last executing test programs: 924.639109ms ago: executing program 0 (id=2624): r0 = openat$selinux_avc_cache_threshold(0xffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x5450, 0x0) 845.067579ms ago: executing program 0 (id=2627): r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$TIPC_NL_SOCK_GET(r0, &(0x7f0000001980)={0x0, 0x0, &(0x7f0000001940)={&(0x7f0000001740)={0x14, 0x0, 0x400, 0x70bd25, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x40800}, 0x50) 732.465034ms ago: executing program 0 (id=2628): r0 = syz_open_procfs(0x0, &(0x7f0000000340)='projid_map\x00') write$P9_RLERROR(r0, 0x0, 0x0) 602.669921ms ago: executing program 0 (id=2629): r0 = add_key$user(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)='_', 0x1, 0xfffffffffffffffe) keyctl$instantiate_iov(0x12, r0, 0x0, 0x0, 0x0) 515.233763ms ago: executing program 0 (id=2631): r0 = socket$inet_mptcp(0x2, 0x1, 0x106) getsockopt$inet_tcp_int(r0, 0x6, 0x2, 0x0, 0x0) 422.572084ms ago: executing program 1 (id=2634): r0 = fanotify_init(0x4, 0x800) ioctl$BTRFS_IOC_BALANCE(r0, 0x5450, 0x0) 422.417084ms ago: executing program 0 (id=2635): r0 = syz_open_dev$usbfs(&(0x7f0000003f00), 0x1ff, 0xa401) ioctl$USBDEVFS_SUBMITURB(r0, 0x4004550c, 0x0) 332.740547ms ago: executing program 1 (id=2636): r0 = add_key$user(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)='_', 0x1, 0xfffffffffffffffe) keyctl$instantiate_iov(0x12, r0, 0x0, 0x0, 0x0) 241.485259ms ago: executing program 1 (id=2637): r0 = openat$selinux_avc_cache_threshold(0xffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x5450, 0x0) 164.545439ms ago: executing program 1 (id=2638): r0 = open(&(0x7f0000000140)='.\x00', 0x0, 0x0) ioctl$KDGKBENT(r0, 0x5451, 0x0) 93.180658ms ago: executing program 1 (id=2639): r0 = socket$inet6_udp(0xa, 0x2, 0x0) fstatfs(r0, &(0x7f0000000100)=""/14) 0s ago: executing program 1 (id=2640): r0 = socket(0x2, 0x1, 0x0) ioctl$VHOST_SET_OWNER(r0, 0x80108907, 0x0) kernel console output (not intermixed with test programs): [ 47.690342][ T29] audit: type=1400 audit(47.610:56): avc: denied { read write } for pid=3091 comm="sftp-server" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 47.691510][ T29] audit: type=1400 audit(47.620:57): avc: denied { open } for pid=3091 comm="sftp-server" path="/dev/null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 Warning: Permanently added '[localhost]:63959' (ED25519) to the list of known hosts. [ 61.406719][ T29] audit: type=1400 audit(61.320:58): avc: denied { name_bind } for pid=3094 comm="sshd-session" src=30000 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 62.783247][ T29] audit: type=1400 audit(62.710:59): avc: denied { execute } for pid=3095 comm="sh" name="syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 62.888651][ T29] audit: type=1400 audit(62.780:60): avc: denied { execute_no_trans } for pid=3095 comm="sh" path="/syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 66.902221][ T29] audit: type=1400 audit(66.830:61): avc: denied { mounton } for pid=3095 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=806 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 66.907538][ T29] audit: type=1400 audit(66.830:62): avc: denied { mount } for pid=3095 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 66.922824][ T3095] cgroup: Unknown subsys name 'net' [ 66.929898][ T29] audit: type=1400 audit(66.850:63): avc: denied { unmount } for pid=3095 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 67.065274][ T3095] cgroup: Unknown subsys name 'cpuset' [ 67.071950][ T3095] cgroup: Unknown subsys name 'hugetlb' [ 67.072899][ T3095] cgroup: Unknown subsys name 'rlimit' [ 67.261709][ T29] audit: type=1400 audit(67.190:64): avc: denied { setattr } for pid=3095 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 67.263359][ T29] audit: type=1400 audit(67.190:65): avc: denied { mounton } for pid=3095 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 67.266519][ T29] audit: type=1400 audit(67.190:66): avc: denied { mount } for pid=3095 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 67.461686][ T3097] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 67.464672][ T29] audit: type=1400 audit(67.390:67): avc: denied { relabelto } for pid=3097 comm="mkswap" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 67.470557][ T29] audit: type=1400 audit(67.390:68): avc: denied { write } for pid=3097 comm="mkswap" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 67.513724][ T29] audit: type=1400 audit(67.440:69): avc: denied { read } for pid=3095 comm="syz-executor" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 67.514258][ T29] audit: type=1400 audit(67.440:70): avc: denied { open } for pid=3095 comm="syz-executor" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 75.061354][ T3095] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 77.067362][ T29] audit: type=1400 audit(76.990:71): avc: denied { execmem } for pid=3098 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 77.137922][ T29] audit: type=1400 audit(77.060:72): avc: denied { read } for pid=3100 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 77.138409][ T29] audit: type=1400 audit(77.060:73): avc: denied { open } for pid=3100 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 77.149162][ T29] audit: type=1400 audit(77.070:74): avc: denied { mounton } for pid=3100 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 77.175688][ T29] audit: type=1400 audit(77.100:75): avc: denied { module_request } for pid=3101 comm="syz-executor" kmod="netdev-nr1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 77.175995][ T29] audit: type=1400 audit(77.100:76): avc: denied { module_request } for pid=3100 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 77.225060][ T29] audit: type=1400 audit(77.150:77): avc: denied { sys_module } for pid=3100 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 77.691314][ T29] audit: type=1400 audit(77.620:78): avc: denied { ioctl } for pid=3100 comm="syz-executor" path="/dev/net/tun" dev="devtmpfs" ino=677 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 78.827540][ T3101] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 78.852305][ T3101] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 78.857179][ T3100] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 