last executing test programs: 481.655465ms ago: executing program 1 (id=864): r0 = creat(&(0x7f0000000000)='./file1\x00', 0x87015c5bc9dc15c2) close(r0) r1 = socket$nl_audit(0x10, 0x3, 0x9) dup3(r1, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000000c0)) 393.898537ms ago: executing program 0 (id=866): r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/netlink\x00') close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) dup2(r1, 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_REG(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={0x0}, 0x1, 0x0, 0x0, 0x8000}, 0x0) 393.708357ms ago: executing program 1 (id=867): r0 = socket$nl_route(0x10, 0x3, 0x0) getpeername(r0, &(0x7f0000000200)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, &(0x7f0000000000)=0x80) close(r1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) sendmsg$NL80211_CMD_GET_INTERFACE(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) 281.750643ms ago: executing program 1 (id=868): r0 = epoll_create1(0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = ioctl$TUNGETDEVNETNS(r1, 0x5421, 0x20000000) dup2(r0, r2) epoll_wait(r2, &(0x7f0000000080)=[{}], 0x1, 0x0) 266.238445ms ago: executing program 0 (id=872): r0 = socket$nl_route(0x10, 0x3, 0x0) getpeername(r0, &(0x7f0000000200)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, &(0x7f0000000000)=0x80) close(r1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) sendmsg$NL80211_CMD_GET_INTERFACE(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) 192.278234ms ago: executing program 1 (id=869): r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) r1 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = ioctl$TUNGETDEVNETNS(r1, 0x5450, 0x0) dup2(r0, r2) fsetxattr$trusted_overlay_redirect(r2, &(0x7f0000000040), 0x0, 0x0, 0x1) 192.034784ms ago: executing program 0 (id=870): r0 = creat(&(0x7f0000000000)='./file1\x00', 0x87015c5bc9dc15c2) close(r0) r1 = socket$nl_audit(0x10, 0x3, 0x9) dup3(r1, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000000c0)) 177.796286ms ago: executing program 0 (id=871): mkdirat$cgroup(0xffffffffffffff9c, &(0x7f0000000000)='syz0\x00', 0x1ff) r0 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) close(r0) memfd_create(&(0x7f0000000100)='\xd4\xb4y\x05F%v\xd5\xb2\xe0P(p\xe2\xbd%\x02\xe1\x89|\xe0un\x00\x00\xad\xeb\x7ft\x92\xda\xce\x0f\x89=\xa9\xd8q\'\x00\x00\x00\x00J6h\x11\xf2\xd8f\xbe/\xcdn\xe6\x01\xa7\xfb\x16\xaa\x84\x05A\xa1B\xe1B\x12\xd6\xb7w\xd9\xc4`\x15\xf3\x90\x8e\xe5x\xfe\x93>\x1c\xb1\xde\xf7\xebY;b\xd0[\xed2\x1b\xd0\x80u', 0x0) write$cgroup_pressure(r0, 0x0, 0x0) 93.497158ms ago: executing program 1 (id=873): r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x280241, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='stat\x00') close_range(r0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) sendmsg$NFT_MSG_GETTABLE(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}, 0x1, 0x0, 0x0, 0x80}, 0x45000) 87.387979ms ago: executing program 0 (id=877): mkdirat$cgroup(0xffffffffffffff9c, &(0x7f0000000000)='syz0\x00', 0x1ff) r0 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) close(r0) memfd_create(&(0x7f0000000100)='\xd4\xb4y\x05F%v\xd5\xb2\xe0P(p\xe2\xbd%\x02\xe1\x89|\xe0un\x00\x00\xad\xeb\x7ft\x92\xda\xce\x0f\x89=\xa9\xd8q\'\x00\x00\x00\x00J6h\x11\xf2\xd8f\xbe/\xcdn\xe6\x01\xa7\xfb\x16\xaa\x84\x05A\xa1B\xe1B\x12\xd6\xb7w\xd9\xc4`\x15\xf3\x90\x8e\xe5x\xfe\x93>\x1c\xb1\xde\xf7\xebY;b\xd0[\xed2\x1b\xd0\x80u', 0x0) write$cgroup_pressure(r0, 0x0, 0x0) 260.38µs ago: executing program 0 (id=874): r0 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000000)={'vxcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000380)={0x1d, r1, 0x1, {0x0, 0x0, 0x3}, 0xff}, 0x18) sendmsg$NL80211_CMD_NEW_MPATH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[], 0x28}, 0x1, 0x0, 0x0, 0x4000}, 0x4) sendmsg$DEVLINK_CMD_SB_POOL_GET(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000440)={0x14, 0x0, 0x100, 0x70bd25, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x4010}, 0x4008001) 0s ago: executing program 1 (id=875): r0 = epoll_create1(0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = ioctl$TUNGETDEVNETNS(r1, 0x5421, 0x20000000) dup2(r0, r2) epoll_wait(r2, &(0x7f0000000080)=[{}], 0x1, 0x0) kernel console output (not intermixed with test programs): [ 48.251233][ T29] audit: type=1400 audit(48.190:56): avc: denied { read write } for pid=3093 comm="sftp-server" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 48.251887][ T29] audit: type=1400 audit(48.190:57): avc: denied { open } for pid=3093 comm="sftp-server" path="/dev/null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 Warning: Permanently added '[localhost]:14899' (ED25519) to the list of known hosts. [ 63.978319][ T29] audit: type=1400 audit(63.910:58): avc: denied { name_bind } for pid=3096 comm="sshd-session" src=30000 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 65.590586][ T29] audit: type=1400 audit(65.520:59): avc: denied { execute } for pid=3097 comm="sh" name="syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 65.625469][ T29] audit: type=1400 audit(65.560:60): avc: denied { execute_no_trans } for pid=3097 comm="sh" path="/syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 69.050967][ T29] audit: type=1400 audit(68.990:61): avc: denied { mounton } for pid=3097 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=806 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 69.061004][ T29] audit: type=1400 audit(69.000:62): avc: denied { mount } for pid=3097 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 69.076505][ T3097] cgroup: Unknown subsys name 'net' [ 69.085976][ T29] audit: type=1400 audit(69.020:63): avc: denied { unmount } for pid=3097 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 69.226870][ T3097] cgroup: Unknown subsys name 'cpuset' [ 69.232650][ T3097] cgroup: Unknown subsys name 'hugetlb' [ 69.233523][ T3097] cgroup: Unknown subsys name 'rlimit' [ 69.450817][ T29] audit: type=1400 audit(69.390:64): avc: denied { setattr } for pid=3097 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 69.454148][ T29] audit: type=1400 audit(69.390:65): avc: denied { mounton } for pid=3097 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 69.459639][ T29] audit: type=1400 audit(69.390:66): avc: denied { mount } for pid=3097 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 69.648512][ T3099] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 69.653106][ T29] audit: type=1400 audit(69.590:67): avc: denied { relabelto } for pid=3099 comm="mkswap" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 69.658509][ T29] audit: type=1400 audit(69.590:68): avc: denied { write } for pid=3099 comm="mkswap" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 69.706560][ T29] audit: type=1400 audit(69.640:69): avc: denied { read } for pid=3097 comm="syz-executor" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 69.707217][ T29] audit: type=1400 audit(69.640:70): avc: denied { open } for pid=3097 comm="syz-executor" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 77.322532][ T3097] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 79.366066][ T29] audit: type=1400 audit(79.300:71): avc: denied { execmem } for pid=3100 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 79.424005][ T29] audit: type=1400 audit(79.360:72): avc: denied { read } for pid=3102 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 79.426021][ T29] audit: type=1400 audit(79.360:73): avc: denied { open } for pid=3102 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 79.431836][ T29] audit: type=1400 audit(79.370:74): avc: denied { mounton } for pid=3102 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 79.458562][ T29] audit: type=1400 audit(79.390:76): avc: denied { module_request } for pid=3103 comm="syz-executor" kmod="netdev-nr1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 79.460628][ T29] audit: type=1400 audit(79.390:75): avc: denied { module_request } for pid=3102 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 79.527534][ T29] audit: type=1400 audit(79.460:77): avc: denied { sys_module } for pid=3103 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 80.202965][ T29] audit: type=1400 audit(80.140:78): avc: denied { ioctl } for pid=3102 comm="syz-executor" path="/dev/net/tun" dev="devtmpfs" ino=677 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 81.283125][ T3102] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 81.304131][ T3102] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 81.354178][ T3103] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 81.362040][ T3103] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 82.115169][ T3103] hsr_slave_0: entered promiscuous mode [ 82.120536][ T3103] hsr_slave_1: entered promiscuous mode [ 82.145320][ T3102] hsr_slave_0: entered promiscuous mode [ 82.148018][ T3102] hsr_slave_1: entered promiscuous mode [ 82.152927][ T3102] debugfs: 'hsr0' already exists in 'hsr' [ 82.154090][ T3102] Cannot create hsr debugfs directory [ 82.643403][ T29] audit: type=1400 audit(82.580:79): avc: denied { create } for pid=3103 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 82.646238][ T29] audit: type=1400 audit(82.580:80): avc: denied { write } for pid=3103 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 82.654521][ T3103] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 82.666443][ T3103] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 82.683344][ T3103] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 82.702173][ T3103] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 82.773256][ T3102] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 82.793243][ T3102] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 82.802539][ T3102] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 82.815754][ T3102] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 83.452093][ T3103] 8021q: adding VLAN 0 to HW filter on device bond0 [ 83.545743][ T3102] 8021q: adding VLAN 0 to HW filter on device bond0 [ 86.487604][ T3103] veth0_vlan: entered promiscuous mode [ 86.523581][ T3103] veth1_vlan: entered promiscuous mode [ 86.557061][ T3102] veth0_vlan: entered promiscuous mode [ 86.614251][ T3103] veth0_macvtap: entered promiscuous mode [ 86.618565][ T3102] veth1_vlan: entered promiscuous mode [ 86.631488][ T3103] veth1_macvtap: entered promiscuous mode [ 86.721752][ T1138] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 86.726835][ T1138] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 86.739709][ T1138] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 86.756545][ T1138] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 86.764076][ T3102] veth0_macvtap: entered promiscuous mode [ 86.833639][ T3102] veth1_macvtap: entered promiscuous mode [ 86.907194][ T12] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 86.907838][ T12] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 86.908149][ T12] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 86.908337][ T12] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 86.908537][ T29] kauditd_printk_skb: 1 callbacks suppressed [ 86.908612][ T29] audit: type=1400 audit(86.840:82): avc: denied { mount } for pid=3103 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 86.923548][ T29] audit: