last executing test programs: 1.439715127s ago: executing program 0 (id=548): r0 = openat$ttyS3(0xffffff9c, &(0x7f0000000000), 0x101000, 0x0) r1 = openat$iommufd(0xffffff9c, &(0x7f0000000040), 0x802, 0x0) r2 = dup2(r0, r1) read$FUSE(r2, 0x0, 0x0) 1.3380099s ago: executing program 0 (id=550): r0 = openat$binder_debug(0xffffff9c, &(0x7f0000000240)='/sys/kernel/debug/binder/transactions\x00', 0x0, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) sendmsg$NFQNL_MSG_VERDICT(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)={0x0}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 1.251100271s ago: executing program 0 (id=552): r0 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000000)={'vxcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000380)={0x1d, r1, 0x1, {0x0, 0xf0, 0x4}}, 0x18) sendmsg$GTP_CMD_GETPDP(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x14, 0x0, 0x200, 0x70bd2a, 0x25dfdbfd}, 0x14}}, 0x44804) 819.243506ms ago: executing program 1 (id=558): r0 = openat$binder_debug(0xffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) sendmsg$IPVS_CMD_DEL_DAEMON(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}, 0x1, 0x0, 0x0, 0x40}, 0x40) 730.990577ms ago: executing program 1 (id=559): openat$selinux_checkreqprot(0xffffff9c, &(0x7f0000000040), 0x201, 0x0) r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) ioctl$FIONREAD(r0, 0xc0189436, &(0x7f0000000040)) timerfd_create(0x0, 0x0) 647.916468ms ago: executing program 1 (id=560): r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x80040, 0x0) dup3(r0, r1, 0x0) getsockopt$SO_COOKIE(r1, 0x1, 0x19, 0x0, &(0x7f0000000040)) 559.253239ms ago: executing program 1 (id=561): r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000100)='\x00', 0x89901) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) sendmsg$NL80211_CMD_NOTIFY_RADAR(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x1, 0x0, 0x0, 0x80}, 0x20000004) 478.702739ms ago: executing program 1 (id=562): r0 = io_uring_setup(0x6503, &(0x7f0000000080)={0x0, 0x83be, 0x104a}) r1 = eventfd(0xfffffffc) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(r0, 0x7, &(0x7f0000000000)=r1, 0x1) io_uring_register$IORING_UNREGISTER_EVENTFD(r0, 0x5, 0x0, 0x0) 388.460441ms ago: executing program 1 (id=563): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) sendto$l2tp6(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x3}, 0x20) sendmsg$NFQNL_MSG_VERDICT_BATCH(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x20000080) 170.016508ms ago: executing program 0 (id=564): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000002540), r0) sendmsg$ETHTOOL_MSG_WOL_SET(r0, &(0x7f0000002a00)={0x0, 0x0, &(0x7f00000029c0)={&(0x7f00000026c0)={0x20, r1, 0x219, 0x70bd2d, 0x25dfdbfd, {}, [@ETHTOOL_A_WOL_SOPASS={0xb, 0x3, "77534134850565"}]}, 0x20}, 0x1, 0x0, 0x0, 0x840}, 0x20044000) syz_genetlink_get_family_id$devlink(&(0x7f0000002f00), r0) 78.69565ms ago: executing program 0 (id=565): r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x1ff, 0x40003) close_range(r0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, 0x0, 0x0) 0s ago: executing program 0 (id=566): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) sendto$l2tp6(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x3}, 0x20) sendmsg$TIPC_NL_LINK_GET(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={0x0}, 0x1, 0x0, 0x0, 0x80}, 0x20048084) kernel console output (not intermixed with test programs): [ 46.558257][ T29] audit: type=1400 audit(46.480:56): avc: denied { read write } for pid=3093 comm="sftp-server" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 46.601268][ T29] audit: type=1400 audit(46.500:57): avc: denied { open } for pid=3093 comm="sftp-server" path="/dev/null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 Warning: Permanently added '[localhost]:52697' (ED25519) to the list of known hosts. [ 60.799485][ T29] audit: type=1400 audit(60.710:58): avc: denied { name_bind } for pid=3096 comm="sshd-session" src=30000 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 61.761535][ T29] audit: type=1400 audit(61.680:59): avc: denied { execute } for pid=3098 comm="sh" name="syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 61.772872][ T29] audit: type=1400 audit(61.700:60): avc: denied { execute_no_trans } for pid=3098 comm="sh" path="/syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 66.656812][ T29] audit: type=1400 audit(66.550:61): avc: denied { mounton } for pid=3098 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=806 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 66.659855][ T29] audit: type=1400 audit(66.580:62): avc: denied { mount } for pid=3098 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 66.673756][ T3098] cgroup: Unknown subsys name 'net' [ 66.682579][ T29] audit: type=1400 audit(66.610:63): avc: denied { unmount } for pid=3098 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 66.841351][ T3098] cgroup: Unknown subsys name 'cpuset' [ 66.845426][ T3098] cgroup: Unknown subsys name 'hugetlb' [ 66.846929][ T3098] cgroup: Unknown subsys name 'rlimit' [ 67.101849][ T29] audit: type=1400 audit(67.030:64): avc: denied { setattr } for pid=3098 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 67.103416][ T29] audit: type=1400 