78.882151][ T3100] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 79.722609][ T3101] hsr_slave_0: entered promiscuous mode [ 79.727595][ T3101] hsr_slave_1: entered promiscuous mode [ 79.808906][ T3100] hsr_slave_0: entered promiscuous mode [ 79.812677][ T3100] hsr_slave_1: entered promiscuous mode [ 79.814564][ T3100] debugfs: 'hsr0' already exists in 'hsr' [ 79.815550][ T3100] Cannot create hsr debugfs directory [ 80.261325][ T29] audit: type=1400 audit(80.190:79): avc: denied { create } for pid=3101 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 80.264625][ T29] audit: type=1400 audit(80.190:80): avc: denied { write } for pid=3101 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 80.281050][ T3101] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 80.303797][ T3101] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 80.322263][ T3101] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 80.332964][ T3101] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 80.409578][ T3100] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 80.423244][ T3100] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 80.439827][ T3100] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 80.453332][ T3100] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 81.068302][ T3100] 8021q: adding VLAN 0 to HW filter on device bond0 [ 81.089521][ T3101] 8021q: adding VLAN 0 to HW filter on device bond0 [ 83.609400][ T3101] veth0_vlan: entered promiscuous mode [ 83.629062][ T3101] veth1_vlan: entered promiscuous mode [ 83.694091][ T3100] veth0_vlan: entered promiscuous mode [ 83.713689][ T3100] veth1_vlan: entered promiscuous mode [ 83.749447][ T3101] veth0_macvtap: entered promiscuous mode [ 83.767045][ T3101] veth1_macvtap: entered promiscuous mode [ 83.791947][ T3100] veth0_macvtap: entered promiscuous mode [ 83.807311][ T3100] veth1_macvtap: entered promiscuous mode [ 83.862620][ T1289] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 83.863481][ T1289] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 83.863584][ T1289] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 83.863656][ T1289] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 83.987767][ T1135] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 83.988545][ T1135] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 83.988644][ T1135] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 83.988711][ T1135] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 83.992749][ T29] kauditd_printk_skb: 1 callbacks suppressed [ 83.993467][ T29] audit: type=1400 audit(83.920:82): avc: denied { mount } for pid=3101 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 84.011686][ T29] audit: type=1400 audit(83.940:83): avc: denied { mounton } for pid=3101 comm="syz-executor" path="/syzkaller.acY3qa/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 84.018187][ T29] audit: type=1400 audit(83.940:84): avc: denied { mount } for pid=3101 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 84.027222][ T29] audit: type=1400 audit(83.950:85): avc: denied { mounton } for pid=3101 comm="syz-executor" path="/syzkaller.acY3qa/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 84.034847][ T29] audit: type=1400 audit(83.960:86): avc: denied { mounton } for pid=3101 comm="syz-executor" path="/syzkaller.acY3qa/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=891 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 84.084355][ T29] audit: type=1400 audit(84.010:87): avc: denied { unmount } for pid=3101 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 84.099098][ T29] audit: type=1400 audit(84.020:88): avc: denied { mounton } for pid=3101 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=772 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 84.102662][ T29] audit: type=1400 audit(84.030:89): avc: denied { mount } for pid=3101 comm="syz-executor" name="/" dev="gadgetfs" ino=2490 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 84.114770][ T29] audit: type=1400 audit(84.040:90): avc: denied { mount } for pid=3101 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 84.122494][ T29] audit: type=1400 audit(84.050:91): avc: denied { mounton } for pid=3101 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 84.188249][ T3101] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 86.208788][ T3775] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3775 comm=syz.1.33 [ 90.326662][ T3943] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=2583 sclass=netlink_tcpdiag_socket pid=3943 comm=syz.1.117 [ 90.356585][ T29] kauditd_printk_skb: 16 callbacks suppressed [ 90.358629][ T29] audit: type=1400 audit(90.280:108): avc: denied { create } for pid=3944 comm="syz.0.118" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 90.376443][ T29] audit: type=1400 audit(90.300:109): avc: denied { setopt } for pid=3944 comm="syz.0.118" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 90.747288][ T29] audit: type=1400 audit(90.670:110): avc: denied { unmount } for pid=3101 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 92.285395][ T4030] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4030 comm=syz.0.160 [ 92.746788][ T29] audit: type=1400 audit(92.670:111): avc: denied { getopt } for pid=4047 comm="syz.1.168" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 92.862394][ T29] audit: type=1400 audit(92.790:112): avc: denied { create } for pid=4052 comm="syz.0.171" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 93.603791][ T29] audit: type=1400 audit(93.530:113): avc: denied { ioctl } for pid=4084 comm="syz.0.187" path="socket:[4151]" dev="sockfs" ino=4151 ioctlcmd=0x5451 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 93.761377][ T29] audit: type=1400 audit(93.690:114): avc: denied { append } for pid=4092 comm="syz.0.190" name="vcsu1" dev="devtmpfs" ino=17 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 95.354264][ T4166] Zero length message leads to an empty skb [ 95.666311][ T29] audit: type=1400 audit(95.590:115): avc: denied { setopt } for pid=4178 comm="syz.1.233" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 95.885442][ T29] audit: type=1400 audit(95.810:116): avc: denied { write } for pid=4189 comm="syz.0.238" name="ip6_mr_vif" dev="proc" ino=4026532703 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 