last executing test programs: 642.232468ms ago: executing program 1 (id=609): r0 = getpid() r1 = syz_pidfd_open(r0, 0x0) r2 = socket$nl_audit(0x10, 0x3, 0x9) r3 = pidfd_getfd(r1, r2, 0x0) ioctl$LOOP_GET_STATUS64(r3, 0x2, &(0x7f0000000080)) 642.049459ms ago: executing program 0 (id=610): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(md5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) write(r1, 0x0, 0x0) 538.279672ms ago: executing program 0 (id=611): mkdirat$cgroup(0xffffffffffffff9c, &(0x7f0000000000)='syz0\x00', 0x1ff) r0 = openat$cgroup(0xffffffffffffff9c, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) close(r0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r0, 0x541b, &(0x7f0000000080)) 538.152002ms ago: executing program 1 (id=612): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000c80)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername(r1, &(0x7f00000000c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000000)=0x80) dup3(r0, r2, 0x0) setsockopt$SO_TIMESTAMP(r2, 0x1, 0x1d, &(0x7f0000000140)=0x9, 0x4) 440.247264ms ago: executing program 1 (id=613): r0 = getpid() r1 = syz_pidfd_open(r0, 0x0) r2 = socket$nl_audit(0x10, 0x3, 0x9) r3 = pidfd_getfd(r1, r2, 0x0) sendmsg$TIPC_NL_PUBL_GET(r3, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000480)={0x14, 0x0, 0x8, 0x70bd26, 0x25dfdbfb}, 0x14}}, 0x8) 428.930506ms ago: executing program 0 (id=617): r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x30b542, 0x0) close(r0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) sendmsg$NL80211_CMD_DISCONNECT(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}, 0x1, 0x0, 0x0, 0x4000000}, 0x4000) 318.212209ms ago: executing program 1 (id=614): r0 = signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) close(r0) close(0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) sendmsg$IPCTNL_MSG_TIMEOUT_DELETE(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) 290.327763ms ago: executing program 0 (id=619): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000c80)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername(r1, &(0x7f00000000c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000000)=0x80) dup3(r0, r2, 0x0) setsockopt$SO_TIMESTAMP(r2, 0x1, 0x1d, &(0x7f0000000140)=0x9, 0x4) 202.343705ms ago: executing program 1 (id=615): r0 = openat$selinux_checkreqprot(0xffffff9c, &(0x7f0000000880), 0x0, 0x0) close(r0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000380)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_hmac_sha512\x00'}, 0x58) accept4$alg(r0, 0x0, 0x0, 0x800) 120.033025ms ago: executing program 1 (id=616): r0 = openat$full(0xffffff9c, &(0x7f0000000000), 0x200000, 0x0) close(r0) close(0xffffffffffffffff) socket$packet(0x11, 0x3, 0x300) sendmsg$NL80211_CMD_SET_MULTICAST_TO_UNICAST(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}, 0x1, 0x0, 0x0, 0x4040000}, 0x10) 101.810527ms ago: executing program 0 (id=622): r0 = openat$selinux_enforce(0xffffff9c, &(0x7f0000001680), 0x0, 0x0) close_range(r0, 0xffffffffffffffff, 0x2) close(0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)) write$UHID_SET_REPORT_REPLY(r0, 0x0, 0x0) 0s ago: executing program 0 (id=618): r0 = gettid() timer_create(0x0, &(0x7f0000000140)={0x0, 0x7, 0x4, @tid=r0}, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{}, {0x0, 0x989680}}, 0x0) futex(&(0x7f0000000700)=0x2, 0x0, 0x2, &(0x7f0000000740)={0x77359400}, 0x0, 0x0) restart_syscall() kernel console output (not intermixed with test programs): [ 48.064677][ T29] audit: type=1400 audit(47.970:56): avc: denied { read write } for pid=3095 comm="sftp-server" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 48.077323][ T29] audit: type=1400 audit(47.980:57): avc: denied { open } for pid=3095 comm="sftp-server" path="/dev/null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 Warning: Permanently added '[localhost]:50211' (ED25519) to the list of known hosts. [ 62.882172][ T29] audit: type=1400 audit(62.790:58): avc: denied { name_bind } for pid=3098 comm="sshd-session" src=30000 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 64.659496][ T29] audit: type=1400 audit(64.550:59): avc: denied { execute } for pid=3099 comm="sh" name="syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 64.792257][ T29] audit: type=1400 audit(64.680:60): avc: denied { execute_no_trans } for pid=3099 comm="sh" path="/syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 68.246460][ T29] audit: type=1400 audit(68.160:61): avc: denied { mounton } for pid=3099 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=806 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 68.252017][ T29] audit: type=1400 audit(68.160:62): avc: denied { mount } for pid=3099 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 68.271309][ T3099] cgroup: Unknown subsys name 'net' [ 68.281262][ T29] audit: type=1400 audit(68.190:63): avc: denied { unmount } for pid=3099 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 68.452870][ T3099] cgroup: Unknown subsys name 'cpuset' [ 68.461094][ T3099] cgroup: Unknown subsys name 'hugetlb' [ 68.462067][ T3099] cgroup: Unknown