last executing test programs: 2.121109711s ago: executing program 1 (id=1619): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg$unix(r0, &(0x7f0000001900)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}], 0x1, 0x0, 0x0) ioctl$PIO_UNIMAP(r2, 0x5452, &(0x7f00000003c0)={0x0, 0x0}) 732.462037ms ago: executing program 1 (id=1627): r0 = openat$ubi_ctrl(0xffffff9c, &(0x7f0000001540), 0x288200, 0x0) close(r0) socket$nl_audit(0x10, 0x3, 0x9) sendmsg$RDMA_NLDEV_CMD_GET_CHARDEV(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000003c0)={0x10, 0x140f, 0x8, 0x70bd27, 0x25dfdbfd}, 0x10}, 0x1, 0x0, 0x0, 0x1}, 0x20000000) 636.452219ms ago: executing program 1 (id=1629): r0 = openat$zero(0xffffff9c, &(0x7f0000000300), 0x0, 0x0) close_range(r0, r0, 0x2) syz_genetlink_get_family_id$mptcp(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_CHANNELS_SET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x14, 0x0, 0x0, 0x70bd25, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x64}, 0x8000) 532.379642ms ago: executing program 1 (id=1631): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180), 0x20442, 0x0) r2 = fcntl$dupfd(r1, 0x406, r0) ioctl$BTRFS_IOC_LOGICAL_INO_V2(r2, 0xc038943b, 0x0) 461.732071ms ago: executing program 0 (id=1626): r0 = openat$dlm_monitor(0xffffff9c, &(0x7f00000001c0), 0x40, 0x0) close(r0) socket(0x1d, 0x2, 0x6) ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f0000000140)) 454.686242ms ago: executing program 1 (id=1633): r0 = openat$null(0xffffffffffffff9c, &(0x7f00000002c0), 0x91a2f0007feb3929, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) sendmsg$BATADV_CMD_GET_VLAN(r0, &(0x7f00000011c0)={0x0, 0x0, &(0x7f0000001180)={0x0}, 0x1, 0x0, 0x0, 0x20008800}, 0x4000810) 379.797672ms ago: executing program 0 (id=1628): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000300)=0xc) r2 = getpgid(0x0) tgkill(r1, r2, 0x0) 269.893646ms ago: executing program 0 (id=1630): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000540)={0x26, 'hash\x00', 0x0, 0x0, 'nhpoly1305\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$IPSET_CMD_HEADER(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x1, 0x0, 0x0, 0x8000}, 0x80) 258.125097ms ago: executing program 1 (id=1636): mknod(&(0x7f0000000140)='./file0\x00', 0x1000, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) capset(0x0, 0x0) syz_open_dev$amidi(&(0x7f0000000140), 0x2, 0x181) 170.147588ms ago: executing program 0 (id=1632): r0 = openat$mice(0xffffff9c, &(0x7f0000000280), 0x709080) close(r0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) read$usbmon(r0, 0x0, 0x0) 81.31159ms ago: executing program 0 (id=1634): r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000100)='\x00', 0x89901) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_SET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={0x0}, 0x1, 0x0, 0x0, 0x40001}, 0x800) 0s ago: executing program 0 (id=1635): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='freezer.state\x00', 0x275a, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x28140, 0xdf) r2 = dup3(r1, r0, 0x0) read$hiddev(r2, 0x0, 0x0) kernel console output (not intermixed with test programs): [ 47.927411][ T29] audit: type=1400 audit(47.820:56): avc: denied { read write } for pid=3086 comm="sftp-server" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 47.930624][ T29] audit: type=1400 audit(47.830:57): avc: denied { open } for pid=3086 comm="sftp-server" path="/dev/null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 Warning: Permanently added '[localhost]:30719' (ED25519) to the list of known hosts. [ 64.214825][ T29] audit: type=1400 audit(64.120:58): avc: denied { name_bind } for pid=3089 comm="sshd-session" src=30000 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 65.850877][ T29] audit: type=1400 audit(65.760:59): avc: denied { execute } for pid=3090 comm="sh" name="syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 65.861694][ T29] audit: type=1400 audit(65.770:60): avc: denied { execute_no_trans } for pid=3090 comm="sh" path="/syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 69.955237][ T29] audit: type=1400 audit(69.870:61): avc: denied { mounton } for pid=3090 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=806 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 69.959786][ T29] audit: type=1400 audit(69.870:62): avc: denied { mount } for pid=3090 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 69.980147][ T3090] cgroup: Unknown subsys name 'net' [ 69.989487][ T29] audit: type=1400 audit(69.900:63): avc: denied { unmount } for