last executing test programs: 1.089459683s ago: executing program 1 (id=3314): r0 = semget$private(0x0, 0x4000000009, 0x0) semop(r0, &(0x7f00000000c0)=[{0x0, 0xffff}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000080)=[0x7f]) 1.089339083s ago: executing program 0 (id=3315): r0 = socket$xdp(0x2c, 0x3, 0x0) r1 = dup2(r0, r0) ioctl$DRM_IOCTL_SG_FREE(r1, 0x40086439, 0x0) 970.789719ms ago: executing program 0 (id=3316): r0 = openat$mixer(0xffffff9c, &(0x7f0000000040), 0x28040, 0x0) ioctl$DMA_HEAP_IOCTL_ALLOC(r0, 0xc0184800, &(0x7f0000000000)={0x4, r0}) ioctl$RTC_RD_TIME(r1, 0x5421, &(0x7f0000000080)) 888.67299ms ago: executing program 0 (id=3318): r0 = socket$xdp(0x2c, 0x3, 0x0) r1 = dup(r0) ioctl$SNDCTL_DSP_SETDUPLEX(r1, 0x5016, 0x0) 819.177339ms ago: executing program 0 (id=3319): r0 = openat$selinux_status(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) openat$tcp_congestion(0xffffffffffffff9c, 0x0, 0x1, 0x0) ioctl$TUNSETOWNER(r0, 0x5451, 0x0) 730.924691ms ago: executing program 0 (id=3320): r0 = socket(0x10, 0x3, 0x0) recvfrom$inet6(r0, 0x0, 0x0, 0x10120, 0x0, 0x2d) write(r0, &(0x7f0000000000)="1c0000001a005f0214f9f407000904001f000000ff02000200000000", 0x1c) 488.901544ms ago: executing program 1 (id=3321): r0 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSFF(r0, 0x40044591, 0x0) ioctl$EVIOCGUNIQ(r0, 0x80404508, 0x0) 185.254735ms ago: executing program 0 (id=3322): r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='attr/prev\x00') exit(0xffff) write$FUSE_ENTRY(r0, 0x0, 0x0) 182.829415ms ago: executing program 1 (id=3323): r0 = openat$selinux_mls(0xffffff9c, &(0x7f0000000080), 0x0, 0x0) socket$unix(0x1, 0x1, 0x0) ioctl$KDDISABIO(r0, 0x5451) 71.62581ms ago: executing program 1 (id=3324): sendmsg$SMC_PNETID_GET(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x14}, 0x14}}, 0x0) r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) getsockopt$inet6_mptcp_buf(r0, 0x11c, 0x2, &(0x7f0000000080)=""/43, &(0x7f00000000c0)=0x2b) 168.48µs ago: executing program 1 (id=3325): r0 = openat$selinux_status(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) openat$tcp_congestion(0xffffffffffffff9c, 0x0, 0x1, 0x0) ioctl$TUNSETOWNER(r0, 0x5451, 0x0) 0s ago: executing program 1 (id=3326): r0 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSFF(r0, 0x40044591, 0x0) ioctl$EVIOCGUNIQ(r0, 0x80404508, 0x0) kernel console output (not intermixed with test programs): [ 47.814101][ T29] audit: type=1400 audit(47.720:56): avc: denied { read write } for pid=3096 comm="sftp-server" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 47.817451][ T29] audit: type=1400 audit(47.720:57): avc: denied { open } for pid=3096 comm="sftp-server" path="/dev/null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 Warning: Permanently added '[localhost]:36901' (ED25519) to the list of known hosts. [ 62.295535][ T29] audit: type=1400 audit(62.200:58): avc: denied { name_bind } for pid=3099 comm="sshd-session" src=30000 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 63.985727][ T29] audit: type=1400 audit(63.890:59): avc: denied { execute } for pid=3100 comm="sh" name="syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 64.012860][ T29] audit: type=1400 audit(63.920:60): avc: denied { execute_no_trans } for pid=3100 comm="sh" path="/syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 68.102563][ T29] audit: type=1400 audit(68.010:61): avc: denied { mounton } for pid=3100 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=806 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 68.108645][ T29] audit: type=1400 audit(68.020:62): avc: denied { mount } for pid=3100 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 68.127429][ T3100] cgroup: Unknown subsys name 'net' [ 68.136625][ T29] audit: type=1400 audit(68.050:63): avc: denied { unmount } for pid=3100 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 68.282181][ T3100] cgroup: Unknown subsys name 'cpuset' [ 68.289336][ T3100] cgroup: Unknown subsys name 'hugetlb' [ 68.290182][ T3100] cgroup: Unknown subsys name 'rlimit' [ 68.535624][ T29] audit: type=1400 audit(68.440:64): avc: denied { setattr } for pid=3100 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 68.538269][ T29] audit: type=1400 audit(68.450:65): avc: denied { mounton } for pid=3100 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 68.542302][ T29] audit: type=1400 audit(68.450:66): avc: denied { mount } for pid=3100 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 68.736416][ T3102] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 68.745611][ T29] audit: type=1400 audit(68.650:67): avc: denied { relabelto } for pid=3102 comm="mkswap" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 68.745974][ T29] audit: type=1400 audit(68.650:68): avc: denied { write } for pid=3102 comm="mkswap" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 68.771992][ T29] audit: type=1400 audit(68.680:69): avc: denied { read } for pid=3100 comm="syz-executor" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 68.774445][ T29] audit: type=1400 audit(68.680:70): avc: denied { open } for pid=3100 comm="syz-executor" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 75.362657][ T3100] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 77.058630][ T29] audit: type=1400 audit(76.970:71): avc: denied { execmem } for pid=3103 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 77.123235][ T29] audit: type=1400 audit(77.030:72): avc: denied { read } for pid=3105 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 77.126843][ T29] audit: type=1400 audit(77.030:73): avc: denied { open } for pid=3105 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 77.130389][ T29] audit: type=1400 audit(77.040:74): avc: denied { mounton } for pid=3105 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 77.161391][ T29] audit: type=1400 audit(77.070:76): avc: denied { module_request } for pid=3105 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 77.163306][ T29] audit: type=1400 audit(77.070:75): avc: denied { module_request } for pid=3106 comm="syz-executor" kmod="netdev-nr1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 77.248666][ T29] audit: type=1400 audit(77.150:77): avc: denied { sys_module } for pid=3105 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 77.820413][ T29] audit: type=1400 audit(77.730:78): avc: denied { ioctl } for pid=3105 comm="syz-executor" path="/dev/net/tun" dev="devtmpfs" ino=677 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 78.997338][ T3106] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 79.022909][ T3106] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 79.043948][ T3105] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 79.072815][ T3105] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 79.859744][ T3106] hsr_slave_0: entered promiscuous mode [ 79.862867][ T3106] hsr_slave_1: entered promiscuous mode [ 79.878006][ T3105] hsr_slave_0: entered promiscuous mode [ 79.880231][ T3105] hsr_slave_1: entered promiscuous mode [ 79.882126][ T3105] debugfs: 'hsr0' already exists in 'hsr' [ 79.883235][ T3105] Cannot create hsr debugfs directory [ 80.344510][ T29] audit: type=1400 audit(80.250:79): avc: denied { create } for pid=3106 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 80.348797][ T29] audit: type=1400 audit(80.260:80): avc: denied { write } for pid=3106 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 80.365596][ T3106] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 80.387297][ T3106] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 80.396809][ T3106] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 80.425631][ T3106] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 80.472671][ T3105] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 80.492677][ T3105] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 80.500619][ T3105] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 80.517828][ T3105] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 81.170126][ T3106] 8021q: adding VLAN 0 to HW filter on device bond0 [ 81.222373][ T3105] 8021q: adding VLAN 0 to HW filter on device bond0 [ 83.748112][ T3106] veth0_vlan: entered promiscuous mode [ 83.763433][ T3106] veth1_vlan: entered promiscuous mode [ 83.824056][ T3106] veth0_macvtap: entered promiscuous mode [ 83.833555][ T3106] veth1_macvtap: entered promiscuous mode [ 83.911760][ T38] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 83.915572][ T56] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 83.915992][ T56] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 83.916238][ T56] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 84.017319][ T3105] veth0_vlan: entered promiscuous mode [ 84.044331][ T3105] veth1_vlan: entered promiscuous mode [ 84.049738][ T29] kauditd_printk_skb: 1 callbacks suppressed [ 84.050209][ T29] audit: type=1400 audit(83.960:82): avc: denied { mount } for pid=3106 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 84.053715][ T29] audit: type=1400 audit(83.960:83): avc: denied { mounton } for pid=3106 comm="syz-executor" path="/syzkaller.eCiCU4/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 84.071484][ T29] audit: type=1400 audit(83.980:84): avc: denied { mount } for pid=3106 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 84.080631][ T3105] veth0_macvtap: entered promiscuous mode [ 84.081116][ T29] audit: type=1400 audit(83.990:85): avc: denied { mounton } for pid=3106 comm="syz-executor" path="/syzkaller.eCiCU4/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 84.084015][ T29] audit: type=1400 audit(83.990:86): avc: denied { mounton } for pid=3106 comm="syz-executor" path="/syzkaller.eCiCU4/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=2023 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 84.090675][ T3105] veth1_macvtap: entered promiscuous mode [ 84.128361][ T1306] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 84.130541][ T1306] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 84.132224][ T1306] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 84.133441][ T29] audit: type=1400 audit(84.040:87): avc: denied { unmount } for pid=3106 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 84.136797][ T29] audit: type=1400 audit(84.050:88): avc: denied { mounton } for pid=3106 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=772 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 84.142186][ T29] audit: type=1400 audit(84.050:89): avc: denied { mount } for pid=3106 comm="syz-executor" name="/" dev="gadgetfs" ino=2048 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 84.145926][ T1306] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 84.163099][ T29] audit: type=1400 audit(84.070:90): avc: denied { mount } for pid=3106 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 84.163555][ T29] audit: type=1400 audit(84.070:91): avc: denied { mounton } for pid=3106 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 84.254401][ T3106] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 86.199410][ T3748] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 87.583478][ T3780] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=3780 comm=syz.0.33 [ 88.265992][ T3806] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3806 comm=syz.1.46 [ 88.846876][ T3822] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=260 sclass=netlink_audit_socket pid=3822 comm=syz.0.54 [ 89.102570][ T29] kauditd_printk_skb: 22 callbacks suppressed [ 89.104654][ T29] audit: type=1400 audit(89.010:114): avc: denied { append } for pid=3828 comm="syz.0.57" name="iommu" dev="devtmpfs" ino=611 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 89.420451][ T3837] capability: warning: `syz.0.61' uses deprecated v2 capabilities in a way that may be insecure [ 89.586602][ T29] audit: type=1400 audit(89.500:115): avc: denied { allowed } for pid=3840 comm="syz.0.63" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 89.596735][ T29] audit: type=1400 audit(89.510:116): avc: denied { create } for pid=3840 comm="syz.0.63" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 89.600957][ T29] audit: type=1400 audit(89.510:117): avc: denied { map } for pid=3840 comm="syz.0.63" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=3304 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 89.601298][ T29] audit: type=1400 audit(89.510:118): avc: denied { read write } for pid=3840 comm="syz.0.63" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=3304 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 89.710204][ T3843] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=1540 sclass=netlink_audit_socket pid=3843 comm=syz.0.64 [ 89.792173][ T29] audit: type=1400 audit(89.700:119): avc: denied { write } for pid=3844 comm="syz.0.65" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 89.888404][ T29] audit: type=1400 audit(89.800:120): avc: denied { create } for pid=3846 comm="syz.0.66" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 90.068888][ T29] audit: type=1400 audit(89.980:121): avc: denied { connect } for pid=3850 comm="syz.0.68" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 90.575053][ T29] audit: type=1400 audit(90.480:122): avc: denied { ioctl } for pid=3850 comm="syz.0.68" path="socket:[3313]" dev="sockfs" ino=3313 ioctlcmd=0x9420 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 91.002549][ T29] audit: type=1400 audit(90.910:123): avc: denied { create } for pid=3855 comm="syz.1.70" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 93.565585][ T3882] Zero length message leads to an empty skb [ 94.425746][ T29] kauditd_printk_skb: 9 callbacks suppressed [ 94.427157][ T29] audit: type=1400 audit(94.330:133): avc: denied { audit_write } for pid=3915 comm="syz.0.99" capability=29 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 95.129206][ T29] audit: type=1400 audit(95.040:134): avc: denied { getopt } for pid=3947 comm="syz.0.115" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 95.377140][ T29] audit: type=1400 audit(95.280:135): avc: denied { getopt } for pid=3959 comm="syz.1.121" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=socket permissive=1 [ 95.707798][ T29] audit: type=1400 audit(95.620:136): avc: denied { read } for pid=3974 comm="syz.0.128" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 96.055768][ T23] usb 1-1: new high-speed USB device number 2 using dummy_hcd [ 96.205935][ T23] usb 1-1: Using ep0 maxpacket: 32 [ 96.237462][ T23] usb 1-1: config index 0 descriptor too short (expected 12790, got 36) [ 96.239568][ T23] usb 1-1: config 54 has an invalid descriptor of length 133, skipping remainder of the config [ 96.240549][ T23] usb 1-1: config 54 has 0 interfaces, different from the descriptor's value: 17 [ 96.241516][ T23] usb 1-1: New USB device found, idVendor=03f0, idProduct=8c17, bcdDevice= 0.40 [ 96.243478][ T23] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 96.479640][ T23] usb 1-1: string descriptor 0 read error: -71 [ 96.484492][ T23] usb 1-1: USB disconnect, device number 2 [ 96.946762][ T23] usb 1-1: new high-speed USB device number 3 using dummy_hcd [ 97.097185][ T23] usb 1-1: Using ep0 maxpacket: 32 [ 97.115508][ T23] usb 1-1: config index 0 descriptor too short (expected 12790, got 36) [ 97.115905][ T23] usb 1-1: config 54 has an invalid descriptor of length 133, skipping remainder of the config [ 97.116046][ T23] usb 1-1: config 54 has 0 interfaces, different from the descriptor's value: 17 [ 97.116129][ T23] usb 1-1: New USB device found, idVendor=03f0, idProduct=8c17, bcdDevice= 0.40 [ 97.116160][ T23] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 97.334241][ T23] usb 1-1: string descriptor 0 read error: -71 [ 97.348424][ T23] usb 1-1: USB disconnect, device number 3 [ 97.791889][ T29] audit: type=1400 audit(97.700:137): avc: denied { create } for pid=4050 comm="syz.1.156" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 97.796103][ T29] audit: type=1400 audit(97.710:138): avc: denied { ioctl } for pid=4050 comm="syz.1.156" path="socket:[3647]" dev="sockfs" ino=3647 ioctlcmd=0x89e1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 98.107831][ T29] audit: type=1400 audit(98.020:139): avc: denied { write } for pid=4065 comm="syz.0.164" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 98.867415][ T29] audit: type=1400 audit(98.780:140): avc: denied { map } for pid=4089 comm="syz.0.175" path="/dev/usbmon0" dev="devtmpfs" ino=684 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 98.938211][ T29] audit: type=1400 audit(98.840:141): avc: denied { write } for pid=4091 comm="syz.0.176" path="socket:[2961]" dev="sockfs" ino=2961 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 99.052620][ T29] audit: type=1400 audit(98.960:142): avc: denied { lock } for pid=4095 comm="syz.0.178" path="/dev/urandom" dev="devtmpfs" ino=8 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 99.731815][ T29] kauditd_printk_skb: 1 callbacks suppressed [ 99.733858][ T29] audit: type=1400 audit(99.640:144): avc: denied { prog_load } for pid=4113 comm="syz.0.187" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 99.740554][ T29] audit: type=1400 audit(99.650:145): avc: denied { bpf } for pid=4113 comm="syz.0.187" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 101.870085][ T29] audit: type=1400 audit(101.780:146): avc: denied { ioctl } for pid=4149 comm="syz.1.205" path="socket:[3823]" dev="sockfs" ino=3823 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 102.596352][ T29] audit: type=1400 audit(102.510:147): avc: denied { prog_run } for pid=4160 comm="syz.1.210" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 102.709336][ T4165] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 103.302491][ T4172] capability: warning: `syz.0.215' uses 32-bit capabilities (legacy support in use) [ 104.227758][ T29] audit: type=1400 audit(104.140:148): avc: denied { write } for pid=4187 comm="syz.1.224" name="ip6_tables_targets" dev="proc" ino=4026532808 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 106.050140][ T4218] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4218 comm=syz.1.238 [ 106.070497][ T29] audit: type=1400 audit(105.980:149): avc: denied { setopt } for pid=4217 comm="syz.0.239" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 108.130069][ T4245] comedi comedi3: comedi_test: 6 microvolt, 2047 microsecond waveform attached [ 109.704033][ T4267] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4267 comm=syz.0.262 [ 112.415850][ T4314] netlink: 'syz.0.283': attribute type 29 has an invalid length. [ 112.417129][ T4314] netlink: 8 bytes leftover after parsing attributes in process `syz.0.283'. [ 113.761687][ T29] audit: type=1400 audit(113.670:150): avc: denied { lock } for pid=4361 comm="syz.0.306" path="socket:[4369]" dev="sockfs" ino=4369 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sock_file permissive=1 [ 121.724121][ T29] audit: type=1400 audit(121.630:151): avc: denied { connect } for pid=4467 comm="syz.1.359" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 122.757171][ T29] audit: type=1400 audit(122.670:152): avc: denied { mount } for pid=4516 comm="syz.1.383" name="/" dev="tracefs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tracefs_t tclass=filesystem permissive=1 [ 122.760786][ T4517] ======================================================= [ 122.760786][ T4517] WARNING: The mand mount option has been deprecated and [ 122.760786][ T4517] and is ignored by this kernel. Remove the mand [ 122.760786][ T4517] option from the mount to silence this warning. [ 122.760786][ T4517] ======================================================= [ 122.761189][ T29] audit: type=1400 audit(122.670:153): avc: denied { remount } for pid=4516 comm="syz.1.383" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tracefs_t tclass=filesystem permissive=1 [ 122.783599][ T29] audit: type=1400 audit(122.690:154): avc: denied { unmount } for pid=3106 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tracefs_t tclass=filesystem permissive=1 [ 126.537344][ T29] audit: type=1400 audit(126.450:155): avc: denied { ioctl } for pid=4575 comm="syz.0.412" path="socket:[4743]" dev="sockfs" ino=4743 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sock_file permissive=1 [ 129.530765][ T29] audit: type=1400 audit(129.440:156): avc: denied { mount } for pid=4659 comm="syz.1.453" name="/" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=filesystem permissive=1 [ 129.537447][ T29] audit: type=1400 audit(129.450:157): avc: denied { remount } for pid=4659 comm="syz.1.453" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=filesystem permissive=1 [ 129.559326][ T29] audit: type=1400 audit(129.460:158): avc: denied { unmount } for pid=3106 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=filesystem