last executing test programs: 3.120697197s ago: executing program 0 (id=1009): r0 = openat$selinux_status(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) close(r0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$sock_int(r0, 0x1, 0x5, &(0x7f0000000640)=0x686, 0x4) 3.036442337s ago: executing program 0 (id=1010): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='cpuacct.stat\x00', 0x26e1, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)) sendmsg$ETHTOOL_MSG_TSINFO_GET(r0, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000700)={0x0}}, 0x0) 3.036292147s ago: executing program 1 (id=1011): r0 = openat$hwrng(0xffffff9c, &(0x7f0000000000), 0x3091c1, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) sendmsg$RDMA_NLDEV_CMD_SYS_SET(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000280)={0x0}, 0x1, 0x0, 0x0, 0x4000040}, 0x40080) 2.903243884s ago: executing program 0 (id=1012): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'hash\x00', 0x0, 0x0, 'sha3-384\x00'}, 0x58) r1 = accept(r0, 0x0, 0x0) sendmsg$ETHTOOL_MSG_FEATURES_GET(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x4008880}, 0x2) 2.903040054s ago: executing program 1 (id=1013): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto(r0, 0x0, 0x0, 0x20044844, &(0x7f0000000280)=@in6={0xa, 0x0, 0x0, @local, 0x1}, 0x80) r1 = fcntl$dupfd(r0, 0x0, r0) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r1, 0x0, 0x0) 2.741033475s ago: executing program 0 (id=1014): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) sendto$l2tp6(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x3}, 0x20) sendmsg$AUDIT_LIST_RULES(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}, 0x1, 0x0, 0x0, 0x80}, 0x20040090) 1.771198657s ago: executing program 1 (id=1015): r0 = openat$selinux_status(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) close(r0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$sock_int(r0, 0x1, 0x5, &(0x7f0000000640)=0x686, 0x4) 223.637712ms ago: executing program 0 (id=1016): r0 = openat$hwrng(0xffffff9c, &(0x7f0000000000), 0x3091c1, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) sendmsg$RDMA_NLDEV_CMD_SYS_SET(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000280)={0x0}, 0x1, 0x0, 0x0, 0x4000040}, 0x40080) 219.504042ms ago: executing program 1 (id=1017): r0 = open$dir(&(0x7f00000000c0)='.\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCGICOUNT(r2, 0x5450, 0x0) 100.275537ms ago: executing program 1 (id=1018): r0 = open(&(0x7f0000000000)='./file0\x00', 0x940, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$SNDCTL_DSP_SUBDIVIDE(r0, 0xc0045009, 0x0) 100.033747ms ago: executing program 0 (id=1019): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto(r0, 0x0, 0x0, 0x20044844, &(0x7f0000000280)=@in6={0xa, 0x0, 0x0, @local, 0x1}, 0x80) r1 = fcntl$dupfd(r0, 0x0, r0) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r1, 0x0, 0x0) 0s ago: executing program 1 (id=1020): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) sendto$l2tp6(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x3}, 0x20) sendmsg$AUDIT_LIST_RULES(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}, 0x1, 0x0, 0x0, 0x80}, 0x20040090) kernel console output (not intermixed with test programs): [ 52.683076][ T29] audit: type=1400 audit(52.590:56): avc: denied { read write } for pid=3086 comm="sftp-server" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 52.685960][ T29] audit: type=1400 audit(52.590:57): avc: denied { open } for pid=3086 comm="sftp-server" path="/dev/null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 Warning: Permanently added '[localhost]:16570' (ED25519) to the list of known hosts. [ 67.463298][ T29] audit: type=1400 audit(67.370:58): avc: denied { name_bind } for pid=3089 comm="sshd-session" src=30000 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 69.303812][ T29] audit: type=1400 audit(69.220:59): avc: denied { execute } for pid=3090 comm="sh" name="syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 69.308843][ T29] audit: type=1400 audit(69.220:60): avc: denied { execute_no_trans } for pid=3090 comm="sh" path="/syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 72.814356][ T29] audit: type=1400 audit(72.730:61): avc: denied { mounton } for pid=3090 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=806 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 72.819085][ T29] audit: type=1400 audit(72.730:62): avc: denied { mount } for pid=3090 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 72.835691][ T3090] cgroup: Unknown subsys name 'net' [ 72.845455][ T29] audit: type=1400 audit(72.760:63): avc: denied { unmount } for pid=3090 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 73.055471][ T3090] cgroup: Unknown subsys name 'cpuset' [ 73.061522][ T3090] cgroup: Unknown subsys name 'hugetlb' [ 73.064780][ T3090] cgroup: Unknown subsys name 'rlimit' [ 73.248566][ T29] audit: type=1400 audit(73.160:64): avc: denied { setattr } for pid=3090 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 73.250818][ T29] audit: type=1400 audit(73.160:65): avc: denied { mounton } for pid=3090 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 73.253973][ T29] audit: type=1400 audit(73.160:66): avc: denied { mount } for pid=3090 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 73.456198][ T3092] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 