[....] Starting enhanced syslogd: rsyslogd[ 14.009286] audit: type=1400 audit(1568906268.766:4): avc: denied { syslog } for pid=1916 comm="rsyslogd" capability=34 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 [?25l[?1c7[ ok 8[?25h[?0c. Starting mcstransd: [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.43' (ECDSA) to the list of known hosts. 2019/09/19 15:18:23 fuzzer started 2019/09/19 15:18:25 dialing manager at 10.128.0.26:36419 2019/09/19 15:18:25 syscalls: 1336 2019/09/19 15:18:25 code coverage: enabled 2019/09/19 15:18:25 comparison tracing: CONFIG_KCOV_ENABLE_COMPARISONS is not enabled 2019/09/19 15:18:25 extra coverage: extra coverage is not supported by the kernel 2019/09/19 15:18:25 setuid sandbox: enabled 2019/09/19 15:18:25 namespace sandbox: enabled 2019/09/19 15:18:25 Android sandbox: /sys/fs/selinux/policy does not exist 2019/09/19 15:18:25 fault injection: kernel does not have systematic fault injection support 2019/09/19 15:18:25 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/09/19 15:18:25 net packet injection: enabled 2019/09/19 15:18:25 net device setup: enabled 15:18:49 executing program 0: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x9d, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_setup(0x4, &(0x7f00000002c0)=0x0) io_getevents(r0, 0x2, 0x2, &(0x7f0000000000)=[{}, {}], 0x0) io_destroy(r0) 15:18:49 executing program 5: dup(0xffffffffffffffff) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000300)={0x0, 'syz1\x00', 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xe0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00y\b\x8c\xfa3\x90\xc8\xde\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00K\xf7\xa42\x00', 'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x009\x10wP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00', &(0x7f00000000c0)=""/11, 0xb}, 0x11c) write$UHID_DESTROY(r0, &(0x7f0000000000), 0xfc90) 15:18:49 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000300)={0x0, 'syz1\x00', 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xe0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00y\b\x8c\xfa3\x90\xc8\xde\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00K\xf7\xa42\x00', 'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x009\x10wP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00', &(0x7f00000000c0)=""/11, 0xb}, 0x11c) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) 15:18:49 executing program 3: syz_open_dev$evdev(&(0x7f0000974fee)='/dev/input/event#\x00', 0x0, 0x0) 15:18:49 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vat\x00\x00\x00\x00\x00\x00\x00\xa8\x03\x00', 0x43732e5398416f1a}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r0, r1) 15:18:49 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000080)=0x9) r1 = syz_open_pts(r0, 0x0) ioctl$TCFLSH(r1, 0x540b, 0x1) syzkaller login: [ 76.031702] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 76.052652] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 76.062457] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 76.069755] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 76.078613] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 76.085767] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 76.093122] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 76.101706] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 76.109053] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 76.117515] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 76.125807] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 76.157063] hid-generic 0000:0000:0000.0001: hidraw0: HID v0.00 Device [syz1] on syz1 [ 76.212364] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 76.230690] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 76.244034] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 76.250768] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 15:18:51 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000002700)=[{&(0x7f00000001c0)="1fbbaa", 0x3}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/igmp\x00') preadv(r0, &(0x7f00000017c0), 0x315, 0x800000) bind$inet6(0xffffffffffffffff, 0x0, 0x0) [ 76.259079] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 76.265866] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 76.272568] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 