[?25l[?1c7[ ok 8[?25h[?0c. Starting mcstransd: [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [ 10.258179] random: sshd: uninitialized urandom read (32 bytes read) [....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 41.367713] random: crng init done Warning: Permanently added '10.128.0.87' (ECDSA) to the list of known hosts. 2018/10/20 23:10:36 fuzzer started 2018/10/20 23:10:38 dialing manager at 10.128.0.26:38889 2018/10/20 23:10:38 syscalls: 1 2018/10/20 23:10:38 code coverage: enabled 2018/10/20 23:10:38 comparison tracing: CONFIG_KCOV_ENABLE_COMPARISONS is not enabled 2018/10/20 23:10:38 setuid sandbox: enabled 2018/10/20 23:10:38 namespace sandbox: enabled 2018/10/20 23:10:38 Android sandbox: /sys/fs/selinux/policy does not exist 2018/10/20 23:10:38 fault injection: kernel does not have systematic fault injection support 2018/10/20 23:10:38 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2018/10/20 23:10:38 net packed injection: enabled 2018/10/20 23:10:38 net device setup: enabled 23:11:08 executing program 0: pipe(&(0x7f00000015c0)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_dev$binder(&(0x7f0000000180)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) write(r1, &(0x7f00000001c0), 0xffffffea) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005540)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000005500)='+}trusted\x00'}, 0x30) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100)={0x20}, &(0x7f0000000140)={0x8}, &(0x7f0000000200)={0x0, r2+30000000}, &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 23:11:08 executing program 5: r0 = socket$inet6(0xa, 0x0, 0xfffffffffffffff9) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x3) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x3012, r1, 0x0) ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f0000000000)) getpid() getpgrp(0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000080)) getpid() getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000100)=0xc) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0xc) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x82) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000600)='security.evm\x00', &(0x7f0000000640)=@ng={0x4, 0x0, '-'}, 0x3, 0x2) r3 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000480)=ANY=[@ANYBLOB], 0x0) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)=[&(0x7f0000000140)="74086e750000000000000000008c00"], &(0x7f0000000300)=[&(0x7f0000000280)='/security\x00']) sendfile(0xffffffffffffffff, r3, &(0x7f0000000780), 0x400) pwritev(r3, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) timerfd_settime(r3, 0x1, &(0x7f00000007c0)={{}, {0x77359400}}, &(0x7f0000000800)) sendfile(r2, r3, &(0x7f0000000180)=0x6, 0x2000005) sysinfo(&(0x7f0000000680)=""/169) listxattr(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)=""/21, 0x15) readv(r2, &(0x7f0000000f00)=[{&(0x7f0000000a80)=""/243, 0xf3}, {&(0x7f0000000b80)=""/146, 0x92}, {&(0x7f0000000c40)=""/216, 0xd8}, {&(0x7f0000000d40)=""/14, 0xe}, {&(0x7f0000000d80)=""/201, 0xc9}, {&(0x7f0000000ec0)=""/33, 0x21}], 0x6) fsetxattr(r2, &(0x7f0000000580)=@known='trusted.overlay.impure\x00', &(0x7f00000005c0)='/dev/loop#\x00', 0xb, 0x0) flistxattr(0xffffffffffffffff, &(0x7f0000000380)=""/249, 0xf9) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:11:08 executing program 2: request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f00000000c0)='system\x00', 0xfffffffffffffffc) 23:11:08 executing program 1: r0 = socket$inet6(0xa, 0x0, 0xfffffffffffffff9) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d") mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x3012, 0xffffffffffffffff, 0x0) getpid() getpgrp(0xffffffffffffffff) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000100)=0xc) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x82) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000480)=ANY=[@ANYBLOB], 0x0) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)=[&(0x7f0000000140)="74086e750000000000000000008c00"], &(0x7f0000000300)=[&(0x7f0000000280)='/security\x00']) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000780), 0x400) pwritev(r2, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) timerfd_settime(0xffffffffffffffff, 0x1, &(0x7f00000007c0)={{}, {0x77359400}}, &(0x7f0000000800)) sendfile(r1, r2, &(0x7f0000000180)=0x6, 0x2000005) listxattr(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)=""/21, 0x15) readv(r1, &(0x7f0000000f00)=[{&(0x7f0000000b80)=""/146, 0x92}, {&(0x7f0000000c40)=""/216, 0xd8}, {&(0x7f0000000d40)=""/14, 0xe}, {&(0x7f0000000ec0)=""/33, 0x21}], 0x4) fsetxattr(0xffffffffffffffff, &(0x7f0000000580)=@known='trusted.overlay.impure\x00', &(0x7f00000005c0)='/dev/loop#\x00', 0xb, 0x0) flistxattr(0xffffffffffffffff, &(0x7f0000000380)=""/249, 0xf9) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:11:08 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./bus\x00', 0x0) write$P9_RXATTRCREATE(r1, &(0x7f00000001c0)={0x7}, 0xffffff44) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r3 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$P9_RREMOVE(r3, &(0x7f0000000280)={0x7}, 0xff7f) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000440)={0x0, 0x0, 0x1, 0x0, [], [{0x0, 0x1, 0x0, 0x4}, {0x0, 0x0, 0x1000, 0x0, 0x1f}], [[]]}) write$FUSE_NOTIFY_STORE(r2, &(0x7f0000000400)=ANY=[@ANYPTR64=&(0x7f0000000600)=ANY=[@ANYBLOB]], 0x8) syncfs(r1) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000100)={0x0, r3}) 23:11:08 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) recvmmsg(r0, &(0x7f0000000200)=[{{&(0x7f0000000380)=@alg, 0x80, &(0x7f0000000100)=[{&(0x7f0000001480)=""/4096, 0x1600}], 0x1, &(0x7f0000002740)=""/218, 0xda}}], 0x1, 0x0, &(0x7f0000000440)={0x77359400}) sendmsg$nl_generic(r0, &(0x7f0000000340)={&(0x7f0000000400), 0xc, &(0x7f0000000300)={&(0x7f0000000140)={0x14, 0x40000000042, 0x105}, 0x14}}, 0x0) [ 81.734509] audit: type=1400 audit(1540077068.636:5): avc: denied { sys_admin } for pid=2095 