73.458963][ T29] audit: type=1400 audit(73.370:67): avc: denied { relabelto } for pid=3092 comm="mkswap" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 73.464706][ T29] audit: type=1400 audit(73.380:68): avc: denied { write } for pid=3092 comm="mkswap" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 73.501810][ T29] audit: type=1400 audit(73.410:69): avc: denied { read } for pid=3090 comm="syz-executor" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 73.504234][ T29] audit: type=1400 audit(73.410:70): avc: denied { open } for pid=3090 comm="syz-executor" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 80.629933][ T3090] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 82.394222][ T29] audit: type=1400 audit(82.310:71): avc: denied { execmem } for pid=3093 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 82.462964][ T29] audit: type=1400 audit(82.370:72): avc: denied { read } for pid=3095 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 82.474728][ T29] audit: type=1400 audit(82.390:73): avc: denied { open } for pid=3095 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 82.483179][ T29] audit: type=1400 audit(82.390:74): avc: denied { mounton } for pid=3095 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 82.510688][ T29] audit: type=1400 audit(82.420:75): avc: denied { module_request } for pid=3096 comm="syz-executor" kmod="netdev-nr1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 82.513049][ T29] audit: type=1400 audit(82.420:76): avc: denied { module_request } for pid=3095 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 82.592108][ T29] audit: type=1400 audit(82.500:77): avc: denied { sys_module } for pid=3095 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 83.267792][ T29] audit: type=1400 audit(83.180:78): avc: denied { ioctl } for pid=3095 comm="syz-executor" path="/dev/net/tun" dev="devtmpfs" ino=677 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 84.430288][ T3096] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 84.454911][ T3096] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 84.458267][ T3095] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 84.480405][ T3095] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 85.098149][ T3095] hsr_slave_0: entered promiscuous mode [ 85.100573][ T3095] hsr_slave_1: entered promiscuous mode [ 85.308556][ T3096] hsr_slave_0: entered promiscuous mode [ 85.310189][ T3096] hsr_slave_1: entered promiscuous mode [ 85.315101][ T3096] debugfs: 'hsr0' already exists in 'hsr' [ 85.317341][ T3096] Cannot create hsr debugfs directory [ 85.568574][ T29] audit: type=1400 audit(85.480:79): avc: denied { create } for pid=3095 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 85.570219][ T29] audit: type=1400 audit(85.480:80): avc: denied { write } for pid=3095 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 85.596980][ T3095] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 85.621243][ T3095] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 85.636920][ T3095] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 85.658884][ T3095] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 85.738120][ T3096] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 85.745945][ T3096] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 85.750898][ T3096] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 85.767600][ T3096] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 86.319603][ T3095] 8021q: adding VLAN 0 to HW filter on device bond0 [ 86.498173][ T3096] 8021q: adding VLAN 0 to HW filter on device bond0 [ 86.970396][ T3096] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 88.547787][ T3095] veth0_vlan: entered promiscuous mode [ 88.580105][ T3095] veth1_vlan: entered promiscuous mode [ 88.681846][ T3095] veth0_macvtap: entered promiscuous mode [ 88.700172][ T3095] veth1_macvtap: entered promiscuous mode [ 88.790900][ T54] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 88.792147][ T54] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 88.799198][ T54] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 88.799311][ T54] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 88.957562][ T29] kauditd_printk_skb: 1 callbacks suppressed [ 88.963289][ T29] audit: type=1400 audit(88.870:82): avc: denied { mount } for pid=3095 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 88.969019][ T29] audit: type=1400 audit(88.880:83): avc: denied { mounton } for pid=3095 comm="syz-executor" path="/syzkaller.yAsoZb/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 88.975865][ T29] audit: type=1400 audit(88.890:84): avc: denied { mount } for pid=3095 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 88.987284][ T29] audit: type=1400 audit(88.900:85): avc: denied { mounton } for pid=3095 comm="syz-executor" path="/syzkaller.yAsoZb/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 88.993638][ T29] audit: type=1400 audit(88.900:86): avc: denied { mounton } for pid=3095 comm="syz-executor" path="/syzkaller.yAsoZb/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=3220 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 89.011606][ T29] audit: type=1400 audit(88.920:87): avc: denied { unmount } for pid=3095 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 89.022044][ T29] audit: type=1400 audit(88.930:88): avc: denied { mounton } for