last executing test programs: 5.471488708s ago: executing program 1 (id=969): r0 = openat$hwrng(0xffffff9c, &(0x7f0000000200), 0x741000, 0x0) close_range(r0, r0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x143000, 0x0) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r0, 0xc01064b5, 0x0) 5.356536503s ago: executing program 1 (id=970): r0 = syz_open_dev$audion(&(0x7f0000000080), 0x3, 0x268040) close(r0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$mptcp(&(0x7f0000000040), r0) 3.432656266s ago: executing program 1 (id=972): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x101002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'nicvf0\x00', 0x7101}) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) ioctl$TUNSETSTEERINGEBPF(r0, 0x800454e0, &(0x7f0000000200)) 3.269491207s ago: executing program 1 (id=977): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$SO_TIMESTAMP(r1, 0x1, 0x40, &(0x7f0000000000)=0x9373, 0x4) 619.609802ms ago: executing program 1 (id=976): r0 = landlock_create_ruleset(&(0x7f00000000c0)={0xc45a, 0x1, 0x2}, 0x18, 0x0) landlock_restrict_self(r0, 0x0) r1 = syz_open_dev$sndctrl(&(0x7f0000002200), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r1, 0xc0485510, 0x0) 380.710732ms ago: executing program 0 (id=979): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$SO_TIMESTAMP(r1, 0x1, 0x40, &(0x7f0000000000)=0x9373, 0x4) 380.537252ms ago: executing program 1 (id=980): r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='fdinfo\x00') fchdir(r0) exit(0xffff) chdir(&(0x7f0000000140)='./file0\x00') 299.184852ms ago: executing program 0 (id=981): r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/bus/input/handlers\x00', 0x0, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) openat$iommufd(0xffffff9c, &(0x7f0000000000), 0x82c01, 0x0) ioctl$IOMMU_IOAS_ALLOC(r0, 0x3b81, &(0x7f0000000240)={0xc}) 209.253094ms ago: executing program 0 (id=982): r0 = landlock_create_ruleset(&(0x7f00000000c0)={0xc45a, 0x1, 0x2}, 0x18, 0x0) landlock_restrict_self(r0, 0x0) r1 = syz_open_dev$sndctrl(&(0x7f0000002200), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r1, 0xc0485510, 0x0) 140.090733ms ago: executing program 0 (id=983): r0 = openat$selinux_checkreqprot(0xffffff9c, &(0x7f0000000140), 0x140, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)={0xffffffffffffffff}) dup3(r1, r0, 0x0) sendmsg$NL80211_CMD_NEW_KEY(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={0x0}, 0x1, 0x0, 0x0, 0x40091}, 0x4090) 69.718591ms ago: executing program 0 (id=984): r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000180), 0x200241, 0x0) close(r0) socket$netlink(0x10, 0x3, 0xf) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000000)={0x4, 0x8, 0xfa00, {0xffffffffffffffff, 0x9}}, 0x10) 0s ago: executing program 0 (id=985): r0 = openat$selinux_enforce(0xffffff9c, &(0x7f0000000100), 0x600500, 0x0) close_range(r0, r0, 0x2) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) write$P9_RXATTRWALK(r0, &(0x7f00000002c0)={0xf, 0x1f, 0x1, 0x7}, 0xf) kernel console output (not intermixed with test programs): [ 47.906606][ T29] audit: type=1400 audit(47.800:56): avc: denied { read write } for pid=3090 comm="sftp-server" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 47.919388][ T29] audit: type=1400 audit(47.820:57): avc: denied { open } for pid=3090 comm="sftp-server" path="/dev/null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 Warning: Permanently added '[localhost]:3774' (ED25519) to the list of known hosts. [ 61.898868][ T29] audit: type=1400 audit(61.750:58): avc: denied { name_bind } for pid=3093 comm="sshd-session" src=30000 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 63.882830][ T29] audit: type=1400 audit(63.780:59): avc: denied { execute } for pid=3094 comm="sh" name="syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 63.940044][ T29] audit: type=1400 audit(63.850:60): avc: denied { execute_no_trans } for pid=3094 comm="sh" path="/syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 67.194587][ T29] audit: type=1400 audit(67.100:61): avc: denied { mounton } for pid=3094 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=806 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 67.198766][ T29] audit: type=1400 audit(67.100:62): avc: denied { mount } for pid=3094 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 67.210599][ T3094] cgroup: Unknown subsys name 'net' [ 67.215507][ T29] audit: type=1400 audit(67.120:63): avc: denied { unmount } for pid=3094 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 67.386511][ T3094] cgroup: Unknown subsys name 'cpuset' [ 67.394139][ T3094] cgroup: Unknown subsys name 'hugetlb' [ 67.395095][ T3094] cgroup: Unknown subsys name 'rlimit' [ 67.612323][ T29] audit: type=1400 audit(67.520:64): avc: denied { setattr } for pid=3094 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 67.615675][ T29] audit: type=1400 audit(67.520:65): avc: denied { mounton } for pid=3094 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 67.618865][ T29] audit: type=1400 audit(67.520:66): avc: denied { mount } for pid=3094 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 67.798427][ T3096] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 67.801287][ T29] audit: type=1400 audit(67.710:67): avc: denied { relabelto } for pid=3096 comm="mkswap" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 67.805645][ T29] audit: type=1400 audit(67.710:68): avc: denied { write } for pid=3096 comm="mkswap" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 67.842818][ T29] audit: type=1400 audit(67.750:69): avc: denied { read } for pid=3094 comm="syz-executor" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 67.845329][ T29] audit: type=1400 audit(67.750:70): avc: denied { open } for pid=3094 comm="syz-executor" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 75.632159][ T3094] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 77.850237][ T29] audit: type=1400 audit(77.760:71): avc: denied { execmem } for pid=3097 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 77.916727][ T29] audit: type=1400 audit(77.820:72): avc: denied { read } for pid=3099 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 77.920242][ T29] audit: type=1400 audit(77.820:73): avc: denied { open } for pid=3099 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 77.933898][ T29] audit: type=1400 audit(77.840:74): avc: denied { mounton } for pid=3099 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 77.955075][ T29] audit: type=1400 audit(77.860:75): avc: denied { module_request } for pid=3099 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 78.039378][ T29] audit: type=1400 audit(77.940:76): avc: denied { sys_module } for pid=3099 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 78.727306][ T29] audit: type=1400 audit(78.630:77): avc: denied { ioctl } for pid=3099 comm="syz-executor" path="/dev/net/tun" dev="devtmpfs" ino=677 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 79.817571][ T3099] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 79.846414][ T3099] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 79.909261][ T3100] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 79.915873][ T3100] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 80.717085][ T3099] hsr_slave_0: entered promiscuous mode [ 80.721011][ T3099] hsr_slave_1: entered promiscuous mode [ 80.801922][ T3100] hsr_slave_0: entered promiscuous mode [ 80.804217][ T3100] hsr_slave_1: entered promiscuous mode [ 80.807039][ T3100] debugfs: 'hsr0' already exists in 'hsr' [ 80.808146][ T3100] Cannot create hsr debugfs directory [ 81.307951][ T29] audit: type=1400 audit(81.210:78): avc: denied { create } for pid=3099 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 81.312154][ T29] audit: type=1400 audit(81.220:79): avc: denied { write } for pid=3099 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 81.323080][ T29] audit: type=1400 audit(81.230:80): avc: denied { read } for pid=3099 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 81.337573][ T3099] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 81.353369][ T3099] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 81.372897][ T3099] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 81.382637][ T3099] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 81.476471][ T3100] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 81.487403][ T3100] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 81.510580][ T3100] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 81.531890][ T3100] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 82.186979][ T3099] 8021q: adding VLAN 0 to HW filter on device bond0 [ 82.290632][ T3100] 8021q: adding VLAN 0 to HW filter on device bond0 [ 85.070617][ T3099] veth0_vlan: entered promiscuous mode [ 85.088070][ T3099] veth1_vlan: entered promiscuous mode [ 85.147430][ T3100] veth0_vlan: entered promiscuous mode [ 85.158044][ T3099] veth0_macvtap: entered promiscuous mode [ 85.172590][ T3099] veth1_macvtap: entered promiscuous mode [ 85.179489][ T3100] veth1_vlan: entered promiscuous mode [ 85.254404][ T128] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 85.258036][ T128] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 85.260153][ T128] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 85.260244][ T128] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 85.273291][ T3100] veth0_macvtap: entered promiscuous mode [ 85.305661][ T3100] veth1_macvtap: entered promiscuous mode [ 85.427525][ T95] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 85.440557][ T95] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 85.452258][ T95] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 85.456268][ T95] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 85.484839][ T29] audit: type=1400 audit(85.380:81): avc: denied { mount } for pid=3099 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 85.493552][ T29] audit: type=1400 audit(85.400:82): avc: denied { mounton } for pid=3099 comm="syz-executor" path="/syzkaller.Ev0t0I/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 85.501692][ T29] audit: type=1400 audit(85.410:83): avc: denied { mount } for pid=3099 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 85.512945][ T29] audit: type=1400 audit(85.420:84): avc: denied { mounton } for pid=3099 