last executing test programs: 2.165895727s ago: executing program 1 (id=815): r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000cc0), 0x8, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) dup3(r1, r0, 0x0) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}, 0x1, 0x0, 0x0, 0x4040}, 0x20044000) 2.078015458s ago: executing program 1 (id=816): r0 = openat$selinux_enforce(0xffffff9c, &(0x7f0000000280), 0x80, 0x0) close(r0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFQNL_MSG_CONFIG(r0, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000900)={&(0x7f0000000880)={0x14, 0x2, 0x3, 0x201, 0x0, 0x0, {0x0, 0x0, 0x3}}, 0x14}, 0x1, 0x0, 0x0, 0x20000000}, 0x40800) 1.42829045s ago: executing program 1 (id=818): r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) close(r0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000240)) write$P9_RREADDIR(r0, 0x0, 0x0) 1.291086047s ago: executing program 1 (id=819): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = signalfd4(0xffffffffffffffff, &(0x7f0000001780), 0x8, 0x0) dup3(r0, r1, 0x0) sendmsg$IPCTNL_MSG_CT_GET_STATS(r1, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000003c0)={0x0}, 0x1, 0x0, 0x0, 0x20000000}, 0x8080) 1.18712281s ago: executing program 1 (id=821): r0 = openat$hwrng(0xffffff9c, &(0x7f0000000200), 0x741000, 0x0) close_range(r0, 0xffffffffffffffff, 0x2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)) sendmsg$NL80211_CMD_DEL_PMK(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={0x0}, 0x1, 0x0, 0x0, 0x40}, 0x80) 1.140010216s ago: executing program 1 (id=822): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto(r0, 0x0, 0x0, 0x20044844, &(0x7f0000000000)=@in6={0xa, 0x0, 0x10000, @local, 0x1}, 0x80) r1 = fcntl$dupfd(r0, 0x406, r0) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={0x0}}, 0x40000) 438.891765ms ago: executing program 0 (id=831): r0 = openat$nvme_fabrics(0xffffff9c, &(0x7f0000000000), 0x103540, 0x0) close(r0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_DEL_STATION(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={0x14, 0x0, 0x400, 0x70bd2b, 0x25dfdbfe, {{}, {@void, @void}}}, 0x14}, 0x1, 0x0, 0x0, 0x408d0}, 0x20000000) 359.674004ms ago: executing program 0 (id=832): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) recvmsg(r2, &(0x7f0000000100)={&(0x7f0000000000)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @private2}}}, 0x80, 0x0}, 0x0) write$char_usb(r3, 0x0, 0x0) 258.141487ms ago: executing program 0 (id=833): r0 = openat$hwrng(0xffffff9c, &(0x7f0000000200), 0x741000, 0x0) close_range(r0, 0xffffffffffffffff, 0x2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)) sendmsg$NL80211_CMD_DEL_PMK(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={0x0}, 0x1, 0x0, 0x0, 0x40}, 0x80) 170.449278ms ago: executing program 0 (id=834): r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = dup(r0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(r1, 0x40405515, &(0x7f0000000000)={0x4, 0x5, 0x65a, 0x3, 'syz0\x00', 0xd74}) 80.12351ms ago: executing program 0 (id=835): r0 = openat$selinux_checkreqprot(0xffffff9c, &(0x7f0000000000), 0x6071d2517d60a4e6, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_TDLS_MGMT(r0, &(0x7f00000011c0)={0x0, 0x0, &(0x7f0000001180)={&(0x7f0000001ec0)={0x20, 0x0, 0x8, 0x70bd27, 0x25dfdbfc, {{}, {@void, @val={0xc, 0x99, {0x7fff, 0x5c}}}}}, 0x20}, 0x1, 0x0, 0x0, 0x40050}, 0x8000) 0s ago: executing program 0 (id=836): r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='fdinfo\x00') fchdir(r0) exit(0xffff) setxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080), &(0x7f00000000c0), 0x2, 0x0) kernel console output (not intermixed with test programs): [ 53.539251][ T29] audit: type=1400 audit(53.450:56): avc: denied { read write } for pid=3089 comm="sftp-server" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 53.541642][ T29] audit: type=1400 audit(53.450:57): avc: denied { open } for pid=3089 comm="sftp-server" path="/dev/null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 Warning: Permanently added '[localhost]:63795' (ED25519) to the list of known hosts. [ 68.432522][ T29] audit: type=1400 audit(68.330:58): avc: denied { name_bind } for pid=3092 comm="sshd-session" src=30000 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 70.021286][ T29] audit: type=1400 audit(69.930:59): avc: denied { execute } for pid=3093 comm="sh" name="syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 70.066288][ T29] audit: type=1400 audit(69.980:60): avc: denied { execute_no_trans } for pid=3093 comm="sh" path="/syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 74.712353][ T29] audit: type=1400 audit(74.630:61): avc: denied { mounton } for pid=3093 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=806 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 74.717484][ T29] audit: type=1400 audit(74.630:62): avc: denied { mount } for pid=3093 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 74.737183][ T3093] cgroup: Unknown subsys name 'net' [ 74.747028][ T29] audit: type=1400 audit(74.660:63): avc: denied { unmount } for pid=3093 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 74.900679][ T3093] cgroup: Unknown subsys name 'cpuset' [ 74.906431][ T3093] cgroup: Unknown subsys name 'hugetlb' [ 74.910085][ T3093] cgroup: Unknown subsys name 'rlimit' [ 75.105541][ T29] audit: type=1400 audit(75.020:64): avc: denied { setattr } for pid=3093 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 75.107441][ T29] audit: type=1400 audit(75.020:65): avc: denied { mounton } for pid=3093 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 75.111406][ T29] audit: type=1400 audit(75.030:66): avc: denied { mount } for pid=3093 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 75.324769][ T3095] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 75.326444][ T29] audit: type=1400 audit(75.240:67): avc: denied { relabelto } for pid=3095 comm="mkswap" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 75.333154][ T29] audit: type=1400 audit(75.250:68): avc: denied { write } for pid=3095 comm="mkswap" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 75.373772][ T29] audit: type=1400 audit(75.290:69): avc: denied { read } for pid=3093 comm="syz-executor" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 75.374289][ T29] audit: type=1400 audit(75.290:70): avc: denied { open } for pid=3093 comm="syz-executor" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 82.357896][ T3093] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 84.384476][ T29] audit: type=1400 audit(84.300:71): avc: denied { execmem } for pid=3096 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 84.460090][ T29] audit: type=1400 audit(84.380:72): avc: denied { read } for pid=3098 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 84.463788][ T29] audit: type=1400 audit(84.380:73): avc: denied { open } for pid=3098 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 84.473049][ T29] audit: type=1400 audit(84.390:74): avc: denied { mounton } for pid=3098 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 84.502981][ T29] audit: type=1400 audit(84.420:75): avc: denied { module_request } for pid=3098 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 84.504804][ T29] audit: type=1400 audit(84.420:76): avc: denied { module_request } for pid=3099 comm="syz-executor" kmod="netdev-nr1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 84.596582][ T29] audit: type=1400 audit(84.510:77): avc: denied { sys_module } for pid=3098 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 85.366568][ T29] audit: type=1400 audit(85.280:78): avc: denied { ioctl } for pid=3099 comm="syz-executor" path="/dev/net/tun" dev="devtmpfs" ino=677 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 86.607531][ T3099] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 86.633086][ T3098] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 86.636856][ T3099] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 86.664595][ T3098] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 87.432867][ T3099] hsr_slave_0: entered promiscuous mode [ 87.436997][ T3099] hsr_slave_1: entered promiscuous mode [ 87.504348][ T3098] hsr_slave_0: entered promiscuous mode [ 87.506065][ T3098] hsr_slave_1: entered promiscuous mode [ 87.512872][ T3098] debugfs: 'hsr0' already exists in 'hsr' [ 87.515696][ T3098] Cannot create hsr debugfs directory [ 87.870374][ T29] audit: type=1400 audit(87.790:79): avc: denied { create } for pid=3099 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 87.874182][ T29] audit: type=1400 audit(87.790:80): avc: denied { write } for pid=3099 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 87.885543][ T3099] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 87.903753][ T3099] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 87.921298][ T3099] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 87.927323][ T3099] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 87.998359][ T3098] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 88.007625][ T3098] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 88.017786][ T3098] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 88.028134][ T3098] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 88.675475][ T3099] 8021q: adding VLAN 0 to HW filter on device bond0 [ 88.732421][ T3098] 8021q: adding VLAN 0 to HW filter on device bond0 [ 91.020428][ T3098] veth0_vlan: entered promiscuous mode [ 91.057812][ T3098] veth1_vlan: entered promiscuous mode [ 91.148562][ T3098] veth0_macvtap: entered promiscuous mode [ 91.166359][ T3098] veth1_macvtap: entered promiscuous mode [ 91.283747][ T38] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 91.284625][ T38] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 91.284735][ T38] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 91.284814][ T38] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 91.391858][ T29] kauditd_printk_skb: 1 callbacks suppressed [ 91.396033][ T29] audit: type=1400 audit(91.310:82): avc: denied { mount } for pid=3098 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 91.400906][ T29] audit: type=1400 audit(91.320:83): avc: denied { mounton } for pid=3098 comm="syz-executor" path="/syzkaller.MTGalB/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 91.408049][ T29] audit: type=1400 audit(91.320:84): avc: denied { mount } for pid=3098 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 91.421190][ T29] audit: type=1400 audit(91.340:85): avc: denied { mounton } for pid=3098 comm="syz-executor" path="/syzkaller.MTGalB/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 91.434585][ T29] audit: type=1400 audit(91.350:86): avc: denied { mounton } for pid=3098 comm="syz-executor" path="/syzkaller.MTGalB/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=982 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 91.455869][ T29] audit: type=1400 audit(91.370:87): avc: denied { unmount } for pid=3098 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 91.470271][ T29] audit: type=1400 audit(91.380:88): avc: denied { mounton } for pid=3098 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=772 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 91.489995][ T29] audit: type=1400 audit(91.390:89): avc: denied { mount } for pid=3098 comm="syz-executor" name="/" dev="gadgetfs" ino=983 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 91.495805][ T29] audit: type=1400 audit(91.410:90): avc: denied { mount } for pid=3098 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 91.507437][ T29] audit: type=1400 audit(91.420:91): avc: denied { mounton } for pid=3098 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 91.595869][ T3098] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 91.890374][ T3099] veth0_vlan: entered promiscuous mode [ 91.911678][ T3099] veth1_vlan: entered promiscuous mode [ 92.008318][ T3099] veth0_macvtap: entered promiscuous mode [ 92.022541][ T3099] veth1_macvtap: entered promiscuous mode [ 92.096530][ T38] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 92.097052][ T38] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 92.097149][ T38] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 92.097214][ T38] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 97.133304][ T29] kauditd_printk_skb: 20 callbacks suppressed [ 97.161257][ T29] audit: type=1400 audit(97.050:112): avc: denied { write } for pid=3780 comm="syz.1.35" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 100.992564][ T29] audit: type=1400 audit(100.910:113): avc: denied { setopt } for pid=3789 comm="syz.1.39" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 101.390830][ T29] audit: type=1400 audit(101.310:114): avc: denied { ioctl } for pid=3793 comm="syz.1.41" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=3230 ioctlcmd=0xaa3f scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 101.694040][ T29] audit: type=1400 audit(101.610:115): avc: denied { create } for pid=3795 comm="syz.1.42" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 101.697976][ T29] audit: type=1400 audit(101.610:116): avc: denied { ioctl } for pid=3795 comm="syz.1.42" path="socket:[3231]" dev="sockfs" ino=3231 ioctlcmd=0x891a scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 103.205797][ T29] audit: type=1400 audit(103.120:117): avc: denied { write } for pid=3820 comm="syz.1.54" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 103.283744][ T3823] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=3823 comm=syz.1.55 [ 103.557091][ T29] audit: type=1400 audit(103.470:118): avc: denied { setattr } for pid=3829 comm="syz.1.58" name="ALG" dev="sockfs" ino=3281 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 103.741160][ T29] audit: type=1400 audit(103.660:119): avc: denied { audit_write } for pid=3833 comm="syz.1.60" capability=29 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 103.857096][ T29] audit: type=1400 audit(103.770:120): avc: denied { map } for pid=3837 comm="syz.1.62" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=2611 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 103.857977][ T29] audit: type=1400 audit(103.770:121): avc: denied { read write } for pid=3837 comm="syz.1.62" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=2611 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 103.883566][ T29] audit: type=1400 audit(103.800:122): avc: denied { getattr } for pid=3837 comm="syz.1.62" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=2611 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 104.058319][ T29] audit: type=1400 audit(103.970:123): avc: denied { create } for pid=3843 comm="syz.1.65" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 104.063280][ T29] audit: type=1400 audit(103.980:124): avc: denied { write } for pid=3843 comm="syz.1.65" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 104.327823][ T3852] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3852 comm=syz.1.69 [ 104.595280][ T3858] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=3858 comm=syz.1.72 [ 104.656324][ T3860] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2564 sclass=netlink_route_socket pid=3860 comm=syz.1.73 [ 104.840952][ T29] audit: type=1400 audit(104.760:125): avc: denied { ioctl } for pid=3865 comm="syz.1.76" path="socket:[2712]" dev="sockfs" ino=2712 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 104.842851][ T29] audit: type=1400 audit(104.760:126): avc: denied { bind } for pid=3865 comm="syz.1.76" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 107.488161][ T3904] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=3904 comm=syz.0.95 [ 109.925530][ T29] kauditd_printk_skb: 5 callbacks suppressed [ 109.949674][ T29] audit: type=1400 audit(109.840:132): avc: denied { create } for pid=3931 comm="syz.0.109" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 110.042713][ T29] audit: type=1400 audit(109.900:133): avc: denied { write } for pid=3931 comm="syz.0.109" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 