last executing test programs: 2m25.99751925s ago: executing program 1 (id=417): r0 = openat$sw_sync_info(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)) sendmsg$NL80211_CMD_SET_WIPHY(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) 2m25.91812942s ago: executing program 1 (id=419): r0 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000040)={'vxcan1\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000080)={0x1d, r1, 0x2}, 0x18) sendto$inet_nvme_icreq_pdu(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 2m25.83686797s ago: executing program 1 (id=421): r0 = openat$selinux_checkreqprot(0xffffff9c, &(0x7f0000000140), 0x640c03, 0x0) close_range(r0, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) sendmsg$ETHTOOL_MSG_COALESCE_GET(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={0x0}, 0x1, 0x0, 0x0, 0x4008000}, 0x4008040) 2m25.737024062s ago: executing program 1 (id=423): mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000340)='.\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x101091, 0x0) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000080)='.\x00', 0x89901) move_mount(r0, &(0x7f0000000040)='.\x00', 0xffffffffffffff9c, &(0x7f00000005c0)='./file0/file0\x00', 0x20) 2m25.624943066s ago: executing program 1 (id=425): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto(r0, 0x0, 0x0, 0x20004040, &(0x7f0000000280)=@in6={0xa, 0x0, 0x0, @local, 0x1}, 0x80) r1 = fcntl$dupfd(r0, 0x0, r0) recvmsg$can_raw(r1, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x40010020) 2m25.128417269s ago: executing program 1 (id=429): r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}, 0x1, 0x0, 0x0, 0x20000000}, 0x884) 2m25.128279619s ago: executing program 32 (id=429): r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}, 0x1, 0x0, 0x0, 0x20000000}, 0x884) 1.556217095s ago: executing program 2 (id=1557): r0 = openat$selinux_enforce(0xffffff9c, &(0x7f0000000000), 0x260140, 0x0) close_range(r0, 0xffffffffffffffff, 0x2) syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_AUTHENTICATE(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000100)={0x28, 0x0, 0x20, 0x70bd25, 0x25dfdbfc, {{}, {@val={0x8}, @val={0xc, 0x99, {0x7, 0x4e}}}}}, 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x20008090) 1.470349736s ago: executing program 2 (id=1559): r0 = landlock_create_ruleset(&(0x7f00000000c0)={0xc4d8, 0x1, 0x2}, 0x18, 0x0) landlock_restrict_self(r0, 0x0) r1 = openat$uinput(0xffffff9c, &(0x7f0000000000), 0x802, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r1, 0xc06055c8, 0x0) 1.369241219s ago: executing program 2 (id=1560): r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000000), 0x200041, 0x0) close(r0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_PMKSA(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x1c, 0x0, 0x200, 0x70bd26, 0x25dfdbff, {{}, {@val={0x8}, @void}}}, 0x1c}, 0x1, 0x0, 0x0, 0x48000}, 0x4000000) 1.250043894s ago: executing program 2 (id=1561): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_open_dev$dri(&(0x7f0000000180), 0x1, 0x40200) r2 = dup3(r0, r1, 0x80000) syz_genetlink_get_family_id$wireguard(&(0x7f0000002980), r2) 1.140937287s ago: executing program 2 (id=1565): r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = dup3(r1, r0, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000040), r2) 1.033693231s ago: executing program 2 (id=1567): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) sendto$l2tp6(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000000)={0xa, 0x0, 0x40400000, @remote, 0x5}, 0x20) sendmsg$BATADV_CMD_SET_VLAN(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={0x0}, 0x1, 0x0, 0x0, 0x24000001}, 0x28000010) 339.078148ms ago: executing program 0 (id=1575): r0 = openat$nvme_fabrics(0xffffff9c, &(0x7f0000000000), 0x8000, 0x0) close(r0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_opts(r0, 0x29, 0x3b, 0x0, &(0x7f0000000240)) 258.346368ms ago: executing program 0 (id=1576): r0 = openat$mice(0xffffff9c, &(0x7f0000000040), 0x2b0700) close(r0) socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x25dfdbfc, 0x20000}, 0xc) 170.451279ms ago: executing program 0 (id=1577): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r1 = socket$inet6(0xa, 0x80801, 0x0) r2 = dup3(r1, r0, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f00000001c0)={'nat\x00', 0x0, [0xdab, 0x4, 0x5b8c, 0x0, 0x5]}, &(0x7f0000000240)=0x54) 88.752799ms ago: executing program 0 (id=1578): r0 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSFF(r0, 0x40044591, 0x0) r1 = fcntl$dupfd(r0, 0x406, r0) ioctl$DRM_IOCTL_GEM_FLINK(r1, 0xc008640a, 0x0) 8.881539ms ago: executing program 0 (id=1579): r0 = openat$sw_sync_info(0xffffffffffffff9c, &(0x7f00000000c0), 0x65a106, 0x0) close_range(r0, 0xffffffffffffffff, 0x2) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000280)=0x4, 0x4) 0s ago: executing program 0 (id=1580): r0 = open(&(0x7f0000000080)='./bus\x00', 0x1031c0, 0xb4) close(r0) syz_open_dev$ndb(&(0x7f00000000c0), 0x0, 0x80000) ioctl$BLKRAGET(r0, 0x1263, &(0x7f0000000000)) kernel console output (not intermixed with test programs): [ 47.510836][ T29] audit: type=1400 audit(47.450:56): avc: denied { read write } for pid=3087 comm="sftp-server" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 47.513059][ T29] audit: type=1400 audit(47.450:57): avc: denied { open } for pid=3087 comm="sftp-server" path="/dev/null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 Warning: Permanently added '[localhost]:59470' (ED25519) to the list of known hosts. [ 63.029964][ T29] audit: type=1400 audit(62.970:58): avc: denied { name_bind } for pid=3090 comm="sshd-session" src=30000 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 64.655503][ T29] audit: type=1400 audit(64.590:59): avc: denied { execute } for pid=3091 comm="sh" name="syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 64.658161][ T29] audit: type=1400 audit(64.590:60): avc: denied { execute_no_trans } for pid=3091 comm="sh" path="/syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 67.765762][ T29] audit: type=1400 audit(67.700:61): avc: denied { mounton } for pid=3091 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=806 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 67.772711][ T29] audit: type=1400 audit(67.710:62): avc: denied { mount } for pid=3091 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 67.794926][ T3091] cgroup: Unknown subsys name 'net' [ 67.804428][ T29] audit: type=1400 audit(67.740:63): avc: denied { unmount } for pid=3091 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 67.985488][ T3091] cgroup: Unknown subsys name 'cpuset' [ 67.990817][ T3091] cgroup: Unknown subsys name 'hugetlb' [ 67.991625][ T3091] cgroup: Unknown subsys name 'rlimit' [ 68.185673][ T29] audit: type=1400 audit(68.120:64): avc: denied { setattr } for pid=3091 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 68.196055][ T29] audit: type=1400 audit(68.130:65): avc: denied { mounton } for pid=3091 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 68.203555][ T29] audit: type=1400 audit(68.130:66): avc: denied { mount } for pid=3091 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 68.383616][ T3093] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 68.389249][ T29] audit: type=1400 audit(68.320:67): avc: denied { relabelto } for pid=3093 comm="mkswap" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 68.393284][ T29] audit: type=1400 audit(68.330:68): avc: denied { write } for pid=3093 comm="mkswap" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 68.430144][ T29] audit: type=1400 audit(68.370:69): avc: denied { read } for pid=3091 comm="syz-executor" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 68.432107][ T29] audit: type=1400 audit(68.370:70): avc: denied { open } for pid=3091 comm="syz-executor" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 75.202997][ T3091] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 77.168539][ T29] audit: type=1400 audit(77.100:71): avc: denied { execmem } for pid=3094 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 77.229674][ T29] audit: type=1400 audit(77.160:72): avc: denied { read } for pid=3096 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 77.234676][ T29] audit: type=1400 audit(77.170:73): avc: denied { open } for pid=3096 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 77.245024][ T29] audit: type=1400 audit(77.180:74): avc: denied { mounton } for pid=3096 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 77.271155][ T29] audit: type=1400 audit(77.210:75): avc: denied { module_request } for pid=3096 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 77.350794][ T29] audit: type=1400 audit(77.290:76): avc: denied { sys_module } for pid=3096 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 77.885550][ T29] audit: type=1400 audit(77.820:77): avc: denied { ioctl } for pid=3097 comm="syz-executor" path="/dev/net/tun" dev="devtmpfs" ino=677 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 78.883846][ T3097] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 78.890110][ T3096] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 78.894155][ T3097] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 78.911583][ T3096] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 79.575294][ T3097] hsr_slave_0: entered promiscuous mode [ 79.577652][ T3097] hsr_slave_1: entered promiscuous mode [ 79.638581][ T3096] hsr_slave_0: entered promiscuous mode [ 79.641174][ T3096] hsr_slave_1: entered promiscuous mode [ 79.645729][ T3096] debugfs: 'hsr0' already exists in 'hsr' [ 79.646446][ T3096] Cannot create hsr debugfs directory [ 80.033208][ T29] audit: type=1400 audit(79.970:78): avc: denied { create } for pid=3097 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 80.034693][ T29] audit: type=1400 audit(79.970:79): avc: denied { write } for pid=3097 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 80.037860][ T29] audit: type=1400 audit(79.970:80): avc: denied { read } for pid=3097 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 80.044908][ T3097] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 80.061879][ T3097] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 80.073667][ T3097] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 80.080783][ T3097] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 80.139362][ T3096] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 80.155395][ T3096] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 80.162732][ T3096] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 80.167777][ T3096] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 80.862435][ T3097] 8021q: adding VLAN 0 to HW filter on device bond0 [ 81.093771][ T3096] 8021q: adding VLAN 0 to HW filter on device bond0 [ 83.774825][ T3097] veth0_vlan: entered promiscuous mode [ 83.787044][ T3096] veth0_vlan: entered promiscuous mode [ 83.807903][ T3096] veth1_vlan: entered promiscuous mode [ 83.814198][ T3097] veth1_vlan: entered promiscuous mode [ 83.901953][ T3097] veth0_macvtap: entered promiscuous mode [ 83.913518][ T3096] veth0_macvtap: entered promiscuous mode [ 83.924267][ T3097] veth1_macvtap: entered promiscuous mode [ 83.950303][ T3096] veth1_macvtap: entered promiscuous mode [ 84.053991][ T52] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 84.073005][ T52] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 84.078101][ T52] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 84.078579][ T52] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 84.096226][ T57] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 84.103158][ T57] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 84.103817][ T57] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 84.103910][ T57] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 84.172937][ T29] audit: type=1400 audit(84.110:81): avc: denied { mount } for pid=3097 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 84.200663][ T29] audit: type=1400 audit(84.110:82): avc: denied { mounton } for pid=3097 comm="syz-executor" path="/syzkaller.kJUKlg/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 84.200995][ T29] audit: type=1400 audit(84.130:83): avc: denied { mount } for pid=3097 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 84.240001][ T29] audit: type=1400 audit(84.160:84): avc: denied { mounton } for pid=3097 comm="syz-executor" path="/syzkaller.kJUKlg/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 84.251815][ T29] audit: type=1400 audit(84.190:85): avc: denied { mounton } for pid=3097 comm="syz-executor" path="/syzkaller.kJUKlg/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=1932 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 84.273952][ T29] audit: type=1400 audit(84.210:86): avc: denied { unmount } for pid=3097 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 84.281505][ T29] audit: type=1400 audit(84.220:87): avc: denied { mounton } for pid=3097 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=772 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 84.285833][ T29] audit: type=1400 audit(84.220:88): avc: denied { mount } for pid=3097 comm="syz-executor" name="/" dev="gadgetfs" ino=1933 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 84.296467][ T29] audit: type=1400 audit(84.230:89): avc: denied { mount } for pid=3097 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 84.302900][ T29] audit: type=1400 audit(84.240:90): avc: denied { mounton } for pid=3097 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 84.390707][ T3097] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 87.461723][ T3761] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3761 comm=syz.0.27 [ 87.512681][ T3763] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=3763 comm=syz.1.28 [ 87.662028][ T3767] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=65498 sclass=netlink_tcpdiag_socket pid=3767 comm=syz.1.30 [ 88.133271][ T3783] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=3783 comm=syz.1.38 [ 88.907502][ T3813] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=3813 comm=syz.1.52 [ 89.190879][ T3825] Zero length message leads to an empty skb [ 89.276089][ T29] kauditd_printk_skb: 18 callbacks suppressed [ 89.292378][ T29] audit: type=1400 audit(89.210:109): avc: denied { setopt } for pid=3828 comm="syz.1.60" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 89.610904][ T3841] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=5124 sclass=netlink_audit_socket pid=3841 comm=syz.1.66 [ 89.924912][ T29] audit: type=1400 audit(89.860:110): avc: denied { create } for pid=3860 comm="syz.0.72" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 89.928380][ T29] audit: type=1400 audit(89.860:111): avc: denied { write } for pid=3860 comm="syz.0.72" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 90.458287][ T29] audit: type=1400 audit(90.390:112): avc: denied { create } for pid=3875 comm="syz.0.80" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 90.464857][ T29] audit: type=1400 audit(90.400:113): avc: denied { write } for pid=3875 comm="syz.0.80" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 91.131382][ T29] audit: type=1400 audit(91.070:114): avc: denied { write } for pid=3889 comm="syz.0.88" name="ip_mr_cache" dev="proc" ino=4026532767 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 91.255188][ T29] audit: type=1400 audit(91.190:115): avc: denied { unmount } for pid=3097 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 92.790830][ T3958] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=513 sclass=netlink_route_socket pid=3958 comm=syz.1.121 [ 92.990796][ T29] audit: type=1400 audit(92.930:116): avc: denied { write } for pid=3963 comm="syz.0.124" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 93.130689][ T3970] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=3970 comm=syz.0.126 [ 93.197744][ T29] audit: type=1400 audit(93.130:117): avc: denied { create } for pid=3971 comm="syz.1.128" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 93.286167][ T29] audit: type=1400 audit(93.220:118): avc: denied { ioctl } for pid=3975 comm="syz.1.130" path="socket:[2919]" dev="sockfs" ino=2919 ioctlcmd=0x89f3 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 93.387777][ T3980] Dead loop on virtual device ip6_vti0, fix it urgently! [ 95.204049][ T4005] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4005 comm=syz.1.144 [ 99.234561][ T29] kauditd_printk_skb: 10 callbacks suppressed [ 99.235954][ T29] audit: type=1400 audit(99.170:129): avc: denied { create } for pid=4046 comm="syz.1.165" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 99.261080][ T29] audit: type=1400 audit(99.200:130): avc: denied { read } for pid=4046 comm="syz.1.165" path="socket:[3613]" dev="sockfs" ino=3613 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 100.491078][ T29] audit: type=1400 audit(100.430:131): avc: denied { create } for pid=4065 comm="syz.0.174" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 100.854810][ T29] audit: type=1400 audit(100.790:132): avc: denied { write } for pid=4071 comm="syz.1.177" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 101.616622][ T4101] capability: warning: `syz.0.191' uses 32-bit capabilities (legacy support in use) [ 101.897634][ T29] audit: type=1400 audit(101.830:133): avc: denied { create } for pid=4110 comm="syz.0.196" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 101.903031][ T29] audit: type=1400 audit(101.840:134): avc: denied { write } for pid=4110 comm="syz.0.196" path="socket:[3738]" dev="sockfs" ino=3738 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 101.997331][ T4115] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1539 sclass=netlink_route_socket pid=4115 comm=syz.0.198 [ 105.280390][ T29] audit: type=1400 audit(105.220:135): avc: denied { setopt } for pid=4148 comm="syz.1.213" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 105.382767][ T29] audit: type=1400 audit(105.320:136): avc: denied { getopt } for pid=4150 comm="syz.1.214" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 106.898413][ T29] audit: type=1400 audit(106.830:137): avc: denied { create } for pid=4175 comm="syz.0.226" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 106.904444][ T29] audit: type=1400 audit(106.840:138): avc: denied { write } for pid=4175 comm="syz.0.226" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 107.952541][ T29] audit: type=1400 audit(107.890:139): avc: denied { ioctl } for pid=4206 comm="syz.0.241" path="socket:[4367]" dev="sockfs" ino=4367 ioctlcmd=0xab01 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 108.755554][ T4229] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4229 comm=syz.0.252 [ 110.884414][ T29] audit: type=1400 audit(110.820:140): avc: denied { create } for pid=4269 comm="syz.0.272" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 110.897559][ T29] audit: type=1400 audit(110.830:141): avc: denied { ioctl } for pid=4269 comm="syz.0.272" path="socket:[3966]" dev="sockfs" ino=3966 ioctlcmd=0x4581 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 111.086072][ T29] audit: type=1400 audit(111.020:142): avc: denied { block_suspend } for pid=4273 comm="syz.0.275" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 111.257219][ T4284] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4284 comm=syz.0.277 [ 116.028345][ T4326] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=5131 sclass=netlink_audit_socket pid=4326 comm=syz.1.297 [ 118.614249][ T29] audit: type=1400 audit(118.550:143): avc: denied { write } for pid=4364 comm="syz.1.316" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 121.099959][ T4377] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5129 sclass=netlink_route_socket pid=4377 comm=syz.1.322 [ 121.759675][ T4385] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4385 comm=syz.1.325 [ 122.503897][ T29] audit: type=1400 audit(122.440:144): avc: denied { associate } for pid=4402 comm="syz.1.334" name="pfkey" scontext=root:object_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 124.800167][ T29] audit: type=1400 audit(124.720:145): avc: denied { map } for pid=4458 comm="syz.0.362" path="/dev/fb0" dev="devtmpfs" ino=616 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 124.808288][ T29] audit: type=1400 audit(124.740:146): avc: denied { execute } for pid=4458 comm="syz.0.362" path="/dev/fb0" dev="devtmpfs" ino=616 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 125.154356][ T29] audit: type=1400 audit(125.090:147): avc: denied { create } for pid=4466 comm="syz.0.366" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 125.158283][ T29] audit: type=1400 audit(125.090:148): avc: denied { write } for pid=4466 comm="syz.0.366" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 125.158372][ T4467] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=1541 sclass=netlink_xfrm_socket pid=4467 comm=syz.0.366 [ 125.926188][ T29] audit: type=1400 audit(125.860:149): avc: denied { ioctl } for pid=4488 comm="syz.0.377" path="socket:[4875]" dev="sockfs" ino=4875 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 125.931856][ T29] audit: type=1400 audit(125.870:150): avc: denied { bind } for pid=4488 comm="syz.0.377" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 