type=1400 audit(86.850:83): avc: denied { mounton } for pid=3103 comm="syz-executor" path="/syzkaller.0EvoGP/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 86.957828][ T29] audit: type=1400 audit(86.890:84): avc: denied { mount } for pid=3103 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 87.003081][ T29] audit: type=1400 audit(86.940:85): avc: denied { mounton } for pid=3103 comm="syz-executor" path="/syzkaller.0EvoGP/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 87.010832][ T29] audit: type=1400 audit(86.950:86): avc: denied { mounton } for pid=3103 comm="syz-executor" path="/syzkaller.0EvoGP/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=1007 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 87.028184][ T29] audit: type=1400 audit(86.960:87): avc: denied { unmount } for pid=3103 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 87.038339][ T29] audit: type=1400 audit(86.970:88): avc: denied { mounton } for pid=3103 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=772 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 87.043425][ T29] audit: type=1400 audit(86.980:89): avc: denied { mount } for pid=3103 comm="syz-executor" name="/" dev="gadgetfs" ino=1008 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 87.051819][ T29] audit: type=1400 audit(86.990:90): avc: denied { mount } for pid=3103 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 87.054854][ T29] audit: type=1400 audit(86.990:91): avc: denied { mounton } for pid=3103 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 87.125035][ T3102] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 89.924412][ T3733] Zero length message leads to an empty skb [ 90.016457][ T3735] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=152 sclass=netlink_route_socket pid=3735 comm=syz.0.12 [ 90.472480][ T3749] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=3749 comm=syz.1.18 [ 93.832630][ T3790] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3790 comm=syz.0.36 [ 94.932883][ T3798] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=263 sclass=netlink_audit_socket pid=3798 comm=syz.1.40 [ 95.145341][ T29] kauditd_printk_skb: 15 callbacks suppressed [ 95.150110][ T29] audit: type=1400 audit(95.080:107): avc: denied { create } for pid=3805 comm="syz.1.44" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 95.691485][ T29] audit: type=1400 audit(95.630:108): avc: denied { write } for pid=3819 comm="syz.0.51" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 96.006215][ T29] audit: type=1400 audit(95.940:109): avc: denied { mounton } for pid=3828 comm="syz.0.55" path="/31/file0" dev="tmpfs" ino=178 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 96.046607][ T29] audit: type=1400 audit(95.980:110): avc: denied { unmount } for pid=3102 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 96.959872][ T29] audit: type=1400 audit(96.900:111): avc: denied { create } for pid=3854 comm="syz.1.66" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 96.965844][ T29] audit: type=1400 audit(96.900:112): avc: denied { ioctl } for pid=3854 comm="syz.1.66" path="socket:[3315]" dev="sockfs" ino=3315 ioctlcmd=0x662c scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 98.449198][ T29] audit: type=1400 audit(98.380:113): avc: denied { map_read map_write } for pid=3881 comm="syz.1.78" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 98.453079][ T29] audit: type=1400 audit(98.390:114): avc: denied { prog_load } for pid=3881 comm="syz.1.78" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 98.456150][ T29] audit: type=1400 audit(98.390:115): avc: denied { bpf } for pid=3881 comm="syz.1.78" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 98.466664][ T29] audit: type=1400 audit(98.390:116): avc: denied { perfmon } for pid=3881 comm="syz.1.78" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 102.636033][ T29] kauditd_printk_skb: 1 callbacks suppressed [ 102.649329][ T29] audit: type=1400 audit(102.570:118): avc: denied { write } for pid=3913 comm="syz.0.90" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 105.158963][ T3928] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=3928 comm=syz.1.97 [ 105.950775][ T29] audit: type=1400 audit(105.880:119): avc: denied { execute } for pid=3934 comm="syz.1.101" path=2F6D656D66643AFF2D42D54E49C56A9A707070F00884A26D202864656C6574656429 dev="tmpfs" ino=1030 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 106.551695][ T3938] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=3938 comm=syz.1.102 [ 111.283169][ T29] audit: type=1400 audit(111.220:120): avc: denied { write } for pid=3980 comm="syz.0.123" name="ptype" dev="proc" ino=4026532663 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 113.063395][ T29] audit: type=1400 audit(113.000:121): avc: denied { create } for pid=4010 comm="syz.1.138" anonclass=[userfaultfd] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 113.072198][ T29] audit: type=1400 audit(113.010:122): avc: denied { ioctl } for pid=4010 comm="syz.1.138" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=3570 ioctlcmd=0xaa3f scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 115.135496][ T29] audit: type=1400 audit(115.070:123): avc: denied { read } for pid=4027 comm="syz.0.145" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 119.061341][ T29] audit: type=1400 audit(119.000:124): avc: denied { read } for pid=4063 comm="syz.1.161" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 119.197696][ T29] audit: type=1400 audit(119.130:125): avc: denied { mounton } for pid=4066 comm="syz.0.162" path="/83/file0" dev="fuse" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=chr_file