[....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [ 10.197609] random: sshd: uninitialized urandom read (32 bytes read) [....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 11.601037] random: sshd: uninitialized urandom read (32 bytes read) [ 11.807312] random: sshd: uninitialized urandom read (32 bytes read) [ 12.338568] random: crng init done Warning: Permanently added '10.128.0.224' (ECDSA) to the list of known hosts. 2019/12/04 05:52:58 fuzzer started 2019/12/04 05:53:00 dialing manager at 10.128.0.26:45289 2019/12/04 05:53:00 syscalls: 1430 2019/12/04 05:53:00 code coverage: enabled 2019/12/04 05:53:00 comparison tracing: CONFIG_KCOV_ENABLE_COMPARISONS is not enabled 2019/12/04 05:53:00 extra coverage: extra coverage is not supported by the kernel 2019/12/04 05:53:00 setuid sandbox: enabled 2019/12/04 05:53:00 namespace sandbox: enabled 2019/12/04 05:53:00 Android sandbox: /sys/fs/selinux/policy does not exist 2019/12/04 05:53:00 fault injection: kernel does not have systematic fault injection support 2019/12/04 05:53:00 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/12/04 05:53:00 net packet injection: enabled 2019/12/04 05:53:00 net device setup: enabled 2019/12/04 05:53:00 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2019/12/04 05:53:00 devlink PCI setup: PCI device 0000:00:10.0 is not available INIT: Id "2" respawning too fast: disabled for 5 minutes INIT: Id "5" respawning too fast: disabled for 5 minutes INIT: Id "1" respawning too fast: disabled for 5 minutes INIT: Id "4" respawning too fast: disabled for 5 minutes INIT: Id "3" respawning too fast: disabled for 5 minutes INIT: Id "6" respawning too fast: disabled for 5 minutes 05:54:40 executing program 0: 05:54:40 executing program 5: 05:54:40 executing program 2: syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001680)={[{@fat=@dmask={'dmask'}}]}) 05:54:40 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) socket$inet6(0xa, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000039c0)=[{{&(0x7f0000000400)=@nfc, 0x80, 0x0}, 0x5}, {{0x0, 0x0, &(0x7f0000001c00)=[{0x0}], 0x1}, 0x8}, {{&(0x7f0000001c40)=@vsock, 0x80, &(0x7f0000002f00)=[{0x0}, {0x0}], 0x2}, 0x2}, {{&(0x7f00000032c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, &(0x7f0000003480), 0x0, &(0x7f0000000680)=""/51, 0x33}, 0xfffff9f0}, {{0x0, 0x0, &(0x7f0000003880)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4}, 0xdcc}], 0x5, 0x10000, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00'}) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 05:54:40 executing program 4: 05:54:40 executing program 1: [ 122.960585] audit: type=1400 audit(1575438883.012:5): avc: denied { associate } for pid=2114 comm="syz-executor.0" name="syz0" scontext=unconfined_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=filesystem permissive=1 05:54:43 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) r3 = gettid() fcntl$setownex(r2, 0xf, &(0x7f0000000280)={0x2, r3}) fcntl$setlease(r2, 0x400, 0x1) creat(&(0x7f0000000080)='./file0\x00', 0x0) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) close(r2) [ 123.050134] FAT-fs (loop2): bogus number of reserved sectors [ 123.069473] FAT-fs (loop2): Can't find a valid FAT filesystem 05:54:43 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000002180)=0x1000, 0x4) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="030400000a036000000000000000", 0xe, 0x0, 0x0, 0x0) 05:54:43 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="180200000000000000000000000000008500000019000000950000"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 05:54:43 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = socket(0x1f, 0x3, 0x0) setsockopt(r0, 0x1, 0x0, 0x0, 0x0) 05:54:43 executing program 1: r0 = socket(0x1f, 0x3, 0x0) getsockopt(r0, 0x1, 0x1, 0x0, 0x0) 05:54:43 executing program 4: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x1004e20, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000140)="6812334f6743a747f8bf094356", 