permissive=1 [ 131.728120][ T4705] semctl(GETNCNT/GETZCNT) is since 3.16 Single Unix Specification compliant. [ 131.728120][ T4705] The task syz.1.474 (4705) triggered the difference, watch for misbehavior. [ 132.599590][ T4717] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4717 comm=syz.0.480 [ 132.746033][ T29] audit: type=1400 audit(132.660:159): avc: denied { getopt } for pid=4720 comm="syz.0.482" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 132.799504][ T29] audit: type=1400 audit(132.710:160): avc: denied { create } for pid=4722 comm="syz.0.483" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 132.805300][ T29] audit: type=1400 audit(132.710:161): avc: denied { bind } for pid=4722 comm="syz.0.483" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 132.816864][ T29] audit: type=1400 audit(132.730:162): avc: denied { setopt } for pid=4722 comm="syz.0.483" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 134.516521][ T29] audit: type=1400 audit(134.430:163): avc: denied { create } for pid=4776 comm="syz.1.509" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 134.522754][ T29] audit: type=1400 audit(134.430:164): avc: denied { bind } for pid=4776 comm="syz.1.509" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 136.207992][ T29] audit: type=1400 audit(136.120:165): avc: denied { nlmsg_read } for pid=4851 comm="syz.1.547" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 136.417922][ T29] audit: type=1400 audit(136.330:166): avc: denied { setopt } for pid=4859 comm="syz.0.550" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 136.782624][ T29] audit: type=1400 audit(136.690:167): avc: denied { setopt } for pid=4872 comm="syz.0.558" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 137.838984][ T29] audit: type=1400 audit(137.750:168): avc: denied { ioctl } for pid=4918 comm="syz.0.577" path="socket:[6285]" dev="sockfs" ino=6285 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 138.242786][ T29] audit: type=1400 audit(138.150:169): avc: denied { read } for pid=4934 comm="syz.1.585" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 140.876499][ T4962] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4962 comm=syz.0.598 [ 142.025954][ T29] audit: type=1400 audit(141.940:170): avc: denied { ioctl } for pid=4985 comm="syz.1.610" path="socket:[6410]" dev="sockfs" ino=6410 ioctlcmd=0x9367 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 145.860303][ T29] audit: type=1400 audit(145.770:171): avc: denied { create } for pid=5095 comm="syz.1.663" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 145.870931][ T5097] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=5097 comm=syz.1.663 [ 145.871096][ T29] audit: type=1400 audit(145.780:172): avc: denied { write } for pid=5095 comm="syz.1.663" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 146.083892][ T29] audit: type=1400 audit(145.990:173): avc: denied { create } for pid=5103 comm="syz.0.667" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 146.093138][ T29] audit: type=1400 audit(146.000:174): avc: denied { read } for pid=5103 comm="syz.0.667" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 155.082693][ T5269] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5269 comm=syz.0.748 [ 155.657994][ T29] audit: type=1400 audit(155.570:175): avc: denied { unlink } for pid=3106 comm="syz-executor" name="file1" dev="tmpfs" ino=1823 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 161.075836][ T41] usb 2-1: new high-speed USB device number 2 using dummy_hcd [ 161.225830][ T41] usb 2-1: Using ep0 maxpacket: 32 [ 161.234111][ T41] usb 2-1: config index 0 descriptor too short (expected 12790, got 36) [ 161.235045][ T41] usb 2-1: config 54 has an invalid descriptor of length 133, skipping remainder of the config [ 161.235744][ T41] usb 2-1: config 54 has 0 interfaces, different from the descriptor's value: 17 [ 161.235964][ T41] usb 2-1: New USB device found, idVendor=03f0, idProduct=8c17, bcdDevice= 0.40 [ 161.236129][ T41] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 161.454408][ T41] usb 2-1: string descriptor 0 read error: -71 [ 161.458868][ T41] usb 2-1: USB disconnect, device number 2 [ 161.905605][ T4364] usb 2-1: new high-speed USB device number 3 using dummy_hcd [ 162.055333][ T4364] usb 2-1: Using ep0 maxpacket: 32 [ 162.068925][ T4364] usb 2-1: config index 0 descriptor too short (expected 12790, got 36) [ 162.069188][ T4364] usb 2-1: config 54 has an invalid descriptor of length 133, skipping remainder of the config [ 162.069336][ T4364] usb 2-1: config 54 has 0 interfaces, different from the descriptor's value: 17 [ 162.069521][ T4364] usb 2-1: New USB device found, idVendor=03f0, idProduct=8c17, bcdDevice= 0.40 [ 162.069568][ T4364] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 162.291501][ T4364] usb 2-1: string descriptor 0 read error: -71 [ 162.299246][ T4364] usb 2-1: USB disconnect, device number 3 [ 163.383180][ T29] audit: type=1400 audit(163.290:176): avc: denied { lock } for pid=5457 comm="syz.0.833" path="socket:[8014]" dev="sockfs" ino=8014 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tcp_socket permissive=1 [ 163.396480][ T5459] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5459 comm=syz.1.832 [ 164.188389][ T29] audit: type=1400 audit(164.100:177): avc: denied { create } for pid=5488 comm="syz.1.849" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 164.195515][ T29] audit: type=1400 audit(164.100:178): avc: denied { read write } for pid=5488 comm="syz.1.849" name="file0" dev="tmpfs" ino=2072 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 164.202289][ T29] audit: type=1400 audit(164.110:179): avc: denied { open } for pid=5488 comm="syz.1.849" path="/402/file0" dev="tmpfs" ino=2072 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 165.136164][ T5524] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5524 comm=syz.0.865 [ 168.651752][ T29] audit: type=1400 audit(168.560:180): avc: denied { read } for pid=5565 comm="syz.1.887" name="binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 168.652235][ T29] audit: type=1400 audit(168.560:181): avc: denied { open } for pid=5565 comm="syz.1.887" path="/dev/binderfs/binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 168.667273][ T29] audit: type=1400 audit(168.580:182): avc: denied { ioctl } for pid=5565 comm="syz.1.887" path="/dev/binderfs/binder0" dev="binder" ino=4 ioctlcmd=0x6205 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 169.431077][ T4364] hid-generic 0008:0007:FFFF.0001: item fetching failed at offset 0/1 [ 169.432216][ T4364] hid-generic 0008:0007:FFFF.0001: probe with driver hid-generic failed with error -22 [ 170.087002][ T29] audit: type=1400 audit(169.990:183): avc: denied { setopt } for pid=5597 comm="syz.1.903" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 172.487764][ T5607] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=260 