, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() r2 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x10000000}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) sendmsg(r0, &(0x7f0000001940)={&(0x7f0000000040)=@alg={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x80, &(0x7f00000003c0)=[{&(0x7f00000000c0)="3dbdbac4175f3c58535f54b66fdb155f407b8895654efe85fdc7320e6b96e7e828c848f423ed8e3d3c3c2676b2", 0x2d}, {&(0x7f0000000100)="6a5c75e644ede5597ccda16d73d2542a36f87139931791ad915bbf158bc49a176f2d7721e4adc4f00fb1ba8fbd550a2ba716791ac6a89b0ed1490c2fbb6d671c7c6f021dab82c847ccf45cfdf9520dafb0f7fce835c7bc2e0598548e6038d25984367e86afec1c26357fd05b2f6f540d48a19a03feb2f6f19a7689d0df12c146151588284b5e42c1813c5407b9373f624c08570bf1b121cbf6217489744434afde356cd634ae8a8e5e937d689e26de9723ca", 0xb2}, {&(0x7f00000001c0)}, {&(0x7f0000000200)="39b39ba141cab68de632a04235b4a9dac79f8a5c891477bd6047864e550da566a0699d73ca8c3e64df5ae2260352f702a87af84355", 0x35}, {&(0x7f0000000240)="94bbbd951b7ad63d2eac50dd6c6178b417a8a976ea2d4571fe741cd9380001482409993a6a2060e4f85b0d47220d588f8933d5ab99f696d780e7193cfb2c6640cfc053cc01d8cedda30d7bca0ea2e98ca60f722f85e7f368b03b2b0b51711dcd54132857404acc819c32348c3a7172c0c63e89827c0a", 0x76}, {&(0x7f00000002c0)="1576cf3f28d9a869f01bd16f1a553dccf94f2daff190d0f38f2656be34be15ec34563ac1135ac63699cd66af399e0c642a9008f1ff35f26ae55d4db8cc0b58b05accb83660dbd45408cee9ed7f71fa04bf890fb4646c4d701be9d0ec5b11975a15ee24088a6ca7934a4f9bd0d730a05d4eff811edaa1ea549c6b0d2f157c82c054f793d66e39dae828a15dc3633cb982b6d7345c140a3c19de7f179accbc24b11c07e50841ab304aef6f7d414a657048dd5346f261c0fe01a61cb5e28fa254fd7fa427f5005e", 0xc6}], 0x6, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x14e0, 0x4}, 0x20000000) r3 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x573a6503) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) ioctl$PERF_EVENT_IOC_REFRESH(r3, 0x2402, 0x2) 2018/04/05 21:37:16 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000400008fe7bb5cd4e344cd0002800000720a00ff"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xf, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x4800}, [@jmp={0x5, 0x0, 0xffffffcd}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) 2018/04/05 21:37:16 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0xfa}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=ANY=[@ANYBLOB="1800000000000000000000000000000071100000000000000000000000000000b600000000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00', 0x0, 0x18}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000180)={&(0x7f0000000000)='./file0\x00', r0}, 0x10) socketpair(0x3, 0x80000, 0x4, &(0x7f0000001700)={0xffffffffffffffff}) recvmsg$kcm(r2, &(0x7f00000019c0)={&(0x7f0000001740)=@can, 0x80, &(0x7f0000001940)=[{&(0x7f00000017c0)=""/8, 0x8}, {&(0x7f0000001800)=""/48, 0x30}, {&(0x7f0000001840)=""/128, 0x80}, {&(0x7f00000018c0)=""/81, 0x51}], 0x4, &(0x7f0000001980)=""/24, 0x18}, 0x40012000) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000001c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e9be12aa8daccf7393e72be9cc66f"}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r1, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet6_icmp(0xa, 0x2, 0x3a, &(0x7f0000000300)) socketpair$inet_udp(0x15, 0xfffffffd, 0x7fffffffefff, &(0x7f0000000240)) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r0, &(0x7f0000000340)="c75b9f7478216d9f31cd7b633c0aaf68da8985007c2ee5e5da9b7418fb3306ebdff6d69aee09c673bc91bc0f350461a2b702fa973fcc275ece8fb053cb3cf4c660e43a78b3f5237325e773316242550a5d57edd20e81998d8c2b8fbf79acf0d023a1fb71ae13eb3b20e577f7db12bc6c8175bb02e95300e86b006abcc1b2f6b131bfba926f2a195155e705e66983c178de78f5efa72b5bc51dce54eebcc5673a206b17e49b9f3cd9b1c6ac1aa19f81904538cce2f745072fd048726372ba1f85f7ba3453"}, 0x10) 2018/04/05 21:37:16 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6ffffff00000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:16 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:16 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0x86, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:16 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000400008fe7bb5cd4e344cd0002800000720a00ff"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xf, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x600000000000000}, [@jmp={0x5, 0x0, 0xffffffcd}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) 2018/04/05 21:37:16 executing program 4: socketpair(0x1f, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x200) socketpair(0xa, 0xa, 0x2, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000140)=0x92) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r1, 0x2401, 0x7f) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000000)={0x0, 0x0}) recvmsg(r3, &(0x7f0000000040)={&(0x7f0000006980)=ANY=[@ANYRES32=0x0], 0x1, &(0x7f0000006d00)=[{&(0x7f0000006c40)=""/181, 0xb5}], 0x1, &(0x7f0000006d40)=""/65, 0x41}, 0x0) socketpair$inet6_icmp(0xa, 0x2, 0x3a, &(0x7f0000000300)) sendmsg(r4, &(0x7f0000001900)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)='v', 0x1}], 0x1, &(0x7f0000000440)=ANY=[]}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000100)=@raw=[@generic], &(0x7f0000000180)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103, 0x0, 0x0, [], r5}, 0x48) 2018/04/05 21:37:16 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="180000000000000000000000028000006a0a00fffffff60061181b3843fae1a348e69581b358ef03dd7188e3bd32cb06eed1058f6876d43edb7017e642f9a17b779d5f084a2c342c341330e9885c2d836aed2ceb495ae855044e11df8501c2c1bb934e90c9c0a12270c33c94f4cd99f0cbb89f2641afd297df19ffda9779f593f8b67ccfdc788c1aed28a2b6edaf7e2c5ca90fca214252507c895226f45e5b4727b751ee56bb"], &(0x7f0000000080)='syzkalleP\x00', 0x2, 0xce, &(0x7f0000000180)=""/206}, 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000000000000950000009cf6e509"], &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r0, 0x50, &(0x7f0000000400)}, 0x10) 2018/04/05 21:37:16 executing program 6: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0xfa}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000000)) socketpair$inet_udp(0x15, 0xfffffffd, 0x7fffffffefff, &(0x7f0000000080)) 2018/04/05 21:37:16 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8cffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:17 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:17 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000400008fe7bb5cd4e344cd0002800000720a00ff"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xf, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x74000000}, [@jmp={0x5, 0x0, 0xffffffcd}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) 2018/04/05 21:37:17 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0x7f1, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:17 executing program 2: bpf$MAP_CREATE(0x6, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:17 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f0000009b80)={&(0x7f00000076c0)=@hci={0x0, 0x0}, 0x80, &(0x7f0000009a80)=[{&(0x7f0000007740)=""/158, 0x9e}, {&(0x7f0000007800)=""/66, 0x42}, {&(0x7f0000007880)=""/4096, 0x1000}, {&(0x7f0000008880)}, {&(0x7f00000088c0)=""/114, 0x72}, {&(0x7f0000008940)=""/19, 0x13}, {&(0x7f0000008980)=""/4096, 0x1000}, {&(0x7f0000009980)=""/46, 0x2e}, {&(0x7f00000099c0)=""/165, 0xa5}], 0x9, &(0x7f0000009b40), 0x0, 0x6}, 0x21) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x4000000, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000f9e57f00006a0a00fffffff6006118"], &(0x7f0000009bc0)="73797a6b616c6c65500099c9a6ca7f2792e7030000000000000049f11823e72e88c10f796f7571a434db928c9424f4066ab93cbed64bb4627902658d9701313bd465198d3669bcf7f6c2d668ea789116845220727dee606dd3e3fb4ef5217678ec5431d2bd835d114a94d6b605953762024c387facc61fbd3d84fe7f0000002fcf965f6ce8f8913cdf86bf", 0x0, 0xce, &(0x7f0000000480)=""/206, 0x41000, 0x0, [], r0}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="180000050000000010a587d861b20afaeaf29252ccd500000000000000000000000000000000"], &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r1, 0x0, 0x41, 0x1000, &(0x7f0000000140)="365d2ae7391d968f2b68e6b26b18ec6636dc6921ef55415230b2f94a07768112345f19e4aa3af8b36679ec093bd7f0bc49068d161d7effa7f5865683ea5e8b6bb0", &(0x7f0000000580)=""/4096, 0x7, 0x1}, 0x28) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r1, 0x50, &(0x7f0000000400)}, 0x10) 2018/04/05 21:37:17 executing program 6: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0xfa}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=ANY=[@ANYBLOB="18000700000000000000000000000000711000000000000000000000000000009500000000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_udp(0x15, 0xfffffffd, 0x7fffffffefff, &(0x7f0000000080)) 2018/04/05 21:37:17 executing program 4: socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000240)) perf_event_open(&(0x7f0000000040)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0xc5f}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x3, 0x5, &(0x7f0000000080)=@framed={{0x18}, [@call={0x85, 0x0, 0x0, 0x13}], {0x95}}, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x93, &(0x7f0000000100)=""/147}, 0x48) 2018/04/05 21:37:17 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:17 executing program 2: bpf$MAP_CREATE(0xb00000000000000, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:17 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff8c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:17 executing program 5: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffff9c, 0x28, &(0x7f0000000140)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={r0, 0x6, 0x10}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f00000004c0)=ANY=[@ANYBLOB="180000000000000000000000028000006a0a00fffffff6006118"], &(0x7f0000000080)='syzkalleP\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xd, 0x5, &(0x7f0000000040)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) mkdir(&(0x7f0000000000)='./file0\x00', 0xa0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r1, 0x50, &(0x7f0000000400)}, 0x10) 2018/04/05 21:37:17 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0x3cf, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:17 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:17 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000400008fe7bb5cd4e344cd0002800000720a00ff"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xf, 0x5, &(0x7f0000000040)=@framed={{0x18, 0xd2090000}, [@jmp={0x5, 0x0, 0xffffffcd}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) 2018/04/05 21:37:17 executing program 6: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0xfa}, 0x2c) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000000)) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000001000000000000000000000000000000000000009500000000800000954c5f4b4da43af3fd1cfb061a38a5f7efb64296c4b56a94dfe4"], &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_udp(0x15, 0xfffffffd, 0x7fffffffefff, &(0x7f0000000080)) 2018/04/05 21:37:17 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x1, 0x3, &(0x7f0000000080)=ANY=[@ANYBLOB="87c04e20b3793f13dd677981d2db0002000000278022e6000000000000009500000000"], &(0x7f0000000000)="f4206cd55d3174fccd51d063ca3dda5cbf5a01cc7ea92c43b604ffc53727d2d60f55ddeb757cf36a8457125ab48bcbcce4011a423df186cc8d8e6e9a66b1a0a6035a2fc0578cf5aad8b3a24a9c646a37eb26c6212ffc9658f152194b880765d169d550beb059984a10c2", 0x80, 0x99, &(0x7f000000d000)=""/153}, 0x48) 2018/04/05 21:37:18 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:18 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0x9ec, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:18 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xa, 0x100000000, 0x8, 0x5, 0x1, 0xffffffffffffff9c}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000480)="40b25e12d2300d8d91297940977d295476a15e03ce4da982cd5055ff4149bfcfd121f0c54df6fade32e69ffb0a650fe8a301658873b3a1351e0f5c87ce5c63a66aaa76c052f932b2288046e35aa59ec8167ce71ab8863c95fec2d3c486cdc544b4a490645fdb6405f3cbb0cc144c880dbcf7e891e888b14fe1c15e49c58853cb9ee9aff543efbeb6b340d49ca985063102aa195a83e8822202ba19191123f029d65d395df88f3a96e771947853215c3ccfd83f5ad4ff5e8cfcab103cb3869cf4976d1973f237068a1dd165d5a27a195ef554bb", &(0x7f0000000580)=""/143}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000000000000000000028000006a0a00fffffff6006118"], &(0x7f0000000080)='syzkalleP\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000000000000000000000000000500000000006c0104000000000000a29eb50000e2ffffff"], &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x66d2032f3fc5ac4b, &(0x7f0000000300)=""/187}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r1, 0x50, &(0x7f0000000400)}, 0x10) 2018/04/05 21:37:18 executing program 2: bpf$MAP_CREATE(0x16030000, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:18 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:18 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000400008fe7bb5cd4e344cd0002800000720a00ff"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xf, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x10}, [@jmp={0x5, 0x0, 0xffffffcd}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) 2018/04/05 21:37:18 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0xfa}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000180)={&(0x7f0000000000)='./file0\x00', r0}, 0x10) r1 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000002940)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r1, &(0x7f0000002f80)={&(0x7f0000002980)=@pppol2tpv3in6={0x18, 0x1, {0x0, r2, 0x4, 0x0, 0x10001, 0x3, {0xa, 0x4e24, 0x2, @remote={0xfe, 0x80, [], 0xbb}, 0x4}}}, 0x80, &(0x7f0000002d80)=[{&(0x7f0000002a00)="b2e13305445438da2649087a3728e87e4fa07d9a0a0203005644c359099a23a7b2da3569423229253524dae0d2a804c64b691f5c889d58616396e212e9eb12ad169d5983178e4491d209aeacfa2d9ae700c2718f203a45e4630513669faf394f98e60e48cf26afc1ec90c7ab21f439e9eb5578b5315a85e80e7e0636be6b9e06f6478a3c0852788cf33eafcd7bc61d585fb9a5853273bbd791f1989218379a868a10bad37e854b0fdc9f7843016e53e88b38c45cfee84b438be9bdc40125d3d601309e800cd24d4ae99a2ad60720bb9f88ba9d14b4481ef8e39b82e4546c89a4996c4dd41634", 0xe6}, {&(0x7f0000002b00)="92ff7627f462ba2274c37dea5a2a26b048c221356ebc36d113140413a42933efe8ae3481ef19520f393e943597b040f0aba7c1fb41abd25e6650846ac08d4e71ec0f9130b93446ce95f3326908b18923c4dc4944d60e185230dada8470e5b3", 0x5f}, {&(0x7f0000002b80)="62a9024c0c867c73e3e691a0daa300140d05cd0f708006eb22839d2f5ea9987a73fc9e20ed5eeba46452654d17776f3591882a5d5d8343520315f3a7d075bd80d6b31802f98d5983996925dbe9a575d7d1d6ee80d12ef0b09de6b9cf298a32fc7e5ab4f9a585bf21dc2e8be2243a04bc86f6e791e2a4d7db60f1b6bdd96c76ed5868d7ebb737c235adc7a852c3043b8c6e0d69847fa864cb89c27a37ec7b89a786a077b5bc521ae81b0b306959938570f4c1bc436c1d1c3a6508cb0ce8dd55297a8071ef345ac41fdcd0540185305534c1755e179e0489c113a4d0c4f3341a1fc10c6fab7274593d019323c88b3b33ee3cf91dd157597888", 0xf8}, {&(0x7f0000002c80)="69f3e7ed63a931c1317376d9f422ed2210d8c20842597bc8161f24f2395ea7e82ae6d8b5c94a1c873df6f7efcfa769bd8e9f335f00dc3dcc0639439511c6d9cd94", 0x41}, {&(0x7f0000002d00)="3cac9310715ad26223cead72609e910032d95363e89c0415a7a3f6dc1d81b3207a787e867ed11b1ab92fb2212d06f4140eee3710e4fa6332f41da62f25feb192e52695833218dccacc8f2c5416231042c17af4f48f264389be2e09c0e9cffbca50f8793b3c882fa1d7071d700ff5edf2c30d7a4019b8ae", 0x77}], 0x5, &(0x7f0000002e00)=[{0xc0, 0x13a, 0x5da2, "55fec107b4572c693fe63f8197c20a5bf5bd5cdd264ecf1aef5f987d7fd33d8c435f275818e3eb18b5a1a660dc34160ec58bd6aa58d4eacd336564ed808c79cd3b06219b9319983526cb6630edaa47ed082601c73a0bb2f0f18efdb82f72342b77f2dc80db26c860710b18c9e9c85556202bd37d1beea44c0f6e6e863b80122b04f842d546219b0189dc554869ebb454a987f6d183457d2b3cfd6634a98a911a86dc6ebd5b56218f85"}, {0x70, 0x29, 0x7, "659dac886234af05e7c21e9881f894731529011bb81dad8f765f0e1e934248bef385ff4250a70d9120d0e342c873e5c5b8a04028ca5029bc5a5e9287a50329de1f7825c08bd5f4125e340e64b9592ed1aeefb925f71cd0c9a6cf6e3109"}, {0x40, 0x104, 0xd0, "39ce854009bd66afa12b8a5b89fdc81cfc2737091506d95e45936c939f56185b1c2e4efe29d1bb3f03ec"}], 0x170, 0x1}, 0x8001) recvmsg(0xffffffffffffffff, &(0x7f0000017240)={&(0x7f0000016e80)=@hci={0x0, 0x0}, 0x80, &(0x7f00000171c0)=[{&(0x7f0000016f00)=""/182, 0xb6}, {&(0x7f0000016fc0)=""/239, 0xef}, {&(0x7f00000170c0)=""/172, 0xac}, {&(0x7f0000017180)=""/10, 0xa}], 0x4, &(0x7f0000017200)=""/50, 0x32, 0x80}, 0x10000) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000000ae07ef77c3147800000000000000711000000000000000000000000000009500000000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x0, 0xfb, &(0x7f0000017280)=""/251, 0x0, 0x0, [], r3}, 0x48) socketpair(0x5, 0x800, 0xd57, &(0x7f00000001c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x1) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000200)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r4, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_udp(0x15, 0xfffffffd, 0x7fffffffefff, &(0x7f0000000080)) 2018/04/05 21:37:18 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xafc, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:18 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6ffffff00000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:18 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000000000000000000028000006a0a00fffffff6006118"], &(0x7f0000000080)='syzkalleP\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000000ff14000000000000000005000000000000000000000000009500000000000000"], &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r0, 0x50, &(0x7f0000000400)}, 0x10) 2018/04/05 21:37:18 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000040)={0xffffffffffffffff}) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000180)={r1}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x8000, 0x6, 0xffffffff00000001, 0x8}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f00000000c0)) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000000)={r2, &(0x7f0000000380)}, 0x10) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000140)) 2018/04/05 21:37:18 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000400008fe7bb5cd4e344cd0002800000720a00ff"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xf, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x6800000000000000}, [@jmp={0x5, 0x0, 0xffffffcd}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) 2018/04/05 21:37:18 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:18 executing program 2: bpf$MAP_CREATE(0x8000000, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:18 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000000000000000000028000006a0a00fffffff6006118"], &(0x7f0000000080)='syzkalleP\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xd, 0x5, &(0x7f0000000040)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r0, 0x50, &(0x7f0000000400)}, 0x10) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000140)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xe, 0x0, 0xfffffffffffffffa, 0x7, 0xd, r1, 0x6}, 0x2c) 2018/04/05 21:37:18 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xdcd, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:18 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:18 executing program 6: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0xfa}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="18010000800000000000000000000000711000000000000000000000000000009500000000060000476f67c9d97a034d6a61e734fbf53e1cc2a1740f40e7227d7bc33b5d229358b44f9c0856229388088c3fdd94f89b62456136bd338444324b0dc8be42dfd741cc97ce948c87d7a6041385589bc3f0c26f0754950000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_udp(0x15, 0xfffffffd, 0x7fffffffefff, &(0x7f0000000300)) 2018/04/05 21:37:18 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:18 executing program 4: socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x4a}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0xffffffffffffff11, &(0x7f00001a7f05)=""/251}, 0x18) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) socketpair(0xb0df475c6dd5a96, 0x7, 0x6, &(0x7f0000003d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000003d40)={r0}) r4 = perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x0, 0x3ff, 0x6, 0x8, 0x0, 0x1ff, 0x220, 0x0, 0x2, 0xffffffff, 0xff, 0x9, 0x7, 0x620, 0x0, 0x0, 0x1, 0x10001, 0x80000001, 0x3, 0xf95, 0x9, 0x1, 0x9, 0x0, 0x7f, 0x3, 0x0, 0x0, 0x9, 0x1, 0x7f, 0x5, 0x8, 0x8, 0x2, 0x0, 0x4, 0x7, @perf_bp={&(0x7f0000000140), 0x4}, 0x8, 0x40, 0x7, 0x1, 0x8001, 0x1ff, 0x800}, 0x0, 0x1, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r2) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000000)={r2, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000001c0)) 2018/04/05 21:37:18 executing program 2: bpf$MAP_CREATE(0x1100, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:18 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0x820, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:18 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000400008fe7bb5cd4e344cd0002800000720a00ff"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xf, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x6c}, [@jmp={0x5, 0x0, 0xffffffcd}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) 2018/04/05 21:37:18 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000000000000000000028000006a0a00fffffff6006118"], &(0x7f0000000080)='syzkalleP\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xd, 0x5, &(0x7f0000000040)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r0, 0x50, &(0x7f0000000480)}, 0x10) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0x0, 0x1}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0xf, 0x2000000000000, 0x4818, 0x6a6b, 0x10, r1, 0x8dd}, 0x2c) 2018/04/05 21:37:18 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:18 executing program 2: bpf$MAP_CREATE(0x4000, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:18 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000400008fe7bb5cd4e344cd0002800000720a00ff"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xf, 0x5, &(0x7f0000000040)=@framed={{0x18, 0xffffff9c}, [@jmp={0x5, 0x0, 0xffffffcd}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) 2018/04/05 21:37:18 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x9, 0x80, 0x200, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0xfffffffffffffdcd) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r0, &(0x7f0000000000)="457194e4bc23c3b61d2c38ff5a73d637441aa9fe08bb79d0e9026fc1a25ac0b80a677428cd76b04344b20938fcb3ca", &(0x7f0000000040)=""/170}, 0x18) 2018/04/05 21:37:18 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:18 executing program 6: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0xfa}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0xffffffffffffff4c) socketpair$inet_udp(0x15, 0xfffffffd, 0x7fffffffefff, &(0x7f0000000080)) 2018/04/05 21:37:18 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000000000000000000028000006a0a00fffffff6006118"], &(0x7f0000000080)='syzkalleP\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xd, 0x5, &(0x7f0000000040)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) socketpair$inet(0x2, 0x2, 0x9, &(0x7f0000000000)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000140)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r1, 0x50, &(0x7f0000000400)}, 0x10) 2018/04/05 21:37:18 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xbb1, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:18 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0xfffffbfffffffffc) 2018/04/05 21:37:18 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:18 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000400008fe7bb5cd4e344cd0002800000720a00ff"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xf, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x2702000000000000}, [@jmp={0x5, 0x0, 0xffffffcd}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) 2018/04/05 21:37:18 executing program 2: bpf$MAP_CREATE(0x1800, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:18 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:18 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0x482, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:18 executing program 6: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0xfa}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000007110000000b2ce86588d3a37f3e63318bfae000000009500"], &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_udp(0x15, 0xfffffffd, 0x7fffffffefff, &(0x7f0000000000)) 2018/04/05 21:37:18 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000000000000000000028000006a0a00fffffff6006118"], &(0x7f0000000080)='syzkalleP\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0xd, 0x5, &(0x7f0000000040)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0xbb, &(0x7f0000000480)=""/187}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r0, 0x50, &(0x7f0000000400)}, 0x10) 2018/04/05 21:37:18 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x69}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0xca}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_udp(0x8, 0x3, 0x705000, &(0x7f0000000080)) mkdir(&(0x7f00000002c0)='./file0\x00', 0x105) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r1, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0xcd}, 0xfd52) recvmsg(r2, &(0x7f0000000280)={&(0x7f00000001c0)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000000)=""/30, 0x1e}], 0x1, &(0x7f0000000240)=""/43, 0x2b, 0x606239db}, 0x10000) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=ANY=[@ANYBLOB="1800000000000000000000000000000871100000b53a030000000000000000009500000000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x3, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000300)) 2018/04/05 21:37:19 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000400008fe7bb5cd4e344cd0002800000720a00ff"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xf, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x17bc1a00}, [@jmp={0x5, 0x0, 0xffffffcd}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) 2018/04/05 21:37:19 executing program 2: bpf$MAP_CREATE(0x10, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:19 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6ffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:19 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:19 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0x604, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:19 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0xfa}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x1b, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000000000000000000000000007110000000000100000000000000000095000000000000002934ad94735e9b85206ac5c0a29bc20e50ce01b4f8fc8f01f38c617af1240497c586f8bed42f547924fcc75109a1e7d3b80fc7ab600b79a1185b71f36d5c7f43fab94d3fb047fdb2f44b8685b0daafa9ef27d3196fa3652526b6a1521d8450464ae46ce794c03f556675db845f28f688c8dd57f8526be81f2e5ea870f32456f8edf60dcb5762349484e1f5505569aa10997cfb730630e8fd4393d1d9467d7865a4bd43f78cc73be39eefe27b5e729177c4d7aa13da87"], &(0x7f0000000300)='syzkaller\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251, 0x0, 0x1000000000}, 0x48) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0, &(0x7f0000000140)="b82283392dc50ff1fb635a584dd2f5916ae2fb72be9cc66f0000000000000000000000"}, 0x3c3) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={r1, 0x17e, &(0x7f0000000280)}, 0x10) socketpair(0xb, 0x800, 0x100, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x1) socketpair$inet_udp(0x15, 0xfffffffd, 0x7fffffffefff, &(0x7f0000000000)) socketpair(0xa, 0x800, 0x7, &(0x7f0000001700)={0xffffffffffffffff}) recvmsg$kcm(r3, &(0x7f0000002c40)={0x0, 0x0, &(0x7f0000001bc0)=[{&(0x7f0000001740)=""/101, 0x65}, {&(0x7f00000017c0)=""/205, 0xcd}, {&(0x7f00000018c0)=""/86, 0x56}, {&(0x7f0000001940)=""/171, 0xab}, {&(0x7f0000001a00)=""/162, 0xa2}, {&(0x7f0000001ac0)=""/241, 0xf1}], 0x6, &(0x7f0000001c40)=""/4096, 0x1000, 0x8}, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000000c0)) 2018/04/05 21:37:19 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000000000000000000028000006a0a00fffffff6006118"], &(0x7f0000000080)='syzkalleP\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000094f931016f1bc06000000000000000009500000000000000"], &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r0, 0x50, &(0x7f0000000400)}, 0x10) 2018/04/05 21:37:19 executing program 4: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004, 0x400000000001e}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0\x00', r0}, 0x10) socketpair$inet_udp(0x400000, 0x730000, 0xf, &(0x7f0000000480)) 2018/04/05 21:37:19 executing program 2: bpf$MAP_CREATE(0xa00000000000000, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:19 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:19 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6ffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:19 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0x51e, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:19 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000400008fe7bb5cd4e344cd0002800000720a00ff"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xf, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x500}, [@jmp={0x5, 0x0, 0xffffffcd}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) 2018/04/05 21:37:19 executing program 6: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) socketpair(0x13, 0x1, 0x1, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x2, 0x0, 0x2, 0x9, 0x13e, r0, 0xfffffffffffffffe}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x0, &(0x7f0000000200)=ANY=[], &(0x7f0000000300)='syzkaller\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r2, 0x50, &(0x7f00000000c0)}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x5) recvmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000200)=@ipx, 0x80, &(0x7f0000000440)=[{&(0x7f0000000000)=""/17, 0x11}, {&(0x7f0000000340)=""/204, 0xcc}, {&(0x7f0000000540)=""/253, 0xfd}, {&(0x7f0000000280)=""/54, 0x36}], 0x4, &(0x7f0000000640)=""/4096, 0x1000, 0x5}, 0x12001) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000500)) socketpair$inet_udp(0x5, 0xfffffff8, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x800) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000002c0)=0x8, 0x4) 2018/04/05 21:37:19 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000000000000000000028000006a0a00fffffff6006118"], &(0x7f0000000080)='syzkalleP\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) socketpair$inet6_icmp(0xa, 0x2, 0x3a, &(0x7f0000000000)) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000002c0)={0x0, r0, 0x0, 0x3}, 0x14) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xd, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="189450352a32301a5c00000000000000050000000000000000000000000000040000000000000000885bb063ff070000711df93980c2082317f054f1d6b4b72aaabebd399ac67df3945700813534abdb20cbd1d5965f72c8f0c5"], &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r1, 0x50, &(0x7f0000000400)}, 0x10) 2018/04/05 21:37:19 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0x65c, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:19 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000400008fe7bb5cd4e344cd0002800000720a00ff"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xf, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x500000000000000}, [@jmp={0x5, 0x0, 0xffffffcd}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) 2018/04/05 21:37:19 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:19 executing program 4: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0xe3}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x5, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0xfb, &(0x7f0000000180)=""/251, 0x41f00}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r1, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_udp(0x7fffffffe000, 0x730000, 0x730000, &(0x7f0000000300)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000340)="dbfe3801e41e766540cc2b5c633f155446cfbdcaef909e591349a403c6d18f17e3d61656660e864beb24f1e753ae26dd0901c5c16d9f9c47e1405878903cec9ab453050f3074d27b949c90f115622a4441eb1375c573792a9b1b1468fb7b2b0a2a68cf1b028b8b059afdec692e2abd0993f6e3a7f133831ab22ca051971e3cfa17d3924caacb041bfb61a4d88481d2b4ef7314735a19c642fae7a2c1513194470e2bec53a36a7c942cab2e80d93d0647a1c2af0cb33a68e1c2c4a596c8727c6c409af62a5277593bf5bcb32c513688", &(0x7f0000000280)="7402928cb90923bb0571bbda74c92b3b33b1e018053273a357533136b3f8f56ca584144454f4ad1e800fdc0540d055f4ca7ba69832ac243e2a3564356ed99981956af4363938e2377d93bd50c6c4597cc26833c070a7bac8daccb815b83ffc5475b14e4ddbe0d12027c7e71dc81acd7793892603c641", 0x1}, 0x20) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000080)) 2018/04/05 21:37:19 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:19 executing program 2: bpf$MAP_CREATE(0x300000000000000, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:19 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="1800000000000098851ec0eeb322e009d14f632000000000e78000006a0a16fffffff6006118"], &(0x7f0000000080)='syzkalleP\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xd, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18552abb830d2acc11d9060000000000000000000000000000000500000000006ce670750000000000009500000000000000"], &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r0, 0x50, &(0x7f0000000400)}, 0x10) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000740)={&(0x7f0000000780)='./file0\x00', 0x0, 0x90}, 0x323) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000600)={r1, &(0x7f0000000500)="c8012b71454d2236bf083b5e7f5757378cc8d2565e5dfec75b8ea793e3f25b615ce4916630fcfd103496a8238acf57f72b4678e1888d56985893fd5b3c2c1a26ddc77af25402a8bcd6b0f3a2ef9484b9a1", &(0x7f0000000580)=""/75}, 0x18) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f00000003c0)=r0, 0x4) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)={&(0x7f0000000640)='./file0\x00', 0x0, 0x8}, 0x10) 2018/04/05 21:37:19 executing program 6: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x400000000000004, 0x203}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="180000000000000000000000000000007110000000035135990800000000000000000000950000000000000023d9c3a701936a1ef6cfe77576ced984e0a551bf460e78073189efb7b6e2000282e7cfc7b609d8687c0081b9d74111280f08be9fa54ef6f4ba18e76bce9effca55711e7cd657f4b184be931adc68b1ddba95b895a2fc1cfa25105583bcdfbca522424d3310e9e367fd2614778d98eaeba49bea8ed064b57b0104156deecee6c9285a2528e83dace7cb87a98019a965"], &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_udp(0x2, 0x400000, 0xfffffffffffffdef, &(0x7f0000000180)) 2018/04/05 21:37:19 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xbdb, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:19 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:19 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000400008fe7bb5cd4e344cd0002800000720a00ff"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xf, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x85ffffff}, [@jmp={0x5, 0x0, 0xffffffcd}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) 2018/04/05 21:37:19 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x48}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0xffffffffffffff11, &(0x7f00001a7f05)=""/251}, 0x18) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) r1 = perf_event_open(&(0x7f0000000180)={0x7, 0x70, 0x1ff, 0x0, 0x9, 0x7, 0x0, 0x6, 0x40000, 0xb, 0x5c, 0x8b, 0x9, 0x1, 0x10000, 0x800, 0x8001, 0x2, 0x8, 0x3b8, 0x0, 0xffff, 0x4, 0x1, 0xff, 0x3, 0xfff, 0x9, 0xc7d, 0x100000000, 0xfffffffffffffffc, 0x1ff, 0x100000000, 0x7f, 0x777d, 0x5, 0x1, 0x6, 0x0, 0x2b, 0x4, @perf_config_ext={0x1, 0x80}, 0x2, 0x2, 0x1ff, 0x4, 0x7, 0x1ff, 0x3}, 0xffffffffffffffff, 0x7, 0xffffffffffffff9c, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r1, 0x2401, 0xffffffffffffff80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_udp(0x3, 0x409, 0xffffffff00000000, &(0x7f00000002c0)) 2018/04/05 21:37:19 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000000000000000000028000006a0a00fffffff6006118"], &(0x7f0000000080)='syzkalleP\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xd, 0x5, &(0x7f0000000040)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0xfffffe0b, &(0x7f0000000300)=""/187}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r0, 0x50, &(0x7f0000000400)}, 0x10) 2018/04/05 21:37:19 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:19 executing program 6: r0 = socket$kcm(0x29, 0x5, 0x0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', 0x0, 0x8}, 0x10) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000240)={r1, r2}) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x9, 0x3, &(0x7f0000000180)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x45}, [], {0x95}}, &(0x7f0000003380)='@pH \x00', 0xfffffff, 0x99, &(0x7f00000000c0)=""/153}, 0x48) 2018/04/05 21:37:19 executing program 2: bpf$MAP_CREATE(0x3000000, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:19 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000400008fe7bb5cd4e344cd0002800000720a00ff"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xf, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x1000000}, [@jmp={0x5, 0x0, 0xffffffcd}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) 2018/04/05 21:37:19 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8cffffff00000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:19 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000000000000000000028000006a0a00fffffff6006118"], &(0x7f0000000080)='syzkalleP\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) socketpair(0x3, 0x80000, 0x8001, &(0x7f0000000000)={0xffffffffffffffff}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xd, 0x11, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9c4f, 0x0, 0x0, 0x0, 0x8}, [@exit={0x95}, @generic={0xc4ad, 0x6, 0x1ff}, @ldst={0x1, 0x1, 0x0, 0xb, 0x7, 0x8, 0x8}, @ldst={0x68291f067d9a21e4, 0x0, 0x0, 0x9, 0x5, 0xfffffffc, 0xffffffffffffffff}, @call={0x85, 0x0, 0x0, 0x7}, @call={0x85, 0x0, 0x0, 0x19}, @map={0x18, 0x2, 0x1, 0x0, r0}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0xbb, &(0x7f0000000300)=""/187, 0x41f00}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r1, 0x50, &(0x7f0000000400)}, 0x10) 2018/04/05 21:37:19 executing program 6: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0xfffffffffffffffd, 0x4, 0x2}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000240)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_udp(0x7, 0x705000, 0x4, &(0x7f0000000180)) 2018/04/05 21:37:19 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0x3e8, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:19 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:19 executing program 4: recvmsg(0xffffffffffffffff, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)=[{&(0x7f00000014c0)=""/157, 0x9d}, {&(0x7f0000001580)=""/123, 0x7b}, {&(0x7f0000001600)=""/187, 0xbb}, {&(0x7f00000016c0)=""/86, 0x56}], 0x4}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x28a, &(0x7f0000000000)}, 0x0) sendmsg$kcm(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="ad", 0x1}], 0x1, &(0x7f0000001200)}, 0x0) recvmsg(r0, &(0x7f0000001440)={&(0x7f0000000040)=@sco, 0x80, &(0x7f00000013c0)=[{&(0x7f0000000000)=""/66, 0xfffffffffffffe48}, {&(0x7f0000000080)=""/52, 0xfffffffffffffcce}, {&(0x7f00000000c0)=""/120, 0x78}, {&(0x7f0000000200)=""/4096, 0xfe12}, {&(0x7f00000017c0)=""/120, 0x78}, {&(0x7f0000001280)=""/177, 0x1000001cf}, {&(0x7f0000000180)=""/17, 0x11}, {&(0x7f0000001340)=""/2, 0x2}, {&(0x7f0000001480)=""/16, 0x10}], 0x4b}, 0x2042) 2018/04/05 21:37:20 executing program 2: bpf$MAP_CREATE(0x5000000, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:20 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:20 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000400008fe7bb5cd4e344cd0002800000720a00ff"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xf, 0x5, &(0x7f0000000040)=@framed={{0x18, 0xffffff85}, [@jmp={0x5, 0x0, 0xffffffcd}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) 2018/04/05 21:37:20 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xb67, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:20 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18020000000000006300b43070e9a933850000003600000005000000000000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x1, 0xce, &(0x7f0000000180)=""/206}, 0x48) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000140)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x12, &(0x7f0000000400)="222fea09601182605aecc6378847", &(0x7f00000003c0)=""/18}, 0x28) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f00000000c0)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000071c0)={&(0x7f0000006f80)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x1ef, &(0x7f0000000080)=[{&(0x7f0000000300)=""/185, 0xb9}], 0x1, &(0x7f0000007100)=""/184, 0xb8, 0xffff}, 0x23) sendmsg(r1, &(0x7f0000009600)={&(0x7f0000007200)=@can={0x1d, r2}, 0x80, &(0x7f0000007480)=[{&(0x7f0000000440)="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", 0x12e}, {&(0x7f0000007300)="01c3052542fe390559d0753401220fb7384d38ff42ef11ffa16de9a1e41809b7522a040b86f2f817cbb670bab30ccf441db8f4c7c1e50e8c3b116dd226abc6482ca3c295d8f33e5025c0dd5bf608e831b6654eccecca4a31b3d62d66827d08d6a5cd3730a80e2c8982f03095fabe133504194cb708adecd7dbb4d9df36c584facd78a076", 0x84}, {&(0x7f00000073c0)="cb402a2b4527be8488a611821cc8aa5170950f6c6c64ac55cd2014187e54ffc3efe8bd6de2b43d9a2291b5f329f29ac8578859ec784c678bdbd1d914729d7363a43dd64ba7b936c0159fbca40adbe074cae7b1fd2750e51ab792b73b50b9b5cee6dd33917bd84f48c911a7ac7309cf7856c06b93eaac54d67716c89602b9ad877951a4bcb4e9510bfce9edbad66c85153efc5230bd9d65a6a79c1ea390a9b1f065d5f3237472ca03962cbb2d1276831f7d0be1e6", 0xb4}], 0x3, &(0x7f00000074c0)=[{0x1010, 0x101, 0x7, "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"}, {0x1010, 0x117, 0x7, "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"}, {0xa0, 0x112, 0xffff, "f8cf498e53579925d864795e3aabaa85a2dad4b5fa5e396584cb10e219130000d2b62e6fff0517307b930c23d5030d90ffdc12af960585a77255de421f658b5e0418e815fc0f844a72d1bc7372841d9e30428333ee38b4705e5b962dc39ce264aeec484af1ae310eb625a72026f31d76b14df1c7e383d59d0687b260587c78b0d0d9406617bdefa1c310"}, {0x68, 0x109, 0x2, "0df522055bf85fdfb75912f8ba7c9a38ffa2f15a32ad09ed256a68a95b16f29065442df0e6e701fd945681b99bd211635b68c44b98cc14957af4d59dcc6f5e9640276f7eb159a762d55916d1b2d1cd26647ce94c"}], 0x2128, 0x40000}, 0x4000) 2018/04/05 21:37:20 executing program 4: socketpair(0x2, 0x0, 0x2, &(0x7f00000001c0)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000200)={&(0x7f0000000180)='./file0\x00', r0}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000040)=[{0x18, 0x1, 0x1, "13"}], 0x18}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r3, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)=[{0x18, 0x1, 0x1, "13"}], 0x18}, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000240)='./file1\x00', 0x0, 0x18}, 0x10) recvmsg(r1, &(0x7f0000001700)={&(0x7f00000000c0)=@hci, 0xffffffffffffff55, &(0x7f0000001600), 0x1000000000000004, &(0x7f0000000140)=""/45, 0x2d}, 0x100) 2018/04/05 21:37:20 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8cffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:20 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8cffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:20 executing program 5: recvmsg(0xffffffffffffff9c, &(0x7f0000005000)={&(0x7f0000003bc0)=@can={0x0, 0x0}, 0x80, &(0x7f0000004f80)=[{&(0x7f0000003c40)=""/145, 0x91}, {&(0x7f0000003d00)=""/138, 0x8a}, {&(0x7f0000003dc0)=""/43, 0x2b}, {&(0x7f0000003e00)=""/213, 0xd5}, {&(0x7f0000003f00)=""/32, 0x20}, {&(0x7f0000003f40)=""/41, 0x29}, {&(0x7f0000003f80)=""/4096, 0x1000}], 0x7, 0x0, 0x0, 0xea59}, 0x10020) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000000000000000000028000006a0a00fffffff6006118"], &(0x7f0000000080)='syzkalleP\x00', 0x0, 0xce, &(0x7f0000000180)=""/206, 0x0, 0x0, [], r0}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000000000000000000050000000000000000000000000000009400000000000000"], &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r1, 0x50, &(0x7f0000000400)}, 0x10) 2018/04/05 21:37:20 executing program 2: bpf$MAP_CREATE(0x400000000000000, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:20 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000400008fe7bb5cd4e344cd0002800000720a00ff"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xf, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x7}, [@jmp={0x5, 0x0, 0xffffffcd}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) 2018/04/05 21:37:20 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000000000000000000028000006a0a00fffffff6006118"], &(0x7f0000000080)='syzkalleP\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000000)='./file0\x00', 0x0, 0x10}, 0x10) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xd, 0x5, &(0x7f0000000040)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r0, 0x50, &(0x7f0000000400)}, 0x10) 2018/04/05 21:37:20 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:20 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x7}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000100)={r0, &(0x7f00000000c0)="cc52489df8c1b3"}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xd, 0x5, &(0x7f0000000080)=ANY=[@ANYBLOB="180000000079101c0000000000000000000000000095000000000000002f2609856dc440620d1485655d22ac23"], &(0x7f0000f6bffb)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x17) 2018/04/05 21:37:20 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:20 executing program 2: bpf$MAP_CREATE(0x600000000000000, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:20 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0x7c9, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:20 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x0, &(0x7f0000003000)=ANY=[], &(0x7f0000000300)="4d23af5ad6035373797af6e4a473a6ae08f99210b76891bfb242acd1e10d3bbb435ece7a708894bb9843f826895884cd52edd80ea0fec572d474361e0c99d850d8e35b89a1e58e8b490986cabf6263f9df7c256b1e99a72c9662abb359781d0a2f1952f9834b2a5a38c7cbce4423fc234e835815ea7f14c85e30e8068ede2bfa778b3a0a32fc15dd19b0722fe86fbbbc0d7839417df391653ce69782f1d4392af47f80b6ba46427d9ed3cfbabd1d8ff34f906eecf4799ffb70969307b10c6a935e99b9", 0x2000007e0, 0xe7, &(0x7f0000000400)=""/231, 0x41103}, 0x48) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000180)='./file0\x00', 0x0, 0x8}, 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00', r0}, 0x10) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00', 0x0, 0x10}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000200)={r1, 0x0, 0x0, 0x14, &(0x7f0000000180), &(0x7f00000001c0)=""/20, 0x0, 0x7}, 0x28) 2018/04/05 21:37:20 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000400008fe7bb5cd4e344cd0002800000720a00ff"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xf, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x4000000000000000}, [@jmp={0x5, 0x0, 0xffffffcd}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) 2018/04/05 21:37:20 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff8c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:20 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000000000000000000028000006a0a00fffffff6006118"], &(0x7f0000000080)='syzkalleP\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xd, 0x5, &(0x7f0000000040)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r0, 0x50, &(0x7f0000000400)}, 0x10) socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f0000000000)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000140)=r0, 0x4) 2018/04/05 21:37:20 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:20 executing program 6: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x200, 0x0, 0x0, 0x100000000bc, 0x1}, 0x2a) bpf$PROG_LOAD(0x5, &(0x7f0000a12fb8)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfff1, &(0x7f00001a7f05)=""/251}, 0x48) 2018/04/05 21:37:20 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={0x1, 0x28, &(0x7f0000000080)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={r0, 0x200}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x4, 0x112, 0xffffffffffffffff, 0xffffffffffffffff}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r1, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000001c0)) 2018/04/05 21:37:20 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:20 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000000000000000000028000006a0a00fffffff6006118"], &(0x7f0000000080)='syzkalleP\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xd, 0x5, &(0x7f0000000040)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r0, 0x50, &(0x7f0000000400)}, 0x10) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000140)={&(0x7f0000000000)='./file0\x00', 0x0, 0x10}, 0x10) 2018/04/05 21:37:20 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xf2c, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:20 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:20 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000400008fe7bb5cd4e344cd0002800000720a00ff"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xf, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x9cffffff00000000}, [@jmp={0x5, 0x0, 0xffffffcd}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) 2018/04/05 21:37:20 executing program 2: bpf$MAP_CREATE(0xf00000000000000, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:20 executing program 6: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x7, 0x1}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={0xffffffffffffffff}) sendmsg$kcm(r1, &(0x7f0000001900)={&(0x7f0000000180)=@generic={0x11, "4576cc51bd2add9f51c37db5371ca5e35f041cf08b7b5f5ee3924ee7eda764300e0ce1a16ca7acf14171a34824506342fa31e86bc1fcd16ffae4ee6f160eacac67843feec0a0feb9789cc3808e7f4d662e71ac9245dbe4d0ba210d196be56a3c1b74e64bbe4d333b20fc3b1fbacffeac8dce625f089e23363980179f2a46"}, 0x80, &(0x7f0000001500)=[{&(0x7f00000002c0)="7c957b6e2652b2b32eec1abd8a2e4dde499761664cf9608d576f7d1100d9da539329bc4c5abc3c84fa01e3d95f6b655c1eeb42bc18fe5d0dc918b1342cb6f34510873fe5caf3e8d7ec8764e4d8c78f02341bcba70fe4c637c6786c7f859d39f56949620f92d17ab884587abc0522323ae73126263c9881070d1f08cc0b36053148b00ba579bd79bf4eb84c7172eaa42b7218f2d375f6f6b997ef0fc4638daaec1778bec6eea85ea3d40d9257dbb058f0df59790a8ac74f7c", 0xb8}, {&(0x7f0000000200)="f19f1e11a8b65952496b38e00b3800a239f4dd3a3a64bc31e581ed2106c4bb50c187419ccd4f30c373824663dff1de72d219ec072ed4cb325ce8f969fdbd412d6e0d4c7d3fcd150d8893711155c45019ad9b06d5a580907f47d7648e25219ce3ff0895714aec7b6c6cea3ea73bb7", 0x6e}, {&(0x7f0000000380)="5b2dd08214c1fc601cbdd970ca52394c27866efaa96277f9997e0b5081e05672a47709d3cf2d58b962f8cb698c5afed474c6c2587be53c2be913aef5d9605cc1a893880b0afe35cc567694f82e9d65a86619b96b25cab3412bcbf54465d350aa17ca7f1c3be094fc57df1bbf956ba85dba0e47bbceaf19f310b07a0625883117c64c5931d883abcb4b9902d5a26ecbde9cd7c79b6f7b1fb0ac29a3257aff2a1e6d4c8618ae00da4d782f142219244326", 0xb0}, {&(0x7f0000000000)="d7a97fb1310def105e8c73ca417087", 0xf}, {&(0x7f0000000440)="25fcd16c214feee1a4477240c560797d1c163ab66d9e0395ebaa6f618a52bf718e7870b581cf8564e10b3ab3c0", 0x2d}, {&(0x7f0000000480)="48b33c29c07e40e7d61e06c1e41c717e55fba0bb990db247cf0e625cc4671c41980d9e89a7481e69f01491c78d5907f7851a8878c5d70238a2418a01f8f69cebd9b08c4cc2d328884b7e1cba461891fff51036c47c9e91350d0e8331cfd9d2a86d625e9e28f218b132d17c289e4981c6841ec744b5f5fd43c953512eeb01df448072624b67d3e122d3049782f20d4293d5d6bd02cae59a1f94413eec019e964cea932742cd0edade6a7d8e27c7459aa1f9fad656ad46d7e9c2252c871e33ea78838c49f7b1e5f2f2ed8de168dd8f9737fa7bd4f2c923e0640654460bb95134eb6bd712144a2ae73d9740481c7fd21c3c2ad60df6942f7828cae46770dd522970d01a45d1c3feed076570190cdcedb40df68217f95ba6ff2d09dce2c112a6a4b31b224bd17f0c8ff8abaf0040cf96800848c6e16abb043118d3edd2d2f5fb665374c4e89e854d6a7449f706da1aa692a3c07e311ccc09ab8c17709fb99e4521277040fcb231e989cfdd48c5d0e22b07a32b82245bfe45aff222fd23b675c5cfefc12e813f3e4e7409944a34a8a19079e818509fbb05caccad8b5f5e955666d305ec51bcfa2eb4f949156ea19aada9321f57f5925d0e23846fd7991af4cf2e5f530d1fc48997d911cd2e27f87c3136fe6a95be6ddef308c50eb183f98ac5979ddff3c82aeee6d9d45b6a2bdc7822809e8e1d435bbddf96c4ea1339af13fa1caae4d799522ca741581c4e45e4928e4b9eb0887e1a201e3b2d012a7e945d32a1fc8bb6763448074ab65dba7ca624329984d1d817f4b7f2cefb719df32140052f10fe255f0197d75907c6037e5c335c47bad8e2ed359d2054d2ce565531b99b4a62da56fda8f29b0cf182aa1e3284d60fc4762311fb95bfe33058de3fa58a38fe6c9fb0c90bcba31dae9f06b3c5b0107dbd550a49a646164187164b1e4b2c9f3e7c5299a49d628f2e53172ca81aa4aee766c91523153998bfe9065798a071748052a081b693ba4f27d5b74053c1b83d50f4e472d5637a7f951cdb218056e47e117b7eddf80ad5b1d52b99124805eb97082b73b6b0cbf5d381f9689ca918dd17b9cc8821448628cbba742f67a261775995bea3dfaef0ff737e2b1b417acc03c579c3223cd276cb06112d1a8f0ce671edcad9f7078b69fd6ce8afbcb2018860756785efa9ea2b3fe2da0c92b2e60fa113226b3ad5325596c64f82d2ab6bee3a8686b88bf228bef89c0d5c383e70610ea64f57595c6ef703989b3afb5f8de0442b7ac3df996ee27ba24fdcdc07de7f7421b807b5669133c6cfd435818dd985baac77d0311af2e82c9480b5d00d51f966d231e13cd1cbc1696c3bba6a88cc61b8eacf0ed60912d54722218fc64f1d69839c7b237d22a51292fffe19f7b5640a377e0d40b612f414a1c9f39fb0255528f774f7f993cf7db40f9f7d83b6f871dd5b526b0d18c572aaf9a9ccca0ed73d43c58749d8247db3a2944c50294bc8829731a5b9e9cbc2a43887d8844c594239f7fe3ac3e459e0aab069d4cb1fdf9d8896ac098ba9ccbf32794fd740431ae88e79aae113f5a23304a80bd5a7c420cc61fa0abdbd0743d4275ffcd81f6bd01790fd7c852536410a0c49dd34c90f86b7d3cd94afa3db0dcf91b7fe4e4ef9f57806b112deaf4b9bf78d26d44a9dc179cf291f85a432b72c1468280b20d79b3900ea0ce201674fb31e4f900881674f0c253f0a94b0340b383a79bd5c765ebe6589ba5037c8ae4531e705a7952b53796e06f4a8a182091bd3472d71b6afae9e1faa7a151bb43c624bffb93a2be25009eacf7182c735f04a93386ce0433df295af5e12168c43b834233bdbac42b993d322a778aeb746d9e95adb106df1bb21076a9f8a3bd4819a9d5ca0261eb71df55f6dd9991d760fb542c152ea7f613fff643227a3732eb535ff5f7d8a284cd1d1a9dfc3006c9064ad9b16e7b92d73c549d72cc22dd8539f7b61e6f2c426d27b033bad4be493c3f64947731380d74fee61e49e939e45bb5e899ae398398e23e6fd0babf600672679639ff48623cc09ae57307360deca32a80f6d8c5f6affef5aa3aa46a5ee249368baf241dcdd482c16de9f8e7c874db1e4078d68a6317d55f8b1591df369fe7bb18b8ddea0ca804ae4082f814c8669c95a89bf81657af4418be5302bf93034c193856d7d3ee8e6cfab9821173bc8d855f8172d1c5ef9d64d7ef85d1d7bc0cb005b528f3e351022ce64485a234011fb4b3369560c00eda36df0d518bccfaac2b9e2c250b050b5c8e8abbda685c20291926e0948113e06fa1fdfc2b65da305fec69ac34dc4d22783d1199bdf801c06c6f3da3cd219c9894e79c3ee95a0ae595e7e0c8947248a2a4cff56c75d7de643e3cd86daa2281dc4eaac1b0d418227294a4f4607555916128966642917f33a70aa483a6e06d3f92e2ea2b07377fcd55ae887efaf5341b3be67d70fc673c2d6a36ba9b89efbfd4e25ba7cf6256556614a1bfd54c0155df95e30cba3f2a6d124a47bdd2bfd27846cc69ecae8a681ffaa6b0b0dfb12b6d4ea8d851519261f301606123629e2398ccdcef06736fba54657465c8889044f67951b564cab3d5ee6d8cbf793aea1837743dda64e22deb66018e8b37d554e3d9d3972a3531b8ef5c337e4c577f5450e50698be0ab38b5a775f744cac783b89c807e1e4a381275711570b992427ecee6889f7e6a3c65ecbd87f8cbbe0cccc497ad29377a0a9bcb59352be92ee018a9e5e84aa8e16af4b635371704b9f283c89bf5139d262aab804068269b5800844567d3e43e5e5a370d08daf4a6000ff5d585ed8c26a1f3eb88a03929aead880351954505da90e3da4a73bfa76a6661f200120f7d2675a8dedbc4f8f4a7057986efa3ae97888216c8ae9d9dd28bcbf540caf2ada739cf4d221819e1dd759eb31d689e153ee97de0b8c36dc41e3a997bf01b24156915fb0645d68922cda5f74190176cf69913714efe055a5150d747a91e3c802441c3278a56515f03e681b10d0614cfa2182eb32e394bb9eef36ba658fc63c24d38505a8c4459cce33dcf99c3deb1d4fb7a546bc8317093ecd53bb9ee940e0c1b99c14cce85bf0ffd98f317f17623d0979bcda46adfb48828dfeda310a3695a369d13908c279a3bf739a89727fccbdadafb0dbc06ec61dde36e2461f2c3d20939fa671077f5178e25e0ba99db4cc8ee4e76dba065e281284f93882cba114a751f6f51d9e7ab38c85a028a38ec3c95282fd368d290b61f5eeb213ff64c80dc49bac020eee640e0a2d70d7dd30563469debdbd6db80c09914ef3bc6fc8e6370a952d4a6c08da72b8644688ae4521aeb18733b2492f12caa2ceb6de8a24c01a5756654c9de1440a4d77ef6cbb473a646c1ecebdf8e0f30d8500a6ff28eac1fbde8ba309e43cc55587bcff406a1cf3b36f08f1b29b79187e9a024299a5823c72e196a17d0a1170590566bb8cccf688f188550f83f106eac3c2027e54b716c3fb3c10a093f20c0f8d477bf0ca5659956b2b9c3c27dbec942ce0f333c036f1ae0994c58f94546cf7b5e764e9d0066dfc1a95ba9b765a47564b39e86f19ec7669fe3751886f1e53b313bb65339c2684563f733c0c851bbcd9de06fdf5fbc7dbbb5d88b3bcdfa927e10f68884867a3f7b91e8af2df81f7b25f348ba967d0e8cc9dbe8332a127dc9c70861d33e9ee94f00dff8b6af2c64899bd71beb2daeceebd7522cfb9699b0cc71cdf0a221927362293ca5540deed7e0a7c3de42a909c1c1f53e98f36925bb2db0274aba2e7f0da6ab15bed327a3ad7efb90c21d9a0a8d8191eb604b5aa51730fd67110b6ec921dbe93b3424b27d881fa01d60e1a7420076eea40f3cc61320ca66c00c3f06a9975978800f55da39bd6e590bb2c26b2ab3fe61fd18fff2131c0902230eb24d02d6c74ecbb594c6ad650e783f0e4b4c8a57eefbedcec4f56b0433293574b1377a08903d89707a10e52b5bc5efb9649641ddd20caebe2ed0d359dee368d8d7a888f6e379878fb286498a007fe0eedaf7a9e76c034d9b21aa950996703d816e9b5117e9d891ca37aa06b2e3ac4831b166c6cba3614b54182601054b34d3a076edb7e7bb286d7a5ccfff6c4183912bdbc46188bfe206855f142ddcbd208765b64f26ddc7243cdb84cf3f013bee493c3af5f57c9b091cbe10a7cd633a262716068524efdf9b7d03d3877e38095ca794fc78566c6edd8eb19a797c5c9c6045f4dfd873f7731c3465fc27a6a230fb3e1117aff93743793569c985787c8ac3b18782b772cc823a98eda81b1ccbad91ebc333dce75bfa8e7ce41fab964f7d14089679041859bf7e13731ebd357b73e066559b9683eb74cff04b7b845006eb54996779713ca67628be6882f04e922320b1780b14acf711c312d4e8accc90597cdd563c78f810c72daca844d90f397ffa24dc085f3a197d89bb06e2be9beced14e8ff85ea282f1107587e15e077bdd3e815437fd5a934a27000f8b529c991ea517a1ab0613fa00351cab5b25833a802b06942fc345db2a6a20d6f06964c09c8444f1c7ad8df447c7b01d26e3c0c57ff12421243b55310c632c7799a6d374ba9d64c4ab58eebb896aa82e3be88505c03603e879de99934ecb2b527ce22e2d3525746f84096bc9fe3583708906c33f7781a86cf218d44f35e6d9ae3484e324cc815a2f731fcfdc34435c2a1979d33b6ef9a75ea3dbc048e47648e4f3a31ddffe134eca55b452edc64f4df4625b442be60f7075cd3a4243b087441bd5b950c5894462f64c50eea7345dd79a79a9612db08998a28a2c7cfe60bb5fc719eafde4363b46ed5138267ca5707fa3617c8e9f7b1ddce4c96c7c7fb3cc0c5874ee83a56a03cc1edeb08cc8dae2a00b37fffb3ca10ca4054115949aba451ecec604761ca193f32d7dd4e4b478b386c451a0c482fb51176008340a482a5c7cf19f86f42578cd2b2b800fb9c0f3833ac244899d978ce3b02280f1617ab9b9c30e2f7ec650e7c8bc6f4d7c3c66159288e39f60e231ec19c9481ee351358a8ff1747b05ed06d1da0308c54467c248fdc716e6ac6863ba970a99f7088696ca0d3e75d1a13fad016348e54c2b0b378ab7cc98a76e0d40dfb1f450355557d7155995da8cb9d31cc82127f8a134570a775a062e9d87761bae980096240ad69e402c2c2985331e58ff0112f042cbb208f651e281a2ed32b5223c9090a6c966edb9a485275bb68cfd54c4b4547bed26e3e24fa2847779c7a5d7752b4cd0198ffde51c1fee95f4c8f0d46ee217dcc096910d950fa31c56f81e0c53e1c3a361867c9d0463f4f03b5f836439e10fbebab70b58afe46e5fa702c1540a115328eaa303f7f392b624d122bc3ca4855b28a4eb71afc6651e33a2b9467bee5cdc22834766d04669894d04317ec6211b90e5acd7a90d3aad18584bcb6cf805fb27442a856425757550bdba2123012f5bb5f2d5c41ff1722b6a5e56b6ffd3154bc2b3d5ce4a02a60a398ad59b426654218859a12f460ca8da2ee15ff94a9e608e1a1175839cf141084aa370bc32ad08c783b5f3d70ae1ac563593687e7d52965fb6cc1314a68f3f36d624c0cd30c86106f65509a73d3d0798e7729fd262fcc53a718ebe30e76b365b884dd84f50fa3a7b679dcec0c45bbca69997f722797a6d116c4449cf075c5d5c198e0a4b2e49534132fbd9ee2bfd0cb7d5718edadaa1412eba7c3b2a7ac754f8694cd34c6cd51028e013a5a38de6a80ecab6101dc3b8d0a9d660bd3fa5b6be853b12b9cf5aea7f1bcab11747c01a571acb2a11972cdfdd9123c4ffe502058a3c4caf5c6", 0x1000}, {&(0x7f0000001480)="a23218b36fdfb78f76037b9da5b41ae06b141eca764407dd9b4704ad914a79eb89f74993ef04bd3ec8b89a9aa7d17776c3f9c306bbad6a9d60e2d5524ce56db24917", 0x42}], 0x7, &(0x7f0000001580)=[{0x40, 0x11f, 0x3ff, "e8c3c9aa108101227e6d3058fd0ab8babe1d74aaf6e4bd7ee443201ace2ccc13c4bacd0cc96c2e215a145a"}, {0x28, 0x10e, 0x6, "154f91fb3e3fde90ad0af62645d00f087d63bcca640117"}, {0x90, 0x13f, 0x1, "7d07224039bfe8c2f9f55959a97a31f1cba79e97fd3148913e1f06cf909a3a3889a068694cf7f00f2229ae876a7075e4d3ac651a1921ac7cbaecc32bf3c3793d4d48e5c0b0689a50b66c0ed4fde8bfb3db1f9e88be3a21dc54e4b865a65e9f1e37c8a265c9afd078e529c0c6a8182e5f0344ed2a3fd926b238d1"}, {0x78, 0x11, 0x1, "4d6bdebebdda877c081dd4353e3e473168590e02b5ed12fc8bd7de3ed7d41f00925a9183ee586255d9594505c8c13337a708eadc2e8952c6e4f71a0215d55788562b3ef74780114452aed6af2dd7560e1d3759a904b0b122edf613962b9e939cbf"}, {0x100, 0x13d, 0x1, "d46bd79a44b13a2a7da4429674cacd1f4801503cfd3e187ce51d048f1b39ff4bf695996936e6178f4d9c71458d88a8a4315f227482265835e5d580ab7ca780f4540901e8be1e88b5f34073cc0660eaaaa96efefabdd39112ee00f3e992a6380e18c63cd99d154464c857b597b0906c292ba53356f301ee2e5673ba9f00967e88b7b54dc7ca8c0c06efc627d27c1389cbec979f55dbced5592a8e03cbe6446817335113ef84508cbab39ab9571c255596e10bfc5d20224557202ab0fbb695cd4dd79b9e370fac635a6d811f4f9e4ce2640937e5395363c8b8809b59d3fcd840dd8ef223fdfcb56e0a79d44b"}, {0xe8, 0x13f, 0x40de, "24128b3145e32c038997f1ac33dea775ecf7e944ca9caf44e23762600b1fc0b1dcc6e6935c170d4549f9e1bf5c27036c7918efaec4008e59db2b57cfa2170bbfba80f11db3c105e8e2efcba6f14db68872b7c6cc4dc036318bc983f23132b57e98995f6906b3a93fb02e80b9150c233f3058fffbc1600e39be220130c9a25b13c7c2a2649f853f0e34260355da39201ff1210244b7d9ae36b57730974761e6363106b1c0025889c11d5681c7442492b0fdf4017c89d407f8c88897a217d00074346aca367ffc76291085d00e9ad5cc96f03d644e088791"}, {0x18, 0x117, 0x3965, "9c9a0f3a0d"}], 0x370, 0x20000000}, 0x4040014) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_udp(0x2, 0x6f2000, 0xfffffdef, &(0x7f0000000280)) 2018/04/05 21:37:20 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6ffffff00000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:20 executing program 4: socketpair(0x1f, 0x800, 0x633e, &(0x7f00000001c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000200)) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, r1, 0x0) socketpair(0x10, 0x7, 0x5, &(0x7f0000000040)={0xffffffffffffffff}) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000180)={r3, &(0x7f0000000080)="f996037e1be9feae01fbf960b9cded435d9a05730c5f539f7a4b4667ece1b64eb781705ba3816c25a47444a4caa743ae321ec35ef0ae436664972d3da21ea4fabb4baed9d365bcd2b1973aca8b8360854bb448f0d0aba9f07501f2662dd7f131999aba44ffa8bf664a", &(0x7f0000000100)=""/81}, 0x18) close(r2) 2018/04/05 21:37:21 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000000000000000000028000006a0a00fffffff6006118"], &(0x7f0000000080)='syzkalleP\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xd, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1800000000000000000000000000000005000000000000000000000000000000950000000000000027256d05ab91988d87786ac05d38553231fd35862661aa88d11c7a6b1265729ac427214e3101f6014684b5c8165957ec84b24a26634d3dc3d3d719b6fd869f680101f378f5657ab829b1108601eb3973fc3bab1dbac7ad5d339df0cd4024c6515122543623979b7ca799e63b437a234ac3bac53032899ddbd14027634ab5ca5a3ee5bc175b07fc79880a45e409f5a645eb68d8ce8cf0f8a13b6e38699af78a4a52a9ae05b389627eaafce5531056aa2ac0d2f4fdab41e2205ee8be"], &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000000)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r0, 0x50, &(0x7f0000000400)}, 0x10) 2018/04/05 21:37:21 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x10, 0x4, 0x4, 0x5, 0x0, 0x1}, 0x2c) gettid() r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)={0x6, 0x80, 0x7d, 0x9, 0x0, r0, 0x6}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000340)={0xd, 0xc13, 0x0, 0x4, 0x6, r1}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x13, 0x0, 0x7ffff9, 0x0, 0x20000003, 0x0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000300), &(0x7f0000000380)}, 0x20) r2 = gettid() r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x5, 0x5, 0xffffffffffffff81, 0x100000000, 0x0, 0xd55, 0x10040, 0xa, 0x6, 0xf63e, 0x4, 0xffffffff, 0x81, 0x9, 0x401, 0x2, 0x2, 0x8, 0x9, 0x8, 0xffff, 0xfffffffffffffeff, 0x100, 0x8, 0x6, 0x800, 0x100000000, 0xff, 0x20, 0xfff, 0x8, 0x1, 0x0, 0x5, 0x0, 0x8000, 0x0, 0xfff, 0x2, @perf_config_ext={0x0, 0x101}, 0x8, 0xffff, 0x3, 0x0, 0xd6, 0x1, 0x7fff}, r2, 0x7, 0xffffffffffffffff, 0x8) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200), 0x4) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000000c0)={r0, &(0x7f0000000040)="75b2f9e3538acc01ade6263123471a5f7ce0935b2bb16c9efe93c3cb560042027f9d4affc5b6143c482f35d2708f6b438740ba4a2cf1a617f7adac909e9583f4b37cd8fa96c99a9d9e9cdf1ffd4639cfa8eba304d9219bb30f1e3b6c18", &(0x7f0000000240)=""/159}, 0x18) socketpair(0x17, 0x80006, 0x10000, &(0x7f0000000100)) 2018/04/05 21:37:21 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8cffffff00000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:21 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xd6a, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:21 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000400008fe7bb5cd4e344cd0002800000720a00ff"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xf, 0x5, &(0x7f0000000040)=@framed={{0x18, 0xe4ffffff00000000}, [@jmp={0x5, 0x0, 0xffffffcd}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) 2018/04/05 21:37:21 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:21 executing program 2: bpf$MAP_CREATE(0xb00, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:21 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280)={0x0, 0x100000001, 0x8}, 0xc) r3 = gettid() close(r0) socketpair(0x0, 0x800, 0x8, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = perf_event_open(&(0x7f0000000700)={0x5, 0x70, 0x4, 0x80, 0x2, 0x100, 0x0, 0x8, 0x10002, 0x4, 0x1, 0x1f, 0x0, 0x7fffffff, 0x4, 0x6, 0x6, 0x9, 0x4, 0x5, 0x101, 0x1, 0x100, 0x401, 0x0, 0xa96a, 0x5, 0x4, 0x8, 0x8, 0x1, 0x1, 0x4, 0x3ff, 0xb17, 0x6, 0x0, 0x6, 0x0, 0x5, 0x1, @perf_bp={&(0x7f00000001c0), 0x8}, 0x10000, 0x1938, 0x1c0000000000, 0x1, 0x9, 0x3, 0xcd6}, 0xffffffffffffffff, 0x10, r4, 0x1) perf_event_open(&(0x7f0000000680)={0x3, 0x70, 0x8, 0xc9b, 0x4, 0x6000000000, 0x0, 0x0, 0x0, 0x8, 0xa0f5, 0x1, 0x5, 0xfffffffffffffffb, 0x99b, 0x48, 0x5, 0x1, 0x9, 0x8, 0x20, 0x7, 0xfff, 0x0, 0x401, 0x8, 0x1f, 0x9, 0x3, 0x7, 0x1ff, 0x1, 0x91ec, 0x5ff9, 0x80, 0x6, 0x4, 0x4, 0x0, 0x8, 0x5, @perf_bp={&(0x7f0000000300), 0x2}, 0x10000, 0x3ff, 0xf629, 0x7, 0x8, 0x7fff, 0x7}, r3, 0xb, r5, 0x2) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000002c0)={r2, &(0x7f0000000580)="8ff320df8e89251e9e84434dbae1edc26584f4d5b530d40b5e07543faf140691946b06b39b7597f9e0a690dc7be55e95f73c648ee7546495c85e8cee86922a94f0b1a13cb2bf62ed630a1c6bcb40737c3cfde4078ee19e65565bce85257a9f650586eb1cc95b5f35e97922be31cd8b93f8fda08baa26a05483ae35647c183eda74856a30924b60a7babefbac9d1506e7d4b2c6300fbe80455c80a108ff63c344c40532d16dff8ab59a597de0ac17cc4908134be03bbede14e52225c718190d283b840718b569dcc2406f43b7"}, 0x10) sendmsg(r1, &(0x7f0000000340)={&(0x7f0000000140)=@in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0xd}}, 0x80, &(0x7f0000000380)}, 0x4c880) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r6 = perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x11, 0x800, 0x1, &(0x7f0000000400)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000540)={r7, 0x0, 0x19, 0x9f, &(0x7f0000000440)="6351bf78789a68e0535a36cb0f4449c0a8b23f3049b8686aa2", &(0x7f0000000480)=""/159, 0x4, 0x27a}, 0x28) r8 = gettid() perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0xcc4b, 0x81, 0x2, 0x5e34cd09, 0x0, 0x6, 0x2000, 0x0, 0x8, 0x1, 0x7, 0x0, 0x2, 0x8001, 0x8bb4, 0x0, 0x2, 0x5, 0x0, 0x9, 0x100000000, 0x7fffffff, 0xffffffffffffffff, 0x0, 0x10001, 0x50a, 0x0, 0x1, 0x8, 0x3, 0x80, 0x7, 0x1, 0xfffffffffffffffd, 0x4, 0x3, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x2}, 0x88, 0x4, 0x30e4, 0x2, 0x2, 0x6}, r8, 0x2, r6, 0x8) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/05 21:37:21 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:21 executing program 2: bpf$MAP_CREATE(0xf000000, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:21 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000400008fe7bb5cd4e344cd0002800000720a00ff"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xf, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x5000000}, [@jmp={0x5, 0x0, 0xffffffcd}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) 2018/04/05 21:37:21 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:21 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0x311, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:21 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000000000000000000028000006a0a00fffffff6006118"], &(0x7f0000000080)='syzkalleP\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xd, 0x5, &(0x7f0000000040)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r0, 0x50, &(0x7f0000000400)}, 0x10) socketpair$ax25(0x3, 0x2, 0xcd, &(0x7f0000002580)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f00000003c0)={&(0x7f0000000480)=@alg, 0x80, &(0x7f0000000140)=[{&(0x7f0000000500)=""/4096, 0x1000}], 0x1, &(0x7f0000001500)=""/4096, 0x1000, 0x2}, 0x10000) r2 = perf_event_open(&(0x7f0000002500)={0x0, 0x70, 0x3, 0x9, 0x4, 0x0, 0x0, 0x2, 0x80040, 0x3, 0x0, 0x800, 0x7, 0x3, 0x20, 0xe1, 0x6, 0x0, 0xffffffff, 0x8, 0x7fffffff, 0xb36c, 0x2, 0x2, 0x7, 0x0, 0x4, 0x1, 0x81, 0x0, 0x55d4, 0x9d92, 0xeb2, 0x3, 0x83, 0x6138a10c, 0x6, 0x1000, 0x0, 0x3, 0x6, @perf_config_ext={0x0, 0x1}, 0x10000, 0x8, 0x8, 0x2, 0x9, 0x7, 0x3}, 0xffffffffffffffff, 0x6, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0xe1) 2018/04/05 21:37:21 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x102d}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x6, 0x5, &(0x7f0000346fc8)=ANY=[@ANYBLOB="18000000000000000000000000000000611000000000000a4b000000000000009500000000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0x3bc, &(0x7f00001a7f05)=""/251}, 0x2e) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r1, 0x0, 0xe, 0xb6, &(0x7f0000000000)="43d0ee4ea56962731f27ff041d38", &(0x7f0000000100)=""/182}, 0x28) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000300)=r1, 0xfffffffffffffe5e) recvmsg(0xffffffffffffff9c, &(0x7f0000016e80)={&(0x7f0000016a40)=@hci={0x0, 0x0}, 0x80, &(0x7f0000016e00)=[{&(0x7f0000016ac0)=""/78, 0x4e}, {&(0x7f0000016b40)=""/133, 0x85}, {&(0x7f0000016c00)=""/48, 0x30}, {&(0x7f0000016c40)=""/250, 0xfa}, {&(0x7f0000016d40)=""/178, 0xb2}], 0x5, 0x0, 0x0, 0x9}, 0x140) bpf$PROG_LOAD(0x5, &(0x7f0000016ec0)={0x3, 0xa, &(0x7f0000000200)=@raw=[@call={0x85, 0x0, 0x0, 0x4}, @generic={0x1, 0x1, 0x100000000, 0x3f}, @call={0x85, 0x0, 0x0, 0xc}, @map={0x18, 0xf, 0x1, 0x0, r0}, @generic={0x1, 0x3df94c0d, 0x40, 0x3}], &(0x7f0000000280)='syzkaller\x00', 0x7, 0x51, &(0x7f0000000340)=""/81, 0x41f00, 0x1, [], r2}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0x50, &(0x7f0000000040)}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0), 0x4) 2018/04/05 21:37:21 executing program 4: r0 = socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x200000000000, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000080)={r0}) socketpair$ax25(0x3, 0x3, 0xcf, &(0x7f0000000040)) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x5451, &(0x7f0000000100)) 2018/04/05 21:37:21 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000400008fe7bb5cd4e344cd0002800000720a00ff"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xf, 0x5, &(0x7f0000000040)=@framed={{0x18, 0xa000000}, [@jmp={0x5, 0x0, 0xffffffcd}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) 2018/04/05 21:37:21 executing program 2: bpf$MAP_CREATE(0x700, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:21 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8cffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:21 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:21 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0x387, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:21 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000400008fe7bb5cd4e344cd0002800000720a00ff"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xf, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x4}, [@jmp={0x5, 0x0, 0xffffffcd}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) 2018/04/05 21:37:21 executing program 6: bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000090000000280000f6a0a00fffffff600611890"], &(0x7f0000000080)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="181ed4ab2a3bd5cffb0000000000000005efffffff00000000000000000000009500000000000000"], &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) 2018/04/05 21:37:21 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xffffffffffffffff, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000000000000000000028000007a0affffff0c04c5275c84"], &(0x7f0000000000)='syzkaller\x00', 0xfffffffffffffffd, 0x247, &(0x7f0000000500)=""/206, 0x40f00}, 0xdc) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000003c0)={&(0x7f00000002c0)='./file0\x00', 0x0, 0x10}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={r0, 0x28, &(0x7f0000000400)}, 0x10) r1 = socket$kcm(0x29, 0x7, 0x0) sendmsg$kcm(r1, &(0x7f0000000b80)={&(0x7f0000000740)=@ethernet={0x6, @random="c92d0d31f139"}, 0x80, &(0x7f0000000980)=[{&(0x7f00000007c0)="7cdf11bf7b19e4f4b32b5a6985568b88b13237d2cb42b452ac8661980a6164e21b0be2b3e012a340462f5f1524e86d4364751d187d44ab8b7a080d2cb711fe2e1515bd097245175a27c97b8ef814edb4c2c8f5138b2ebba5eeeb62236df3ba22e560d362a9f55e416af611b953b853fcc398889e7926be3190ee17ae4d2d69ae7fb262d65ab6d804e563528f69a6af32fafe68ba71514bc6dcdef6db62eae683a374086c63adb59a172afbfbc0c374db5934cc3cb338a9ac0c8cb8b76d05b49134", 0xc1}, {&(0x7f00000008c0)="be83c20a9165c3eec322cd31591bcc589ebf6da63a5cc794592c3f2479722d8b43e0ade90f0ed1f1e99724b461eebbfb003cadd386c7fcd14fe0d3277123faf1788702870814935fe5712e40894a91583215d5757c55802e4bf4eda8fa06ca01c414b7e6d868071a4be14ed05ea4ee18862d5f65dff972d56e55a3a9be1fa27ba2261908404fe969dd5049e76750fa643aed1a0e5d06b337f4764ba41e38ef68657ba6", 0xa3}], 0x2, &(0x7f00000009c0)=[{0x20, 0x12d, 0x2, "46467132aa0286da51"}, {0x90, 0x84, 0x5, "72e1899141eb16441a552fba74e2102d7f15f1530be734038cf870596a5f179a183fa55ce62a58152761f0753e132976c9a03a12d8885855580c878ad56779dd56faa800e1501b298900bed96f1e3e755e0a42854e5c2f8b3bf8cdd8676a30c50f4dd3a74e3cec9047e8037e60754ff9ccc31811a8d8e8702f204f28b863d456"}, {0x108, 0x0, 0x400, "a486da3316f2c3d6b333eb85d31c16ef1e8a601795e9cea5e4710a4ecc73a48bd770d749f15014208f8613ba9ebdf1d811b45b1ab0c3b160bee224d1a4962d0af5542ad66ac8e3354e80daa3eec60b644761badf54d10ec189611cbd4b01d356516fc234a730f8ba1cf7875cabee954fa0390be958e9b279d9619cff39cd9571568d0e04392cfd5c919e6da22842486b45787d545544d93cbbce99df49f141bb384f7eeb4656be2d90bf09984bcf4a475149a0bd1ed50a0a302491dc10a954d0201373e1a09b888b96178f9e4993377f703b4679f54d62efa6d8dec5d63b6df2cc4022dc8211d529b19d2a9ed776ca8c7886ccd9fcaf"}], 0x1b8, 0x4004894}, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000000000000000000028000006a0a00fffffff6006118"], &(0x7f0000000080)='syzkalleP\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xd, 0x5, &(0x7f0000000480)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0xbb, &(0x7f0000000300)=""/187}, 0x48) 2018/04/05 21:37:21 executing program 2: bpf$MAP_CREATE(0xd00, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:21 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000000000000000000028000006a0a00fffffff6006118"], &(0x7f0000000080)='syzkalleP\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xd, 0x5, &(0x7f0000000040)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r0, 0x50, &(0x7f0000000400)}, 0xfffffffffffffe8e) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000000), 0x4) 2018/04/05 21:37:21 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000007000)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="1800000000000000000000000000000d5305009500000013dc000041b8ac10abf3fcda205234d6eb8d08610000000000000000000000bec9abebafd0f1a2e3"], &(0x7f0000001000)='GPL\x00', 0x0, 0x3d, &(0x7f0000009000)=""/61}, 0x48) socketpair(0xa, 0x6, 0x7fffffff, &(0x7f0000000000)={0xffffffffffffffff}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000240)={r0, &(0x7f0000000140)="7aaaa1b5f99154ec541ce209934b7f", &(0x7f0000000180)=""/160}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f0000000fd4)={0xe}, 0xd7) socketpair(0xb, 0x6, 0x9c54, &(0x7f0000000280)={0xffffffffffffffff}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f00000000c0)={r2}) 2018/04/05 21:37:21 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000000000000000000028000006a0a00fffffff6006118"], &(0x7f0000000080)='syzkalleP\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xd, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r0, 0x50, &(0x7f0000000400)}, 0x10) r1 = perf_event_open(&(0x7f00000005c0)={0x5, 0x70, 0x5, 0x1, 0x100, 0x1, 0x0, 0xffffffffffffff25, 0x1, 0x3, 0x8001, 0xdc, 0x3, 0xfffffffffffff801, 0xdd, 0x10000, 0x2, 0xba, 0xffffffffffff8bfe, 0x4000000080000, 0x0, 0x7b47, 0x1000, 0x8000, 0x3, 0x1, 0x8, 0x3, 0xffffffffffff8001, 0x7, 