[ 375.895920][ T3150] 8021q: adding VLAN 0 to HW filter on device bond0 [ 399.007767][ T3150] eql: remember to turn off Van-Jacobson compression on your slave devices Warning: Permanently added '[localhost]:23361' (ED25519) to the list of known hosts. [ 842.365845][ T25] audit: type=1400 audit(841.580:60): avc: denied { execute } for pid=3313 comm="sh" name="syz-execprog" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 842.385507][ T25] audit: type=1400 audit(841.600:61): avc: denied { execute_no_trans } for pid=3313 comm="sh" path="/syz-execprog" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 1970/01/01 00:14:52 parsed 1 programs [ 893.423780][ T25] audit: type=1400 audit(892.630:62): avc: denied { node_bind } for pid=3313 comm="syz-execprog" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 913.747567][ T25] audit: type=1400 audit(912.960:63): avc: denied { mounton } for pid=3322 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=1870 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 913.784774][ T25] audit: type=1400 audit(912.990:64): avc: denied { mount } for pid=3322 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 913.876929][ T3322] cgroup: Unknown subsys name 'net' [ 913.932543][ T25] audit: type=1400 audit(913.140:65): avc: denied { unmount } for pid=3322 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 914.325607][ T3322] cgroup: Unknown subsys name 'cpuset' [ 914.427705][ T3322] cgroup: Unknown subsys name 'rlimit' [ 915.704425][ T25] audit: type=1400 audit(914.920:66): avc: denied { setattr } for pid=3322 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=702 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 915.731988][ T25] audit: type=1400 audit(914.940:67): avc: denied { create } for pid=3322 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 915.754217][ T25] audit: type=1400 audit(914.960:68): avc: denied { write } for pid=3322 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 915.768802][ T25] audit: type=1400 audit(914.980:69): avc: denied { module_request } for pid=3322 comm="syz-executor" kmod="net-pf-16-proto-16-family-nl802154" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 916.304436][ T25] audit: type=1400 audit(915.510:70): avc: denied { read } for pid=3322 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 916.356403][ T25] audit: type=1400 audit(915.570:71): avc: denied { mounton } for pid=3322 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 916.388342][ T25] audit: type=1400 audit(915.600:72): avc: denied { mount } for pid=3322 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 917.572442][ T3326] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 917.782736][ T3322] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 943.124057][ T25] kauditd_printk_skb: 4 callbacks suppressed [ 943.133029][ T25] audit: type=1400 audit(942.340:77): avc: denied { execmem } for pid=3327 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 943.731935][ T25] audit: type=1400 audit(942.940:78): avc: denied { read } for pid=3328 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 943.753113][ T25] audit: type=1400 audit(942.960:79): avc: denied { open } for pid=3328 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 943.935300][ T25] audit: type=1400 audit(943.150:80): avc: denied { mounton } for pid=3328 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 946.781812][ T25] audit: type=1400 audit(945.990:81): avc: denied { mounton } for pid=3328 comm="syz-executor" path="/dev/binderfs" dev="devtmpfs" ino=1543 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 946.875504][ T25] audit: type=1400 audit(946.090:82): avc: denied { mount } for pid=3328 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 946.907566][ T25] audit: type=1400 audit(946.120:83): avc: denied { mounton } for pid=3328 