subsys name 'rlimit' [ 68.690204][ T29] audit: type=1400 audit(68.600:64): avc: denied { setattr } for pid=3099 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 68.696318][ T29] audit: type=1400 audit(68.610:65): avc: denied { mounton } for pid=3099 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 68.699176][ T29] audit: type=1400 audit(68.610:66): avc: denied { mount } for pid=3099 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 68.918393][ T3101] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 68.924451][ T29] audit: type=1400 audit(68.830:67): avc: denied { relabelto } for pid=3101 comm="mkswap" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 68.931379][ T29] audit: type=1400 audit(68.840:68): avc: denied { write } for pid=3101 comm="mkswap" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 68.970786][ T29] audit: type=1400 audit(68.880:69): avc: denied { read } for pid=3099 comm="syz-executor" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 68.972976][ T29] audit: type=1400 audit(68.880:70): avc: denied { open } for pid=3099 comm="syz-executor" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 75.757514][ T3099] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 77.619488][ T29] audit: type=1400 audit(77.530:71): avc: denied { execmem } for pid=3102 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 77.682012][ T29] audit: type=1400 audit(77.590:72): avc: denied { read } for pid=3104 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 77.685544][ T29] audit: type=1400 audit(77.600:73): avc: denied { open } for pid=3104 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 77.692926][ T29] audit: type=1400 audit(77.600:74): avc: denied { mounton } for pid=3104 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 77.721298][ T29] audit: type=1400 audit(77.630:75): avc: denied { module_request } for pid=3105 comm="syz-executor" kmod="netdev-nr1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 77.721592][ T29] audit: type=1400 audit(77.630:76): avc: denied { module_request } for pid=3104 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 77.794797][ T29] audit: type=1400 audit(77.700:77): avc: denied { sys_module } for pid=3104 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 78.391763][ T29] audit: type=1400 audit(78.300:78): avc: denied { ioctl } for pid=3105 comm="syz-executor" path="/dev/net/tun" dev="devtmpfs" ino=677 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 79.472324][ T3104] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 79.479738][ T3104] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 79.569958][ T3105] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 79.578207][ T3105] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 80.168865][ T3104] hsr_slave_0: entered promiscuous mode [ 80.173521][ T3104] hsr_slave_1: entered promiscuous mode [ 80.480805][ T3105] hsr_slave_0: entered promiscuous mode [ 80.482310][ T3105] hsr_slave_1: entered promiscuous mode [ 80.486233][ T3105] debugfs: 'hsr0' already exists in 'hsr' [ 80.487435][ T3105] Cannot create hsr debugfs directory [ 80.610128][ T29] audit: type=1400 audit(80.520:79): avc: denied { create } for pid=3104 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 80.612042][ T29] audit: type=1400 audit(80.520:80): avc: denied { write } for pid=3104 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 80.636635][ T3104] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 80.655109][ T3104] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 80.670382][ T3104] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 80.687841][ T3104] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 80.937239][ T3105] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 80.960284][ T3105] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 80.980517][ T3105] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 80.991448][ T3105] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 81.557493][ T3104] 8021q: adding VLAN 0 to HW filter on device bond0 [ 81.866735][ T3105] 8021q: adding VLAN 0 to HW filter on device bond0 [ 84.347617][ T3104] veth0_vlan: entered promiscuous mode [ 84.380050][ T3104] veth1_vlan: entered promiscuous mode [ 84.458758][ T3104] veth0_macvtap: entered promiscuous mode [ 84.473394][ T3104] veth1_macvtap: entered promiscuous mode [ 84.547087][ T55] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 84.548641][ T55] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 84.553705][ T55] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 84.560255][ T55] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 84.689958][ T29] kauditd_printk_skb: 1 callbacks suppressed [ 84.690371][ T29] audit: type=1400 audit(84.600:82): avc: denied { mount } for pid=3104 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 84.706052][ T29] audit: type=1400 audit(84.620:83): avc: denied { mounton } for pid=3104 comm="syz-executor" path="/syzkaller.2runCc/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 84.718080][ T29] audit: type=1400 audit(84.630:84): avc: denied { mount } for pid=3104 