last executing test programs: 5.400835494s ago: executing program 1 (id=1448): r0 = msgget$private(0x0, 0x0) msgsnd(r0, &(0x7f0000000fc0)={0x1}, 0x8, 0x0) msgrcv(r0, &(0x7f0000001080)={0x0, ""/53}, 0x3d, 0x1, 0x800) 5.327176863s ago: executing program 1 (id=1449): r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) write$P9_RXATTRCREATE(r0, 0x0, 0x0) 2.770027468s ago: executing program 1 (id=1452): r0 = socket$xdp(0x2c, 0x3, 0x0) r1 = dup(r0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x40) 2.660429082s ago: executing program 1 (id=1453): r0 = msgget$private(0x0, 0x0) msgsnd(r0, &(0x7f0000000fc0)={0x1}, 0x8, 0x0) msgrcv(r0, &(0x7f0000001080)={0x0, ""/53}, 0x3d, 0x1, 0x800) 2.550539016s ago: executing program 1 (id=1455): r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000200)='attr/keycreate\x00') exit(0xffff) write$RDMA_USER_CM_CMD_GET_EVENT(r0, 0x0, 0x0) 1.970817619s ago: executing program 0 (id=1463): gettid() timer_create(0x0, 0x0, &(0x7f0000bbdffc)=0x0) timer_gettime(r0, &(0x7f0000000000)) 1.879847531s ago: executing program 0 (id=1464): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) ioctl$sock_SIOCOUTQ(r0, 0x5411, 0x0) 1.800658551s ago: executing program 0 (id=1465): openat$sequencer(0xffffff9c, &(0x7f0000000100), 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$USBDEVFS_ALLOC_STREAMS(r0, 0x8008551c, 0x0) 1.710468182s ago: executing program 0 (id=1466): r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$inet_group_source_req(r0, 0x0, 0x2c, &(0x7f00000004c0)={0x2, {{0x2, 0x0, @multicast2}}, {{0x2, 0x0, @empty}}}, 0x104) 1.700502423s ago: executing program 0 (id=1467): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = dup2(r0, r0) sendmsg$NFNL_MSG_ACCT_DEL(r1, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)={0x14, 0x3, 0x7, 0x101, 0x0, 0x0, {0x0, 0x0, 0x7}}, 0x14}, 0x1, 0x0, 0x0, 0x4010}, 0x2) 9.534548ms ago: executing program 1 (id=1468): r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000180)=@l2tp6={0xa, 0x0, 0x0, @remote, 0x5}, 0x80, 0x0}, 0x20000000) sendmsg$kcm(r0, &(0x7f0000002ec0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86a9}, 0x20000000) 0s ago: executing program 0 (id=1472): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = dup2(r0, r0) sendmsg$NFNL_MSG_ACCT_DEL(r1, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)={0x14, 0x3, 0x7, 0x101, 0x0, 0x0, {0x0, 0x0, 0x7}}, 0x14}, 0x1, 0x0, 0x0, 0x4010}, 0x2) kernel console output (not intermixed with test programs): [ 46.954769][ T29] audit: type=1400 audit(46.860:56): avc: denied { read write } for pid=3087 comm="sftp-server" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 46.958305][ T29] audit: type=1400 audit(46.860:57): avc: denied { open } for pid=3087 comm="sftp-server" path="/dev/null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 Warning: Permanently added '[localhost]:64161' (ED25519) to the list of known hosts. [ 60.554194][ T29] audit: type=1400 audit(60.460:58): avc: denied { name_bind } for pid=3090 comm="sshd-session" src=30000 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 62.028314][ T29] audit: type=1400 audit(61.930:59): avc: denied { execute } for pid=3091 comm="sh" name="syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 62.071481][ T29] audit: type=1400 audit(61.970:60): avc: denied { execute_no_trans } for pid=3091 comm="sh" path="/syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 65.515602][ T29] audit: type=1400 audit(65.420:61): avc: denied { mounton } for pid=3091 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=806 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 65.522326][ T29] audit: type=1400 audit(65.430:62): avc: denied { mount } for pid=3091 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 65.538908][ T3091] cgroup: Unknown subsys name 'net' [ 65.549187][ T29] audit: type=1400 audit(65.450:63): avc: denied { unmount } for pid=3091 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 65.754513][ T3091] cgroup: Unknown subsys name 'cpuset' [ 65.760121][ T3091] cgroup: Unknown subsys name 'hugetlb' [ 65.761077][ T3091] cgroup: Unknown subsys name 'rlimit' [ 65.983240][ T29] audit: type=1400 audit(65.890:64): avc: denied { setattr } for pid=3091 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 65.988052][ T29] audit: type=1400 audit(65.890:65): avc: denied { mounton } for pid=3091 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 65.992189][ T29] audit: type=1400 audit(65.900:66): avc: denied { mount } for pid=3091 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 66.189204][ T3093] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 66.190548][ T29] audit: type=1400 audit(66.100:67): avc: denied { relabelto } for pid=3093 comm="mkswap" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 66.194852][ T29] audit: type=1400 audit(66.100:68): avc: denied { write } for pid=3093 comm="mkswap" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 66.234533][ T29] audit: type=1400 audit(66.140:69): avc: denied { read } for pid=3091 comm="syz-executor" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 66.238256][ T29] audit: type=1400 audit(66.140:70): avc: denied { open } for pid=3091 comm="syz-executor" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 73.190563][ T3091] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 74.788751][ T29] audit: type=1400 audit(74.700:71): avc: denied { execmem } for pid=3094 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 74.855043][ T29] audit: type=1400 audit(74.760:72): avc: denied { read } for pid=3096 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 74.859864][ T29] audit: type=1400 audit(74.770:73): avc: denied { open } for pid=3096 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 74.865013][ T29] audit: type=1400 audit(74.770:74): avc: denied { mounton } for pid=3096 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 74.907325][ T29] audit: type=1400 audit(74.810:75): avc: denied { module_request } for pid=3096 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 74.978354][ T29] audit: type=1400 audit(74.890:76): avc: denied { sys_module } for pid=3096 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 75.493490][ T29] audit: type=1400 audit(75.400:77): avc: denied { ioctl } for pid=3096 comm="syz-executor" path="/dev/net/tun" dev="devtmpfs" ino=677 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 76.471705][ T3096] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 76.482115][ T3096] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 76.594589][ T3097] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 76.609418][ T3097] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 77.141985][ T3096] hsr_slave_0: entered promiscuous mode [ 77.145557][ T3096] hsr_slave_1: entered promiscuous mode [ 77.292383][ T3097] hsr_slave_0: entered promiscuous mode [ 77.293864][ T3097] hsr_slave_1: entered promiscuous mode [ 77.295085][ T3097] debugfs: 'hsr0' already exists in 'hsr' [ 77.295570][ T3097] Cannot create hsr debugfs directory [ 77.612651][ T29] audit: type=1400 audit(77.520:78): avc: denied { create } for pid=3096 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 77.617607][ T29] audit: type=1400 audit(77.520:79): avc: denied { write } for pid=3096 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 77.619199][ T29] audit: type=1400 audit(77.520:80): avc: denied { read } for pid=3096 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 77.633777][ T3096] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 77.651209][ T3096] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 77.664935][ T3096] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 77.676356][ T3096] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 77.782030][ T3097] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 77.792593][ T3097] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 77.810662][ T3097] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 77.816726][ T3097] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 78.420240][ T3096] 8021q: adding VLAN 0 to HW filter on device bond0 [ 78.499166][ T3097] 8021q: adding VLAN 0 to HW filter on device bond0 [ 81.038808][ T3096] veth0_vlan: entered promiscuous mode [ 81.062641][ T3096] veth1_vlan: entered promiscuous mode [ 81.121093][ T3096] veth0_macvtap: entered promiscuous mode [ 81.131942][ T3096] veth1_macvtap: entered promiscuous mode [ 81.210220][ T12] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 81.211758][ T12] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 81.212873][ T12] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 81.213971][ T12] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 81.354701][ T29] audit: type=1400 audit(81.260:81): avc: denied { mount } for pid=3096 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 81.378945][ T29] audit: type=1400 audit(81.280:82): avc: denied { mounton } for pid=3096 comm="syz-executor" path="/syzkaller.kh6zFU/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 81.383043][ T29] audit: type=1400 audit(81.290:83): avc: denied { mount } for pid=3096 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 81.415332][ T3097] veth0_vlan: entered promiscuous mode [ 81.416364][ T29] audit: type=1400 audit(81.320:84): avc: denied { mounton } for pid=3096 comm="syz-executor" path="/syzkaller.kh6zFU/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 81.425700][ T29] audit: type=1400 audit(81.330:85): avc: denied { mounton } for pid=3096 comm="syz-executor" path="/syzkaller.kh6zFU/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=2530 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 81.442807][ T3097] veth1_vlan: entered promiscuous mode [ 81.453359][ T29] audit: type=1400 audit(81.360:86): avc: denied { unmount } for pid=3096 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 81.465565][ T29] audit: type=1400 audit(81.370:87): avc: denied { mounton } for pid=3096 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=772 