last executing test programs: 713.005495ms ago: executing program 0 (id=1422): r0 = openat$mixer(0xffffff9c, &(0x7f00000000c0), 0x103100, 0x0) ioctl$DMA_HEAP_IOCTL_ALLOC(r0, 0xc0184800, &(0x7f0000000040)={0x0, r0}) r2 = dup(r1) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r2, 0x80045301, &(0x7f0000000000)) 572.307254ms ago: executing program 0 (id=1424): r0 = syz_open_dev$mouse(&(0x7f0000000040), 0x0, 0x0) close$binfmt(r0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000100)) 483.494095ms ago: executing program 1 (id=1426): r0 = openat$selinux_enforce(0xffffff9c, &(0x7f0000000800), 0x242102, 0x0) close(r0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f00000000c0)=@gcm_256={{0x304}, "930e431a30429990", "7211a5454a62fc926048807594a8624bc11378fb357becdf413f77f54aec604b", "2fb3c10e", "bec4d15bc4845b84"}, 0x38) 483.247666ms ago: executing program 0 (id=1427): r0 = openat$binder_debug(0xffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/transaction_log\x00', 0x0, 0x0) close(r0) openat$incfs(0xffffffffffffff9c, &(0x7f00000031c0)='.pending_reads\x00', 0x8a4c1, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000000), 0x0, 0x0, 0x0) 405.570076ms ago: executing program 1 (id=1428): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) recvmmsg(r0, &(0x7f0000000640)=[{{&(0x7f0000000240)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, 0xfffffffffffffeea, 0x0}}], 0x0, 0x0, 0x0) dup2(r0, r1) setsockopt$inet6_IPV6_HOPOPTS(r1, 0x29, 0x36, 0x0, 0x0) 392.837327ms ago: executing program 0 (id=1429): r0 = openat$vcs(0xffffff9c, &(0x7f0000001c80), 0x40040, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) r1 = syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_PROBE_CLIENT(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000001b40)={0x20, r1, 0x20, 0x70bd2b, 0x25dfdbfc, {{}, {@void, @val={0xc, 0x99, {0x7, 0x7f}}}}}, 0x20}, 0x1, 0x0, 0x0, 0x1}, 0x4000000) 292.375031ms ago: executing program 1 (id=1430): r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/meminfo\x00', 0x0, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x2, 0x0, &(0x7f00000000c0)) 292.099981ms ago: executing program 0 (id=1431): r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000100), 0x80, 0x0) close(r0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_FEATURES_GET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x0, 0x1, 0x70bd25, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x8800}, 0x810) 198.520453ms ago: executing program 0 (id=1432): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) sendto$l2tp6(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x3}, 0x20) sendmsg$NL80211_CMD_GET_POWER_SAVE(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}, 0x1, 0x0, 0x0, 0x2000}, 0x2000c005) 198.371284ms ago: executing program 1 (id=1433): r0 = openat$selinux_mls(0xffffff9c, &(0x7f00000002c0), 0x0, 0x0) close(r0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPCTNL_MSG_TIMEOUT_DELETE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000001c0)={0x14, 0x2, 0x8, 0x101, 0x0, 0x0, {0x3, 0x0, 0x9}}, 0x14}}, 0x20000014) 102.158006ms ago: executing program 1 (id=1434): r0 = openat$selinux_status(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) close_range(r0, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)) sendmsg$IPSET_CMD_SAVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}, 0x1, 0x0, 0x0, 0x2000c000}, 0x40) 0s ago: executing program 1 (id=1435): r0 = syz_open_dev$mouse(&(0x7f0000000000), 0x0, 0x0) close(r0) socket$netlink(0x10, 0x3, 0x0) sendmsg$NFNL_MSG_CTHELPER_NEW(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[], 0x28}, 0x1, 0x0, 0x0, 0x20004011}, 0x4000004) kernel console output (not intermixed with test programs): [ 48.593767][ T29] audit: type=1400 audit(48.510:56): avc: denied { read write } for pid=3087 comm="sftp-server" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 48.596522][ T29] audit: type=1400 audit(48.520:57): avc: denied { open } for pid=3087 comm="sftp-server" path="/dev/null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 Warning: Permanently added '[localhost]:7632' (ED25519) to the list of known hosts. [ 62.101531][ T29] audit: type=1400 audit(62.020:58): avc: denied { name_bind } for pid=3090 comm="sshd-session" src=30000 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 64.295242][ T29] audit: type=1400 audit(64.210:59): avc: denied { execute } for pid=3091 comm="sh" name="syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 64.319306][ T29] audit: type=1400 audit(64.240:60): avc: denied { execute_no_trans } for pid=3091 comm="sh" path="/syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 66.759716][ T29] audit: type=1400 audit(66.680:61): avc: denied { mounton } for pid=3091 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=806 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 66.763240][ T29] audit: type=1400 audit(66.680:62): avc: denied { mount } for pid=3091 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 66.774723][ T3091] cgroup: Unknown subsys name 'net' [ 66.781522][ T29] audit: type=1400 audit(66.700:63): avc: denied { unmount } for pid=3091 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 66.973571][ T3091] cgroup: Unknown subsys name 'cpuset' [ 66.982925][ T3091] cgroup: Unknown subsys name 'hugetlb' [ 66.987091][ T3091] cgroup: Unknown subsys name 'rlimit' [ 67.200604][ T29] audit: type=1400 audit(67.120:64): avc: denied { setattr } for pid=3091 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 67.204012][ T29] audit: type=1400 audit(67.120:65): avc: denied { mounton } for pid=3091 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 67.207211][ T29] audit: type=1400 audit(67.130:66): avc: denied { mount } for pid=3091 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 67.417093][ T3093] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 67.421721][ T29] audit: type=1400 audit(67.340:67): avc: denied { relabelto } for pid=3093 comm="mkswap" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 67.426433][ T29] audit: type=1400 audit(67.350:68): avc: denied { write } for pid=3093 comm="mkswap" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 67.465718][ T29] audit: type=1400 audit(67.390:69): avc: denied { read } for pid=3091 comm="syz-executor" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 67.468973][ T29] audit: type=1400 audit(67.390:70): avc: denied { open } for pid=3091 comm="syz-executor" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 75.814836][ T3091] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 77.915665][ T29] audit: type=1400 audit(77.840:71): avc: denied { execmem } for pid=3094 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 77.982185][ T29] audit: type=1400 audit(77.900:72): avc: denied { read } for pid=3096 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 77.989567][ T29] audit: type=1400 audit(77.900:73): avc: denied { open } for pid=3096 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 77.996196][ T29] audit: type=1400 audit(77.920:74): avc: denied { mounton } for pid=3096 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 78.027556][ T29] audit: type=1400 audit(77.950:75): avc: denied { module_request } for pid=3096 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 78.030711][ T29] audit: type=1400 audit(77.950:76): avc: denied { module_request } for pid=3097 comm="syz-executor" kmod="netdev-nr1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 78.109842][ T29] audit: type=1400 audit(78.030:77): avc: denied { sys_module } for pid=3097 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 78.784897][ T29] audit: type=1400 audit(78.700:78): avc: denied { ioctl } for pid=3096 comm="syz-executor" path="/dev/net/tun" dev="devtmpfs" ino=677 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 79.882640][ T3097] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 79.902484][ T3097] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 79.924016][ T3096] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 79.946150][ T3096] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 80.600718][ T3097] hsr_slave_0: entered promiscuous mode [ 80.603913][ T3097] hsr_slave_1: entered promiscuous mode [ 80.708976][ T3096] hsr_slave_0: entered promiscuous mode [ 80.715601][ T3096] hsr_slave_1: entered promiscuous mode [ 80.718461][ T3096] debugfs: 'hsr0' already exists in 'hsr' [ 80.719139][ T3096] Cannot create hsr debugfs directory [ 81.197007][ T29] audit: type=1400 audit(81.120:79): avc: denied { create } for pid=3097 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 81.200219][ T29] audit: type=1400 audit(81.120:80): avc: denied { write } for pid=3097 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 81.210297][ T3097] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 81.222111][ T3097] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 81.240720][ T3097] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 81.261605][ T3097] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 81.350707][ T3096] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 81.363958][ T3096] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 81.378766][ T3096] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 81.390549][ T3096] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 82.018698][ T3097] 8021q: adding VLAN 0 to HW filter on device bond0 [ 82.126656][ T3096] 8021q: adding VLAN 0 to HW filter on device bond0 [ 84.693631][ T3097] veth0_vlan: entered promiscuous mode [ 84.725788][ T3097] veth1_vlan: entered promiscuous mode [ 84.742948][ T3096] veth0_vlan: entered promiscuous mode [ 84.771520][ T3096] veth1_vlan: entered promiscuous mode [ 84.800749][ T3097] veth0_macvtap: entered promiscuous mode [ 84.810644][ T3097] veth1_macvtap: entered promiscuous mode [ 84.856129][ T3096] veth0_macvtap: entered promiscuous mode [ 84.869897][ T3096] veth1_macvtap: entered promiscuous mode [ 84.910461][ T38] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 84.912836][ T38] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 84.912952][ T38] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 84.913012][ T38] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 84.993462][ T38] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 84.994432][ T38] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 84.994999][ T38] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 84.995533][ T38] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 85.062718][ T29] kauditd_printk_skb: 1 callbacks suppressed [ 85.065230][ T29] audit: type=1400 audit(84.980:82): avc: denied { mount } for pid=3097 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 85.071975][ T29] audit: type=1400 audit(84.990:83): avc: denied { mounton } for pid=3097 comm="syz-executor" path="/syzkaller.7NIG5X/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 85.082907][ T29] audit: type=1400 audit(85.000:84): avc: denied { mount } for pid=3097 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 85.097613][ T29] audit: type=1400 audit(85.020:85): avc: denied { mounton } for pid=3097 comm="syz-executor" path="/syzkaller.7NIG5X/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 85.103266][ T29] audit: type=1400 audit(85.020:86): avc: denied { mounton } for pid=3097 comm="syz-executor" path="/syzkaller.7NIG5X/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=2035 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 85.134081][ T29] audit: type=1400 audit(85.050:87): avc: denied { unmount } for pid=3097 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 85.147167][ T29] audit: type=1400 audit(85.060:88): avc: denied { mounton } for pid=3097 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=772 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 85.160511][ T29] audit: type=1400 audit(85.080:89): avc: denied { mount } for pid=3097 comm="syz-executor" name="/" dev="gadgetfs" ino=2382 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 85.182522][ T29] audit: type=1400 audit(85.100:90): avc: denied { mount } for pid=3097 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 85.187588][ T29] audit: type=1400 audit(85.100:91): avc: denied { mounton } for pid=3097 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 85.240324][ T3097] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 88.496208][ T3748] Zero length message leads to an empty skb [ 90.176354][ T29] kauditd_printk_skb: 20 callbacks suppressed [ 90.179243][ T29] audit: type=1400 audit(90.100:112): avc: denied { create } for pid=3785 comm="syz.1.40" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 90.379639][ T29] audit: type=1400 audit(90.300:113): avc: denied { read } for pid=3790 comm="syz.1.42" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 91.695766][ T29] audit: type=1400 audit(91.620:114): avc: denied { prog_load } for pid=3838 comm="syz.0.66" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 91.698957][ T29] audit: type=1400 audit(91.620:115): avc: denied { bpf } for pid=3838 comm="syz.0.66" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 91.991945][ T3850] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3850 comm=syz.1.70 [ 92.098605][ T29] audit: type=1400 audit(92.020:116): avc: denied { write } for pid=3852 comm="syz.0.73" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 92.543884][ T29] audit: type=1400 audit(92.460:117): avc: denied { remount } for pid=3869 comm="syz.0.80" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 92.568661][ T29] audit: type=1400 audit(92.480:118): avc: denied { unmount } for pid=3096 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 93.207213][ T29] audit: type=1400 audit(93.130:119): avc: denied { create } for pid=3888 comm="syz.0.89" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 93.211623][ T29] audit: type=1400 audit(93.130:120): avc: denied { write } for pid=3888 comm="syz.0.89" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 93.813597][ T3903] capability: warning: `syz.1.96' uses 32-bit capabilities (legacy support in use) [ 94.088997][ T3913] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=3913 comm=syz.1.100 [ 94.334001][ T29] audit: type=1400 audit(94.250:121): avc: denied { name_bind } for pid=3922 comm="syz.1.105" src=20004 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 97.381133][ T29] kauditd_printk_skb: 3 callbacks suppressed [ 97.382328][ T29] audit: type=1400 audit(97.300:125): avc: denied { setopt } for pid=3973 comm="syz.1.130" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 97.571074][ T29] audit: type=1400 audit(97.490:126): avc: denied { read } for pid=3977 comm="syz.1.132" path="socket:[3541]" dev="sockfs" ino=3541 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 97.622921][ T29] audit: type=1400 audit(97.540:127): avc: denied { map_create } for pid=3979 comm="syz.1.133" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 97.634035][ T29] audit: type=1400 audit(97.550:128): avc: denied { map_read map_write } for pid=3979 comm="syz.1.133" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 99.445892][ T29] audit: type=1400 audit(99.370:129): avc: denied { write } for pid=3997 comm="syz.1.141" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 99.598389][ T4004] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4004 comm=syz.0.144 [ 101.367833][ T4047] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4047 comm=syz.1.165 ALSA lib confmisc.c:855:(parse_card) cannot find card '0' ALSA lib conf.c:5180:(_snd_config_evaluate) function snd_func_card_inum returned error: No such file or directory ALSA lib confmisc.c:422:(snd_func_concat) error evaluating strings ALSA lib conf.c:5180:(_snd_config_evaluate) function snd_func_concat returned error: No such file or directory ALSA lib confmisc.c:1334:(snd_func_refer) error evaluating name ALSA lib conf.c:5180:(_snd_config_evaluate) function snd_func_refer returned error: No such file or directory ALSA lib conf.c:5703:(snd_config_expand) Evaluate error: No such file or directory ALSA lib pcm.c:2666:(snd_pcm_open_noupdate) Unknown PCM default alsa: Could not initialize DAC alsa: Failed to open `default': alsa: Reason: No such file or directory ALSA lib confmisc.c:855:(parse_card) cannot find card '0' ALSA lib conf.c:5180:(_snd_config_evaluate) function snd_func_card_inum returned error: No such file or directory ALSA lib confmisc.c:422:(snd_func_concat) error evaluating strings ALSA lib conf.c:5180:(_snd_config_evaluate) function snd_func_concat returned error: No such file or directory ALSA lib confmisc.c:1334:(snd_func_refer) error evaluating name ALSA lib conf.c:5180:(_snd_config_evaluate) function snd_func_refer returned error: No such file or directory ALSA lib conf.c:5703:(snd_config_expand) Evaluate error: No such file or directory ALSA lib pcm.c:2666:(snd_pcm_open_noupdate) Unknown PCM default alsa: Could not initialize DAC alsa: Failed to open `default': alsa: Reason: No such file or directory audio: Could not create a backend for voice `lm4549.out' [ 103.916104][ T29] audit: type=1400 audit(103.840:130): avc: denied { create } for pid=4069 comm="syz.0.176" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 103.926348][ T29] audit: type=1400 audit(103.840:131): avc: denied { write } for pid=4069 comm="syz.0.176" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 104.004175][ T4072] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4072 comm=syz.0.177 [ 105.119758][ T4094] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4094 comm=syz.0.188 [ 106.430315][ T4131] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=1549 sclass=netlink_audit_socket pid=4131 comm=syz.1.206 [ 106.551792][ T4139] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=5134 sclass=netlink_audit_socket pid=4139 comm=syz.1.210 [ 106.613288][ T4142] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4142 comm=syz.0.211 [ 107.052283][ T4157] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4157 comm=syz.0.219 [ 107.575227][ T4173] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4173 comm=syz.0.227 [ 107.977485][ T29] audit: type=1400 audit(107.900:132): avc: denied { allowed } for pid=4190 comm="syz.0.236" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 107.990963][ T29] audit: type=1400 audit(107.910:133): avc: denied { create } for pid=4190 comm="syz.0.236" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 107.992821][ T29] audit: type=1400 audit(107.910:134): avc: denied { map } for pid=4190 comm="syz.0.236" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=4176 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 107.997971][ T29] audit: type=1400 audit(107.910:135): avc: denied { read write } for pid=4190 comm="syz.0.236" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=4176 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 108.830868][ T29] audit: type=1400 audit(108.750:136): avc: denied { ioctl } for pid=4209 comm="syz.0.245" path="socket:[4080]" dev="sockfs" ino=4080 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 