0xd, 0x8800, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10) sendto$inet(r0, &(0x7f0000000100)='\x00', 0x38, 0x4088, 0x0, 0x0) recvmmsg(r0, &(0x7f0000006e40)=[{{0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000480)=""/189, 0xbd}], 0x1}}], 0x1, 0x0, 0x0) 05:54:43 executing program 3: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, &(0x7f00000001c0), 0xfffffef3) ioctl$FIONREAD(r0, 0x541b, &(0x7f0000000000)) 05:54:43 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x9) write(r0, &(0x7f0000000000)="10000000ed030700f407000009000715", 0x10) [ 123.138219] FAT-fs (loop2): bogus number of reserved sectors [ 123.172084] FAT-fs (loop2): Can't find a valid FAT filesystem 05:54:43 executing program 2: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000540)='\x00', 0x3) write$binfmt_misc(r0, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) fcntl$addseals(r0, 0x409, 0x8) 05:54:43 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000140)="580000001400192340834b80040d8c5602067fbc45ff81054e220000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010003081000418e00000004fcff", 0xfed1}], 0x1) 05:54:43 executing program 1: clone(0xd7e0ce5d01a5091b, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000040)=ANY=[@ANYBLOB="6e61853100022200000100000000000000000000e4dbb77487e9010400ffffff7f0000007bea0000011b2300000503000018030000cc0000428581c30000000006000000000000000000080000f34f8dfa8bb027d9c4f8000ae7b8cab76bab1004000010040006d32379b87c5ade6e68b6469a2246d81751c2f2d3c00f3f72e211777424c9810300852110e5d4820b060000006b630100000000ffffffffb341cfe8d68c26b866cd05005d0f4d6715ba085900325a000006f00083d1c7cfd3f37bbfff96385f55b911f544b74eaed2018000008b1b192d4a459e9373be8195b2de102e3e9b55df3ebb5778c5f52a49de97b51801fc94fcbbcd8448b09f68e77c7482c318cc7db18c379fbb6739ad8194b0ab7a153e1c3fde7cfcbd865a979730c1016f034400b931364a6d33f28e560b40c75a778c53d22a611a3a4a5f7757bd6220264eee5040ecdec7c31f053bd9617d9a2d"], 0x1) socket$inet(0x2, 0x0, 0x0) 05:54:43 executing program 4: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r1 = socket$inet(0x10, 0x3, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$binfmt_aout(r0, 0x0, 0x0) 05:54:43 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f00000039c0)=[{{&(0x7f0000000400)=@nfc, 0x80, &(0x7f00000017c0)=[{0x0}, {&(0x7f00000002c0)=""/7, 0x7}, {0x0}, {&(0x7f0000001700)=""/161, 0xa1}, {0x0}], 0x5}, 0x5}, {{0x0, 0x0, &(0x7f0000001c00)=[{&(0x7f0000003b80)=""/100, 0x64}], 0x1}, 0x8}, {{&(0x7f0000001c40)=@vsock, 0x80, &(0x7f0000002f00)=[{&(0x7f0000000580)=""/36, 0x24}, {&(0x7f0000001d00)=""/195, 0xc3}, {&(0x7f0000001e00)=""/4096, 0x1000}, {&(0x7f0000002e00)=""/152, 0x98}, {&(0x7f0000002ec0)=""/9, 0x9}], 0x5, &(0x7f0000002f80)=""/132, 0x84}, 0x2}, {{&(0x7f00000032c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, &(0x7f0000003480), 0x0, &(0x7f0000000680)=""/51, 0x33}, 0xfffff9f0}, {{&(0x7f0000003500)=@pptp={0x18, 0x2, {0x0, @dev}}, 0x80, &(0x7f0000003880)=[{0x0}, {&(0x7f0000003640)=""/105, 0x69}, {&(0x7f00000036c0)=""/138, 0x8a}], 0x3, &(0x7f0000003900)=""/167, 0xa7}, 0xdcc}], 0x5, 0x10000, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x310, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f0000000100)=@pppoe={0x18, 0x0, {0x0, @dev}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_bp={&(0x7f0000000180), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00'}) io_setup(0x0, &(0x7f0000000240)=0x0) io_submit(r5, 0x1, &(0x7f00000006c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, r4, &(0x7f0000000100)="e669389f", 0x4}]) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000001900)=ANY=[@ANYBLOB="1000000097020046f3e01f4e5b6c75301197f4da580ebab2c0f5829695cfae09da6ea256f55cd019464bfe0cf01cbc804e010e0700000000000000f10f924e04afda93ae01040000193e6fca015efa9ce1541bf4ad8db200000000000000010000f5680c3be50af61f8821bbb697320a1284b9e5435a59000000912e1e817bffac96038e0100000033234d1d113a6fd28aa181fd725cd798d5d4adc50d79c5128e23"], 0x90) r6 