 0xfffffffffffffff0}, @jmp={0x5, 0x3, 0x3, 0x0, 0x2, 0x2, 0xffffffffffffffff}], {0x95}}, &(0x7f0000000780)='GPL\x00', 0x4, 0x77, &(0x7f00000007c0)=""/119, 0x0, 0x1, [], r13}, 0x48) mount(&(0x7f0000009500)='./file0\x00', &(0x7f0000009540)='./file0\x00', &(0x7f0000009580)='cramfs\x00', 0x5020, &(0x7f00000095c0)="22f464f8fef2b95976576e903efe99229584aaf55fa0d91223905d4a68c0c7d18bf26de6fec0660b0c36945200da04f802d9059dd5f6d2f0eca450f4fdd46ed2b411588d802f0d1d02be65816332b2754d686e927593deb8ee3ed17a24d749db81290c33836bcc9b7d93084c53d0744e81deb8b83d9b23565d6db4cb746eb15b20f7b806f0b5a02676d90260a61b00e9ec0b4b8bf07d5f93b3feda8299586c3936f743c764205de278c25a6fff98") perf_event_open(&(0x7f00000096c0)={0x1, 0x70, 0x3, 0xa8e, 0x1000, 0xe57a, 0x0, 0x6, 0x2100b, 0x2, 0x9, 0xdb1b, 0xfffffffffffffffa, 0xa7f8, 0x3, 0x2, 0x800, 0x800, 0x2, 0x0, 0x3f, 0x3, 0x8000000000000, 0x3, 0x20, 0x6, 0x3, 0xfffffffffffff318, 0xffffffffffff0001, 0xfffffffffffffffe, 0x12, 0x1, 0x101, 0x8, 0x100, 0x1, 0x3, 0x8, 0x0, 0x3ff, 0x7, @perf_bp={&(0x7f0000009680), 0x3}, 0x9, 0x6, 0xfffffffffffffff7, 0x0, 0x0, 0x49, 0xfffffffffffff3b8}, r10, 0xe, r5, 0x8) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000009880)={r12, &(0x7f0000009740)="8ba447000764036f17624e623896639a3e2456b901aedcdb4221cea83c3b2c94575967a34ec104bbebeaf6a6b50494e6763f41056d2ca84f906fa48d72590e81334926fab48e", &(0x7f00000097c0)=""/170}, 0x18) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r4, 0x2405, r6) bpf$PROG_LOAD(0x5, &(0x7f00000099c0)={0x7, 0x4, &(0x7f00000098c0)=@raw=[@ldst={0x3, 0x3, 0x6, 0xd, 0x7, 0x26}, @ldst={0x0, 0x2, 0x0, 0xa, 0x0, 0x4, 0xffffffffffffffff}], &(0x7f0000009900)='GPL\x00', 0x5, 0x5d, &(0x7f0000009940)=""/93, 0x41f00, 0x1, [], r13}, 0x48) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000009b40)={r8, &(0x7f0000009a40)="402c0b8b20e0ae84bb", &(0x7f0000009a80)=""/178}, 0x18) 2018/03/31 05:13:36 executing program 4: mount(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='ncpfs\x00', 0x80802, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x50, &(0x7f0000000700)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780)=r0, 0x4) mount(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='./file0\x00', &(0x7f00000006c0)='btrfs\x00', 0x89402, &(0x7f0000000900)="e196efa3cb748d2a6600968b76295ff919bc3877b18eb8d265a35493fcf34fdc965cd5c837d2389c6e2ec6088abe8daaa8ca23f9298fc94dc26874bc4d4567afea1ca0879cdf21e915005a83e96b1002af29091d2176abbb7fec088a67f2e1390f32adaf2f252d24510870f8df7186936f4d88957eb8fcda78b7383a7d24db701d524557ee7324433e70d9ffa185098325f9e657d3c29cf6a35843cb96780269db1c735d55938af5c60e1e4ba25928697277b0fdf356b62399b4c8826d09bfca7d6078c19b4995195ea814b1bb40c06210ec") ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0xffffffff) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6f3, 0x0, 0x6, 0x0, 0x0, 0xfffdffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x22, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000f6bffb)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000400)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000540)={r1, 0x50}, 0xfffffe74) close(r1) perf_event_open(&(0x7f0000348f88)={0x2, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x28, 0x2, 0x0, &(0x7f0000000000)={0x0}) mkdir(&(0x7f0000000100)='./file0\x00', 0x1000000000) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='selinuxfs\x00', 0x1000, &(0x7f0000000100)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='minix\x00', 0x10020, &(0x7f0000000240)) 2018/03/31 05:13:36 executing program 1: socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000000)={0x0, 0x0}) sendmsg(r1, &(0x7f0000000cc0)={0x0, 0x0, &(0x7f0000000940)=[{&(0x7f00000007c0)="ca4573abcf2079e0824362e17b8e4c08d48d13f3cd3d95e78c2b1c48bca7576db4209ea51b228d7caff935680b7c7b73ae6d8990f56bece389a29236c3859325de6a59edeb9b9a", 0x47}], 0x1, &(0x7f0000000980)}, 0x20000000) recvmsg(r0, &(0x7f0000000040)={&(0x7f0000006980)=ANY=[@ANYRES32=0x0], 0x1, &(0x7f0000006d00)=[{&(0x7f0000006c40)=""/181, 0xb5}], 0x1, &(0x7f0000006d40)=""/65, 0x41}, 0x0) sendmsg(r1, &(0x7f0000001900)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)='v', 0x1}], 0x1, &(0x7f0000000440)=ANY=[]}, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000780)={0xffffffffffffffff, &(0x7f0000000480)="9b7815cd421eecc37df9250ab7496936ab4c75599ff96ba0", &(0x7f00000006c0)=""/139}, 0x18) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0/file0\x00', &(0x7f0000000240)='a\x00', 0x2005800, &(0x7f0000000100)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000811ffa)='bdev\x00', 0x100000, &(0x7f0000444000)) mount(&(0x7f0000000300)='./file0/file0\x00', &(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000280)='hfs\x00', 0x1001, 0x0) socketpair(0x4000000000a, 0xf, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xa, 0x7, 0x40, 0x4, 0x0, r4, 0xab2}, 0x2c) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000300)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_REFRESH(r4, 0x2402, 0x200) r6 = gettid() r7 = perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x7, 0x8000, 0xffffffffffffffff, 0x1, 0x0, 0x3e8, 0x40000, 0x4, 0x100000001, 0x0, 0x4, 0x401, 0x4, 0x7, 0x4, 0xc892, 0x10000, 0x20, 0x4, 0x2, 0x4, 0x8, 0x7b, 0x7ff, 0x8, 0x20, 0x8, 0x2, 0xbf01, 0x40, 0x0, 0x7fffffff, 0x1000200, 0x6, 0x4f4f, 0x5, 0x0, 0xfff, 0x6, @perf_config_ext={0x7, 0x28a4}, 0x800, 0x7fffffff, 0xffffffffffffff85, 0x5, 0x0, 0x0, 0x5}, r6, 0xe, r5, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x2400, 0x0) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair(0x1f, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r10 = gettid() perf_event_open(&(0x7f0000000240)={0x3, 0x70, 0x10000, 0x2, 0x401, 0xbf, 0x0, 0x8, 0x8040, 0x8, 0x4, 0x4, 0x358, 0xe1f, 0x4, 0x90, 0x0, 0x2, 0x9, 0x81, 0x10000, 0x4, 0x136, 0x3ff, 0x168, 0x3, 0x7, 0x9, 0x100, 0x100000001, 0x5, 0x218, 0x5, 0x6, 0x0, 0x5, 0x800, 0x1ff, 0x0, 0x1, 0x1, @perf_bp={&(0x7f0000000000), 0x2}, 0x400, 0x757, 0x2, 0x2, 0x3ff, 0x2, 0x800}, r10, 0xb, r3, 0x1) perf_event_open(&(0x7f0000000480)={0x5, 0x70, 0x100000000, 0xffffffff, 0x7, 0x9, 0x0, 0xfff, 0x20000, 0x5, 0x4, 0x0, 0x15d69fa4, 0xe92, 0x1, 0x3, 0x97d0, 0x2, 0x4, 0x10001, 0xad02, 0xba5, 0x2, 0x80000001, 0x3ff, 0x5, 0x7, 0x7, 0x9, 0x2bd, 0x3, 0x7, 0x8, 0x1f, 0xfffffffffffffc01, 0x2, 0xd, 0x6, 0x0, 0xb30, 0x2, @perf_bp={&(0x7f00000001c0), 0x6}, 0x2000, 0x7fff, 0x70000000, 0x3, 0x3ff, 0x1000, 0x8}, r10, 0x8, r7, 0x8) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000dc0)={r9, &(0x7f0000001940)="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", &(0x7f0000000d00)=""/169}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000001400)=@raw=[@generic], &(0x7f0000000180)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103, 0x0, 0x0, [], r2}, 0x48) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000a80)={r3, &(0x7f0000000980)="29e5bd7b30c117e93bb2bcd6b5852a2e5e142b00ae8f06a0974beb572ce9d87f9c926b3a37c158326a0697ec22b3014f15017f9bac55a72f5745a84882cd954aed99de68fef59d3db50ddeac867800748348ef7a35", &(0x7f0000000a00)=""/96}, 0x18) socketpair$ax25(0x3, 0x0, 0xcc, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ID(r4, 0x80082407, &(0x7f0000000380)) recvmsg(r11, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000140)=""/29, 0x1d}, {&(0x7f00000004c0)=""/232, 0xe8}, {&(0x7f00000005c0)=""/206, 0xce}, {&(0x7f0000000840)=""/195, 0xc3}], 0x4, &(0x7f0000000bc0)=""/205, 0xcd, 0x1000}, 0x20) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000001340)) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000e00)) recvmsg(r8, &(0x7f0000001300)={&(0x7f0000000ac0)=@nfc_llcp, 0x80, &(0x7f0000001200)=[{&(0x7f0000000e40)=""/207, 0xcf}, {&(0x7f0000000b40)=""/103, 0x67}, {&(0x7f0000000f40)=""/242, 0xf2}, {&(0x7f0000001040)=""/246, 0xf6}, {&(0x7f0000002940)=""/4096, 0x1000}, {&(0x7f0000001140)=""/143, 0x8f}], 0x6, &(0x7f0000001280)=""/95, 0x5f, 0x40000000000}, 0x100) [ 189.105517] RSP: 002b:00007fc28ac9cc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 189.113200] RAX: ffffffffffffffda RBX: 00007fc28ac9d6d4 RCX: 0000000000454e79 [ 189.120443] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 189.127689] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 189.134933] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000016 [ 189.142178] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000030 2018/03/31 05:13:36 executing program 7: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f00000000c0)='./file0\x00'}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000b40)={r3, 0x0, 0xc3, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c", &(0x7f0000000340)=""/90, 0x2, 0x932a}, 0x28) recvmsg(r2, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100)=r3, 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b53596090ebcc07d8584f358be88fafe") recvmsg(r4, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7}, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000c80)={&(0x7f0000000b80)='./file0/bus\x00', r0}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000a80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r5}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x10, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800), 0x0, 0x20000080}, 0x40) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000cc0)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001d80)) mkdir(&(0x7f0000001dc0)='./file0\x00', 0x50) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r6, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r6, &(0x7f0000000040)}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000dec000)={0x6, 0x4, 0x338d, 0x7}, 0x2c) [ 189.252113] EXT4-fs (sda1): re-mounted. Opts: 2018/03/31 05:13:36 executing program 0: mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='aufs\x00', 0x40, &(0x7f00000000c0)="6c1f3229b544a9748b615fa9d6b345af1265a0ca36c09ed6d0d52f0f82374300f70c5d1b054e319a69817b5c697e3938185511cd00ca045db25bafa5876828106a4bd86654ac2683a4c134989301f865ac1385ad740c8349b074490407282d7761bcd9527c7f3eabfd3667eae9c525605c3116e30b48feeaeb433d97c97009ef76ca6a65d3c2114a50445cdd28093ac462886d432fa682352d5f97a3c9d58259fdaa") mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/03/31 05:13:36 executing program 7: socketpair(0x0, 0x0, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r0, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0xfffffffffffffd9b) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={r1, 0x38d, 0x10}, 0xc) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f00000004c0)) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x32, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=@framed={{0x18}, [], {0x95}}, &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00'}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000300)='&usermd5sumem0\x00') ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000500)=ANY=[@ANYBLOB="02000209007f000406cdefddffffffffffffbf2cdcc3ced4ff200000d01e9a8d2ec7746f4faea557aac1caf8baf084ad5a75b4114a13126550b083e26cf024f896dcb2a8"]) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000380)={&(0x7f0000000340)='./file0\x00', r0}, 0x10) 2018/03/31 05:13:36 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x4, 0x0, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x1e, 0x0, 0x3, 0x6, 0x1, r0, 0x6773}, 0x2c) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1, 0x2, 0x7, 0x8001, 0x10, 0xffffffffffffffff, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000580)={0xffffffffffffffff, &(0x7f00000004c0)="a3261c57", &(0x7f0000000500)="cd8249bf39d6176ef7346799ac199e6cf9e7fe02418812a394d9c874384d4ba7bd9d3b261f1a018d54c20e688a5dc8a23babc41d618eab351795754d5fa3ad297aec7e01f2990b", 0x2}, 0x20) sendmsg(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080), 0x1e}], 0x1000000000000020}, 0x8000) sendmsg(r1, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000340)="654e8525c3d8a3a269fffab981c018ecd1ed1d41250e8cefbd5ee4bae370ceb76f18994299803c8f3c007db0b506d27a8d38bfd14b9dbdb9ab629de7de0672b365dce9cc2ecdff6971cd9b53ca275ecf9b426cade30df9ed069f246ad81f0fb4cef7a4d8504b908dddbad5235664fb43456c105d465f9e08de48116686d69255a3fb4d9f00907b0d2bb8743018c8568cdd1a098362e9db2beb107321a56d3b31b84590e0ea80d52698", 0xa9}], 0x1, 0x0, 0x0, 0x80}, 0x20000000) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000780)={r0, &(0x7f0000000680), &(0x7f00000006c0)=""/166}, 0x18) mkdir(&(0x7f0000000300)='./file0\x00', 0x60) r2 = perf_event_open(&(0x7f0000000200)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000000), 0x8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f00000000c0)='./file0\x00', 0x0, 0x10}, 0x10) close(r2) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000003700)={&(0x7f0000000280)=@pppoe={0x0, 0x0, {0x0, @broadcast}}, 0x80, &(0x7f00000036c0)=[{&(0x7f0000003400)=""/251, 0xfb}, {&(0x7f0000003500)=""/14, 0xe}, {&(0x7f0000003540)=""/107, 0x6b}, {&(0x7f00000035c0)=""/211, 0xd3}], 0x4, 0x0, 0x0, 0x3ff}, 0x1) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f00000008c0)={0xffffffffffffffff}) recvmsg$kcm(r3, &(0x7f0000000a40)={&(0x7f0000000a80)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x3c1, &(0x7f0000000a00)=[{&(0x7f0000000980)=""/101, 0x65}], 0x1, 0x0, 0x0, 0x1}, 0x10001) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000180)) socket$kcm(0x29, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000dec000)={0x6, 0x4, 0x338d, 0x7}, 0x2c) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f00000001c0)) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000c88000)={r4, &(0x7f0000847f95), &(0x7f000089b000)}, 0x18) socketpair(0x10, 0x5, 0x3f, &(0x7f0000000840)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x89e1, &(0x7f0000000880)) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000800)) 2018/03/31 05:13:36 executing program 2: socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000040)={0x7, 0x70, 0x1, 0xaabc, 0x2, 0x2, 0x0, 0xec, 0x4800, 0x1, 0x3a6b72c9, 0xffffffffffff8000, 0xfff, 0x7, 0x2, 0x7, 0xff, 0x1, 0x2, 0x9, 0x1, 0x0, 0x5, 0x75, 0x2, 0x7, 0x8, 0x4, 0x0, 0xdbce, 0xffff, 0xfaf, 0x1, 0xe7, 0xd0eb, 0x28a5, 0x9, 0x4, 0x0, 0x7, 0x2, @perf_config_ext={0x1, 0x8000}, 0x489, 0x6, 0xff, 0x0, 0x9d, 0x8, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f00000000c0)={0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000140)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r2 = getpid() r3 = perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x8, 0x4, 0x4, 0x1, 0x0, 0x401, 0x100, 0x7, 0xcfc0, 0x7, 0x0, 0x7, 0x30, 0x7, 0x7, 0xfff, 0x7, 0x9, 0xff, 0x9, 0xf, 0x0, 0x3, 0x100000000, 0x3, 0x8, 0xffff, 0x2, 0x3, 0xff, 0x6f, 0x3, 0x5, 0x800, 0x81, 0x0, 0x0, 0x9, 0x1, @perf_bp={&(0x7f0000000180), 0x1}, 0x11815, 0x0, 0x1, 0x1, 0x101, 0x5, 0x1e892fee}, r2, 0x9, r1, 0x1) r4 = perf_event_open(&(0x7f0000000280)={0x5, 0x70, 0xe00000000000, 0x9, 0x800, 0x6, 0x0, 0x7ff, 0x10200, 0xb, 0xe3, 0x5, 0x1, 0x4, 0x9b0f, 0x1f8a, 0x401, 0x1, 0xe975, 0x7, 0x437, 0x9, 0x7f, 0x20, 0x1, 0x2, 0x3, 0x5, 0x200, 0x1, 0x8, 0x401, 0x401, 0x2, 0x8, 0xfff, 0xf3c8, 0xf23, 0x0, 0x7fffffff, 0x0, @perf_bp={&(0x7f0000000240), 0x9}, 0x828, 0x3, 0x5, 0x1, 0x0, 0xc37, 0x6}, r2, 0x4, r1, 0x2) r5 = perf_event_open(&(0x7f0000000300)={0x4, 0x70, 0xff, 0x3, 0x7f, 0x7, 0x0, 0x40, 0x4a240, 0x2, 0xffffffffffffcc27, 0xb8, 0x2, 0x7, 0x9, 0x800, 0x3, 0x7d4d, 0xf7, 0xfffffffffffffffa, 0x9, 0x4, 0x3, 0x90be, 0x9, 0xfffffffffffffffc, 0x6, 0x3ff, 0xab6b, 0x8001, 0x5, 0x2, 0x9, 0x732, 0x400, 0x55000000000, 0x1ff, 0x6, 0x0, 0x0, 0x2, @perf_config_ext={0x6, 0xffffffff}, 0x40, 0x80000001, 0x7fff, 0x2, 0x1, 0x6, 0x5}, r2, 0xf, r4, 0xa) r6 = perf_event_open(&(0x7f00000003c0)={0x7, 0x70, 0xc87d, 0x6, 0x5, 0x80000001, 0x0, 0x3, 0x1, 0xb, 0xffffffff, 0x9, 0x584, 0x31b, 0x7, 0x2, 0x3, 0x544, 0x100000001, 0x9, 0x1, 0x100, 0x3, 0x1, 0x7, 0x0, 0x7, 0x5, 0xbb, 0x40, 0x7, 0x8, 0x81, 0xc5a, 0x0, 0x7, 0x1f, 0x815, 0x0, 0xffff, 0x2, @perf_bp={&(0x7f0000000380), 0x8}, 0x4, 0x5, 0xc95, 0x0, 0x7ff, 0x7b02, 0x7}, r2, 0x10, r1, 0xb) ioctl$PERF_EVENT_IOC_DISABLE(r3, 0x2401, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0x4) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = perf_event_open(&(0x7f0000000480)={0x7, 0x70, 0x7, 0xdbff, 0x3, 0x3f, 0x0, 0x8, 0x0, 0xc, 0x8, 0x0, 0xf43, 0x101, 0x6, 0x5, 0x6, 0x9, 0x200, 0xfffffffffffffffd, 0x4, 0x6, 0x6e, 0x20, 0x1b3, 0x1fe, 0x7ff, 0x3, 0x8000, 0x5, 0x0, 0x0, 0x0, 0x5, 0x22d2, 0x401, 0x68, 0xa1ce, 0x0, 0x4, 0x0, @perf_config_ext={0x2fb, 0x4}, 0x2000, 0xd33, 0x6, 0x697c4c7d75b7b6da, 0x171f, 0x9, 0x9}, r2, 0x6, r5, 0x1) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x9, 0x6, 0x101, 0x8, 0x0, 0x200, 0x2000, 0xf, 0x0, 0x5, 0x6, 0x3, 0x2, 0x0, 0x8001, 0x8, 0x3, 0x5, 0x17, 0x7, 0x4, 0x400, 0xffffffff, 0x7, 0x8000, 0x2, 0x100, 0x0, 0x7, 0x95de, 0x2, 0x1, 0x2, 0xd432, 0x3ff, 0x8599, 0x0, 0x3ff, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x10080, 0x7, 0xe7e, 0x7, 0x5, 0x7, 0x9}, r2, 0x0, r3, 0x8) close(r7) ioctl$PERF_EVENT_IOC_DISABLE(r9, 0x2401, 0x1) r10 = gettid() ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f00000005c0)={r0}) ioctl$sock_kcm_SIOCKCMUNATTACH(r11, 0x89e1, &(0x7f0000000600)={r8}) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000640)) r12 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)={0x4, 0x7, 0x7f, 0x9787, 0x1c, 0xffffffffffffffff, 0x5}, 0x2c) recvmsg$kcm(r11, &(0x7f0000009440)={&(0x7f0000009300)=@can={0x0, 0x0}, 0x80, &(0x7f00000093c0)=[{&(0x7f0000009380)=""/16, 0x10}], 0x1, &(0x7f0000009400)=""/18, 0x12, 0x3bc1}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000009480)={0xf, 0x13, &(0x7f00000006c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [@ldst={0x3, 0x2, 0x1, 0x2, 0x7, 0xffffffff, 0x4}, @map={0x18, 0x0, 0x1, 0x0, r12}, @alu={0x7, 0x5, 0xf, 0x6, 0xe, 0x2, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4}, @jmp={0x5, 0x7a4c, 0x0, 0x3, 0x9, 0xffffffff, 0xfffffffffffffff0}, @alu={0x4, 0x20, 0x9, 0x9, 0x5, 0xfffffffe, 0x4}, @jmp={0x5, 0x81, 0x9, 0x7, 0x6, 0xfffffffe, 0xfffffffffffffff0}, @jmp={0x5, 0x3, 0x3, 0x0, 0x2, 0x2, 0xffffffffffffffff}], {0x95}}, &(0x7f0000000780)='GPL\x00', 0x4, 0x77, &(0x7f00000007c0)=""/119, 0x0, 0x1, [], r13}, 0x48) mount(&(0x7f0000009500)='./file0\x00', &(0x7f0000009540)='./file0\x00', &(0x7f0000009580)='cramfs\x00', 0x5020, &(0x7f00000095c0)="22f464f8fef2b95976576e903efe99229584aaf55fa0d91223905d4a68c0c7d18bf26de6fec0660b0c36945200da04f802d9059dd5f6d2f0eca450f4fdd46ed2b411588d802f0d1d02be65816332b2754d686e927593deb8ee3ed17a24d749db81290c33836bcc9b7d93084c53d0744e81deb8b83d9b23565d6db4cb746eb15b20f7b806f0b5a02676d90260a61b00e9ec0b4b8bf07d5f93b3feda8299586c3936f743c764205de278c25a6fff98") perf_event_open(&(0x7f00000096c0)={0x1, 0x70, 0x3, 0xa8e, 0x1000, 0xe57a, 0x0, 0x6, 0x2100b, 0x2, 0x9, 0xdb1b, 0xfffffffffffffffa, 0xa7f8, 0x3, 0x2, 0x800, 0x800, 0x2, 0x0, 0x3f, 0x3, 0x8000000000000, 0x3, 0x20, 0x6, 0x3, 0xfffffffffffff318, 0xffffffffffff0001, 0xfffffffffffffffe, 0x12, 0x1, 0x101, 0x8, 0x100, 0x1, 0x3, 0x8, 0x0, 0x3ff, 0x7, @perf_bp={&(0x7f0000009680), 0x3}, 0x9, 0x6, 0xfffffffffffffff7, 0x0, 0x0, 0x49, 0xfffffffffffff3b8}, r10, 0xe, r5, 0x8) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000009880)={r12, &(0x7f0000009740)="8ba447000764036f17624e623896639a3e2456b901aedcdb4221cea83c3b2c94575967a34ec104bbebeaf6a6b50494e6763f41056d2ca84f906fa48d72590e81334926fab48e", &(0x7f00000097c0)=""/170}, 0x18) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r4, 0x2405, r6) bpf$PROG_LOAD(0x5, &(0x7f00000099c0)={0x7, 0x4, &(0x7f00000098c0)=@raw=[@ldst={0x3, 0x3, 0x6, 0xd, 0x7, 0x26}, @ldst={0x0, 0x2, 0x0, 0xa, 0x0, 0x4, 0xffffffffffffffff}], &(0x7f0000009900)='GPL\x00', 0x5, 0x5d, &(0x7f0000009940)=""/93, 0x41f00, 0x1, [], r13}, 0x48) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000009b40)={r8, &(0x7f0000009a40)="402c0b8b20e0ae84bb", &(0x7f0000009a80)=""/178}, 0x18) 2018/03/31 05:13:36 executing program 6 (fault-call:17 fault-nth:49): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x0, 0x101, 0x4, 0x0, 0x1, r0, 0x0, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r2 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)={0xffffffffffffffff}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r2, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x0, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0", 0xc9}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000280)={&(0x7f0000000680)='./file0\x00'}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r1}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r3) gettid() close(0xffffffffffffffff) 2018/03/31 05:13:36 executing program 4: mount(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='ncpfs\x00', 0x80802, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x50, &(0x7f0000000700)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780)=r0, 0x4) mount(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='./file0\x00', &(0x7f00000006c0)='btrfs\x00', 0x89402, &(0x7f0000000900)="e196efa3cb748d2a6600968b76295ff919bc3877b18eb8d265a35493fcf34fdc965cd5c837d2389c6e2ec6088abe8daaa8ca23f9298fc94dc26874bc4d4567afea1ca0879cdf21e915005a83e96b1002af29091d2176abbb7fec088a67f2e1390f32adaf2f252d24510870f8df7186936f4d88957eb8fcda78b7383a7d24db701d524557ee7324433e70d9ffa185098325f9e657d3c29cf6a35843cb96780269db1c735d55938af5c60e1e4ba25928697277b0fdf356b62399b4c8826d09bfca7d6078c19b4995195ea814b1bb40c06210ec") ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0xffffffff) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6f3, 0x0, 0x6, 0x0, 0x0, 0xfffdffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x22, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000f6bffb)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000400)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000540)={r1, 0x50}, 0xfffffe74) close(r1) perf_event_open(&(0x7f0000348f88)={0x2, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x28, 0x2, 0x0, &(0x7f0000000000)={0x0}) mkdir(&(0x7f0000000100)='./file0\x00', 0x1000000000) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='selinuxfs\x00', 0x1000, &(0x7f0000000100)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='minix\x00', 0x10020, &(0x7f0000000240)) 2018/03/31 05:13:36 executing program 5: socketpair(0x8, 0x2, 0x0, &(0x7f0000001d40)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001bc0)={0x3, 0x70, 0x6, 0x22, 0x2, 0xf5, 0x0, 0x1, 0x20008, 0x4, 0x9, 0x9, 0x1, 0x6, 0x401, 0x0, 0x51, 0x0, 0x5, 0x1, 0x7, 0x6, 0x10001, 0x1000, 0x100, 0x7fff, 0x0, 0x3ff, 0x0, 0xd643, 0xffffffff, 0xfff, 0xf2f3, 0x9, 0x8d, 0x7, 0x1ff, 0x5, 0x0, 0x7fff, 0x6, @perf_config_ext={0xffffffff00000001, 0x1}, 0x1000, 0x2, 0x5, 0x6, 0x4, 0x80000000, 0xffffffffffffffc4}, 0x0, 0xc, 0xffffffffffffffff, 0x1) r2 = gettid() r3 = perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x3, 0xc85, 0x3ff, 0x1, 0x0, 0x401, 0x0, 0x1, 0x712000000000000, 0x7, 0x56d29a0f, 0x1, 0x0, 0x2, 0x20, 0x7, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x9, 0x5, 0x1, 0x3e69b47c, 0x5, 0x7fff, 0x1, 0x5, 0x4f, 0x1000, 0x0, 0x4, 0x0, 0x0, 0x4, 0xffffffff, 0x0, 0x2, 0x2, @perf_config_ext={0x0, 0x8}, 0x20200, 0xf88, 0x0, 0x1, 0x92d5, 0x1, 0x5}, r2, 0xd, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000280)=r1, 0x27) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000080)='./file0\x00', r1}, 0xb) perf_event_open(&(0x7f0000001c80)={0x2, 0x70, 0x3ab, 0x3, 0xbf7e, 0xffffffff, 0x0, 0x0, 0x4000, 0x4, 0x2, 0xec, 0x3ff, 0x8, 0xba, 0x973, 0x6, 0x433, 0x6, 0x0, 0x3, 0x5, 0x1, 0x4, 0x7, 0x5, 0x20, 0xa593, 0x4, 0x1000, 0x4722, 0x3, 0x40, 0xdd, 0x20, 0x1, 0x1, 0x6, 0x0, 0x2, 0x0, @perf_config_ext={0x9}, 0x10000, 0xfffffffffffffffb, 0x401, 0x7, 0x3, 0x9, 0x3}, r2, 0xf, r1, 0x8) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00', 0x0, 0x10}, 0x10) perf_event_open(&(0x7f0000000480)={0x1c218abbd1b2c600, 0x70, 0x5, 0x0, 0xe9d, 0x9, 0x0, 0x80000001, 0x1408, 0x0, 0x10001, 0x1ff, 0xfff, 0x80000000, 0x5, 0x3, 0x81, 0x6, 0x9151, 0x40, 0x2, 0xfda, 0x7, 0x3, 0x1, 0x100000000, 0x4, 0x2, 0xffffffffffffe17f, 0x0, 0x1, 0x3, 0x1, 0x6, 0x7, 0x2, 0x3, 0x7fff, 0x0, 0xfffffffffffffffb, 0x1, @perf_bp={&(0x7f0000000440), 0xf}, 0x1000, 0x1000, 0xb36, 0x7, 0x5f9, 0x8a, 0x40}, r2, 0xd, r3, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) recvmsg$kcm(r1, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f0000000980)=""/4096, 0x1000}, {&(0x7f0000001980)=""/59, 0x3b}, {&(0x7f00000019c0)=""/66, 0x42}], 0x3, &(0x7f0000001a80)=""/195, 0xc3, 0x2}, 0x2102) mount(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='udf\x00', 0x1000020, 0x0) mkdir(&(0x7f0000001fc0)='./file0/file0\x00', 0x1) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fusectl\x00', 0x4000, 0x0) mount(&(0x7f0000001d00)='./file1\x00', &(0x7f0000001d80)='./file0\x00', &(0x7f0000001dc0)='affs\x00', 0x800040, &(0x7f0000001e00)="39ef282caa985216c941be0013a569575f8b267468fe262194491b76dc736e1b4eb9e85bd685609c27f529ef08aff500d3910886a523046831d8c1731e93f35a150a5e2d31d2f90a1662699756b8408eb725f6b128416920a8111c2e5eb71e90008543ca6fd6e14006c64b644e6e73865ab19393ac4a2ca4ae2f83c961a534eda4a1b65dda0645296a5c171c92118a7319a700d9d422b0b720501f621e310a4ca0e1197ee66f7553b67ef1ddd0368e128eba449e35cef95b4a03b6a5c42a7e0292bf43e16df2e950d5") socketpair$inet(0x2, 0x3, 0x5, &(0x7f0000000680)) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000400)) r4 = getpid() r5 = perf_event_open(&(0x7f0000000280)={0x7, 0x70, 0x5, 0x0, 0x40, 0x8e, 0x0, 0x101, 0x100, 0xe, 0xff, 0x2, 0x10001, 0x3cf, 0x7, 0x1, 0x6, 0x800, 0x0, 0xffb, 0x400000000000000, 0x7, 0x80000000, 0x20, 0x5, 0x97, 0x1, 0x8, 0x10000, 0x0, 0x8, 0x0, 0x9, 0x5, 0x6, 0x8, 0x100000001, 0x2, 0x0, 0x9, 0x7, @perf_config_ext={0x40, 0x3}, 0x30121, 0x5, 0x71, 0x3, 0x6, 0x8, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x1) perf_event_open(&(0x7f0000000200)={0x5, 0x70, 0x8001, 0x3, 0xdf6f, 0x8, 0x0, 0x7f, 0xc8000, 0x1, 0x7b1866b0, 0x3, 0x4, 0x2, 0x0, 0x40, 0x10000, 0xfffffffffffffffd, 0xff, 0x41, 0x3, 0xed68, 0x8, 0x7, 0x3, 0x4, 0x4, 0x3ff, 0xfffffffffffffffa, 0xfcfd, 0x1, 0x7, 0x7f, 0x101, 0x3, 0x1, 0x400, 0x0, 0x0, 0x2, 0x6, @perf_bp={&(0x7f00000001c0), 0x5}, 0x189, 0x1000, 0x9, 0x2, 0x7, 0x3}, r4, 0xd, r5, 0x0) perf_event_open(&(0x7f0000014f88)={0x1, 0x78, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = perf_event_open(&(0x7f0000014f88)={0x1, 0x78, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x3, &(0x7f0000002000)=ANY=[@ANYBLOB="180000000008000000000000000039000000000000000000"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0xf, 0xe, &(0x7f0000000300)=ANY=[@ANYBLOB="1800000001ff00000000000006000000c94e00001800000000000000000000009500000000000000000000000000000018100000", @ANYBLOB="00000000000000006d7ff4ffccffffff200000000000000085000000119407000000000000000000180000000800000000000000000000009500000010000000"], &(0x7f0000000380)='syzkaller\x00', 0x2, 0x99, &(0x7f00000003c0)=""/153, 0x0, 0x1}, 0x48) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100), 0xfffffc61) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x13, 0x5, 0x0, 0xcc10, 0x4, 0xffffffffffffffff, 0x6}, 0x2c) close(r6) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) 2018/03/31 05:13:36 executing program 1: r0 = getpid() socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000002900)) r1 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x1000400000}, r0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0xc377) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x7, 0x8000, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000140)=0x6) r3 = gettid() mkdir(&(0x7f000075bff8)='./file0\x00', 0x0) socketpair(0x10, 0x800, 0x5, &(0x7f0000001100)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000001340)={0x7, 0x70, 0xfffffffffffffff9, 0x9, 0x5, 0xff, 0x0, 0x7fff, 0x0, 0x1, 0x3, 0x6, 0x457, 0x3, 0x5, 0x3, 0x9, 0xb0, 0x40, 0x1, 0x1dc, 0x2, 0x0, 0x8001, 0x1, 0x0, 0x6, 0x4, 0x0, 0xff, 0x9, 0x7fff, 0x100000000, 0x8, 0x7, 0x6ad, 0xffffffffffffff14, 0x0, 0x0, 0x39, 0x4, @perf_config_ext={0x6, 0x80000000}, 0x400, 0x0, 0xffffffffffffff81, 0x3, 0x2, 0x6, 0xb75}, r3, 0x0, r4, 0x8) r5 = getpid() socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000002900)) r6 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x80}, r5, 0xfffffffffffffffd, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r6, 0x2403, 0xc377) r7 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x40082404, &(0x7f0000000140)=0x6) r8 = gettid() mkdir(&(0x7f000075bff8)='./file0\x00', 0x0) socketpair(0x10, 0x800, 0x5, &(0x7f0000001100)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000001340)={0x7, 0x70, 0xfffffffffffffff9, 0x9, 0x5, 0x2a69, 0x0, 0x7fff, 0x0, 0x1, 0x3, 0x6, 0x457, 0x3, 0x5, 0x3, 0x9, 0xb0, 0x40, 0x1, 0x1dc, 0x2, 0x0, 0x8001, 0x1, 0x10000, 0x6, 0x4, 0x0, 0xff, 0x9, 0x7fff, 0x100000000, 0x8, 0x7, 0x6ad, 0xffffffffffffff14, 0x0, 0x0, 0x39, 0x4, @perf_config_ext={0x6, 0x80000000}, 0x400, 0xe5, 0xffffffffffffff81, 0x3, 0x2, 0x6}, r8, 0x7, r9, 0x8) perf_event_open(&(0x7f000000a000)={0x1, 0x70, 0x1a47947c, 0x0, 0xb140, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x7, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x240000000000, 0x0, 0x81, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x800000, 0x0, @perf_bp={&(0x7f0000000000), 0x800000}, 0x0, 0x20000004, 0x6, 0x400010, 0x100, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000002700)='./file2\x00', 0x3) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)='sysv\x00', 0x0, &(0x7f0000000100)="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") mount(&(0x7f00009f8000)='./file0\x00', &(0x7f0000a3bff8)='./file0\x00', &(0x7f00000026c0)='nfs4\x00', 0x0, &(0x7f000000a000)) socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f0000000180)) perf_event_open(&(0x7f00000001c0)={0x3, 0x70, 0x4594dab1, 0x0, 0xc600000000000000, 0x1, 0x0, 0xd53f, 0x80008, 0x0, 0x0, 0x44d1, 0x3, 0x1, 0x10001, 0x100, 0x40, 0x7, 0x15c000000000000, 0x0, 0x42, 0x7, 0x1, 0x8, 0x1, 0x7, 0x0, 0x81, 0x3, 0x5, 0x4, 0x1, 0x5, 0x7a52, 0xfffffffffffffff8, 0x1, 0x0, 0xffff, 0x0, 0x2, 0x1, @perf_config_ext={0x1ff}, 0x430, 0x401, 0x100000000, 0x1, 0x0, 0x890b, 0x80000000}, r8, 0x5, r7, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000002940)) recvmsg$kcm(r9, &(0x7f0000002600)={0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000013c0)=""/113, 0x71}, {&(0x7f0000001440)=""/4096, 0x1000}, {&(0x7f0000002440)=""/15, 0xf}, {&(0x7f0000002480)=""/227, 0xe3}], 0x4, &(0x7f00000025c0)=""/61, 0x3d, 0x7fffffff}, 0x2001) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000002880)={0xffffffffffffffff, 0x50, &(0x7f0000002800)}, 0x10) 2018/03/31 05:13:36 executing program 0: socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) sendmsg(r0, &(0x7f0000001540)={&(0x7f0000000200)=@sco={0x1f, {0x8, 0x5, 0x8, 0xf2, 0x3ff, 0x4}}, 0x80, &(0x7f0000001500)=[{&(0x7f0000000340)="7d2ecf9d647913726062255f93c4aa60986e3eea792c720d67346b807ea4c942523f5f958a5154386c41878020571ae59d7cf4f772425a1e453bc28122d77f6070ce5c6e3c85d6a97a5b971f813f228f9e218238eb6a88def21e379e24c7d4274f1a042b791fd1f6360876ff08214544730b057a7cea5cb0", 0x78}, {&(0x7f00000003c0)="8de00e214890885d06428f3bf84cd0d5746f240c7aaae55e", 0x18}, {&(0x7f0000001740)="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", 0x1097}, {&(0x7f00000014c0)="f0b6feaf27d59c7962e30d43e63caa79132f7eb491b38d24", 0x18}], 0x4, 0x0, 0x0, 0x50}, 0xc880) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file1\x00', 0x0, 0x18}, 0x10) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='afs\x00', 0x2005800, &(0x7f0000000100)) mkdir(&(0x7f00000001c0)='./file0/file0\x00', 0x0) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f0000811ffa)='bdev\x00', 0x100000, &(0x7f0000000100)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100)={&(0x7f0000000080)='./file1\x00', 0x0, 0x18}, 0xb) recvmsg(r0, &(0x7f0000000840)={&(0x7f00000004c0)=@hci, 0x80, &(0x7f0000000740)=[{&(0x7f0000000540)=""/227, 0xe3}, {&(0x7f0000000640)=""/16, 0x10}, {&(0x7f0000000680)=""/8, 0x8}, {&(0x7f00000006c0)=""/11, 0xb}, {&(0x7f0000000700)=""/42, 0x2a}], 0x5, &(0x7f00000007c0)=""/114, 0x72, 0x2e5}, 0x2000) recvmsg(r0, &(0x7f0000000ac0)={&(0x7f0000000880)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff}}, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000900)=""/47, 0x2f}, {&(0x7f0000002800)=""/4096, 0x1000}, {&(0x7f0000000940)=""/74, 0x4a}, {&(0x7f00000009c0)=""/61, 0x3d}], 0x4, &(0x7f0000000a40)=""/76, 0x4c, 0x8}, 0x60) recvmsg$kcm(r1, &(0x7f0000001140)={&(0x7f0000000b00)=@vsock={0x0, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000001080)=[{&(0x7f0000000b80)=""/46, 0x2e}, {&(0x7f0000000bc0)=""/139, 0x8b}, {&(0x7f0000000c80)=""/248, 0xf8}, {&(0x7f0000000d80)=""/49, 0x31}, {&(0x7f0000000dc0)=""/218, 0xda}, {&(0x7f0000000ec0)=""/146, 0x92}, {&(0x7f0000000f80)=""/43, 0x2b}, {&(0x7f0000000fc0)=""/108, 0x6c}, {&(0x7f0000001040)=""/7, 0x7}], 0x9, 0x0, 0x0, 0x1}, 0x7063c2a11ead5911) mount(&(0x7f0000000480)='./file0\x00', &(0x7f0000000440)='./file1\x00', &(0x7f0000000400)='selinuxfs\x00', 0x20, 0x0) mount(&(0x7f0000000300)='./file0/file0\x00', &(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000280)='hfs\x00', 0x1001, 0x0) mount(&(0x7f0000001680)='./file0\x00', &(0x7f00000016c0)='./file0\x00', &(0x7f0000001700)='ramfs\x00', 0x0, &(0x7f0000001740)) 2018/03/31 05:13:36 executing program 2: socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000040)={0x7, 0x70, 0x1, 0xaabc, 0x2, 0x2, 0x0, 0xec, 0x4800, 0x1, 0x3a6b72c9, 0xffffffffffff8000, 0xfff, 0x7, 0x2, 0x7, 0xff, 0x1, 0x2, 0x9, 0x1, 0x0, 0x5, 0x75, 0x2, 0x7, 0x8, 0x4, 0x0, 0xdbce, 0xffff, 0xfaf, 0x1, 0xe7, 0xd0eb, 0x28a5, 0x9, 0x4, 0x0, 0x7, 0x2, @perf_config_ext={0x1, 0x8000}, 0x489, 0x6, 0xff, 0x0, 0x9d, 0x8, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f00000000c0)={0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000140)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r2 = getpid() r3 = perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x8, 0x4, 0x4, 0x1, 0x0, 0x401, 0x100, 0x7, 0xcfc0, 0x7, 0x0, 0x7, 0x30, 0x7, 0x7, 0xfff, 0x7, 0x9, 0xff, 0x9, 0xf, 0x0, 0x3, 0x100000000, 0x3, 0x8, 0xffff, 0x2, 0x3, 0xff, 0x6f, 0x3, 0x5, 0x800, 0x81, 0x0, 0x0, 0x9, 0x1, @perf_bp={&(0x7f0000000180), 0x1}, 0x11815, 0x9, 0x0, 0x1, 0x101, 0x5, 0x1e892fee}, r2, 0x9, r1, 0x1) r4 = perf_event_open(&(0x7f0000000280)={0x5, 0x70, 0xe00000000000, 0x9, 0x800, 0x6, 0x0, 0x7ff, 0x10200, 0xb, 0xe3, 0x5, 0x1, 0x4, 0x9b0f, 0x1f8a, 0x401, 0x1, 0xe975, 0x7, 0x437, 0x9, 0x7f, 0x20, 0x1, 0x2, 0x3, 0x5, 0x200, 0x1, 0x8, 0x401, 0x401, 0x2, 0x8, 0xfff, 0xf3c8, 0xf23, 0x0, 0x7fffffff, 0x0, @perf_bp={&(0x7f0000000240), 0x9}, 0x828, 0x3, 0x5, 0x1, 0x0, 0xc37, 0x6}, r2, 0x4, r1, 0x2) r5 = perf_event_open(&(0x7f0000000300)={0x4, 0x70, 0xff, 0x3, 0x7f, 0x7, 0x0, 0x40, 0x4a240, 0x2, 0xffffffffffffcc27, 0xb8, 0x2, 0x7, 0x9, 0x800, 0x3, 0x7d4d, 0xf7, 0xfffffffffffffffa, 0x9, 0x4, 0x3, 0x90be, 0x9, 0xfffffffffffffffc, 0x6, 0x3ff, 0xab6b, 0x8001, 0x5, 0x2, 0x9, 0x732, 0x400, 0x55000000000, 0x1ff, 0x6, 0x0, 0x0, 0x2, @perf_config_ext={0x6, 0xffffffff}, 0x40, 0x80000001, 0x7fff, 0x2, 0x1, 0x6, 0x5}, r2, 0xf, r4, 0xa) r6 = perf_event_open(&(0x7f00000003c0)={0x7, 0x70, 0xc87d, 0x6, 0x5, 0x80000001, 0x0, 0x3, 0x1, 0xb, 0xffffffff, 0x9, 0x584, 0x31b, 0x7, 0x2, 0x3, 0x544, 0x100000001, 0x9, 0x1, 0x100, 0x3, 0x1, 0x7, 0x0, 0x7, 0x5, 0xbb, 0x40, 0x7, 0x8, 0x81, 0xc5a, 0x0, 0x7, 0x1f, 0x815, 0x0, 0xffff, 0x2, @perf_bp={&(0x7f0000000380), 0x8}, 0x4, 0x5, 0xc95, 0x0, 0x7ff, 0x7b02, 0x7}, r2, 0x10, r1, 0xb) ioctl$PERF_EVENT_IOC_DISABLE(r3, 0x2401, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0x4) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = perf_event_open(&(0x7f0000000480)={0x7, 0x70, 0x7, 0xdbff, 0x3, 0x3f, 0x0, 0x8, 0x0, 0xc, 0x8, 0x0, 0xf43, 0x101, 0x6, 0x5, 0x6, 0x9, 0x200, 0xfffffffffffffffd, 0x4, 0x6, 0x6e, 0x20, 0x1b3, 0x1fe, 0x7ff, 0x3, 0x8000, 0x5, 0x0, 0x0, 0x0, 0x5, 0x22d2, 0x401, 0x68, 0xa1ce, 0x0, 0x4, 0x0, @perf_config_ext={0x2fb, 0x4}, 0x2000, 0xd33, 0x6, 0x697c4c7d75b7b6da, 0x171f, 0x9, 0x9}, r2, 0x6, r5, 0x1) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x9, 0x6, 0x101, 0x8, 0x0, 0x200, 0x2000, 0xf, 0x0, 0x5, 0x6, 0x3, 0x2, 0x0, 0x8001, 0x8, 0x3, 0x5, 0x17, 0x7, 0x4, 0x400, 0xffffffff, 0x7, 0x8000, 0x2, 0x100, 0x0, 0x7, 0x95de, 0x2, 0x1, 0x2, 0xd432, 0x3ff, 0x8599, 0x0, 0x3ff, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x10080, 0x7, 0xe7e, 0x7, 0x5, 0x7, 0x9}, r2, 0x0, r3, 0x8) close(r7) ioctl$PERF_EVENT_IOC_DISABLE(r9, 0x2401, 0x1) r10 = gettid() ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f00000005c0)={r0}) ioctl$sock_kcm_SIOCKCMUNATTACH(r11, 0x89e1, &(0x7f0000000600)={r8}) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000640)) r12 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)={0x4, 0x7, 0x7f, 0x9787, 0x1c, 0xffffffffffffffff, 0x5}, 0x2c) recvmsg$kcm(r11, &(0x7f0000009440)={&(0x7f0000009300)=@can={0x0, 0x0}, 0x80, &(0x7f00000093c0)=[{&(0x7f0000009380)=""/16, 0x10}], 0x1, &(0x7f0000009400)=""/18, 0x12, 0x3bc1}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000009480)={0xf, 0x13, &(0x7f00000006c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [@ldst={0x3, 0x2, 0x1, 0x2, 0x7, 0xffffffff, 0x4}, @map={0x18, 0x0, 0x1, 0x0, r12}, @alu={0x7, 0x5, 0xf, 0x6, 0xe, 0x2, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4}, @jmp={0x5, 0x7a4c, 0x0, 0x3, 0x9, 0xffffffff, 0xfffffffffffffff0}, @alu={0x4, 0x20, 0x9, 0x9, 0x5, 0xfffffffe, 0x4}, @jmp={0x5, 0x81, 0x9, 0x7, 0x6, 0xfffffffe, 0xfffffffffffffff0}, @jmp={0x5, 0x3, 0x3, 0x0, 0x2, 0x2, 0xffffffffffffffff}], {0x95}}, &(0x7f0000000780)='GPL\x00', 0x4, 0x77, &(0x7f00000007c0)=""/119, 0x0, 0x1, [], r13}, 0x48) mount(&(0x7f0000009500)='./file0\x00', &(0x7f0000009540)='./file0\x00', &(0x7f0000009580)='cramfs\x00', 