audit(67.030:65): avc: denied { mounton } for pid=3098 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 67.107471][ T29] audit: type=1400 audit(67.030:66): avc: denied { mount } for pid=3098 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 67.310365][ T3100] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 67.313971][ T29] audit: type=1400 audit(67.240:67): avc: denied { relabelto } for pid=3100 comm="mkswap" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 67.317774][ T29] audit: type=1400 audit(67.240:68): avc: denied { write } for pid=3100 comm="mkswap" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 67.354919][ T29] audit: type=1400 audit(67.280:69): avc: denied { read } for pid=3098 comm="syz-executor" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 67.356894][ T29] audit: type=1400 audit(67.280:70): avc: denied { open } for pid=3098 comm="syz-executor" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 73.114038][ T3098] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 74.855209][ T29] audit: type=1400 audit(74.780:71): avc: denied { execmem } for pid=3101 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 74.906162][ T29] audit: type=1400 audit(74.830:72): avc: denied { read } for pid=3103 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 74.907676][ T29] audit: type=1400 audit(74.830:73): avc: denied { open } for pid=3103 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 74.918355][ T29] audit: type=1400 audit(74.840:74): avc: denied { mounton } for pid=3103 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 74.940092][ T29] audit: type=1400 audit(74.860:75): avc: denied { module_request } for pid=3104 comm="syz-executor" kmod="netdev-nr1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 74.942164][ T29] audit: type=1400 audit(74.860:76): avc: denied { module_request } for pid=3103 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 75.013674][ T29] audit: type=1400 audit(74.940:77): avc: denied { sys_module } for pid=3104 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 75.370182][ T29] audit: type=1400 audit(75.290:78): avc: denied { ioctl } for pid=3104 comm="syz-executor" path="/dev/net/tun" dev="devtmpfs" ino=677 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 76.354518][ T3104] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 76.365556][ T3104] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 76.537744][ T3103] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 76.546213][ T3103] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 77.146770][ T3104] hsr_slave_0: entered promiscuous mode [ 77.149719][ T3104] hsr_slave_1: entered promiscuous mode [ 77.217145][ T3103] hsr_slave_0: entered promiscuous mode [ 77.219597][ T3103] hsr_slave_1: entered promiscuous mode [ 77.225625][ T3103] debugfs: 'hsr0' already exists in 'hsr' [ 77.228358][ T3103] Cannot create hsr debugfs directory [ 77.587640][ T29] audit: type=1400 audit(77.510:79): avc: denied { create } for pid=3104 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 77.592979][ T29] audit: type=1400 audit(77.510:80): avc: denied { write } for pid=3104 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 77.609439][ T3104] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 77.625428][ T3104] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 77.646081][ T3104] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 77.656819][ T3104] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 77.744880][ T3103] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 77.754897][ T3103] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 77.767419][ T3103] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 77.777533][ T3103] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 78.383890][ T3104] 8021q: adding VLAN 0 to HW filter on device bond0 [ 78.538364][ T3103] 8021q: adding VLAN 0 to HW filter on device bond0 [ 80.398289][ T3104] veth0_vlan: entered promiscuous mode [ 80.417600][ T3104] veth1_vlan: entered promiscuous mode [ 80.462207][ T3103] veth0_vlan: entered promiscuous mode [ 80.476344][ T3103] veth1_vlan: entered promiscuous mode [ 80.478792][ T3104] veth0_macvtap: entered promiscuous mode [ 80.490341][ T3104] veth1_macvtap: entered promiscuous mode [ 80.545566][ T205] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 80.553104][ T205] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 80.553598][ T205] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 80.557979][ T205] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 80.589530][ T3103] veth0_macvtap: entered promiscuous mode [ 80.597530][ T3103] veth1_macvtap: entered promiscuous mode [ 80.625299][ T65] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 80.625883][ T65] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 80.626045][ T65] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 80.626160][ T65] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 80.688430][ T29] kauditd_printk_skb: 1 callbacks suppressed [ 80.688985][ T29] audit: type=1400 audit(80.610:82): avc: denied { mount } for pid=3103 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 80.704771][ T29] audit: type=1400 audit(80.630:83): avc: denied { mounton } for pid=3103 