last executing test programs: 3m58.458793661s ago: executing program 0 (id=303): r0 = gettid() timer_create(0x1, &(0x7f00000001c0)={0x0, 0x21, 0x4, @tid=r0}, &(0x7f00000000c0)) mlockall(0x0) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x8}, {0x0, 0x989680}}, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) setitimer(0x0, &(0x7f0000000000)={{0x0, 0xea60}}, 0x0) socket$nl_audit(0x10, 0x3, 0x9) socket$inet_mptcp(0x2, 0x1, 0x106) 3m57.978619012s ago: executing program 0 (id=305): r0 = gettid() r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x2040, 0x0) fcntl$setlease(r1, 0x400, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r0}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) listxattr(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) 3m57.35944888s ago: executing program 0 (id=306): r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000366000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r1, 0x0) connect$unix(r0, &(0x7f0000932000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = dup3(r1, r0, 0x0) r3 = accept4$unix(r2, 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r3, 0x5452, &(0x7f0000001040)={'wg2\x00'}) 3m57.250103584s ago: executing program 0 (id=308): mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x100000, 0x0) r0 = open_tree(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f0000000440)='./file0\x00', &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x10a5840, 0x0) move_mount(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', r0, &(0x7f0000000240)='./file0/file0\x00', 0x276) 3m57.113513521s ago: executing program 0 (id=310): r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='.\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000040)='}\xa4-}{\xca<\x0e ,\xeb\x16\xdaIz\x12\xbdpo9y\x00\xe0jO\x9bEr\xb3\xe0\xd7F\xf2\x99\nK\xc398\x00U\xdd\x82x\x93+\x8f\xfd\xdb\xc4\x11L\\\xe7+\x88\xd1`\xfb\xf4\x12rl\xb8\x00\x19\xe5h\x1a\x9f\x187\x06\xf7ES\xbfA(]9\x02\xdcm\xf9$\xfd\x18\xc7\xd4\x95\x04\xa9}jP\x11\xd1T\xd8n\xf4\x1d\xbd^L\xe8O\xd0\xc8\x8d`Cr\x80K?\xc6\f\x87Dnm!\"\x8e\xb5\xd1\xd3\a\xa0\xd2\xa2\xf2u,\xfc\xb6\xe5\x00\xb99\x03<\xf7\a\x00\x16\xbcE?\x0e\x02\xdf\xf3`\xc3q\xe2I\x18\xac\xfa\xfe\xe6K9@\xc0\xaa\x9c\xdb\xd0\x82\n\xefM`\f\x918\xf2\xef\x99UN=\x12\xf0\xd1\x9anHG\xa2z\xf8C\xe1;j\x82C\x01\xe7\n$\xe1\x83\x9b\xfb\xd7O\xda%\t\x1b\xfc\xcc9\x9c\x05e\xc3\xdb\x1eX\xb58\xa1\xf8\a\xae\xa6\x12M\xc9\xbcJ\x17\xdc\xce\xd2\xe5C\xfe\xa5ab,i\xff\xcd@\xc6\xbf\xbe\x01H\x19\xe8\x87\xcbG8;)a@\tx', 0x0) dup(r1) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8000006) mount(&(0x7f0000000140)=@filename='\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='proc\x00', 0x0, 0x0) r2 = timerfd_create(0x0, 0x0) dup3(r0, r2, 0x0) symlinkat(&(0x7f0000000100)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00') 3m56.740987168s ago: executing program 0 (id=313): r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = dup3(r1, r0, 0x0) r3 = accept$unix(r2, 0x0, 0x0) ioctl$FIONCLEX(r3, 0x5450) 3m56.739328359s ago: executing program 32 (id=313): r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = dup3(r1, r0, 0x0) r3 = accept$unix(r2, 0x0, 0x0) ioctl$FIONCLEX(r3, 0x5450) 2m15.619508809s ago: executing program 1 (id=669): r0 = epoll_create(0x2) ioctl$KDADDIO(r0, 0x5450, 0x0) pipe2$watch_queue(&(0x7f0000000000), 0xb82e336200000000) epoll_create(0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000040), 0x4040, 0x0) r1 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000100)='./binderfs/custom1\x00', 0x0, 0x0) ioctl$FIOCLEX(r1, 0x5451) ioctl$BTRFS_IOC_FS_INFO(r1, 0x5451, 0x0) 2m15.520883031s ago: executing program 1 (id=670): r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000366000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r1, 0x0) connect$unix(r0, &(0x7f0000932000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = dup3(r1, r0, 0x0) r3 = accept$packet(r2, 0x0, 0x0) ioctl$sock_SIOCSIFBR(r3, 0x5452, &(0x7f00000000c0)=@add_del={0x2, 0x0}) 2m15.439417882s ago: executing program 1 (id=671): r0 = socket(0x29, 0x2, 0x0) sendmsg$BATADV_CMD_SET_VLAN(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=ANY=[], 0x33fe0}}, 0x0) sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={0x0}, 0x1, 0x0, 0x0, 0x651fd6ebbd1f71c}, 0x0) timer_create(0x0, &(0x7f0000000680)={0x0, 0x21}, &(0x7f0000000100)=0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) close_range(r0, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x0) timer_settime(r1, 0x0, &(0x7f0000000080)={{0x0, 0x8}, {0x0, 0x989680}}, 0x0) 2m14.790803024s ago: executing program 1 (id=674): mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x100000, 0x0) r0 = open_tree(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f0000000440)='./file0\x00', &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x10a5840, 0x0) move_mount(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', r0, &(0x7f0000000240)='./file0/file0\x00', 0x272) 2m14.699378536s ago: executing program 1 (id=675): r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) dup2(r1, r0) r2 = accept4$unix(r0, 0x0, 0x0, 0x0) cachestat(r2, &(0x7f0000000040), &(0x7f0000000080), 0x0) 2m14.240166124s ago: executing program 1 (id=678): r0 = socket(0x29, 0x2, 0x0) sendmsg$BATADV_CMD_SET_VLAN(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[], 0x33fe0}, 0x1, 0x0, 0x0, 0x20000080}, 0x0) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}, 0x1, 0x0, 0x0, 0x4000091}, 0x4080) close_range(r0, 0xffffffffffffffff, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)) timer_create(0x7, &(0x7f0000000680)={0x0, 0x21, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x8}, {0x0, 0x989680}}, 0x0) 2m14.239914724s ago: executing program 33 (id=678): r0 = socket(0x29, 0x2, 0x0) sendmsg$BATADV_CMD_SET_VLAN(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[], 0x33fe0}, 0x1, 0x0, 0x0, 0x20000080}, 0x0) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}, 0x1, 0x0, 0x0, 0x4000091}, 0x4080) close_range(r0, 0xffffffffffffffff, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)) timer_create(0x7, &(0x7f0000000680)={0x0, 0x21, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x8}, {0x0, 0x989680}}, 0x0) 2.241260506s ago: executing program 3 (id=1247): r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000040)=0x1, 0x4) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000000c0)=0x1, 0x4) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000001c0)=0xffffffffffffffff, 