last executing test programs: 2.784367045s ago: executing program 1 (id=784): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) timer_create(0x0, &(0x7f0000000080)={0x0, 0x11}, &(0x7f0000000140)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) read(r0, &(0x7f0000000280)=""/203, 0xcb) 1.784313823s ago: executing program 0 (id=788): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) recvmmsg$unix(r2, &(0x7f0000005f80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=[@rights={{0x10, 0x1, 0x1, [0xffffffffffffffff]}}], 0x10}}], 0x1, 0x0, 0x0) ioctl$TUNSETNOCSUM(r3, 0x5451, 0x1) 1.584137438s ago: executing program 0 (id=789): r0 = openat$ubi_ctrl(0xffffff9c, &(0x7f0000001540), 0x22a000, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) sendmsg$NL80211_CMD_FLUSH_PMKSA(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x4044) 1.353799057s ago: executing program 1 (id=790): r0 = openat$vcs(0xffffff9c, &(0x7f00000028c0), 0x900, 0x0) close_range(r0, 0xffffffffffffffff, 0x2) socket$nl_route(0x10, 0x3, 0x0) sendmsg$ETHTOOL_MSG_EEE_SET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x14, 0x0, 0x800, 0x70bd25, 0x25dfdbfc}, 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x20040050) 1.300899054s ago: executing program 0 (id=794): r0 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) r1 = dup(r0) ioctl$EVIOCSFF(r1, 0x40044591, 0x0) ioctl$BTRFS_IOC_RM_DEV(r0, 0x5000940b, 0x0) 1.045677017s ago: executing program 1 (id=791): mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x20000, 0x0) ioctl$BINDER_GET_FROZEN_INFO(r0, 0x5450, 0x0) 1.027439919s ago: executing program 0 (id=796): r0 = openat$selinux_enforce(0xffffff9c, &(0x7f0000000280), 0x80, 0x0) close(r0) socket$nl_route(0x10, 0x3, 0x0) setsockopt$MRT6_ADD_MFC(r0, 0x29, 0xcc, 0x0, 0x0) 655.013196ms ago: executing program 1 (id=792): r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='.\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r1, r0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)={0x0}, 0x1, 0x0, 0x0, 0x4}, 0x50) 640.800118ms ago: executing program 0 (id=798): mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x20000, 0x0) ioctl$BINDER_GET_FROZEN_INFO(r0, 0x5450, 0x0) 315.052979ms ago: executing program 1 (id=793): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) recvmmsg$unix(r2, &(0x7f0000005f80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=[@rights={{0x10, 0x1, 0x1, [0xffffffffffffffff]}}], 0x10}}], 0x1, 0x0, 0x0) ioctl$TUNSETNOCSUM(r3, 0x5451, 0x1) 19.878767ms ago: executing program 1 (id=795): r0 = openat$ubi_ctrl(0xffffff9c, &(0x7f0000001540), 0x22a000, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) sendmsg$NL80211_CMD_FLUSH_PMKSA(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x4044) 0s ago: executing program 0 (id=801): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) sendto$l2tp6(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x3}, 0x20) sendmsg$ETHTOOL_MSG_FEATURES_SET(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x1548}, 0x1, 0x0, 0x0, 0x4}, 0x10) kernel console output (not intermixed with test programs): syzkaller login: [ 46.977502][ T29] kauditd_printk_skb: 8 callbacks suppressed [ 46.978798][ T29] audit: type=1400 audit(46.900:56): avc: denied { read write } for pid=3089 comm="sftp-server" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 46.982525][ T29] audit: type=1400 audit(46.910:57): avc: denied { open } for pid=3089 comm="sftp-server" path="/dev/null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 Warning: Permanently added '[localhost]:60971' (ED25519) to the list of known hosts. [ 63.112414][ T29] audit: type=1400 audit(63.000:58): avc: denied { name_bind } for pid=3092 comm="sshd-session" src=30000 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 64.422582][ T29] audit: type=1400 audit(64.330:59): avc: denied { execute } for pid=3093 comm="sh" name="syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 64.464646][ T29] audit: type=1400 audit(64.380:60): avc: denied { execute_no_trans } for pid=3093 comm="sh" path="/syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 67.964733][ T29] audit: type=1400 audit(67.880:61): avc: denied { mounton } for pid=3093 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=806 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 67.972710][ T29] audit: type=1400 audit(67.900:62): avc: denied { mount } for pid=3093 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 67.995474][ T3093] cgroup: Unknown subsys name 'net' [ 68.004801][ T29] audit: type=1400 audit(67.930:63): avc: denied { unmount } for pid=3093 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 68.189002][ T3093] cgroup: Unknown subsys name 'cpuset' [ 68.196662][ T3093] cgroup: Unknown subsys name 'hugetlb' [ 68.197858][ T3093] cgroup: Unknown subsys name 'rlimit' [ 68.474582][ T29] audit: type=1400 audit(68.400:64): avc: denied { setattr } for pid=3093 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 68.476374][ T29] audit: type=1400 audit(68.400:65): avc: denied { mounton } for pid=3093 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 68.479965][ T29] audit: type=1400 audit(68.400:66): avc: denied { mount } for pid=3093 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 68.736495][ T3095] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 68.739781][ T29] audit: type=1400 audit(68.660:67): avc: denied { relabelto } for pid=3095 comm="mkswap" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 68.747598][ T29] audit: type=1400 audit(68.670:68): avc: denied { write } for pid=3095 comm="mkswap" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 68.781016][ T29] audit: type=1400 audit(68.700:69): avc: denied { read } for pid=3093 comm="syz-executor" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 68.785382][ T29] audit: type=1400 audit(68.700:70): avc: denied { open } for pid=3093 comm="syz-executor" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 76.307789][ T3093] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 78.717228][ T29] audit: type=1400 audit(78.640:71): avc: denied { execmem } for pid=3096 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 78.778709][ T29] audit: type=1400 audit(78.700:72): avc: denied { read } for pid=3098 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 78.787898][ T29] audit: type=1400 audit(78.710:73): avc: denied { open } for pid=3098 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 78.793478][ T29] audit: type=1400 audit(78.720:74): avc: denied { mounton } for pid=3098 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 78.837490][ T29] audit: type=1400 audit(78.760:75): avc: denied { module_request } for pid=3098 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 78.896675][ T29] audit: type=1400 audit(78.820:76): avc: denied { sys_module } for pid=3098 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 79.545208][ T29] audit: type=1400 audit(79.470:77): avc: denied { ioctl } for pid=3099 comm="syz-executor" path="/dev/net/tun" dev="devtmpfs" ino=677 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 80.619174][ T3099] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 80.629796][ T3099] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 80.803164][ T3098] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 80.809621][ T3098] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 81.336861][ T3099] hsr_slave_0: entered promiscuous mode [ 81.340770][ T3099] hsr_slave_1: entered promiscuous mode [ 81.699402][ T3098] hsr_slave_0: entered promiscuous mode [ 81.701168][ T3098] hsr_slave_1: entered promiscuous mode [ 81.706539][ T3098] debugfs: 'hsr0' already exists in 'hsr' [ 81.708614][ T3098] Cannot create hsr debugfs directory [ 81.767893][ T29] audit: type=1400 audit(81.690:78): avc: denied { create } for pid=3099 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 81.772777][ T29] audit: type=1400 audit(81.690:79): avc: denied { write } for pid=3099 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 81.782329][ T29] audit: type=1400 audit(81.700:80): avc: denied { read } for pid=3099 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 81.782350][ T3099] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 81.798545][ T3099] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 81.809744][ T3099] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 81.818469][ T3099] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 82.129112][ T3098] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 82.145474][ T3098] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 82.157053][ T3098] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 82.169526][ T3098] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 82.602231][ T3099] 8021q: adding VLAN 0 to HW filter on device bond0 [ 82.918600][ T3098] 8021q: adding VLAN 0 to HW filter on device bond0 [ 85.415634][ T3099] veth0_vlan: entered promiscuous mode [ 85.459547][ T3099] veth1_vlan: entered promiscuous mode [ 85.541193][ T3099] veth0_macvtap: entered promiscuous mode [ 85.573260][ T3099] veth1_macvtap: entered promiscuous mode [ 85.678166][ T52] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 85.689765][ T52] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 85.690300][ T52] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 85.690749][ T52] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 85.847444][ T29] audit: type=1400 audit(85.770:81): avc: denied { mount } for pid=3099 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 85.858474][ T29] audit: type=1400 audit(85.780:82): avc: denied { mounton } for pid=3099 comm="syz-executor" path="/syzkaller.G4jX1B/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 85.870196][ T29] audit: type=1400 audit(85.790:83): avc: denied { mount } for pid=3099 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 85.874385][ T3098] veth0_vlan: entered promiscuous mode [ 85.884205][ T29] audit: type=1400 audit(85.800:84): avc: denied { mounton } for pid=3099 comm="syz-executor" path="/syzkaller.G4jX1B/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 85.888234][ T29] audit: type=1400 audit(85.810:85): avc: denied { mounton } for pid=3099 comm="syz-executor" path="/syzkaller.G4jX1B/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=940 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 