0x5020, &(0x7f00000095c0)="22f464f8fef2b95976576e903efe99229584aaf55fa0d91223905d4a68c0c7d18bf26de6fec0660b0c36945200da04f802d9059dd5f6d2f0eca450f4fdd46ed2b411588d802f0d1d02be65816332b2754d686e927593deb8ee3ed17a24d749db81290c33836bcc9b7d93084c53d0744e81deb8b83d9b23565d6db4cb746eb15b20f7b806f0b5a02676d90260a61b00e9ec0b4b8bf07d5f93b3feda8299586c3936f743c764205de278c25a6fff98") perf_event_open(&(0x7f00000096c0)={0x1, 0x70, 0x3, 0xa8e, 0x1000, 0xe57a, 0x0, 0x6, 0x2100b, 0x2, 0x9, 0xdb1b, 0xfffffffffffffffa, 0xa7f8, 0x3, 0x2, 0x800, 0x800, 0x2, 0x0, 0x3f, 0x3, 0x8000000000000, 0x3, 0x20, 0x6, 0x3, 0xfffffffffffff318, 0xffffffffffff0001, 0xfffffffffffffffe, 0x12, 0x1, 0x101, 0x8, 0x100, 0x1, 0x3, 0x8, 0x0, 0x3ff, 0x7, @perf_bp={&(0x7f0000009680), 0x3}, 0x9, 0x6, 0xfffffffffffffff7, 0x0, 0x0, 0x49, 0xfffffffffffff3b8}, r10, 0xe, r5, 0x8) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000009880)={r12, &(0x7f0000009740)="8ba447000764036f17624e623896639a3e2456b901aedcdb4221cea83c3b2c94575967a34ec104bbebeaf6a6b50494e6763f41056d2ca84f906fa48d72590e81334926fab48e", &(0x7f00000097c0)=""/170}, 0x18) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r4, 0x2405, r6) bpf$PROG_LOAD(0x5, &(0x7f00000099c0)={0x7, 0x4, &(0x7f00000098c0)=@raw=[@ldst={0x3, 0x3, 0x6, 0xd, 0x7, 0x26}, @ldst={0x0, 0x2, 0x0, 0xa, 0x0, 0x4, 0xffffffffffffffff}], &(0x7f0000009900)='GPL\x00', 0x5, 0x5d, &(0x7f0000009940)=""/93, 0x41f00, 0x1, [], r13}, 0x48) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000009b40)={r8, &(0x7f0000009a40)="402c0b8b20e0ae84bb", &(0x7f0000009a80)=""/178}, 0x18) [ 189.409326] EXT4-fs (sda1): re-mounted. Opts: 2018/03/31 05:13:36 executing program 1: bpf$BPF_PROG_QUERY(0x10, &(0x7f00000017c0)={0xffffffffffffffff, 0x4}, 0x20) socketpair(0x10, 0x803, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={r1, 0x30d, &(0x7f0000000040)}, 0xa) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000001140)={r0, &(0x7f0000000100)="f7fba63cb5205bb57462d035b7e27133db905d10b06bbf063d3e1b6ec253ab0af90c18ee12a1ec7ebf3c903ed5bad6b91ab4facf", &(0x7f0000000140)="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", 0x3}, 0x20) 2018/03/31 05:13:36 executing program 4: mount(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='ncpfs\x00', 0x80802, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x50, &(0x7f0000000700)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780)=r0, 0x4) mount(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='./file0\x00', &(0x7f00000006c0)='btrfs\x00', 0x89402, &(0x7f0000000900)="e196efa3cb748d2a6600968b76295ff919bc3877b18eb8d265a35493fcf34fdc965cd5c837d2389c6e2ec6088abe8daaa8ca23f9298fc94dc26874bc4d4567afea1ca0879cdf21e915005a83e96b1002af29091d2176abbb7fec088a67f2e1390f32adaf2f252d24510870f8df7186936f4d88957eb8fcda78b7383a7d24db701d524557ee7324433e70d9ffa185098325f9e657d3c29cf6a35843cb96780269db1c735d55938af5c60e1e4ba25928697277b0fdf356b62399b4c8826d09bfca7d6078c19b4995195ea814b1bb40c06210ec") ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0xffffffff) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6f3, 0x0, 0x6, 0x0, 0x0, 0xfffdffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x22, &(0x7f00000007c0)=ANY=[@ANYBLOB="18000000000000000000000000000000000000000020f37b176532826618e8210d55b6b9f796a5cf4309ac945b17b6ec55aad627fce3173f275427d49a02c531c5316326ec3569ef7771eee96dc62f79bb386acf26001097f7673e6b395ee0cac49bf5bbe2db74ffbe760e50b31e653a89e733b2832d3e4e73d9720448a1d74be25a5dbcc32519fc1400391454104d5b5d9b14c5560730768138a9a0e109f34a16cc067edc5d7a0b0912aa587035de0ad6624124ad9467ed6aac80ad02b778f8319fef183facaa39c4519babbd000000000000009d9d8436042fc1b8d6e779a1531ba51c8c8811c745b829a97e3e2d0f13ea630503c6a765fae62d43095c1669d81251d3a6718f867abdfb0b907d24394fd24b2ea273"], &(0x7f0000f6bffb)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000400)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000540)={r1, 0x50}, 0xfffffe74) close(r1) perf_event_open(&(0x7f0000348f88)={0x2, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x28, 0x2, 0x0, &(0x7f0000000000)={0x0}) mkdir(&(0x7f0000000100)='./file0\x00', 0x1000000000) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='selinuxfs\x00', 0x1000, &(0x7f0000000100)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='minix\x00', 0x10020, &(0x7f0000000240)) 2018/03/31 05:13:36 executing program 2: socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000040)={0x7, 0x70, 0x1, 0xaabc, 0x2, 0x2, 0x0, 0xec, 0x4800, 0x1, 0x3a6b72c9, 0xffffffffffff8000, 0xfff, 0x7, 0x2, 0x7, 0xff, 0x1, 0x2, 0x9, 0x1, 0x0, 0x5, 0x75, 0x2, 0x7, 0x8, 0x4, 0x0, 0xdbce, 0xffff, 0xfaf, 0x1, 0xe7, 0xd0eb, 0x28a5, 0x9, 0x4, 0x0, 0x7, 0x2, @perf_config_ext={0x1, 0x8000}, 0x489, 0x6, 0xff, 0x0, 0x9d, 0x8, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f00000000c0)={0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000140)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r2 = getpid() r3 = perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x8, 0x4, 0x4, 0x1, 0x0, 0x401, 0x100, 0x7, 0xcfc0, 0x7, 0x0, 0x7, 0x30, 0x7, 0x7, 0xfff, 0x7, 0x9, 0xff, 0x9, 0xf, 0x0, 0x3, 0x100000000, 0x3, 0x8, 0xffff, 0x2, 0x3, 0xff, 0x6f, 0x3, 0x5, 0x800, 0x81, 0x0, 0x0, 0x9, 0x1, @perf_bp={&(0x7f0000000180), 0x1}, 0x11815, 0x9, 0x0, 0x1, 0x101, 0x5, 0x1e892fee}, r2, 0x9, r1, 0x1) r4 = perf_event_open(&(0x7f0000000280)={0x5, 0x70, 0xe00000000000, 0x9, 0x800, 0x6, 0x0, 0x7ff, 0x10200, 0xb, 0xe3, 0x5, 0x1, 0x4, 0x9b0f, 0x1f8a, 0x401, 0x1, 0xe975, 0x7, 0x437, 0x9, 0x7f, 0x20, 0x1, 0x2, 0x3, 0x5, 0x200, 0x1, 0x8, 0x401, 0x401, 0x2, 0x8, 0xfff, 0xf3c8, 0xf23, 0x0, 0x7fffffff, 0x0, @perf_bp={&(0x7f0000000240), 0x9}, 0x828, 0x3, 0x5, 0x1, 0x0, 0xc37, 0x6}, r2, 0x4, r1, 0x2) r5 = perf_event_open(&(0x7f0000000300)={0x4, 0x70, 0xff, 0x3, 0x7f, 0x7, 0x0, 0x40, 0x4a240, 0x2, 0xffffffffffffcc27, 0xb8, 0x2, 0x7, 0x9, 0x800, 0x3, 0x7d4d, 0xf7, 0xfffffffffffffffa, 0x9, 0x4, 0x3, 0x90be, 0x9, 0xfffffffffffffffc, 0x6, 0x3ff, 0xab6b, 0x8001, 0x5, 0x2, 0x9, 0x732, 0x400, 0x55000000000, 0x1ff, 0x6, 0x0, 0x0, 0x2, @perf_config_ext={0x6, 0xffffffff}, 0x40, 0x80000001, 0x7fff, 0x2, 0x1, 0x6, 0x5}, r2, 0xf, r4, 0xa) r6 = perf_event_open(&(0x7f00000003c0)={0x7, 0x70, 0xc87d, 0x6, 0x5, 0x80000001, 0x0, 0x3, 0x1, 0xb, 0xffffffff, 0x9, 0x584, 0x31b, 0x7, 0x2, 0x3, 0x544, 0x100000001, 0x9, 0x1, 0x100, 0x3, 0x1, 0x7, 0x0, 0x7, 0x5, 0xbb, 0x40, 0x7, 0x8, 0x81, 0xc5a, 0x0, 0x7, 0x1f, 0x815, 0x0, 0xffff, 0x2, @perf_bp={&(0x7f0000000380), 0x8}, 0x4, 0x5, 0xc95, 0x0, 0x7ff, 0x7b02, 0x7}, r2, 0x10, r1, 0xb) ioctl$PERF_EVENT_IOC_DISABLE(r3, 0x2401, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0x4) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = perf_event_open(&(0x7f0000000480)={0x7, 0x70, 0x7, 0xdbff, 0x3, 0x3f, 0x0, 0x8, 0x0, 0xc, 0x8, 0x0, 0xf43, 0x101, 0x6, 0x5, 0x6, 0x9, 0x200, 0xfffffffffffffffd, 0x4, 0x6, 0x6e, 0x20, 0x1b3, 0x1fe, 0x7ff, 0x3, 0x8000, 0x5, 0x0, 0x0, 0x0, 0x5, 0x22d2, 0x401, 0x68, 0xa1ce, 0x0, 0x4, 0x0, @perf_config_ext={0x2fb, 0x4}, 0x2000, 0xd33, 0x6, 0x697c4c7d75b7b6da, 0x171f, 0x9, 0x9}, r2, 0x6, r5, 0x1) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x9, 0x6, 0x101, 0x8, 0x0, 0x200, 0x2000, 0xf, 0x0, 0x5, 0x6, 0x3, 0x2, 0x0, 0x8001, 0x8, 0x3, 0x5, 0x17, 0x7, 0x4, 0x400, 0xffffffff, 0x7, 0x8000, 0x2, 0x100, 0x0, 0x7, 0x95de, 0x2, 0x1, 0x2, 0xd432, 0x3ff, 0x8599, 0x0, 0x3ff, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x10080, 0x7, 0xe7e, 0x7, 0x5, 0x7, 0x9}, r2, 0x0, r3, 0x8) close(r7) ioctl$PERF_EVENT_IOC_DISABLE(r9, 0x2401, 0x1) r10 = gettid() ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f00000005c0)={r0}) ioctl$sock_kcm_SIOCKCMUNATTACH(r11, 0x89e1, &(0x7f0000000600)={r8}) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000640)) r12 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)={0x4, 0x7, 0x7f, 0x9787, 0x1c, 0xffffffffffffffff, 0x5}, 0x2c) recvmsg$kcm(r11, &(0x7f0000009440)={&(0x7f0000009300)=@can={0x0, 0x0}, 0x80, &(0x7f00000093c0)=[{&(0x7f0000009380)=""/16, 0x10}], 0x1, &(0x7f0000009400)=""/18, 0x12, 0x3bc1}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000009480)={0xf, 0x13, &(0x7f00000006c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [@ldst={0x3, 0x2, 0x1, 0x2, 0x7, 0xffffffff, 0x4}, @map={0x18, 0x0, 0x1, 0x0, r12}, @alu={0x7, 0x5, 0xf, 0x6, 0xe, 0x2, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4}, @jmp={0x5, 0x7a4c, 0x0, 0x3, 0x9, 0xffffffff, 0xfffffffffffffff0}, @alu={0x4, 0x20, 0x9, 0x9, 0x5, 0xfffffffe, 0x4}, @jmp={0x5, 0x81, 0x9, 0x7, 0x6, 0xfffffffe, 0xfffffffffffffff0}, @jmp={0x5, 0x3, 0x3, 0x0, 0x2, 0x2, 0xffffffffffffffff}], {0x95}}, &(0x7f0000000780)='GPL\x00', 0x4, 0x77, &(0x7f00000007c0)=""/119, 0x0, 0x1, [], r13}, 0x48) mount(&(0x7f0000009500)='./file0\x00', &(0x7f0000009540)='./file0\x00', &(0x7f0000009580)='cramfs\x00', 0x5020, &(0x7f00000095c0)="22f464f8fef2b95976576e903efe99229584aaf55fa0d91223905d4a68c0c7d18bf26de6fec0660b0c36945200da04f802d9059dd5f6d2f0eca450f4fdd46ed2b411588d802f0d1d02be65816332b2754d686e927593deb8ee3ed17a24d749db81290c33836bcc9b7d93084c53d0744e81deb8b83d9b23565d6db4cb746eb15b20f7b806f0b5a02676d90260a61b00e9ec0b4b8bf07d5f93b3feda8299586c3936f743c764205de278c25a6fff98") perf_event_open(&(0x7f00000096c0)={0x1, 0x70, 0x3, 0xa8e, 0x1000, 0xe57a, 0x0, 0x6, 0x2100b, 0x2, 0x9, 0xdb1b, 0xfffffffffffffffa, 0xa7f8, 0x3, 0x2, 0x800, 0x800, 0x2, 0x0, 0x3f, 0x3, 0x8000000000000, 0x3, 0x20, 0x6, 0x3, 0xfffffffffffff318, 0xffffffffffff0001, 0xfffffffffffffffe, 0x12, 0x1, 0x101, 0x8, 0x100, 0x1, 0x3, 0x8, 0x0, 0x3ff, 0x7, @perf_bp={&(0x7f0000009680), 0x3}, 0x9, 0x6, 0xfffffffffffffff7, 0x0, 0x0, 0x49, 0xfffffffffffff3b8}, r10, 0xe, r5, 0x8) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000009880)={r12, &(0x7f0000009740)="8ba447000764036f17624e623896639a3e2456b901aedcdb4221cea83c3b2c94575967a34ec104bbebeaf6a6b50494e6763f41056d2ca84f906fa48d72590e81334926fab48e", &(0x7f00000097c0)=""/170}, 0x18) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r4, 0x2405, r6) bpf$PROG_LOAD(0x5, &(0x7f00000099c0)={0x7, 0x4, &(0x7f00000098c0)=@raw=[@ldst={0x3, 0x3, 0x6, 0xd, 0x7, 0x26}, @ldst={0x0, 0x2, 0x0, 0xa, 0x0, 0x4, 0xffffffffffffffff}], &(0x7f0000009900)='GPL\x00', 0x5, 0x5d, &(0x7f0000009940)=""/93, 0x41f00, 0x1, [], r13}, 0x48) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000009b40)={r8, &(0x7f0000009a40)="402c0b8b20e0ae84bb", &(0x7f0000009a80)=""/178}, 0x18) 2018/03/31 05:13:36 executing program 5: recvmsg(0xffffffffffffffff, &(0x7f0000346fc8)={&(0x7f0000000000)=@ll, 0x87f2cbd2a3010587, &(0x7f0000ca3000), 0x57, &(0x7f0000a01f13)=""/237, 0xfffffffffffffdb8}, 0x0) socketpair(0xb, 0xf, 0xfc00000000000000, &(0x7f0000000140)={0xffffffffffffffff}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000001c0)={r0, &(0x7f0000000180)="ac3c2445f730c12de56bf526695542ecf655d16f123a9dbf7cd73afd93b56b22b597650a64e8228eb736843e439dee56409e2af6aa3294"}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0xf, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1}], {0x95}}, &(0x7f00000000c0)='GPL\x00', 0xfffffffffffffffc, 0xd7bf, &(0x7f0000001780)=""/251}, 0x34) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000100)) 2018/03/31 05:13:37 executing program 0: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00'}, 0x10) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0xcd}, 0xfd52) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000007110000000000000000000000000002095fc00000000b200"], &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000100)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8e9ccf7563e72be9c866f"}, 0x10) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r0, &(0x7f0000000000)="520899e9c9621e88896b0820bc907939769226b91985a7fdfc0ae100f7b7fad366c1413f82008782e8646d29a3f510be93590d573efacd996f1d16fe9364b3b27aebea9f066238a8cfff2c1462c73fb60bbc03afef8d2195597f741d8d492e483a9530f9aaa6824e6adbef"}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f00000001c0)='./file0\x00', 0x0, 0x10}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r1, 0x50, &(0x7f00000000c0)}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fusectl\x00', 0x0, 0x0) 2018/03/31 05:13:37 executing program 7: r0 = gettid() r1 = perf_event_open(&(0x7f000054df88)={0x2, 0x70, 0x0, 0x4300, 0x0, 0x0, 0x0, 0x0, 0x9040, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x5}, r0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000271000)={0x20000000002, 0x78, 0x0, 0x80000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, r1, 0x0) perf_event_open(&(0x7f000057c000)={0x2, 0x78, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r1, 0x0) close(r1) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f00000003c0)) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x3, 0x4, 0x81, 0x3, 0xffffffffffffff9c, 0x4}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r2, 0x28, &(0x7f0000000140)}, 0x10) sendmsg(0xffffffffffffffff, &(0x7f0000001800)={&(0x7f0000000080)=@pptp={0x18, 0x2, {0x0, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f00000001c0)=[{&(0x7f00000000c0)="95584c24fc37c9bf9e4c32efcf1bd85040dc79a7075888f6ce121e6dc455a2924d26e1ec136ef3c3fac49ecc7931c331a83c1f25df3d9db7c777c3abbe", 0x3d}], 0x1, &(0x7f0000000200)=ANY=[], 0x0, 0x40}, 0x0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)="8e68d7d3eb000000056503000000a6a28e6b96012f403743eadab0f5fec1564a3097cd7f5aa8d977138b83b0ba89ad5100092645c0aec6387bab22f2a37564f8d0e2", 0x0, &(0x7f0000000200)) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='selinuxfs\x00', 0x1000, &(0x7f0000000100)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='squashfs\x00', 0x20, 0x0) [ 189.576883] FAULT_INJECTION: forcing a failure. [ 189.576883] name failslab, interval 1, probability 0, space 0, times 0 [ 189.588175] CPU: 0 PID: 16027 Comm: syz-executor6 Not tainted 4.16.0-rc6+ #42 [ 189.595448] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 189.604793] Call Trace: [ 189.607388] dump_stack+0x194/0x24d [ 189.611017] ? arch_local_irq_restore+0x53/0x53 [ 189.615677] ? __save_stack_trace+0x7e/0xd0 [ 189.619988] should_fail+0x8c0/0xa40 [ 189.623688] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 189.628775] ? kasan_kmalloc+0xad/0xe0 [ 189.632640] ? kmem_cache_alloc_trace+0x136/0x740 [ 189.637461] ? __memcg_init_list_lru_node+0x169/0x270 [ 189.642625] ? __list_lru_init+0x544/0x750 [ 189.646835] ? sget_userns+0x6b1/0xe40 [ 189.650698] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 189.655427] ? do_mount+0xea4/0x2bb0 [ 189.659115] ? SyS_mount+0xab/0x120 [ 189.662717] ? do_syscall_64+0x281/0x940 [ 189.666753] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 189.672094] ? find_held_lock+0x35/0x1d0 [ 189.676134] ? __lock_is_held+0xb6/0x140 [ 189.680176] ? check_same_owner+0x320/0x320 [ 189.684477] ? rcu_note_context_switch+0x710/0x710 [ 189.689384] should_failslab+0xec/0x120 [ 189.693336] kmem_cache_alloc_trace+0x4b/0x740 [ 189.697896] ? __kmalloc_node+0x33/0x70 [ 189.701846] ? __kmalloc_node+0x33/0x70 [ 189.705794] ? rcu_read_lock_sched_held+0x108/0x120 [ 189.710794] __memcg_init_list_lru_node+0x169/0x270 [ 189.715789] ? list_lru_add+0x7c0/0x7c0 [ 189.719741] ? __kmalloc_node+0x47/0x70 [ 189.723693] __list_lru_init+0x544/0x750 [ 189.727733] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 189.733594] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 189.738587] ? lockdep_init_map+0x9/0x10 [ 189.742628] sget_userns+0x6b1/0xe40 [ 189.746316] ? set_anon_super+0x20/0x20 [ 189.750268] ? put_filp+0x90/0x90 [ 189.753698] ? destroy_unused_super.part.6+0xd0/0xd0 [ 189.758775] ? alloc_vfsmnt+0x762/0x9c0 [ 189.762723] ? path_lookupat+0x238/0xba0 [ 189.766757] ? mnt_free_id.isra.21+0x50/0x50 [ 189.771142] ? trace_hardirqs_off+0x10/0x10 [ 189.775440] ? putname+0xee/0x130 [ 189.778875] ? cap_capable+0x1b5/0x230 [ 189.782742] ? security_capable+0x8e/0xc0 [ 189.786870] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 189.792035] ? ns_capable_common+0xcf/0x160 [ 189.796334] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 189.801504] mount_ns+0x6d/0x190 [ 189.804847] rpc_mount+0x9e/0xd0 [ 189.808192] mount_fs+0x66/0x2d0 [ 189.811536] vfs_kern_mount.part.26+0xc6/0x4a0 [ 189.816093] ? may_umount+0xa0/0xa0 [ 189.819697] ? _raw_read_unlock+0x22/0x30 [ 189.823819] ? __get_fs_type+0x8a/0xc0 [ 189.827687] do_mount+0xea4/0x2bb0 [ 189.831206] ? __might_fault+0x110/0x1d0 [ 189.835246] ? copy_mount_string+0x40/0x40 [ 189.839455] ? check_same_owner+0x320/0x320 [ 189.843753] ? __check_object_size+0x8b/0x530 [ 189.848228] ? __might_sleep+0x95/0x190 [ 189.852186] ? kasan_check_write+0x14/0x20 [ 189.856398] ? _copy_from_user+0x99/0x110 [ 189.860526] ? memdup_user+0x5e/0x90 [ 189.864214] ? copy_mount_options+0x1f7/0x2e0 [ 189.868686] SyS_mount+0xab/0x120 [ 189.872112] ? copy_mnt_ns+0xb30/0xb30 [ 189.875976] do_syscall_64+0x281/0x940 [ 189.879840] ? vmalloc_sync_all+0x30/0x30 [ 189.883961] ? _raw_spin_unlock_irq+0x27/0x70 [ 189.888434] ? finish_task_switch+0x1c1/0x7e0 [ 189.892906] ? syscall_return_slowpath+0x550/0x550 [ 189.897811] ? syscall_return_slowpath+0x2ac/0x550 [ 189.902717] ? prepare_exit_to_usermode+0x350/0x350 [ 189.907708] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 189.913047] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 189.917868] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 189.923031] RIP: 0033:0x454e79 2018/03/31 05:13:37 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000140)) socketpair$inet_sctp(0x2, 0x400005, 0x84, &(0x7f00000000c0)) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000000)) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000100)) socketpair$inet(0x2, 0x0, 0x3, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0xbcac) [ 189.926208] RSP: 002b:00007fc28ac9cc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 189.933893] RAX: ffffffffffffffda RBX: 00007fc28ac9d6d4 RCX: 0000000000454e79 [ 189.941137] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 189.948381] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 189.955624] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000016 [ 189.962872] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000031 [ 190.032432] EXT4-fs (sda1): re-mounted. Opts: [ 190.089933] EXT4-fs (sda1): re-mounted. Opts: (null) 2018/03/31 05:13:37 executing program 2: socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000040)={0x7, 0x70, 0x1, 0xaabc, 0x2, 0x2, 0x0, 0xec, 0x4800, 0x1, 0x3a6b72c9, 0xffffffffffff8000, 0xfff, 0x7, 0x2, 0x7, 0xff, 0x1, 0x2, 0x9, 0x1, 0x0, 0x5, 0x75, 0x2, 0x7, 0x8, 0x4, 0x0, 0xdbce, 0xffff, 0xfaf, 0x1, 0xe7, 0xd0eb, 0x28a5, 0x9, 0x4, 0x0, 0x7, 0x2, @perf_config_ext={0x1, 0x8000}, 0x489, 0x6, 0xff, 0x0, 0x9d, 0x8, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f00000000c0)={0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000140)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r2 = getpid() r3 = perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x8, 0x4, 0x4, 0x1, 0x0, 0x401, 0x100, 0x7, 0xcfc0, 0x7, 0x0, 0x7, 0x30, 0x7, 0x7, 0xfff, 0x7, 0x9, 0xff, 0x9, 0xf, 0x0, 0x3, 0x100000000, 0x3, 0x8, 0xffff, 0x2, 0x3, 0xff, 0x6f, 0x3, 0x5, 0x800, 0x81, 0x0, 0x0, 0x9, 0x1, @perf_bp={&(0x7f0000000180), 0x1}, 0x11815, 0x9, 0x0, 0x1, 0x101, 0x5, 0x1e892fee}, r2, 0x9, r1, 0x1) r4 = perf_event_open(&(0x7f0000000280)={0x5, 0x70, 0xe00000000000, 0x9, 0x800, 0x6, 0x0, 0x7ff, 0x10200, 0xb, 0xe3, 0x5, 0x1, 0x4, 0x9b0f, 0x1f8a, 0x401, 0x1, 0xe975, 0x7, 0x437, 0x9, 0x7f, 0x20, 0x1, 0x2, 0x3, 0x5, 0x200, 0x1, 0x8, 0x401, 0x401, 0x2, 0x8, 0xfff, 0xf3c8, 0xf23, 0x0, 0x7fffffff, 0x0, @perf_bp={&(0x7f0000000240), 0x9}, 0x828, 0x3, 0x5, 0x1, 0x0, 0xc37, 0x6}, r2, 0x4, r1, 0x2) r5 = perf_event_open(&(0x7f0000000300)={0x4, 0x70, 0xff, 0x3, 0x7f, 0x7, 0x0, 0x40, 0x4a240, 0x2, 0xffffffffffffcc27, 0xb8, 0x2, 0x7, 0x9, 0x800, 0x3, 0x7d4d, 0xf7, 0xfffffffffffffffa, 0x9, 0x4, 0x3, 0x90be, 0x9, 0xfffffffffffffffc, 0x6, 0x3ff, 0xab6b, 0x8001, 0x5, 0x2, 0x9, 0x732, 0x400, 0x55000000000, 0x1ff, 0x6, 0x0, 0x0, 0x2, @perf_config_ext={0x6, 0xffffffff}, 0x40, 0x80000001, 0x7fff, 0x2, 0x1, 0x6, 0x5}, r2, 0xf, r4, 0xa) r6 = perf_event_open(&(0x7f00000003c0)={0x7, 0x70, 0xc87d, 0x6, 0x5, 0x80000001, 0x0, 0x3, 0x1, 0xb, 0xffffffff, 0x9, 0x584, 0x31b, 0x7, 0x2, 0x3, 0x544, 0x100000001, 0x9, 0x1, 0x100, 0x3, 0x1, 0x7, 0x0, 0x7, 0x5, 0xbb, 0x40, 0x7, 0x8, 0x81, 0xc5a, 0x0, 0x7, 0x1f, 0x815, 0x0, 0xffff, 0x2, @perf_bp={&(0x7f0000000380), 0x8}, 0x4, 0x5, 0xc95, 0x0, 0x7ff, 0x7b02, 0x7}, r2, 0x10, r1, 0xb) ioctl$PERF_EVENT_IOC_DISABLE(r3, 0x2401, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0x4) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = perf_event_open(&(0x7f0000000480)={0x7, 0x70, 0x7, 0xdbff, 0x3, 0x3f, 0x0, 0x8, 0x0, 0xc, 0x8, 0x0, 0xf43, 0x101, 0x6, 0x5, 0x6, 0x9, 0x200, 0xfffffffffffffffd, 0x4, 0x6, 0x6e, 0x20, 0x1b3, 0x1fe, 0x7ff, 0x3, 0x8000, 0x5, 0x0, 0x0, 0x0, 0x5, 0x22d2, 0x401, 0x68, 0xa1ce, 0x0, 0x4, 0x0, @perf_config_ext={0x2fb, 0x4}, 0x2000, 0xd33, 0x6, 0x697c4c7d75b7b6da, 0x171f, 0x9, 0x9}, r2, 0x6, r5, 0x1) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x9, 0x6, 0x101, 0x8, 0x0, 0x200, 0x2000, 0xf, 0x0, 0x5, 0x6, 0x3, 0x2, 0x0, 0x8001, 0x8, 0x3, 0x5, 0x17, 0x7, 0x4, 0x400, 0xffffffff, 0x7, 0x8000, 0x2, 0x100, 0x0, 0x7, 0x95de, 0x2, 0x1, 0x2, 0xd432, 0x3ff, 0x8599, 0x0, 0x3ff, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x10080, 0x7, 0xe7e, 0x7, 0x5, 0x7, 0x9}, r2, 0x0, r3, 0x8) close(r7) ioctl$PERF_EVENT_IOC_DISABLE(r9, 0x2401, 0x1) r10 = gettid() ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f00000005c0)={r0}) ioctl$sock_kcm_SIOCKCMUNATTACH(r11, 0x89e1, &(0x7f0000000600)={r8}) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000640)) r12 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)={0x4, 0x7, 0x7f, 0x9787, 0x1c, 0xffffffffffffffff, 0x5}, 0x2c) recvmsg$kcm(r11, &(0x7f0000009440)={&(0x7f0000009300)=@can={0x0, 0x0}, 0x80, &(0x7f00000093c0)=[{&(0x7f0000009380)=""/16, 0x10}], 0x1, &(0x7f0000009400)=""/18, 0x12, 0x3bc1}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000009480)={0xf, 0x13, &(0x7f00000006c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [@ldst={0x3, 0x2, 0x1, 0x2, 0x7, 0xffffffff, 0x4}, @map={0x18, 0x0, 0x1, 0x0, r12}, @alu={0x7, 0x5, 0xf, 0x6, 0xe, 0x2, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4}, @jmp={0x5, 0x7a4c, 0x0, 0x3, 0x9, 0xffffffff, 0xfffffffffffffff0}, @alu={0x4, 0x20, 0x9, 0x9, 0x5, 0xfffffffe, 0x4}, @jmp={0x5, 0x81, 0x9, 0x7, 0x6, 0xfffffffe, 0xfffffffffffffff0}, @jmp={0x5, 0x3, 0x3, 0x0, 0x2, 0x2, 0xffffffffffffffff}], {0x95}}, &(0x7f0000000780)='GPL\x00', 0x4, 0x77, &(0x7f00000007c0)=""/119, 0x0, 0x1, [], r13}, 0x48) mount(&(0x7f0000009500)='./file0\x00', &(0x7f0000009540)='./file0\x00', &(0x7f0000009580)='cramfs\x00', 0x5020, &(0x7f00000095c0)="22f464f8fef2b95976576e903efe99229584aaf55fa0d91223905d4a68c0c7d18bf26de6fec0660b0c36945200da04f802d9059dd5f6d2f0eca450f4fdd46ed2b411588d802f0d1d02be65816332b2754d686e927593deb8ee3ed17a24d749db81290c33836bcc9b7d93084c53d0744e81deb8b83d9b23565d6db4cb746eb15b20f7b806f0b5a02676d90260a61b00e9ec0b4b8bf07d5f93b3feda8299586c3936f743c764205de278c25a6fff98") perf_event_open(&(0x7f00000096c0)={0x1, 0x70, 0x3, 0xa8e, 0x1000, 0xe57a, 0x0, 0x6, 0x2100b, 0x2, 0x9, 0xdb1b, 0xfffffffffffffffa, 0xa7f8, 0x3, 0x2, 0x800, 0x800, 0x2, 0x0, 0x3f, 0x3, 0x8000000000000, 0x3, 0x20, 0x6, 0x3, 0xfffffffffffff318, 0xffffffffffff0001, 0xfffffffffffffffe, 0x12, 0x1, 0x101, 0x8, 0x100, 0x1, 0x3, 0x8, 0x0, 0x3ff, 0x7, @perf_bp={&(0x7f0000009680), 0x3}, 0x9, 0x6, 0xfffffffffffffff7, 0x0, 0x0, 0x49, 0xfffffffffffff3b8}, r10, 0xe, r5, 0x8) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000009880)={r12, &(0x7f0000009740)="8ba447000764036f17624e623896639a3e2456b901aedcdb4221cea83c3b2c94575967a34ec104bbebeaf6a6b50494e6763f41056d2ca84f906fa48d72590e81334926fab48e", &(0x7f00000097c0)=""/170}, 0x18) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r4, 0x2405, r6) bpf$PROG_LOAD(0x5, &(0x7f00000099c0)={0x7, 0x4, &(0x7f00000098c0)=@raw=[@ldst={0x3, 0x3, 0x6, 0xd, 0x7, 0x26}, @ldst={0x0, 0x2, 0x0, 0xa, 0x0, 0x4, 0xffffffffffffffff}], &(0x7f0000009900)='GPL\x00', 0x5, 0x5d, &(0x7f0000009940)=""/93, 0x41f00, 0x1, [], r13}, 0x48) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000009b40)={r8, &(0x7f0000009a40)="402c0b8b20e0ae84bb", &(0x7f0000009a80)=""/178}, 0x18) 2018/03/31 05:13:37 executing program 7: mount(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)='./file0\x00', &(0x7f00000021c0)='ext4\x00', 0x1880003, &(0x7f0000002200)="610c3aa74c498e74b9d39b9a1496217c5d948818ed60906ad0fc38705a9236d44cf42c9f39cfb8ee04e76086a94c0f90b33775a919dcf7bf102e2d8cd9e62ba4f94549c8cd236553d3725a8b14c26a9c6c3de2ab94a806d46f7ccde11d48f9c5362dec91cb7bc90a1c9dc2dc94f3abcaf21aa7cc47c304b7fba6d13ec70278f7") mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000002000)={0xffffffffffffffff}) sendmsg(0xffffffffffffffff, &(0x7f00000024c0)={&(0x7f0000002440)=@pppol2tp={0x18, 0x1, {0x0, r0, {0x2, 0x4e23, @multicast1=0xe0000001}, 0x4, 0x3, 0x0, 0x3}}, 0x80, &(0x7f0000002400)=[{&(0x7f0000002540)="73c7575b94a72990e177f86ed4835a72a65c1a6c6831eeb0c48163a47ab63bcb605c8450cc4798ff6521c2aa722d1af0c1b470af95f119be21e366ebd73b0dfc41a9fd5db446c7696f45aceeba664b17ecd458f839e32dae10228b88600546b5be081a9cf793d1a12676222e6d388b20580c3b84349845aec336d571fe15292681fe53156b05f28e2768dc8abbe8ebaa1e66a5c6e88e57933a84c8cee0c28fbdb02806741991b6e33847ff9b1e54c2c9d734b9ade3bc", 0xb6}], 0x1, &(0x7f0000002500)=ANY=[], 0x0, 0x40000}, 0x80) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000200)='mqueue\x00', 0x0, &(0x7f000000a000)) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000002340)={&(0x7f0000002300)='./file0\x00'}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000002380)={0x8, 0x8, 0x0, 0x4, 0x4, r1, 0x401}, 0x2c) socketpair$inet6_icmp(0xa, 0x2, 0x3a, &(0x7f0000001f40)={0xffffffffffffffff}) mount(&(0x7f0000001c00)='./file0\x00', &(0x7f0000001c40)='./file0\x00', &(0x7f0000001c80)='devpts\x00', 0x40, &(0x7f0000001cc0)="be623dfd58807ac0b2f86f052863a5f30adc0bce173ebcf648cefd7d64732aeb5b94e6af3ab33e53669ba6d304d067dad4b1ff3ed87f18fd170aac904e8f105e80e22881717c98752a9cd7cfb06d102877e3b36b2624d22427331755a9514b225d25999ed605ffe4188630db2e7ddcc57f6316b60c4f3845d9dfcbbde5e49af627b48d7c9bd743b536de31a9ba3010cb6714c9b90a50537be55ca12a18e6541bff5a82d293e7734ea9c90707899663bd96b3bcce5887bf0bd35963c5adc39ddcb6f2a0a02b01661242046cb54ef1aec5a486b69e006305064124867bf79f4dc11798e214b61575168b79887122e0a3461f703c077f902c0a") socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r4, &(0x7f0000001800)={&(0x7f0000000240)=@alg, 0x80, &(0x7f0000000740)=[{&(0x7f00000002c0)=""/83, 0x53}, {&(0x7f0000000340)=""/27, 0x1b}, {&(0x7f0000000380)}, {&(0x7f00000003c0)=""/40, 0x28}, {&(0x7f0000000400)=""/144, 0x90}, {&(0x7f00000004c0)=""/200, 0xc8}, {&(0x7f00000005c0)=""/60, 0x3c}, {&(0x7f0000000600)=""/105, 0x69}, {&(0x7f0000000680)=""/127, 0x7f}, {&(0x7f0000000700)=""/8, 0x8}], 0xa, &(0x7f0000000800)=""/4096, 0x1000}, 0x10000) bpf$OBJ_GET_MAP(0x7, &(0x7f0000001b80)={&(0x7f0000001b40)='./file0\x00', 0x0, 0x10}, 0x10) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000023c0)) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000180)=0xf60) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r6, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)=[{0x18, 0x1, 0x1, "13"}], 0x18}, 0x0) recvmsg(r5, &(0x7f0000000000)={&(0x7f0000000180)=@ethernet={0x0, @link_local}, 0x103, &(0x7f0000000700)=[{&(0x7f0000000140)=""/16, 0x10}, {&(0x7f00000004c0)=""/65, 0x41}], 0x2, &(0x7f00000007c0)=""/20, 0x14}, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000002100)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000000c0)) r7 = perf_event_open(&(0x7f0000002b80)={0x1, 0x70, 0x10000, 0x1, 0x9, 0x101, 0x0, 0x9, 0x0, 0xd, 0x4, 0x7, 0xffffffffffffffff, 0x133adf1f, 0xec, 0x1, 0x7, 0x2, 0x1f, 0x5, 0x44, 0x3, 0x78fe, 0x89, 0x80, 0x2, 0x9, 0x8, 0x0, 0x100000000, 0x1000, 0x400, 0xfffffffffffffff9, 0x10001, 0x5, 0x8, 0x1, 0x5bfc, 0x0, 0x1, 0x2, @perf_config_ext={0x401, 0x40a}, 0x10400, 0x1, 0x2, 0x7, 0x3e2, 0x10d, 0x1ff}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40042409, 0x0) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000001a00)={0xd, 0x12, &(0x7f0000001840)=@raw=[@jmp={0x5, 0x1, 0xa, 0x6, 0xf, 0x58, 0x10}, @map={0x18, 0xf, 0x1, 0x0, 0x1}, @alu={0x7, 0x100000000, 0xb, 0x0, 0x1, 0xfffffffe, 0xc}, @ldst={0x2, 0x1, 0x1, 0x9, 0x3, 0x0, 0xfffffffffffffff4}, @ldst={0x3, 0x3, 0x1, 0x7, 0x0, 0xffffffff, 0x10}, @initr0={0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xffffffffffffffff}, @call={0x85, 0x0, 0x0, 0x21}, @initr0={0x18, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x8}], &(0x7f0000000380)='syzkaller\x00', 0x20, 0xec, &(0x7f0000001900)=""/236, 0x41f00, 0x1}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001b00)={r8, 0x50, &(0x7f0000001a80)}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001f00)={r8, 0x0, 0xf6, 0x22, &(0x7f0000001dc0)="9ef9482ea02fd36d0a768986a7ebe7a627dc88937e7073e3521858dfa0d5e02f571a01cfdfa76e048e5f956ea5da60b90e02a6c3d3687ed61ec9ab5b682c02498bddef38de9ce8c753e41e78f414d16202a033b6c7752711a5f56924e7846d6dcde2f71026e1eb0319b5e60f6b1ec67fca31c3cf1691d3af91a19f56be5a10ff337a53ba13dd3d75e1555211954b92ec0082d02b7b4cdddc021cbe84e4af8f20788977e3416918843e6c92b2ebf7b8b33ecbd4c7c9a9d5036c3e3e538748a32f1a28eb77818ca1878ffdd445dcdb8a40e6221e0fc474428449dfe93c62bbc69996aa9b34488c1da4f6f7c2275305a6a4fb256c1a516d", &(0x7f0000001ec0)=""/34, 0x1f, 0x1}, 0x28) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000001fc0)) close(0xffffffffffffffff) recvmsg(r3, &(0x7f0000002740)={&(0x7f0000002040)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff}}, 0x80, &(0x7f00000020c0)=[{&(0x7f0000002600)=""/66, 0x42}, {&(0x7f0000002680)=""/88, 0x58}, {&(0x7f0000001bc0)=""/55, 0x37}], 0x3, &(0x7f0000002700)=""/39, 0x27, 0xc463}, 0x0) recvmsg$kcm(r9, &(0x7f0000002940)={&(0x7f0000002780)=@in={0x0, 0x0, @rand_addr}, 0x80, &(0x7f00000028c0)=[{&(0x7f0000002800)=""/181, 0xb5}], 0x1, &(0x7f0000002900), 0x0, 0x10001}, 0x40) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000000)='bdev\x00', 0x24000, &(0x7f0000000140)) recvmsg(r2, &(0x7f0000002900)={&(0x7f0000002980)=@pppoe={0x0, 0x0, {0x0, @local}}, 0x80, &(0x7f00000022c0)=[{&(0x7f0000002a00)=""/255, 0xff}], 0x1, &(0x7f0000002b00)=""/77, 0x4d, 0x3b}, 0x40000000) 2018/03/31 05:13:37 executing program 5: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffff9c, 0x50, &(0x7f0000000340)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000400)=r0, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0xcf}, 0xfffffffffffffd40) mount(&(0x7f0000000b00)='./file0\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000ac0)='ncpfs\x00', 0x80802, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x50, &(0x7f0000000700)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780)=r2, 0x4) mount(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='./file0\x00', &(0x7f00000006c0)='btrfs\x00', 0x89402, &(0x7f0000000900)="e196efa3cb748d2a6600968b76295ff919bc3877b18eb8d265a35493fcf34fdc965cd5c837d2389c6e2ec6088abe8daaa8ca23f9298fc94dc26874bc4d4567afea1ca0879cdf21e915005a83e96b1002af29091d2176abbb7fec088a67f2e1390f32adaf2f252d24510870f8df7186936f4d88957eb8fcda78b7383a7d24db701d524557ee7324433e70d9ffa185098325f9e657d3c29cf6a35843cb96780269db1c735d55938af5c60e1e4ba25928697277b0fdf356b62399b4c8826d09bfca7d6078c19b4995195ea814b1bb40c06210ec4a97f9") ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0xffffffff) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6f3, 0x0, 0x6, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x22, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000f6bffb)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000280)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000540)={r3, 0x50}, 0xfffffe74) close(0xffffffffffffffff) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='gfs2meta\x00', 0x1114440, 0x0) mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000600)='./file0\x00', &(0x7f0000000a00)='anon_inodefs\x00', 0x0, &(0x7f0000000a40)="fa60adec0c19ce1655b560d2d7e84d1b28467dd086af300ea92748257a52958a685e334320d411b031547857793c2783189153e2ba22bfcaf16cbd52201051c79b1337eecc428abd86858a17fc5db8af236117d206c8af40427339279d5629b8318bc41f0d050539a6152d315a3aa031259544") perf_event_open(&(0x7f0000348f88)={0x2, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x28, 0x2, 0x0, &(0x7f0000000000)={0x0, 0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000002c0)={&(0x7f0000000240)='./file0\x00', r4}, 0x10) mkdir(&(0x7f0000000100)='./file0\x00', 0x1000000000) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='selinuxfs\x00', 0x1000, &(0x7f0000000100)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000580)='ubifs\x00', 0x1, &(0x7f00000005c0)="f9117c5787a6f79ab35e20d8c0a8680b8640f7708dfc64a344639b52c71fd00a264236e78cad519a02995be1a61ea6e105195ae820e265bb8362") mkdir(&(0x7f0000000300)='./file0\x00', 0x10) 2018/03/31 05:13:37 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x7}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xd, 0x5, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000003d634c33b77f113400000000000000009500000000000000"], &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 2018/03/31 05:13:37 executing program 4: mount(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='ncpfs\x00', 0x80802, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x50, &(0x7f0000000700)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780)=r0, 0x4) mount(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='./file0\x00', &(0x7f00000006c0)='btrfs\x00', 0x89402, &(0x7f0000000900)="e196efa3cb748d2a6600968b76295ff919bc3877b18eb8d265a35493fcf34fdc965cd5c837d2389c6e2ec6088abe8daaa8ca23f9298fc94dc26874bc4d4567afea1ca0879cdf21e915005a83e96b1002af29091d2176abbb7fec088a67f2e1390f32adaf2f252d24510870f8df7186936f4d88957eb8fcda78b7383a7d24db701d524557ee7324433e70d9ffa185098325f9e657d3c29cf6a35843cb96780269db1c735d55938af5c60e1e4ba25928697277b0fdf356b62399b4c8826d09bfca7d6078c19b4995195ea814b1bb40c06210ec") ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0xffffffff) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6f3, 0x0, 0x6, 0x0, 0x0, 0xfffdffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x22, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000f6bffb)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000400)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000540)={r1, 0x50}, 0xfffffe74) close(r1) perf_event_open(&(0x7f0000348f88)={0x2, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x28, 0x2, 0x0, &(0x7f0000000000)={0x0}) mkdir(&(0x7f0000000100)='./file0\x00', 0x1000000000) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='selinuxfs\x00', 0x1000, &(0x7f0000000100)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='minix\x00', 0x10020, &(0x7f0000000240)) 2018/03/31 05:13:37 executing program 3: socketpair(0xa, 0x2, 0x10000, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000080)='\x00') r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x5421, &(0x7f00000000c0)='\x00') 2018/03/31 05:13:37 executing program 1: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000300)={0xffffffff, 0x9}, 0xc) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000400)={r0, &(0x7f0000000340)="afe4873074eb86f7335f3c148201d7dc226860ed65bdc3425ffef3eb06d84b02286185cb80b71522fae32303cda81ed929fc1620d77a61f6bec13bb7197131c64396d7a0ccace92a5b2136492c5610287f8ac968256095a7a3596333aaca9e9c77531fea762f8417dbc09fc4f601c5a88892", &(0x7f00000003c0)=""/32}, 0x18) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x4, 0x4, 0x8, &(0x7f0000000480)) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="18000000000000000000000000000000950000e6ffffff00"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r1) mount(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='binfmt_misc\x00', 0x10090, &(0x7f0000000580)="fae8c0288f4080361cc0fa58ab1143c3629d7ecb54cdea258b8533db9bb39b502a48a4f6acbaa171423c718018e7a71a29ecfb7d083844fa5ea084f5088df32c61c322c6f425b759f78fbd66e29079a7bab8eac8835c1e7023c5e9ded32f9fe0dbfc7b599bb9982e7ca398dfbf92c0e765c780f3ef91f82dc695bc76bf6d4fa34c05e8635fd8af71984eeb9e32ddfb380cf151a6e20b0ea4d9a3ad96e38a36ac80adc3e5d71f15cf4d0641c10136bd1ddfcb5a4eac8a9330") r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x8, 0x81, 0x800, 0xfffffffffffffc00, 0x19, 0xffffffffffffffff, 0x6}, 0x2c) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xe, 0x4, 0x7fff, 0x0, 0x8, 0xffffffffffffffff, 0xffffffffffffff00}, 0x2c) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0xc, &(0x7f0000000240)=@raw=[@ldst={0x2, 0xbbacdb7ab747e486, 0x3, 0x0, 0x0, 0x100, 0xffffffffffffffff}, @alu={0x7, 0x7, 0x3, 0x7, 0x8, 0x16}, @map={0x18, 0xf, 0x1, 0x0, r3}, @exit={0x95}, @generic={0x9, 0x5c66, 0xfffffffffffffffd, 0x800}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x100}, @ldst={0x0, 0x3, 0x3, 0x0, 0x9, 0xfffffff8, 0xfffffffffffffff0}, @exit={0x95}, @call={0x85, 0x0, 0x0, 0x1c}, @map={0x18, 0x4, 0x1, 0x0, r4}], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffbfffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r5) close(r1) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000440)) 2018/03/31 05:13:37 executing program 6 (fault-call:17 fault-nth:50): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x0, 0x101, 0x4, 0x0, 0x1, r0, 0x0, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r2 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)={0xffffffffffffffff}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r2, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x0, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0", 