Warning: Permanently added '10.128.0.72' (ED25519) to the list of known hosts.
2023/10/16 12:48:38 ignoring optional flag "sandboxArg"="0"
2023/10/16 12:48:38 parsed 1 programs
2023/10/16 12:48:38 executed programs: 0
[ 46.246231][ T25] audit: type=1400 audit(1697460518.335:164): avc: denied { getattr } for pid=2088 comm="syz-execprog" path="user:[4026531837]" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1
[ 46.271517][ T25] audit: type=1400 audit(1697460518.335:165): avc: denied { read } for pid=2088 comm="syz-execprog" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1
[ 46.295220][ T25] audit: type=1400 audit(1697460518.335:166): avc: denied { open } for pid=2088 comm="syz-execprog" path="user:[4026531837]" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1
[ 46.318853][ T25] audit: type=1400 audit(1697460518.335:167): avc: denied { mounton } for pid=2093 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1
[ 46.344256][ T25] audit: type=1400 audit(1697460518.335:168): avc: denied { mount } for pid=2093 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1
[ 46.368666][ T25] audit: type=1400 audit(1697460518.335:169): avc: denied { write } for pid=2093 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1
[ 46.389702][ T25] audit: type=1400 audit(1697460518.335:170): avc: denied { read } for pid=2093 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1
[ 46.410436][ T25] audit: type=1400 audit(1697460518.365:171): avc: denied { read } for pid=1408 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1
[ 46.432953][ T25] audit: type=1400 audit(1697460518.365:172): avc: denied { read } for pid=1408 comm="dhcpcd" name="n13" dev="tmpfs" ino=296 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1
[ 46.454397][ T25] audit: type=1400 audit(1697460518.365:173): avc: denied { open } for pid=1408 comm="dhcpcd" path="/run/udev/data/n13" dev="tmpfs" ino=296 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1
[ 209.821499][ T27] INFO: task syz-executor.0:2099 blocked for more than 143 seconds.
[ 209.829571][ T27] Not tainted 6.6.0-rc6-syzkaller #0
[ 209.835400][ T27] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
[ 209.844072][ T27] task:syz-executor.0 state:D stack:12176 pid:2099 ppid:1 flags:0x00000006
[ 209.853711][ T27] Call Trace:
[ 209.856991][ T27]
[ 209.859988][ T27] __schedule+0x3a2/0x9e0
[ 209.865033][ T27] schedule+0x59/0xa0
[ 209.868995][ T27] schedule_preempt_disabled+0x1b/0xa0
[ 209.874543][ T27] rwsem_down_read_slowpath+0x2df/0x580
[ 209.881578][ T27] down_read+0x66/0xf0
[ 209.885721][ T27] walk_component+0xe5/0x170
[ 209.890718][ T27] link_path_walk.part.0.constprop.0+0x23d/0x370
[ 209.897050][ T27] path_openat+0xac/0xc20
[ 209.901359][ T27] do_filp_open+0xae/0x150
[ 209.905776][ T27] do_sys_openat2+0xa2/0xd0
[ 209.910264][ T27] __x64_sys_openat+0x69/0x90
[ 209.915085][ T27] do_syscall_64+0x38/0x80
[ 209.919504][ T27] entry_SYSCALL_64_after_hwframe+0x63/0xcd
[ 209.925519][ T27] RIP: 0033:0x7ffb9587c311
[ 209.930191][ T27] RSP: 002b:00007ffed4a12470 EFLAGS: 00000287 ORIG_RAX: 0000000000000101
[ 209.938613][ T27] RAX: ffffffffffffffda RBX: 0000000000000002 RCX: 00007ffb9587c311
[ 209.947167][ T27] RDX: 0000000000090800 RSI: 00007ffb958d7b46 RDI: 00000000ffffff9c
[ 209.955765][ T27] RBP: 00007ffed4a1253c R08: 0000000000000032 R09: 0000000000000001
[ 209.963788][ T27] R10: 0000000000000000 R11: 0000000000000287 R12: 0000000000000000
[ 209.972796][ T27] R13: 000000000000bcba R14: 000000000000b977 R15: 0000000000000009
[ 209.980862][ T27]
[ 209.983911][ T27] INFO: task syz-executor.0:2516 blocked for more than 143 seconds.