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r6, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r6, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r6, &(0x7f00000018c0)=ANY=[], 0x6f) fallocate(r6, 0x3, 0x0, 0x8020003) writev(r6, &(0x7f0000000380)=[{0x0}], 0x1) lseek(0xffffffffffffffff, 0x0, 0x3) syz_open_procfs(0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) 05:54:43 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) listxattr(&(0x7f0000000100)='./file0//ile0\x00', 0x0, 0x0) 05:54:43 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x1004e20, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000140)="6812334f6743a747f8bf094356", 0xd, 0x8800, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') connect$inet(r0, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10) sendto$inet(r0, &(0x7f0000000100)='\x00', 0x38, 0x4088, 0x0, 0x0) recvmmsg(r0, &(0x7f00000034c0)=[{{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000300)=""/190, 0xbe}], 0x1}}], 0x1, 0x0, 0x0) 05:54:43 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[@ANYRES32], 0xff40) setsockopt$sock_int(r1, 0x1, 0x2a, &(0x7f0000000540), 0x118) recvmmsg(r1, &(0x7f0000005a40)=[{{0x0, 0xffffff3e, 0x0, 0x0, 0x0, 0x1000001ad}}], 0x454, 0x2, 0x0) 05:54:43 executing program 1: r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8475071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000002000000000000000000000300000000020000000200000001000000000000000000000100000f0a405b00000000"], &(0x7f0000000100)=""/213, 0x42, 0x326, 0x1}, 0x20) 05:54:43 executing program 1: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x1004e20, @loopback}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet(r0, 0x0, 0x0, 0x8800, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10) sendto$inet(r0, &(0x7f0000000100)='\x00', 0x1, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000006e40)=[{{&(0x7f0000000400)=@vsock={0x28, 0x0, 0x0, @my}, 0x80, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x10000, 0x0) 05:54:44 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f00000039c0)=[{{&(0x7f0000000400)=@nfc, 0x80, &(0x7f00000017c0)=[{0x0}, {&(0x7f00000002c0)=""/7, 0x7}, {0x0}, {&(0x7f0000001700)=""/161, 0xa1}, {0x0}], 0x5}, 0x5}, {{0x0, 0x0, &(0x7f0000001c00)=[{&(0x7f0000003b80)=""/100, 0x64}], 0x1}, 0x8}, {{&(0x7f0000001c40)=@vsock, 0x80, &(0x7f0000002f00)=[{&(0x7f0000000580)=""/36, 0x24}, {&(0x7f0000001d00)=""/195, 0xc3}, {&(0x7f0000001e00)=""/4096, 0x1000}, {&(0x7f0000002e00)=""/152, 0x98}, {&(0x7f0000002ec0)=""/9, 0x9}], 0x5, &(0x7f0000002f80)=""/132, 0x84}, 0x2}, {{&(0x7f00000032c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, &(0x7f0000003480), 0x0, &(0x7f0000000680)=""/51, 0x33}, 0xfffff9f0}, {{&(0x7f0000003500)=@pptp={0x18, 0x2, {0x0, @dev}}, 0x80, &(0x7f0000003880)=[{0x0}, {&(0x7f0000003640)=""/105, 0x69}, {&(0x7f00000036c0)=""/138, 0x8a}], 0x3, &(0x7f0000003900)=""/167, 0xa7}, 0xdcc}], 0x5, 0x10000, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x310, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f0000000100)=@pppoe={0x18, 0x0, {0x0, @dev}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_bp={&(0x7f0000000180), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00'}) io_setup(0x0, &(0x7f0000000240)=0x0) io_submit(r5, 0x1, &(0x7f00000006c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, r4, &(0x7f0000000100)="e669389f", 0x4}]) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000001900)=ANY=[@ANYBLOB="1000000097020046f3e01f4e5b6c75301197f4da580ebab2c0f5829695cfae09da6ea256f55cd019464bfe0cf01cbc804e010e0700000000000000f10f924e04afda93ae01040000193e6fca015efa9ce1541bf4ad8db200000000000000010000f5680c3be50af61f8821bbb697320a1284b9e5435a59000000912e1e817bffac96038e0100000033234d1d113a6fd28aa181fd725cd798d5d4adc50d79c5128e23"], 0x90) r6 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r6, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r6, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r6, &(0x7f00000018c0)=ANY=[], 0x6f) fallocate(r6, 0x3, 0x0, 