audit: type=1400 audit(1566942806.723:51): avc: denied { write } for pid=8123 comm="syz-executor.3" path="socket:[30033]" dev="sockfs" ino=30033 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 INFO: task syz-executor.1:8077 blocked for more than 140 seconds. Not tainted 4.19.68 #42 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. syz-executor.1 D28216 8077 7792 0x00000004 Call Trace: context_switch kernel/sched/core.c:2826 [inline] __schedule+0x866/0x1dc0 kernel/sched/core.c:3474 schedule+0x92/0x1c0 kernel/sched/core.c:3518 schedule_timeout+0x8c8/0xfc0 kernel/time/timer.c:1780 do_wait_for_common kernel/sched/completion.c:83 [inline] __wait_for_common kernel/sched/completion.c:104 [inline] wait_for_common kernel/sched/completion.c:115 [inline] wait_for_completion+0x29c/0x440 kernel/sched/completion.c:136 kthread_stop+0x116/0x6c0 kernel/kthread.c:550 sdr_cap_stop_streaming+0x213/0x330 drivers/media/platform/vivid/vivid-sdr-cap.c:301 __vb2_queue_cancel+0xb1/0x790 drivers/media/common/videobuf2/videobuf2-core.c:1682 vb2_core_streamoff+0x60/0x150 drivers/media/common/videobuf2/videobuf2-core.c:1816 __vb2_cleanup_fileio+0x78/0x170 drivers/media/common/videobuf2/videobuf2-core.c:2343 vb2_core_queue_release+0x20/0x80 drivers/media/common/videobuf2/videobuf2-core.c:2070 vb2_queue_release drivers/media/common/videobuf2/videobuf2-v4l2.c:671 [inline] _vb2_fop_release+0x1cf/0x2a0 drivers/media/common/videobuf2/videobuf2-v4l2.c:842 vb2_fop_release+0x75/0xc0 drivers/media/common/videobuf2/videobuf2-v4l2.c:856 vivid_fop_release+0x18e/0x430 drivers/media/platform/vivid/vivid-core.c:474 v4l2_release+0xf9/0x1a0 drivers/media/v4l2-core/v4l2-dev.c:448 __fput+0x2dd/0x8b0 fs/file_table.c:278 ____fput+0x16/0x20 fs/file_table.c:309 task_work_run+0x145/0x1c0 kernel/task_work.c:113 tracehook_notify_resume include/linux/tracehook.h:193 [inline] exit_to_usermode_loop+0x273/0x2c0 arch/x86/entry/common.c:167 prepare_exit_to_usermode arch/x86/entry/common.c:198 [inline] syscall_return_slowpath arch/x86/entry/common.c:271 [inline] do_syscall_64+0x53d/0x620 arch/x86/entry/common.c:296 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x413561 Code: ff ff 31 db e9 b6 fe ff ff 48 8b 84 24 98 00 00 00 48 89 04 24 48 c7 44 24 08 00 00 00 00 48 8b 44 24 68 48 89 44 24 10 48 c7 <44> 24 18 02 00 00 00 e8 23 02 00 00 48 8b 44 24 20 48 89 c1 48 c1 RSP: 002b:00007ffcc0f71360 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 RAX: 0000000000000000 RBX: 0000000000000004 RCX: 0000000000413561 RDX: 0000001b32a20000 RSI: 0000000000000000 RDI: 0000000000000003 RBP: 0000000000000001 R08: ffffffff81708b16 R09: 00000000ceb773d4 R10: 00007ffcc0f71440 R11: 0000000000000293 R12: 000000000075bf20 R13: 000000000000fec7 R14: 0000000000760340 R15: ffffffffffffffff Showing all locks held in the system: 1 lock held by khungtaskd/1037: #0: 00000000c4faaea0 (rcu_read_lock){....}, at: debug_show_all_locks+0x5f/0x27e kernel/locking/lockdep.c:4435 1 lock held by rsyslogd/7626: #0: 000000008b593b73 (&f->f_pos_lock){+.+.}, at: __fdget_pos+0xee/0x110 fs/file.c:767 2 locks held by getty/7748: #0: 00000000a4b40c90 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 drivers/tty/tty_ldsem.c:362 #1: 00000000d43aff8e (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b30 drivers/tty/n_tty.c:2154 2 locks held by getty/7749: #0: 0000000059080d33 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 drivers/tty/tty_ldsem.c:362 #1: 00000000d6ae9343 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b30 drivers/tty/n_tty.c:2154 2 locks held by getty/7750: #0: 00000000861cad83 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 drivers/tty/tty_ldsem.c:362 #1: 0000000000e9c22c (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b30 drivers/tty/n_tty.c:2154 2 locks held by getty/7751: #0: 00000000c611df86 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 drivers/tty/tty_ldsem.c:362 #1: 000000007a318853 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b30 drivers/tty/n_tty.c:2154 2 locks held by getty/7752: #0: 0000000000042883 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 drivers/tty/tty_ldsem.c:362 #1: 00000000e722e5f9 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b30 drivers/tty/n_tty.c:2154 2 locks held by getty/7753: #0: 0000000055bb04af (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 drivers/tty/tty_ldsem.c:362 #1: 000000007dbde7cf (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b30 drivers/tty/n_tty.c:2154 2 locks held by getty/7754: #0: 0000000007d6c9d2 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 drivers/tty/tty_ldsem.c:362 #1: 00000000a60aee53 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b30 drivers/tty/n_tty.c:2154 ============================================= NMI backtrace for cpu 1 CPU: 1 PID: 1037 Comm: khungtaskd Not tainted 4.19.68 #42 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x172/0x1f0 lib/dump_stack.c:113 nmi_cpu_backtrace.cold+0x63/0xa4 lib/nmi_backtrace.c:101 nmi_trigger_cpumask_backtrace+0x1b0/0x1f8 lib/nmi_backtrace.c:62 arch_trigger_cpumask_backtrace+0x14/0x20 arch/x86/kernel/apic/hw_nmi.c:38 trigger_all_cpu_backtrace include/linux/nmi.h:146 [inline] check_hung_uninterruptible_tasks kernel/hung_task.c:203 [inline] watchdog+0x9df/0xee0 kernel/hung_task.c:287 kthread+0x354/0x420 kernel/kthread.c:246 ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:415 Sending NMI from CPU 1 to CPUs 0: NMI backtrace for cpu 0 skipped: idling at native_safe_halt+0xe/0x10 arch/x86/include/asm/irqflags.h:60