Warning: Permanently added '10.128.1.29' (ECDSA) to the list of known hosts. 2019/04/30 14:29:00 fuzzer started 2019/04/30 14:29:03 dialing manager at 10.128.0.26:37709 2019/04/30 14:29:03 syscalls: 1359 2019/04/30 14:29:03 code coverage: enabled 2019/04/30 14:29:03 comparison tracing: CONFIG_KCOV_ENABLE_COMPARISONS is not enabled 2019/04/30 14:29:03 extra coverage: extra coverage is not supported by the kernel 2019/04/30 14:29:03 setuid sandbox: enabled 2019/04/30 14:29:03 namespace sandbox: enabled 2019/04/30 14:29:03 Android sandbox: /sys/fs/selinux/policy does not exist 2019/04/30 14:29:03 fault injection: kernel does not have systematic fault injection support 2019/04/30 14:29:03 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/04/30 14:29:03 net packet injection: enabled 2019/04/30 14:29:03 net device setup: enabled 14:30:02 executing program 0: syz_execute_func(&(0x7f0000000140)="f3e100def9575c8ac2c2c9734e424a2664f0ff06c4a279184fe238082e67660ec4a31d7c05da00000090e94d00c9c9c4625dbae5feabc4aba39ddf4507e50c420fae9972b57111470f188e00000000") syz_execute_func(&(0x7f0000000540)="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") 14:30:02 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89a0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000100)={[{0x2b, 'pids'}]}, 0x6) openat$cgroup_ro(r0, &(0x7f0000000200)='pids.events\x00', 0x0, 0x0) close(r1) 14:30:02 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x4) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000080)={'bridge0\x00\x00\x00\x00\t`P\x00', &(0x7f0000000100)=@ethtool_ringparam={0xd, 0x0, 0x0, 0x0, 0x2}}) 14:30:02 executing program 3: clone(0x403502001ff7, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f0000000140)="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") 14:30:02 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x1a0}]) 14:30:02 executing program 1: inotify_init1(0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) syz_execute_func(&(0x7f00000000c0)="c462653dce0fbdc52ecd8080020cc4e1ed64338a20d0d0f040839230f0f0002a6626f243e0ff0070e4c653fb0f458fbd27a95f5744be3c3b6446ddcb8f48508e307b8f69289bd19d670f381d6a2f67450f483bd1d97c7c63460f09616196c401fe5ff666410fd7cae1b1c402010804f466400f38f556f6892a009f") syzkaller login: [ 103.325946] audit: type=1400 audit(1556634605.073:5): avc: denied { associate } for pid=2102 comm="syz-executor.5" name="syz5" scontext=unconfined_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=filesystem permissive=1 [ 103.415130] hrtimer: interrupt took 34926 ns 14:30:05 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89a0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000100)={[{0x2b, 'pids'}]}, 0x6) openat$cgroup_ro(r0, &(0x7f0000000200)='pids.events\x00', 0x0, 0x0) close(r1) 14:30:05 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89a0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000100)={[{0x2b, 'pids'}]}, 0x6) openat$cgroup_ro(r0, &(0x7f0000000200)='pids.events\x00', 0x0, 0x0) close(r1) 14:30:05 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000080)={0x2, 'veth0\x00'}, 0x18) 14:30:05 executing program 2: syz_open_procfs(0x0, 0x0) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x29c) r0 = gettid() epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x1c9c380}, {0x0, 0x9}}, 0x0) write$P9_RRENAME(0xffffffffffffffff, 0x0, 0xfffffffffffffd75) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, 0x0) write$P9_RLOPEN(0xffffffffffffffff, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0xb7) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) tkill(r0, 0x1000000000016) 14:30:05 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89a0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000100)={[{0x2b, 'pids'}]}, 0x6) openat$cgroup_ro(r0, &(0x7f0000000200)='pids.events\x00', 0x0, 0x0) close(r1) [ 103.554809] syz-executor.0 calls setitimer() with new_value NULL pointer. Misfeature support will be removed 14:30:05 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89a0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000100)={[{0x2b, 'pids'}]}, 0x6) openat$cgroup_ro(r0, &(0x7f0000000200)='pids.events\x00', 0x0, 0x0) 14:30:06 executing program 0: syz_execute_func(&(0x7f0000000140)="f3e100def9575c8ac2c2c9734e424a2664f0ff06c4a279184fe238082e67660ec4a31d7c05da00000090e94d00c9c9c4625dbae5feabc4aba39ddf4507e50c420fae9972b57111470f188e00000000") syz_execute_func(&(0x7f0000000540)="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") 14:30:06 executing program 2: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123d319bd070") 14:30:06 executing program 1: inotify_init1(0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) syz_execute_func(&(0x7f00000000c0)="c462653dce0fbdc52ecd8080020cc4e1ed64338a20d0d0f040839230f0f0002a6626f243e0ff0070e4c653fb0f458fbd27a95f5744be3c3b6446ddcb8f48508e307b8f69289bd19d670f381d6a2f67450f483bd1d97c7c63460f09616196c401fe5ff666410fd7cae1b1c402010804f466400f38f556f6892a009f") 14:30:06 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89a0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz1\x00', 0x200002, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000100)={[{0x2b, 'pids'}]}, 0x6) 14:30:06 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x1a0}]) 14:30:06 executing program 3: syz_execute_func(&(0x7f00000002c0)="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") 14:30:06 executing program 1: inotify_init1(0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) syz_execute_func(&(0x7f00000000c0)="c462653dce0fbdc52ecd8080020cc4e1ed64338a20d0d0f040839230f0f0002a6626f243e0ff0070e4c653fb0f458fbd27a95f5744be3c3b6446ddcb8f48508e307b8f69289bd19d670f381d6a2f67450f483bd1d97c7c63460f09616196c401fe5ff666410fd7cae1b1c402010804f466400f38f556f6892a009f") 14:30:06 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89a0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000100)={[{0x2b, 'pids'}]}, 0x6) 14:30:06 executing program 1: inotify_init1(0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) syz_execute_func(&(0x7f00000000c0)="c462653dce0fbdc52ecd8080020cc4e1ed64338a20d0d0f040839230f0f0002a6626f243e0ff0070e4c653fb0f458fbd27a95f5744be3c3b6446ddcb8f48508e307b8f69289bd19d670f381d6a2f67450f483bd1d97c7c63460f09616196c401fe5ff666410fd7cae1b1c402010804f466400f38f556f6892a009f") [ 104.333197] FAT-fs (loop2): bogus number of reserved sectors [ 104.357972] FAT-fs (loop2): Can't find a valid FAT filesystem 14:30:06 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x16, 0x0, 