110.374749][ T29] audit: type=1400 audit(110.290:137): avc: denied { connect } for pid=4218 comm="syz.1.249" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 110.851654][ T29] audit: type=1400 audit(110.770:138): avc: denied { setopt } for pid=4230 comm="syz.1.255" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 111.017584][ T4235] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4235 comm=syz.1.257 [ 112.435619][ T29] audit: type=1400 audit(112.360:139): avc: denied { create } for pid=4266 comm="syz.0.273" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 112.437586][ T4267] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=4267 comm=syz.0.273 [ 112.437630][ T29] audit: type=1400 audit(112.360:140): avc: denied { write } for pid=4266 comm="syz.0.273" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 112.489852][ T4269] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4269 comm=syz.0.274 [ 112.594743][ T29] audit: type=1400 audit(112.510:141): avc: denied { create } for pid=4272 comm="syz.0.276" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 112.597245][ T4273] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 112.599520][ T29] audit: type=1400 audit(112.520:142): avc: denied { setopt } for pid=4272 comm="syz.0.276" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 115.719261][ T29] audit: type=1400 audit(115.640:143): avc: denied { getopt } for pid=4300 comm="syz.1.288" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 118.300460][ T29] audit: type=1400 audit(118.220:144): avc: denied { bind } for pid=4366 comm="syz.1.321" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 118.301662][ T29] audit: type=1400 audit(118.220:145): avc: denied { node_bind } for pid=4366 comm="syz.1.321" saddr=127.0.0.1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 [ 118.545363][ T4375] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4375 comm=syz.1.325 [ 121.253716][ T29] audit: type=1400 audit(121.170:146): avc: denied { setopt } for pid=4421 comm="syz.1.348" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 122.678846][ T29] audit: type=1400 audit(122.600:147): avc: denied { ioctl } for pid=4486 comm="syz.1.380" path="socket:[5692]" dev="sockfs" ino=5692 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 122.715986][ T29] audit: type=1400 audit(122.630:148): avc: denied { write } for pid=4488 comm="syz.0.381" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 130.346938][ T4645] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2564 sclass=netlink_route_socket pid=4645 comm=syz.0.456 [ 130.692222][ T4657] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4657 comm=syz.0.463 [ 132.090132][ T29] audit: type=1400 audit(132.010:149): avc: denied { unmount } for pid=3097 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 134.555392][ T4710] SELinux: Context system_u:object_r:devicekit_var_run_t:s0 is not valid (left unmapped). [ 134.559501][ T29] audit: type=1400 audit(134.480:150): avc: denied { relabelto } for pid=4709 comm="syz.0.488" name="file0" dev="tmpfs" ino=1426 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="system_u:object_r:devicekit_var_run_t:s0" [ 134.559948][ T29] audit: type=1400 audit(134.480:151): avc: denied { associate } for pid=4709 comm="syz.0.488" name="file0" dev="tmpfs" ino=1426 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 srawcon="system_u:object_r:devicekit_var_run_t:s0" [ 134.583872][ T29] audit: type=1400 audit(134.500:152): avc: denied { unlink } for pid=3096 comm="syz-executor" name="file0" dev="tmpfs" ino=1426 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="system_u:object_r:devicekit_var_run_t:s0" [ 139.247375][ T4761] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5127 sclass=netlink_route_socket pid=4761 comm=syz.0.512 [ 140.851653][ T29] audit: type=1400 audit(140.770:153): avc: denied { setopt } for pid=4777 comm="syz.1.520" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 141.983458][ T29] audit: type=1400 audit(141.900:154): avc: denied { create } for pid=4823 comm="syz.1.543" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 141.998193][ T29] audit: type=1400 audit(141.920:155): avc: denied { write } for pid=4823 comm="syz.1.543" path="socket:[6323]" dev="sockfs" ino=6323 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 143.489771][ T4864] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4864 comm=syz.1.562 [ 145.204009][ T4916] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4916 comm=syz.1.586 [ 147.591030][ T4950] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 148.569232][ T29] audit: type=1400 audit(148.490:156): avc: denied { ioctl } for pid=4961 comm="syz.1.607" path="socket:[6562]" dev="sockfs" ino=6562 ioctlcmd=0x8904 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 150.152672][ T29] audit: type=1400 audit(150.070:157): avc: denied { write } for pid=5004 comm="syz.0.627" name="ip_mr_cache" dev="proc" ino=4026532677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 150.419411][ T29] audit: type=1400 audit(150.340:158): avc: denied { mounton } for pid=5010 comm="syz.0.630" path="/355/bus" dev="tmpfs" ino=1841 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 150.442351][ T29] audit: type=1400 audit(150.360:159): avc: denied { unmount } for pid=3096 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=filesystem permissive=1 [ 150.577528][ T29] audit: type=1400 audit(150.500:160): avc: denied { create } for pid=5014 comm="syz.0.632" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 151.790672][ T5046] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5046 comm=syz.1.646 [ 151.792869][ T29] audit: type=1400 audit(151.710:161): avc: denied { connect } for pid=5044 comm="syz.0.647" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 153.298540][ T5100] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5100 comm=syz.0.672 [ 153.864961][ T5118] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5118 comm=syz.1.680 [ 154.266900][ T5137] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5137 comm=syz.0.690 [ 154.311504][ T5139] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5139 comm=syz.1.691 [ 157.043403][ T5212] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5212 comm=syz.0.724 [ 157.948961][ T5242] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5242 comm=syz.1.741 [ 168.490758][ T5437] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5437 comm=syz.0.841 [ 171.410166][ T5517] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5517 comm=syz.0.874 [ 172.892693][ T5538] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5538 comm=syz.0.886 [ 172.952575][ T5540] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5540 comm=syz.1.888 [ 175.935722][ T5558] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2564 sclass=netlink_route_socket pid=5558 comm=syz.1.895 [ 179.105344][ T5611] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5127 sclass=netlink_route_socket pid=5611 comm=syz.1.922 [ 180.116553][ T29] audit: type=1400 audit(180.040:162): avc: denied { read } for pid=5640 comm="syz.0.940" name="binder1" dev="binder" ino=8 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 180.119609][ T29] audit: type=1400 audit(180.040:163): avc: denied { open } for pid=5640 comm="syz.0.940" path="/dev/binderfs/binder1" dev="binder" ino=8 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 180.179600][ T5643] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5643 comm=syz.1.937 [ 180.497887][ T5654] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5654 comm=syz.1.941 [ 180.756761][ T29] audit: type=1400 audit(180.670:164): avc: denied { ioctl } for pid=5662 comm="syz.0.948" path="socket:[8838]" dev="sockfs" ino=8838 ioctlcmd=0x4b4e scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 181.007850][ T5674] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5674 comm=syz.1.953 [ 181.292650][ T29] audit: type=1400 audit(181.210:165): avc: denied { perfmon } for pid=5684 comm="syz.1.959" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 181.333343][ T29] audit: type=1400 audit(181.250:166): avc: denied { prog_run } for pid=5684 comm="syz.1.959" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 183.559711][ T29] audit: type=1400 audit(183.480:167): avc: denied { execute } for pid=5717 comm="syz.1.975" path=2F6D656D66643AC0873A2A18C16BA9875BA06F38AA4BA5D30B86CA3C7FFD368D7DD8F247B8EA65299086E39608E0FAB1D84EB257CB8D7D336C6D38A537C9202864656C6574656429 dev="tmpfs" ino=8 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 183.712239][ T29] audit: type=1400 audit(183.630:168): avc: denied { sqpoll } for pid=5719 comm="syz.0.976" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 185.199088][ T5737] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5737 comm=syz.0.987 [ 187.457348][ T29] audit: type=1400 audit(187.380:169): avc: denied { ioctl } for pid=5758 comm="syz.1.994" path="socket:[8987]" dev="sockfs" ino=8987 ioctlcmd=0x89f8 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 191.366078][ T29] audit: type=1400 audit(191.290:170): avc: denied { audit_write } for pid=5812 comm="syz.1.1020" capability=29 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 194.741886][ T29] audit: type=1400 audit(194.660:171): avc: denied { create } for pid=5872 comm="syz.1.1049" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 194.760386][ T29] audit: type=1400 audit(194.680:172): avc: denied { setopt } for pid=5872 comm="syz.1.1049" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 195.032820][ T5884] ======================================================= [ 195.032820][ T5884] WARNING: The mand mount option has been deprecated and [ 195.032820][ T5884] and is ignored by this kernel. Remove the mand [ 195.032820][ T5884] option from the mount to silence this warning. [ 195.032820][ T5884] ======================================================= [ 195.040671][ T29] audit: type=1400 audit(194.960:173): avc: denied { mount } for pid=5882 comm="syz.0.1054" name="/" dev="ramfs" ino=9202 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 195.069635][ T29] audit: type=1400 audit(194.990:174): avc: denied { unmount } for pid=3096 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 195.155920][ T29] audit: type=1400 audit(195.080:175): avc: denied { map } for pid=5886 comm="syz.0.1056" path="pipe:[9208]" dev="pipefs" ino=9208 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=1 [ 195.561643][ T29] audit: type=1400 audit(195.480:176): avc: denied { read } for pid=5896 comm="syz.0.1061" path="socket:[10176]" dev="sockfs" ino=10176 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 195.985767][ T5907] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=6 sclass=netlink_audit_socket pid=5907 comm=syz.0.1066 [ 196.162366][ T5911] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5911 comm=syz.1.1068 [ 205.203048][ T29] audit: type=1400 audit(205.120:177): avc: denied { connect } for pid=6091 comm="syz.0.1154" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 205.411971][ T6100] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6100 comm=syz.0.1158 [ 205.475213][ T6102] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=6102 comm=syz.1.1159 [ 207.240666][ T6138] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=515 sclass=netlink_audit_socket pid=6138 comm=syz.1.1177 [ 209.046791][ T29] audit: type=1400 audit(208.960:178): avc: denied { ioctl } for pid=6155 comm="syz.1.1187" path="socket:[11627]" dev="sockfs" ino=11627 ioctlcmd=0x89e2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 212.781336][ T6177] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=515 sclass=netlink_audit_socket pid=6177 comm=syz.0.1196 [ 215.125741][ T6202] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=6202 comm=syz.0.1209 [ 216.615687][ T6220] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=6220 comm=syz.1.1218 [ 220.623924][ T6270] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6270 comm=syz.1.1241 [ 221.124090][ T6285] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6285 comm=syz.1.1250 [ 221.572283][ T6299] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=515 sclass=netlink_audit_socket pid=6299 comm=syz.0.1256 [ 223.535534][ T2886] usb 2-1: new high-speed USB device number 2 using dummy_hcd [ 223.705176][ T2886] usb 2-1: New USB device found, idVendor=0424, idProduct=7850, bcdDevice= 0.00 [ 223.705461][ T2886] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 223.707391][ T2886] usb 2-1: Product: syz [ 223.707617][ T2886] usb 2-1: Manufacturer: syz [ 223.707776][ T2886] usb 2-1: SerialNumber: syz [ 223.938728][ T2886] lan78xx 2-1:1.0 (unnamed net_device) (uninitialized): Failed