last executing test programs: 872.233538ms ago: executing program 0 (id=694): r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000100)='\x00', 0x89901) close(r0) socket$igmp(0x2, 0x3, 0x2) sendmsg$TIPC_NL_LINK_SET(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0}, 0x1, 0x0, 0x0, 0x20005004}, 0x4040090) 783.121109ms ago: executing program 0 (id=699): r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/cpuinfo\x00', 0x0, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000280)={0x1}, 0x8) 643.904987ms ago: executing program 0 (id=701): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x80000) sendmsg$NL80211_CMD_LEAVE_IBSS(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x20}, 0x1, 0x0, 0x0, 0x40000}, 0x40110) 529.894732ms ago: executing program 1 (id=698): r0 = openat$vcsa(0xffffff9c, &(0x7f0000000000), 0x200000, 0x0) close(r0) socket$nl_audit(0x10, 0x3, 0x9) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f00000003c0)={0x14, 0x0, 0x400, 0x70bd25, 0x25dfdbfc}, 0x14}, 0x1, 0x0, 0x0, 0x21}, 0x90) 510.479764ms ago: executing program 0 (id=700): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(sha1)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x80800) recvfrom$llc(r1, 0x0, 0x0, 0x142, 0x0, 0x0) 431.531045ms ago: executing program 1 (id=702): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000780)={0x26, 'hash\x00', 0x0, 0x0, 'sha3-384\x00'}, 0x58) r1 = accept(r0, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_OCC_SNAPSHOT(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={0x0}, 0x1, 0x0, 0x0, 0x40081}, 0x4040800) 431.359185ms ago: executing program 0 (id=703): r0 = open$dir(&(0x7f00000000c0)='.\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000), 0x2, 0x0) ioctl$F2FS_IOC_COMMIT_ATOMIC_WRITE(r1, 0x5450, 0x0) 319.240289ms ago: executing program 1 (id=704): r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000100)='\x00', 0x89901) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) sendmsg$NL80211_CMD_FLUSH_PMKSA(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}, 0x1, 0x0, 0x0, 0x20000000}, 0x1000) 308.56275ms ago: executing program 0 (id=705): mkdir(&(0x7f0000000580)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180), 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) name_to_handle_at(0xffffffffffffff9c, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x1000) 217.529672ms ago: executing program 1 (id=706): pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x10080) close_range(r0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) sendmsg$IPCTNL_MSG_CT_NEW(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000002c0)={0x0}, 0x1, 0x0, 0x0, 0x20000800}, 0x4800) 108.978066ms ago: executing program 1 (id=707): r0 = openat$vcsa(0xffffff9c, &(0x7f0000000000), 0x200000, 0x0) close(r0) socket$nl_audit(0x10, 0x3, 0x9) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f00000003c0)={0x14, 0x0, 0x400, 0x70bd25, 0x25dfdbfc}, 0x14}, 0x1, 0x0, 0x0, 0x21}, 0x90) 0s ago: executing program 1 (id=708): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname(r0, &(0x7f00000004c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, &(0x7f0000000040)=0xb3) dup3(r0, r1, 0x0) sendmsg$NL80211_CMD_CRIT_PROTOCOL_STOP(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x8040}, 0xc0000) kernel console output (not intermixed with test programs): syzkaller login: [ 48.711524][ T29] kauditd_printk_skb: 6 callbacks suppressed [ 48.716043][ T29] audit: type=1400 audit(48.630:56): avc: denied { read write } for pid=3089 comm="sftp-server" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 48.716455][ T29] audit: type=1400 audit(48.630:57): avc: denied { open } for pid=3089 comm="sftp-server" path="/dev/null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 Warning: Permanently added '[localhost]:39176' (ED25519) to the list of known hosts. [ 64.245945][ T29] audit: type=1400 audit(64.150:58): avc: denied { name_bind } for pid=3092 comm="sshd-session" src=30000 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 66.464488][ T29] audit: type=1400 audit(66.390:59): avc: denied { execute } for pid=3093 comm="sh" name="syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 66.493850][ T29] audit: type=1400 audit(66.410:60): avc: denied { execute_no_trans } for pid=3093 comm="sh" path="/syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 68.760996][ T29] audit: type=1400 audit(68.680:61): avc: denied { mounton } for pid=3093 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=806 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 68.765641][ T29] audit: type=1400 audit(68.690:62): avc: denied { mount } for pid=3093 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 68.775108][ T3093] cgroup: Unknown subsys name 'net' [ 68.780827][ T29] audit: type=1400 audit(68.700:63): avc: denied { unmount } for pid=3093 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 68.959540][ T3093] cgroup: Unknown subsys name 'cpuset' [ 68.966726][ T3093] cgroup: Unknown subsys name 'hugetlb' [ 68.967743][ T3093] cgroup: Unknown subsys name 'rlimit' [ 69.171511][ T29] audit: type=1400 audit(69.090:64): avc: denied { setattr } for pid=3093 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 69.176772][ T29] audit: type=1400 audit(69.100:65): avc: denied { mounton } for pid=3093 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 69.177550][ T29] audit: type=1400 audit(69.100:66): avc: denied { mount } for pid=3093 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 