0x0) 14:30:06 executing program 0: syz_execute_func(&(0x7f0000000140)="f3e100def9575c8ac2c2c9734e424a2664f0ff06c4a279184fe238082e67660ec4a31d7c05da00000090e94d00c9c9c4625dbae5feabc4aba39ddf4507e50c420fae9972b57111470f188e00000000") syz_execute_func(&(0x7f0000000540)="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") INIT: Id "4" respawning too fast: disabled for 5 minutes INIT: Id "2" respawning too fast: disabled for 5 minutes INIT: Id "3" respawning too fast: disabled for 5 minutes INIT: Id "1" respawning too fast: disabled for 5 minutes INIT: Id "6" respawning too fast: disabled for 5 minutes INIT: Id "5" respawning too fast: disabled for 5 minutes [ 285.925368] INFO: task syz-executor.5:2102 blocked for more than 140 seconds. [ 285.932829] Not tainted 4.9.171+ #49 [ 285.937206] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 285.945208] syz-executor.5 D24904 2102 1 0x00000004 [ 285.951193] ffff8801cefc8000 ffff8801a55b6e00 ffff8801db621000 ffff8801c3664740 [ 285.959326] ffff8801db621018 ffff8801b081fb28 ffffffff82801dde ffff8801cefc8000 [ 285.967413] ffff8801b081fc00 0000000000000046 ffff8801db6218f0 1ffff10036103f54 [ 285.975558] Call Trace: [ 285.978137] [<000000001b153adb>] ? __schedule+0x6ce/0x1f10 [ 285.984083] [<00000000d4842972>] ? io_schedule_timeout+0x390/0x390 [ 285.990564] [<000000005ac9d09b>] ? mark_held_locks+0xb1/0x100 [ 285.996579] [<00000000c1489218>] schedule+0x92/0x1c0 [ 286.001871] [<00000000c15915e1>] schedule_preempt_disabled+0x13/0x20 [ 286.008762] [<00000000bac66a8c>] mutex_lock_nested+0x38d/0x920 [ 286.015151] [<00000000c2d7a960>] ? lo_release+0x84/0x1b0 [ 286.020974] [<000000006ce8a00a>] ? mutex_trylock+0x3f0/0x3f0 [ 286.026923] [<00000000d83c0065>] ? __blkdev_put+0x219/0x840 [ 286.033003] [<00000000a355cfe8>] ? __blkdev_put+0x3c2/0x840 [ 286.038864] [<0000000026c84134>] ? loop_queue_work+0x2350/0x2350 [ 286.045101] [<00000000c2d7a960>] lo_release+0x84/0x1b0 [ 286.050540] [<0000000026c84134>] ? loop_queue_work+0x2350/0x2350 [ 286.056858] [<00000000354c1004>] __blkdev_put+0x461/0x840 [ 286.062484] [<000000002453c8e5>] ? trace_hardirqs_on_caller+0x385/0x5a0 [ 286.069374] [<00000000cc99f65e>] ? bd_set_size+0xb0/0xb0 [ 286.074916] [<00000000e636d851>] ? __ww_mutex_lock_interruptible+0x1530/0x1530 [ 286.082435] [<000000005aacd35b>] ? locks_remove_file+0x32f/0x430 [ 286.088680] [<00000000bfd76e94>] blkdev_put+0x88/0x560 [ 286.094023] [<00000000889cf8e7>] ? blkdev_put+0x560/0x560 [ 286.099684] [<0000000015d7735f>] blkdev_close+0x8b/0xb0 [ 286.105162] [<00000000ba41b2ed>] __fput+0x274/0x720 [ 286.110253] [<00000000e0f24c6d>] ____fput+0x16/0x20 [ 286.115582] [<00000000dfc55924>] task_work_run+0x108/0x180 [ 286.121383] [<00000000d27103c6>] exit_to_usermode_loop+0x13b/0x160 [ 286.127857] [<00000000318d703a>] do_syscall_64+0x3f7/0x570 [ 286.133568] [<000000002bf65b2a>] entry_SYSCALL_64_after_swapgs+0x5d/0xdb [ 286.140550] [ 286.140550] Showing all locks held in the system: [ 286.146981] 2 locks held by khungtaskd/24: [ 286.151195] #0: (rcu_read_lock){......}, at: [<000000006fb75122>] watchdog+0x14b/0xaf0 [ 286.160242] #1: (tasklist_lock){.+.+..