last executing test programs: 5.438159176s ago: executing program 0 (id=77): syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000177ff4)={0x10, 0x0, 0x1}, 0xc) write(r0, &(0x7f0000000140)="2600000022004701050000070000000000000020002b1f000a4a51f1ee839cd53400b017ca5b", 0x26) connect$netlink(r0, &(0x7f00000014c0)=@proc={0x10, 0x0, 0x1}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000b4bffc), 0x4) write(r0, &(0x7f0000000000)='\"', 0x1) 3.894927072s ago: executing program 0 (id=78): bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0xfffffffffffffe8b, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0b00000007000000010001000900000001"], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000300)=""/180}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='sys_enter\x00', r1}, 0x10) fstatfs(r2, &(0x7f0000000680)=""/221) 3.886280763s ago: executing program 1 (id=79): r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = accept4$unix(r1, 0x0, 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x5421, &(0x7f0000000000)) 3.770244668s ago: executing program 1 (id=81): r0 = socket(0x29, 0x2, 0x0) sendmsg$BATADV_CMD_SET_VLAN(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[], 0x33fe0}, 0x1, 0x0, 0x0, 0x20000080}, 0x0) sendmsg$NL80211_CMD_JOIN_MESH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x4000080}, 0x4040000) close_range(r0, 0xffffffffffffffff, 0x0) timer_create(0x7, &(0x7f0000000680)={0x0, 0x21}, &(0x7f0000000040)) openat$dsp1(0xffffff9c, &(0x7f0000002c00), 0x8001, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x8}, {0x0, 0x989680}}, 0x0) 3.669499011s ago: executing program 0 (id=82): r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000000180)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = dup3(r1, r0, 0x0) accept4$llc(r2, &(0x7f00000000c0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000040)=0x10, 0x80800) 2.688821536s ago: executing program 1 (id=83): r0 = socket(0x29, 0x2, 0x0) sendmsg$BATADV_CMD_SET_VLAN(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[], 0x33fe0}, 0x1, 0x0, 0x0, 0x8000}, 0x40) sendmsg$RDMA_NLDEV_CMD_DELLINK(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={0x0}, 0x1, 0x0, 0x0, 0x40}, 0x1) close_range(r0, r0, 0x0) timer_create(0x0, &(0x7f0000000680)={0x0, 0x21}, &(0x7f0000000100)) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x8}, {0x0, 0x989680}}, 0x0) eventfd(0x0) 2.668613209s ago: executing program 0 (id=87): sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000440)=@newlink={0x20, 0x10, 0xffffff1f, 0x0, 0x1}, 0x20}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000000440), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f0000000040)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140), 0x40000000040201, 0x0) r2 = syz_open_dev$sndpcmp(&(0x7f0000000200), 0x0, 0xa2c65) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x200000000002, 0x0, 0x13f, 0xf}}, 0x20) ioctl$SNDRV_PCM_IOCTL_CHANNEL_INFO(r2, 0x80104132, &(0x7f0000000300)) 1.740880737s ago: executing program 0 (id=84): r0 = socket(0x29, 0x2, 0x0) sendmsg$BATADV_CMD_SET_VLAN(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000000c0)=ANY=[], 0x33fe0}, 0x1, 0x0, 0x0, 0x8000}, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000380), r0) close_range(r0, r0, 0x0) socket$can_j1939(0x1d, 0x2, 0x7) timer_create(0x0, &(0x7f0000000680)={0x0, 0x21, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000100)) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x8}, {0x0, 0x989680}}, 0x0) 1.341306688s ago: executing program 1 (id=85): r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000000), 0x240, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(r0, 0xc010f508, 0x0) fcntl$setstatus(r0, 0x4, 0x2800) fsetxattr$trusted_overlay_opaque(r0, 0x0, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$ethtool(0x0, r0) timer_settime(0x0, 0x1, &(0x7f0000001500)={{}, {0x77359400}}, 0x0) sendmsg$NFC_CMD_GET_SE(0xffffffffffffffff, 0x0, 0x20000881) 609.209281ms ago: executing program 1 (id=86): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000080)='}.