comm="syz-executor5" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 81.781985] audit: type=1400 audit(1540077068.686:6): avc: denied { net_admin } for pid=2100 comm="syz-executor5" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 86.715594] audit: type=1400 audit(1540077073.626:7): avc: denied { sys_chroot } for pid=2100 comm="syz-executor5" capability=18 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 86.741707] audit: type=1400 audit(1540077073.656:8): avc: denied { associate } for pid=2103 comm="syz-executor0" name="syz0" scontext=unconfined_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=filesystem permissive=1 23:11:13 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2000003, 0x10, 0xffffffffffffffff, 0x0) clock_getres(0xffff7ffffffffffd, &(0x7f0000000000)) 23:11:13 executing program 2: 23:11:13 executing program 1: 23:11:13 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_trie\x00') preadv(r0, &(0x7f0000000480)=[{&(0x7f0000000100)=""/209, 0xd1}], 0x1, 0x0) 23:11:13 executing program 5: socketpair$unix(0x1, 0x400000001, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_emit_ethernet(0x3a, &(0x7f0000000080)={@local, @link_local, [], {@ipv4={0x800, {{0x9, 0x4, 0x0, 0x0, 0x2c, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223, 0x3e8}, @local, {[@lsrr={0x83, 0xb, 0x5ef, [@remote={0xac, 0x223}, @multicast1]}, @ssrr={0x89, 0x3}]}}, @igmp={0x0, 0x0, 0x0, @broadcast}}}}}, &(0x7f00000002c0)) 23:11:13 executing program 1: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x4000) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000200)) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) sendfile(r0, r1, &(0x7f0000d83ff8), 0x8000fffffffe) [ 87.051578] audit: type=1400 audit(1540077073.956:9): avc: denied { dac_override } for pid=3740 comm="syz-executor1" capability=1 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 23:11:14 executing program 0: pipe(&(0x7f00000015c0)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_dev$binder(&(0x7f0000000180)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) write(r1, &(0x7f00000001c0), 0xffffffea) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005540)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000005500)='+}trusted\x00'}, 0x30) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100)={0x20}, &(0x7f0000000140)={0x8}, &(0x7f0000000200)={0x0, r2+30000000}, &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 23:11:14 executing program 2: 23:11:14 executing program 3: 23:11:14 executing program 5: 23:11:14 executing program 4: creat(&(0x7f0000000200)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000001f88)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000fff)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000bf0000/0x2000)=nil, 0x2000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) mmap(&(0x7f0000941000/0x2000)=nil, 0x2000, 0x0, 0x4011, r0, 0x0) 23:11:14 executing program 1: 23:11:14 executing program 2: 23:11:14 executing program 3: 23:11:14 executing program 1: 23:11:14 executing program 5: 23:11:14 executing program 2: 23:11:14 executing program 1: 23:11:15 executing program 0: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000001700)="120000001200ff7f000000000000000e00a1", 0x12, 0x0, 0x0, 0x0) recvfrom(r0, &(0x7f0000000600)=""/4096, 0xb0133b7a6650999c, 0x0, &(0x7f00000000c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0xfffffffffffffe11) read(r0, &(0x7f00000001c0)=""/129, 0xffffffb7) 23:11:15 executing program 3: 23:11:15 executing program 5: 23:11:15 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'syz_tun\x00'}) 23:11:15 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000500)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000300)=""/11, 0xb) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0xfffffffffffffffe, 0x0) ioctl$KDSIGACCEPT(r0, 0x4b4e, 0x0) 23:11:15 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r0, &(0x7f0000000200), 0xfffffffffffffeb4, 0x2000800e, &(0x7f0000db4ff0)={0x2, 0x0, @loopback, [0x2, 0x7000028]}, 0x10) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet(r0, &(0x7f0000000080), 0x0, 0x41, &(0x7f0000000180)={0x2, 0x0, @broadcast}, 0x10) 23:11:15 executing program 3: 23:11:15 executing program 4: 23:11:15 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000005880)='attr/keycreate\x00') ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "7b3177f4fc2eb04172daa8fdd1c4c4cf144a23173b6605afb988de7e07195d78f7ddd19a3782fba5bf4af44acfe05900000053c40600", "ee52c10d1e72a9432c222982fcccff747a3131991a00000000000004002000"}) 23:11:15 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x11, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000200)={'bridge0\x00', 0x0}) sendto$packet(r1, &(0x7f0000000100), 0x5e0, 0x0, &(0x7f00000001c0)={0x11, 0x8100, r2, 0x1, 0x0, 0x6, @broadcast}, 0x14) 23:11:15 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'syz_tun\x00'}) 23:11:15 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x6) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x80003) sendfile(r0, r1, &(0x7f00000000c0), 0x800100000000) 23:11:15 executing program 0: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) wait4(0x0, &(0x7f0000001640), 0x80000008, &(0x7f0000000180)) r0 = gettid() inotify_add_watch(0xffffffffffffffff, &(0x7f00007a7000)='./control\x00', 0xa4000960) syz_open_procfs(0x0, &(0x7f0000000180)='fdinfo/3\x00') timer_create(0x0, &(0x7f0000ee4000)={0x0, 0x12, 0x2}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000e04000)={{0x0, 0x989680}, {0x0, 0x989680}}, &(0x7f0000000080)) futex(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x1000000000016) 23:11:15 executing program 5: socketpair$unix(0x1, 0x400000000003, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f00000bc000)=@abs, 0x8) sendmmsg$unix(r1, &(0x7f00000bd000), 0x2ac, 0x0) setsockopt$sock_int(r1, 0x1, 0x0, &(0x7f00005feffc), 0x2c) close(r0) 23:11:15 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000200)={0x2, 0x3, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x0, 0x0, 0x0, 0x0, @in6}]}, 