pid=3095 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=772 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 89.027694][ T29] audit: type=1400 audit(88.940:89): avc: denied { mount } for pid=3095 comm="syz-executor" name="/" dev="gadgetfs" ino=3221 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 89.038874][ T29] audit: type=1400 audit(88.950:90): avc: denied { mount } for pid=3095 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 89.041166][ T29] audit: type=1400 audit(88.950:91): avc: denied { mounton } for pid=3095 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 89.143137][ T3095] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 89.280322][ T3096] veth0_vlan: entered promiscuous mode [ 89.306552][ T3096] veth1_vlan: entered promiscuous mode [ 89.380852][ T3096] veth0_macvtap: entered promiscuous mode [ 89.397797][ T3096] veth1_macvtap: entered promiscuous mode [ 89.480138][ T1370] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 89.480685][ T1370] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 89.480792][ T1370] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 89.480929][ T1370] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 90.154895][ T3710] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=1541 sclass=netlink_audit_socket pid=3710 comm=syz.0.4 [ 90.281626][ T3712] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=42 sclass=netlink_audit_socket pid=3712 comm=syz.0.5 [ 90.848067][ T3736] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=3736 comm=syz.0.17 [ 91.105574][ T3748] capability: warning: `syz.1.23' uses deprecated v2 capabilities in a way that may be insecure [ 91.128608][ T3748] random: crng reseeded on system resumption [ 91.289302][ T3753] Zero length message leads to an empty skb [ 92.623755][ T23] usb 2-1: new high-speed USB device number 2 using dummy_hcd [ 92.803133][ T23] usb 2-1: Using ep0 maxpacket: 32 [ 92.811845][ T23] usb 2-1: config 5 has an invalid interface number: 68 but max is 0 [ 92.813655][ T23] usb 2-1: config 5 has no interface number 0 [ 92.813836][ T23] usb 2-1: config 5 interface 68 has no altsetting 0 [ 92.846349][ T23] usb 2-1: New USB device found, idVendor=17cc, idProduct=1000, bcdDevice=55.1a [ 92.846669][ T23] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 92.847853][ T23] usb 2-1: Product: syz [ 92.847921][ T23] usb 2-1: Manufacturer: syz [ 92.847948][ T23] usb 2-1: SerialNumber: syz [ 93.093846][ T23] snd-usb-audio 2-1:5.68: probe with driver snd-usb-audio failed with error -71 [ 93.099110][ T23] usb 2-1: USB disconnect, device number 2 [ 93.233345][ T3821] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=3821 comm=syz.1.50 [ 93.966702][ T29] kauditd_printk_skb: 26 callbacks suppressed [ 93.967645][ T29] audit: type=1400 audit(93.880:118): avc: denied { append } for pid=3847 comm="syz.1.64" name="pfkey" dev="proc" ino=4026532784 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 93.977564][ T29] audit: type=1400 audit(93.890:119): avc: denied { getopt } for pid=3847 comm="syz.1.64" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 95.930345][ T29] audit: type=1400 audit(95.840:120): avc: denied { unmount } for pid=3095 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 96.525914][ T3893] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=1537 sclass=netlink_audit_socket pid=3893 comm=syz.0.86 [ 96.656729][ T29] audit: type=1400 audit(96.570:121): avc: denied { write } for pid=3898 comm="syz.1.89" name="ip_mr_cache" dev="proc" ino=4026532703 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 97.334100][ T29] audit: type=1400 audit(97.250:122): avc: denied { create } for pid=3927 comm="syz.1.103" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 97.338386][ T29] audit: type=1400 audit(97.250:123): avc: denied { write } for pid=3927 comm="syz.1.103" path="socket:[3625]" dev="sockfs" ino=3625 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 98.398417][ T29] audit: type=1400 audit(98.310:124): avc: denied { create } for pid=3956 comm="syz.1.116" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 98.411872][ T29] audit: type=1400 audit(98.320:125): avc: denied { write } for pid=3956 comm="syz.1.116" lport=9 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 98.624717][ T29] audit: type=1400 audit(98.540:126): avc: denied { allowed } for pid=3967 comm="syz.1.121" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 98.631859][ T29] audit: type=1400 audit(98.540:127): avc: denied { create } for pid=3967 comm="syz.1.121" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 98.641142][ T3970] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=3970 comm=syz.0.122 [ 98.912115][ T3982] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=3982 comm=syz.1.128 [ 99.131216][ T29] kauditd_printk_skb: 1 callbacks suppressed [ 99.137338][ T29] audit: type=1400 audit(99.040:129): avc: denied { map } for pid=3993 comm="syz.0.134" path="/dev/fb0" dev="devtmpfs" ino=616 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 102.713542][ T4054] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4054 comm=syz.1.163 [ 102.825839][ T29] audit: type=1400 audit(102.740:130): avc: denied { read } for pid=4055 comm="syz.1.164" path="socket:[3885]" dev="sockfs" ino=3885 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 102.939978][ T29] audit: type=1400 audit(102.850:131): avc: denied { read } for pid=4059 comm="syz.1.166" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 103.071193][ T4067] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4067 comm=syz.1.169 [ 103.736158][ T4094] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4094 comm=syz.0.183 [ 104.227739][ T29] audit: type=1400 audit(104.140:132): avc: denied { remount } for pid=4112 comm="syz.0.192" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 108.345667][ T29] audit: type=1400 audit(108.260:133): avc: denied { write } for pid=4197 comm="syz.0.234" path="socket:[3028]" dev="sockfs" ino=3028 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 109.083724][ T29] audit: type=1400 audit(109.000:134): avc: denied { getopt } for pid=4216 comm="syz.0.242" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 109.845514][ T29] audit: type=1400 audit(109.760:135): avc: denied { ioctl } for pid=4246 comm="syz.1.257" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=4257 ioctlcmd=0xaa01 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 110.190024][ T29] audit: type=1400 audit(110.100:136): avc: denied { setopt } for pid=4259 comm="syz.1.263" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 110.264199][ T29] audit: type=1400 audit(110.180:137): avc: denied { ioctl } for pid=4261 comm="syz.0.264" path="socket:[4284]" dev="sockfs" ino=4284 ioctlcmd=0x4504 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 111.683293][ T4311] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=769 sclass=netlink_audit_socket pid=4311 comm=syz.0.288 [ 112.161952][ T29] audit: type=1400 audit(112.070:138): avc: denied { bpf } for pid=4322 comm="syz.0.294" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 113.297436][ T4361] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4361 comm=syz.1.312 [ 114.008979][ T4379] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4379 comm=syz.1.321 [ 115.199754][ T29] audit: type=1400 audit(115.110:139): avc: denied { create } for pid=4433 comm="syz.1.349" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 115.211266][ T29] audit: type=1400 audit(115.120:140): avc: denied { write } for pid=4433 comm="syz.1.349" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 115.933787][ T29] audit: type=1400 audit(115.850:141): avc: denied { ioctl } for pid=4471 comm="syz.1.367" path="socket:[4658]" dev="sockfs" ino=4658 ioctlcmd=0x700d scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 116.746781][ T4494] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=65534 sclass=netlink_tcpdiag_socket pid=4494 comm=syz.0.378 [ 121.468683][ T29] audit: type=1400 audit(121.380:142): avc: denied { create } for pid=4586 comm="syz.0.421" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 124.954917][ T29] audit: type=1400 audit(124.870:143): avc: denied { create } for pid=4678 comm="syz.0.470" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 124.957772][ T29] audit: type=1400 audit(124.870:144): avc: denied { write } for pid=4678 comm="syz.0.470" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 124.960216][ T4679] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=4679 comm=syz.0.470 [ 125.119960][ T29] audit: type=1400 audit(125.030:145): avc: denied { prog_load } for pid=4685 comm="syz.0.471" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 125.340369][ T4697] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=4697 comm=syz.1.474 [ 127.010389][ T4761] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=4761 comm=syz.1.511 [ 127.220068][ T4771] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4771 comm=syz.1.512 [ 127.284109][ T4774] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=4774 comm=syz.0.513 [ 127.504249][ T29] audit: type=1400 audit(127.420:146): avc: denied { setopt } for pid=4782 comm="syz.1.518" lport=1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 127.535330][ T4785] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4785 comm=syz.0.519 [ 128.224941][ T29] audit: type=1400 audit(128.140:147): avc: denied { setattr } for pid=4810 comm="syz.1.532" name="RAWv6" dev="sockfs" ino=6301 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 128.310960][ T4814] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=4814 comm=syz.0.533 [ 129.124546][ T4827] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=4827 comm=syz.1.539 [ 130.546168][ T4842] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1540 sclass=netlink_route_socket pid=4842 comm=syz.0.547 [ 130.856140][ T4854] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1540 sclass=netlink_route_socket pid=4854 comm=syz.1.553 [ 132.563347][ T4927] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=515 sclass=netlink_route_socket pid=4927 comm=syz.0.593 [ 132.948186][ T4941] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=515 sclass=netlink_route_socket pid=4941 comm=syz.1.598 [ 136.023570][ T4978] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1792 sclass=netlink_route_socket pid=4978 comm=syz.1.615 [ 136.440913][ T4989] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1792 sclass=netlink_route_socket pid=4989 comm=syz.0.621 [ 138.357914][ T29] audit: type=1400 audit(138.270:148): avc: denied { map_create } for pid=5033 comm="syz.1.642" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 138.359829][ T29] audit: type=1400 audit(138.270:149): avc: denied { perfmon } for pid=5033 comm="syz.1.642" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 138.361694][ T29] audit: type=1400 audit(138.270:150): avc: denied { map_read map_write } for pid=5033 comm="syz.1.642" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 141.920400][ T29] audit: type=1400 audit(141.830:151): avc: denied { bind } for pid=5113 comm="syz.0.684" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 141.921638][ T29] audit: type=1400 audit(141.830:152): avc: denied { name_bind } for pid=5113 comm="syz.0.684" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=rawip_socket permissive=1 [ 141.923537][ T29] audit: type=1400 audit(141.830:153): avc: denied { node_bind } for pid=5113 comm="syz.0.684" saddr=224.0.0.1 src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 [ 141.930723][ T29] audit: type=1400 audit(141.840:154): avc: denied { connect } for pid=5113 comm="syz.0.684" laddr=224.0.0.1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 142.965369][ T29] audit: type=1400 audit(142.880:155): avc: denied { create } for pid=5151 comm="syz.1.703" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 142.970029][ T5153] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 142.978608][ T29] audit: type=1400 audit(142.890:156): avc: denied { write } for pid=5151 comm="syz.1.703" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 146.769080][ T29] audit: type=1400 audit(146.680:157): avc: denied { prog_run } for pid=5274 comm="syz.0.765" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 147.132794][ T29] audit: type=1400 audit(147.040:158): avc: denied { getopt } for pid=5279 comm="syz.1.764" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 148.355658][ T5298] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=2306 sclass=netlink_tcpdiag_socket pid=5298 comm=syz.1.774 [ 148.845484][ T5306] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=2306 sclass=netlink_tcpdiag_socket pid=5306 comm=syz.0.781 [ 169.009129][ T5412] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1795 sclass=netlink_route_socket pid=5412 comm=syz.0.828 [ 169.846703][ T5425] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1795 sclass=netlink_route_socket pid=5425 comm=syz.1.833 [ 169.961411][ T5431] capability: warning: `syz.1.838' uses 32-bit capabilities (legacy support in use) [ 170.010208][ T29] audit: type=1400 audit(169.920:159): avc: denied { ioctl } for pid=5432 comm="syz.0.836" path="socket:[8554]" dev="sockfs" ino=8554 ioctlcmd=0x5451 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 175.669166][ T5467] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5467 comm=syz.1.854 [ 176.769975][ T5481] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5481 comm=syz.0.859 [ 177.031724][ T5491] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=20 sclass=netlink_audit_socket pid=5491 comm=syz.1.867 [ 177.394191][ T5505] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=20 sclass=netlink_audit_socket pid=5505 comm=syz.0.872 [ 180.573155][ T29] audit: type=1400 audit(180.480:160): avc: denied { read } for pid=5590 comm="syz.0.915" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 181.966702][ T29] audit: type=1400 audit(181.880:161): avc: denied { create } for pid=5605 comm="syz.1.922" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 181.994157][ T29] audit: type=1400 audit(181.910:162): avc: denied { write } for pid=5605 comm="syz.1.922" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 186.151817][ T5660] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5660 comm=syz.1.948 [ 187.048594][ T5669] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5669 comm=syz.0.956 [ 192.251853][ T29] audit: type=1400 audit(192.160:163): avc: denied { create } for pid=5727 comm="syz.0.985" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 192.263053][ T29] audit: type=1400 audit(192.170:164): avc: denied { bind } for pid=5727 comm="syz.0.985" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 192.275369][ T29] audit: type=1400 audit(192.190:165): avc: denied { connect } for pid=5727 comm="syz.0.985" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 660.273044][ C0] watchdog: BUG: soft lockup - CPU#0 stuck for 430s! [swapper/0:0] [ 660.273343][ C0] Modules linked in: [ 660.274611][ C0] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Not tainted syzkaller #0 PREEMPT [ 660.275150][ C0] Hardware name: ARM-Versatile Express [ 660.275442][ C0] PC is at _raw_spin_unlock_irq+0x28/0x54 [ 660.276500][ C0] LR is at tmigr_handle_remote_up+0x268/0x4b0 [ 660.276538][ C0] pc : [<81abb2fc>] lr : [<80346df4>] psr: 60000113 [ 660.276564][ C0] sp : 82801be0 ip : 82801bf0 fp : 82801bec [ 660.276583][ C0] r10: 00000001 r9 : 0000002e r8 : 29d01b80 [ 660.276608][ C0] r7 : ddddb488 r6 : 82801cb8 r5 : 830bf3b0 r4 : 830bf380 [ 660.276632][ C0] r3 : 0000159e r2 : 00000103 r1 : 830bf3b0 r0 : ddddb488 [ 660.276702][ C0] Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment user [ 660.276757][ C0] Control: 30c5387d Table: 84fff2c0 DAC: fffffffd [ 660.276864][ C0] Call trace: [ 660.277098][ C0] [<81abb2d4>] (_raw_spin_unlock_irq) from [<80346df4>] (tmigr_handle_remote_up+0x268/0x4b0) [ 660.277494][ C0] [<80346b8c>] (tmigr_handle_remote_up) from [<803450a4>] (__walk_groups_from+0x3c/0xe4) [ 660.277644][ C0] r10:8281b500 r9:8280c820 r8:80346b8c r7:82801cb8 r6:830bf380 r5:00000002 [ 660.277693][ C0] r4:830bf380 [ 660.277716][ C0] [<80345068>] (__walk_groups_from) from [<8034743c>] (tmigr_handle_remote+0xe8/0x108) [ 660.277796][ C0] r9:82804d80 r8:00000102 r7:00000001 r6:00000002 r5:00000002 r4:dddc7488 [ 660.277818][ C0] [<80347354>] (tmigr_handle_remote) from [<80327600>] (run_timer_softirq+0x30/0x34) [ 660.277888][ C0] r4:82804084 [ 660.277906][ C0] [<803275d0>] (run_timer_softirq) from [<8025b55c>] (handle_softirqs+0x140/0x458) [ 660.277967][ C0] [<8025b41c>] (handle_softirqs) from [<8025b9d0>] (__irq_exit_rcu+0x110/0x1d0) [ 660.278034][ C0] r10:00000000 r9:8281b500 r8:00000000 r7:82801dd8 r6:82443ee0 r5:8247f014 [ 660.278055][ C0] r4:8281b500 [ 660.278070][ C0] [<8025b8c0>] (__irq_exit_rcu) from [<8025bd48>] (irq_exit+0x10/0x18) [ 660.278133][ C0] r5:8247f014 r4:826c3a9c [ 660.278151][ C0] [<8025bd38>] (irq_exit) from [<81aacf24>] (generic_handle_arch_irq+0x7c/0x80) [ 660.278211][ C0] [<81aacea8>] (generic_handle_arch_irq) from [<80200bdc>] (__irq_svc+0x7c/0xbc) [ 660.278369][ C0] Exception stack(0x82801dd8 to 0x82801e20) [ 660.278550][ C0] 1dc0: 00000001 00000000 [ 660.278607][ C0] 1de0: 0000ab61 0000ab5f 8411ad68 00000004 00000001 8411ad68 840b4288 8411ac40 [ 660.278643][ C0] 1e00: 00000000 82801e3c 82801e28 82801e28 81abb48c 81abb4b4 80000013 ffffffff [ 660.278705][ C0] r9:8281b500 r8:840b4288 r7:82801e0c r6:ffffffff r5:80000013 r4:81abb4b4 [ 660.278729][ C0] [<81abb474>] (_raw_spin_lock) from [<809c74b8>] (gpio_mmio_set+0x44/0x80) [ 660.278811][ C0] r5:00000004 r4:8411ac40 [ 660.278830][ C0] [<809c7474>] (gpio_mmio_set) from [<809b7c74>] (gpiochip_set+0x1c/0x44) [ 660.278906][ C0] r7:00000001 r6:00000000 r5:00000002 r4:8423ada8 [ 660.278925][ C0] [<809b7c58>] (gpiochip_set) from [<809ba53c>] (gpiod_set_raw_value_commit+0x78/0x218) [ 660.278984][ C0] [<809ba4c4>] (gpiod_set_raw_value_commit) from [<809bbddc>] (gpiod_set_value_nocheck+0x44/0x58) [ 660.279059][ C0] r10:00000000 r9:00000000 r8:00000001 r7:dddce4c0 r6:8391d158 r5:00000001 [ 660.279084][ C0] r4:8423ada8 [ 660.279099][ C0] [<809bbd98>] (gpiod_set_value_nocheck) from [<809bbe2c>] (gpiod_set_value+0x3c/0x88) [ 660.279147][ C0] [<809bbdf0>] (gpiod_set_value) from [<809cc5c8>] (gpio_led_set+0x5c/0x60) [ 660.279206][ C0] r5:000000ff r4:832faa24 [ 660.279224][ C0] [<809cc56c>] (gpio_led_set) from [<809c9ef0>] (led_set_brightness+0x84/0x90) [ 660.279275][ C0] r5:000000ff r4:832faa24 [ 660.279291][ C0] [<809c9e6c>] (led_set_brightness) from [<809cba70>] (led_trigger_event+0x40/0x58) [ 660.279345][ C0] r5:000000ff r4:832faa24 [ 660.279361][ C0] [<809cba30>] (led_trigger_event) from [<809cd0cc>] (ledtrig_cpu+0xac/0xf4) [ 660.279419][ C0] r7:dddce4c0 r6:00000002 r5:82b15cd8 r4:000001fd [ 660.279436][ C0] [<809cd020>] (ledtrig_cpu) from [<80227a38>] (arch_cpu_idle_exit+0x14/0x18) [ 660.279521][ C0] r9:00000000 r8:00000000 r7:8280c710 r6:8281b500 r5:8280c6d0 r4:00000000 [ 660.279540][ C0] [<80227a24>] (arch_cpu_idle_exit) from [<802b158c>] (do_idle+0x5c/0x2d8) [ 660.279604][ C0] [<802b1530>] (do_idle) from [<802b1b38>] (cpu_startup_entry+0x30/0x34) [ 660.279681][ C0] r10:8281aff4 r9:8280c680 r8:823beae8 r7:00000000 r6:deffc06c r5:828222e8 [ 660.279704][ C0] r4:000000ed [ 660.279721][ C0] [<802b1b08>] (cpu_startup_entry) from [<81aae93c>] (kernel_init+0x0/0x138) [ 660.279811][ C0] [<81aae85c>] (rest_init) from [<8260145c>] (start_kernel+0x844/0x860) [ 660.279940][ C0] [<82600c18>] (start_kernel) from [<00000000>] (0x0) [ 660.280789][ C0] Sending NMI from CPU 0 to CPUs 1: [ 660.283230][ C1] NMI backtrace for cpu 1 [ 660.283528][ C1] CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Not tainted syzkaller #0 PREEMPT [ 660.283588][ C1] Hardware name: ARM-Versatile Express [ 660.283613][ C1] PC is at _raw_spin_lock+0x40/0x58 [ 660.283701][ C1] LR is at _raw_spin_lock+0x18/0x58 [ 660.283746][ C1] pc : [<81abb4b4>] lr : [<81abb48c>] psr: 80000113 [ 660.283774][ C1] sp : df805d68 ip : df805d68 fp : df805d7c [ 660.283797][ C1] r10: 81c05450 r9 : 8411ac40 r8 : 840b4288 [ 660.283816][ C1] r7 : 8411ad68 r6 : 00000000 r5 : 00000001 r4 : 8411ad68 [ 660.283839][ C1] r3 : 0000ab5f r2 : 0000ab60 r1 : 00000000 r0 : 00000001 [ 660.283866][ C1] Flags: Nzcv IRQs on FIQs on Mode SVC_32 ISA ARM Segment none [ 660.283902][ C1] Control: 30c5387d Table: 853152c0 DAC: 00000000 [ 660.283922][ C1] Call trace: frame pointer underflow [ 660.284022][ C1] [<81abb474>] (_raw_spin_lock) from [<809c74b8>] (gpio_mmio_set+0x44/0x80) [ 660.284111][ C1] r5:00000001 r4:8411ac40 [ 660.284131][ C1] [<809c7474>] (gpio_mmio_set) from [<809b7c74>] (gpiochip_set+0x1c/0x44) [ 660.284202][ C1] r7:00000000 r6:00000000 r5:00000000 r4:8423ad80 [ 660.284219][ C1] [<809b7c58>] (gpiochip_set) from [<809ba53c>] (gpiod_set_raw_value_commit+0x78/0x218) [ 660.284306][ C1] [<809ba4c4>] (gpiod_set_raw_value_commit) from [<809bbddc>] (gpiod_set_value_nocheck+0x44/0x58) [ 660.284382][ C1] r10:81c05450 r9:df805ebc r8:00000102 r7:ffffd83f r6:00000009 r5:00000000 [ 660.284405][ C1] r4:8423ad80 [ 660.284421][ C1] [<809bbd98>] (gpiod_set_value_nocheck) from [<809bbe2c>] (gpiod_set_value+0x3c/0x88) [ 660.284496][ C1] [<809bbdf0>] (gpiod_set_value) from [<809cc5c8>] (gpio_led_set+0x5c/0x60) [ 660.284575][ C1] r5:832fa844 r4:832fa844 [ 660.284594][ C1] [<809cc56c>] (gpio_led_set) from [<809c9e60>] (led_set_brightness_nosleep+0x38/0x44) [ 660.284651][ C1] r5:832fa844 r4:84b5c08c [ 660.284670][ C1] [<809c9e28>] (led_set_brightness_nosleep) from [<809ccec4>] (led_heartbeat_function+0x84/0x144) [ 660.284738][ C1] [<809cce40>] (led_heartbeat_function) from [<80326f70>] (call_timer_fn+0x30/0x220) [ 660.284815][ C1] r7:ffffd83f r6:809cce40 r5:84b5c08c r4:83216000 [ 660.284836][ C1] [<80326f40>] (call_timer_fn) from [<80327424>] (__run_timers+0x2c4/0x3f8) [ 660.284905][ C1] r9:df805ebc r8:ffffd83f r7:00000000 r6:809cce40 r5:dddd9f00 r4:84b5c08c [ 660.284923][ C1] [<80327160>] (__run_timers) from [<803275c0>] (run_timer_base+0x68/0x78) [ 660.284989][ C1] r10:83216000 r9:82804d80 r8:00000102 r7:00000001 r6:00000082 r5:00000002 [ 660.285013][ C1] r4:dddd9f00 [ 660.285029][ C1] [<80327558>] (run_timer_base) from [<803275ec>] (run_timer_softirq+0x1c/0x34) [ 660.285086][ C1] r4:82804084 [ 660.285103][ C1] [<803275d0>] (run_timer_softirq) from [<8025b55c>] (handle_softirqs+0x140/0x458) [ 660.285165][ C1] [<8025b41c>] (handle_softirqs) from [<8025b9d0>] (__irq_exit_rcu+0x110/0x1d0) [ 660.285236][ C1] r10:00000000 r9:83216000 r8:00000000 r7:df865e08 r6:82443ee0 r5:8247f014 [ 660.285256][ C1] r4:83216000 [ 660.285276][ C1] [<8025b8c0>] (__irq_exit_rcu) from [<8025bd48>] (irq_exit+0x10/0x18) [ 660.285338][ C1] r5:8247f014 r4:826c3a9c [ 660.285355][ C1] [<8025bd38>] (irq_exit) from [<81aacf24>] (generic_handle_arch_irq+0x7c/0x80) [ 660.285421][ C1] [<81aacea8>] (generic_handle_arch_irq) from [<81a7cec4>] (call_with_stack+0x1c/0x20) [ 660.285504][ C1] r9:83216000 r8:840b4288 r7:df865e3c r6:ffffffff r5:60000013 r4:809c7cb8 [ 660.285528][ C1] [<81a7cea8>] (call_with_stack) from [<80200bec>] (__irq_svc+0x8c/0xbc) [ 660.285589][ C1] Exception stack(0xdf865e08 to 0xdf865e50) [ 660.285633][ C1] 5e00: e00fd008 00000009 0000ab5f 00000000 e00fd008 00000009 [ 660.285668][ C1] 5e20: 00000001 8411ad68 840b4288 8411ac40 00000000 df865e6c df865e58 df865e58 [ 660.285695][ C1] 5e40: 809c7cb4 809c7cb8 60000013 ffffffff [ 660.285725][ C1] [<809c7c98>] (gpio_mmio_write32) from [<809c74d8>] (gpio_mmio_set+0x64/0x80) [ 660.285804][ C1] r5:00000008 r4:8411ac40 [ 660.285826][ C1] [<809c7474>] (gpio_mmio_set) from [<809b7c74>] (gpiochip_set+0x1c/0x44) [ 660.285905][ C1] r7:00000001 r6:00000000 r5:00000003 r4:8423adbc [ 660.285926][ C1] [<809b7c58>] (gpiochip_set) from [<809ba53c>] (gpiod_set_raw_value_commit+0x78/0x218) [ 660.285991][ C1] [<809ba4c4>] (gpiod_set_raw_value_commit) from [<809bbddc>] (gpiod_set_value_nocheck+0x44/0x58) [ 660.286064][ C1] r10:00000000 r9:00000000 r8:00000001 r7:ddde24c0 r6:8391d198 r5:00000001 [ 660.286088][ C1] r4:8423adbc [ 660.286105][ C1] [<809bbd98>] (gpiod_set_value_nocheck) from [<809bbe2c>] (gpiod_set_value+0x3c/0x88) [ 660.286158][ C1] [<809bbdf0>] (gpiod_set_value) from [<809cc5c8>] (gpio_led_set+0x5c/0x60) [ 660.286215][ C1] r5:000000ff r4:832fab14 [ 660.286236][ C1] [<809cc56c>] (gpio_led_set) from [<809c9ef0>] (led_set_brightness+0x84/0x90) [ 660.286294][ C1] r5:000000ff r4:832fab14 [ 660.286311][ C1] [<809c9e6c>] (led_set_brightness) from [<809cba70>] (led_trigger_event+0x40/0x58) [ 660.286366][ C1] r5:000000ff r4:832fab14 [ 660.286385][ C1] [<809cba30>] (led_trigger_event) from [<809cd0cc>] (ledtrig_cpu+0xac/0xf4) [ 660.286453][ C1] r7:ddde24c0 r6:00000002 r5:82b15cd8 r4:000000fe [ 660.286473][ C1] [<809cd020>] (ledtrig_cpu) from [<80227a38>] (arch_cpu_idle_exit+0x14/0x18) [ 660.286545][ C1] r9:00000000 r8:00000001 r7:8280c710 r6:83216000 r5:8280c6d0 r4:00000001 [ 660.286577][ C1] [<80227a24>] (arch_cpu_idle_exit) from [<802b158c>] (do_idle+0x5c/0x2d8) [ 660.286644][ C1] [<802b1530>] (do_idle) from [<802b1b38>] (cpu_startup_entry+0x30/0x34) [ 660.286725][ C1] r10:00000000 r9:414fc0f0 r8:80003000 r7:82a7b4a4 r6:83216000 r5:00000001 [ 660.286748][ C1] r4:00000092 [ 660.286765][ C1] [<802b1b08>] (cpu_startup_entry) from [<8022f360>] (secondary_start_kernel+0x128/0x194) [ 660.286835][ C1] [<8022f238>] (secondary_start_kernel) from [<80220094>] (__enable_mmu+0x0/0xc) [ 660.286921][ C1] r7:82a7b4a4 r6:30c0387d r5:00000000 r4:830b7bc0 [ 660.287707][ C0] Kernel panic - not syncing: softlockup: hung tasks [ 660.325188][ C0] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Tainted: G L syzkaller #0 PREEMPT [ 660.325705][ C0] Tainted: [L]=SOFTLOCKUP [ 660.325926][ C0] Hardware name: ARM-Versatile Express [ 660.326174][ C0] Call trace: [ 660.326444][ C0] [<80201a74>] (dump_backtrace) from [<80201b70>] (show_stack+0x18/0x1c) [ 660.326844][ C0] r7:82296534 r6:8281b500 r5:00000000 r4:822956e4 [ 660.327096][ C0] [<80201b58>] (show_stack) from [<8021ee08>] (dump_stack_lvl+0x54/0x7c) [ 660.327433][ C0] [<8021edb4>] (dump_stack_lvl) from [<8021ee48>] (dump_stack+0x18/0x1c) [ 660.327784][ C0] r5:00000000 r4:82a7bd14 [ 660.327976][ C0] [<8021ee30>] (dump_stack) from [<80202648>] (vpanic+0xe0/0x2e8) [ 660.328348][ C0] [<80202568>] (vpanic) from [<80202884>] (trace_suspend_resume+0x0/0xd8) [ 660.328701][ C0] r7:82ac27f8 [ 660.328918][ C0] [<80202850>] (panic) from [<80383f14>] (watchdog_timer_fn+0x2dc/0x350) [ 660.329318][ C0] r3:00000001 r2:00004000 r1:82a7bd1c r0:82296534 [ 660.329574][ C0] [<80383c38>] (watchdog_timer_fn) from [<80329b64>] (__hrtimer_run_queues+0x1c4/0x454) [ 660.329970][ C0] r10:8281b500 r9:00000000 r8:dddc7130 r7:80383c38 r6:dddc7000 r5:dddc7040 [ 660.330286][ C0] r4:dddc75d8 [ 660.330441][ C0] [<803299a0>] (__hrtimer_run_queues) from [<8032b168>] (hrtimer_interrupt+0x148/0x2bc) [ 