[ 399.661606][ T3132] 8021q: adding VLAN 0 to HW filter on device bond0 [ 421.295087][ T3132] eql: remember to turn off Van-Jacobson compression on your slave devices Warning: Permanently added '[localhost]:61929' (ED25519) to the list of known hosts. [ 841.030840][ T25] audit: type=1400 audit(840.130:60): avc: denied { execute } for pid=3304 comm="sh" name="syz-execprog" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 841.064401][ T25] audit: type=1400 audit(840.150:61): avc: denied { execute_no_trans } for pid=3304 comm="sh" path="/syz-execprog" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 1970/01/01 00:14:11 ignoring optional flag "sandboxArg"="0" 1970/01/01 00:14:52 parsed 1 programs [ 893.919289][ T25] audit: type=1400 audit(893.010:62): avc: denied { node_bind } for pid=3304 comm="syz-execprog" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 913.258443][ T25] audit: type=1400 audit(912.340:63): avc: denied { mounton } for pid=3312 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=1870 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 913.279074][ T25] audit: type=1400 audit(912.370:64): avc: denied { mount } for pid=3312 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 913.363284][ T3312] cgroup: Unknown subsys name 'net' [ 913.418561][ T25] audit: type=1400 audit(912.510:65): avc: denied { unmount } for pid=3312 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 913.842205][ T3312] cgroup: Unknown subsys name 'cpuset' [ 913.944036][ T3312] cgroup: Unknown subsys name 'rlimit' [ 914.884676][ T25] audit: type=1400 audit(913.980:66): avc: denied { setattr } for pid=3312 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 914.915830][ T25] audit: type=1400 audit(914.010:67): avc: denied { create } for pid=3312 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 914.941591][ T25] audit: type=1400 audit(914.030:68): avc: denied { write } for pid=3312 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 914.965157][ T25] audit: type=1400 audit(914.050:69): avc: denied { module_request } for pid=3312 comm="syz-executor" kmod="net-pf-16-proto-16-family-nl802154" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 915.501223][ T25] audit: type=1400 audit(914.590:70): avc: denied { read } for pid=3312 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 915.554007][ T25] audit: type=1400 audit(914.650:71): avc: denied { mounton } for pid=3312 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 915.587851][ T25] audit: type=1400 audit(914.670:72): avc: denied { mount } for pid=3312 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 916.802173][ T3316] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 917.027626][ T3312] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 941.604733][ T25] kauditd_printk_skb: 4 callbacks suppressed [ 941.614181][ T25] audit: type=1400 audit(940.700:77): avc: denied { execmem } for pid=3317 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 942.218893][ T25] audit: type=1400 audit(941.270:78): avc: denied { read } for pid=3318 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 942.226456][ T25] audit: type=1400 audit(941.310:79): avc: denied { open } for pid=3318 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 942.398150][ T25] audit: type=1400 audit(941.490:80): avc: denied { mounton } for pid=3318 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 945.238031][ T25] audit: type=1400 audit(944.310:81): avc: denied { mount } for pid=3318 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 945.318104][ T25] audit: type=1400 audit(944.400:82): avc: denied { mounton } for pid=3318 comm="syz-executor" path="/syzkaller.HU5Gb4/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 945.398081][ T25] audit: type=1400 audit(944.490:83): avc: denied { mount } for pid=3318 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 945.540032][ T25] audit: type=1400 audit(944.620:84): avc: denied { mounton } for pid=3318 comm="syz-executor" path="/syzkaller.HU5Gb4/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 945.601032][ T25] audit: type=1400 audit(944.700:85): avc: denied { mounton } for pid=3318 comm="syz-executor" path="/syzkaller.HU5Gb4/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=2547 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 945.982893][ T25] audit: type=1400 audit(945.080:86): avc: denied { unmount } for pid=3318 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 947.463923][ T3318] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 948.489026][ T25] kauditd_printk_skb: 5 callbacks suppressed [ 948.497828][ T25] audit: type=1400 audit(947.580:92): avc: denied { read write } for pid=3318 comm="syz-executor" name="loop0" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 948.559844][ T25] audit: type=1400 audit(947.620:93): avc: denied { open } for pid=3318 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 