[....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. Starting mcstransd: [....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[ 11.432277] random: sshd: uninitialized urandom read (32 bytes read) [?25l[?1c7[ ok 8[?25h[?0c. [ 11.514522] random: crng init done Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.54' (ECDSA) to the list of known hosts. 2019/04/14 08:57:41 fuzzer started 2019/04/14 08:57:44 dialing manager at 10.128.0.26:40753 2019/04/14 08:57:44 syscalls: 1359 2019/04/14 08:57:44 code coverage: enabled 2019/04/14 08:57:44 comparison tracing: CONFIG_KCOV_ENABLE_COMPARISONS is not enabled 2019/04/14 08:57:44 extra coverage: extra coverage is not supported by the kernel 2019/04/14 08:57:44 setuid sandbox: enabled 2019/04/14 08:57:44 namespace sandbox: enabled 2019/04/14 08:57:44 Android sandbox: /sys/fs/selinux/policy does not exist 2019/04/14 08:57:44 fault injection: kernel does not have systematic fault injection support 2019/04/14 08:57:44 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/04/14 08:57:44 net packet injection: enabled 2019/04/14 08:57:44 net device setup: enabled syzkaller login: INIT: Id "2" respawning too fast: disabled for 5 minutes INIT: Id "5" respawning too fast: disabled for 5 minutes INIT: Id "4" respawning too fast: disabled for 5 minutes INIT: Id "3" respawning too fast: disabled for 5 minutes INIT: Id "6" respawning too fast: disabled for 5 minutes INIT: Id "1" respawning too fast: disabled for 5 minutes 08:58:57 executing program 0: r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0xfff, 0x0, 0x6, 0x2}, {0x1f, 0x1000, 0x4, 0x1ff}, {0x5, 0x3, 0x6, 0xfff}]}) setsockopt$inet6_opts(r0, 0x29, 0x3f, &(0x7f00000000c0)=@routing={0x21, 0xc, 0x0, 0xffffffff00000001, 0x0, [@rand_addr="9dd2e099e8213d7ce13bbaded43ba327", @dev={0xfe, 0x80, [], 0x20}, @rand_addr="c5a0035d9d644833a43b3b9737a501bb", @initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local]}, 0x68) ioctl$FICLONERANGE(r0, 0x4020940d, &(0x7f0000000140)={r0, 0x0, 0x4, 0x2, 0x8}) ioctl$BLKGETSIZE64(r0, 0x80081272, &(0x7f0000000180)) getsockname$unix(r0, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) ioctl$EVIOCGVERSION(r0, 0x80044501, &(0x7f0000000280)=""/207) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r1, 0x400c6615, &(0x7f0000000380)) setsockopt$inet6_tcp_int(r0, 0x6, 0x5, &(0x7f00000003c0)=0x4, 0x4) fstat(r1, &(0x7f0000000400)) ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000480)) write$binfmt_elf64(r0, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xffffffff, 0xffffffff, 0x2, 0x3, 0x3, 0x3, 0x4, 0x1af, 0x40, 0x2da, 0x5e4, 0x6, 0x38, 0x2, 0xff, 0xf7e, 0x3}, [{0x7, 0x9453, 0xfffffffeffffffff, 0x20000000, 0x5, 0x9, 0x100000000, 0x20}], "4bbb2d522560becb126903beceec3cb034e7d91c5351057eb7b9ba42b17f2dc89253a7ce457d772c42249f9176a8e462c1a20c5ccf93f972e2161c83f1a9879c38bd58a3b5e3cf368f1ba9ad373ddd08160b3a2fce4ccf5055690ced7f215ca4509b6d20ee53c5ba27b4f53b90c95a63c78a9640bfcaf70be7a24eb36364e79d2e8b43193c2c209ae6cd5ad7e8cd", [[], [], [], [], [], [], [], [], [], []]}, 0xb06) arch_prctl$ARCH_GET_CPUID(0x1011) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000001000)={0x2e, @loopback, 0x4e21, 0x2, 'none\x00', 0x4, 0x1, 0x62}, 0x2c) getsockname$unix(r0, &(0x7f0000001040)=@abs, &(0x7f00000010c0)=0x6e) connect(r1, &(0x7f0000001100)=@pptp={0x18, 0x2, {0x1}}, 0x80) write$cgroup_type(r0, &(0x7f0000001180)='threaded\x00', 0x9) getsockopt$IP6T_SO_GET_REVISION_MATCH(r1, 0x29, 0x44, &(0x7f00000011c0)={'NETMAP\x00'}, &(0x7f0000001200)=0x1e) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000001240), &(0x7f0000001280)=0x8) ioctl$IOC_PR_PREEMPT_ABORT(r0, 0x401870cc, &(0x7f00000012c0)={0x20, 0xf74, 0x80000001, 0x3}) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000001300)={{0xa, 0x4e21, 0x2, @mcast1, 0xd8}, {0xa, 0x4e23, 0x7, @rand_addr="e283d3203561ca2b35614088c4691fb0", 0xffffffff}, 0x1, [0x7, 0x1, 0x1ed, 0xffffffffffff8000, 0x81, 0x401, 0xb6, 0x1]}, 0x5c) syz_genetlink_get_family_id$fou(&(0x7f0000001380)='fou\x00') getpeername$packet(r0, &(0x7f00000014c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001500)=0x14) sendmsg$nl_route(r0, &(0x7f0000001640)={&(0x7f00000013c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000001600)={&(0x7f0000001540)=@bridge_delneigh={0x90, 0x1d, 0x100, 0x70bd25, 0x25dfdbfc, {0x2, 0x0, 0x0, r2, 0x0, 0x11}, [@NDA_DST_IPV6={0x14, 0x1, @empty}, @NDA_CACHEINFO={0x14, 0x3, {0x9, 0x8, 0x100000, 0x6}}, @NDA_MASTER={0x8, 0x9, 0x7ff}, @NDA_VNI={0x8, 0x7, 0x40}, @NDA_DST_MAC={0xc, 0x1, @dev={[], 0x24}}, @NDA_DST_IPV4={0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, @NDA_DST_IPV6={0x14, 0x1, @mcast2}, @NDA_LINK_NETNSID={0x8, 0xa, 0x1}, @NDA_DST_MAC={0xc, 