[ 35.844538] audit: type=1800 audit(1583613396.506:33): pid=7271 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed(directio)" comm="startpar" name="rc.local" dev="sda1" ino=2465 res=0 [ 35.871441] audit: type=1800 audit(1583613396.506:34): pid=7271 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed(directio)" comm="startpar" name="rmnologin" dev="sda1" ino=2456 res=0 [ 36.394469] random: sshd: uninitialized urandom read (32 bytes read) [ 36.731881] audit: type=1400 audit(1583613397.396:35): avc: denied { map } for pid=7442 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 36.783149] random: sshd: uninitialized urandom read (32 bytes read) Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 37.526692] random: sshd: uninitialized urandom read (32 bytes read) [ 1384.274140] random: sshd: uninitialized urandom read (32 bytes read) Warning: Permanently added '10.128.1.60' (ECDSA) to the list of known hosts. [ 1389.862524] random: sshd: uninitialized urandom read (32 bytes read) [ 1389.989417] audit: type=1400 audit(1583614750.646:36): avc: denied { map } for pid=7454 comm="syz-executor421" path="/root/syz-executor421121272" dev="sda1" ino=1426 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 1390.281977] IPVS: ftp: loaded support on port[0] = 21 [ 1391.078267] audit: type=1400 audit(1583614751.736:37): avc: denied { create } for pid=7455 comm="syz-executor421" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1391.103406] audit: type=1400 audit(1583614751.736:38): avc: denied { write } for pid=7455 comm="syz-executor421" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1391.127617] audit: type=1400 audit(1583614751.736:39): avc: denied { read } for pid=7455 comm="syz-executor421" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 executing program [ 1392.394001] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 1392.410053] hrtimer: interrupt took 41888 ns [ 1392.513371] kvm: emulating exchange as write executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 1443.923934] random: crng init done executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 1560.570034] INFO: rcu_preempt detected stalls on CPUs/tasks: [ 1560.575891] (detected by 1, t=10502 jiffies, g=3746, c=3745, q=13) [ 1560.582315] All QSes seen, last rcu_preempt kthread activity 10502 (4295093353-4295082851), jiffies_till_next_fqs=1, root ->qsmask 0x0 [ 1560.594541] syz-executor421 R running task 28176 9059 7455 0x00000800 [ 1560.601843] Call Trace: [ 1560.604466] [ 1560.606683] sched_show_task.cold+0x2e3/0x347 [ 1560.611215] rcu_check_callbacks.cold+0xd3f/0xdaa [ 1560.616074] update_process_times+0x29/0x60 [ 1560.620482] tick_sched_handle+0x7d/0x150 [ 1560.624637] tick_sched_timer+0x3e/0x120 [ 1560.628698] __hrtimer_run_queues+0x25c/0xbb0 [ 1560.633196] ? tick_sched_do_timer+0xe0/0xe0 [ 1560.637625] ? hrtimer_start_range_ns+0x1060/0x1060 [ 1560.642665] hrtimer_interrupt+0x1e6/0x5e0 [ 1560.647023] smp_apic_timer_interrupt+0x117/0x5e0 [ 1560.651881] apic_timer_interrupt+0x8f/0xa0 [ 1560.656209] [ 