comm="syz-executor" path="/syzkaller.OQ8Dld/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 80.724048][ T29] audit: type=1400 audit(80.650:84): avc: denied { mount } for pid=3103 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 80.743450][ T29] audit: type=1400 audit(80.670:85): avc: denied { mounton } for pid=3104 comm="syz-executor" path="/syzkaller.YJuGDv/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 80.746493][ T29] audit: type=1400 audit(80.670:86): avc: denied { mounton } for pid=3103 comm="syz-executor" path="/syzkaller.OQ8Dld/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=2402 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 80.758282][ T29] audit: type=1400 audit(80.680:87): avc: denied { unmount } for pid=3104 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 80.762701][ T29] audit: type=1400 audit(80.690:88): avc: denied { mounton } for pid=3104 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=772 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 80.765299][ T29] audit: type=1400 audit(80.690:89): avc: denied { mount } for pid=3104 comm="syz-executor" name="/" dev="gadgetfs" ino=2017 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 80.769728][ T29] audit: type=1400 audit(80.690:90): avc: denied { mount } for pid=3104 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 80.777568][ T29] audit: type=1400 audit(80.700:91): avc: denied { mounton } for pid=3103 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 80.835342][ T3104] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 80.835355][ T3103] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 82.288411][ T3747] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=3747 comm=syz.0.18 [ 84.878629][ T3823] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3823 comm=syz.1.51 [ 86.025417][ T29] kauditd_printk_skb: 30 callbacks suppressed [ 86.026581][ T29] audit: type=1400 audit(85.950:122): avc: denied { create } for pid=3852 comm="syz.1.66" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 86.030481][ T29] audit: type=1400 audit(85.950:123): avc: denied { write } for pid=3852 comm="syz.1.66" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 86.135474][ T29] audit: type=1400 audit(86.060:124): avc: denied { ioctl } for pid=3855 comm="syz.0.68" path="socket:[2683]" dev="sockfs" ino=2683 ioctlcmd=0x4581 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 86.364913][ T3865] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1792 sclass=netlink_route_socket pid=3865 comm=syz.1.72 [ 86.600381][ T3875] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=1543 sclass=netlink_audit_socket pid=3875 comm=syz.0.77 [ 87.739069][ T29] audit: type=1400 audit(87.660:125): avc: denied { create } for pid=3920 comm="syz.1.100" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 87.746747][ T29] audit: type=1400 audit(87.670:126): avc: denied { write } for pid=3920 comm="syz.1.100" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 87.751332][ T29] audit: type=1400 audit(87.670:127): avc: denied { ioctl } for pid=3920 comm="syz.1.100" path="socket:[3392]" dev="sockfs" ino=3392 ioctlcmd=0x8915 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 87.820046][ T3923] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=3923 comm=syz.1.101 [ 88.700119][ T3938] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1544 sclass=netlink_route_socket pid=3938 comm=syz.0.107 [ 89.462243][ T29] audit: type=1400 audit(89.390:128): avc: denied { write } for pid=3961 comm="syz.0.119" name="pfkey" dev="proc" ino=4026532816 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 89.473042][ T29] audit: type=1400 audit(89.390:129): avc: denied { setopt } for pid=3961 comm="syz.0.119" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 90.965310][ T3995] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=3995 comm=syz.1.135 [ 92.563028][ T4034] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4034 comm=syz.0.154 [ 94.237265][ T4063] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4063 comm=syz.0.168 [ 94.316015][ T29] audit: type=1400 audit(606.231:130): avc: denied { name_bind } for pid=4066 comm="syz.0.171" src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 94.318961][ T29] audit: type=1400 audit(606.231:131): avc: denied { node_bind } for pid=4066 comm="syz.0.171" saddr=172.20.20.170 src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 94.424523][ T4072] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4072 comm=syz.1.172 [ 95.290380][ T4095] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4095 comm=syz.0.184 [ 95.466754][ T29] audit: type=1400 audit(607.381:132): avc: denied { allowed } for pid=4098 comm="syz.0.186" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 95.475665][ T29] audit: type=1400 audit(607.391:133): avc: denied { map } for pid=4098 comm="syz.0.186" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=3065 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 95.476263][ T29] audit: type=1400 audit(607.391:134): avc: denied { read write } for pid=4098 comm="syz.0.186" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=3065 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 97.353112][ T4108] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4108 comm=syz.1.190 [ 97.880367][ T29] audit: type=1400 audit(609.791:135): avc: denied { lock } for pid=4117 comm="syz.1.195" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=3784 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 98.496481][ T29] audit: type=1400 audit(610.411:136): avc: denied { read } for pid=4137 comm="syz.1.205" path="socket:[3811]" dev="sockfs" ino=3811 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 98.988168][ T4150] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4150 comm=syz.1.211 [ 99.073036][ T4152] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4152 comm=syz.1.212 [ 99.157656][ T4154] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4154 comm=syz.1.213 [ 99.247744][ T4156] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4156 comm=syz.1.214 [ 99.677548][ T4171] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=2050 sclass=netlink_audit_socket pid=4171 comm=syz.0.221 [ 99.942361][ T4180] ======================================================= [ 99.942361][ T4180] WARNING: The mand mount option has been deprecated and [ 99.942361][ T4180] and is ignored by this kernel. Remove the mand [ 99.942361][ T4180] option from the mount to silence this warning. [ 99.942361][ T4180] ======================================================= [ 99.946400][ T29] audit: type=1400 audit(611.861:137): avc: denied { mount } for pid=4179 comm="syz.0.226" name="/" dev="sysfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=filesystem permissive=1 [ 99.975050][ T29] audit: type=1400 audit(611.891:138): avc: denied { unmount } for pid=3103 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=filesystem permissive=1 [ 100.069939][ T4186] capability: warning: `syz.0.228' uses 32-bit capabilities (legacy support in use) [ 100.378196][ T4196] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4196 comm=syz.1.234 [ 100.466474][ T29] audit: type=1400 audit(612.381:139): avc: denied { create } for pid=4199 comm="syz.1.236" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 100.474370][ T29] audit: type=1400 audit(612.391:140): avc: denied { getopt } for pid=4199 comm="syz.1.236" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 100.527528][ T29] audit: type=1400 audit(612.441:141): avc: denied { write } for pid=4201 comm="syz.0.237" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 100.759944][ T4212] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4212 comm=syz.1.242 [ 100.857060][ T4216] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4216 comm=syz.1.244 [ 101.266086][ T4228] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1012 sclass=netlink_route_socket pid=4228 comm=syz.1.250 [ 101.960459][ T29] audit: type=1400 audit(613.871:142): avc: denied { read } for pid=4245 comm="syz.1.258" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 103.224148][ T4252] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4252 comm=syz.1.261 [ 103.839669][ T29] audit: type=1400 audit(615.751:143): avc: denied { mount } for pid=4267 comm="syz.0.269" name="/" dev="bpf" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bpf_t tclass=filesystem permissive=1 [ 104.507177][ T29] audit: type=1400 audit(616.421:144): avc: denied { audit_write } for pid=4285 comm="syz.0.277" capability=29 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 105.178316][ T29] audit: type=1400 audit(617.091:145): avc: denied { prog_load } for pid=4301 comm="syz.0.285" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 105.179605][ T29] audit: type=1400 audit(617.091:146): avc: denied { bpf } for pid=4301 comm="syz.0.285" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 105.180079][ T29] audit: type=1400 audit(617.091:147): avc: denied { perfmon } for pid=4301 comm="syz.0.285" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 106.985575][ T4338] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1545 sclass=netlink_route_socket pid=4338 comm=syz.0.303 [ 107.157756][ T29] audit: type=1400 audit(619.071:148): avc: denied { create } for pid=4341 comm="syz.0.305" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 107.163855][ T29] audit: type=1400 audit(619.081:149): avc: denied { ioctl } for pid=4341 comm="syz.0.305" path="socket:[4487]" dev="sockfs" ino=4487 ioctlcmd=0x9426 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 107.825068][ T29] audit: type=1400 audit(619.741:150): avc: denied { bind } for pid=4356 comm="syz.0.312" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 109.370104][ T29] audit: type=1400 audit(621.281:151): avc: denied { write } for pid=4381 comm="syz.1.324" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 109.437594][ T29] audit: type=1400 audit(621.351:152): avc: denied { create } for pid=4383 comm="syz.1.325" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 109.827084][ T29] audit: type=1400 audit(621.741:153): avc: denied { write } for pid=4393 comm="syz.1.330" path="socket:[5327]" dev="sockfs" ino=5327 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 110.474395][ T4412] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 110.485190][ T29] audit: type=1400 audit(622.401:154): avc: denied { getopt } for pid=4411 comm="syz.1.339" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 110.987840][ T4426] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4426 