last executing test programs: 618.748211ms ago: executing program 0 (id=457): r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0x1, 0x80) close_range(r0, r0, 0x0) socket$can_j1939(0x1d, 0x2, 0x7) sendmmsg$alg(r0, &(0x7f0000002a40)=[{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4002}], 0x1, 0x4000) 538.009132ms ago: executing program 1 (id=458): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname(r0, &(0x7f0000000000)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, &(0x7f00000000c0)=0x80) dup3(r0, r1, 0x0) sendmsg$ETHTOOL_MSG_EEE_SET(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={0x0}}, 0x24008004) 522.631844ms ago: executing program 0 (id=459): r0 = openat$binderfs_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='./binderfs/binder-control\x00', 0x0, 0x0) close_range(r0, r0, 0x0) socket$unix(0x1, 0x3, 0x0) recvmmsg$unix(r0, 0x0, 0x0, 0x0, 0x0) 420.014627ms ago: executing program 1 (id=460): r0 = socket$nl_route(0x10, 0x3, 0x0) getsockname(r0, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, &(0x7f0000000080)=0x80) dup3(r0, r1, 0x0) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) 404.535849ms ago: executing program 0 (id=464): r0 = openat$mice(0xffffff9c, &(0x7f0000000040), 0x213082) close$binfmt(r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) write$FUSE_ENTRY(r0, 0x0, 0x0) 337.860397ms ago: executing program 1 (id=461): socketpair(0x1, 0x805, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f00000013c0), r1) dup2(r1, r0) sendmsg$NFQNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x40080}, 0x20000000) 247.221179ms ago: executing program 1 (id=462): r0 = openat$procfs(0xffffff9c, &(0x7f0000000000)='/proc/mdstat\x00', 0x0, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x5, 0x0, &(0x7f0000000080)) sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(r0, &(0x7f0000000cc0)={0x0, 0x0, &(0x7f0000000c80)={0x0}, 0x1, 0x0, 0x0, 0x24048005}, 0x4000000) 235.813641ms ago: executing program 0 (id=467): socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname(r0, &(0x7f0000000100)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, &(0x7f0000000080)=0xed730c1d0ab87ce6) dup3(r0, r1, 0x0) sendmsg$MPTCP_PM_CMD_GET_LIMITS(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={0x0}, 0x1, 0x0, 0x0, 0xc040}, 0x4008000) 99.678628ms ago: executing program 0 (id=463): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$vhost_vsock(0xffffff9c, &(0x7f0000000300), 0x2, 0x0) r2 = dup3(r1, r0, 0x80000) ioctl$UFFDIO_POISON(r2, 0xc020aa08, 0x0) 99.491868ms ago: executing program 1 (id=465): r0 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000500), 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) ioctl$FS_IOC_GETFLAGS(r0, 0x5421, &(0x7f0000000100)) 180.89µs ago: executing program 0 (id=466): mlockall(0x1) mremap(&(0x7f0000ff5000/0x2000)=nil, 0x2000, 0x5000000, 0x3, &(0x7f0000ffd000/0x1000)=nil) r0 = socket$nl_route(0x10, 0x3, 0x0) statx(r0, &(0x7f00000066c0)='\x00', 0x1000, 0x0, &(0x7f0000006700)) 0s ago: executing program 1 (id=468): openat$selinux_policy(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) openat$dlm_plock(0xffffff9c, 0x0, 0x0, 0x0) openat$selinux_create(0xffffff9c, &(0x7f0000000000), 0x2, 0x0) kernel console output (not intermixed with test programs): [ 48.353450][ T29] audit: type=1400 audit(48.290:56): avc: denied { read write } for pid=3088 comm="sftp-server" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 48.355464][ T29] audit: type=1400 audit(48.300:57): avc: denied { open } for pid=3088 comm="sftp-server" path="/dev/null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 Warning: Permanently added '[localhost]:38383' (ED25519) to the list of known hosts. [ 64.793428][ T29] audit: type=1400 audit(64.730:58): avc: denied { name_bind } for pid=3091 comm="sshd-session" src=30000 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 66.401008][ T29] audit: type=1400 audit(66.330:59): avc: denied { execute } for pid=3092 comm="sh" name="syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 66.471338][ T29] audit: type=1400 audit(66.410:60): avc: denied { execute_no_trans } for pid=3092 comm="sh" path="/syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 70.880865][ T29] audit: type=1400 audit(70.820:61): avc: denied { mounton } for pid=3092 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=806 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 70.885546][ T29] audit: type=1400 audit(70.830:62): avc: denied { mount } for pid=3092 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 70.898048][ T3092] cgroup: Unknown subsys name 'net' [ 70.905124][ T29] audit: type=1400 audit(70.850:63): avc: denied { unmount } for pid=3092 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 71.080281][ T3092] cgroup: Unknown subsys name 'cpuset' [ 71.086947][ T3092] cgroup: Unknown subsys name 