0x38}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x400000000000117, 0x0) 23:11:15 executing program 2: [ 88.651913] audit: type=1400 audit(1540077075.556:10): avc: denied { net_raw } for pid=3806 comm="syz-executor3" capability=13 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 23:11:16 executing program 1: 23:11:16 executing program 2: 23:11:16 executing program 0: 23:11:16 executing program 3: 23:11:16 executing program 4: 23:11:16 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000380), 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x4000000000014, &(0x7f0000000180)=0x1, 0x4) sendto$inet(r0, &(0x7f0000000500)='\x00', 0x1, 0x0, &(0x7f0000000040)={0x2, 0x0, @rand_addr}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000080), 0x14) recvmsg(r0, &(0x7f0000000300)={&(0x7f0000000100)=@can, 0x80, &(0x7f0000001700)=[{&(0x7f0000000200)=""/241, 0xf1}], 0x1, &(0x7f00000017c0)=""/70, 0x46}, 0x22) 23:11:16 executing program 3: 23:11:16 executing program 0: 23:11:16 executing program 2: 23:11:16 executing program 4: 23:11:16 executing program 1: 23:11:16 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000080)={0x14, 0x1d, 0xffffff1f, 0x0, 0x0, {0x1}}, 0x14}}, 0x0) 23:11:16 executing program 0: r0 = socket$inet6(0xa, 0x100000002, 0x0) sendto$inet6(r0, &(0x7f0000000300), 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @loopback, 0x1}, 0x1c) 23:11:16 executing program 5: unshare(0x20020000) mkdir(&(0x7f00001a3000)='./file1\x00', 0x0) mount(&(0x7f0000000000)=ANY=[], &(0x7f00000001c0)='./file1\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f0000000500)) poll(&(0x7f0000000400), 0x0, 0x400007f) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000340)='./file0\x00') 23:11:16 executing program 2: r0 = socket$packet(0x11, 0x1000000000002, 0x300) getsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000), &(0x7f00000041c0)=0x4) 23:11:16 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0xfffffffffffffee2) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c}, 0x2c) r1 = socket(0xa, 0x3, 0x1000000000ff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000002c0)='ip6tnl0\x00', 0x10) sendto$unix(r1, &(0x7f0000000000), 0x5a4, 0x0, &(0x7f0000000080)=@abs, 0x6e) 23:11:16 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000000040)=@newlink={0x34, 0x12, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0x4}}}]}, 0x34}}, 0x0) 23:11:16 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000240)={0x2, 0xa, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 23:11:16 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000880)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x5, 0x0, 0x3], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x100000000, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0xf39, 0x80, 0x0, 0x7, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x80000000], [0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2a, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0xffffffff, 0x0, 0x0, 0x100000000, 0x0, 0xd87e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x100, 0x0, 0xfff, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10e3], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x10000, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x1, 0x40, 0x7fff, 0x0, 0x3, 0xd7b, 0x7fff, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffff801, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0xffffffffffffffff]}, 0x45c) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{}, 'syz0\x00'}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') setsockopt$IP_VS_SO_SET_EDIT(r2, 0x0, 0x483, &(0x7f00000003c0)={0x3c, @remote, 0x4e24, 0x0, 'rr\x00', 0x2, 0x1, 0x39}, 0x2c) ioctl$sock_inet_SIOCGIFPFLAGS(r2, 0x8935, &(0x7f00000002c0)={'teql0\x00', 0x9}) ioctl$TIOCGETD(0xffffffffffffffff, 0x5424, &(0x7f0000000140)) mount(&(0x7f0000000d40)=ANY=[@ANYBLOB="eb211b0ef5df1b0a7eadeab0c375a3a40e25becc9ec416499d8b4e102990454cc6b61826eeb2a4055c208a803e9c8e8bf7ff0091212e4d9e4c25acf6de1e78825db21649beee91a9d1da4e1aa55dbe47c9412195d377a170c16d7d850000cf75f43ce3f1d70b9d7baa8f2467e8609efe14e3ff387733d1193d4cb8fa7d482f01e622d3623ab5cfe1f830ad600a7510b690426141f8d92d0d51745903c515374b1f26454558028ff8c07028d9bb64a78447e7b4cab96e224666e5c8a634a91f2ef0ca27d5f7004971bcc7bb816deb5f4715b884559273470e037a30f80f4e18cc10507afa3c2ee8172c72c2d60479c66d36"], &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000f00)=ANY=[@ANYBLOB="3897c61e2344b35ce4b0e8eb675766d6275488bb0fb34f52ffa1089aff3a2dda6d16dcf00100000000000000016b7b1039cfd93e445671550a8131d1"], &(0x7f0000903000)='./file0\x00', &(0x7f0000000ec0)='bdev\x00', 0x100000, &(0x7f0000444000)) mount(&(0x7f0000000380), &(0x7f0000000340)='./file0\x00', &(0x7f0000fdb000)='ubifs\x00', 0x80010, 0x0) mount(&(0x7f0000000e40)=ANY=[@ANYBLOB="36fcf0a5c67e3fc35e8ad531e4daa7c28e92c297595bda2ed8b4cd21ddee74021ff2576af6e0e1faf09f48acda31a0d49f6a7c8abb40828f6dac600ab8e87c02f62946ae174dfd7035df9917479db88f28"], &(0x7f0000cbeff8)='./file0\x00', &(0x7f00005f7ffa)='ramfs\x00', 0x80000, &(0x7f000002f000)) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(&(0x7f0000000380)=ANY=[@ANYBLOB="f34e27a5ac"], &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f00000e7000)) preadv(r2, &(0x7f0000000040)=[{&(0x7f0000002200)=""/4096, 0x1000}], 0x1, 0x0) ioctl$int_out(0xffffffffffffffff, 0x2, &(0x7f00000001c0)) utimes(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)={{0x77359400}, {0x77359400}}) close(r1) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r4 = syz_open_dev$binder(&(0x7f0000000080)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) setpriority(0x0, 0x0, 0xffffffff80000001) ioctl$BINDER_WRITE_READ(r4, 0xc0306201, &(0x7f000000dfd0)={0x12, 0x0, &(0x7f0000000d00)=ANY=[@ANYBLOB="0c635325d848fe2d3149a0735bb86e08e221"], 0x1, 0x0, &(0x7f0000008f37)="c2"}) ioctl$TIOCCBRK(r2, 0x5428) 23:11:16 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000340)='veth1\x00', 0x10) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) [ 89.578640] audit: type=1400 