pid=3090 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 70.273038][ T3090] cgroup: Unknown subsys name 'cpuset' [ 70.280379][ T3090] cgroup: Unknown subsys name 'hugetlb' [ 70.281257][ T3090] cgroup: Unknown subsys name 'rlimit' [ 70.504367][ T29] audit: type=1400 audit(70.410:64): avc: denied { setattr } for pid=3090 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 70.506049][ T29] audit: type=1400 audit(70.420:65): avc: denied { mounton } for pid=3090 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 70.507078][ T29] audit: type=1400 audit(70.420:66): avc: denied { mount } for pid=3090 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 70.689571][ T3092] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 70.692963][ T29] audit: type=1400 audit(70.600:67): avc: denied { relabelto } for pid=3092 comm="mkswap" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 70.698886][ T29] audit: type=1400 audit(70.610:68): avc: denied { write } for pid=3092 comm="mkswap" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 70.730514][ T29] audit: type=1400 audit(70.640:69): avc: denied { read } for pid=3090 comm="syz-executor" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 70.732721][ T29] audit: type=1400 audit(70.640:70): avc: denied { open } for pid=3090 comm="syz-executor" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 79.004683][ T3090] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 80.685223][ T29] audit: type=1400 audit(80.600:71): avc: denied { execmem } for pid=3093 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 80.748970][ T29] audit: type=1400 audit(80.660:72): avc: denied { read } for pid=3095 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 80.751543][ T29] audit: type=1400 audit(80.660:73): avc: denied { open } for pid=3095 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 80.758249][ T29] audit: type=1400 audit(80.670:74): avc: denied { mounton } for pid=3095 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 80.785019][ T29] audit: type=1400 audit(80.700:75): avc: denied { module_request } for pid=3095 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 80.868383][ T29] audit: type=1400 audit(80.780:76): avc: denied { sys_module } for pid=3095 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 81.564686][ T29] audit: type=1400 audit(81.470:77): avc: denied { ioctl } for pid=3095 comm="syz-executor" path="/dev/net/tun" dev="devtmpfs" ino=677 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 82.621928][ T3096] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 82.631088][ T3096] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 82.761528][ T3095] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 82.770999][ T3095] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 83.356795][ T3096] hsr_slave_0: entered promiscuous mode [ 83.358681][ T3096] hsr_slave_1: entered promiscuous mode [ 83.499499][ T3095] hsr_slave_0: entered promiscuous mode [ 83.501160][ T3095] hsr_slave_1: entered promiscuous mode [ 83.503569][ T3095] debugfs: 'hsr0' already exists in 'hsr' [ 83.504825][ T3095] Cannot create hsr debugfs directory [ 83.764942][ T29] audit: type=1400 audit(83.670:78): avc: denied { create } for pid=3096 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 83.772118][ T29] audit: type=1400 audit(83.680:79): avc: denied { write } for pid=3096 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 83.774893][ T29] audit: type=1400 audit(83.680:80): avc: denied { read } for pid=3096 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 83.788910][ T3096] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 83.800738][ T3096] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 83.810557][ T3096] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 83.825613][ T3096] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 83.901979][ T3095] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 83.913063][ T3095] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 83.918358][ T3095] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 83.928044][ T3095] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 84.595604][ T3096] 8021q: adding VLAN 0 to HW filter on device bond0 [ 84.665928][ T3095] 8021q: adding VLAN 0 to HW filter on device bond0 [ 87.508900][ T3096] veth0_vlan: entered promiscuous mode [ 87.549903][ T3096] veth1_vlan: entered promiscuous mode [ 87.558273][ T3095] veth0_vlan: entered promiscuous mode [ 87.598832][ T3095] veth1_vlan: entered promiscuous mode [ 87.641642][ T3096] veth0_macvtap: entered promiscuous