[ 209.992703][ T27] Not tainted 6.6.0-rc6-syzkaller #0
[ 209.998487][ T27] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
[ 210.007313][ T27] task:syz-executor.0 state:D stack:13600 pid:2516 ppid:2099 flags:0x00004006
[ 210.016886][ T27] Call Trace:
[ 210.020140][ T27]
[ 210.023074][ T27] __schedule+0x3a2/0x9e0
[ 210.027467][ T27] schedule+0x59/0xa0
[ 210.031484][ T27] request_wait_answer+0x1b2/0x2a0
[ 210.036590][ T27] ? swake_up_one+0x70/0x70
[ 210.041167][ T27] fuse_simple_request+0x1be/0x2a0
[ 210.046293][ T27] fuse_lookup_name+0xa4/0x1a0
[ 210.051503][ T27] ? __mutex_lock+0x13f/0x9e0
[ 210.056878][ T27] fuse_lookup+0x80/0x1a0
[ 210.061194][ T27] __lookup_slow+0xf4/0x1a0
[ 210.065840][ T27] walk_component+0xf4/0x170
[ 210.070561][ T27] link_path_walk.part.0.constprop.0+0x23d/0x370
[ 210.076922][ T27] path_openat+0xac/0xc20
[ 210.081361][ T27] do_filp_open+0xae/0x150
[ 210.085831][ T27] do_sys_openat2+0xa2/0xd0
[ 210.090321][ T27] __x64_sys_openat+0x69/0x90
[ 210.095088][ T27] do_syscall_64+0x38/0x80
[ 210.099582][ T27] entry_SYSCALL_64_after_hwframe+0x63/0xcd
[ 210.105590][ T27] RIP: 0033:0x7ffb9587c859
[ 210.110493][ T27] RSP: 002b:00007ffb966310c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000101
[ 210.119094][ T27] RAX: ffffffffffffffda RBX: 00007ffb9599bf80 RCX: 00007ffb9587c859
[ 210.127241][ T27] RDX: 0000000000000042 RSI: 0000000020002080 RDI: ffffffffffffff9c
[ 210.135296][ T27] RBP: 00007ffb958d8ad0 R08: 0000000000000000 R09: 0000000000000000
[ 210.143373][ T27] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
[ 210.151918][ T27] R13: 0000000000000006 R14: 00007ffb9599bf80 R15: 00007ffed4a121c8
[ 210.159963][ T27]
[ 210.163015][ T27] INFO: task syz-executor.0:2517 blocked for more than 143 seconds.
[ 210.171076][ T27] Not tainted 6.6.0-rc6-syzkaller #0
[ 210.177358][ T27] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
[ 210.186054][ T27] task:syz-executor.0 state:D stack:14632 pid:2517 ppid:2099 flags:0x00000006
[ 210.195462][ T27] Call Trace:
[ 210.198926][ T27]
[ 210.202062][ T27] __schedule+0x3a2/0x9e0
[ 210.206474][ T27] schedule+0x59/0xa0
[ 210.210562][ T27] schedule_preempt_disabled+0x1b/0xa0
[ 210.216452][ T27] rwsem_down_write_slowpath+0x2d2/0x730
[ 210.222143][ T27] down_write_nested+0x7c/0x90
[ 210.226909][ T27] fuse_reverse_inval_entry+0x44/0x210
[ 210.232489][ T27] fuse_dev_do_write+0x5d5/0xfe0
[ 210.237850][ T27] fuse_dev_write+0x5e/0x90
[ 210.242780][ T27] vfs_write+0x24f/0x460
[ 210.247120][ T27] ksys_write+0x70/0xf0
[ 210.251273][ T27] do_syscall_64+0x38/0x80
[ 210.255719][ T27] entry_SYSCALL_64_after_hwframe+0x63/0xcd
[ 210.261640][ T27] RIP: 0033:0x7ffb9587c859
[ 210.266041][ T27] RSP: 002b:00007ffb966100c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
[ 210.274473][ T27] RAX: ffffffffffffffda RBX: 00007ffb9599c050 RCX: 00007ffb9587c859
[ 210.282593][ T27] RDX: 000000000000002c RSI: 00000000200000c0 RDI: 0000000000000003
[ 210.290650][ T27] RBP: 00007ffb958d8ad0 R08: 0000000000000000 R09: 0000000000000000