85.910411][ T29] audit: type=1400 audit(85.830:86): avc: denied { unmount } for pid=3099 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 85.915914][ T3098] veth1_vlan: entered promiscuous mode [ 85.918845][ T29] audit: type=1400 audit(85.840:87): avc: denied { mounton } for pid=3099 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=772 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 85.924061][ T29] audit: type=1400 audit(85.850:88): avc: denied { mount } for pid=3099 comm="syz-executor" name="/" dev="gadgetfs" ino=941 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 85.933496][ T29] audit: type=1400 audit(85.860:89): avc: denied { mount } for pid=3099 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 85.937443][ T29] audit: type=1400 audit(85.860:90): avc: denied { mounton } for pid=3099 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 86.010162][ T3099] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 86.052120][ T3098] veth0_macvtap: entered promiscuous mode [ 86.067092][ T3098] veth1_macvtap: entered promiscuous mode [ 86.196121][ T52] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 86.197643][ T52] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 86.200863][ T52] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 86.204168][ T52] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 88.093255][ T3731] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3731 comm=syz.1.12 [ 89.972120][ T3746] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=3746 comm=syz.0.18 [ 90.245413][ T3752] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 91.077387][ T3769] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3769 comm=syz.0.30 [ 91.516884][ T29] kauditd_printk_skb: 13 callbacks suppressed [ 91.519172][ T29] audit: type=1400 audit(91.440:104): avc: denied { append } for pid=3783 comm="syz.1.38" name="vcsa" dev="devtmpfs" ino=15 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 91.848416][ T29] audit: type=1400 audit(91.770:105): avc: denied { write } for pid=3793 comm="syz.0.42" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 95.372700][ T3834] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3834 comm=syz.0.60 [ 96.017916][ T29] audit: type=1400 audit(95.940:106): avc: denied { create } for pid=3848 comm="syz.1.68" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 96.032863][ T29] audit: type=1400 audit(95.950:107): avc: denied { write } for pid=3848 comm="syz.1.68" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 96.035289][ T29] audit: type=1400 audit(95.950:108): avc: denied { read } for pid=3848 comm="syz.1.68" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 96.837940][ T3877] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3877 comm=syz.1.80 [ 96.923006][ T29] audit: type=1400 audit(96.850:109): avc: denied { create } for pid=3878 comm="syz.0.82" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 97.002748][ T29] audit: type=1400 audit(96.930:110): avc: denied { ioctl } for pid=3882 comm="syz.0.84" path="socket:[2785]" dev="sockfs" ino=2785 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 97.005203][ T29] audit: type=1400 audit(96.930:111): avc: denied { bind } for pid=3882 comm="syz.0.84" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 97.009686][ T29] audit: type=1400 audit(96.930:112): avc: denied { write } for pid=3882 comm="syz.0.84" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 98.298178][ T29] audit: type=1400 audit(98.220:113): avc: denied { create } for pid=3901 comm="syz.0.93" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 98.309912][ T29] audit: type=1400 audit(98.230:114): avc: denied { write } for pid=3901 comm="syz.0.93" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 98.505930][ T29] audit: type=1400 audit(98.430:115): avc: denied { create } for pid=3905 comm="syz.0.95" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 98.514534][ T29] audit: type=1400 audit(98.440:116): avc: denied { bind } for pid=3905 comm="syz.0.95" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 98.519560][ T29] audit: type=1400 audit(98.440:117): avc: denied { accept } for pid=3905 comm="syz.0.95" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 98.527001][ T29] audit: type=1400 audit(98.450:118): avc: denied { write } for pid=3905 comm="syz.0.95" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 99.098245][ T3918] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=3918 comm=syz.0.101 [ 102.118062][ T29] kauditd_printk_skb: 1 callbacks suppressed [ 102.118573][ T29] audit: type=1400 audit(102.040:120): avc: denied { ioctl } for pid=3965 comm="syz.0.124" path="socket:[2953]" dev="sockfs" ino=2953 ioctlcmd=0x5431 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 102.236564][ T29] audit: type=1400 audit(102.160:121): avc: denied { map } for pid=3969 comm="syz.0.126" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=2961 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 102.238720][ T29] audit: type=1400 audit(102.160:122): avc: denied { read write } for pid=3969 comm="syz.0.126" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=2961 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 