mode [ 87.657269][ T3096] veth1_macvtap: entered promiscuous mode [ 87.730853][ T3095] veth0_macvtap: entered promiscuous mode [ 87.758586][ T1417] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 87.760237][ T1417] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 87.771525][ T1417] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 87.790087][ T1417] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 87.792087][ T3095] veth1_macvtap: entered promiscuous mode [ 87.916804][ T29] audit: type=1400 audit(87.830:81): avc: denied { mount } for pid=3096 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 87.920701][ T29] audit: type=1400 audit(87.830:82): avc: denied { mounton } for pid=3096 comm="syz-executor" path="/syzkaller.6zqWkB/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 87.928708][ T29] audit: type=1400 audit(87.840:83): avc: denied { mount } for pid=3096 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 87.940874][ T29] audit: type=1400 audit(87.850:84): avc: denied { mounton } for pid=3096 comm="syz-executor" path="/syzkaller.6zqWkB/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 87.950791][ T29] audit: type=1400 audit(87.860:85): avc: denied { mounton } for pid=3096 comm="syz-executor" path="/syzkaller.6zqWkB/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=3170 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 87.956943][ T1417] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 87.957157][ T1417] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 87.957272][ T1417] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 87.957315][ T1417] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 88.007740][ T29] audit: type=1400 audit(87.920:86): avc: denied { unmount } for pid=3096 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 88.022788][ T29] audit: type=1400 audit(87.930:87): avc: denied { mounton } for pid=3096 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=772 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 88.032908][ T29] audit: type=1400 audit(87.940:88): avc: denied { mount } for pid=3096 comm="syz-executor" name="/" dev="gadgetfs" ino=2271 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 88.046361][ T29] audit: type=1400 audit(87.950:89): avc: denied { mount } for pid=3096 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 88.048626][ T29] audit: type=1400 audit(87.960:90): avc: denied { mounton } for pid=3096 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 88.110045][ T3096] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 92.994236][ T29] kauditd_printk_skb: 7 callbacks suppressed [ 92.996319][ T29] audit: type=1400 audit(92.900:98): avc: denied { create } for pid=3749 comm="syz.0.21" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 93.001692][ T29] audit: type=1400 audit(92.910:99): avc: denied { bind } for pid=3749 comm="syz.0.21" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 93.008666][ T29] audit: type=1400 audit(92.920:100): avc: denied { accept } for pid=3749 comm="syz.0.21" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 93.019373][ T29] audit: type=1400 audit(92.920:101): avc: denied { write } for pid=3749 comm="syz.0.21" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 93.192663][ T3758] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=261 sclass=netlink_route_socket pid=3758 comm=syz.1.24 [ 93.200599][ T29] audit: type=1400 audit(93.110:102): avc: denied { create } for pid=3757 comm="syz.0.25" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 93.210644][ T29] audit: type=1400 audit(93.120:103): avc: denied { write } for pid=3757 comm="syz.0.25" path="socket:[3253]" dev="sockfs" ino=3253 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 93.558694][ T29] audit: type=1400 audit(93.470:104): avc: denied { create } for pid=3772 comm="syz.1.32" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 93.565246][ T29] audit: type=1400 audit(93.480:105): avc: denied { ioctl } for pid=3772 comm="syz.1.32" path="socket:[2417]" dev="sockfs" ino=2417 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 93.570649][ T29] audit: type=1400 audit(93.480:106): avc: denied { bind } for pid=3772 comm="syz.1.32" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 93.578452][ T29] audit: type=1400 audit(93.490:107): avc: denied { write } for pid=3772 comm="syz.1.32" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 93.588827][ T3775] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3775 comm=syz.0.33 [ 93.919784][ T3791] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3791 