last executing test programs: 2.98949506s ago: executing program 1 (id=1042): r0 = openat$vhost_vsock(0xffffff9c, &(0x7f0000000180), 0x2, 0x0) r1 = dup(r0) ioctl$USBDEVFS_FORBID_SUSPEND(r1, 0x5521) 2.878380865s ago: executing program 1 (id=1044): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) recvmmsg(r0, &(0x7f0000000640)=[{{&(0x7f0000000240)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, 0xfffffffffffffcb3, 0x0, 0x0, 0x0, 0xffffffffffffffcc}}], 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_SNAP_CREATE(r1, 0x5451, 0x0) 2.787863676s ago: executing program 1 (id=1046): r0 = socket(0x29, 0x2, 0x0) sendmsg$BATADV_CMD_SET_VLAN(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[], 0x33fe0}, 0x1, 0x0, 0x0, 0x4000001}, 0x0) sendmsg$IPVS_CMD_NEW_SERVICE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x10) 2.619788277s ago: executing program 0 (id=1048): r0 = socket$nl_audit(0x10, 0x3, 0x9) r1 = fcntl$dupfd(r0, 0x406, r0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}, 0x1, 0x0, 0x0, 0x20000}, 0x4048090) 2.538900627s ago: executing program 0 (id=1049): r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='.\x00', 0x0, 0x0) r1 = openat$cgroup_devices(r0, &(0x7f0000000040)='devices.allow\x00', 0x63, 0x0) ioctl$PIO_UNIMAP(r1, 0x5452, &(0x7f0000000280)={0x0, 0x0}) 2.459394688s ago: executing program 0 (id=1050): r0 = open(&(0x7f0000000140)='.\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000001c0)='hugetlb.2MB.failcnt\x00', 0x657, 0xfeffffff) ioctl$sock_SIOCGSKNS(r1, 0x5450, 0x0) 2.380141308s ago: executing program 0 (id=1051): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) r1 = dup(r0) ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, 0x0) 2.310176577s ago: executing program 0 (id=1052): openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = openat$cgroup_procs(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$TIOCGPTLCK(r0, 0x5451, 0x0) 2.236470136s ago: executing program 0 (id=1053): r0 = socket(0x2b, 0x1, 0x1) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) ioctl$sock_inet6_SIOCSIFDSTADDR(r0, 0x8918, 0x0) 157.67777ms ago: executing program 1 (id=1054): r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_inet6_tcp_SIOCINQ(r1, 0x541b, 0x0) 75.883031ms ago: executing program 1 (id=1055): r0 = epoll_create1(0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$KDGKBMETA(r0, 0x5450, 0x0) 0s ago: executing program 1 (id=1056): setrlimit(0x7, &(0x7f0000000140)={0x4, 0x100}) bpf$ENABLE_STATS(0x20, 0x0, 0x0) epoll_create1(0x0) kernel console output (not intermixed with test programs): [ 48.262017][ T29] audit: type=1400 audit(48.180:56): avc: denied { read write } for pid=3084 comm="sftp-server" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 48.280785][ T29] audit: type=1400 audit(48.210:57): avc: denied { open } for pid=3084 comm="sftp-server" path="/dev/null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 Warning: Permanently added '[localhost]:30728' (ED25519) to the list of known hosts. [ 62.256676][ T29] audit: type=1400 audit(62.180:58): avc: denied { name_bind } for pid=3087 comm="sshd-session" src=30000 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 64.193520][ T29] audit: type=1400 audit(64.120:59): avc: denied { execute } for pid=3088 comm="sh" name="syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 64.196372][ T29] audit: type=1400 audit(64.120:60): avc: denied { execute_no_trans } for pid=3088 comm="sh" path="/syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 66.827889][ T29] audit: type=1400 audit(66.750:61): avc: denied { mounton } for pid=3088 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=806 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 66.839363][ T29] audit: type=1400 audit(66.760:62): avc: denied { mount } for pid=3088 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 66.857022][ T3088] cgroup: Unknown subsys name 'net' [ 66.866284][ T29] audit: type=1400 audit(66.790:63): avc: denied { unmount } for pid=3088 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 67.005286][ T3088] cgroup: Unknown subsys name 'cpuset' [ 67.009570][ T3088] cgroup: Unknown subsys name 'hugetlb' [ 67.010247][ T3088] cgroup: Unknown subsys name 'rlimit' [ 67.195032][ T29] audit: type=1400 audit(67.120:64): avc: denied { setattr } for pid=3088 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 67.198323][ T29] audit: type=1400 audit(67.120:65): avc: denied { mounton } for pid=3088 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 67.200376][ T29] audit: type=1400 audit(67.130:66): avc: denied { mount } for pid=3088 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 67.364540][ T3090] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 67.367087][ T29] audit: type=1400 audit(67.290:67): avc: denied { relabelto } for pid=3090 comm="mkswap" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 67.372015][ T29] audit: type=1400 audit(67.300:68): avc: denied { write } for pid=3090 comm="mkswap" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 67.411137][ T29] audit: type=1400 audit(67.340:69): avc: denied { read } for pid=3088 comm="syz-executor" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 67.413414][ T29] audit: type=1400 audit(67.340:70): avc: denied { open } for pid=3088 comm="syz-executor" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 73.561340][ T3088] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 