0xffffffffffffff7f, 0x5, 0x1, 0x3f, 0x4, 0x9, 0x4, 0xff, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000000), 0xc}, 0x80, 0x4, 0x3ff, 0x7, 0x3, 0xc0000000000000, 0x3}, 0x0, 0xa, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) 2018/04/05 21:37:21 executing program 2: bpf$MAP_CREATE(0xd, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:21 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:21 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000013680)={0x0, 0x2, &(0x7f0000000300)=@raw=[@initr0={0x18}], &(0x7f0000000380)='GPL\x00', 0x0, 0xcc, &(0x7f00000003c0)=""/204}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000700)={r0, 0x50, &(0x7f0000000680)={0x0, 0x0}}, 0x10) socketpair(0x2, 0x800, 0x5, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$ax25(0x3, 0x3, 0xcf, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000340)={r4, r0}) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xc, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB='d\x00\x00\x00"\x00\x00\x00\x00\x00\x00'], &(0x7f00000001c0)="73797a6b616c6c65720001be826e8f833152f795b4d9f4bc3ea582523aed371b084fccfc3d2ef2cbe65d30642ca8dcd0f8479be52e66937908f1d8112489e8099d9d4edb806d81189c0fbb6818d028546c35d3363d54db0db780f54977ae6359d617c1d233d8e18abfc75f9a76cd8e1f77583bc02f07a33de6f304e95db82fd4da55ebd25162df6f88e7d1bb0654ffb31e008967", 0x1, 0x99, &(0x7f000000d000)=""/153}, 0x48) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000640)={r3, &(0x7f0000000540)="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"}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000740)=r1, 0x4) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000500)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r5, 0x0, 0xe, 0x39, &(0x7f0000000100)="8664e3c89dee5127b59b24704305", &(0x7f0000000280)=""/57}, 0x28) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000004c0)) socketpair(0x0, 0x6, 0x8, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r5) 2018/04/05 21:37:21 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0x54e, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:21 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000400008fe7bb5cd4e344cd0002800000720a00ff"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xf, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x3f000000}, [@jmp={0x5, 0x0, 0xffffffcd}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) 2018/04/05 21:37:21 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:21 executing program 4: mkdir(&(0x7f0000002a80)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x7, 0x80006, 0x100000001, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000002e40)={r1, &(0x7f0000002d40)="066694760bfcd9568fd4a96c2cc9b43c8f57fdcf6aaaf4ec8edbb4", &(0x7f0000002d80)="baeb1f7b930eec06d403d0b01fdf137d095cefed9cac05c37adb6c454ca8826b659c2c11801f0899ea30c0067c209d8baf13ed5e90a03fa74b1547a118b54111f889c006f64d10dc8e873eeff18226c02ffc66dcd0b2986c4f44862888baff93d3452fb50351e03722febdb355796ec26faf84177e7f64495f0dee3e562ba2d348b0f089928adeebb835411834a1331522b9cda00cbb2c71ffd15f058fb99e9193fde7ce9536ee48e7eeaa5a3dbdc6f52662ec94ea7a14eb6a", 0x1}, 0x20) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000002c40)={&(0x7f0000002c00)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r3) mount(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='binfmt_misc\x00', 0x2, &(0x7f0000000440)="a20e263763ee05e5dc26c35e2792375a5eea08875d2660c1168382cde5e338ac676bbbe71db5d864992d49fa98ba3ef65e620575ca7f49a0dede94e3c24226c80469e46cd43eb88b03a6bede2fab80e3b2b3851c8e767424178c83b4dc724a886da2c0dab97d632b15f62e8f8e65da382b61b640ad15e9cf9b5ca85b44185963b7f400a1d87df51a2a11d8b648e012c339437e8f887d28b46adec49c7f69dd35d380cedf0ea49ae2474215a993b6d6d95641e2ee67c44447aba1fe43f598dd9c439f4a64f3110f1ad439147c09") socketpair(0x15, 0x80000, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) mount(&(0x7f00000029c0)='./file0\x00', &(0x7f0000002a00)='./file0\x00', &(0x7f0000002a40)='sysv\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x5) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={0xffffffffffffffff, &(0x7f00000000c0)="0ae27bc735b9adc220c720fdf2f2e4941031f259fd386b84f832f0b4be9698f2908a53eef43aba5b20264d198c106a52e0b511a8f1eafd6ea6803d6623", &(0x7f0000000180)=""/234}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0xf3, &(0x7f0000000380), &(0x7f0000000280)=""/243, 0x0, 0x8}, 0x28) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000002b80)={r4, &(0x7f0000002ac0)="5b0213167ba87bb0e43160a2e0a0216e8436b9a16da43c300fb945606552efb6be4a1b182c12b37e9b92ee5057f0079c9372558d81b8b2bc4a2489402e1aad8f19f78238cf2a49f0e7138808408d1501d3dbb78ee67aa906db040e0636259c365ce9bbd0e3fd0c64", &(0x7f0000002b40)="f8dc9253e95b4841d7a785be0b09040a2be0ee5a60063bd240"}, 0x20) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000002bc0)=0x80000000, 0x4) bpf$OBJ_GET_PROG(0x7, &(0x7f0000002cc0)={&(0x7f0000002fc0)='./file0\x00', 0x0, 0x18}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x5, &(0x7f0000002f40)=ANY=[@ANYBLOB="926e19c2e7000000081c000000000100850000003600000005000000000000009500000000005b86954eeb6ed26d08a8f62df1cef874fbc08df46787babcfd6309"], &(0x7f0000000040)='syzkaller\x00', 0x1, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r5, 0x0, 0xe, 0x12, &(0x7f0000000400)="222fea09601182605aecc6378847", &(0x7f00000003c0)=""/18}, 0x28) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000002f00)={r4, &(0x7f0000002e80)="372ef1eb868e38fb285061ce92da7741913e37a6e343", &(0x7f0000002ec0)=""/57}, 0x18) recvmsg$kcm(r2, &(0x7f0000002980)={0x0, 0x0, &(0x7f0000002800)=[{&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000001540)=""/217, 0xd9}, {&(0x7f0000001640)=""/51, 0x269}, {&(0x7f0000001680)=""/246, 0xf6}, {&(0x7f0000001780)=""/91, 0x5b}, {&(0x7f0000001800)=""/4096, 0x1000}], 0x6, &(0x7f0000002880)=""/232, 0xe8, 0x7}, 0x10040) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 2018/04/05 21:37:21 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000000000000000000028000006a0a00fffffff6006118"], &(0x7f0000000080)='syzkalleP\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xd, 0x5, &(0x7f0000000040)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r0, 0x50, &(0x7f0000000400)}, 0x10) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000140)) socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000000000)) 2018/04/05 21:37:21 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6ffffff00000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:21 executing program 2: bpf$MAP_CREATE(0xb, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:22 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000400008fe7bb5cd4e344cd0002800000720a00ff"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xf, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x18100000}, [@jmp={0x5, 0x0, 0xffffffcd}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) 2018/04/05 21:37:22 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xd6, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:22 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:22 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000000000000000000028000006a0a00fffffff6006118"], &(0x7f0000000080)='syzkalleP\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xd, 0x5, &(0x7f0000000040)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f00000006c0)={0xffffffffffffffff}) recvmsg$kcm(r1, &(0x7f00000009c0)={&(0x7f0000000700)=@hci, 0x80, &(0x7f0000000940)=[{&(0x7f0000000780)=""/238, 0xee}, {&(0x7f0000000880)=""/172, 0xac}], 0x2, &(0x7f0000000980)=""/49, 0x31, 0x9ca9}, 0x100) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r0, 0x50, &(0x7f0000000400)}, 0x10) 2018/04/05 21:37:22 executing program 2: bpf$MAP_CREATE(0xe00000000000000, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:22 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:22 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000400008fe7bb5cd4e344cd0002800000720a00ff"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xf, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x1810000000000000}, [@jmp={0x5, 0x0, 0xffffffcd}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) 2018/04/05 21:37:22 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xac9, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:22 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8cffffff00000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:22 executing program 6: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x7}, 0x1f) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x8, 0x23, &(0x7f0000000000)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='syzkaller\x00', 0x6, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 2018/04/05 21:37:22 executing program 5: r0 = perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x0, 0x2, 0xfffffffffffffff7, 0x1, 0x0, 0x3, 0x1000, 0x9, 0x5, 0x200, 0x9, 0x1, 0xff, 0x80000001, 0x400, 0x8, 0xfffffffffffffff8, 0x9, 0x3, 0x0, 0x46, 0x200, 0x4ad617cb, 0x8, 0x100, 0x0, 0x92, 0x1, 0xffff, 0x2a, 0x7f, 0x4, 0x5, 0xc65, 0x7ff, 0x100, 0x0, 0x7fff, 0x7, @perf_bp={&(0x7f0000000000), 0xe}, 0x0, 0xe9, 0x3, 0x2, 0x2, 0x400, 0x1ff}, 0x0, 0xd, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000140)={0x4, 0x0, [0x0, 0x0, 0x0, 0x0]}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000000000000000000028000006a0a00fffffff6006118"], &(0x7f0000000080)='syzkalleP\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000003c0)) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000d391d84a0000000000050000000000000000000000000000009500"], &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r1, 0x50, &(0x7f0000000400)}, 0x10) 2018/04/05 21:37:22 executing program 2: bpf$MAP_CREATE(0x18000000, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:22 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:22 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0x9e8, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:22 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000400008fe7bb5cd4e344cd0002800000720a00ff"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xf, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x17bc1a0000000000}, [@jmp={0x5, 0x0, 0xffffffcd}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) 2018/04/05 21:37:22 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0xd1}, 0x12) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000000400)=ANY=[@ANYBLOB="180000000000000000000000000000007110008e5d401bcf10bf6d000000000095000000000000008eaa5c099755bd2489deb8cd33ab52f8df18ff71129318a072c310b0b96f05b7f7ab0c0000000000000000000000caa2ed3eb9e9f9c67c611a20c219970e30130f94bfbbecb87a46b925"], &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet6_icmp(0xa, 0x2, 0x3a, &(0x7f0000000080)) socketpair$inet_udp(0x730000, 0x2, 0x4, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = gettid() r3 = perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0xc0, 0x8, 0x0, 0x1, 0x0, 0x6, 0x1000, 0x1, 0xb70c, 0xff, 0x100, 0xffffffff, 0x8, 0x67c, 0xffff, 0x3, 0x401, 0x1, 0x1b, 0x0, 0x100000000, 0x7, 0x8, 0x8, 0x1c, 0x0, 0x80000000, 0x1ff80000000000, 0x2, 0x10000, 0x0, 0x30, 0x9, 0x1, 0x2, 0x10001, 0x0, 0xffff, 0x0, @perf_bp={&(0x7f0000000000), 0x5}, 0x2000, 0x6, 0x0, 0x6, 0x2154, 0x4, 0x4}, 0x0, 0x3, 0xffffffffffffff9c, 0x0) perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0xfffffffffffffffc, 0x2, 0x2, 0x6, 0x0, 0x9, 0x1, 0x3, 0x1, 0x100, 0x1, 0x0, 0x3, 0x8, 0x1ff, 0xed5, 0x9, 0x0, 0x223, 0x2, 0x1, 0x2, 0x4, 0xdf24, 0xffffffff, 0x5, 0x20, 0x4, 0x3, 0x0, 0x9, 0x401, 0x81, 0x8, 0x6, 0x81, 0x0, 0x9, 0x0, @perf_config_ext={0x2, 0x40}, 0x4006, 0x8, 0x5, 0x7, 0x6, 0x1000, 0x98}, r2, 0x8, r1, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x1, 0x6, 0xffffffffffffff7f, 0x0, 0xe, 0x90260, 0xd, 0x7fff, 0x9, 0x0, 0x6, 0x2, 0x1, 0xffffffff, 0x922f, 0x6, 0x40, 0x1f, 0x200, 0x5, 0xa8, 0x5, 0x4, 0x2, 0x5, 0x7, 0x927, 0x0, 0x1, 0x9, 0x2, 0x7, 0x2, 0x8, 0x7, 0x0, 0x2, 0x4, @perf_config_ext={0x80, 0x6e63}, 0x200a0, 0x3, 0x1, 0x3, 0xc9, 0x8f5e, 0x6224}, r2, 0x0, r3, 0x2) 2018/04/05 21:37:22 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff8c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:22 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:22 executing program 2: bpf$MAP_CREATE(0x1000000, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:22 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x10, 0x3, &(0x7f0000000040)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000000080)="e8d5c15dca185e4a0f44e7fe3dd6824d5d15f704a46d367145183ca9827f1c5e7d2911231333bd7db1a50f5d27c8a147e7482987b458261b555ec1aa3abc42b70f0b85023ce98e377944a9f15e467b1531769f7376692bb3d97974983387fad5e51cf0c301b1d6560e533d14c429772e", 0x6, 0xfffffd08, &(0x7f0000000300)=""/187, 0x0, 0x1}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r0, 0x50, &(0x7f0000000400)}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xc, 0x3, 0x0, 0x1000, 0x2, 0xffffffffffffffff, 0x1b}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000200)={r1, &(0x7f0000000100)="20f4890cbe51e43baa08ce0e04bb3e74edb80944325682ba5a7bfc97216af9c34e98fb1169c1be5f5a53a7ee74107ce5b4107c3f739f55ca9a7a4e912937a0625626357baf2ceba9f9595f9c960c47618f11f6846e3060a723704905020fe61d59a441d4a1b09b7fddec54a5dc992d8e26b56cb2c59c9928e0803ee1fa93a7f5bd774a7fd659383e7fa347c12d29f5a8b3b7d84520752ad74a11b401c3fba77b57d7686d11dcede512131ce529ccf72e446464581150ae5920ba343f4fc1542c3a035c9303282ce3838fa7a250d1915be6e67057dde6a7c5de28e2e1a9d300f307ca26b5044faba30347d653af4355b920c4351d085fa4c0", &(0x7f0000000480)=""/67}, 0x18) 2018/04/05 21:37:22 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000400008fe7bb5cd4e344cd0002800000720a00ff"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xf, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x4c00000000000000}, [@jmp={0x5, 0x0, 0xffffffcd}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) 2018/04/05 21:37:22 executing program 6: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x4a}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0xffffffffffffff11, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000000)={r0, 0x50, &(0x7f0000000200)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=r1, 0x4) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000001c0)) 2018/04/05 21:37:22 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0xf7}, 0xc1) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=ANY=[@ANYBLOB="18000000000000000000000000000000711000000700000000000000000000009500000000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x13, 0x5, 0x1000, 0x200, 0xf, 0xffffffffffffffff, 0x40}, 0x2c) bpf$OBJ_GET_PROG(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x10}, 0x10) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)) 2018/04/05 21:37:22 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xcb8, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:22 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:22 executing program 2: bpf$MAP_CREATE(0x316, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:22 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:22 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x8b, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000000000000000000028000006a0a00fffffff6006118"], &(0x7f0000000080)='syzkalleP\x00', 0xb7, 0xce, &(0x7f0000000180)=""/206, 0x41f00}, 0x48) recvmsg$kcm(0xffffffffffffffff, &(0x7f000000a1c0)={&(0x7f0000008bc0)=@hci={0x0, 0x0}, 0x80, &(0x7f000000a0c0)=[{&(0x7f0000008c40)=""/232, 0xe8}, {&(0x7f0000008d40)=""/86, 0x56}, {&(0x7f0000008dc0)=""/69, 0x45}, {&(0x7f0000008e40)=""/54, 0x36}, {&(0x7f0000008e80)=""/246, 0xf6}, {&(0x7f0000008f80)=""/189, 0xbd}, {&(0x7f0000009040)=""/118, 0x76}, {&(0x7f00000090c0)=""/4096, 0x1000}], 0x8, &(0x7f000000a140)=""/98, 0x62, 0x7}, 0x100) bpf$PROG_LOAD(0x5, &(0x7f000000a200)={0xf, 0x4, &(0x7f0000000840)=@raw=[@alu={0x4, 0xff, 0x7, 0x9, 0xa, 0xc, 0xfffffffffffffffc}, @jmp={0x5, 0x20, 0x0, 0xd, 0x3, 0x2, 0xffffffffffffffff}], &(0x7f0000000880)='GPL\x00', 0x5, 0xb4, &(0x7f00000008c0)=""/180, 0x41000, 0x0, [], r1}, 0x48) socketpair(0x10, 0x4, 0x7, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={r0, 0x50, &(0x7f0000000740)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000800)=r4, 0x4) sendmsg(r2, &(0x7f0000000700)={&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, r3, {0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0xf}}, 0x1, 0x3, 0x1, 0x4}}, 0x80, &(0x7f0000000500)=[{&(0x7f00000003c0)="972a90726e33bb3f83beffdfd2a31ad8b5ae1789ebe58bab4aa29c3fdd21b201ae1284f7bf155ed2acd61917a3724a75f4d80b", 0x33}], 0x1, &(0x7f0000000540)=[{0xe0, 0x117, 0x8001, "98e9334b872a87d68a018ae742d488fe6f8f66a0ae077e40427da27a9a43aa5af108bec6a1312020d5e350ea9f3287e1ee33e8d29bc95668ea02a33a509ecd67648a61cbfedbeb70566b38e7cebda62f52052194b20fecf22dc81b1270182218aae0c641f4df1672bed6c0c4872537a030ab7e0ab0333ad6443365acd0ed477f8a8dea0270bc01161925ac0937dc5ca2b80723e9c52dbf445718fc9ca116db906e7c5bd5d2b1edfaedebc0867bdcc0980beb8abe4afa3e60115abc9f312e34351137065265a3a06c55cc7c3a3cda14"}, {0xd0, 0x0, 0x9, "6808aee0a8d5162a9bd0922f17e22d04fd173b75431dfa71601cf2d17f20900b316dbf92e65bf1d98d1cf1b3ed30c5422a0458d410f0693826be1eaffbb31531cfe361277d4e1ce98e8186ea0fde682663b3c6a87daa2ac7b4954a926851cca0fdc138f5c639601608a3a09b9737637e496b418435e445c224dbd4e1a257142af0f9b3f915f7b34fe30add67b52839c43c3e7d1dd66cc09e7081493353d1ccfc85d2f3a6ee531d66e49410d61c01e293f6ff68a4fc924274ba8eea7e0699e9"}], 0x1b0, 0x800}, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xd, 0x5, &(0x7f0000000040)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r5, 0x50, &(0x7f0000000400)}, 0x10) 2018/04/05 21:37:22 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000400008fe7bb5cd4e344cd0002800000720a00ff"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xf, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x7000000}, [@jmp={0x5, 0x0, 0xffffffcd}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) 2018/04/05 21:37:22 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x3, 0x4, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0, &(0x7f0000000080)}, 0xff44) 2018/04/05 21:37:22 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:22 executing program 4: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x7, 0x40, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x8, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb1104058d8843") close(r1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r3, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x801, 0x0, &(0x7f0000000000)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000000)=@vsock, 0x10, &(0x7f0000000040), 0x1dd, &(0x7f00000000c0)=""/105, 0xffffff2c}, 0x0) sendmsg(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x28a, &(0x7f0000000000)}, 0x0) recvmsg$kcm(r4, &(0x7f0000000280)={&(0x7f0000000240)=@ipx, 0x10, &(0x7f0000002180)=[{&(0x7f0000000d00)=""/148, 0x4c}, {&(0x7f0000000dc0)=""/222, 0x3d6}, {&(0x7f0000000ec0)=""/4096, 0xfffffe2b}, {&(0x7f0000001ec0)=""/255, 0xff}, {&(0x7f0000001fc0)=""/140, 0x8c}, {&(0x7f0000002080)=""/77, 0x4d}, {&(0x7f0000000280)=""/50, 0x32}, {&(0x7f0000002100)=""/107, 0x6b}], 0x8, &(0x7f0000002200)=""/89, 0x59}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000540)={r5}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r3}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) sendmsg(r6, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="ebf2716387a78e98475956706ceecf4f691f0f64dfb2736aae935b7f8c8b4824eb0b99059de5958ea0fb81ea850657c27b1293c19343b34143d83d1c2ae986fab57bbc85c6b9f4fb2abb4d7cd4503b6455489b7ccbdf8e1be0183f09f69903b360c991de52fccfa2d9af45809b0eaa0ac1e9e2729078c6641c6ed2a4912937863e68512e66c8d19ae995af630d97", 0x8e}], 0x1, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r6, &(0x7f0000000040)={&(0x7f0000006980)=ANY=[@ANYRES32=0x0], 0x1, &(0x7f0000006d00)=[{&(0x7f0000006c40)=""/181, 0xb5}], 0x1, &(0x7f0000006d40)=""/65, 0x41}, 0x0) sendmsg(r7, &(0x7f0000001900)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)='v', 0x1}], 0x1, &(0x7f0000000440)=ANY=[]}, 0x0) recvmsg(r6, &(0x7f0000001140)={&(0x7f0000000f80)=@can, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) 2018/04/05 21:37:22 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xd97, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:22 executing program 2: bpf$MAP_CREATE(0x4000000000000000, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) [ 365.022550] xprt_adjust_timeout: rq_timeout = 0! 2018/04/05 21:37:22 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000400008fe7bb5cd4e344cd0002800000720a00ff"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xf, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x40000000}, [@jmp={0x5, 0x0, 0xffffffcd}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) 2018/04/05 21:37:22 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:22 executing program 6: socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000640)={&(0x7f0000000180)=@ipx, 0x80, &(0x7f00000002c0)=[{&(0x7f0000000400)=""/198, 0xc6}, {&(0x7f0000000500)=""/110, 0x6e}, {&(0x7f00000000c0)=""/3, 0x3}], 0x3, &(0x7f0000000580)=""/150, 0x96, 0xfff}, 0x40) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000000000000000000028000007a0a00fffffffffd63012c"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000300)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xc, 0x5, &(0x7f0000000680)=ANY=[@ANYBLOB="180032d881027b439f179997000000000000000000000000000000050000000000005b66e800000000000000"], &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0xbb, &(0x7f0000000300)=""/187}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000008c0)={r1, 0x0, 0xfc, 0xf0, &(0x7f00000006c0)="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", &(0x7f00000007c0)=""/240, 0x3, 0x8}, 0x28) 2018/04/05 21:37:22 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000000000000000000028000006a0a00fffffff6006118"], &(0x7f0000000080)='syzkalleP\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xd, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000f21a1deea3f6d7000000000000000500000000000000000000000000000095000000000000006a52435436e37452"], &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000140)={0x0, r0, 0x0, 0x1}, 0x14) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r0, 0x50, &(0x7f0000000400)}, 0x10) 2018/04/05 21:37:22 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:23 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xef1, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:23 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xd, 0x5, &(0x7f0000000040)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r0, 0x50, &(0x7f0000000400)}, 0x10) [ 365.797676] xprt_adjust_timeout: rq_timeout = 0! 2018/04/05 21:37:23 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000400008fe7bb5cd4e344cd0002800000720a00ff"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xf, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x4c}, [@jmp={0x5, 0x0, 0xffffffcd}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) 2018/04/05 21:37:23 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff8c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:23 executing program 2: bpf$MAP_CREATE(0xd000000, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:23 executing program 6: socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000240)={0xffffffffffffffff}) close(r0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x8}, 0x10) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r1, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000000)) socketpair(0x1d, 0x3, 0xf1, &(0x7f0000000200)) 2018/04/05 21:37:23 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xb86, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:23 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:23 executing program 4: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100)={0x0, 0x7f, 0x10}, 0xc) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r0, &(0x7f0000000140)="a427ec201373ebc6", &(0x7f0000000180)=""/187}, 0x18) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x7, 0x40000}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xe, 0x5, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000000000000000000000000000737a9da26ffd000000000000000000000800000000000000d00490318267f748592b7e27eee90900cc2717ca42ab7b9fe9fda4aee21bd36eadddc707d6dec271a918e65388"], &(0x7f0000f59000)='GPL\x00', 0x3ff, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', r1}, 0x10) 2018/04/05 21:37:23 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000000000000000000028000006a0a00fffffff6006118"], &(0x7f0000000080)='syzkalleP\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000500000000a081360088000000000c000000009500000000"], &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) close(r0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000140)={&(0x7f0000000000)='./file0\x00', r0}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={r0, 0x50, &(0x7f0000000480)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000500)=r2, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r1, 0x50, &(0x7f0000000400)}, 0x10) 2018/04/05 21:37:23 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6ffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:23 executing program 2: bpf$MAP_CREATE(0x6000000, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:23 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000000000000000000028000006a0a00fffffff6006118"], &(0x7f0000000080)='syzkalleP\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xd, 0x5, &(0x7f0000000040)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r0, 0x50, &(0x7f0000000400)}, 0x10) socketpair(0x3, 0x80f, 0x9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000140)) 2018/04/05 21:37:23 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:23 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000400008fe7bb5cd4e344cd0002800000720a00ff"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xf, 0x5, &(0x7f0000000040)=@framed={{0x18, 0xffffffe0}, [@jmp={0x5, 0x0, 0xffffffcd}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) 2018/04/05 21:37:23 executing program 4: recvmsg(0xffffffffffffffff, &(0x7f0000004000)={&(0x7f0000001c80)=@hci={0x0, 0x0}, 0x80, &(0x7f0000003f40)=[{&(0x7f0000001d00)=""/34, 0x22}, {&(0x7f0000001d40)=""/4096, 0x1000}, {&(0x7f0000002d40)=""/4096, 0x1000}, {&(0x7f0000003d40)=""/72, 0x48}, {&(0x7f0000003dc0)=""/13, 0xd}, {&(0x7f0000003e00)=""/216, 0xd8}, {&(0x7f0000003f00)=""/24, 0x18}], 0x7, &(0x7f0000003fc0)=""/33, 0x21, 0x8}, 0x2) bpf$PROG_LOAD(0x5, &(0x7f0000004040)={0xe, 0xb, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, [@alu={0x0, 0x6, 0xb, 0xa, 0x5, 0x0, 0x92d4517386e8cd9d}, @exit={0x95}, @call={0x85, 0x0, 0x0, 0x30}, @alu={0x7, 0x100000001, 0xa, 0x3, 0x6, 0x50, 0xfffffffffffffffc}], {0x95}}, &(0x7f0000000080)='GPL\x00', 0xfffffffffffffffb, 0xdd, &(0x7f00000000c0)=""/221, 0x41100, 0x1, [], r0}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x7, 0x4, 0x10000, 0x8, 0x20, 0xffffffffffffffff, 0x0, [0x140]}, 0x2c) 2018/04/05 21:37:23 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xf66, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:23 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:23 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000400008fe7bb5cd4e344cd0002800000720a00ff"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xf, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x3f00}, [@jmp={0x5, 0x0, 0xffffffcd}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) 2018/04/05 21:37:23 executing program 6: socketpair(0x1b, 0x800000000000001, 0x3, &(0x7f0000000140)={0x0, 0x0}) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x28a, &(0x7f0000000000), 0x2c5}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) close(r1) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000080)) close(r0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0xffffffff00000000) 2018/04/05 21:37:24 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000000000000000000028000006a0a00fffffff6006118"], &(0x7f0000000080)='syzkalleP\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xd, 0x5, &(0x7f0000000040)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) r1 = socket$kcm(0x29, 0x5, 0x0) recvmsg(r1, &(0x7f0000001840)={&(0x7f0000000480)=@sco, 0x80, &(0x7f0000001780)=[{&(0x7f0000000500)=""/103, 0x67}, {&(0x7f0000000580)=""/4096, 0x1000}, {&(0x7f0000000000)=""/46, 0x2e}, {&(0x7f0000000140)=""/39, 0x27}, {&(0x7f00000003c0)=""/13, 0xd}, {&(0x7f0000001580)=""/116, 0x74}, {&(0x7f0000001600)=""/249, 0xf9}, {&(0x7f0000001700)=""/66, 0x42}], 0x8, &(0x7f0000001800)=""/47, 0x2f, 0x353}, 0x40002041) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r0, 0x50, &(0x7f0000000400)}, 0x10) 2018/04/05 21:37:24 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:24 executing program 2: bpf$MAP_CREATE(0x700000000000000, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:24 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0x745, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:24 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xe, 0x4, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0, &(0x7f0000000100)="8ebbd9bbccb5b9eadc97ee2ccfdcc25f91bcad1a9b379579b6b2d2a4ca21a499ffb42c144d89086c9698996e2987a6c93e6270cc21899af8be128e9cdd621666652a6efb60b8167dd3bc3a2815d5cc51285eb2f9dd326105a4a95451d322dcb6a631eb77b436917fbebf3a11ffb3af52cf8381d01611ba91c0b6582aa042bfe7de1f997df86be2d2c77320f42db066b01ad840300e63fb4a4aef7af3a20d40aa62188313cd62531858a344bf3d804a7eaa30a3ce4ea2"}, 0x10) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000001140)={r0, &(0x7f00000000c0)='8', &(0x7f00000010c0)=""/113}, 0x18) 2018/04/05 21:37:24 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:24 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000000000000000000028000006a0a00fffffff6006118"], &(0x7f0000000080)='syzkalleP\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000140)={&(0x7f0000000000)='./file0\x00', 0x0, 0x18}, 0x10) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000480)={r0, &(0x7f00000003c0)="1c559dc85bccc78eb689b088c1d3a7e2"}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xd, 0x5, &(0x7f0000000040)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r1, 0x50, &(0x7f0000000400)}, 0x10) 2018/04/05 21:37:24 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000400008fe7bb5cd4e344cd0002800000720a00ff"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xf, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x6c00}, [@jmp={0x5, 0x0, 0xffffffcd}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) 2018/04/05 21:37:24 executing program 6: recvmsg(0xffffffffffffffff, &(0x7f000000e600)={&(0x7f000000e3c0)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, 0x80, &(0x7f000000e580)=[{&(0x7f000000e440)=""/72, 0x48}, {&(0x7f000000e4c0)=""/167, 0xa7}], 0x2, &(0x7f000000e5c0)=""/28, 0x1c}, 0x1) socketpair(0x15, 0xa, 0x400, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000300)=0x9) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0x3, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000e7018000006a0a00ff7ffff6006118"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xfffffe78, &(0x7f0000000180)=""/206, 0x0, 0x0, [], r0}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xe, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="0000d5000000000000000000000000000000950000000000001ea13e74d066"], &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0xbb, &(0x7f00000003c0)=""/187}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000140)={&(0x7f0000000080)='./file0\x00', r2}, 0x10) 2018/04/05 21:37:24 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8cffffff00000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:24 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000400008fe7bb5cd4e344cd0002800000720a00ff"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xf, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x4000}, [@jmp={0x5, 0x0, 0xffffffcd}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) 2018/04/05 21:37:24 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:24 executing program 2: bpf$MAP_CREATE(0xa000000, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:24 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0x35a, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:24 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6ffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:24 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="00006afce0f0cdd20abd1a18000000000025af6a4bc2517e5e00"], &(0x7f0000000080)='syzkalleP\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) socketpair(0x10, 0x800, 0xb6, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f00000003c0)=ANY=[@ANYBLOB="0200000000ca572c1e251ea5755994608f3100000066b12d3041e3880c1ac5d69bcfce0000000000000000"]) getpid() r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xd, 0x5, &(0x7f0000000040)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r1, 0x50, &(0x7f0000000400)}, 0x10) 2018/04/05 21:37:24 executing program 6: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0xc8}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180052001f09711000000000c5f28b000000000000df9500000000000000ab60aafdfec7112e00000000000000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair(0x0, 0x803, 0x100000001, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x40) 2018/04/05 21:37:24 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000c3000)={0xf, 0x4, 0x4, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f]}, 0x380) r1 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={r0, &(0x7f00000000c0), &(0x7f0000000140)=""/149}, 0x18) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000000c0)='GPLem0nodevGPLvmnet1-vmnet0\x00') bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000080)={r0, &(0x7f0000000040)="75140a87c0811313a2df0b44", &(0x7f0000000240)=""/243}, 0x18) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000400)={r0, &(0x7f0000000340)="0130901582903fd66df5171fa1189935002edafedbf8823d7c7e45a843198da1dd338292ae0863bd7e334f9dea8daacec77d4eea3b6be79c015b69d63115b87008cfd6fe15a5bd717e81083fa8805aac01575eddb2d7ec742f5eae12a88cb2aacdb9fd70fe0bfd23f10f8ea2ff81542c18ccb3e736819612d76ac19dad104e94285f79ba2fbba78231eb4495c3ed8b5f8d71248e48bea45e828c484468170596e3b5688650945cf6fa0ffdca1a1cb26e6f13ba1375", &(0x7f0000000100)=""/22}, 0x18) 2018/04/05 21:37:24 executing program 2: bpf$MAP_CREATE(0x7, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:24 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000400008fe7bb5cd4e344cd0002800000720a00ff"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xf, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x68}, [@jmp={0x5, 0x0, 0xffffffcd}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) 2018/04/05 21:37:24 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff8c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:24 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="080000feff00000000000000028000006a0a00fffffff6006108"], &(0x7f0000000080)='syzkalleP\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000780)={&(0x7f0000000740)='./file0\x00'}, 0x10) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000440)={&(0x7f00000003c0)=@llc, 0x80, &(0x7f0000000140)=[{&(0x7f0000000500)=""/139, 0x8b}, {&(0x7f00000005c0)=""/195, 0xc3}], 0x2, &(0x7f00000006c0)=""/91, 0x5b, 0x400}, 0x40000142) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xd, 0x5, &(0x7f0000000040)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r1, 0x50, &(0x7f0000000480)}, 0x10) 2018/04/05 21:37:24 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0x787, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:24 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:24 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0xe, 0x3, &(0x7f0000000080)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0xffffff87}, [], {0x95}}, &(0x7f0000000000)="f4206cd55d3174fccd51d063ca3dda5cbf5a01cc7ea92c43b604ffc53727d2d60f55ddeb757cf36a8457125ab48bcbcce4011a423df186cc8d8e6e9a66b1a0a6035a2fc0578cf5aad8b3a24a9c646a37eb26c6212ffc9658f152194b880765d169d550beb059984a10c2", 0x1, 0x99, &(0x7f000000d000)=""/153}, 0x48) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0xffffffff00000000, 0x9, 0x9, 0x80, 0x0, 0x800, 0x2, 0x8, 0x400, 0x8, 0x7f80000, 0x434f, 0x54cd, 0x7fffffff, 0x6, 0x8001, 0x7, 0x5, 0x8, 0x80000000, 0x636c, 0x80, 0x4, 0x4, 0x6, 0x8, 0x3, 0x8000, 0x7, 0x2, 0x4, 0xffffffffffff1d2c, 0x7fffffff, 0x2, 0xa060, 0x9, 0x0, 0xcdc8, 0x0, @perf_bp={&(0x7f00000000c0), 0xc}, 0x8828, 0xa0c0, 0x5, 0x5, 0x0, 0x8d7e, 0x7ff}, 0xffffffffffffffff, 0x7, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) 2018/04/05 21:37:24 executing program 2: bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:24 executing program 6: socketpair(0x3, 0x2, 0x7fffffff, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000280)={0x0, r0, 0x6, 0x1}, 0x14) r1 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0xc, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000870000000000000095000000000000006c77a906b639e47155a5c9be5aba0c330e0d108e0df752c19863b0bcef9533b0aa3abd88f9e242fe6181fde93ac46db24ddd6adb1e8e9073637f9c7a0bc3c569e2f33e8b2662f356e469093cae3f3bcc5ad95554833ade7410378245949f5a8e65214c2aa70f820027eff9443a4a0c7ef3d10433d6177f2a5d"], &(0x7f0000000000)="f4206cd55d3174fccd51d063ca3dda5cbf5a01cc7ea92c43b604ffc53727d2d60f55ddeb757cf36a8457125ab48bcbcce4011a423df186cc8d8e6e9a66b1a0a6035a2fc0578cf5aad8b3a24a9c646a37eb26c6212ffc9658f152194b880765d169d550beb059984a10c2", 0x1, 0x99, &(0x7f000000d000)=""/153}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r1, 0x0, 0xe, 0x33, &(0x7f00000000c0)="2df1593fc5333d12ec29fe69598b", &(0x7f0000000100)=""/51}, 0x28) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000180)) 2018/04/05 21:37:24 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000400008fe7bb5cd4e344cd0002800000720a00ff"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xf, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x600}, [@jmp={0x5, 0x0, 0xffffffcd}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) 2018/04/05 21:37:24 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xe49, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:24 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:24 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:24 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[], &(0x7f0000000080)='syzkalleP\x00', 0x0, 0xce, &(0x7f0000000480)=""/206}, 0x1a2) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xd, 0x5, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) r0 = perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0x7, 0x4, 0x401, 0x80000000, 0x0, 0x8, 0x20000, 0x2, 0x7b90000000000000, 0x0, 0x0, 0x1, 0x2726, 0xffffffffffff6d7e, 0x8, 0x5, 0x400, 0x9, 0x7, 0xff, 0x3, 0x4, 0x2, 0xfffffffffffff766, 0x401, 0x3, 0x0, 0xf30, 0x100000000, 0x0, 0x2b, 0x7fff, 0xfffffffffffffeff, 0x9, 0xa1, 0x2020000000000000, 0x0, 0x8001, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x1000, 0x972, 0x2423, 0x7, 0x7, 0xc000000000000, 0x800}, 0x0, 0x8, 0xffffffffffffffff, 0x1) r1 = perf_event_open(&(0x7f00000006c0)={0x0, 0x70, 0x8, 0x7, 0x3ff, 0xfffffffefffffffb, 0x0, 0x6, 0x80205, 0x2, 0x4, 0x800, 0xed3c, 0x2, 0x6, 0x1, 0xfffffffffffffff8, 0xfffffffffffffffa, 0x2, 0xfb, 0x0, 0xaf8e, 0x8, 0x101, 0x5, 0x9, 0xfffffffffffffe01, 0x7, 0x100, 0x10001, 0x7, 0x4, 0x1, 0x3e5, 0x45f, 0x7ff, 0xd42f, 0x3, 0x0, 0x7, 0x1, @perf_config_ext={0x9, 0xa478}, 0x1000, 0x1000, 0x5, 0x7, 0x3f, 0x4, 0x1ff}, 0x0, 0x7, 0xffffffffffffff9c, 0x1) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) 2018/04/05 21:37:24 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004, 0x400000000001c}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xf, 0xffffffffffff8001, 0x7, 0x0, 0x16, r0, 0x7}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="1800000000000000000000000000000071100000050000000000000000000000950000000000000030b70aeca39bbd50e43655ee59d832b2a9eef66af7d0decd12f567cbbcd2caa9f2585cb3fc96346284266cb4383e300c80e125e9e36168318060764956537083eb4e38f2e0347ee8f200000000000000000000000000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x0, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r1, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000280)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0x1000, 0xf8, &(0x7f00000003c0)="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", &(0x7f00000013c0)=""/248, 0x9, 0xffffffff}, 0x28) socketpair$inet_udp(0x401000, 0x2, 0xf, &(0x7f0000000180)) 2018/04/05 21:37:24 executing program 2: bpf$MAP_CREATE(0x1800000000000000, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:24 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000400008fe7bb5cd4e344cd0002800000720a00ff"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xf, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x1810}, [@jmp={0x5, 0x0, 0xffffffcd}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) 2018/04/05 21:37:24 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xf2d, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:24 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:24 executing program 6: r0 = gettid() socketpair(0x0, 0x80005, 0x9, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000480)={0x4, 0x70, 0xffffffffffffafc2, 0x1, 0x400, 0x9, 0x0, 0xfffffffffffffffe, 0x8041, 0x1, 0x8, 0x5, 0x7, 0x2, 0x7f, 0x9, 0x3, 0x4, 0x2, 0xffffffffffffffc1, 0x4, 0x1000, 0x3, 0x5, 0x0, 0x8, 0x3, 0x7, 0x7fffffff, 0x1, 0x2, 0xffffffff, 0x6, 0x3, 0x6, 0x6, 0xfffffffffffff001, 0x5, 0x0, 0x6750, 0x1, @perf_config_ext={0x7e, 0xffffffff}, 0x200, 0x8, 0x4, 0x7, 0x0, 0x2413, 0xfd}, r0, 0x0, r1, 0xb) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x1, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x19101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000496fff)}, 0x0, 0x0, 0x10000000006, 0x0, 0x20000000, 0x0, 0x2000000001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x9}, 0xffffffffffffff10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)) mount(&(0x7f00009f8000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f00005f7ffb)='nfs4\x00', 0x0, &(0x7f000000a000)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0/file0\x00', 0x0, 0x3bb88f451f3f78c8}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000280)={&(0x7f0000000240)='./file0/file0\x00', r2}, 0x10) mkdir(&(0x7f0000000580)='\x00', 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x6, 0x400, 0x1, 0x1f, 0x5, r2, 0x100000001}, 0x2c) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, r2, 0x5, 0x1}, 0x14) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000003c0)={r3, &(0x7f00000002c0)="722ba3d6543c70a068c35873431d720a22e7e16e8ed539c26e5f980250ae426fd56f152bd8fa6e896b3b4fbe63d57ddd26027845c931bc508bf411ea95ed9f5808c5a40fb35cb7c44c9aa4ba13b696def24145096355e5375dfa9c93223b4345cd1e8947ec821ba0d8f86f118aab1d4efa96d871bc133337b17b31e70575d297087690900e9a9fbfe8dfeab36664a7a8b360d7eaae5bcd149bde82054d5a24fa0b2f", &(0x7f0000000380), 0x2}, 0x20) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)={0xe, 0x6, 0x2, 0x1, 0x0, r2, 0x2}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000200)={&(0x7f00000001c0)='./file0/file0\x00', r2}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f00000005c0)='./file0/file0\x00', r4}, 0xffd3) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000540)) 2018/04/05 21:37:25 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:25 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000400008fe7bb5cd4e344cd0002800000720a00ff"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xf, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x3c00}, [@jmp={0x5, 0x0, 0xffffffcd}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) 2018/04/05 21:37:25 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="18000000002dcc485ecb497f59e16202184b9b58f1000000000000000280546c559f95742993f6006118697ca2b022295f5c78e4da67d825ce6cacbb3e4d83f8ab1d6917a8402f90fc779b8539d5ce7e680cb5f7da0fe813e5c84f7c64bafa23655ebfd90af60e52a3e65fc1b77259f76f8a7378bf4a520689e95a4837ec3c5147293c695c7701cc298c463e6830c48156d292fdf7f120d806f4b41d7e222488ecdb87d4194418ae00d27e5ba880db09454cd10f7c8416b462006484b9fa5883dff01aab99c12bfd83eddbdaaffe6cd216dde8d7d1bbc4efbd1eee5d91ca6557"], &(0x7f0000000080)="73797aa2e36b616c6c65", 0x3, 0xce, &(0x7f0000000180)=""/206}, 0x48) r0 = perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x2ab, 0x3, 0x8000, 0x0, 0x0, 0x7fffffff, 0xae56e2552f9e08d8, 0x4, 0x100, 0x8, 0x3f, 0x4b, 0x5, 0x3, 0x1, 0x1, 0x2568, 0x70, 0x1, 0x0, 0x8001, 0x7, 0xfffffffffffff258, 0x1, 0x4, 0x9, 0x4, 0x0, 0x3, 0x7, 0xb9c, 0x6, 0x9c6, 0xf8c, 0x1, 0x9, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000000), 0x9}, 0x0, 0x958, 0x9, 0x5, 0x76d8aeb5, 0x1ff, 0x100000001}, 0x0, 0xe, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000140)=0x100) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000640)="4d11d8140166e35c7cd8559c518621ec77308a5b808b7b000000") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000002000000000000050000000000000000000000000000009500000000000000"], &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r1, 0x50, &(0x7f0000000400)}, 0x10) 2018/04/05 21:37:25 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6ffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:25 executing program 2: bpf$MAP_CREATE(0x1100000000000000, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:25 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0x0, 0x0}) socketpair(0x11, 0x800, 0x6, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000200)={&(0x7f0000000180)='./file0\x00', r2}, 0x10) setsockopt$sock_attach_bpf(r1, 0x1, 0x1d, &(0x7f0000000100), 0x4) recvmsg(r1, &(0x7f0000000380)={&(0x7f0000000080)=@rc, 0x80, &(0x7f0000000300)}, 0x0) sendmsg(r0, &(0x7f00000005c0)={&(0x7f0000000000)=@nfc={0x27}, 0x80, &(0x7f00000000c0), 0x0, &(0x7f0000000340), 0x1a6, 0xffffffffffffffff}, 0x0) 2018/04/05 21:37:25 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xa7f, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:25 executing program 6: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004, 0x7}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_udp(0x400314, 0x223, 0x13, &(0x7f0000000380)) 2018/04/05 21:37:25 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000000000000000000028000006a0a00fffffff6006118"], &(0x7f0000000080)='syzkalleP\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xd, 0x5, &(0x7f0000000040)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) socketpair(0x2, 0x80000, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r1, &(0x7f0000000480)="50b4ec5fe8171221650a73a7de415a1a2fcbf892022912b3019cddb6f1846f1d068fbaeeb545647648c8d07b765797344a243c016bc04eace1c3d6d409670d26f497cd3c9588531ef48b88d37acb0c9412f7e82d7a0294bbd1ba57a99f50918c3e44954668c1276ad3bad2d2cdf883aba887046f0d9c26e25513a712d0a2c148e3b5107403ff9f9bf29258030da0d8b316a0493a1677aacf0c2e840de6ce20064a40c868eafb8dd5759e00067d6e7f6dfa489cb011ac7b0b5db1040aa29df444e8cbb2a3be4bc534b569fae45205b0b66fab20026e852509f6b4cfb0dbdc7da9d439c5b4"}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r0, 0x50, &(0x7f0000000400)}, 0x10) 2018/04/05 21:37:26 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000400008fe7bb5cd4e344cd0002800000720a00ff"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xf, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x1abc17}, [@jmp={0x5, 0x0, 0xffffffcd}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) 2018/04/05 21:37:26 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6ffffff00000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:26 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:26 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xf10, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:26 executing program 6: bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)={&(0x7f0000000000)='./file0\x00', 0x0, 0x18}, 0x10) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x5, 0xf0, 0x8, 0x5, 0x3, 0x1, 0x10000}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x4, 0x5, 0x5, 0x106d, 0x11, r0, 0xfffffffffffffffd}, 0xfffffffffffffef0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x6, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0x3bc, &(0x7f00001a7f05)=""/251}, 0x46) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0xfffffffffffffe3c, &(0x7f0000000040)="43d0ee4ea56962731f27ff041d38", &(0x7f0000000100)=""/182}, 0x101) 2018/04/05 21:37:26 executing program 2: bpf$MAP_CREATE(0x10000000, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:26 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0xfa}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={r0, &(0x7f0000000180)="b06a7c232f26aa9b67c9294542da0d56e098e2e49f79f8f87f59f1203b83600dd94a0c50f446889648d8448aba382c46185d4987ecd465fa4c80a0033785b40765714c1cc6892b24d1779acb3de797951bec2c958c03c074148bb3c575c13cfbddbbe807cc6a3e52998614fff235b4b6aeab3bee332ed6df42e4e496deb539b00f8ae7c235cc811dcf85a8cd136af86c2776ae9894bfcecbf922b334c59486705ba4961db28a86e9d983cfd4b8b9deeafb846616da44", &(0x7f0000000240)=""/93}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r1, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_udp(0xb, 0xfffffffd, 0x7fffffffefff, &(0x7f0000000080)) 2018/04/05 21:37:26 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000000000000000000028000006a0a00fffffff6006118"], &(0x7f0000000080)='syzkalleP\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xd, 0x200001ba, &(0x7f0000000000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0xbb, &(0x7f0000000300)=""/187}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r0, 0x50, &(0x7f0000000400)}, 0x10) 2018/04/05 21:37:26 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:26 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:26 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000400008fe7bb5cd4e344cd0002800000720a00ff"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xf, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x3f00000000000000}, [@jmp={0x5, 0x0, 0xffffffcd}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) 2018/04/05 21:37:26 executing program 4: socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x28a, &(0x7f0000000000)}, 0x0) recvmsg(r0, &(0x7f0000003800)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000200)=""/129, 0x81}, {&(0x7f0000000300)=""/185, 0xb9}, {&(0x7f00000003c0)=""/143, 0x8f}, {&(0x7f0000000040)=""/120, 0x78}, {&(0x7f0000000500)=""/151, 0x97}], 0x5, &(0x7f0000000680)=""/169, 0xa9}, 0x140) socketpair$ax25(0x3, 0x8000000080000003, 0x2, &(0x7f0000000000)) 2018/04/05 21:37:26 executing program 2: bpf$MAP_CREATE(0x4, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:26 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000000000000000000028000006a0a00fffffff6006118"], &(0x7f0000000080)='syzkalleP\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="180001000000000000000000000000000500000000000000fdff0000000000009500000000000000"], &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r1, 0x50, &(0x7f0000000400)}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0xdc, 0x1000, &(0x7f0000000480)="6961ec71207eee0604979e1b8828fe3ab3bd60a89d359a0acd82748a4f1e70ea16a7667ecbd7f7911b0e51d490006c8203cedf3753704087dca688a9866d66ead83183fdb9dd19451b6c374f9353ba14afddf1167382c5a5661ec8f230f2ccd1cbf6157e83662560e45e009511d01512e310d6923e59e10071c86eef51f01d0b98830ed98852b4d5e2279103ba517ecb8d30861ff1881654fef2f7dcbc08f95c9307bbf5d3d7a3a853fa0a5fbce43bf21c2729a039a5bf7d9293845d9847d3d6988eaf54629204af3205029a4c7a6207956cc9857a62f66ad8121e1b", &(0x7f0000000580)=""/4096, 0x2, 0x357}, 0x28) mkdir(&(0x7f0000000140)='./file0\x00', 0x40) 2018/04/05 21:37:26 executing program 6: recvmsg$kcm(0xffffffffffffffff, &(0x7f0000002b40)={&(0x7f00000027c0)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x80, &(0x7f0000002a80)=[{&(0x7f0000002840)=""/171, 0xab}, {&(0x7f0000002900)=""/89, 0x59}, {&(0x7f0000002980)=""/237, 0xed}], 0x3, &(0x7f0000002ac0)=""/74, 0x4a, 0x5}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000002b80)={0xc, 0x5, &(0x7f0000000200)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x4}, [@ldst={0x0, 0x1, 0x6, 0xa, 0x871998c62a6755e3, 0xfffffffe, 0x14}], {0x95}}, &(0x7f0000000240)='syzkaller\x00', 0x2, 0xa4, &(0x7f0000000280)=""/164, 0x40f00, 0x1, [], r0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000003000)={0x0, 0x1ffffffffffffe3d, &(0x7f0000008000)=ANY=[@ANYBLOB="18000000000000000000000000000000950000005a000000"], &(0x7f0000008000)='syzkaller\x00', 0x25, 0x7f, &(0x7f0000008000)=""/127}, 0x48) socketpair(0x0, 0x0, 0x3ff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x7f) r3 = getpid() getpid() r4 = perf_event_open(&(0x7f0000000040)={0x3, 0x70, 0xffffffff, 0xfffffffffffffff9, 0x40, 0x3, 0x0, 0x1ff, 0xc0, 0x4, 0x1f, 0x37d, 0x2, 0x300, 0x2, 0x39, 0x1, 0x1f, 0x8, 0x0, 0x6, 0x8, 0x6, 0xeca, 0xffff, 0x1, 0x42e8, 0x80, 0x9, 0x3, 0x80, 0x3f, 0x8, 0x4, 0x19d, 0x0, 0x1336, 0x9252, 0x0, 0x6, 0x4, @perf_config_ext={0x5, 0x7}, 0x200, 0x1, 0x772, 0x4, 0xa15b, 0x7, 0x2}, r3, 0x0, r2, 0x8) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3, 0x401, 0x9, 0x8, 0x0, 0xffffffffeffffff9, 0x100, 0x8, 0x1f, 0x25, 0x6, 0xffff, 0x1, 0x4, 0x18b2d745, 0x1, 0x9, 0x0, 0x10001, 0x9, 0x3, 0x1, 0xd44, 0x1b0, 0x5, 0xc7a2, 0x765, 0x1, 0x92, 0x9, 0x2, 0x9, 0x6, 0x2, 0x2, 0x9d4, 0x0, 0x4, 0x5, @perf_config_ext={0x71, 0x40}, 0x8, 0x41, 0x8, 0x3, 0x347, 0x7, 0x96}, r3, 0x5, r4, 0x9) bpf$PROG_LOAD(0x5, &(0x7f0000001fb8)={0x1, 0x5, &(0x7f0000003000)=@framed={{0x18, 0x6}, [@alu={0x0, 0x0, 0xffffff85}], {0x95}}, &(0x7f0000002ff6)='syzkaller\x00', 0x7e0, 0xffffff8a, &(0x7f0000002f19)=""/231}, 0x47) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={r2, 0x28, &(0x7f00000000c0)}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r2) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f00000001c0)=0x7) 2018/04/05 21:37:26 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0x901, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:26 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:26 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:26 executing program 2: bpf$MAP_CREATE(0x7000000, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:26 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000400008fe7bb5cd4e344cd0002800000720a00ff"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xf, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x3000000}, [@jmp={0x5, 0x0, 0xffffffcd}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) 2018/04/05 21:37:26 executing program 4: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x7, 0x1}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) socketpair(0x1d, 0xa, 0x800, &(0x7f0000000180)) perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=ANY=[@ANYBLOB="18000000001000000000000000000000711000000000000000000008000000009500000000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) socketpair$inet_udp(0x15, 0x2, 0x0, &(0x7f0000000080)) 2018/04/05 21:37:26 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:26 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=ANY=[], &(0x7f0000000080)='syzkalleP\x00', 0x0, 0xce, &(0x7f0000000180)=""/206, 0x0, 0xfffffffffffffffe}, 0x48) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d80)={0x0, r0, 0x6, 0x1}, 0x14) socketpair(0x1, 0x4, 0x401, &(0x7f0000000480)) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000000000000000000000000100500000000000000000000050000000095000000000000e4"], &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r1, 0x50, &(0x7f0000000400)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000e00)=r2, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x2, 0x12, &(0x7f0000000e40)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x7}, @generic={0x6, 0x7f, 0x40, 0x80}, @generic={0x9, 0x0, 0x7, 0x5}, @alu={0x7, 0xfffffffffffffff7, 0x4, 0xa, 0xd, 0x40, 0xfffffffffffffff0}, @exit={0x95}, @alu={0x0, 0x3, 0x1, 0x0, 0xf, 0x38, 0x10}, @call={0x85, 0x0, 0x0, 0x21}, @ldst={0x3, 0x3, 0x2, 0x3, 0x2, 0xc, 0xfffffffffffffff0}, @exit={0x95}], &(0x7f0000000f00)='syzkaller\x00', 0x2, 0xf5, &(0x7f0000000f40)=""/245, 0x41100, 0x1}, 0x48) socketpair(0xe, 0x8000a, 0x100, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f00000004c0)) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000d00)) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000500)=@pppol2tp={0x18, 0x1, {0x0, r4, {0x2, 0x4e24, @multicast2=0xe0000002}, 0x2, 0x1, 0x1}}, 0x80, &(0x7f0000000140)=[{&(0x7f0000000580)="b04e717936b16e916161109337656651561bf37b5e9dfebdf189745ac2da17d33d0ec246bda6e1cd851afee8fc31152cbc0a70134d14af03cde03e81e21dd105475ce082ca910471d11ac2b0cd96d0b228fbecc1bf5b45a5b5d2adcaf814b96422a685ba89207fcc42b88661d9a49e5cfee753dd296565755084d1ebb02ed1cbee50a432c3fb47e51e3b7305e6154ad3cf87fe0b0192130d82cf59cb97fa3381f6833292b75a40cfcf", 0xa9}, {&(0x7f0000000640)="88eb0a6ea32174e2ebc72943da0fc89071ac246416c5a57523a3034254ef9f2635354e97a5f28703f1e982d453fc172aaccf50eaca53add2fd99b4d23e58b31c1a02cf0890ef24dc26505372e09e6dea0c29a87af664749b680268fab79c1dc878d36340b579c561548a0d43adea4261815ba654b74274278bfe6d76860fa65e578154ddd224bcd9507743c5d2559b6ffcdbf30ed234b567031a08", 0x9b}], 0x2, &(0x7f0000000700)=[{0x100, 0x115, 0x1, "824ffdaaf3313e179198554451f468f9fbd284506eafa837ba81e0d0fbae06df84ad1b2752a6fa2f39235f74f8c0d019fb941e5315ba9be4c63869b0cfa60da625db6dcf49d2d4d2596a09ce1bcfc65295fdbda0959b6ab0ef17697b597ee4c2c841a06ec55133227c274541f503a6408ff2274ecff5a3a304c4ef929d363710232fabb6afe7b51587cd5a5826a82e06540e28d79886e6f8997745e73717f91f7c0240cb48059cd3db07876d1dc87e38282fa5c28d2da06541979ae6ef4fae817070382c8a80a14db544c53ae8545b3667e003f18a9a1b4fba6c2ac29f8c9b9f66dc575f83e7105c0e3c"}, {0xb8, 0x12f, 0xffffffffffffffff, "4f83a165b69bd2c2ba7f4f3e02ea6ee6ea3c1f962ddc5bfc86ae1984939f2724cfbaaaa34b84ec7630214e2ca131ac1443bbe7ceec14a2cb6bc108202c152d221f9089247cdb8a0fe1320219877b22471b8781d4ee6a87a8a5ffd4bba4ef950a37a09ecdf7c23e57bd19e63a503c5eb9107e35bea18a4883cac1ee9294eca9de01eadf52028e946d1b8db445462874f0751e63682588b456f2a7fd9506f1888cb36fa3fa77b6"}, {0x68, 0x0, 0x6, "650e3f1ab80d7c520fb99a0b18d4546f63f391dcc0e9f21b14f7cf06683c68f6b344be4a051453f794133b6ede6f4173eb7a14d28d47e23958ca86c5dd96327a663c7bac6ae0487264750b32c23fc379283f"}], 0x220, 0x20000000}, 0x0) recvmsg(r3, &(0x7f0000000cc0)={&(0x7f0000000940)=@pppoe={0x0, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000000c00)=[{&(0x7f00000009c0)=""/35, 0x23}, {&(0x7f0000000a00)=""/7, 0x7}, {&(0x7f0000000a40)=""/31, 0x1f}, {&(0x7f0000000a80)=""/231, 0xe7}, {&(0x7f0000000b80)=""/78, 0x4e}], 0x5, &(0x7f0000000c80)=""/16, 0x10, 0x7}, 0x2000) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000d40)) socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f0000000dc0)) 2018/04/05 21:37:26 executing program 6: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x107d}, 0x2c) socketpair$inet6(0xa, 0xa, 0xcbed, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='syzkaller\x00', 0x5c6e, 0x453, &(0x7f00001a7f05)=""/251}, 0x48) bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00', 0x0, 0x8}, 0x10) 2018/04/05 21:37:26 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xe9d, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:26 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:26 executing program 2: bpf$MAP_CREATE(0xb000000, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:26 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000400008fe7bb5cd4e344cd0002800000720a00ff"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xf, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x6000000}, [@jmp={0x5, 0x0, 0xffffffcd}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) 2018/04/05 21:37:26 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001, 0xffffffffffffffff}, 0x2c) socketpair(0x2, 0x803, 0x10000, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000140)="20f04517f219761e2cd75f7272ed41cf268d422da14e5788a6c4b5e3ad06b5693d28ee9c10447ff25a1f1818bd0300000000000000ab676c4696e4fb5307cfdf7b8da04c4b2c517ec648c6465ae8daab7c40a581997b0f682f42f2e48ab309e0910d4eb1757c3e5619f081122057eda7f0c1d4", &(0x7f0000000040)="5eb720f16d592b07c07218417f2f69fdd2fc300c41decc39a844bbf17a3409c34c68b9c6bfb93b6e155425b71c599011c18cede53ae17aff975a54508e17d1639164d3bf81e5081d531830cf51b1bea157aa43c589bd5e7be727f7bfc6c9f1f59af4f3ffffc5de31d3c8f81dda90ee49de139f79ab88ee2d90859c00c31221ac7f79c9f9a8ef889cdc4cdf20a21ad21fb74818971da843e7e66b6f5b92f9f3660192aef700b40b4fbe2f7656e77abd28029e5d19e22b8362144537d0a1aaf748"}, 0x20) 2018/04/05 21:37:26 executing program 6: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000013000)={0x1, 0x100000080, 0xa, 0x1000000000000008}, 0x2c) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000000), 0x4) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f000000b000)={r0, &(0x7f0000014000)='A\b', &(0x7f0000012000)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f000000b000)={r0, &(0x7f0000012000), &(0x7f000000cff6)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f000000a000)={r0, &(0x7f0000008000), &(0x7f0000016f02)=""/254}, 0x18) 2018/04/05 21:37:26 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0x156, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:26 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x12d}, 0x1000002be) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r1, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) recvmsg(r2, &(0x7f00000086c0)={&(0x7f0000008300)=@can={0x0, 0x0}, 0x80, &(0x7f0000008600)=[{&(0x7f0000008380)=""/185, 0xb9}, {&(0x7f0000008440)=""/151, 0x97}, {&(0x7f0000008500)=""/225, 0xe1}], 0x3, &(0x7f0000008640)=""/128, 0x80, 0x7}, 0x2) bpf$PROG_LOAD(0x5, &(0x7f0000008700)={0x7, 0x10, &(0x7f0000000180)=@raw=[@generic={0x7, 0x8, 0xb7, 0x3}, @exit={0x95}, @alu={0x77b4329af1a5b4d0, 0x7, 0x7, 0x0, 0x5, 0x0, 0x4}, @generic={0xc14f, 0x3, 0xd87a, 0xd11a}, @exit={0x95}, @map={0x18, 0x7, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2e}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x9}], &(0x7f0000000000)='GPL\x00', 0x7, 0xef, &(0x7f00000002c0)=""/239, 0x41100, 0x1, [], r3}, 0x48) 2018/04/05 21:37:26 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000000000000000000028000006a0a00fffffff6006118"], &(0x7f0000000080)='syzkalleP\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xd, 0x5, &(0x7f0000000040)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r0, 0x50, &(0x7f0000000400)}, 0x10) socketpair$ax25(0x3, 0x7, 0xf0, &(0x7f00000003c0)) 2018/04/05 21:37:26 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8cffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:26 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8cffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:26 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000400008fe7bb5cd4e344cd0002800000720a00ff"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xf, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x6800}, [@jmp={0x5, 0x0, 0xffffffcd}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) 2018/04/05 21:37:26 executing program 2: bpf$MAP_CREATE(0x40000000, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:26 executing program 6: socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000080)) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x75}, 0x2c) perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x36, &(0x7f00001a7f05)=""/251}, 0x18) close(r0) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x400000004, 0x211}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xfffffffffffffffd, 0x21a9, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000000000)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r1, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_udp(0x400000, 0x2, 0xd, &(0x7f00000001c0)) 2018/04/05 21:37:27 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xb92, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:27 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:27 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:27 executing program 2: bpf$MAP_CREATE(0xf00, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:27 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000400008fe7bb5cd4e344cd0002800000720a00ff"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xf, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x7a00000000000000}, [@jmp={0x5, 0x0, 0xffffffcd}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) 2018/04/05 21:37:27 executing program 6: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9}, 0x3d1) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000028000)={r1, &(0x7f0000000200), &(0x7f0000000240)="13"}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r1, &(0x7f0000000040)}, 0x10) r2 = getpid() ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x5) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0xffffffffffff0001) perf_event_open(&(0x7f00000000c0)={0x4, 0x70, 0xe06, 0xed, 0x401, 0x189, 0x0, 0x45874855, 0x20000, 0x6, 0x0, 0x400, 0xffffffffffff5edd, 0xffffffff, 0x8e, 0x7, 0xff, 0x1, 0x8001, 0x6, 0x4, 0x3, 0x4, 0x200, 0x2, 0x1f, 0x9, 0x75, 0x7, 0x0, 0x9, 0x9, 0x8001, 0x77b, 0x5, 0x4, 0x5, 0x3, 0x0, 0x2, 0x0, @perf_config_ext={0x1, 0x8000}, 0x8, 0x1, 0x6, 0x7, 0x3, 0x8, 0x7}, r2, 0x2, r0, 0x1) gettid() 2018/04/05 21:37:27 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x20}, 0x13) bpf$PROG_LOAD(0x5, &(0x7f0000a12fb8)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000000000)="e1ff181fc87b79a7ed281207bb78bc80ee1cdf1fb03ed15a3482721ca1a2a4ee5f924cfd484123f76797aa8ea830de7af91192d465bb4e08b2d9dacc368e1fb0412f", 0xfffffffffffffff8, 0xfb, &(0x7f00001a7f05)=""/251, 0x41000}, 0x48) r0 = perf_event_open(&(0x7f00000000c0)={0x7, 0x70, 0x40, 0x1, 0xffffffffffffffd3, 0x2, 0x0, 0x3ff, 0x8c0, 0x2, 0x3f, 0x4, 0x0, 0x4, 0x10001, 0x5c9, 0x0, 0xe13, 0x9, 0x1f, 0x1, 0x10f, 0xf2, 0x7, 0x0, 0x1, 0x4, 0xffffffffffff7fff, 0xffffffff, 0x8, 0xbc, 0x6000000000, 0x0, 0x0, 0x4, 0x2, 0x2, 0x7, 0x0, 0xe70, 0x6, @perf_bp={&(0x7f0000000080), 0xe}, 0x240a0, 0x2, 0x7, 0x7, 0xffffffff, 0x6, 0x7}, 0xffffffffffffffff, 0x6, 0xffffffffffffff9c, 0x2) socketpair(0x3, 0x1, 0xe1600, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r1, &(0x7f0000000180)="6ff745ee3f2b0cfac789df394745f357c5ca767ec003d938933e20b28bafa3c32aa3fb6b8ff4177dd3d98729b0a45a9ac77b944878abf620c9ea86e835a5b937fec4dbed5a8cb41ddf8c83d390cc76b093150db2a98799676b8b1853dcd5e24c78f6b5d49d3d40a0c17648637dff08c33cf127f15f37b4b693130560e469581c7c4b", &(0x7f0000000240)=""/221}, 0x18) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) 2018/04/05 21:37:27 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="c13de79b34b799fa011c1b081618000000000000000000000002"], &(0x7f0000000080)='syzkalleP\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000140)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xd, 0x5, &(0x7f0000000040)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) socketpair(0xa, 0x5, 0xa0e5, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$kcm(0x29, 0x7, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000580)={r0, &(0x7f0000000000)="0bd17f31a304a94a1a09cb", &(0x7f0000000500)=""/116}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f00000005c0)={r3, r1}) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000480)={r3}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r0, 0x50, &(0x7f0000000400)}, 0x10) 2018/04/05 21:37:27 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:27 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8cffffff00000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:27 executing program 2: bpf$MAP_CREATE(0x600, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:27 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0x4f, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:27 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000028000)={r0, &(0x7f0000000200), &(0x7f0000000240)="13"}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r0, 0x2a3, &(0x7f0000000080)={0x0, 0x0}}, 0x10) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000180)={r0, &(0x7f0000000140)="9045113e654f56eb27d6c5a080cafd7ede8e18da05393102d62ace09ab51e334bdcfbf287301e75596"}, 0x10) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100)={r1}, 0xc) socketpair$inet6(0xa, 0x3, 0x7fffffff, &(0x7f00000001c0)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000040)) close(r2) 2018/04/05 21:37:27 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000400008fe7bb5cd4e344cd0002800000720a00ff"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xf, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x6c00000000000000}, [@jmp={0x5, 0x0, 0xffffffcd}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) 2018/04/05 21:37:27 executing program 6: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9}, 0x3d1) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000028000)={r1, &(0x7f0000000200), &(0x7f0000000240)="13"}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r1, &(0x7f0000000040)}, 0x10) r2 = getpid() ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x5) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0xffffffffffff0001) perf_event_open(&(0x7f00000000c0)={0x4, 0x70, 0xe06, 0xed, 0x401, 0x189, 0x0, 0x45874855, 0x20000, 0x6, 0x0, 0x400, 0xffffffffffff5edd, 0xffffffff, 0x8e, 0x7, 0xff, 0x1, 0x8001, 0x6, 0x4, 0x3, 0x4, 0x200, 0x2, 0x1f, 0x9, 0x75, 0x7, 0x0, 0x9, 0x9, 0x8001, 0x77b, 0x5, 0x4, 0x5, 0x3, 0x0, 0x2, 0x0, @perf_config_ext={0x1, 0x8000}, 0x8, 0x1, 0x6, 0x7, 0x3, 0x8, 0x7}, r2, 0x2, r0, 0x1) gettid() 2018/04/05 21:37:27 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:27 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000000b7c2df8eba72ee2000fffffff6006118"], &(0x7f0000000080)='syzkalleP\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) socketpair(0x13, 0x7, 0x80, &(0x7f00000003c0)={0xffffffffffffffff}) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f0000000480)=@in={0x2, 0x4e22, @multicast2=0xe0000002}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000500)="437f2e66b8218780035f244b993d6db7af232acaf4d426318d99b3a2dbceb45b139f372bdf637cca94b25123b499922bccc13e333452ac8e", 0x38}], 0x1, &(0x7f0000000580)=[{0x38, 0x11f, 0x1, "4940c9cfff18856932d824961b45a2520cca5549e8b91dc8016228c14f0c9da575"}, {0x18, 0x10e, 0x15e6, "a61b55"}], 0x50, 0x4000}, 0x20000000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xd, 0x5, &(0x7f0000000040)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r1, 0x50, &(0x7f0000000400)}, 0x10) socketpair(0x0, 0x803, 0x7, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000140)={0x1, 0x0, [0x0]}) 2018/04/05 21:37:27 executing program 2: bpf$MAP_CREATE(0x500, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:27 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6ffffff00000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:27 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:27 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xbb4, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:27 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x4, 0x0, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x1e, 0x0, 0x3, 0x6, 0x1, r0, 0x6773}, 0x2c) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1, 0x2, 0x7, 0x8001, 0x10, 0xffffffffffffffff, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000580)={0xffffffffffffffff, &(0x7f00000004c0)="a3261c57", &(0x7f0000000500)="cd8249bf39d6176ef7346799ac199e6cf9e7fe02418812a394d9c874384d4ba7bd9d3b261f1a018d54c20e688a5dc8a23babc41d618eab351795754d5fa3ad297aec7e01f2990b", 0x2}, 0x20) sendmsg(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080), 0x1e}], 0x1000000000000020}, 0x8000) sendmsg(r1, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000340)="654e8525c3d8a3a269fffab981c018ecd1ed1d41250e8cefbd5ee4bae370ceb76f18994299803c8f3c007db0b506d27a8d38bfd14b9dbdb9ab629de7de0672b365dce9cc2ecdff6971cd9b53ca275ecf9b426cade30df9ed069f246ad81f0fb4cef7a4d8504b908dddbad5235664fb43456c105d465f9e08de48116686d69255a3fb4d9f00907b0d2bb8743018c8568cdd1a098362e9db2beb107321a56d3b31b84590e0ea80d526985b20473a7c", 0xae}], 0x1, 0x0, 0x0, 0x80}, 0x20000000) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000cc0)={r0, &(0x7f0000000d00)="84b5889c89514576f86b113056b6690de33362635ca366bb4845db90f5d1d0ba080143019ab994cdb033705fe25779afe087b603c9fe2b86dca2b13ac139da1de09f11af8c65e12747c80fb68a27509f75a112b5dd6cae689241ea9bf5df2ac8e09e234ca601980132e69a93c9be9654a3bd08c57d630a03f97229ff8719ea20ccf01e7a8b86067c3d1558c3e4079ac615600463428d1bd8619094bdee7f5841d90a7c6acb9d45804625b5712299d6997d70048b1c634a9855d9b3405de613695b655168164eaf6360cc7cb2dfee2a39edba35ab65799f2659a236f447a4355883cec848af7cdcaf9bfbb13169112d81ffa071db405799359645804fe10972a7c9c345e3d712218ba72679f4134423b07c3723b5d4d222e513f29a67d931dfadabba0f1ec17d593bf30095f9157276be89461d1019c471c99cdb81e29eee63f0b1e42a1bd9a000a835a8642ebd862cad8687d0c4452cfe7f", &(0x7f0000000c00)=""/166}, 0x18) mount(&(0x7f0000000440)='./file0\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='pstore\x00', 0x4, &(0x7f0000000640)="afb63e3ff55419f9e9572aabeb90d8184a20d3c850fa576f0f0d376978dcd77395a8eb26002ef5146d") r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x60) r3 = perf_event_open(&(0x7f0000000200)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000000), 0x8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r2) close(r3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xfb2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000003700)={&(0x7f0000000280)=@pppoe={0x0, 0x0, {0x0, @broadcast}}, 0x80, &(0x7f00000036c0)=[{&(0x7f0000003400)=""/251, 0xfb}, {&(0x7f0000003500)=""/14, 0xe}, {&(0x7f0000003540)=""/107, 0x6b}, {&(0x7f00000035c0)=""/211, 0xd3}], 0x4, 0x0, 0x0, 0x3ff}, 0x1) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000180)) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000dec000)={0x6, 0x4, 0x338d, 0x7}, 0x2c) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000940)={0xf, 0x61f3, 0x8, 0x2, 0x0, r6, 0x3ff}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000a00)={r7, &(0x7f0000000980)="8da5278de09964879bdfc0940038c991c310ab83636d0bceac8b", &(0x7f00000009c0)=""/59}, 0x18) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f00000001c0)) bpf$MAP_CREATE(0x0, &(0x7f00000007c0)={0xf, 0x100000001, 0x3, 0x5, 0x2, 0xffffffffffffffff, 0x9}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000c88000)={r6, &(0x7f0000847f95), &(0x7f000089b000)}, 0x18) mkdir(&(0x7f0000000a40)='./file0\x00', 0x80) socketpair(0x10, 0x5, 0x3f, &(0x7f0000000700)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMUNATTACH(r8, 0x89e1, &(0x7f0000000880)={r4}) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000800)) close(r5) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000900)={&(0x7f00000008c0)='./file0\x00'}, 0x10) 2018/04/05 21:37:27 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000400008fe7bb5cd4e344cd0002800000720a00ff"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xf, 0x5, &(0x7f0000000040)=@framed={{0x18, 0xffffffff00000000}, [@jmp={0x5, 0x0, 0xffffffcd}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) 2018/04/05 21:37:27 executing program 6: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9}, 0x3d1) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000028000)={r1, &(0x7f0000000200), &(0x7f0000000240)="13"}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r1, &(0x7f0000000040)}, 0x10) r2 = getpid() ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x5) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0xffffffffffff0001) perf_event_open(&(0x7f00000000c0)={0x4, 0x70, 0xe06, 0xed, 0x401, 0x189, 0x0, 0x45874855, 0x20000, 0x6, 0x0, 0x400, 0xffffffffffff5edd, 0xffffffff, 0x8e, 0x7, 0xff, 0x1, 0x8001, 0x6, 0x4, 0x3, 0x4, 0x200, 0x2, 0x1f, 0x9, 0x75, 0x7, 0x0, 0x9, 0x9, 0x8001, 0x77b, 0x5, 0x4, 0x5, 0x3, 0x0, 0x2, 0x0, @perf_config_ext={0x1, 0x8000}, 0x8, 0x1, 0x6, 0x7, 0x3, 0x8, 0x7}, r2, 0x2, r0, 0x1) gettid() 2018/04/05 21:37:27 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000000000000000000028000006a0a00fffffff6006118"], &(0x7f0000000080)='syzkalleP\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xd, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000020000000000000000000050000000000000000000000000000009500e7c91b5a656dedb4b0c41bc089700f000000000080"], &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r0, 0x50, &(0x7f0000000400)}, 0x10) 2018/04/05 21:37:27 executing program 2: bpf$MAP_CREATE(0xc00, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:27 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:27 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0x415, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:27 