Warning: Permanently added '10.128.10.3' (ED25519) to the list of known hosts. 2023/12/19 16:24:26 ignoring optional flag "sandboxArg"="0" 2023/12/19 16:24:26 parsed 1 programs 2023/12/19 16:24:26 executed programs: 0 [ 39.034855][ T25] audit: type=1400 audit(1703003066.645:164): avc: denied { getattr } for pid=2101 comm="syz-execprog" path="user:[4026531837]" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 39.058687][ T25] audit: type=1400 audit(1703003066.645:165): avc: denied { read } for pid=2101 comm="syz-execprog" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 39.080068][ T25] audit: type=1400 audit(1703003066.645:166): avc: denied { open } for pid=2101 comm="syz-execprog" path="user:[4026531837]" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 39.103837][ T25] audit: type=1400 audit(1703003066.665:167): avc: denied { mounton } for pid=2106 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 39.128782][ T25] audit: type=1400 audit(1703003066.665:168): avc: denied { mount } for pid=2106 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 39.154067][ T25] audit: type=1400 audit(1703003066.665:169): avc: denied { write } for pid=2106 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 39.174501][ T25] audit: type=1400 audit(1703003066.665:170): avc: denied { read } for pid=2106 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 39.195013][ T25] audit: type=1400 audit(1703003066.685:171): avc: denied { read } for pid=1421 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1 [ 39.216211][ T25] audit: type=1400 audit(1703003066.685:172): avc: denied { read } for pid=1421 comm="dhcpcd" name="n13" dev="tmpfs" ino=296 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 39.238116][ T25] audit: type=1400 audit(1703003066.685:173): avc: denied { open } for pid=1421 comm="dhcpcd" path="/run/udev/data/n13" dev="tmpfs" ino=296 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 184.209018][ T27] INFO: task syz-executor.0:2531 blocked for more than 143 seconds. [ 184.217171][ T27] Not tainted 6.7.0-rc6-syzkaller #0 [ 184.222980][ T27] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 184.231635][ T27] task:syz-executor.0 state:D stack:14552 pid:2531 tgid:2529 ppid:2113 flags:0x00000006 [ 184.242960][ T27] Call Trace: [ 184.246392][ T27] [ 184.249494][ T27] __schedule+0x3a5/0x9d0 [ 184.253815][ T27] schedule+0x30/0xf0 [ 184.257935][ T27] schedule_preempt_disabled+0x13/0x20 [ 184.263515][ T27] rwsem_down_write_slowpath+0x2d2/0x730 [ 184.269264][ T27] down_write_nested+0x7c/0x90 [ 184.274188][ T27] fuse_reverse_inval_entry+0x44/0x210 [ 184.279657][ T27] fuse_dev_do_write+0x5d5/0xfe0 [ 184.284666][ T27] ? futex_wait_queue+0x5f/0x80 [ 184.289728][ T27] ? __futex_wait+0x154/0x1b0 [ 184.294468][ T27] fuse_dev_write+0x64/0x90 [ 184.298987][ T27] vfs_write+0x24e/0x440 [ 184.303213][ T27] ksys_write+0x70/0xf0 [ 184.307516][ T27] do_syscall_64+0x40/0xe0 [ 184.312477][ T27] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 184.318345][ T27] RIP: 0033:0x7f5fc067c859 [ 184.322761][ T27] RSP: 002b:00007f5fc14620c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 184.331336][ T27] RAX: ffffffffffffffda RBX: 00007f5fc079c050 RCX: 00007f5fc067c859 [ 184.339590][ T27] RDX: 000000000000002c RSI: 00000000200000c0 RDI: 0000000000000003 [ 184.347635][ T27] RBP: 00007f5fc06d8ad0 R08: 0000000000000000 R09: 0000000000000000 [ 184.355791][ T27] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 184.363854][ T27] R13: 000000000000006e R14: 00007f5fc079c050 R15: 00007ffcf618a638 [ 184.372058][ T27] [ 184.375145][ T27] [ 184.375145][ T27] Showing all locks held in the system: [ 184.383400][ T27] 1 lock held by khungtaskd/27: [ 184.388405][ T27] #0: ffffffff82fdde80 (rcu_read_lock){....}-{1:2}, at: debug_show_all_locks+0x36/0x120 [ 184.398248][ T27] 2 locks held by getty/1494: [ 184.403024][ T27] #0: ffff88810b6e48a0 (&tty->ldisc_sem){....}-{0:0}, at: tty_ldisc_ref_wait+0x23/0x50 [ 184.412914][ T27] #1: ffffc900003fb2f0 (&ldata->atomic_read_lock){....}-{3:3}, at: n_tty_read+0x54b/0x6a0 [ 184.422959][ T27] 1 lock held by syz-executor.0/2113: [ 184.428297][ T27] #0: ffff88817d2b57d0 (&type->i_mutex_dir_key#8){....}-{3:3}, at: walk_component+0xe5/0x170 [ 184.438621][ T27] 2 locks held by syz-executor.0/2530: [ 184.444151][ T27] #0: ffff88817d2b57d0 (&type->i_mutex_dir_key#8){....}-{3:3}, at: walk_component+0xe5/0x170 [ 184.454604][ T27] #1: ffff88817d2b5c40 (&fi->mutex){....}-{3:3}, at: fuse_lock_inode+0x2c/0x40 [ 184.463626][ T27] 2 locks held by syz-executor.0/2531: [ 184.469959][ T27] #0: ffff88810176df38 (&fc->killsb){....}-{3:3}, at: fuse_dev_do_write+0x5bb/0xfe0 [ 184.479590][ T27] #1: ffff88817d2b57d0 (&type->i_mutex_dir_key#8/1){....}-{3:3}, at: fuse_reverse_inval_entry+0x44/0x210 [ 184.490967][ T27] [ 184.493269][ T27] ============================================= [ 184.493269][ T27] [ 184.501924][ T27] NMI backtrace for cpu 0 [ 184.506223][ T27] CPU: 0 PID: 27 Comm: khungtaskd Not tainted 6.7.0-rc6-syzkaller #0 [ 184.514366][ T27] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 184.524832][ T27] Call Trace: [ 184.528179][ T27] [ 184.531175][ T27] dump_stack_lvl+0x3d/0x60 [ 184.536086][ T27] nmi_cpu_backtrace+0xcc/0x110 [ 184.541096][ T27] ? lapic_can_unplug_cpu+0xa0/0xa0 [ 184.546537][ T27] nmi_trigger_cpumask_backtrace+0xd1/0x130 [ 184.552846][ T27] watchdog+0x615/0x640 [ 184.556968][ T27] ? proc_dohung_task_timeout_secs+0x30/0x30 [ 184.563091][ T27] kthread+0xde/0x110 [ 184.567077][ T27] ? kthread_complete_and_exit+0x20/0x20 [ 184.572848][ T27] ret_from_fork+0x2c/0x40 [ 184.577318][ T27] ? kthread_complete_and_exit+0x20/0x20 [ 184.582925][ T27] ret_from_fork_asm+0x11/0x20 [ 184.587666][ T27] [ 184.590791][ T27] Sending NMI from CPU 0 to CPUs 1: [ 184.596001][ C1] NMI backtrace for cpu 1 skipped: idling at acpi_safe_halt+0x1b/0x20 [ 184.596969][ T27] Kernel panic - not syncing: hung_task: blocked tasks [ 184.612222][ T27] Kernel Offset: disabled [ 184.616523][ T27] Rebooting in 86400 seconds..