audit(1540077076.486:11): avc: denied { create } for pid=3867 comm="syz-executor3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 23:11:16 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f00000001c0)="e4305ed237d642a3a3958c8ef4f40a69e1c3567c8b6f1fff512553435f1c195624f93facec25cbb243d0e19f1bbc26aba93e83325fcfdc346dca5bf7be9e0b405d5b1da8cb60913c29d4a6d50f5ffce00c4d97a1a020", 0x56, 0xfffffffffffffffb) [ 89.583447] audit: type=1400 audit(1540077076.486:12): avc: denied { map_create } for pid=3874 comm="syz-executor4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 23:11:16 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={r0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000080)='vboxnet0\x00'}, 0x30) 23:11:16 executing program 1: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") write$P9_RWSTAT(r0, &(0x7f0000000340)={0x7}, 0x2b4) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) sendfile(r0, r2, 0x0, 0x8000) [ 89.627397] input: syz1 as /devices/virtual/input/input4 [ 89.642940] binder: 3886:3887 unknown command 626221836 [ 89.642949] binder: 3886:3887 ioctl c0306201 2000dfd0 returned -22 [ 89.644604] input: syz1 as /devices/virtual/input/input5 23:11:16 executing program 3: r0 = creat(&(0x7f0000000080)='./file1\x00', 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) write$P9_RSTATu(r0, &(0x7f00000001c0)=ANY=[@ANYPTR=&(0x7f0000000000)=ANY=[@ANYRESHEX=0x0]], 0xfffffff0) fsync(r0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000440)=0x80040) 23:11:16 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom(r0, &(0x7f0000003540)=""/68, 0x44, 0x10062, &(0x7f0000003640)=@hci, 0xfd66) [ 89.660126] binder: 3886:3894 unknown command 626221836 [ 89.660135] binder: 3886:3894 ioctl c0306201 2000dfd0 returned -22 [ 89.747922] audit: type=1400 audit(1540077076.656:13): avc: denied { write } for pid=3867 comm="syz-executor3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 23:11:17 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000300)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x4000) io_setup(0x4000000000000046, &(0x7f0000000200)=0x0) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x377140be6b5ef4c7}]) 23:11:17 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={'veth0\x00', 0x201e}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) close(r0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') 23:11:17 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x34000}, 0xc, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="2400000029002d0800000000000000000100977c439210f2eff84000"], 0x1}}, 0x0) 23:11:17 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000100)=0x40, 0x4) sendto$inet6(r0, &(0x7f0000000040)="020300000700000000000000fff55b4202938207d9fb3780398d5375000000007929301ee616d5c01843e065900854417e2bf3f8a0b3222a2bb42f2dbd94c3b50035110f118d0000f55dc62600009b00b47645004bae1356642490a7b5fc88046a0000000000000000000000", 0x6c, 0x0, &(0x7f0000000000)={0xa, 0x200810800, 0x8, @remote}, 0x1c) 23:11:17 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r1, &(0x7f0000000040), 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x1c) 23:11:17 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x400, 0x0) write$P9_RWSTAT(r0, &(0x7f0000000140)={0x7, 0x7f, 0x2}, 0x7) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0xf, 0x4000ff) sched_setaffinity(0x0, 0xffffffffffffffb1, &(0x7f0000000180)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f00004da000)={0x800000000000}, 0x4) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f000007affc), 0x4) r3 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) syz_open_pts(0xffffffffffffffff, 0x0) 23:11:17 executing program 3: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000fb5ff0)=[{&(0x7f0000000000)="1f00000001031900030007000000068100023b0509000100010100ff1ffe58", 0x1f}], 0x1) [ 90.421917] audit: type=1400 audit(1540077077.326:14): avc: denied { create } for pid=3937 comm="syz-executor3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 23:11:17 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000200), 0xc, &(0x7f0000000080)={&(0x7f0000000100)=@ipv6_deladdr={0x2c, 0x15, 0x101, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r1}, [@IFA_LOCAL={0x14}]}, 0x2c}}, 0x0) 23:11:17 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xffffffffffffff5c, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000c80)='ip6_vti0\x00', 0xf) r1 = dup2(r0, r0) sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f00000001c0)={&(0x7f0000000300), 0xc, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB], 0x1}}, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f0000000000)={0x2, 0x0, @empty, [0x0, 0x3e8]}, 0x0) 23:11:17 executing program 3: creat(&(0x7f0000000200)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file1\x00', 0x0) setsockopt$inet_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000c00), 0x4) link(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='./file1/file0\x00') getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000180), &(0x7f00000001c0)=0x4) unlink(&(0x7f0000000280)='./file1/file0\x00') getpid() fstat(0xffffffffffffffff, &(0x7f00000006c0)) getpgrp(0xffffffffffffffff) getpid() [ 90.450912] audit: type=1400 audit(1540077077.356:15): avc: denied { write } for pid=3937 comm="syz-executor3" path="socket:[9974]" dev="sockfs" ino=9974 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 23:11:17 executing program 5: 23:11:17 executing program 0: [ 90.518732] audit: type=1400 audit(1540077077.426:16): avc: denied { read } for pid=3925 comm="syz-executor4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 23:11:17 executing program 0: syz_genetlink_get_family_id$nbd(&(0x7f00000003c0)='nbd\x00') clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) set_thread_area(&(0x7f0000000240)={0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x600000000000, 0x0, 0x0, 0xefd}) set_thread_area(&(0x7f0000000800)={0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}) socket(0x0, 0x0, 