last executing test programs: 701.623581ms ago: executing program 1 (id=706): r0 = openat$selinux_avc_cache_threshold(0xffffff9c, &(0x7f0000000000), 0x2, 0x0) close(r0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000080)) 580.785746ms ago: executing program 1 (id=708): socketpair(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$NL80211_CMD_START_AP(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000200)=ANY=[], 0x20}, 0x1, 0x0, 0x0, 0x40001}, 0x810) dup3(r1, r0, 0x0) sendmsg$NL80211_CMD_JOIN_OCB(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000000c0)={0x0}, 0x1, 0x0, 0x0, 0x14800}, 0x0) 479.644509ms ago: executing program 0 (id=709): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = signalfd4(0xffffffffffffffff, &(0x7f0000001780)={[0x8]}, 0x8, 0x800) dup3(r0, r1, 0x0) write$P9_RCLUNK(r1, 0x0, 0x0) 479.517909ms ago: executing program 1 (id=710): r0 = openat$ubi_ctrl(0xffffff9c, &(0x7f0000001540), 0x280202, 0x0) close(r0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/profiling', 0x22042, 0x0) write$9p(r0, 0x0, 0x0) 381.002711ms ago: executing program 1 (id=712): r0 = openat$mixer(0xffffff9c, &(0x7f0000000180), 0x0, 0x0) r1 = openat$binder_debug(0xffffff9c, &(0x7f00000001c0)='/sys/kernel/debug/binder/transaction_log\x00', 0x0, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$USBDEVFS_CLAIMINTERFACE(r2, 0x8004550f, &(0x7f0000000240)=0x99) 380.812401ms ago: executing program 0 (id=714): r0 = openat$selinux_checkreqprot(0xffffff9c, &(0x7f0000000b80), 0x40480, 0x0) close_range(r0, 0xffffffffffffffff, 0x2) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_udp_int(r0, 0x11, 0x66, 0x0, &(0x7f0000000d80)) 284.317974ms ago: executing program 1 (id=715): r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.pending_reads\x00', 0x2a8c1, 0x0) fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000000040), 0x0, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) setxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, 0x0, 0x3) 284.104234ms ago: executing program 0 (id=716): write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000100)={'syz0\x00', {0x0, 0x0, 0x180, 0xfffc}, 0x7, [0x0, 0x80000000, 0x0, 0x0, 0x8, 0x9, 0x0, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x2, 0x0, 0x20002, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x100], [0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0xffffffff, 0x0, 0xb25, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x1, 0x200, 0x4, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x6, 0x0, 0x2, 0x0, 0x9], [0x0, 0x401, 0xfffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf946, 0x0, 0xfffffffa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0xfffffffc, 0x0, 0xfffffffe, 0x0, 0x2, 0x1, 0x0, 0x0, 0x40, 0x95e, 0x0, 0x2, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x4000000, 0x0, 0x0, 0x4, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1], [0x0, 0x0, 0x4000000, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x3, 0x100000, 0x8c51, 0x0, 0x0, 0x101, 0x0, 0x0, 0x1, 0x8000, 0x3, 0x0, 0x0, 0x18eb293f, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000]}, 0x45c) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_GET_TUNSRC(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008001}, 0x4) 190.190216ms ago: executing program 0 (id=717): r0 = landlock_create_ruleset(&(0x7f0000000080)={0xc068, 0x0, 0x1}, 0xa, 0x0) landlock_restrict_self(r0, 0x0) r1 = openat$sndtimer(0xffffff9c, &(0x7f00000000c0), 0x80) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r1, 0x8982, 0x0) 177.812477ms ago: executing program 1 (id=721): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) sendto$l2tp6(r1, 0x0, 0x0, 0x22008000, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x3}, 0x20) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}, 0x1, 0x0, 0x0, 0x100}, 0x20044000) 81.03314ms ago: executing program 0 (id=718): r0 = openat$selinux_mls(0xffffff9c, &(0x7f00000002c0), 0x0, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) sendmsg$IPCTNL_MSG_CT_GET_DYING(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)={0x0}, 0x1, 0x0, 0x0, 0x4c80c}, 0xb978c3ca7b272536) 0s ago: executing program 0 (id=719): r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/fs/cgroup', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001ac0)={0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) sendmsg$DEVLINK_CMD_PORT_UNSPLIT(r2, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000b00)={0x0}}, 0x0) kernel console output (not intermixed with test programs): [ 52.387532][ T29] audit: type=1400 audit(52.310:56): avc: denied { read write } for pid=3089 comm="sftp-server" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 52.389413][ T29] audit: type=1400 audit(52.310:57): avc: denied { open } for pid=3089 comm="sftp-server" path="/dev/null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 Warning: Permanently added '[localhost]:10221' (ED25519) to the list of known hosts. [ 65.377603][ T29] audit: type=1400 audit(65.300:58): avc: denied { name_bind } for pid=3092 comm="sshd-session" src=30000 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 67.271439][ T29] audit: type=1400 audit(67.190:59): avc: denied { execute } for pid=3093 comm="sh" name="syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 67.310204][ T29] audit: type=1400 audit(67.230:60): avc: denied { execute_no_trans } for