\'\x00', 0x0) r3 = dup3(r2, r0, 0x0) r4 = fcntl$dupfd(r1, 0x0, r0) recvmmsg$unix(r4, &(0x7f0000002140)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000001980)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x30}}], 0x1, 0x0, 0x0) dup2(r3, r5) preadv2(r6, 0x0, 0x0, 0x0, 0x0, 0x0) 501.855405ms ago: executing program 0 (id=91): r0 = openat$ubi_ctrl(0xffffff9c, &(0x7f0000000040), 0x3e1882, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x29, 0x2, 0x0) write$selinux_context(r0, &(0x7f0000000240)='system_u:object_r:netcontrol_device_t:s0\x00', 0x29) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000200)={r0}) fsconfig$FSCONFIG_SET_FD(r0, 0x5, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x0, r1) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000180)={&(0x7f00000003c0)={0x48, 0x17, 0xa, 0x301, 0x0, 0x0, {0xe, 0x0, 0x5}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x4}, @NFTA_FLOWTABLE_HANDLE={0xc, 0x5, 0x1, 0x0, 0x2}]}, 0x48}, 0x1, 0x0, 0x0, 0x20000840}, 0x4008040) 0s ago: executing program 1 (id=88): futex(&(0x7f000000cffc), 0x0, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0x0, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0x3, 0x801, 0x0, &(0x7f0000000040), 0xfffffffc) mlock2(&(0x7f0000ff5000/0x9000)=nil, 0x9000, 0x0) mremap(&(0x7f0000ff5000/0x2000)=nil, 0x2000, 0x5000000, 0x3, &(0x7f0000ffd000/0x1000)=nil) mlock2(&(0x7f0000495000/0x2000)=nil, 0x2000, 0x0) mincore(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0x0) kernel console output (not intermixed with test programs): [ 48.257204][ T29] audit: type=1400 audit(48.170:56): avc: denied { read write } for pid=3085 comm="sftp-server" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 48.257657][ T29] audit: type=1400 audit(48.170:57): avc: denied { open } for pid=3085 comm="sftp-server" path="/dev/null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 Warning: Permanently added '[localhost]:32767' (ED25519) to the list of known hosts. [ 63.322440][ T29] audit: type=1400 audit(63.210:58): avc: denied { name_bind } for pid=3088 comm="sshd-session" src=30000 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 65.116384][ T29] audit: type=1400 audit(65.020:59): avc: denied { execute } for pid=3089 comm="sh" name="syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 65.194755][ T29] audit: type=1400 audit(65.090:60): avc: denied { execute_no_trans } for pid=3089 comm="sh" path="/syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 69.461580][ T29] audit: type=1400 audit(69.370:61): avc: denied { mounton } for pid=3089 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=806 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 69.468395][ T29] audit: type=1400 audit(69.380:62): avc: denied { mount } for pid=3089 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 69.487003][ T3089] cgroup: Unknown subsys name 'net' [ 69.496385][ T29] audit: type=1400 audit(69.410:63): avc: denied { unmount } for pid=3089 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 69.723357][ T3089] cgroup: Unknown subsys name 'cpuset' [ 69.729025][ T3089] cgroup: Unknown subsys name 'hugetlb' [ 69.733491][ T3089] cgroup: Unknown subsys name 'rlimit' [ 69.936338][ T29] audit: type=1400 audit(69.850:64): avc: denied { setattr } for pid=3089 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 69.939858][ T29] audit: type=1400 audit(69.850:65): avc: denied { mounton } for pid=3089 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 69.941572][ T29] audit: type=1400 audit(69.850:66): avc: denied { mount } for pid=3089 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 70.059244][ T3091] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 70.060442][ T29] audit: type=1400 audit(69.970:67): avc: denied { relabelto } for pid=3091 comm="mkswap" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 70.066545][ T29] audit: type=1400 audit(69.980:68): avc: denied { write } for pid=3091 comm="mkswap" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 70.093930][ T29] audit: type=1400 audit(70.010:69): avc: denied { read } for pid=3089 comm="syz-executor" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 70.095936][ T29] audit: type=1400 audit(70.010:70): avc: denied { open } for pid=3089 comm="syz-executor" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 76.744267][ T3089] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 78.729448][ T29] audit: type=1400 audit(78.640:71): avc: denied { execmem } for pid=3092 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 78.790186][ T29] audit: type=1400 audit(78.700:72): avc: denied { read } for pid=3094 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 78.792553][ T29] audit: type=1400 audit(78.700:73): avc: denied { open } for pid=3094 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 78.803396][ T29] audit: type=1400 audit(78.720:74): avc: denied { mounton } for pid=3094 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 78.819617][ T29] audit: type=1400 audit(78.730:75): avc: denied { module_request } for pid=3095 