last executing test programs: 1.158856553s ago: executing program 0 (id=1363): r0 = eventfd2(0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0x5450, 0x0) 1.030647709s ago: executing program 0 (id=1369): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000004280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r2, 0x8933, &(0x7f00000023c0)={'wg0\x00'}) 852.050382ms ago: executing program 0 (id=1368): openat$selinux_policy(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1) openat$sw_sync_info(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) 646.077738ms ago: executing program 0 (id=1375): r0 = socket$can_j1939(0x1d, 0x2, 0x7) r1 = dup(r0) sendmsg$RDMA_NLDEV_CMD_SET(r1, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000140)={0x0}, 0x1, 0x0, 0x0, 0x40}, 0x800) 552.08501ms ago: executing program 0 (id=1373): r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f00000001c0), 0x2) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'rose0\x00', 0x2000}) ioctl$AUTOFS_IOC_FAIL(r0, 0x40087543, 0x200000000000) 443.875004ms ago: executing program 0 (id=1379): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto(r0, 0x0, 0x0, 0x24000080, &(0x7f0000000200)=@in6={0xa, 0x0, 0x0, @local, 0x7}, 0x80) sendmmsg$sock(r0, &(0x7f0000000ec0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x24040085) 381.491472ms ago: executing program 1 (id=1376): r0 = openat$comedi(0xffffffffffffff9c, &(0x7f0000000080)='/dev/comedi4\x00', 0x500, 0x0) ioctl$COMEDI_DEVCONFIG(r0, 0x40946400, 0x0) ioctl$COMEDI_DEVCONFIG(r0, 0x40946400, &(0x7f00000000c0)={'pcl812\x00', [0x4f29, 0x40, 0x10000, 0x3, 0x5, 0xfff, 0x10001, 0x7, 0xa, 0x102, 0x80002, 0x8, 0x9, 0x3, 0x6, 0xfe, 0x0, 0x1a44d, 0x3, 0x40000003, 0x1, 0xcaa9, 0x8001, 0xc, 0x4, 0xe69, 0x3c, 0x8, 0x6, 0x9, 0xfffffff8]}) 290.873024ms ago: executing program 1 (id=1377): mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect(r0, &(0x7f0000000200)=@in={0x2, 0x4e20, @loopback}, 0x80) 223.250122ms ago: executing program 1 (id=1378): r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, &(0x7f0000000000)={0x4}, 0x8) sendmsg$inet6(r0, &(0x7f00000000c0)={&(0x7f0000000180)={0xa, 0x4e21, 0x4080000, @dev={0xfe, 0x80, '\x00', 0x1a}}, 0x1c, 0x0}, 0x4004091) 141.621972ms ago: executing program 1 (id=1380): r0 = inotify_init() memfd_create(0x0, 0x0) ioctl$TCGETA(r0, 0x5421, &(0x7f0000000180)) 67.578312ms ago: executing program 1 (id=1381): pipe2$watch_queue(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0xb82e336200000000) r1 = ioctl$TUNGETDEVNETNS(r0, 0x5450, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x5421, &(0x7f0000000700)) 0s ago: executing program 1 (id=1382): r0 = getpgrp(0x0) r1 = syz_pidfd_open(r0, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r1, 0x5450, 0x0) kernel console output (not intermixed with test programs): [ 48.242323][ T29] audit: type=1400 audit(48.160:56): avc: denied { read write } for pid=3091 comm="sftp-server" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 48.242792][ T29] audit: type=1400 audit(48.160:57): avc: denied { open } for pid=3091 comm="sftp-server" path="/dev/null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 Warning: Permanently added '[localhost]:35704' (ED25519) to the list of known hosts. [ 62.519144][ T29] audit: type=1400 audit(62.430:58): avc: denied { name_bind } for pid=3094 comm="sshd-session" src=30000 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 63.763310][ T29] audit: type=1400 audit(63.680:59): avc: denied { execute } for pid=3095 comm="sh" name="syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 63.785192][ T29] audit: type=1400 audit(63.700:60): avc: denied { execute_no_trans } for pid=3095 comm="sh" path="/syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 68.475066][ T29] audit: type=1400 audit(68.390:61): avc: denied { mounton } for pid=3095 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=806 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 68.479157][ T29] audit: type=1400 audit(68.390:62): avc: denied { mount } for pid=3095 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 68.489262][ T3095] cgroup: Unknown subsys name 'net' [ 68.497059][ T29] audit: type=1400 audit(68.410:63): avc: denied { unmount } for pid=3095 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 68.657202][ T3095] cgroup: Unknown subsys name 'cpuset' [ 68.665400][ T3095] cgroup: Unknown subsys name 'hugetlb' [ 68.666314][ T3095] cgroup: Unknown subsys name 'rlimit' [ 68.897635][ T29] audit: type=1400 audit(68.810:64): avc: denied { setattr } for pid=3095 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 68.901861][ T29] audit: type=1400 audit(68.820:65): avc: denied { mounton } for pid=3095 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 68.902738][ T29] audit: type=1400 audit(68.820:66): avc: denied { mount } for pid=3095 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 69.070413][ T3097] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 69.072547][ T29] audit: type=1400 audit(68.990:67): avc: denied { relabelto } for pid=3097 comm="mkswap" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 69.075326][ T29] audit: type=1400 audit(68.990:68): avc: denied { write } for pid=3097 comm="mkswap" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 69.106122][ T29] audit: type=1400 audit(69.020:69): avc: denied { read } for pid=3095 comm="syz-executor" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 69.119043][ T29] audit: type=1400 audit(69.020:70): avc: denied { open } for pid=3095 comm="syz-executor" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 77.646620][ T3095] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 79.513806][ T29] audit: type=1400 audit(79.430:71): avc: denied { execmem } for pid=3098 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 79.575607][ T29] audit: type=1400 audit(79.490:72): avc: denied { read } for pid=3100 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 79.577938][ T29] audit: type=1400 audit(79.490:73): avc: denied { open } for pid=3100 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 79.591400][ T29] audit: type=1400 audit(79.510:74): avc: denied { mounton } for pid=3100 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 79.614475][ T29] audit: type=1400 audit(79.530:75): avc: denied { module_request } for pid=3100 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 79.620335][ T29] audit: type=1400 audit(79.530:76): avc: denied { module_request } for pid=3101 comm="syz-executor" kmod="netdev-nr1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 79.671232][ T29] audit: type=1400 audit(79.590:77): avc: denied { sys_module } for pid=3101 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 80.253974][ T29] audit: type=1400 audit(80.170:78): avc: denied { ioctl } for pid=3101 comm="syz-executor" path="/dev/net/tun" dev="devtmpfs" ino=677 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 81.352295][ T3101] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 81.375744][ T3101] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 81.382695][ T3100] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 81.404077][ T3100] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 82.271571][ T3101] hsr_slave_0: entered promiscuous mode [ 82.275622][ T3101] hsr_slave_1: entered promiscuous mode [ 82.306193][ T3100] hsr_slave_0: entered promiscuous mode [ 82.307572][ T3100] hsr_slave_1: entered promiscuous mode [ 82.313133][ T3100] debugfs: 'hsr0' already exists in 'hsr' [ 82.315489][ T3100] Cannot create hsr debugfs directory [ 82.799815][ T29] audit: type=1400 audit(82.710:79): avc: denied { create } for pid=3100 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 82.802210][ T29] audit: type=1400 audit(82.720:80): avc: denied { write } for pid=3100 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 82.807899][ T3100] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 82.820861][ T3100] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 82.836622][ T3100] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 82.854423][ T3100] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 82.929265][ T3101] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 82.949998][ T3101] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 82.965239][ T3101] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 82.977533][ T3101] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 83.594124][ T3100] 8021q: adding VLAN 0 to HW filter on device bond0 [ 83.727419][ T3101] 8021q: adding VLAN 0 to HW filter on device bond0 [ 86.286284][ T3100] veth0_vlan: entered promiscuous mode [ 86.316767][ T3100] veth1_vlan: entered promiscuous mode [ 86.344358][ T3101] veth0_vlan: entered promiscuous mode [ 86.372130][ T3101] veth1_vlan: entered promiscuous mode [ 86.430860][ T3100] veth0_macvtap: entered promiscuous mode [ 86.456281][ T3100] veth1_macvtap: entered promiscuous mode [ 86.466217][ T3101] veth0_macvtap: entered promiscuous mode [ 86.487547][ T3101] veth1_macvtap: entered promiscuous mode [ 86.562560][ T1352] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 86.591966][ T1352] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 86.621415][ T1352] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 86.621937][ T1352] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 86.688477][ T52] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 86.688609][ T29] kauditd_printk_skb: 1 callbacks suppressed [ 86.690071][ T29] audit: type=1400 audit(86.600:82): avc: denied { mount } for pid=3100 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 86.690566][ T52] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 86.690715][ T52] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 86.690917][ T52] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 86.719155][ T29] audit: type=1400 audit(86.630:83): avc: denied { mounton } for pid=3100 comm="syz-executor" path="/syzkaller.a2AyYT/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 86.725849][ T29] audit: type=1400 audit(86.640:84): avc: denied { mount } for pid=3100 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 86.746488][ T29] audit: type=1400 audit(86.660:85): avc: denied { mounton } for pid=3100 comm="syz-executor" path="/syzkaller.a2AyYT/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 86.752909][ T29] audit: type=1400 audit(86.670:86): avc: denied { mounton } for pid=3100 comm="syz-executor" path="/syzkaller.a2AyYT/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=3231 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 86.772927][ T29] audit: type=1400 audit(86.690:87): avc: denied { unmount } for pid=3100 