95.891378][ T29] audit: type=1400 audit(95.820:117): avc: denied { setattr } for pid=4189 comm="syz.0.238" name="ip6_mr_vif" dev="proc" ino=4026532703 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 98.232007][ T4289] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 99.025337][ T29] audit: type=1400 audit(98.950:118): avc: denied { create } for pid=4323 comm="syz.0.305" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 99.047166][ T29] audit: type=1400 audit(98.970:119): avc: denied { ioctl } for pid=4323 comm="syz.0.305" path="socket:[3961]" dev="sockfs" ino=3961 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 99.754382][ T4356] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=20 sclass=netlink_audit_socket pid=4356 comm=syz.0.320 [ 99.945751][ T29] audit: type=1400 audit(99.870:120): avc: denied { setopt } for pid=4364 comm="syz.0.325" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 100.022528][ T29] audit: type=1400 audit(99.950:121): avc: denied { create } for pid=4366 comm="syz.1.326" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 100.026893][ T29] audit: type=1400 audit(99.950:122): avc: denied { setattr } for pid=4366 comm="syz.1.326" name="CAN_J1939" dev="sockfs" ino=4638 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 101.172128][ T4419] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5132 sclass=netlink_route_socket pid=4419 comm=syz.1.352 [ 101.491736][ T4433] random: crng reseeded on system resumption [ 101.932851][ T29] audit: type=1400 audit(101.860:123): avc: denied { create } for pid=4452 comm="syz.1.369" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 101.948826][ T29] audit: type=1400 audit(101.870:124): avc: denied { ioctl } for pid=4452 comm="syz.1.369" path="socket:[5193]" dev="sockfs" ino=5193 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 103.808198][ T29] audit: type=1400 audit(103.730:125): avc: denied { connect } for pid=4537 comm="syz.0.411" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 103.866724][ T29] audit: type=1400 audit(103.790:126): avc: denied { bind } for pid=4541 comm="syz.0.413" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 105.034267][ T4604] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4604 comm=syz.0.444 [ 105.074687][ T4606] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4606 comm=syz.1.445 [ 107.533969][ T29] audit: type=1400 audit(107.460:127): avc: denied { create } for pid=4718 comm="syz.1.501" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 107.539592][ T29] audit: type=1400 audit(107.460:128): avc: denied { ioctl } for pid=4718 comm="syz.1.501" path="socket:[5667]" dev="sockfs" ino=5667 ioctlcmd=0x8919 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 107.839861][ T29] audit: type=1400 audit(107.760:129): avc: denied { create } for pid=4734 comm="syz.1.509" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 107.846581][ T29] audit: type=1400 audit(107.770:130): avc: denied { setopt } for pid=4734 comm="syz.1.509" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 108.092211][ T29] audit: type=1400 audit(108.010:131): avc: denied { bpf } for pid=4746 comm="syz.0.515" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 108.992293][ T29] audit: type=1400 audit(108.920:132): avc: denied { create } for pid=4790 comm="syz.0.537" anonclass=[userfaultfd] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 113.010878][ T29] audit: type=1400 audit(112.920:133): avc: denied { lock } for pid=4898 comm="syz.0.590" path="/dev/hwrng" dev="devtmpfs" ino=82 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 114.034005][ T29] audit: type=1400 audit(113.960:134): avc: denied { ioctl } for pid=4916 comm="syz.0.598" path="socket:[6012]" dev="sockfs" ino=6012 ioctlcmd=0x8904 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 114.587686][ T29] audit: type=1400 audit(114.510:135): avc: denied { ioctl } for pid=4946 comm="syz.0.612" path="socket:[6054]" dev="sockfs" ino=6054 ioctlcmd=0xf507 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 114.788397][ T2881] usb 2-1: new high-speed USB device number 2 using dummy_hcd [ 114.950674][ T2881] usb 2-1: Using ep0 maxpacket: 32 [ 114.958221][ T2881] usb 2-1: config 2 has an invalid interface number: 15 but max is 0 [ 114.961318][ T2881] usb 2-1: config 2 has no interface number 0 [ 114.962486][ T2881] usb 2-1: config 2 interface 15 has no altsetting 0 [ 114.974228][ T2881] usb 2-1: New USB device found, idVendor=1b75, idProduct=8187, bcdDevice=6d.3f [ 114.974547][ T2881] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 114.976073][ T2881] usb 2-1: Product: syz [ 114.976125][ T2881] usb 2-1: Manufacturer: syz [ 114.976153][ T2881] usb 2-1: SerialNumber: syz [ 115.218475][ T2881] usb 2-1: USB disconnect, device number 2 [ 115.550930][ T2881] usb 1-1: new high-speed USB device number 2 using dummy_hcd [ 115.700592][ T2881] usb 1-1: Using ep0 maxpacket: 32 [ 115.734807][ T2881] usb 1-1: config 2 has an invalid interface number: 15 but max is 0 [ 115.735161][ T2881] usb 1-1: config 2 has no interface number 0 [ 115.735239][ T2881] usb 1-1: config 2 interface 15 has no altsetting 0 [ 115.796325][ T2881] usb 1-1: New USB device found, idVendor=1b75, idProduct=8187, bcdDevice=6d.3f [ 115.796621][ T2881] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 115.796705][ T2881] usb 1-1: Product: syz [ 115.796733][ T2881] usb 1-1: Manufacturer: syz [ 115.796759][ T2881] usb 1-1: SerialNumber: syz [ 116.061779][ T2881] usb 1-1: USB disconnect, device number 2 [ 117.632731][ T29] audit: type=1400 audit(117.560:136): avc: denied { write } for pid=5067 comm="syz.0.661" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 118.014095][ T5086] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 125.595976][ T5429] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=20 sclass=netlink_audit_socket pid=5429 comm=syz.1.839 [ 126.885247][ T5492] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5132 sclass=netlink_route_socket pid=5492 comm=syz.0.871 [ 127.018026][ T5500] random: crng reseeded on system resumption [ 131.751290][ T5702] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5702 comm=syz.0.975 [ 131.827398][ T5706] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5706 comm=syz.1.976 [ 138.584201][ T29] audit: type=1400 audit(138.510:137): avc: denied { audit_write } for pid=5970 comm="syz.0.1110" capability=29 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 140.411699][ T29] audit: type=1400 audit(140.340:138): avc: denied { create } for pid=6033 comm="syz.0.1139" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 140.416864][ T29] audit: type=1400 audit(140.340:139): avc: denied { ioctl } for pid=6033 comm="syz.0.1139" path="socket:[10275]" dev="sockfs" ino=10275 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 141.186931][ T29] audit: type=1400 audit(141.110:140): avc: denied { lock } for pid=6065 comm="syz.0.1156" path="user:[4026531837]" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 142.340636][ T29] audit: type=1400 audit(142.260:141): avc: denied { module_load } for pid=6115 comm="syz.1.1182" path="/sys/power/wakeup_count" dev="sysfs" ino=753 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=system permissive=1 [ 145.302143][ T29] audit: type=1400 audit(145.230:142): avc: denied { prog_load } for pid=6211 comm="syz.0.1228" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 145.306703][ T29] audit: type=1400 audit(145.230:143): avc: denied { perfmon } for pid=6211 comm="syz.0.1228" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 145.498756][ T6221] SELinux: Context system_u:object_r:pinentry_exec_t:s0 is not valid (left unmapped). [ 145.503124][ T29] audit: type=1400 audit(145.420:144): avc: denied { relabelto } for pid=6219 comm="syz.0.1232" name="uinput" dev="devtmpfs" ino=698 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:pinentry_exec_t:s0" [ 145.505061][ T29] audit: type=1400 audit(145.430:145): avc: denied { associate } for pid=6219 comm="syz.0.1232" name="uinput" dev="devtmpfs" ino=698 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:device_t tclass=filesystem permissive=1 srawcon="system_u:object_r:pinentry_exec_t:s0" [ 146.079395][ T6245] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6245 comm=syz.1.1243 [ 146.378134][ T6257] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6257 comm=syz.0.1250 [ 146.443550][ T29] audit: type=1400 audit(146.370:146): avc: denied { read } for pid=6258 comm="syz.1.1252" name="uinput" dev="devtmpfs" ino=698 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:pinentry_exec_t:s0" [ 146.446156][ T29] audit: type=1400 audit(146.370:147): avc: denied { open } for pid=6258 comm="syz.1.1252" path="/dev/uinput" dev="devtmpfs" ino=698 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:pinentry_exec_t:s0" [ 147.082655][ T29] audit: type=1400 audit(147.010:148): avc: denied { ioctl } for pid=6288 comm="syz.0.1266" path="socket:[10693]" dev="sockfs" ino=10693 ioctlcmd=0x894b scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 149.781878][ T29] audit: type=1400 audit(149.710:149): avc: denied { create } for pid=6399 comm="syz.1.1322" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 151.786142][ T29] audit: type=1400 audit(151.710:150): avc: denied { getopt } for pid=6478 comm="syz.0.1355" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 153.743434][ T29] audit: type=1400 audit(153.670:151): avc: denied { create } for pid=6557 comm="syz.0.1394" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 153.748668][ T29] audit: type=1400 audit(153.670:152): avc: denied { ioctl } for pid=6557 comm="syz.0.1394" path="socket:[11136]" dev="sockfs" ino=11136 ioctlcmd=0x8902 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 153.806773][ T6561] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6561 comm=syz.1.1395 [ 154.209452][ T6578] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6578 comm=syz.0.1407 [ 154.392529][ T29] audit: type=1400 audit(154.320:153): avc: denied { map_create } for pid=6584 comm="syz.0.1408" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 154.397622][ T29] audit: type=1400 audit(154.320:154): avc: denied { map_read map_write } for pid=6584 comm="syz.0.1408" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 155.764925][ T29] audit: type=1400 audit(155.690:155): avc: denied { lock } for pid=6639 comm="syz.1.1436" path="socket:[12289]" dev="sockfs" ino=12289 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tcp_socket permissive=1 [ 160.403679][ T6830] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=6830 comm=syz.1.1529 [ 160.996963][ T6860] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=6860 comm=syz.0.1544 [ 162.206735][ T29] audit: type=1400 audit(162.130:156): avc: denied { setopt } for pid=6925 comm="syz.0.1571" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 165.201788][ T29] audit: type=1400 audit(165.130:157): avc: denied { read write } for pid=7051 comm="syz.1.1635" name="binder-control" dev="binder" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 165.213731][ T29] audit: type=1400 audit(165.140:158): avc: denied { open } for pid=7051 comm="syz.1.1635" path="/dev/binderfs/binder-control" dev="binder" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 168.086664][ T29] audit: type=1400 audit(168.010:159): avc: denied { append } for pid=7173 comm="syz.1.1693" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 169.095016][ T29] audit: type=1800 audit(169.020:160): pid=7209 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=set_data cause=unavailable-hash-algorithm comm="syz.0.1710" name="/" dev="sockfs" ino=13183 res=0 errno=0 [ 169.562726][ T29] audit: type=1800 audit(169.490:161): pid=7224 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=set_data cause=unavailable-hash-algorithm comm="syz.1.1717" name="/" dev="sockfs" ino=13952 res=0 errno=0 [ 170.638821][ T29] audit: type=1400 audit(170.560:162): avc: denied { setattr } for pid=7272 comm="syz.1.1741" name="L2TP/IP" dev="sockfs" ino=13298 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 172.072322][ T29] audit: type=1400 audit(172.000:163): avc: denied { allowed } for pid=7340 comm="syz.0.1774" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 172.095061][ T29] audit: type=1400 audit(172.020:164): avc: denied { lock } for pid=7340 comm="syz.0.1774" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=14443 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 178.024665][ T29] audit: type=1400 audit(177.950:165): avc: denied { write } for pid=7475 comm="syz.0.1841" name="uinput" dev="devtmpfs" ino=698 