permissive=1 [ 119.286673][ T29] audit: type=1400 audit(119.220:126): avc: denied { create } for pid=4070 comm="syz.0.163" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 119.296451][ T29] audit: type=1400 audit(119.230:127): avc: denied { setopt } for pid=4070 comm="syz.0.163" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 119.298473][ T29] audit: type=1400 audit(119.230:128): avc: denied { ioctl } for pid=4070 comm="syz.0.163" path="socket:[3023]" dev="sockfs" ino=3023 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 119.304796][ T29] audit: type=1400 audit(119.240:129): avc: denied { write } for pid=4070 comm="syz.0.163" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 119.308161][ T29] audit: type=1400 audit(119.240:130): avc: denied { read } for pid=4070 comm="syz.0.163" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 123.583550][ T4152] faux_driver vkms: [drm] Unknown color mode 6; guessing buffer size. [ 123.687423][ T29] audit: type=1400 audit(123.620:131): avc: denied { block_suspend } for pid=4154 comm="syz.0.201" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 123.797184][ T29] audit: type=1400 audit(123.730:132): avc: denied { create } for pid=4163 comm="syz.0.203" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 123.805848][ T29] audit: type=1400 audit(123.740:133): avc: denied { connect } for pid=4163 comm="syz.0.203" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 124.433126][ T4177] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=259 sclass=netlink_tcpdiag_socket pid=4177 comm=syz.0.209 [ 124.792120][ T4185] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4185 comm=syz.0.213 [ 127.011851][ T29] kauditd_printk_skb: 1 callbacks suppressed [ 127.013016][ T29] audit: type=1400 audit(126.910:135): avc: denied { allowed } for pid=4214 comm="syz.1.228" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 131.007971][ T29] audit: type=1400 audit(130.940:136): avc: denied { create } for pid=4234 comm="syz.0.236" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 131.024458][ T29] audit: type=1400 audit(130.960:137): avc: denied { bind } for pid=4234 comm="syz.0.236" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 131.030022][ T29] audit: type=1400 audit(130.970:138): avc: denied { connect } for pid=4234 comm="syz.0.236" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 131.070431][ T29] audit: type=1400 audit(131.000:139): avc: denied { listen } for pid=4234 comm="syz.0.236" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 131.089535][ T29] audit: type=1400 audit(131.010:140): avc: denied { accept } for pid=4234 comm="syz.0.236" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 136.696041][ T29] audit: type=1400 audit(136.630:141): avc: denied { create } for pid=4277 comm="syz.1.255" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 136.737658][ T29] audit: type=1400 audit(136.670:142): avc: denied { create } for pid=4277 comm="syz.1.255" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 136.753129][ T29] audit: type=1400 audit(136.690:143): avc: denied { write } for pid=4277 comm="syz.1.255" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 136.754411][ T4278] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=4278 comm=syz.1.255 [ 139.301623][ T4295] syz.1.264 uses obsolete (PF_INET,SOCK_PACKET) [ 140.582030][ T29] audit: type=1400 audit(140.520:144): avc: denied { create } for pid=4314 comm="syz.1.271" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 141.824681][ T4327] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4327 comm=syz.1.277 [ 143.874654][ T29] audit: type=1400 audit(143.810:145): avc: denied { read } for pid=4342 comm="syz.1.284" path="socket:[5176]" dev="sockfs" ino=5176 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 144.051590][ T29] audit: type=1400 audit(143.990:146): avc: denied { map } for pid=4348 comm="syz.0.286" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=4498 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 144.052434][ T29] audit: type=1400 audit(143.990:147): avc: denied { read write } for pid=4348 comm="syz.0.286" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=4498 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 146.027474][ T29] audit: type=1400 audit(145.960:148): avc: denied { sqpoll } for pid=4368 comm="syz.1.295" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 150.244497][ T29] audit: type=1400 audit(150.180:149): avc: denied { read } for pid=4411 comm="syz.1.312" path="socket:[5225]" dev="sockfs" ino=5225 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 151.255694][ T29] audit: type=1400 audit(151.190:150): avc: denied { write } for pid=4411 comm="syz.1.312" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 151.257570][ T4416] netlink: 300 bytes leftover after parsing attributes in process `syz.1.312'. [ 154.184290][ T4494] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4494 comm=syz.1.354 [ 168.685448][ T4570] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4570 comm=syz.0.384 [ 169.502339][ T29] audit: type=1400 audit(169.440:151): avc: denied { create } for pid=4579 comm="syz.0.389" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 169.514770][ T29] audit: type=1400 audit(169.450:152): avc: denied { write } for pid=4579 comm="syz.0.389" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 177.800294][ T4680] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4680 comm=syz.1.436 [ 182.562349][ T4776] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4776 comm=syz.1.482 [ 183.623537][ T29] audit: type=1400 audit(183.560:153): avc: denied { create } for pid=4787 