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 84.729493][ T29] audit: type=1400 audit(84.640:85): avc: denied { mounton } for pid=3104 comm="syz-executor" path="/syzkaller.2runCc/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 84.744662][ T29] audit: type=1400 audit(84.640:86): avc: denied { mounton } for pid=3104 comm="syz-executor" path="/syzkaller.2runCc/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=3177 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 84.760671][ T29] audit: type=1400 audit(84.670:87): avc: denied { unmount } for pid=3104 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 84.771172][ T29] audit: type=1400 audit(84.680:88): avc: denied { mounton } for pid=3104 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=772 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 84.780045][ T29] audit: type=1400 audit(84.690:89): avc: denied { mount } for pid=3104 comm="syz-executor" name="/" dev="gadgetfs" ino=3179 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 84.791245][ T29] audit: type=1400 audit(84.700:90): avc: denied { mount } for pid=3104 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 84.798426][ T29] audit: type=1400 audit(84.710:91): avc: denied { mounton } for pid=3104 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 84.871389][ T3104] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 85.065912][ T3105] veth0_vlan: entered promiscuous mode [ 85.093948][ T3105] veth1_vlan: entered promiscuous mode [ 85.139955][ T3105] veth0_macvtap: entered promiscuous mode [ 85.165757][ T3105] veth1_macvtap: entered promiscuous mode [ 85.280156][ T52] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 85.280675][ T52] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 85.280774][ T52] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 85.280837][ T52] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 89.175506][ T3736] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=3736 comm=syz.1.11 [ 93.123359][ T29] kauditd_printk_skb: 15 callbacks suppressed [ 93.126630][ T29] audit: type=1400 audit(93.030:107): avc: denied { create } for pid=3785 comm="syz.1.36" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 93.132145][ T29] audit: type=1400 audit(93.040:108): avc: denied { write } for pid=3785 comm="syz.1.36" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 93.211938][ T29] audit: type=1400 audit(93.120:109): avc: denied { create } for pid=3789 comm="syz.0.38" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 93.217514][ T29] audit: type=1400 audit(93.130:110): avc: denied { bind } for pid=3789 comm="syz.0.38" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 93.224426][ T29] audit: type=1400 audit(93.140:111): avc: denied { setopt } for pid=3789 comm="syz.0.38" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 93.228434][ T29] audit: type=1400 audit(93.140:112): avc: denied { accept } for pid=3789 comm="syz.0.38" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 93.228705][ T29] audit: type=1400 audit(93.140:113): avc: denied { create } for pid=3788 comm="syz.1.37" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 93.239374][ T29] audit: type=1400 audit(93.150:114): avc: denied { write } for pid=3789 comm="syz.0.38" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 93.244739][ T29] audit: type=1400 audit(93.150:115): avc: denied { write } for pid=3788 comm="syz.1.37" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 96.489172][ T29] audit: type=1400 audit(96.400:116): avc: denied { unmount } for pid=3104 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 97.513150][ T3854] capability: warning: `syz.1.68' uses 32-bit capabilities (legacy support in use) [ 100.356277][ T29] kauditd_printk_skb: 2 callbacks suppressed [ 100.359292][ T29] audit: type=1400 audit(100.270:119): avc: denied { append } for pid=3894 comm="syz.0.87" name="pcmC0D0p" dev="devtmpfs" ino=723 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 101.349308][ T29] audit: type=1400 audit(101.260:120): avc: denied { read } for pid=3903 comm="syz.0.91" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 103.943323][ T29] audit: type=1400 audit(103.850:121): avc: denied { allowed } for pid=3936 comm="syz.0.106" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 103.955123][ T29] audit: type=1400 audit(103.860:122): avc: denied { sqpoll } for pid=3936 comm="syz.0.106" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 103.972689][ T29] audit: type=1400 audit(103.880:123): avc: denied { create } for pid=3936 comm="syz.0.106" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 103.984515][ T29] audit: type=1400 audit(103.890:124): avc: denied { map } for pid=3936 comm="syz.0.106" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=3577 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 103.985688][ T29] audit: type=1400 audit(103.890:125): avc: denied { read write } for pid=3936 comm="syz.0.106" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=3577 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 105.510372][ T29] audit: type=1400 audit(105.420:126): avc: denied { ioctl } for