to read register index 0x00000098. ret = -EPROTO [ 223.939389][ T2886] lan78xx 2-1:1.0 (unnamed net_device) (uninitialized): lan78xx_setup_irq_domain() failed : -71 [ 223.939492][ T2886] lan78xx 2-1:1.0 (unnamed net_device) (uninitialized): Bind routine FAILED [ 223.946580][ T2886] lan78xx 2-1:1.0: probe with driver lan78xx failed with error -71 [ 223.953750][ T2886] usb 2-1: USB disconnect, device number 2 [ 227.162202][ T29] audit: type=1400 audit(227.080:179): avc: denied { setopt } for pid=6364 comm="syz.1.1283" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 227.591348][ T29] audit: type=1400 audit(227.510:180): avc: denied { create } for pid=6384 comm="syz.1.1292" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 228.421156][ T6427] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=1280 sclass=netlink_audit_socket pid=6427 comm=syz.0.1313 [ 228.651413][ T29] audit: type=1400 audit(228.570:181): avc: denied { write } for pid=6432 comm="syz.0.1317" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 229.382071][ T6452] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6452 comm=syz.0.1326 [ 231.920097][ T6486] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=1280 sclass=netlink_audit_socket pid=6486 comm=syz.1.1341 [ 232.251708][ T6502] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=1280 sclass=netlink_audit_socket pid=6502 comm=syz.1.1349 [ 234.023911][ T6578] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6578 comm=syz.0.1385 [ 237.548217][ T6632] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6632 comm=syz.1.1412 [ 237.902413][ T6647] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6647 comm=syz.1.1418 [ 660.274698][ C0] watchdog: BUG: soft lockup - CPU#0 stuck for 430s! [swapper/0:0] [ 660.274987][ C0] Modules linked in: [ 660.275774][ C0] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Not tainted syzkaller #0 PREEMPT [ 660.276001][ C0] Hardware name: ARM-Versatile Express [ 660.276222][ C0] PC is at _raw_spin_unlock_irq+0x28/0x54 [ 660.276935][ C0] LR is at tmigr_handle_remote_up+0x268/0x4b0 [ 660.276998][ C0] pc : [<81abba3c>] lr : [<80346df4>] psr: 60000113 [ 660.277067][ C0] sp : 82801be0 ip : 82801bf0 fp : 82801bec [ 660.277109][ C0] r10: 00000001 r9 : 00000038 r8 : 04480f80 [ 660.277159][ C0] r7 : ddddb488 r6 : 82801cb8 r5 : 830bf3b0 r4 : 830bf380 [ 660.277202][ C0] r3 : 00003770 r2 : 00000103 r1 : 830bf3b0 r0 : ddddb488 [ 660.277321][ C0] Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment user [ 660.277405][ C0] Control: 30c5387d Table: 85f84700 DAC: fffffffd [ 660.277508][ C0] Call trace: [ 660.277765][ C0] [<81abba14>] (_raw_spin_unlock_irq) from [<80346df4>] (tmigr_handle_remote_up+0x268/0x4b0) [ 660.278111][ C0] [<80346b8c>] (tmigr_handle_remote_up) from [<803450a4>] (__walk_groups_from+0x3c/0xe4) [ 660.278249][ C0] r10:8281b500 r9:8280c820 r8:80346b8c r7:82801cb8 r6:830bf380 r5:00000002 [ 660.278293][ C0] r4:830bf380 [ 660.278317][ C0] [<80345068>] (__walk_groups_from) from [<8034743c>] (tmigr_handle_remote+0xe8/0x108) [ 660.278393][ C0] r9:82804d80 r8:00000102 r7:00000001 r6:00000082 r5:00000002 r4:dddc7488 [ 660.278414][ C0] [<80347354>] (tmigr_handle_remote) from [<80327600>] (run_timer_softirq+0x30/0x34) [ 660.278477][ C0] r4:82804084 [ 660.278494][ C0] [<803275d0>] (run_timer_softirq) from [<8025b55c>] (handle_softirqs+0x140/0x458) [ 660.278552][ C0] [<8025b41c>] (handle_softirqs) from [<8025b9d0>] (__irq_exit_rcu+0x110/0x1d0) [ 660.278619][ C0] r10:00000000 r9:8281b500 r8:00000000 r7:82801dd8 r6:82443ff8 r5:8247f12c [ 660.278637][ C0] r4:8281b500 [ 660.278654][ C0] [<8025b8c0>] (__irq_exit_rcu) from [<8025bd48>] (irq_exit+0x10/0x18) [ 660.278709][ C0] r5:8247f12c r4:826c3a9c [ 660.278725][ C0] [<8025bd38>] (irq_exit) from [<81aad664>] (generic_handle_arch_irq+0x7c/0x80) [ 660.278783][ C0] [<81aad5e8>] (generic_handle_arch_irq) from [<80200bdc>] (__irq_svc+0x7c/0xbc) [ 660.278917][ C0] Exception stack(0x82801dd8 to 0x82801e20) [ 660.279100][ C0] 1dc0: 00000001 00000000 [ 660.279168][ C0] 1de0: 0000f8c3 0000f8c1 84078968 00000004 00000001 84078968 83eed688 84078840 [ 660.279207][ C0] 1e00: 00000000 82801e3c 82801e28 82801e28 81abbbcc 81abbc00 80000013 ffffffff [ 660.279279][ C0] r9:8281b500 r8:83eed688 r7:82801e0c r6:ffffffff r5:80000013 r4:81abbc00 [ 660.279303][ C0] [<81abbbb4>] (_raw_spin_lock) from [<809c776c>] (gpio_mmio_set+0x44/0x80) [ 660.279391][ C0] r5:00000004 r4:84078840 [ 660.279415][ C0] [<809c7728>] (gpio_mmio_set) from [<809b7f28>] (gpiochip_set+0x1c/0x44) [ 660.279490][ C0] r7:00000001 r6:00000000 r5:00000002 r4:84304628 [ 660.279509][ C0] [<809b7f0c>] (gpiochip_set) from [<809ba7f0>] (gpiod_set_raw_value_commit+0x78/0x218) [ 660.279569][ C0] [<809ba778>] (gpiod_set_raw_value_commit) from [<809bc090>] (gpiod_set_value_nocheck+0x44/0x58) [ 660.279646][ C0] r10:00000000 r9:00000000 r8:00000001 r7:dddce4c0 r6:83840118 r5:00000001 [ 660.279670][ C0] r4:84304628 [ 660.279691][ C0] [<809bc04c>] (gpiod_set_value_nocheck) from [<809bc0e0>] (gpiod_set_value+0x3c/0x88) [ 660.279738][ C0] [<809bc0a4>] (gpiod_set_value) from [<809cc87c>] (gpio_led_set+0x5c/0x60) [ 660.279794][ C0] r5:000000ff r4:84f08224 [ 660.279811][ C0] [<809cc820>] (gpio_led_set) from [<809ca1a4>] (led_set_brightness+0x84/0x90) [ 660.279862][ C0] r5:000000ff r4:84f08224 [ 660.279877][ C0] [<809ca120>] (led_set_brightness) from [<809cbd24>] (led_trigger_event+0x40/0x58) [ 660.279928][ C0] r5:000000ff r4:84f08224 [ 660.279947][ C0] [<809cbce4>] (led_trigger_event) from [<809cd380>] (ledtrig_cpu+0xac/0xf4) [ 660.280086][ C0] r7:dddce4c0 r6:00000002 r5:82b15cd8 r4:000001fd [ 660.280105][ C0] [<809cd2d4>] (ledtrig_cpu) from [<80227a38>] (arch_cpu_idle_exit+0x14/0x18) [ 660.280191][ C0] r9:00000000 r8:00000000 r7:8280c710 r6:8281b500 r5:8280c6d0 r4:00000000 [ 660.280212][ C0] [<80227a24>] (arch_cpu_idle_exit) from [<802b158c>] (do_idle+0x5c/0x2d8) [ 660.280276][ C0] [<802b1530>] (do_idle) from [<802b1b38>] (cpu_startup_entry+0x30/0x34) [ 660.280346][ C0] r10:8281aff4 r9:8280c680 r8:823bec00 r7:00000000 r6:deffc06c r5:828222e8 [ 660.280367][ C0] r4:000000ed [ 660.280413][ C0] [<802b1b08>] (cpu_startup_entry) from [<81aaf07c>] (kernel_init+0x0/0x138) [ 660.280489][ C0] [<81aaef9c>] (rest_init) from [<8260145c>] (start_kernel+0x844/0x860) [ 660.280596][ C0] [<82600c18>] (start_kernel) from [<00000000>] (0x0) [ 