102.313507][ T3972] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 102.317138][ T29] audit: type=1400 audit(102.240:123): avc: denied { getattr } for pid=3969 comm="syz.0.126" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=2961 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 104.115758][ T4004] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4004 comm=syz.1.143 [ 104.388824][ T29] audit: type=1400 audit(104.310:124): avc: denied { associate } for pid=4013 comm="syz.0.148" name="pfkey" scontext=root:object_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 104.407117][ T4014] faux_driver vgem: [drm] Unknown color mode 6; guessing buffer size. [ 105.369214][ T29] audit: type=1400 audit(105.290:125): avc: denied { create } for pid=4050 comm="syz.1.167" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 105.376003][ T29] audit: type=1400 audit(105.300:126): avc: denied { write } for pid=4050 comm="syz.1.167" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 109.256154][ T4066] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4066 comm=syz.1.177 [ 111.006334][ T4097] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4097 comm=syz.1.188 [ 112.245649][ T4136] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=4136 comm=syz.1.207 [ 113.320430][ T4148] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=4148 comm=syz.0.212 [ 113.786042][ T4163] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4163 comm=syz.1.220 [ 116.644601][ T29] audit: type=1400 audit(116.570:127): avc: denied { map_create } for pid=4200 comm="syz.1.238" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 116.654581][ T29] audit: type=1400 audit(116.580:128): avc: denied { bpf } for pid=4200 comm="syz.1.238" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 116.657092][ T29] audit: type=1400 audit(116.580:129): avc: denied { map_read map_write } for pid=4200 comm="syz.1.238" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 116.686830][ T29] audit: type=1400 audit(116.610:130): avc: denied { prog_load } for pid=4200 comm="syz.1.238" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 121.085284][ T4231] Zero length message leads to an empty skb [ 122.684449][ T29] audit: type=1400 audit(122.610:131): avc: denied { create } for pid=4291 comm="syz.0.283" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 122.697681][ T29] audit: type=1400 audit(122.620:132): avc: denied { write } for pid=4291 comm="syz.0.283" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 122.789274][ T4296] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1005 sclass=netlink_route_socket pid=4296 comm=syz.1.284 [ 123.187598][ T4311] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1005 sclass=netlink_route_socket pid=4311 comm=syz.0.291 [ 123.432121][ T4319] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=1541 sclass=netlink_audit_socket pid=4319 comm=syz.0.295 [ 123.566204][ T4323] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5123 sclass=netlink_route_socket pid=4323 comm=syz.0.298 [ 124.403522][ T4336] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=1541 sclass=netlink_audit_socket pid=4336 comm=syz.1.303 [ 124.495131][ T4338] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5123 sclass=netlink_route_socket pid=4338 comm=syz.1.305 [ 125.720415][ T29] audit: type=1400 audit(125.640:133): avc: denied { create } for pid=4347 comm="syz.1.310" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 125.729822][ T29] audit: type=1400 audit(125.650:134): avc: denied { write } for pid=4347 comm="syz.1.310" path="socket:[4642]" dev="sockfs" ino=4642 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 127.304029][ T4373] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4373 comm=syz.0.322 [ 131.606683][ T4435] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4435 comm=syz.0.351 [ 132.061103][ T4456] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65534 sclass=netlink_route_socket pid=4456 comm=syz.0.361 [ 132.299589][ T29] audit: type=1400 audit(132.220:135): avc: denied { ioctl } for pid=4464 comm="syz.1.366" path="socket:[4858]" dev="sockfs" ino=4858 ioctlcmd=0x8927 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 132.519960][ T29] audit: type=1400 audit(132.440:136): avc: denied { setopt } for pid=4473 comm="syz.1.370" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 133.353490][ T4507] capability: warning: `syz.0.387' uses 32-bit capabilities (legacy support in use) [ 133.976141][ T29] audit: type=1400 audit(133.900:137): avc: denied { getopt } for pid=4529 comm="syz.1.398" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 135.241228][ T29] audit: type=1400 audit(135.160:138): avc: denied { create } for pid=4577 comm="syz.1.422" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 135.800463][ T29] audit: type=1400 audit(135.720:139): avc: denied { create } for pid=4598 comm="syz.0.433" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 135.812102][ T29] audit: type=1400 audit(135.730:140): avc: denied { perfmon } for pid=4598 comm="syz.0.433" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 135.816930][ T29] audit: type=1400 audit(135.740:141): avc: denied { connect } for pid=4598 comm="syz.0.433" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 136.357956][ T4620] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4620 comm=syz.1.443 [ 136.719258][ T29] audit: type=1400 audit(136.630:142): avc: denied { remount } for pid=4634 comm="syz.1.451" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 136.727045][ T29] audit: type=1400 audit(136.650:143): avc: denied { unmount } for pid=3099 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 137.540057][ T4672] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4672 comm=syz.1.468 [ 138.511133][ T4704] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=4704 comm=syz.1.484 [ 139.773184][ T29] audit: type=1400 audit(139.700:144): avc: denied { write } for pid=4734 comm="syz.1.499" path="socket:[5763]" dev="sockfs" ino=5763 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 139.928619][ T4739] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4739 comm=syz.1.501 [ 142.984148][ T4767] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4767 comm=syz.1.514 [ 144.078246][ T29] audit: type=1400 audit(144.000:145): avc: denied { write } for pid=4786 comm="syz.0.524" name="fib_triestat" dev="proc" ino=4026532755 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 152.977044][ T4905] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65534 sclass=netlink_route_socket pid=4905 comm=syz.1.579 [ 153.984290][ T29] audit: type=1400 audit(153.910:146): avc: denied { read } for pid=4941 comm="syz.0.599" path="socket:[6834]" dev="sockfs" ino=6834 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 154.657889][ T4954] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4954 comm=syz.0.602 [ 154.767748][ T4959] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=2048 sclass=netlink_audit_socket pid=4959 comm=syz.1.610 [ 155.477758][ T4976] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=2048 sclass=netlink_audit_socket pid=4976 comm=syz.0.614 [ 158.049115][ T29] audit: type=1400 audit(157.970:147): avc: denied { create } for pid=5044 comm="syz.0.650" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 158.064203][ T29] audit: type=1400 audit(157.990:148): avc: denied { connect } for pid=5044 comm="syz.0.650" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 164.008232][ T5161] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5161 comm=syz.0.706 [ 164.316572][ T5167] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5132 sclass=netlink_route_socket pid=5167 comm=syz.0.709 [ 164.902594][ T5180] capability: warning: `syz.0.715' uses deprecated v2 capabilities in a way that may be insecure [ 166.998397][ T29] audit: type=1400 audit(166.920:149): avc: denied { map } for pid=5199 comm="syz.0.725" path="socket:[7569]" dev="sockfs" ino=7569 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tcp_socket permissive=1 [ 167.402651][ T5212] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5212 comm=syz.0.732 [ 167.737047][ T5224] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5224 comm=syz.1.737 [ 168.478447][ T29] audit: type=1400 audit(168.400:150): avc: denied { prog_run } for pid=5243 comm="syz.0.747" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 178.870079][ T5334] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5334 comm=syz.1.790 [ 594.272005][ C0] watchdog: BUG: soft lockup - CPU#0 stuck for 430s! [swapper/0:0] [ 594.272286][ C0] Modules linked in: [ 594.273149][ C0] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Not tainted syzkaller #0 PREEMPT [ 594.273425][ C0] Hardware name: ARM-Versatile Express [ 594.273663][ C0] PC is at _raw_spin_unlock_irq+0x28/0x54 [ 594.274496][ C0] LR is at tmigr_handle_remote_up+0x180/0x4b0 [ 594.274587][ C0] pc : [<81abb2fc>] lr : [<80346d0c>] psr: 60000113 [ 594.274639][ C0] sp : 82801be0 ip : 82801bf0 fp : 82801bec [ 594.274681][ C0] r10: 00000001 r9 : 8280c9a4 r8 : 00000001 [ 594.274731][ C0] r7 : ddddb4a0 r6 : 82801cb8 r5 : 830bf3b0 r4 : 830bf380 [ 594.274789][ C0] r3 : 00003cff r2 : ffffffff r1 : 00000000 r0 : 830bf380 [ 594.274940][ C0] Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment user [ 594.275021][ C0] Control: 30c5387d Table: 86007380 DAC: fffffffd [ 594.275148][ C0] Call trace: [ 594.275451][ C0] [<81abb2d4>] (_raw_spin_unlock_irq) from [<80346d0c>] (tmigr_handle_remote_up+0x180/0x4b0) [ 594.275869][ C0] [<80346b8c>] (tmigr_handle_remote_up) from [<803450a4>] (__walk_groups_from+0x3c/0xe4) [ 594.276021][ C0] r10:8281b500 r9:8280c820 r8:80346b8c r7:82801cb8 r6:830bf380 r5:00000002 [ 594.276081][ C0] r4:830bf380 [ 594.276113][ C0] [<80345068>] (__walk_groups_from) from [<8034743c>] (tmigr_handle_remote+0xe8/0x108) [ 594.276200][ C0] r9:82804d80 r8:00000102 r7:00000001 r6:00000082 r5:00000002 r4:dddc7488 [ 594.276223][ C0] [<80347354>] (tmigr_handle_remote) from [<80327600>] (run_timer_softirq+0x30/0x34) [ 594.276301][ C0] r4:82804084 [ 594.276324][ C0] [<803275d0>] (run_timer_softirq) from [<8025b55c>] (handle_softirqs+0x140/0x458) [ 594.276394][ C0] [<8025b41c>] (handle_softirqs) from [<8025b9d0>] (__irq_exit_rcu+0x110/0x1d0) [ 594.276474][ C0] r10:00000000 r9:8281b500 r8:00000000 r7:82801dd8 