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 81.471227][ T29] audit: type=1400 audit(81.370:88): avc: denied { mount } for pid=3096 comm="syz-executor" name="/" dev="gadgetfs" ino=2531 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 81.474114][ T29] audit: type=1400 audit(81.380:89): avc: denied { mount } for pid=3096 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 81.477464][ T29] audit: type=1400 audit(81.380:90): avc: denied { mounton } for pid=3096 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 81.548475][ T3097] veth0_macvtap: entered promiscuous mode [ 81.551696][ T3096] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 81.558376][ T3097] veth1_macvtap: entered promiscuous mode [ 81.612795][ T1987] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 81.613021][ T1987] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 81.614021][ T1987] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 81.614084][ T1987] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 82.550468][ T3732] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1542 sclass=netlink_route_socket pid=3732 comm=syz.1.14 [ 83.736082][ T3785] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3785 comm=syz.0.41 [ 83.881571][ T3792] Zero length message leads to an empty skb [ 84.754291][ T3827] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=3827 comm=syz.1.61 [ 84.836742][ T3830] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 86.788032][ T3923] capability: warning: `syz.1.109' uses deprecated v2 capabilities in a way that may be insecure [ 86.880221][ T29] kauditd_printk_skb: 27 callbacks suppressed [ 86.881167][ T29] audit: type=1400 audit(86.790:118): avc: denied { create } for pid=3925 comm="syz.0.110" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 86.893664][ T29] audit: type=1400 audit(86.800:119): avc: denied { ioctl } for pid=3925 comm="syz.0.110" path="socket:[2979]" dev="sockfs" ino=2979 ioctlcmd=0x4b45 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 86.953024][ T29] audit: type=1400 audit(86.860:120): avc: denied { write } for pid=3930 comm="syz.0.113" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 87.868773][ T3957] capability: warning: `syz.1.126' uses 32-bit capabilities (legacy support in use) [ 88.603648][ T29] audit: type=1400 audit(88.510:121): avc: denied { create } for pid=3974 comm="syz.1.135" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 88.612204][ T29] audit: type=1400 audit(88.520:122): avc: denied { write } for pid=3974 comm="syz.1.135" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 88.618211][ T29] audit: type=1400 audit(88.530:123): avc: denied { read } for pid=3974 comm="syz.1.135" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 88.684742][ T3977] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2304 sclass=netlink_route_socket pid=3977 comm=syz.1.136 [ 89.210445][ T29] audit: type=1400 audit(89.120:124): avc: denied { ioctl } for pid=3989 comm="syz.1.142" path="socket:[3340]" dev="sockfs" ino=3340 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 89.290243][ T29] audit: type=1400 audit(89.200:125): avc: denied { lock } for pid=3991 comm="syz.1.143" path="/dev/userio" dev="devtmpfs" ino=694 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 89.458445][ T29] audit: type=1400 audit(89.370:126): avc: denied { create } for pid=3995 comm="syz.1.145" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 89.464680][ T29] audit: type=1400 audit(89.370:127): avc: denied { setopt } for pid=3995 comm="syz.1.145" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 92.538938][ T29] kauditd_printk_skb: 1 callbacks suppressed [ 92.542549][ T29] audit: type=1400 audit(92.450:129): avc: denied { create } for pid=4083 comm="syz.0.188" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 92.549266][ T29] audit: type=1400 audit(92.460:130): avc: denied { write } for pid=4083 comm="syz.0.188" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 92.556481][ T29] audit: type=1400 audit(92.460:131): avc: denied { read } for pid=4083 comm="syz.0.188" path="socket:[3454]" dev="sockfs" ino=3454 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 92.657118][ T29] audit: type=1400 audit(92.560:132): avc: denied { connect } for pid=4087 comm="syz.0.190" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 92.807613][ T29] audit: type=1400 audit(92.710:133): avc: denied { map } for pid=4097 comm="syz.0.195" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=4361 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 92.810167][ T29] audit: type=1400 audit(92.710:134): avc: denied { read write } for pid=4097 comm="syz.0.195" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=4361 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 93.085374][ T29] audit: type=1400 audit(92.990:135): avc: denied { write } for pid=4107 comm="syz.1.200" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 93.782425][ T29] audit: type=1400 audit(93.690:136): avc: denied { lock } for pid=4126 comm="syz.1.209" path="socket:[3525]" dev="sockfs" ino=3525 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 94.229044][ T29] audit: type=1400 audit(94.130:137): avc: denied { write } for pid=4139 comm="syz.1.215" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 94.560572][ T29] audit: type=1400 audit(94.470:138): avc: denied { setopt } for pid=4152 comm="syz.1.221" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 97.633181][ T29] kauditd_printk_skb: 3 callbacks suppressed [ 97.637564][ T29] audit: type=1400 audit(97.540:142): avc: denied { map_create } for pid=4243 comm="syz.0.265" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 97.640063][ T29] audit: type=1400 audit(97.550:143): avc: denied { perfmon } for pid=4243 comm="syz.0.265" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 97.643627][ T29] audit: type=1400 audit(97.550:144): avc: denied { map_read map_write } for pid=4243 comm="syz.0.265" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 97.962914][ T29] audit: type=1400 audit(97.870:145): avc: denied { read } for pid=4255 comm="syz.1.272" name="binder-control" dev="binder" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 97.963304][ T29] audit: type=1400 audit(97.870:146): avc: denied { open } for pid=4255 comm="syz.1.272" path="/dev/binderfs/binder-control" dev="binder" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 98.194835][ T4266] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4266 comm=syz.0.276 [ 98.484922][ T29] audit: type=1400 audit(98.390:147): avc: denied { write } for pid=4277 comm="syz.0.282" path="socket:[3808]" dev="sockfs" ino=3808 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sock_file permissive=1 [ 99.176760][ T29] audit: type=1400 audit(99.080:148): avc: denied { setopt } for pid=4308 comm="syz.1.297" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 100.329087][ T29] audit: type=1400 audit(100.240:149): avc: denied { create } for pid=4363 comm="syz.0.325" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 100.452181][ T29] audit: type=1400 audit(100.360:150): avc: denied { lock } for pid=4371 comm="syz.1.328" path="socket:[4767]" dev="sockfs" ino=4767 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 100.807578][ T4390] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4390 comm=syz.1.337 [ 101.658197][ T29] audit: type=1400 audit(101.570:151): avc: denied { mounton } for pid=4422 comm="syz.0.353" path="/162/file0" dev="tmpfs" ino=852 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 102.150868][ T4450] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4450 comm=syz.0.365 [ 102.376362][ T4461] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=4461 comm=syz.1.371 [ 103.374784][ T29] kauditd_printk_skb: 1 callbacks suppressed [ 103.377725][ T29] audit: type=1400 audit(103.280:153): avc: denied { unmount } for pid=3097 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 105.630268][ T29] audit: type=1400 audit(105.540:154): avc: denied { write } for pid=4512 comm="syz.0.395" name="rt_cache" dev="proc" ino=4026532669 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 106.993525][ T4536] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=4536 comm=syz.1.406 [ 109.627902][ T29] audit: type=1400 audit(109.530:155): avc: denied { setattr } for pid=4559 comm="syz.1.417" name="pfkey" dev="proc" ino=4026532810 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 110.222555][ T29] audit: type=1400 audit(110.130:156): avc: denied { ioctl } for pid=4591 comm="syz.1.433" path="socket:[5329]" dev="sockfs" ino=5329 ioctlcmd=0x8915 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 111.655623][ T29] audit: type=1400 audit(111.560:157): avc: denied { prog_load } for pid=4667 comm="syz.0.469" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 111.658202][ T29] audit: type=1400 audit(111.560:158): avc: denied { bpf } for pid=4667 comm="syz.0.469" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 111.686028][ T29] audit: type=1400 audit(111.590:159): avc: denied { prog_run } for pid=4667 comm="syz.0.469" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 118.052590][ T29] audit: type=1400 audit(117.960:160): avc: denied { ioctl } for pid=4765 comm="syz.0.518" path="socket:[5595]" dev="sockfs" ino=5595 ioctlcmd=0x8901 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 121.254689][ T4802] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4802 comm=syz.1.535 [ 122.906301][ T29] audit: type=1400 audit(122.810:161): avc: denied { setopt } for pid=4843 comm="syz.1.556" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 123.721499][ T29] audit: type=1400 audit(123.630:162): avc: denied { bind } for pid=4870 comm="syz.0.569" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 123.726252][ T29] audit: type=1400 audit(123.630:163): avc: denied { write } for pid=4870 comm="syz.0.569" path="socket:[5746]" dev="sockfs" ino=5746 