syzkaller login: [ 61.278252][ T38] audit: type=1400 audit(1575107814.708:41): avc: denied { map } for pid=7887 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 Warning: Permanently added '[localhost]:45206' (ECDSA) to the list of known hosts. [ 63.163601][ T38] audit: type=1400 audit(1575107816.598:42): avc: denied { map } for pid=7899 comm="syz-fuzzer" path="/syz-fuzzer" dev="sda1" ino=16525 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:file_t:s0 tclass=file permissive=1 2019/11/30 09:56:56 fuzzer started 2019/11/30 09:56:57 dialing manager at 10.0.2.10:40921 2019/11/30 09:56:57 syscalls: 2533 2019/11/30 09:56:57 code coverage: enabled 2019/11/30 09:56:57 comparison tracing: enabled 2019/11/30 09:56:57 extra coverage: extra coverage is not supported by the kernel 2019/11/30 09:56:57 setuid sandbox: enabled 2019/11/30 09:56:57 namespace sandbox: enabled 2019/11/30 09:56:57 Android sandbox: /sys/fs/selinux/policy does not exist 2019/11/30 09:56:57 fault injection: enabled 2019/11/30 09:56:57 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/11/30 09:56:57 net packet injection: enabled 2019/11/30 09:56:57 net device setup: enabled 2019/11/30 09:56:57 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2019/11/30 09:56:57 devlink PCI setup: PCI device 0000:00:10.0 is not available 09:57:08 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)\x00'}, 0x58) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="ad", 0x1) sendto$unix(r3, &(0x7f0000000140)="24c8", 0xfffffffffffffda4, 0xbedcf7264d64d419, 0x0, 0x0) recvfrom(r3, &(0x7f0000001240)=""/4096, 0xb71b829b6f5560a, 0x0, 0x0, 0xfffffffffffffff1) [ 75.130573][ T38] audit: type=1400 audit(1575107828.568:43): avc: denied { map } for pid=7923 comm="syz-executor.0" path="/sys/kernel/debug/kcov" dev="debugfs" ino=1046 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 09:57:08 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r5}]]}}}]}, 0x38}}, 0x0) bind$packet(r0, &(0x7f0000000140)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @local}, 0x14) write$binfmt_script(r0, 0x0, 0x0) [ 75.319745][ T7924] IPVS: ftp: loaded support on port[0] = 21 [ 75.347396][ T7926] IPVS: ftp: loaded support on port[0] = 21 [ 75.406913][ T7924] chnl_net:caif_netlink_parms(): no params data found [ 75.463549][ T7924] bridge0: port 1(bridge_slave_0) entered blocking state [ 75.471368][ T7924] bridge0: port 1(bridge_slave_0) entered disabled state [ 75.479606][ T7924] device bridge_slave_0 entered promiscuous mode [ 75.491793][ T7924] bridge0: port 2(bridge_slave_1) entered blocking state [ 75.499011][ T7924] bridge0: port 2(bridge_slave_1) entered disabled state [ 75.506499][ T7924] device bridge_slave_1 entered promiscuous mode [ 75.513640][ T7926] chnl_net:caif_netlink_parms(): no params data found [ 75.542197][ T7924] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 75.557634][ T7924] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 75.574750][ T7926] bridge0: port 1(bridge_slave_0) entered blocking state [ 75.582101][ T7926] bridge0: port 1(bridge_slave_0) entered disabled state [ 75.590050][ T7926] device bridge_slave_0 entered promiscuous mode [ 75.601221][ T7926] bridge0: port 2(bridge_slave_1) entered blocking state [ 75.608624][ T7926] bridge0: port 2(bridge_slave_1) entered disabled state [ 75.616467][ T7926] device bridge_slave_1 entered promiscuous mode [ 75.624848][ T7924] team0: Port device team_slave_0 added [ 75.635989][ T7924] team0: Port device team_slave_1 added [ 75.647046][ T7926] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 75.657587][ T7926] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 75.751091][ T7924] device hsr_slave_0 entered promiscuous mode [ 75.819159][ T7924] device hsr_slave_1 entered promiscuous mode [ 75.891107][ T7926] team0: Port device team_slave_0 added [ 75.898295][ T7926] team0: Port device team_slave_1 added [ 75.960922][ T7926] device hsr_slave_0 entered promiscuous mode [ 76.039150][ T7926] device hsr_slave_1 entered promiscuous mode [ 76.119017][ T7926] debugfs: Directory 'hsr0' with parent '/' already present! [ 76.142421][ T38] audit: type=1400 audit(1575107829.578:44): avc: denied { create } for pid=7924 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 76.169388][ T38] audit: type=1400 audit(1575107829.578:45): avc: denied { write } for pid=7924 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 76.169597][ T7924] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 76.195567][ T38] audit: type=1400 audit(1575107829.578:46): avc: denied { read } for pid=7924 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 76.304414][ T7924] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 76.404748][ T7924] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 76.472934][ T7924] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 76.557573][ T7926] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 76.600834][ T7926] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 76.700833][ T7926] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 76.743080][ T7926] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 76.865786][ T7924] 8021q: adding VLAN 0 to HW filter on device bond0 [ 76.875813][ T7926] 8021q: adding VLAN 0 to HW filter on device bond0 [ 76.888077][ T1204] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 76.896692][ T1204] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 76.907541][ T7924] 8021q: adding VLAN 0 to HW filter on device team0 [ 76.914881][ T61] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 76.922711][ T61] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 76.931618][ T7926] 8021q: adding VLAN 0 to HW filter on device team0 [ 76.942000][ T1204] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 76.951016][ T1204] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 76.959513][ T1204] bridge0: port 1(bridge_slave_0) entered blocking state [ 76.966563][ T1204] bridge0: port 1(bridge_slave_0) entered forwarding state [ 76.974346][ T1204] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 76.983868][ T1204] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 76.992450][ T1204] bridge0: port 1(bridge_slave_0) entered blocking state [ 76.999625][ T1204] bridge0: port 1(bridge_slave_0) entered forwarding state [ 77.007923][ T1204] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 77.016280][ T1204] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 77.027126][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 77.036174][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 77.045024][ T23] bridge0: port 2(bridge_slave_1) entered blocking state [ 77.052517][ T23] bridge0: port 2(bridge_slave_1) entered forwarding state [ 77.060358][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 77.068592][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 77.077106][ T23] bridge0: port 2(bridge_slave_1) entered blocking state [ 77.084181][ T23] bridge0: port 2(bridge_slave_1) entered forwarding state [ 77.109944][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 77.118696][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 77.127714][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 77.136428][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 77.145206][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 77.154011][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 77.162376][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 77.170900][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 77.179450][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 77.187902][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 77.196523][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 