pid=3093 comm="sh" path="/syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 70.850657][ T29] audit: type=1400 audit(70.770:61): avc: denied { mounton } for pid=3093 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=806 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 70.858201][ T29] audit: type=1400 audit(70.780:62): avc: denied { mount } for pid=3093 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 70.875654][ T3093] cgroup: Unknown subsys name 'net' [ 70.884133][ T29] audit: type=1400 audit(70.810:63): avc: denied { unmount } for pid=3093 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 71.106678][ T3093] cgroup: Unknown subsys name 'cpuset' [ 71.113898][ T3093] cgroup: Unknown subsys name 'hugetlb' [ 71.114673][ T3093] cgroup: Unknown subsys name 'rlimit' [ 71.315616][ T29] audit: type=1400 audit(71.240:64): avc: denied { setattr } for pid=3093 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 71.317673][ T29] audit: type=1400 audit(71.240:65): avc: denied { mounton } for pid=3093 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 71.319772][ T29] audit: type=1400 audit(71.240:66): avc: denied { mount } for pid=3093 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 71.508076][ T3095] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 71.510784][ T29] audit: type=1400 audit(71.440:67): avc: denied { relabelto } for pid=3095 comm="mkswap" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 71.513676][ T29] audit: type=1400 audit(71.440:68): avc: denied { write } for pid=3095 comm="mkswap" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 71.541710][ T29] audit: type=1400 audit(71.470:69): avc: denied { read } for pid=3093 comm="syz-executor" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 71.545198][ T29] audit: type=1400 audit(71.470:70): avc: denied { open } for pid=3093 comm="syz-executor" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 78.623290][ T3093] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 80.660735][ T29] audit: type=1400 audit(80.580:71): avc: denied { execmem } for pid=3096 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 80.722538][ T29] audit: type=1400 audit(80.650:72): avc: denied { read } for pid=3098 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 80.730314][ T29] audit: type=1400 audit(80.650:73): avc: denied { open } for pid=3098 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 80.735602][ T29] audit: type=1400 audit(80.660:74): avc: denied { mounton } for pid=3098 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 80.766950][ T29] audit: type=1400 audit(80.690:75): avc: denied { module_request } for pid=3099 comm="syz-executor" kmod="netdev-nr1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 80.770763][ T29] audit: type=1400 audit(80.690:76): avc: denied { module_request } for pid=3098 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 80.846773][ T29] audit: type=1400 audit(80.770:77): avc: denied { sys_module } for pid=3099 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 81.493952][ T29] audit: type=1400 audit(81.420:78): avc: denied { ioctl } for pid=3099 comm="syz-executor" path="/dev/net/tun" dev="devtmpfs" ino=677 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 82.502945][ T3098] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 82.527883][ T3098] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 82.559646][ T3099] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 82.586454][ T3099] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 83.274502][ T3098] hsr_slave_0: entered promiscuous mode [ 83.277141][ T3098] hsr_slave_1: entered promiscuous mode [ 83.455412][ T3099] hsr_slave_0: entered promiscuous mode [ 83.459228][ T3099] hsr_slave_1: entered promiscuous mode [ 83.462575][ T3099] debugfs: 'hsr0' already exists in 'hsr' [ 83.463023][ T3099] Cannot create hsr debugfs directory [ 83.712907][ T29] audit: type=1400 audit(83.640:79): avc: denied { create } for pid=3098 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 83.718478][ T29] audit: type=1400 audit(83.640:80): avc: denied { write } for pid=3098 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 83.738827][ T3098] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 83.771505][ T3098] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 83.784602][ T3098] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 83.802317][ T3098] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 83.907497][ T3099] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 83.921230][ T3099] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 83.937037][ T3099] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 83.947847][ T3099] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 84.655849][ T3098] 8021q: adding VLAN 0 to HW filter on device bond0 [ 84.811258][ T3099] 8021q: adding VLAN 0 to HW filter on device bond0 [ 87.317766][ T3099] veth0_vlan: entered promiscuous mode [ 87.331547][ T3099] veth1_vlan: entered promiscuous mode [ 87.381911][ T3099] veth0_macvtap: entered promiscuous mode [ 87.389223][ T3099] veth1_macvtap: entered promiscuous mode [ 87.438884][ T2435] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 87.439572][ T2435] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 87.451949][ T2435] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 87.453833][ T2435] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 87.562075][ T3098] veth0_vlan: entered promiscuous mode [ 87.578455][ T29] kauditd_printk_skb: 1 callbacks suppressed [ 87.578952][ T29] audit: type=1400 audit(87.500:82): avc: denied { mount } for pid=3099 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 87.583289][ T29] audit: type=1400 audit(87.510:83): avc: denied { mounton } for pid=3099 comm="syz-executor" path="/syzkaller.mOgJNB/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 87.587109][ T29] audit: type=1400 audit(87.510:84): avc: denied { mount } for pid=3099 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 87.594689][ T29] audit: type=1400 audit(87.520:85): avc: denied { mounton } for pid=3099 comm="syz-executor" path="/syzkaller.mOgJNB/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 87.597605][ T29] audit: type=1400 audit(87.520:86): avc: denied { mounton } for pid=3099 comm="syz-executor" path="/syzkaller.mOgJNB/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=2277 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 87.609224][ T29] audit: type=1400 audit(87.530:87): avc: denied { unmount } for pid=3099 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 87.609301][ T3098] veth1_vlan: entered promiscuous mode [ 87.616579][ T29] audit: type=1400 audit(87.540:88): avc: denied { mounton } for pid=3099 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=772 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 87.618842][ T29] audit: type=1400 audit(87.540:89): avc: denied { mount } for pid=3099 comm="syz-executor" name="/" dev="gadgetfs" ino=2278 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 87.624395][ T29] audit: type=1400 audit(87.550:90): avc: denied { mount } for pid=3099 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 87.626469][ T29] audit: type=1400 audit(87.550:91): avc: denied { mounton } for pid=3099 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 87.685432][ T3099] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 87.766442][ T3098] veth0_macvtap: entered promiscuous mode [ 87.778689][ T3098] veth1_macvtap: entered promiscuous mode [ 87.872372][ T2435] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 87.872888][ T2435] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 87.874464][ T2435] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 87.874785][ T2435] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 89.475186][ T3739] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3739 comm=syz.0.17 [ 91.061868][ T3760] Zero length message leads to an empty skb [ 92.747177][ T29] kauditd_printk_skb: 26 callbacks suppressed [ 92.752034][ T29] audit: type=1400 audit(92.670:118): avc: denied { create } for pid=3778 comm="syz.0.37" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 92.757731][ T29] audit: type=1400 audit(92.680:119): avc: denied { write } for pid=3778 comm="syz.0.37" lport=6 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 93.238373][ T3788] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1794 sclass=netlink_route_socket pid=3788 comm=syz.0.41 [ 93.929205][ T29] audit: type=1400 audit(93.850:120): avc: denied { getopt } for pid=3799 comm="syz.0.47" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 94.303061][ T29] audit: type=1400 audit(94.230:121): avc: denied { write } for pid=3816 comm="syz.1.55" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 94.334219][ T29] audit: type=1400 audit(94.260:122): avc: denied { setopt } for pid=3818 comm="syz.0.56" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 97.534217][ T29] audit: type=1400 audit(97.460:123): avc: denied { append } for pid=3856 comm="syz.0.74" name="mixer" dev="devtmpfs" ino=728 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 98.542252][ T29] audit: type=1400 audit(98.470:124): avc: denied { create } for pid=3889 comm="syz.1.90" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 98.547014][ T29] audit: type=1400 audit(98.470:125): avc: denied { write } for pid=3889 comm="syz.1.90" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 98.618327][ T3892] capability: warning: `syz.1.91' uses 32-bit capabilities (legacy support in use) [ 98.815403][ T3896] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=3896 comm=syz.1.93 [ 99.754197][ T29] audit: type=1400 audit(99.670:126): avc: denied { create } for pid=3924 comm="syz.0.107" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 99.769431][ T29] audit: type=1400 audit(99.690:127): avc: denied { write } for pid=3924 comm="syz.0.107" path="socket:[2700]" dev="sockfs" ino=2700 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 100.143355][ T3934] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=3934 comm=syz.0.112 [ 100.454453][ T29] audit: type=1400 audit(100.380:128): avc: denied { prog_load } for pid=3939 comm="syz.0.115" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 100.456242][ T29] audit: type=1400 audit(100.380:129): avc: denied { perfmon } for pid=3939 comm="syz.0.115" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 100.492738][ T29] audit: type=1400 audit(100.420:130): avc: denied { prog_run } for pid=3939 comm="syz.0.115" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 100.987117][ T3944] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=259 sclass=netlink_tcpdiag_socket pid=3944 comm=syz.0.117 [ 104.745687][ T29] audit: type=1400 