115.869916][ T29] audit: type=1400 audit(115.780:134): avc: denied { compute_member } for pid=3984 comm="syz.1.134" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 123.517073][ T4044] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=770 sclass=netlink_route_socket pid=4044 comm=syz.0.162 [ 126.083472][ T4074] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4074 comm=syz.0.176 [ 127.786120][ T29] audit: type=1400 audit(127.700:135): avc: denied { write } for pid=4117 comm="syz.1.198" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 128.160910][ T29] audit: type=1400 audit(128.080:136): avc: denied { mount } for pid=4125 comm="syz.1.202" name="/" dev="bpf" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bpf_t tclass=filesystem permissive=1 [ 128.750378][ T4146] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 128.892375][ T4150] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4150 comm=syz.0.213 [ 129.317331][ T29] audit: type=1400 audit(129.230:137): avc: denied { execute } for pid=4164 comm="syz.1.221" path=2F6D656D66643A0B656DDA9952406DFCFE9B232AFF202864656C6574656429 dev="tmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 129.698467][ T29] audit: type=1400 audit(129.610:138): avc: denied { setopt } for pid=4179 comm="syz.0.228" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 129.878627][ T29] audit: type=1400 audit(129.790:139): avc: denied { write } for pid=4187 comm="syz.0.232" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 130.706672][ T29] audit: type=1400 audit(130.620:140): avc: denied { write } for pid=4220 comm="syz.1.249" name="ipv6_route" dev="proc" ino=4026532713 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 131.052638][ T4234] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4234 comm=syz.1.255 [ 131.304943][ T4244] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=1547 sclass=netlink_audit_socket pid=4244 comm=syz.1.259 [ 132.417429][ T29] audit: type=1400 audit(132.330:141): avc: denied { create } for pid=4275 comm="syz.0.276" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 132.575448][ T4281] capability: warning: `syz.0.278' uses 32-bit capabilities (legacy support in use) [ 133.260914][ T4305] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=19 sclass=netlink_tcpdiag_socket pid=4305 comm=syz.1.290 [ 133.990991][ T4333] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4333 comm=syz.0.304 [ 134.973597][ T29] audit: type=1400 audit(134.890:142): avc: denied { ioctl } for pid=4347 comm="syz.1.311" path="socket:[5162]" dev="sockfs" ino=5162 ioctlcmd=0x89e2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 135.174857][ T29] audit: type=1400 audit(135.090:143): avc: denied { associate } for pid=4351 comm="syz.1.313" name="pfkey" scontext=root:object_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 135.695511][ T4360] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4360 comm=syz.1.317 [ 136.220581][ T4370] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4370 comm=syz.1.322 [ 138.504841][ T4411] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2051 sclass=netlink_route_socket pid=4411 comm=syz.1.342 [ 138.730132][ T29] audit: type=1400 audit(138.650:144): avc: denied { bind } for pid=4414 comm="syz.1.344" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 138.732572][ T29] audit: type=1400 audit(138.650:145): avc: denied { node_bind } for pid=4414 comm="syz.1.344" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 [ 138.938520][ T29] audit: type=1400 audit(138.850:146): avc: denied { read } for pid=4418 comm="syz.1.346" path="socket:[4758]" dev="sockfs" ino=4758 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 139.192094][ T29] audit: type=1400 audit(139.110:147): avc: denied { create } for pid=4426 comm="syz.0.350" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 139.205246][ T29] audit: type=1400 audit(139.120:148): avc: denied { read write } for pid=4426 comm="syz.0.350" path="socket:[4775]" dev="sockfs" ino=4775 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 139.430804][ T4436] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=18 sclass=netlink_audit_socket pid=4436 comm=syz.1.354 [ 139.462637][ T29] audit: type=1400 audit(139.380:149): avc: denied { ioctl } for pid=4435 comm="syz.0.355" path="socket:[4789]" dev="sockfs" ino=4789 ioctlcmd=0x4dfd scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 140.228238][ T4461] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=4461 comm=syz.1.367 [ 140.877501][ T29] audit: type=1400 audit(140.790:150): avc: denied { ioctl } for pid=4478 comm="syz.0.377" path="socket:[4860]" dev="sockfs" ino=4860 ioctlcmd=0xaf01 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 141.042790][ T29] audit: type=1400 audit(140.960:151): avc: denied { name_bind } for pid=4487 comm="syz.1.381" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 141.172865][ T4493] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4493 comm=syz.1.382 [ 141.408391][ T29] audit: type=1400 audit(141.320:152): avc: denied { ioctl } for pid=4500 comm="syz.1.387" path="socket:[4901]" dev="sockfs" ino=4901 ioctlcmd=0x64ad scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 141.547449][ T4505] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4505 comm=syz.1.389 [ 141.854609][ T4517] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=637 