126.037150][ T4491] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=521 sclass=netlink_audit_socket pid=4491 comm=syz.0.378 [ 127.679390][ T29] audit: type=1400 audit(127.590:151): avc: denied { create } for pid=4531 comm="syz.0.398" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 127.683510][ T29] audit: type=1400 audit(127.620:152): avc: denied { setopt } for pid=4531 comm="syz.0.398" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 127.689348][ T29] audit: type=1400 audit(127.620:153): avc: denied { write } for pid=4531 comm="syz.0.398" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 130.775841][ T31] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 130.841535][ T31] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 130.910943][ T31] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 130.992112][ T31] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 131.387814][ T31] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 131.401739][ T31] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 131.406004][ T31] bond0 (unregistering): Released all slaves [ 131.533114][ T31] hsr_slave_0: left promiscuous mode [ 131.545777][ T31] hsr_slave_1: left promiscuous mode [ 131.570473][ T31] veth1_macvtap: left promiscuous mode [ 131.571008][ T31] veth0_macvtap: left promiscuous mode [ 131.571301][ T31] veth1_vlan: left promiscuous mode [ 131.571553][ T31] veth0_vlan: left promiscuous mode [ 133.501549][ T4758] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=1541 sclass=netlink_audit_socket pid=4758 comm=syz.0.449 [ 134.026901][ T4595] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 134.047348][ T4595] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 135.347657][ T4595] hsr_slave_0: entered promiscuous mode [ 135.355264][ T4595] hsr_slave_1: entered promiscuous mode [ 135.794083][ T4595] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 135.802694][ T4595] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 135.807536][ T4595] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 135.824118][ T4595] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 136.749740][ T4595] 8021q: adding VLAN 0 to HW filter on device bond0 [ 139.384250][ T4595] veth0_vlan: entered promiscuous mode [ 139.412473][ T4595] veth1_vlan: entered promiscuous mode [ 139.492987][ T4595] veth0_macvtap: entered promiscuous mode [ 139.507775][ T4595] veth1_macvtap: entered promiscuous mode [ 139.544036][ T29] audit: type=1400 audit(139.480:154): avc: denied { node_bind } for pid=5042 comm="syz.0.478" saddr=::ffff:224.0.0.2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 139.641792][ T1337] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 139.643408][ T1337] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 139.645031][ T1337] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 139.645321][ T1337] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 140.332356][ T5067] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5067 comm=syz.2.489 [ 140.388317][ T29] audit: type=1400 audit(140.320:155): avc: denied { audit_write } for pid=5068 comm="syz.0.490" capability=29 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 142.334572][ T29] audit: type=1400 audit(142.270:156): avc: denied { unmount } for pid=4595 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 143.081751][ T5146] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5146 comm=syz.2.526 [ 144.926951][ T5200] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=5136 sclass=netlink_tcpdiag_socket pid=5200 comm=syz.0.551 [ 148.081861][ T29] audit: type=1400 audit(148.020:157): avc: denied { name_bind } for pid=5238 comm="syz.0.569" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 148.628175][ T29] audit: type=1400 audit(148.560:158): avc: denied { getopt } for pid=5256 comm="syz.0.576" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 149.098129][ T5272] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=627 sclass=netlink_audit_socket pid=5272 comm=syz.2.581 [ 149.945630][ T29] audit: type=1400 audit(149.880:159): avc: denied { remount } for pid=5295 comm="syz.0.591" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 150.901163][ T29] audit: type=1400 audit(150.840:160): avc: denied { read } for pid=5329 comm="syz.0.604" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 153.757940][ T5365] syz.0.619 calls setitimer() with new_value NULL pointer. Misfeature support will be removed [ 155.342445][ T5386] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=5386 comm=syz.2.630 [ 157.724436][ T29] audit: type=1400 audit(157.660:161): avc: denied { ioctl } for pid=5416 comm="syz.0.645" path="socket:[7823]" dev="sockfs" ino=7823 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 160.600364][ T5453] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5453 comm=syz.0.662 [ 161.947039][ T5473] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5473 comm=syz.0.674 [ 165.156357][ T5539] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5539 comm=syz.0.706 [ 165.523685][ T5550] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=1550 sclass=netlink_audit_socket pid=5550 comm=syz.2.711 [ 166.440456][ T5576] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 166.445235][ T29] audit: type=1400 audit(166.380:162): avc: denied { bind } for pid=5575 comm="syz.2.723" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 166.445676][ T29] audit: type=1400 audit(166.380:163): avc: denied { name_bind } for pid=5575 comm="syz.2.723" src=20004 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=rawip_socket permissive=1 [ 166.451806][ T29] audit: type=1400 audit(166.380:164): avc: denied { node_bind } for pid=5575 comm="syz.2.723" src=20004 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 [ 166.452195][ T29] audit: type=1400 audit(166.390:165): avc: denied { read } for pid=5575 comm="syz.2.723" lport=20004 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 168.551735][ T29] audit: type=1400 audit(168.490:166): avc: denied { setattr } for pid=5617 comm="syz.0.743" name="pfkey" dev="proc" ino=4026532811 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 171.570057][ T5718] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5718 comm=syz.0.793 [ 173.454950][ T5764] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=47 sclass=netlink_route_socket pid=5764 comm=syz.2.816 [ 173.863643][ T5780] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5780 comm=syz.2.823 [ 174.664751][ T29] audit: type=1400 audit(174.600:167): avc: denied { map } for pid=5818 comm="syz.0.843" path="socket:[9667]" dev="sockfs" ino=9667 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tcp_socket permissive=1 [ 174.772707][ T29] audit: type=1400 audit(174.710:168): avc: denied { execute } for pid=5823 comm="syz.0.846" name="file0" dev="tmpfs" ino=2465 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 174.882628][ T5828] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=5828 comm=syz.0.848 [ 181.942407][ T5898] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1005 sclass=netlink_route_socket pid=5898 comm=syz.0.885 [ 182.373492][ T5914] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5914 comm=syz.0.889 [ 182.935763][ T29] audit: type=1400 audit(182.870:169): avc: denied { create } for pid=5929 comm="syz.0.898" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 182.952055][ T29] audit: type=1400 audit(182.890:170): avc: denied { getopt } for pid=5929 comm="syz.0.898" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 183.495854][ T5945] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=5945 comm=syz.0.905 [ 184.660260][ T29] audit: type=1400 audit(184.600:171): avc: denied { append } for pid=5948 comm="syz.0.907" name="pfkey" dev="proc" ino=4026532811 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 185.524489][ T5980] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5127 sclass=netlink_route_socket pid=5980 comm=syz.2.922 [ 187.025071][ T6008] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=6008 comm=syz.0.936 [ 187.415994][ T6012] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1795 sclass=netlink_route_socket pid=6012 comm=syz.2.937 [ 188.571006][ T29] audit: type=1400 audit(188.510:172): avc: denied { ioctl } for pid=6026 comm="syz.0.945" path="socket:[10056]" dev="sockfs" ino=10056 ioctlcmd=0x8983 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 196.610156][ T29] audit: type=1400 audit(196.540:173): avc: denied { ioctl } for pid=6103 comm="syz.2.983" path="socket:[10208]" dev="sockfs" ino=10208 ioctlcmd=0x6686 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 198.579166][ C1] hrtimer: interrupt took 7912992 ns [ 198.815207][ T29] audit: type=1400 audit(198.750:174): avc: denied { connect } for pid=6115 comm="syz.0.989" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 198.974504][ T6120] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6120 comm=syz.0.991 [ 201.013942][ T29] audit: type=1400 audit(200.950:175): avc: denied { setopt } for pid=6202 comm="syz.2.1032" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 201.121853][ T29] audit: type=1400 audit(201.060:176): avc: denied { connect } for pid=6207 comm="syz.0.1035" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 204.916580][ T29] audit: type=1400 audit(204.850:177): avc: denied { mount } for pid=6322 comm="syz.0.1092" name="/" dev="ramfs" ino=11634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 205.034815][ T29] audit: type=1400 audit(204.970:178): avc: denied { remount } for pid=6326 comm="syz.0.1094" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 205.282457][ T31] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 205.334145][ T31] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 205.414919][ T31] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 205.479842][ T31] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 205.767015][ T31] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 205.773766][ T31] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 205.778094][ T31] bond0 (unregistering): Released all slaves [ 205.870830][ T31] hsr_slave_0: left promiscuous mode [ 205.874085][ T31] hsr_slave_1: left promiscuous mode [ 205.897787][ T31] veth1_macvtap: left promiscuous mode [ 205.901087][ T31] veth0_macvtap: left promiscuous mode [ 205.901991][ T31] veth1_vlan: left promiscuous mode [ 205.904514][ T31] veth0_vlan: left promiscuous mode [ 208.554335][ T6333] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 208.561816][ T6333] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 209.330650][ T6559] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6559 comm=syz.2.1116 [ 209.705829][ T6333] hsr_slave_0: entered promiscuous mode [ 209.708481][ T6333] hsr_slave_1: entered promiscuous mode [ 209.710154][ T6333] debugfs: 'hsr0' already exists in 'hsr' [ 209.711056][ T6333] Cannot create hsr debugfs directory [ 210.197090][ T6333] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 210.207225][ T6333] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 210.217108][ T6333] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 210.234947][ T6333] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 210.976142][ T6333] 8021q: adding VLAN 0 to HW filter on device bond0 [ 213.932978][ T6333] veth0_vlan: entered promiscuous mode [ 213.966322][ T6333] veth1_vlan: entered promiscuous mode [ 214.016904][ T6333] veth0_macvtap: entered promiscuous mode [ 214.030487][ T6333] veth1_macvtap: entered promiscuous mode [ 214.093969][ T54] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 214.094865][ T54] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 214.095000][ T54] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 214.095079][ T54] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 214.316363][ T6755] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1011 sclass=netlink_route_socket pid=6755 comm=syz.0.1097 [ 218.184154][ T1947] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 218.243943][ T1947] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 218.288343][ T1947] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 218.353889][ T1947] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 218.596881][ T1947] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 218.604007][ T1947] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 218.607655][ T1947] bond0 (unregistering): Released all slaves [ 218.673027][ T1947] hsr_slave_0: left promiscuous mode [ 218.675074][ T1947] hsr_slave_1: left promiscuous mode [ 218.698630][ T1947] veth1_macvtap: left promiscuous mode [ 218.710056][ T1947] veth0_macvtap: left promiscuous mode [ 218.710723][ T1947] veth1_vlan: left promiscuous mode [ 218.711465][ T1947] veth0_vlan: left promiscuous mode [ 220.637098][ T6820] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 220.646027][ T6820] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 221.487990][ T6820] hsr_slave_0: entered promiscuous mode [ 221.493025][ T6820] hsr_slave_1: entered promiscuous mode [ 222.100893][ T6820] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 222.113418][ T6820] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 222.124325][ T6820] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 222.137813][ T6820] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 222.834433][ T6820] 8021q: adding VLAN 0 to HW filter on device bond0 [ 225.541075][ T6820] veth0_vlan: entered promiscuous mode [ 225.567598][ T6820] veth1_vlan: entered promiscuous mode [ 225.636714][ T6820] veth0_macvtap: entered promiscuous mode [ 225.653228][ T6820] veth1_macvtap: entered promiscuous mode [ 225.731519][ T12] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 225.731900][ T12] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 225.731983][ T12] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 225.732045][ T12] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 228.983340][ T29] audit: type=1400 audit(228.920:179): avc: denied { read } for pid=7273 comm="syz.2.1181" path="socket:[13717]" dev="sockfs" ino=13717 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 229.847297][ T7308] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=1794 