76.279583] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 76.286355] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 76.295229] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 15:18:51 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ppoll(&(0x7f0000000100)=[{r0}], 0x1, 0x0, 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)) openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000080)=0x9) r1 = syz_open_pts(r0, 0x0) ioctl$TCFLSH(r1, 0x540b, 0x2) 15:18:51 executing program 5: dup(0xffffffffffffffff) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000300)={0x0, 'syz1\x00', 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xe0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00y\b\x8c\xfa3\x90\xc8\xde\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00K\xf7\xa42\x00', 'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x009\x10wP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00', &(0x7f00000000c0)=""/11, 0xb}, 0x11c) write$UHID_DESTROY(r0, &(0x7f0000000000), 0xfc90) [ 76.309562] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 76.327599] hid-generic 0000:0000:0000.0002: hidraw0: HID v0.00 Device [syz1] on syz1 [ 76.392122] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 76.404345] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 76.418973] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 76.429854] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 76.437150] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 76.445649] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 76.454959] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 76.461745] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 76.468789] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 76.475638] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 76.482913] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 15:18:51 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000002700)=[{&(0x7f00000001c0)="1fbbaa", 0x3}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/igmp\x00') preadv(r0, &(0x7f00000017c0), 0x315, 0x800000) add_key$keyring(&(0x7f0000000300)='keyring\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) [ 76.503305] hid-generic 0000:0000:0000.0003: hidraw0: HID v0.00 Device [syz1] on syz1 15:18:51 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vat\x00\x00\x00\x00\x00\x00\x00\xa8\x03\x00', 0x43732e5398416f1a}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(r0, r1) 15:18:51 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000002700)=[{&(0x7f00000001c0)="1fbbaa", 0x3}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/igmp\x00') preadv(r0, &(0x7f00000017c0), 0x315, 0x800000) add_key$keyring(&(0x7f0000000300)='keyring\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) [ 76.598614] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 76.627398] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 15:18:51 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8}) fsetxattr$security_evm(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2) pwritev(0xffffffffffffffff, &(0x7f0000000340), 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000640)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f00000001c0)="44bb1066648458bf8abbc74ba84cdc11551100782d", 0x15}, {&(0x7f0000000240)}], 0x2}, 0x0) [ 76.661926] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 76.678410] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 76.686954] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 76.696212] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 15:18:51 executing program 3: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_SET_TIME(r0, 0x7002, 0x0) [ 76.713874] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 76.720848] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 76.729581] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 76.739968] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 76.747525] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 15:18:51 executing program 1: r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) read(r0, 0x0, 0x0) 15:18:51 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vat\x00\x00\x00\x00\x00\x00\x00\xa8\x03\x00', 0x43732e5398416f1a}) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000040)={'veth0_to_team\x00', @dev}) [ 