sclass=netlink_route_socket pid=4517 comm=syz.1.395 [ 142.432267][ T29] audit: type=1400 audit(142.350:153): avc: denied { setopt } for pid=4541 comm="syz.0.408" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 142.663413][ T29] audit: type=1400 audit(142.580:154): avc: denied { setopt } for pid=4552 comm="syz.0.413" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 144.182755][ T4581] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=2564 sclass=netlink_tcpdiag_socket pid=4581 comm=syz.0.426 [ 146.699871][ T4608] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=4608 comm=syz.0.439 [ 147.039792][ T29] audit: type=1400 audit(146.950:155): avc: denied { lock } for pid=4613 comm="syz.0.443" path="/dev/null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 148.550676][ T29] audit: type=1400 audit(148.470:156): avc: denied { create } for pid=4677 comm="syz.1.475" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 148.567484][ T29] audit: type=1400 audit(148.480:157): avc: denied { write } for pid=4677 comm="syz.1.475" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 148.851778][ T4690] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=65534 sclass=netlink_audit_socket pid=4690 comm=syz.1.480 [ 149.144362][ T4699] Zero length message leads to an empty skb [ 150.596178][ T4758] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4758 comm=syz.1.512 [ 150.722807][ T4766] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4766 comm=syz.1.516 [ 150.768114][ T4769] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4769 comm=syz.0.517 [ 157.005477][ T4836] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4836 comm=syz.0.550 [ 160.982975][ T4876] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4876 comm=syz.1.569 [ 162.651757][ T4897] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=260 sclass=netlink_route_socket pid=4897 comm=syz.1.583 [ 165.994589][ T4921] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4921 comm=syz.0.590 [ 166.274352][ T4929] vxcan1: tx address claim with dlc 1 [ 167.022195][ T4954] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=512 sclass=netlink_audit_socket pid=4954 comm=syz.0.607 [ 168.041461][ T4958] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4958 comm=syz.1.608 [ 168.138101][ T29] audit: type=1400 audit(168.050:158): avc: denied { setopt } for pid=4961 comm="syz.1.610" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 171.334639][ T4987] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4987 comm=syz.0.622 [ 174.742408][ T5009] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2564 sclass=netlink_route_socket pid=5009 comm=syz.0.631 [ 176.172649][ T29] audit: type=1400 audit(176.090:159): avc: denied { ioctl } for pid=5018 comm="syz.1.639" path="socket:[6969]" dev="sockfs" ino=6969 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 181.135506][ T29] audit: type=1400 audit(181.040:160): avc: denied { connect } for pid=5073 comm="syz.0.663" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 181.322977][ T5084] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5084 comm=syz.1.671 [ 187.075625][ T5122] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=5122 comm=syz.1.687 [ 190.341874][ T5142] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5142 comm=syz.0.694 [ 190.793353][ T5158] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=5158 comm=syz.0.704 [ 191.382163][ T5174] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=18 sclass=netlink_audit_socket pid=5174 comm=syz.0.712 [ 199.671787][ T5258] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2564 sclass=netlink_route_socket pid=5258 comm=syz.0.754 [ 200.034371][ T5262] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5262 comm=syz.0.755 [ 210.207014][ T5375] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=770 sclass=netlink_route_socket pid=5375 comm=syz.1.809 [ 210.677021][ T5386] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=770 sclass=netlink_route_socket pid=5386 comm=syz.1.816 [ 660.279236][ C0] watchdog: BUG: soft lockup - CPU#0 stuck for 430s! [swapper/0:0] [ 660.279545][ C0] Modules linked in: [ 660.280349][ C0] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Not tainted syzkaller #0 PREEMPT [ 660.280595][ C0] Hardware name: ARM-Versatile Express [ 660.280816][ C0] PC is at _raw_spin_unlock_irq+0x28/0x54 [ 660.281584][ C0] LR is at tmigr_handle_remote_up+0x268/0x4b0 [ 660.281662][ C0] pc : [<81abb53c>] lr : [<80346df4>] psr: 60000113 [ 660.281709][ C0] sp : 82801be0 ip : 82801bf0 fp : 82801bec [ 660.281798][ C0] r10: 00000001 r9 : 00000031 r8 : b7f9d100 [ 660.281841][ C0] r7 : ddddb488 r6 : 82801cb8 r5 : 830bf3b0 r4 : 830bf380 [ 660.281885][ C0] r3 : 000085d1 r2 : 00000103 r1 : 830bf3b0 r0 : ddddb488 [ 660.282003][ C0] Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment user [ 660.282079][ C0] Control: 30c5387d Table: 85dd6940 DAC: fffffffd [ 660.282188][ C0] Call trace: [ 660.282480][ C0] [<81abb514>] (_raw_spin_unlock_irq) from [<80346df4>] (tmigr_handle_remote_up+0x268/0x4b0) [ 660.282864][ C0] [<80346b8c>] (tmigr_handle_remote_up) from [<803450a4>] (__walk_groups_from+0x3c/0xe4) [ 660.283024][ C0] r10:8281b500 r9:8280c820 r8:80346b8c r7:82801cb8 r6:830bf380 r5:00000002 [ 660.283077][ C0] r4:830bf380 [ 660.283107][ C0] [<80345068>] (__walk_groups_from) from [<8034743c>] (tmigr_handle_remote+0xe8/0x108) [ 660.283208][ C0] r9:82804d80 r8:00000102 r7:00000001 r6:00000082 r5:00000002 r4:dddc7488 [ 660.283249][ C0] [<80347354>] (tmigr_handle_remote) from [<80327600>] (run_timer_softirq+0x30/0x34) [ 660.283335][ C0] r4:82804084 [ 660.283359][ C0] [<803275d0>] (run_timer_softirq) from [<8025b55c>] (handle_softirqs+0x140/0x458) [ 660.283437][ C0] [<8025b41c>] (handle_softirqs) from [<8025b9d0>] (__irq_exit_rcu+0x110/0x1d0) [ 660.283519][ C0] r10:00000000 r9:8281b500 r8:00000000 r7:82801dd8 r6:82443e68 r5:8247ef9c [ 660.283540][ C0] r4:8281b500 [ 660.283557][ C0] [<8025b8c0>] (__irq_exit_rcu) from [<8025bd48>] (irq_exit+0x10/0x18) [ 660.283627][ C0] r5:8247ef9c r4:826c3a9c [ 660.283646][ C0] [<8025bd38>] (irq_exit) from [<81aad164>] (generic_handle_arch_irq+0x7c/0x80) [ 660.283722][ C0] [<81aad0e8>] (generic_handle_arch_irq) from [<80200bdc>] (__irq_svc+0x7c/0xbc) [ 660.283884][ C0] Exception stack(0x82801dd8 to 0x82801e20) [ 660.284082][ C0] 1dc0: 00000001 00000000 [ 660.284147][ C0] 1de0: 00008872 00008870 84121368 00000004 00000001 84121368 842d1a88 84121240 [ 660.284188][ C0] 1e00: 00000000 82801e3c 82801e28 82801e28 81abb6cc 81abb6f4 80000013 ffffffff [ 660.284279][ C0] r9:8281b500 r8:842d1a88 r7:82801e0c r6:ffffffff r5:80000013 r4:81abb6f4 [ 660.284303][ C0] [<81abb6b4>] (_raw_spin_lock) from [<809c74b8>] (gpio_mmio_set+0x44/0x80) [ 660.284394][ C0] r5:00000004 r4:84121240 [ 660.284416][ C0] [<809c7474>] (gpio_mmio_set) from [<809b7c74>] (gpiochip_set+0x1c/0x44) [ 660.284499][ C0] r7:00000001 r6:00000000 r5:00000002 r4:841e1028 [ 660.284519][ C0] [<809b7c58>] (gpiochip_set) from [<809ba53c>] (gpiod_set_raw_value_commit+0x78/0x218) [ 660.284585][ C0] [<809ba4c4>] (gpiod_set_raw_value_commit) from [<809bbddc>] (gpiod_set_value_nocheck+0x44/0x58) [ 660.284666][ C0] r10:00000000 r9:00000000 r8:00000001 r7:dddce4c0 r6:838dbad8 r5:00000001 [ 660.284689][ C0] r4:841e1028 [ 660.284708][ C0] [<809bbd98>] (gpiod_set_value_nocheck) from [<809bbe2c>] (gpiod_set_value+0x3c/0x88) [ 660.284767][ C0] [<809bbdf0>] (gpiod_set_value) from [<809cc5c8>] (gpio_led_set+0x5c/0x60) [ 660.284833][ C0] r5:000000ff r4:83315a24 [ 660.284853][ C0] [<809cc56c>] (gpio_led_set) from [<809c9ef0>] (led_set_brightness+0x84/0x90) [ 660.284916][ C0] r5:000000ff r4:83315a24 [ 660.284937][ C0] [<809c9e6c>] (led_set_brightness) from [<809cba70>] (led_trigger_event+0x40/0x58) [ 660.285007][ C0] r5:000000ff r4:83315a24 [ 660.285027][ C0] [<809cba30>] (led_trigger_event) from [<809cd0cc>] (ledtrig_cpu+0xac/0xf4) [ 660.285099][ C0] r7:dddce4c0 r6:00000002 r5:82b15cd8 r4:000001fd [ 660.285118][ C0] [<809cd020>] (ledtrig_cpu) from [<80227a38>] (arch_cpu_idle_exit+0x14/0x18) [ 660.285200][ C0] r9:00000000 r8:00000000 r7:8280c710 r6:8281b500 r5:8280c6d0 r4:00000000 [ 660.285232][ C0] [<80227a24>] (arch_cpu_idle_exit) from [<802b158c>] (do_idle+0x5c/0x2d8) [ 660.285308][ C0] [<802b1530>] (do_idle) from [<802b1b38>] (cpu_startup_entry+0x30/0x34) [ 660.285397][ C0] r10:8281aff4 r9:8280c680 r8:823bea70 r7:00000000 r6:deffc06c r5:828222e8 [ 660.285423][ C0] r4:000000ed [ 660.285442][ C0] [<802b1b08>] (cpu_startup_entry) from [<81aaeb7c>] (kernel_init+0x0/0x138) [ 660.285521][ C0] [<81aaea9c>] (rest_init) from [<8260145c>] (start_kernel+0x844/0x860) [ 660.285632][ C0] [<82600c18>] (start_kernel) from [<00000000>] (0x0) [ 660.286427][ C0] Sending NMI from CPU 0 to CPUs 1: [ 660.287412][ C1] NMI backtrace for cpu 1 [ 660.287666][ C1] CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Not tainted syzkaller #0 PREEMPT [ 660.287735][ C1] Hardware name: ARM-Versatile Express [ 660.287762][ C1] PC is at _raw_spin_lock+0x40/0x58 [ 660.287851][ C1] LR is at _raw_spin_lock+0x18/0x58 [ 660.287896][ C1] pc : [<81abb6f4>] lr : [<81abb6cc>] psr: 80000113 [ 660.287925][ C1] sp : df805d68 ip : df805d68 fp : df805d7c [ 660.287948][ C1] r10: 81c05450 r9 : 84121240 r8 : 842d1a88 [ 660.287986][ C1] r7 : 84121368 r6 : 00000001 r5 : 00000001 r4 : 84121368 [ 660.288016][ C1] r3 : 00008870 r2 : 00008871 r1 : 00000000 r0 : 00000001 [ 660.288044][ C1] Flags: Nzcv IRQs on FIQs on Mode SVC_32 ISA ARM Segment none [ 660.288085][ C1] Control: 30c5387d Table: 84d295c0 DAC: 00000000 [ 660.288110][ C1] Call trace: frame pointer underflow [ 660.288254][ C1] [<81abb6b4>] (_raw_spin_lock) from [<809c74b8>] (gpio_mmio_set+0x44/0x80) [ 660.288366][ C1] r5:00000001 r4:84121240 [ 660.288391][ C1] [<809c7474>] (gpio_mmio_set) from [<809b7c74>] (gpiochip_set+0x1c/0x44) [ 660.288473][ C1] r7:00000001 r6:00000000 r5:00000000 r4:841e1000 [ 660.288494][ C1] [<809b7c58>] (gpiochip_set) from [<809ba53c>] (gpiod_set_raw_value_commit+0x78/0x218) [ 660.288563][ C1] [<809ba4c4>] (gpiod_set_raw_value_commit) from [<809bbddc>] (gpiod_set_value_nocheck+0x44/0x58) [ 660.288648][ C1] r10:81c05450 r9:df805ebc r8:00000102 r7:ffffde37 r6:00000007 r5:00000001 [ 660.288671][ C1] r4:841e1000 [ 660.288689][ C1] [<809bbd98>] (gpiod_set_value_nocheck) from [<809bbe2c>] (gpiod_set_value+0x3c/0x88) [ 660.288755][ C1] [<809bbdf0>] (gpiod_set_value) from [<809cc5c8>] (gpio_led_set+0x5c/0x60) [ 660.288824][ C1] r5:83315844 r4:83315844 [ 660.288844][ C1] [<809cc56c>] (gpio_led_set) from [<809c9e60>] (led_set_brightness_nosleep+0x38/0x44) [ 660.288912][ C1] r5:83315844 r4:8444c58c [ 660.288932][ C1] [<809c9e28>] (led_set_brightness_nosleep) from [<809ccec4>] (led_heartbeat_function+0x84/0x144) [ 660.289010][ C1] [<809cce40>] (led_heartbeat_function) from [<80326f70>] (call_timer_fn+0x30/0x220) [ 660.289095][ C1] r7:ffffde37 r6:809cce40 r5:8444c58c r4:83216000 [ 660.289119][ C1] [<80326f40>] (call_timer_fn) from [<80327424>] (__run_timers+0x2c4/0x3f8) [ 660.289201][ C1] r9:df805ebc r8:ffffde37 r7:00000000 r6:809cce40 r5:dddd9f00 r4:8444c58c [ 660.289222][ C1] [<80327160>] (__run_timers) from [<803275c0>] (run_timer_base+0x68/0x78) [ 660.289306][ C1] r10:83216000 r9:82804d80 r8:00000102 r7:00000001 r6:00000082 r5:00000002 [ 660.289332][ C1] r4:dddd9f00 [ 660.289352][ C1] [<80327558>] (run_timer_base) from [<803275ec>] (run_timer_softirq+0x1c/0x34) [ 660.289425][ C1] r4:82804084 [ 660.289448][ C1] [<803275d0>] (run_timer_softirq) from [<8025b55c>] (handle_softirqs+0x140/0x458) [ 660.289522][ C1] [<8025b41c>] (handle_softirqs) from [<8025b9d0>] (__irq_exit_rcu+0x110/0x1d0) [ 660.289606][ C1] r10:00000000 r9:83216000 r8:00000000 r7:df865e08 r6:82443e68 r5:8247ef9c [ 660.289632][ C1] r4:83216000 [ 660.289653][ C1] [<8025b8c0>] (__irq_exit_rcu) from [<8025bd48>] (irq_exit+0x10/0x18) [ 660.289795][ C1] r5:8247ef9c r4:826c3a9c [ 660.289820][ C1] [<8025bd38>] (irq_exit) from [<81aad164>] (generic_handle_arch_irq+0x7c/0x80) [ 660.289897][ C1] [<81aad0e8>] (generic_handle_arch_irq) from [<81a7d0fc>] (call_with_stack+0x1c/0x20) [ 660.290004][ C1] r9:83216000 r8:842d1a88 r7:df865e3c r6:ffffffff r5:60000013 r4:809c7cb8 [ 660.290030][ C1] [<81a7d0e0>] (call_with_stack) from [<80200bec>] (__irq_svc+0x8c/0xbc) [ 660.290097][ C1] Exception stack(0xdf865e08 to 0xdf865e50) [ 660.290143][ C1] 5e00: e0227008 00000008 00008870 00000000 e0227008 00000008 [ 660.290184][ C1] 5e20: 00000001 84121368 842d1a88 84121240 00000000 df865e6c df865e58 df865e58 [ 660.290214][ C1] 5e40: 809c7cb4 809c7cb8 60000013 ffffffff [ 660.290240][ C1] [<809c7c98>] (gpio_mmio_write32) from [<809c74d8>] (gpio_mmio_set+0x64/0x80) [ 660.290317][ C1] r5:00000008 r4:84121240 [ 660.290336][ C1] [<809c7474>] (gpio_mmio_set) from [<809b7c74>] (gpiochip_set+0x1c/0x44) [ 660.290410][ C1] r7:00000001 r6:00000000 r5:00000003 r4:841e103c [ 660.290429][ C1] [<809b7c58>] (gpiochip_set) from [<809ba53c>] (gpiod_set_raw_value_commit+0x78/0x218) [ 660.290492][ C1] [<809ba4c4>] (gpiod_set_raw_value_commit) from [<809bbddc>] (gpiod_set_value_nocheck+0x44/0x58) [ 660.290569][ C1] r10:00000000 r9:00000000 r8:00000001 r7:ddde24c0 r6:838dbd58 r5:00000001 [ 660.290593][ C1] r4:841e103c [ 660.290610][ C1] [<809bbd98>] (gpiod_set_value_nocheck) from [<809bbe2c>] (gpiod_set_value+0x3c/0x88) [ 660.290669][ C1] [<809bbdf0>] (gpiod_set_value) from [<809cc5c8>] (gpio_led_set+0x5c/0x60) [ 660.290768][ C1] r5:000000ff r4:83315b14 [ 660.290788][ C1] [<809cc56c>] (gpio_led_set) from [<809c9ef0>] (led_set_brightness+0x84/0x90) [ 660.290856][ C1] r5:000000ff r4:83315b14 [ 660.290876][ C1] [<809c9e6c>] (led_set_brightness) from [<809cba70>] (led_trigger_event+0x40/0x58) [ 660.290944][ C1] r5:000000ff r4:83315b14 [ 660.290993][ C1] [<809cba30>] (led_trigger_event) from [<809cd0cc>] (ledtrig_cpu+0xac/0xf4) [ 660.291073][ C1] r7:ddde24c0 r6:00000002 r5:82b15cd8 r4:000000fe [ 660.291098][ C1] [<809cd020>] (ledtrig_cpu) from [<80227a38>] (arch_cpu_idle_exit+0x14/0x18) [ 660.291187][ C1] r9:00000000 r8:00000001 r7:8280c710 r6:83216000 r5:8280c6d0 r4:00000001 [ 660.291247][ C1] [<80227a24>] (arch_cpu_idle_exit) from [<802b158c>] (do_idle+0x5c/0x2d8) [ 660.291335][ C1] [<802b1530>] (do_idle) from [<802b1b38>] (cpu_startup_entry+0x30/0x34) [ 660.291428][ C1] r10:00000000 r9:414fc0f0 r8:80003000 r7:82a7b4a4 r6:83216000 r5:00000001 [ 660.291454][ C1] r4:00000092 [ 660.291474][ C1] [<802b1b08>] (cpu_startup_entry) from [<8022f360>] (secondary_start_kernel+0x128/0x194) [ 660.291555][ C1] [<8022f238>] (secondary_start_kernel) from [<80220094>] (__enable_mmu+0x0/0xc) [ 660.291642][ C1] r7:82a7b4a4 r6:30c0387d r5:00000000 r4:830b7bc0 [ 660.292729][ C0] Kernel panic - not syncing: softlockup: hung tasks [ 660.328298][ C0] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Tainted: G L syzkaller #0 PREEMPT [ 660.328810][ C0] Tainted: [L]=SOFTLOCKUP [ 660.329023][ C0] Hardware name: ARM-Versatile Express [ 660.329304][ C0] Call trace: [ 660.329595][ C0] [<80201a74>] (dump_backtrace) from [<80201b70>] (show_stack+0x18/0x1c) [ 660.329993][ C0] r7:822964bc r6:8281b500 r5:00000000 r4:8229566c [ 660.330243][ C0] [<80201b58>] (show_stack) from [<8021ee08>] (dump_stack_lvl+0x54/0x7c) [ 660.330599][ C0] [<8021edb4>] (dump_stack_lvl) from [<8021ee48>] (dump_stack+0x18/0x1c) [ 660.331001][ C0] r5:00000000 r4:82a7bd14 [ 660.331200][ C0] [<8021ee30>] (dump_stack) from [<80202648>] (vpanic+0xe0/0x2e8) [ 660.331547][ C0] [<80202568>] (vpanic) from [<80202884>] (trace_suspend_resume+0x0/0xd8) [ 660.331893][ C0] r7:82ac27f8 [ 660.332061][ C0] [<80202850>] (panic) from [<80383f14>] (watchdog_timer_fn+0x2dc/0x350) [ 660.332422][ C0] r3:00000001 r2:00004000 r1:82a7bd1c r0:822964bc [ 660.332680][ C0] [<80383c38>] (watchdog_timer_fn) from [<80329b64>] (__hrtimer_run_queues+0x1c4/0x454) [ 660.333074][ C0] r10:8281b500 r9:00000000 r8:dddc7130 r7:80383c38 r6:dddc7000 r5:dddc7040 [ 660.333404][ C0] r4:dddc75d8 [ 660.333574][ C0] [<803299a0>] (__hrtimer_run_queues) from [<8032b168>] (hrtimer_interrupt+0x148/0x2bc) [ 660.334029][ C0] r10:b6ff0610 r9:dddc7180 r8:dddc7130 r7:00000099 r6:00000003 r5:20000193 [ 660.334365][ C0] r4:dddc7000 [ 660.334535][ C0] [<8032b020>] (hrtimer_interrupt) from [<813400d8>] (arch_timer_handler_virt+0x30/0x38) [ 660.334963][ C0] r10:81d0fc78 r9:8309e400 r8:00000000 r7:00000000 r6:00000000 r5:82498528 [ 660.335296][ C0] r4:8309de40 [ 660.335468][ C0] [<813400a8>] (arch_timer_handler_virt) from [<802ef9b4>] (handle_percpu_devid_irq+0x128/0x34c) [ 660.335890][ C0] [<802ef88c>] (handle_percpu_devid_irq) from [<802e8b44>] (handle_irq_desc+0x74/0x84) [ 660.336328][ C0] r10:00000001 r9:8281b500 r8:00000000 r7:df80a00c r6:826c2388 r5:df80a000 [ 660.336650][ C0] r4:8280cc44 [ 660.336819][ C0] [<802e8ad0>] (handle_irq_desc) from [<802e8bc0>] (generic_handle_domain_irq+0x18/0x1c) [ 660.337224][ C0] [<802e8ba8>] (generic_handle_domain_irq) from [<802012c8>] (gic_handle_irq+0x68/0x7c) [ 660.337626][ C0] [<80201260>] (gic_handle_irq) from [<81aad148>] (generic_handle_arch_irq+0x60/0x80) [ 660.338092][ C0] r7:82801b90 r6:82443e68 r5:8247ef9c r4:826c3a9c [ 660.338372][ C0] [<81aad0e8>] (generic_handle_arch_irq) from [<80200bdc>] (__irq_svc+0x7c/0xbc) [ 660.338761][ C0] Exception stack(0x82801b90 to 0x82801bd8) [ 660.339023][ C0] 1b80: ddddb488 830bf3b0 00000103 000085d1 [ 660.339376][ C0] 1ba0: 830bf380 830bf3b0 82801cb8 ddddb488 b7f9d100 00000031 00000001 82801bec [ 660.339701][ C0] 1bc0: 82801bf0 82801be0 80346df4 81abb53c 60000113 ffffffff [ 660.339981][ C0] r9:8281b500 r8:b7f9d100 r7:82801bc4 r6:ffffffff r5:60000113 r4:81abb53c [ 660.340241][ C0] [<81abb514>] (_raw_spin_unlock_irq) from [<80346df4>] (tmigr_handle_remote_up+0x268/0x4b0) [ 660.340670][ C0] [<80346b8c>] (tmigr_handle_remote_up) from [<803450a4>] (__walk_groups_from+0x3c/0xe4) [ 660.341088][ C0] r10:8281b500 r9:8280c820 r8:80346b8c r7:82801cb8 r6:830bf380 r5:00000002 [ 660.341421][ C0] r4:830bf380 [ 660.341592][ C0] [<80345068>] (__walk_groups_from) from [<8034743c>] (tmigr_handle_remote+0xe8/0x108) [ 660.342068][ C0] r9:82804d80 r8:00000102 r7:00000001 r6:00000082 r5:00000002 r4:dddc7488 [ 660.342405][ C0] [<80347354>] (tmigr_handle_remote) from [<80327600>] (run_timer_softirq+0x30/0x34) [ 660.342816][ C0] r4:82804084 [ 660.342986][ C0] [<803275d0>] (run_timer_softirq) from [<8025b55c>] (handle_softirqs+0x140/0x458) [ 660.343400][ C0] [<8025b41c>] (handle_softirqs) from [<8025b9d0>] (__irq_exit_rcu+0x110/0x1d0) [ 660.343842][ C0] r10:00000000 r9:8281b500 r8:00000000 r7:82801dd8 r6:82443e68 r5:8247ef9c [ 660.344170][ C0] r4:8281b500 [ 660.344354][ C0] [<8025b8c0>] (__irq_exit_rcu) from [<8025bd48>] (irq_exit+0x10/0x18) [ 660.344761][ C0] r5:8247ef9c r4:826c3a9c [ 660.344968][ C0] [<8025bd38>] (irq_exit) from [<81aad164>] (generic_handle_arch_irq+0x7c/0x80) [ 660.345379][ C0] [<81aad0e8>] (generic_handle_arch_irq) from [<80200bdc>] (__irq_svc+0x7c/0xbc) [ 660.345812][ C0] Exception stack(0x82801dd8 to 0x82801e20) [ 660.346073][ C0] 1dc0: 00000001 00000000 [ 660.346432][ C0] 1de0: 00008872 00008870 84121368 00000004 00000001 84121368 842d1a88 84121240 [ 660.346774][ C0] 1e00: 00000000 82801e3c 82801e28 82801e28 81abb6cc 81abb6f4 80000013 ffffffff [ 660.347121][ C0] r9:8281b500 r8:842d1a88 r7:82801e0c r6:ffffffff r5:80000013 r4:81abb6f4 [ 660.347447][ C0] [<81abb6b4>] (_raw_spin_lock) from [<809c74b8>] (gpio_mmio_set+0x44/0x80) [ 660.347842][ C0] r5:00000004 r4:84121240 [ 660.348041][ C0] [<809c7474>] (gpio_mmio_set) from [<809b7c74>] (gpiochip_set+0x1c/0x44) [ 660.348445][ C0] r7:00000001 r6:00000000 r5:00000002 r4:841e1028 [ 660.348700][ C0] [<809b7c58>] (gpiochip_set) from [<809ba53c>] (gpiod_set_raw_value_commit+0x78/0x218) [ 660.349090][ C0] [<809ba4c4>] (gpiod_set_raw_value_commit) from [<809bbddc>] (gpiod_set_value_nocheck+0x44/0x58) [ 660.349502][ C0] r10:00000000 r9:00000000 r8:00000001 r7:dddce4c0 r6:838dbad8 r5:00000001 [ 660.349842][ C0] r4:841e1028 [ 660.350018][ C0] [<809bbd98>] (gpiod_set_value_nocheck) from [<809bbe2c>] (gpiod_set_value+0x3c/0x88) [ 660.350410][ C0] [<809bbdf0>] (gpiod_set_value) from [<809cc5c8>] (gpio_led_set+0x5c/0x60) [ 660.350812][ C0] r5:000000ff r4:83315a24 [ 660.351013][ C0] [<809cc56c>] (gpio_led_set) from [<809c9ef0>] (led_set_brightness+0x84/0x90) [ 660.351395][ C0] r5:000000ff r4:83315a24 [ 660.351581][ C0] [<809c9e6c>] (led_set_brightness) from [<809cba70>] (led_trigger_event+0x40/0x58) [ 660.351950][ C0] r5:000000ff r4:83315a24 [ 660.352147][ C0] [<809cba30>] (led_trigger_event) from [<809cd0cc>] (ledtrig_cpu+0xac/0xf4) [ 660.352521][ C0] r7:dddce4c0 r6:00000002 r5:82b15cd8 r4:000001fd [ 660.352768][ C0] [<809cd020>] (ledtrig_cpu) from [<80227a38>] (arch_cpu_idle_exit+0x14/0x18) [ 660.353139][ C0] r9:00000000 r8:00000000 r7:8280c710 r6:8281b500 r5:8280c6d0 r4:00000000 [ 660.353456][ C0] [<80227a24>] (arch_cpu_idle_exit) from [<802b158c>] (do_idle+0x5c/0x2d8) [ 660.353853][ C0] [<802b1530>] (do_idle) from [<802b1b38>] (cpu_startup_entry+0x30/0x34) [ 660.354231][ C0] r10:8281aff4 r9:8280c680 r8:823bea70 r7:00000000 r6:deffc06c r5:828222e8 [ 660.354538][ C0] r4:000000ed [ 660.354705][ C0] [<802b1b08>] (cpu_startup_entry) from [<81aaeb7c>] (kernel_init+0x0/0x138) [ 660.355082][ C0] [<81aaea9c>] (rest_init) from [<8260145c>] (start_kernel+0x844/0x860) [ 660.355452][ C0] [<82600c18>] (start_kernel) from [<00000000>] (0x0) [ 660.358310][ C0] Rebooting in 86400 seconds..