pid=3954 comm="syz.1.113" path="socket:[3614]" dev="sockfs" ino=3614 ioctlcmd=0x4805 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 108.667510][ T3992] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3992 comm=syz.1.131 [ 108.905631][ T29] audit: type=1400 audit(108.810:127): avc: denied { read } for pid=3997 comm="syz.1.134" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 108.953417][ T29] audit: type=1400 audit(108.860:128): avc: denied { write } for pid=3999 comm="syz.0.135" name="arp" dev="proc" ino=4026532751 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 111.288661][ T4051] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4051 comm=syz.1.157 [ 113.215705][ T29] audit: type=1400 audit(113.130:129): avc: denied { create } for pid=4089 comm="syz.1.174" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 113.278113][ T29] audit: type=1400 audit(113.190:130): avc: denied { setopt } for pid=4089 comm="syz.1.174" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 116.182933][ T29] audit: type=1400 audit(116.090:131): avc: denied { ioctl } for pid=4116 comm="syz.1.187" path="socket:[2999]" dev="sockfs" ino=2999 ioctlcmd=0x4611 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 117.641964][ T29] audit: type=1400 audit(117.550:132): avc: denied { prog_load } for pid=4135 comm="syz.1.195" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 117.642422][ T29] audit: type=1400 audit(117.550:133): avc: denied { bpf } for pid=4135 comm="syz.1.195" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 117.648371][ T29] audit: type=1400 audit(117.560:134): avc: denied { perfmon } for pid=4135 comm="syz.1.195" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 117.666871][ T29] audit: type=1400 audit(117.580:135): avc: denied { prog_run } for pid=4135 comm="syz.1.195" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 119.905907][ T29] audit: type=1400 audit(119.820:136): avc: denied { read } for pid=4150 comm="syz.1.203" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 119.918983][ T29] audit: type=1400 audit(119.830:137): avc: denied { read } for pid=4149 comm="syz.0.202" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 121.024583][ T4156] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4156 comm=syz.1.204 [ 122.760903][ T29] audit: type=1400 audit(122.670:138): avc: denied { create } for pid=4165 comm="syz.0.209" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 122.798841][ T29] audit: type=1400 audit(122.710:139): avc: denied { write } for pid=4165 comm="syz.0.209" path="socket:[4005]" dev="sockfs" ino=4005 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 123.816217][ T4182] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1025 sclass=netlink_route_socket pid=4182 comm=syz.1.216 [ 124.033544][ T29] audit: type=1400 audit(123.940:140): avc: denied { connect } for pid=4185 comm="syz.1.218" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 124.989781][ T4196] Zero length message leads to an empty skb [ 126.545259][ T29] audit: type=1400 audit(126.450:141): avc: denied { nlmsg_write } for pid=4211 comm="syz.0.230" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 127.155500][ T29] audit: type=1400 audit(127.070:142): avc: denied { mount } for pid=4219 comm="syz.0.233" name="/" dev="configfs" ino=75 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=filesystem permissive=1 [ 127.171257][ T29] audit: type=1400 audit(127.070:143): avc: denied { search } for pid=4219 comm="syz.0.233" name="/" dev="configfs" ino=75 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=dir permissive=1 [ 127.180129][ T29] audit: type=1400 audit(127.090:144): avc: denied { search } for pid=4219 comm="syz.0.233" name="/" dev="configfs" ino=75 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=dir permissive=1 [ 127.185713][ T29] audit: type=1400 audit(127.090:145): avc: denied { search } for pid=4219 comm="syz.0.233" name="/" dev="configfs" ino=75 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=dir permissive=1 [ 131.842131][ T4245] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4245 comm=syz.0.245 [ 136.350812][ T29] audit: type=1400 audit(136.260:146): avc: denied { ioctl } for pid=4305 comm="syz.1.272" path="socket:[4254]" dev="sockfs" ino=4254 ioctlcmd=0x8912 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 140.075806][ T4345] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4345 comm=syz.1.291 [ 142.897937][ T4372] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=5137 sclass=netlink_audit_socket pid=4372 comm=syz.0.304 [ 144.687607][ T29] audit: type=1400 audit(144.600:147): avc: denied { create } for pid=4410 comm="syz.0.321" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 144.692619][ T29] audit: type=1400 audit(144.600:148): avc: denied { setopt } for pid=4410 comm="syz.0.321" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 145.954871][ T4415] SELinux: syz.0.323 (4415) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace. [ 146.116450][ T4421] can0: slcan on ttyS3. [ 146.176425][ T4421] can0 (unregistered): slcan off ttyS3. [ 147.892548][ T4453] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=260 sclass=netlink_audit_socket pid=4453 comm=syz.1.333 [ 148.158157][ T29] audit: type=1400 audit(148.070:149): avc: denied { ioctl } for pid=4458 comm="syz.1.336" path="socket:[5535]" dev="sockfs" ino=5535 ioctlcmd=0x89f1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 151.747242][ T29] audit: type=1400 audit(151.660:150): avc: denied { remount } for pid=4508 comm="syz.1.358" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 160.336651][ T4605] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4605 comm=syz.0.398 [ 160.935455][ T29] audit: type=1400 audit(160.850:151): avc: denied { bind } for pid=4617 comm="syz.0.404" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 161.066359][ T4622] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4622 comm=syz.1.406 [ 162.880905][ T29] audit: type=1400 audit(162.790:152): avc: denied { create } for pid=4655 comm="syz.1.422" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 162.892007][ T29] audit: type=1400 audit(162.800:153): avc: denied { bind } for pid=4655 comm="syz.1.422" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 162.901671][ T29] audit: type=1400 audit(162.810:154): avc: denied { connect } for pid=4655 comm="syz.1.422" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 162.913132][ T29] audit: type=1400 audit(162.820:155): avc: denied { listen } for pid=4655 comm="syz.1.422" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 162.920580][ T29] audit: type=1400 audit(162.830:156): avc: denied { accept } for pid=4655 comm="syz.1.422" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 164.829695][ T4689] netlink: 12 bytes leftover after parsing attributes in process `syz.1.438'. [ 164.830589][ T4689] netlink: 20 bytes leftover after parsing attributes in process `syz.1.438'. [ 166.472795][ T4721] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4721 comm=syz.0.453 [ 179.783065][ T4851] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4851 comm=syz.0.515 [ 180.161429][ T4863] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4863 comm=syz.1.518 [ 189.340610][ T4975] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4975 comm=syz.0.570 [ 192.591073][ T4984] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4984 comm=syz.0.580 [ 192.703546][ T29] audit: type=1400 audit(192.610:157): avc: denied { write } for pid=4987 comm="syz.0.577" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 195.143585][ T29] audit: type=1400 audit(195.050:158): avc: denied { read } for pid=5032 comm="syz.0.598" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 195.192959][ T29] audit: type=1400 audit(195.100:159): avc: denied { setattr } for pid=5034 comm="syz.1.599" name="XDP" dev="sockfs" ino=7478 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 195.202196][ T29] audit: type=1400 audit(195.110:160): avc: denied { ioctl } for pid=5034 comm="syz.1.599" path="socket:[7478]" dev="sockfs" ino=7478 ioctlcmd=0x6430 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 196.618008][ T5066] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5066 comm=syz.1.613 [ 594.274197][ C0] watchdog: BUG: soft lockup - CPU#0 stuck for 430s! [swapper/0:0] [ 594.274399][ C0] Modules linked in: [ 594.275029][ C0] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Not tainted syzkaller #0 PREEMPT [ 594.275185][ C0] Hardware name: ARM-Versatile Express [ 594.275344][ C0] PC is at _raw_spin_unlock_irq+0x28/0x54 [ 594.275898][ C0] LR is at tmigr_handle_remote_up+0x268/0x4b0 [ 594.275934][ C0] pc : [<81a8bc8c>] lr : [<803460dc>] psr: 60000113 [ 594.275957][ C0] sp : 82801be0 ip : 82801bf0 fp : 82801bec [ 594.275975][ C0] r10: 00000001 r9 : 0000002e r8 : 250b6780 [ 594.275996][ C0] r7 : ddddb488 r6 : 82801cb8 r5 : 830bf3b0 r4 : 830bf380 [ 594.276016][ C0] r3 : 0000e963 r2 : 00000103 r1 : 830bf3b0 r0 : ddddb488 [ 594.276089][ C0] Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment user [ 594.276174][ C0] Control: 30c5387d Table: 85bd9a40 DAC: fffffffd [ 594.276244][ C0] Call trace: [ 594.276403][ C0] [<81a8bc64>] (_raw_spin_unlock_irq) from [<803460dc>] (tmigr_handle_remote_up+0x268/0x4b0) [ 594.276620][ C0] [<80345e74>] (tmigr_handle_remote_up) from [<8034438c>] (__walk_groups_from+0x3c/0xe4) [ 594.276685][ C0] r10:8281b500 r9:8280c820 r8:80345e74 r7:82801cb8 r6:830bf380 r5:00000002 [ 594.276706][ C0] r4:830bf380 [ 594.276716][ C0] [<80344350>] (__walk_groups_from) from [<80346724>] (tmigr_handle_remote+0xe8/0x108) [ 594.276751][ C0] r9:82804d80 r8:00000102 r7:00000001 r6:00000082 r5:00000002 r4:dddc7488 [ 594.276759][ C0] [<8034663c>] (tmigr_handle_remote) from [<803268f8>] (run_timer_softirq+0x30/0x34) [ 594.276789][ C0] r4:82804084 [ 594.276796][ C0] [<803268c8>] (run_timer_softirq) from [<8025aeb8>] (handle_softirqs+0x140/0x458) [ 594.276826][ C0] [<8025ad78>] (handle_softirqs) from [<8025b32c>] (__irq_exit_rcu+0x110/0x1d0) [ 594.276858][ C0] r10:00000000 r9:8281b500 r8:00000000 r7:82801dd8 r6:82442b28 r5:8247dd4c [ 594.276870][ C0] r4:8281b500 [ 594.276879][ C0] [<8025b21c>] (__irq_exit_rcu) from [<8025b6a4>] (irq_exit+0x10/0x18) [ 