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 86.790556][ T29] audit: type=1400 audit(86.710:88): avc: denied { mounton } for pid=3100 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=772 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 86.800318][ T29] audit: type=1400 audit(86.710:89): avc: denied { mount } for pid=3100 comm="syz-executor" name="/" dev="gadgetfs" ino=3232 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 86.810894][ T29] audit: type=1400 audit(86.730:90): avc: denied { mount } for pid=3100 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 86.814827][ T29] audit: type=1400 audit(86.730:91): avc: denied { mounton } for pid=3100 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 86.859755][ T3100] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 88.983937][ T3770] SELinux: syz.0.31 (3770) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace. [ 89.166804][ T3774] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=3774 comm=syz.1.33 [ 89.251128][ T3776] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 92.376788][ T3851] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 92.381224][ T29] kauditd_printk_skb: 21 callbacks suppressed [ 92.382021][ T29] audit: type=1400 audit(92.300:113): avc: denied { getopt } for pid=3850 comm="syz.1.71" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 92.522003][ T29] audit: type=1400 audit(92.440:114): avc: denied { create } for pid=3854 comm="syz.1.73" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 92.527631][ T29] audit: type=1400 audit(92.440:115): avc: denied { connect } for pid=3854 comm="syz.1.73" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 93.033286][ T29] audit: type=1400 audit(92.950:116): avc: denied { ioctl } for pid=3854 comm="syz.1.73" path="socket:[2483]" dev="sockfs" ino=2483 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 95.151071][ T29] audit: type=1400 audit(95.070:117): avc: denied { read } for pid=3869 comm="syz.1.79" name="binder0" dev="binder" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 95.153090][ T29] audit: type=1400 audit(95.070:118): avc: denied { open } for pid=3869 comm="syz.1.79" path="/dev/binderfs/binder0" dev="binder" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 95.164099][ T29] audit: type=1400 audit(95.080:119): avc: denied { ioctl } for pid=3869 comm="syz.1.79" path="/dev/binderfs/binder0" dev="binder" ino=7 ioctlcmd=0x6205 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 95.890392][ T3890] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=3890 comm=syz.1.89 [ 96.899093][ T29] audit: type=1400 audit(96.810:120): avc: denied { allowed } for pid=3914 comm="syz.1.102" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 96.910851][ T29] audit: type=1400 audit(96.830:121): avc: denied { create } for pid=3913 comm="syz.0.101" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 96.912898][ T29] audit: type=1400 audit(96.830:122): avc: denied { create } for pid=3914 comm="syz.1.102" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 97.754099][ T29] kauditd_printk_skb: 1 callbacks suppressed [ 97.754501][ T29] audit: type=1400 audit(97.670:124): avc: denied { write } for pid=3940 comm="syz.1.114" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 98.842674][ T29] audit: type=1400 audit(98.760:125): avc: denied { write } for pid=3946 comm="syz.0.117" path="socket:[3633]" dev="sockfs" ino=3633 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 99.249909][ T29] audit: type=1400 audit(99.170:126): avc: denied { write } for pid=3956 comm="syz.0.122" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 99.559048][ T29] audit: type=1400 audit(99.470:127): avc: denied { getattr } for pid=3964 comm="syz.0.126" name="/" dev="pidfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 99.782767][ T29] audit: type=1400 audit(99.700:128): avc: denied { write } for pid=3969 comm="syz.0.128" path="socket:[2669]" dev="sockfs" ino=2669 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sock_file permissive=1 [ 100.020523][ T29] audit: type=1400 audit(99.940:129): avc: denied { nlmsg_write } for pid=3975 comm="syz.0.131" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 100.024781][ T3976] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=3976 comm=syz.0.131 [ 101.206751][ T4029] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4029 comm=syz.0.157 [ 101.470129][ T4039] Zero length message leads to an empty skb [ 102.404194][ T29] audit: type=1400 audit(102.320:130): avc: denied { unmount } for pid=3101 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 102.539974][ T29] audit: type=1400 audit(102.460:131): avc: denied { setopt } for pid=4082 comm="syz.1.183" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 102.542900][ T29] audit: type=1400 audit(102.460:132): avc: denied { write } for pid=4082 comm="syz.1.183" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 103.264333][ T4109] capability: warning: `syz.1.196' uses deprecated v2 capabilities in a way that may be insecure [ 103.534777][ T29] audit: type=1400 audit(103.450:133): avc: denied { mount } for pid=4114 comm="syz.1.199" name="/" dev="devpts" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:devpts_t tclass=filesystem permissive=1 [ 103.541861][ T29] audit: type=1400 audit(103.460:134): avc: denied { remount } for pid=4114 comm="syz.1.199" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:devpts_t tclass=filesystem permissive=1 [ 103.556959][ T29] audit: type=1400 audit(103.470:135): avc: denied { unmount } for pid=3101 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:devpts_t tclass=filesystem permissive=1 [ 106.290306][ T29] audit: type=1400 audit(106.210:136): avc: denied { read } for pid=4137 comm="syz.0.210" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 107.261310][ T29] audit: type=1400 audit(107.180:137): avc: denied { ioctl } for pid=4171 comm="syz.0.227" path="socket:[3003]" dev="sockfs" ino=3003 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 107.949648][ T4202] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4202 comm=syz.1.242 [ 109.369508][ T29] audit: type=1400 audit(109.280:138): avc: denied { write } for pid=4241 comm="syz.0.262" path="socket:[4166]" dev="sockfs" ino=4166 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 109.983044][ T29] audit: type=1400 audit(109.900:139): avc: denied { prog_load } for pid=4257 comm="syz.0.270" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 109.985572][ T29] audit: type=1400 audit(109.900:140): avc: denied { bpf } for pid=4257 comm="syz.0.270" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 109.987790][ T29] audit: type=1400 audit(109.900:141): avc: denied { perfmon } for pid=4257 comm="syz.0.270" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 110.024042][ T29] audit: type=1400 audit(109.940:142): avc: denied { prog_run } for pid=4257 comm="syz.0.270" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 116.882787][ T4307] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4307 comm=syz.1.292 [ 117.260501][ T4321] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4321 comm=syz.0.301 [ 118.644334][ T29] audit: type=1400 audit(118.560:143): avc: denied { setopt } for pid=4382 comm="syz.0.332" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 119.697633][ T29] audit: type=1400 audit(119.610:144): avc: denied { bind } for pid=4429 comm="syz.1.356" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 119.931975][ T4441] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4441 comm=syz.0.361 [ 120.361717][ T4459] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4459 comm=syz.1.367 [ 123.895637][ T29] audit: type=1400 audit(123.810:145): avc: denied { sqpoll } for pid=4504 comm="syz.1.392" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 123.914571][ T29] audit: type=1400 audit(123.820:146): avc: denied { map } for pid=4504 comm="syz.1.392" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=4676 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 123.914860][ T29] audit: type=1400 audit(123.830:147): avc: denied { read write } for pid=4504 comm="syz.1.392" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=4676 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 128.883638][ T4623] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4623 comm=syz.1.448 [ 130.161249][ T4670] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=4670 comm=syz.1.472 [ 130.344493][ T4676] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=4676 comm=syz.0.477 [ 130.685535][ T29] audit: type=1400 audit(130.600:148): avc: denied { map_create } for pid=4690 comm="syz.0.485" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 130.691500][ T29] audit: type=1400 audit(130.610:149): avc: denied { map_read map_write } for pid=4690 comm="syz.0.485" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 130.873179][ T4702] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4702 comm=syz.1.487 [ 141.671858][ T4829] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4829 comm=syz.0.549 [ 148.057221][ T4955] SELinux: syz.1.607 (4955) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace. [ 148.677303][ T29] audit: type=1400 audit(148.590:150): avc: denied { setopt } for pid=4968 comm="syz.0.615" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 148.683772][ T29] audit: type=1400 audit(148.600:151): avc: denied { write } for pid=4968 comm="syz.0.615" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 148.834784][ T29] audit: type=1400 audit(148.750:152): avc: denied { connect } for pid=4972 comm="syz.0.617" lport=60 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 153.321992][ T4993] SELinux: syz.0.628 (4993) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace. [ 161.546480][ T5116] capability: warning: `syz.0.684' uses 32-bit capabilities (legacy support in use) [ 162.342053][ T29] audit: type=1400 audit(162.260:153): avc: denied { write } for pid=5150 comm="syz.1.701" name="binder-control" dev="binder" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 171.625828][ T29] audit: type=1400 audit(171.540:154): avc: denied { unmount } for pid=3100 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 171.890210][ T29] audit: type=1400 audit(171.810:155): avc: denied { create } for pid=5407 comm="syz.1.828" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 171.895066][ T29] audit: type=1400 audit(171.810:156): avc: denied { connect } for pid=5407 comm="syz.1.828" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 171.902023][ T29] audit: type=1400 audit(171.820:157): avc: denied { ioctl } for pid=5407 