77.205007][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 77.213575][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 77.221964][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 77.230237][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 77.238639][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 77.246802][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 77.254985][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 77.263435][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 77.272377][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 77.280981][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 77.288678][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 77.298323][ T7924] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 77.308452][ T7926] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 77.331180][ T7924] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 77.340857][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 77.348380][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 77.356310][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 77.364366][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 77.374542][ T7926] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 77.383537][ T38] audit: type=1400 audit(1575107830.818:47): avc: denied { associate } for pid=7924 comm="syz-executor.0" name="syz0" scontext=unconfined_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=filesystem permissive=1 09:57:11 executing program 1: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x40000000003, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x11, &(0x7f0000000000)=@assoc_value, &(0x7f0000000040)=0x8) 09:57:11 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) io_setup(0x83, 0x0) open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(0x0, 0x0, 0xffffffdfffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x100000000000a, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000100)) getegid() ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) syz_open_pts(r0, 0x0) r1 = socket$inet(0x2, 0x4000020000000001, 0x0) getsockopt$ARPT_SO_GET_INFO(r1, 0x0, 0x60, &(0x7f0000000140)={'filter\x00'}, &(0x7f00000001c0)=0x44) r2 = socket$inet(0x2, 0x4000020000000001, 0x0) getsockopt$ARPT_SO_GET_INFO(r2, 0x0, 0x60, 0x0, &(0x7f00000001c0)) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000140)={'filter\x00'}, 0x0) sendmmsg$unix(r0, &(0x7f0000000f80)=[{0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x1b0b6d36ff84fbda}, {&(0x7f00000002c0)=@abs, 0x6e, &(0x7f00000005c0)=[{&(0x7f0000000340)="cb9ff9c1c98a671c7d86bdac1f87a902e4ecd25610267886d3d4a6d2982775da9d5dd76a4fe1cc99804cd336ee7389668b68387e026b6a89cc059ab9230ab472122e4cf3536427984b1443b1d4bd171542e12e9c99a8417a00a0d1770cf1c8e08f18da7a2d0109732c5536231ff8148b3e90f6f4bd4052b31009be2658a8412404f66d9e43c4e596d4e60778d47a690a948397f9f88fbba957", 0x99}, {0x0}, {0x0}], 0x3}, {&(0x7f0000000600)=@abs={0x0, 0x0, 0x4e23}, 0x6e, &(0x7f0000000a40)=[{0x0}, {&(0x7f00000007c0)}], 0x2}], 0x3, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x100000000, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(0xffffffffffffffff, 0xc0406619, &(0x7f00000000c0)={{0x0, 0x0, @descriptor="947c2167416e7c91"}}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x840100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xb2) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='stat\x00') preadv(r4, &(0x7f00000017c0), 0x199, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) [ 77.891205][ T38] audit: type=1400 audit(1575107831.328:48): avc: denied { open } for pid=7943 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=perf_event permissive=1 [ 77.916096][ T38] audit: type=1400 audit(1575107831.328:49): avc: denied { kernel } for pid=7943 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=perf_event