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:pinentry_exec_t:s0" [ 178.035586][ T29] audit: type=1400 audit(177.960:166): avc: denied { ioctl } for pid=7475 comm="syz.0.1841" path="/dev/uinput" dev="devtmpfs" ino=698 ioctlcmd=0x5568 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:pinentry_exec_t:s0" [ 181.164044][ T29] audit: type=1400 audit(181.090:167): avc: denied { ioctl } for pid=7558 comm="syz.0.1885" path="socket:[15485]" dev="sockfs" ino=15485 ioctlcmd=0x8901 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 181.329584][ T29] audit: type=1400 audit(181.250:168): avc: denied { create } for pid=7564 comm="syz.1.1884" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 181.362751][ T29] audit: type=1400 audit(181.290:169): avc: denied { unlink } for pid=3101 comm="syz-executor" name="file0" dev="tmpfs" ino=4876 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 182.097345][ T29] audit: type=1400 audit(182.020:170): avc: denied { map } for pid=7599 comm="syz.0.1906" path="/dev/nullb0" dev="devtmpfs" ino=654 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 182.102345][ T29] audit: type=1400 audit(182.030:171): avc: denied { execute } for pid=7599 comm="syz.0.1906" path="/dev/nullb0" dev="devtmpfs" ino=654 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 184.904750][ T29] audit: type=1400 audit(184.830:172): avc: denied { lock } for pid=7728 comm="syz.1.1967" path="socket:[15736]" dev="sockfs" ino=15736 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 188.487288][ T7887] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7887 comm=syz.1.2045 [ 189.121681][ T7916] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7916 comm=syz.0.2059 [ 189.381809][ T7929] capability: warning: `syz.1.2066' uses deprecated v2 capabilities in a way that may be insecure [ 192.107500][ T8057] vlan0: entered promiscuous mode [ 192.108600][ T8057] vlan0: entered allmulticast mode [ 192.108754][ T8057] veth0_vlan: entered allmulticast mode [ 193.395766][ T8120] vlan0: entered promiscuous mode [ 193.400042][ T8120] vlan0: entered allmulticast mode [ 193.400700][ T8120] veth0_vlan: entered allmulticast mode [ 195.018887][ T29] audit: type=1400 audit(194.940:173): avc: denied { ioctl } for pid=8190 comm="syz.0.2199" path="socket:[16889]" dev="sockfs" ino=16889 ioctlcmd=0x8901 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 196.066149][ T29] audit: type=1400 audit(195.990:174): avc: denied { write } for pid=8233 comm="syz.1.2220" path="socket:[16962]" dev="sockfs" ino=16962 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 197.567875][ T29] audit: type=1400 audit(197.490:175): avc: denied { bind } for pid=8295 comm="syz.0.2248" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 199.353061][ T29] audit: type=1400 audit(199.280:176): avc: denied { ioctl } for pid=8369 comm="syz.0.2284" path="socket:[17830]" dev="sockfs" ino=17830 ioctlcmd=0x8940 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 200.515244][ T29] audit: type=1400 audit(200.440:177): avc: denied { ioctl } for pid=8416 comm="syz.1.2306" path="socket:[17885]" dev="sockfs" ino=17885 ioctlcmd=0x8916 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 202.253944][ T29] audit: type=1400 audit(202.180:178): avc: denied { prog_run } for pid=8486 comm="syz.1.2341" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 205.182690][ T8535] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8535 comm=syz.0.2365 [ 207.615586][ T8560] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8560 comm=syz.1.2377 [ 213.491087][ T29] audit: type=1400 audit(213.420:179): avc: denied { setopt } for pid=8665 comm="syz.0.2429" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 216.701000][ T8730] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8730 comm=syz.0.2459 [ 216.786134][ T8734] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=8734 comm=syz.0.2461 [ 217.112595][ T8747] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8747 comm=syz.1.2471 [ 217.675678][ T8772] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=8772 comm=syz.1.2476 [ 217.881773][ T2881] usb 1-1: new high-speed USB device number 3 using dummy_hcd [ 218.037134][ T2881] usb 1-1: config 1 interface 0 altsetting 127 bulk endpoint 0x81 has invalid maxpacket 64 [ 218.037671][ T2881] usb 1-1: config 1 interface 0 altsetting 127 bulk endpoint 0x2 has invalid maxpacket 32 [ 218.037766][ T2881] usb 1-1: config 1 interface 0 has no altsetting 0 [ 218.054764][ T2881] usb 1-1: New USB device found, idVendor=0bda, idProduct=8150, bcdDevice= 0.40 [ 218.055012][ T2881] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 218.056999][ T2881] usb 1-1: Product: syz [ 218.057311][ T2881] usb 1-1: Manufacturer: syz [ 218.057509][ T2881] usb 1-1: SerialNumber: syz [ 218.069031][ T8767] raw-gadget.0 gadget.0: fail, usb_ep_enable returned -22 [ 218.070444][ T8767] raw-gadget.0 gadget.0: fail, usb_ep_enable returned -22 [ 218.590882][ T2881] rtl8150 1-1:1.0: couldn't reset the device [ 218.593205][ T2881] rtl8150 1-1:1.0: probe with driver rtl8150 failed with error -5 [ 218.606905][ T2881] usb 1-1: USB disconnect, device number 3 [ 220.200775][ T1808] usb 2-1: new high-speed USB device number 3 using dummy_hcd [ 220.368736][ T1808] usb 2-1: config 1 interface 0 altsetting 127 bulk endpoint 0x81 has invalid maxpacket 64 [ 220.369075][ T1808] usb 2-1: config 1 interface 0 altsetting 127 bulk endpoint 0x2 has invalid maxpacket 32 [ 220.369381][ T1808] usb 2-1: config 1 interface 0 has no altsetting 0 [ 220.386305][ T1808] usb 2-1: New USB device found, idVendor=0bda, idProduct=8150, bcdDevice= 0.40 [ 220.386633][ T1808] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 220.387024][ T1808] usb 2-1: Product: syz [ 220.387118][ T1808] usb 2-1: Manufacturer: syz [ 220.387169][ T1808] usb 2-1: SerialNumber: syz [ 220.398939][ T8843] raw-gadget.0 gadget.1: fail, usb_ep_enable returned -22 [ 220.401411][ T8843] raw-gadget.0 gadget.1: fail, usb_ep_enable returned -22 [ 220.921501][ T1808] rtl8150 2-1:1.0: couldn't reset the device [ 220.923775][ T1808] rtl8150 2-1:1.0: probe with driver rtl8150 failed with error -5 [ 220.946493][ T1808] usb 2-1: USB disconnect, device number 3 [ 220.956800][ T29] audit: type=1400 audit(220.880:180): avc: denied { getopt } for