Warning: Permanently added '10.128.0.72' (ED25519) to the list of known hosts. 2023/10/16 12:48:38 ignoring optional flag "sandboxArg"="0" 2023/10/16 12:48:38 parsed 1 programs 2023/10/16 12:48:38 executed programs: 0 [ 46.246231][ T25] audit: type=1400 audit(1697460518.335:164): avc: denied { getattr } for pid=2088 comm="syz-execprog" path="user:[4026531837]" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 46.271517][ T25] audit: type=1400 audit(1697460518.335:165): avc: denied { read } for pid=2088 comm="syz-execprog" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 46.295220][ T25] audit: type=1400 audit(1697460518.335:166): avc: denied { open } for pid=2088 comm="syz-execprog" path="user:[4026531837]" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 46.318853][ T25] audit: type=1400 audit(1697460518.335:167): avc: denied { mounton } for pid=2093 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 46.344256][ T25] audit: type=1400 audit(1697460518.335:168): avc: denied { mount } for pid=2093 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 46.368666][ T25] audit: type=1400 audit(1697460518.335:169): avc: denied { write } for pid=2093 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 46.389702][ T25] audit: type=1400 audit(1697460518.335:170): avc: denied { read } for pid=2093 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 46.410436][ T25] audit: type=1400 audit(1697460518.365:171): avc: denied { read } for pid=1408 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1 [ 46.432953][ T25] audit: type=1400 audit(1697460518.365:172): avc: denied { read } for pid=1408 comm="dhcpcd" name="n13" dev="tmpfs" ino=296 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 46.454397][ T25] audit: type=1400 audit(1697460518.365:173): avc: denied { open } for pid=1408 comm="dhcpcd" path="/run/udev/data/n13" dev="tmpfs" ino=296 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 209.821499][ T27] INFO: task syz-executor.0:2099 blocked for more than 143 seconds. [ 209.829571][ T27] Not tainted 6.6.0-rc6-syzkaller #0 [ 209.835400][ T27] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 209.844072][ T27] task:syz-executor.0 state:D stack:12176 pid:2099 ppid:1 flags:0x00000006 [ 209.853711][ T27] Call Trace: [ 209.856991][ T27] [ 209.859988][ T27] __schedule+0x3a2/0x9e0 [ 209.865033][ T27] schedule+0x59/0xa0 [ 209.868995][ T27] schedule_preempt_disabled+0x1b/0xa0 [ 209.874543][ T27] rwsem_down_read_slowpath+0x2df/0x580 [ 209.881578][ T27] down_read+0x66/0xf0 [ 209.885721][ T27] walk_component+0xe5/0x170 [ 209.890718][ T27] link_path_walk.part.0.constprop.0+0x23d/0x370 [ 209.897050][ T27] path_openat+0xac/0xc20 [ 209.901359][ T27] do_filp_open+0xae/0x150 [ 209.905776][ T27] do_sys_openat2+0xa2/0xd0 [ 209.910264][ T27] __x64_sys_openat+0x69/0x90 [ 209.915085][ T27] do_syscall_64+0x38/0x80 [ 209.919504][ T27] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 209.925519][ T27] RIP: 0033:0x7ffb9587c311 [ 209.930191][ T27] RSP: 002b:00007ffed4a12470 EFLAGS: 00000287 ORIG_RAX: 0000000000000101 [ 209.938613][ T27] RAX: ffffffffffffffda RBX: 0000000000000002 RCX: 00007ffb9587c311 [ 