76.767000] hid-generic 0000:0000:0000.0004: hidraw0: HID v0.00 Device [syz1] on syz1 15:18:51 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8}) fsetxattr$security_evm(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000640)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f00000001c0)="44bb1066648458bf8abbc74ba84cdc11551100782da879f1c132ed6c803e9165b5d9ecb96ec20a0a2f", 0x29}, {&(0x7f0000000240)}], 0x2}, 0x0) 15:18:51 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) ioctl$TUNSETSNDBUF(r0, 0x400454d4, &(0x7f0000000040)=0x29e) 15:18:51 executing program 1: perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)) 15:18:51 executing program 0: 15:18:51 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000100), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = dup(r0) recvfrom$inet(r2, 0x0, 0x0, 0x10042, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(0x0, 0x10010000000035) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 15:18:51 executing program 1: r0 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8090, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='net/route\x00') preadv(r3, &(0x7f00000017c0), 0x33c, 0x0) 15:18:51 executing program 3: 15:18:51 executing program 2: 15:18:51 executing program 4: 15:18:51 executing program 3: 15:18:51 executing program 2: 15:18:51 executing program 4: 15:18:52 executing program 2: 15:18:52 executing program 3: 15:18:52 executing program 0: 15:18:52 executing program 4: 15:18:52 executing program 5: 15:18:52 executing program 1: 15:18:52 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000002700)=[{&(0x7f00000001c0)="1f", 0x1}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/igmp\x00') preadv(r0, &(0x7f00000017c0), 0x315, 0x800000) signalfd(0xffffffffffffffff, 0x0, 0x0) 15:18:52 executing program 2: 15:18:52 executing program 0: 15:18:52 executing program 4: 15:18:52 executing program 0: 15:18:52 executing program 2: clone(0x3103101ff7, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x4000001, 0x8031, 0xffffffffffffffff, 0x0) munmap(&(0x7f00000c9000/0x1000)=nil, 0x1000) openat$dir(0xffffffffffffff9c, 0x0, 0x4800, 0x91) 15:18:52 executing program 1: clone(0x84007bf7, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() mknod(&(0x7f0000000000)='./file0\x00', 0x100000114b, 0x0) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) ptrace(0x10, r0) creat(&(0x7f0000000140)='./file0\x00', 0x0) inotify_init1(0x0) ptrace(0x11, r0) 15:18:52 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_CLR_FD(r0, 0x4c01) 15:18:52 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet6(0xa, 0x3, 0x0) r0 = epoll_create1(0x0) epoll_pwait(r0, &(0x7f0000000080)=[{}], 0x1, 0x7fffffff, 0x0, 0x0) 15:18:52 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000006980)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000540)=""/11, 0x485) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet6(0xa, 0x2, 0x3) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, 0x0) 15:18:52 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000002700)=[{&(0x7f00000001c0)="1f", 0x1}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/igmp\x00') preadv(r0, &(0x7f00000017c0), 0x315, 0x800000) signalfd(0xffffffffffffffff, 0x0, 0x0) 15:18:52 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r2, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r2, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x0) 15:18:52 executing program 3: 15:18:52 executing program 2: 15:18:52 executing program 4: 15:18:52 executing program 1: r0 = socket(0x2, 0x3, 0x100000001) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, 0x0) 15:18:52 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc8fb47081025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd01e527e6fd3de45387da0200000000000000e89046e6033a61edb75c8d51c05dfaf7f4fdb16e0cdaa4276939a341033400", "7b8ddcc0c891591c4116893616105829576914e70bfed06d00f900040000b8a7"}) 15:18:52 executing program 3: mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000280)=""/11, 0xb) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$VT_SETMODE(r0, 0x5602, 0x0) open$dir(&(0x7f0000000240)='./file0\x00', 0x841, 0x0) 15:18:52 executing program 4: 15:18:52 executing program 1: 15:18:52 executing program 4: [ 77.784802] loop_reread_partitions: partition scan of