last executing test programs: 2.792379037s ago: executing program 1 (id=744): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$mixer(0xffffff9c, &(0x7f0000000040), 0x28040, 0x0) ioctl$DMA_HEAP_IOCTL_ALLOC(r1, 0xc0184800, &(0x7f0000000000)={0x7, r0, 0x1}) sendmsg$NL80211_CMD_STOP_P2P_DEVICE(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}, 0x1, 0x0, 0x0, 0x20000002}, 0x0) 2.710822457s ago: executing program 1 (id=746): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x41, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000dc0)={0x0, 0x4, 0x0, 0x0, 0x1b, "0062ba7d820700000000000000000000096304"}) r1 = syz_open_pts(r0, 0x80) ioctl$TIOCGICOUNT(r1, 0x5450, 0x0) 488.749428ms ago: executing program 0 (id=762): r0 = openat$mice(0xffffff9c, &(0x7f0000000040), 0x230300) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) write$P9_RLOCK(r0, 0x0, 0x0) 419.040677ms ago: executing program 0 (id=763): r0 = socket$nl_rdma(0x10, 0x3, 0x14) r1 = openat$sequencer2(0xffffff9c, &(0x7f0000000000), 0x100001, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$IOC_WATCH_QUEUE_SET_SIZE(r2, 0x5760, 0x3) 340.385747ms ago: executing program 0 (id=764): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname(r0, &(0x7f0000000000)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, &(0x7f0000000280)=0x80) dup3(r0, r1, 0x0) sendmsg$ETHTOOL_MSG_RINGS_SET(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={0x0}, 0x1, 0x0, 0x0, 0x81}, 0x8c0) 325.991689ms ago: executing program 1 (id=768): r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000100)='\x00', 0x89901) close(r0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$IPSET_CMD_SWAP(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)={0x14, 0x6, 0x6, 0x301, 0x0, 0x0, {0x3, 0x0, 0x8}}, 0x14}, 0x1, 0x0, 0x0, 0x51}, 0x40020) 240.47345ms ago: executing program 0 (id=765): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x2000, 0x0) ioctl$TIOCSPTLCK(r0, 0x40045431, &(0x7f0000000000)) r1 = ioctl$TIOCGPTPEER(r0, 0x5441, 0x5) ioctl$TIOCGDEV(r1, 0x80045432, &(0x7f0000000080)) 225.623542ms ago: executing program 1 (id=770): mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_freezer_state(r0, &(0x7f0000000140), 0x2, 0x0) readv(r1, 0x0, 0x0) 128.106154ms ago: executing program 0 (id=766): r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/asound/seq/clients\x00', 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) dup3(r1, r0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r0, 0x8010661b, 0x0) 111.592926ms ago: executing program 1 (id=772): r0 = syz_open_dev$vcsu(&(0x7f0000000000), 0x1, 0x22000) close_range(r0, r0, 0x2) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_TESTMODE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000480)={0x14, 0x0, 0x8, 0x70bd2d, 0x25dfdbfc, {{}, {@void, @void}}}, 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x4000000) 221.47µs ago: executing program 0 (id=767): r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000001100)='./file0\x00', 0xc0441, 0x0) close(r0) socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, 0x0) 0s ago: executing program 1 (id=769): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) sendto$l2tp6(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000000)={0xa, 0x0, 0xffffffff, @remote, 0x3}, 0x20) sendmsg$DEVLINK_CMD_SB_OCC_SNAPSHOT(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x1, 0x0, 0x0, 0xc000}, 0x40080) kernel console output (not intermixed with test programs): [ 47.289721][ T29] audit: type=1400 audit(47.210:56): avc: denied { read write } for pid=3092 comm="sftp-server" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 47.290760][ T29] audit: type=1400 audit(47.210:57): avc: denied { open } for pid=3092 comm="sftp-server" path="/dev/null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 Warning: Permanently added '[localhost]:61447' (ED25519) to the list of known hosts. [ 61.304357][ T29] audit: type=1400 audit(61.210:58): avc: denied { name_bind } for pid=3095 comm="sshd-session" src=30000 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 62.819564][ T29] audit: type=1400 audit(62.740:59): avc: denied { execute } for pid=3096 comm="sh" name="syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 62.834800][ T29] audit: type=1400 audit(62.760:60): avc: denied { execute_no_trans } for pid=3096 comm="sh" path="/syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 65.994427][ T29] audit: type=1400 audit(65.920:61): avc: denied { mounton } for pid=3096 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=806 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 65.998602][ T29] audit: type=1400 audit(65.920:62): avc: denied { mount } for pid=3096 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 66.012826][ T3096] cgroup: Unknown subsys name 'net' [ 66.021970][ T29] audit: type=1400 audit(65.940:63): avc: denied { unmount } for pid=3096 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 66.156394][ T3096] cgroup: Unknown subsys name 'cpuset' [ 66.161605][ T3096] cgroup: Unknown subsys name 'hugetlb' [ 66.162566][ T3096] cgroup: Unknown subsys name 'rlimit' [ 66.374337][ T29] audit: type=1400 audit(66.300:64): avc: denied { setattr } for pid=3096 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 66.377281][ T29] audit: type=1400 audit(66.300:65): avc: denied { mounton } for pid=3096 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 