0x0) write$binfmt_misc(r0, &(0x7f00000000c0)=ANY=[], 0x7fffffff) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000580)='/selinux/status\x00', 0x0, 0x0) recvfrom(r1, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x10100, 0x0, 0xfffffffffffffd51) 23:11:17 executing program 5: 23:11:17 executing program 3: r0 = gettid() r1 = syz_open_procfs(0x0, &(0x7f0000000140)='attr/exec\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f000000d000)={0xffffffffffffffff, 0xffffffffffffffff}) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0xfffffffffffffffe, 0xffffffffffffffff) ioctl$int_in(r2, 0x5452, &(0x7f0000008ff8)=0x3f) recvfrom$unix(r3, &(0x7f0000bf5000), 0x0, 0x0, &(0x7f0000d93ff6)=@abs, 0x8) fcntl$setown(r2, 0x8, r0) nanosleep(&(0x7f00000000c0)={0x77359400}, &(0x7f0000000280)) fcntl$setsig(r2, 0xa, 0x12) dup2(r1, r3) tkill(r0, 0x80000000000016) 23:11:17 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)="636c6561725f72656673007edb") writev(r0, &(0x7f0000000100)=[{&(0x7f0000000180)='4', 0x1}], 0x1) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000040)='./file0\x00') lseek(0xffffffffffffffff, 0x0, 0x0) 23:11:17 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000300)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x4000) io_setup(0x4000000000000046, &(0x7f0000000200)=0x0) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x377140be6b5ef4c7}]) 23:11:17 executing program 4: 23:11:17 executing program 5: 23:11:17 executing program 4: 23:11:17 executing program 5: 23:11:17 executing program 4: 23:11:17 executing program 5: 23:11:17 executing program 2: 23:11:18 executing program 0: 23:11:18 executing program 4: 23:11:18 executing program 2: 23:11:18 executing program 3: 23:11:18 executing program 1: 23:11:18 executing program 5: 23:11:18 executing program 3: 23:11:18 executing program 2: 23:11:18 executing program 0: 23:11:18 executing program 4: 23:11:18 executing program 5: 23:11:18 executing program 2: setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000080), 0x4) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x20000000, &(0x7f0000e68000)={0x2, 0x4004e23, @local}, 0x10) shutdown(r0, 0x1) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180), 0xc, &(0x7f0000000240)={&(0x7f0000000200)=ANY=[]}}, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5412, &(0x7f0000000040)) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000000c0)={@multicast2, @multicast2, @broadcast}, 0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000003c0)={{{@in=@broadcast, @in=@multicast1}}, {{@in6=@mcast2}, 0x0, @in6=@mcast2}}, &(0x7f00000004c0)=0xe8) 23:11:18 executing program 4: 23:11:18 executing program 1: 23:11:18 executing program 0: 23:11:18 executing program 3: 23:11:18 executing program 4: 23:11:18 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000140)=""/11, 0xb) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)) clone(0x6102001ffd, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) dup3(r0, r1, 0x0) ioctl$KDSKBLED(r1, 0x4b65, 0x0) 23:11:18 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x82) r1 = syz_open_procfs(0x0, &(0x7f0000005880)='attr/keycreate\x00') ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_GET_STATUS(r1, 0x4c03, &(0x7f00000000c0)) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "7b3177f4fc2eb04172daa8fdd1c4c4cf144a23173b6605afb988de7e07195d78f7ddd19a3782fba5bf4af44acfe05900000053c40600", "ee52c10d1e72a9432c222982fcccff747a3131991a00000000000004002000"}) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) 23:11:18 executing program 3: r0 = syz_open_dev$binder(&(0x7f00000000c0)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) clone(0x1000300, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) socketpair$unix(0x1, 0x400000001, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r0, 0xc018620c, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000140)}) 23:11:18 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000005880)='attr/keycreate\x00') ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, 0xffffffffffffffff) 23:11:18 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x40100000005, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x20, 0x10, 0xc362e63b3f31ba5f}, 0x20}}, 0x0) 23:11:18 executing program 2: setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000080), 0x4) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x20000000, &(0x7f0000e68000)={0x2, 0x4004e23, @local}, 0x10) shutdown(r0, 0x1) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180), 0xc, &(0x7f0000000240)={&(0x7f0000000200)=ANY=[]}}, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5412, &(0x7f0000000040)) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000000c0)={@multicast2, @multicast2, @broadcast}, 0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000003c0)={{{@in=@broadcast, @in=@multicast1}}, {{@in6=@mcast2}, 0x0, @in6=@mcast2}}, &(0x7f00000004c0)=0xe8) 23:11:18 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)="2f657865000000000004000ef9a996282e85439ed5542007424adee901d2da7571fb35331ce39c5a000000000000000000e1bcca7d4a9b8ad09159f3a3139c695f18ca12874e7ff1fe34c1176d2ee62d2b30a6abd81ee2bf") ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) [ 91.522832] binder: 4043 BINDER_GET_NODE_INFO_FOR_REF: only handle may be non-zero.[ 91.535228] loop_reread_partitions: partition scan of loop0 (wS]}d I!ޒf8&WF5EiceZ%} [ 91.535228] ̈\) failed (rc=-13) [ 91.557669] binder: 4043:4045 ioctl c018620c 20000000 returned -22 23:11:18 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) getsockopt(r0, 0x1, 0x1, &(0x7f0000261f44)=""/188, &(0x7f0000000180)=0xbc) 23:11:18 executing program 0: r0 = syz_open_dev$sndtimer(&(0x7f0000000100)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_INFO(r0, 0x80e85411, &(0x7f0000000140)=""/245) 23:11:18 executing program 3: init_module(&(0x7f00000002c0)='/dev/snd/controlC#\x00', 0x2c2, &(0x7f0000000300)='/dev/snd/controlC#\x00') 23:11:18 executing program 4: io_setup(0x3ff, &(0x7f0000000040)=0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x5, 0x14363, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_submit(r0, 0x0, &(0x7f00000006c0)) [ 91.568948] loop_reread_partitions: partition scan of loop0 (wS]}d I!