sclass=netlink_audit_socket pid=5607 comm=syz.1.904 [ 178.123471][ T5647] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5647 comm=syz.0.922 [ 188.514345][ T5769] netlink: 'syz.1.986': attribute type 29 has an invalid length. [ 188.515773][ T5769] netlink: 8 bytes leftover after parsing attributes in process `syz.1.986'. [ 203.691865][ T6067] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6067 comm=syz.1.1132 [ 208.102957][ T6156] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=6156 comm=syz.1.1171 [ 216.507799][ T6290] netlink: 'syz.1.1235': attribute type 29 has an invalid length. [ 216.508154][ T6290] netlink: 8 bytes leftover after parsing attributes in process `syz.1.1235'. [ 219.941729][ T6354] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6354 comm=syz.0.1267 [ 220.993287][ T6393] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6393 comm=syz.1.1289 [ 238.130007][ T6713] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=6713 comm=syz.0.1442 [ 246.035530][ T41] usb 2-1: new high-speed USB device number 4 using dummy_hcd [ 246.185420][ T41] usb 2-1: Using ep0 maxpacket: 32 [ 246.193399][ T41] usb 2-1: config index 0 descriptor too short (expected 12790, got 36) [ 246.193817][ T41] usb 2-1: config 54 has an invalid descriptor of length 133, skipping remainder of the config [ 246.193984][ T41] usb 2-1: config 54 has 0 interfaces, different from the descriptor's value: 17 [ 246.194072][ T41] usb 2-1: New USB device found, idVendor=03f0, idProduct=8c17, bcdDevice= 0.40 [ 246.194604][ T41] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 246.413983][ T41] usb 2-1: string descriptor 0 read error: -71 [ 246.424208][ T41] usb 2-1: USB disconnect, device number 4 [ 246.865341][ T6827] usb 2-1: new high-speed USB device number 5 using dummy_hcd [ 247.015398][ T6827] usb 2-1: Using ep0 maxpacket: 32 [ 247.022639][ T6827] usb 2-1: config index 0 descriptor too short (expected 12790, got 36) [ 247.024162][ T6827] usb 2-1: config 54 has an invalid descriptor of length 133, skipping remainder of the config [ 247.024417][ T6827] usb 2-1: config 54 has 0 interfaces, different from the descriptor's value: 17 [ 247.024855][ T6827] usb 2-1: New USB device found, idVendor=03f0, idProduct=8c17, bcdDevice= 0.40 [ 247.025002][ T6827] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 247.239237][ T6827] usb 2-1: string descriptor 0 read error: -71 [ 247.247960][ T6827] usb 2-1: USB disconnect, device number 5 [ 264.510925][ T7191] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=7191 comm=syz.1.1668 [ 275.706629][ T7444] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7444 comm=syz.0.1785 [ 278.178041][ T7532] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=7532 comm=syz.1.1830 [ 279.360259][ T7569] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=7569 comm=syz.1.1851 [ 290.571088][ T29] audit: type=1400 audit(290.480:184): avc: denied { read } for pid=7708 comm="syz.1.1916" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 293.237444][ T29] audit: type=1400 audit(293.150:185): avc: denied { getopt } for pid=7728 comm="syz.0.1924" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 298.794112][ T7882] binfmt_misc: register: failed to install interpreter file ./file0/../file0 [ 301.256780][ T7948] binfmt_misc: register: failed to install interpreter file ./file0/../file0 [ 301.644002][ T7964] binfmt_misc: register: failed to install interpreter file ./file0/../file0 [ 303.588399][ T29] audit: type=1400 audit(303.500:186): avc: denied { mount } for pid=8037 comm="syz.1.2074" name="/" dev="sysfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=filesystem permissive=1 [ 303.617756][ T29] audit: type=1400 audit(303.530:187): avc: denied { unmount } for pid=3106 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=filesystem permissive=1 [ 304.414530][ T29] audit: type=1400 audit(304.320:188): avc: denied { remount } for pid=8070 comm="syz.1.2089" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 304.428149][ T29] audit: type=1400 audit(304.340:189): avc: denied { unmount } for pid=3106 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 307.039074][ T8178] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=8178 comm=syz.0.2141 [ 307.808934][ T29] audit: type=1400 audit(307.720:190): avc: denied { associate } for pid=8208 comm="syz.1.2158" name="pfkey" scontext=root:object_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 308.309102][ T8229] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=8229 comm=syz.1.2167 [ 309.113905][ T8259] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=8259 comm=syz.1.2181 [ 311.788558][ T8271] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=8271 comm=syz.1.2188 [ 312.948762][ T8313] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=8313 comm=syz.0.2208 [ 313.343572][ T8327] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=8327 comm=syz.1.2215 [ 317.299072][ T3713] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 317.299473][ T3713] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 317.299632][ T3713] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 317.299705][ T3713] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 317.299772][ T3713] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 317.299944][ T3713] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 317.300019][ T3713] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 317.300135][ T3713] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 317.300204][ T3713] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 317.300270][ T3713] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 317.332890][ T3713] hid-generic 0000:0000:0000.0002: hidraw0: HID v0.00 Device [syz1] on syz1 [ 317.936524][ T29] audit: type=1400 audit(317.850:191): avc: denied { accept } for pid=8429 comm="syz.0.2264" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 318.618622][ T29] audit: type=1400 audit(318.530:192): avc: denied { watch watch_reads } for pid=8451 comm="syz.0.2274" path="/1136" dev="tmpfs" ino=5825 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 327.030978][ T1507] hid_parser_main: 199 callbacks suppressed [ 327.032704][ T1507] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 327.034377][ T1507] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 327.037068][ T1507] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 327.038142][ T1507] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 327.039180][ T1507] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 327.040460][ T1507] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 327.041579][ T1507] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 327.042639][ T1507] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 327.044454][ T1507] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 327.046737][ T1507] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 