last executing test programs: 3.941478458s ago: executing program 0 (id=2124): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0x541b, &(0x7f0000001080)={0xffffffffffffffff}) ioctl$F2FS_IOC_RESERVE_COMPRESS_BLOCKS(r1, 0x5450, 0x0) 3.84290574s ago: executing program 0 (id=2125): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r1 = dup(r0) sendmsg$RDMA_NLDEV_CMD_GET_CHARDEV(r1, &(0x7f0000000a00)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000009c0)={0x0}, 0x1, 0x0, 0x0, 0x10000094}, 0x804) 3.760645511s ago: executing program 0 (id=2127): r0 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) r1 = fcntl$dupfd(r0, 0x0, r0) recvfrom$l2tp(r1, &(0x7f0000000240)=""/43, 0x2b, 0x2020, 0x0, 0x0) 3.664639153s ago: executing program 0 (id=2131): setreuid(0xffffffffffffffff, 0xee01) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$OSF_MSG_REMOVE(r0, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000100)={0x0, 0x268}, 0x1, 0x0, 0x0, 0x1}, 0x4000) 3.612731819s ago: executing program 1 (id=2132): r0 = syz_open_dev$usbfs(&(0x7f0000003f00), 0x1ff, 0xa401) ioctl$USBDEVFS_ALLOW_SUSPEND(r0, 0x5522) ioctl$USBDEVFS_ALLOC_STREAMS(r0, 0x8008551c, &(0x7f0000000140)={0xe021, 0x1, [{0x1, 0x1}]}) 3.513907262s ago: executing program 1 (id=2133): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) sendmsg$NL80211_CMD_FLUSH_PMKSA(r2, &(0x7f0000000900)={&(0x7f0000000780), 0xc, &(0x7f00000008c0)={0x0}}, 0x0) 3.502163274s ago: executing program 0 (id=2134): r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_RX_RING(r0, 0x11b, 0x2, &(0x7f00000004c0)=0x1000000, 0x4) getsockopt$XDP_STATISTICS(r0, 0x11b, 0x7, &(0x7f0000000280), &(0x7f00000002c0)=0x30) 3.442240551s ago: executing program 1 (id=2135): r0 = socket$inet6(0xa, 0x800000000000002, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$TIOCL_BLANKSCREEN(r1, 0x5452, &(0x7f0000000040)) 3.343249664s ago: executing program 1 (id=2136): pipe(&(0x7f0000000100)={0xffffffffffffffff}) openat$selinux_enforce(0xffffff9c, 0x0, 0x202, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(r0, 0x541b, &(0x7f0000000140)={@private0={0xfc, 0x0, '\x00', 0x1}, 0x40037}) 3.229575158s ago: executing program 1 (id=2137): r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nfc(0x0, r0) sendmsg$NFC_CMD_START_POLL(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)={0x14, r1, 0x1, 0x123, 0x234}, 0x14}}, 0x44080) 1.2581ms ago: executing program 0 (id=2138): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000c80)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername(r0, &(0x7f00000000c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000000)=0x80) write$vga_arbiter(r1, 0x0, 0x0) 0s ago: executing program 1 (id=2139): r0 = socket(0x29, 0x2, 0x0) sendmsg$BATADV_CMD_SET_VLAN(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[], 0x33fe0}, 0x1, 0x0, 0x0, 0x40000000}, 0x40041) sendmsg$NL80211_CMD_VENDOR(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}, 0x1, 0x0, 0x0, 0x24040015}, 0x4000000) kernel console output (not intermixed with test programs): [ 48.179829][ T29] audit: type=1400 audit(48.090:56): avc: denied { read write } for pid=3089 comm="sftp-server" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 48.182336][ T29] audit: type=1400 audit(48.090:57): avc: denied { open } for pid=3089 comm="sftp-server" path="/dev/null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 Warning: Permanently added '[localhost]:28226' (ED25519) to the list of known hosts. [ 62.382209][ T29] audit: type=1400 audit(62.290:58): avc: denied { name_bind } for pid=3092 comm="sshd-session" src=30000 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 64.746502][ T29] audit: type=1400 audit(64.650:59): avc: denied { execute } for pid=3093 comm="sh" name="syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 64.808285][ T29] audit: type=1400 audit(64.710:60): avc: denied { execute_no_trans } for pid=3093 comm="sh" path="/syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 67.775243][ T29] audit: type=1400 audit(67.680:61): avc: denied { mounton } for pid=3093 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=806 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 67.779448][ T29] audit: type=1400 audit(67.690:62): avc: denied { mount } for pid=3093 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 67.789722][ T3093] cgroup: Unknown subsys name 'net' [ 67.794824][ T29] audit: type=1400 audit(67.700:63): avc: denied { unmount } for pid=3093 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 67.962276][ T3093] cgroup: Unknown subsys name 'cpuset' [ 67.969751][ T3093] cgroup: Unknown subsys name 'hugetlb' [ 67.970679][ T3093] cgroup: Unknown subsys name 'rlimit' [ 68.172144][ T29] audit: type=1400 audit(68.080:64): avc: denied { setattr } for pid=3093 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 68.175339][ T29] audit: type=1400 audit(68.080:65): avc: denied { mounton } for pid=3093 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 68.178040][ T29] audit: type=1400 audit(68.080:66): avc: denied { mount } for pid=3093 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 68.291783][ T3095] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 68.294450][ T29] audit: type=1400 audit(68.200:67): avc: denied { relabelto } for pid=3095 comm="mkswap" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 68.299566][ T29] audit: type=1400 audit(68.210:68): avc: denied { write } for pid=3095 comm="mkswap" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 68.327294][ T29] audit: type=1400 audit(68.240:69): avc: denied { read } for pid=3093 comm="syz-executor" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 68.329244][ T29] audit: type=1400 audit(68.240:70): avc: denied { open } for pid=3093 comm="syz-executor" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 72.862069][ T3093] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 74.607013][ T29] audit: type=1400 audit(74.520:71): avc: denied { execmem } for pid=3096 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 74.672744][ T29] audit: type=1400 audit(74.580:72): avc: denied { read } for pid=3098 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 74.686450][ T29] audit: type=1400 audit(74.580:73): avc: denied { open } for pid=3098 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 74.686805][ T29] audit: type=1400 audit(74.590:74): avc: denied { mounton } for pid=3098 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 74.704934][ T29] audit: type=1400 audit(74.610:75): avc: denied { module_request } for pid=3098 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 74.786543][ T29] audit: type=1400 audit(74.690:76): avc: denied { sys_module } for pid=3098 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 75.485504][ T29] audit: type=1400 audit(75.390:77): avc: denied { ioctl } for pid=3099 comm="syz-executor" path="/dev/net/tun" dev="devtmpfs" ino=677 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 76.632899][ T3098] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 76.659085][ T3098] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 76.718475][ T3099] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 76.724057][ T3099] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 77.542293][ T3098] hsr_slave_0: entered promiscuous mode [ 77.547897][ T3098] hsr_slave_1: entered promiscuous mode [ 77.649372][ T3099] hsr_slave_0: entered promiscuous mode [ 77.652425][ T3099] hsr_slave_1: entered promiscuous mode [ 77.655511][ T3099] debugfs: 'hsr0' already exists in 'hsr' [ 77.657606][ T3099] Cannot create hsr debugfs directory [ 78.003005][ T29] audit: type=1400 audit(77.910:78): avc: denied { create } for pid=3098 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 78.007519][ T29] audit: type=1400 audit(77.910:79): avc: denied { write } for pid=3098 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 78.011346][ T29] audit: type=1400 audit(77.920:80): avc: denied { read } for pid=3098 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 78.019292][ T3098] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 78.029452][ T3098] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 78.050663][ T3098] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 78.062515][ T3098] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 78.140247][ T3099] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 78.159060][ T3099] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 78.170364][ T3099] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 78.182768][ T3099] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 78.864615][ T3098] 8021q: adding VLAN 0 to HW filter on device bond0 [ 78.957958][ T3099] 8021q: adding VLAN 0 to HW filter on device bond0 [ 81.711071][ T3098] veth0_vlan: entered promiscuous mode [ 81.734483][ T3098] veth1_vlan: entered promiscuous mode [ 81.803751][ T3098] veth0_macvtap: entered promiscuous mode [ 81.818222][ T3098] veth1_macvtap: entered promiscuous mode [ 81.913005][ T56] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 81.916749][ T56] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 81.917869][ T56] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 81.919018][ T56] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 82.057712][ T29] audit: type=1400 audit(81.960:81): avc: denied { mount } for pid=3098 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 82.070870][ T29] audit: type=1400 audit(81.980:82): avc: denied { mounton } for pid=3098 comm="syz-executor" path="/syzkaller.YLhBx5/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 82.078302][ T29] audit: type=1400 audit(81.990:83): avc: denied { mount } for pid=3098 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 82.089669][ T29] audit: type=1400 audit(82.000:84): avc: denied { mounton } for pid=3098 comm="syz-executor" path="/syzkaller.YLhBx5/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 82.094237][ T29] audit: type=1400 audit(82.000:85): avc: denied { mounton } for pid=3098 comm="syz-executor" path="/syzkaller.YLhBx5/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=2473 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 82.116332][ T29] audit: type=1400 audit(82.020:86): avc: denied { unmount } for pid=3098 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 82.122892][ T29] audit: type=1400 audit(82.030:87): avc: denied { mounton } for pid=3098 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=772 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 82.129111][ T29] audit: type=1400 audit(82.040:88): avc: denied { mount } for pid=3098 comm="syz-executor" name="/" dev="gadgetfs" ino=2474 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 82.140344][ T3099] veth0_vlan: entered promiscuous mode [ 82.143886][ T29] audit: type=1400 audit(82.050:89): avc: denied { mount } for pid=3098 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 82.144238][ T29] audit: type=1400 audit(82.050:90): avc: denied { mounton } for pid=3098 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 82.196721][ T3099] veth1_vlan: entered promiscuous mode [ 82.227540][ T3098] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 82.272697][ T3099] veth0_macvtap: entered promiscuous mode [ 82.283941][ T3099] veth1_macvtap: entered promiscuous mode [ 82.383066][ T54] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 82.384542][ T54] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 82.388520][ T54] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 82.389552][ T54] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 86.227464][ T3796] capability: warning: `syz.1.43' uses deprecated v2 capabilities in a way that may be insecure [ 87.548087][ T29] kauditd_printk_skb: 19 callbacks suppressed [ 87.550017][ T29] audit: type=1400 audit(87.450:110): avc: denied { write } for pid=3823 comm="syz.1.57" path="socket:[2705]" dev="sockfs" ino=2705 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sock_file permissive=1 [ 87.667430][ T3826] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3826 comm=syz.1.58 [ 87.858959][ T29] audit: type=1400 audit(87.770:111): avc: denied { allowed } for pid=3829 comm="syz.1.60" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 87.870295][ T29] audit: type=1400 audit(87.780:112): avc: denied { create } for pid=3829 comm="syz.1.60" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 87.872903][ T29] audit: type=1400 audit(87.780:113): avc: denied { map } for pid=3829 comm="syz.1.60" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=3154 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 87.878770][ T29] audit: type=1400 audit(87.780:114): avc: denied { read write } for pid=3829 comm="syz.1.60" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=3154 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 90.640419][ T29] audit: type=1400 audit(90.550:115): avc: denied { write } for pid=3874 comm="syz.0.81" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 91.249200][ T29] audit: type=1400 audit(91.160:116): avc: denied { create } for pid=3876 comm="syz.1.82" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 91.258907][ T29] audit: type=1400 audit(91.170:117): avc: denied { connect } for pid=3876 comm="syz.1.82" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 91.765612][ T29] audit: type=1400 audit(91.670:118): avc: denied { ioctl } for pid=3876 comm="syz.1.82" path="socket:[2813]" dev="sockfs" ino=2813 ioctlcmd=0x891c scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 94.002091][ T29] audit: type=1400 audit(93.910:119): avc: denied { nlmsg_write } for pid=3887 comm="syz.1.87" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 94.701182][ T3903] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3903 comm=syz.1.94 [ 95.983214][ T29] audit: type=1400 audit(95.890:120): avc: denied { append } for pid=3932 comm="syz.1.109" name="001" dev="devtmpfs" ino=689 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 96.120971][ T29] audit: type=1400 audit(96.030:121): avc: denied { create } for pid=3935 comm="syz.1.111" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 96.329300][ T29] audit: type=1400 audit(96.240:122): avc: denied { create } for pid=3944 comm="syz.1.115" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 96.340557][ T29] audit: type=1400 audit(96.250:123): avc: denied { write } for pid=3944 comm="syz.1.115" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 96.341931][ T3945] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=3945 comm=syz.1.115 [ 96.725694][ T29] audit: type=1400 audit(96.630:124): avc: denied { create } for pid=3957 comm="syz.0.122" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 97.269845][ T29] audit: type=1400 audit(97.180:125): avc: denied { setattr } for pid=3979 comm="syz.0.132" name="pfkey" dev="proc" ino=4026532804 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 97.590820][ T3994] Zero length message leads to an empty skb [ 98.484565][ T29] audit: type=1400 audit(98.390:126): avc: denied { write } for pid=4028 comm="syz.1.156" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 98.878090][ T4041] netlink: 'syz.0.162': attribute type 10 has an invalid length. [ 98.879330][ T4041] netlink: 'syz.0.162': attribute type 27 has an invalid length. [ 98.884811][ T4041] netlink: 4 bytes leftover after parsing attributes in process `syz.0.162'. [ 101.257835][ T29] audit: type=1400 audit(101.170:127): avc: denied { read } for pid=4055 comm="syz.1.168" path="socket:[3499]" dev="sockfs" ino=3499 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 102.034868][ T29] audit: type=1400 audit(101.940:128): avc: denied { map } for pid=4077 comm="syz.1.179" path="/dev/nvme-fabrics" dev="devtmpfs" ino=665 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 104.398662][ T29] audit: type=1400 audit(104.310:129): avc: denied { create } for pid=4126 comm="syz.1.200" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 105.348118][ T29] audit: type=1400 audit(105.260:130): avc: denied { setattr } for pid=4147 comm="syz.1.211" name="" dev="pipefs" ino=928 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=1 [ 105.667603][ T29] audit: type=1400 audit(105.580:131): avc: denied { ioctl } for pid=4162 comm="syz.0.218" path="socket:[4326]" dev="sockfs" ino=4326 ioctlcmd=0x8903 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sock_file permissive=1 [ 111.540064][ T29] audit: type=1400 audit(111.450:132): avc: denied { unmount } for pid=3099 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 112.140986][ T29] audit: type=1400 audit(112.050:133): avc: denied { write } for pid=4209 comm="syz.1.241" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 112.334086][ T29] audit: type=1400 audit(112.240:134): avc: denied { create } for pid=4213 comm="syz.1.243" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 112.343002][ T29] audit: type=1400 audit(112.250:135): avc: denied { write } for pid=4213 comm="syz.1.243" path="socket:[3751]" dev="sockfs" ino=3751 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 114.521054][ T29] audit: type=1400 audit(114.430:136): avc: denied { read } for pid=4252 comm="syz.0.262" path="socket:[3846]" dev="sockfs" ino=3846 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 115.499659][ T4291] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 116.149505][ T29] audit: type=1400 audit(116.060:137): avc: denied { write } for pid=4318 comm="syz.0.293" name="arp" dev="proc" ino=4026532748 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 116.564420][ T29] audit: type=1400 audit(116.470:138): avc: denied { ioctl } for pid=4330 comm="syz.0.299" path="socket:[3984]" dev="sockfs" ino=3984 ioctlcmd=0x6205 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 116.631575][ T29] audit: type=1400 audit(116.540:139): avc: denied { execute } for pid=4332 comm="syz.0.300" path="/dev/dsp" dev="devtmpfs" ino=725 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 118.651437][ T4340] capability: warning: `syz.1.303' uses 32-bit capabilities (legacy support in use) [ 119.795003][ T29] audit: type=1400 audit(119.700:140): avc: denied { create } for pid=4375 comm="syz.0.321" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 119.798180][ T29] audit: type=1400 audit(119.700:141): avc: denied { read } for pid=4375 comm="syz.0.321" path="socket:[4613]" dev="sockfs" ino=4613 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 121.245677][ T29] audit: type=1400 audit(121.150:142): avc: denied { prog_load } for pid=4437 comm="syz.1.351" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 121.249288][ T29] audit: type=1400 audit(121.150:143): avc: denied { bpf } for pid=4437 comm="syz.1.351" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 121.269245][ T29] audit: type=1400 audit(121.180:144): avc: denied { prog_run } for pid=4437 comm="syz.1.351" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 122.000811][ T29] audit: type=1400 audit(121.910:145): avc: denied { ioctl } for pid=4447 comm="syz.0.356" path="socket:[5210]" dev="sockfs" ino=5210 ioctlcmd=0xb704 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 122.339220][ T4454] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=4454 comm=syz.1.359 [ 123.322528][ T29] audit: type=1400 audit(123.230:146): avc: denied { getopt } for pid=4463 comm="syz.0.364" lport=1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 128.200756][ T29] audit: type=1400 audit(128.110:147): avc: denied { getopt } for pid=4520 comm="syz.1.392" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 129.945160][ T29] audit: type=1400 audit(129.850:148): avc: denied { setattr } for pid=4585 comm="syz.1.425" name="NETLINK" dev="sockfs" ino=4944 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 130.838973][ T29] audit: type=1400 audit(130.750:149): avc: denied { setopt } for pid=4625 comm="syz.0.445" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 132.170508][ T29] audit: type=1400 audit(132.080:150): avc: denied { ioctl } for pid=4678 comm="syz.1.469" path="socket:[5093]" dev="sockfs" ino=5093 ioctlcmd=0x5451 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 134.923351][ T29] audit: type=1400 audit(134.830:151): avc: denied { create } for pid=4737 comm="syz.0.496" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 135.782475][ T29] audit: type=1400 audit(135.690:152): avc: denied { remount } for pid=4776 comm="syz.1.515" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 135.795626][ T29] audit: type=1400 audit(135.700:153): avc: denied { unmount } for pid=3099 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 135.860622][ T29] audit: type=1400 audit(135.770:154): avc: denied { create } for pid=4780 comm="syz.1.517" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 135.911233][ T4784] syz.1.519 uses obsolete (PF_INET,SOCK_PACKET) [ 135.913721][ T29] audit: type=1400 audit(135.820:155): avc: denied { create } for pid=4783 comm="syz.1.519" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 135.913915][ T29] audit: type=1400 audit(135.820:156): avc: denied { ioctl } for pid=4783 comm="syz.1.519" path="socket:[6299]" dev="sockfs" ino=6299 ioctlcmd=0x8915 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 137.411863][ T29] audit: type=1400 audit(137.320:157): avc: denied { write } for pid=4842 comm="syz.1.548" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 137.422658][ T29] audit: type=1400 audit(137.330:158): avc: denied { read } for pid=4842 comm="syz.1.548" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 145.287925][ T29] audit: type=1400 audit(145.200:159): avc: denied { associate } for pid=4959 comm="syz.1.603" name="pfkey" scontext=root:object_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 148.442233][ T29] audit: type=1400 audit(148.350:160): avc: denied { setopt } for pid=4995 comm="syz.1.620" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 151.855197][ T29] audit: type=1400 audit(151.760:161): avc: denied { read } for pid=5047 comm="syz.0.646" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 153.532731][ T29] audit: type=1400 audit(153.430:162): avc: denied { ioctl } for pid=5070 comm="syz.0.658" path="socket:[6751]" dev="sockfs" ino=6751 ioctlcmd=0x8901 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 156.915262][ T29] audit: type=1400 audit(156.820:163): avc: denied { setopt } for pid=5112 comm="syz.1.678" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 161.319467][ T29] audit: type=1400 audit(161.230:164): avc: denied { connect } for pid=5185 comm="syz.0.713" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 163.402536][ T29] audit: type=1400 audit(163.310:165): avc: denied { ioctl } for pid=5239 comm="syz.1.736" path="socket:[7642]" dev="sockfs" ino=7642 ioctlcmd=0x3b71 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 170.773067][ T5382] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5382 comm=syz.1.801 [ 172.435812][ T5445] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5445 comm=syz.0.832 [ 172.541941][ T29] audit: type=1400 audit(172.450:166): avc: denied { lock } for pid=5448 comm="syz.0.834" path="/dev/vcs" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 172.774253][ T29] audit: type=1400 audit(172.680:167): avc: denied { watch } for pid=5456 comm="syz.0.838" path="/373" dev="tmpfs" ino=1924 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 172.903386][ T5463] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=5134 sclass=netlink_audit_socket pid=5463 comm=syz.0.841 [ 173.027665][ T29] audit: type=1400 audit(172.930:168): avc: denied { remount } for pid=5466 comm="syz.0.843" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 183.369839][ T5643] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5643 comm=syz.0.933 [ 207.482097][ T29] audit: type=1400 audit(207.390:169): avc: denied { map } for pid=6017 comm="syz.1.1112" path="socket:[9207]" dev="sockfs" ino=9207 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tcp_socket permissive=1 [ 221.573457][ T29] audit: type=1400 audit(221.480:170): avc: denied { create } for pid=6216 comm="syz.0.1213" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 244.707748][ T29] audit: type=1400 audit(244.620:171): avc: denied { create } for pid=6610 comm="syz.1.1405" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 250.437752][ T6748] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=6748 comm=syz.0.1468 [ 250.702678][ T6758] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=6758 comm=syz.1.1476 [ 284.307680][ T7154] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 312.523872][ T7373] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=7373 comm=syz.1.1767 [ 312.633153][ T29] audit: type=1400 audit(312.540:172): avc: denied { mounton } for pid=7376 comm="syz.1.1769" path="/915/file0" dev="tmpfs" ino=4702 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 314.944808][ T29] audit: type=1400 audit(314.850:173): avc: denied { bind } for pid=7462 comm="syz.1.1808" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 314.947786][ T29] audit: type=1400 audit(314.850:174): avc: denied { node_bind } for pid=7462 comm="syz.1.1808" saddr=172.20.20.187 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 [ 315.084068][ T29] audit: type=1400 audit(314.990:175): avc: denied { setopt } for pid=7467 comm="syz.1.1810" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 315.594916][ T29] audit: type=1400 audit(315.500:176): avc: denied { getopt } for pid=7467 comm="syz.1.1810" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 316.602283][ T29] audit: type=1400 audit(316.510:177): avc: denied { create } for pid=7491 comm="syz.0.1821" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 316.732867][ T29] audit: type=1400 audit(316.640:178): avc: denied { setopt } for pid=7495 comm="syz.0.1823" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 320.588894][ T7581] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=7581 comm=syz.1.1865 [ 325.955086][ T7681] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7681 comm=syz.0.1911 [ 328.173145][ T29] audit: type=1400 audit(328.080:179): avc: denied { audit_write } for pid=7744 comm="syz.0.1942" capability=29 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 328.565476][ T29] audit: type=1400 audit(328.470:180): avc: denied { setopt } for pid=7764 comm="syz.1.1952" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 332.012837][ T7804] netlink: 'syz.1.1970': attribute type 10 has an invalid length. [ 332.013246][ T7804] netlink: 'syz.1.1970': attribute type 27 has an invalid length. [ 332.021634][ T7804] netlink: 4 bytes leftover after parsing attributes in process `syz.1.1970'. [ 332.260158][ T7812] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=7812 comm=syz.0.1972 [ 332.817993][ T7832] SELinux: syz.1.1984 (7832) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace. [ 346.359676][ T7965] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=7965 comm=syz.0.2045 [ 353.355089][ T8044] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8044 comm=syz.0.2086 [ 792.306175][ C0] watchdog: BUG: soft lockup - CPU#0 stuck for 430s! [swapper/0:0] [ 792.306379][ C0] Modules linked in: [ 792.307361][ C0] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Tainted: G L syzkaller #0 PREEMPT [ 792.307725][ C0] Tainted: [L]=SOFTLOCKUP [ 792.307758][ C0] Hardware name: ARM-Versatile Express [ 792.307914][ C0] PC is at _raw_spin_unlock_irq+0x28/0x54 [ 792.308379][ C0] LR is at tmigr_handle_remote_up+0x268/0x4b0 [ 792.308416][ C0] pc : [<81abbe3c>] lr : [<80346ef4>] psr: 60000113 [ 792.308439][ C0] sp : 82801be0 ip : 82801bf0 fp : 82801bec [ 792.308457][ C0] r10: 00000001 r9 : 00000054 r8 : ee951300 [ 792.308480][ C0] r7 : ddddb488 r6 : 82801cb8 r5 : 830bf3b0 r4 : 830bf380 [ 792.308501][ C0] r3 : 00005b9d r2 : 00000103 r1 : 830bf3b0 r0 : ddddb488 [ 792.308572][ C0] Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment user [ 792.308618][ C0] Control: 30c5387d Table: 84ccf440 DAC: fffffffd [ 792.308681][ C0] Call trace: [ 792.308840][ C0] [<81abbe14>] (_raw_spin_unlock_irq) from [<80346ef4>] (tmigr_handle_remote_up+0x268/0x4b0) [ 792.309058][ C0] [<80346c8c>] (tmigr_handle_remote_up) from [<803451a4>] (__walk_groups_from+0x3c/0xe4) [ 792.309195][ C0] r10:8281b500 r9:8280c820 r8:80346c8c r7:82801cb8 r6:830bf380 r5:00000002 [ 792.309224][ C0] r4:830bf380 [ 792.309239][ C0] [<80345168>] (__walk_groups_from) from [<8034753c>] (tmigr_handle_remote+0xe8/0x108) [ 792.309282][ C0] r9:82804d80 r8:00000102 r7:00000001 r6:00000002 r5:00000002 r4:dddc7488 [ 792.309292][ C0] [<80347454>] (tmigr_handle_remote) from [<80327700>] (run_timer_softirq+0x30/0x34) [ 792.309326][ C0] r4:82804084 [ 792.309334][ C0] [<803276d0>] (run_timer_softirq) from [<8025b65c>] (handle_softirqs+0x140/0x458) [ 792.309365][ C0] [<8025b51c>] (handle_softirqs) from [<8025bad0>] (__irq_exit_rcu+0x110/0x1d0) [ 792.309400][ C0] r10:00000000 r9:8281b500 r8:00000000 r7:82801dd8 r6:82443f98 r5:8247f0cc [ 792.309411][ C0] r4:8281b500 [ 792.309418][ C0] [<8025b9c0>] (__irq_exit_rcu) from [<8025be48>] (irq_exit+0x10/0x18) [ 792.309448][ C0] r5:8247f0cc r4:826c3a9c [ 792.309457][ C0] [<8025be38>] (irq_exit) from [<81aada64>] (generic_handle_arch_irq+0x7c/0x80) [ 792.309487][ C0] [<81aad9e8>] (generic_handle_arch_irq) from [<80200bdc>] (__irq_svc+0x7c/0xbc) [ 792.309566][ C0] Exception stack(0x82801dd8 to 0x82801e20) [ 792.309690][ C0] 1dc0: 00000001 00000000 [ 792.309719][ C0] 1de0: 000086f5 000086f3 8404e368 00000004 00000001 8404e368 842cca88 8404e240 [ 792.309736][ C0] 1e00: 00000000 82801e3c 82801e28 82801e28 81abbfcc 81abc000 80000013 ffffffff [ 792.309778][ C0] r9:8281b500 r8:842cca88 r7:82801e0c r6:ffffffff r5:80000013 r4:81abc000 [ 792.309788][ C0] [<81abbfb4>] (_raw_spin_lock) from [<809c7b2c>] (gpio_mmio_set+0x44/0x80) [ 792.309825][ C0] r5:00000004 r4:8404e240 [ 792.309833][ C0] [<809c7ae8>] (gpio_mmio_set) from [<809b82e8>] (gpiochip_set+0x1c/0x44) [ 792.309879][ C0] r7:00000001 r6:00000000 r5:00000002 r4:842fd9e8 [ 792.309888][ C0] [<809b82cc>] (gpiochip_set) from [<809babb0>] (gpiod_set_raw_value_commit+0x78/0x218) [ 792.309916][ C0] [<809bab38>] (gpiod_set_raw_value_commit) from [<809bc450>] (gpiod_set_value_nocheck+0x44/0x58) [ 792.309948][ C0] r10:00000000 r9:00000000 r8:00000001 r7:dddce4c0 r6:833fa518 r5:00000001 [ 792.309958][ C0] r4:842fd9e8 [ 792.309965][ C0] [<809bc40c>] (gpiod_set_value_nocheck) from [<809bc4a0>] (gpiod_set_value+0x3c/0x88) [ 792.309990][ C0] [<809bc464>] (gpiod_set_value) from [<809ccc3c>] (gpio_led_set+0x5c/0x60) [ 792.310019][ C0] r5:000000ff r4:832fda24 [ 792.310027][ C0] [<809ccbe0>] (gpio_led_set) from [<809ca564>] (led_set_brightness+0x84/0x90) [ 792.310054][ C0] r5:000000ff r4:832fda24 [ 792.310062][ C0] [<809ca4e0>] (led_set_brightness) from [<809cc0e4>] (led_trigger_event+0x40/0x58) [ 792.310086][ C0] r5:000000ff r4:832fda24 [ 792.310094][ C0] [<809cc0a4>] (led_trigger_event) from [<809cd740>] (ledtrig_cpu+0xac/0xf4) [ 792.310123][ C0] r7:dddce4c0 r6:00000002 r5:82b15cd8 r4:000001fd [ 792.310132][ C0] [<809cd694>] (ledtrig_cpu) from [<80227a38>] (arch_cpu_idle_exit+0x14/0x18) [ 792.310166][ C0] r9:00000000 r8:00000000 r7:8280c710 r6:8281b500 r5:8280c6d0 r4:00000000 [ 792.310175][ C0] [<80227a24>] (arch_cpu_idle_exit) from [<802b168c>] (do_idle+0x5c/0x2d8) [ 792.310206][ C0] [<802b1630>] (do_idle) from [<802b1c38>] (cpu_startup_entry+0x30/0x34) [ 792.310242][ C0] r10:8281aff4 r9:8280c680 r8:823bec64 r7:00000000 r6:deffc06c r5:828222e8 [ 792.310253][ C0] r4:000000ed [ 792.310260][ C0] [<802b1c08>] (cpu_startup_entry) from [<81aaf47c>] (kernel_init+0x0/0x138) [ 792.310294][ C0] [<81aaf39c>] (rest_init) from [<8260145c>] (start_kernel+0x844/0x860) [ 792.310350][ C0] [<82600c18>] (start_kernel) from [<00000000>] (0x0) [ 792.310861][ C0] Sending NMI from CPU 0 to CPUs 1: [ 792.311651][ C1] NMI backtrace for cpu 1 [ 792.311938][ C1] CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Tainted: G L syzkaller #0 PREEMPT [ 792.312040][ C1] Tainted: [L]=SOFTLOCKUP [ 792.312073][ C1] Hardware name: ARM-Versatile Express [ 792.312099][ C1] PC is at _raw_spin_lock+0x40/0x58 [ 792.312181][ C1] LR is at _raw_spin_lock+0x18/0x58 [ 792.312214][ C1] pc : [<81abbff4>] lr : [<81abbfcc>] psr: 80000113 [ 792.312239][ C1] sp : df805d68 ip : df805d68 fp : df805d7c [ 792.312263][ C1] r10: 81c05450 r9 : 8404e240 r8 : 842cca88 [ 792.312284][ C1] r7 : 8404e368 r6 : 00000000 r5 : 00000001 r4 : 8404e368 [ 792.312312][ C1] r3 : 000086f3 r2 : 000086f4 r1 : 00000000 r0 : 00000001 [ 792.312342][ C1] Flags: Nzcv IRQs on FIQs on Mode SVC_32 ISA ARM Segment none [ 792.312385][ C1] Control: 30c5387d Table: 85d781c0 DAC: 00000000 [ 792.312408][ C1] Call trace: frame pointer underflow [ 792.312518][ C1] [<81abbfb4>] (_raw_spin_lock) from [<809c7b2c>] (gpio_mmio_set+0x44/0x80) [ 792.312662][ C1] r5:00000001 r4:8404e240 [ 792.312701][ C1] [<809c7ae8>] (gpio_mmio_set) from [<809b82e8>] (gpiochip_set+0x1c/0x44) [ 792.312784][ C1] r7:00000000 r6:00000000 r5:00000000 r4:842fd9c0 [ 792.312818][ C1] [<809b82cc>] (gpiochip_set) from [<809babb0>] (gpiod_set_raw_value_commit+0x78/0x218) [ 792.312878][ C1] [<809bab38>] (gpiod_set_raw_value_commit) from [<809bc450>] (gpiod_set_value_nocheck+0x44/0x58) [ 792.312973][ C1] r10:81c05450 r9:df805ebc r8:00000102 r7:00001945 r6:0000000a r5:00000000 [ 792.313004][ C1] r4:842fd9c0 [ 792.313023][ C1] [<809bc40c>] (gpiod_set_value_nocheck) from [<809bc4a0>] (gpiod_set_value+0x3c/0x88) [ 792.313083][ C1] [<809bc464>] (gpiod_set_value) from [<809ccc3c>] (gpio_led_set+0x5c/0x60) [ 792.313143][ C1] r5:832fd844 r4:832fd844 [ 792.313164][ C1] [<809ccbe0>] (gpio_led_set) from [<809ca4d4>] (led_set_brightness_nosleep+0x38/0x44) [ 792.313226][ C1] r5:832fd844 r4:84ea508c [ 792.313248][ C1] [<809ca49c>] (led_set_brightness_nosleep) from [<809cd538>] (led_heartbeat_function+0x84/0x144) [ 792.313312][ C1] [<809cd4b4>] (led_heartbeat_function) from [<80327070>] (call_timer_fn+0x30/0x220) [ 792.313394][ C1] r7:00001945 r6:809cd4b4 r5:84ea508c r4:83216000 [ 792.313417][ C1] [<80327040>] (call_timer_fn) from [<80327524>] (__run_timers+0x2c4/0x3f8) [ 792.313490][ C1] r9:df805ebc r8:00001945 r7:00000000 r6:809cd4b4 r5:dddd9f00 r4:84ea508c [ 792.313512][ C1] [<80327260>] (__run_timers) from [<803276c0>] (run_timer_base+0x68/0x78) [ 792.313589][ C1] r10:83216000 r9:82804d80 r8:00000102 r7:00000001 r6:00000082 r5:00000002 [ 792.313618][ C1] r4:dddd9f00 [ 792.313638][ C1] [<80327658>] (run_timer_base) from [<803276ec>] (run_timer_softirq+0x1c/0x34) [ 792.313707][ C1] r4:82804084 [ 792.313729][ C1] [<803276d0>] (run_timer_softirq) from [<8025b65c>] (handle_softirqs+0x140/0x458) [ 792.313792][ C1] [<8025b51c>] (handle_softirqs) from [<8025bad0>] (__irq_exit_rcu+0x110/0x1d0) [ 792.313877][ C1] r10:00000000 r9:83216000 r8:00000000 r7:df865e08 r6:82443f98 r5:8247f0cc [ 792.313904][ C1] r4:83216000 [ 792.313924][ C1] [<8025b9c0>] (__irq_exit_rcu) from [<8025be48>] (irq_exit+0x10/0x18) [ 792.313992][ C1] r5:8247f0cc r4:826c3a9c [ 792.314016][ C1] [<8025be38>] (irq_exit) from [<81aada64>] (generic_handle_arch_irq+0x7c/0x80) [ 792.314093][ C1] [<81aad9e8>] (generic_handle_arch_irq) from [<81a7da0c>] (call_with_stack+0x1c/0x20) [ 792.314173][ C1] r9:83216000 r8:842cca88 r7:df865e3c r6:ffffffff r5:60000013 r4:809c832c [ 792.314198][ C1] [<81a7d9f0>] (call_with_stack) from [<80200bec>] (__irq_svc+0x8c/0xbc) [ 792.314262][ C1] Exception stack(0xdf865e08 to 0xdf865e50) [ 792.314314][ C1] 5e00: e0196008 00000009 000086f3 00000000 e0196008 00000009 [ 792.314360][ C1] 5e20: 00000001 8404e368 842cca88 8404e240 00000000 df865e6c df865e58 df865e58 [ 792.314392][ C1] 5e40: 809c8328 809c832c 60000013 ffffffff [ 792.314445][ C1] [<809c830c>] (gpio_mmio_write32) from [<809c7b4c>] (gpio_mmio_set+0x64/0x80) [ 792.314521][ C1] r5:00000008 r4:8404e240 [ 792.314545][ C1] [<809c7ae8>] (gpio_mmio_set) from [<809b82e8>] (gpiochip_set+0x1c/0x44) [ 792.314638][ C1] r7:00000001 r6:00000000 r5:00000003 r4:842fd9fc [ 792.314662][ C1] [<809b82cc>] (gpiochip_set) from [<809babb0>] (gpiod_set_raw_value_commit+0x78/0x218) [ 792.314719][ C1] [<809bab38>] (gpiod_set_raw_value_commit) from [<809bc450>] (gpiod_set_value_nocheck+0x44/0x58) [ 792.314787][ C1] r10:00000000 r9:00000000 r8:00000001 r7:ddde24c0 r6:833fa558 r5:00000001 [ 792.314839][ C1] r4:842fd9fc [ 792.314867][ C1] [<809bc40c>] (gpiod_set_value_nocheck) from [<809bc4a0>] (gpiod_set_value+0x3c/0x88) [ 792.314933][ C1] [<809bc464>] (gpiod_set_value) from [<809ccc3c>] (gpio_led_set+0x5c/0x60) [ 792.314992][ C1] r5:000000ff r4:832fdb14 [ 792.315016][ C1] [<809ccbe0>] (gpio_led_set) from [<809ca564>] (led_set_brightness+0x84/0x90) [ 792.315080][ C1] r5:000000ff r4:832fdb14 [ 792.315102][ C1] [<809ca4e0>] (led_set_brightness) from [<809cc0e4>] (led_trigger_event+0x40/0x58) [ 792.315163][ C1] r5:000000ff r4:832fdb14 [ 792.315198][ C1] [<809cc0a4>] (led_trigger_event) from [<809cd740>] (ledtrig_cpu+0xac/0xf4) [ 792.315274][ C1] r7:ddde24c0 r6:00000002 r5:82b15cd8 r4:000000fe [ 792.315306][ C1] [<809cd694>] (ledtrig_cpu) from [<80227a38>] (arch_cpu_idle_exit+0x14/0x18) [ 792.315380][ C1] r9:00000000 r8:00000001 r7:8280c710 r6:83216000 r5:8280c6d0 r4:00000001 [ 792.315405][ C1] [<80227a24>] (arch_cpu_idle_exit) from [<802b168c>] (do_idle+0x5c/0x2d8) [ 792.315483][ C1] [<802b1630>] (do_idle) from [<802b1c38>] (cpu_startup_entry+0x30/0x34) [ 792.315558][ C1] r10:00000000 r9:414fc0f0 r8:80003000 r7:82a7b4a4 r6:83216000 r5:00000001 [ 792.315598][ C1] r4:00000092 [ 792.315616][ C1] [<802b1c08>] (cpu_startup_entry) from [<8022f360>] (secondary_start_kernel+0x128/0x194) [ 792.315684][ C1] [<8022f238>] (secondary_start_kernel) from [<80220094>] (__enable_mmu+0x0/0xc) [ 792.315759][ C1] r7:82a7b4a4 r6:30c0387d r5:00000000 r4:830b7bc0 [ 792.316708][ C0] Kernel panic - not syncing: softlockup: hung tasks [ 792.344283][ C0] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Tainted: G L syzkaller #0 PREEMPT [ 792.344626][ C0] Tainted: [L]=SOFTLOCKUP [ 792.344836][ C0] Hardware name: ARM-Versatile Express [ 792.345100][ C0] Call trace: [ 792.345392][ C0] [<80201a74>] (dump_backtrace) from [<80201b70>] (show_stack+0x18/0x1c) [ 792.345787][ C0] r7:822965a4 r6:8281b500 r5:00000000 r4:82295754 [ 792.346055][ C0] [<80201b58>] (show_stack) from [<8021ee08>] (dump_stack_lvl+0x54/0x7c) [ 792.346466][ C0] [<8021edb4>] (dump_stack_lvl) from [<8021ee48>] (dump_stack+0x18/0x1c) [ 792.346841][ C0] r5:00000000 r4:82a7bd14 [ 792.347067][ C0] [<8021ee30>] (dump_stack) from [<80202648>] (vpanic+0xe0/0x2e8) [ 792.347465][ C0] [<80202568>] (vpanic) from [<80202884>] (trace_suspend_resume+0x0/0xd8) [ 792.347839][ C0] r7:82ac27f8 [ 792.348031][ C0] [<80202850>] (panic) from [<80383fcc>] (watchdog_timer_fn+0x2dc/0x350) [ 792.348414][ C0] r3:00000001 r2:00004000 r1:82a7bd1c r0:822965a4 [ 792.348671][ C0] [<80383cf0>] (watchdog_timer_fn) from [<80329c64>] (__hrtimer_run_queues+0x1c4/0x454) [ 792.349090][ C0] r10:8281b500 