Warning: Permanently added '[localhost]:51876' (ED25519) to the list of known hosts. 1970/01/01 00:02:54 ignoring optional flag "sandboxArg"="0" 1970/01/01 00:02:54 ignoring optional flag "type"="qemu" 1970/01/01 00:02:58 parsed 1 programs [ 178.848383][ T31] audit: type=1400 audit(178.740:88): avc: denied { unlink } for pid=3547 comm="syz-executor" name="swap-file" dev="vda" ino=812 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 188.606799][ T3547] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k 1970/01/01 00:03:08 executed programs: 0 [ 190.887581][ T3552] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 190.894026][ T3552] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 191.829542][ T3552] hsr_slave_0: entered promiscuous mode [ 191.831165][ T3552] hsr_slave_1: entered promiscuous mode [ 192.701017][ T3552] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 192.716284][ T3552] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 192.727985][ T3552] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 192.741866][ T3552] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 194.471189][ T3552] 8021q: adding VLAN 0 to HW filter on device bond0 [ 202.414153][ T3552] veth0_vlan: entered promiscuous mode [ 202.578711][ T3552] veth1_vlan: entered promiscuous mode [ 202.710728][ T3552] veth0_macvtap: entered promiscuous mode [ 202.824694][ T3552] veth1_macvtap: entered promiscuous mode [ 203.133622][ T3552] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 203.134103][ T3552] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 203.135051][ T3552] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 203.135151][ T3552] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 662.987151][ T32] INFO: task syz-executor.0:3552 blocked for more than 430 seconds. [ 662.988320][ T32] Not tainted 6.16.0-rc3-syzkaller #0 [ 662.989024][ T32] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 662.989296][ T32] task:syz-executor.0 state:D stack:0 pid:3552 tgid:3552 ppid:1 task_flags:0x400140 flags:0x00000005 [ 662.989784][ T32] Call trace: [ 662.991355][ T32] [<81a27b18>] (__schedule) from [<81a28aa0>] (schedule+0x2c/0x130) [ 662.993787][ T32] r10:83786230 r9:dfa39bfc r8:00000002 r7:60000013 r6:dfa39c04 r5:8422bc00 [ 663.001075][ T32] r4:8422bc00 [ 663.003805][ T32] [<81a28a74>] (schedule) from [<81a28e88>] (schedule_preempt_disabled+0x18/0x24) [ 663.006565][ T32] r5:8422bc00 r4:8378622c [ 663.009151][ T32] [<81a28e70>] (schedule_preempt_disabled) from [<81a2b56c>] (__mutex_lock.constprop.0+0x300/0x6f8) [ 663.011267][ T32] [<81a2b26c>] (__mutex_lock.constprop.0) from [<81a2ba38>] (__mutex_lock_slowpath+0x14/0x18) [ 663.013550][ T32] r10:8382f014 r9:80808080 r8:00000001 r7:00000000 r6:84c31220 r5:83786000 [ 663.016634][ T32] r4:84c31220 [ 663.016683][ T32] [<81a2ba24>] (__mutex_lock_slowpath) from [<81a2ba78>] (mutex_lock+0x3c/0x40) [ 663.016778][ T32] [<81a2ba3c>] (mutex_lock) from [<80741100>] (fuse_lock_inode+0x34/0x3c) [ 663.016830][ T32] [<807410cc>] (fuse_lock_inode) from [<80735850>] (fuse_lookup+0x64/0x174) [ 663.016872][ T32] [<807357ec>] (fuse_lookup) from [<80564c18>] (__lookup_slow+0x8c/0x140) [ 663.016922][ T32] r9:80808080 