comm=syz.0.41 [ 94.338876][ T3812] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3812 comm=syz.1.52 [ 95.604770][ T3858] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3858 comm=syz.0.73 [ 96.023508][ T3878] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3878 comm=syz.1.83 [ 97.548784][ T3935] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3935 comm=syz.1.111 [ 98.519283][ T29] kauditd_printk_skb: 15 callbacks suppressed [ 98.520931][ T29] audit: type=1400 audit(98.430:123): avc: denied { create } for pid=3972 comm="syz.1.131" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 98.525689][ T29] audit: type=1400 audit(98.440:124): avc: denied { write } for pid=3972 comm="syz.1.131" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 98.987292][ T29] audit: type=1400 audit(98.900:125): avc: denied { name_bind } for pid=3992 comm="syz.1.140" src=20004 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 99.103340][ T3998] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=3998 comm=syz.1.142 [ 99.419102][ T29] audit: type=1400 audit(99.320:126): avc: denied { ioctl } for pid=4010 comm="syz.0.150" path="socket:[2915]" dev="sockfs" ino=2915 ioctlcmd=0x705 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 100.941621][ T29] audit: type=1400 audit(100.850:127): avc: denied { setopt } for pid=4030 comm="syz.1.158" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 102.949936][ T29] audit: type=1400 audit(102.860:128): avc: denied { getopt } for pid=4087 comm="syz.1.187" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 103.079902][ T29] audit: type=1400 audit(102.980:129): avc: denied { create } for pid=4092 comm="syz.1.189" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 103.080260][ T29] audit: type=1400 audit(102.990:130): avc: denied { bind } for pid=4092 comm="syz.1.189" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 103.082359][ T29] audit: type=1400 audit(102.990:131): avc: denied { node_bind } for pid=4092 comm="syz.1.189" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 [ 103.099261][ T29] audit: type=1400 audit(103.010:132): avc: denied { read } for pid=4092 comm="syz.1.189" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 103.343088][ T4105] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=4105 comm=syz.1.195 [ 103.830438][ T4121] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4121 comm=syz.0.203 [ 103.969951][ T29] audit: type=1400 audit(103.880:133): avc: denied { read } for pid=4122 comm="syz.0.204" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 104.695839][ T29] audit: type=1400 audit(104.610:134): avc: denied { map_create } for pid=4141 comm="syz.1.213" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 104.702269][ T29] audit: type=1400 audit(104.610:135): avc: denied { map_read map_write } for pid=4141 comm="syz.1.213" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 104.708938][ T29] audit: type=1400 audit(104.620:136): avc: denied { prog_load } for pid=4141 comm="syz.1.213" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 104.709359][ T29] audit: type=1400 audit(104.620:137): avc: denied { bpf } for pid=4141 comm="syz.1.213" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 104.713527][ T29] audit: type=1400 audit(104.620:138): avc: denied { perfmon } for pid=4141 comm="syz.1.213" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 104.756257][ T29] audit: type=1400 audit(104.670:139): avc: denied { prog_run } for pid=4141 comm="syz.1.213" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 109.453521][ T29] audit: type=1400 audit(109.360:140): avc: denied { write } for pid=4175 comm="syz.0.229" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=socket permissive=1 [ 109.466359][ T29] audit: type=1400 audit(109.380:141): avc: denied { read } for pid=4175 comm="syz.0.229" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=socket permissive=1 [ 110.278559][ T4186] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4186 comm=syz.0.234 [ 117.521935][ T29] audit: type=1400 audit(117.430:142): avc: denied { write } for pid=4242 comm="syz.0.261" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 117.902455][ T4255] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=4255 comm=syz.0.267 [ 118.062562][ T29] audit: type=1400 audit(117.970:143): avc: denied { sqpoll } for pid=4258 comm="syz.0.269" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 119.211488][ T29] audit: type=1400 audit(119.120:144): avc: denied { connect } for pid=4292 comm="syz.1.286" lport=256 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 