69.382480][ T3095] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 69.386146][ T29] audit: type=1400 audit(69.310:67): avc: denied { relabelto } for pid=3095 comm="mkswap" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 69.390071][ T29] audit: type=1400 audit(69.310:68): avc: denied { write } for pid=3095 comm="mkswap" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 69.432517][ T29] audit: type=1400 audit(69.350:69): avc: denied { read } for pid=3093 comm="syz-executor" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 69.433856][ T29] audit: type=1400 audit(69.350:70): avc: denied { open } for pid=3093 comm="syz-executor" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 77.169787][ T3093] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 79.295438][ T29] audit: type=1400 audit(79.220:71): avc: denied { execmem } for pid=3096 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 79.356005][ T29] audit: type=1400 audit(79.280:72): avc: denied { read } for pid=3098 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 79.358246][ T29] audit: type=1400 audit(79.280:73): avc: denied { open } for pid=3098 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 79.362402][ T29] audit: type=1400 audit(79.280:74): avc: denied { mounton } for pid=3098 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 79.389162][ T29] audit: type=1400 audit(79.310:75): avc: denied { module_request } for pid=3098 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 79.473704][ T29] audit: type=1400 audit(79.390:76): avc: denied { sys_module } for pid=3099 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 80.219605][ T29] audit: type=1400 audit(80.140:77): avc: denied { ioctl } for pid=3098 comm="syz-executor" path="/dev/net/tun" dev="devtmpfs" ino=677 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 81.495161][ T3098] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 81.500405][ T3099] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 81.507231][ T3098] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 81.511687][ T3099] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 82.381005][ T3099] hsr_slave_0: entered promiscuous mode [ 82.387157][ T3099] hsr_slave_1: entered promiscuous mode [ 82.459406][ T3098] hsr_slave_0: entered promiscuous mode [ 82.462210][ T3098] hsr_slave_1: entered promiscuous mode [ 82.469003][ T3098] debugfs: 'hsr0' already exists in 'hsr' [ 82.470308][ T3098] Cannot create hsr debugfs directory [ 82.916292][ T29] audit: type=1400 audit(82.840:78): avc: denied { create } for pid=3099 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 82.919056][ T29] audit: type=1400 audit(82.840:79): avc: denied { write } for pid=3099 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 82.924864][ T29] audit: type=1400 audit(82.850:80): avc: denied { read } for pid=3099 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 82.946027][ T3099] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 82.981409][ T3099] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 83.002618][ T3099] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 83.012095][ T3099] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 83.021522][ T3098] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 83.047772][ T3098] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 83.070483][ T3098] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 83.081487][ T3098] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 83.798973][ T3098] 8021q: adding VLAN 0 to HW filter on device bond0 [ 83.851654][ T3099] 8021q: adding VLAN 0 to HW filter on device bond0 [ 86.399804][ T3098] veth0_vlan: entered promiscuous mode [ 86.413876][ T3098] veth1_vlan: entered promiscuous mode [ 86.454242][ T3098] veth0_macvtap: entered promiscuous mode [ 86.459551][ T3098] veth1_macvtap: entered promiscuous mode [ 86.520016][ T38] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 86.521011][ T38] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 86.521110][ T38] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 86.521173][ T38] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 86.625410][ T29] audit: type=1400 audit(86.550:81): avc: denied { mount } for pid=3098 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 86.629976][ T29] audit: type=1400 audit(86.550:82): avc: denied { mounton } for pid=3098 comm="syz-executor" path="/syzkaller.M7d4Qo/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 86.645181][ T29] audit: type=1400 audit(86.570:83): avc: denied { mount } for pid=3098 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 86.651771][ T29] audit: type=1400 audit(86.570:84): avc: denied { mounton } for pid=3098 comm="syz-executor" path="/syzkaller.M7d4Qo/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 86.659151][ T29] audit: type=1400 audit(86.580:85): avc: denied { mounton } for pid=3098 comm="syz-executor" path="/syzkaller.M7d4Qo/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=2214 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 86.676339][ T29] audit: type=1400 audit(86.600:86): avc: denied { unmount } for pid=3098 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 86.682239][ T29] audit: type=1400 audit(86.600:87): avc: denied { mounton } for pid=3098 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=772 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 86.688026][ T29] audit: type=1400 audit(86.610:88): avc: denied { mount } for pid=3098 comm="syz-executor" name="/" dev="gadgetfs" ino=2215 