[ OK ] Reached target Login Prompts. [ OK ] Reached target Multi-User System. [ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... [ OK ] Started Update UTMP about System Runlevel Changes. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.0.111' (ECDSA) to the list of known hosts. executing program syzkaller login: [ 501.066839][ T6888] IPVS: ftp: loaded support on port[0] = 21 [ 501.107734][ T6910] netlink: 8 bytes leftover after parsing attributes in process `syz-executor433'. [ 501.118526][ T6910] netlink: 5212 bytes leftover after parsing attributes in process `syz-executor433'. [ 501.129852][ T6910] netlink: 8 bytes leftover after parsing attributes in process `syz-executor433'. [ 501.139987][ T6910] netlink: 5212 bytes leftover after parsing attributes in process `syz-executor433'. [ 657.308996][ T1174] INFO: task kworker/0:0:6880 blocked for more than 143 seconds. [ 657.317154][ T1174] Not tainted 5.9.0-syzkaller #0 [ 657.327356][ T1174] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 657.337027][ T1174] task:kworker/0:0 state:D stack:29440 pid: 6880 ppid: 2 flags:0x00004000 [ 657.347167][ T1174] Workqueue: ipv6_addrconf addrconf_verify_work [ 657.354317][ T1174] Call Trace: [ 657.357687][ T1174] __schedule+0xec9/0x2280 [ 657.363265][ T1174] ? io_schedule_timeout+0x140/0x140 [ 657.368569][ T1174] ? lockdep_hardirqs_on_prepare+0x354/0x530 [ 657.375926][ T1174] ? _raw_spin_unlock_irq+0x1f/0x80 [ 657.382189][ T1174] ? lockdep_hardirqs_on+0x53/0x100 [ 657.387422][ T1174] schedule+0xd0/0x2a0 [ 657.393033][ T1174] schedule_preempt_disabled+0xf/0x20 [ 657.398430][ T1174] __mutex_lock+0x3e2/0x10e0 [ 657.405369][ T1174] ? addrconf_verify_work+0xa/0x20 [ 657.411608][ T1174] ? mutex_lock_io_nested+0xf60/0xf60 [ 657.417016][ T1174] ? lock_release+0x8f0/0x8f0 [ 657.422924][ T1174] ? lock_downgrade+0x830/0x830 [ 657.427805][ T1174] ? _raw_spin_unlock_irq+0x1f/0x80 [ 657.434371][ T1174] ? lock_is_held_type+0xbb/0xf0 [ 657.440181][ T1174] addrconf_verify_work+0xa/0x20 [ 657.445139][ T1174] process_one_work+0x94c/0x1670 [ 657.452433][ T1174] ? lock_release+0x8f0/0x8f0 [ 657.457135][ T1174] ? pwq_dec_nr_in_flight+0x320/0x320 [ 657.463716][ T1174] ? rwlock_bug.part.0+0x90/0x90 [ 657.468680][ T1174] ? lockdep_hardirqs_off+0x96/0xd0 [ 657.475265][ T1174] worker_thread+0x64c/0x1120 [ 657.480761][ T1174] ? __kthread_parkme+0x13f/0x1e0 [ 657.485805][ T1174] ? process_one_work+0x1670/0x1670 [ 657.492265][ T1174] kthread+0x3b5/0x4a0 [ 657.496356][ T1174] ? __kthread_bind_mask+0xc0/0xc0 [ 657.502721][ T1174] ret_from_fork+0x1f/0x30 [ 657.507258][ T1174] [ 657.507258][ T1174] Showing all locks held in the system: [ 657.516533][ T1174] 1 lock held by khungtaskd/1174: [ 657.522931][ T1174] #0: ffffffff8a067ec0 (rcu_read_lock){....