last executing test programs: 3.309557365s ago: executing program 1 (id=1611): r0 = syz_open_dev$sndctrl(&(0x7f0000001ac0), 0x3ff, 0x0) r1 = openat$sequencer(0xffffff9c, &(0x7f0000000080), 0x88801, 0x0) dup3(r1, r0, 0x0) write$UHID_CREATE2(r0, 0x0, 0x0) 3.015922602s ago: executing program 1 (id=1612): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='blkio.bfq.io_wait_time\x00', 0x26e1, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) sendmsg$TIPC_NL_PUBL_GET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 2.800402859s ago: executing program 1 (id=1618): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000540)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) dup(r1) 2.590592435s ago: executing program 1 (id=1621): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000680)={0xffffffffffffffff}) r1 = openat$mixer(0xffffff9c, &(0x7f0000000040), 0x28040, 0x0) ioctl$DMA_HEAP_IOCTL_ALLOC(r1, 0xc0184800, &(0x7f0000000000)={0x7, r0, 0x80000}) write$vhost_msg_v2(r2, 0x0, 0x0) 2.494304147s ago: executing program 1 (id=1623): mknodat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xdba3932fea9e1cf2, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) openat$userio(0xffffffffffffff9c, &(0x7f0000000000), 0x139440, 0x0) openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x20841, 0x0) 1.850920248s ago: executing program 1 (id=1628): mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000002080)='./file0\x00', &(0x7f00000020c0), 0x0, &(0x7f0000002100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) lremovexattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000180)=@known='system.posix_acl_default\x00') 456.354383ms ago: executing program 0 (id=1644): r0 = openat$nci(0xffffff9c, &(0x7f0000000000), 0x2, 0x0) close(r0) socket$nl_generic(0x10, 0x3, 0x10) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x3, {0xa, 0x4e22, 0x100, @private0, 0x8}}}, 0x38) 368.624234ms ago: executing program 0 (id=1645): r0 = openat$selinux_avc_hash_stats(0xffffff9c, &(0x7f0000000240), 0x0, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000c80)) getsockname$l2tp6(r0, 0x0, &(0x7f0000000040)) 249.253989ms ago: executing program 0 (id=1646): r0 = openat$pfkey(0xffffff9c, &(0x7f0000000040), 0x0, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) openat$iommufd(0xffffff9c, &(0x7f0000000000), 0x40000, 0x0) ioctl$IOMMU_IOAS_ALLOC(r0, 0x3b81, &(0x7f0000000080)={0xc}) 159.99554ms ago: executing program 0 (id=1647): r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$IOMMU_TEST_OP_ADD_RESERVED(r2, 0x3ba0, 0x0) 62.007272ms ago: executing program 0 (id=1648): r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/cpuinfo\x00', 0x0, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000006c0)) sendmsg$TIPC_NL_BEARER_ADD(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={0x0}, 0x1, 0x0, 0x0, 0x8001}, 0x40040) 0s ago: executing program 0 (id=1649): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto(r0, 0x0, 0x0, 0x20044844, &(0x7f0000000280)=@in6={0xa, 0x0, 0x0, @local, 0x1}, 0x80) r1 = fcntl$dupfd(r0, 0x0, r0) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), r1) kernel console output (not intermixed with test programs): [ 48.875955][ T29] audit: type=1400 audit(48.800:56): avc: denied { read write } for pid=3091 comm="sftp-server" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 48.879522][ T29] audit: type=1400 audit(48.800:57): avc: denied { open } for pid=3091 comm="sftp-server" path="/dev/null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 Warning: Permanently added '[localhost]:21910' (ED25519) to the list of known hosts. [ 62.759190][ T29] audit: type=1400 audit(62.670:58): avc: denied { name_bind } for pid=3094 comm="sshd-session" src=30000 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 64.732978][ T29] audit: type=1400 audit(64.650:59): avc: denied { execute } for pid=3095 comm="sh" name="syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 64.784947][ T29] audit: type=1400 audit(64.690:60): avc: denied { execute_no_trans } for pid=3095 comm="sh" path="/syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 67.993022][ T29] audit: type=1400 audit(67.910:61): avc: denied { mounton } for pid=3095 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=806 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 67.997428][ T29] audit: type=1400 audit(67.920:62): avc: denied { mount } for pid=3095 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 68.013199][ T3095] cgroup: Unknown subsys name 'net' [ 68.022453][ T29] audit: type=1400 audit(67.940:63): avc: denied { unmount } for pid=3095 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 68.207479][ T3095] cgroup: Unknown subsys name 'cpuset' [ 68.214387][ T3095] cgroup: Unknown subsys name 'hugetlb' [ 68.215391][ T3095] cgroup: Unknown subsys name 'rlimit' [ 68.401109][ T29] audit: type=1400 audit(68.320:64): avc: denied { setattr } for pid=3095 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 68.403134][ T29] audit: type=1400 audit(68.320:65): avc: denied { mounton } for pid=3095 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 68.405992][ T29] audit: type=1400 audit(68.330:66): avc: denied { mount } for pid=3095 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 68.562834][ T3097] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 68.565619][ T29] audit: type=1400 audit(68.490:67): avc: denied { relabelto } for pid=3097 comm="mkswap" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 68.571822][ T29] audit: type=1400 audit(68.490:68): avc: denied { write } for pid=3097 comm="mkswap" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 68.613241][ T29] audit: type=1400 audit(68.530:69): avc: denied { read } for pid=3095 comm="syz-executor" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 68.615642][ T29] audit: type=1400 audit(68.530:70): avc: denied { open } for pid=3095 comm="syz-executor" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 74.790103][ T3095] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 76.696293][ T29] audit: type=1400 audit(76.620:71): avc: denied { execmem } for pid=3098 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 76.762162][ T29] audit: type=1400 audit(76.680:72): avc: denied { read } for pid=3100 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 76.775501][ T29] audit: type=1400 audit(76.680:73): avc: denied { open } for