comm="syz.1.828" path="socket:[8232]" dev="sockfs" ino=8232 ioctlcmd=0x5411 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 178.874455][ T29] audit: type=1400 audit(178.790:158): avc: denied { mounton } for pid=5615 comm="syz.1.930" path="/478/file0" dev="tmpfs" ino=2459 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 178.880690][ T5616] tmpfs: Unknown parameter '%#' [ 178.881843][ T29] audit: type=1400 audit(178.800:159): avc: denied { remount } for pid=5615 comm="syz.1.930" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 179.350396][ T5633] tmpfs: Unknown parameter '%#' [ 179.579154][ T5644] tmpfs: Unknown parameter '%#' [ 179.666798][ T5649] syz.0.944 calls setitimer() with new_value NULL pointer. Misfeature support will be removed [ 180.227856][ T29] audit: type=1400 audit(180.140:160): avc: denied { setopt } for pid=5667 comm="syz.0.955" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 180.231613][ T29] audit: type=1400 audit(180.150:161): avc: denied { getopt } for pid=5667 comm="syz.0.955" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 180.324899][ T5673] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5673 comm=syz.1.957 [ 183.517620][ T5709] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5709 comm=syz.0.973 [ 183.633058][ T5714] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5714 comm=syz.0.980 [ 187.454181][ T29] audit: type=1400 audit(187.370:162): avc: denied { node_bind } for pid=5760 comm="syz.0.998" saddr=::ffff:224.0.0.1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 193.387842][ T3857] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 193.396340][ T3857] hid-generic 0000:0000:0000.0001: hidraw0: HID v0.00 Device [syz0] on syz0 [ 195.619553][ T29] audit: type=1400 audit(195.540:163): avc: denied { append } for pid=5833 comm="syz.0.1029" name="nullb0" dev="devtmpfs" ino=654 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 199.731929][ T41] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 199.743859][ T41] hid-generic 0000:0000:0000.0002: hidraw0: HID v0.00 Device [syz0] on syz0 [ 200.119491][ T3857] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 200.123701][ T3857] hid-generic 0000:0000:0000.0003: hidraw0: HID v0.00 Device [syz0] on syz0 [ 200.569542][ T29] audit: type=1400 audit(200.490:164): avc: denied { getopt } for pid=5934 comm="syz.0.1072" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 202.106749][ T29] audit: type=1400 audit(202.020:165): avc: denied { create } for pid=5999 comm="syz.1.1099" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 202.114730][ T29] audit: type=1400 audit(202.030:166): avc: denied { read } for pid=5999 comm="syz.1.1099" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 202.325213][ T29] audit: type=1400 audit(202.240:167): avc: denied { ioctl } for pid=6007 comm="syz.0.1103" path="socket:[10251]" dev="sockfs" ino=10251 ioctlcmd=0x4600 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 217.056582][ T29] audit: type=1400 audit(216.970:168): avc: denied { accept } for pid=6284 comm="syz.0.1241" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 219.994544][ T29] audit: type=1400 audit(219.910:169): avc: denied { create } for pid=6345 comm="syz.0.1271" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 220.003478][ T29] audit: type=1400 audit(219.920:170): avc: denied { write } for pid=6345 comm="syz.0.1271" path="socket:[11608]" dev="sockfs" ino=11608 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 233.708949][ T29] audit: type=1400 audit(233.620:171): avc: denied { bind } for pid=6485 comm="syz.0.1338" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 233.983468][ T29] audit: type=1400 audit(233.900:172): avc: denied { map } for pid=6491 comm="syz.0.1341" path="socket:[11065]" dev="sockfs" ino=11065 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tcp_socket permissive=1 [ 660.268498][ C0] watchdog: BUG: soft lockup - CPU#0 stuck for 430s! [swapper/0:0] [ 660.268771][ C0] Modules linked in: [ 660.269834][ C0] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Tainted: G L syzkaller #0 PREEMPT [ 660.270120][ C0] Tainted: [L]=SOFTLOCKUP [ 660.270173][ C0] Hardware name: ARM-Versatile Express [ 660.270411][ C0] PC is at _raw_spin_unlock_irq+0x28/0x54 [ 660.271171][ C0] LR is at tmigr_handle_remote_up+0x218/0x4b0 [ 660.271242][ C0] pc : [<81a8bc8c>] lr : [<8034608c>] psr: 60000113 [ 660.271288][ C0] sp : 82801be0 ip : 82801bf0 fp : 82801bec [ 660.271336][ C0] r10: 00000001 r9 : 8280c9a4 r8 : 00000001 [ 660.271380][ C0] r7 : ddddb488 r6 : 82801cb8 r5 : 830bf3b0 r4 : 830bf380 [ 660.271424][ C0] r3 : 00001b17 r2 : ffffffff r1 : 00000000 r0 : ddddb488 [ 660.271554][ C0] Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment user [ 660.271638][ C0] Control: 30c5387d Table: 85e4bd80 DAC: fffffffd [ 660.271802][ C0] Call trace: [ 660.272089][ C0] [<81a8bc64>] (_raw_spin_unlock_irq) from [<8034608c>] (tmigr_handle_remote_up+0x218/0x4b0) [ 660.272465][ C0] [<80345e74>] (tmigr_handle_remote_up) from [<8034438c>] (__walk_groups_from+0x3c/0xe4) [ 660.272593][ C0] r10:8281b500 r9:8280c820 r8:80345e74 r7:82801cb8 r6:830bf380 r5:00000002 [ 660.272637][ C0] r4:830bf380 [ 660.272661][ C0] [<80344350>] (__walk_groups_from) from [<80346724>] (tmigr_handle_remote+0xe8/0x108) [ 660.272736][ C0] r9:82804d80 r8:00000102 r7:00000001 r6:00000002 