}-{1:2}, at: debug_show_all_locks+0x53/0x260 [ 657.533908][ T1174] 1 lock held by in:imklog/6562: [ 657.539630][ T1174] #0: ffff8880961b48f0 (&f->f_pos_lock){+.+.}-{3:3}, at: __fdget_pos+0xe9/0x100 [ 657.550166][ T1174] 3 locks held by kworker/0:0/6880: [ 657.555376][ T1174] #0: ffff88809a304538 ((wq_completion)ipv6_addrconf){+.+.}-{0:0}, at: process_one_work+0x82b/0x1670 [ 657.567822][ T1174] #1: ffffc90005637da8 ((addr_chk_work).work){+.+.}-{0:0}, at: process_one_work+0x85f/0x1670 [ 657.580332][ T1174] #2: ffffffff8b150908 (rtnl_mutex){+.+.}-{3:3}, at: addrconf_verify_work+0xa/0x20 [ 657.590604][ T1174] 1 lock held by syz-executor433/6910: [ 657.596105][ T1174] [ 657.598430][ T1174] ============================================= [ 657.598430][ T1174] [ 657.608795][ T1174] NMI backtrace for cpu 0 [ 657.613147][ T1174] CPU: 0 PID: 1174 Comm: khungtaskd Not tainted 5.9.0-syzkaller #0 [ 657.621033][ T1174] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 657.631097][ T1174] Call Trace: [ 657.634480][ T1174] dump_stack+0x198/0x1fd [ 657.638858][ T1174] nmi_cpu_backtrace.cold+0x70/0xb1 [ 657.644065][ T1174] ? lapic_can_unplug_cpu.cold+0x38/0x38 [ 657.649699][ T1174] nmi_trigger_cpumask_backtrace+0x1b3/0x223 [ 657.655686][ T1174] watchdog+0xd7d/0x1000 [ 657.659939][ T1174] ? reset_hung_task_detector+0x30/0x30 [ 657.665646][ T1174] kthread+0x3b5/0x4a0 [ 657.669718][ T1174] ? __kthread_bind_mask+0xc0/0xc0 [ 657.674841][ T1174] ret_from_fork+0x1f/0x30 [ 657.679424][ T1174] Sending NMI from CPU 0 to CPUs 1: [ 657.685857][ C1] NMI backtrace for cpu 1 [ 657.685863][ C1] CPU: 1 PID: 6910 Comm: syz-executor433 Not tainted 5.9.0-syzkaller #0 [ 657.685868][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 657.685872][ C1] RIP: 0010:arch_local_irq_save+0x28/0x90 [ 657.685882][ C1] Code: 00 00 48 c7 c0 60 6b fc 89 41 54 48 ba 00 00 00 00 00 fc ff df 48 c1 e8 03 80 3c 10 00 75 4a 48 83 3d cb 4a a1 08 00 74 3c 9c <58> 0f 1f 44 00 00 48 ba 00 00 00 00 00 fc ff df 49 89 c4 48 c7 c0 [ 657.685885][ C1] RSP: 0018:ffffc900052a6a80 EFLAGS: 00000286 [ 657.685892][ C1] RAX: 1ffffffff13f8d6c RBX: 0000000000000000 RCX: ffffffff815c09ee [ 657.685915][ C1] RDX: dffffc0000000000 RSI: 00000000ffffffff RDI: ffffffff8a067e00 [ 657.685919][ C1] RBP: ffff8880943a2480 R08: 0000000000000000 R09: ffffffff8b5996cf [ 657.685924][ C1] R10: fffffbfff16b32d9 R11: 0000000000000000 R12: ffffffff8a067e00 [ 657.685929][ C1] R13: ffff8880943a2d68 R14: 0000000000000000 R15: 0000000000000001 [ 657.685934][ C1] FS: 0000000000770880(0000) GS:ffff8880ae500000(0000) knlGS:0000000000000000 [ 657.685938][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 657.685942][ C1] CR2: 00007f8a15f60000 CR3: 00000000902dd000 CR4: 00000000001506e0 [ 657.685947][ C1] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 657.685951][ C1] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 657.685954][ C1] Call Trace: [ 657.685957][ C1] ? lock_is_held_type+0x3a/0xf0 [ 657.685961][ C1] ? rcu_read_lock_sched_held+0x3a/0xb0 [ 657.685964][ C1] ? lock_acquire+0x843/0xaf0 [ 657.685967][ C1] ? lock_release+0x8f0/0x8f0 [ 657.685970][ C1] ? lock_release+0x9f/0x8f0 [ 657.685973][ C1] ? check_preemption_disabled+0x2c/0x130 [ 657.685976][ C1] ? lock_is_held_type+0xbb/0xf0 [ 657.685979][ C1] ? __mutex_lock+0x134/0x10e0 [ 657.685983][ C1] ? tcf_idr_check_alloc+0x78/0x3b0 [ 657.685986][ C1] ? tcf_idr_check_alloc+0x78/0x3b0 [ 657.685989][ C1] ? mutex_lock_io_nested+0xf60/0xf60 [ 657.685993][ C1] ? __mutex_unlock_slowpath+0xe2/0x610 [ 657.685996][ C1] ? wait_for_completion+0x260/0x260 [ 657.686000][ C1] ? tcf_idr_check_alloc+0x78/0x3b0 [ 657.686003][ C1] ? tcf_police_init+0x347/0x13a0 [ 657.686006][ C1] ? tcf_police_cleanup+0x60/0x60 [ 657.686009][ C1] ? find_held_lock+0x2d/0x110 [ 657.686013][ C1] ? tc_lookup_action_n+0xcd/0xf0 [ 657.686016][ C1] ? tcf_action_init_1+0x1a3/0x990 [ 657.686019][ C1] ? tcf_action_dump_old+0x80/0x80 [ 657.686022][ C1] ? lock_acquire+0x1f3/0xaf0 [ 657.686025][ C1] ? lock_is_held_type+0xbb/0xf0 [ 657.686028][ C1] ? find_held_lock+0x2d/0x110 [ 657.686032][ C1] ? fs_reclaim_release+0x90/0xd0 [ 657.686035][ C1] ? mark_lock+0x82/0x1660 [ 657.686038][ C1] ? tcf_exts_validate+0x138/0x420 [ 657.686041][ C1] ? tcf_exts_destroy+0xc0/0xc0 [ 657.686044][ C1] ? kmem_cache_alloc_trace+0x18e/0x300 [ 657.686047][ C1] ? __nla_parse+0x3d/0x4a [ 657.686050][ C1] ? rsvp_change+0x291/0x2990 [ 657.686054][ C1] ? lock_is_held_type+0xbb/0xf0 [ 657.686063][ C1] ? lock_is_held_type+0xbb/0xf0 [ 657.686066][ C1] ? find_held_lock+0x2d/0x110 [ 657.686069][ C1] ? tc_new_tfilter+0x1be4/0x2130 [ 657.686073][ C1] ? tcf_bind_filter.isra.0+0x3c0/0x3c0 [ 657.686076][ C1] ? lock_downgrade+0x830/0x830 [ 657.686079][ C1] ? blackhole_dequeue+0x10/0x10 [ 657.686082][ C1] ? lock_is_held_type+0xbb/0xf0 [ 657.686086][ C1] ? tc_new_tfilter+0x1398/0x2130 [ 657.686089][ C1] ? tcf_bind_filter.isra.0+0x3c0/0x3c0 [ 657.686092][ C1] ? tc_del_tfilter+0x15c0/0x15c0 [ 657.686096][ C1] ? lockdep_hardirqs_on_prepare+0x530/0x530 [ 657.686099][ C1] ? is_bpf_text_address+0xcb/0x160 [ 657.686103][ C1] ? kernel_text_address+0xbd/0xf0 [ 657.686106][ C1] ? lock_is_held_type+0xbb/0xf0 [ 657.686109][ C1] ? security_capable+0x8f/0xc0 [ 657.686112][ C1] ? lock_is_held_type+0xbb/0xf0 [ 657.686116][ C1] ? tc_del_tfilter+0x15c0/0x15c0 [ 657.686119][ C1] ? rtnetlink_rcv_msg+0x80f/0xad0 [ 657.686122][ C1] ? rtnetlink_put_metrics+0x510/0x510 [ 657.686125][ C1] ? lock_acquire+0x1f3/0xaf0 [ 657.686129][ C1] ? netlink_deliver_tap+0x146/0xb70 [ 657.686132][ C1] ? netlink_rcv_skb+0x15a/0x430 [ 657.686135][ C1] ? rtnetlink_put_metrics+0x510/0x510 [ 657.686138][ C1] ? netlink_ack+0xa10/0xa10 [ 657.686142][ C1] ? netlink_unicast+0x533/0x7d0 [ 657.686145][ C1] ? netlink_attachskb+0x810/0x810 [ 657.686148][ C1] ? __phys_addr_symbol+0x2c/0x70 [ 657.686151][ C1] ? __check_object_size+0x171/0x3e4 [ 657.686155][ C1] ? netlink_sendmsg+0x856/0xd90 [ 657.686158][ C1] ? netlink_unicast+0x7d0/0x7d0 [ 657.686161][ C1] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 657.686165][ C1] ? netlink_unicast+0x7d0/0x7d0 [ 657.686168][ C1] ? sock_sendmsg+0xcf/0x120 [ 657.686171][ C1] ? ____sys_sendmsg+0x331/0x810 [ 657.686174][ C1] ? kernel_sendmsg+0x50/0x50 [ 657.686177][ C1] ? do_recvmmsg+0x6d0/0x6d0 [ 657.686180][ C1] ? sock_alloc_file+0x4f/0x190 [ 657.686183][ C1] ? __lock_acquire+0x164a/0x5780 [ 657.686186][ C1] ? ___sys_sendmsg+0xf3/0x170 [ 657.686190][ C1] ? sendmsg_copy_msghdr+0x160/0x160 [ 657.686193][ C1] ? lockdep_hardirqs_on_prepare+0x530/0x530 [ 657.686197][ C1] ? fs_reclaim_release+0x90/0xd0 [ 657.686200][ C1] ? lock_is_held_type+0xbb/0xf0 [ 657.686203][ C1] ? find_held_lock+0x2d/0x110 [ 657.686206][ C1] ? __might_fault+0x11f/0x1d0 [ 657.686209][ C1] ? lock_downgrade+0x830/0x830 [ 657.686213][ C1] ? lock_is_held_type+0xbb/0xf0 [ 657.686216][ C1] ? __sys_sendmmsg+0x195/0x480 [ 657.686219][ C1] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 657.686222][ C1] ? find_held_lock+0x2d/0x110 [ 657.686225][ C1] ? __fd_install+0x1b4/0x600 [ 657.686228][ C1] ? alloc_file_pseudo+0x1/0x250 [ 657.686231][ C1] ? lock_is_held_type+0xbb/0xf0 [ 657.686234][ C1] ? __fd_install+0x1e6/0x600 [ 657.686237][ C1] ? __sys_socket+0x16d/0x200 [ 657.686241][ C1] ? lock_is_held_type+0xbb/0xf0 [ 657.686244][ C1] ? syscall_enter_from_user_mode+0x1d/0x60 [ 657.686247][ C1] ? __x64_sys_sendmmsg+0x99/0x100 [ 657.686251][ C1] ? syscall_enter_from_user_mode+0x1d/0x60 [ 657.686254][ C1] ? do_syscall_64+0x2d/0x70 [ 657.686258][ C1] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 657.686263][ C1] INFO: NMI handler (nmi_cpu_backtrace_handler) took too long to run: 0.000 msecs [ 657.698775][ T1174] Kernel panic - not syncing: hung_task: blocked tasks [ 658.301919][ T1174] CPU: 0 PID: 1174 Comm: khungtaskd Not tainted 5.9.0-syzkaller #0 [ 658.309820][ T1174] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 658.319882][ T1174] Call Trace: [ 658.323184][ T1174] dump_stack+0x198/0x1fd [ 658.327522][ T1174] panic+0x382/0x7fb [ 658.331423][ T1174] ? __warn_printk+0xf3/0xf3 [ 658.336074][ T1174] ? lapic_can_unplug_cpu.cold+0x38/0x38 [ 658.341876][ T1174] ? preempt_schedule_thunk+0x16/0x18 [ 658.347263][ T1174] ? watchdog.cold+0x5/0x16b [ 658.351862][ T1174] ? watchdog+0xa82/0x1000 [ 658.356290][ T1174] watchdog.cold+0x16/0x16b [ 658.360808][ T1174] ? reset_hung_task_detector+0x30/0x30 [ 658.366358][ T1174] kthread+0x3b5/0x4a0 [ 658.370428][ T1174] ? __kthread_bind_mask+0xc0/0xc0 [ 658.375545][ T1174] ret_from_fork+0x1f/0x30 [ 658.381666][ T1174] Kernel Offset: disabled [ 658.386005][ T1174] Rebooting in 86400 seconds..