948.581000][ T25] audit: type=1400 audit(947.670:94): avc: denied { ioctl } for pid=3318 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=637 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 968.381055][ T25] audit: type=1401 audit(967.480:95): op=setxattr invalid_context="u:object_r:app_data_file:s0:c512,c768" [ 1002.162384][ T25] audit: type=1400 audit(1001.260:96): avc: denied { create } for pid=3356 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=user_namespace permissive=1 [ 1002.343425][ T25] audit: type=1400 audit(1001.420:97): avc: denied { sys_admin } for pid=3356 comm="syz-executor" capability=21 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=cap_userns permissive=1 [ 1008.150538][ T25] audit: type=1400 audit(1007.230:98): avc: denied { sys_chroot } for pid=3357 comm="syz-executor" capability=18 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=cap_userns permissive=1 [ 1012.831664][ T25] audit: type=1400 audit(1011.900:99): avc: denied { create } for pid=3363 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 1036.221568][ T25] audit: type=1400 audit(1035.310:100): avc: denied { sys_module } for pid=3380 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 1049.110955][ T3380] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1049.182901][ T3380] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1055.273200][ T3380] hsr_slave_0: entered promiscuous mode [ 1055.304386][ T3380] hsr_slave_1: entered promiscuous mode [ 1059.086040][ T3380] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 1059.219736][ T3380] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 1059.302550][ T3380] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 1059.391274][ T3380] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 1067.883478][ T3380] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1095.623234][ T3380] veth0_vlan: entered promiscuous mode [ 1095.884687][ T3380] veth1_vlan: entered promiscuous mode [ 1096.821983][ T3380] veth0_macvtap: entered promiscuous mode [ 1096.955917][ T3380] veth1_macvtap: entered promiscuous mode [ 1098.120537][ T3380] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1098.125235][ T3380] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1098.139899][ T3380] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1098.144247][ T3380] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1103.725256][ T28] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1104.825040][ T28] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1105.329728][ T28] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1105.801782][ T28] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1118.781332][ T28] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1119.110271][ T28] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1119.301438][ T28] bond0 (unregistering): Released all slaves [ 1120.861888][ T28] hsr_slave_0: left promiscuous mode [ 1120.921742][ T28] hsr_slave_1: left promiscuous mode [ 1121.398723][ T28] veth1_macvtap: left promiscuous mode [ 1121.403470][ T28] veth0_macvtap: left promiscuous mode [ 1121.431215][ T28] veth1_vlan: left promiscuous mode [ 1121.440872][ T28] veth0_vlan: left promiscuous mode 1970/01/01 00:18:52 executed programs: 0 [ 1176.581894][ T3474] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1176.746380][ T3474] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1194.961391][ T3474] hsr_slave_0: entered promiscuous mode [ 1195.042164][ T3474] hsr_slave_1: entered promiscuous mode [ 1210.463875][ T3474] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 1210.683035][ T3474] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 1210.901421][ T3474] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 1211.122296][ T3474] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 1223.770310][ T3474] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1275.764141][ T3474] veth0_vlan: entered promiscuous mode [ 1276.190553][ T3474] veth1_vlan: entered promiscuous mode [ 1277.863924][ T3474] veth0_macvtap: entered promiscuous mode [ 1278.161259][ T3474] veth1_macvtap: entered promiscuous mode [ 1279.744264][ T3474] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1279.768229][ T3474] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1279.792163][ T3474] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1279.799836][ T3474] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 1970/01/01 00:21:22 executed programs: 2 [ 1284.428872][ T25] audit: type=1400 audit(1283.510:101): avc: denied { read } for pid=3618 comm="syz.2.16" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 1284.448260][ T25] audit: type=1400 audit(1283.540:102): avc: denied { open } for pid=3618 comm="syz.2.16" path="/dev/kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 1284.550998][ T25] audit: type=1400 audit(1283.590:103): avc: denied { ioctl } for pid=3618 