comm="syz-executor" path="/syzkaller.Ev0t0I/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 85.517638][ T29] audit: type=1400 audit(85.420:85): avc: denied { mounton } for pid=3099 comm="syz-executor" path="/syzkaller.Ev0t0I/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=1997 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 85.538248][ T29] audit: type=1400 audit(85.440:86): avc: denied { unmount } for pid=3099 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 85.547549][ T29] audit: type=1400 audit(85.450:87): avc: denied { mounton } for pid=3099 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=772 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 85.559052][ T29] audit: type=1400 audit(85.460:88): avc: denied { mount } for pid=3099 comm="syz-executor" name="/" dev="gadgetfs" ino=1998 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 85.560721][ T29] audit: type=1400 audit(85.460:89): avc: denied { mount } for pid=3099 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 85.563104][ T29] audit: type=1400 audit(85.470:90): avc: denied { mounton } for pid=3099 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 85.647343][ T3099] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 86.725076][ T3729] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3729 comm=syz.0.7 [ 87.251324][ T3755] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 90.760856][ T29] kauditd_printk_skb: 22 callbacks suppressed [ 90.761941][ T29] audit: type=1400 audit(90.660:113): avc: denied { map } for pid=3842 comm="syz.0.60" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=2614 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 90.763566][ T29] audit: type=1400 audit(90.670:114): avc: denied { read write } for pid=3842 comm="syz.0.60" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=2614 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 93.366037][ T29] audit: type=1400 audit(93.270:115): avc: denied { append } for pid=3857 comm="syz.0.67" name="vcsa" dev="devtmpfs" ino=15 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 93.503041][ T29] audit: type=1400 audit(93.410:116): avc: denied { connect } for pid=3861 comm="syz.0.69" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 93.730655][ T3872] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=3872 comm=syz.1.74 [ 93.973391][ T29] audit: type=1400 audit(93.880:117): avc: denied { create } for pid=3878 comm="syz.0.77" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 93.985241][ T29] audit: type=1400 audit(93.890:118): avc: denied { ioctl } for pid=3878 comm="syz.0.77" path="socket:[3342]" dev="sockfs" ino=3342 ioctlcmd=0x45ef scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 94.215089][ T3885] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=1551 sclass=netlink_audit_socket pid=3885 comm=syz.0.80 [ 94.308016][ T3887] capability: warning: `syz.0.81' uses deprecated v2 capabilities in a way that may be insecure [ 94.313588][ T29] audit: type=1400 audit(94.220:119): avc: denied { setopt } for pid=3886 comm="syz.0.81" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 94.403882][ T29] audit: type=1400 audit(94.310:120): avc: denied { ioctl } for pid=3889 comm="syz.0.82" path="socket:[2685]" dev="sockfs" ino=2685 ioctlcmd=0x89f3 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 95.111070][ T29] audit: type=1400 audit(95.020:121): avc: denied { map_create } for pid=3907 comm="syz.0.91" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 95.114795][ T29] audit: type=1400 audit(95.020:122): avc: denied { bpf } for pid=3907 comm="syz.0.91" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 99.102768][ T29] kauditd_printk_skb: 4 callbacks suppressed [ 99.109456][ T29] audit: type=1400 audit(99.010:127): avc: denied { unmount } for pid=3099 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 101.562196][ T29] audit: type=1400 audit(101.470:128): avc: denied { create } for pid=3957 comm="syz.1.115" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 102.352126][ T3976] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=7 sclass=netlink_route_socket pid=3976 comm=syz.1.124 [ 102.633593][ T29] audit: type=1400 audit(102.540:129): avc: denied { create } for pid=3987 comm="syz.1.130" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 103.062866][ T4009] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4009 comm=syz.0.140 [ 103.549841][ T29] audit: type=1400 audit(103.460:130): avc: denied { setopt } for pid=4023 comm="syz.1.147" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 103.740032][ T29] audit: type=1400 audit(103.650:131): avc: denied { write } for pid=4028 comm="syz.1.149" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 104.281843][ T29] audit: type=1400 audit(104.190:132): avc: denied { write } for pid=4048 comm="syz.0.159" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 104.305768][ T29] audit: type=1400 audit(104.210:133): avc: denied { create } for pid=4049 comm="syz.1.160" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 104.314957][ T29] audit: type=1400 audit(104.220:134): avc: denied { write } for pid=4049 comm="syz.1.160" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 