0x1, @remote}]}, 0x90}, 0x1, 0x0, 0x0, 0x1}, 0x8001) r3 = openat$cgroup_subtree(r0, &(0x7f0000001680)='cgroup.subtree_control\x00', 0x2, 0x0) bind(r1, &(0x7f00000016c0)=@vsock={0x28, 0x0, 0x2711, @host}, 0x80) ioctl$EXT4_IOC_GROUP_ADD(r3, 0x40286608, &(0x7f0000001740)={0x40, 0x0, 0x3, 0x401, 0x101, 0xd561}) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) ioctl$SIOCGSTAMP(r1, 0x8906, &(0x7f0000001780)) 08:58:57 executing program 5: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r1 = inotify_init() epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000040)={0x40000001}) inotify_add_watch(r0, &(0x7f0000000080)='./file0\x00', 0x100) r2 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$restrict_keyring(0x1d, r2, &(0x7f0000000140)='keyring\x00', &(0x7f0000000180)='&\x00') ioctl$IOC_PR_REGISTER(r0, 0x401870c8, &(0x7f00000001c0)={0x1, 0x5, 0x1}) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000200)={{0xa, 0x4e21, 0x6, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, {0xa, 0x4e20, 0x1000, @mcast1, 0x100000001}, 0x200, [0xf42f, 0xe83, 0x1, 0x9, 0xed50, 0xcd, 0x92, 0x81]}, 0x5c) r3 = openat$selinux_user(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/user\x00', 0x2, 0x0) r4 = dup(r1) seccomp(0x1, 0x0, &(0x7f0000000300)={0x4, &(0x7f00000002c0)=[{0x8, 0x4, 0x800, 0x2}, {0x2, 0x7fff000000000, 0xb6, 0x3ff}, {0x7, 0xffffffffffffff0b, 0x5, 0x80000000}, {0x7, 0x8a, 0x7}]}) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0, 0x0}, &(0x7f0000000380)=0xc) getgroups(0x4, &(0x7f00000003c0)=[0xee00, 0xee00, 0xee00, 0xee01]) setregid(r5, r6) ioctl$SIOCGSTAMP(r1, 0x8906, &(0x7f0000000400)) r7 = socket$inet_udplite(0x2, 0x2, 0x88) syz_extract_tcp_res(&(0x7f0000000440), 0x4, 0x100000000) fcntl$notify(r7, 0x402, 0x80000000) syz_extract_tcp_res$synack(&(0x7f0000000480), 0x1, 0x0) ioctl$sock_FIOGETOWN(r7, 0x8903, &(0x7f00000004c0)) setxattr$security_smack_entry(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='security.SMACK64EXEC\x00', &(0x7f0000000580)='/selinux/commit_pending_bools\x00', 0x1e, 0x3) ioctl$TIOCSISO7816(r4, 0xc0285443, &(0x7f00000005c0)={0x4, 0x40, 0x78d, 0xfffffffffffffffa, 0x3}) ioctl$IOC_PR_CLEAR(r4, 0x401070cd, &(0x7f0000000600)={0x4}) setsockopt$IP_VS_SO_SET_DELDEST(r7, 0x0, 0x488, &(0x7f0000000640)={{0x7f, @dev={0xac, 0x14, 0x14, 0xd}, 0x4e24, 0x2, 'lc\x00', 0x10, 0xef9, 0x4b}, {@multicast1, 0x4e21, 0x2, 0x1000, 0x7, 0xffffffffffffff6d}}, 0x44) getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f00000006c0)={{{@in=@multicast1, @in6=@empty}}, {{@in6=@local}, 0x0, @in=@remote}}, &(0x7f00000007c0)=0xe8) io_setup(0x0, &(0x7f0000000800)=0x0) io_submit(r8, 0x7, &(0x7f0000000e00)=[&(0x7f0000000900)={0x0, 0x0, 0x0, 0x5, 0x15a4, r1, &(0x7f0000000840)="597287d44eac9494b40735d3e8cd7f0af81c7e433c2dae5c83e2ab66f7884600f21b4a662a1d29d7913ef61152f1da516f5c00c6e31e0b1f42df9fd3697430c0bf235051efa42b282521e531f594d36f8f45b14a516d31c9c156170c9276e6b958c89ebb3a11dc0446c9975466ca2207c555fabddf22ee1ce9549b2027447455f57bc0224a4f5c3c4d613cd55ba7301b35dbfa4db08aaf3d4d17f8e2bed466c8fed88a2c98105ebc2391e6aab735f0e98096641f", 0xb4, 0xe234, 0x0, 0x1, r1}, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x1, 0x1, r0, &(0x7f0000000940)="66253f9ecc4afa1ff94a12fceb6038f000e5d99abcb38a528f28c8b574333c2dbf6c8944ed0d62a2b8cbb4443d5e2cfea707f68031b54ac93fce6cfab07c54291bf04e6e179f174515be2bc30e78227bc567e26fb73838aaaeeade65e6f2a527373f6690fe431d37adce521a5bde4f0afddaff42ae6ecedec822ec8e20f201c1b6fb087bed3cab57f6d99d215b811c0b0fe48c6e292ff9074fe1f5868970", 0x9e, 0x400, 0x0, 0x2, r1}, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x3, 0xa3f, r4, &(0x7f0000000a40)="77035b", 0x3, 0x5dc1, 0x0, 0x1, r0}, &(0x7f0000000b80)={0x0, 0x0, 0x0, 0x1, 0x80, r4, &(0x7f0000000ac0)="939c95536b939423835722a3448e9af1ab2e898eebac19d36fe9bd8f60fac430562418275719d430687936ec62fef1a200c50f24631b7dcfbbf789472bc7a84dd6719881d007a5e223dac4337b1ba70d829ca967139e2436db8bf94cbc319a4b914f46685edddf2df458ea024fbf7756eaf7eb0740d9eeaa8ae39eb2e23415963c4de8c13e6bd25d1fb01e3addb4e1e5c4f258e8f4e887869e45e2a122827f7b20d358bf3ef54c6c8e8033057cfe311a3f49863c6110b6db", 0xb8, 0xde1e, 0x0, 0x1, r4}, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x3, 0x4, r3, &(0x7f0000000bc0)="065efa76d15377", 0x7, 0x3ba7, 0x0, 0x1, r0}, &(0x7f0000000c80)={0x0, 0x0, 0x0, 0x3, 0x6, r3, &(0x7f0000000c40)="9c1809244fcc3b6f22124af85e70158ae3674fc7c8599a72044547e86c103658a6c797d8b304ea", 0x27, 0x3f, 0x0, 0x1}, &(0x7f0000000dc0)={0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, r3, &(0x7f0000000cc0)="71d3e778e4249d21770f1dd2111c5bb4c474473dccdaf9a3c3a04b7e381ba832eb953314e9605f7c1c55bbefe726873ba06ca8f553f92adab083ac0261aa0263adc510dabbb825cebe362424e8f294c5c099957a424f51ed17d956bcee06e624311fccc68c7fd7883b2db1f17f18b1cbb457553d3ce8657075afcd02dc401b7e0604b86acaa8c20b79eb0926a4af1ac9fb58d4831e908183244ebffce7287aeedaa3ce1041b0502fcb36f22b420d9e61fdcd55d87f21a8e1d821fc015305a0375917a1891bae40e3e451874c333d19fc9fcaa18c21e24ef0770c2a00", 