comm=syz.1.346 [ 111.412487][ T4442] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4442 comm=syz.1.353 [ 112.659907][ T4491] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=769 sclass=netlink_route_socket pid=4491 comm=syz.1.378 [ 113.082031][ T4501] Zero length message leads to an empty skb [ 113.287190][ T29] audit: type=1400 audit(625.201:155): avc: denied { create } for pid=4504 comm="syz.1.385" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 113.291703][ T29] audit: type=1400 audit(625.201:156): avc: denied { write } for pid=4504 comm="syz.1.385" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 115.327415][ T29] audit: type=1400 audit(627.241:157): avc: denied { append } for pid=4559 comm="syz.0.412" name="nullb0" dev="devtmpfs" ino=654 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 117.480289][ T29] audit: type=1400 audit(629.391:158): avc: denied { write } for pid=4588 comm="syz.1.427" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 117.937624][ T29] audit: type=1400 audit(629.851:159): avc: denied { name_bind } for pid=4607 comm="syz.0.436" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=1 [ 118.316552][ T29] audit: type=1400 audit(630.231:160): avc: denied { associate } for pid=4622 comm="syz.1.444" name="pfkey" scontext=root:object_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 119.274394][ T4665] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=4665 comm=syz.0.463 [ 119.738676][ T4682] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=4682 comm=syz.0.471 [ 119.902753][ T4689] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4689 comm=syz.1.474 [ 120.047266][ T29] audit: type=1400 audit(631.961:161): avc: denied { create } for pid=4695 comm="syz.1.478" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 120.049749][ T29] audit: type=1400 audit(631.961:162): avc: denied { setopt } for pid=4695 comm="syz.1.478" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 120.103376][ T4700] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4700 comm=syz.1.479 [ 120.561883][ T4722] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4722 comm=syz.0.489 [ 120.687432][ T4728] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2581 sclass=netlink_route_socket pid=4728 comm=syz.1.492 [ 121.471763][ T4750] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4750 comm=syz.1.503 [ 121.559953][ T4754] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 121.750164][ T4762] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4762 comm=syz.0.508 [ 125.368051][ T29] audit: type=1400 audit(637.281:163): avc: denied { create } for pid=4813 comm="syz.1.534" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 125.374563][ T29] audit: type=1400 audit(637.291:164): avc: denied { write } for pid=4813 comm="syz.1.534" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 125.974128][ T4828] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4828 comm=syz.1.541 [ 126.694768][ T29] audit: type=1400 audit(638.611:165): avc: denied { remount } for pid=4843 comm="syz.1.549" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 126.721608][ T29] audit: type=1400 audit(638.631:166): avc: denied { unmount } for pid=3104 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 126.799775][ T29] audit: type=1400 audit(638.721:167): avc: denied { write } for pid=4850 comm="syz.1.551" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 126.870141][ T29] audit: type=1400 audit(638.781:168): avc: denied { getopt } for pid=4854 comm="syz.1.553" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 127.584285][ T29] audit: type=1400 audit(639.501:169): avc: denied { sqpoll } for pid=4872 comm="syz.1.562" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 528.251095][ C0] watchdog: BUG: soft lockup - CPU#0 stuck for 430s! [swapper/0:0] [ 528.251355][ C0] Modules linked in: [ 528.252197][ C0] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Not tainted syzkaller #0 PREEMPT [ 528.252424][ C0] Hardware name: ARM-Versatile Express [ 528.252649][ C0] PC is at _raw_spin_unlock_irq+0x28/0x54 [ 528.253387][ C0] LR is at tmigr_handle_remote_up+0x268/0x4b0 [ 528.253453][ C0] pc : [<81a8bc8c>] lr : [<803460dc>] psr: 60000113 [ 528.253487][ C0] sp : 82801be0 ip : 82801bf0 fp : 82801bec [ 528.253521][ C0] r10: 00000001 r9 : 0000001e r8 : 36e50e80 [ 528.253562][ C0] r7 : ddddb488 r6 : 82801cb8 r5 : 830bf3b0 r4 : 830bf380 [ 528.253600][ C0] r3 : 0000bfc9 r2 : 00000103 r1 : 830bf3b0 r0 : ddddb488 [ 528.253717][ C0] Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment user [ 528.253798][ C0] Control: 30c5387d Table: 84cbb3c0 DAC: fffffffd [ 528.253926][ C0] Call trace: [ 528.254185][ C0] [<81a8bc64>] (_raw_spin_unlock_irq) from [<803460dc>] (tmigr_handle_remote_up+0x268/0x4b0) [ 528.254532][ C0] [<80345e74>] (tmigr_handle_remote_up) from [<8034438c>] (__walk_groups_from+0x3c/0xe4) [ 528.254658][ C0] r10:8281b500 r9:8280c820 r8:80345e74 r7:82801cb8 r6:830bf380 r5:00000002 [ 528.254702][ C0] r4:830bf380 [ 528.254725][ C0] [<80344350>] (__walk_groups_from) from [<80346724>] (tmigr_handle_remote+0xe8/0x108) [ 528.254794][ C0] r9:82804d80 r8:00000102 r7:00000001 r6:00000082 r5:00000002 r4:dddc7488 [ 528.254812][ C0] [<8034663c>] (tmigr_handle_remote) from [<803268f8>] (run_timer_softirq+0x30/0x34) [ 528.254877][ C0] r4:82804084 [ 528.254892][ C0] [<803268c8>] (run_timer_softirq) from [<8025aeb8>] (handle_softirqs+0x140/0x458) [ 528.254953][ C0] [<8025ad78>] (handle_softirqs) from [<8025b32c>] (__irq_exit_rcu+0x110/0x1d0) [ 528.255038][ C0] r10:00000000 r9:8281b500 r8:00000000 r7:82801dd8 r6:82442b28 r5:8247dd4c [ 528.255058][ C0] r4:8281b500 [ 528.255075][ C0] [<8025b21c>] (__irq_exit_rcu) from [<8025b6a4>] (irq_exit+0x10/0x18) [ 528.255128][ C0] r5:8247dd4c r4:826c2a9c [ 528.255145][ C0] [<8025b694>] (irq_exit) from [<81a7d8c4>] (generic_handle_arch_irq+0x7c/0x80) [ 528.255204][ C0] [<81a7d848>] (generic_handle_arch_irq) from [<80200bdc>] (__irq_svc+0x7c/0xbc) [ 528.255341][ C0] Exception stack(0x82801dd8 to 0x82801e20) [ 528.255510][ C0] 1dc0: 00000001 00000000 [ 528.255565][ C0] 1de0: 00008142 00008140 84074368 00000004 00000001 84074368 83edf288 84074240 [ 528.255595][ C0] 1e00: 00000000 82801e3c 82801e28 82801e28 81a8be1c 81a8be44 80000013 ffffffff [ 528.255663][ C0] r9:8281b500 r8:83edf288 r7:82801e0c r6:ffffffff r5:80000013 r4:81a8be44 [ 528.255686][ C0] [<81a8be04>] (_raw_spin_lock) from [<809c4ab0>] (gpio_mmio_set+0x44/0x80) [ 528.255757][ C0] r5:00000004 r4:84074240 [ 528.255775][ C0] [<809c4a6c>] (gpio_mmio_set) from [<809b543c>] (gpiochip_set+0x1c/0x44) [ 528.255849][ C0] r7:00000001 r6:00000000 r5:00000002 r4:843cd028 [ 528.255867][ C0] [<809b5420>] (gpiochip_set) from [<809b7c54>] (gpiod_set_raw_value_commit+0x78/0x218) [ 528.255922][ C0] [<809b7bdc>] (gpiod_set_raw_value_commit) from [<809b94f4>] (gpiod_set_value_nocheck+0x44/0x58) [ 528.255996][ C0] r10:00000000 r9:00000000 r8:00000001 r7:dddce4c0 r6:8384f0d8 r5:00000001 [ 528.256019][ C0] r4:843cd028 [ 528.256036][ C0] [<809b94b0>] (gpiod_set_value_nocheck) from [<809b9544>] (gpiod_set_value+0x3c/0x88) [ 528.256086][ C0] [<809b9508>] (gpiod_set_value) from [<809c9bac>] (gpio_led_set+0x5c/0x60) [ 528.256143][ C0] r5:000000ff r4:830fe224 [ 528.256161][ C0] [<809c9b50>] (gpio_led_set) from [<809c74e8>] (led_set_brightness+0x84/0x90) [ 528.256216][ C0] r5:000000ff r4:830fe224 [ 528.256234][ C0] [<809c7464>] (led_set_brightness) from [<809c9054>] (led_trigger_event+0x40/0x58) [ 528.256289][ C0] r5:000000ff r4:830fe224 [ 528.256307][ C0] [<809c9014>] (led_trigger_event) from [<809ca6b0>] (ledtrig_cpu+0xac/0xf4) [ 528.256368][ C0] r7:dddce4c0 r6:00000002 r5:82b15cd8 r4:000001fd [ 528.256386][ C0] [<809ca604>] (ledtrig_cpu) from [<80227758>] (arch_cpu_idle_exit+0x14/0x18) [ 528.256457][ C0] r9:00000000 r8:00000000 r7:8280c710 r6:8281b500 r5:8280c6d0 r4:00000000 [ 528.256477][ C0] [<80227744>] (arch_cpu_idle_exit) from [<802b0e84>] (do_idle+0x5c/0x2d8) [ 528.256534][ C0] [<802b0e28>] (do_idle) from [<802b1430>] (cpu_startup_entry+0x30/0x34) [ 528.256601][ C0] r10:8281aff4 r9:823bd7d4 r8:00000000 r7:8280c680 r6:deffc06c r5:828222e8 [ 528.256622][ C0] r4:000000ed [ 528.256640][ C0] [<802b1400>] (cpu_startup_entry) from [<81a7f2dc>] (kernel_init+0x0/0x138) [ 528.256704][ C0] [<81a7f1fc>] (rest_init) from [<82601338>] (start_kernel+0x738/0x754) [ 528.256814][ C0] [<82600c00>] (start_kernel) from [<00000000>] (0x0) [ 528.257499][ C0] Sending NMI from CPU 0 to CPUs 1: [ 528.258257][ C1] NMI backtrace for cpu 1 [ 528.258480][ C1] CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Not tainted syzkaller #0 PREEMPT [ 528.258537][ C1] Hardware name: ARM-Versatile Express [ 528.258560][ C1] PC is at _raw_spin_lock+0x40/0x58 [ 528.258631][ C1] LR is at _raw_spin_lock+0x18/0x58 [ 528.258661][ C1] pc : [<81a8be44>] lr : [<81a8be1c>] psr: 80000113 [ 528.258681][ C1] sp : df805d68 ip : df805d68 fp : df805d7c [ 528.258698][ C1] r10: 81c05450 r9 : 84074240 r8 : 83edf288 [ 528.258720][ C1] r7 : 84074368 r6 : 00000001 r5 : 00000001 r4 : 84074368 [ 528.258741][ C1] r3 : 00008140 r2 : 00008141 r1 : 00000000 r0 : 00000001 [ 528.258763][ C1] Flags: Nzcv IRQs on FIQs on Mode SVC_32 ISA ARM Segment none [ 528.258798][ C1] Control: 30c5387d Table: 84c67880 DAC: 00000000 [ 528.258818][ C1] Call trace: frame pointer underflow [ 528.258905][ C1] [<81a8be04>] (_raw_spin_lock) from [<809c4ab0>] (gpio_mmio_set+0x44/0x80) [ 528.258993][ C1] r5:00000001 r4:84074240 [ 528.259016][ C1] [<809c4a6c>] (gpio_mmio_set) from [<809b543c>] (gpiochip_set+0x1c/0x44) [ 528.259086][ C1] r7:00000001 r6:00000000 r5:00000000 r4:843cd000 [ 528.259103][ C1] [<809b5420>] (gpiochip_set) from [<809b7c54>] (gpiod_set_raw_value_commit+0x78/0x218) [ 528.259156][ C1] [<809b7bdc>] (gpiod_set_raw_value_commit) from [<809b94f4>] (gpiod_set_value_nocheck+0x44/0x58) [ 528.259219][ C1] r10:81c05450 r9:df805ebc r8:00000102 r7:ffffbd80 r6:00000007 r5:00000001 [ 528.259271][ C1] r4:843cd000 [ 528.259288][ C1] [<809b94b0>] (gpiod_set_value_nocheck) from [<809b9544>] (gpiod_set_value+0x3c/0x88) [ 528.259351][ C1] [<809b9508>] (gpiod_set_value) from [<809c9bac>] (gpio_led_set+0x5c/0x60) [ 528.259410][ C1] r5:830fe044 r4:830fe044 [ 528.259429][ C1] [<809c9b50>] (gpio_led_set) from [<809c7458>] (led_set_brightness_nosleep+0x38/0x44) [ 528.259479][ C1] r5:830fe044 r4:830a020c [ 528.259494][ C1] [<809c7420>] (led_set_brightness_nosleep) from [<809ca4a8>] (led_heartbeat_function+0x84/0x144) [ 528.259541][ C1] [<809ca424>] (led_heartbeat_function) from [<80326268>] (call_timer_fn+0x30/0x220) [ 528.259611][ C1] r7:ffffbd80 r6:809ca424 r5:830a020c r4:83216000 [ 528.259629][ C1] [<80326238>] (call_timer_fn) from [<8032671c>] (__run_timers+0x2c4/0x3f8) [ 528.259693][ C1] r9:df805ebc r8:ffffbd80 r7:00000000 r6:809ca424 r5:dddd9f00 r4:830a020c [ 528.259711][ C1] [<80326458>] (__run_timers) from [<803268b8>] (run_timer_base+0x68/0x78) [ 528.259777][ C1] r10:83216000 r9:82804d80 r8:00000102 r7:00000001 r6:00000082 r5:00000002 [ 528.259796][ C1] r4:dddd9f00 [ 528.259811][ C1] [<80326850>] (run_timer_base) from [<803268e4>] (run_timer_softirq+0x1c/0x34) [ 528.259867][ C1] r4:82804084 [ 528.259884][ C1] [<803268c8>] (run_timer_softirq) from [<8025aeb8>] (handle_softirqs+0x140/0x458) [ 528.259946][ C1] [<8025ad78>] (handle_softirqs) from [<8025b32c>] (__irq_exit_rcu+0x110/0x1d0) [ 528.260013][ C1] r10:00000000 r9:83216000 r8:00000000 r7:df865e08 r6:82442b28 r5:8247dd4c [ 528.260033][ C1] r4:83216000 [ 528.260050][ C1] [<8025b21c>] (__irq_exit_rcu) from [<8025b6a4>] (irq_exit+0x10/0x18) [ 528.260106][ C1] r5:8247dd4c r4:826c2a9c [ 528.260123][ C1] [<8025b694>] (irq_exit) from [<81a7d8c4>] (generic_handle_arch_irq+0x7c/0x80) [ 528.260185][ C1] [<81a7d848>] (generic_handle_arch_irq) from [<81a4d9a4>] (call_with_stack+0x1c/0x20) [ 528.260270][ C1] r9:83216000 r8:83edf288 r7:df865e3c r6:ffffffff r5:60000013 r4:809c52b0 [ 528.260308][ C1] [<81a4d988>] (call_with_stack) from [<80200bec>] (__irq_svc+0x8c/0xbc) [ 528.260369][ C1] Exception stack(0xdf865e08 to 0xdf865e50) [ 528.260405][ C1] 5e00: e0125008 00000008 00008140 00000000 e0125008 00000008 [ 528.260438][ C1] 5e20: 00000001 84074368 83edf288 84074240 00000000 df865e6c df865e58 df865e58 [ 528.260462][ C1] 5e40: 809c52ac 809c52b0 60000013 ffffffff [ 528.260480][ C1] [<809c5290>] (gpio_mmio_write32) from [<809c4ad0>] (gpio_mmio_set+0x64/0x80) [ 528.260538][ C1] r5:00000008 r4:84074240 [ 528.260554][ C1] [<809c4a6c>] (gpio_mmio_set) from [<809b543c>] (gpiochip_set+0x1c/0x44) [ 528.260631][ C1] r7:00000001 r6:00000000 r5:00000003 r4:843cd03c [ 528.260652][ C1] [<809b5420>] (gpiochip_set) from [<809b7c54>] (gpiod_set_raw_value_commit+0x78/0x218) [ 528.260705][ C1] [<809b7bdc>] (gpiod_set_raw_value_commit) from [<809b94f4>] (gpiod_set_value_nocheck+0x44/0x58) [ 528.260767][ C1] r10:00000000 r9:00000000 r8:00000001 r7:ddde24c0 r6:8384f118 r5:00000001 [ 528.260786][ C1] r4:843cd03c [ 528.260800][ C1] [<809b94b0>] (gpiod_set_value_nocheck) from [<809b9544>] (gpiod_set_value+0x3c/0x88) [ 528.260844][ C1] [<809b9508>] (gpiod_set_value) from [<809c9bac>] (gpio_led_set+0x5c/0x60) [ 528.260908][ C1] r5:000000ff r4:830fe314 [ 528.260926][ C1] [<809c9b50>] (gpio_led_set) from [<809c74e8>] (led_set_brightness+0x84/0x90) [ 528.260975][ C1] r5:000000ff r4:830fe314 [ 528.261004][ C1] [<809c7464>] (led_set_brightness) from [<809c9054>] (led_trigger_event+0x40/0x58) [ 528.261053][ C1] r5:000000ff r4:830fe314 [ 528.261070][ C1] [<809c9014>] (led_trigger_event) from [<809ca6b0>] (ledtrig_cpu+0xac/0xf4) [ 528.261125][ C1] r7:ddde24c0 r6:00000002 r5:82b15cd8 r4:000000fe [ 528.261140][ C1] [<809ca604>] (ledtrig_cpu) from [<80227758>] (arch_cpu_idle_exit+0x14/0x18) [ 528.261204][ C1] r9:00000000 r8:00000001 r7:8280c710 r6:83216000 r5:8280c6d0 r4:00000001 [ 528.261232][ C1] [<80227744>] (arch_cpu_idle_exit) from [<802b0e84>] (do_idle+0x5c/0x2d8) [ 528.261292][ C1] [<802b0e28>] (do_idle) from [<802b1430>] (cpu_startup_entry+0x30/0x34) [ 528.261357][ C1] r10:00000000 r9:414fc0f0 r8:80003000 r7:82a7b4a4 r6:83216000 r5:00000001 [ 528.261378][ C1] r4:00000092 [ 528.261406][ C1] [<802b1400>] (cpu_startup_entry) from [<8022f04c>] (secondary_start_kernel+0x128/0x180) [ 528.261469][ C1] [<8022ef24>] (secondary_start_kernel) from [<80220094>] (__enable_mmu+0x0/0xc) [ 528.261533][ C1] r7:82a7b4a4 r6:30c0387d r5:00000000 r4:830b7bc0 [ 528.262590][ C0] Kernel panic - not syncing: softlockup: hung tasks [ 528.306225][ C0] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Tainted: G L syzkaller #0 PREEMPT [ 528.306679][ C0] Tainted: [L]=SOFTLOCKUP [ 528.306901][ C0] Hardware name: ARM-Versatile Express [ 528.307147][ C0] Call trace: [ 528.307439][ C0] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 528.307790][ C0] r7:82295294 r6:8281b500 r5:00000000 r4:82294458 [ 528.308036][ C0] [<80201b08>] (show_stack) from [<8021ec54>] (dump_stack_lvl+0x54/0x7c) [ 528.309543][ C0] [<8021ec00>] (dump_stack_lvl) from [<8021ec94>] (dump_stack+0x18/0x1c) [ 528.310080][ C0] r5:00000000 r4:82a7bd14 [ 528.310262][ C0] [<8021ec7c>] (dump_stack) from [<802025f8>] (vpanic+0xe0/0x2e8) [ 528.310581][ C0] [<80202518>] (vpanic) from [<80202834>] (trace_suspend_resume+0x0/0xd8) [ 528.310904][ C0] r7:82ac27f0 [ 528.311062][ C0] [<80202800>] (panic) from [<8038317c>] (watchdog_timer_fn+0x2bc/0x330) [ 528.311402][ C0] r3:00000001 r2:00004000 r1:82a7bd1c r0:82295294 [ 528.311636][ C0] [<80382ec0>] (watchdog_timer_fn) from [<80328e5c>] (__hrtimer_run_queues+0x1c4/0x454) [ 528.312025][ C0] r10:8281b500 r9:00000000 r8:dddc7130 r7:80382ec0 r6:dddc7000 r5:dddc7040 [ 528.312319][ C0] r4:dddc75d8 [ 528.312467][ C0] [<80328c98>] (__hrtimer_run_queues) from [<8032a460>] (hrtimer_interrupt+0x148/0x2bc) [ 528.312834][ C0] r10:f9fd7ea0 r9:dddc7180 r8:dddc7130 r7:0000007a r6:00000003 r5:20000193 [ 528.313120][ C0] r4:dddc7000 [ 528.313262][ C0] [<8032a318>] (hrtimer_interrupt) from [<8131e118>] (arch_timer_handler_virt+0x30/0x38) [ 528.313619][ C0] r10:81d0f874 r9:8309e400 r8:00000000 r7:00000000 r6:00000000 r5:82497528 [ 528.313941][ C0] r4:8309de40 [ 528.314109][ C0] [<8131e0e8>] (arch_timer_handler_virt) from [<802ef008>] (handle_percpu_devid_irq+0x128/0x34c) [ 528.314492][ C0] [<802eeee0>] (handle_percpu_devid_irq) from [<802e81ac>] (handle_irq_desc+0x74/0x84) [ 528.314871][ C0] r10:00000001 r9:8281b500 r8:00000000 r7:df80a00c r6:826c1388 r5:df80a000 [ 528.315161][ C0] r4:8280cc44 [ 528.315290][ C0] [<802e8138>] (handle_irq_desc) from [<802e8228>] (generic_handle_domain_irq+0x18/0x1c) [ 528.315631][ C0] [<802e8210>] (generic_handle_domain_irq) from [<802012c8>] (gic_handle_irq+0x68/0x7c) [ 528.316039][ C0] [<80201260>] (gic_handle_irq) from [<81a7d8a8>] (generic_handle_arch_irq+0x60/0x80) [ 528.316416][ C0] r7:82801b90 r6:82442b28 r5:8247dd4c r4:826c2a9c [ 528.316649][ C0] [<81a7d848>] (generic_handle_arch_irq) from [<80200bdc>] (__irq_svc+0x7c/0xbc) [ 528.317006][ C0] Exception stack(0x82801b90 to 0x82801bd8) [ 528.317238][ C0] 1b80: ddddb488 830bf3b0 00000103 0000bfc9 [ 528.317554][ C0] 1ba0: 830bf380 830bf3b0 82801cb8 ddddb488 36e50e80 0000001e 00000001 82801bec [ 528.317910][ C0] 1bc0: 82801bf0 82801be0 803460dc 81a8bc8c 60000113 ffffffff [ 528.318184][ C0] r9:8281b500 r8:36e50e80 r7:82801bc4 r6:ffffffff r5:60000113 r4:81a8bc8c [ 528.318448][ C0] [<81a8bc64>] (_raw_spin_unlock_irq) from [<803460dc>] (tmigr_handle_remote_up+0x268/0x4b0) [ 528.318820][ C0] [<80345e74>] (tmigr_handle_remote_up) from [<8034438c>] (__walk_groups_from+0x3c/0xe4) [ 528.319222][ C0] r10:8281b500 r9:8280c820 r8:80345e74 r7:82801cb8 r6:830bf380 r5:00000002 [ 528.319516][ C0] r4:830bf380 [ 528.319663][ C0] [<80344350>] (__walk_groups_from) from [<80346724>] (tmigr_handle_remote+0xe8/0x108) [ 528.320032][ C0] r9:82804d80 r8:00000102 r7:00000001 r6:00000082 r5:00000002 r4:dddc7488 [ 528.320322][ C0] [<8034663c>] (tmigr_handle_remote) from [<803268f8>] (run_timer_softirq+0x30/0x34) [ 528.320680][ C0] r4:82804084 [ 528.320826][ C0] [<803268c8>] (run_timer_softirq) from [<8025aeb8>] (handle_softirqs+0x140/0x458) [ 528.321204][ C0] [<8025ad78>] (handle_softirqs) from [<8025b32c>] (__irq_exit_rcu+0x110/0x1d0) [ 528.321558][ C0] r10:00000000 r9:8281b500 r8:00000000 r7:82801dd8 r6:82442b28 r5:8247dd4c [ 528.321881][ C0] r4:8281b500 [ 528.322038][ C0] [<8025b21c>] (__irq_exit_rcu) from [<8025b6a4>] (irq_exit+0x10/0x18) [ 528.322363][ C0] r5:8247dd4c r4:826c2a9c [ 528.322539][ C0] [<8025b694>] (irq_exit) from [<81a7d8c4>] (generic_handle_arch_irq+0x7c/0x80) [ 528.322880][ C0] [<81a7d848>] (generic_handle_arch_irq) from [<80200bdc>] (__irq_svc+0x7c/0xbc) [ 528.323222][ C0] Exception stack(0x82801dd8 to 0x82801e20) [ 528.323446][ C0] 1dc0: 00000001 00000000 [ 528.323735][ C0] 1de0: 00008142 00008140 84074368 00000004 00000001 84074368 83edf288 84074240 [ 528.324038][ C0] 1e00: 00000000 82801e3c 82801e28 82801e28 81a8be1c 81a8be44 80000013 ffffffff [ 528.324351][ C0] r9:8281b500 r8:83edf288 r7:82801e0c r6:ffffffff r5:80000013 r4:81a8be44 [ 528.324637][ C0] [<81a8be04>] (_raw_spin_lock) from [<809c4ab0>] (gpio_mmio_set+0x44/0x80) [ 528.325312][ C0] r5:00000004 r4:84074240 [ 528.325674][ C0] [<809c4a6c>] (gpio_mmio_set) from [<809b543c>] (gpiochip_set+0x1c/0x44) [ 528.326057][ C0] r7:00000001 r6:00000000 r5:00000002 r4:843cd028 [ 528.326289][ C0] [<809b5420>] (gpiochip_set) from [<809b7c54>] (gpiod_set_raw_value_commit+0x78/0x218) [ 528.326656][ C0] [<809b7bdc>] (gpiod_set_raw_value_commit) from [<809b94f4>] (gpiod_set_value_nocheck+0x44/0x58) [ 528.327097][ C0] r10:00000000 r9:00000000 r8:00000001 r7:dddce4c0 r6:8384f0d8 r5:00000001 [ 528.327395][ C0] r4:843cd028 [ 528.327540][ C0] [<809b94b0>] (gpiod_set_value_nocheck) from [<809b9544>] (gpiod_set_value+0x3c/0x88) [ 528.327900][ C0] [<809b9508>] (gpiod_set_value) from [<809c9bac>] (gpio_led_set+0x5c/0x60) [ 528.328272][ C0] r5:000000ff r4:830fe224 [ 528.328464][ C0] [<809c9b50>] (gpio_led_set) from [<809c74e8>] (led_set_brightness+0x84/0x90) [ 528.328816][ C0] r5:000000ff r4:830fe224 [ 528.329007][ C0] [<809c7464>] (led_set_brightness) from [<809c9054>] (led_trigger_event+0x40/0x58) [ 528.329361][ C0] r5:000000ff r4:830fe224 [ 528.329542][ C0] [<809c9014>] (led_trigger_event) from [<809ca6b0>] (ledtrig_cpu+0xac/0xf4) [ 528.329909][ C0] r7:dddce4c0 r6:00000002 r5:82b15cd8 r4:000001fd [ 528.330162][ C0] [<809ca604>] (ledtrig_cpu) from [<80227758>] (arch_cpu_idle_exit+0x14/0x18) [ 528.330526][ C0] r9:00000000 r8:00000000 r7:8280c710 r6:8281b500 r5:8280c6d0 r4:00000000 [ 528.330816][ C0] [<80227744>] (arch_cpu_idle_exit) from [<802b0e84>] (do_idle+0x5c/0x2d8) [ 528.331177][ C0] [<802b0e28>] (do_idle) from [<802b1430>] (cpu_startup_entry+0x30/0x34) [ 528.331523][ C0] r10:8281aff4 r9:823bd7d4 r8:00000000 r7:8280c680 r6:deffc06c r5:828222e8 [ 528.331810][ C0] r4:000000ed [ 528.331960][ C0] [<802b1400>] (cpu_startup_entry) from [<81a7f2dc>] (kernel_init+0x0/0x138) [ 528.332316][ C0] [<81a7f1fc>] (rest_init) from [<82601338>] (start_kernel+0x738/0x754) [ 528.332684][ C0] [<82600c00>] (start_kernel) from [<00000000>] (0x0) [ 528.335346][ C0] Rebooting in 86400 seconds..