0xc9}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000280)={&(0x7f0000000680)='./file0\x00'}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r1}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r3) gettid() close(0xffffffffffffffff) 2018/03/31 05:13:37 executing program 2: socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000040)={0x7, 0x70, 0x1, 0xaabc, 0x2, 0x2, 0x0, 0xec, 0x4800, 0x1, 0x3a6b72c9, 0xffffffffffff8000, 0xfff, 0x7, 0x2, 0x7, 0xff, 0x1, 0x2, 0x9, 0x1, 0x0, 0x5, 0x75, 0x2, 0x7, 0x8, 0x4, 0x0, 0xdbce, 0xffff, 0xfaf, 0x1, 0xe7, 0xd0eb, 0x28a5, 0x9, 0x4, 0x0, 0x7, 0x2, @perf_config_ext={0x1, 0x8000}, 0x489, 0x6, 0xff, 0x0, 0x9d, 0x8, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f00000000c0)={0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000140)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r2 = getpid() r3 = perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x8, 0x4, 0x4, 0x1, 0x0, 0x401, 0x100, 0x7, 0xcfc0, 0x7, 0x0, 0x7, 0x30, 0x7, 0x7, 0xfff, 0x7, 0x9, 0xff, 0x9, 0xf, 0x0, 0x3, 0x100000000, 0x3, 0x8, 0xffff, 0x2, 0x3, 0xff, 0x6f, 0x3, 0x5, 0x800, 0x81, 0x0, 0x0, 0x9, 0x1, @perf_bp={&(0x7f0000000180), 0x1}, 0x11815, 0x9, 0x1, 0x0, 0x101, 0x5, 0x1e892fee}, r2, 0x9, r1, 0x1) r4 = perf_event_open(&(0x7f0000000280)={0x5, 0x70, 0xe00000000000, 0x9, 0x800, 0x6, 0x0, 0x7ff, 0x10200, 0xb, 0xe3, 0x5, 0x1, 0x4, 0x9b0f, 0x1f8a, 0x401, 0x1, 0xe975, 0x7, 0x437, 0x9, 0x7f, 0x20, 0x1, 0x2, 0x3, 0x5, 0x200, 0x1, 0x8, 0x401, 0x401, 0x2, 0x8, 0xfff, 0xf3c8, 0xf23, 0x0, 0x7fffffff, 0x0, @perf_bp={&(0x7f0000000240), 0x9}, 0x828, 0x3, 0x5, 0x1, 0x0, 0xc37, 0x6}, r2, 0x4, r1, 0x2) r5 = perf_event_open(&(0x7f0000000300)={0x4, 0x70, 0xff, 0x3, 0x7f, 0x7, 0x0, 0x40, 0x4a240, 0x2, 0xffffffffffffcc27, 0xb8, 0x2, 0x7, 0x9, 0x800, 0x3, 0x7d4d, 0xf7, 0xfffffffffffffffa, 0x9, 0x4, 0x3, 0x90be, 0x9, 0xfffffffffffffffc, 0x6, 0x3ff, 0xab6b, 0x8001, 0x5, 0x2, 0x9, 0x732, 0x400, 0x55000000000, 0x1ff, 0x6, 0x0, 0x0, 0x2, @perf_config_ext={0x6, 0xffffffff}, 0x40, 0x80000001, 0x7fff, 0x2, 0x1, 0x6, 0x5}, r2, 0xf, r4, 0xa) r6 = perf_event_open(&(0x7f00000003c0)={0x7, 0x70, 0xc87d, 0x6, 0x5, 0x80000001, 0x0, 0x3, 0x1, 0xb, 0xffffffff, 0x9, 0x584, 0x31b, 0x7, 0x2, 0x3, 0x544, 0x100000001, 0x9, 0x1, 0x100, 0x3, 0x1, 0x7, 0x0, 0x7, 0x5, 0xbb, 0x40, 0x7, 0x8, 0x81, 0xc5a, 0x0, 0x7, 0x1f, 0x815, 0x0, 0xffff, 0x2, @perf_bp={&(0x7f0000000380), 0x8}, 0x4, 0x5, 0xc95, 0x0, 0x7ff, 0x7b02, 0x7}, r2, 0x10, r1, 0xb) ioctl$PERF_EVENT_IOC_DISABLE(r3, 0x2401, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0x4) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = perf_event_open(&(0x7f0000000480)={0x7, 0x70, 0x7, 0xdbff, 0x3, 0x3f, 0x0, 0x8, 0x0, 0xc, 0x8, 0x0, 0xf43, 0x101, 0x6, 0x5, 0x6, 0x9, 0x200, 0xfffffffffffffffd, 0x4, 0x6, 0x6e, 0x20, 0x1b3, 0x1fe, 0x7ff, 0x3, 0x8000, 0x5, 0x0, 0x0, 0x0, 0x5, 0x22d2, 0x401, 0x68, 0xa1ce, 0x0, 0x4, 0x0, @perf_config_ext={0x2fb, 0x4}, 0x2000, 0xd33, 0x6, 0x697c4c7d75b7b6da, 0x171f, 0x9, 0x9}, r2, 0x6, r5, 0x1) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x9, 0x6, 0x101, 0x8, 0x0, 0x200, 0x2000, 0xf, 0x0, 0x5, 0x6, 0x3, 0x2, 0x0, 0x8001, 0x8, 0x3, 0x5, 0x17, 0x7, 0x4, 0x400, 0xffffffff, 0x7, 0x8000, 0x2, 0x100, 0x0, 0x7, 0x95de, 0x2, 0x1, 0x2, 0xd432, 0x3ff, 0x8599, 0x0, 0x3ff, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x10080, 0x7, 0xe7e, 0x7, 0x5, 0x7, 0x9}, r2, 0x0, r3, 0x8) close(r7) ioctl$PERF_EVENT_IOC_DISABLE(r9, 0x2401, 0x1) r10 = gettid() ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f00000005c0)={r0}) ioctl$sock_kcm_SIOCKCMUNATTACH(r11, 0x89e1, &(0x7f0000000600)={r8}) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000640)) r12 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)={0x4, 0x7, 0x7f, 0x9787, 0x1c, 0xffffffffffffffff, 0x5}, 0x2c) recvmsg$kcm(r11, &(0x7f0000009440)={&(0x7f0000009300)=@can={0x0, 0x0}, 0x80, &(0x7f00000093c0)=[{&(0x7f0000009380)=""/16, 0x10}], 0x1, &(0x7f0000009400)=""/18, 0x12, 0x3bc1}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000009480)={0xf, 0x13, &(0x7f00000006c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [@ldst={0x3, 0x2, 0x1, 0x2, 0x7, 0xffffffff, 0x4}, @map={0x18, 0x0, 0x1, 0x0, r12}, @alu={0x7, 0x5, 0xf, 0x6, 0xe, 0x2, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4}, @jmp={0x5, 0x7a4c, 0x0, 0x3, 0x9, 0xffffffff, 0xfffffffffffffff0}, @alu={0x4, 0x20, 0x9, 0x9, 0x5, 0xfffffffe, 0x4}, @jmp={0x5, 0x81, 0x9, 0x7, 0x6, 0xfffffffe, 0xfffffffffffffff0}, @jmp={0x5, 0x3, 0x3, 0x0, 0x2, 0x2, 0xffffffffffffffff}], {0x95}}, &(0x7f0000000780)='GPL\x00', 0x4, 0x77, &(0x7f00000007c0)=""/119, 0x0, 0x1, [], r13}, 0x48) mount(&(0x7f0000009500)='./file0\x00', &(0x7f0000009540)='./file0\x00', &(0x7f0000009580)='cramfs\x00', 0x5020, &(0x7f00000095c0)="22f464f8fef2b95976576e903efe99229584aaf55fa0d91223905d4a68c0c7d18bf26de6fec0660b0c36945200da04f802d9059dd5f6d2f0eca450f4fdd46ed2b411588d802f0d1d02be65816332b2754d686e927593deb8ee3ed17a24d749db81290c33836bcc9b7d93084c53d0744e81deb8b83d9b23565d6db4cb746eb15b20f7b806f0b5a02676d90260a61b00e9ec0b4b8bf07d5f93b3feda8299586c3936f743c764205de278c25a6fff98") perf_event_open(&(0x7f00000096c0)={0x1, 0x70, 0x3, 0xa8e, 0x1000, 0xe57a, 0x0, 0x6, 0x2100b, 0x2, 0x9, 0xdb1b, 0xfffffffffffffffa, 0xa7f8, 0x3, 0x2, 0x800, 0x800, 0x2, 0x0, 0x3f, 0x3, 0x8000000000000, 0x3, 0x20, 0x6, 0x3, 0xfffffffffffff318, 0xffffffffffff0001, 0xfffffffffffffffe, 0x12, 0x1, 0x101, 0x8, 0x100, 0x1, 0x3, 0x8, 0x0, 0x3ff, 0x7, @perf_bp={&(0x7f0000009680), 0x3}, 0x9, 0x6, 0xfffffffffffffff7, 0x0, 0x0, 0x49, 0xfffffffffffff3b8}, r10, 0xe, r5, 0x8) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000009880)={r12, &(0x7f0000009740)="8ba447000764036f17624e623896639a3e2456b901aedcdb4221cea83c3b2c94575967a34ec104bbebeaf6a6b50494e6763f41056d2ca84f906fa48d72590e81334926fab48e", &(0x7f00000097c0)=""/170}, 0x18) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r4, 0x2405, r6) bpf$PROG_LOAD(0x5, &(0x7f00000099c0)={0x7, 0x4, &(0x7f00000098c0)=@raw=[@ldst={0x3, 0x3, 0x6, 0xd, 0x7, 0x26}, @ldst={0x0, 0x2, 0x0, 0xa, 0x0, 0x4, 0xffffffffffffffff}], &(0x7f0000009900)='GPL\x00', 0x5, 0x5d, &(0x7f0000009940)=""/93, 0x41f00, 0x1, [], r13}, 0x48) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000009b40)={r8, &(0x7f0000009a40)="402c0b8b20e0ae84bb", &(0x7f0000009a80)=""/178}, 0x18) [ 190.214342] devpts: called with bogus options 2018/03/31 05:13:37 executing program 0: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f00000000c0)='./file0\x00', 0x0, 0x8}, 0x10) recvmsg(0xffffffffffffff9c, &(0x7f0000003d80)={&(0x7f0000003ac0)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000003c40)=[{&(0x7f0000003b40)=""/248, 0xf8}], 0x1, &(0x7f0000003c80)=""/201, 0xc9}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0xe, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x26, 0x25}, [], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0x40a, &(0x7f000000cf3d)=""/195, 0x41100, 0x0, [], r0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x2, 0xb, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2}, [@initr0={0x18, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x40}, @initr0={0x18, 0x0, 0x0, 0x0, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0xe7}, @jmp={0x5, 0xc3, 0xd, 0x0, 0xa11113ad2f64f09b, 0xfffffffc, 0xffffffffffffffff}, @generic={0xab, 0xac, 0xf17c, 0xe37}], {0x95}}, &(0x7f0000000080)='syzkaller\x00', 0xfe4e, 0xa9, &(0x7f0000000140)=""/169, 0x41100}, 0x48) [ 190.269814] FAULT_INJECTION: forcing a failure. [ 190.269814] name failslab, interval 1, probability 0, space 0, times 0 [ 190.281121] CPU: 1 PID: 16114 Comm: syz-executor6 Not tainted 4.16.0-rc6+ #42 [ 190.288396] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 190.297749] Call Trace: [ 190.300345] dump_stack+0x194/0x24d [ 190.303974] ? arch_local_irq_restore+0x53/0x53 [ 190.308645] ? __save_stack_trace+0x7e/0xd0 [ 190.312980] should_fail+0x8c0/0xa40 2018/03/31 05:13:37 executing program 4: mount(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='ncpfs\x00', 0x80802, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x50, &(0x7f0000000700)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780)=r0, 0x4) mount(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='./file0\x00', &(0x7f00000006c0)='btrfs\x00', 0x89402, &(0x7f0000000900)="e196efa3cb748d2a6600968b76295ff919bc3877b18eb8d265a35493fcf34fdc965cd5c837d2389c6e2ec6088abe8daaa8ca23f9298fc94dc26874bc4d4567afea1ca0879cdf21e915005a83e96b1002af29091d2176abbb7fec088a67f2e1390f32adaf2f252d24510870f8df7186936f4d88957eb8fcda78b7383a7d24db701d524557ee7324433e70d9ffa185098325f9e657d3c29cf6a35843cb96780269db1c735d55938af5c60e1e4ba25928697277b0fdf356b62399b4c8826d09bfca7d6078c19b4995195ea814b1bb40c06210ec") ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0xffffffff) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6f3, 0x0, 0x6, 0x0, 0x0, 0xfffdffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x22, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000f6bffb)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000400)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000540)={r1, 0x50}, 0xfffffe74) close(r1) perf_event_open(&(0x7f0000348f88)={0x2, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x28, 0x2, 0x0, &(0x7f0000000000)={0x0}) mkdir(&(0x7f0000000100)='./file0\x00', 0x1000000000) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='selinuxfs\x00', 0x1000, &(0x7f0000000100)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='minix\x00', 0x10020, &(0x7f0000000240)) [ 190.316582] devpts: called with bogus options [ 190.316690] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 190.326258] ? kasan_kmalloc+0xad/0xe0 [ 190.330145] ? kmem_cache_alloc_trace+0x136/0x740 [ 190.334982] ? __memcg_init_list_lru_node+0x169/0x270 [ 190.340173] ? __list_lru_init+0x544/0x750 [ 190.344407] ? sget_userns+0x6b1/0xe40 [ 190.348297] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 190.353045] ? do_mount+0xea4/0x2bb0 [ 190.356757] ? SyS_mount+0xab/0x120 [ 190.360386] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 190.365754] ? find_held_lock+0x35/0x1d0 2018/03/31 05:13:37 executing program 0: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001180)={&(0x7f00000011c0)='./file0\x00', 0x0, 0x80000000000000e}, 0x28d) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000001440)={&(0x7f0000001400)='./file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000000)='./file0\x00'}, 0x61) mount(&(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)="000009b8", 0x804022, &(0x7f0000000180)="236f589bc391ec020c4b1ae3e13cadf71f3cc18f423b0e7684cdbaf5ee05f65c1cc5d617b0c283fd30") socketpair(0xa, 0x80003, 0x7ac0, &(0x7f00000001c0)={0x0, 0xffffffffffffffff}) bpf$OBJ_GET_PROG(0x7, &(0x7f00000013c0)={&(0x7f0000001380)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_DISABLE(r1, 0x2401, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000001240)={r1, &(0x7f0000000200)="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", &(0x7f0000001200)="55fe"}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={r0, 0x28, &(0x7f00000000c0)}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001600)={r2, &(0x7f00000014c0)="a2bc1838300e0ba7c3d1f765a491303e61c8322b9b9152a46ee4b2d960c8b6b24c8d6e226842bfc7ff55fe742eaeb1303cca295e3b620dfbe74ede69", &(0x7f0000001740)=""/209}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f0000c47fec)={0x6, 0x4, 0x6879, 0xb, 0x0, 0xffffffffffffffff, 0x0, [0x4]}, 0x2c) r3 = gettid() perf_event_open(&(0x7f00000010c0)={0x2, 0x70, 0x6, 0x1, 0xfffffffffffffff9, 0xff, 0x0, 0xff, 0x40, 0x7, 0xc77, 0x10000, 0x0, 0x7fff, 0x3, 0x0, 0x7fffffff, 0x80000000, 0x6, 0x6, 0x20, 0x100000001, 0x5, 0x8, 0x3, 0x3, 0x6, 0x2, 0x45, 0x0, 0x5, 0x2, 0x40d, 0x4, 0x4, 0x49, 0x760d, 0xffffffff80000000, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000f80), 0x1}, 0x2000, 0x9, 0x1, 0x2, 0x1, 0x9}, r3, 0x10, r1, 0x9) mkdir(&(0x7f0000000dc0)='./file0/file0\x00', 0x14) mount(&(0x7f0000000e00)='./file0\x00', &(0x7f0000000e40)='./file0\x00', &(0x7f0000000e80)='selinuxfs\x00', 0x30060, 0x0) gettid() mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) r4 = perf_event_open(&(0x7f0000000400)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f00000003c0), 0x2}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = getpid() perf_event_open(&(0x7f0000000ec0)={0x1, 0x70, 0x2206, 0x1, 0x79903e19, 0xffffffffffffffff, 0x0, 0x1, 0x10, 0x2, 0xfffffffffffff800, 0x8000, 0x9, 0x5, 0x100, 0x8, 0x3, 0x3, 0x101, 0x9, 0x1, 0x5de, 0x5f97f252, 0x3742, 0x895, 0x3, 0x6, 0x2, 0x6, 0x3, 0x10000, 0x0, 0x3f, 0x6, 0x2a9f, 0xc0000000, 0x0, 0x1f, 0x0, 0xfffffffffffffffc, 0x3, @perf_config_ext={0x9, 0x2}, 0x4045, 0x1, 0x3, 0x0, 0x0, 0x1000, 0x4}, r5, 0x5, r1, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000001040)={&(0x7f0000000f40)='./file0\x00', 0x0, 0x8}, 0x10) socketpair(0xd, 0x80000, 0x7fffffff, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg(r1, &(0x7f0000001080)={&(0x7f0000000fc0)=@in={0x2, 0x4e21, @broadcast=0xffffffff}, 0x80, &(0x7f0000001040), 0x0, 0x0, 0x0, 0x4000000}, 0x40080d0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_REFRESH(r4, 0x2402, 0x1) mkdir(&(0x7f0000000080)='./file0\x00', 0x80) ioctl$PERF_EVENT_IOC_QUERY_BPF(r6, 0xc008240a, &(0x7f0000001280)=ANY=[@ANYBLOB="0600000000000000000000000000003000000000000000"]) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x80000, &(0x7f0000000080)) [ 190.369827] ? __lock_is_held+0xb6/0x140 [ 190.373909] ? check_same_owner+0x320/0x320 [ 190.378232] ? rcu_note_context_switch+0x710/0x710 [ 190.383169] should_failslab+0xec/0x120 [ 190.387147] kmem_cache_alloc_trace+0x4b/0x740 [ 190.391729] ? __kmalloc_node+0x33/0x70 [ 190.395703] ? __kmalloc_node+0x33/0x70 [ 190.399675] ? rcu_read_lock_sched_held+0x108/0x120 [ 190.404696] __memcg_init_list_lru_node+0x169/0x270 [ 190.409708] ? list_lru_add+0x7c0/0x7c0 [ 190.413680] ? __kmalloc_node+0x47/0x70 2018/03/31 05:13:37 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9}, 0x3d1) r1 = socket$kcm(0x29, 0x5, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x2) recvmsg$kcm(r1, &(0x7f0000001a80)={&(0x7f0000000980)=@can, 0x80, &(0x7f0000000280)=[{&(0x7f0000000040)=""/44, 0x2c}, {&(0x7f0000000080)=""/196, 0xc4}, {&(0x7f0000000180)=""/145, 0x91}], 0x10000000000000fa, &(0x7f0000001a40)=""/54, 0x36}, 0x1) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x18}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000028000)={r0, &(0x7f0000000200), &(0x7f0000000240)="13"}, 0x20) 2018/03/31 05:13:37 executing program 7: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xa, 0xff, 0x1f, 0x9, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r0, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r0, &(0x7f0000000040)}, 0x10) getpid() [ 190.417655] __list_lru_init+0x544/0x750 [ 190.421714] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 190.427597] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 190.432621] ? lockdep_init_map+0x9/0x10 [ 190.436683] sget_userns+0x6b1/0xe40 [ 190.440392] ? set_anon_super+0x20/0x20 [ 190.444373] ? put_filp+0x90/0x90 [ 190.447829] ? destroy_unused_super.part.6+0xd0/0xd0 [ 190.452935] ? alloc_vfsmnt+0x762/0x9c0 [ 190.456911] ? path_lookupat+0x238/0xba0 [ 190.460975] ? mnt_free_id.isra.21+0x50/0x50 [ 190.465389] ? trace_hardirqs_off+0x10/0x10 [ 190.469700] ? putname+0xee/0x130 [ 190.473138] ? cap_capable+0x1b5/0x230 [ 190.477014] ? security_capable+0x8e/0xc0 [ 190.481153] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 190.486327] ? ns_capable_common+0xcf/0x160 [ 190.490631] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 190.495800] mount_ns+0x6d/0x190 [ 190.499151] rpc_mount+0x9e/0xd0 [ 190.502499] mount_fs+0x66/0x2d0 [ 190.505850] vfs_kern_mount.part.26+0xc6/0x4a0 [ 190.510411] ? may_umount+0xa0/0xa0 [ 190.514022] ? _raw_read_unlock+0x22/0x30 [ 190.518156] ? __get_fs_type+0x8a/0xc0 [ 190.522035] do_mount+0xea4/0x2bb0 [ 190.525554] ? __might_fault+0x110/0x1d0 [ 190.529600] ? copy_mount_string+0x40/0x40 [ 190.533818] ? __check_object_size+0x8b/0x530 [ 190.538301] ? __might_sleep+0x95/0x190 [ 190.542262] ? kasan_check_write+0x14/0x20 [ 190.546477] ? _copy_from_user+0x99/0x110 [ 190.550607] ? memdup_user+0x5e/0x90 [ 190.554300] ? copy_mount_options+0x1f7/0x2e0 [ 190.558780] SyS_mount+0xab/0x120 [ 190.562213] ? copy_mnt_ns+0xb30/0xb30 [ 190.566085] do_syscall_64+0x281/0x940 [ 190.569951] ? vmalloc_sync_all+0x30/0x30 [ 190.574076] ? _raw_spin_unlock_irq+0x27/0x70 [ 190.578553] ? finish_task_switch+0x1c1/0x7e0 [ 190.583032] ? syscall_return_slowpath+0x550/0x550 [ 190.587945] ? syscall_return_slowpath+0x2ac/0x550 [ 190.592854] ? prepare_exit_to_usermode+0x350/0x350 [ 190.597851] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 190.603198] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 190.608031] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 190.613203] RIP: 0033:0x454e79 [ 190.616371] RSP: 002b:00007fc28ac9cc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 190.624060] RAX: ffffffffffffffda RBX: 00007fc28ac9d6d4 RCX: 0000000000454e79 [ 190.631310] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 190.638557] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 190.645805] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000016 [ 190.653053] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000032 2018/03/31 05:13:38 executing program 2: socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000040)={0x7, 0x70, 0x1, 0xaabc, 0x2, 0x2, 0x0, 0xec, 0x4800, 0x1, 0x3a6b72c9, 0xffffffffffff8000, 0xfff, 0x7, 0x2, 0x7, 0xff, 0x1, 0x2, 0x9, 0x1, 0x0, 0x5, 0x75, 0x2, 0x7, 0x8, 0x4, 0x0, 0xdbce, 0xffff, 0xfaf, 0x1, 0xe7, 0xd0eb, 0x28a5, 0x9, 0x4, 0x0, 0x7, 0x2, @perf_config_ext={0x1, 0x8000}, 0x489, 0x6, 0xff, 0x0, 0x9d, 0x8, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f00000000c0)={0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000140)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r2 = getpid() r3 = perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x8, 0x4, 0x4, 0x1, 0x0, 0x401, 0x100, 0x7, 0xcfc0, 0x7, 0x0, 0x7, 0x30, 0x7, 0x7, 0xfff, 0x7, 0x9, 0xff, 0x9, 0xf, 0x0, 0x3, 0x100000000, 0x3, 0x8, 0xffff, 0x2, 0x3, 0xff, 0x6f, 0x3, 0x5, 0x800, 0x81, 0x0, 0x0, 0x9, 0x1, @perf_bp={&(0x7f0000000180), 0x1}, 0x11815, 0x9, 0x1, 0x0, 0x101, 0x5, 0x1e892fee}, r2, 0x9, r1, 0x1) r4 = perf_event_open(&(0x7f0000000280)={0x5, 0x70, 0xe00000000000, 0x9, 0x800, 0x6, 0x0, 0x7ff, 0x10200, 0xb, 0xe3, 0x5, 0x1, 0x4, 0x9b0f, 0x1f8a, 0x401, 0x1, 0xe975, 0x7, 0x437, 0x9, 0x7f, 0x20, 0x1, 0x2, 0x3, 0x5, 0x200, 0x1, 0x8, 0x401, 0x401, 0x2, 0x8, 0xfff, 0xf3c8, 0xf23, 0x0, 0x7fffffff, 0x0, @perf_bp={&(0x7f0000000240), 0x9}, 0x828, 0x3, 0x5, 0x1, 0x0, 0xc37, 0x6}, r2, 0x4, r1, 0x2) r5 = perf_event_open(&(0x7f0000000300)={0x4, 0x70, 0xff, 0x3, 0x7f, 0x7, 0x0, 0x40, 0x4a240, 0x2, 0xffffffffffffcc27, 0xb8, 0x2, 0x7, 0x9, 0x800, 0x3, 0x7d4d, 0xf7, 0xfffffffffffffffa, 0x9, 0x4, 0x3, 0x90be, 0x9, 0xfffffffffffffffc, 0x6, 0x3ff, 0xab6b, 0x8001, 0x5, 0x2, 0x9, 0x732, 0x400, 0x55000000000, 0x1ff, 0x6, 0x0, 0x0, 0x2, @perf_config_ext={0x6, 0xffffffff}, 0x40, 0x80000001, 0x7fff, 0x2, 0x1, 0x6, 0x5}, r2, 0xf, r4, 0xa) r6 = perf_event_open(&(0x7f00000003c0)={0x7, 0x70, 0xc87d, 0x6, 0x5, 0x80000001, 0x0, 0x3, 0x1, 0xb, 0xffffffff, 0x9, 0x584, 0x31b, 0x7, 0x2, 0x3, 0x544, 0x100000001, 0x9, 0x1, 0x100, 0x3, 0x1, 0x7, 0x0, 0x7, 0x5, 0xbb, 0x40, 0x7, 0x8, 0x81, 0xc5a, 0x0, 0x7, 0x1f, 0x815, 0x0, 0xffff, 0x2, @perf_bp={&(0x7f0000000380), 0x8}, 0x4, 0x5, 0xc95, 0x0, 0x7ff, 0x7b02, 0x7}, r2, 0x10, r1, 0xb) ioctl$PERF_EVENT_IOC_DISABLE(r3, 0x2401, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0x4) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = perf_event_open(&(0x7f0000000480)={0x7, 0x70, 0x7, 0xdbff, 0x3, 0x3f, 0x0, 0x8, 0x0, 0xc, 0x8, 0x0, 0xf43, 0x101, 0x6, 0x5, 0x6, 0x9, 0x200, 0xfffffffffffffffd, 0x4, 0x6, 0x6e, 0x20, 0x1b3, 0x1fe, 0x7ff, 0x3, 0x8000, 0x5, 0x0, 0x0, 0x0, 0x5, 0x22d2, 0x401, 0x68, 0xa1ce, 0x0, 0x4, 0x0, @perf_config_ext={0x2fb, 0x4}, 0x2000, 0xd33, 0x6, 0x697c4c7d75b7b6da, 0x171f, 0x9, 0x9}, r2, 0x6, r5, 0x1) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x9, 0x6, 0x101, 0x8, 0x0, 0x200, 0x2000, 0xf, 0x0, 0x5, 0x6, 0x3, 0x2, 0x0, 0x8001, 0x8, 0x3, 0x5, 0x17, 0x7, 0x4, 0x400, 0xffffffff, 0x7, 0x8000, 0x2, 0x100, 0x0, 0x7, 0x95de, 0x2, 0x1, 0x2, 0xd432, 0x3ff, 0x8599, 0x0, 0x3ff, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x10080, 0x7, 0xe7e, 0x7, 0x5, 0x7, 0x9}, r2, 0x0, r3, 0x8) close(r7) ioctl$PERF_EVENT_IOC_DISABLE(r9, 0x2401, 0x1) r10 = gettid() ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f00000005c0)={r0}) ioctl$sock_kcm_SIOCKCMUNATTACH(r11, 0x89e1, &(0x7f0000000600)={r8}) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000640)) r12 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)={0x4, 0x7, 0x7f, 0x9787, 0x1c, 0xffffffffffffffff, 0x5}, 0x2c) recvmsg$kcm(r11, &(0x7f0000009440)={&(0x7f0000009300)=@can={0x0, 0x0}, 0x80, &(0x7f00000093c0)=[{&(0x7f0000009380)=""/16, 0x10}], 0x1, &(0x7f0000009400)=""/18, 0x12, 0x3bc1}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000009480)={0xf, 0x13, &(0x7f00000006c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [@ldst={0x3, 0x2, 0x1, 0x2, 0x7, 0xffffffff, 0x4}, @map={0x18, 0x0, 0x1, 0x0, r12}, @alu={0x7, 0x5, 0xf, 0x6, 0xe, 0x2, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4}, @jmp={0x5, 0x7a4c, 0x0, 0x3, 0x9, 0xffffffff, 0xfffffffffffffff0}, @alu={0x4, 0x20, 0x9, 0x9, 0x5, 0xfffffffe, 0x4}, @jmp={0x5, 0x81, 0x9, 0x7, 0x6, 0xfffffffe, 0xfffffffffffffff0}, @jmp={0x5, 0x3, 0x3, 0x0, 0x2, 0x2, 0xffffffffffffffff}], {0x95}}, &(0x7f0000000780)='GPL\x00', 0x4, 0x77, &(0x7f00000007c0)=""/119, 0x0, 0x1, [], r13}, 0x48) mount(&(0x7f0000009500)='./file0\x00', &(0x7f0000009540)='./file0\x00', &(0x7f0000009580)='cramfs\x00', 0x5020, &(0x7f00000095c0)="22f464f8fef2b95976576e903efe99229584aaf55fa0d91223905d4a68c0c7d18bf26de6fec0660b0c36945200da04f802d9059dd5f6d2f0eca450f4fdd46ed2b411588d802f0d1d02be65816332b2754d686e927593deb8ee3ed17a24d749db81290c33836bcc9b7d93084c53d0744e81deb8b83d9b23565d6db4cb746eb15b20f7b806f0b5a02676d90260a61b00e9ec0b4b8bf07d5f93b3feda8299586c3936f743c764205de278c25a6fff98") perf_event_open(&(0x7f00000096c0)={0x1, 0x70, 0x3, 0xa8e, 0x1000, 0xe57a, 0x0, 0x6, 0x2100b, 0x2, 0x9, 0xdb1b, 0xfffffffffffffffa, 0xa7f8, 0x3, 0x2, 0x800, 0x800, 0x2, 0x0, 0x3f, 0x3, 0x8000000000000, 0x3, 0x20, 0x6, 0x3, 0xfffffffffffff318, 0xffffffffffff0001, 0xfffffffffffffffe, 0x12, 0x1, 0x101, 0x8, 0x100, 0x1, 0x3, 0x8, 0x0, 0x3ff, 0x7, @perf_bp={&(0x7f0000009680), 0x3}, 0x9, 0x6, 0xfffffffffffffff7, 0x0, 0x0, 0x49, 0xfffffffffffff3b8}, r10, 0xe, r5, 0x8) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000009880)={r12, &(0x7f0000009740)="8ba447000764036f17624e623896639a3e2456b901aedcdb4221cea83c3b2c94575967a34ec104bbebeaf6a6b50494e6763f41056d2ca84f906fa48d72590e81334926fab48e", &(0x7f00000097c0)=""/170}, 0x18) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r4, 0x2405, r6) bpf$PROG_LOAD(0x5, &(0x7f00000099c0)={0x7, 0x4, &(0x7f00000098c0)=@raw=[@ldst={0x3, 0x3, 0x6, 0xd, 0x7, 0x26}, @ldst={0x0, 0x2, 0x0, 0xa, 0x0, 0x4, 0xffffffffffffffff}], &(0x7f0000009900)='GPL\x00', 0x5, 0x5d, &(0x7f0000009940)=""/93, 0x41f00, 0x1, [], r13}, 0x48) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000009b40)={r8, &(0x7f0000009a40)="402c0b8b20e0ae84bb", &(0x7f0000009a80)=""/178}, 0x18) 2018/03/31 05:13:38 executing program 7: socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000000000)) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x3, 0x4, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000011c0)={0xd, 0x5, &(0x7f0000000140)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95}}, &(0x7f0000000180)='GPL\x00', 0x1, 0x1000, &(0x7f00000001c0)=""/4096}, 0x48) 2018/03/31 05:13:38 executing program 5: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0)=0xffffffff, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000300)={&(0x7f0000000280)='./file0\x00', r0}, 0x10) socketpair(0x6ee57aacf6d97ba7, 0x7, 0x7, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x2, 0x9, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0xc26a}, [@alu={0x7, 0x9, 0x8, 0x7, 0x1, 0x0, 0x1}, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @jmp={0x5, 0x6, 0xf, 0x9, 0xa, 0xfffffffa, 0xffffffffffffffff}], {0x95}}, &(0x7f0000000100)='syzkaller\x00', 0xffff, 0x65, &(0x7f0000000140)=""/101, 0x41f00, 0x1}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000240)=r2, 0x4) socketpair(0xa, 0x803, 0x87, &(0x7f0000000040)) 2018/03/31 05:13:38 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x4, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="980000000093ea00000000000000d73400006a0aae3750ff012a13"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) socketpair$packet(0x11, 0x4, 0x300, &(0x7f0000001a80)={0xffffffffffffffff}) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000001a40)={&(0x7f00000003c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, r1, 0x4, 0x1, 0x2, 0x3, {0xa, 0x4e22, 0x1000, @mcast2={0xff, 0x2, [], 0x1}, 0x6}}}, 0x80, &(0x7f00000002c0)=[{&(0x7f0000000440)="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", 0x1000}, {&(0x7f0000001440)="b78f5629f4a9ef8a4f84d0d8a3dbacbab8aa2988bd0f41e8cf0f7efaa9ea5ff3aedcc779ccf0821ae479696cb900d208bf22f288c6a9499c26866cf572858caeb970a522ee6b3bcfc51591e3f50cc4b55cce4087467486f5758b0d9fc726f26f8d67e2bd3852e76e1829696b649fb63e4cfcf9a76f66d66f7c51bbfc15d1f3b7fb566ab0e33513dcaec377d9299ab2a9cbf0213c0dc78aa55732cf53e78453aa27a0025e37fbe93703950950e5a5ec8012c6fa820764853efeb4041e206fa640", 0xc0}, {&(0x7f0000001500)="229d57170f30f4f1c203f313f8b7ecaeaeab7c7bf803f6ba97dc27e3b2ac71c42d0919aa81c754e6fb9e22f4209b2dcbc4f43dd3cad24a5f86a6ceed768d585bd8d3f12e17d65ce3c52cdfa86f161b890621d4648841a8f0e5e7c3642e5b388d6171e03be39a6a14b7a82caea0769cd8a75c384fb1e1880a1642615fa3f0671f42f6dd7f5629c9fc66ba97ee8327ef3d75da55c1aa2aa1e072db4d579f42bf7e40280b7b1f655b3400feeeb1b6ae7a", 0xaf}], 0x3, &(0x7f00000015c0)=[{0x40, 0x101, 0x7, "1a15494841120350dcbfb62835c8bb13426c7f96a083c7a9966553851fc94d84c980f607259be85508626adfc0b5"}, {0x68, 0x10b, 0xa3, "a83d902b6b41d6b057c7999169b939885a5cbec9277a78d3fa26d920c81e4da33e317400d1d30fb7f11a7251ddcbe5f51917bf238a9188fdb56a3d9be323a5114265ae3e7746102b48a6ef8d9fc1ff4861121cc247864b"}, {0x58, 0x11f, 0x6, "6d1f29a783a46159e86bb80432164919f1f793f6c1940ca68d6acd23e34cad02c52e186a8072ffc0992f5ad18487c2d343418e0aceb0bee31682f0e30503b3b5fbcee19f92af"}, {0x88, 0x5951ab6791b8ea49, 0x1, "b816b6f91258ece907fd384c63ee75da2faae84da5648b415858d385347e9088c2cd2eed1d086b339ac9fa255bddafa2bd2e98ce1a390646a6b515d235199bb0ac42918d3652d666222eca8e58e06acd540fd54fce02a4ac5f1a1b3e1655b995d7a575679614968b11289f5ec9d90f842390"}, {0x48, 0x10e, 0x6, "77abfda96a9ae562731ad8ad7fbf6ff2f2dd790c516092dd9e415ba1fb7a684447c82bb518c9b9b58721c864cd9f11d1c666a6ba144c06"}, {0x88, 0x0, 0x200, "133da03b900f0894e834fc350d03b0cd1f77a96e06d0d3968378a4aba194fd63500d8b1ca0cb848e6d2e9b56d12259e9107c805c081abbea741ffbdc60977b27ae8a0ea9cbc4bd673cce0d86f4eb94597b7be5544ae54e5ae8391be7ce032c835c5889c4423d329d91a78566bd88a7ca23"}, {0x28, 0xff, 0xfffffffffffffffa, "5d551d1cf509767c21fb77bffdd7f90e8bfa9a31d0f5"}, {0xe0, 0x104, 0x100000001, "42c18bfd48e0308f6235b55535abccc3f1babfafd72699dbede85687ffa1cb9765fcc85d52a5f7340f67d63c3aa985fc747e9f71c0804bc8223b185f80243ba139d8808d2a33c0679903df8ba6d4851d78837db15a236ec0aa23c18c69384b3e39a0e1ee6dce478662b6df260eed0117290557128c6edbee89024bbc58979538cbd4e1e609e9f479a8c6dd53e919da0e8f98b37aa93f8c84d6ce41b81919a8a4571caefb73293b518c52473722ceb7a5cf322e6f02b430766c6ee4569fe5e227503d0ff1fbd84f1b7dcb86c9"}, {0xe8, 0x11f, 0x3ff8000000000000, "f1dc90c19baa9e0e7d4d04051fa7f8fce8cd57ac4fdee6a540c2baac49b12442f3ac89bcded813c77a0dd7698e4416b59067f08889398863e76a33e6be6d99f2ded8c71b0bc163d613433336a25ffa3034170164984bac49e29cefd7ea56c78e01b4f14726a37a92b193f8ca4d784b7689a68232d692db83d71a35443bab2b93df1a9148e534975f08ec9a9bed5cdc880052031ef847480919d1be5d8698fec1939f3c750088b49c09c1bbaf4b740f451c3573c4a82b4f1aa340469831e106c3a7626d2f316055e9a46e5289e0804e5f6c69b424ac"}], 0x448, 0x4008880}, 0x40044) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000080)=r2, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xd, 0x5, &(0x7f0000000040)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) 2018/03/31 05:13:38 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0xcf}, 0xfffffffffffffd40) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x10}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000200)={r0, 0x0, 0xe, 0xc3, &(0x7f0000000080)="81e60a1691f8189937e0db96f6aa", &(0x7f0000000100)=""/195, 0x3ff}, 0x28) 2018/03/31 05:13:38 executing program 6 (fault-call:17 fault-nth:51): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x0, 0x101, 0x4, 0x0, 0x1, r0, 0x0, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r2 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)={0xffffffffffffffff}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r2, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x0, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0", 0xc9}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000280)={&(0x7f0000000680)='./file0\x00'}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r1}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r3) gettid() close(0xffffffffffffffff) 2018/03/31 05:13:38 executing program 7: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000001fc0)) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000002000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r1, &(0x7f00000024c0)={&(0x7f0000002040)=@un=@file={0x0, './file0\x00'}, 0x80, &(0x7f0000001f40)=[{&(0x7f00000020c0)="73c7575b94a72990e177f86ed4835a72a65c1a6c6831eeb0c48163a47ab63bcb605c8450cc4798ff6521c2aa722d1a7105c8a07e6c", 0x35}], 0x1, &(0x7f0000002500)=ANY=[], 0x0, 0x40000}, 0x20000000) r2 = gettid() r3 = perf_event_open(&(0x7f0000001ac0)={0x1, 0x70, 0xffffffff, 0x835, 0x9, 0xffffffffffffff5f, 0x0, 0x1000, 0x42000, 0x3, 0x8, 0x80, 0x1, 0x4, 0x100000001, 0x9, 0xff, 0x8, 0x1000, 0x7, 0x7f, 0x200, 0xb715, 0x3, 0x7fffffff, 0xf0a, 0x40, 0x8000, 0x8, 0x7, 0xffffffffffffff74, 0x4, 0x6, 0x0, 0x7, 0x335, 0x3ff, 0x58, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000001a80), 0xe}, 0x244, 0x80000000, 0x82, 0x7, 0x5, 0x3, 0x80000001}, r2, 0xd, r0, 0x8) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000200)='mqueue\x00', 0x0, &(0x7f000000a000)) r4 = getpid() perf_event_open(&(0x7f0000001a00)={0x0, 0x70, 0x0, 0x8, 0x0, 0x3, 0x0, 0xb8, 0x1000, 0x0, 0x3, 0x4, 0xfff, 0x4, 0x4dae, 0x40, 0x100000001, 0x6, 0x4, 0x0, 0x3, 0x753c, 0x6, 0x100, 0x1de, 0x6, 0x4, 0x1, 0x6, 0x4, 0x7, 0x3, 0x7fff, 0x80000000, 0x3, 0x8, 0x81, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x7, 0x4}, 0x801, 0x400, 0x1, 0x4, 0x1, 0x9, 0x80000001}, r4, 0x7, r0, 0xb) r5 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000004000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_icmp(0xa, 0x2, 0x3a, &(0x7f0000002380)) mount(&(0x7f0000001c00)='./file0\x00', &(0x7f0000001c40)='./file0\x00', &(0x7f0000001c80)='devpts\x00', 0x40, &(0x7f0000001cc0)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r6, &(0x7f0000001800)={&(0x7f0000000240)=@alg, 0x80, &(0x7f0000000740)=[{&(0x7f00000002c0)=""/83, 0x53}, {&(0x7f0000000340)=""/27, 0x1b}, {&(0x7f0000000380)}, {&(0x7f00000003c0)=""/40, 0x28}, {&(0x7f0000000400)=""/144, 0x90}, {&(0x7f00000004c0)=""/200, 0xc8}, {&(0x7f00000005c0)=""/60, 0x3c}, {&(0x7f0000000600)=""/105, 0x69}, {&(0x7f0000000680)=""/127, 0x7f}, {&(0x7f0000000700)=""/8, 0x8}], 0xa, &(0x7f0000000800)=""/4096, 0x1000}, 0x10000) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000002340)=0xf60) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000003900)={&(0x7f0000003400)=@can={0x0, 0x0}, 0x80, &(0x7f0000003840)=[{&(0x7f0000003480)=""/194, 0xc2}, {&(0x7f0000003580)=""/250, 0xfa}, {&(0x7f0000003680)=""/100, 0x64}, {&(0x7f0000003700)=""/14, 0xe}, {&(0x7f0000003740)=""/159, 0x9f}, {&(0x7f0000003800)=""/15, 0xf}], 0x6, &(0x7f00000038c0)=""/29, 0x1d, 0x5}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000003940)={0x4, 0x9, &(0x7f0000001840)=ANY=[@ANYBLOB="18000000030000000000000003000000dfd00c00fcffffff0000000000000000000803000101000000000000000000003d01f0fff0ffffff000000000000000095000000000017d2"], &(0x7f0000000380)='GPL\x00', 0xf172, 0x4b, &(0x7f00000018c0)=""/75, 0x41f00, 0x1, [], r7}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000000c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001f00)={0xffffffffffffffff, 0x0, 0xf6, 0x22, &(0x7f0000001dc0)="9ef9482ea02fd36d0a768986a7ebe7a627dc88937e7073e3521858dfa0d5e02f571a01cfdfa76e048e5f956ea5da60b90e02a6c3d3687ed61ec9ab5b682c02498bddef38de9ce8c753e41e78f414d16202a033b6c7752711a5f56924e7846d6dcde2f71026e1eb0319b5e60f6b1ec67fca31c3cf1691d3af91a19f56be5a10ff337a53ba13dd3d75e1555211954b92ec0082d02b7b4cdddc021cbe84e4af8f20788977e3416918843e6c92b2ebf7b8b33ecbd4c7c9a9d5036c3e3e538748a32f1a28eb77818ca1878ffdd445dcdb8a40e6221e0fc474428449dfe93c62bbc69996aa9b34488c1da4f6f7c2275305a6a4fb256c1a516d", &(0x7f0000001ec0)=""/34, 0x1f, 0x1}, 0x28) close(r5) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000001bc0)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x3441, &(0x7f0000000080)) mount(&(0x7f00000021c0)='./file0/file0\x00', &(0x7f0000002200)='./file0/file0\x00', &(0x7f0000002240)='fuse\x00', 0x2000000, &(0x7f0000002280)="9b3923bfddc346e9fa2aeaffae6ca386d8d50ba83ab72218340d3c30c045a89ac016797652ba04f1a203cfceccb458dbfd9fd03c4a80ef9a40dc7a4f24b6619d04a58186466fd8465757d9ee053c082cdfa957e7efab6191761847cca59c017493ef5e3d22432cf0b4ebef") ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000001940)=ANY=[@ANYBLOB="07000000000000000000000000000000000000000000000000000000000000000000000067eb0ecf1c127df7274c9ea1675e02fa4ffd89aa7e339417beb7d332a5c996e59875644dd1e3a690110400bc751bb0435977d90fcbb2b83c27812d818991d125e9c0f199be2bc7f01aa0a5cb9b9f99438aa0f1ae3d50201f7bb276536f567f03f062994da292b6db0000000000000000000000000000"]) mount(&(0x7f0000001b40)='./file0\x00', &(0x7f0000001b80)='./file0/file0\x00', &(0x7f0000002100)='vfat\x00', 0x0, &(0x7f0000002140)="98980e21ac8b46c0b7bedeee39e6bd9ae4088d6ab47dc9dc76a39e299ce3783aa33e482e450484961fd3e3c5b178fafbe54440e19512ea4298652ed129d4241d9d116d8a5c2b931d350f0c989f8a288fc9e56c") mount(&(0x7f0000002400)='./file0\x00', &(0x7f0000001d80)='./file0/file0\x00', &(0x7f0000002300)="68756765746c62667300951a3d22b5c20442eb", 0x200, &(0x7f0000001d40)="0f89afb4ba642b331b455695e04360696f05a6f7769ff371a9d631378c05b9a3ba084a08ee55cd3d0c731b433dd5199cc1") mkdir(&(0x7f00000004c0)='./file0/file0\x00', 0x0) socketpair$inet(0x2, 0x0, 0x1f, &(0x7f0000000080)) 2018/03/31 05:13:38 executing program 2: socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000040)={0x7, 0x70, 0x1, 0xaabc, 0x2, 0x2, 0x0, 0xec, 0x4800, 0x1, 0x3a6b72c9, 0xffffffffffff8000, 0xfff, 0x7, 0x2, 0x7, 0xff, 0x1, 0x2, 0x9, 0x1, 0x0, 0x5, 0x75, 0x2, 0x7, 0x8, 0x4, 0x0, 0xdbce, 0xffff, 0xfaf, 0x1, 0xe7, 0xd0eb, 0x28a5, 0x9, 0x4, 0x0, 0x7, 0x2, @perf_config_ext={0x1, 0x8000}, 0x489, 0x6, 0xff, 0x0, 0x9d, 0x8, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f00000000c0)={0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000140)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r2 = getpid() r3 = perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x8, 0x4, 0x4, 0x1, 0x0, 0x401, 0x100, 0x7, 0xcfc0, 0x7, 0x0, 0x7, 0x30, 0x7, 0x7, 0xfff, 0x7, 0x9, 0xff, 0x9, 0xf, 0x0, 0x3, 0x100000000, 0x3, 0x8, 0xffff, 0x2, 0x3, 0xff, 0x6f, 0x3, 0x5, 0x800, 0x81, 0x0, 0x0, 0x9, 0x1, @perf_bp={&(0x7f0000000180), 0x1}, 0x11815, 0x9, 0x1, 0x0, 0x101, 0x5, 0x1e892fee}, r2, 0x9, r1, 0x1) r4 = perf_event_open(&(0x7f0000000280)={0x5, 0x70, 0xe00000000000, 0x9, 0x800, 0x6, 0x0, 0x7ff, 0x10200, 0xb, 0xe3, 0x5, 0x1, 0x4, 0x9b0f, 0x1f8a, 0x401, 0x1, 0xe975, 0x7, 0x437, 0x9, 0x7f, 0x20, 0x1, 0x2, 0x3, 0x5, 0x200, 0x1, 0x8, 0x401, 0x401, 0x2, 0x8, 0xfff, 0xf3c8, 0xf23, 0x0, 0x7fffffff, 0x0, @perf_bp={&(0x7f0000000240), 0x9}, 0x828, 0x3, 0x5, 0x1, 0x0, 0xc37, 0x6}, r2, 0x4, r1, 0x2) r5 = perf_event_open(&(0x7f0000000300)={0x4, 0x70, 0xff, 0x3, 0x7f, 0x7, 0x0, 0x40, 0x4a240, 0x2, 0xffffffffffffcc27, 0xb8, 0x2, 0x7, 0x9, 0x800, 0x3, 0x7d4d, 0xf7, 0xfffffffffffffffa, 0x9, 0x4, 0x3, 0x90be, 0x9, 0xfffffffffffffffc, 0x6, 0x3ff, 0xab6b, 0x8001, 0x5, 0x2, 0x9, 0x732, 0x400, 0x55000000000, 0x1ff, 0x6, 0x0, 0x0, 0x2, @perf_config_ext={0x6, 0xffffffff}, 0x40, 0x80000001, 0x7fff, 0x2, 0x1, 0x6, 0x5}, r2, 0xf, r4, 0xa) r6 = perf_event_open(&(0x7f00000003c0)={0x7, 0x70, 0xc87d, 0x6, 0x5, 0x80000001, 0x0, 0x3, 0x1, 0xb, 0xffffffff, 0x9, 0x584, 0x31b, 0x7, 0x2, 0x3, 0x544, 0x100000001, 0x9, 0x1, 0x100, 0x3, 0x1, 0x7, 0x0, 0x7, 0x5, 0xbb, 0x40, 0x7, 0x8, 0x81, 0xc5a, 0x0, 0x7, 0x1f, 0x815, 0x0, 0xffff, 0x2, @perf_bp={&(0x7f0000000380), 0x8}, 0x4, 0x5, 0xc95, 0x0, 0x7ff, 0x7b02, 0x7}, r2, 0x10, r1, 0xb) ioctl$PERF_EVENT_IOC_DISABLE(r3, 0x2401, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0x4) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = perf_event_open(&(0x7f0000000480)={0x7, 0x70, 0x7, 0xdbff, 0x3, 0x3f, 0x0, 0x8, 0x0, 0xc, 0x8, 0x0, 0xf43, 0x101, 0x6, 0x5, 0x6, 0x9, 0x200, 0xfffffffffffffffd, 0x4, 0x6, 0x6e, 0x20, 0x1b3, 0x1fe, 0x7ff, 0x3, 0x8000, 0x5, 0x0, 0x0, 0x0, 0x5, 0x22d2, 0x401, 0x68, 0xa1ce, 0x0, 0x4, 0x0, @perf_config_ext={0x2fb, 0x4}, 0x2000, 0xd33, 0x6, 0x697c4c7d75b7b6da, 0x171f, 0x9, 0x9}, r2, 0x6, r5, 0x1) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x9, 0x6, 0x101, 0x8, 0x0, 0x200, 0x2000, 0xf, 0x0, 0x5, 0x6, 0x3, 0x2, 0x0, 0x8001, 0x8, 0x3, 0x5, 0x17, 0x7, 0x4, 0x400, 