[....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. Starting mcstransd: [....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[ 11.346886] random: sshd: uninitialized urandom read (32 bytes read) [?25l[?1c7[ ok 8[?25h[?0c. [ 12.288931] random: crng init done Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.24' (ECDSA) to the list of known hosts. 2019/10/01 13:35:31 fuzzer started 2019/10/01 13:35:33 dialing manager at 10.128.0.26:32861 2019/10/01 13:35:33 checking machine... 2019/10/01 13:35:33 checking revisions... 2019/10/01 13:35:34 testing simple program... 2019/10/01 13:35:34 building call list... syzkaller login: [ 42.714270] audit: type=1400 audit(1569936934.487:5): avc: denied { create } for pid=2050 comm="syz-fuzzer" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_crypto_socket permissive=1 [ 42.724663] audit: type=1400 audit(1569936934.507:6): avc: denied { create } for pid=2050 comm="syz-fuzzer" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 42.729406] audit: type=1400 audit(1569936934.507:7): avc: denied { create } for pid=2050 comm="syz-fuzzer" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 2019/10/01 13:35:44 syscalls: 1385 2019/10/01 13:35:44 code coverage: enabled 2019/10/01 13:35:44 comparison tracing: CONFIG_KCOV_ENABLE_COMPARISONS is not enabled 2019/10/01 13:35:44 extra coverage: extra coverage is not supported by the kernel 2019/10/01 13:35:44 setuid sandbox: enabled 2019/10/01 13:35:44 namespace sandbox: enabled 2019/10/01 13:35:44 Android sandbox: /sys/fs/selinux/policy does not exist 2019/10/01 13:35:44 fault injection: kernel does not have systematic fault injection support 2019/10/01 13:35:44 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/10/01 13:35:44 net packet injection: enabled 2019/10/01 13:35:44 net device setup: enabled 13:35:44 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000040)="0201eeffffff01000000ff0700006c000000550008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 13:35:44 executing program 1: r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x17, &(0x7f00000000c0)=0x9, 0x4) setsockopt$inet_int(r0, 0x0, 0x12, &(0x7f0000000000)=0x9c6, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000012c0)='syz_tun\x00', 0x10) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000d00)=@abs={0x0, 0x0, 0x10000e0}, 0x6e) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffec8}}], 0x4000000000002c5, 0x2, 0x0) 13:35:44 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_opts(r0, 0x0, 0x80000000000008, &(0x7f0000000600)='u', 0x1) getsockopt$inet_opts(r0, 0x0, 0x9, 0xffffffffffffffff, &(0x7f0000000040)=0xa3) 13:35:44 executing program 2: keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) 13:35:44 executing program 3: setsockopt$inet_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, &(0x7f0000000080)=0x4, 0x4) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000180)) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="78808320c933512a85d62b7be3f08594a6568873522f5c37363af27b67") r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x0, 0x0, @empty}, 0x1c) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, @perf_config_ext={0x7, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r1 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x201, 0x0) write$P9_RUNLINKAT(r1, &(0x7f0000000300)={0x7, 0x4d, 0x2}, 0x7) fstat(0xffffffffffffffff, 0x0) r2 = socket$packet(0x11, 0x1000000000000002, 0x300) r3 = socket$packet(0x11, 0x1a3d0126c9f74206, 0x300) sendfile(r2, r3, &(0x7f0000000340), 