r6:82443ee0 r5:8247f014 [ 594.276498][ C0] r4:8281b500 [ 594.276517][ C0] [<8025b8c0>] (__irq_exit_rcu) from [<8025bd48>] (irq_exit+0x10/0x18) [ 594.276606][ C0] r5:8247f014 r4:826c3a9c [ 594.276627][ C0] [<8025bd38>] (irq_exit) from [<81aacf24>] (generic_handle_arch_irq+0x7c/0x80) [ 594.276701][ C0] [<81aacea8>] (generic_handle_arch_irq) from [<80200bdc>] (__irq_svc+0x7c/0xbc) [ 594.276861][ C0] Exception stack(0x82801dd8 to 0x82801e20) [ 594.277049][ C0] 1dc0: 00000001 00000000 [ 594.277117][ C0] 1de0: 0000acc0 0000acbe 8410f568 00000004 00000001 8410f568 84067288 8410f440 [ 594.277156][ C0] 1e00: 00000000 82801e3c 82801e28 82801e28 81abb48c 81abb4b4 80000013 ffffffff [ 594.277236][ C0] r9:8281b500 r8:84067288 r7:82801e0c r6:ffffffff r5:80000013 r4:81abb4b4 [ 594.277260][ C0] [<81abb474>] (_raw_spin_lock) from [<809c74b8>] (gpio_mmio_set+0x44/0x80) [ 594.277379][ C0] r5:00000004 r4:8410f440 [ 594.277401][ C0] [<809c7474>] (gpio_mmio_set) from [<809b7c74>] (gpiochip_set+0x1c/0x44) [ 594.277486][ C0] r7:00000001 r6:00000000 r5:00000002 r4:842a1268 [ 594.277505][ C0] [<809b7c58>] (gpiochip_set) from [<809ba53c>] (gpiod_set_raw_value_commit+0x78/0x218) [ 594.277582][ C0] [<809ba4c4>] (gpiod_set_raw_value_commit) from [<809bbddc>] (gpiod_set_value_nocheck+0x44/0x58) [ 594.277656][ C0] r10:00000000 r9:00000000 r8:00000001 r7:dddce4c0 r6:83924558 r5:00000001 [ 594.277678][ C0] r4:842a1268 [ 594.277696][ C0] [<809bbd98>] (gpiod_set_value_nocheck) from [<809bbe2c>] (gpiod_set_value+0x3c/0x88) [ 594.277761][ C0] [<809bbdf0>] (gpiod_set_value) from [<809cc5c8>] (gpio_led_set+0x5c/0x60) [ 594.277832][ C0] r5:000000ff r4:84ef0224 [ 594.277850][ C0] [<809cc56c>] (gpio_led_set) from [<809c9ef0>] (led_set_brightness+0x84/0x90) [ 594.277908][ C0] r5:000000ff r4:84ef0224 [ 594.277925][ C0] [<809c9e6c>] (led_set_brightness) from [<809cba70>] (led_trigger_event+0x40/0x58) [ 594.277983][ C0] r5:000000ff r4:84ef0224 [ 594.278000][ C0] [<809cba30>] (led_trigger_event) from [<809cd0cc>] (ledtrig_cpu+0xac/0xf4) [ 594.278061][ C0] r7:dddce4c0 r6:00000002 r5:82b15cd8 r4:000001fd [ 594.278077][ C0] [<809cd020>] (ledtrig_cpu) from [<80227a38>] (arch_cpu_idle_exit+0x14/0x18) [ 594.278155][ C0] r9:00000000 r8:00000000 r7:8280c710 r6:8281b500 r5:8280c6d0 r4:00000000 [ 594.278179][ C0] [<80227a24>] (arch_cpu_idle_exit) from [<802b158c>] (do_idle+0x5c/0x2d8) [ 594.278253][ C0] [<802b1530>] (do_idle) from [<802b1b38>] (cpu_startup_entry+0x30/0x34) [ 594.278382][ C0] r10:8281aff4 r9:8280c680 r8:823beae8 r7:00000000 r6:deffc06c r5:828222e8 [ 594.278407][ C0] r4:000000ed [ 594.278425][ C0] [<802b1b08>] (cpu_startup_entry) from [<81aae93c>] (kernel_init+0x0/0x138) [ 594.278507][ C0] [<81aae85c>] (rest_init) from [<8260145c>] (start_kernel+0x844/0x860) [ 594.278652][ C0] [<82600c18>] (start_kernel) from [<00000000>] (0x0) [ 594.279419][ C0] Sending NMI from CPU 0 to CPUs 1: [ 594.280244][ C1] NMI backtrace for cpu 1 [ 594.280469][ C1] CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Not tainted syzkaller #0 PREEMPT [ 594.280557][ C1] Hardware name: ARM-Versatile Express [ 594.280599][ C1] PC is at _raw_spin_lock+0x40/0x58 [ 594.280688][ C1] LR is at _raw_spin_lock+0x18/0x58 [ 594.280732][ C1] pc : [<81abb4b4>] lr : [<81abb48c>] psr: 80000113 [ 594.280761][ C1] sp : df805d68 ip : df805d68 fp : df805d7c [ 594.280787][ C1] r10: 81c05450 r9 : 8410f440 r8 : 84067288 [ 594.280839][ C1] r7 : 8410f568 r6 : 00000001 r5 : 00000001 r4 : 8410f568 [ 594.280867][ C1] r3 : 0000acbe r2 : 0000acbf r1 : 00000000 r0 : 00000001 [ 594.280899][ C1] Flags: Nzcv IRQs on FIQs on Mode SVC_32 ISA ARM Segment none [ 594.280942][ C1] Control: 30c5387d Table: 84cd3600 DAC: 00000000 [ 594.280970][ C1] Call trace: frame pointer underflow [ 594.281089][ C1] [<81abb474>] (_raw_spin_lock) from [<809c74b8>] (gpio_mmio_set+0x44/0x80) [ 594.281187][ C1] r5:00000001 r4:8410f440 [ 594.281210][ C1] [<809c7474>] (gpio_mmio_set) from [<809b7c74>] (gpiochip_set+0x1c/0x44) [ 594.281298][ C1] r7:00000001 r6:00000000 r5:00000000 r4:842a1240 [ 594.281321][ C1] [<809b7c58>] (gpiochip_set) from [<809ba53c>] (gpiod_set_raw_value_commit+0x78/0x218) [ 594.281421][ C1] [<809ba4c4>] (gpiod_set_raw_value_commit) from [<809bbddc>] (gpiod_set_value_nocheck+0x44/0x58) [ 594.281504][ C1] r10:81c05450 r9:df805ebc r8:00000102 r7:ffffd1da r6:00000007 r5:00000001 [ 594.281527][ C1] r4:842a1240 [ 594.281546][ C1] [<809bbd98>] (gpiod_set_value_nocheck) from [<809bbe2c>] (gpiod_set_value+0x3c/0x88) [ 594.281609][ C1] [<809bbdf0>] (gpiod_set_value) from [<809cc5c8>] (gpio_led_set+0x5c/0x60) [ 594.281668][ C1] r5:84ef0044 r4:84ef0044 [ 594.281686][ C1] [<809cc56c>] (gpio_led_set) from [<809c9e60>] (led_set_brightness_nosleep+0x38/0x44) [ 594.281743][ C1] r5:84ef0044 r4:84bcbecc [ 594.281759][ C1] [<809c9e28>] (led_set_brightness_nosleep) from [<809ccec4>] (led_heartbeat_function+0x84/0x144) [ 594.281846][ C1] [<809cce40>] (led_heartbeat_function) from [<80326f70>] (call_timer_fn+0x30/0x220) [ 594.281929][ C1] r7:ffffd1da r6:809cce40 r5:84bcbecc r4:83216000 [ 594.281954][ C1] [<80326f40>] (call_timer_fn) from [<80327424>] (__run_timers+0x2c4/0x3f8) [ 594.282043][ C1] r9:df805ebc r8:ffffd1da