comm="syz-executor" kmod="netdev-nr1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 78.864155][ T29] audit: type=1400 audit(78.780:76): avc: denied { sys_module } for pid=3094 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 79.399942][ T29] audit: type=1400 audit(79.310:77): avc: denied { ioctl } for pid=3094 comm="syz-executor" path="/dev/net/tun" dev="devtmpfs" ino=677 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 80.587914][ T3094] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 80.596353][ T3095] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 80.603238][ T3094] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 80.609148][ T3095] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 81.494909][ T3095] hsr_slave_0: entered promiscuous mode [ 81.498072][ T3095] hsr_slave_1: entered promiscuous mode [ 81.531508][ T3094] hsr_slave_0: entered promiscuous mode [ 81.534776][ T3094] hsr_slave_1: entered promiscuous mode [ 81.538582][ T3094] debugfs: 'hsr0' already exists in 'hsr' [ 81.540835][ T3094] Cannot create hsr debugfs directory [ 82.016996][ T29] audit: type=1400 audit(81.930:78): avc: denied { create } for pid=3094 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 82.020941][ T29] audit: type=1400 audit(81.930:79): avc: denied { write } for pid=3094 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 82.023379][ T29] audit: type=1400 audit(81.930:80): avc: denied { read } for pid=3094 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 82.032393][ T3094] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 82.051696][ T3094] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 82.076878][ T3094] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 82.106857][ T3094] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 82.167721][ T3095] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 82.186254][ T3095] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 82.198157][ T3095] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 82.211650][ T3095] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 82.896584][ T3094] 8021q: adding VLAN 0 to HW filter on device bond0 [ 82.964913][ T3095] 8021q: adding VLAN 0 to HW filter on device bond0 [ 85.451800][ T3095] veth0_vlan: entered promiscuous mode [ 85.475183][ T3094] veth0_vlan: entered promiscuous mode [ 85.486940][ T3095] veth1_vlan: entered promiscuous mode [ 85.505220][ T3094] veth1_vlan: entered promiscuous mode [ 85.551066][ T3095] veth0_macvtap: entered promiscuous mode [ 85.569288][ T3095] veth1_macvtap: entered promiscuous mode [ 85.587491][ T3094] veth0_macvtap: entered promiscuous mode [ 85.597077][ T3094] veth1_macvtap: entered promiscuous mode [ 85.670799][ T2530] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 85.671472][ T2530] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 85.671590][ T2530] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 85.671650][ T2530] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 85.679347][ T2530] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 85.679757][ T2530] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 85.686060][ T2530] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 85.689160][ T2530] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 85.763619][ T29] audit: type=1400 audit(85.670:81): avc: denied { mount } for pid=3095 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 85.779929][ T29] audit: type=1400 audit(85.670:82): avc: denied { mounton } for pid=3095 comm="syz-executor" path="/syzkaller.EJX4IQ/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 85.785295][ T29] audit: type=1400 audit(85.700:83): avc: denied { mount } for pid=3095 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 85.794590][ T29] audit: type=1400 audit(85.700:84): avc: denied { mounton } for pid=3095 comm="syz-executor" path="/syzkaller.EJX4IQ/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 85.794927][ T29] audit: type=1400 audit(85.710:85): avc: denied { mounton } for pid=3095 comm="syz-executor" path="/syzkaller.EJX4IQ/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=967 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 85.812631][ T29] audit: type=1400 audit(85.720:86): avc: denied { unmount } for pid=3095 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 85.823387][ T29] audit: type=1400 audit(85.730:87): avc: denied { mounton } for pid=3095 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=772 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 85.829981][ T29] audit: type=1400 audit(85.740:88): avc: denied { mount } for pid=3095 comm="syz-executor" name="/" dev="gadgetfs" ino=972 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 85.851795][ T29] audit: type=1400 audit(85.760:89): avc: denied { mount } for pid=3095 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 85.864019][ T29] audit: type=1400 audit(85.760:90): avc: denied { mounton } for pid=3095 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 85.931466][ T3095] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 85.931485][ T3094] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 91.717227][ T29] kauditd_printk_skb: 12 callbacks suppressed [ 91.721386][ T29] audit: type=1400 audit(91.630:103): avc: denied { create } for pid=3747 comm="syz.1.17" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 91.726506][ T29] audit: type=1400 audit(91.640:104): avc: denied { bind } for pid=3747 comm="syz.1.17" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 91.735501][ T29] audit: type=1400 audit(91.650:105): avc: denied { setopt } for pid=3747 comm="syz.1.17" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 91.738571][ T29] audit: type=1400 audit(91.650:106): avc: denied { accept } for pid=3747 comm="syz.1.17" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 91.748609][ T29] audit: type=1400 audit(91.660:107): avc: denied { read } for pid=3747 comm="syz.1.17" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 92.255039][ T29] audit: type=1400 audit(92.170:108): avc: denied { write } for pid=3747 comm="syz.1.17" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 96.650063][ T3769] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=3769 comm=syz.0.24 [ 96.903402][ T29] audit: type=1400 audit(96.820:109): avc: denied { append } for pid=3776 comm="syz.1.27" name="pcmC0D0p" dev="devtmpfs" ino=725 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 97.605242][ T29] audit: type=1400 audit(97.520:110): avc: denied { create } for pid=3781 comm="syz.1.30" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 97.612957][ T29] audit: type=1400 audit(97.520:111): avc: denied { ioctl } for pid=3781 comm="syz.1.30" path="socket:[2551]" dev="sockfs" ino=2551 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 97.615502][ T29] audit: type=1400 audit(97.530:112): avc: denied { bind } for pid=3781 comm="syz.1.30" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 97.624601][ T29] audit: type=1400 audit(97.540:113): avc: denied { write } for pid=3781 comm="syz.1.30" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 98.629720][ T29] audit: type=1400 audit(98.540:114): avc: denied { read } for pid=3781 comm="syz.1.30" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 100.135662][ T29] audit: type=1400 audit(100.050:115): avc: denied { unmount } for pid=3094 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 100.818281][ T29] audit: type=1400 audit(100.730:116): avc: denied { nlmsg_write } for pid=3792 comm="syz.1.36" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 101.412418][ T29] audit: type=1400 audit(101.320:117): avc: denied { execute } for pid=3796 comm="syz.0.33" path=2F6D656D66643A0B656DDA99101E6DFCFE9B232AFF202864656C6574656429 dev="tmpfs" ino=1025 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 103.356111][ T3812] Zero length message leads to an empty skb [ 106.647019][ T29] audit: type=1400 audit(106.560:118): avc: denied { create } for pid=3827 comm="syz.0.45" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 112.257447][ T29] audit: type=1400 audit(112.170:119): avc: denied { create } for pid=3865 comm="syz.1.59" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 112.275923][ T29] audit: type=1400 audit(112.190:120): avc: denied { write } for pid=3865 comm="syz.1.59" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 122.184303][ T29] audit: type=1400 audit(122.100:121): avc: denied { prog_load } for pid=3935 comm="syz.0.78" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 122.186046][ T29] audit: type=1400 audit(122.100:122): avc: denied { bpf } for pid=3935 comm="syz.0.78" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 122.188838][ T29] audit: type=1400 audit(122.100:123): avc: denied { map_create } for pid=3935 comm="syz.0.78" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 122.195535][ T29] audit: type=1400 audit(122.100:124): avc: denied { map_read map_write } for pid=3935 comm="syz.0.78" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 122.214077][ T29] audit: type=1400 audit(122.130:125): avc: denied { perfmon } for pid=3935 