327.070219][ T1507] hid-generic 0000:0000:0000.0003: hidraw0: HID v0.00 Device [syz1] on syz1 [ 328.509539][ T1507] hid-generic 0000:0000:0000.0004: hidraw0: HID v0.00 Device [syz1] on syz1 [ 332.520508][ T8643] netlink: 16 bytes leftover after parsing attributes in process `syz.1.2362'. [ 332.987040][ T29] audit: type=1400 audit(332.900:193): avc: denied { write } for pid=8660 comm="syz.0.2371" path="socket:[19021]" dev="sockfs" ino=19021 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sock_file permissive=1 [ 333.220191][ T8669] SELinux: syz.0.2374 (8669) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace. [ 339.073187][ T8708] netlink: 16 bytes leftover after parsing attributes in process `syz.0.2394'. [ 339.247410][ T8714] netlink: 16 bytes leftover after parsing attributes in process `syz.0.2400'. [ 347.092901][ T8851] SELinux: syz.1.2462 (8851) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace. [ 352.242952][ T8860] SELinux: syz.0.2470 (8860) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace. [ 366.027937][ T29] audit: type=1400 audit(365.940:194): avc: denied { ioctl } for pid=9038 comm="syz.1.2555" path="socket:[20746]" dev="sockfs" ino=20746 ioctlcmd=0x5320 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 386.173655][ T9492] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=9492 comm=syz.1.2778 [ 386.460881][ T9504] netlink: 'syz.1.2786': attribute type 29 has an invalid length. [ 386.464307][ T9504] netlink: 'syz.1.2786': attribute type 29 has an invalid length. [ 399.598610][ T29] audit: type=1400 audit(399.510:195): avc: denied { mount } for pid=9654 comm="syz.1.2860" name="/" dev="devpts" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:devpts_t tclass=filesystem permissive=1 [ 399.609595][ T29] audit: type=1400 audit(399.510:196): avc: denied { remount } for pid=9654 comm="syz.1.2860" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:devpts_t tclass=filesystem permissive=1 [ 399.624282][ T29] audit: type=1400 audit(399.530:197): avc: denied { unmount } for pid=3106 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:devpts_t tclass=filesystem permissive=1 [ 399.699737][ T29] audit: type=1400 audit(399.610:198): avc: denied { bind } for pid=9656 comm="syz.1.2861" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 405.752342][ T9764] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=9764 comm=syz.1.2914 [ 406.994245][ T29] audit: type=1400 audit(406.900:199): avc: denied { setattr } for pid=9824 comm="syz.0.2944" name="" dev="pipefs" ino=914 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=1 [ 415.498531][ T9962] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=9962 comm=syz.0.3012 [ 415.731219][ T9972] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=9972 comm=syz.1.3018 [ 422.508251][ T29] audit: type=1400 audit(422.420:200): avc: denied { setopt } for pid=10178 comm="syz.1.3121" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 430.337753][T10397] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=10397 comm=syz.1.3229 [ 431.363466][ T29] audit: type=1400 audit(431.270:201): avc: denied { create } for pid=10436 comm="syz.1.3248" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 431.368294][ T29] audit: type=1400 audit(431.280:202): avc: denied { setopt } for pid=10436 comm="syz.1.3248" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 438.993915][T10532] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=10532 comm=syz.0.3292 [ 440.263011][T10545] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=10545 comm=syz.1.3300 [ 858.275028][ C0] watchdog: BUG: soft lockup - CPU#0 stuck for 430s! [swapper/0:0] [ 858.275300][ C0] Modules linked in: [ 858.275900][ C0] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Not tainted syzkaller #0 PREEMPT [ 858.276053][ C0] Hardware name: ARM-Versatile Express [ 858.276219][ C0] PC is at _raw_spin_unlock_irq+0x28/0x54 [ 858.276704][ C0] LR is at tmigr_handle_remote_up+0x268/0x4b0 [ 858.276742][ C0] pc : [<81a89b04>] lr : [<80346224>] psr: 60000113 [ 858.276764][ C0] sp : 82801be0 ip : 82801bf0 fp : 82801bec [ 858.276783][ C0] r10: 00000001 r9 : 00000067 r8 : 69672980 [ 858.276806][ C0] r7 : ddddb488 r6 : 82801cb8 r5 : 830bf3b0 r4 : 830bf380 [ 858.276829][ C0] r3 : 00001d8e r2 : 00000103 r1 : 830bf3b0 r0 : ddddb488 [ 858.276899][ C0] Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment user [ 858.276942][ C0] Control: 30c5387d Table: 851fa440 DAC: fffffffd [ 858.277003][ C0] Call trace: [ 858.277162][ C0] [<81a89adc>] (_raw_spin_unlock_irq) from [<80346224>] (tmigr_handle_remote_up+0x268/0x4b0) [ 858.277379][ C0] [<80345fbc>] (tmigr_handle_remote_up) from [<803444d4>] (__walk_groups_from+0x3c/0xe4) [ 858.277450][ C0] r10:8281b500 r9:8280c820 r8:80345fbc r7:82801cb8 r6:830bf380 r5:00000002 [ 858.277476][ C0] r4:830bf380 [ 858.277489][ C0] [<80344498>] (__walk_groups_from) from [<8034686c>] (tmigr_handle_remote+0xe8/0x108) [ 858.277526][ C0] r9:82804d80 r8:00000102 r7:00000001 r6:00000082 r5:00000002 r4:dddc7488 [ 858.277536][ C0] [<80346784>] (tmigr_handle_remote) from [<80326e68>] (run_timer_softirq+0x30/0x34) [ 858.277566][ C0] r4:82804084 [ 858.277574][ C0] [<80326e38>] (run_timer_softirq) from [<8025af68>] (handle_softirqs+0x140/0x458) [ 858.277603][ C0] [<8025ae28>] (handle_softirqs) from [<8025b3dc>] (__irq_exit_rcu+0x110/0x1d0) [ 858.277639][ C0] r10:00000000 r9:8281b500 r8:00000000 r7:82801dd8 r6:82440a40 r5:8247bc64 [ 858.277648][ C0] r4:8281b500 [ 858.277655][ C0] [<8025b2cc>] (__irq_exit_rcu) from [<8025b754>] (irq_exit+0x10/0x18) [ 858.277683][ C0] r5:8247bc64 r4:826c2a9c [ 858.277690][ C0] [<8025b744>] (irq_exit) from [<81a7b738>] (generic_handle_arch_irq+0x7c/0x80) [ 858.277719][ C0] [<81a7b6bc>] (generic_handle_arch_irq) from [<80200bdc>] (__irq_svc+0x7c/0xbc) [ 858.277791][ C0] Exception stack(0x82801dd8 to 0x82801e20) [ 858.277898][ C0] 1dc0: 00000001 00000000 [ 858.277929][ C0] 1de0: 00001b64 00001b62 83fd2968 00000004 00000001 83fd2968 83345e88 83fd2840 [ 858.277947][ C0] 1e00: 00000000 82801e3c 82801e28 82801e28 81a89c94 81a89cbc 80000013 ffffffff [ 858.277988][ C0] r9:8281b500 r8:83345e88 r7:82801e0c r6:ffffffff r5:80000013 r4:81a89cbc [ 858.277998][ C0] [<81a89c7c>] (_raw_spin_lock) from [<809c0ef0>] (gpio_mmio_set+0x44/0x80) [ 858.278035][ C0] r5:00000004 r4:83fd2840 [ 858.278044][ C0] [<809c0eac>] (gpio_mmio_set) from [<809b187c>] (gpiochip_set+0x1c/0x44) [ 858.278079][ C0] r7:00000001 r6:00000000 r5:00000002 r4:8388d028 [ 858.278088][ C0] [<809b1860>] (gpiochip_set) from [<809b4094>] (gpiod_set_raw_value_commit+0x78/0x218) [ 858.278116][ C0] [<809b401c>] (gpiod_set_raw_value_commit) from [<809b5934>] (gpiod_set_value_nocheck+0x44/0x58) [ 858.278151][ C0] r10:00000000 r9:00000000 r8:00000001 r7:dddce4c0 r6:83939998 r5:00000001 [ 858.278161][ C0] r4:8388d028 [ 858.278169][ C0] [<809b58f0>] (gpiod_set_value_nocheck) from [<809b5984>] (gpiod_set_value+0x3c/0x88) [ 