audit(104.670:131): avc: denied { create } for pid=3989 comm="syz.0.139" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 104.787276][ T29] audit: type=1400 audit(104.710:132): avc: denied { write } for pid=3989 comm="syz.0.139" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 107.886925][ T29] audit: type=1400 audit(107.810:133): avc: denied { getopt } for pid=4028 comm="syz.0.158" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 108.186373][ T4041] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4041 comm=syz.1.164 [ 108.295317][ T29] audit: type=1400 audit(108.220:134): avc: denied { name_bind } for pid=4043 comm="syz.1.166" src=20004 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 108.297170][ T29] audit: type=1400 audit(108.220:135): avc: denied { node_bind } for pid=4043 comm="syz.1.166" saddr=224.0.0.2 src=20004 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 108.903678][ T4069] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4069 comm=syz.0.178 [ 109.173373][ T4075] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4075 comm=syz.0.181 [ 109.361588][ T29] audit: type=1400 audit(109.290:136): avc: denied { mount } for pid=4079 comm="syz.0.183" name="/" dev="ramfs" ino=3810 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 112.210450][ T29] audit: type=1400 audit(112.130:137): avc: denied { setopt } for pid=4100 comm="syz.1.193" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 114.073397][ T29] audit: type=1400 audit(114.000:138): avc: denied { create } for pid=4160 comm="syz.0.222" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 114.078380][ T29] audit: type=1400 audit(114.000:139): avc: denied { write } for pid=4160 comm="syz.0.222" path="socket:[4166]" dev="sockfs" ino=4166 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 114.186138][ T29] audit: type=1400 audit(114.110:140): avc: denied { ioctl } for pid=4163 comm="syz.1.223" path="socket:[4173]" dev="sockfs" ino=4173 ioctlcmd=0x5451 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 114.308990][ T29] audit: type=1400 audit(114.230:141): avc: denied { connect } for pid=4167 comm="syz.1.226" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 115.265529][ T29] audit: type=1400 audit(115.190:142): avc: denied { read } for pid=4182 comm="syz.0.233" path="socket:[4211]" dev="sockfs" ino=4211 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 116.326410][ T4200] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4200 comm=syz.1.241 [ 118.738134][ T29] audit: type=1400 audit(118.660:143): avc: denied { ioctl } for pid=4224 comm="syz.1.254" path="socket:[4078]" dev="sockfs" ino=4078 ioctlcmd=0x8916 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 122.078269][ T29] audit: type=1400 audit(122.000:144): avc: denied { read } for pid=4272 comm="syz.1.278" path="socket:[5241]" dev="sockfs" ino=5241 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 123.933825][ T29] audit: type=1400 audit(123.860:145): avc: denied { bind } for pid=4307 comm="syz.1.295" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 123.937395][ T29] audit: type=1400 audit(123.860:146): avc: denied { node_bind } for pid=4307 comm="syz.1.295" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 [ 123.948916][ T29] audit: type=1400 audit(123.870:147): avc: denied { read } for pid=4307 comm="syz.1.295" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 124.558201][ T29] audit: type=1400 audit(124.480:148): avc: denied { create } for pid=4320 comm="syz.1.301" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 124.569549][ T29] audit: type=1400 audit(124.490:149): avc: denied { write } for pid=4320 comm="syz.1.301" path="socket:[5310]" dev="sockfs" ino=5310 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 124.661000][ T4323] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4323 comm=syz.1.302 [ 125.944793][ T29] audit: type=1400 audit(125.870:150): avc: denied { create } for pid=4337 comm="syz.0.309" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 125.951120][ T29] audit: type=1400 audit(125.870:151): avc: denied { write } for pid=4337 comm="syz.0.309" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 126.061573][ T29] audit: type=1400 audit(125.990:152): avc: denied { create } for pid=4339 comm="syz.0.310" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 126.077148][ T29] audit: type=1400 audit(126.000:153): avc: denied { ioctl } for pid=4339 comm="syz.0.310" path="socket:[4458]" dev="sockfs" ino=4458 ioctlcmd=0x5451 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 126.474486][ T4346] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=4 sclass=netlink_tcpdiag_socket pid=4346 comm=syz.0.313 [ 128.155110][ T29] audit: type=1400 audit(128.080:154): avc: denied { ioctl } for pid=4371 comm="syz.0.324" path="socket:[4520]" dev="sockfs" ino=4520 ioctlcmd=0xaf81 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 130.020799][ T4420] input: syz0 as /devices/virtual/input/input3 [ 130.627672][ T29] audit: type=1400 audit(130.550:155): avc: denied { mounton } for pid=4440 comm="syz.0.356" path="/194/file0" dev="tmpfs" ino=998 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 130.656738][ T29] audit: type=1400 audit(130.580:156): avc: denied { unmount } for pid=3098 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 131.549463][ T4467] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 