0x4) sendmmsg$inet(r0, &(0x7f0000000d00)=[{{0x0, 0x0, &(0x7f0000002c00)=[{&(0x7f0000001500)='\x00', 0x1}, {&(0x7f0000002800)="cf", 0x1}, {&(0x7f0000000380)='\b', 0x1}, {&(0x7f0000000180)="8a", 0x1}, {&(0x7f0000000700)="af", 0x1}], 0x5}}, {{0x0, 0x0, &(0x7f0000002f00)=[{&(0x7f0000001580)="ce", 0x1}, {&(0x7f00000007c0)="f2", 0x1}, {&(0x7f0000002e40)="d4", 0x1}], 0x3}}, {{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000003000)="e1", 0x1}, {&(0x7f00000010c0)="fa", 0x1}, {&(0x7f00000004c0)="d8ac", 0x2}, {&(0x7f0000001600)="f2", 0x1}, {&(0x7f0000000500)="ff", 0x1}, {&(0x7f00000006c0)='y', 0x1}, {&(0x7f0000000280)="87", 0x1}], 0x7}}, {{0x0, 0x0, &(0x7f0000000a40)=[{&(0x7f0000000880)="87", 0x1}, {&(0x7f0000000900)="11", 0x1}], 0x2}}], 0x4, 0x4000000) sendmsg$BATADV_CMD_GET_MESH(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x0, 0x200, 0x70bd25, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x20004005}, 0x4) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000)=0x7fffffff, 0x4) 1.681361097s ago: executing program 2 (id=1252): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000005e00)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket(0x29, 0x2, 0x0) sendmsg$BATADV_CMD_SET_VLAN(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[], 0x33fe0}, 0x1, 0x0, 0x0, 0x20000080}, 0x0) sendmsg$NL80211_CMD_GET_POWER_SAVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000640)={0x0}, 0x1, 0x0, 0x0, 0x2040011}, 0x8000) timer_create(0x7, &(0x7f0000000680)={0x0, 0x21, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000100)=0x0) timer_settime(r2, 0x0, &(0x7f0000000080)={{0x0, 0x8}, {0x0, 0x3938700}}, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0x541b, &(0x7f0000000000)={0xffffffffffffffff}) close_range(r3, 0xffffffffffffffff, 0x0) 1.591650509s ago: executing program 3 (id=1253): r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) dup3(r1, r0, 0x0) r2 = accept(r0, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000000300)={'ip6tnl0\x00', &(0x7f0000000400)={'ip6gre0\x00', 0x0, 0x29, 0x0, 0x0, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x16}, @empty}}) 1.508898189s ago: executing program 3 (id=1254): r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) dup3(r1, r0, 0x0) r2 = accept4(r0, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r2, 0x8912, &(0x7f0000000080)=@buf) 1.390393364s ago: executing program 3 (id=1255): r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = fcntl$dupfd(r1, 0x0, r0) r3 = accept$inet(r2, 0x0, 0x0) ioctl$FICLONERANGE(r3, 0x5450, 0x0) 1.292537696s ago: executing program 3 (id=1256): socket(0x2, 0x3, 0xff) r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000400)='./binderfs/binder0\x00', 0x800, 0x0) r1 = epoll_create1(0x80000) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000040)={0xc0000000}) mount$binderfs(0x0, 0x0, 0x0, 0x2000, 0x0) ioctl$BINDER_THREAD_EXIT(r0, 0x40046208, 0x0) socket$nl_generic(0x10, 0x3, 0x10) close(0x4) 1.199488468s ago: executing program 3 (id=1257): socket(0x1, 0x3, 0x0) r0 = epoll_create1(0x0) ioctl$sock_SIOCETHTOOL(r0, 0x5450, 0x0) mlockall(0x1) socket$unix(0x1, 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mremap(&(0x7f0000ff5000/0x2000)=nil, 0x2000, 0x5000000, 0x3, &(0x7f0000ffd000/0x1000)=nil) waitid$P_PIDFD(0x2, 0xffffffffffffffff, 0x0, 0x4, 0x0) 530.932013ms ago: executing program 2 (id=1258): r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = fcntl$dupfd(r1, 0x0, r0) r3 = accept4$packet(r2, 0x0, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, 0x0, 0x0) 421.368067ms ago: executing program 2 (id=1259): r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = dup3(r1, r0, 0x0) r3 = accept$packet(r2, 0x0, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r3, 0x5451) 299.813952ms ago: executing program 2 (id=1260): r0 = openat$selinux_policy(0xffffff9c, 0x0, 0x0, 0x0) syz_open_procfs$userns(0x0, 0x0) r1 = accept4$unix(0xffffffffffffffff, 0x0, &(0x7f0000000280), 0x800) dup2(r0, r1) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0xc400941d, &(0x7f00000012c0)={0x0, 0xfffffffffffffff8, 0x8c}) ioctl$sock_SIOCGIFBR(r1, 0x8940, 0x0) r2 = openat$full(0xffffff9c, &(0x7f0000001880), 0x3, 0x0) fsetxattr$trusted_overlay_redirect(r2, &(0x7f00000018c0), &(0x7f0000001900)='./file0\x00', 0x8, 0x0) 138.931113ms ago: executing program 2 (id=1261): r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = fcntl$dupfd(r1, 0x0, r0) r3 = accept$inet(r2, 0x0, 0x0) ioctl$BTRFS_IOC_FS_INFO(r3, 0x5450, 0x0) 0s ago: executing program 2 (id=1262): r0 = socket(0x29, 0x2, 0x0) sendmsg$BATADV_CMD_SET_VLAN(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[], 0x33fe0}, 0x1, 0x0, 0x0, 0x20000080}, 0x0) sendmsg$NL80211_CMD_SET_POWER_SAVE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x1, 0x0, 0x0, 0x20008000}, 0x90) close_range(r0, 0xffffffffffffffff, 0x0) socket$unix(0x1, 0x1, 0x0) timer_create(0x7, &(0x7f0000000680)={0x0, 0x21}, &(0x7f0000000100)=0x0) sendmsg$NL80211_CMD_DEL_PMKSA(0xffffffffffffffff, 0x0, 0x40011) timer_settime(r1, 0x0, &(0x7f0000000080)={{0x0, 0x8}, {0x0, 0x3938700}}, 0x0) kernel console output (not intermixed with test programs): [ 53.349510][ T29] audit: type=1400 audit(53.270:56): avc: denied { read write } for pid=3086 comm="sftp-server" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 53.372221][ T29] audit: type=1400 audit(53.290:57): avc: denied { open } for pid=3086 comm="sftp-server" path="/dev/null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 Warning: Permanently added '[localhost]:18569' (ED25519) to the list of known hosts. [ 67.500961][ T29] audit: type=1400 audit(67.410:58): avc: denied { name_bind } for pid=3089 comm="sshd-session" src=30000 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 69.062319][ T29] audit: type=1400 audit(68.980:59): avc: denied { execute } for pid=3090 comm="sh" name="syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 69.114509][ T29] audit: type=1400 audit(69.040:60): avc: denied { execute_no_trans } for pid=3090 comm="sh" path="/syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 73.094161][ T29] audit: type=1400 audit(73.010:61): avc: denied { mounton } for pid=3090 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=806 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 73.100029][ T29] audit: type=1400 audit(73.020:62): avc: denied { mount } for pid=3090 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 