858.278192][ C0] [<809b5948>] (gpiod_set_value) from [<809c5fec>] (gpio_led_set+0x5c/0x60) [ 858.278219][ C0] r5:000000ff r4:832ffa24 [ 858.278226][ C0] [<809c5f90>] (gpio_led_set) from [<809c3928>] (led_set_brightness+0x84/0x90) [ 858.278256][ C0] r5:000000ff r4:832ffa24 [ 858.278263][ C0] [<809c38a4>] (led_set_brightness) from [<809c5494>] (led_trigger_event+0x40/0x58) [ 858.278292][ C0] r5:000000ff r4:832ffa24 [ 858.278300][ C0] [<809c5454>] (led_trigger_event) from [<809c6af0>] (ledtrig_cpu+0xac/0xf4) [ 858.278329][ C0] r7:dddce4c0 r6:00000002 r5:82b15bd8 r4:000001fd [ 858.278336][ C0] [<809c6a44>] (ledtrig_cpu) from [<80227758>] (arch_cpu_idle_exit+0x14/0x18) [ 858.278383][ C0] r9:00000000 r8:00000000 r7:8280c710 r6:8281b500 r5:8280c6d0 r4:00000000 [ 858.278391][ C0] [<80227744>] (arch_cpu_idle_exit) from [<802b13cc>] (do_idle+0x5c/0x2d8) [ 858.278422][ C0] [<802b1370>] (do_idle) from [<802b1978>] (cpu_startup_entry+0x30/0x34) [ 858.278459][ C0] r10:8281aff4 r9:823bb92c r8:00000000 r7:8280c680 r6:deffc06c r5:828222e8 [ 858.278469][ C0] r4:000000ed [ 858.278476][ C0] [<802b1948>] (cpu_startup_entry) from [<81a7d154>] (kernel_init+0x0/0x138) [ 858.278509][ C0] [<81a7d074>] (rest_init) from [<82601338>] (start_kernel+0x738/0x754) [ 858.278559][ C0] [<82600c00>] (start_kernel) from [<00000000>] (0x0) [ 858.278997][ C0] Sending NMI from CPU 0 to CPUs 1: [ 858.279737][ C1] NMI backtrace for cpu 1 [ 858.279929][ C1] CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Not tainted syzkaller #0 PREEMPT [ 858.279995][ C1] Hardware name: ARM-Versatile Express [ 858.280031][ C1] PC is at _raw_spin_lock+0x40/0x58 [ 858.280095][ C1] LR is at _raw_spin_lock+0x18/0x58 [ 858.280132][ C1] pc : [<81a89cbc>] lr : [<81a89c94>] psr: 80000113 [ 858.280159][ C1] sp : df805d68 ip : df805d68 fp : df805d7c [ 858.280179][ C1] r10: 81c05430 r9 : 83fd2840 r8 : 83345e88 [ 858.280212][ C1] r7 : 83fd2968 r6 : 00000001 r5 : 00000001 r4 : 83fd2968 [ 858.280236][ C1] r3 : 00001b62 r2 : 00001b63 r1 : 00000000 r0 : 00000001 [ 858.280259][ C1] Flags: Nzcv IRQs on FIQs on Mode SVC_32 ISA ARM Segment none [ 858.280339][ C1] Control: 30c5387d Table: 84ea4d40 DAC: 00000000 [ 858.280390][ C1] Call trace: frame pointer underflow [ 858.280493][ C1] [<81a89c7c>] (_raw_spin_lock) from [<809c0ef0>] (gpio_mmio_set+0x44/0x80) [ 858.280577][ C1] r5:00000001 r4:83fd2840 [ 858.280616][ C1] [<809c0eac>] (gpio_mmio_set) from [<809b187c>] (gpiochip_set+0x1c/0x44) [ 858.280710][ C1] r7:00000001 r6:00000000 r5:00000000 r4:8388d000 [ 858.280734][ C1] [<809b1860>] (gpiochip_set) from [<809b4094>] (gpiod_set_raw_value_commit+0x78/0x218) [ 858.280810][ C1] [<809b401c>] (gpiod_set_raw_value_commit) from [<809b5934>] (gpiod_set_value_nocheck+0x44/0x58) [ 858.280890][ C1] r10:81c05430 r9:df805ebc r8:00000102 r7:0000384a r6:00000007 r5:00000001 [ 858.280924][ C1] r4:8388d000 [ 858.280943][ C1] [<809b58f0>] (gpiod_set_value_nocheck) from [<809b5984>] (gpiod_set_value+0x3c/0x88) [ 858.281005][ C1] [<809b5948>] (gpiod_set_value) from [<809c5fec>] (gpio_led_set+0x5c/0x60) [ 858.281075][ C1] r5:832ff844 r4:832ff844 [ 858.281096][ C1] [<809c5f90>] (gpio_led_set) from [<809c3898>] (led_set_brightness_nosleep+0x38/0x44) [ 858.281157][ C1] r5:832ff844 r4:84bf6fcc [ 858.281187][ C1] [<809c3860>] (led_set_brightness_nosleep) from [<809c68e8>] (led_heartbeat_function+0x84/0x144) [ 858.281255][ C1] [<809c6864>] (led_heartbeat_function) from [<803267d8>] (call_timer_fn+0x30/0x220) [ 858.281338][ C1] r7:0000384a r6:809c6864 r5:84bf6fcc r4:83216000 [ 858.281376][ C1] [<803267a8>] (call_timer_fn) from [<80326c8c>] (__run_timers+0x2c4/0x3f8) [ 858.281447][ C1] r9:df805ebc r8:0000384a r7:00000000 r6:809c6864 r5:dddd9f00 r4:84bf6fcc [ 858.281477][ C1] [<803269c8>] (__run_timers) from [<80326e28>] (run_timer_base+0x68/0x78) [ 858.281557][ C1] r10:83216000 r9:82804d80 r8:00000102 r7:00000001 r6:00000082 r5:00000002 [ 858.281580][ C1] r4:dddd9f00 [ 858.281598][ C1] [<80326dc0>] (run_timer_base) from [<80326e54>] (run_timer_softirq+0x1c/0x34) [ 858.281655][ C1] r4:82804084 [ 858.281682][ C1] [<80326e38>] (run_timer_softirq) from [<8025af68>] (handle_softirqs+0x140/0x458) [ 858.281746][ C1] [<8025ae28>] (handle_softirqs) from [<8025b3dc>] (__irq_exit_rcu+0x110/0x1d0) [ 858.281817][ C1] r10:00000000 r9:83216000 r8:00000000 r7:df865e20 r6:82440a40 r5:8247bc64 [ 858.281850][ C1] r4:83216000 [ 858.281869][ C1] [<8025b2cc>] (__irq_exit_rcu) from [<8025b754>] (irq_exit+0x10/0x18) [ 858.281931][ C1] r5:8247bc64 r4:826c2a9c [ 858.281948][ C1] [<8025b744>] (irq_exit) from [<81a7b738>] (generic_handle_arch_irq+0x7c/0x80) [ 858.282014][ C1] [<81a7b6bc>] (generic_handle_arch_irq) from [<81a4b818>] (call_with_stack+0x1c/0x20) [ 858.282091][ C1] r9:83216000 r8:83345e88 r7:df865e54 r6:ffffffff r5:20000013 r4:809c16d0 [ 858.282113][ C1] [<81a4b7fc>] (call_with_stack) from [<80200bec>] (__irq_svc+0x8c/0xbc) [ 858.282174][ C1] Exception stack(0xdf865e20 to 0xdf865e68) [ 858.282222][ C1] 5e20: e0146008 00000008 00001b62 809c16d0 83fd2840 00000008 00000001 83fd2968 [ 858.282260][ C1] 5e40: 83345e88 83fd2840 00000000 df865e8c df865e58 df865e70 809c0f10 809c16d0 [ 858.282284][ C1] 5e60: 20000013 ffffffff [ 858.282306][ C1] [<809c0eac>] (gpio_mmio_set) from [<809b187c>] (gpiochip_set+0x1c/0x44) [ 858.282406][ C1] r7:00000001 r6:00000000 r5:00000003 r4:8388d03c [ 858.282428][ C1] [<809b1860>] (gpiochip_set) from [<809b4094>] (gpiod_set_raw_value_commit+0x78/0x218) [ 858.282491][ C1] [<809b401c>] (gpiod_set_raw_value_commit) from [<809b5934>] (gpiod_set_value_nocheck+0x44/0x58) [ 858.282577][ C1] r10:00000000 r9:00000000 r8:00000001 r7:ddde24c0 r6:83939a98 r5:00000001 [ 858.282601][ C1] r4:8388d03c [ 858.282620][ C1] [<809b58f0>] (gpiod_set_value_nocheck) from [<809b5984>] (gpiod_set_value+0x3c/0x88) [ 858.282672][ C1] [<809b5948>] (gpiod_set_value) from [<809c5fec>] (gpio_led_set+0x5c/0x60) [ 858.282726][ C1] r5:000000ff r4:832ffb14 [ 858.282745][ C1] [<809c5f90>] (gpio_led_set) from [<809c3928>] (led_set_brightness+0x84/0x90) [ 858.282809][ C1] r5:000000ff r4:832ffb14 [ 858.282837][ C1] [<809c38a4>] (led_set_brightness) from [<809c5494>] (led_trigger_event+0x40/0x58) [ 858.282903][ C1] r5:000000ff r4:832ffb14 [ 858.282922][ C1] [<809c5454>] (led_trigger_event) from [<809c6af0>] (ledtrig_cpu+0xac/0xf4) [ 858.282990][ C1] r7:ddde24c0 r6:00000002 r5:82b15bd8 r4:000000fe [ 858.283011][ C1] [<809c6a44>] (ledtrig_cpu) from [<80227758>] (arch_cpu_idle_exit+0x14/0x18) [ 858.283090][ C1] r9:00000000 r8:00000001 r7:8280c710 r6:83216000 r5:8280c6d0 r4:00000001 [ 858.283119][ C1] [<80227744>] (arch_cpu_idle_exit) from [<802b13cc>] (do_idle+0x5c/0x2d8) [ 858.283185][ C1] [<802b1370>] (do_idle) from [<802b1978>] (cpu_startup_entry+0x30/0x34) [ 858.283307][ C1] r10:00000000 r9:414fc0f0 r8:80003000 r7:82a7b4a4 r6:83216000 r5:00000001 [ 858.283340][ C1] r4:00000092 [ 858.283368][ C1] [<802b1948>] (cpu_startup_entry) from [<8022f04c>] (secondary_start_kernel+0x128/0x180) [ 858.283432][ C1] [<8022ef24>] (secondary_start_kernel) from [<80220094>] (__enable_mmu+0x0/0xc) [ 858.283506][ C1] r7:82a7b4a4 r6:30c0387d r5:00000000 r4:830b7b80 [ 858.284831][ C0] Kernel panic - not syncing: softlockup: hung tasks [ 858.314212][ C0] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Tainted: G L syzkaller #0 PREEMPT [ 858.314526][ C0] Tainted: [L]=SOFTLOCKUP [ 858.314643][ C0] Hardware name: ARM-Versatile Express [ 858.314798][ C0] Call trace: [ 858.314960][ C0] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 858.315186][ C0] r7:822936e0 r6:8281b500 r5:00000000 r4:82292888 [ 858.315401][ C0] [<80201b08>] (show_stack) from [<8021ec70>] (dump_stack_lvl+0x54/0x7c) [ 858.315605][ C0] [<8021ec1c>] (dump_stack_lvl) from [<8021ecb0>] (dump_stack+0x18/0x1c) [ 858.315806][ C0] r5:00000000 r4:82a7bd18 [ 858.315919][ C0] [<8021ec98>] (dump_stack) from [<802025f8>] (vpanic+0xe0/0x2e8) [ 858.316100][ C0] [<80202518>] (vpanic) from [<80202834>] (trace_suspend_resume+0x0/0xd8) [ 858.316330][ C0] r7:82ac27f0 [ 858.316444][ C0] [<80202800>] (panic) from [<803832c4>] (watchdog_timer_fn+0x2bc/0x330) [ 858.316646][ C0] r3:00000001 r2:00004000 r1:82a7bd20 r0:822936e0 [ 858.316774][ C0] [<80383008>] (watchdog_timer_fn) from [<803293cc>] (__hrtimer_run_queues+0x1c4/0x454) [ 858.316990][ C0] r10:8281b500 r9:00000000 r8:dddc7130 r7:80383008 r6:dddc7000 r5:dddc7040 [ 858.317164][ C0] r4:dddc75d8 [ 858.317240][ C0] [<80329208>] (__hrtimer_run_queues) from [<8032a9d0>] (hrtimer_interrupt+0x148/0x2bc) [ 858.317453][ C0] r10:d01ed8c0 r9:dddc7180 r8:dddc7130 r7:000000c7 r6:00000003 r5:20000193 [ 858.317871][ C0] r4:dddc7000 [ 858.318002][ C0] [<8032a888>] (hrtimer_interrupt) from [<8131cfd0>] (arch_timer_handler_virt+0x30/0x38) [ 858.318381][ C0] r10:81d0f768 r9:8309e400 r8:00000000 r7:00000000 r6:00000000 r5:82495528 [ 858.318672][ C0] r4:8309de00 [ 858.318832][ C0] [<8131cfa0>] (arch_timer_handler_virt) from [<802ef550>] (handle_percpu_devid_irq+0x128/0x34c) [ 858.319179][ C0] [<802ef428>] (handle_percpu_devid_irq) from [<802e86f4>] (handle_irq_desc+0x74/0x84) [ 858.319575][ C0] r10:00000001 r9:8281b500 r8:00000000 r7:df80a00c r6:826c1388 r5:df80a000 [ 858.319879][ C0] r4:8280cc3c [ 858.320033][ C0] [<802e8680>] (handle_irq_desc) from [<802e8770>] (generic_handle_domain_irq+0x18/0x1c) [ 858.320315][ C0] [<802e8758>] (generic_handle_domain_irq) from [<802012c8>] (gic_handle_irq+0x68/0x7c) [ 858.320686][ C0] [<80201260>] (gic_handle_irq) from [<81a7b71c>] (generic_handle_arch_irq+0x60/0x80) [ 858.321044][ C0] r7:82801b90 r6:82440a40 r5:8247bc64 r4:826c2a9c [ 858.321240][ C0] [<81a7b6bc>] (generic_handle_arch_irq) from [<80200bdc>] (__irq_svc+0x7c/0xbc) [ 858.321558][ C0] Exception stack(0x82801b90 to 0x82801bd8) [ 858.321792][ C0] 1b80: ddddb488 830bf3b0 00000103 00001d8e [ 858.322066][ C0] 1ba0: 830bf380 830bf3b0 82801cb8 ddddb488 69672980 00000067 00000001 82801bec [ 858.322389][ C0] 1bc0: 82801bf0 82801be0 80346224 81a89b04 60000113 ffffffff [ 858.322637][ C0] r9:8281b500 r8:69672980 r7:82801bc4 r6:ffffffff r5:60000113 r4:81a89b04 [ 858.322910][ C0] [<81a89adc>] (_raw_spin_unlock_irq) from [<80346224>] (tmigr_handle_remote_up+0x268/0x4b0) [ 858.323265][ C0] [<80345fbc>] (tmigr_handle_remote_up) from [<803444d4>] (__walk_groups_from+0x3c/0xe4) [ 858.323616][ C0] r10:8281b500 r9:8280c820 r8:80345fbc r7:82801cb8 r6:830bf380 r5:00000002 [ 858.323894][ C0] r4:830bf380 [ 858.324038][ C0] [<80344498>] (__walk_groups_from) from [<8034686c>] (tmigr_handle_remote+0xe8/0x108) [ 858.324398][ C0] r9:82804d80 r8:00000102 r7:00000001 r6:00000082 r5:00000002 r4:dddc7488 [ 858.324641][ C0] [<80346784>] (tmigr_handle_remote) from [<80326e68>] (run_timer_softirq+0x30/0x34) [ 858.324979][ C0] r4:82804084 [ 858.325113][ C0] [<80326e38>] (run_timer_softirq) from [<8025af68>] (handle_softirqs+0x140/0x458) [ 858.325456][ C0] [<8025ae28>] (handle_softirqs) from [<8025b3dc>] (__irq_exit_rcu+0x110/0x1d0) [ 858.325808][ C0] r10:00000000 r9:8281b500 r8:00000000 r7:82801dd8 r6:82440a40 r5:8247bc64 [ 858.326098][ C0] r4:8281b500 [ 858.326222][ C0] [<8025b2cc>] (__irq_exit_rcu) from [<8025b754>] (irq_exit+0x10/0x18) [ 858.326552][ C0] r5:8247bc64 r4:826c2a9c [ 858.326699][ C0] [<8025b744>] (irq_exit) from [<81a7b738>] (generic_handle_arch_irq+0x7c/0x80) [ 858.327016][ C0] [<81a7b6bc>] (generic_handle_arch_irq) from [<80200bdc>] (__irq_svc+0x7c/0xbc) [ 858.327361][ C0] Exception stack(0x82801dd8 to 0x82801e20) [ 858.327561][ C0] 1dc0: 00000001 00000000 [ 858.327865][ C0] 1de0: 00001b64 00001b62 83fd2968 00000004 00000001 83fd2968 83345e88 83fd2840 [ 858.328151][ C0] 1e00: 00000000 82801e3c 82801e28 82801e28 81a89c94 81a89cbc 80000013 ffffffff [ 858.328475][ C0] r9:8281b500 r8:83345e88 r7:82801e0c r6:ffffffff r5:80000013 r4:81a89cbc [ 858.328749][ C0] [<81a89c7c>] (_raw_spin_lock) from [<809c0ef0>] (gpio_mmio_set+0x44/0x80) [ 858.329057][ C0] r5:00000004 r4:83fd2840 [ 858.329223][ C0] [<809c0eac>] (gpio_mmio_set) from [<809b187c>] (gpiochip_set+0x1c/0x44) [ 858.329545][ C0] r7:00000001 r6:00000000 r5:00000002 r4:8388d028 [ 858.329775][ C0] [<809b1860>] (gpiochip_set) from [<809b4094>] (gpiod_set_raw_value_commit+0x78/0x218) [ 858.330126][ C0] [<809b401c>] (gpiod_set_raw_value_commit) from [<809b5934>] (gpiod_set_value_nocheck+0x44/0x58) [ 858.330518][ C0] r10:00000000 r9:00000000 r8:00000001 r7:dddce4c0 r6:83939998 r5:00000001 [ 858.330816][ C0] r4:8388d028 [ 858.330962][ C0] [<809b58f0>] (gpiod_set_value_nocheck) from [<809b5984>] (gpiod_set_value+0x3c/0x88) [ 858.331333][ C0] [<809b5948>] (gpiod_set_value) from [<809c5fec>] (gpio_led_set+0x5c/0x60) [ 858.331634][ C0] r5:000000ff r4:832ffa24 [ 858.331810][ C0] [<809c5f90>] (gpio_led_set) from [<809c3928>] (led_set_brightness+0x84/0x90) [ 858.332117][ C0] r5:000000ff r4:832ffa24 [ 858.332294][ C0] [<809c38a4>] (led_set_brightness) from [<809c5494>] (led_trigger_event+0x40/0x58) [ 858.332629][ C0] r5:000000ff r4:832ffa24 [ 858.332805][ C0] [<809c5454>] (led_trigger_event) from [<809c6af0>] (ledtrig_cpu+0xac/0xf4) [ 858.333116][ C0] r7:dddce4c0 r6:00000002 r5:82b15bd8 r4:000001fd [ 858.333345][ C0] [<809c6a44>] (ledtrig_cpu) from [<80227758>] (arch_cpu_idle_exit+0x14/0x18) [ 858.333679][ C0] r9:00000000 r8:00000000 r7:8280c710 r6:8281b500 r5:8280c6d0 r4:00000000 [ 858.333931][ C0] [<80227744>] (arch_cpu_idle_exit) from [<802b13cc>] (do_idle+0x5c/0x2d8) [ 858.334250][ C0] [<802b1370>] (do_idle) from [<802b1978>] (cpu_startup_entry+0x30/0x34) [ 858.334569][ C0] r10:8281aff4 r9:823bb92c r8:00000000 r7:8280c680 r6:deffc06c r5:828222e8 [ 858.334858][ C0] r4:000000ed [ 858.334990][ C0] [<802b1948>] (cpu_startup_entry) from [<81a7d154>] (kernel_init+0x0/0x138) [ 858.335364][ C0] [<81a7d074>] (rest_init) from [<82601338>] (start_kernel+0x738/0x754) [ 858.335656][ C0] [<82600c00>] (start_kernel) from [<00000000>] (0x0) [ 858.338060][ C0] Rebooting in 86400 seconds..