0x8001) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) fsetxattr$security_evm(r0, &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000001c0)) 13:35:44 executing program 4: r0 = openat$random(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/random\x00', 0x0, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000200)={0x11}) epoll_wait(r1, &(0x7f00000001c0)=[{}], 0x1, 0x0) [ 55.084790] audit: type=1400 audit(1569936946.857:8): avc: denied { associate } for pid=2169 comm="syz-executor.0" name="syz0" scontext=unconfined_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=filesystem permissive=1 13:35:46 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_opts(r0, 0x0, 0x80000000000008, &(0x7f0000000600)='u', 0x1) getsockopt$inet_opts(r0, 0x0, 0x9, 0xffffffffffffffff, &(0x7f0000000040)=0xa3) 13:35:47 executing program 2: keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) 13:35:47 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_opts(r0, 0x0, 0x80000000000008, &(0x7f0000000600)='u', 0x1) getsockopt$inet_opts(r0, 0x0, 0x9, 0xffffffffffffffff, &(0x7f0000000040)=0xa3) [ 55.210245] raw_sendmsg: syz-executor.1 forgot to set AF_INET. Fix it! 13:35:47 executing program 1: r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x17, &(0x7f00000000c0)=0x9, 0x4) setsockopt$inet_int(r0, 0x0, 0x12, &(0x7f0000000000)=0x9c6, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000012c0)='syz_tun\x00', 0x10) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000d00)=@abs={0x0, 0x0, 0x10000e0}, 0x6e) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffec8}}], 0x4000000000002c5, 0x2, 0x0) 13:35:47 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_opts(r0, 0x0, 0x80000000000008, &(0x7f0000000600)='u', 0x1) getsockopt$inet_opts(r0, 0x0, 0x9, 0xffffffffffffffff, &(0x7f0000000040)=0xa3) 13:35:47 executing program 2: keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) 13:35:47 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000040)="0201eeffffff01000000ff0700006c000000550008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 13:35:47 executing program 5: r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x17, &(0x7f00000000c0)=0x9, 0x4) setsockopt$inet_int(r0, 0x0, 0x12, &(0x7f0000000000)=0x9c6, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000012c0)='syz_tun\x00', 0x10) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000d00)=@abs={0x0, 0x0, 0x10000e0}, 0x6e) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffec8}}], 0x4000000000002c5, 0x2, 0x0) 13:35:47 executing program 2: keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) 13:35:47 executing program 1: r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x17, &(0x7f00000000c0)=0x9, 0x4) setsockopt$inet_int(r0, 0x0, 0x12, &(0x7f0000000000)=0x9c6, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000012c0)='syz_tun\x00', 0x10) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000d00)=@abs={0x0, 0x0, 0x10000e0}, 0x6e) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffec8}}], 0x4000000000002c5, 0x2, 0x0) [ 55.416353] hrtimer: interrupt took 36236 ns 13:35:47 executing program 3: setsockopt$inet_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, &(0x7f0000000080)=0x4, 0x4) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000180)) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="78808320c933512a85d62b7be3f08594a6568873522f5c37363af27b67") r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x0, 0x0, @empty}, 