0xdc, 0xfff, 0x0, 0x1, r0}]) openat$urandom(0xffffffffffffff9c, &(0x7f0000000e40)='/dev/urandom\x00', 0x222000, 0x0) connect(r0, &(0x7f0000000e80)=@pppoe={0x18, 0x0, {0x1, @dev={[], 0x20}, 'gre0\x00'}}, 0x80) linkat(r4, &(0x7f0000000f00)='./file0\x00', r4, &(0x7f0000000f40)='./file0\x00', 0x1000) 08:58:57 executing program 1: r0 = add_key(&(0x7f0000000000)='pkcs7_test\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="dd288dd39695ce635057c047cf10cd99ee9895c00c804d53af8f89292ad079f3f8795297631ac3af5f638b9e7fbf8103c0075ff24b2f63e9846ce5013e7976c9cf95ece5ffeabec3b3e598a9a1931e", 0x4f, 0xfffffffffffffffe) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000100)={r0, 0xfffffffffffffff8, 0x8000}, &(0x7f0000000140)={'enc=', 'pkcs1', ' hash=', {'wp384\x00'}}, &(0x7f00000001c0)="b5c66eb9236edbee3ccaa262a4", &(0x7f0000000200)=""/42) pipe2(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f0000000280)) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000002c0)={r2, 0x0, 0x1, 0x1ff, 0x2}) ioctl$sock_inet_SIOCSIFNETMASK(r1, 0x891c, &(0x7f0000000300)={'bridge_slave_1\x00', {0x2, 0x4e20, @local}}) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000340)=0x6) r3 = getpgrp(0x0) sched_setparam(r3, &(0x7f0000000380)=0xfffffffffffffff9) r4 = syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000440)={{{@in=@multicast2, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000540)=0xe8) accept4$packet(r2, &(0x7f0000000580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000005c0)=0x14, 0x80000) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000600)={{{@in6=@ipv4, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@broadcast}}, &(0x7f0000000700)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000740)={{{@in=@broadcast, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6}}, &(0x7f0000000840)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000001900)={'team0\x00', 0x0}) getpeername$packet(r2, &(0x7f0000001bc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001c00)=0x14) getsockopt$inet6_mreq(r2, 0x29, 0x15, &(0x7f0000001c40)={@rand_addr, 0x0}, &(0x7f0000001c80)=0x14) r12 = accept4$packet(r1, &(0x7f0000001cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001d00)=0x14, 0x80800) getpeername(r1, &(0x7f0000001d40)=@hci={0x1f, 0x0}, &(0x7f0000001dc0)=0x80) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000003340)={'team0\x00', 0x0}) accept$packet(r1, &(0x7f0000003400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000003440)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000003480)={'team0\x00', 0x0}) accept$packet(r1, &(0x7f00000034c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000003500)=0x14) accept4$packet(r1, &(0x7f0000003540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000003580)=0x14, 0x80000) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000003700)={{{@in6=@local, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@dev}}, &(0x7f0000003800)=0xe8) sendmsg$TEAM_CMD_OPTIONS_SET(r2, &(0x7f0000003d40)={&(0x7f00000003c0), 0xc, &(0x7f0000003d00)={&(0x7f0000003840)={0x4a8, r4, 0xa04, 0x70bd2b, 0x25dfdbfd, {}, [{{0x8, 0x1, r5}, {0xf4, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r6}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x800}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0xfffffffffffff6a2}}}, {0x44, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x14, 0x4, [{0x7, 0x2, 0x7ff, 0x6}, {0x81, 0x6, 0x14, 0xfffffffffffffff8}]}}}]}}, {{0x8, 0x1, r7}, {0x210, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r8}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r9}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r10}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r11}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x2}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r13}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r14}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0xbe}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x400}}}]}}, {{0x8, 0x1, r15}, {0x134, 0x2, [{0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r16}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r17}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r18}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x800}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x5}}, {0x8, 0x6, r19}}}]}}, {{0x8, 0x1, r20}, {0x3c, 0x2, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x81}}}]}}]}, 0x4a8}, 0x1, 