last executing test programs: 450.604824ms ago: executing program 1 (id=2): r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000000)=[@sack_perm, @window, @sack_perm, @sack_perm, @timestamp, @timestamp, @timestamp, @timestamp], 0x20000149) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000011000000000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000300)='sys_enter\x00', r2}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000180)) 0s ago: executing program 0 (id=1): r0 = socket$vsock_stream(0x28, 0x1, 0x0) bind$vsock_stream(r0, &(0x7f0000000440), 0x10) listen(r0, 0x0) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r1, &(0x7f0000000100)={0x28, 0x0, 0x0, @local}, 0x10) writev(r1, 0x0, 0x0) r2 = accept4$unix(r0, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001680)=[{{0x0, 0x0, &(0x7f0000003380)=[{&(0x7f0000000140)=""/120, 0x78}, {&(0x7f0000000040)=""/40, 0x28}, {&(0x7f0000003300)=""/107, 0x6b}], 0x3}}], 0x4000000000000a1, 0x2, 0x0) kernel console output (not intermixed with test programs): [ 52.672817][ T31] audit: type=1400 audit(52.590:68): avc: denied { read write } for pid=3097 comm="sftp-server" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 52.685021][ T31] audit: type=1400 audit(52.600:69): avc: denied { open } for pid=3097 comm="sftp-server" path="/dev/null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 Warning: Permanently added '[localhost]:50021' (ED25519) to the list of known hosts. [ 64.052774][ T31] audit: type=1400 audit(63.970:70): avc: denied { name_bind } for pid=3098 comm="sshd" src=30000 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 65.708741][ T31] audit: type=1400 audit(65.620:71): avc: denied { execute } for pid=3100 comm="sh" name="syz-executor" dev="vda" ino=680 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 65.709472][ T31] audit: type=1400 audit(65.620:72): avc: denied { execute_no_trans } for pid=3100 comm="sh" path="/syz-executor" dev="vda" ino=680 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 69.347819][ T31] audit: type=1400 audit(69.270:73): avc: denied { mounton } for pid=3100 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=681 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 69.350297][ T31] audit: type=1400 audit(69.270:74): avc: denied { mount } for pid=3100 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 69.362707][ T3100] cgroup: Unknown subsys name 'net' [ 69.369532][ T31] audit: type=1400 audit(69.290:75): avc: denied { unmount } for pid=3100 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 69.597851][ T3100] cgroup: Unknown subsys name 'hugetlb' [ 69.598842][ T3100] cgroup: Unknown subsys name 'rlimit' [ 69.836205][ T31] audit: type=1400 audit(69.760:76): avc: denied { setattr } for pid=3100 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 69.837136][ T31] audit: type=1400 audit(69.760:77): avc: denied { mounton } for pid=3100 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 69.837935][ T31] audit: type=1400 audit(69.760:78): avc: denied { mount } for pid=3100 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 69.999020][ T3102] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 70.000847][ T31] audit: type=1400 audit(69.920:79): avc: denied { relabelto } for pid=3102 comm="mkswap" name="swap-file" dev="vda" ino=684 