last executing test programs: 3.671330233s ago: executing program 0 (id=1153): r0 = syz_create_resource$binfmt(&(0x7f0000002f40)='./file1\x00') r1 = openat$binfmt(0xffffff9c, r0, 0x41, 0x1ff) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x5421, &(0x7f0000000440)) 3.604729721s ago: executing program 0 (id=1154): mprotect(&(0x7f0000000000/0x1000)=nil, 0x1000, 0xc) r0 = syz_open_procfs$pagemap(0x0, &(0x7f0000000240)) fcntl$F_GET_FILE_RW_HINT(r0, 0x8, 0x0) 3.523065242s ago: executing program 0 (id=1155): r0 = syz_create_resource$binfmt(&(0x7f00000006c0)='./file0\x00') r1 = openat$binfmt(0xffffff9c, r0, 0x41, 0x1ff) fcntl$setown(r1, 0x8, 0x0) 3.431428664s ago: executing program 0 (id=1156): r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000015c0), 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_LOG_BASE(r0, 0x4008af04, &(0x7f0000000200)=0x0) 3.323610487s ago: executing program 0 (id=1157): r0 = getpid() r1 = syz_pidfd_open(r0, 0x0) ioctl$KDDELIO(r1, 0x5450, 0x0) 443.751054ms ago: executing program 1 (id=1165): r0 = getpid() r1 = syz_pidfd_open(r0, 0x0) fcntl$setownex(r1, 0xf, &(0x7f00000002c0)) 353.337285ms ago: executing program 1 (id=1166): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) sendmsg$NL80211_CMD_GET_MPP(r0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xc0c4}, 0x0) 342.493037ms ago: executing program 0 (id=1170): r0 = socket(0x29, 0x2, 0x0) sendmsg$BATADV_CMD_SET_VLAN(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000002300)={&(0x7f0000000080)=ANY=[], 0x33fe0}, 0x1, 0x0, 0x0, 0x4091}, 0x20000010) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x800) 261.268077ms ago: executing program 1 (id=1167): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) shutdown(r0, 0x0) recvfrom$unix(r0, 0x0, 0x0, 0x40, &(0x7f0000000140)=@abs, 0x20000000) 174.020628ms ago: executing program 1 (id=1168): r0 = openat$selinux_mls(0xffffff9c, &(0x7f0000000080), 0x0, 0x0) pipe(0x0) ioctl$TIOCGPGRP(r0, 0x5450, 0x0) 94.838159ms ago: executing program 1 (id=1169): r0 = syz_create_resource$binfmt(&(0x7f0000001600)='./file0\x00') r1 = openat$binfmt(0xffffff9c, r0, 0x41, 0x1ff) write$P9_RSTATFS(r1, 0x0, 0x0) 0s ago: executing program 1 (id=1171): r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$DCCPDIAG_GETSOCK(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000006280)=ANY=[@ANYBLOB="4c000000140011"], 0x4c}}, 0x0) recvmsg(r0, &(0x7f00000003c0)={0x0, 0x0, 0x0}, 0x0) kernel console output (not intermixed with test programs): syzkaller login: [ 47.578095][ T29] kauditd_printk_skb: 10 callbacks suppressed [ 47.582467][ T29] audit: type=1400 audit(47.490:56): avc: denied { read write } for pid=3088 comm="sftp-server" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 47.582918][ T29] audit: type=1400 audit(47.490:57): avc: denied { open } for pid=3088 comm="sftp-server" path="/dev/null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 Warning: Permanently added '[localhost]:45913' (ED25519) to the list of known hosts. [ 62.896302][ T29] audit: type=1400 audit(62.800:58): avc: denied { name_bind } for pid=3091 comm="sshd-session" src=30000 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 64.944820][ T29] audit: type=1400 audit(64.850:59): avc: denied { execute } for pid=3092 comm="sh" name="syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 65.006115][ T29] audit: type=1400 audit(64.910:60): avc: denied { execute_no_trans } for pid=3092 comm="sh" path="/syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 67.673528][ T29] audit: type=1400 audit(67.580:61): avc: denied { mounton } for pid=3092 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=806 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 67.680685][ T29] audit: type=1400 audit(67.590:62): avc: denied { mount } for pid=3092 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 67.697228][ T3092] cgroup: Unknown subsys name 'net' [ 67.702366][ T29] audit: type=1400 audit(67.610:63): avc: denied { unmount } for pid=3092 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 67.933427][ T3092] cgroup: Unknown subsys name 'cpuset' [ 67.944435][ T3092] cgroup: Unknown subsys name 'hugetlb' [ 67.948341][ T3092] cgroup: Unknown subsys name 'rlimit' [ 68.193970][ T29] audit: type=1400 audit(68.100:64): avc: denied { setattr } for pid=3092 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 68.199020][ T29] audit: type=1400 audit(68.110:65): avc: denied { mounton } for pid=3092 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 68.201978][ T29] audit: type=1400 audit(68.110:66): avc: denied { mount } for pid=3092 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 68.393988][ T3094] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 68.398425][ T29] audit: type=1400 audit(68.310:67): avc: denied { relabelto } for pid=3094 comm="mkswap" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 68.401964][ T29] audit: type=1400 audit(68.310:68): avc: denied { write } for pid=3094 comm="mkswap" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 68.452483][ T29] audit: type=1400 audit(68.360:69): avc: denied { read } for pid=3092 comm="syz-executor" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 68.454778][ T29] audit: type=1400 audit(68.360:70): avc: denied { open } for pid=3092 comm="syz-executor" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 76.829368][ T3092] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 79.074751][ T29] audit: type=1400 audit(78.980:71): avc: denied { execmem } for pid=3095 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 79.152249][ T29] audit: type=1400 