104.573780][ T4061] Zero length message leads to an empty skb [ 105.223575][ T4085] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4085 comm=syz.1.177 [ 106.532367][ T4113] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4113 comm=syz.0.191 [ 106.949454][ T29] audit: type=1400 audit(106.850:135): avc: denied { ioctl } for pid=4120 comm="syz.0.195" path="socket:[4151]" dev="sockfs" ino=4151 ioctlcmd=0x8912 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 110.430214][ T29] audit: type=1400 audit(110.340:136): avc: denied { setopt } for pid=4147 comm="syz.1.207" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 111.850621][ T29] audit: type=1400 audit(111.760:137): avc: denied { getopt } for pid=4169 comm="syz.0.217" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 111.947791][ T4172] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4172 comm=syz.0.218 [ 112.319783][ T4180] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4180 comm=syz.0.222 [ 116.975098][ T4211] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4211 comm=syz.0.236 [ 117.652282][ T29] audit: type=1400 audit(117.560:138): avc: denied { write } for pid=4230 comm="syz.1.246" path="socket:[3903]" dev="sockfs" ino=3903 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 121.776343][ T4289] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4289 comm=syz.0.270 [ 121.881567][ T4291] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5121 sclass=netlink_route_socket pid=4291 comm=syz.0.271 [ 122.911010][ T4306] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4306 comm=syz.1.275 [ 123.016876][ T4311] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5121 sclass=netlink_route_socket pid=4311 comm=syz.1.276 [ 123.239881][ T4320] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4320 comm=syz.0.280 [ 123.474418][ T29] audit: type=1400 audit(123.380:139): avc: denied { block_suspend } for pid=4325 comm="syz.0.285" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 123.680897][ T4336] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4336 comm=syz.1.288 [ 126.369952][ T4345] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5137 sclass=netlink_route_socket pid=4345 comm=syz.0.293 [ 126.755452][ T4361] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5137 sclass=netlink_route_socket pid=4361 comm=syz.1.298 [ 131.020793][ T4454] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=567 sclass=netlink_tcpdiag_socket pid=4454 comm=syz.1.333 [ 131.432380][ T4491] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4491 comm=syz.1.343 [ 131.459451][ T4492] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=567 sclass=netlink_tcpdiag_socket pid=4492 comm=syz.0.339 [ 131.601825][ T4500] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=1793 sclass=netlink_audit_socket pid=4500 comm=syz.0.345 [ 131.652880][ T4503] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4503 comm=syz.0.346 [ 131.791936][ T29] audit: type=1400 audit(131.700:140): avc: denied { create } for pid=4508 comm="syz.1.349" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 131.797475][ T29] audit: type=1400 audit(131.700:141): avc: denied { create } for pid=4508 comm="syz.1.349" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 131.805480][ T29] audit: type=1400 audit(131.710:142): avc: denied { ioctl } for pid=4508 comm="syz.1.349" path="socket:[5339]" dev="sockfs" ino=5339 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 131.874277][ T4514] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=1793 sclass=netlink_audit_socket pid=4514 comm=syz.1.351 [ 148.973362][ T29] audit: type=1400 audit(148.880:143): avc: denied { getopt } for pid=4650 comm="syz.1.419" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 161.652678][ T4666] capability: warning: `syz.0.430' uses 32-bit capabilities (legacy support in use) [ 164.303416][ T29] audit: type=1400 audit(164.210:144): avc: denied { ioctl } for pid=4718 comm="syz.0.456" path="socket:[6179]" dev="sockfs" ino=6179 ioctlcmd=0x8946 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 166.902187][ T29] audit: type=1400 audit(166.810:145): avc: denied { write } for pid=4746 comm="syz.0.466" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 167.636957][ T4765] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1793 sclass=netlink_route_socket pid=4765 comm=syz.1.474 [ 169.606875][ T4778] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1793 sclass=netlink_route_socket pid=4778 comm=syz.0.479 [ 175.028126][ T29] audit: type=1400 audit(174.930:146): avc: denied { audit_write } for pid=4815 comm="syz.1.502" capability=29 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 183.801418][ T29] audit: type=1400 audit(183.700:147): avc: denied { setattr } for pid=4971 comm="syz.1.576" name="NETLINK" dev="sockfs" ino=6627 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 184.881607][ T29] audit: type=1400 audit(184.790:148): avc: denied { create } for pid=5016 comm="syz.0.599" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 184.890695][ T29] audit: type=1400 audit(184.800:149): avc: denied { write } for pid=5016 comm="syz.0.599" path="socket:[7263]" dev="sockfs" ino=7263 