sclass=netlink_audit_socket pid=7308 comm=syz.2.1198 [ 231.384830][ T7353] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=7353 comm=syz.2.1220 [ 234.190577][ T7373] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=7373 comm=syz.2.1227 [ 237.452142][ T29] audit: type=1400 audit(237.380:180): avc: denied { mounton } for pid=7408 comm="syz.2.1246" path="/58/file0" dev="tmpfs" ino=317 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 238.212585][ T7421] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=7421 comm=syz.0.1251 [ 239.531179][ T7438] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7438 comm=syz.2.1260 [ 240.155135][ T7444] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5121 sclass=netlink_route_socket pid=7444 comm=syz.0.1264 [ 241.273560][ T7458] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7458 comm=syz.2.1270 [ 241.406023][ T7464] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=47 sclass=netlink_route_socket pid=7464 comm=syz.0.1272 [ 242.054783][ T7489] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7489 comm=syz.2.1285 [ 242.288478][ T7498] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1540 sclass=netlink_route_socket pid=7498 comm=syz.0.1290 [ 242.531756][ T7506] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7506 comm=syz.0.1294 [ 243.410419][ T7542] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7542 comm=syz.2.1309 [ 245.044630][ T7584] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1005 sclass=netlink_route_socket pid=7584 comm=syz.2.1331 [ 247.352228][ T7639] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=7639 comm=syz.0.1359 [ 250.181296][ T7656] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5127 sclass=netlink_route_socket pid=7656 comm=syz.0.1366 [ 253.471802][ T7705] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7705 comm=syz.0.1387 [ 253.570243][ T7709] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1795 sclass=netlink_route_socket pid=7709 comm=syz.0.1391 [ 257.153489][ T7721] SELinux: Context system_u:object_r:systemd_tmpfiles_exec_t:s0 is not valid (left unmapped). [ 257.155993][ T29] audit: type=1400 audit(257.090:181): avc: denied { relabelto } for pid=7718 comm="syz.0.1396" name="file0" dev="tmpfs" ino=730 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="system_u:object_r:systemd_tmpfiles_exec_t:s0" [ 257.158184][ T29] audit: type=1400 audit(257.090:182): avc: denied { associate } for pid=7718 comm="syz.0.1396" name="file0" dev="tmpfs" ino=730 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 srawcon="system_u:object_r:systemd_tmpfiles_exec_t:s0" [ 258.200489][ T7777] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5132 sclass=netlink_route_socket pid=7777 comm=syz.2.1424 [ 259.571714][ T7812] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=7812 comm=syz.2.1441 [ 260.426652][ T29] audit: type=1400 audit(260.360:183): avc: denied { ioctl } for pid=7843 comm="syz.0.1457" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=15716 ioctlcmd=0xaa3f scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 261.093357][ T7871] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=7871 comm=syz.0.1470 [ 261.143854][ T29] audit: type=1400 audit(261.080:184): avc: denied { read } for pid=7872 comm="syz.2.1474" path="socket:[14765]" dev="sockfs" ino=14765 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 261.812274][ T7893] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 264.544318][ T7922] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=7922 comm=syz.0.1498 [ 266.897382][ T7973] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7973 comm=syz.2.1520 [ 274.561018][ T8048] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65381 sclass=netlink_route_socket pid=8048 comm=syz.0.1556 [ 275.874389][ T29] audit: type=1400 audit(275.810:185): avc: denied { bind } for pid=8088 comm="syz.0.1576" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 726.209357][ C0] watchdog: BUG: soft lockup - CPU#0 stuck for 430s! [swapper/0:0] [ 726.209637][ C0] Modules linked in: [ 726.210511][ C0] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Not tainted syzkaller #0 PREEMPT [ 726.210787][ C0] Hardware name: ARM-Versatile Express [ 726.211016][ C0] PC is at _raw_spin_unlock_irq+0x28/0x54 [ 726.211767][ C0] LR is at tmigr_handle_remote_up+0x218/0x4b0 [ 726.211847][ C0] pc : [<81abb53c>] lr : [<80346da4>] psr: 60000113 [ 726.211894][ C0] sp : 82801be0 ip : 82801bf0 fp : 82801bec [ 726.211933][ C0] r10: 00000001 r9 : 8280c9a4 r8 : 00000001 [ 726.211979][ C0] r7 : ddddb488 r6 : 82801cb8 r5 : 830bf3b0 r4 : 830bf380 [ 726.212030][ C0] r3 : 0000543c r2 : ffffffff r1 : 00000000 r0 : ddddb488 [ 726.212158][ C0] Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment user [ 726.212239][ C0] Control: 30c5387d Table: 85e21fc0 DAC: fffffffd [ 726.212351][ C0] Call trace: [ 726.212672][ C0] [<81abb514>] (_raw_spin_unlock_irq) from [<80346da4>] (tmigr_handle_remote_up+0x218/0x4b0) [ 726.213055][ C0] [<80346b8c>] (tmigr_handle_remote_up) from [<803450a4>] (__walk_groups_from+0x3c/0xe4) [ 726.213208][ C0] r10:8281b500 r9:8280c820 r8:80346b8c r7:82801cb8 r6:830bf380 r5:00000002 [ 726.213260][ C0] r4:830bf380 [ 726.213287][ C0] [<80345068>] (__walk_groups_from) from [<8034743c>] (tmigr_handle_remote+0xe8/0x108) [ 726.213381][ C0] r9:82804d80 r8:00000102 r7:00000001 r6:00000082 r5:00000002 r4:dddc7488 [ 726.213412][ C0] [<80347354>] (tmigr_handle_remote) from [<80327600>] (run_timer_softirq+0x30/0x34) [ 726.213488][ C0] r4:82804084 [ 726.213508][ C0] [<803275d0>] (run_timer_softirq) from [<8025b55c>] (handle_softirqs+0x140/0x458) [ 726.213580][ C0] [<8025b41c>] (handle_softirqs) from [<8025b9d0>] (__irq_exit_rcu+0x110/0x1d0) [ 726.213661][ C0] r10:00000000 r9:8281b500 r8:00000000 r7:82801dd8 r6:82443e68 r5:8247ef9c [ 726.213687][ C0] r4:8281b500 [ 726.213705][ C0] [<8025b8c0>] (__irq_exit_rcu) from [<8025bd48>] (irq_exit+0x10/0x18) [ 726.213770][ C0] r5:8247ef9c r4:826c3a9c [ 726.213788][ C0] [<8025bd38>] (irq_exit) from [<81aad164>] (generic_handle_arch_irq+0x7c/0x80) [ 726.213856][ C0] [<81aad0e8>] (generic_handle_arch_irq) from [<80200bdc>] (__irq_svc+0x7c/0xbc) [ 726.214008][ C0] Exception stack(0x82801dd8 to 0x82801e20) [ 726.214190][ C0] 1dc0: 00000001 00000000 [ 726.214252][ C0] 1de0: 0000dda9 0000dda7 840a5b68 00000004 00000001 840a5b68 8406be88 840a5a40 [ 726.214326][ C0] 1e00: 00000000 82801e3c 82801e28 82801e28 81abb6cc 81abb6f4 80000013 ffffffff [ 726.214424][ C0] r9:8281b500 r8:8406be88 r7:82801e0c r6:ffffffff r5:80000013 r4:81abb6f4 [ 726.214450][ C0] [<81abb6b4>] (_raw_spin_lock) from [<809c74b8>] (gpio_mmio_set+0x44/0x80) [ 726.214540][ C0] r5:00000004 r4:840a5a40 [ 726.214563][ C0] [<809c7474>] (gpio_mmio_set) from [<809b7c74>] (gpiochip_set+0x1c/0x44) [ 726.214641][ C0] r7:00000001 r6:00000000 r5:00000002 r4:8410c9e8 [ 726.214664][ C0] [<809b7c58>] (gpiochip_set) from [<809ba53c>] (gpiod_set_raw_value_commit+0x78/0x218) [ 726.214730][ C0] [<809ba4c4>] (gpiod_set_raw_value_commit) from [<809bbddc>] (gpiod_set_value_nocheck+0x44/0x58) [ 726.214808][ C0] r10:00000000 