permissive=1 [ 78.278883][ C2] hrtimer: interrupt took 23248 ns 09:57:11 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)\x00'}, 0x58) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="ad", 0x1) sendto$unix(r3, &(0x7f0000000140)="24c8", 0xfffffffffffffda4, 0xbedcf7264d64d419, 0x0, 0x0) recvfrom(r3, &(0x7f0000001240)=""/4096, 0xb71b829b6f5560a, 0x0, 0x0, 0xfffffffffffffff1) 09:57:12 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)\x00'}, 0x58) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="ad", 0x1) sendto$unix(r3, &(0x7f0000000140)="24c8", 0xfffffffffffffda4, 0xbedcf7264d64d419, 0x0, 0x0) recvfrom(r3, &(0x7f0000001240)=""/4096, 0xb71b829b6f5560a, 0x0, 0x0, 0xfffffffffffffff1) 09:57:13 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)\x00'}, 0x58) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="ad", 0x1) sendto$unix(r3, &(0x7f0000000140)="24c8", 0xfffffffffffffda4, 0xbedcf7264d64d419, 0x0, 0x0) recvfrom(r3, &(0x7f0000001240)=""/4096, 0xb71b829b6f5560a, 0x0, 0x0, 0xfffffffffffffff1) [ 361.489090][ T1114] INFO: task kworker/0:1:13 blocked for more than 143 seconds. [ 361.497569][ T1114] Not tainted 5.4.0-syzkaller #0 [ 361.504633][ T1114] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 361.515135][ T1114] kworker/0:1 D26392 13 2 0x80004000 [ 361.522169][ T1114] Workqueue: events key_garbage_collector [ 361.528304][ T1114] Call Trace: [ 361.532230][ T1114] __schedule+0x8e1/0x1f30 [ 361.537036][ T1114] ? __sched_text_start+0x8/0x8 [ 361.542463][ T1114] ? _raw_spin_unlock_irq+0x59/0x80 [ 361.547773][ T1114] schedule+0xdc/0x2b0 [ 361.552529][ T1114] schedule_timeout+0x717/0xc50 [ 361.557690][ T1114] ? __kasan_check_read+0x11/0x20 [ 361.563488][ T1114] ? usleep_range+0x170/0x170 [ 361.568527][ T1114] ? mark_held_locks+0xa4/0xf0 [ 361.574037][ T1114] ? _raw_spin_unlock_irq+0x23/0x80 [ 361.579878][ T1114] ? wait_for_completion+0x294/0x440 [ 361.585661][ T1114] ? _raw_spin_unlock_irq+0x23/0x80 [ 361.591498][ T1114] ? lockdep_hardirqs_on+0x421/0x5e0 [ 361.597308][ T1114] ? trace_hardirqs_on+0x67/0x240 [ 361.602918][ T1114] wait_for_completion+0x29c/0x440 [ 361.608288][ T1114] ? wait_for_completion_interruptible+0x470/0x470 [ 361.615562][ T1114] ? wake_up_q+0x140/0x140 [ 361.620995][ T1114] __wait_rcu_gp+0x225/0x2f0 [ 361.625837][ T1114] synchronize_rcu.part.0+0xcf/0xe0 [ 361.631850][ T1114] ? synchronize_rcu_expedited+0x5f0/0x5f0 [ 361.638389][ T1114] ? __call_rcu+0x740/0x740 [ 361.643643][ T1114] ? rcu_gp_is_expedited+0x70/0x70 [ 361.649498][ T1114] synchronize_rcu+0x27/0xa0 [ 361.654822][ T1114] key_garbage_collector+0x3d5/0x940 [ 361.660704][ T1114] process_one_work+0x9af/0x1740 [ 361.666088][ T1114] ? pwq_dec_nr_in_flight+0x320/0x320 [ 361.672267][ T1114] ? lock_acquire+0x190/0x410 [ 361.677497][ T1114] worker_thread+0x98/0xe40 [ 361.682665][ T1114] ? trace_hardirqs_on+0x67/0x240 [ 361.687902][ T1114] kthread+0x361/0x430 [ 361.692699][ T1114] ? process_one_work+0x1740/0x1740 [ 361.698099][ T1114] ? kthread_mod_delayed_work+0x1f0/0x1f0 [ 361.704671][ T1114] ret_from_fork+0x24/0x30 [ 361.709714][ T1114] [ 361.709714][ T1114] Showing all locks held in the system: [ 361.718278][ T1114] 2 locks held by kworker/0:1/13: [ 361.724075][ T1114] #0: ffff88802cc27d28 ((wq_completion)events){+.+.}, at: process_one_work+0x88b/0x1740 [ 361.735630][ T1114] #1: ffff88802c4b7dc0 (key_gc_work){+.+.}, at: process_one_work+0x8c1/0x1740 [ 361.745578][ T1114] 1 lock held by khungtaskd/1114: [ 361.751219][ T1114] #0: ffffffff895a4080 (rcu_read_lock){....}, at: debug_show_all_locks+0x5f/0x279 [ 361.761420][ T1114] 2 locks held by rsyslogd/7744: [ 361.766933][ T1114] #0: ffff88802674c860 (&f->f_pos_lock){+.+.}, at: __fdget_pos+0xee/0x110 [ 361.776648][ T1114] #1: ffff88802d537398 (&rq->lock){-.-.