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 70.005948][ T31] audit: type=1400 audit(69.920:80): avc: denied { write } for pid=3102 comm="mkswap" path="/swap-file" dev="vda" ino=684 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 70.035516][ T31] audit: type=1400 audit(69.960:81): avc: denied { read } for pid=3100 comm="syz-executor" name="swap-file" dev="vda" ino=684 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 70.036511][ T31] audit: type=1400 audit(69.960:82): avc: denied { open } for pid=3100 comm="syz-executor" path="/swap-file" dev="vda" ino=684 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 76.922198][ T3100] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 79.206864][ T31] audit: type=1400 audit(79.130:83): avc: denied { execmem } for pid=3103 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 79.273863][ T31] audit: type=1400 audit(79.190:84): avc: denied { mounton } for pid=3105 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 79.275055][ T31] audit: type=1400 audit(79.190:85): avc: denied { mount } for pid=3105 comm="syz-executor" name="/" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 79.275778][ T31] audit: type=1400 audit(79.190:86): avc: denied { read } for pid=3105 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 79.276472][ T31] audit: type=1400 audit(79.190:87): avc: denied { open } for pid=3105 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 79.281196][ T31] audit: type=1400 audit(79.200:88): avc: denied { mounton } for pid=3105 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 79.315436][ T31] audit: type=1400 audit(79.240:89): avc: denied { module_request } for pid=3105 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 79.442293][ T31] audit: type=1400 audit(79.360:90): avc: denied { sys_module } for pid=3105 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 80.377149][ T31] audit: type=1400 audit(80.300:91): avc: denied { ioctl } for pid=3106 comm="syz-executor" path="/dev/net/tun" dev="devtmpfs" ino=691 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 81.876610][ T3106] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 81.880720][ T3105] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 81.885136][ T3106] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 81.912194][ T3105] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 83.141295][ T3105] hsr_slave_0: entered promiscuous mode [ 83.147450][ T3105] hsr_slave_1: entered promiscuous mode [ 83.189125][ T3106] hsr_slave_0: entered promiscuous mode [ 83.191419][ T3106] hsr_slave_1: entered promiscuous mode [ 83.192748][ T3106] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 83.194321][ T3106] Cannot create hsr debugfs directory [ 83.714194][ T31] audit: type=1400 audit(83.630:92): avc: denied { create } for pid=3105 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 83.731594][ T3105] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 83.762047][ T3105] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 83.777349][ T3105] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 83.785768][ T3105] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 83.828412][ T3106] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 83.842038][ T3106] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 83.854499][ T3106] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 83.861743][ T3106] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 84.501590][ T3106] 8021q: adding VLAN 0 to HW filter on device bond0 [ 84.647786][ T3105] 8021q: adding VLAN 0 to HW filter on device bond0 [ 87.297877][ T3106] veth0_vlan: entered promiscuous mode [ 87.316754][ T3106] veth1_vlan: entered promiscuous mode [ 87.366715][ T3106] veth0_macvtap: entered promiscuous mode [ 87.372783][ T3106] veth1_macvtap: entered promiscuous mode [ 87.437444][ T3106] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 87.440107][ T3106] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 87.440511][ T3106] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 87.440974][ T3106] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 87.558825][ T31] kauditd_printk_skb: 2 callbacks suppressed [ 87.558876][ T31] audit: type=1400 audit(87.480:95): avc: denied { mount } for pid=3106 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 87.574510][ T31] audit: type=1400 audit(87.500:96): avc: denied { mounton } for pid=3106 comm="syz-executor" path="/syzkaller.iBG00n/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 87.577252][ T31] audit: type=1400 audit(87.500:97): avc: denied { mount } for pid=3106 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 87.589977][ T31] audit: type=1400 audit(87.510:98): avc: denied { unmount } for pid=3106 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 87.596709][ T31] audit: type=1400 audit(87.520:99): avc: denied { mounton } for pid=3106 comm="syz-executor" path="/dev/binderfs" dev="devtmpfs" ino=779 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 87.599456][ T31] audit: type=1400 audit(87.520:100): avc: denied { mount } for pid=3106 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 87.690410][ T31] audit: type=1400 audit(87.610:101): avc: denied { read write } for pid=3106 comm="syz-executor" name="loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 87.703455][ T31] audit: type=1400 audit(87.620:102): avc: denied { open } for pid=3106 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 87.703989][ T31] audit: type=1400 audit(87.620:103): avc: denied { ioctl } for pid=3106 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 87.918699][ T3105] veth0_vlan: entered promiscuous mode [ 87.930650][ T3105] veth1_vlan: entered promiscuous mode [ 87.967410][ T3105] veth0_macvtap: entered promiscuous mode [ 87.975422][ T3105] veth1_macvtap: entered promiscuous mode [ 88.010098][ T3105] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 88.010562][ T3105] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 88.010886][ T3105] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 88.012167][ T3105] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 88.195956][ T31] audit: type=1400 audit(88.110:104): avc: denied { create } for pid=3789 comm="syz.0.