119.226748][ T29] audit: type=1400 audit(119.140:145): avc: denied { write } for pid=4292 comm="syz.1.286" laddr=127.0.0.1 lport=256 faddr=127.0.0.1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 119.705147][ T29] audit: type=1400 audit(119.590:146): avc: denied { getopt } for pid=4292 comm="syz.1.286" laddr=127.0.0.1 lport=256 faddr=127.0.0.1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 119.810732][ T4307] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4307 comm=syz.0.293 [ 120.119481][ T4320] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4320 comm=syz.0.299 [ 120.358002][ T29] audit: type=1400 audit(120.270:147): avc: denied { ioctl } for pid=4329 comm="syz.1.304" path="socket:[4525]" dev="sockfs" ino=4525 ioctlcmd=0x894c scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 121.011958][ T4358] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4358 comm=syz.0.318 [ 122.278621][ T4383] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=4383 comm=syz.1.330 [ 122.567266][ T4389] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1546 sclass=netlink_route_socket pid=4389 comm=syz.1.333 [ 128.466396][ T4494] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=4494 comm=syz.0.382 [ 130.546520][ T4513] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 132.761899][ T29] audit: type=1400 audit(132.670:148): avc: denied { create } for pid=4564 comm="syz.1.416" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 132.771183][ T29] audit: type=1400 audit(132.680:149): avc: denied { write } for pid=4564 comm="syz.1.416" path="socket:[5532]" dev="sockfs" ino=5532 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 133.023120][ T4571] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=2306 sclass=netlink_tcpdiag_socket pid=4571 comm=syz.1.419 [ 133.612515][ T29] audit: type=1400 audit(133.520:150): avc: denied { create } for pid=4585 comm="syz.1.426" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 135.547326][ T4628] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4628 comm=syz.1.446 [ 135.736506][ T29] audit: type=1400 audit(135.650:151): avc: denied { ioctl } for pid=4634 comm="syz.1.450" path="socket:[5646]" dev="sockfs" ino=5646 ioctlcmd=0x9426 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 136.203011][ T29] audit: type=1400 audit(136.110:152): avc: denied { setattr } for pid=4652 comm="syz.1.459" name="" dev="pipefs" ino=779 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=1 [ 136.303569][ T4659] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4659 comm=syz.1.462 [ 136.854967][ T4683] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4683 comm=syz.0.472 [ 136.922800][ T29] audit: type=1400 audit(136.830:153): avc: denied { nlmsg_tty_audit } for pid=4684 comm="syz.1.473" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 136.951095][ T29] audit: type=1400 audit(136.860:154): avc: denied { create } for pid=4686 comm="syz.0.474" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 137.601485][ T4721] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=5135 sclass=netlink_audit_socket pid=4721 comm=syz.0.487 [ 137.719717][ T29] audit: type=1400 audit(137.630:155): avc: denied { setopt } for pid=4725 comm="syz.1.490" lport=1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 147.279113][ T29] audit: type=1400 audit(147.190:156): avc: denied { write } for pid=4859 comm="syz.0.555" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 148.257427][ T4899] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4899 comm=syz.0.571 [ 149.115372][ T4920] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4920 comm=syz.0.581 [ 150.203031][ T29] audit: type=1400 audit(150.110:157): avc: denied { create } for pid=4943 comm="syz.0.593" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 150.209213][ T29] audit: type=1400 audit(150.120:158): avc: denied { write } for pid=4943 comm="syz.0.593" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 150.820022][ T29] audit: type=1400 audit(150.730:159): avc: denied { mount } for pid=4965 comm="syz.0.603" name="/" dev="devpts" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:devpts_t tclass=filesystem permissive=1 [ 150.835910][ T29] audit: type=1400 audit(150.750:160): avc: denied { remount } for pid=4965 comm="syz.0.603" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:devpts_t tclass=filesystem permissive=1 [ 150.854913][ T29] audit: type=1400 audit(150.770:161): avc: denied { unmount } for pid=3095 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:devpts_t tclass=filesystem