0x0, 0x0, 0x8005}, 0x8040) add_key(&(0x7f0000003d80)='dns_resolver\x00', &(0x7f0000003dc0)={'syz', 0x3}, &(0x7f0000003e00)="7b911021567778228e6bf2c307e16eae787588bff8c2988b373d65962ed1dcf8eef730417f94de98cfc713ec33b87d0eed508717a7672e40fcbd3c5470e9b404a4d48683901489bf3d337ce632a40054b167eeb24f0e5eee7413329960e82e9e6561c2880ca4a8f47064502896af426796e673bd9f513e9ce0855ddfa2548c3c48", 0x81, r0) fadvise64(r1, 0x0, 0x3ff, 0x1) setsockopt$packet_rx_ring(r12, 0x107, 0x5, &(0x7f0000003ec0)=@req={0x0, 0x5, 0x24cb, 0x3}, 0x10) ioctl$UI_DEV_CREATE(r2, 0x5501) 08:58:57 executing program 2: 08:58:57 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = eventfd2(0x0, 0x0) ioctl$PIO_SCRNMAP(r0, 0x4b41, 0x0) 08:58:57 executing program 4: [ 129.007772] audit: type=1400 audit(1555232339.606:5): avc: denied { associate } for pid=2121 comm="syz-executor.5" name="syz5" scontext=unconfined_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=filesystem permissive=1 08:58:59 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x50000}]}) recvfrom(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x120, &(0x7f0000000200)=@un=@file={0x0, './file0\x00'}, 0x80) 08:58:59 executing program 1: clone(0x4107, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = gettid() futex(&(0x7f0000000040)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x14) ptrace$cont(0x18, r1, 0x0, 0x2) 08:58:59 executing program 5: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) chdir(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x602200, 0x4, 0x4002011, r1, 0x0) [ 129.159681] audit: type=1400 audit(1555232339.756:6): avc: denied { create } for pid=2984 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 08:58:59 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9]}, 0x4}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@routing={0x0, 0x4, 0x0, 0x0, 0x0, [@mcast1, @loopback]}, 0x28) sendmmsg(r0, &(0x7f0000005fc0), 0x8000000000000fc, 0x0) [ 129.218986] audit: type=1400 audit(1555232339.816:7): avc: denied { write } for pid=2984 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 08:58:59 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x13, 0x5d}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r1, 0x0, 0xe, 0x0, &(0x7f0000000380)="263abd030e981f000000106688a8", 0x0, 0x1200}, 0x28) dup2(r0, r1) [ 129.302863] hrtimer: interrupt took 41954 ns 08:58:59 executing program 0: bind(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3e}) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) fcntl$setsig(0xffffffffffffffff, 0xa, 0x0) 08:59:00 executing program 4: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r1 = openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) write$evdev(r0, &(0x7f0000000600)=[{{0x0, 0x7530}}], 0x18) prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) stat(0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x1000f4) r2 = open(&(0x7f0000000180)='./bus\x00', 0x4000, 0x0) timerfd_settime(r2, 0x1, &(0x7f0000000000)={{}, {0x77359400}}, &(0x7f0000000240)) sendfile(r0, r2, 0x0, 0x8000fffffffe) lstat(&(0x7f0000000200)='./bus\x00', &(0x7f0000000380)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000740)) fstat(r1, &(0x7f00000002c0)) ioctl$sock_inet_SIOCDELRT(r2, 0x890c, 0x0) 08:59:00 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000240)=""/117, 0x446) [ 129.388097] audit: type=1400 audit(1555232339.956:8): avc: denied { prog_load } for pid=3034 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 08:59:00 executing program 3: socket(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup3(0xffffffffffffffff, r0, 0x0) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x1b) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) ptrace$cont(0x18, r2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3e}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) fcntl$setsig(r1, 0xa, 0x0) [ 129.502558] audit: type=1400 audit(1555232340.096:9): avc: denied { prog_run } for pid=3034 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 08:59:00 executing program 2: 08:59:00 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003840)=[{{0x0, 0x0, &(0x7f0000002b80)=[{&(0x7f0000001880)=""/190, 0xbe}], 0x100000000000021f}}], 0x400000000000098, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') preadv(r1, &(0x7f00000017c0), 0x1d0, 0x0) 08:59:00 executing program 1: 08:59:00 executing program 4: 08:59:00 executing program 1: 08:59:00 executing program 5: 08:59:00 executing program 2: r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000000000)=ANY=[]) add_key(&(0x7f0000000380)='rxrpc_s\x00', 0x0, &(0x7f0000000540), 0x0, 0xfffffffffffffffb) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/loop-control\x00', 