660.281364][ C0] Sending NMI from CPU 0 to CPUs 1: [ 660.282079][ C1] NMI backtrace for cpu 1 [ 660.282306][ C1] CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Not tainted syzkaller #0 PREEMPT [ 660.282362][ C1] Hardware name: ARM-Versatile Express [ 660.282384][ C1] PC is at _raw_spin_lock+0x40/0x58 [ 660.282461][ C1] LR is at _raw_spin_lock+0x18/0x58 [ 660.282493][ C1] pc : [<81abbbf4>] lr : [<81abbbcc>] psr: 80000113 [ 660.282517][ C1] sp : df805d68 ip : df805d68 fp : df805d7c [ 660.282536][ C1] r10: 81c05450 r9 : 84078840 r8 : 83eed688 [ 660.282554][ C1] r7 : 84078968 r6 : 00000000 r5 : 00000001 r4 : 84078968 [ 660.282591][ C1] r3 : 0000f8c1 r2 : 0000f8c2 r1 : 00000000 r0 : 00000001 [ 660.282617][ C1] Flags: Nzcv IRQs on FIQs on Mode SVC_32 ISA ARM Segment none [ 660.282654][ C1] Control: 30c5387d Table: 852df4c0 DAC: 00000000 [ 660.282676][ C1] Call trace: frame pointer underflow [ 660.282769][ C1] [<81abbbb4>] (_raw_spin_lock) from [<809c776c>] (gpio_mmio_set+0x44/0x80) [ 660.282857][ C1] r5:00000001 r4:84078840 [ 660.282880][ C1] [<809c7728>] (gpio_mmio_set) from [<809b7f28>] (gpiochip_set+0x1c/0x44) [ 660.282956][ C1] r7:00000000 r6:00000000 r5:00000000 r4:84304600 [ 660.282975][ C1] [<809b7f0c>] (gpiochip_set) from [<809ba7f0>] (gpiod_set_raw_value_commit+0x78/0x218) [ 660.283033][ C1] [<809ba778>] (gpiod_set_raw_value_commit) from [<809bc090>] (gpiod_set_value_nocheck+0x44/0x58) [ 660.283104][ C1] r10:81c05450 r9:df805ebc r8:00000102 r7:ffffe8c6 r6:0000000b r5:00000000 [ 660.283127][ C1] r4:84304600 [ 660.283146][ C1] [<809bc04c>] (gpiod_set_value_nocheck) from [<809bc0e0>] (gpiod_set_value+0x3c/0x88) [ 660.283213][ C1] [<809bc0a4>] (gpiod_set_value) from [<809cc87c>] (gpio_led_set+0x5c/0x60) [ 660.283277][ C1] r5:84f08044 r4:84f08044 [ 660.283299][ C1] [<809cc820>] (gpio_led_set) from [<809ca114>] (led_set_brightness_nosleep+0x38/0x44) [ 660.283354][ C1] r5:84f08044 r4:84b48a4c [ 660.283374][ C1] [<809ca0dc>] (led_set_brightness_nosleep) from [<809cd178>] (led_heartbeat_function+0x84/0x144) [ 660.283433][ C1] [<809cd0f4>] (led_heartbeat_function) from [<80326f70>] (call_timer_fn+0x30/0x220) [ 660.283506][ C1] r7:ffffe8c6 r6:809cd0f4 r5:84b48a4c r4:83216000 [ 660.283525][ C1] [<80326f40>] (call_timer_fn) from [<80327424>] (__run_timers+0x2c4/0x3f8) [ 660.283592][ C1] r9:df805ebc r8:ffffe8c6 r7:00000000 r6:809cd0f4 r5:dddd9f00 r4:84b48a4c [ 660.283612][ C1] [<80327160>] (__run_timers) from [<803275c0>] (run_timer_base+0x68/0x78) [ 660.283696][ C1] r10:83216000 r9:82804d80 r8:00000102 r7:00000001 r6:00000082 r5:00000002 [ 660.283720][ C1] r4:dddd9f00 [ 660.283736][ C1] [<80327558>] (run_timer_base) from [<803275ec>] (run_timer_softirq+0x1c/0x34) [ 660.283796][ C1] r4:82804084 [ 660.283813][ C1] [<803275d0>] (run_timer_softirq) from [<8025b55c>] (handle_softirqs+0x140/0x458) [ 660.283875][ C1] [<8025b41c>] (handle_softirqs) from [<8025b9d0>] (__irq_exit_rcu+0x110/0x1d0) [ 660.283946][ C1] r10:00000000 r9:83216000 r8:00000000 r7:df865e08 r6:82443ff8 r5:8247f12c [ 660.283972][ C1] r4:83216000 [ 660.284002][ C1] [<8025b8c0>] (__irq_exit_rcu) from [<8025bd48>] (irq_exit+0x10/0x18) [ 660.284064][ C1] r5:8247f12c r4:826c3a9c [ 660.284083][ C1] [<8025bd38>] (irq_exit) from [<81aad664>] (generic_handle_arch_irq+0x7c/0x80) [ 660.284147][ C1] [<81aad5e8>] (generic_handle_arch_irq) from [<81a7d614>] (call_with_stack+0x1c/0x20) [ 660.284230][ C1] r9:83216000 r8:83eed688 r7:df865e3c r6:ffffffff r5:60000013 r4:809c7f6c [ 660.284250][ C1] [<81a7d5f8>] (call_with_stack) from [<80200bec>] (__irq_svc+0x8c/0xbc) [ 660.284309][ C1] Exception stack(0xdf865e08 to 0xdf865e50) [ 660.284351][ C1] 5e00: e0325008 00000009 0000f8c1 00000000 e0325008 00000009 [ 660.284390][ C1] 5e20: 00000001 84078968 83eed688 84078840 00000000 df865e6c df865e58 df865e58 [ 660.284417][ C1] 5e40: 809c7f68 809c7f6c 60000013 ffffffff [ 660.284441][ C1] [<809c7f4c>] (gpio_mmio_write32) from [<809c778c>] (gpio_mmio_set+0x64/0x80) [ 660.284509][ C1] r5:00000008 r4:84078840 [ 660.284527][ C1] [<809c7728>] (gpio_mmio_set) from [<809b7f28>] (gpiochip_set+0x1c/0x44) [ 660.284596][ C1] r7:00000001 r6:00000000 r5:00000003 r4:8430463c [ 660.284614][ C1] [<809b7f0c>] (gpiochip_set) from [<809ba7f0>] (gpiod_set_raw_value_commit+0x78/0x218) [ 660.284666][ C1] [<809ba778>] (gpiod_set_raw_value_commit) from [<809bc090>] (gpiod_set_value_nocheck+0x44/0x58) [ 660.284727][ C1] r10:00000000 r9:00000000 r8:00000001 r7:ddde24c0 r6:83840218 r5:00000001 [ 660.284749][ C1] r4:8430463c [ 660.284763][ C1] [<809bc04c>] (gpiod_set_value_nocheck) from [<809bc0e0>] (gpiod_set_value+0x3c/0x88) [ 660.284812][ C1] [<809bc0a4>] (gpiod_set_value) from [<809cc87c>] (gpio_led_set+0x5c/0x60) [ 660.284869][ C1] r5:000000ff r4:84f08314 [ 660.284887][ C1] [<809cc820>] (gpio_led_set) from [<809ca1a4>] (led_set_brightness+0x84/0x90) [ 660.284939][ C1] r5:000000ff r4:84f08314 [ 660.284957][ C1] [<809ca120>] (led_set_brightness) from [<809cbd24>] (led_trigger_event+0x40/0x58) [ 660.285014][ C1] r5:000000ff r4:84f08314 [ 660.285059][ C1] [<809cbce4>] (led_trigger_event) from [<809cd380>] (ledtrig_cpu+0xac/0xf4) [ 660.285121][ C1] r7:ddde24c0 r6:00000002 r5:82b15cd8 r4:000000fe [ 660.285139][ C1] [<809cd2d4>] (ledtrig_cpu) from [<80227a38>] (arch_cpu_idle_exit+0x14/0x18) [ 660.285219][ C1] r9:00000000 r8:00000001 r7:8280c710 r6:83216000 r5:8280c6d0 r4:00000001 [ 660.285239][ C1] [<80227a24>] (arch_cpu_idle_exit) from [<802b158c>] (do_idle+0x5c/0x2d8) [ 660.285302][ C1] [<802b1530>] (do_idle) from [<802b1b38>] (cpu_startup_entry+0x30/0x34) [ 660.285376][ C1] r10:00000000 r9:414fc0f0 r8:80003000 r7:82a7b4a4 r6:83216000 r5:00000001 [ 660.285397][ C1] r4:00000092 [ 660.285413][ C1] [<802b1b08>] (cpu_startup_entry) from [<8022f360>] (secondary_start_kernel+0x128/0x194) [ 660.285478][ C1] [<8022f238>] (secondary_start_kernel) from [<80220094>] (__enable_mmu+0x0/0xc) [ 660.285555][ C1] r7:82a7b4a4 r6:30c0387d r5:00000000 r4:830b7bc0 [ 660.286513][ C0] Kernel panic - not syncing: softlockup: hung tasks [ 660.320545][ C0] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Tainted: G L syzkaller #0 PREEMPT [ 660.321007][ C0] Tainted: [L]=SOFTLOCKUP [ 660.321210][ C0] Hardware name: ARM-Versatile Express [ 660.321435][ C0] Call trace: [ 660.321696][ C0] [<80201a74>] (dump_backtrace) from [<80201b70>] (show_stack+0x18/0x1c) [ 