r9:00000000 r8:00000001 r7:dddce4c0 r6:833f9518 r5:00000001 [ 726.214830][ C0] r4:8410c9e8 [ 726.214846][ C0] [<809bbd98>] (gpiod_set_value_nocheck) from [<809bbe2c>] (gpiod_set_value+0x3c/0x88) [ 726.214902][ C0] [<809bbdf0>] (gpiod_set_value) from [<809cc5c8>] (gpio_led_set+0x5c/0x60) [ 726.214962][ C0] r5:000000ff r4:84df1224 [ 726.214980][ C0] [<809cc56c>] (gpio_led_set) from [<809c9ef0>] (led_set_brightness+0x84/0x90) [ 726.215042][ C0] r5:000000ff r4:84df1224 [ 726.215059][ C0] [<809c9e6c>] (led_set_brightness) from [<809cba70>] (led_trigger_event+0x40/0x58) [ 726.215123][ C0] r5:000000ff r4:84df1224 [ 726.215141][ C0] [<809cba30>] (led_trigger_event) from [<809cd0cc>] (ledtrig_cpu+0xac/0xf4) [ 726.215205][ C0] r7:dddce4c0 r6:00000002 r5:82b15cd8 r4:000001fd [ 726.215223][ C0] [<809cd020>] (ledtrig_cpu) from [<80227a38>] (arch_cpu_idle_exit+0x14/0x18) [ 726.215332][ C0] r9:00000000 r8:00000000 r7:8280c710 r6:8281b500 r5:8280c6d0 r4:00000000 [ 726.215355][ C0] [<80227a24>] (arch_cpu_idle_exit) from [<802b158c>] (do_idle+0x5c/0x2d8) [ 726.215429][ C0] [<802b1530>] (do_idle) from [<802b1b38>] (cpu_startup_entry+0x30/0x34) [ 726.215510][ C0] r10:8281aff4 r9:8280c680 r8:823bea70 r7:00000000 r6:deffc06c r5:828222e8 [ 726.215531][ C0] r4:000000ed [ 726.215544][ C0] [<802b1b08>] (cpu_startup_entry) from [<81aaeb7c>] (kernel_init+0x0/0x138) [ 726.215616][ C0] [<81aaea9c>] (rest_init) from [<8260145c>] (start_kernel+0x844/0x860) [ 726.215733][ C0] [<82600c18>] (start_kernel) from [<00000000>] (0x0) [ 726.216467][ C0] Sending NMI from CPU 0 to CPUs 1: [ 726.217214][ C1] NMI backtrace for cpu 1 [ 726.217446][ C1] CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Not tainted syzkaller #0 PREEMPT [ 726.217509][ C1] Hardware name: ARM-Versatile Express [ 726.217536][ C1] PC is at _raw_spin_lock+0x40/0x58 [ 726.217621][ C1] LR is at _raw_spin_lock+0x18/0x58 [ 726.217659][ C1] pc : [<81abb6f4>] lr : [<81abb6cc>] psr: 80000113 [ 726.217684][ C1] sp : df805d68 ip : df805d68 fp : df805d7c [ 726.217702][ C1] r10: 81c05450 r9 : 840a5a40 r8 : 8406be88 [ 726.217731][ C1] r7 : 840a5b68 r6 : 00000000 r5 : 00000001 r4 : 840a5b68 [ 726.217764][ C1] r3 : 0000dda7 r2 : 0000dda8 r1 : 00000000 r0 : 00000001 [ 726.217798][ C1] Flags: Nzcv IRQs on FIQs on Mode SVC_32 ISA ARM Segment none [ 726.217833][ C1] Control: 30c5387d Table: 85d7e2c0 DAC: 00000000 [ 726.217855][ C1] Call trace: frame pointer underflow [ 726.217953][ C1] [<81abb6b4>] (_raw_spin_lock) from [<809c74b8>] (gpio_mmio_set+0x44/0x80) [ 726.218038][ C1] r5:00000001 r4:840a5a40 [ 726.218061][ C1] [<809c7474>] (gpio_mmio_set) from [<809b7c74>] (gpiochip_set+0x1c/0x44) [ 726.218137][ C1] r7:00000000 r6:00000000 r5:00000000 r4:8410c9c0 [ 726.218154][ C1] [<809b7c58>] (gpiochip_set) from [<809ba53c>] (gpiod_set_raw_value_commit+0x78/0x218) [ 726.218217][ C1] [<809ba4c4>] (gpiod_set_raw_value_commit) from [<809bbddc>] (gpiod_set_value_nocheck+0x44/0x58) [ 726.218327][ C1] r10:81c05450 r9:df805ebc r8:00000102 r7:fffff71b r6:00000008 r5:00000000 [ 726.218352][ C1] r4:8410c9c0 [ 726.218369][ C1] [<809bbd98>] (gpiod_set_value_nocheck) from [<809bbe2c>] (gpiod_set_value+0x3c/0x88) [ 726.218428][ C1] [<809bbdf0>] (gpiod_set_value) from [<809cc5c8>] (gpio_led_set+0x5c/0x60) [ 726.218492][ C1] r5:84df1044 r4:84df1044 [ 726.218522][ C1] [<809cc56c>] (gpio_led_set) from [<809c9e60>] (led_set_brightness_nosleep+0x38/0x44) [ 726.218584][ C1] r5:84df1044 r4:8391d5cc [ 726.218602][ C1] [<809c9e28>] (led_set_brightness_nosleep) from [<809ccec4>] (led_heartbeat_function+0x84/0x144) [ 726.218663][ C1] [<809cce40>] (led_heartbeat_function) from [<80326f70>] (call_timer_fn+0x30/0x220) [ 726.218748][ C1] r7:fffff71b r6:809cce40 r5:8391d5cc r4:83216000 [ 726.218768][ C1] [<80326f40>] (call_timer_fn) from [<80327424>] (__run_timers+0x2c4/0x3f8) [ 726.218838][ C1] r9:df805ebc r8:fffff71b r7:00000000 r6:809cce40 r5:dddd9f00 r4:8391d5cc [ 726.218861][ C1] [<80327160>] (__run_timers) from [<803275c0>] (run_timer_base+0x68/0x78) [ 726.218936][ C1] r10:83216000 r9:82804d80 r8:00000102 r7:00000001 r6:00000082 r5:00000002 [ 726.218962][ C1] r4:dddd9f00 [ 726.218979][ C1] [<80327558>] (run_timer_base) from [<803275ec>] (run_timer_softirq+0x1c/0x34) [ 726.219042][ C1] r4:82804084 [ 726.219062][ C1] [<803275d0>] (run_timer_softirq) from [<8025b55c>] (handle_softirqs+0x140/0x458) [ 726.219130][ C1] [<8025b41c>] (handle_softirqs) from [<8025b9d0>] (__irq_exit_rcu+0x110/0x1d0) [ 726.219203][ C1] r10:00000000 r9:83216000 r8:00000000 r7:df865e08 r6:82443e68 r5:8247ef9c [ 726.219227][ C1] r4:83216000 [ 726.219306][ C1] [<8025b8c0>] (__irq_exit_rcu) from [<8025bd48>] (irq_exit+0x10/0x18) [ 726.219375][ C1] r5:8247ef9c r4:826c3a9c [ 726.219414][ C1] [<8025bd38>] (irq_exit) from [<81aad164>] (generic_handle_arch_irq+0x7c/0x80) [ 726.219486][ C1] [<81aad0e8>] (generic_handle_arch_irq) from [<81a7d0fc>] (call_with_stack+0x1c/0x20) [ 726.219564][ C1] r9:83216000 r8:8406be88 r7:df865e3c r6:ffffffff r5:60000013 r4:809c7cb8 [ 726.219584][ C1] [<81a7d0e0>] (call_with_stack) from [<80200bec>] (__irq_svc+0x8c/0xbc) [ 726.219646][ C1] Exception stack(0xdf865e08 to 0xdf865e50) [ 726.219692][ C1] 5e00: e0245008 00000009 0000dda7 00000000 e0245008 00000009 [ 726.219746][ C1] 5e20: 00000001 840a5b68 8406be88 840a5a40 00000000 df865e6c df865e58 df865e58 [ 726.219774][ C1] 5e40: 809c7cb4 809c7cb8 60000013 ffffffff [ 726.219796][ C1] [<809c7c98>] (gpio_mmio_write32) from [<809c74d8>] (gpio_mmio_set+0x64/0x80) [ 726.219868][ C1] r5:00000008 r4:840a5a40 [ 726.219886][ C1] [<809c7474>] (gpio_mmio_set) from [<809b7c74>] (gpiochip_set+0x1c/0x44) [ 726.219958][ C1] r7:00000001 r6:00000000 r5:00000003 r4:8410c9fc [ 726.219977][ C1] [<809b7c58>] (gpiochip_set) from [<809ba53c>] (gpiod_set_raw_value_commit+0x78/0x218) [ 726.220039][ C1] [<809ba4c4>] (gpiod_set_raw_value_commit) from [<809bbddc>] (gpiod_set_value_nocheck+0x44/0x58) [ 726.220113][ C1] r10:00000000 r9:00000000 r8:00000001 r7:ddde24c0 r6:833f99d8 r5:00000001 [ 726.220135][ C1] r4:8410c9fc [ 726.220150][ C1] [<809bbd98>] (gpiod_set_value_nocheck) from [<809bbe2c>] (gpiod_set_value+0x3c/0x88) [ 726.220206][ C1] [<809bbdf0>] (gpiod_set_value) from [<809cc5c8>] (gpio_led_set+0x5c/0x60) [ 726.220268][ C1] r5:000000ff r4:84df1314 [ 726.220286][ C1] [<809cc56c>] (gpio_led_set) from [<809c9ef0>] (led_set_brightness+0x84/0x90) [ 726.220346][ C1] r5:000000ff r4:84df1314 [ 726.220361][ C1] [<809c9e6c>] (led_set_brightness) from [<809cba70>] (led_trigger_event+0x40/0x58) [ 726.220422][ C1] r5:000000ff r4:84df1314 [ 726.220441][ C1] [<809cba30>] (led_trigger_event) from [<809cd0cc>] (ledtrig_cpu+0xac/0xf4) [ 726.220509][ C1] r7:ddde24c0 r6:00000002 r5:82b15cd8 r4:000000fe [ 726.220528][ C1] [<809cd020>] (ledtrig_cpu) from [<80227a38>] (arch_cpu_idle_exit+0x14/0x18) [ 726.220605][ C1] r9:00000000 r8:00000001 r7:8280c710 r6:83216000 r5:8280c6d0 r4:00000001 [ 726.220625][ C1] [<80227a24>] (arch_cpu_idle_exit) from [<802b158c>] (do_idle+0x5c/0x2d8) [ 726.220694][ C1] [<802b1530>] (do_idle) from [<802b1b38>] (cpu_startup_entry+0x30/0x34) [ 726.220779][ C1] r10:00000000 