last executing test programs: 5.611126537s ago: executing program 1 (id=1104): r0 = openat$vcs(0xffffff9c, &(0x7f0000002a40), 0x2, 0x0) close_range(r0, 0xffffffffffffffff, 0x2) r1 = syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x28, r1, 0x300, 0x70bd26, 0x25dfdbfb, {{}, {@val={0x8}, @val={0xc, 0x99, {0x1b, 0x68}}}}}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x8000) 5.498123252s ago: executing program 1 (id=1107): r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000100), 0x80, 0x0) close(r0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)={0x14, 0x0, 0x300, 0x70bd26, 0x25dfdbfc}, 0x14}, 0x1, 0x0, 0x0, 0x84}, 0x4008080) 5.383010086s ago: executing program 1 (id=1109): r0 = syz_open_dev$mouse(&(0x7f0000000080), 0x0, 0x1) close$binfmt(r0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(&(0x7f00000001c0), r0) 5.211697508s ago: executing program 1 (id=1112): r0 = openat$selinux_avc_cache_threshold(0xffffff9c, &(0x7f0000000040), 0x2, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) write$UHID_CREATE(r0, 0x0, 0x0) 2.580684842s ago: executing program 1 (id=1118): signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x2b, 0x1, 0x1) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) setsockopt$CAN_RAW_FILTER(r0, 0x65, 0x1, &(0x7f0000000000)=[{{0x2, 0x0, 0x1, 0x1}, {0x4, 0x0, 0x1, 0x1}}], 0x8) 1.512697968s ago: executing program 0 (id=1127): r0 = landlock_create_ruleset(&(0x7f00000000c0)={0xc4d8, 0x2, 0x1}, 0xf, 0x0) landlock_restrict_self(r0, 0x0) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000001800), 0x0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r1, 0x54a3) 1.422823699s ago: executing program 0 (id=1128): r0 = socket$xdp(0x2c, 0x3, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$SNDRV_PCM_IOCTL_HW_FREE(r2, 0x4112, 0x0) 1.309289974s ago: executing program 0 (id=1129): r0 = openat$dlm_monitor(0xffffff9c, &(0x7f00000000c0), 0x200241, 0x0) close(r0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'veth1_macvtap\x00'}) 1.240050782s ago: executing program 0 (id=1130): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='cpuacct.stat\x00', 0x26e1, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)) ioctl$VT_GETSTATE(r0, 0x541b, &(0x7f0000000100)) 1.132661316s ago: executing program 0 (id=1131): r0 = openat$selinux_avc_hash_stats(0xffffff9c, &(0x7f0000000240), 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) openat$cgroup_pressure(r0, &(0x7f0000000000)='cpu.pressure\x00', 0x2, 0x0) 13.911018ms ago: executing program 1 (id=1132): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) sendto$l2tp6(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000000)={0xa, 0x0, 0x40400000, @remote, 0x3}, 0x20) sendmsg$AUDIT_GET_FEATURE(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={0x0}, 0x1, 0x0, 0x0, 0x24008001}, 0xc040) 0s ago: executing program 0 (id=1133): r0 = socket$xdp(0x2c, 0x3, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$SNDRV_PCM_IOCTL_HW_FREE(r2, 0x4112, 0x0) kernel console output (not intermixed with test programs): [ 49.075506][ T29] audit: type=1400 audit(49.000:56): avc: denied { read write } for pid=3090 comm="sftp-server" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 49.080029][ T29] audit: type=1400 audit(49.010:57): avc: denied { open } for pid=3090 comm="sftp-server" path="/dev/null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 Warning: Permanently added '[localhost]:57172' (ED25519) to the list of known hosts. [ 63.396615][ T29] audit: type=1400 audit(63.310:58): avc: denied { name_bind } for pid=3093 comm="sshd-session" src=30000 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 65.324997][ T29] audit: type=1400 audit(65.250:59): avc: denied { execute } for pid=3094 comm="sh" name="syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 65.336290][ T29] audit: type=1400 audit(65.260:60): avc: denied { execute_no_trans } for pid=3094 comm="sh" path="/syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 69.382251][ T29] audit: type=1400 audit(69.310:61): avc: denied { mounton } for pid=3094 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=806 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 69.388629][ T29] audit: type=1400 audit(69.320:62): avc: denied { mount } for pid=3094 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 69.408133][ T3094] cgroup: Unknown subsys name 'net' [ 69.417337][ T29] audit: type=1400 audit(69.350:63): avc: denied { unmount } for pid=3094 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 69.605804][ T3094] cgroup: Unknown subsys name 'cpuset' [ 69.611159][ T3094] cgroup: Unknown subsys name 'hugetlb' [ 69.614184][ T3094] cgroup: Unknown subsys name 'rlimit' [ 69.821348][ T29] audit: type=1400 audit(69.750:64): avc: denied { setattr } for pid=3094 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 69.823148][ T29] audit: type=1400 audit(69.750:65): avc: denied { mounton } for pid=3094 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 69.825143][ T29] audit: type=1400 audit(69.750:66): avc: denied { mount } for pid=3094 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 70.032592][ T3096] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 