'hugetlb' [ 71.087808][ T3092] cgroup: Unknown subsys name 'rlimit' [ 71.328801][ T29] audit: type=1400 audit(71.270:64): avc: denied { setattr } for pid=3092 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 71.330645][ T29] audit: type=1400 audit(71.270:65): avc: denied { mounton } for pid=3092 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 71.334470][ T29] audit: type=1400 audit(71.270:66): avc: denied { mount } for pid=3092 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 71.522023][ T3094] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 71.525488][ T29] audit: type=1400 audit(71.470:67): avc: denied { relabelto } for pid=3094 comm="mkswap" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 71.529562][ T29] audit: type=1400 audit(71.470:68): avc: denied { write } for pid=3094 comm="mkswap" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 71.572024][ T29] audit: type=1400 audit(71.510:69): avc: denied { read } for pid=3092 comm="syz-executor" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 71.574773][ T29] audit: type=1400 audit(71.510:70): avc: denied { open } for pid=3092 comm="syz-executor" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 79.476847][ T3092] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 81.265659][ T29] audit: type=1400 audit(81.210:71): avc: denied { execmem } for pid=3095 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 81.340852][ T29] audit: type=1400 audit(81.280:72): avc: denied { read } for pid=3097 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 81.343850][ T29] audit: type=1400 audit(81.280:73): avc: denied { open } for pid=3097 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 81.348812][ T29] audit: type=1400 audit(81.290:74): avc: denied { mounton } for pid=3097 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 81.388402][ T29] audit: type=1400 audit(81.330:75): avc: denied { module_request } for pid=3098 comm="syz-executor" kmod="netdev-nr1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 81.391597][ T29] audit: type=1400 audit(81.330:76): avc: denied { module_request } for pid=3097 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 81.489708][ T29] audit: type=1400 audit(81.430:77): avc: denied { sys_module } for pid=3098 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 82.050695][ T29] audit: type=1400 audit(81.990:78): avc: denied { ioctl } for pid=3098 comm="syz-executor" path="/dev/net/tun" dev="devtmpfs" ino=677 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 83.061490][ T3097] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 83.085989][ T3097] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 83.096647][ T3098] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 83.121678][ T3098] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 84.015868][ T3097] hsr_slave_0: entered promiscuous mode [ 84.019107][ T3097] hsr_slave_1: entered promiscuous mode [ 84.056166][ T3098] hsr_slave_0: entered promiscuous mode [ 84.057839][ T3098] hsr_slave_1: entered promiscuous mode [ 84.065219][ T3098] debugfs: 'hsr0' already exists in 'hsr' [ 84.065901][ T3098] Cannot create hsr debugfs directory [ 84.584855][ T29] audit: type=1400 audit(84.530:79): avc: denied { create } for pid=3097 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 84.587937][ T29] audit: type=1400 audit(84.530:80): avc: denied { write } for pid=3097 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 84.610786][ T3097] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 84.637783][ T3097] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 84.658851][ T3097] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 84.669368][ T3097] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 84.707582][ T3098] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 84.726577][ T3098] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 84.746841][ T3098] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 84.769383][ T3098] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 85.401762][ T3097] 8021q: adding VLAN 0 to HW filter on device bond0 [ 85.429524][ T3098] 8021q: adding VLAN 0 to HW filter on device bond0 [ 88.236719][ T3097] veth0_vlan: entered promiscuous mode [ 88.258947][ T3097] veth1_vlan: entered promiscuous mode [ 88.326217][ T3097] veth0_macvtap: entered promiscuous mode [ 88.336467][ T3097] veth1_macvtap: entered promiscuous mode [ 88.411101][ T32] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 88.413212][ T32] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 88.413558][ T32] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 88.413645][ T32] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 88.555475][ T3098] veth0_vlan: entered promiscuous mode [ 88.583415][ T3098] veth1_vlan: entered promiscuous mode [ 88.587627][ T29] kauditd_printk_skb: 1 callbacks suppressed [ 88.588418][ T29] audit: type=1400 audit(88.530:82): avc: denied { mount } for pid=3097 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 88.596049][ T29] audit: type=1400 audit(88.530:83): avc: denied { mounton } for pid=3097 comm="syz-executor" path="/syzkaller.82tIyW/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 88.611081][ T29] audit: type=1400 audit(88.550:84): avc: denied { mount } for pid=3097 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 88.629930][ T29] audit: type=1400 audit(88.570:85): avc: denied { mounton } for pid=3097 comm="syz-executor" path="/syzkaller.82tIyW/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 88.638196][ T29] audit: type=1400 audit(88.580:86): avc: denied { mounton } for pid=3097 comm="syz-executor" path="/syzkaller.82tIyW/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=2190 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 88.670022][ T3098] veth0_macvtap: entered promiscuous mode [ 88.681405][ T3098] veth1_macvtap: entered promiscuous mode [ 88.686230][ T29] audit: type=1400 audit(88.610:87): avc: denied { unmount } for pid=3097 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 88.691198][ T29] audit: type=1400 audit(88.630:88): avc: denied { mounton } for pid=3097 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=772 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 88.698284][ T29] audit: type=1400 audit(88.640:89): avc: denied { mount } for pid=3097 comm="syz-executor" name="/" dev="gadgetfs" ino=2191 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 88.718907][ T29] audit: type=1400 audit(88.660:90): avc: denied { mount } for pid=3097 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 88.725671][ T29] audit: type=1400 audit(88.670:91): avc: denied { mounton } for pid=3097 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 88.821136][ T32] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 88.824597][ T32] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 88.826342][ T32] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 88.827493][ T32] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 88.847129][ T3097] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 90.107916][ T3721] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3721 comm=syz.0.8 [ 90.973234][ T3750] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3750 comm=syz.0.23 [ 91.516561][ T3770] Zero length message leads to an empty skb [ 91.905579][ T3786] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=3786 comm=syz.1.41 [ 93.581870][ T3826] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=3826 comm=syz.0.61 [ 93.988145][ T29] kauditd_printk_skb: 19 callbacks suppressed [ 93.989229][ T29] audit: type=1400 audit(93.930:111): avc: denied { create } for pid=3834 comm="syz.0.65" anonclass=[userfaultfd] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 94.100337][ T3837] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=515 sclass=netlink_route_socket pid=3837 comm=syz.0.66 [ 94.287913][ T29] audit: type=1400 audit(94.230:112): avc: denied { create } for pid=3840 comm="syz.0.68" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 94.296648][ T29] audit: type=1400 audit(94.240:113): avc: denied { allowed } for pid=3840 comm="syz.0.68" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 94.476200][ T29] audit: type=1400 audit(94.420:114): avc: denied { name_bind } for pid=3844 comm="syz.0.70" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 94.478846][ T29] audit: type=1400 audit(94.420:115): avc: denied { node_bind } for pid=3844 comm="syz.0.70" saddr=172.20.20.170 src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 96.100097][ T3876] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=1539 sclass=netlink_audit_socket pid=3876 comm=syz.0.85 [ 96.263129][ T29] audit: type=1400 audit(96.200:116): avc: denied { write } for pid=3879 comm="syz.0.87" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 96.334889][ T29] audit: type=1400 audit(96.280:117): avc: denied { create } for pid=3881 comm="syz.0.88" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 96.344165][ T29] audit: type=1400 audit(96.290:118): avc: denied { write } for pid=3881 comm="syz.0.88" path="socket:[3451]" dev="sockfs" ino=3451 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 98.063928][ T29] audit: type=1400 audit(98.000:119): avc: denied { create } for pid=3932 comm="syz.0.113" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 98.386299][ T3942] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3942 comm=syz.0.117 [ 98.838250][ T3952] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5129 sclass=netlink_route_socket pid=3952 comm=syz.0.122 [ 99.065790][ T29] audit: type=1400 audit(99.010:120): avc: denied { read } for pid=3955 comm="syz.0.124" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 101.168339][ T29] audit: type=1400 audit(101.110:121): avc: denied { create } for pid=3981 comm="syz.1.136" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 101.173518][ T29] audit: type=1400 audit(101.110:122): avc: denied { write } for pid=3981 comm="syz.1.136" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 103.182928][ T29] audit: type=1400 audit(103.120:123): avc: denied { write } for pid=4024 comm="syz.0.156" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 103.487472][ T29] audit: type=1400 audit(103.420:124): avc: denied { create } for pid=4038 comm="syz.1.163" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 103.504097][ T29] audit: type=1400 audit(103.450:125): avc: denied { bind } for pid=4038 comm="syz.1.163" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 103.505153][ T29] audit: type=1400 audit(103.450:126): avc: denied { node_bind } for pid=4038 comm="syz.1.163" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 [ 103.510514][ T29] audit: type=1400 audit(103.450:127): avc: denied { write } for pid=4038 comm="syz.1.163" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 103.519987][ T29] audit: type=1400 audit(103.460:128): avc: denied { read } for pid=4038 comm="syz.1.163" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 104.007925][ T29] audit: type=1400 audit(103.950:129): avc: denied { map } for pid=4057 comm="syz.0.172" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=2994 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 104.560272][ T29] kauditd_printk_skb: 1 callbacks suppressed [ 104.563469][ T29] audit: type=1400 audit(104.500:131): avc: denied { ioctl } for pid=4082 comm="syz.1.185" path="socket:[3037]" dev="sockfs" ino=3037 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 104.566675][ T29] audit: type=1400 audit(104.510:132): avc: denied { bind } for pid=4082 comm="syz.1.185" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 104.569510][ T29] audit: type=1400 audit(104.510:133): avc: denied { block_suspend } for pid=4083 comm="syz.0.186" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 105.903665][ T29] audit: type=1400 audit(105.840:134): avc: denied { create } for pid=4104 comm="syz.1.194" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 105.910231][ T29] audit: type=1400 audit(105.850:135): avc: denied { read } for pid=4104 comm="syz.1.194" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 106.401050][ T4115] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2306 sclass=netlink_route_socket pid=4115 comm=syz.1.199 [ 106.625833][ T29] audit: type=1400 audit(106.570:136): avc: denied { create } for pid=4118 comm="syz.1.201" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 106.631360][ T29] audit: type=1400 audit(106.570:137): avc: denied { connect } for pid=4118 comm="syz.1.201" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 107.509018][ T29] audit: type=1400 audit(107.450:138): avc: denied { setopt } for pid=4126 comm="syz.1.204" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 108.308842][ T4143] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 113.435721][ T4249] capability: warning: `syz.0.263' uses deprecated v2 capabilities in a way that may be insecure [ 113.917382][ T29] audit: type=1400 audit(113.860:139): avc: denied { ioctl } for pid=4263 comm="syz.1.271" path="socket:[4468]" dev="sockfs" ino=4468 ioctlcmd=0x3b80 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 114.538445][ T29] audit: type=1400 audit(114.480:140): avc: denied { ioctl } for pid=4277 comm="syz.1.278" path="socket:[3989]" dev="sockfs" ino=3989 ioctlcmd=0xf502 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 114.854565][ T29] audit: type=1400 audit(114.800:141): avc: denied { ioctl } for pid=4285 comm="syz.1.283" path="socket:[4012]" dev="sockfs" ino=4012 ioctlcmd=0x5451 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 115.268361][ T29] audit: type=1400 audit(115.210:142): avc: denied { create } for pid=4310 comm="syz.0.295" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 115.276874][ T29] audit: type=1400 audit(115.220:143): avc: denied { bind } for pid=4310 comm="syz.0.295" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 115.280202][ T29] audit: type=1400 audit(115.220:144): avc: denied { setopt } for pid=4310 comm="syz.0.295" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 115.285234][ T29] audit: type=1400 audit(115.230:145): avc: denied { connect } for pid=4310 comm="syz.0.295" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 116.368763][ T29] audit: type=1400 audit(116.310:146): avc: denied { connect } for pid=4317 comm="syz.1.298" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 117.430319][ T29] audit: type=1400 audit(117.370:147): avc: denied { getopt } for pid=4352 comm="syz.0.315" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 119.249051][ T4396] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=257 