r5:00000002 r4:dddc7488 [ 660.272759][ C0] [<8034663c>] (tmigr_handle_remote) from [<803268f8>] (run_timer_softirq+0x30/0x34) [ 660.272836][ C0] r4:82804084 [ 660.272856][ C0] [<803268c8>] (run_timer_softirq) from [<8025aeb8>] (handle_softirqs+0x140/0x458) [ 660.272922][ C0] [<8025ad78>] (handle_softirqs) from [<8025b32c>] (__irq_exit_rcu+0x110/0x1d0) [ 660.272992][ C0] r10:00000000 r9:8281b500 r8:00000000 r7:82801dd8 r6:82442b28 r5:8247dd4c [ 660.273014][ C0] r4:8281b500 [ 660.273031][ C0] [<8025b21c>] (__irq_exit_rcu) from [<8025b6a4>] (irq_exit+0x10/0x18) [ 660.273105][ C0] r5:8247dd4c r4:826c2a9c [ 660.273125][ C0] [<8025b694>] (irq_exit) from [<81a7d8c4>] (generic_handle_arch_irq+0x7c/0x80) [ 660.273187][ C0] [<81a7d848>] (generic_handle_arch_irq) from [<80200bdc>] (__irq_svc+0x7c/0xbc) [ 660.273322][ C0] Exception stack(0x82801dd8 to 0x82801e20) [ 660.273502][ C0] 1dc0: 00000001 00000000 [ 660.273563][ C0] 1de0: 000011fe 000011fc 840fa968 00000004 00000001 840fa968 8428c688 840fa840 [ 660.273602][ C0] 1e00: 00000000 82801e3c 82801e28 82801e28 81a8be1c 81a8be44 80000013 ffffffff [ 660.273678][ C0] r9:8281b500 r8:8428c688 r7:82801e0c r6:ffffffff r5:80000013 r4:81a8be44 [ 660.273701][ C0] [<81a8be04>] (_raw_spin_lock) from [<809c4ab0>] (gpio_mmio_set+0x44/0x80) [ 660.273782][ C0] r5:00000004 r4:840fa840 [ 660.273802][ C0] [<809c4a6c>] (gpio_mmio_set) from [<809b543c>] (gpiochip_set+0x1c/0x44) [ 660.273880][ C0] r7:00000001 r6:00000000 r5:00000002 r4:84269028 [ 660.273900][ C0] [<809b5420>] (gpiochip_set) from [<809b7c54>] (gpiod_set_raw_value_commit+0x78/0x218) [ 660.273960][ C0] [<809b7bdc>] (gpiod_set_raw_value_commit) from [<809b94f4>] (gpiod_set_value_nocheck+0x44/0x58) [ 660.274031][ C0] r10:00000000 r9:00000000 r8:00000001 r7:dddce4c0 r6:838a6558 r5:00000001 [ 660.274052][ C0] r4:84269028 [ 660.274071][ C0] [<809b94b0>] (gpiod_set_value_nocheck) from [<809b9544>] (gpiod_set_value+0x3c/0x88) [ 660.274146][ C0] [<809b9508>] (gpiod_set_value) from [<809c9bac>] (gpio_led_set+0x5c/0x60) [ 660.274207][ C0] r5:000000ff r4:845e0a24 [ 660.274226][ C0] [<809c9b50>] (gpio_led_set) from [<809c74e8>] (led_set_brightness+0x84/0x90) [ 660.274282][ C0] r5:000000ff r4:845e0a24 [ 660.274309][ C0] [<809c7464>] (led_set_brightness) from [<809c9054>] (led_trigger_event+0x40/0x58) [ 660.274369][ C0] r5:000000ff r4:845e0a24 [ 660.274388][ C0] [<809c9014>] (led_trigger_event) from [<809ca6b0>] (ledtrig_cpu+0xac/0xf4) [ 660.274449][ C0] r7:dddce4c0 r6:00000002 r5:82b15cd8 r4:000001fd [ 660.274470][ C0] [<809ca604>] (ledtrig_cpu) from [<80227758>] (arch_cpu_idle_exit+0x14/0x18) [ 660.274541][ C0] r9:00000000 r8:00000000 r7:8280c710 r6:8281b500 r5:8280c6d0 r4:00000000 [ 660.274560][ C0] [<80227744>] (arch_cpu_idle_exit) from [<802b0e84>] (do_idle+0x5c/0x2d8) [ 660.274625][ C0] [<802b0e28>] (do_idle) from [<802b1430>] (cpu_startup_entry+0x30/0x34) [ 660.274699][ C0] r10:8281aff4 r9:823bd7d4 r8:00000000 r7:8280c680 r6:deffc06c r5:828222e8 [ 660.274721][ C0] r4:000000ed [ 660.274738][ C0] [<802b1400>] (cpu_startup_entry) from [<81a7f2dc>] (kernel_init+0x0/0x138) [ 660.274805][ C0] [<81a7f1fc>] (rest_init) from [<82601338>] (start_kernel+0x738/0x754) [ 660.274922][ C0] [<82600c00>] (start_kernel) from [<00000000>] (0x0) [ 660.275679][ C0] Sending NMI from CPU 0 to CPUs 1: [ 660.276523][ C1] NMI backtrace for cpu 1 [ 660.276789][ C1] CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Tainted: G L syzkaller #0 PREEMPT [ 660.276884][ C1] Tainted: [L]=SOFTLOCKUP [ 660.276905][ C1] Hardware name: ARM-Versatile Express [ 660.276932][ C1] PC is at _raw_spin_lock+0x40/0x58 [ 660.277019][ C1] LR is at _raw_spin_lock+0x18/0x58 [ 660.277054][ C1] pc : [<81a8be44>] lr : [<81a8be1c>] psr: 80000113 [ 660.277081][ C1] sp : df805d68 ip : df805d68 fp : df805d7c [ 660.277103][ C1] r10: 81c05450 r9 : 840fa840 r8 : 8428c688 [ 660.277123][ C1] r7 : 840fa968 r6 : 00000001 r5 : 00000001 r4 : 840fa968 [ 660.277146][ C1] r3 : 000011fc r2 : 000011fd r1 : 00000000 r0 : 00000001 [ 660.277171][ C1] Flags: Nzcv IRQs on FIQs on Mode SVC_32 ISA ARM Segment none [ 660.277214][ C1] Control: 30c5387d Table: 851b4fc0 DAC: 00000000 [ 660.277237][ C1] Call trace: frame pointer underflow [ 660.277345][ C1] [<81a8be04>] (_raw_spin_lock) from [<809c4ab0>] (gpio_mmio_set+0x44/0x80) [ 660.277433][ C1] r5:00000001 r4:840fa840 [ 660.277457][ C1] [<809c4a6c>] (gpio_mmio_set) from [<809b543c>] (gpiochip_set+0x1c/0x44) [ 660.277535][ C1] r7:00000001 r6:00000000 r5:00000000 r4:84269000 [ 660.277556][ C1] [<809b5420>] (gpiochip_set) from [<809b7c54>] (gpiod_set_raw_value_commit+0x78/0x218) [ 660.277618][ C1] [<809b7bdc>] (gpiod_set_raw_value_commit) from [<809b94f4>] (gpiod_set_value_nocheck+0x44/0x58) [ 660.277691][ C1] r10:81c05450 r9:df805ebc r8:00000102 r7:ffffe80f r6:00000007 r5:00000001 [ 660.277713][ C1] r4:84269000 [ 660.277731][ C1] [<809b94b0>] (gpiod_set_value_nocheck) from [<809b9544>] (gpiod_set_value+0x3c/0x88) [ 660.277785][ C1] [<809b9508>] (gpiod_set_value) from [<809c9bac>] (gpio_led_set+0x5c/0x60) [ 660.277864][ C1] r5:845e0844 r4:845e0844 [ 660.277885][ C1] [<809c9b50>] (gpio_led_set) from [<809c7458>] (led_set_brightness_nosleep+0x38/0x44) [ 660.277943][ C1] r5:845e0844 r4:8461ab8c [ 660.277962][ C1] [<809c7420>] (led_set_brightness_nosleep) from [<809ca4a8>] (led_heartbeat_function+0x84/0x144) [ 