pid=3100 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 76.779303][ T29] audit: type=1400 audit(76.700:74): avc: denied { mounton } for pid=3100 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 76.813378][ T29] audit: type=1400 audit(76.730:75): avc: denied { module_request } for pid=3100 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 76.891345][ T29] audit: type=1400 audit(76.810:76): avc: denied { sys_module } for pid=3100 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 77.361079][ T29] audit: type=1400 audit(77.280:77): avc: denied { ioctl } for pid=3100 comm="syz-executor" path="/dev/net/tun" dev="devtmpfs" ino=677 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 78.404895][ T3100] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 78.411311][ T3100] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 78.629470][ T3101] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 78.639046][ T3101] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 79.332197][ T3100] hsr_slave_0: entered promiscuous mode [ 79.339225][ T3100] hsr_slave_1: entered promiscuous mode [ 79.580644][ T3101] hsr_slave_0: entered promiscuous mode [ 79.582608][ T3101] hsr_slave_1: entered promiscuous mode [ 79.586201][ T3101] debugfs: 'hsr0' already exists in 'hsr' [ 79.588171][ T3101] Cannot create hsr debugfs directory [ 79.852513][ T29] audit: type=1400 audit(79.770:78): avc: denied { create } for pid=3100 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 79.858100][ T29] audit: type=1400 audit(79.780:79): avc: denied { write } for pid=3100 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 79.861465][ T29] audit: type=1400 audit(79.780:80): avc: denied { read } for pid=3100 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 79.895939][ T3100] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 79.919466][ T3100] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 79.932116][ T3100] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 79.940961][ T3100] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 80.088167][ T3101] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 80.102681][ T3101] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 80.116150][ T3101] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 80.128232][ T3101] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 80.810402][ T3100] 8021q: adding VLAN 0 to HW filter on device bond0 [ 80.918132][ T3101] 8021q: adding VLAN 0 to HW filter on device bond0 [ 83.812617][ T3100] veth0_vlan: entered promiscuous mode [ 83.859200][ T3101] veth0_vlan: entered promiscuous mode [ 83.867959][ T3100] veth1_vlan: entered promiscuous mode [ 83.897708][ T3101] veth1_vlan: entered promiscuous mode [ 83.977233][ T3100] veth0_macvtap: entered promiscuous mode [ 83.995667][ T3101] veth0_macvtap: entered promiscuous mode [ 84.001857][ T3100] veth1_macvtap: entered promiscuous mode [ 84.017564][ T3101] veth1_macvtap: entered promiscuous mode [ 84.111130][ T1277] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 84.114456][ T1277] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 84.114587][ T1277] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 84.114649][ T1277] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 84.145469][ T1944] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 84.145874][ T1944] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 84.145968][ T1944] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 84.146038][ T1944] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 84.214590][ T29] audit: type=1400 audit(84.120:81): avc: denied { mount } for pid=3100 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 84.214906][ T29] audit: type=1400 audit(84.120:82): avc: denied { mounton } for pid=3100 comm="syz-executor" path="/syzkaller.UrYJos/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 84.214977][ T29] audit: type=1400 audit(84.130:83): avc: denied { mount } for pid=3100 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 84.227756][ T29] audit: type=1400 audit(84.150:84): avc: denied { mounton } for pid=3100 comm="syz-executor" path="/syzkaller.UrYJos/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 84.256651][ T29] audit: type=1400 audit(84.180:85): avc: denied { mounton } for pid=3100 comm="syz-executor" path="/syzkaller.UrYJos/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=2427 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 84.302660][ T29] audit: type=1400 audit(84.210:86): avc: denied { unmount } for pid=3100 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 84.303198][ T29] audit: type=1400 audit(84.220:87): avc: denied { mounton } for pid=3100 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=772 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 84.303266][ T29] audit: type=1400 audit(84.220:88): avc: denied { mount } for pid=3100 comm="syz-executor" name="/" dev="gadgetfs" ino=956 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 84.311962][ T29] audit: type=1400 audit(84.230:89): avc: denied { mount } for pid=3100 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 84.335468][ T29] audit: type=1400 audit(84.260:90): avc: denied { mounton } for pid=3100 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 84.432628][ T3100] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 85.095941][ T3709] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3709 comm=syz.1.2 [ 86.467684][ T3749] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3749 comm=syz.1.21 [ 86.911074][ T3760] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3760 comm=syz.1.26 [ 87.975366][ T3785] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=3785 comm=syz.1.38 [ 88.060234][ T3787] Zero length message leads to an empty skb [ 89.555638][ T29] kauditd_printk_skb: 12 callbacks suppressed [ 89.556979][ T29] audit: type=1400 audit(89.480:103): avc: denied { ioctl } for pid=3836 comm="syz.0.64" path="socket:[3224]" dev="sockfs" ino=3224 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 89.868006][ T3845] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=5124 sclass=netlink_audit_socket pid=3845 comm=syz.0.68 [ 90.283201][ T3855] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5130 sclass=netlink_route_socket pid=3855 comm=syz.0.73 [ 90.366940][ T29] audit: type=1400 audit(90.290:104): avc: denied { associate } for pid=3856 