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 946.942237][ T25] audit: type=1400 audit(946.150:84): avc: denied { mount } for pid=3328 comm="syz-executor" name="/" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 953.168653][ T25] audit: type=1400 audit(952.380:85): avc: denied { mount } for pid=3332 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 953.217498][ T25] audit: type=1400 audit(952.430:86): avc: denied { mounton } for pid=3332 comm="syz-executor" path="/syzkaller.09KKY2/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 953.266822][ T25] audit: type=1400 audit(952.480:87): avc: denied { mount } for pid=3332 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 953.336875][ T25] audit: type=1400 audit(952.550:88): avc: denied { mounton } for pid=3332 comm="syz-executor" path="/syzkaller.09KKY2/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 953.381987][ T25] audit: type=1400 audit(952.590:89): avc: denied { mounton } for pid=3332 comm="syz-executor" path="/syzkaller.09KKY2/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=2949 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 953.495267][ T25] audit: type=1400 audit(952.710:90): avc: denied { unmount } for pid=3332 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 953.555904][ T25] audit: type=1400 audit(952.770:91): avc: denied { mount } for pid=3332 comm="syz-executor" name="/" dev="gadgetfs" ino=2950 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 953.603119][ T25] audit: type=1400 audit(952.820:92): avc: denied { mount } for pid=3332 comm="syz-executor" name="/" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 953.904647][ T3332] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 954.098342][ T25] audit: type=1400 audit(953.310:93): avc: denied { read write } for pid=3332 comm="syz-executor" name="loop0" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 954.129007][ T25] audit: type=1400 audit(953.330:94): avc: denied { open } for pid=3332 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 967.102142][ T25] kauditd_printk_skb: 1 callbacks suppressed [ 967.105244][ T25] audit: type=1400 audit(966.290:96): avc: denied { create } for pid=3345 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=user_namespace permissive=1 [ 967.255579][ T25] audit: type=1400 audit(966.470:97): avc: denied { sys_admin } for pid=3345 comm="syz-executor" capability=21 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=cap_userns permissive=1 [ 971.168642][ T25] audit: type=1400 audit(970.380:98): avc: denied { sys_chroot } for pid=3346 comm="syz-executor" capability=18 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=cap_userns permissive=1 [ 1012.243225][ T25] audit: type=1401 audit(1011.430:99): op=setxattr invalid_context="u:object_r:app_data_file:s0:c512,c768" [ 1022.115397][ T25] audit: type=1400 audit(1021.330:100): avc: denied { sys_module } for pid=3380 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 1033.303759][ T3380] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1033.367898][ T3380] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1039.115651][ T3380] hsr_slave_0: entered promiscuous mode [ 1039.145151][ T3380] hsr_slave_1: entered promiscuous mode [ 1042.774713][ T3380] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 1042.932898][ T3380] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 1043.003380][ T3380] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 1043.092659][ T3380] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 1049.519076][ T3380] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1077.887033][ T3380] veth0_vlan: entered promiscuous mode [ 1078.116954][ T3380] veth1_vlan: entered promiscuous mode [ 1079.078519][ T3380] veth0_macvtap: entered promiscuous mode [ 1079.265283][ T3380] veth1_macvtap: entered promiscuous mode [ 1080.382721][ T35] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1080.453903][ T35] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1080.491642][ T3338] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1080.496741][ T3338] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1085.096144][ T49] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1086.044091][ T49] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1087.083985][ T49] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1087.528299][ T49] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1096.162431][ T25] audit: type=1400 audit(1095.340:101): avc: denied { create } for pid=3467 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 1098.644948][ T49] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1098.813625][ T49] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1098.911382][ T49] bond0 (unregistering): Released all slaves [ 1100.273273][ T49] hsr_slave_0: left promiscuous mode [ 1100.422947][ T49] hsr_slave_1: left promiscuous mode [ 1100.881659][ T49] veth1_macvtap: left promiscuous mode [ 1100.885728][ T49] veth0_macvtap: left promiscuous mode [ 1100.903395][ T49] veth1_vlan: left promiscuous mode [ 1100.924826][ T49] veth0_vlan: left promiscuous mode 1970/01/01 00:18:48 executed programs: 0 [ 1163.527741][ T3487] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1163.655283][ T3487] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1177.591271][ T3487] hsr_slave_0: entered promiscuous mode [ 1177.624567][ T3487] hsr_slave_1: entered promiscuous mode [ 1186.384267][ T3487] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 1186.625635][ T3487] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 1186.799461][ T3487] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 1187.092718][ T3487] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 1205.444670][ T3487] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1245.033042][ T3487] veth0_vlan: entered promiscuous mode [ 1245.312823][ T3487] veth1_vlan: entered promiscuous mode [ 1246.148072][ T3487] veth0_macvtap: entered promiscuous mode [ 1246.365571][ T3487] veth1_macvtap: entered promiscuous mode [ 1247.556914][ T49] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1247.578555][ T49] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1247.591198][ T49] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1247.594843][ T49] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1249.214768][ T25] audit: type=1400 audit(1248.430:102): avc: denied { mounton } for pid=3487 comm="syz-executor" path="/syzkaller.XtGmPk/syz-tmp" dev="vda" ino=1890 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 1249.357799][ T25] audit: type=1400 audit(1248.570:103): avc: denied { mount } for pid=3487 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 1970/01/01 00:20:49 executed programs: 2 [ 1251.662436][ T25] audit: type=1400 audit(1250.830:104): avc: denied { read } for pid=3618 comm="syz.2.17" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 1251.663661][ T25] audit: type=1400 audit(1250.870:105): avc: denied { open } for pid=3618 comm="syz.2.17" path="/dev/kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 1251.757735][ T25] audit: type=1400 audit(1250.970:106): avc: denied { ioctl } for pid=3618 comm="syz.2.17" path="/dev/kvm" dev="devtmpfs" ino=84 ioctlcmd=0xae01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 1251.906286][ C0] Unhandled 64-bit el1h sync exception on CPU0, ESR 0x000000005a000000 -- HVC (AArch64) [ 1251.907535][ C0] CPU: 0 UID: 0 PID: 3618 Comm: syz.2.17 Not tainted syzkaller #0 PREEMPT [ 1251.908088][ C0] Hardware name: linux,dummy-virt (DT) [ 1251.908564][ C0] pstate: 81402009 (Nzcv daif +PAN -UAO -TCO +DIT -SSBS BTYPE=--) [ 1251.908958][ C0] pc : pkvm_init_host_vm+0xb8/0x160 [ 1251.910555][ C0] lr : pkvm_init_host_vm+0xa0/0x160 [ 1251.910776][ C0] sp : ffff80008e7e7c60 [ 1251.910898][ C0] x29: ffff80008e7e7c60 x28: 59f000001fc3c018 x27: ffff800087354000 [ 1251.911465][ C0] x26: c5f000000d2a5bc0 x25: 0000000000000024 x24: 00000000000014f8 [ 1251.911814][ C0] x23: 0000000000000024 x22: 24ff80008c4ce260 x21: 24ff80008c4cdff0 [ 1251.912100][ C0] x20: 0000000000000000 x19: efff800000000000 x18: fff0000072d86400 [ 1251.912375][ C0] x17: 0000000000000063 x16: ffff800080011d9c x15: 00000000ffffffff [ 1251.912672][ C0] x14: ffffffffffffffff x13: 00000000000000de x12: ffff7c1ffbf7fed7 [ 1251.912958][ C0] x11: 0000000000000100 x10: 0000000000ff0100 x9 : 0000000000000000 [ 1251.913355][ C0] x8 : 59f000001fc3bb00 x7 : ffff800080aba4c0 x6 : 0000000000000000 [ 1251.913650][ C0] x5 : 0000000000000001 x4 : ffff80008e7e7ac0 x3 : 0000000000000004 [ 1251.913942][ C0] x2 : 0000000000021d74 x1 : 0000000000000000 x0 : 00000000c600001b [ 1251.914712][ C0] Kernel panic - not syncing: Unhandled exception [ 1251.937190][ C0] CPU: 0 UID: 0 PID: 3618 Comm: syz.2.17 Not tainted syzkaller #0 PREEMPT [ 1251.939093][ C0] Hardware name: linux,dummy-virt (DT) [ 1251.942855][ C0] Call trace: [ 1251.943929][ C0] show_stack+0x2c/0x3c (C) [ 1251.945354][ C0] __dump_stack+0x30/0x40 [ 1251.946404][ C0] dump_stack_lvl+0x30/0x12c [ 1251.947444][ C0] dump_stack+0x1c/0x28 [ 1251.948427][ C0] vpanic+0x22c/0x59c [ 1251.949401][ C0] vpanic+0x0/0x59c [ 1251.950343][ C0] el1t_64_irq_handler+0x0/0x1c [ 1251.951417][ C0] el1_abort+0x0/0x5c [ 1251.952379][ C0] el1h_64_sync+0x6c/0x70 [ 1251.953524][ C0] pkvm_init_host_vm+0xb8/0x160 (P) [ 1251.954673][ C0] kvm_arch_init_vm+0x150/0x288 [ 1251.955776][ C0] kvm_dev_ioctl+0x838/0x105c [ 1251.956887][ C0] __arm64_sys_ioctl+0x18c/0x244 [ 1251.958034][ C0] invoke_syscall+0x90/0x2b4 [ 1251.959003][ C0] el0_svc_common+0x180/0x2f4 [ 1251.960075][ C0] do_el0_svc+0x58/0x74 [ 1251.961106][ C0] el0_svc+0x58/0x164 [ 1251.962058][ C0] el0t_64_sync_handler+0x84/0x12c [ 1251.963118][ C0] el0t_64_sync+0x198/0x19c [ 1251.965247][ C0] Kernel Offset: disabled [ 1251.966140][ C0] CPU features: 0x00000,000068c0,17de33e1,057ffe1f [ 1251.967475][ C0] Memory Limit: none [ 1251.968673][ C0] [ 1251.969319][ C0] ================================ [ 1251.970248][ C0] WARNING: inconsistent lock state [ 1251.971268][ C0] syzkaller #0 Not tainted [ 1251.972248][ C0] -------------------------------- [ 1251.973208][ C0] inconsistent {INITIAL USE} -> {IN-NMI} usage. [ 1251.974383][ C0] syz.2.17/3618 [HC1[1]:SC0[0]:HE0:SE1] takes: [ 1251.975676][ C0] f4f000000d3ed6e8 (&k->list_lock){+.+.}-{3:3}, at: bus_for_each_dev+0x60/0x2a4 [ 1251.978257][ C0] {INITIAL USE} state was registered at: [ 1251.979387][ C0] lock_acquire+0x14c/0x2e0 [ 1251.980429][ C0] _raw_spin_lock+0x48/0x60 [ 1251.981433][ C0] kobject_add_internal+0x46c/0xee4 [ 1251.982557][ C0] kobject_add+0x10c/0x1d0 [ 1251.983587][ C0] device_add+0x494/0xd78 [ 1251.984639][ C0] device_register+0x28/0x38 [ 1251.985665][ C0] faux_bus_init+0x1c/0x88 [ 1251.986661][ C0] driver_init+0x30/0x58 [ 1251.987638][ C0] do_basic_setup+0x1c/0xa8 [ 1251.988646][ C0] kernel_init_freeable+0x244/0x330 [ 1251.989751][ C0] kernel_init+0x24/0x1d0 [ 1251.990757][ C0] ret_from_fork+0x10/0x20 [ 1251.991803][ C0] irq event stamp: 1602 [ 1251.992676][ C0] hardirqs last enabled at (1601): [] _raw_spin_unlock_irqrestore+0x44/0xbc [ 1251.994478][ C0] hardirqs last disabled at (1602): [] __panic_unhandled+0x24/0x68 [ 1251.996184][ C0] softirqs last enabled at (1368): [] local_bh_enable+0x10/0x34 [ 1251.997863][ C0] softirqs last disabled at (1366): [] local_bh_disable+0x10/0x34 [ 1251.999718][ C0] [ 1251.999718][ C0] other info that might help us debug this: [ 1252.001115][ C0] Possible unsafe locking scenario: [ 1252.001115][ C0] [ 1252.002362][ C0] CPU0 [ 1252.003072][ C0] ---- [ 1252.003764][ C0] lock(&k->list_lock); [ 1252.004657][ C0] [ 1252.005371][ C0] lock(&k->list_lock); [ 