660.278012][ C1] [<809ca424>] (led_heartbeat_function) from [<80326268>] (call_timer_fn+0x30/0x220) [ 660.278085][ C1] r7:ffffe80f r6:809ca424 r5:8461ab8c r4:83216000 [ 660.278107][ C1] [<80326238>] (call_timer_fn) from [<8032671c>] (__run_timers+0x2c4/0x3f8) [ 660.278174][ C1] r9:df805ebc r8:ffffe80f r7:00000000 r6:809ca424 r5:dddd9f00 r4:8461ab8c [ 660.278193][ C1] [<80326458>] (__run_timers) from [<803268b8>] (run_timer_base+0x68/0x78) [ 660.278258][ C1] r10:83216000 r9:82804d80 r8:00000102 r7:00000001 r6:00000082 r5:00000002 [ 660.278277][ C1] r4:dddd9f00 [ 660.278292][ C1] [<80326850>] (run_timer_base) from [<803268e4>] (run_timer_softirq+0x1c/0x34) [ 660.278345][ C1] r4:82804084 [ 660.278359][ C1] [<803268c8>] (run_timer_softirq) from [<8025aeb8>] (handle_softirqs+0x140/0x458) [ 660.278421][ C1] [<8025ad78>] (handle_softirqs) from [<8025b32c>] (__irq_exit_rcu+0x110/0x1d0) [ 660.278491][ C1] r10:00000000 r9:83216000 r8:00000000 r7:df865e08 r6:82442b28 r5:8247dd4c [ 660.278512][ C1] r4:83216000 [ 660.278526][ C1] [<8025b21c>] (__irq_exit_rcu) from [<8025b6a4>] (irq_exit+0x10/0x18) [ 660.278583][ C1] r5:8247dd4c r4:826c2a9c [ 660.278601][ C1] [<8025b694>] (irq_exit) from [<81a7d8c4>] (generic_handle_arch_irq+0x7c/0x80) [ 660.278665][ C1] [<81a7d848>] (generic_handle_arch_irq) from [<81a4d9a4>] (call_with_stack+0x1c/0x20) [ 660.278744][ C1] r9:83216000 r8:8428c688 r7:df865e3c r6:ffffffff r5:60000013 r4:809c52b0 [ 660.278764][ C1] [<81a4d988>] (call_with_stack) from [<80200bec>] (__irq_svc+0x8c/0xbc) [ 660.278831][ C1] Exception stack(0xdf865e08 to 0xdf865e50) [ 660.278886][ C1] 5e00: e00e5008 00000008 000011fc 00000000 e00e5008 00000008 [ 660.278923][ C1] 5e20: 00000001 840fa968 8428c688 840fa840 00000000 df865e6c df865e58 df865e58 [ 660.278951][ C1] 5e40: 809c52ac 809c52b0 60000013 ffffffff [ 660.278973][ C1] [<809c5290>] (gpio_mmio_write32) from [<809c4ad0>] (gpio_mmio_set+0x64/0x80) [ 660.279038][ C1] r5:00000008 r4:840fa840 [ 660.279057][ C1] [<809c4a6c>] (gpio_mmio_set) from [<809b543c>] (gpiochip_set+0x1c/0x44) [ 660.279126][ C1] r7:00000001 r6:00000000 r5:00000003 r4:8426903c [ 660.279144][ C1] [<809b5420>] (gpiochip_set) from [<809b7c54>] (gpiod_set_raw_value_commit+0x78/0x218) [ 660.279200][ C1] [<809b7bdc>] (gpiod_set_raw_value_commit) from [<809b94f4>] (gpiod_set_value_nocheck+0x44/0x58) [ 660.279265][ C1] r10:00000000 r9:00000000 r8:00000001 r7:ddde24c0 r6:838a6598 r5:00000001 [ 660.279287][ C1] r4:8426903c [ 660.279305][ C1] [<809b94b0>] (gpiod_set_value_nocheck) from [<809b9544>] (gpiod_set_value+0x3c/0x88) [ 660.279353][ C1] [<809b9508>] (gpiod_set_value) from [<809c9bac>] (gpio_led_set+0x5c/0x60) [ 660.279403][ C1] r5:000000ff r4:845e0b14 [ 660.279419][ C1] [<809c9b50>] (gpio_led_set) from [<809c74e8>] (led_set_brightness+0x84/0x90) [ 660.279476][ C1] r5:000000ff r4:845e0b14 [ 660.279494][ C1] [<809c7464>] (led_set_brightness) from [<809c9054>] (led_trigger_event+0x40/0x58) [ 660.279553][ C1] r5:000000ff r4:845e0b14 [ 660.279574][ C1] [<809c9014>] (led_trigger_event) from [<809ca6b0>] (ledtrig_cpu+0xac/0xf4) [ 660.279637][ C1] r7:ddde24c0 r6:00000002 r5:82b15cd8 r4:000000fe [ 660.279692][ C1] [<809ca604>] (ledtrig_cpu) from [<80227758>] (arch_cpu_idle_exit+0x14/0x18) [ 660.279773][ C1] r9:00000000 r8:00000001 r7:8280c710 r6:83216000 r5:8280c6d0 r4:00000001 [ 660.279795][ C1] [<80227744>] (arch_cpu_idle_exit) from [<802b0e84>] (do_idle+0x5c/0x2d8) [ 660.279871][ C1] [<802b0e28>] (do_idle) from [<802b1430>] (cpu_startup_entry+0x30/0x34) [ 660.279944][ C1] r10:00000000 r9:414fc0f0 r8:80003000 r7:82a7b4a4 r6:83216000 r5:00000001 [ 660.279965][ C1] r4:00000092 [ 660.279983][ C1] [<802b1400>] (cpu_startup_entry) from [<8022f04c>] (secondary_start_kernel+0x128/0x180) [ 660.280040][ C1] [<8022ef24>] (secondary_start_kernel) from [<80220094>] (__enable_mmu+0x0/0xc) [ 660.280113][ C1] r7:82a7b4a4 r6:30c0387d r5:00000000 r4:830b7bc0 [ 660.281810][ C0] Kernel panic - not syncing: softlockup: hung tasks [ 660.315039][ C0] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Tainted: G L syzkaller #0 PREEMPT [ 660.315454][ C0] Tainted: [L]=SOFTLOCKUP [ 660.315629][ C0] Hardware name: ARM-Versatile Express [ 660.315898][ C0] Call trace: [ 660.316167][ C0] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 660.316492][ C0] r7:82295294 r6:8281b500 r5:00000000 r4:82294458 [ 660.316740][ C0] [<80201b08>] (show_stack) from [<8021ec54>] (dump_stack_lvl+0x54/0x7c) [ 660.317043][ C0] [<8021ec00>] (dump_stack_lvl) from [<8021ec94>] (dump_stack+0x18/0x1c) [ 660.317359][ C0] r5:00000000 r4:82a7bd14 [ 660.317523][ C0] [<8021ec7c>] (dump_stack) from [<802025f8>] (vpanic+0xe0/0x2e8) [ 660.317813][ C0] [<80202518>] (vpanic) from [<80202834>] (trace_suspend_resume+0x0/0xd8) [ 660.318133][ C0] r7:82ac27f0 [ 660.318275][ C0] [<80202800>] (panic) from [<8038317c>] (watchdog_timer_fn+0x2bc/0x330) [ 660.318588][ C0] r3:00000001 r2:00004000 r1:82a7bd1c r0:82295294 [ 660.318812][ C0] [<80382ec0>] (watchdog_timer_fn) from [<80328e5c>] (__hrtimer_run_queues+0x1c4/0x454) [ 660.319191][ C0] r10:8281b500 r9:00000000 r8:dddc7130 r7:80382ec0 r6:dddc7000 r5:dddc7040 [ 660.319462][ C0] r4:dddc75d8 [ 660.319610][ C0] [<80328c98>] (__hrtimer_run_queues) from [<8032a460>] (hrtimer_interrupt+0x148/0x2bc) [ 660.320000][ C0] r10:b6663be0 r9:dddc7180 