132.777552][ T29] audit: type=1400 audit(132.700:157): avc: denied { create } for pid=4481 comm="syz.0.375" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 133.563111][ T29] audit: type=1400 audit(133.490:158): avc: denied { write } for pid=4514 comm="syz.1.392" name="ip_mr_cache" dev="proc" ino=4026532677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 137.684362][ T4563] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=6 sclass=netlink_route_socket pid=4563 comm=syz.0.414 [ 142.943239][ T29] audit: type=1400 audit(142.870:159): avc: denied { read } for pid=4632 comm="syz.1.451" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 144.821397][ T29] audit: type=1400 audit(144.750:160): avc: denied { execute } for pid=4658 comm="syz.0.462" path="/251/freezer.parent_freezing" dev="tmpfs" ino=1286 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 145.030329][ T29] audit: type=1400 audit(144.950:161): avc: denied { nlmsg_write } for pid=4660 comm="syz.1.463" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 146.465925][ T4683] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4683 comm=syz.1.474 [ 148.573874][ T29] audit: type=1400 audit(148.500:162): avc: denied { getopt } for pid=4732 comm="syz.1.499" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 149.070919][ T29] audit: type=1400 audit(148.990:163): avc: denied { ioctl } for pid=4750 comm="syz.0.508" path="socket:[6076]" dev="sockfs" ino=6076 ioctlcmd=0x8912 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 149.132301][ T4753] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4753 comm=syz.1.509 [ 149.226945][ T4757] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4757 comm=syz.1.511 [ 149.311051][ T4761] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4761 comm=syz.1.513 [ 149.394578][ T29] audit: type=1400 audit(149.320:164): avc: denied { connect } for pid=4762 comm="syz.0.514" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 149.406497][ T29] audit: type=1400 audit(149.330:165): avc: denied { write } for pid=4762 comm="syz.0.514" laddr=fe80::dca5:ccff:fe23:9262 lport=61035 faddr=ff02::1 fport=20005 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 149.547252][ T29] audit: type=1400 audit(149.470:166): avc: denied { bind } for pid=4767 comm="syz.0.516" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 149.857564][ T4779] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4779 comm=syz.0.522 [ 150.584417][ T4795] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4795 comm=syz.1.530 [ 155.642198][ T29] audit: type=1400 audit(155.570:167): avc: denied { create } for pid=4845 comm="syz.1.553" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 155.681292][ T29] audit: type=1400 audit(155.590:168): avc: denied { write } for pid=4845 comm="syz.1.553" path="socket:[7232]" dev="sockfs" ino=7232 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 156.470060][ C1] hrtimer: interrupt took 7461568 ns [ 167.952486][ T29] audit: type=1400 audit(167.880:169): avc: denied { connect } for pid=4946 comm="syz.1.600" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 167.958325][ T4947] Dead loop on virtual device ip6_vti0, fix it urgently! [ 168.520575][ T29] audit: type=1400 audit(168.440:170): avc: denied { create } for pid=4960 comm="syz.1.607" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 168.527188][ T29] audit: type=1400 audit(168.450:171): avc: denied { setopt } for pid=4960 comm="syz.1.607" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 170.702122][ T29] audit: type=1400 audit(170.630:172): avc: denied { map } for pid=4988 comm="syz.1.621" path="/dev/snd/pcmC3D0c" dev="devtmpfs" ino=751 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 171.896819][ T29] audit: type=1400 audit(171.820:173): avc: denied { write } for pid=5021 comm="syz.1.637" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 177.024998][ T5096] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=22 sclass=netlink_audit_socket pid=5096 comm=syz.0.673 [ 184.638415][ T5166] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5166 comm=syz.0.705 [ 594.240102][ C0] watchdog: BUG: soft lockup - CPU#0 stuck for 430s! [swapper/0:0] [ 594.240264][ C0] Modules linked in: [ 594.240807][ C0] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Not tainted syzkaller #0 PREEMPT [ 594.240954][ C0] Hardware name: ARM-Versatile Express [ 594.241090][ C0] PC is at _raw_spin_unlock_irq+0x28/0x54 [ 594.241821][ C0] LR is at tmigr_handle_remote_up+0x180/0x4b0 [ 594.241890][ C0] pc : [<81abba7c>] lr : [<80346d0c>] psr: 60000113 [ 594.241922][ C0] sp : 82801be0 ip : 82801bf0 fp : 82801bec [ 594.241942][ C0] r10: 00000001 r9 : 8280c9a4 r8 : 00000001 [ 594.241966][ C0] r7 : ddddb4a0 r6 : 82801cb8 r5 : 830bf3b0 r4 : 830bf380 [ 594.241988][ C0] r3 : 00008889 r2 : ffffffff r1 : 00000000 r0 : 830bf380 [ 594.242063][ C0] Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment user [ 594.242107][ C0] Control: 30c5387d Table: 84be0d00 DAC: fffffffd [ 594.242170][ C0] Call trace: [ 594.242335][ C0] [<81abba54>] (_raw_spin_unlock_irq) from [<80346d0c>] (tmigr_handle_remote_up+0x180/0x4b0) [ 594.242577][ C0] [<80346b8c>] (tmigr_handle_remote_up) from [<803450a4>] (__walk_groups_from+0x3c/0xe4) [ 594.242650][ C0] r10:8281b500 r9:8280c820 r8:80346b8c r7:82801cb8 r6:830bf380 r5:00000002 [ 594.242674][ C0] r4:830bf380 [ 594.242686][ C0] [<80345068>] (__walk_groups_from) from [<8034743c>] (tmigr_handle_remote+0xe8/0x108) [ 594.242731][ C0] r9:82804d80 r8:00000102 r7:00000001 r6:00000002 r5:00000002 r4:dddc7488 [ 594.242740][ C0] [<80347354>] (tmigr_handle_remote) from [<80327600>] (run_timer_softirq+0x30/0x34) [ 594.242784][ C0] r4:82804084 [ 594.242793][ C0] [<803275d0>] (run_timer_softirq) from [<8025b55c>] (handle_softirqs+0x140/0x458) [ 594.242827][ C0] [<8025b41c>] (handle_softirqs) from [<8025b9d0>] (__irq_exit_rcu+0x110/0x1d0) [ 594.242867][ C0] r10:00000000 r9:8281b500 r8:00000000 r7:82801dd8 r6:82443ff8 r5:8247f12c [ 594.242878][ C0] r4:8281b500 [ 594.242885][ C0] [<8025b8c0>] (__irq_exit_rcu) from [<8025bd48>] (irq_exit+0x10/0x18) [ 594.242918][ C0] r5:8247f12c r4:826c3a9c [ 594.242926][ C0] [<8025bd38>] (irq_exit) from [<81aad6a4>] (generic_handle_arch_irq+0x7c/0x80) [ 594.242960][ C0] [<81aad628>] (generic_handle_arch_irq) from [<80200bdc>] (__irq_svc+0x7c/0xbc) [ 594.243036][ C0] Exception stack(0x82801dd8 to 0x82801e20) [ 594.243140][ C0] 1dc0: 00000001 00000000 [ 594.243169][ C0] 1de0: 00008fed 00008feb 841a5f68 00000004 00000001 841a5f68 8403fe88 841a5e40 [ 594.243187][ C0] 1e00: 00000000 82801e3c 82801e28 82801e28 81abbc0c 81abbc34 80000013 ffffffff [ 594.243228][ C0] r9:8281b500 r8:8403fe88 r7:82801e0c r6:ffffffff r5:80000013 r4:81abbc34 [ 594.243238][ C0] [<81abbbf4>] (_raw_spin_lock) from [<809c77ac>] (gpio_mmio_set+0x44/0x80) [ 594.243278][ C0] r5:00000004 r4:841a5e40 [ 594.243287][ C0] [<809c7768>] (gpio_mmio_set) from [<809b7f68>] (gpiochip_set+0x1c/0x44) [ 594.243326][ C0] r7:00000001 r6:00000000 r5:00000002 r4:8414d7a8 [ 594.243334][ C0] [<809b7f4c>] (gpiochip_set) from [<809ba830>] (gpiod_set_raw_value_commit+0x78/0x218) [ 594.243365][ C0] [<809ba7b8>] (gpiod_set_raw_value_commit) from [<809bc0d0>] (gpiod_set_value_nocheck+0x44/0x58) [ 594.243403][ C0] r10:00000000 r9:00000000 r8:00000001 r7:dddce4c0 r6:83e79698 r5:00000001 [ 594.243413][ C0] r4:8414d7a8 [ 594.243420][ C0] [<809bc08c>] (gpiod_set_value_nocheck) from [<809bc120>] (gpiod_set_value+0x3c/0x88) [ 594.243448][ C0] [<809bc0e4>] (gpiod_set_value) from [<809cc8bc>] (gpio_led_set+0x5c/0x60) [ 594.243477][ C0] r5:000000ff r4:845f8a24 [ 594.243485][ C0] [<809cc860>] (gpio_led_set) from [<809ca1e4>] (led_set_brightness+0x84/0x90) [ 594.243514][ C0] r5:000000ff r4:845f8a24 [ 594.243522][ C0] [<809ca160>] (led_set_brightness) from [<809cbd64>] (led_trigger_event+0x40/0x58) [ 594.243552][ C0] r5:000000ff r4:845f8a24 [ 594.243560][ C0] [<809cbd24>] (led_trigger_event) from [<809cd3c0>] (ledtrig_cpu+0xac/0xf4) [ 594.243592][ C0] r7:dddce4c0 r6:00000002 r5:82b15cd8 r4:000001fd [ 594.243601][ C0] [<809cd314>] (ledtrig_cpu) from [<80227a38>] (arch_cpu_idle_exit+0x14/0x18) [ 594.243639][ C0] r9:00000000 r8:00000000 r7:8280c710 r6:8281b500 r5:8280c6d0 r4:00000000 [ 594.243648][ C0] [<80227a24>] (arch_cpu_idle_exit) from [<802b158c>] (do_idle+0x5c/0x2d8) [ 594.243680][ C0] [<802b1530>] (do_idle) from [<802b1b38>] (cpu_startup_entry+0x30/0x34) [ 594.243719][ C0] r10:8281aff4 r9:8280c680 r8:823bec00 r7:00000000 r6:deffc06c r5:828222e8 [ 594.243729][ C0] r4:000000ed [ 594.243737][ C0] [<802b1b08>] (cpu_startup_entry) from [<81aaf0bc>] (kernel_init+0x0/0x138) [ 594.243780][ C0] [<81aaefdc>] (rest_init) from [<8260145c>] (start_kernel+0x844/0x860) [ 594.243836][ C0] [<82600c18>] (start_kernel) from [<00000000>] (0x0) [ 594.244228][ C0] Sending NMI from CPU 0 to CPUs 1: [ 594.244789][ C1] NMI backtrace for cpu 1 [ 594.244959][ C1] CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Not tainted syzkaller #0 PREEMPT [ 594.245020][ C1] Hardware name: ARM-Versatile Express [ 594.245050][ C1] PC is at _raw_spin_lock+0x40/0x58 [ 594.245112][ C1] LR is at _raw_spin_lock+0x18/0x58 [ 594.245158][ C1] pc : [<81abbc34>] lr : [<81abbc0c>] psr: 80000113 [ 594.245191][ C1] sp : df805d68 ip : df805d68 fp : df805d7c [ 594.245213][ C1] r10: 81c05450 r9 : 841a5e40 r8 : 8403fe88 [ 594.245239][ C1] r7 : 841a5f68 r6 : 00000000 r5 : 00000001 r4 : 841a5f68 [ 594.245265][ C1] r3 : 00008feb r2 : 00008fec r1 : 00000000 r0 : 00000001 [ 594.245292][ C1] Flags: Nzcv IRQs on FIQs on Mode SVC_32 ISA ARM Segment none [ 594.245327][ C1] Control: 30c5387d Table: 84cde2c0 DAC: 00000000 [ 594.245346][ C1] Call trace: frame pointer underflow [ 594.245427][ C1] [<81abbbf4>] (_raw_spin_lock) from [<809c77ac>] (gpio_mmio_set+0x44/0x80) [ 594.245511][ C1] r5:00000001 r4:841a5e40 [ 594.245532][ C1] [<809c7768>] (gpio_mmio_set) from [<809b7f68>] (gpiochip_set+0x1c/0x44) [ 594.245608][ C1] r7:00000000 r6:00000000 r5:00000000 r4:8414d780 [ 594.245627][ C1] [<809b7f4c>] (gpiochip_set) from [<809ba830>] (gpiod_set_raw_value_commit+0x78/0x218) [ 594.245691][ C1] [<809ba7b8>] (gpiod_set_raw_value_commit) from [<809bc0d0>] (gpiod_set_value_nocheck+0x44/0x58) [ 594.245769][ C1] r10:81c05450 r9:df805ebc r8:00000102 r7:ffffd420 r6:00000009 r5:00000000 [ 594.245807][ C1] r4:8414d780 [ 594.245834][ C1] [<809bc08c>] (gpiod_set_value_nocheck) from [<809bc120>] (gpiod_set_value+0x3c/0x88) [ 594.245903][ C1] [<809bc0e4>] (gpiod_set_value) from [<809cc8bc>] (gpio_led_set+0x5c/0x60) [ 594.245977][ C1] r5:845f8844 r4:845f8844 [ 594.246003][ C1] [<809cc860>] (gpio_led_set) from [<809ca154>] (led_set_brightness_nosleep+0x38/0x44) [ 594.246077][ C1] r5:845f8844 r4:8445a20c [ 594.246098][ C1] [<809ca11c>] (led_set_brightness_nosleep) from [<809cd1b8>] (led_heartbeat_function+0x84/0x144) [ 594.246163][ C1] [<809cd134>] (led_heartbeat_function) from [<80326f70>] (call_timer_fn+0x30/0x220) [ 594.246242][ C1] r7:ffffd420 r6:809cd134 r5:8445a20c r4:83216000 [ 594.246261][ C1] [<80326f40>] (call_timer_fn) from [<80327424>] (__run_timers+0x2c4/0x3f8) [ 594.246349][ C1] r9:df805ebc r8:ffffd420 r7:00000000 r6:809cd134 r5:dddd9f00 r4:8445a20c [ 594.246374][ C1] [<80327160>] (__run_timers) from [<803275c0>] (run_timer_base+0x68/0x78) [ 594.246457][ C1] r10:83216000 r9:82804d80 r8:00000102 r7:00000001 r6:00000082 r5:00000002 [ 594.246496][ C1] r4:dddd9f00 [ 594.246516][ C1] [<80327558>] (run_timer_base) from [<803275ec>] (run_timer_softirq+0x1c/0x34) [ 594.246586][ C1] r4:82804084 [ 594.246608][ C1] [<803275d0>] (run_timer_softirq) from [<8025b55c>] (handle_softirqs+0x140/0x458) [ 594.246678][ C1] [<8025b41c>] (handle_softirqs) from [<8025b9d0>] (__irq_exit_rcu+0x110/0x1d0) [ 594.246765][ C1] r10:00000000 r9:83216000 r8:00000000 r7:df865e08 r6:82443ff8 r5:8247f12c [ 594.246802][ C1] r4:83216000 [ 594.246820][ C1] [<8025b8c0>] (__irq_exit_rcu) from [<8025bd48>] (irq_exit+0x10/0x18) [ 594.246888][ C1] r5:8247f12c r4:826c3a9c [ 594.246915][ C1] [<8025bd38>] (irq_exit) from [<81aad6a4>] (generic_handle_arch_irq+0x7c/0x80) [ 594.246993][ C1] [<81aad628>] (generic_handle_arch_irq) from [<81a7d654>] (call_with_stack+0x1c/0x20) [ 594.247086][ C1] r9:83216000 r8:8403fe88 r7:df865e3c r6:ffffffff r5:60000013 r4:809c7fac [ 594.247106][ C1] [<81a7d638>] (call_with_stack) from [<80200bec>] (__irq_svc+0x8c/0xbc) [ 594.247178][ C1] Exception stack(0xdf865e08 to 0xdf865e50) [ 594.247231][ C1] 5e00: e037e008 00000009 00008feb 00000000 e037e008 00000009 [ 594.247272][ C1] 5e20: 00000001 841a5f68 8403fe88 841a5e40 00000000 df865e6c df865e58 df865e58 [ 594.247309][ C1] 5e40: 809c7fa8 809c7fac 60000013 ffffffff [ 594.247338][ C1] [<809c7f8c>] (gpio_mmio_write32) from [<809c77cc>] (gpio_mmio_set+0x64/0x80) [ 594.247412][ C1] r5:00000008 r4:841a5e40 [ 594.247438][ C1] [<809c7768>] (gpio_mmio_set) from [<809b7f68>] (gpiochip_set+0x1c/0x44) [ 594.247520][ C1] r7:00000001 r6:00000000 r5:00000003 r4:8414d7bc [ 594.247546][ C1] [<809b7f4c>] (gpiochip_set) from [<809ba830>] (gpiod_set_raw_value_commit+0x78/0x218) [ 594.247604][ C1] [<809ba7b8>] (gpiod_set_raw_value_commit) from [<809bc0d0>] (gpiod_set_value_nocheck+0x44/0x58) [ 594.247680][ C1] r10:00000000 r9:00000000 r8:00000001 r7:ddde24c0 r6:83e796d8 r5:00000001 [ 594.247701][ C1] r4:8414d7bc [ 594.247716][ C1] [<809bc08c>] (gpiod_set_value_nocheck) from [<809bc120>] (gpiod_set_value+0x3c/0x88) [ 594.247768][ C1] [<809bc0e4>] (gpiod_set_value) from [<809cc8bc>] (gpio_led_set+0x5c/0x60) [ 594.247830][ C1] r5:000000ff r4:845f8b14 [ 594.247858][ C1] [<809cc860>] (gpio_led_set) from [<809ca1e4>] (led_set_brightness+0x84/0x90) [ 594.247922][ C1] r5:000000ff r4:845f8b14 [ 594.247941][ C1] [<809ca160>] (led_set_brightness) from [<809cbd64>] (led_trigger_event+0x40/0x58) [ 594.248015][ C1] r5:000000ff r4:845f8b14 [ 594.248051][ C1] [<809cbd24>] (led_trigger_event) from [<809cd3c0>] (ledtrig_cpu+0xac/0xf4) [ 594.248116][ C1] r7:ddde24c0 r6:00000002 r5:82b15cd8 r4:000000fe [ 594.248135][ C1] [<809cd314>] (ledtrig_cpu) from [<80227a38>] (arch_cpu_idle_exit+0x14/0x18) [ 594.248213][ C1] r9:00000000 r8:00000001 r7:8280c710 r6:83216000 r5:8280c6d0 r4:00000001 [ 594.248235][ C1] [<80227a24>] (arch_cpu_idle_exit) from [<802b158c>] (do_idle+0x5c/0x2d8) [ 594.248301][ C1] [<802b1530>] (do_idle) from [<802b1b38>] (cpu_startup_entry+0x30/0x34) [ 594.248376][ C1] r10:00000000 r9:414fc0f0 r8:80003000 r7:82a7b4a4 r6:83216000 r5:00000001 [ 594.248402][ C1] r4:00000092 [ 594.248420][ C1] [<802b1b08>] (cpu_startup_entry) from [<8022f360>] (secondary_start_kernel+0x128/0x194) [ 594.248493][ C1] [<8022f238>] (secondary_start_kernel) from [<80220094>] (__enable_mmu+0x0/0xc) [ 594.248592][ C1] r7:82a7b4a4 r6:30c0387d r5:00000000 r4:830b7bc0 [ 594.249955][ C0] Kernel panic - not syncing: softlockup: hung tasks [ 594.273279][ C0] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Tainted: G L syzkaller #0 PREEMPT [ 594.273613][ C0] Tainted: [L]=SOFTLOCKUP [ 594.273718][ C0] Hardware name: ARM-Versatile Express [ 594.273865][ C0] Call trace: [ 594.274035][ C0] [<80201a74>] (dump_backtrace) from [<80201b70>] (show_stack+0x18/0x1c) [ 594.274263][ C0] r7:82296540 r6:8281b500 r5:00000000 r4:822956f0 [ 594.274420][ C0] [<80201b58>] (show_stack) from [<8021ee08>] (dump_stack_lvl+0x54/0x7c) [ 594.274621][ C0] [<8021edb4>] (dump_stack_lvl) from [<8021ee48>] (dump_stack+0x18/0x1c) [ 594.274876][ C0] r5:00000000 r4:82a7bd14 [ 594.274985][ C0] [<8021ee30>] (dump_stack) from [<80202648>] (vpanic+0xe0/0x2e8) [ 594.275174][ C0] [<80202568>] (vpanic) from [<80202884>] (trace_suspend_resume+0x0/0xd8) [ 594.275421][ C0] r7:82ac27f8 [ 594.275580][ C0] [<80202850>] (panic) from [<80383f14>] (watchdog_timer_fn+0x2dc/0x350) [ 594.275810][ C0] r3:00000001 r2:00004000 r1:82a7bd1c r0:82296540 [ 594.275933][ C0] [<80383c38>] (watchdog_timer_fn) from [<80329b64>] (__hrtimer_run_queues+0x1c4/0x454) [ 594.276131][ C0] r10:8281b500 r9:00000000 r8:dddc7130 r7:80383c38 r6:dddc7000 r5:dddc7040 [ 594.276300][ C0] r4:dddc75d8 [ 594.276380][ C0] [<803299a0>] (__hrtimer_run_queues) from [<8032b168>] (hrtimer_interrupt+0x148/0x2bc) [ 