loop0 (p|' $`BT՜G%ֳwfѬW:B [ 77.784802] |0aWj? β) failed (rc=-13) [ 77.834808] loop_reread_partitions: partition scan of loop0 () failed (rc=-13) 15:18:53 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="08dca50d5eb8cfe47bf070") r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) r2 = socket(0x400000000000010, 0x802, 0x0) write(r2, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) setsockopt$sock_int(r1, 0x1, 0x2c, &(0x7f0000001580)=0xc059, 0x4) 15:18:53 executing program 1: 15:18:53 executing program 0: 15:18:53 executing program 4: 15:18:53 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc8fb47081025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd01e527e6fd3de45387da0200000000000000e89046e6033a61edb75c8d51c05dfaf7f4fdb16e0cdaa4276939a341033400", "7b8ddcc0c891591c4116893616105829576914e70bfed06d00f900040000b8a7"}) 15:18:53 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r2 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(r2, &(0x7f0000000280)={0x1}, 0xff7f) r3 = open(&(0x7f0000000340)='./file0\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r3, 0x0) madvise(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x9) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000200)='threaded\x00', 0xf642e7e) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000200)={0x0, r2, 0x0, 0x0, 0x2}) 15:18:53 executing program 0: clone(0xa047fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() tkill(0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000180)=0x580, 0x4) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f00000003c0)=0x400, 0x4) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000000500)={0xa, 0x4e1d, 0x0, @loopback}, 0x1c) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x2000) 15:18:53 executing program 4: r0 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8090, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r2, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r2, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x0) 15:18:53 executing program 3: unshare(0x20000400) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f00000000c0)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r0, 0x0, 0xffffffffffffffff, 0xf) 15:18:53 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="08dca50d5eb8cfe47bf070") r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) r2 = socket(0x400000000000010, 0x802, 0x0) write(r2, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) setsockopt$sock_int(r1, 0x1, 0x2a, &(0x7f0000001580), 0x4) 15:18:53 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0401273, &(0x7f00000000c0)={[], 0x0, 0x2, 0x100003}) 15:18:53 executing program 1: mkdir(&(0x7f0000001c40)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000018ffa)='sysfs\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) 15:18:53 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="08dca50d5e0bcfe47bf070") r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) r2 = socket(0x400000000000010, 0x802, 0x0) write(r2, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f19", 0x22) setsockopt$inet_MCAST_MSFILTER(r1, 0x0, 0x29, &(0x7f0000000100)={0x0, {{0x2, 0x0, @remote}}}, 0x20000190) [ 78.553882] loop_reread_partitions: partition scan of loop0 (p|' $`BT՜G%ֳwfѬW:B [ 78.553882] |0aWj? β) failed (rc=-13) 15:18:53 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc8fb47081025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd01e527e6fd3de45387da0200000000000000e89046e6033a61edb75c8d51c05dfaf7f4fdb16e0cdaa4276939a341033400", "7b8ddcc0c891591c4116893616105829576914e70bfed06d00f900040000b8a7"}) 15:18:53 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000280)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0xc0406618, 0x0) 15:18:53 executing program 5: mkdir(&(0x7f0000000080)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x800000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lchown(&(0x7f0000000000)='./file1\x00', 0x0, 0x0) 15:18:53 executing program 4: mkdir(&(0x7f0000001c40)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000018ffa)='sysfs\x00', 0x0, 0x0) open(&(0x7f0000000100)='./file0/bus\x00', 0x0, 0x0) 15:18:53 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="08dca50d5eb8cfe47bf070") r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) r2 = socket(0x400000000000010, 0x802, 