r8:dddc7130 r7:00000099 r6:00000003 r5:20000193 [ 660.320280][ C0] r4:dddc7000 [ 660.320426][ C0] [<8032a318>] (hrtimer_interrupt) from [<8131e118>] (arch_timer_handler_virt+0x30/0x38) [ 660.320786][ C0] r10:81d0f874 r9:8309e400 r8:00000000 r7:00000000 r6:00000000 r5:82497528 [ 660.321060][ C0] r4:8309de40 [ 660.321213][ C0] [<8131e0e8>] (arch_timer_handler_virt) from [<802ef008>] (handle_percpu_devid_irq+0x128/0x34c) [ 660.321566][ C0] [<802eeee0>] (handle_percpu_devid_irq) from [<802e81ac>] (handle_irq_desc+0x74/0x84) [ 660.321921][ C0] r10:00000001 r9:8281b500 r8:00000000 r7:df80a00c r6:826c1388 r5:df80a000 [ 660.322244][ C0] r4:8280cc44 [ 660.322390][ C0] [<802e8138>] (handle_irq_desc) from [<802e8228>] (generic_handle_domain_irq+0x18/0x1c) [ 660.322732][ C0] [<802e8210>] (generic_handle_domain_irq) from [<802012c8>] (gic_handle_irq+0x68/0x7c) [ 660.323087][ C0] [<80201260>] (gic_handle_irq) from [<81a7d8a8>] (generic_handle_arch_irq+0x60/0x80) [ 660.323438][ C0] r7:82801b90 r6:82442b28 r5:8247dd4c r4:826c2a9c [ 660.323678][ C0] [<81a7d848>] (generic_handle_arch_irq) from [<80200bdc>] (__irq_svc+0x7c/0xbc) [ 660.324003][ C0] Exception stack(0x82801b90 to 0x82801bd8) [ 660.324228][ C0] 1b80: ddddb488 00000000 ffffffff 00001b17 [ 660.324527][ C0] 1ba0: 830bf380 830bf3b0 82801cb8 ddddb488 00000001 8280c9a4 00000001 82801bec [ 660.324821][ C0] 1bc0: 82801bf0 82801be0 8034608c 81a8bc8c 60000113 ffffffff [ 660.325091][ C0] r9:8281b500 r8:00000001 r7:82801bc4 r6:ffffffff r5:60000113 r4:81a8bc8c [ 660.325345][ C0] [<81a8bc64>] (_raw_spin_unlock_irq) from [<8034608c>] (tmigr_handle_remote_up+0x218/0x4b0) [ 660.325690][ C0] [<80345e74>] (tmigr_handle_remote_up) from [<8034438c>] (__walk_groups_from+0x3c/0xe4) [ 660.326034][ C0] r10:8281b500 r9:8280c820 r8:80345e74 r7:82801cb8 r6:830bf380 r5:00000002 [ 660.326296][ C0] r4:830bf380 [ 660.326433][ C0] [<80344350>] (__walk_groups_from) from [<80346724>] (tmigr_handle_remote+0xe8/0x108) [ 660.326775][ C0] r9:82804d80 r8:00000102 r7:00000001 r6:00000002 r5:00000002 r4:dddc7488 [ 660.327018][ C0] [<8034663c>] (tmigr_handle_remote) from [<803268f8>] (run_timer_softirq+0x30/0x34) [ 660.327350][ C0] r4:82804084 [ 660.327492][ C0] [<803268c8>] (run_timer_softirq) from [<8025aeb8>] (handle_softirqs+0x140/0x458) [ 660.327853][ C0] [<8025ad78>] (handle_softirqs) from [<8025b32c>] (__irq_exit_rcu+0x110/0x1d0) [ 660.328213][ C0] r10:00000000 r9:8281b500 r8:00000000 r7:82801dd8 r6:82442b28 r5:8247dd4c [ 660.328484][ C0] r4:8281b500 [ 660.328630][ C0] [<8025b21c>] (__irq_exit_rcu) from [<8025b6a4>] (irq_exit+0x10/0x18) [ 660.328937][ C0] r5:8247dd4c r4:826c2a9c [ 660.329120][ C0] [<8025b694>] (irq_exit) from [<81a7d8c4>] (generic_handle_arch_irq+0x7c/0x80) [ 660.329445][ C0] [<81a7d848>] (generic_handle_arch_irq) from [<80200bdc>] (__irq_svc+0x7c/0xbc) [ 660.329761][ C0] Exception stack(0x82801dd8 to 0x82801e20) [ 660.330244][ C0] 1dc0: 00000001 00000000 [ 660.330821][ C0] 1de0: 000011fe 000011fc 840fa968 00000004 00000001 840fa968 8428c688 840fa840 [ 660.331131][ C0] 1e00: 00000000 82801e3c 82801e28 82801e28 81a8be1c 81a8be44 80000013 ffffffff [ 660.331415][ C0] r9:8281b500 r8:8428c688 r7:82801e0c r6:ffffffff r5:80000013 r4:81a8be44 [ 660.331717][ C0] [<81a8be04>] (_raw_spin_lock) from [<809c4ab0>] (gpio_mmio_set+0x44/0x80) [ 660.332047][ C0] r5:00000004 r4:840fa840 [ 660.332267][ C0] [<809c4a6c>] (gpio_mmio_set) from [<809b543c>] (gpiochip_set+0x1c/0x44) [ 660.332595][ C0] r7:00000001 r6:00000000 r5:00000002 r4:84269028 [ 660.332809][ C0] [<809b5420>] (gpiochip_set) from [<809b7c54>] (gpiod_set_raw_value_commit+0x78/0x218) [ 660.333163][ C0] [<809b7bdc>] (gpiod_set_raw_value_commit) from [<809b94f4>] (gpiod_set_value_nocheck+0x44/0x58) [ 660.333533][ C0] r10:00000000 r9:00000000 r8:00000001 r7:dddce4c0 r6:838a6558 r5:00000001 [ 660.333799][ C0] r4:84269028 [ 660.333946][ C0] [<809b94b0>] (gpiod_set_value_nocheck) from [<809b9544>] (gpiod_set_value+0x3c/0x88) [ 660.334303][ C0] [<809b9508>] (gpiod_set_value) from [<809c9bac>] (gpio_led_set+0x5c/0x60) [ 660.334625][ C0] r5:000000ff r4:845e0a24 [ 660.334787][ C0] [<809c9b50>] (gpio_led_set) from [<809c74e8>] (led_set_brightness+0x84/0x90) [ 660.335131][ C0] r5:000000ff r4:845e0a24 [ 660.335296][ C0] [<809c7464>] (led_set_brightness) from [<809c9054>] (led_trigger_event+0x40/0x58) [ 660.335625][ C0] r5:000000ff r4:845e0a24 [ 660.335832][ C0] [<809c9014>] (led_trigger_event) from [<809ca6b0>] (ledtrig_cpu+0xac/0xf4) [ 660.336142][ C0] r7:dddce4c0 r6:00000002 r5:82b15cd8 r4:000001fd [ 660.336333][ C0] [<809ca604>] (ledtrig_cpu) from [<80227758>] (arch_cpu_idle_exit+0x14/0x18) [ 660.336682][ C0] r9:00000000 r8:00000000 r7:8280c710 r6:8281b500 r5:8280c6d0 r4:00000000 [ 660.336951][ C0] [<80227744>] (arch_cpu_idle_exit) from [<802b0e84>] (do_idle+0x5c/0x2d8) [ 660.337260][ C0] [<802b0e28>] (do_idle) from [<802b1430>] (cpu_startup_entry+0x30/0x34) [ 660.337566][ C0] r10:8281aff4 r9:823bd7d4 r8:00000000 r7:8280c680 r6:deffc06c r5:828222e8 [ 660.337837][ C0] r4:000000ed [ 660.337984][ C0] [<802b1400>] (cpu_startup_entry) from [<81a7f2dc>] (kernel_init+0x0/0x138) [ 660.338324][ C0] [<81a7f1fc>] (rest_init) from [<82601338>] (start_kernel+0x738/0x754) [ 660.338644][ C0] [<82600c00>] (start_kernel) from [<00000000>] (0x0) [ 660.341383][ C0] Rebooting in 86400 seconds..