sclass=netlink_audit_socket pid=4396 comm=syz.1.336 [ 119.339562][ T4400] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4400 comm=syz.0.339 [ 119.626044][ T4412] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=4412 comm=syz.0.344 [ 120.053902][ T29] audit: type=1400 audit(120.000:148): avc: denied { connect } for pid=4436 comm="syz.1.357" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 122.888969][ T29] audit: type=1400 audit(122.830:149): avc: denied { write } for pid=4484 comm="syz.1.379" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 122.994632][ T4490] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4490 comm=syz.1.380 [ 124.469562][ T4511] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4511 comm=syz.1.392 [ 127.784573][ T4534] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4534 comm=syz.0.401 [ 127.815590][ T29] audit: type=1400 audit(127.760:150): avc: denied { unmount } for pid=3098 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 129.209825][ T29] audit: type=1400 audit(129.150:151): avc: denied { getopt } for pid=4557 comm="syz.1.414" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 129.458883][ T29] audit: type=1400 audit(129.400:152): avc: denied { bind } for pid=4563 comm="syz.1.417" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 129.807482][ T4572] SELinux: Context system_u:object_r:devicekit_var_run_t:s0 is not valid (left unmapped). [ 129.811217][ T29] audit: type=1400 audit(129.750:153): avc: denied { relabelto } for pid=4571 comm="syz.1.421" name="file0" dev="tmpfs" ino=973 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="system_u:object_r:devicekit_var_run_t:s0" [ 129.815721][ T29] audit: type=1400 audit(129.760:154): avc: denied { associate } for pid=4571 comm="syz.1.421" name="file0" dev="tmpfs" ino=973 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 srawcon="system_u:object_r:devicekit_var_run_t:s0" [ 129.829270][ T29] audit: type=1400 audit(129.770:155): avc: denied { unlink } for pid=3098 comm="syz-executor" name="file0" dev="tmpfs" ino=973 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="system_u:object_r:devicekit_var_run_t:s0" [ 131.481346][ T4617] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=1539 sclass=netlink_audit_socket pid=4617 comm=syz.1.441 [ 132.119863][ T29] audit: type=1400 audit(132.060:156): avc: denied { read } for pid=4638 comm="syz.1.453" name="binder-control" dev="binder" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 132.123985][ T29] audit: type=1400 audit(132.060:157): avc: denied { open } for pid=4638 comm="syz.1.453" path="/dev/binderfs/binder-control" dev="binder" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 528.192887][ C0] watchdog: BUG: soft lockup - CPU#0 stuck for 368s! [syz.0.466:4668] [ 528.193191][ C0] Modules linked in: [ 528.194039][ C0] CPU: 0 UID: 0 PID: 4668 Comm: syz.0.466 Not tainted syzkaller #0 PREEMPT [ 528.194303][ C0] Hardware name: ARM-Versatile Express [ 528.194538][ C0] PC is at _raw_spin_unlock_irq+0x28/0x54 [ 528.195324][ C0] LR is at tmigr_handle_remote_up+0x218/0x4b0 [ 528.195403][ C0] pc : [<81abba7c>] lr : [<80346da4>] psr: 60000113 [ 528.195453][ C0] sp : df801e08 ip : df801e18 fp : df801e14 [ 528.195493][ C0] r10: 00000001 r9 : 8280c9a4 r8 : 00000001 [ 528.195536][ C0] r7 : ddddb488 r6 : df801ee0 r5 : 830bf3b0 r4 : 830bf380 [ 528.195581][ C0] r3 : 000055f6 r2 : ffffffff r1 : 00000000 r0 : ddddb488 [ 528.195706][ C0] Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment user [ 528.195786][ C0] Control: 30c5387d Table: 85d17100 DAC: fffffffd [ 528.195889][ C0] Call trace: frame pointer underflow [ 528.196233][ C0] [<81abba54>] (_raw_spin_unlock_irq) from [<80346da4>] (tmigr_handle_remote_up+0x218/0x4b0) [ 528.196595][ C0] [<80346b8c>] (tmigr_handle_remote_up) from [<803450a4>] (__walk_groups_from+0x3c/0xe4) [ 528.196725][ C0] r10:845ea400 r9:8280c820 r8:80346b8c r7:df801ee0 r6:830bf380 r5:00000002 [ 528.196773][ C0] r4:830bf380 [ 528.196800][ C0] [<80345068>] (__walk_groups_from) from [<8034743c>] (tmigr_handle_remote+0xe8/0x108) [ 528.196880][ C0] r9:82804d80 r8:00000101 r7:00000001 r6:00000002 r5:00000002 r4:dddc7488 [ 528.196900][ C0] [<80347354>] (tmigr_handle_remote) from [<80327600>] (run_timer_softirq+0x30/0x34) [ 528.196967][ C0] r4:82804084 [ 528.196986][ C0] [<803275d0>] (run_timer_softirq) from [<8025b55c>] (handle_softirqs+0x140/0x458) [ 528.197047][ C0] [<8025b41c>] (handle_softirqs) from [<8025b9d0>] (__irq_exit_rcu+0x110/0x1d0) [ 528.197124][ C0] r10:decf5ac0 r9:845ea400 r8:00000000 r7:ee09ddc0 r6:82443ff8 r5:8247f12c [ 528.197149][ C0] r4:845ea400 [ 528.197167][ C0] [<8025b8c0>] (__irq_exit_rcu) from [<8025bd48>] (irq_exit+0x10/0x18) [ 528.197229][ C0] r5:8247f12c r4:826c3a9c [ 528.197246][ C0] [<8025bd38>] (irq_exit) from [<81aad6a4>] (generic_handle_arch_irq+0x7c/0x80) [ 