comm="syz.2.16" path="/dev/kvm" dev="devtmpfs" ino=84 ioctlcmd=0xae01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 1285.163891][ T3618] ------------[ cut here ]------------ [ 1285.165168][ T3618] WARNING: CPU: 0 PID: 3618 at arch/arm64/kvm/inject_fault.c:71 pend_serror_exception+0x19c/0x5ac [ 1285.169479][ T3618] Modules linked in: [ 1285.172378][ T3618] CPU: 0 UID: 0 PID: 3618 Comm: syz.2.16 Not tainted 6.16.0-rc3-syzkaller-g15724a984643 #0 PREEMPT [ 1285.174505][ T3618] Hardware name: linux,dummy-virt (DT) [ 1285.176032][ T3618] pstate: 81402009 (Nzcv daif +PAN -UAO -TCO +DIT -SSBS BTYPE=--) [ 1285.177732][ T3618] pc : pend_serror_exception+0x19c/0x5ac [ 1285.179010][ T3618] lr : pend_serror_exception+0x19c/0x5ac [ 1285.180228][ T3618] sp : ffff80008e837930 [ 1285.181270][ T3618] x29: ffff80008e837930 x28: 8ff000001f598028 x27: 0000000000000001 [ 1285.183352][ T3618] x26: 0000000000000000 x25: 0000000000000001 x24: 000000000000008f [ 1285.185367][ T3618] x23: 8ff000001f5982a8 x22: 000000000000008f x21: 8ff000001f598e81 [ 1285.187180][ T3618] x20: 0000000000000007 x19: efff800000000000 x18: 0000000000000000 [ 1285.189196][ T3618] x17: 0000000000000081 x16: ffff800080011d9c x15: 0000000020000200 [ 1285.191175][ T3618] x14: ffffffffffffffff x13: 0000000000000028 x12: 000000000000003b [ 1285.192995][ T3618] x11: 3bf000001f4a9564 x10: 0000000000ff0100 x9 : 0000000000000000 [ 1285.195037][ T3618] x8 : 3bf000001f4a8000 x7 : ffff800080b08704 x6 : ffff80008e837a88 [ 1285.196969][ T3618] x5 : ffff80008e837a88 x4 : 0000000000000001 x3 : ffff8000801a2e80 [ 1285.198910][ T3618] x2 : 0000000000000000 x1 : 0000000000000002 x0 : 0000000000000000 [ 1285.201078][ T3618] Call trace: [ 1285.202327][ T3618] pend_serror_exception+0x19c/0x5ac (P) [ 1285.203969][ T3618] kvm_inject_serror_esr+0x274/0xe40 [ 1285.205321][ T3618] __kvm_arm_vcpu_set_events+0x1d4/0x238 [ 1285.206597][ T3618] kvm_arch_vcpu_ioctl+0xed8/0x16b0 [ 1285.207830][ T3618] kvm_vcpu_ioctl+0x5c4/0xc2c [ 1285.209094][ T3618] __arm64_sys_ioctl+0x18c/0x244 [ 1285.210339][ T3618] invoke_syscall+0x90/0x2b4 [ 1285.211511][ T3618] el0_svc_common+0x180/0x2f4 [ 1285.212748][ T3618] do_el0_svc+0x58/0x74 [ 1285.213770][ T3618] el0_svc+0x58/0x160 [ 1285.214874][ T3618] el0t_64_sync_handler+0x78/0x108 [ 1285.216140][ T3618] el0t_64_sync+0x198/0x19c [ 1285.217585][ T3618] irq event stamp: 2976 [ 1285.218590][ T3618] hardirqs last enabled at (2975): [] _raw_read_unlock_irqrestore+0x44/0xbc [ 1285.220385][ T3618] hardirqs last disabled at (2976): [] el1_dbg+0x24/0x80 [ 1285.221977][ T3618] softirqs last enabled at (2950): [] local_bh_enable+0x10/0x34 [ 1285.223591][ T3618] softirqs last disabled at (2948): [] local_bh_disable+0x10/0x34 [ 1285.225473][ T3618] ---[ end trace 0000000000000000 ]--- [ 1288.226161][ T3622] ------------[ cut here ]------------ [ 1288.226758][ T3622] WARNING: CPU: 0 PID: 3622 at arch/arm64/kvm/inject_fault.c:71 pend_serror_exception+0x19c/0x5ac [ 1288.229491][ T3622] Modules linked in: [ 1288.231345][ T3622] CPU: 0 UID: 0 PID: 3622 Comm: syz.2.17 Tainted: G W 6.16.0-rc3-syzkaller-g15724a984643 #0 PREEMPT [ 1288.233452][ T3622] Tainted: [W]=WARN [ 1288.234412][ T3622] Hardware name: linux,dummy-virt (DT) [ 1288.235524][ T3622] pstate: 81402009 (Nzcv daif +PAN -UAO -TCO +DIT -SSBS BTYPE=--) [ 1288.236910][ T3622] pc : pend_serror_exception+0x19c/0x5ac [ 1288.238116][ T3622] lr : pend_serror_exception+0x19c/0x5ac [ 1288.239256][ T3622] sp : ffff80008e837930 [ 1288.240205][ T3622] x29: ffff80008e837930 x28: ccf000001f598028 x27: 0000000000000001 [ 1288.242161][ T3622] x26: 0000000000000000 x25: 0000000000000001 x24: 00000000000000cc [ 1288.244073][ T3622] x23: ccf000001f5982a8 x22: 00000000000000cc x21: ccf000001f598e81 [ 1288.245875][ T3622] x20: 0000000000000007 x19: efff800000000000 x18: 0000000000000000 [ 1288.247766][ T3622] x17: 0000000000000081 x16: ffff800080011d9c x15: 0000000020000200 [ 1288.249683][ T3622] x14: ffffffffffffffff x13: 0000000000000028 x12: 0000000000000046 [ 1288.251537][ T3622] x11: 46f000001f4a9564 x10: 0000000000ff0100 x9 : 0000000000000000 [ 1288.253449][ T3622] x8 : 46f000001f4a8000 x7 : ffff800080b08704 x6 : ffff80008e837a88 [ 1288.255338][ T3622] x5 : ffff80008e837a88 x4 : 0000000000000001 x3 : ffff8000801a2e80 [ 1288.257116][ T3622] x2 : 0000000000000000 x1 : 0000000000000002 x0 : 0000000000000000 [ 1288.259034][ T3622] Call trace: [ 1288.259882][ T3622] pend_serror_exception+0x19c/0x5ac (P) [ 1288.261122][ T3622] kvm_inject_serror_esr+0x274/0xe40 [ 1288.262346][ T3622] __kvm_arm_vcpu_set_events+0x1d4/0x238 [ 1288.263478][ T3622] kvm_arch_vcpu_ioctl+0xed8/0x16b0 [ 1288.264655][ T3622] kvm_vcpu_ioctl+0x5c4/0xc2c [ 1288.265801][ T3622] __arm64_sys_ioctl+0x18c/0x244 [ 1288.266848][ T3622] invoke_syscall+0x90/0x2b4 [ 1288.268019][ T3622] el0_svc_common+0x180/0x2f4 [ 1288.269224][ T3622] do_el0_svc+0x58/0x74 [ 1288.270416][ T3622] el0_svc+0x58/0x160 [ 1288.271506][ T3622] el0t_64_sync_handler+0x78/0x108 [ 1288.272591][ T3622] el0t_64_sync+0x198/0x19c [ 1288.273682][ T3622] irq event stamp: 2056 [ 1288.274622][ T3622] hardirqs last enabled at (2055): [] _raw_read_unlock_irqrestore+0x44/0xbc [ 1288.276346][ T3622] hardirqs last disabled at (2056): [] el1_dbg+0x24/0x80 [ 1288.277754][ T3622] softirqs last enabled at (1962): [] local_bh_enable+0x10/0x34 [ 1288.279372][ T3622] softirqs last disabled at (1960): [] local_bh_disable+0x10/0x34 [ 1288.280947][ T3622] ---[ end trace 0000000000000000 ]--- 1970/01/01 00:21:28 executed programs: 4 [ 1291.104283][ T3624] ------------[ cut here ]------------ [ 1291.104839][ T3624] WARNING: CPU: 0 PID: 3624 at arch/arm64/kvm/inject_fault.c:71 pend_serror_exception+0x19c/0x5ac [ 1291.107476][ T3624] Modules linked in: [ 1291.108730][ T3624] CPU: 0 UID: 0 PID: 3624 Comm: syz.2.18 Tainted: G W 6.16.0-rc3-syzkaller-g15724a984643 #0 PREEMPT [ 1291.110755][ T3624] Tainted: [W]=WARN [ 1291.111647][ T3624] Hardware name: linux,dummy-virt (DT) [ 1291.112724][ T3624] pstate: 81402009 (Nzcv daif +PAN -UAO -TCO +DIT -SSBS BTYPE=--) [ 1291.114006][ T3624] pc : pend_serror_exception+0x19c/0x5ac [ 1291.115168][ T3624] lr : pend_serror_exception+0x19c/0x5ac [ 1291.116402][ T3624] sp : ffff80008e837930 [ 1291.117381][ T3624] x29: ffff80008e837930 x28: 7ef000001f598028 x27: 0000000000000001 [ 1291.119327][ T3624] x26: 0000000000000000 x25: 0000000000000001 x24: 000000000000007e [ 1291.121198][ T3624] x23: 7ef000001f5982a8 x22: 000000000000007e x21: 7ef000001f598e81 [ 1291.123130][ T3624] x20: 0000000000000007 x19: efff800000000000 x18: 0000000000000000 [ 1291.125004][ T3624] x17: 0000000000000081 x16: ffff800080011d9c x15: 0000000020000200 [ 1291.126795][ T3624] x14: ffffffffffffffff x13: 0000000000000028 x12: 00000000000000db [ 1291.128737][ T3624] x11: dbf000001f4a9564 x10: 0000000000ff0100 x9 : 0000000000000000 [ 1291.130645][ T3624] x8 : dbf000001f4a8000 x7 : ffff800080b08704 x6 : ffff80008e837a88 [ 1291.132566][ T3624] x5 : ffff80008e837a88 x4 : 0000000000000001 x3 : ffff8000801a2e80 [ 1291.134346][ T3624] x2 : 0000000000000000 x1 : 0000000000000002 x0 : 0000000000000000 [ 1291.136231][ T3624] Call trace: [ 1291.137074][ T3624] pend_serror_exception+0x19c/0x5ac (P) [ 1291.138324][ T3624] kvm_inject_serror_esr+0x274/0xe40 [ 1291.139522][ T3624] __kvm_arm_vcpu_set_events+0x1d4/0x238 [ 1291.140781][ T3624] kvm_arch_vcpu_ioctl+0xed8/0x16b0 [ 1291.141888][ T3624] kvm_vcpu_ioctl+0x5c4/0xc2c [ 1291.143076][ T3624] __arm64_sys_ioctl+0x18c/0x244 [ 1291.144294][ T3624] invoke_syscall+0x90/0x2b4 [ 1291.145481][ T3624] el0_svc_common+0x180/0x2f4 [ 1291.146528][ T3624] do_el0_svc+0x58/0x74 [ 1291.147650][ T3624] el0_svc+0x58/0x160 [ 1291.148749][ T3624] el0t_64_sync_handler+0x78/0x108 [ 1291.149832][ T3624] el0t_64_sync+0x198/0x19c [ 1291.150959][ T3624] irq event stamp: 1970 [ 1291.151834][ T3624] hardirqs last enabled at (1969): [] _raw_read_unlock_irqrestore+0x44/0xbc [ 1291.153558][ T3624] hardirqs last disabled at (1970): [] el1_dbg+0x24/0x80 [ 1291.154903][ T3624] softirqs last enabled at (1928): [] local_bh_enable+0x10/0x34 [ 1291.156513][ T3624] softirqs last disabled at (1926): [] local_bh_disable+0x10/0x34 [ 1291.158060][ T3624] ---[ end trace 0000000000000000 ]--- [ 1294.480147][ T3626] ------------[ cut here ]------------ [ 1294.480739][ T3626] WARNING: CPU: 0 PID: 3626 at arch/arm64/kvm/inject_fault.c:71 pend_serror_exception+0x19c/0x5ac [ 1294.483356][ T3626] Modules linked in: [ 1294.484601][ T3626] CPU: 0 UID: 0 PID: 3626 Comm: syz.2.19 Tainted: G W 6.16.0-rc3-syzkaller-g15724a984643 #0 PREEMPT [ 1294.486557][ T3626] Tainted: [W]=WARN [ 1294.487455][ T3626] Hardware name: linux,dummy-virt (DT) [ 1294.488548][ T3626] pstate: 81402009 (Nzcv daif +PAN -UAO -TCO +DIT -SSBS BTYPE=--) [ 1294.489785][ T3626] pc : pend_serror_exception+0x19c/0x5ac [ 1294.490985][ T3626] lr : pend_serror_exception+0x19c/0x5ac [ 1294.492208][ T3626] sp : ffff80008e837930 [ 1294.493172][ T3626] x29: ffff80008e837930 x28: 6ef000001f598028 x27: 0000000000000001 [ 1294.495119][ T3626] x26: 0000000000000000 x25: 0000000000000001 x24: 000000000000006e [ 1294.497038][ T3626] x23: 6ef000001f5982a8 x22: 000000000000006e x21: 6ef000001f598e81 [ 1294.498969][ T3626] x20: 0000000000000007 x19: efff800000000000 x18: 0000000000000000 [ 1294.500889][ T3626] x17: 0000000000000081 x16: ffff800080011d9c x15: 0000000020000200 [ 1294.502781][ T3626] x14: ffffffffffffffff x13: 0000000000000028 x12: 00000000000000be [ 1294.504728][ T3626] x11: bef000001f4a9564 x10: 0000000000ff0100 x9 : 0000000000000000 [ 1294.506606][ T3626] x8 : bef000001f4a8000 x7 : ffff800080b08704 x6 : ffff80008e837a88 [ 1294.508392][ T3626] x5 : ffff80008e837a88 x4 : 0000000000000001 x3 : ffff8000801a2e80 [ 1294.510256][ T3626] x2 : 0000000000000000 x1 : 0000000000000002 x0 : 0000000000000000 [ 1294.512154][ T3626] Call