73.123707][ T3090] cgroup: Unknown subsys name 'net' [ 73.132401][ T29] audit: type=1400 audit(73.050:63): avc: denied { unmount } for pid=3090 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 73.292203][ T3090] cgroup: Unknown subsys name 'cpuset' [ 73.298753][ T3090] cgroup: Unknown subsys name 'hugetlb' [ 73.299743][ T3090] cgroup: Unknown subsys name 'rlimit' [ 73.521533][ T29] audit: type=1400 audit(73.440:64): avc: denied { setattr } for pid=3090 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 73.527322][ T29] audit: type=1400 audit(73.440:65): avc: denied { mounton } for pid=3090 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 73.527499][ T29] audit: type=1400 audit(73.450:66): avc: denied { mount } for pid=3090 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 73.731077][ T3092] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 73.734901][ T29] audit: type=1400 audit(73.660:67): avc: denied { relabelto } for pid=3092 comm="mkswap" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 73.739232][ T29] audit: type=1400 audit(73.660:68): avc: denied { write } for pid=3092 comm="mkswap" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 73.784045][ T29] audit: type=1400 audit(73.710:69): avc: denied { read } for pid=3090 comm="syz-executor" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 73.787708][ T29] audit: type=1400 audit(73.710:70): avc: denied { open } for pid=3090 comm="syz-executor" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 81.485486][ T3090] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 83.581957][ T29] audit: type=1400 audit(83.500:71): avc: denied { execmem } for pid=3093 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 83.668796][ T29] audit: type=1400 audit(83.590:72): avc: denied { read } for pid=3095 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 83.673661][ T29] audit: type=1400 audit(83.600:73): avc: denied { open } for pid=3095 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 83.682676][ T29] audit: type=1400 audit(83.600:74): avc: denied { mounton } for pid=3095 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 83.715424][ T29] audit: type=1400 audit(83.640:75): avc: denied { module_request } for pid=3096 comm="syz-executor" kmod="netdev-nr1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 83.715859][ T29] audit: type=1400 audit(83.640:76): avc: denied { module_request } for pid=3095 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 83.807067][ T29] audit: type=1400 audit(83.730:77): avc: denied { sys_module } for pid=3096 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 84.595337][ T29] audit: type=1400 audit(84.510:78): avc: denied { ioctl } for pid=3096 comm="syz-executor" path="/dev/net/tun" dev="devtmpfs" ino=677 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 85.826671][ T3096] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 85.837341][ T3096] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 86.008171][ T3095] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 86.019192][ T3095] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 86.847254][ T3096] hsr_slave_0: entered promiscuous mode [ 86.852581][ T3096] hsr_slave_1: entered promiscuous mode [ 87.030496][ T3095] hsr_slave_0: entered promiscuous mode [ 87.032409][ T3095] hsr_slave_1: entered promiscuous mode [ 87.040835][ T3095] debugfs: 'hsr0' already exists in 'hsr' [ 87.043312][ T3095] Cannot create hsr debugfs directory [ 87.357089][ T29] audit: type=1400 audit(87.280:79): avc: denied { create } for pid=3096 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 87.363934][ T29] audit: type=1400 audit(87.280:80): avc: denied { write } for pid=3096 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 87.378636][ T3096] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 87.414969][ T3096] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 87.451011][ T3096] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 87.471786][ T3096] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 87.636199][ T3095] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 87.655884][ T3095] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 87.668151][ T3095] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 87.679749][ T3095] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 88.215266][ T3096] 8021q: adding VLAN 0 to HW filter on device bond0 [ 88.377182][ T3095] 8021q: adding VLAN 0 to HW filter on device bond0 [ 91.388775][ T3096] veth0_vlan: entered promiscuous mode [ 91.412282][ T3096] veth1_vlan: entered promiscuous mode [ 91.478184][ T3096] veth0_macvtap: entered promiscuous mode [ 91.490478][ T3096] veth1_macvtap: entered promiscuous mode [ 91.567930][ T3095] veth0_vlan: entered promiscuous mode [ 91.610570][ T1078] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 91.611432][ T1078] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 91.611559][ T1078] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 91.611639][ T1078] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 91.614205][ T3095] veth1_vlan: entered promiscuous mode [ 91.769442][ T3095] veth0_macvtap: entered promiscuous mode [ 91.779550][ T29] kauditd_printk_skb: 1 callbacks suppressed [ 91.779853][ T29] audit: type=1400 audit(91.700:82): avc: denied { mount } for pid=3096 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 91.784597][ T3095] veth1_macvtap: entered promiscuous mode [ 91.791451][ T29] audit: type=1400 audit(91.710:83): avc: denied { mounton } for pid=3096 comm="syz-executor" path="/syzkaller.GOZgL3/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 91.815549][ T29] audit: type=1400 audit(91.740:84): avc: denied { mount } for pid=3096 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 91.845827][ T29] audit: type=1400 audit(91.770:85): avc: denied { mounton } for pid=3096 comm="syz-executor" path="/syzkaller.GOZgL3/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 91.850542][ T29] audit: type=1400 audit(91.770:86): avc: denied { mounton } for pid=3096 comm="syz-executor" path="/syzkaller.GOZgL3/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=3148 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 91.859855][ T1260] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 91.860764][ T1260] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 91.860880][ T1260] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 