0xffffffff, 0x7, 0x8000, 0x2, 0x100, 0x0, 0x7, 0x95de, 0x2, 0x1, 0x2, 0xd432, 0x3ff, 0x8599, 0x0, 0x3ff, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x10080, 0x7, 0xe7e, 0x7, 0x5, 0x7, 0x9}, r2, 0x0, r3, 0x8) close(r7) ioctl$PERF_EVENT_IOC_DISABLE(r9, 0x2401, 0x1) r10 = gettid() ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f00000005c0)={r0}) ioctl$sock_kcm_SIOCKCMUNATTACH(r11, 0x89e1, &(0x7f0000000600)={r8}) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000640)) r12 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)={0x4, 0x7, 0x7f, 0x9787, 0x1c, 0xffffffffffffffff, 0x5}, 0x2c) recvmsg$kcm(r11, &(0x7f0000009440)={&(0x7f0000009300)=@can={0x0, 0x0}, 0x80, &(0x7f00000093c0)=[{&(0x7f0000009380)=""/16, 0x10}], 0x1, &(0x7f0000009400)=""/18, 0x12, 0x3bc1}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000009480)={0xf, 0x13, &(0x7f00000006c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [@ldst={0x3, 0x2, 0x1, 0x2, 0x7, 0xffffffff, 0x4}, @map={0x18, 0x0, 0x1, 0x0, r12}, @alu={0x7, 0x5, 0xf, 0x6, 0xe, 0x2, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4}, @jmp={0x5, 0x7a4c, 0x0, 0x3, 0x9, 0xffffffff, 0xfffffffffffffff0}, @alu={0x4, 0x20, 0x9, 0x9, 0x5, 0xfffffffe, 0x4}, @jmp={0x5, 0x81, 0x9, 0x7, 0x6, 0xfffffffe, 0xfffffffffffffff0}, @jmp={0x5, 0x3, 0x3, 0x0, 0x2, 0x2, 0xffffffffffffffff}], {0x95}}, &(0x7f0000000780)='GPL\x00', 0x4, 0x77, &(0x7f00000007c0)=""/119, 0x0, 0x1, [], r13}, 0x48) mount(&(0x7f0000009500)='./file0\x00', &(0x7f0000009540)='./file0\x00', &(0x7f0000009580)='cramfs\x00', 0x5020, &(0x7f00000095c0)="22f464f8fef2b95976576e903efe99229584aaf55fa0d91223905d4a68c0c7d18bf26de6fec0660b0c36945200da04f802d9059dd5f6d2f0eca450f4fdd46ed2b411588d802f0d1d02be65816332b2754d686e927593deb8ee3ed17a24d749db81290c33836bcc9b7d93084c53d0744e81deb8b83d9b23565d6db4cb746eb15b20f7b806f0b5a02676d90260a61b00e9ec0b4b8bf07d5f93b3feda8299586c3936f743c764205de278c25a6fff98") perf_event_open(&(0x7f00000096c0)={0x1, 0x70, 0x3, 0xa8e, 0x1000, 0xe57a, 0x0, 0x6, 0x2100b, 0x2, 0x9, 0xdb1b, 0xfffffffffffffffa, 0xa7f8, 0x3, 0x2, 0x800, 0x800, 0x2, 0x0, 0x3f, 0x3, 0x8000000000000, 0x3, 0x20, 0x6, 0x3, 0xfffffffffffff318, 0xffffffffffff0001, 0xfffffffffffffffe, 0x12, 0x1, 0x101, 0x8, 0x100, 0x1, 0x3, 0x8, 0x0, 0x3ff, 0x7, @perf_bp={&(0x7f0000009680), 0x3}, 0x9, 0x6, 0xfffffffffffffff7, 0x0, 0x0, 0x49, 0xfffffffffffff3b8}, r10, 0xe, r5, 0x8) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000009880)={r12, &(0x7f0000009740)="8ba447000764036f17624e623896639a3e2456b901aedcdb4221cea83c3b2c94575967a34ec104bbebeaf6a6b50494e6763f41056d2ca84f906fa48d72590e81334926fab48e", &(0x7f00000097c0)=""/170}, 0x18) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r4, 0x2405, r6) bpf$PROG_LOAD(0x5, &(0x7f00000099c0)={0x7, 0x4, &(0x7f00000098c0)=@raw=[@ldst={0x3, 0x3, 0x6, 0xd, 0x7, 0x26}, @ldst={0x0, 0x2, 0x0, 0xa, 0x0, 0x4, 0xffffffffffffffff}], &(0x7f0000009900)='GPL\x00', 0x5, 0x5d, &(0x7f0000009940)=""/93, 0x41f00, 0x1, [], r13}, 0x48) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000009b40)={r8, &(0x7f0000009a40)="402c0b8b20e0ae84bb", &(0x7f0000009a80)=""/178}, 0x18) 2018/03/31 05:13:38 executing program 4: mount(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='ncpfs\x00', 0x80802, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x50, &(0x7f0000000700)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780)=r0, 0x4) mount(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='./file0\x00', &(0x7f00000006c0)='btrfs\x00', 0x89402, &(0x7f0000000900)="e196efa3cb748d2a6600968b76295ff919bc3877b18eb8d265a35493fcf34fdc965cd5c837d2389c6e2ec6088abe8daaa8ca23f9298fc94dc26874bc4d4567afea1ca0879cdf21e915005a83e96b1002af29091d2176abbb7fec088a67f2e1390f32adaf2f252d24510870f8df7186936f4d88957eb8fcda78b7383a7d24db701d524557ee7324433e70d9ffa185098325f9e657d3c29cf6a35843cb96780269db1c735d55938af5c60e1e4ba25928697277b0fdf356b62399b4c8826d09bfca7d6078c19b4995195ea814b1bb40c06210ec") ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0xffffffff) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0xfffdffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x22, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000f6bffb)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000400)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000540)={r1, 0x50}, 0xfffffe74) close(r1) perf_event_open(&(0x7f0000348f88)={0x2, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x28, 0x2, 0x0, &(0x7f0000000000)={0x0}) mkdir(&(0x7f0000000100)='./file0\x00', 0x1000000000) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='selinuxfs\x00', 0x1000, &(0x7f0000000100)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='minix\x00', 0x10020, &(0x7f0000000240)) [ 190.895953] FAULT_INJECTION: forcing a failure. [ 190.895953] name failslab, interval 1, probability 0, space 0, times 0 [ 190.907273] CPU: 1 PID: 16166 Comm: syz-executor6 Not tainted 4.16.0-rc6+ #42 [ 190.914543] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 190.923887] Call Trace: [ 190.926478] dump_stack+0x194/0x24d [ 190.930106] ? arch_local_irq_restore+0x53/0x53 [ 190.934775] ? __save_stack_trace+0x7e/0xd0 [ 190.939084] should_fail+0x8c0/0xa40 [ 190.942777] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 190.947860] ? kasan_kmalloc+0xad/0xe0 [ 190.951724] ? kmem_cache_alloc_trace+0x136/0x740 [ 190.956547] ? __memcg_init_list_lru_node+0x169/0x270 [ 190.961711] ? __list_lru_init+0x544/0x750 [ 190.965922] ? sget_userns+0x6b1/0xe40 [ 190.969785] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 190.974517] ? do_mount+0xea4/0x2bb0 [ 190.978205] ? SyS_mount+0xab/0x120 [ 190.981810] ? do_syscall_64+0x281/0x940 [ 190.985848] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 190.991190] ? find_held_lock+0x35/0x1d0 [ 190.995228] ? __lock_is_held+0xb6/0x140 [ 190.999274] ? check_same_owner+0x320/0x320 [ 191.003574] ? rcu_note_context_switch+0x710/0x710 [ 191.008486] should_failslab+0xec/0x120 [ 191.012436] kmem_cache_alloc_trace+0x4b/0x740 [ 191.016992] ? __kmalloc_node+0x33/0x70 [ 191.020948] __memcg_init_list_lru_node+0x169/0x270 [ 191.025941] ? list_lru_add+0x7c0/0x7c0 [ 191.029888] ? __kmalloc_node+0x47/0x70 [ 191.033839] __list_lru_init+0x544/0x750 [ 191.037876] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 191.043740] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 191.048739] ? lockdep_init_map+0x9/0x10 [ 191.052777] sget_userns+0x6b1/0xe40 [ 191.056466] ? set_anon_super+0x20/0x20 [ 191.060417] ? put_filp+0x90/0x90 [ 191.063846] ? destroy_unused_super.part.6+0xd0/0xd0 [ 191.068923] ? alloc_vfsmnt+0x762/0x9c0 [ 191.072872] ? path_lookupat+0x238/0xba0 [ 191.076907] ? mnt_free_id.isra.21+0x50/0x50 [ 191.081290] ? trace_hardirqs_off+0x10/0x10 [ 191.085585] ? putname+0xee/0x130 [ 191.089021] ? cap_capable+0x1b5/0x230 [ 191.092886] ? security_capable+0x8e/0xc0 [ 191.097017] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 191.102184] ? ns_capable_common+0xcf/0x160 [ 191.106483] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 191.111646] mount_ns+0x6d/0x190 [ 191.114989] rpc_mount+0x9e/0xd0 [ 191.118335] mount_fs+0x66/0x2d0 [ 191.121676] vfs_kern_mount.part.26+0xc6/0x4a0 [ 191.126236] ? may_umount+0xa0/0xa0 [ 191.129837] ? _raw_read_unlock+0x22/0x30 [ 191.133960] ? __get_fs_type+0x8a/0xc0 [ 191.137822] do_mount+0xea4/0x2bb0 [ 191.141339] ? __might_fault+0x110/0x1d0 [ 191.145377] ? copy_mount_string+0x40/0x40 [ 191.149586] ? check_same_owner+0x320/0x320 [ 191.153884] ? __check_object_size+0x8b/0x530 [ 191.158357] ? __might_sleep+0x95/0x190 [ 191.162309] ? kasan_check_write+0x14/0x20 [ 191.166519] ? _copy_from_user+0x99/0x110 [ 191.170645] ? memdup_user+0x5e/0x90 [ 191.174332] ? copy_mount_options+0x1f7/0x2e0 [ 191.178805] SyS_mount+0xab/0x120 [ 191.182232] ? copy_mnt_ns+0xb30/0xb30 [ 191.186094] do_syscall_64+0x281/0x940 [ 191.189957] ? vmalloc_sync_all+0x30/0x30 [ 191.194077] ? _raw_spin_unlock_irq+0x27/0x70 [ 191.198548] ? finish_task_switch+0x1c1/0x7e0 [ 191.203025] ? syscall_return_slowpath+0x550/0x550 [ 191.207930] ? syscall_return_slowpath+0x2ac/0x550 [ 191.212835] ? prepare_exit_to_usermode+0x350/0x350 [ 191.217827] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 191.223166] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 191.227986] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 191.233151] RIP: 0033:0x454e79 [ 191.236315] RSP: 002b:00007fc28ac9cc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 191.243995] RAX: ffffffffffffffda RBX: 00007fc28ac9d6d4 RCX: 0000000000454e79 [ 191.251243] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 191.258486] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 191.265729] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000016 [ 191.272971] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000033 [ 191.341567] hugetlbfs: Bad mount option: "‰¯´ºd+3EV•àC`io¦÷vŸóq©Ö17Œ¹£ºJîUÍ= sC=ÕœÁ" 2018/03/31 05:13:38 executing program 0: r0 = perf_event_open(&(0x7f00000001c0)={0x5, 0x70, 0x200, 0x8, 0xffffffffffff2d96, 0x2, 0x0, 0x5, 0x2, 0x5, 0xffffffffffff6733, 0xffffffffffff0001, 0x3623, 0x9, 0x701dd65e, 0x80000001, 0x200, 0x23, 0x6ea, 0xfffffffffffffffc, 0x80000001, 0x400, 0xb2, 0x9, 0x1, 0x3, 0x1, 0x3, 0xbf, 0x4, 0x8, 0x4, 0x80000000, 0x5, 0x5, 0x401, 0x7, 0xff, 0x0, 0x8, 0x1, @perf_config_ext={0x939a721, 0x700000}, 0x400, 0x81, 0xfb, 0x0, 0x9, 0xffffffff00000001, 0x10000}, 0x0, 0xf, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x119) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x6, 0x3, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)="9fedb6586e1f628fec59b0a1de3a748a2024cb06cbfc3f54a65d9947dbad126094aa43aee1cdd9a6d95d4a208cc8810fef1f8036bbb7ce2198abe165877c2cb1c321b4c3eee6e197803e1ae397ed6629329fd92555cf8da6df4859ebadd0cf2374c2961cbed56a2b60a784f15ec3fc77690b325107f1603e", 0x1, 0x99, &(0x7f0000000000)=""/153}, 0x48) 2018/03/31 05:13:38 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000831000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f00000013c0)='mqueue.', 0x0, &(0x7f0000001400)) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000600)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000003c0)={&(0x7f0000000100)=@ipx, 0x80, &(0x7f0000000080)=[{&(0x7f0000000180)=""/97, 0x61}, {&(0x7f0000000200)=""/218, 0xda}], 0x2, &(0x7f0000000300)=""/161, 0xa1, 0x6}, 0x2000) 2018/03/31 05:13:38 executing program 7: r0 = getpid() socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000002900)) r1 = perf_event_open(&(0x7f0000348f88)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, r0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0xc377) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x139, &(0x7f00000007c0), 0x0, &(0x7f0000000100)=""/63, 0x3f, 0xfffffffffffffffc}, 0xfffffffffffffffe) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000140)=0x6) mkdir(&(0x7f000075bff8)='./file0\x00', 0x0) socketpair(0x10, 0x800, 0x5, &(0x7f0000001100)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = perf_event_open(&(0x7f0000001340)={0x7, 0x70, 0xfffffffffffffff9, 0x9, 0x5, 0xff, 0x0, 0x7fff, 0x0, 0x1, 0x3, 0x6, 0x457, 0x3, 0x5, 0x3, 0x9, 0xb0, 0x40, 0x1, 0x0, 0x2, 0x0, 0x8001, 0x1, 0x0, 0x6, 0x4, 0x0, 0xff, 0x9, 0x7fff, 0x100000000, 0x8, 0x7, 0x6ad, 0xffffffffffffff14, 0x0, 0x0, 0x39, 0x4, @perf_config_ext={0x6, 0x80000000}, 0x400, 0xfffffffffffffff8, 0xffffffffffffff81, 0x3, 0x2, 0x6, 0xb75}, 0x0, 0x7, r4, 0x8) recvmsg$kcm(r3, &(0x7f0000001300)={0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000001140)=""/131, 0x83}], 0x1, &(0x7f0000001240)=""/134, 0x86, 0xfff}, 0x2000) perf_event_open(&(0x7f000000a000)={0x1, 0x78, 0x0, 0x0, 0xb140, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x800000, 0x0, @perf_bp={&(0x7f0000000000), 0x800000}, 0x0, 0x20000000, 0x6, 0x400010, 0x100}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000002700)='./file2\x00', 0x3) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)='sysv\x00', 0x0, &(0x7f0000000100)="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") mount(&(0x7f00009f8000)='./file0\x00', &(0x7f0000a3bff8)='./file0\x00', &(0x7f00000026c0)='nfs4\x00', 0x0, &(0x7f000000a000)) socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f0000000180)) perf_event_open(&(0x7f00000001c0)={0x3, 0x70, 0x4594dab1, 0x0, 0xc600000000000000, 0x1, 0x0, 0xd53f, 0x80008, 0x0, 0x0, 0x44d1, 0x3, 0x1, 0x10001, 0x100, 0x40, 0x7, 0x15c000000000000, 0x0, 0x42, 0x7, 0x1, 0x8, 0x1, 0x7, 0x0, 0x81, 0x3, 0x5, 0x4, 0x1, 0x5, 0x7a52, 0xfffffffffffffff8, 0x1, 0x0, 0xffff, 0x0, 0x2, 0x1, @perf_config_ext={0x1ff}, 0x430, 0x401, 0x100000000, 0x1, 0x0, 0x890b, 0x80000000}, 0x0, 0x5, r2, 0x1) recvmsg$kcm(r3, &(0x7f0000002a80)={&(0x7f0000002640)=@pptp={0x0, 0x0, {0x0, @local}}, 0x80, &(0x7f0000002980)=[{&(0x7f00000028c0)=""/60, 0x3c}], 0x1, &(0x7f00000029c0)=""/163, 0xa3, 0x1}, 0x2000) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000002940)) recvmsg$kcm(r4, &(0x7f0000002600)={0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000013c0)=""/113, 0x71}, {&(0x7f0000001440)=""/4096, 0x1000}, {&(0x7f0000002440)=""/15, 0xf}, {&(0x7f0000002480)=""/227, 0xe3}], 0x4, &(0x7f00000025c0)=""/61, 0x3d, 0x7fffffff}, 0x2001) perf_event_open(&(0x7f0000002780)={0x4, 0x70, 0x9, 0x3, 0x2, 0x0, 0x0, 0x5, 0x40000, 0x4, 0x3, 0x8, 0x0, 0x4, 0x7fffffff, 0x63, 0x3, 0x80, 0x9, 0x468e, 0x10000, 0x11, 0x5, 0xff, 0x20, 0x20, 0x2, 0x40, 0x400, 0x0, 0x5, 0x557, 0x9, 0x9e, 0x3ff, 0x1, 0x0, 0x1, 0x0, 0x3, 0x4, @perf_bp={&(0x7f0000002740)}, 0x0, 0x1, 0x4, 0x2, 0x401, 0x6, 0x1f}, r0, 0xc, r5, 0x1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000002880)={0xffffffffffffffff, 0x50, &(0x7f0000002800)}, 0x10) 2018/03/31 05:13:38 executing program 2: socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000040)={0x7, 0x70, 0x1, 0xaabc, 0x2, 0x2, 0x0, 0xec, 0x4800, 0x1, 0x3a6b72c9, 0xffffffffffff8000, 0xfff, 0x7, 0x2, 0x7, 0xff, 0x1, 0x2, 0x9, 0x1, 0x0, 0x5, 0x75, 0x2, 0x7, 0x8, 0x4, 0x0, 0xdbce, 0xffff, 0xfaf, 0x1, 0xe7, 0xd0eb, 0x28a5, 0x9, 0x4, 0x0, 0x7, 0x2, @perf_config_ext={0x1, 0x8000}, 0x489, 0x6, 0xff, 0x0, 0x9d, 0x8, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f00000000c0)={0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000140)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r2 = getpid() r3 = perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x8, 0x4, 0x4, 0x1, 0x0, 0x401, 0x100, 0x7, 0xcfc0, 0x7, 0x0, 0x7, 0x30, 0x7, 0x7, 0xfff, 0x7, 0x9, 0xff, 0x9, 0xf, 0x0, 0x3, 0x100000000, 0x3, 0x8, 0xffff, 0x2, 0x3, 0xff, 0x6f, 0x3, 0x5, 0x800, 0x81, 0x0, 0x0, 0x9, 0x1, @perf_bp={&(0x7f0000000180), 0x1}, 0x11815, 0x9, 0x1, 0x1, 0x0, 0x5, 0x1e892fee}, r2, 0x9, r1, 0x1) r4 = perf_event_open(&(0x7f0000000280)={0x5, 0x70, 0xe00000000000, 0x9, 0x800, 0x6, 0x0, 0x7ff, 0x10200, 0xb, 0xe3, 0x5, 0x1, 0x4, 0x9b0f, 0x1f8a, 0x401, 0x1, 0xe975, 0x7, 0x437, 0x9, 0x7f, 0x20, 0x1, 0x2, 0x3, 0x5, 0x200, 0x1, 0x8, 0x401, 0x401, 0x2, 0x8, 0xfff, 0xf3c8, 0xf23, 0x0, 0x7fffffff, 0x0, @perf_bp={&(0x7f0000000240), 0x9}, 0x828, 0x3, 0x5, 0x1, 0x0, 0xc37, 0x6}, r2, 0x4, r1, 0x2) r5 = perf_event_open(&(0x7f0000000300)={0x4, 0x70, 0xff, 0x3, 0x7f, 0x7, 0x0, 0x40, 0x4a240, 0x2, 0xffffffffffffcc27, 0xb8, 0x2, 0x7, 0x9, 0x800, 0x3, 0x7d4d, 0xf7, 0xfffffffffffffffa, 0x9, 0x4, 0x3, 0x90be, 0x9, 0xfffffffffffffffc, 0x6, 0x3ff, 0xab6b, 0x8001, 0x5, 0x2, 0x9, 0x732, 0x400, 0x55000000000, 0x1ff, 0x6, 0x0, 0x0, 0x2, @perf_config_ext={0x6, 0xffffffff}, 0x40, 0x80000001, 0x7fff, 0x2, 0x1, 0x6, 0x5}, r2, 0xf, r4, 0xa) r6 = perf_event_open(&(0x7f00000003c0)={0x7, 0x70, 0xc87d, 0x6, 0x5, 0x80000001, 0x0, 0x3, 0x1, 0xb, 0xffffffff, 0x9, 0x584, 0x31b, 0x7, 0x2, 0x3, 0x544, 0x100000001, 0x9, 0x1, 0x100, 0x3, 0x1, 0x7, 0x0, 0x7, 0x5, 0xbb, 0x40, 0x7, 0x8, 0x81, 0xc5a, 0x0, 0x7, 0x1f, 0x815, 0x0, 0xffff, 0x2, @perf_bp={&(0x7f0000000380), 0x8}, 0x4, 0x5, 0xc95, 0x0, 0x7ff, 0x7b02, 0x7}, r2, 0x10, r1, 0xb) ioctl$PERF_EVENT_IOC_DISABLE(r3, 0x2401, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0x4) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = perf_event_open(&(0x7f0000000480)={0x7, 0x70, 0x7, 0xdbff, 0x3, 0x3f, 0x0, 0x8, 0x0, 0xc, 0x8, 0x0, 0xf43, 0x101, 0x6, 0x5, 0x6, 0x9, 0x200, 0xfffffffffffffffd, 0x4, 0x6, 0x6e, 0x20, 0x1b3, 0x1fe, 0x7ff, 0x3, 0x8000, 0x5, 0x0, 0x0, 0x0, 0x5, 0x22d2, 0x401, 0x68, 0xa1ce, 0x0, 0x4, 0x0, @perf_config_ext={0x2fb, 0x4}, 0x2000, 0xd33, 0x6, 0x697c4c7d75b7b6da, 0x171f, 0x9, 0x9}, r2, 0x6, r5, 0x1) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x9, 0x6, 0x101, 0x8, 0x0, 0x200, 0x2000, 0xf, 0x0, 0x5, 0x6, 0x3, 0x2, 0x0, 0x8001, 0x8, 0x3, 0x5, 0x17, 0x7, 0x4, 0x400, 0xffffffff, 0x7, 0x8000, 0x2, 0x100, 0x0, 0x7, 0x95de, 0x2, 0x1, 0x2, 0xd432, 0x3ff, 0x8599, 0x0, 0x3ff, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x10080, 0x7, 0xe7e, 0x7, 0x5, 0x7, 0x9}, r2, 0x0, r3, 0x8) close(r7) ioctl$PERF_EVENT_IOC_DISABLE(r9, 0x2401, 0x1) r10 = gettid() ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f00000005c0)={r0}) ioctl$sock_kcm_SIOCKCMUNATTACH(r11, 0x89e1, &(0x7f0000000600)={r8}) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000640)) r12 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)={0x4, 0x7, 0x7f, 0x9787, 0x1c, 0xffffffffffffffff, 0x5}, 0x2c) recvmsg$kcm(r11, &(0x7f0000009440)={&(0x7f0000009300)=@can={0x0, 0x0}, 0x80, &(0x7f00000093c0)=[{&(0x7f0000009380)=""/16, 0x10}], 0x1, &(0x7f0000009400)=""/18, 0x12, 0x3bc1}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000009480)={0xf, 0x13, &(0x7f00000006c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [@ldst={0x3, 0x2, 0x1, 0x2, 0x7, 0xffffffff, 0x4}, @map={0x18, 0x0, 0x1, 0x0, r12}, @alu={0x7, 0x5, 0xf, 0x6, 0xe, 0x2, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4}, @jmp={0x5, 0x7a4c, 0x0, 0x3, 0x9, 0xffffffff, 0xfffffffffffffff0}, @alu={0x4, 0x20, 0x9, 0x9, 0x5, 0xfffffffe, 0x4}, @jmp={0x5, 0x81, 0x9, 0x7, 0x6, 0xfffffffe, 0xfffffffffffffff0}, @jmp={0x5, 0x3, 0x3, 0x0, 0x2, 0x2, 0xffffffffffffffff}], {0x95}}, &(0x7f0000000780)='GPL\x00', 0x4, 0x77, &(0x7f00000007c0)=""/119, 0x0, 0x1, [], r13}, 0x48) mount(&(0x7f0000009500)='./file0\x00', &(0x7f0000009540)='./file0\x00', &(0x7f0000009580)='cramfs\x00', 0x5020, &(0x7f00000095c0)="22f464f8fef2b95976576e903efe99229584aaf55fa0d91223905d4a68c0c7d18bf26de6fec0660b0c36945200da04f802d9059dd5f6d2f0eca450f4fdd46ed2b411588d802f0d1d02be65816332b2754d686e927593deb8ee3ed17a24d749db81290c33836bcc9b7d93084c53d0744e81deb8b83d9b23565d6db4cb746eb15b20f7b806f0b5a02676d90260a61b00e9ec0b4b8bf07d5f93b3feda8299586c3936f743c764205de278c25a6fff98") perf_event_open(&(0x7f00000096c0)={0x1, 0x70, 0x3, 0xa8e, 0x1000, 0xe57a, 0x0, 0x6, 0x2100b, 0x2, 0x9, 0xdb1b, 0xfffffffffffffffa, 0xa7f8, 0x3, 0x2, 0x800, 0x800, 0x2, 0x0, 0x3f, 0x3, 0x8000000000000, 0x3, 0x20, 0x6, 0x3, 0xfffffffffffff318, 0xffffffffffff0001, 0xfffffffffffffffe, 0x12, 0x1, 0x101, 0x8, 0x100, 0x1, 0x3, 0x8, 0x0, 0x3ff, 0x7, @perf_bp={&(0x7f0000009680), 0x3}, 0x9, 0x6, 0xfffffffffffffff7, 0x0, 0x0, 0x49, 0xfffffffffffff3b8}, r10, 0xe, r5, 0x8) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000009880)={r12, &(0x7f0000009740)="8ba447000764036f17624e623896639a3e2456b901aedcdb4221cea83c3b2c94575967a34ec104bbebeaf6a6b50494e6763f41056d2ca84f906fa48d72590e81334926fab48e", &(0x7f00000097c0)=""/170}, 0x18) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r4, 0x2405, r6) bpf$PROG_LOAD(0x5, &(0x7f00000099c0)={0x7, 0x4, &(0x7f00000098c0)=@raw=[@ldst={0x3, 0x3, 0x6, 0xd, 0x7, 0x26}, @ldst={0x0, 0x2, 0x0, 0xa, 0x0, 0x4, 0xffffffffffffffff}], &(0x7f0000009900)='GPL\x00', 0x5, 0x5d, &(0x7f0000009940)=""/93, 0x41f00, 0x1, [], r13}, 0x48) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000009b40)={r8, &(0x7f0000009a40)="402c0b8b20e0ae84bb", &(0x7f0000009a80)=""/178}, 0x18) 2018/03/31 05:13:38 executing program 4: mount(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='ncpfs\x00', 0x80802, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x50, &(0x7f0000000700)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780)=r0, 0x4) mount(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='./file0\x00', &(0x7f00000006c0)='btrfs\x00', 0x89402, &(0x7f0000000900)="e196efa3cb748d2a6600968b76295ff919bc3877b18eb8d265a35493fcf34fdc965cd5c837d2389c6e2ec6088abe8daaa8ca23f9298fc94dc26874bc4d4567afea1ca0879cdf21e915005a83e96b1002af29091d2176abbb7fec088a67f2e1390f32adaf2f252d24510870f8df7186936f4d88957eb8fcda78b7383a7d24db701d524557ee7324433e70d9ffa185098325f9e657d3c29cf6a35843cb96780269db1c735d55938af5c60e1e4ba25928697277b0fdf356b62399b4c8826d09bfca7d6078c19b4995195ea814b1bb40c06210ec") ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0xffffffff) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0xfffdffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x22, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000f6bffb)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000400)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000540)={r1, 0x50}, 0xfffffe74) close(r1) perf_event_open(&(0x7f0000348f88)={0x2, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x28, 0x2, 0x0, &(0x7f0000000000)={0x0}) mkdir(&(0x7f0000000100)='./file0\x00', 0x1000000000) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='selinuxfs\x00', 0x1000, &(0x7f0000000100)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='minix\x00', 0x10020, &(0x7f0000000240)) 2018/03/31 05:13:38 executing program 6 (fault-call:17 fault-nth:52): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x0, 0x101, 0x4, 0x0, 0x1, r0, 0x0, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r2 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)={0xffffffffffffffff}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r2, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x0, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0", 0xc9}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000280)={&(0x7f0000000680)='./file0\x00'}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r1}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r3) gettid() close(0xffffffffffffffff) 2018/03/31 05:13:38 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x4, 0x0, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x1e, 0x0, 0x3, 0x6, 0x1, r0, 0x6773}, 0x2c) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1, 0x2, 0x7, 0x8001, 0x10, 0xffffffffffffffff, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000580)={0xffffffffffffffff, &(0x7f00000004c0)="a3261c57", &(0x7f0000000500)="cd8249bf39d6176ef7346799ac199e6cf9e7fe02418812a394d9c874384d4ba7bd9d3b261f1a018d54c20e688a5dc8a23babc41d618e", 0x2}, 0x20) sendmsg(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080), 0x1e}], 0x1000000000000020}, 0x8000) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000780)={r0, &(0x7f0000000680), &(0x7f00000006c0)=""/166}, 0x18) socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f0000000340)) mount(&(0x7f0000000440)='./file0\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='pstore\x00', 0x4, &(0x7f0000000640)="afb63e3ff55419f9e9572aabeb90d8184a20d3c850fa576f0f0d376978dcd77395a8eb26002ef5146d") mkdir(&(0x7f0000000300)='./file0\x00', 0x60) r2 = perf_event_open(&(0x7f0000000200)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000000), 0x8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f00000007c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000003700)={&(0x7f0000000280)=@pppoe={0x0, 0x0, {0x0, @broadcast}}, 0x80, &(0x7f00000036c0)=[{&(0x7f0000003400)=""/251, 0xfb}, {&(0x7f0000003500)=""/14, 0xe}, {&(0x7f0000003540)=""/107, 0x6b}, {&(0x7f00000035c0)=""/211, 0xd3}], 0x4, 0x0, 0x0, 0x3ff}, 0x1) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000ec0)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f00000008c0)={r4}) recvmsg$kcm(r6, &(0x7f0000000a40)={&(0x7f0000000a80)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x3c1, &(0x7f0000000a00)=[{&(0x7f0000000980)=""/101, 0x65}], 0x1}, 0x10001) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x1) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000180)) bpf$PROG_LOAD(0x5, &(0x7f0000000c00)={0xf, 0xb, &(0x7f0000000900)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x2, 0x1, 0x0, r4}, @generic={0x0, 0x77, 0x498, 0x20}, @alu={0x0, 0x0, 0xa, 0x4, 0x6, 0x30, 0x8}, @exit={0x95}], {0x95}}, &(0x7f0000000b00)='syzkaller\x00', 0x1, 0x87, &(0x7f0000000b40)=""/135, 0x41100, 0x1, [], r7}, 0x48) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000dec000)={0x6, 0x4, 0x338d, 0x7}, 0x2c) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f00000001c0)) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000c88000)={r8, &(0x7f0000847f95), &(0x7f000089b000)}, 0x18) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000540)) socketpair(0x800010, 0x4, 0x8, &(0x7f0000000c80)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMUNATTACH(r9, 0x89e1, &(0x7f0000000880)={r4}) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000800)) 2018/03/31 05:13:38 executing program 3: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000003c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r0, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) [ 191.420513] hugetlbfs: Bad mount option: "‰¯´ºd+3EV•àC`io¦÷vŸóq©Ö17Œ¹£ºJîUÍ= sC=ÕœÁ" [ 191.481154] FAULT_INJECTION: forcing a failure. [ 191.481154] name failslab, interval 1, probability 0, space 0, times 0 [ 191.492450] CPU: 0 PID: 16204 Comm: syz-executor6 Not tainted 4.16.0-rc6+ #42 [ 191.499722] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 191.509070] Call Trace: [ 191.511659] dump_stack+0x194/0x24d [ 191.515295] ? arch_local_irq_restore+0x53/0x53 [ 191.519960] ? __save_stack_trace+0x7e/0xd0 [ 191.524290] should_fail+0x8c0/0xa40 [ 191.528006] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 191.533109] ? kasan_kmalloc+0xad/0xe0 [ 191.536994] ? kmem_cache_alloc_trace+0x136/0x740 [ 191.541832] ? __memcg_init_list_lru_node+0x169/0x270 [ 191.547012] ? __list_lru_init+0x544/0x750 [ 191.551236] ? sget_userns+0x6b1/0xe40 [ 191.555119] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 191.559872] ? do_mount+0xea4/0x2bb0 [ 191.563578] ? SyS_mount+0xab/0x120 [ 191.567208] ? do_syscall_64+0x281/0x940 [ 191.571267] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 191.576631] ? find_held_lock+0x35/0x1d0 [ 191.580695] ? __lock_is_held+0xb6/0x140 [ 191.584763] ? check_same_owner+0x320/0x320 [ 191.589086] ? rcu_note_context_switch+0x710/0x710 [ 191.594018] should_failslab+0xec/0x120 [ 191.597993] kmem_cache_alloc_trace+0x4b/0x740 [ 191.602573] ? __kmalloc_node+0x33/0x70 [ 191.606542] ? __kmalloc_node+0x33/0x70 [ 191.610514] ? rcu_read_lock_sched_held+0x108/0x120 [ 191.615531] __memcg_init_list_lru_node+0x169/0x270 [ 191.620541] ? list_lru_add+0x7c0/0x7c0 [ 191.624500] ? __kmalloc_node+0x47/0x70 [ 191.628459] __list_lru_init+0x544/0x750 [ 191.632505] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 191.638372] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 191.643369] ? lockdep_init_map+0x9/0x10 [ 191.647408] sget_userns+0x6b1/0xe40 [ 191.651099] ? set_anon_super+0x20/0x20 [ 191.655051] ? put_filp+0x90/0x90 [ 191.658482] ? destroy_unused_super.part.6+0xd0/0xd0 [ 191.663561] ? alloc_vfsmnt+0x762/0x9c0 [ 191.667511] ? path_lookupat+0x238/0xba0 [ 191.671549] ? mnt_free_id.isra.21+0x50/0x50 [ 191.675938] ? trace_hardirqs_off+0x10/0x10 [ 191.680240] ? putname+0xee/0x130 [ 191.683671] ? cap_capable+0x1b5/0x230 [ 191.687538] ? security_capable+0x8e/0xc0 [ 191.691665] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 191.696833] ? ns_capable_common+0xcf/0x160 [ 191.701132] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 191.706296] mount_ns+0x6d/0x190 [ 191.709638] rpc_mount+0x9e/0xd0 [ 191.712981] mount_fs+0x66/0x2d0 [ 191.716330] vfs_kern_mount.part.26+0xc6/0x4a0 [ 191.720895] ? may_umount+0xa0/0xa0 [ 191.724498] ? _raw_read_unlock+0x22/0x30 [ 191.728619] ? __get_fs_type+0x8a/0xc0 [ 191.732483] do_mount+0xea4/0x2bb0 [ 191.736000] ? __might_fault+0x110/0x1d0 [ 191.740044] ? copy_mount_string+0x40/0x40 [ 191.744253] ? check_same_owner+0x320/0x320 [ 191.748551] ? __check_object_size+0x8b/0x530 [ 191.753030] ? __might_sleep+0x95/0x190 [ 191.756984] ? kasan_check_write+0x14/0x20 [ 191.761197] ? _copy_from_user+0x99/0x110 [ 191.765325] ? memdup_user+0x5e/0x90 [ 191.769017] ? copy_mount_options+0x1f7/0x2e0 [ 191.773493] SyS_mount+0xab/0x120 [ 191.776919] ? copy_mnt_ns+0xb30/0xb30 [ 191.780783] do_syscall_64+0x281/0x940 [ 191.784648] ? vmalloc_sync_all+0x30/0x30 [ 191.788769] ? _raw_spin_unlock_irq+0x27/0x70 [ 191.793240] ? finish_task_switch+0x1c1/0x7e0 [ 191.797708] ? syscall_return_slowpath+0x550/0x550 [ 191.802613] ? syscall_return_slowpath+0x2ac/0x550 [ 191.807520] ? prepare_exit_to_usermode+0x350/0x350 [ 191.812512] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 191.817858] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 191.822680] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 191.827846] RIP: 0033:0x454e79 2018/03/31 05:13:38 executing program 2: socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000040)={0x7, 0x70, 0x1, 0xaabc, 0x2, 0x2, 0x0, 0xec, 0x4800, 0x1, 0x3a6b72c9, 0xffffffffffff8000, 0xfff, 0x7, 0x2, 0x7, 0xff, 0x1, 0x2, 0x9, 0x1, 0x0, 0x5, 0x75, 0x2, 0x7, 0x8, 0x4, 0x0, 0xdbce, 0xffff, 0xfaf, 0x1, 0xe7, 0xd0eb, 0x28a5, 0x9, 0x4, 0x0, 0x7, 0x2, @perf_config_ext={0x1, 0x8000}, 0x489, 0x6, 0xff, 0x0, 0x9d, 0x8, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f00000000c0)={0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000140)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r2 = getpid() r3 = perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x8, 0x4, 0x4, 0x1, 0x0, 0x401, 0x100, 0x7, 0xcfc0, 0x7, 0x0, 0x7, 0x30, 0x7, 0x7, 0xfff, 0x7, 0x9, 0xff, 0x9, 0xf, 0x0, 0x3, 0x100000000, 0x3, 0x8, 0xffff, 0x2, 0x3, 0xff, 0x6f, 0x3, 0x5, 0x800, 0x81, 0x0, 0x0, 0x9, 0x1, @perf_bp={&(0x7f0000000180), 0x1}, 0x11815, 0x9, 0x1, 0x1, 0x0, 0x5, 0x1e892fee}, r2, 0x9, r1, 0x1) r4 = perf_event_open(&(0x7f0000000280)={0x5, 0x70, 0xe00000000000, 0x9, 0x800, 0x6, 0x0, 0x7ff, 0x10200, 0xb, 0xe3, 0x5, 0x1, 0x4, 0x9b0f, 0x1f8a, 0x401, 0x1, 0xe975, 0x7, 0x437, 0x9, 0x7f, 0x20, 0x1, 0x2, 0x3, 0x5, 0x200, 0x1, 0x8, 0x401, 0x401, 0x2, 0x8, 0xfff, 0xf3c8, 0xf23, 0x0, 0x7fffffff, 0x0, @perf_bp={&(0x7f0000000240), 0x9}, 0x828, 0x3, 0x5, 0x1, 0x0, 0xc37, 0x6}, r2, 0x4, r1, 0x2) r5 = perf_event_open(&(0x7f0000000300)={0x4, 0x70, 0xff, 0x3, 0x7f, 0x7, 0x0, 0x40, 0x4a240, 0x2, 0xffffffffffffcc27, 0xb8, 0x2, 0x7, 0x9, 0x800, 0x3, 0x7d4d, 0xf7, 0xfffffffffffffffa, 0x9, 0x4, 0x3, 0x90be, 0x9, 0xfffffffffffffffc, 0x6, 0x3ff, 0xab6b, 0x8001, 0x5, 0x2, 0x9, 0x732, 0x400, 0x55000000000, 0x1ff, 0x6, 0x0, 0x0, 0x2, @perf_config_ext={0x6, 0xffffffff}, 0x40, 0x80000001, 0x7fff, 0x2, 0x1, 0x6, 0x5}, r2, 0xf, r4, 0xa) r6 = perf_event_open(&(0x7f00000003c0)={0x7, 0x70, 0xc87d, 0x6, 0x5, 0x80000001, 0x0, 0x3, 0x1, 0xb, 0xffffffff, 0x9, 0x584, 0x31b, 0x7, 0x2, 0x3, 0x544, 0x100000001, 0x9, 0x1, 0x100, 0x3, 0x1, 0x7, 0x0, 0x7, 0x5, 0xbb, 0x40, 0x7, 0x8, 0x81, 0xc5a, 0x0, 0x7, 0x1f, 0x815, 0x0, 0xffff, 0x2, @perf_bp={&(0x7f0000000380), 0x8}, 0x4, 0x5, 0xc95, 0x0, 0x7ff, 0x7b02, 0x7}, r2, 0x10, r1, 0xb) ioctl$PERF_EVENT_IOC_DISABLE(r3, 0x2401, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0x4) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = perf_event_open(&(0x7f0000000480)={0x7, 0x70, 0x7, 0xdbff, 0x3, 0x3f, 0x0, 0x8, 0x0, 0xc, 0x8, 0x0, 0xf43, 0x101, 0x6, 0x5, 0x6, 0x9, 0x200, 0xfffffffffffffffd, 0x4, 0x6, 0x6e, 0x20, 0x1b3, 0x1fe, 0x7ff, 0x3, 0x8000, 0x5, 0x0, 0x0, 0x0, 0x5, 0x22d2, 0x401, 0x68, 0xa1ce, 0x0, 0x4, 0x0, @perf_config_ext={0x2fb, 0x4}, 0x2000, 0xd33, 0x6, 0x697c4c7d75b7b6da, 0x171f, 0x9, 0x9}, r2, 0x6, r5, 0x1) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x9, 0x6, 0x101, 0x8, 0x0, 0x200, 0x2000, 0xf, 0x0, 0x5, 0x6, 0x3, 0x2, 0x0, 0x8001, 0x8, 0x3, 0x5, 0x17, 0x7, 0x4, 0x400, 0xffffffff, 0x7, 0x8000, 0x2, 0x100, 0x0, 0x7, 0x95de, 0x2, 0x1, 0x2, 0xd432, 0x3ff, 0x8599, 0x0, 0x3ff, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x10080, 0x7, 0xe7e, 0x7, 0x5, 0x7, 0x9}, r2, 0x0, r3, 0x8) close(r7) ioctl$PERF_EVENT_IOC_DISABLE(r9, 0x2401, 0x1) r10 = gettid() ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f00000005c0)={r0}) ioctl$sock_kcm_SIOCKCMUNATTACH(r11, 0x89e1, &(0x7f0000000600)={r8}) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000640)) r12 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)={0x4, 0x7, 0x7f, 0x9787, 0x1c, 0xffffffffffffffff, 0x5}, 0x2c) recvmsg$kcm(r11, &(0x7f0000009440)={&(0x7f0000009300)=@can={0x0, 0x0}, 0x80, &(0x7f00000093c0)=[{&(0x7f0000009380)=""/16, 0x10}], 0x1, &(0x7f0000009400)=""/18, 0x12, 0x3bc1}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000009480)={0xf, 0x13, &(0x7f00000006c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [@ldst={0x3, 0x2, 0x1, 0x2, 0x7, 0xffffffff, 0x4}, @map={0x18, 0x0, 0x1, 0x0, r12}, @alu={0x7, 0x5, 0xf, 0x6, 0xe, 0x2, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4}, @jmp={0x5, 0x7a4c, 0x0, 0x3, 0x9, 0xffffffff, 0xfffffffffffffff0}, @alu={0x4, 0x20, 0x9, 0x9, 0x5, 0xfffffffe, 0x4}, @jmp={0x5, 0x81, 0x9, 0x7, 0x6, 0xfffffffe, 0xfffffffffffffff0}, @jmp={0x5, 0x3, 0x3, 0x0, 0x2, 0x2, 0xffffffffffffffff}], {0x95}}, &(0x7f0000000780)='GPL\x00', 0x4, 0x77, &(0x7f00000007c0)=""/119, 0x0, 0x1, [], r13}, 0x48) mount(&(0x7f0000009500)='./file0\x00', &(0x7f0000009540)='./file0\x00', &(0x7f0000009580)='cramfs\x00', 0x5020, &(0x7f00000095c0)="22f464f8fef2b95976576e903efe99229584aaf55fa0d91223905d4a68c0c7d18bf26de6fec0660b0c36945200da04f802d9059dd5f6d2f0eca450f4fdd46ed2b411588d802f0d1d02be65816332b2754d686e927593deb8ee3ed17a24d749db81290c33836bcc9b7d93084c53d0744e81deb8b83d9b23565d6db4cb746eb15b20f7b806f0b5a02676d90260a61b00e9ec0b4b8bf07d5f93b3feda8299586c3936f743c764205de278c25a6fff98") perf_event_open(&(0x7f00000096c0)={0x1, 0x70, 0x3, 0xa8e, 0x1000, 0xe57a, 0x0, 0x6, 0x2100b, 0x2, 0x9, 0xdb1b, 0xfffffffffffffffa, 0xa7f8, 0x3, 0x2, 0x800, 0x800, 0x2, 0x0, 0x3f, 0x3, 0x8000000000000, 0x3, 0x20, 0x6, 0x3, 0xfffffffffffff318, 0xffffffffffff0001, 0xfffffffffffffffe, 0x12, 0x1, 0x101, 0x8, 0x100, 0x1, 0x3, 0x8, 0x0, 0x3ff, 0x7, @perf_bp={&(0x7f0000009680), 0x3}, 0x9, 0x6, 0xfffffffffffffff7, 0x0, 0x0, 0x49, 0xfffffffffffff3b8}, r10, 0xe, r5, 0x8) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000009880)={r12, &(0x7f0000009740)="8ba447000764036f17624e623896639a3e2456b901aedcdb4221cea83c3b2c94575967a34ec104bbebeaf6a6b50494e6763f41056d2ca84f906fa48d72590e81334926fab48e", &(0x7f00000097c0)=""/170}, 0x18) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r4, 0x2405, r6) bpf$PROG_LOAD(0x5, &(0x7f00000099c0)={0x7, 0x4, &(0x7f00000098c0)=@raw=[@ldst={0x3, 0x3, 0x6, 0xd, 0x7, 0x26}, @ldst={0x0, 0x2, 0x0, 0xa, 0x0, 0x4, 0xffffffffffffffff}], &(0x7f0000009900)='GPL\x00', 0x5, 0x5d, &(0x7f0000009940)=""/93, 0x41f00, 0x1, [], r13}, 0x48) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000009b40)={r8, &(0x7f0000009a40)="402c0b8b20e0ae84bb", &(0x7f0000009a80)=""/178}, 0x18) 2018/03/31 05:13:38 executing program 0: socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000001c0)) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000000)=0x9) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f00000000c0)=0x6) r1 = gettid() perf_event_open(&(0x7f0000000200)={0x5, 0x70, 0x0, 0x7, 0x2, 0x4000000000, 0x0, 0xffff, 0x8800, 0x1, 0x100000000, 0x2, 0x73b6, 0x400, 0x0, 0x4, 0x7, 0xc2, 0x8, 0x5, 0x4010000000000000, 0x2000000000, 0x8, 0x71, 0x9, 0x3f3, 0x8ca, 0x8, 0x8, 0x6, 0x7fff, 0xffffffffffffffad, 0x20, 0x8, 0x1, 0x1, 0x7, 0x8, 0x0, 0x2, 0x4, @perf_bp={&(0x7f0000000180), 0x1}, 0x0, 0x9, 0x81, 0x0, 0x401, 0x4, 0x9}, r1, 0xc, r0, 0xa) r2 = gettid() perf_event_open(&(0x7f0000000100)={0x7, 0x70, 0x5, 0x0, 0x0, 0x1f, 0x0, 0x62f7, 0xa4200, 0x5, 0xffffffffffff0000, 0x4, 0x9, 0x100000001, 0x177, 0x401, 0x2, 0x0, 0x7fffffff, 0x400, 0x5, 0x7, 0x401, 0x0, 0x200, 0x2, 0x9, 0xffffffff80000000, 0x7, 0x9, 0x8, 0x7fff, 0x8, 0x8, 0xf4b, 0x100000000, 0x401, 0x6, 0x0, 0x1000, 0x2, @perf_bp={&(0x7f0000000080), 0xb}, 0x0, 0x1, 0x7, 0x0, 0x3f, 0x5, 0xfffffffffffffffd}, r2, 0x0, r0, 0x8) socketpair$inet6(0xa, 0x8000f, 0x1, &(0x7f0000000040)) 2018/03/31 05:13:39 executing program 2: socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000040)={0x7, 0x70, 0x1, 0xaabc, 0x2, 0x2, 0x0, 0xec, 0x4800, 0x1, 0x3a6b72c9, 0xffffffffffff8000, 0xfff, 0x7, 0x2, 0x7, 0xff, 0x1, 0x2, 0x9, 0x1, 0x0, 0x5, 0x75, 0x2, 0x7, 0x8, 0x4, 0x0, 0xdbce, 0xffff, 0xfaf, 0x1, 0xe7, 0xd0eb, 0x28a5, 0x9, 0x4, 0x0, 0x7, 0x2, @perf_config_ext={0x1, 0x8000}, 0x489, 0x6, 0xff, 0x0, 0x9d, 0x8, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f00000000c0)={0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000140)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r2 = getpid() r3 = perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x8, 0x4, 0x4, 0x1, 0x0, 0x401, 0x100, 0x7, 0xcfc0, 0x7, 0x0, 0x7, 0x30, 0x7, 0x7, 0xfff, 0x7, 0x9, 0xff, 0x9, 0xf, 0x0, 0x3, 0x100000000, 0x3, 0x8, 0xffff, 0x2, 0x3, 0xff, 0x6f, 0x3, 0x5, 0x800, 0x81, 0x0, 0x0, 0x9, 0x1, @perf_bp={&(0x7f0000000180), 0x1}, 0x11815, 0x9, 0x1, 0x1, 0x0, 0x5, 0x1e892fee}, r2, 0x9, r1, 0x1) r4 = perf_event_open(&(0x7f0000000280)={0x5, 0x70, 0xe00000000000, 0x9, 0x800, 0x6, 0x0, 0x7ff, 0x10200, 0xb, 0xe3, 0x5, 0x1, 0x4, 0x9b0f, 0x1f8a, 0x401, 0x1, 0xe975, 0x7, 0x437, 0x9, 0x7f, 0x20, 0x1, 0x2, 0x3, 0x5, 0x200, 0x1, 0x8, 0x401, 0x401, 0x2, 0x8, 0xfff, 0xf3c8, 0xf23, 0x0, 0x7fffffff, 0x0, @perf_bp={&(0x7f0000000240), 0x9}, 0x828, 0x3, 0x5, 0x1, 0x0, 0xc37, 0x6}, r2, 0x4, r1, 0x2) r5 = perf_event_open(&(0x7f0000000300)={0x4, 0x70, 0xff, 0x3, 0x7f, 0x7, 0x0, 0x40, 0x4a240, 0x2, 0xffffffffffffcc27, 0xb8, 0x2, 0x7, 0x9, 0x800, 0x3, 0x7d4d, 