pid=8858 comm="syz.0.2517" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 221.742960][ T8887] could not allocate digest TFM handle sha384-arm [ 222.045751][ T29] audit: type=1400 audit(221.970:181): avc: denied { setattr } for pid=8905 comm="syz.1.2533" name="nbd1" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 222.074776][ T29] audit: type=1400 audit(222.000:182): avc: denied { getopt } for pid=8904 comm="syz.0.2534" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 222.915256][ T8930] could not allocate digest TFM handle sha384-arm [ 223.099816][ T29] audit: type=1400 audit(223.020:183): avc: denied { nlmsg_write } for pid=8937 comm="syz.1.2548" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 223.831643][ T29] audit: type=1400 audit(223.760:184): avc: denied { setopt } for pid=8982 comm="syz.1.2561" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 224.327062][ T29] audit: type=1400 audit(224.250:185): avc: denied { write } for pid=9016 comm="syz.0.2571" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 224.883950][ T29] audit: type=1400 audit(224.810:186): avc: denied { name_bind } for pid=9041 comm="syz.0.2580" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=1 [ 224.884354][ T29] audit: type=1400 audit(224.810:187): avc: denied { node_bind } for pid=9041 comm="syz.0.2580" saddr=::1 src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 227.041813][ T29] audit: type=1400 audit(226.960:188): avc: denied { write } for pid=9134 comm="syz.0.2627" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 660.270404][ C0] watchdog: BUG: soft lockup - CPU#0 stuck for 430s! [swapper/0:0] [ 660.270597][ C0] Modules linked in: [ 660.271199][ C0] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Not tainted syzkaller #0 PREEMPT [ 660.271354][ C0] Hardware name: ARM-Versatile Express [ 660.271491][ C0] PC is at _raw_spin_unlock_irq+0x28/0x54 [ 660.272015][ C0] LR is at tmigr_handle_remote_up+0x218/0x4b0 [ 660.272050][ C0] pc : [<81abbd3c>] lr : [<80346ea4>] psr: 60000113 [ 660.272078][ C0] sp : 82801be0 ip : 82801bf0 fp : 82801bec [ 660.272098][ C0] r10: 00000001 r9 : 8280c9a4 r8 : 00000001 [ 660.272121][ C0] r7 : ddddb488 r6 : 82801cb8 r5 : 830bf3b0 r4 : 830bf380 [ 660.272145][ C0] r3 : 0000f5db r2 : ffffffff r1 : 00000000 r0 : ddddb488 [ 660.272214][ C0] Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment user [ 660.272258][ C0] Control: 30c5387d Table: 85e71bc0 DAC: fffffffd [ 660.272322][ C0] Call trace: [ 660.272499][ C0] [<81abbd14>] (_raw_spin_unlock_irq) from [<80346ea4>] (tmigr_handle_remote_up+0x218/0x4b0) [ 660.272752][ C0] [<80346c8c>] (tmigr_handle_remote_up) from [<803451a4>] (__walk_groups_from+0x3c/0xe4) [ 660.272833][ C0] r10:8281b500 r9:8280c820 r8:80346c8c r7:82801cb8 r6:830bf380 r5:00000002 [ 660.272860][ C0] r4:830bf380 [ 660.272876][ C0] [<80345168>] (__walk_groups_from) from [<8034753c>] (tmigr_handle_remote+0xe8/0x108) [ 660.272917][ C0] r9:82804d80 r8:00000102 r7:00000001 r6:00000002 r5:00000002 r4:dddc7488 [ 660.272927][ C0] [<80347454>] (tmigr_handle_remote) from [<80327700>] (run_timer_softirq+0x30/0x34) [ 660.272960][ C0] r4:82804084 [ 660.272969][ C0] [<803276d0>] (run_timer_softirq) from [<8025b65c>] (handle_softirqs+0x140/0x458) [ 660.273000][ C0] [<8025b51c>] (handle_softirqs) from [<8025bad0>] (__irq_exit_rcu+0x110/0x1d0) [ 660.273036][ C0] r10:00000000 r9:8281b500 r8:00000000 r7:82801dd8 r6:82443f98 r5:8247f0cc [ 660.273045][ C0] r4:8281b500 [ 660.273053][ C0] [<8025b9c0>] (__irq_exit_rcu) from [<8025be48>] (irq_exit+0x10/0x18) [ 660.273086][ C0] r5:8247f0cc r4:826c3a9c [ 660.273095][ C0] [<8025be38>] (irq_exit) from [<81aad964>] (generic_handle_arch_irq+0x7c/0x80) [ 660.273124][ C0] [<81aad8e8>] (generic_handle_arch_irq) from [<80200bdc>] (__irq_svc+0x7c/0xbc) [ 660.273200][ C0] Exception stack(0x82801dd8 to 0x82801e20) [ 660.273308][ C0] 1dc0: 00000001 00000000 [ 660.273337][ C0] 1de0: 00009911 0000990f 840b9f68 00000004 00000001 840b9f68 83e9c288 840b9e40 [ 660.273355][ C0] 1e00: 00000000 82801e3c 82801e28 82801e28 81abbecc 81abbef4 80000013 ffffffff [ 660.273396][ C0] r9:8281b500 r8:83e9c288 r7:82801e0c r6:ffffffff r5:80000013 r4:81abbef4 [ 660.273406][ C0] [<81abbeb4>] (_raw_spin_lock) from [<809c7a2c>] (gpio_mmio_set+0x44/0x80) [ 660.273443][ C0] r5:00000004 r4:840b9e40 [ 660.273451][ C0] [<809c79e8>] (gpio_mmio_set) from [<809b81e8>] (gpiochip_set+0x1c/0x44) [ 660.273488][ C0] r7:00000001 r6:00000000 r5:00000002 r4:840fae68 [ 660.273496][ C0] [<809b81cc>] (gpiochip_set) from [<809baab0>] (gpiod_set_raw_value_commit+0x78/0x218) [ 660.273524][ C0] [<809baa38>] (gpiod_set_raw_value_commit) from [<809bc350>] (gpiod_set_value_nocheck+0x44/0x58) [ 660.273556][ C0] r10:00000000 r9:00000000 r8:00000001 r7:dddce4c0 r6:83827f98 r5:00000001 [ 660.273566][ C0] r4:840fae68 [ 660.273573][ C0] [<809bc30c>] (gpiod_set_value_nocheck) from [<809bc3a0>] (gpiod_set_value+0x3c/0x88) [ 660.273598][ C0] [<809bc364>] (gpiod_set_value) from [<809ccb3c>] (gpio_led_set+0x5c/0x60) [ 660.273627][ C0] r5:000000ff r4:832ff224 [ 660.273635][ C0] [<809ccae0>] (gpio_led_set) from [<809ca464>] (led_set_brightness+0x84/0x90) [ 660.273663][ C0] r5:000000ff r4:832ff224 [ 660.273672][ C0] [<809ca3e0>] (led_set_brightness) from [<809cbfe4>] (led_trigger_event+0x40/0x58) [ 660.273698][ C0] r5:000000ff r4:832ff224 [ 660.273707][ C0] [<809cbfa4>] (led_trigger_event) from [<809cd640>] (ledtrig_cpu+0xac/0xf4) [ 660.273738][ C0] r7:dddce4c0 r6:00000002 r5:82b15cd8 r4:000001fd [ 660.273747][ C0] [<809cd594>] (ledtrig_cpu) from [<80227a38>] (arch_cpu_idle_exit+0x14/0x18) [ 660.273784][ C0] r9:00000000 r8:00000000 r7:8280c710 r6:8281b500 r5:8280c6d0 r4:00000000 [ 660.273794][ C0] [<80227a24>] (arch_cpu_idle_exit) from [<802b168c>] (do_idle+0x5c/0x2d8) [ 660.273834][ C0] [<802b1630>] (do_idle) from [<802b1c38>] (cpu_startup_entry+0x30/0x34) [ 660.273872][ C0] r10:8281aff4 r9:8280c680 r8:823bec64 r7:00000000 r6:deffc06c r5:828222e8 [ 660.273883][ C0] r4:000000ed [ 660.273891][ C0] [<802b1c08>] (cpu_startup_entry) from [<81aaf37c>] (kernel_init+0x0/0x138) [ 660.273926][ C0] [<81aaf29c>] (rest_init) from [<8260145c>] (start_kernel+0x844/0x860) [ 660.273977][ C0] [<82600c18>] (start_kernel) from [<00000000>] (0x0) [ 660.274538][ C0] Sending NMI from CPU 0 to CPUs 1: [ 660.275238][ C1] NMI