91.860947][ T1260] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 91.882428][ T29] audit: type=1400 audit(91.800:87): avc: denied { unmount } for pid=3096 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 91.890281][ T29] audit: type=1400 audit(91.810:88): avc: denied { mounton } for pid=3096 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=772 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 91.894277][ T29] audit: type=1400 audit(91.820:89): avc: denied { mount } for pid=3096 comm="syz-executor" name="/" dev="gadgetfs" ino=3152 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 91.901873][ T29] audit: type=1400 audit(91.820:90): avc: denied { mount } for pid=3096 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 91.908579][ T29] audit: type=1400 audit(91.830:91): avc: denied { mounton } for pid=3096 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 91.979450][ T3096] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 93.589341][ T3709] Zero length message leads to an empty skb [ 106.132411][ T29] kauditd_printk_skb: 12 callbacks suppressed [ 106.138064][ T29] audit: type=1400 audit(106.050:104): avc: denied { create } for pid=3829 comm="syz.0.51" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 109.115795][ T3855] fuse: root generation should be zero [ 110.158510][ T29] audit: type=1400 audit(110.080:105): avc: denied { prog_load } for pid=3872 comm="syz.1.66" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 110.160134][ T29] audit: type=1400 audit(110.080:106): avc: denied { bpf } for pid=3872 comm="syz.1.66" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 110.161567][ T29] audit: type=1400 audit(110.080:107): avc: denied { perfmon } for pid=3872 comm="syz.1.66" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 110.181007][ T29] audit: type=1400 audit(110.100:108): avc: denied { prog_run } for pid=3872 comm="syz.1.66" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 110.192464][ T29] audit: type=1400 audit(110.110:109): avc: denied { create } for pid=3872 comm="syz.1.66" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 110.195946][ T29] audit: type=1400 audit(110.120:110): avc: denied { connect } for pid=3872 comm="syz.1.66" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 110.200141][ T29] audit: type=1400 audit(110.120:111): avc: denied { setopt } for pid=3872 comm="syz.1.66" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 110.206735][ T29] audit: type=1400 audit(110.130:112): avc: denied { bind } for pid=3872 comm="syz.1.66" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 110.212487][ T29] audit: type=1400 audit(110.130:113): avc: denied { write } for pid=3872 comm="syz.1.66" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 133.415898][ T29] audit: type=1400 audit(133.340:114): avc: denied { create } for pid=4026 comm="syz.0.129" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 133.422588][ T29] audit: type=1400 audit(133.340:115): avc: denied { bind } for pid=4026 comm="syz.0.129" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 133.434928][ T29] audit: type=1400 audit(133.360:116): avc: denied { ioctl } for pid=4026 comm="syz.0.129" path="socket:[3757]" dev="sockfs" ino=3757 ioctlcmd=0x0 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 133.438783][ T29] audit: type=1400 audit(133.360:117): avc: denied { write } for pid=4026 comm="syz.0.129" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 134.384632][ T29] audit: type=1400 audit(134.300:118): avc: denied { write } for pid=4036 comm="syz.1.135" name="ip_mr_cache" dev="proc" ino=4026532677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 134.495174][ T29] audit: type=1400 audit(134.420:119): avc: denied { ioctl } for pid=4042 comm="syz.1.136" path="socket:[2940]" dev="sockfs" ino=2940 ioctlcmd=0x5407 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 137.507038][ T29] audit: type=1400 audit(137.430:120): avc: denied { create } for pid=4065 comm="syz.1.144" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 137.606193][ T29] audit: type=1400 audit(137.530:121): avc: denied { write } for pid=4065 comm="syz.1.144" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 139.338781][ T29] audit: type=1400 audit(139.260:122): avc: denied { map_create } for pid=4093 comm="syz.1.154" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 139.345660][ T29] audit: type=1400 audit(139.260:123): avc: denied { map_read map_write } for pid=4093 comm="syz.1.154" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 142.451394][ T29] audit: type=1400 audit(142.370:124): avc: denied { read } for pid=4133 comm="syz.1.168" name="binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 142.453993][ T29] audit: type=1400 audit(142.370:125): avc: denied { open } for pid=4133 comm="syz.1.168" path="/dev/binderfs/binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 142.476422][ T29] audit: type=1400 audit(142.390:126): avc: denied { ioctl } for pid=4133 comm="syz.1.168" path="/dev/binderfs/binder0" dev="binder" ino=4 ioctlcmd=0x6208 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 147.941203][ T29] audit: type=1400 audit(147.860:127): avc: denied { execute } for pid=4168 comm="syz.1.184" path=2F6D656D66643A0B656DDA9952406DFCFE9B232AFF202864656C6574656429 dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 156.848250][ T29] audit: type=1400 audit(156.770:128): avc: denied { allowed } for pid=4257 comm="syz.1.217" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 156.860805][ T29] audit: type=1400 audit(156.780:129): avc: denied { create } for pid=4257 comm="syz.1.217" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 156.869852][ T29] audit: type=1400 audit(156.790:130): avc: denied { create } for pid=4257 comm="syz.1.217" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 156.875011][ T29] audit: type=1400 audit(156.800:131): avc: denied { bind } for pid=4257 comm="syz.1.217" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 156.879072][ T29] audit: type=1400 audit(156.800:132): avc: denied { listen } for pid=4257 comm="syz.1.217" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 156.883739][ T29] audit: type=1400 audit(156.800:133): avc: denied { accept } for pid=4257 comm="syz.1.217" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 161.227651][ T29] audit: type=1400 audit(161.150:134): avc: denied { create } for pid=4300 