ޒf8&WF5EiceZ%} [ 91.568948] ̈\) failed (rc=-13) 23:11:18 executing program 5: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0x94}], 0x1, 0x0) write(0xffffffffffffffff, &(0x7f00000001c0), 0xfffffef3) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip6_flowlabel\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) getitimer(0x0, &(0x7f0000000000)) sendto$inet(0xffffffffffffffff, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @loopback}, 0x10) [ 91.635609] loop_reread_partitions: partition scan of loop0 () failed (rc=-13) 23:11:21 executing program 1: syz_open_procfs(0x0, &(0x7f0000000340)='\x00\x00\x00\x00\x00') openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)="6d656d00017937737761532e63757289c942abe3fa72656e7400", 0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$TCGETA(0xffffffffffffffff, 0x5405, &(0x7f0000000300)) mount(&(0x7f00000001c0)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f00000001c0)='./file0\x00') perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) open(&(0x7f0000000200)='./bus\x00', 0x14103e, 0x0) 23:11:21 executing program 0: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) ftruncate(r0, 0x8200) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r1, 0x0) lstat(&(0x7f0000000080)='./bus\x00', &(0x7f0000002bc0)) 23:11:21 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sync() 23:11:21 executing program 2: r0 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x11) r1 = syz_open_procfs(0x0, &(0x7f0000000140)="6e65742f697076365f726f75746500a29e8f64ba83da5ff49aee56e797447969e6d9d05d5a9caa999c5f403f53fa21658b3f98a093bb1c274232b43b64bb6e64f9d5260e6fcb8bbe8008b6e826310e5740fc497b8e7701842d98026faab3e2b1a69c715b8ee8bf6628b17c48fd3933bda549010c0741e0604a70a4d2152174b71b555c034b9605578f5050542aa35e7d7482ab0f0db1d37530690fcbe2d3cbd8a63a612101b912ac141f7e2fd5c140b1e95bba3d65024365b3838729256a7a78ae3b9e9156d885f6fce898d76e83dc7019c16ab8e66f55e4c10d74ca783bf63080cb22c3d0e9f354d57bb1111dd0be060000000aaa6094a5f8938751b60b50d6bde08b583f46b4eff2b6f842765ad9b7dcb18d4a7126bc90fa464128d8d04535b0b226aeb8720fdbd6bef663af017339a9e77f292f2bd345e3c32823fee242a4aa1ba93b1e0623eed95f6928071de31811198d44a2d81b28180bbe7a5802c668837be608b7d2f0f6453d19d4873aebf52e2f7cbee4d10632c12d665af044184126c24c230d698e0e2224b505f196118ccee4f3dedb2b36fe5a21398bcf097caad6e85aeae62b1bc07014b0c7bce7e8f5cef2ec1429f88e03d71eefc5711242de6ab430c73e76c5f609a1fd0d5719512ed9d881c81d64041a6118d961b9f16ea90257ab9e4414a3ca30014627baa25e882008a0208eb0d4f194c318435fc4085869f7da31763967140f2271f6652d2c08f34132775019a7648e76df5f8290a1c442944ad8c5995dbd37bee29e4fcfa657bfa98e3d46bb17e5d25f2b1f0ddb3ba9423af0c91af45188a64737") sendfile(r0, r1, &(0x7f0000000000), 0x3) 23:11:21 executing program 5: syz_genetlink_get_family_id$nbd(&(0x7f00000003c0)='nbd\x00') clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) set_thread_area(&(0x7f0000000240)={0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x600000000000, 0x56, 0x0, 0xefd}) set_thread_area(&(0x7f0000000800)={0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}) socket(0x0, 0x0, 0x0) write$binfmt_misc(r0, &(0x7f00000000c0)=ANY=[], 0x7fffffff) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000580)='/selinux/status\x00', 0x0, 0x0) recvfrom(r1, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x0, 0x0, 0xfffffffffffffd51) 23:11:21 executing program 4: creat(&(0x7f0000000080)='./file0\x00', 0x40) r0 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000980)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x2, "913fa7c292d3d3841feaa73b24735180b4fadafbd0ae8fdf06dc1c0fffaedf7b3cf0239733e29abbc5d501554cc12846eb3ebd34bab758954fc222777a53c4c0a8e473b6e9bb9bd5b5f2ee63c9774539"}, 0xd8) r1 = dup(r0) sendto$inet6(r0, &(0x7f0000e77fff), 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000007c0), 0xffffffffffffffba) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000780)='./file0\x00', 0x141046, 0x20) ftruncate(r2, 0x2007fff) sendfile(r1, r2, &(0x7f0000d83ff8)=0x54, 0x87ff7) 23:11:21 executing program 0: perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x859, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./control\x00', 0x0) r0 = open(&(0x7f0000022ff6)='./control\x00', 0x0, 0x0) open(&(0x7f0000000140)='./control\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000fc4fbe)=""/80, 0x50) ioctl$TUNGETVNETHDRSZ(r0, 0x800454d7, &(0x7f00000000c0)) 23:11:21 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) r2 = dup2(r1, r1) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r1, &(0x7f0000000040), 0xfced, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) setsockopt$inet_mtu(r2, 0x0, 0xa, &(0x7f0000000200), 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00', 0x1b) sendto$inet(r1, &(0x7f0000d7cfcb), 0xfffffffffffffe8f, 0x0, &(0x7f0000893ff0), 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 23:11:21 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x82) r1 = syz_open_procfs(0x0, &(0x7f0000005880)='attr/keycreate\x00') ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "7b3177f4fc2eb04172daa8fdd1c4c4cf144a23173b6605afb988de7e07195d78f7ddd19a3782fba5bf4af44acfe05900000053c40600", "ee52c10d1e72a9432c222982fcccff747a3131991a00000000000004002000"}) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) 23:11:21 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x3) clone(0x802102081ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) 23:11:21 executing program 1: r0 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000980)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x0, "913fa7c292d3d3841feaa73b24735180b4fadafbd0ae8fdf06dc1c0fffaedf7b3cf0239733e29abbc5d501554cc12846eb3ebd34bab758954fc222777a53c4c0a8e473b6e9bb9bd5b5f2ee63c9774539"}, 0xd8) r1 = dup(r0) sendto$inet6(r0, &(0x7f0000e77fff), 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000007c0), 