0x0) write(r2, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) setsockopt$sock_int(r1, 0x1, 0x2d, &(0x7f0000001580)=0xc059, 0x4) 15:18:53 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x19, &(0x7f0000000000)=0x1, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e21}, 0x1c) recvmsg(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x2000) ioctl$SIOCGSTAMPNS(r0, 0x8906, 0x0) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f0000000180)) 15:18:53 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000001a80)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGLCKTRMIOS(r0, 0x5456, &(0x7f0000000000)) ioctl$TIOCGLCKTRMIOS(0xffffffffffffffff, 0x5456, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCGLCKTRMIOS(0xffffffffffffffff, 0x5456, 0x0) ioctl$TIOCGLCKTRMIOS(0xffffffffffffffff, 0x5456, 0x0) 15:18:53 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="08dca50d5eb8cfe47bf070") r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) r2 = socket(0x400000000000010, 0x802, 0x0) write(r2, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba108008000200", 0x20) setsockopt$sock_int(r1, 0x1, 0xc, &(0x7f0000001580)=0xc059, 0x4) 15:18:53 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc8fb47081025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd01e527e6fd3de45387da0200000000000000e89046e6033a61edb75c8d51c05dfaf7f4fdb16e0cdaa4276939a341033400", "7b8ddcc0c891591c4116893616105829576914e70bfed06d00f900040000b8a7"}) [ 78.713853] loop_reread_partitions: partition scan of loop0 (p|' $`BT՜G%ֳwfѬW:B [ 78.713853] |0aWj? β) failed (rc=-13) 15:18:53 executing program 4: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x800002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'lo:\x05\xe6\r\x00\x00\x85\x01\x00\x00\x00\x10\x03\x00', {0x2, 0x0, @dev}}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8914, &(0x7f0000000140)={'lo:\x05\xe6\r\x00\x00\x85\x01\x00\x00\x00\x10\x03\x00', {0x2, 0x0, @empty}}) 15:18:53 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc8fb47081025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd01e527e6fd3de45387da0200000000000000e89046e6033a61edb75c8d51c05dfaf7f4fdb16e0cdaa4276939a341033400", "7b8ddcc0c891591c4116893616105829576914e70bfed06d00f900040000b8a7"}) 15:18:53 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="08dca50d5eb8cfe47bf070") r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, 0x0, 0x0) r2 = socket(0x400000000000010, 0x802, 0x0) write(r2, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) setsockopt$sock_int(r1, 0x1, 0x1b, &(0x7f0000001580)=0xc059, 0x4) 15:18:53 executing program 3: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x800002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'lo:\x05\xe6\r\x00\x00\x85\x01\x00\x00\x00\x10\x03\x00', {0x2, 0x0, @dev}}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8914, &(0x7f0000000140)={'lo:\x05\xe6\r\x00\x00\x85\x01\x00\x00\x00\x10\x03\x00', {0x2, 0x0, @empty}}) 15:18:53 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x1801}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x40000000000004) ppoll(0x0, 0x0, &(0x7f0000000140), 0x0, 0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffbb) lsetxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) ioctl$PPPIOCSCOMPRESS(0xffffffffffffffff, 0x4010744d) splice(r2, 0x0, r1, 0x0, 0x1000000000000003, 0x0) inotify_init1(0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, 0x0, 0xffffffffffffffbd) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$ASHMEM_SET_SIZE(0xffffffffffffffff, 0x40087703, 0x0) sendto$packet(r2, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) 15:18:53 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="08dca50d5eb8cfe47bf070") r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) r2 = socket(0x400000000000010, 0x802, 0x0) write(r2, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) setsockopt$sock_int(r1, 0x1, 0x2d, &(0x7f0000001580)=0xc059, 0x4) 15:18:53 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = creat(&(0x7f0000000000)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0) dup2(r0, r1) read$eventfd(r1, &(0x7f0000000140), 0x8) 15:18:53 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="08dca50d5eb8cfe47bf070") r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) r2 = socket(0x400000000000010, 0x802, 