0x20000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) timer_getoverrun(0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, &(0x7f0000000680), 0x0, 0x3) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001a00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000019c0)=""/61, 0x3d}}], 0x1, 0x0, 0x0) 08:59:00 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x13, 0x5d}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r1, 0x0, 0xe, 0x0, &(0x7f0000000380)="263abd030e981f000000106688a8", 0x0, 0x1200}, 0x28) dup2(r0, r1) 08:59:00 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, 0x0, 0x278) r1 = accept$inet(0xffffffffffffff9c, 0x0, &(0x7f0000000140)) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000000)="554d8c4a1400192340834f80399b21c564ddc307c24cf47b5f6255c07eb8562cc597847645485ff0f85bcfacee694d5b4a7cc98911e76ad0b207551b498f690ac57cb796387488335f7426fda9174cc52a9ce488ef70c82f67698e0c7d1b99c9171925f1c5", 0x65}], 0x1) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(r1, 0x0, 0x42, &(0x7f0000000100)={'HL\x00'}, &(0x7f0000000180)=0x1e) sendmsg(0xffffffffffffffff, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)}, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x40000000, 0x0) getsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f00000001c0), &(0x7f0000000200)=0x4) getpgid(0xffffffffffffffff) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/net/pfkey\x00', 0xc0000, 0x0) unshare(0x40000000) listen(r1, 0x7ff) 08:59:00 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000180)={0x20080522}, &(0x7f00000001c0)) setresuid(0x0, 0xee01, 0x0) 08:59:00 executing program 3: 08:59:00 executing program 3: 08:59:00 executing program 3: 08:59:00 executing program 4: unshare(0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f00000002c0)='./file0\x00') perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) ioctl$KDSKBLED(0xffffffffffffffff, 0x4b65, 0x1) ioctl$RTC_UIE_OFF(r0, 0x7004) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x602200, 0x4, 0x4002011, r1, 0x0) 08:59:00 executing program 1: 08:59:00 executing program 1: 08:59:00 executing program 5: 08:59:00 executing program 3: 08:59:00 executing program 2: 08:59:00 executing program 1: r0 = socket(0x1, 0x1, 0x0) dup(0xffffffffffffffff) setsockopt$inet_msfilter(r0, 0x0, 0x29, 0x0, 0x135) 08:59:00 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, 0x0, 0x278) r1 = accept$inet(0xffffffffffffff9c, 0x0, &(0x7f0000000140)) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000000)="554d8c4a1400192340834f80399b21c564ddc307c24cf47b5f6255c07eb8562cc597847645485ff0f85bcfacee694d5b4a7cc98911e76ad0b207551b498f690ac57cb796387488335f7426fda9174cc52a9ce488ef70c82f67698e0c7d1b99c9171925f1c5", 0x65}], 0x1) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(r1, 0x0, 0x42, &(0x7f0000000100)={'HL\x00'}, &(0x7f0000000180)=0x1e) sendmsg(0xffffffffffffffff, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)}, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x40000000, 0x0) getsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f00000001c0), &(0x7f0000000200)=0x4) getpgid(0xffffffffffffffff) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/net/pfkey\x00', 0xc0000, 0x0) unshare(0x40000000) listen(r1, 0x7ff) 08:59:00 executing program 5: 08:59:00 executing program 1: 08:59:00 executing program 3: 08:59:00 executing program 2: 08:59:00 executing program 2: 08:59:00 executing program 5: 08:59:00 executing program 3: 08:59:00 executing program 4: 08:59:00 executing program 1: 08:59:00 executing program 2: 08:59:00 executing program 5: 08:59:01 executing program 0: openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/loop-control\x00', 0x20000, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) timer_getoverrun(0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, &(0x7f0000000680), 0x0, 0x3) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 08:59:01 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003840)=[{{0x0, 0x0, &(0x7f0000002b80)=[{&(0x7f0000001880)=""/190, 0xbe}], 0x100000000000021f}}], 0x400000000000098, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/protocols\x00') preadv(r0, &(0x7f00000017c0), 0x1d0, 0x0) 08:59:01 