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 519.594723][ T32] INFO: task syz.1.2:3791 blocked for more than 430 seconds. [ 519.596106][ T32] Not tainted 6.11.0-rc7-syzkaller #0 [ 519.596483][ T32] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 519.596921][ T32] task:syz.1.2 state:D stack:0 pid:3791 tgid:3786 ppid:3106 flags:0x00400001 [ 519.598246][ T32] Call trace: [ 519.599091][ T32] [<8197ed48>] (__schedule) from [<8197f8e0>] (schedule+0x2c/0xfc) [ 519.600318][ T32] r10:dfe69e64 r9:dfe69d90 r8:00000000 r7:845e9740 r6:845e9834 r5:845e9740 [ 519.600621][ T32] r4:84f7ec00 [ 519.600846][ T32] [<8197f8b4>] (schedule) from [<81457c8c>] (__lock_sock+0x68/0xac) [ 519.601197][ T32] r5:845e9740 r4:845e982c [ 519.601498][ T32] [<81457c24>] (__lock_sock) from [<81457db4>] (sockopt_lock_sock+0x54/0x58) [ 519.601814][ T32] r6:00000000 r5:845e982c r4:845e9740 [ 519.602205][ T32] [<81457d60>] (sockopt_lock_sock) from [<8162bfd4>] (do_ip_getsockopt+0x204/0xbb0) [ 519.602542][ T32] r5:00000000 r4:00000010 [ 519.602740][ T32] [<8162bdd4>] (do_ip_getsockopt) from [<8162c9e4>] (ip_getsockopt+0x64/0x134) [ 519.653725][ T32] r10:00000127 r9:20000180 r8:00000000 r7:20000180 r6:00000000 r5:845e9740 [ 519.654324][ T32] r4:00000010 [ 519.654485][ T32] [<8162c980>] (ip_getsockopt) from [<8163ce10>] (tcp_getsockopt+0x34/0x6c) [ 519.655018][ T32] r9:20000180 r8:00000000 r7:833e8f00 r6:00000010 r5:00000000 r4:8162c980 [ 519.655346][ T32] [<8163cddc>] (tcp_getsockopt) from [<81453dd4>] (sock_common_getsockopt+0x28/0x30) [ 519.655723][ T32] r4:8163cddc [ 519.655954][ T32] [<81453dac>] (sock_common_getsockopt) from [<81450bbc>] (do_sock_getsockopt+0x10c/0x298) [ 519.656404][ T32] r4:81453dac [ 519.656547][ T32] [<81450ab0>] (do_sock_getsockopt) from [<81452b4c>] (sys_getsockopt+0x90/0xd4) [ 519.657013][ T32] r9:84f7ec00 r8:833e8f00 r7:00000000 r6:00000010 r5:00000000 r4:00000000 [ 519.657264][ T32] [<81452abc>] (sys_getsockopt) from [<8020028c>] (__sys_trace_return+0x0/0x10) [ 519.657665][ T32] Exception stack(0xdfe69fa8 to 0xdfe69ff0) [ 519.658109][ T32] 9fa0: 20000180 00000000 00000003 00000000 00000010 00000000 [ 519.658447][ T32] 9fc0: 20000180 00000000 00286388 00000127 00000000 00006364 003d0f00 76bc80bc [ 519.658721][ T32] 9fe0: 76bc7ec0 76bc7eb0 000189d0 00132da0 [ 519.658996][ T32] r8:8020029c r7:00000127 r6:00286388 r5:00000000 r4:20000180 [ 519.659774][ T32] NMI backtrace for cpu 1 [ 519.660219][ T32] CPU: 1 UID: 0 PID: 32 Comm: khungtaskd Not tainted 6.11.0-rc7-syzkaller #0 [ 519.660697][ T32] Hardware name: ARM-Versatile Express [ 519.661112][ T32] Call trace: [ 519.661317][ T32] [<8195d178>] (dump_backtrace) from [<8195d274>] (show_stack+0x18/0x1c) [ 519.661682][ T32] r7:00000000 r6:00000113 r5:60000193 r4:8200ca20 [ 519.661919][ T32] [<8195d25c>] (show_stack) from [<8197afb0>] (dump_stack_lvl+0x70/0x7c) [ 519.662229][ T32] [<8197af40>] (dump_stack_lvl) from [<8197afd4>] (dump_stack+0x18/0x1c) [ 519.662614][ T32] r5:00000001 r4:00000001 [ 519.662770][ T32] [<8197afbc>] (dump_stack) from [<8194a468>] (nmi_cpu_backtrace+0x160/0x17c) [ 519.663309][ T32] [<8194a308>] (nmi_cpu_backtrace) from [<8194a5b4>] (nmi_trigger_cpumask_backtrace+0x130/0x1d8) [ 519.663849][ T32] r7:00000001 r6:8260c5d0 r5:8261a88c r4:ffffffff [ 519.664100][ T32] [<8194a484>] (nmi_trigger_cpumask_backtrace) from [<802103c8>] (arch_trigger_cpumask_backtrace+0x18/0x1c) [ 519.664694][ T32] r9:000055c1 r8:828b3130 r7:8260c734 r6:00007f56 r5:8261ae48 r4:84109d1c [ 519.665055][ T32] [<802103b0>] (arch_trigger_cpumask_backtrace) from [<80350e30>] (watchdog+0x498/0x5b8) [ 519.665439][ T32] [<80350998>] (watchdog) from [<8026fb04>] (kthread+0x104/0x134) [ 519.665833][ T32] r10:00000000 r9:df819e58 r8:82ccfc40 r7:00000000 r6:80350998 r5:82e49800 [ 519.666157][ T32] r4:82fa4540 [ 519.666320][ T32] [<8026fa00>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 519.666691][ T32] Exception stack(0xdf8e1fb0 to 0xdf8e1ff8) [ 519.666999][ T32] 1fa0: 00000000 00000000 00000000 00000000 [ 519.667356][ T32] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 519.667769][ T32] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 519.668148][ T32] r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8026fa00 r4:82fa4540 [ 519.669575][ T32] Sending NMI from CPU 1 to CPUs 0: [ 519.670517][ C0] NMI backtrace for cpu 0 [ 519.670675][ C0] CPU: 0 UID: 0 PID: 3100 Comm: syz-executor Not tainted 6.11.0-rc7-syzkaller #0 [ 519.670722][ C0] Hardware name: ARM-Versatile Express [ 519.670751][ C0] PC is at setup_sigframe+0x140/0x1c4 [ 519.670802][ C0] LR is at 0x83e1ec00 [ 519.671017][ C0] pc : [<8020b820>] lr : [<83e1ec00>] psr: 60000013 [ 519.671039][ C0] sp : df97dea8 ip : 00000000 fp : df97df34 [ 519.671058][ C0] r10: 0000014f r9 : 7ef9d7fc r8 : 00000013 [ 519.671079][ C0] r7 : b5403587 r6 : 00000000 r5 : 83e1f420 r4 : 7ef9d3c8 [ 519.671109][ C0] r3 : b5003500 r2 : 00000000 r1 : 00000001 r0 : 00000000 [ 519.671185][ C0] Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment user [ 519.671226][ C0] Control: 30c5387d Table: 843c6d40 DAC: fffffffd [ 519.671263][ C0] Call trace: [ 519.671287][ C0] [<8020b6e0>] (setup_sigframe) from [<8020bc6c>] (do_work_pending+0x2f4/0x4f8) [ 519.671329][ C0] r10:00000077 r9:b5403587 r8:00000000 r7:83e1f420 r6:7ef9d3c8 r5:df97dfb0 [ 519.671338][ C0] r4:83e1ec00 [ 519.671345][ C0] [<8020b978>] (do_work_pending) from [<80200088>] (slow_work_pending+0xc/0x24) [ 519.671368][ C0] Exception stack(0xdf97dfb0 to 0xdf97dff8) [ 519.671388][ C0] dfa0: fffffffc 7ef9d7fc 00000000 00000000 [ 519.671406][ C0] dfc0: 7ef9d6c4 7ef9d6cc 00000000 0000014f 7ef9d7fc 00000013 00000000 00e00000 [ 519.671420][ C0] dfe0: 00000008 7ef9d6c0 001329f4 0013448c 20000010 00000011 [ 519.671439][ C0] r10:00000077 r9:83e1ec00 r8:00000000 r7:00000077 r6:00000000 r5:7ef9d6cc [ 519.671447][ C0] r4:7ef9d6c4 [ 519.754978][ T32] Kernel panic - not syncing: hung_task: blocked tasks [ 519.755751][ T32] CPU: 1 UID: 0 PID: 32 Comm: khungtaskd Not tainted 6.11.0-rc7-syzkaller #0 [ 519.756164][ T32] Hardware name: ARM-Versatile Express [ 519.756475][ T32] Call trace: [ 519.756698][ T32] [<8195d178>] (dump_backtrace) from [<8195d274>] (show_stack+0x18/0x1c) [ 519.757147][ T32] r7:00000000 r6:826228c4 r5:00000000 r4:8200ca20 [ 519.757419][ T32] [<8195d25c>] (show_stack) from [<8197af94>] (dump_stack_lvl+0x54/0x7c) [ 519.757817][ T32] [<8197af40>] (dump_stack_lvl) from [<8197afd4>] (dump_stack+0x18/0x1c) [ 519.758164][ T32] r5:00000000 r4:8286dd18 [ 519.758343][ T32] [<8197afbc>] (dump_stack) from [<8195dd1c>] (panic+0x120/0x368) [ 519.758675][ T32] [<8195dbfc>] (panic) from [<80350cb0>] (watchdog+0x318/0x5b8) [ 519.759053][ T32] r3:00400000 r2:00000000 r1:00000001 r0:8200d520 [ 519.759279][ T32] r7:8260c734 [ 519.759419][ T32] [<80350998>] (watchdog) from [<8026fb04>] (kthread+0x104/0x134) [ 519.759805][ T32] r10:00000000 r9:df819e58 r8:82ccfc40 r7:00000000 r6:80350998 r5:82e49800 [ 519.760091][ T32] r4:82fa4540 [ 519.760240][ T32] [<8026fa00>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 519.760630][ T32] Exception stack(0xdf8e1fb0 to 0xdf8e1ff8) [ 