trace: [ 1294.513016][ T3626] pend_serror_exception+0x19c/0x5ac (P) [ 1294.514286][ T3626] kvm_inject_serror_esr+0x274/0xe40 [ 1294.515456][ T3626] __kvm_arm_vcpu_set_events+0x1d4/0x238 [ 1294.516738][ T3626] kvm_arch_vcpu_ioctl+0xed8/0x16b0 [ 1294.517980][ T3626] kvm_vcpu_ioctl+0x5c4/0xc2c [ 1294.519067][ T3626] __arm64_sys_ioctl+0x18c/0x244 [ 1294.520324][ T3626] invoke_syscall+0x90/0x2b4 [ 1294.521514][ T3626] el0_svc_common+0x180/0x2f4 [ 1294.522729][ T3626] do_el0_svc+0x58/0x74 [ 1294.523851][ T3626] el0_svc+0x58/0x160 [ 1294.524941][ T3626] el0t_64_sync_handler+0x78/0x108 [ 1294.525991][ T3626] el0t_64_sync+0x198/0x19c [ 1294.527097][ T3626] irq event stamp: 2066 [ 1294.528066][ T3626] hardirqs last enabled at (2065): [] _raw_read_unlock_irqrestore+0x44/0xbc [ 1294.529820][ T3626] hardirqs last disabled at (2066): [] el1_dbg+0x24/0x80 [ 1294.531340][ T3626] softirqs last enabled at (1966): [] local_bh_enable+0x10/0x34 [ 1294.532831][ T3626] softirqs last disabled at (1964): [] local_bh_disable+0x10/0x34 [ 1294.534485][ T3626] ---[ end trace 0000000000000000 ]--- 1970/01/01 00:21:35 executed programs: 6 [ 1298.012926][ T3628] ------------[ cut here ]------------ [ 1298.013487][ T3628] WARNING: CPU: 0 PID: 3628 at arch/arm64/kvm/inject_fault.c:71 pend_serror_exception+0x19c/0x5ac [ 1298.015974][ T3628] Modules linked in: [ 1298.017328][ T3628] CPU: 0 UID: 0 PID: 3628 Comm: syz.2.20 Tainted: G W 6.16.0-rc3-syzkaller-g15724a984643 #0 PREEMPT [ 1298.019286][ T3628] Tainted: [W]=WARN [ 1298.020193][ T3628] Hardware name: linux,dummy-virt (DT) [ 1298.021280][ T3628] pstate: 81402009 (Nzcv daif +PAN -UAO -TCO +DIT -SSBS BTYPE=--) [ 1298.022668][ T3628] pc : pend_serror_exception+0x19c/0x5ac [ 1298.023821][ T3628] lr : pend_serror_exception+0x19c/0x5ac [ 1298.024975][ T3628] sp : ffff80008e837930 [ 1298.025873][ T3628] x29: ffff80008e837930 x28: a0f000001f598028 x27: 0000000000000001 [ 1298.027803][ T3628] x26: 0000000000000000 x25: 0000000000000001 x24: 00000000000000a0 [ 1298.029625][ T3628] x23: a0f000001f5982a8 x22: 00000000000000a0 x21: a0f000001f598e81 [ 1298.031512][ T3628] x20: 0000000000000007 x19: efff800000000000 x18: 0000000000000000 [ 1298.033485][ T3628] x17: 0000000000000081 x16: ffff800080011d9c x15: 0000000020000200 [ 1298.035383][ T3628] x14: ffffffffffffffff x13: 0000000000000028 x12: 00000000000000d7 [ 1298.037271][ T3628] x11: d7f000001f4a9564 x10: 0000000000ff0100 x9 : 0000000000000000 [ 1298.039177][ T3628] x8 : d7f000001f4a8000 x7 : ffff800080b08704 x6 : ffff80008e837a88 [ 1298.040980][ T3628] x5 : ffff80008e837a88 x4 : 0000000000000001 x3 : ffff8000801a2e80 [ 1298.042880][ T3628] x2 : 0000000000000000 x1 : 0000000000000002 x0 : 0000000000000000 [ 1298.044784][ T3628] Call trace: [ 1298.045627][ T3628] pend_serror_exception+0x19c/0x5ac (P) [ 1298.046738][ T3628] kvm_inject_serror_esr+0x274/0xe40 [ 1298.047916][ T3628] __kvm_arm_vcpu_set_events+0x1d4/0x238 [ 1298.049192][ T3628] kvm_arch_vcpu_ioctl+0xed8/0x16b0 [ 1298.050459][ T3628] kvm_vcpu_ioctl+0x5c4/0xc2c [ 1298.051653][ T3628] __arm64_sys_ioctl+0x18c/0x244 [ 1298.052818][ T3628] invoke_syscall+0x90/0x2b4 [ 1298.053886][ T3628] el0_svc_common+0x180/0x2f4 [ 1298.055068][ T3628] do_el0_svc+0x58/0x74 [ 1298.056229][ T3628] el0_svc+0x58/0x160 [ 1298.057389][ T3628] el0t_64_sync_handler+0x78/0x108 [ 1298.058600][ T3628] el0t_64_sync+0x198/0x19c [ 1298.059681][ T3628] irq event stamp: 2104 [ 1298.060495][ T3628] hardirqs last enabled at (2103): [] _raw_read_unlock_irqrestore+0x44/0xbc [ 1298.062217][ T3628] hardirqs last disabled at (2104): [] el1_dbg+0x24/0x80 [ 1298.063703][ T3628] softirqs last enabled at (2058): [] local_bh_enable+0x10/0x34 [ 1298.065265][ T3628] softirqs last disabled at (2056): [] local_bh_disable+0x10/0x34 [ 1298.066781][ T3628] ---[ end trace 0000000000000000 ]--- [ 1301.156189][ T3630] ------------[ cut here ]------------ [ 1301.156780][ T3630] WARNING: CPU: 0 PID: 3630 at arch/arm64/kvm/inject_fault.c:71 pend_serror_exception+0x19c/0x5ac [ 1301.159111][ T3630] Modules linked in: [ 1301.160335][ T3630] CPU: 0 UID: 0 PID: 3630 Comm: syz.2.21 Tainted: G W 6.16.0-rc3-syzkaller-g15724a984643 #0 PREEMPT [ 1301.162167][ T3630] Tainted: [W]=WARN [ 1301.163035][ T3630] Hardware name: linux,dummy-virt (DT) [ 1301.164018][ T3630] pstate: 81402009 (Nzcv daif +PAN -UAO -TCO +DIT -SSBS BTYPE=--) [ 1301.165398][ T3630] pc : pend_serror_exception+0x19c/0x5ac [ 1301.166514][ T3630] lr : pend_serror_exception+0x19c/0x5ac [ 1301.167547][ T3630] sp : ffff80008e6c7930 [ 1301.168449][ T3630] x29: ffff80008e6c7930 x28: 7cf000001f598028 x27: 0000000000000001 [ 1301.170256][ T3630] x26: 0000000000000000 x25: 0000000000000001 x24: 000000000000007c [ 1301.171922][ T3630] x23: 7cf000001f5982a8 x22: 000000000000007c x21: 7cf000001f598e81 [ 1301.173798][ T3630] x20: 0000000000000007 x19: efff800000000000 x18: 0000000000000000 [ 1301.175597][ T3630] x17: 