209.947167][ T27] RDX: 0000000000090800 RSI: 00007ffb958d7b46 RDI: 00000000ffffff9c [ 209.955765][ T27] RBP: 00007ffed4a1253c R08: 0000000000000032 R09: 0000000000000001 [ 209.963788][ T27] R10: 0000000000000000 R11: 0000000000000287 R12: 0000000000000000 [ 209.972796][ T27] R13: 000000000000bcba R14: 000000000000b977 R15: 0000000000000009 [ 209.980862][ T27] [ 209.983911][ T27] INFO: task syz-executor.0:2516 blocked for more than 143 seconds. [ 209.992703][ T27] Not tainted 6.6.0-rc6-syzkaller #0 [ 209.998487][ T27] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 210.007313][ T27] task:syz-executor.0 state:D stack:13600 pid:2516 ppid:2099 flags:0x00004006 [ 210.016886][ T27] Call Trace: [ 210.020140][ T27] [ 210.023074][ T27] __schedule+0x3a2/0x9e0 [ 210.027467][ T27] schedule+0x59/0xa0 [ 210.031484][ T27] request_wait_answer+0x1b2/0x2a0 [ 210.036590][ T27] ? swake_up_one+0x70/0x70 [ 210.041167][ T27] fuse_simple_request+0x1be/0x2a0 [ 210.046293][ T27] fuse_lookup_name+0xa4/0x1a0 [ 210.051503][ T27] ? __mutex_lock+0x13f/0x9e0 [ 210.056878][ T27] fuse_lookup+0x80/0x1a0 [ 210.061194][ T27] __lookup_slow+0xf4/0x1a0 [ 210.065840][ T27] walk_component+0xf4/0x170 [ 210.070561][ T27] link_path_walk.part.0.constprop.0+0x23d/0x370 [ 210.076922][ T27] path_openat+0xac/0xc20 [ 210.081361][ T27] do_filp_open+0xae/0x150 [ 210.085831][ T27] do_sys_openat2+0xa2/0xd0 [ 210.090321][ T27] __x64_sys_openat+0x69/0x90 [ 210.095088][ T27] do_syscall_64+0x38/0x80 [ 210.099582][ T27] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 210.105590][ T27] RIP: 0033:0x7ffb9587c859 [ 210.110493][ T27] RSP: 002b:00007ffb966310c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 210.119094][ T27] RAX: ffffffffffffffda RBX: 00007ffb9599bf80 RCX: 00007ffb9587c859 [ 210.127241][ T27] RDX: 0000000000000042 RSI: 0000000020002080 RDI: ffffffffffffff9c [ 210.135296][ T27] RBP: 00007ffb958d8ad0 R08: 0000000000000000 R09: 0000000000000000 [ 210.143373][ T27] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 210.151918][ T27] R13: 0000000000000006 R14: 00007ffb9599bf80 R15: 00007ffed4a121c8 [ 210.159963][ T27] [ 210.163015][ T27] INFO: task syz-executor.0:2517 blocked for more than 143 seconds. [ 210.171076][ T27] Not tainted 6.6.0-rc6-syzkaller #0 [ 210.177358][ T27] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 210.186054][ T27] task:syz-executor.0 state:D stack:14632 pid:2517 ppid:2099 flags:0x00000006 [ 210.195462][ T27] Call Trace: [ 210.198926][ T27] [ 210.202062][ T27] __schedule+0x3a2/0x9e0 [ 210.206474][ T27] schedule+0x59/0xa0 [ 210.210562][ T27] schedule_preempt_disabled+0x1b/0xa0 [ 210.216452][ T27] rwsem_down_write_slowpath+0x2d2/0x730 [ 210.222143][ T27] down_write_nested+0x7c/0x90 [ 210.226909][ T27] fuse_reverse_inval_entry+0x44/0x210 [ 210.232489][ T27] fuse_dev_do_write+0x5d5/0xfe0 [ 210.237850][ T27] fuse_dev_write+0x5e/0x90 [ 210.242780][ T27] vfs_write+0x24f/0x460 [ 210.247120][ T27] ksys_write+0x70/0xf0 [ 210.251273][ T27] do_syscall_64+0x38/0x80 [ 210.255719][ T27] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 210.261640][ T27] RIP: 0033:0x7ffb9587c859 [ 210.266041][ T27] RSP: 