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 86.695629][ T29] audit: type=1400 audit(86.620:89): avc: denied { mount } for pid=3098 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 86.699115][ T29] audit: type=1400 audit(86.620:90): avc: denied { mounton } for pid=3098 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 86.761441][ T3098] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 86.849704][ T3099] veth0_vlan: entered promiscuous mode [ 86.875578][ T3099] veth1_vlan: entered promiscuous mode [ 86.948956][ T3099] veth0_macvtap: entered promiscuous mode [ 86.959994][ T3099] veth1_macvtap: entered promiscuous mode [ 87.012780][ T1369] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 87.014807][ T1369] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 87.016897][ T1369] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 87.017187][ T1369] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 87.879041][ T3715] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=3715 comm=syz.1.5 [ 89.109853][ T3744] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3744 comm=syz.1.19 [ 89.332525][ T3748] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=3748 comm=syz.1.21 [ 92.495247][ T29] kauditd_printk_skb: 18 callbacks suppressed [ 92.495593][ T29] audit: type=1400 audit(92.420:109): avc: denied { create } for pid=3789 comm="syz.0.41" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 92.667041][ T3794] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=281 sclass=netlink_route_socket pid=3794 comm=syz.0.43 [ 93.273121][ C0] hrtimer: interrupt took 488256 ns [ 93.526338][ T29] audit: type=1400 audit(93.450:110): avc: denied { create } for pid=3811 comm="syz.0.52" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 93.539260][ T29] audit: type=1400 audit(93.460:111): avc: denied { ioctl } for pid=3811 comm="syz.0.52" path="socket:[2370]" dev="sockfs" ino=2370 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 94.107146][ T3822] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3822 comm=syz.0.57 [ 94.934967][ T29] audit: type=1400 audit(94.860:112): avc: denied { write } for pid=3846 comm="syz.1.69" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 95.141094][ T29] audit: type=1400 audit(95.060:113): avc: denied { create } for pid=3855 comm="syz.1.74" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 95.145718][ T29] audit: type=1400 audit(95.070:114): avc: denied { write } for pid=3855 comm="syz.1.74" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 95.231713][ T29] audit: type=1400 audit(95.150:115): avc: denied { ioctl } for pid=3857 comm="syz.1.75" path="socket:[3591]" dev="sockfs" ino=3591 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 95.236345][ T29] audit: type=1400 audit(95.160:116): avc: denied { bind } for pid=3857 comm="syz.1.75" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 95.246439][ T29] audit: type=1400 audit(95.170:117): avc: denied { write } for pid=3857 comm="syz.1.75" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 95.350101][ T29] audit: type=1400 audit(95.270:118): avc: denied { accept } for pid=3859 comm="syz.1.76" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 97.646141][ T29] kauditd_printk_skb: 1 callbacks suppressed [ 97.646334][ T29] audit: type=1400 audit(97.570:120): avc: denied { write } for pid=3869 comm="syz.0.80" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 98.006865][ T3878] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=3878 comm=syz.0.84 [ 98.095971][ T29] audit: type=1400 audit(98.010:121): avc: denied { unmount } for pid=3099 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 98.490803][ T29] audit: type=1400 audit(98.410:122): avc: denied { write } for pid=3894 comm="syz.1.92" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 98.491933][ T3895] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=3895 comm=syz.1.92 [ 98.881316][ T29] audit: type=1400 audit(98.800:123): avc: denied { associate } for pid=3909 comm="syz.1.100" name="pfkey" scontext=root:object_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 99.323695][ T3928] veth0_to_team: entered promiscuous mode [ 99.324183][ T3928] veth0_to_team: entered allmulticast mode [ 99.638596][ T29] audit: type=1400 audit(99.560:124): avc: denied { create } for pid=3941 comm="syz.1.115" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 99.647413][ T29] audit: type=1400 audit(99.560:125): avc: denied { write } for pid=3941 comm="syz.1.115" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 100.045574][ T29] audit: type=1400 audit(99.970:126): avc: denied { setopt } for pid=3954 comm="syz.1.121" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 100.157243][ T3960] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3960 comm=syz.1.124 [ 100.473836][ T29] audit: type=1400 audit(100.390:127): avc: denied { setopt } for pid=3969 comm="syz.0.129" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 100.482140][ T29] audit: type=1400 audit(100.400:128): avc: denied { map } for pid=3969 comm="syz.0.129" path="socket:[3801]" dev="sockfs" ino=3801 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 100.487597][ T29] audit: type=1400 audit(100.400:129): avc: denied { read } for pid=3969 comm="syz.0.129" path="socket:[3801]" dev="sockfs" ino=3801 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 100.529846][ T3972] Zero length message leads to an empty skb [ 100.842837][ T3984] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=5130 