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8cffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:27 executing program 5: socketpair(0xb, 0x6, 0x101, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000000000000000000028000006a0a00fffffff6006118"], &(0x7f0000000080)='syzkalleP\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xd, 0x5, &(0x7f0000000040)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r1, 0x50, &(0x7f0000000480)}, 0xfffffeb7) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000002c0)='em0\x00') 2018/04/05 21:37:27 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000400008fe7bb5cd4e344cd0002800000720a00ff"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xf, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x400000000000000}, [@jmp={0x5, 0x0, 0xffffffcd}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) 2018/04/05 21:37:27 executing program 6: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9}, 0x3d1) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000028000)={r1, &(0x7f0000000200), &(0x7f0000000240)="13"}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r1, &(0x7f0000000040)}, 0x10) r2 = getpid() ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x5) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0xffffffffffff0001) perf_event_open(&(0x7f00000000c0)={0x4, 0x70, 0xe06, 0xed, 0x401, 0x189, 0x0, 0x45874855, 0x20000, 0x6, 0x0, 0x400, 0xffffffffffff5edd, 0xffffffff, 0x8e, 0x7, 0xff, 0x1, 0x8001, 0x6, 0x4, 0x3, 0x4, 0x200, 0x2, 0x1f, 0x9, 0x75, 0x7, 0x0, 0x9, 0x9, 0x8001, 0x77b, 0x5, 0x4, 0x5, 0x3, 0x0, 0x2, 0x0, @perf_config_ext={0x1, 0x8000}, 0x8, 0x1, 0x6, 0x7, 0x3, 0x8, 0x7}, r2, 0x2, r0, 0x1) gettid() 2018/04/05 21:37:27 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0xc, 0x3, &(0x7f0000000180)=ANY=[@ANYBLOB="ee1f1fe07437cc32e3000000000000000000000020000000"], &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x99, &(0x7f000000d000)=""/153}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000001c0)={r0, 0x37, &(0x7f00000000c0)}, 0x9) r1 = socket$kcm(0x29, 0x7, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000200)=r0, 0x4) mkdir(&(0x7f0000000140)='./file1\x00', 0x23) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000480)={r0, 0x0, 0xe, 0xaf, &(0x7f00000002c0)="aa330ccaf9e86e1aa5f8abf11fa4", &(0x7f0000000000)=""/175, 0x0, 0x1000000}, 0x28) 2018/04/05 21:37:27 executing program 2: bpf$MAP_CREATE(0x5, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:28 executing program 2: bpf$MAP_CREATE(0x18, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:28 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:28 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6ffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:28 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000400008fe7bb5cd4e344cd0002800000720a00ff"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xf, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x4c000000}, [@jmp={0x5, 0x0, 0xffffffcd}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) 2018/04/05 21:37:28 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0x118, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:28 executing program 6: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9}, 0x3d1) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000028000)={r1, &(0x7f0000000200), &(0x7f0000000240)="13"}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r1, &(0x7f0000000040)}, 0x10) r2 = getpid() ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x5) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0xffffffffffff0001) perf_event_open(&(0x7f00000000c0)={0x4, 0x70, 0xe06, 0xed, 0x401, 0x189, 0x0, 0x45874855, 0x20000, 0x6, 0x0, 0x400, 0xffffffffffff5edd, 0xffffffff, 0x8e, 0x7, 0xff, 0x1, 0x8001, 0x6, 0x4, 0x3, 0x4, 0x200, 0x2, 0x1f, 0x9, 0x75, 0x7, 0x0, 0x9, 0x9, 0x8001, 0x77b, 0x5, 0x4, 0x5, 0x3, 0x0, 0x2, 0x0, @perf_config_ext={0x1, 0x8000}, 0x8, 0x1, 0x6, 0x7, 0x3, 0x8, 0x7}, r2, 0x2, r0, 0x1) 2018/04/05 21:37:28 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x0, 0x0, 0x12d9, 0x0, 0x0, 0xffffffffffffffff, 0x6}, 0x2c) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)=@l2, 0x1ae, &(0x7f0000000180)=[{&(0x7f0000000040)=""/131, 0xfe78}, {&(0x7f0000000000)=""/3, 0x3}, {&(0x7f0000000180)=""/138, 0x8a}, {&(0x7f0000000240)=""/233, 0xe9}], 0x4, &(0x7f0000000380)=""/4096, 0x946}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000002a80)={&(0x7f0000000340)=@nfc={0x27, 0x7fff, 0x1ff}, 0x80, &(0x7f00000013c0), 0x100000000000006c, &(0x7f00000017c0)}, 0x0) sendmsg(r0, &(0x7f00000004c0)={0x0, 0x380, &(0x7f0000000100), 0xa7, &(0x7f0000000200)}, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xa, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r1, 0x28, &(0x7f0000000040)={0x0, 0x0}}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={r1, &(0x7f0000000180)="4fcd6115dd3aa3526df43c2c2a8f299d3fa0203f3794cd994c5501f12a40dfdad1ea744a65b02a1ff86fad977c4c8887e2c7bee6a66a7a2dcbe045c90aec1771a89d0f2e74e039f443914aa65f6b35c629", &(0x7f0000000200)="25ab7e0487d1bd404f3d0159fa1d465bc6aa0afb43c145cf2339ed3c71ed993793c474dbf8c401062be38a81dbfcb9a40803748b4ea22265f381031643c24f6e25ef692fb30b3586870b11d9cb2443f44cf38c52e3963c57225993a23f4a8f28e22811690f9f20bc4e70fed8ba02422f19f2ce8727ddeeb06586b4d10d28cb9450f7a5597c2e5e593f5bc2d4054c935db9cd3a5d5f42b41fbf4ebbe6c39f6a4a879dc6652dd875368043fd"}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100)={r2, 0x0, 0x8}, 0xc) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000001480)={r1, &(0x7f0000001380)="d2512026477c65dcceeac365bb3568b8e28bee6236dbea26cffa17d995c562a4f26447ff84f3812849c3381bf7d470902d04e29856f899a6e0cf63ea9e52e4ccb120d9b5bad9ad235f74f9031a669c85e232bb1be5c2a133a7597577696539f460610832420e1e128b0e0594923d171e4476dcf4761a997c7153c39d1778d205e0c92bddcbb2ab04bf68669aad7745ea8feaf9b1891315a0e51712fd26191f1afc37a3c6ca", &(0x7f0000001440)=""/39}, 0x18) 2018/04/05 21:37:28 executing program 5: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000140)={&(0x7f0000000040)='./file0\x00', 0x0, 0x10}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000580)={r0, &(0x7f0000000480)="93c39c6d3be045c227f76c6b05023447b5dcdf0dfbd15e5d5f3a3a03d8e824fcde36d837c82172805a9969d25b61a28126c957c68dbc8b2ea44dcc92b01761baa4a8beeffb249a1ff291d64eb1c016bec4afa18db34aa88c1691873402f6103573d052edaec280a10476674cb7e4af54c13e69855c9671c29da2382c6b7ce931806caec4f4017cf7f058760faea8e3ddbdf40443d92cb17e76a6dc38e089190412c10c1e8b461df26ccf6a835695baa4f4631d59a8e3bf05b2d86f759665bc05016df80ae2e469c6a824f6ff62cbf80d9e902cd2", &(0x7f00000003c0)="7eac5c80adc31c08ea75ec89a34f451fd9e1f1ac42731ba405fb56", 0x2}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x1, &(0x7f0000000040)=ANY=[], &(0x7f0000000080)='syzkalleP\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) socketpair(0x11, 0x80806, 0x0, &(0x7f00000006c0)={0xffffffffffffffff}) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000740)={r2}) recvmsg(r0, &(0x7f0000000c40)={&(0x7f0000000800)=@can={0x0, 0x0}, 0x80, &(0x7f0000000bc0)=[{&(0x7f0000000880)=""/136, 0x88}, {&(0x7f0000000940)}, {&(0x7f0000000980)=""/241, 0xf1}, {&(0x7f0000000a80)=""/144, 0x90}, {&(0x7f0000000b40)=""/109, 0x6d}], 0x5, 0x0, 0x0, 0x8001}, 0x2001) bpf$PROG_LOAD(0x5, &(0x7f0000000c80)={0x1, 0x2, &(0x7f00000005c0)=@raw=[@exit={0x95}], &(0x7f0000000600)='GPL\x00', 0xd00c, 0x49, &(0x7f0000000640)=""/73, 0x41f00, 0x1, [], r3}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xd, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000013000000000000800000000000000000000000009500000000000000"], &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0xbb, &(0x7f0000000300)=""/187}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r4, 0x50, &(0x7f0000000400)}, 0x10) 2018/04/05 21:37:28 executing program 2: bpf$MAP_CREATE(0x9, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:28 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:28 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:28 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000400008fe7bb5cd4e344cd0002800000720a00ff"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xf, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x8510}, [@jmp={0x5, 0x0, 0xffffffcd}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) 2018/04/05 21:37:28 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xbbd, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:28 executing program 6: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9}, 0x3d1) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000028000)={r1, &(0x7f0000000200), &(0x7f0000000240)="13"}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r1, &(0x7f0000000040)}, 0x10) getpid() ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x5) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0xffffffffffff0001) 2018/04/05 21:37:28 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffff, 0x5, 0x10}, 0xc) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000002c0)={r0, &(0x7f0000000140)="27d9a08d0c9e1961ba723827a5ae220bda8fd940c5b279de55ddcb5406fdf585dc0ba3b693d3109fac6808dfe1"}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000000000000000000028000006a0a00fffffff6006118"], &(0x7f0000000080)='syzkalleP\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xd, 0x5, &(0x7f0000000040)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) 2018/04/05 21:37:28 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000e7018000006a0a00ff7ffff600611864000000000000"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xd, 0x5, &(0x7f0000000040)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) 2018/04/05 21:37:28 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:28 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6ffffff00000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:28 executing program 2: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:28 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000400008fe7bb5cd4e344cd0002800000720a00ff"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xf, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x3c}, [@jmp={0x5, 0x0, 0xffffffcd}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) 2018/04/05 21:37:28 executing program 6: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9}, 0x3d1) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000028000)={r1, &(0x7f0000000200), &(0x7f0000000240)="13"}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r1, &(0x7f0000000040)}, 0x10) getpid() ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x5) 2018/04/05 21:37:28 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0xce}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], &(0x7f0000f6bffb)="0000f500", 0x4000000000000000, 0xfb, &(0x7f00001a7f05)=""/251}, 0xa) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r2, &(0x7f0000000140)={&(0x7f00000001c0)=@ethernet={0x1}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000280)="0b434ba78ac651c3c7e0851da4625c0fc6064ac8ecf3082c89c5841d7001a57dc3aa0944f372fa228e634241ec11446aff703aa185646dedfea9cecd2332718a54a74a03046cda76febd3f7368d3101dc9972103afd6393df1d6632dd967ff6d1c71f361bad802509f4680ab898a1b5bf0ce37466baeb0cc5f8e7200638e311f304bb4301e6f048ecef2e7033c4dfd", 0x8f}], 0x1, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x1e0, 0x1}, 0x20000000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000540)={r0, 0x50, &(0x7f00000007c0)}, 0x10) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000240)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_udp(0x7, 0x6f2000, 0x4, &(0x7f0000000180)) r3 = perf_event_open(&(0x7f0000000380)={0x3, 0x70, 0x9, 0x0, 0xff, 0x401, 0x0, 0x10001, 0x0, 0x0, 0x8, 0x7, 0x3, 0xf0, 0x8, 0x800, 0x20, 0x8, 0x7, 0x100000001, 0x200, 0x800, 0x7, 0x7f, 0xa14, 0xffffffffffffff0d, 0x56fe, 0x1f, 0x7fffffff, 0x7, 0x0, 0x4, 0x8a6, 0x81, 0x400, 0x5, 0x8001, 0x6, 0x0, 0x16, 0x2, @perf_bp={&(0x7f0000000340), 0xe}, 0x4004, 0x910, 0x8, 0x1, 0x1, 0xffffffffffffffc0, 0xffffffffffffff01}, 0x0, 0x6, 0xffffffffffffffff, 0xb) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r1) 2018/04/05 21:37:28 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0x25, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:28 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000000000000000000028000006a0a00fffffff6006118"], &(0x7f0000000080)='syzkalleP\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000cd4d0df25ae8db4a1306000000002d55ca1fbeaf3d659500000000000000000000"], &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) socketpair$inet6(0xa, 0x1, 0x8, &(0x7f00000003c0)={0xffffffffffffffff}) sendmsg(r1, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000400)="626db467a56ac7fab46fee8b509ca6f3abb7057e101a1de08af54e002a464866402b14a028f77226eb1e782e1b40e62334e1", 0x32}, {&(0x7f00000005c0)="2f27aaa4874fa75b497683f149e9ff777b66f3f15adf4f9279bab1ef890a2ba034202c45ed5c673aaa9fb769288026740c212de59f3c45985e1bf046597aa42a482bcf18c80910a7f4749704753ef2038ad05970139df35ba5440376696d99c58da1d06b0cbf70e23be8bc92d4575c761e81250fdc3310b090f8b3f2b6caa9207cc9f14478438cbda1bd26a5c0e9a6a27bf24aeafb7f731e0149e7d69a0df5f03ecece4954dd7f6670b9f387313895b2a892cc6e9b4c890f3d61dc52137e67541fbe1f4cceba5a6f4e529ebbcc322c879189b80ed0322827ea9d73387472cbfd2be7dbb2ab81fab112e62192738546475f48c5d8", 0xf4}], 0x2, 0x0, 0x0, 0x20040000}, 0x20000800) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r0, 0x50, &(0x7f0000000540)}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000480)="d4385f3fdfd3fd3ece3395d9a7c37d8c817ead6fbd4ef805c017b87a56358e66f9a4d0fec40daec750c2c197c6ad95b53b9a10809d666f5a48bd7009d688925daef83b77953a63a007d819663d179956e46a31ce2274572e50abadf79508e5b8bb5f27234dbfe49bf48ef7f01a6ae7e58bc753591a052853f7a9387e579d0c5bb9b7070f0638c9187c26fbd60eb3bd05ae847b5e7edca275fbb6", &(0x7f0000000000)=""/41}, 0x18) 2018/04/05 21:37:28 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:28 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:28 executing program 2: bpf$MAP_CREATE(0xc000000, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:28 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9}, 0x3d1) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000028000)={r0, &(0x7f0000000200), &(0x7f0000000240)="13"}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r0, &(0x7f0000000040)}, 0x10) getpid() 2018/04/05 21:37:28 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0x18d, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:28 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000000000000000000028000006a0a00fffffff6006118"], &(0x7f0000000080)='syzkalleP\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) recvmsg(0xffffffffffffffff, &(0x7f0000003fc0)={&(0x7f0000003c40)=@can={0x0, 0x0}, 0x80, &(0x7f0000003ec0)=[{&(0x7f0000003cc0)=""/186, 0xba}, {&(0x7f0000003d80)=""/201, 0xc9}, {&(0x7f0000003e80)=""/34, 0x22}], 0x3, &(0x7f0000003f00)=""/178, 0xb2, 0x6}, 0x122) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xd, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="180000010000000000000000000000000500000000000000"], &(0x7f0000000200)='syzkaller\x00', 0x9, 0xbb, &(0x7f0000000300)=""/187, 0x0, 0x0, [], r0}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r1, 0x50, &(0x7f0000000400)}, 0x10) 2018/04/05 21:37:28 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000400008fe7bb5cd4e344cd0002800000720a00ff"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xf, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x80ffff}, [@jmp={0x5, 0x0, 0xffffffcd}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) 2018/04/05 21:37:28 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x1f, 0x0, 0x3, 0x33, 0x4000002, 0xffffffffffffffff, 0x1}, 0xffffffffffffff0b) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f00000012c0)=ANY=[@ANYBLOB="1800000000000000000000000000000071100000000000000000000000000000950000000079cfc434d1404502a7690a5e291c015ee7e923b268f437d0ec44e00838d87e7ae63aa8feeea964d04926ecd08640f16b339278fa753641d64608f42354fcb835ce35feed43b01da83634b33df6c13688192f492c63612982f648f46649f7267f3108dc8a5358ccfd84de5fb96597da523b39a6ef56278ba89ac5db0845c425ce9cbe1f1712a03b6497cdce847ab1f4c3646d26f04c997ce6c275da4b393a9fe532aa0a28f9b661230200a3da9bea695ab6546c750f2b57791859facc8df1aacb2a49b897e0feff5814b5877fc5c91faac2879901e6927a9073cf14bd87bd1e1bb765610fc6da6b37bc41685329c110a3cf487943d51072ed2211f7751c3e82bff81716271470b844af3d3208cf09357fa1260b43597cd4d8e678b791120a955e1852bc"], &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x36, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x1000, &(0x7f0000000140)="dbc1b60f4d72c5f413bbec23326c", &(0x7f00000002c0)=""/4096}, 0x28) 2018/04/05 21:37:28 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:28 executing program 2: bpf$MAP_CREATE(0xa, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:28 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000400008fe7bb5cd4e344cd0002800000720a00ff"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xf, 0x5, &(0x7f0000000040)=@framed={{0x18, 0xffe0}, [@jmp={0x5, 0x0, 0xffffffcd}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) 2018/04/05 21:37:28 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0x446, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:28 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9}, 0x3d1) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000028000)={r0, &(0x7f0000000200), &(0x7f0000000240)="13"}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r0, &(0x7f0000000040)}, 0x10) 2018/04/05 21:37:28 executing program 5: recvmsg(0xffffffffffffffff, &(0x7f0000005a80)={&(0x7f00000058c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000005a00)=[{&(0x7f0000005940)=""/159, 0x9f}], 0x1, &(0x7f0000005a40)=""/16, 0x10, 0x3}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x1, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=r0, @ANYRES16=r0, @ANYRES64, @ANYRES64=r0]], &(0x7f0000005ac0)='syzkalleP\x00', 0x0, 0xce, &(0x7f0000000480)=""/206, 0x20, 0x0, [], r0}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xd, 0x5, &(0x7f0000000040)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r1, 0x50, &(0x7f0000000400)}, 0x10) 2018/04/05 21:37:28 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:28 executing program 4: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x8, 0x1, 0x401, 0x0, 0x18, 0x1, 0x3}, 0x2c) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000180)='loem1proc]@\x00') bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000480)={r1, 0x28, &(0x7f0000000440)}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x7, 0x39}, 0xffffffffffffff75) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x50, &(0x7f00000000c0)}, 0x10) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000004c0)) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r2, &(0x7f00000002c0)="06e6e57a3362e2e8a194d509b71119ba4f40127259f2186178ccbb67665505e1f5a12b13f4257edb46f9d637ddc47f65eb523158f59e7da1055f73902a27956aed3dd31ba94fa396e67f0ca79d6e151c18470b04c133f7c5fbfb19a00ca0172a2053d8f869be56256766807bd9e41eaf6dde8a3565c09c1fe13ffc9319dab48e58bae9dac09a1a9bfa2dda7d3e3bbb3a817184b563b37a6ae7dc44babfb94399aad3f67f915c81779310d633f117a04ea9f9a2a224ec2c90f7d4b6735c15f5204912ca49f1b01bee82c74c0c5b4d9691e730931c6e0726057486a3de3d48b949bc13c42764ac5a4edc9d4a1f56"}, 0x10) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000280)) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000500)=ANY=[@ANYBLOB="0400000000000000000000000000ea460d03aef820480b243be4a093f8ffc526a148959686ce15f48f92f69f3b22647b34d02f210467e54154d9f41468871e8548698573d16270092ccb8592872582b8367ca9c09803e8ab0611214b973ed35dccf2fd33c83a6c71b7e173eaae128b1c0800dcd08b81cf0bb245d9dcfe259794869f22a704d452a514e3236588337ebbf5645d2a0201c3025a6c7b64845b3f712a9afa1d3671624d6ec92c92bb0d88c50000"]) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000200)) perf_event_open(&(0x7f000054df88)={0x2, 0x70, 0x0, 0x303, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000003c0)={&(0x7f0000000240)='./file0\x00', 0x0, 0x8}, 0x10) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000280)) socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f00000001c0)) socket$kcm(0x29, 0x2, 0x0) 2018/04/05 21:37:29 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:29 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0x395, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:29 executing program 2: bpf$MAP_CREATE(0xf, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:29 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9}, 0x3d1) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r0, &(0x7f0000000040)}, 0x10) 2018/04/05 21:37:29 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8cffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:29 executing program 5: recvmsg(0xffffffffffffff9c, &(0x7f000000de80)={&(0x7f000000d980)=@ll={0x0, 0x0, 0x0}, 0x80, &(0x7f000000dd40)=[{&(0x7f000000da00)=""/234, 0xea}, {&(0x7f000000db00)=""/142, 0x8e}, {&(0x7f000000dbc0)=""/114, 0x72}, {&(0x7f000000dc40)=""/193, 0xc1}], 0x4, &(0x7f000000dd80)=""/240, 0xf0, 0x8}, 0x2) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000000000000000000028000006a0a00fffffff6006118"], &(0x7f0000000080)='syzkalleP\x00', 0x0, 0xce, &(0x7f0000000180)=""/206, 0x0, 0x0, [], r0}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xd, 0x5, &(0x7f0000000040)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000140)='./file0\x00', r1}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r1, 0x50, &(0x7f0000000400)}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) 2018/04/05 21:37:29 executing program 4: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000280)="e1e40bd80c64bc4bd1e97e0b761d0d724a55599db8d61f2cef11e76fbe365994c25d26309123294969cca768c2ff7ff4b915e72e1db2a551d647e2ea458a7e606897a820aaf1d3e6da69d9eeb1419831018dee65712aa31295849324") ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x80000001) 2018/04/05 21:37:29 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000400008fe7bb5cd4e344cd0002800000720a00ff"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xf, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x74}, [@jmp={0x5, 0x0, 0xffffffcd}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) 2018/04/05 21:37:29 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000028000)={0xffffffffffffffff, &(0x7f0000000200), &(0x7f0000000240)="13"}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000040)}, 0x10) 2018/04/05 21:37:29 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xd, 0x5, &(0x7f0000000040)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r0, 0x50, &(0x7f0000000400)}, 0x10) 2018/04/05 21:37:29 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:29 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0x964, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:29 executing program 2: bpf$MAP_CREATE(0xffffffff00000000, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:29 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:29 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000400008fe7bb5cd4e344cd0002800000720a00ff"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xf, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x4800000000000000}, [@jmp={0x5, 0x0, 0xffffffcd}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) 2018/04/05 21:37:29 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000800)) socket$kcm(0x29, 0x0, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='sysfs\x00', 0x0, &(0x7f0000000400)) mount(&(0x7f0000000040)='./file0/bus\x00', &(0x7f00000000c0)='./file0/bus\x00', &(0x7f0000000340)='sysfs\x00', 0x0, &(0x7f00000004c0)) mkdir(&(0x7f0000000940)='./file0/bus\x00', 0x0) mount(&(0x7f0000000400)='./file1\x00', &(0x7f0000000440)='./file1\x00', &(0x7f00000007c0)='msdos\x00', 0x80, &(0x7f00000004c0)="31253d48e4e376a622549733d58d73d85cd3f7c9876633075e79af67d9f49bdb5943c52acc545ac69630b497bcb9dcf3e597ee60485d24be4d6e53eac44a4a4fa87710e1a8742bed92fade85e2f58c2c5c5af6282fb7a1356f1c342fe3d894f4fd84601ee5f22e56a6e5e36a900da9903f22a94001367b61ac92a0442f4b8ed8b1a74fba5a027d7cc0b4ac097777cc7216f0416dc4c104aff4aae4a978862177ece567d5287c91eb22e2aa40f59a652340dcfc6175a32be59e7ab7ec6217542885e2fccc406144c4abcdfc549eb85e6ab20dc026af2c562623a1f3ba90c6b507e6") ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000180)) mount(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='./file0\x00', &(0x7f00000006c0)='qnx4\x00', 0x0, &(0x7f0000000700)) socketpair(0x10, 0x804, 0xffffffffffffff01, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='./file0/file0\x00', &(0x7f00000003c0)='qnx4\x00', 0x4812, &(0x7f0000000400)="b3eb3c19d310eb1331a017b101faf7d5b9e612eeeff9d3cd5da22406bc636a89b74c968bfbf3625e58b743853665174d3f1e8b0fee3e1029fb4e87488dfa710071f9c7ca06128d7c743b4b722c8b41deeeceb1d057b04d1867ac137ca4f8cbbc0b8d1bc66362a402f89e3593ae4e924c917af7c1fa6c26cc1c69643e27cd30895545b3e4c92b64b4e6b00b8474e1922cecc81c94787f00bfacaa0aa9a87cc539a51e67b530c64f710dff69d67e") sendmsg$kcm(r0, &(0x7f0000002a00)={&(0x7f00000005c0)=@nfc={0x27, 0x1, 0x0, 0x3}, 0x80, &(0x7f0000000840)=[{&(0x7f0000000700)="f89643a20b1d21a9a8ccab402e25f0a1a331f1f526187e40db337dcb432b8edb9fa9479659e10676f6ea7ae153d29c0298454f0163c1ac4078abbe2d59bab08d9b2b5df79649749964de03e79a977c57f76449d236c9d82dda6bda140e5656d9794881c5d94b821177023fe10ccd3abc440998e7b333108da67642e6943c40807b95de92fbd0f927a93cca6806f384c40cc075d3fb5ee93a5b63c10d9c9e84f177d13c4342287333191341c65578c2ac5297552c", 0xb4}], 0x1, &(0x7f0000000880)=ANY=[], 0x0, 0x4}, 0x20000000) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000140)) r2 = perf_event_open(&(0x7f0000c72000)={0x1, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fe, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000002a40)={0x9, 0x1, 0x75a, 0x1, 0x12, 0xffffffffffffffff, 0x800}, 0x2c) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6d6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe9, 0x0, @perf_config_ext, 0x0, 0x800000000000000, 0x100000000000000, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x5, 0x40, 0xfffffffffffffffc, 0x8, r1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x8) recvmsg(r1, &(0x7f0000000300)={&(0x7f0000000180)=@l2, 0x80, &(0x7f00000002c0)=[{&(0x7f0000000200)=""/130, 0x82}], 0x1, 0x0, 0x0, 0x9}, 0x100) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x4) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', r0}, 0x10) socketpair(0x3, 0x7, 0x0, &(0x7f0000000080)) socketpair(0x9, 0xf, 0x6b, &(0x7f00000009c0)) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0xfefffffffffffffd) 2018/04/05 21:37:29 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000000000000000000002800000b151fc1e770b5e462518126b72df1d531ceefb000000000000000000"], &(0x7f0000000080)='syzkalleP\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xd, 0x4, &(0x7f0000000140)=@raw=[@jmp={0x5, 0xd54, 0xb, 0x7, 0x8, 0xfffffffc, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x8}], &(0x7f0000000000)='syzkaller\x00', 0x80000001, 0xbb, &(0x7f0000000300)=""/187}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r0, 0x50, &(0x7f0000000400)}, 0x10) 2018/04/05 21:37:29 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff8c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:29 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9}, 0x3d1) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000028000)={r0, &(0x7f0000000200), &(0x7f0000000240)="13"}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r0, &(0x7f0000000040)}, 0x10) 2018/04/05 21:37:29 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:29 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000400008fe7bb5cd4e344cd0002800000720a00ff"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xf, 0x5, &(0x7f0000000040)=@framed={{0x18, 0xe0ffffffffffffff}, [@jmp={0x5, 0x0, 0xffffffcd}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) 2018/04/05 21:37:29 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0x734, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:29 executing program 2: bpf$MAP_CREATE(0x500000000000000, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:29 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000000000000000000028000006a0a00fffffff6006118"], &(0x7f0000000080)='syzkalleP\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xd, 0x5, &(0x7f0000000040)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x3a7, &(0x7f0000000300)=""/187, 0x41f00}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r0, 0xffffffffffffffba, &(0x7f0000000400)}, 0x10) 2018/04/05 21:37:29 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8cffffff00000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:29 executing program 4: socketpair(0x15, 0x803, 0x7ff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000040)={r0, r0}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000080)={0xa, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x0) close(r1) r2 = gettid() ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r1) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x290) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) close(r3) socketpair$inet6(0xa, 0x7, 0x7, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000140)='wlan0cpuset\x00') ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000180)=0x3) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) r4 = perf_event_open(&(0x7f0000000200)={0x4, 0x70, 0x4a, 0x8, 0x401, 0x400, 0x0, 0x9, 0x20040, 0x1, 0xff, 0x0, 0x411, 0x200, 0x101, 0x8000, 0xd6d, 0x3, 0xfffffffffffff000, 0x80000001, 0x100000001, 0xfde7, 0x6, 0x20, 0xffffffffffff7fff, 0x8, 0x936f, 0x9, 0x0, 0x3, 0x2, 0x8670, 0x200, 0xffff, 0x80000001, 0x0, 0x8, 0x8b8, 0x0, 0x6, 0x1, @perf_bp={&(0x7f00000001c0), 0x4}, 0x2001, 0x1, 0x8, 0x0, 0x943, 0x10001, 0x85}, r2, 0x5, r0, 0x1) bpf$OBJ_GET_PROG(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x10}, 0x10) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r4, 0x2402, 0xf5) bpf$MAP_CREATE(0x0, &(0x7f0000000340)={0xe, 0x100000000, 0x8, 0x1, 0x7, 0xffffffffffffffff, 0x7}, 0x2c) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000380)) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f00000003c0)={r5}) ioctl$PERF_EVENT_IOC_REFRESH(r4, 0x2402, 0x4) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000400)) 2018/04/05 21:37:29 executing program 6: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9}, 0x3d1) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000028000)={r0, &(0x7f0000000200), &(0x7f0000000240)="13"}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r0, &(0x7f0000000040)}, 0x10) 2018/04/05 21:37:29 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:29 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000400008fe7bb5cd4e344cd0002800000720a00ff"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xf, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x700}, [@jmp={0x5, 0x0, 0xffffffcd}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) 2018/04/05 21:37:29 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0x4f5, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:29 executing program 2: bpf$MAP_CREATE(0x900, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:29 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000000000000000000028000006a0a00fffffff6006118"], &(0x7f0000000080)='syzkalleP\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xd, 0x5, &(0x7f0000000040)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r0, 0x50, &(0x7f0000000400)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=r1, 0x4) 2018/04/05 21:37:29 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6ffffff00000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:29 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x4, 0x3, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x40c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_udp(0x730000, 0x2, 0x4, &(0x7f00000001c0)) 2018/04/05 21:37:29 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:29 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xad8, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:29 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9}, 0x3d1) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000028000)={r0, &(0x7f0000000200), &(0x7f0000000240)="13"}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r0, &(0x7f0000000040)}, 0x10) 2018/04/05 21:37:29 executing program 2: bpf$MAP_CREATE(0xe, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:29 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="188000000007000000000000028000006e0a00ffff0ed1ff0100"], &(0x7f0000000500)="73797a6b619000790b62f792f3db90000019000000776fe6399529e21510c40718e19e8b0f9a6e9efce5d214ba364a9b9a3b083bcb98817d4ea4c61d18d18aafb86a21c6b0cd14b121d9016758d5761309f4f6512d4189a69bae173f2e1cc0c7445c766757f9e60fff1f4a383a490a4b66947abe312845822cd289121f12000000", 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xd, 0x5, &(0x7f0000000040)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r0, 0x50, &(0x7f0000000400)}, 0xfffffc44) 2018/04/05 21:37:29 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000400008fe7bb5cd4e344cd0002800000720a00ff"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xf, 0x5, &(0x7f0000000040)=@framed={{0x18, 0xffffffe4}, [@jmp={0x5, 0x0, 0xffffffcd}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) 2018/04/05 21:37:30 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:30 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000000000000000000028000006a0a00fffffff6006118"], &(0x7f0000000080)='syzkalleP\x00', 0x0, 0xce, &(0x7f0000000480)=""/206}, 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xd, 0x20000091, &(0x7f0000000040)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x60) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r0, 0x50, &(0x7f0000000400)}, 0x10) 2018/04/05 21:37:30 executing program 2: bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:30 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:30 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xfe9, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:30 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x4, 0x4, 0x9}, 0x3d1) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000028000)={r0, &(0x7f0000000200), &(0x7f0000000240)="13"}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r0, &(0x7f0000000040)}, 0x10) 2018/04/05 21:37:30 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004, 0xab}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000080)={r0, &(0x7f00000001c0)="af77f753de7361e70d0807380ee49d09d99408f5fa47c6f20f044e547c1f6903afb4db9984df4aec12e3188e691a4aa5ddc53a15d37e4cc86dfc150eeaf44ba6c34dd6911879c09424358a5b9a7d00fdec536466fe8b3a2116da0a4654405936", &(0x7f0000000240)=""/98}, 0x18) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000380)={0xffffffffffffffff, &(0x7f00000003c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0xa) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000040)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r1, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_udp(0x400000, 0x2, 0x0, &(0x7f0000000180)) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f00000002c0)) 2018/04/05 21:37:30 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000400008fe7bb5cd4e344cd0002800000720a00ff"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xf, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x3c00000000000000}, [@jmp={0x5, 0x0, 0xffffffcd}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) 2018/04/05 21:37:30 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000000000000000000028000006a0a00fffffff6006118"], &(0x7f0000000080)='syzkalleP\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xd, 0x5, &(0x7f0000000040)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r0, 0x50, &(0x7f0000000400)}, 0x10) socketpair(0x0, 0x7, 0x1, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_icmp(0xa, 0x2, 0x3a, &(0x7f0000000480)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000003c0)={&(0x7f0000000000)='./file0\x00', r1}, 0x10) 2018/04/05 21:37:30 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6ffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:30 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x5}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='hugetlbfs\x00', 0x0, &(0x7f0000000340)="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") mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000001380)='./file0\x00', &(0x7f0000001340)='proc\x00', 0x0, &(0x7f0000000240)) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000002240)={0xffffffff, 0x0, 0x8}, 0xa) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000001e40)={&(0x7f0000000040)='./file0/bus\x00', r0}, 0x10) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000001240)) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000001280)) mount(&(0x7f0000000000)='./file0/bus\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x2000, &(0x7f00000002c0)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000200)={&(0x7f00000001c0)='./file0/bus\x00', 0x0, 0x8}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001480)={0xffffffffffffffff, 0x28, &(0x7f0000001440)={0x0, 0x0}}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x6d) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000014c0)={r1, 0x3, 0x8}, 0xc) sendmsg(0xffffffffffffffff, &(0x7f0000001dc0)={0x0, 0x0, &(0x7f0000001640)=[{&(0x7f00000013c0)="2770c34f2aaec7dad781bf206bebf8191e7ca3eb75eababb4720a018bcbb8ee2225dd58c3d", 0x25}], 0x1, &(0x7f0000002a00)=ANY=[], 0x0, 0x20000000}, 0x4000004) recvmsg(0xffffffffffffffff, &(0x7f00000021c0)={&(0x7f0000001fc0)=@sco, 0x80, &(0x7f0000002100)=[{&(0x7f0000002040)=""/180, 0xb4}], 0x1, &(0x7f0000002140)=""/74, 0x4a, 0xa722}, 0x2000) mkdir(&(0x7f0000001500)='./file1\x00', 0x0) 2018/04/05 21:37:30 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6ffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:30 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0x2e8, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:30 executing program 2: bpf$MAP_CREATE(0x1603000000000000, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:30 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x0, 0x4, 0x9}, 0x3d1) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000028000)={r0, &(0x7f0000000200), &(0x7f0000000240)="13"}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r0, &(0x7f0000000040)}, 0x10) 2018/04/05 21:37:30 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000000000000000000028000006a0a00fffffff6006118"], &(0x7f0000000080)='syzkalleP\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) socketpair$inet6(0xa, 0x6, 0x8001, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000c00)={&(0x7f0000000480)=@ipx, 0x80, &(0x7f0000000a40)=[{&(0x7f0000000500)=""/87, 0x57}, {&(0x7f0000000580)=""/215, 0xd7}, {&(0x7f00000003c0)=""/6, 0x6}, {&(0x7f0000000680)=""/195, 0xc3}, {&(0x7f0000000780)=""/80, 0x50}, {&(0x7f0000000800)=""/34, 0x22}, {&(0x7f0000000840)=""/217, 0xd9}, {&(0x7f0000000940)=""/171, 0xab}, {&(0x7f0000000a00)=""/30, 0x1e}], 0x9, &(0x7f0000000b00)=""/220, 0xdc, 0xfffffffffffffffb}, 0x0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000000)) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xd, 0x5, &(0x7f0000000040)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000e00)={r0, 0x0, 0x94, 0xe5, &(0x7f0000000c40)="686c0e52f1290d6df8937887bfbda461e75348127dd7af65c64c57f92f93d005a7667f74d7d6974732a9fb89e0b16a121dd2a25aaf55232ed662aac939f2964b164f9968fccf6118ddf2a7550ac738dbdfd576a36764323f79c80472fdf93033133f2912dc1e259ccad16a9f6c960e1251bfeca3c0b2be8e55b514693be267523b1eba39fe1ff589a46da611b5cac31e9a881cb8", &(0x7f0000000d00)=""/229, 0x401, 0x7}, 0x28) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r2, 0x50, &(0x7f0000000400)}, 0x10) 2018/04/05 21:37:30 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000400008fe7bb5cd4e344cd0002800000720a00ff"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xf, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x7400}, [@jmp={0x5, 0x0, 0xffffffcd}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) 2018/04/05 21:37:30 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x0, 0x9}, 0x3d1) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000028000)={r0, &(0x7f0000000200), &(0x7f0000000240)="13"}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r0, &(0x7f0000000040)}, 0x10) [ 372.669426] hugetlbfs: Bad mount option: "£Î ooPŸ¯2p‹I¸úbs%[ð4¡5ZMØ~éÚ·vTxEÆp Úõ\![ÆWÔ½ÎÙ™S9ÉelT¶Dûè²Uv3¹$òëK" [ 372.786347] hugetlbfs: Bad mount option: "£Î ooPŸ¯2p‹I¸úbs%[ð4¡5ZMØ~éÚ·vTxEÆp Úõ\![ÆWÔ½ÎÙ™S9ÉelT¶Dûè²Uv3¹$òëK" 2018/04/05 21:37:30 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:30 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4}, 0x3d1) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000028000)={r0, &(0x7f0000000200), &(0x7f0000000240)="13"}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r0, &(0x7f0000000040)}, 0x10) 2018/04/05 21:37:30 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:30 executing program 2: bpf$MAP_CREATE(0x8, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:30 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0x8b, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:30 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000400008fe7bb5cd4e344cd0002800000720a00ff"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xf, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x200000000000000}, [@jmp={0x5, 0x0, 0xffffffcd}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) 2018/04/05 21:37:30 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000000000000000000028000006a0a00fffffff6006118"], &(0x7f0000000080)='syzkalleP\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xa3, 0x48, &(0x7f0000000480)="8724442925e4a803d20f8fae63cc4bcfef5023648186c7b610c9c86f03bc3b397b0ee8d1bc9991d12713c73d564c34208f490a4267964df83add852bac7a3a7351aa48846cd77458feebf12c49eff42aa786c56763e652ab32ca40473eee6ccb2f57ffe9b0622b171fa936cc76697437b15d1bcc98f169c485ef79d46016ff187168210bb6aa63024a6965c15ae9723295ec277dfad4e5a227372638472bbd14ac0b74", &(0x7f0000000540)=""/72, 0x9, 0x4}, 0x28) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xd, 0x5, &(0x7f0000000040)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000000)={r1, 0x50, &(0x7f0000000400)}, 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000002c0)='./file0\x00', r1}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000005c0)={r0, 0x0, 0x0, 0x33, &(0x7f00000002c0), &(0x7f00000003c0)=""/51, 0x10001, 0x4}, 0x28) 2018/04/05 21:37:30 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x5}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='hugetlbfs\x00', 0x0, &(0x7f0000000340)="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") mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000001380)='./file0\x00', &(0x7f0000001340)='proc\x00', 0x0, &(0x7f0000000240)) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000002240)={0xffffffff, 0x0, 0x8}, 0xa) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000001e40)={&(0x7f0000000040)='./file0/bus\x00', r0}, 0x10) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000001240)) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000001280)) mount(&(0x7f0000000000)='./file0/bus\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x2000, &(0x7f00000002c0)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000200)={&(0x7f00000001c0)='./file0/bus\x00', 0x0, 0x8}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001480)={0xffffffffffffffff, 0x28, &(0x7f0000001440)={0x0, 0x0}}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x6d) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000014c0)={r1, 0x3, 0x8}, 0xc) sendmsg(0xffffffffffffffff, &(0x7f0000001dc0)={0x0, 0x0, &(0x7f0000001640)=[{&(0x7f00000013c0)="2770c34f2aaec7dad781bf206bebf8191e7ca3eb75eababb4720a018bcbb8ee2225dd58c3d", 0x25}], 0x1, &(0x7f0000002a00)=ANY=[], 0x0, 0x20000000}, 0x4000004) recvmsg(0xffffffffffffffff, &(0x7f00000021c0)={&(0x7f0000001fc0)=@sco, 0x80, &(0x7f0000002100)=[{&(0x7f0000002040)=""/180, 0xb4}], 0x1, &(0x7f0000002140)=""/74, 0x4a, 0xa722}, 0x2000) mkdir(&(0x7f0000001500)='./file1\x00', 0x0) 2018/04/05 21:37:30 executing program 2: bpf$MAP_CREATE(0x4000000, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:30 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:30 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000000000000000000028000006a0a00fffffff6006118"], &(0x7f0000000080)='syzkalleP\x00', 0x0, 0xb5, &(0x7f0000000180)=""/206}, 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xd, 0x5, &(0x7f0000000040)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r0, 0x50, &(0x7f0000000400)}, 0x10) 2018/04/05 21:37:30 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:30 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000400008fe7bb5cd4e344cd0002800000720a00ff"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xf, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x1000000000000000}, [@jmp={0x5, 0x0, 0xffffffcd}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) 2018/04/05 21:37:30 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0x8c3, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) [ 372.946122] hugetlbfs: Bad mount option: "£Î ooPŸ¯2p‹I¸úbs%[ð4¡5ZMØ~éÚ·vTxEÆp Úõ\![ÆWÔ½ÎÙ™S9ÉelT¶Dûè²Uv3¹$òëK" 2018/04/05 21:37:30 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9}, 0x3d1) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000028000)={0xffffffffffffffff, &(0x7f0000000200), &(0x7f0000000240)="13"}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r0, &(0x7f0000000040)}, 0x10) 2018/04/05 21:37:30 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:31 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:31 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000400008fe7bb5cd4e344cd0002800000720a00ff"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xf, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x100000000000000}, [@jmp={0x5, 0x0, 0xffffffcd}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) 2018/04/05 21:37:31 executing program 2: bpf$MAP_CREATE(0x1603, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:31 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0x38e, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:31 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000000000000000000028000006a0a00fffffff6006118"], &(0x7f0000000080)='syzkalleP\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xd, 0x5, &(0x7f0000000040)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) 2018/04/05 21:37:31 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9}, 0x3d1) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000028000)={r0, &(0x7f0000000200), &(0x7f0000000240)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r0, &(0x7f0000000040)}, 0x10) 2018/04/05 21:37:31 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff8c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:31 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x5}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='hugetlbfs\x00', 0x0, &(0x7f0000000340)="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") mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000001380)='./file0\x00', &(0x7f0000001340)='proc\x00', 0x0, &(0x7f0000000240)) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000002240)={0xffffffff, 0x0, 0x8}, 0xa) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000001e40)={&(0x7f0000000040)='./file0/bus\x00', r0}, 0x10) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000001240)) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000001280)) mount(&(0x7f0000000000)='./file0/bus\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x2000, &(0x7f00000002c0)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000200)={&(0x7f00000001c0)='./file0/bus\x00', 0x0, 0x8}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001480)={0xffffffffffffffff, 0x28, &(0x7f0000001440)={0x0, 0x0}}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x6d) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000014c0)={r1, 0x3, 0x8}, 0xc) sendmsg(0xffffffffffffffff, &(0x7f0000001dc0)={0x0, 0x0, &(0x7f0000001640)=[{&(0x7f00000013c0)="2770c34f2aaec7dad781bf206bebf8191e7ca3eb75eababb4720a018bcbb8ee2225dd58c3d", 0x25}], 0x1, &(0x7f0000002a00)=ANY=[], 0x0, 0x20000000}, 0x4000004) recvmsg(0xffffffffffffffff, &(0x7f00000021c0)={&(0x7f0000001fc0)=@sco, 0x80, &(0x7f0000002100)=[{&(0x7f0000002040)=""/180, 0xb4}], 0x1, &(0x7f0000002140)=""/74, 0x4a, 0xa722}, 0x2000) mkdir(&(0x7f0000001500)='./file1\x00', 0x0) 2018/04/05 21:37:31 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000400008fe7bb5cd4e344cd0002800000720a00ff"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xf, 0x5, &(0x7f0000000040)=@framed={{0x18, 0xffffff9f}, [@jmp={0x5, 0x0, 0xffffffcd}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) 2018/04/05 21:37:31 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:31 executing program 2: bpf$MAP_CREATE(0x3, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:31 executing program 5: r0 = gettid() r1 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x2, 0x0, 0xddb, 0x20a41ba5, 0x0, 0x9, 0x800, 0x2, 0x100, 0x6, 0x9, 0x9, 0xb98a, 0x9, 0xb8f0, 0x101, 0x3, 0x5, 0x4, 0x7fffffff, 0x101, 0x1037, 0x7fffffff, 0x8000, 0x4, 0x4d1c, 0x100000001, 0x400f5bee, 0x57, 0x1, 0x4, 0x7fffffff, 0x8, 0x0, 0xffffffff, 0xd82, 0x0, 0x1, 0x3, @perf_config_ext={0x3, 0x4}, 0x80, 0x1, 0x8, 0x3, 0x7, 0xfffffffffffffff9, 0x20}, 0xffffffffffffffff, 0xf, 0xffffffffffffff9c, 0x1) perf_event_open(&(0x7f0000000480)={0x2, 0x70, 0x3f, 0xffffffff80000001, 0x7, 0x101, 0x0, 0x7, 0x9000, 0xf, 0x9, 0x81, 0xb278, 0x6, 0x2, 0x3, 0x8, 0x3ff, 0x6, 0x16b, 0x25, 0x8001, 0x0, 0xffff, 0x8, 0x45, 0x4, 0x6, 0xd49, 0xfc16, 0x9, 0x80000001, 0x8, 0xf8, 0x1, 0x5, 0x2a, 0xfc0000000000000, 0x0, 0x7fffffff, 0x0, @perf_config_ext={0x400, 0x2}, 0x800, 0x7738, 0xc9, 0x5, 0x80000000, 0xfffffffffffffffc, 0x2}, r0, 0x10, r1, 0x1) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000000000000000000028000006a0a00fffffff6006118"], &(0x7f0000000080)='syzkalleP\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xd, 0x5, &(0x7f0000000040)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r2, 0x50, &(0x7f0000000400)}, 0x10) 2018/04/05 21:37:31 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0x2be, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:31 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6ffffff00000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 373.466161] hugetlbfs: Bad mount option: "£Î ooPŸ¯2p‹I¸úbs%[ð4¡5ZMØ~éÚ·vTxEÆp Úõ\![ÆWÔ½ÎÙ™S9ÉelT¶Dûè²Uv3¹$òëK" 2018/04/05 21:37:31 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000400008fe7bb5cd4e344cd0002800000720a00ff"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xf, 0x5, &(0x7f0000000040)=@framed={{0x18, 0xffffffffffffffe0}, [@jmp={0x5, 0x0, 0xffffffcd}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) 2018/04/05 21:37:31 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9}, 0x3d1) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000028000)={r0, &(0x7f0000000200), &(0x7f0000000240)="13"}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000040)}, 0x10) 2018/04/05 21:37:31 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0x51f, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:31 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff8c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:31 executing program 2: bpf$MAP_CREATE(0x200000000000000, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:31 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000000000000000000028000006a0a00fffffff6006118"], &(0x7f0000000080)='syzkalleP\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xd, 0x5, &(0x7f0000000040)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f0000000400)}, 0x10) 2018/04/05 21:37:31 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:31 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000400008fe7bb5cd4e344cd0002800000720a00ff"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xf, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x227}, [@jmp={0x5, 0x0, 0xffffffcd}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) 2018/04/05 21:37:31 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8cffffff00000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:31 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x5}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='hugetlbfs\x00', 0x0, &(0x7f0000000340)="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") mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000001380)='./file0\x00', &(0x7f0000001340)='proc\x00', 0x0, &(0x7f0000000240)) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000002240)={0xffffffff, 0x0, 0x8}, 0xa) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000001e40)={&(0x7f0000000040)='./file0/bus\x00', r0}, 0x10) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000001240)) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000001280)) mount(&(0x7f0000000000)='./file0/bus\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x2000, &(0x7f00000002c0)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000200)={&(0x7f00000001c0)='./file0/bus\x00', 0x0, 0x8}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001480)={0xffffffffffffffff, 0x28, &(0x7f0000001440)={0x0, 0x0}}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x6d) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000014c0)={r1, 0x3, 0x8}, 0xc) sendmsg(0xffffffffffffffff, &(0x7f0000001dc0)={0x0, 0x0, &(0x7f0000001640)=[{&(0x7f00000013c0)="2770c34f2aaec7dad781bf206bebf8191e7ca3eb75eababb4720a018bcbb8ee2225dd58c3d", 0x25}], 0x1, &(0x7f0000002a00)=ANY=[], 0x0, 0x20000000}, 0x4000004) recvmsg(0xffffffffffffffff, &(0x7f00000021c0)={&(0x7f0000001fc0)=@sco, 0x80, &(0x7f0000002100)=[{&(0x7f0000002040)=""/180, 0xb4}], 0x1, &(0x7f0000002140)=""/74, 0x4a, 0xa722}, 0x2000) mkdir(&(0x7f0000001500)='./file1\x00', 0x0) 2018/04/05 21:37:31 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0x2e4, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:31 executing program 5: socketpair(0xa, 0x800, 0x1bb, &(0x7f0000000000)={0xffffffffffffffff}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000003c0)={r0, 0x28, &(0x7f0000000140)}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000000000000000000028000006a0a00fffffff6006118"], &(0x7f0000000080)='syzkalleP\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xd, 0x5, &(0x7f0000000040)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r1, 0x50, &(0x7f0000000400)}, 0x10) 2018/04/05 21:37:31 executing program 6 (fault-call:3 fault-nth:0): perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9}, 0x3d1) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000028000)={r0, &(0x7f0000000200), &(0x7f0000000240)="13"}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r0, &(0x7f0000000040)}, 0x10) 2018/04/05 21:37:31 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:31 executing program 2: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) [ 373.861823] hugetlbfs: Bad mount option: "£Î ooPŸ¯2p‹I¸úbs%[ð4¡5ZMØ~éÚ·vTxEÆp Úõ\![ÆWÔ½ÎÙ™S9ÉelT¶Dûè²Uv3¹$òëK" [ 373.908877] FAULT_INJECTION: forcing a failure. [ 373.908877] name failslab, interval 1, probability 0, space 0, times 0 [ 373.920228] CPU: 0 PID: 2452 Comm: syz-executor6 Not tainted 4.16.0+ #1 [ 373.926999] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 373.936366] Call Trace: [ 373.938984] dump_stack+0x1b9/0x29f [ 373.942638] ? arch_local_irq_restore+0x52/0x52 [ 373.947347] should_fail.cold.4+0xa/0x1a [ 373.951434] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 373.956559] ? __fget+0x40c/0x650 [ 373.960023] ? find_held_lock+0x36/0x1c0 [ 373.964112] ? check_same_owner+0x320/0x320 [ 373.968431] ? rcu_note_context_switch+0x710/0x710 [ 373.973360] should_failslab+0x124/0x180 [ 373.977416] __kmalloc_track_caller+0x2c4/0x760 [ 373.982080] ? __might_sleep+0x95/0x190 [ 373.986055] ? SyS_bpf+0x29a0/0x5440 [ 373.989763] memdup_user+0x2c/0xa0 [ 373.993297] SyS_bpf+0x29a0/0x5440 [ 373.996826] ? perf_trace_lock_acquire+0x4f1/0x980 [ 374.001783] ? bpf_prog_get+0x20/0x20 [ 374.005574] ? zap_class+0x720/0x720 [ 374.009283] ? perf_trace_lock+0x900/0x900 [ 374.013506] ? find_held_lock+0x36/0x1c0 [ 374.017559] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 374.023083] ? _parse_integer+0x13b/0x190 [ 374.027225] ? graph_lock+0x170/0x170 [ 374.031026] ? perf_trace_lock+0xd6/0x900 [ 374.035165] ? _kstrtoull+0x180/0x230 [ 374.038958] ? _parse_integer+0x190/0x190 [ 374.043097] ? zap_class+0x720/0x720 [ 374.046807] ? find_held_lock+0x36/0x1c0 [ 374.050863] ? graph_lock+0x170/0x170 [ 374.054667] ? perf_trace_lock+0xd6/0x900 [ 374.058816] ? find_held_lock+0x36/0x1c0 [ 374.062888] ? lock_downgrade+0x8e0/0x8e0 [ 374.067039] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 374.072570] ? proc_fail_nth_write+0x96/0x1f0 [ 374.077071] ? find_held_lock+0x36/0x1c0 [ 374.081130] ? kasan_check_write+0x14/0x20 [ 374.085364] ? __mutex_unlock_slowpath+0x180/0x8a0 [ 374.090289] ? wait_for_completion+0x870/0x870 [ 374.094890] ? __sb_end_write+0xac/0xe0 [ 374.098865] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 374.104391] ? fput+0x130/0x1a0 [ 374.107664] ? ksys_write+0x1a6/0x250 [ 374.111469] ? do_syscall_64+0xb7/0x9d0 [ 374.115440] ? bpf_prog_get+0x20/0x20 [ 374.119232] do_syscall_64+0x29e/0x9d0 [ 374.123107] ? vmalloc_sync_all+0x30/0x30 [ 374.127242] ? _raw_spin_unlock_irq+0x27/0x70 [ 374.131726] ? finish_task_switch+0x1ca/0x820 [ 374.136215] ? syscall_return_slowpath+0x5c0/0x5c0 [ 374.141138] ? syscall_return_slowpath+0x30f/0x5c0 [ 374.146063] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 374.151424] ? trace_hardirqs_off_thunk+0x1a/0x1c 2018/04/05 21:37:32 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 374.156265] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 374.161442] RIP: 0033:0x4552d9 [ 374.164618] RSP: 002b:00007f7210b7cc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 374.172320] RAX: ffffffffffffffda RBX: 00007f7210b7d6d4 RCX: 00000000004552d9 [ 374.179578] RDX: 0000000000000010 RSI: 0000000020000080 RDI: 0000000000000003 [ 374.186840] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 374.194098] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 374.201355] R13: 000000000000003d R14: 00000000006f3658 R15: 0000000000000000 2018/04/05 21:37:32 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xc5, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:32 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000400008fe7bb5cd4e344cd0002800000720a00ff"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xf, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x7400000000000000}, [@jmp={0x5, 0x0, 0xffffffcd}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) 2018/04/05 21:37:32 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:32 executing program 2: bpf$MAP_CREATE(0xe00, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:32 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8cffffff00000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:32 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x5}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='hugetlbfs\x00', 0x0, &(0x7f0000000340)="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") mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000001380)='./file0\x00', &(0x7f0000001340)='proc\x00', 0x0, &(0x7f0000000240)) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000002240)={0xffffffff, 0x0, 0x8}, 0xa) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000001e40)={&(0x7f0000000040)='./file0/bus\x00', r0}, 0x10) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000001240)) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000001280)) mount(&(0x7f0000000000)='./file0/bus\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x2000, &(0x7f00000002c0)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000200)={&(0x7f00000001c0)='./file0/bus\x00', 0x0, 0x8}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001480)={0xffffffffffffffff, 0x28, &(0x7f0000001440)={0x0, 0x0}}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x6d) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000014c0)={r1, 0x3, 0x8}, 0xc) sendmsg(0xffffffffffffffff, &(0x7f0000001dc0)={0x0, 0x0, &(0x7f0000001640)=[{&(0x7f00000013c0)="2770c34f2aaec7dad781bf206bebf8191e7ca3eb75eababb4720a018bcbb8ee2225dd58c3d", 0x25}], 0x1, &(0x7f0000002a00)=ANY=[], 0x0, 0x20000000}, 0x4000004) recvmsg(0xffffffffffffffff, &(0x7f00000021c0)={&(0x7f0000001fc0)=@sco, 0x80, &(0x7f0000002100)=[{&(0x7f0000002040)=""/180, 0xb4}], 0x1, &(0x7f0000002140)=""/74, 0x4a, 0xa722}, 0x2000) [ 374.488160] hugetlbfs: Bad mount option: "£Î ooPŸ¯2p‹I¸úbs%[ð4¡5ZMØ~éÚ·vTxEÆp Úõ\![ÆWÔ½ÎÙ™S9ÉelT¶Dûè²Uv3¹$òëK" 2018/04/05 21:37:32 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xc9e, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:32 executing program 6 (fault-call:3 fault-nth:1): perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9}, 0x3d1) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000028000)={r0, &(0x7f0000000200), &(0x7f0000000240)="13"}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r0, &(0x7f0000000040)}, 0x10) 2018/04/05 21:37:32 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:32 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000400008fe7bb5cd4e344cd0002800000720a00ff"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xf, 0x5, &(0x7f0000000040)=@framed={{0x18, 0xa00000000000000}, [@jmp={0x5, 0x0, 0xffffffcd}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) 2018/04/05 21:37:32 executing program 2: bpf$MAP_CREATE(0xc, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:32 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x5}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='hugetlbfs\x00', 0x0, &(0x7f0000000340)="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") mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000001380)='./file0\x00', &(0x7f0000001340)='proc\x00', 0x0, &(0x7f0000000240)) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000002240)={0xffffffff, 0x0, 0x8}, 0xa) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000001e40)={&(0x7f0000000040)='./file0/bus\x00', r0}, 0x10) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000001240)) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000001280)) mount(&(0x7f0000000000)='./file0/bus\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x2000, &(0x7f00000002c0)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000200)={&(0x7f00000001c0)='./file0/bus\x00', 0x0, 0x8}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001480)={0xffffffffffffffff, 0x28, &(0x7f0000001440)={0x0, 0x0}}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x6d) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000014c0)={r1, 0x3, 0x8}, 0xc) sendmsg(0xffffffffffffffff, &(0x7f0000001dc0)={0x0, 0x0, &(0x7f0000001640)=[{&(0x7f00000013c0)="2770c34f2aaec7dad781bf206bebf8191e7ca3eb75eababb4720a018bcbb8ee2225dd58c3d", 0x25}], 0x1, &(0x7f0000002a00)=ANY=[], 0x0, 0x20000000}, 0x4000004) 2018/04/05 21:37:32 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000000000000000000028000006a0a00fffffff6006118"], &(0x7f0000000080)='syzkalleP\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xd, 0x5, &(0x7f0000000040)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000000)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r0, 0x50, &(0x7f0000000400)}, 0x10) 2018/04/05 21:37:32 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6ffffff00000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:32 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000400008fe7bb5cd4e344cd0002800000720a00ff"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xf, 0x5, &(0x7f0000000040)=@framed={{0x18, 0xe0ff}, [@jmp={0x5, 0x0, 0xffffffcd}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) 2018/04/05 21:37:32 executing program 2: bpf$MAP_CREATE(0x1000000000000000, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:32 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8cffffff00000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:32 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8cffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:32 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0x22f, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) [ 374.620469] hugetlbfs: Bad mount option: "£Î ooPŸ¯2p‹I¸úbs%[ð4¡5ZMØ~éÚ·vTxEÆp Úõ\![ÆWÔ½ÎÙ™S9ÉelT¶Dûè²Uv3¹$òëK" 2018/04/05 21:37:32 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9}, 0x3d1) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000028000)={r0, &(0x7f0000000200), &(0x7f0000000240)="13"}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r0, &(0x7f0000000040)}, 0x10) 2018/04/05 21:37:32 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0x642, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:32 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000400008fe7bb5cd4e344cd0002800000720a00ff"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xf, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x2000}, [@jmp={0x5, 0x0, 0xffffffcd}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) 2018/04/05 21:37:32 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x5}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='hugetlbfs\x00', 0x0, &(0x7f0000000340)="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") mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000001380)='./file0\x00', &(0x7f0000001340)='proc\x00', 0x0, &(0x7f0000000240)) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000002240)={0xffffffff, 0x0, 0x8}, 0xa) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000001e40)={&(0x7f0000000040)='./file0/bus\x00', r0}, 0x10) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000001240)) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000001280)) mount(&(0x7f0000000000)='./file0/bus\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x2000, &(0x7f00000002c0)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000200)={&(0x7f00000001c0)='./file0/bus\x00', 0x0, 0x8}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001480)={0xffffffffffffffff, 0x28, &(0x7f0000001440)={0x0, 0x0}}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x6d) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000014c0)={r1, 0x3, 0x8}, 0xc) 2018/04/05 21:37:32 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6ffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:32 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000000000000000000028000006a0a00fffffff6006118"], &(0x7f0000000080)='syzkalleP\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xd, 0x5, &(0x7f0000000040)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) mkdir(&(0x7f0000000500)='./file0/file0\x00', 0x1) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffff, 0x100000001, 0x10}, 0xc) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000480)={r1, &(0x7f0000000140)="30110acddd5a60b8a2d951ad6b79dd99ac072bdeaf4e2954a3007ee6af1bf782d4de4cc3606fc6415844a0", &(0x7f00000004c0)="4310655fdfec", 0x3}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r0, 0x50, &(0x7f0000000400)}, 0x10) [ 374.925917] hugetlbfs: Bad mount option: "£Î ooPŸ¯2p‹I¸úbs%[ð4¡5ZMØ~éÚ·vTxEÆp Úõ\![ÆWÔ½ÎÙ™S9ÉelT¶Dûè²Uv3¹$òëK" 2018/04/05 21:37:32 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:32 executing program 2: bpf$MAP_CREATE(0x800000000000000, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:32 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9}, 0x3d1) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000028000)={r0, &(0x7f0000000200), &(0x7f0000000240)="13"}, 0x20) bpf$MAP_DELETE_ELEM(0x6, &(0x7f0000000080)={r0, &(0x7f0000000040)}, 0x10) 2018/04/05 21:37:32 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xa4, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:32 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000400008fe7bb5cd4e344cd0002800000720a00ff"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xf, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x48}, [@jmp={0x5, 0x0, 0xffffffcd}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) 2018/04/05 21:37:32 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x5}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='hugetlbfs\x00', 0x0, &(0x7f0000000340)="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") mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000001380)='./file0\x00', &(0x7f0000001340)='proc\x00', 0x0, &(0x7f0000000240)) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000002240)={0xffffffff, 0x0, 0x8}, 0xa) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000001e40)={&(0x7f0000000040)='./file0/bus\x00', r0}, 0x10) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000001240)) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000001280)) mount(&(0x7f0000000000)='./file0/bus\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x2000, &(0x7f00000002c0)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000200)={&(0x7f00000001c0)='./file0/bus\x00', 0x0, 0x8}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001480)={0xffffffffffffffff, 0x28, &(0x7f0000001440)}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x6d) 2018/04/05 21:37:32 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000000000000000000028000006a0a00fffffff6006118"], &(0x7f0000000080)='syzkalleP\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg(r0, &(0x7f0000000c00)={&(0x7f0000000600)=@nfc={0x27, 0x1, 0x1, 0x1}, 0x80, &(0x7f0000000a80)=[{&(0x7f0000000680)="49ec9d1dee6419292dd14754c23ce678bd6753ec75f5859e2428ad4cdcfdc4b6adcf5630", 0x24}, {&(0x7f00000006c0)="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", 0xfc}, {&(0x7f00000007c0)="e05f9997b2aa0e9618ca2dd05ca7275912fb441c5913aa19ecf917cb62721b958aae76363f5a2e4624b7f70c94176368d2c904bddefae85d23a58e83395ad3710063483de6c678c444c0b1abffb61b8b5f8ef37cbff0a6ab968b9f2ec464956a290ba4bba6d848d189a5ceff3a6969e2fab56b006c8525d3a263184987947561a60edae81dab66903eec30643b3ac8ec42e8e955a1e63d42715e97e000a33897f33f3c6038072bfac2705c480c49d0cd984a4c69eb03", 0xb6}, {&(0x7f0000000880)="5b74a4dcb72376000400000000000057dd10089154dfe8a45beb", 0x1a}, {&(0x7f00000008c0)="a2fcd75430e9b9309ec479bc87760debc02558e03a6f9ac64b5ec861b5d61d092c5064d5b5ccbc0d873f4e4c7e4d5aeff2e3b42766ce86ae55be22d35329bd4f5011f2cd825d4329a2f2e0dcc0d4654d3d7007a01ac8334453d6f01618db40f9313552cdebf3328f254eaa99091d4ceb8c47486685026c65941355c208765f7a55e6fd873966a9d7ef91e19520a8e5e4239f127e825082b03b38fdc5deb374d121c6afb6a1edc5619cc829bda0816172feeb839538bae8c0b71c4bf6822fd330238a2b269c636a0e2511e612a6970ce04fec39800a8f44602dcbca99ab613bc5128dbd", 0xe3}, {&(0x7f00000009c0)="f559816db94ebbd30a70108dc735045bfd580c9d5efc469b040d98a9dd2f4914c090dfabb02a3e37b78fe893e6201c3294129867ffc50fc33b7b3d8b522c94e5c694d96bbe83cc27ced24bd769190fcfa4466a04b0e6c73d3cf81d8a3ba4a8ba48011315bc7ff3af083b15d6e1e36b8f0633a77aedc74d23655042e51f97796cdcf59573747be28b0389330139abd0dfe90b9c", 0x93}], 0x6, &(0x7f0000000b00)=[{0x100, 0x19f, 0x1, "d9d307a2aef8f9cb55c0bc82097edaadec0b58ffb82ac1f5b890ddde815cb4bceb478b358a9879bb5fcbbf4af9eccf4c23bbbb466febe7dd76a0af397b600ba82e2e894bafe9b91918235ab5d0a772b2d55c7075b9164525c6351ca8fe557067aa9ca52ff48773a49462dfa7405cb1d31d920586ee6d43df431a04732d9de87600404860961f18336a62771cee2288d518b733202ada5f5893cd19c361c2356b0b47c40e59ea77e14eb298058e19f7700386f67096082ace7f7e43d47ba151745fa600ddc7937059888ff02ee768dadfddebde12ad3613544836d26cf4aa4fc4315011673e00d2e906a241f43bd631"}], 0x100, 0x844}, 0x1) r1 = perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x944, 0x752bd0e, 0x3, 0x9, 0x0, 0x101, 0x0, 0x8, 0x100000001, 0x1, 0x4a4d, 0x3f, 0x9, 0x9, 0x3f, 0x401, 0x5a, 0x8ff2, 0x6, 0x3fffffffc, 0x8, 0x6, 0x3, 0x81, 0x7ff, 0x1, 0x8, 0x7, 0x2, 0x8000, 0x8000, 0x9e, 0x0, 0x5b9b, 0x26, 0x1, 0x0, 0x54, 0x0, @perf_bp={&(0x7f0000000000), 0x7}, 0x20, 0x12, 0x8, 0x1, 0x100000000, 0xfffffffffffffffb, 0x49a}, 0xffffffffffffffff, 0xf, 0xffffffffffffff9c, 0xa) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xd, 0x5, &(0x7f0000000040)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r2, 0x50, &(0x7f0000000400)}, 0x10) 2018/04/05 21:37:32 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:33 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000400008fe7bb5cd4e344cd0002800000720a00ff"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xf, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x2000000000000000}, [@jmp={0x5, 0x0, 0xffffffcd}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) 2018/04/05 21:37:33 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0x3f6, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:33 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000000000000000000028000006a0a00fffffff6006118"], &(0x7f0000000080)='syzkalleP\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000000)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000140)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xd, 0x5, &(0x7f0000000040)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r2, 0x50, &(0x7f0000000400)}, 0x10) 2018/04/05 21:37:33 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:33 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9}, 0x3d1) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000028000)={r0, &(0x7f0000000200), &(0x7f0000000240)="13"}, 0x20) bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000040)}, 0x10) [ 375.159548] hugetlbfs: Bad mount option: "£Î ooPŸ¯2p‹I¸úbs%[ð4¡5ZMØ~éÚ·vTxEÆp Úõ\![ÆWÔ½ÎÙ™S9ÉelT¶Dûè²Uv3¹$òëK" 2018/04/05 21:37:33 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:33 executing program 2: bpf$MAP_CREATE(0x11000000, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:33 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x5}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='hugetlbfs\x00', 0x0, &(0x7f0000000340)="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") mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000001380)='./file0\x00', &(0x7f0000001340)='proc\x00', 0x0, &(0x7f0000000240)) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000002240)={0xffffffff, 0x0, 0x8}, 0xa) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000001e40)={&(0x7f0000000040)='./file0/bus\x00', r0}, 0x10) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000001240)) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000001280)) mount(&(0x7f0000000000)='./file0/bus\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x2000, &(0x7f00000002c0)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000200)={&(0x7f00000001c0)='./file0/bus\x00', 0x0, 0x8}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001480)={0xffffffffffffffff, 0x28, &(0x7f0000001440)}, 0x10) 2018/04/05 21:37:33 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xdc8, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:33 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000400008fe7bb5cd4e344cd0002800000720a00ff"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xf, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x68000000}, [@jmp={0x5, 0x0, 0xffffffcd}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) 2018/04/05 21:37:33 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:33 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9}, 0x3d1) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000028000)={r0, &(0x7f0000000200), &(0x7f0000000240)="13"}, 0x20) bpf$MAP_DELETE_ELEM(0xc, &(0x7f0000000080)={r0, &(0x7f0000000040)}, 0x10) 2018/04/05 21:37:33 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000000000000000000028000006a0a00fffffff6006118"], &(0x7f0000000080)='syzkalleP\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xd, 0x5, &(0x7f0000000040)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={r0, 0x116, &(0x7f0000000400)}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0x1, 0x28, &(0x7f0000000000)={0x0, 0x0}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={r0, 0xfffffffffffffefe, &(0x7f0000000740)}, 0x7) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={r1, 0x1, 0x10}, 0xc) 2018/04/05 21:37:33 executing program 2: bpf$MAP_CREATE(0x300, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:33 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 375.448084] hugetlbfs: Bad mount option: "£Î ooPŸ¯2p‹I¸úbs%[ð4¡5ZMØ~éÚ·vTxEÆp Úõ\![ÆWÔ½ÎÙ™S9ÉelT¶Dûè²Uv3¹$òëK" 2018/04/05 21:37:33 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8cffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:33 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0x918, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:33 