r9:00000000 r8:dddc7130 r7:80383cf0 r6:dddc7000 r5:dddc7040 [ 792.349408][ C0] r4:dddc75d8 [ 792.349578][ C0] [<80329aa0>] (__hrtimer_run_queues) from [<8032b268>] (hrtimer_interrupt+0x148/0x2bc) [ 792.349989][ C0] r10:740093a0 r9:dddc7180 r8:dddc7130 r7:000000b8 r6:00000003 r5:20000193 [ 792.350302][ C0] r4:dddc7000 [ 792.350514][ C0] [<8032b120>] (hrtimer_interrupt) from [<813409e8>] (arch_timer_handler_virt+0x30/0x38) [ 792.350945][ C0] r10:81d0fc78 r9:8309e400 r8:00000000 r7:00000000 r6:00000000 r5:82498528 [ 792.351253][ C0] r4:8309de40 [ 792.351423][ C0] [<813409b8>] (arch_timer_handler_virt) from [<802efab4>] (handle_percpu_devid_irq+0x128/0x34c) [ 792.351826][ C0] [<802ef98c>] (handle_percpu_devid_irq) from [<802e8c44>] (handle_irq_desc+0x74/0x84) [ 792.352245][ C0] r10:00000001 r9:8281b500 r8:00000000 r7:df80a00c r6:826c2388 r5:df80a000 [ 792.352548][ C0] r4:8280cc44 [ 792.352727][ C0] [<802e8bd0>] (handle_irq_desc) from [<802e8cc0>] (generic_handle_domain_irq+0x18/0x1c) [ 792.353135][ C0] [<802e8ca8>] (generic_handle_domain_irq) from [<802012c8>] (gic_handle_irq+0x68/0x7c) [ 792.353492][ C0] [<80201260>] (gic_handle_irq) from [<81aada48>] (generic_handle_arch_irq+0x60/0x80) [ 792.353758][ C0] r7:82801b90 r6:82443f98 r5:8247f0cc r4:826c3a9c [ 792.353921][ C0] [<81aad9e8>] (generic_handle_arch_irq) from [<80200bdc>] (__irq_svc+0x7c/0xbc) [ 792.354119][ C0] Exception stack(0x82801b90 to 0x82801bd8) [ 792.354260][ C0] 1b80: ddddb488 830bf3b0 00000103 00005b9d [ 792.354475][ C0] 1ba0: 830bf380 830bf3b0 82801cb8 ddddb488 ee951300 00000054 00000001 82801bec [ 792.354671][ C0] 1bc0: 82801bf0 82801be0 80346ef4 81abbe3c 60000113 ffffffff [ 792.354867][ C0] r9:8281b500 r8:ee951300 r7:82801bc4 r6:ffffffff r5:60000113 r4:81abbe3c [ 792.355050][ C0] [<81abbe14>] (_raw_spin_unlock_irq) from [<80346ef4>] (tmigr_handle_remote_up+0x268/0x4b0) [ 792.355269][ C0] [<80346c8c>] (tmigr_handle_remote_up) from [<803451a4>] (__walk_groups_from+0x3c/0xe4) [ 792.355491][ C0] r10:8281b500 r9:8280c820 r8:80346c8c r7:82801cb8 r6:830bf380 r5:00000002 [ 792.355666][ C0] r4:830bf380 [ 792.355753][ C0] [<80345168>] (__walk_groups_from) from [<8034753c>] (tmigr_handle_remote+0xe8/0x108) [ 792.355959][ C0] r9:82804d80 r8:00000102 r7:00000001 r6:00000002 r5:00000002 r4:dddc7488 [ 792.356137][ C0] [<80347454>] (tmigr_handle_remote) from [<80327700>] (run_timer_softirq+0x30/0x34) [ 792.356345][ C0] r4:82804084 [ 792.356422][ C0] [<803276d0>] (run_timer_softirq) from [<8025b65c>] (handle_softirqs+0x140/0x458) [ 792.356637][ C0] [<8025b51c>] (handle_softirqs) from [<8025bad0>] (__irq_exit_rcu+0x110/0x1d0) [ 792.356828][ C0] r10:00000000 r9:8281b500 r8:00000000 r7:82801dd8 r6:82443f98 r5:8247f0cc [ 792.357150][ C0] r4:8281b500 [ 792.357313][ C0] [<8025b9c0>] (__irq_exit_rcu) from [<8025be48>] (irq_exit+0x10/0x18) [ 792.357657][ C0] r5:8247f0cc r4:826c3a9c [ 792.357849][ C0] [<8025be38>] (irq_exit) from [<81aada64>] (generic_handle_arch_irq+0x7c/0x80) [ 792.358215][ C0] [<81aad9e8>] (generic_handle_arch_irq) from [<80200bdc>] (__irq_svc+0x7c/0xbc) [ 792.358624][ C0] Exception stack(0x82801dd8 to 0x82801e20) [ 792.358908][ C0] 1dc0: 00000001 00000000 [ 792.359232][ C0] 1de0: 000086f5 000086f3 8404e368 00000004 00000001 8404e368 842cca88 8404e240 [ 792.359551][ C0] 1e00: 00000000 82801e3c 82801e28 82801e28 81abbfcc 81abc000 80000013 ffffffff [ 792.359910][ C0] r9:8281b500 r8:842cca88 r7:82801e0c r6:ffffffff r5:80000013 r4:81abc000 [ 792.360239][ C0] [<81abbfb4>] (_raw_spin_lock) from [<809c7b2c>] (gpio_mmio_set+0x44/0x80) [ 792.360606][ C0] r5:00000004 r4:8404e240 [ 792.360805][ C0] [<809c7ae8>] (gpio_mmio_set) from [<809b82e8>] (gpiochip_set+0x1c/0x44) [ 792.361230][ C0] r7:00000001 r6:00000000 r5:00000002 r4:842fd9e8 [ 792.361400][ C0] [<809b82cc>] (gpiochip_set) from [<809babb0>] (gpiod_set_raw_value_commit+0x78/0x218) [ 792.361741][ C0] [<809bab38>] (gpiod_set_raw_value_commit) from [<809bc450>] (gpiod_set_value_nocheck+0x44/0x58) [ 792.361991][ C0] r10:00000000 r9:00000000 r8:00000001 r7:dddce4c0 r6:833fa518 r5:00000001 [ 792.362209][ C0] r4:842fd9e8 [ 792.362294][ C0] [<809bc40c>] (gpiod_set_value_nocheck) from [<809bc4a0>] (gpiod_set_value+0x3c/0x88) [ 792.362605][ C0] [<809bc464>] (gpiod_set_value) from [<809ccc3c>] (gpio_led_set+0x5c/0x60) [ 792.362994][ C0] r5:000000ff r4:832fda24 [ 792.363201][ C0] [<809ccbe0>] (gpio_led_set) from [<809ca564>] (led_set_brightness+0x84/0x90) [ 792.363563][ C0] r5:000000ff r4:832fda24 [ 792.363761][ C0] [<809ca4e0>] (led_set_brightness) from [<809cc0e4>] (led_trigger_event+0x40/0x58) [ 792.364160][ C0] r5:000000ff r4:832fda24 [ 792.364355][ C0] [<809cc0a4>] (led_trigger_event) from [<809cd740>] (ledtrig_cpu+0xac/0xf4) [ 792.364627][ C0] r7:dddce4c0 r6:00000002 r5:82b15cd8 r4:000001fd [ 792.364794][ C0] [<809cd694>] (ledtrig_cpu) from [<80227a38>] (arch_cpu_idle_exit+0x14/0x18) [ 792.365014][ C0] r9:00000000 r8:00000000 r7:8280c710 r6:8281b500 r5:8280c6d0 r4:00000000 [ 792.365168][ C0] [<80227a24>] (arch_cpu_idle_exit) from [<802b168c>] (do_idle+0x5c/0x2d8) [ 792.365343][ C0] [<802b1630>] (do_idle) from [<802b1c38>] (cpu_startup_entry+0x30/0x34) [ 792.365526][ C0] r10:8281aff4 r9:8280c680 r8:823bec64 r7:00000000 r6:deffc06c r5:828222e8 [ 792.365693][ C0] r4:000000ed [ 792.365778][ C0] [<802b1c08>] (cpu_startup_entry) from [<81aaf47c>] (kernel_init+0x0/0x138) [ 792.365980][ C0] [<81aaf39c>] (rest_init) from [<8260145c>] (start_kernel+0x844/0x860) [ 792.366166][ C0] [<82600c18>] (start_kernel) from [<00000000>] (0x0) [ 792.368397][ C0] Rebooting in 86400 seconds..