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000280)="5244534b289f69e841c18e691746f3aa26f2bac57c7e9c17518d1e44b782736dd564b1fd09c2644daa36fb9635301a232b2e6add2a589857455682d521fc0fae0cd26876b0ec3b79330e0f9a862e8c6902fce7ea6ea3edf7c3fe33c9e65b6c26ea3a6b41a9a3e5a0a4abf02849787d07e9b81e0cbc19fdef0bd8900e2d21bdb3be273bd664f53462ff8af58b4a1f9bbf0e2d526647e2bf8f29bfdf667a71092bdbf07ad44d0d168a095fb8f0da41264018bbd41140f9a2106d413de799e570a9e65236007b04ba224288efc8922fa720cee5945768bb8bdce0ad1fb93ba197f014798b82e7d92f264822b60e0400000014ca167dc56324005e027611b0055a1e0d9ffd953cf171dacb9c645b1e743a005550000c3d8282cf3c0fe0df0bb8ed2c4eb40ea0240d28d40e759d885674d309352a8a2721bf78a5bc052f6b0e8124ab8190dbdfadc55c3c6f00020000442d64bea80cf17ead7d05235a2bc9fbaa46c008933e6648120ed1279350c9d54ab491d01c22bbdf6f82a5cdce76a35c8b88e5f640a25f0f44d91fa804df24745858e2a707e738b5500f03dd28d89572c42eb6ec80014616440b24bcf4b783c1f0db3a8663ff06e45ca85f51ae17dce0e1b95df6fb0167561c0c8dbbc1b91613a7c8ae100609631ccf7232421936b37955a58691d91c281370f9af221f88309d8bfc14ae6013c315d7ef7b7cd5bf7d85c6cc66ed994900"/525, 0x20d, 0x2}]) 08:59:01 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) write$eventfd(r0, 0x0, 0x0) 08:59:01 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x9a, 0x0, 0x0, 0x6b, 0xa, 0xff00}}, 0x0, 0x7, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 08:59:01 executing program 5: socket(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup3(0xffffffffffffffff, r0, 0x0) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x1b) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) ioctl$EVIOCGMASK(r1, 0x80104592, 0x0) ptrace$cont(0x18, r2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3e}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) socket$inet6(0xa, 0x3, 0x0) 08:59:01 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0x5, 0x30000000, 0x0, 0x0, 0x2, 0x4d}}, &(0x7f0000003ff6)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 08:59:01 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='cgroup2\x00', 0x0, 0x0) 08:59:01 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="480000001400199009004b0101048c01010000ebbd2e2ab95c450000632379eb000000000000551f5f0028213ee20607000000000000003f666674a8ffff00c7e5ed5e00000000c8", 0x48}], 0x1) 08:59:01 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000080)="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", 0x1f6, 0xa}]) 08:59:01 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$evdev(&(0x7f0000000180)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGBITKEY(r1, 0x80404521, &(0x7f00000001c0)=""/4096) 08:59:01 executing program 0: r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETTXFILTER(r0, 0x400454d1, 0x0) add_key$keyring(&(0x7f00000002c0)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000380)='rxrpc_s\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/loop-control\x00', 0x20000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) timer_getoverrun(0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) geteuid() recvmmsg(0xffffffffffffffff, &(0x7f0000001a00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000019c0)=""/61, 0x3d}}], 0x1, 0x0, 0x0) 08:59:01 executing program 3: madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x0, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @empty}}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) io_setup(0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffff9c, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000340), &(0x7f00000003c0)=0x40) clone(0x8102000, 0x0, 0x0, 0x0, 0x0) 08:59:01 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="050000000f0000006b0a00ff0000000095000000000000006455a7a811e31f43fea07fd3a61a44f371f14ccc617928b647875f7f9c82d0a90b682883ea6564a2f9ae52d540037b83bf9b662b9e25478172d961a6425bde7596c46d63e29bf154e2291436223d51dc6028acde5e5da919bce0e9ef6cb3abf7269770b765cea683b364d5636d8f84fe8076f5818fe1d35ccf7fd5e5885da63808c2c6032fcddc9b"], 0x0, 0x7, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 08:59:01 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x580, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000b85fe4)={0xa, 0x4e24, 0x0, @loopback}, 0x1c) recvmsg(r0, &(0x7f0000000340)={0x0, 0x35a, 0x0}, 0x2164) 08:59:01 executing program 2: r0 = socket(0x0, 0x0, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x79) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x0) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x1b) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) ioctl$EVIOCGMASK(r2, 0x80104592, 0x0) ptrace$cont(0x18, r3, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3e}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r3, 0x0, 0x0) fcntl$setsig(r2, 0xa, 0x0) socket$inet6(0xa, 0x0, 0x0) 08:59:04 executing program 5: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000004000/0x4000)=nil, 0xa07000, 0x0, 0x32, 0xffffffffffffffff, 0x0) [ 286.050967] INFO: task syz-executor.1:2115 blocked for more than 140 seconds. [ 286.058458] Not tainted 4.9.168+ #40 [ 286.062847] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 286.071232] syz-executor.1 D25272 2115 1 0x00000004 [ 286.076977] ffff8801d1cd8000 0000000000000000 ffff8801db621000 ffffffff83031180 [ 286.085111] ffff8801db621018 ffff8801ad85f688 ffffffff8280028e ffff8801d1cd8000 [ 286.093220] ffffffff841f18c0 00ff8801ad85f5e8 ffff8801db6218f0 1ffff10035b0bec0 [ 286.101290] Call Trace: [ 286.103880] [<0000000020f985c4>] ? __schedule+0x6ce/0x1f10 [ 286.109691] [<000000000cfce8fc>] ? io_schedule_timeout+0x390/0x390 [ 286.116157] [<0000000042183159>] ? mark_held_locks+0xb1/0x100 [ 286.122196] [<000000004a04f7b8>] schedule+0x92/0x1c0 [ 286.127406] [<0000000046a43754>] schedule_preempt_disabled+0x13/0x20 [ 286.134663] [<000000005a073bba>] mutex_lock_nested+0x38d/0x920 [ 286.140897] [<00000000d017b8c3>] ? lo_open+0x1d/0xb0 [ 286.146094] [<000000007463b6dc>] ? mutex_trylock+0x3f0/0x3f0 [ 286.152065] [<0000000030ca2734>] ? disk_get_part+0x158/0x2c0 [ 286.158080] [<000000001dd45308>] ? loop_unregister_transfer+0x90/0x90 [ 286.164916] [<00000000d017b8c3>] lo_open+0x1d/0xb0 [ 286.169967] [<00000000edadce5e>] __blkdev_get+0x268/0xeb0 [ 286.175684] [<00000000d9c8e98e>] ? __blkdev_put+0x840/0x840 [ 286.181539] [<000000008ada6357>] blkdev_get+0x2e8/0x920 [ 286.187078] [<000000007f6e7760>] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 286.193922] [<00000000c1828065>] ? bd_may_claim+0xd0/0xd0 [ 286.199569] [<00000000035191bb>] ? bd_acquire+0x26/0x250 [ 286.205213] [<0000000066140284>] ? bd_acquire+0x88/0x250 [ 286.210747] [<0000000041942ac9>] ? _raw_spin_unlock+0x2d/0x50 [ 286.216793] [<00000000168b4641>] blkdev_open+0x1aa/0x250 [ 286.222498] [<00000000d32ee3bc>] do_dentry_open+0x422/0xd20 [ 286.228298] [<000000003e7446b9>] ? blkdev_get_by_dev+0x80/0x80 [ 286.234423] [<00000000be054912>] vfs_open+0x105/0x230 [ 286.239703] [<000000009b343912>] ? may_open.isra.0+0x139/0x290 [ 286.245947] [<000000004964cc2a>] path_openat+0xbf5/0x2f60 [ 286.251617] [<0000000072657dd0>] ? path_mountpoint+0x6d0/0x6d0 [ 286.257691] [<00000000f83d306d>] do_filp_open+0x1a1/0x280 [ 286.263471] [<0000000046373e64>] ? may_open_dev+0xe0/0xe0 [ 286.269113] [<000000000620c7c7>] ? __alloc_fd+0x1d4/0x490 [ 286.274814] [<0000000041942ac9>] ? _raw_spin_unlock+0x2d/0x50 [ 286.280836] [<000000000620c7c7>] ? __alloc_fd+0x1d4/0x490 [ 286.286579] [<00000000290453a1>] do_sys_open+0x2f0/0x610 [ 286.292236] [<0000000021280480>] ? filp_open+0x70/0x70 [ 286.297620] [<00000000be9e9297>] ? SyS_mkdirat+0x164/0x250 [ 286.303618] [<000000005c624617>] ? SyS_mknod+0x40/0x40 [ 286.309026] [<00000000df6e2f10>] SyS_open+0x2d/0x40 [ 286.314350] [<000000002bd15cc2>] ? do_sys_open+0x610/0x610 [ 286.320075] [<00000000731adf32>] do_syscall_64+0x1ad/0x570 [ 286.326059] [<00000000fb989066>] entry_SYSCALL_64_after_swapgs+0x5d/0xdb [ 286.333032] [ 286.333032] Showing all locks held in the system: [ 286.339363] 2 locks held by khungtaskd/24: [ 286.343677] #0: (rcu_read_lock){......}, at: [<00000000be4d89f1>] watchdog+0x13c/0xae0 [ 286.352457] #1: (tasklist_lock){.+.+..}, at: [<000000007b66bb9a>] debug_show_all_locks+0x7f/0x21f [ 286.362420] 2 locks held by getty/2028: [ 286.366487] #0: (&tty->ldisc_sem){++++++}, at: [<0000000046f75f3a>] ldsem_down_read+0x33/0x40 [ 286.378268] #1: (&ldata->atomic_read_lock){+.+.+.}, at: [<000000002ea6811b>] n_tty_read+0x1fe/0x1820 [ 286.388742] 2 locks held by syz-executor.1/2115: [ 286.393665] #0: (&bdev->bd_mutex){+.+.+.}, at: [<000000004d8140d3>] __blkdev_get+0x10e/0xeb0 [ 286.403156] #1: (loop_index_mutex){+.+.+.}, at: [<00000000d017b8c3>] lo_open+0x1d/0xb0 [ 286.412522] 2 locks held by syz-executor.5/2121: [ 286.417312] #0: (&bdev->bd_mutex){+.+.+.}, at: [<000000004d8140d3>] __blkdev_get+0x10e/0xeb0 [ 286.426915] #1: (loop_index_mutex){+.+.+.}, at: [<00000000d017b8c3>] lo_open+0x1d/0xb0 [ 286.435787] 2 locks held by syz-executor.3/2122: [ 286.440533] #0: (&bdev->bd_mutex){+.+.+.}, at: [<000000004d8140d3>] __blkdev_get+0x10e/0xeb0 [ 286.449987] #1: (loop_index_mutex){+.+.+.}, at: [<00000000d017b8c3>] lo_open+0x1d/0xb0 [ 286.458957] 2 locks held by syz-executor.2/2126: [ 286.463888] #0: (&bdev->bd_mutex){+.+.+.}, at: [<000000004d8140d3>] __blkdev_get+0x10e/0xeb0 [ 286.473739] #1: (loop_index_mutex){+.+.+.}, at: [<00000000d017b8c3>] lo_open+0x1d/0xb0 [ 286.482984] 2 locks held by syz-executor.4/3197: [ 286.490467] #0: (loop_ctl_mutex/1){+.+.+.}, at: [<0000000082d8778a>] lo_ioctl+0x85/0x1a10 [ 286.545853] #1: (&bdev->bd_mutex){+.+.+.}, at: [<00000000364b04dc>] blkdev_reread_part+0x1f/0x40 [ 286.575127] 1 lock held by syz-executor.4/3212: [ 286.580875] #0: (&bdev->bd_mutex){+.+.+.}, at: [<000000004d8140d3>] __blkdev_get+0x10e/0xeb0 [ 286.592340] 2 locks held by syz-executor.0/3206: [ 286.597088] #0: (loop_index_mutex){+.+.+.}, at: [<0000000054be0577>] loop_control_ioctl+0x7a/0x2f0 [ 286.607093] #1: (loop_ctl_mutex#2){+.+.+.