./strace-static-x86_64 -e \!wait4,clock_nanosleep,nanosleep -s 100 -x -f ./syz-executor885852744 <...> Warning: Permanently added '10.128.0.18' (ED25519) to the list of known hosts. execve("./syz-executor885852744", ["./syz-executor885852744"], 0x7ffdae204300 /* 10 vars */) = 0 brk(NULL) = 0x555561f7d000 brk(0x555561f7dd00) = 0x555561f7dd00 arch_prctl(ARCH_SET_FS, 0x555561f7d380) = 0 set_tid_address(0x555561f7d650) = 5831 set_robust_list(0x555561f7d660, 24) = 0 rseq(0x555561f7dca0, 0x20, 0, 0x53053053) = 0 prlimit64(0, RLIMIT_STACK, NULL, {rlim_cur=8192*1024, rlim_max=RLIM64_INFINITY}) = 0 readlink("/proc/self/exe", "/root/syz-executor885852744", 4096) = 27 getrandom("\x7f\xae\xc0\xf2\xe3\x5f\x95\x7a", 8, GRND_NONBLOCK) = 8 brk(NULL) = 0x555561f7dd00 brk(0x555561f9ed00) = 0x555561f9ed00 brk(0x555561f9f000) = 0x555561f9f000 mprotect(0x7efd72945000, 16384, PROT_READ) = 0 mmap(0x1ffff000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x1ffff000 mmap(0x20000000, 16777216, PROT_READ|PROT_WRITE|PROT_EXEC, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x20000000 mmap(0x21000000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x21000000 clone(child_stack=NULL, flags=CLONE_CHILD_CLEARTID|CLONE_CHILD_SETTID|SIGCHLD./strace-static-x86_64: Process 5832 attached [pid 5832] set_robust_list(0x555561f7d660, 24 [pid 5831] <... clone resumed>, child_tidptr=0x555561f7d650) = 5832 [pid 5832] <... set_robust_list resumed>) = 0 [pid 5832] prctl(PR_SET_PDEATHSIG, SIGKILL) = 0 [pid 5832] setpgid(0, 0) = 0 [pid 5832] openat(AT_FDCWD, "/proc/self/oom_score_adj", O_WRONLY|O_CLOEXEC) = 3 [pid 5832] write(3, "1000", 4) = 4 [pid 5832] close(3) = 0 executing program [pid 5832] write(1, "executing program\n", 18) = 18 [pid 5832] creat("./file0", 000) = 3 [pid 5832] pipe2([4, 5], 0) = 0 [pid 5832] write(5, "\x15\x00\x00\x00\x65\xff\xff\x04\x80\x00\x00\x08\x00\x39\x50\x32\x30\x30\x30\x00\x00", 21) = 21 [pid 5832] dup(5) = 6 [ 191.609350][ T29] audit: type=1400 audit(1737468948.464:88): avc: denied { execmem } for pid=5831 comm="syz-executor885" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [pid 5832] write(6, "\x18\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00", 24) = 24 [pid 5832] write(6, "\x4c\x01\x00\x00\x05\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x18\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"..., 311) = 311 [pid 5832] mount(NULL, "./file0", "9p", MS_NOATIME|MS_POSIXACL, "trans=fd,rfdno=0x0000000000000004,wfdno=0x0000000000000006") = 0 [pid 5832] chmod("./file0", 000) = 0 [pid 5832] open("./file0", O_WRONLY) = 7 [pid 5832] openat(AT_FDCWD, "blkio.bfq.io_wait_time", O_RDWR|O_CREAT|O_NOCTTY|O_TRUNC|O_APPEND|FASYNC|0x18, 000) = 8 [ 191.700203][ T29] audit: type=1400 audit(1737468948.564:89): avc: denied { mounton } for pid=5832 