r8:dfa39e60 r7:83786000 r6:00000403 r5:84c2ebb0 r4:84c31220 [ 663.016947][ T32] [<80564b8c>] (__lookup_slow) from [<80568bfc>] (walk_component+0x104/0x170) [ 663.016993][ T32] r9:80808080 r8:00000403 r7:00000002 r6:dfa39e58 r5:83786080 r4:84c2ebb0 [ 663.017051][ T32] [<80568af8>] (walk_component) from [<80568e88>] (link_path_walk+0x220/0x3dc) [ 663.017151][ T32] r9:80808080 r8:2f2f2f2f r7:d0d0d0d0 r6:dfa39e58 r5:fefefeff r4:8382f015 [ 663.017177][ T32] [<80568c68>] (link_path_walk) from [<8056a55c>] (path_openat+0x7c/0x1150) [ 663.017232][ T32] r10:84563d80 r9:8382f000 r8:dfa39e58 r7:dfa39e58 r6:dfa39f20 r5:8382f010 [ 663.017280][ T32] r4:ffffff9c [ 663.017325][ T32] [<8056a4e0>] (path_openat) from [<8056b6dc>] (do_filp_open+0xac/0x148) [ 663.017442][ T32] r10:00000142 r9:8382f000 r8:00000003 r7:dfa39e58 r6:dfa39f20 r5:8422bc00 [ 663.017503][ T32] r4:ffffff9c [ 663.017547][ T32] [<8056b630>] (do_filp_open) from [<805523b8>] (do_sys_openat2+0x90/0xe0) [ 663.017647][ T32] r9:8422bc00 r8:8020029c r7:ffffff9c r6:dfa39f58 r5:8382f000 r4:00000003 [ 663.017693][ T32] [<80552328>] (do_sys_openat2) from [<805527e0>] (sys_openat+0x98/0xd4) [ 663.017886][ T32] r7:00000142 r6:00000000 r5:00093608 r4:ffffff9c [ 663.017940][ T32] [<80552748>] (sys_openat) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 663.018163][ T32] Exception stack(0xdfa39fa8 to 0xdfa39ff0) [ 663.018402][ T32] 9fa0: 00000002 7e9f161c ffffff9c 00093608 000a4800 00000000 [ 663.018600][ T32] 9fc0: 00000002 7e9f161c 00000000 00000142 00140000 00000000 7e9f1670 7e9f1630 [ 663.018665][ T32] 9fe0: 0011c000 7e9f1580 0004b8d4 000502b8 [ 663.018863][ T32] r5:7e9f161c r4:00000002 [ 663.019646][ T32] INFO: task syz-executor.0:3552 is blocked on a mutex likely owned by task syz-executor.0:3955. [ 663.019797][ T32] task:syz-executor.0 state:D stack:0 pid:3955 tgid:3950 ppid:3552 task_flags:0x400140 flags:0x00000005 [ 663.019930][ T32] Call trace: [ 663.020008][ T32] [<81a27b18>] (__schedule) from [<81a28aa0>] (schedule+0x2c/0x130) [ 663.020126][ T32] r10:00000000 r9:dfa0dc8c r8:846bc058 r7:846bc058 r6:dfa0db58 r5:dfa0dbf0 [ 663.020182][ T32] r4:84478c00 [ 663.020233][ T32] [<81a28a74>] (schedule) from [<807301ec>] (__fuse_simple_request+0x348/0x498) [ 663.020407][ T32] r5:dfa0dbf0 r4:846bc000 [ 663.020582][ T32] [<8072fea4>] (__fuse_simple_request) from [<8073562c>] (fuse_lookup_name+0xc0/0x280) [ 663.020679][ T32] r8:8518f300 r7:847c4400 r6:837dfde8 r5:00000001 r4:dfa0dc90 [ 663.020727][ T32] [<8073556c>] (fuse_lookup_name) from [<8073587c>] (fuse_lookup+0x90/0x174) [ 663.020959][ T32] r10:8382b014 r9:00000001 r8:00000001 r7:00000000 r6:837dfdd0 r5:83786000 [ 663.021010][ T32] r4:837dfdd0 [ 663.021053][ T32] [<807357ec>] (fuse_lookup) from [<80564c18>] (__lookup_slow+0x8c/0x140) [ 663.021154][ T32] r9:80808080 r8:dfa0de60 r7:83786000 r6:00000401 r5:84c2ebb0 r4:837dfdd0 [ 663.021280][ T32] [<80564b8c>] (__lookup_slow) from [<80568bfc>] (walk_component+0x104/0x170) [ 663.021386][ T32] r9:80808080 r8:00000401 r7:00000002 r6:dfa0de58 r5:83786080 r4:84c2ebb0 [ 663.021438][ T32] [<80568af8>] (walk_component) from [<80568e88>] (link_path_walk+0x220/0x3dc) [ 663.021543][ T32] r9:80808080 r8:2f2f2f2f r7:d0d0d0d0 