0x0) write(r2, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) setsockopt$sock_int(r1, 0x1, 0xa, &(0x7f0000001580), 0x4) INIT: Id "3" respawning too fast: disabled for 5 minutes INIT: Id "6" respawning too fast: disabled for 5 minutes INIT: Id "4" respawning too fast: disabled for 5 minutes INIT: Id "1" respawning too fast: disabled for 5 minutes INIT: Id "2" respawning too fast: disabled for 5 minutes INIT: Id "5" respawning too fast: disabled for 5 minutes [ 281.763990] INFO: task syz-executor.5:2118 blocked for more than 140 seconds. [ 281.771324] Not tainted 4.4.174+ #4 [ 281.775537] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 281.783790] syz-executor.5 D ffff8800b9167668 25168 2118 1 0x00000004 [ 281.791268] ffff8800b9167668 ffff8800ba220000 36e4d296891f7971 ffff8800ba220000 [ 281.799354] 0000000000000000 ffff8800ba220800 ffff8801db71f180 ffff8801db71f1a8 [ 281.807416] ffff8801db71e898 ffff8801d474c740 ffff8800ba220000 ffffed001722c001 [ 281.815495] Call Trace: [ 281.818068] [] schedule+0x99/0x1d0 [ 281.823236] [] schedule_preempt_disabled+0x13/0x20 [ 281.829939] [] mutex_lock_nested+0x3c2/0xb80 [ 281.836204] [] ? __blkdev_get+0x10c/0xdf0 [ 281.842006] [] ? get_disk+0xe0/0xe0 [ 281.847313] [] ? kobj_lookup+0x273/0x410 [ 281.853018] [] ? mutex_trylock+0x500/0x500 [ 281.858987] [] ? disk_block_events+0xc7/0x140 [ 281.865170] [] __blkdev_get+0x10c/0xdf0 [ 281.870788] [] ? __blkdev_put+0x840/0x840 [ 281.876625] [] ? trace_hardirqs_on+0x10/0x10 [ 281.882688] [] blkdev_get+0x2e8/0x920 [ 281.888168] [] ? bd_may_claim+0xd0/0xd0 [ 281.893808] [] ? bd_acquire+0x8a/0x370 [ 281.899334] [] ? _raw_spin_unlock+0x2d/0x50 [ 281.905618] [] blkdev_open+0x1aa/0x250 [ 281.911252] [] do_dentry_open+0x38f/0xbd0 [ 281.917242] [] ? __inode_permission2+0x9e/0x250 [ 281.923567] [] ? blkdev_get_by_dev+0x80/0x80 [ 281.929792] [] vfs_open+0x10b/0x210 [ 281.935083] [] ? may_open.isra.0+0xe7/0x210 [ 281.941038] [] path_openat+0x136f/0x4470 [ 281.946766] [] ? kasan_kmalloc.part.0+0xc6/0xf0 [ 281.953081] [] ? may_open.isra.0+0x210/0x210 [ 281.959169] [] ? trace_hardirqs_on+0x10/0x10 [ 281.965239] [] do_filp_open+0x1a1/0x270 [ 281.970850] [] ? trace_hardirqs_on+0x10/0x10 [ 281.977075] [] ? user_path_mountpoint_at+0x50/0x50 [ 281.983661] [] ? __alloc_fd+0x1ea/0x490 [ 281.989329] [] ? _raw_spin_unlock+0x2d/0x50 [ 281.995337] [] do_sys_open+0x2f8/0x600 [ 282.000879] [] ? mntput+0x66/0x90 [ 282.006087] [] ? filp_open+0x70/0x70 [ 282.011531] [] ? SyS_mkdirat+0x164/0x250 [ 282.017319] [] ? task_work_run+0x251/0x2b0 [ 282.023209] [] ? SyS_mknod+0x40/0x40 [ 282.028606] [] ? int_ret_from_sys_call+0x52/0xa3 [ 282.035028] [] ? trace_hardirqs_on_caller+0x385/0x5a0 [ 282.041866] [] SyS_open+0x2d/0x40 [ 282.047147] [] entry_SYSCALL_64_fastpath+0x1e/0x9a [ 282.053793] 1 lock held by syz-executor.5/2118: [ 282.058565] #0: (&bdev->bd_mutex){+.+.+.}, at: [] __blkdev_get+0x10c/0xdf0 [ 282.067979] Sending NMI to all CPUs: [ 282.071957] NMI backtrace for cpu 0 [ 282.075613] CPU: 0 PID: 20 Comm: khungtaskd Not tainted 4.4.174+ #4 [ 282.082011] task: ffff8801da6f4740 task.stack: ffff8800001d0000 [ 282.088083] RIP: 0010:[] [] flat_send_IPI_mask+0xf7/0x1b0 [ 282.096837] RSP: 0018:ffff8800001d7c88 EFLAGS: 00000046 [ 282.102263] RAX: 0000000000000000 RBX: 0000000000000c00 RCX: 0000000000000000 [ 282.109543] RDX: 0000000000000c00 RSI: 0000000000000000 RDI: ffffffffff5fc300 [ 282.116964] RBP: ffff8800001d7cb8 R08: 0000000000000018 R09: 0000000000000000 [ 282.125148] R10: 0000000000000001 R11: 0000000000000001 R12: 0000000000000246 [ 282.132433] R13: 0000000003000000 R14: ffffffff82e5f2e0 R15: 0000000000000002 [ 282.140868] FS: 0000000000000000(0000) GS:ffff8801db600000(0000) knlGS:0000000000000000 [ 282.149108] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 282.155023] CR2: 00007f515663f000 CR3: 00000000b925e000 CR4: 00000000001606b0 [ 282.162398] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 282.171463] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 282.178773] Stack: [ 282.180943] 0000000000000001 ffffffff82e5f2e0 ffffffff831a6ac0 fffffbfff0634c34 [ 282.188541] 000000000001b6c0 0000000000000008 ffff8800001d7cd8 ffffffff81092bee [ 282.196123] 0000000000000008 ffffffff82924260 ffff8800001d7d30 ffffffff81ab8252 [ 282.203650] Call Trace: [ 282.206272] [] nmi_raise_cpu_backtrace+0x5e/0x80 [ 