permissive=1 [ 152.055180][ T29] audit: type=1400 audit(151.940:162): avc: denied { setopt } for pid=4990 comm="syz.1.616" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 152.076485][ T29] audit: type=1400 audit(151.990:163): avc: denied { map } for pid=4990 comm="syz.1.616" path="socket:[6884]" dev="sockfs" ino=6884 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 152.078902][ T29] audit: type=1400 audit(151.990:164): avc: denied { read } for pid=4990 comm="syz.1.616" path="socket:[6884]" dev="sockfs" ino=6884 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 152.338302][ T29] audit: type=1400 audit(152.250:165): avc: denied { ioctl } for pid=4992 comm="syz.0.617" path="net:[4026532654]" dev="nsfs" ino=4026532654 ioctlcmd=0xb703 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 152.759896][ T29] audit: type=1400 audit(152.670:166): avc: denied { remount } for pid=4997 comm="syz.1.620" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 152.779400][ T29] audit: type=1400 audit(152.690:167): avc: denied { unmount } for pid=3096 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 154.657491][ T5022] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5131 sclass=netlink_route_socket pid=5022 comm=syz.1.630 [ 157.985031][ T5059] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=5059 comm=syz.0.649 [ 159.549403][ T5102] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1001 sclass=netlink_route_socket pid=5102 comm=syz.1.670 [ 164.150560][ T5177] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5177 comm=syz.0.706 [ 170.086771][ T29] audit: type=1400 audit(170.000:168): avc: denied { read } for pid=5253 comm="syz.1.741" name="binder-control" dev="binder" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 170.088500][ T29] audit: type=1400 audit(170.000:169): avc: denied { open } for pid=5253 comm="syz.1.741" path="/dev/binderfs/binder-control" dev="binder" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 170.091533][ T29] audit: type=1400 audit(170.000:170): avc: denied { ioctl } for pid=5253 comm="syz.1.741" path="/dev/binderfs/binder-control" dev="binder" ino=2 ioctlcmd=0xaf30 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 170.194897][ T5260] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5260 comm=syz.1.744 [ 170.455139][ T5275] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5275 comm=syz.1.751 [ 173.142693][ T5366] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5366 comm=syz.1.796 [ 174.797799][ T5390] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5390 comm=syz.1.807 [ 175.282164][ T5412] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5412 comm=syz.1.819 [ 175.617720][ T5425] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5425 comm=syz.0.824 [ 175.910015][ T5437] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5437 comm=syz.0.831 [ 176.133491][ T5445] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1012 sclass=netlink_route_socket pid=5445 comm=syz.0.838 [ 178.992661][ T5561] raw_sendmsg: syz.1.892 forgot to set AF_INET. Fix it! [ 183.466134][ T5631] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5631 comm=syz.0.926 [ 183.809514][ T5646] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5646 comm=syz.0.933 [ 184.075965][ T29] audit: type=1400 audit(183.990:171): avc: denied { getopt } for pid=5656 comm="syz.0.938" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 185.045231][ T5700] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5700 comm=syz.0.959 [ 185.136258][ T29] audit: type=1400 audit(185.050:172): avc: denied { getopt } for pid=5703 comm="syz.1.962" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 185.298116][ T29] audit: type=1400 audit(185.210:173): avc: denied { create } for pid=5710 comm="syz.1.965" name="file5" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 185.330349][ T29] audit: type=1400 audit(185.240:174): avc: denied { unlink } for pid=3096 comm="syz-executor" name="file5" dev="tmpfs" ino=2421 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 185.483061][ T5719] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5719 comm=syz.1.969 [ 189.698629][ T5817] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2561 sclass=netlink_route_socket pid=5817 comm=syz.0.1020 [ 190.645588][ T5853] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=5853 comm=syz.0.1034 [ 191.376255][ T5887] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=5887 comm=syz.0.1051 [ 194.175510][ T5900] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5900 comm=syz.1.1057 [ 199.187151][ T5945] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5945 comm=syz.1.1077 [ 206.639151][ T6038] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6038 comm=syz.1.1122 [ 206.909869][ T6048] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6048 comm=syz.0.1131 [ 211.568270][ T29] audit: type=1400 audit(211.480:175): avc: denied { write } for pid=6093 comm="syz.0.1154" name="psched" dev="proc" ino=4026532664 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 216.131317][ T29] audit: type=1400 audit(216.040:176): avc: denied { setopt } for pid=6186 comm="syz.1.1196" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 216.410603][ T6193] Zero length message leads to an empty skb [ 216.573524][ T6197] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=6197 comm=syz.1.1201 [ 219.269764][ T29] audit: type=1400 audit(219.180:177): avc: denied { mounton } for pid=6201 comm="syz.1.1203" path="/615/file0" dev="tmpfs" ino=3160 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 224.600620][ T6228] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=6228 comm=syz.1.1214 [ 225.494154][ C0] hrtimer: interrupt took 569776 ns [ 235.539667][ T6325] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=6325 comm=syz.1.1261 [ 235.873272][ T6332] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6332 comm=syz.1.1264 [ 236.844674][ T6362] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6362 comm=syz.1.1278 [ 238.286051][ T6407] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6407 comm=syz.1.1300 [ 238.772321][ T6425] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6425 comm=syz.1.1309 [ 239.231941][ T6442] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6442 comm=syz.1.1317 [ 239.806706][ T6462] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6462 comm=syz.1.1327 [ 241.040930][ T6508] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=6508 comm=syz.0.1349 [ 241.183498][ T6514] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=6514 comm=syz.1.1356 [ 241.572615][ T6531] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=6531 comm=syz.0.1360 [ 245.117399][ T6590] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=6590 comm=syz.1.1388 [ 247.706975][ T6607] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=6607 comm=syz.0.1396 [ 248.139594][ T6619] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=6619 comm=syz.0.1402 [ 250.576835][ T6632] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=6632 comm=syz.1.1407 [ 263.350703][ T6795] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=6795 comm=syz.1.1487 [ 267.015924][ T6876] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6876 comm=syz.1.1520 [ 267.481389][ T6890] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6890 comm=syz.0.1530 [ 268.669641][ T6934] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1546 sclass=netlink_route_socket pid=6934 comm=syz.0.1548 [ 269.089213][ T6950] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=6950 comm=syz.0.1555 [ 274.021177][ T7010] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=2306 sclass=netlink_tcpdiag_socket pid=7010 comm=syz.0.1586 [ 274.806780][ T7035] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7035 comm=syz.0.1598 [ 279.446642][ T7088] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=5135 sclass=netlink_audit_socket pid=7088 comm=syz.1.1627 [ 726.294303][ C0] watchdog: BUG: soft lockup - CPU#0 stuck for 430s! [swapper/0:0] [ 726.294668][ C0] Modules linked in: [ 726.295515][ C0] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Not tainted syzkaller #0 PREEMPT [ 726.295686][ C0] Hardware name: ARM-Versatile Express [ 726.295918][ C0] PC is at _raw_spin_unlock_irq+0x28/0x54 [ 726.296121][ C0] LR is at tmigr_handle_remote_up+0x218/0x4b0 [ 726.296221][ C0] pc : [<81abb53c>] lr : [<80346da4>] psr: 60000113 [ 726.296270][ C0] sp : 82801be0 ip : 82801bf0 fp : 82801bec [ 726.296309][ C0] r10: 00000001 r9 : 8280c9a4 r8 : 00000001 [ 726.296364][ C0] r7 : ddddb488 r6 : 82801cb8 r5 : 830bf3b0 r4 : 830bf380 [ 726.296411][ C0] r3 : 00003c32 r2 : ffffffff r1 : 00000000 r0 : ddddb488 [ 726.296531][ C0] Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment user [ 726.296610][ C0] Control: 30c5387d Table: 859926c0 DAC: fffffffd [ 726.296723][ C0] Call trace: [ 726.297017][ C0] [<81abb514>] (_raw_spin_unlock_irq) from [<80346da4>] (tmigr_handle_remote_up+0x218/0x4b0) [ 726.297343][ C0] [<80346b8c>] (tmigr_handle_remote_up) from [<803450a4>] (__walk_groups_from+0x3c/0xe4) [ 726.297483][ C0] r10:8281b500 r9:8280c820 r8:80346b8c r7:82801cb8 