0x1c) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, @perf_config_ext={0x7, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r1 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x201, 0x0) write$P9_RUNLINKAT(r1, &(0x7f0000000300)={0x7, 0x4d, 0x2}, 0x7) fstat(0xffffffffffffffff, 0x0) r2 = socket$packet(0x11, 0x1000000000000002, 0x300) r3 = socket$packet(0x11, 0x1a3d0126c9f74206, 0x300) sendfile(r2, r3, &(0x7f0000000340), 0x8001) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) fsetxattr$security_evm(r0, &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000001c0)) 13:35:47 executing program 4: r0 = openat$random(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/random\x00', 0x0, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000200)={0x11}) epoll_wait(r1, &(0x7f00000001c0)=[{}], 0x1, 0x0) 13:35:47 executing program 2: r0 = openat$random(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/random\x00', 0x0, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000200)={0x11}) epoll_wait(r1, &(0x7f00000001c0)=[{}], 0x1, 0x0) 13:35:47 executing program 1: r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x17, &(0x7f00000000c0)=0x9, 0x4) setsockopt$inet_int(r0, 0x0, 0x12, &(0x7f0000000000)=0x9c6, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000012c0)='syz_tun\x00', 0x10) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000d00)=@abs={0x0, 0x0, 0x10000e0}, 0x6e) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffec8}}], 0x4000000000002c5, 0x2, 0x0) 13:35:47 executing program 5: r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x17, &(0x7f00000000c0)=0x9, 0x4) setsockopt$inet_int(r0, 0x0, 0x12, &(0x7f0000000000)=0x9c6, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000012c0)='syz_tun\x00', 0x10) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000d00)=@abs={0x0, 0x0, 0x10000e0}, 0x6e) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffec8}}], 0x4000000000002c5, 0x2, 0x0) 13:35:47 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000040)="0201eeffffff01000000ff0700006c000000550008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 13:35:47 executing program 2: r0 = openat$random(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/random\x00', 0x0, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000200)={0x11}) epoll_wait(r1, &(0x7f00000001c0)=[{}], 0x1, 0x0) 13:35:47 executing program 4: r0 = openat$random(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/random\x00', 0x0, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000200)={0x11}) epoll_wait(r1, &(0x7f00000001c0)=[{}], 0x1, 0x0) 13:35:47 executing program 2: r0 = openat$random(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/random\x00', 0x0, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000200)={0x11}) epoll_wait(r1, &(0x7f00000001c0)=[{}], 0x1, 0x0) 13:35:47 executing program 5: r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x17, &(0x7f00000000c0)=0x9, 0x4) setsockopt$inet_int(r0, 0x0, 0x12, &(0x7f0000000000)=0x9c6, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000012c0)='syz_tun\x00', 0x10) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000d00)=@abs={0x0, 0x0, 0x10000e0}, 0x6e) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffec8}}], 0x4000000000002c5, 0x2, 0x0) 13:35:47 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000040)="0201eeffffff01000000ff0700006c000000550008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 13:35:47 executing program 1: setsockopt$inet_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, &(0x7f0000000080)=0x4, 