519.760862][ T32] 1fa0: 00000000 00000000 00000000 00000000 [ 519.761261][ T32] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 519.761691][ T32] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 519.761963][ T32] r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8026fa00 r4:82fa4540 [ 519.763540][ T32] Rebooting in 86400 seconds.. VM DIAGNOSIS: 10:21:52 Registers: info registers vcpu 0 CPU#0 R00=83e19800 R01=821ad864 R02=5b917000 R03=00000000 R04=83e19800 R05=df961e78 R06=00000000 R07=b5403587 R08=7ee8a1fc R09=00000000 R10=000000af R11=df961d44 R12=00000000 R13=df961d68 R14=83e19800 R15=8020b49c PSR=60000013 -ZC- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=004c27e9 s17=00000000 d08=00000000004c27e9 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=98030108 s33=10080007 d16=1008000798030108 s34=0407a003 s35=ffffffff d17=ffffffff0407a003 s36=07b00303 s37=03000800 d18=0300080007b00303 s38=080007b8 s39=07c00320 d19=07c00320080007b8 s40=ffffff04 s41=d00303ff d20=d00303ffffffff04 s42=00080007 s43=0007d803 d21=0007d80300080007 s44=e0030008 s45=01080007 d22=01080007e0030008 s46=0007e803 s47=f0030008 d23=f00300080007e803 s48=00000001 s49=00000000 d24=0000000000000001 s50=00000000 s51=00000000 d25=0000000000000000 s52=cc195ead s53=06b5605b d26=06b5605bcc195ead s54=3ad7527e s55=a8b7cd96 d27=a8b7cd963ad7527e s56=f91248c2 s57=ff35c912 d28=ff35c912f91248c2 s58=0aa710b0 s59=6e95ebac d29=6e95ebac0aa710b0 s60=b4dd8364 s61=a2457936 d30=a2457936b4dd8364 s62=670e47b4 s63=4dee1843 d31=4dee1843670e47b4 FPSCR: 00000000 info registers vcpu 1 CPU#1 R00=0000000a R01=df8e1a28 R02=00000000 R03=df8e1a28 R04=0000000a R05=df8e1a1e R06=00000000 R07=8197ed48 R08=00000000 R09=df8e1d30 R10=df8e1dc0 R11=df8e19f8 R12=df8e197c R13=df8e19b4 R14=803214a4 R15=803215d8 PSR=60000193 -ZC- A S svc32 s00=38000000 s01=00000000 d00=0000000038000000 s02=14000000 s03=000f31b1 d01=000f31b114000000 s04=fc000000 s05=ffffffff d02=fffffffffc000000 s06=fc000000 s07=ffffffff d03=fffffffffc000000 s08=fe3a1321 s09=ffc96431 d04=ffc96431fe3a1321 s10=ffffffff s11=ffffffff d05=ffffffffffffffff s12=fe28c61b s13=ff8ec3df d06=ff8ec3dffe28c61b s14=ffffffff s15=ffffffff d07=ffffffffffffffff s16=00000000 s17=06a8c032 d08=06a8c03200000000 s18=70000000 s19=0005ae7c d09=0005ae7c70000000 s20=0124ea9f s21=ff8ec3d9 d10=ff8ec3d90124ea9f s22=00000000 s23=ffffffff d11=ffffffff00000000 s24=383a1321 s25=00000000 d12=00000000383a1321 s26=14000000 s27=000f31b1 d13=000f31b114000000 s28=02000000 s29=00000000 d14=0000000002000000 s30=02000000 s31=00000000 d15=0000000002000000 s32=00b24a75 s33=00ea1816 d16=00ea181600b24a75 s34=00000000 s35=00000000 d17=0000000000000000 s36=00a3def3 s37=ffcb7fe6 d18=ffcb7fe600a3def3 s38=00000000 s39=ffffffff d19=ffffffff00000000 s40=01000000 s41=00000000 d20=0000000001000000 s42=0885baa8 s43=00000000 d21=000000000885baa8 s44=0000000e s45=00000000 d22=000000000000000e s46=02d73e38 s47=00000000 d23=0000000002d73e38 s48=01aebcc0 s49=06a8c032 d24=06a8c03201aebcc0 s50=35f99e28 s51=00000000 d25=0000000035f99e28 s52=007cfa03 s53=01ea33ee d26=01ea33ee007cfa03 s54=01915836 s55=0108c92e d27=0108c92e01915836 s56=00ac4ff2 s57=fee2e154 d28=fee2e15400ac4ff2 s58=ff7170aa s59=01915836 d29=01915836ff7170aa s60=217eabeb s61=000f31b1 d30=000f31b1217eabeb s62=884074f9 s63=001dc52f d31=001dc52f884074f9 FPSCR: 00000000