70.036979][ T29] audit: type=1400 audit(69.970:67): avc: denied { relabelto } for pid=3096 comm="mkswap" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 70.041741][ T29] audit: type=1400 audit(69.970:68): avc: denied { write } for pid=3096 comm="mkswap" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 70.084646][ T29] audit: type=1400 audit(70.010:69): avc: denied { read } for pid=3094 comm="syz-executor" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 70.088022][ T29] audit: type=1400 audit(70.010:70): avc: denied { open } for pid=3094 comm="syz-executor" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 79.068029][ T3094] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 81.258492][ T29] audit: type=1400 audit(81.190:71): avc: denied { execmem } for pid=3097 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 81.294021][ T29] audit: type=1400 audit(81.220:72): avc: denied { read } for pid=3099 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 81.300908][ T29] audit: type=1400 audit(81.230:73): avc: denied { open } for pid=3099 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 81.311918][ T29] audit: type=1400 audit(81.240:74): avc: denied { mounton } for pid=3099 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 81.342038][ T29] audit: type=1400 audit(81.270:75): avc: denied { module_request } for pid=3100 comm="syz-executor" kmod="netdev-nr1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 81.344052][ T29] audit: type=1400 audit(81.270:76): avc: denied { module_request } for pid=3099 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 81.393818][ T29] audit: type=1400 audit(81.320:77): avc: denied { sys_module } for pid=3100 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 81.801520][ T29] audit: type=1400 audit(81.730:78): avc: denied { ioctl } for pid=3100 comm="syz-executor" path="/dev/net/tun" dev="devtmpfs" ino=677 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 82.884728][ T3099] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 82.907382][ T3099] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 82.932058][ T3100] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 82.954395][ T3100] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 83.778485][ T3100] hsr_slave_0: entered promiscuous mode [ 83.781432][ T3100] hsr_slave_1: entered promiscuous mode [ 83.870315][ T3099] hsr_slave_0: entered promiscuous mode [ 83.873973][ T3099] hsr_slave_1: entered promiscuous mode [ 83.881371][ T3099] debugfs: 'hsr0' already exists in 'hsr' [ 83.883243][ T3099] Cannot create hsr debugfs directory [ 84.342079][ T29] audit: type=1400 audit(84.270:79): avc: denied { create } for pid=3100 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 84.344186][ T29] audit: type=1400 audit(84.270:80): avc: denied { write } for pid=3100 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 84.358087][ T3100] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 84.371907][ T3100] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 84.401580][ T3100] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 84.423812][ T3100] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 84.523765][ T3099] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 84.537977][ T3099] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 84.554473][ T3099] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 84.575723][ T3099] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 85.328684][ T3100] 8021q: adding VLAN 0 to HW filter on device bond0 [ 85.401854][ T3099] 8021q: adding VLAN 0 to HW filter on device bond0 [ 88.341226][ T3099] veth0_vlan: entered promiscuous mode [ 88.380460][ T3099] veth1_vlan: entered promiscuous mode [ 88.391861][ T3100] veth0_vlan: entered promiscuous mode [ 88.430652][ T3100] veth1_vlan: entered promiscuous mode [ 88.483305][ T3099] veth0_macvtap: entered promiscuous mode [ 88.501507][ T3099] veth1_macvtap: entered promiscuous mode [ 88.582007][ T3100] veth0_macvtap: entered promiscuous mode [ 88.605419][ T3100] veth1_macvtap: entered promiscuous mode [ 88.635058][ T1290] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 88.637586][ T1290] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 88.637895][ T1290] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 88.638104][ T1290] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 88.792038][ T29] kauditd_printk_skb: 1 callbacks suppressed [ 88.794382][ T29] audit: type=1400 audit(88.720:82): avc: denied { mount } for pid=3099 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 88.809024][ T110] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 88.809436][ T110] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 88.809529][ T110] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 88.809589][ T110] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 88.816915][ T29] audit: type=1400 audit(88.740:83): avc: denied { mounton } for pid=3099 comm="syz-executor" path="/syzkaller.sDH6yP/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 88.824755][ T29] audit: type=1400 audit(88.750:84): avc: denied { mount } for pid=3099 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 88.839472][ T29] audit: type=1400 audit(88.770:85): avc: denied { mounton } for pid=3099 comm="syz-executor" path="/syzkaller.sDH6yP/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 88.844921][ T29] audit: type=1400 audit(88.770:86): avc: denied { mounton } for pid=3099 comm="syz-executor" path="/syzkaller.sDH6yP/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=3082 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 88.868121][ T29] audit: type=1400 audit(88.800:87): avc: denied { unmount } for pid=3099 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 88.881461][ T29] audit: type=1400 audit(88.810:88): avc: denied { mounton } for pid=3099 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=772 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 88.886363][ T29] audit: type=1400 audit(88.810:89): avc: denied { mount } for pid=3099 comm="syz-executor" name="/" dev="gadgetfs" ino=3083 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 88.898135][ T29] audit: type=1400 audit(88.830:90): avc: denied { mount } for pid=3099 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 88.903000][ T29] audit: type=1400 audit(88.830:91): avc: denied { mounton } for pid=3099 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 89.004172][ T3099] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 90.940517][ T3748] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 94.110659][ T3853] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=311 sclass=netlink_audit_socket pid=3853 comm=syz.0.71 [ 95.557720][ T3885] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3885 comm=syz.0.86 [ 97.221480][ T29] kauditd_printk_skb: 31 callbacks suppressed [ 97.222452][ T29] audit: type=1400 audit(97.150:123): avc: denied { write } for pid=3908 comm="syz.1.97" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 99.451357][ T29] audit: type=1400 audit(99.380:124): avc: denied { create } for pid=3969 comm="syz.0.127" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 99.454965][ T29] audit: type=1400 audit(99.380:125): avc: denied { write } for pid=3969 comm="syz.0.127" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 99.458862][ T29] audit: type=1400 audit(99.390:126): avc: denied { read } for pid=3969 comm="syz.0.127" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 100.399166][ T29] audit: type=1400 audit(100.330:127): avc: denied { create } for pid=3992 comm="syz.1.138" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 100.416824][ T29] audit: type=1400 audit(100.340:128): avc: denied { write } for pid=3992 comm="syz.1.138" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 100.622223][ T29] audit: type=1400 audit(100.550:129): avc: denied { setopt } for pid=3998 comm="syz.1.141" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 106.346680][ T29] audit: type=1400 audit(106.260:130): avc: denied { ioctl } for pid=4091 comm="syz.0.185" path="socket:[3041]" dev="sockfs" ino=3041 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 106.432861][ T29] audit: type=1400 audit(106.360:131): avc: denied { append } for pid=4095 comm="syz.0.187" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 106.571985][ T29] audit: type=1400 audit(106.500:132): avc: denied { map } for pid=4103 comm="syz.0.191" path="socket:[3066]" dev="sockfs" ino=3066 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tcp_socket permissive=1 [ 106.644166][ T29] audit: type=1400 audit(106.570:133): avc: denied { setopt } for pid=4106 comm="syz.0.193" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 106.730271][ T4111] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4111 comm=syz.0.195 [ 106.811890][ T4114] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4114 comm=syz.0.196 [ 106.853177][ T29] audit: type=1400 audit(106.780:134): avc: denied { create } for pid=4115 comm="syz.1.197" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 106.859821][ T29] audit: type=1400 audit(106.790:135): avc: denied { connect } for pid=4115 comm="syz.1.197" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 109.879339][ T29] audit: type=1400 audit(109.810:136): avc: denied { create } for pid=4134 comm="syz.0.206" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 109.886039][ T29] audit: type=1400 audit(109.810:137): avc: denied { write } for pid=4134 comm="syz.0.206" path="socket:[4141]" dev="sockfs" ino=4141 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 111.917450][ T29] audit: type=1400 audit(111.840:138): avc: denied { append } for pid=4187 comm="syz.1.232" name="pfkey" dev="proc" ino=4026532721 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 112.214133][ T29] audit: type=1400 audit(112.140:139): avc: denied { remount } for pid=4193 comm="syz.1.235" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 112.214745][ T4194] ======================================================= [ 112.214745][ T4194] WARNING: The mand mount option has been deprecated and [ 112.214745][ T4194] and is ignored by this kernel. Remove the mand [ 112.214745][ T4194] option from the mount to silence this warning. [ 112.214745][ T4194] ======================================================= [ 112.235606][ T29] audit: type=1400 