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000400008fe7bb5cd4e344cd0002800000720a00ff"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xf, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x48000000}, [@jmp={0x5, 0x0, 0xffffffcd}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) 2018/04/05 21:37:33 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="1800007cd9c98f05cfd9172100"], &(0x7f0000000080)='syzkalleP\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xd, 0x20, &(0x7f0000000480)=ANY=[@ANYBLOB="1800000000000000000000000000000005000000000000950000000000000058e6fd24431294628329c3e2a3e60600000000000000ff94676f78d2047d364e0bb4344b15e69c196f77010300000028c7445d8426dc77e4139664851d933718dd4ead6567c8c72e2f6a8b7408d5ac3b0e5453b75d24effac6743af411bc5d683269ccc3c0b3ab2f606acd86cfb34cc2cef5d3650a7258159a3f0b15655333d2f06af2f5b9ac5a57a736e75e6ef6db697a27e0aee39912f8432dd502a82126ee6db9bf9180d3564e0a39238a27eb7e04e5293aa089c454771c36348c898de32f36f464d44cd9abf8d43acc8bea4dd4f6cb43c649df6599c5b1e4c5bff9904c56fd640000000000"], &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0xbb, &(0x7f0000000300)=""/187, 0x0, 0x4}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r1, 0x50, &(0x7f00000005c0)={0x0, 0x0}}, 0x10) socketpair$ax25(0x3, 0x5, 0xf0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f00000003c0)=r0, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=r2, 0x3) 2018/04/05 21:37:33 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9}, 0x3d1) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000028000)={r0, &(0x7f0000000200), &(0x7f0000000240)="13"}, 0x20) bpf$MAP_DELETE_ELEM(0x10, &(0x7f0000000080)={r0, &(0x7f0000000040)}, 0x10) 2018/04/05 21:37:33 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:33 executing program 2: bpf$MAP_CREATE(0xa00, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:33 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x5}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='hugetlbfs\x00', 0x0, &(0x7f0000000340)="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") mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000001380)='./file0\x00', &(0x7f0000001340)='proc\x00', 0x0, &(0x7f0000000240)) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000002240)={0xffffffff, 0x0, 0x8}, 0xa) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000001e40)={&(0x7f0000000040)='./file0/bus\x00', r0}, 0x10) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000001240)) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000001280)) mount(&(0x7f0000000000)='./file0/bus\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x2000, &(0x7f00000002c0)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000200)={&(0x7f00000001c0)='./file0/bus\x00', 0x0, 0x8}, 0x10) 2018/04/05 21:37:33 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000400008fe7bb5cd4e344cd0002800000720a00ff"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xf, 0x5, &(0x7f0000000040)=@framed={{0x18, 0xe0ffffff}, [@jmp={0x5, 0x0, 0xffffffcd}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) [ 375.829330] hugetlbfs: Bad mount option: "£Î ooPŸ¯2p‹I¸úbs%[ð4¡5ZMØ~éÚ·vTxEÆp Úõ\![ÆWÔ½ÎÙ™S9ÉelT¶Dûè²Uv3¹$òëK" 2018/04/05 21:37:33 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:33 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0x7c5, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:33 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000a85f6f7702800000040a00fffffff6006118"], &(0x7f0000000080)='syzkalleP\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r0 = socket$kcm(0x29, 0x7, 0x0) recvmsg$kcm(r0, &(0x7f0000000800)={&(0x7f0000000480)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000500)=""/176, 0xb0}, {&(0x7f0000000000)=""/31, 0x1f}, {&(0x7f0000000140)=""/15, 0xf}, {&(0x7f00000005c0)=""/231, 0xe7}, {&(0x7f00000006c0)=""/144, 0x90}], 0x5, &(0x7f0000000840), 0x28f, 0x4}, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xd, 0x5, &(0x7f0000000040)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) socketpair$packet(0x11, 0x3, 0x300, &(0x7f00000003c0)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r1, 0x50, &(0x7f0000000400)}, 0x10) 2018/04/05 21:37:33 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000400008fe7bb5cd4e344cd0002800000720a00ff"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xf, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x4000000}, [@jmp={0x5, 0x0, 0xffffffcd}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) 2018/04/05 21:37:33 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff8c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:33 executing program 2: bpf$MAP_CREATE(0x11, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:33 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x5}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='hugetlbfs\x00', 0x0, &(0x7f0000000340)="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") mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000001380)='./file0\x00', &(0x7f0000001340)='proc\x00', 0x0, &(0x7f0000000240)) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000002240)={0xffffffff, 0x0, 0x8}, 0xa) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000001e40)={&(0x7f0000000040)='./file0/bus\x00', r0}, 0x10) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000001240)) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000001280)) mount(&(0x7f0000000000)='./file0/bus\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x2000, &(0x7f00000002c0)) 2018/04/05 21:37:33 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9}, 0x3d1) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000028000)={r0, &(0x7f0000000200), &(0x7f0000000240)="13"}, 0x20) bpf$MAP_DELETE_ELEM(0x8, &(0x7f0000000080)={r0, &(0x7f0000000040)}, 0x10) 2018/04/05 21:37:33 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:33 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='syzkalleP\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xd, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000050000000000000000000000000000008500000000000000feac084c58461839cd4e36d2aeb53c0f359f4025205bff7585c29e3f8f8ea6463bbd375f8ccaca47c657e9a8ca28426f23b494e7ed86b9ea62cd873aac1856eb0c5a29798e3ed9b9741cfdde297f302012fae0272ea37b8c69a1305c1933634a7a318701de470a7dcb15400311073faf9c6af48f333397e7ea0866715fffe3b4bbf8c48bd2939a98cacc04e8870c7d389ec69999a0"], &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) socketpair(0xd, 0x2, 0x1, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000000)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000003c0)={&(0x7f0000000040)='./file0\x00', r1}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r0, 0x50, &(0x7f0000000400)}, 0x10) 2018/04/05 21:37:33 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0x8b8, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:33 executing program 2: bpf$MAP_CREATE(0xd00000000000000, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) [ 376.012102] hugetlbfs: Bad mount option: "£Î ooPŸ¯2p‹I¸úbs%[ð4¡5ZMØ~éÚ·vTxEÆp Úõ\![ÆWÔ½ÎÙ™S9ÉelT¶Dûè²Uv3¹$òëK" 2018/04/05 21:37:34 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9}, 0x3d1) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000028000)={r0, &(0x7f0000000200), &(0x7f0000000240)="13"}, 0x20) bpf$MAP_DELETE_ELEM(0x7, &(0x7f0000000080)={r0, &(0x7f0000000040)}, 0x10) 2018/04/05 21:37:34 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:34 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000400008fe7bb5cd4e344cd0002800000720a00ff"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xf, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x9cffffff}, [@jmp={0x5, 0x0, 0xffffffcd}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) 2018/04/05 21:37:34 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:34 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0x893, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:34 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x5}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='hugetlbfs\x00', 0x0, &(0x7f0000000340)="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") mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000001380)='./file0\x00', &(0x7f0000001340)='proc\x00', 0x0, &(0x7f0000000240)) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000002240)={0xffffffff, 0x0, 0x8}, 0xa) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000001e40)={&(0x7f0000000040)='./file0/bus\x00', r0}, 0x10) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000001240)) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000001280)) 2018/04/05 21:37:34 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000000000000000000028000006a0a00fffffff6006118"], &(0x7f0000000080)='syzkalleP\x00', 0xfffffffffffffffd, 0xce, &(0x7f0000000180)=""/206}, 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000000000000000000050000000000ddff00000000000000009500000000000000"], &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r0, 0x50, &(0x7f0000000400)}, 0x10) r1 = perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x7f, 0x2, 0x1ff, 0x20, 0x0, 0x1, 0xa500c, 0x1, 0xc6b, 0x100, 0xae3, 0xfffffffffffffffe, 0xfa, 0x9, 0x0, 0x2728, 0x8, 0x2, 0x2, 0x9, 0x1, 0x1000, 0x7fff, 0x40778cbe, 0x7, 0x101, 0x21f, 0x3f, 0xc70, 0x5, 0x6, 0x4, 0xd7fa, 0x9, 0xfffffffffffffff8, 0x1ff, 0x0, 0x6527, 0x0, @perf_bp={&(0x7f0000000000), 0x1}, 0x800, 0x101, 0x4, 0x7, 0x200, 0x9, 0x6}, 0xffffffffffffffff, 0xf, 0xffffffffffffff9c, 0x2) ioctl$PERF_EVENT_IOC_DISABLE(r1, 0x2401, 0x8001) 2018/04/05 21:37:34 executing program 2: bpf$MAP_CREATE(0xe000000, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) [ 376.280743] hugetlbfs: Bad mount option: "£Î ooPŸ¯2p‹I¸úbs%[ð4¡5ZMØ~éÚ·vTxEÆp Úõ\![ÆWÔ½ÎÙ™S9ÉelT¶Dûè²Uv3¹$òëK" 2018/04/05 21:37:34 executing program 2: bpf$MAP_CREATE(0x9000000, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:34 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:34 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000400008fe7bb5cd4e344cd0002800000720a00ff"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xf, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x7a00}, [@jmp={0x5, 0x0, 0xffffffcd}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) 2018/04/05 21:37:34 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9}, 0x3d1) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000028000)={r0, &(0x7f0000000200), &(0x7f0000000240)="13"}, 0x20) bpf$MAP_DELETE_ELEM(0xf, &(0x7f0000000080)={r0, &(0x7f0000000040)}, 0x10) 2018/04/05 21:37:34 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6ffffff00000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:34 executing program 5: socketpair(0x0, 0x3, 0x100000001, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair(0x3, 0x0, 0x2, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xf, 0x3, &(0x7f0000000580)=ANY=[@ANYBLOB="180000000000000000000000028000006a0a00fffffff6006118"], &(0x7f0000000080)='syzKadleP\x00', 0x0, 0xfffffffffffffffc, &(0x7f0000000480)=""/206, 0x0, 0x1}, 0xffffff5e) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x4) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xd, 0x5, &(0x7f0000000040)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r3, 0x50, &(0x7f0000000400)}, 0x10) 2018/04/05 21:37:34 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0x36, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:34 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:34 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000400008fe7bb5cd4e344cd0002800000720a00ff"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xf, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x10000000}, [@jmp={0x5, 0x0, 0xffffffcd}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) 2018/04/05 21:37:34 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x5}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='hugetlbfs\x00', 0x0, &(0x7f0000000340)="a3ce050d6f1a6f500f9faf081f32708b49b8fa6273255b1cf034a1355a4dd87ee9dab776547845c67009daf55c215bc657d4bdced9995339c9656c0354b644fbe8b2557633b91724f2eb4b00182f530928e30c28ce65d66f3ab88f54c5758ad9ea29154cbc20239fc626ed80b5856a9268794bffa7dd1e12162493d57d9289bd05201583b3574883512297e15117104cc52a3a9aa78b23abda223d651bc199658f5cdf2e3563e69ad8b37d462d74d08f8eb28746eba92d1846d290c409f086452f39e27ef8dc484a0b76e37599bfcbbff8d1954d7abdaec3496bc76e895a2c94bdebadec5b1518d36ee85f265c6c9213230c9b26ecc2be9f04dc98faca3d3750e422680989551a6555e905280c4eb44f28fb113f7db30ac8584b4eef85bfab7cadc1d442397b58ffbe43645732b64f3b59077613359e6a90a76547226e4b6180fd5feb59bcd47781712b599c9ca71036dd0cd57ec6f2338d555c10affce767fcf874a3e119efa339f80718493f5aab21dc22036e39f39f0fbf113b33fd38bd4b92aaf2fbd3a06b85bcfa951ef4ea3c3e79c0a1e7164e9a0e1863bf947c21e98202affc03e1a749b982ec8493e784d44c6fbfbbe51393efee20547acb1e0e96d14cba142b9613b6775c97d404c9402ffb3be93850363fca18f6287572ba7ac4409777cc51e8c27744e530ebc2563c5048354359d033321e986dc5b365c5fe26d0cd1ea1f912b60b38d62aecf65ca8331a5725b5b6ec7123851a2d1ddb20d625991438a727c55853d83453ed9191790b7dec5a40bf40dc809782fbd51f18a25a43bf502faf6a76bb2775821193c701c80deeb7eae939a42e3a50acb8055650dfb304e31945983643432c056430e16d73b0b5f2d71607750b946d9a3c739617d995fb949957e77fba0f199a07985458fe141f5078cb9526da34eb29fee9d538e524f1ce37d5a12e738cfa6464d7c4d02a12650fd7ca68b817837211404909715ebf76840c78053633b6150dd4305088a1fe4a97b9bb09b425cd9cef6c529752fd351b506deba77fc21b3b8e0ac789cac68a6bd11174dc0c6e526622960683f0a2e0a414718f3419cdf64bea0ce0da958eb48255658ca23fcf510b67eef5e6e3ed63543aa3ad9335bb2efcfea2b79aec961d6baa8522e5741b9c44fcc277ebbe0ec8689a479bd559b0ee7fe122328cabb57d4f5b771c712915c0030e7ddcd0fe51ac3056c1733f540a842456d4c4530b9f08ae162296f9a2fe9b8f7af4eaef8de92171893511915f74cad7d2f16f29e653329d72a8cff6510f627560bc75e3b5d8fb740ba934a00ca74b6044c59b90e56ec330c64cfdc8d5bcc9e80a1361bf2ccd238608f0f1b90cf10f8b8b5a80a3b5923be179f2456ba545f3c75041d2680ed333a83d938d5c743ae2c8310e603cd39176f6bc388439418ddb7ffa2386e8734dc93a67d4f31b25c5f03eeab67d8b583c11a05ffa84222308ed4ac5b62aef7067da6f9781fc9f59b72be8e06bb73616de294c8c8adaec5e4db25772705c315f2c2e9438fb6de55db800cd30bf19b33c06430bc16b7acef3f11db43247e730b27b839cf05589d27c61eceaef04d9840419a9d1e50dade563da25b24131f49b78a4b441553ee8ee4c7b33ef7c0b8664fa0ad67cb24876ed11f6f6c6adf1091184291283cd211245b27885e487f48476abc3c7b35ef4e3d9cf46f8f818491beb709873a64a0ce4340b18e8ce4d3bf5ce33dc82165e1ff767c5a05faac7fff1977c4a8ed07ad1d9c426b55e8dcfe9962b6623f284200928b337a9250bc71ae39921f882452d92d9b2acce8840e3d2e7571385b2d811323dab33a938027f33bfeeea18b396acd8ffbb56da1dfb1ff507b3906eb27228538ab0c526531b5532020a334bf97aba773259af7989416139fa27f8ea98ffa6acd87953af1e2264374309561cab587d509f949ce93c08c013217dbf67fed8027cf7c9a2ce6c53d8e5ebbc71676de37593a1e2a191d62354f9cce032960f5ec678235c0ae9c030b2f3f74473c37271c34e1dcf9d0076d8e8df7eb4c701796efae9933b5b727c936263c582c857f41d74d23437e3546a4eccdd9d278b794789c9e1058732a7a763c3382a82b8544e0b4b6fb057db8f78319b3729d8ebafe7017949c82bd4882abf4a44cc4c036197fd2d55a9355b830a6ad162abc908e42949912b5aaf6e75b7925444921324360cbbc903eb499d4334c35dffd7748125fa2d89f144a50149a16e3df15d1586c416ef05b6b0feeba8ef8529b56ed69baa41b6b23eb174e78bf98364e8216e74c22400d49ac8fe3f43ed09d8e1c29b4667bc0b520273c39d893402beeb0292e49ad69559fe1c5180cdb64cbf901b019b9ab4fa6e507f003053e94994b12b2c0d602b4759345d80150ab7f0efcba7334bb7cf34dc3e1d10c1bbb4a920cf1030304b9e69c384bc109d475c6c973be8c99b7129d92b21b897110806ac80c17816cb3fba9cc8b1cf52036697246f499c258c8ed00054c15dc24dd2552523a549ad02fd32b4238b8f7ba3596db1b4cebb780fca15f6f2102f797c537b22b4ed4e1c617b8b7355765f66c7574405cd4912c5f0a74c6bdac16bb0eafcedfcc24f9753be0ff674ff63b66a5a60d77057d31cc438794837f82e69e7a811b4b6a00d4e8fce1eef6e488cf15e426fcbdc564c4034f4279a36321246fba777466d3d98d0adb4f9fe69e352bdc99dbb8553f8c69f9300960cffe8e4afe277d4e80c7ec19a4f4d94146f71a0aa2f79b9954b828fd92416a660d1f431aeb02f342d1b2732d5fe50f70f4c857cd2b9fafec375bc424dcf982e23a0e6bb4d5ede099a355282f85a3109559f6dcd045929e82c5ba64da2abacdb9e8115eb0eda3bc3974918668e0fe8ff00944f7191fbc3c4ab3d05a15911ae7b6c2d9eb6c7eaed20eccf15795184cf04e889c9274813cde7a248005114d996a80554545bfe920d6fbb073df8cbca1a3fb297db8b18463f632e8834eb278203a6106fbec78e8af2851f22b524202026d077768da263c46ab27b85184bd65774f867819aa23b60d4fa021f21e960646a01e2643a1d5be33fdb3ba36c140d51d3ae27875a27f7be133f29c34556db2558178612b598e29a8b675912c1ec9836f98e4ac7ad231492ba733dfa34a4fd4ee63ba6346cbc2fedf41d3d06fdeace1b650d02624ff94070422e018261bfd431696fc47d9e030ccd2b955659c56d8493f4e603c4efeccd35ad1331c00dd179b00bd823f7b5726b24e4f3b48614c09adac6b834dcd26c8253b6786dcb0d15d28a5c4de52fb15ac764314a8c830bfd42edf5f9dd14ab81be5a1bd49423097868e0185145cd0624ad02f9a4932b51d91d5859eb400759384e66199489512e7d992a80365b34fb4e4232e36037d4f0719c30eb3bc76986bd1bdf18e5d52f73666838d2ff6bbdf8f90803b818ffd06834ae510bb76cbd26a5ce46e02cd8fef30368cc61c92326ea1092521feab08196621a149ea04f7e401f808bac3f1df91f107c6754e9fd93539f815702854f944674d9f2768171d847b2b7d7653a8a7a9ecd9782156476e6b50dc2de2bc882f9480053d5c8766ead614de684a214a1d41b60bdd128095575659a1c47ee425eb44fe6f590566baa172964239b58110edbb9e9beead1d605b959a4257d517aee2a0d5ae56ab980edcbebfeb8a66ecc7fde06035774f64b984be2afdae843472f3a70ac2415bcb7d25bb815fee8c590eeab92e0e90658597f8f78eb33112bc5d28ef2888e47a5ec63f9eac2383052cf2f4c4d42f56b34d4c49090cfd0e9c7ba2ed5818840fee1d854c018f68b167273203cc934ffc890be4e47483fec0ea90eb50cea1a866b727239e2ed799b85d73f0c66a5b68340e51517dd21a3e4ea3d27c43645f667f05fbb6a97368fff565104a5717da6d944f359e5abf6a295f7b3a1def78fab1f6b313cebd00eadccd51e558bc84f2426abec4e88244644e871ebfb2763c1b396b76073d10398792cd6ba2c3c93584d35dbcbfda016d4595118b895170cc6870524f7d43954b2991468ab53fc4feae28c4fda7dfd8ccff7cce43cc425454c8a974c5af90f8838afe488fc74083c0cea5d2feddfae88ce2439e3db7a16026b2cbab0be8c3651fbfb3eea899991dfa4c512ea958a1c1553b2276a7adf533a4a902feb6512e96f124f29ecbd5bde384eea68595027a65be4c5f984bb069f7216e68d58b3d0c5a88096a505a33260e389834506a1cda6343030ab7ee50e13fdd741e66e7cac7f9d9a3d83fdd01257389dad2e3af0ca7962913e92b86e50d50ea52cf7e4fb5f160b50c4e976238b9fd1faf77780345462d6e1a1ffebc0ced6222a6a39c54c3ccdc844c6d094b008f446743d1beaa05d0624a21ad12e5c0ac18307313fab5c3dd5e7c88b31b7524310b6d95e0a1a886dbbee61757840302e4c45503eb754c5492a5fd9b57b6ef9de9941a5095cbf56af6e742254f7d3ca5b295823027ab39b97f7d8ecf1bf91f4ea56d0ec29168c87c4468ff52078906477c39e398a2fcb6a825607140c599636fabd5a3ea2042637fe5dcb1fed386c33ed954ee472ff241022825f70e3aebf14a9b13152ffede6b2335f3e94b3a8d1cb75c1536c18cbeaf305c791f76961fe4e155b603fcdad1b42403d106c6b274bb8fee7d9c0ddac0f13448b91591d55052b8f8c9e43a4f588a34aa75f4a3dd39285d9978aec8163eaf26e37504f7d26d62acc357cd9adab1edb631aee6c29b10dbc753f393ddc2e7aa60af53cb4a2702233017b3e29e075320442e8cc8a5e83e458313aa062f9c93c57733eca9c2e4b9695bcf69c6a76eaa4a24d6d70a4c126676a20415bf53bc0bc3327b307ee4f2ab10007ee81a558de46b03caecb323e0978270cf61c57f14e0e60c018f9290a8924e361c7ae81c5d90948680e25ffe1f0955b5c400ae4d5ef5f1f4686957a037534e13c2aa23841a1ed04bfab5083aac68a392bac1d5d0cb0ac73e9845b3ad29d316a5c5565187e036075101a1a431fd3dcdda24fa5f06fb8132d2bb0505f9657e4a6963736c32836fc36b9a06f5652a1100bcb01a385d1fda95868f227f6f04276c5e5bd210d318804b898a26781fafc0be53dca0dbec01c27cb5a01b52cf026812013addce76b161e451f6d867b465adf730910206a21c570921a4e399173d4a76ff8033597d979fe91ba49206b9b190b656cde2107a33c37e07015b2367456d7705e67b698102660193a4c5521c07e87bcc18af5b3e4033b838623765763f55cbb38c2d07a620cd67c1caf7a6fa14aba5230a617ec381a9e5273c8e8db7b50e973f49de6134095450e8ebba9e972d73f8f0a944da4b3f53d84fb989842433cbb758ffb984774993770ba78797cb26302a92dfb8eef48496de3cb182f269cb509d79bfc") mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000001380)='./file0\x00', &(0x7f0000001340)='proc\x00', 0x0, &(0x7f0000000240)) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000002240)={0xffffffff, 0x0, 0x8}, 0xa) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000001e40)={&(0x7f0000000040)='./file0/bus\x00', r0}, 0x10) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000001280)) 2018/04/05 21:37:34 executing program 2: bpf$MAP_CREATE(0x2000000, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:34 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 376.649717] hugetlbfs: Bad mount option: "£Î ooPŸ¯2p‹I¸úbs%[ð4¡5ZMØ~éÚ·vTxEÆp Úõ\![ÆWÔ½ÎÙ™S9ÉelT¶Dûè²Uv3¹$òëK" 2018/04/05 21:37:34 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9}, 0x3d1) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000028000)={r0, &(0x7f0000000200), &(0x7f0000000240)="13"}, 0x20) bpf$MAP_DELETE_ELEM(0x5, &(0x7f0000000080)={r0, &(0x7f0000000040)}, 0x10) 2018/04/05 21:37:34 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0x82f, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:34 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:34 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000400008fe7bb5cd4e344cd0002800000720a00ff"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xf, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x6800}, [@jmp={0x5, 0x0, 0xffffffcd}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) 2018/04/05 21:37:34 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xff0f, 0x4, 0x80, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:34 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000000000000000000028000006a0a00fffffff6006118"], &(0x7f0000000080)='syzkalleP\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xd, 0x5, &(0x7f0000000040)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r0, 0x50, &(0x7f0000000400)}, 0x10) socketpair(0x0, 0x80000, 0x1f, &(0x7f0000000000)={0xffffffffffffffff}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000003c0)={r1, &(0x7f0000000140)="2a0cf7cc2329267f5b31684786730b5e6d6c9817d43d86a07cca8cc58592b363788bf05f941a3847d826de5a703a521f225d"}, 0x10) 2018/04/05 21:37:34 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x5}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='hugetlbfs\x00', 0x0, &(0x7f0000000340)="a3ce050d6f1a6f500f9faf081f32708b49b8fa6273255b1cf034a1355a4dd87ee9dab776547845c67009daf55c215bc657d4bdced9995339c9656c0354b644fbe8b2557633b91724f2eb4b00182f530928e30c28ce65d66f3ab88f54c5758ad9ea29154cbc20239fc626ed80b5856a9268794bffa7dd1e12162493d57d9289bd05201583b3574883512297e15117104cc52a3a9aa78b23abda223d651bc199658f5cdf2e3563e69ad8b37d462d74d08f8eb28746eba92d1846d290c409f086452f39e27ef8dc484a0b76e37599bfcbbff8d1954d7abdaec3496bc76e895a2c94bdebadec5b1518d36ee85f265c6c9213230c9b26ecc2be9f04dc98faca3d3750e422680989551a6555e905280c4eb44f28fb113f7db30ac8584b4eef85bfab7cadc1d442397b58ffbe43645732b64f3b59077613359e6a90a76547226e4b6180fd5feb59bcd47781712b599c9ca71036dd0cd57ec6f2338d555c10affce767fcf874a3e119efa339f80718493f5aab21dc22036e39f39f0fbf113b33fd38bd4b92aaf2fbd3a06b85bcfa951ef4ea3c3e79c0a1e7164e9a0e1863bf947c21e98202affc03e1a749b982ec8493e784d44c6fbfbbe51393efee20547acb1e0e96d14cba142b9613b6775c97d404c9402ffb3be93850363fca18f6287572ba7ac4409777cc51e8c27744e530ebc2563c5048354359d033321e986dc5b365c5fe26d0cd1ea1f912b60b38d62aecf65ca8331a5725b5b6ec7123851a2d1ddb20d625991438a727c55853d83453ed9191790b7dec5a40bf40dc809782fbd51f18a25a43bf502faf6a76bb2775821193c701c80deeb7eae939a42e3a50acb8055650dfb304e31945983643432c056430e16d73b0b5f2d71607750b946d9a3c739617d995fb949957e77fba0f199a07985458fe141f5078cb9526da34eb29fee9d538e524f1ce37d5a12e738cfa6464d7c4d02a12650fd7ca68b817837211404909715ebf76840c78053633b6150dd4305088a1fe4a97b9bb09b425cd9cef6c529752fd351b506deba77fc21b3b8e0ac789cac68a6bd11174dc0c6e526622960683f0a2e0a414718f3419cdf64bea0ce0da958eb48255658ca23fcf510b67eef5e6e3ed63543aa3ad9335bb2efcfea2b79aec961d6baa8522e5741b9c44fcc277ebbe0ec8689a479bd559b0ee7fe122328cabb57d4f5b771c712915c0030e7ddcd0fe51ac3056c1733f540a842456d4c4530b9f08ae162296f9a2fe9b8f7af4eaef8de92171893511915f74cad7d2f16f29e653329d72a8cff6510f627560bc75e3b5d8fb740ba934a00ca74b6044c59b90e56ec330c64cfdc8d5bcc9e80a1361bf2ccd238608f0f1b90cf10f8b8b5a80a3b5923be179f2456ba545f3c75041d2680ed333a83d938d5c743ae2c8310e603cd39176f6bc388439418ddb7ffa2386e8734dc93a67d4f31b25c5f03eeab67d8b583c11a05ffa84222308ed4ac5b62aef7067da6f9781fc9f59b72be8e06bb73616de294c8c8adaec5e4db25772705c315f2c2e9438fb6de55db800cd30bf19b33c06430bc16b7acef3f11db43247e730b27b839cf05589d27c61eceaef04d9840419a9d1e50dade563da25b24131f49b78a4b441553ee8ee4c7b33ef7c0b8664fa0ad67cb24876ed11f6f6c6adf1091184291283cd211245b27885e487f48476abc3c7b35ef4e3d9cf46f8f818491beb709873a64a0ce4340b18e8ce4d3bf5ce33dc82165e1ff767c5a05faac7fff1977c4a8ed07ad1d9c426b55e8dcfe9962b6623f284200928b337a9250bc71ae39921f882452d92d9b2acce8840e3d2e7571385b2d811323dab33a938027f33bfeeea18b396acd8ffbb56da1dfb1ff507b3906eb27228538ab0c526531b5532020a334bf97aba773259af7989416139fa27f8ea98ffa6acd87953af1e2264374309561cab587d509f949ce93c08c013217dbf67fed8027cf7c9a2ce6c53d8e5ebbc71676de37593a1e2a191d62354f9cce032960f5ec678235c0ae9c030b2f3f74473c37271c34e1dcf9d0076d8e8df7eb4c701796efae9933b5b727c936263c582c857f41d74d23437e3546a4eccdd9d278b794789c9e1058732a7a763c3382a82b8544e0b4b6fb057db8f78319b3729d8ebafe7017949c82bd4882abf4a44cc4c036197fd2d55a9355b830a6ad162abc908e42949912b5aaf6e75b7925444921324360cbbc903eb499d4334c35dffd7748125fa2d89f144a50149a16e3df15d1586c416ef05b6b0feeba8ef8529b56ed69baa41b6b23eb174e78bf98364e8216e74c22400d49ac8fe3f43ed09d8e1c29b4667bc0b520273c39d893402beeb0292e49ad69559fe1c5180cdb64cbf901b019b9ab4fa6e507f003053e94994b12b2c0d602b4759345d80150ab7f0efcba7334bb7cf34dc3e1d10c1bbb4a920cf1030304b9e69c384bc109d475c6c973be8c99b7129d92b21b897110806ac80c17816cb3fba9cc8b1cf52036697246f499c258c8ed00054c15dc24dd2552523a549ad02fd32b4238b8f7ba3596db1b4cebb780fca15f6f2102f797c537b22b4ed4e1c617b8b7355765f66c7574405cd4912c5f0a74c6bdac16bb0eafcedfcc24f9753be0ff674ff63b66a5a60d77057d31cc438794837f82e69e7a811b4b6a00d4e8fce1eef6e488cf15e426fcbdc564c4034f4279a36321246fba777466d3d98d0adb4f9fe69e352bdc99dbb8553f8c69f9300960cffe8e4afe277d4e80c7ec19a4f4d94146f71a0aa2f79b9954b828fd92416a660d1f431aeb02f342d1b2732d5fe50f70f4c857cd2b9fafec375bc424dcf982e23a0e6bb4d5ede099a355282f85a3109559f6dcd045929e82c5ba64da2abacdb9e8115eb0eda3bc3974918668e0fe8ff00944f7191fbc3c4ab3d05a15911ae7b6c2d9eb6c7eaed20eccf15795184cf04e889c9274813cde7a248005114d996a80554545bfe920d6fbb073df8cbca1a3fb297db8b18463f632e8834eb278203a6106fbec78e8af2851f22b524202026d077768da263c46ab27b85184bd65774f867819aa23b60d4fa021f21e960646a01e2643a1d5be33fdb3ba36c140d51d3ae27875a27f7be133f29c34556db2558178612b598e29a8b675912c1ec9836f98e4ac7ad231492ba733dfa34a4fd4ee63ba6346cbc2fedf41d3d06fdeace1b650d02624ff94070422e018261bfd431696fc47d9e030ccd2b955659c56d8493f4e603c4efeccd35ad1331c00dd179b00bd823f7b5726b24e4f3b48614c09adac6b834dcd26c8253b6786dcb0d15d28a5c4de52fb15ac764314a8c830bfd42edf5f9dd14ab81be5a1bd49423097868e0185145cd0624ad02f9a4932b51d91d5859eb400759384e66199489512e7d992a80365b34fb4e4232e36037d4f0719c30eb3bc76986bd1bdf18e5d52f73666838d2ff6bbdf8f90803b818ffd06834ae510bb76cbd26a5ce46e02cd8fef30368cc61c92326ea1092521feab08196621a149ea04f7e401f808bac3f1df91f107c6754e9fd93539f815702854f944674d9f2768171d847b2b7d7653a8a7a9ecd9782156476e6b50dc2de2bc882f9480053d5c8766ead614de684a214a1d41b60bdd128095575659a1c47ee425eb44fe6f590566baa172964239b58110edbb9e9beead1d605b959a4257d517aee2a0d5ae56ab980edcbebfeb8a66ecc7fde06035774f64b984be2afdae843472f3a70ac2415bcb7d25bb815fee8c590eeab92e0e90658597f8f78eb33112bc5d28ef2888e47a5ec63f9eac2383052cf2f4c4d42f56b34d4c49090cfd0e9c7ba2ed5818840fee1d854c018f68b167273203cc934ffc890be4e47483fec0ea90eb50cea1a866b727239e2ed799b85d73f0c66a5b68340e51517dd21a3e4ea3d27c43645f667f05fbb6a97368fff565104a5717da6d944f359e5abf6a295f7b3a1def78fab1f6b313cebd00eadccd51e558bc84f2426abec4e88244644e871ebfb2763c1b396b76073d10398792cd6ba2c3c93584d35dbcbfda016d4595118b895170cc6870524f7d43954b2991468ab53fc4feae28c4fda7dfd8ccff7cce43cc425454c8a974c5af90f8838afe488fc74083c0cea5d2feddfae88ce2439e3db7a16026b2cbab0be8c3651fbfb3eea899991dfa4c512ea958a1c1553b2276a7adf533a4a902feb6512e96f124f29ecbd5bde384eea68595027a65be4c5f984bb069f7216e68d58b3d0c5a88096a505a33260e389834506a1cda6343030ab7ee50e13fdd741e66e7cac7f9d9a3d83fdd01257389dad2e3af0ca7962913e92b86e50d50ea52cf7e4fb5f160b50c4e976238b9fd1faf77780345462d6e1a1ffebc0ced6222a6a39c54c3ccdc844c6d094b008f446743d1beaa05d0624a21ad12e5c0ac18307313fab5c3dd5e7c88b31b7524310b6d95e0a1a886dbbee61757840302e4c45503eb754c5492a5fd9b57b6ef9de9941a5095cbf56af6e742254f7d3ca5b295823027ab39b97f7d8ecf1bf91f4ea56d0ec29168c87c4468ff52078906477c39e398a2fcb6a825607140c599636fabd5a3ea2042637fe5dcb1fed386c33ed954ee472ff241022825f70e3aebf14a9b13152ffede6b2335f3e94b3a8d1cb75c1536c18cbeaf305c791f76961fe4e155b603fcdad1b42403d106c6b274bb8fee7d9c0ddac0f13448b91591d55052b8f8c9e43a4f588a34aa75f4a3dd39285d9978aec8163eaf26e37504f7d26d62acc357cd9adab1edb631aee6c29b10dbc753f393ddc2e7aa60af53cb4a2702233017b3e29e075320442e8cc8a5e83e458313aa062f9c93c57733eca9c2e4b9695bcf69c6a76eaa4a24d6d70a4c126676a20415bf53bc0bc3327b307ee4f2ab10007ee81a558de46b03caecb323e0978270cf61c57f14e0e60c018f9290a8924e361c7ae81c5d90948680e25ffe1f0955b5c400ae4d5ef5f1f4686957a037534e13c2aa23841a1ed04bfab5083aac68a392bac1d5d0cb0ac73e9845b3ad29d316a5c5565187e036075101a1a431fd3dcdda24fa5f06fb8132d2bb0505f9657e4a6963736c32836fc36b9a06f5652a1100bcb01a385d1fda95868f227f6f04276c5e5bd210d318804b898a26781fafc0be53dca0dbec01c27cb5a01b52cf026812013addce76b161e451f6d867b465adf730910206a21c570921a4e399173d4a76ff8033597d979fe91ba49206b9b190b656cde2107a33c37e07015b2367456d7705e67b698102660193a4c5521c07e87bcc18af5b3e4033b838623765763f55cbb38c2d07a620cd67c1caf7a6fa14aba5230a617ec381a9e5273c8e8db7b50e973f49de6134095450e8ebba9e972d73f8f0a944da4b3f53d84fb989842433cbb758ffb984774993770ba78797cb26302a92dfb8eef48496de3cb182f269cb509d79bfc") mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000001380)='./file0\x00', &(0x7f0000001340)='proc\x00', 0x0, &(0x7f0000000240)) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000002240)={0xffffffff, 0x0, 0x8}, 0xa) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000001280)) 2018/04/05 21:37:34 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff8c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 376.896185] hugetlbfs: Bad mount option: "£Î ooPŸ¯2p‹I¸úbs%[ð4¡5ZMØ~éÚ·vTxEÆp Úõ\![ÆWÔ½ÎÙ™S9ÉelT¶Dûè²Uv3¹$òëK" 2018/04/05 21:37:34 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:34 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000400008fe7bb5cd4e344cd0002800000720a00ff"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xf, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x48}, [@jmp={0x5, 0x0, 0xffffffcd}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) 2018/04/05 21:37:34 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x4, 0x80, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:34 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:34 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9}, 0x3d1) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000028000)={r0, &(0x7f0000000200), &(0x7f0000000240)="13"}, 0x20) bpf$MAP_DELETE_ELEM(0x4, &(0x7f0000000080)={r0, &(0x7f0000000040)}, 0x10) 2018/04/05 21:37:34 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x5}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='hugetlbfs\x00', 0x0, &(0x7f0000000340)="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") mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000001380)='./file0\x00', &(0x7f0000001340)='proc\x00', 0x0, &(0x7f0000000240)) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000001280)) 2018/04/05 21:37:34 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xf37, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:34 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000000000000000000028000006a0a00fffffff6006118"], &(0x7f0000000080)='syzkalleP\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xd, 0x5, &(0x7f0000000040)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000140)={&(0x7f0000000000)='./file0\x00', 0x0, 0x10}, 0x10) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000003c0)={0x0, r0, 0x3, 0x1}, 0x14) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r0, 0x50, &(0x7f0000000400)}, 0x10) 2018/04/05 21:37:34 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000400008fe7bb5cd4e344cd0002800000720a00ff"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xf, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x1abc17}, [@jmp={0x5, 0x0, 0xffffffcd}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) 2018/04/05 21:37:34 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6ffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:35 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:35 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000000000000000000028000006a0a00fffffff6006118"], &(0x7f0000000080)='syzkalleP\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xd, 0x5, &(0x7f0000000040)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r0, 0x50, &(0x7f0000000400)}, 0x10) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000019c0)={0xffffffff, 0x0, 0x8}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000001a00)={&(0x7f0000001980)='./file0\x00', r1}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f0000001940)) recvmsg$kcm(r2, &(0x7f0000001900)={0x0, 0x0, &(0x7f0000001880)=[{&(0x7f0000000480)=""/4096, 0x1000}, {&(0x7f0000001480)=""/210, 0xd2}, {&(0x7f0000001580)=""/73, 0x49}, {&(0x7f0000000140)=""/42, 0x2a}, {&(0x7f0000001600)=""/183, 0xb7}, {&(0x7f00000016c0)=""/168, 0xa8}, {&(0x7f0000001780)=""/76, 0x4c}, {&(0x7f0000001800)=""/103, 0x67}], 0x8, &(0x7f00000003c0)=""/46, 0x2e, 0x8}, 0x40000000) 2018/04/05 21:37:35 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9}, 0x3d1) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000028000)={r0, &(0x7f0000000200), &(0x7f0000000240)="13"}, 0x20) bpf$MAP_DELETE_ELEM(0xe, &(0x7f0000000080)={r0, &(0x7f0000000040)}, 0x10) [ 377.115900] hugetlbfs: Bad mount option: "£Î ooPŸ¯2p‹I¸úbs%[ð4¡5ZMØ~éÚ·vTxEÆp Úõ\![ÆWÔ½ÎÙ™S9ÉelT¶Dûè²Uv3¹$òëK" 2018/04/05 21:37:35 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x90, 0x4, 0x80, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:35 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xb4e, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:35 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000400008fe7bb5cd4e344cd0002800000720a00ff"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xf, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x6c00000000000000}, [@jmp={0x5, 0x0, 0xffffffcd}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) 2018/04/05 21:37:35 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9}, 0x3d1) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000028000)={r0, &(0x7f0000000200), &(0x7f0000000240)="13"}, 0x20) bpf$MAP_DELETE_ELEM(0x9, &(0x7f0000000080)={r0, &(0x7f0000000040)}, 0x10) 2018/04/05 21:37:35 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:35 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x14, 0x4, 0x80, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:35 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000000000000000000028000006a0a00fffffff6006118"], &(0x7f0000000080)='syzkalleP\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xd, 0x5, &(0x7f0000000040)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r0, 0x33, &(0x7f0000000400)}, 0x39e) 2018/04/05 21:37:35 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:35 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x5}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='hugetlbfs\x00', 0x0, &(0x7f0000000340)="a3ce050d6f1a6f500f9faf081f32708b49b8fa6273255b1cf034a1355a4dd87ee9dab776547845c67009daf55c215bc657d4bdced9995339c9656c0354b644fbe8b2557633b91724f2eb4b00182f530928e30c28ce65d66f3ab88f54c5758ad9ea29154cbc20239fc626ed80b5856a9268794bffa7dd1e12162493d57d9289bd05201583b3574883512297e15117104cc52a3a9aa78b23abda223d651bc199658f5cdf2e3563e69ad8b37d462d74d08f8eb28746eba92d1846d290c409f086452f39e27ef8dc484a0b76e37599bfcbbff8d1954d7abdaec3496bc76e895a2c94bdebadec5b1518d36ee85f265c6c9213230c9b26ecc2be9f04dc98faca3d3750e422680989551a6555e905280c4eb44f28fb113f7db30ac8584b4eef85bfab7cadc1d442397b58ffbe43645732b64f3b59077613359e6a90a76547226e4b6180fd5feb59bcd47781712b599c9ca71036dd0cd57ec6f2338d555c10affce767fcf874a3e119efa339f80718493f5aab21dc22036e39f39f0fbf113b33fd38bd4b92aaf2fbd3a06b85bcfa951ef4ea3c3e79c0a1e7164e9a0e1863bf947c21e98202affc03e1a749b982ec8493e784d44c6fbfbbe51393efee20547acb1e0e96d14cba142b9613b6775c97d404c9402ffb3be93850363fca18f6287572ba7ac4409777cc51e8c27744e530ebc2563c5048354359d033321e986dc5b365c5fe26d0cd1ea1f912b60b38d62aecf65ca8331a5725b5b6ec7123851a2d1ddb20d625991438a727c55853d83453ed9191790b7dec5a40bf40dc809782fbd51f18a25a43bf502faf6a76bb2775821193c701c80deeb7eae939a42e3a50acb8055650dfb304e31945983643432c056430e16d73b0b5f2d71607750b946d9a3c739617d995fb949957e77fba0f199a07985458fe141f5078cb9526da34eb29fee9d538e524f1ce37d5a12e738cfa6464d7c4d02a12650fd7ca68b817837211404909715ebf76840c78053633b6150dd4305088a1fe4a97b9bb09b425cd9cef6c529752fd351b506deba77fc21b3b8e0ac789cac68a6bd11174dc0c6e526622960683f0a2e0a414718f3419cdf64bea0ce0da958eb48255658ca23fcf510b67eef5e6e3ed63543aa3ad9335bb2efcfea2b79aec961d6baa8522e5741b9c44fcc277ebbe0ec8689a479bd559b0ee7fe122328cabb57d4f5b771c712915c0030e7ddcd0fe51ac3056c1733f540a842456d4c4530b9f08ae162296f9a2fe9b8f7af4eaef8de92171893511915f74cad7d2f16f29e653329d72a8cff6510f627560bc75e3b5d8fb740ba934a00ca74b6044c59b90e56ec330c64cfdc8d5bcc9e80a1361bf2ccd238608f0f1b90cf10f8b8b5a80a3b5923be179f2456ba545f3c75041d2680ed333a83d938d5c743ae2c8310e603cd39176f6bc388439418ddb7ffa2386e8734dc93a67d4f31b25c5f03eeab67d8b583c11a05ffa84222308ed4ac5b62aef7067da6f9781fc9f59b72be8e06bb73616de294c8c8adaec5e4db25772705c315f2c2e9438fb6de55db800cd30bf19b33c06430bc16b7acef3f11db43247e730b27b839cf05589d27c61eceaef04d9840419a9d1e50dade563da25b24131f49b78a4b441553ee8ee4c7b33ef7c0b8664fa0ad67cb24876ed11f6f6c6adf1091184291283cd211245b27885e487f48476abc3c7b35ef4e3d9cf46f8f818491beb709873a64a0ce4340b18e8ce4d3bf5ce33dc82165e1ff767c5a05faac7fff1977c4a8ed07ad1d9c426b55e8dcfe9962b6623f284200928b337a9250bc71ae39921f882452d92d9b2acce8840e3d2e7571385b2d811323dab33a938027f33bfeeea18b396acd8ffbb56da1dfb1ff507b3906eb27228538ab0c526531b5532020a334bf97aba773259af7989416139fa27f8ea98ffa6acd87953af1e2264374309561cab587d509f949ce93c08c013217dbf67fed8027cf7c9a2ce6c53d8e5ebbc71676de37593a1e2a191d62354f9cce032960f5ec678235c0ae9c030b2f3f74473c37271c34e1dcf9d0076d8e8df7eb4c701796efae9933b5b727c936263c582c857f41d74d23437e3546a4eccdd9d278b794789c9e1058732a7a763c3382a82b8544e0b4b6fb057db8f78319b3729d8ebafe7017949c82bd4882abf4a44cc4c036197fd2d55a9355b830a6ad162abc908e42949912b5aaf6e75b7925444921324360cbbc903eb499d4334c35dffd7748125fa2d89f144a50149a16e3df15d1586c416ef05b6b0feeba8ef8529b56ed69baa41b6b23eb174e78bf98364e8216e74c22400d49ac8fe3f43ed09d8e1c29b4667bc0b520273c39d893402beeb0292e49ad69559fe1c5180cdb64cbf901b019b9ab4fa6e507f003053e94994b12b2c0d602b4759345d80150ab7f0efcba7334bb7cf34dc3e1d10c1bbb4a920cf1030304b9e69c384bc109d475c6c973be8c99b7129d92b21b897110806ac80c17816cb3fba9cc8b1cf52036697246f499c258c8ed00054c15dc24dd2552523a549ad02fd32b4238b8f7ba3596db1b4cebb780fca15f6f2102f797c537b22b4ed4e1c617b8b7355765f66c7574405cd4912c5f0a74c6bdac16bb0eafcedfcc24f9753be0ff674ff63b66a5a60d77057d31cc438794837f82e69e7a811b4b6a00d4e8fce1eef6e488cf15e426fcbdc564c4034f4279a36321246fba777466d3d98d0adb4f9fe69e352bdc99dbb8553f8c69f9300960cffe8e4afe277d4e80c7ec19a4f4d94146f71a0aa2f79b9954b828fd92416a660d1f431aeb02f342d1b2732d5fe50f70f4c857cd2b9fafec375bc424dcf982e23a0e6bb4d5ede099a355282f85a3109559f6dcd045929e82c5ba64da2abacdb9e8115eb0eda3bc3974918668e0fe8ff00944f7191fbc3c4ab3d05a15911ae7b6c2d9eb6c7eaed20eccf15795184cf04e889c9274813cde7a248005114d996a80554545bfe920d6fbb073df8cbca1a3fb297db8b18463f632e8834eb278203a6106fbec78e8af2851f22b524202026d077768da263c46ab27b85184bd65774f867819aa23b60d4fa021f21e960646a01e2643a1d5be33fdb3ba36c140d51d3ae27875a27f7be133f29c34556db2558178612b598e29a8b675912c1ec9836f98e4ac7ad231492ba733dfa34a4fd4ee63ba6346cbc2fedf41d3d06fdeace1b650d02624ff94070422e018261bfd431696fc47d9e030ccd2b955659c56d8493f4e603c4efeccd35ad1331c00dd179b00bd823f7b5726b24e4f3b48614c09adac6b834dcd26c8253b6786dcb0d15d28a5c4de52fb15ac764314a8c830bfd42edf5f9dd14ab81be5a1bd49423097868e0185145cd0624ad02f9a4932b51d91d5859eb400759384e66199489512e7d992a80365b34fb4e4232e36037d4f0719c30eb3bc76986bd1bdf18e5d52f73666838d2ff6bbdf8f90803b818ffd06834ae510bb76cbd26a5ce46e02cd8fef30368cc61c92326ea1092521feab08196621a149ea04f7e401f808bac3f1df91f107c6754e9fd93539f815702854f944674d9f2768171d847b2b7d7653a8a7a9ecd9782156476e6b50dc2de2bc882f9480053d5c8766ead614de684a214a1d41b60bdd128095575659a1c47ee425eb44fe6f590566baa172964239b58110edbb9e9beead1d605b959a4257d517aee2a0d5ae56ab980edcbebfeb8a66ecc7fde06035774f64b984be2afdae843472f3a70ac2415bcb7d25bb815fee8c590eeab92e0e90658597f8f78eb33112bc5d28ef2888e47a5ec63f9eac2383052cf2f4c4d42f56b34d4c49090cfd0e9c7ba2ed5818840fee1d854c018f68b167273203cc934ffc890be4e47483fec0ea90eb50cea1a866b727239e2ed799b85d73f0c66a5b68340e51517dd21a3e4ea3d27c43645f667f05fbb6a97368fff565104a5717da6d944f359e5abf6a295f7b3a1def78fab1f6b313cebd00eadccd51e558bc84f2426abec4e88244644e871ebfb2763c1b396b76073d10398792cd6ba2c3c93584d35dbcbfda016d4595118b895170cc6870524f7d43954b2991468ab53fc4feae28c4fda7dfd8ccff7cce43cc425454c8a974c5af90f8838afe488fc74083c0cea5d2feddfae88ce2439e3db7a16026b2cbab0be8c3651fbfb3eea899991dfa4c512ea958a1c1553b2276a7adf533a4a902feb6512e96f124f29ecbd5bde384eea68595027a65be4c5f984bb069f7216e68d58b3d0c5a88096a505a33260e389834506a1cda6343030ab7ee50e13fdd741e66e7cac7f9d9a3d83fdd01257389dad2e3af0ca7962913e92b86e50d50ea52cf7e4fb5f160b50c4e976238b9fd1faf77780345462d6e1a1ffebc0ced6222a6a39c54c3ccdc844c6d094b008f446743d1beaa05d0624a21ad12e5c0ac18307313fab5c3dd5e7c88b31b7524310b6d95e0a1a886dbbee61757840302e4c45503eb754c5492a5fd9b57b6ef9de9941a5095cbf56af6e742254f7d3ca5b295823027ab39b97f7d8ecf1bf91f4ea56d0ec29168c87c4468ff52078906477c39e398a2fcb6a825607140c599636fabd5a3ea2042637fe5dcb1fed386c33ed954ee472ff241022825f70e3aebf14a9b13152ffede6b2335f3e94b3a8d1cb75c1536c18cbeaf305c791f76961fe4e155b603fcdad1b42403d106c6b274bb8fee7d9c0ddac0f13448b91591d55052b8f8c9e43a4f588a34aa75f4a3dd39285d9978aec8163eaf26e37504f7d26d62acc357cd9adab1edb631aee6c29b10dbc753f393ddc2e7aa60af53cb4a2702233017b3e29e075320442e8cc8a5e83e458313aa062f9c93c57733eca9c2e4b9695bcf69c6a76eaa4a24d6d70a4c126676a20415bf53bc0bc3327b307ee4f2ab10007ee81a558de46b03caecb323e0978270cf61c57f14e0e60c018f9290a8924e361c7ae81c5d90948680e25ffe1f0955b5c400ae4d5ef5f1f4686957a037534e13c2aa23841a1ed04bfab5083aac68a392bac1d5d0cb0ac73e9845b3ad29d316a5c5565187e036075101a1a431fd3dcdda24fa5f06fb8132d2bb0505f9657e4a6963736c32836fc36b9a06f5652a1100bcb01a385d1fda95868f227f6f04276c5e5bd210d318804b898a26781fafc0be53dca0dbec01c27cb5a01b52cf026812013addce76b161e451f6d867b465adf730910206a21c570921a4e399173d4a76ff8033597d979fe91ba49206b9b190b656cde2107a33c37e07015b2367456d7705e67b698102660193a4c5521c07e87bcc18af5b3e4033b838623765763f55cbb38c2d07a620cd67c1caf7a6fa14aba5230a617ec381a9e5273c8e8db7b50e973f49de6134095450e8ebba9e972d73f8f0a944da4b3f53d84fb989842433cbb758ffb984774993770ba78797cb26302a92dfb8eef48496de3cb182f269cb509d79bfc") mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000001280)) [ 377.514474] hugetlbfs: Bad mount option: "£Î ooPŸ¯2p‹I¸úbs%[ð4¡5ZMØ~éÚ·vTxEÆp Úõ\![ÆWÔ½ÎÙ™S9ÉelT¶Dûè²Uv3¹$òëK" 2018/04/05 21:37:35 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000400008fe7bb5cd4e344cd0002800000720a00ff"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xf, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x4c00}, [@jmp={0x5, 0x0, 0xffffffcd}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) 2018/04/05 21:37:35 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0x6d, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:35 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9}, 0x3d1) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000028000)={r0, &(0x7f0000000200), &(0x7f0000000240)="13"}, 0x20) bpf$MAP_DELETE_ELEM(0xb, &(0x7f0000000080)={r0, &(0x7f0000000040)}, 0x10) 2018/04/05 21:37:35 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:35 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8cffffff00000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:35 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x5}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000001380)='./file0\x00', &(0x7f0000001340)='proc\x00', 0x0, &(0x7f0000000240)) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000001280)) 2018/04/05 21:37:35 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x10, 0x4, 0x80, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:35 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000000000000000000028000006a0a00fffffff6006118"], &(0x7f0000000080)='syzkalleP\x00', 0x0, 0xce, &(0x7f0000000480)=""/206}, 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="580000000000000000000000000000000500005cf300000000000000000027acc41331d59ed47806"], &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r0, 0x50, &(0x7f0000000400)}, 0x10) 2018/04/05 21:37:35 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:35 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9}, 0x3d1) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000028000)={r0, &(0x7f0000000200), &(0x7f0000000240)="13"}, 0x20) bpf$MAP_DELETE_ELEM(0xd, &(0x7f0000000080)={r0, &(0x7f0000000040)}, 0x10) 2018/04/05 21:37:35 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000001380)='./file0\x00', &(0x7f0000001340)='proc\x00', 0x0, &(0x7f0000000240)) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000001280)) 2018/04/05 21:37:35 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0xd002, 0x80, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:35 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000400008fe7bb5cd4e344cd0002800000720a00ff"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xf, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x600}, [@jmp={0x5, 0x0, 0xffffffcd}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) 2018/04/05 21:37:35 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xbae, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:35 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:35 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)=ANY=[], &(0x7f0000000080)='syzkalleP\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xd, 0x5, &(0x7f0000000040)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r0, 0x50, &(0x7f0000000400)}, 0x10) 2018/04/05 21:37:35 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:35 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9}, 0x3d1) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000028000)={r0, &(0x7f0000000200), &(0x7f0000000240)="13"}, 0x20) bpf$MAP_DELETE_ELEM(0xa, &(0x7f0000000080)={r0, &(0x7f0000000040)}, 0x10) 2018/04/05 21:37:35 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x9, 0x80, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:35 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000000000000000000028000006a0a00fffffff6006118"], &(0x7f0000000080)='syzkalleP\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000003c0)={&(0x7f0000000140)='./file0\x00', 0x0, 0x18}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000480)={&(0x7f0000000000)='./file0\x00', r0}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xd, 0x5, &(0x7f0000000040)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r1, 0x50, &(0x7f0000000400)}, 0x10) 2018/04/05 21:37:35 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000400008fe7bb5cd4e344cd0002800000720a00ff"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xf, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x7a00}, [@jmp={0x5, 0x0, 0xffffffcd}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) 2018/04/05 21:37:35 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:35 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0x61c, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:35 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:35 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000001380)='./file0\x00', &(0x7f0000001340)='proc\x00', 0x0, &(0x7f0000000240)) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000001280)) 2018/04/05 21:37:35 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x14, 0x80, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:36 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9}, 0x3d1) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000028000)={r0, &(0x7f0000000200), &(0x7f0000000240)="13"}, 0x20) bpf$MAP_DELETE_ELEM(0x11, &(0x7f0000000080)={r0, &(0x7f0000000040)}, 0x10) 2018/04/05 21:37:36 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6ffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:36 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0x70b, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:36 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000001380)='./file0\x00', &(0x7f0000001340)='proc\x00', 0x0, &(0x7f0000000240)) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000001280)) 2018/04/05 21:37:36 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000400008fe7bb5cd4e344cd0002800000720a00ff"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xf, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x9cffffff}, [@jmp={0x5, 0x0, 0xffffffcd}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) 2018/04/05 21:37:36 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8cffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:36 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000000000000000000028000006a0a00fffffff6006118"], &(0x7f0000000080)='syzkalleP\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xd, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1800000000000000000000000000000005000000000000000000000000000000950000000000000089ca331e2095c824da3f50961efae976c979e96367cc432a50fa11f170737c9257f3148aeaf551138eb53c20a06d545478c60c8fa6a50281008c8888bfde165a5ee053c6ee3115355846b737ec7eea52b92ac59cfab4f35d99fae8522e39d8a9a8482a12a6d97781ea9a246b02c608a1"], &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r0, 0x50, &(0x7f0000000400)}, 0x10) 2018/04/05 21:37:36 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000400008fe7bb5cd4e344cd0002800000720a00ff"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xf, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x0, 0xe4ffffff}, [@jmp={0x5, 0x0, 0xffffffcd}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) 2018/04/05 21:37:36 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9}, 0x3d1) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000028000)={r0, &(0x7f0000000200), &(0x7f0000000240)="13"}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r0, &(0x7f0000000040)}, 0x10) 2018/04/05 21:37:36 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x90, 0x80, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:36 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff8c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:36 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:36 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0x9bd, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:36 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000001380)='./file0\x00', &(0x7f0000001340)='proc\x00', 0x0, &(0x7f0000000240)) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000001280)) 2018/04/05 21:37:36 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9}, 0x3d1) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000028000)={r0, &(0x7f0000000200), &(0x7f0000000240)="13"}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r0, &(0x7f0000000040)}, 0x10) 2018/04/05 21:37:36 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000400008fe7bb5cd4e344cd0002800000720a00ff"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xf, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x0, 0xe0ffffff}, [@jmp={0x5, 0x0, 0xffffffcd}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) 2018/04/05 21:37:36 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000000000000000000028000006a0a00fffffff6006118"], &(0x7f0000000080)='syzkalleP\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xd, 0x5, &(0x7f0000000040)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) gettid() socketpair(0x0, 0x803, 0x1, &(0x7f00000008c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000900)={r1, &(0x7f0000000cc0)="ebb1345bc92c0a95cd57b4b70bb0d84bdd281586a453f1b333302b5418321ae39b493503c220bb28da7109b504551804a39bd0c9ff248501cb0615156a694f94cc30dfbe80a24129e99367f474585a93303e5f184c65ab164b0bb8f0bd68f447d48516954075304d90c403cc8084be60892a5a901856a1bb83b11a3ddbe3db553ad38dca60405297f3bc305025cacf7dfa19d82a533299c0114a2eec550d2f5e59f187463bdb3891ff968d31c0bd1a887dd055ecd65583d7ae45946356d6d41e4ffcbe6aeefa2ac2f2b0d6f98053aba6c20b", &(0x7f0000000dc0)=""/4096}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r0, 0x50, &(0x7f0000000400)}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f00000003c0)={0xffffffffffffff9c}) recvmsg$kcm(r2, &(0x7f0000000880)={&(0x7f0000000580)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000940)=""/110, 0x6e}, {&(0x7f0000000680)}, {&(0x7f00000006c0)=""/155, 0x9b}], 0x3, &(0x7f0000001dc0)=""/189, 0xbd, 0x40}, 0x2000) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000000c00)={&(0x7f00000009c0)=@hci={0x0, 0x0}, 0x80, &(0x7f0000000b00)=[{&(0x7f0000000a40)=""/123, 0x7b}, {&(0x7f0000000ac0)=""/54, 0x36}], 0x2, &(0x7f0000000b40)=""/129, 0x81}, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000c40)={0x6, 0x295, &(0x7f0000000000)=@raw=[@jmp={0x5, 0x2, 0x6, 0x2, 0xb, 0x41}], &(0x7f0000000140)='syzkaller\x00', 0x1fffc0, 0xc9, &(0x7f0000000480)=""/201, 0x41f00, 0x1, [], r3}, 0x48) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000680)=r0, 0x4) socket$kcm(0x29, 0x2, 0x0) 2018/04/05 21:37:36 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:36 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x1603, 0x80, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:36 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6ffffff00000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:36 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0x516, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:36 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000001380)='./file0\x00', &(0x7f0000001340)='proc\x00', 0x0, &(0x7f0000000240)) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000001280)) 2018/04/05 21:37:36 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000000000000000000028000006a0a00fffffff6006118"], &(0x7f0000000080)='syzkalleP\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xd, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000005860e221fdc3af6cacb5bf709ae1000050000000000000000000000001600009500000000000000"], &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r0, 0x50, &(0x7f0000000400)}, 0x10) 2018/04/05 21:37:36 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9}, 0x3d1) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000028000)={r0, &(0x7f0000000200), &(0x7f0000000240)="13"}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r0, &(0x7f0000000040)}, 0x10) 2018/04/05 21:37:36 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000400008fe7bb5cd4e344cd0002800000720a00ff"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xf, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x500}, [@jmp={0x5, 0x0, 0xffffffcd}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) 2018/04/05 21:37:36 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4003, 0x80, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:36 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:36 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:36 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0x596, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:36 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000001380)='./file0\x00', &(0x7f0000001340)='proc\x00', 0x0, &(0x7f0000000240)) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000001280)) 2018/04/05 21:37:36 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000000000000000000028000006a0a00fffffff6006118"], &(0x7f0000000080)='syzkalleP\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000000000000000000050100000000000000000000000000009500000000000000"], &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) socketpair(0x12, 0x80000, 0x200, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000140)=0x4) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f00000003c0)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000680)={r2, &(0x7f0000000480)="6093697944909965b01e5a7a5e8d172b0f55b8938a0c6df28943062e29d5ed03ff56be4cbc049e071f557430a8412b2c9b334e8d9d933c2e769709125307c686f999a681bdd2b6572a23cbc2e6730f9eeacef72a46c49e610ca17e02ea986e92a781c036f53ccb198b4efc274d6fcf304134e3e41383186cd5c9c56fa1112d8a9f260411a82e3ea1526be5adba9960d8e0011f20dae84ab186987799f9e468d89eccf46834d451d7307c5f2af50e12662c1277044a0c4fb06b869d3fdca137eb930cfc11c0671f871aead3975a289fdc2ba125d98537b2e42636523bb5dc6f4c7d00c41b1c", &(0x7f0000000580)="ed615b654cfddea2ef2a64166d7b2b88509a35558e162b21fe6eb64f148e1d031f79614845b197a6689993c395ce5dc3b4484b678f7e21aed253eac6c2488f6185f72ddfd6f829f97205cb5cd361266ded9cec8554ef28e46c5584c7b68211ec97c2a6d6682ba06d719d44a45f717b3aaa9effa9e25727e940eb7b92fbf6c7485cc296cbd89203ee0f4e2a32da74d11fa76fc5228af1adaf21c835f01335384de8e9cfe29d9af543c74bb07033fefd3b6dffab5d6df3f575996adf98ad519aa5643a0369cd85d03aebb04c1189cc8aab25f67f791e94e3093d281ec24dfecb5ffa572d92eba3ded00f2bf9b29dd395824c71456ce8d118", 0x1}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r1, 0x50, &(0x7f0000000400)}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 2018/04/05 21:37:36 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:36 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9}, 0x3d1) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000028000)={r0, &(0x7f0000000200), &(0x7f0000000240)="13"}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r0, &(0x7f0000000040)}, 0x10) 2018/04/05 21:37:36 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:36 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000400008fe7bb5cd4e344cd0002800000720a00ff"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xf, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x4000000000000000}, [@jmp={0x5, 0x0, 0xffffffcd}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) 2018/04/05 21:37:36 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x8003, 0x80, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:36 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0x578, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:36 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000001380)='./file0\x00', &(0x7f0000001340)='proc\x00', 0x0, &(0x7f0000000240)) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000001280)) 2018/04/05 21:37:36 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000001380)='./file0\x00', &(0x7f0000001340)='proc\x00', 0x0, &(0x7f0000000240)) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000001280)) 2018/04/05 21:37:37 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8cffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:37 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000400008fe7bb5cd4e344cd0002800000720a00ff"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xf, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x20000000}, [@jmp={0x5, 0x0, 0xffffffcd}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) 2018/04/05 21:37:37 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x104, 0x80, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:37 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:37 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9}, 0x3d1) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000028000)={r0, &(0x7f0000000200), &(0x7f0000000240)="13"}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r0, &(0x7f0000000040)}, 0x10) 2018/04/05 21:37:37 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000001380)='./file0\x00', &(0x7f0000001340)='proc\x00', 0x0, &(0x7f0000000240)) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000001280)) 2018/04/05 21:37:37 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0x4aa, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:37 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6ffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:37 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000001380)='./file0\x00', &(0x7f0000001340)='proc\x00', 0x0, &(0x7f0000000240)) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000001280)) 2018/04/05 21:37:37 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0xd102, 0x80, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:37 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000400008fe7bb5cd4e344cd0002800000720a00ff"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xf, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x18100000}, [@jmp={0x5, 0x0, 0xffffffcd}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) 2018/04/05 21:37:37 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000001380)='./file0\x00', &(0x7f0000001340)='proc\x00', 0x0, &(0x7f0000000240)) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000001280)) 2018/04/05 21:37:37 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff8c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:37 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:37 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xf68, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:37 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9}, 0x3d1) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000028000)={r0, &(0x7f0000000200), &(0x7f0000000240)="13"}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r0, &(0x7f0000000040)}, 0x10) 2018/04/05 21:37:37 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x3, 0x80, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:37 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000400008fe7bb5cd4e344cd0002800000720a00ff"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xf, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x400000}, [@jmp={0x5, 0x0, 0xffffffcd}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) 2018/04/05 21:37:37 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000001380)='./file0\x00', &(0x7f0000001340)='proc\x00', 0x0, &(0x7f0000000240)) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000001280)) 2018/04/05 21:37:37 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x2703, 0x80, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:37 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9}, 0x3d1) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000028000)={r0, &(0x7f0000000200), &(0x7f0000000240)="13"}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r0, &(0x7f0000000040)}, 0x10) 2018/04/05 21:37:37 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000400008fe7bb5cd4e344cd0002800000720a00ff"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xf, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x0, 0xffffffffffffffe0}, [@jmp={0x5, 0x0, 0xffffffcd}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) 2018/04/05 21:37:37 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:37 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000001280)) 2018/04/05 21:37:37 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:37 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000001380)='./file0\x00', &(0x7f0000001340)='proc\x00', 0x0, &(0x7f0000000240)) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000001280)) 2018/04/05 21:37:37 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xc5e, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:37 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8cffffff00000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:37 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x2603, 0x80, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:37 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9}, 0x3d1) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000028000)={r0, &(0x7f0000000200), &(0x7f0000000240)="13"}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r0, &(0x7f0000000040)}, 0x10) 2018/04/05 21:37:37 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8cffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:37 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000001380)='./file0\x00', &(0x7f0000001340)='proc\x00', 0x0, &(0x7f0000000240)) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000001280)) 2018/04/05 21:37:37 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000400008fe7bb5cd4e344cd0002800000720a00ff"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xf, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x0, 0xffffff85}, [@jmp={0x5, 0x0, 0xffffffcd}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) 2018/04/05 21:37:37 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000001380)='./file0\x00', &(0x7f0000001340)='proc\x00', 0x0, &(0x7f0000000240)) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000001280)) 2018/04/05 21:37:37 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xa52, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:37 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000400008fe7bb5cd4e344cd0002800000720a00ff"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xf, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x0, 0xe0ffffffffffffff}, [@jmp={0x5, 0x0, 0xffffffcd}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) 2018/04/05 21:37:37 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:37 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0xc003, 0x80, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:37 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9}, 0x3d1) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000028000)={r0, &(0x7f0000000200), &(0x7f0000000240)="13"}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r0, &(0x7f0000000040)}, 0x10) 2018/04/05 21:37:37 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:37 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000001380)='./file0\x00', &(0x7f0000001340)='proc\x00', 0x0, &(0x7f0000000240)) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000001280)) 2018/04/05 21:37:38 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000001380)='./file0\x00', &(0x7f0000001340)='proc\x00', 0x0, &(0x7f0000000240)) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000001280)) 2018/04/05 21:37:38 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xe81, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:38 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:38 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0xff0f, 0x80, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:38 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000400008fe7bb5cd4e344cd0002800000720a00ff"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xf, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x0, 0xa000000}, [@jmp={0x5, 0x0, 0xffffffcd}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) 2018/04/05 21:37:38 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x200000000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:38 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9}, 0x3d1) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000028000)={r0, &(0x7f0000000200), &(0x7f0000000240)="13"}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r0, &(0x7f0000000040)}, 0x48) 2018/04/05 21:37:38 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000001380)='./file0\x00', &(0x7f0000001340)='proc\x00', 0x0, &(0x7f0000000240)) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000001280)) 2018/04/05 21:37:38 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000001380)='./file0\x00', &(0x7f0000001340)='proc\x00', 0x0, &(0x7f0000000240)) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000001280)) 2018/04/05 21:37:38 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:38 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0xd302, 0x80, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:38 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8cffffff00000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:38 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xa10, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:38 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000400008fe7bb5cd4e344cd0002800000720a00ff"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xf, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x7a000000}, [@jmp={0x5, 0x0, 0xffffffcd}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) 2018/04/05 21:37:38 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9}, 0x3d1) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000028000)={r0, &(0x7f0000000200), &(0x7f0000000240)="13"}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r0, &(0x7f0000000040)}, 0x20000090) 2018/04/05 21:37:38 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x7, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:38 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000001380)='./file0\x00', &(0x7f0000001340)='proc\x00', 0x0, &(0x7f0000000240)) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000001280)) 2018/04/05 21:37:38 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:38 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000001380)='./file0\x00', &(0x7f0000001340)='proc\x00', 0x0, &(0x7f0000000240)) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000001280)) 2018/04/05 21:37:38 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9}, 0x3d1) socketpair$inet6_icmp(0xa, 0x2, 0x3a, &(0x7f0000000040)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000028000)={r0, &(0x7f0000000200), &(0x7f0000000240)="13"}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r0, &(0x7f0000000040)}, 0x10) 2018/04/05 21:37:38 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xf6ffffff00000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:38 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000400008fe7bb5cd4e344cd0002800000720a00ff"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xf, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x48000000}, [@jmp={0x5, 0x0, 0xffffffcd}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) 2018/04/05 21:37:38 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xf20, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:38 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x90, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:38 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0x7a4, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:38 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000001380)='./file0\x00', &(0x7f0000001340)='proc\x00', 0x0, &(0x7f0000000240)) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000001280)) 2018/04/05 21:37:38 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0xffffffffffff3551, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, 0x0, 0x0, 0x0, 0x29a7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xe038, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9}, 0x3d1) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000028000)={r0, &(0x7f0000000200), &(0x7f0000000040)="13"}, 0xfffffffffffffd99) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r0, &(0x7f0000000040)}, 0x10) 2018/04/05 21:37:38 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000400008fe7bb5cd4e344cd0002800000720a00ff"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xf, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x0, 0xffffffff00000000}, [@jmp={0x5, 0x0, 0xffffffcd}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) 2018/04/05 21:37:38 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x400000000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:38 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000001380)='./file0\x00', &(0x7f0000001340)='proc\x00', 0x0, &(0x7f0000000240)) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000001280)) 2018/04/05 21:37:38 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:38 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:38 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000001380)='./file0\x00', &(0x7f0000001340)='proc\x00', 0x0, &(0x7f0000000240)) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000001280)) 2018/04/05 21:37:38 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000400008fe7bb5cd4e344cd0002800000720a00ff"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xf, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x500000000000000}, [@jmp={0x5, 0x0, 0xffffffcd}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) 2018/04/05 21:37:38 executing program 4 (fault-call:3 fault-nth:0): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000001380)='./file0\x00', &(0x7f0000001340)='proc\x00', 0x0, &(0x7f0000000240)) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000001280)) 2018/04/05 21:37:38 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x4000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:38 executing program 6: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0xa, 0x2, 0x101, &(0x7f00000000c0)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000040)='./file0\x00', r1}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000028000)={r2, &(0x7f0000000200), &(0x7f0000000240)="13"}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r2, &(0x7f0000000040)}, 0x10) 2018/04/05 21:37:38 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0x715, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:38 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0x1eb, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) [ 381.197800] FAULT_INJECTION: forcing a failure. [ 381.197800] name failslab, interval 1, probability 0, space 0, times 0 [ 381.209188] CPU: 1 PID: 3316 Comm: syz-executor4 Not tainted 4.16.0+ #1 [ 381.215962] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 381.225330] Call Trace: [ 381.227942] dump_stack+0x1b9/0x29f [ 381.231604] ? arch_local_irq_restore+0x52/0x52 [ 381.236313] should_fail.cold.4+0xa/0x1a [ 381.240401] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 381.245527] ? lock_downgrade+0x8e0/0x8e0 [ 381.249694] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 381.255244] ? proc_fail_nth_write+0x96/0x1f0 [ 381.259774] ? find_held_lock+0x36/0x1c0 [ 381.263896] ? check_same_owner+0x320/0x320 [ 381.268237] ? rcu_note_context_switch+0x710/0x710 [ 381.273197] should_failslab+0x124/0x180 [ 381.277282] __kmalloc_track_caller+0x2c4/0x760 [ 381.281969] ? strncpy_from_user+0x500/0x500 [ 381.286386] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 381.291949] ? strndup_user+0x77/0xd0 [ 381.295771] memdup_user+0x2c/0xa0 [ 381.299329] strndup_user+0x77/0xd0 [ 381.302976] ksys_mount+0x3c/0x140 [ 381.306545] SyS_mount+0x35/0x50 [ 381.309930] ? ksys_mount+0x140/0x140 [ 381.313759] do_syscall_64+0x29e/0x9d0 [ 381.317637] ? vmalloc_sync_all+0x30/0x30 [ 381.321772] ? _raw_spin_unlock_irq+0x27/0x70 [ 381.326258] ? finish_task_switch+0x1ca/0x820 [ 381.330750] ? syscall_return_slowpath+0x5c0/0x5c0 [ 381.335682] ? syscall_return_slowpath+0x30f/0x5c0 [ 381.340608] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 381.345983] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 381.350838] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 381.356019] RIP: 0033:0x4552d9 [ 381.359200] RSP: 002b:00007f20eb785c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 381.366899] RAX: ffffffffffffffda RBX: 00007f20eb7866d4 RCX: 00000000004552d9 [ 381.374163] RDX: 00000000200002c0 RSI: 0000000020000140 RDI: 0000000020000300 [ 381.381425] RBP: 000000000072bea0 R08: 0000000020001280 R09: 0000000000000000 [ 381.388688] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 381.395953] R13: 00000000000003fa R14: 00000000006f9010 R15: 0000000000000000 2018/04/05 21:37:39 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:39 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000400008fe7bb5cd4e344cd0002800000720a00ff"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xf, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x0, 0xffe0}, [@jmp={0x5, 0x0, 0xffffffcd}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) 2018/04/05 21:37:39 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000001380)='./file0\x00', &(0x7f0000001340)='proc\x00', 0x0, &(0x7f0000000240)) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000001280)) 2018/04/05 21:37:39 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:39 executing program 6: perf_event_open(&(0x7f000025c000)={0x7, 0x70, 0x3e3, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9}, 