002b:00007ffb966100c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 210.274473][ T27] RAX: ffffffffffffffda RBX: 00007ffb9599c050 RCX: 00007ffb9587c859 [ 210.282593][ T27] RDX: 000000000000002c RSI: 00000000200000c0 RDI: 0000000000000003 [ 210.290650][ T27] RBP: 00007ffb958d8ad0 R08: 0000000000000000 R09: 0000000000000000 [ 210.299508][ T27] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 210.308099][ T27] R13: 000000000000006e R14: 00007ffb9599c050 R15: 00007ffed4a121c8 [ 210.316155][ T27] [ 210.319155][ T27] [ 210.319155][ T27] Showing all locks held in the system: [ 210.326964][ T27] 1 lock held by khungtaskd/27: [ 210.331801][ T27] #0: ffffffff82fdde80 (rcu_read_lock){....}-{1:2}, at: debug_show_all_locks+0x36/0x120 [ 210.342035][ T27] 2 locks held by kworker/u4:4/410: [ 210.347391][ T27] 2 locks held by getty/1481: [ 210.352443][ T27] #0: ffff8881096f60a0 (&tty->ldisc_sem){....}-{0:0}, at: tty_ldisc_ref_wait+0x23/0x50 [ 210.362318][ T27] #1: ffffc900003fb2f0 (&ldata->atomic_read_lock){....}-{3:3}, at: n_tty_read+0x519/0x650 [ 210.372665][ T27] 1 lock held by syz-executor.0/2099: [ 210.378193][ T27] #0: ffff88817d2747d0 (&type->i_mutex_dir_key#8){....}-{3:3}, at: walk_component+0xe5/0x170 [ 210.388548][ T27] 2 locks held by syz-executor.0/2516: [ 210.394353][ T27] #0: ffff88817d2747d0 (&type->i_mutex_dir_key#8){....}-{3:3}, at: walk_component+0xe5/0x170 [ 210.404611][ T27] #1: ffff88817d274c40 (&fi->mutex){....}-{3:3}, at: fuse_lock_inode+0x2c/0x40 [ 210.413986][ T27] 2 locks held by syz-executor.0/2517: [ 210.419589][ T27] #0: ffff888107b97f38 (&fc->killsb){....}-{3:3}, at: fuse_dev_do_write+0x5bb/0xfe0 [ 210.429329][ T27] #1: ffff88817d2747d0 (&type->i_mutex_dir_key#8/1){....}-{3:3}, at: fuse_reverse_inval_entry+0x44/0x210 [ 210.440879][ T27] [ 210.443193][ T27] ============================================= [ 210.443193][ T27] [ 210.451593][ T27] NMI backtrace for cpu 1 [ 210.455891][ T27] CPU: 1 PID: 27 Comm: khungtaskd Not tainted 6.6.0-rc6-syzkaller #0 [ 210.464013][ T27] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/06/2023 [ 210.474215][ T27] Call Trace: [ 210.477468][ T27] [ 210.480643][ T27] dump_stack_lvl+0x3d/0x60 [ 210.485202][ T27] nmi_cpu_backtrace+0xcc/0x110 [ 210.490030][ T27] ? lapic_can_unplug_cpu+0xa0/0xa0 [ 210.495377][ T27] nmi_trigger_cpumask_backtrace+0xd1/0x130 [ 210.501410][ T27] watchdog+0x615/0x640 [ 210.505532][ T27] ? proc_dohung_task_timeout_secs+0x30/0x30 [ 210.511649][ T27] kthread+0xde/0x110 [ 210.515623][ T27] ? kthread_complete_and_exit+0x20/0x20 [ 210.521220][ T27] ret_from_fork+0x2c/0x40 [ 210.525605][ T27] ? kthread_complete_and_exit+0x20/0x20 [ 210.531379][ T27] ret_from_fork_asm+0x11/0x20 [ 210.536199][ T27] [ 210.539308][ T27] Sending NMI from CPU 1 to CPUs 0: [ 210.544503][ C0] NMI backtrace for cpu 0 [ 210.544505][ C0] CPU: 0 PID: 410 Comm: kworker/u4:4 Not tainted 6.6.0-rc6-syzkaller #0 [ 210.544508][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/06/2023 [ 210.544510][ C0] Workqueue: events_unbound toggle_allocation_gate [ 210.544517][ C0] RIP: 0010:__default_send_IPI_dest_field+0x3b/0x80 [ 210.544522][ C0] Code: 89 d3 75 04 eb 28 f3 90 8b 04 25 00 