0xffffffffffffffba) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000b40)=@in6={0xa, 0x0, 0x8, @remote, 0x400}, 0x80, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x8001}, 0x8000) r2 = open(&(0x7f0000000780)='./file0\x00', 0x141046, 0x20) ftruncate(r2, 0x2007fff) sendfile(r1, r2, &(0x7f0000d83ff8)=0x54, 0x87ff7) 23:11:21 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000540)='/dev/ppp\x00', 0x3d, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') ioctl$LOOP_SET_FD(r0, 0x4c00, r0) unlink(&(0x7f00000000c0)='./file0\x00') r1 = geteuid() r2 = openat(0xffffffffffffffff, &(0x7f0000000400)='./file0\x00', 0x0, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000100)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) chown(&(0x7f0000000280)='./file0\x00', r1, r3) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0xfffffffffffdfffe) get_thread_area(&(0x7f0000000440)={0x0, 0x20000000, 0x3000, 0x0, 0xfffffffffffffffa, 0xffff, 0x100000001, 0x62, 0x200, 0x80000000}) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f00000004c0)={0x1000000, @broadcast, 0x4e23, 0x1, 'lblcr\x00', 0x2, 0x7}, 0x16) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000300)={0x1, &(0x7f0000000040)=[{0x9, 0x20, 0xf8000000, 0x7}]}, 0x10) r5 = openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x288000, 0x0) r6 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$KDGETMODE(r4, 0x4b3b, &(0x7f0000000240)) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000340)) getpid() getpgrp(0x0) r7 = fcntl$getown(r5, 0x9) sched_setattr(r7, &(0x7f0000000500)={0x0, 0x5, 0x0, 0x0, 0x0, 0x9937, 0xffef}, 0x1) ioctl$LOOP_CTL_REMOVE(r6, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000800), &(0x7f0000000700), 0x0, 0x0) setuid(0x0) ioctl$FS_IOC_FIEMAP(r4, 0xc020660b, &(0x7f0000000540)=ANY=[]) remap_file_pages(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x7, 0x6, 0x9000) ioctl$TIOCGPTPEER(r5, 0x5441, 0x0) eventfd2(0x0, 0x0) 23:11:21 executing program 2: sched_setaffinity(0x0, 0xffffffffffffffb1, &(0x7f0000000180)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect(0xffffffffffffffff, &(0x7f0000000140)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x4e22, @broadcast}, 0x4, 0x3, 0x1, 0x3}}, 0x80) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x82) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$inet_tcp_int(r1, 0x6, 0x2, &(0x7f0000000040)=0xfff, 0x4) sendto$inet(r1, &(0x7f0000000000), 0x0, 0x20000802, &(0x7f0000001180)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000000)='sit0\x00', 0xa) r2 = dup3(r1, 0xffffffffffffffff, 0x80000) ioctl$UI_END_FF_ERASE(r2, 0x400c55cb, &(0x7f00000005c0)={0x8, 0x4000000000000, 0x60000000000}) getsockname$inet6(r2, &(0x7f0000000600), &(0x7f0000000240)=0x1c) sendto$inet(r1, &(0x7f0000d7cfcb), 0x100000252, 0x0, &(0x7f0000893ff0), 0x10) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000740)={{0xffffffffffffffff, 0x0, 0x7, 0x3, 0x1f}, 0xc26, 0xd, 0x4}) shutdown(r1, 0x1) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x3, 0x3, 0x332, 0x3, 0x21}, 0x4, 0x3ff, 0xffffffffffffff80}) r3 = gettid() capset(&(0x7f0000000280)={0x20080522, r3}, &(0x7f0000000480)={0x7, 0x4, 0x12, 0xa3e7, 0x9, 0x5}) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f00000004c0)={'lo\x00', {0x2, 0x4e28, @dev={0xac, 0x14, 0x14, 0x1f}}}) write$eventfd(r2, &(0x7f0000000580)=0xfffffffffffffbff, 0x8) syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_INFO(r2, &(0x7f0000000700)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000006c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="110027bd7000fedbdf250f0000002c0001000800090058000000080002002e000000080001000a00000008000b00736970000800080007000000"], 0x1}, 0x1, 0x0, 0x0, 0x40000}, 0x40) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000640)={'filter\x00'}, &(0x7f00000003c0)=0x78) ioctl$sock_inet6_tcp_SIOCATMARK(r2, 0x8905, &(0x7f00000007c0)) r4 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r4, &(0x7f0000000100)={0x2, 0x4e22, @broadcast}, 0xffffffffffffff35) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000540)={&(0x7f0000000500)='./file0\x00', r2}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f00000004c0), 0x0, 0x0) r5 = getpgid(r3) ioctl$sock_SIOCSPGRP(r4, 0x8902, &(0x7f0000000380)=r5) 23:11:21 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x1, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f00000000c0)) 23:11:21 executing program 1: r0 = socket$unix(0x1, 0x5, 0x0) ppoll(&(0x7f0000000140)=[{r0, 0x2210}], 0x1, &(0x7f0000000040), &(0x7f0000000100), 0x8) [ 94.615280] loop_reread_partitions: partition scan of loop0 (wS]}d I!ޒf8&WF5EiceZ%} [ 94.615280] ̈\) failed (rc=-13) 23:11:21 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000200)={&(0x7f0000000040), 0xc, &(0x7f00000001c0)={&(0x7f0000000c40)={0x14, 0x2, 0x1, 0x1}, 0x14}}, 0x0) [ 94.696870] audit: type=1400 audit(1540077081.606:17): avc: denied { setuid } for pid=4138 comm="syz-executor5" capability=7 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 94.723434] mmap: syz-executor5 (4152) uses deprecated remap_file_pages() syscall. See Documentation/vm/remap_file_pages.txt. 23:11:22 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000340)) ioctl$TIOCPKT(r0, 0x5420, &(0x7f00000001c0)=0x10001) read(r0, &(0x7f0000000540)=""/11, 0xfffffcf2) r1 = syz_open_pts(r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000000)={0xfffffffffffffff9, 0x0, 0x0, 0x7fffffff}) INIT: Id "2" respawning too fast: disabled for 5 minutes INIT: Id "6" respawning too fast: disabled for 5 minutes INIT: Id "4" respawning too fast: disabled for 5 minutes INIT: Id "1" respawning too fast: disabled for 5 minutes INIT: Id "5" respawning too fast: disabled for 5 minutes INIT: Id "3" respawning too fast: disabled for 5 minutes [ 285.835027] INFO: task syz-executor0:2103 blocked for more than 140 seconds. [ 285.842256] Not tainted 4.9.135+ #11 [ 285.846584] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 285.854557] syz-executor0 D26952 2103 1 0x20020004 [ 285.860340] ffff8801ce9a4740 