comm="syz-executor885" path="/root/file0" dev="sda1" ino=1927 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=file permissive=1 [ 191.723177][ T29] audit: type=1400 audit(1737468948.564:90): avc: denied { mount } for pid=5832 comm="syz-executor885" name="/" dev="9p" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [pid 5832] ftruncate(8, 33554441) = 0 [ 191.745782][ T29] audit: type=1400 audit(1737468948.594:91): avc: denied { setattr } for pid=5832 comm="syz-executor885" name="/" dev="9p" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 191.767937][ T29] audit: type=1400 audit(1737468948.594:92): avc: denied { write } for pid=5832 comm="syz-executor885" dev="9p" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 191.789268][ T29] audit: type=1400 audit(1737468948.594:93): avc: denied { open } for pid=5832 comm="syz-executor885" path="/root/file0" dev="9p" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [pid 5832] sendfile(7, 8, NULL, 2147479552 [pid 5831] kill(-5832, SIGKILL) = 0 [pid 5831] kill(5832, SIGKILL) = 0 [pid 5831] openat(AT_FDCWD, "/sys/fs/fuse/connections", O_RDONLY|O_NONBLOCK|O_CLOEXEC|O_DIRECTORY) = 3 [pid 5831] newfstatat(3, "", {st_mode=S_IFDIR|0755, st_size=0, ...}, AT_EMPTY_PATH) = 0 [pid 5831] getdents64(3, 0x555561f7e6f0 /* 2 entries */, 32768) = 48 [pid 5831] getdents64(3, 0x555561f7e6f0 /* 0 entries */, 32768) = 0 [pid 5831] close(3) = 0 [ 429.419553][ T30] INFO: task kworker/u8:0:11 blocked for more than 143 seconds. [ 429.427267][ T30] Not tainted 6.13.0-syzkaller-00603-g3d3a9c8b89d4 #0 [ 429.434629][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 429.443405][ T30] task:kworker/u8:0 state:D stack:22912 pid:11 tgid:11 ppid:2 flags:0x00004000 [ 429.453633][ T30] Workqueue: events_unbound netfs_write_collection_worker [ 429.460774][ T30] Call Trace: [ 429.464038][ T30] [ 429.466946][ T30] __schedule+0xe58/0x5ad0 [ 429.471381][ T30] ? __pfx___lock_acquire+0x10/0x10 [ 429.476596][ T30] ? mark_lock+0xb5/0xc60 [ 429.480943][ T30] ? __pfx___schedule+0x10/0x10 [ 429.485800][ T30] ? schedule+0x298/0x350 [ 429.490153][ T30] ? __pfx_lock_release+0x10/0x10 [ 429.495172][ T30] ? __pfx_lock_release+0x10/0x10 [ 429.500262][ T30] ? lock_acquire+0x2f/0xb0 [ 429.504762][ T30] ? schedule+0x1fd/0x350 [ 429.509068][ T30] schedule+0xe7/0x350 [ 429.513249][ T30] bit_wait+0x15/0xe0 [ 429.517230][ T30] __wait_on_bit+0x62/0x180 [ 429.521744][ T30] ? __pfx_bit_wait+0x10/0x10 [ 429.526428][ T30] out_of_line_wait_on_bit+0xda/0x110 [ 429.531808][ T30] ? __pfx_out_of_line_wait_on_bit+0x10/0x10 [ 429.537787][ T30] ? __pfx_wake_bit_function+0x10/0x10 [ 429.543263][ T30] netfs_retry_writes+0x2fa/0x1a00 [ 429.548376][ T30] ? add_lock_to_list+0x17d/0x390 [ 429.553431][ T30] ? lockdep_unlock+0x11a/0x290 [ 429.558295][ T30] ? __lock_acquire+0x2077/0x3c40 [ 429.563349][ T30] ? __pfx_netfs_retry_writes+0x10/0x10 [ 429.568906][ T30] ? rcu_is_watching+0x12/0xc0 [ 429.573715][ T30] netfs_write_collection_worker+0x23de/0x37c0 [ 429.579887][ T30] process_one_work+0x9c5/0x1ba0 [ 429.584821][ T30] ? __pfx_lock_acquire.part.0+0x10/0x10 [ 429.590492][ T30] ? __pfx_process_one_work+0x10/0x10 [ 429.595855][ T30] ? rcu_is_watching+0x12/0xc0 [ 429.600639][ T30] ? assign_work+0x1a0/0x250 [ 429.605222][ T30] worker_thread+0x6c8/0xf00 [ 429.609838][ T30] ? __pfx_worker_thread+0x10/0x10 [ 429.614944][ T30] kthread+0x2c1/0x3a0 [ 429.618990][ T30] ? _raw_spin_unlock_irq+0x23/0x50 [ 429.624192][ T30] ? __pfx_kthread+0x10/0x10 [ 429.628781][ T30] ret_from_fork+0x45/0x80 [ 429.633207][ T30] ? __pfx_kthread+0x10/0x10 [ 429.637808][ T30] ret_from_fork_asm+0x1a/0x30 [ 429.642600][ T30] [ 429.645696][ T30] [ 429.645696][ T30] Showing all locks held in the system: [ 429.653425][ T30] 2 locks held by kworker/u8:0/11: [ 429.658519][ T30] #0: ffff88801b081148 ((wq_completion)events_unbound){+.+.}-{0:0}, at: process_one_work+0x1293/0x1ba0 [ 429.669665][ T30] #1: ffffc90000107d80 ((work_completion)(&rreq->work)){+.+.}-{0:0}, at: process_one_work+0x921/0x1ba0 [ 429.680864][ T30] 1 lock held by khungtaskd/30: [ 429.685699][ T30] #0: ffffffff8e1bbcc0 (rcu_read_lock){....}-{1:3}, at: debug_show_all_locks+0x7f/0x390 [ 429.695588][ T30] 6 locks held by kworker/u8:6/1333: [ 429.700901][ T30] 2 locks held by getty/5569: [ 429.705569][ T30] #0: ffff888036ee20a0 (&tty->ldisc_sem){++++}-{0:0}, at: tty_ldisc_ref_wait+0x24/0x80 [ 429.715396][ T30] #1: ffffc90002fde2f0 (&ldata->atomic_read_lock){+.+.}-{4:4}, at: n_tty_read+0xfba/0x1480 [ 429.725515][ T30] 2 locks held by syz-executor885/5832: [ 429.731070][ T30] #0: ffff888066606420 (sb_writers#10){.+.+}-{0:0}, at: splice_direct_to_actor+0x346/0xa40 [ 429.741250][ T30] #1: ffff888078830148 (&sb->s_type->i_mutex_key#15){++++}-{4:4}, at: netfs_start_io_direct+0x116/0x260 [ 429.752491][ T30] [ 429.754804][ T30] ============================================= [ 429.754804][ T30] [ 429.763221][ T30] NMI backtrace for cpu 0 [ 429.767533][ T30] CPU: 0 UID: 0 PID: 30 Comm: khungtaskd Not tainted 6.13.0-syzkaller-00603-g3d3a9c8b89d4 #0 [ 429.777655][ T30] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 429.787696][ T30] Call Trace: [ 429.790949][ T30] [ 429.793854][ T30] dump_stack_lvl+0x116/0x1f0 [ 429.798510][ T30] nmi_cpu_backtrace+0x27b/0x390 [ 429.803422][ T30] ? __pfx_nmi_raise_cpu_backtrace+0x10/0x10 [ 429.809385][ T30] nmi_trigger_cpumask_backtrace+0x29c/0x300 [ 429.815340][ T30] watchdog+0xf14/0x1240 [ 429.819560][ T30] ? __pfx_watchdog+0x10/0x10 [ 429.824214][ T30] ? lockdep_hardirqs_on+0x7c/0x110 [ 429.829387][ T30] ? __kthread_parkme+0x148/0x220 [ 429.834390][ T30] ? __pfx_watchdog+0x10/0x10 [ 429.839053][ T30] kthread+0x2c1/0x3a0 [ 429.843097][ T30] ? _raw_spin_unlock_irq+0x23/0x50 [ 429.848269][ T30] ? __pfx_kthread+0x10/0x10 [ 429.852834][ T30] ret_from_fork+0x45/0x80 [ 429.857223][ T30] ? __pfx_kthread+0x10/0x10 [ 429.861786][ T30] ret_from_fork_asm+0x1a/0x30 [ 429.866541][ T30] [ 429.869641][ T30] Sending NMI from CPU 0 to CPUs 1: [ 429.874847][ C1] NMI backtrace for cpu 1 [ 429.874856][ C1] CPU: 1 UID: 0 PID: 1333 Comm: kworker/u8:6 Not tainted 6.13.0-syzkaller-00603-g3d3a9c8b89d4 #0 [ 429.874871][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 429.874879][ C1] Workqueue: events_unbound toggle_allocation_gate [ 429.874898][ C1] RIP: 0010:kasan_check_range+0x0/0x1a0 [ 429.874918][ C1] Code: e6 d4 ff ff 89 43 08 5b 5d 41 5c c3 cc cc cc cc 66 2e 0f 1f 84 00 00 00 00 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 <66> 0f 1f 00 48 85 f6 0f 84 50 01 00 00 48 89 f8 41 54 44 0f b6 c2 [ 429.874929][ C1] RSP: 0018:ffffc9000480f978 EFLAGS: 00000246 [ 429.874939][ C1] RAX: 0000000000000000 RBX: 00fff00000002000 RCX: ffffffff813e1e94 [ 429.874947][ C1] RDX: 0000000000000000 RSI: 0000000000000008 RDI: ffffea000007c980 [ 429.874955][ C1] RBP: ffffffff81f26677 R08: 0000000000000007 R09: ffffffffffffffff [ 429.874962][ C1] R10: 00fff00000002000 R11: 0000000000000006 R12: 0000000000000678 [ 429.874970][ C1] R13: ffffea000007c980 R14: 0000000000000005 R15: 0000000000000001 [ 429.874978][ C1] FS: 0000000000000000(0000) GS:ffff8880b8700000(0000) knlGS:0000000000000000 [ 429.874991][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 429.875000][ C1] CR2: 00005642d4949028 CR3: 000000000df7e000 CR4: 00000000003526f0 [ 429.875008][ C1] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 429.875015][ C1] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 429.875022][ C1] Call Trace: [ 429.875026][ C1] [ 429.875031][ C1] ? nmi_cpu_backtrace+0x1d8/0x390 [ 429.875046][ C1] ? nmi_cpu_backtrace_handler+0xc/0x20 [ 429.875058][ C1] ? nmi_handle+0x1ac/0x5d0 [ 429.875073][ C1] ? __pfx_kasan_check_range+0x10/0x10 [ 429.875091][ C1] ? default_do_nmi+0x6a/0x160 [ 429.875105][ C1] ? exc_nmi+0x170/0x1e0 [ 429.875117][ C1] ? end_repeat_nmi+0xf/0x53 [ 429.875130][ C1] ? kmem_cache_alloc_noprof+0x87/0x3d0 [ 429.875147][ C1] ? __text_poke+0x164/0xca0 [ 429.875163][ C1] ? __pfx_kasan_check_range+0x10/0x10 [ 429.875181][ C1] ? __pfx_kasan_check_range+0x10/0x10 [ 429.875199][ C1] ? __pfx_kasan_check_range+0x10/0x10 [ 429.875217][ C1] [ 429.875221][ C1] [ 429.875225][ C1] __text_poke+0x164/0xca0 [ 429.875240][ C1] ? __pfx_text_poke_memcpy+0x10/0x10 [ 429.875254][ C1] ? kmem_cache_alloc_lru_noprof+0x8b/0x3d0 [ 429.875271][ C1] ? __pfx___text_poke+0x10/0x10 [ 429.875287][ C1] ? kmem_cache_alloc_noprof+0x87/0x3d0 [ 429.875303][ C1] text_poke_bp_batch+0x3e0/0x760 [ 429.875326][ C1] ? kmem_cache_alloc_noprof+0x87/0x3d0 [ 429.875342][ C1] ? __pfx_text_poke_bp_batch+0x10/0x10 [ 429.875358][ C1] ? __jump_label_patch+0x1db/0x400 [ 429.875376][ C1] ? arch_jump_label_transform_queue+0xc0/0x120 [ 429.875397][ C1] text_poke_finish+0x30/0x40 [ 429.875413][ C1] arch_jump_label_transform_apply+0x1c/0x30 [ 429.875432][ C1] jump_label_update+0x1d7/0x400 [ 429.875445][ C1] static_key_enable_cpuslocked+0x1b7/0x270 [ 429.875458][ C1] static_key_enable+0x1a/0x20 [ 429.875470][ C1] toggle_allocation_gate+0xfc/0x260 [ 429.875485][ C1] ? __pfx_toggle_allocation_gate+0x10/0x10 [ 429.875500][ C1] ? trace_lock_acquire+0x14e/0x1f0 [ 429.875519][ C1] ? process_one_work+0x921/0x1ba0 [ 429.875533][ C1] ? lock_acquire+0x2f/0xb0 [ 429.875547][ C1] ? process_one_work+0x921/0x1ba0 [ 429.875561][ C1] process_one_work+0x9c5/0x1ba0 [ 429.875578][ C1] ? __pfx_lock_acquire.part.0+0x10/0x10 [ 429.875592][ C1] ? __pfx_process_one_work+0x10/0x10 [ 429.875605][ C1] ? rcu_is_watching+0x12/0xc0 [ 429.875624][ C1] ? assign_work+0x1a0/0x250 [ 429.875638][ C1] worker_thread+0x6c8/0xf00 [ 429.875655][ C1] ? __pfx_worker_thread+0x10/0x10 [ 429.875668][ C1] kthread+0x2c1/0x3a0 [ 429.875684][ C1] ? _raw_spin_unlock_irq+0x23/0x50 [ 429.875698][ C1] ? __pfx_kthread+0x10/0x10 [ 429.875714][ C1] ret_from_fork+0x45/0x80 [ 429.875726][ C1] ? __pfx_kthread+0x10/0x10 [ 429.875742][ C1] ret_from_fork_asm+0x1a/0x30 [ 429.875764][ C1] [ 429.875844][ T30] Kernel panic - not syncing: hung_task: blocked tasks [ 430.271832][ T30] CPU: 0 UID: 0 PID: 30 Comm: khungtaskd Not tainted 6.13.0-syzkaller-00603-g3d3a9c8b89d4 #0 [ 430.281975][ T30] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 430.292014][ T30] Call Trace: [ 430.295278][ T30] [ 430.298192][ T30] dump_stack_lvl+0x3d/0x1f0 [ 430.302779][ T30] panic+0x71d/0x800 [ 430.306659][ T30] ? __pfx_panic+0x10/0x10 [ 430.311059][ T30] ? __irq_work_queue_local+0xdd/0x460 [ 430.316508][ T30] ? __pfx_nmi_raise_cpu_backtrace+0x10/0x10 [ 430.322472][ T30] ? irq_work_queue+0x2a/0x80 [ 430.327154][ T30] ? watchdog+0xd7e/0x1240 [ 430.331558][ T30] ? watchdog+0xd71/0x1240 [ 430.335963][ T30] watchdog+0xd8f/0x1240 [ 430.340195][ T30] ? __pfx_watchdog+0x10/0x10 [ 430.344857][ T30] ? lockdep_hardirqs_on+0x7c/0x110 [ 430.350044][ T30] ? __kthread_parkme+0x148/0x220 [ 430.355057][ T30] ? __pfx_watchdog+0x10/0x10 [ 430.359720][ T30] kthread+0x2c1/0x3a0 [ 430.363779][ T30] ? _raw_spin_unlock_irq+0x23/0x50 [ 430.368961][ T30] ? __pfx_kthread+0x10/0x10 [ 430.373539][ T30] ret_from_fork+0x45/0x80 [ 430.377938][ T30] ? __pfx_kthread+0x10/0x10 [ 430.382516][ T30] ret_from_fork_asm+0x1a/0x30 [ 430.387280][ T30] [ 430.390480][ T30] Kernel Offset: disabled [ 430.394780][ T30] Rebooting in 86400 seconds..