}, at: [<00000000436304ff>] loop_control_ioctl+0x177/0x2f0 [ 286.617186] 1 lock held by syz-executor.0/3208: [ 286.621911] #0: (loop_index_mutex){+.+.+.}, at: [<0000000054be0577>] loop_control_ioctl+0x7a/0x2f0 [ 286.631735] 1 lock held by syz-executor.0/3210: [ 286.636644] #0: (loop_index_mutex){+.+.+.}, at: [<0000000054be0577>] loop_control_ioctl+0x7a/0x2f0 [ 286.646653] 1 lock held by syz-executor.0/3213: [ 286.651489] #0: (loop_index_mutex){+.+.+.}, at: [<0000000054be0577>] loop_control_ioctl+0x7a/0x2f0 [ 286.661525] 2 locks held by blkid/3207: [ 286.665532] #0: (&bdev->bd_mutex){+.+.+.}, at: [<000000004d8140d3>] __blkdev_get+0x10e/0xeb0 [ 286.674869] #1: (loop_index_mutex){+.+.+.}, at: [<00000000d017b8c3>] lo_open+0x1d/0xb0 [ 286.683865] [ 286.685475] ============================================= [ 286.685475] [ 286.692798] NMI backtrace for cpu 1 [ 286.696426] CPU: 1 PID: 24 Comm: khungtaskd Not tainted 4.9.168+ #40 [ 286.702999] ffff8801d98d7cc8 ffffffff81b4f5d1 0000000000000001 0000000000000000 [ 286.711027] 0000000000000001 ffffffff81097401 dffffc0000000000 ffff8801d98d7d00 [ 286.719225] ffffffff81b5a86c 0000000000000001 0000000000000000 0000000000000001 [ 286.727229] Call Trace: [ 286.729805] [<00000000db9e03e3>] dump_stack+0xc1/0x120 [ 286.735150] [<00000000b7664dc6>] ? irq_force_complete_move+0x281/0x300 [ 286.741896] [<00000000970375aa>] nmi_cpu_backtrace.cold+0x47/0x87 [ 286.748199] [<000000009a471342>] ? irq_force_complete_move+0x300/0x300 [ 286.754981] [<00000000bc997432>] nmi_trigger_cpumask_backtrace+0x124/0x155 [ 286.762081] [<00000000e8a2c097>] arch_trigger_cpumask_backtrace+0x14/0x20 [ 286.769084] [<000000006f296f32>] watchdog+0x661/0xae0 [ 286.774346] [<00000000be4d89f1>] ? watchdog+0x13c/0xae0 [ 286.779836] [<0000000085fe5d10>] ? trace_hardirqs_on_caller+0x385/0x5a0 [ 286.786707] [<00000000b10d9329>] ? reset_hung_task_detector+0x20/0x20 [ 286.793366] [<00000000b5708189>] kthread+0x278/0x310 [ 286.798606] [<0000000095a8cd98>] ? kthread_park+0xa0/0xa0 [ 286.804217] [<000000007f6e7760>] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 286.811014] [<000000000238bb77>] ? _raw_spin_unlock_irq+0x39/0x60 [ 286.817445] [<000000000768e0ed>] ? finish_task_switch+0x1e5/0x660 [ 286.823772] [<000000007a1ffc0c>] ? finish_task_switch+0x1b7/0x660 [ 286.830301] [<0000000062da9ad7>] ? __switch_to_asm+0x34/0x70 [ 286.837224] [<000000002ac54747>] ? __switch_to_asm+0x40/0x70 [ 286.843156] [<0000000062da9ad7>] ? __switch_to_asm+0x34/0x70 [ 286.849170] [<0000000095a8cd98>] ? kthread_park+0xa0/0xa0 [ 286.854790] [<0000000095a8cd98>] ? kthread_park+0xa0/0xa0 [ 286.860592] [<0000000001c19a6f>] ret_from_fork+0x5c/0x70 [ 286.867614] Sending NMI from CPU 1 to CPUs 0: [ 286.872188] NMI backtrace for cpu 0 skipped: idling at pc 0xffffffff8280f302 [ 286.879525] Kernel panic - not syncing: hung_task: blocked tasks [ 286.885689] CPU: 1 PID: 24 Comm: khungtaskd Not tainted 4.9.168+ #40 [ 286.892169] ffff8801d98d7c60 ffffffff81b4f5d1 ffff8801d1cd8000 ffffffff82a79d00 [ 286.900472] 00000000ffffffff 0000000000000001 dffffc0000000000 ffff8801d98d7d40 [ 286.908524] ffffffff813f945a 0000000041b58ab3 ffffffff82e2ec5a ffffffff813f9281 [ 286.916729] Call Trace: [ 286.919311] [<00000000db9e03e3>] dump_stack+0xc1/0x120 [ 286.924735] [<000000008c740485>] panic+0x1d9/0x3bd [ 286.930068] [<00000000011659cc>] ? add_taint.cold+0x16/0x16 [ 286.935984] [<0000000044655669>] ? find_next_bit+0x44/0x50 [ 286.941795] [<00000000fb288473>] ? printk_nmi_flush+0xae/0xd0 [ 286.947970] [<000000009a471342>] ? irq_force_complete_move+0x300/0x300 [ 286.954733] [<00000000854384ef>] ? nmi_trigger_cpumask_backtrace+0xfc/0x155 [ 286.962191] [<0000000051fdab90>] watchdog+0x672/0xae0 [ 286.967526] [<00000000be4d89f1>] ? watchdog+0x13c/0xae0 [ 286.972992] [<0000000085fe5d10>] ? trace_hardirqs_on_caller+0x385/0x5a0 [ 286.979839] [<00000000b10d9329>] ? reset_hung_task_detector+0x20/0x20 [ 286.986506] [<00000000b5708189>] kthread+0x278/0x310 [ 286.991690] [<0000000095a8cd98>] ? kthread_park+0xa0/0xa0 [ 286.997472] [<000000007f6e7760>] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 287.004234] [<000000000238bb77>] ? _raw_spin_unlock_irq+0x39/0x60 [ 287.010593] [<000000000768e0ed>] ? finish_task_switch+0x1e5/0x660 [ 287.016919] [<000000007a1ffc0c>] ? finish_task_switch+0x1b7/0x660 [ 287.023256] [<0000000062da9ad7>] ? __switch_to_asm+0x34/0x70 [ 287.029138] [<000000002ac54747>] ? __switch_to_asm+0x40/0x70 [ 287.035116] [<0000000062da9ad7>] ? __switch_to_asm+0x34/0x70 [ 287.041091] [<0000000095a8cd98>] ? kthread_park+0xa0/0xa0 [ 287.046708] [<0000000095a8cd98>] ? kthread_park+0xa0/0xa0 [ 287.052508] [<0000000001c19a6f>] ret_from_fork+0x5c/0x70 [ 287.058625] Kernel Offset: disabled [ 287.062264] Rebooting in 86400 seconds..