c3 5f ff f6 c4 10 75 f2 44 89 e0 89 04 25 10 c3 5f ff 89 f0 09 d8 89 04 25 00 c3 5f ff 5b <5d> 41 5c c3 bd e8 03 00 00 eb 16 65 ff 05 8f a1 fd 7e bf bc 8d 06 [ 210.544525][ C0] RSP: 0018:ffffc900018e3c80 EFLAGS: 00000002 [ 210.544527][ C0] RAX: 00000000000008fb RBX: 0000000000000202 RCX: 0000000000000002 [ 210.544529][ C0] RDX: 0000000000000800 RSI: 00000000000000fb RDI: 0000000002000000 [ 210.544530][ C0] RBP: 0000000000000001 R08: ffff888237d31fe0 R09: 0000000000000001 [ 210.544532][ C0] R10: 0000000000000000 R11: 0000000000000006 R12: 0000000002000000 [ 210.544533][ C0] R13: 0000000000000001 R14: 0000000000000001 R15: 0000000000000000 [ 210.544534][ C0] FS: 0000000000000000(0000) GS:ffff888237c00000(0000) knlGS:0000000000000000 [ 210.544540][ C0] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 210.544541][ C0] CR2: 00007fe3bb813540 CR3: 0000000002eac000 CR4: 00000000003506f0 [ 210.544543][ C0] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 210.544544][ C0] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 210.544546][ C0] Call Trace: [ 210.544547][ C0] [ 210.544548][ C0] ? nmi_cpu_backtrace+0x8b/0x110 [ 210.544553][ C0] ? __default_send_IPI_dest_field+0x3b/0x80 [ 210.544556][ C0] ? nmi_cpu_backtrace_handler+0xc/0x10 [ 210.544559][ C0] ? nmi_handle+0xb5/0x1a0 [ 210.544563][ C0] ? __default_send_IPI_dest_field+0x3b/0x80 [ 210.544566][ C0] ? default_do_nmi+0x6b/0x2b0 [ 210.544572][ C0] ? exc_nmi+0x157/0x1a0 [ 210.544575][ C0] ? end_repeat_nmi+0x16/0x31 [ 210.544582][ C0] ? __default_send_IPI_dest_field+0x3b/0x80 [ 210.544584][ C0] ? __default_send_IPI_dest_field+0x3b/0x80 [ 210.544587][ C0] ? __default_send_IPI_dest_field+0x3b/0x80 [ 210.544590][ C0] [ 210.544590][ C0] [ 210.544591][ C0] flat_send_IPI_mask+0x15/0x30 [ 210.544595][ C0] smp_call_function_many_cond+0x5ff/0x670 [ 210.544601][ C0] ? __text_poke+0x4a0/0x4a0 [ 210.544604][ C0] ? setup_data_read+0xe0/0xe0 [ 210.544606][ C0] ? __text_poke+0x4a0/0x4a0 [ 210.544609][ C0] on_each_cpu_cond_mask+0x3b/0x70 [ 210.544612][ C0] ? __kmem_cache_alloc_node+0xaf/0x3a0 [ 210.544615][ C0] ? __kmem_cache_alloc_node+0xb0/0x3a0 [ 210.544617][ C0] text_poke_bp_batch+0x2e8/0x310 [ 210.544620][ C0] ? process_one_work+0x1a2/0x4c0 [ 210.544625][ C0] text_poke_finish+0x1a/0x30 [ 210.544628][ C0] arch_jump_label_transform_apply+0x17/0x30 [ 210.544631][ C0] static_key_disable_cpuslocked+0x4a/0x60 [ 210.544636][ C0] static_key_disable+0x15/0x20 [ 210.544639][ C0] toggle_allocation_gate+0x6d/0x120 [ 210.544642][ C0] ? swake_up_one+0x70/0x70 [ 210.544647][ C0] process_one_work+0x208/0x4c0 [ 210.544651][ C0] worker_thread+0x1c3/0x380 [ 210.544655][ C0] ? _raw_spin_unlock_irqrestore+0x3c/0x60 [ 210.544660][ C0] ? rescuer_thread+0x380/0x380 [ 210.544664][ C0] kthread+0xde/0x110 [ 210.544667][ C0] ? kthread_complete_and_exit+0x20/0x20 [ 210.544670][ C0] ret_from_fork+0x2c/0x40 [ 210.544674][ C0] ? kthread_complete_and_exit+0x20/0x20 [ 210.544677][ C0] ret_from_fork_asm+0x11/0x20 [ 210.544681][ C0] [ 210.545500][ T27] Kernel panic - not syncing: hung_task: blocked tasks [ 210.900026][ T27] Kernel Offset: disabled [ 210.904325][ T27] Rebooting in 86400 seconds..