r9:414fc0f0 r8:80003000 r7:82a7b4a4 r6:83216000 r5:00000001 [ 726.220802][ C1] r4:00000092 [ 726.220818][ C1] [<802b1b08>] (cpu_startup_entry) from [<8022f360>] (secondary_start_kernel+0x128/0x194) [ 726.220888][ C1] [<8022f238>] (secondary_start_kernel) from [<80220094>] (__enable_mmu+0x0/0xc) [ 726.220968][ C1] r7:82a7b4a4 r6:30c0387d r5:00000000 r4:830b7bc0 [ 726.222740][ C0] Kernel panic - not syncing: softlockup: hung tasks [ 726.254891][ C0] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Tainted: G L syzkaller #0 PREEMPT [ 726.255417][ C0] Tainted: [L]=SOFTLOCKUP [ 726.255607][ C0] Hardware name: ARM-Versatile Express [ 726.255854][ C0] Call trace: [ 726.256137][ C0] [<80201a74>] (dump_backtrace) from [<80201b70>] (show_stack+0x18/0x1c) [ 726.256508][ C0] r7:822964bc r6:8281b500 r5:00000000 r4:8229566c [ 726.256736][ C0] [<80201b58>] (show_stack) from [<8021ee08>] (dump_stack_lvl+0x54/0x7c) [ 726.257077][ C0] [<8021edb4>] (dump_stack_lvl) from [<8021ee48>] (dump_stack+0x18/0x1c) [ 726.257431][ C0] r5:00000000 r4:82a7bd14 [ 726.257622][ C0] [<8021ee30>] (dump_stack) from [<80202648>] (vpanic+0xe0/0x2e8) [ 726.257949][ C0] [<80202568>] (vpanic) from [<80202884>] (trace_suspend_resume+0x0/0xd8) [ 726.258296][ C0] r7:82ac27f8 [ 726.258462][ C0] [<80202850>] (panic) from [<80383f14>] (watchdog_timer_fn+0x2dc/0x350) [ 726.258821][ C0] r3:00000001 r2:00004000 r1:82a7bd1c r0:822964bc [ 726.259051][ C0] [<80383c38>] (watchdog_timer_fn) from [<80329b64>] (__hrtimer_run_queues+0x1c4/0x454) [ 726.259429][ C0] r10:8281b500 r9:00000000 r8:dddc7130 r7:80383c38 r6:dddc7000 r5:dddc7040 [ 726.259746][ C0] r4:dddc75d8 [ 726.259924][ C0] [<803299a0>] (__hrtimer_run_queues) from [<8032b168>] (hrtimer_interrupt+0x148/0x2bc) [ 726.260327][ C0] r10:11ece920 r9:dddc7180 r8:dddc7130 r7:000000a9 r6:00000003 r5:20000193 [ 726.260636][ C0] r4:dddc7000 [ 726.260795][ C0] [<8032b020>] (hrtimer_interrupt) from [<813400d8>] (arch_timer_handler_virt+0x30/0x38) [ 726.261226][ C0] r10:81d0fc78 r9:8309e400 r8:00000000 r7:00000000 r6:00000000 r5:82498528 [ 726.261557][ C0] r4:8309de40 [ 726.261769][ C0] [<813400a8>] (arch_timer_handler_virt) from [<802ef9b4>] (handle_percpu_devid_irq+0x128/0x34c) [ 726.262406][ C0] [<802ef88c>] (handle_percpu_devid_irq) from [<802e8b44>] (handle_irq_desc+0x74/0x84) [ 726.262824][ C0] r10:00000001 r9:8281b500 r8:00000000 r7:df80a00c r6:826c2388 r5:df80a000 [ 726.263133][ C0] r4:8280cc44 [ 726.263287][ C0] [<802e8ad0>] (handle_irq_desc) from [<802e8bc0>] (generic_handle_domain_irq+0x18/0x1c) [ 726.263719][ C0] [<802e8ba8>] (generic_handle_domain_irq) from [<802012c8>] (gic_handle_irq+0x68/0x7c) [ 726.264127][ C0] [<80201260>] (gic_handle_irq) from [<81aad148>] (generic_handle_arch_irq+0x60/0x80) [ 726.264548][ C0] r7:82801b90 r6:82443e68 r5:8247ef9c r4:826c3a9c [ 726.264793][ C0] [<81aad0e8>] (generic_handle_arch_irq) from [<80200bdc>] (__irq_svc+0x7c/0xbc) [ 726.265173][ C0] Exception stack(0x82801b90 to 0x82801bd8) [ 726.265461][ C0] 1b80: ddddb488 00000000 ffffffff 0000543c [ 726.265785][ C0] 1ba0: 830bf380 830bf3b0 82801cb8 ddddb488 00000001 8280c9a4 00000001 82801bec [ 726.266122][ C0] 1bc0: 82801bf0 82801be0 80346da4 81abb53c 60000113 ffffffff [ 726.266428][ C0] r9:8281b500 r8:00000001 r7:82801bc4 r6:ffffffff r5:60000113 r4:81abb53c [ 726.266714][ C0] [<81abb514>] (_raw_spin_unlock_irq) from [<80346da4>] (tmigr_handle_remote_up+0x218/0x4b0) [ 726.267144][ C0] [<80346b8c>] (tmigr_handle_remote_up) from [<803450a4>] (__walk_groups_from+0x3c/0xe4) [ 726.267569][ C0] r10:8281b500 r9:8280c820 r8:80346b8c r7:82801cb8 r6:830bf380 r5:00000002 [ 726.267889][ C0] r4:830bf380 [ 726.268052][ C0] [<80345068>] (__walk_groups_from) from [<8034743c>] (tmigr_handle_remote+0xe8/0x108) [ 726.268506][ C0] r9:82804d80 r8:00000102 r7:00000001 r6:00000082 r5:00000002 r4:dddc7488 [ 726.268817][ C0] [<80347354>] (tmigr_handle_remote) from [<80327600>] (run_timer_softirq+0x30/0x34) [ 726.269218][ C0] r4:82804084 [ 726.269386][ C0] [<803275d0>] (run_timer_softirq) from [<8025b55c>] (handle_softirqs+0x140/0x458) [ 726.269853][ C0] [<8025b41c>] (handle_softirqs) from [<8025b9d0>] (__irq_exit_rcu+0x110/0x1d0) [ 726.270255][ C0] r10:00000000 r9:8281b500 r8:00000000 r7:82801dd8 r6:82443e68 r5:8247ef9c [ 726.270579][ C0] r4:8281b500 [ 726.270727][ C0] [<8025b8c0>] (__irq_exit_rcu) from [<8025bd48>] (irq_exit+0x10/0x18) [ 726.271087][ C0] r5:8247ef9c r4:826c3a9c [ 726.271280][ C0] [<8025bd38>] (irq_exit) from [<81aad164>] (generic_handle_arch_irq+0x7c/0x80) [ 726.271670][ C0] [<81aad0e8>] (generic_handle_arch_irq) from [<80200bdc>] (__irq_svc+0x7c/0xbc) [ 726.272060][ C0] Exception stack(0x82801dd8 to 0x82801e20) [ 726.272311][ C0] 1dc0: 00000001 00000000 [ 726.272675][ C0] 1de0: 0000dda9 0000dda7 840a5b68 00000004 00000001 840a5b68 8406be88 840a5a40 [ 726.273030][ C0] 1e00: 00000000 82801e3c 82801e28 82801e28 81abb6cc 81abb6f4 80000013 ffffffff [ 726.273368][ C0] r9:8281b500 r8:8406be88 r7:82801e0c r6:ffffffff r5:80000013 r4:81abb6f4 [ 726.273672][ C0] [<81abb6b4>] (_raw_spin_lock) from [<809c74b8>] (gpio_mmio_set+0x44/0x80) [ 726.274057][ C0] r5:00000004 r4:840a5a40 [ 726.274281][ C0] [<809c7474>] (gpio_mmio_set) from [<809b7c74>] (gpiochip_set+0x1c/0x44) [ 726.274682][ C0] r7:00000001 r6:00000000 r5:00000002 r4:8410c9e8 [ 726.274937][ C0] [<809b7c58>] (gpiochip_set) from [<809ba53c>] (gpiod_set_raw_value_commit+0x78/0x218) [ 726.275338][ C0] [<809ba4c4>] (gpiod_set_raw_value_commit) from [<809bbddc>] (gpiod_set_value_nocheck+0x44/0x58) [ 726.275794][ C0] r10:00000000 r9:00000000 r8:00000001 r7:dddce4c0 r6:833f9518 r5:00000001 [ 726.276085][ C0] r4:8410c9e8 [ 726.276240][ C0] [<809bbd98>] (gpiod_set_value_nocheck) from [<809bbe2c>] (gpiod_set_value+0x3c/0x88) [ 726.276646][ C0] [<809bbdf0>] (gpiod_set_value) from [<809cc5c8>] (gpio_led_set+0x5c/0x60) [ 726.276974][ C0] r5:000000ff r4:84df1224 [ 726.277211][ C0] [<809cc56c>] (gpio_led_set) from [<809c9ef0>] (led_set_brightness+0x84/0x90) [ 726.277577][ C0] r5:000000ff r4:84df1224 [ 726.277770][ C0] [<809c9e6c>] (led_set_brightness) from [<809cba70>] (led_trigger_event+0x40/0x58) [ 726.278145][ C0] r5:000000ff r4:84df1224 [ 726.278367][ C0] [<809cba30>] (led_trigger_event) from [<809cd0cc>] (ledtrig_cpu+0xac/0xf4) [ 726.279093][ C0] r7:dddce4c0 r6:00000002 r5:82b15cd8 r4:000001fd [ 726.279346][ C0] [<809cd020>] (ledtrig_cpu) from [<80227a38>] (arch_cpu_idle_exit+0x14/0x18) [ 726.279741][ C0] r9:00000000 r8:00000000 r7:8280c710 r6:8281b500 r5:8280c6d0 r4:00000000 [ 726.280037][ C0] [<80227a24>] (arch_cpu_idle_exit) from [<802b158c>] (do_idle+0x5c/0x2d8) [ 726.280433][ C0] [<802b1530>] (do_idle) from [<802b1b38>] (cpu_startup_entry+0x30/0x34) [ 726.280810][ C0] r10:8281aff4 r9:8280c680 r8:823bea70 r7:00000000 r6:deffc06c r5:828222e8 [ 726.281114][ C0] r4:000000ed [ 726.281279][ C0] [<802b1b08>] (cpu_startup_entry) from [<81aaeb7c>] (kernel_init+0x0/0x138) [ 726.281663][ C0] [<81aaea9c>] (rest_init) from [<8260145c>] (start_kernel+0x844/0x860) [ 726.282024][ C0] [<82600c18>] (start_kernel) from [<00000000>] (0x0) [ 726.284752][ C0] Rebooting in 86400 seconds..