0xf7, 0xfffffffffffffffa, 0x9, 0x4, 0x3, 0x90be, 0x9, 0xfffffffffffffffc, 0x6, 0x3ff, 0xab6b, 0x8001, 0x5, 0x2, 0x9, 0x732, 0x400, 0x55000000000, 0x1ff, 0x6, 0x0, 0x0, 0x2, @perf_config_ext={0x6, 0xffffffff}, 0x40, 0x80000001, 0x7fff, 0x2, 0x1, 0x6, 0x5}, r2, 0xf, r4, 0xa) r6 = perf_event_open(&(0x7f00000003c0)={0x7, 0x70, 0xc87d, 0x6, 0x5, 0x80000001, 0x0, 0x3, 0x1, 0xb, 0xffffffff, 0x9, 0x584, 0x31b, 0x7, 0x2, 0x3, 0x544, 0x100000001, 0x9, 0x1, 0x100, 0x3, 0x1, 0x7, 0x0, 0x7, 0x5, 0xbb, 0x40, 0x7, 0x8, 0x81, 0xc5a, 0x0, 0x7, 0x1f, 0x815, 0x0, 0xffff, 0x2, @perf_bp={&(0x7f0000000380), 0x8}, 0x4, 0x5, 0xc95, 0x0, 0x7ff, 0x7b02, 0x7}, r2, 0x10, r1, 0xb) ioctl$PERF_EVENT_IOC_DISABLE(r3, 0x2401, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0x4) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = perf_event_open(&(0x7f0000000480)={0x7, 0x70, 0x7, 0xdbff, 0x3, 0x3f, 0x0, 0x8, 0x0, 0xc, 0x8, 0x0, 0xf43, 0x101, 0x6, 0x5, 0x6, 0x9, 0x200, 0xfffffffffffffffd, 0x4, 0x6, 0x6e, 0x20, 0x1b3, 0x1fe, 0x7ff, 0x3, 0x8000, 0x5, 0x0, 0x0, 0x0, 0x5, 0x22d2, 0x401, 0x68, 0xa1ce, 0x0, 0x4, 0x0, @perf_config_ext={0x2fb, 0x4}, 0x2000, 0xd33, 0x6, 0x697c4c7d75b7b6da, 0x171f, 0x9, 0x9}, r2, 0x6, r5, 0x1) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x9, 0x6, 0x101, 0x8, 0x0, 0x200, 0x2000, 0xf, 0x0, 0x5, 0x6, 0x3, 0x2, 0x0, 0x8001, 0x8, 0x3, 0x5, 0x17, 0x7, 0x4, 0x400, 0xffffffff, 0x7, 0x8000, 0x2, 0x100, 0x0, 0x7, 0x95de, 0x2, 0x1, 0x2, 0xd432, 0x3ff, 0x8599, 0x0, 0x3ff, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x10080, 0x7, 0xe7e, 0x7, 0x5, 0x7, 0x9}, r2, 0x0, r3, 0x8) close(r7) ioctl$PERF_EVENT_IOC_DISABLE(r9, 0x2401, 0x1) r10 = gettid() ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f00000005c0)={r0}) ioctl$sock_kcm_SIOCKCMUNATTACH(r11, 0x89e1, &(0x7f0000000600)={r8}) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000640)) r12 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)={0x4, 0x7, 0x7f, 0x9787, 0x1c, 0xffffffffffffffff, 0x5}, 0x2c) recvmsg$kcm(r11, &(0x7f0000009440)={&(0x7f0000009300)=@can={0x0, 0x0}, 0x80, &(0x7f00000093c0)=[{&(0x7f0000009380)=""/16, 0x10}], 0x1, &(0x7f0000009400)=""/18, 0x12, 0x3bc1}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000009480)={0xf, 0x13, &(0x7f00000006c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [@ldst={0x3, 0x2, 0x1, 0x2, 0x7, 0xffffffff, 0x4}, @map={0x18, 0x0, 0x1, 0x0, r12}, @alu={0x7, 0x5, 0xf, 0x6, 0xe, 0x2, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4}, @jmp={0x5, 0x7a4c, 0x0, 0x3, 0x9, 0xffffffff, 0xfffffffffffffff0}, @alu={0x4, 0x20, 0x9, 0x9, 0x5, 0xfffffffe, 0x4}, @jmp={0x5, 0x81, 0x9, 0x7, 0x6, 0xfffffffe, 0xfffffffffffffff0}, @jmp={0x5, 0x3, 0x3, 0x0, 0x2, 0x2, 0xffffffffffffffff}], {0x95}}, &(0x7f0000000780)='GPL\x00', 0x4, 0x77, &(0x7f00000007c0)=""/119, 0x0, 0x1, [], r13}, 0x48) mount(&(0x7f0000009500)='./file0\x00', &(0x7f0000009540)='./file0\x00', &(0x7f0000009580)='cramfs\x00', 0x5020, &(0x7f00000095c0)="22f464f8fef2b95976576e903efe99229584aaf55fa0d91223905d4a68c0c7d18bf26de6fec0660b0c36945200da04f802d9059dd5f6d2f0eca450f4fdd46ed2b411588d802f0d1d02be65816332b2754d686e927593deb8ee3ed17a24d749db81290c33836bcc9b7d93084c53d0744e81deb8b83d9b23565d6db4cb746eb15b20f7b806f0b5a02676d90260a61b00e9ec0b4b8bf07d5f93b3feda8299586c3936f743c764205de278c25a6fff98") perf_event_open(&(0x7f00000096c0)={0x1, 0x70, 0x3, 0xa8e, 0x1000, 0xe57a, 0x0, 0x6, 0x2100b, 0x2, 0x9, 0xdb1b, 0xfffffffffffffffa, 0xa7f8, 0x3, 0x2, 0x800, 0x800, 0x2, 0x0, 0x3f, 0x3, 0x8000000000000, 0x3, 0x20, 0x6, 0x3, 0xfffffffffffff318, 0xffffffffffff0001, 0xfffffffffffffffe, 0x12, 0x1, 0x101, 0x8, 0x100, 0x1, 0x3, 0x8, 0x0, 0x3ff, 0x7, @perf_bp={&(0x7f0000009680), 0x3}, 0x9, 0x6, 0xfffffffffffffff7, 0x0, 0x0, 0x49, 0xfffffffffffff3b8}, r10, 0xe, r5, 0x8) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000009880)={r12, &(0x7f0000009740)="8ba447000764036f17624e623896639a3e2456b901aedcdb4221cea83c3b2c94575967a34ec104bbebeaf6a6b50494e6763f41056d2ca84f906fa48d72590e81334926fab48e", &(0x7f00000097c0)=""/170}, 0x18) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r4, 0x2405, r6) bpf$PROG_LOAD(0x5, &(0x7f00000099c0)={0x7, 0x4, &(0x7f00000098c0)=@raw=[@ldst={0x3, 0x3, 0x6, 0xd, 0x7, 0x26}, @ldst={0x0, 0x2, 0x0, 0xa, 0x0, 0x4, 0xffffffffffffffff}], &(0x7f0000009900)='GPL\x00', 0x5, 0x5d, &(0x7f0000009940)=""/93, 0x41f00, 0x1, [], r13}, 0x48) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000009b40)={r8, &(0x7f0000009a40)="402c0b8b20e0ae84bb", &(0x7f0000009a80)=""/178}, 0x18) [ 191.831017] RSP: 002b:00007fc28ac9cc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 191.838702] RAX: ffffffffffffffda RBX: 00007fc28ac9d6d4 RCX: 0000000000454e79 [ 191.845949] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 191.853195] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 191.860441] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000016 [ 191.867686] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000034 2018/03/31 05:13:39 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x5, 0x100000000209e20, 0x0, 0x5}, 0x2c) r1 = bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x13, 0x0, 0x7ffff9, 0x0, 0x20000003, 0x0}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xe, 0x0, 0x7f, 0x0, 0x8, r1, 0x80000000}, 0x2c) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x50, &(0x7f0000000140)}, 0x10) socket$kcm(0x29, 0x2, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r2 = perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0xfff) socketpair(0x4, 0x1, 0x5, &(0x7f0000000100)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) socketpair(0x0, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={r4, &(0x7f0000000080)="b02e82b8cc655398979911284b03a01b4483911b050efd8d0c3567c7ffc01b87f7598b19d6a70d55bc2541b249d4ef0aeae229574b1438", &(0x7f0000000940)="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", 0x2}, 0x20) ioctl$PERF_EVENT_IOC_DISABLE(r3, 0x2401, 0x100000000) perf_event_open(&(0x7f000025c000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2cc, 0x0, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000300)='nsfs\x00', 0x40, &(0x7f0000000340)="97a212dbd969b1f8085a5d3b1a88d3725e7429e276ca751f048f5dbc419ca3237658b49124ec53332c0215a7c3882b2b3ff6a2d3") r5 = gettid() perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7, 0xfff, 0x100000001, 0xfffffffffffffffb, 0x0, 0x8001, 0x0, 0x1, 0x0, 0xfffffffffffffff9, 0x0, 0x9, 0x9, 0x5, 0x8, 0x1, 0x8106, 0x0, 0x14000000000, 0x80000000, 0x1, 0x5, 0x0, 0x40, 0x2839, 0x1d, 0x800, 0x7, 0x8, 0x3, 0x5, 0x7, 0x8, 0x1, 0x3, 0x0, 0x0, 0x758, 0x4, @perf_bp={&(0x7f00000001c0), 0x4}, 0x0, 0x0, 0xff, 0x0, 0x3, 0x8, 0x3}, r5, 0x2, r3, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000800)={r1, &(0x7f0000000740)="03812dfba9cf29d7d97aae706c6163bcf224bd0534e64ad5626ab3c86d496778a84df50c0aecd9fffc6a1f136cc3eced08d0cc305441d1b6ee21f7be711dd16a6e88d5f6e76872eb2c4d4d93f300e8eb8f88ef35253b8f32e4ca079e5dcb7bd7b70147cbd1ec57f25a8f4533841d529f1344cc391251bf98b9b4223a2f0319b3f35ccd7dbfc161cd31cd7c30858c962380e2d8f16a", &(0x7f0000000580)="69269246c2a63a64f4d8d126d4bdfd06c98a9d0aface67282d0a", 0x2}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000880)={r0, &(0x7f0000000840), &(0x7f00000008c0)=""/70}, 0x375) 2018/03/31 05:13:39 executing program 1: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000001fc0)) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000002000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r1, &(0x7f00000024c0)={&(0x7f0000002040)=@un=@file={0x0, './file0\x00'}, 0x80, &(0x7f0000001f40)=[{&(0x7f00000020c0)="73c7575b94a72990e177f86ed4835a72a65c1a6c6831eeb0c48163a47ab63bcb605c8450cc4798ff6521c2aa722d1a7105c8a07e6c", 0x35}], 0x1, &(0x7f0000002500)=ANY=[], 0x0, 0x40000}, 0x20000000) r2 = gettid() r3 = perf_event_open(&(0x7f0000001ac0)={0x1, 0x70, 0xffffffff, 0x835, 0x9, 0xffffffffffffff5f, 0x0, 0x1000, 0x42000, 0x3, 0x8, 0x80, 0x1, 0x4, 0x100000001, 0x9, 0xff, 0x8, 0x1000, 0x7, 0x7f, 0x200, 0xb715, 0x3, 0x7fffffff, 0xf0a, 0x40, 0x8000, 0x8, 0x7, 0xffffffffffffff74, 0x4, 0x6, 0x100, 0x7, 0x335, 0x3ff, 0x58, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000001a80), 0xe}, 0x244, 0x80000000, 0x82, 0x7, 0x5, 0x3, 0x80000001}, r2, 0xd, r0, 0x8) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000200)='mqueue\x00', 0x0, &(0x7f000000a000)) r4 = getpid() perf_event_open(&(0x7f0000001a00)={0x0, 0x70, 0x0, 0x8, 0x0, 0x3, 0x0, 0xb8, 0x1000, 0x0, 0x3, 0x4, 0xfff, 0x4, 0x4dae, 0x40, 0x0, 0x6, 0x4, 0x0, 0x3, 0x753c, 0x6, 0x100, 0x1de, 0x6, 0x4, 0x1, 0x6, 0x4, 0x7, 0x3, 0x7fff, 0x80000000, 0x3, 0x8, 0x81, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x7, 0x4}, 0x801, 0x400, 0x1, 0x4, 0x1, 0x9, 0x80000001}, r4, 0x7, r0, 0xb) r5 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000004000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_icmp(0xa, 0x2, 0x3a, &(0x7f0000002380)) mount(&(0x7f0000001c00)='./file0\x00', &(0x7f0000001c40)='./file0\x00', &(0x7f0000001c80)='devpts\x00', 0x40, &(0x7f0000001cc0)="be623dfd58807ac0b2f86f052863a5f30adc0bce173ebcf648cefd7d64732aeb5b94e6af3ab33e53669ba6d304d067dad4b1ff3ed87f18fd170aac904e8f105e80e22881717c98752a9cd7cfb06d102877e3b36b2624d22427331755a9514b225d25999ed605ffe4188630db2e7ddcc57f6316b60c4f3845d9dfcbbde5e49af627b48d7c9bd743b536de31a9ba3010cb6714c9b90a50537be55ca12a18e6541bff5a82d293e7734ea9c90707899663bd96b3bcce5887bf0bd35963c5adc39ddcb6f2a0a02b01661242046cb54ef1aec5a486b69e006305064124867bf79f4dc11798e214b61575168b79887122e0a3461f703c077f902c0a") socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r6, &(0x7f0000001800)={&(0x7f0000000240)=@alg, 0x80, &(0x7f0000000740)=[{&(0x7f00000002c0)=""/83, 0x53}, {&(0x7f0000000340)=""/27, 0x1b}, {&(0x7f0000000380)}, {&(0x7f00000003c0)=""/40, 0x28}, {&(0x7f0000000400)=""/144, 0x90}, {&(0x7f00000004c0)=""/200, 0xc8}, {&(0x7f00000005c0)=""/60, 0x3c}, {&(0x7f0000000600)=""/105, 0x69}, {&(0x7f0000000680)=""/127, 0x7f}, {&(0x7f0000000700)=""/8, 0x8}], 0xa, &(0x7f0000000800)=""/4096, 0x1000}, 0x10000) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000002340)=0xf60) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000003900)={&(0x7f0000003400)=@can={0x0, 0x0}, 0x80, &(0x7f0000003840)=[{&(0x7f0000003480)=""/194, 0xc2}, {&(0x7f0000003580)=""/250, 0xfa}, {&(0x7f0000003680)=""/100, 0x64}, {&(0x7f0000003700)=""/14, 0xe}, {&(0x7f0000003740)=""/159, 0x9f}, {&(0x7f0000003800)=""/15, 0xf}], 0x6, &(0x7f00000038c0)=""/29, 0x1d, 0x5}, 0x3) bpf$PROG_LOAD(0x5, &(0x7f0000003940)={0x4, 0x9, &(0x7f0000001940)=ANY=[@ANYBLOB="18000000030000000000000003000000dfd00c00fcffffff0000000000000000000803000101000000000000000000003d01f0fff0ffffff000000000000000095000000000017d2e8e5755061bfd1aac25db5d0247ba5470d351abb0c0186ef636266f510392c50e011fe9de5528ff1b8e2c1227fb68fec3b6785c2d9505ea4a8152d56afdf550b68e2820d7c60045fbdc1c8aaefb46841dfeaecaee8c6aa5fa785"], &(0x7f0000000380)='GPL\x00', 0xf172, 0x4b, &(0x7f00000018c0)=""/75, 0x41f00, 0x1, [], r7}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000000c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001f00)={0xffffffffffffffff, 0x0, 0xf6, 0x22, &(0x7f0000001dc0)="9ef9482ea02fd36d0a768986a7ebe7a627dc88937e7073e3521858dfa0d5e02f571a01cfdfa76e048e5f956ea5da60b90e02a6c3d3687ed61ec9ab5b682c02498bddef38de9ce8c753e41e78f414d16202a033b6c7752711a5f56924e7846d6dcde2f71026e1eb0319b5e60f6b1ec67fca31c3cf1691d3af91a19f56be5a10ff337a53ba13dd3d75e1555211954b92ec0082d02b7b4cdddc021cbe84e4af8f20788977e3416918843e6c92b2ebf7b8b33ecbd4c7c9a9d5036c3e3e538748a32f1a28eb77818ca1878ffdd445dcdb8a40e6221e0fc474428449dfe93c62bbc69996aa9b34488c1da4f6f7c2275305a6a4fb256c1a516d", &(0x7f0000001ec0)=""/34, 0x1f, 0x1}, 0x28) close(r5) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000001bc0)) mount(&(0x7f00000021c0)='./file0/file0\x00', &(0x7f0000002200)='./file0/file0\x00', &(0x7f0000002240)='fuse\x00', 0x2000000, &(0x7f0000002280)="9b3923bfddc346e9fa2aeaffae6ca386d8d50ba83ab72218340d3c30c045a89ac016797652ba04f1a203cfceccb458dbfd9fd03c4a80ef9a40dc7a4f24b6619d04a58186466fd8465757d9ee053c082cdfa957e7efab6191761847cca59c017493ef5e3d22432cf0b4ebef") ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f00000023c0)=ANY=[@ANYBLOB="07000000000000000000000000000000000000000000000000000000000000000000000067eb0ecf1cfa4ffd89aa7e339417beb7d332a5c996e59875644dd1e3a690110400bc751bb0435977d90fcbb2b83c27812d818991d125e9c0f199be2bc7f01aa0a5cb9b9f99438aa0f1ae3d50201f7bb276536f567f03f062994da292b6db0000000000000000000000000000a93536f303000000000000002a27f6ae1258ebb5079c1bab4f1f6f11ee8ce2e590855a3af38e4bb871ef8400000000000000000000"]) mount(&(0x7f0000001b40)='./file0\x00', &(0x7f0000001b80)='./file0/file0\x00', &(0x7f0000002100)='vfat\x00', 0x0, &(0x7f0000002140)="98980e21ac8b46c0b7bedeee39e6bd9ae4088d6ab47dc9dc76a39e299ce3783aa33e482e450484961fd3e3c5b178fafbe54440e19512ea4298652ed129d4241d9d116d8a5c2b931d350f0c989f8a288fc9e56c") mount(&(0x7f0000df7000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='hugetlbfs\x00', 0x200, &(0x7f00000001c0)) mkdir(&(0x7f00000004c0)='./file0/file0\x00', 0x0) socketpair$inet(0x2, 0x0, 0x1f, &(0x7f0000000080)) [ 191.891906] EXT4-fs: 4 callbacks suppressed [ 191.891912] EXT4-fs (sda1): re-mounted. Opts: [ 192.024765] devpts: called with bogus options [ 192.079394] hugetlbfs: Bad mount option: "" 2018/03/31 05:13:39 executing program 4: mount(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='ncpfs\x00', 0x80802, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x50, &(0x7f0000000700)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780)=r0, 0x4) mount(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='./file0\x00', &(0x7f00000006c0)='btrfs\x00', 0x89402, &(0x7f0000000900)="e196efa3cb748d2a6600968b76295ff919bc3877b18eb8d265a35493fcf34fdc965cd5c837d2389c6e2ec6088abe8daaa8ca23f9298fc94dc26874bc4d4567afea1ca0879cdf21e915005a83e96b1002af29091d2176abbb7fec088a67f2e1390f32adaf2f252d24510870f8df7186936f4d88957eb8fcda78b7383a7d24db701d524557ee7324433e70d9ffa185098325f9e657d3c29cf6a35843cb96780269db1c735d55938af5c60e1e4ba25928697277b0fdf356b62399b4c8826d09bfca7d6078c19b4995195ea814b1bb40c06210ec") ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0xffffffff) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0xfffdffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x22, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000f6bffb)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000400)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000540)={r1, 0x50}, 0xfffffe74) close(r1) perf_event_open(&(0x7f0000348f88)={0x2, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x28, 0x2, 0x0, &(0x7f0000000000)={0x0}) mkdir(&(0x7f0000000100)='./file0\x00', 0x1000000000) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='selinuxfs\x00', 0x1000, &(0x7f0000000100)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='minix\x00', 0x10020, &(0x7f0000000240)) 2018/03/31 05:13:39 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="1800591100000000000000e7018000006a0a00ff0000f60461184cbc909ef10a78aa30d78bd51fbaef405ad6836b33496ade646f52674368d03a82fa2d5afad11bf626fc89f0897ed780e0b5ffb6130e4eabf17cbe1aaafc794717987076604138f5871a06f3a2aae18f40a8fcc2851b123841f76151c10ee6cf137105407c7b53261688b17b944c4ce02288990a669d8868f26aaf1943cfbe26b78cd3ab4b700cdbff7e3ac8db85994896df6031882786c35e82a2557df99a6743b6fb2c6888b444fc9ce4a4d66f57c65f88e6c48bbd9a0ab7440e498e889b717c4b31520f"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x4, 0x5, &(0x7f0000000040)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) 2018/03/31 05:13:39 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x9, 0xb, 0x20001, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000012c0)={r0, &(0x7f0000001200)="81ac27270ba49ca098", &(0x7f0000001240)}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x1f, 0xfff, 0x1ff, 0x1000, 0x1a, r0, 0x10001}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000040), &(0x7f00000000c0)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000)="f184a9d6429e31ba59031dc6e27ad780b304a7a41409", &(0x7f00000000c0)="2004a4919114a2eab2f49f11af23fab122a8341a6ba39eafadbee6c8f8647c391910b0ebca8922619a8cf695b0e36813efe67c8bc46f1a868896e5ffe609a05ffb2136951984de9ed14a6b928003466d4d015a79ee6522628d14f1dd7fef410ee21d52f8c7c7fda9aa3da2e91749ed15b552e0ce4c3f604cd176f765b277455a28fbc8f3c7253e591a2599c126c750b4e6bc5619a7051bfbc5af5b576d0d272dfd570430e2c591046c8e0ea43545cb09bb96d371e3aec1d55103cd93488fb50b1cc0ad87ab4ae328", 0x1}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r0, &(0x7f0000000040)}, 0x10) 2018/03/31 05:13:39 executing program 6 (fault-call:17 fault-nth:53): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x0, 0x101, 0x4, 0x0, 0x1, r0, 0x0, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r2 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)={0xffffffffffffffff}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r2, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x0, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0", 0xc9}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000280)={&(0x7f0000000680)='./file0\x00'}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r1}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r3) gettid() close(0xffffffffffffffff) 2018/03/31 05:13:39 executing program 7: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x3, &(0x7f0000002000)=@framed={{0x18}, [], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100)=r0, 0xfffffc61) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x3, 0x4, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000040), &(0x7f0000000100)}, 0x20) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000340)=0x80000000, 0x4) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000000c0)={r1, &(0x7f0000000080)}, 0x10) close(r1) sendmsg(r1, &(0x7f0000000500)={&(0x7f0000000180)=@in={0x2, 0x4e24, @rand_addr=0x1}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000240)="5525bd04638a12e1d727613f50544a1231a32a5598c0ccb09f72c02989f21547b2323cd0386fffb8ba489c0e5d2f476e70ae2ba7b69e0aec35017b8c705ab78278edd3367683641237a7be6c431e67b4c95e87283eb8bb96b348f7aa04b1634143de12057a02717eb16714985ba6527a15574d19ae6055c15e7b07a51838f72367b68a5f5fe5cb5af0968239a055aff5144ee051965f019986ec6afa2deead99e1b86b17eea41ff7ff580ea2686afaf135e8cac76e44c85c5dfa348588a50a1894b5beda5ea3b19a6f17b2ec27779a075fac7dde93bca628589880f7dc976a33e0538606dc9e32034d7a5c237d8a471b1f59ae7c225e4266", 0xf8}, {&(0x7f0000000380)="2d4c2248bc84e8c1aecca2c62467e7f9ab0586b5ee8e153d78f697c5abadab994c4e197e575b5c1836c370bd27e295447cdb", 0x32}], 0x2, &(0x7f0000000400), 0x0, 0x44}, 0x44001) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000140)={&(0x7f0000000080)='./file0\x00', r0}, 0x10) 2018/03/31 05:13:39 executing program 2: socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000040)={0x7, 0x70, 0x1, 0xaabc, 0x2, 0x2, 0x0, 0xec, 0x4800, 0x1, 0x3a6b72c9, 0xffffffffffff8000, 0xfff, 0x7, 0x2, 0x7, 0xff, 0x1, 0x2, 0x9, 0x1, 0x0, 0x5, 0x75, 0x2, 0x7, 0x8, 0x4, 0x0, 0xdbce, 0xffff, 0xfaf, 0x1, 0xe7, 0xd0eb, 0x28a5, 0x9, 0x4, 0x0, 0x7, 0x2, @perf_config_ext={0x1, 0x8000}, 0x489, 0x6, 0xff, 0x0, 0x9d, 0x8, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f00000000c0)={0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000140)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r2 = getpid() r3 = perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x8, 0x4, 0x4, 0x1, 0x0, 0x401, 0x100, 0x7, 0xcfc0, 0x7, 0x0, 0x7, 0x30, 0x7, 0x7, 0xfff, 0x7, 0x9, 0xff, 0x9, 0xf, 0x0, 0x3, 0x100000000, 0x3, 0x8, 0xffff, 0x2, 0x3, 0xff, 0x6f, 0x3, 0x5, 0x800, 0x81, 0x0, 0x0, 0x9, 0x1, @perf_bp={&(0x7f0000000180), 0x1}, 0x11815, 0x9, 0x1, 0x1, 0x101, 0x0, 0x1e892fee}, r2, 0x9, r1, 0x1) r4 = perf_event_open(&(0x7f0000000280)={0x5, 0x70, 0xe00000000000, 0x9, 0x800, 0x6, 0x0, 0x7ff, 0x10200, 0xb, 0xe3, 0x5, 0x1, 0x4, 0x9b0f, 0x1f8a, 0x401, 0x1, 0xe975, 0x7, 0x437, 0x9, 0x7f, 0x20, 0x1, 0x2, 0x3, 0x5, 0x200, 0x1, 0x8, 0x401, 0x401, 0x2, 0x8, 0xfff, 0xf3c8, 0xf23, 0x0, 0x7fffffff, 0x0, @perf_bp={&(0x7f0000000240), 0x9}, 0x828, 0x3, 0x5, 0x1, 0x0, 0xc37, 0x6}, r2, 0x4, r1, 0x2) r5 = perf_event_open(&(0x7f0000000300)={0x4, 0x70, 0xff, 0x3, 0x7f, 0x7, 0x0, 0x40, 0x4a240, 0x2, 0xffffffffffffcc27, 0xb8, 0x2, 0x7, 0x9, 0x800, 0x3, 0x7d4d, 0xf7, 0xfffffffffffffffa, 0x9, 0x4, 0x3, 0x90be, 0x9, 0xfffffffffffffffc, 0x6, 0x3ff, 0xab6b, 0x8001, 0x5, 0x2, 0x9, 0x732, 0x400, 0x55000000000, 0x1ff, 0x6, 0x0, 0x0, 0x2, @perf_config_ext={0x6, 0xffffffff}, 0x40, 0x80000001, 0x7fff, 0x2, 0x1, 0x6, 0x5}, r2, 0xf, r4, 0xa) r6 = perf_event_open(&(0x7f00000003c0)={0x7, 0x70, 0xc87d, 0x6, 0x5, 0x80000001, 0x0, 0x3, 0x1, 0xb, 0xffffffff, 0x9, 0x584, 0x31b, 0x7, 0x2, 0x3, 0x544, 0x100000001, 0x9, 0x1, 0x100, 0x3, 0x1, 0x7, 0x0, 0x7, 0x5, 0xbb, 0x40, 0x7, 0x8, 0x81, 0xc5a, 0x0, 0x7, 0x1f, 0x815, 0x0, 0xffff, 0x2, @perf_bp={&(0x7f0000000380), 0x8}, 0x4, 0x5, 0xc95, 0x0, 0x7ff, 0x7b02, 0x7}, r2, 0x10, r1, 0xb) ioctl$PERF_EVENT_IOC_DISABLE(r3, 0x2401, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0x4) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = perf_event_open(&(0x7f0000000480)={0x7, 0x70, 0x7, 0xdbff, 0x3, 0x3f, 0x0, 0x8, 0x0, 0xc, 0x8, 0x0, 0xf43, 0x101, 0x6, 0x5, 0x6, 0x9, 0x200, 0xfffffffffffffffd, 0x4, 0x6, 0x6e, 0x20, 0x1b3, 0x1fe, 0x7ff, 0x3, 0x8000, 0x5, 0x0, 0x0, 0x0, 0x5, 0x22d2, 0x401, 0x68, 0xa1ce, 0x0, 0x4, 0x0, @perf_config_ext={0x2fb, 0x4}, 0x2000, 0xd33, 0x6, 0x697c4c7d75b7b6da, 0x171f, 0x9, 0x9}, r2, 0x6, r5, 0x1) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x9, 0x6, 0x101, 0x8, 0x0, 0x200, 0x2000, 0xf, 0x0, 0x5, 0x6, 0x3, 0x2, 0x0, 0x8001, 0x8, 0x3, 0x5, 0x17, 0x7, 0x4, 0x400, 0xffffffff, 0x7, 0x8000, 0x2, 0x100, 0x0, 0x7, 0x95de, 0x2, 0x1, 0x2, 0xd432, 0x3ff, 0x8599, 0x0, 0x3ff, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x10080, 0x7, 0xe7e, 0x7, 0x5, 0x7, 0x9}, r2, 0x0, r3, 0x8) close(r7) ioctl$PERF_EVENT_IOC_DISABLE(r9, 0x2401, 0x1) r10 = gettid() ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f00000005c0)={r0}) ioctl$sock_kcm_SIOCKCMUNATTACH(r11, 0x89e1, &(0x7f0000000600)={r8}) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000640)) r12 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)={0x4, 0x7, 0x7f, 0x9787, 0x1c, 0xffffffffffffffff, 0x5}, 0x2c) recvmsg$kcm(r11, &(0x7f0000009440)={&(0x7f0000009300)=@can={0x0, 0x0}, 0x80, &(0x7f00000093c0)=[{&(0x7f0000009380)=""/16, 0x10}], 0x1, &(0x7f0000009400)=""/18, 0x12, 0x3bc1}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000009480)={0xf, 0x13, &(0x7f00000006c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [@ldst={0x3, 0x2, 0x1, 0x2, 0x7, 0xffffffff, 0x4}, @map={0x18, 0x0, 0x1, 0x0, r12}, @alu={0x7, 0x5, 0xf, 0x6, 0xe, 0x2, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4}, @jmp={0x5, 0x7a4c, 0x0, 0x3, 0x9, 0xffffffff, 0xfffffffffffffff0}, @alu={0x4, 0x20, 0x9, 0x9, 0x5, 0xfffffffe, 0x4}, @jmp={0x5, 0x81, 0x9, 0x7, 0x6, 0xfffffffe, 0xfffffffffffffff0}, @jmp={0x5, 0x3, 0x3, 0x0, 0x2, 0x2, 0xffffffffffffffff}], {0x95}}, &(0x7f0000000780)='GPL\x00', 0x4, 0x77, &(0x7f00000007c0)=""/119, 0x0, 0x1, [], r13}, 0x48) mount(&(0x7f0000009500)='./file0\x00', &(0x7f0000009540)='./file0\x00', &(0x7f0000009580)='cramfs\x00', 0x5020, &(0x7f00000095c0)="22f464f8fef2b95976576e903efe99229584aaf55fa0d91223905d4a68c0c7d18bf26de6fec0660b0c36945200da04f802d9059dd5f6d2f0eca450f4fdd46ed2b411588d802f0d1d02be65816332b2754d686e927593deb8ee3ed17a24d749db81290c33836bcc9b7d93084c53d0744e81deb8b83d9b23565d6db4cb746eb15b20f7b806f0b5a02676d90260a61b00e9ec0b4b8bf07d5f93b3feda8299586c3936f743c764205de278c25a6fff98") perf_event_open(&(0x7f00000096c0)={0x1, 0x70, 0x3, 0xa8e, 0x1000, 0xe57a, 0x0, 0x6, 0x2100b, 0x2, 0x9, 0xdb1b, 0xfffffffffffffffa, 0xa7f8, 0x3, 0x2, 0x800, 0x800, 0x2, 0x0, 0x3f, 0x3, 0x8000000000000, 0x3, 0x20, 0x6, 0x3, 0xfffffffffffff318, 0xffffffffffff0001, 0xfffffffffffffffe, 0x12, 0x1, 0x101, 0x8, 0x100, 0x1, 0x3, 0x8, 0x0, 0x3ff, 0x7, @perf_bp={&(0x7f0000009680), 0x3}, 0x9, 0x6, 0xfffffffffffffff7, 0x0, 0x0, 0x49, 0xfffffffffffff3b8}, r10, 0xe, r5, 0x8) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000009880)={r12, &(0x7f0000009740)="8ba447000764036f17624e623896639a3e2456b901aedcdb4221cea83c3b2c94575967a34ec104bbebeaf6a6b50494e6763f41056d2ca84f906fa48d72590e81334926fab48e", &(0x7f00000097c0)=""/170}, 0x18) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r4, 0x2405, r6) bpf$PROG_LOAD(0x5, &(0x7f00000099c0)={0x7, 0x4, &(0x7f00000098c0)=@raw=[@ldst={0x3, 0x3, 0x6, 0xd, 0x7, 0x26}, @ldst={0x0, 0x2, 0x0, 0xa, 0x0, 0x4, 0xffffffffffffffff}], &(0x7f0000009900)='GPL\x00', 0x5, 0x5d, &(0x7f0000009940)=""/93, 0x41f00, 0x1, [], r13}, 0x48) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000009b40)={r8, &(0x7f0000009a40)="402c0b8b20e0ae84bb", &(0x7f0000009a80)=""/178}, 0x18) 2018/03/31 05:13:39 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x5, 0x3, 0x1, &(0x7f0000001a40)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001ac0)={&(0x7f0000001a80)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg$kcm(0xffffffffffffff9c, &(0x7f00000089c0)={&(0x7f0000007fc0)=@ll={0x0, 0x0, 0x0}, 0x80, &(0x7f0000008800)=[{&(0x7f0000008040)=""/253, 0xfd}, {&(0x7f0000008140)=""/195, 0xc3}, {&(0x7f0000008240)=""/136, 0x88}, {&(0x7f0000008300)=""/159, 0x9f}, {&(0x7f00000083c0)=""/93, 0x5d}, {&(0x7f0000008440)=""/209, 0xd1}, {&(0x7f0000008540)=""/92, 0x5c}, {&(0x7f00000085c0)=""/195, 0xc3}, {&(0x7f00000086c0)=""/120, 0x78}, {&(0x7f0000008740)=""/143, 0x8f}], 0xa, &(0x7f00000088c0)=""/249, 0xf9, 0xfffffffffffffffa}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000008a00)={0xf, 0xc, &(0x7f0000001b00)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xa00000}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x37}, @call={0x85, 0x0, 0x0, 0x12}, @map={0x18, 0xb, 0x1, 0x0, r1}, @alu={0x4, 0x3, 0x7, 0x8, 0x7, 0x48, 0x11}, @map={0x18, 0x3, 0x1, 0x0, r2}], &(0x7f0000001b80)='syzkaller\x00', 0x4, 0x1000, &(0x7f00000039c0)=""/4096, 0x41100, 0x1, [], r3}, 0x48) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001a00)) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000001fc0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000002000)={0xffffffffffffffff}) sendmsg(r4, &(0x7f00000024c0)={&(0x7f0000002040)=@pppol2tp={0x18, 0x1, {0x0, r5, {0x2, 0x4e23, @multicast1=0xe0000001}, 0x4, 0x3, 0x0, 0x3}}, 0x80, &(0x7f0000002400)=[{&(0x7f00000020c0)="73c7575b94a72990e177f86ed4835a72a65c1a6c6831eeb0c48163a47ab63bcb605c8450cc4798ff6521c2aa722d1a7105c8a07e6c", 0x35}], 0x1, &(0x7f0000002500)=ANY=[], 0x0, 0x40000}, 0x80) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000200)='mqueue\x00', 0x0, &(0x7f000000a000)) r6 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000004000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_icmp(0xa, 0x2, 0x3a, &(0x7f00000021c0)) mount(&(0x7f0000001c00)='./file0\x00', &(0x7f0000001c40)='./file0\x00', &(0x7f0000001c80)='devpts\x00', 0x40, &(0x7f0000001cc0)="be623dfd58807ac0b2f86f052863a5f30adc0bce173ebcf648cefd7d64732aeb5b94e6af3ab33e53669ba6d304d067dad4b1ff3ed87f18fd170aac904e8f105e80e22881717c98752a9cd7cfb06d102877e3b36b2624d22427331755a9514b225d25999ed605ffe4188630db2e7ddcc57f6316b60c4f3845d9dfcbbde5e49af627b48d7c9bd743b536de31a9ba3010cb6714c9b90a50537be55ca12a18e6541bff5a82d293e7734ea9c90707899663bd96b3bcce5887bf0bd35963c5adc39ddcb6f2a0a02b01661242046cb54ef1aec5a486b69e006305064124867bf79f4dc11798e214b61575168b79887122e0a3461f703c077f902c0a") socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r7, &(0x7f0000001800)={&(0x7f0000000240)=@alg, 0x80, &(0x7f0000000740)=[{&(0x7f00000002c0)=""/83, 0x53}, {&(0x7f0000000340)=""/27, 0x1b}, {&(0x7f0000000380)}, {&(0x7f00000003c0)=""/40, 0x28}, {&(0x7f0000000400)=""/144, 0x90}, {&(0x7f00000004c0)=""/200, 0xc8}, {&(0x7f00000005c0)=""/60, 0x3c}, {&(0x7f0000000600)=""/105, 0x69}, {&(0x7f0000000680)=""/127, 0x7f}, {&(0x7f0000000700)=""/8, 0x8}], 0xa, &(0x7f0000000800)=""/4096, 0x1000}, 0x10000) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x40082404, &(0x7f0000000180)=0xf60) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000003900)={&(0x7f0000003400)=@can={0x0, 0x0}, 0x80, &(0x7f0000003840)=[{&(0x7f0000003480)=""/194, 0xc2}, {&(0x7f0000003580)=""/250, 0xfa}, {&(0x7f0000003680)=""/100, 0x64}, {&(0x7f0000003700)=""/14, 0xe}, {&(0x7f0000003740)=""/159, 0x9f}, {&(0x7f0000003800)=""/15, 0xf}], 0x6, &(0x7f00000038c0)=""/29, 0x1d, 0x5}, 0x3) bpf$PROG_LOAD(0x5, &(0x7f0000003940)={0x4, 0x9, &(0x7f0000001840)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, [@alu={0x7, 0xffffffff, 0xd, 0x0, 0xd, 0xc, 0xfffffffffffffffc}, @generic={0x0, 0x8, 0x3, 0x101}, @jmp={0x5, 0x1f, 0x3, 0x1, 0x0, 0xfffffff0, 0xfffffffffffffff0}], {0x95}}, &(0x7f0000000380)='GPL\x00', 0xf172, 0x4b, &(0x7f00000018c0)=""/75, 0x41f00, 0x1, [], r8}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000000c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001f00)={0xffffffffffffffff, 0x0, 0xf6, 0x22, &(0x7f0000001dc0)="9ef9482ea02fd36d0a768986a7ebe7a627dc88937e7073e3521858dfa0d5e02f571a01cfdfa76e048e5f956ea5da60b90e02a6c3d3687ed61ec9ab5b682c02498bddef38de9ce8c753e41e78f414d16202a033b6c7752711a5f56924e7846d6dcde2f71026e1eb0319b5e60f6b1ec67fca31c3cf1691d3af91a19f56be5a10ff337a53ba13dd3d75e1555211954b92ec0082d02b7b4cdddc021cbe84e4af8f20788977e3416918843e6c92b2ebf7b8b33ecbd4c7c9a9d5036c3e3e538748a32f1a28eb77818ca1878ffdd445dcdb8a40e6221e0fc474428449dfe93c62bbc69996aa9b34488c1da4f6f7c2275305a6a4fb256c1a516d", &(0x7f0000001ec0)=""/34, 0x1f, 0x1}, 0x28) socketpair(0x4, 0x800, 0x3800000000000, &(0x7f0000001980)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000019c0)={&(0x7f0000001940)='./file0\x00', r9}, 0x10) close(r6) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000001bc0)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x3441, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000040)=ANY=[@ANYBLOB="0700000000030000000000000000000000000000000000000000000d0000000000000000"]) mkdir(&(0x7f0000000680)='./file0\x00', 0x0) mount(&(0x7f0000df7000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='hugetlbfs\x00', 0x200, &(0x7f00000001c0)) mkdir(&(0x7f00000004c0)='./file0/file0\x00', 0x0) socketpair$inet(0x2, 0x0, 0x1f, &(0x7f0000000080)) 2018/03/31 05:13:39 executing program 5: bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={0xffffffffffffffff, 0x7, 0x0, 0x0, &(0x7f00000000c0)}, 0x20) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000000c0)) socketpair(0x1, 0xa, 0x1, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x7) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', r0}, 0x10) close(r1) [ 192.127483] devpts: called with bogus options [ 192.142283] hugetlbfs: Bad mount option: "" 2018/03/31 05:13:39 executing program 2: socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000040)={0x7, 0x70, 0x1, 0xaabc, 0x2, 0x2, 0x0, 0xec, 0x4800, 0x1, 0x3a6b72c9, 0xffffffffffff8000, 0xfff, 0x7, 0x2, 0x7, 0xff, 0x1, 0x2, 0x9, 0x1, 0x0, 0x5, 0x75, 0x2, 0x7, 0x8, 0x4, 0x0, 0xdbce, 0xffff, 0xfaf, 0x1, 0xe7, 0xd0eb, 0x28a5, 0x9, 0x4, 0x0, 0x7, 0x2, @perf_config_ext={0x1, 0x8000}, 0x489, 0x6, 0xff, 0x0, 0x9d, 0x8, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f00000000c0)={0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000140)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r2 = getpid() r3 = perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x8, 0x4, 0x4, 0x1, 0x0, 0x401, 0x100, 0x7, 0xcfc0, 0x7, 0x0, 0x7, 0x30, 0x7, 0x7, 0xfff, 0x7, 0x9, 0xff, 0x9, 0xf, 0x0, 0x3, 0x100000000, 0x3, 0x8, 0xffff, 0x2, 0x3, 0xff, 0x6f, 0x3, 0x5, 0x800, 0x81, 0x0, 0x0, 0x9, 0x1, @perf_bp={&(0x7f0000000180), 0x1}, 0x11815, 0x9, 0x1, 0x1, 0x101, 0x0, 0x1e892fee}, r2, 0x9, r1, 0x1) r4 = perf_event_open(&(0x7f0000000280)={0x5, 0x70, 0xe00000000000, 0x9, 0x800, 0x6, 0x0, 0x7ff, 0x10200, 0xb, 0xe3, 0x5, 0x1, 0x4, 0x9b0f, 0x1f8a, 0x401, 0x1, 0xe975, 0x7, 0x437, 0x9, 0x7f, 0x20, 0x1, 0x2, 0x3, 0x5, 0x200, 0x1, 0x8, 0x401, 0x401, 0x2, 0x8, 0xfff, 0xf3c8, 0xf23, 0x0, 0x7fffffff, 0x0, @perf_bp={&(0x7f0000000240), 0x9}, 0x828, 0x3, 0x5, 0x1, 0x0, 0xc37, 0x6}, r2, 0x4, r1, 0x2) r5 = perf_event_open(&(0x7f0000000300)={0x4, 0x70, 0xff, 0x3, 0x7f, 0x7, 0x0, 0x40, 0x4a240, 0x2, 0xffffffffffffcc27, 0xb8, 0x2, 0x7, 0x9, 0x800, 0x3, 0x7d4d, 0xf7, 0xfffffffffffffffa, 0x9, 0x4, 0x3, 0x90be, 0x9, 0xfffffffffffffffc, 0x6, 0x3ff, 0xab6b, 0x8001, 0x5, 0x2, 0x9, 0x732, 0x400, 0x55000000000, 0x1ff, 0x6, 0x0, 0x0, 0x2, @perf_config_ext={0x6, 0xffffffff}, 0x40, 0x80000001, 0x7fff, 0x2, 0x1, 0x6, 0x5}, r2, 0xf, r4, 0xa) r6 = perf_event_open(&(0x7f00000003c0)={0x7, 0x70, 0xc87d, 0x6, 0x5, 0x80000001, 0x0, 0x3, 0x1, 0xb, 0xffffffff, 0x9, 0x584, 0x31b, 0x7, 0x2, 0x3, 0x544, 0x100000001, 0x9, 0x1, 0x100, 0x3, 0x1, 0x7, 0x0, 0x7, 0x5, 0xbb, 0x40, 0x7, 0x8, 0x81, 0xc5a, 0x0, 0x7, 0x1f, 0x815, 0x0, 0xffff, 0x2, @perf_bp={&(0x7f0000000380), 0x8}, 0x4, 0x5, 0xc95, 0x0, 0x7ff, 0x7b02, 0x7}, r2, 0x10, r1, 0xb) ioctl$PERF_EVENT_IOC_DISABLE(r3, 0x2401, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0x4) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = perf_event_open(&(0x7f0000000480)={0x7, 0x70, 0x7, 0xdbff, 0x3, 0x3f, 0x0, 0x8, 0x0, 0xc, 0x8, 0x0, 0xf43, 0x101, 0x6, 0x5, 0x6, 0x9, 0x200, 0xfffffffffffffffd, 0x4, 0x6, 0x6e, 0x20, 0x1b3, 0x1fe, 0x7ff, 0x3, 0x8000, 0x5, 0x0, 0x0, 0x0, 0x5, 0x22d2, 0x401, 0x68, 0xa1ce, 0x0, 0x4, 0x0, @perf_config_ext={0x2fb, 0x4}, 0x2000, 0xd33, 0x6, 0x697c4c7d75b7b6da, 0x171f, 0x9, 0x9}, r2, 0x6, r5, 0x1) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x9, 0x6, 0x101, 0x8, 0x0, 0x200, 0x2000, 0xf, 0x0, 0x5, 0x6, 0x3, 0x2, 0x0, 0x8001, 0x8, 0x3, 0x5, 0x17, 0x7, 0x4, 0x400, 0xffffffff, 0x7, 0x8000, 0x2, 0x100, 0x0, 0x7, 0x95de, 0x2, 0x1, 0x2, 0xd432, 0x3ff, 0x8599, 0x0, 0x3ff, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x10080, 0x7, 0xe7e, 0x7, 0x5, 0x7, 0x9}, r2, 0x0, r3, 0x8) close(r7) ioctl$PERF_EVENT_IOC_DISABLE(r9, 0x2401, 0x1) r10 = gettid() ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f00000005c0)={r0}) ioctl$sock_kcm_SIOCKCMUNATTACH(r11, 0x89e1, &(0x7f0000000600)={r8}) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000640)) r12 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)={0x4, 0x7, 0x7f, 0x9787, 0x1c, 0xffffffffffffffff, 0x5}, 0x2c) recvmsg$kcm(r11, &(0x7f0000009440)={&(0x7f0000009300)=@can={0x0, 0x0}, 0x80, &(0x7f00000093c0)=[{&(0x7f0000009380)=""/16, 0x10}], 0x1, &(0x7f0000009400)=""/18, 0x12, 0x3bc1}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000009480)={0xf, 0x13, &(0x7f00000006c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [@ldst={0x3, 0x2, 0x1, 0x2, 0x7, 0xffffffff, 0x4}, @map={0x18, 0x0, 0x1, 0x0, r12}, @alu={0x7, 0x5, 0xf, 0x6, 0xe, 0x2, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4}, @jmp={0x5, 0x7a4c, 0x0, 0x3, 0x9, 0xffffffff, 0xfffffffffffffff0}, @alu={0x4, 0x20, 0x9, 0x9, 0x5, 0xfffffffe, 0x4}, @jmp={0x5, 0x81, 0x9, 0x7, 0x6, 0xfffffffe, 0xfffffffffffffff0}, @jmp={0x5, 0x3, 0x3, 0x0, 0x2, 0x2, 0xffffffffffffffff}], {0x95}}, &(0x7f0000000780)='GPL\x00', 0x4, 0x77, &(0x7f00000007c0)=""/119, 0x0, 0x1, [], r13}, 0x48) mount(&(0x7f0000009500)='./file0\x00', &(0x7f0000009540)='./file0\x00', &(0x7f0000009580)='cramfs\x00', 0x5020, &(0x7f00000095c0)="22f464f8fef2b95976576e903efe99229584aaf55fa0d91223905d4a68c0c7d18bf26de6fec0660b0c36945200da04f802d9059dd5f6d2f0eca450f4fdd46ed2b411588d802f0d1d02be65816332b2754d686e927593deb8ee3ed17a24d749db81290c33836bcc9b7d93084c53d0744e81deb8b83d9b23565d6db4cb746eb15b20f7b806f0b5a02676d90260a61b00e9ec0b4b8bf07d5f93b3feda8299586c3936f743c764205de278c25a6fff98") perf_event_open(&(0x7f00000096c0)={0x1, 0x70, 0x3, 0xa8e, 0x1000, 0xe57a, 0x0, 0x6, 0x2100b, 0x2, 0x9, 0xdb1b, 0xfffffffffffffffa, 0xa7f8, 0x3, 0x2, 0x800, 0x800, 0x2, 0x0, 0x3f, 0x3, 0x8000000000000, 0x3, 0x20, 0x6, 0x3, 0xfffffffffffff318, 0xffffffffffff0001, 0xfffffffffffffffe, 0x12, 0x1, 0x101, 0x8, 0x100, 0x1, 0x3, 0x8, 0x0, 0x3ff, 0x7, @perf_bp={&(0x7f0000009680), 0x3}, 0x9, 0x6, 0xfffffffffffffff7, 0x0, 0x0, 0x49, 0xfffffffffffff3b8}, r10, 0xe, r5, 0x8) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000009880)={r12, &(0x7f0000009740)="8ba447000764036f17624e623896639a3e2456b901aedcdb4221cea83c3b2c94575967a34ec104bbebeaf6a6b50494e6763f41056d2ca84f906fa48d72590e81334926fab48e", &(0x7f00000097c0)=""/170}, 0x18) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r4, 0x2405, r6) bpf$PROG_LOAD(0x5, &(0x7f00000099c0)={0x7, 0x4, &(0x7f00000098c0)=@raw=[@ldst={0x3, 0x3, 0x6, 0xd, 0x7, 0x26}, @ldst={0x0, 0x2, 0x0, 0xa, 0x0, 0x4, 0xffffffffffffffff}], &(0x7f0000009900)='GPL\x00', 0x5, 0x5d, &(0x7f0000009940)=""/93, 0x41f00, 0x1, [], r13}, 0x48) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000009b40)={r8, &(0x7f0000009a40)="402c0b8b20e0ae84bb", &(0x7f0000009a80)=""/178}, 0x18) [ 192.202725] EXT4-fs (sda1): re-mounted. Opts: 2018/03/31 05:13:39 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x4, 0x0, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x1e, 0x0, 0x3, 0x6, 0x1, r0, 0x6773}, 0x2c) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1, 0x2, 0x7, 0x8001, 0x10, 0xffffffffffffffff, 0x1}, 0x2c) sendmsg(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080), 0x1e}], 0x1000000000000020}, 0x8000) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000780)={r0, &(0x7f0000000680), &(0x7f00000006c0)=""/166}, 0x18) mount(&(0x7f0000000440)='./file0\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='pstore\x00', 0x4, &(0x7f0000000640)="afb63e3ff55419f9e9572aabeb90d8184a20d3c850fa576f0f0d376978dcd77395a8eb26002ef5146d") mkdir(&(0x7f0000000300)='./file0\x00', 0x60) r2 = perf_event_open(&(0x7f0000000200)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000000), 