594.276915][ C0] r5:8247dd4c r4:826c2a9c [ 594.276934][ C0] [<8025b694>] (irq_exit) from [<81a7d8c4>] (generic_handle_arch_irq+0x7c/0x80) [ 594.276992][ C0] [<81a7d848>] (generic_handle_arch_irq) from [<80200bdc>] (__irq_svc+0x7c/0xbc) [ 594.277083][ C0] Exception stack(0x82801dd8 to 0x82801e20) [ 594.277210][ C0] 1dc0: 00000001 00000000 [ 594.277240][ C0] 1de0: 0000d93e 0000d93c 84073368 00000004 00000001 84073368 840af288 84073240 [ 594.277256][ C0] 1e00: 00000000 82801e3c 82801e28 82801e28 81a8be1c 81a8be44 80000013 ffffffff [ 594.277298][ C0] r9:8281b500 r8:840af288 r7:82801e0c r6:ffffffff r5:80000013 r4:81a8be44 [ 594.277307][ C0] [<81a8be04>] (_raw_spin_lock) from [<809c4ab0>] (gpio_mmio_set+0x44/0x80) [ 594.277344][ C0] r5:00000004 r4:84073240 [ 594.277352][ C0] [<809c4a6c>] (gpio_mmio_set) from [<809b543c>] (gpiochip_set+0x1c/0x44) [ 594.277387][ C0] r7:00000001 r6:00000000 r5:00000002 r4:840fce68 [ 594.277395][ C0] [<809b5420>] (gpiochip_set) from [<809b7c54>] (gpiod_set_raw_value_commit+0x78/0x218) [ 594.277421][ C0] [<809b7bdc>] (gpiod_set_raw_value_commit) from [<809b94f4>] (gpiod_set_value_nocheck+0x44/0x58) [ 594.277452][ C0] r10:00000000 r9:00000000 r8:00000001 r7:dddce4c0 r6:833d0e18 r5:00000001 [ 594.277460][ C0] r4:840fce68 [ 594.277467][ C0] [<809b94b0>] (gpiod_set_value_nocheck) from [<809b9544>] (gpiod_set_value+0x3c/0x88) [ 594.277490][ C0] [<809b9508>] (gpiod_set_value) from [<809c9bac>] (gpio_led_set+0x5c/0x60) [ 594.277518][ C0] r5:000000ff r4:832fe224 [ 594.277525][ C0] [<809c9b50>] (gpio_led_set) from [<809c74e8>] (led_set_brightness+0x84/0x90) [ 594.277550][ C0] r5:000000ff r4:832fe224 [ 594.277557][ C0] [<809c7464>] (led_set_brightness) from [<809c9054>] (led_trigger_event+0x40/0x58) [ 594.277582][ C0] r5:000000ff r4:832fe224 [ 594.277590][ C0] [<809c9014>] (led_trigger_event) from [<809ca6b0>] (ledtrig_cpu+0xac/0xf4) [ 594.277618][ C0] r7:dddce4c0 r6:00000002 r5:82b15cd8 r4:000001fd [ 594.277626][ C0] [<809ca604>] (ledtrig_cpu) from [<80227758>] (arch_cpu_idle_exit+0x14/0x18) [ 594.277661][ C0] r9:00000000 r8:00000000 r7:8280c710 r6:8281b500 r5:8280c6d0 r4:00000000 [ 594.277669][ C0] [<80227744>] (arch_cpu_idle_exit) from [<802b0e84>] (do_idle+0x5c/0x2d8) [ 594.277699][ C0] [<802b0e28>] (do_idle) from [<802b1430>] (cpu_startup_entry+0x30/0x34) [ 594.277734][ C0] r10:8281aff4 r9:823bd7d4 r8:00000000 r7:8280c680 r6:deffc06c r5:828222e8 [ 594.277743][ C0] r4:000000ed [ 594.277750][ C0] [<802b1400>] (cpu_startup_entry) from [<81a7f2dc>] (kernel_init+0x0/0x138) [ 594.277781][ C0] [<81a7f1fc>] (rest_init) from [<82601338>] (start_kernel+0x738/0x754) [ 594.277878][ C0] [<82600c00>] (start_kernel) from [<00000000>] (0x0) [ 594.278405][ C0] Sending NMI from CPU 0 to CPUs 1: [ 594.278956][ C1] NMI backtrace for cpu 1 [ 594.279102][ C1] CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Not tainted syzkaller #0 PREEMPT [ 594.279135][ C1] Hardware name: ARM-Versatile Express [ 594.279148][ C1] PC is at _raw_spin_lock+0x40/0x58 [ 594.279192][ C1] LR is at _raw_spin_lock+0x18/0x58 [ 594.279206][ C1] pc : [<81a8be44>] lr : [<81a8be1c>] psr: 80000113 [ 594.279218][ C1] sp : df805d68 ip : df805d68 fp : df805d7c [ 594.279228][ C1] r10: 81c05450 r9 : 84073240 r8 : 840af288 [ 594.279237][ C1] r7 : 84073368 r6 : 00000001 r5 : 00000001 r4 : 84073368 [ 594.279248][ C1] r3 : 0000d93c r2 : 0000d93d r1 : 00000000 r0 : 00000001 [ 594.279259][ C1] Flags: Nzcv IRQs on FIQs on Mode SVC_32 ISA ARM Segment none [ 594.279280][ C1] Control: 30c5387d Table: 8538c780 DAC: 00000000 [ 594.279291][ C1] Call trace: frame pointer underflow [ 594.279341][ C1] [<81a8be04>] (_raw_spin_lock) from [<809c4ab0>] (gpio_mmio_set+0x44/0x80) [ 594.279385][ C1] r5:00000001 r4:84073240 [ 594.279394][ C1] [<809c4a6c>] (gpio_mmio_set) from [<809b543c>] (gpiochip_set+0x1c/0x44) [ 594.279430][ C1] r7:00000001 r6:00000000 r5:00000000 r4:840fce40 [ 594.279439][ C1] [<809b5420>] (gpiochip_set) from [<809b7c54>] (gpiod_set_raw_value_commit+0x78/0x218) [ 594.279466][ C1] [<809b7bdc>] (gpiod_set_raw_value_commit) from [<809b94f4>] (gpiod_set_value_nocheck+0x44/0x58) [ 594.279498][ C1] r10:81c05450 r9:df805ebc r8:00000102 r7:ffffd837 r6:00000007 r5:00000001 [ 594.279508][ C1] r4:840fce40 [ 594.279515][ C1] [<809b94b0>] (gpiod_set_value_nocheck) from [<809b9544>] (gpiod_set_value+0x3c/0x88) [ 594.279539][ C1] [<809b9508>] (gpiod_set_value) from [<809c9bac>] (gpio_led_set+0x5c/0x60) [ 594.279584][ C1] r5:832fe044 r4:832fe044 [ 594.279603][ C1] [<809c9b50>] (gpio_led_set) from [<809c7458>] (led_set_brightness_nosleep+0x38/0x44) [ 594.279650][ C1] r5:832fe044 r4:84eb648c [ 594.279665][ C1] [<809c7420>] (led_set_brightness_nosleep) from [<809ca4a8>] (led_heartbeat_function+0x84/0x144) [ 594.279708][ C1] [<809ca424>] (led_heartbeat_function) from [<80326268>] (call_timer_fn+0x30/0x220) [ 594.279781][ C1] r7:ffffd837 r6:809ca424 r5:84eb648c r4:83216000 [ 594.279799][ C1] [<80326238>] (call_timer_fn) from [<8032671c>] (__run_timers+0x2c4/0x3f8) [ 594.279872][ C1] r9:df805ebc r8:ffffd837 r7:00000000 r6:809ca424 r5:dddd9f00 r4:84eb648c [ 594.279904][ C1] [<80326458>] (__run_timers) from [<803268b8>] (run_timer_base+0x68/0x78) [ 594.279968][ C1] r10:83216000 r9:82804d80 r8:00000102 r7:00000001 r6:00000082 r5:00000002 [ 594.279996][ C1] r4:dddd9f00 [ 594.280028][ C1] [<80326850>] (run_timer_base) from [<803268e4>] (run_timer_softirq+0x1c/0x34) [ 594.280092][ C1] r4:82804084 [ 594.280118][ C1] [<803268c8>] (run_timer_softirq) from [<8025aeb8>] (handle_softirqs+0x140/0x458) [ 594.280175][ C1] [<8025ad78>] (handle_softirqs) from [<8025b32c>] (__irq_exit_rcu+0x110/0x1d0) [ 594.280238][ C1] r10:00000000 r9:83216000 r8:00000000 r7:df865e08 r6:82442b28 r5:8247dd4c [ 594.280269][ C1] r4:83216000 [ 594.280284][ C1] [<8025b21c>] (__irq_exit_rcu) from [<8025b6a4>] (irq_exit+0x10/0x18) [ 594.280340][ C1] r5:8247dd4c r4:826c2a9c [ 594.280357][ C1] [<8025b694>] (irq_exit) from [<81a7d8c4>] (generic_handle_arch_irq+0x7c/0x80) [ 594.280416][ C1] [<81a7d848>] (generic_handle_arch_irq) from [<81a4d9a4>] (call_with_stack+0x1c/0x20) [ 594.280489][ C1] r9:83216000 r8:840af288 r7:df865e3c r6:ffffffff r5:60000013 r4:809c52b0 [ 594.280508][ C1] [<81a4d988>] (call_with_stack) from [<80200bec>] (__irq_svc+0x8c/0xbc) [ 594.280566][ C1] Exception stack(0xdf865e08 to 0xdf865e50) [ 594.280602][ C1] 5e00: e0387008 00000008 0000d93c 00000000 e0387008 00000008 [ 594.280636][ C1] 5e20: 00000001 84073368 840af288 84073240 00000000 df865e6c df865e58 df865e58 [ 594.280659][ C1] 5e40: 809c52ac 809c52b0 60000013 ffffffff [ 594.280677][ C1] [<809c5290>] (gpio_mmio_write32) from [<809c4ad0>] (gpio_mmio_set+0x64/0x80) [ 594.280740][ C1] r5:00000008 r4:84073240 [ 594.280757][ C1] [<809c4a6c>] (gpio_mmio_set) from [<809b543c>] (gpiochip_set+0x1c/0x44) [ 594.280832][ C1] r7:00000001 r6:00000000 r5:00000003 r4:840fce7c [ 594.280847][ C1] [<809b5420>] (gpiochip_set) from [<809b7c54>] (gpiod_set_raw_value_commit+0x78/0x218) [ 594.280897][ C1] [<809b7bdc>] (gpiod_set_raw_value_commit) from [<809b94f4>] (gpiod_set_value_nocheck+0x44/0x58) [ 594.280962][ C1] r10:00000000 r9:00000000 r8:00000001 r7:ddde24c0 r6:833d0e58 r5:00000001 [ 594.280981][ C1] r4:840fce7c [ 594.280999][ C1] [<809b94b0>] (gpiod_set_value_nocheck) from [<809b9544>] (gpiod_set_value+0x3c/0x88) [ 594.281050][ C1] [<809b9508>] (gpiod_set_value) from [<809c9bac>] (gpio_led_set+0x5c/0x60) [ 594.281101][ C1] r5:000000ff r4:832fe314 [ 594.281151][ C1] [<809c9b50>] (gpio_led_set) from [<809c74e8>] (led_set_brightness+0x84/0x90) [ 594.281219][ C1] r5:000000ff r4:832fe314 [ 594.281236][ C1] [<809c7464>] (led_set_brightness) from [<809c9054>] (led_trigger_event+0x40/0x58) [ 594.281287][ C1] r5:000000ff r4:832fe314 [ 594.281303][ C1] [<809c9014>] (led_trigger_event) from [<809ca6b0>] (ledtrig_cpu+0xac/0xf4) [ 594.281359][ C1] r7:ddde24c0 r6:00000002 r5:82b15cd8 r4:000000fe [ 594.281375][ C1] [<809ca604>] (ledtrig_cpu) from [<80227758>] (arch_cpu_idle_exit+0x14/0x18) [ 594.281442][ C1] r9:00000000 r8:00000001 r7:8280c710 r6:83216000 r5:8280c6d0 r4:00000001 [ 594.281458][ C1] [<80227744>] (arch_cpu_idle_exit) from [<802b0e84>] (do_idle+0x5c/0x2d8) [ 594.281519][ C1] [<802b0e28>] (do_idle) from [<802b1430>] (cpu_startup_entry+0x30/0x34) [ 594.281590][ C1] r10:00000000 r9:414fc0f0 r8:80003000 r7:82a7b4a4 r6:83216000 r5:00000001 [ 594.281611][ C1] r4:00000092 [ 594.281629][ C1] [<802b1400>] (cpu_startup_entry) from [<8022f04c>] (secondary_start_kernel+0x128/0x180) [ 594.281694][ C1] [<8022ef24>] (secondary_start_kernel) from [<80220094>] (__enable_mmu+0x0/0xc) [ 594.281767][ C1] r7:82a7b4a4 r6:30c0387d r5:00000000 r4:830b7bc0 [ 594.283410][ C0] Kernel panic - not syncing: softlockup: hung tasks [ 594.307603][ C0] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Tainted: G L syzkaller #0 PREEMPT [ 594.308450][ C0] Tainted: [L]=SOFTLOCKUP [ 594.308643][ C0] Hardware name: ARM-Versatile Express [ 594.308905][ C0] Call trace: [ 594.309209][ C0] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 594.309603][ C0] r7:82295294 r6:8281b500 r5:00000000 r4:82294458 [ 594.309853][ C0] [<80201b08>] (show_stack) from [<8021ec54>] (dump_stack_lvl+0x54/0x7c) [ 594.310225][ C0] [<8021ec00>] (dump_stack_lvl) from [<8021ec94>] (dump_stack+0x18/0x1c) [ 594.310768][ C0] r5:00000000 r4:82a7bd14 [ 594.311081][ C0] [<8021ec7c>] (dump_stack) from [<802025f8>] (vpanic+0xe0/0x2e8) [ 594.311416][ C0] [<80202518>] (vpanic) from [<80202834>] (trace_suspend_resume+0x0/0xd8) [ 594.311761][ C0] r7:82ac27f0 [ 594.311916][ C0] [<80202800>] (panic) from [<8038317c>] (watchdog_timer_fn+0x2bc/0x330) [ 594.312277][ C0] r3:00000001 r2:00004000 r1:82a7bd1c r0:82295294 [ 594.312625][ C0] [<80382ec0>] (watchdog_timer_fn) from [<80328e5c>] (__hrtimer_run_queues+0x1c4/0x454) [ 594.314518][ C0] r10:8281b500 r9:00000000 r8:dddc7130 r7:80382ec0 r6:dddc7000 r5:dddc7040 [ 594.316191][ C0] r4:dddc75d8 [ 594.316365][ C0] [<80328c98>] (__hrtimer_run_queues) from [<8032a460>] (hrtimer_interrupt+0x148/0x2bc) [ 594.316766][ C0] r10:587e6270 r9:dddc7180 r8:dddc7130 r7:0000008a r6:00000003 r5:20000193 [ 594.317099][ C0] r4:dddc7000 [ 594.317259][ C0] [<8032a318>] (hrtimer_interrupt) from [<8131e118>] (arch_timer_handler_virt+0x30/0x38) [ 594.317652][ C0] r10:81d0f874 r9:8309e400 r8:00000000 r7:00000000 r6:00000000 r5:82497528 [ 594.317955][ C0] r4:8309de40 [ 594.318142][ C0] [<8131e0e8>] (arch_timer_handler_virt) from [<802ef008>] (handle_percpu_devid_irq+0x128/0x34c) [ 594.318529][ C0] [<802eeee0>] (handle_percpu_devid_irq) from [<802e81ac>] (handle_irq_desc+0x74/0x84) [ 594.318950][ C0] r10:00000001 r9:8281b500 r8:00000000 r7:df80a00c r6:826c1388 r5:df80a000 [ 594.319274][ C0] r4:8280cc44 [ 594.319437][ C0] [<802e8138>] (handle_irq_desc) from [<802e8228>] (generic_handle_domain_irq+0x18/0x1c) [ 594.319814][ C0] [<802e8210>] (generic_handle_domain_irq) from [<802012c8>] (gic_handle_irq+0x68/0x7c) [ 594.320212][ C0] [<80201260>] (gic_handle_irq) from [<81a7d8a8>] (generic_handle_arch_irq+0x60/0x80) [ 594.320706][ C0] r7:82801b90 r6:82442b28 r5:8247dd4c r4:826c2a9c [ 594.321012][ C0] [<81a7d848>] (generic_handle_arch_irq) from [<80200bdc>] (__irq_svc+0x7c/0xbc) [ 594.321390][ C0] Exception stack(0x82801b90 to 0x82801bd8) [ 594.321636][ C0] 1b80: ddddb488 830bf3b0 00000103 0000e963 [ 594.321957][ C0] 1ba0: 830bf380 830bf3b0 82801cb8 ddddb488 250b6780 0000002e 00000001 82801bec [ 594.322291][ C0] 1bc0: 82801bf0 82801be0 803460dc 81a8bc8c 60000113 ffffffff [ 594.322568][ C0] r9:8281b500 r8:250b6780 r7:82801bc4 r6:ffffffff r5:60000113 r4:81a8bc8c [ 594.322841][ C0] [<81a8bc64>] (_raw_spin_unlock_irq) from [<803460dc>] (tmigr_handle_remote_up+0x268/0x4b0) [ 594.323222][ C0] [<80345e74>] (tmigr_handle_remote_up) from [<8034438c>] (__walk_groups_from+0x3c/0xe4) [ 594.323599][ C0] r10:8281b500 r9:8280c820 r8:80345e74 r7:82801cb8 r6:830bf380 r5:00000002 [ 594.323890][ C0] r4:830bf380 [ 594.324060][ C0] [<80344350>] (__walk_groups_from) from [<80346724>] (tmigr_handle_remote+0xe8/0x108) [ 594.324452][ C0] r9:82804d80 r8:00000102 r7:00000001 r6:00000082 r5:00000002 r4:dddc7488 [ 594.324814][ C0] [<8034663c>] (tmigr_handle_remote) from [<803268f8>] (run_timer_softirq+0x30/0x34) [ 594.325434][ C0] r4:82804084 [ 594.325595][ C0] [<803268c8>] (run_timer_softirq) from [<8025aeb8>] (handle_softirqs+0x140/0x458) [ 594.325967][ C0] [<8025ad78>] (handle_softirqs) from [<8025b32c>] (__irq_exit_rcu+0x110/0x1d0) [ 594.326352][ C0] r10:00000000 r9:8281b500 r8:00000000 r7:82801dd8 r6:82442b28 r5:8247dd4c [ 594.326702][ C0] r4:8281b500 [ 594.326858][ C0] [<8025b21c>] (__irq_exit_rcu) from [<8025b6a4>] (irq_exit+0x10/0x18) [ 594.327258][ C0] r5:8247dd4c r4:826c2a9c [ 594.327464][ C0] [<8025b694>] (irq_exit) from [<81a7d8c4>] (generic_handle_arch_irq+0x7c/0x80) [ 594.327794][ C0] [<81a7d848>] (generic_handle_arch_irq) from [<80200bdc>] (__irq_svc+0x7c/0xbc) [ 594.328130][ C0] Exception stack(0x82801dd8 to 0x82801e20) [ 594.328348][ C0] 1dc0: 00000001 00000000 [ 594.328662][ C0] 1de0: 0000d93e 0000d93c 84073368 00000004 00000001 84073368 840af288 84073240 [ 594.328950][ C0] 1e00: 00000000 82801e3c 82801e28 82801e28 81a8be1c 81a8be44 80000013 ffffffff [ 594.329257][ C0] r9:8281b500 r8:840af288 r7:82801e0c r6:ffffffff r5:80000013 r4:81a8be44 [ 594.329543][ C0] [<81a8be04>] (_raw_spin_lock) from [<809c4ab0>] (gpio_mmio_set+0x44/0x80) [ 594.329954][ C0] r5:00000004 r4:84073240 [ 594.330160][ C0] [<809c4a6c>] (gpio_mmio_set) from [<809b543c>] (gpiochip_set+0x1c/0x44) [ 594.330585][ C0] r7:00000001 r6:00000000 r5:00000002 r4:840fce68 [ 594.330901][ C0] [<809b5420>] (gpiochip_set) from [<809b7c54>] (gpiod_set_raw_value_commit+0x78/0x218) [ 594.331290][ C0] [<809b7bdc>] (gpiod_set_raw_value_commit) from [<809b94f4>] (gpiod_set_value_nocheck+0x44/0x58) [ 594.331759][ C0] r10:00000000 r9:00000000 r8:00000001 r7:dddce4c0 r6:833d0e18 r5:00000001 [ 594.332085][ C0] r4:840fce68 [ 594.332234][ C0] [<809b94b0>] (gpiod_set_value_nocheck) from [<809b9544>] (gpiod_set_value+0x3c/0x88) [ 594.332595][ C0] [<809b9508>] (gpiod_set_value) from [<809c9bac>] (gpio_led_set+0x5c/0x60) [ 594.332925][ C0] r5:000000ff r4:832fe224 [ 594.333117][ C0] [<809c9b50>] (gpio_led_set) from [<809c74e8>] (led_set_brightness+0x84/0x90) [ 594.333457][ C0] r5:000000ff r4:832fe224 [ 594.333630][ C0] [<809c7464>] (led_set_brightness) from [<809c9054>] (led_trigger_event+0x40/0x58) [ 594.333971][ C0] r5:000000ff r4:832fe224 [ 594.334162][ C0] [<809c9014>] (led_trigger_event) from [<809ca6b0>] (ledtrig_cpu+0xac/0xf4) [ 594.334511][ C0] r7:dddce4c0 r6:00000002 r5:82b15cd8 r4:000001fd [ 594.334780][ C0] [<809ca604>] (ledtrig_cpu) from [<80227758>] (arch_cpu_idle_exit+0x14/0x18) [ 594.335168][ C0] r9:00000000 r8:00000000 r7:8280c710 r6:8281b500 r5:8280c6d0 r4:00000000 [ 594.335463][ C0] [<80227744>] (arch_cpu_idle_exit) from [<802b0e84>] (do_idle+0x5c/0x2d8) [ 594.335843][ C0] [<802b0e28>] (do_idle) from [<802b1430>] (cpu_startup_entry+0x30/0x34) [ 594.336191][ C0] r10:8281aff4 r9:823bd7d4 r8:00000000 r7:8280c680 r6:deffc06c r5:828222e8 [ 594.336487][ C0] r4:000000ed [ 594.336643][ C0] [<802b1400>] (cpu_startup_entry) from [<81a7f2dc>] (kernel_init+0x0/0x138) [ 594.337006][ C0] [<81a7f1fc>] (rest_init) from [<82601338>] (start_kernel+0x738/0x754) [ 594.337367][ C0] [<82600c00>] (start_kernel) from [<00000000>] (0x0) [ 594.339948][ C0] Rebooting in 86400 seconds..