audit(112.160:140): avc: denied { unmount } for pid=3100 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 116.406438][ T29] audit: type=1400 audit(116.330:141): avc: denied { getopt } for pid=4261 comm="syz.1.268" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 116.533287][ T4266] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=5131 sclass=netlink_audit_socket pid=4266 comm=syz.1.270 [ 117.152758][ T4291] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4291 comm=syz.0.282 [ 117.378827][ T4299] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4299 comm=syz.0.286 [ 117.442821][ T29] audit: type=1400 audit(117.370:142): avc: denied { create } for pid=4300 comm="syz.1.287" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 117.456930][ T29] audit: type=1400 audit(117.380:143): avc: denied { read write } for pid=4300 comm="syz.1.287" path="socket:[4436]" dev="sockfs" ino=4436 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 119.664124][ T4334] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4334 comm=syz.0.303 [ 120.238927][ T4350] Zero length message leads to an empty skb [ 120.407609][ T4357] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4357 comm=syz.1.315 [ 120.519643][ T4362] syz.0.317 uses obsolete (PF_INET,SOCK_PACKET) [ 121.628185][ T4406] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4406 comm=syz.1.338 [ 122.541684][ T29] audit: type=1400 audit(122.470:144): avc: denied { write } for pid=4434 comm="syz.1.353" lport=1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 122.957606][ T4450] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4450 comm=syz.1.360 [ 124.078745][ T4462] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4462 comm=syz.0.366 [ 128.139884][ T29] audit: type=1400 audit(128.070:145): avc: denied { create } for pid=4537 comm="syz.1.403" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 128.147274][ T29] audit: type=1400 audit(128.080:146): avc: denied { block_suspend } for pid=4537 comm="syz.1.403" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 128.432879][ T4555] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=4555 comm=syz.0.409 [ 128.509470][ T4558] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=4558 comm=syz.1.410 [ 128.627806][ T4562] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4562 comm=syz.1.412 [ 128.919916][ T4575] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65498 sclass=netlink_route_socket pid=4575 comm=syz.0.419 [ 129.189667][ T4583] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=770 sclass=netlink_route_socket pid=4583 comm=syz.0.423 [ 129.710686][ T29] audit: type=1400 audit(129.640:147): avc: denied { create } for pid=4594 comm="syz.0.429" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 129.724070][ T29] audit: type=1400 audit(129.650:148): avc: denied { ioctl } for pid=4594 comm="syz.0.429" path="socket:[4917]" dev="sockfs" ino=4917 ioctlcmd=0x45a0 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 131.397211][ T4639] capability: warning: `syz.1.451' uses 32-bit capabilities (legacy support in use) [ 131.653245][ T29] audit: type=1400 audit(131.580:149): avc: denied { associate } for pid=4644 comm="syz.0.454" name="pfkey" scontext=root:object_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 134.920588][ T48] block nbd1: Receive control failed (result -32) [ 134.922744][ T4673] block nbd1: shutting down sockets [ 135.140898][ T4698] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4698 comm=syz.0.479 [ 135.315098][ T29] audit: type=1400 audit(135.240:150): avc: denied { audit_write } for pid=4704 comm="syz.1.482" capability=29 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 135.534906][ T4717] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5135 sclass=netlink_route_socket pid=4717 comm=syz.0.488 [ 135.589098][ T4720] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4720 comm=syz.1.491 [ 135.678899][ T4725] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4725 comm=syz.0.493 [ 136.196815][ T29] audit: type=1400 audit(136.120:151): avc: denied { prog_load } for pid=4748 comm="syz.1.505" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 136.197183][ T29] audit: type=1400 audit(136.120:152): avc: denied { bpf } for pid=4748 comm="syz.1.505" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 136.197254][ T29] audit: type=1400 audit(136.120:153): avc: denied { perfmon } for pid=4748 comm="syz.1.505" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 136.212465][ T29] audit: type=1400 audit(136.140:154): avc: denied { prog_run } for pid=4748 comm="syz.1.505" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 139.440607][ T29] audit: type=1400 audit(139.370:155): avc: denied { create } for pid=4791 comm="syz.0.526" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 139.450812][ T29] audit: type=1400 audit(139.380:156): avc: denied { mounton } for pid=4791 comm="syz.0.526" path="/267/file0" dev="tmpfs" ino=1381 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 142.059073][ T29] audit: type=1400 audit(141.990:157): avc: denied { unmount } for pid=3099 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 142.080591][ T29] audit: type=1400 