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 185.714081][ T29] audit: type=1400 audit(185.620:150): avc: denied { setopt } for pid=5028 comm="syz.1.604" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 187.365079][ T5079] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5079 comm=syz.0.628 [ 187.718881][ T5090] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5090 comm=syz.1.634 [ 187.938077][ T5099] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5099 comm=syz.1.638 [ 188.287926][ T5112] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5112 comm=syz.0.645 [ 191.582886][ T29] audit: type=1400 audit(191.490:151): avc: denied { bind } for pid=5192 comm="syz.0.682" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 196.111070][ T5294] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=1538 sclass=netlink_audit_socket pid=5294 comm=syz.1.732 [ 196.495538][ T5309] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=1538 sclass=netlink_audit_socket pid=5309 comm=syz.0.738 [ 197.050472][ T29] audit: type=1400 audit(196.950:152): avc: denied { read } for pid=5329 comm="syz.1.750" path="socket:[7810]" dev="sockfs" ino=7810 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 207.498114][ T5418] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5418 comm=syz.1.794 [ 207.601254][ T29] audit: type=1400 audit(207.510:153): avc: denied { read } for pid=5421 comm="syz.1.795" name="binder-control" dev="binder" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 207.601742][ T29] audit: type=1400 audit(207.510:154): avc: denied { open } for pid=5421 comm="syz.1.795" path="/dev/binderfs/binder-control" dev="binder" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 207.612633][ T29] audit: type=1400 audit(207.510:155): avc: denied { ioctl } for pid=5421 comm="syz.1.795" path="/dev/binderfs/binder-control" dev="binder" ino=2 ioctlcmd=0x1282 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 207.677092][ T5424] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5424 comm=syz.0.799 [ 208.566188][ T29] audit: type=1400 audit(208.470:156): avc: denied { remount } for pid=5454 comm="syz.1.815" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 208.709359][ T5462] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5462 comm=syz.1.813 [ 208.795496][ T5465] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5465 comm=syz.0.819 [ 211.218939][ T29] audit: type=1400 audit(211.120:157): avc: denied { setopt } for pid=5550 comm="syz.1.858" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 212.332289][ T5595] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5595 comm=syz.1.879 [ 212.623298][ T5608] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5608 comm=syz.0.885 [ 213.107293][ T5627] veth0_to_team: entered promiscuous mode [ 213.107805][ T5627] veth0_to_team: entered allmulticast mode [ 213.415644][ T5641] veth0_to_team: entered promiscuous mode [ 213.417066][ T5641] veth0_to_team: entered allmulticast mode [ 214.016474][ T29] audit: type=1400 audit(213.920:158): avc: denied { setopt } for pid=5669 comm="syz.1.916" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 214.072657][ T29] audit: type=1400 audit(213.980:159): avc: denied { setattr } for pid=5671 comm="syz.0.917" name="CAN_ISOTP" dev="sockfs" ino=9481 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 660.308744][ C0] watchdog: BUG: soft lockup - CPU#0 stuck for 430s! [swapper/0:0] [ 660.309025][ C0] Modules linked in: [ 660.309789][ C0] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Not tainted syzkaller #0 PREEMPT [ 660.310023][ C0] Hardware name: ARM-Versatile Express [ 660.310240][ C0] PC is at _raw_spin_unlock_irq+0x28/0x54 [ 660.310952][ C0] LR is at tmigr_handle_remote_up+0x268/0x4b0 [ 660.311012][ C0] pc : [<81abb53c>] lr : [<80346df4>] psr: 60000113 [ 660.311049][ C0] sp : 82801be0 ip : 82801bf0 fp : 82801bec [ 660.311080][ C0] r10: 00000001 r9 : 00000036 r8 : 38bacc00 [ 660.311116][ C0] r7 : ddddb488 r6 : 82801cb8 r5 : 830bf3b0 r4 : 830bf380 [ 660.311152][ C0] r3 : 000042da r2 : 00000103 r1 : 830bf3b0 r0 : ddddb488 [ 660.311262][ C0] Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment user [ 660.311327][ C0] Control: 30c5387d Table: 85f7cac0 DAC: fffffffd [ 660.311424][ C0] Call trace: [ 660.311735][ C0] [<81abb514>] (_raw_spin_unlock_irq) from [<80346df4>] (tmigr_handle_remote_up+0x268/0x4b0) [ 660.312058][ C0] [<80346b8c>] (tmigr_handle_remote_up) from [<803450a4>] (__walk_groups_from+0x3c/0xe4) [ 660.312179][ C0] r10:8281b500 r9:8280c820 r8:80346b8c r7:82801cb8 r6:830bf380 r5:00000002 [ 660.312218][ C0] r4:830bf380 [ 660.312238][ C0] [<80345068>] (__walk_groups_from) from [<8034743c>] (tmigr_handle_remote+0xe8/0x108) [ 660.312317][ C0] r9:82804d80 r8:00000102 r7:00000001 r6:00000002 r5:00000002 r4:dddc7488 [ 660.312335][ C0] [<80347354>] (tmigr_handle_remote) from [<80327600>] (run_timer_softirq+0x30/0x34) [ 660.312397][ C0] r4:82804084 [ 660.312414][ C0] [<803275d0>] (run_timer_softirq) from [<8025b55c>] (handle_softirqs+0x140/0x458) [ 660.312475][ C0] [<8025b41c>] (handle_softirqs) from [<8025b9d0>] (__irq_exit_rcu+0x110/0x1d0) [ 660.312547][ C0] r10:00000000 r9:8281b500 