}, at: [<00000000a330f9ff>] debug_show_all_locks+0x7f/0x21f [ 286.170033] 2 locks held by getty/2022: [ 286.173998] #0: (&tty->ldisc_sem){++++++}, at: [<00000000a9af461f>] ldsem_down_read+0x33/0x40 [ 286.183434] #1: (&ldata->atomic_read_lock){+.+...}, at: [<00000000f470072a>] n_tty_read+0x1fe/0x1820 [ 286.193494] 3 locks held by syz-executor.5/2102: [ 286.198286] #0: (&bdev->bd_mutex){+.+.+.}, at: [<00000000ac58b81b>] __blkdev_put+0xbb/0x840 [ 286.207516] #1: (loop_index_mutex){+.+.+.}, at: [<0000000064d50b15>] lo_release+0x1e/0x1b0 [ 286.216832] #2: (loop_ctl_mutex#2){+.+...}, at: [<00000000c2d7a960>] lo_release+0x84/0x1b0 [ 286.226177] 2 locks held by syz-executor.0/2109: [ 286.230914] #0: (&bdev->bd_mutex){+.+.+.}, at: [<000000003c8893c4>] __blkdev_get+0x10e/0xeb0 [ 286.240223] #1: (loop_index_mutex){+.+.+.}, at: [<00000000645e9eda>] lo_open+0x1d/0xb0 [ 286.249039] 2 locks held by syz-executor.3/2113: [ 286.253791] #0: (&bdev->bd_mutex){+.+.+.}, at: [<000000003c8893c4>] __blkdev_get+0x10e/0xeb0 [ 286.263424] #1: (loop_index_mutex){+.+.+.}, at: [<00000000645e9eda>] lo_open+0x1d/0xb0 [ 286.272286] 2 locks held by syz-executor.1/2114: [ 286.277148] #0: (&bdev->bd_mutex){+.+.+.}, at: [<000000003c8893c4>] __blkdev_get+0x10e/0xeb0 [ 286.286487] #1: (loop_index_mutex){+.+.+.}, at: [<00000000645e9eda>] lo_open+0x1d/0xb0 [ 286.295370] 1 lock held by syz-executor.2/3066: [ 286.300317] #0: (loop_ctl_mutex/1){+.+.+.}, at: [<00000000ffe4d248>] lo_ioctl+0x85/0x1a10 [ 286.309743] 2 locks held by syz-executor.2/3075: [ 286.314506] #0: (&bdev->bd_mutex){+.+.+.}, at: [<000000003c8893c4>] __blkdev_get+0x10e/0xeb0 [ 286.324136] #1: (loop_index_mutex){+.+.+.}, at: [<00000000645e9eda>] lo_open+0x1d/0xb0 [ 286.333031] 2 locks held by syz-executor.4/3067: [ 286.337878] #0: (loop_ctl_mutex/1){+.+.+.}, at: [<00000000ffe4d248>] lo_ioctl+0x85/0x1a10 [ 286.347202] #1: (&bdev->bd_mutex){+.+.+.}, at: [<00000000fa7ea442>] blkdev_reread_part+0x1f/0x40 [ 286.357056] 1 lock held by blkid/3070: [ 286.360942] #0: (loop_ctl_mutex/1){+.+.+.}, at: [<00000000ffe4d248>] lo_ioctl+0x85/0x1a10 [ 286.370238] 1 lock held by blkid/3071: [ 286.374115] #0: (loop_ctl_mutex/1){+.+.+.}, at: [<00000000ffe4d248>] lo_ioctl+0x85/0x1a10 [ 286.383479] 2 locks held by blkid/3077: [ 286.387500] #0: (&bdev->bd_mutex){+.+.+.}, at: [<000000003c8893c4>] __blkdev_get+0x10e/0xeb0 [ 286.396922] #1: (loop_index_mutex){+.+.+.}, at: [<00000000645e9eda>] lo_open+0x1d/0xb0 [ 286.405990] 1 lock held by blkid/3078: [ 286.410157] #0: (&bdev->bd_mutex){+.+.+.}, at: [<000000003c8893c4>] __blkdev_get+0x10e/0xeb0 [ 286.419596] [ 286.421234] ============================================= [ 286.421234] [ 286.428297] NMI backtrace for cpu 1 [ 286.432029] CPU: 1 PID: 24 Comm: khungtaskd Not tainted 4.9.171+ #49 [ 286.438732] ffff8801d98d7cc8 ffffffff81b4fb61 0000000000000001 0000000000000000 [ 286.446893] 0000000000000001 ffffffff81097501 dffffc0000000000 ffff8801d98d7d00 [ 286.455091] ffffffff81b5adfc 0000000000000001 0000000000000000 0000000000000001 [ 286.463142] Call Trace: [ 286.465747] [<000000000a14384b>] dump_stack+0xc1/0x120 [ 286.471215] [<000000007be4cfec>] ? irq_force_complete_move+0x2f1/0x300 [ 286.478247] [<000000001f2d20d9>] nmi_cpu_backtrace.cold+0x47/0x87 [ 286.484570] [<0000000026e7d8ea>] ? irq_force_complete_move+0x300/0x300 [ 286.491318] [<00000000e2c2cf01>] nmi_trigger_cpumask_backtrace+0x124/0x155 [ 286.498594] [<00000000776c54b4>] arch_trigger_cpumask_backtrace+0x14/0x20 [ 286.505809] [<0000000029519aa4>] watchdog+0x670/0xaf0 [ 286.511082] [<000000006fb75122>] ? watchdog+0x14b/0xaf0 [ 286.516521] [<000000002453c8e5>] ? trace_hardirqs_on_caller+0x385/0x5a0 [ 286.523564] [<000000002409ee86>] ? hungtask_pm_notify+0x60/0x60 [ 286.529823] [<00000000bd3e3d72>] kthread+0x278/0x310 [ 286.534999] [<000000006a36a4f9>] ? kthread_park+0xa0/0xa0 [ 286.540702] [<0000000018fd3c79>] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 286.547449] [<0000000061c52df9>] ? _raw_spin_unlock_irq+0x39/0x60 [ 286.553760] [<0000000095946b20>] ? finish_task_switch+0x1e5/0x660 [ 286.560268] [<00000000bb7414f7>] ? finish_task_switch+0x1b7/0x660 [ 286.566579] [<00000000fe25c283>] ? __switch_to_asm+0x34/0x70 [ 286.572446] [<00000000a047215b>] ? __switch_to_asm+0x40/0x70 [ 286.578323] [<00000000fe25c283>] ? __switch_to_asm+0x34/0x70 [ 286.584207] [<000000006a36a4f9>] ? kthread_park+0xa0/0xa0 [ 286.590022] [<000000006a36a4f9>] ? kthread_park+0xa0/0xa0 [ 286.595635] [<00000000c22fe376>] ret_from_fork+0x5c/0x70 [ 286.601297] Sending NMI from CPU 1 to CPUs 0: [ 286.605949] NMI backtrace for cpu 0 skipped: idling at pc 0xffffffff82810e52 [ 286.613158] Kernel panic - not syncing: hung_task: blocked tasks [ 286.619309] CPU: 1 PID: 24 Comm: khungtaskd Not tainted 4.9.171+ #49 [ 286.625792] ffff8801d98d7c60 ffffffff81b4fb61 ffff8801cefc8000 ffffffff82a79dc0 [ 286.634079] 00000000ffffffff 0000000000000001 dffffc0000000000 ffff8801d98d7d40 [ 286.642167] ffffffff813f96aa 0000000041b58ab3 ffffffff82e2efd2 ffffffff813f94d1 [ 286.650510] Call Trace: [ 286.653174] [<000000000a14384b>] dump_stack+0xc1/0x120 [ 286.658564] [<000000003232a195>] panic+0x1d9/0x3bd [ 286.663577] [<0000000091826235>] ? add_taint.cold+0x16/0x16 [ 286.669384] [<0000000026e7d8ea>] ? irq_force_complete_move+0x300/0x300 [ 286.676813] [<00000000b201a116>] ? ___preempt_schedule+0x16/0x18 [ 286.683225] [<00000000dd1493cb>] ? nmi_trigger_cpumask_backtrace+0x135/0x155 [ 286.690607] [<000000003e6ace37>] ? nmi_trigger_cpumask_backtrace+0x13f/0x155 [ 286.697983] [<000000002fe96361>] watchdog+0x681/0xaf0 [ 286.703614] [<000000006fb75122>] ? watchdog+0x14b/0xaf0 [ 286.709067] [<000000002453c8e5>] ? trace_hardirqs_on_caller+0x385/0x5a0 [ 286.716328] [<000000002409ee86>] ? hungtask_pm_notify+0x60/0x60 [ 286.722624] [<00000000bd3e3d72>] kthread+0x278/0x310 [ 286.727804] [<000000006a36a4f9>] ? kthread_park+0xa0/0xa0 [ 286.733613] [<0000000018fd3c79>] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 286.740422] [<0000000061c52df9>] ? _raw_spin_unlock_irq+0x39/0x60 [ 286.746942] [<0000000095946b20>] ? finish_task_switch+0x1e5/0x660 [ 286.753432] [<00000000bb7414f7>] ? finish_task_switch+0x1b7/0x660 [ 286.759836] [<00000000fe25c283>] ? __switch_to_asm+0x34/0x70 [ 286.765707] [<00000000a047215b>] ? __switch_to_asm+0x40/0x70 [ 286.771687] [<00000000fe25c283>] ? __switch_to_asm+0x34/0x70 [ 286.777773] [<000000006a36a4f9>] ? kthread_park+0xa0/0xa0 [ 286.783384] [<000000006a36a4f9>] ? kthread_park+0xa0/0xa0 [ 286.789049] [<00000000c22fe376>] ret_from_fork+0x5c/0x70 [ 286.795103] Kernel Offset: disabled [ 286.798807] Rebooting in 86400 seconds..