[ 210.299508][ T27] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
[ 210.308099][ T27] R13: 000000000000006e R14: 00007ffb9599c050 R15: 00007ffed4a121c8
[ 210.316155][ T27]
[ 210.319155][ T27]
[ 210.319155][ T27] Showing all locks held in the system:
[ 210.326964][ T27] 1 lock held by khungtaskd/27:
[ 210.331801][ T27] #0: ffffffff82fdde80 (rcu_read_lock){....}-{1:2}, at: debug_show_all_locks+0x36/0x120
[ 210.342035][ T27] 2 locks held by kworker/u4:4/410:
[ 210.347391][ T27] 2 locks held by getty/1481:
[ 210.352443][ T27] #0: ffff8881096f60a0 (&tty->ldisc_sem){....}-{0:0}, at: tty_ldisc_ref_wait+0x23/0x50
[ 210.362318][ T27] #1: ffffc900003fb2f0 (&ldata->atomic_read_lock){....}-{3:3}, at: n_tty_read+0x519/0x650
[ 210.372665][ T27] 1 lock held by syz-executor.0/2099:
[ 210.378193][ T27] #0: ffff88817d2747d0 (&type->i_mutex_dir_key#8){....}-{3:3}, at: walk_component+0xe5/0x170
[ 210.388548][ T27] 2 locks held by syz-executor.0/2516:
[ 210.394353][ T27] #0: ffff88817d2747d0 (&type->i_mutex_dir_key#8){....}-{3:3}, at: walk_component+0xe5/0x170
[ 210.404611][ T27] #1: ffff88817d274c40 (&fi->mutex){....}-{3:3}, at: fuse_lock_inode+0x2c/0x40
[ 210.413986][ T27] 2 locks held by syz-executor.0/2517:
[ 210.419589][ T27] #0: ffff888107b97f38 (&fc->killsb){....}-{3:3}, at: fuse_dev_do_write+0x5bb/0xfe0
[ 210.429329][ T27] #1: ffff88817d2747d0 (&type->i_mutex_dir_key#8/1){....}-{3:3}, at: fuse_reverse_inval_entry+0x44/0x210
[ 210.440879][ T27]
[ 210.443193][ T27] =============================================
[ 210.443193][ T27]
[ 210.451593][ T27] NMI backtrace for cpu 1
[ 210.455891][ T27] CPU: 1 PID: 27 Comm: khungtaskd Not tainted 6.6.0-rc6-syzkaller #0
[ 210.464013][ T27] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/06/2023
[ 210.474215][ T27] Call Trace:
[ 210.477468][ T27]
[ 210.480643][ T27] dump_stack_lvl+0x3d/0x60
[ 210.485202][ T27] nmi_cpu_backtrace+0xcc/0x110
[ 210.490030][ T27] ? lapic_can_unplug_cpu+0xa0/0xa0
[ 210.495377][ T27] nmi_trigger_cpumask_backtrace+0xd1/0x130
[ 210.501410][ T27] watchdog+0x615/0x640
[ 210.505532][ T27] ? proc_dohung_task_timeout_secs+0x30/0x30
[ 210.511649][ T27] kthread+0xde/0x110
[ 210.515623][ T27] ? kthread_complete_and_exit+0x20/0x20
[ 210.521220][ T27] ret_from_fork+0x2c/0x40
[ 210.525605][ T27] ? kthread_complete_and_exit+0x20/0x20
[ 210.531379][ T27] ret_from_fork_asm+0x11/0x20
[ 210.536199][ T27]
[ 210.539308][ T27] Sending NMI from CPU 1 to CPUs 0:
[ 210.544503][ C0] NMI backtrace for cpu 0
[ 210.544505][ C0] CPU: 0 PID: 410 Comm: kworker/u4:4 Not tainted 6.6.0-rc6-syzkaller #0
[ 210.544508][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/06/2023
[ 210.544510][ C0] Workqueue: events_unbound toggle_allocation_gate
[ 210.544517][ C0] RIP: 0010:__default_send_IPI_dest_field+0x3b/0x80
[ 210.544522][ C0] Code: 89 d3 75 04 eb 28 f3 90 8b 04 25 00 c3 5f ff f6 c4 10 75 f2 44 89 e0 89 04 25 10 c3 5f ff 89 f0 09 d8 89 04 25 00 c3 5f ff 5b <5d> 41 5c c3 bd e8 03 00 00 eb 16 65 ff 05 8f a1 fd 7e bf bc 8d 06