ffff8801d613b700 ffff8801ceef6880 ffff8801ae0daf80 [ 285.869075] ffff8801db721018 ffff8801b0c1fc48 ffffffff827f3192 0000000000000000 [ 285.877187] ffff8801ce9a4ff0 ffffed0039d349fd 00ff8801ce9a4740 ffff8801db7218f0 [ 285.885258] Call Trace: [ 285.887828] [] ? __schedule+0x662/0x1b10 [ 285.893522] [] schedule+0x7f/0x1b0 [ 285.898718] [] schedule_preempt_disabled+0x13/0x20 [ 285.905308] [] mutex_lock_nested+0x38d/0x900 [ 285.911362] [] ? blkdev_put+0x2a/0x560 [ 285.917331] [] ? fsnotify+0x114/0x1100 [ 285.922881] [] ? mutex_trylock+0x3e0/0x3e0 [ 285.928784] [] ? locks_remove_file+0x31e/0x420 [ 285.935022] [] ? blkdev_put+0x560/0x560 [ 285.940626] [] blkdev_put+0x2a/0x560 [ 285.945994] [] ? blkdev_put+0x560/0x560 [ 285.951623] [] blkdev_close+0x8b/0xb0 [ 285.957085] [] __fput+0x263/0x700 [ 285.962235] [] ____fput+0x15/0x20 [ 285.967378] [] task_work_run+0x10c/0x180 [ 285.973103] [] exit_to_usermode_loop+0x129/0x150 [ 285.979530] [] do_fast_syscall_32+0x6dc/0xa10 [ 285.985693] [] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 285.992346] [] entry_SYSENTER_compat+0x90/0xa2 [ 285.998581] [ 285.998581] Showing all locks held in the system: [ 286.004941] 2 locks held by khungtaskd/24: [ 286.009152] #0: (rcu_read_lock){......}, at: [] watchdog+0x11c/0xa20 [ 286.018017] #1: (tasklist_lock){.+.+..}, at: [] debug_show_all_locks+0x79/0x218 [ 286.027714] 1 lock held by rsyslogd/1899: [ 286.031850] #0: (&f->f_pos_lock){+.+.+.}, at: [] __fdget_pos+0xac/0xd0 [ 286.040837] 2 locks held by getty/2026: [ 286.044806] #0: (&tty->ldisc_sem){++++++}, at: [] ldsem_down_read+0x32/0x40 [ 286.054180] #1: (&ldata->atomic_read_lock){+.+...}, at: [] n_tty_read+0x202/0x16e0 [ 286.064209] 1 lock held by syz-executor0/2103: [ 286.068804] #0: (&bdev->bd_mutex){+.+.+.}, at: [] blkdev_put+0x2a/0x560 [ 286.077863] 1 lock held by syz-executor1/2104: [ 286.082448] #0: (&bdev->bd_mutex){+.+.+.}, at: [] __blkdev_get+0x10c/0xd60 [ 286.091734] 2 locks held by syz-executor2/2106: [ 286.096419] #0: (&bdev->bd_mutex){+.+.+.}, at: [] __blkdev_get+0x10c/0xd60 [ 286.105675] #1: (loop_index_mutex){+.+.+.}, at: [] lo_open+0x1b/0xa0 [ 286.114390] 2 locks held by syz-executor3/2109: [ 286.119073] #0: (&bdev->bd_mutex){+.+.+.}, at: [] __blkdev_get+0x10c/0xd60 [ 286.128435] #1: (loop_index_mutex){+.+.+.}, at: [] lo_open+0x1b/0xa0 [ 286.137183] 1 lock held by syz-executor4/4130: [ 286.141760] #0: (&lo->lo_ctl_mutex/1){+.+.+.}, at: [] lo_ioctl+0x8c/0x1910 [ 286.151145] 2 locks held by syz-executor4/4146: [ 286.155865] #0: (&lo->lo_ctl_mutex/1){+.+.+.}, at: [] lo_ioctl+0x8c/0x1910 [ 286.165261] #1: (&bdev->bd_mutex){+.+.+.}, at: [] blkdev_reread_part+0x1e/0x40 [ 286.174866] 1 lock held by syz-executor4/4156: [ 286.179468] #0: (&lo->lo_ctl_mutex/1){+.+.+.}, at: [] lo_ioctl+0x8c/0x1910 [ 286.188856] 1 lock held by syz-executor4/4159: [ 286.193430] #0: (&lo->lo_ctl_mutex/1){+.+.+.}, at: [] lo_ioctl+0x8c/0x1910 [ 286.202814] 2 locks held by blkid/4137: [ 286.206785] #0: (&bdev->bd_mutex){+.+.+.}, at: [] __blkdev_put+0xbb/0x840 [ 286.215952] #1: (loop_index_mutex){+.+.+.}, at: [] lo_release+0x1f/0x1a0 [ 286.225034] 2 locks held by syz-executor5/4140: [ 286.229692] #0: (loop_index_mutex){+.+.+.}, at: [] loop_control_ioctl+0x7a/0x300 [ 286.239464] #1: (&lo->lo_ctl_mutex#2){+.+.+.}, at: [] loop_control_ioctl+0x186/0x300 [ 286.249722] 1 lock held by syz-executor5/4152: [ 286.254442] #0: (loop_index_mutex){+.+.+.}, at: [] loop_control_ioctl+0x7a/0x300 [ 286.264313] 2 locks held by blkid/4147: [ 286.268309] #0: (&bdev->bd_mutex){+.+.+.}, at: [] __blkdev_get+0x10c/0xd60 [ 286.277672] #1: (loop_index_mutex){+.+.+.}, at: [] lo_open+0x1b/0xa0 [ 286.286434] [ 286.288048] ============================================= [ 286.288048] [ 286.295265] NMI backtrace for cpu 0 [ 286.298899] CPU: 0 PID: 24 Comm: khungtaskd Not tainted 4.9.135+ #11 [ 286.305375] ffff8801d9907d08 ffffffff81b36bf9 0000000000000000 0000000000000000 [ 286.313362] 0000000000000000 0000000000000001 ffffffff81098330 ffff8801d9907d40 [ 286.321366] ffffffff81b41d09 0000000000000000 0000000000000000 0000000000000003 [ 286.329360] Call Trace: [ 286.331926] [] dump_stack+0xc1/0x128 [ 286.337336] [] ? irq_force_complete_move+0x330/0x330 [ 286.344072] [] nmi_cpu_backtrace.cold.0+0x48/0x87 [ 286.350539] [] ? irq_force_complete_move+0x330/0x330 [ 286.357267] [] nmi_trigger_cpumask_backtrace+0x12c/0x151 [ 286.364445] [] arch_trigger_cpumask_backtrace+0x14/0x20 [ 286.371557] [] watchdog+0x6ad/0xa20 [ 286.376812] [] ? watchdog+0x11c/0xa20 [ 286.382240] [] kthread+0x26d/0x300 [ 286.387426] [] ? reset_hung_task_detector+0x20/0x20 [ 286.394070] [] ? kthread_park+0xa0/0xa0 [ 286.399675] [] ? __switch_to_asm+0x34/0x70 [ 286.405538] [] ? kthread_park+0xa0/0xa0 [ 286.411139] [] ? kthread_park+0xa0/0xa0 [ 286.416737] [] ret_from_fork+0x5c/0x70 [ 286.422524] Sending NMI from CPU 0 to CPUs 1: [ 286.427207] NMI backtrace for cpu 1 skipped: idling at pc 0xffffffff82802026 [ 286.434491] Kernel panic - not syncing: hung_task: blocked tasks [ 286.440635] CPU: 0 PID: 24 Comm: khungtaskd Not tainted 4.9.135+ #11 [ 286.447113] ffff8801d9907cc8 ffffffff81b36bf9 ffffffff82a78340 00000000ffffffff [ 286.455118] 0000000000000000 0000000000000000 dffffc0000000000 ffff8801d9907d88 [ 286.463125] ffffffff813f6aa5 0000000041b58ab3 ffffffff82e29bcb ffffffff813f68e6 [ 286.471118] Call Trace: [ 286.473684] [] dump_stack+0xc1/0x128 [ 286.479023] [] panic+0x1bf/0x39f [ 286.484015] [] ? add_taint.cold.6+0x16/0x16 [ 286.489961] [] ? ___preempt_schedule+0x16/0x18 [ 286.496169] [] ? nmi_trigger_cpumask_backtrace+0x102/0x151 [ 286.503423] [] watchdog+0x6be/0xa20 [ 286.508674] [] ? watchdog+0x11c/0xa20 [ 286.514101] [] kthread+0x26d/0x300 [ 286.519265] [] ? reset_hung_task_detector+0x20/0x20 [ 286.525904] [] ? kthread_park+0xa0/0xa0 [ 286.531503] [] ? __switch_to_asm+0x34/0x70 [ 286.537360] [] ? kthread_park+0xa0/0xa0 [ 286.542955] [] ? kthread_park+0xa0/0xa0 [ 286.548558] [] ret_from_fork+0x5c/0x70 [ 286.554439] Kernel Offset: disabled [ 286.558060] Rebooting in 86400 seconds..