comm="syz.0.74" name="pfkey" scontext=root:object_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 90.492848][ T29] audit: type=1400 audit(90.410:105): avc: denied { create } for pid=3859 comm="syz.1.75" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 90.997180][ T29] audit: type=1400 audit(90.920:106): avc: denied { write } for pid=3880 comm="syz.0.86" name="route" dev="proc" ino=4026532668 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 91.411311][ T29] audit: type=1400 audit(91.330:107): avc: denied { setopt } for pid=3896 comm="syz.1.94" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 92.086227][ T29] audit: type=1400 audit(92.010:108): avc: denied { append } for pid=3924 comm="syz.1.108" name="nbd1" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 92.182732][ T29] audit: type=1400 audit(92.100:109): avc: denied { create } for pid=3928 comm="syz.1.110" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 93.154298][ T29] audit: type=1400 audit(93.070:110): avc: denied { create } for pid=3966 comm="syz.1.129" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 93.171451][ T29] audit: type=1400 audit(93.090:111): avc: denied { ioctl } for pid=3966 comm="syz.1.129" path="socket:[2954]" dev="sockfs" ino=2954 ioctlcmd=0x8904 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 93.256568][ T3972] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3972 comm=syz.0.131 [ 93.279233][ T29] audit: type=1400 audit(93.190:112): avc: denied { ioctl } for pid=3971 comm="syz.1.132" path="socket:[3483]" dev="sockfs" ino=3483 ioctlcmd=0x9426 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 94.560798][ T4011] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4011 comm=syz.1.151 [ 97.890600][ T29] kauditd_printk_skb: 6 callbacks suppressed [ 97.892372][ T29] audit: type=1400 audit(97.810:119): avc: denied { append } for pid=4047 comm="syz.0.169" name="dlm-control" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 100.212524][ T29] audit: type=1400 audit(100.130:120): avc: denied { allowed } for pid=4060 comm="syz.1.175" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 100.225444][ T29] audit: type=1400 audit(100.140:121): avc: denied { create } for pid=4060 comm="syz.1.175" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 100.229366][ T29] audit: type=1400 audit(100.150:122): avc: denied { map } for pid=4060 comm="syz.1.175" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=3613 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 100.231181][ T29] audit: type=1400 audit(100.150:123): avc: denied { read write } for pid=4060 comm="syz.1.175" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=3613 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 100.684896][ T29] audit: type=1400 audit(100.600:124): avc: denied { read write } for pid=4062 comm="syz.0.176" name="binder-control" dev="binder" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 100.686328][ T29] audit: type=1400 audit(100.610:125): avc: denied { open } for pid=4062 comm="syz.0.176" path="/dev/binderfs/binder-control" dev="binder" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 101.328693][ T29] audit: type=1400 audit(101.250:126): avc: denied { setopt } for pid=4077 comm="syz.0.183" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 101.342634][ T29] audit: type=1400 audit(101.260:127): avc: denied { read } for pid=4077 comm="syz.0.183" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 103.532989][ T4105] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1041 sclass=netlink_route_socket pid=4105 comm=syz.1.196 [ 103.727378][ T29] audit: type=1400 audit(103.650:128): avc: denied { mounton } for pid=4108 comm="syz.1.198" path="/proc/222/task" dev="proc" ino=3680 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 103.839214][ T29] audit: type=1400 audit(103.760:129): avc: denied { watch } for pid=4110 comm="syz.1.199" path="/110/control" dev="tmpfs" ino=580 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 104.077677][ T4115] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4115 comm=syz.1.201 [ 104.142868][ T29] audit: type=1400 audit(104.060:130): avc: denied { create } for pid=4116 comm="syz.1.202" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 104.147863][ T29] audit: type=1400 audit(104.070:131): avc: denied { write } for pid=4116 comm="syz.1.202" path="socket:[4287]" dev="sockfs" ino=4287 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 104.524031][ T4131] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4131 comm=syz.1.209 [ 105.361128][ T4149] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4149 comm=syz.1.218 [ 105.521097][ T4153] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4153 comm=syz.1.220 [ 106.440449][ T4180] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=1280 sclass=netlink_tcpdiag_socket pid=4180 comm=syz.0.233 [ 108.069268][ T4227] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4227 comm=syz.1.256 [ 108.974708][ T29] audit: type=1400 audit(108.900:132): avc: denied { setopt } for pid=4254 comm="syz.1.269" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 110.840167][ T29] audit: type=1400 audit(110.760:133): avc: denied { write } for pid=4298 comm="syz.0.291" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 113.019088][ T4327] capability: warning: `syz.1.304' uses 32-bit capabilities (legacy support in use) [ 113.871554][ T29] audit: type=1400 audit(113.790:134): avc: denied { create } for pid=4346 comm="syz.1.314" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 113.887093][ T29] audit: type=1400 audit(113.810:135): avc: denied { getopt } for pid=4346 comm="syz.1.314" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 114.286824][ T29] audit: type=1400 audit(114.210:136): avc: denied { create } for pid=4356 comm="syz.1.319" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 114.299872][ T29] audit: type=1400 audit(114.220:137): avc: denied { setopt } for pid=4356 comm="syz.1.319" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 114.402771][ T29] audit: type=1400 audit(114.320:138): avc: denied { read } for pid=4358 comm="syz.1.320" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 114.445855][ T29] audit: type=1400 audit(114.370:139): avc: denied { map } for pid=4360 comm="syz.0.321" path="socket:[4028]" dev="sockfs" ino=4028 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tcp_socket permissive=1 [ 114.628091][ T29] audit: type=1400 audit(114.550:140): avc: denied { write } for pid=4364 comm="syz.0.323" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 117.647380][ T4414] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=515 sclass=netlink_audit_socket pid=4414 comm=syz.0.346 [ 117.740246][ T29] audit: type=1400 audit(117.660:141): avc: denied { write } for pid=4415 comm="syz.0.347" path="socket:[4924]" dev="sockfs" ino=4924 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 118.064912][ T4424] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4424 comm=syz.0.351 [ 118.155454][ T4426] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4426 comm=syz.1.352 [ 120.135112][ T3715] usb 1-1: new high-speed USB device number 2 using dummy_hcd [ 120.295602][ T3715] usb 1-1: Using ep0 maxpacket: 32 [ 120.309680][ T3715] usb 1-1: config 0 has an invalid interface number: 12 but max is 0 [ 120.309887][ T3715] usb 1-1: config 0 has no interface number 0 [ 120.310267][ T3715] usb 1-1: config 0 interface 12 has no altsetting 0 [ 120.326948][ T3715] usb 1-1: New USB device found, idVendor=2c42, idProduct=1202, bcdDevice=85.40 [ 120.327180][ T3715] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 120.327429][ T3715] usb 1-1: Product: syz [ 120.327571][ T3715] usb 1-1: Manufacturer: syz [ 120.327645][ T3715] usb 1-1: SerialNumber: syz [ 120.332631][ T3715] usb 1-1: config 0 descriptor?? [ 121.175842][ T3715] f81534 1-1:0.12: f81534_set_register: reg: 1002 data: 0 failed: -71 [ 121.176370][ T3715] f81534 1-1:0.12: f81534_find_config_idx: read failed: -71 [ 121.176459][ T3715] f81534 1-1:0.12: f81534_calc_num_ports: find idx failed: -71 [ 121.177214][ T3715] f81534 1-1:0.12: probe with driver f81534 failed with error -71 [ 121.207181][ T3715] usb 1-1: USB disconnect, device number 2 [ 122.428436][ T29] audit: type=1400 audit(122.350:142): avc: denied { unmount } for pid=3101 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 123.021444][ T4533] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4533 comm=syz.1.398 [ 123.740081][ T29] audit: type=1400 audit(123.660:143): avc: denied { bpf } for pid=4557 comm="syz.0.410" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 124.598311][ T4579] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4579 comm=syz.0.420 [ 125.678658][ T4603] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=263 sclass=netlink_route_socket pid=4603 comm=syz.0.432 [ 126.401004][ T29] audit: type=1400 audit(126.320:144): avc: denied { nlmsg_write } for pid=4627 comm="syz.0.444" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 126.569372][ T4637] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4637 comm=syz.1.449 [ 126.857835][ T29] audit: type=1400 audit(126.770:145): avc: denied { name_bind } for pid=4647 comm="syz.1.454" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 126.858101][ T29] audit: type=1400 audit(126.780:146): avc: denied { node_bind } for pid=4647 comm="syz.1.454" saddr=::ffff:172.20.20.13 src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 127.405127][ T29] audit: type=1400 audit(127.330:147): avc: denied { remount } for pid=4663 comm="syz.0.462" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 127.405800][ T4665] ======================================================= [ 127.405800][ T4665] WARNING: The mand mount option has been deprecated and [ 127.405800][ T4665] and is ignored by this kernel. Remove the mand [ 127.405800][ T4665] option from the mount to silence this warning. [ 127.405800][ T4665] ======================================================= [ 127.758845][ T29] audit: type=1400 audit(127.680:148): avc: denied { write } for pid=4678 comm="syz.0.469" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 128.562504][ T4709] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4709 comm=syz.0.484 [ 128.891813][ T29] audit: type=1400 audit(128.810:149): avc: denied { setopt } for pid=4720 comm="syz.0.490" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 129.370437][ T29] audit: type=1400 audit(129.280:150): avc: denied { read } for pid=4734 comm="syz.1.497" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 129.407965][ T4740] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4740 comm=syz.0.499 [ 129.513100][ T29] audit: type=1400 audit(129.430:151): avc: denied { ioctl } for pid=4742 comm="syz.0.501" path="socket:[6545]" dev="sockfs" ino=6545 ioctlcmd=0x8901 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 129.815328][ T29] audit: type=1400 audit(129.740:152): avc: denied { create } for pid=4757 comm="syz.0.508" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 129.896772][ T4760] faux_driver vgem: [drm] Unknown color mode 14; guessing buffer size. [ 129.956912][ T4764] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=5134 sclass=netlink_audit_socket pid=4764 comm=syz.1.511 [ 130.434543][ T4782] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=4782 comm=syz.0.520 [ 131.617971][ T29] audit: type=1400 audit(131.540:153): avc: denied { write } for pid=4801 comm="syz.1.530" path="socket:[6661]" dev="sockfs" ino=6661 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 131.963188][ T29] audit: type=1400 audit(131.880:154): avc: denied { bind } for pid=4809 comm="syz.1.534" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 132.088389][ T29] audit: type=1400 audit(132.010:155): avc: denied { read } for pid=4813 comm="syz.1.536" path="socket:[6692]" dev="sockfs" ino=6692 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 133.518574][ T29] audit: type=1400 audit(133.440:156): avc: denied { connect } for pid=4852 comm="syz.0.555" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 133.677237][ T4861] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=4861 comm=syz.1.559 [ 133.875353][ T4868] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=627 sclass=netlink_route_socket pid=4868 comm=syz.1.563 [ 134.503333][ T4889] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1795 sclass=netlink_route_socket pid=4889 comm=syz.0.573 [ 134.897907][ T29] audit: type=1400 audit(134.790:157): avc: denied { mount } for pid=4895 comm="syz.1.576" name="/" dev="configfs" ino=1090 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=filesystem permissive=1 [ 134.921913][ T29] audit: type=1400 audit(134.840:158): avc: denied { search } for pid=4895 comm="syz.1.576" name="/" dev="configfs" ino=1090 