audit(79.060:72): avc: denied { read } for pid=3097 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 79.154537][ T29] audit: type=1400 audit(79.060:73): avc: denied { open } for pid=3097 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 79.160802][ T29] audit: type=1400 audit(79.070:74): avc: denied { mounton } for pid=3098 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 79.186259][ T29] audit: type=1400 audit(79.100:75): avc: denied { module_request } for pid=3097 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 79.187875][ T29] audit: type=1400 audit(79.100:76): avc: denied { module_request } for pid=3098 comm="syz-executor" kmod="netdev-nr1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 79.276257][ T29] audit: type=1400 audit(79.170:77): avc: denied { sys_module } for pid=3097 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 79.936706][ T29] audit: type=1400 audit(79.840:78): avc: denied { ioctl } for pid=3097 comm="syz-executor" path="/dev/net/tun" dev="devtmpfs" ino=677 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 81.028876][ T3097] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 81.042265][ T3097] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 81.143450][ T3098] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 81.152261][ T3098] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 81.987561][ T3097] hsr_slave_0: entered promiscuous mode [ 81.990911][ T3097] hsr_slave_1: entered promiscuous mode [ 82.071037][ T3098] hsr_slave_0: entered promiscuous mode [ 82.072599][ T3098] hsr_slave_1: entered promiscuous mode [ 82.081042][ T3098] debugfs: 'hsr0' already exists in 'hsr' [ 82.084602][ T3098] Cannot create hsr debugfs directory [ 82.626747][ T29] audit: type=1400 audit(82.540:79): avc: denied { create } for pid=3097 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 82.628929][ T29] audit: type=1400 audit(82.540:80): avc: denied { write } for pid=3097 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 82.639045][ T3097] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 82.653982][ T3097] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 82.672555][ T3097] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 82.689485][ T3097] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 82.764027][ T3098] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 82.773385][ T3098] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 82.786104][ T3098] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 82.804863][ T3098] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 83.524864][ T3097] 8021q: adding VLAN 0 to HW filter on device bond0 [ 83.708613][ T3098] 8021q: adding VLAN 0 to HW filter on device bond0 [ 86.500643][ T3097] veth0_vlan: entered promiscuous mode [ 86.534528][ T3097] veth1_vlan: entered promiscuous mode [ 86.645070][ T3097] veth0_macvtap: entered promiscuous mode [ 86.672548][ T3097] veth1_macvtap: entered promiscuous mode [ 86.739962][ T3098] veth0_vlan: entered promiscuous mode [ 86.771955][ T1049] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 86.773323][ T1049] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 86.774010][ T1049] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 86.774560][ T1049] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 86.789539][ T3098] veth1_vlan: entered promiscuous mode [ 86.836765][ T3098] veth0_macvtap: entered promiscuous mode [ 86.844148][ T3098] veth1_macvtap: entered promiscuous mode [ 86.964622][ T29] kauditd_printk_skb: 1 callbacks suppressed [ 86.966756][ T29] audit: type=1400 audit(86.860:82): avc: denied { mount } for pid=3097 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 86.976180][ T29] audit: type=1400 audit(86.880:83): avc: denied { mounton } for pid=3097 comm="syz-executor" path="/syzkaller.c3Wjut/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 86.982187][ T29] audit: type=1400 audit(86.890:84): avc: denied { mount } for pid=3097 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 86.992101][ T29] audit: type=1400 audit(86.900:85): avc: denied { mounton } for pid=3097 comm="syz-executor" path="/syzkaller.c3Wjut/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 86.999956][ T2744] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 87.000419][ T29] audit: type=1400 audit(86.910:86): avc: denied { mounton } for pid=3097 comm="syz-executor" path="/syzkaller.c3Wjut/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=2447 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 87.000788][ T2744] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 87.000861][ T2744] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 87.000954][ T2744] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 87.020738][ T29] audit: type=1400 audit(86.930:87): avc: denied { unmount } for pid=3097 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 87.025679][ T29] audit: type=1400 audit(86.930:88): avc: denied { mounton } for pid=3097 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=772 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 87.030720][ T29] audit: type=1400 audit(86.940:89): avc: denied { mount } for pid=3097 comm="syz-executor" name="/" dev="gadgetfs" ino=2448 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 87.037949][ T29] audit: type=1400 audit(86.950:90): avc: denied { mount } for pid=3097 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 87.040956][ T29] audit: type=1400 audit(86.950:91): avc: denied { mounton } for pid=3097 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 87.098263][ T3097] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 