0x4) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000180)) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="78808320c933512a85d62b7be3f08594a6568873522f5c37363af27b67") r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x0, 0x0, @empty}, 0x1c) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, @perf_config_ext={0x7, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r1 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x201, 0x0) write$P9_RUNLINKAT(r1, &(0x7f0000000300)={0x7, 0x4d, 0x2}, 0x7) fstat(0xffffffffffffffff, 0x0) r2 = socket$packet(0x11, 0x1000000000000002, 0x300) r3 = socket$packet(0x11, 0x1a3d0126c9f74206, 0x300) sendfile(r2, r3, &(0x7f0000000340), 0x8001) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) fsetxattr$security_evm(r0, &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000001c0)) INIT: Id "1" respawning too fast: disabled for 5 minutes INIT: Id "4" respawning too fast: disabled for 5 minutes INIT: Id "6" respawning too fast: disabled for 5 minutes INIT: Id "2" respawning too fast: disabled for 5 minutes INIT: Id "3" respawning too fast: disabled for 5 minutes INIT: Id "5" respawning too fast: disabled for 5 minutes [ 286.285737] INFO: task syz-executor.5:2173 blocked for more than 140 seconds. [ 286.293230] Not tainted 4.9.194+ #0 [ 286.297580] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 286.305608] syz-executor.5 D25400 2173 2165 0x00000000 [ 286.311368] 0000000000000087 ffff8801cba54740 ffff8801cf4d1080 ffff8801db721000 [ 286.319588] ffff8801c0f74740 ffff8801db721018 ffff8801b357f6a8 ffffffff8281af8e [ 286.327741] 0000000000000246 ffffffff831f3ca8 00ff8801cba54fe8 ffff8801db7218f0 [ 286.336021] Call Trace: [ 286.338625] [<0000000014d45b20>] ? __schedule+0x6ce/0x1f10 [ 286.344377] [<0000000016622a60>] ? io_schedule_timeout+0x390/0x390 [ 286.350815] [<000000008cbd9ebd>] ? mark_held_locks+0xb1/0x100 [ 286.356815] [<0000000092c3fecb>] schedule+0x92/0x1c0 [ 286.361989] [<00000000ff515683>] schedule_preempt_disabled+0x13/0x20 [ 286.369068] [<0000000072c8ce29>] mutex_lock_nested+0x38d/0x920 [ 286.375263] [<000000001cab68ef>] ? __blkdev_get+0x10e/0xeb0 [ 286.381331] [<0000000069bc5d4d>] ? mutex_trylock+0x3f0/0x3f0 [ 286.387415] [<00000000ee1b64d1>] ? disk_block_events+0xc7/0x140 [ 286.393664] [<000000001cab68ef>] __blkdev_get+0x10e/0xeb0 [ 286.399323] [<00000000f1f59d24>] ? __blkdev_put+0x840/0x840 [ 286.405295] [<00000000d757f321>] blkdev_get+0x2e8/0x920 [ 286.410794] [<0000000029f250f2>] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 286.417626] [<000000009a684d54>] ? bd_may_claim+0xd0/0xd0 [ 286.423276] [<00000000c11e281d>] ? bd_acquire+0x26/0x250 [ 286.428854] [<00000000f40b989e>] ? bd_acquire+0x88/0x250 [ 286.434404] [<00000000afd7ab2c>] ? _raw_spin_unlock+0x2d/0x50 [ 286.440401] [<000000008fc709e9>] blkdev_open+0x1aa/0x250 [ 286.445963] [<00000000c87e7682>] do_dentry_open+0x422/0xd20 [ 286.451740] [<00000000e25aa5e3>] ? blkdev_get_by_dev+0x80/0x80 [ 286.458012] [<00000000060ec9ff>] vfs_open+0x105/0x230 [ 286.463286] [<0000000004fa48fd>] ? may_open.isra.0+0x139/0x290 [ 286.469374] [<00000000e63a237f>] path_openat+0xbf5/0x2f60 [ 286.474997] [<0000000007a63dff>] ? path_mountpoint+0x6d0/0x6d0 [ 286.481608] [<00000000f95d2825>] do_filp_open+0x1a1/0x280 [ 286.487358] [<00000000e5b88685>] ? may_open_dev+0xe0/0xe0 [ 286.492982] [<00000000623d5a95>] ? __alloc_fd+0x1d4/0x490 [ 286.498660] [<00000000afd7ab2c>] ? _raw_spin_unlock+0x2d/0x50 [ 286.504629] [<00000000623d5a95>] ? __alloc_fd+0x1d4/0x490 [ 286.510381] [<0000000093ff0c15>] do_sys_open+0x2f0/0x610 [ 286.515956] [<000000009fb866bf>] ? filp_open+0x70/0x70 [ 286.521348] [<000000006565df24>] ? SyS_mkdirat+0x164/0x250 [ 286.527084] [<00000000258136cc>] ? SyS_mknod+0x40/0x40 [ 286.532445] [<00000000bbdbb118>] SyS_open+0x2d/0x40 [ 286.537837] [<00000000cbb723e0>] ? do_sys_open+0x610/0x610 [ 286.543631] [<00000000e1c257d7>] do_syscall_64+0x1ad/0x5c0 [ 286.549391] [<0000000000b61b73>] entry_SYSCALL_64_after_swapgs+0x5d/0xdb [ 286.556328] [ 286.556328] Showing all locks held in the system: [ 286.562640] 2 locks held by khungtaskd/24: [ 286.566879] #0: (rcu_read_lock){......}, at: [<00000000bbdcb12b>] watchdog+0x14b/0xaf0 [ 286.575608] #1: (tasklist_lock){.+.+..}, at: [<00000000dd90811f>] debug_show_all_locks+0x7f/0x21f [ 286.585352] 2 locks held by getty/2026: [ 286.589306] #0: (&tty->ldisc_sem){++++++}, at: [<0000000095fba39f>] ldsem_down_read+0x33/0x40 [ 286.598710] #1: (&ldata->atomic_read_lock){+.+...}, at: [<00000000747b9508>] n_tty_read+0x1fe/0x1820 [ 286.608707] 1 lock held by syz-executor.5/2173: [ 286.613351] #0: (&bdev->bd_mutex){+.+.+.}, at: [<000000001cab68ef>] __blkdev_get+0x10e/0xeb0 [ 286.622638] 1 lock held by syz-executor.2/2177: [ 286.627326] #0: (&bdev->bd_mutex){+.+.+.}, at: [<000000001cab68ef>] __blkdev_get+0x10e/0xeb0 [ 286.636619] 2 locks held by syz-executor.4/2183: [ 286.641349] #0: (&bdev->bd_mutex){+.+.+.}, at: [<000000001cab68ef>] __blkdev_get+0x10e/0xeb0 [ 286.650800] #1: (loop_index_mutex){+.+.+.}, at: [<000000003dc593e7>] lo_open+0x1d/0xb0 [ 286.659594] 2 locks held by syz-executor.3/3146: [ 286.664320] #0: (loop_index_mutex){+.+.+.}, at: [<000000005eb12333>] loop_control_ioctl+0x7a/0x320 [ 286.674136] #1: (&lo->lo_ctl_mutex#2){+.+.+.}, at: [<000000000dc181ab>] loop_control_ioctl+0x17f/0x320 [ 286.684916] 2 locks held by syz-executor.0/3158: [ 286.689722] #0: (&lo->lo_ctl_mutex/1){+.+.+.}, at: [<0000000031c34652>] lo_ioctl+0x8e/0x1b10 [ 286.699323] #1: (&bdev->bd_mutex){+.+.+.}, at: [<00000000c206bfeb>] blkdev_reread_part+0x1f/0x40 [ 286.708969] 2 locks held by blkid/3160: [ 286.713015] #0: (&bdev->bd_mutex){+.+.+.}, at: [<000000001cab68ef>] __blkdev_get+0x10e/0xeb0 [ 286.722313] #1: (loop_index_mutex){+.+.+.}, at: [<000000003dc593e7>] lo_open+0x1d/0xb0 [ 286.731156] 2 locks held by blkid/3161: [ 286.735102] #0: (&bdev->bd_mutex){+.+.+.}, at: [<000000001cab68ef>] __blkdev_get+0x10e/0xeb0 [ 286.744388] #1: (loop_index_mutex){+.+.+.}, at: [<000000003dc593e7>] lo_open+0x1d/0xb0 [ 286.753341] 2 locks held by blkid/3162: [ 286.757336] #0: (&bdev->bd_mutex){+.+.+.}, at: [<000000001cab68ef>] __blkdev_get+0x10e/0xeb0 [ 286.766674] #1: (loop_index_mutex){+.+.+.}, at: [<000000003dc593e7>] lo_open+0x1d/0xb0 [ 286.775438] 2 locks held by blkid/3164: [ 286.779410] #0: (&bdev->bd_mutex){+.+.+.}, at: [<000000001cab68ef>] __blkdev_get+0x10e/0xeb0 [ 286.788720] #1: (loop_index_mutex){+.+.+.}, at: [<000000003dc593e7>] lo_open+0x1d/0xb0 [ 286.797491] 1 lock held by syz-executor.1/3168: [ 286.802149] #0: (loop_index_mutex){+.+.+.