comm="syz.0.78" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 122.240187][ T29] audit: type=1400 audit(122.150:126): avc: denied { prog_run } for pid=3935 comm="syz.0.78" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 125.843878][ T29] audit: type=1400 audit(125.760:127): avc: denied { ioctl } for pid=3952 comm="syz.0.91" path="socket:[2802]" dev="sockfs" ino=2802 ioctlcmd=0x89e1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 528.292857][ C0] watchdog: BUG: soft lockup - CPU#0 stuck for 431s! [kworker/0:4:3700] [ 528.293420][ C0] Modules linked in: [ 528.294461][ C0] CPU: 0 UID: 0 PID: 3700 Comm: kworker/0:4 Not tainted syzkaller #0 PREEMPT [ 528.294702][ C0] Hardware name: ARM-Versatile Express [ 528.294978][ C0] Workqueue: events bpf_prog_free_deferred [ 528.295929][ C0] PC is at _raw_spin_unlock_irq+0x28/0x54 [ 528.296090][ C0] LR is at tmigr_handle_remote_up+0x268/0x4b0 [ 528.296161][ C0] pc : [<81abbd3c>] lr : [<80346ef4>] psr: 60000113 [ 528.296205][ C0] sp : df801e08 ip : df801e18 fp : df801e14 [ 528.296248][ C0] r10: 00000001 r9 : 0000001d r8 : 86770a80 [ 528.296289][ C0] r7 : ddddb488 r6 : df801ee0 r5 : 830bf3b0 r4 : 830bf380 [ 528.296337][ C0] r3 : 00001fff r2 : 00000101 r1 : 830bf3b0 r0 : ddddb488 [ 528.296457][ C0] Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment user [ 528.296535][ C0] Control: 30c5387d Table: 85f8a100 DAC: fffffffd [ 528.296642][ C0] Call trace: frame pointer underflow [ 528.296960][ C0] [<81abbd14>] (_raw_spin_unlock_irq) from [<80346ef4>] (tmigr_handle_remote_up+0x268/0x4b0) [ 528.297260][ C0] [<80346c8c>] (tmigr_handle_remote_up) from [<803451a4>] (__walk_groups_from+0x3c/0xe4) [ 528.297380][ C0] r10:853f0c00 r9:8280c820 r8:80346c8c r7:df801ee0 r6:830bf380 r5:00000002 [ 528.297428][ C0] r4:830bf380 [ 528.297455][ C0] [<80345168>] (__walk_groups_from) from [<8034753c>] (tmigr_handle_remote+0xe8/0x108) [ 528.297532][ C0] r9:82804d80 r8:00000100 r7:00000001 r6:00000002 r5:00000002 r4:dddc7488 [ 528.297553][ C0] [<80347454>] (tmigr_handle_remote) from [<80327700>] (run_timer_softirq+0x30/0x34) [ 528.297614][ C0] r4:82804084 [ 528.297632][ C0] [<803276d0>] (run_timer_softirq) from [<8025b65c>] (handle_softirqs+0x140/0x458) [ 528.297689][ C0] [<8025b51c>] (handle_softirqs) from [<8025bad0>] (__irq_exit_rcu+0x110/0x1d0) [ 528.297761][ C0] r10:8280c9f8 r9:853f0c00 r8:00000000 r7:dfcbdd20 r6:82443f98 r5:8247f0cc [ 528.297783][ C0] r4:853f0c00 [ 528.297799][ C0] [<8025b9c0>] (__irq_exit_rcu) from [<8025be48>] (irq_exit+0x10/0x18) [ 528.297857][ C0] r5:8247f0cc r4:826c3a9c [ 528.297875][ C0] [<8025be38>] (irq_exit) from [<81aad964>] (generic_handle_arch_irq+0x7c/0x80) [ 528.297935][ C0] [<81aad8e8>] (generic_handle_arch_irq) from [<81a7d904>] (call_with_stack+0x1c/0x20) [ 528.298008][ C0] r9:853f0c00 r8:7f00b000 r7:dfcbdd54 r6:ffffffff r5:80000013 r4:80239030 [ 528.298034][ C0] [<81a7d8e8>] (call_with_stack) from [<80200bec>] (__irq_svc+0x8c/0xbc) [ 528.298175][ C0] Exception stack(0xdfcbdd20 to 0xdfcbdd68) [ 528.298357][ C0] dd20: e174d000 eaccf000 00000001 80239018 7f00b000 00000001 82ace204 82acd5e0 [ 528.298416][ C0] dd40: 7f00b000 eaccf000 8280c9f8 dfcbdd9c dfcbdda0 dfcbdd70 8022fe10 80239030 [ 528.298442][ C0] dd60: 80000013 ffffffff [ 528.298503][ C0] [<8022fdac>] (flush_tlb_kernel_range) from [<804f3de4>] (__purge_vmap_area_lazy+0x284/0x458) [ 528.298578][ C0] r4:82ace224 [ 528.298596][ C0] [<804f3b60>] (__purge_vmap_area_lazy) from [<804f419c>] (_vm_unmap_aliases+0x1e4/0x240) [ 528.298666][ C0] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfcbddc0 r5:dfcbde08 [ 528.298689][ C0] r4:dfcbddc0 [ 528.298709][ C0] [<804f3fb8>] (_vm_unmap_aliases) from [<804f7e08>] (vfree+0x16c/0x210) [ 528.298776][ C0] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f8ad80 [ 528.298800][ C0] r4:00000000 [ 528.298818][ C0] [<804f7c9c>] (vfree) from [<80563c0c>] (execmem_free+0x30/0x50) [ 528.298896][ C0] r9:83018405 r8:853f0c00 r7:00000000 r6:83018400 r5:00001000 r4:7f00b000 [ 528.298917][ C0] [<80563bdc>] (execmem_free) from [<803cb1bc>] (bpf_jit_free_exec+0x10/0x14) [ 528.298976][ C0] r5:00001000 r4:eac89000 [ 528.298995][ C0] [<803cb1ac>] (bpf_jit_free_exec) from [<803cb59c>] (bpf_jit_free+0x68/0xe4) [ 528.299051][ C0] [<803cb534>] (bpf_jit_free) from [<803cc6c4>] (bpf_prog_free_deferred+0x140/0x158) [ 528.299113][ C0] r5:85d9cf8c r4:85f11980 [ 528.299139][ C0] [<803cc584>] (bpf_prog_free_deferred) from [<80275db8>] (process_one_work+0x1b4/0x4f4) [ 528.299205][ C0] r7:dddcfb40 r6:83018400 r5:85d9cf8c r4:85f11980 [ 528.299226][ C0] [<80275c04>] (process_one_work) from [<802764f8>] (worker_thread+0x1fc/0x3d8) [ 528.299305][ C0] r10:61c88647 r9:853f0c00 r8:85f119ac r7:82804d80 r6:dddcfb40 r5:dddcfb60 [ 528.299326][ C0] r4:85f11980 [ 528.299344][ C0] [<802762fc>] (worker_thread) from [<8027f6fc>] (kthread+0x12c/0x280) [ 528.299413][ C0] r10:00000000 r9:85f11980 r8:802762fc r7:df841e60 r6:85f46300 r5:853f0c00 [ 528.299434][ C0] r4:00000001 [ 528.299451][ C0] [<8027f5d0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 528.299497][ C0] Exception stack(0xdfcbdfb0 to 0xdfcbdff8) [ 528.299528][ C0] dfa0: 00000000 00000000 00000000 00000000 [ 528.299564][ C0] dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 528.299596][ C0] dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 528.299635][ C0] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8027f5d0 [ 528.299656][ C0] r4:85f191c0 [ 528.300017][ C0] Sending NMI from CPU 0 to CPUs 1: [ 528.300838][ C1] NMI backtrace for cpu 1 [ 528.301048][ C1] CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Not tainted syzkaller #0 PREEMPT [ 528.301107][ C1] Hardware name: ARM-Versatile Express [ 528.301142][ C1] PC is at _raw_spin_lock+0x40/0x58 [ 528.301225][ C1] LR is at _raw_spin_lock+0x18/0x58 [ 528.301259][ C1] pc : [<81abbef4>] lr : [<81abbecc>] psr: 80000113 [ 528.301282][ C1] sp : df805d68 ip : df805d68 fp : df805d7c [ 528.301304][ C1] r10: 81c05450 r9 : 83296440 r8 : 83ed6a88 [ 528.301325][ C1] r7 : 83296568 r6 : 00000001 r5 : 00000001 r4 : 83296568 [ 528.301347][ C1] r3 : 00007e07 r2 : 00007e08 r1 : 00000000 r0 : 00000001 [ 528.301386][ C1] Flags: Nzcv IRQs on FIQs on Mode SVC_32 ISA ARM Segment none [ 528.301425][ C1] Control: 30c5387d Table: 84c9a340 DAC: 00000000 [ 528.301446][ C1] Call trace: frame pointer underflow [ 528.301509][ C1] [<81abbeb4>] (_raw_spin_lock) from [<809c7a2c>] (gpio_mmio_set+0x44/0x80) [ 528.301588][ C1] r5:00000001 r4:83296440 [ 528.301610][ C1] [<809c79e8>] (gpio_mmio_set) from [<809b81e8>] (gpiochip_set+0x1c/0x44) [ 528.301682][ C1] r7:00000001 r6:00000000 r5:00000000 r4:8392fb40 [ 528.301701][ C1] [<809b81cc>] (gpiochip_set) from [<809baab0>] (gpiod_set_raw_value_commit+0x78/0x218) [ 528.301757][ C1] [<809baa38>] (gpiod_set_raw_value_commit) from [<809bc350>] (gpiod_set_value_nocheck+0x44/0x58) [ 528.301824][ C1] r10:81c05450 r9:df805ebc r8:00000102 r7:ffffbc54 r6:00000007 r5:00000001 [ 528.301847][ C1] r4:8392fb40 [ 528.301863][ C1] [<809bc30c>] (gpiod_set_value_nocheck) from [<809bc3a0>] (gpiod_set_value+0x3c/0x88) [ 528.301919][ C1] [<809bc364>] (gpiod_set_value) from [<809ccb3c>] (gpio_led_set+0x5c/0x60) [ 528.301994][ C1] r5:830fc044 r4:830fc044 [ 528.302014][ C1] [<809ccae0>] (gpio_led_set) from [<809ca3d4>] (led_set_brightness_nosleep+0x38/0x44) [ 528.302084][ C1] r5:830fc044 r4:838d224c [ 528.302101][ C1] [<809ca39c>] (led_set_brightness_nosleep) from [<809cd438>] (led_heartbeat_function+0x84/0x144) [ 528.302166][ C1] [<809cd3b4>] (led_heartbeat_function) from [<80327070>] (call_timer_fn+0x30/0x220) [ 528.302237][ C1] r7:ffffbc54 r6:809cd3b4 r5:838d224c r4:83216000 [ 528.302255][ C1] [<80327040>] (call_timer_fn) from [<80327524>] (__run_timers+0x2c4/0x3f8) [ 528.302326][ C1] r9:df805ebc r8:ffffbc54 r7:00000000 r6:809cd3b4 r5:dddd9f00 r4:838d224c [ 528.302344][ C1] [<80327260>] (__run_timers) from [<803276c0>] (run_timer_base+0x68/0x78) [ 528.302412][ C1] r10:83216000 r9:82804d80 r8:00000102 r7:00000001 r6:00000082 r5:00000002 [ 528.302433][ C1] r4:dddd9f00 [ 528.302449][ C1] [<80327658>] (run_timer_base) from [<803276ec>] (run_timer_softirq+0x1c/0x34) [ 528.302504][ C1] r4:82804084 [ 528.302520][ C1] [<803276d0>] (run_timer_softirq) from [<8025b65c>] (handle_softirqs+0x140/0x458) [ 528.302579][ C1] [<8025b51c>] (handle_softirqs) from [<8025bad0>] (__irq_exit_rcu+0x110/0x1d0) [ 528.302649][ C1] r10:00000000 r9:83216000 r8:00000000 r7:df865e20 r6:82443f98 r5:8247f0cc [ 528.302669][ C1] r4:83216000 [ 528.302685][ C1] [<8025b9c0>] (__irq_exit_rcu) from [<8025be48>] (irq_exit+0x10/0x18) [ 528.302742][ C1] r5:8247f0cc r4:826c3a9c [ 528.302760][ C1] [<8025be38>] (irq_exit) from [<81aad964>] (generic_handle_arch_irq+0x7c/0x80) [ 528.302820][ C1] [<81aad8e8>] (generic_handle_arch_irq) from [<81a7d904>] (call_with_stack+0x1c/0x20) [ 528.302894][ C1] r9:83216000 r8:83ed6a88 r7:df865e54 r6:ffffffff r5:20000013 r4:809c820c [ 528.302914][ C1] [<81a7d8e8>] (call_with_stack) from [<80200bec>] (__irq_svc+0x8c/0xbc) [ 528.302968][ C1] Exception stack(0xdf865e20 to 0xdf865e68) [ 528.303018][ C1] 5e20: e0161008 0000000c 00007e07 809c820c 83296440 00000008 00000001 