88.049948][ T3718] ======================================================= [ 88.049948][ T3718] WARNING: The mand mount option has been deprecated and [ 88.049948][ T3718] and is ignored by this kernel. Remove the mand [ 88.049948][ T3718] option from the mount to silence this warning. [ 88.049948][ T3718] ======================================================= [ 89.090293][ T3752] capability: warning: `syz.1.22' uses 32-bit capabilities (legacy support in use) [ 90.378557][ T3790] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 92.079048][ T29] kauditd_printk_skb: 27 callbacks suppressed [ 92.081229][ T29] audit: type=1400 audit(91.990:119): avc: denied { create } for pid=3803 comm="syz.0.46" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 92.083948][ T29] audit: type=1400 audit(91.990:120): avc: denied { setopt } for pid=3803 comm="syz.0.46" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 92.238245][ T29] audit: type=1400 audit(92.150:121): avc: denied { prog_load } for pid=3807 comm="syz.0.48" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 92.241257][ T29] audit: type=1400 audit(92.150:122): avc: denied { bpf } for pid=3807 comm="syz.0.48" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 92.255791][ T29] audit: type=1400 audit(92.150:123): avc: denied { perfmon } for pid=3807 comm="syz.0.48" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 92.270474][ T29] audit: type=1400 audit(92.180:124): avc: denied { prog_run } for pid=3807 comm="syz.0.48" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 93.570125][ T29] audit: type=1400 audit(93.470:125): avc: denied { ioctl } for pid=3817 comm="syz.1.53" path="socket:[2645]" dev="sockfs" ino=2645 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sock_file permissive=1 [ 95.665225][ T29] audit: type=1400 audit(95.570:126): avc: denied { ioctl } for pid=3845 comm="syz.1.67" path="socket:[2699]" dev="sockfs" ino=2699 ioctlcmd=0x5406 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 97.667620][ T29] audit: type=1400 audit(97.580:127): avc: denied { ioctl } for pid=3865 comm="syz.1.77" path="socket:[3249]" dev="sockfs" ino=3249 ioctlcmd=0x890b scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 99.009083][ T29] audit: type=1400 audit(98.920:128): avc: denied { create } for pid=3877 comm="syz.1.83" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 99.019044][ T29] audit: type=1400 audit(98.930:129): avc: denied { connect } for pid=3877 comm="syz.1.83" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 100.318234][ T29] audit: type=1400 audit(100.230:130): avc: denied { remount } for pid=3910 comm="syz.0.99" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 100.338831][ T29] audit: type=1400 audit(100.250:131): avc: denied { unmount } for pid=3097 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 100.614638][ T29] audit: type=1400 audit(100.520:132): avc: denied { create } for pid=3923 comm="syz.0.106" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 100.624531][ T29] audit: type=1400 audit(100.530:133): avc: denied { write } for pid=3923 comm="syz.0.106" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 101.588081][ T29] audit: type=1400 audit(101.500:134): avc: denied { create } for pid=3963 comm="syz.1.127" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 101.674229][ T29] audit: type=1400 audit(101.580:135): avc: denied { setopt } for pid=3967 comm="syz.0.129" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 105.893845][ T29] audit: type=1400 audit(105.800:136): avc: denied { getopt } for pid=4048 comm="syz.0.167" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 107.770229][ T4130] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4130 comm=syz.0.206 [ 107.860652][ T29] audit: type=1400 audit(107.770:137): avc: denied { write } for pid=4131 comm="syz.0.208" path="socket:[4261]" dev="sockfs" ino=4261 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 109.893859][ T29] audit: type=1400 audit(109.800:138): avc: denied { create } for pid=4208 comm="syz.0.245" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 112.834871][ T29] audit: type=1400 audit(112.740:139): avc: denied { create } for pid=4265 comm="syz.0.273" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 112.848772][ T29] audit: type=1400 audit(112.760:140): avc: denied { bind } for pid=4265 comm="syz.0.273" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 113.362484][ T4279] capability: warning: `syz.0.279' uses deprecated v2 capabilities in a way that may be insecure [ 113.652885][ T4288] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4288 comm=syz.0.283 [ 120.860333][ T29] audit: type=1400 audit(120.770:141): avc: denied { mount } for pid=4341 comm="syz.0.310" name="/" dev="devpts" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:devpts_t tclass=filesystem permissive=1 [ 120.870293][ T29] audit: type=1400 audit(120.780:142): avc: denied { remount } for pid=4341 comm="syz.0.310" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:devpts_t tclass=filesystem permissive=1 [ 120.894344][ T29] audit: type=1400 audit(120.800:143): avc: denied { unmount } for pid=3097 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:devpts_t tclass=filesystem permissive=1 [ 121.277734][ T4350] Zero length message leads to an empty skb [ 122.358860][ T4382] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4382 comm=syz.1.329 [ 122.821550][ T29] audit: type=1400 audit(122.730:144): avc: denied { map } for pid=4398 comm="syz.1.339" path="socket:[4759]" dev="sockfs" ino=4759 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tcp_socket