75.317388][ T29] audit: type=1400 audit(75.240:71): avc: denied { execmem } for pid=3091 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 75.387590][ T29] audit: type=1400 audit(75.310:72): avc: denied { read } for pid=3093 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 75.392010][ T29] audit: type=1400 audit(75.320:73): avc: denied { open } for pid=3093 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 75.403739][ T29] audit: type=1400 audit(75.330:74): avc: denied { mounton } for pid=3093 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 75.434068][ T29] audit: type=1400 audit(75.360:75): avc: denied { module_request } for pid=3094 comm="syz-executor" kmod="netdev-nr1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 75.436120][ T29] audit: type=1400 audit(75.360:76): avc: denied { module_request } for pid=3093 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 75.511336][ T29] audit: type=1400 audit(75.440:77): avc: denied { sys_module } for pid=3094 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 75.512989][ T29] audit: type=1400 audit(75.440:78): avc: denied { sys_module } for pid=3093 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 76.139861][ T29] audit: type=1400 audit(76.070:79): avc: denied { ioctl } for pid=3094 comm="syz-executor" path="/dev/net/tun" dev="devtmpfs" ino=677 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 77.125974][ T3093] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 77.156883][ T3093] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 77.163311][ T3094] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 77.204151][ T3094] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 78.027453][ T3094] hsr_slave_0: entered promiscuous mode [ 78.034693][ T3094] hsr_slave_1: entered promiscuous mode [ 78.081516][ T3093] hsr_slave_0: entered promiscuous mode [ 78.085226][ T3093] hsr_slave_1: entered promiscuous mode [ 78.087079][ T3093] debugfs: 'hsr0' already exists in 'hsr' [ 78.088169][ T3093] Cannot create hsr debugfs directory [ 78.528731][ T29] audit: type=1400 audit(78.450:80): avc: denied { create } for pid=3094 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 78.540991][ T3094] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 78.554706][ T3094] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 78.572991][ T3094] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 78.595795][ T3094] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 78.676306][ T3093] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 78.688739][ T3093] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 78.702926][ T3093] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 78.723048][ T3093] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 79.381497][ T3094] 8021q: adding VLAN 0 to HW filter on device bond0 [ 79.431131][ T3093] 8021q: adding VLAN 0 to HW filter on device bond0 [ 81.884632][ T3094] veth0_vlan: entered promiscuous mode [ 81.933423][ T3094] veth1_vlan: entered promiscuous mode [ 81.992908][ T3093] veth0_vlan: entered promiscuous mode [ 82.015226][ T3093] veth1_vlan: entered promiscuous mode [ 82.018418][ T3094] veth0_macvtap: entered promiscuous mode [ 82.040094][ T3094] veth1_macvtap: entered promiscuous mode [ 82.115741][ T947] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 82.116691][ T947] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 82.116892][ T947] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 82.116970][ T947] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 82.125634][ T3093] veth0_macvtap: entered promiscuous mode [ 82.175599][ T3093] veth1_macvtap: entered promiscuous mode [ 82.235312][ T29] kauditd_printk_skb: 2 callbacks suppressed [ 82.236301][ T29] audit: type=1400 audit(82.160:83): avc: denied { mount } for pid=3094 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 82.245422][ T29] audit: type=1400 audit(82.170:84): avc: denied { mounton } for pid=3094 comm="syz-executor" path="/syzkaller.YNeTXz/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 82.259822][ T29] audit: type=1400 audit(82.180:85): avc: denied { mount } for pid=3094 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 82.261232][ T29] audit: type=1400 audit(82.180:86): avc: denied { mounton } for pid=3094 comm="syz-executor" path="/syzkaller.YNeTXz/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 82.261450][ T29] audit: type=1400 audit(82.180:87): avc: denied { mounton } for pid=3094 comm="syz-executor" path="/syzkaller.YNeTXz/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=3160 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 82.284002][ T29] audit: type=1400 audit(82.210:88): avc: denied { unmount } for pid=3094 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 82.290372][ T29] audit: type=1400 audit(82.220:89): avc: denied { mounton } for pid=3094 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=772 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 82.293917][ T29] audit: type=1400 audit(82.220:90): avc: denied { mount } for pid=3094 comm="syz-executor" name="/" dev="gadgetfs" ino=3161 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 82.301705][ T29] audit: type=1400 audit(82.230:91): avc: denied { mount } for pid=3094 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 82.304851][ T29] audit: type=1400 audit(82.230:92): avc: denied { mounton } for pid=3094 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 