66.381588][ T29] audit: type=1400 audit(66.310:66): avc: denied { mount } for pid=3096 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 66.566310][ T3098] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 66.571150][ T29] audit: type=1400 audit(66.490:67): avc: denied { relabelto } for pid=3098 comm="mkswap" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 66.574120][ T29] audit: type=1400 audit(66.500:68): avc: denied { write } for pid=3098 comm="mkswap" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 66.609059][ T29] audit: type=1400 audit(66.530:69): avc: denied { read } for pid=3096 comm="syz-executor" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 66.612633][ T29] audit: type=1400 audit(66.530:70): avc: denied { open } for pid=3096 comm="syz-executor" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 74.351919][ T3096] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 76.497083][ T29] audit: type=1400 audit(76.420:71): avc: denied { execmem } for pid=3099 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 76.561542][ T29] audit: type=1400 audit(76.480:72): avc: denied { read } for pid=3101 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 76.563281][ T29] audit: type=1400 audit(76.490:73): avc: denied { open } for pid=3101 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 76.569127][ T29] audit: type=1400 audit(76.490:74): avc: denied { mounton } for pid=3101 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 76.595276][ T29] audit: type=1400 audit(76.520:75): avc: denied { module_request } for pid=3101 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 76.682521][ T29] audit: type=1400 audit(76.610:76): avc: denied { sys_module } for pid=3101 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 77.347616][ T29] audit: type=1400 audit(77.270:77): avc: denied { ioctl } for pid=3101 comm="syz-executor" path="/dev/net/tun" dev="devtmpfs" ino=677 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 78.511691][ T3101] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 78.519438][ T3101] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 78.598852][ T3102] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 78.607642][ T3102] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 79.417192][ T3101] hsr_slave_0: entered promiscuous mode [ 79.422582][ T3101] hsr_slave_1: entered promiscuous mode [ 79.433923][ T3102] hsr_slave_0: entered promiscuous mode [ 79.435546][ T3102] hsr_slave_1: entered promiscuous mode [ 79.437800][ T3102] debugfs: 'hsr0' already exists in 'hsr' [ 79.439096][ T3102] Cannot create hsr debugfs directory [ 79.806156][ T29] audit: type=1400 audit(79.730:78): avc: denied { create } for pid=3101 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 79.824720][ T29] audit: type=1400 audit(79.750:79): avc: denied { write } for pid=3101 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 79.826685][ T29] audit: type=1400 audit(79.750:80): avc: denied { read } for pid=3101 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 79.848820][ T3102] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 79.857223][ T3101] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 79.863754][ T3102] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 79.867969][ T3101] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 79.875228][ T3102] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 79.878704][ T3101] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 79.885702][ T3102] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 79.892510][ T3101] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 80.458342][ T3102] 8021q: adding VLAN 0 to HW filter on device bond0 [ 80.657263][ T3101] 8021q: adding VLAN 0 to HW filter on device bond0 [ 83.149129][ T3102] veth0_vlan: entered promiscuous mode [ 83.176255][ T3102] veth1_vlan: entered promiscuous mode [ 83.269502][ T3102] veth0_macvtap: entered promiscuous mode [ 83.285070][ T3102] veth1_macvtap: entered promiscuous mode [ 83.356393][ T3101] veth0_vlan: entered promiscuous mode [ 83.381639][ T3101] veth1_vlan: entered promiscuous mode [ 83.399734][ T1306] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 83.400787][ T1306] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 83.400949][ T1306] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 83.401071][ T1306] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 83.510647][ T29] audit: type=1400 audit(83.430:81): avc: denied { mount } for pid=3102 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 83.519743][ T29] audit: type=1400 audit(83.440:82): avc: denied { mounton } for pid=3102 comm="syz-executor" path="/syzkaller.ElTIbJ/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 83.528544][ T29] audit: type=1400 audit(83.450:83): avc: denied { mount } for pid=3102 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 83.537760][ T29] audit: type=1400 audit(83.460:84): avc: denied { mounton } for pid=3102 comm="syz-executor" path="/syzkaller.ElTIbJ/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 83.544145][ T29] audit: type=1400 audit(83.470:85): avc: denied { mounton } for pid=3102 comm="syz-executor" path="/syzkaller.ElTIbJ/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=2265 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 83.558271][ T3101] veth0_macvtap: entered promiscuous mode [ 83.567561][ T29] audit: type=1400 audit(83.490:86): avc: denied { unmount } for pid=3102 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 83.575202][ T29] audit: type=1400 audit(83.500:87): avc: denied { mounton } for pid=3102 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=772 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 83.575248][ T3101] veth1_macvtap: entered promiscuous mode [ 83.577461][ T29] audit: type=1400 audit(83.500:88): avc: denied { mount } for pid=3102 comm="syz-executor" name="/" dev="gadgetfs" ino=2267 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 83.585311][ T29] audit: type=1400 audit(83.510:89): avc: denied { mount } for pid=3102 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 83.587607][ T29] audit: type=1400 audit(83.510:90): avc: denied { mounton } for pid=3102 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 83.649431][ T3102] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 83.706760][ T1358] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 83.707140][ T1358] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 83.711121][ T1358] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 83.712553][ T1358] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 98.879561][ T3789] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2057 sclass=netlink_route_socket pid=3789 comm=syz.1.36 [ 98.964023][ T29] kauditd_printk_skb: 14 callbacks suppressed [ 98.968400][ T3792] syz.1.38 uses obsolete (PF_INET,SOCK_PACKET) [ 98.972202][ T29] audit: type=1400 audit(98.890:105): avc: denied { prog_load } for pid=3790 comm="syz.1.38" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 98.972597][ T29] audit: type=1400 audit(98.890:106): avc: denied { bpf } for pid=3790 comm="syz.1.38" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 98.972802][ T29] audit: type=1400 audit(98.900:107): avc: denied { create } for pid=3790 comm="syz.1.38" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 98.983697][ T29] audit: type=1400 audit(98.900:108): avc: denied { ioctl } for pid=3790 comm="syz.1.38" path="socket:[3362]" dev="sockfs" ino=3362 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 99.516533][ T3807] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2057 sclass=netlink_route_socket pid=3807 comm=syz.0.44 [ 100.091242][ T29] audit: type=1400 audit(100.000:109): avc: denied { create } for pid=3824 comm="syz.1.52" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 100.098303][ T29] audit: type=1400 audit(100.020:110): avc: denied { getopt } for pid=3824 comm="syz.1.52" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 101.507215][ T3843] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=3843 comm=syz.1.61 [ 101.592902][ T3845] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=3845 comm=syz.1.62 [ 101.787473][ T29] audit: type=1400 audit(101.710:111): avc: denied { create } for pid=3848 comm="syz.1.65" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 101.793815][ T29] audit: type=1400 audit(101.720:112): avc: denied { write } for pid=3848 comm="syz.1.65" path="socket:[3455]" dev="sockfs" ino=3455 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 101.941178][ T3854] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=3854 comm=syz.1.67 [ 102.018741][ T3856] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=3856 comm=syz.1.68 [ 102.505398][ T3869] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=3869 comm=syz.1.73 [ 102.850087][ T3884] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=3884 comm=syz.1.79 [ 103.575321][ T29] audit: type=1400 audit(103.500:113): avc: denied { bind } for pid=3912 comm="syz.0.94" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 103.583712][ T29] audit: type=1400 audit(103.510:114): avc: denied { accept } for pid=3912 comm="syz.0.94" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 104.381554][ T29] audit: type=1400 audit(104.310:115): avc: denied { append } for pid=3940 comm="syz.0.107" name="mixer" dev="devtmpfs" ino=728 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 104.594815][ T29] audit: type=1400 audit(104.520:116): avc: denied { ioctl } for pid=3948 comm="syz.0.111" path="socket:[3638]" dev="sockfs" ino=3638 ioctlcmd=0x6405 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 105.436941][ T29] audit: type=1400 audit(105.360:117): avc: denied { write } for pid=3970 comm="syz.1.123" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 105.906518][ T29] audit: type=1400 audit(105.830:118): avc: denied { perfmon } for pid=3979 comm="syz.1.127" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 105.930868][ T29] audit: type=1400 audit(105.850:119): avc: denied { prog_run } for pid=3979 comm="syz.1.127" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 105.939151][ T29] audit: type=1400 audit(105.860:120): avc: denied { map_create } for pid=3979 comm="syz.1.127" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 105.946298][ T29] audit: type=1400 audit(105.870:121): avc: denied { map_read map_write } for pid=3979 comm="syz.1.127" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 107.606704][ T29] audit: type=1400 audit(107.530:122): avc: denied { block_suspend } for pid=3999 comm="syz.1.134" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 117.119270][ T4071] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4071 comm=syz.0.166 [ 121.452615][ T29] audit: type=1400 