audit(142.010:158): avc: denied { unlink } for pid=3099 comm="syz-executor" name="file0" dev="tmpfs" ino=1381 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 143.189937][ T4815] capability: warning: `syz.1.536' uses deprecated v2 capabilities in a way that may be insecure [ 145.618437][ T4842] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4842 comm=syz.1.549 [ 146.376830][ T29] audit: type=1400 audit(146.290:159): avc: denied { ioctl } for pid=4853 comm="syz.1.555" path="socket:[6404]" dev="sockfs" ino=6404 ioctlcmd=0x8902 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 146.791356][ T4860] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=22 sclass=netlink_audit_socket pid=4860 comm=syz.1.557 [ 148.147738][ T29] audit: type=1400 audit(148.080:160): avc: denied { create } for pid=4875 comm="syz.0.565" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 148.171071][ T29] audit: type=1400 audit(148.100:161): avc: denied { ioctl } for pid=4875 comm="syz.0.565" path="socket:[6452]" dev="sockfs" ino=6452 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 150.324566][ T4935] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4935 comm=syz.1.594 [ 150.924140][ T29] audit: type=1400 audit(150.850:162): avc: denied { map } for pid=4955 comm="syz.1.605" path="/dev/audio" dev="devtmpfs" ino=726 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 151.810987][ T29] audit: type=1400 audit(151.740:163): avc: denied { watch watch_reads } for pid=4973 comm="syz.1.615" path="/311" dev="tmpfs" ino=1601 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 152.035813][ T4983] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=4983 comm=syz.1.619 [ 152.682310][ T29] audit: type=1400 audit(152.610:164): avc: denied { ioctl } for pid=5003 comm="syz.0.629" path="/dev/binderfs/binder1" dev="binder" ino=5 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 154.407632][ T5047] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5047 comm=syz.1.650 [ 155.098969][ T29] audit: type=1400 audit(155.020:165): avc: denied { checkpoint_restore } for pid=5062 comm="syz.1.658" capability=40 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 155.952167][ T5076] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=31 sclass=netlink_audit_socket pid=5076 comm=syz.0.664 [ 157.233484][ T29] audit: type=1400 audit(157.160:166): avc: denied { remount } for pid=5113 comm="syz.0.681" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 157.428827][ T29] audit: type=1400 audit(157.360:167): avc: denied { bind } for pid=5119 comm="syz.0.683" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 157.435558][ T29] audit: type=1400 audit(157.360:168): avc: denied { node_bind } for pid=5119 comm="syz.0.683" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 [ 157.444273][ T29] audit: type=1400 audit(157.370:169): avc: denied { read } for pid=5119 comm="syz.0.683" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 158.062817][ T5123] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=5131 sclass=netlink_audit_socket pid=5123 comm=syz.0.684 [ 159.071973][ T29] audit: type=1400 audit(159.000:170): avc: denied { execute } for pid=5131 comm="syz.1.688" path="/349/cgroup.stat" dev="tmpfs" ino=1799 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 159.094438][ T29] audit: type=1400 audit(159.020:171): avc: denied { setopt } for pid=5131 comm="syz.1.688" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 161.599581][ T29] audit: type=1400 audit(161.530:172): avc: denied { bind } for pid=5157 comm="syz.0.700" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 161.714166][ T5162] netdevsim netdevsim0 netdevsim0: entered promiscuous mode [ 163.657473][ T29] audit: type=1400 audit(163.580:173): avc: denied { ioctl } for pid=5219 comm="syz.1.731" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=7908 ioctlcmd=0xaa3f scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 163.868727][ T5224] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=5224 comm=syz.1.733 [ 164.883606][ T5265] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5265 comm=syz.0.753 [ 165.971234][ T29] audit: type=1400 audit(165.900:174): avc: denied { create } for pid=5294 comm="syz.0.768" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 165.976927][ T29] audit: type=1400 audit(165.900:175): avc: denied { write } for pid=5294 comm="syz.0.768" path="socket:[8039]" dev="sockfs" ino=8039 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 166.472435][ T29] audit: type=1400 audit(166.400:176): avc: denied { write } for pid=5304 comm="syz.0.773" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 167.473672][ T5325] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=1550 sclass=netlink_audit_socket pid=5325 comm=syz.0.783 [ 167.791536][ T5333] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5333 comm=syz.1.786 [ 169.460478][ T29] audit: type=1400 audit(169.390:177): avc: denied { connect } for pid=5362 comm="syz.1.802" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 169.917033][ T5383] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5383 comm=syz.0.811 [ 176.175525][ T5479] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5479 