}, at: newidle_balance+0xa28/0xe80 [ 361.786337][ T1114] 2 locks held by getty/7867: [ 361.791602][ T1114] #0: ffff88802a100090 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 361.801359][ T1114] #1: ffffc900040122e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1c10 [ 361.811517][ T1114] 2 locks held by getty/7868: [ 361.816772][ T1114] #0: ffff888027013090 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 361.827034][ T1114] #1: ffffc900040162e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1c10 [ 361.837979][ T1114] 2 locks held by getty/7869: [ 361.843617][ T1114] #0: ffff88802a78e090 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 361.853876][ T1114] #1: ffffc9000400e2e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1c10 [ 361.864734][ T1114] 2 locks held by getty/7870: [ 361.870116][ T1114] #0: ffff88802a9fb090 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 361.880141][ T1114] #1: ffffc900040062e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1c10 [ 361.890882][ T1114] 2 locks held by getty/7871: [ 361.896051][ T1114] #0: ffff88802aeff090 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 361.906072][ T1114] #1: ffffc900026fa2e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1c10 [ 361.916750][ T1114] 2 locks held by getty/7872: [ 361.922188][ T1114] #0: ffff88801aedb090 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 361.931890][ T1114] #1: ffffc9000401a2e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1c10 [ 361.942545][ T1114] 2 locks held by getty/7873: [ 361.947690][ T1114] #0: ffff8880205ad090 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 361.957781][ T1114] #1: ffffc900026ea2e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1c10 [ 361.968490][ T1114] 3 locks held by syz-executor.1/7948: [ 361.974515][ T1114] [ 361.977048][ T1114] ============================================= [ 361.977048][ T1114] [ 361.986230][ T1114] NMI backtrace for cpu 2 [ 361.991011][ T1114] CPU: 2 PID: 1114 Comm: khungtaskd Not tainted 5.4.0-syzkaller #0 [ 361.999695][ T1114] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.12.0-59-gc9ba5276e321-prebuilt.qemu.org 04/01/2014 [ 362.000954][ T1114] Call Trace: [ 362.000954][ T1114] dump_stack+0x197/0x210 [ 362.000954][ T1114] nmi_cpu_backtrace.cold+0x70/0xb2 [ 362.000954][ T1114] ? vprintk_func+0x86/0x189 [ 362.000954][ T1114] ? lapic_can_unplug_cpu.cold+0x3a/0x3a [ 362.000954][ T1114] nmi_trigger_cpumask_backtrace+0x23b/0x28b [ 362.000954][ T1114] arch_trigger_cpumask_backtrace+0x14/0x20 [ 362.000954][ T1114] watchdog+0xb11/0x10c0 [ 362.000954][ T1114] kthread+0x361/0x430 [ 362.000954][ T1114] ? reset_hung_task_detector+0x30/0x30 [ 362.000954][ T1114] ? kthread_mod_delayed_work+0x1f0/0x1f0 [ 362.000954][ T1114] ret_from_fork+0x24/0x30 [ 362.079038][ T1114] Sending NMI from CPU 2 to CPUs 0-1,3: [ 362.085633][ C0] NMI backtrace for cpu 0 skipped: idling at native_safe_halt+0xe/0x10 [ 362.085728][ C3] NMI backtrace for cpu 3 skipped: idling at native_safe_halt+0xe/0x10 [ 362.086306][ C1] NMI backtrace for cpu 1 [ 362.086311][ C1] CPU: 1 PID: 7948 Comm: syz-executor.1 Not tainted 5.4.0-syzkaller #0 [ 362.086316][ C1] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.12.0-59-gc9ba5276e321-prebuilt.qemu.org 04/01/2014 [ 362.086318][ C1] RIP: 0010:perf_swevent_hrtimer+0x271/0x3e0 [ 362.086326][ C1] Code: 6d 24 31 ff 41 83 e5 02 44 89 ee e8 29 ce e8 ff 45 85 ed 75 32 e8 9f cc e8 ff 4c 89 f7 4c 89 f9 be 01 00 00 00 48 8d 54 24 40 <45> 31 f6 e8 17 fa ff ff 31 ff 41 89 c5 89 c6 e8 fb cd e8 ff 45 85 [ 362.086329][ C1] RSP: 0018:ffff88802d3095c0 EFLAGS: 00000006 [ 362.086334][ C1] RAX: ffff8880716b4200 RBX: 1ffff11005a612b8 RCX: ffff88802d309a28 [ 362.086338][ C1] RDX: ffff88802d309600 RSI: 0000000000000001 RDI: ffff888020c65000 [ 362.086341][ C1] RBP: ffff88802d309828 R08: ffff8880716b4200 R09: ffffed100418ca3d [ 362.086344][ C1] R10: ffffed100418ca3c R11: ffff888020c651e7 R12: ffff888020c65160 [ 362.086348][ C1] R13: 0000000000000000 R14: ffff888020c65000 R15: ffff88802d309a28 [ 362.086351][ C1] FS: 00007f30257f0700(0000) GS:ffff88802d300000(0000) knlGS:0000000000000000 [ 362.086354][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 362.086358][ C1] CR2: ffffffffff600400 CR3: 000000002471a000 CR4: 00000000003406e0 [ 362.086361][ C1] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 362.086364][ C1] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 362.086366][ C1] Call Trace: [ 362.086368][ C1] [ 362.086370][ C1] ? __perf_event_overflow+0x370/0x370 [ 362.086373][ C1] ? debug_object_deactivate+0x1d9/0x320 [ 362.086375][ C1] ? find_held_lock+0x35/0x130 [ 362.086377][ C1] ? lock_downgrade+0x920/0x920 [ 362.086379][ C1] ? rwlock_bug.part.0+0x90/0x90 [ 362.086382][ C1] ? __hrtimer_run_queues+0x2ec/0xe40 [ 362.086384][ C1] ? find_held_lock+0x35/0x130 [ 362.086386][ C1] ? __hrtimer_run_queues+0x2ec/0xe40 [ 362.086389][ C1] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 362.086392][ C1] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 362.086394][ C1] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 362.086397][ C1] __hrtimer_run_queues+0x364/0xe40 [ 362.086399][ C1] ? __perf_event_overflow+0x370/0x370 [ 362.086401][ C1] ? hrtimer_init+0x330/0x330 [ 362.086404][ C1] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 362.086407][ C1] ? ktime_get_update_offsets_now+0x2ce/0x430 [ 362.086409][ C1] hrtimer_interrupt+0x314/0x770 [ 362.086411][ C1] smp_apic_timer_interrupt+0x160/0x610 [ 362.086414][ C1] apic_timer_interrupt+0xf/0x20 [ 362.086423][ C1] RIP: 0010:native_read_msr_safe+0x4/0x40 [ 362.086431][ C1] Code: 44 00 00 c3 55 48 c1 e2 20 89 f6 48 89 e5 48 09 d6 48 83 ec 08 89 c2 89 45 fc e8 07 a0 6f 02 8b 45 fc c9 c3 66 90 89 f9 0f 32 <31> c9 89 0e 0f 1f 44 00 00 48 c1 e2 20 48 09 d0 c3 55 48 c1 e2 20 [ 362.086433][ C1] RSP: 0018:ffff88802d309ad8 EFLAGS: 00000206 ORIG_RAX: ffffffffffffff13 [ 362.086439][ C1] RAX: 0000000000000000 RBX: 1ffff11005a6135d RCX: 000000000000017a [ 362.086443][ C1] RDX: 0000000000000000 RSI: ffff88802d309b08 RDI: 000000000000017a [ 362.086446][ C1] RBP: ffff88802d309b70 R08: ffff8880716b4200 R09: ffff88802d309b08 [ 362.086449][ C1] R10: ffffed1005a61389 R11: ffff88802d309c4f R12: ffff88802d309b48 [ 362.086453][ C1] R13: 000000000000017a R14: dffffc0000000000 R15: 000000000001b200 [ 362.086455][ C1] ? apic_timer_interrupt+0xa/0x20 [ 362.086457][ C1] ? mce_rdmsrl+0x130/0x220 [ 362.086460][ C1] ? mce_is_memory_error+0x150/0x150 [ 362.086462][ C1] ? mark_lock+0xc2/0x1220 [ 362.086464][ C1] ? __kasan_check_read+0x11/0x20 [ 362.086467][ C1] machine_check_poll+0xeb/0x500 [ 362.086469][ C1] ? debug_object_deactivate+0x1d9/0x320 [ 362.086471][ C1] ? mce_inject_log+0x40/0x40 [ 362.086474][ C1] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 362.086476][ C1] ? __kasan_check_read+0x11/0x20 [ 362.086478][ C1] mce_timer_fn+0x18e/0x220 [ 362.086481][ C1] call_timer_fn+0x1ac/0x780 [ 362.086483][ C1] ? mce_cpu_restart+0x80/0x80 [ 362.086485][ C1] ? msleep_interruptible+0x150/0x150 [ 362.086488][ C1] ? run_timer_softirq+0x6b1/0x1790 [ 362.086490][ C1] ? trace_hardirqs_on+0x67/0x240 [ 362.086492][ C1] ? mce_cpu_restart+0x80/0x80 [ 362.086494][ C1] ? mce_cpu_restart+0x80/0x80 [ 362.086497][ C1] run_timer_softirq+0x6c3/0x1790 [ 362.086499][ C1] ? add_timer+0x930/0x930 [ 362.086502][ C1] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 362.086504][ C1] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 362.086507][ C1] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 362.086509][ C1] __do_softirq+0x262/0x98c [ 362.086511][ C1] ? sched_clock_cpu+0x14e/0x1b0 [ 362.086513][ C1] irq_exit+0x19b/0x1e0 [ 362.086516][ C1] smp_apic_timer_interrupt+0x1a3/0x610 [ 362.086518][ C1] apic_timer_interrupt+0xf/0x20 [ 362.086520][ C1] [ 362.086522][ C1] RIP: 0010:_raw_spin_unlock_irq+0x4f/0x80 [ 362.086530][ C1] Code: c0 68 34 53 89 48 ba 00 00 00 00 00 fc ff df 48 c1 e8 03 80 3c 10 00 75 33 48 83 3d 12 2a 99 01 00 74 20 fb 66 0f 1f 44 00 00 01 00 00 00 e8 e7 6b 96 f9 65 8b 05 18 14 48 78 85 c0 74 06 41 [ 362.086532][ C1] RSP: 0018:ffff8880716bfb10 EFLAGS: 00000286 ORIG_RAX: ffffffffffffff13 [ 362.086538][ C1] RAX: 1ffffffff12a668d RBX: ffff8880716b4200 RCX: 0000000000000006 [ 362.086541][ C1] RDX: dffffc0000000000 RSI: 0000000000000008 RDI: ffff8880716b4a94 [ 362.086544][ C1] RBP: ffff8880716bfb18 R08: 1ffffffff15d29b8 R09: fffffbfff15d29b9 [ 362.086548][ C1] R10: fffffbfff15d29b8 R11: ffffffff8ae94dc7 R12: ffff88802d337380 [ 362.086551][ C1] R13: ffff88802c4b8380 R14: ffff888023802800 R15: 0000000000000000 [ 362.086553][ C1] finish_task_switch+0x147/0x750 [ 362.086556][ C1] ? finish_task_switch+0x119/0x750 [ 362.086558][ C1] __schedule+0x8e9/0x1f30 [ 362.086560][ C1] ? __sched_text_start+0x8/0x8 [ 362.086562][ C1] ? preempt_schedule+0x4b/0x60 [ 362.086565][ C1] preempt_schedule_common+0x4f/0xe0 [ 362.086567][ C1] preempt_schedule+0x4b/0x60 [ 362.086569][ C1] ___preempt_schedule+0x16/0x18 [ 362.086572][ C1] _raw_spin_unlock_irqrestore+0xb8/0xe0 [ 362.086574][ C1] perf_unpin_context+0x55/0x70 [ 362.086577][ C1] __do_sys_perf_event_open+0x1cc4/0x2c70 [ 362.086579][ C1] ? perf_event_set_output+0x4e0/0x4e0 [ 362.086582][ C1] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 362.086584][ C1] ? put_timespec64+0xda/0x140 [ 362.086587][ C1] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 362.086589][ C1] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 362.086591][ C1] ? do_syscall_64+0x26/0x790 [ 362.086594][ C1] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 362.086596][ C1] ? do_syscall_64+0x26/0x790 [ 362.086599][ C1] __x64_sys_perf_event_open+0xbe/0x150 [ 362.086601][ C1] do_syscall_64+0xfa/0x790 [ 362.086604][ C1] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 362.086606][ C1] RIP: 0033:0x45a759 [ 362.086613][ C1] Code: bd b1 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 8b b1 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 362.086616][ C1] RSP: 002b:00007f30257efc88 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 362.086622][ C1] RAX: ffffffffffffffda RBX: 000000000071bf00 RCX: 000000000045a759 [ 362.086625][ C1] RDX: ffffffffffffffff RSI: 0000000000000000 RDI: 000000002001d000 [ 362.086628][ C1] RBP: 0000000000000005 R08: 0000000000000000 R09: 0000000000000000 [ 362.086632][ C1] R10: ffffffffffffffff R11: 0000000000000246 R12: 00007f30257f06d4 [ 362.086635][ C1] R13: 00000000004aec2b R14: 00000000006f1ca8 R15: 00000000ffffffff [ 362.086983][ T1114] Kernel panic - not syncing: hung_task: blocked tasks [ 362.688986][ T1114] CPU: 2 PID: 1114 Comm: khungtaskd Not tainted 5.4.0-syzkaller #0 [ 362.688986][ T1114] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.12.0-59-gc9ba5276e321-prebuilt.qemu.org 04/01/2014 [ 362.688986][ T1114] Call Trace: [ 362.688986][ T1114] dump_stack+0x197/0x210 [ 362.688986][ T1114] panic+0x2e3/0x75c [ 362.688986][ T1114] ? add_taint.cold+0x16/0x16 [ 362.688986][ T1114] ? lapic_can_unplug_cpu.cold+0x3a/0x3a [ 362.688986][ T1114] ? ___preempt_schedule+0x16/0x18 [ 362.688986][ T1114] ? nmi_trigger_cpumask_backtrace+0x21b/0x28b [ 362.688986][ T1114] ? nmi_trigger_cpumask_backtrace+0x24c/0x28b [ 362.688986][ T1114] ? nmi_trigger_cpumask_backtrace+0x256/0x28b [ 362.688986][ T1114] ? nmi_trigger_cpumask_backtrace+0x21b/0x28b [ 362.688986][ T1114] watchdog+0xb22/0x10c0 [ 362.688986][ T1114] kthread+0x361/0x430 [ 362.688986][ T1114] ? reset_hung_task_detector+0x30/0x30 [ 362.688986][ T1114] ? kthread_mod_delayed_work+0x1f0/0x1f0 [ 362.688986][ T1114] ret_from_fork+0x24/0x30 [ 362.688986][ T1114] Kernel Offset: disabled [ 362.688986][ T1114] Rebooting in 86400 seconds..