83296568 [ 528.303057][ C1] 5e40: 83ed6a88 83296440 00000000 df865e8c df865e58 df865e70 809c7a4c 809c820c [ 528.303080][ C1] 5e60: 20000013 ffffffff [ 528.303103][ C1] [<809c79e8>] (gpio_mmio_set) from [<809b81e8>] (gpiochip_set+0x1c/0x44) [ 528.303184][ C1] r7:00000001 r6:00000000 r5:00000003 r4:8392fb7c [ 528.303202][ C1] [<809b81cc>] (gpiochip_set) from [<809baab0>] (gpiod_set_raw_value_commit+0x78/0x218) [ 528.303258][ C1] [<809baa38>] (gpiod_set_raw_value_commit) from [<809bc350>] (gpiod_set_value_nocheck+0x44/0x58) [ 528.303325][ C1] r10:00000000 r9:00000000 r8:00000001 r7:ddde24c0 r6:8384f858 r5:00000001 [ 528.303347][ C1] r4:8392fb7c [ 528.303363][ C1] [<809bc30c>] (gpiod_set_value_nocheck) from [<809bc3a0>] (gpiod_set_value+0x3c/0x88) [ 528.303415][ C1] [<809bc364>] (gpiod_set_value) from [<809ccb3c>] (gpio_led_set+0x5c/0x60) [ 528.303473][ C1] r5:000000ff r4:830fc314 [ 528.303491][ C1] [<809ccae0>] (gpio_led_set) from [<809ca464>] (led_set_brightness+0x84/0x90) [ 528.303549][ C1] r5:000000ff r4:830fc314 [ 528.303571][ C1] [<809ca3e0>] (led_set_brightness) from [<809cbfe4>] (led_trigger_event+0x40/0x58) [ 528.303627][ C1] r5:000000ff r4:830fc314 [ 528.303646][ C1] [<809cbfa4>] (led_trigger_event) from [<809cd640>] (ledtrig_cpu+0xac/0xf4) [ 528.303751][ C1] r7:ddde24c0 r6:00000002 r5:82b15cd8 r4:000001fd [ 528.303773][ C1] [<809cd594>] (ledtrig_cpu) from [<80227a38>] (arch_cpu_idle_exit+0x14/0x18) [ 528.303845][ C1] r9:00000000 r8:00000001 r7:8280c710 r6:83216000 r5:8280c6d0 r4:00000001 [ 528.303868][ C1] [<80227a24>] (arch_cpu_idle_exit) from [<802b168c>] (do_idle+0x5c/0x2d8) [ 528.303931][ C1] [<802b1630>] (do_idle) from [<802b1c38>] (cpu_startup_entry+0x30/0x34) [ 528.304007][ C1] r10:00000000 r9:414fc0f0 r8:80003000 r7:82a7b4a4 r6:83216000 r5:00000001 [ 528.304033][ C1] r4:00000092 [ 528.304049][ C1] [<802b1c08>] (cpu_startup_entry) from [<8022f360>] (secondary_start_kernel+0x128/0x194) [ 528.304112][ C1] [<8022f238>] (secondary_start_kernel) from [<80220094>] (__enable_mmu+0x0/0xc) [ 528.304192][ C1] r7:82a7b4a4 r6:30c0387d r5:00000000 r4:830b7bc0 [ 528.305194][ C0] Kernel panic - not syncing: softlockup: hung tasks [ 528.340888][ C0] CPU: 0 UID: 0 PID: 3700 Comm: kworker/0:4 Tainted: G L syzkaller #0 PREEMPT [ 528.341405][ C0] Tainted: [L]=SOFTLOCKUP [ 528.341602][ C0] Hardware name: ARM-Versatile Express [ 528.341823][ C0] Workqueue: events bpf_prog_free_deferred [ 528.342204][ C0] Call trace: frame pointer underflow [ 528.342509][ C0] [<80201a74>] (dump_backtrace) from [<80201b70>] (show_stack+0x18/0x1c) [ 528.342883][ C0] r7:822965a4 r6:853f0c00 r5:00000000 r4:82295754 [ 528.343124][ C0] [<80201b58>] (show_stack) from [<8021ee08>] (dump_stack_lvl+0x54/0x7c) [ 528.343455][ C0] [<8021edb4>] (dump_stack_lvl) from [<8021ee48>] (dump_stack+0x18/0x1c) [ 528.343797][ C0] r5:00000000 r4:82a7bd14 [ 528.343962][ C0] [<8021ee30>] (dump_stack) from [<80202648>] (vpanic+0xe0/0x2e8) [ 528.344270][ C0] [<80202568>] (vpanic) from [<80202884>] (trace_suspend_resume+0x0/0xd8) [ 528.344595][ C0] r7:82ac27f8 [ 528.344747][ C0] [<80202850>] (panic) from [<80383fcc>] (watchdog_timer_fn+0x2dc/0x350) [ 528.345083][ C0] r3:00000001 r2:00004000 r1:82a7bd1c r0:822965a4 [ 528.345334][ C0] [<80383cf0>] (watchdog_timer_fn) from [<80329c64>] (__hrtimer_run_queues+0x1c4/0x454) [ 528.345731][ C0] r10:853f0c00 r9:00000000 r8:dddc7130 r7:80383cf0 r6:dddc7000 r5:dddc7040 [ 528.346012][ C0] r4:dddc75d8 [ 528.346177][ C0] [<80329aa0>] (__hrtimer_run_queues) from [<8032b268>] (hrtimer_interrupt+0x148/0x2bc) [ 528.346570][ C0] r10:fbc81fd0 r9:dddc7180 r8:dddc7130 r7:0000007a r6:00000003 r5:20000193 [ 528.346885][ C0] r4:dddc7000 [ 528.347050][ C0] [<8032b120>] (hrtimer_interrupt) from [<813408e0>] (arch_timer_handler_virt+0x30/0x38) [ 528.347468][ C0] r10:81d0fc78 r9:8309e400 r8:00000000 r7:00000000 r6:00000000 r5:82498528 [ 528.347793][ C0] r4:8309de40 [ 528.347960][ C0] [<813408b0>] (arch_timer_handler_virt) from [<802efab4>] (handle_percpu_devid_irq+0x128/0x34c) [ 528.348361][ C0] [<802ef98c>] (handle_percpu_devid_irq) from [<802e8c44>] (handle_irq_desc+0x74/0x84) [ 528.348714][ C0] r10:00000001 r9:853f0c00 r8:00000000 r7:df80a00c r6:826c2388 r5:df80a000 [ 528.349013][ C0] r4:8280cc44 [ 528.349178][ C0] [<802e8bd0>] (handle_irq_desc) from [<802e8cc0>] (generic_handle_domain_irq+0x18/0x1c) [ 528.349560][ C0] [<802e8ca8>] (generic_handle_domain_irq) from [<802012c8>] (gic_handle_irq+0x68/0x7c) [ 528.349918][ C0] [<80201260>] (gic_handle_irq) from [<81aad948>] (generic_handle_arch_irq+0x60/0x80) [ 528.350302][ C0] r7:df801db8 r6:82443f98 r5:8247f0cc r4:826c3a9c [ 528.350551][ C0] [<81aad8e8>] (generic_handle_arch_irq) from [<80200bdc>] (__irq_svc+0x7c/0xbc) [ 528.350916][ C0] Exception stack(0xdf801db8 to 0xdf801e00) [ 528.351169][ C0] 1da0: ddddb488 830bf3b0 [ 528.351496][ C0] 1dc0: 00000101 00001fff 830bf380 830bf3b0 df801ee0 ddddb488 86770a80 0000001d [ 528.351869][ C0] 1de0: 00000001 df801e14 df801e18 df801e08 80346ef4 81abbd3c 60000113 ffffffff [ 528.352223][ C0] r9:853f0c00 r8:86770a80 r7:df801dec r6:ffffffff r5:60000113 r4:81abbd3c [ 528.352533][ C0] [<81abbd14>] (_raw_spin_unlock_irq) from [<80346ef4>] (tmigr_handle_remote_up+0x268/0x4b0) [ 528.352903][ C0] [<80346c8c>] (tmigr_handle_remote_up) from [<803451a4>] (__walk_groups_from+0x3c/0xe4) [ 528.353309][ C0] r10:853f0c00 r9:8280c820 r8:80346c8c r7:df801ee0 r6:830bf380 r5:00000002 [ 528.353616][ C0] r4:830bf380 [ 528.353768][ C0] [<80345168>] (__walk_groups_from) from [<8034753c>] (tmigr_handle_remote+0xe8/0x108) [ 528.354143][ C0] r9:82804d80 r8:00000100 r7:00000001 r6:00000002 r5:00000002 r4:dddc7488 [ 528.354398][ C0] [<80347454>] (tmigr_handle_remote) from [<80327700>] (run_timer_softirq+0x30/0x34) [ 528.354841][ C0] r4:82804084 [ 528.355008][ C0] [<803276d0>] (run_timer_softirq) from [<8025b65c>] (handle_softirqs+0x140/0x458) [ 528.355386][ C0] [<8025b51c>] (handle_softirqs) from [<8025bad0>] (__irq_exit_rcu+0x110/0x1d0) [ 528.355793][ C0] r10:8280c9f8 r9:853f0c00 r8:00000000 r7:dfcbdd20 r6:82443f98 r5:8247f0cc [ 528.356412][ C0] r4:853f0c00 [ 528.356614][ C0] [<8025b9c0>] (__irq_exit_rcu) from [<8025be48>] (irq_exit+0x10/0x18) [ 528.356988][ C0] r5:8247f0cc r4:826c3a9c [ 528.357178][ C0] [<8025be38>] (irq_exit) from [<81aad964>] (generic_handle_arch_irq+0x7c/0x80) [ 528.357531][ C0] [<81aad8e8>] (generic_handle_arch_irq) from [<81a7d904>] (call_with_stack+0x1c/0x20) [ 528.357913][ C0] r9:853f0c00 r8:7f00b000 r7:dfcbdd54 r6:ffffffff r5:80000013 r4:80239030 [ 528.358202][ C0] [<81a7d8e8>] (call_with_stack) from [<80200bec>] (__irq_svc+0x8c/0xbc) [ 528.358533][ C0] Exception stack(0xdfcbdd20 to 0xdfcbdd68) [ 528.358819][ C0] dd20: e174d000 eaccf000 00000001 80239018 7f00b000 00000001 82ace204 82acd5e0 [ 528.359153][ C0] dd40: 7f00b000 eaccf000 8280c9f8 dfcbdd9c dfcbdda0 dfcbdd70 8022fe10 80239030 [ 528.359475][ C0] dd60: 80000013 ffffffff [ 528.359658][ C0] [<8022fdac>] (flush_tlb_kernel_range) from [<804f3de4>] (__purge_vmap_area_lazy+0x284/0x458) [ 528.360095][ C0] r4:82ace224 [ 528.360264][ C0] [<804f3b60>] (__purge_vmap_area_lazy) from [<804f419c>] (_vm_unmap_aliases+0x1e4/0x240) [ 528.360656][ C0] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfcbddc0 r5:dfcbde08 [ 528.360952][ C0] r4:dfcbddc0 [ 528.361094][ C0] [<804f3fb8>] (_vm_unmap_aliases) from [<804f7e08>] (vfree+0x16c/0x210) [ 528.361448][ C0] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f8ad80 [ 528.361732][ C0] r4:00000000 [ 528.361883][ C0] [<804f7c9c>] (vfree) from [<80563c0c>] (execmem_free+0x30/0x50) [ 528.362220][ C0] r9:83018405 r8:853f0c00 r7:00000000 r6:83018400 r5:00001000 r4:7f00b000 [ 528.362529][ C0] [<80563bdc>] (execmem_free) from [<803cb1bc>] (bpf_jit_free_exec+0x10/0x14) [ 528.362876][ C0] r5:00001000 r4:eac89000 [ 528.363063][ C0] [<803cb1ac>] (bpf_jit_free_exec) from [<803cb59c>] (bpf_jit_free+0x68/0xe4) [ 528.363415][ C0] [<803cb534>] (bpf_jit_free) from [<803cc6c4>] (bpf_prog_free_deferred+0x140/0x158) [ 528.363801][ C0] r5:85d9cf8c r4:85f11980 [ 528.364048][ C0] [<803cc584>] (bpf_prog_free_deferred) from [<80275db8>] (process_one_work+0x1b4/0x4f4) [ 528.364411][ C0] r7:dddcfb40 r6:83018400 r5:85d9cf8c r4:85f11980 [ 528.364646][ C0] [<80275c04>] (process_one_work) from [<802764f8>] (worker_thread+0x1fc/0x3d8) [ 528.365012][ C0] r10:61c88647 r9:853f0c00 r8:85f119ac r7:82804d80 r6:dddcfb40 r5:dddcfb60 [ 528.365294][ C0] r4:85f11980 [ 528.365455][ C0] [<802762fc>] (worker_thread) from [<8027f6fc>] (kthread+0x12c/0x280) [ 528.365811][ C0] r10:00000000 r9:85f11980 r8:802762fc r7:df841e60 r6:85f46300 r5:853f0c00 [ 528.366129][ C0] r4:00000001 [ 528.366286][ C0] [<8027f5d0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 528.366617][ C0] Exception stack(0xdfcbdfb0 to 0xdfcbdff8) [ 528.366846][ C0] dfa0: 00000000 00000000 00000000 00000000 [ 528.367159][ C0] dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 528.367479][ C0] dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 528.367795][ C0] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8027f5d0 [ 528.368090][ C0] r4:85f191c0 [ 528.370646][ C0] Rebooting in 86400 seconds..