528.197308][ C0] [<81aad628>] (generic_handle_arch_irq) from [<81a7d654>] (call_with_stack+0x1c/0x20) [ 528.197391][ C0] r9:845ea400 r8:ffefdd20 r7:ee09ddf4 r6:ffffffff r5:80000013 r4:8028e010 [ 528.197420][ C0] [<81a7d638>] (call_with_stack) from [<80200bec>] (__irq_svc+0x8c/0xbc) [ 528.197553][ C0] Exception stack(0xee09ddc0 to 0xee09de08) [ 528.197739][ C0] ddc0: 00000001 00000000 00000001 845ea400 ffefd000 845ea400 00000001 00a00000 [ 528.197797][ C0] dde0: ffefdd20 853e5c00 decf5ac0 ee09de24 ee09de28 ee09de10 804cfd38 8028e010 [ 528.197824][ C0] de00: 80000013 ffffffff [ 528.197879][ C0] [<8028df70>] (preempt_count_sub) from [<804cfd38>] (kunmap_local_indexed+0x1a8/0x2e8) [ 528.197955][ C0] [<804cfb90>] (kunmap_local_indexed) from [<804c949c>] (follow_page_pte+0x198/0x47c) [ 528.198024][ C0] r7:00a00000 r6:ea930f5f r5:decf5ac0 r4:00210001 [ 528.198044][ C0] [<804c9304>] (follow_page_pte) from [<804c993c>] (__get_user_pages+0x1bc/0x6e4) [ 528.198119][ C0] r10:000009a4 r9:209a4000 r8:845ea400 r7:00000000 r6:85e4f000 r5:853e5c00 [ 528.198142][ C0] r4:00210001 [ 528.198158][ C0] [<804c9780>] (__get_user_pages) from [<804cca80>] (populate_vma_page_range+0xd8/0x220) [ 528.198238][ C0] r10:20000000 r9:8461d680 r8:ee09df50 r7:21000000 r6:20000000 r5:853e5c00 [ 528.198260][ C0] r4:00001000 [ 528.198278][ C0] [<804cc9a8>] (populate_vma_page_range) from [<804cd260>] (__mm_populate+0x11c/0x1b8) [ 528.198364][ C0] r10:20000000 r9:8461d78c r8:00000001 r7:8461d680 r6:7f000000 r5:21000000 [ 528.198388][ C0] r4:853e5c00 [ 528.198405][ C0] [<804cd144>] (__mm_populate) from [<804e0ee4>] (sys_mlockall+0xe8/0x1b0) [ 528.198516][ C0] r10:00000098 r9:845ea400 r8:8020029c r7:8461d78c r6:00000001 r5:8461d680 [ 528.198539][ C0] r4:00000000 [ 528.198557][ C0] [<804e0dfc>] (sys_mlockall) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 528.198619][ C0] Exception stack(0xee09dfa8 to 0xee09dff0) [ 528.198659][ C0] dfa0: 00000000 00000000 00000001 00000000 00000000 00000000 [ 528.198698][ C0] dfc0: 00000000 00000000 00316308 00000098 00300000 00000000 00006364 76f080bc [ 528.198729][ C0] dfe0: 76f07ec0 76f07eb0 0001929c 00132320 [ 528.198763][ C0] r7:00000098 r6:00316308 r5:00000000 r4:00000000 [ 528.199118][ C0] Sending NMI from CPU 0 to CPUs 1: [ 528.200143][ C1] NMI backtrace for cpu 1 [ 528.200396][ C1] CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Not tainted syzkaller #0 PREEMPT [ 528.200461][ C1] Hardware name: ARM-Versatile Express [ 528.200486][ C1] PC is at _raw_spin_lock+0x40/0x58 [ 528.200574][ C1] LR is at _raw_spin_lock+0x18/0x58 [ 528.200611][ C1] pc : [<81abbc34>] lr : [<81abbc0c>] psr: 80000113 [ 528.200637][ C1] sp : df805d68 ip : df805d68 fp : df805d7c [ 528.200659][ C1] r10: 81c05450 r9 : 84080e40 r8 : 83e9f688 [ 528.200681][ C1] r7 : 84080f68 r6 : 00000001 r5 : 00000001 r4 : 84080f68 [ 528.200706][ C1] r3 : 000067bb r2 : 000067bc r1 : 00000000 r0 : 00000001 [ 528.200733][ C1] Flags: Nzcv IRQs on FIQs on Mode SVC_32 ISA ARM Segment none [ 528.200771][ C1] Control: 30c5387d Table: 84bae0c0 DAC: 00000000 [ 528.200791][ C1] Call trace: frame pointer underflow [ 528.200850][ C1] [<81abbbf4>] (_raw_spin_lock) from [<809c77ac>] (gpio_mmio_set+0x44/0x80) [ 528.200940][ C1] r5:00000001 r4:84080e40 [ 528.200960][ C1] [<809c7768>] (gpio_mmio_set) from [<809b7f68>] (gpiochip_set+0x1c/0x44) [ 528.201040][ C1] r7:00000001 r6:00000000 r5:00000000 r4:840e49c0 [ 528.201059][ C1] [<809b7f4c>] (gpiochip_set) from [<809ba830>] (gpiod_set_raw_value_commit+0x78/0x218) [ 528.201122][ C1] [<809ba7b8>] (gpiod_set_raw_value_commit) from [<809bc0d0>] (gpiod_set_value_nocheck+0x44/0x58) [ 528.201210][ C1] r10:81c05450 r9:df805ebc r8:00000102 r7:ffffbf06 r6:00000007 r5:00000001 [ 528.201233][ C1] r4:840e49c0 [ 528.201251][ C1] [<809bc08c>] (gpiod_set_value_nocheck) from [<809bc120>] (gpiod_set_value+0x3c/0x88) [ 528.201308][ C1] [<809bc0e4>] (gpiod_set_value) from [<809cc8bc>] (gpio_led_set+0x5c/0x60) [ 528.201370][ C1] r5:83f5a044 r4:83f5a044 [ 528.201398][ C1] [<809cc860>] (gpio_led_set) from [<809ca154>] (led_set_brightness_nosleep+0x38/0x44) [ 528.201463][ C1] r5:83f5a044 r4:84ffef0c [ 528.201481][ C1] [<809ca11c>] (led_set_brightness_nosleep) from [<809cd1b8>] (led_heartbeat_function+0x84/0x144) [ 528.201540][ C1] [<809cd134>] (led_heartbeat_function) from [<80326f70>] (call_timer_fn+0x30/0x220) [ 528.201613][ C1] r7:ffffbf06 r6:809cd134 r5:84ffef0c r4:83216000 [ 528.201631][ C1] [<80326f40>] (call_timer_fn) from [<80327424>] (__run_timers+0x2c4/0x3f8) [ 528.201791][ C1] r9:df805ebc r8:ffffbf06 r7:00000000 r6:809cd134 r5:dddd9f00 r4:84ffef0c [ 528.201817][ C1] [<80327160>] (__run_timers) from [<803275c0>] (run_timer_base+0x68/0x78) [ 528.201897][ C1] r10:83216000 r9:82804d80 r8:00000102 r7:00000001 r6:00000082 r5:00000002 [ 528.201924][ C1] r4:dddd9f00 [ 528.201942][ C1] [<80327558>] (run_timer_base) from [<803275ec>] (run_timer_softirq+0x1c/0x34) [ 528.202006][ C1] r4:82804084 [ 528.202026][ C1] [<803275d0>] (run_timer_softirq) from [<8025b55c>] (handle_softirqs+0x140/0x458) [ 528.202096][ C1] [<8025b41c>] (handle_softirqs) from [<8025b9d0>] (__irq_exit_rcu+0x110/0x1d0) [ 528.202176][ C1] r10:00000000 r9:83216000 r8:00000000 r7:df865e08 r6:82443ff8 r5:8247f12c [ 528.202199][ C1] r4:83216000 [ 528.202216][ C1] [<8025b8c0>] (__irq_exit_rcu) from [<8025bd48>] (irq_exit+0x10/0x18) [ 528.202281][ C1] r5:8247f12c r4:826c3a9c [ 528.202299][ C1] [<8025bd38>] (irq_exit) from [<81aad6a4>] (generic_handle_arch_irq+0x7c/0x80) [ 528.202383][ C1] [<81aad628>] (generic_handle_arch_irq) from [<81a7d654>] (call_with_stack+0x1c/0x20) [ 528.202475][ C1] r9:83216000 r8:83e9f688 r7:df865e3c r6:ffffffff r5:60000013 r4:809c7fac [ 528.202498][ C1] [<81a7d638>] (call_with_stack) from [<80200bec>] (__irq_svc+0x8c/0xbc) [ 528.202569][ C1] Exception stack(0xdf865e08 to 0xdf865e50) [ 528.202670][ C1] 5e00: e01ef008 0000000c 000067bb 00000000 e01ef008 0000000c [ 528.202727][ C1] 5e20: 00000001 84080f68 83e9f688 84080e40 00000000 df865e6c df865e58 df865e58 [ 528.202758][ C1] 5e40: 809c7fa8 809c7fac 60000013 ffffffff [ 528.202781][ C1] [<809c7f8c>] (gpio_mmio_write32) from [<809c77cc>] (gpio_mmio_set+0x64/0x80) [ 528.202856][ C1] r5:00000008 r4:84080e40 [ 528.202872][ C1] [<809c7768>] (gpio_mmio_set) from [<809b7f68>] (gpiochip_set+0x1c/0x44) [ 528.202948][ C1] r7:00000001 r6:00000000 r5:00000003 r4:840e49fc [ 528.202967][ C1] [<809b7f4c>] (gpiochip_set) from [<809ba830>] (gpiod_set_raw_value_commit+0x78/0x218) [ 528.203058][ C1] [<809ba7b8>] (gpiod_set_raw_value_commit) from [<809bc0d0>] (gpiod_set_value_nocheck+0x44/0x58) [ 528.203137][ C1] r10:00000000 r9:00000000 r8:00000001 r7:ddde24c0 r6:8337e9d8 r5:00000001 [ 528.203161][ C1] r4:840e49fc [ 528.203176][ C1] [<809bc08c>] (gpiod_set_value_nocheck) from [<809bc120>] (gpiod_set_value+0x3c/0x88) [ 528.203233][ C1] [<809bc0e4>] (gpiod_set_value) from [<809cc8bc>] (gpio_led_set+0x5c/0x60) [ 528.203299][ C1] r5:000000ff r4:83f5a314 [ 528.203317][ C1] [<809cc860>] (gpio_led_set) from [<809ca1e4>] (led_set_brightness+0x84/0x90) [ 528.203389][ C1] r5:000000ff r4:83f5a314 [ 528.203409][ C1] [<809ca160>] (led_set_brightness) from [<809cbd64>] (led_trigger_event+0x40/0x58) [ 528.203471][ C1] r5:000000ff r4:83f5a314 [ 528.203488][ C1] [<809cbd24>] (led_trigger_event) from [<809cd3c0>] (ledtrig_cpu+0xac/0xf4) [ 528.203558][ C1] r7:ddde24c0 r6:00000002 r5:82b15cd8 r4:000001fd [ 528.203578][ C1] [<809cd314>] (ledtrig_cpu) from [<80227a38>] (arch_cpu_idle_exit+0x14/0x18) [ 528.203664][ C1] r9:00000000 r8:00000001 r7:8280c710 r6:83216000 r5:8280c6d0 r4:00000001 [ 528.203688][ C1] [<80227a24>] (arch_cpu_idle_exit) from [<802b158c>] (do_idle+0x5c/0x2d8) [ 528.203761][ C1] [<802b1530>] (do_idle) from [<802b1b38>] (cpu_startup_entry+0x30/0x34) [ 528.203841][ C1] r10:00000000 r9:414fc0f0 r8:80003000 r7:82a7b4a4 r6:83216000 r5:00000001 [ 528.203867][ C1] r4:00000092 [ 528.203884][ C1] [<802b1b08>] (cpu_startup_entry) from [<8022f360>] (secondary_start_kernel+0x128/0x194) [ 528.203955][ C1] [<8022f238>] (secondary_start_kernel) from [<80220094>] (__enable_mmu+0x0/0xc) [ 528.204034][ C1] r7:82a7b4a4 r6:30c0387d r5:00000000 r4:830b7bc0 [ 528.205258][ C0] Kernel panic - not syncing: softlockup: hung tasks [ 528.239974][ C0] CPU: 0 UID: 0 PID: 4668 Comm: syz.0.466 Tainted: G L syzkaller #0 PREEMPT [ 528.240497][ C0] Tainted: [L]=SOFTLOCKUP [ 528.240701][ C0] Hardware name: ARM-Versatile Express [ 528.240958][ C0] Call trace: frame pointer underflow [ 528.241340][ C0] [<80201a74>] (dump_backtrace) from [<80201b70>] (show_stack+0x18/0x1c) [ 528.241735][ C0] r7:82296540 r6:845ea400 r5:00000000 r4:822956f0 [ 528.241991][ C0] [<80201b58>] (show_stack) from [<8021ee08>] (dump_stack_lvl+0x54/0x7c) [ 528.242357][ C0] [<8021edb4>] (dump_stack_lvl) from [<8021ee48>] (dump_stack+0x18/0x1c) [ 528.242683][ C0] r5:00000000 r4:82a7bd14 [ 528.242868][ C0] [<8021ee30>] (dump_stack) from [<80202648>] (vpanic+0xe0/0x2e8) [ 528.243199][ C0] [<80202568>] (vpanic) from [<80202884>] (trace_suspend_resume+0x0/0xd8) [ 528.243523][ C0] r7:82ac27f8 [ 528.243683][ C0] [<80202850>] (panic) from [<80383f14>] (watchdog_timer_fn+0x2dc/0x350) [ 528.244035][ C0] r3:00000001 r2:00004000 r1:82a7bd1c r0:82296540 [ 528.244292][ C0] [<80383c38>] (watchdog_timer_fn) from [<80329b64>] (__hrtimer_run_queues+0x1c4/0x454) [ 528.244739][ C0] r10:845ea400 r9:00000000 r8:dddc7130 r7:80383c38 r6:dddc7000 r5:dddc7040 [ 528.245051][ C0] r4:dddc75d8 [ 528.245209][ C0] [<803299a0>] (__hrtimer_run_queues) from [<8032b168>] (hrtimer_interrupt+0x148/0x2bc) [ 528.245615][ C0] r10:f79b7e60 r9:dddc7180 r8:dddc7130 r7:0000007a r6:00000003 r5:20000193 [ 528.245919][ C0] r4:dddc7000 [ 528.246080][ C0] [<8032b020>] (hrtimer_interrupt) from [<81340630>] (arch_timer_handler_virt+0x30/0x38) [ 528.246501][ C0] r10:81d0fc78 r9:8309e400 r8:00000000 r7:00000000 r6:00000000 r5:82498528 [ 528.246811][ C0] r4:8309de40 [ 528.247002][ C0] [<81340600>] (arch_timer_handler_virt) from [<802ef9b4>] (handle_percpu_devid_irq+0x128/0x34c) [ 528.247435][ C0] [<802ef88c>] (handle_percpu_devid_irq) from [<802e8b44>] (handle_irq_desc+0x74/0x84) [ 528.247831][ C0] r10:00000001 r9:845ea400 r8:00000000 r7:df80a00c r6:826c2388 r5:df80a000 [ 528.248141][ C0] r4:8280cc44 [ 528.248294][ C0] [<802e8ad0>] (handle_irq_desc) from [<802e8bc0>] (generic_handle_domain_irq+0x18/0x1c) [ 528.248693][ C0] [<802e8ba8>] (generic_handle_domain_irq) from [<802012c8>] (gic_handle_irq+0x68/0x7c) [ 528.249079][ C0] [<80201260>] (gic_handle_irq) from [<81aad688>] (generic_handle_arch_irq+0x60/0x80) [ 528.249495][ C0] r7:df801db8 r6:82443ff8 r5:8247f12c r4:826c3a9c [ 528.249745][ C0] [<81aad628>] (generic_handle_arch_irq) from [<80200bdc>] (__irq_svc+0x7c/0xbc) [ 528.250120][ C0] Exception stack(0xdf801db8 to 0xdf801e00) [ 528.250383][ C0] 1da0: ddddb488 00000000 [ 528.250735][ C0] 1dc0: ffffffff 000055f6 830bf380 830bf3b0 df801ee0 ddddb488 00000001 8280c9a4 [ 528.251104][ C0] 1de0: 00000001 df801e14 df801e18 df801e08 80346da4 81abba7c 60000113 ffffffff [ 528.251465][ C0] r9:845ea400 r8:00000001 r7:df801dec r6:ffffffff r5:60000113 r4:81abba7c [ 528.251773][ C0] [<81abba54>] (_raw_spin_unlock_irq) from [<80346da4>] (tmigr_handle_remote_up+0x218/0x4b0) [ 528.252170][ C0] [<80346b8c>] (tmigr_handle_remote_up) from [<803450a4>] (__walk_groups_from+0x3c/0xe4) [ 528.252542][ C0] r10:845ea400 r9:8280c820 r8:80346b8c r7:df801ee0 r6:830bf380 r5:00000002 [ 528.253068][ C0] r4:830bf380 [ 528.253237][ C0] [<80345068>] (__walk_groups_from) from [<8034743c>] (tmigr_handle_remote+0xe8/0x108) [ 528.253712][ C0] r9:82804d80 r8:00000101 r7:00000001 r6:00000002 r5:00000002 r4:dddc7488 [ 528.254020][ C0] [<80347354>] (tmigr_handle_remote) from [<80327600>] (run_timer_softirq+0x30/0x34) [ 528.254407][ C0] r4:82804084 [ 528.254558][ C0] [<803275d0>] (run_timer_softirq) from [<8025b55c>] (handle_softirqs+0x140/0x458) [ 528.254915][ C0] [<8025b41c>] (handle_softirqs) from [<8025b9d0>] (__irq_exit_rcu+0x110/0x1d0) [ 528.255320][ C0] r10:decf5ac0 r9:845ea400 r8:00000000 r7:ee09ddc0 r6:82443ff8 r5:8247f12c [ 528.255629][ C0] r4:845ea400 [ 528.255784][ C0] [<8025b8c0>] (__irq_exit_rcu) from [<8025bd48>] (irq_exit+0x10/0x18) [ 528.256154][ C0] r5:8247f12c r4:826c3a9c [ 528.256333][ C0] [<8025bd38>] (irq_exit) from [<81aad6a4>] (generic_handle_arch_irq+0x7c/0x80) [ 528.256697][ C0] [<81aad628>] (generic_handle_arch_irq) from [<81a7d654>] (call_with_stack+0x1c/0x20) [ 528.257098][ C0] r9:845ea400 r8:ffefdd20 r7:ee09ddf4 r6:ffffffff r5:80000013 r4:8028e010 [ 528.257755][ C0] [<81a7d638>] (call_with_stack) from [<80200bec>] (__irq_svc+0x8c/0xbc) [ 528.258415][ C0] Exception stack(0xee09ddc0 to 0xee09de08) [ 528.258759][ C0] ddc0: 00000001 00000000 00000001 845ea400 ffefd000 845ea400 00000001 00a00000 [ 528.259231][ C0] dde0: ffefdd20 853e5c00 decf5ac0 ee09de24 ee09de28 ee09de10 804cfd38 8028e010 [ 528.259582][ C0] de00: 80000013 ffffffff [ 528.259798][ C0] [<8028df70>] (preempt_count_sub) from [<804cfd38>] (kunmap_local_indexed+0x1a8/0x2e8) [ 528.260330][ C0] [<804cfb90>] (kunmap_local_indexed) from [<804c949c>] (follow_page_pte+0x198/0x47c) [ 528.260725][ C0] r7:00a00000 r6:ea930f5f r5:decf5ac0 r4:00210001 [ 528.260966][ C0] [<804c9304>] (follow_page_pte) from [<804c993c>] (__get_user_pages+0x1bc/0x6e4) [ 528.261363][ C0] r10:000009a4 r9:209a4000 r8:845ea400 r7:00000000 r6:85e4f000 r5:853e5c00 [ 528.261664][ C0] r4:00210001 [ 528.261826][ C0] [<804c9780>] (__get_user_pages) from [<804cca80>] (populate_vma_page_range+0xd8/0x220) [ 528.262225][ C0] r10:20000000 r9:8461d680 r8:ee09df50 r7:21000000 r6:20000000 r5:853e5c00 [ 528.262544][ C0] r4:00001000 [ 528.262706][ C0] [<804cc9a8>] (populate_vma_page_range) from [<804cd260>] (__mm_populate+0x11c/0x1b8) [ 528.263119][ C0] r10:20000000 r9:8461d78c r8:00000001 r7:8461d680 r6:7f000000 r5:21000000 [ 528.263447][ C0] r4:853e5c00 [ 528.263600][ C0] [<804cd144>] (__mm_populate) from [<804e0ee4>] (sys_mlockall+0xe8/0x1b0) [ 528.263958][ C0] r10:00000098 r9:845ea400 r8:8020029c r7:8461d78c r6:00000001 r5:8461d680 [ 528.264284][ C0] r4:00000000 [ 528.264449][ C0] [<804e0dfc>] (sys_mlockall) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 528.264791][ C0] Exception stack(0xee09dfa8 to 0xee09dff0) [ 528.265044][ C0] dfa0: 00000000 00000000 00000001 00000000 00000000 00000000 [ 528.265384][ C0] dfc0: 00000000 00000000 00316308 00000098 00300000 00000000 00006364 76f080bc [ 528.265704][ C0] dfe0: 76f07ec0 76f07eb0 0001929c 00132320 [ 528.265946][ C0] r7:00000098 r6:00316308 r5:00000000 r4:00000000 [ 528.268705][ C0] Rebooting in 86400 seconds..