r6:dfa0de58 r5:fefefeff r4:8382b015 [ 663.021591][ T32] [<80568c68>] (link_path_walk) from [<8056a55c>] (path_openat+0x7c/0x1150) [ 663.021679][ T32] r10:849ea480 r9:8382b000 r8:dfa0de58 r7:dfa0de58 r6:dfa0df20 r5:8382b010 [ 663.021768][ T32] r4:ffffff9c [ 663.021821][ T32] [<8056a4e0>] (path_openat) from [<8056b6dc>] (do_filp_open+0xac/0x148) [ 663.021917][ T32] r10:00000142 r9:8382b000 r8:00000001 r7:dfa0de58 r6:dfa0df20 r5:84478c00 [ 663.021971][ T32] r4:ffffff9c [ 663.022015][ T32] [<8056b630>] (do_filp_open) from [<805523b8>] (do_sys_openat2+0x90/0xe0) [ 663.022107][ T32] r9:84478c00 r8:8020029c r7:ffffff9c r6:dfa0df58 r5:8382b000 r4:00000005 [ 663.022159][ T32] [<80552328>] (do_sys_openat2) from [<805527e0>] (sys_openat+0x98/0xd4) [ 663.022257][ T32] r7:00000142 r6:00000000 r5:76b06da0 r4:ffffff9c [ 663.022325][ T32] [<80552748>] (sys_openat) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 663.022409][ T32] Exception stack(0xdfa0dfa8 to 0xdfa0dff0) [ 663.022478][ T32] dfa0: 00000002 76b06da0 ffffff9c 76b06da0 00000002 00000000 [ 663.022541][ T32] dfc0: 00000002 76b06da0 00000000 00000142 00000000 6e6e7000 20000240 20000a40 [ 663.022597][ T32] dfe0: 0000005c 76b06d10 00091144 0004ee98 [ 663.022650][ T32] r5:76b06da0 r4:00000002 [ 663.022832][ T32] INFO: task syz-executor.0:3955 blocked for more than 430 seconds. [ 663.022914][ T32] Not tainted 6.16.0-rc3-syzkaller #0 [ 663.022971][ T32] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 663.023017][ T32] task:syz-executor.0 state:D stack:0 pid:3955 tgid:3950 ppid:3552 task_flags:0x400140 flags:0x00000005 [ 663.023114][ T32] Call trace: [ 663.023203][ T32] [<81a27b18>] (__schedule) from [<81a28aa0>] (schedule+0x2c/0x130) [ 663.023306][ T32] r10:00000000 r9:dfa0dc8c r8:846bc058 r7:846bc058 r6:dfa0db58 r5:dfa0dbf0 [ 663.023409][ T32] r4:84478c00 [ 663.023460][ T32] [<81a28a74>] (schedule) from [<807301ec>] (__fuse_simple_request+0x348/0x498) [ 663.023555][ T32] r5:dfa0dbf0 r4:846bc000 [ 663.023600][ T32] [<8072fea4>] (__fuse_simple_request) from [<8073562c>] (fuse_lookup_name+0xc0/0x280) [ 663.023694][ T32] r8:8518f300 r7:847c4400 r6:837dfde8 r5:00000001 r4:dfa0dc90 [ 663.023745][ T32] [<8073556c>] (fuse_lookup_name) from [<8073587c>] (fuse_lookup+0x90/0x174) [ 663.023839][ T32] r10:8382b014 r9:00000001 r8:00000001 r7:00000000 r6:837dfdd0 r5:83786000 [ 663.023890][ T32] r4:837dfdd0 [ 663.023936][ T32] [<807357ec>] (fuse_lookup) from [<80564c18>] (__lookup_slow+0x8c/0x140) [ 663.024033][ T32] r9:80808080 r8:dfa0de60 r7:83786000 r6:00000401 r5:84c2ebb0 r4:837dfdd0 [ 663.024081][ T32] [<80564b8c>] (__lookup_slow) from [<80568bfc>] (walk_component+0x104/0x170) [ 663.024167][ T32] r9:80808080 r8:00000401 r7:00000002 r6:dfa0de58 r5:83786080 r4:84c2ebb0 [ 663.024251][ T32] [<80568af8>] (walk_component) from [<80568e88>] (link_path_walk+0x220/0x3dc) [ 663.024407][ T32] r9:80808080 r8:2f2f2f2f r7:d0d0d0d0 r6:dfa0de58 r5:fefefeff r4:8382b015 [ 663.031971][ T32] [<80568c68>] (link_path_walk) from [<8056a55c>] (path_openat+0x7c/0x1150) [ 663.032359][ T32] r10:849ea480 r9:8382b000 r8:dfa0de58 r7:dfa0de58 r6:dfa0df20 r5:8382b010 [ 663.032409][ T32] r4:ffffff9c [ 663.032482][ T32] [<8056a4e0>] (path_openat) from [<8056b6dc>] (do_filp_open+0xac/0x148) [ 663.032574][ T32] r10:00000142 r9:8382b000 r8:00000001 r7:dfa0de58 r6:dfa0df20 r5:84478c00 [ 663.032620][ T32] r4:ffffff9c [ 663.032662][ T32] [<8056b630>] (do_filp_open) from [<805523b8>] (do_sys_openat2+0x90/0xe0) [ 663.032749][ T32] r9:84478c00 r8:8020029c r7:ffffff9c r6:dfa0df58 r5:8382b000 r4:00000005 [ 663.032794][ T32] [<80552328>] (do_sys_openat2) from [<805527e0>] (sys_openat+0x98/0xd4) [ 663.032885][ T32] r7:00000142 r6:00000000 r5:76b06da0 r4:ffffff9c [ 663.032930][ T32] [<80552748>] (sys_openat) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 663.033011][ T32] Exception stack(0xdfa0dfa8 to 0xdfa0dff0) [ 663.033109][ T32] dfa0: 00000002 76b06da0 ffffff9c 76b06da0 00000002 00000000 [ 663.033181][ T32] dfc0: 00000002 76b06da0 00000000 00000142 00000000 6e6e7000 20000240 20000a40 [ 663.033251][ T32] dfe0: 0000005c 76b06d10 00091144 0004ee98 [ 663.033329][ T32] r5:76b06da0 r4:00000002 [ 663.034003][ T32] NMI backtrace for cpu 0 [ 663.034429][ T32] CPU: 0 UID: 0 PID: 32 Comm: khungtaskd Not tainted 6.16.0-rc3-syzkaller #0 PREEMPT [ 663.034741][ T32] Hardware name: ARM-Versatile Express [ 663.034856][ T32] Call trace: [ 663.034949][ T32] [<80201a00>] (dump_backtrace) from [<80201afc>] (show_stack+0x18/0x1c) [ 663.035014][ T32] r7:00000000 r6:00070013 r5:60070093 r4:82259b04 [ 663.035031][ T32] [<80201ae4>] (show_stack) from [<8021fdf4>] (dump_stack_lvl+0x70/0x7c) [ 663.035083][ T32] [<8021fd84>] (dump_stack_lvl) from [<8021fe18>] (dump_stack+0x18/0x1c) [ 663.035133][ T32] r5:00000000 r4:00000001 [ 663.035147][ T32] [<8021fe00>] (dump_stack) from [<81a11a34>] (nmi_cpu_backtrace+0x160/0x17c) [ 663.035202][ T32] [<81a118d4>] (nmi_cpu_backtrace) from [<81a11b80>] (nmi_trigger_cpumask_backtrace+0x130/0x1d8) [ 663.035319][ T32] r7:00000000 r6:8280c690 r5:8281af40 r4:ffffffff [ 663.035447][ T32] [<81a11a50>] (nmi_trigger_cpumask_backtrace) from [<802304fc>] (arch_trigger_cpumask_backtrace+0x18/0x1c) [ 663.035526][ T32] r9:8280c80c r8:82ab3564 r7:8281bb28 r6:00007f4d r5:8281b508 r4:84b84b0c [ 663.035543][ T32] [<802304e4>] (arch_trigger_cpumask_backtrace) from [<80380e04>] (watchdog+0x4a8/0x74c) [ 663.035603][ T32] [<8038095c>] (watchdog) from [<80285f5c>] (kthread+0x12c/0x280) [ 663.035665][ T32] r10:00000000 r9:00000000 r8:8038095c r7:830cde00 r6:830cde00 r5:83259800 [ 663.035685][ T32] r4:00000001 [ 663.035809][ T32] [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 663.035974][ T32] Exception stack(0xdf8e1fb0 to 0xdf8e1ff8) [ 663.036226][ T32] 1fa0: 00000000 00000000 00000000 00000000 [ 663.036427][ T32] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 663.036552][ T32] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 663.036626][ T32] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 [ 663.036644][ T32] r4:832c8b00 [ 663.040441][ T32] Sending NMI from CPU 0 to CPUs 1: [ 663.042346][ C1] NMI backtrace for cpu 1 [ 663.042632][ C1] CPU: 1 UID: 0 PID: 2806 Comm: pr/ttyAMA0 Not tainted 6.16.0-rc3-syzkaller #0 PREEMPT [ 663.042687][ C1] Hardware name: ARM-Versatile Express [ 663.042741][ C1] PC is at _raw_spin_unlock_irqrestore+0x28/0x54 [ 663.042848][ C1] LR is at