r8:00000000 r7:82801dd8 r6:82443e68 r5:8247ef9c [ 660.312567][ C0] r4:8281b500 [ 660.312581][ C0] [<8025b8c0>] (__irq_exit_rcu) from [<8025bd48>] (irq_exit+0x10/0x18) [ 660.312649][ C0] r5:8247ef9c r4:826c3a9c [ 660.312667][ C0] [<8025bd38>] (irq_exit) from [<81aad164>] (generic_handle_arch_irq+0x7c/0x80) [ 660.312729][ C0] [<81aad0e8>] (generic_handle_arch_irq) from [<80200bdc>] (__irq_svc+0x7c/0xbc) [ 660.312856][ C0] Exception stack(0x82801dd8 to 0x82801e20) [ 660.313015][ C0] 1dc0: 00000001 00000000 [ 660.313065][ C0] 1de0: 0000ed36 0000ed34 8412b768 00000004 00000001 8412b768 840b9288 8412b640 [ 660.313098][ C0] 1e00: 00000000 82801e3c 82801e28 82801e28 81abb6cc 81abb6f4 80000013 ffffffff [ 660.313165][ C0] r9:8281b500 r8:840b9288 r7:82801e0c r6:ffffffff r5:80000013 r4:81abb6f4 [ 660.313182][ C0] [<81abb6b4>] (_raw_spin_lock) from [<809c74b8>] (gpio_mmio_set+0x44/0x80) [ 660.313257][ C0] r5:00000004 r4:8412b640 [ 660.313274][ C0] [<809c7474>] (gpio_mmio_set) from [<809b7c74>] (gpiochip_set+0x1c/0x44) [ 660.313345][ C0] r7:00000001 r6:00000000 r5:00000002 r4:8428a7a8 [ 660.313362][ C0] [<809b7c58>] (gpiochip_set) from [<809ba53c>] (gpiod_set_raw_value_commit+0x78/0x218) [ 660.313416][ C0] [<809ba4c4>] (gpiod_set_raw_value_commit) from [<809bbddc>] (gpiod_set_value_nocheck+0x44/0x58) [ 660.313484][ C0] r10:00000000 r9:00000000 r8:00000001 r7:dddce4c0 r6:83927258 r5:00000001 [ 660.313503][ C0] r4:8428a7a8 [ 660.313517][ C0] [<809bbd98>] (gpiod_set_value_nocheck) from [<809bbe2c>] (gpiod_set_value+0x3c/0x88) [ 660.313566][ C0] [<809bbdf0>] (gpiod_set_value) from [<809cc5c8>] (gpio_led_set+0x5c/0x60) [ 660.313629][ C0] r5:000000ff r4:84cb0a24 [ 660.313666][ C0] [<809cc56c>] (gpio_led_set) from [<809c9ef0>] (led_set_brightness+0x84/0x90) [ 660.313720][ C0] r5:000000ff r4:84cb0a24 [ 660.313736][ C0] [<809c9e6c>] (led_set_brightness) from [<809cba70>] (led_trigger_event+0x40/0x58) [ 660.313791][ C0] r5:000000ff r4:84cb0a24 [ 660.313806][ C0] [<809cba30>] (led_trigger_event) from [<809cd0cc>] (ledtrig_cpu+0xac/0xf4) [ 660.313865][ C0] r7:dddce4c0 r6:00000002 r5:82b15cd8 r4:000001fd [ 660.313880][ C0] [<809cd020>] (ledtrig_cpu) from [<80227a38>] (arch_cpu_idle_exit+0x14/0x18) [ 660.313950][ C0] r9:00000000 r8:00000000 r7:8280c710 r6:8281b500 r5:8280c6d0 r4:00000000 [ 660.313968][ C0] [<80227a24>] (arch_cpu_idle_exit) from [<802b158c>] (do_idle+0x5c/0x2d8) [ 660.314028][ C0] [<802b1530>] (do_idle) from [<802b1b38>] (cpu_startup_entry+0x30/0x34) [ 660.314098][ C0] r10:8281aff4 r9:8280c680 r8:823bea70 r7:00000000 r6:deffc06c r5:828222e8 [ 660.314117][ C0] r4:000000ed [ 660.314131][ C0] [<802b1b08>] (cpu_startup_entry) from [<81aaeb7c>] (kernel_init+0x0/0x138) [ 660.314197][ C0] [<81aaea9c>] (rest_init) from [<8260145c>] (start_kernel+0x844/0x860) [ 660.314303][ C0] [<82600c18>] (start_kernel) from [<00000000>] (0x0) [ 660.315015][ C0] Sending NMI from CPU 0 to CPUs 1: [ 660.315661][ C1] NMI backtrace for cpu 1 [ 660.315822][ C1] CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Not tainted syzkaller #0 PREEMPT [ 660.315875][ C1] Hardware name: ARM-Versatile Express [ 660.315905][ C1] PC is at _raw_spin_lock+0x40/0x58 [ 660.315974][ C1] LR is at _raw_spin_lock+0x18/0x58 [ 660.316008][ C1] pc : [<81abb6f4>] lr : [<81abb6cc>] psr: 80000113 [ 660.316029][ C1] sp : df805d68 ip : df805d68 fp : df805d7c [ 660.316047][ C1] r10: 81c05450 r9 : 8412b640 r8 : 840b9288 [ 660.316065][ C1] r7 : 8412b768 r6 : 00000001 r5 : 00000001 r4 : 8412b768 [ 660.316087][ C1] r3 : 0000ed34 r2 : 0000ed35 r1 : 00000000 r0 : 00000001 [ 660.316109][ C1] Flags: Nzcv IRQs on FIQs on Mode SVC_32 ISA ARM Segment none [ 660.316141][ C1] Control: 30c5387d Table: 8509e380 DAC: 00000000 [ 660.316159][ C1] Call trace: frame pointer underflow [ 660.316233][ C1] [<81abb6b4>] (_raw_spin_lock) from [<809c74b8>] (gpio_mmio_set+0x44/0x80) [ 660.316311][ C1] r5:00000001 r4:8412b640 [ 660.316329][ C1] [<809c7474>] (gpio_mmio_set) from [<809b7c74>] (gpiochip_set+0x1c/0x44) [ 660.316403][ C1] r7:00000001 r6:00000000 r5:00000000 r4:8428a780 [ 660.316419][ C1] [<809b7c58>] (gpiochip_set) from [<809ba53c>] (gpiod_set_raw_value_commit+0x78/0x218) [ 660.316486][ C1] [<809ba4c4>] (gpiod_set_raw_value_commit) from [<809bbddc>] (gpiod_set_value_nocheck+0x44/0x58) [ 660.316555][ C1] r10:81c05450 r9:df805ebc r8:00000102 r7:ffffe5bd r6:00000007 r5:00000001 [ 660.316574][ C1] r4:8428a780 [ 660.316588][ C1] [<809bbd98>] (gpiod_set_value_nocheck) from [<809bbe2c>] (gpiod_set_value+0x3c/0x88) [ 660.316646][ C1] [<809bbdf0>] (gpiod_set_value) from [<809cc5c8>] (gpio_led_set+0x5c/0x60) [ 660.316709][ C1] r5:84cb0844 r4:84cb0844 [ 660.316724][ C1] [<809cc56c>] (gpio_led_set) from [<809c9e60>] (led_set_brightness_nosleep+0x38/0x44) [ 660.316780][ C1] r5:84cb0844 r4:84e98b4c [ 660.316796][ C1] [<809c9e28>] (led_set_brightness_nosleep) from [<809ccec4>] (led_heartbeat_function+0x84/0x144) [ 660.316849][ C1] [<809cce40>] (led_heartbeat_function) from [<80326f70>] (call_timer_fn+0x30/0x220) [ 660.316924][ C1] r7:ffffe5bd r6:809cce40 r5:84e98b4c r4:83216000 [ 660.316942][ C1] [<80326f40>] (call_timer_fn) from [<80327424>] (__run_timers+0x2c4/0x3f8) [ 660.317010][ C1] r9:df805ebc r8:ffffe5bd r7:00000000 r6:809cce40 r5:dddd9f00 r4:84e98b4c [ 660.317026][ C1] [<80327160>] (__run_timers) from [<803275c0>] (run_timer_base+0x68/0x78) [ 660.317093][ C1] r10:83216000 r9:82804d80 r8:00000102 r7:00000001 r6:00000082 r5:00000002 [ 660.317113][ C1] r4:dddd9f00 [ 660.317127][ C1] [<80327558>] (run_timer_base) from [<803275ec>] (run_timer_softirq+0x1c/0x34) [ 660.317186][ C1] r4:82804084 [ 660.317202][ C1] [<803275d0>] (run_timer_softirq) from [<8025b55c>] (handle_softirqs+0x140/0x458) [ 660.317263][ C1] [<8025b41c>] (handle_softirqs) from [<8025b9d0>] (__irq_exit_rcu+0x110/0x1d0) [ 660.317333][ C1] r10:00000000 r9:83216000 r8:00000000 r7:df865e08 r6:82443e68 r5:8247ef9c [ 660.317352][ C1] r4:83216000 [ 660.317368][ C1] [<8025b8c0>] (__irq_exit_rcu) from [<8025bd48>] (irq_exit+0x10/0x18) [ 660.317428][ C1] r5:8247ef9c r4:826c3a9c [ 660.317448][ C1] [<8025bd38>] (irq_exit) from [<81aad164>] (generic_handle_arch_irq+0x7c/0x80) [ 660.317514][ C1] [<81aad0e8>] (generic_handle_arch_irq) from [<81a7d0fc>] (call_with_stack+0x1c/0x20) [ 660.317587][ C1] r9:83216000 r8:840b9288 r7:df865e3c r6:ffffffff r5:60000013 r4:809c7cb8 [ 660.317605][ C1] [<81a7d0e0>] (call_with_stack) from [<80200bec>] (__irq_svc+0x8c/0xbc) [ 660.317661][ C1] Exception stack(0xdf865e08 to 0xdf865e50) [ 660.317698][ C1] 5e00: e02c8008 00000008 0000ed34 00000000 e02c8008 00000008 [ 660.317732][ C1] 5e20: 00000001 8412b768 840b9288 8412b640 00000000 df865e6c df865e58 df865e58 [ 660.317757][ C1] 5e40: 809c7cb4 809c7cb8 60000013 ffffffff [ 660.317774][ C1] [<809c7c98>] (gpio_mmio_write32) from [<809c74d8>] (gpio_mmio_set+0x64/0x80) [ 660.317835][ C1] r5:00000008 r4:8412b640 [ 660.317850][ C1] [<809c7474>] (gpio_mmio_set) from [<809b7c74>] (gpiochip_set+0x1c/0x44) [ 660.317920][ C1] r7:00000001 r6:00000000 r5:00000003 r4:8428a7bc [ 660.317934][ C1] [<809b7c58>] (gpiochip_set) from [<809ba53c>] (gpiod_set_raw_value_commit+0x78/0x218) [ 660.317988][ C1] [<809ba4c4>] (gpiod_set_raw_value_commit) from [<809bbddc>] (gpiod_set_value_nocheck+0x44/0x58) [ 660.318055][ C1] r10:00000000 r9:00000000 r8:00000001 r7:ddde24c0 r6:83927ed8 r5:00000001 [ 660.318073][ C1] r4:8428a7bc [ 660.318087][ C1] [<809bbd98>] (gpiod_set_value_nocheck) from [<809bbe2c>] (gpiod_set_value+0x3c/0x88) [ 660.318135][ C1] [<809bbdf0>] (gpiod_set_value) from [<809cc5c8>] (gpio_led_set+0x5c/0x60) [ 660.318186][ C1] r5:000000ff r4:84cb0b14 [ 660.318200][ C1] [<809cc56c>] (gpio_led_set) from [<809c9ef0>] (led_set_brightness+0x84/0x90) [ 660.318253][ C1] r5:000000ff r4:84cb0b14 [ 660.318266][ C1] [<809c9e6c>] (led_set_brightness) from [<809cba70>] (led_trigger_event+0x40/0x58) [ 660.318320][ C1] r5:000000ff r4:84cb0b14 [ 660.318335][ C1] [<809cba30>] (led_trigger_event) from [<809cd0cc>] (ledtrig_cpu+0xac/0xf4) [ 660.318393][ C1] r7:ddde24c0 r6:00000002 r5:82b15cd8 r4:000000fe [ 660.318409][ C1] [<809cd020>] (ledtrig_cpu) from [<80227a38>] (arch_cpu_idle_exit+0x14/0x18) [ 660.318480][ C1] r9:00000000 r8:00000001 r7:8280c710 r6:83216000 r5:8280c6d0 r4:00000001 [ 660.318497][ C1] [<80227a24>] (arch_cpu_idle_exit) from [<802b158c>] (do_idle+0x5c/0x2d8) [ 660.318590][ C1] [<802b1530>] (do_idle) from [<802b1b38>] (cpu_startup_entry+0x30/0x34) [ 660.318665][ C1] r10:00000000 r9:414fc0f0 r8:80003000 r7:82a7b4a4 r6:83216000 r5:00000001 [ 660.318685][ C1] r4:00000092 [ 660.318700][ C1] [<802b1b08>] (cpu_startup_entry) from [<8022f360>] (secondary_start_kernel+0x128/0x194) [ 660.318767][ C1] [<8022f238>] (secondary_start_kernel) from [<80220094>] (__enable_mmu+0x0/0xc) [ 660.318842][ C1] r7:82a7b4a4 r6:30c0387d r5:00000000 r4:830b7bc0 [ 660.320090][ C0] Kernel panic - not syncing: softlockup: hung tasks [ 660.354685][ C0] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Tainted: G L syzkaller #0 PREEMPT [ 660.355032][ C0] Tainted: [L]=SOFTLOCKUP [ 660.355156][ C0] Hardware name: ARM-Versatile Express [ 660.355355][ C0] Call trace: [ 660.355540][ C0] [<80201a74>] (dump_backtrace) from [<80201b70>] (show_stack+0x18/0x1c) [ 660.355863][ C0] r7:822964bc r6:8281b500 r5:00000000 r4:8229566c [ 660.356026][ C0] [<80201b58>] (show_stack) from [<8021ee08>] (dump_stack_lvl+0x54/0x7c) [ 660.356515][ C0] [<8021edb4>] (dump_stack_lvl) from [<8021ee48>] (dump_stack+0x18/0x1c) [ 660.356765][ C0] r5:00000000 r4:82a7bd14 [ 660.356897][ C0] [<8021ee30>] (dump_stack) from [<80202648>] (vpanic+0xe0/0x2e8) [ 660.357143][ C0] [<80202568>] (vpanic) from [<80202884>] (trace_suspend_resume+0x0/0xd8) [ 660.357364][ C0] r7:82ac27f8 [ 660.357485][ C0] [<80202850>] (panic) from [<80383f14>] (watchdog_timer_fn+0x2dc/0x350) [ 660.357846][ C0] r3:00000001 r2:00004000 r1:82a7bd1c r0:822964bc [ 660.358098][ C0] [<80383c38>] (watchdog_timer_fn) from [<80329b64>] (__hrtimer_run_queues+0x1c4/0x454) [ 660.358510][ C0] r10:8281b500 r9:00000000 r8:dddc7130 r7:80383c38 r6:dddc7000 r5:dddc7040 [ 660.358885][ C0] r4:dddc75d8 [ 660.359073][ C0] [<803299a0>] (__hrtimer_run_queues) from [<8032b168>] (hrtimer_interrupt+0x148/0x2bc) [ 660.359498][ C0] r10:b82f57b0 r9:dddc7180 r8:dddc7130 r7:00000099 r6:00000003 r5:20000193 [ 660.359802][ C0] r4:dddc7000 [ 660.359978][ C0] [<8032b020>] (hrtimer_interrupt) from [<813400d8>] (arch_timer_handler_virt+0x30/0x38) [ 660.360382][ C0] r10:81d0fc78 r9:8309e400 r8:00000000 r7:00000000 r6:00000000 r5:82498528 [ 660.360601][ C0] r4:8309de40 [ 660.360739][ C0] [<813400a8>] (arch_timer_handler_virt) from [<802ef9b4>] (handle_percpu_devid_irq+0x128/0x34c) [ 660.361033][ C0] [<802ef88c>] (handle_percpu_devid_irq) from [<802e8b44>] (handle_irq_desc+0x74/0x84) [ 660.361343][ C0] r10:00000001 r9:8281b500 r8:00000000 r7:df80a00c r6:826c2388 r5:df80a000 [ 660.361718][ C0] r4:8280cc44 [ 660.361878][ C0] [<802e8ad0>] (handle_irq_desc) from [<802e8bc0>] (generic_handle_domain_irq+0x18/0x1c) [ 660.362157][ C0] [<802e8ba8>] (generic_handle_domain_irq) from [<802012c8>] (gic_handle_irq+0x68/0x7c) [ 660.362594][ C0] [<80201260>] (gic_handle_irq) from [<81aad148>] (generic_handle_arch_irq+0x60/0x80) [ 660.363029][ C0] r7:82801b90 r6:82443e68 r5:8247ef9c r4:826c3a9c [ 660.363287][ C0] [<81aad0e8>] (generic_handle_arch_irq) from [<80200bdc>] (__irq_svc+0x7c/0xbc) [ 660.363574][ C0] Exception stack(0x82801b90 to 0x82801bd8) [ 660.363771][ C0] 1b80: ddddb488 830bf3b0 00000103 000042da [ 660.364090][ C0] 1ba0: 830bf380 830bf3b0 82801cb8 ddddb488 38bacc00 00000036 00000001 82801bec [ 660.364320][ C0] 1bc0: 82801bf0 82801be0 80346df4 81abb53c 60000113 ffffffff [ 660.364554][ C0] r9:8281b500 r8:38bacc00 r7:82801bc4 r6:ffffffff r5:60000113 r4:81abb53c [ 660.364791][ C0] [<81abb514>] (_raw_spin_unlock_irq) from [<80346df4>] (tmigr_handle_remote_up+0x268/0x4b0) [ 660.365168][ C0] [<80346b8c>] (tmigr_handle_remote_up) from [<803450a4>] (__walk_groups_from+0x3c/0xe4) [ 660.365459][ C0] r10:8281b500 r9:8280c820 r8:80346b8c r7:82801cb8 r6:830bf380 r5:00000002 [ 660.365674][ C0] r4:830bf380 [ 660.365795][ C0] [<80345068>] (__walk_groups_from) from [<8034743c>] (tmigr_handle_remote+0xe8/0x108) [ 660.366085][ C0] r9:82804d80 r8:00000102 r7:00000001 r6:00000002 r5:00000002 r4:dddc7488 [ 660.366303][ C0] [<80347354>] (tmigr_handle_remote) from [<80327600>] (run_timer_softirq+0x30/0x34) [ 660.366634][ C0] r4:82804084 [ 660.366779][ C0] [<803275d0>] (run_timer_softirq) from [<8025b55c>] (handle_softirqs+0x140/0x458) [ 660.367045][ C0] [<8025b41c>] (handle_softirqs) from [<8025b9d0>] (__irq_exit_rcu+0x110/0x1d0) [ 660.367342][ C0] r10:00000000 r9:8281b500 r8:00000000 r7:82801dd8 r6:82443e68 r5:8247ef9c [ 660.367556][ C0] r4:8281b500 [ 660.367666][ C0] [<8025b8c0>] (__irq_exit_rcu) from [<8025bd48>] (irq_exit+0x10/0x18) [ 660.367912][ C0] r5:8247ef9c r4:826c3a9c [ 660.368052][ C0] [<8025bd38>] (irq_exit) from [<81aad164>] (generic_handle_arch_irq+0x7c/0x80) [ 660.368297][ C0] [<81aad0e8>] (generic_handle_arch_irq) from [<80200bdc>] (__irq_svc+0x7c/0xbc) [ 660.368628][ C0] Exception stack(0x82801dd8 to 0x82801e20) [ 660.368884][ C0] 1dc0: 00000001 00000000 [ 660.369227][ C0] 1de0: 0000ed36 0000ed34 8412b768 00000004 00000001 8412b768 840b9288 8412b640 [ 660.369564][ C0] 1e00: 00000000 82801e3c 82801e28 82801e28 81abb6cc 81abb6f4 80000013 ffffffff [ 660.369919][ C0] r9:8281b500 r8:840b9288 r7:82801e0c r6:ffffffff r5:80000013 r4:81abb6f4 [ 660.370294][ C0] [<81abb6b4>] (_raw_spin_lock) from [<809c74b8>] (gpio_mmio_set+0x44/0x80) [ 660.370743][ C0] r5:00000004 r4:8412b640 [ 660.370959][ C0] [<809c7474>] (gpio_mmio_set) from [<809b7c74>] (gpiochip_set+0x1c/0x44) [ 660.371317][ C0] r7:00000001 r6:00000000 r5:00000002 r4:8428a7a8 [ 660.371495][ C0] [<809b7c58>] (gpiochip_set) from [<809ba53c>] (gpiod_set_raw_value_commit+0x78/0x218) [ 660.371781][ C0] [<809ba4c4>] (gpiod_set_raw_value_commit) from [<809bbddc>] (gpiod_set_value_nocheck+0x44/0x58) [ 660.372076][ C0] r10:00000000 r9:00000000 r8:00000001 r7:dddce4c0 r6:83927258 r5:00000001 [ 660.372281][ C0] r4:8428a7a8 [ 660.372396][ C0] [<809bbd98>] (gpiod_set_value_nocheck) from [<809bbe2c>] (gpiod_set_value+0x3c/0x88) [ 660.372809][ C0] [<809bbdf0>] (gpiod_set_value) from [<809cc5c8>] (gpio_led_set+0x5c/0x60) [ 660.373575][ C0] r5:000000ff r4:84cb0a24 [ 660.373782][ C0] [<809cc56c>] (gpio_led_set) from [<809c9ef0>] (led_set_brightness+0x84/0x90) [ 660.374215][ C0] r5:000000ff r4:84cb0a24 [ 660.374361][ C0] [<809c9e6c>] (led_set_brightness) from [<809cba70>] (led_trigger_event+0x40/0x58) [ 660.374691][ C0] r5:000000ff r4:84cb0a24 [ 660.374847][ C0] [<809cba30>] (led_trigger_event) from [<809cd0cc>] (ledtrig_cpu+0xac/0xf4) [ 660.375125][ C0] r7:dddce4c0 r6:00000002 r5:82b15cd8 r4:000001fd [ 660.375288][ C0] [<809cd020>] (ledtrig_cpu) from [<80227a38>] (arch_cpu_idle_exit+0x14/0x18) [ 660.375542][ C0] r9:00000000 r8:00000000 r7:8280c710 r6:8281b500 r5:8280c6d0 r4:00000000 [ 660.375742][ C0] [<80227a24>] (arch_cpu_idle_exit) from [<802b158c>] (do_idle+0x5c/0x2d8) [ 660.375987][ C0] [<802b1530>] (do_idle) from [<802b1b38>] (cpu_startup_entry+0x30/0x34) [ 660.376238][ C0] r10:8281aff4 r9:8280c680 r8:823bea70 r7:00000000 r6:deffc06c r5:828222e8 [ 660.376473][ C0] r4:000000ed [ 660.376593][ C0] [<802b1b08>] (cpu_startup_entry) from [<81aaeb7c>] (kernel_init+0x0/0x138) [ 660.376839][ C0] [<81aaea9c>] (rest_init) from [<8260145c>] (start_kernel+0x844/0x860) [ 660.377093][ C0] [<82600c18>] (start_kernel) from [<00000000>] (0x0) [ 660.379008][ C0] Rebooting in 86400 seconds..