comm="syz.0.488" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 183.626932][ T29] audit: type=1400 audit(183.560:154): avc: denied { ioctl } for pid=4787 comm="syz.0.488" path="socket:[6366]" dev="sockfs" ino=6366 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 184.451524][ T29] audit: type=1400 audit(184.390:155): avc: denied { ioctl } for pid=4798 comm="syz.0.493" path="socket:[6375]" dev="sockfs" ino=6375 ioctlcmd=0x5002 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 184.615095][ T29] audit: type=1400 audit(184.550:156): avc: denied { watch } for pid=4802 comm="syz.0.495" path="/235" dev="tmpfs" ino=1238 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 189.915164][ T29] audit: type=1400 audit(189.850:157): avc: denied { append } for pid=4870 comm="syz.1.526" name="nvme-fabrics" dev="devtmpfs" ino=665 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 192.900487][ T4889] capability: warning: `syz.1.534' uses 32-bit capabilities (legacy support in use) [ 206.664072][ T29] audit: type=1400 audit(206.600:158): avc: denied { mount } for pid=5027 comm="syz.1.594" name="/" dev="bpf" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bpf_t tclass=filesystem permissive=1 [ 206.968334][ T29] audit: type=1400 audit(206.900:159): avc: denied { mounton } for pid=5032 comm="syz.1.596" path="/313/file0" dev="bpf" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bpf_t tclass=dir permissive=1 [ 206.989500][ T29] audit: type=1400 audit(206.920:160): avc: denied { unmount } for pid=3103 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bpf_t tclass=filesystem permissive=1 [ 212.559450][ T29] audit: type=1400 audit(212.490:161): avc: denied { unmount } for pid=3102 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 213.741508][ T5130] process 'syz.1.641' launched '/dev/fd/3/./file1' with NULL argv: empty string added [ 213.743857][ T29] audit: type=1400 audit(213.680:162): avc: denied { execute_no_trans } for pid=5129 comm="syz.1.641" path="/file1" dev="tmpfs" ino=1777 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 214.938483][ T5134] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5134 comm=syz.1.643 [ 215.681149][ T29] audit: type=1400 audit(215.620:163): avc: denied { read write } for pid=5153 comm="syz.0.653" name="binder0" dev="binder" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 215.682371][ T29] audit: type=1400 audit(215.620:164): avc: denied { ioctl open } for pid=5153 comm="syz.0.653" path="/dev/binderfs/binder0" dev="binder" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 215.692527][ T29] audit: type=1400 audit(215.630:165): avc: denied { map } for pid=5153 comm="syz.0.653" path="/dev/binderfs/binder0" dev="binder" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 215.694087][ T5154] binder: binder_mmap: 5153 20000000-20b36000 bad vm_flags failed -1 [ 215.697349][ T5154] binder: 5153:5154 ioctl c018620c 0 returned -14 [ 217.342433][ T5181] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5181 comm=syz.0.666 [ 217.614870][ T5189] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5189 comm=syz.1.670 [ 222.866449][ T5239] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5239 comm=syz.0.692 [ 224.255942][ T29] audit: type=1400 audit(224.190:166): avc: denied { mount } for pid=5248 comm="syz.0.697" name="/" dev="ramfs" ino=7141 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 224.314242][ T29] audit: type=1400 audit(224.240:167): avc: denied { getopt } for pid=5250 comm="syz.1.698" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 225.080940][ T5277] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5277 comm=syz.0.711 [ 225.120594][ T29] audit: type=1400 audit(225.060:168): avc: denied { remount } for pid=5278 comm="syz.1.712" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 226.774244][ T5307] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5307 comm=syz.0.725 [ 231.129229][ T5345] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2561 sclass=netlink_route_socket pid=5345 comm=syz.0.744 [ 234.314433][ T29] audit: type=1400 audit(234.250:169): avc: denied { setopt } for pid=5382 comm="syz.0.762" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 235.159971][ T29] audit: type=1400 audit(235.100:170): avc: denied { write } for pid=5410 comm="syz.0.775" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 235.211590][ T5415] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5415 comm=syz.0.776 [ 242.774222][ T29] audit: type=1400 audit(242.710:171): avc: denied { connect } for pid=5484 comm="syz.0.807" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 246.666922][ T5520] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5520 comm=syz.1.824 [ 248.128470][ T5537] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=527 sclass=netlink_audit_socket pid=5537 comm=syz.0.832 [ 249.644070][ T29] audit: type=1400 audit(249.580:172): avc: denied { write } for pid=5565 comm="syz.1.845" path="socket:[8809]" dev="sockfs" ino=8809 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 250.273548][ T5580] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=1795 sclass=netlink_audit_socket pid=5580 comm=syz.1.852 [ 250.352307][ T5582] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=527 sclass=netlink_audit_socket pid=5582 comm=syz.1.853 [ 660.239315][ C0] watchdog: BUG: soft lockup - CPU#0 stuck for 430s! [swapper/0:0] [ 660.240252][ C0] Modules linked in: [ 660.241269][ C0] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Not tainted syzkaller #0 PREEMPT [ 660.241992][ C0] Hardware name: ARM-Versatile Express [ 660.242200][ C0] PC is at _raw_spin_unlock_irq+0x28/0x54 [ 660.242967][ C0] LR is at