permissive=1 [ 124.131008][ T29] audit: type=1400 audit(124.040:145): avc: denied { ioctl } for pid=4414 comm="syz.0.347" path="socket:[4793]" dev="sockfs" ino=4793 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 124.509859][ T4421] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 126.100497][ T29] audit: type=1400 audit(126.000:146): avc: denied { mounton } for pid=4433 comm="syz.1.356" path="/177/file0" dev="tmpfs" ino=931 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 128.256026][ T29] audit: type=1400 audit(128.160:147): avc: denied { ioctl } for pid=4449 comm="syz.1.364" path="socket:[4871]" dev="sockfs" ino=4871 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 128.256454][ T29] audit: type=1400 audit(128.160:148): avc: denied { setopt } for pid=4449 comm="syz.1.364" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 130.210246][ T29] audit: type=1400 audit(130.120:149): avc: denied { getopt } for pid=4469 comm="syz.1.374" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=socket permissive=1 [ 131.772699][ T4484] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4484 comm=syz.1.380 [ 133.812247][ T29] audit: type=1400 audit(133.720:150): avc: denied { bind } for pid=4523 comm="syz.0.400" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 133.818963][ T29] audit: type=1400 audit(133.730:151): avc: denied { accept } for pid=4523 comm="syz.0.400" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 134.209152][ T29] audit: type=1400 audit(134.120:152): avc: denied { create } for pid=4541 comm="syz.1.409" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 134.220335][ T29] audit: type=1400 audit(134.130:153): avc: denied { write } for pid=4541 comm="syz.1.409" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 134.221661][ T29] audit: type=1400 audit(134.130:154): avc: denied { nlmsg_read } for pid=4541 comm="syz.1.409" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 134.250536][ T29] audit: type=1400 audit(134.160:155): avc: denied { read } for pid=4542 comm="syz.0.410" path="socket:[5011]" dev="sockfs" ino=5011 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 134.966529][ T29] audit: type=1400 audit(134.880:156): avc: denied { allowed } for pid=4571 comm="syz.1.424" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 135.152680][ T29] audit: type=1400 audit(135.060:157): avc: denied { connect } for pid=4577 comm="syz.1.427" lport=255 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 135.368972][ T29] audit: type=1400 audit(135.280:158): avc: denied { unmount } for pid=3097 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 135.731000][ T29] audit: type=1400 audit(135.640:159): avc: denied { associate } for pid=4603 comm="syz.1.439" name="pfkey" scontext=root:object_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 139.077041][ T29] audit: type=1400 audit(138.990:160): avc: denied { write } for pid=4683 comm="syz.0.478" path="socket:[5554]" dev="sockfs" ino=5554 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sock_file permissive=1 [ 139.866719][ T3708] usb 1-1: new high-speed USB device number 2 using dummy_hcd [ 140.018152][ T3708] usb 1-1: Using ep0 maxpacket: 32 [ 140.035132][ T3708] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x1 has invalid wMaxPacketSize 0 [ 140.035889][ T3708] usb 1-1: config 0 interface 0 altsetting 0 bulk endpoint 0x1 has invalid maxpacket 0 [ 140.036184][ T3708] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x82 has invalid wMaxPacketSize 0 [ 140.036221][ T3708] usb 1-1: config 0 interface 0 altsetting 0 bulk endpoint 0x82 has invalid maxpacket 0 [ 140.036299][ T3708] usb 1-1: config 0 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 18 [ 140.036550][ T3708] usb 1-1: New USB device found, idVendor=03f0, idProduct=6c17, bcdDevice= 0.40 [ 140.036592][ T3708] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 140.041636][ T3708] usb 1-1: config 0 descriptor?? [ 140.283719][ T3708] usblp 1-1:0.0: usblp0: USB Bidirectional printer dev 2 if 0 alt 0 proto 3 vid 0x03F0 pid 0x6C17 [ 145.001893][ T29] audit: type=1400 audit(144.910:161): avc: denied { create } for pid=4781 comm="syz.1.523" name="file2" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 145.013256][ T29] audit: type=1400 audit(144.920:162): avc: denied { write } for pid=4781 comm="syz.1.523" name="file2" dev="tmpfs" ino=1620 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 145.018682][ T29] audit: type=1400 audit(144.930:163): avc: denied { open } for pid=4781 comm="syz.1.523" path="/311/file2" dev="tmpfs" ino=1620 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 145.043841][ T29] audit: type=1400 audit(144.950:164): avc: denied { unlink } for pid=3098 comm="syz-executor" name="file2" dev="tmpfs" ino=1620 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 146.437731][ C0] hrtimer: interrupt took 1223312 ns [ 150.312904][ T3705] usb 1-1: USB disconnect, device number 2 [ 150.338352][ T3705] usblp0: removed [ 151.333355][ T29] audit: type=1400 audit(151.240:165): avc: denied { read } for pid=4833 comm="syz.0.545" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 154.489088][ T29] audit: type=1400 audit(154.400:166): avc: denied { create } for pid=4851 comm="syz.1.554" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 154.499277][ T29] audit: type=1400 audit(154.410:167): avc: denied { write } for pid=4851 comm="syz.1.554" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 154.630265][ T29] audit: type=1400 audit(154.540:168): avc: denied { read } for pid=4857 