sclass=netlink_audit_socket pid=3984 comm=syz.1.136 [ 104.246855][ T29] kauditd_printk_skb: 1 callbacks suppressed [ 104.249623][ T29] audit: type=1400 audit(104.170:131): avc: denied { create } for pid=4019 comm="syz.0.153" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 104.261765][ T29] audit: type=1400 audit(104.180:132): avc: denied { ioctl } for pid=4019 comm="syz.0.153" path="socket:[2689]" dev="sockfs" ino=2689 ioctlcmd=0x54d9 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 104.579968][ T4034] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=4034 comm=syz.0.160 [ 104.700606][ T29] audit: type=1400 audit(104.620:133): avc: denied { ioctl } for pid=4040 comm="syz.1.164" path="socket:[2719]" dev="sockfs" ino=2719 ioctlcmd=0x64aa scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 105.397823][ T4066] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4066 comm=syz.0.175 [ 105.565364][ T29] audit: type=1400 audit(105.490:134): avc: denied { setopt } for pid=4071 comm="syz.1.179" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 106.528209][ T4094] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2057 sclass=netlink_route_socket pid=4094 comm=syz.0.190 [ 107.010652][ T4104] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4104 comm=syz.0.195 [ 107.454708][ T29] audit: type=1400 audit(107.380:135): avc: denied { map_create } for pid=4120 comm="syz.0.203" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 107.457204][ T29] audit: type=1400 audit(107.380:136): avc: denied { map_read map_write } for pid=4120 comm="syz.0.203" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 107.462205][ T29] audit: type=1400 audit(107.380:137): avc: denied { prog_load } for pid=4120 comm="syz.0.203" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 107.466893][ T29] audit: type=1400 audit(107.390:138): avc: denied { bpf } for pid=4120 comm="syz.0.203" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 108.300398][ T4154] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=4154 comm=syz.1.220 [ 109.178084][ T29] audit: type=1400 audit(109.100:139): avc: denied { create } for pid=4184 comm="syz.0.236" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 109.186421][ T29] audit: type=1400 audit(109.110:140): avc: denied { write } for pid=4184 comm="syz.0.236" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 109.704639][ T4205] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4205 comm=syz.0.246 [ 110.097997][ T4230] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=637 sclass=netlink_xfrm_socket pid=4230 comm=syz.1.258 [ 111.165941][ T29] audit: type=1400 audit(111.090:141): avc: denied { perfmon } for pid=4255 comm="syz.0.270" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 111.189894][ T29] audit: type=1400 audit(111.110:142): avc: denied { prog_run } for pid=4255 comm="syz.0.270" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 115.949706][ T4302] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4302 comm=syz.1.292 [ 116.569140][ T29] audit: type=1400 audit(116.490:143): avc: denied { create } for pid=4308 comm="syz.1.296" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 116.591250][ T29] audit: type=1400 audit(116.510:144): avc: denied { connect } for pid=4308 comm="syz.1.296" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 116.598212][ T29] audit: type=1400 audit(116.520:145): avc: denied { shutdown } for pid=4308 comm="syz.1.296" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 116.609992][ T29] audit: type=1400 audit(116.530:146): avc: denied { create } for pid=4310 comm="syz.0.297" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 116.620508][ T29] audit: type=1400 audit(116.540:147): avc: denied { write } for pid=4310 comm="syz.0.297" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 116.819599][ T29] audit: type=1400 audit(116.740:148): avc: denied { create } for pid=4316 comm="syz.0.300" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1 [ 116.827911][ T29] audit: type=1400 audit(116.750:149): avc: denied { write } for pid=4316 comm="syz.0.300" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1 [ 117.654063][ T4351] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4351 comm=syz.0.316 [ 118.100687][ T4371] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1795 sclass=netlink_route_socket pid=4371 comm=syz.0.326 [ 118.316870][ T29] audit: type=1400 audit(118.240:150): avc: denied { create } for pid=4380 comm="syz.0.331" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 118.322541][ T29] audit: type=1400 audit(118.240:151): avc: denied { connect } for pid=4380 comm="syz.0.331" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 118.326844][ T29] audit: type=1400 audit(118.250:152): avc: denied { bind } for pid=4380 comm="syz.0.331" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 118.930177][ T4404] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=4404 comm=syz.0.343 [ 119.173795][ T4414] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4414 comm=syz.0.348 [ 124.926608][ T29] kauditd_printk_skb: 1 callbacks suppressed [ 124.927053][ T29] audit: type=1400 audit(124.850:154): avc: denied { getopt } for pid=4494 comm="syz.0.387" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 126.023932][ T29] audit: type=1400 audit(125.940:155): avc: denied { write } for pid=4513 comm="syz.0.396" name="if_inet6" dev="proc" ino=4026532712 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 126.452045][ T29] audit: type=1400 audit(126.370:156): avc: denied { audit_write } for pid=4521 comm="syz.0.400" capability=29 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 126.865429][ T4528] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=152 sclass=netlink_route_socket pid=4528 comm=syz.0.403 [ 127.122409][ T4532] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4532 comm=syz.0.405 [ 127.170633][ T4534] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4534 comm=syz.0.406 [ 127.600718][ T4546] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4546 comm=syz.0.412 [ 128.908266][ T29] audit: type=1400 audit(128.830:157): avc: denied { watch watch_reads } for pid=4595 comm="syz.1.437" path="pipe:[626]" dev="pipefs" ino=626 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=1 [ 129.114079][ T29] audit: type=1400 audit(129.020:158): avc: denied { create } for pid=4599 comm="syz.1.439" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 129.114528][ T29] audit: type=1400 audit(129.030:159): avc: denied { ioctl } for pid=4599 comm="syz.1.439" path="socket:[5089]" dev="sockfs" ino=5089 ioctlcmd=0x4503 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 130.195961][ T29] audit: type=1400 audit(130.120:160): avc: denied { listen } for pid=4613 comm="syz.1.446" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 130.201635][ T29] audit: type=1400 audit(130.120:161): avc: denied { accept } for pid=4613 comm="syz.1.446" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 131.546690][ T4629] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4629 comm=syz.0.453 [ 131.921713][ T29] audit: type=1400 audit(131.840:162): avc: denied { read write } for pid=4636 comm="syz.0.457" name="binder-control" dev="binder" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 131.922993][ T29] audit: type=1400 audit(131.840:163): avc: denied { open } for pid=4636 comm="syz.0.457" path="/dev/binderfs/binder-control" dev="binder" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 134.784798][ T29] audit: type=1400 audit(134.710:164): avc: denied { map } for pid=4663 comm="syz.1.469" path="socket:[5703]" dev="sockfs" ino=5703 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tcp_socket permissive=1 [ 136.211999][ T29] audit: type=1400 audit(136.130:165): avc: denied { read } for pid=4677 comm="syz.1.477" path="socket:[5721]" dev="sockfs" ino=5721 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 137.513678][ T29] audit: type=1400 audit(137.430:166): avc: denied { read } for pid=4701 comm="syz.1.489" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 137.768395][ T4706] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=4706 comm=syz.1.491 [ 137.888217][ T4708] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=4708 comm=syz.1.492 [ 138.666300][ T4733] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4733 comm=syz.1.505 [ 138.769908][ T4738] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4738 comm=syz.1.506 [ 138.931984][ T4744] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4744 comm=syz.1.510 [ 139.480030][ T4764] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=4764 comm=syz.0.520 [ 140.406586][ T4766] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=4766 comm=syz.0.525 [ 140.835221][ T4778] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=4778 comm=syz.0.526 [ 141.779470][ T4793] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4793 comm=syz.1.534 [ 142.037690][ T4796] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=4796 comm=syz.1.535 [ 142.983534][ T4804] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4804 comm=syz.1.540 [ 148.296652][ T4902] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4902 comm=syz.0.589 [ 148.506875][ T4908] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4908 comm=syz.0.592 [ 148.884599][ T4922] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4922 comm=syz.1.598 [ 149.414446][ T4938] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4938 comm=syz.0.607 [ 149.482648][ T4940] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4940 comm=syz.0.608 [ 153.920397][ T4994] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=281 sclass=netlink_route_socket pid=4994 comm=syz.1.634 [ 154.398987][ T5006] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=281 sclass=netlink_route_socket pid=5006 comm=syz.1.640 [ 157.134308][ T5094] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5094 comm=syz.1.684 [ 160.462804][ T5129] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5129 comm=syz.1.698 [ 160.870321][ T5142] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5142 comm=syz.1.707 [ 594.273486][ C0] watchdog: BUG: soft lockup - CPU#0 stuck for 430s! [swapper/0:0] [ 594.273776][ C0] Modules linked in: [ 594.274621][ C0] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Not tainted syzkaller #0 PREEMPT [ 594.274905][ C0] Hardware name: ARM-Versatile Express [ 594.275136][ C0] PC is at _raw_spin_unlock_irq+0x28/0x54 [ 594.275988][ C0] LR is at tmigr_handle_remote_up+0x268/0x4b0 [ 594.276059][ C0] pc : [<81abba7c>] lr : [<80346df4>] psr: 60000113 [ 594.276107][ C0] sp : 82801be0 ip : 82801bf0 fp : 82801bec [ 594.276145][ C0] r10: 00000001 r9 : 00000025 r8 : c6da8680 [ 594.276193][ C0] r7 : ddddb488 r6 : 82801cb8 r5 : 830bf3b0 r4 : 830bf380 [ 594.276242][ C0] r3 : 0000c867 r2 : 00000103 r1 : 830bf3b0 r0 : ddddb488 [ 594.276401][ C0] Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment user [ 594.276485][ C0] Control: 30c5387d Table: 