0x8020003) writev(r6, &(0x7f0000000380)=[{0x0}], 0x1) lseek(0xffffffffffffffff, 0x0, 0x3) syz_open_procfs(0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) 05:54:44 executing program 2: syz_emit_ethernet(0x42, &(0x7f0000000140)={@local, @random="1915df5f8f87", [], {@ipv4={0x800, {{0x6, 0x4, 0x0, 0x0, 0x34, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @remote, {[@ssrr={0x89, 0x3}]}}, @icmp=@parameter_prob={0xc, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}}}}}}}, 0x0) 05:54:44 executing program 0: r0 = socket(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, &(0x7f0000000280)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000b60000008e0b2160598f628f4261026b552515ce3caa9eda6472b358ee87b2f5b7f7844b2a0aef11a1f2754b6e97d6cbb2cb3996086c5bc6d37006c9855b92acaf801ea85550b4bc1444b228f71cece6b2c50eda53b0ddd297b4cddc6c36a5a4076d8b25fd9fd972c7dced6d5d1907b1b44504e68c50a6cbaf5702716c368b7c8dc4ab383346c5b732ac77d14ff8352eb5517e082359451240bf1034f28092cc765c560bdcf1595620612807dfd019b6f624bad2f305841c62e4"], &(0x7f00000000c0)=0xda) 05:54:44 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0xfebe) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) bind$packet(r1, &(0x7f0000000040)={0x11, 0x0, r2}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @dev}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503030089063e0000000100c52cf7c25975e697b02f08006b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdb8, 0x80, 0x0, 0xfffffffffffffe57) 05:54:44 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f00000039c0)=[{{&(0x7f0000000400)=@nfc, 0x80, &(0x7f00000017c0)=[{0x0}, {&(0x7f00000002c0)=""/7, 0x7}, {0x0}, {&(0x7f0000001700)=""/161, 0xa1}, {0x0}], 0x5}, 0x5}, {{0x0, 0x0, &(0x7f0000001c00)=[{&(0x7f0000003b80)=""/100, 0x64}], 0x1}, 0x8}, {{&(0x7f0000001c40)=@vsock, 0x80, &(0x7f0000002f00)=[{&(0x7f0000000580)=""/36, 0x24}, {&(0x7f0000001d00)=""/195, 0xc3}, {&(0x7f0000001e00)=""/4096, 0x1000}, {&(0x7f0000002e00)=""/152, 0x98}, {&(0x7f0000002ec0)=""/9, 0x9}], 0x5, &(0x7f0000002f80)=""/132, 0x84}, 0x2}, {{&(0x7f00000032c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, &(0x7f0000003480), 0x0, &(0x7f0000000680)=""/51, 0x33}, 0xfffff9f0}, {{&(0x7f0000003500)=@pptp={0x18, 0x2, {0x0, @dev}}, 0x80, &(0x7f0000003880)=[{0x0}, {&(0x7f0000003640)=""/105, 0x69}, {&(0x7f00000036c0)=""/138, 0x8a}], 0x3, &(0x7f0000003900)=""/167, 0xa7}, 0xdcc}], 0x5, 0x10000, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x310, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f0000000100)=@pppoe={0x18, 0x0, {0x0, @dev}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_bp={&(0x7f0000000180), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00'}) io_setup(0x0, &(0x7f0000000240)=0x0) io_submit(r5, 0x1, &(0x7f00000006c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, r4, &(0x7f0000000100)="e669389f", 0x4}]) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000001900)=ANY=[@ANYBLOB="1000000097020046f3e01f4e5b6c75301197f4da580ebab2c0f5829695cfae09da6ea256f55cd019464bfe0cf01cbc804e010e0700000000000000f10f924e04afda93ae01040000193e6fca015efa9ce1541bf4ad8db200000000000000010000f5680c3be50af61f8821bbb697320a1284b9e5435a59000000912e1e817bffac96038e0100000033234d1d113a6fd28aa181fd725cd798d5d4adc50d79c5128e23"], 0x90) r6 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r6, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r6, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r6, &(0x7f00000018c0)=ANY=[], 0x6f) fallocate(r6, 0x3, 0x0, 0x8020003) writev(r6, &(0x7f0000000380)=[{0x0}], 0x1) lseek(0xffffffffffffffff, 0x0, 0x3) syz_open_procfs(0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) 05:54:44 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f00000002c0)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_targets\x00') perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x332, 0x0) 05:54:44 executing program 0: clock_nanosleep(0x8, 0x0, &(0x7f00000002c0)={0x0, 0x1c9c380}, 0x0) 05:54:44 