660.331084][ C0] r10:b6678220 r9:dddc7180 r8:dddc7130 r7:00000099 r6:00000003 r5:20000193 [ 660.331411][ C0] r4:dddc7000 [ 660.331562][ C0] [<8032b020>] (hrtimer_interrupt) from [<8133fea0>] (arch_timer_handler_virt+0x30/0x38) [ 660.331993][ C0] r10:81d0fc78 r9:8309e400 r8:00000000 r7:00000000 r6:00000000 r5:82498528 [ 660.332337][ C0] r4:8309de40 [ 660.332499][ C0] [<8133fe70>] (arch_timer_handler_virt) from [<802ef9b4>] (handle_percpu_devid_irq+0x128/0x34c) [ 660.332915][ C0] [<802ef88c>] (handle_percpu_devid_irq) from [<802e8b44>] (handle_irq_desc+0x74/0x84) [ 660.333309][ C0] r10:00000001 r9:8281b500 r8:00000000 r7:df80a00c r6:826c2388 r5:df80a000 [ 660.333615][ C0] r4:8280cc44 [ 660.333780][ C0] [<802e8ad0>] (handle_irq_desc) from [<802e8bc0>] (generic_handle_domain_irq+0x18/0x1c) [ 660.334160][ C0] [<802e8ba8>] (generic_handle_domain_irq) from [<802012c8>] (gic_handle_irq+0x68/0x7c) [ 660.334551][ C0] [<80201260>] (gic_handle_irq) from [<81aacf08>] (generic_handle_arch_irq+0x60/0x80) [ 660.334945][ C0] r7:82801b90 r6:82443ee0 r5:8247f014 r4:826c3a9c [ 660.335182][ C0] [<81aacea8>] (generic_handle_arch_irq) from [<80200bdc>] (__irq_svc+0x7c/0xbc) [ 660.335540][ C0] Exception stack(0x82801b90 to 0x82801bd8) [ 660.335798][ C0] 1b80: ddddb488 830bf3b0 00000103 0000159e [ 660.336124][ C0] 1ba0: 830bf380 830bf3b0 82801cb8 ddddb488 29d01b80 0000002e 00000001 82801bec [ 660.336481][ C0] 1bc0: 82801bf0 82801be0 80346df4 81abb2fc 60000113 ffffffff [ 660.336794][ C0] r9:8281b500 r8:29d01b80 r7:82801bc4 r6:ffffffff r5:60000113 r4:81abb2fc [ 660.337091][ C0] [<81abb2d4>] (_raw_spin_unlock_irq) from [<80346df4>] (tmigr_handle_remote_up+0x268/0x4b0) [ 660.337485][ C0] [<80346b8c>] (tmigr_handle_remote_up) from [<803450a4>] (__walk_groups_from+0x3c/0xe4) [ 660.337935][ C0] r10:8281b500 r9:8280c820 r8:80346b8c r7:82801cb8 r6:830bf380 r5:00000002 [ 660.338302][ C0] r4:830bf380 [ 660.338466][ C0] [<80345068>] (__walk_groups_from) from [<8034743c>] (tmigr_handle_remote+0xe8/0x108) [ 660.338913][ C0] r9:82804d80 r8:00000102 r7:00000001 r6:00000002 r5:00000002 r4:dddc7488 [ 660.339251][ C0] [<80347354>] (tmigr_handle_remote) from [<80327600>] (run_timer_softirq+0x30/0x34) [ 660.339663][ C0] r4:82804084 [ 660.339834][ C0] [<803275d0>] (run_timer_softirq) from [<8025b55c>] (handle_softirqs+0x140/0x458) [ 660.340265][ C0] [<8025b41c>] (handle_softirqs) from [<8025b9d0>] (__irq_exit_rcu+0x110/0x1d0) [ 660.340708][ C0] r10:00000000 r9:8281b500 r8:00000000 r7:82801dd8 r6:82443ee0 r5:8247f014 [ 660.341059][ C0] r4:8281b500 [ 660.341235][ C0] [<8025b8c0>] (__irq_exit_rcu) from [<8025bd48>] (irq_exit+0x10/0x18) [ 660.341606][ C0] r5:8247f014 r4:826c3a9c [ 660.341810][ C0] [<8025bd38>] (irq_exit) from [<81aacf24>] (generic_handle_arch_irq+0x7c/0x80) [ 660.342214][ C0] [<81aacea8>] (generic_handle_arch_irq) from [<80200bdc>] (__irq_svc+0x7c/0xbc) [ 660.342582][ C0] Exception stack(0x82801dd8 to 0x82801e20) [ 660.342847][ C0] 1dc0: 00000001 00000000 [ 660.343206][ C0] 1de0: 0000ab61 0000ab5f 8411ad68 00000004 00000001 8411ad68 840b4288 8411ac40 [ 660.343591][ C0] 1e00: 00000000 82801e3c 82801e28 82801e28 81abb48c 81abb4b4 80000013 ffffffff [ 660.343970][ C0] r9:8281b500 r8:840b4288 r7:82801e0c r6:ffffffff r5:80000013 r4:81abb4b4 [ 660.344351][ C0] [<81abb474>] (_raw_spin_lock) from [<809c74b8>] (gpio_mmio_set+0x44/0x80) [ 660.344750][ C0] r5:00000004 r4:8411ac40 [ 660.344949][ C0] [<809c7474>] (gpio_mmio_set) from [<809b7c74>] (gpiochip_set+0x1c/0x44) [ 660.345331][ C0] r7:00000001 r6:00000000 r5:00000002 r4:8423ada8 [ 660.345640][ C0] [<809b7c58>] (gpiochip_set) from [<809ba53c>] (gpiod_set_raw_value_commit+0x78/0x218) [ 660.346078][ C0] [<809ba4c4>] (gpiod_set_raw_value_commit) from [<809bbddc>] (gpiod_set_value_nocheck+0x44/0x58) [ 660.346547][ C0] r10:00000000 r9:00000000 r8:00000001 r7:dddce4c0 r6:8391d158 r5:00000001 [ 660.346903][ C0] r4:8423ada8 [ 660.347061][ C0] [<809bbd98>] (gpiod_set_value_nocheck) from [<809bbe2c>] (gpiod_set_value+0x3c/0x88) [ 660.347471][ C0] [<809bbdf0>] (gpiod_set_value) from [<809cc5c8>] (gpio_led_set+0x5c/0x60) [ 660.347861][ C0] r5:000000ff r4:832faa24 [ 660.348066][ C0] [<809cc56c>] (gpio_led_set) from [<809c9ef0>] (led_set_brightness+0x84/0x90) [ 660.348468][ C0] r5:000000ff r4:832faa24 [ 660.348680][ C0] [<809c9e6c>] (led_set_brightness) from [<809cba70>] (led_trigger_event+0x40/0x58) [ 660.349098][ C0] r5:000000ff r4:832faa24 [ 660.349328][ C0] [<809cba30>] (led_trigger_event) from [<809cd0cc>] (ledtrig_cpu+0xac/0xf4) [ 660.349728][ C0] r7:dddce4c0 r6:00000002 r5:82b15cd8 r4:000001fd [ 660.349969][ C0] [<809cd020>] (ledtrig_cpu) from [<80227a38>] (arch_cpu_idle_exit+0x14/0x18) [ 660.350347][ C0] r9:00000000 r8:00000000 r7:8280c710 r6:8281b500 r5:8280c6d0 r4:00000000 [ 660.350645][ C0] [<80227a24>] (arch_cpu_idle_exit) from [<802b158c>] (do_idle+0x5c/0x2d8) [ 660.351000][ C0] [<802b1530>] (do_idle) from [<802b1b38>] (cpu_startup_entry+0x30/0x34) [ 660.351355][ C0] r10:8281aff4 r9:8280c680 r8:823beae8 r7:00000000 r6:deffc06c r5:828222e8 [ 660.351657][ C0] r4:000000ed [ 660.351819][ C0] [<802b1b08>] (cpu_startup_entry) from [<81aae93c>] (kernel_init+0x0/0x138) [ 660.352187][ C0] [<81aae85c>] (rest_init) from [<8260145c>] (start_kernel+0x844/0x860) [ 660.352572][ C0] [<82600c18>] (start_kernel) from [<00000000>] (0x0) [ 660.355217][ C0] Rebooting in 86400 seconds..