85175300 DAC: fffffffd [ 594.276599][ C0] Call trace: [ 594.276884][ C0] [<81abba54>] (_raw_spin_unlock_irq) from [<80346df4>] (tmigr_handle_remote_up+0x268/0x4b0) [ 594.277254][ C0] [<80346b8c>] (tmigr_handle_remote_up) from [<803450a4>] (__walk_groups_from+0x3c/0xe4) [ 594.277398][ C0] r10:8281b500 r9:8280c820 r8:80346b8c r7:82801cb8 r6:830bf380 r5:00000002 [ 594.277453][ C0] r4:830bf380 [ 594.277486][ C0] [<80345068>] (__walk_groups_from) from [<8034743c>] (tmigr_handle_remote+0xe8/0x108) [ 594.277585][ C0] r9:82804d80 r8:00000102 r7:00000001 r6:00000002 r5:00000002 r4:dddc7488 [ 594.277610][ C0] [<80347354>] (tmigr_handle_remote) from [<80327600>] (run_timer_softirq+0x30/0x34) [ 594.277681][ C0] r4:82804084 [ 594.277702][ C0] [<803275d0>] (run_timer_softirq) from [<8025b55c>] (handle_softirqs+0x140/0x458) [ 594.277782][ C0] [<8025b41c>] (handle_softirqs) from [<8025b9d0>] (__irq_exit_rcu+0x110/0x1d0) [ 594.277870][ C0] r10:00000000 r9:8281b500 r8:00000000 r7:82801dd8 r6:82443ff8 r5:8247f12c [ 594.277896][ C0] r4:8281b500 [ 594.277914][ C0] [<8025b8c0>] (__irq_exit_rcu) from [<8025bd48>] (irq_exit+0x10/0x18) [ 594.277986][ C0] r5:8247f12c r4:826c3a9c [ 594.278005][ C0] [<8025bd38>] (irq_exit) from [<81aad6a4>] (generic_handle_arch_irq+0x7c/0x80) [ 594.278078][ C0] [<81aad628>] (generic_handle_arch_irq) from [<80200bdc>] (__irq_svc+0x7c/0xbc) [ 594.278226][ C0] Exception stack(0x82801dd8 to 0x82801e20) [ 594.278411][ C0] 1dc0: 00000001 00000000 [ 594.278472][ C0] 1de0: 00007bb3 00007bb1 841aa168 00000004 00000001 841aa168 84214e88 841aa040 [ 594.278516][ C0] 1e00: 00000000 82801e3c 82801e28 82801e28 81abbc0c 81abbc34 80000013 ffffffff [ 594.278600][ C0] r9:8281b500 r8:84214e88 r7:82801e0c r6:ffffffff r5:80000013 r4:81abbc34 [ 594.278623][ C0] [<81abbbf4>] (_raw_spin_lock) from [<809c77ac>] (gpio_mmio_set+0x44/0x80) [ 594.278711][ C0] r5:00000004 r4:841aa040 [ 594.278730][ C0] [<809c7768>] (gpio_mmio_set) from [<809b7f68>] (gpiochip_set+0x1c/0x44) [ 594.278824][ C0] r7:00000001 r6:00000000 r5:00000002 r4:83fa10e8 [ 594.278845][ C0] [<809b7f4c>] (gpiochip_set) from [<809ba830>] (gpiod_set_raw_value_commit+0x78/0x218) [ 594.278911][ C0] [<809ba7b8>] (gpiod_set_raw_value_commit) from [<809bc0d0>] (gpiod_set_value_nocheck+0x44/0x58) [ 594.278992][ C0] r10:00000000 r9:00000000 r8:00000001 r7:dddce4c0 r6:83878b58 r5:00000001 [ 594.279014][ C0] r4:83fa10e8 [ 594.279031][ C0] [<809bc08c>] (gpiod_set_value_nocheck) from [<809bc120>] (gpiod_set_value+0x3c/0x88) [ 594.279092][ C0] [<809bc0e4>] (gpiod_set_value) from [<809cc8bc>] (gpio_led_set+0x5c/0x60) [ 594.279160][ C0] r5:000000ff r4:845eb224 [ 594.279179][ C0] [<809cc860>] (gpio_led_set) from [<809ca1e4>] (led_set_brightness+0x84/0x90) [ 594.279245][ C0] r5:000000ff r4:845eb224 [ 594.279263][ C0] [<809ca160>] (led_set_brightness) from [<809cbd64>] (led_trigger_event+0x40/0x58) [ 594.279330][ C0] r5:000000ff r4:845eb224 [ 594.279348][ C0] [<809cbd24>] (led_trigger_event) from [<809cd3c0>] (ledtrig_cpu+0xac/0xf4) [ 594.279421][ C0] r7:dddce4c0 r6:00000002 r5:82b15cd8 r4:000001fd [ 594.279440][ C0] [<809cd314>] (ledtrig_cpu) from [<80227a38>] (arch_cpu_idle_exit+0x14/0x18) [ 594.279525][ C0] r9:00000000 r8:00000000 r7:8280c710 r6:8281b500 r5:8280c6d0 r4:00000000 [ 594.279548][ C0] [<80227a24>] (arch_cpu_idle_exit) from [<802b158c>] (do_idle+0x5c/0x2d8) [ 594.279620][ C0] [<802b1530>] (do_idle) from [<802b1b38>] (cpu_startup_entry+0x30/0x34) [ 594.279704][ C0] r10:8281aff4 r9:8280c680 r8:823bec00 r7:00000000 r6:deffc06c r5:828222e8 [ 594.279730][ C0] r4:000000ed [ 594.279756][ C0] [<802b1b08>] (cpu_startup_entry) from [<81aaf0bc>] (kernel_init+0x0/0x138) [ 594.279837][ C0] [<81aaefdc>] (rest_init) from [<8260145c>] (start_kernel+0x844/0x860) [ 594.279949][ C0] [<82600c18>] (start_kernel) from [<00000000>] (0x0) [ 594.280909][ C0] Sending NMI from CPU 0 to CPUs 1: [ 594.281788][ C1] NMI backtrace for cpu 1 [ 594.282044][ C1] CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Not tainted syzkaller #0 PREEMPT [ 594.282116][ C1] Hardware name: ARM-Versatile Express [ 594.282151][ C1] PC is at _raw_spin_lock+0x40/0x58 [ 594.282237][ C1] LR is at _raw_spin_lock+0x18/0x58 [ 594.282277][ C1] pc : [<81abbc34>] lr : [<81abbc0c>] psr: 80000113 [ 594.282307][ C1] sp : df805d68 ip : df805d68 fp : df805d7c [ 594.282331][ C1] r10: 81c05450 r9 : 841aa040 r8 : 84214e88 [ 594.282354][ C1] r7 : 841aa168 r6 : 00000000 r5 : 00000001 r4 : 841aa168 [ 594.282380][ C1] r3 : 00007bb1 r2 : 00007bb2 r1 : 00000000 r0 : 00000001 [ 594.282409][ C1] Flags: Nzcv IRQs on FIQs on Mode SVC_32 ISA ARM Segment none [ 594.282448][ C1] Control: 30c5387d Table: 85e66800 DAC: 00000000 [ 594.282471][ C1] Call trace: frame pointer underflow [ 594.282589][ C1] [<81abbbf4>] (_raw_spin_lock) from [<809c77ac>] (gpio_mmio_set+0x44/0x80) [ 594.282684][ C1] r5:00000001 r4:841aa040 [ 594.282706][ C1] [<809c7768>] (gpio_mmio_set) from [<809b7f68>] (gpiochip_set+0x1c/0x44) [ 594.282790][ C1] r7:00000000 r6:00000000 r5:00000000 r4:83fa10c0 [ 594.282809][ C1] [<809b7f4c>] (gpiochip_set) from [<809ba830>] (gpiod_set_raw_value_commit+0x78/0x218) [ 594.282879][ C1] [<809ba7b8>] (gpiod_set_raw_value_commit) from [<809bc0d0>] (gpiod_set_value_nocheck+0x44/0x58) [ 594.282961][ C1] r10:81c05450 r9:df805ebc r8:00000102 r7:ffffca2c r6:00000027 r5:00000000 [ 594.282984][ C1] r4:83fa10c0 [ 594.283003][ C1] [<809bc08c>] (gpiod_set_value_nocheck) from [<809bc120>] (gpiod_set_value+0x3c/0x88) [ 594.283061][ C1] [<809bc0e4>] (gpiod_set_value) from [<809cc8bc>] (gpio_led_set+0x5c/0x60) [ 594.283122][ C1] r5:845eb044 r4:845eb044 [ 594.283139][ C1] [<809cc860>] (gpio_led_set) from [<809ca154>] (led_set_brightness_nosleep+0x38/0x44) [ 594.283201][ C1] r5:845eb044 r4:84bbb24c [ 594.283221][ C1] [<809ca11c>] (led_set_brightness_nosleep) from [<809cd1b8>] (led_heartbeat_function+0x84/0x144) [ 594.283281][ C1] [<809cd134>] (led_heartbeat_function) from [<80326f70>] (call_timer_fn+0x30/0x220) [ 594.283359][ C1] r7:ffffca2c r6:809cd134 r5:84bbb24c r4:83216000 [ 594.283380][ C1] [<80326f40>] (call_timer_fn) from [<80327424>] (__run_timers+0x2c4/0x3f8) [ 594.283457][ C1] r9:df805ebc r8:ffffca2c r7:00000000 r6:809cd134 r5:dddd9f00 r4:84bbb24c [ 594.283477][ C1] [<80327160>] (__run_timers) from [<803275c0>] (run_timer_base+0x68/0x78) [ 594.283564][ C1] r10:83216000 r9:82804d80 r8:00000102 r7:00000001 r6:00000082 r5:00000002 [ 594.283589][ C1] r4:dddd9f00 [ 594.283608][ C1] [<80327558>] (run_timer_base) from [<803275ec>] (run_timer_softirq+0x1c/0x34) [ 594.283674][ C1] r4:82804084 [ 594.283692][ C1] [<803275d0>] (run_timer_softirq) from [<8025b55c>] (handle_softirqs+0x140/0x458) [ 594.283761][ C1] [<8025b41c>] (handle_softirqs) from [<8025b9d0>] (__irq_exit_rcu+0x110/0x1d0) [ 594.283841][ C1] r10:00000000 r9:83216000 r8:00000000 r7:df865e08 r6:82443ff8 r5:8247f12c [ 594.283863][ C1] r4:83216000 [ 594.283881][ C1] [<8025b8c0>] (__irq_exit_rcu) from [<8025bd48>] (irq_exit+0x10/0x18) [ 594.283951][ C1] r5:8247f12c r4:826c3a9c [ 594.283970][ C1] [<8025bd38>] (irq_exit) from [<81aad6a4>] (generic_handle_arch_irq+0x7c/0x80) [ 594.284038][ C1] [<81aad628>] (generic_handle_arch_irq) from [<81a7d654>] (call_with_stack+0x1c/0x20) [ 594.284119][ C1] r9:83216000 r8:84214e88 r7:df865e3c r6:ffffffff r5:60000013 r4:809c7fac [ 594.284141][ C1] [<81a7d638>] (call_with_stack) from [<80200bec>] (__irq_svc+0x8c/0xbc) [ 594.284206][ C1] Exception stack(0xdf865e08 to 0xdf865e50) [ 594.284253][ C1] 5e00: e0162008 00000009 00007bb1 00000000 e0162008 00000009 [ 594.284292][ C1] 5e20: 00000001 841aa168 84214e88 841aa040 00000000 df865e6c df865e58 df865e58 [ 594.284365][ C1] 5e40: 809c7fa8 809c7fac 60000013 ffffffff [ 594.284389][ C1] [<809c7f8c>] (gpio_mmio_write32) from [<809c77cc>] (gpio_mmio_set+0x64/0x80) [ 594.284463][ C1] r5:00000008 r4:841aa040 [ 594.284482][ C1] [<809c7768>] (gpio_mmio_set) from [<809b7f68>] (gpiochip_set+0x1c/0x44) [ 594.284583][ C1] r7:00000001 r6:00000000 r5:00000003 r4:83fa10fc [ 594.284603][ C1] [<809b7f4c>] (gpiochip_set) from [<809ba830>] (gpiod_set_raw_value_commit+0x78/0x218) [ 594.284666][ C1] [<809ba7b8>] (gpiod_set_raw_value_commit) from [<809bc0d0>] (gpiod_set_value_nocheck+0x44/0x58) [ 594.284743][ C1] r10:00000000 r9:00000000 r8:00000001 r7:ddde24c0 r6:83878bd8 r5:00000001 [ 594.284769][ C1] r4:83fa10fc [ 594.284786][ C1] [<809bc08c>] (gpiod_set_value_nocheck) from [<809bc120>] (gpiod_set_value+0x3c/0x88) [ 594.284846][ C1] [<809bc0e4>] (gpiod_set_value) from [<809cc8bc>] (gpio_led_set+0x5c/0x60) [ 594.284911][ C1] r5:000000ff r4:845eb314 [ 594.284931][ C1] [<809cc860>] (gpio_led_set) from [<809ca1e4>] (led_set_brightness+0x84/0x90) [ 594.284995][ C1] r5:000000ff r4:845eb314 [ 594.285013][ C1] [<809ca160>] (led_set_brightness) from [<809cbd64>] (led_trigger_event+0x40/0x58) [ 594.285074][ C1] r5:000000ff r4:845eb314 [ 594.285093][ C1] [<809cbd24>] (led_trigger_event) from [<809cd3c0>] (ledtrig_cpu+0xac/0xf4) [ 594.285164][ C1] r7:ddde24c0 r6:00000002 r5:82b15cd8 r4:000000fe [ 594.285183][ C1] [<809cd314>] (ledtrig_cpu) from [<80227a38>] (arch_cpu_idle_exit+0x14/0x18) [ 594.285301][ C1] r9:00000000 r8:00000001 r7:8280c710 r6:83216000 r5:8280c6d0 r4:00000001 [ 594.285326][ C1] [<80227a24>] (arch_cpu_idle_exit) from [<802b158c>] (do_idle+0x5c/0x2d8) [ 594.285399][ C1] [<802b1530>] (do_idle) from [<802b1b38>] (cpu_startup_entry+0x30/0x34) [ 594.285485][ C1] r10:00000000 r9:414fc0f0 r8:80003000 r7:82a7b4a4 r6:83216000 r5:00000001 [ 594.285528][ C1] r4:00000092 [ 594.285550][ C1] [<802b1b08>] (cpu_startup_entry) from [<8022f360>] (secondary_start_kernel+0x128/0x194) [ 594.285628][ C1] [<8022f238>] (secondary_start_kernel) from [<80220094>] (__enable_mmu+0x0/0xc) [ 594.285715][ C1] r7:82a7b4a4 r6:30c0387d r5:00000000 r4:830b7bc0 [ 594.287118][ C0] Kernel panic - not syncing: softlockup: hung tasks [ 594.321616][ C0] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Tainted: G L syzkaller #0 PREEMPT [ 594.322171][ C0] Tainted: [L]=SOFTLOCKUP [ 594.322370][ C0] Hardware name: ARM-Versatile Express [ 594.322622][ C0] Call trace: [ 594.322924][ C0] [<80201a74>] (dump_backtrace) from [<80201b70>] (show_stack+0x18/0x1c) [ 594.323307][ C0] r7:82296540 r6:8281b500 r5:00000000 r4:822956f0 [ 594.323548][ C0] [<80201b58>] (show_stack) from [<8021ee08>] (dump_stack_lvl+0x54/0x7c) [ 594.323950][ C0] [<8021edb4>] (dump_stack_lvl) from [<8021ee48>] (dump_stack+0x18/0x1c) [ 594.324333][ C0] r5:00000000 r4:82a7bd14 [ 594.324529][ C0] [<8021ee30>] (dump_stack) from [<80202648>] (vpanic+0xe0/0x2e8) [ 594.324870][ C0] [<80202568>] (vpanic) from [<80202884>] (trace_suspend_resume+0x0/0xd8) [ 594.325222][ C0] r7:82ac27f8 [ 594.325424][ C0] [<80202850>] (panic) from [<80383f14>] (watchdog_timer_fn+0x2dc/0x350) [ 594.325791][ C0] r3:00000001 r2:00004000 r1:82a7bd1c r0:82296540 [ 594.326076][ C0] [<80383c38>] (watchdog_timer_fn) from [<80329b64>] (__hrtimer_run_queues+0x1c4/0x454) [ 594.326474][ C0] r10:8281b500 r9:00000000 r8:dddc7130 r7:80383c38 r6:dddc7000 r5:dddc7040 [ 594.326870][ C0] r4:dddc75d8 [ 594.327009][ C0] [<803299a0>] (__hrtimer_run_queues) from [<8032b168>] (hrtimer_interrupt+0x148/0x2bc) [ 594.327388][ C0] r10:5917a7d0 r9:dddc7180 r8:dddc7130 r7:0000008a r6:00000003 r5:20000193 [ 594.327693][ C0] r4:dddc7000 [ 594.327863][ C0] [<8032b020>] (hrtimer_interrupt) from [<81340630>] (arch_timer_handler_virt+0x30/0x38) [ 594.328274][ C0] r10:81d0fc78 r9:8309e400 r8:00000000 r7:00000000 r6:00000000 r5:82498528 [ 594.328604][ C0] r4:8309de40 [ 594.328780][ C0] [<81340600>] (arch_timer_handler_virt) from [<802ef9b4>] (handle_percpu_devid_irq+0x128/0x34c) [ 594.329195][ C0] [<802ef88c>] (handle_percpu_devid_irq) from [<802e8b44>] (handle_irq_desc+0x74/0x84) [ 594.329604][ C0] r10:00000001 r9:8281b500 r8:00000000 r7:df80a00c r6:826c2388 r5:df80a000 [ 594.329923][ C0] r4:8280cc44 [ 594.330077][ C0] [<802e8ad0>] (handle_irq_desc) from [<802e8bc0>] (generic_handle_domain_irq+0x18/0x1c) [ 594.330453][ C0] [<802e8ba8>] (generic_handle_domain_irq) from [<802012c8>] (gic_handle_irq+0x68/0x7c) [ 594.330863][ C0] [<80201260>] (gic_handle_irq) from [<81aad688>] (generic_handle_arch_irq+0x60/0x80) [ 594.331261][ C0] r7:82801b90 r6:82443ff8 r5:8247f12c r4:826c3a9c [ 594.331512][ C0] [<81aad628>] (generic_handle_arch_irq) from [<80200bdc>] (__irq_svc+0x7c/0xbc) [ 594.331891][ C0] Exception stack(0x82801b90 to 0x82801bd8) [ 594.332137][ C0] 1b80: ddddb488 830bf3b0 00000103 0000c867 [ 594.332535][ C0] 1ba0: 830bf380 830bf3b0 82801cb8 ddddb488 c6da8680 00000025 00000001 82801bec [ 594.332878][ C0] 1bc0: 82801bf0 82801be0 80346df4 81abba7c 60000113 ffffffff [ 594.333163][ C0] r9:8281b500 r8:c6da8680 r7:82801bc4 r6:ffffffff r5:60000113 r4:81abba7c [ 594.333501][ C0] [<81abba54>] (_raw_spin_unlock_irq) from [<80346df4>] (tmigr_handle_remote_up+0x268/0x4b0) [ 594.333890][ C0] [<80346b8c>] (tmigr_handle_remote_up) from [<803450a4>] (__walk_groups_from+0x3c/0xe4) [ 594.334285][ C0] r10:8281b500 r9:8280c820 r8:80346b8c r7:82801cb8 r6:830bf380 r5:00000002 [ 594.334574][ C0] r4:830bf380 [ 594.334733][ C0] [<80345068>] (__walk_groups_from) from [<8034743c>] (tmigr_handle_remote+0xe8/0x108) [ 594.335125][ C0] r9:82804d80 r8:00000102 r7:00000001 r6:00000002 r5:00000002 r4:dddc7488 [ 594.335460][ C0] [<80347354>] (tmigr_handle_remote) from [<80327600>] (run_timer_softirq+0x30/0x34) [ 594.335793][ C0] r4:82804084 [ 594.336025][ C0] [<803275d0>] (run_timer_softirq) from [<8025b55c>] (handle_softirqs+0x140/0x458) [ 594.336516][ C0] [<8025b41c>] (handle_softirqs) from [<8025b9d0>] (__irq_exit_rcu+0x110/0x1d0) [ 594.336906][ C0] r10:00000000 r9:8281b500 r8:00000000 r7:82801dd8 r6:82443ff8 r5:8247f12c [ 594.337249][ C0] r4:8281b500 [ 594.337405][ C0] [<8025b8c0>] (__irq_exit_rcu) from [<8025bd48>] (irq_exit+0x10/0x18) [ 594.337761][ C0] r5:8247f12c r4:826c3a9c [ 594.338027][ C0] [<8025bd38>] (irq_exit) from [<81aad6a4>] (generic_handle_arch_irq+0x7c/0x80) [ 594.338405][ C0] [<81aad628>] (generic_handle_arch_irq) from [<80200bdc>] (__irq_svc+0x7c/0xbc) [ 594.338770][ C0] Exception stack(0x82801dd8 to 0x82801e20) [ 594.339008][ C0] 1dc0: 00000001 00000000 [ 594.339322][ C0] 1de0: 00007bb3 00007bb1 841aa168 00000004 00000001 841aa168 84214e88 841aa040 [ 594.339638][ C0] 1e00: 00000000 82801e3c 82801e28 82801e28 81abbc0c 81abbc34 80000013 ffffffff [ 594.339983][ C0] r9:8281b500 r8:84214e88 r7:82801e0c r6:ffffffff r5:80000013 r4:81abbc34 [ 594.340270][ C0] [<81abbbf4>] (_raw_spin_lock) from [<809c77ac>] (gpio_mmio_set+0x44/0x80) [ 594.340669][ C0] r5:00000004 r4:841aa040 [ 594.340860][ C0] [<809c7768>] (gpio_mmio_set) from [<809b7f68>] (gpiochip_set+0x1c/0x44) [ 594.341235][ C0] r7:00000001 r6:00000000 r5:00000002 r4:83fa10e8 [ 594.341469][ C0] [<809b7f4c>] (gpiochip_set) from [<809ba830>] (gpiod_set_raw_value_commit+0x78/0x218) [ 594.341842][ C0] [<809ba7b8>] (gpiod_set_raw_value_commit) from [<809bc0d0>] (gpiod_set_value_nocheck+0x44/0x58) [ 594.342250][ C0] r10:00000000 r9:00000000 r8:00000001 r7:dddce4c0 r6:83878b58 r5:00000001 [ 594.342542][ C0] r4:83fa10e8 [ 594.342694][ C0] [<809bc08c>] (gpiod_set_value_nocheck) from [<809bc120>] (gpiod_set_value+0x3c/0x88) [ 594.343050][ C0] [<809bc0e4>] (gpiod_set_value) from [<809cc8bc>] (gpio_led_set+0x5c/0x60) [ 594.343344][ C0] r5:000000ff r4:845eb224 [ 594.343570][ C0] [<809cc860>] (gpio_led_set) from [<809ca1e4>] (led_set_brightness+0x84/0x90) [ 594.343901][ C0] r5:000000ff r4:845eb224 [ 594.344056][ C0] [<809ca160>] (led_set_brightness) from [<809cbd64>] (led_trigger_event+0x40/0x58) [ 594.344437][ C0] r5:000000ff r4:845eb224 [ 594.344628][ C0] [<809cbd24>] (led_trigger_event) from [<809cd3c0>] (ledtrig_cpu+0xac/0xf4) [ 594.345007][ C0] r7:dddce4c0 r6:00000002 r5:82b15cd8 r4:000001fd [ 594.345254][ C0] [<809cd314>] (ledtrig_cpu) from [<80227a38>] (arch_cpu_idle_exit+0x14/0x18) [ 594.345637][ C0] r9:00000000 r8:00000000 r7:8280c710 r6:8281b500 r5:8280c6d0 r4:00000000 [ 594.345936][ C0] [<80227a24>] (arch_cpu_idle_exit) from [<802b158c>] (do_idle+0x5c/0x2d8) [ 594.346284][ C0] [<802b1530>] (do_idle) from [<802b1b38>] (cpu_startup_entry+0x30/0x34) [ 594.346645][ C0] r10:8281aff4 r9:8280c680 r8:823bec00 r7:00000000 r6:deffc06c r5:828222e8 [ 594.347023][ C0] r4:000000ed [ 594.347201][ C0] [<802b1b08>] (cpu_startup_entry) from [<81aaf0bc>] (kernel_init+0x0/0x138) [ 594.347586][ C0] [<81aaefdc>] (rest_init) from [<8260145c>] (start_kernel+0x844/0x860) [ 594.347956][ C0] [<82600c18>] (start_kernel) from [<00000000>] (0x0) [ 594.350831][ C0] Rebooting in 86400 seconds..