backtrace for cpu 1 [ 660.275381][ C1] CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Not tainted syzkaller #0 PREEMPT [ 660.275417][ C1] Hardware name: ARM-Versatile Express [ 660.275431][ C1] PC is at _raw_spin_lock+0x40/0x58 [ 660.275478][ C1] LR is at _raw_spin_lock+0x18/0x58 [ 660.275494][ C1] pc : [<81abbef4>] lr : [<81abbecc>] psr: 80000113 [ 660.275507][ C1] sp : df805d68 ip : df805d68 fp : df805d7c [ 660.275524][ C1] r10: 81c05450 r9 : 840b9e40 r8 : 83e9c288 [ 660.275538][ C1] r7 : 840b9f68 r6 : 00000000 r5 : 00000001 r4 : 840b9f68 [ 660.275563][ C1] r3 : 0000990f r2 : 00009910 r1 : 00000000 r0 : 00000001 [ 660.275592][ C1] Flags: Nzcv IRQs on FIQs on Mode SVC_32 ISA ARM Segment none [ 660.275629][ C1] Control: 30c5387d Table: 851b0c40 DAC: 00000000 [ 660.275653][ C1] Call trace: frame pointer underflow [ 660.275780][ C1] [<81abbeb4>] (_raw_spin_lock) from [<809c7a2c>] (gpio_mmio_set+0x44/0x80) [ 660.275832][ C1] r5:00000001 r4:840b9e40 [ 660.275845][ C1] [<809c79e8>] (gpio_mmio_set) from [<809b81e8>] (gpiochip_set+0x1c/0x44) [ 660.275894][ C1] r7:00000000 r6:00000000 r5:00000000 r4:840fae40 [ 660.275902][ C1] [<809b81cc>] (gpiochip_set) from [<809baab0>] (gpiod_set_raw_value_commit+0x78/0x218) [ 660.275960][ C1] [<809baa38>] (gpiod_set_raw_value_commit) from [<809bc350>] (gpiod_set_value_nocheck+0x44/0x58) [ 660.276017][ C1] r10:81c05450 r9:df805ebc r8:00000102 r7:ffffe488 r6:00000026 r5:00000000 [ 660.276030][ C1] r4:840fae40 [ 660.276038][ C1] [<809bc30c>] (gpiod_set_value_nocheck) from [<809bc3a0>] (gpiod_set_value+0x3c/0x88) [ 660.276065][ C1] [<809bc364>] (gpiod_set_value) from [<809ccb3c>] (gpio_led_set+0x5c/0x60) [ 660.276094][ C1] r5:832ff044 r4:832ff044 [ 660.276107][ C1] [<809ccae0>] (gpio_led_set) from [<809ca3d4>] (led_set_brightness_nosleep+0x38/0x44) [ 660.276136][ C1] r5:832ff044 r4:83818b8c [ 660.276144][ C1] [<809ca39c>] (led_set_brightness_nosleep) from [<809cd438>] (led_heartbeat_function+0x84/0x144) [ 660.276170][ C1] [<809cd3b4>] (led_heartbeat_function) from [<80327070>] (call_timer_fn+0x30/0x220) [ 660.276205][ C1] r7:ffffe488 r6:809cd3b4 r5:83818b8c r4:83216000 [ 660.276213][ C1] [<80327040>] (call_timer_fn) from [<80327524>] (__run_timers+0x2c4/0x3f8) [ 660.276248][ C1] r9:df805ebc r8:ffffe488 r7:00000000 r6:809cd3b4 r5:dddd9f00 r4:83818b8c [ 660.276257][ C1] [<80327260>] (__run_timers) from [<803276c0>] (run_timer_base+0x68/0x78) [ 660.276292][ C1] r10:83216000 r9:82804d80 r8:00000102 r7:00000001 r6:00000082 r5:00000002 [ 660.276302][ C1] r4:dddd9f00 [ 660.276310][ C1] [<80327658>] (run_timer_base) from [<803276ec>] (run_timer_softirq+0x1c/0x34) [ 660.276337][ C1] r4:82804084 [ 660.276345][ C1] [<803276d0>] (run_timer_softirq) from [<8025b65c>] (handle_softirqs+0x140/0x458) [ 660.276374][ C1] [<8025b51c>] (handle_softirqs) from [<8025bad0>] (__irq_exit_rcu+0x110/0x1d0) [ 660.276410][ C1] r10:00000000 r9:83216000 r8:00000000 r7:df865e08 r6:82443f98 r5:8247f0cc [ 660.276420][ C1] r4:83216000 [ 660.276428][ C1] [<8025b9c0>] (__irq_exit_rcu) from [<8025be48>] (irq_exit+0x10/0x18) [ 660.276457][ C1] r5:8247f0cc r4:826c3a9c [ 660.276465][ C1] [<8025be38>] (irq_exit) from [<81aad964>] (generic_handle_arch_irq+0x7c/0x80) [ 660.276496][ C1] [<81aad8e8>] (generic_handle_arch_irq) from [<81a7d904>] (call_with_stack+0x1c/0x20) [ 660.276532][ C1] r9:83216000 r8:83e9c288 r7:df865e3c r6:ffffffff r5:60000013 r4:809c822c [ 660.276542][ C1] [<81a7d8e8>] (call_with_stack) from [<80200bec>] (__irq_svc+0x8c/0xbc) [ 660.276569][ C1] Exception stack(0xdf865e08 to 0xdf865e50) [ 660.276593][ C1] 5e00: e020b008 00000009 0000990f 00000000 e020b008 00000009 [ 660.276612][ C1] 5e20: 00000001 840b9f68 83e9c288 840b9e40 00000000 df865e6c df865e58 df865e58 [ 660.276626][ C1] 5e40: 809c8228 809c822c 60000013 ffffffff [ 660.276637][ C1] [<809c820c>] (gpio_mmio_write32) from [<809c7a4c>] (gpio_mmio_set+0x64/0x80) [ 660.276696][ C1] r5:00000008 r4:840b9e40 [ 660.276706][ C1] [<809c79e8>] (gpio_mmio_set) from [<809b81e8>] (gpiochip_set+0x1c/0x44) [ 660.276742][ C1] r7:00000001 r6:00000000 r5:00000003 r4:840fae7c [ 660.276750][ C1] [<809b81cc>] (gpiochip_set) from [<809baab0>] (gpiod_set_raw_value_commit+0x78/0x218) [ 660.276778][ C1] [<809baa38>] (gpiod_set_raw_value_commit) from [<809bc350>] (gpiod_set_value_nocheck+0x44/0x58) [ 660.276812][ C1] r10:00000000 r9:00000000 r8:00000001 r7:ddde24c0 r6:83827fd8 r5:00000001 [ 660.276822][ C1] r4:840fae7c [ 660.276829][ C1] [<809bc30c>] (gpiod_set_value_nocheck) from [<809bc3a0>] (gpiod_set_value+0x3c/0x88) [ 660.276861][ C1] [<809bc364>] (gpiod_set_value) from [<809ccb3c>] (gpio_led_set+0x5c/0x60) [ 660.276889][ C1] r5:000000ff r4:832ff314 [ 660.276897][ C1] [<809ccae0>] (gpio_led_set) from [<809ca464>] (led_set_brightness+0x84/0x90) [ 660.276924][ C1] r5:000000ff r4:832ff314 [ 660.276934][ C1] [<809ca3e0>] (led_set_brightness) from [<809cbfe4>] (led_trigger_event+0x40/0x58) [ 660.276961][ C1] r5:000000ff r4:832ff314 [ 660.276970][ C1] [<809cbfa4>] (led_trigger_event) from [<809cd640>] (ledtrig_cpu+0xac/0xf4) [ 660.277001][ C1] r7:ddde24c0 r6:00000002 r5:82b15cd8 r4:000000fe [ 660.277011][ C1] [<809cd594>] (ledtrig_cpu) from [<80227a38>] (arch_cpu_idle_exit+0x14/0x18) [ 660.277046][ C1] r9:00000000 r8:00000001 r7:8280c710 r6:83216000 r5:8280c6d0 r4:00000001 [ 660.277057][ C1] [<80227a24>] (arch_cpu_idle_exit) from [<802b168c>] (do_idle+0x5c/0x2d8) [ 660.277089][ C1] [<802b1630>] (do_idle) from [<802b1c38>] (cpu_startup_entry+0x30/0x34) [ 660.277129][ C1] r10:00000000 r9:414fc0f0 r8:80003000 r7:82a7b4a4 r6:83216000 r5:00000001 [ 660.277139][ C1] r4:00000092 [ 660.277147][ C1] [<802b1c08>] (cpu_startup_entry) from [<8022f360>] (secondary_start_kernel+0x128/0x194) [ 660.277180][ C1] [<8022f238>] (secondary_start_kernel) from [<80220094>] (__enable_mmu+0x0/0xc) [ 660.277216][ C1] r7:82a7b4a4 r6:30c0387d r5:00000000 r4:830b7bc0 [ 660.278705][ C0] Kernel panic - not syncing: softlockup: hung tasks [ 660.313671][ C0] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Tainted: G L syzkaller #0 PREEMPT [ 660.314168][ C0] Tainted: [L]=SOFTLOCKUP [ 660.314369][ C0] Hardware name: ARM-Versatile Express [ 660.314618][ C0] Call trace: [ 660.314919][ C0] [<80201a74>] (dump_backtrace) from [<80201b70>] (show_stack+0x18/0x1c) [ 660.315299][ C0] r7:822965a4 r6:8281b500 