r7:00000000 r6:809cce40 r5:dddd9f00 r4:84bcbecc [ 594.282068][ C1] [<80327160>] (__run_timers) from [<803275c0>] (run_timer_base+0x68/0x78) [ 594.282156][ C1] r10:83216000 r9:82804d80 r8:00000102 r7:00000001 r6:00000082 r5:00000002 [ 594.282182][ C1] r4:dddd9f00 [ 594.282199][ C1] [<80327558>] (run_timer_base) from [<803275ec>] (run_timer_softirq+0x1c/0x34) [ 594.282269][ C1] r4:82804084 [ 594.282290][ C1] [<803275d0>] (run_timer_softirq) from [<8025b55c>] (handle_softirqs+0x140/0x458) [ 594.282362][ C1] [<8025b41c>] (handle_softirqs) from [<8025b9d0>] (__irq_exit_rcu+0x110/0x1d0) [ 594.282435][ C1] r10:00000000 r9:83216000 r8:00000000 r7:df865e08 r6:82443ee0 r5:8247f014 [ 594.282456][ C1] r4:83216000 [ 594.282471][ C1] [<8025b8c0>] (__irq_exit_rcu) from [<8025bd48>] (irq_exit+0x10/0x18) [ 594.282640][ C1] r5:8247f014 r4:826c3a9c [ 594.282663][ C1] [<8025bd38>] (irq_exit) from [<81aacf24>] (generic_handle_arch_irq+0x7c/0x80) [ 594.282733][ C1] [<81aacea8>] (generic_handle_arch_irq) from [<81a7cec4>] (call_with_stack+0x1c/0x20) [ 594.282820][ C1] r9:83216000 r8:84067288 r7:df865e3c r6:ffffffff r5:80000013 r4:81abb4b4 [ 594.282840][ C1] [<81a7cea8>] (call_with_stack) from [<80200bec>] (__irq_svc+0x8c/0xbc) [ 594.282900][ C1] Exception stack(0xdf865e08 to 0xdf865e50) [ 594.282949][ C1] 5e00: 00000001 00000000 0000acbe 0000acbd 8410f568 00000008 [ 594.282999][ C1] 5e20: 00000001 8410f568 84067288 8410f440 00000000 df865e6c df865e58 df865e58 [ 594.283035][ C1] 5e40: 81abb48c 81abb4b4 80000013 ffffffff [ 594.283060][ C1] [<81abb474>] (_raw_spin_lock) from [<809c74b8>] (gpio_mmio_set+0x44/0x80) [ 594.283146][ C1] r5:00000008 r4:8410f440 [ 594.283167][ C1] [<809c7474>] (gpio_mmio_set) from [<809b7c74>] (gpiochip_set+0x1c/0x44) [ 594.283251][ C1] r7:00000001 r6:00000000 r5:00000003 r4:842a127c [ 594.283272][ C1] [<809b7c58>] (gpiochip_set) from [<809ba53c>] (gpiod_set_raw_value_commit+0x78/0x218) [ 594.283335][ C1] [<809ba4c4>] (gpiod_set_raw_value_commit) from [<809bbddc>] (gpiod_set_value_nocheck+0x44/0x58) [ 594.283409][ C1] r10:00000000 r9:00000000 r8:00000001 r7:ddde24c0 r6:83924598 r5:00000001 [ 594.283431][ C1] r4:842a127c [ 594.283447][ C1] [<809bbd98>] (gpiod_set_value_nocheck) from [<809bbe2c>] (gpiod_set_value+0x3c/0x88) [ 594.283498][ C1] [<809bbdf0>] (gpiod_set_value) from [<809cc5c8>] (gpio_led_set+0x5c/0x60) [ 594.283553][ C1] r5:000000ff r4:84ef0314 [ 594.283572][ C1] [<809cc56c>] (gpio_led_set) from [<809c9ef0>] (led_set_brightness+0x84/0x90) [ 594.283629][ C1] r5:000000ff r4:84ef0314 [ 594.283655][ C1] [<809c9e6c>] (led_set_brightness) from [<809cba70>] (led_trigger_event+0x40/0x58) [ 594.283721][ C1] r5:000000ff r4:84ef0314 [ 594.283741][ C1] [<809cba30>] (led_trigger_event) from [<809cd0cc>] (ledtrig_cpu+0xac/0xf4) [ 594.283824][ C1] r7:ddde24c0 r6:00000002 r5:82b15cd8 r4:000000fe [ 594.283843][ C1] [<809cd020>] (ledtrig_cpu) from [<80227a38>] (arch_cpu_idle_exit+0x14/0x18) [ 594.283916][ C1] r9:00000000 r8:00000001 r7:8280c710 r6:83216000 r5:8280c6d0 r4:00000001 [ 594.283940][ C1] [<80227a24>] (arch_cpu_idle_exit) from [<802b158c>] (do_idle+0x5c/0x2d8) [ 594.284018][ C1] [<802b1530>] (do_idle) from [<802b1b38>] (cpu_startup_entry+0x30/0x34) [ 594.284099][ C1] r10:00000000 r9:414fc0f0 r8:80003000 r7:82a7b4a4 r6:83216000 r5:00000001 [ 594.284121][ C1] r4:00000092 [ 594.284139][ C1] [<802b1b08>] (cpu_startup_entry) from [<8022f360>] (secondary_start_kernel+0x128/0x194) [ 594.284208][ C1] [<8022f238>] (secondary_start_kernel) from [<80220094>] (__enable_mmu+0x0/0xc) [ 594.284281][ C1] r7:82a7b4a4 r6:30c0387d r5:00000000 r4:830b7bc0 [ 594.285868][ C0] Kernel panic - not syncing: softlockup: hung tasks [ 594.361572][ C0] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Tainted: G L syzkaller #0 PREEMPT [ 594.362121][ C0] Tainted: [L]=SOFTLOCKUP [ 594.362334][ C0] Hardware name: ARM-Versatile Express [ 594.362620][ C0] Call trace: [ 594.362937][ C0] [<80201a74>] (dump_backtrace) from [<80201b70>] (show_stack+0x18/0x1c) [ 594.363360][ C0] r7:82296534 r6:8281b500 r5:00000000 r4:822956e4 [ 594.363663][ C0] [<80201b58>] (show_stack) from [<8021ee08>] (dump_stack_lvl+0x54/0x7c) [ 594.365796][ C0] [<8021edb4>] (dump_stack_lvl) from [<8021ee48>] (dump_stack+0x18/0x1c) [ 594.366484][ C0] r5:00000000 r4:82a7bd14 [ 594.366900][ C0] [<8021ee30>] (dump_stack) from [<80202648>] (vpanic+0xe0/0x2e8) [ 594.367459][ C0] [<80202568>] (vpanic) from [<80202884>] (trace_suspend_resume+0x0/0xd8) [ 594.368015][ C0] r7:82ac27f8 [ 594.368289][ C0] [<80202850>] (panic) from [<80383f14>] (watchdog_timer_fn+0x2dc/0x350) [ 594.368970][ C0] r3:00000001 r2:00004000 r1:82a7bd1c r0:82296534 [ 594.369492][ C0] [<80383c38>] (watchdog_timer_fn) from [<80329b64>] (__hrtimer_run_queues+0x1c4/0x454) [ 594.370278][ C0] r10:8281b500 r9:00000000 r8:dddc7130 r7:80383c38 r6:dddc7000 r5:dddc7040 [ 594.370842][ C0] r4:dddc75d8 [ 594.371169][ C0] [<803299a0>] (__hrtimer_run_queues) from [<8032b168>] (hrtimer_interrupt+0x148/0x2bc) [ 594.371857][ C0] r10:591812e0 r9:dddc7180 r8:dddc7130 r7:0000008a r6:00000003 r5:20000193 [ 594.372649][ C0] r4:dddc7000 [ 594.372975][ C0] [<8032b020>] (hrtimer_interrupt) from [<8133fea0>] (arch_timer_handler_virt+0x30/0x38) [ 594.374973][ C0] r10:81d0fc78 r9:8309e400 r8:00000000 r7:00000000 r6:00000000 r5:82498528 [ 594.376706][ C0] r4:8309de40 [ 594.377866][ C0] [<8133fe70>] (arch_timer_handler_virt) from [<802ef9b4>] (handle_percpu_devid_irq+0x128/0x34c) [ 594.380325][ C0] [<802ef88c>] (handle_percpu_devid_irq) from [<802e8b44>] (handle_irq_desc+0x74/0x84) [ 594.382254][ C0] r10:00000001 r9:8281b500 r8:00000000 r7:df80a00c r6:826c2388 r5:df80a000 [ 594.384081][ C0] r4:8280cc44 [ 594.384833][ C0] [<802e8ad0>] (handle_irq_desc) from [<802e8bc0>] (generic_handle_domain_irq+0x18/0x1c) [ 594.386772][ C0] [<802e8ba8>] (generic_handle_domain_irq) from [<802012c8>] (gic_handle_irq+0x68/0x7c) [ 594.388759][ C0] [<80201260>] (gic_handle_irq) from [<81aacf08>] (generic_handle_arch_irq+0x60/0x80) [ 594.391606][ C0] r7:82801b90 r6:82443ee0 r5:8247f014 r4:826c3a9c [ 594.392908][ C0] [<81aacea8>] (generic_handle_arch_irq) from [<80200bdc>] (__irq_svc+0x7c/0xbc) [ 594.393498][ C0] Exception stack(0x82801b90 to 0x82801bd8) [ 594.393795][ C0] 1b80: 830bf380 00000000 ffffffff 00003cff [ 594.395163][ C0] 1ba0: 830bf380 830bf3b0 82801cb8 ddddb4a0 00000001 8280c9a4 00000001 82801bec [ 594.396907][ C0] 1bc0: 82801bf0 82801be0 80346d0c 81abb2fc 60000113 ffffffff [ 594.399020][ C0] r9:8281b500 r8:00000001 r7:82801bc4 r6:ffffffff r5:60000113 r4:81abb2fc [ 594.400888][ C0] [<81abb2d4>] (_raw_spin_unlock_irq) from [<80346d0c>] (tmigr_handle_remote_up+0x180/0x4b0) [ 594.403159][ C0] [<80346b8c>] (tmigr_handle_remote_up) from [<803450a4>] (__walk_groups_from+0x3c/0xe4) [ 594.403670][ C0] r10:8281b500 r9:8280c820 r8:80346b8c r7:82801cb8 r6:830bf380 r5:00000002 [ 594.405608][ C0] r4:830bf380 [ 594.406897][ C0] [<80345068>] (__walk_groups_from) from [<8034743c>] (tmigr_handle_remote+0xe8/0x108) [ 594.409474][ C0] r9:82804d80 r8:00000102 r7:00000001 r6:00000082 r5:00000002 r4:dddc7488 [ 594.409879][ C0] [<80347354>] (tmigr_handle_remote) from [<80327600>] (run_timer_softirq+0x30/0x34) [ 594.410377][ C0] r4:82804084 [ 594.410616][ C0] [<803275d0>] (run_timer_softirq) from [<8025b55c>] (handle_softirqs+0x140/0x458) [ 594.411081][ C0] [<8025b41c>] (handle_softirqs) from [<8025b9d0>] (__irq_exit_rcu+0x110/0x1d0) [ 594.411548][ C0] r10:00000000 r9:8281b500 r8:00000000 r7:82801dd8 r6:82443ee0 r5:8247f014 [ 594.411941][ C0] r4:8281b500 [ 594.412160][ C0] [<8025b8c0>] (__irq_exit_rcu) from [<8025bd48>] (irq_exit+0x10/0x18) [ 594.412600][ C0] r5:8247f014 r4:826c3a9c [ 594.412844][ C0] [<8025bd38>] (irq_exit) from [<81aacf24>] (generic_handle_arch_irq+0x7c/0x80) [ 594.413291][ C0] [<81aacea8>] (generic_handle_arch_irq) from [<80200bdc>] (__irq_svc+0x7c/0xbc) [ 594.413762][ C0] Exception stack(0x82801dd8 to 0x82801e20) [ 594.414082][ C0] 1dc0: 00000001 00000000 [ 594.414471][ C0] 1de0: 0000acc0 0000acbe 8410f568 00000004 00000001 8410f568 84067288 8410f440 [ 594.414896][ C0] 1e00: 00000000 82801e3c 82801e28 82801e28 81abb48c 81abb4b4 80000013 ffffffff [ 594.415279][ C0] r9:8281b500 r8:84067288 r7:82801e0c r6:ffffffff r5:80000013 r4:81abb4b4 [ 594.415679][ C0] [<81abb474>] (_raw_spin_lock) from [<809c74b8>] (gpio_mmio_set+0x44/0x80) [ 594.416117][ C0] r5:00000004 r4:8410f440 [ 594.416337][ C0] [<809c7474>] (gpio_mmio_set) from [<809b7c74>] (gpiochip_set+0x1c/0x44) [ 594.416690][ C0] r7:00000001 r6:00000000 r5:00000002 r4:842a1268 [ 594.416988][ C0] [<809b7c58>] (gpiochip_set) from [<809ba53c>] (gpiod_set_raw_value_commit+0x78/0x218) [ 594.417388][ C0] [<809ba4c4>] (gpiod_set_raw_value_commit) from [<809bbddc>] (gpiod_set_value_nocheck+0x44/0x58) [ 594.417802][ C0] r10:00000000 r9:00000000 r8:00000001 r7:dddce4c0 r6:83924558 r5:00000001 [ 594.418109][ C0] r4:842a1268 [ 594.418298][ C0] [<809bbd98>] (gpiod_set_value_nocheck) from [<809bbe2c>] (gpiod_set_value+0x3c/0x88) [ 594.419571][ C0] [<809bbdf0>] (gpiod_set_value) from [<809cc5c8>] (gpio_led_set+0x5c/0x60) [ 594.421161][ C0] r5:000000ff r4:84ef0224 [ 594.422119][ C0] [<809cc56c>] (gpio_led_set) from [<809c9ef0>] (led_set_brightness+0x84/0x90) [ 594.424753][ C0] r5:000000ff r4:84ef0224 [ 594.426106][ C0] [<809c9e6c>] (led_set_brightness) from [<809cba70>] (led_trigger_event+0x40/0x58) [ 594.427982][ C0] r5:000000ff r4:84ef0224 [ 594.428918][ C0] [<809cba30>] (led_trigger_event) from [<809cd0cc>] (ledtrig_cpu+0xac/0xf4) [ 594.430742][ C0] r7:dddce4c0 r6:00000002 r5:82b15cd8 r4:000001fd [ 594.432033][ C0] [<809cd020>] (ledtrig_cpu) from [<80227a38>] (arch_cpu_idle_exit+0x14/0x18) [ 594.433618][ C0] r9:00000000 r8:00000000 r7:8280c710 r6:8281b500 r5:8280c6d0 r4:00000000 [ 594.435302][ C0] [<80227a24>] (arch_cpu_idle_exit) from [<802b158c>] (do_idle+0x5c/0x2d8) [ 594.437032][ C0] [<802b1530>] (do_idle) from [<802b1b38>] (cpu_startup_entry+0x30/0x34) [ 594.438788][ C0] r10:8281aff4 r9:8280c680 r8:823beae8 r7:00000000 r6:deffc06c r5:828222e8 [ 594.441408][ C0] r4:000000ed [ 594.442476][ C0] [<802b1b08>] (cpu_startup_entry) from [<81aae93c>] (kernel_init+0x0/0x138) [ 594.443714][ C0] [<81aae85c>] (rest_init) from [<8260145c>] (start_kernel+0x844/0x860) [ 594.445240][ C0] [<82600c18>] (start_kernel) from [<00000000>] (0x0) [ 594.452047][ C0] Rebooting in 86400 seconds..