comm="syz.0.557" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 155.134294][ T29] audit: type=1400 audit(155.040:169): avc: denied { shutdown } for pid=4857 comm="syz.0.557" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 156.419917][ T4906] netlink: 4083 bytes leftover after parsing attributes in process `syz.0.579'. [ 162.803300][ T29] audit: type=1400 audit(162.710:170): avc: denied { mount } for pid=4975 comm="syz.0.613" name="/" dev="bpf" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bpf_t tclass=filesystem permissive=1 [ 165.357303][ T29] audit: type=1400 audit(165.270:171): avc: denied { ioctl } for pid=5042 comm="syz.1.644" path="socket:[5935]" dev="sockfs" ino=5935 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 166.239453][ T5078] netlink: 'syz.1.661': attribute type 10 has an invalid length. [ 166.241576][ T5078] netlink: 'syz.1.661': attribute type 27 has an invalid length. [ 166.259006][ T5078] netlink: 4 bytes leftover after parsing attributes in process `syz.1.661'. [ 166.949334][ T3705] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 166.970605][ T3705] hid-generic 0000:0000:0000.0001: hidraw0: HID v0.00 Device [syz0] on syz0 [ 166.977198][ T5108] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5108 comm=syz.1.676 [ 167.828561][ T29] audit: type=1400 audit(167.740:172): avc: denied { connect } for pid=5144 comm="syz.1.692" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 167.852393][ T29] audit: type=1400 audit(167.760:173): avc: denied { shutdown } for pid=5144 comm="syz.1.692" laddr=127.0.0.1 lport=32386 faddr=127.0.0.1 fport=20003 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 169.239016][ T29] audit: type=1400 audit(169.150:174): avc: denied { write } for pid=5184 comm="syz.0.712" path="socket:[7328]" dev="sockfs" ino=7328 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 169.723422][ T29] audit: type=1400 audit(169.630:175): avc: denied { create } for pid=5198 comm="syz.0.719" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 169.738415][ T29] audit: type=1400 audit(169.650:176): avc: denied { setopt } for pid=5198 comm="syz.0.719" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 171.384546][ T29] audit: type=1400 audit(171.290:177): avc: denied { read } for pid=5246 comm="syz.0.743" name="binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 171.387676][ T29] audit: type=1400 audit(171.300:178): avc: denied { open } for pid=5246 comm="syz.0.743" path="/dev/binderfs/binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 172.506211][ T29] audit: type=1400 audit(172.410:179): avc: denied { connect } for pid=5287 comm="syz.1.764" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 172.668641][ T5295] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=1545 sclass=netlink_tcpdiag_socket pid=5295 comm=syz.0.767 [ 173.810727][ T5340] netlink: 'syz.0.790': attribute type 29 has an invalid length. [ 173.811100][ T5340] netlink: 8 bytes leftover after parsing attributes in process `syz.0.790'. [ 174.535195][ T29] audit: type=1400 audit(174.440:180): avc: denied { create } for pid=5368 comm="syz.0.803" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 176.530873][ T5392] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5392 comm=syz.1.813 [ 176.616486][ T29] audit: type=1400 audit(176.530:181): avc: denied { read } for pid=5393 comm="syz.1.814" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 178.627221][ T5447] netlink: 16 bytes leftover after parsing attributes in process `syz.0.839'. [ 178.902809][ T5457] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5457 comm=syz.0.844 [ 178.973549][ T29] audit: type=1400 audit(178.880:182): avc: denied { getopt } for pid=5458 comm="syz.1.845" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 179.123268][ T29] audit: type=1400 audit(179.030:183): avc: denied { getopt } for pid=5464 comm="syz.0.848" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 179.251008][ T29] audit: type=1400 audit(179.160:184): avc: denied { connect } for pid=5468 comm="syz.0.850" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 180.763269][ T5523] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5523 comm=syz.1.876 [ 181.732845][ T5562] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5562 comm=syz.0.895 [ 186.389857][ T5705] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5705 comm=syz.0.966 [ 187.303525][ T5744] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=5134 sclass=netlink_audit_socket pid=5744 comm=syz.1.985 [ 188.552650][ T29] audit: type=1400 audit(188.460:185): avc: denied { map } for pid=5746 comm="syz.1.988" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=9065 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 188.553129][ T29] audit: type=1400 audit(188.460:186): avc: denied { read write } for pid=5746 comm="syz.1.988" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=9065 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 660.305867][ C0] watchdog: BUG: soft lockup - CPU#0 stuck for 430s! [swapper/0:0] [ 660.306142][ C0] Modules linked in: [ 660.307166][ C0] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Tainted: G L syzkaller #0 PREEMPT [ 660.307439][ C0] Tainted: [L]=SOFTLOCKUP [ 660.307485][ C0] Hardware name: ARM-Versatile Express [ 660.307688][ C0] PC is at _raw_spin_unlock_irq+0x28/0x54 [ 660.308421][ C0] LR is at tmigr_handle_remote_up+0x268/0x4b0 [ 660.308476][ C0] pc : [<81abba3c>] lr : [<80346df4>] psr: 60000113 [ 660.308510][ C0] sp : 82801be0 ip : 82801bf0 fp : 82801bec [ 660.308539][ C0] r10: 00000001 r9 : 00000031 r8 : 4588f100 [ 660.308574][ C0] r7 : ddddb488 