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=dir permissive=1 [ 135.381623][ T4905] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 135.397897][ T29] audit: type=1400 audit(135.320:159): avc: denied { ioctl } for pid=4904 comm="syz.0.580" path="socket:[6868]" dev="sockfs" ino=6868 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 136.109554][ T4913] input: syz0 as /devices/virtual/input/input3 [ 136.767021][ T4930] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4930 comm=syz.1.590 [ 137.000917][ T29] audit: type=1400 audit(136.920:160): avc: denied { bind } for pid=4938 comm="syz.0.595" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 137.004548][ T29] audit: type=1400 audit(136.920:161): avc: denied { node_bind } for pid=4938 comm="syz.0.595" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 [ 137.010216][ T29] audit: type=1400 audit(136.930:162): avc: denied { write } for pid=4938 comm="syz.0.595" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 137.348872][ T4952] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4952 comm=syz.1.601 [ 139.582008][ T5015] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5015 comm=syz.1.632 [ 139.826426][ T5024] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5024 comm=syz.1.637 [ 140.844753][ T5042] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5042 comm=syz.1.645 [ 140.916660][ T5045] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=262 sclass=netlink_route_socket pid=5045 comm=syz.0.647 [ 141.568608][ T5069] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5069 comm=syz.0.658 [ 142.725266][ T5096] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5096 comm=syz.0.671 [ 143.788909][ T29] audit: type=1400 audit(143.710:163): avc: denied { connect } for pid=5119 comm="syz.0.683" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 145.350682][ T5145] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5145 comm=syz.0.695 [ 151.822102][ T5264] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1281 sclass=netlink_route_socket pid=5264 comm=syz.1.752 [ 152.215425][ T29] audit: type=1400 audit(152.140:164): avc: denied { read write } for pid=5277 comm="syz.1.759" path="socket:[7540]" dev="sockfs" ino=7540 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 152.560626][ T5297] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=615 sclass=netlink_audit_socket pid=5297 comm=syz.0.769 [ 152.636450][ T29] audit: type=1400 audit(152.560:165): avc: denied { create } for pid=5301 comm="syz.1.772" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 152.642371][ T29] audit: type=1400 audit(152.560:166): avc: denied { read } for pid=5301 comm="syz.1.772" path="socket:[7586]" dev="sockfs" ino=7586 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 152.696736][ T5300] block nbd0: shutting down sockets [ 153.156785][ T29] audit: type=1400 audit(153.080:167): avc: denied { write } for pid=5301 comm="syz.1.772" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 153.159222][ T5314] netlink: 240 bytes leftover after parsing attributes in process `syz.1.772'. [ 162.809719][ T5450] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5450 comm=syz.0.840 [ 166.785837][ T5522] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5522 comm=syz.1.877 [ 172.473040][ T5603] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5603 comm=syz.1.917 [ 173.459762][ T5638] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5638 comm=syz.1.934 [ 178.587151][ T5699] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1795 sclass=netlink_route_socket pid=5699 comm=syz.1.967 [ 179.231567][ T5722] input: syz0 as /devices/virtual/input/input4 [ 179.256952][ T5719] block nbd1: shutting down sockets [ 179.962263][ T5749] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5749 comm=syz.0.986 [ 181.311679][ T5759] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1281 sclass=netlink_route_socket pid=5759 comm=syz.0.991 [ 184.083341][ T5806] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5806 comm=syz.1.1015 [ 191.612988][ T5929] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=5929 comm=syz.1.1075 [ 199.497394][ T6069] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=6069 comm=syz.0.1135 [ 200.316879][ T29] audit: type=1400 audit(200.240:168): avc: denied { getopt } for pid=6102 comm="syz.0.1152" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 202.238552][ T6150] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6150 comm=syz.1.1174 [ 204.098222][ T6186] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6186 comm=syz.1.1190 [ 205.644880][ T6244] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6244 comm=syz.0.1219 [ 207.528476][ T6292] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6292 comm=syz.0.1244 [ 208.299363][ T6304] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6304 comm=syz.1.1249 [ 208.362870][ T6306] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=6306 comm=syz.0.1250 [ 208.406672][ T29] audit: type=1400 audit(208.330:169): avc: denied { sqpoll } for pid=6307 comm="syz.1.1251" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 208.519736][ T29] audit: type=1400 audit(208.440:170): avc: denied { ioctl } for pid=6312 comm="syz.1.1254" path="socket:[12312]" dev="sockfs" ino=12312 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 210.686186][ T6366] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=6366 comm=syz.1.1284 [ 211.170229][ T6390] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2567 sclass=netlink_route_socket pid=6390 comm=syz.0.1291 [ 211.385241][ T6399] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=6399 comm=syz.1.1294 [ 212.050310][ T6428] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=6428 comm=syz.0.1313 [ 216.365522][ T6463] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=6463 comm=syz.0.1326 [ 217.634782][ T29] audit: type=1400 audit(217.550:171): avc: denied { create } for pid=6473 comm="syz.0.1332" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 217.640652][ T29] audit: type=1400 audit(217.560:172): avc: denied { write } for pid=6473 comm="syz.0.1332" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 220.820279][ T6520] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=6520 comm=syz.1.1354 [ 221.039115][ T29] audit: type=1400 audit(220.960:173): avc: denied { remount } for pid=6525 comm="syz.1.1359" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 