1252.006449][ C0] [ 1252.006449][ C0] *** DEADLOCK *** [ 1252.006449][ C0] [ 1252.007821][ C0] no locks held by syz.2.17/3618. [ 1252.008811][ C0] [ 1252.008811][ C0] stack backtrace: [ 1252.009880][ C0] CPU: 0 UID: 0 PID: 3618 Comm: syz.2.17 Not tainted syzkaller #0 PREEMPT [ 1252.011355][ C0] Hardware name: linux,dummy-virt (DT) [ 1252.012347][ C0] Call trace: [ 1252.013054][ C0] show_stack+0x2c/0x3c (C) [ 1252.014175][ C0] __dump_stack+0x30/0x40 [ 1252.015168][ C0] dump_stack_lvl+0x30/0x12c [ 1252.016036][ C0] dump_stack+0x1c/0x28 [ 1252.016954][ C0] print_usage_bug+0x2f4/0x32c [ 1252.018017][ C0] verify_lock_unused+0x78/0x88 [ 1252.019123][ C0] lock_acquire+0x22c/0x2e0 [ 1252.020169][ C0] _raw_spin_lock+0x48/0x60 [ 1252.021153][ C0] bus_for_each_dev+0x60/0x2a4 [ 1252.022267][ C0] coresight_panic_cb+0x2c/0x3c [ 1252.023359][ C0] notifier_call_chain+0x1e8/0x65c [ 1252.024536][ C0] atomic_notifier_call_chain+0xd0/0x180 [ 1252.025788][ C0] vpanic+0x2c4/0x59c [ 1252.026716][ C0] vpanic+0x0/0x59c [ 1252.027644][ C0] el1t_64_irq_handler+0x0/0x1c [ 1252.028723][ C0] el1_abort+0x0/0x5c [ 1252.029652][ C0] el1h_64_sync+0x6c/0x70 [ 1252.030649][ C0] pkvm_init_host_vm+0xb8/0x160 (P) [ 1252.031790][ C0] kvm_arch_init_vm+0x150/0x288 [ 1252.032839][ C0] kvm_dev_ioctl+0x838/0x105c [ 1252.033920][ C0] __arm64_sys_ioctl+0x18c/0x244 [ 1252.035035][ C0] invoke_syscall+0x90/0x2b4 [ 1252.036098][ C0] el0_svc_common+0x180/0x2f4 [ 1252.037205][ C0] do_el0_svc+0x58/0x74 [ 1252.038238][ C0] el0_svc+0x58/0x164 [ 1252.039178][ C0] el0t_64_sync_handler+0x84/0x12c [ 1252.040275][ C0] el0t_64_sync+0x198/0x19c [ 1252.042591][ C0] Rebooting in 86400 seconds.. VM DIAGNOSIS: 16:33:21 Registers: info registers vcpu 0 CPU#0 PC=ffff800082127694 X00=0000000000000003 X01=0000000000000002 X02=0000000000000060 X03=ffff800082127590 X04=0000000000000001 X05=0000000000000000 X06=ffff800081f0e734 X07=ffff800087cd0c24 X08=59f000001fc3bb00 X09=0000000000110001 X10=0000000000ff0100 X11=00000000000000fe X12=0000000000000014 X13=0000000000000007 X14=0000000000110001 X15=0000000000000000 X16=00000000000000fe X17=0000000000000063 X18=fff0000072d86400 X19=efff800000000000 X20=14f000000dcb0880 X21=e9ff80008c43b018 X22=0000000000000002 X23=14f000000dcb097c X24=0000000000000014 X25=14f000000dcb0ac8 X26=14f000000dcb08c8 X27=0000000000000014 X28=0000000000000014 X29=ffff80008e7e73f0 X30=ffff800082127694 SP=ffff80008e7e73e0 PSTATE=004023c9 ---- EL2h SVCR=00000000 -- BTYPE=0 FPCR=00000000 FPSR=00000000 P00=0000 P01=0000 P02=0000 P03=0000 P04=0000 P05=0000 P06=0000 P07=0000 P08=0000 P09=0000 P10=0000 P11=0000 P12=0000 P13=0000 P14=0000 P15=0000 FFR=0000 Z00=2525252525252525:2525252525252525 Z01=000000756c6c2570:6f6f6c2f7665642f Z02=0000000000000000:ffffffff00000000 Z03=ffffff000000ff00:0000000000000000 Z04=0000000000000000:fff000f000000000 Z05=bb448243222c92da:e3914ed4e87380b0 Z06=6edc4d3a2914b135:d8e9c869e2695c88 Z07=b20fae707afde253:388e9c6c4fa85ca0 Z08=0000000000000000:0000000000000000 Z09=0000000000000000:0000000000000000 Z10=0000000000000000:0000000000000000 Z11=0000000000000000:0000000000000000 Z12=0000000000000000:0000000000000000 Z13=0000000000000000:0000000000000000 Z14=0000000000000000:0000000000000000 Z15=0000000000000000:0000000000000000 Z16=0000ffffc91c31e0:0000ffffc91c31e0 Z17=ffffff80ffffffd0:0000ffffc91c31b0 Z18=0000000000000000:0000000000000000 Z19=0000000000000000:0000000000000000 Z20=0000000000000000:0000000000000000 Z21=0000000000000000:0000000000000000 Z22=0000000000000000:0000000000000000 Z23=0000000000000000:0000000000000000 Z24=0000000000000000:0000000000000000 Z25=0000000000000000:0000000000000000 Z26=0000000000000000:0000000000000000 Z27=0000000000000000:0000000000000000 Z28=0000000000000000:0000000000000000 Z29=0000000000000000:0000000000000000 Z30=0000000000000000:0000000000000000 Z31=0000000000000000:0000000000000000