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x4) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000140)="580000001400192340834b80040d8c5602067fbc45ff81054e220000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010003081000418e00000004fcff", 0xfed1}], 0x1) 05:54:44 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x2000002) sendmmsg(0xffffffffffffffff, &(0x7f0000000000)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) connect$inet(r0, &(0x7f0000000140)={0x2, 0x4e23, @local}, 0x10) [ 124.093806] audit: type=1400 audit(1575438884.142:6): avc: denied { wake_alarm } for pid=3624 comm="syz-executor.0" capability=35 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=capability2 permissive=1 [ 124.121418] ODEBUG: object 000000005c36eee8 is on stack 000000005c469588, but NOT annotated. [ 124.130022] ------------[ cut here ]------------ [ 124.134807] WARNING: CPU: 0 PID: 3626 at lib/debugobjects.c:303 __debug_object_init.cold+0x6b/0x2fd [ 124.143995] Kernel panic - not syncing: panic_on_warn set ... [ 124.143995] [ 124.151376] CPU: 0 PID: 3626 Comm: syz-executor.0 Not tainted 4.9.205-syzkaller #0 [ 124.159083] ffff8801a147fa58 ffffffff81b55e6b 0000000000000000 ffffffff82a3b700 [ 124.167111] 00000000ffffffff 0000000000000000 0000000000000009 ffff8801a147fb38 [ 124.175218] ffffffff813ff051 0000000041b58ab3 ffffffff82e316eb ffffffff813fee71 [ 124.183401] Call Trace: [ 124.185982] [<00000000061a9cc7>] dump_stack+0xcb/0x130 [ 124.191347] [<00000000d26b3342>] panic+0x1e0/0x3c4 [ 124.196498] [<000000008339807d>] ? add_taint.cold+0x16/0x16 [ 124.202290] [<00000000e510f477>] ? vprintk+0x28/0x30 [ 124.207472] [<0000000009cc239b>] ? printk+0xc2/0xf5 [ 124.212579] [<0000000072b7b976>] ? __warn.cold+0x14/0x2f [ 124.218116] [<0000000012b5192e>] ? __debug_object_init.cold+0x6b/0x2fd [ 124.224883] [<00000000307dd714>] __warn.cold+0x2f/0x2f [ 124.230253] [<000000007cae6210>] warn_slowpath_null+0x2d/0x40 [ 124.236235] [<0000000012b5192e>] __debug_object_init.cold+0x6b/0x2fd 05:54:44 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[@ANYRES32], 0xff40) setsockopt$sock_int(r1, 0x1, 0x2a, &(0x7f0000000540), 0x118) recvmmsg(r1, &(0x7f0000005a40)=[{{0x0, 0xffffff3e, 0x0, 0x0, 0x0, 0x1000001ad}}], 0x454, 0x2, 0x0) 05:54:44 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) close(r0) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000ff5ffc)={0x0, 0x3}, 0x4) r2 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mtu(r2, 0x0, 0xa, &(0x7f0000ff0ffc)=0x8000000000004, 0x9c) sendto$inet(r2, &(0x7f0000865000), 0xffe4, 0x0, &(0x7f0000fd9ff0)={0x2, 0x4e20}, 0x10) readv(r0, &(0x7f0000000340)=[{&(0x7f00000000c0)=""/199, 0xc7}], 0x1) [ 124.242813] [<000000000233b3ae>] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 124.249562] [<00000000d732b019>] ? debug_object_fixup+0x30/0x30 [ 124.255697] [<000000007df67b5c>] ? selinux_capable+0x36/0x40 [ 124.261570] [<00000000333e3dde>] debug_object_init+0x16/0x20 [ 124.267460] [<000000003a6e0444>] hrtimer_init+0x2a/0x2f0 [ 124.272996] [<000000008db01131>] alarm_timer_nsleep+0x160/0x4e0 [ 124.279149] [<00000000aa42b165>] ? alarmtimer_do_nsleep+0x2a0/0x2a0 [ 124.285737] [<000000000233b3ae>] ? debug_lockdep_rcu_enabled+0x71/0xa0 05:54:44 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x0, 0x0) poll(&(0x7f0000000280)=[{r0}], 0x1, 0x8) [ 124.292501] [<000000008e2bb62d>] ? kcov_close+0x20/0x20 [ 124.297958] [<000000000233b3ae>] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 124.304727] [<00000000766fd90f>] ? __might_fault+0x114/0x1d0 [ 124.310617] [<000000002ef068b6>] SyS_clock_nanosleep+0x1be/0x280 [ 124.316853] [<000000007b953652>] ? SyS_clock_getres+0x200/0x200 [ 124.323093] [<000000008212ad7e>] ? do_syscall_64+0x4a/0x5c0 [ 124.328905] [<000000007b953652>] ? SyS_clock_getres+0x200/0x200 [ 124.335073] [<0000000002ef9e2f>] do_syscall_64+0x1ad/0x5c0 [ 124.340887] [<00000000a155580d>] entry_SYSCALL_64_after_swapgs+0x5d/0xdb [ 124.348846] Kernel Offset: disabled [ 124.352742] Rebooting in 86400 seconds..