[ 210.544525][ C0] RSP: 0018:ffffc900018e3c80 EFLAGS: 00000002
[ 210.544527][ C0] RAX: 00000000000008fb RBX: 0000000000000202 RCX: 0000000000000002
[ 210.544529][ C0] RDX: 0000000000000800 RSI: 00000000000000fb RDI: 0000000002000000
[ 210.544530][ C0] RBP: 0000000000000001 R08: ffff888237d31fe0 R09: 0000000000000001
[ 210.544532][ C0] R10: 0000000000000000 R11: 0000000000000006 R12: 0000000002000000
[ 210.544533][ C0] R13: 0000000000000001 R14: 0000000000000001 R15: 0000000000000000
[ 210.544534][ C0] FS: 0000000000000000(0000) GS:ffff888237c00000(0000) knlGS:0000000000000000
[ 210.544540][ C0] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 210.544541][ C0] CR2: 00007fe3bb813540 CR3: 0000000002eac000 CR4: 00000000003506f0
[ 210.544543][ C0] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[ 210.544544][ C0] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[ 210.544546][ C0] Call Trace:
[ 210.544547][ C0]
[ 210.544548][ C0] ? nmi_cpu_backtrace+0x8b/0x110
[ 210.544553][ C0] ? __default_send_IPI_dest_field+0x3b/0x80
[ 210.544556][ C0] ? nmi_cpu_backtrace_handler+0xc/0x10
[ 210.544559][ C0] ? nmi_handle+0xb5/0x1a0
[ 210.544563][ C0] ? __default_send_IPI_dest_field+0x3b/0x80
[ 210.544566][ C0] ? default_do_nmi+0x6b/0x2b0
[ 210.544572][ C0] ? exc_nmi+0x157/0x1a0
[ 210.544575][ C0] ? end_repeat_nmi+0x16/0x31
[ 210.544582][ C0] ? __default_send_IPI_dest_field+0x3b/0x80
[ 210.544584][ C0] ? __default_send_IPI_dest_field+0x3b/0x80
[ 210.544587][ C0] ? __default_send_IPI_dest_field+0x3b/0x80
[ 210.544590][ C0]
[ 210.544590][ C0]
[ 210.544591][ C0] flat_send_IPI_mask+0x15/0x30
[ 210.544595][ C0] smp_call_function_many_cond+0x5ff/0x670
[ 210.544601][ C0] ? __text_poke+0x4a0/0x4a0
[ 210.544604][ C0] ? setup_data_read+0xe0/0xe0
[ 210.544606][ C0] ? __text_poke+0x4a0/0x4a0
[ 210.544609][ C0] on_each_cpu_cond_mask+0x3b/0x70
[ 210.544612][ C0] ? __kmem_cache_alloc_node+0xaf/0x3a0
[ 210.544615][ C0] ? __kmem_cache_alloc_node+0xb0/0x3a0
[ 210.544617][ C0] text_poke_bp_batch+0x2e8/0x310
[ 210.544620][ C0] ? process_one_work+0x1a2/0x4c0
[ 210.544625][ C0] text_poke_finish+0x1a/0x30
[ 210.544628][ C0] arch_jump_label_transform_apply+0x17/0x30
[ 210.544631][ C0] static_key_disable_cpuslocked+0x4a/0x60
[ 210.544636][ C0] static_key_disable+0x15/0x20
[ 210.544639][ C0] toggle_allocation_gate+0x6d/0x120
[ 210.544642][ C0] ? swake_up_one+0x70/0x70
[ 210.544647][ C0] process_one_work+0x208/0x4c0
[ 210.544651][ C0] worker_thread+0x1c3/0x380
[ 210.544655][ C0] ? _raw_spin_unlock_irqrestore+0x3c/0x60
[ 210.544660][ C0] ? rescuer_thread+0x380/0x380
[ 210.544664][ C0] kthread+0xde/0x110
[ 210.544667][ C0] ? kthread_complete_and_exit+0x20/0x20
[ 210.544670][ C0] ret_from_fork+0x2c/0x40
[ 210.544674][ C0] ? kthread_complete_and_exit+0x20/0x20
[ 210.544677][ C0] ret_from_fork_asm+0x11/0x20
[ 210.544681][ C0]
[ 210.545500][ T27] Kernel panic - not syncing: hung_task: blocked tasks
[ 210.900026][ T27] Kernel Offset: disabled
[ 210.904325][ T27] Rebooting in 86400 seconds..