1560.658455] RIP: 0010:vcpu_enter_guest+0xd66/0x5240 [ 1560.663475] RSP: 0018:ffff888080e0fae0 EFLAGS: 00000297 ORIG_RAX: ffffffffffffff10 [ 1560.671189] RAX: ffff8880a6dba6c0 RBX: ffff8880a6dba6c0 RCX: 1ffff11014db75ec [ 1560.678465] RDX: 0000000000000000 RSI: ffff8880a6dbaf40 RDI: ffff8880a6dbaf3c [ 1560.685734] RBP: ffff888080e0fbe0 R08: 0000000000000001 R09: 0000000000000000 [ 1560.693014] R10: 0000000000000000 R11: 0000000000000000 R12: ffff8880a8ae85c0 [ 1560.700281] R13: ffff8880a8ae86a0 R14: ffff8880a8ae85e8 R15: fffffcf1740d116c [ 1560.707571] ? retint_kernel+0x2d/0x2d [ 1560.711468] ? emulator_read_emulated+0x40/0x40 [ 1560.716133] ? kvm_check_async_pf_completion+0x24c/0x3d0 [ 1560.721587] ? kvm_check_async_pf_completion+0x271/0x3d0 [ 1560.727057] ? kvm_arch_vcpu_ioctl_run+0x2fe/0xfd0 [ 1560.731996] kvm_arch_vcpu_ioctl_run+0x2fe/0xfd0 [ 1560.736763] kvm_vcpu_ioctl+0x3df/0xc70 [ 1560.740756] ? kvm_vcpu_block+0xb70/0xb70 [ 1560.744992] ? trace_hardirqs_on+0x10/0x10 [ 1560.749244] ? retint_kernel+0x2d/0x2d [ 1560.753140] ? futex_exit_release+0x60/0x60 [ 1560.757470] ? save_trace+0x290/0x290 [ 1560.761281] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1560.766052] ? kvm_vcpu_block+0xb70/0xb70 [ 1560.770288] do_vfs_ioctl+0x75a/0xfe0 [ 1560.774143] ? selinux_file_mprotect+0x5c0/0x5c0 [ 1560.778909] ? ioctl_preallocate+0x1a0/0x1a0 [ 1560.783364] ? security_file_ioctl+0x76/0xb0 [ 1560.787773] ? security_file_ioctl+0x83/0xb0 [ 1560.792188] SyS_ioctl+0x7f/0xb0 [ 1560.795557] ? do_vfs_ioctl+0xfe0/0xfe0 [ 1560.799533] do_syscall_64+0x1d5/0x640 [ 1560.803442] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1560.808637] RIP: 0033:0x44cb49 [ 1560.811833] RSP: 002b:00007f86562d7ce8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1560.819548] RAX: ffffffffffffffda RBX: 00000000006e8a08 RCX: 000000000044cb49 [ 1560.826819] RDX: 0000000000000000 RSI: 000000000000ae80 RDI: 0000000000000006 [ 1560.834192] RBP: 00000000006e8a00 R08: 0000000000000000 R09: 0000000000000000 [ 1560.841465] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000006e8a0c [ 1560.848828] R13: 00007ffd83b0303f R14: 00007f86562d89c0 R15: 20c49ba5e353f7cf [ 1560.856132] rcu_preempt kthread starved for 10502 jiffies! g3746 c3745 f0x2 RCU_GP_WAIT_FQS(3) ->state=0x0 ->cpu=0 [ 1560.866704] rcu_preempt R running task 29920 8 2 0x80000000 [ 1560.874028] Call Trace: [ 1560.876638] ? __schedule+0x7b8/0x1ca0 [ 1560.880536] ? __sched_text_start+0x8/0x8 [ 1560.884698] ? _raw_spin_unlock_irqrestore+0x67/0xe0 [ 1560.889817] schedule+0x8d/0x1b0 [ 1560.893190] schedule_timeout+0x43c/0xe40 [ 1560.897685] ? usleep_range+0x130/0x130 [ 1560.901808] ? trace_hardirqs_on_caller+0x3f6/0x590 [ 1560.906839] ? _raw_spin_unlock_irqrestore+0xa0/0xe0 [ 1560.911950] ? call_timer_fn+0x650/0x650 [ 1560.916020] rcu_gp_kthread+0xb8e/0x1ce0 [ 1560.920259] ? force_qs_rnp+0x4f0/0x4f0 [ 1560.924330] ? force_qs_rnp+0x4f0/0x4f0 [ 1560.928369] kthread+0x30d/0x420 [ 1560.931911] ? kthread_create_on_node+0xd0/0xd0 [ 1560.936599] ret_from_fork+0x24/0x30