0x3d1) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000028000)={r0, &(0x7f0000000200), &(0x7f0000000240)="13"}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r0, &(0x7f0000000040)}, 0x10) 2018/04/05 21:37:39 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0x18d, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:39 executing program 4 (fault-call:3 fault-nth:1): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000001380)='./file0\x00', &(0x7f0000001340)='proc\x00', 0x0, &(0x7f0000000240)) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000001280)) 2018/04/05 21:37:39 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xc6a, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) [ 381.571556] FAULT_INJECTION: forcing a failure. [ 381.571556] name failslab, interval 1, probability 0, space 0, times 0 [ 381.582945] CPU: 1 PID: 3350 Comm: syz-executor4 Not tainted 4.16.0+ #1 [ 381.589746] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 381.599112] Call Trace: [ 381.601729] dump_stack+0x1b9/0x29f [ 381.605387] ? arch_local_irq_restore+0x52/0x52 [ 381.610098] should_fail.cold.4+0xa/0x1a [ 381.614178] ? zap_class+0x720/0x720 [ 381.617917] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 381.623043] ? memdup_user+0x2c/0xa0 [ 381.626777] ? strndup_user+0x77/0xd0 [ 381.630594] ? graph_lock+0x170/0x170 [ 381.634421] ? proc_fail_nth_write+0x96/0x1f0 [ 381.638947] ? find_held_lock+0x36/0x1c0 [ 381.643069] ? check_same_owner+0x320/0x320 [ 381.647408] ? lock_release+0xa10/0xa10 [ 381.651395] ? rcu_note_context_switch+0x710/0x710 [ 381.656341] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 381.661377] ? __check_object_size+0x95/0x5d9 [ 381.665903] should_failslab+0x124/0x180 [ 381.669997] __kmalloc_track_caller+0x2c4/0x760 [ 381.674680] ? strncpy_from_user+0x500/0x500 [ 381.679090] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 381.684626] ? strndup_user+0x77/0xd0 [ 381.688426] memdup_user+0x2c/0xa0 [ 381.691963] strndup_user+0x77/0xd0 [ 381.695588] ksys_mount+0x73/0x140 [ 381.699122] SyS_mount+0x35/0x50 [ 381.702476] ? ksys_mount+0x140/0x140 [ 381.706269] do_syscall_64+0x29e/0x9d0 [ 381.710145] ? vmalloc_sync_all+0x30/0x30 [ 381.714282] ? _raw_spin_unlock_irq+0x27/0x70 [ 381.718768] ? finish_task_switch+0x1ca/0x820 [ 381.723261] ? syscall_return_slowpath+0x5c0/0x5c0 [ 381.728185] ? syscall_return_slowpath+0x30f/0x5c0 [ 381.733636] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 381.738999] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 381.743848] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 381.749030] RIP: 0033:0x4552d9 [ 381.752209] RSP: 002b:00007f20eb785c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 381.759909] RAX: ffffffffffffffda RBX: 00007f20eb7866d4 RCX: 00000000004552d9 2018/04/05 21:37:39 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8cffffff}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:39 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000400008fe7bb5cd4e344cd0002800000720a00ff"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xf, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x10}, [@jmp={0x5, 0x0, 0xffffffcd}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) 2018/04/05 21:37:39 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9}, 0x3d1) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000028000)={r0, &(0x7f0000000200), &(0x7f0000000240)="13"}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r0, 0x28, &(0x7f0000000040)={0x0, 0x0}}, 0x10) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100)={r1, 0x29b64e89, 0x148f0c81f0fd5bf5}, 0xc) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r0, &(0x7f0000000040)}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={r2, 0x28, &(0x7f0000000140)}, 0x10) 2018/04/05 21:37:39 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000001380)='./file0\x00', &(0x7f0000001340)='proc\x00', 0x0, &(0x7f0000000240)) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000001280)) 2018/04/05 21:37:39 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 381.767170] RDX: 00000000200002c0 RSI: 0000000020000140 RDI: 0000000020000300 [ 381.774431] RBP: 000000000072bea0 R08: 0000000020001280 R09: 0000000000000000 [ 381.781689] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 381.788949] R13: 00000000000003fa R14: 00000000006f9010 R15: 0000000000000001 2018/04/05 21:37:39 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0x854, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:39 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0x7ad, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:39 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xf6ffffff}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:39 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9}, 0x3d1) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000028000)={r0, &(0x7f0000000200), &(0x7f0000000240)="13"}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r0, &(0x7f0000000040)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000440)={0x2, 0x0, 0x7, 0x7, 0xb, 0xffffffffffffffff, 0x3}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f00000000c0)="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", &(0x7f00000001c0)="1a0a73bd7e8238ff676cfb35a3a1400bb0307e91cb21d407c0530f4dcea5965f25a45f2759df19b3e2fc209e054389e3b171ffbc6f3bcc0047d3ace0d9f78c11b5de864a4a2103448c7f22ba78a27474be9e19aa75efd6ebfafb11d79b0238ecb5fa2c377ca8", 0x2}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000400)={r0, &(0x7f0000000280)="d62dc6a1ddf0612329ed4a247261a85b263c344874abd96a43e5b6493ea6ee9b5fb9426541d61e5eeafcf78205a7fc15d61e6e0578f099f7ec12a0c02de4edb9f9faa0", &(0x7f0000000300)="d9e0540b2067eabe91d73a1fcf594ad096e2f492e0f89a633ae9cda10d9569bc2e0c87ee0beed7c8c976e812e5af11195ab4876d79d4451c5797cf4f88d12d83e69ecab6e491edbd75815e9b1737bb7ea6d5f15b99181f279e67e0ad7c82489a3ebcbf689e6e005188ba6ebc0269ca6b619b48e89cc947c277466493fa7172261963a28196a934d9035f1e76a4a50efbde7f999e6d3503a089edb372f069a10e03e038c47de1cad93382ad05931beb5c05c54734fc5cd9b881c8bf486560a71745ff0370d955fc8ec8933fb09bf3a6c597e2690344", 0x1}, 0x20) 2018/04/05 21:37:39 executing program 4 (fault-call:3 fault-nth:2): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000001380)='./file0\x00', &(0x7f0000001340)='proc\x00', 0x0, &(0x7f0000000240)) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000001280)) 2018/04/05 21:37:39 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8cffffff00000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:39 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000001380)='./file0\x00', &(0x7f0000001340)='proc\x00', 0x0, &(0x7f0000000240)) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000001280)) 2018/04/05 21:37:39 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0x250, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:39 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000400008fe7bb5cd4e344cd0002800000720a00ff"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xf, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x0, 0xd209000000000000}, [@jmp={0x5, 0x0, 0xffffffcd}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) 2018/04/05 21:37:39 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0x266, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:40 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0x7e6, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:40 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0x463, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:40 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xffffff8c}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:40 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:40 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000001380)='./file0\x00', &(0x7f0000001340)='proc\x00', 0x0, &(0x7f0000000240)) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000001280)) 2018/04/05 21:37:40 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9}, 0x3d1) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000028000)={r0, &(0x7f0000000200), &(0x7f00000000c0)="13"}, 0x20) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000040)) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r0, &(0x7f0000000040)}, 0x10) [ 382.230799] FAULT_INJECTION: forcing a failure. [ 382.230799] name failslab, interval 1, probability 0, space 0, times 0 [ 382.242140] CPU: 0 PID: 3391 Comm: syz-executor4 Not tainted 4.16.0+ #1 [ 382.248915] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 382.258283] Call Trace: [ 382.260885] dump_stack+0x1b9/0x29f [ 382.264538] ? arch_local_irq_restore+0x52/0x52 [ 382.269248] should_fail.cold.4+0xa/0x1a [ 382.273336] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 382.278452] ? kasan_kmalloc+0xc4/0xe0 [ 382.282358] ? strndup_user+0x77/0xd0 [ 382.286186] ? graph_lock+0x170/0x170 [ 382.290007] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 382.295394] ? proc_fail_nth_write+0x96/0x1f0 [ 382.299923] ? find_held_lock+0x36/0x1c0 [ 382.304054] ? check_same_owner+0x320/0x320 [ 382.308394] ? lock_release+0xa10/0xa10 [ 382.312390] ? rcu_note_context_switch+0x710/0x710 [ 382.317339] ? __check_object_size+0x95/0x5d9 [ 382.321865] should_failslab+0x124/0x180 [ 382.325950] kmem_cache_alloc_trace+0x2cb/0x780 [ 382.330642] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 382.336203] ? _copy_from_user+0xdf/0x150 [ 382.340380] copy_mount_options+0x5f/0x380 [ 382.344633] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 382.350201] ksys_mount+0xd0/0x140 [ 382.353770] SyS_mount+0x35/0x50 [ 382.357160] ? ksys_mount+0x140/0x140 [ 382.360985] do_syscall_64+0x29e/0x9d0 [ 382.364883] ? vmalloc_sync_all+0x30/0x30 [ 382.369048] ? _raw_spin_unlock_irq+0x27/0x70 [ 382.373563] ? finish_task_switch+0x1ca/0x820 2018/04/05 21:37:40 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:40 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000001380)='./file0\x00', &(0x7f0000001340)='proc\x00', 0x0, &(0x7f0000000240)) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000001280)) 2018/04/05 21:37:40 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000400008fe7bb5cd4e344cd0002800000720a00ff"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xf, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x40000000}, [@jmp={0x5, 0x0, 0xffffffcd}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) 2018/04/05 21:37:40 executing program 6: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x7c10, 0x18}, 0xc) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000180)={r1, &(0x7f00000000c0)="e37b424b3aa3f7f95d27b6b686ed72b9b08d80c0a77c030a867e9a6e0b4ae6c9e76a131d7e650f42e802f42a4035059153260c854fc6750e989ab292169e322af43577ce09d5cce32bac45298451a04577efd6d7891b823bc997693fc94ab99c785fde81490cc2af6187d4c97e29c2f366c50c2906523c1720a6356a0d852256143074523f817104e651e98b2c42d07bab2a7a100164eca0131610bcb4a267c58cee445988"}, 0x10) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000028000)={0xffffffffffffffff, &(0x7f0000000200), &(0x7f0000000240)="13"}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000040)}, 0x10) [ 382.378087] ? syscall_return_slowpath+0x5c0/0x5c0 [ 382.383037] ? syscall_return_slowpath+0x30f/0x5c0 [ 382.387997] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 382.393391] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 382.398263] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 382.403460] RIP: 0033:0x4552d9 [ 382.406654] RSP: 002b:00007f20eb785c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 382.414377] RAX: ffffffffffffffda RBX: 00007f20eb7866d4 RCX: 00000000004552d9 [ 382.421659] RDX: 00000000200002c0 RSI: 0000000020000140 RDI: 0000000020000300 [ 382.428935] RBP: 000000000072bea0 R08: 0000000020001280 R09: 0000000000000000 [ 382.436216] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 382.443493] R13: 00000000000003fa R14: 00000000006f9010 R15: 0000000000000002 2018/04/05 21:37:40 executing program 4 (fault-call:3 fault-nth:3): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000001380)='./file0\x00', &(0x7f0000001340)='proc\x00', 0x0, &(0x7f0000000240)) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000001280)) 2018/04/05 21:37:40 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0x988, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:40 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xffe, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:40 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:40 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000400008fe7bb5cd4e344cd0002800000720a00ff"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xf, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x80ffff}, [@jmp={0x5, 0x0, 0xffffffcd}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) 2018/04/05 21:37:40 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xffffffff00000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:40 executing program 5 (fault-call:3 fault-nth:0): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000001380)='./file0\x00', &(0x7f0000001340)='proc\x00', 0x0, &(0x7f0000000240)) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000001280)) 2018/04/05 21:37:40 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9}, 0x3d1) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000028000)={r0, &(0x7f0000000200), &(0x7f0000000240)="13"}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000100)={r0, &(0x7f0000000140)="dc1971a0bc62f5aaa8ab99e7271fb450f4406300000009f1d8d50d4cee320097a2f488f3"}, 0xfffffffffffffe0b) 2018/04/05 21:37:40 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000400008fe7bb5cd4e344cd0002800000720a00ff"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xf, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x100000000000000}, [@jmp={0x5, 0x0, 0xffffffcd}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) 2018/04/05 21:37:40 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6ffffff00000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 382.700908] FAULT_INJECTION: forcing a failure. [ 382.700908] name failslab, interval 1, probability 0, space 0, times 0 [ 382.712268] CPU: 0 PID: 3440 Comm: syz-executor5 Not tainted 4.16.0+ #1 [ 382.719034] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 382.728399] Call Trace: [ 382.731013] dump_stack+0x1b9/0x29f [ 382.734674] ? arch_local_irq_restore+0x52/0x52 [ 382.739391] should_fail.cold.4+0xa/0x1a [ 382.743481] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 382.748613] ? lock_downgrade+0x8e0/0x8e0 [ 382.752790] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 382.759056] ? proc_fail_nth_write+0x96/0x1f0 [ 382.763582] ? find_held_lock+0x36/0x1c0 [ 382.767706] ? check_same_owner+0x320/0x320 [ 382.772052] ? rcu_note_context_switch+0x710/0x710 [ 382.777016] should_failslab+0x124/0x180 [ 382.781102] __kmalloc_track_caller+0x2c4/0x760 [ 382.785806] ? strncpy_from_user+0x500/0x500 [ 382.790232] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 382.795790] ? strndup_user+0x77/0xd0 2018/04/05 21:37:40 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1000000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:40 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 382.799617] memdup_user+0x2c/0xa0 [ 382.803179] strndup_user+0x77/0xd0 [ 382.806827] ksys_mount+0x3c/0x140 [ 382.810393] SyS_mount+0x35/0x50 [ 382.813773] ? ksys_mount+0x140/0x140 [ 382.817599] do_syscall_64+0x29e/0x9d0 [ 382.821500] ? vmalloc_sync_all+0x30/0x30 [ 382.825663] ? _raw_spin_unlock_irq+0x27/0x70 [ 382.830181] ? finish_task_switch+0x1ca/0x820 [ 382.834696] ? syscall_return_slowpath+0x5c0/0x5c0 [ 382.839651] ? syscall_return_slowpath+0x30f/0x5c0 [ 382.844614] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 382.850008] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 382.854889] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 382.860089] RIP: 0033:0x4552d9 [ 382.863318] RSP: 002b:00007f4cbd4aec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 382.871046] RAX: ffffffffffffffda RBX: 00007f4cbd4af6d4 RCX: 00000000004552d9 [ 382.878327] RDX: 00000000200002c0 RSI: 0000000020000140 RDI: 0000000020000300 [ 382.885608] RBP: 000000000072bea0 R08: 0000000020001280 R09: 0000000000000000 [ 382.892886] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 382.900165] R13: 00000000000003fa R14: 00000000006f9010 R15: 0000000000000000 [ 382.985304] FAULT_INJECTION: forcing a failure. [ 382.985304] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 382.997161] CPU: 1 PID: 3466 Comm: syz-executor4 Not tainted 4.16.0+ #1 [ 383.003926] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 383.013292] Call Trace: [ 383.015907] dump_stack+0x1b9/0x29f [ 383.019558] ? arch_local_irq_restore+0x52/0x52 [ 383.024256] ? find_held_lock+0x36/0x1c0 [ 383.028340] should_fail.cold.4+0xa/0x1a [ 383.032428] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 383.037555] ? perf_trace_run_bpf_submit+0x23f/0x370 [ 383.042690] ? perf_tp_event+0xc30/0xc30 [ 383.046773] ? perf_tp_event+0xc30/0xc30 [ 383.050855] ? memset+0x31/0x40 [ 383.054175] ? perf_trace_lock_acquire+0xe3/0x980 [ 383.059043] ? zap_class+0x720/0x720 [ 383.062780] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 383.068327] ? should_fail+0x21b/0xbcd [ 383.072244] __alloc_pages_nodemask+0x34e/0xd70 [ 383.076925] ? strndup_user+0x77/0xd0 [ 383.080756] ? __alloc_pages_slowpath+0x2dc0/0x2dc0 [ 383.085785] ? find_held_lock+0x36/0x1c0 [ 383.089860] ? check_same_owner+0x320/0x320 [ 383.094170] ? lock_release+0xa10/0xa10 [ 383.098140] cache_grow_begin+0x72/0x6c0 [ 383.102196] kmem_cache_alloc_trace+0x6a5/0x780 [ 383.106856] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 383.112388] copy_mount_options+0x5f/0x380 [ 383.116615] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 383.122145] ksys_mount+0xd0/0x140 [ 383.125691] SyS_mount+0x35/0x50 [ 383.129058] ? ksys_mount+0x140/0x140 [ 383.132850] do_syscall_64+0x29e/0x9d0 [ 383.136723] ? vmalloc_sync_all+0x30/0x30 [ 383.140856] ? _raw_spin_unlock_irq+0x27/0x70 [ 383.145347] ? finish_task_switch+0x1ca/0x820 [ 383.149831] ? syscall_return_slowpath+0x5c0/0x5c0 [ 383.154757] ? syscall_return_slowpath+0x30f/0x5c0 [ 383.159679] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 383.165046] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 383.169880] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 383.175054] RIP: 0033:0x4552d9 [ 383.178226] RSP: 002b:00007f20eb785c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 2018/04/05 21:37:41 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9}, 0x3d1) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000000c0)={r0, &(0x7f0000000280)="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", &(0x7f0000000040)=""/38}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000028000)={r0, &(0x7f0000000200), &(0x7f0000000240)="13"}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r0, &(0x7f0000000040)}, 0x10) 2018/04/05 21:37:41 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000400008fe7bb5cd4e344cd0002800000720a00ff"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xf, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x4c00000000000000}, [@jmp={0x5, 0x0, 0xffffffcd}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) 2018/04/05 21:37:41 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6ffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:41 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xea9, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:41 executing program 4 (fault-call:3 fault-nth:4): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000001380)='./file0\x00', &(0x7f0000001340)='proc\x00', 0x0, &(0x7f0000000240)) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000001280)) 2018/04/05 21:37:41 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xfffffff6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:41 executing program 5 (fault-call:3 fault-nth:1): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000001380)='./file0\x00', &(0x7f0000001340)='proc\x00', 0x0, &(0x7f0000000240)) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000001280)) 2018/04/05 21:37:41 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xf21, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) [ 383.185920] RAX: ffffffffffffffda RBX: 00007f20eb7866d4 RCX: 00000000004552d9 [ 383.193172] RDX: 00000000200002c0 RSI: 0000000020000140 RDI: 0000000020000300 [ 383.200424] RBP: 000000000072bea0 R08: 0000000020001280 R09: 0000000000000000 [ 383.207680] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 383.214936] R13: 00000000000003fa R14: 00000000006f9010 R15: 0000000000000003 [ 383.315016] FAULT_INJECTION: forcing a failure. [ 383.315016] name failslab, interval 1, probability 0, space 0, times 0 [ 383.326355] CPU: 1 PID: 3482 Comm: syz-executor5 Not tainted 4.16.0+ #1 [ 383.333113] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 383.342467] Call Trace: [ 383.345061] dump_stack+0x1b9/0x29f [ 383.348709] ? arch_local_irq_restore+0x52/0x52 [ 383.353386] ? __save_stack_trace+0x7e/0xd0 [ 383.357729] should_fail.cold.4+0xa/0x1a [ 383.361795] ? zap_class+0x720/0x720 [ 383.365522] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 383.370629] ? kasan_kmalloc+0xc4/0xe0 [ 383.374523] ? __kmalloc_track_caller+0x14a/0x760 [ 383.379367] ? memdup_user+0x2c/0xa0 [ 383.383083] ? strndup_user+0x77/0xd0 [ 383.386895] ? graph_lock+0x170/0x170 [ 383.390705] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 383.396255] ? proc_fail_nth_write+0x96/0x1f0 [ 383.401113] ? find_held_lock+0x36/0x1c0 [ 383.405200] ? check_same_owner+0x320/0x320 [ 383.409531] ? lock_release+0xa10/0xa10 [ 383.413513] ? rcu_note_context_switch+0x710/0x710 [ 383.418447] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 383.423470] ? __check_object_size+0x95/0x5d9 [ 383.427974] should_failslab+0x124/0x180 [ 383.432046] __kmalloc_track_caller+0x2c4/0x760 [ 383.436729] ? strncpy_from_user+0x500/0x500 [ 383.441144] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 383.446691] ? strndup_user+0x77/0xd0 [ 383.450503] memdup_user+0x2c/0xa0 [ 383.454056] strndup_user+0x77/0xd0 [ 383.457684] ksys_mount+0x73/0x140 [ 383.461212] SyS_mount+0x35/0x50 [ 383.464569] ? ksys_mount+0x140/0x140 [ 383.468359] do_syscall_64+0x29e/0x9d0 [ 383.472233] ? syscall_slow_exit_work+0x4f0/0x4f0 [ 383.477063] ? syscall_return_slowpath+0x5c0/0x5c0 [ 383.481977] ? syscall_return_slowpath+0x30f/0x5c0 [ 383.486897] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 383.492249] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 383.497083] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 383.502257] RIP: 0033:0x4552d9 [ 383.505429] RSP: 002b:00007f4cbd4aec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 2018/04/05 21:37:41 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x2000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:41 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000400008fe7bb5cd4e344cd0002800000720a00ff"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xf, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x8510}, [@jmp={0x5, 0x0, 0xffffffcd}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) 2018/04/05 21:37:41 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:41 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 383.513125] RAX: ffffffffffffffda RBX: 00007f4cbd4af6d4 RCX: 00000000004552d9 [ 383.520376] RDX: 00000000200002c0 RSI: 0000000020000140 RDI: 0000000020000300 [ 383.527629] RBP: 000000000072bea0 R08: 0000000020001280 R09: 0000000000000000 [ 383.534879] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 383.542130] R13: 00000000000003fa R14: 00000000006f9010 R15: 0000000000000001 [ 383.563018] FAULT_INJECTION: forcing a failure. [ 383.563018] name failslab, interval 1, probability 0, space 0, times 0 [ 383.574414] CPU: 0 PID: 3489 Comm: syz-executor4 Not tainted 4.16.0+ #1 [ 383.581179] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 383.590519] Call Trace: [ 383.593102] dump_stack+0x1b9/0x29f [ 383.596727] ? arch_local_irq_restore+0x52/0x52 [ 383.601402] should_fail.cold.4+0xa/0x1a [ 383.605458] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 383.610581] ? rcu_is_watching+0x85/0x140 [ 383.614729] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 383.619924] ? find_held_lock+0x36/0x1c0 [ 383.624008] ? check_same_owner+0x320/0x320 [ 383.628333] ? rcu_note_context_switch+0x710/0x710 [ 383.633252] ? save_stack+0xa9/0xd0 [ 383.636879] should_failslab+0x124/0x180 [ 383.640935] kmem_cache_alloc+0x2af/0x760 [ 383.645075] ? find_held_lock+0x36/0x1c0 [ 383.649134] getname_flags+0xd0/0x5a0 [ 383.652933] user_path_at_empty+0x2d/0x50 [ 383.657077] do_mount+0x172/0x3070 [ 383.660609] ? do_raw_spin_unlock+0x9e/0x2e0 [ 383.665020] ? copy_mount_string+0x40/0x40 [ 383.669255] ? rcu_pm_notify+0xc0/0xc0 [ 383.673144] ? copy_mount_options+0x5f/0x380 [ 383.677546] ? rcu_read_lock_sched_held+0x108/0x120 [ 383.682556] ? kmem_cache_alloc_trace+0x616/0x780 [ 383.687394] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 383.692926] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 383.698455] ? copy_mount_options+0x285/0x380 [ 383.702950] ksys_mount+0x12d/0x140 [ 383.706571] SyS_mount+0x35/0x50 [ 383.709928] ? ksys_mount+0x140/0x140 [ 383.713724] do_syscall_64+0x29e/0x9d0 [ 383.717600] ? vmalloc_sync_all+0x30/0x30 [ 383.721738] ? _raw_spin_unlock_irq+0x27/0x70 [ 383.726224] ? finish_task_switch+0x1ca/0x820 [ 383.730711] ? syscall_return_slowpath+0x5c0/0x5c0 [ 383.735630] ? syscall_return_slowpath+0x30f/0x5c0 [ 383.740556] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 383.745915] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 383.750756] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 383.755932] RIP: 0033:0x4552d9 [ 383.759108] RSP: 002b:00007f20eb785c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 2018/04/05 21:37:41 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9}, 0x3d1) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000028000)={r0, &(0x7f0000000200), &(0x7f0000000240)="13"}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r0, &(0x7f0000000040)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xf, 0x1f, 0xffff, 0x6, 0x9, r0, 0x3}, 0x2c) [ 383.766809] RAX: ffffffffffffffda RBX: 00007f20eb7866d4 RCX: 00000000004552d9 [ 383.774064] RDX: 00000000200002c0 RSI: 0000000020000140 RDI: 0000000020000300 [ 383.781322] RBP: 000000000072bea0 R08: 0000000020001280 R09: 0000000000000000 [ 383.788619] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 383.795879] R13: 00000000000003fa R14: 00000000006f9010 R15: 0000000000000004 2018/04/05 21:37:41 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xe00, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:41 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0x77d, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:41 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x2}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:41 executing program 5 (fault-call:3 fault-nth:2): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000001380)='./file0\x00', &(0x7f0000001340)='proc\x00', 0x0, &(0x7f0000000240)) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000001280)) [ 384.003911] FAULT_INJECTION: forcing a failure. [ 384.003911] name failslab, interval 1, probability 0, space 0, times 0 [ 384.015367] CPU: 0 PID: 3518 Comm: syz-executor5 Not tainted 4.16.0+ #1 [ 384.022137] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 384.031502] Call Trace: [ 384.034115] dump_stack+0x1b9/0x29f [ 384.037782] ? arch_local_irq_restore+0x52/0x52 [ 384.042492] should_fail.cold.4+0xa/0x1a [ 384.046594] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 384.051709] ? kasan_kmalloc+0xc4/0xe0 [ 384.055614] ? strndup_user+0x77/0xd0 [ 384.059435] ? graph_lock+0x170/0x170 [ 384.063255] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 384.068641] ? proc_fail_nth_write+0x96/0x1f0 [ 384.073174] ? find_held_lock+0x36/0x1c0 [ 384.077474] ? check_same_owner+0x320/0x320 [ 384.081811] ? lock_release+0xa10/0xa10 [ 384.085807] ? rcu_note_context_switch+0x710/0x710 [ 384.090757] ? __check_object_size+0x95/0x5d9 [ 384.095282] should_failslab+0x124/0x180 [ 384.099373] kmem_cache_alloc_trace+0x2cb/0x780 [ 384.104070] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 384.109629] ? _copy_from_user+0xdf/0x150 [ 384.113817] copy_mount_options+0x5f/0x380 [ 384.118078] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 384.123644] ksys_mount+0xd0/0x140 [ 384.127211] SyS_mount+0x35/0x50 [ 384.130598] ? ksys_mount+0x140/0x140 [ 384.134423] do_syscall_64+0x29e/0x9d0 [ 384.138330] ? vmalloc_sync_all+0x30/0x30 [ 384.142497] ? kasan_check_write+0x14/0x20 [ 384.146760] ? syscall_return_slowpath+0x5c0/0x5c0 [ 384.151716] ? syscall_return_slowpath+0x30f/0x5c0 [ 384.156675] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 384.162079] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 384.166934] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 384.172108] RIP: 0033:0x4552d9 [ 384.175290] RSP: 002b:00007f4cbd4aec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 384.183001] RAX: ffffffffffffffda RBX: 00007f4cbd4af6d4 RCX: 00000000004552d9 [ 384.190265] RDX: 00000000200002c0 RSI: 0000000020000140 RDI: 0000000020000300 [ 384.197517] RBP: 000000000072bea0 R08: 0000000020001280 R09: 0000000000000000 2018/04/05 21:37:42 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8cffffff00000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:42 executing program 4 (fault-call:3 fault-nth:5): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000001380)='./file0\x00', &(0x7f0000001340)='proc\x00', 0x0, &(0x7f0000000240)) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000001280)) 2018/04/05 21:37:42 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x4, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000389000)}, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9}, 0x3d1) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r0, &(0x7f0000000140), &(0x7f0000000240)="13"}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r0, &(0x7f0000000040)}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r0, 0x28, &(0x7f0000000040)={0x0, 0x0}}, 0x10) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000140)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000002680)={0xffffffffffffff9c}) socketpair(0x0, 0x801, 0x81, &(0x7f00000026c0)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000002700)={r3}) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100)={r1, 0x7f, 0x8}, 0xc) socket$kcm(0x29, 0x7, 0x0) 2018/04/05 21:37:42 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0xffffff8c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:42 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xfbd, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:42 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xb33, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:42 executing program 5 (fault-call:3 fault-nth:3): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000001380)='./file0\x00', &(0x7f0000001340)='proc\x00', 0x0, &(0x7f0000000240)) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000001280)) 2018/04/05 21:37:42 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000400008fe7bb5cd4e344cd0002800000720a00ff"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xf, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x7400000000000000}, [@jmp={0x5, 0x0, 0xffffffcd}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) [ 384.204771] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 384.212112] R13: 00000000000003fa R14: 00000000006f9010 R15: 0000000000000002 [ 384.282401] FAULT_INJECTION: forcing a failure. [ 384.282401] name failslab, interval 1, probability 0, space 0, times 0 [ 384.293957] CPU: 0 PID: 3537 Comm: syz-executor4 Not tainted 4.16.0+ #1 [ 384.300736] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 384.310099] Call Trace: [ 384.312707] dump_stack+0x1b9/0x29f [ 384.316368] ? arch_local_irq_restore+0x52/0x52 [ 384.321075] should_fail.cold.4+0xa/0x1a [ 384.325152] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 384.325262] FAULT_INJECTION: forcing a failure. [ 384.325262] name failslab, interval 1, probability 0, space 0, times 0 [ 384.330704] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 384.330736] ? perf_swevent_event+0x158/0x2e0 [ 384.330763] ? graph_lock+0x170/0x170 [ 384.330780] ? perf_tp_event+0x91f/0xc30 [ 384.330798] ? perf_swevent_event+0x2e0/0x2e0 [ 384.330829] ? find_held_lock+0x36/0x1c0 [ 384.367935] ? __lock_is_held+0xb5/0x140 [ 384.372030] ? check_same_owner+0x320/0x320 [ 384.376351] ? tracing_generic_entry_update+0x18e/0x200 [ 384.381716] ? rcu_note_context_switch+0x710/0x710 [ 384.386659] should_failslab+0x124/0x180 [ 384.390738] kmem_cache_alloc+0x2af/0x760 [ 384.394903] __d_alloc+0xc1/0xc00 [ 384.398361] ? shrink_dcache_for_umount+0x290/0x290 [ 384.403387] ? perf_trace_lock+0x495/0x900 [ 384.407641] ? debug_check_no_locks_freed+0x310/0x310 [ 384.412828] ? __lock_acquire+0x7f5/0x5130 [ 384.417061] ? perf_trace_lock+0x900/0x900 [ 384.421305] ? perf_trace_run_bpf_submit+0x23f/0x370 [ 384.426434] d_alloc+0x8e/0x370 [ 384.429710] ? perf_tp_event+0xc30/0xc30 [ 384.433778] ? __d_alloc+0xc00/0xc00 [ 384.437488] ? perf_trace_run_bpf_submit+0x246/0x370 [ 384.442589] ? find_held_lock+0x36/0x1c0 [ 384.446664] d_alloc_parallel+0x152/0x1e80 [ 384.450900] ? perf_trace_lock+0x495/0x900 [ 384.455138] ? memset+0x31/0x40 [ 384.458434] ? __d_lookup_rcu+0xa80/0xa80 [ 384.462584] ? zap_class+0x720/0x720 [ 384.466314] ? lock_acquire+0x1dc/0x520 [ 384.470286] ? lookup_slow+0x18c/0x570 [ 384.474187] ? lock_release+0xa10/0xa10 [ 384.478166] ? rcu_note_context_switch+0x710/0x710 [ 384.483104] ? __might_sleep+0x95/0x190 [ 384.487092] ? down_read+0xaf/0x1b0 [ 384.490715] ? lookup_slow+0x18c/0x570 [ 384.494604] ? __down_interruptible+0x6e0/0x6e0 [ 384.499282] ? __init_waitqueue_head+0x96/0x140 [ 384.503954] ? init_wait_entry+0x1b0/0x1b0 [ 384.508197] ? rcu_is_watching+0x85/0x140 [ 384.512353] lookup_slow+0x1fe/0x570 [ 384.516078] ? vfs_unlink+0x510/0x510 [ 384.519891] ? lookup_fast+0x468/0x1290 [ 384.523886] ? path_init+0x1713/0x2320 [ 384.527784] walk_component+0x8f5/0x2550 [ 384.531848] ? inode_permission+0xb2/0x560 [ 384.536084] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 384.541285] ? path_init+0x2320/0x2320 [ 384.545188] ? walk_component+0x2550/0x2550 [ 384.549510] ? __save_stack_trace+0x7e/0xd0 [ 384.553857] ? save_stack+0xa9/0xd0 [ 384.557490] ? kasan_slab_alloc+0x12/0x20 [ 384.561635] ? kmem_cache_alloc+0x12e/0x760 [ 384.565956] ? getname_flags+0xd0/0x5a0 [ 384.569933] ? user_path_at_empty+0x2d/0x50 [ 384.574254] ? do_mount+0x172/0x3070 [ 384.577981] path_lookupat.isra.44+0x1f6/0xbd0 [ 384.582566] ? find_held_lock+0x36/0x1c0 [ 384.586637] ? path_parentat.isra.41+0x160/0x160 [ 384.591403] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 384.596595] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 384.601610] ? __check_object_size+0x95/0x5d9 [ 384.606115] ? usercopy_warn+0x120/0x120 [ 384.610181] ? kasan_check_read+0x11/0x20 [ 384.614326] ? do_raw_spin_unlock+0x9e/0x2e0 [ 384.618746] filename_lookup+0x258/0x4f0 [ 384.622812] ? filename_parentat.isra.56+0x540/0x540 [ 384.627938] ? mpi_free.cold.1+0x19/0x19 [ 384.632022] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 384.637561] ? getname_flags+0x26e/0x5a0 [ 384.641630] user_path_at_empty+0x40/0x50 [ 384.645786] do_mount+0x172/0x3070 [ 384.649337] ? copy_mount_string+0x40/0x40 [ 384.653570] ? rcu_pm_notify+0xc0/0xc0 [ 384.657475] ? copy_mount_options+0x5f/0x380 [ 384.661881] ? rcu_read_lock_sched_held+0x108/0x120 [ 384.666898] ? kmem_cache_alloc_trace+0x616/0x780 [ 384.671744] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 384.677281] ? _copy_from_user+0xdf/0x150 [ 384.681436] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 384.686983] ? copy_mount_options+0x285/0x380 [ 384.691488] ksys_mount+0x12d/0x140 [ 384.695120] SyS_mount+0x35/0x50 [ 384.698488] ? ksys_mount+0x140/0x140 [ 384.702292] do_syscall_64+0x29e/0x9d0 [ 384.706182] ? vmalloc_sync_all+0x30/0x30 [ 384.710333] ? _raw_spin_unlock_irq+0x27/0x70 [ 384.714829] ? finish_task_switch+0x1ca/0x820 [ 384.719326] ? syscall_return_slowpath+0x5c0/0x5c0 [ 384.724259] ? syscall_return_slowpath+0x30f/0x5c0 [ 384.729197] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 384.734567] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 384.739422] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 384.744606] RIP: 0033:0x4552d9 [ 384.747793] RSP: 002b:00007f20eb785c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 384.755504] RAX: ffffffffffffffda RBX: 00007f20eb7866d4 RCX: 00000000004552d9 [ 384.763232] RDX: 00000000200002c0 RSI: 0000000020000140 RDI: 0000000020000300 [ 384.770497] RBP: 000000000072bea0 R08: 0000000020001280 R09: 0000000000000000 [ 384.777763] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 384.785029] R13: 00000000000003fa R14: 00000000006f9010 R15: 0000000000000005 [ 384.792333] CPU: 1 PID: 3540 Comm: syz-executor5 Not tainted 4.16.0+ #1 [ 384.799092] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 384.808450] Call Trace: [ 384.811048] dump_stack+0x1b9/0x29f [ 384.814688] ? arch_local_irq_restore+0x52/0x52 [ 384.819363] ? find_held_lock+0x36/0x1c0 [ 384.823439] should_fail.cold.4+0xa/0x1a [ 384.827515] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 384.832628] ? rcu_is_watching+0x85/0x140 [ 384.836782] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 384.841985] ? find_held_lock+0x36/0x1c0 [ 384.846074] ? check_same_owner+0x320/0x320 [ 384.850403] ? rcu_note_context_switch+0x710/0x710 [ 384.855331] ? save_stack+0xa9/0xd0 [ 384.858964] should_failslab+0x124/0x180 [ 384.863035] kmem_cache_alloc+0x2af/0x760 [ 384.867199] getname_flags+0xd0/0x5a0 [ 384.871010] user_path_at_empty+0x2d/0x50 [ 384.875170] do_mount+0x172/0x3070 [ 384.878724] ? copy_mount_string+0x40/0x40 [ 384.882967] ? rcu_pm_notify+0xc0/0xc0 [ 384.886869] ? copy_mount_options+0x5f/0x380 [ 384.891282] ? rcu_read_lock_sched_held+0x108/0x120 [ 384.896302] ? kmem_cache_alloc_trace+0x616/0x780 [ 384.901144] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 384.906669] ? _copy_from_user+0xdf/0x150 [ 384.910806] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 384.916328] ? copy_mount_options+0x285/0x380 [ 384.920813] ksys_mount+0x12d/0x140 [ 384.924424] SyS_mount+0x35/0x50 [ 384.927776] ? ksys_mount+0x140/0x140 [ 384.931564] do_syscall_64+0x29e/0x9d0 [ 384.935432] ? vmalloc_sync_all+0x30/0x30 [ 384.939567] ? _raw_spin_unlock_irq+0x27/0x70 [ 384.944048] ? finish_task_switch+0x1ca/0x820 [ 384.948526] ? syscall_return_slowpath+0x5c0/0x5c0 [ 384.953443] ? syscall_return_slowpath+0x30f/0x5c0 [ 384.958359] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 384.963712] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 384.968545] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 384.973715] RIP: 0033:0x4552d9 [ 384.976887] RSP: 002b:00007f4cbd4aec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 2018/04/05 21:37:42 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:42 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6ffffff00000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:42 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000400008fe7bb5cd4e344cd0002800000720a00ff"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xf, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x0, 0xa00}, [@jmp={0x5, 0x0, 0xffffffcd}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) 2018/04/05 21:37:42 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8cffffff00000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:42 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 384.984579] RAX: ffffffffffffffda RBX: 00007f4cbd4af6d4 RCX: 00000000004552d9 [ 384.991830] RDX: 00000000200002c0 RSI: 0000000020000140 RDI: 0000000020000300 [ 384.999080] RBP: 000000000072bea0 R08: 0000000020001280 R09: 0000000000000000 [ 385.006332] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 385.013583] R13: 00000000000003fa R14: 00000000006f9010 R15: 0000000000000003 2018/04/05 21:37:43 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000400008fe7bb5cd4e344cd0002800000720a00ff"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xf, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x700000000000000}, [@jmp={0x5, 0x0, 0xffffffcd}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) 2018/04/05 21:37:43 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0x189, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:43 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xe33, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:43 executing program 4 (fault-call:3 fault-nth:6): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000001380)='./file0\x00', &(0x7f0000001340)='proc\x00', 0x0, &(0x7f0000000240)) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000001280)) 2018/04/05 21:37:43 executing program 5 (fault-call:3 fault-nth:4): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000001380)='./file0\x00', &(0x7f0000001340)='proc\x00', 0x0, &(0x7f0000000240)) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000001280)) 2018/04/05 21:37:43 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:43 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:43 executing program 6: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9}, 0x3d1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r1, 0x28, &(0x7f00000001c0)}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000180)={r1, &(0x7f0000000040)="b8bbf25d73076d2fb102bd13e5650790b74da92d", &(0x7f00000000c0)=""/188}, 0x18) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000400)={r1, &(0x7f0000000300)="c56be58dc77958bc91201a7e204cca513b57634ae33b95124e4a5ca711b6d927b450e8a036e547c11fbd568569d77751d70e55451deb400fcf94ac7cd14a08e07dad3a06f3613c7935a4862e219684e4ab5f574e240988e590dbc28652160dda88f2c30d5ffb0877b3b757d1810855de607ea593a4994cd96e9a168e15001da57796cbbaf34dd5f0297337d2eef2a9415d13c27fbedc6884f742d42920aac37bd5ac8275417b169fac7bab5509cc71542fb973233e26f2c99c0020f1f98ef25f0cee625b210abccae018df93395392b7e829afe67912d55299f43f2f48fddccc3927bb34b7864b0cb5"}, 0x10) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000280)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000028000)={r1, &(0x7f0000000440)="1c88e31cc2aeceaff96da2ad1ca0cc6a4ad06e487f8d068a25034a99c0de5886e72c5f2869a1d8440ca1dc5e062692f901437585ce178019dfd8225941937dfb64a8401ffc78133be67332059404d6e7fdcddd02e8c9e8d47535530a108f78c40044243f0e907c7572fb63cd64033da31101f43d080b4118e97bc03dbc1bbc2a9d7b486e831e2f9aef1a934b8ea5f9f6a74a30dc2d8a4ec338598fdd2b563889ce67924558b75ebddfe9c4b5779c776702ad6c9684f46c074815d40b78b1f6837979f3d23d79097a86ffda087070dbd3b22dd05e", &(0x7f0000000540)="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"}, 0xd) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f00000002c0)) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r1, &(0x7f0000000040)}, 0x10) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) [ 385.283289] FAULT_INJECTION: forcing a failure. [ 385.283289] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 385.295153] CPU: 0 PID: 3577 Comm: syz-executor5 Not tainted 4.16.0+ #1 [ 385.301928] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 385.311294] Call Trace: [ 385.313896] dump_stack+0x1b9/0x29f [ 385.317548] ? arch_local_irq_restore+0x52/0x52 [ 385.322256] should_fail.cold.4+0xa/0x1a [ 385.326348] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 385.331484] ? perf_trace_run_bpf_submit+0x23f/0x370 [ 385.336621] ? perf_tp_event+0xc30/0xc30 [ 385.340711] ? graph_lock+0x170/0x170 [ 385.344539] ? memset+0x31/0x40 [ 385.347860] ? perf_trace_lock_acquire+0xe3/0x980 [ 385.352727] ? zap_class+0x720/0x720 [ 385.356446] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 385.361983] ? should_fail+0x21b/0xbcd [ 385.365881] __alloc_pages_nodemask+0x34e/0xd70 [ 385.370557] ? __alloc_pages_slowpath+0x2dc0/0x2dc0 [ 385.375574] ? find_held_lock+0x36/0x1c0 [ 385.379653] ? check_same_owner+0x320/0x320 [ 385.383976] cache_grow_begin+0x72/0x6c0 [ 385.388049] kmem_cache_alloc+0x689/0x760 [ 385.392202] getname_flags+0xd0/0x5a0 [ 385.396003] user_path_at_empty+0x2d/0x50 [ 385.400158] do_mount+0x172/0x3070 [ 385.403705] ? copy_mount_string+0x40/0x40 [ 385.407932] ? rcu_pm_notify+0xc0/0xc0 [ 385.411824] ? copy_mount_options+0x5f/0x380 [ 385.416309] ? rcu_read_lock_sched_held+0x108/0x120 [ 385.421319] ? kmem_cache_alloc_trace+0x616/0x780 [ 385.426164] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 385.431694] ? _copy_from_user+0xdf/0x150 [ 385.435838] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 385.441366] ? copy_mount_options+0x285/0x380 [ 385.445860] ksys_mount+0x12d/0x140 [ 385.449482] SyS_mount+0x35/0x50 [ 385.452840] ? ksys_mount+0x140/0x140 [ 385.456636] do_syscall_64+0x29e/0x9d0 [ 385.460513] ? vmalloc_sync_all+0x30/0x30 [ 385.464649] ? _raw_spin_unlock_irq+0x27/0x70 [ 385.469134] ? finish_task_switch+0x1ca/0x820 [ 385.473629] ? syscall_return_slowpath+0x5c0/0x5c0 [ 385.478548] ? syscall_return_slowpath+0x30f/0x5c0 [ 385.483473] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 385.488835] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 385.493675] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 385.498851] RIP: 0033:0x4552d9 [ 385.502036] RSP: 002b:00007f4cbd4aec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 385.509738] RAX: ffffffffffffffda RBX: 00007f4cbd4af6d4 RCX: 00000000004552d9 [ 385.516996] RDX: 00000000200002c0 RSI: 0000000020000140 RDI: 0000000020000300 [ 385.524258] RBP: 000000000072bea0 R08: 0000000020001280 R09: 0000000000000000 2018/04/05 21:37:43 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0x75b, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:43 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x4000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 385.531512] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 385.538773] R13: 00000000000003fa R14: 00000000006f9010 R15: 0000000000000004 [ 385.553909] FAULT_INJECTION: forcing a failure. [ 385.553909] name failslab, interval 1, probability 0, space 0, times 0 [ 385.565409] CPU: 1 PID: 3584 Comm: syz-executor4 Not tainted 4.16.0+ #1 [ 385.572179] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 385.581540] Call Trace: [ 385.584149] dump_stack+0x1b9/0x29f [ 385.587816] ? arch_local_irq_restore+0x52/0x52 [ 385.592526] should_fail.cold.4+0xa/0x1a [ 385.596612] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 385.601727] ? lock_downgrade+0x8e0/0x8e0 [ 385.605905] ? graph_lock+0x170/0x170 [ 385.609717] ? memset+0x31/0x40 [ 385.613032] ? find_held_lock+0x36/0x1c0 [ 385.617123] ? __lock_is_held+0xb5/0x140 [ 385.621229] ? check_same_owner+0x320/0x320 [ 385.625579] ? __d_lookup_rcu+0xa80/0xa80 [ 385.629741] ? rcu_note_context_switch+0x710/0x710 [ 385.634685] ? zap_class+0x720/0x720 [ 385.638431] should_failslab+0x124/0x180 [ 385.642514] kmem_cache_alloc+0x2af/0x760 [ 385.646697] ? proc_i_callback+0x30/0x30 [ 385.650778] proc_alloc_inode+0x1b/0x190 [ 385.654855] alloc_inode+0x63/0x190 [ 385.658507] new_inode_pseudo+0x69/0x1a0 [ 385.662580] ? prune_icache_sb+0x1a0/0x1a0 [ 385.666817] ? proc_match.part.4+0x29/0x30 [ 385.671050] proc_get_inode+0x1e/0x670 [ 385.674933] proc_lookup_de+0xe7/0x170 [ 385.678811] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 385.684341] proc_lookup+0x3c/0x50 [ 385.687873] proc_root_lookup+0x3f/0x60 [ 385.691842] lookup_slow+0x2d0/0x570 [ 385.695549] ? vfs_unlink+0x510/0x510 [ 385.699348] ? lookup_fast+0x468/0x1290 [ 385.703331] ? path_init+0x1713/0x2320 [ 385.707222] walk_component+0x8f5/0x2550 [ 385.711275] ? inode_permission+0xb2/0x560 [ 385.715501] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 385.720689] ? path_init+0x2320/0x2320 [ 385.724580] ? walk_component+0x2550/0x2550 [ 385.728926] ? __save_stack_trace+0x7e/0xd0 [ 385.733256] ? save_stack+0xa9/0xd0 [ 385.736876] ? kasan_slab_alloc+0x12/0x20 [ 385.741019] ? kmem_cache_alloc+0x12e/0x760 [ 385.745336] ? getname_flags+0xd0/0x5a0 [ 385.749298] ? user_path_at_empty+0x2d/0x50 [ 385.753609] ? do_mount+0x172/0x3070 [ 385.757318] path_lookupat.isra.44+0x1f6/0xbd0 [ 385.761890] ? find_held_lock+0x36/0x1c0 [ 385.765946] ? path_parentat.isra.41+0x160/0x160 [ 385.770691] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 385.775874] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 385.780883] ? __check_object_size+0x95/0x5d9 [ 385.785379] ? usercopy_warn+0x120/0x120 [ 385.789432] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 385.794190] filename_lookup+0x258/0x4f0 [ 385.798243] ? filename_parentat.isra.56+0x540/0x540 [ 385.803350] ? mpi_free.cold.1+0x19/0x19 [ 385.807413] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 385.812940] ? getname_flags+0x26e/0x5a0 [ 385.816999] user_path_at_empty+0x40/0x50 [ 385.821147] do_mount+0x172/0x3070 [ 385.824686] ? copy_mount_string+0x40/0x40 [ 385.828913] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 385.833926] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 385.838684] ? retint_kernel+0x10/0x10 [ 385.842571] ? copy_mount_options+0x1e3/0x380 [ 385.847057] ? copy_mount_options+0x1e3/0x380 [ 385.851544] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 385.857070] ? copy_mount_options+0x285/0x380 [ 385.861564] ksys_mount+0x12d/0x140 [ 385.865184] SyS_mount+0x35/0x50 [ 385.868541] ? ksys_mount+0x140/0x140 [ 385.872333] do_syscall_64+0x29e/0x9d0 [ 385.876211] ? vmalloc_sync_all+0x30/0x30 [ 385.880347] ? _raw_spin_unlock_irq+0x27/0x70 [ 385.884834] ? finish_task_switch+0x1ca/0x820 [ 385.889324] ? syscall_return_slowpath+0x5c0/0x5c0 [ 385.894245] ? syscall_return_slowpath+0x30f/0x5c0 [ 385.899171] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 385.904537] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 385.909390] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 385.914567] RIP: 0033:0x4552d9 [ 385.917742] RSP: 002b:00007f20eb785c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 385.925442] RAX: ffffffffffffffda RBX: 00007f20eb7866d4 RCX: 00000000004552d9 2018/04/05 21:37:43 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:43 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xd75, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:43 executing program 6: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9}, 0x3d1) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000028000)={r1, &(0x7f0000000200), &(0x7f0000000240)="13"}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r1, &(0x7f0000000040)}, 0x10) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) 2018/04/05 21:37:43 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8cffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 385.932696] RDX: 00000000200002c0 RSI: 0000000020000140 RDI: 0000000020000300 [ 385.939953] RBP: 000000000072bea0 R08: 0000000020001280 R09: 0000000000000000 [ 385.947207] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 385.954464] R13: 00000000000003fa R14: 00000000006f9010 R15: 0000000000000006 2018/04/05 21:37:43 executing program 5 (fault-call:3 fault-nth:5): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000001380)='./file0\x00', &(0x7f0000001340)='proc\x00', 0x0, &(0x7f0000000240)) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000001280)) [ 386.149754] FAULT_INJECTION: forcing a failure. [ 386.149754] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 386.161605] CPU: 1 PID: 3608 Comm: syz-executor5 Not tainted 4.16.0+ #1 [ 386.168368] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 386.177722] Call Trace: [ 386.180321] dump_stack+0x1b9/0x29f [ 386.183968] ? arch_local_irq_restore+0x52/0x52 [ 386.188650] ? debug_check_no_locks_freed+0x310/0x310 [ 386.193857] should_fail.cold.4+0xa/0x1a [ 386.197933] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 386.203052] ? debug_check_no_locks_freed+0x310/0x310 [ 386.208250] ? perf_trace_lock+0x900/0x900 [ 386.212490] ? print_usage_bug+0xc0/0xc0 [ 386.216565] ? graph_lock+0x170/0x170 [ 386.220374] ? perf_trace_lock_acquire+0xe3/0x980 [ 386.225229] ? print_usage_bug+0xc0/0xc0 [ 386.229293] ? perf_trace_lock+0xd6/0x900 [ 386.233423] ? perf_trace_lock_acquire+0xe3/0x980 [ 386.238244] ? find_held_lock+0x36/0x1c0 [ 386.242335] ? zap_class+0x720/0x720 [ 386.246041] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 386.251563] ? should_fail+0x21b/0xbcd [ 386.255438] __alloc_pages_nodemask+0x34e/0xd70 [ 386.260090] ? __alloc_pages_slowpath+0x2dc0/0x2dc0 [ 386.265094] ? find_held_lock+0x36/0x1c0 [ 386.269153] ? check_same_owner+0x320/0x320 [ 386.273461] cache_grow_begin+0x72/0x6c0 [ 386.277506] kmem_cache_alloc+0x689/0x760 [ 386.281634] ? find_held_lock+0x36/0x1c0 [ 386.285685] getname_flags+0xd0/0x5a0 [ 386.289468] user_path_at_empty+0x2d/0x50 [ 386.293596] do_mount+0x172/0x3070 [ 386.297117] ? do_raw_spin_unlock+0x9e/0x2e0 [ 386.301510] ? copy_mount_string+0x40/0x40 [ 386.305737] ? rcu_pm_notify+0xc0/0xc0 [ 386.309610] ? copy_mount_options+0x5f/0x380 [ 386.313997] ? rcu_read_lock_sched_held+0x108/0x120 [ 386.319007] ? kmem_cache_alloc_trace+0x616/0x780 [ 386.323841] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 386.329361] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 386.334877] ? copy_mount_options+0x285/0x380 [ 386.339356] ksys_mount+0x12d/0x140 [ 386.342962] SyS_mount+0x35/0x50 [ 386.346309] ? ksys_mount+0x140/0x140 [ 386.350097] do_syscall_64+0x29e/0x9d0 [ 386.353965] ? vmalloc_sync_all+0x30/0x30 [ 386.358094] ? _raw_spin_unlock_irq+0x27/0x70 [ 386.362568] ? finish_task_switch+0x1ca/0x820 [ 386.367044] ? syscall_return_slowpath+0x5c0/0x5c0 [ 386.371953] ? syscall_return_slowpath+0x30f/0x5c0 [ 386.376866] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 386.382211] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 386.387043] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 386.392209] RIP: 0033:0x4552d9 [ 386.395375] RSP: 002b:00007f4cbd4aec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 386.403063] RAX: ffffffffffffffda RBX: 00007f4cbd4af6d4 RCX: 00000000004552d9 [ 386.410309] RDX: 00000000200002c0 RSI: 0000000020000140 RDI: 0000000020000300 [ 386.417558] RBP: 000000000072bea0 R08: 0000000020001280 R09: 0000000000000000 [ 386.424806] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 386.432054] R13: 00000000000003fa R14: 00000000006f9010 R15: 0000000000000005 2018/04/05 21:37:44 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:44 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:44 executing program 6: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x9, 0x3, 0x7fffffff, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9, 0x4, r1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000028000)={r2, &(0x7f0000000200), &(0x7f0000000240)="13"}, 0x20) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x83) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r2, &(0x7f0000000040)}, 0x10) 2018/04/05 21:37:44 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xec0, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:44 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0x689, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:44 executing program 4 (fault-call:3 fault-nth:7): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000001380)='./file0\x00', &(0x7f0000001340)='proc\x00', 0x0, &(0x7f0000000240)) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000001280)) 2018/04/05 21:37:44 executing program 5 (fault-call:3 fault-nth:6): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000001380)='./file0\x00', &(0x7f0000001340)='proc\x00', 0x0, &(0x7f0000000240)) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000001280)) 2018/04/05 21:37:44 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000400008fe7bb5cd4e344cd0002800000720a00ff"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xf, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x2000000000000000}, [@jmp={0x5, 0x0, 0xffffffcd}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) [ 386.514158] FAULT_INJECTION: forcing a failure. [ 386.514158] name failslab, interval 1, probability 0, space 0, times 0 [ 386.525525] CPU: 0 PID: 3626 Comm: syz-executor4 Not tainted 4.16.0+ #1 [ 386.532292] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 386.541656] Call Trace: [ 386.544248] dump_stack+0x1b9/0x29f [ 386.547885] ? arch_local_irq_restore+0x52/0x52 [ 386.552566] should_fail.cold.4+0xa/0x1a [ 386.556627] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 386.561721] ? perf_trace_lock+0x495/0x900 [ 386.565958] ? perf_trace_lock_acquire+0xe3/0x980 [ 386.570796] ? zap_class+0x720/0x720 [ 386.574514] ? find_held_lock+0x36/0x1c0 [ 386.578596] ? check_same_owner+0x320/0x320 [ 386.582913] ? rcu_note_context_switch+0x710/0x710 [ 386.587844] should_failslab+0x124/0x180 [ 386.591914] __kmalloc_track_caller+0x2c4/0x760 [ 386.596580] ? kasan_check_read+0x11/0x20 [ 386.600719] ? do_raw_spin_unlock+0x9e/0x2e0 [ 386.605118] ? kstrdup_const+0x66/0x80 [ 386.609000] kstrdup+0x39/0x70 [ 386.612192] kstrdup_const+0x66/0x80 [ 386.615899] alloc_vfsmnt+0x1b3/0x9d0 [ 386.619691] ? mnt_free_id.isra.27+0x60/0x60 [ 386.624095] ? kasan_check_read+0x11/0x20 [ 386.628232] ? graph_lock+0x170/0x170 [ 386.632040] ? trace_hardirqs_off+0xd/0x10 [ 386.636269] ? putname+0xf2/0x130 [ 386.639720] ? putname+0xf2/0x130 [ 386.643171] ? find_held_lock+0x36/0x1c0 [ 386.647238] ? lock_downgrade+0x8e0/0x8e0 [ 386.651379] ? module_unload_free+0x5b0/0x5b0 [ 386.655865] ? lock_release+0xa10/0xa10 [ 386.659836] ? mpi_free.cold.1+0x19/0x19 [ 386.663886] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 386.669418] vfs_kern_mount.part.34+0x88/0x4d0 [ 386.673996] ? may_umount+0xb0/0xb0 [ 386.677617] ? _raw_read_unlock+0x22/0x30 [ 386.681756] ? __get_fs_type+0x97/0xc0 [ 386.685643] do_mount+0x564/0x3070 [ 386.689183] ? copy_mount_string+0x40/0x40 [ 386.693408] ? rcu_pm_notify+0xc0/0xc0 [ 386.697299] ? copy_mount_options+0x5f/0x380 [ 386.701698] ? rcu_read_lock_sched_held+0x108/0x120 [ 386.706706] ? kmem_cache_alloc_trace+0x616/0x780 [ 386.711545] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 386.717076] ? _copy_from_user+0xdf/0x150 [ 386.721219] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 386.726750] ? copy_mount_options+0x285/0x380 [ 386.731244] ksys_mount+0x12d/0x140 [ 386.734865] SyS_mount+0x35/0x50 [ 386.738219] ? ksys_mount+0x140/0x140 [ 386.742017] do_syscall_64+0x29e/0x9d0 [ 386.745897] ? vmalloc_sync_all+0x30/0x30 [ 386.750043] ? _raw_spin_unlock_irq+0x27/0x70 [ 386.754529] ? finish_task_switch+0x1ca/0x820 [ 386.759760] ? syscall_return_slowpath+0x5c0/0x5c0 [ 386.764687] ? syscall_return_slowpath+0x30f/0x5c0 [ 386.769613] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 386.774972] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 386.779816] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 386.784993] RIP: 0033:0x4552d9 [ 386.788173] RSP: 002b:00007f20eb785c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 386.795875] RAX: ffffffffffffffda RBX: 00007f20eb7866d4 RCX: 00000000004552d9 [ 386.803132] RDX: 00000000200002c0 RSI: 0000000020000140 RDI: 0000000020000300 2018/04/05 21:37:44 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 386.810388] RBP: 000000000072bea0 R08: 0000000020001280 R09: 0000000000000000 [ 386.817642] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 386.824900] R13: 00000000000003fa R14: 00000000006f9010 R15: 0000000000000007 2018/04/05 21:37:44 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xb53, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:44 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000400008fe7bb5cd4e344cd0002800000720a00ff"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xf, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x400000000000000}, [@jmp={0x5, 0x0, 0xffffffcd}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) 2018/04/05 21:37:44 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0x7db, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:44 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 386.926173] FAULT_INJECTION: forcing a failure. [ 386.926173] name failslab, interval 1, probability 0, space 0, times 0 [ 386.937525] CPU: 0 PID: 3638 Comm: syz-executor5 Not tainted 4.16.0+ #1 [ 386.944294] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 386.953663] Call Trace: [ 386.956280] dump_stack+0x1b9/0x29f [ 386.959938] ? arch_local_irq_restore+0x52/0x52 [ 386.964650] should_fail.cold.4+0xa/0x1a [ 386.968733] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 386.974304] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 386.979432] ? perf_swevent_event+0x158/0x2e0 [ 386.983956] ? graph_lock+0x170/0x170 [ 386.987776] ? perf_tp_event+0x91f/0xc30 [ 386.991853] ? perf_swevent_event+0x2e0/0x2e0 [ 386.996378] ? find_held_lock+0x36/0x1c0 [ 387.000472] ? __lock_is_held+0xb5/0x140 [ 387.004593] ? check_same_owner+0x320/0x320 [ 387.008935] ? tracing_generic_entry_update+0x18e/0x200 [ 387.014326] ? rcu_note_context_switch+0x710/0x710 [ 387.019376] should_failslab+0x124/0x180 [ 387.023462] kmem_cache_alloc+0x2af/0x760 [ 387.027647] __d_alloc+0xc1/0xc00 [ 387.031112] ? shrink_dcache_for_umount+0x290/0x290 [ 387.036139] ? perf_trace_lock+0x495/0x900 [ 387.040387] ? debug_check_no_locks_freed+0x310/0x310 [ 387.045572] ? __lock_acquire+0x7f5/0x5130 [ 387.049797] ? perf_trace_lock+0x900/0x900 [ 387.054045] ? perf_trace_run_bpf_submit+0x23f/0x370 [ 387.059153] d_alloc+0x8e/0x370 [ 387.062420] ? perf_tp_event+0xc30/0xc30 [ 387.066472] ? __d_alloc+0xc00/0xc00 [ 387.070172] ? perf_trace_run_bpf_submit+0x246/0x370 [ 387.075265] ? find_held_lock+0x36/0x1c0 [ 387.079329] d_alloc_parallel+0x152/0x1e80 [ 387.083554] ? perf_trace_lock+0x495/0x900 [ 387.087781] ? memset+0x31/0x40 [ 387.091065] ? __d_lookup_rcu+0xa80/0xa80 [ 387.095206] ? zap_class+0x720/0x720 [ 387.098923] ? lock_acquire+0x1dc/0x520 [ 387.102885] ? lookup_slow+0x18c/0x570 [ 387.106772] ? lock_release+0xa10/0xa10 [ 387.110743] ? rcu_note_context_switch+0x710/0x710 [ 387.115671] ? __might_sleep+0x95/0x190 [ 387.119643] ? down_read+0xaf/0x1b0 [ 387.123261] ? lookup_slow+0x18c/0x570 [ 387.127145] ? __down_interruptible+0x6e0/0x6e0 [ 387.131808] ? __init_waitqueue_head+0x96/0x140 [ 387.136467] ? init_wait_entry+0x1b0/0x1b0 [ 387.140697] ? rcu_is_watching+0x85/0x140 [ 387.144843] lookup_slow+0x1fe/0x570 [ 387.148549] ? vfs_unlink+0x510/0x510 [ 387.152346] ? lookup_fast+0x468/0x1290 [ 387.156326] ? path_init+0x1713/0x2320 [ 387.160214] walk_component+0x8f5/0x2550 [ 387.164270] ? inode_permission+0xb2/0x560 [ 387.168493] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 387.173679] ? path_init+0x2320/0x2320 [ 387.177573] ? walk_component+0x2550/0x2550 [ 387.181886] ? __save_stack_trace+0x7e/0xd0 [ 387.186212] ? save_stack+0xa9/0xd0 [ 387.189831] ? kasan_slab_alloc+0x12/0x20 [ 387.193966] ? kmem_cache_alloc+0x12e/0x760 [ 387.198275] ? getname_flags+0xd0/0x5a0 [ 387.202237] ? user_path_at_empty+0x2d/0x50 [ 387.206549] ? do_mount+0x172/0x3070 [ 387.210260] path_lookupat.isra.44+0x1f6/0xbd0 [ 387.214833] ? find_held_lock+0x36/0x1c0 [ 387.218890] ? path_parentat.isra.41+0x160/0x160 [ 387.223635] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 387.228818] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 387.233823] ? __check_object_size+0x95/0x5d9 [ 387.238315] ? usercopy_warn+0x120/0x120 [ 387.242368] ? kasan_check_read+0x11/0x20 [ 387.246505] ? do_raw_spin_unlock+0x9e/0x2e0 [ 387.250912] filename_lookup+0x258/0x4f0 [ 387.254968] ? filename_parentat.isra.56+0x540/0x540 [ 387.260087] ? mpi_free.cold.1+0x19/0x19 [ 387.264148] ? find_held_lock+0x36/0x1c0 [ 387.268207] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 387.273733] ? getname_flags+0x26e/0x5a0 [ 387.277795] user_path_at_empty+0x40/0x50 [ 387.281938] do_mount+0x172/0x3070 [ 387.285465] ? do_raw_spin_unlock+0x9e/0x2e0 [ 387.289869] ? copy_mount_string+0x40/0x40 [ 387.294093] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 387.299100] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 387.303854] ? retint_kernel+0x10/0x10 [ 387.307748] ? copy_mount_options+0x1a1/0x380 [ 387.312233] ? copy_mount_options+0x1cc/0x380 [ 387.316719] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 387.322246] ? copy_mount_options+0x285/0x380 [ 387.326747] ksys_mount+0x12d/0x140 [ 387.330367] SyS_mount+0x35/0x50 [ 387.333725] ? ksys_mount+0x140/0x140 [ 387.337521] do_syscall_64+0x29e/0x9d0 [ 387.341395] ? vmalloc_sync_all+0x30/0x30 [ 387.345530] ? _raw_spin_unlock_irq+0x27/0x70 [ 387.350034] ? finish_task_switch+0x1ca/0x820 [ 387.354870] ? syscall_return_slowpath+0x5c0/0x5c0 [ 387.359792] ? syscall_return_slowpath+0x30f/0x5c0 [ 387.364744] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 387.370104] ? trace_hardirqs_off_thunk+0x1a/0x1c 2018/04/05 21:37:45 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x80000000, 0x4, 0x100000000, 0x10, 0x1, 0x101}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={r0, 0x28, &(0x7f00000000c0)}, 0x10) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9}, 0x3d1) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r1, &(0x7f0000000040)}, 0x10) [ 387.374946] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 387.380122] RIP: 0033:0x4552d9 [ 387.383299] RSP: 002b:00007f4cbd4aec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 387.391000] RAX: ffffffffffffffda RBX: 00007f4cbd4af6d4 RCX: 00000000004552d9 [ 387.398265] RDX: 00000000200002c0 RSI: 0000000020000140 RDI: 0000000020000300 [ 387.405521] RBP: 000000000072bea0 R08: 0000000020001280 R09: 0000000000000000 [ 387.412780] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 387.420039] R13: 00000000000003fa R14: 00000000006f9010 R15: 0000000000000006 2018/04/05 21:37:45 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x100000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:45 executing program 4 (fault-call:3 fault-nth:8): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000001380)='./file0\x00', &(0x7f0000001340)='proc\x00', 0x0, &(0x7f0000000240)) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000001280)) 2018/04/05 21:37:45 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0x411, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:45 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xf39, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:45 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 387.572503] FAULT_INJECTION: forcing a failure. [ 387.572503] name failslab, interval 1, probability 0, space 0, times 0 [ 387.583855] CPU: 0 PID: 3660 Comm: syz-executor4 Not tainted 4.16.0+ #1 [ 387.590625] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 387.599995] Call Trace: [ 387.602604] dump_stack+0x1b9/0x29f [ 387.606256] ? arch_local_irq_restore+0x52/0x52 [ 387.610962] should_fail.cold.4+0xa/0x1a [ 387.615054] ? fault_create_debugfs_attr+0x1f0/0x1f0 2018/04/05 21:37:45 executing program 5 (fault-call:3 fault-nth:7): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000001380)='./file0\x00', &(0x7f0000001340)='proc\x00', 0x0, &(0x7f0000000240)) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000001280)) 2018/04/05 21:37:45 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 387.620171] ? perf_trace_lock+0x495/0x900 [ 387.624426] ? perf_trace_lock_acquire+0xe3/0x980 [ 387.629292] ? zap_class+0x720/0x720 [ 387.633030] ? find_held_lock+0x36/0x1c0 [ 387.637153] ? check_same_owner+0x320/0x320 [ 387.641497] ? rcu_note_context_switch+0x710/0x710 [ 387.646458] should_failslab+0x124/0x180 [ 387.650542] __kmalloc_track_caller+0x2c4/0x760 [ 387.655235] ? kasan_check_read+0x11/0x20 [ 387.659400] ? do_raw_spin_unlock+0x9e/0x2e0 [ 387.663827] ? kstrdup_const+0x66/0x80 [ 387.667742] kstrdup+0x39/0x70 [ 387.670955] kstrdup_const+0x66/0x80 [ 387.674690] alloc_vfsmnt+0x1b3/0x9d0 [ 387.678511] ? mnt_free_id.isra.27+0x60/0x60 [ 387.682939] ? kasan_check_read+0x11/0x20 [ 387.687098] ? graph_lock+0x170/0x170 [ 387.690924] ? trace_hardirqs_off+0xd/0x10 [ 387.695185] ? putname+0xf2/0x130 [ 387.698656] ? putname+0xf2/0x130 [ 387.702111] ? find_held_lock+0x36/0x1c0 [ 387.706177] ? lock_downgrade+0x8e0/0x8e0 [ 387.710314] ? module_unload_free+0x5b0/0x5b0 [ 387.714804] ? lock_release+0xa10/0xa10 [ 387.718774] ? mpi_free.cold.1+0x19/0x19 [ 387.722828] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 387.728361] vfs_kern_mount.part.34+0x88/0x4d0 [ 387.732941] ? may_umount+0xb0/0xb0 [ 387.736562] ? _raw_read_unlock+0x22/0x30 [ 387.740705] ? __get_fs_type+0x97/0xc0 [ 387.744590] do_mount+0x564/0x3070 [ 387.748128] ? copy_mount_string+0x40/0x40 [ 387.752354] ? rcu_pm_notify+0xc0/0xc0 [ 387.756242] ? copy_mount_options+0x5f/0x380 [ 387.760642] ? rcu_read_lock_sched_held+0x108/0x120 [ 387.765649] ? kmem_cache_alloc_trace+0x616/0x780 [ 387.770488] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 387.776025] ? _copy_from_user+0xdf/0x150 [ 387.780168] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 387.785701] ? copy_mount_options+0x285/0x380 [ 387.790195] ksys_mount+0x12d/0x140 [ 387.793818] SyS_mount+0x35/0x50 [ 387.797174] ? ksys_mount+0x140/0x140 [ 387.800972] do_syscall_64+0x29e/0x9d0 [ 387.804851] ? syscall_slow_exit_work+0x4f0/0x4f0 [ 387.809686] ? syscall_return_slowpath+0x5c0/0x5c0 [ 387.814612] ? syscall_return_slowpath+0x30f/0x5c0 [ 387.819537] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 387.824897] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 387.829742] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 387.834920] RIP: 0033:0x4552d9 [ 387.838096] RSP: 002b:00007f20eb785c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 387.845798] RAX: ffffffffffffffda RBX: 00007f20eb7866d4 RCX: 00000000004552d9 [ 387.853055] RDX: 00000000200002c0 RSI: 0000000020000140 RDI: 0000000020000300 [ 387.860314] RBP: 000000000072bea0 R08: 0000000020001280 R09: 0000000000000000 [ 387.867571] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 387.874831] R13: 00000000000003fa R14: 00000000006f9010 R15: 0000000000000008 [ 387.986439] FAULT_INJECTION: forcing a failure. [ 387.986439] name failslab, interval 1, probability 0, space 0, times 0 [ 387.997929] CPU: 0 PID: 3677 Comm: syz-executor5 Not tainted 4.16.0+ #1 [ 388.004714] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 388.014084] Call Trace: [ 388.016707] dump_stack+0x1b9/0x29f [ 388.020361] ? arch_local_irq_restore+0x52/0x52 [ 388.025068] should_fail.cold.4+0xa/0x1a [ 388.029157] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 388.034305] ? is_bpf_text_address+0xd7/0x170 [ 388.038834] ? find_held_lock+0x36/0x1c0 [ 388.042969] ? check_same_owner+0x320/0x320 [ 388.047316] ? kmem_cache_free+0x86/0x2d0 [ 388.051481] ? putname+0xf2/0x130 [ 388.054956] ? rcu_note_context_switch+0x710/0x710 [ 388.059904] ? ksys_mount+0x12d/0x140 [ 388.063724] ? SyS_mount+0x35/0x50 [ 388.067282] ? do_syscall_64+0x29e/0x9d0 [ 388.071370] should_failslab+0x124/0x180 [ 388.075442] kmem_cache_alloc+0x2af/0x760 [ 388.079584] ? perf_trace_lock_acquire+0xe3/0x980 [ 388.084423] alloc_vfsmnt+0xe0/0x9d0 [ 388.088127] ? mnt_free_id.isra.27+0x60/0x60 [ 388.092527] ? kasan_check_read+0x11/0x20 [ 388.096662] ? graph_lock+0x170/0x170 [ 388.100456] ? trace_hardirqs_off+0xd/0x10 [ 388.104697] ? putname+0xf2/0x130 [ 388.108152] ? putname+0xf2/0x130 [ 388.111596] ? find_held_lock+0x36/0x1c0 [ 388.115678] ? lock_downgrade+0x8e0/0x8e0 [ 388.119816] ? module_unload_free+0x5b0/0x5b0 [ 388.124305] ? lock_release+0xa10/0xa10 [ 388.128272] ? mpi_free.cold.1+0x19/0x19 [ 388.132320] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 388.137861] vfs_kern_mount.part.34+0x88/0x4d0 [ 388.142439] ? may_umount+0xb0/0xb0 [ 388.146065] ? _raw_read_unlock+0x22/0x30 [ 388.150203] ? __get_fs_type+0x97/0xc0 [ 388.154086] do_mount+0x564/0x3070 [ 388.157622] ? copy_mount_string+0x40/0x40 [ 388.161842] ? rcu_pm_notify+0xc0/0xc0 [ 388.165727] ? copy_mount_options+0x5f/0x380 [ 388.170121] ? rcu_read_lock_sched_held+0x108/0x120 [ 388.175125] ? kmem_cache_alloc_trace+0x616/0x780 [ 388.179958] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 388.185481] ? _copy_from_user+0xdf/0x150 [ 388.189618] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 388.195152] ? copy_mount_options+0x285/0x380 [ 388.199646] ksys_mount+0x12d/0x140 [ 388.203270] SyS_mount+0x35/0x50 [ 388.206623] ? ksys_mount+0x140/0x140 [ 388.210432] do_syscall_64+0x29e/0x9d0 [ 388.214312] ? syscall_slow_exit_work+0x4f0/0x4f0 [ 388.219155] ? syscall_return_slowpath+0x5c0/0x5c0 [ 388.224078] ? syscall_return_slowpath+0x30f/0x5c0 [ 388.229005] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 388.234370] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 388.239217] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 388.244390] RIP: 0033:0x4552d9 [ 388.247561] RSP: 002b:00007f4cbd4aec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 388.255256] RAX: ffffffffffffffda RBX: 00007f4cbd4af6d4 RCX: 00000000004552d9 [ 388.262509] RDX: 00000000200002c0 RSI: 0000000020000140 RDI: 0000000020000300 [ 388.269762] RBP: 000000000072bea0 R08: 0000000020001280 R09: 0000000000000000 [ 388.277033] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 2018/04/05 21:37:46 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x2000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:46 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff8c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:46 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)={0xffffffffffffff9c}) sendmsg$kcm(r0, &(0x7f00000016c0)={&(0x7f00000000c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, r1, 0x2, 0x4, 0x2, 0x2, {0xa, 0x4e23, 0x9, @mcast1={0xff, 0x1, [], 0x1}, 0x800}}}, 0xfffffffffffffcf0, &(0x7f0000001540), 0x0, &(0x7f0000001940)=ANY=[@ANYBLOB="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"], 0x191, 0x4000040}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9}, 0x3d1) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000028000)={r2, &(0x7f0000000040), &(0x7f0000000180)="6d95fdec540dfebf888575769fb9f6ac8aa2fb3e62b18899124989fa445f40823add210bbdf8a5fc8ef633dd2b696907180700000000000000f9268ac952db1c91826eac22166e38e3605a479466dda7a547ecde0def82689c8a9903a04b7ae6c310ce46b87ef894feffc0273f2c91d28970359ce42f41d4f8cfdbbfdebb2dbe54ac9e"}, 0x3ca) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r2, &(0x7f0000000040)}, 0x10) 2018/04/05 21:37:46 executing program 4 (fault-call:3 fault-nth:9): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000001380)='./file0\x00', &(0x7f0000001340)='proc\x00', 0x0, &(0x7f0000000240)) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000001280)) 2018/04/05 21:37:46 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xa18, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:46 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0x99c, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:46 executing program 5 (fault-call:3 fault-nth:8): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000001380)='./file0\x00', &(0x7f0000001340)='proc\x00', 0x0, &(0x7f0000000240)) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000001280)) 2018/04/05 21:37:46 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000400008fe7bb5cd4e344cd0002800000720a00ff"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xf, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x1810}, [@jmp={0x5, 0x0, 0xffffffcd}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) [ 388.284296] R13: 00000000000003fa R14: 00000000006f9010 R15: 0000000000000007 [ 388.344795] FAULT_INJECTION: forcing a failure. [ 388.344795] name failslab, interval 1, probability 0, space 0, times 0 [ 388.356100] CPU: 1 PID: 3694 Comm: syz-executor4 Not tainted 4.16.0+ #1 [ 388.362867] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 388.372228] Call Trace: [ 388.374838] dump_stack+0x1b9/0x29f [ 388.378490] ? arch_local_irq_restore+0x52/0x52 [ 388.383205] should_fail.cold.4+0xa/0x1a [ 388.387292] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 388.392434] ? perf_trace_lock+0x900/0x900 [ 388.396709] ? find_held_lock+0x36/0x1c0 [ 388.400832] ? check_same_owner+0x320/0x320 [ 388.405184] ? rcu_note_context_switch+0x710/0x710 [ 388.410134] should_failslab+0x124/0x180 [ 388.414197] kmem_cache_alloc_trace+0x2cb/0x780 [ 388.418864] ? kasan_check_write+0x14/0x20 [ 388.423090] ? do_raw_spin_lock+0xc1/0x200 [ 388.427326] sget_userns+0x1c7/0xf20 [ 388.431034] ? set_anon_super+0x20/0x20 [ 388.435007] ? get_empty_filp.cold.7+0x3e/0x3e [ 388.439589] ? destroy_unused_super.part.9+0x100/0x100 [ 388.444863] ? __alloc_pages_slowpath+0x2dc0/0x2dc0 [ 388.449876] ? kasan_check_read+0x11/0x20 [ 388.454028] ? trace_hardirqs_off+0xd/0x10 [ 388.458253] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 388.463779] ? cap_capable+0x1f9/0x260 [ 388.467666] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 388.473192] ? security_capable+0xa4/0xd0 [ 388.477332] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 388.482857] ? ns_capable_common+0x13f/0x170 [ 388.487263] mount_ns+0x8f/0x1d0 [ 388.490619] ? rpc_pipe_release+0xb70/0xb70 [ 388.494937] rpc_mount+0x9e/0xd0 [ 388.498297] mount_fs+0xae/0x328 [ 388.501661] vfs_kern_mount.part.34+0xd4/0x4d0 [ 388.506235] ? may_umount+0xb0/0xb0 [ 388.509852] ? _raw_read_unlock+0x22/0x30 [ 388.513987] ? __get_fs_type+0x97/0xc0 [ 388.517876] do_mount+0x564/0x3070 [ 388.521413] ? copy_mount_string+0x40/0x40 [ 388.525637] ? rcu_pm_notify+0xc0/0xc0 [ 388.529525] ? copy_mount_options+0x5f/0x380 [ 388.533924] ? rcu_read_lock_sched_held+0x108/0x120 [ 388.538931] ? kmem_cache_alloc_trace+0x616/0x780 [ 388.543768] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 388.549293] ? _copy_from_user+0xdf/0x150 [ 388.553436] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 388.558963] ? copy_mount_options+0x285/0x380 [ 388.563456] ksys_mount+0x12d/0x140 [ 388.567075] SyS_mount+0x35/0x50 [ 388.570428] ? ksys_mount+0x140/0x140 [ 388.574220] do_syscall_64+0x29e/0x9d0 [ 388.578097] ? vmalloc_sync_all+0x30/0x30 [ 388.582232] ? _raw_spin_unlock_irq+0x27/0x70 [ 388.586716] ? finish_task_switch+0x1ca/0x820 [ 388.591607] ? syscall_return_slowpath+0x5c0/0x5c0 [ 388.596527] ? syscall_return_slowpath+0x30f/0x5c0 [ 388.601453] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 388.606811] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 388.611652] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 388.616828] RIP: 0033:0x4552d9 [ 388.620002] RSP: 002b:00007f20eb785c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 388.627713] RAX: ffffffffffffffda RBX: 00007f20eb7866d4 RCX: 00000000004552d9 [ 388.634971] RDX: 00000000200002c0 RSI: 0000000020000140 RDI: 0000000020000300 2018/04/05 21:37:46 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:46 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000400008fe7bb5cd4e344cd0002800000720a00ff"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xf, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x2000}, [@jmp={0x5, 0x0, 0xffffffcd}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) [ 388.642228] RBP: 000000000072bea0 R08: 0000000020001280 R09: 0000000000000000 [ 388.649483] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 388.656737] R13: 00000000000003fa R14: 00000000006f9010 R15: 0000000000000009 [ 388.700599] FAULT_INJECTION: forcing a failure. [ 388.700599] name failslab, interval 1, probability 0, space 0, times 0 [ 388.711952] CPU: 1 PID: 3703 Comm: syz-executor5 Not tainted 4.16.0+ #1 [ 388.718705] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 388.728059] Call Trace: [ 388.730660] dump_stack+0x1b9/0x29f [ 388.734301] ? arch_local_irq_restore+0x52/0x52 [ 388.738997] should_fail.cold.4+0xa/0x1a [ 388.743071] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 388.748185] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 388.753394] ? is_bpf_text_address+0xd7/0x170 [ 388.757904] ? find_held_lock+0x36/0x1c0 [ 388.762001] ? check_same_owner+0x320/0x320 [ 388.766328] ? kasan_slab_free+0xe/0x10 [ 388.770308] ? kmem_cache_free+0x86/0x2d0 [ 388.774459] ? putname+0xf2/0x130 [ 388.777918] ? rcu_note_context_switch+0x710/0x710 [ 388.782855] ? ksys_mount+0x12d/0x140 [ 388.786659] ? SyS_mount+0x35/0x50 [ 388.790206] ? do_syscall_64+0x29e/0x9d0 [ 388.794278] should_failslab+0x124/0x180 [ 388.798340] kmem_cache_alloc+0x2af/0x760 [ 388.802474] ? perf_trace_lock+0xd6/0x900 [ 388.806621] ? perf_trace_lock_acquire+0xe3/0x980 [ 388.811455] alloc_vfsmnt+0xe0/0x9d0 [ 388.815154] ? mnt_free_id.isra.27+0x60/0x60 [ 388.819550] ? kasan_check_read+0x11/0x20 [ 388.823682] ? graph_lock+0x170/0x170 [ 388.827467] ? rcu_pm_notify+0xc0/0xc0 [ 388.831335] ? trace_hardirqs_off+0xd/0x10 [ 388.835558] ? putname+0xf2/0x130 [ 388.838998] ? putname+0xf2/0x130 [ 388.842443] ? find_held_lock+0x36/0x1c0 [ 388.846499] ? lock_downgrade+0x8e0/0x8e0 [ 388.850634] ? module_unload_free+0x5b0/0x5b0 [ 388.855120] ? lock_release+0xa10/0xa10 [ 388.859082] ? mpi_free.cold.1+0x19/0x19 [ 388.863129] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 388.868656] vfs_kern_mount.part.34+0x88/0x4d0 [ 388.873222] ? may_umount+0xb0/0xb0 [ 388.876837] ? _raw_read_unlock+0x22/0x30 [ 388.880967] ? __get_fs_type+0x97/0xc0 [ 388.884844] do_mount+0x564/0x3070 [ 388.888369] ? do_raw_spin_unlock+0x9e/0x2e0 [ 388.892764] ? copy_mount_string+0x40/0x40 [ 388.896984] ? rcu_pm_notify+0xc0/0xc0 [ 388.900864] ? copy_mount_options+0x5f/0x380 [ 388.905255] ? rcu_read_lock_sched_held+0x108/0x120 [ 388.910256] ? kmem_cache_alloc_trace+0x616/0x780 [ 388.915082] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 388.920610] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 388.926130] ? copy_mount_options+0x285/0x380 [ 388.930634] ksys_mount+0x12d/0x140 [ 388.934246] SyS_mount+0x35/0x50 [ 388.937595] ? ksys_mount+0x140/0x140 [ 388.941384] do_syscall_64+0x29e/0x9d0 [ 388.945252] ? vmalloc_sync_all+0x30/0x30 [ 388.949386] ? _raw_spin_unlock_irq+0x27/0x70 [ 388.953863] ? finish_task_switch+0x1ca/0x820 [ 388.958342] ? syscall_return_slowpath+0x5c0/0x5c0 [ 388.963255] ? syscall_return_slowpath+0x30f/0x5c0 [ 388.968171] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 388.973520] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 388.978353] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 388.983526] RIP: 0033:0x4552d9 [ 388.986699] RSP: 002b:00007f4cbd4aec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 388.994390] RAX: ffffffffffffffda RBX: 00007f4cbd4af6d4 RCX: 00000000004552d9 2018/04/05 21:37:46 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x200000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:46 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xfaa, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:46 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0xf6ffffff00000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 389.001643] RDX: 00000000200002c0 RSI: 0000000020000140 RDI: 0000000020000300 [ 389.008897] RBP: 000000000072bea0 R08: 0000000020001280 R09: 0000000000000000 [ 389.016151] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 389.023404] R13: 00000000000003fa R14: 00000000006f9010 R15: 0000000000000008 2018/04/05 21:37:46 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xe6b, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:46 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:46 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9}, 0xffffffffffffff3e) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000028000)={r0, &(0x7f0000000200), &(0x7f0000000240)="13"}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r0, &(0x7f0000000040)}, 0x10) 2018/04/05 21:37:46 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:47 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xc36, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:47 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0x513, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:47 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0xf6ffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:47 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000400008fe7bb5cd4e344cd0002800000720a00ff"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xf, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x9d2}, [@jmp={0x5, 0x0, 0xffffffcd}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) 2018/04/05 21:37:47 executing program 6: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9}, 0x3d1) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000028000)={r1, &(0x7f0000000200), &(0x7f0000000240)="13"}, 0x20) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x6ff92f29) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r1, &(0x7f0000000040)}, 0x10) 2018/04/05 21:37:47 executing program 4 (fault-call:3 fault-nth:10): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000001380)='./file0\x00', &(0x7f0000001340)='proc\x00', 0x0, &(0x7f0000000240)) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000001280)) 2018/04/05 21:37:47 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:47 executing program 5 (fault-call:3 fault-nth:9): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000001380)='./file0\x00', &(0x7f0000001340)='proc\x00', 0x0, &(0x7f0000000240)) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000001280)) 2018/04/05 21:37:47 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0x33d, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) [ 389.383008] FAULT_INJECTION: forcing a failure. [ 389.383008] name failslab, interval 1, probability 0, space 0, times 0 [ 389.394772] CPU: 0 PID: 3752 Comm: syz-executor5 Not tainted 4.16.0+ #1 [ 389.401541] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 389.410913] Call Trace: [ 389.413523] dump_stack+0x1b9/0x29f [ 389.417171] ? arch_local_irq_restore+0x52/0x52 [ 389.421878] should_fail.cold.4+0xa/0x1a [ 389.425957] ? graph_lock+0x170/0x170 2018/04/05 21:37:47 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000400008fe7bb5cd4e344cd0002800000720a00ff"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xf, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x4}, [@jmp={0x5, 0x0, 0xffffffcd}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) [ 389.429780] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 389.434898] ? lock_downgrade+0x8e0/0x8e0 [ 389.439062] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 389.444615] ? find_next_zero_bit+0x111/0x140 [ 389.449132] ? graph_lock+0x170/0x170 [ 389.452969] ? find_held_lock+0x36/0x1c0 [ 389.457062] ? __lock_is_held+0xb5/0x140 [ 389.461169] ? check_same_owner+0x320/0x320 [ 389.465510] ? __might_sleep+0x95/0x190 [ 389.469501] ? rcu_note_context_switch+0x710/0x710 [ 389.474466] should_failslab+0x124/0x180 [ 389.478551] __kmalloc+0x2c8/0x760 2018/04/05 21:37:47 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000400008fe7bb5cd4e344cd0002800000720a00ff"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xf, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x74000000}, [@jmp={0x5, 0x0, 0xffffffcd}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) [ 389.482124] ? lockdep_init_map+0x9/0x10 [ 389.486203] ? debug_mutex_init+0x2d/0x60 [ 389.490370] ? __list_lru_init+0xcf/0x7b0 [ 389.494541] __list_lru_init+0xcf/0x7b0 [ 389.498544] ? list_lru_destroy+0x4c0/0x4c0 [ 389.502882] ? __raw_spin_lock_init+0x1c/0x100 [ 389.507486] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 389.512521] ? __lockdep_init_map+0x105/0x590 [ 389.517042] ? lockdep_init_map+0x9/0x10 [ 389.521125] sget_userns+0x6d9/0xf20 [ 389.524855] ? set_anon_super+0x20/0x20 [ 389.528855] ? get_empty_filp.cold.7+0x3e/0x3e 2018/04/05 21:37:47 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0xffffffff00000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:47 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:47 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9}, 0x3d1) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000040)="24b7", &(0x7f00000000c0)="135d46a67e3201f69d2a1655f3eacc60354b8cd38d14401a83a79c8bb15a92da9108ee8e4956a1c23deb82e5bb53786f5fd175bc939de25803ddaf085638ebfb5726e532379a9aa7aeac9827132b47aff894ce97565d71df3d378d7ae0994d0f0a39c9c7efbf87fc3b45c6", 0x1}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000028000)={r0, &(0x7f0000000200), &(0x7f0000000240)="13"}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r0, &(0x7f0000000040)}, 0x10) [ 389.533458] ? destroy_unused_super.part.9+0x100/0x100 [ 389.538764] ? __alloc_pages_slowpath+0x2dc0/0x2dc0 [ 389.543807] ? kasan_check_read+0x11/0x20 [ 389.547982] ? trace_hardirqs_off+0xd/0x10 [ 389.552233] ? cap_capable+0x1f9/0x260 [ 389.556149] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 389.561702] ? security_capable+0xa4/0xd0 [ 389.565872] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 389.571425] ? ns_capable_common+0x13f/0x170 [ 389.575862] mount_ns+0x8f/0x1d0 [ 389.579246] ? rpc_pipe_release+0xb70/0xb70 [ 389.583592] rpc_mount+0x9e/0xd0 [ 389.586981] mount_fs+0xae/0x328 [ 389.590376] vfs_kern_mount.part.34+0xd4/0x4d0 [ 389.594982] ? may_umount+0xb0/0xb0 [ 389.598625] ? _raw_read_unlock+0x22/0x30 [ 389.602791] ? __get_fs_type+0x97/0xc0 [ 389.606710] do_mount+0x564/0x3070 [ 389.610278] ? copy_mount_string+0x40/0x40 [ 389.614531] ? rcu_pm_notify+0xc0/0xc0 [ 389.618456] ? copy_mount_options+0x5f/0x380 [ 389.622883] ? rcu_read_lock_sched_held+0x108/0x120 [ 389.627918] ? kmem_cache_alloc_trace+0x616/0x780 [ 389.632781] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 389.638336] ? _copy_from_user+0xdf/0x150 [ 389.642508] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 389.648077] ? copy_mount_options+0x285/0x380 [ 389.652603] ksys_mount+0x12d/0x140 [ 389.656250] SyS_mount+0x35/0x50 [ 389.659629] ? ksys_mount+0x140/0x140 [ 389.663447] do_syscall_64+0x29e/0x9d0 [ 389.667346] ? vmalloc_sync_all+0x30/0x30 [ 389.671506] ? finish_task_switch+0x1ca/0x820 [ 389.676025] ? syscall_return_slowpath+0x5c0/0x5c0 [ 389.680975] ? syscall_return_slowpath+0x30f/0x5c0 [ 389.685935] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 389.691327] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 389.696187] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 389.701365] RIP: 0033:0x4552d9 [ 389.704547] RSP: 002b:00007f4cbd4aec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 389.712252] RAX: ffffffffffffffda RBX: 00007f4cbd4af6d4 RCX: 00000000004552d9 [ 389.719515] RDX: 00000000200002c0 RSI: 0000000020000140 RDI: 0000000020000300 [ 389.726778] RBP: 000000000072bea0 R08: 0000000020001280 R09: 0000000000000000 [ 389.734042] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 389.741299] R13: 00000000000003fa R14: 00000000006f9010 R15: 0000000000000009 [ 389.753816] FAULT_INJECTION: forcing a failure. [ 389.753816] name failslab, interval 1, probability 0, space 0, times 0 [ 389.765086] CPU: 0 PID: 3751 Comm: syz-executor4 Not tainted 4.16.0+ #1 [ 389.771845] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 389.781207] Call Trace: [ 389.783814] dump_stack+0x1b9/0x29f [ 389.787464] ? arch_local_irq_restore+0x52/0x52 [ 389.792173] should_fail.cold.4+0xa/0x1a [ 389.796252] ? graph_lock+0x170/0x170 [ 389.800075] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 389.805196] ? lock_downgrade+0x8e0/0x8e0 [ 389.809362] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 389.814917] ? find_next_zero_bit+0x111/0x140 [ 389.819433] ? graph_lock+0x170/0x170 [ 389.823267] ? find_held_lock+0x36/0x1c0 [ 389.827366] ? __lock_is_held+0xb5/0x140 [ 389.831471] ? check_same_owner+0x320/0x320 [ 389.835812] ? __might_sleep+0x95/0x190 [ 389.839804] ? rcu_note_context_switch+0x710/0x710 [ 389.844769] should_failslab+0x124/0x180 [ 389.848853] __kmalloc+0x2c8/0x760 [ 389.852422] ? lockdep_init_map+0x9/0x10 [ 389.856489] ? debug_mutex_init+0x2d/0x60 [ 389.860637] ? __list_lru_init+0xcf/0x7b0 [ 389.864794] __list_lru_init+0xcf/0x7b0 [ 389.868768] ? list_lru_destroy+0x4c0/0x4c0 [ 389.873076] ? __raw_spin_lock_init+0x1c/0x100 [ 389.877652] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 389.882659] ? __lockdep_init_map+0x105/0x590 [ 389.887151] ? lockdep_init_map+0x9/0x10 [ 389.891207] sget_userns+0x6d9/0xf20 [ 389.894910] ? set_anon_super+0x20/0x20 [ 389.898880] ? get_empty_filp.cold.7+0x3e/0x3e [ 389.903454] ? destroy_unused_super.part.9+0x100/0x100 [ 389.908732] ? __alloc_pages_slowpath+0x2dc0/0x2dc0 [ 389.913744] ? kasan_check_read+0x11/0x20 [ 389.917893] ? trace_hardirqs_off+0xd/0x10 [ 389.922120] ? cap_capable+0x1f9/0x260 [ 389.926007] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 389.931546] ? security_capable+0xa4/0xd0 [ 389.935687] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 389.941220] ? ns_capable_common+0x13f/0x170 [ 389.945624] mount_ns+0x8f/0x1d0 [ 389.948980] ? rpc_pipe_release+0xb70/0xb70 [ 389.953296] rpc_mount+0x9e/0xd0 [ 389.956655] mount_fs+0xae/0x328 [ 389.960025] vfs_kern_mount.part.34+0xd4/0x4d0 [ 389.964604] ? may_umount+0xb0/0xb0 [ 389.968219] ? _raw_read_unlock+0x22/0x30 [ 389.972356] ? __get_fs_type+0x97/0xc0 [ 389.976241] do_mount+0x564/0x3070 [ 389.979779] ? copy_mount_string+0x40/0x40 [ 389.984012] ? rcu_pm_notify+0xc0/0xc0 [ 389.987906] ? copy_mount_options+0x5f/0x380 [ 389.992304] ? rcu_read_lock_sched_held+0x108/0x120 [ 389.997310] ? kmem_cache_alloc_trace+0x616/0x780 [ 390.002149] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 390.007677] ? _copy_from_user+0xdf/0x150 [ 390.011821] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 390.017346] ? copy_mount_options+0x285/0x380 [ 390.021837] ksys_mount+0x12d/0x140 [ 390.025476] SyS_mount+0x35/0x50 [ 390.028833] ? ksys_mount+0x140/0x140 [ 390.032625] do_syscall_64+0x29e/0x9d0 [ 390.036502] ? vmalloc_sync_all+0x30/0x30 [ 390.040645] ? kasan_check_write+0x14/0x20 [ 390.044871] ? syscall_return_slowpath+0x5c0/0x5c0 [ 390.049790] ? syscall_return_slowpath+0x30f/0x5c0 [ 390.054716] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 390.060077] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 390.064916] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 390.070094] RIP: 0033:0x4552d9 [ 390.073271] RSP: 002b:00007f20eb785c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 390.080971] RAX: ffffffffffffffda RBX: 00007f20eb7866d4 RCX: 00000000004552d9 [ 390.088228] RDX: 00000000200002c0 RSI: 0000000020000140 RDI: 0000000020000300 [ 390.095486] RBP: 000000000072bea0 R08: 0000000020001280 R09: 0000000000000000 [ 390.102749] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 390.110007] R13: 00000000000003fa R14: 00000000006f9010 R15: 000000000000000a 2018/04/05 21:37:48 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0x409, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:48 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8cffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:48 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9}, 0x3d1) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000028000)={r0, &(0x7f0000000200), &(0x7f0000000240)="13"}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r0, &(0x7f0000000040)}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={&(0x7f0000000100)='./file0\x00', r0}, 0x10) 2018/04/05 21:37:48 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:48 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0x1f9, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:48 executing program 5 (fault-call:3 fault-nth:10): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000001380)='./file0\x00', &(0x7f0000001340)='proc\x00', 0x0, &(0x7f0000000240)) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000001280)) 2018/04/05 21:37:48 executing program 4 (fault-call:3 fault-nth:11): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000001380)='./file0\x00', &(0x7f0000001340)='proc\x00', 0x0, &(0x7f0000000240)) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000001280)) 2018/04/05 21:37:48 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000400008fe7bb5cd4e344cd0002800000720a00ff"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xf, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x9fffffff00000000}, [@jmp={0x5, 0x0, 0xffffffcd}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) [ 390.243510] FAULT_INJECTION: forcing a failure. [ 390.243510] name failslab, interval 1, probability 0, space 0, times 0 [ 390.254862] CPU: 0 PID: 3791 Comm: syz-executor5 Not tainted 4.16.0+ #1 [ 390.261628] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 390.270990] Call Trace: [ 390.273594] dump_stack+0x1b9/0x29f [ 390.277249] ? arch_local_irq_restore+0x52/0x52 [ 390.281954] should_fail.cold.4+0xa/0x1a [ 390.286029] ? graph_lock+0x170/0x170 [ 390.286730] FAULT_INJECTION: forcing a failure. [ 390.286730] name failslab, interval 1, probability 0, space 0, times 0 [ 390.289850] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 390.289871] ? lock_downgrade+0x8e0/0x8e0 [ 390.289895] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 390.289915] ? find_next_zero_bit+0x111/0x140 [ 390.289937] ? graph_lock+0x170/0x170 [ 390.289968] ? find_held_lock+0x36/0x1c0 [ 390.328194] ? __lock_is_held+0xb5/0x140 [ 390.332281] ? check_same_owner+0x320/0x320 [ 390.338776] ? __might_sleep+0x95/0x190 [ 390.342752] ? rcu_note_context_switch+0x710/0x710 [ 390.347699] should_failslab+0x124/0x180 [ 390.351769] __kmalloc+0x2c8/0x760 [ 390.355314] ? lockdep_init_map+0x9/0x10 [ 390.359374] ? debug_mutex_init+0x2d/0x60 [ 390.363521] ? __list_lru_init+0xcf/0x7b0 [ 390.367679] __list_lru_init+0xcf/0x7b0 [ 390.371662] ? list_lru_destroy+0x4c0/0x4c0 [ 390.375981] ? __raw_spin_lock_init+0x1c/0x100 [ 390.380592] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 390.385614] ? __lockdep_init_map+0x105/0x590 [ 390.390114] ? lockdep_init_map+0x9/0x10 [ 390.394181] sget_userns+0x6d9/0xf20 [ 390.397896] ? set_anon_super+0x20/0x20 [ 390.401878] ? get_empty_filp.cold.7+0x3e/0x3e [ 390.406466] ? destroy_unused_super.part.9+0x100/0x100 [ 390.411757] ? __alloc_pages_slowpath+0x2dc0/0x2dc0 [ 390.416785] ? kasan_check_read+0x11/0x20 [ 390.420941] ? trace_hardirqs_off+0xd/0x10 [ 390.425180] ? cap_capable+0x1f9/0x260 [ 390.429079] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 390.434619] ? security_capable+0xa4/0xd0 [ 390.438772] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 390.444309] ? ns_capable_common+0x13f/0x170 [ 390.448730] mount_ns+0x8f/0x1d0 [ 390.452097] ? rpc_pipe_release+0xb70/0xb70 [ 390.456425] rpc_mount+0x9e/0xd0 [ 390.459803] mount_fs+0xae/0x328 [ 390.463183] vfs_kern_mount.part.34+0xd4/0x4d0 [ 390.467774] ? may_umount+0xb0/0xb0 [ 390.471400] ? _raw_read_unlock+0x22/0x30 [ 390.475551] ? __get_fs_type+0x97/0xc0 [ 390.479451] do_mount+0x564/0x3070 [ 390.483010] ? copy_mount_string+0x40/0x40 [ 390.487249] ? rcu_pm_notify+0xc0/0xc0 [ 390.491152] ? copy_mount_options+0x5f/0x380 [ 390.495561] ? rcu_read_lock_sched_held+0x108/0x120 [ 390.500580] ? kmem_cache_alloc_trace+0x616/0x780 [ 390.505426] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 390.510967] ? _copy_from_user+0xdf/0x150 [ 390.515124] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 390.520660] ? copy_mount_options+0x285/0x380 [ 390.525166] ksys_mount+0x12d/0x140 [ 390.528801] SyS_mount+0x35/0x50 [ 390.532169] ? ksys_mount+0x140/0x140 [ 390.535974] do_syscall_64+0x29e/0x9d0 [ 390.539862] ? vmalloc_sync_all+0x30/0x30 [ 390.544014] ? _raw_spin_unlock_irq+0x27/0x70 [ 390.548510] ? finish_task_switch+0x1ca/0x820 [ 390.553012] ? syscall_return_slowpath+0x5c0/0x5c0 [ 390.557954] ? syscall_return_slowpath+0x30f/0x5c0 [ 390.562894] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 390.568266] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 390.573123] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 390.578309] RIP: 0033:0x4552d9 [ 390.581496] RSP: 002b:00007f4cbd4aec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 390.589213] RAX: ffffffffffffffda RBX: 00007f4cbd4af6d4 RCX: 00000000004552d9 [ 390.596485] RDX: 00000000200002c0 RSI: 0000000020000140 RDI: 0000000020000300 [ 390.603752] RBP: 000000000072bea0 R08: 0000000020001280 R09: 0000000000000000 [ 390.611018] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 390.618288] R13: 00000000000003fa R14: 00000000006f9010 R15: 000000000000000a [ 390.625592] CPU: 1 PID: 3794 Comm: syz-executor4 Not tainted 4.16.0+ #1 [ 390.632358] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 390.641711] Call Trace: [ 390.644294] dump_stack+0x1b9/0x29f [ 390.647921] ? arch_local_irq_restore+0x52/0x52 [ 390.652594] should_fail.cold.4+0xa/0x1a [ 390.656653] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 390.661751] ? __save_stack_trace+0x7e/0xd0 [ 390.666061] ? graph_lock+0x170/0x170 [ 390.669862] ? find_held_lock+0x36/0x1c0 [ 390.673921] ? __lock_is_held+0xb5/0x140 [ 390.677991] ? check_same_owner+0x320/0x320 [ 390.682307] ? rcu_note_context_switch+0x710/0x710 [ 390.687237] should_failslab+0x124/0x180 [ 390.691291] kmem_cache_alloc_trace+0x2cb/0x780 [ 390.695950] ? __kmalloc_node+0x33/0x70 [ 390.699915] ? __kmalloc_node+0x33/0x70 [ 390.703879] ? rcu_read_lock_sched_held+0x108/0x120 [ 390.708895] __memcg_init_list_lru_node+0x17c/0x2c0 [ 390.713903] ? list_lru_add+0x850/0x850 [ 390.717867] ? __kmalloc_node+0x47/0x70 [ 390.721837] __list_lru_init+0x45e/0x7b0 [ 390.725893] ? list_lru_destroy+0x4c0/0x4c0 [ 390.730204] ? __raw_spin_lock_init+0x1c/0x100 [ 390.734779] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 390.739784] ? __lockdep_init_map+0x105/0x590 [ 390.744275] ? lockdep_init_map+0x9/0x10 [ 390.748331] sget_userns+0x6d9/0xf20 [ 390.752034] ? set_anon_super+0x20/0x20 [ 390.756009] ? get_empty_filp.cold.7+0x3e/0x3e [ 390.760600] ? destroy_unused_super.part.9+0x100/0x100 [ 390.765875] ? __alloc_pages_slowpath+0x2dc0/0x2dc0 [ 390.770886] ? kasan_check_read+0x11/0x20 [ 390.775035] ? trace_hardirqs_off+0xd/0x10 [ 390.779263] ? cap_capable+0x1f9/0x260 [ 390.783147] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 390.788672] ? security_capable+0xa4/0xd0 [ 390.792811] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 390.798336] ? ns_capable_common+0x13f/0x170 [ 390.802742] mount_ns+0x8f/0x1d0 [ 390.806099] ? rpc_pipe_release+0xb70/0xb70 [ 390.810411] rpc_mount+0x9e/0xd0 [ 390.813770] mount_fs+0xae/0x328 [ 390.817133] vfs_kern_mount.part.34+0xd4/0x4d0 [ 390.821708] ? may_umount+0xb0/0xb0 [ 390.825325] ? _raw_read_unlock+0x22/0x30 [ 390.829466] ? __get_fs_type+0x97/0xc0 [ 390.833350] do_mount+0x564/0x3070 [ 390.836888] ? copy_mount_string+0x40/0x40 [ 390.841110] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 390.846119] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 390.850874] ? retint_kernel+0x10/0x10 [ 390.854761] ? copy_mount_options+0x213/0x380 [ 390.859249] ? copy_mount_options+0x19c/0x380 [ 390.863732] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 390.869256] ? copy_mount_options+0x285/0x380 [ 390.873747] ksys_mount+0x12d/0x140 [ 390.877366] SyS_mount+0x35/0x50 [ 390.880722] ? ksys_mount+0x140/0x140 [ 390.884513] do_syscall_64+0x29e/0x9d0 [ 390.888389] ? vmalloc_sync_all+0x30/0x30 [ 390.892525] ? _raw_spin_unlock_irq+0x27/0x70 [ 390.897011] ? finish_task_switch+0x1ca/0x820 [ 390.901503] ? syscall_return_slowpath+0x5c0/0x5c0 [ 390.906423] ? syscall_return_slowpath+0x30f/0x5c0 [ 390.911350] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 390.916710] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 390.921550] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 390.926727] RIP: 0033:0x4552d9 [ 390.929903] RSP: 002b:00007f20eb785c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 390.937607] RAX: ffffffffffffffda RBX: 00007f20eb7866d4 RCX: 00000000004552d9 2018/04/05 21:37:48 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8cffffff00000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:48 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 390.944862] RDX: 00000000200002c0 RSI: 0000000020000140 RDI: 0000000020000300 [ 390.952119] RBP: 000000000072bea0 R08: 0000000020001280 R09: 0000000000000000 [ 390.959376] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 390.966632] R13: 00000000000003fa R14: 00000000006f9010 R15: 000000000000000b 2018/04/05 21:37:48 executing program 5 (fault-call:3 fault-nth:11): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000001380)='./file0\x00', &(0x7f0000001340)='proc\x00', 0x0, &(0x7f0000000240)) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000001280)) 2018/04/05 21:37:48 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xd7f, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:48 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xeb8, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:48 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9}, 0x3d1) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000028000)={r0, &(0x7f0000000200), &(0x7f0000000240)="13"}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r0, &(0x7f0000000140)="e2e49acc8c6a8fc004352161df439088b83c52032681d51b5c2d8f89c09e725658dcfd6b07b743fd4d54940b9d2b472cacf3cfe2cb4001"}, 0x10) 2018/04/05 21:37:48 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:48 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:49 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0x1d9, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:49 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x5, 0xa, 0x7fc00000000, &(0x7f00000000c0)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000040)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9}, 0x3d1) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000028000)={r1, &(0x7f0000000200), &(0x7f0000000240)="13"}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r1, &(0x7f0000000040)}, 0x10) 2018/04/05 21:37:49 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xa6f, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:49 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8cffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:49 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x200000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:49 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0x72a, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:49 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000001380)='./file0\x00', &(0x7f0000001340)='proc\x00', 0x0, &(0x7f0000000240)) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000001280)) 2018/04/05 21:37:49 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000400008fe7bb5cd4e344cd0002800000720a00ff"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xf, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x9cffffff00000000}, [@jmp={0x5, 0x0, 0xffffffcd}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) 2018/04/05 21:37:49 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xdb, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:49 executing program 6: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000100)={&(0x7f00000000c0)='./file0\x00', 0x0, 0x8}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9}, 0x3d1) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000028000)={r1, &(0x7f0000000200), &(0x7f0000000240)="13"}, 0x20) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000040)) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r1, &(0x7f0000000040)}, 0x10) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x6) [ 391.424588] FAULT_INJECTION: forcing a failure. [ 391.424588] name failslab, interval 1, probability 0, space 0, times 0 [ 391.435928] CPU: 0 PID: 3847 Comm: syz-executor5 Not tainted 4.16.0+ #1 [ 391.442693] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 391.452063] Call Trace: [ 391.454680] dump_stack+0x1b9/0x29f [ 391.458335] ? arch_local_irq_restore+0x52/0x52 [ 391.463044] should_fail.cold.4+0xa/0x1a [ 391.467129] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 391.472268] ? graph_lock+0x170/0x170 [ 391.476090] ? save_stack+0x43/0xd0 [ 391.479734] ? kasan_kmalloc+0xc4/0xe0 [ 391.483637] ? __list_lru_init+0xcf/0x7b0 [ 391.487809] ? find_held_lock+0x36/0x1c0 [ 391.491900] ? __lock_is_held+0xb5/0x140 [ 391.496007] ? check_same_owner+0x320/0x320 [ 391.500352] ? rcu_note_context_switch+0x710/0x710 [ 391.505321] should_failslab+0x124/0x180 [ 391.509410] kmem_cache_alloc_node_trace+0x26f/0x770 [ 391.514529] ? mark_held_locks+0xc9/0x160 [ 391.518690] ? __raw_spin_lock_init+0x1c/0x100 [ 391.523282] __kmalloc_node+0x33/0x70 [ 391.527085] kvmalloc_node+0x6b/0x100 [ 391.530884] __list_lru_init+0x50e/0x7b0 [ 391.534951] ? list_lru_destroy+0x4c0/0x4c0 [ 391.539266] ? __raw_spin_lock_init+0x1c/0x100 [ 391.543844] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 391.548854] ? __lockdep_init_map+0x105/0x590 [ 391.553343] ? lockdep_init_map+0x9/0x10 [ 391.557403] sget_userns+0x6d9/0xf20 [ 391.561109] ? set_anon_super+0x20/0x20 [ 391.565081] ? get_empty_filp.cold.7+0x3e/0x3e [ 391.569658] ? destroy_unused_super.part.9+0x100/0x100 [ 391.574933] ? __alloc_pages_slowpath+0x2dc0/0x2dc0 [ 391.579948] ? kasan_check_read+0x11/0x20 [ 391.584098] ? trace_hardirqs_off+0xd/0x10 [ 391.588325] ? cap_capable+0x1f9/0x260 [ 391.592208] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 391.597733] ? security_capable+0xa4/0xd0 [ 391.601874] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 391.607410] ? ns_capable_common+0x13f/0x170 [ 391.611815] mount_ns+0x8f/0x1d0 [ 391.615174] ? rpc_pipe_release+0xb70/0xb70 [ 391.619493] rpc_mount+0x9e/0xd0 [ 391.622853] mount_fs+0xae/0x328 [ 391.626216] vfs_kern_mount.part.34+0xd4/0x4d0 [ 391.630792] ? may_umount+0xb0/0xb0 [ 391.634412] ? _raw_read_unlock+0x22/0x30 [ 391.638549] ? __get_fs_type+0x97/0xc0 [ 391.642433] do_mount+0x564/0x3070 [ 391.645970] ? copy_mount_string+0x40/0x40 [ 391.650194] ? rcu_pm_notify+0xc0/0xc0 [ 391.654081] ? copy_mount_options+0x5f/0x380 [ 391.658481] ? rcu_read_lock_sched_held+0x108/0x120 [ 391.663490] ? kmem_cache_alloc_trace+0x616/0x780 [ 391.668327] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 391.673858] ? _copy_from_user+0xdf/0x150 [ 391.677999] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 391.683532] ? copy_mount_options+0x285/0x380 [ 391.688034] ksys_mount+0x12d/0x140 [ 391.691659] SyS_mount+0x35/0x50 [ 391.695021] ? ksys_mount+0x140/0x140 [ 391.698824] do_syscall_64+0x29e/0x9d0 [ 391.702697] ? vmalloc_sync_all+0x30/0x30 [ 391.706836] ? _raw_spin_unlock_irq+0x27/0x70 [ 391.711328] ? finish_task_switch+0x1ca/0x820 [ 391.715814] ? syscall_return_slowpath+0x5c0/0x5c0 [ 391.720912] ? syscall_return_slowpath+0x30f/0x5c0 [ 391.725842] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 391.731220] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 391.736069] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 391.741248] RIP: 0033:0x4552d9 [ 391.744425] RSP: 002b:00007f4cbd4aec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 391.752126] RAX: ffffffffffffffda RBX: 00007f4cbd4af6d4 RCX: 00000000004552d9 [ 391.759390] RDX: 00000000200002c0 RSI: 0000000020000140 RDI: 0000000020000300 [ 391.766648] RBP: 000000000072bea0 R08: 0000000020001280 R09: 0000000000000000 [ 391.773905] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 391.781163] R13: 00000000000003fa R14: 00000000006f9010 R15: 000000000000000b 2018/04/05 21:37:49 executing program 5 (fault-call:3 fault-nth:12): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000001380)='./file0\x00', &(0x7f0000001340)='proc\x00', 0x0, &(0x7f0000000240)) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000001280)) 2018/04/05 21:37:49 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6ffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:49 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:49 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0x33c, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:49 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0x950, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:49 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9}, 0x3d1) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000028000)={r0, &(0x7f0000000200), &(0x7f0000000240)="13"}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r0, &(0x7f0000000040)}, 0x10) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000040)) 2018/04/05 21:37:49 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000001380)='./file0\x00', &(0x7f0000001340)='proc\x00', 0x0, &(0x7f0000000240)) mount(&(0x7f0000000300)='//file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000001280)) 2018/04/05 21:37:49 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000400008fe7bb5cd4e344cd0002800000720a00ff"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xf, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x2}, [@jmp={0x5, 0x0, 0xffffffcd}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) [ 392.004007] FAULT_INJECTION: forcing a failure. [ 392.004007] name failslab, interval 1, probability 0, space 0, times 0 [ 392.015366] CPU: 1 PID: 3880 Comm: syz-executor5 Not tainted 4.16.0+ #1 [ 392.022121] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 392.031470] Call Trace: [ 392.034067] dump_stack+0x1b9/0x29f [ 392.037712] ? arch_local_irq_restore+0x52/0x52 [ 392.042393] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 392.047597] should_fail.cold.4+0xa/0x1a [ 392.051671] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 392.056785] ? unwind_get_return_address+0x61/0xa0 [ 392.061726] ? __save_stack_trace+0x7e/0xd0 [ 392.066055] ? graph_lock+0x170/0x170 [ 392.069877] ? find_held_lock+0x36/0x1c0 [ 392.073949] ? __lock_is_held+0xb5/0x140 [ 392.078029] ? check_same_owner+0x320/0x320 [ 392.082366] ? rcu_note_context_switch+0x710/0x710 [ 392.087314] should_failslab+0x124/0x180 [ 392.091386] kmem_cache_alloc_trace+0x2cb/0x780 [ 392.096062] ? __kmalloc_node+0x33/0x70 [ 392.100047] ? __kmalloc_node+0x33/0x70 [ 392.104033] ? rcu_read_lock_sched_held+0x108/0x120 [ 392.109068] __memcg_init_list_lru_node+0x17c/0x2c0 [ 392.114095] ? list_lru_add+0x850/0x850 [ 392.118078] ? __kmalloc_node+0x47/0x70 [ 392.122072] __list_lru_init+0x45e/0x7b0 [ 392.126159] ? list_lru_destroy+0x4c0/0x4c0 [ 392.130490] ? __raw_spin_lock_init+0x1c/0x100 [ 392.135084] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 392.140107] ? __lockdep_init_map+0x105/0x590 [ 392.144613] ? lockdep_init_map+0x9/0x10 [ 392.148683] sget_userns+0x6d9/0xf20 [ 392.152403] ? set_anon_super+0x20/0x20 [ 392.156388] ? get_empty_filp.cold.7+0x3e/0x3e [ 392.160978] ? destroy_unused_super.part.9+0x100/0x100 [ 392.166266] ? __alloc_pages_slowpath+0x2dc0/0x2dc0 [ 392.171293] ? kasan_check_read+0x11/0x20 [ 392.175454] ? rcu_pm_notify+0xc0/0xc0 [ 392.179348] ? trace_hardirqs_off+0xd/0x10 [ 392.183586] ? cap_capable+0x1f9/0x260 [ 392.187485] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 392.193030] ? security_capable+0xa4/0xd0 [ 392.197201] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 392.202746] ? ns_capable_common+0x13f/0x170 [ 392.207161] mount_ns+0x8f/0x1d0 [ 392.210525] ? rpc_pipe_release+0xb70/0xb70 [ 392.214856] rpc_mount+0x9e/0xd0 [ 392.218230] mount_fs+0xae/0x328 [ 392.221612] vfs_kern_mount.part.34+0xd4/0x4d0 [ 392.226201] ? may_umount+0xb0/0xb0 [ 392.229835] ? _raw_read_unlock+0x22/0x30 [ 392.233990] ? __get_fs_type+0x97/0xc0 [ 392.237892] do_mount+0x564/0x3070 [ 392.241444] ? copy_mount_string+0x40/0x40 [ 392.245692] ? rcu_pm_notify+0xc0/0xc0 [ 392.249596] ? copy_mount_options+0x5f/0x380 [ 392.254011] ? rcu_read_lock_sched_held+0x108/0x120 [ 392.259033] ? kmem_cache_alloc_trace+0x616/0x780 [ 392.264405] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 392.269947] ? _copy_from_user+0xdf/0x150 [ 392.274102] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 392.279648] ? copy_mount_options+0x285/0x380 [ 392.284152] ksys_mount+0x12d/0x140 [ 392.287788] SyS_mount+0x35/0x50 [ 392.291154] ? ksys_mount+0x140/0x140 [ 392.294967] do_syscall_64+0x29e/0x9d0 [ 392.298855] ? vmalloc_sync_all+0x30/0x30 [ 392.303010] ? _raw_spin_unlock_irq+0x27/0x70 [ 392.307513] ? finish_task_switch+0x1ca/0x820 [ 392.312017] ? syscall_return_slowpath+0x5c0/0x5c0 [ 392.316953] ? syscall_return_slowpath+0x30f/0x5c0 [ 392.321897] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 392.327272] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 392.332130] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 392.337324] RIP: 0033:0x4552d9 [ 392.340510] RSP: 002b:00007f4cbd4aec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 392.348228] RAX: ffffffffffffffda RBX: 00007f4cbd4af6d4 RCX: 00000000004552d9 2018/04/05 21:37:49 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x100000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:49 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000400008fe7bb5cd4e344cd0002800000720a00ff"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xf, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x227}, [@jmp={0x5, 0x0, 0xffffffcd}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) 2018/04/05 21:37:49 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x8cffffff00000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:50 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xffffffff00000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:50 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000400008fe7bb5cd4e344cd0002800000720a00ff"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xf, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x2702}, [@jmp={0x5, 0x0, 0xffffffcd}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) 2018/04/05 21:37:50 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x400000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:50 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000400008fe7bb5cd4e344cd0002800000720a00ff"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xf, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x300000000000000}, [@jmp={0x5, 0x0, 0xffffffcd}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) 2018/04/05 21:37:50 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x2000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 392.355508] RDX: 00000000200002c0 RSI: 0000000020000140 RDI: 0000000020000300 [ 392.362777] RBP: 000000000072bea0 R08: 0000000020001280 R09: 0000000000000000 [ 392.370046] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 392.377309] R13: 00000000000003fa R14: 00000000006f9010 R15: 000000000000000c 2018/04/05 21:37:50 executing program 5 (fault-call:3 fault-nth:13): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000001380)='./file0\x00', &(0x7f0000001340)='proc\x00', 0x0, &(0x7f0000000240)) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000001280)) 2018/04/05 21:37:50 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0x21c, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:50 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0x594, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:50 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:50 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000001380)='./file0\x00', &(0x7f0000001340)='proc\x00', 0x0, &(0x7f0000000240)) mount(&(0x7f0000000300)='./.ile0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000001280)) 2018/04/05 21:37:50 executing program 6: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9}, 0x3d1) r2 = getpid() perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x427f, 0x3, 0x7f, 0x7cf, 0x0, 0xffffffff, 0x20c80, 0x0, 0xf4, 0x1ff, 0x6, 0x6, 0x44, 0x374e, 0x101, 0x0, 0x1, 0x7f, 0x7, 0x9, 0xffffffff, 0x19e3, 0x7, 0x80000001, 0x15400, 0x20, 0xffff, 0x8, 0x100000001, 0x1, 0x80000001, 0x10001, 0x8, 0x9, 0x9, 0x4, 0x0, 0x8, 0x0, @perf_bp={&(0x7f00000000c0), 0x2}, 0x1000, 0x33, 0xfffffffffffffe00, 0x7, 0x5, 0x2, 0xff}, r2, 0x6, r0, 0x2) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000028000)={r1, &(0x7f0000000200), &(0x7f0000000240)="13"}, 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r1, &(0x7f0000000040)}, 0x10) 2018/04/05 21:37:50 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000400008fe7bb5cd4e344cd0002800000720a00ff"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xf, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x68000000}, [@jmp={0x5, 0x0, 0xffffffcd}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) 2018/04/05 21:37:50 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xffffff8c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 392.610364] FAULT_INJECTION: forcing a failure. [ 392.610364] name failslab, interval 1, probability 0, space 0, times 0 [ 392.621666] CPU: 1 PID: 3932 Comm: syz-executor5 Not tainted 4.16.0+ #1 [ 392.628414] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 392.637763] Call Trace: [ 392.640361] dump_stack+0x1b9/0x29f [ 392.644005] ? arch_local_irq_restore+0x52/0x52 [ 392.648689] ? __save_stack_trace+0x7e/0xd0 [ 392.653030] should_fail.cold.4+0xa/0x1a [ 392.657106] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 392.662214] ? kasan_kmalloc+0xc4/0xe0 [ 392.666108] ? kmem_cache_alloc_trace+0x152/0x780 [ 392.670961] ? __memcg_init_list_lru_node+0x17c/0x2c0 [ 392.676158] ? __list_lru_init+0x45e/0x7b0 [ 392.680398] ? sget_userns+0x6d9/0xf20 [ 392.684289] ? mount_ns+0x8f/0x1d0 [ 392.687833] ? graph_lock+0x170/0x170 [ 392.691634] ? do_mount+0x564/0x3070 [ 392.695351] ? ksys_mount+0x12d/0x140 [ 392.699150] ? SyS_mount+0x35/0x50 [ 392.702696] ? do_syscall_64+0x29e/0x9d0 [ 392.706770] ? find_held_lock+0x36/0x1c0 [ 392.710848] ? __lock_is_held+0xb5/0x140 [ 392.714930] ? check_same_owner+0x320/0x320 [ 392.719261] ? rcu_note_context_switch+0x710/0x710 [ 392.724205] should_failslab+0x124/0x180 [ 392.728278] kmem_cache_alloc_trace+0x2cb/0x780 [ 392.732951] ? __kmalloc_node+0x33/0x70 [ 392.736934] ? __kmalloc_node+0x33/0x70 [ 392.740917] ? rcu_read_lock_sched_held+0x108/0x120 [ 392.745947] __memcg_init_list_lru_node+0x17c/0x2c0 [ 392.750973] ? list_lru_add+0x850/0x850 [ 392.754955] ? __kmalloc_node+0x47/0x70 [ 392.758940] __list_lru_init+0x45e/0x7b0 [ 392.763009] ? list_lru_destroy+0x4c0/0x4c0 [ 392.767333] ? __raw_spin_lock_init+0x1c/0x100 [ 392.771926] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 392.776954] ? __lockdep_init_map+0x105/0x590 [ 392.781461] ? lockdep_init_map+0x9/0x10 [ 392.785528] sget_userns+0x6d9/0xf20 [ 392.789247] ? set_anon_super+0x20/0x20 [ 392.793229] ? get_empty_filp.cold.7+0x3e/0x3e [ 392.797820] ? destroy_unused_super.part.9+0x100/0x100 [ 392.803107] ? __alloc_pages_slowpath+0x2dc0/0x2dc0 2018/04/05 21:37:50 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6ffffff00000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:50 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xeb3, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:50 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:50 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000001380)='./file0\x00', &(0x7f0000001340)='proc\x00', 0x0, &(0x7f0000000240)) mount(&(0x7f0000000300)='.//ile0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000001280)) 2018/04/05 21:37:50 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:50 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x1000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:50 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:50 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xf6ffffff00000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 392.808129] ? kasan_check_read+0x11/0x20 [ 392.812289] ? rcu_pm_notify+0xc0/0xc0 [ 392.816174] ? trace_hardirqs_off+0xd/0x10 [ 392.820411] ? cap_capable+0x1f9/0x260 [ 392.824311] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 392.829852] ? security_capable+0xa4/0xd0 [ 392.834012] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 392.839556] ? ns_capable_common+0x13f/0x170 [ 392.843975] mount_ns+0x8f/0x1d0 [ 392.847344] ? rpc_pipe_release+0xb70/0xb70 [ 392.851677] rpc_mount+0x9e/0xd0 [ 392.855056] mount_fs+0xae/0x328 [ 392.858433] vfs_kern_mount.part.34+0xd4/0x4d0 [ 392.863021] ? may_umount+0xb0/0xb0 [ 392.866652] ? _raw_read_unlock+0x22/0x30 [ 392.870809] ? __get_fs_type+0x97/0xc0 [ 392.874706] do_mount+0x564/0x3070 [ 392.878256] ? copy_mount_string+0x40/0x40 [ 392.882500] ? rcu_pm_notify+0xc0/0xc0 [ 392.886407] ? copy_mount_options+0x5f/0x380 [ 392.890825] ? rcu_read_lock_sched_held+0x108/0x120 [ 392.895846] ? kmem_cache_alloc_trace+0x616/0x780 [ 392.900699] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 392.906242] ? _copy_from_user+0xdf/0x150 [ 392.910395] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 392.915934] ? copy_mount_options+0x285/0x380 [ 392.920443] ksys_mount+0x12d/0x140 [ 392.924080] SyS_mount+0x35/0x50 [ 392.927450] ? ksys_mount+0x140/0x140 [ 392.931260] do_syscall_64+0x29e/0x9d0 [ 392.935149] ? vmalloc_sync_all+0x30/0x30 [ 392.939305] ? kasan_check_write+0x14/0x20 [ 392.943551] ? syscall_return_slowpath+0x5c0/0x5c0 [ 392.948487] ? syscall_return_slowpath+0x30f/0x5c0 [ 392.953431] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 392.958809] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 392.963666] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 392.968853] RIP: 0033:0x4552d9 [ 392.972042] RSP: 002b:00007f4cbd4aec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 392.979761] RAX: ffffffffffffffda RBX: 00007f4cbd4af6d4 RCX: 00000000004552d9 [ 392.987041] RDX: 00000000200002c0 RSI: 0000000020000140 RDI: 0000000020000300 [ 392.994318] RBP: 000000000072bea0 R08: 0000000020001280 R09: 0000000000000000 [ 393.001593] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 393.008865] R13: 00000000000003fa R14: 00000000006f9010 R15: 000000000000000d 2018/04/05 21:37:50 executing program 5 (fault-call:3 fault-nth:14): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000001380)='./file0\x00', &(0x7f0000001340)='proc\x00', 0x0, &(0x7f0000000240)) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000001280)) 2018/04/05 21:37:50 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:50 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x8cffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:50 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0x2a3, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:50 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000400008fe7bb5cd4e344cd0002800000720a00ff"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xf, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x5}, [@jmp={0x5, 0x0, 0xffffffcd}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) 2018/04/05 21:37:50 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9}, 0x3d1) socketpair(0xd, 0x772ae5435063d20b, 0x8000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000000c0)={0x0, r1, 0x7, 0x2}, 0x14) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000028000)={r0, &(0x7f0000000200), &(0x7f0000000240)="13"}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r0, &(0x7f0000000040)}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r1, 0x28, &(0x7f0000000100)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={r2, 0x3, 0x10}, 0xc) 2018/04/05 21:37:50 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0x6e4, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:50 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000001380)='./file0\x00', &(0x7f0000001340)='proc\x00', 0x0, &(0x7f0000000240)) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000001280)) 2018/04/05 21:37:51 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000400008fe7bb5cd4e344cd0002800000720a00ff"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xf, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x0, 0xa}, [@jmp={0x5, 0x0, 0xffffffcd}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) 2018/04/05 21:37:51 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xeb1, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) [ 393.231578] FAULT_INJECTION: forcing a failure. [ 393.231578] name failslab, interval 1, probability 0, space 0, times 0 [ 393.242983] CPU: 0 PID: 3983 Comm: syz-executor5 Not tainted 4.16.0+ #1 [ 393.249754] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 393.259116] Call Trace: [ 393.261726] dump_stack+0x1b9/0x29f [ 393.265372] ? arch_local_irq_restore+0x52/0x52 [ 393.270076] should_fail.cold.4+0xa/0x1a [ 393.274163] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 393.279289] ? kmem_cache_alloc_trace+0x152/0x780 [ 393.284146] ? __memcg_init_list_lru_node+0x17c/0x2c0 [ 393.289349] ? __list_lru_init+0x45e/0x7b0 [ 393.293597] ? sget_userns+0x6d9/0xf20 [ 393.297505] ? mount_ns+0x8f/0x1d0 [ 393.301063] ? graph_lock+0x170/0x170 [ 393.304879] ? do_mount+0x564/0x3070 [ 393.308608] ? ksys_mount+0x12d/0x140 [ 393.312426] ? SyS_mount+0x35/0x50 [ 393.315981] ? do_syscall_64+0x29e/0x9d0 [ 393.320070] ? find_held_lock+0x36/0x1c0 [ 393.324162] ? __lock_is_held+0xb5/0x140 2018/04/05 21:37:51 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0x2b1, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:51 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9}, 0x3d1) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000028000)={r0, &(0x7f0000000200), &(0x7f0000000240)="13"}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0, &(0x7f0000000040)}, 0x10) 2018/04/05 21:37:51 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000001380)='./file0\x00', &(0x7f0000001340)='proc\x00', 0x0, &(0x7f0000000240)) mount(&(0x7f0000000300)="2e2f66696c6530ff", &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000001280)) 2018/04/05 21:37:51 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9}, 0x3d1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r0, 0x28, &(0x7f0000000040)}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000028000)={r0, &(0x7f0000000200), &(0x7f0000000240)="13"}, 0x20) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000100)={0xffffffffffffff9c}) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000140)={r0}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r0, &(0x7f0000000040)}, 0x10) [ 393.328272] ? check_same_owner+0x320/0x320 [ 393.332615] ? rcu_note_context_switch+0x710/0x710 [ 393.337573] should_failslab+0x124/0x180 [ 393.341655] kmem_cache_alloc_trace+0x2cb/0x780 [ 393.346338] ? __kmalloc_node+0x33/0x70 [ 393.350330] ? __kmalloc_node+0x33/0x70 [ 393.354333] ? rcu_read_lock_sched_held+0x108/0x120 [ 393.359383] __memcg_init_list_lru_node+0x17c/0x2c0 [ 393.364422] ? list_lru_add+0x850/0x850 [ 393.368419] ? __kmalloc_node+0x47/0x70 [ 393.372433] __list_lru_init+0x45e/0x7b0 [ 393.376530] ? list_lru_destroy+0x4c0/0x4c0 2018/04/05 21:37:51 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 393.380866] ? __raw_spin_lock_init+0x1c/0x100 [ 393.385471] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 393.390506] ? __lockdep_init_map+0x105/0x590 [ 393.395026] ? lockdep_init_map+0x9/0x10 [ 393.399105] sget_userns+0x6d9/0xf20 [ 393.402837] ? set_anon_super+0x20/0x20 [ 393.406835] ? get_empty_filp.cold.7+0x3e/0x3e [ 393.411438] ? destroy_unused_super.part.9+0x100/0x100 [ 393.416744] ? __alloc_pages_slowpath+0x2dc0/0x2dc0 [ 393.421783] ? kasan_check_read+0x11/0x20 [ 393.425954] ? trace_hardirqs_off+0xd/0x10 2018/04/05 21:37:51 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xf6ffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 393.430208] ? cap_capable+0x1f9/0x260 [ 393.434123] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 393.439670] ? security_capable+0xa4/0xd0 [ 393.443843] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 393.449403] ? ns_capable_common+0x13f/0x170 [ 393.453839] mount_ns+0x8f/0x1d0 [ 393.457219] ? rpc_pipe_release+0xb70/0xb70 [ 393.461563] rpc_mount+0x9e/0xd0 [ 393.464951] mount_fs+0xae/0x328 [ 393.468344] vfs_kern_mount.part.34+0xd4/0x4d0 [ 393.472945] ? may_umount+0xb0/0xb0 [ 393.476592] ? _raw_read_unlock+0x22/0x30 [ 393.480752] ? __get_fs_type+0x97/0xc0 [ 393.484665] do_mount+0x564/0x3070 [ 393.488239] ? copy_mount_string+0x40/0x40 [ 393.492488] ? rcu_pm_notify+0xc0/0xc0 [ 393.496405] ? copy_mount_options+0x5f/0x380 [ 393.500828] ? rcu_read_lock_sched_held+0x108/0x120 [ 393.505864] ? kmem_cache_alloc_trace+0x616/0x780 [ 393.510728] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 393.516280] ? _copy_from_user+0xdf/0x150 [ 393.520450] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 393.526004] ? copy_mount_options+0x285/0x380 [ 393.530526] ksys_mount+0x12d/0x140 [ 393.534171] SyS_mount+0x35/0x50 [ 393.537549] ? ksys_mount+0x140/0x140 [ 393.541370] do_syscall_64+0x29e/0x9d0 [ 393.545278] ? syscall_slow_exit_work+0x4f0/0x4f0 [ 393.550138] ? syscall_return_slowpath+0x5c0/0x5c0 [ 393.555086] ? syscall_return_slowpath+0x30f/0x5c0 [ 393.560045] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 393.565438] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 393.570317] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 393.575515] RIP: 0033:0x4552d9 [ 393.578712] RSP: 002b:00007f4cbd4aec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 393.586432] RAX: ffffffffffffffda RBX: 00007f4cbd4af6d4 RCX: 00000000004552d9 [ 393.593712] RDX: 00000000200002c0 RSI: 0000000020000140 RDI: 0000000020000300 [ 393.600992] RBP: 000000000072bea0 R08: 0000000020001280 R09: 0000000000000000 [ 393.608271] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 393.615550] R13: 00000000000003fa R14: 00000000006f9010 R15: 000000000000000e 2018/04/05 21:37:51 executing program 5 (fault-call:3 fault-nth:15): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000001380)='./file0\x00', &(0x7f0000001340)='proc\x00', 0x0, &(0x7f0000000240)) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000001280)) 2018/04/05 21:37:51 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9}, 0x3d1) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000028000)={r0, &(0x7f0000000200), &(0x7f0000000240)="13"}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0, &(0x7f00000000c0)}, 0xffffffffffffff6f) 2018/04/05 21:37:51 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:51 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:51 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000400008fe7bb5cd4e344cd0002800000720a00ff"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xf, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x1018}, [@jmp={0x5, 0x0, 0xffffffcd}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) 2018/04/05 21:37:51 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0x42b, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:51 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0x7, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:51 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000001380)='./file0\x00', &(0x7f0000001340)='proc\x00', 0x0, &(0x7f0000000240)) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000001280)) [ 393.801465] FAULT_INJECTION: forcing a failure. [ 393.801465] name failslab, interval 1, probability 0, space 0, times 0 [ 393.812765] CPU: 0 PID: 4033 Comm: syz-executor5 Not tainted 4.16.0+ #1 [ 393.819531] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 393.828893] Call Trace: [ 393.831500] dump_stack+0x1b9/0x29f [ 393.835150] ? arch_local_irq_restore+0x52/0x52 [ 393.839856] should_fail.cold.4+0xa/0x1a [ 393.843936] ? fault_create_debugfs_attr+0x1f0/0x1f0 2018/04/05 21:37:51 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0xf6ffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:51 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0x724, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:51 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000001380)='./file0\x00', &(0x7f0000001340)='proc\x00', 0x0, &(0x7f0000000240)) mount(&(0x7f0000000300)="2e2f66696c6530eb", &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000001280)) 2018/04/05 21:37:51 executing program 6: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)={&(0x7f0000000040)='./file0\x00', 0x0, 0x18}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x8, 0x4, 0x7ff, 0x1f, 0xd, r1, 0xbe}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000028000)={r2, &(0x7f0000000200), &(0x7f0000000240)="13"}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r2, &(0x7f0000000140)="9124329a60b08d9e3eba1e470320e90512c23193b98f6118204992480577010f77c03f527fe34c7a3c547467ecc91c6cbb980c5f1cb32ab113b0a9430534312d0dcb1a5ef20c", &(0x7f0000000000)="cfbe653a4811b5421f59a9875d71025d950f31b99bb46ca75f930de77d9bb94de33386c52c7f0e1d62b331c7ea485b57b13526f220599c0e", 0x1}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r2, &(0x7f0000000040)}, 0x10) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x9) [ 393.849059] ? kmem_cache_alloc_trace+0x152/0x780 [ 393.853913] ? __memcg_init_list_lru_node+0x17c/0x2c0 [ 393.859112] ? __list_lru_init+0x45e/0x7b0 [ 393.863355] ? sget_userns+0x6d9/0xf20 [ 393.867254] ? mount_ns+0x8f/0x1d0 [ 393.870814] ? graph_lock+0x170/0x170 [ 393.874630] ? do_mount+0x564/0x3070 [ 393.878355] ? ksys_mount+0x12d/0x140 [ 393.882169] ? SyS_mount+0x35/0x50 [ 393.885728] ? do_syscall_64+0x29e/0x9d0 [ 393.889818] ? find_held_lock+0x36/0x1c0 [ 393.893909] ? __lock_is_held+0xb5/0x140 [ 393.898013] ? check_same_owner+0x320/0x320 [ 393.902356] ? rcu_note_context_switch+0x710/0x710 [ 393.907320] should_failslab+0x124/0x180 [ 393.911406] kmem_cache_alloc_trace+0x2cb/0x780 [ 393.916088] ? __kmalloc_node+0x33/0x70 [ 393.920077] ? __kmalloc_node+0x33/0x70 [ 393.924080] ? rcu_read_lock_sched_held+0x108/0x120 [ 393.929128] __memcg_init_list_lru_node+0x17c/0x2c0 [ 393.934170] ? list_lru_add+0x850/0x850 [ 393.938167] ? __kmalloc_node+0x47/0x70 [ 393.942175] __list_lru_init+0x45e/0x7b0 [ 393.946271] ? list_lru_destroy+0x4c0/0x4c0 2018/04/05 21:37:51 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9}, 0x3d1) socketpair$inet6_icmp(0xa, 0x2, 0x3a, &(0x7f0000000040)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000028000)={r0, &(0x7f0000000200), &(0x7f0000000240)="13"}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r0, &(0x7f0000000040)}, 0x10) [ 393.950608] ? __raw_spin_lock_init+0x1c/0x100 [ 393.955215] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 393.960246] ? __lockdep_init_map+0x105/0x590 [ 393.964763] ? lockdep_init_map+0x9/0x10 [ 393.968845] sget_userns+0x6d9/0xf20 [ 393.972566] ? set_anon_super+0x20/0x20 [ 393.976562] ? get_empty_filp.cold.7+0x3e/0x3e [ 393.981159] ? destroy_unused_super.part.9+0x100/0x100 [ 393.986481] ? __alloc_pages_slowpath+0x2dc0/0x2dc0 [ 393.991527] ? kasan_check_read+0x11/0x20 [ 393.995696] ? trace_hardirqs_off+0xd/0x10 2018/04/05 21:37:51 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:51 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000400008fe7bb5cd4e344cd0002800000720a00ff"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xf, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x40000000000000}, [@jmp={0x5, 0x0, 0xffffffcd}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) [ 393.999953] ? cap_capable+0x1f9/0x260 [ 394.003864] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 394.009416] ? security_capable+0xa4/0xd0 [ 394.013589] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 394.019138] ? ns_capable_common+0x13f/0x170 [ 394.023594] mount_ns+0x8f/0x1d0 [ 394.026983] ? rpc_pipe_release+0xb70/0xb70 [ 394.031329] rpc_mount+0x9e/0xd0 [ 394.034719] mount_fs+0xae/0x328 [ 394.038109] vfs_kern_mount.part.34+0xd4/0x4d0 [ 394.042720] ? may_umount+0xb0/0xb0 [ 394.046361] ? _raw_read_unlock+0x22/0x30 [ 394.050522] ? __get_fs_type+0x97/0xc0 [ 394.054435] do_mount+0x564/0x3070 [ 394.057989] ? do_raw_spin_unlock+0x9e/0x2e0 [ 394.062418] ? copy_mount_string+0x40/0x40 [ 394.066662] ? rcu_pm_notify+0xc0/0xc0 [ 394.070556] ? copy_mount_options+0x5f/0x380 [ 394.074956] ? rcu_read_lock_sched_held+0x108/0x120 [ 394.079965] ? kmem_cache_alloc_trace+0x616/0x780 [ 394.084802] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 394.090339] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 394.095865] ? copy_mount_options+0x285/0x380 [ 394.100359] ksys_mount+0x12d/0x140 [ 394.103982] SyS_mount+0x35/0x50 [ 394.107337] ? ksys_mount+0x140/0x140 [ 394.111129] do_syscall_64+0x29e/0x9d0 [ 394.115009] ? vmalloc_sync_all+0x30/0x30 [ 394.119156] ? _raw_spin_unlock_irq+0x27/0x70 [ 394.123647] ? finish_task_switch+0x1ca/0x820 [ 394.128136] ? syscall_return_slowpath+0x5c0/0x5c0 [ 394.133057] ? syscall_return_slowpath+0x30f/0x5c0 [ 394.137981] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 394.143340] ? trace_hardirqs_off_thunk+0x1a/0x1c 2018/04/05 21:37:52 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff8c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 394.148186] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 394.153362] RIP: 0033:0x4552d9 [ 394.156545] RSP: 002b:00007f4cbd4aec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 394.164244] RAX: ffffffffffffffda RBX: 00007f4cbd4af6d4 RCX: 00000000004552d9 [ 394.171501] RDX: 00000000200002c0 RSI: 0000000020000140 RDI: 0000000020000300 [ 394.178756] RBP: 000000000072bea0 R08: 0000000020001280 R09: 0000000000000000 [ 394.186018] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 394.193277] R13: 00000000000003fa R14: 00000000006f9010 R15: 000000000000000f 2018/04/05 21:37:52 executing program 5 (fault-call:3 fault-nth:16): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000001380)='./file0\x00', &(0x7f0000001340)='proc\x00', 0x0, &(0x7f0000000240)) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000001280)) 2018/04/05 21:37:52 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xb0c, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:52 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x8, 0x4, 0x4, 0xbf58}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r0, 0x28, &(0x7f0000000040)}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000028000)={r0, &(0x7f0000000200), &(0x7f0000000240)="13"}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r0, &(0x7f0000000040)}, 0x10) 2018/04/05 21:37:52 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xb62, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:52 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:52 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x1000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:52 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000001380)='./file0\x00', &(0x7f0000001340)='proc\x00', 0x0, &(0x7f0000000240)) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000001280)) 2018/04/05 21:37:52 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000400008fe7bb5cd4e344cd0002800000720a00ff"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xf, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x1810000000000000}, [@jmp={0x5, 0x0, 0xffffffcd}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) 2018/04/05 21:37:52 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:52 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000001380)='./file0\x00', &(0x7f0000001340)='proc\x00', 0x0, &(0x7f0000000240)) mount(&(0x7f0000000300)="2e2f66696c6530fe", &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000001280)) 2018/04/05 21:37:52 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0x8f1, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) [ 394.493599] FAULT_INJECTION: forcing a failure. [ 394.493599] name failslab, interval 1, probability 0, space 0, times 0 [ 394.504911] CPU: 0 PID: 4088 Comm: syz-executor5 Not tainted 4.16.0+ #1 [ 394.511678] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 394.521052] Call Trace: [ 394.523661] dump_stack+0x1b9/0x29f [ 394.527318] ? arch_local_irq_restore+0x52/0x52 [ 394.532022] should_fail.cold.4+0xa/0x1a [ 394.536110] ? fault_create_debugfs_attr+0x1f0/0x1f0 2018/04/05 21:37:52 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xfb3, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) [ 394.541240] ? kmem_cache_alloc_trace+0x152/0x780 [ 394.546099] ? __memcg_init_list_lru_node+0x17c/0x2c0 [ 394.551310] ? __list_lru_init+0x45e/0x7b0 [ 394.555561] ? sget_userns+0x6d9/0xf20 [ 394.559463] ? mount_ns+0x8f/0x1d0 [ 394.563024] ? graph_lock+0x170/0x170 [ 394.566838] ? do_mount+0x564/0x3070 [ 394.570573] ? ksys_mount+0x12d/0x140 [ 394.574393] ? SyS_mount+0x35/0x50 [ 394.577955] ? do_syscall_64+0x29e/0x9d0 [ 394.582044] ? find_held_lock+0x36/0x1c0 [ 394.586145] ? __lock_is_held+0xb5/0x140 2018/04/05 21:37:52 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x2000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 394.590260] ? check_same_owner+0x320/0x320 [ 394.594601] ? rcu_note_context_switch+0x710/0x710 [ 394.599566] should_failslab+0x124/0x180 [ 394.603650] kmem_cache_alloc_trace+0x2cb/0x780 [ 394.608335] ? __kmalloc_node+0x33/0x70 [ 394.612324] ? __kmalloc_node+0x33/0x70 [ 394.616345] ? rcu_read_lock_sched_held+0x108/0x120 [ 394.621390] __memcg_init_list_lru_node+0x17c/0x2c0 [ 394.626430] ? list_lru_add+0x850/0x850 [ 394.630423] ? __kmalloc_node+0x47/0x70 [ 394.634428] __list_lru_init+0x45e/0x7b0 [ 394.638515] ? list_lru_destroy+0x4c0/0x4c0 2018/04/05 21:37:52 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000400008fe7bb5cd4e344cd0002800000720a00ff"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xf, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x5000000}, [@jmp={0x5, 0x0, 0xffffffcd}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) [ 394.642856] ? __raw_spin_lock_init+0x1c/0x100 [ 394.647460] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 394.652487] ? __lockdep_init_map+0x105/0x590 [ 394.656992] ? lockdep_init_map+0x9/0x10 [ 394.661076] sget_userns+0x6d9/0xf20 [ 394.664801] ? set_anon_super+0x20/0x20 [ 394.668795] ? get_empty_filp.cold.7+0x3e/0x3e [ 394.673390] ? destroy_unused_super.part.9+0x100/0x100 [ 394.678695] ? __alloc_pages_slowpath+0x2dc0/0x2dc0 [ 394.683735] ? kasan_check_read+0x11/0x20 [ 394.687906] ? trace_hardirqs_off+0xd/0x10 2018/04/05 21:37:52 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 394.692163] ? cap_capable+0x1f9/0x260 [ 394.696075] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 394.701631] ? security_capable+0xa4/0xd0 [ 394.705800] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 394.711355] ? ns_capable_common+0x13f/0x170 [ 394.715779] mount_ns+0x8f/0x1d0 [ 394.719145] ? rpc_pipe_release+0xb70/0xb70 [ 394.723466] rpc_mount+0x9e/0xd0 [ 394.726828] mount_fs+0xae/0x328 [ 394.730195] vfs_kern_mount.part.34+0xd4/0x4d0 [ 394.734770] ? may_umount+0xb0/0xb0 [ 394.738389] ? _raw_read_unlock+0x22/0x30 [ 394.742525] ? __get_fs_type+0x97/0xc0 [ 394.746411] do_mount+0x564/0x3070 [ 394.749942] ? do_raw_spin_unlock+0x9e/0x2e0 [ 394.754347] ? copy_mount_string+0x40/0x40 [ 394.759358] ? rcu_pm_notify+0xc0/0xc0 [ 394.763250] ? copy_mount_options+0x5f/0x380 [ 394.767650] ? rcu_read_lock_sched_held+0x108/0x120 [ 394.772656] ? kmem_cache_alloc_trace+0x616/0x780 [ 394.777494] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 394.783058] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 394.788591] ? copy_mount_options+0x285/0x380 [ 394.793080] ksys_mount+0x12d/0x140 [ 394.796701] SyS_mount+0x35/0x50 [ 394.800055] ? ksys_mount+0x140/0x140 [ 394.803848] do_syscall_64+0x29e/0x9d0 [ 394.807731] ? vmalloc_sync_all+0x30/0x30 [ 394.811868] ? _raw_spin_unlock_irq+0x27/0x70 [ 394.816354] ? finish_task_switch+0x1ca/0x820 [ 394.820839] ? syscall_return_slowpath+0x5c0/0x5c0 [ 394.825762] ? syscall_return_slowpath+0x30f/0x5c0 [ 394.830687] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 394.836050] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 394.840894] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 394.846072] RIP: 0033:0x4552d9 [ 394.849250] RSP: 002b:00007f4cbd4aec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 394.856951] RAX: ffffffffffffffda RBX: 00007f4cbd4af6d4 RCX: 00000000004552d9 [ 394.864207] RDX: 00000000200002c0 RSI: 0000000020000140 RDI: 0000000020000300 [ 394.871462] RBP: 000000000072bea0 R08: 0000000020001280 R09: 0000000000000000 [ 394.878719] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 394.885976] R13: 00000000000003fa R14: 00000000006f9010 R15: 0000000000000010 2018/04/05 21:37:52 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x4, 0x4, 0x45e15e88, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000140)) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000040)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9}, 0x3d1) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000028000)={r1, &(0x7f0000000200), &(0x7f0000000240)="13"}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r1, &(0x7f0000000040)}, 0x10) 2018/04/05 21:37:52 executing program 5 (fault-call:3 fault-nth:17): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000001380)='./file0\x00', &(0x7f0000001340)='proc\x00', 0x0, &(0x7f0000000240)) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000001280)) 2018/04/05 21:37:52 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:52 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0x84c, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:52 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000400008fe7bb5cd4e344cd0002800000720a00ff"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xf, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x1085}, [@jmp={0x5, 0x0, 0xffffffcd}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) 2018/04/05 21:37:52 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0x5b7, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:52 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6ffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:52 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000001380)='./file0\x00', &(0x7f0000001340)='proc\x00', 0x0, &(0x7f0000000240)) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000001280)) 2018/04/05 21:37:52 executing program 6: socketpair$inet6_icmp(0xa, 0x2, 0x3a, &(0x7f0000000100)) r0 = perf_event_open(&(0x7f0000000280)={0x5, 0x70, 0x3, 0x300, 0xf57, 0x9, 0x0, 0x3ff, 0x81180, 0x1, 0x8, 0x4, 0x9, 0x7, 0x40, 0xdf5, 0x0, 0x7, 0x1, 0x2, 0x10000, 0x939, 0x4, 0x10868107, 0x100000001, 0x3, 0x2, 0x8, 0x7551a058, 0x6000000000000, 0x3f, 0x4, 0x3, 0x6, 0x3ff, 0x8, 0x1, 0x1, 0x0, 0x7, 0x3, @perf_bp={&(0x7f00000001c0), 0x3}, 0x200, 0x400000000000000, 0x80000000, 0x2, 0x0, 0xfff, 0x3}, 0x0, 0xa, 0xffffffffffffffff, 0xb) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e0, 0x0, 0x0, 0xb73b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}, 0x4, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, r0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9, 0x1000000000000}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000028000)={r1, &(0x7f0000000200), &(0x7f0000000240)="13"}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r1, &(0x7f0000000040)}, 0x10) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r1, &(0x7f0000000140)="f7e79f9e6057a39c6f5136ab77d5cb0a46fb08ff56bb74ccd2c0666aeb95d318e87702c6c62d4f4bc0aef568070329bfda93f7eda7c5ddb9fc18d9ac957a37fadfb9a7d81ff3e1"}, 0x10) socketpair$inet6_icmp(0xa, 0x2, 0x3a, &(0x7f00000000c0)) [ 395.209491] FAULT_INJECTION: forcing a failure. [ 395.209491] name failslab, interval 1, probability 0, space 0, times 0 [ 395.220972] CPU: 1 PID: 4143 Comm: syz-executor5 Not tainted 4.16.0+ #1 [ 395.227735] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 395.237088] Call Trace: [ 395.239686] dump_stack+0x1b9/0x29f [ 395.243340] ? arch_local_irq_restore+0x52/0x52 [ 395.248019] ? __save_stack_trace+0x7e/0xd0 [ 395.252360] should_fail.cold.4+0xa/0x1a [ 395.256432] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 395.261541] ? kasan_kmalloc+0xc4/0xe0 [ 395.265435] ? kmem_cache_alloc_trace+0x152/0x780 [ 395.270283] ? __memcg_init_list_lru_node+0x17c/0x2c0 [ 395.275483] ? __list_lru_init+0x45e/0x7b0 [ 395.279726] ? sget_userns+0x6d9/0xf20 [ 395.283617] ? mount_ns+0x8f/0x1d0 [ 395.287160] ? graph_lock+0x170/0x170 [ 395.290969] ? do_mount+0x564/0x3070 [ 395.294691] ? ksys_mount+0x12d/0x140 [ 395.298498] ? SyS_mount+0x35/0x50 [ 395.302042] ? do_syscall_64+0x29e/0x9d0 [ 395.306115] ? find_held_lock+0x36/0x1c0 [ 395.310188] ? __lock_is_held+0xb5/0x140 [ 395.314269] ? check_same_owner+0x320/0x320 [ 395.318606] ? rcu_note_context_switch+0x710/0x710 [ 395.323550] should_failslab+0x124/0x180 [ 395.327628] kmem_cache_alloc_trace+0x2cb/0x780 [ 395.332321] ? __kmalloc_node+0x33/0x70 [ 395.336303] ? __kmalloc_node+0x33/0x70 [ 395.340289] ? rcu_read_lock_sched_held+0x108/0x120 [ 395.345322] __memcg_init_list_lru_node+0x17c/0x2c0 [ 395.350352] ? list_lru_add+0x850/0x850 [ 395.354338] ? __kmalloc_node+0x47/0x70 [ 395.358331] __list_lru_init+0x45e/0x7b0 [ 395.362407] ? list_lru_destroy+0x4c0/0x4c0 [ 395.366739] ? __raw_spin_lock_init+0x1c/0x100 [ 395.371335] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 395.376360] ? __lockdep_init_map+0x105/0x590 [ 395.380872] ? lockdep_init_map+0x9/0x10 [ 395.384946] sget_userns+0x6d9/0xf20 [ 395.388661] ? set_anon_super+0x20/0x20 [ 395.392646] ? get_empty_filp.cold.7+0x3e/0x3e [ 395.397237] ? destroy_unused_super.part.9+0x100/0x100 [ 395.402526] ? __alloc_pages_slowpath+0x2dc0/0x2dc0 [ 395.407552] ? kasan_check_read+0x11/0x20 [ 395.411714] ? rcu_pm_notify+0xc0/0xc0 [ 395.415606] ? trace_hardirqs_off+0xd/0x10 [ 395.419846] ? cap_capable+0x1f9/0x260 [ 395.423742] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 395.429284] ? security_capable+0xa4/0xd0 [ 395.433437] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 395.438983] ? ns_capable_common+0x13f/0x170 [ 395.443404] mount_ns+0x8f/0x1d0 [ 395.446777] ? rpc_pipe_release+0xb70/0xb70 [ 395.451106] rpc_mount+0x9e/0xd0 [ 395.454487] mount_fs+0xae/0x328 2018/04/05 21:37:53 