000000000000002f x16: ffff800080011d9c x15: 0000000020000200 [ 1301.177482][ T3630] x14: ffffffffffffffff x13: 0000000000000028 x12: 00000000000000ec [ 1301.179283][ T3630] x11: ecf000001db01564 x10: 0000000000ff0100 x9 : 0000000000000000 [ 1301.181053][ T3630] x8 : ecf000001db00000 x7 : ffff800080b08704 x6 : ffff80008e6c7a88 [ 1301.182859][ T3630] x5 : ffff80008e6c7a88 x4 : 0000000000000001 x3 : ffff8000801a2e80 [ 1301.184665][ T3630] x2 : 0000000000000000 x1 : 0000000000000002 x0 : 0000000000000000 [ 1301.186410][ T3630] Call trace: [ 1301.187196][ T3630] pend_serror_exception+0x19c/0x5ac (P) [ 1301.188443][ T3630] kvm_inject_serror_esr+0x274/0xe40 [ 1301.189582][ T3630] __kvm_arm_vcpu_set_events+0x1d4/0x238 [ 1301.190679][ T3630] kvm_arch_vcpu_ioctl+0xed8/0x16b0 [ 1301.191829][ T3630] kvm_vcpu_ioctl+0x5c4/0xc2c [ 1301.192998][ T3630] __arm64_sys_ioctl+0x18c/0x244 [ 1301.194102][ T3630] invoke_syscall+0x90/0x2b4 [ 1301.195253][ T3630] el0_svc_common+0x180/0x2f4 [ 1301.196320][ T3630] do_el0_svc+0x58/0x74 [ 1301.197495][ T3630] el0_svc+0x58/0x160 [ 1301.198534][ T3630] el0t_64_sync_handler+0x78/0x108 [ 1301.199675][ T3630] el0t_64_sync+0x198/0x19c [ 1301.200678][ T3630] irq event stamp: 2068 [ 1301.201580][ T3630] hardirqs last enabled at (2067): [] _raw_read_unlock_irqrestore+0x44/0xbc [ 1301.203143][ T3630] hardirqs last disabled at (2068): [] el1_dbg+0x24/0x80 [ 1301.204590][ T3630] softirqs last enabled at (1970): [] local_bh_enable+0x10/0x34 [ 1301.206051][ T3630] softirqs last disabled at (1968): [] local_bh_disable+0x10/0x34 [ 1301.207572][ T3630] ---[ end trace 0000000000000000 ]--- 1970/01/01 00:21:41 executed programs: 8 [ 1304.043308][ T3632] ------------[ cut here ]------------ [ 1304.043865][ T3632] WARNING: CPU: 0 PID: 3632 at arch/arm64/kvm/inject_fault.c:71 pend_serror_exception+0x19c/0x5ac [ 1304.046226][ T3632] Modules linked in: [ 1304.047418][ T3632] CPU: 0 UID: 0 PID: 3632 Comm: syz.2.22 Tainted: G W 6.16.0-rc3-syzkaller-g15724a984643 #0 PREEMPT [ 1304.049196][ T3632] Tainted: [W]=WARN [ 1304.050066][ T3632] Hardware name: linux,dummy-virt (DT) [ 1304.051105][ T3632] pstate: 81402009 (Nzcv daif +PAN -UAO -TCO +DIT -SSBS BTYPE=--) [ 1304.052413][ T3632] pc : pend_serror_exception+0x19c/0x5ac [ 1304.053389][ T3632] lr : pend_serror_exception+0x19c/0x5ac [ 1304.054483][ T3632] sp : ffff80008e6c7930 [ 1304.055345][ T3632] x29: ffff80008e6c7930 x28: 93f000001f598028 x27: 0000000000000001 [ 1304.057201][ T3632] x26: 0000000000000000 x25: 0000000000000001 x24: 0000000000000093 [ 1304.058947][ T3632] x23: 93f000001f5982a8 x22: 0000000000000093 x21: 93f000001f598e81 [ 1304.060779][ T3632] x20: 0000000000000007 x19: efff800000000000 x18: 0000000000000000 [ 1304.062593][ T3632] x17: 000000000000002f x16: ffff800080011d9c x15: 0000000020000200 [ 1304.064447][ T3632] x14: ffffffffffffffff x13: 0000000000000028 x12: 000000000000000e [ 1304.066170][ T3632] x11: 0ef000001db01564 x10: 0000000000ff0100 x9 : 0000000000000000 [ 1304.067998][ T3632] x8 : 0ef000001db00000 x7 : ffff800080b08704 x6 : ffff80008e6c7a88 [ 1304.069716][ T3632] x5 : ffff80008e6c7a88 x4 : 0000000000000001 x3 : ffff8000801a2e80 [ 1304.071530][ T3632] x2 : 0000000000000000 x1 : 0000000000000002 x0 : 0000000000000000 [ 1304.073346][ T3632] Call trace: [ 1304.074131][ T3632] pend_serror_exception+0x19c/0x5ac (P) [ 1304.075354][ T3632] kvm_inject_serror_esr+0x274/0xe40 [ 1304.076468][ T3632] __kvm_arm_vcpu_set_events+0x1d4/0x238 [ 1304.077644][ T3632] kvm_arch_vcpu_ioctl+0xed8/0x16b0 [ 1304.078784][ T3632] kvm_vcpu_ioctl+0x5c4/0xc2c [ 1304.079789][ T3632] __arm64_sys_ioctl+0x18c/0x244 [ 1304.080966][ T3632] invoke_syscall+0x90/0x2b4 [ 1304.082087][ T3632] el0_svc_common+0x180/0x2f4 [ 1304.083215][ T3632] do_el0_svc+0x58/0x74 [ 1304.084329][ T3632] el0_svc+0x58/0x160 [ 1304.085354][ T3632] el0t_64_sync_handler+0x78/0x108 [ 1304.086469][ T3632] el0t_64_sync+0x198/0x19c [ 1304.087576][ T3632] irq event stamp: 2104 [ 1304.088468][ T3632] hardirqs last enabled at (2103): [] _raw_read_unlock_irqrestore+0x44/0xbc [ 1304.090087][ T3632] hardirqs last disabled at (2104): [] el1_dbg+0x24/0x80 [ 1304.091523][ T3632] softirqs last enabled at (2050): [] local_bh_enable+0x10/0x34 [ 1304.093015][ T3632] softirqs last disabled at (2048): [] local_bh_disable+0x10/0x34 [ 1304.094487][ T3632] ---[ end trace 0000000000000000 ]--- [ 1306.952987][ T3634] ------------[ cut here ]------------ [ 1306.953560][ T3634] WARNING: CPU: 0 PID: 3634 at arch/arm64/kvm/inject_fault.c:71 pend_serror_exception+0x19c/0x5ac [ 1306.956078][ T3634] Modules linked in: [ 1306.957328][ T3634] CPU: 0 UID: 0 PID: 3634 Comm: syz.2.23 Tainted: G W 6.16.0-rc3-syzkaller-g15724a984643 #0 PREEMPT [ 1306.959121][ T3634] Tainted: [W]=WARN [ 1306.959997][ T3634] Hardware name: linux,dummy-virt (DT) [ 1306.961027][ T3634] pstate: 81402009 (Nzcv daif +PAN -UAO -TCO +DIT -SSBS BTYPE=--) [ 1306.962368][ T3634] pc : pend_serror_exception+0x19c/0x5ac [ 1306.963507][ T3634] lr : pend_serror_exception+0x19c/0x5ac [ 1306.964595][ T3634] sp : ffff80008e6c7930 [ 1306.965461][ T3634] x29: ffff80008e6c7930 x28: 9af000001f598028 x27: 0000000000000001 [ 1306.967304][ T3634] x26: 0000000000000000 x25: 0000000000000001 x24: 000000000000009a [ 1306.969268][ T3634] x23: 9af000001f5982a8 x22: 000000000000009a x21: 9af000001f598e81 [ 1306.970998][ T3634] x20: 0000000000000007 x19: efff800000000000 x18: 0000000000000000 [ 1306.972830][ T3634] x17: 000000000000002f x16: ffff800080011d9c x15: 0000000020000200 [ 1306.974519][ T3634] x14: ffffffffffffffff x13: 0000000000000028 x12: 000000000000000e [ 1306.976313][ T3634] x11: 0ef000001db01564 x10: 0000000000ff0100 x9 : 0000000000000000 [ 1306.978061][ T3634] x8 : 0ef000001db00000 x7 : ffff800080b08704 x6 : ffff80008e6c7a88 [ 1306.979817][ T3634] x5 : ffff80008e6c7a88 x4 : 0000000000000001 x3 : ffff8000801a2e80 [ 1306.981602][ T3634] x2 : 0000000000000000 x1 : 0000000000000002 x0 : 0000000000000000 [ 1306.983375][ T3634] Call trace: [ 1306.984190][ T3634] pend_serror_exception+0x19c/0x5ac (P) [ 1306.985378][ T3634] kvm_inject_serror_esr+0x274/0xe40 [ 1306.986452][ T3634] __kvm_arm_vcpu_set_events+0x1d4/0x238 [ 1306.987492][ T3634] kvm_arch_vcpu_ioctl+0xed8/0x16b0 [ 1306.988626][ T3634] kvm_vcpu_ioctl+0x5c4/0xc2c [ 1306.989711][ T3634] __arm64_sys_ioctl+0x18c/0x244 [ 1306.990792][ T3634] invoke_syscall+0x90/0x2b4 [ 1306.991909][ T3634] el0_svc_common+0x180/0x2f4 [ 1306.993046][ T3634] do_el0_svc+0x58/0x74 [ 1306.994133][ T3634] el0_svc+0x58/0x160 [ 1306.995160][ T3634] el0t_64_sync_handler+0x78/0x108 [ 1306.996328][ T3634] el0t_64_sync+0x198/0x19c [ 1306.997359][ T3634] irq event stamp: 2164 [ 1306.998215][ T3634] hardirqs last enabled at (2163): [] _raw_read_unlock_irqrestore+0x44/0xbc [ 1306.999789][ T3634] hardirqs last disabled at (2164): [] el1_dbg+0x24/0x80 [ 1307.001261][ T3634] softirqs last enabled at (2122): [] local_bh_enable+0x10/0x34 [ 1307.002712][ T3634] softirqs last disabled at (2120): [] local_bh_disable+0x10/0x34 [ 1307.004186][ T3634] ---[ end trace 0000000000000000 ]--- 1970/01/01 00:21:47 executed programs: 10 [ 1309.583854][ T3636] ------------[ cut here ]------------ [ 1309.584450][ T3636] WARNING: CPU: 0 PID: 3636 at arch/arm64/kvm/inject_fault.c:71 pend_serror_exception+0x19c/0x5ac [ 1309.586947][ T3636] Modules linked in: [ 1309.588137][ T3636] CPU: 0 UID: 0 PID: 3636 Comm: syz.2.24 Tainted: G W 6.16.0-rc3-syzkaller-g15724a984643 #0 PREEMPT [ 1309.589938][ T3636] Tainted: [W]=WARN [ 1309.590797][ T3636] Hardware name: linux,dummy-virt (DT) [ 1309.591809][ T3636] pstate: 81402009 (Nzcv daif +PAN -UAO -TCO +DIT -SSBS BTYPE=--) [ 1309.593098][ T3636] pc : pend_serror_exception+0x19c/0x5ac [ 1309.594212][ T3636] lr : pend_serror_exception+0x19c/0x5ac [ 1309.595352][ T3636] sp : ffff80008e6c7930 [ 1309.596201][ T3636] x29: ffff80008e6c7930 x28: 5df000001f598028 x27: 0000000000000001 [ 1309.598016][ T3636] x26: 0000000000000000 x25: 0000000000000001 x24: 000000000000005d [ 1309.599818][ T3636] x23: 5df000001f5982a8 x22: 000000000000005d x21: 5df000001f598e81 [ 1309.601610][ T3636] x20: 0000000000000007 x19: efff800000000000 x18: 0000000000000000 [ 1309.603383][ T3636] x17: 000000000000002f x16: ffff800080011d9c x15: 0000000020000200 [ 1309.605207][ T3636] x14: ffffffffffffffff x13: 0000000000000028 x12: 00000000000000d3 [ 1309.606987][ T3636] x11: d3f000001db01564 x10: 0000000000ff0100 x9 : 0000000000000000 [ 1309.608779][ T3636] x8 : d3f000001db00000 x7 : ffff800080b08704 x6 : ffff80008e6c7a88 [ 1309.610555][ T3636] x5 : ffff80008e6c7a88 x4 : 0000000000000001 x3 : ffff8000801a2e80 [ 1309.612315][ T3636] x2 : 0000000000000000 x1 : 0000000000000002 x0 : 0000000000000000 [ 1309.614106][ T3636] Call trace: [ 1309.614935][ T3636] pend_serror_exception+0x19c/0x5ac (P) [ 1309.616135][ T3636] kvm_inject_serror_esr+0x274/0xe40 [ 1309.617229][ T3636] __kvm_arm_vcpu_set_events+0x1d4/0x238 [ 1309.618427][ T3636] kvm_arch_vcpu_ioctl+0xed8/0x16b0 [ 1309.619580][ T3636] kvm_vcpu_ioctl+0x5c4/0xc2c [ 1309.620599][ T3636] __arm64_sys_ioctl+0x18c/0x244 [ 1309.621719][ T3636] invoke_syscall+0x90/0x2b4 [ 1309.622829][ T3636] el0_svc_common+0x180/0x2f4 [ 1309.623947][ T3636] do_el0_svc+0x58/0x74 [ 1309.625050][ T3636] el0_svc+0x58/0x160 [ 1309.626062][ T3636] el0t_64_sync_handler+0x78/0x108 [ 1309.627173][ T3636] el0t_64_sync+0x198/0x19c [ 1309.628272][ T3636] irq event stamp: 1982 [ 1309.629203][ T3636] hardirqs last enabled at (1981): [] _raw_read_unlock_irqrestore+0x44/0xbc [ 1309.630825][ T3636] hardirqs last disabled at (1982): [] el1_dbg+0x24/0x80 [ 1309.632292][ T3636] softirqs last enabled at (1932): [] local_bh_enable+0x10/0x34 [ 1309.633753][ T3636] softirqs last disabled at (1930): [] local_bh_disable+0x10/0x34 [ 1309.635191][ T3636] ---[ end trace 0000000000000000 ]--- [ 1312.911767][ T3637] ------------[ cut here ]------------ [ 1312.912381][ T3637] WARNING: CPU: 0 PID: 3637 at arch/arm64/kvm/inject_fault.c:71 pend_serror_exception+0x19c/0x5ac [ 1312.914871][ T3637] Modules linked in: [ 1312.915978][ T3637] CPU: 0 UID: 0 PID: 3637 Comm: syz.2.25 Tainted: G W 6.16.0-rc3-syzkaller-g15724a984643 #0 PREEMPT [ 1312.917892][ T3637] Tainted: [W]=WARN [ 1312.918763][ T3637] Hardware name: linux,dummy-virt (DT) [ 1312.919803][ T3637] pstate: 81402009 (Nzcv daif +PAN -UAO -TCO +DIT -SSBS BTYPE=--) [ 1312.921155][ T3637] pc : pend_serror_exception+0x19c/0x5ac [ 1312.922293][ T3637] lr : pend_serror_exception+0x19c/0x5ac [ 1312.923437][ T3637] sp : ffff80008e837930 [ 1312.924377][ T3637] x29: ffff80008e837930 x28: f8f000001f598028 x27: 0000000000000001 [ 1312.926188][ T3637] x26: 0000000000000000 x25: 0000000000000001 x24: 00000000000000f8 [ 1312.928024][ T3637] x23: f8f000001f5982a8 x22: 00000000000000f8 x21: f8f000001f598e81 [ 1312.929888][ T3637] x20: 0000000000000007 x19: efff800000000000 x18: 0000000000000000 [ 1312.931723][ T3637] x17: 0000000000000081 x16: ffff800080011d9c x15: 0000000020000200 [ 1312.933574][ T3637] x14: ffffffffffffffff x13: 0000000000000028 x12: 00000000000000c3 [ 1312.935395][ T3637] x11: c3f000001db06de4 x10: 0000000000ff0100 x9 : 0000000000000000 [ 1312.937225][ T3637] x8 : c3f000001db05880 x7 : ffff800080b08704 x6 : ffff80008e837a88 [ 1312.939044][ T3637] x5 : ffff80008e837a88 x4 : 0000000000000001 x3 : ffff8000801a2e80 [ 1312.940885][ T3637] x2 : 0000000000000000 x1 : 0000000000000002 x0 : 0000000000000000 [ 1312.942650][ T3637] Call trace: [ 1312.943463][ T3637] pend_serror_exception+0x19c/0x5ac (P) [ 1312.944625][ T3637] kvm_inject_serror_esr+0x274/0xe40 [ 1312.945724][ T3637] __kvm_arm_vcpu_set_events+0x1d4/0x238 [ 1312.946934][ T3637] kvm_arch_vcpu_ioctl+0xed8/0x16b0 [ 1312.948018][ T3637] kvm_vcpu_ioctl+0x5c4/0xc2c [ 1312.949182][ T3637] __arm64_sys_ioctl+0x18c/0x244 [ 1312.950351][ T3637] invoke_syscall+0x90/0x2b4 [ 1312.951507][ T3637] el0_svc_common+0x180/0x2f4 [ 1312.952666][ T3637] do_el0_svc+0x58/0x74 [ 1312.953741][ T3637] el0_svc+0x58/0x160 [ 1312.954782][ T3637] el0t_64_sync_handler+0x78/0x108 [ 1312.955869][ T3637] el0t_64_sync+0x198/0x19c [ 1312.956984][ T3637] irq event stamp: 1828 [ 1312.957867][ T3637] hardirqs last enabled at (1827): [] _raw_read_unlock_irqrestore+0x44/0xbc [ 1312.959490][ T3637] hardirqs last disabled at (1828): [] el1_dbg+0x24/0x80 [ 1312.960932][ T3637] softirqs last enabled at (1782): [] local_bh_enable+0x10/0x34 [ 1312.962335][ T3637] softirqs last disabled at (1780): [] local_bh_disable+0x10/0x34 [ 1312.963811][ T3637] ---[ end trace 0000000000000000 ]--- 1970/01/01 00:21:52 executed programs: 12 VM DIAGNOSIS: 16:53:06 Registers: info registers vcpu 0 CPU#0 PC=ffff8000820d03b0 X00=0000000000000003 X01=0000000000000002 X02=000000000000002a X03=ffff8000820d02ac X04=0000000000000001 X05=0000000000000001 X06=0000000000000000 X07=ffff800081ebe428 X08=3bf000001f4a8000 X09=0000000000000000 X10=0000000000ff0100 X11=00000000000000fe X12=0000000000000046 X13=0000000000000003 X14=0000000000000000 X15=ffff800087f39a30 X16=0000000000000000 X17=0000000000000081 X18=0000000000000000 X19=efff800000000000 X20=46f000000dca8880 X21=07ff80008c41b018 X22=0000000000000002 X23=46f000000dca897c X24=0000000000000046 X25=46f000000dca8ac8 X26=46f000000dca88c8 X27=0000000000000046 X28=0000000000000046 X29=ffff80008e837020 X30=ffff8000820d03b0 SP=ffff80008e837010 PSTATE=804023c9 N--- EL2h SVCR=00000000 -- BTYPE=0 FPCR=00000000 FPSR=00000000 P00=0000 P01=0000 P02=0000 P03=0000 P04=0000 P05=0000 P06=0000 P07=0000 P08=0000 P09=0000 P10=0000 P11=0000 P12=0000 P13=0000 P14=0000 P15=0000 FFR=0000 Z00=0000000000000000:0000000000000000 Z01=746f687370616e53:000000756c6c252e Z02=0000000000000001:0000000000000000 Z03=0000000000000000:ffffff000000ff00 Z04=0000000000000000:00000000fff000f0 Z05=0000000000000001:0000000000000002 Z06=6edc4d3a2914b135:d8e9c869e2695c88 Z07=b20fae707afde253:388e9c6c4fa85ca0 Z08=0000000000000000:0000000000000000 Z09=0000000000000000:0000000000000000 Z10=0000000000000000:0000000000000000 Z11=0000000000000000:0000000000000000 Z12=0000000000000000:0000000000000000 Z13=0000000000000000:0000000000000000 Z14=0000000000000000:0000000000000000 Z15=0000000000000000:0000000000000000 Z16=0000fffff40d5540:0000fffff40d5540 Z17=ffffff80ffffffd0:0000fffff40d5510 Z18=0000000000000000:0000000000000000 Z19=0000000000000000:0000000000000000 Z20=0000000000000000:0000000000000000 Z21=0000000000000000:0000000000000000 Z22=0000000000000000:0000000000000000 Z23=0000000000000000:0000000000000000 Z24=0000000000000000:0000000000000000 Z25=0000000000000000:0000000000000000 Z26=0000000000000000:0000000000000000 Z27=0000000000000000:0000000000000000 Z28=0000000000000000:0000000000000000 Z29=0000000000000000:0000000000000000 Z30=0000000000000000:0000000000000000 Z31=0000000000000000:0000000000000000