82.310509][ T1977] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 82.312234][ T1977] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 82.312444][ T1977] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 82.312564][ T1977] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 82.411809][ T3094] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 86.000581][ T3746] Zero length message leads to an empty skb [ 88.494547][ T29] kauditd_printk_skb: 20 callbacks suppressed [ 88.499879][ T29] audit: type=1400 audit(88.420:113): avc: denied { getopt } for pid=3797 comm="syz.0.46" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 88.685006][ T3803] capability: warning: `syz.0.48' uses 32-bit capabilities (legacy support in use) [ 89.043611][ T29] audit: type=1400 audit(88.970:114): avc: denied { create } for pid=3807 comm="syz.0.50" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 89.056840][ T29] audit: type=1400 audit(88.980:115): avc: denied { bind } for pid=3807 comm="syz.0.50" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 89.480817][ T29] audit: type=1400 audit(89.410:116): avc: denied { setopt } for pid=3807 comm="syz.0.50" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 90.470199][ T29] audit: type=1400 audit(90.390:117): avc: denied { append } for pid=3832 comm="syz.0.61" name="loop-control" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 94.757521][ T29] audit: type=1400 audit(94.680:118): avc: denied { write } for pid=3891 comm="syz.1.91" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 94.976702][ T3902] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=3902 comm=syz.1.96 [ 95.074258][ T29] audit: type=1400 audit(95.000:119): avc: denied { create } for pid=3906 comm="syz.0.99" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 95.346844][ T29] audit: type=1400 audit(95.270:120): avc: denied { write } for pid=3917 comm="syz.0.104" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 95.433730][ T29] audit: type=1400 audit(95.360:121): avc: denied { ioctl } for pid=3921 comm="syz.0.106" path="socket:[2663]" dev="sockfs" ino=2663 ioctlcmd=0x707 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 95.441216][ T29] audit: type=1400 audit(95.370:122): avc: denied { connect } for pid=3922 comm="syz.1.107" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 95.511717][ T29] audit: type=1400 audit(95.440:123): avc: denied { create } for pid=3926 comm="syz.1.109" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 95.517637][ T29] audit: type=1400 audit(95.440:124): avc: denied { write } for pid=3926 comm="syz.1.109" path="socket:[2671]" dev="sockfs" ino=2671 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 95.677892][ T29] audit: type=1400 audit(95.600:125): avc: denied { create } for pid=3933 comm="syz.0.113" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 95.689868][ T29] audit: type=1400 audit(95.610:126): avc: denied { setopt } for pid=3933 comm="syz.0.113" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 96.175583][ T29] audit: type=1400 audit(96.100:127): avc: denied { ioctl } for pid=3953 comm="syz.0.122" path="socket:[2722]" dev="sockfs" ino=2722 ioctlcmd=0x8901 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 96.775144][ T3980] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=3980 comm=syz.0.134 [ 99.849357][ T29] kauditd_printk_skb: 2 callbacks suppressed [ 99.852130][ T29] audit: type=1400 audit(99.770:130): avc: denied { write } for pid=4019 comm="syz.0.153" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 100.821809][ T29] audit: type=1400 audit(100.750:131): avc: denied { map_create } for pid=4047 comm="syz.1.166" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 100.825482][ T29] audit: type=1400 audit(100.750:132): avc: denied { map_read map_write } for pid=4047 comm="syz.1.166" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 101.212511][ T4066] lo: entered promiscuous mode [ 101.213093][ T4066] lo: entered allmulticast mode [ 101.215999][ T4066] tunl0: entered promiscuous mode [ 101.226697][ T4066] tunl0: entered allmulticast mode [ 101.228520][ T4066] gre0: entered promiscuous mode [ 101.230074][ T4066] gre0: entered allmulticast mode [ 101.232284][ T4066] gretap0: entered promiscuous mode [ 101.233001][ T4066] gretap0: entered allmulticast mode [ 101.235352][ T4066] erspan0: entered promiscuous mode [ 101.237807][ T4066] erspan0: entered allmulticast mode [ 101.240694][ T4066] ip_vti0: entered promiscuous mode [ 101.243224][ T4066] ip_vti0: entered allmulticast mode [ 101.247039][ T4066] ip6_vti0: entered promiscuous mode [ 101.249680][ T4066] ip6_vti0: entered allmulticast mode [ 101.252114][ T4066] sit0: entered promiscuous mode [ 101.252776][ T4066] sit0: entered allmulticast mode [ 101.254324][ T4066] ip6tnl0: entered promiscuous mode [ 101.254973][ T4066] ip6tnl0: entered allmulticast mode [ 101.257428][ T4066] ip6gre0: entered promiscuous mode [ 101.258337][ T4066] ip6gre0: entered allmulticast mode [ 101.262962][ T4066] syz_tun: entered promiscuous mode [ 101.264029][ T4066] syz_tun: entered allmulticast mode [ 101.267568][ T4066] ip6gretap0: entered promiscuous mode [ 101.268572][ T4066] ip6gretap0: entered allmulticast mode [ 101.281803][ T4066] vcan0: entered promiscuous mode [ 101.282050][ T4066] vcan0: entered allmulticast mode [ 101.282982][ T4066] bond0: entered promiscuous mode [ 101.283420][ T4066] bond_slave_0: entered promiscuous mode [ 101.283795][ T4066] bond_slave_1: entered promiscuous mode [ 101.283982][ T4066] bond0: entered allmulticast mode [ 101.284097][ T4066] bond_slave_0: entered allmulticast mode [ 101.284167][ T4066] bond_slave_1: entered allmulticast mode [ 101.285203][ T4066] dummy0: entered promiscuous mode [ 101.285442][ T4066] dummy0: entered allmulticast mode [ 101.286087][ T4066] nlmon0: entered promiscuous mode [ 101.286124][ T4066] nlmon0: entered allmulticast mode [ 101.286693][ T4066] vxcan0: entered promiscuous mode [ 101.286735][ T4066] vxcan0: entered allmulticast mode [ 101.287476][ T4066] vxcan1: entered promiscuous mode [ 101.287521][ T4066] vxcan1: entered allmulticast mode [ 101.287979][ T4066] veth0: entered promiscuous mode [ 101.288051][ T4066] veth0: entered allmulticast mode [ 101.288816][ T4066] veth1: entered promiscuous mode [ 101.301362][ T4066] veth1: entered allmulticast mode [ 101.302595][ T4066] wg0: entered promiscuous mode [ 101.302892][ T4066] wg0: entered allmulticast mode [ 101.303972][ T4066] wg1: entered promiscuous mode [ 101.304039][ T4066] wg1: entered allmulticast mode [ 101.304802][ T4066] wg2: entered promiscuous mode [ 101.304851][ T4066] wg2: entered allmulticast mode [ 101.305550][ T4066] veth0_to_bridge: entered promiscuous mode [ 101.305845][ T4066] veth0_to_bridge: entered allmulticast mode [ 101.326940][ T4066] bridge_slave_0: entered promiscuous mode [ 101.327233][ T4066] bridge_slave_0: entered allmulticast mode [ 101.332031][ T4066] veth1_to_bridge: entered promiscuous mode [ 101.333086][ T4066] veth1_to_bridge: entered allmulticast mode [ 101.334281][ T4066] bridge_slave_1: entered promiscuous mode [ 101.334435][ T4066] bridge_slave_1: entered allmulticast mode [ 101.335333][ T4066] veth0_to_bond: entered promiscuous mode [ 101.335620][ T4066] veth0_to_bond: entered allmulticast mode [ 101.343945][ T4066] bond0: (slave bond_slave_0): Releasing backup interface [ 101.364020][ T4066] veth1_to_bond: entered promiscuous mode [ 101.364327][ T4066] veth1_to_bond: entered allmulticast mode [ 101.370262][ T4066] bond0: (slave bond_slave_1): Releasing backup interface [ 101.374590][ T4066] veth0_to_team: entered promiscuous mode [ 101.377247][ T4066] veth0_to_team: entered allmulticast mode [ 101.381732][ T4066] team_slave_0: entered promiscuous mode [ 101.383678][ T4066] team_slave_0: entered allmulticast mode [ 101.386814][ T4066] veth1_to_team: entered promiscuous mode [ 101.388403][ T4066] veth1_to_team: entered allmulticast mode [ 101.394437][ T4066] team_slave_1: entered promiscuous mode [ 101.394768][ T4066] team_slave_1: entered allmulticast mode [ 101.398664][ T4066] veth0_to_batadv: entered promiscuous mode [ 101.401381][ T4066] veth0_to_batadv: entered allmulticast mode [ 101.403973][ T4066] batadv_slave_0: entered promiscuous mode [ 101.404227][ T4066] batadv_slave_0: entered allmulticast mode [ 101.406014][ T4066] veth1_to_batadv: entered promiscuous mode [ 101.406080][ T4066] veth1_to_batadv: entered allmulticast mode [ 101.407232][ T4066] batadv_slave_1: entered promiscuous mode [ 101.407465][ T4066] batadv_slave_1: entered allmulticast mode [ 101.414757][ T4066] xfrm0: entered promiscuous mode [ 101.415176][ T4066] xfrm0: entered allmulticast mode [ 101.420700][ T4066] veth0_to_hsr: entered promiscuous mode [ 101.420797][ T4066] veth0_to_hsr: entered allmulticast mode [ 101.422143][ T4066] hsr_slave_0: entered allmulticast mode [ 101.425949][ T4066] A link change request failed with some changes committed already. Interface hsr_slave_0 may have been left with an inconsistent configuration, please check. [ 102.163685][ T29] audit: type=1400 audit(102.090:133): avc: denied { write } for pid=4097 comm="syz.0.191" name="arp" dev="proc" ino=4026532668 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 102.575158][ T29] audit: type=1400 audit(102.500:134): avc: denied { ioctl } for pid=4103 comm="syz.1.194" path="socket:[2958]" dev="sockfs" ino=2958 ioctlcmd=0x541d scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 103.465307][ T29] audit: type=1400 audit(103.390:135): avc: denied { write } for pid=4127 comm="syz.1.206" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 103.632743][ T29] audit: type=1400 audit(103.560:136): avc: denied { connect } for pid=4131 comm="syz.1.208" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 104.263906][ T29] audit: type=1400 audit(104.190:137): avc: denied { map } for pid=4149 comm="syz.1.215" path="/proc/sys/net/ipv4/tcp_rmem" dev="proc" ino=3022 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_net_t tclass=file permissive=1 [ 106.293905][ T29] audit: type=1400 audit(106.220:138): avc: denied { bind } for pid=4204 comm="syz.1.242" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 106.306243][ T29] audit: type=1400 audit(106.230:139): avc: denied { setopt } for pid=4204 comm="syz.1.242" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 112.647290][ T29] audit: type=1400 audit(112.570:140): avc: denied { connect } for pid=4285 comm="syz.1.280" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 116.359616][ T29] audit: type=1400 audit(116.280:141): avc: denied { getopt } for pid=4344 comm="syz.0.309" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 116.479572][ T29] audit: type=1400 audit(116.400:142): avc: denied { create } for pid=4348 comm="syz.1.312" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 