pl011_console_device_unlock+0x20/0x24 [ 663.043529][ C1] pc : [<81a31014>] lr : [<80a719d8>] psr: 600e0013 [ 663.043574][ C1] sp : ebaedeb0 ip : ebaedec0 fp : ebaedebc [ 663.043612][ C1] r10: 8295a1cc r9 : 00000001 r8 : 00000000 [ 663.043661][ C1] r7 : 00000117 r6 : 8295a130 r5 : 00000000 r4 : 00000001 [ 663.043704][ C1] r3 : 000002bd r2 : 00000000 r1 : 600e0013 r0 : 84010040 [ 663.043829][ C1] Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment none [ 663.043901][ C1] Control: 30c5387d Table: 846be480 DAC: 00000000 [ 663.043969][ C1] Call trace: [ 663.044021][ C1] [<81a30fec>] (_raw_spin_unlock_irqrestore) from [<80a719d8>] (pl011_console_device_unlock+0x20/0x24) [ 663.044082][ C1] [<80a719b8>] (pl011_console_device_unlock) from [<802e7e64>] (nbcon_emit_one+0x80/0xf8) [ 663.044137][ C1] [<802e7de4>] (nbcon_emit_one) from [<802e8084>] (nbcon_kthread_func+0x1a8/0x2a4) [ 663.044230][ C1] r6:8280c690 r5:84474800 r4:8295a130 [ 663.044255][ C1] [<802e7edc>] (nbcon_kthread_func) from [<80285f5c>] (kthread+0x12c/0x280) [ 663.044330][ C1] r10:00000000 r9:8295a130 r8:802e7edc r7:841ceb80 r6:841ceb80 r5:84474800 [ 663.044349][ C1] r4:00000001 [ 663.044365][ C1] [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 663.044413][ C1] Exception stack(0xebaedfb0 to 0xebaedff8) [ 663.044474][ C1] dfa0: 00000000 00000000 00000000 00000000 [ 663.044508][ C1] dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 663.044534][ C1] dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 663.044568][ C1] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 [ 663.044587][ C1] r4:838a1e80 [ 663.046107][ T32] Kernel panic - not syncing: hung_task: blocked tasks [ 663.078475][ T32] CPU: 0 UID: 0 PID: 32 Comm: khungtaskd Not tainted 6.16.0-rc3-syzkaller #0 PREEMPT [ 663.078987][ T32] Hardware name: ARM-Versatile Express [ 663.079483][ T32] Call trace: [ 663.079849][ T32] [<80201a00>] (dump_backtrace) from [<80201afc>] (show_stack+0x18/0x1c) [ 663.080434][ T32] r7:00000000 r6:8282083c r5:00000000 r4:82259b04 [ 663.080790][ T32] [<80201ae4>] (show_stack) from [<8021fdd8>] (dump_stack_lvl+0x54/0x7c) [ 663.081150][ T32] [<8021fd84>] (dump_stack_lvl) from [<8021fe18>] (dump_stack+0x18/0x1c) [ 663.081574][ T32] r5:00000000 r4:82a6dd18 [ 663.081813][ T32] [<8021fe00>] (dump_stack) from [<80202614>] (panic+0x120/0x374) [ 663.082309][ T32] [<802024f4>] (panic) from [<80380c74>] (watchdog+0x318/0x74c) [ 663.082867][ T32] r3:00000001 r2:00000000 r1:00000000 r0:8225a750 [ 663.083252][ T32] r7:8281bb28 [ 663.083415][ T32] [<8038095c>] (watchdog) from [<80285f5c>] (kthread+0x12c/0x280) [ 663.083769][ T32] r10:00000000 r9:00000000 r8:8038095c r7:830cde00 r6:830cde00 r5:83259800 [ 663.084110][ T32] r4:00000001 [ 663.084287][ T32] [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 663.084666][ T32] Exception stack(0xdf8e1fb0 to 0xdf8e1ff8) [ 663.084957][ T32] 1fa0: 00000000 00000000 00000000 00000000 [ 663.085297][ T32] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 663.085666][ T32] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 663.085983][ T32] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 [ 663.086355][ T32] r4:832c8b00 [ 663.096851][ T32] Rebooting in 86400 seconds..