tmigr_handle_remote_up+0x268/0x4b0 [ 660.243030][ C0] pc : [<81a8bc2c>] lr : [<8034620c>] psr: 60000113 [ 660.243077][ C0] sp : 82801be0 ip : 82801bf0 fp : 82801bec [ 660.243111][ C0] r10: 00000001 r9 : 0000003b r8 : 61919000 [ 660.243151][ C0] r7 : ddddb488 r6 : 82801cb8 r5 : 830bf3b0 r4 : 830bf380 [ 660.243192][ C0] r3 : 000082ba r2 : 00000103 r1 : 830bf3b0 r0 : ddddb488 [ 660.243303][ C0] Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment user [ 660.243386][ C0] Control: 30c5387d Table: 85c62640 DAC: fffffffd [ 660.243538][ C0] Call trace: [ 660.243805][ C0] [<81a8bc04>] (_raw_spin_unlock_irq) from [<8034620c>] (tmigr_handle_remote_up+0x268/0x4b0) [ 660.244162][ C0] [<80345fa4>] (tmigr_handle_remote_up) from [<803444bc>] (__walk_groups_from+0x3c/0xe4) [ 660.244318][ C0] r10:8281b500 r9:8280c820 r8:80345fa4 r7:82801cb8 r6:830bf380 r5:00000002 [ 660.244359][ C0] r4:830bf380 [ 660.244393][ C0] [<80344480>] (__walk_groups_from) from [<80346854>] (tmigr_handle_remote+0xe8/0x108) [ 660.244470][ C0] r9:82804d80 r8:00000102 r7:00000001 r6:00000002 r5:00000002 r4:dddc7488 [ 660.244489][ C0] [<8034676c>] (tmigr_handle_remote) from [<80326a28>] (run_timer_softirq+0x30/0x34) [ 660.244543][ C0] r4:82804084 [ 660.244558][ C0] [<803269f8>] (run_timer_softirq) from [<8025aff8>] (handle_softirqs+0x140/0x458) [ 660.244612][ C0] [<8025aeb8>] (handle_softirqs) from [<8025b46c>] (__irq_exit_rcu+0x110/0x1d0) [ 660.244675][ C0] r10:00000000 r9:8281b500 r8:00000000 r7:82801dd8 r6:824429c8 r5:8247dbec [ 660.244697][ C0] r4:8281b500 [ 660.244713][ C0] [<8025b35c>] (__irq_exit_rcu) from [<8025b7e4>] (irq_exit+0x10/0x18) [ 660.244766][ C0] r5:8247dbec r4:826c2a9c [ 660.244783][ C0] [<8025b7d4>] (irq_exit) from [<81a7d864>] (generic_handle_arch_irq+0x7c/0x80) [ 660.244837][ C0] [<81a7d7e8>] (generic_handle_arch_irq) from [<80200bdc>] (__irq_svc+0x7c/0xbc) [ 660.244966][ C0] Exception stack(0x82801dd8 to 0x82801e20) [ 660.245139][ C0] 1dc0: 00000001 00000000 [ 660.245228][ C0] 1de0: 00001478 00001476 8419fd68 00000004 00000001 8419fd68 84322a88 8419fc40 [ 660.245265][ C0] 1e00: 00000000 82801e3c 82801e28 82801e28 81a8bdbc 81a8bde4 80000013 ffffffff [ 660.245335][ C0] r9:8281b500 r8:84322a88 r7:82801e0c r6:ffffffff r5:80000013 r4:81a8bde4 [ 660.245354][ C0] [<81a8bda4>] (_raw_spin_lock) from [<809c4cb0>] (gpio_mmio_set+0x44/0x80) [ 660.245437][ C0] r5:00000004 r4:8419fc40 [ 660.245454][ C0] [<809c4c6c>] (gpio_mmio_set) from [<809b563c>] (gpiochip_set+0x1c/0x44) [ 660.245519][ C0] r7:00000001 r6:00000000 r5:00000002 r4:84127028 [ 660.245536][ C0] [<809b5620>] (gpiochip_set) from [<809b7e54>] (gpiod_set_raw_value_commit+0x78/0x218) [ 660.245586][ C0] [<809b7ddc>] (gpiod_set_raw_value_commit) from [<809b96f4>] (gpiod_set_value_nocheck+0x44/0x58) [ 660.245646][ C0] r10:00000000 r9:00000000 r8:00000001 r7:dddce4c0 r6:8394e958 r5:00000001 [ 660.245665][ C0] r4:84127028 [ 660.245681][ C0] [<809b96b0>] (gpiod_set_value_nocheck) from [<809b9744>] (gpiod_set_value+0x3c/0x88) [ 660.245726][ C0] [<809b9708>] (gpiod_set_value) from [<809c9dac>] (gpio_led_set+0x5c/0x60) [ 660.245777][ C0] r5:000000ff r4:832f5a24 [ 660.245794][ C0] [<809c9d50>] (gpio_led_set) from [<809c76e8>] (led_set_brightness+0x84/0x90) [ 660.245843][ C0] r5:000000ff r4:832f5a24 [ 660.245860][ C0] [<809c7664>] (led_set_brightness) from [<809c9254>] (led_trigger_event+0x40/0x58) [ 660.245910][ C0] r5:000000ff r4:832f5a24 [ 660.245925][ C0] [<809c9214>] (led_trigger_event) from [<809ca8b0>] (ledtrig_cpu+0xac/0xf4) [ 660.245978][ C0] r7:dddce4c0 r6:00000002 r5:82b15cd8 r4:000001fd [ 660.245993][ C0] [<809ca804>] (ledtrig_cpu) from [<80227758>] (arch_cpu_idle_exit+0x14/0x18) [ 660.246052][ C0] r9:00000000 r8:00000000 r7:8280c710 r6:8281b500 r5:8280c6d0 r4:00000000 [ 660.246071][ C0] [<80227744>] (arch_cpu_idle_exit) from [<802b0f8c>] (do_idle+0x5c/0x2d8) [ 660.246124][ C0] [<802b0f30>] (do_idle) from [<802b1538>] (cpu_startup_entry+0x30/0x34) [ 660.246190][ C0] r10:8281aff4 r9:823bd674 r8:00000000 r7:8280c680 r6:deffc06c r5:828222e8 [ 660.246210][ C0] r4:000000ed [ 660.246225][ C0] [<802b1508>] (cpu_startup_entry) from [<81a7f27c>] (kernel_init+0x0/0x138) [ 660.246282][ C0] [<81a7f19c>] (rest_init) from [<82601338>] (start_kernel+0x738/0x754) [ 660.246383][ C0] [<82600c00>] (start_kernel) from [<00000000>] (0x0) [ 660.247091][ C0] Sending NMI from CPU 0 to CPUs 1: [ 660.248393][ C1] NMI backtrace for cpu 1 [ 660.248577][ C1] CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Not tainted syzkaller #0 PREEMPT [ 660.248630][ C1] Hardware name: ARM-Versatile Express [ 660.248653][ C1] PC is at _raw_spin_lock+0x40/0x58 [ 660.248712][ C1] LR is at _raw_spin_lock+0x18/0x58 [ 660.248742][ C1] pc : [<81a8bde4>] lr : [<81a8bdbc>] psr: 80000113 [ 660.248764][ C1] sp : df805d68 ip : df805d68 fp : df805d7c [ 660.248785][ C1] r10: 81c05458 r9 : 8419fc40 r8 : 84322a88 [ 660.248803][ C1] r7 : 8419fd68 r6 : 00000001 r5 : 00000001 r4 : 8419fd68 [ 660.248825][ C1] r3 : 00001476 r2 : 00001477 r1 : 00000000 r0 : 00000001 [ 660.248848][ C1] Flags: Nzcv IRQs on FIQs on Mode SVC_32 ISA ARM Segment none [ 660.248884][ C1] Control: 30c5387d Table: 852fc000 DAC: 00000000 [ 660.248904][ C1] Call trace: frame pointer underflow [ 660.248993][ C1] [<81a8bda4>] (_raw_spin_lock) from [<809c4cb0>] (gpio_mmio_set+0x44/0x80) [ 660.249068][ C1] r5:00000001 r4:8419fc40 [ 660.249088][ C1] [<809c4c6c>] (gpio_mmio_set) from [<809b563c>] (gpiochip_set+0x1c/0x44) [ 660.249154][ C1] r7:00000001 r6:00000000 r5:00000000 r4:84127000 [ 660.249171][ C1] [<809b5620>] (gpiochip_set) from [<809b7e54>] (gpiod_set_raw_value_commit+0x78/0x218) [ 660.249219][ C1] [<809b7ddc>] (gpiod_set_raw_value_commit) from [<809b96f4>] (gpiod_set_value_nocheck+0x44/0x58) [ 660.249282][ C1] r10:81c05458 r9:df805ebc r8:00000102 r7:ffffee67 r6:00000007 r5:00000001 [ 660.249301][ C1] r4:84127000 [ 660.249316][ C1] [<809b96b0>] (gpiod_set_value_nocheck) from [<809b9744>] (gpiod_set_value+0x3c/0x88) [ 660.249365][ C1] [<809b9708>] (gpiod_set_value) from [<809c9dac>] (gpio_led_set+0x5c/0x60) [ 660.249431][ C1] r5:832f5844 r4:832f5844 [ 660.249449][ C1] [<809c9d50>] (gpio_led_set) from [<809c7658>] (led_set_brightness_nosleep+0x38/0x44) [ 660.249499][ C1] r5:832f5844 r4:83936e4c [ 660.249515][ C1] [<809c7620>] (led_set_brightness_nosleep) from [<809ca6a8>] (led_heartbeat_function+0x84/0x144) [ 660.249562][ C1] [<809ca624>] (led_heartbeat_function) from [<80326398>] (call_timer_fn+0x30/0x220) [ 660.249628][ C1] r7:ffffee67 r6:809ca624 r5:83936e4c r4:83216000 [ 660.249644][ C1] [<80326368>] (call_timer_fn) from [<8032684c>] (__run_timers+0x2c4/0x3f8) [ 660.249708][ C1] r9:df805ebc r8:ffffee67 r7:00000000 r6:809ca624 r5:dddd9f00 r4:83936e4c [ 660.249725][ C1] [<80326588>] (__run_timers) from [<803269e8>] (run_timer_base+0x68/0x78) [ 660.249788][ C1] r10:83216000 r9:82804d80 r8:00000102 r7:00000001 r6:00000082 r5:00000002 [ 660.249808][ C1] r4:dddd9f00 [ 660.249823][ C1] [<80326980>] (run_timer_base) from [<80326a14>] (run_timer_softirq+0x1c/0x34) [ 660.249875][ C1] r4:82804084 [ 660.249890][ C1] [<803269f8>] (run_timer_softirq) from [<8025aff8>] (handle_softirqs+0x140/0x458) [ 660.249947][ C1] [<8025aeb8>] (handle_softirqs) from [<8025b46c>] (__irq_exit_rcu+0x110/0x1d0) [ 660.250013][ C1] r10:00000000 r9:83216000 r8:00000000 r7:df865e08 r6:824429c8 r5:8247dbec [ 660.250031][ C1] r4:83216000 [ 660.250047][ C1] [<8025b35c>] (__irq_exit_rcu) from [<8025b7e4>] (irq_exit+0x10/0x18) [ 660.250106][ C1] r5:8247dbec r4:826c2a9c [ 660.250125][ C1] [<8025b7d4>] (irq_exit) from [<81a7d864>] (generic_handle_arch_irq+0x7c/0x80) [ 660.250187][ C1] [<81a7d7e8>] (generic_handle_arch_irq) from [<81a4d954>] (call_with_stack+0x1c/0x20) [ 660.250259][ C1] r9:83216000 r8:84322a88 r7:df865e3c r6:ffffffff r5:60000013 r4:809c54b0 [ 660.250277][ C1] [<81a4d938>] (call_with_stack) from [<80200bec>] (__irq_svc+0x8c/0xbc) [ 660.250335][ C1] Exception stack(0xdf865e08 to 0xdf865e50) [ 660.250373][ C1] 5e00: e0256008 00000008 00001476 00000000 e0256008 00000008 [ 660.250407][ C1] 5e20: 00000001 8419fd68 84322a88 8419fc40 00000000 df865e6c df865e58 df865e58 [ 660.250445][ C1] 5e40: 809c54ac 809c54b0 60000013 ffffffff [ 660.250467][ C1] [<809c5490>] (gpio_mmio_write32) from [<809c4cd0>] (gpio_mmio_set+0x64/0x80) [ 660.250527][ C1] r5:00000008 r4:8419fc40 [ 660.250545][ C1] [<809c4c6c>] (gpio_mmio_set) from [<809b563c>] (gpiochip_set+0x1c/0x44) [ 660.250610][ C1] r7:00000001 r6:00000000 r5:00000003 r4:8412703c [ 660.250630][ C1] [<809b5620>] (gpiochip_set) from [<809b7e54>] (gpiod_set_raw_value_commit+0x78/0x218) [ 660.250688][ C1] [<809b7ddc>] (gpiod_set_raw_value_commit) from [<809b96f4>] (gpiod_set_value_nocheck+0x44/0x58) [ 660.250753][ C1] r10:00000000 r9:00000000 r8:00000001 r7:ddde24c0 r6:8394e998 r5:00000001 [ 660.250775][ C1] r4:8412703c [ 660.250791][ C1] [<809b96b0>] (gpiod_set_value_nocheck) from [<809b9744>] (gpiod_set_value+0x3c/0x88) [ 660.250839][ C1] [<809b9708>] (gpiod_set_value) from [<809c9dac>] (gpio_led_set+0x5c/0x60) [ 660.250894][ C1] r5:000000ff r4:832f5b14 [ 660.250910][ C1] [<809c9d50>] (gpio_led_set) from [<809c76e8>] (led_set_brightness+0x84/0x90) [ 660.250962][ C1] r5:000000ff r4:832f5b14 [ 660.250979][ C1] [<809c7664>] (led_set_brightness) from [<809c9254>] (led_trigger_event+0x40/0x58) [ 660.251034][ C1] r5:000000ff r4:832f5b14 [ 660.251067][ C1] [<809c9214>] (led_trigger_event) from [<809ca8b0>] (ledtrig_cpu+0xac/0xf4) [ 660.251127][ C1] r7:ddde24c0 r6:00000002 r5:82b15cd8 r4:000000fe [ 660.251146][ C1] [<809ca804>] (ledtrig_cpu) from [<80227758>] (arch_cpu_idle_exit+0x14/0x18) [ 660.251215][ C1] r9:00000000 r8:00000001 r7:8280c710 r6:83216000 r5:8280c6d0 r4:00000001 [ 660.251233][ C1] [<80227744>] (arch_cpu_idle_exit) from [<802b0f8c>] (do_idle+0x5c/0x2d8) [ 660.251291][ C1] [<802b0f30>] (do_idle) from [<802b1538>] (cpu_startup_entry+0x30/0x34) [ 660.251366][ C1] r10:00000000 r9:414fc0f0 r8:80003000 r7:82a7b4a4 r6:83216000 r5:00000001 [ 660.251388][ C1] r4:00000092 [ 660.251406][ C1] [<802b1508>] (cpu_startup_entry) from [<8022f04c>] (secondary_start_kernel+0x128/0x180) [ 660.251483][ C1] [<8022ef24>] (secondary_start_kernel) from [<80220094>] (__enable_mmu+0x0/0xc) [ 660.251548][ C1] r7:82a7b4a4 r6:30c0387d r5:00000000 r4:830b7bc0 [ 660.252682][ C0] Kernel panic - not syncing: softlockup: hung tasks [ 660.286787][ C0] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Tainted: G L syzkaller #0 PREEMPT [ 660.287244][ C0] Tainted: [L]=SOFTLOCKUP [ 660.287453][ C0] Hardware name: ARM-Versatile Express [ 660.287699][ C0] Call trace: [ 660.288006][ C0] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 660.288374][ C0] r7:82295134 r6:8281b500 r5:00000000 r4:822942f8 [ 660.288601][ C0] [<80201b08>] (show_stack) from [<8021ec54>] (dump_stack_lvl+0x54/0x7c) [ 660.288901][ C0] [<8021ec00>] (dump_stack_lvl) from [<8021ec94>] (dump_stack+0x18/0x1c) [ 660.289191][ C0] r5:00000000 r4:82a7bd14 [ 660.289361][ C0] [<8021ec7c>] (dump_stack) from [<802025f8>] (vpanic+0xe0/0x2e8) [ 660.289674][ C0] [<80202518>] (vpanic) from [<80202834>] (trace_suspend_resume+0x0/0xd8) [ 660.289988][ C0] r7:82ac27f0 [ 660.290139][ C0] [<80202800>] (panic) from [<803832ac>] (watchdog_timer_fn+0x2bc/0x330) [ 660.290495][ C0] r3:00000001 r2:00004000 r1:82a7bd1c r0:82295134 [ 660.290705][ C0] [<80382ff0>] (watchdog_timer_fn) from [<80328f8c>] (__hrtimer_run_queues+0x1c4/0x454) [ 660.291075][ C0] r10:8281b500 r9:00000000 r8:dddc7130 r7:80382ff0 r6:dddc7000 r5:dddc7040 [ 660.291360][ C0] r4:dddc75d8 [ 660.291516][ C0] [<80328dc8>] (__hrtimer_run_queues) from [<8032a590>] (hrtimer_interrupt+0x148/0x2bc) [ 660.291896][ C0] r10:b5cd7ca0 r9:dddc7180 r8:dddc7130 r7:00000099 r6:00000003 r5:20000193 [ 660.292185][ C0] r4:dddc7000 [ 660.292380][ C0] [<8032a448>] (hrtimer_interrupt) from [<8131e0c0>] (arch_timer_handler_virt+0x30/0x38) [ 660.292777][ C0] r10:81d0f874 r9:8309e400 r8:00000000 r7:00000000 r6:00000000 r5:82497528 [ 660.293074][ C0] r4:8309de40 [ 660.293553][ C0] [<8131e090>] (arch_timer_handler_virt) from [<802ef110>] (handle_percpu_devid_irq+0x128/0x34c) [ 660.293957][ C0] [<802eefe8>] (handle_percpu_devid_irq) from [<802e82b4>] (handle_irq_desc+0x74/0x84) [ 660.294310][ C0] r10:00000001 r9:8281b500 r8:00000000 r7:df80a00c r6:826c1388 r5:df80a000 [ 660.294627][ C0] r4:8280cc44 [ 660.294784][ C0] [<802e8240>] (handle_irq_desc) from [<802e8330>] (generic_handle_domain_irq+0x18/0x1c) [ 660.295114][ C0] [<802e8318>] (generic_handle_domain_irq) from [<802012c8>] (gic_handle_irq+0x68/0x7c) [ 660.295497][ C0] [<80201260>] (gic_handle_irq) from [<81a7d848>] (generic_handle_arch_irq+0x60/0x80) [ 660.295872][ C0] r7:82801b90 r6:824429c8 r5:8247dbec r4:826c2a9c [ 660.296113][ C0] [<81a7d7e8>] (generic_handle_arch_irq) from [<80200bdc>] (__irq_svc+0x7c/0xbc) [ 660.296488][ C0] Exception stack(0x82801b90 to 0x82801bd8) [ 660.296701][ C0] 1b80: ddddb488 830bf3b0 00000103 000082ba [ 660.296969][ C0] 1ba0: 830bf380 830bf3b0 82801cb8 ddddb488 61919000 0000003b 00000001 82801bec [ 660.297232][ C0] 1bc0: 82801bf0 82801be0 8034620c 81a8bc2c 60000113 ffffffff [ 660.297499][ C0] r9:8281b500 r8:61919000 r7:82801bc4 r6:ffffffff r5:60000113 r4:81a8bc2c [ 660.297751][ C0] [<81a8bc04>] (_raw_spin_unlock_irq) from [<8034620c>] (tmigr_handle_remote_up+0x268/0x4b0) [ 660.298092][ C0] [<80345fa4>] (tmigr_handle_remote_up) from [<803444bc>] (__walk_groups_from+0x3c/0xe4) [ 660.298438][ C0] r10:8281b500 r9:8280c820 r8:80345fa4 r7:82801cb8 r6:830bf380 r5:00000002 [ 660.298709][ C0] r4:830bf380 [ 660.298848][ C0] [<80344480>] (__walk_groups_from) from [<80346854>] (tmigr_handle_remote+0xe8/0x108) [ 660.299183][ C0] r9:82804d80 r8:00000102 r7:00000001 r6:00000002 r5:00000002 r4:dddc7488 [ 660.299458][ C0] [<8034676c>] (tmigr_handle_remote) from [<80326a28>] (run_timer_softirq+0x30/0x34) [ 660.299787][ C0] r4:82804084 [ 660.299921][ C0] [<803269f8>] (run_timer_softirq) from [<8025aff8>] (handle_softirqs+0x140/0x458) [ 660.300269][ C0] [<8025aeb8>] (handle_softirqs) from [<8025b46c>] (__irq_exit_rcu+0x110/0x1d0) [ 660.300600][ C0] r10:00000000 r9:8281b500 r8:00000000 r7:82801dd8 r6:824429c8 r5:8247dbec [ 660.300862][ C0] r4:8281b500 [ 660.301013][ C0] [<8025b35c>] (__irq_exit_rcu) from [<8025b7e4>] (irq_exit+0x10/0x18) [ 660.301312][ C0] r5:8247dbec r4:826c2a9c [ 660.301498][ C0] [<8025b7d4>] (irq_exit) from [<81a7d864>] (generic_handle_arch_irq+0x7c/0x80) [ 660.301816][ C0] [<81a7d7e8>] (generic_handle_arch_irq) from [<80200bdc>] (__irq_svc+0x7c/0xbc) [ 660.302117][ C0] Exception stack(0x82801dd8 to 0x82801e20) [ 660.302321][ C0] 1dc0: 00000001 00000000 [ 660.302609][ C0] 1de0: 00001478 00001476 8419fd68 00000004 00000001 8419fd68 84322a88 8419fc40 [ 660.302905][ C0] 1e00: 00000000 82801e3c 82801e28 82801e28 81a8bdbc 81a8bde4 80000013 ffffffff [ 660.303212][ C0] r9:8281b500 r8:84322a88 r7:82801e0c r6:ffffffff r5:80000013 r4:81a8bde4 [ 660.303488][ C0] [<81a8bda4>] (_raw_spin_lock) from [<809c4cb0>] (gpio_mmio_set+0x44/0x80) [ 660.303823][ C0] r5:00000004 r4:8419fc40 [ 660.304005][ C0] [<809c4c6c>] (gpio_mmio_set) from [<809b563c>] (gpiochip_set+0x1c/0x44) [ 660.304375][ C0] r7:00000001 r6:00000000 r5:00000002 r4:84127028 [ 660.304609][ C0] [<809b5620>] (gpiochip_set) from [<809b7e54>] (gpiod_set_raw_value_commit+0x78/0x218) [ 660.304963][ C0] [<809b7ddc>] (gpiod_set_raw_value_commit) from [<809b96f4>] (gpiod_set_value_nocheck+0x44/0x58) [ 660.305377][ C0] r10:00000000 r9:00000000 r8:00000001 r7:dddce4c0 r6:8394e958 r5:00000001 [ 660.305676][ C0] r4:84127028 [ 660.305824][ C0] [<809b96b0>] (gpiod_set_value_nocheck) from [<809b9744>] (gpiod_set_value+0x3c/0x88) [ 660.306136][ C0] [<809b9708>] (gpiod_set_value) from [<809c9dac>] (gpio_led_set+0x5c/0x60) [ 660.306471][ C0] r5:000000ff r4:832f5a24 [ 660.306644][ C0] [<809c9d50>] (gpio_led_set) from [<809c76e8>] (led_set_brightness+0x84/0x90) [ 660.306940][ C0] r5:000000ff r4:832f5a24 [ 660.307105][ C0] [<809c7664>] (led_set_brightness) from [<809c9254>] (led_trigger_event+0x40/0x58) [ 660.307418][ C0] r5:000000ff r4:832f5a24 [ 660.307587][ C0] [<809c9214>] (led_trigger_event) from [<809ca8b0>] (ledtrig_cpu+0xac/0xf4) [ 660.307965][ C0] r7:dddce4c0 r6:00000002 r5:82b15cd8 r4:000001fd [ 660.308170][ C0] [<809ca804>] (ledtrig_cpu) from [<80227758>] (arch_cpu_idle_exit+0x14/0x18) [ 660.308539][ C0] r9:00000000 r8:00000000 r7:8280c710 r6:8281b500 r5:8280c6d0 r4:00000000 [ 660.308796][ C0] [<80227744>] (arch_cpu_idle_exit) from [<802b0f8c>] (do_idle+0x5c/0x2d8) [ 660.309086][ C0] [<802b0f30>] (do_idle) from [<802b1538>] (cpu_startup_entry+0x30/0x34) [ 660.309390][ C0] r10:8281aff4 r9:823bd674 r8:00000000 r7:8280c680 r6:deffc06c r5:828222e8 [ 660.309663][ C0] r4:000000ed [ 660.309805][ C0] [<802b1508>] (cpu_startup_entry) from [<81a7f27c>] (kernel_init+0x0/0x138) [ 660.310118][ C0] [<81a7f19c>] (rest_init) from [<82601338>] (start_kernel+0x738/0x754) [ 660.310432][ C0] [<82600c00>] (start_kernel) from [<00000000>] (0x0) [ 660.313216][ C0] Rebooting in 86400 seconds..