0x8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f00000007c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000003700)={&(0x7f0000000280)=@pppoe={0x0, 0x0, {0x0, @broadcast}}, 0x80, &(0x7f00000036c0)=[{&(0x7f0000003400)=""/251, 0xfb}, {&(0x7f0000003500)=""/14, 0xe}, {&(0x7f0000003540)=""/107, 0x6b}, {&(0x7f00000035c0)=""/211, 0xd3}], 0x4, 0x0, 0x0, 0x3ff}, 0x1) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000ec0)={r3}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000340)) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f00000008c0)={r4}) recvmsg$kcm(r6, &(0x7f0000000a40)={&(0x7f0000000a80)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x3c1, &(0x7f0000000a00)=[{&(0x7f0000000980)=""/101, 0x65}], 0x1}, 0x10001) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x1) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000180)) bpf$PROG_LOAD(0x5, &(0x7f0000000c00)={0xf, 0xb, &(0x7f0000000cc0)=ANY=[@ANYBLOB="1800000002000000000000000900000018120000", @ANYRES32=r4, @ANYBLOB="000000fb39fb425376c2000000000200779804200000000000000000000000a06430000800050000000000000000009500000e0000000000000000000000009500000000000000a9feb211543867cb13e642b0769e5302c91ee55c19baae328551040e1d195691673274a917a9d10c18e6151bb1a79e5cc135609937dd70131a525ea79199"], &(0x7f0000000b00)='syzkaller\x00', 0x1, 0x87, &(0x7f0000000b40)=""/135, 0x41100, 0x1, [], r7}, 0x48) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000dec000)={0x6, 0x4, 0x338d, 0x7}, 0x2c) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f00000001c0)) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000c88000)={r8, &(0x7f0000847f95), &(0x7f000089b000)}, 0x18) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000540)) socketpair(0x800010, 0x4, 0x8, &(0x7f0000000c80)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMUNATTACH(r9, 0x89e1, &(0x7f0000000880)={r4}) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000800)) [ 192.262655] devpts: called with bogus options [ 192.307578] FAULT_INJECTION: forcing a failure. [ 192.307578] name failslab, interval 1, probability 0, space 0, times 0 [ 192.318889] CPU: 1 PID: 16290 Comm: syz-executor6 Not tainted 4.16.0-rc6+ #42 [ 192.326163] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 192.335513] Call Trace: [ 192.338103] dump_stack+0x194/0x24d [ 192.341733] ? arch_local_irq_restore+0x53/0x53 [ 192.346402] ? __save_stack_trace+0x7e/0xd0 [ 192.350735] should_fail+0x8c0/0xa40 [ 192.354451] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 192.357492] hugetlbfs: Bad mount option: "" [ 192.359552] ? kasan_kmalloc+0xad/0xe0 [ 192.359563] ? kmem_cache_alloc_trace+0x136/0x740 [ 192.359575] ? __memcg_init_list_lru_node+0x169/0x270 [ 192.359583] ? __list_lru_init+0x544/0x750 [ 192.359590] ? sget_userns+0x6b1/0xe40 [ 192.359600] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 192.359609] ? do_mount+0xea4/0x2bb0 [ 192.394411] ? SyS_mount+0xab/0x120 [ 192.398038] ? do_syscall_64+0x281/0x940 [ 192.402102] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 192.407468] ? find_held_lock+0x35/0x1d0 [ 192.411532] ? __lock_is_held+0xb6/0x140 [ 192.415602] ? check_same_owner+0x320/0x320 [ 192.419929] ? rcu_note_context_switch+0x710/0x710 [ 192.424861] should_failslab+0xec/0x120 [ 192.428834] kmem_cache_alloc_trace+0x4b/0x740 [ 192.433418] ? __kmalloc_node+0x33/0x70 [ 192.437391] ? __kmalloc_node+0x33/0x70 [ 192.441367] ? rcu_read_lock_sched_held+0x108/0x120 [ 192.446383] __memcg_init_list_lru_node+0x169/0x270 [ 192.451396] ? list_lru_add+0x7c0/0x7c0 [ 192.455368] ? __kmalloc_node+0x47/0x70 [ 192.459344] __list_lru_init+0x544/0x750 [ 192.461160] devpts: called with bogus options [ 192.463400] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 192.463414] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 192.463427] ? lockdep_init_map+0x9/0x10 [ 192.463439] sget_userns+0x6b1/0xe40 [ 192.486527] ? set_anon_super+0x20/0x20 [ 192.490505] ? put_filp+0x90/0x90 [ 192.493961] ? destroy_unused_super.part.6+0xd0/0xd0 [ 192.499064] ? alloc_vfsmnt+0x762/0x9c0 [ 192.502735] hugetlbfs: Bad mount option: "" [ 192.503034] ? path_lookupat+0x238/0xba0 [ 192.503047] ? mnt_free_id.isra.21+0x50/0x50 [ 192.503061] ? trace_hardirqs_off+0x10/0x10 [ 192.503073] ? putname+0xee/0x130 [ 192.503086] ? cap_capable+0x1b5/0x230 [ 192.527524] ? security_capable+0x8e/0xc0 [ 192.531670] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 192.536855] ? ns_capable_common+0xcf/0x160 [ 192.541163] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 192.546334] mount_ns+0x6d/0x190 [ 192.549685] rpc_mount+0x9e/0xd0 [ 192.553038] mount_fs+0x66/0x2d0 [ 192.556389] vfs_kern_mount.part.26+0xc6/0x4a0 [ 192.560949] ? may_umount+0xa0/0xa0 [ 192.564556] ? _raw_read_unlock+0x22/0x30 [ 192.568682] ? __get_fs_type+0x8a/0xc0 [ 192.572552] do_mount+0xea4/0x2bb0 [ 192.576068] ? __might_fault+0x110/0x1d0 [ 192.580114] ? copy_mount_string+0x40/0x40 [ 192.584329] ? check_same_owner+0x320/0x320 [ 192.588632] ? __check_object_size+0x8b/0x530 [ 192.593113] ? __might_sleep+0x95/0x190 [ 192.597073] ? kasan_check_write+0x14/0x20 [ 192.601288] ? _copy_from_user+0x99/0x110 [ 192.605417] ? memdup_user+0x5e/0x90 [ 192.609109] ? copy_mount_options+0x1f7/0x2e0 [ 192.613586] SyS_mount+0xab/0x120 [ 192.617027] ? copy_mnt_ns+0xb30/0xb30 [ 192.620901] do_syscall_64+0x281/0x940 [ 192.624765] ? vmalloc_sync_all+0x30/0x30 [ 192.628893] ? _raw_spin_unlock_irq+0x27/0x70 [ 192.633370] ? finish_task_switch+0x1c1/0x7e0 [ 192.637848] ? syscall_return_slowpath+0x550/0x550 [ 192.642759] ? syscall_return_slowpath+0x2ac/0x550 [ 192.647669] ? prepare_exit_to_usermode+0x350/0x350 [ 192.652667] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 192.658020] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 192.662854] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 192.668025] RIP: 0033:0x454e79 [ 192.671196] RSP: 002b:00007fc28ac9cc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 192.678884] RAX: ffffffffffffffda RBX: 00007fc28ac9d6d4 RCX: 0000000000454e79 [ 192.686134] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 192.693882] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 192.701136] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000016 2018/03/31 05:13:40 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1b5}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x201a7ffa, 0x0, 0x201a7fd7, 0xa, 0x0, 0xffffffc0}], {0x95}}, &(0x7f0000000000)='GPL\x00', 0x6, 0x2ed, &(0x7f00001a7f05)=""/251}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0xb6, &(0x7f0000000040)="03e43ae3e0e0e4a1b4d6dcfbf56a", &(0x7f0000000100)=""/182}, 0x28) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x3, 0x8, 0x100000001, 0x9474, 0xa, 0xffffffffffffffff, 0x6}, 0x2c) 2018/03/31 05:13:40 executing program 4: mount(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='ncpfs\x00', 0x80802, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x50, &(0x7f0000000700)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780)=r0, 0x4) mount(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='./file0\x00', &(0x7f00000006c0)='btrfs\x00', 0x89402, &(0x7f0000000900)="e196efa3cb748d2a6600968b76295ff919bc3877b18eb8d265a35493fcf34fdc965cd5c837d2389c6e2ec6088abe8daaa8ca23f9298fc94dc26874bc4d4567afea1ca0879cdf21e915005a83e96b1002af29091d2176abbb7fec088a67f2e1390f32adaf2f252d24510870f8df7186936f4d88957eb8fcda78b7383a7d24db701d524557ee7324433e70d9ffa185098325f9e657d3c29cf6a35843cb96780269db1c735d55938af5c60e1e4ba25928697277b0fdf356b62399b4c8826d09bfca7d6078c19b4995195ea814b1bb40c06210ec") ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0xffffffff) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6f3, 0x0, 0x0, 0x0, 0x0, 0xfffdffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x22, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000f6bffb)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000400)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000540)={r1, 0x50}, 0xfffffe74) close(r1) perf_event_open(&(0x7f0000348f88)={0x2, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x28, 0x2, 0x0, &(0x7f0000000000)={0x0}) mkdir(&(0x7f0000000100)='./file0\x00', 0x1000000000) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='selinuxfs\x00', 0x1000, &(0x7f0000000100)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='minix\x00', 0x10020, &(0x7f0000000240)) 2018/03/31 05:13:40 executing program 7: r0 = getpid() r1 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x80}, r0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x1) r2 = socket$kcm(0x29, 0x0, 0x0) perf_event_open(&(0x7f0000000580)={0x3, 0x70, 0x0, 0x100, 0x80, 0x6, 0x0, 0x0, 0x84, 0x0, 0x3, 0x3, 0x3, 0x1, 0x6, 0x5, 0x7, 0x7, 0x80, 0x7, 0x1, 0x88, 0x8001, 0x5, 0x1, 0xf492, 0x7ff, 0x3f, 0x6, 0xe, 0xe400000000000000, 0xf60a, 0x6, 0xfcfa, 0x100000001, 0x4, 0x8001, 0x2, 0x0, 0xffffffff, 0x0, @perf_bp={&(0x7f0000000540), 0x4}, 0x408, 0x6, 0x5, 0x5, 0x800, 0x7, 0x4}, r0, 0x10, r1, 0x0) recvmsg$kcm(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000000100)=""/63, 0x3f, 0xfffffffffffffffc}, 0xfffffffffffffffe) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0xb, 0x6, 0xffffffffffffb2ef, 0x4, 0x0, 0xffffffffffffff9c, 0x5}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000480)={r3, &(0x7f0000000280)="dc0082022d94423b2cbd337125b47363e747390ac081835857ce88b8ed90fd71687bd6ecdd71d9a42055be7a3f0ccbc4e301cff2b9d2ff6dd8568636f52c4ffc670e73f9eb46c9d9bc93a94238c481690acc0b09020a427cddaae7a7830e79b5cb5c090d5a0535c6d291786c11cea3ae1a4a1d2e67efafae34b77a858dbe13c166ec07406acbdb490d968216f7cad8ae01829fbcefeaca0245fd90606658153d38473d8836cf58443c8c04b4a463b690f73df7273d268010e23057a38bfe026860208643db92bdaf0877ba6bb112069dc9c96b27984201971d19f06896933cd291", &(0x7f0000000380)=""/199}, 0x18) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000140)=0x3) mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) socketpair(0x10, 0x800, 0x5, &(0x7f0000001100)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x0, 0x2, &(0x7f0000000080)=@raw=[@alu={0x0, 0x0, 0x0, 0x7, 0xf, 0xfffffffd}], &(0x7f00000000c0)='GPL\x00', 0x8, 0x12, &(0x7f0000000100)=""/18, 0x41f00}, 0x48) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(r7, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x10, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0x11}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)=@vsock, 0xfffffffffffffda6, &(0x7f00000000c0)=[{&(0x7f0000000180)=""/154, 0x9a}], 0x1, &(0x7f0000000240)=""/105, 0x69}, 0x0) close(r7) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={r8, 0x28, &(0x7f0000000340)}, 0x10) sendmsg(r8, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x28a, &(0x7f0000000000)}, 0x0) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x0, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000006240)={0x0, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000004000000000000000010000000000ffff090000000000000000000000180000000000000000000000"], &(0x7f00000003c0)='GPL\x00', 0x0, 0x75, &(0x7f00000004c0)=""/117, 0x41100, 0x1}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x0, 0x3ff, 0x0, r9, 0x0, [0x115]}, 0x2c) socketpair(0x0, 0x1, 0x0, &(0x7f000000dff8)) close(r10) perf_event_open(&(0x7f0000001340)={0x7, 0x70, 0xfffffffffffffff9, 0x9, 0x5, 0xff, 0x0, 0x7fff, 0x0, 0x1, 0x3, 0x6, 0x457, 0x3, 0x5, 0x3, 0x9, 0x0, 0x40, 0x1, 0x1dc, 0x2, 0x0, 0x8001, 0x1, 0x0, 0x6, 0x4, 0x0, 0xff, 0x9, 0x7fff, 0x100000000, 0x8, 0x7, 0x6ad, 0xffffffffffffff14, 0x9, 0x0, 0x39, 0x4, @perf_config_ext={0x6, 0x80000000}, 0x400, 0xfffffffffffffff8, 0xffffffffffffff81, 0x3, 0x2, 0x6, 0xb75}, 0x0, 0x7, r6, 0x8) recvmsg$kcm(r5, &(0x7f0000001300)={0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000001140)=""/131, 0x83}], 0x1, &(0x7f0000001240)=""/134, 0x86, 0xfff}, 0x2000) perf_event_open(&(0x7f000000a000)={0x1, 0x78, 0x0, 0x0, 0xb140, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x800000, 0x0, @perf_bp={&(0x7f0000000000), 0x800000}, 0x0, 0x20000000, 0x6, 0x400010, 0x100}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000680)) socketpair(0x2, 0x80003, 0x8000, &(0x7f0000000600)) mkdir(&(0x7f0000002700)='./file2\x00', 0x8) 2018/03/31 05:13:40 executing program 5: socketpair$inet(0x1e, 0x5, 0x6, &(0x7f0000000000)={0x0, 0x0}) sendmsg(r1, &(0x7f0000000980)={0x0, 0x0, &(0x7f0000000940)=[{&(0x7f00000007c0)="ca4573abcf2079e0824362e17b8e4c08d48d13f3cd3d95e78c2b1c48bca7576db4209ea51b228d7caff935680b7c7b73ae6d8990f56bece389a29236c3859325de6a59edeb9b9ae1", 0x48}], 0x1, &(0x7f00000009c0)}, 0x20000000) recvmsg(r0, &(0x7f0000000040)={&(0x7f0000006980)=ANY=[@ANYRES32=0x0], 0x1, &(0x7f0000006d00)=[{&(0x7f0000006c40)=""/181, 0xa3}], 0x1, &(0x7f0000006d40)=""/65, 0x41, 0xffffffffffffffff}, 0x0) sendmsg(r1, &(0x7f0000001900)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)='v', 0x1}], 0x1, &(0x7f0000000440)=ANY=[]}, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000780)={0xffffffffffffffff, &(0x7f0000000480)="9b7815cd421eecc37df9250ab7496936ab4c75599ff96ba02ed5166be56df09fec2eef35318bf9b1311a39483f626e", &(0x7f00000006c0)=""/139}, 0x18) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000240)='afs\x00', 0x2005800, &(0x7f0000000100)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000811ffa)='bdev\x00', 0x100000, &(0x7f0000444000)) mount(&(0x7f0000000300)='./file0/file0\x00', &(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000280)='hfs\x00', 0x1001, 0x0) socketpair(0x4000000000a, 0xf, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xa, 0x7, 0x40, 0x4, 0x0, r3, 0xab2}, 0x2c) socketpair(0x19, 0x80001, 0x45f6bc9d, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0xffffffff943f26e7) r6 = gettid() r7 = perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x7, 0x8000, 0xffffffffffffffff, 0x1, 0x0, 0x3e8, 0x40000, 0x4, 0x100000001, 0x0, 0x4, 0x401, 0x4, 0x7, 0x4, 0xc892, 0x10000, 0x20, 0x4, 0x2, 0x4, 0x8, 0x7b, 0x7ff, 0x8, 0x20, 0x8, 0x2, 0xbf01, 0x40, 0x0, 0x7fffffff, 0x1000200, 0x6, 0x4f4f, 0x5, 0x0, 0xfff, 0x6, @perf_config_ext={0x7, 0x28a4}, 0x800, 0x7fffffff, 0xffffffffffffff85, 0x5, 0x0, 0x0, 0x5}, r6, 0xe, r4, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x0, 0x3, 0x3f, 0x5276c0000000, 0x5}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000002100)={0xffffffffffffffff, &(0x7f0000000100)="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", &(0x7f0000001100)=""/4096}, 0x18) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x13, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000002280)={&(0x7f0000002240)='./file0\x00'}, 0x10) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000a80)={0xc, 0xfffffffffffffffd, 0x0, 0x7, 0x8, 0xffffffffffffffff, 0xffffffff}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000002140)={0xd, 0x0, 0x200, 0x8, 0x3, r8}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffff0c, &(0x7f0000000a40)}, 0xfffffffffffffe04) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000002200)={0x0, 0x7fff, 0x18}, 0xc) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000080)) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000100)) socketpair(0x1f, 0x0, 0x0, &(0x7f0000000900)) r9 = gettid() perf_event_open(&(0x7f0000000240)={0x3, 0x70, 0x10000, 0x2, 0x401, 0xbf, 0x0, 0x8, 0x8040, 0x8, 0x4, 0x4, 0x358, 0xe1f, 0x4, 0x90, 0x0, 0x2, 0x9, 0x81, 0x10000, 0x4, 0x136, 0x3ff, 0x168, 0x3, 0x7, 0x9, 0x100, 0x100000001, 0x5, 0x218, 0x5, 0x6, 0x0, 0x5, 0x800, 0x1ff, 0x0, 0x1, 0x1, @perf_bp={&(0x7f0000000000), 0x2}, 0x400, 0x757, 0x2, 0x2, 0x3ff, 0x2, 0x800}, r9, 0xb, r2, 0x1) perf_event_open(&(0x7f0000000480)={0x5, 0x70, 0x100000000, 0xffffffff, 0x7, 0x9, 0x0, 0xfff, 0x20000, 0x5, 0x4, 0x0, 0x15d69fa4, 0xe92, 0x1, 0x3, 0x97d0, 0x2, 0x4, 0x10001, 0xad02, 0xba5, 0x2, 0x80000001, 0x3ff, 0x5, 0x7, 0x7, 0x9, 0x2bd, 0x3, 0x7, 0x8, 0x1f, 0xfffffffffffffc01, 0x2, 0xd, 0x6, 0x0, 0xb30, 0x2, @perf_bp={&(0x7f00000001c0), 0x6}, 0x2000, 0x7fff, 0x70000000, 0x3, 0x3ff, 0x1000, 0x8}, r9, 0x8, r7, 0x8) 2018/03/31 05:13:40 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x7f, 0x7, 0x5, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r0, &(0x7f0000000080)='L', &(0x7f00000000c0)}, 0x20) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={&(0x7f0000000040)='./file0\x00', r0}, 0x10) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r0, &(0x7f00000001c0)='*', &(0x7f00000002c0)=""/209}, 0x18) 2018/03/31 05:13:40 executing program 2: socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000040)={0x7, 0x70, 0x1, 0xaabc, 0x2, 0x2, 0x0, 0xec, 0x4800, 0x1, 0x3a6b72c9, 0xffffffffffff8000, 0xfff, 0x7, 0x2, 0x7, 0xff, 0x1, 0x2, 0x9, 0x1, 0x0, 0x5, 0x75, 0x2, 0x7, 0x8, 0x4, 0x0, 0xdbce, 0xffff, 0xfaf, 0x1, 0xe7, 0xd0eb, 0x28a5, 0x9, 0x4, 0x0, 0x7, 0x2, @perf_config_ext={0x1, 0x8000}, 0x489, 0x6, 0xff, 0x0, 0x9d, 0x8, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f00000000c0)={0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000140)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r2 = getpid() r3 = perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x8, 0x4, 0x4, 0x1, 0x0, 0x401, 0x100, 0x7, 0xcfc0, 0x7, 0x0, 0x7, 0x30, 0x7, 0x7, 0xfff, 0x7, 0x9, 0xff, 0x9, 0xf, 0x0, 0x3, 0x100000000, 0x3, 0x8, 0xffff, 0x2, 0x3, 0xff, 0x6f, 0x3, 0x5, 0x800, 0x81, 0x0, 0x0, 0x9, 0x1, @perf_bp={&(0x7f0000000180), 0x1}, 0x11815, 0x9, 0x1, 0x1, 0x101, 0x0, 0x1e892fee}, r2, 0x9, r1, 0x1) r4 = perf_event_open(&(0x7f0000000280)={0x5, 0x70, 0xe00000000000, 0x9, 0x800, 0x6, 0x0, 0x7ff, 0x10200, 0xb, 0xe3, 0x5, 0x1, 0x4, 0x9b0f, 0x1f8a, 0x401, 0x1, 0xe975, 0x7, 0x437, 0x9, 0x7f, 0x20, 0x1, 0x2, 0x3, 0x5, 0x200, 0x1, 0x8, 0x401, 0x401, 0x2, 0x8, 0xfff, 0xf3c8, 0xf23, 0x0, 0x7fffffff, 0x0, @perf_bp={&(0x7f0000000240), 0x9}, 0x828, 0x3, 0x5, 0x1, 0x0, 0xc37, 0x6}, r2, 0x4, r1, 0x2) r5 = perf_event_open(&(0x7f0000000300)={0x4, 0x70, 0xff, 0x3, 0x7f, 0x7, 0x0, 0x40, 0x4a240, 0x2, 0xffffffffffffcc27, 0xb8, 0x2, 0x7, 0x9, 0x800, 0x3, 0x7d4d, 0xf7, 0xfffffffffffffffa, 0x9, 0x4, 0x3, 0x90be, 0x9, 0xfffffffffffffffc, 0x6, 0x3ff, 0xab6b, 0x8001, 0x5, 0x2, 0x9, 0x732, 0x400, 0x55000000000, 0x1ff, 0x6, 0x0, 0x0, 0x2, @perf_config_ext={0x6, 0xffffffff}, 0x40, 0x80000001, 0x7fff, 0x2, 0x1, 0x6, 0x5}, r2, 0xf, r4, 0xa) r6 = perf_event_open(&(0x7f00000003c0)={0x7, 0x70, 0xc87d, 0x6, 0x5, 0x80000001, 0x0, 0x3, 0x1, 0xb, 0xffffffff, 0x9, 0x584, 0x31b, 0x7, 0x2, 0x3, 0x544, 0x100000001, 0x9, 0x1, 0x100, 0x3, 0x1, 0x7, 0x0, 0x7, 0x5, 0xbb, 0x40, 0x7, 0x8, 0x81, 0xc5a, 0x0, 0x7, 0x1f, 0x815, 0x0, 0xffff, 0x2, @perf_bp={&(0x7f0000000380), 0x8}, 0x4, 0x5, 0xc95, 0x0, 0x7ff, 0x7b02, 0x7}, r2, 0x10, r1, 0xb) ioctl$PERF_EVENT_IOC_DISABLE(r3, 0x2401, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0x4) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = perf_event_open(&(0x7f0000000480)={0x7, 0x70, 0x7, 0xdbff, 0x3, 0x3f, 0x0, 0x8, 0x0, 0xc, 0x8, 0x0, 0xf43, 0x101, 0x6, 0x5, 0x6, 0x9, 0x200, 0xfffffffffffffffd, 0x4, 0x6, 0x6e, 0x20, 0x1b3, 0x1fe, 0x7ff, 0x3, 0x8000, 0x5, 0x0, 0x0, 0x0, 0x5, 0x22d2, 0x401, 0x68, 0xa1ce, 0x0, 0x4, 0x0, @perf_config_ext={0x2fb, 0x4}, 0x2000, 0xd33, 0x6, 0x697c4c7d75b7b6da, 0x171f, 0x9, 0x9}, r2, 0x6, r5, 0x1) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x9, 0x6, 0x101, 0x8, 0x0, 0x200, 0x2000, 0xf, 0x0, 0x5, 0x6, 0x3, 0x2, 0x0, 0x8001, 0x8, 0x3, 0x5, 0x17, 0x7, 0x4, 0x400, 0xffffffff, 0x7, 0x8000, 0x2, 0x100, 0x0, 0x7, 0x95de, 0x2, 0x1, 0x2, 0xd432, 0x3ff, 0x8599, 0x0, 0x3ff, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x10080, 0x7, 0xe7e, 0x7, 0x5, 0x7, 0x9}, r2, 0x0, r3, 0x8) close(r7) ioctl$PERF_EVENT_IOC_DISABLE(r9, 0x2401, 0x1) r10 = gettid() ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f00000005c0)={r0}) ioctl$sock_kcm_SIOCKCMUNATTACH(r11, 0x89e1, &(0x7f0000000600)={r8}) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000640)) r12 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)={0x4, 0x7, 0x7f, 0x9787, 0x1c, 0xffffffffffffffff, 0x5}, 0x2c) recvmsg$kcm(r11, &(0x7f0000009440)={&(0x7f0000009300)=@can={0x0, 0x0}, 0x80, &(0x7f00000093c0)=[{&(0x7f0000009380)=""/16, 0x10}], 0x1, &(0x7f0000009400)=""/18, 0x12, 0x3bc1}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000009480)={0xf, 0x13, &(0x7f00000006c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [@ldst={0x3, 0x2, 0x1, 0x2, 0x7, 0xffffffff, 0x4}, @map={0x18, 0x0, 0x1, 0x0, r12}, @alu={0x7, 0x5, 0xf, 0x6, 0xe, 0x2, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4}, @jmp={0x5, 0x7a4c, 0x0, 0x3, 0x9, 0xffffffff, 0xfffffffffffffff0}, @alu={0x4, 0x20, 0x9, 0x9, 0x5, 0xfffffffe, 0x4}, @jmp={0x5, 0x81, 0x9, 0x7, 0x6, 0xfffffffe, 0xfffffffffffffff0}, @jmp={0x5, 0x3, 0x3, 0x0, 0x2, 0x2, 0xffffffffffffffff}], {0x95}}, &(0x7f0000000780)='GPL\x00', 0x4, 0x77, &(0x7f00000007c0)=""/119, 0x0, 0x1, [], r13}, 0x48) mount(&(0x7f0000009500)='./file0\x00', &(0x7f0000009540)='./file0\x00', &(0x7f0000009580)='cramfs\x00', 0x5020, &(0x7f00000095c0)="22f464f8fef2b95976576e903efe99229584aaf55fa0d91223905d4a68c0c7d18bf26de6fec0660b0c36945200da04f802d9059dd5f6d2f0eca450f4fdd46ed2b411588d802f0d1d02be65816332b2754d686e927593deb8ee3ed17a24d749db81290c33836bcc9b7d93084c53d0744e81deb8b83d9b23565d6db4cb746eb15b20f7b806f0b5a02676d90260a61b00e9ec0b4b8bf07d5f93b3feda8299586c3936f743c764205de278c25a6fff98") perf_event_open(&(0x7f00000096c0)={0x1, 0x70, 0x3, 0xa8e, 0x1000, 0xe57a, 0x0, 0x6, 0x2100b, 0x2, 0x9, 0xdb1b, 0xfffffffffffffffa, 0xa7f8, 0x3, 0x2, 0x800, 0x800, 0x2, 0x0, 0x3f, 0x3, 0x8000000000000, 0x3, 0x20, 0x6, 0x3, 0xfffffffffffff318, 0xffffffffffff0001, 0xfffffffffffffffe, 0x12, 0x1, 0x101, 0x8, 0x100, 0x1, 0x3, 0x8, 0x0, 0x3ff, 0x7, @perf_bp={&(0x7f0000009680), 0x3}, 0x9, 0x6, 0xfffffffffffffff7, 0x0, 0x0, 0x49, 0xfffffffffffff3b8}, r10, 0xe, r5, 0x8) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000009880)={r12, &(0x7f0000009740)="8ba447000764036f17624e623896639a3e2456b901aedcdb4221cea83c3b2c94575967a34ec104bbebeaf6a6b50494e6763f41056d2ca84f906fa48d72590e81334926fab48e", &(0x7f00000097c0)=""/170}, 0x18) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r4, 0x2405, r6) bpf$PROG_LOAD(0x5, &(0x7f00000099c0)={0x7, 0x4, &(0x7f00000098c0)=@raw=[@ldst={0x3, 0x3, 0x6, 0xd, 0x7, 0x26}, @ldst={0x0, 0x2, 0x0, 0xa, 0x0, 0x4, 0xffffffffffffffff}], &(0x7f0000009900)='GPL\x00', 0x5, 0x5d, &(0x7f0000009940)=""/93, 0x41f00, 0x1, [], r13}, 0x48) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000009b40)={r8, &(0x7f0000009a40)="402c0b8b20e0ae84bb", &(0x7f0000009a80)=""/178}, 0x18) 2018/03/31 05:13:40 executing program 6 (fault-call:17 fault-nth:54): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x0, 0x101, 0x4, 0x0, 0x1, r0, 0x0, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r2 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)={0xffffffffffffffff}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r2, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x0, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0", 0xc9}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000280)={&(0x7f0000000680)='./file0\x00'}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r1}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r3) gettid() close(0xffffffffffffffff) 2018/03/31 05:13:40 executing program 0: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000540)={0xffffffffffffff9c}) recvmsg$kcm(r0, &(0x7f0000002cc0)={&(0x7f0000000580)=@can, 0x80, &(0x7f0000002b00)=[{&(0x7f0000000600)=""/84, 0x54}, {&(0x7f0000000680)=""/4096, 0x1000}, {&(0x7f0000001680)}, {&(0x7f00000016c0)=""/123, 0x7b}, {&(0x7f0000001740)=""/231, 0xe7}, {&(0x7f0000001840)=""/232, 0xe8}, {&(0x7f0000001940)=""/213, 0xd5}, {&(0x7f0000001a40)=""/150, 0x96}, {&(0x7f0000001b00)=""/4096, 0x1000}], 0x9, &(0x7f0000002bc0)=""/234, 0xea}, 0x2102) r1 = perf_event_open(&(0x7f00000004c0)={0x1000000000000, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0xffffffffffffffe0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x7, 0x4, 0x7, 0x0, 0xffffffffffffff9c, 0xd9}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000002e80)=ANY=[@ANYBLOB="03000000000000000000000000c5000000000000"]) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000040)}, 0x10) r3 = perf_event_open(&(0x7f0000000000)={0x7, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, r2, 0x0) socketpair$packet(0x11, 0x7, 0x300, &(0x7f0000002e00)) r4 = getpid() r5 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x8000, 0xff, 0x800, 0x0, 0x800, 0x1000, 0x5, 0x7f, 0x5b, 0x1, 0x401, 0x5e96, 0x10000, 0x2, 0x9, 0x4, 0xffffffffffff1fa5, 0x2, 0x0, 0x0, 0x8, 0x3800000000, 0x4a21c621, 0x1000, 0x8, 0xffff, 0xb8, 0x9ed, 0x9, 0x3, 0x7, 0x80, 0x200, 0x3f, 0x800, 0x0, 0x10001, 0x1, @perf_bp={&(0x7f0000000140), 0x8}, 0x8, 0x4, 0x1, 0x1, 0x1000, 0x0, 0x8001}, r4, 0x4, r3, 0x1) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x37, 0x0, 0x0, 0x0, 0x4204, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x13, 0x0, 0x0, 0x4982, 0x0, 0x80000000, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80}, 0x0, 0xfff, 0x0, 0x4, 0x5}, 0x0, 0x0, r2, 0x2) mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000340)='gfs2\x00', 0x8400, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240), 0x10) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000002f00)={&(0x7f0000002ec0)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000380)='gfs2\x00') ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x0) r6 = perf_event_open(&(0x7f0000000080)={0x6, 0x70, 0x5, 0x7f, 0x0, 0x7fffffff, 0x0, 0x9, 0x2000, 0x0, 0xeb5, 0x1, 0x0, 0x100000000, 0x0, 0xfffffffffffffffb, 0x1000000000000, 0x10000, 0xfffffffffffffff7, 0x8, 0x2, 0x18e53743, 0x9, 0x1000, 0x1000, 0x0, 0x6, 0x4, 0x10001, 0x80000000, 0x4b1ee5e1, 0xffff, 0x0, 0x0, 0x100000001, 0x6, 0x4c434f50, 0x6, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000040)}, 0x22000, 0x0, 0x1ff, 0x0, 0x8, 0x2, 0x6}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x40082406, &(0x7f0000000100)='\x00') ioctl$PERF_EVENT_IOC_DISABLE(r3, 0x2401, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x10, 0x4, 0x4, 0x5, 0x0, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_DISABLE(r5, 0x2401, 0x3f) perf_event_open(&(0x7f0000002d40)={0x1, 0x70, 0x7fffffff, 0x0, 0x7fffffff, 0x4, 0x0, 0x5, 0x4809b, 0x2, 0x20, 0x0, 0x6, 0x3d7, 0x1f, 0x8, 0x401, 0xffffffffffffffea, 0x100000000, 0x3, 0x9, 0x4, 0x100, 0x9, 0x8, 0x3ff, 0x0, 0x6, 0xfffffffffffffffc, 0x5, 0x1f, 0x8000, 0x6, 0x80, 0x400, 0xfffffffffffffffe, 0x0, 0xff, 0x0, 0x1, 0x1, @perf_bp={&(0x7f0000002d00), 0xa}, 0x2010, 0x1000, 0x5, 0x1, 0x101, 0x752, 0x1}, r4, 0x9, r5, 0x1) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x6) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x13, 0x0, 0x7ffffd, 0x0, 0x10020000000, 0x0}, 0x2c) r8 = socket$kcm(0x29, 0xa, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r8, 0x89e1, &(0x7f0000002dc0)={r8}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000480)={r7, &(0x7f00000003c0)="00443275a6eb8c6681f75c7b07fdb8c38c51a4df7cd4d24ad11f922f1618454524b3e4a3", &(0x7f0000000400)="81ca647886554928194293925f84f92d8af5f357f08fa64fa8dd79aa385627fcecf93b3b9f14c6964498cb654021aee86bb77333fa5c004f4fbc7ceefaa7dba52ce92b7d10bd02dbf1bd6efb99f6668e682266d8757661acd6f3a542542a31dde06b96649a4737a30b3b34c29f2cb9789edd7ef09f3db869676127118a", 0x3}, 0x20) [ 192.708383] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000035 [ 192.794856] EXT4-fs (sda1): re-mounted. Opts: 2018/03/31 05:13:40 executing program 2: socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000040)={0x7, 0x70, 0x1, 0xaabc, 0x2, 0x2, 0x0, 0xec, 0x4800, 0x1, 0x3a6b72c9, 0xffffffffffff8000, 0xfff, 0x7, 0x2, 0x7, 0xff, 0x1, 0x2, 0x9, 0x1, 0x0, 0x5, 0x75, 0x2, 0x7, 0x8, 0x4, 0x0, 0xdbce, 0xffff, 0xfaf, 0x1, 0xe7, 0xd0eb, 0x28a5, 0x9, 0x4, 0x0, 0x7, 0x2, @perf_config_ext={0x1, 0x8000}, 0x489, 0x6, 0xff, 0x0, 0x9d, 0x8, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f00000000c0)={0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000140)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r2 = getpid() r3 = perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x8, 0x4, 0x4, 0x1, 0x0, 0x401, 0x100, 0x7, 0xcfc0, 0x7, 0x0, 0x7, 0x30, 0x7, 0x7, 0xfff, 0x7, 0x9, 0xff, 0x9, 0xf, 0x0, 0x3, 0x100000000, 0x3, 0x8, 0xffff, 0x2, 0x3, 0xff, 0x6f, 0x3, 0x5, 0x800, 0x81, 0x0, 0x0, 0x9, 0x1, @perf_bp={&(0x7f0000000180), 0x1}, 0x11815, 0x9, 0x1, 0x1, 0x101, 0x5}, r2, 0x9, r1, 0x1) r4 = perf_event_open(&(0x7f0000000280)={0x5, 0x70, 0xe00000000000, 0x9, 0x800, 0x6, 0x0, 0x7ff, 0x10200, 0xb, 0xe3, 0x5, 0x1, 0x4, 0x9b0f, 0x1f8a, 0x401, 0x1, 0xe975, 0x7, 0x437, 0x9, 0x7f, 0x20, 0x1, 0x2, 0x3, 0x5, 0x200, 0x1, 0x8, 0x401, 0x401, 0x2, 0x8, 0xfff, 0xf3c8, 0xf23, 0x0, 0x7fffffff, 0x0, @perf_bp={&(0x7f0000000240), 0x9}, 0x828, 0x3, 0x5, 0x1, 0x0, 0xc37, 0x6}, r2, 0x4, r1, 0x2) r5 = perf_event_open(&(0x7f0000000300)={0x4, 0x70, 0xff, 0x3, 0x7f, 0x7, 0x0, 0x40, 0x4a240, 0x2, 0xffffffffffffcc27, 0xb8, 0x2, 0x7, 0x9, 0x800, 0x3, 0x7d4d, 0xf7, 0xfffffffffffffffa, 0x9, 0x4, 0x3, 0x90be, 0x9, 0xfffffffffffffffc, 0x6, 0x3ff, 0xab6b, 0x8001, 0x5, 0x2, 0x9, 0x732, 0x400, 0x55000000000, 0x1ff, 0x6, 0x0, 0x0, 0x2, @perf_config_ext={0x6, 0xffffffff}, 0x40, 0x80000001, 0x7fff, 0x2, 0x1, 0x6, 0x5}, r2, 0xf, r4, 0xa) r6 = perf_event_open(&(0x7f00000003c0)={0x7, 0x70, 0xc87d, 0x6, 0x5, 0x80000001, 0x0, 0x3, 0x1, 0xb, 0xffffffff, 0x9, 0x584, 0x31b, 0x7, 0x2, 0x3, 0x544, 0x100000001, 0x9, 0x1, 0x100, 0x3, 0x1, 0x7, 0x0, 0x7, 0x5, 0xbb, 0x40, 0x7, 0x8, 0x81, 0xc5a, 0x0, 0x7, 0x1f, 0x815, 0x0, 0xffff, 0x2, @perf_bp={&(0x7f0000000380), 0x8}, 0x4, 0x5, 0xc95, 0x0, 0x7ff, 0x7b02, 0x7}, r2, 0x10, r1, 0xb) ioctl$PERF_EVENT_IOC_DISABLE(r3, 0x2401, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0x4) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = perf_event_open(&(0x7f0000000480)={0x7, 0x70, 0x7, 0xdbff, 0x3, 0x3f, 0x0, 0x8, 0x0, 0xc, 0x8, 0x0, 0xf43, 0x101, 0x6, 0x5, 0x6, 0x9, 0x200, 0xfffffffffffffffd, 0x4, 0x6, 0x6e, 0x20, 0x1b3, 0x1fe, 0x7ff, 0x3, 0x8000, 0x5, 0x0, 0x0, 0x0, 0x5, 0x22d2, 0x401, 0x68, 0xa1ce, 0x0, 0x4, 0x0, @perf_config_ext={0x2fb, 0x4}, 0x2000, 0xd33, 0x6, 0x697c4c7d75b7b6da, 0x171f, 0x9, 0x9}, r2, 0x6, r5, 0x1) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x9, 0x6, 0x101, 0x8, 0x0, 0x200, 0x2000, 0xf, 0x0, 0x5, 0x6, 0x3, 0x2, 0x0, 0x8001, 0x8, 0x3, 0x5, 0x17, 0x7, 0x4, 0x400, 0xffffffff, 0x7, 0x8000, 0x2, 0x100, 0x0, 0x7, 0x95de, 0x2, 0x1, 0x2, 0xd432, 0x3ff, 0x8599, 0x0, 0x3ff, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x10080, 0x7, 0xe7e, 0x7, 0x5, 0x7, 0x9}, r2, 0x0, r3, 0x8) close(r7) ioctl$PERF_EVENT_IOC_DISABLE(r9, 0x2401, 0x1) r10 = gettid() ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f00000005c0)={r0}) ioctl$sock_kcm_SIOCKCMUNATTACH(r11, 0x89e1, &(0x7f0000000600)={r8}) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000640)) r12 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)={0x4, 0x7, 0x7f, 0x9787, 0x1c, 0xffffffffffffffff, 0x5}, 0x2c) recvmsg$kcm(r11, &(0x7f0000009440)={&(0x7f0000009300)=@can={0x0, 0x0}, 0x80, &(0x7f00000093c0)=[{&(0x7f0000009380)=""/16, 0x10}], 0x1, &(0x7f0000009400)=""/18, 0x12, 0x3bc1}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000009480)={0xf, 0x13, &(0x7f00000006c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [@ldst={0x3, 0x2, 0x1, 0x2, 0x7, 0xffffffff, 0x4}, @map={0x18, 0x0, 0x1, 0x0, r12}, @alu={0x7, 0x5, 0xf, 0x6, 0xe, 0x2, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4}, @jmp={0x5, 0x7a4c, 0x0, 0x3, 0x9, 0xffffffff, 0xfffffffffffffff0}, @alu={0x4, 0x20, 0x9, 0x9, 0x5, 0xfffffffe, 0x4}, @jmp={0x5, 0x81, 0x9, 0x7, 0x6, 0xfffffffe, 0xfffffffffffffff0}, @jmp={0x5, 0x3, 0x3, 0x0, 0x2, 0x2, 0xffffffffffffffff}], {0x95}}, &(0x7f0000000780)='GPL\x00', 0x4, 0x77, &(0x7f00000007c0)=""/119, 0x0, 0x1, [], r13}, 0x48) mount(&(0x7f0000009500)='./file0\x00', &(0x7f0000009540)='./file0\x00', &(0x7f0000009580)='cramfs\x00', 0x5020, &(0x7f00000095c0)="22f464f8fef2b95976576e903efe99229584aaf55fa0d91223905d4a68c0c7d18bf26de6fec0660b0c36945200da04f802d9059dd5f6d2f0eca450f4fdd46ed2b411588d802f0d1d02be65816332b2754d686e927593deb8ee3ed17a24d749db81290c33836bcc9b7d93084c53d0744e81deb8b83d9b23565d6db4cb746eb15b20f7b806f0b5a02676d90260a61b00e9ec0b4b8bf07d5f93b3feda8299586c3936f743c764205de278c25a6fff98") perf_event_open(&(0x7f00000096c0)={0x1, 0x70, 0x3, 0xa8e, 0x1000, 0xe57a, 0x0, 0x6, 0x2100b, 0x2, 0x9, 0xdb1b, 0xfffffffffffffffa, 0xa7f8, 0x3, 0x2, 0x800, 0x800, 0x2, 0x0, 0x3f, 0x3, 0x8000000000000, 0x3, 0x20, 0x6, 0x3, 0xfffffffffffff318, 0xffffffffffff0001, 0xfffffffffffffffe, 0x12, 0x1, 0x101, 0x8, 0x100, 0x1, 0x3, 0x8, 0x0, 0x3ff, 0x7, @perf_bp={&(0x7f0000009680), 0x3}, 0x9, 0x6, 0xfffffffffffffff7, 0x0, 0x0, 0x49, 0xfffffffffffff3b8}, r10, 0xe, r5, 0x8) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000009880)={r12, &(0x7f0000009740)="8ba447000764036f17624e623896639a3e2456b901aedcdb4221cea83c3b2c94575967a34ec104bbebeaf6a6b50494e6763f41056d2ca84f906fa48d72590e81334926fab48e", &(0x7f00000097c0)=""/170}, 0x18) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r4, 0x2405, r6) bpf$PROG_LOAD(0x5, &(0x7f00000099c0)={0x7, 0x4, &(0x7f00000098c0)=@raw=[@ldst={0x3, 0x3, 0x6, 0xd, 0x7, 0x26}, @ldst={0x0, 0x2, 0x0, 0xa, 0x0, 0x4, 0xffffffffffffffff}], &(0x7f0000009900)='GPL\x00', 0x5, 0x5d, &(0x7f0000009940)=""/93, 0x41f00, 0x1, [], r13}, 0x48) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000009b40)={r8, &(0x7f0000009a40)="402c0b8b20e0ae84bb", &(0x7f0000009a80)=""/178}, 0x18) 2018/03/31 05:13:40 executing program 3: r0 = perf_event_open(&(0x7f0000001700)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xc, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="0000000000f20000"], &(0x7f00000001c0)="73797a6b616c6c65720001be826e8f833152f795b4d9f4bc3ea582523aed371b084fccfc3d2ef2cbe65d30642ca8dcd0f8479be52e66937908f1d8112489e8099d9d4edb806d81189c0fbb6818d028546c35d3363d54db0db780f54977ae6359d617c1d233d8e18abfc75f9a76cd8e1f77583bc02f07a33de6f304e95db82fd4da55ebd25162df6f88e7d1bb0654ffb31e008967", 0x1, 0x99, &(0x7f000000d000)=""/153}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xf, 0x18, &(0x7f0000000340)="0aac1ac22028f176e0e5504088ca6b", &(0x7f0000000140)=""/24, 0x0, 0x1000000008}, 0x28) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) gettid() setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000100)=r1, 0x4) recvmsg(r2, &(0x7f0000000580)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/74, 0x4a}, {&(0x7f0000000400)=""/133, 0x85}], 0x2, &(0x7f0000000500)=""/106, 0x6a, 0x401}, 0x1) r3 = gettid() ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f00000005c0)=0x955) perf_event_open(&(0x7f0000000280)={0x2, 0x70, 0xfffffffffffff514, 0x8, 0x1, 0x1, 0x0, 0xee15e3d, 0x40000, 0x6, 0x1e, 0x4, 0xe2e, 0xfffffffffffffa62, 0x10001, 0x80000000, 0x1, 0x7, 0x7, 0x6058, 0x1, 0x3, 0x7, 0x4, 0x1ff, 0xce26, 0xf348, 0x3, 0x6, 0x3, 0x1, 0x9, 0xff, 0x0, 0x3, 0x0, 0x0, 0x4, 0x0, 0x4000000000000, 0x1, @perf_config_ext={0x6, 0x4427}, 0x1, 0x8, 0x5, 0x7, 0x0, 0xffffffffffffff01, 0x10000}, r3, 0xd, r0, 0xa) [ 192.840906] FAULT_INJECTION: forcing a failure. [ 192.840906] name failslab, interval 1, probability 0, space 0, times 0 [ 192.852252] CPU: 1 PID: 16331 Comm: syz-executor6 Not tainted 4.16.0-rc6+ #42 [ 192.859528] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 192.868886] Call Trace: [ 192.871486] dump_stack+0x194/0x24d [ 192.875127] ? arch_local_irq_restore+0x53/0x53 [ 192.879802] ? __save_stack_trace+0x7e/0xd0 [ 192.884137] should_fail+0x8c0/0xa40 [ 192.887857] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 192.892971] ? kasan_kmalloc+0xad/0xe0 [ 192.896864] ? kmem_cache_alloc_trace+0x136/0x740 [ 192.901716] ? __memcg_init_list_lru_node+0x169/0x270 [ 192.906914] ? __list_lru_init+0x544/0x750 [ 192.911157] ? sget_userns+0x6b1/0xe40 [ 192.915051] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 192.919806] ? do_mount+0xea4/0x2bb0 [ 192.923519] ? SyS_mount+0xab/0x120 [ 192.927146] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 192.932518] ? find_held_lock+0x35/0x1d0 [ 192.936589] ? __lock_is_held+0xb6/0x140 2018/03/31 05:13:40 executing program 2: socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000040)={0x7, 0x70, 0x1, 0xaabc, 0x2, 0x2, 0x0, 0xec, 0x4800, 0x1, 0x3a6b72c9, 0xffffffffffff8000, 0xfff, 0x7, 0x2, 0x7, 0xff, 0x1, 0x2, 0x9, 0x1, 0x0, 0x5, 0x75, 0x2, 0x7, 0x8, 0x4, 0x0, 0xdbce, 0xffff, 0xfaf, 0x1, 0xe7, 0xd0eb, 0x28a5, 0x9, 0x4, 0x0, 0x7, 0x2, @perf_config_ext={0x1, 0x8000}, 0x489, 0x6, 0xff, 0x0, 0x9d, 0x8, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f00000000c0)={0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000140)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r2 = getpid() r3 = perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x8, 0x4, 0x4, 0x1, 0x0, 0x401, 0x100, 0x7, 0xcfc0, 0x7, 0x0, 0x7, 0x30, 0x7, 0x7, 0xfff, 0x7, 0x9, 0xff, 0x9, 0xf, 0x0, 0x3, 0x100000000, 0x3, 0x8, 0xffff, 0x2, 0x3, 0xff, 0x6f, 0x3, 0x5, 0x800, 0x81, 0x0, 0x0, 0x9, 0x1, @perf_bp={&(0x7f0000000180), 0x1}, 0x11815, 0x9, 0x1, 0x1, 0x101, 0x5}, r2, 0x9, r1, 0x1) r4 = perf_event_open(&(0x7f0000000280)={0x5, 0x70, 0xe00000000000, 0x9, 0x800, 0x6, 0x0, 0x7ff, 0x10200, 0xb, 0xe3, 0x5, 0x1, 0x4, 0x9b0f, 0x1f8a, 0x401, 0x1, 0xe975, 0x7, 0x437, 0x9, 0x7f, 0x20, 0x1, 0x2, 0x3, 0x5, 0x200, 0x1, 0x8, 0x401, 0x401, 0x2, 0x8, 0xfff, 0xf3c8, 0xf23, 0x0, 0x7fffffff, 0x0, @perf_bp={&(0x7f0000000240), 0x9}, 0x828, 0x3, 0x5, 0x1, 0x0, 0xc37, 0x6}, r2, 0x4, r1, 0x2) r5 = perf_event_open(&(0x7f0000000300)={0x4, 0x70, 0xff, 0x3, 0x7f, 0x7, 0x0, 0x40, 0x4a240, 0x2, 0xffffffffffffcc27, 0xb8, 0x2, 0x7, 0x9, 0x800, 0x3, 0x7d4d, 0xf7, 0xfffffffffffffffa, 0x9, 0x4, 0x3, 0x90be, 0x9, 0xfffffffffffffffc, 0x6, 0x3ff, 0xab6b, 0x8001, 0x5, 0x2, 0x9, 0x732, 0x400, 0x55000000000, 0x1ff, 0x6, 0x0, 0x0, 