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000001380)='./file0\x00', &(0x7f0000001340)='proc\x00', 0x0, &(0x7f0000000240)) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000001280)) 2018/04/05 21:37:53 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:53 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000400008fe7bb5cd4e344cd0002800000720a00ff"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xf, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x7a00000000000000}, [@jmp={0x5, 0x0, 0xffffffcd}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) 2018/04/05 21:37:53 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x100000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:53 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9}, 0x3d1) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000028000)={r0, &(0x7f0000000200), &(0x7f0000000240)="13"}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r0, &(0x7f0000000040)}, 0x10) socketpair(0xa, 0x0, 0x1ff, &(0x7f0000000040)) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f00000000c0)) 2018/04/05 21:37:53 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0x7dc, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:53 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xa8d, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:53 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0xffffffff00000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 395.457868] vfs_kern_mount.part.34+0xd4/0x4d0 [ 395.462457] ? may_umount+0xb0/0xb0 [ 395.466093] ? _raw_read_unlock+0x22/0x30 [ 395.470248] ? __get_fs_type+0x97/0xc0 [ 395.474143] do_mount+0x564/0x3070 [ 395.477693] ? copy_mount_string+0x40/0x40 [ 395.481933] ? rcu_pm_notify+0xc0/0xc0 [ 395.485838] ? copy_mount_options+0x5f/0x380 [ 395.490250] ? rcu_read_lock_sched_held+0x108/0x120 [ 395.495271] ? kmem_cache_alloc_trace+0x616/0x780 [ 395.500124] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 395.505678] ? _copy_from_user+0xdf/0x150 [ 395.509834] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 395.515380] ? copy_mount_options+0x285/0x380 [ 395.519889] ksys_mount+0x12d/0x140 [ 395.523526] SyS_mount+0x35/0x50 [ 395.526898] ? ksys_mount+0x140/0x140 [ 395.530708] do_syscall_64+0x29e/0x9d0 [ 395.534602] ? vmalloc_sync_all+0x30/0x30 [ 395.538758] ? _raw_spin_unlock_irq+0x27/0x70 [ 395.543259] ? finish_task_switch+0x1ca/0x820 [ 395.547765] ? syscall_return_slowpath+0x5c0/0x5c0 [ 395.552700] ? syscall_return_slowpath+0x30f/0x5c0 [ 395.557646] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 395.563019] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 395.567868] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 395.573043] RIP: 0033:0x4552d9 [ 395.576218] RSP: 002b:00007f4cbd4aec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 395.583912] RAX: ffffffffffffffda RBX: 00007f4cbd4af6d4 RCX: 00000000004552d9 [ 395.591171] RDX: 00000000200002c0 RSI: 0000000020000140 RDI: 0000000020000300 [ 395.599117] RBP: 000000000072bea0 R08: 0000000020001280 R09: 0000000000000000 [ 395.606369] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 395.613622] R13: 00000000000003fa R14: 00000000006f9010 R15: 0000000000000011 2018/04/05 21:37:53 executing program 5 (fault-call:3 fault-nth:18): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000001380)='./file0\x00', &(0x7f0000001340)='proc\x00', 0x0, &(0x7f0000000240)) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000001280)) 2018/04/05 21:37:53 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:53 executing program 6: socketpair(0x1, 0x801, 0x7d1, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair(0x3, 0xa, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f00000001c0)='./file0\x00', 0x0, 0x10}, 0x10) r3 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x2000000000004, 0x4, 0x9, 0x1, 0xffffffffffffffff, 0x2000000000}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000180)={r3, &(0x7f00000000c0)="a809f0fe2abc6b90091be0e7783b3269a1b80098027d88ec274d964cd87ead95c051cbca39d1bce2be0d90b248a64c0e459b138419743841b6efa8e03ceb42aade11dcb83381f27f4629bc3151c7af98fb72b7b08e66fcdbe4870534e470d302a19b200e2249bbe66aab79ba09c928067b0676cb0bf6e433af72cd1b416778ed221f29fc8a86f4248550c19c361ba6f7ef1c5c12cb94", &(0x7f0000000040)=""/21}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000028000)={r4, &(0x7f0000000200), &(0x7f0000000240)="13"}, 0x20) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000003c0)={r0, 0x28, &(0x7f0000000380)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400)={r5, 0xffffffffffffff81, 0x10}, 0xc) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r4, &(0x7f0000000040)}, 0x10) 2018/04/05 21:37:53 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x200000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:53 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000400008fe7bb5cd4e344cd0002800000720a00ff"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xf, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x2702000000000000}, [@jmp={0x5, 0x0, 0xffffffcd}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) 2018/04/05 21:37:53 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0x5d6, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:53 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0x4d3, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:53 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000001380)='./file0\x00', &(0x7f0000001340)='proc\x00', 0x0, &(0x7f0000000240)) mount(&(0x7f0000000300)="2e2f66696c6530c0", &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000001280)) [ 395.830793] FAULT_INJECTION: forcing a failure. [ 395.830793] name failslab, interval 1, probability 0, space 0, times 0 [ 395.842132] CPU: 1 PID: 4190 Comm: syz-executor5 Not tainted 4.16.0+ #1 [ 395.848893] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 395.858248] Call Trace: [ 395.860847] dump_stack+0x1b9/0x29f [ 395.864488] ? arch_local_irq_restore+0x52/0x52 [ 395.869167] ? __save_stack_trace+0x7e/0xd0 [ 395.873509] should_fail.cold.4+0xa/0x1a [ 395.877592] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 395.882729] ? kasan_kmalloc+0xc4/0xe0 [ 395.886626] ? kmem_cache_alloc_trace+0x152/0x780 [ 395.891481] ? __memcg_init_list_lru_node+0x17c/0x2c0 [ 395.896664] ? __list_lru_init+0x45e/0x7b0 [ 395.900902] ? sget_userns+0x6d9/0xf20 [ 395.904774] ? mount_ns+0x8f/0x1d0 [ 395.908300] ? graph_lock+0x170/0x170 [ 395.912085] ? do_mount+0x564/0x3070 [ 395.915783] ? ksys_mount+0x12d/0x140 [ 395.919568] ? SyS_mount+0x35/0x50 [ 395.923096] ? do_syscall_64+0x29e/0x9d0 [ 395.927145] ? find_held_lock+0x36/0x1c0 [ 395.931196] ? __lock_is_held+0xb5/0x140 [ 395.935252] ? check_same_owner+0x320/0x320 [ 395.939559] ? rcu_note_context_switch+0x710/0x710 [ 395.944479] should_failslab+0x124/0x180 [ 395.948532] kmem_cache_alloc_trace+0x2cb/0x780 [ 395.953188] ? __kmalloc_node+0x33/0x70 [ 395.957150] ? __kmalloc_node+0x33/0x70 [ 395.961113] ? rcu_read_lock_sched_held+0x108/0x120 [ 395.966120] __memcg_init_list_lru_node+0x17c/0x2c0 [ 395.971124] ? list_lru_add+0x850/0x850 [ 395.975087] ? __kmalloc_node+0x47/0x70 [ 395.979054] __list_lru_init+0x45e/0x7b0 [ 395.983106] ? list_lru_destroy+0x4c0/0x4c0 [ 395.987411] ? __raw_spin_lock_init+0x1c/0x100 [ 395.991982] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 395.996984] ? __lockdep_init_map+0x105/0x590 [ 396.001467] ? lockdep_init_map+0x9/0x10 [ 396.005520] sget_userns+0x6d9/0xf20 [ 396.009216] ? set_anon_super+0x20/0x20 [ 396.013175] ? get_empty_filp.cold.7+0x3e/0x3e [ 396.017743] ? destroy_unused_super.part.9+0x100/0x100 [ 396.023013] ? __alloc_pages_slowpath+0x2dc0/0x2dc0 [ 396.028027] ? kasan_check_read+0x11/0x20 [ 396.032163] ? rcu_pm_notify+0xc0/0xc0 [ 396.036036] ? trace_hardirqs_off+0xd/0x10 [ 396.040257] ? cap_capable+0x1f9/0x260 [ 396.044133] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 396.049656] ? security_capable+0xa4/0xd0 [ 396.053790] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 396.059313] ? ns_capable_common+0x13f/0x170 [ 396.063710] mount_ns+0x8f/0x1d0 [ 396.067059] ? rpc_pipe_release+0xb70/0xb70 [ 396.071367] rpc_mount+0x9e/0xd0 [ 396.074721] mount_fs+0xae/0x328 [ 396.078079] vfs_kern_mount.part.34+0xd4/0x4d0 [ 396.082647] ? may_umount+0xb0/0xb0 [ 396.086259] ? _raw_read_unlock+0x22/0x30 [ 396.090390] ? __get_fs_type+0x97/0xc0 [ 396.094266] do_mount+0x564/0x3070 [ 396.097798] ? copy_mount_string+0x40/0x40 [ 396.102023] ? rcu_pm_notify+0xc0/0xc0 [ 396.105904] ? copy_mount_options+0x5f/0x380 [ 396.110295] ? rcu_read_lock_sched_held+0x108/0x120 [ 396.115295] ? kmem_cache_alloc_trace+0x616/0x780 [ 396.120125] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 396.125646] ? _copy_from_user+0xdf/0x150 [ 396.129781] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 396.135303] ? copy_mount_options+0x285/0x380 [ 396.139796] ksys_mount+0x12d/0x140 [ 396.143410] SyS_mount+0x35/0x50 [ 396.146761] ? ksys_mount+0x140/0x140 [ 396.150551] do_syscall_64+0x29e/0x9d0 [ 396.154421] ? vmalloc_sync_all+0x30/0x30 [ 396.158552] ? _raw_spin_unlock_irq+0x27/0x70 [ 396.163036] ? finish_task_switch+0x1ca/0x820 [ 396.167527] ? syscall_return_slowpath+0x5c0/0x5c0 [ 396.172442] ? syscall_return_slowpath+0x30f/0x5c0 [ 396.177361] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 396.182716] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 396.187551] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 396.192725] RIP: 0033:0x4552d9 [ 396.195897] RSP: 002b:00007f4cbd4aec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 396.203593] RAX: ffffffffffffffda RBX: 00007f4cbd4af6d4 RCX: 00000000004552d9 [ 396.210846] RDX: 00000000200002c0 RSI: 0000000020000140 RDI: 0000000020000300 [ 396.218097] RBP: 000000000072bea0 R08: 0000000020001280 R09: 0000000000000000 [ 396.225348] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 2018/04/05 21:37:54 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000001380)='./file0\x00', &(0x7f0000001340)='proc\x00', 0x0, &(0x7f0000000240)) mount(&(0x7f0000000300)="2e2f66696c653006", &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000001280)) 2018/04/05 21:37:54 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xfda, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:54 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 396.232599] R13: 00000000000003fa R14: 00000000006f9010 R15: 0000000000000012 2018/04/05 21:37:54 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0x575, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:54 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8cffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:54 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000400008fe7bb5cd4e344cd0002800000720a00ff"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xf, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x4000000}, [@jmp={0x5, 0x0, 0xffffffcd}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) 2018/04/05 21:37:54 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9}, 0x3d1) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000028000)={r0, &(0x7f0000000200), &(0x7f0000000240)="13"}, 0x20) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r0, &(0x7f0000000040)}, 0x10) 2018/04/05 21:37:54 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x4000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:54 executing program 5 (fault-call:3 fault-nth:19): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000001380)='./file0\x00', &(0x7f0000001340)='proc\x00', 0x0, &(0x7f0000000240)) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000001280)) 2018/04/05 21:37:54 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000001380)='./file0\x00', &(0x7f0000001340)='proc\x00', 0x0, &(0x7f0000000240)) mount(&(0x7f0000000300)="2e2f66696c6530f8", &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000001280)) 2018/04/05 21:37:54 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:54 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000400008fe7bb5cd4e344cd0002800000720a00ff"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xf, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x74}, [@jmp={0x5, 0x0, 0xffffffcd}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) 2018/04/05 21:37:54 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0x34b, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:54 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x8cffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:54 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9}, 0x3d1) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000180)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000028000)={r0, &(0x7f0000000200), &(0x7f0000000240)="13"}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r0, &(0x7f0000000040)}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)={&(0x7f0000000040)='./file0\x00', 0x0, 0x18}, 0x10) r1 = socket$kcm(0x29, 0x5, 0x0) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000140)={r2}) 2018/04/05 21:37:54 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0x7ed, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) [ 396.590848] FAULT_INJECTION: forcing a failure. [ 396.590848] name failslab, interval 1, probability 0, space 0, times 0 [ 396.602175] CPU: 1 PID: 4236 Comm: syz-executor5 Not tainted 4.16.0+ #1 [ 396.608937] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 396.618294] Call Trace: [ 396.620900] dump_stack+0x1b9/0x29f [ 396.624542] ? arch_local_irq_restore+0x52/0x52 [ 396.629219] ? __save_stack_trace+0x7e/0xd0 [ 396.633562] should_fail.cold.4+0xa/0x1a 2018/04/05 21:37:54 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000001380)='./file0\x00', &(0x7f0000001340)='proc\x00', 0x0, &(0x7f0000000240)) mount(&(0x7f0000000300)="2e2f66696c6530ff", &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000001280)) 2018/04/05 21:37:54 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0xffffff8c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 396.637643] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 396.642756] ? kasan_kmalloc+0xc4/0xe0 [ 396.646649] ? kmem_cache_alloc_trace+0x152/0x780 [ 396.651498] ? __memcg_init_list_lru_node+0x17c/0x2c0 [ 396.656691] ? __list_lru_init+0x45e/0x7b0 [ 396.660929] ? sget_userns+0x6d9/0xf20 [ 396.664821] ? mount_ns+0x8f/0x1d0 [ 396.668366] ? graph_lock+0x170/0x170 [ 396.672175] ? do_mount+0x564/0x3070 [ 396.675894] ? ksys_mount+0x12d/0x140 [ 396.679698] ? SyS_mount+0x35/0x50 [ 396.683248] ? do_syscall_64+0x29e/0x9d0 [ 396.687330] ? find_held_lock+0x36/0x1c0 2018/04/05 21:37:54 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff8c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 396.691410] ? __lock_is_held+0xb5/0x140 [ 396.695500] ? check_same_owner+0x320/0x320 [ 396.699833] ? rcu_note_context_switch+0x710/0x710 [ 396.704776] should_failslab+0x124/0x180 [ 396.708849] kmem_cache_alloc_trace+0x2cb/0x780 [ 396.713526] ? __kmalloc_node+0x33/0x70 [ 396.717510] ? __kmalloc_node+0x33/0x70 [ 396.721501] ? rcu_read_lock_sched_held+0x108/0x120 [ 396.726534] __memcg_init_list_lru_node+0x17c/0x2c0 [ 396.731561] ? list_lru_add+0x850/0x850 [ 396.735542] ? __kmalloc_node+0x47/0x70 [ 396.739532] __list_lru_init+0x45e/0x7b0 [ 396.743609] ? list_lru_destroy+0x4c0/0x4c0 [ 396.747937] ? __raw_spin_lock_init+0x1c/0x100 [ 396.752534] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 396.757557] ? __lockdep_init_map+0x105/0x590 [ 396.762058] ? lockdep_init_map+0x9/0x10 [ 396.766131] sget_userns+0x6d9/0xf20 [ 396.769851] ? set_anon_super+0x20/0x20 [ 396.773836] ? get_empty_filp.cold.7+0x3e/0x3e [ 396.778426] ? destroy_unused_super.part.9+0x100/0x100 [ 396.783715] ? __alloc_pages_slowpath+0x2dc0/0x2dc0 2018/04/05 21:37:54 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8cffffff00000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:54 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 396.788737] ? kasan_check_read+0x11/0x20 [ 396.792892] ? rcu_pm_notify+0xc0/0xc0 [ 396.796785] ? trace_hardirqs_off+0xd/0x10 [ 396.801027] ? cap_capable+0x1f9/0x260 [ 396.804926] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 396.810475] ? security_capable+0xa4/0xd0 [ 396.814629] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 396.820169] ? ns_capable_common+0x13f/0x170 [ 396.824588] mount_ns+0x8f/0x1d0 [ 396.827960] ? rpc_pipe_release+0xb70/0xb70 [ 396.832287] rpc_mount+0x9e/0xd0 [ 396.835660] mount_fs+0xae/0x328 [ 396.839042] vfs_kern_mount.part.34+0xd4/0x4d0 [ 396.843632] ? may_umount+0xb0/0xb0 [ 396.847270] ? _raw_read_unlock+0x22/0x30 [ 396.851427] ? __get_fs_type+0x97/0xc0 [ 396.855332] do_mount+0x564/0x3070 [ 396.858885] ? copy_mount_string+0x40/0x40 [ 396.863125] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 396.867894] ? retint_kernel+0x10/0x10 [ 396.871795] ? copy_mount_options+0x1a1/0x380 [ 396.876295] ? __sanitizer_cov_trace_pc+0x3b/0x50 [ 396.881143] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 396.886679] ? copy_mount_options+0x285/0x380 [ 396.891188] ksys_mount+0x12d/0x140 [ 396.894825] SyS_mount+0x35/0x50 [ 396.898200] ? ksys_mount+0x140/0x140 [ 396.902009] do_syscall_64+0x29e/0x9d0 [ 396.905901] ? vmalloc_sync_all+0x30/0x30 [ 396.910053] ? _raw_spin_unlock_irq+0x27/0x70 [ 396.914551] ? finish_task_switch+0x1ca/0x820 [ 396.919055] ? syscall_return_slowpath+0x5c0/0x5c0 [ 396.923991] ? syscall_return_slowpath+0x30f/0x5c0 [ 396.928933] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 396.934310] ? trace_hardirqs_off_thunk+0x1a/0x1c 2018/04/05 21:37:54 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9}, 0x3d1) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000028000)={r0, &(0x7f0000000200), &(0x7f0000000240)="13"}, 0x20) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={&(0x7f0000000040)='./file0\x00', r0}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r0, 0x28, &(0x7f0000000200)}, 0x10) socketpair(0x15, 0xa, 0x380000000000, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000013c0)={r1, &(0x7f00000002c0)="a6357bf3a9a0f86d1c1508eaff2db50e19f86c381dcb723ec1cdd4521f964626d2b6dc8aae526b4a1df143b9ee949c2591aaad721d7d4cf1a4ea063edfc56739ecf5fe4b1b0a75437c1ffc2ed4123576d1877f9fd7d5b337b8f2102de624da745e2e67c6f762ff3cdea6d59eaf6a4e1d5dd0646d3e802fdf16cfc014938fe0c22a87bf5646cdde71f85905e3080b1267d058e003db66969db94107a255e0c3753248e3083fe85eb0cf9e61675f55adfb485fc660ac5e65b5ec81b4181e342e37ba47cd6dd10e857b655714a492eaeb25a1936f0c0c899bbdd8384c4b1c6a70cfe5851d3376df5efd97e4335ca7cb3fe724ee8295bc2227d06097bad15f8c9ccb2b1ee78bc8788dda6045bffc420419138222aa90b0e2d0d85f7e90c7adbf20b46327b38bd0656fcc3ae79f59b24f8abed2d025dfb52f40ae6eb11430bd3d396d12ece7a2eb8aaf03dfda0003c920582fa24c254af78eb2b753821933fd68ca083fa9568670c149ce7a8b24a658c292e3b0ad490646c933e87c51d5cbf0508c1afc820f8e49dc9c9ff04373ad83677ba581084f17ff25211d9fe61de553fb3baf07b4f875adca88e0a4f72801bf5eaee7c21758cecc495d63cd6db5c938f4c5561220526d11dede742434490927247cf7e880db52a5f6f799e535dc0742c1788d16fc8e98b76798fdb39ed4f98d9f1d72893194b4ca761600ed4893f9a3a639ba258066fb899e0b07e858a7cbb6db6079ed2035eb471bd869e88e0c9ff18373fd0fc114f2c4f5cee604819e70b187802180d5005dce270564e33a7c9f04ae5f26ff88c7e850b51c03018b71868a454766d4839436ef5a6f075bbd6ee82ec187ff651d3fcfeaeffbcfcc5b6c1961b276e300ace17452e3ff0b9b4edd433d9ee8659a8d38f859b21350dac00bc45f8d751dc5aaf42d0c96ce418af7825273eba0689b80536a2274699d3d9c14f2f788710c378753d04a610241d3b5250f2599d30d162ade5030cb853b09a30b653486122226778e91ee41bef443e448dd9907e7a77fa7d721208368eff3ea19e413542948e5f6ff69fe4d05523ebb402ada501550bb6d39d49d2926e69e4eaff34e50a1811aebe11259ee54f7889c70c600e4121ac0ba8d07facd973dc1fc339f89dda814917ece207b5fb2a61e51ccbadb225665a79d08773d2c249d481697236b43958415821d830a77857d9abb5dd11327107384bc0f5cae7c34d04c1bbab0ec48d4092110aeefb2bac85a4e5c2319d88266da0ab437b1d9c1b039f23ba79093c75dba35bf6ced2799608202eff0c90199fb880aad4ce0b8bc99ae1b8bfb4b73cb1a42b5c1ca4af9d52cbc1f56d0125bc290b1b58d0ec49194307cccf75b7dd1b87d83ba6030241a63b4028cdf6ffcb5c0a10fa43606d76d8ae1ae38b692cc4414ac69afcebfd64741a107d511d06ce04e0431fcdd6bad33872eaa4a67bc00888938d768143b061dfa8df4535418e7e814a7b4a26c59f3f13862782cd2a698eb7ddbfb9b9b0c33fef1667c739d037561026abf111f178588145d6645f34b595af894e0963b52d3ed542d11e5dc103bc9a4febb047b7da721157e6ed5428714ac73a0fd93baa8577787e61c5e59baac345f46e4cb360272e580a0ccdbecccd4a158a4e6af0b1205d8df2593746fdaab3ef2ed5d43fda7bda3439c610d73767b0e4900d00c9ee33c3a28c4f56b89732a0dfaca8060f490b53af5a4f8188c7031c4d2a5915d970260a7909fcccaa93b981cba1d1811f3588ad62db48ec298a4cf892bde66b99963136e3ccb6ba6bb0906b8e57d48e90239e14bb0dedea4ea04c7f4525b3bb850adb60f35c8015f6f77e29a5b964e0146646bd2a33596985fb94d6efb37cd2b30fd4834af2da65d75af3f9fd3245aa372bd2cb666e059678c8216c98a4a50b6108816d28e669c21861d25aa6f49504dd00feffd143bcc6095cf5e8c6a2618a7e68ed796750d070b460988f8bf8e61b820c1a2240fc4a71991f84489dc74d76399577ed29827bf1ea8a7a8f7f8be4b84b8824f32fd7c6eaa0b9246efd47602df6180b13528c0371d6b4589a21fbc848c1bfa92b96ef81110263a6072e204ec900ee44270024ff2553ba648b42aacb0469449db2257ca9207723ace60797453d77ee17f2336b0b67db361a56985b3e81306791cd007eae7f7a2077cd1d2273209b34d33b6776dfe3474fc5f8a850311c9c7143f4a3fb295f9baed489a18df51ae326a7fcf86a5c276085c6e0d0f0adc0332086bd2155e655df042f4544c3cd3296248046e576eb66b37f96265cebb472e21bebc9d0138b003de86a5afe246b16488d62de98a098e20797cb773331ec98401d97f0ff8ee39d9b1def405d4ba29fcc553c0938b8c37451d065a46f39c85f77a1edf932ffe6cb2690201a18bd85487d68c70a45f0f624bba465bebed8f7b7e5c08a2c7b4979679a57ff1fd431d4f3e347372199f8b566acbd26ec0b9c6cf229381c9c311cf2bdf221047a158105cbc589a22ba47ea3e01e21e78c14dd6b8507f3b84c3bf98be2af32e6fee6955bf86f643b34494fd56706bcc14769c538826996988285b70858ba5a6c0312f1660a9cb27bcd0e90b7c3e34530902b830f04506bc41ac8314685b1ad8e699eb76c475674676a79e81042066f6fad9d19426d6634494b54d3512a16fffedb4c1097498dcd8cdf1660297207ac02101453147f7c8f4a8d01f21a2eedac6ebb2aa014af982490e2e3c9f4caf89f17ec8292e5d9cbaf20a2774e5f3c4c734d0e4914352967f91f16efacb20f2d08ead70eadb262597c58985df2b6ff71a19d2c6120536620c339e18d5bba2dd832d78b18ba4d57000d79881dd46a5e8630f5b4b349029697a125361ead0edd486ca07405fa395153fa8cc1f37b6954a93290d4d3750b519d13170ad84f6b5296f7dd18eabeee1db8089fc223da50e7cabcb3ff67b89e3960bdcd98a784ec5c131ed5aebdee05cf5f2a749139a7b13ef7902b383770c086e2686df785d3a921bbcc0416b4dd38acbee84167e918579a627e2c8cd01049dd92396fb0b224b6a879dce8973b7d3d23bac1b220ca4fbfb520dc35b39e097e0796247c32f75e297aa4b49d3fbbd86047d02ed1b248ca2fc3df17d45ca04fc58c0e5bf6062962a502bbd2a9a9ea0d97174543c2ef3a6abcfff79763d8fb69b40aefcc4af148e6e4ce874d28c06e5db8a373b8b4397070e9554bb77324c6bb5a19ac4c16a240d158cc2efbd564fe7ba87a48859a58260568356d7876b9318b42b6ba1af4c2c2e9a014f90ef14fbdcb3ce122273f825451a705aa9617a14acfa2d164ef2a29bad9410d94e1a8cf8bd4aab7717d59fea5aa32de7d1798fb2fb3b9db58f156191fed97df50df1c4005a305c88aaaa499f111b64864a2cafabc00c59810ea2c8ab7be7f6e4733c596520892a3743abbe567ba8d7102d5e00b989187c9d6369eb0b18203a30a517c6136ad1dce735a4f44744de3db18332e3bf7182fb6cc37994baa691c36233eb56175f2ad2bc047974ad98a9ccbf2aabde5ba715714e4c222e95f53ecb4abf9a7783c1fe9208a3a594ce35315d26af5f85360730d50c814ab9803653bd1e463a3f5b7bc9525b8ccee8df0901da53f7c0a2e7933a51073579c89f4e814853e584f7556f3ed9c2312a342c589e921c6863b626011315da46c08ccde0e7f7f387211206b9816a2eede77480e2527c74e9aa66c089e7b425896a3789bb4778b4b1d9b9ee569150dc5e5c3599489323111e1b3ffc5110492eb91b58ce96c645d4041bbb5a9aa2e8da0a0ac406518963a2b0b332d4ee031f36141c3636a4416a08fe8749df9ae60d6f44ad7c86872b10b332589b3e1f7240026e151c5282d7f9f971c49e3092fc4deaf1daf7253f1f38eb45fcb8581bfd04f653ff8597f90330698eb41e962f7a511e696e2ed290f190d90d1ad3581aa278f45067d40ab1ccdca870825b43bc0caed7f99c6e46233390af9c8b054458d489371aed317f0a5a2c977d915e43c105aea643646d6e4a1d80c1c92313aef0afedd586e03ec39aa48706eff46a9b018b4b51668a5893dc763cb36bba6e7ebc5a1c2ef0580b81956e156c323ff94e7b118b3c7f2fed98e03e9e4f3c1c6cd1a381fcf18caa89633449e3b40033161baf1f226ba1b2409de80721ee367e306754c8b837cdaca6719a6263b2bc3cabef1f997b370bb30790dad2283c818d39451a379b9d84a63e7b5f04211da5f759f56e7cfaebadb8b42d6de65e432620705f3dec7d5c8cba86730c3604ab279e61d8e1463547a212550140d0135dc88e6da8aeab17b487547a46f2cb2135f1d42e3e2af789ae9945af18e8ee7e5fdb5341cdc5b87971518e5715d7e695c49bf2a3646f2a908eb18f9ac928d61a57435ced06593253fac871fa62ad1667405c41a6d5ac82b8917a1baf74f4f7cb3666742b71ccd798cc9c1f0a8fe69a9482edab15e9470eb6a9fdd83715836fc20d2cd5278d88cd18c1b648ce3b19299283d33472db107c432e1bc0d7e102c6664b18b759182fc5fa682c2d802185e0faa9104985e9e9bff6a61e412c88c416d64d5d22fd34d6d3bf04a2423dc2d85387d9153a7c90d66a13fafab940870f83163f39e4f3aa06b8aab40606864bf4b2bb625fe17b0b0125c7876650c0d7fd70d8b45f59734fdc017c4964d849fa42aad811e5116d078ebc1a5c6203db0172037e548d8c124db16afaf7c3b69731f0e2e8f0247983d4c913a26a4c49b3973410d1dbc1534abe627421e38d372693cd5840a90b62f31c81aa50bc69f7438b543def755a3099c177247709f84f266041d0a03cb9c1b8e87e7aaf92690b662dc2774a300ef2f06dbdd146d0962f584270af07409f8a18e89236745c2623b719599aea5ca7e7e2628bfe52ca0f5a84718689cd554082535ba47b1660f284c15d97c19466637ec7414405eee6ff29c3c2f7da82098c57717945620f3f338fda1e0176a2c3f6820c1f11d35b9fa5831d74d1f23816735000a3ca28234c6647a36f5216a0f1e19048cfd3ba5c94340cc25a39602395f10a4992e9573888fd6b6923cd6ae65a9f1f57883e2a599e03a17f3b069320234be78280caab55a7af78e405184e260e1194d8c0c1476f2f24d2bcc0cd38bcf879222c2c0597bcc3f5e3386663e0b60837780aa2c8995fd711e33e36567573e049896ec3b901d2114fa8680f4fbf307c8ffa8f7da0f7ec0021c0203d14573be523b1575f984e5ff86031f980188a064a9c8c91711be5313cce20866430c0da479d4ebc8fe5438fcde5bece796952c033ca6bf41f323c48b280fd14a7f72c44811279680f50faafecbf373f4632b9e7aedeb4e4f9475e24c58802cbf44794fa76f7685e1d9c550277607c641f3b373d51cecc683068c591507ae668284f4dbfb13b6679318fc9617ad66095877110ad80b8ef3f2065a95cdbca3b2e41765444fb941baf2ef25225535843288fbf1cd35a083f91883874605cad36c3d8b7d3b085ef8ca0dae688ced580e4aaba31a6ed1b52ec72092d82e0209b3fde7b113cf29b1aa580995ee2f5c1dbece4b039d4ca016d5bd71f2eb3f896c7e6d958f137af54f512cf589143613849d458544ee532fd396e70b9d3b932ed2f86c4c6d9583311ad90a9121c6ba19a3311acdaa11f363577370f34b35d4c881d0c1f0f4a0a8e79f582537299e2cfb1bde62bd61f425d537402e726e196cb461b1779aff639f98739f79d7630bbbb4be83f1c258e32f0a15dd9cbe91bef1f11d2e4eeeba9088c7ed421280cab7f25", &(0x7f00000012c0)=""/213}, 0x18) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000001c0)={r2, &(0x7f0000000140)="0f62f6c59cad4183b202ba4c0e96970037a2efb0aec647fe6d7b3e5b7779f4e2e9df18f71011e47bd3dd21f41704bc535fdc0e2ec7dff5406ee4fc3ff1473345eb162c211fe0eadac100cc71d9a94256a0f516009400aafb0f9b41"}, 0x10) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r0, &(0x7f0000000040)}, 0x10) 2018/04/05 21:37:54 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:54 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 396.939166] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 396.944357] RIP: 0033:0x4552d9 [ 396.947543] RSP: 002b:00007f4cbd4aec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 396.955261] RAX: ffffffffffffffda RBX: 00007f4cbd4af6d4 RCX: 00000000004552d9 [ 396.962528] RDX: 00000000200002c0 RSI: 0000000020000140 RDI: 0000000020000300 [ 396.969795] RBP: 000000000072bea0 R08: 0000000020001280 R09: 0000000000000000 [ 396.977061] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 396.984333] R13: 00000000000003fa R14: 00000000006f9010 R15: 0000000000000013 2018/04/05 21:37:55 executing program 5 (fault-call:3 fault-nth:20): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000001380)='./file0\x00', &(0x7f0000001340)='proc\x00', 0x0, &(0x7f0000000240)) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000001280)) 2018/04/05 21:37:55 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x8cffffff00000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:55 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000028000)={0xffffffffffffffff, &(0x7f0000000200), &(0x7f0000000240)="13"}, 0x20) recvmsg(0xffffffffffffffff, &(0x7f00000123c0)={&(0x7f000000ee00)=@hci={0x0, 0x0}, 0x80, &(0x7f0000012280)=[{&(0x7f000000ee80)=""/135, 0x87}, {&(0x7f000000ef40)=""/44, 0x2c}, {&(0x7f000000ef80)=""/13, 0xd}, {&(0x7f000000efc0)=""/4096, 0x1000}, {&(0x7f000000ffc0)=""/4096, 0x1000}, {&(0x7f0000010fc0)=""/64, 0x40}, {&(0x7f0000011000)=""/238, 0xee}, {&(0x7f0000011100)=""/4096, 0x1000}, {&(0x7f0000012100)=""/114, 0x72}, {&(0x7f0000012180)=""/254, 0xfe}], 0xa, &(0x7f0000012340)=""/101, 0x65, 0x86}, 0x10143) bpf$PROG_LOAD(0x5, &(0x7f0000012400)={0xe, 0xa, &(0x7f0000000000)=@raw=[@ldst={0x3, 0x2, 0x7, 0x8, 0xd, 0xfffffffe, 0xffffffffffffffff}, @exit={0x95}, @call={0x85, 0x0, 0x0, 0x28}, @ldst={0x3, 0x1, 0x0, 0x4, 0x2, 0x8, 0x10}, @jmp={0x5, 0x400, 0xf, 0x5, 0x1, 0xfffffffe}], &(0x7f00000000c0)='syzkaller\x00', 0x101, 0x7b, &(0x7f0000000100)=""/123, 0x41f00, 0x1, [], r0}, 0x48) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000040)}, 0x10) 2018/04/05 21:37:55 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:55 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0x6f1, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:55 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0x93e, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:55 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000001380)='./file0\x00', &(0x7f0000001340)='proc\x00', 0x0, &(0x7f0000000240)) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000001280)) 2018/04/05 21:37:55 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000400008fe7bb5cd4e344cd0002800000720a00ff"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xf, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x85ffffff00000000}, [@jmp={0x5, 0x0, 0xffffffcd}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) 2018/04/05 21:37:55 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0x1d6, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:55 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000001380)='./file0\x00', &(0x7f0000001340)='proc\x00', 0x0, &(0x7f0000000240)) mount(&(0x7f0000000300)="2e2f66696c653003", &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000001280)) [ 397.248717] FAULT_INJECTION: forcing a failure. [ 397.248717] name failslab, interval 1, probability 0, space 0, times 0 [ 397.260082] CPU: 1 PID: 4301 Comm: syz-executor5 Not tainted 4.16.0+ #1 [ 397.266840] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 397.276192] Call Trace: [ 397.278800] dump_stack+0x1b9/0x29f [ 397.282450] ? arch_local_irq_restore+0x52/0x52 [ 397.287131] ? __save_stack_trace+0x7e/0xd0 [ 397.291476] should_fail.cold.4+0xa/0x1a [ 397.295549] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 397.300657] ? kasan_kmalloc+0xc4/0xe0 [ 397.304550] ? kmem_cache_alloc_trace+0x152/0x780 [ 397.309392] ? __memcg_init_list_lru_node+0x17c/0x2c0 [ 397.314572] ? __list_lru_init+0x45e/0x7b0 [ 397.318796] ? sget_userns+0x6d9/0xf20 [ 397.322677] ? mount_ns+0x8f/0x1d0 [ 397.326204] ? graph_lock+0x170/0x170 [ 397.329988] ? do_mount+0x564/0x3070 [ 397.333686] ? ksys_mount+0x12d/0x140 [ 397.337471] ? SyS_mount+0x35/0x50 [ 397.340997] ? do_syscall_64+0x29e/0x9d0 [ 397.345051] ? find_held_lock+0x36/0x1c0 [ 397.349099] ? __lock_is_held+0xb5/0x140 [ 397.353155] ? check_same_owner+0x320/0x320 [ 397.357462] ? rcu_note_context_switch+0x710/0x710 [ 397.362379] should_failslab+0x124/0x180 [ 397.366434] kmem_cache_alloc_trace+0x2cb/0x780 [ 397.371085] ? __kmalloc_node+0x33/0x70 [ 397.375049] ? __kmalloc_node+0x33/0x70 [ 397.379016] ? rcu_read_lock_sched_held+0x108/0x120 [ 397.384030] __memcg_init_list_lru_node+0x17c/0x2c0 [ 397.389035] ? list_lru_add+0x850/0x850 [ 397.392997] ? __kmalloc_node+0x47/0x70 [ 397.396967] __list_lru_init+0x45e/0x7b0 [ 397.401020] ? list_lru_destroy+0x4c0/0x4c0 [ 397.405327] ? __raw_spin_lock_init+0x1c/0x100 [ 397.409897] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 397.414903] ? __lockdep_init_map+0x105/0x590 [ 397.419383] ? lockdep_init_map+0x9/0x10 [ 397.423433] sget_userns+0x6d9/0xf20 [ 397.427131] ? set_anon_super+0x20/0x20 [ 397.431093] ? get_empty_filp.cold.7+0x3e/0x3e [ 397.435660] ? destroy_unused_super.part.9+0x100/0x100 [ 397.440927] ? __alloc_pages_slowpath+0x2dc0/0x2dc0 [ 397.445929] ? kasan_check_read+0x11/0x20 [ 397.450064] ? rcu_pm_notify+0xc0/0xc0 [ 397.453933] ? trace_hardirqs_off+0xd/0x10 [ 397.458154] ? cap_capable+0x1f9/0x260 [ 397.462035] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 397.467557] ? security_capable+0xa4/0xd0 [ 397.471691] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 397.477213] ? ns_capable_common+0x13f/0x170 [ 397.481615] mount_ns+0x8f/0x1d0 [ 397.484969] ? rpc_pipe_release+0xb70/0xb70 [ 397.489275] rpc_mount+0x9e/0xd0 [ 397.492627] mount_fs+0xae/0x328 [ 397.495982] vfs_kern_mount.part.34+0xd4/0x4d0 [ 397.500551] ? may_umount+0xb0/0xb0 [ 397.504162] ? _raw_read_unlock+0x22/0x30 [ 397.508296] ? __get_fs_type+0x97/0xc0 [ 397.512171] do_mount+0x564/0x3070 [ 397.515698] ? copy_mount_string+0x40/0x40 [ 397.519919] ? rcu_pm_notify+0xc0/0xc0 [ 397.523796] ? copy_mount_options+0x5f/0x380 [ 397.528186] ? rcu_read_lock_sched_held+0x108/0x120 [ 397.533189] ? kmem_cache_alloc_trace+0x616/0x780 [ 397.538031] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 397.543555] ? copy_mount_options+0x285/0x380 [ 397.548039] ksys_mount+0x12d/0x140 [ 397.551653] SyS_mount+0x35/0x50 [ 397.555001] ? ksys_mount+0x140/0x140 [ 397.558792] do_syscall_64+0x29e/0x9d0 [ 397.562665] ? vmalloc_sync_all+0x30/0x30 [ 397.566798] ? kasan_check_write+0x14/0x20 [ 397.571026] ? syscall_return_slowpath+0x5c0/0x5c0 [ 397.575939] ? syscall_return_slowpath+0x30f/0x5c0 [ 397.580858] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 397.586215] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 397.591049] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 397.596220] RIP: 0033:0x4552d9 2018/04/05 21:37:55 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0xf6ffffff00000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:55 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6ffffff00000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 397.599394] RSP: 002b:00007f4cbd4aec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 397.607088] RAX: ffffffffffffffda RBX: 00007f4cbd4af6d4 RCX: 00000000004552d9 [ 397.614342] RDX: 00000000200002c0 RSI: 0000000020000140 RDI: 0000000020000300 [ 397.621597] RBP: 000000000072bea0 R08: 0000000020001280 R09: 0000000000000000 [ 397.628865] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 397.636116] R13: 00000000000003fa R14: 00000000006f9010 R15: 0000000000000014 2018/04/05 21:37:55 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0x4cb, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:55 executing program 6: socketpair$inet(0x2, 0x80000, 0x0, &(0x7f00000000c0)) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9}, 0x3d1) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000028000)={r0, &(0x7f0000000200), &(0x7f0000000240)="13"}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r0, &(0x7f0000000040)}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00', 0x0, 0x8}, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) 2018/04/05 21:37:55 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xbd5, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:55 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000400008fe7bb5cd4e344cd0002800000720a00ff"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xf, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x85100000}, [@jmp={0x5, 0x0, 0xffffffcd}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) 2018/04/05 21:37:55 executing program 5 (fault-call:3 fault-nth:21): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000001380)='./file0\x00', &(0x7f0000001340)='proc\x00', 0x0, &(0x7f0000000240)) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000001280)) 2018/04/05 21:37:55 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000001380)='./file0\x00', &(0x7f0000001340)='proc\x00', 0x0, &(0x7f0000000240)) mount(&(0x7f0000000300)="2e2f66696c653004", &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000001280)) 2018/04/05 21:37:55 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:55 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x400000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:55 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xa81, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:55 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000400008fe7bb5cd4e344cd0002800000720a00ff"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xf, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x27020000}, [@jmp={0x5, 0x0, 0xffffffcd}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) 2018/04/05 21:37:55 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9}, 0x3d1) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000028000)={r0, &(0x7f0000000200), &(0x7f0000000240)="13"}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r0, &(0x7f0000000040)="269f6481014cd999e9582f890167b17a9de31d99596c9b5cd6c1"}, 0x284) 2018/04/05 21:37:55 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0x618, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) [ 398.001243] FAULT_INJECTION: forcing a failure. [ 398.001243] name failslab, interval 1, probability 0, space 0, times 0 [ 398.012561] CPU: 0 PID: 4344 Comm: syz-executor5 Not tainted 4.16.0+ #1 [ 398.019322] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 398.028690] Call Trace: [ 398.031300] dump_stack+0x1b9/0x29f [ 398.034958] ? arch_local_irq_restore+0x52/0x52 [ 398.039674] should_fail.cold.4+0xa/0x1a [ 398.043759] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 398.048895] ? kmem_cache_alloc_trace+0x152/0x780 [ 398.053753] ? __memcg_init_list_lru_node+0x17c/0x2c0 [ 398.058962] ? __list_lru_init+0x45e/0x7b0 [ 398.063217] ? sget_userns+0x6d9/0xf20 [ 398.067118] ? mount_ns+0x8f/0x1d0 [ 398.070676] ? graph_lock+0x170/0x170 [ 398.074492] ? do_mount+0x564/0x3070 [ 398.078219] ? ksys_mount+0x12d/0x140 [ 398.082033] ? SyS_mount+0x35/0x50 [ 398.085589] ? do_syscall_64+0x29e/0x9d0 [ 398.089681] ? find_held_lock+0x36/0x1c0 [ 398.093773] ? __lock_is_held+0xb5/0x140 [ 398.097881] ? check_same_owner+0x320/0x320 [ 398.102226] ? rcu_note_context_switch+0x710/0x710 [ 398.107188] should_failslab+0x124/0x180 [ 398.111275] kmem_cache_alloc_trace+0x2cb/0x780 [ 398.115955] ? __kmalloc_node+0x33/0x70 [ 398.119944] ? __kmalloc_node+0x33/0x70 [ 398.123936] ? rcu_read_lock_sched_held+0x108/0x120 [ 398.128983] __memcg_init_list_lru_node+0x17c/0x2c0 [ 398.134026] ? list_lru_add+0x850/0x850 [ 398.138020] ? __kmalloc_node+0x47/0x70 [ 398.142030] __list_lru_init+0x45e/0x7b0 [ 398.146121] ? list_lru_destroy+0x4c0/0x4c0 [ 398.150456] ? __raw_spin_lock_init+0x1c/0x100 [ 398.155061] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 398.160092] ? __lockdep_init_map+0x105/0x590 [ 398.164605] ? lockdep_init_map+0x9/0x10 [ 398.168687] sget_userns+0x6d9/0xf20 [ 398.172411] ? set_anon_super+0x20/0x20 [ 398.176403] ? get_empty_filp.cold.7+0x3e/0x3e [ 398.181005] ? destroy_unused_super.part.9+0x100/0x100 [ 398.187505] ? retint_kernel+0x10/0x10 [ 398.191392] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 398.196406] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 398.201164] ? retint_kernel+0x10/0x10 [ 398.205046] ? cap_capable+0x1f9/0x260 [ 398.208934] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 398.214461] ? security_capable+0xa4/0xd0 [ 398.218608] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 398.224135] ? ns_capable_common+0x13f/0x170 [ 398.228541] mount_ns+0x8f/0x1d0 [ 398.231900] ? rpc_pipe_release+0xb70/0xb70 [ 398.236214] rpc_mount+0x9e/0xd0 [ 398.239575] mount_fs+0xae/0x328 [ 398.242941] vfs_kern_mount.part.34+0xd4/0x4d0 [ 398.247518] ? may_umount+0xb0/0xb0 [ 398.251133] ? _raw_read_unlock+0x22/0x30 [ 398.255271] ? __get_fs_type+0x97/0xc0 [ 398.259158] do_mount+0x564/0x3070 [ 398.262699] ? copy_mount_string+0x40/0x40 [ 398.266927] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 398.271936] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 398.276689] ? retint_kernel+0x10/0x10 [ 398.280581] ? copy_mount_options+0x1f0/0x380 [ 398.285068] ? copy_mount_options+0x206/0x380 [ 398.289550] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 398.295075] ? copy_mount_options+0x285/0x380 [ 398.299569] ksys_mount+0x12d/0x140 [ 398.303188] SyS_mount+0x35/0x50 [ 398.306543] ? ksys_mount+0x140/0x140 [ 398.310339] do_syscall_64+0x29e/0x9d0 [ 398.314217] ? vmalloc_sync_all+0x30/0x30 [ 398.318354] ? _raw_spin_unlock_irq+0x27/0x70 [ 398.322845] ? finish_task_switch+0x1ca/0x820 [ 398.327334] ? syscall_return_slowpath+0x5c0/0x5c0 [ 398.332255] ? syscall_return_slowpath+0x30f/0x5c0 [ 398.337179] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 398.342539] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 398.347382] entry_SYSCALL_64_after_hwframe+0x42/0xb7 2018/04/05 21:37:56 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:56 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000400008fe7bb5cd4e344cd0002800000720a00ff"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xf, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x7400}, [@jmp={0x5, 0x0, 0xffffffcd}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) 2018/04/05 21:37:56 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000001380)='./file0\x00', &(0x7f0000001340)='proc\x00', 0x0, &(0x7f0000000240)) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000001280)) 2018/04/05 21:37:56 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 398.352560] RIP: 0033:0x4552d9 [ 398.355734] RSP: 002b:00007f4cbd4aec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 398.363435] RAX: ffffffffffffffda RBX: 00007f4cbd4af6d4 RCX: 00000000004552d9 [ 398.370693] RDX: 00000000200002c0 RSI: 0000000020000140 RDI: 0000000020000300 [ 398.377947] RBP: 000000000072bea0 R08: 0000000020001280 R09: 0000000000000000 [ 398.385202] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 398.392461] R13: 00000000000003fa R14: 00000000006f9010 R15: 0000000000000015 2018/04/05 21:37:56 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x400000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:56 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000400008fe7bb5cd4e344cd0002800000720a00ff"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xf, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x3}, [@jmp={0x5, 0x0, 0xffffffcd}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) 2018/04/05 21:37:56 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0x791, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:56 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:56 executing program 5 (fault-call:3 fault-nth:22): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000001380)='./file0\x00', &(0x7f0000001340)='proc\x00', 0x0, &(0x7f0000000240)) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000001280)) 2018/04/05 21:37:56 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000001380)='./file0\x00', &(0x7f0000001340)='proc\x00', 0x0, &(0x7f0000000240)) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000001280)) 2018/04/05 21:37:56 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x2000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:56 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:56 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000400008fe7bb5cd4e344cd0002800000720a00ff"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xf, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x80ffff00000000}, [@jmp={0x5, 0x0, 0xffffffcd}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) 2018/04/05 21:37:56 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0x33e, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:56 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xfd6, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:56 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000040)) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9}, 0x3d1) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000028000)={r0, &(0x7f0000000200), &(0x7f0000000240)="13"}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r0, &(0x7f0000000040)}, 0x10) [ 398.732560] FAULT_INJECTION: forcing a failure. [ 398.732560] name failslab, interval 1, probability 0, space 0, times 0 [ 398.743929] CPU: 1 PID: 4406 Comm: syz-executor5 Not tainted 4.16.0+ #1 [ 398.750689] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 398.760049] Call Trace: [ 398.762646] dump_stack+0x1b9/0x29f [ 398.766294] ? arch_local_irq_restore+0x52/0x52 [ 398.770974] ? __save_stack_trace+0x7e/0xd0 [ 398.775317] should_fail.cold.4+0xa/0x1a [ 398.779394] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 398.784506] ? kasan_kmalloc+0xc4/0xe0 [ 398.788407] ? kmem_cache_alloc_trace+0x152/0x780 [ 398.793261] ? __memcg_init_list_lru_node+0x17c/0x2c0 [ 398.798458] ? __list_lru_init+0x45e/0x7b0 [ 398.802698] ? sget_userns+0x6d9/0xf20 [ 398.806586] ? mount_ns+0x8f/0x1d0 [ 398.810115] ? graph_lock+0x170/0x170 [ 398.813903] ? do_mount+0x564/0x3070 [ 398.817601] ? ksys_mount+0x12d/0x140 [ 398.821386] ? SyS_mount+0x35/0x50 [ 398.824912] ? do_syscall_64+0x29e/0x9d0 [ 398.828967] ? find_held_lock+0x36/0x1c0 [ 398.833023] ? __lock_is_held+0xb5/0x140 [ 398.837078] ? check_same_owner+0x320/0x320 [ 398.841475] ? rcu_note_context_switch+0x710/0x710 [ 398.846397] should_failslab+0x124/0x180 [ 398.850447] kmem_cache_alloc_trace+0x2cb/0x780 [ 398.855100] ? __kmalloc_node+0x33/0x70 [ 398.859058] ? __kmalloc_node+0x33/0x70 [ 398.863028] ? rcu_read_lock_sched_held+0x108/0x120 [ 398.868038] __memcg_init_list_lru_node+0x17c/0x2c0 [ 398.873044] ? list_lru_add+0x850/0x850 [ 398.877008] ? __kmalloc_node+0x47/0x70 [ 398.880978] __list_lru_init+0x45e/0x7b0 [ 398.885032] ? list_lru_destroy+0x4c0/0x4c0 [ 398.889336] ? __raw_spin_lock_init+0x1c/0x100 [ 398.893908] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 398.898910] ? __lockdep_init_map+0x105/0x590 [ 398.903391] ? lockdep_init_map+0x9/0x10 [ 398.907439] sget_userns+0x6d9/0xf20 [ 398.911137] ? set_anon_super+0x20/0x20 [ 398.915100] ? get_empty_filp.cold.7+0x3e/0x3e [ 398.919667] ? destroy_unused_super.part.9+0x100/0x100 [ 398.924931] ? __alloc_pages_slowpath+0x2dc0/0x2dc0 [ 398.929933] ? kasan_check_read+0x11/0x20 [ 398.934067] ? rcu_pm_notify+0xc0/0xc0 [ 398.937942] ? trace_hardirqs_off+0xd/0x10 [ 398.942162] ? cap_capable+0x1f9/0x260 [ 398.946042] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 398.951561] ? security_capable+0xa4/0xd0 [ 398.955694] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 398.961218] ? ns_capable_common+0x13f/0x170 [ 398.965612] mount_ns+0x8f/0x1d0 [ 398.968961] ? rpc_pipe_release+0xb70/0xb70 [ 398.973270] rpc_mount+0x9e/0xd0 [ 398.976624] mount_fs+0xae/0x328 [ 398.979977] vfs_kern_mount.part.34+0xd4/0x4d0 [ 398.984545] ? may_umount+0xb0/0xb0 [ 398.988155] ? _raw_read_unlock+0x22/0x30 [ 398.992286] ? __get_fs_type+0x97/0xc0 [ 398.996164] do_mount+0x564/0x3070 [ 398.999693] ? copy_mount_string+0x40/0x40 [ 399.003913] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 399.008659] ? retint_kernel+0x10/0x10 [ 399.012537] ? copy_mount_options+0x213/0x380 [ 399.017022] ? __sanitizer_cov_trace_pc+0xa/0x50 [ 399.021764] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 399.027289] ? copy_mount_options+0x285/0x380 [ 399.031774] ksys_mount+0x12d/0x140 [ 399.035387] SyS_mount+0x35/0x50 [ 399.038740] ? ksys_mount+0x140/0x140 [ 399.042527] do_syscall_64+0x29e/0x9d0 [ 399.046398] ? vmalloc_sync_all+0x30/0x30 [ 399.050530] ? _raw_spin_unlock_irq+0x27/0x70 [ 399.055011] ? finish_task_switch+0x1ca/0x820 [ 399.059499] ? syscall_return_slowpath+0x5c0/0x5c0 [ 399.064414] ? syscall_return_slowpath+0x30f/0x5c0 [ 399.069335] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 399.074688] ? trace_hardirqs_off_thunk+0x1a/0x1c 2018/04/05 21:37:56 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x200000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:56 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000001380)='./file0\x00', &(0x7f0000001340)='proc\x00', 0x0, &(0x7f0000000240)) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000001280)) 2018/04/05 21:37:56 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6ffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 399.079524] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 399.084697] RIP: 0033:0x4552d9 [ 399.087869] RSP: 002b:00007f4cbd4aec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 399.095564] RAX: ffffffffffffffda RBX: 00007f4cbd4af6d4 RCX: 00000000004552d9 [ 399.102814] RDX: 00000000200002c0 RSI: 0000000020000140 RDI: 0000000020000300 [ 399.110065] RBP: 000000000072bea0 R08: 0000000020001280 R09: 0000000000000000 [ 399.117318] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 399.124572] R13: 00000000000003fa R14: 00000000006f9010 R15: 0000000000000016 2018/04/05 21:37:57 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x4, 0x4, 0x4, 0x2000005, 0x0, 0xffffffffffffffff, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000028000)={r0, &(0x7f0000000200), &(0x7f0000000240)="13"}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r0, &(0x7f0000000040)}, 0x10) 2018/04/05 21:37:57 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x1000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:57 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xa8f, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:57 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0x95d, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:57 executing program 5 (fault-call:3 fault-nth:23): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000001380)='./file0\x00', &(0x7f0000001340)='proc\x00', 0x0, &(0x7f0000000240)) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000001280)) 2018/04/05 21:37:57 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000400008fe7bb5cd4e344cd0002800000720a00ff"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xf, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x0, 0xe4ffffff00000000}, [@jmp={0x5, 0x0, 0xffffffcd}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) 2018/04/05 21:37:57 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:57 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000001380)='./file0\x00', &(0x7f0000001340)='proc\x00', 0x0, &(0x7f0000000240)) mount(&(0x7f0000000300)="2e2f66696c6530f7", &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000001280)) 2018/04/05 21:37:57 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x8cffffff00000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:57 executing program 6: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9}, 0x3d1) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000028000)={r1, &(0x7f0000000200), &(0x7f0000000240)="13"}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r1, &(0x7f00000000c0)="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", &(0x7f0000000280)=""/4096}, 0x18) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x7) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r1, 0x28, &(0x7f00000001c0)}, 0x10) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r1, &(0x7f0000000040)}, 0x10) 2018/04/05 21:37:57 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0x767, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:57 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0x18a, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) [ 399.464592] FAULT_INJECTION: forcing a failure. [ 399.464592] name failslab, interval 1, probability 0, space 0, times 0 [ 399.475901] CPU: 0 PID: 4460 Comm: syz-executor5 Not tainted 4.16.0+ #1 [ 399.482660] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 399.492138] Call Trace: [ 399.494749] dump_stack+0x1b9/0x29f [ 399.498399] ? arch_local_irq_restore+0x52/0x52 [ 399.503113] should_fail.cold.4+0xa/0x1a [ 399.507200] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 399.512337] ? kmem_cache_alloc_trace+0x152/0x780 [ 399.517196] ? __memcg_init_list_lru_node+0x17c/0x2c0 [ 399.522398] ? __list_lru_init+0x45e/0x7b0 [ 399.526645] ? sget_userns+0x6d9/0xf20 [ 399.530543] ? mount_ns+0x8f/0x1d0 [ 399.534099] ? graph_lock+0x170/0x170 [ 399.537913] ? do_mount+0x564/0x3070 [ 399.541640] ? ksys_mount+0x12d/0x140 [ 399.545455] ? SyS_mount+0x35/0x50 [ 399.549010] ? do_syscall_64+0x29e/0x9d0 [ 399.553100] ? find_held_lock+0x36/0x1c0 [ 399.557192] ? __lock_is_held+0xb5/0x140 [ 399.561300] ? check_same_owner+0x320/0x320 [ 399.565642] ? rcu_note_context_switch+0x710/0x710 [ 399.570609] should_failslab+0x124/0x180 [ 399.574694] kmem_cache_alloc_trace+0x2cb/0x780 [ 399.579382] ? __kmalloc_node+0x33/0x70 [ 399.583369] ? __kmalloc_node+0x33/0x70 [ 399.587365] ? rcu_read_lock_sched_held+0x108/0x120 [ 399.592396] __memcg_init_list_lru_node+0x17c/0x2c0 [ 399.597415] ? list_lru_add+0x850/0x850 [ 399.601391] ? __kmalloc_node+0x47/0x70 [ 399.605372] __list_lru_init+0x45e/0x7b0 [ 399.609434] ? list_lru_destroy+0x4c0/0x4c0 [ 399.613747] ? __raw_spin_lock_init+0x1c/0x100 [ 399.618326] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 399.623332] ? __lockdep_init_map+0x105/0x590 [ 399.627819] ? lockdep_init_map+0x9/0x10 [ 399.631875] sget_userns+0x6d9/0xf20 [ 399.635578] ? set_anon_super+0x20/0x20 [ 399.639546] ? get_empty_filp.cold.7+0x3e/0x3e [ 399.644120] ? destroy_unused_super.part.9+0x100/0x100 [ 399.649394] ? __alloc_pages_slowpath+0x2dc0/0x2dc0 [ 399.654407] ? kasan_check_read+0x11/0x20 [ 399.658549] ? trace_hardirqs_off+0xd/0x10 [ 399.662776] ? cap_capable+0x1f9/0x260 [ 399.666663] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 399.672189] ? security_capable+0xa4/0xd0 [ 399.676332] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 399.681858] ? ns_capable_common+0x13f/0x170 [ 399.686262] mount_ns+0x8f/0x1d0 [ 399.689620] ? rpc_pipe_release+0xb70/0xb70 [ 399.693933] rpc_mount+0x9e/0xd0 [ 399.697292] mount_fs+0xae/0x328 [ 399.700655] vfs_kern_mount.part.34+0xd4/0x4d0 [ 399.705229] ? may_umount+0xb0/0xb0 [ 399.708845] ? _raw_read_unlock+0x22/0x30 [ 399.712981] ? __get_fs_type+0x97/0xc0 [ 399.716873] do_mount+0x564/0x3070 [ 399.720404] ? do_raw_spin_unlock+0x9e/0x2e0 [ 399.724808] ? copy_mount_string+0x40/0x40 [ 399.729040] ? rcu_pm_notify+0xc0/0xc0 [ 399.732934] ? copy_mount_options+0x5f/0x380 [ 399.737331] ? rcu_read_lock_sched_held+0x108/0x120 [ 399.742337] ? kmem_cache_alloc_trace+0x616/0x780 [ 399.747174] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 399.752713] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 399.758240] ? copy_mount_options+0x285/0x380 [ 399.762734] ksys_mount+0x12d/0x140 [ 399.766355] SyS_mount+0x35/0x50 [ 399.769713] ? ksys_mount+0x140/0x140 [ 399.773506] do_syscall_64+0x29e/0x9d0 [ 399.777386] ? syscall_slow_exit_work+0x4f0/0x4f0 [ 399.782220] ? syscall_return_slowpath+0x5c0/0x5c0 [ 399.787142] ? syscall_return_slowpath+0x30f/0x5c0 [ 399.792070] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 399.797429] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 399.802273] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 399.807450] RIP: 0033:0x4552d9 2018/04/05 21:37:57 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff8c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:57 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000040)) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9}, 0x3d1) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000028000)={r0, &(0x7f0000000200), &(0x7f00000000c0)="002889b556e7feda436a8aec92056bc15ef23f894724f4819c94fc17c4e9802ad3c1a0175c2ccc85e9516edbb710903f3ce563066f0e771366877902ce8b2e4222e57269445fad91274b3e35a28990dc395363f2409083ffcdfb28891cb45d342dfe9baaa119609acc57e1dc1d539ae1629670595af2bf672eceddb333ffcdb0cf8f91dcf1dabd4e023f24ed133a3be6d70d4dc57691353f82a9a77120d56719d140c396ed04c0f70782"}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r0, &(0x7f0000000040)}, 0x10) [ 399.810624] RSP: 002b:00007f4cbd4aec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 399.818322] RAX: ffffffffffffffda RBX: 00007f4cbd4af6d4 RCX: 00000000004552d9 [ 399.825579] RDX: 00000000200002c0 RSI: 0000000020000140 RDI: 0000000020000300 [ 399.832834] RBP: 000000000072bea0 R08: 0000000020001280 R09: 0000000000000000 [ 399.840088] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 399.847344] R13: 00000000000003fa R14: 00000000006f9010 R15: 0000000000000017 2018/04/05 21:37:57 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0x59c, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:57 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x8cffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:57 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xa2c, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:57 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x8001}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9}, 0x3d1) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={&(0x7f0000000040)='./file0\x00', r0}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000028000)={r0, &(0x7f0000000200), &(0x7f0000000240)="13"}, 0x20) 2018/04/05 21:37:57 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:57 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000001380)='./file0\x00', &(0x7f0000001340)='proc\x00', 0x0, &(0x7f0000000240)) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000001280)) 2018/04/05 21:37:58 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000400008fe7bb5cd4e344cd0002800000720a00ff"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xf, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x9fffffff}, [@jmp={0x5, 0x0, 0xffffffcd}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) 2018/04/05 21:37:58 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0x64a, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:58 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0x50e, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:58 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0xf6ffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:58 executing program 6: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9}, 0x3d1) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000028000)={r1, &(0x7f0000000200), &(0x7f0000000240)="13"}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r1, &(0x7f0000000040)}, 0x10) close(r0) 2018/04/05 21:37:58 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6ffffff00000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:58 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000001380)='./file0\x00', &(0x7f0000001340)='proc\x00', 0x0, &(0x7f0000000240)) mount(&(0x7f0000000300)="2e2f66696c65308c", &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000001280)) 2018/04/05 21:37:58 executing program 5 (fault-call:3 fault-nth:24): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000001380)='./file0\x00', &(0x7f0000001340)='proc\x00', 0x0, &(0x7f0000000240)) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000001280)) 2018/04/05 21:37:58 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:58 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0x66b, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) [ 400.275388] FAULT_INJECTION: forcing a failure. [ 400.275388] name failslab, interval 1, probability 0, space 0, times 0 [ 400.286719] CPU: 1 PID: 4550 Comm: syz-executor5 Not tainted 4.16.0+ #1 [ 400.293475] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 400.302834] Call Trace: [ 400.305431] dump_stack+0x1b9/0x29f [ 400.309074] ? arch_local_irq_restore+0x52/0x52 [ 400.313753] ? kernel_text_address+0x79/0xf0 [ 400.318184] should_fail.cold.4+0xa/0x1a 2018/04/05 21:37:58 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8cffffff00000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 400.322258] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 400.327373] ? graph_lock+0x170/0x170 [ 400.331198] ? save_stack+0x43/0xd0 [ 400.334828] ? kasan_kmalloc+0xc4/0xe0 [ 400.338724] ? __list_lru_init+0xcf/0x7b0 [ 400.342887] ? find_held_lock+0x36/0x1c0 [ 400.346968] ? __lock_is_held+0xb5/0x140 [ 400.351051] ? check_same_owner+0x320/0x320 [ 400.355386] ? rcu_note_context_switch+0x710/0x710 [ 400.360334] should_failslab+0x124/0x180 [ 400.364409] kmem_cache_alloc_node_trace+0x26f/0x770 [ 400.369516] ? mark_held_locks+0xc9/0x160 2018/04/05 21:37:58 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 400.373674] ? __raw_spin_lock_init+0x1c/0x100 [ 400.378270] __kmalloc_node+0x33/0x70 [ 400.382079] kvmalloc_node+0x6b/0x100 [ 400.385890] __list_lru_init+0x50e/0x7b0 [ 400.389970] ? list_lru_destroy+0x4c0/0x4c0 [ 400.394388] ? __raw_spin_lock_init+0x1c/0x100 [ 400.398982] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 400.404017] ? lockdep_init_map+0x9/0x10 [ 400.408089] sget_userns+0x706/0xf20 [ 400.411806] ? set_anon_super+0x20/0x20 [ 400.415789] ? get_empty_filp.cold.7+0x3e/0x3e [ 400.420376] ? destroy_unused_super.part.9+0x100/0x100 2018/04/05 21:37:58 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 400.425663] ? __alloc_pages_slowpath+0x2dc0/0x2dc0 [ 400.430694] ? kasan_check_read+0x11/0x20 [ 400.434856] ? rcu_pm_notify+0xc0/0xc0 [ 400.438749] ? trace_hardirqs_off+0xd/0x10 [ 400.442994] ? cap_capable+0x1f9/0x260 [ 400.446894] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 400.452441] ? security_capable+0xa4/0xd0 [ 400.456601] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 400.462145] ? ns_capable_common+0x13f/0x170 [ 400.466568] mount_ns+0x8f/0x1d0 [ 400.469939] ? rpc_pipe_release+0xb70/0xb70 2018/04/05 21:37:58 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 400.474270] rpc_mount+0x9e/0xd0 [ 400.477647] mount_fs+0xae/0x328 [ 400.481027] vfs_kern_mount.part.34+0xd4/0x4d0 [ 400.485618] ? may_umount+0xb0/0xb0 [ 400.489251] ? _raw_read_unlock+0x22/0x30 [ 400.493404] ? __get_fs_type+0x97/0xc0 [ 400.497311] do_mount+0x564/0x3070 [ 400.500862] ? copy_mount_string+0x40/0x40 [ 400.505105] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 400.510132] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 400.514904] ? retint_kernel+0x10/0x10 [ 400.518807] ? copy_mount_options+0x213/0x380 2018/04/05 21:37:58 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 400.523308] ? copy_mount_options+0x19c/0x380 [ 400.527809] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 400.533350] ? copy_mount_options+0x285/0x380 [ 400.537854] ksys_mount+0x12d/0x140 [ 400.541493] SyS_mount+0x35/0x50 [ 400.544866] ? ksys_mount+0x140/0x140 [ 400.548675] do_syscall_64+0x29e/0x9d0 [ 400.552565] ? vmalloc_sync_all+0x30/0x30 [ 400.556715] ? _raw_spin_unlock_irq+0x27/0x70 [ 400.561211] ? finish_task_switch+0x1ca/0x820 [ 400.565712] ? syscall_return_slowpath+0x5c0/0x5c0 [ 400.570653] ? syscall_return_slowpath+0x30f/0x5c0 2018/04/05 21:37:58 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 400.575598] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 400.580974] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 400.585830] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 400.591478] RIP: 0033:0x4552d9 [ 400.594668] RSP: 002b:00007f4cbd4aec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 400.602380] RAX: ffffffffffffffda RBX: 00007f4cbd4af6d4 RCX: 00000000004552d9 [ 400.609647] RDX: 00000000200002c0 RSI: 0000000020000140 RDI: 0000000020000300 [ 400.616916] RBP: 000000000072bea0 R08: 0000000020001280 R09: 0000000000000000 [ 400.624185] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 400.631453] R13: 00000000000003fa R14: 00000000006f9010 R15: 0000000000000018 2018/04/05 21:37:58 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xd9d, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:58 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000400008fe7bb5cd4e344cd0002800000720a00ff"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xf, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x6c00}, [@jmp={0x5, 0x0, 0xffffffcd}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) 2018/04/05 21:37:58 executing program 6: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9}, 0x3d1) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x6db00000) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)=0xffffffff, 0x4) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000028000)={r1, &(0x7f0000000200), &(0x7f0000000240)="13"}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xe, 0x9, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x5}, [@jmp={0x5, 0x2, 0x0, 0xb, 0xc}, @ldst={0x3, 0x3, 0x1, 0xa, 0x7, 0x0, 0x10}, @jmp={0x5, 0x0, 0x9, 0x1e590962f9ad1b08, 0x2, 0x80, 0xfffffffffffffff4}], {0x95}}, &(0x7f00000000c0)='syzkaller\x00', 0x3, 0x79, &(0x7f0000000100)=""/121, 0x40f00, 0x1}, 0x48) r3 = getpid() perf_event_open(&(0x7f0000000280)={0x5, 0x70, 0x46, 0x3f, 0x6, 0xfffffffffffffffc, 0x0, 0x80, 0x1, 0x8, 0x3f, 0x4, 0x8f, 0x4, 0x3, 0x7, 0x10000, 0x200, 0x3, 0xff, 0x20, 0xfffffffffffff001, 0x6, 0x6, 0xfff, 0xfffffffffffffff8, 0x7fffffff, 0x1ae, 0x1, 0xa7, 0x0, 0x7fff, 0x6, 0xb4a, 0x3e1a, 0x0, 0x6, 0xfffffffffffffffb, 0x0, 0x1000, 0x1, @perf_bp={&(0x7f0000000200), 0xb}, 0x22002, 0x20, 0x6, 0x4, 0xfffffffffffffff9, 0x200, 0x5}, r3, 0x3, r0, 0xb) 2018/04/05 21:37:58 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xa3c, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:58 executing program 5 (fault-call:3 fault-nth:25): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000001380)='./file0\x00', &(0x7f0000001340)='proc\x00', 0x0, &(0x7f0000000240)) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000001280)) 2018/04/05 21:37:58 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:58 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000001380)='./file0\x00', &(0x7f0000001340)='proc\x00', 0x0, &(0x7f0000000240)) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000001280)) 2018/04/05 21:37:58 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:58 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:58 executing program 6: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9}, 0x3d1) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000028000)={r1, &(0x7f0000000200), &(0x7f0000000240)="13"}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r1, &(0x7f0000000040)}, 0x10) [ 400.855016] FAULT_INJECTION: forcing a failure. [ 400.855016] name failslab, interval 1, probability 0, space 0, times 0 [ 400.866370] CPU: 1 PID: 4599 Comm: syz-executor5 Not tainted 4.16.0+ #1 [ 400.873129] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 400.882479] Call Trace: [ 400.885081] dump_stack+0x1b9/0x29f [ 400.888731] ? arch_local_irq_restore+0x52/0x52 [ 400.893415] ? kernel_text_address+0x79/0xf0 [ 400.897846] should_fail.cold.4+0xa/0x1a [ 400.901923] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 400.907048] ? graph_lock+0x170/0x170 [ 400.910853] ? save_stack+0x43/0xd0 [ 400.914484] ? kasan_kmalloc+0xc4/0xe0 [ 400.918377] ? __list_lru_init+0xcf/0x7b0 [ 400.922542] ? find_held_lock+0x36/0x1c0 [ 400.926618] ? __lock_is_held+0xb5/0x140 [ 400.930701] ? check_same_owner+0x320/0x320 [ 400.935032] ? rcu_note_context_switch+0x710/0x710 [ 400.939976] should_failslab+0x124/0x180 [ 400.944048] kmem_cache_alloc_node_trace+0x26f/0x770 [ 400.949155] ? mark_held_locks+0xc9/0x160 2018/04/05 21:37:58 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0xffffffff00000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:58 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100)={&(0x7f00000000c0)='./file0\x00', 0x0, 0x8}, 0x10) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x4, 0x4, 0x4, 0x9}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000028000)={r0, &(0x7f0000000200), &(0x7f0000000240)="13"}, 0x20) socketpair$inet6_icmp(0xa, 0x2, 0x3a, &(0x7f0000000140)) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r0, &(0x7f0000000040)}, 0x10) [ 400.953311] ? __raw_spin_lock_init+0x1c/0x100 [ 400.957905] __kmalloc_node+0x33/0x70 [ 400.961710] kvmalloc_node+0x6b/0x100 [ 400.965516] __list_lru_init+0x50e/0x7b0 [ 400.969586] ? list_lru_destroy+0x4c0/0x4c0 [ 400.973914] ? __raw_spin_lock_init+0x1c/0x100 [ 400.978510] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 400.983542] ? lockdep_init_map+0x9/0x10 [ 400.987620] sget_userns+0x706/0xf20 [ 400.991339] ? set_anon_super+0x20/0x20 [ 400.995328] ? get_empty_filp.cold.7+0x3e/0x3e [ 400.999937] ? destroy_unused_super.part.9+0x100/0x100 2018/04/05 21:37:58 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0xffffff8c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 401.005230] ? __alloc_pages_slowpath+0x2dc0/0x2dc0 [ 401.010261] ? kasan_check_read+0x11/0x20 [ 401.014424] ? rcu_pm_notify+0xc0/0xc0 [ 401.018316] ? trace_hardirqs_off+0xd/0x10 [ 401.022563] ? cap_capable+0x1f9/0x260 [ 401.026462] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 401.032011] ? security_capable+0xa4/0xd0 [ 401.036186] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 401.041740] ? ns_capable_common+0x13f/0x170 [ 401.046161] mount_ns+0x8f/0x1d0 [ 401.049530] ? rpc_pipe_release+0xb70/0xb70 2018/04/05 21:37:58 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9}, 0x3d1) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000028000)={r0, &(0x7f0000000100)="4d82e859264804249882582f0af875f0aea2640803f2286e01469beec9d889807b9ca9df6cf3c7267da860bb80ec38a43e8d139e0d0712ebd15d52f5b9667f69b8476af28a5811137517", &(0x7f0000000240)="13"}, 0x20) socketpair(0x11, 0xb, 0x5, &(0x7f0000000180)={0xffffffffffffffff}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r1, &(0x7f00000001c0)="1246e4e4922865f321ca04a706e3c0df3166a111020d30137c861bc85468827f5a5ba2455b57b107f020202c11e1d028896a78839ad321dd473103"}, 0x10) bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)={&(0x7f0000000040)='./file0\x00'}, 0x10) [ 401.053859] rpc_mount+0x9e/0xd0 [ 401.057239] mount_fs+0xae/0x328 [ 401.060619] vfs_kern_mount.part.34+0xd4/0x4d0 [ 401.065215] ? may_umount+0xb0/0xb0 [ 401.068855] ? _raw_read_unlock+0x22/0x30 [ 401.073016] ? __get_fs_type+0x97/0xc0 [ 401.076916] do_mount+0x564/0x3070 [ 401.080464] ? do_raw_spin_unlock+0x9e/0x2e0 [ 401.084886] ? copy_mount_string+0x40/0x40 [ 401.089129] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 401.094152] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 401.098924] ? retint_kernel+0x10/0x10 2018/04/05 21:37:58 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:59 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9}, 0x3d1) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000028000)={r0, &(0x7f0000000200), &(0x7f0000000240)="13"}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r0, &(0x7f0000000040)}, 0x10) [ 401.102828] ? copy_mount_options+0x1f0/0x380 [ 401.107335] ? copy_mount_options+0x1fa/0x380 [ 401.111836] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 401.117378] ? copy_mount_options+0x285/0x380 [ 401.121886] ksys_mount+0x12d/0x140 [ 401.125518] SyS_mount+0x35/0x50 [ 401.128884] ? ksys_mount+0x140/0x140 [ 401.132690] do_syscall_64+0x29e/0x9d0 [ 401.136577] ? vmalloc_sync_all+0x30/0x30 [ 401.140731] ? _raw_spin_unlock_irq+0x27/0x70 [ 401.145234] ? finish_task_switch+0x1ca/0x820 [ 401.149739] ? syscall_return_slowpath+0x5c0/0x5c0 [ 401.154680] ? syscall_return_slowpath+0x30f/0x5c0 [ 401.159623] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 401.164995] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 401.169855] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 401.175042] RIP: 0033:0x4552d9 [ 401.178230] RSP: 002b:00007f4cbd4aec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 401.185942] RAX: ffffffffffffffda RBX: 00007f4cbd4af6d4 RCX: 00000000004552d9 [ 401.193227] RDX: 00000000200002c0 RSI: 0000000020000140 RDI: 0000000020000300 2018/04/05 21:37:59 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xd0d, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) [ 401.200495] RBP: 000000000072bea0 R08: 0000000020001280 R09: 0000000000000000 [ 401.207763] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 401.215031] R13: 00000000000003fa R14: 00000000006f9010 R15: 0000000000000019 2018/04/05 21:37:59 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000400008fe7bb5cd4e344cd0002800000720a00ff"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xf, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x6800000000000000}, [@jmp={0x5, 0x0, 0xffffffcd}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) 2018/04/05 21:37:59 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000001380)='./file0\x00', &(0x7f0000001340)='proc\x00', 0x0, &(0x7f0000000240)) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000001280)) 2018/04/05 21:37:59 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xb96, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:59 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xe45, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:59 executing program 5 (fault-call:3 fault-nth:26): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000001380)='./file0\x00', &(0x7f0000001340)='proc\x00', 0x0, &(0x7f0000000240)) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000001280)) 2018/04/05 21:37:59 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x4000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:59 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:59 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9}, 0x3d1) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000028000)={r0, &(0x7f0000000200), &(0x7f0000000240)="13"}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r0, 0x28, &(0x7f0000000040)}, 0x10) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r0, &(0x7f0000000040)}, 0x10) [ 401.447660] FAULT_INJECTION: forcing a failure. [ 401.447660] name failslab, interval 1, probability 0, space 0, times 0 [ 401.458974] CPU: 1 PID: 4651 Comm: syz-executor5 Not tainted 4.16.0+ #1 [ 401.465733] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 401.475089] Call Trace: [ 401.477686] dump_stack+0x1b9/0x29f [ 401.481330] ? arch_local_irq_restore+0x52/0x52 [ 401.486006] ? __save_stack_trace+0x7e/0xd0 [ 401.490347] should_fail.cold.4+0xa/0x1a [ 401.494421] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 401.499533] ? kasan_kmalloc+0xc4/0xe0 [ 401.503426] ? kmem_cache_alloc_trace+0x152/0x780 [ 401.508276] ? __memcg_init_list_lru_node+0x17c/0x2c0 [ 401.513477] ? __list_lru_init+0x45e/0x7b0 [ 401.517720] ? sget_userns+0x706/0xf20 [ 401.521612] ? mount_ns+0x8f/0x1d0 [ 401.525168] ? graph_lock+0x170/0x170 [ 401.528973] ? do_mount+0x564/0x3070 [ 401.532693] ? ksys_mount+0x12d/0x140 [ 401.536503] ? SyS_mount+0x35/0x50 [ 401.540052] ? do_syscall_64+0x29e/0x9d0 [ 401.544134] ? find_held_lock+0x36/0x1c0 2018/04/05 21:37:59 executing program 6: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0xffffffffffffffff) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9}, 0x3d1) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000028000)={r1, &(0x7f0000000200), &(0x7f0000000240)="13"}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x10, 0xd2f1, 0x1, 0x6, 0x11, r1, 0x5}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x5) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x7, 0x2, 0x2, 0x6ad, 0x8, 0xffffffffffffffff, 0x8}, 0x2c) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x5, 0x0, 0xfffffffffffffff7, &(0x7f0000004c00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r4, &(0x7f0000005040)={0x0, 0x0, &(0x7f0000004e80)=[{&(0x7f0000004c40)="da9ebd3ba26539a6bfb4d3a8338ce392fa88c6b3af812ca1bbcc9d64c611e4eb3a39cc4411", 0x25}], 0x1, &(0x7f0000004ec0)=[{0xc8, 0x107, 0x5, "dbfee18c491dc73fd5981963f02c7aa0596a05a5db1e0e5791b3307d129038f6056b61da88e70bcd1dfcfa01cbb172e38ca7c7e2feaf7a91e6cc677c6072f67b4ff99cce01b9da0d442c7ef262b2839bfde0ab4a0d113150fc34edf6dd285e371f1e9b0b2fa8ab282bb6fbfd15ee3e509225336aa4d6c590f0d2f5e447425930e089b2b06a8f685706bfa53ae1de49dc0b06496d33f00dbec00dbfffa3501bc04ae83dd284c6bfae84ea3b160130d11ab6ee8aae41bf07"}], 0xc8, 0x24000005}, 0x1) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x8983, &(0x7f0000842000)={r3}) bpf$MAP_CREATE(0x0, &(0x7f0000c47fec)={0x10000000000004, 0x4, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, [0x4]}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={0xffffffffffffffff, &(0x7f0000000000)="8a", &(0x7f00000000c0)}, 0x20) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40042409, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x3f) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000180)={r1, &(0x7f00000001c0)="52ea790a95acf14d771047c876e5c3e88c0b1887328ec88014b3d09f70324bf4ced13433787df1a4ce3a3f0f283dd5ea73f25a69c004569e48e043adf846bd9e0cc58b059bb696"}, 0xfffffffffffffe60) socketpair(0x3, 0x1, 0xfffffffffffffffc, &(0x7f0000000080)) 2018/04/05 21:37:59 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 401.548211] ? __lock_is_held+0xb5/0x140 [ 401.552290] ? check_same_owner+0x320/0x320 [ 401.556618] ? rcu_note_context_switch+0x710/0x710 [ 401.561565] should_failslab+0x124/0x180 [ 401.565635] kmem_cache_alloc_trace+0x2cb/0x780 [ 401.570309] ? __kmalloc_node+0x33/0x70 [ 401.574289] ? __kmalloc_node+0x33/0x70 [ 401.578269] ? rcu_read_lock_sched_held+0x108/0x120 [ 401.583305] __memcg_init_list_lru_node+0x17c/0x2c0 [ 401.588331] ? list_lru_add+0x850/0x850 [ 401.592312] ? __kmalloc_node+0x47/0x70 [ 401.596299] __list_lru_init+0x45e/0x7b0 [ 401.600371] ? list_lru_destroy+0x4c0/0x4c0 [ 401.604699] ? __raw_spin_lock_init+0x1c/0x100 [ 401.609301] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 401.614338] ? lockdep_init_map+0x9/0x10 [ 401.618413] sget_userns+0x706/0xf20 [ 401.622139] ? set_anon_super+0x20/0x20 [ 401.626121] ? get_empty_filp.cold.7+0x3e/0x3e [ 401.630713] ? destroy_unused_super.part.9+0x100/0x100 [ 401.636008] ? __alloc_pages_slowpath+0x2dc0/0x2dc0 [ 401.641047] ? kasan_check_read+0x11/0x20 [ 401.645215] ? rcu_pm_notify+0xc0/0xc0 [ 401.649110] ? trace_hardirqs_off+0xd/0x10 [ 401.653360] ? cap_capable+0x1f9/0x260 [ 401.657268] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 401.662812] ? security_capable+0xa4/0xd0 [ 401.666973] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 401.672516] ? ns_capable_common+0x13f/0x170 [ 401.676939] mount_ns+0x8f/0x1d0 [ 401.680315] ? rpc_pipe_release+0xb70/0xb70 [ 401.684651] rpc_mount+0x9e/0xd0 [ 401.688036] mount_fs+0xae/0x328 [ 401.691423] vfs_kern_mount.part.34+0xd4/0x4d0 [ 401.696018] ? may_umount+0xb0/0xb0 [ 401.699667] ? _raw_read_unlock+0x22/0x30 [ 401.703804] ? __get_fs_type+0x97/0xc0 [ 401.707678] do_mount+0x564/0x3070 [ 401.711205] ? copy_mount_string+0x40/0x40 [ 401.715427] ? rcu_pm_notify+0xc0/0xc0 [ 401.719311] ? copy_mount_options+0x5f/0x380 [ 401.723703] ? rcu_read_lock_sched_held+0x108/0x120 [ 401.728704] ? kmem_cache_alloc_trace+0x616/0x780 [ 401.733551] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 401.739085] ? copy_mount_options+0x285/0x380 [ 401.743567] ksys_mount+0x12d/0x140 [ 401.747184] SyS_mount+0x35/0x50 [ 401.750534] ? ksys_mount+0x140/0x140 [ 401.754319] do_syscall_64+0x29e/0x9d0 [ 401.758204] ? vmalloc_sync_all+0x30/0x30 [ 401.762335] ? _raw_spin_unlock_irq+0x27/0x70 [ 401.766812] ? finish_task_switch+0x1ca/0x820 [ 401.771290] ? syscall_return_slowpath+0x5c0/0x5c0 [ 401.776201] ? syscall_return_slowpath+0x30f/0x5c0 [ 401.781123] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 401.786486] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 401.791319] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 401.796491] RIP: 0033:0x4552d9 [ 401.799661] RSP: 002b:00007f4cbd4aec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 401.807367] RAX: ffffffffffffffda RBX: 00007f4cbd4af6d4 RCX: 00000000004552d9 [ 401.814628] RDX: 00000000200002c0 RSI: 0000000020000140 RDI: 0000000020000300 [ 401.821883] RBP: 000000000072bea0 R08: 0000000020001280 R09: 0000000000000000 [ 401.829225] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 401.836485] R13: 00000000000003fa R14: 00000000006f9010 R15: 000000000000001a 2018/04/05 21:37:59 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000400008fe7bb5cd4e344cd0002800000720a00ff"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xf, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x8510000000000000}, [@jmp={0x5, 0x0, 0xffffffcd}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) 2018/04/05 21:37:59 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000001380)='./file0\x00', &(0x7f0000001340)='proc\x00', 0x0, &(0x7f0000000240)) mount(&(0x7f0000000300)='./file0\n', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000001280)) 2018/04/05 21:37:59 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0xf6ffffff00000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:59 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0x134, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:37:59 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8cffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:37:59 executing program 5 (fault-call:3 fault-nth:27): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000001380)='./file0\x00', &(0x7f0000001340)='proc\x00', 0x0, &(0x7f0000000240)) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000001280)) 2018/04/05 21:37:59 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x1, 0x4009}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r0, 0x28, &(0x7f0000000040)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100)={r1, 0x200, 0x8}, 0xc) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000028000)={r0, &(0x7f0000000200), &(0x7f0000000240)="13"}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r0, &(0x7f0000000040)}, 0x10) 2018/04/05 21:37:59 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0x314, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) [ 401.980980] FAULT_INJECTION: forcing a failure. [ 401.980980] name failslab, interval 1, probability 0, space 0, times 0 [ 401.992291] CPU: 1 PID: 4686 Comm: syz-executor5 Not tainted 4.16.0+ #1 [ 401.999069] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 402.008429] Call Trace: [ 402.011042] dump_stack+0x1b9/0x29f [ 402.014687] ? arch_local_irq_restore+0x52/0x52 [ 402.019366] ? __save_stack_trace+0x7e/0xd0 [ 402.023693] should_fail.cold.4+0xa/0x1a [ 402.027748] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 402.032838] ? kasan_kmalloc+0xc4/0xe0 [ 402.036713] ? kmem_cache_alloc_trace+0x152/0x780 [ 402.041540] ? __memcg_init_list_lru_node+0x17c/0x2c0 [ 402.046713] ? __list_lru_init+0x45e/0x7b0 [ 402.050934] ? sget_userns+0x706/0xf20 [ 402.054808] ? mount_ns+0x8f/0x1d0 [ 402.058331] ? graph_lock+0x170/0x170 [ 402.062114] ? do_mount+0x564/0x3070 [ 402.065810] ? ksys_mount+0x12d/0x140 [ 402.069596] ? SyS_mount+0x35/0x50 [ 402.073119] ? do_syscall_64+0x29e/0x9d0 [ 402.077170] ? find_held_lock+0x36/0x1c0 [ 402.081219] ? __lock_is_held+0xb5/0x140 [ 402.085273] ? check_same_owner+0x320/0x320 [ 402.089582] ? rcu_note_context_switch+0x710/0x710 [ 402.094502] should_failslab+0x124/0x180 [ 402.098551] kmem_cache_alloc_trace+0x2cb/0x780 [ 402.103202] ? __kmalloc_node+0x33/0x70 [ 402.107160] ? __kmalloc_node+0x33/0x70 [ 402.111119] ? rcu_read_lock_sched_held+0x108/0x120 [ 402.116123] __memcg_init_list_lru_node+0x17c/0x2c0 [ 402.121125] ? list_lru_add+0x850/0x850 [ 402.125085] ? __kmalloc_node+0x47/0x70 [ 402.129048] __list_lru_init+0x45e/0x7b0 [ 402.133100] ? list_lru_destroy+0x4c0/0x4c0 [ 402.137405] ? __raw_spin_lock_init+0x1c/0x100 [ 402.141974] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 402.146977] ? lockdep_init_map+0x9/0x10 [ 402.151032] sget_userns+0x706/0xf20 [ 402.154731] ? set_anon_super+0x20/0x20 [ 402.158692] ? get_empty_filp.cold.7+0x3e/0x3e [ 402.163258] ? destroy_unused_super.part.9+0x100/0x100 [ 402.168547] ? __alloc_pages_slowpath+0x2dc0/0x2dc0 [ 402.173552] ? kasan_check_read+0x11/0x20 [ 402.177690] ? rcu_pm_notify+0xc0/0xc0 [ 402.181560] ? trace_hardirqs_off+0xd/0x10 [ 402.185783] ? cap_capable+0x1f9/0x260 [ 402.189657] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 402.195180] ? security_capable+0xa4/0xd0 [ 402.199314] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 402.204834] ? ns_capable_common+0x13f/0x170 [ 402.209232] mount_ns+0x8f/0x1d0 [ 402.212581] ? rpc_pipe_release+0xb70/0xb70 [ 402.216890] rpc_mount+0x9e/0xd0 [ 402.220247] mount_fs+0xae/0x328 [ 402.223604] vfs_kern_mount.part.34+0xd4/0x4d0 [ 402.228171] ? may_umount+0xb0/0xb0 [ 402.231783] ? _raw_read_unlock+0x22/0x30 [ 402.235917] ? __get_fs_type+0x97/0xc0 [ 402.239793] do_mount+0x564/0x3070 [ 402.243320] ? copy_mount_string+0x40/0x40 [ 402.247539] ? rcu_pm_notify+0xc0/0xc0 [ 402.251420] ? copy_mount_options+0x5f/0x380 [ 402.255811] ? rcu_read_lock_sched_held+0x108/0x120 [ 402.260811] ? kmem_cache_alloc_trace+0x616/0x780 [ 402.265642] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 402.271162] ? _copy_from_user+0xdf/0x150 [ 402.275298] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 402.280816] ? copy_mount_options+0x285/0x380 [ 402.286341] ksys_mount+0x12d/0x140 [ 402.289954] SyS_mount+0x35/0x50 [ 402.293305] ? ksys_mount+0x140/0x140 [ 402.297092] do_syscall_64+0x29e/0x9d0 [ 402.300962] ? vmalloc_sync_all+0x30/0x30 [ 402.305093] ? _raw_spin_unlock_irq+0x27/0x70 [ 402.309572] ? finish_task_switch+0x1ca/0x820 [ 402.314055] ? syscall_return_slowpath+0x5c0/0x5c0 [ 402.318970] ? syscall_return_slowpath+0x30f/0x5c0 [ 402.323896] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 402.329247] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 402.334079] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 402.339249] RIP: 0033:0x4552d9 [ 402.342418] RSP: 002b:00007f4cbd4aec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 402.350111] RAX: ffffffffffffffda RBX: 00007f4cbd4af6d4 RCX: 00000000004552d9 [ 402.357361] RDX: 00000000200002c0 RSI: 0000000020000140 RDI: 0000000020000300 [ 402.364617] RBP: 000000000072bea0 R08: 0000000020001280 R09: 0000000000000000 [ 402.371870] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 2018/04/05 21:38:00 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x100000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 402.379124] R13: 00000000000003fa R14: 00000000006f9010 R15: 000000000000001b 2018/04/05 21:38:00 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9}, 0x3d1) socketpair$inet6_icmp(0xa, 0x2, 0x3a, &(0x7f00000000c0)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000100), &(0x7f0000000140)="52dc450a7a00000000800008e88d4b0411e7d62210667efb"}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r0, &(0x7f0000000040)}, 0x1) 2018/04/05 21:38:00 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0x650, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:38:00 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff8c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:38:00 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xcad, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:38:00 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000400008fe7bb5cd4e344cd0002800000720a00ff"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xf, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x200000000000000}, [@jmp={0x5, 0x0, 0xffffffcd}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) 2018/04/05 21:38:00 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000001380)='./file0\x00', &(0x7f0000001340)='proc\x00', 0x0, &(0x7f0000000240)) mount(&(0x7f0000000300)="2e2f66696c6530f6", &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000001280)) 2018/04/05 21:38:00 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:38:00 executing program 5 (fault-call:3 fault-nth:28): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000001380)='./file0\x00', &(0x7f0000001340)='proc\x00', 0x0, &(0x7f0000000240)) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000001280)) [ 402.612118] FAULT_INJECTION: forcing a failure. [ 402.612118] name failslab, interval 1, probability 0, space 0, times 0 [ 402.623473] CPU: 0 PID: 4717 Comm: syz-executor5 Not tainted 4.16.0+ #1 [ 402.630245] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 402.639609] Call Trace: [ 402.642218] dump_stack+0x1b9/0x29f [ 402.645873] ? arch_local_irq_restore+0x52/0x52 [ 402.650582] should_fail.cold.4+0xa/0x1a [ 402.654664] ? fault_create_debugfs_attr+0x1f0/0x1f0 2018/04/05 21:38:00 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0x3c5, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:38:00 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000001380)='./file0\x00', &(0x7f0000001340)='proc\x00', 0x0, &(0x7f0000000240)) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000001280)) 2018/04/05 21:38:00 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:38:00 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9}, 0x3d1) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000028000)={r0, &(0x7f0000000200), &(0x7f0000000240)="13"}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r0, &(0x7f0000000040)}, 0x10) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0, &(0x7f0000000280)="0bf215039175abaa5ac759564ae66e94175a1594deaa48dd11cdfc0f77ca0406f223d4c974588434010e0b12c7ad4faa371a33a5d56ffef4d47b82d9236d8c8ce9ea5f0d714fa0741cdba55299f0437506bba17e11b14607f5a5c2506550c0adbd2ae317dfaa0b13cd115d92728ef68de9077f7995fcc51ef846b49fc98ba8ebc112ba3c2141622f940d13d1d17c69419b88a1b21a222a049fd5f51e476e402c6a9e1e2583e753ce6083cf47f3c8aa1999607c34794af3ea3c96e4d9327eca0f48bbb29c43c445cb59a3ec2b3a887aad01c1613731ffba7f2f5d85903b77fb8e56d89075f114c00221f77faf62693296c5a12efd017d1914398409d3ecb7d35d96485255380c439002615e824dc34ffb411c3ade7a7739943665e0e189d9afeea9cb2bb50411f53cace3023087f5bca9d52c63e4f2b22e6ea7f36875d2cb04eef2185de19d1c2d9d019a078775d90467bd70596da1e3c880fc3cda1ef44051c2c928d4b061eebea34234089e2592654e48b5e6dba6edbad8309b075abc0d2235ab7942182b23befabdedd7fac76353c746277d261cb72cd634d5a4f7e333079ec75046ea77a3bd7424abe0ef2ded3b49f0556de85f6e2afab36f5b8a1ca36a80954bbc21ef46316efaa356a7f349dc33a0c51ce1aaa675d1c78a25f338812280d70f2cc6f2fa04dca143b533325f2826f5c337a04b0e79a9b32976dcffd21e5de8a1e63877062885b35424b51fecc8bb34b959b8d3343fc02c3ea5fed5e794dacb105c8c9f654dab1f277afc5be4d579b4586dc52dfec4bccd2494a357c79a2bf6042222df529542e62e84d0e6a5bb2ceb8dee5af514cca38378521de622a3105ad274ebe24d8e22485592250462d5681ddebcb35aa9ccd0703f447f68299957721d7f5b342b21bbe63badce080cb75a4fdf1e17882a1792753fc7fa6853f03cb1a535ef76bd2b49b2d9273ee727a80e5a68cf589bbeaab219e6fc4540ed9af974d36c4d936a82f80c1101cd191231548714c4521db46529b5af431f339b349e465a023e230cd509dedb5bf76fa2c2bd0978c247e81cfea4b29662fda1738c92c514e8bb879eddd92c83706aa4a9ecb7bd64d660836af0641c982d5734e9fb1076e6559d7c19ff98631969df864f95959b2c478d8b59e57d08a4b8b57357722b5245ce5fdaee01e6b44dd3f70d8a5d60cc2401239ff967cec6ef027087ba0252753ee2266738a5cf04e2fa9fe0351ee52c94b0ee621ce1c58728361cfeb3517e334893c0c450e679b4726fcb7525d36e84d501710e6299c9af4eb080990cfbaa72acc0bb34b5c8182d7dc73cd46cbbadad0b12d6d23e3e28858cf81b7f39e972362f1930465a61ede7218421d8a63ce3ae5aaf133a4d42b394146bbeda3b47dccec92cef75dbae22178ca90a8286637bc5c3811ef54fe30ade83d23f2b7740890e4f633aeaa690234f92868febddbd7ce732fc472ab2999148880e8c0d0f2a81037a86c6a7b4d8eb07723f21a0101d9cd692c80043f1eac723890ca260a9d06da5c8f23987903686c1bed7ea159c7e68ee89e6196d5397b50f2b29d3c92be74501b35d7929c87f1b23eba5215d4f75360bcff6b65aa6f8d10ea9e0cf87740fe9f588215054b0c700ec01249201d32d06d7a10dc1bf890db49d4916c6930f50ca73a6f8e0c4a3a47ff7341e97255539e6376007b5d001594b917f9aad5f777c167f22f6f5236160867d18b2fd7e54a10650f2e274d9132bd22c2ba1ed4b71fdae002eb6e33e5c0929ee42e274ca929696bbece1b51a8d6e2462de86115e72c31520fbb2f7dc219996e405c1ba66d4859af2dda7fff89558a9094cd8c77d86d6315053808fb2adaba6a24a55279e3e63b296c7cda37a0cde8e9b4a9173bdd5af63f6d8d0eb0d19fbc9a27e817c442366d9e6670fdb558634e81d23bc795ea12e437dd7456eb84b2cc4398095cd7db6e3a5aad814e0e31a2c9bb35142d90b595fec1d616c73d05a3e5ceb7789671f1c0aab163d16adaa392dd0a4a4b798e974ff7f4ca500e8afc16fc20170402350f06f1def75ca98da2c726b6ff9a5a55128a7ae241a876eee75d15e2d8c1f7ae37d5da8ab301059110426e8afb334b0b1cfd2d54fe4b3a6c5c08ce0449bf717121fe08283019fc445d725b9779fc27c81c53c08437ca8156be2a69ca1291a5a7d191f712032d185361b491f22dc2140f35046bcc90c0dee5a598240cb8e6db06db969858cff67baddf4603fba0e083063e61b327bc2b7427f292ef51a445514f92050742678f7c63bf123da4c75beadf384ac752949a1f981e6aa847ba4b2a7561b1e16767a1f702152dc754c470ca3dca737e61f309ebb95bc06340ef372e3ea28f5357ee662b065ba2161e6f719ea10ef8aaf7408779e3de0bfee8e7b8fcc3568ddee0832be6e3b46767fed2a44094f383671d14ceef4605a479556141a03f5c65fb37e1bd1e214e647df080e5ba7eff3675231cc806409d80512ead4453584ded6a9775ca5732fd27429295b628a2663e953287be26467e9561ced9636e8d2baab74694a317816c52d371b3cd77ad2f9309f931728f5e696a2c637d5d99f95955696afab80e702852bae6b6c7cb9226b6769b342e3a517e71d4f819d82d2c3f97cd71e5d78d2d0ee4e90d4a155b387bd357070d970d3e7d58707e00d302481791f9f52d0489a8eda8fb3d0536b2f2d2d4c6e6af60ad11dccf87ebfa26eabe24059cdaeecd419c7734aa17f9f6630b9998bec0d4fd16fca6183c3e067735d0d77c8701783e4cd2472c9dd114bf5ed6e64ab5ac54ea177b9680aafff83f8c1c032dde04ae52dd10f8cf5fbe699ed255c54b27d15ea8fa13c5343325692757bc4f99f7d9047792b9e36a8a9b7a16d2fa9845d224e784454349f94769a697eb37a9680d8c8f313bc90da54c515933c88117969d08ff1b91feee8235bc33bb6bbf72fa2dbcfa37039fa0c7f517a6c868a6f686ba67b625245a88f66704a62838ed802edea6a5307287c3ca095ee431a03980002bf53c773e3b4768af0baeefcd3cda72e56a3425ea6ee30f4aae4014e2475c835e9ab60bfa3f3111a5a423e04d8e896b2d86dd1b1e7c57d0bb38cc7d2d191fe72d590662f5343f66965e6d4b46051090eb26504150d60ee3bcf399e1567e2baecf2b9b97d66b3cff74481c4f24b088c7a22d4e4bfc2c996dd57f70c26d468f819fd11e8a1c28d15c103ef597dd84d528a3163779bf55c5db52929707c856a4ea9138507e5b70b5e253725476ea297877266550de6809bab1e82a1de73cdebb0085125b6e77316d86fabda2f96314e702de7eb60d3ce0635c72c691fe2a6af5e82d3a750087912ff1f6925c0a10a694511e20220d682181db88fcbacedaaf2c25616664cb76f12d3598e2c252cecbd44756c0a853f8aa8e2aea62c9269cfcdfd47c16dcb37453c91f62b7fbda0e3bacc5fe4952c48c2281fbf86c7bef8264350ff661b5177c8cee3cc8c510e9a96cb0ed591320938004291863d063c883c1d877a7e8cd5d8fce2e8f61cdd69c396e102593fc202530c414383c898ecf31f7955fae519dfb5dc8fc2149cf965b80915c2c6c8eae5026936d8b740a355893671d93e988134e66656e02196919dce89fc33bec0976ad40a29d53b37821a35dc0643e138b5f784a0e8a55b1e05999f3300c99152375288f6000cd35545c855f38601ed42d27a020f224a671ebede9aa6a04fdc121b207ba7b0baa9d70b92ef4b8fc668605a47750b21ad9353f94a5f6741729a1e097909474967996e2169ad3d662714045dc4a42e72cc3d71e1e34d60ff6fd81665dd053252bce271970548104c2572da47e772f0518f900ae84b4dd129313a6ab92379f3056f79bbd06b113296cdce2858a5eced76cc82412c030f55e34bdd1ec0eb7bc72dd692da1d2c8d395e16eb059f82a5471d5c9dc5069cc5dcb62b2e68b7cac77b5a9a76a064cc374a078897562e1a39455f9f3d9d1558b5da40808ca39c9742475492b05a35a605b044e925787a14d087d9211abdfb75663e688066b61d74ba4e37c5fd522b2c6e082c19c6a23bd815160cc210c2aec2a0a345103351b96e705e6cd873918e3a6405f44963611a00d88705d6f2cf1f793487d2012cbe6e41c810b73f2f34316d174b1849c4bfd5f0ed201fb812749eb89bfcad930eff653092ab6339f8a791c489fdbf82427f676e571732712507313910b1565e0875fa1e698b0d091f5cb6d6f540937f47a0b670928cc75efda6e0fc57cf760b3ad9ad983094cf2472aed395d2dc522b0d4aeaf830b85824011198be104805befb8032e744ce67dde26584ffc3082cb6924ab92e93965f2626c7affe620258dc19ca5f661a7bd7e6dc44da9e94d361bbff18797593242f4aae8dc4f93de6b29e28e87bcd2112ca5ce9b2a9ee94e09463667f95d35149104b62f6b8e33683caf2e2b0883d414ceec303b31838f9127c84a8b486a0d4c63e8d6e052f5cc46139b30afaccee0b025d400d75ea55563acbb43ae1b6f3e2b0b6125e35ced1a11814aa9cfc125ee6ee2cf30e573cf4ab21fe9bd6e17a6740b5f6cb57b6852c6a294c9b945da0e21508d1db49319a2185a078bfbe63bc70298a38a05d18a6163d37b22d9e501ac0b8dbf361cd1f0f8e3abdf78b10979d52c7a2600c96549220f6d24b2b427228ef2a82743a959917e1ce5c6d77984368a5d7955ef7e7cbb0d2d0ed3a67204b6d33219905d9e2f732c131f9d0270572704c54914859270847e9f3781e3fd9c003f43dc1fac125ccba52329cfd9ea4c76b21143f6e6822f04f6fcb4b0cc2cb1d4a5c4eabe386ecc6c3ef2d3d0b624910cbc183a1eb2b61190cce1239930828454bc8e82859eee8a4ac340d084a5f2b840f9d76e52377fe08ea5193bfbb316b575670411976b36589613cdacd32da4dd7d42774f2b03cb6bc1adc97f13231ec8f4feac6ad8d6a5ce6f1ea315f73affdae5e786a1adec4ab69abcea858a1a47d2da48580e0ca67d58e86be61568077ec744008e0d89306d56cd7aa8be751068a75c830fe2adc59b427181c1eb5548eaba9e07f065cf49942c6d3289324ba75ec9361d130e59f7d539ea1a612646d8108d7bbffbfe9f8037fc3f38991a8040b00b30ba0e123b5bb08fa9e1ac546a32b89c4b834ac95e5fcd3bd8aca9a375af81ed6afb0ef7b1c50cda7ef1378f7019e0c854bdef2aed20a4d9bc526f2861a252ca977e53d5a87c86f3bb7a0a174f49221a1bbdfec1873087cac9de91abfa67347a75130af41420c2aa7f77f31272222b0002aa7b95265d9aa1d6c97c0a4bf148bd515167462b6b3f0cef413ef1375dbe6723023b1053bfb6f8b43b54c6b127eaaca9d6a7ac75beb3995be0109730ddc863420873537f3289ca36027d676001c73fed227f60dcba25e116083cc898327e705dd09e5f4f5340f3a5483466a51e9ec4b8cf588d8383ecadce759c80be379d8a9038b5c6885fc95f9b5dfddc5910bd1229773dab34ac5228e512d47883314a29e06d24241304c109b1b94ec1171e69eb2b3e3b720d07b96eb9e582707aff23c867b87454d73041c7e79c000b25f21e979b86d77f887b401805cf71fc3ae1f979cf5cb7686b4aed1b725aa19bfb3ce522595f8a0e7d998d437fecf85185e4a3bb3c866701da964fc7a16c2ca3deaee3ffa5d79529dd8519f6d0d9ad5cb060825569798b8608e17ccfc9c074c821c9e21323b184c0bf3239f1bbf50be97ca3e02b967134f9e3f59f424e651c1c5a47833dca462a1acea58b1fee03af509504ef448"}, 0x10) 2018/04/05 21:38:00 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 402.659794] ? kmem_cache_alloc_trace+0x152/0x780 [ 402.664659] ? __memcg_init_list_lru_node+0x17c/0x2c0 [ 402.669865] ? __list_lru_init+0x45e/0x7b0 [ 402.674112] ? sget_userns+0x706/0xf20 [ 402.678016] ? mount_ns+0x8f/0x1d0 [ 402.681573] ? graph_lock+0x170/0x170 [ 402.685387] ? do_mount+0x564/0x3070 [ 402.689115] ? ksys_mount+0x12d/0x140 [ 402.692927] ? SyS_mount+0x35/0x50 [ 402.696488] ? do_syscall_64+0x29e/0x9d0 [ 402.700579] ? find_held_lock+0x36/0x1c0 [ 402.704663] ? __lock_is_held+0xb5/0x140 [ 402.708734] ? check_same_owner+0x320/0x320 [ 402.713067] ? rcu_note_context_switch+0x710/0x710 [ 402.717997] should_failslab+0x124/0x180 [ 402.722078] kmem_cache_alloc_trace+0x2cb/0x780 [ 402.726836] ? __kmalloc_node+0x33/0x70 [ 402.730810] ? __kmalloc_node+0x33/0x70 [ 402.734781] ? rcu_read_lock_sched_held+0x108/0x120 [ 402.739797] __memcg_init_list_lru_node+0x17c/0x2c0 [ 402.744805] ? list_lru_add+0x850/0x850 [ 402.748767] ? __kmalloc_node+0x47/0x70 [ 402.752735] __list_lru_init+0x45e/0x7b0 [ 402.757654] ? list_lru_destroy+0x4c0/0x4c0 [ 402.761964] ? __raw_spin_lock_init+0x1c/0x100 [ 402.766538] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 402.771551] ? lockdep_init_map+0x9/0x10 [ 402.775621] sget_userns+0x706/0xf20 [ 402.779332] ? set_anon_super+0x20/0x20 [ 402.783315] ? get_empty_filp.cold.7+0x3e/0x3e [ 402.787888] ? destroy_unused_super.part.9+0x100/0x100 [ 402.793168] ? __alloc_pages_slowpath+0x2dc0/0x2dc0 [ 402.798213] ? kasan_check_read+0x11/0x20 [ 402.802352] ? trace_hardirqs_off+0xd/0x10 [ 402.806579] ? cap_capable+0x1f9/0x260 [ 402.810478] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 402.816001] ? security_capable+0xa4/0xd0 [ 402.820151] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 402.825677] ? ns_capable_common+0x13f/0x170 [ 402.830078] mount_ns+0x8f/0x1d0 [ 402.833435] ? rpc_pipe_release+0xb70/0xb70 [ 402.837764] rpc_mount+0x9e/0xd0 [ 402.841140] mount_fs+0xae/0x328 [ 402.844511] vfs_kern_mount.part.34+0xd4/0x4d0 [ 402.849088] ? may_umount+0xb0/0xb0 [ 402.852720] ? _raw_read_unlock+0x22/0x30 [ 402.856857] ? __get_fs_type+0x97/0xc0 [ 402.860740] do_mount+0x564/0x3070 [ 402.864275] ? copy_mount_string+0x40/0x40 [ 402.868500] ? rcu_pm_notify+0xc0/0xc0 [ 402.872383] ? copy_mount_options+0x5f/0x380 [ 402.876778] ? rcu_read_lock_sched_held+0x108/0x120 [ 402.881784] ? kmem_cache_alloc_trace+0x616/0x780 [ 402.886636] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 402.892175] ? _copy_from_user+0xdf/0x150 [ 402.896335] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 402.901869] ? copy_mount_options+0x285/0x380 [ 402.906375] ksys_mount+0x12d/0x140 [ 402.909994] SyS_mount+0x35/0x50 [ 402.913363] ? ksys_mount+0x140/0x140 [ 402.917162] do_syscall_64+0x29e/0x9d0 [ 402.921044] ? vmalloc_sync_all+0x30/0x30 [ 402.925202] ? _raw_spin_unlock_irq+0x27/0x70 [ 402.929699] ? finish_task_switch+0x1ca/0x820 [ 402.934185] ? syscall_return_slowpath+0x5c0/0x5c0 [ 402.939103] ? syscall_return_slowpath+0x30f/0x5c0 [ 402.944055] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 402.949422] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 402.954288] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 402.959481] RIP: 0033:0x4552d9 [ 402.962667] RSP: 002b:00007f4cbd4aec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 402.970363] RAX: ffffffffffffffda RBX: 00007f4cbd4af6d4 RCX: 00000000004552d9 [ 402.979016] RDX: 00000000200002c0 RSI: 0000000020000140 RDI: 0000000020000300 [ 402.986285] RBP: 000000000072bea0 R08: 0000000020001280 R09: 0000000000000000 [ 402.993543] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 403.000800] R13: 00000000000003fa R14: 00000000006f9010 R15: 000000000000001c 2018/04/05 21:38:00 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xe7d, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:38:00 executing program 5 (fault-call:3 fault-nth:29): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000001380)='./file0\x00', &(0x7f0000001340)='proc\x00', 0x0, &(0x7f0000000240)) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000001280)) 2018/04/05 21:38:00 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000400008fe7bb5cd4e344cd0002800000720a00ff"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xf, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x4800000000000000}, [@jmp={0x5, 0x0, 0xffffffcd}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) 2018/04/05 21:38:01 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:38:01 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xd6f, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:38:01 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000001380)='./file0\x00', &(0x7f0000001340)='proc\x00', 0x0, &(0x7f0000000240)) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000001280)) 2018/04/05 21:38:01 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 403.249688] FAULT_INJECTION: forcing a failure. [ 403.249688] name failslab, interval 1, probability 0, space 0, times 0 [ 403.261018] CPU: 0 PID: 4749 Comm: syz-executor5 Not tainted 4.16.0+ #1 [ 403.267788] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 403.277158] Call Trace: [ 403.279768] dump_stack+0x1b9/0x29f [ 403.283681] ? arch_local_irq_restore+0x52/0x52 [ 403.288383] should_fail.cold.4+0xa/0x1a [ 403.292484] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 403.297616] ? kmem_cache_alloc_trace+0x152/0x780 [ 403.302480] ? __memcg_init_list_lru_node+0x17c/0x2c0 [ 403.307686] ? __list_lru_init+0x45e/0x7b0 [ 403.311935] ? sget_userns+0x706/0xf20 [ 403.315839] ? mount_ns+0x8f/0x1d0 [ 403.319397] ? graph_lock+0x170/0x170 [ 403.323216] ? do_mount+0x564/0x3070 [ 403.326946] ? ksys_mount+0x12d/0x140 [ 403.330763] ? SyS_mount+0x35/0x50 [ 403.334317] ? do_syscall_64+0x29e/0x9d0 [ 403.338407] ? find_held_lock+0x36/0x1c0 [ 403.342508] ? __lock_is_held+0xb5/0x140 [ 403.346613] ? check_same_owner+0x320/0x320 [ 403.350959] ? rcu_note_context_switch+0x710/0x710 [ 403.355917] should_failslab+0x124/0x180 [ 403.360004] kmem_cache_alloc_trace+0x2cb/0x780 [ 403.364691] ? __kmalloc_node+0x33/0x70 [ 403.368679] ? __kmalloc_node+0x33/0x70 [ 403.372665] ? rcu_read_lock_sched_held+0x108/0x120 [ 403.377689] __memcg_init_list_lru_node+0x17c/0x2c0 [ 403.382707] ? list_lru_add+0x850/0x850 [ 403.386681] ? __kmalloc_node+0x47/0x70 [ 403.390667] __list_lru_init+0x45e/0x7b0 [ 403.394727] ? list_lru_destroy+0x4c0/0x4c0 [ 403.399044] ? __raw_spin_lock_init+0x1c/0x100 [ 403.403623] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 403.408637] ? lockdep_init_map+0x9/0x10 [ 403.412695] sget_userns+0x706/0xf20 [ 403.416397] ? set_anon_super+0x20/0x20 [ 403.420368] ? get_empty_filp.cold.7+0x3e/0x3e [ 403.424943] ? destroy_unused_super.part.9+0x100/0x100 [ 403.430220] ? __alloc_pages_slowpath+0x2dc0/0x2dc0 [ 403.435233] ? kasan_check_read+0x11/0x20 [ 403.439377] ? trace_hardirqs_off+0xd/0x10 [ 403.443609] ? cap_capable+0x1f9/0x260 [ 403.447494] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 403.453028] ? security_capable+0xa4/0xd0 [ 403.457174] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 403.462700] ? ns_capable_common+0x13f/0x170 [ 403.467105] mount_ns+0x8f/0x1d0 [ 403.470464] ? rpc_pipe_release+0xb70/0xb70 [ 403.474781] rpc_mount+0x9e/0xd0 [ 403.478142] mount_fs+0xae/0x328 [ 403.481511] vfs_kern_mount.part.34+0xd4/0x4d0 [ 403.486086] ? may_umount+0xb0/0xb0 [ 403.489704] ? _raw_read_unlock+0x22/0x30 [ 403.493842] ? __get_fs_type+0x97/0xc0 [ 403.497727] do_mount+0x564/0x3070 [ 403.501254] ? do_raw_spin_unlock+0x9e/0x2e0 [ 403.505677] ? copy_mount_string+0x40/0x40 [ 403.509906] ? rcu_pm_notify+0xc0/0xc0 [ 403.513795] ? copy_mount_options+0x5f/0x380 [ 403.518198] ? rcu_read_lock_sched_held+0x108/0x120 [ 403.523211] ? kmem_cache_alloc_trace+0x616/0x780 [ 403.528056] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 403.533599] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 403.539128] ? copy_mount_options+0x285/0x380 [ 403.543623] ksys_mount+0x12d/0x140 [ 403.547246] SyS_mount+0x35/0x50 [ 403.550603] ? ksys_mount+0x140/0x140 [ 403.554406] do_syscall_64+0x29e/0x9d0 [ 403.558294] ? vmalloc_sync_all+0x30/0x30 [ 403.562436] ? kasan_check_write+0x14/0x20 [ 403.566667] ? syscall_return_slowpath+0x5c0/0x5c0 [ 403.571588] ? syscall_return_slowpath+0x30f/0x5c0 [ 403.576516] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 403.581878] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 403.586727] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 403.591905] RIP: 0033:0x4552d9 2018/04/05 21:38:01 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000400008fe7bb5cd4e344cd0002800000720a00ff"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xf, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x17bc1a00}, [@jmp={0x5, 0x0, 0xffffffcd}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) 2018/04/05 21:38:01 executing program 6: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9}, 0x3d1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r0, 0x28, &(0x7f0000000040)}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000028000)={r1, &(0x7f0000000200), &(0x7f0000000240)="13"}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r1, &(0x7f0000000040)}, 0x10) 2018/04/05 21:38:01 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8cffffff00000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 403.595080] RSP: 002b:00007f4cbd4aec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 403.602780] RAX: ffffffffffffffda RBX: 00007f4cbd4af6d4 RCX: 00000000004552d9 [ 403.610041] RDX: 00000000200002c0 RSI: 0000000020000140 RDI: 0000000020000300 [ 403.617297] RBP: 000000000072bea0 R08: 0000000020001280 R09: 0000000000000000 [ 403.624555] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 403.631825] R13: 00000000000003fa R14: 00000000006f9010 R15: 000000000000001d 2018/04/05 21:38:01 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0x296, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:38:01 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000001380)='./file0\x00', &(0x7f0000001340)='proc\x00', 0x0, &(0x7f0000000240)) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000001280)) 2018/04/05 21:38:01 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0x75b, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:38:01 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xf6ffffff00000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:38:01 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6ffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:38:01 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9}, 0x3d1) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000028000)={r0, &(0x7f00000000c0)="61a67d2e846b27d05b8b1bb816355e3d7e80122a784b6eb91f32f939dc15988ebe8a6bce04fc1e9be47428b7394a419f1d8f7f32ba40abba13416a13327de17d9c869d58ac6ce5cac6a3bd258c246e3367f9a47978566ffb0777f509eea024ceaed3a33cd6ee2c41bda96fd2eaf1bdeb3d920b59428e86e4ad555e019807e0107c21ea63b7e28d6e770bec8d8ebacbdbf6748bd8502825a726ec65940021eff033b1", &(0x7f0000000040)="0070cf3d04da10650a12e554ea175491aa6901eba31779e4e754785e"}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r0, &(0x7f0000000040)}, 0x10) 2018/04/05 21:38:01 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000400008fe7bb5cd4e344cd0002800000720a00ff"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xf, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x85ffffff}, [@jmp={0x5, 0x0, 0xffffffcd}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) 2018/04/05 21:38:01 executing program 5 (fault-call:3 fault-nth:30): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000001380)='./file0\x00', &(0x7f0000001340)='proc\x00', 0x0, &(0x7f0000000240)) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000001280)) 2018/04/05 21:38:01 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 403.930153] FAULT_INJECTION: forcing a failure. [ 403.930153] name failslab, interval 1, probability 0, space 0, times 0 [ 403.941589] CPU: 0 PID: 4797 Comm: syz-executor5 Not tainted 4.16.0+ #1 [ 403.948356] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 403.957727] Call Trace: [ 403.960341] dump_stack+0x1b9/0x29f [ 403.964000] ? arch_local_irq_restore+0x52/0x52 [ 403.968706] should_fail.cold.4+0xa/0x1a [ 403.972794] ? fault_create_debugfs_attr+0x1f0/0x1f0 2018/04/05 21:38:01 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0x232, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:38:01 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffff8c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:38:01 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0x1ce, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) [ 403.977922] ? kmem_cache_alloc_trace+0x152/0x780 [ 403.982786] ? __memcg_init_list_lru_node+0x17c/0x2c0 [ 403.988082] ? __list_lru_init+0x45e/0x7b0 [ 403.992331] ? sget_userns+0x706/0xf20 [ 403.996240] ? mount_ns+0x8f/0x1d0 [ 403.999799] ? graph_lock+0x170/0x170 [ 404.003615] ? do_mount+0x564/0x3070 [ 404.007343] ? ksys_mount+0x12d/0x140 [ 404.011163] ? SyS_mount+0x35/0x50 [ 404.014725] ? do_syscall_64+0x29e/0x9d0 [ 404.018815] ? find_held_lock+0x36/0x1c0 [ 404.022910] ? __lock_is_held+0xb5/0x140 [ 404.027018] ? check_same_owner+0x320/0x320 [ 404.031374] ? rcu_note_context_switch+0x710/0x710 [ 404.036338] should_failslab+0x124/0x180 [ 404.040430] kmem_cache_alloc_trace+0x2cb/0x780 [ 404.045118] ? __kmalloc_node+0x33/0x70 [ 404.049111] ? __kmalloc_node+0x33/0x70 [ 404.053107] ? rcu_read_lock_sched_held+0x108/0x120 [ 404.058151] __memcg_init_list_lru_node+0x17c/0x2c0 [ 404.063192] ? list_lru_add+0x850/0x850 [ 404.067188] ? __kmalloc_node+0x47/0x70 [ 404.071194] __list_lru_init+0x45e/0x7b0 [ 404.075280] ? list_lru_destroy+0x4c0/0x4c0 2018/04/05 21:38:01 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000001380)='./file0\x00', &(0x7f0000001340)='proc\x00', 0x0, &(0x7f0000000240)) mount(&(0x7f0000000300)="2e2f66696c65301b", &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000001280)) 2018/04/05 21:38:01 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9}, 0x3d1) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000028000)={r0, &(0x7f0000000200), &(0x7f0000000240)="13"}, 0x20) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000002cc0)={&(0x7f0000001740)=@can={0x0, 0x0}, 0x80, &(0x7f0000002c40)=[{&(0x7f00000017c0)=""/39, 0x27}, {&(0x7f0000001800)=""/238, 0xee}, {&(0x7f0000001900)=""/217, 0xd9}, {&(0x7f0000001a00)=""/40, 0x28}, {&(0x7f0000001a40)=""/251, 0xfb}, {&(0x7f0000001b40)=""/30, 0x1e}, {&(0x7f0000001b80)=""/167, 0xa7}, {&(0x7f0000001c40)=""/4096, 0x1000}], 0x8, 0x0, 0x0, 0x10000}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000002d00)={0xf, 0xe, &(0x7f00000000c0)=@raw=[@jmp={0x5, 0x7, 0x4, 0x5, 0x6, 0xffffffff, 0xffffffffffffffff}, @initr0={0x18, 0x0, 0x0, 0x0, 0xc9, 0x0, 0x0, 0x0, 0x4}, @jmp={0x5, 0x100000000, 0x6, 0xa, 0xa, 0x20, 0xfffffffffffffffd}, @map={0x18, 0xb, 0x1, 0x0, r0}, @ldst={0x2, 0x0, 0x2, 0x4, 0x7, 0xfffffffe, 0xffffffffffffffff}, @ldst={0x3, 0x3, 0x1, 0x6, 0x6, 0x0, 0x4}, @jmp={0x5, 0x689d, 0x0, 0x5, 0x6, 0x9}], &(0x7f0000000040)='syzkaller\x00', 0x9, 0x68, &(0x7f0000000140)=""/104, 0x41100, 0x1, [], r1}, 0x48) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r0, &(0x7f0000000040)}, 0x10) 2018/04/05 21:38:01 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 404.079612] ? __raw_spin_lock_init+0x1c/0x100 [ 404.084211] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 404.089252] ? lockdep_init_map+0x9/0x10 [ 404.093329] sget_userns+0x706/0xf20 [ 404.097063] ? set_anon_super+0x20/0x20 [ 404.101061] ? get_empty_filp.cold.7+0x3e/0x3e [ 404.105654] ? destroy_unused_super.part.9+0x100/0x100 [ 404.110951] ? __alloc_pages_slowpath+0x2dc0/0x2dc0 [ 404.115989] ? kasan_check_read+0x11/0x20 [ 404.120157] ? trace_hardirqs_off+0xd/0x10 [ 404.124407] ? cap_capable+0x1f9/0x260 [ 404.128316] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 404.133872] ? security_capable+0xa4/0xd0 [ 404.138045] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 404.143599] ? ns_capable_common+0x13f/0x170 [ 404.148035] mount_ns+0x8f/0x1d0 [ 404.151421] ? rpc_pipe_release+0xb70/0xb70 [ 404.155762] rpc_mount+0x9e/0xd0 [ 404.159154] mount_fs+0xae/0x328 [ 404.162547] vfs_kern_mount.part.34+0xd4/0x4d0 [ 404.167152] ? may_umount+0xb0/0xb0 [ 404.170790] ? _raw_read_unlock+0x22/0x30 [ 404.174951] ? __get_fs_type+0x97/0xc0 2018/04/05 21:38:02 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x100000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:38:02 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 404.178870] do_mount+0x564/0x3070 [ 404.182439] ? copy_mount_string+0x40/0x40 [ 404.186689] ? rcu_pm_notify+0xc0/0xc0 [ 404.190609] ? copy_mount_options+0x5f/0x380 [ 404.195036] ? rcu_read_lock_sched_held+0x108/0x120 [ 404.200069] ? kmem_cache_alloc_trace+0x616/0x780 [ 404.204937] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 404.210489] ? _copy_from_user+0xdf/0x150 [ 404.214658] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 404.220210] ? copy_mount_options+0x285/0x380 [ 404.224733] ksys_mount+0x12d/0x140 [ 404.228384] SyS_mount+0x35/0x50 [ 404.231758] ? ksys_mount+0x140/0x140 [ 404.235578] do_syscall_64+0x29e/0x9d0 [ 404.239473] ? vmalloc_sync_all+0x30/0x30 [ 404.243633] ? _raw_spin_unlock_irq+0x27/0x70 [ 404.248142] ? finish_task_switch+0x1ca/0x820 [ 404.252661] ? syscall_return_slowpath+0x5c0/0x5c0 [ 404.257619] ? syscall_return_slowpath+0x30f/0x5c0 [ 404.262579] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 404.267971] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 404.272853] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 404.278048] RIP: 0033:0x4552d9 [ 404.281246] RSP: 002b:00007f4cbd4aec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 404.288974] RAX: ffffffffffffffda RBX: 00007f4cbd4af6d4 RCX: 00000000004552d9 [ 404.296256] RDX: 00000000200002c0 RSI: 0000000020000140 RDI: 0000000020000300 [ 404.303542] RBP: 000000000072bea0 R08: 0000000020001280 R09: 0000000000000000 [ 404.310831] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 404.318119] R13: 00000000000003fa R14: 00000000006f9010 R15: 000000000000001e 2018/04/05 21:38:02 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000400008fe7bb5cd4e344cd0002800000720a00ff"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xf, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x7a}, [@jmp={0x5, 0x0, 0xffffffcd}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) 2018/04/05 21:38:02 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xf6ffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:38:02 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0x5da, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:38:02 executing program 6: r0 = perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x7e, 0x2, 0x7, 0x6, 0x0, 0x1, 0x0, 0xf, 0x3, 0x401, 0xffffffffffffff91, 0x45e, 0x63e64ebe, 0x9e3, 0x800, 0x3ff, 0x1, 0x40, 0x3, 0x20, 0x8ca0, 0x1, 0x2, 0x7, 0x81, 0x8, 0x2, 0x7f, 0x7, 0x4, 0x1, 0x1, 0x5, 0x2, 0x8001, 0x7f80000000000, 0x0, 0x5ac2, 0x7, @perf_bp={&(0x7f00000000c0), 0x4}, 0x4000, 0x4, 0x4, 0x6, 0x21f, 0x8001, 0x7f}, 0x0, 0xc, 0xffffffffffffff9c, 0x2) socketpair(0x15, 0xa, 0x2, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9}, 0x3d1) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x5) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000040)='$:[cgroupppp1nodev)md5sum\x00') bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000028000)={r3, &(0x7f0000000200), &(0x7f0000000240)="13"}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r3, &(0x7f0000000040)}, 0x10) 2018/04/05 21:38:02 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0x983, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:38:02 executing program 5 (fault-call:3 fault-nth:31): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000001380)='./file0\x00', &(0x7f0000001340)='proc\x00', 0x0, &(0x7f0000000240)) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000001280)) 2018/04/05 21:38:02 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000001380)='./file0\x00', &(0x7f0000001340)='proc\x00', 0x0, &(0x7f0000000240)) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000001280)) 2018/04/05 21:38:02 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 404.554916] FAULT_INJECTION: forcing a failure. [ 404.554916] name failslab, interval 1, probability 0, space 0, times 0 [ 404.566274] CPU: 1 PID: 4848 Comm: syz-executor5 Not tainted 4.16.0+ #1 [ 404.573029] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 404.582381] Call Trace: [ 404.584974] dump_stack+0x1b9/0x29f [ 404.588999] ? arch_local_irq_restore+0x52/0x52 [ 404.593675] ? __save_stack_trace+0x7e/0xd0 [ 404.598014] should_fail.cold.4+0xa/0x1a 2018/04/05 21:38:02 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:38:02 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000400008fe7bb5cd4e344cd0002800000720a00ff"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xf, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x0, 0xffffff9f}, [@jmp={0x5, 0x0, 0xffffffcd}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) [ 404.602086] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 404.607196] ? kasan_kmalloc+0xc4/0xe0 [ 404.611091] ? kmem_cache_alloc_trace+0x152/0x780 [ 404.615938] ? __memcg_init_list_lru_node+0x17c/0x2c0 [ 404.621137] ? __list_lru_init+0x45e/0x7b0 [ 404.625380] ? sget_userns+0x706/0xf20 [ 404.629271] ? mount_ns+0x8f/0x1d0 [ 404.632825] ? graph_lock+0x170/0x170 [ 404.636629] ? do_mount+0x564/0x3070 [ 404.640354] ? ksys_mount+0x12d/0x140 [ 404.644160] ? SyS_mount+0x35/0x50 [ 404.647705] ? do_syscall_64+0x29e/0x9d0 2018/04/05 21:38:02 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000400008fe7bb5cd4e344cd0002800000720a00ff"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xf, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x3f000000}, [@jmp={0x5, 0x0, 0xffffffcd}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) 2018/04/05 21:38:02 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 404.651779] ? find_held_lock+0x36/0x1c0 [ 404.655859] ? __lock_is_held+0xb5/0x140 [ 404.659945] ? check_same_owner+0x320/0x320 [ 404.664274] ? rcu_note_context_switch+0x710/0x710 [ 404.669215] should_failslab+0x124/0x180 [ 404.673281] kmem_cache_alloc_trace+0x2cb/0x780 [ 404.677954] ? __kmalloc_node+0x33/0x70 [ 404.681936] ? __kmalloc_node+0x33/0x70 [ 404.685926] __memcg_init_list_lru_node+0x17c/0x2c0 [ 404.690955] ? list_lru_add+0x850/0x850 [ 404.694939] ? __kmalloc_node+0x47/0x70 [ 404.698927] __list_lru_init+0x45e/0x7b0 [ 404.703002] ? list_lru_destroy+0x4c0/0x4c0 [ 404.707327] ? __raw_spin_lock_init+0x1c/0x100 [ 404.711919] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 404.716950] ? lockdep_init_map+0x9/0x10 [ 404.721032] sget_userns+0x706/0xf20 [ 404.724750] ? set_anon_super+0x20/0x20 [ 404.728738] ? get_empty_filp.cold.7+0x3e/0x3e [ 404.733329] ? destroy_unused_super.part.9+0x100/0x100 [ 404.738620] ? __alloc_pages_slowpath+0x2dc0/0x2dc0 [ 404.743650] ? kasan_check_read+0x11/0x20 [ 404.747814] ? rcu_pm_notify+0xc0/0xc0 [ 404.751701] ? trace_hardirqs_off+0xd/0x10 2018/04/05 21:38:02 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:38:02 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0x16f, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:38:02 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0x5d2, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:38:02 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)={&(0x7f0000000040)='./file0\x00'}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x100000000, 0x2, 0x7fff, 0x1, 0xffffffffffffff9c, 0x1}, 0x2c) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0x0, 0x10}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x0, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000028000)={r1, &(0x7f0000000200), &(0x7f0000000240)="13"}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r1, &(0x7f0000000040)}, 0x10) [ 404.755943] ? cap_capable+0x1f9/0x260 [ 404.759840] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 404.765382] ? security_capable+0xa4/0xd0 [ 404.769542] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 404.775089] ? ns_capable_common+0x13f/0x170 [ 404.779511] mount_ns+0x8f/0x1d0 [ 404.782880] ? rpc_pipe_release+0xb70/0xb70 [ 404.787209] rpc_mount+0x9e/0xd0 [ 404.790585] mount_fs+0xae/0x328 [ 404.793960] vfs_kern_mount.part.34+0xd4/0x4d0 [ 404.798552] ? may_umount+0xb0/0xb0 [ 404.802186] ? _raw_read_unlock+0x22/0x30 2018/04/05 21:38:02 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8cffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 404.806337] ? __get_fs_type+0x97/0xc0 [ 404.810233] do_mount+0x564/0x3070 [ 404.813794] ? copy_mount_string+0x40/0x40 [ 404.818032] ? rcu_pm_notify+0xc0/0xc0 [ 404.821933] ? copy_mount_options+0x5f/0x380 [ 404.826350] ? rcu_read_lock_sched_held+0x108/0x120 [ 404.831374] ? kmem_cache_alloc_trace+0x616/0x780 [ 404.836224] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 404.841766] ? _copy_from_user+0xdf/0x150 [ 404.845928] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 404.851468] ? copy_mount_options+0x285/0x380 2018/04/05 21:38:02 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000001380)='./file0\x00', &(0x7f0000001340)='proc\x00', 0x0, &(0x7f0000000240)) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000001280)) [ 404.855974] ksys_mount+0x12d/0x140 [ 404.859612] SyS_mount+0x35/0x50 [ 404.862984] ? ksys_mount+0x140/0x140 [ 404.866794] do_syscall_64+0x29e/0x9d0 [ 404.870685] ? vmalloc_sync_all+0x30/0x30 [ 404.874842] ? _raw_spin_unlock_irq+0x27/0x70 [ 404.879340] ? finish_task_switch+0x1ca/0x820 [ 404.883845] ? syscall_return_slowpath+0x5c0/0x5c0 [ 404.888787] ? syscall_return_slowpath+0x30f/0x5c0 [ 404.893731] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 404.899105] ? trace_hardirqs_off_thunk+0x1a/0x1c 2018/04/05 21:38:02 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:38:02 executing program 6: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0xffffffff, 0x8, 0x10}, 0xc) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000280)={r0, &(0x7f00000000c0)="47608318745ce963ce7ac43a7051a2fed207cb3d50ee6ea2d16bf1792e6b874000e78027f4cb74ab786fb0d54d5b8ee74b46a96be5e8164722eb3d451eecb4da8c2a052bddca9ead98563cbeaab5b358796a2c8a5893c949c3cd9b8c304bdede0ccc95f0884c86b16d936c05bb3d", &(0x7f0000000140)="6eececabf8ee631b6e3a7b0a4a40d91ef65dbe64d9950b60b0065231a310be78d8bcfabb2901863f904aceb5b80236afabcc666a073791f480e96eab30bf2d80f89fdb8e4c3956e6a39e5d15418e108486d82ddc21290b387cf730a95e0a6503b7c360d5edff166203fcc506399cff271dcf515768480df0a8ef441eddad54feb97ff4bb718fbf80e6ffb7b15d781cc1fcebb363d4e0e69b142a49794469cc59bd47fc034b7d7deb938b97377e55fec933dd251f963b4bb8815f3c0daf78879a11fd5b000d5eb51afa38b26727ec0bc7e522d8274e11f5949e", 0x1}, 0x20) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9}, 0x3d1) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000028000)={r1, &(0x7f0000000200), &(0x7f0000000240)="13"}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r1, &(0x7f0000000040)}, 0x10) 2018/04/05 21:38:02 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 404.903957] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 404.909148] RIP: 0033:0x4552d9 [ 404.912334] RSP: 002b:00007f4cbd4aec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 404.920046] RAX: ffffffffffffffda RBX: 00007f4cbd4af6d4 RCX: 00000000004552d9 [ 404.927318] RDX: 00000000200002c0 RSI: 0000000020000140 RDI: 0000000020000300 [ 404.934589] RBP: 000000000072bea0 R08: 0000000020001280 R09: 0000000000000000 [ 404.941859] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 404.949133] R13: 00000000000003fa R14: 00000000006f9010 R15: 000000000000001f 2018/04/05 21:38:03 executing program 5 (fault-call:3 fault-nth:32): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000001380)='./file0\x00', &(0x7f0000001340)='proc\x00', 0x0, &(0x7f0000000240)) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000001280)) 2018/04/05 21:38:03 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xd5d, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:38:03 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000400008fe7bb5cd4e344cd0002800000720a00ff"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xf, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x7}, [@jmp={0x5, 0x0, 0xffffffcd}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) 2018/04/05 21:38:03 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xe7a, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:38:03 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000001380)='./file0\x00', &(0x7f0000001340)='proc\x00', 0x0, &(0x7f0000000240)) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000001280)) 2018/04/05 21:38:03 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:38:03 executing program 6: r0 = gettid() perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x408000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, r0, 0x3, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9}, 0x3d1) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000028000)={r1, &(0x7f0000000040), &(0x7f0000000240)="13"}, 0xfffffffffffffc25) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r1, &(0x7f0000000040)}, 0x10) 2018/04/05 21:38:03 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x4000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:38:03 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)={&(0x7f0000000040)='./file0\x00', 0x0, 0x8}, 0x10) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9}, 0x3d1) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000028000)={r0, &(0x7f0000000200), &(0x7f0000000240)="13"}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r0, &(0x7f0000000040)}, 0x10) [ 405.244613] FAULT_INJECTION: forcing a failure. [ 405.244613] name failslab, interval 1, probability 0, space 0, times 0 [ 405.255973] CPU: 0 PID: 4907 Comm: syz-executor5 Not tainted 4.16.0+ #1 [ 405.262751] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 405.272118] Call Trace: [ 405.274730] dump_stack+0x1b9/0x29f [ 405.278385] ? arch_local_irq_restore+0x52/0x52 [ 405.283098] should_fail.cold.4+0xa/0x1a [ 405.287185] ? fault_create_debugfs_attr+0x1f0/0x1f0 2018/04/05 21:38:03 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000400008fe7bb5cd4e344cd0002800000720a00ff"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xf, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x2000000}, [@jmp={0x5, 0x0, 0xffffffcd}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) 2018/04/05 21:38:03 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6ffffff00000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 405.292322] ? kmem_cache_alloc_trace+0x152/0x780 [ 405.297183] ? __memcg_init_list_lru_node+0x17c/0x2c0 [ 405.302387] ? __list_lru_init+0x45e/0x7b0 [ 405.306637] ? sget_userns+0x706/0xf20 [ 405.310538] ? mount_ns+0x8f/0x1d0 [ 405.314095] ? graph_lock+0x170/0x170 [ 405.317907] ? do_mount+0x564/0x3070 [ 405.321633] ? ksys_mount+0x12d/0x140 [ 405.325448] ? SyS_mount+0x35/0x50 [ 405.329002] ? do_syscall_64+0x29e/0x9d0 [ 405.333089] ? find_held_lock+0x36/0x1c0 [ 405.337190] ? __lock_is_held+0xb5/0x140 [ 405.341301] ? check_same_owner+0x320/0x320 [ 405.345632] ? rcu_note_context_switch+0x710/0x710 [ 405.350573] should_failslab+0x124/0x180 [ 405.354631] kmem_cache_alloc_trace+0x2cb/0x780 [ 405.359296] ? __kmalloc_node+0x33/0x70 [ 405.363265] ? __kmalloc_node+0x33/0x70 [ 405.367232] ? rcu_read_lock_sched_held+0x108/0x120 [ 405.372266] __memcg_init_list_lru_node+0x17c/0x2c0 [ 405.377283] ? list_lru_add+0x850/0x850 [ 405.381257] ? __kmalloc_node+0x47/0x70 [ 405.385232] __list_lru_init+0x45e/0x7b0 [ 405.389293] ? list_lru_destroy+0x4c0/0x4c0 [ 405.393607] ? __raw_spin_lock_init+0x1c/0x100 [ 405.398273] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 405.403288] ? lockdep_init_map+0x9/0x10 [ 405.407346] sget_userns+0x706/0xf20 [ 405.411052] ? set_anon_super+0x20/0x20 [ 405.415033] ? get_empty_filp.cold.7+0x3e/0x3e [ 405.419605] ? destroy_unused_super.part.9+0x100/0x100 [ 405.424877] ? __alloc_pages_slowpath+0x2dc0/0x2dc0 [ 405.429885] ? kasan_check_read+0x11/0x20 [ 405.434036] ? trace_hardirqs_off+0xd/0x10 [ 405.438266] ? cap_capable+0x1f9/0x260 [ 405.442151] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 405.447678] ? security_capable+0xa4/0xd0 [ 405.451820] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 405.457345] ? ns_capable_common+0x13f/0x170 [ 405.461753] mount_ns+0x8f/0x1d0 [ 405.465108] ? rpc_pipe_release+0xb70/0xb70 [ 405.469425] rpc_mount+0x9e/0xd0 [ 405.472788] mount_fs+0xae/0x328 [ 405.476155] vfs_kern_mount.part.34+0xd4/0x4d0 [ 405.480730] ? may_umount+0xb0/0xb0 [ 405.484351] ? _raw_read_unlock+0x22/0x30 [ 405.488487] ? __get_fs_type+0x97/0xc0 [ 405.492370] do_mount+0x564/0x3070 [ 405.495908] ? copy_mount_string+0x40/0x40 [ 405.500135] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 405.504892] ? retint_kernel+0x10/0x10 [ 405.508777] ? copy_mount_options+0x213/0x380 [ 405.513263] ? __sanitizer_cov_trace_pc+0x14/0x50 [ 405.518096] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 405.523623] ? copy_mount_options+0x285/0x380 [ 405.528115] ksys_mount+0x12d/0x140 [ 405.531750] SyS_mount+0x35/0x50 [ 405.535106] ? ksys_mount+0x140/0x140 [ 405.538902] do_syscall_64+0x29e/0x9d0 [ 405.542777] ? vmalloc_sync_all+0x30/0x30 [ 405.546920] ? _raw_spin_unlock_irq+0x27/0x70 [ 405.551406] ? finish_task_switch+0x1ca/0x820 [ 405.555899] ? syscall_return_slowpath+0x5c0/0x5c0 [ 405.560821] ? syscall_return_slowpath+0x30f/0x5c0 [ 405.565748] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 405.571109] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 405.575954] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 405.581130] RIP: 0033:0x4552d9 [ 405.584306] RSP: 002b:00007f4cbd4aec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 2018/04/05 21:38:03 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xfdb, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) [ 405.592013] RAX: ffffffffffffffda RBX: 00007f4cbd4af6d4 RCX: 00000000004552d9 [ 405.599278] RDX: 00000000200002c0 RSI: 0000000020000140 RDI: 0000000020000300 [ 405.606535] RBP: 000000000072bea0 R08: 0000000020001280 R09: 0000000000000000 [ 405.613791] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 405.621047] R13: 00000000000003fa R14: 00000000006f9010 R15: 0000000000000020 2018/04/05 21:38:03 executing program 6: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9}, 0x3d1) bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x2, 0x125, 0x20, 0x0, 0x10, r0, 0x9d}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000028000)={r1, &(0x7f0000000200), &(0x7f0000000240)="13"}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r1, &(0x7f00000000c0)="e0c92d6319e0ce2ad22e80a9d951c1ad86e5549537c690962ac5c0670104ab0d1a61b6efca803263ee988c56cb296d18423db2e3dbe48b8333f46eccdd300f51e5505c75af3222e6b89c1d976c376d5bfbc35c346dbee0950f62d2b4a3580df1cdcf952fb90031b7737a1ba79bf990d9faa77225ed9afc597f3c32389aebfd872dc84399b7794f5d1752cf6de93e5ea5ff9874d40b85e0f3ecec2e14b442af0d75b533dcf20bb3812a1558776038", &(0x7f0000000180)=""/188}, 0x18) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r1, &(0x7f0000000040)}, 0x10) 2018/04/05 21:38:03 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xac8, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:38:03 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x8cffffff00000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:38:03 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000001380)='./file0\x00', &(0x7f0000001340)='proc\x00', 0x0, &(0x7f0000000240)) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000001280)) 2018/04/05 21:38:03 executing program 5 (fault-call:3 fault-nth:33): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000001380)='./file0\x00', &(0x7f0000001340)='proc\x00', 0x0, &(0x7f0000000240)) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000001280)) 2018/04/05 21:38:03 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:38:03 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0x8e1, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:38:03 executing program 6: r0 = getpid() perf_event_open(&(0x7f000025c000)={0x2, 0x32, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9}, 0x3d1) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000028000)={r1, &(0x7f0000000200), &(0x7f0000000240)="13"}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r1, &(0x7f0000000040)}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r1, &(0x7f0000000280)="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", &(0x7f0000000040)="43776474d0e0eabf2af4bfc30efe9c8d6761f63ad444cf42cbc6ae0f890069e63fbe339ba0aa07310496", 0x3}, 0x20) 2018/04/05 21:38:03 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000400008fe7bb5cd4e344cd0002800000720a00ff"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xf, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x3c00}, [@jmp={0x5, 0x0, 0xffffffcd}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) 2018/04/05 21:38:03 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0x270, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:38:03 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x2000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:38:03 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000001380)='./file0\x00', &(0x7f0000001340)='proc\x00', 0x0, &(0x7f0000000240)) mount(&(0x7f0000000300)="2e2f66696c6530f6", &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000001280)) 2018/04/05 21:38:03 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff8c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:38:03 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x8cffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:38:03 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9}, 0x3d1) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000028000)={r0, &(0x7f0000000200), &(0x7f0000000240)="13"}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0, &(0x7f0000000180)="79bba56cde69922f6709c61748ab5d0d09f8af3bff7b062f7452c58d33c92bd3ddf5fc5f6f6864598ff5b29812fbb4a3633d1103ad8663b06333620356208d7f6e10954f4d4001a7d3e28d03aa0e6f24b8fa095975ad56125bcbc5f566753867c0fb1a59b09e0a3060312c51e0eee88d58ace7f6fcde386d5efe1230f544e28a4a0776417c25b954ec825c7d490b31b26ff261e9fc363afaa328272abbf8c86cb5b1139bf92e"}, 0x3) 2018/04/05 21:38:03 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0x586, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) [ 406.062301] FAULT_INJECTION: forcing a failure. [ 406.062301] name failslab, interval 1, probability 0, space 0, times 0 [ 406.073711] CPU: 0 PID: 4968 Comm: syz-executor5 Not tainted 4.16.0+ #1 [ 406.080499] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 406.089865] Call Trace: [ 406.092475] dump_stack+0x1b9/0x29f [ 406.096131] ? arch_local_irq_restore+0x52/0x52 [ 406.100844] should_fail.cold.4+0xa/0x1a [ 406.104940] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 406.110070] ? kmem_cache_alloc_trace+0x152/0x780 [ 406.114931] ? __memcg_init_list_lru_node+0x17c/0x2c0 [ 406.120138] ? __list_lru_init+0x45e/0x7b0 [ 406.124386] ? sget_userns+0x706/0xf20 [ 406.128292] ? mount_ns+0x8f/0x1d0 [ 406.131854] ? graph_lock+0x170/0x170 [ 406.135669] ? do_mount+0x564/0x3070 [ 406.139397] ? ksys_mount+0x12d/0x140 [ 406.143235] ? SyS_mount+0x35/0x50 [ 406.146793] ? do_syscall_64+0x29e/0x9d0 [ 406.150888] ? find_held_lock+0x36/0x1c0 [ 406.154985] ? __lock_is_held+0xb5/0x140 [ 406.159077] ? check_same_owner+0x320/0x320 [ 406.163400] ? rcu_note_context_switch+0x710/0x710 [ 406.168339] should_failslab+0x124/0x180 [ 406.172402] kmem_cache_alloc_trace+0x2cb/0x780 [ 406.177063] ? __kmalloc_node+0x33/0x70 [ 406.181037] ? __kmalloc_node+0x33/0x70 [ 406.185022] __memcg_init_list_lru_node+0x17c/0x2c0 [ 406.190044] ? list_lru_add+0x850/0x850 [ 406.194021] ? __kmalloc_node+0x47/0x70 [ 406.197999] __list_lru_init+0x45e/0x7b0 [ 406.202068] ? list_lru_destroy+0x4c0/0x4c0 [ 406.206377] ? __raw_spin_lock_init+0x1c/0x100 [ 406.210957] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 406.215974] ? lockdep_init_map+0x9/0x10 [ 406.220041] sget_userns+0x706/0xf20 [ 406.223747] ? set_anon_super+0x20/0x20 [ 406.227720] ? get_empty_filp.cold.7+0x3e/0x3e [ 406.232293] ? destroy_unused_super.part.9+0x100/0x100 [ 406.237569] ? __alloc_pages_slowpath+0x2dc0/0x2dc0 [ 406.242579] ? kasan_check_read+0x11/0x20 [ 406.246725] ? trace_hardirqs_off+0xd/0x10 [ 406.250952] ? cap_capable+0x1f9/0x260 [ 406.254838] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 406.260384] ? security_capable+0xa4/0xd0 [ 406.264524] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 406.270050] ? ns_capable_common+0x13f/0x170 [ 406.274454] mount_ns+0x8f/0x1d0 [ 406.277811] ? rpc_pipe_release+0xb70/0xb70 [ 406.282129] rpc_mount+0x9e/0xd0 [ 406.285489] mount_fs+0xae/0x328 [ 406.288855] vfs_kern_mount.part.34+0xd4/0x4d0 [ 406.293428] ? may_umount+0xb0/0xb0 [ 406.297049] ? _raw_read_unlock+0x22/0x30 [ 406.301190] ? __get_fs_type+0x97/0xc0 [ 406.305075] do_mount+0x564/0x3070 [ 406.308620] ? copy_mount_string+0x40/0x40 [ 406.312848] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 406.317601] ? retint_kernel+0x10/0x10 [ 406.321492] ? __sanitizer_cov_trace_const_cmp2+0x20/0x20 [ 406.327026] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 406.332553] ? copy_mount_options+0x285/0x380 [ 406.337050] ksys_mount+0x12d/0x140 [ 406.340675] SyS_mount+0x35/0x50 [ 406.344037] ? ksys_mount+0x140/0x140 [ 406.347829] do_syscall_64+0x29e/0x9d0 [ 406.351702] ? vmalloc_sync_all+0x30/0x30 [ 406.355842] ? _raw_spin_unlock_irq+0x27/0x70 [ 406.360327] ? finish_task_switch+0x1ca/0x820 [ 406.364811] ? syscall_return_slowpath+0x5c0/0x5c0 [ 406.369733] ? syscall_return_slowpath+0x30f/0x5c0 [ 406.374661] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 406.380035] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 406.384877] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 406.390056] RIP: 0033:0x4552d9 [ 406.393232] RSP: 002b:00007f4cbd4aec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 406.400930] RAX: ffffffffffffffda RBX: 00007f4cbd4af6d4 RCX: 00000000004552d9 2018/04/05 21:38:03 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:38:04 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000001380)='./file0\x00', &(0x7f0000001340)='proc\x00', 0x0, &(0x7f0000000240)) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000001280)) [ 406.408188] RDX: 00000000200002c0 RSI: 0000000020000140 RDI: 0000000020000300 [ 406.415446] RBP: 000000000072bea0 R08: 0000000020001280 R09: 0000000000000000 [ 406.422702] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 406.429958] R13: 00000000000003fa R14: 00000000006f9010 R15: 0000000000000021 2018/04/05 21:38:04 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xaf6, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:38:04 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0x194, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:38:04 executing program 5 (fault-call:3 fault-nth:34): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000001380)='./file0\x00', &(0x7f0000001340)='proc\x00', 0x0, &(0x7f0000000240)) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000001280)) 2018/04/05 21:38:04 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000001380)='./file0\x00', &(0x7f0000001340)='proc\x00', 0x0, &(0x7f0000000240)) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000001280)) 2018/04/05 21:38:04 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:38:04 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:38:04 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9}, 0x3d1) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000028000)={r0, &(0x7f0000000200), &(0x7f0000000240)="13"}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r0, &(0x7f0000000040)}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000280)="53541903f283e6018bfe482d003012af6d7bd06878c8b831bc8606fb0c8822c2d7d602459fec48c6769dd47df018c4d0f07f0ad953f0a24bc70d7e5dd98cc07ce7a4ee5304a5f1201b8dde614fa7916aee1066229043fc1715104553bb5a81795ba289f64cf7cc671643c86bbe6ce68554b927c6676c35956c09b195ea7b484cbf5650d245ba7d8e8c74e68ed90ebcfaa4bb7bb1ef60adbf1695caeac20492fb964ae89f70ab88251eb49937a49bad317807408a5a8952bdc043ff8d2d0986a3c36aef8942e27bce947e8e06190e52851df8b018131a81c897f323babf1a21c05375d5097eb66e3e4551c4057afc31b449410b9eadbecd65", &(0x7f0000000380)="fbb89cbbae8f4bf4791ec64773ca412dc94c54c2f10d7b8bc19173b58f1e7ca44ebaae41564309b73dc6a05c230dfa35dbf2f3bb03421a2a01f6717dfc9f3f3243415b59abf438fa46a122fe4daf55c0bdba5c5493eff1396a7c86cdd0c4fd11893e", 0x2}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r0, 0x28, &(0x7f0000000040)}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000001c0)={r0, 0x28, &(0x7f0000000180)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={r1, 0x7, 0x8}, 0xa1212737938eb95c) 2018/04/05 21:38:04 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0x645, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:38:04 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0x22e, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:38:04 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000400008fe7bb5cd4e344cd0002800000720a00ff"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xf, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x0, 0xffffff9c}, [@jmp={0x5, 0x0, 0xffffffcd}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) 2018/04/05 21:38:04 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x400000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:38:04 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6ffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:38:04 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xa5b, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:38:04 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0x151, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:38:04 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000001380)='./file0\x00', &(0x7f0000001340)='proc\x00', 0x0, &(0x7f0000000240)) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000001280)) 2018/04/05 21:38:04 executing program 6: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x10000, 0x0, @perf_config_ext={0x4, 0x17}, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', 0x0, 0x10}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000002c0)={r1, 0x28, &(0x7f0000000280)}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000180)={r0, &(0x7f0000000040)="490041bd32dc8e048d4d6c844cd526d817b8ff6d8e5936472b7176dc594e67120a", &(0x7f00000000c0)=""/152}, 0x18) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9}, 0x3d1) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000028000)={r2, &(0x7f0000000200), &(0x7f0000000240)="13"}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r2, &(0x7f0000000040)}, 0x10) 2018/04/05 21:38:04 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000400008fe7bb5cd4e344cd0002800000720a00ff"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xf, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x1000000000000000}, [@jmp={0x5, 0x0, 0xffffffcd}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) [ 406.870025] FAULT_INJECTION: forcing a failure. [ 406.870025] name failslab, interval 1, probability 0, space 0, times 0 [ 406.881571] CPU: 0 PID: 5020 Comm: syz-executor5 Not tainted 4.16.0+ #1 [ 406.888352] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 406.897726] Call Trace: [ 406.900356] dump_stack+0x1b9/0x29f [ 406.904026] ? arch_local_irq_restore+0x52/0x52 [ 406.908754] should_fail.cold.4+0xa/0x1a [ 406.912854] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 406.918012] ? graph_lock+0x170/0x170 [ 406.921841] ? graph_lock+0x170/0x170 [ 406.925684] ? find_held_lock+0x36/0x1c0 [ 406.929789] ? __lock_is_held+0xb5/0x140 [ 406.933904] ? check_same_owner+0x320/0x320 [ 406.938250] ? lock_downgrade+0x8e0/0x8e0 [ 406.942423] ? rcu_note_context_switch+0x710/0x710 [ 406.947373] ? find_held_lock+0x36/0x1c0 [ 406.951461] should_failslab+0x124/0x180 [ 406.955550] __kmalloc+0x2c8/0x760 [ 406.959121] ? lock_downgrade+0x8e0/0x8e0 [ 406.963299] ? register_shrinker+0x121/0x300 [ 406.967748] register_shrinker+0x121/0x300 [ 406.972002] ? do_raw_spin_trylock+0x1b0/0x1b0 [ 406.976612] ? shrink_slab+0xc0/0xc0 [ 406.980353] ? memcpy+0x45/0x50 [ 406.983675] sget_userns+0xc78/0xf20 [ 406.987413] ? set_anon_super+0x20/0x20 [ 406.991422] ? get_empty_filp.cold.7+0x3e/0x3e [ 406.996038] ? destroy_unused_super.part.9+0x100/0x100 [ 407.001350] ? __alloc_pages_slowpath+0x2dc0/0x2dc0 [ 407.006402] ? kasan_check_read+0x11/0x20 [ 407.010586] ? trace_hardirqs_off+0xd/0x10 [ 407.014845] ? cap_capable+0x1f9/0x260 [ 407.018767] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 407.024330] ? security_capable+0xa4/0xd0 [ 407.028599] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 407.034164] ? ns_capable_common+0x13f/0x170 [ 407.038611] mount_ns+0x8f/0x1d0 [ 407.042001] ? rpc_pipe_release+0xb70/0xb70 [ 407.046354] rpc_mount+0x9e/0xd0 [ 407.049754] mount_fs+0xae/0x328 [ 407.053161] vfs_kern_mount.part.34+0xd4/0x4d0 [ 407.057773] ? may_umount+0xb0/0xb0 [ 407.061591] ? _raw_read_unlock+0x22/0x30 [ 407.065756] ? __get_fs_type+0x97/0xc0 2018/04/05 21:38:04 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 407.069677] do_mount+0x564/0x3070 [ 407.073246] ? copy_mount_string+0x40/0x40 [ 407.077498] ? rcu_pm_notify+0xc0/0xc0 [ 407.081421] ? copy_mount_options+0x5f/0x380 [ 407.085849] ? rcu_read_lock_sched_held+0x108/0x120 [ 407.090884] ? kmem_cache_alloc_trace+0x616/0x780 [ 407.095753] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 407.101310] ? _copy_from_user+0xdf/0x150 [ 407.105481] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 407.111034] ? copy_mount_options+0x285/0x380 [ 407.115553] ksys_mount+0x12d/0x140 [ 407.119209] SyS_mount+0x35/0x50 [ 407.122590] ? ksys_mount+0x140/0x140 [ 407.126414] do_syscall_64+0x29e/0x9d0 [ 407.130316] ? vmalloc_sync_all+0x30/0x30 [ 407.134478] ? _raw_spin_unlock_irq+0x27/0x70 [ 407.138990] ? finish_task_switch+0x1ca/0x820 [ 407.143507] ? syscall_return_slowpath+0x5c0/0x5c0 [ 407.148451] ? syscall_return_slowpath+0x30f/0x5c0 [ 407.153394] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 407.158764] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 407.163614] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 407.168794] RIP: 0033:0x4552d9 [ 407.171970] RSP: 002b:00007f4cbd4aec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 407.179847] RAX: ffffffffffffffda RBX: 00007f4cbd4af6d4 RCX: 00000000004552d9 [ 407.187106] RDX: 00000000200002c0 RSI: 0000000020000140 RDI: 0000000020000300 [ 407.194364] RBP: 000000000072bea0 R08: 0000000020001280 R09: 0000000000000000 [ 407.201619] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 407.208875] R13: 00000000000003fa R14: 00000000006f9010 R15: 0000000000000022 2018/04/05 21:38:05 executing program 5 (fault-call:3 fault-nth:35): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000001380)='./file0\x00', &(0x7f0000001340)='proc\x00', 0x0, &(0x7f0000000240)) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000001280)) 2018/04/05 21:38:05 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x800000000000004, 0x4, 0x9, 0x9}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000028000)={r0, &(0x7f0000000200), &(0x7f0000000240)="13"}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r0, &(0x7f0000000040)}, 0x10) 2018/04/05 21:38:05 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:38:05 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000400008fe7bb5cd4e344cd0002800000720a00ff"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xf, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x3c00000000000000}, [@jmp={0x5, 0x0, 0xffffffcd}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) 2018/04/05 21:38:05 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x1000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 21:38:05 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0x74b, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) 2018/04/05 21:38:05 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000001380)='./file0\x00', &(0x7f0000001340)='proc\x00', 0x0, &(0x7f0000000240)) mount(&(0x7f0000000300)="2e2f66696c6530f0", &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000001280)) 2018/04/05 21:38:05 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xb48, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) [ 407.337806] ------------[ cut here ]------------ [ 407.342679] refcount_t: increment on 0; use-after-free. [ 407.348276] WARNING: CPU: 1 PID: 4522 at lib/refcount.c:153 refcount_inc+0x5d/0x70 [ 407.355995] Kernel panic - not syncing: panic_on_warn set ... [ 407.355995] [ 407.363372] CPU: 1 PID: 4522 Comm: syz-executor5 Not tainted 4.16.0+ #1 [ 407.370130] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 407.379491] Call Trace: [ 407.382096] dump_stack+0x1b9/0x29f [ 407.385730] ? arch_local_irq_restore+0x52/0x52 [ 407.390417] ? refcount_add+0x40/0x70 [ 407.394226] panic+0x22f/0x4de [ 407.397427] ? add_taint.cold.5+0x16/0x16 [ 407.401586] ? __warn.cold.8+0x148/0x1a3 [ 407.405649] ? __warn.cold.8+0x117/0x1a3 [ 407.409718] ? refcount_inc+0x5d/0x70 [ 407.413524] __warn.cold.8+0x163/0x1a3 [ 407.417416] ? refcount_inc+0x5d/0x70 [ 407.421224] report_bug+0x252/0x2d0 [ 407.424859] do_error_trap+0x1bc/0x470 [ 407.428762] ? math_error+0x3f0/0x3f0 [ 407.432566] ? vprintk_func+0x81/0xe7 [ 407.436357] ? printk+0x9e/0xba [ 407.439626] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 407.444467] do_invalid_op+0x1b/0x20 [ 407.448173] invalid_op+0x1b/0x40 [ 407.451696] RIP: 0010:refcount_inc+0x5d/0x70 [ 407.456084] RSP: 0018:ffff8801a2b6f838 EFLAGS: 00010286 [ 407.461437] RAX: 000000000000002b RBX: 0000000000000000 RCX: ffffffff815f2e0d [ 407.468695] RDX: 0000000000000000 RSI: ffffffff815f7bf1 RDI: ffff8801a2b6f398 [ 407.475974] RBP: ffff8801a2b6f840 R08: ffff8801a2b60200 R09: 0000000000000000 [ 407.483235] R10: 0000000000000000 R11: 0000000000000000 R12: ffff88019f692000 [ 407.490494] R13: ffff8801a2b6fac8 R14: 0000000000000040 R15: ffff8801affd0180 [ 407.497764] ? console_unlock+0x8ad/0x1100 [ 407.501983] ? vprintk_func+0x81/0xe7 [ 407.505771] ? refcount_inc+0x5d/0x70 [ 407.509557] sk_alloc+0x450/0x17b0 [ 407.513086] ? sock_def_error_report+0x710/0x710 [ 407.517825] ? zap_class+0x720/0x720 [ 407.521531] ? graph_lock+0x170/0x170 [ 407.525332] ? do_raw_write_unlock.cold.8+0x3d/0x3d [ 407.530355] ? perf_trace_lock_acquire+0xe3/0x980 [ 407.535203] ? find_held_lock+0x36/0x1c0 [ 407.539278] ? lock_downgrade+0x8e0/0x8e0 [ 407.543424] ? rcu_is_watching+0x85/0x140 [ 407.547553] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 407.552726] ? find_held_lock+0x36/0x1c0 [ 407.556786] inet_create+0x4f8/0x10a0 [ 407.560593] ? inet_accept+0x9e0/0x9e0 [ 407.564472] ? rcu_is_watching+0x85/0x140 [ 407.568608] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 407.573804] __sock_create+0x526/0x920 [ 407.577681] ? kernel_sock_ip_overhead+0x570/0x570 [ 407.582600] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 407.588140] ? do_rmdir+0x24e/0x610 [ 407.591760] ? SyS_mkdir+0x30/0x30 [ 407.595298] __sys_socket+0x100/0x250 [ 407.599101] ? move_addr_to_kernel+0x70/0x70 [ 407.603502] SyS_socket+0x24/0x30 [ 407.606937] ? __sys_socket+0x250/0x250 [ 407.610907] do_syscall_64+0x29e/0x9d0 [ 407.614783] ? vmalloc_sync_all+0x30/0x30 [ 407.618928] ? syscall_slow_exit_work+0x4f0/0x4f0 [ 407.623764] ? syscall_return_slowpath+0x5c0/0x5c0 [ 407.628697] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 407.634056] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 407.638889] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 407.644059] RIP: 0033:0x457e07 [ 407.647229] RSP: 002b:00007ffda1b7d908 EFLAGS: 00000206 ORIG_RAX: 0000000000000029 [ 407.654920] RAX: ffffffffffffffda RBX: 00000000000003fb RCX: 0000000000457e07 [ 407.662177] RDX: 0000000000000006 RSI: 0000000000000001 RDI: 0000000000000002 [ 407.669442] RBP: 00000000000636c2 R08: 0000000000000000 R09: 0000000000000001 [ 407.676692] R10: 000000000000000a R11: 0000000000000206 R12: 0000000000000b23 [ 407.683945] R13: 0000000000000004 R14: 0000000000000b23 R15: 00000000000634a9 [ 407.691825] Dumping ftrace buffer: [ 407.695358] (ftrace buffer empty) [ 407.699052] Kernel Offset: disabled [ 407.702659] Rebooting in 86400 seconds..