221.386626][ T6542] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=6542 comm=syz.1.1365 [ 225.598087][ T6590] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=6590 comm=syz.1.1388 [ 225.864513][ T6602] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=6602 comm=syz.0.1394 [ 226.292051][ T6619] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=6619 comm=syz.0.1401 [ 226.630356][ T29] audit: type=1400 audit(226.550:174): avc: denied { audit_write } for pid=6630 comm="syz.1.1409" capability=29 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 227.540913][ T6654] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1537 sclass=netlink_route_socket pid=6654 comm=syz.0.1420 [ 231.582691][ T29] audit: type=1400 audit(231.500:175): avc: denied { setattr } for pid=6699 comm="syz.1.1441" name="RAWv6" dev="sockfs" ino=13037 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 233.695149][ T6785] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=6785 comm=syz.0.1480 [ 234.077361][ T29] audit: type=1400 audit(234.000:176): avc: denied { ioctl } for pid=6801 comm="syz.0.1489" path="socket:[13456]" dev="sockfs" ino=13456 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 239.790434][ T6865] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=6865 comm=syz.1.1518 [ 240.036474][ T6877] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=6877 comm=syz.1.1525 [ 241.265703][ T6929] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=6929 comm=syz.0.1553 [ 242.679821][ T6967] capability: warning: `syz.0.1568' uses deprecated v2 capabilities in a way that may be insecure [ 247.372266][ T7111] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=7111 comm=syz.0.1638 [ 660.244410][ C0] watchdog: BUG: soft lockup - CPU#0 stuck for 430s! [swapper/0:0] [ 660.244773][ C0] Modules linked in: [ 660.246242][ C0] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Tainted: G L syzkaller #0 PREEMPT [ 660.246639][ C0] Tainted: [L]=SOFTLOCKUP [ 660.246971][ C0] Hardware name: ARM-Versatile Express [ 660.247205][ C0] PC is at _raw_spin_unlock_irq+0x28/0x54 [ 660.248293][ C0] LR is at tmigr_handle_remote_up+0x218/0x4b0 [ 660.248360][ C0] pc : [<81abba3c>] lr : [<80346da4>] psr: 60000113 [ 660.248407][ C0] sp : 82801be0 ip : 82801bf0 fp : 82801bec [ 660.248448][ C0] r10: 00000001 r9 : 8280c9a4 r8 : 00000001 [ 660.248494][ C0] r7 : ddddb488 r6 : 82801cb8 r5 : 830bf3b0 r4 : 830bf380 [ 660.248542][ C0] r3 : 00009ef2 r2 : ffffffff r1 : 00000000 r0 : ddddb488 [ 660.248673][ C0] Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment user [ 660.248753][ C0] Control: 30c5387d Table: 85d57380 DAC: fffffffd [ 660.248865][ C0] Call trace: [ 660.249135][ C0] [<81abba14>] (_raw_spin_unlock_irq) from [<80346da4>] (tmigr_handle_remote_up+0x218/0x4b0) [ 660.249576][ C0] [<80346b8c>] (tmigr_handle_remote_up) from [<803450a4>] (__walk_groups_from+0x3c/0xe4) [ 660.249729][ C0] r10:8281b500 r9:8280c820 r8:80346b8c r7:82801cb8 r6:830bf380 r5:00000002 [ 660.249812][ C0] r4:830bf380 [ 660.249846][ C0] [<80345068>] (__walk_groups_from) from [<8034743c>] (tmigr_handle_remote+0xe8/0x108) [ 660.249938][ C0] r9:82804d80 r8:00000102 r7:00000001 r6:00000002 r5:00000002 r4:dddc7488 [ 660.249965][ C0] [<80347354>] (tmigr_handle_remote) from [<80327600>] (run_timer_softirq+0x30/0x34) [ 660.250039][ C0] r4:82804084 [ 660.250059][ C0] [<803275d0>] (run_timer_softirq) from [<8025b55c>] (handle_softirqs+0x140/0x458) [ 660.250130][ C0] [<8025b41c>] (handle_softirqs) from [<8025b9d0>] (__irq_exit_rcu+0x110/0x1d0) [ 660.250201][ C0] r10:00000000 r9:8281b500 r8:00000000 r7:82801dd8 r6:82443ff8 r5:8247f12c [ 660.250226][ C0] r4:8281b500 [ 660.250245][ C0] [<8025b8c0>] (__irq_exit_rcu) from [<8025bd48>] (irq_exit+0x10/0x18) [ 660.250309][ C0] r5:8247f12c r4:826c3a9c [ 660.250331][ C0] [<8025bd38>] (irq_exit) from [<81aad664>] (generic_handle_arch_irq+0x7c/0x80) [ 660.250407][ C0] [<81aad5e8>] (generic_handle_arch_irq) from [<80200bdc>] (__irq_svc+0x7c/0xbc) [ 660.250562][ C0] Exception stack(0x82801dd8 to 0x82801e20) [ 660.250808][ C0] 1dc0: 00000001 00000000 [ 660.250870][ C0] 1de0: 000037ee 000037ec 84193b68 00000004 00000001 84193b68 83ea4a88 84193a40 [ 660.250916][ C0] 1e00: 00000000 82801e3c 82801e28 82801e28 81abbbcc 81abbc00 80000013 ffffffff [ 660.250996][ C0] r9:8281b500 r8:83ea4a88 r7:82801e0c r6:ffffffff r5:80000013 r4:81abbc00 [ 660.251019][ C0] [<81abbbb4>] (_raw_spin_lock) from [<809c776c>] (gpio_mmio_set+0x44/0x80) [ 660.251095][ C0] r5:00000004 r4:84193a40 [ 660.251114][ C0] [<809c7728>] (gpio_mmio_set) from [<809b7f28>] (gpiochip_set+0x1c/0x44) [ 660.251190][ C0] r7:00000001 r6:00000000 r5:00000002 r4:8403a268 [ 660.251209][ C0] [<809b7f0c>] (gpiochip_set) from [<809ba7f0>] (gpiod_set_raw_value_commit+0x78/0x218) [ 660.251267][ C0] [<809ba778>] (gpiod_set_raw_value_commit) from [<809bc090>] (gpiod_set_value_nocheck+0x44/0x58) [ 660.251333][ C0] r10:00000000 r9:00000000 r8:00000001 r7:dddce4c0 r6:838bf0d8 r5:00000001 [ 660.251359][ C0] r4:8403a268 [ 660.251379][ C0] [<809bc04c>] (gpiod_set_value_nocheck) from [<809bc0e0>] (gpiod_set_value+0x3c/0x88) [ 660.251440][ C0] [<809bc0a4>] (gpiod_set_value) from [<809cc87c>] (gpio_led_set+0x5c/0x60) [ 660.251501][ C0] r5:000000ff r4:8447c224 [ 660.251521][ C0] [<809cc820>] (gpio_led_set) from [<809ca1a4>] (led_set_brightness+0x84/0x90) [ 660.251583][ C0] r5:000000ff r4:8447c224 [ 660.251603][ C0] [<809ca120>] (led_set_brightness) from [<809cbd24>] (led_trigger_event+0x40/0x58) [ 660.251678][ C0] r5:000000ff r4:8447c224 [ 660.251700][ C0] [<809cbce4>] (led_trigger_event) from [<809cd380>] (ledtrig_cpu+0xac/0xf4) [ 660.251769][ C0] r7:dddce4c0 r6:00000002 r5:82b15cd8 r4:000001fd [ 660.251789][ C0] [<809cd2d4>] (ledtrig_cpu) from [<80227a38>] (arch_cpu_idle_exit+0x14/0x18) [ 660.251867][ C0] r9:00000000 r8:00000000 r7:8280c710 r6:8281b500 r5:8280c6d0 r4:00000000 [ 660.251890][ C0] [<80227a24>] (arch_cpu_idle_exit) from [<802b158c>] (do_idle+0x5c/0x2d8) [ 660.251964][ C0] [<802b1530>] (do_idle) from [<802b1b38>] (cpu_startup_entry+0x30/0x34) [ 660.252047][ C0] r10:8281aff4 r9:8280c680 r8:823bec00 r7:00000000 r6:deffc06c r5:828222e8 [ 660.252073][ C0] r4:000000ed [ 660.252093][ C0] [<802b1b08>] (cpu_startup_entry) from [<81aaf07c>] (kernel_init+0x0/0x138) [ 660.252176][ C0] [<81aaef9c>] (rest_init) from [<8260145c>] (start_kernel+0x844/0x860) [ 660.252291][ C0] [<82600c18>] (start_kernel) from [<00000000>] (0x0) [ 660.253143][ C0] Sending NMI from CPU 0 to CPUs 1: [ 660.254125][ C1] NMI backtrace for cpu 1 [ 660.254379][ C1] CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Tainted: G L syzkaller #0 PREEMPT [ 660.254443][ C1] Tainted: [L]=SOFTLOCKUP [ 660.254462][ C1] Hardware name: ARM-Versatile Express [ 660.254505][ C1] PC is at _raw_spin_lock+0x4c/0x58 [ 660.254586][ C1] LR is at _raw_spin_lock+0x18/0x58 [ 660.254621][ C1] pc : [<81abbc00>] lr : [<81abbbcc>] psr: 80000113 [ 660.254649][ C1] sp : df805d68 ip : df805d68 fp : df805d7c [ 660.254670][ C1] r10: 81c05450 r9 : 84193a40 r8 : 83ea4a88 [ 660.254693][ C1] r7 : 84193b68 r6 : 00000001 r5 : 00000001 r4 : 84193b68 [ 660.254717][ C1] r3 : 000037ec r2 : 000037ed r1 : 00000000 r0 : 00000001 [ 660.254761][ C1] Flags: Nzcv IRQs on FIQs on Mode SVC_32 ISA ARM Segment none [ 660.254801][ C1] Control: 30c5387d Table: 85263200 DAC: 00000000 [ 660.254822][ C1] Call trace: frame pointer underflow [ 660.254926][ C1] [<81abbbb4>] (_raw_spin_lock) from [<809c776c>] (gpio_mmio_set+0x44/0x80) [ 660.255016][ C1] r5:00000001 r4:84193a40 [ 660.255038][ C1] [<809c7728>] (gpio_mmio_set) from [<809b7f28>] (gpiochip_set+0x1c/0x44) [ 660.255109][ C1] r7:00000001 r6:00000000 r5:00000000 r4:8403a240 [ 660.255132][ C1] [<809b7f0c>] (gpiochip_set) from [<809ba7f0>] (gpiod_set_raw_value_commit+0x78/0x218) [ 660.255194][ C1] [<809ba778>] (gpiod_set_raw_value_commit) from [<809bc090>] (gpiod_set_value_nocheck+0x44/0x58) [ 660.255273][ C1] r10:81c05450 r9:df805ebc r8:00000102 r7:ffffec36 r6:00000007 r5:00000001 [ 660.255294][ C1] r4:8403a240 [ 660.255312][ C1] [<809bc04c>] (gpiod_set_value_nocheck) from [<809bc0e0>] (gpiod_set_value+0x3c/0x88) [ 660.255363][ C1] [<809bc0a4>] (gpiod_set_value) from [<809cc87c>] (gpio_led_set+0x5c/0x60) [ 660.255422][ C1] r5:8447c044 r4:8447c044 [ 660.255439][ C1] [<809cc820>] (gpio_led_set) from [<809ca114>] (led_set_brightness_nosleep+0x38/0x44) [ 660.255497][ C1] r5:8447c044 r4:84c0018c [ 660.255515][ C1] [<809ca0dc>] (led_set_brightness_nosleep) from [<809cd178>] (led_heartbeat_function+0x84/0x144) [ 660.255568][ C1] [<809cd0f4>] (led_heartbeat_function) from [<80326f70>] (call_timer_fn+0x30/0x220) [ 660.255637][ C1] r7:ffffec36 r6:809cd0f4 r5:84c0018c r4:83216000 [ 660.255655][ C1] [<80326f40>] (call_timer_fn) from [<80327424>] (__run_timers+0x2c4/0x3f8) [ 660.255735][ C1] r9:df805ebc r8:ffffec36 r7:00000000 r6:809cd0f4 r5:dddd9f00 r4:84c0018c [ 660.255758][ C1] [<80327160>] (__run_timers) from [<803275c0>] (run_timer_base+0x68/0x78) [ 660.255827][ C1] r10:83216000 r9:82804d80 r8:00000102 r7:00000001 r6:00000082 r5:00000002 [ 660.255849][ C1] r4:dddd9f00 [ 660.255867][ C1] [<80327558>] (run_timer_base) from [<803275ec>] (run_timer_softirq+0x1c/0x34) [ 660.255924][ C1] r4:82804084 [ 660.255942][ C1] [<803275d0>] (run_timer_softirq) from [<8025b55c>] (handle_softirqs+0x140/0x458) [ 660.256002][ C1] [<8025b41c>] (handle_softirqs) from [<8025b9d0>] (__irq_exit_rcu+0x110/0x1d0) [ 660.256073][ C1] r10:00000000 r9:83216000 r8:00000000 r7:df865e08 r6:82443ff8 r5:8247f12c [ 660.256095][ C1] r4:83216000 [ 660.256111][ C1] [<8025b8c0>] (__irq_exit_rcu) from [<8025bd48>] (irq_exit+0x10/0x18) [ 660.256169][ C1] r5:8247f12c r4:826c3a9c [ 660.256186][ C1] [<8025bd38>] (irq_exit) from [<81aad664>] (generic_handle_arch_irq+0x7c/0x80) [ 660.256249][ C1] [<81aad5e8>] (generic_handle_arch_irq) from [<81a7d614>] (call_with_stack+0x1c/0x20) [ 660.256324][ C1] r9:83216000 r8:83ea4a88 r7:df865e3c r6:ffffffff r5:80000013 r4:81abbbf4 [ 660.256344][ C1] [<81a7d5f8>] (call_with_stack) from [<80200bec>] (__irq_svc+0x8c/0xbc) [ 660.256400][ C1] Exception stack(0xdf865e08 to 0xdf865e50) [ 660.256443][ C1] 5e00: 00000001 00000000 000037ec 000037eb 84193b68 00000008 [ 660.256480][ C1] 5e20: 00000001 84193b68 83ea4a88 84193a40 00000000 df865e6c df865e58 df865e58 [ 660.256510][ C1] 5e40: 81abbbcc 81abbbf4 80000013 ffffffff [ 660.256531][ C1] [<81abbbb4>] (_raw_spin_lock) from [<809c776c>] (gpio_mmio_set+0x44/0x80) [ 660.256602][ C1] r5:00000008 r4:84193a40 [ 660.256623][ C1] [<809c7728>] (gpio_mmio_set) from [<809b7f28>] (gpiochip_set+0x1c/0x44) [ 660.256697][ C1] r7:00000001 r6:00000000 r5:00000003 r4:8403a27c [ 660.256715][ C1] [<809b7f0c>] (gpiochip_set) from [<809ba7f0>] (gpiod_set_raw_value_commit+0x78/0x218) [ 660.256782][ C1] [<809ba778>] (gpiod_set_raw_value_commit) from [<809bc090>] (gpiod_set_value_nocheck+0x44/0x58) [ 660.256852][ C1] r10:00000000 r9:00000000 r8:00000001 r7:ddde24c0 r6:838bf118 r5:00000001 [ 660.256874][ C1] r4:8403a27c [ 660.256890][ C1] [<809bc04c>] (gpiod_set_value_nocheck) from [<809bc0e0>] (gpiod_set_value+0x3c/0x88) [ 660.256938][ C1] [<809bc0a4>] (gpiod_set_value) from [<809cc87c>] (gpio_led_set+0x5c/0x60) [ 660.256994][ C1] r5:000000ff r4:8447c314 [ 660.257012][ C1] [<809cc820>] (gpio_led_set) from [<809ca1a4>] (led_set_brightness+0x84/0x90) [ 660.257066][ C1] r5:000000ff r4:8447c314 [ 660.257083][ C1] [<809ca120>] (led_set_brightness) from [<809cbd24>] (led_trigger_event+0x40/0x58) [ 660.257138][ C1] r5:000000ff r4:8447c314 [ 660.257156][ C1] [<809cbce4>] (led_trigger_event) from [<809cd380>] (ledtrig_cpu+0xac/0xf4) [ 660.257215][ C1] r7:ddde24c0 r6:00000002 r5:82b15cd8 r4:000000fe [ 660.257234][ C1] [<809cd2d4>] (ledtrig_cpu) from [<80227a38>] (arch_cpu_idle_exit+0x14/0x18) [ 660.257305][ C1] r9:00000000 r8:00000001 r7:8280c710 r6:83216000 r5:8280c6d0 r4:00000001 [ 660.257361][ C1] [<80227a24>] (arch_cpu_idle_exit) from [<802b158c>] (do_idle+0x5c/0x2d8) [ 660.257433][ C1] [<802b1530>] (do_idle) from [<802b1b38>] (cpu_startup_entry+0x30/0x34) [ 660.257511][ C1] r10:00000000 r9:414fc0f0 r8:80003000 r7:82a7b4a4 r6:83216000 r5:00000001 [ 660.257534][ C1] r4:00000092 [ 660.257550][ C1] [<802b1b08>] (cpu_startup_entry) from [<8022f360>] (secondary_start_kernel+0x128/0x194) [ 660.257615][ C1] [<8022f238>] (secondary_start_kernel) from [<80220094>] (__enable_mmu+0x0/0xc) [ 660.257689][ C1] r7:82a7b4a4 r6:30c0387d r5:00000000 r4:830b7bc0 [ 660.259513][ C0] Kernel panic - not syncing: softlockup: hung tasks [ 660.297933][ C0] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Tainted: G L syzkaller #0 PREEMPT [ 660.298378][ C0] Tainted: [L]=SOFTLOCKUP [ 660.298569][ C0] Hardware name: ARM-Versatile Express [ 660.298902][ C0] Call trace: [ 660.299238][ C0] [<80201a74>] (dump_backtrace) from [<80201b70>] (show_stack+0x18/0x1c) [ 660.299672][ C0] r7:82296540 r6:8281b500 r5:00000000 r4:822956f0 [ 660.299959][ C0] [<80201b58>] (show_stack) from [<8021ee08>] (dump_stack_lvl+0x54/0x7c) [ 660.300341][ C0] [<8021edb4>] (dump_stack_lvl) from [<8021ee48>] (dump_stack+0x18/0x1c) [ 660.300769][ C0] r5:00000000 r4:82a7bd14 [ 660.300973][ C0] [<8021ee30>] (dump_stack) from [<80202648>] (vpanic+0xe0/0x2e8) [ 660.301377][ C0] [<80202568>] (vpanic) from [<80202884>] (trace_suspend_resume+0x0/0xd8) [ 660.301770][ C0] r7:82ac27f8 [ 660.301953][ C0] [<80202850>] (panic) from [<80383ecc>] (watchdog_timer_fn+0x2dc/0x350) [ 660.302344][ C0] r3:00000001 r2:00004000 r1:82a7bd1c r0:82296540 [ 660.302603][ C0] [<80383bf0>] (watchdog_timer_fn) from [<80329b64>] (__hrtimer_run_queues+0x1c4/0x454) [ 660.303011][ C0] r10:8281b500 r9:00000000 r8:dddc7130 r7:80383bf0 r6:dddc7000 r5:dddc7040 [ 660.303308][ C0] r4:dddc75d8 [ 660.303468][ C0] [<803299a0>] (__hrtimer_run_queues) from [<8032b168>] (hrtimer_interrupt+0x148/0x2bc) [ 660.303925][ C0] r10:b535d8e0 r9:dddc7180 r8:dddc7130 r7:00000099 r6:00000003 r5:20000193 [ 660.304270][ C0] r4:dddc7000 [ 660.304458][ C0] [<8032b020>] (hrtimer_interrupt) from [<813405f0>] (arch_timer_handler_virt+0x30/0x38) [ 660.304899][ C0] r10:81d0fc78 r9:8309e400 r8:00000000 r7:00000000 r6:00000000 r5:82498528 [ 660.305249][ C0] r4:8309de40 [ 660.305475][ C0] [<813405c0>] (arch_timer_handler_virt) from [<802ef9b4>] (handle_percpu_devid_irq+0x128/0x34c) [ 660.305936][ C0] [<802ef88c>] (handle_percpu_devid_irq) from [<802e8b44>] (handle_irq_desc+0x74/0x84) [ 660.306406][ C0] r10:00000001 r9:8281b500 r8:00000000 r7:df80a00c r6:826c2388 r5:df80a000 [ 660.306762][ C0] r4:8280cc44 [ 660.306950][ C0] [<802e8ad0>] (handle_irq_desc) from [<802e8bc0>] (generic_handle_domain_irq+0x18/0x1c) [ 660.307336][ C0] [<802e8ba8>] (generic_handle_domain_irq) from [<802012c8>] (gic_handle_irq+0x68/0x7c) [ 660.307690][ C0] [<80201260>] (gic_handle_irq) from [<81aad648>] (generic_handle_arch_irq+0x60/0x80) [ 660.308110][ C0] r7:82801b90 r6:82443ff8 r5:8247f12c r4:826c3a9c [ 660.308374][ C0] [<81aad5e8>] (generic_handle_arch_irq) from [<80200bdc>] (__irq_svc+0x7c/0xbc) [ 660.308765][ C0] Exception stack(0x82801b90 to 0x82801bd8) [ 660.309015][ C0] 1b80: ddddb488 00000000 ffffffff 00009ef2 [ 660.309383][ C0] 1ba0: 830bf380 830bf3b0 82801cb8 ddddb488 00000001 8280c9a4 00000001 82801bec [ 660.309722][ C0] 1bc0: 82801bf0 82801be0 80346da4 81abba3c 60000113 ffffffff [ 660.310013][ C0] r9:8281b500 r8:00000001 r7:82801bc4 r6:ffffffff r5:60000113 r4:81abba3c [ 660.310326][ C0] [<81abba14>] (_raw_spin_unlock_irq) from [<80346da4>] (tmigr_handle_remote_up+0x218/0x4b0) [ 660.310746][ C0] [<80346b8c>] (tmigr_handle_remote_up) from [<803450a4>] (__walk_groups_from+0x3c/0xe4) [ 660.311162][ C0] r10:8281b500 r9:8280c820 r8:80346b8c r7:82801cb8 r6:830bf380 r5:00000002 [ 660.311477][ C0] r4:830bf380 [ 660.311650][ C0] [<80345068>] (__walk_groups_from) from [<8034743c>] (tmigr_handle_remote+0xe8/0x108) [ 660.312078][ C0] r9:82804d80 r8:00000102 r7:00000001 r6:00000002 r5:00000002 r4:dddc7488 [ 660.312388][ C0] [<80347354>] (tmigr_handle_remote) from [<80327600>] (run_timer_softirq+0x30/0x34) [ 660.312811][ C0] r4:82804084 [ 660.312979][ C0] [<803275d0>] (run_timer_softirq) from [<8025b55c>] (handle_softirqs+0x140/0x458) [ 660.313410][ C0] [<8025b41c>] (handle_softirqs) from [<8025b9d0>] (__irq_exit_rcu+0x110/0x1d0) [ 660.313847][ C0] r10:00000000 r9:8281b500 r8:00000000 r7:82801dd8 r6:82443ff8 r5:8247f12c [ 660.314163][ C0] r4:8281b500 [ 660.314326][ C0] [<8025b8c0>] (__irq_exit_rcu) from [<8025bd48>] (irq_exit+0x10/0x18) [ 660.314687][ C0] r5:8247f12c r4:826c3a9c [ 660.314894][ C0] [<8025bd38>] (irq_exit) from [<81aad664>] (generic_handle_arch_irq+0x7c/0x80) [ 660.315277][ C0] [<81aad5e8>] (generic_handle_arch_irq) from [<80200bdc>] (__irq_svc+0x7c/0xbc) [ 660.315655][ C0] Exception stack(0x82801dd8 to 0x82801e20) [ 660.315925][ C0] 1dc0: 00000001 00000000 [ 660.316266][ C0] 1de0: 000037ee 000037ec 84193b68 00000004 00000001 84193b68 83ea4a88 84193a40 [ 660.316607][ C0] 1e00: 00000000 82801e3c 82801e28 82801e28 81abbbcc 81abbc00 80000013 ffffffff [ 660.316910][ C0] r9:8281b500 r8:83ea4a88 r7:82801e0c r6:ffffffff r5:80000013 r4:81abbc00 [ 660.317219][ C0] [<81abbbb4>] (_raw_spin_lock) from [<809c776c>] (gpio_mmio_set+0x44/0x80) [ 660.317647][ C0] r5:00000004 r4:84193a40 [ 660.317832][ C0] [<809c7728>] (gpio_mmio_set) from [<809b7f28>] (gpiochip_set+0x1c/0x44) [ 660.318207][ C0] r7:00000001 r6:00000000 r5:00000002 r4:8403a268 [ 660.318472][ C0] [<809b7f0c>] (gpiochip_set) from [<809ba7f0>] (gpiod_set_raw_value_commit+0x78/0x218) [ 660.318876][ C0] [<809ba778>] (gpiod_set_raw_value_commit) from [<809bc090>] (gpiod_set_value_nocheck+0x44/0x58) [ 660.319318][ C0] r10:00000000 r9:00000000 r8:00000001 r7:dddce4c0 r6:838bf0d8 r5:00000001 [ 660.319636][ C0] r4:8403a268 [ 660.319810][ C0] [<809bc04c>] (gpiod_set_value_nocheck) from [<809bc0e0>] (gpiod_set_value+0x3c/0x88) [ 660.320147][ C0] [<809bc0a4>] (gpiod_set_value) from [<809cc87c>] (gpio_led_set+0x5c/0x60) [ 660.320451][ C0] r5:000000ff r4:8447c224 [ 660.320622][ C0] [<809cc820>] (gpio_led_set) from [<809ca1a4>] (led_set_brightness+0x84/0x90) [ 660.320963][ C0] r5:000000ff r4:8447c224 [ 660.321128][ C0] [<809ca120>] (led_set_brightness) from [<809cbd24>] (led_trigger_event+0x40/0x58) [ 660.321533][ C0] r5:000000ff r4:8447c224 [ 660.321748][ C0] [<809cbce4>] (led_trigger_event) from [<809cd380>] (ledtrig_cpu+0xac/0xf4) [ 660.322129][ C0] r7:dddce4c0 r6:00000002 r5:82b15cd8 r4:000001fd [ 660.322386][ C0] [<809cd2d4>] (ledtrig_cpu) from [<80227a38>] (arch_cpu_idle_exit+0x14/0x18) [ 660.322816][ C0] r9:00000000 r8:00000000 r7:8280c710 r6:8281b500 r5:8280c6d0 r4:00000000 [ 660.323126][ C0] [<80227a24>] (arch_cpu_idle_exit) from [<802b158c>] (do_idle+0x5c/0x2d8) [ 660.323505][ C0] [<802b1530>] (do_idle) from [<802b1b38>] (cpu_startup_entry+0x30/0x34) [ 660.323880][ C0] r10:8281aff4 r9:8280c680 r8:823bec00 r7:00000000 r6:deffc06c r5:828222e8 [ 660.324201][ C0] r4:000000ed [ 660.324361][ C0] [<802b1b08>] (cpu_startup_entry) from [<81aaf07c>] (kernel_init+0x0/0x138) [ 660.324765][ C0] [<81aaef9c>] (rest_init) from [<8260145c>] (start_kernel+0x844/0x860) [ 660.325137][ C0] [<82600c18>] (start_kernel) from [<00000000>] (0x0) [ 660.327962][ C0] Rebooting in 86400 seconds..