0x2, @perf_config_ext={0x6, 0xffffffff}, 0x40, 0x80000001, 0x7fff, 0x2, 0x1, 0x6, 0x5}, r2, 0xf, r4, 0xa) r6 = perf_event_open(&(0x7f00000003c0)={0x7, 0x70, 0xc87d, 0x6, 0x5, 0x80000001, 0x0, 0x3, 0x1, 0xb, 0xffffffff, 0x9, 0x584, 0x31b, 0x7, 0x2, 0x3, 0x544, 0x100000001, 0x9, 0x1, 0x100, 0x3, 0x1, 0x7, 0x0, 0x7, 0x5, 0xbb, 0x40, 0x7, 0x8, 0x81, 0xc5a, 0x0, 0x7, 0x1f, 0x815, 0x0, 0xffff, 0x2, @perf_bp={&(0x7f0000000380), 0x8}, 0x4, 0x5, 0xc95, 0x0, 0x7ff, 0x7b02, 0x7}, r2, 0x10, r1, 0xb) ioctl$PERF_EVENT_IOC_DISABLE(r3, 0x2401, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0x4) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = perf_event_open(&(0x7f0000000480)={0x7, 0x70, 0x7, 0xdbff, 0x3, 0x3f, 0x0, 0x8, 0x0, 0xc, 0x8, 0x0, 0xf43, 0x101, 0x6, 0x5, 0x6, 0x9, 0x200, 0xfffffffffffffffd, 0x4, 0x6, 0x6e, 0x20, 0x1b3, 0x1fe, 0x7ff, 0x3, 0x8000, 0x5, 0x0, 0x0, 0x0, 0x5, 0x22d2, 0x401, 0x68, 0xa1ce, 0x0, 0x4, 0x0, @perf_config_ext={0x2fb, 0x4}, 0x2000, 0xd33, 0x6, 0x697c4c7d75b7b6da, 0x171f, 0x9, 0x9}, r2, 0x6, r5, 0x1) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x9, 0x6, 0x101, 0x8, 0x0, 0x200, 0x2000, 0xf, 0x0, 0x5, 0x6, 0x3, 0x2, 0x0, 0x8001, 0x8, 0x3, 0x5, 0x17, 0x7, 0x4, 0x400, 0xffffffff, 0x7, 0x8000, 0x2, 0x100, 0x0, 0x7, 0x95de, 0x2, 0x1, 0x2, 0xd432, 0x3ff, 0x8599, 0x0, 0x3ff, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x10080, 0x7, 0xe7e, 0x7, 0x5, 0x7, 0x9}, r2, 0x0, r3, 0x8) close(r7) ioctl$PERF_EVENT_IOC_DISABLE(r9, 0x2401, 0x1) r10 = gettid() ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f00000005c0)={r0}) ioctl$sock_kcm_SIOCKCMUNATTACH(r11, 0x89e1, &(0x7f0000000600)={r8}) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000640)) r12 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)={0x4, 0x7, 0x7f, 0x9787, 0x1c, 0xffffffffffffffff, 0x5}, 0x2c) recvmsg$kcm(r11, &(0x7f0000009440)={&(0x7f0000009300)=@can={0x0, 0x0}, 0x80, &(0x7f00000093c0)=[{&(0x7f0000009380)=""/16, 0x10}], 0x1, &(0x7f0000009400)=""/18, 0x12, 0x3bc1}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000009480)={0xf, 0x13, &(0x7f00000006c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [@ldst={0x3, 0x2, 0x1, 0x2, 0x7, 0xffffffff, 0x4}, @map={0x18, 0x0, 0x1, 0x0, r12}, @alu={0x7, 0x5, 0xf, 0x6, 0xe, 0x2, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4}, @jmp={0x5, 0x7a4c, 0x0, 0x3, 0x9, 0xffffffff, 0xfffffffffffffff0}, @alu={0x4, 0x20, 0x9, 0x9, 0x5, 0xfffffffe, 0x4}, @jmp={0x5, 0x81, 0x9, 0x7, 0x6, 0xfffffffe, 0xfffffffffffffff0}, @jmp={0x5, 0x3, 0x3, 0x0, 0x2, 0x2, 0xffffffffffffffff}], {0x95}}, &(0x7f0000000780)='GPL\x00', 0x4, 0x77, &(0x7f00000007c0)=""/119, 0x0, 0x1, [], r13}, 0x48) mount(&(0x7f0000009500)='./file0\x00', &(0x7f0000009540)='./file0\x00', &(0x7f0000009580)='cramfs\x00', 0x5020, &(0x7f00000095c0)="22f464f8fef2b95976576e903efe99229584aaf55fa0d91223905d4a68c0c7d18bf26de6fec0660b0c36945200da04f802d9059dd5f6d2f0eca450f4fdd46ed2b411588d802f0d1d02be65816332b2754d686e927593deb8ee3ed17a24d749db81290c33836bcc9b7d93084c53d0744e81deb8b83d9b23565d6db4cb746eb15b20f7b806f0b5a02676d90260a61b00e9ec0b4b8bf07d5f93b3feda8299586c3936f743c764205de278c25a6fff98") perf_event_open(&(0x7f00000096c0)={0x1, 0x70, 0x3, 0xa8e, 0x1000, 0xe57a, 0x0, 0x6, 0x2100b, 0x2, 0x9, 0xdb1b, 0xfffffffffffffffa, 0xa7f8, 0x3, 0x2, 0x800, 0x800, 0x2, 0x0, 0x3f, 0x3, 0x8000000000000, 0x3, 0x20, 0x6, 0x3, 0xfffffffffffff318, 0xffffffffffff0001, 0xfffffffffffffffe, 0x12, 0x1, 0x101, 0x8, 0x100, 0x1, 0x3, 0x8, 0x0, 0x3ff, 0x7, @perf_bp={&(0x7f0000009680), 0x3}, 0x9, 0x6, 0xfffffffffffffff7, 0x0, 0x0, 0x49, 0xfffffffffffff3b8}, r10, 0xe, r5, 0x8) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000009880)={r12, &(0x7f0000009740)="8ba447000764036f17624e623896639a3e2456b901aedcdb4221cea83c3b2c94575967a34ec104bbebeaf6a6b50494e6763f41056d2ca84f906fa48d72590e81334926fab48e", &(0x7f00000097c0)=""/170}, 0x18) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r4, 0x2405, r6) bpf$PROG_LOAD(0x5, &(0x7f00000099c0)={0x7, 0x4, &(0x7f00000098c0)=@raw=[@ldst={0x3, 0x3, 0x6, 0xd, 0x7, 0x26}, @ldst={0x0, 0x2, 0x0, 0xa, 0x0, 0x4, 0xffffffffffffffff}], &(0x7f0000009900)='GPL\x00', 0x5, 0x5d, &(0x7f0000009940)=""/93, 0x41f00, 0x1, [], r13}, 0x48) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000009b40)={r8, &(0x7f0000009a40)="402c0b8b20e0ae84bb", &(0x7f0000009a80)=""/178}, 0x18) 2018/03/31 05:13:40 executing program 4: mount(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='ncpfs\x00', 0x80802, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x50, &(0x7f0000000700)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780)=r0, 0x4) mount(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='./file0\x00', &(0x7f00000006c0)='btrfs\x00', 0x89402, &(0x7f0000000900)="e196efa3cb748d2a6600968b76295ff919bc3877b18eb8d265a35493fcf34fdc965cd5c837d2389c6e2ec6088abe8daaa8ca23f9298fc94dc26874bc4d4567afea1ca0879cdf21e915005a83e96b1002af29091d2176abbb7fec088a67f2e1390f32adaf2f252d24510870f8df7186936f4d88957eb8fcda78b7383a7d24db701d524557ee7324433e70d9ffa185098325f9e657d3c29cf6a35843cb96780269db1c735d55938af5c60e1e4ba25928697277b0fdf356b62399b4c8826d09bfca7d6078c19b4995195ea814b1bb40c06210ec") ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0xffffffff) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6f3, 0x0, 0x0, 0x0, 0x0, 0xfffdffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x22, &(0x7f00000007c0)=ANY=[@ANYBLOB="18000000000000000000000000000000000000000020f37b176532826618e8210d55b6b9f796a5cf4309ac945b17b6ec55aad627fce3173f275427d49a02c531c5316326ec3569ef7771eee96dc62f79bb386acf26001097f7673e6b395ee0cac49bf5bbe2db74ffbe760e50b31e653a89e733b2832d3e4e73d9720448a1d74be25a5dbcc32519fc1400391454104d5b5d9b14c5560730768138a9a0e109f34a16cc067edc5d7a0b0912aa587035de0ad6624124ad9467ed6aac80ad02b778f8319fef183facaa39c4519babbd000000000000009d9d8436042fc1b8d6e779a1531ba51c8c8811c745b829a97e3e2d0f13ea630503c6a765fae62d43095c1669d81251d3a6718f867abdfb0b907d24394fd24b2ea273"], &(0x7f0000f6bffb)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000400)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000540)={r1, 0x50}, 0xfffffe74) close(r1) perf_event_open(&(0x7f0000348f88)={0x2, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x28, 0x2, 0x0, &(0x7f0000000000)={0x0}) mkdir(&(0x7f0000000100)='./file0\x00', 0x1000000000) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='selinuxfs\x00', 0x1000, &(0x7f0000000100)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='minix\x00', 0x10020, &(0x7f0000000240)) [ 192.940658] ? check_same_owner+0x320/0x320 [ 192.944983] ? rcu_note_context_switch+0x710/0x710 [ 192.949914] should_failslab+0xec/0x120 [ 192.953888] kmem_cache_alloc_trace+0x4b/0x740 [ 192.958466] ? __kmalloc_node+0x33/0x70 [ 192.962443] ? __kmalloc_node+0x33/0x70 [ 192.966416] ? rcu_read_lock_sched_held+0x108/0x120 [ 192.971441] __memcg_init_list_lru_node+0x169/0x270 [ 192.976462] ? list_lru_add+0x7c0/0x7c0 [ 192.980438] ? __kmalloc_node+0x47/0x70 [ 192.984418] __list_lru_init+0x544/0x750 2018/03/31 05:13:40 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000040)) perf_event_open(&(0x7f000025c000)={0x2, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r1, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)=ANY=[@ANYBLOB="18000000003e070000000000000000001300000014000000"], 0x18}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000012680)={&(0x7f0000011440)=@hci, 0x80, &(0x7f0000012580), 0x0, &(0x7f00000125c0)=""/167, 0xa7}, 0x0) socket$kcm(0x29, 0x0, 0x0) [ 192.988489] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 192.994380] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 192.999406] ? lockdep_init_map+0x9/0x10 [ 193.003472] sget_userns+0x6b1/0xe40 [ 193.007188] ? set_anon_super+0x20/0x20 [ 193.011171] ? put_filp+0x90/0x90 [ 193.014625] ? destroy_unused_super.part.6+0xd0/0xd0 [ 193.019711] ? alloc_vfsmnt+0x762/0x9c0 [ 193.023666] ? path_lookupat+0x238/0xba0 [ 193.027707] ? mnt_free_id.isra.21+0x50/0x50 [ 193.032103] ? trace_hardirqs_off+0x10/0x10 [ 193.036407] ? putname+0xee/0x130 [ 193.039847] ? cap_capable+0x1b5/0x230 [ 193.043721] ? security_capable+0x8e/0xc0 [ 193.047853] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 193.053028] ? ns_capable_common+0xcf/0x160 [ 193.057334] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 193.062501] mount_ns+0x6d/0x190 [ 193.065851] rpc_mount+0x9e/0xd0 [ 193.069204] mount_fs+0x66/0x2d0 [ 193.072559] vfs_kern_mount.part.26+0xc6/0x4a0 [ 193.077125] ? may_umount+0xa0/0xa0 [ 193.080732] ? _raw_read_unlock+0x22/0x30 [ 193.084862] ? __get_fs_type+0x8a/0xc0 [ 193.088735] do_mount+0xea4/0x2bb0 [ 193.092258] ? __might_fault+0x110/0x1d0 [ 193.096305] ? copy_mount_string+0x40/0x40 [ 193.100523] ? __check_object_size+0x8b/0x530 [ 193.105006] ? __might_sleep+0x95/0x190 [ 193.108973] ? kasan_check_write+0x14/0x20 [ 193.113190] ? _copy_from_user+0x99/0x110 [ 193.117322] ? memdup_user+0x5e/0x90 [ 193.121018] ? copy_mount_options+0x1f7/0x2e0 [ 193.125500] SyS_mount+0xab/0x120 [ 193.128933] ? copy_mnt_ns+0xb30/0xb30 [ 193.132801] do_syscall_64+0x281/0x940 [ 193.136668] ? vmalloc_sync_all+0x30/0x30 [ 193.140794] ? _raw_spin_unlock_irq+0x27/0x70 [ 193.145273] ? finish_task_switch+0x1c1/0x7e0 [ 193.149750] ? syscall_return_slowpath+0x550/0x550 [ 193.154660] ? syscall_return_slowpath+0x2ac/0x550 [ 193.159573] ? prepare_exit_to_usermode+0x350/0x350 [ 193.164573] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 193.169923] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 193.174752] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 193.179919] RIP: 0033:0x454e79 [ 193.183088] RSP: 002b:00007fc28ac9cc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 2018/03/31 05:13:40 executing program 1: socketpair(0x8, 0x2, 0x0, &(0x7f0000001d40)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001bc0)={0x3, 0x70, 0x6, 0x22, 0x2, 0xf5, 0x0, 0x1, 0x20008, 0x4, 0x9, 0x9, 0x1, 0x6, 0x401, 0x7, 0x51, 0x0, 0x5, 0x1, 0x0, 0x6, 0x10001, 0x1000, 0x100, 0x7fff, 0x0, 0x3ff, 0x0, 0xd643, 0xffffffff, 0xfff, 0xf2f3, 0x9, 0x8d, 0x7, 0x1ff, 0x5, 0x0, 0x7fff, 0x6, @perf_config_ext={0xffffffff00000001, 0x1}, 0x1000, 0x2, 0x5, 0x6, 0x4, 0x80000000, 0xffffffffffffffc4}, 0x0, 0xc, 0xffffffffffffffff, 0x1) r2 = gettid() r3 = perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x3, 0xc85, 0x3ff, 0x1, 0x0, 0x401, 0x0, 0x1, 0x712000000000000, 0x7, 0x56d29a0f, 0x1, 0x0, 0x2, 0x20, 0x7, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x9, 0x5, 0x1, 0x3e69b47c, 0x5, 0x7fff, 0x1, 0x5, 0x4f, 0x1000, 0x0, 0x4, 0x0, 0x0, 0x4, 0xffffffff, 0x0, 0x2, 0x2, @perf_config_ext={0x0, 0x8}, 0x20200, 0xf88, 0x0, 0x1, 0x92d5, 0x1, 0x5}, r2, 0xd, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000280)=r1, 0x27) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000080)='./file0\x00', r1}, 0xb) perf_event_open(&(0x7f0000001c80)={0x2, 0x70, 0x3ab, 0x3, 0xbf7e, 0xffffffff, 0x0, 0x0, 0x4000, 0x4, 0x2, 0xec, 0x3ff, 0x8, 0xba, 0x973, 0x6, 0x433, 0x6, 0x0, 0x3, 0x5, 0x1, 0x4, 0x7, 0x5, 0x20, 0xa593, 0x4, 0x1000, 0x4722, 0x3, 0x40, 0xdd, 0x20, 0x1, 0x1, 0x6, 0x0, 0x2, 0x0, @perf_config_ext={0x9}, 0x10000, 0xfffffffffffffffb, 0x401, 0x7, 0x3, 0x9, 0x3}, r2, 0xf, r1, 0x8) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00', 0x0, 0x10}, 0x10) perf_event_open(&(0x7f0000000480)={0x1c218abbd1b2c600, 0x70, 0x5, 0x0, 0xe9d, 0x9, 0x0, 0x80000001, 0x1408, 0x0, 0x10001, 0x1ff, 0xfff, 0x80000000, 0x5, 0x3, 0x81, 0x6, 0x9151, 0x40, 0x2, 0xfda, 0x7, 0x3, 0x1, 0x100000000, 0x4, 0x2, 0xffffffffffffe17f, 0x0, 0x1, 0x3, 0x1, 0x6, 0x7, 0x2, 0x3, 0x7fff, 0x0, 0xfffffffffffffffb, 0x1, @perf_bp={&(0x7f0000000440), 0xf}, 0x1000, 0x1000, 0xb36, 0x7, 0x5f9, 0x8a, 0x40}, r2, 0xd, r3, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) recvmsg$kcm(r1, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f0000000980)=""/4096, 0x1000}, {&(0x7f0000001980)=""/59, 0x3b}, {&(0x7f00000019c0)=""/66, 0x42}], 0x3, &(0x7f0000001a80)=""/195, 0xc3, 0x2}, 0x2102) mount(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='udf\x00', 0x1000020, 0x0) mkdir(&(0x7f0000001fc0)='./file0/file0\x00', 0x1) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fusectl\x00', 0x4000, 0x0) mount(&(0x7f0000001d00)='./file1\x00', &(0x7f0000001d80)='./file0\x00', &(0x7f0000001dc0)='affs\x00', 0x800040, &(0x7f0000001e00)="39ef282caa985216c941be0013a569575f8b267468fe262194491b76dc736e1b4eb9e85bd685609c27f529ef08aff500d3910886a523046831d8c1731e93f35a150a5e2d31d2f90a1662699756b8408eb725f6b128416920a8111c2e5eb71e90008543ca6fd6e14006c64b644e6e73865ab19393ac4a2ca4ae2f83c961a534eda4a1b65dda0645296a5c171c92118a7319a700d9d422b0b720501f621e310a4ca0e1197ee66f7553b67ef1ddd0368e128eba449e35cef95b4a03b6a5c42a7e0292bf43e16df2e950d5") socketpair$inet(0x2, 0x3, 0x5, &(0x7f0000000680)) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000400)) r4 = getpid() r5 = perf_event_open(&(0x7f0000000280)={0x7, 0x70, 0x5, 0x0, 0x40, 0x8e, 0x0, 0x101, 0x100, 0xe, 0xff, 0x2, 0x10001, 0x3cf, 0x7, 0x1, 0x6, 0x800, 0x0, 0xffb, 0x400000000000000, 0x7, 0x80000000, 0x20, 0x5, 0x97, 0x1, 0x8, 0x10000, 0x0, 0x8, 0x0, 0x9, 0x5, 0x6, 0x8, 0x100000001, 0x2, 0x0, 0x9, 0x7, @perf_config_ext={0x40, 0x3}, 0x30121, 0x5, 0x71, 0x3, 0x6, 0x8, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x1) perf_event_open(&(0x7f0000000200)={0x5, 0x70, 0x8001, 0x3, 0xdf6f, 0x8, 0x0, 0x7f, 0xc8000, 0x1, 0x7b1866b0, 0x0, 0x4, 0x2, 0x0, 0x40, 0x10000, 0xfffffffffffffffd, 0xff, 0x41, 0x3, 0xed68, 0x8, 0x7, 0x3, 0x4, 0x4, 0x3ff, 0xfffffffffffffffa, 0xfcfd, 0x1, 0x7, 0x7f, 0x101, 0x3, 0x1, 0x400, 0x0, 0x0, 0x2, 0x6, @perf_bp={&(0x7f00000001c0), 0x5}, 0x189, 0x1000, 0x9, 0x2, 0x7, 0x3}, r4, 0xd, r5, 0x0) perf_event_open(&(0x7f0000014f88)={0x1, 0x78, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000014f88)={0x1, 0x78, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x1, 0x3, &(0x7f0000002000)=ANY=[@ANYBLOB="180000000008000000000000000000400000000000000000"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0xf, 0x30, &(0x7f00000006c0)=ANY=[@ANYBLOB="18000000ffff00000000000006000000c94e000018000000001e0000000000009500000000000000000000000000000018100000e239a4d2a2a2c43551136544ccc4e7b1a7bb414378cfcab33c633c9dc2f6eb6504fb6f77f7fab6f295daddb1d547fe00ce9a0cf4a45d2b0662bad9b6", @ANYBLOB="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"], &(0x7f0000000380)='syzkaller\x00', 0x2, 0x99, &(0x7f00000003c0)=""/153, 0x0, 0x1}, 0x48) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100), 0xfffffc61) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x13, 0x5, 0x0, 0xcc10, 0x4, 0xffffffffffffffff, 0x6}, 0x2c) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) [ 193.190778] RAX: ffffffffffffffda RBX: 00007fc28ac9d6d4 RCX: 0000000000454e79 [ 193.198034] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 193.205285] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 193.212533] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000016 [ 193.219785] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000036 2018/03/31 05:13:40 executing program 2: socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000040)={0x7, 0x70, 0x1, 0xaabc, 0x2, 0x2, 0x0, 0xec, 0x4800, 0x1, 0x3a6b72c9, 0xffffffffffff8000, 0xfff, 0x7, 0x2, 0x7, 0xff, 0x1, 0x2, 0x9, 0x1, 0x0, 0x5, 0x75, 0x2, 0x7, 0x8, 0x4, 0x0, 0xdbce, 0xffff, 0xfaf, 0x1, 0xe7, 0xd0eb, 0x28a5, 0x9, 0x4, 0x0, 0x7, 0x2, @perf_config_ext={0x1, 0x8000}, 0x489, 0x6, 0xff, 0x0, 0x9d, 0x8, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f00000000c0)={0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000140)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r2 = getpid() r3 = perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x8, 0x4, 0x4, 0x1, 0x0, 0x401, 0x100, 0x7, 0xcfc0, 0x7, 0x0, 0x7, 0x30, 0x7, 0x7, 0xfff, 0x7, 0x9, 0xff, 0x9, 0xf, 0x0, 0x3, 0x100000000, 0x3, 0x8, 0xffff, 0x2, 0x3, 0xff, 0x6f, 0x3, 0x5, 0x800, 0x81, 0x0, 0x0, 0x9, 0x1, @perf_bp={&(0x7f0000000180), 0x1}, 0x11815, 0x9, 0x1, 0x1, 0x101, 0x5}, r2, 0x9, r1, 0x1) r4 = perf_event_open(&(0x7f0000000280)={0x5, 0x70, 0xe00000000000, 0x9, 0x800, 0x6, 0x0, 0x7ff, 0x10200, 0xb, 0xe3, 0x5, 0x1, 0x4, 0x9b0f, 0x1f8a, 0x401, 0x1, 0xe975, 0x7, 0x437, 0x9, 0x7f, 0x20, 0x1, 0x2, 0x3, 0x5, 0x200, 0x1, 0x8, 0x401, 0x401, 0x2, 0x8, 0xfff, 0xf3c8, 0xf23, 0x0, 0x7fffffff, 0x0, @perf_bp={&(0x7f0000000240), 0x9}, 0x828, 0x3, 0x5, 0x1, 0x0, 0xc37, 0x6}, r2, 0x4, r1, 0x2) r5 = perf_event_open(&(0x7f0000000300)={0x4, 0x70, 0xff, 0x3, 0x7f, 0x7, 0x0, 0x40, 0x4a240, 0x2, 0xffffffffffffcc27, 0xb8, 0x2, 0x7, 0x9, 0x800, 0x3, 0x7d4d, 0xf7, 0xfffffffffffffffa, 0x9, 0x4, 0x3, 0x90be, 0x9, 0xfffffffffffffffc, 0x6, 0x3ff, 0xab6b, 0x8001, 0x5, 0x2, 0x9, 0x732, 0x400, 0x55000000000, 0x1ff, 0x6, 0x0, 0x0, 0x2, @perf_config_ext={0x6, 0xffffffff}, 0x40, 0x80000001, 0x7fff, 0x2, 0x1, 0x6, 0x5}, r2, 0xf, r4, 0xa) r6 = perf_event_open(&(0x7f00000003c0)={0x7, 0x70, 0xc87d, 0x6, 0x5, 0x80000001, 0x0, 0x3, 0x1, 0xb, 0xffffffff, 0x9, 0x584, 0x31b, 0x7, 0x2, 0x3, 0x544, 0x100000001, 0x9, 0x1, 0x100, 0x3, 0x1, 0x7, 0x0, 0x7, 0x5, 0xbb, 0x40, 0x7, 0x8, 0x81, 0xc5a, 0x0, 0x7, 0x1f, 0x815, 0x0, 0xffff, 0x2, @perf_bp={&(0x7f0000000380), 0x8}, 0x4, 0x5, 0xc95, 0x0, 0x7ff, 0x7b02, 0x7}, r2, 0x10, r1, 0xb) ioctl$PERF_EVENT_IOC_DISABLE(r3, 0x2401, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0x4) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = perf_event_open(&(0x7f0000000480)={0x7, 0x70, 0x7, 0xdbff, 0x3, 0x3f, 0x0, 0x8, 0x0, 0xc, 0x8, 0x0, 0xf43, 0x101, 0x6, 0x5, 0x6, 0x9, 0x200, 0xfffffffffffffffd, 0x4, 0x6, 0x6e, 0x20, 0x1b3, 0x1fe, 0x7ff, 0x3, 0x8000, 0x5, 0x0, 0x0, 0x0, 0x5, 0x22d2, 0x401, 0x68, 0xa1ce, 0x0, 0x4, 0x0, @perf_config_ext={0x2fb, 0x4}, 0x2000, 0xd33, 0x6, 0x697c4c7d75b7b6da, 0x171f, 0x9, 0x9}, r2, 0x6, r5, 0x1) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x9, 0x6, 0x101, 0x8, 0x0, 0x200, 0x2000, 0xf, 0x0, 0x5, 0x6, 0x3, 0x2, 0x0, 0x8001, 0x8, 0x3, 0x5, 0x17, 0x7, 0x4, 0x400, 0xffffffff, 0x7, 0x8000, 0x2, 0x100, 0x0, 0x7, 0x95de, 0x2, 0x1, 0x2, 0xd432, 0x3ff, 0x8599, 0x0, 0x3ff, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x10080, 0x7, 0xe7e, 0x7, 0x5, 0x7, 0x9}, r2, 0x0, r3, 0x8) close(r7) ioctl$PERF_EVENT_IOC_DISABLE(r9, 0x2401, 0x1) r10 = gettid() ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f00000005c0)={r0}) ioctl$sock_kcm_SIOCKCMUNATTACH(r11, 0x89e1, &(0x7f0000000600)={r8}) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000640)) r12 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)={0x4, 0x7, 0x7f, 0x9787, 0x1c, 0xffffffffffffffff, 0x5}, 0x2c) recvmsg$kcm(r11, &(0x7f0000009440)={&(0x7f0000009300)=@can={0x0, 0x0}, 0x80, &(0x7f00000093c0)=[{&(0x7f0000009380)=""/16, 0x10}], 0x1, &(0x7f0000009400)=""/18, 0x12, 0x3bc1}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000009480)={0xf, 0x13, &(0x7f00000006c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [@ldst={0x3, 0x2, 0x1, 0x2, 0x7, 0xffffffff, 0x4}, @map={0x18, 0x0, 0x1, 0x0, r12}, @alu={0x7, 0x5, 0xf, 0x6, 0xe, 0x2, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4}, @jmp={0x5, 0x7a4c, 0x0, 0x3, 0x9, 0xffffffff, 0xfffffffffffffff0}, @alu={0x4, 0x20, 0x9, 0x9, 0x5, 0xfffffffe, 0x4}, @jmp={0x5, 0x81, 0x9, 0x7, 0x6, 0xfffffffe, 0xfffffffffffffff0}, @jmp={0x5, 0x3, 0x3, 0x0, 0x2, 0x2, 0xffffffffffffffff}], {0x95}}, &(0x7f0000000780)='GPL\x00', 0x4, 0x77, &(0x7f00000007c0)=""/119, 0x0, 0x1, [], r13}, 0x48) mount(&(0x7f0000009500)='./file0\x00', &(0x7f0000009540)='./file0\x00', &(0x7f0000009580)='cramfs\x00', 0x5020, &(0x7f00000095c0)="22f464f8fef2b95976576e903efe99229584aaf55fa0d91223905d4a68c0c7d18bf26de6fec0660b0c36945200da04f802d9059dd5f6d2f0eca450f4fdd46ed2b411588d802f0d1d02be65816332b2754d686e927593deb8ee3ed17a24d749db81290c33836bcc9b7d93084c53d0744e81deb8b83d9b23565d6db4cb746eb15b20f7b806f0b5a02676d90260a61b00e9ec0b4b8bf07d5f93b3feda8299586c3936f743c764205de278c25a6fff98") perf_event_open(&(0x7f00000096c0)={0x1, 0x70, 0x3, 0xa8e, 0x1000, 0xe57a, 0x0, 0x6, 0x2100b, 0x2, 0x9, 0xdb1b, 0xfffffffffffffffa, 0xa7f8, 0x3, 0x2, 0x800, 0x800, 0x2, 0x0, 0x3f, 0x3, 0x8000000000000, 0x3, 0x20, 0x6, 0x3, 0xfffffffffffff318, 0xffffffffffff0001, 0xfffffffffffffffe, 0x12, 0x1, 0x101, 0x8, 0x100, 0x1, 0x3, 0x8, 0x0, 0x3ff, 0x7, @perf_bp={&(0x7f0000009680), 0x3}, 0x9, 0x6, 0xfffffffffffffff7, 0x0, 0x0, 0x49, 0xfffffffffffff3b8}, r10, 0xe, r5, 0x8) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000009880)={r12, &(0x7f0000009740)="8ba447000764036f17624e623896639a3e2456b901aedcdb4221cea83c3b2c94575967a34ec104bbebeaf6a6b50494e6763f41056d2ca84f906fa48d72590e81334926fab48e", &(0x7f00000097c0)=""/170}, 0x18) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r4, 0x2405, r6) bpf$PROG_LOAD(0x5, &(0x7f00000099c0)={0x7, 0x4, &(0x7f00000098c0)=@raw=[@ldst={0x3, 0x3, 0x6, 0xd, 0x7, 0x26}, @ldst={0x0, 0x2, 0x0, 0xa, 0x0, 0x4, 0xffffffffffffffff}], &(0x7f0000009900)='GPL\x00', 0x5, 0x5d, &(0x7f0000009940)=""/93, 0x41f00, 0x1, [], r13}, 0x48) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000009b40)={r8, &(0x7f0000009a40)="402c0b8b20e0ae84bb", &(0x7f0000009a80)=""/178}, 0x18) 2018/03/31 05:13:40 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', 0x0, 0x8}, 0x10) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000002480)={&(0x7f0000002200)=@can={0x0, 0x0}, 0x80, &(0x7f0000002400)=[{&(0x7f0000002280)=""/77, 0x4d}, {&(0x7f0000002300)=""/127, 0x7f}, {&(0x7f0000002380)=""/80, 0x50}], 0x3, &(0x7f0000002440)=""/8, 0x8, 0x3503}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000024c0)={0x0, 0xa, &(0x7f00000000c0)=@raw=[@call={0x85, 0x0, 0x0, 0x29}, @initr0={0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xbdce}, @generic={0x8001, 0x12000000000000, 0x8, 0x100000000}, @map={0x18, 0x2, 0x1, 0x0, r0}, @exit={0x95}], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x8d, &(0x7f0000000180)=""/141, 0x41000, 0x1, [], r1}, 0x48) recvmsg(0xffffffffffffffff, &(0x7f0000346fc8)={&(0x7f0000baefec)=@ll, 0x14, &(0x7f0000ca3000)=[{&(0x7f0000f6a000)=""/15, 0xf}, {&(0x7f0000f6afa9)=""/87, 0x57}, {&(0x7f00008e3f35)=""/203, 0xcb}, {&(0x7f0000cd5ffe)=""/2, 0x4f}], 0x4, &(0x7f0000a01f13)=""/237, 0xed}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x201a7f1d, 0x0, 0x0, 0x0, 0x0, 0xffffffff}], {0x95}}, &(0x7f00008c0000)='syzkaller\x00', 0x3ff, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) [ 193.325269] EXT4-fs (sda1): re-mounted. Opts: 2018/03/31 05:13:40 executing program 5: socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000006980)=ANY=[], 0x0, &(0x7f0000006d00)=[{&(0x7f0000006c40)=""/181, 0xb5}], 0x2c8, &(0x7f0000006d40)=""/65, 0x41}, 0x2000) sendmsg(0xffffffffffffffff, &(0x7f0000001900)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)='v', 0x1}], 0x1, &(0x7f0000000440)=ANY=[]}, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000780)={0xffffffffffffffff, &(0x7f0000000480)="9b7815cd421eecc37df9250ab7496936ab4c75599ff96ba02ed5166be56df09fec2eef35318bf9b1311a", &(0x7f00000006c0)=""/139}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x4, &(0x7f00000003c0)=@raw=[@jmp={0x5, 0x401, 0x4, 0x2, 0x8}, @exit={0x95}], &(0x7f0000000440)="e7ec95457b80a7ce93cd589466f84973fb76577e697126e971ad565c00", 0x40, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x1}, 0x48) socketpair$inet(0x2, 0x6, 0x1, &(0x7f0000000d00)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000ac0)='./file1\x00', 0x40) r3 = socket$kcm(0x29, 0x7, 0x0) sendmsg$kcm(r3, &(0x7f00000020c0)={&(0x7f0000001c80)=@rc={0x1f, {0x6, 0x3f, 0x22, 0x5f, 0x1, 0x6}, 0x6}, 0x0, &(0x7f0000001d40)=[{&(0x7f0000005080)="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", 0x1000}], 0x1, &(0x7f0000001d80)=ANY=[]}, 0x10) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) recvmsg(r3, &(0x7f0000000080)={&(0x7f0000000900)=@alg, 0x80, &(0x7f0000001b40)=[{&(0x7f0000000b80)=""/210, 0xd2}, {&(0x7f0000000d40)=""/238, 0xee}, {&(0x7f0000001300)=""/163, 0xa3}, {&(0x7f00000013c0)=""/124, 0x7c}, {&(0x7f00000019c0)=""/231, 0xe7}, {&(0x7f0000001440)=""/95, 0x5f}, {&(0x7f0000001ac0)=""/93, 0x5d}], 0x7, 0x0, 0x0, 0x128d}, 0x142) mount(&(0x7f0000000140)='./file0\x00', &(0x7f00000007c0)='./file2\x00', &(0x7f0000001d00)='ecryptfs\x00', 0x200000, &(0x7f0000001d80)="4a4ff0ada5bdeb7f6bae5c9d27ff48d6dadd06daaf3a7536011d6bbc5c792ed3740e9398ee9268326823856bf0800a070e668f72ea889c835a8406bccb61e4463049e661fd5d9c7e125be0601e09277f5a4562dbb031bc685ad62a2eedee16c52f828957c418646caed75b8f9d373e04069414bf0cf5918780ea53ad2b8f") mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000240)='afs\x00', 0x2005800, &(0x7f0000000100)) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000640)='./file1\x00', 0x1) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000811ffa)='bdev\x00', 0x103fe, &(0x7f0000444000)) mount(&(0x7f0000000300)='./file0/file0\x00', &(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000280)='hfs\x00', 0x1001, 0x0) sendmsg(r2, &(0x7f0000001c40)={&(0x7f0000001bc0)=@in={0x2, 0x4e24, @local={0xac, 0x14, 0x14, 0xaa}}, 0x80, &(0x7f00000014c0), 0x0, &(0x7f0000002100)=ANY=[@ANYBLOB="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"], 0x2ad, 0x1}, 0x40080) recvmsg(r0, &(0x7f0000003c40)={&(0x7f0000001500)=@ll={0x0, 0x0, 0x0}, 0x80, &(0x7f0000003bc0)=[{&(0x7f0000001580)=""/187, 0xbb}, {&(0x7f0000001640)=""/202, 0xca}, {&(0x7f0000001740)=""/97, 0x61}, {&(0x7f00000017c0)=""/142, 0x8e}, {&(0x7f00000029c0)=""/172, 0xac}, {&(0x7f0000002a80)=""/4096, 0x1000}, {&(0x7f0000003a80)=""/144, 0x90}, {&(0x7f0000003b40)=""/111, 0x6f}], 0x8, 0x0, 0x0, 0x800}, 0x40000000) mount(&(0x7f00000014c0)='./file0/file0\x00', &(0x7f00000023c0)='./file2\x00', &(0x7f0000002400)='afs\x00', 0x40010, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000003c80)={0xe, 0xc, &(0x7f0000000b00)=ANY=[@ANYBLOB="1800000007000000000000000623000001090000030000000000000000000000fb83000008000000000000000000000000ff4d7a0a730660000000000000000095000200000000007f99d107ed135aff152272fa7a18cb4c558c63b3265c189f"], &(0x7f0000000980)='GPL\x00', 0x5, 0x84, &(0x7f00000009c0)=""/132, 0x41f00, 0x1, [], r4}, 0x48) r5 = socket$kcm(0x29, 0x5, 0x0) recvmsg$kcm(r5, &(0x7f0000005040)={&(0x7f0000004e40)=@alg, 0x80, &(0x7f0000004fc0)=[{&(0x7f0000004ec0)=""/195, 0xc3}], 0x1, &(0x7f0000005000)=""/30, 0x1e}, 0x40) mkdir(&(0x7f0000000a80)='./file0\x00', 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000100)=@raw=[@generic], &(0x7f0000000180)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103, 0xffffffffffffffff}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0x12, &(0x7f00000004c0)=@raw=[@exit={0x95}, @jmp={0x5, 0x7f, 0x9, 0x7, 0x0, 0x30, 0x570c72d2c4205df9}, @generic={0x401, 0xffffffffffffffc1, 0x8, 0x1}, @call={0x85, 0x0, 0x0, 0x38}, @ldst={0x1, 0x2, 0x34194f12a387f72c, 0x2, 0x3, 0xfffffffc, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x18}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffffffffffff9}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x10001}, @call={0x85, 0x0, 0x0, 0x33}], &(0x7f0000000380)='syzkaller\x00', 0x7fff, 0xd, &(0x7f0000000580)=""/13, 0x40f00, 0x1}, 0x48) recvmsg(r1, &(0x7f0000001240)={&(0x7f0000000e40)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000001180)=[{&(0x7f0000000c80)=""/21, 0x15}, {&(0x7f0000000ec0)=""/105, 0x69}, {&(0x7f0000000f40)=""/154, 0x9a}, {&(0x7f0000001000)=""/5, 0x5}, {&(0x7f0000001040)=""/15, 0xf}, {&(0x7f0000001080)=""/204, 0xcc}], 0x6, &(0x7f0000001200)=""/43, 0x2b, 0x6}, 0x4000000003) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000cc0)={0x0, 0x414, 0x10}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000001280)={0xf, 0xb, &(0x7f0000000800)=ANY=[@ANYBLOB="18000000120000000000000000ffffffc37ff8fff0ffffff000000000000000095000000000000000000000000000000751ffeff100000000000000000000000180000000200006900000000030000009500001000000000"], &(0x7f0000000680)='syzkaller\x00', 0x0, 0x41, &(0x7f0000000880)=""/65, 0x41100, 0x1, [], r6}, 0x48) mkdir(&(0x7f0000000000)='./file0/file0\x00', 0x80) 2018/03/31 05:13:40 executing program 3: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140), 0x1e6, &(0x7f0000231f05)=""/251, 0x3ba}, 0x0) close(r0) recvmsg(r1, &(0x7f0000001680)={&(0x7f00000017c0), 0x80, &(0x7f0000003a40)=[{&(0x7f00000028c0)=""/92, 0x5c}], 0x1, &(0x7f0000003ac0)=""/136, 0x88, 0x7f}, 0x0) recvmsg(r1, &(0x7f0000001f40)={&(0x7f0000001cc0)=@un=@abs, 0x80, &(0x7f0000001e00)=[{&(0x7f0000001d40)=""/189, 0xbd}], 0x1, &(0x7f0000001e40)=""/203, 0xcb, 0x5b4}, 0x1) gettid() recvmsg(r0, &(0x7f0000000140)={&(0x7f0000000040)=@pppoe={0x0, 0x0, {0x0, @local}}, 0x80, &(0x7f0000001580)=[{&(0x7f00000000c0)=""/113, 0x71}, {&(0x7f00000001c0)=""/4096, 0x1000}, {&(0x7f0000001280)=""/242, 0xf2}, {&(0x7f0000001380)=""/95, 0x5f}, {&(0x7f0000001400)=""/182, 0xb6}, {&(0x7f00000014c0)=""/178, 0xb2}], 0x6, &(0x7f0000001600)=""/79, 0x4f, 0x3f}, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000016c0)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000011c0)) recvmsg$kcm(r1, &(0x7f0000001c80)={0x0, 0x0, &(0x7f0000001b00)=[{&(0x7f0000001900)=""/44, 0x2c}, {&(0x7f0000002940)=""/4096, 0x1000}, {&(0x7f0000001940)=""/241, 0xf1}, {&(0x7f0000001a40)=""/100, 0x64}, {&(0x7f0000001ac0)=""/15, 0xf}], 0x5, &(0x7f0000001b80)=""/252, 0xfc, 0x66}, 0x1) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000001200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r1, &(0x7f0000948000)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000d43000), 0xfffffdb1}], 0x208, &(0x7f0000003e40)}, 0x4000000) recvmsg(r2, &(0x7f00000018c0)={&(0x7f0000001700)=@in6, 0x80, &(0x7f0000001240)=[{&(0x7f0000001840)=""/107, 0x6b}], 0x1, &(0x7f0000001780)=""/58, 0x3a, 0xe41}, 0x1) [ 193.488134] EXT4-fs (sda1): re-mounted. Opts: [ 193.515968] EXT4-fs (sda1): re-mounted. Opts: 2018/03/31 05:13:41 executing program 3: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x18}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000380)='./file0\x00', r0}, 0x10) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = gettid() mount(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='aufs\x00', 0x2000, &(0x7f0000000480)="f4044da726fe859e80304700f18d4b8ec669514de57eddac01115e9d65a259389e6163c463e5a630c6c4958b2cb81bd0bb8a56bae26674076eaf7671bba460272462b43217cb793a9c4cdf4cb6597ecaffaf0e802ee1b76d72212a22593e0aa010e80e8af9ad7f85e63065181337caa793702bd1ebde3958519ed0a650efcc7cbeafa09c01c57b82a4c574e574ccac2a2b9061034ef946f2") perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x5, 0x0, 0xd7e, 0x0, 0x1f, 0x409, 0xc, 0xfffffffffffffff9, 0x401, 0x9, 0x54e1, 0x7, 0x2, 0xebf, 0xde2, 0x10001, 0xfff, 0xfff, 0x0, 0x0, 0x0, 0x7, 0x3ff0000, 0xf68, 0x5, 0xfffffffffffffe24, 0x5808, 0x6, 0x8, 0x1f, 0x200, 0x0, 0x3, 0x1, 0x7, 0x0, 0x8001, 0xcda87f75a77855ad, @perf_config_ext={0x4, 0x1}, 0x2, 0x810000000, 0x6, 0x2, 0x101, 0x7f, 0xffffffff}, r2, 0x3, r1, 0x8) mkdir(&(0x7f0000000200)='./file0\x00', 0xa0) ioctl$PERF_EVENT_IOC_DISABLE(r1, 0x2401, 0x5) mount(&(0x7f0000000600)='./file0/file0\x00', &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='devpts\x00', 0x8, &(0x7f00000006c0)="23639b480720086726e545542ea2c70a16bcd254d80eccb92ae6570a54fbe67c9b3317b910930afcf2ec3a3409a1b04137cd8deb0a8ef7d0b423a65ff7e6e80b87cc12d2365d0225aae25841803208f4e3521e2e4ef2cab2d7f72aad7f60e7b2643289594774bdcebfe7ae1f01c538aa50d3a5a3a1c6987eb78b0d3494c1361a39d725567d37f8849d80df4bb0e944e6c925eea8") mkdir(&(0x7f00000005c0)='./file0/file0\x00', 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000000)=0x5, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='btrfs\x00', 0x0, &(0x7f0000000200)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000080)='tmpfs\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000340)) 2018/03/31 05:13:41 executing program 0: r0 = perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8828, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={0xffffffffffffffff, 0x28, &(0x7f0000000180)}, 0x10) close(r2) r3 = socket$kcm(0x29, 0x5, 0x0) sendmsg$kcm(r2, &(0x7f0000948000)={0x0, 0x0, &(0x7f00005dc000)=[{&(0x7f0000d43000), 0xffffff1b}], 0x1, &(0x7f0000d43000)}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) sendmsg$kcm(r2, &(0x7f0000013100)={&(0x7f000000fe00)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local={0x1, 0x80, 0xc2}}, 0x80, &(0x7f000000ff40), 0x0, &(0x7f000000ff80)}, 0x4084) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000000c0)=@nfc, 0x80, &(0x7f0000000280)=[{&(0x7f0000000040)=""/55, 0x37}, {&(0x7f0000000140)=""/58, 0x3a}, {&(0x7f0000000180)}, {&(0x7f00000001c0)=""/37, 0x25}, {&(0x7f0000000200)=""/115, 0x73}], 0x5, &(0x7f0000000300)=""/59, 0x3b, 0x69}, 0x40002021) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000000)='vmnet0system/\\\x00') close(r3) 2018/03/31 05:13:41 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x0, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x0, r0, 0x0, [0x115]}, 0x2c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)="cc627adabaca542544f51865fef200") r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x8, 0xb, 0x1, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r5 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x0, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000c00)='./file0\x00', r1}, 0xffffffffffffff09) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x7, 0x100, 0x200000056c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) recvmsg(0xffffffffffffffff, &(0x7f0000001480)={&(0x7f0000000f80)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, 0x80, &(0x7f00000013c0)=[{&(0x7f0000001000)=""/237, 0xed}, {&(0x7f0000001100)=""/19, 0x13}, {&(0x7f0000001140)=""/55, 0x37}, {&(0x7f0000001180)=""/57, 0x39}, {&(0x7f00000011c0)=""/72, 0x48}, {&(0x7f0000001240)=""/79, 0x4f}, {&(0x7f00000012c0)=""/213, 0xd5}], 0x7, &(0x7f0000001440)=""/30, 0x1e, 0x5}, 0x1) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000f40)) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0x5, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x477551b2, 0x0, 0x0, 0x0, 0x2}, [@exit={0x95}], {0x95}}, &(0x7f00000004c0)='GPL\x00', 0x1, 0xac, &(0x7f0000000c40)=""/172, 0x41100, 0x1, [], r6}, 0x48) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000d00)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x2400, 0x80) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r2, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ec", &(0x7f00000009c0)=""/161}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f0000000680)={0x1b, 0x9, 0x0, 0x0, 0x1f, 0xffffffffffffffff, 0x7fff}, 0x2c) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001500)={r4, 0x28, &(0x7f00000014c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001540)={r7, 0x1ff, 0x8}, 0xc) gettid() close(0xffffffffffffffff) recvmsg$kcm(r3, &(0x7f0000000f00)={&(0x7f0000000d40)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000a80)=[{&(0x7f0000000dc0)=""/190, 0xbe}, {&(0x7f0000000e80)=""/121, 0x79}, {&(0x7f0000000600)=""/18, 0x12}], 0x3, 0x0, 0x0, 0x7}, 0x20) 2018/03/31 05:13:41 executing program 6 (fault-call:17 fault-nth:55): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x0, 0x101, 0x4, 0x0, 0x1, r0, 0x0, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r2 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)={0xffffffffffffffff}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r2, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x0, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0", 0xc9}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000280)={&(0x7f0000000680)='./file0\x00'}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r1}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r3) gettid() close(0xffffffffffffffff) 2018/03/31 05:13:41 executing program 1: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000100)=@l2, 0x3c7, &(0x7f0000000580), 0x0, &(0x7f0000000180)=""/15, 0xf}, 0x100) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000001140)={0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)}, 0x20) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x7) r1 = gettid() perf_event_open(&(0x7f0000000200)={0x5, 0x70, 0x8, 0xfffffffffffffeff, 0x6, 0x8b59, 0x0, 0x8, 0x400, 0x2, 0x1ff, 0x7, 0x100, 0x3, 0x87, 0x800, 0x3, 0x4, 0x3, 0x0, 0xdf, 0x81, 0x8b4, 0x5, 0xff, 0xffc000000000000, 0x1, 0x0, 0xa8, 0x7, 0x2, 0xff, 0x4, 0x800, 0x9, 0x917f968, 0x0, 0x83, 0x0, 0x4, 0x5, @perf_config_ext={0x800}, 0x206, 0xff, 0x7, 0x4, 0xe, 0x4, 0x3ff}, r1, 0xb, r0, 0x2) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000100), 0x1}, 0x20) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file1\x00', 0x0, 0x8}, 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000340)={&(0x7f0000000280)='./file0\x00', r2}, 0x10) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x3441, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000080)=0x8) 2018/03/31 05:13:41 executing program 2: socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000040)={0x7, 0x70, 0x1, 0xaabc, 0x2, 0x2, 0x0, 0xec, 0x4800, 0x1, 0x3a6b72c9, 0xffffffffffff8000, 0xfff, 0x7, 0x2, 0x7, 0xff, 0x1, 0x2, 0x9, 0x1, 0x0, 0x5, 0x75, 0x2, 0x7, 0x8, 0x4, 0x0, 0xdbce, 0xffff, 0xfaf, 0x1, 0xe7, 0xd0eb, 0x28a5, 0x9, 0x4, 0x0, 0x7, 0x2, @perf_config_ext={0x1, 0x8000}, 0x489, 0x6, 0xff, 0x0, 0x9d, 0x8, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f00000000c0)={0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000140)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r2 = getpid() r3 = perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x8, 0x4, 0x4, 0x1, 0x0, 0x401, 0x100, 0x7, 0xcfc0, 0x7, 0x0, 0x7, 0x30, 0x7, 0x7, 0xfff, 0x7, 0x9, 0xff, 0x9, 0xf, 0x0, 0x3, 0x100000000, 0x3, 0x8, 0xffff, 0x2, 0x3, 0xff, 0x6f, 0x3, 0x5, 0x800, 0x81, 0x0, 0x0, 0x9, 0x1, @perf_bp={&(0x7f0000000180), 0x1}, 0x11815, 0x9, 0x1, 0x1, 0x101, 0x5, 0x1e892fee}, 0x0, 0x9, r1, 