comm="syz.0.234" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 161.247003][ T29] audit: type=1400 audit(161.170:135): avc: denied { write } for pid=4300 comm="syz.0.234" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 175.025355][ T29] audit: type=1400 audit(174.950:136): avc: denied { setattr } for pid=4389 comm="syz.1.272" name="" dev="pipefs" ino=5339 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=1 [ 175.724008][ T29] audit: type=1400 audit(175.640:137): avc: denied { create } for pid=4395 comm="syz.0.274" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 175.756892][ T29] audit: type=1400 audit(175.680:138): avc: denied { write } for pid=4395 comm="syz.0.274" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 184.532299][ T29] audit: type=1400 audit(184.450:139): avc: denied { create } for pid=4455 comm="syz.0.300" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 184.537017][ T29] audit: type=1400 audit(184.460:140): avc: denied { ioctl } for pid=4455 comm="syz.0.300" path="socket:[4822]" dev="sockfs" ino=4822 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 184.558160][ T29] audit: type=1400 audit(184.480:141): avc: denied { setopt } for pid=4455 comm="syz.0.300" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 185.835330][ T29] audit: type=1400 audit(185.760:142): avc: denied { create } for pid=4465 comm="syz.0.304" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 185.894815][ T29] audit: type=1400 audit(185.820:143): avc: denied { write } for pid=4465 comm="syz.0.304" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 187.554574][ T4489] ======================================================= [ 187.554574][ T4489] WARNING: The mand mount option has been deprecated and [ 187.554574][ T4489] and is ignored by this kernel. Remove the mand [ 187.554574][ T4489] option from the mount to silence this warning. [ 187.554574][ T4489] ======================================================= [ 187.582605][ T29] audit: type=1400 audit(187.500:144): avc: denied { unmount } for pid=3095 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 187.876861][ T2374] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 187.919000][ T2374] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 187.959277][ T2374] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 188.013841][ T2374] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 188.397612][ T2374] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 188.417211][ T2374] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 188.424803][ T2374] bond0 (unregistering): Released all slaves [ 188.546068][ T2374] hsr_slave_0: left promiscuous mode [ 188.550248][ T2374] hsr_slave_1: left promiscuous mode [ 188.570015][ T2374] veth1_macvtap: left promiscuous mode [ 188.570695][ T2374] veth0_macvtap: left promiscuous mode [ 188.571237][ T2374] veth1_vlan: left promiscuous mode [ 188.571713][ T2374] veth0_vlan: left promiscuous mode [ 189.989814][ T4501] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 190.000987][ T4501] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 190.892702][ T4501] hsr_slave_0: entered promiscuous mode [ 190.896428][ T4501] hsr_slave_1: entered promiscuous mode [ 190.902651][ T4501] debugfs: 'hsr0' already exists in 'hsr' [ 190.905789][ T4501] Cannot create hsr debugfs directory [ 191.250871][ T4501] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 191.266269][ T4501] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 191.278803][ T4501] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 191.289527][ T4501] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 192.128461][ T4501] 8021q: adding VLAN 0 to HW filter on device bond0 [ 195.029295][ T4501] veth0_vlan: entered promiscuous mode [ 195.055738][ T4501] veth1_vlan: entered promiscuous mode [ 195.111112][ T4501] veth0_macvtap: entered promiscuous mode [ 195.126814][ T4501] veth1_macvtap: entered promiscuous mode [ 195.189501][ T1051] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 195.189911][ T1051] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 195.196836][ T1051] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 195.197205][ T1051] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 227.465621][ T5026] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5026 comm=syz.2.375 [ 242.828139][ T29] audit: type=1400 audit(242.750:145): avc: denied { map } for pid=5124 comm="syz.1.413" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=6814 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 242.829832][ T29] audit: type=1400 audit(242.750:146): avc: denied { read write } for pid=5124 comm="syz.1.413" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=6814 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 245.900449][ T29] audit: type=1400 audit(245.820:147): avc: denied { ioctl } for pid=5159 comm="syz.2.428" path="socket:[6888]" dev="sockfs" ino=6888 ioctlcmd=0x891a scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 246.844838][ T29] audit: type=1400 audit(246.770:148): avc: denied { name_bind } for pid=5181 comm="syz.2.437" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=1 [ 246.847075][ T29] audit: type=1400 audit(246.770:149): avc: denied { node_bind } for pid=5181 comm="syz.2.437" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 250.380454][ T29] audit: type=1400 audit(250.300:150): avc: denied { name_bind } for pid=5204 comm="syz.1.446" src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 267.383608][ T29] audit: type=1400 audit(267.300:151): avc: denied { read } for pid=5427 comm="syz.2.535" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 270.974707][ T29] audit: type=1400 audit(270.900:152): avc: denied { watch } for pid=5472 comm="syz.1.554" path="/238/file0" dev="fuse" ino=9 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=file permissive=1 [ 287.451656][ T29] audit: type=1400 audit(287.370:153): avc: denied { append } for pid=5735 comm="syz.2.660" name="card1" dev="devtmpfs" ino=615 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 287.482195][ T5736] faux_driver vgem: [drm] Unknown color mode 2054; guessing buffer size. [ 290.341983][ T1317] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 290.420931][ T1317] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 290.487761][ T1317] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 290.551497][ T1317] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 