660.322053][ C0] r7:82296540 r6:8281b500 r5:00000000 r4:822956f0 [ 660.322285][ C0] [<80201b58>] (show_stack) from [<8021ee08>] (dump_stack_lvl+0x54/0x7c) [ 660.322601][ C0] [<8021edb4>] (dump_stack_lvl) from [<8021ee48>] (dump_stack+0x18/0x1c) [ 660.322918][ C0] r5:00000000 r4:82a7bd14 [ 660.323085][ C0] [<8021ee30>] (dump_stack) from [<80202648>] (vpanic+0xe0/0x2e8) [ 660.323384][ C0] [<80202568>] (vpanic) from [<80202884>] (trace_suspend_resume+0x0/0xd8) [ 660.323684][ C0] r7:82ac27f8 [ 660.323820][ C0] [<80202850>] (panic) from [<80383ecc>] (watchdog_timer_fn+0x2dc/0x350) [ 660.324147][ C0] r3:00000001 r2:00004000 r1:82a7bd1c r0:82296540 [ 660.324369][ C0] [<80383bf0>] (watchdog_timer_fn) from [<80329b64>] (__hrtimer_run_queues+0x1c4/0x454) [ 660.324731][ C0] r10:8281b500 r9:00000000 r8:dddc7130 r7:80383bf0 r6:dddc7000 r5:dddc7040 [ 660.325007][ C0] r4:dddc75d8 [ 660.325181][ C0] [<803299a0>] (__hrtimer_run_queues) from [<8032b168>] (hrtimer_interrupt+0x148/0x2bc) [ 660.325541][ C0] r10:b6ffbc80 r9:dddc7180 r8:dddc7130 r7:00000099 r6:00000003 r5:20000193 [ 660.325808][ C0] r4:dddc7000 [ 660.325948][ C0] [<8032b020>] (hrtimer_interrupt) from [<813405f0>] (arch_timer_handler_virt+0x30/0x38) [ 660.326362][ C0] r10:81d0fc78 r9:8309e400 r8:00000000 r7:00000000 r6:00000000 r5:82498528 [ 660.326640][ C0] r4:8309de40 [ 660.326781][ C0] [<813405c0>] (arch_timer_handler_virt) from [<802ef9b4>] (handle_percpu_devid_irq+0x128/0x34c) [ 660.327161][ C0] [<802ef88c>] (handle_percpu_devid_irq) from [<802e8b44>] (handle_irq_desc+0x74/0x84) [ 660.327485][ C0] r10:00000001 r9:8281b500 r8:00000000 r7:df80a00c r6:826c2388 r5:df80a000 [ 660.327766][ C0] r4:8280cc44 [ 660.327916][ C0] [<802e8ad0>] (handle_irq_desc) from [<802e8bc0>] (generic_handle_domain_irq+0x18/0x1c) [ 660.328281][ C0] [<802e8ba8>] (generic_handle_domain_irq) from [<802012c8>] (gic_handle_irq+0x68/0x7c) [ 660.328626][ C0] [<80201260>] (gic_handle_irq) from [<81aad648>] (generic_handle_arch_irq+0x60/0x80) [ 660.328978][ C0] r7:82801b90 r6:82443ff8 r5:8247f12c r4:826c3a9c [ 660.329221][ C0] [<81aad5e8>] (generic_handle_arch_irq) from [<80200bdc>] (__irq_svc+0x7c/0xbc) [ 660.329554][ C0] Exception stack(0x82801b90 to 0x82801bd8) [ 660.329779][ C0] 1b80: ddddb488 830bf3b0 00000103 00003770 [ 660.330068][ C0] 1ba0: 830bf380 830bf3b0 82801cb8 ddddb488 04480f80 00000038 00000001 82801bec [ 660.330528][ C0] 1bc0: 82801bf0 82801be0 80346df4 81abba3c 60000113 ffffffff [ 660.330800][ C0] r9:8281b500 r8:04480f80 r7:82801bc4 r6:ffffffff r5:60000113 r4:81abba3c [ 660.331072][ C0] [<81abba14>] (_raw_spin_unlock_irq) from [<80346df4>] (tmigr_handle_remote_up+0x268/0x4b0) [ 660.331472][ C0] [<80346b8c>] (tmigr_handle_remote_up) from [<803450a4>] (__walk_groups_from+0x3c/0xe4) [ 660.331841][ C0] r10:8281b500 r9:8280c820 r8:80346b8c r7:82801cb8 r6:830bf380 r5:00000002 [ 660.332119][ C0] r4:830bf380 [ 660.332263][ C0] [<80345068>] (__walk_groups_from) from [<8034743c>] (tmigr_handle_remote+0xe8/0x108) [ 660.332639][ C0] r9:82804d80 r8:00000102 r7:00000001 r6:00000082 r5:00000002 r4:dddc7488 [ 660.332913][ C0] [<80347354>] (tmigr_handle_remote) from [<80327600>] (run_timer_softirq+0x30/0x34) [ 660.333288][ C0] r4:82804084 [ 660.333441][ C0] [<803275d0>] (run_timer_softirq) from [<8025b55c>] (handle_softirqs+0x140/0x458) [ 660.333797][ C0] [<8025b41c>] (handle_softirqs) from [<8025b9d0>] (__irq_exit_rcu+0x110/0x1d0) [ 660.334164][ C0] r10:00000000 r9:8281b500 r8:00000000 r7:82801dd8 r6:82443ff8 r5:8247f12c [ 660.334440][ C0] r4:8281b500 [ 660.334577][ C0] [<8025b8c0>] (__irq_exit_rcu) from [<8025bd48>] (irq_exit+0x10/0x18) [ 660.334893][ C0] r5:8247f12c r4:826c3a9c [ 660.335062][ C0] [<8025bd38>] (irq_exit) from [<81aad664>] (generic_handle_arch_irq+0x7c/0x80) [ 660.335411][ C0] [<81aad5e8>] (generic_handle_arch_irq) from [<80200bdc>] (__irq_svc+0x7c/0xbc) [ 660.335807][ C0] Exception stack(0x82801dd8 to 0x82801e20) [ 660.336029][ C0] 1dc0: 00000001 00000000 [ 660.336339][ C0] 1de0: 0000f8c3 0000f8c1 84078968 00000004 00000001 84078968 83eed688 84078840 [ 660.336588][ C0] 1e00: 00000000 82801e3c 82801e28 82801e28 81abbbcc 81abbc00 80000013 ffffffff [ 660.336842][ C0] r9:8281b500 r8:83eed688 r7:82801e0c r6:ffffffff r5:80000013 r4:81abbc00 [ 660.337079][ C0] [<81abbbb4>] (_raw_spin_lock) from [<809c776c>] (gpio_mmio_set+0x44/0x80) [ 660.337396][ C0] r5:00000004 r4:84078840 [ 660.337568][ C0] [<809c7728>] (gpio_mmio_set) from [<809b7f28>] (gpiochip_set+0x1c/0x44) [ 660.337889][ C0] r7:00000001 r6:00000000 r5:00000002 r4:84304628 [ 660.338108][ C0] [<809b7f0c>] (gpiochip_set) from [<809ba7f0>] (gpiod_set_raw_value_commit+0x78/0x218) [ 660.338458][ C0] [<809ba778>] (gpiod_set_raw_value_commit) from [<809bc090>] (gpiod_set_value_nocheck+0x44/0x58) [ 660.338838][ C0] r10:00000000 r9:00000000 r8:00000001 r7:dddce4c0 r6:83840118 r5:00000001 [ 660.339111][ C0] r4:84304628 [ 660.339252][ C0] [<809bc04c>] (gpiod_set_value_nocheck) from [<809bc0e0>] (gpiod_set_value+0x3c/0x88) [ 660.339594][ C0] [<809bc0a4>] (gpiod_set_value) from [<809cc87c>] (gpio_led_set+0x5c/0x60) [ 660.339916][ C0] r5:000000ff r4:84f08224 [ 660.340099][ C0] [<809cc820>] (gpio_led_set) from [<809ca1a4>] (led_set_brightness+0x84/0x90) [ 660.340437][ C0] r5:000000ff r4:84f08224 [ 660.340600][ C0] [<809ca120>] (led_set_brightness) from [<809cbd24>] (led_trigger_event+0x40/0x58) [ 660.340940][ C0] r5:000000ff r4:84f08224 [ 660.341134][ C0] [<809cbce4>] (led_trigger_event) from [<809cd380>] (ledtrig_cpu+0xac/0xf4) [ 660.341484][ C0] r7:dddce4c0 r6:00000002 r5:82b15cd8 r4:000001fd [ 660.341718][ C0] [<809cd2d4>] (ledtrig_cpu) from [<80227a38>] (arch_cpu_idle_exit+0x14/0x18) [ 660.342077][ C0] r9:00000000 r8:00000000 r7:8280c710 r6:8281b500 r5:8280c6d0 r4:00000000 [ 660.342372][ C0] [<80227a24>] (arch_cpu_idle_exit) from [<802b158c>] (do_idle+0x5c/0x2d8) [ 660.342686][ C0] [<802b1530>] (do_idle) from [<802b1b38>] (cpu_startup_entry+0x30/0x34) [ 660.343014][ C0] r10:8281aff4 r9:8280c680 r8:823bec00 r7:00000000 r6:deffc06c r5:828222e8 [ 660.343321][ C0] r4:000000ed [ 660.343466][ C0] [<802b1b08>] (cpu_startup_entry) from [<81aaf07c>] (kernel_init+0x0/0x138) [ 660.343818][ C0] [<81aaef9c>] (rest_init) from [<8260145c>] (start_kernel+0x844/0x860) [ 660.344160][ C0] [<82600c18>] (start_kernel) from [<00000000>] (0x0) [ 660.346936][ C0] Rebooting in 86400 seconds..