r6 : 82801cb8 r5 : 830bf3b0 r4 : 830bf380 [ 660.308607][ C0] r3 : 00005265 r2 : 00000103 r1 : 830bf3b0 r0 : ddddb488 [ 660.308711][ C0] Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment user [ 660.308776][ C0] Control: 30c5387d Table: 85ead000 DAC: fffffffd [ 660.308877][ C0] Call trace: [ 660.309115][ C0] [<81abba14>] (_raw_spin_unlock_irq) from [<80346df4>] (tmigr_handle_remote_up+0x268/0x4b0) [ 660.309441][ C0] [<80346b8c>] (tmigr_handle_remote_up) from [<803450a4>] (__walk_groups_from+0x3c/0xe4) [ 660.309548][ C0] r10:8281b500 r9:8280c820 r8:80346b8c r7:82801cb8 r6:830bf380 r5:00000002 [ 660.309586][ C0] r4:830bf380 [ 660.309607][ C0] [<80345068>] (__walk_groups_from) from [<8034743c>] (tmigr_handle_remote+0xe8/0x108) [ 660.309672][ C0] r9:82804d80 r8:00000102 r7:00000001 r6:00000002 r5:00000002 r4:dddc7488 [ 660.309689][ C0] [<80347354>] (tmigr_handle_remote) from [<80327600>] (run_timer_softirq+0x30/0x34) [ 660.309744][ C0] r4:82804084 [ 660.309759][ C0] [<803275d0>] (run_timer_softirq) from [<8025b55c>] (handle_softirqs+0x140/0x458) [ 660.309812][ C0] [<8025b41c>] (handle_softirqs) from [<8025b9d0>] (__irq_exit_rcu+0x110/0x1d0) [ 660.309875][ C0] r10:00000000 r9:8281b500 r8:00000000 r7:82801dd8 r6:82443ff8 r5:8247f12c [ 660.309892][ C0] r4:8281b500 [ 660.309905][ C0] [<8025b8c0>] (__irq_exit_rcu) from [<8025bd48>] (irq_exit+0x10/0x18) [ 660.309956][ C0] r5:8247f12c r4:826c3a9c [ 660.309970][ C0] [<8025bd38>] (irq_exit) from [<81aad664>] (generic_handle_arch_irq+0x7c/0x80) [ 660.310022][ C0] [<81aad5e8>] (generic_handle_arch_irq) from [<80200bdc>] (__irq_svc+0x7c/0xbc) [ 660.310137][ C0] Exception stack(0x82801dd8 to 0x82801e20) [ 660.310330][ C0] 1dc0: 00000001 00000000 [ 660.310380][ C0] 1de0: 0000acfe 0000acfc 84072368 00000004 00000001 84072368 84038688 84072240 [ 660.310410][ C0] 1e00: 00000000 82801e3c 82801e28 82801e28 81abbbcc 81abbc00 80000013 ffffffff [ 660.310476][ C0] r9:8281b500 r8:84038688 r7:82801e0c r6:ffffffff r5:80000013 r4:81abbc00 [ 660.310497][ C0] [<81abbbb4>] (_raw_spin_lock) from [<809c776c>] (gpio_mmio_set+0x44/0x80) [ 660.310570][ C0] r5:00000004 r4:84072240 [ 660.310588][ C0] [<809c7728>] (gpio_mmio_set) from [<809b7f28>] (gpiochip_set+0x1c/0x44) [ 660.310654][ C0] r7:00000001 r6:00000000 r5:00000002 r4:840bfc28 [ 660.310670][ C0] [<809b7f0c>] (gpiochip_set) from [<809ba7f0>] (gpiod_set_raw_value_commit+0x78/0x218) [ 660.310718][ C0] [<809ba778>] (gpiod_set_raw_value_commit) from [<809bc090>] (gpiod_set_value_nocheck+0x44/0x58) [ 660.310776][ C0] r10:00000000 r9:00000000 r8:00000001 r7:dddce4c0 r6:838eaa58 r5:00000001 [ 660.310794][ C0] r4:840bfc28 [ 660.310807][ C0] [<809bc04c>] (gpiod_set_value_nocheck) from [<809bc0e0>] (gpiod_set_value+0x3c/0x88) [ 660.310851][ C0] [<809bc0a4>] (gpiod_set_value) from [<809cc87c>] (gpio_led_set+0x5c/0x60) [ 660.310901][ C0] r5:000000ff r4:84619224 [ 660.310916][ C0] [<809cc820>] (gpio_led_set) from [<809ca1a4>] (led_set_brightness+0x84/0x90) [ 660.310965][ C0] r5:000000ff r4:84619224 [ 660.310979][ C0] [<809ca120>] (led_set_brightness) from [<809cbd24>] (led_trigger_event+0x40/0x58) [ 660.311027][ C0] r5:000000ff r4:84619224 [ 660.311041][ C0] [<809cbce4>] (led_trigger_event) from [<809cd380>] (ledtrig_cpu+0xac/0xf4) [ 660.311094][ C0] r7:dddce4c0 r6:00000002 r5:82b15cd8 r4:000001fd [ 660.311109][ C0] [<809cd2d4>] (ledtrig_cpu) from [<80227a38>] (arch_cpu_idle_exit+0x14/0x18) [ 660.311169][ C0] r9:00000000 r8:00000000 r7:8280c710 r6:8281b500 r5:8280c6d0 r4:00000000 [ 660.311186][ C0] [<80227a24>] (arch_cpu_idle_exit) from [<802b158c>] (do_idle+0x5c/0x2d8) [ 660.311249][ C0] [<802b1530>] (do_idle) from [<802b1b38>] (cpu_startup_entry+0x30/0x34) [ 660.311312][ C0] r10:8281aff4 r9:8280c680 r8:823bec00 r7:00000000 r6:deffc06c r5:828222e8 [ 660.311329][ C0] r4:000000ed [ 660.311343][ C0] [<802b1b08>] (cpu_startup_entry) from [<81aaf07c>] (kernel_init+0x0/0x138) [ 660.311403][ C0] [<81aaef9c>] (rest_init) from [<8260145c>] (start_kernel+0x844/0x860) [ 660.311494][ C0] [<82600c18>] (start_kernel) from [<00000000>] (0x0) [ 660.312181][ C0] Sending NMI from CPU 0 to CPUs 1: [ 660.312937][ C1] NMI backtrace for cpu 1 [ 660.313233][ C1] CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Tainted: G L syzkaller #0 PREEMPT [ 660.313322][ C1] Tainted: [L]=SOFTLOCKUP [ 660.313353][ C1] Hardware name: ARM-Versatile Express [ 660.313376][ C1] PC is at _raw_spin_lock+0x4c/0x58 [ 660.313445][ C1] LR is at _raw_spin_lock+0x18/0x58 [ 660.313481][ C1] pc : [<81abbc00>] lr : [<81abbbcc>] psr: 80000113 [ 660.313508][ C1] sp : df805d68 ip : df805d68 fp : df805d7c [ 660.313533][ C1] r10: 81c05450 r9 : 84072240 r8 : 84038688 [ 660.313554][ C1] r7 : 84072368 r6 : 00000001 r5 : 00000001 r4 : 84072368 [ 660.313579][ C1] r3 : 0000acfc r2 : 0000acfd r1 : 00000000 r0 : 00000001 [ 660.313604][ C1] Flags: Nzcv IRQs on FIQs on Mode SVC_32 ISA ARM Segment none [ 660.313647][ C1] Control: 30c5387d Table: 850fefc0 DAC: 00000000 [ 660.313672][ C1] Call trace: frame pointer underflow [ 660.313775][ C1] [<81abbbb4>] (_raw_spin_lock) from [<809c776c>] (gpio_mmio_set+0x44/0x80) [ 660.313870][ C1] r5:00000001 r4:84072240 [ 660.313892][ C1] [<809c7728>] (gpio_mmio_set) from [<809b7f28>] (gpiochip_set+0x1c/0x44) [ 660.313968][ C1] r7:00000001 r6:00000000 r5:00000000 r4:840bfc00 [ 660.313988][ C1] [<809b7f0c>] (gpiochip_set) from [<809ba7f0>] (gpiod_set_raw_value_commit+0x78/0x218) [ 660.314055][ C1] [<809ba778>] (gpiod_set_raw_value_commit) from [<809bc090>] (gpiod_set_value_nocheck+0x44/0x58) [ 660.314153][ C1] r10:81c05450 r9:df805ebc r8:00000102 r7:ffffdd78 r6:00000007 