116.488625][ T29] audit: type=1400 audit(116.410:143): avc: denied { getopt } for pid=4348 comm="syz.1.312" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 117.105361][ T29] audit: type=1400 audit(117.030:144): avc: denied { create } for pid=4374 comm="syz.1.324" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 117.113330][ T29] audit: type=1400 audit(117.040:145): avc: denied { setopt } for pid=4374 comm="syz.1.324" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 117.855655][ T29] audit: type=1400 audit(117.780:146): avc: denied { create } for pid=4396 comm="syz.0.335" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 117.867930][ T29] audit: type=1400 audit(117.790:147): avc: denied { ioctl } for pid=4396 comm="syz.0.335" path="socket:[5311]" dev="sockfs" ino=5311 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 118.327789][ T29] audit: type=1400 audit(118.250:148): avc: denied { ioctl } for pid=4406 comm="syz.0.340" path="socket:[5337]" dev="sockfs" ino=5337 ioctlcmd=0x941a scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 118.933887][ T29] audit: type=1400 audit(118.860:149): avc: denied { write } for pid=4420 comm="syz.0.347" lport=255 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 119.154128][ T29] audit: type=1400 audit(119.080:150): avc: denied { create } for pid=4426 comm="syz.0.350" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 119.160682][ T29] audit: type=1400 audit(119.090:151): avc: denied { ioctl } for pid=4426 comm="syz.0.350" path="socket:[4543]" dev="sockfs" ino=4543 ioctlcmd=0x5439 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 120.737608][ T4452] binfmt_misc: register: failed to install interpreter file ./file0/file0 [ 121.441862][ T29] audit: type=1400 audit(121.370:152): avc: denied { ioctl } for pid=4468 comm="syz.1.370" path="socket:[5458]" dev="sockfs" ino=5458 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 123.246632][ T29] audit: type=1400 audit(123.170:153): avc: denied { create } for pid=4528 comm="syz.0.398" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1 [ 126.126386][ T29] audit: type=1400 audit(126.050:154): avc: denied { ioctl } for pid=4571 comm="syz.1.419" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=5626 ioctlcmd=0xaa07 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 126.597055][ T29] audit: type=1400 audit(126.520:155): avc: denied { remount } for pid=4583 comm="syz.1.425" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 126.626846][ T29] audit: type=1400 audit(126.550:156): avc: denied { unmount } for pid=3094 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 126.804723][ T4592] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 130.013201][ T29] audit: type=1400 audit(129.940:157): avc: denied { connect } for pid=4662 comm="syz.1.460" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 130.520596][ T29] audit: type=1400 audit(130.450:158): avc: denied { setopt } for pid=4662 comm="syz.1.460" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 135.986448][ T29] audit: type=1400 audit(135.910:159): avc: denied { read } for pid=4751 comm="syz.1.503" path="socket:[5888]" dev="sockfs" ino=5888 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 136.412567][ T29] audit: type=1400 audit(136.340:160): avc: denied { read } for pid=4762 comm="syz.1.508" path="socket:[5909]" dev="sockfs" ino=5909 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 136.743807][ T4771] capability: warning: `syz.1.512' uses deprecated v2 capabilities in a way that may be insecure [ 144.956012][ T4847] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=4847 comm=syz.1.548 [ 146.948538][ T29] audit: type=1400 audit(146.870:161): avc: denied { create } for pid=4874 comm="syz.1.562" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 146.956571][ T29] audit: type=1400 audit(146.880:162): avc: denied { write } for pid=4874 comm="syz.1.562" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 146.957663][ T4886] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=1794 sclass=netlink_xfrm_socket pid=4886 comm=syz.1.562 [ 147.406778][ T4899] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4899 comm=syz.0.572 [ 151.236483][ T29] audit: type=1400 audit(151.160:163): avc: denied { map } for pid=4988 comm="syz.0.616" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=7289 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 151.236831][ T29] audit: type=1400 audit(151.160:164): avc: denied { read write } for pid=4988 comm="syz.0.616" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=7289 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 151.528122][ T5002] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5002 comm=syz.0.622 [ 152.012187][ T5022] pimreg: entered allmulticast mode [ 152.016136][ T5022] pimreg: left allmulticast mode [ 156.245496][ T2872] hid-generic 0006:0007:0024.0001: item fetching failed at offset 0/4 [ 156.251874][ T2872] hid-generic 0006:0007:0024.0001: probe with driver hid-generic failed with error -22 [ 157.346158][ T29] audit: type=1400 audit(157.270:165): avc: denied { mount } for pid=5109 comm="syz.0.671" name="/" dev="selinuxfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=filesystem permissive=1 [ 157.350410][ T29] audit: type=1400 audit(157.280:166): avc: denied { remount } for pid=5109 comm="syz.0.671" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=filesystem