290.907042][ T1317] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 290.923843][ T1317] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 290.932044][ T1317] bond0 (unregistering): Released all slaves [ 291.056412][ T1317] hsr_slave_0: left promiscuous mode [ 291.059636][ T1317] hsr_slave_1: left promiscuous mode [ 291.097542][ T1317] veth1_macvtap: left promiscuous mode [ 291.097918][ T1317] veth0_macvtap: left promiscuous mode [ 291.098124][ T1317] veth1_vlan: left promiscuous mode [ 291.098278][ T1317] veth0_vlan: left promiscuous mode [ 291.659981][ T29] audit: type=1400 audit(291.580:154): avc: denied { create } for pid=5798 comm="syz.2.682" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 291.686438][ T29] audit: type=1400 audit(291.610:155): avc: denied { write } for pid=5798 comm="syz.2.682" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 293.328285][ T5780] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 293.332319][ T5780] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 294.104481][ T5780] hsr_slave_0: entered promiscuous mode [ 294.108008][ T5780] hsr_slave_1: entered promiscuous mode [ 295.800943][ T5780] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 295.820537][ T5780] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 295.845581][ T5780] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 295.869469][ T5780] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 296.780330][ T5780] 8021q: adding VLAN 0 to HW filter on device bond0 [ 296.998504][ T6122] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 300.072349][ T5780] veth0_vlan: entered promiscuous mode [ 300.104985][ T5780] veth1_vlan: entered promiscuous mode [ 300.191742][ T5780] veth0_macvtap: entered promiscuous mode [ 300.216586][ T5780] veth1_macvtap: entered promiscuous mode [ 300.318319][ T1078] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 300.319666][ T1078] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 300.324158][ T1078] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 300.324447][ T1078] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 314.904762][ T29] audit: type=1400 audit(314.830:156): avc: denied { read write } for pid=6347 comm="syz.2.751" name="file0" dev="fuse" ino=64 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=chr_file permissive=1 [ 314.905199][ T29] audit: type=1400 audit(314.830:157): avc: denied { open } for pid=6347 comm="syz.2.751" path="/230/file0/file0" dev="fuse" ino=64 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=chr_file permissive=1 [ 314.912228][ T29] audit: type=1400 audit(314.830:158): avc: denied { ioctl } for pid=6347 comm="syz.2.751" path="/230/file0/file0" dev="fuse" ino=64 ioctlcmd=0x545c scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=chr_file permissive=1 [ 329.106411][ T29] audit: type=1400 audit(329.030:159): avc: denied { setopt } for pid=6541 comm="syz.3.824" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 329.805720][ T29] audit: type=1400 audit(329.730:160): avc: denied { mount } for pid=6557 comm="syz.3.832" name="/" dev="ramfs" ino=12419 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 372.939225][ T29] audit: type=1400 audit(372.860:161): avc: denied { bind } for pid=7091 comm="syz.2.1052" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 372.949119][ T29] audit: type=1400 audit(372.870:162): avc: denied { listen } for pid=7091 comm="syz.2.1052" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 372.951783][ T29] audit: type=1400 audit(372.870:163): avc: denied { accept } for pid=7091 comm="syz.2.1052" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 377.834588][ T29] audit: type=1400 audit(377.750:164): avc: denied { create } for pid=7153 comm="syz.2.1078" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 377.846468][ T29] audit: type=1400 audit(377.770:165): avc: denied { mounton } for pid=7153 comm="syz.2.1078" path="/391/file0" dev="tmpfs" ino=2292 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 378.397187][ T29] audit: type=1400 audit(378.320:166): avc: denied { unlink } for pid=4501 comm="syz-executor" name="file0" dev="tmpfs" ino=2292 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 383.866101][ T7251] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 383.868290][ T7251] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 395.227669][ T29] audit: type=1400 audit(395.150:167): avc: denied { append } for pid=7377 comm="syz.2.1166" name="file0" dev="fuse" ino=6 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=blk_file permissive=1 [ 395.230915][ T29] audit: type=1400 audit(395.150:168): avc: denied { open } for pid=7377 comm="syz.2.1166" path="/430/file0/file0" dev="fuse" ino=6 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=blk_file permissive=1 [ 395.232173][ T29] audit: type=1400 audit(395.150:169): avc: denied { ioctl } for pid=7377 comm="syz.2.1166" path="/430/file0/file0" dev="fuse" ino=6 ioctlcmd=0x125d scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=blk_file permissive=1 [ 411.730232][ T7482] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=7482 comm=syz.3.1200 [ 858.313205][ C1] watchdog: BUG: soft lockup - CPU#1 stuck for 430s! [swapper/1:0] [ 858.313415][ C1] Modules linked in: [ 858.313954][ C1] CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Not tainted syzkaller #0 PREEMPT [ 858.314187][ C1] Hardware name: ARM-Versatile Express [ 858.314432][ C1] PC is at _raw_spin_lock+0x40/0x58 [ 858.315005][ C1] LR is at _raw_spin_lock+0x18/0x58 [ 858.315034][ C1] pc : [<81abbef4>] lr : [<81abbecc>] psr: 80000113 [ 858.315055][ C1] sp : df805d68 ip : df805d68 fp : df805d7c [ 858.315073][ C1] r10: 81c05450 r9 : 8414f040 r8 : 842eca88 [ 858.315095][ C1] r7 : 8414f168 r6 : 00000001 r5 : 00000001 r4 : 8414f168 [ 858.315117][ C1] r3 : 00009620 r2 : 00009621 r1 : 00000000 r0 : 00000001 [ 858.315186][ C1] Flags: Nzcv IRQs on FIQs on Mode SVC_32 ISA ARM Segment none [ 858.315228][ C1] Control: 30c5387d Table: 85c8ef80 DAC: 00000000 [ 858.315291][ C1] Call trace: frame pointer underflow [ 858.315484][ C1] [<81abbeb4>] (_raw_spin_lock) from [<809c7a2c>] (gpio_mmio_set+0x44/0x80) [ 858.315710][ C1] r5:00000001 r4:8414f040 [ 858.315765][ C1] [<809c79e8>] (gpio_mmio_set) from [<809b81e8>] (gpiochip_set+0x1c/0x44) [ 858.315809][ C1] r7:00000001 r6:00000000 r5:00000000 r4:8411fe40 [ 858.315819][ C1] [<809b81cc>] (gpiochip_set) from [<809baab0>] (gpiod_set_raw_value_commit+0x78/0x218) [ 858.315848][ C1] [<809baa38>] (gpiod_set_raw_value_commit) from [<809bc350>] (gpiod_set_value_nocheck+0x44/0x58) [ 858.315893][ C1] r10:81c05450 r9:df805ebc r8:00000102 r7:000030d9 r6:00000007 r5:00000001 [ 858.315910][ C1] r4:8411fe40 [ 858.315918][ C1] [<809bc30c>] (gpiod_set_value_nocheck) from [<809bc3a0>] (gpiod_set_value+0x3c/0x88) [ 858.315945][ C1] [<809bc364>] (gpiod_set_value) from [<809ccb3c>] (gpio_led_set+0x5c/0x60) [ 858.315974][ C1] r5:832f7844 r4:832f7844 [ 858.315982][ C1] [<809ccae0>] (gpio_led_set) from [<809ca3d4>] (led_set_brightness_nosleep+0x38/0x44) [ 858.316010][ C1] r5:832f7844 r4:84e9918c [ 858.316018][ C1] [<809ca39c>] (led_set_brightness_nosleep) from [<809cd438>] (led_heartbeat_function+0x84/0x144) [ 858.316044][ C1] [<809cd3b4>] (led_heartbeat_function) from [<80327070>] (call_timer_fn+0x30/0x220) [ 858.316080][ C1] r7:000030d9 r6:809cd3b4 r5:84e9918c r4:83216000 [ 858.316090][ C1] [<80327040>] (call_timer_fn) from [<80327524>] (__run_timers+0x2c4/0x3f8) [ 858.316125][ C1] r9:df805ebc r8:000030d9 r7:00000000 r6:809cd3b4 r5:dddd9f00 r4:84e9918c [ 858.316134][ C1] [<80327260>] (__run_timers) from [<803276c0>] (run_timer_base+0x68/0x78) [ 858.316168][ C1] r10:83216000 r9:82804d80 r8:00000102 r7:00000001 r6:00000082 r5:00000002 [ 858.316179][ C1] r4:dddd9f00 [ 858.316187][ C1] [<80327658>] (run_timer_base) from [<803276ec>] (run_timer_softirq+0x1c/0x34) [ 858.316215][ C1] r4:82804084 [ 858.316222][ C1] [<803276d0>] (run_timer_softirq) from [<8025b65c>] (handle_softirqs+0x140/0x458) [ 858.316251][ C1] [<8025b51c>] (handle_softirqs) from [<8025bad0>] (__irq_exit_rcu+0x110/0x1d0) [ 858.316286][ C1] r10:00000000 r9:83216000 r8:00000000 r7:df865e08 r6:82443f98 r5:8247f0cc [ 858.316298][ C1] r4:83216000 [ 858.316305][ C1] [<8025b9c0>] (__irq_exit_rcu) from [<8025be48>] (irq_exit+0x10/0x18) [ 858.316335][ C1] r5:8247f0cc r4:826c3a9c [ 858.316343][ C1] [<8025be38>] (irq_exit) from [<81aad964>] (generic_handle_arch_irq+0x7c/0x80) [ 858.316374][ C1] [<81aad8e8>] (generic_handle_arch_irq) from [<81a7d904>] (call_with_stack+0x1c/0x20) [ 858.316410][ C1] r9:83216000 r8:842eca88 r7:df865e3c r6:ffffffff r5:60000013 r4:809c822c [ 858.316420][ C1] [<81a7d8e8>] (call_with_stack) from [<80200bec>] (__irq_svc+0x8c/0xbc) [ 858.316490][ C1] Exception stack(0xdf865e08 to 0xdf865e50) [ 858.316600][ C1] 5e00: e01b9008 0000000c 00009620 00000000 e01b9008 0000000c [ 858.316629][ C1] 5e20: 00000001 8414f168 842eca88 8414f040 00000000 df865e6c df865e58 df865e58 [ 858.316643][ C1] 5e40: 809c8228 809c822c 60000013 ffffffff [ 858.316701][ C1] [<809c820c>] (gpio_mmio_write32) from [<809c7a4c>] (gpio_mmio_set+0x64/0x80) [ 858.316785][ C1] r5:00000008 r4:8414f040 [ 858.316808][ C1] [<809c79e8>] (gpio_mmio_set) from [<809b81e8>] (gpiochip_set+0x1c/0x44) [ 858.316885][ C1] r7:00000001 r6:00000000 r5:00000003 r4:8411fe7c [ 858.316907][ C1] [<809b81cc>] (gpiochip_set) from [<809baab0>] (gpiod_set_raw_value_commit+0x78/0x218) [ 858.316967][ C1] [<809baa38>] (gpiod_set_raw_value_commit) from [<809bc350>] (gpiod_set_value_nocheck+0x44/0x58) [ 858.317044][ C1] r10:00000000 r9:00000000 r8:00000001 r7:ddde24c0 r6:83836758 r5:00000001 [ 858.317069][ C1] r4:8411fe7c [ 858.317087][ C1] [<809bc30c>] (gpiod_set_value_nocheck) from [<809bc3a0>] (gpiod_set_value+0x3c/0x88) [ 858.317138][ C1] [<809bc364>] (gpiod_set_value) from [<809ccb3c>] (gpio_led_set+0x5c/0x60) [ 858.317198][ C1] r5:000000ff r4:832f7b14 [ 858.317223][ C1] [<809ccae0>] (gpio_led_set) from [<809ca464>] (led_set_brightness+0x84/0x90) [ 858.317290][ C1] r5:000000ff r4:832f7b14 [ 858.317312][ C1] [<809ca3e0>] (led_set_brightness) from [<809cbfe4>] (led_trigger_event+0x40/0x58) [ 858.317380][ C1] r5:000000ff r4:832f7b14 [ 858.317403][ C1] [<809cbfa4>] (led_trigger_event) from [<809cd640>] (ledtrig_cpu+0xac/0xf4) [ 858.317475][ C1] r7:ddde24c0 r6:00000002 r5:82b15cd8 r4:000001fd [ 858.317499][ C1] [<809cd594>] (ledtrig_cpu) from [<80227a38>] (arch_cpu_idle_exit+0x14/0x18) [ 858.317579][ C1] r9:00000000 r8:00000001 r7:8280c710 r6:83216000 r5:8280c6d0 r4:00000001 [ 858.317603][ C1] [<80227a24>] (arch_cpu_idle_exit) from [<802b168c>] (do_idle+0x5c/0x2d8) [ 858.317670][ C1] [<802b1630>] (do_idle) from [<802b1c38>] (cpu_startup_entry+0x30/0x34) [ 858.317763][ C1] r10:00000000 r9:414fc0f0 r8:80003000 r7:82a7b4a4 r6:83216000 r5:00000001 [ 858.317791][ C1] r4:00000092 [ 858.317810][ C1] [<802b1c08>] (cpu_startup_entry) from [<8022f360>] (secondary_start_kernel+0x128/0x194) [ 858.317880][ C1] [<8022f238>] (secondary_start_kernel) from [<80220094>] (__enable_mmu+0x0/0xc) [ 858.317960][ C1] r7:82a7b4a4 r6:30c0387d r5:00000000 r4:830b7bc0 [ 858.318300][ C1] Sending NMI from CPU 1 to CPUs 0: [ 868.345056][ C1] Kernel panic - not syncing: softlockup: hung tasks [ 868.365927][ C1] CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Tainted: G L syzkaller #0 PREEMPT [ 868.366430][ C1] Tainted: [L]=SOFTLOCKUP [ 868.366648][ C1] Hardware name: ARM-Versatile Express [ 868.366927][ C1] Call trace: frame pointer underflow [ 868.367313][ C1] [<80201a74>] (dump_backtrace) from [<80201b70>] (show_stack+0x18/0x1c) [ 868.367738][ C1] r7:822965a4 r6:83216000 r5:00000000 r4:82295754 [ 868.368020][ C1] [<80201b58>] (show_stack) from [<8021ee08>] (dump_stack_lvl+0x54/0x7c) [ 868.368387][ C1] [<8021edb4>] (dump_stack_lvl) from [<8021ee48>] (dump_stack+0x18/0x1c) [ 868.368777][ C1] r5:00000000 r4:82a7bd14 [ 868.369006][ C1] [<8021ee30>] (dump_stack) from [<80202648>] (vpanic+0xe0/0x2e8) [ 868.369357][ C1] [<80202568>] (vpanic) from [<80202884>] (trace_suspend_resume+0x0/0xd8) [ 868.369732][ C1] r7:82ac27f8 [ 868.369918][ C1] [<80202850>] (panic) from [<80383fcc>] (watchdog_timer_fn+0x2dc/0x350) [ 868.370304][ C1] r3:00000001 r2:00004000 r1:82a7bd1c r0:822965a4 [ 868.370568][ C1] [<80383cf0>] (watchdog_timer_fn) from [<80329c64>] (__hrtimer_run_queues+0x1c4/0x454) [ 868.371002][ C1] r10:83216000 r9:00000000 r8:ddddb130 r7:80383cf0 r6:ddddb000 r5:ddddb040 [ 868.371323][ C1] r4:ddddb5d8 [ 868.371518][ C1] [<80329aa0>] (__hrtimer_run_queues) from [<8032b268>] (hrtimer_interrupt+0x148/0x2bc) [ 868.371947][ C1] r10:d31a7b10 r9:ddddb180 r8:ddddb130 r7:000000c7 r6:00000003 r5:20000193 [ 868.372271][ C1] r4:ddddb000 [ 868.372447][ C1] [<8032b120>] (hrtimer_interrupt) from [<813408e0>] (arch_timer_handler_virt+0x30/0x38) [ 868.372876][ C1] r10:81d0fc78 r9:8309e400 r8:00000000 