r5:00000000 r4:82295754 [ 660.315551][ C0] [<80201b58>] (show_stack) from [<8021ee08>] (dump_stack_lvl+0x54/0x7c) [ 660.315945][ C0] [<8021edb4>] (dump_stack_lvl) from [<8021ee48>] (dump_stack+0x18/0x1c) [ 660.316297][ C0] r5:00000000 r4:82a7bd14 [ 660.316485][ C0] [<8021ee30>] (dump_stack) from [<80202648>] (vpanic+0xe0/0x2e8) [ 660.316858][ C0] [<80202568>] (vpanic) from [<80202884>] (trace_suspend_resume+0x0/0xd8) [ 660.317212][ C0] r7:82ac27f8 [ 660.317377][ C0] [<80202850>] (panic) from [<80383fcc>] (watchdog_timer_fn+0x2dc/0x350) [ 660.317732][ C0] r3:00000001 r2:00004000 r1:82a7bd1c r0:822965a4 [ 660.317976][ C0] [<80383cf0>] (watchdog_timer_fn) from [<80329c64>] (__hrtimer_run_queues+0x1c4/0x454) [ 660.318445][ C0] r10:8281b500 r9:00000000 r8:dddc7130 r7:80383cf0 r6:dddc7000 r5:dddc7040 [ 660.318768][ C0] r4:dddc75d8 [ 660.318944][ C0] [<80329aa0>] (__hrtimer_run_queues) from [<8032b268>] (hrtimer_interrupt+0x148/0x2bc) [ 660.319325][ C0] r10:b6ff3a70 r9:dddc7180 r8:dddc7130 r7:00000099 r6:00000003 r5:20000193 [ 660.319606][ C0] r4:dddc7000 [ 660.319784][ C0] [<8032b120>] (hrtimer_interrupt) from [<813408e0>] (arch_timer_handler_virt+0x30/0x38) [ 660.320168][ C0] r10:81d0fc78 r9:8309e400 r8:00000000 r7:00000000 r6:00000000 r5:82498528 [ 660.320447][ C0] r4:8309de40 [ 660.320589][ C0] [<813408b0>] (arch_timer_handler_virt) from [<802efab4>] (handle_percpu_devid_irq+0x128/0x34c) [ 660.320999][ C0] [<802ef98c>] (handle_percpu_devid_irq) from [<802e8c44>] (handle_irq_desc+0x74/0x84) [ 660.321400][ C0] r10:00000001 r9:8281b500 r8:00000000 r7:df80a00c r6:826c2388 r5:df80a000 [ 660.321703][ C0] r4:8280cc44 [ 660.321862][ C0] [<802e8bd0>] (handle_irq_desc) from [<802e8cc0>] (generic_handle_domain_irq+0x18/0x1c) [ 660.322241][ C0] [<802e8ca8>] (generic_handle_domain_irq) from [<802012c8>] (gic_handle_irq+0x68/0x7c) [ 660.322593][ C0] [<80201260>] (gic_handle_irq) from [<81aad948>] (generic_handle_arch_irq+0x60/0x80) [ 660.322967][ C0] r7:82801b90 r6:82443f98 r5:8247f0cc r4:826c3a9c [ 660.323203][ C0] [<81aad8e8>] (generic_handle_arch_irq) from [<80200bdc>] (__irq_svc+0x7c/0xbc) [ 660.323553][ C0] Exception stack(0x82801b90 to 0x82801bd8) [ 660.323820][ C0] 1b80: ddddb488 00000000 ffffffff 0000f5db [ 660.324136][ C0] 1ba0: 830bf380 830bf3b0 82801cb8 ddddb488 00000001 8280c9a4 00000001 82801bec [ 660.324441][ C0] 1bc0: 82801bf0 82801be0 80346ea4 81abbd3c 60000113 ffffffff [ 660.324713][ C0] r9:8281b500 r8:00000001 r7:82801bc4 r6:ffffffff r5:60000113 r4:81abbd3c [ 660.325010][ C0] [<81abbd14>] (_raw_spin_unlock_irq) from [<80346ea4>] (tmigr_handle_remote_up+0x218/0x4b0) [ 660.325399][ C0] [<80346c8c>] (tmigr_handle_remote_up) from [<803451a4>] (__walk_groups_from+0x3c/0xe4) [ 660.325792][ C0] r10:8281b500 r9:8280c820 r8:80346c8c r7:82801cb8 r6:830bf380 r5:00000002 [ 660.326098][ C0] r4:830bf380 [ 660.326257][ C0] [<80345168>] (__walk_groups_from) from [<8034753c>] (tmigr_handle_remote+0xe8/0x108) [ 660.326645][ C0] r9:82804d80 r8:00000102 r7:00000001 r6:00000002 r5:00000002 r4:dddc7488 [ 660.326939][ C0] [<80347454>] (tmigr_handle_remote) from [<80327700>] (run_timer_softirq+0x30/0x34) [ 660.327315][ C0] r4:82804084 [ 660.327472][ C0] [<803276d0>] (run_timer_softirq) from [<8025b65c>] (handle_softirqs+0x140/0x458) [ 660.327856][ C0] [<8025b51c>] (handle_softirqs) from [<8025bad0>] (__irq_exit_rcu+0x110/0x1d0) [ 660.328248][ C0] r10:00000000 r9:8281b500 r8:00000000 r7:82801dd8 r6:82443f98 r5:8247f0cc [ 660.328528][ C0] r4:8281b500 [ 660.328668][ C0] [<8025b9c0>] (__irq_exit_rcu) from [<8025be48>] (irq_exit+0x10/0x18) [ 660.328958][ C0] r5:8247f0cc r4:826c3a9c [ 660.329113][ C0] [<8025be38>] (irq_exit) from [<81aad964>] (generic_handle_arch_irq+0x7c/0x80) [ 660.329412][ C0] [<81aad8e8>] (generic_handle_arch_irq) from [<80200bdc>] (__irq_svc+0x7c/0xbc) [ 660.329730][ C0] Exception stack(0x82801dd8 to 0x82801e20) [ 660.329962][ C0] 1dc0: 00000001 00000000 [ 660.330256][ C0] 1de0: 00009911 0000990f 840b9f68 00000004 00000001 840b9f68 83e9c288 840b9e40 [ 660.330565][ C0] 1e00: 00000000 82801e3c 82801e28 82801e28 81abbecc 81abbef4 80000013 ffffffff [ 660.330891][ C0] r9:8281b500 r8:83e9c288 r7:82801e0c r6:ffffffff r5:80000013 r4:81abbef4 [ 660.331161][ C0] [<81abbeb4>] (_raw_spin_lock) from [<809c7a2c>] (gpio_mmio_set+0x44/0x80) [ 660.331494][ C0] r5:00000004 r4:840b9e40 [ 660.331675][ C0] [<809c79e8>] (gpio_mmio_set) from [<809b81e8>] (gpiochip_set+0x1c/0x44) [ 660.332050][ C0] r7:00000001 r6:00000000 r5:00000002 r4:840fae68 [ 660.332277][ C0] [<809b81cc>] (gpiochip_set) from [<809baab0>] (gpiod_set_raw_value_commit+0x78/0x218) [ 660.332615][ C0] [<809baa38>] (gpiod_set_raw_value_commit) from [<809bc350>] (gpiod_set_value_nocheck+0x44/0x58) [ 660.333007][ C0] r10:00000000 r9:00000000 r8:00000001 r7:dddce4c0 r6:83827f98 r5:00000001 [ 660.333285][ C0] r4:840fae68 [ 660.333429][ C0] [<809bc30c>] (gpiod_set_value_nocheck) from [<809bc3a0>] (gpiod_set_value+0x3c/0x88) [ 660.333797][ C0] [<809bc364>] (gpiod_set_value) from [<809ccb3c>] (gpio_led_set+0x5c/0x60) [ 660.334155][ C0] r5:000000ff r4:832ff224 [ 660.334338][ C0] [<809ccae0>] (gpio_led_set) from [<809ca464>] (led_set_brightness+0x84/0x90) [ 660.334695][ C0] r5:000000ff r4:832ff224 [ 660.334892][ C0] [<809ca3e0>] (led_set_brightness) from [<809cbfe4>] (led_trigger_event+0x40/0x58) [ 660.335244][ C0] r5:000000ff r4:832ff224 [ 660.335433][ C0] [<809cbfa4>] (led_trigger_event) from [<809cd640>] (ledtrig_cpu+0xac/0xf4) [ 660.335828][ C0] r7:dddce4c0 r6:00000002 r5:82b15cd8 r4:000001fd [ 660.336084][ C0] [<809cd594>] (ledtrig_cpu) from [<80227a38>] (arch_cpu_idle_exit+0x14/0x18) [ 660.336448][ C0] r9:00000000 r8:00000000 r7:8280c710 r6:8281b500 r5:8280c6d0 r4:00000000 [ 660.336777][ C0] [<80227a24>] (arch_cpu_idle_exit) from [<802b168c>] (do_idle+0x5c/0x2d8) [ 660.337136][ C0] [<802b1630>] (do_idle) from [<802b1c38>] (cpu_startup_entry+0x30/0x34) [ 660.337488][ C0] r10:8281aff4 r9:8280c680 r8:823bec64 r7:00000000 r6:deffc06c r5:828222e8 [ 660.337834][ C0] r4:000000ed [ 660.337984][ C0] [<802b1c08>] (cpu_startup_entry) from [<81aaf37c>] (kernel_init+0x0/0x138) [ 660.338336][ C0] [<81aaf29c>] (rest_init) from [<8260145c>] (start_kernel+0x844/0x860) [ 660.338688][ C0] [<82600c18>] (start_kernel) from [<00000000>] (0x0) [ 660.341203][ C0] Rebooting in 86400 seconds..