282.212668] [] nmi_trigger_all_cpu_backtrace.cold+0xa1/0xae [ 282.220056] [] ? print_lock+0xa8/0xab [ 282.225516] [] ? irq_force_complete_move+0x330/0x330 [ 282.232256] [] arch_trigger_all_cpu_backtrace+0x14/0x20 [ 282.239290] [] watchdog.cold+0xd3/0xee [ 282.244834] [] ? watchdog+0xac/0xa00 [ 282.250349] [] ? reset_hung_task_detector+0x20/0x20 [ 282.257297] [] kthread+0x273/0x310 [ 282.262504] [] ? kthread_create_on_node+0x4c0/0x4c0 [ 282.269212] [] ? _raw_spin_unlock_irq+0x39/0x60 [ 282.275551] [] ? finish_task_switch+0x1e1/0x660 [ 282.281884] [] ? finish_task_switch+0x1b3/0x660 [ 282.288400] [] ? __schedule+0x7af/0x1ee0 [ 282.294118] [] ? __schedule+0x7a3/0x1ee0 [ 282.299808] [] ? __schedule+0x7af/0x1ee0 [ 282.305707] [] ? kthread_create_on_node+0x4c0/0x4c0 [ 282.312584] [] ret_from_fork+0x55/0x80 [ 282.318423] [] ? kthread_create_on_node+0x4c0/0x4c0 [ 282.325129] Code: 00 c3 5f ff 80 e6 10 75 e1 41 c1 e5 18 44 89 2c 25 10 c3 5f ff 44 89 fa 09 da 80 cf 04 41 83 ff 02 0f 44 d3 89 14 25 00 c3 5f ff <41> f7 c4 00 02 00 00 75 1e 4c 89 e7 57 9d 0f 1f 44 00 00 e8 f1 [ 282.344314] NMI backtrace for cpu 1 [ 282.347933] CPU: 1 PID: 0 Comm: swapper/1 Not tainted 4.4.174+ #4 [ 282.354178] task: ffff8801da6897c0 task.stack: ffff8801da698000 [ 282.360232] RIP: 0010:[] [] native_safe_halt+0x2/0x10 [ 282.369003] RSP: 0018:ffff8801da69fd88 EFLAGS: 00000246 [ 282.374666] RAX: 0000000000000007 RBX: ffffffff8319bf68 RCX: 0000000000000000 [ 282.381934] RDX: 0000000000000000 RSI: 0000000000000001 RDI: ffff8801da68a084 [ 282.389227] RBP: ffff8801da69fdb8 R08: 0000000000000000 R09: 0000000000000000 [ 282.396513] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000001 [ 282.403808] R13: ffff8801da6a0000 R14: dffffc0000000000 R15: ffff8801da698000 [ 282.411180] FS: 0000000000000000(0000) GS:ffff8801db700000(0000) knlGS:0000000000000000 [ 282.419710] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 282.425652] CR2: 0000000001ce2000 CR3: 00000000b925e000 CR4: 00000000001606b0 [ 282.432931] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 282.440218] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 282.447499] Stack: [ 282.449627] ffffffff81020b16 ffff8801da698000 0000000000000000 ffff8801da6a0000 [ 282.457162] dffffc0000000000 ffff8801da698000 ffff8801da69fdc8 ffffffff81022d50 [ 282.464704] ffff8801da69fde0 ffffffff811eb4c8 0000000000000000 ffff8801da69fea8 [ 282.472213] Call Trace: [ 282.474807] [] ? default_idle+0x56/0x3d0 [ 282.480504] [] arch_cpu_idle+0x10/0x20 [ 282.486086] [] default_idle_call+0x48/0x70 [ 282.491958] [] cpu_startup_entry+0x6d1/0x810 [ 282.498028] [] ? call_cpuidle+0xe0/0xe0 [ 282.503635] [] start_secondary+0x31d/0x410 [ 282.509535] [] ? set_cpu_sibling_map+0x10d0/0x10d0 [ 282.516120] Code: 2e 0f 1f 84 00 00 00 00 00 fa c3 0f 1f 40 00 66 2e 0f 1f 84 00 00 00 00 00 fb c3 0f 1f 40 00 66 2e 0f 1f 84 00 00 00 00 00 fb f4 0f 1f 00 66 2e 0f 1f 84 00 00 00 00 00 f4 c3 0f 1f 40 00 66 [ 282.535245] Kernel panic - not syncing: hung_task: blocked tasks [ 282.541395] CPU: 0 PID: 20 Comm: khungtaskd Not tainted 4.4.174+ #4 [ 282.547778] 0000000000000000 6bd734d4224fbd30 ffff8800001d7c60 ffffffff81aad1a1 [ 282.555798] ffff8800ba220000 ffffffff82872120 dffffc0000000000 0000000000000002 [ 282.563811] 00000000003fff9a ffff8800001d7d40 ffffffff813a48c2 0000000041b58ab3 [ 282.571837] Call Trace: [ 282.574404] [] dump_stack+0xc1/0x120 [ 282.579757] [] panic+0x1b9/0x37b [ 282.585010] [] ? add_taint.cold+0x16/0x16 [ 282.590794] [] ? find_next_bit+0x44/0x50 [ 282.596491] [] ? nmi_trigger_all_cpu_backtrace+0x3c6/0x490 [ 282.603753] [] ? nmi_trigger_all_cpu_backtrace+0x3c6/0x490 [ 282.611002] [] watchdog.cold+0xe4/0xee [ 282.616524] [] ? watchdog+0xac/0xa00 [ 282.621874] [] ? reset_hung_task_detector+0x20/0x20 [ 282.628705] [] kthread+0x273/0x310 [ 282.633897] [] ? kthread_create_on_node+0x4c0/0x4c0 [ 282.640546] [] ? _raw_spin_unlock_irq+0x39/0x60 [ 282.646850] [] ? finish_task_switch+0x1e1/0x660 [ 282.654899] [] ? finish_task_switch+0x1b3/0x660 [ 282.661550] [] ? __schedule+0x7af/0x1ee0 [ 282.667248] [] ? __schedule+0x7a3/0x1ee0 [ 282.672935] [] ? __schedule+0x7af/0x1ee0 [ 282.678631] [] ? kthread_create_on_node+0x4c0/0x4c0 [ 282.685277] [] ret_from_fork+0x55/0x80 [ 282.690809] [] ? kthread_create_on_node+0x4c0/0x4c0 [ 282.698147] Kernel Offset: disabled [ 282.701791] Rebooting in 86400 seconds..