r7:00000001 r6:00000001 r5:82498528 [ 868.373207][ C1] r4:8309de40 [ 868.373382][ C1] [<813408b0>] (arch_timer_handler_virt) from [<802efab4>] (handle_percpu_devid_irq+0x128/0x34c) [ 868.373796][ C1] [<802ef98c>] (handle_percpu_devid_irq) from [<802e8c44>] (handle_irq_desc+0x74/0x84) [ 868.374222][ C1] r10:81c05450 r9:83216000 r8:00000000 r7:df80a00c r6:826c2388 r5:df80a000 [ 868.374544][ C1] r4:8280cc44 [ 868.374716][ C1] [<802e8bd0>] (handle_irq_desc) from [<802e8cc0>] (generic_handle_domain_irq+0x18/0x1c) [ 868.375139][ C1] [<802e8ca8>] (generic_handle_domain_irq) from [<802012c8>] (gic_handle_irq+0x68/0x7c) [ 868.375567][ C1] [<80201260>] (gic_handle_irq) from [<81aad948>] (generic_handle_arch_irq+0x60/0x80) [ 868.376001][ C1] r7:df805d18 r6:82443f98 r5:8247f0cc r4:826c3a9c [ 868.376276][ C1] [<81aad8e8>] (generic_handle_arch_irq) from [<80200bdc>] (__irq_svc+0x7c/0xbc) [ 868.376677][ C1] Exception stack(0xdf805d18 to 0xdf805d60) [ 868.376970][ C1] 5d00: 00000001 00000000 [ 868.377324][ C1] 5d20: 00009621 00009620 8414f168 00000001 00000001 8414f168 842eca88 8414f040 [ 868.377682][ C1] 5d40: 81c05450 df805d7c df805d68 df805d68 81abbecc 81abbef4 80000113 ffffffff [ 868.378060][ C1] r9:83216000 r8:842eca88 r7:df805d4c r6:ffffffff r5:80000113 r4:81abbef4 [ 868.378380][ C1] [<81abbeb4>] (_raw_spin_lock) from [<809c7a2c>] (gpio_mmio_set+0x44/0x80) [ 868.378773][ C1] r5:00000001 r4:8414f040 [ 868.379009][ C1] [<809c79e8>] (gpio_mmio_set) from [<809b81e8>] (gpiochip_set+0x1c/0x44) [ 868.379395][ C1] r7:00000001 r6:00000000 r5:00000000 r4:8411fe40 [ 868.379682][ C1] [<809b81cc>] (gpiochip_set) from [<809baab0>] (gpiod_set_raw_value_commit+0x78/0x218) [ 868.380111][ C1] [<809baa38>] (gpiod_set_raw_value_commit) from [<809bc350>] (gpiod_set_value_nocheck+0x44/0x58) [ 868.380527][ C1] r10:81c05450 r9:df805ebc r8:00000102 r7:000030d9 r6:00000007 r5:00000001 [ 868.380850][ C1] r4:8411fe40 [ 868.381036][ C1] [<809bc30c>] (gpiod_set_value_nocheck) from [<809bc3a0>] (gpiod_set_value+0x3c/0x88) [ 868.381426][ C1] [<809bc364>] (gpiod_set_value) from [<809ccb3c>] (gpio_led_set+0x5c/0x60) [ 868.381792][ C1] r5:832f7844 r4:832f7844 [ 868.382000][ C1] [<809ccae0>] (gpio_led_set) from [<809ca3d4>] (led_set_brightness_nosleep+0x38/0x44) [ 868.382388][ C1] r5:832f7844 r4:84e9918c [ 868.382581][ C1] [<809ca39c>] (led_set_brightness_nosleep) from [<809cd438>] (led_heartbeat_function+0x84/0x144) [ 868.383024][ C1] [<809cd3b4>] (led_heartbeat_function) from [<80327070>] (call_timer_fn+0x30/0x220) [ 868.383427][ C1] r7:000030d9 r6:809cd3b4 r5:84e9918c r4:83216000 [ 868.383701][ C1] [<80327040>] (call_timer_fn) from [<80327524>] (__run_timers+0x2c4/0x3f8) [ 868.384105][ C1] r9:df805ebc r8:000030d9 r7:00000000 r6:809cd3b4 r5:dddd9f00 r4:84e9918c [ 868.384419][ C1] [<80327260>] (__run_timers) from [<803276c0>] (run_timer_base+0x68/0x78) [ 868.384807][ C1] r10:83216000 r9:82804d80 r8:00000102 r7:00000001 r6:00000082 r5:00000002 [ 868.385143][ C1] r4:dddd9f00 [ 868.385313][ C1] [<80327658>] (run_timer_base) from [<803276ec>] (run_timer_softirq+0x1c/0x34) [ 868.385684][ C1] r4:82804084 [ 868.385838][ C1] [<803276d0>] (run_timer_softirq) from [<8025b65c>] (handle_softirqs+0x140/0x458) [ 868.386237][ C1] [<8025b51c>] (handle_softirqs) from [<8025bad0>] (__irq_exit_rcu+0x110/0x1d0) [ 868.386622][ C1] r10:00000000 r9:83216000 r8:00000000 r7:df865e08 r6:82443f98 r5:8247f0cc [ 868.386967][ C1] r4:83216000 [ 868.387133][ C1] [<8025b9c0>] (__irq_exit_rcu) from [<8025be48>] (irq_exit+0x10/0x18) [ 868.387466][ C1] r5:8247f0cc r4:826c3a9c [ 868.387785][ C1] [<8025be38>] (irq_exit) from [<81aad964>] (generic_handle_arch_irq+0x7c/0x80) [ 868.388193][ C1] [<81aad8e8>] (generic_handle_arch_irq) from [<81a7d904>] (call_with_stack+0x1c/0x20) [ 868.388628][ C1] r9:83216000 r8:842eca88 r7:df865e3c r6:ffffffff r5:60000013 r4:809c822c [ 868.388963][ C1] [<81a7d8e8>] (call_with_stack) from [<80200bec>] (__irq_svc+0x8c/0xbc) [ 868.389324][ C1] Exception stack(0xdf865e08 to 0xdf865e50) [ 868.389594][ C1] 5e00: e01b9008 0000000c 00009620 00000000 e01b9008 0000000c [ 868.389956][ C1] 5e20: 00000001 8414f168 842eca88 8414f040 00000000 df865e6c df865e58 df865e58 [ 868.390298][ C1] 5e40: 809c8228 809c822c 60000013 ffffffff [ 868.390547][ C1] [<809c820c>] (gpio_mmio_write32) from [<809c7a4c>] (gpio_mmio_set+0x64/0x80) [ 868.390946][ C1] r5:00000008 r4:8414f040 [ 868.391151][ C1] [<809c79e8>] (gpio_mmio_set) from [<809b81e8>] (gpiochip_set+0x1c/0x44) [ 868.391557][ C1] r7:00000001 r6:00000000 r5:00000003 r4:8411fe7c [ 868.391814][ C1] [<809b81cc>] (gpiochip_set) from [<809baab0>] (gpiod_set_raw_value_commit+0x78/0x218) [ 868.392220][ C1] [<809baa38>] (gpiod_set_raw_value_commit) from [<809bc350>] (gpiod_set_value_nocheck+0x44/0x58) [ 868.392652][ C1] r10:00000000 r9:00000000 r8:00000001 r7:ddde24c0 r6:83836758 r5:00000001 [ 868.393000][ C1] r4:8411fe7c [ 868.393164][ C1] [<809bc30c>] (gpiod_set_value_nocheck) from [<809bc3a0>] (gpiod_set_value+0x3c/0x88) [ 868.393548][ C1] [<809bc364>] (gpiod_set_value) from [<809ccb3c>] (gpio_led_set+0x5c/0x60) [ 868.393928][ C1] r5:000000ff r4:832f7b14 [ 868.394139][ C1] [<809ccae0>] (gpio_led_set) from [<809ca464>] (led_set_brightness+0x84/0x90) [ 868.394541][ C1] r5:000000ff r4:832f7b14 [ 868.394749][ C1] [<809ca3e0>] (led_set_brightness) from [<809cbfe4>] (led_trigger_event+0x40/0x58) [ 868.395153][ C1] r5:000000ff r4:832f7b14 [ 868.395357][ C1] [<809cbfa4>] (led_trigger_event) from [<809cd640>] (ledtrig_cpu+0xac/0xf4) [ 868.395769][ C1] r7:ddde24c0 r6:00000002 r5:82b15cd8 r4:000001fd [ 868.396018][ C1] [<809cd594>] (ledtrig_cpu) from [<80227a38>] (arch_cpu_idle_exit+0x14/0x18) [ 868.396430][ C1] r9:00000000 r8:00000001 r7:8280c710 r6:83216000 r5:8280c6d0 r4:00000001 [ 868.396750][ C1] [<80227a24>] (arch_cpu_idle_exit) from [<802b168c>] (do_idle+0x5c/0x2d8) [ 868.397146][ C1] [<802b1630>] (do_idle) from [<802b1c38>] (cpu_startup_entry+0x30/0x34) [ 868.397541][ C1] r10:00000000 r9:414fc0f0 r8:80003000 r7:82a7b4a4 r6:83216000 r5:00000001 [ 868.397863][ C1] r4:00000092 [ 868.398050][ C1] [<802b1c08>] (cpu_startup_entry) from [<8022f360>] (secondary_start_kernel+0x128/0x194) [ 868.398471][ C1] [<8022f238>] (secondary_start_kernel) from [<80220094>] (__enable_mmu+0x0/0xc) [ 868.398875][ C1] r7:82a7b4a4 r6:30c0387d r5:00000000 r4:830b7bc0 [ 869.997448][ C1] SMP: failed to stop secondary CPUs [ 869.999469][ C1] Rebooting in 86400 seconds..