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 125.149415][ T29] audit: type=1400 audit(125.060:164): avc: denied { create } for pid=4912 comm="syz.0.590" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 125.168588][ T29] audit: type=1400 audit(125.060:165): avc: denied { write } for pid=4912 comm="syz.0.590" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 129.011974][ T29] audit: type=1400 audit(128.920:166): avc: denied { ioctl } for pid=4982 comm="syz.0.621" path="socket:[6890]" dev="sockfs" ino=6890 ioctlcmd=0x8912 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sock_file permissive=1 [ 131.055740][ T29] audit: type=1400 audit(130.950:167): avc: denied { map } for pid=5019 comm="syz.1.639" path="/dev/infiniband/rdma_cm" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 131.726328][ T5036] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5036 comm=syz.1.647 [ 131.930736][ T29] audit: type=1400 audit(131.840:168): avc: denied { ioctl } for pid=5043 comm="syz.1.651" path="socket:[6006]" dev="sockfs" ino=6006 ioctlcmd=0x641b scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 132.281556][ T29] audit: type=1400 audit(132.190:169): avc: denied { read } for pid=5057 comm="syz.1.658" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 132.459889][ T29] audit: type=1400 audit(132.370:170): avc: denied { write } for pid=5065 comm="syz.0.662" path="socket:[6043]" dev="sockfs" ino=6043 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 133.568305][ T29] audit: type=1400 audit(133.480:171): avc: denied { getopt } for pid=5115 comm="syz.0.687" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 134.488803][ T5151] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 134.496075][ T29] audit: type=1400 audit(134.400:172): avc: denied { connect } for pid=5149 comm="syz.1.703" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 136.823736][ T5219] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5219 comm=syz.1.737 [ 137.236228][ T29] audit: type=1400 audit(137.140:173): avc: denied { associate } for pid=5228 comm="syz.1.742" name="pfkey" scontext=root:object_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 141.930375][ T29] audit: type=1400 audit(141.840:174): avc: denied { setopt } for pid=5266 comm="syz.0.759" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 145.370841][ T5353] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5353 comm=syz.1.800 [ 148.315165][ T29] audit: type=1400 audit(148.220:175): avc: denied { create } for pid=5441 comm="syz.0.845" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 153.834153][ T5681] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5681 comm=syz.0.963 [ 153.999645][ T5689] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5689 comm=syz.1.971 [ 181.150308][ T6164] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6164 comm=syz.0.1193 [ 181.460895][ T6176] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6176 comm=syz.1.1200 [ 224.337954][ T6693] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=6693 comm=syz.0.1451 [ 224.750627][ T6707] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=6707 comm=syz.0.1459 [ 660.298365][ C0] watchdog: BUG: soft lockup - CPU#0 stuck for 430s! [swapper/0:0] [ 660.298700][ C0] Modules linked in: [ 660.299817][ C0] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Tainted: G L syzkaller #0 PREEMPT [ 660.300139][ C0] Tainted: [L]=SOFTLOCKUP [ 660.300202][ C0] Hardware name: ARM-Versatile Express [ 660.300510][ C0] PC is at _raw_spin_lock+0x40/0x58 [ 660.301315][ C0] LR is at _raw_spin_lock+0x18/0x58 [ 660.301373][ C0] pc : [<81abbef4>] lr : [<81abbecc>] psr: 80000113 [ 660.301411][ C0] sp : 82801b40 ip : 82801b40 fp : 82801b54 [ 660.301451][ C0] r10: 81c05450 r9 : 8404f440 r8 : 83fcf288 [ 660.301499][ C0] r7 : 8404f568 r6 : 00000000 r5 : 00000001 r4 : 8404f568 [ 660.301546][ C0] r3 : 0000e869 r2 : 0000e86a r1 : 00000000 r0 : 00000001 [ 660.301697][ C0] Flags: Nzcv IRQs on FIQs on Mode SVC_32 ISA ARM Segment user [ 660.301805][ C0] Control: 30c5387d Table: 851665c0 DAC: fffffffd [ 660.301921][ C0] Call trace: [ 660.302214][ C0] [<81abbeb4>] (_raw_spin_lock) from [<809c7a2c>] (gpio_mmio_set+0x44/0x80) [ 660.302594][ C0] r5:00000001 r4:8404f440 [ 660.302695][ C0] [<809c79e8>] (gpio_mmio_set) from [<809b81e8>] (gpiochip_set+0x1c/0x44) [ 660.302796][ C0] r7:00000000 r6:00000000 r5:00000000 r4:840ce3c0 [ 660.302817][ C0] [<809b81cc>] (gpiochip_set) from [<809baab0>] (gpiod_set_raw_value_commit+0x78/0x218) [ 660.302878][ C0] [<809baa38>] (gpiod_set_raw_value_commit) from [<809bc350>] (gpiod_set_value_nocheck+0x44/0x58) [ 660.302974][ C0] r10:81c05450 r9:82801c94 r8:00000102 r7:ffffe45a r6:00000029 r5:00000000 [ 660.303015][ C0] r4:840ce3c0 [ 660.303043][ C0] [<809bc30c>] (gpiod_set_value_nocheck) from [<809bc3a0>] (gpiod_set_value+0x3c/0x88) [ 660.303101][ C0] [<809bc364>] (gpiod_set_value) from [<809ccb3c>] (gpio_led_set+0x5c/0x60) [ 660.303174][ C0] r5:84f40044 r4:84f40044 [ 660.303195][ C0] [<809ccae0>] (gpio_led_set) from [<809ca3d4>] (led_set_brightness_nosleep+0x38/0x44) [ 660.303254][ C0] r5:84f40044 r4:84b83c4c [ 660.303272][ C0] [<809ca39c>] (led_set_brightness_nosleep) from [<809cd438>] (led_heartbeat_function+0x84/0x144) [ 660.303326][ C0] [<809cd3b4>] (led_heartbeat_function) from [<80327070>] (call_timer_fn+0x30/0x220) [ 660.303402][ C0] r7:ffffe45a r6:809cd3b4 r5:84b83c4c r4:8281b500 [ 660.303422][ C0] [<80327040>] (call_timer_fn) from [<80327524>] (__run_timers+0x2c4/0x3f8) [ 660.303493][ C0] r9:82801c94 r8:ffffe45a r7:00000000 r6:809cd3b4 r5:dddc5f00 r4:84b83c4c [ 660.303514][ C0] [<80327260>] (__run_timers) from [<803276c0>] (run_timer_base+0x68/0x78) [ 660.303585][ C0] r10:8281b500 r9:82804d80 r8:00000102 r7:00000001 r6:00000082 r5:00000002 [ 660.303611][ C0] r4:dddc5f00 [ 660.303629][ C0] [<80327658>] (run_timer_base) from [<803276ec>] (run_timer_softirq+0x1c/0x34) [ 660.303689][ C0] r4:82804084 [ 660.303705][ C0] [<803276d0>] (run_timer_softirq) from [<8025b65c>] (handle_softirqs+0x140/0x458) [ 660.303768][ C0] [<8025b51c>] (handle_softirqs) from [<8025bad0>] (__irq_exit_rcu+0x110/0x1d0) [ 660.303858][ C0] r10:00000000 r9:8281b500 r8:00000000 r7:82801dd8 r6:82443f98 r5:8247f0cc [ 660.303880][ C0] r4:8281b500 [ 660.303897][ C0] [<8025b9c0>] (__irq_exit_rcu) from [<8025be48>] (irq_exit+0x10/0x18) [ 660.303962][ C0] r5:8247f0cc r4:826c3a9c [ 660.303980][ C0] [<8025be38>] (irq_exit) from [<81aad964>] (generic_handle_arch_irq+0x7c/0x80) [ 660.304053][ C0] [<81aad8e8>] (generic_handle_arch_irq) from [<80200bdc>] (__irq_svc+0x7c/0xbc) [ 660.304198][ C0] Exception stack(0x82801dd8 to 0x82801e20) [ 660.304429][ C0] 1dc0: e0333008 00000005 [ 660.304494][ C0] 1de0: 0000e869 00000000 e0333008 00000005 00000001 8404f568 83fcf288 8404f440 [ 660.304543][ C0] 1e00: 00000000 82801e3c 82801e28 82801e28 809c8228 809c822c 60000013 ffffffff [ 660.304655][ C0] r9:8281b500 r8:83fcf288 r7:82801e0c r6:ffffffff r5:60000013 r4:809c822c [ 660.304680][ C0] [<809c820c>] (gpio_mmio_write32) from [<809c7a4c>] (gpio_mmio_set+0x64/0x80) [ 660.304746][ C0] r5:00000004 r4:8404f440 [ 660.304764][ C0] [<809c79e8>] (gpio_mmio_set) from [<809b81e8>] (gpiochip_set+0x1c/0x44) [ 660.304867][ C0] r7:00000001 r6:00000000 r5:00000002 r4:840ce3e8 [ 660.304888][ C0] [<809b81cc>] (gpiochip_set) from [<809baab0>] (gpiod_set_raw_value_commit+0x78/0x218) [ 660.304954][ C0] [<809baa38>] (gpiod_set_raw_value_commit) from [<809bc350>] (gpiod_set_value_nocheck+0x44/0x58) [ 660.305031][ C0] r10:00000000 r9:00000000 r8:00000001 r7:dddce4c0 r6:838065d8 r5:00000001 [ 660.305061][ C0] r4:840ce3e8 [ 660.305078][ C0] [<809bc30c>] (gpiod_set_value_nocheck) from [<809bc3a0>] (gpiod_set_value+0x3c/0x88) [ 660.305132][ C0] [<809bc364>] (gpiod_set_value) from [<809ccb3c>] (gpio_led_set+0x5c/0x60) [ 660.305188][ C0] r5:000000ff r4:84f40224 [ 660.305205][ C0] [<809ccae0>] (gpio_led_set) from [<809ca464>] (led_set_brightness+0x84/0x90) [ 660.305261][ C0] r5:000000ff r4:84f40224 [ 660.305278][ C0] [<809ca3e0>] (led_set_brightness) from [<809cbfe4>] (led_trigger_event+0x40/0x58) [ 660.305334][ C0] r5:000000ff r4:84f40224 [ 660.305350][ C0] [<809cbfa4>] (led_trigger_event) from [<809cd640>] (ledtrig_cpu+0xac/0xf4) [ 660.305415][ C0] r7:dddce4c0 r6:00000002 r5:82b15cd8 r4:000000fe [ 660.305435][ C0] [<809cd594>] (ledtrig_cpu) from [<80227a38>] (arch_cpu_idle_exit+0x14/0x18) [ 660.305512][ C0] r9:00000000 r8:00000000 r7:8280c710 r6:8281b500 r5:8280c6d0 r4:00000000 [ 660.305532][ C0] [<80227a24>] (arch_cpu_idle_exit) from [<802b168c>] (do_idle+0x5c/0x2d8) [ 660.305594][ C0] [<802b1630>] (do_idle) from [<802b1c38>] (cpu_startup_entry+0x30/0x34) [ 660.305699][ C0] r10:8281aff4 r9:8280c680 r8:823bec64 r7:00000000 r6:deffc06c r5:828222e8 [ 660.305727][ C0] r4:000000ed [ 660.305745][ C0] [<802b1c08>] (cpu_startup_entry) from [<81aaf37c>] (kernel_init+0x0/0x138) [ 660.305833][ C0] [<81aaf29c>] (rest_init) from [<8260145c>] (start_kernel+0x844/0x860) [ 660.305949][ C0] [<82600c18>] (start_kernel) from [<00000000>] (0x0) [ 660.306824][ C0] Sending NMI from CPU 0 to CPUs 1: [ 660.307748][ C1] NMI backtrace for cpu 1 [ 660.307975][ C1] CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Tainted: G L syzkaller #0 PREEMPT [ 660.308047][ C1] Tainted: [L]=SOFTLOCKUP [ 660.308068][ C1] Hardware name: ARM-Versatile Express [ 660.308093][ C1] PC is at _raw_spin_lock+0x40/0x58 [ 660.308174][ C1] LR is at _raw_spin_lock+0x18/0x58 [ 660.308208][ C1] pc : [<81abbef4>] lr : [<81abbecc>] psr: 80000013 [ 660.308234][ C1] sp : df865e58 ip : df865e58 fp : df865e6c [ 660.308255][ C1] r10: 00000000 r9 : 8404f440 r8 : 83fcf288 [ 660.308277][ C1] r7 : 8404f568 r6 : 00000001 r5 : 00000008 r4 : 8404f568 [ 660.308300][ C1] r3 : 0000e869 r2 : 0000e86b r1 : 00000000 r0 : 00000001 [ 660.308325][ C1] Flags: Nzcv IRQs on FIQs on Mode SVC_32 ISA ARM Segment none [ 660.308361][ C1] Control: 30c5387d Table: 85c8dc00 DAC: 00000000 [ 660.308381][ C1] Call trace: [ 660.308428][ C1] [<81abbeb4>] (_raw_spin_lock) from [<809c7a2c>] (gpio_mmio_set+0x44/0x80) [ 660.308516][ C1] r5:00000008 r4:8404f440 [ 660.308540][ C1] [<809c79e8>] (gpio_mmio_set) from [<809b81e8>] (gpiochip_set+0x1c/0x44) [ 660.308615][ C1] r7:00000001 r6:00000000 r5:00000003 r4:840ce3fc [ 660.308638][ C1] [<809b81cc>] (gpiochip_set) from [<809baab0>] (gpiod_set_raw_value_commit+0x78/0x218) [ 660.308700][ C1] [<809baa38>] (gpiod_set_raw_value_commit) from [<809bc350>] (gpiod_set_value_nocheck+0x44/0x58) [ 660.308776][ C1] r10:00000000 r9:00000000 r8:00000001 r7:ddde24c0 r6:83806518 r5:00000001 [ 660.308808][ C1] r4:840ce3fc [ 660.308826][ C1] [<809bc30c>] (gpiod_set_value_nocheck) from [<809bc3a0>] (gpiod_set_value+0x3c/0x88) [ 660.308883][ C1] [<809bc364>] (gpiod_set_value) from [<809ccb3c>] (gpio_led_set+0x5c/0x60) [ 660.308944][ C1] r5:000000ff r4:84f40314 [ 660.308988][ C1] [<809ccae0>] (gpio_led_set) from [<809ca464>] (led_set_brightness+0x84/0x90) [ 660.309049][ C1] r5:000000ff r4:84f40314 [ 660.309073][ C1] [<809ca3e0>] (led_set_brightness) from [<809cbfe4>] (led_trigger_event+0x40/0x58) [ 660.309134][ C1] r5:000000ff r4:84f40314 [ 660.309156][ C1] [<809cbfa4>] (led_trigger_event) from [<809cd640>] (ledtrig_cpu+0xac/0xf4) [ 660.309222][ C1] r7:ddde24c0 r6:00000002 r5:82b15cd8 r4:000001fd [ 660.309243][ C1] [<809cd594>] (ledtrig_cpu) from [<80227a38>] (arch_cpu_idle_exit+0x14/0x18) [ 660.309319][ C1] r9:00000000 r8:00000001 r7:8280c710 r6:83216000 r5:8280c6d0 r4:00000001 [ 660.309342][ C1] [<80227a24>] (arch_cpu_idle_exit) from [<802b168c>] (do_idle+0x5c/0x2d8) [ 660.309404][ C1] [<802b1630>] (do_idle) from [<802b1c38>] (cpu_startup_entry+0x30/0x34) [ 660.309482][ C1] r10:00000000 r9:414fc0f0 r8:80003000 r7:82a7b4a4 r6:83216000 r5:00000001 [ 660.309507][ C1] r4:00000092 [ 660.309525][ C1] [<802b1c08>] (cpu_startup_entry) from [<8022f360>] (secondary_start_kernel+0x128/0x194) [ 660.309591][ C1] [<8022f238>] (secondary_start_kernel) from [<80220094>] (__enable_mmu+0x0/0xc) [ 660.309664][ C1] r7:82a7b4a4 r6:30c0387d r5:00000000 r4:830b7bc0 [ 660.311154][ C0] Kernel panic - not syncing: softlockup: hung tasks [ 660.345990][ C0] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Tainted: G L syzkaller #0 PREEMPT [ 660.346431][ C0] Tainted: [L]=SOFTLOCKUP [ 660.346656][ C0] Hardware name: ARM-Versatile Express [ 660.346905][ C0] Call trace: [ 660.347198][ C0] [<80201a74>] (dump_backtrace) from [<80201b70>] (show_stack+0x18/0x1c) [ 660.347960][ C0] r7:822965a4 r6:8281b500 r5:00000000 r4:82295754 [ 660.348220][ C0] [<80201b58>] (show_stack) from [<8021ee08>] (dump_stack_lvl+0x54/0x7c) [ 660.348571][ C0] [<8021edb4>] (dump_stack_lvl) from [<8021ee48>] (dump_stack+0x18/0x1c) [ 660.348934][ C0] r5:00000000 r4:82a7bd14 [ 660.349127][ C0] [<8021ee30>] (dump_stack) from [<80202648>] (vpanic+0xe0/0x2e8) [ 660.349454][ C0] [<80202568>] (vpanic) from [<80202884>] (trace_suspend_resume+0x0/0xd8) [ 660.349824][ C0] r7:82ac27f8 [ 660.349986][ C0] [<80202850>] (panic) from [<80383fcc>] (watchdog_timer_fn+0x2dc/0x350) [ 660.350339][ C0] r3:00000001 r2:00004000 r1:82a7bd1c r0:822965a4 [ 660.350579][ C0] [<80383cf0>] (watchdog_timer_fn) from [<80329c64>] (__hrtimer_run_queues+0x1c4/0x454) [ 660.350974][ C0] r10:8281b500 r9:00000000 r8:dddc7130 r7:80383cf0 r6:dddc7000 r5:dddc7040 [ 660.351287][ C0] r4:dddc75d8 [ 660.351452][ C0] [<80329aa0>] (__hrtimer_run_queues) from [<8032b268>] (hrtimer_interrupt+0x148/0x2bc) [ 660.351838][ C0] r10:b79900b0 r9:dddc7180 r8:dddc7130 r7:00000099 r6:00000003 r5:20000193 [ 660.352419][ C0] r4:dddc7000 [ 660.352780][ C0] [<8032b120>] (hrtimer_interrupt) from [<813408e0>] (arch_timer_handler_virt+0x30/0x38) [ 660.353400][ C0] r10:81d0fc78 r9:8309e400 r8:00000000 r7:00000000 r6:00000000 r5:82498528 [ 660.353820][ C0] r4:8309de40 [ 660.353992][ C0] [<813408b0>] (arch_timer_handler_virt) from [<802efab4>] (handle_percpu_devid_irq+0x128/0x34c) [ 660.354379][ C0] [<802ef98c>] (handle_percpu_devid_irq) from [<802e8c44>] (handle_irq_desc+0x74/0x84) [ 660.354790][ C0] r10:81c05450 r9:8281b500 r8:00000000 r7:df80a00c r6:826c2388 r5:df80a000 [ 660.355105][ C0] r4:8280cc44 [ 660.355375][ C0] [<802e8bd0>] (handle_irq_desc) from [<802e8cc0>] (generic_handle_domain_irq+0x18/0x1c) [ 660.355758][ C0] [<802e8ca8>] (generic_handle_domain_irq) from [<802012c8>] (gic_handle_irq+0x68/0x7c) [ 660.356143][ C0] [<80201260>] (gic_handle_irq) from [<81aad948>] (generic_handle_arch_irq+0x60/0x80) [ 660.356591][ C0] r7:82801af0 r6:82443f98 r5:8247f0cc r4:826c3a9c [ 660.356841][ C0] [<81aad8e8>] (generic_handle_arch_irq) from [<80200bdc>] (__irq_svc+0x7c/0xbc) [ 660.357223][ C0] Exception stack(0x82801af0 to 0x82801b38) [ 660.357486][ C0] 1ae0: 00000001 00000000 0000e86a 0000e869 [ 660.357930][ C0] 1b00: 8404f568 00000001 00000000 8404f568 83fcf288 8404f440 81c05450 82801b54 [ 660.358256][ C0] 1b20: 82801b40 82801b40 81abbecc 81abbef4 80000113 ffffffff [ 660.358553][ C0] r9:8281b500 r8:83fcf288 r7:82801b24 r6:ffffffff r5:80000113 r4:81abbef4 [ 660.358837][ C0] [<81abbeb4>] (_raw_spin_lock) from [<809c7a2c>] (gpio_mmio_set+0x44/0x80) [ 660.359182][ C0] r5:00000001 r4:8404f440 [ 660.359369][ C0] [<809c79e8>] (gpio_mmio_set) from [<809b81e8>] (gpiochip_set+0x1c/0x44) [ 660.359718][ C0] r7:00000000 r6:00000000 r5:00000000 r4:840ce3c0 [ 660.359967][ C0] [<809b81cc>] (gpiochip_set) from [<809baab0>] (gpiod_set_raw_value_commit+0x78/0x218) [ 660.360327][ C0] [<809baa38>] (gpiod_set_raw_value_commit) from [<809bc350>] (gpiod_set_value_nocheck+0x44/0x58) [ 660.360778][ C0] r10:81c05450 r9:82801c94 r8:00000102 r7:ffffe45a r6:00000029 r5:00000000 [ 660.361151][ C0] r4:840ce3c0 [ 660.361316][ C0] [<809bc30c>] (gpiod_set_value_nocheck) from [<809bc3a0>] (gpiod_set_value+0x3c/0x88) [ 660.361711][ C0] [<809bc364>] (gpiod_set_value) from [<809ccb3c>] (gpio_led_set+0x5c/0x60) [ 660.362069][ C0] r5:84f40044 r4:84f40044 [ 660.362247][ C0] [<809ccae0>] (gpio_led_set) from [<809ca3d4>] (led_set_brightness_nosleep+0x38/0x44) [ 660.362633][ C0] r5:84f40044 r4:84b83c4c [ 660.362818][ C0] [<809ca39c>] (led_set_brightness_nosleep) from [<809cd438>] (led_heartbeat_function+0x84/0x144) [ 660.363224][ C0] [<809cd3b4>] (led_heartbeat_function) from [<80327070>] (call_timer_fn+0x30/0x220) [ 660.363595][ C0] r7:ffffe45a r6:809cd3b4 r5:84b83c4c r4:8281b500 [ 660.364085][ C0] [<80327040>] (call_timer_fn) from [<80327524>] (__run_timers+0x2c4/0x3f8) [ 660.364446][ C0] r9:82801c94 r8:ffffe45a r7:00000000 r6:809cd3b4 r5:dddc5f00 r4:84b83c4c [ 660.364724][ C0] [<80327260>] (__run_timers) from [<803276c0>] (run_timer_base+0x68/0x78) [ 660.365088][ C0] r10:8281b500 r9:82804d80 r8:00000102 r7:00000001 r6:00000082 r5:00000002 [ 660.365380][ C0] r4:dddc5f00 [ 660.365540][ C0] [<80327658>] (run_timer_base) from [<803276ec>] (run_timer_softirq+0x1c/0x34) [ 660.365926][ C0] r4:82804084 [ 660.366098][ C0] [<803276d0>] (run_timer_softirq) from [<8025b65c>] (handle_softirqs+0x140/0x458) [ 660.366455][ C0] [<8025b51c>] (handle_softirqs) from [<8025bad0>] (__irq_exit_rcu+0x110/0x1d0) [ 660.366856][ C0] r10:00000000 r9:8281b500 r8:00000000 r7:82801dd8 r6:82443f98 r5:8247f0cc [ 660.367159][ C0] r4:8281b500 [ 660.367314][ C0] [<8025b9c0>] (__irq_exit_rcu) from [<8025be48>] (irq_exit+0x10/0x18) [ 660.367653][ C0] r5:8247f0cc r4:826c3a9c [ 660.367838][ C0] [<8025be38>] (irq_exit) from [<81aad964>] (generic_handle_arch_irq+0x7c/0x80) [ 660.368183][ C0] [<81aad8e8>] (generic_handle_arch_irq) from [<80200bdc>] (__irq_svc+0x7c/0xbc) [ 660.368522][ C0] Exception stack(0x82801dd8 to 0x82801e20) [ 660.368838][ C0] 1dc0: e0333008 00000005 [ 660.369359][ C0] 1de0: 0000e869 00000000 e0333008 00000005 00000001 8404f568 83fcf288 8404f440 [ 660.369713][ C0] 1e00: 00000000 82801e3c 82801e28 82801e28 809c8228 809c822c 60000013 ffffffff [ 660.370060][ C0] r9:8281b500 r8:83fcf288 r7:82801e0c r6:ffffffff r5:60000013 r4:809c822c [ 660.370344][ C0] [<809c820c>] (gpio_mmio_write32) from [<809c7a4c>] (gpio_mmio_set+0x64/0x80) [ 660.370706][ C0] r5:00000004 r4:8404f440 [ 660.370879][ C0] [<809c79e8>] (gpio_mmio_set) from [<809b81e8>] (gpiochip_set+0x1c/0x44) [ 660.371246][ C0] r7:00000001 r6:00000000 r5:00000002 r4:840ce3e8 [ 660.371481][ C0] [<809b81cc>] (gpiochip_set) from [<809baab0>] (gpiod_set_raw_value_commit+0x78/0x218) [ 660.371853][ C0] [<809baa38>] (gpiod_set_raw_value_commit) from [<809bc350>] (gpiod_set_value_nocheck+0x44/0x58) [ 660.372288][ C0] r10:00000000 r9:00000000 r8:00000001 r7:dddce4c0 r6:838065d8 r5:00000001 [ 660.372595][ C0] r4:840ce3e8 [ 660.372768][ C0] [<809bc30c>] (gpiod_set_value_nocheck) from [<809bc3a0>] (gpiod_set_value+0x3c/0x88) [ 660.373120][ C0] [<809bc364>] (gpiod_set_value) from [<809ccb3c>] (gpio_led_set+0x5c/0x60) [ 660.373443][ C0] r5:000000ff r4:84f40224 [ 660.373637][ C0] [<809ccae0>] (gpio_led_set) from [<809ca464>] (led_set_brightness+0x84/0x90) [ 660.374034][ C0] r5:000000ff r4:84f40224 [ 660.374215][ C0] [<809ca3e0>] (led_set_brightness) from [<809cbfe4>] (led_trigger_event+0x40/0x58) [ 660.374577][ C0] r5:000000ff r4:84f40224 [ 660.374754][ C0] [<809cbfa4>] (led_trigger_event) from [<809cd640>] (ledtrig_cpu+0xac/0xf4) [ 660.375117][ C0] r7:dddce4c0 r6:00000002 r5:82b15cd8 r4:000000fe [ 660.375357][ C0] [<809cd594>] (ledtrig_cpu) from [<80227a38>] (arch_cpu_idle_exit+0x14/0x18) [ 660.375726][ C0] r9:00000000 r8:00000000 r7:8280c710 r6:8281b500 r5:8280c6d0 r4:00000000 [ 660.376043][ C0] [<80227a24>] (arch_cpu_idle_exit) from [<802b168c>] (do_idle+0x5c/0x2d8) [ 660.376387][ C0] [<802b1630>] (do_idle) from [<802b1c38>] (cpu_startup_entry+0x30/0x34) [ 660.376750][ C0] r10:8281aff4 r9:8280c680 r8:823bec64 r7:00000000 r6:deffc06c r5:828222e8 [ 660.377084][ C0] r4:000000ed [ 660.377237][ C0] [<802b1c08>] (cpu_startup_entry) from [<81aaf37c>] (kernel_init+0x0/0x138) [ 660.377597][ C0] [<81aaf29c>] (rest_init) from [<8260145c>] (start_kernel+0x844/0x860) [ 660.377969][ C0] [<82600c18>] (start_kernel) from [<00000000>] (0x0) [ 660.380576][ C0] Rebooting in 86400 seconds..