594.276574][ C0] r10:574ce930 r9:dddc7180 r8:dddc7130 r7:0000008a r6:00000003 r5:20000193 [ 594.276751][ C0] r4:dddc7000 [ 594.276830][ C0] [<8032b020>] (hrtimer_interrupt) from [<81340630>] (arch_timer_handler_virt+0x30/0x38) [ 594.277034][ C0] r10:81d0fc78 r9:8309e400 r8:00000000 r7:00000000 r6:00000000 r5:82498528 [ 594.277174][ C0] r4:8309de40 [ 594.277250][ C0] [<81340600>] (arch_timer_handler_virt) from [<802ef9b4>] (handle_percpu_devid_irq+0x128/0x34c) [ 594.277446][ C0] [<802ef88c>] (handle_percpu_devid_irq) from [<802e8b44>] (handle_irq_desc+0x74/0x84) [ 594.277633][ C0] r10:00000001 r9:8281b500 r8:00000000 r7:df80a00c r6:826c2388 r5:df80a000 [ 594.277831][ C0] r4:8280cc44 [ 594.277912][ C0] [<802e8ad0>] (handle_irq_desc) from [<802e8bc0>] (generic_handle_domain_irq+0x18/0x1c) [ 594.278102][ C0] [<802e8ba8>] (generic_handle_domain_irq) from [<802012c8>] (gic_handle_irq+0x68/0x7c) [ 594.278324][ C0] [<80201260>] (gic_handle_irq) from [<81aad688>] (generic_handle_arch_irq+0x60/0x80) [ 594.278551][ C0] r7:82801b90 r6:82443ff8 r5:8247f12c r4:826c3a9c [ 594.278670][ C0] [<81aad628>] (generic_handle_arch_irq) from [<80200bdc>] (__irq_svc+0x7c/0xbc) [ 594.278856][ C0] Exception stack(0x82801b90 to 0x82801bd8) [ 594.278974][ C0] 1b80: 830bf380 00000000 ffffffff 00008889 [ 594.279125][ C0] 1ba0: 830bf380 830bf3b0 82801cb8 ddddb4a0 00000001 8280c9a4 00000001 82801bec [ 594.279276][ C0] 1bc0: 82801bf0 82801be0 80346d0c 81abba7c 60000113 ffffffff [ 594.279437][ C0] r9:8281b500 r8:00000001 r7:82801bc4 r6:ffffffff r5:60000113 r4:81abba7c [ 594.279600][ C0] [<81abba54>] (_raw_spin_unlock_irq) from [<80346d0c>] (tmigr_handle_remote_up+0x180/0x4b0) [ 594.279831][ C0] [<80346b8c>] (tmigr_handle_remote_up) from [<803450a4>] (__walk_groups_from+0x3c/0xe4) [ 594.280082][ C0] r10:8281b500 r9:8280c820 r8:80346b8c r7:82801cb8 r6:830bf380 r5:00000002 [ 594.280260][ C0] r4:830bf380 [ 594.280352][ C0] [<80345068>] (__walk_groups_from) from [<8034743c>] (tmigr_handle_remote+0xe8/0x108) [ 594.280565][ C0] r9:82804d80 r8:00000102 r7:00000001 r6:00000002 r5:00000002 r4:dddc7488 [ 594.280768][ C0] [<80347354>] (tmigr_handle_remote) from [<80327600>] (run_timer_softirq+0x30/0x34) [ 594.281026][ C0] r4:82804084 [ 594.281125][ C0] [<803275d0>] (run_timer_softirq) from [<8025b55c>] (handle_softirqs+0x140/0x458) [ 594.281348][ C0] [<8025b41c>] (handle_softirqs) from [<8025b9d0>] (__irq_exit_rcu+0x110/0x1d0) [ 594.281572][ C0] r10:00000000 r9:8281b500 r8:00000000 r7:82801dd8 r6:82443ff8 r5:8247f12c [ 594.281747][ C0] r4:8281b500 [ 594.281864][ C0] [<8025b8c0>] (__irq_exit_rcu) from [<8025bd48>] (irq_exit+0x10/0x18) [ 594.282059][ C0] r5:8247f12c r4:826c3a9c [ 594.282152][ C0] [<8025bd38>] (irq_exit) from [<81aad6a4>] (generic_handle_arch_irq+0x7c/0x80) [ 594.282362][ C0] [<81aad628>] (generic_handle_arch_irq) from [<80200bdc>] (__irq_svc+0x7c/0xbc) [ 594.282563][ C0] Exception stack(0x82801dd8 to 0x82801e20) [ 594.282688][ C0] 1dc0: 00000001 00000000 [ 594.282856][ C0] 1de0: 00008fed 00008feb 841a5f68 00000004 00000001 841a5f68 8403fe88 841a5e40 [ 594.283046][ C0] 1e00: 00000000 82801e3c 82801e28 82801e28 81abbc0c 81abbc34 80000013 ffffffff [ 594.283228][ C0] r9:8281b500 r8:8403fe88 r7:82801e0c r6:ffffffff r5:80000013 r4:81abbc34 [ 594.283399][ C0] [<81abbbf4>] (_raw_spin_lock) from [<809c77ac>] (gpio_mmio_set+0x44/0x80) [ 594.283601][ C0] r5:00000004 r4:841a5e40 [ 594.283687][ C0] [<809c7768>] (gpio_mmio_set) from [<809b7f68>] (gpiochip_set+0x1c/0x44) [ 594.283897][ C0] r7:00000001 r6:00000000 r5:00000002 r4:8414d7a8 [ 594.284009][ C0] [<809b7f4c>] (gpiochip_set) from [<809ba830>] (gpiod_set_raw_value_commit+0x78/0x218) [ 594.284216][ C0] [<809ba7b8>] (gpiod_set_raw_value_commit) from [<809bc0d0>] (gpiod_set_value_nocheck+0x44/0x58) [ 594.284460][ C0] r10:00000000 r9:00000000 r8:00000001 r7:dddce4c0 r6:83e79698 r5:00000001 [ 594.284667][ C0] r4:8414d7a8 [ 594.284886][ C0] [<809bc08c>] (gpiod_set_value_nocheck) from [<809bc120>] (gpiod_set_value+0x3c/0x88) [ 594.285124][ C0] [<809bc0e4>] (gpiod_set_value) from [<809cc8bc>] (gpio_led_set+0x5c/0x60) [ 594.285326][ C0] r5:000000ff r4:845f8a24 [ 594.285452][ C0] [<809cc860>] (gpio_led_set) from [<809ca1e4>] (led_set_brightness+0x84/0x90) [ 594.285716][ C0] r5:000000ff r4:845f8a24 [ 594.285824][ C0] [<809ca160>] (led_set_brightness) from [<809cbd64>] (led_trigger_event+0x40/0x58) [ 594.286035][ C0] r5:000000ff r4:845f8a24 [ 594.286147][ C0] [<809cbd24>] (led_trigger_event) from [<809cd3c0>] (ledtrig_cpu+0xac/0xf4) [ 594.286341][ C0] r7:dddce4c0 r6:00000002 r5:82b15cd8 r4:000001fd [ 594.286562][ C0] [<809cd314>] (ledtrig_cpu) from [<80227a38>] (arch_cpu_idle_exit+0x14/0x18) [ 594.286938][ C0] r9:00000000 r8:00000000 r7:8280c710 r6:8281b500 r5:8280c6d0 r4:00000000 [ 594.287226][ C0] [<80227a24>] (arch_cpu_idle_exit) from [<802b158c>] (do_idle+0x5c/0x2d8) [ 594.287586][ C0] [<802b1530>] (do_idle) from [<802b1b38>] (cpu_startup_entry+0x30/0x34) [ 594.287895][ C0] r10:8281aff4 r9:8280c680 r8:823bec00 r7:00000000 r6:deffc06c r5:828222e8 [ 594.288170][ C0] r4:000000ed [ 594.288338][ C0] [<802b1b08>] (cpu_startup_entry) from [<81aaf0bc>] (kernel_init+0x0/0x138) [ 594.288748][ C0] [<81aaefdc>] (rest_init) from [<8260145c>] (start_kernel+0x844/0x860) [ 594.289027][ C0] [<82600c18>] (start_kernel) from [<00000000>] (0x0) [ 594.291223][ C0] Rebooting in 86400 seconds..