audit(121.380:123): avc: denied { ioctl } for pid=4141 comm="syz.1.200" path="socket:[3967]" dev="sockfs" ino=3967 ioctlcmd=0x89f3 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 121.881333][ T4158] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4158 comm=syz.0.207 [ 124.667029][ T4178] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4178 comm=syz.1.217 [ 124.756527][ T29] audit: type=1400 audit(124.680:124): avc: denied { allowed } for pid=4179 comm="syz.1.218" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 124.775436][ T29] audit: type=1400 audit(124.700:125): avc: denied { sqpoll } for pid=4179 comm="syz.1.218" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 125.857355][ T4205] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 125.862136][ T29] audit: type=1400 audit(125.790:126): avc: denied { getopt } for pid=4204 comm="syz.1.230" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 126.045690][ T29] audit: type=1400 audit(125.970:127): avc: denied { ioctl } for pid=4209 comm="syz.1.233" path="socket:[4091]" dev="sockfs" ino=4091 ioctlcmd=0x8901 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 126.134774][ T29] audit: type=1400 audit(126.060:128): avc: denied { bind } for pid=4212 comm="syz.0.235" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 126.577587][ T4224] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=61 sclass=netlink_route_socket pid=4224 comm=syz.1.239 [ 127.349362][ T4245] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4245 comm=syz.0.249 [ 127.448229][ T29] audit: type=1400 audit(127.370:129): avc: denied { ioctl } for pid=4247 comm="syz.1.251" path="socket:[4161]" dev="sockfs" ino=4161 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 127.466858][ T29] audit: type=1400 audit(127.380:130): avc: denied { create } for pid=4248 comm="syz.0.252" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 127.479809][ T29] audit: type=1400 audit(127.400:131): avc: denied { write } for pid=4248 comm="syz.0.252" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 127.738300][ T4262] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5129 sclass=netlink_route_socket pid=4262 comm=syz.0.258 [ 130.363963][ T29] audit: type=1400 audit(130.290:132): avc: denied { getopt } for pid=4286 comm="syz.0.271" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 131.329228][ T29] audit: type=1400 audit(131.250:133): avc: denied { setopt } for pid=4320 comm="syz.1.286" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 131.812099][ T29] audit: type=1400 audit(131.740:134): avc: denied { create } for pid=4339 comm="syz.1.297" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 135.207446][ T29] audit: type=1400 audit(135.130:135): avc: denied { getopt } for pid=4472 comm="syz.0.365" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 136.698341][ T29] audit: type=1400 audit(136.620:136): avc: denied { setopt } for pid=4520 comm="syz.0.384" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 140.784197][ T29] audit: type=1400 audit(140.710:137): avc: denied { write } for pid=4582 comm="syz.0.412" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 141.050671][ T29] audit: type=1400 audit(140.970:138): avc: denied { remount } for pid=4588 comm="syz.0.415" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 141.080981][ T29] audit: type=1400 audit(141.000:139): avc: denied { unmount } for pid=3101 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 141.179178][ T29] audit: type=1400 audit(141.100:140): avc: denied { read } for pid=4595 comm="syz.0.416" path="socket:[5714]" dev="sockfs" ino=5714 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 144.449600][ T4677] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4677 comm=syz.0.457 [ 144.559726][ T29] audit: type=1400 audit(144.480:141): avc: denied { write } for pid=4680 comm="syz.1.462" name="udp6" dev="proc" ino=4026532787 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 144.997422][ T4695] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4695 comm=syz.0.466 [ 145.653222][ T4721] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4721 comm=syz.1.479 [ 145.893236][ T4733] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4733 comm=syz.0.485 [ 146.279961][ T29] audit: type=1400 audit(146.200:142): avc: denied { ioctl } for pid=4745 comm="syz.1.491" path="socket:[5989]" dev="sockfs" ino=5989 ioctlcmd=0x4601 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 148.157072][ T29] audit: type=1400 audit(148.080:143): avc: denied { map } for pid=4780 comm="syz.1.507" path="socket:[6191]" dev="sockfs" ino=6191 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tcp_socket permissive=1 [ 148.380062][ T29] audit: type=1400 audit(148.300:144): avc: denied { write } for pid=4788 comm="syz.1.512" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 151.052575][ T29] audit: type=1400 audit(150.980:145): avc: denied { create } for pid=4797 comm="syz.0.521" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 151.055500][ T29] audit: type=1400 audit(150.980:146): avc: denied { write } for pid=4797 comm="syz.0.521" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 151.067454][ T4800] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4800 comm=syz.1.517 [ 151.315429][ T4809] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1281 sclass=netlink_route_socket pid=4809 comm=syz.1.522 [ 151.436868][ T4812] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4812 comm=syz.0.524 [ 152.645049][ T4824] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4824 comm=syz.1.530 [ 152.986683][ T29] audit: type=1400 audit(152.910:147): avc: denied { getopt } for pid=4831 comm="syz.1.534" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 153.330155][ T4840] Zero length message leads to an empty skb [ 156.712257][ T4864] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=4 sclass=netlink_tcpdiag_socket pid=4864 comm=syz.0.550 [ 161.773269][ T4917] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4917 comm=syz.1.575 [ 161.937544][ T4921] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4921 comm=syz.1.577 [ 165.039088][ T4945] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4945 comm=syz.0.587 [ 167.594379][ T29] audit: type=1400 audit(167.520:148): avc: denied { read } for pid=4957 comm="syz.0.592" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 168.201187][ T29] audit: type=1400 audit(168.120:149): avc: denied { map } for pid=4979 comm="syz.0.604" path="socket:[7402]" dev="sockfs" ino=7402 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 168.202509][ T29] audit: type=1400 audit(168.130:150): avc: denied { read write } for pid=4979 comm="syz.0.604" path="socket:[7402]" dev="sockfs" ino=7402 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 168.209449][ T29] audit: type=1400 audit(168.130:151): avc: denied { setopt } for pid=4979 comm="syz.0.604" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 168.386891][ T4986] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=514 sclass=netlink_audit_socket pid=4986 comm=syz.1.607 [ 168.869924][ T4998] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2051 sclass=netlink_route_socket pid=4998 comm=syz.1.613 [ 168.997020][ T5004] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5004 comm=syz.1.615 [ 170.297051][ T29] audit: type=1400 audit(170.220:152): avc: denied { map } for pid=5023 comm="syz.1.625" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=7487 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 170.301282][ T29] audit: type=1400 audit(170.220:153): avc: denied { read write } for pid=5023 comm="syz.1.625" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=7487 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 170.361197][ T5026] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5026 comm=syz.0.626 [ 170.558102][ T5033] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 171.727380][ T5074] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5074 comm=syz.1.649 [ 171.852065][ T29] audit: type=1400 audit(171.780:154): avc: denied { create } for pid=5078 comm="syz.1.655" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 171.856625][ T29] audit: type=1400 audit(171.780:155): avc: denied { write } for pid=5078 comm="syz.1.655" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 172.719255][ T5099] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5099 comm=syz.1.662 [ 173.016708][ T5109] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5109 comm=syz.1.667 [ 174.219740][ T5119] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5119 comm=syz.1.672 [ 175.650423][ C0] hrtimer: interrupt took 7377952 ns [ 177.867420][ T5151] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5151 comm=syz.0.686 [ 178.144699][ T5155] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5155 comm=syz.0.688 [ 180.790720][ T5187] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5187 comm=syz.0.702 [ 181.101236][ T29] audit: type=1400 audit(181.020:156): avc: denied { read } for pid=5190 comm="syz.0.704" path="socket:[6884]" dev="sockfs" ino=6884 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 182.113896][ T5224] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5224 comm=syz.1.722 [ 186.103666][ T5295] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5295 comm=syz.0.756 [ 594.230713][ C0] watchdog: BUG: soft lockup - CPU#0 stuck for 430s! [swapper/0:0] [ 594.230984][ C0] Modules linked in: [ 594.231824][ C0] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Not tainted syzkaller #0 PREEMPT [ 594.232126][ C0] Hardware name: ARM-Versatile Express [ 594.232359][ C0] PC is at _raw_spin_unlock_irq+0x28/0x54 [ 594.233136][ C0] LR is at timer_expire_remote+0x60/0x6c [ 594.233208][ C0] pc : [<81abbd3c>] lr : [<80328a30>] psr: 60000113 [ 594.233260][ C0] sp : 82801bc0 ip : 82801bd0 fp : 82801bcc [ 594.233300][ C0] r10: 00000001 r9 : 8280c9a4 r8 : 00000001 [ 594.233347][ C0] r7 : ddddb488 r6 : 82801cb8 r5 : 830bf3b0 r4 : dddd9f00 [ 594.233394][ C0] r3 : 00002404 r2 : 00000000 r1 : 00000000 r0 : dddd9f00 [ 594.233514][ C0] Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment user [ 594.233596][ C0] Control: 30c5387d Table: 84e44b80 DAC: fffffffd [ 594.233709][ C0] Call trace: [ 594.233981][ C0] [<81abbd14>] (_raw_spin_unlock_irq) from [<80328a30>] (timer_expire_remote+0x60/0x6c) [ 594.234350][ C0] [<803289d0>] (timer_expire_remote) from [<8034706c>] (tmigr_handle_remote_up+0x3e0/0x4b0) [ 594.234474][ C0] r4:830bf380 [ 594.234504][ C0] [<80346c8c>] (tmigr_handle_remote_up) from [<803451a4>] (__walk_groups_from+0x3c/0xe4) [ 594.234607][ C0] r10:8281b500 r9:8280c820 r8:80346c8c r7:82801cb8 r6:830bf380 r5:00000002 [ 594.234643][ C0] r4:830bf380 [ 594.234664][ C0] [<80345168>] (__walk_groups_from) from [<8034753c>] (tmigr_handle_remote+0xe8/0x108) [ 594.234746][ C0] r9:82804d80 r8:00000102 r7:00000001 r6:00000002 r5:00000002 r4:dddc7488 [ 594.234770][ C0] [<80347454>] (tmigr_handle_remote) from [<80327700>] (run_timer_softirq+0x30/0x34) [ 594.234836][ C0] r4:82804084 [ 594.234856][ C0] [<803276d0>] (run_timer_softirq) from [<8025b65c>] (handle_softirqs+0x140/0x458) [ 594.234923][ C0] [<8025b51c>] (handle_softirqs) from [<8025bad0>] (__irq_exit_rcu+0x110/0x1d0) [ 594.234994][ C0] r10:00000000 r9:8281b500 r8:00000000 r7:82801dd8 r6:82443f98 r5:8247f0cc [ 594.235013][ C0] r4:8281b500 [ 594.235030][ C0] [<8025b9c0>] (__irq_exit_rcu) from [<8025be48>] (irq_exit+0x10/0x18) [ 594.235104][ C0] r5:8247f0cc r4:826c3a9c [ 594.235122][ C0] [<8025be38>] (irq_exit) from [<81aad964>] (generic_handle_arch_irq+0x7c/0x80) [ 594.235183][ C0] [<81aad8e8>] (generic_handle_arch_irq) from [<80200bdc>] (__irq_svc+0x7c/0xbc) [ 594.235328][ C0] Exception stack(0x82801dd8 to 0x82801e20) [ 594.235517][ C0] 1dc0: 00000001 00000000 [ 594.235575][ C0] 1de0: 0000c621 0000c61f 8427d368 00000004 00000001 8427d368 838dea88 8427d240 [ 594.235610][ C0] 1e00: 00000000 82801e3c 82801e28 82801e28 81abbecc 81abbef4 80000013 ffffffff [ 594.235685][ C0] r9:8281b500 r8:838dea88 r7:82801e0c r6:ffffffff r5:80000013 r4:81abbef4 [ 594.235707][ C0] [<81abbeb4>] (_raw_spin_lock) from [<809c7a2c>] (gpio_mmio_set+0x44/0x80) [ 594.235779][ C0] r5:00000004 r4:8427d240 [ 594.235798][ C0] [<809c79e8>] (gpio_mmio_set) from [<809b81e8>] (gpiochip_set+0x1c/0x44) [ 594.235901][ C0] r7:00000001 r6:00000000 r5:00000002 r4:840b6aa8 [ 594.235923][ C0] [<809b81cc>] (gpiochip_set) from [<809baab0>] (gpiod_set_raw_value_commit+0x78/0x218) [ 594.235987][ C0] [<809baa38>] (gpiod_set_raw_value_commit) from [<809bc350>] (gpiod_set_value_nocheck+0x44/0x58) [ 594.236063][ C0] r10:00000000 r9:00000000 r8:00000001 r7:dddce4c0 r6:83e73118 r5:00000001 [ 594.236086][ C0] r4:840b6aa8 [ 594.236104][ C0] [<809bc30c>] (gpiod_set_value_nocheck) from [<809bc3a0>] (gpiod_set_value+0x3c/0x88) [ 594.236158][ C0] [<809bc364>] (gpiod_set_value) from [<809ccb3c>] (gpio_led_set+0x5c/0x60) [ 594.236222][ C0] r5:000000ff r4:83305a24 [ 594.236240][ C0] [<809ccae0>] (gpio_led_set) from [<809ca464>] (led_set_brightness+0x84/0x90) [ 594.236297][ C0] r5:000000ff r4:83305a24 [ 594.236316][ C0] [<809ca3e0>] (led_set_brightness) from [<809cbfe4>] (led_trigger_event+0x40/0x58) [ 594.236375][ C0] r5:000000ff r4:83305a24 [ 594.236394][ C0] [<809cbfa4>] (led_trigger_event) from [<809cd640>] (ledtrig_cpu+0xac/0xf4) [ 594.236459][ C0] r7:dddce4c0 r6:00000002 r5:82b15cd8 r4:000001fd [ 594.236477][ C0] [<809cd594>] (ledtrig_cpu) from [<80227a38>] (arch_cpu_idle_exit+0x14/0x18) [ 594.236547][ C0] r9:00000000 r8:00000000 r7:8280c710 r6:8281b500 r5:8280c6d0 r4:00000000 [ 594.236567][ C0] [<80227a24>] (arch_cpu_idle_exit) from [<802b168c>] (do_idle+0x5c/0x2d8) [ 594.236630][ C0] [<802b1630>] (do_idle) from [<802b1c38>] (cpu_startup_entry+0x30/0x34) [ 594.236703][ C0] r10:8281aff4 r9:8280c680 r8:823bec64 r7:00000000 r6:deffc06c r5:828222e8 [ 594.236727][ C0] r4:000000ed [ 594.236744][ C0] [<802b1c08>] (cpu_startup_entry) from [<81aaf37c>] (kernel_init+0x0/0x138) [ 594.236817][ C0] [<81aaf29c>] (rest_init) from [<8260145c>] (start_kernel+0x844/0x860) [ 594.236928][ C0] [<82600c18>] (start_kernel) from [<00000000>] (0x0) [ 594.237652][ C0] Sending NMI from CPU 0 to CPUs 1: [ 594.238568][ C1] NMI backtrace for cpu 1 [ 594.238787][ C1] CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Not tainted syzkaller #0 PREEMPT [ 594.238857][ C1] Hardware name: ARM-Versatile Express [ 594.238891][ C1] PC is at _raw_spin_lock+0x40/0x58 [ 594.238975][ C1] LR is at _raw_spin_lock+0x18/0x58 [ 594.239013][ C1] pc : [<81abbef4>] lr : [<81abbecc>] psr: 80000113 [ 594.239038][ C1] sp : df805d68 ip : df805d68 fp : df805d7c [ 594.239059][ C1] r10: 81c05450 r9 : 8427d240 r8 : 838dea88 [ 594.239079][ C1] r7 : 8427d368 r6 : 00000000 r5 : 00000001 r4 : 8427d368 [ 594.239103][ C1] r3 : 0000c61f r2 : 0000c620 r1 : 00000000 r0 : 00000001 [ 594.239127][ C1] Flags: Nzcv IRQs on FIQs on Mode SVC_32 ISA ARM Segment none [ 594.239168][ C1] Control: 30c5387d Table: 86386480 DAC: 00000000 [ 594.239204][ C1] Call trace: frame pointer underflow [ 594.239320][ C1] [<81abbeb4>] (_raw_spin_lock) from [<809c7a2c>] (gpio_mmio_set+0x44/0x80) [ 594.239416][ C1] r5:00000001 r4:8427d240 [ 594.239441][ C1] [<809c79e8>] (gpio_mmio_set) from [<809b81e8>] (gpiochip_set+0x1c/0x44) [ 594.239519][ C1] r7:00000000 r6:00000000 r5:00000000 r4:840b6a80 [ 594.239542][ C1] [<809b81cc>] (gpiochip_set) from [<809baab0>] (gpiod_set_raw_value_commit+0x78/0x218) [ 594.239603][ C1] [<809baa38>] (gpiod_set_raw_value_commit) from [<809bc350>] (gpiod_set_value_nocheck+0x44/0x58) [ 594.239677][ C1] r10:81c05450 r9:df805ebc r8:00000102 r7:ffffd48f r6:0000002d r5:00000000 [ 594.239701][ C1] r4:840b6a80 [ 594.239717][ C1] [<809bc30c>] (gpiod_set_value_nocheck) from [<809bc3a0>] (gpiod_set_value+0x3c/0x88) [ 594.239771][ C1] [<809bc364>] (gpiod_set_value) from [<809ccb3c>] (gpio_led_set+0x5c/0x60) [ 594.239828][ C1] r5:83305844 r4:83305844 [ 594.239848][ C1] [<809ccae0>] (gpio_led_set) from [<809ca3d4>] (led_set_brightness_nosleep+0x38/0x44) [ 594.239935][ C1] r5:83305844 r4:84fd7c4c [ 594.239957][ C1] [<809ca39c>] (led_set_brightness_nosleep) from [<809cd438>] (led_heartbeat_function+0x84/0x144) [ 