0x1) r4 = perf_event_open(&(0x7f0000000280)={0x5, 0x70, 0xe00000000000, 0x9, 0x800, 0x6, 0x0, 0x7ff, 0x10200, 0xb, 0xe3, 0x5, 0x1, 0x4, 0x9b0f, 0x1f8a, 0x401, 0x1, 0xe975, 0x7, 0x437, 0x9, 0x7f, 0x20, 0x1, 0x2, 0x3, 0x5, 0x200, 0x1, 0x8, 0x401, 0x401, 0x2, 0x8, 0xfff, 0xf3c8, 0xf23, 0x0, 0x7fffffff, 0x0, @perf_bp={&(0x7f0000000240), 0x9}, 0x828, 0x3, 0x5, 0x1, 0x0, 0xc37, 0x6}, r2, 0x4, r1, 0x2) r5 = perf_event_open(&(0x7f0000000300)={0x4, 0x70, 0xff, 0x3, 0x7f, 0x7, 0x0, 0x40, 0x4a240, 0x2, 0xffffffffffffcc27, 0xb8, 0x2, 0x7, 0x9, 0x800, 0x3, 0x7d4d, 0xf7, 0xfffffffffffffffa, 0x9, 0x4, 0x3, 0x90be, 0x9, 0xfffffffffffffffc, 0x6, 0x3ff, 0xab6b, 0x8001, 0x5, 0x2, 0x9, 0x732, 0x400, 0x55000000000, 0x1ff, 0x6, 0x0, 0x0, 0x2, @perf_config_ext={0x6, 0xffffffff}, 0x40, 0x80000001, 0x7fff, 0x2, 0x1, 0x6, 0x5}, r2, 0xf, r4, 0xa) r6 = perf_event_open(&(0x7f00000003c0)={0x7, 0x70, 0xc87d, 0x6, 0x5, 0x80000001, 0x0, 0x3, 0x1, 0xb, 0xffffffff, 0x9, 0x584, 0x31b, 0x7, 0x2, 0x3, 0x544, 0x100000001, 0x9, 0x1, 0x100, 0x3, 0x1, 0x7, 0x0, 0x7, 0x5, 0xbb, 0x40, 0x7, 0x8, 0x81, 0xc5a, 0x0, 0x7, 0x1f, 0x815, 0x0, 0xffff, 0x2, @perf_bp={&(0x7f0000000380), 0x8}, 0x4, 0x5, 0xc95, 0x0, 0x7ff, 0x7b02, 0x7}, r2, 0x10, r1, 0xb) ioctl$PERF_EVENT_IOC_DISABLE(r3, 0x2401, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0x4) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = perf_event_open(&(0x7f0000000480)={0x7, 0x70, 0x7, 0xdbff, 0x3, 0x3f, 0x0, 0x8, 0x0, 0xc, 0x8, 0x0, 0xf43, 0x101, 0x6, 0x5, 0x6, 0x9, 0x200, 0xfffffffffffffffd, 0x4, 0x6, 0x6e, 0x20, 0x1b3, 0x1fe, 0x7ff, 0x3, 0x8000, 0x5, 0x0, 0x0, 0x0, 0x5, 0x22d2, 0x401, 0x68, 0xa1ce, 0x0, 0x4, 0x0, @perf_config_ext={0x2fb, 0x4}, 0x2000, 0xd33, 0x6, 0x697c4c7d75b7b6da, 0x171f, 0x9, 0x9}, r2, 0x6, r5, 0x1) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x9, 0x6, 0x101, 0x8, 0x0, 0x200, 0x2000, 0xf, 0x0, 0x5, 0x6, 0x3, 0x2, 0x0, 0x8001, 0x8, 0x3, 0x5, 0x17, 0x7, 0x4, 0x400, 0xffffffff, 0x7, 0x8000, 0x2, 0x100, 0x0, 0x7, 0x95de, 0x2, 0x1, 0x2, 0xd432, 0x3ff, 0x8599, 0x0, 0x3ff, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x10080, 0x7, 0xe7e, 0x7, 0x5, 0x7, 0x9}, r2, 0x0, r3, 0x8) close(r7) ioctl$PERF_EVENT_IOC_DISABLE(r9, 0x2401, 0x1) r10 = gettid() ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f00000005c0)={r0}) ioctl$sock_kcm_SIOCKCMUNATTACH(r11, 0x89e1, &(0x7f0000000600)={r8}) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000640)) r12 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)={0x4, 0x7, 0x7f, 0x9787, 0x1c, 0xffffffffffffffff, 0x5}, 0x2c) recvmsg$kcm(r11, &(0x7f0000009440)={&(0x7f0000009300)=@can={0x0, 0x0}, 0x80, &(0x7f00000093c0)=[{&(0x7f0000009380)=""/16, 0x10}], 0x1, &(0x7f0000009400)=""/18, 0x12, 0x3bc1}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000009480)={0xf, 0x13, &(0x7f00000006c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [@ldst={0x3, 0x2, 0x1, 0x2, 0x7, 0xffffffff, 0x4}, @map={0x18, 0x0, 0x1, 0x0, r12}, @alu={0x7, 0x5, 0xf, 0x6, 0xe, 0x2, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4}, @jmp={0x5, 0x7a4c, 0x0, 0x3, 0x9, 0xffffffff, 0xfffffffffffffff0}, @alu={0x4, 0x20, 0x9, 0x9, 0x5, 0xfffffffe, 0x4}, @jmp={0x5, 0x81, 0x9, 0x7, 0x6, 0xfffffffe, 0xfffffffffffffff0}, @jmp={0x5, 0x3, 0x3, 0x0, 0x2, 0x2, 0xffffffffffffffff}], {0x95}}, &(0x7f0000000780)='GPL\x00', 0x4, 0x77, &(0x7f00000007c0)=""/119, 0x0, 0x1, [], r13}, 0x48) mount(&(0x7f0000009500)='./file0\x00', &(0x7f0000009540)='./file0\x00', &(0x7f0000009580)='cramfs\x00', 0x5020, &(0x7f00000095c0)="22f464f8fef2b95976576e903efe99229584aaf55fa0d91223905d4a68c0c7d18bf26de6fec0660b0c36945200da04f802d9059dd5f6d2f0eca450f4fdd46ed2b411588d802f0d1d02be65816332b2754d686e927593deb8ee3ed17a24d749db81290c33836bcc9b7d93084c53d0744e81deb8b83d9b23565d6db4cb746eb15b20f7b806f0b5a02676d90260a61b00e9ec0b4b8bf07d5f93b3feda8299586c3936f743c764205de278c25a6fff98") perf_event_open(&(0x7f00000096c0)={0x1, 0x70, 0x3, 0xa8e, 0x1000, 0xe57a, 0x0, 0x6, 0x2100b, 0x2, 0x9, 0xdb1b, 0xfffffffffffffffa, 0xa7f8, 0x3, 0x2, 0x800, 0x800, 0x2, 0x0, 0x3f, 0x3, 0x8000000000000, 0x3, 0x20, 0x6, 0x3, 0xfffffffffffff318, 0xffffffffffff0001, 0xfffffffffffffffe, 0x12, 0x1, 0x101, 0x8, 0x100, 0x1, 0x3, 0x8, 0x0, 0x3ff, 0x7, @perf_bp={&(0x7f0000009680), 0x3}, 0x9, 0x6, 0xfffffffffffffff7, 0x0, 0x0, 0x49, 0xfffffffffffff3b8}, r10, 0xe, r5, 0x8) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000009880)={r12, &(0x7f0000009740)="8ba447000764036f17624e623896639a3e2456b901aedcdb4221cea83c3b2c94575967a34ec104bbebeaf6a6b50494e6763f41056d2ca84f906fa48d72590e81334926fab48e", &(0x7f00000097c0)=""/170}, 0x18) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r4, 0x2405, r6) bpf$PROG_LOAD(0x5, &(0x7f00000099c0)={0x7, 0x4, &(0x7f00000098c0)=@raw=[@ldst={0x3, 0x3, 0x6, 0xd, 0x7, 0x26}, @ldst={0x0, 0x2, 0x0, 0xa, 0x0, 0x4, 0xffffffffffffffff}], &(0x7f0000009900)='GPL\x00', 0x5, 0x5d, &(0x7f0000009940)=""/93, 0x41f00, 0x1, [], r13}, 0x48) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000009b40)={r8, &(0x7f0000009a40)="402c0b8b20e0ae84bb", &(0x7f0000009a80)=""/178}, 0x18) 2018/03/31 05:13:41 executing program 4: mount(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='ncpfs\x00', 0x80802, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x50, &(0x7f0000000700)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780)=r0, 0x4) mount(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='./file0\x00', &(0x7f00000006c0)='btrfs\x00', 0x89402, &(0x7f0000000900)="e196efa3cb748d2a6600968b76295ff919bc3877b18eb8d265a35493fcf34fdc965cd5c837d2389c6e2ec6088abe8daaa8ca23f9298fc94dc26874bc4d4567afea1ca0879cdf21e915005a83e96b1002af29091d2176abbb7fec088a67f2e1390f32adaf2f252d24510870f8df7186936f4d88957eb8fcda78b7383a7d24db701d524557ee7324433e70d9ffa185098325f9e657d3c29cf6a35843cb96780269db1c735d55938af5c60e1e4ba25928697277b0fdf356b62399b4c8826d09bfca7d6078c19b4995195ea814b1bb40c06210ec") ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0xffffffff) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6f3, 0x0, 0x0, 0x0, 0x0, 0xfffdffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x22, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000f6bffb)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000400)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000540)={r1, 0x50}, 0xfffffe74) close(r1) perf_event_open(&(0x7f0000348f88)={0x2, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x28, 0x2, 0x0, &(0x7f0000000000)={0x0}) mkdir(&(0x7f0000000100)='./file0\x00', 0x1000000000) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='selinuxfs\x00', 0x1000, &(0x7f0000000100)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='minix\x00', 0x10020, &(0x7f0000000240)) 2018/03/31 05:13:41 executing program 7: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = socket$kcm(0x29, 0x0, 0x0) r1 = getpid() perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x41, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0xfffffffffffffc01}, 0x0, 0x3ff, 0x7f, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r1, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='sysfs\x00', 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0x8) mount(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='xfs\x00', 0x0, &(0x7f0000000600)) perf_event_open(&(0x7f0000000400)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f00000003c0), 0x2}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000500)) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0xffffc, &(0x7f0000000080)) [ 194.358998] FAULT_INJECTION: forcing a failure. [ 194.358998] name failslab, interval 1, probability 0, space 0, times 0 [ 194.370514] CPU: 1 PID: 16400 Comm: syz-executor6 Not tainted 4.16.0-rc6+ #42 [ 194.377783] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 194.387132] Call Trace: [ 194.389721] dump_stack+0x194/0x24d [ 194.393350] ? arch_local_irq_restore+0x53/0x53 [ 194.396582] devpts: called with bogus options [ 194.398023] should_fail+0x8c0/0xa40 [ 194.398044] ? __list_lru_init+0x352/0x750 [ 194.398056] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 194.398070] ? find_first_zero_bit+0x93/0xe0 [ 194.419956] ? find_held_lock+0x35/0x1d0 [ 194.424022] ? __lock_is_held+0xb6/0x140 [ 194.428095] ? check_same_owner+0x320/0x320 [ 194.432413] ? lock_downgrade+0x980/0x980 [ 194.436566] ? rcu_note_context_switch+0x710/0x710 [ 194.441493] ? find_held_lock+0x35/0x1d0 [ 194.445563] should_failslab+0xec/0x120 [ 194.449540] __kmalloc+0x63/0x760 [ 194.452992] ? lock_downgrade+0x980/0x980 [ 194.457140] ? register_shrinker+0x10e/0x2d0 [ 194.460290] devpts: called with bogus options [ 194.461544] ? trace_event_raw_event_module_request+0x320/0x320 [ 194.461561] register_shrinker+0x10e/0x2d0 [ 194.461573] ? __bpf_trace_mm_vmscan_wakeup_kswapd+0x40/0x40 [ 194.461586] ? memcpy+0x45/0x50 [ 194.461600] sget_userns+0xbbf/0xe40 [ 194.489062] ? set_anon_super+0x20/0x20 [ 194.493033] ? put_filp+0x90/0x90 [ 194.495493] EXT4-fs (sda1): re-mounted. Opts: [ 194.496479] ? destroy_unused_super.part.6+0xd0/0xd0 [ 194.496492] ? path_lookupat+0x238/0xba0 [ 194.496503] ? mnt_free_id.isra.21+0x50/0x50 [ 194.496515] ? trace_hardirqs_off+0x10/0x10 [ 194.518893] ? putname+0xee/0x130 [ 194.522354] ? cap_capable+0x1b5/0x230 [ 194.526239] ? security_capable+0x8e/0xc0 [ 194.530386] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 194.535571] ? ns_capable_common+0xcf/0x160 [ 194.539890] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 194.545074] mount_ns+0x6d/0x190 [ 194.548442] rpc_mount+0x9e/0xd0 [ 194.551804] mount_fs+0x66/0x2d0 [ 194.555167] vfs_kern_mount.part.26+0xc6/0x4a0 [ 194.559746] ? may_umount+0xa0/0xa0 [ 194.563368] ? _raw_read_unlock+0x22/0x30 [ 194.567514] ? __get_fs_type+0x8a/0xc0 [ 194.571399] do_mount+0xea4/0x2bb0 [ 194.574936] ? __might_fault+0x110/0x1d0 [ 194.578999] ? copy_mount_string+0x40/0x40 [ 194.583231] ? __check_object_size+0x8b/0x530 [ 194.587724] ? __might_sleep+0x95/0x190 [ 194.591702] ? kasan_check_write+0x14/0x20 [ 194.595931] ? _copy_from_user+0x99/0x110 [ 194.600075] ? memdup_user+0x5e/0x90 [ 194.603783] ? copy_mount_options+0x1f7/0x2e0 [ 194.608281] SyS_mount+0xab/0x120 [ 194.611727] ? copy_mnt_ns+0xb30/0xb30 [ 194.615614] do_syscall_64+0x281/0x940 [ 194.619503] ? vmalloc_sync_all+0x30/0x30 [ 194.623645] ? _raw_spin_unlock_irq+0x27/0x70 [ 194.628137] ? finish_task_switch+0x1c1/0x7e0 [ 194.632629] ? syscall_return_slowpath+0x550/0x550 [ 194.637556] ? syscall_return_slowpath+0x2ac/0x550 [ 194.642481] ? prepare_exit_to_usermode+0x350/0x350 [ 194.647494] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 194.652855] ? trace_hardirqs_off_thunk+0x1a/0x1c 2018/03/31 05:13:41 executing program 2: socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000040)={0x7, 0x70, 0x1, 0xaabc, 0x2, 0x2, 0x0, 0xec, 0x4800, 0x1, 0x3a6b72c9, 0xffffffffffff8000, 0xfff, 0x7, 0x2, 0x7, 0xff, 0x1, 0x2, 0x9, 0x1, 0x0, 0x5, 0x75, 0x2, 0x7, 0x8, 0x4, 0x0, 0xdbce, 0xffff, 0xfaf, 0x1, 0xe7, 0xd0eb, 0x28a5, 0x9, 0x4, 0x0, 0x7, 0x2, @perf_config_ext={0x1, 0x8000}, 0x489, 0x6, 0xff, 0x0, 0x9d, 0x8, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f00000000c0)={0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000140)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r2 = getpid() r3 = perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x8, 0x4, 0x4, 0x1, 0x0, 0x401, 0x100, 0x7, 0xcfc0, 0x7, 0x0, 0x7, 0x30, 0x7, 0x7, 0xfff, 0x7, 0x9, 0xff, 0x9, 0xf, 0x0, 0x3, 0x100000000, 0x3, 0x8, 0xffff, 0x2, 0x3, 0xff, 0x6f, 0x3, 0x5, 0x800, 0x81, 0x0, 0x0, 0x9, 0x1, @perf_bp={&(0x7f0000000180), 0x1}, 0x11815, 0x9, 0x1, 0x1, 0x101, 0x5, 0x1e892fee}, 0x0, 0x9, r1, 0x1) r4 = perf_event_open(&(0x7f0000000280)={0x5, 0x70, 0xe00000000000, 0x9, 0x800, 0x6, 0x0, 0x7ff, 0x10200, 0xb, 0xe3, 0x5, 0x1, 0x4, 0x9b0f, 0x1f8a, 0x401, 0x1, 0xe975, 0x7, 0x437, 0x9, 0x7f, 0x20, 0x1, 0x2, 0x3, 0x5, 0x200, 0x1, 0x8, 0x401, 0x401, 0x2, 0x8, 0xfff, 0xf3c8, 0xf23, 0x0, 0x7fffffff, 0x0, @perf_bp={&(0x7f0000000240), 0x9}, 0x828, 0x3, 0x5, 0x1, 0x0, 0xc37, 0x6}, r2, 0x4, r1, 0x2) r5 = perf_event_open(&(0x7f0000000300)={0x4, 0x70, 0xff, 0x3, 0x7f, 0x7, 0x0, 0x40, 0x4a240, 0x2, 0xffffffffffffcc27, 0xb8, 0x2, 0x7, 0x9, 0x800, 0x3, 0x7d4d, 0xf7, 0xfffffffffffffffa, 0x9, 0x4, 0x3, 0x90be, 0x9, 0xfffffffffffffffc, 0x6, 0x3ff, 0xab6b, 0x8001, 0x5, 0x2, 0x9, 0x732, 0x400, 0x55000000000, 0x1ff, 0x6, 0x0, 0x0, 0x2, @perf_config_ext={0x6, 0xffffffff}, 0x40, 0x80000001, 0x7fff, 0x2, 0x1, 0x6, 0x5}, r2, 0xf, r4, 0xa) r6 = perf_event_open(&(0x7f00000003c0)={0x7, 0x70, 0xc87d, 0x6, 0x5, 0x80000001, 0x0, 0x3, 0x1, 0xb, 0xffffffff, 0x9, 0x584, 0x31b, 0x7, 0x2, 0x3, 0x544, 0x100000001, 0x9, 0x1, 0x100, 0x3, 0x1, 0x7, 0x0, 0x7, 0x5, 0xbb, 0x40, 0x7, 0x8, 0x81, 0xc5a, 0x0, 0x7, 0x1f, 0x815, 0x0, 0xffff, 0x2, @perf_bp={&(0x7f0000000380), 0x8}, 0x4, 0x5, 0xc95, 0x0, 0x7ff, 0x7b02, 0x7}, r2, 0x10, r1, 0xb) ioctl$PERF_EVENT_IOC_DISABLE(r3, 0x2401, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0x4) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = perf_event_open(&(0x7f0000000480)={0x7, 0x70, 0x7, 0xdbff, 0x3, 0x3f, 0x0, 0x8, 0x0, 0xc, 0x8, 0x0, 0xf43, 0x101, 0x6, 0x5, 0x6, 0x9, 0x200, 0xfffffffffffffffd, 0x4, 0x6, 0x6e, 0x20, 0x1b3, 0x1fe, 0x7ff, 0x3, 0x8000, 0x5, 0x0, 0x0, 0x0, 0x5, 0x22d2, 0x401, 0x68, 0xa1ce, 0x0, 0x4, 0x0, @perf_config_ext={0x2fb, 0x4}, 0x2000, 0xd33, 0x6, 0x697c4c7d75b7b6da, 0x171f, 0x9, 0x9}, r2, 0x6, r5, 0x1) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x9, 0x6, 0x101, 0x8, 0x0, 0x200, 0x2000, 0xf, 0x0, 0x5, 0x6, 0x3, 0x2, 0x0, 0x8001, 0x8, 0x3, 0x5, 0x17, 0x7, 0x4, 0x400, 0xffffffff, 0x7, 0x8000, 0x2, 0x100, 0x0, 0x7, 0x95de, 0x2, 0x1, 0x2, 0xd432, 0x3ff, 0x8599, 0x0, 0x3ff, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x10080, 0x7, 0xe7e, 0x7, 0x5, 0x7, 0x9}, r2, 0x0, r3, 0x8) close(r7) ioctl$PERF_EVENT_IOC_DISABLE(r9, 0x2401, 0x1) r10 = gettid() ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f00000005c0)={r0}) ioctl$sock_kcm_SIOCKCMUNATTACH(r11, 0x89e1, &(0x7f0000000600)={r8}) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000640)) r12 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)={0x4, 0x7, 0x7f, 0x9787, 0x1c, 0xffffffffffffffff, 0x5}, 0x2c) recvmsg$kcm(r11, &(0x7f0000009440)={&(0x7f0000009300)=@can={0x0, 0x0}, 0x80, &(0x7f00000093c0)=[{&(0x7f0000009380)=""/16, 0x10}], 0x1, &(0x7f0000009400)=""/18, 0x12, 0x3bc1}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000009480)={0xf, 0x13, &(0x7f00000006c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [@ldst={0x3, 0x2, 0x1, 0x2, 0x7, 0xffffffff, 0x4}, @map={0x18, 0x0, 0x1, 0x0, r12}, @alu={0x7, 0x5, 0xf, 0x6, 0xe, 0x2, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4}, @jmp={0x5, 0x7a4c, 0x0, 0x3, 0x9, 0xffffffff, 0xfffffffffffffff0}, @alu={0x4, 0x20, 0x9, 0x9, 0x5, 0xfffffffe, 0x4}, @jmp={0x5, 0x81, 0x9, 0x7, 0x6, 0xfffffffe, 0xfffffffffffffff0}, @jmp={0x5, 0x3, 0x3, 0x0, 0x2, 0x2, 0xffffffffffffffff}], {0x95}}, &(0x7f0000000780)='GPL\x00', 0x4, 0x77, &(0x7f00000007c0)=""/119, 0x0, 0x1, [], r13}, 0x48) mount(&(0x7f0000009500)='./file0\x00', &(0x7f0000009540)='./file0\x00', &(0x7f0000009580)='cramfs\x00', 0x5020, &(0x7f00000095c0)="22f464f8fef2b95976576e903efe99229584aaf55fa0d91223905d4a68c0c7d18bf26de6fec0660b0c36945200da04f802d9059dd5f6d2f0eca450f4fdd46ed2b411588d802f0d1d02be65816332b2754d686e927593deb8ee3ed17a24d749db81290c33836bcc9b7d93084c53d0744e81deb8b83d9b23565d6db4cb746eb15b20f7b806f0b5a02676d90260a61b00e9ec0b4b8bf07d5f93b3feda8299586c3936f743c764205de278c25a6fff98") perf_event_open(&(0x7f00000096c0)={0x1, 0x70, 0x3, 0xa8e, 0x1000, 0xe57a, 0x0, 0x6, 0x2100b, 0x2, 0x9, 0xdb1b, 0xfffffffffffffffa, 0xa7f8, 0x3, 0x2, 0x800, 0x800, 0x2, 0x0, 0x3f, 0x3, 0x8000000000000, 0x3, 0x20, 0x6, 0x3, 0xfffffffffffff318, 0xffffffffffff0001, 0xfffffffffffffffe, 0x12, 0x1, 0x101, 0x8, 0x100, 0x1, 0x3, 0x8, 0x0, 0x3ff, 0x7, @perf_bp={&(0x7f0000009680), 0x3}, 0x9, 0x6, 0xfffffffffffffff7, 0x0, 0x0, 0x49, 0xfffffffffffff3b8}, r10, 0xe, r5, 0x8) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000009880)={r12, &(0x7f0000009740)="8ba447000764036f17624e623896639a3e2456b901aedcdb4221cea83c3b2c94575967a34ec104bbebeaf6a6b50494e6763f41056d2ca84f906fa48d72590e81334926fab48e", &(0x7f00000097c0)=""/170}, 0x18) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r4, 0x2405, r6) bpf$PROG_LOAD(0x5, &(0x7f00000099c0)={0x7, 0x4, &(0x7f00000098c0)=@raw=[@ldst={0x3, 0x3, 0x6, 0xd, 0x7, 0x26}, @ldst={0x0, 0x2, 0x0, 0xa, 0x0, 0x4, 0xffffffffffffffff}], &(0x7f0000009900)='GPL\x00', 0x5, 0x5d, &(0x7f0000009940)=""/93, 0x41f00, 0x1, [], r13}, 0x48) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000009b40)={r8, &(0x7f0000009a40)="402c0b8b20e0ae84bb", &(0x7f0000009a80)=""/178}, 0x18) 2018/03/31 05:13:41 executing program 1: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000140)='./file0/bus/file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='openpromfs\x00', 0x28, 0x0) mount(&(0x7f0000000180)='./file0/bus/file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000740)) mkdir(&(0x7f00000001c0)='./file0/bus/file0\x00', 0x0) mount(&(0x7f0000000000)='./file0/bus/file0\x00', &(0x7f0000000080)='./file0/bus/file0\x00', &(0x7f0000000100)='overlay\x00', 0x2280000, 0x0) 2018/03/31 05:13:41 executing program 2: socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000040)={0x7, 0x70, 0x1, 0xaabc, 0x2, 0x2, 0x0, 0xec, 0x4800, 0x1, 0x3a6b72c9, 0xffffffffffff8000, 0xfff, 0x7, 0x2, 0x7, 0xff, 0x1, 0x2, 0x9, 0x1, 0x0, 0x5, 0x75, 0x2, 0x7, 0x8, 0x4, 0x0, 0xdbce, 0xffff, 0xfaf, 0x1, 0xe7, 0xd0eb, 0x28a5, 0x9, 0x4, 0x0, 0x7, 0x2, @perf_config_ext={0x1, 0x8000}, 0x489, 0x6, 0xff, 0x0, 0x9d, 0x8, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f00000000c0)={0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000140)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r2 = getpid() r3 = perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x8, 0x4, 0x4, 0x1, 0x0, 0x401, 0x100, 0x7, 0xcfc0, 0x7, 0x0, 0x7, 0x30, 0x7, 0x7, 0xfff, 0x7, 0x9, 0xff, 0x9, 0xf, 0x0, 0x3, 0x100000000, 0x3, 0x8, 0xffff, 0x2, 0x3, 0xff, 0x6f, 0x3, 0x5, 0x800, 0x81, 0x0, 0x0, 0x9, 0x1, @perf_bp={&(0x7f0000000180), 0x1}, 0x11815, 0x9, 0x1, 0x1, 0x101, 0x5, 0x1e892fee}, 0x0, 0x9, r1, 0x1) r4 = perf_event_open(&(0x7f0000000280)={0x5, 0x70, 0xe00000000000, 0x9, 0x800, 0x6, 0x0, 0x7ff, 0x10200, 0xb, 0xe3, 0x5, 0x1, 0x4, 0x9b0f, 0x1f8a, 0x401, 0x1, 0xe975, 0x7, 0x437, 0x9, 0x7f, 0x20, 0x1, 0x2, 0x3, 0x5, 0x200, 0x1, 0x8, 0x401, 0x401, 0x2, 0x8, 0xfff, 0xf3c8, 0xf23, 0x0, 0x7fffffff, 0x0, @perf_bp={&(0x7f0000000240), 0x9}, 0x828, 0x3, 0x5, 0x1, 0x0, 0xc37, 0x6}, r2, 0x4, r1, 0x2) r5 = perf_event_open(&(0x7f0000000300)={0x4, 0x70, 0xff, 0x3, 0x7f, 0x7, 0x0, 0x40, 0x4a240, 0x2, 0xffffffffffffcc27, 0xb8, 0x2, 0x7, 0x9, 0x800, 0x3, 0x7d4d, 0xf7, 0xfffffffffffffffa, 0x9, 0x4, 0x3, 0x90be, 0x9, 0xfffffffffffffffc, 0x6, 0x3ff, 0xab6b, 0x8001, 0x5, 0x2, 0x9, 0x732, 0x400, 0x55000000000, 0x1ff, 0x6, 0x0, 0x0, 0x2, @perf_config_ext={0x6, 0xffffffff}, 0x40, 0x80000001, 0x7fff, 0x2, 0x1, 0x6, 0x5}, r2, 0xf, r4, 0xa) r6 = perf_event_open(&(0x7f00000003c0)={0x7, 0x70, 0xc87d, 0x6, 0x5, 0x80000001, 0x0, 0x3, 0x1, 0xb, 0xffffffff, 0x9, 0x584, 0x31b, 0x7, 0x2, 0x3, 0x544, 0x100000001, 0x9, 0x1, 0x100, 0x3, 0x1, 0x7, 0x0, 0x7, 0x5, 0xbb, 0x40, 0x7, 0x8, 0x81, 0xc5a, 0x0, 0x7, 0x1f, 0x815, 0x0, 0xffff, 0x2, @perf_bp={&(0x7f0000000380), 0x8}, 0x4, 0x5, 0xc95, 0x0, 0x7ff, 0x7b02, 0x7}, r2, 0x10, r1, 0xb) ioctl$PERF_EVENT_IOC_DISABLE(r3, 0x2401, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0x4) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = perf_event_open(&(0x7f0000000480)={0x7, 0x70, 0x7, 0xdbff, 0x3, 0x3f, 0x0, 0x8, 0x0, 0xc, 0x8, 0x0, 0xf43, 0x101, 0x6, 0x5, 0x6, 0x9, 0x200, 0xfffffffffffffffd, 0x4, 0x6, 0x6e, 0x20, 0x1b3, 0x1fe, 0x7ff, 0x3, 0x8000, 0x5, 0x0, 0x0, 0x0, 0x5, 0x22d2, 0x401, 0x68, 0xa1ce, 0x0, 0x4, 0x0, @perf_config_ext={0x2fb, 0x4}, 0x2000, 0xd33, 0x6, 0x697c4c7d75b7b6da, 0x171f, 0x9, 0x9}, r2, 0x6, r5, 0x1) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x9, 0x6, 0x101, 0x8, 0x0, 0x200, 0x2000, 0xf, 0x0, 0x5, 0x6, 0x3, 0x2, 0x0, 0x8001, 0x8, 0x3, 0x5, 0x17, 0x7, 0x4, 0x400, 0xffffffff, 0x7, 0x8000, 0x2, 0x100, 0x0, 0x7, 0x95de, 0x2, 0x1, 0x2, 0xd432, 0x3ff, 0x8599, 0x0, 0x3ff, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x10080, 0x7, 0xe7e, 0x7, 0x5, 0x7, 0x9}, r2, 0x0, r3, 0x8) close(r7) ioctl$PERF_EVENT_IOC_DISABLE(r9, 0x2401, 0x1) r10 = gettid() ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f00000005c0)={r0}) ioctl$sock_kcm_SIOCKCMUNATTACH(r11, 0x89e1, &(0x7f0000000600)={r8}) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000640)) r12 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)={0x4, 0x7, 0x7f, 0x9787, 0x1c, 0xffffffffffffffff, 0x5}, 0x2c) recvmsg$kcm(r11, &(0x7f0000009440)={&(0x7f0000009300)=@can={0x0, 0x0}, 0x80, &(0x7f00000093c0)=[{&(0x7f0000009380)=""/16, 0x10}], 0x1, &(0x7f0000009400)=""/18, 0x12, 0x3bc1}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000009480)={0xf, 0x13, &(0x7f00000006c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [@ldst={0x3, 0x2, 0x1, 0x2, 0x7, 0xffffffff, 0x4}, @map={0x18, 0x0, 0x1, 0x0, r12}, @alu={0x7, 0x5, 0xf, 0x6, 0xe, 0x2, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4}, @jmp={0x5, 0x7a4c, 0x0, 0x3, 0x9, 0xffffffff, 0xfffffffffffffff0}, @alu={0x4, 0x20, 0x9, 0x9, 0x5, 0xfffffffe, 0x4}, @jmp={0x5, 0x81, 0x9, 0x7, 0x6, 0xfffffffe, 0xfffffffffffffff0}, @jmp={0x5, 0x3, 0x3, 0x0, 0x2, 0x2, 0xffffffffffffffff}], {0x95}}, &(0x7f0000000780)='GPL\x00', 0x4, 0x77, &(0x7f00000007c0)=""/119, 0x0, 0x1, [], r13}, 0x48) mount(&(0x7f0000009500)='./file0\x00', &(0x7f0000009540)='./file0\x00', &(0x7f0000009580)='cramfs\x00', 0x5020, &(0x7f00000095c0)="22f464f8fef2b95976576e903efe99229584aaf55fa0d91223905d4a68c0c7d18bf26de6fec0660b0c36945200da04f802d9059dd5f6d2f0eca450f4fdd46ed2b411588d802f0d1d02be65816332b2754d686e927593deb8ee3ed17a24d749db81290c33836bcc9b7d93084c53d0744e81deb8b83d9b23565d6db4cb746eb15b20f7b806f0b5a02676d90260a61b00e9ec0b4b8bf07d5f93b3feda8299586c3936f743c764205de278c25a6fff98") perf_event_open(&(0x7f00000096c0)={0x1, 0x70, 0x3, 0xa8e, 0x1000, 0xe57a, 0x0, 0x6, 0x2100b, 0x2, 0x9, 0xdb1b, 0xfffffffffffffffa, 0xa7f8, 0x3, 0x2, 0x800, 0x800, 0x2, 0x0, 0x3f, 0x3, 0x8000000000000, 0x3, 0x20, 0x6, 0x3, 0xfffffffffffff318, 0xffffffffffff0001, 0xfffffffffffffffe, 0x12, 0x1, 0x101, 0x8, 0x100, 0x1, 0x3, 0x8, 0x0, 0x3ff, 0x7, @perf_bp={&(0x7f0000009680), 0x3}, 0x9, 0x6, 0xfffffffffffffff7, 0x0, 0x0, 0x49, 0xfffffffffffff3b8}, r10, 0xe, r5, 0x8) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000009880)={r12, &(0x7f0000009740)="8ba447000764036f17624e623896639a3e2456b901aedcdb4221cea83c3b2c94575967a34ec104bbebeaf6a6b50494e6763f41056d2ca84f906fa48d72590e81334926fab48e", &(0x7f00000097c0)=""/170}, 0x18) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r4, 0x2405, r6) bpf$PROG_LOAD(0x5, &(0x7f00000099c0)={0x7, 0x4, &(0x7f00000098c0)=@raw=[@ldst={0x3, 0x3, 0x6, 0xd, 0x7, 0x26}, @ldst={0x0, 0x2, 0x0, 0xa, 0x0, 0x4, 0xffffffffffffffff}], &(0x7f0000009900)='GPL\x00', 0x5, 0x5d, &(0x7f0000009940)=""/93, 0x41f00, 0x1, [], r13}, 0x48) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000009b40)={r8, &(0x7f0000009a40)="402c0b8b20e0ae84bb", &(0x7f0000009a80)=""/178}, 0x18) 2018/03/31 05:13:41 executing program 0: socketpair(0xe, 0x0, 0xffff, &(0x7f0000000000)) 2018/03/31 05:13:41 executing program 3: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x0, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x7, 0x40, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb1104058d8843") close(r1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r3, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000840)={&(0x7f0000000800)='./file0\x00', 0x0, 0x10}, 0x10) socketpair(0x3, 0x1, 0x174f1f0c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000540)={r3}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40042409, 0x80000000000) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r3}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) sendmsg(r6, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="ebf2716387a78e98475956706ceecf4f691f0f64dfb2736aae935b7f8c8b4824eb0b99059de5958ea0fb81ea850657c27b1293c19343b34143d83d1c2ae986fab57bbc85c6b9f4fb2abb4d7cd4503b6455489b7ccbdf8e1be0183f09f69903b360c991de52fccfa2d9af45809b0eaa0ac1e9e2729078c6641c6ed2a4912937863e68512e66c8d19ae995af630d97", 0x8e}], 0x1, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r6, &(0x7f0000000040)={&(0x7f0000006980)=ANY=[@ANYRES32=0x0], 0x1, &(0x7f0000006d00)=[{&(0x7f0000006c40)=""/181, 0xb5}], 0x1, &(0x7f0000006d40)=""/65, 0x41}, 0x0) sendmsg(r7, &(0x7f0000001900)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)='v', 0x1}], 0x1, &(0x7f0000000440)=ANY=[]}, 0x0) recvmsg(r6, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbfd87268a86c298000f8ffffff0000000000000000850000001bf2ff00dbf50e62095d2ca7b86a37beaf6ce0af0000000000000000000000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r9}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0xffffffff7fffffff, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x7, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe, 0x8}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r5}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x40f00, 0x1, [], r9}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103, 0x0, 0x0, [], r8}, 0x48) 2018/03/31 05:13:42 executing program 4: mount(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='ncpfs\x00', 0x80802, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x50, &(0x7f0000000700)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780)=r0, 0x4) mount(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='./file0\x00', &(0x7f00000006c0)='btrfs\x00', 0x89402, &(0x7f0000000900)="e196efa3cb748d2a6600968b76295ff919bc3877b18eb8d265a35493fcf34fdc965cd5c837d2389c6e2ec6088abe8daaa8ca23f9298fc94dc26874bc4d4567afea1ca0879cdf21e915005a83e96b1002af29091d2176abbb7fec088a67f2e1390f32adaf2f252d24510870f8df7186936f4d88957eb8fcda78b7383a7d24db701d524557ee7324433e70d9ffa185098325f9e657d3c29cf6a35843cb96780269db1c735d55938af5c60e1e4ba25928697277b0fdf356b62399b4c8826d09bfca7d6078c19b4995195ea814b1bb40c06210ec") ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0xffffffff) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6f3, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x22, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000f6bffb)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000400)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000540)={r1, 0x50}, 0xfffffe74) close(r1) perf_event_open(&(0x7f0000348f88)={0x2, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x28, 0x2, 0x0, &(0x7f0000000000)={0x0}) mkdir(&(0x7f0000000100)='./file0\x00', 0x1000000000) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='selinuxfs\x00', 0x1000, &(0x7f0000000100)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='minix\x00', 0x10020, &(0x7f0000000240)) 2018/03/31 05:13:42 executing program 2: socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000040)={0x7, 0x70, 0x1, 0xaabc, 0x2, 0x2, 0x0, 0xec, 0x4800, 0x1, 0x3a6b72c9, 0xffffffffffff8000, 0xfff, 0x7, 0x2, 0x7, 0xff, 0x1, 0x2, 0x9, 0x1, 0x0, 0x5, 0x75, 0x2, 0x7, 0x8, 0x4, 0x0, 0xdbce, 0xffff, 0xfaf, 0x1, 0xe7, 0xd0eb, 0x28a5, 0x9, 0x4, 0x0, 0x7, 0x2, @perf_config_ext={0x1, 0x8000}, 0x489, 0x6, 0xff, 0x0, 0x9d, 0x8, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f00000000c0)={0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000140)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r2 = getpid() r3 = perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x8, 0x4, 0x4, 0x1, 0x0, 0x401, 0x100, 0x7, 0xcfc0, 0x7, 0x0, 0x7, 0x30, 0x7, 0x7, 0xfff, 0x7, 0x9, 0xff, 0x9, 0xf, 0x0, 0x3, 0x100000000, 0x3, 0x8, 0xffff, 0x2, 0x3, 0xff, 0x6f, 0x3, 0x5, 0x800, 0x81, 0x0, 0x0, 0x9, 0x1, @perf_bp={&(0x7f0000000180), 0x1}, 0x11815, 0x9, 0x1, 0x1, 0x101, 0x5, 0x1e892fee}, r2, 0x0, r1, 0x1) r4 = perf_event_open(&(0x7f0000000280)={0x5, 0x70, 0xe00000000000, 0x9, 0x800, 0x6, 0x0, 0x7ff, 0x10200, 0xb, 0xe3, 0x5, 0x1, 0x4, 0x9b0f, 0x1f8a, 0x401, 0x1, 0xe975, 0x7, 0x437, 0x9, 0x7f, 0x20, 0x1, 0x2, 0x3, 0x5, 0x200, 0x1, 0x8, 0x401, 0x401, 0x2, 0x8, 0xfff, 0xf3c8, 0xf23, 0x0, 0x7fffffff, 0x0, @perf_bp={&(0x7f0000000240), 0x9}, 0x828, 0x3, 0x5, 0x1, 0x0, 0xc37, 0x6}, r2, 0x4, r1, 0x2) r5 = perf_event_open(&(0x7f0000000300)={0x4, 0x70, 0xff, 0x3, 0x7f, 0x7, 0x0, 0x40, 0x4a240, 0x2, 0xffffffffffffcc27, 0xb8, 0x2, 0x7, 0x9, 0x800, 0x3, 0x7d4d, 0xf7, 0xfffffffffffffffa, 0x9, 0x4, 0x3, 0x90be, 0x9, 0xfffffffffffffffc, 0x6, 0x3ff, 0xab6b, 0x8001, 0x5, 0x2, 0x9, 0x732, 0x400, 0x55000000000, 0x1ff, 0x6, 0x0, 0x0, 0x2, @perf_config_ext={0x6, 0xffffffff}, 0x40, 0x80000001, 0x7fff, 0x2, 0x1, 0x6, 0x5}, r2, 0xf, r4, 0xa) r6 = perf_event_open(&(0x7f00000003c0)={0x7, 0x70, 0xc87d, 0x6, 0x5, 0x80000001, 0x0, 0x3, 0x1, 0xb, 0xffffffff, 0x9, 0x584, 0x31b, 0x7, 0x2, 0x3, 0x544, 0x100000001, 0x9, 0x1, 0x100, 0x3, 0x1, 0x7, 0x0, 0x7, 0x5, 0xbb, 0x40, 0x7, 0x8, 0x81, 0xc5a, 0x0, 0x7, 0x1f, 0x815, 0x0, 0xffff, 0x2, @perf_bp={&(0x7f0000000380), 0x8}, 0x4, 0x5, 0xc95, 0x0, 0x7ff, 0x7b02, 0x7}, r2, 0x10, r1, 0xb) ioctl$PERF_EVENT_IOC_DISABLE(r3, 0x2401, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0x4) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = perf_event_open(&(0x7f0000000480)={0x7, 0x70, 0x7, 0xdbff, 0x3, 0x3f, 0x0, 0x8, 0x0, 0xc, 0x8, 0x0, 0xf43, 0x101, 0x6, 0x5, 0x6, 0x9, 0x200, 0xfffffffffffffffd, 0x4, 0x6, 0x6e, 0x20, 0x1b3, 0x1fe, 0x7ff, 0x3, 0x8000, 0x5, 0x0, 0x0, 0x0, 0x5, 0x22d2, 0x401, 0x68, 0xa1ce, 0x0, 0x4, 0x0, @perf_config_ext={0x2fb, 0x4}, 0x2000, 0xd33, 0x6, 0x697c4c7d75b7b6da, 0x171f, 0x9, 0x9}, r2, 0x6, r5, 0x1) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x9, 0x6, 0x101, 0x8, 0x0, 0x200, 0x2000, 0xf, 0x0, 0x5, 0x6, 0x3, 0x2, 0x0, 0x8001, 0x8, 0x3, 0x5, 0x17, 0x7, 0x4, 0x400, 0xffffffff, 0x7, 0x8000, 0x2, 0x100, 0x0, 0x7, 0x95de, 0x2, 0x1, 0x2, 0xd432, 0x3ff, 0x8599, 0x0, 0x3ff, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x10080, 0x7, 0xe7e, 0x7, 0x5, 0x7, 0x9}, r2, 0x0, r3, 0x8) close(r7) ioctl$PERF_EVENT_IOC_DISABLE(r9, 0x2401, 0x1) r10 = gettid() ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f00000005c0)={r0}) ioctl$sock_kcm_SIOCKCMUNATTACH(r11, 0x89e1, &(0x7f0000000600)={r8}) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000640)) r12 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)={0x4, 0x7, 0x7f, 0x9787, 0x1c, 0xffffffffffffffff, 0x5}, 0x2c) recvmsg$kcm(r11, &(0x7f0000009440)={&(0x7f0000009300)=@can={0x0, 0x0}, 0x80, &(0x7f00000093c0)=[{&(0x7f0000009380)=""/16, 0x10}], 0x1, &(0x7f0000009400)=""/18, 0x12, 0x3bc1}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000009480)={0xf, 0x13, &(0x7f00000006c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [@ldst={0x3, 0x2, 0x1, 0x2, 0x7, 0xffffffff, 0x4}, @map={0x18, 0x0, 0x1, 0x0, r12}, @alu={0x7, 0x5, 0xf, 0x6, 0xe, 0x2, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4}, @jmp={0x5, 0x7a4c, 0x0, 0x3, 0x9, 0xffffffff, 0xfffffffffffffff0}, @alu={0x4, 0x20, 0x9, 0x9, 0x5, 0xfffffffe, 0x4}, @jmp={0x5, 0x81, 0x9, 0x7, 0x6, 0xfffffffe, 0xfffffffffffffff0}, @jmp={0x5, 0x3, 0x3, 0x0, 0x2, 0x2, 0xffffffffffffffff}], {0x95}}, &(0x7f0000000780)='GPL\x00', 0x4, 0x77, &(0x7f00000007c0)=""/119, 0x0, 0x1, [], r13}, 0x48) mount(&(0x7f0000009500)='./file0\x00', &(0x7f0000009540)='./file0\x00', &(0x7f0000009580)='cramfs\x00', 0x5020, &(0x7f00000095c0)="22f464f8fef2b95976576e903efe99229584aaf55fa0d91223905d4a68c0c7d18bf26de6fec0660b0c36945200da04f802d9059dd5f6d2f0eca450f4fdd46ed2b411588d802f0d1d02be65816332b2754d686e927593deb8ee3ed17a24d749db81290c33836bcc9b7d93084c53d0744e81deb8b83d9b23565d6db4cb746eb15b20f7b806f0b5a02676d90260a61b00e9ec0b4b8bf07d5f93b3feda8299586c3936f743c764205de278c25a6fff98") perf_event_open(&(0x7f00000096c0)={0x1, 0x70, 0x3, 0xa8e, 0x1000, 0xe57a, 0x0, 0x6, 0x2100b, 0x2, 0x9, 0xdb1b, 0xfffffffffffffffa, 0xa7f8, 0x3, 0x2, 0x800, 0x800, 0x2, 0x0, 0x3f, 0x3, 0x8000000000000, 0x3, 0x20, 0x6, 0x3, 0xfffffffffffff318, 0xffffffffffff0001, 0xfffffffffffffffe, 0x12, 0x1, 0x101, 0x8, 0x100, 0x1, 0x3, 0x8, 0x0, 0x3ff, 0x7, @perf_bp={&(0x7f0000009680), 0x3}, 0x9, 0x6, 0xfffffffffffffff7, 0x0, 0x0, 0x49, 0xfffffffffffff3b8}, r10, 0xe, r5, 0x8) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000009880)={r12, &(0x7f0000009740)="8ba447000764036f17624e623896639a3e2456b901aedcdb4221cea83c3b2c94575967a34ec104bbebeaf6a6b50494e6763f41056d2ca84f906fa48d72590e81334926fab48e", &(0x7f00000097c0)=""/170}, 0x18) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r4, 0x2405, r6) bpf$PROG_LOAD(0x5, &(0x7f00000099c0)={0x7, 0x4, &(0x7f00000098c0)=@raw=[@ldst={0x3, 0x3, 0x6, 0xd, 0x7, 0x26}, @ldst={0x0, 0x2, 0x0, 0xa, 0x0, 0x4, 0xffffffffffffffff}], &(0x7f0000009900)='GPL\x00', 0x5, 0x5d, &(0x7f0000009940)=""/93, 0x41f00, 0x1, [], r13}, 0x48) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000009b40)={r8, &(0x7f0000009a40)="402c0b8b20e0ae84bb", &(0x7f0000009a80)=""/178}, 0x18) [ 194.657697] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 194.662877] RIP: 0033:0x454e79 [ 194.666058] RSP: 002b:00007fc28ac9cc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 194.673764] RAX: ffffffffffffffda RBX: 00007fc28ac9d6d4 RCX: 0000000000454e79 [ 194.681025] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 194.688280] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 194.695817] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000016 [ 194.703080] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000037 [ 194.758885] EXT4-fs (sda1): re-mounted. Opts: [ 194.776851] xprt_adjust_timeout: rq_timeout = 0! [ 194.800874] ------------[ cut here ]------------ [ 194.805684] refcount_t: increment on 0; use-after-free. [ 194.811190] WARNING: CPU: 0 PID: 4484 at lib/refcount.c:153 refcount_inc+0x47/0x50 [ 194.818885] Kernel panic - not syncing: panic_on_warn set ... [ 194.818885] [ 194.826245] CPU: 0 PID: 4484 Comm: syz-executor6 Not tainted 4.16.0-rc6+ #42 [ 194.833413] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 194.842742] Call Trace: [ 194.845306] dump_stack+0x194/0x24d [ 194.848921] ? arch_local_irq_restore+0x53/0x53 [ 194.853565] ? vsnprintf+0x1ed/0x1900 [ 194.857347] panic+0x1e4/0x41c [ 194.860794] ? refcount_error_report+0x214/0x214 [ 194.865533] ? show_regs_print_info+0x18/0x18 [ 194.870005] ? __warn+0x1c1/0x200 [ 194.873443] ? refcount_inc+0x47/0x50 [ 194.877226] __warn+0x1dc/0x200 [ 194.880490] ? refcount_inc+0x47/0x50 [ 194.884264] report_bug+0x1f4/0x2b0 [ 194.887867] fixup_bug.part.10+0x37/0x80 [ 194.891907] do_error_trap+0x2d7/0x3e0 [ 194.895767] ? vprintk_default+0x28/0x30 [ 194.899801] ? math_error+0x400/0x400 [ 194.903575] ? printk+0xaa/0xca [ 194.906828] ? show_regs_print_info+0x18/0x18 [ 194.911309] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 194.916135] do_invalid_op+0x1b/0x20 [ 194.919829] invalid_op+0x1b/0x40 [ 194.923269] RIP: 0010:refcount_inc+0x47/0x50 [ 194.927661] RSP: 0018:ffff88019ee07860 EFLAGS: 00010286 [ 194.933007] RAX: dffffc0000000008 RBX: ffff88019e0be104 RCX: ffffffff815b421e [ 194.940260] RDX: 0000000000000000 RSI: 1ffff10033dc0ebc RDI: 1ffff10033dc0e91 [ 194.947504] RBP: ffff88019ee07868 R08: 0000000000000000 R09: 0000000000000000 [ 194.954746] R10: 0000000000000000 R11: 0000000000000000 R12: ffff88019ee07af8 [ 194.961990] R13: ffff88019e66f513 R14: ffff88019e0be100 R15: ffff88019e66f501 [ 194.969248] ? vprintk_func+0x5e/0xc0 [ 194.973038] sk_alloc+0x3f9/0x1440 [ 194.976565] ? sock_def_error_report+0x5e0/0x5e0 [ 194.981296] ? perf_trace_lock+0x900/0x900 [ 194.985515] ? trace_hardirqs_off+0x10/0x10 [ 194.989820] ? do_raw_write_unlock+0x290/0x290 [ 194.994387] ? perf_trace_lock_acquire+0xe3/0x980 [ 194.999214] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 195.004205] ? find_held_lock+0x35/0x1d0 [ 195.008246] ? inet_create+0x3fc/0xf50 [ 195.012114] ? lock_downgrade+0x980/0x980 [ 195.016246] ? lock_release+0xa40/0xa40 [ 195.020196] ? lock_downgrade+0x980/0x980 [ 195.024338] inet_create+0x47c/0xf50 [ 195.028049] ? ipip_gro_receive+0xf0/0xf0 [ 195.032175] ? __lock_is_held+0xb6/0x140 [ 195.036217] __sock_create+0x4d4/0x850 [ 195.040082] ? kernel_sock_ip_overhead+0x4c0/0x4c0 [ 195.044991] ? user_path_create+0x40/0x40 [ 195.049128] SyS_socket+0xeb/0x1d0 [ 195.052652] ? fillonedir+0x250/0x250 [ 195.056428] ? move_addr_to_kernel+0x60/0x60 [ 195.060810] ? getname_flags+0x256/0x580 [ 195.064846] ? do_syscall_64+0xb7/0x940 [ 195.068793] ? move_addr_to_kernel+0x60/0x60 [ 195.073177] do_syscall_64+0x281/0x940 [ 195.077045] ? vmalloc_sync_all+0x30/0x30 [ 195.081175] ? trace_event_raw_event_sys_exit+0x260/0x260 [ 195.086686] ? syscall_return_slowpath+0x550/0x550 [ 195.091590] ? syscall_return_slowpath+0x2ac/0x550 [ 195.096496] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 195.101839] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 195.106660] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 195.111824] RIP: 0033:0x4579a7 [ 195.114987] RSP: 002b:00007ffd5e6ada88 EFLAGS: 00000202 ORIG_RAX: 0000000000000029 [ 195.122671] RAX: ffffffffffffffda RBX: 0000000000000136 RCX: 00000000004579a7 [ 195.129919] RDX: 0000000000000006 RSI: 0000000000000001 RDI: 0000000000000002 [ 195.137173] RBP: 000000000002f8cb R08: 0000000000000000 R09: 0000000000000001 [ 195.144416] R10: 000000000000000a R11: 0000000000000202 R12: 000000000000027e [ 195.151670] R13: 000000000000001a R14: 000000000000027e R15: 000000000002f707 [ 195.159527] Dumping ftrace buffer: [ 195.163102] (ftrace buffer empty) [ 195.166785] Kernel Offset: disabled [ 195.170388] Rebooting in 86400 seconds..