permissive=1 [ 157.372914][ T29] audit: type=1400 audit(157.300:167): avc: denied { unmount } for pid=3093 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=filesystem permissive=1 [ 158.084214][ T29] audit: type=1400 audit(158.010:168): avc: denied { write } for pid=5143 comm="syz.0.688" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 158.666562][ T29] audit: type=1400 audit(158.590:169): avc: denied { mount } for pid=5169 comm="syz.0.701" name="/" dev="ramfs" ino=6841 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 159.281697][ T29] audit: type=1400 audit(159.210:170): avc: denied { accept } for pid=5191 comm="syz.1.712" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 159.456276][ T29] audit: type=1400 audit(159.380:171): avc: denied { ioctl } for pid=5195 comm="syz.1.714" path="socket:[7579]" dev="sockfs" ino=7579 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 160.771503][ T29] audit: type=1400 audit(160.690:172): avc: denied { bind } for pid=5227 comm="syz.1.730" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 160.777323][ T29] audit: type=1400 audit(160.700:173): avc: denied { getopt } for pid=5227 comm="syz.1.730" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 162.281211][ T29] audit: type=1400 audit(162.200:174): avc: denied { ioctl } for pid=5267 comm="syz.0.750" path="socket:[7010]" dev="sockfs" ino=7010 ioctlcmd=0x8983 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 162.416389][ T29] audit: type=1400 audit(162.340:175): avc: denied { create } for pid=5275 comm="syz.1.752" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 162.424890][ T29] audit: type=1400 audit(162.350:176): avc: denied { bind } for pid=5275 comm="syz.1.752" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 162.438476][ T29] audit: type=1400 audit(162.360:177): avc: denied { write } for pid=5275 comm="syz.1.752" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 163.453513][ T29] audit: type=1400 audit(163.380:178): avc: denied { create } for pid=5321 comm="syz.1.775" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 163.462640][ T29] audit: type=1400 audit(163.390:179): avc: denied { getopt } for pid=5321 comm="syz.1.775" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 163.832543][ T5332] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5332 comm=syz.1.780 [ 166.877549][ T29] audit: type=1400 audit(166.800:180): avc: denied { create } for pid=5385 comm="syz.1.807" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 172.234431][ T5495] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 172.539876][ T29] audit: type=1400 audit(172.450:181): avc: denied { nlmsg_read } for pid=5498 comm="syz.0.864" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 173.285639][ T29] audit: type=1400 audit(173.210:182): avc: denied { bind } for pid=5512 comm="syz.1.870" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 173.310684][ T29] audit: type=1400 audit(173.240:183): avc: denied { write } for pid=5512 comm="syz.1.870" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 174.962219][ T29] audit: type=1400 audit(174.890:184): avc: denied { read } for pid=5537 comm="syz.0.882" path="socket:[8156]" dev="sockfs" ino=8156 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 177.079686][ T29] audit: type=1400 audit(176.970:185): avc: denied { write } for pid=5564 comm="syz.0.896" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 179.973442][ T29] audit: type=1400 audit(179.900:186): avc: denied { ioctl } for pid=5602 comm="syz.0.914" path="socket:[9261]" dev="sockfs" ino=9261 ioctlcmd=0x9420 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 194.804088][ T29] audit: type=1400 audit(194.730:187): avc: denied { setopt } for pid=5860 comm="syz.1.1038" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 195.375439][ T5880] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5880 comm=syz.0.1047 [ 594.249415][ C0] watchdog: BUG: soft lockup - CPU#0 stuck for 430s! [migration/0:18] [ 594.249694][ C0] Modules linked in: [ 594.250770][ C0] CPU: 0 UID: 0 PID: 18 Comm: migration/0 Tainted: G L syzkaller #0 PREEMPT [ 594.251091][ C0] Tainted: [L]=SOFTLOCKUP [ 594.251136][ C0] Hardware name: ARM-Versatile Express [ 594.251332][ C0] Stopper: multi_cpu_stop+0x0/0x16c <- __stop_cpus.constprop.0+0x64/0xa4 [ 594.252148][ C0] PC is at multi_cpu_stop+0xd8/0x16c [ 594.252199][ C0] LR is at multi_cpu_stop+0xd8/0x16c [ 594.252247][ C0] pc : [<803736f4>] lr : [<803736f4>] psr: 60000013 [ 594.252290][ C0] sp : df861ed8 ip : df861ed8 fp : df861f0c [ 594.252326][ C0] r10: 00000001 r9 : 00000000 r8 : 00000001 [ 594.252366][ C0] r7 : 8280c6d0 r6 : eabd1d64 r5 : eabd1d78 r4 : 00000001 [ 594.252412][ C0] r3 : 00000001 r2 : 00000000 r1 : 00000008 r0 : 8280c6d0 [ 594.252539][ C0] Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment user [ 594.252610][ C0] Control: 30c5387d Table: 839e5180 DAC: fffffffd [ 594.252715][ C0] Call trace: [ 594.252968][ C0] [<8037361c>] (multi_cpu_stop) from [<803730fc>] (cpu_stopper_thread+0x90/0x130) [ 594.253300][ C0] r10:eabd1d2c r9:83215400 r8:dddc7574 r7:dddc756c r6:8037361c r5:dddc7568 [ 594.253352][ C0] r4:eabd1d64 [ 594.253440][ C0] [<8037306c>] (cpu_stopper_thread) from [<80288100>] (smpboot_thread_fn+0x108/0x2f0) [ 594.253525][ C0] r10:00000000 r9:00000000 r8:00000000 r7:00000001 r6:828fd6d0 r5:830c1000 [ 594.253547][ C0] r4:83215400 [ 594.253565][ C0] [<80287ff8>] (smpboot_thread_fn) from [<8027f5fc>] (kthread+0x12c/0x280) [ 594.253643][ C0] r9:830c1000 r8:80287ff8 r7:df819de0 r6:830bf400 r5:83215400 r4:00000001 [ 594.253662][ C0] [<8027f4d0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 594.253789][ C0] Exception stack(0xdf861fb0 to 0xdf861ff8) [ 594.253967][ C0] 1fa0: 00000000 00000000 00000000 00000000 [ 594.254035][ C0] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 594.254071][ C0] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 594.254157][ C0] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8027f4d0 [ 594.254180][ C0] r4:830c1040 [ 594.254486][ C0] Sending NMI from CPU 0 to CPUs 1: [ 594.255272][ C1] NMI backtrace for cpu 1 [ 594.255456][ C1] CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Tainted: G L syzkaller #0 PREEMPT [ 594.255533][ C1] Tainted: [L]=SOFTLOCKUP [ 594.255554][ C1] Hardware name: ARM-Versatile Express [ 594.255578][ C1] PC is at _raw_spin_lock+0x40/0x58 [ 594.255663][ C1] LR is at _raw_spin_lock+0x18/0x58 [ 594.255700][ C1] pc : [<81abbc34>] lr : [<81abbc0c>] psr: 80000113 [ 594.255727][ C1] sp : df805d68 ip : df805d68 fp : df805d7c [ 594.255752][ C1] r10: 81c05450 r9 : 833ff240 r8 : 84071688 [ 594.255807][ C1] r7 : 833ff368 r6 : 00000001 r5 : 00000001 r4 : 833ff368 [ 594.255836][ C1] r3 : 0000d151 r2 : 0000d152 r1 : 00000000 r0 : 00000001 [ 594.255862][ C1] Flags: Nzcv IRQs on FIQs on Mode SVC_32 ISA ARM Segment none [ 594.255902][ C1] Control: 30c5387d Table: 84c663c0 DAC: 00000000 [ 594.255925][ C1] Call trace: frame pointer underflow [ 594.256031][ C1] [<81abbbf4>] (_raw_spin_lock) from [<809c77ac>] (gpio_mmio_set+0x44/0x80) [ 594.256135][ C1] r5:00000001 r4:833ff240 [ 594.256159][ C1] [<809c7768>] (gpio_mmio_set) from [<809b7f68>] (gpiochip_set+0x1c/0x44) [ 594.256251][ C1] r7:00000001 r6:00000000 r5:00000000 r4:840eba80 [ 594.256275][ C1] [<809b7f4c>] (gpiochip_set) from [<809ba830>] (gpiod_set_raw_value_commit+0x78/0x218) [ 594.256346][ C1] [<809ba7b8>] (gpiod_set_raw_value_commit) from [<809bc0d0>] (gpiod_set_value_nocheck+0x44/0x58) [ 594.256439][ C1] r10:81c05450 r9:df805ebc r8:00000102 r7:ffffd82c r6:00000007 r5:00000001 [ 594.256467][ C1] r4:840eba80 [ 594.256485][ C1] [<809bc08c>] (gpiod_set_value_nocheck) from [<809bc120>] (gpiod_set_value+0x3c/0x88) [ 594.256554][ C1] [<809bc0e4>] (gpiod_set_value) from [<809cc8bc>] (gpio_led_set+0x5c/0x60) [ 594.256631][ C1] r5:83301044 r4:83301044 [ 594.256653][ C1] [<809cc860>] (gpio_led_set) from [<809ca154>] (led_set_brightness_nosleep+0x38/0x44) [ 594.256727][ C1] r5:83301044 r4:84eeb08c [ 594.256746][ C1] [<809ca11c>] (led_set_brightness_nosleep) from [<809cd1b8>] (led_heartbeat_function+0x84/0x144) [ 594.256814][ C1] [<809cd134>] (led_heartbeat_function) from [<80326f70>] (call_timer_fn+0x30/0x220) [ 594.256897][ C1] r7:ffffd82c r6:809cd134 r5:84eeb08c r4:83216000 [ 594.256922][ C1] [<80326f40>] (call_timer_fn) from [<80327424>] (__run_timers+0x2c4/0x3f8) [ 594.257008][ C1] r9:df805ebc r8:ffffd82c r7:00000000 r6:809cd134 r5:dddd9f00 r4:84eeb08c [ 594.257029][ C1] [<80327160>] (__run_timers) from [<803275c0>] (run_timer_base+0x68/0x78) [ 594.257101][ C1] r10:83216000 r9:82804d80 r8:00000102 r7:00000001 r6:00000282 r5:00000002 [ 594.257123][ C1] r4:dddd9f00 [ 594.257143][ C1] [<80327558>] (run_timer_base) from [<803275ec>] (run_timer_softirq+0x1c/0x34) [ 594.257213][ C1] r4:82804084 [ 594.257234][ C1] [<803275d0>] (run_timer_softirq) from [<8025b55c>] (handle_softirqs+0x140/0x458) [ 594.257312][ C1] [<8025b41c>] (handle_softirqs) from [<8025b9d0>] (__irq_exit_rcu+0x110/0x1d0) [ 594.257398][ C1] r10:00000000 r9:83216000 r8:00000000 r7:df865e08 r6:82443ff8 r5:8247f12c [ 594.257424][ C1] r4:83216000 [ 594.257444][ C1] [<8025b8c0>] (__irq_exit_rcu) from [<8025bd48>] (irq_exit+0x10/0x18) [ 594.257516][ C1] r5:8247f12c r4:826c3a9c [ 594.257536][ C1] [<8025bd38>] (irq_exit) from [<81aad6a4>] (generic_handle_arch_irq+0x7c/0x80) [ 594.257610][ C1] [<81aad628>] (generic_handle_arch_irq) from [<81a7d654>] (call_with_stack+0x1c/0x20) [ 594.257698][ C1] r9:83216000 r8:84071688 r7:df865e3c r6:ffffffff r5:60000013 r4:809c7fac [ 594.257722][ C1] [<81a7d638>] (call_with_stack) from [<80200bec>] (__irq_svc+0x8c/0xbc) [ 594.257791][ C1] Exception stack(0xdf865e08 to 0xdf865e50) [ 594.257840][ C1] 5e00: dffd2008 0000000c 0000d151 00000000 dffd2008 0000000c [ 594.257882][ C1] 5e20: 00000001 833ff368 84071688 833ff240 00000000 df865e6c df865e58 df865e58 [ 594.257912][ C1] 5e40: 809c7fa8 809c7fac 60000013 ffffffff [ 594.257935][ C1] [<809c7f8c>] (gpio_mmio_write32) from [<809c77cc>] (gpio_mmio_set+0x64/0x80) [ 594.258019][ C1] r5:00000008 r4:833ff240 [ 594.258041][ C1] [<809c7768>] (gpio_mmio_set) from [<809b7f68>] (gpiochip_set+0x1c/0x44) [ 594.258124][ C1] r7:00000001 r6:00000000 r5:00000003 r4:840ebabc [ 594.258145][ C1] [<809b7f4c>] (gpiochip_set) from [<809ba830>] (gpiod_set_raw_value_commit+0x78/0x218) [ 594.258220][ C1] [<809ba7b8>] (gpiod_set_raw_value_commit) from [<809bc0d0>] (gpiod_set_value_nocheck+0x44/0x58) [ 594.258317][ C1] r10:00000000 r9:00000000 r8:00000001 r7:ddde24c0 r6:83e7ba58 r5:00000001 [ 594.258342][ C1] r4:840ebabc [ 594.258362][ C1] [<809bc08c>] (gpiod_set_value_nocheck) from [<809bc120>] (gpiod_set_value+0x3c/0x88) [ 594.258441][ C1] [<809bc0e4>] (gpiod_set_value) from [<809cc8bc>] (gpio_led_set+0x5c/0x60) [ 594.258515][ C1] r5:000000ff r4:83301314 [ 594.258537][ C1] [<809cc860>] (gpio_led_set) from [<809ca1e4>] (led_set_brightness+0x84/0x90) [ 594.258627][ C1] r5:000000ff r4:83301314 [ 594.258647][ C1] [<809ca160>] (led_set_brightness) from [<809cbd64>] (led_trigger_event+0x40/0x58) [ 594.258718][ C1] r5:000000ff r4:83301314 [ 594.258739][ C1] [<809cbd24>] (led_trigger_event) from [<809cd3c0>] (ledtrig_cpu+0xac/0xf4) [ 594.258887][ C1] r7:ddde24c0 r6:00000002 r5:82b15cd8 r4:000001fd [ 594.258913][ C1] [<809cd314>] (ledtrig_cpu) from [<80227a38>] (arch_cpu_idle_exit+0x14/0x18) [ 594.259004][ C1] r9:00000000 r8:00000001 r7:8280c710 r6:83216000 r5:8280c6d0 r4:00000001 [ 594.259031][ C1] [<80227a24>] (arch_cpu_idle_exit) from [<802b158c>] (do_idle+0x5c/0x2d8) [ 594.259107][ C1] [<802b1530>] (do_idle) from [<802b1b38>] (cpu_startup_entry+0x30/0x34) [ 594.259191][ C1] r10:00000000 r9:414fc0f0 r8:80003000 r7:82a7b4a4 r6:83216000 r5:00000001 [ 594.259220][ C1] r4:00000092 [ 594.259247][ C1] [<802b1b08>] (cpu_startup_entry) from [<8022f360>] (secondary_start_kernel+0x128/0x194) [ 594.259327][ C1] [<8022f238>] (secondary_start_kernel) from [<80220094>] (__enable_mmu+0x0/0xc) [ 594.259408][ C1] r7:82a7b4a4 r6:30c0387d r5:00000000 r4:830b7bc0 [ 594.260725][ C0] Kernel panic - not syncing: softlockup: hung tasks [ 594.289816][ C0] CPU: 0 UID: 0 PID: 18 Comm: migration/0 Tainted: G L syzkaller #0 PREEMPT [ 594.290231][ C0] Tainted: [L]=SOFTLOCKUP [ 594.290412][ C0] Hardware name: ARM-Versatile Express [ 594.290610][ C0] Stopper: multi_cpu_stop+0x0/0x16c <- __stop_cpus.constprop.0+0x64/0xa4 [ 594.291037][ C0] Call trace: frame pointer underflow [ 594.291399][ C0] [<80201a74>] (dump_backtrace) from [<80201b70>] (show_stack+0x18/0x1c) [ 594.291770][ C0] r7:82296540 r6:83215400 r5:00000000 r4:822956f0 [ 594.292002][ C0] [<80201b58>] (show_stack) from [<8021ee08>] (dump_stack_lvl+0x54/0x7c) [ 594.292353][ C0] [<8021edb4>] (dump_stack_lvl) from [<8021ee48>] (dump_stack+0x18/0x1c) [ 594.292708][ C0] r5:00000000 r4:82a7bd14 [ 594.292885][ C0] [<8021ee30>] (dump_stack) from [<80202648>] (vpanic+0xe0/0x2e8) [ 594.293201][ C0] [<80202568>] (vpanic) from [<80202884>] (trace_suspend_resume+0x0/0xd8) [ 594.293561][ C0] r7:82ac27f8 [ 594.293714][ C0] [<80202850>] (panic) from [<80383f14>] (watchdog_timer_fn+0x2dc/0x350) [ 594.294056][ C0] r3:00000001 r2:00004000 r1:82a7bd1c r0:82296540 [ 594.294287][ C0] [<80383c38>] (watchdog_timer_fn) from [<80329b64>] (__hrtimer_run_queues+0x1c4/0x454) [ 594.294667][ C0] r10:83215400 r9:00000000 r8:dddc7130 r7:80383c38 r6:dddc7000 r5:dddc7040 [ 594.295372][ C0] r4:dddc75d8 [ 594.295535][ C0] [<803299a0>] (__hrtimer_run_queues) from [<8032b168>] (hrtimer_interrupt+0x148/0x2bc) [ 594.296006][ C0] r10:57e6bc80 r9:dddc7180 r8:dddc7130 r7:0000008a r6:00000003 r5:20000193 [ 594.296312][ C0] r4:dddc7000 [ 594.296466][ C0] [<8032b020>] (hrtimer_interrupt) from [<81340630>] (arch_timer_handler_virt+0x30/0x38) [ 594.296860][ C0] r10:81d0fc78 r9:8309e400 r8:00000000 r7:00000000 r6:00000000 r5:82498528 [ 594.297173][ C0] r4:8309de40 [ 594.297333][ C0] [<81340600>] (arch_timer_handler_virt) from [<802ef9b4>] (handle_percpu_devid_irq+0x128/0x34c) [ 594.297794][ C0] [<802ef88c>] (handle_percpu_devid_irq) from [<802e8b44>] (handle_irq_desc+0x74/0x84) [ 594.298208][ C0] r10:00000001 r9:83215400 r8:00000000 r7:df80a00c r6:826c2388 r5:df80a000 [ 594.298521][ C0] r4:8280cc44 [ 594.298683][ C0] [<802e8ad0>] (handle_irq_desc) from [<802e8bc0>] (generic_handle_domain_irq+0x18/0x1c) [ 594.299371][ C0] [<802e8ba8>] (generic_handle_domain_irq) from [<802012c8>] (gic_handle_irq+0x68/0x7c) [ 594.299888][ C0] [<80201260>] (gic_handle_irq) from [<81aad688>] (generic_handle_arch_irq+0x60/0x80) [ 594.300306][ C0] r7:df861e88 r6:82443ff8 r5:8247f12c r4:826c3a9c [ 594.300569][ C0] [<81aad628>] (generic_handle_arch_irq) from [<81a7d654>] (call_with_stack+0x1c/0x20) [ 594.300965][ C0] r9:83215400 r8:00000001 r7:df861ebc r6:ffffffff r5:60000013 r4:803736f4 [ 594.301287][ C0] [<81a7d638>] (call_with_stack) from [<80200bec>] (__irq_svc+0x8c/0xbc) [ 594.301636][ C0] Exception stack(0xdf861e88 to 0xdf861ed0) [ 594.301895][ C0] 1e80: 8280c6d0 00000008 00000000 00000001 00000001 eabd1d78 [ 594.302242][ C0] 1ea0: eabd1d64 8280c6d0 00000001 00000000 00000001 df861f0c df861ed8 df861ed8 [ 594.302556][ C0] 1ec0: 803736f4 803736f4 60000013 ffffffff [ 594.302837][ C0] [<8037361c>] (multi_cpu_stop) from [<803730fc>] (cpu_stopper_thread+0x90/0x130) [ 594.303255][ C0] r10:eabd1d2c r9:83215400 r8:dddc7574 r7:dddc756c r6:8037361c r5:dddc7568 [ 594.303582][ C0] r4:eabd1d64 [ 594.303747][ C0] [<8037306c>] (cpu_stopper_thread) from [<80288100>] (smpboot_thread_fn+0x108/0x2f0) [ 594.304176][ C0] r10:00000000 r9:00000000 r8:00000000 r7:00000001 r6:828fd6d0 r5:830c1000 [ 594.304566][ C0] r4:83215400 [ 594.304740][ C0] [<80287ff8>] (smpboot_thread_fn) from [<8027f5fc>] (kthread+0x12c/0x280) [ 594.305127][ C0] r9:830c1000 r8:80287ff8 r7:df819de0 r6:830bf400 r5:83215400 r4:00000001 [ 594.305427][ C0] [<8027f4d0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 594.305767][ C0] Exception stack(0xdf861fb0 to 0xdf861ff8) [ 594.306030][ C0] 1fa0: 00000000 00000000 00000000 00000000 [ 594.306365][ C0] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 594.306691][ C0] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 594.307027][ C0] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8027f4d0 [ 594.307340][ C0] r4:830c1040 [ 594.310037][ C0] Rebooting in 86400 seconds..