r5:00000001 [ 660.314189][ C1] r4:840bfc00 [ 660.314219][ C1] [<809bc04c>] (gpiod_set_value_nocheck) from [<809bc0e0>] (gpiod_set_value+0x3c/0x88) [ 660.314280][ C1] [<809bc0a4>] (gpiod_set_value) from [<809cc87c>] (gpio_led_set+0x5c/0x60) [ 660.314350][ C1] r5:84619044 r4:84619044 [ 660.314371][ C1] [<809cc820>] (gpio_led_set) from [<809ca114>] (led_set_brightness_nosleep+0x38/0x44) [ 660.314436][ C1] r5:84619044 r4:84f3918c [ 660.314457][ C1] [<809ca0dc>] (led_set_brightness_nosleep) from [<809cd178>] (led_heartbeat_function+0x84/0x144) [ 660.314519][ C1] [<809cd0f4>] (led_heartbeat_function) from [<80326f70>] (call_timer_fn+0x30/0x220) [ 660.314601][ C1] r7:ffffdd78 r6:809cd0f4 r5:84f3918c r4:83216000 [ 660.314626][ C1] [<80326f40>] (call_timer_fn) from [<80327424>] (__run_timers+0x2c4/0x3f8) [ 660.314703][ C1] r9:df805ebc r8:ffffdd78 r7:00000000 r6:809cd0f4 r5:dddd9f00 r4:84f3918c [ 660.314728][ C1] [<80327160>] (__run_timers) from [<803275c0>] (run_timer_base+0x68/0x78) [ 660.314803][ C1] r10:83216000 r9:82804d80 r8:00000102 r7:00000001 r6:00000082 r5:00000002 [ 660.314829][ C1] r4:dddd9f00 [ 660.314848][ C1] [<80327558>] (run_timer_base) from [<803275ec>] (run_timer_softirq+0x1c/0x34) [ 660.314912][ C1] r4:82804084 [ 660.314932][ C1] [<803275d0>] (run_timer_softirq) from [<8025b55c>] (handle_softirqs+0x140/0x458) [ 660.314996][ C1] [<8025b41c>] (handle_softirqs) from [<8025b9d0>] (__irq_exit_rcu+0x110/0x1d0) [ 660.315072][ C1] r10:00000000 r9:83216000 r8:00000000 r7:df865e08 r6:82443ff8 r5:8247f12c [ 660.315106][ C1] r4:83216000 [ 660.315124][ C1] [<8025b8c0>] (__irq_exit_rcu) from [<8025bd48>] (irq_exit+0x10/0x18) [ 660.315183][ C1] r5:8247f12c r4:826c3a9c [ 660.315200][ C1] [<8025bd38>] (irq_exit) from [<81aad664>] (generic_handle_arch_irq+0x7c/0x80) [ 660.315270][ C1] [<81aad5e8>] (generic_handle_arch_irq) from [<81a7d614>] (call_with_stack+0x1c/0x20) [ 660.315337][ C1] r9:83216000 r8:84038688 r7:df865e3c r6:ffffffff r5:60000013 r4:809c7f6c [ 660.315357][ C1] [<81a7d5f8>] (call_with_stack) from [<80200bec>] (__irq_svc+0x8c/0xbc) [ 660.315414][ C1] Exception stack(0xdf865e08 to 0xdf865e50) [ 660.315455][ C1] 5e00: e0213008 00000008 0000acfc 00000000 e0213008 00000008 [ 660.315491][ C1] 5e20: 00000001 84072368 84038688 84072240 00000000 df865e6c df865e58 df865e58 [ 660.315517][ C1] 5e40: 809c7f68 809c7f6c 60000013 ffffffff [ 660.315538][ C1] [<809c7f4c>] (gpio_mmio_write32) from [<809c778c>] (gpio_mmio_set+0x64/0x80) [ 660.315605][ C1] r5:00000008 r4:84072240 [ 660.315624][ C1] [<809c7728>] (gpio_mmio_set) from [<809b7f28>] (gpiochip_set+0x1c/0x44) [ 660.315690][ C1] r7:00000001 r6:00000000 r5:00000003 r4:840bfc3c [ 660.315710][ C1] [<809b7f0c>] (gpiochip_set) from [<809ba7f0>] (gpiod_set_raw_value_commit+0x78/0x218) [ 660.315766][ C1] [<809ba778>] (gpiod_set_raw_value_commit) from [<809bc090>] (gpiod_set_value_nocheck+0x44/0x58) [ 660.315827][ C1] r10:00000000 r9:00000000 r8:00000001 r7:ddde24c0 r6:838ea858 r5:00000001 [ 660.315847][ C1] r4:840bfc3c [ 660.315862][ C1] [<809bc04c>] (gpiod_set_value_nocheck) from [<809bc0e0>] (gpiod_set_value+0x3c/0x88) [ 660.315908][ C1] [<809bc0a4>] (gpiod_set_value) from [<809cc87c>] (gpio_led_set+0x5c/0x60) [ 660.315964][ C1] r5:000000ff r4:84619314 [ 660.315981][ C1] [<809cc820>] (gpio_led_set) from [<809ca1a4>] (led_set_brightness+0x84/0x90) [ 660.316059][ C1] r5:000000ff r4:84619314 [ 660.316092][ C1] [<809ca120>] (led_set_brightness) from [<809cbd24>] (led_trigger_event+0x40/0x58) [ 660.316154][ C1] r5:000000ff r4:84619314 [ 660.316176][ C1] [<809cbce4>] (led_trigger_event) from [<809cd380>] (ledtrig_cpu+0xac/0xf4) [ 660.316261][ C1] r7:ddde24c0 r6:00000002 r5:82b15cd8 r4:000000fe [ 660.316283][ C1] [<809cd2d4>] (ledtrig_cpu) from [<80227a38>] (arch_cpu_idle_exit+0x14/0x18) [ 660.316362][ C1] r9:00000000 r8:00000001 r7:8280c710 r6:83216000 r5:8280c6d0 r4:00000001 [ 660.316385][ C1] [<80227a24>] (arch_cpu_idle_exit) from [<802b158c>] (do_idle+0x5c/0x2d8) [ 660.316457][ C1] [<802b1530>] (do_idle) from [<802b1b38>] (cpu_startup_entry+0x30/0x34) [ 660.316537][ C1] r10:00000000 r9:414fc0f0 r8:80003000 r7:82a7b4a4 r6:83216000 r5:00000001 [ 660.316578][ C1] r4:00000092 [ 660.316612][ C1] [<802b1b08>] (cpu_startup_entry) from [<8022f360>] (secondary_start_kernel+0x128/0x194) [ 660.316687][ C1] [<8022f238>] (secondary_start_kernel) from [<80220094>] (__enable_mmu+0x0/0xc) [ 660.316762][ C1] r7:82a7b4a4 r6:30c0387d r5:00000000 r4:830b7bc0 [ 660.318271][ C0] Kernel panic - not syncing: softlockup: hung tasks [ 660.349928][ C0] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Tainted: G L syzkaller #0 PREEMPT [ 660.350330][ C0] Tainted: [L]=SOFTLOCKUP [ 660.350512][ C0] Hardware name: ARM-Versatile Express [ 660.350757][ C0] Call trace: [ 660.351028][ C0] [<80201a74>] (dump_backtrace) from [<80201b70>] (show_stack+0x18/0x1c) [ 660.351382][ C0] r7:82296540 r6:8281b500 r5:00000000 r4:822956f0 [ 660.351595][ C0] [<80201b58>] (show_stack) from [<8021ee08>] (dump_stack_lvl+0x54/0x7c) [ 660.351928][ C0] [<8021edb4>] (dump_stack_lvl) from [<8021ee48>] (dump_stack+0x18/0x1c) [ 660.352276][ C0] r5:00000000 r4:82a7bd14 [ 660.352441][ C0] [<8021ee30>] (dump_stack) from [<80202648>] (vpanic+0xe0/0x2e8) [ 660.352731][ C0] [<80202568>] (vpanic) from [<80202884>] (trace_suspend_resume+0x0/0xd8) [ 660.353036][ C0] r7:82ac27f8 [ 660.353195][ C0] [<80202850>] (panic) from [<80383ecc>] (watchdog_timer_fn+0x2dc/0x350) [ 660.353543][ C0] r3:00000001 r2:00004000 r1:82a7bd1c r0:82296540 [ 660.353756][ C0] [<80383bf0>] (watchdog_timer_fn) from [<80329b64>] (__hrtimer_run_queues+0x1c4/0x454) [ 