}, at: [<000000005eb12333>] loop_control_ioctl+0x7a/0x320 [ 286.811947] [ 286.813549] ============================================= [ 286.813549] [ 286.820788] NMI backtrace for cpu 1 [ 286.824427] CPU: 1 PID: 24 Comm: khungtaskd Not tainted 4.9.194+ #0 [ 286.830823] ffff8801d98d7cc8 ffffffff81b67001 0000000000000001 0000000000000000 [ 286.838918] 0000000000000001 ffffffff81099d01 dffffc0000000000 ffff8801d98d7d00 [ 286.846948] ffffffff81b7229c 0000000000000001 0000000000000000 0000000000000001 [ 286.854970] Call Trace: [ 286.857601] [<000000008ce1eef4>] dump_stack+0xc1/0x120 [ 286.862944] [<000000009e67f8e0>] ? irq_force_complete_move+0x271/0x300 [ 286.869681] [<00000000903bcb96>] nmi_cpu_backtrace.cold+0x47/0x87 [ 286.876063] [<0000000026f1522a>] ? irq_force_complete_move+0x300/0x300 [ 286.882802] [<000000007cb7645e>] nmi_trigger_cpumask_backtrace+0x124/0x155 [ 286.889966] [<00000000ae4114b6>] arch_trigger_cpumask_backtrace+0x14/0x20 [ 286.897045] [<000000009e950e46>] watchdog+0x670/0xaf0 [ 286.902385] [<00000000bbdcb12b>] ? watchdog+0x14b/0xaf0 [ 286.907817] [<0000000069b97f9e>] ? trace_hardirqs_on_caller+0x385/0x5a0 [ 286.914833] [<00000000bbd780a1>] ? hungtask_pm_notify+0x60/0x60 [ 286.920995] [<000000007b42674e>] kthread+0x278/0x310 [ 286.926181] [<0000000098bdc3dc>] ? kthread_park+0xa0/0xa0 [ 286.931813] [<0000000029f250f2>] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 286.938645] [<000000006716c4bb>] ? _raw_spin_unlock_irq+0x39/0x60 [ 286.944957] [<00000000e572088d>] ? finish_task_switch+0x1e5/0x660 [ 286.951277] [<0000000061c45bc2>] ? finish_task_switch+0x1b7/0x660 [ 286.957608] [<0000000053f61931>] ? __switch_to_asm+0x41/0x70 [ 286.963480] [<00000000a8be0886>] ? __switch_to_asm+0x35/0x70 [ 286.969347] [<0000000053f61931>] ? __switch_to_asm+0x41/0x70 [ 286.975212] [<0000000098bdc3dc>] ? kthread_park+0xa0/0xa0 [ 286.980881] [<0000000098bdc3dc>] ? kthread_park+0xa0/0xa0 [ 286.986641] [<00000000e9990f42>] ret_from_fork+0x5c/0x70 [ 286.992405] Sending NMI from CPU 1 to CPUs 0: [ 286.996965] NMI backtrace for cpu 0 skipped: idling at pc 0xffffffff8282a0e1 [ 287.004175] Kernel panic - not syncing: hung_task: blocked tasks [ 287.010370] CPU: 1 PID: 24 Comm: khungtaskd Not tainted 4.9.194+ #0 [ 287.016765] ffff8801d98d7c60 ffffffff81b67001 ffff8801cba54700 ffffffff82a7b6c0 [ 287.024803] 00000000ffffffff 0000000000000001 dffffc0000000000 ffff8801d98d7d40 [ 287.032820] ffffffff813fef3a 0000000041b58ab3 ffffffff82e32f55 ffffffff813fed61 [ 287.041108] Call Trace: [ 287.043699] [<000000008ce1eef4>] dump_stack+0xc1/0x120 [ 287.049050] [<00000000cf337380>] panic+0x1d9/0x3bd [ 287.054061] [<00000000ba8fa79f>] ? add_taint.cold+0x16/0x16 [ 287.059845] [<0000000064c10708>] ? find_next_bit+0x44/0x50 [ 287.065548] [<0000000021335379>] ? printk_nmi_flush+0xae/0xd0 [ 287.071512] [<0000000026f1522a>] ? irq_force_complete_move+0x300/0x300 [ 287.078266] [<000000006b2b5360>] ? nmi_trigger_cpumask_backtrace+0xfc/0x155 [ 287.085438] [<000000009f4f6875>] watchdog+0x681/0xaf0 [ 287.090781] [<00000000bbdcb12b>] ? watchdog+0x14b/0xaf0 [ 287.096208] [<0000000069b97f9e>] ? trace_hardirqs_on_caller+0x385/0x5a0 [ 287.103027] [<00000000bbd780a1>] ? hungtask_pm_notify+0x60/0x60 [ 287.109163] [<000000007b42674e>] kthread+0x278/0x310 [ 287.114353] [<0000000098bdc3dc>] ? kthread_park+0xa0/0xa0 [ 287.120073] [<0000000029f250f2>] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 287.126810] [<000000006716c4bb>] ? _raw_spin_unlock_irq+0x39/0x60 [ 287.133135] [<00000000e572088d>] ? finish_task_switch+0x1e5/0x660 [ 287.139527] [<0000000061c45bc2>] ? finish_task_switch+0x1b7/0x660 [ 287.145828] [<0000000053f61931>] ? __switch_to_asm+0x41/0x70 [ 287.151686] [<00000000a8be0886>] ? __switch_to_asm+0x35/0x70 [ 287.157552] [<0000000053f61931>] ? __switch_to_asm+0x41/0x70 [ 287.163416] [<0000000098bdc3dc>] ? kthread_park+0xa0/0xa0 [ 287.169030] [<0000000098bdc3dc>] ? kthread_park+0xa0/0xa0 [ 287.174637] [<00000000e9990f42>] ret_from_fork+0x5c/0x70 [ 287.181414] Kernel Offset: disabled [ 287.185127] Rebooting in 86400 seconds..