594.240013][ C1] [<809cd3b4>] (led_heartbeat_function) from [<80327070>] (call_timer_fn+0x30/0x220) [ 594.240085][ C1] r7:ffffd48f r6:809cd3b4 r5:84fd7c4c r4:83216000 [ 594.240114][ C1] [<80327040>] (call_timer_fn) from [<80327524>] (__run_timers+0x2c4/0x3f8) [ 594.240197][ C1] r9:df805ebc r8:ffffd48f r7:00000000 r6:809cd3b4 r5:dddd9f00 r4:84fd7c4c [ 594.240216][ C1] [<80327260>] (__run_timers) from [<803276c0>] (run_timer_base+0x68/0x78) [ 594.240254][ C1] r10:83216000 r9:82804d80 r8:00000102 r7:00000001 r6:00000082 r5:00000002 [ 594.240266][ C1] r4:dddd9f00 [ 594.240275][ C1] [<80327658>] (run_timer_base) from [<803276ec>] (run_timer_softirq+0x1c/0x34) [ 594.240314][ C1] r4:82804084 [ 594.240337][ C1] [<803276d0>] (run_timer_softirq) from [<8025b65c>] (handle_softirqs+0x140/0x458) [ 594.240398][ C1] [<8025b51c>] (handle_softirqs) from [<8025bad0>] (__irq_exit_rcu+0x110/0x1d0) [ 594.240468][ C1] r10:00000000 r9:83216000 r8:00000000 r7:df865e08 r6:82443f98 r5:8247f0cc [ 594.240492][ C1] r4:83216000 [ 594.240509][ C1] [<8025b9c0>] (__irq_exit_rcu) from [<8025be48>] (irq_exit+0x10/0x18) [ 594.240543][ C1] r5:8247f0cc r4:826c3a9c [ 594.240554][ C1] [<8025be38>] (irq_exit) from [<81aad964>] (generic_handle_arch_irq+0x7c/0x80) [ 594.240590][ C1] [<81aad8e8>] (generic_handle_arch_irq) from [<81a7d904>] (call_with_stack+0x1c/0x20) [ 594.240653][ C1] r9:83216000 r8:838dea88 r7:df865e3c r6:ffffffff r5:60000013 r4:809c822c [ 594.240675][ C1] [<81a7d8e8>] (call_with_stack) from [<80200bec>] (__irq_svc+0x8c/0xbc) [ 594.240717][ C1] Exception stack(0xdf865e08 to 0xdf865e50) [ 594.240741][ C1] 5e00: e01e1008 00000009 0000c61f 00000000 e01e1008 00000009 [ 594.240760][ C1] 5e20: 00000001 8427d368 838dea88 8427d240 00000000 df865e6c df865e58 df865e58 [ 594.240774][ C1] 5e40: 809c8228 809c822c 60000013 ffffffff [ 594.240785][ C1] [<809c820c>] (gpio_mmio_write32) from [<809c7a4c>] (gpio_mmio_set+0x64/0x80) [ 594.240828][ C1] r5:00000008 r4:8427d240 [ 594.240851][ C1] [<809c79e8>] (gpio_mmio_set) from [<809b81e8>] (gpiochip_set+0x1c/0x44) [ 594.240915][ C1] r7:00000001 r6:00000000 r5:00000003 r4:840b6abc [ 594.240927][ C1] [<809b81cc>] (gpiochip_set) from [<809baab0>] (gpiod_set_raw_value_commit+0x78/0x218) [ 594.240956][ C1] [<809baa38>] (gpiod_set_raw_value_commit) from [<809bc350>] (gpiod_set_value_nocheck+0x44/0x58) [ 594.241000][ C1] r10:00000000 r9:00000000 r8:00000001 r7:ddde24c0 r6:83e73158 r5:00000001 [ 594.241028][ C1] r4:840b6abc [ 594.241054][ C1] [<809bc30c>] (gpiod_set_value_nocheck) from [<809bc3a0>] (gpiod_set_value+0x3c/0x88) [ 594.241091][ C1] [<809bc364>] (gpiod_set_value) from [<809ccb3c>] (gpio_led_set+0x5c/0x60) [ 594.241120][ C1] r5:000000ff r4:83305b14 [ 594.241130][ C1] [<809ccae0>] (gpio_led_set) from [<809ca464>] (led_set_brightness+0x84/0x90) [ 594.241158][ C1] r5:000000ff r4:83305b14 [ 594.241169][ C1] [<809ca3e0>] (led_set_brightness) from [<809cbfe4>] (led_trigger_event+0x40/0x58) [ 594.241197][ C1] r5:000000ff r4:83305b14 [ 594.241207][ C1] [<809cbfa4>] (led_trigger_event) from [<809cd640>] (ledtrig_cpu+0xac/0xf4) [ 594.241245][ C1] r7:ddde24c0 r6:00000002 r5:82b15cd8 r4:000000fe [ 594.241259][ C1] [<809cd594>] (ledtrig_cpu) from [<80227a38>] (arch_cpu_idle_exit+0x14/0x18) [ 594.241304][ C1] r9:00000000 r8:00000001 r7:8280c710 r6:83216000 r5:8280c6d0 r4:00000001 [ 594.241315][ C1] [<80227a24>] (arch_cpu_idle_exit) from [<802b168c>] (do_idle+0x5c/0x2d8) [ 594.241377][ C1] [<802b1630>] (do_idle) from [<802b1c38>] (cpu_startup_entry+0x30/0x34) [ 594.241418][ C1] r10:00000000 r9:414fc0f0 r8:80003000 r7:82a7b4a4 r6:83216000 r5:00000001 [ 594.241431][ C1] r4:00000092 [ 594.241439][ C1] [<802b1c08>] (cpu_startup_entry) from [<8022f360>] (secondary_start_kernel+0x128/0x194) [ 594.241498][ C1] [<8022f238>] (secondary_start_kernel) from [<80220094>] (__enable_mmu+0x0/0xc) [ 594.241550][ C1] r7:82a7b4a4 r6:30c0387d r5:00000000 r4:830b7bc0 [ 594.242877][ C0] Kernel panic - not syncing: softlockup: hung tasks [ 594.276622][ C0] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Tainted: G L syzkaller #0 PREEMPT [ 594.277145][ C0] Tainted: [L]=SOFTLOCKUP [ 594.277364][ C0] Hardware name: ARM-Versatile Express [ 594.277600][ C0] Call trace: [ 594.277899][ C0] [<80201a74>] (dump_backtrace) from [<80201b70>] (show_stack+0x18/0x1c) [ 594.278293][ C0] r7:822965a4 r6:8281b500 r5:00000000 r4:82295754 [ 594.278534][ C0] [<80201b58>] (show_stack) from [<8021ee08>] (dump_stack_lvl+0x54/0x7c) [ 594.278875][ C0] [<8021edb4>] (dump_stack_lvl) from [<8021ee48>] (dump_stack+0x18/0x1c) [ 594.279238][ C0] r5:00000000 r4:82a7bd14 [ 594.279435][ C0] [<8021ee30>] (dump_stack) from [<80202648>] (vpanic+0xe0/0x2e8) [ 594.279762][ C0] [<80202568>] (vpanic) from [<80202884>] (trace_suspend_resume+0x0/0xd8) [ 594.280168][ C0] r7:82ac27f8 [ 594.280340][ C0] [<80202850>] (panic) from [<80383fcc>] (watchdog_timer_fn+0x2dc/0x350) [ 594.280708][ C0] r3:00000001 r2:00004000 r1:82a7bd1c r0:822965a4 [ 594.280965][ C0] [<80383cf0>] (watchdog_timer_fn) from [<80329c64>] (__hrtimer_run_queues+0x1c4/0x454) [ 594.281385][ C0] r10:8281b500 r9:00000000 r8:dddc7130 r7:80383cf0 r6:dddc7000 r5:dddc7040 [ 594.281700][ C0] r4:dddc75d8 [ 594.281871][ C0] [<80329aa0>] (__hrtimer_run_queues) from [<8032b268>] (hrtimer_interrupt+0x148/0x2bc) [ 594.282282][ C0] r10:56b54b20 r9:dddc7180 r8:dddc7130 r7:0000008a r6:00000003 r5:20000193 [ 594.282596][ C0] r4:dddc7000 [ 594.282759][ C0] [<8032b120>] (hrtimer_interrupt) from [<813408e0>] (arch_timer_handler_virt+0x30/0x38) [ 594.283178][ C0] r10:81d0fc78 r9:8309e400 r8:00000000 r7:00000000 r6:00000000 r5:82498528 [ 594.283480][ C0] r4:8309de40 [ 594.283638][ C0] [<813408b0>] (arch_timer_handler_virt) from [<802efab4>] (handle_percpu_devid_irq+0x128/0x34c) [ 594.284065][ C0] [<802ef98c>] (handle_percpu_devid_irq) from [<802e8c44>] (handle_irq_desc+0x74/0x84) [ 594.284466][ C0] r10:00000001 r9:8281b500 r8:00000000 r7:df80a00c r6:826c2388 r5:df80a000 [ 594.284765][ C0] r4:8280cc44 [ 594.284926][ C0] [<802e8bd0>] (handle_irq_desc) from [<802e8cc0>] (generic_handle_domain_irq+0x18/0x1c) [ 594.285315][ C0] [<802e8ca8>] (generic_handle_domain_irq) from [<802012c8>] (gic_handle_irq+0x68/0x7c) [ 594.285698][ C0] [<80201260>] (gic_handle_irq) from [<81aad948>] (generic_handle_arch_irq+0x60/0x80) [ 594.286085][ C0] r7:82801b70 r6:82443f98 r5:8247f0cc r4:826c3a9c [ 594.286325][ C0] [<81aad8e8>] (generic_handle_arch_irq) from [<80200bdc>] (__irq_svc+0x7c/0xbc) [ 594.286646][ C0] Exception stack(0x82801b70 to 0x82801bb8) [ 594.286870][ C0] 1b60: dddd9f00 00000000 00000000 00002404 [ 594.287193][ C0] 1b80: dddd9f00 830bf3b0 82801cb8 ddddb488 00000001 8280c9a4 00000001 82801bcc [ 594.287493][ C0] 1ba0: 82801bd0 82801bc0 80328a30 81abbd3c 60000113 ffffffff [ 594.287764][ C0] r9:8281b500 r8:00000001 r7:82801ba4 r6:ffffffff r5:60000113 r4:81abbd3c [ 594.288082][ C0] [<81abbd14>] (_raw_spin_unlock_irq) from [<80328a30>] (timer_expire_remote+0x60/0x6c) [ 594.288487][ C0] [<803289d0>] (timer_expire_remote) from [<8034706c>] (tmigr_handle_remote_up+0x3e0/0x4b0) [ 594.288892][ C0] r4:830bf380 [ 594.289063][ C0] [<80346c8c>] (tmigr_handle_remote_up) from [<803451a4>] (__walk_groups_from+0x3c/0xe4) [ 594.289428][ C0] r10:8281b500 r9:8280c820 r8:80346c8c r7:82801cb8 r6:830bf380 r5:00000002 [ 594.289703][ C0] r4:830bf380 [ 594.289857][ C0] [<80345168>] (__walk_groups_from) from [<8034753c>] (tmigr_handle_remote+0xe8/0x108) [ 594.290224][ C0] r9:82804d80 r8:00000102 r7:00000001 r6:00000002 r5:00000002 r4:dddc7488 [ 594.290491][ C0] [<80347454>] (tmigr_handle_remote) from [<80327700>] (run_timer_softirq+0x30/0x34) [ 594.290847][ C0] r4:82804084 [ 594.291004][ C0] [<803276d0>] (run_timer_softirq) from [<8025b65c>] (handle_softirqs+0x140/0x458) [ 594.291357][ C0] [<8025b51c>] (handle_softirqs) from [<8025bad0>] (__irq_exit_rcu+0x110/0x1d0) [ 594.291700][ C0] r10:00000000 r9:8281b500 r8:00000000 r7:82801dd8 r6:82443f98 r5:8247f0cc [ 594.292014][ C0] r4:8281b500 [ 594.292181][ C0] [<8025b9c0>] (__irq_exit_rcu) from [<8025be48>] (irq_exit+0x10/0x18) [ 594.292497][ C0] r5:8247f0cc r4:826c3a9c [ 594.292676][ C0] [<8025be38>] (irq_exit) from [<81aad964>] (generic_handle_arch_irq+0x7c/0x80) [ 594.293008][ C0] [<81aad8e8>] (generic_handle_arch_irq) from [<80200bdc>] (__irq_svc+0x7c/0xbc) [ 594.293342][ C0] Exception stack(0x82801dd8 to 0x82801e20) [ 594.293579][ C0] 1dc0: 00000001 00000000 [ 594.293876][ C0] 1de0: 0000c621 0000c61f 8427d368 00000004 00000001 8427d368 838dea88 8427d240 [ 594.294191][ C0] 1e00: 00000000 82801e3c 82801e28 82801e28 81abbecc 81abbef4 80000013 ffffffff [ 594.294491][ C0] r9:8281b500 r8:838dea88 r7:82801e0c r6:ffffffff r5:80000013 r4:81abbef4 [ 594.294759][ C0] [<81abbeb4>] (_raw_spin_lock) from [<809c7a2c>] (gpio_mmio_set+0x44/0x80) [ 594.295117][ C0] r5:00000004 r4:8427d240 [ 594.295292][ C0] [<809c79e8>] (gpio_mmio_set) from [<809b81e8>] (gpiochip_set+0x1c/0x44) [ 594.295621][ C0] r7:00000001 r6:00000000 r5:00000002 r4:840b6aa8 [ 594.295840][ C0] [<809b81cc>] (gpiochip_set) from [<809baab0>] (gpiod_set_raw_value_commit+0x78/0x218) [ 594.296206][ C0] [<809baa38>] (gpiod_set_raw_value_commit) from [<809bc350>] (gpiod_set_value_nocheck+0x44/0x58) [ 594.296583][ C0] r10:00000000 r9:00000000 r8:00000001 r7:dddce4c0 r6:83e73118 r5:00000001 [ 594.296852][ C0] r4:840b6aa8 [ 594.297002][ C0] [<809bc30c>] (gpiod_set_value_nocheck) from [<809bc3a0>] (gpiod_set_value+0x3c/0x88) [ 594.297334][ C0] [<809bc364>] (gpiod_set_value) from [<809ccb3c>] (gpio_led_set+0x5c/0x60) [ 594.297643][ C0] r5:000000ff r4:83305a24 [ 594.297809][ C0] [<809ccae0>] (gpio_led_set) from [<809ca464>] (led_set_brightness+0x84/0x90) [ 594.298147][ C0] r5:000000ff r4:83305a24 [ 594.298330][ C0] [<809ca3e0>] (led_set_brightness) from [<809cbfe4>] (led_trigger_event+0x40/0x58) [ 594.298785][ C0] r5:000000ff r4:83305a24 [ 594.298958][ C0] [<809cbfa4>] (led_trigger_event) from [<809cd640>] (ledtrig_cpu+0xac/0xf4) [ 594.299303][ C0] r7:dddce4c0 r6:00000002 r5:82b15cd8 r4:000001fd [ 594.299532][ C0] [<809cd594>] (ledtrig_cpu) from [<80227a38>] (arch_cpu_idle_exit+0x14/0x18) [ 594.299897][ C0] r9:00000000 r8:00000000 r7:8280c710 r6:8281b500 r5:8280c6d0 r4:00000000 [ 594.300192][ C0] [<80227a24>] (arch_cpu_idle_exit) from [<802b168c>] (do_idle+0x5c/0x2d8) [ 594.300519][ C0] [<802b1630>] (do_idle) from [<802b1c38>] (cpu_startup_entry+0x30/0x34) [ 594.300871][ C0] r10:8281aff4 r9:8280c680 r8:823bec64 r7:00000000 r6:deffc06c r5:828222e8 [ 594.301192][ C0] r4:000000ed [ 594.301357][ C0] [<802b1c08>] (cpu_startup_entry) from [<81aaf37c>] (kernel_init+0x0/0x138) [ 594.301723][ C0] [<81aaf29c>] (rest_init) from [<8260145c>] (start_kernel+0x844/0x860) [ 594.302087][ C0] [<82600c18>] (start_kernel) from [<00000000>] (0x0) [ 594.304573][ C0] Rebooting in 86400 seconds..