660.354100][ C0] r10:8281b500 r9:00000000 r8:dddc7130 r7:80383bf0 r6:dddc7000 r5:dddc7040 [ 660.354378][ C0] r4:dddc75d8 [ 660.354511][ C0] [<803299a0>] (__hrtimer_run_queues) from [<8032b168>] (hrtimer_interrupt+0x148/0x2bc) [ 660.354860][ C0] r10:b830e360 r9:dddc7180 r8:dddc7130 r7:00000099 r6:00000003 r5:20000193 [ 660.355123][ C0] r4:dddc7000 [ 660.355266][ C0] [<8032b020>] (hrtimer_interrupt) from [<813405f0>] (arch_timer_handler_virt+0x30/0x38) [ 660.355624][ C0] r10:81d0fc78 r9:8309e400 r8:00000000 r7:00000000 r6:00000000 r5:82498528 [ 660.355891][ C0] r4:8309de40 [ 660.356029][ C0] [<813405c0>] (arch_timer_handler_virt) from [<802ef9b4>] (handle_percpu_devid_irq+0x128/0x34c) [ 660.356422][ C0] [<802ef88c>] (handle_percpu_devid_irq) from [<802e8b44>] (handle_irq_desc+0x74/0x84) [ 660.356773][ C0] r10:00000001 r9:8281b500 r8:00000000 r7:df80a00c r6:826c2388 r5:df80a000 [ 660.357032][ C0] r4:8280cc44 [ 660.357161][ C0] [<802e8ad0>] (handle_irq_desc) from [<802e8bc0>] (generic_handle_domain_irq+0x18/0x1c) [ 660.357505][ C0] [<802e8ba8>] (generic_handle_domain_irq) from [<802012c8>] (gic_handle_irq+0x68/0x7c) [ 660.357840][ C0] [<80201260>] (gic_handle_irq) from [<81aad648>] (generic_handle_arch_irq+0x60/0x80) [ 660.358178][ C0] r7:82801b90 r6:82443ff8 r5:8247f12c r4:826c3a9c [ 660.358394][ C0] [<81aad5e8>] (generic_handle_arch_irq) from [<80200bdc>] (__irq_svc+0x7c/0xbc) [ 660.358712][ C0] Exception stack(0x82801b90 to 0x82801bd8) [ 660.358922][ C0] 1b80: ddddb488 830bf3b0 00000103 00005265 [ 660.359224][ C0] 1ba0: 830bf380 830bf3b0 82801cb8 ddddb488 4588f100 00000031 00000001 82801bec [ 660.359509][ C0] 1bc0: 82801bf0 82801be0 80346df4 81abba3c 60000113 ffffffff [ 660.359745][ C0] r9:8281b500 r8:4588f100 r7:82801bc4 r6:ffffffff r5:60000113 r4:81abba3c [ 660.359991][ C0] [<81abba14>] (_raw_spin_unlock_irq) from [<80346df4>] (tmigr_handle_remote_up+0x268/0x4b0) [ 660.360384][ C0] [<80346b8c>] (tmigr_handle_remote_up) from [<803450a4>] (__walk_groups_from+0x3c/0xe4) [ 660.360814][ C0] r10:8281b500 r9:8280c820 r8:80346b8c r7:82801cb8 r6:830bf380 r5:00000002 [ 660.361120][ C0] r4:830bf380 [ 660.361274][ C0] [<80345068>] (__walk_groups_from) from [<8034743c>] (tmigr_handle_remote+0xe8/0x108) [ 660.361620][ C0] r9:82804d80 r8:00000102 r7:00000001 r6:00000002 r5:00000002 r4:dddc7488 [ 660.361882][ C0] [<80347354>] (tmigr_handle_remote) from [<80327600>] (run_timer_softirq+0x30/0x34) [ 660.362210][ C0] r4:82804084 [ 660.362345][ C0] [<803275d0>] (run_timer_softirq) from [<8025b55c>] (handle_softirqs+0x140/0x458) [ 660.362668][ C0] [<8025b41c>] (handle_softirqs) from [<8025b9d0>] (__irq_exit_rcu+0x110/0x1d0) [ 660.362992][ C0] r10:00000000 r9:8281b500 r8:00000000 r7:82801dd8 r6:82443ff8 r5:8247f12c [ 660.363264][ C0] r4:8281b500 [ 660.363390][ C0] [<8025b8c0>] (__irq_exit_rcu) from [<8025bd48>] (irq_exit+0x10/0x18) [ 660.363733][ C0] r5:8247f12c r4:826c3a9c [ 660.363898][ C0] [<8025bd38>] (irq_exit) from [<81aad664>] (generic_handle_arch_irq+0x7c/0x80) [ 660.364241][ C0] [<81aad5e8>] (generic_handle_arch_irq) from [<80200bdc>] (__irq_svc+0x7c/0xbc) [ 660.364802][ C0] Exception stack(0x82801dd8 to 0x82801e20) [ 660.365115][ C0] 1dc0: 00000001 00000000 [ 660.365410][ C0] 1de0: 0000acfe 0000acfc 84072368 00000004 00000001 84072368 84038688 84072240 [ 660.365686][ C0] 1e00: 00000000 82801e3c 82801e28 82801e28 81abbbcc 81abbc00 80000013 ffffffff [ 660.365960][ C0] r9:8281b500 r8:84038688 r7:82801e0c r6:ffffffff r5:80000013 r4:81abbc00 [ 660.366203][ C0] [<81abbbb4>] (_raw_spin_lock) from [<809c776c>] (gpio_mmio_set+0x44/0x80) [ 660.366516][ C0] r5:00000004 r4:84072240 [ 660.366677][ C0] [<809c7728>] (gpio_mmio_set) from [<809b7f28>] (gpiochip_set+0x1c/0x44) [ 660.366979][ C0] r7:00000001 r6:00000000 r5:00000002 r4:840bfc28 [ 660.367186][ C0] [<809b7f0c>] (gpiochip_set) from [<809ba7f0>] (gpiod_set_raw_value_commit+0x78/0x218) [ 660.367501][ C0] [<809ba778>] (gpiod_set_raw_value_commit) from [<809bc090>] (gpiod_set_value_nocheck+0x44/0x58) [ 660.367810][ C0] r10:00000000 r9:00000000 r8:00000001 r7:dddce4c0 r6:838eaa58 r5:00000001 [ 660.368095][ C0] r4:840bfc28 [ 660.368244][ C0] [<809bc04c>] (gpiod_set_value_nocheck) from [<809bc0e0>] (gpiod_set_value+0x3c/0x88) [ 660.368579][ C0] [<809bc0a4>] (gpiod_set_value) from [<809cc87c>] (gpio_led_set+0x5c/0x60) [ 660.368903][ C0] r5:000000ff r4:84619224 [ 660.369064][ C0] [<809cc820>] (gpio_led_set) from [<809ca1a4>] (led_set_brightness+0x84/0x90) [ 660.369382][ C0] r5:000000ff r4:84619224 [ 660.369532][ C0] [<809ca120>] (led_set_brightness) from [<809cbd24>] (led_trigger_event+0x40/0x58) [ 660.369868][ C0] r5:000000ff r4:84619224 [ 660.370045][ C0] [<809cbce4>] (led_trigger_event) from [<809cd380>] (ledtrig_cpu+0xac/0xf4) [ 660.370410][ C0] r7:dddce4c0 r6:00000002 r5:82b15cd8 r4:000001fd [ 660.370629][ C0] [<809cd2d4>] (ledtrig_cpu) from [<80227a38>] (arch_cpu_idle_exit+0x14/0x18) [ 660.370954][ C0] r9:00000000 r8:00000000 r7:8280c710 r6:8281b500 r5:8280c6d0 r4:00000000 [ 660.371224][ C0] [<80227a24>] (arch_cpu_idle_exit) from [<802b158c>] (do_idle+0x5c/0x2d8) [ 660.371528][ C0] [<802b1530>] (do_idle) from [<802b1b38>] (cpu_startup_entry+0x30/0x34) [ 660.371835][ C0] r10:8281aff4 r9:8280c680 r8:823bec00 r7:00000000 r6:deffc06c r5:828222e8 [ 660.372129][ C0] r4:000000ed [ 660.372269][ C0] [<802b1b08>] (cpu_startup_entry) from [<81aaf07c>] (kernel_init+0x0/0x138) [ 660.372571][ C0] [<81aaef9c>] (rest_init) from [<8260145c>] (start_kernel+0x844/0x860) [ 660.372879][ C0] [<82600c18>] (start_kernel) from [<00000000>] (0x0) [ 660.375473][ C0] Rebooting in 86400 seconds..