comm=syz.1.858 [ 188.161466][ T29] audit: type=1400 audit(188.090:178): avc: denied { map_create } for pid=5557 comm="syz.1.893" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 188.168456][ T29] audit: type=1400 audit(188.100:179): avc: denied { map_read map_write } for pid=5557 comm="syz.1.893" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 188.929286][ T5570] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5570 comm=syz.1.899 [ 190.795598][ T5594] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5594 comm=syz.0.910 [ 207.590210][ T5732] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2050 sclass=netlink_route_socket pid=5732 comm=syz.0.978 [ 212.032903][ T5771] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1538 sclass=netlink_route_socket pid=5771 comm=syz.0.998 [ 212.992918][ T5806] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1538 sclass=netlink_route_socket pid=5806 comm=syz.1.1014 [ 213.440660][ T5821] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1538 sclass=netlink_route_socket pid=5821 comm=syz.0.1022 [ 215.337549][ T5890] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2050 sclass=netlink_route_socket pid=5890 comm=syz.1.1054 [ 221.383185][ T5948] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5948 comm=syz.0.1083 [ 222.224463][ T5976] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5976 comm=syz.0.1098 [ 225.670165][ T29] audit: type=1400 audit(225.600:180): avc: denied { connect } for pid=6009 comm="syz.1.1118" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 226.178631][ T29] audit: type=1400 audit(226.110:181): avc: denied { setopt } for pid=6009 comm="syz.1.1118" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 660.206210][ C0] watchdog: BUG: soft lockup - CPU#0 stuck for 430s! [swapper/0:0] [ 660.206411][ C0] Modules linked in: [ 660.206969][ C0] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Not tainted syzkaller #0 PREEMPT [ 660.207120][ C0] Hardware name: ARM-Versatile Express [ 660.207266][ C0] PC is at _raw_spin_lock+0x40/0x58 [ 660.208078][ C0] LR is at _raw_spin_lock+0x18/0x58 [ 660.208107][ C0] pc : [<81abbff4>] lr : [<81abbfcc>] psr: 80000013 [ 660.208130][ C0] sp : 82801e28 ip : 82801e28 fp : 82801e3c [ 660.208148][ C0] r10: 00000000 r9 : 83ff7440 r8 : 83eff288 [ 660.208173][ C0] r7 : 83ff7568 r6 : 00000001 r5 : 00000004 r4 : 83ff7568 [ 660.208196][ C0] r3 : 0000ec7d r2 : 0000ec7f r1 : 00000000 r0 : 00000001 [ 660.208268][ C0] Flags: Nzcv IRQs on FIQs on Mode SVC_32 ISA ARM Segment user [ 660.208315][ C0] Control: 30c5387d Table: 855798c0 DAC: fffffffd [ 660.208378][ C0] Call trace: [ 660.208533][ C0] [<81abbfb4>] (_raw_spin_lock) from [<809c7b2c>] (gpio_mmio_set+0x44/0x80) [ 660.208824][ C0] r5:00000004 r4:83ff7440 [ 660.208884][ C0] [<809c7ae8>] (gpio_mmio_set) from [<809b82e8>] (gpiochip_set+0x1c/0x44) [ 660.208924][ C0] r7:00000001 r6:00000000 r5:00000002 r4:84035e68 [ 660.208935][ C0] [<809b82cc>] (gpiochip_set) from [<809babb0>] (gpiod_set_raw_value_commit+0x78/0x218) [ 660.208967][ C0] [<809bab38>] (gpiod_set_raw_value_commit) from [<809bc450>] (gpiod_set_value_nocheck+0x44/0x58) [ 660.209012][ C0] r10:00000000 r9:00000000 r8:00000001 r7:dddce4c0 r6:83854dd8 r5:00000001 [ 660.209029][ C0] r4:84035e68 [ 660.209038][ C0] [<809bc40c>] (gpiod_set_value_nocheck) from [<809bc4a0>] (gpiod_set_value+0x3c/0x88) [ 660.209063][ C0] [<809bc464>] (gpiod_set_value) from [<809ccc3c>] (gpio_led_set+0x5c/0x60) [ 660.209091][ C0] r5:000000ff r4:8333fa24 [ 660.209099][ C0] [<809ccbe0>] (gpio_led_set) from [<809ca564>] (led_set_brightness+0x84/0x90) [ 660.209124][ C0] r5:000000ff r4:8333fa24 [ 660.209132][ C0] [<809ca4e0>] (led_set_brightness) from [<809cc0e4>] (led_trigger_event+0x40/0x58) [ 660.209157][ C0] r5:000000ff r4:8333fa24 [ 660.209165][ C0] [<809cc0a4>] (led_trigger_event) from [<809cd740>] (ledtrig_cpu+0xac/0xf4) [ 660.209194][ C0] r7:dddce4c0 r6:00000002 r5:82b15cd8 r4:000001fd [ 660.209203][ C0] [<809cd694>] (ledtrig_cpu) from [<80227a38>] (arch_cpu_idle_exit+0x14/0x18) [ 660.209237][ C0] r9:00000000 r8:00000000 r7:8280c710 r6:8281b500 r5:8280c6d0 r4:00000000 [ 660.209247][ C0] [<80227a24>] (arch_cpu_idle_exit) from [<802b168c>] (do_idle+0x5c/0x2d8) [ 660.209276][ C0] [<802b1630>] (do_idle) from [<802b1c38>] (cpu_startup_entry+0x30/0x34) [ 660.209310][ C0] r10:8281aff4 r9:8280c680 r8:823bec64 r7:00000000 r6:deffc06c r5:828222e8 [ 660.209320][ C0] r4:000000ed [ 660.209328][ C0] [<802b1c08>] (cpu_startup_entry) from [<81aaf47c>] (kernel_init+0x0/0x138) [ 660.209361][ C0] [<81aaf39c>] (rest_init) from [<8260145c>] (start_kernel+0x844/0x860) [ 660.209415][ C0] [<82600c18>] (start_kernel) from [<00000000>] (0x0) [ 660.209892][ C0] Sending NMI from CPU 0 to CPUs 1: [ 660.210659][ C1] NMI backtrace for cpu 1 [ 660.210849][ C1] CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Not tainted syzkaller #0 PREEMPT [ 660.210928][ C1] Hardware name: ARM-Versatile Express [ 660.210966][ C1] PC is at _raw_spin_lock+0x4c/0x58 [ 660.211050][ C1] LR is at _raw_spin_lock+0x18/0x58 [ 660.211086][ C1] pc : [<81abc000>] lr : [<81abbfcc>] psr: 80000113 [ 660.211112][ C1] sp : df805d68 ip : df805d68 fp : df805d7c [ 660.211136][ C1] r10: 81c05450 r9 : 83ff7440 r8 : 83eff288 [ 660.211159][ C1] r7 : 83ff7568 r6 : 00000000 r5 : 00000001 r4 : 83ff7568 [ 660.211187][ C1] r3 : 0000ec7d r2 : 0000ec7e r1 : 00000000 r0 : 00000001 [ 660.211215][ C1] Flags: Nzcv IRQs on FIQs on Mode SVC_32 ISA ARM Segment none [ 660.211271][ C1] Control: 30c5387d Table: 85772bc0 DAC: 00000000 [ 660.211296][ C1] Call trace: frame pointer underflow [ 660.211406][ C1] [<81abbfb4>] (_raw_spin_lock) from [<809c7b2c>] (gpio_mmio_set+0x44/0x80) [ 660.211496][ C1] r5:00000001 r4:83ff7440 [ 660.211521][ C1] [<809c7ae8>] (gpio_mmio_set) from [<809b82e8>] (gpiochip_set+0x1c/0x44) [ 660.211596][ C1] r7:00000000 r6:00000000 r5:00000000 r4:84035e40 [ 660.211618][ C1] [<809b82cc>] (gpiochip_set) from [<809babb0>] (gpiod_set_raw_value_commit+0x78/0x218) [ 660.211676][ C1] [<809bab38>] (gpiod_set_raw_value_commit) from [<809bc450>] (gpiod_set_value_nocheck+0x44/0x58) [ 660.211749][ C1] r10:81c05450 r9:df805ebc r8:00000102 r7:ffffe4ec r6:0000000a r5:00000000 [ 660.211785][ C1] r4:84035e40 [ 660.211803][ C1] [<809bc40c>] (gpiod_set_value_nocheck) from [<809bc4a0>] (gpiod_set_value+0x3c/0x88) [ 660.211854][ C1] [<809bc464>] (gpiod_set_value) from [<809ccc3c>] (gpio_led_set+0x5c/0x60) [ 660.211914][ C1] r5:8333f844 r4:8333f844 [ 660.211936][ C1] [<809ccbe0>] (gpio_led_set) from [<809ca4d4>] (led_set_brightness_nosleep+0x38/0x44) [ 660.212004][ C1] r5:8333f844 r4:85201d4c [ 660.212028][ C1] [<809ca49c>] (led_set_brightness_nosleep) from [<809cd538>] (led_heartbeat_function+0x84/0x144) [ 660.212087][ C1] [<809cd4b4>] (led_heartbeat_function) from [<80327070>] (call_timer_fn+0x30/0x220) [ 660.212174][ C1] r7:ffffe4ec r6:809cd4b4 r5:85201d4c r4:83216000 [ 660.212197][ C1] [<80327040>] (call_timer_fn) from [<80327524>] (__run_timers+0x2c4/0x3f8) [ 660.212271][ C1] r9:df805ebc r8:ffffe4ec r7:00000000 r6:809cd4b4 r5:dddd9f00 r4:85201d4c [ 660.212296][ C1] [<80327260>] (__run_timers) from [<803276c0>] (run_timer_base+0x68/0x78) [ 660.212370][ C1] r10:83216000 r9:82804d80 r8:00000102 r7:00000001 r6:00000082 r5:00000002 [ 660.212397][ C1] r4:dddd9f00 [ 660.212415][ C1] [<80327658>] (run_timer_base) from [<803276ec>] (run_timer_softirq+0x1c/0x34) [ 660.212477][ C1] r4:82804084 [ 660.212498][ C1] [<803276d0>] (run_timer_softirq) from [<8025b65c>] (handle_softirqs+0x140/0x458) [ 660.212597][ C1] [<8025b51c>] (handle_softirqs) from [<8025bad0>] (__irq_exit_rcu+0x110/0x1d0) [ 660.212673][ C1] r10:00000000 r9:83216000 r8:00000000 r7:df865e20 r6:82443f98 r5:8247f0cc [ 660.212700][ C1] r4:83216000 [ 660.212720][ C1] [<8025b9c0>] (__irq_exit_rcu) from [<8025be48>] (irq_exit+0x10/0x18) [ 660.212783][ C1] r5:8247f0cc r4:826c3a9c [ 660.212815][ C1] [<8025be38>] (irq_exit) from [<81aada64>] (generic_handle_arch_irq+0x7c/0x80) [ 660.212882][ C1] [<81aad9e8>] (generic_handle_arch_irq) from [<81a7da0c>] (call_with_stack+0x1c/0x20) [ 660.212975][ C1] r9:83216000 r8:83eff288 r7:df865e54 r6:ffffffff r5:20000013 r4:809c830c [ 660.212998][ C1] [<81a7d9f0>] (call_with_stack) from [<80200bec>] (__irq_svc+0x8c/0xbc) [ 660.213155][ C1] Exception stack(0xdf865e20 to 0xdf865e68) [ 660.213441][ C1] 5e20: e00e2008 00000009 0000ec7d 809c830c 83ff7440 00000008 00000001 83ff7568 [ 660.213516][ C1] 5e40: 83eff288 83ff7440 00000000 df865e8c df865e58 df865e70 809c7b4c 809c830c [ 660.213546][ C1] 5e60: 20000013 ffffffff [ 660.213609][ C1] [<809c7ae8>] (gpio_mmio_set) from [<809b82e8>] (gpiochip_set+0x1c/0x44) [ 660.213691][ C1] r7:00000001 r6:00000000 r5:00000003 r4:84035e7c [ 660.213713][ C1] [<809b82cc>] (gpiochip_set) from [<809babb0>] (gpiod_set_raw_value_commit+0x78/0x218) [ 660.213774][ C1] [<809bab38>] (gpiod_set_raw_value_commit) from [<809bc450>] (gpiod_set_value_nocheck+0x44/0x58) [ 660.213843][ C1] r10:00000000 r9:00000000 r8:00000001 r7:ddde24c0 r6:83854c98 r5:00000001 [ 660.213866][ C1] r4:84035e7c [ 660.213883][ C1] [<809bc40c>] (gpiod_set_value_nocheck) from [<809bc4a0>] (gpiod_set_value+0x3c/0x88) [ 660.213933][ C1] [<809bc464>] (gpiod_set_value) from [<809ccc3c>] (gpio_led_set+0x5c/0x60) [ 660.214004][ C1] r5:000000ff r4:8333fb14 [ 660.214034][ C1] [<809ccbe0>] (gpio_led_set) from [<809ca564>] (led_set_brightness+0x84/0x90) [ 660.214104][ C1] r5:000000ff r4:8333fb14 [ 660.214124][ C1] [<809ca4e0>] (led_set_brightness) from [<809cc0e4>] (led_trigger_event+0x40/0x58) [ 660.214184][ C1] r5:000000ff r4:8333fb14 [ 660.214203][ C1] [<809cc0a4>] (led_trigger_event) from [<809cd740>] (ledtrig_cpu+0xac/0xf4) [ 660.214270][ C1] r7:ddde24c0 r6:00000002 r5:82b15cd8 r4:000000fe [ 660.214290][ C1] [<809cd694>] (ledtrig_cpu) from [<80227a38>] (arch_cpu_idle_exit+0x14/0x18) [ 660.214365][ C1] r9:00000000 r8:00000001 r7:8280c710 r6:83216000 r5:8280c6d0 r4:00000001 [ 660.214402][ C1] [<80227a24>] (arch_cpu_idle_exit) from [<802b168c>] (do_idle+0x5c/0x2d8) [ 660.214477][ C1] [<802b1630>] (do_idle) from [<802b1c38>] (cpu_startup_entry+0x30/0x34) [ 660.214553][ C1] r10:00000000 r9:414fc0f0 r8:80003000 r7:82a7b4a4 r6:83216000 r5:00000001 [ 660.214580][ C1] r4:00000092 [ 660.214599][ C1] [<802b1c08>] (cpu_startup_entry) from [<8022f360>] (secondary_start_kernel+0x128/0x194) [ 660.214669][ C1] [<8022f238>] (secondary_start_kernel) from [<80220094>] (__enable_mmu+0x0/0xc) [ 660.214753][ C1] r7:82a7b4a4 r6:30c0387d r5:00000000 r4:830b7bc0 [ 660.215704][ C0] Kernel panic - not syncing: softlockup: hung tasks [ 660.236158][ C0] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Tainted: G L syzkaller #0 PREEMPT [ 660.236601][ C0] Tainted: [L]=SOFTLOCKUP [ 660.236740][ C0] Hardware name: ARM-Versatile Express [ 660.236937][ C0] Call trace: [ 660.237135][ C0] [<80201a74>] (dump_backtrace) from [<80201b70>] (show_stack+0x18/0x1c) [ 660.237396][ C0] r7:822965a4 r6:8281b500 r5:00000000 r4:82295754 [ 660.237560][ C0] [<80201b58>] (show_stack) from [<8021ee08>] (dump_stack_lvl+0x54/0x7c) [ 660.237798][ C0] [<8021edb4>] (dump_stack_lvl) from [<8021ee48>] (dump_stack+0x18/0x1c) [ 660.238007][ C0] r5:00000000 r4:82a7bd14 [ 660.238114][ C0] [<8021ee30>] (dump_stack) from [<80202648>] (vpanic+0xe0/0x2e8) [ 660.238432][ C0] [<80202568>] (vpanic) from [<80202884>] (trace_suspend_resume+0x0/0xd8) [ 660.238753][ C0] r7:82ac27f8 [ 660.238905][ C0] [<80202850>] (panic) from [<80383fcc>] (watchdog_timer_fn+0x2dc/0x350) [ 660.239243][ C0] r3:00000001 r2:00004000 r1:82a7bd1c r0:822965a4 [ 660.239472][ C0] [<80383cf0>] (watchdog_timer_fn) from [<80329c64>] (__hrtimer_run_queues+0x1c4/0x454) [ 660.239834][ C0] r10:8281b500 r9:00000000 r8:dddc7130 r7:80383cf0 r6:dddc7000 r5:dddc7040 [ 660.240127][ C0] r4:dddc75d8 [ 660.240273][ C0] [<80329aa0>] (__hrtimer_run_queues) from [<8032b268>] (hrtimer_interrupt+0x148/0x2bc) [ 660.240665][ C0] r10:b36bbee0 r9:dddc7180 r8:dddc7130 r7:00000099 r6:00000003 r5:20000193 [ 660.240950][ C0] r4:dddc7000 [ 660.241114][ C0] [<8032b120>] (hrtimer_interrupt) from [<813409e8>] (arch_timer_handler_virt+0x30/0x38) [ 660.241489][ C0] r10:81d0fc78 r9:8309e400 r8:00000000 r7:00000000 r6:00000000 r5:82498528 [ 660.241771][ C0] r4:8309de40 [ 660.241930][ C0] [<813409b8>] (arch_timer_handler_virt) from [<802efab4>] (handle_percpu_devid_irq+0x128/0x34c) [ 660.242308][ C0] [<802ef98c>] (handle_percpu_devid_irq) from [<802e8c44>] (handle_irq_desc+0x74/0x84) [ 660.242672][ C0] r10:00000000 r9:8281b500 r8:00000000 r7:df80a00c r6:826c2388 r5:df80a000 [ 660.243019][ C0] r4:8280cc44 [ 660.243167][ C0] [<802e8bd0>] (handle_irq_desc) from [<802e8cc0>] (generic_handle_domain_irq+0x18/0x1c) [ 660.243536][ C0] [<802e8ca8>] (generic_handle_domain_irq) from [<802012c8>] (gic_handle_irq+0x68/0x7c) [ 660.243904][ C0] [<80201260>] (gic_handle_irq) from [<81aada48>] (generic_handle_arch_irq+0x60/0x80) [ 660.244266][ C0] r7:82801dd8 r6:82443f98 r5:8247f0cc r4:826c3a9c [ 660.244493][ C0] [<81aad9e8>] (generic_handle_arch_irq) from [<80200bdc>] (__irq_svc+0x7c/0xbc) [ 660.244848][ C0] Exception stack(0x82801dd8 to 0x82801e20) [ 660.245094][ C0] 1dc0: 00000001 00000000 [ 660.245411][ C0] 1de0: 0000ec7f 0000ec7d 83ff7568 00000004 00000001 83ff7568 83eff288 83ff7440 [ 660.245768][ C0] 1e00: 00000000 82801e3c 82801e28 82801e28 81abbfcc 81abbff4 80000013 ffffffff [ 660.246316][ C0] r9:8281b500 r8:83eff288 r7:82801e0c r6:ffffffff r5:80000013 r4:81abbff4 [ 660.246602][ C0] [<81abbfb4>] (_raw_spin_lock) from [<809c7b2c>] (gpio_mmio_set+0x44/0x80) [ 660.246950][ C0] r5:00000004 r4:83ff7440 [ 660.247138][ C0] [<809c7ae8>] (gpio_mmio_set) from [<809b82e8>] (gpiochip_set+0x1c/0x44) [ 660.247475][ C0] r7:00000001 r6:00000000 r5:00000002 r4:84035e68 [ 660.247699][ C0] [<809b82cc>] (gpiochip_set) from [<809babb0>] (gpiod_set_raw_value_commit+0x78/0x218) [ 660.248047][ C0] [<809bab38>] (gpiod_set_raw_value_commit) from [<809bc450>] (gpiod_set_value_nocheck+0x44/0x58) [ 660.248415][ C0] r10:00000000 r9:00000000 r8:00000001 r7:dddce4c0 r6:83854dd8 r5:00000001 [ 660.248712][ C0] r4:84035e68 [ 660.248872][ C0] [<809bc40c>] (gpiod_set_value_nocheck) from [<809bc4a0>] (gpiod_set_value+0x3c/0x88) [ 660.249204][ C0] [<809bc464>] (gpiod_set_value) from [<809ccc3c>] (gpio_led_set+0x5c/0x60) [ 660.249536][ C0] r5:000000ff r4:8333fa24 [ 660.249782][ C0] [<809ccbe0>] (gpio_led_set) from [<809ca564>] (led_set_brightness+0x84/0x90) [ 660.250140][ C0] r5:000000ff r4:8333fa24 [ 660.250309][ C0] [<809ca4e0>] (led_set_brightness) from [<809cc0e4>] (led_trigger_event+0x40/0x58) [ 660.250650][ C0] r5:000000ff r4:8333fa24 [ 660.250792][ C0] [<809cc0a4>] (led_trigger_event) from [<809cd740>] (ledtrig_cpu+0xac/0xf4) [ 660.251126][ C0] r7:dddce4c0 r6:00000002 r5:82b15cd8 r4:000001fd [ 660.251348][ C0] [<809cd694>] (ledtrig_cpu) from [<80227a38>] (arch_cpu_idle_exit+0x14/0x18) [ 660.251686][ C0] r9:00000000 r8:00000000 r7:8280c710 r6:8281b500 r5:8280c6d0 r4:00000000 [ 660.251969][ C0] [<80227a24>] (arch_cpu_idle_exit) from [<802b168c>] (do_idle+0x5c/0x2d8) [ 660.252308][ C0] [<802b1630>] (do_idle) from [<802b1c38>] (cpu_startup_entry+0x30/0x34) [ 660.252645][ C0] r10:8281aff4 r9:8280c680 r8:823bec64 r7:00000000 r6:deffc06c r5:828222e8 [ 660.252930][ C0] r4:000000ed [ 660.253093][ C0] [<802b1c08>] (cpu_startup_entry) from [<81aaf47c>] (kernel_init+0x0/0x138) [ 660.253412][ C0] [<81aaf39c>] (rest_init) from [<8260145c>] (start_kernel+0x844/0x860) [ 660.253806][ C0] [<82600c18>] (start_kernel) from [<00000000>] (0x0) [ 660.256091][ C0] Rebooting in 86400 seconds..