r6:830bf380 r5:00000002 [ 726.297530][ C0] r4:830bf380 [ 726.297556][ C0] [<80345068>] (__walk_groups_from) from [<8034743c>] (tmigr_handle_remote+0xe8/0x108) [ 726.297647][ C0] r9:82804d80 r8:00000102 r7:00000001 r6:00000002 r5:00000002 r4:dddc7488 [ 726.297669][ C0] [<80347354>] (tmigr_handle_remote) from [<80327600>] (run_timer_softirq+0x30/0x34) [ 726.297740][ C0] r4:82804084 [ 726.297761][ C0] [<803275d0>] (run_timer_softirq) from [<8025b55c>] (handle_softirqs+0x140/0x458) [ 726.297830][ C0] [<8025b41c>] (handle_softirqs) from [<8025b9d0>] (__irq_exit_rcu+0x110/0x1d0) [ 726.297915][ C0] r10:00000000 r9:8281b500 r8:00000000 r7:82801dd8 r6:82443e68 r5:8247ef9c [ 726.297938][ C0] r4:8281b500 [ 726.297956][ C0] [<8025b8c0>] (__irq_exit_rcu) from [<8025bd48>] (irq_exit+0x10/0x18) [ 726.298024][ C0] r5:8247ef9c r4:826c3a9c [ 726.298042][ C0] [<8025bd38>] (irq_exit) from [<81aad164>] (generic_handle_arch_irq+0x7c/0x80) [ 726.298111][ C0] [<81aad0e8>] (generic_handle_arch_irq) from [<80200bdc>] (__irq_svc+0x7c/0xbc) [ 726.298246][ C0] Exception stack(0x82801dd8 to 0x82801e20) [ 726.298450][ C0] 1dc0: 00000001 00000000 [ 726.298512][ C0] 1de0: 000040df 000040dd 83e9af68 00000004 00000001 83e9af68 83fc9e88 83e9ae40 [ 726.298550][ C0] 1e00: 00000000 82801e3c 82801e28 82801e28 81abb6cc 81abb6f4 80000013 ffffffff [ 726.298630][ C0] r9:8281b500 r8:83fc9e88 r7:82801e0c r6:ffffffff r5:80000013 r4:81abb6f4 [ 726.298652][ C0] [<81abb6b4>] (_raw_spin_lock) from [<809c74b8>] (gpio_mmio_set+0x44/0x80) [ 726.298733][ C0] r5:00000004 r4:83e9ae40 [ 726.298754][ C0] [<809c7474>] (gpio_mmio_set) from [<809b7c74>] (gpiochip_set+0x1c/0x44) [ 726.298833][ C0] r7:00000001 r6:00000000 r5:00000002 r4:8414e628 [ 726.298858][ C0] [<809b7c58>] (gpiochip_set) from [<809ba53c>] (gpiod_set_raw_value_commit+0x78/0x218) [ 726.298922][ C0] [<809ba4c4>] (gpiod_set_raw_value_commit) from [<809bbddc>] (gpiod_set_value_nocheck+0x44/0x58) [ 726.299000][ C0] r10:00000000 r9:00000000 r8:00000001 r7:dddce4c0 r6:8335ee58 r5:00000001 [ 726.299022][ C0] r4:8414e628 [ 726.299039][ C0] [<809bbd98>] (gpiod_set_value_nocheck) from [<809bbe2c>] (gpiod_set_value+0x3c/0x88) [ 726.299096][ C0] [<809bbdf0>] (gpiod_set_value) from [<809cc5c8>] (gpio_led_set+0x5c/0x60) [ 726.299159][ C0] r5:000000ff r4:845b8a24 [ 726.299177][ C0] [<809cc56c>] (gpio_led_set) from [<809c9ef0>] (led_set_brightness+0x84/0x90) [ 726.299271][ C0] r5:000000ff r4:845b8a24 [ 726.299289][ C0] [<809c9e6c>] (led_set_brightness) from [<809cba70>] (led_trigger_event+0x40/0x58) [ 726.299363][ C0] r5:000000ff r4:845b8a24 [ 726.299381][ C0] [<809cba30>] (led_trigger_event) from [<809cd0cc>] (ledtrig_cpu+0xac/0xf4) [ 726.299454][ C0] r7:dddce4c0 r6:00000002 r5:82b15cd8 r4:000001fd [ 726.299473][ C0] [<809cd020>] (ledtrig_cpu) from [<80227a38>] (arch_cpu_idle_exit+0x14/0x18) [ 726.299556][ C0] r9:00000000 r8:00000000 r7:8280c710 r6:8281b500 r5:8280c6d0 r4:00000000 [ 726.299578][ C0] [<80227a24>] (arch_cpu_idle_exit) from [<802b158c>] (do_idle+0x5c/0x2d8) [ 726.299651][ C0] [<802b1530>] (do_idle) from [<802b1b38>] (cpu_startup_entry+0x30/0x34) [ 726.299731][ C0] r10:8281aff4 r9:8280c680 r8:823bea70 r7:00000000 r6:deffc06c r5:828222e8 [ 726.299753][ C0] r4:000000ed [ 726.299770][ C0] [<802b1b08>] (cpu_startup_entry) from [<81aaeb7c>] (kernel_init+0x0/0x138) [ 726.299843][ C0] [<81aaea9c>] (rest_init) from [<8260145c>] (start_kernel+0x844/0x860) [ 726.299951][ C0] [<82600c18>] (start_kernel) from [<00000000>] (0x0) [ 726.300661][ C0] Sending NMI from CPU 0 to CPUs 1: [ 726.301504][ C1] NMI backtrace for cpu 1 [ 726.301780][ C1] CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Not tainted syzkaller #0 PREEMPT [ 726.301848][ C1] Hardware name: ARM-Versatile Express [ 726.301873][ C1] PC is at _raw_spin_lock+0x40/0x58 [ 726.301964][ C1] LR is at _raw_spin_lock+0x18/0x58 [ 726.302003][ C1] pc : [<81abb6f4>] lr : [<81abb6cc>] psr: 80000113 [ 726.302029][ C1] sp : df805d68 ip : df805d68 fp : df805d7c [ 726.302052][ C1] r10: 81c05450 r9 : 83e9ae40 r8 : 83fc9e88 [ 726.302072][ C1] r7 : 83e9af68 r6 : 00000000 r5 : 00000001 r4 : 83e9af68 [ 726.302097][ C1] r3 : 000040dd r2 : 000040de r1 : 00000000 r0 : 00000001 [ 726.302122][ C1] Flags: Nzcv IRQs on FIQs on Mode SVC_32 ISA ARM Segment none [ 726.302161][ C1] Control: 30c5387d Table: 862bd740 DAC: 00000000 [ 726.302184][ C1] Call trace: frame pointer underflow [ 726.302276][ C1] [<81abb6b4>] (_raw_spin_lock) from [<809c74b8>] (gpio_mmio_set+0x44/0x80) [ 726.302365][ C1] r5:00000001 r4:83e9ae40 [ 726.302386][ C1] [<809c7474>] (gpio_mmio_set) from [<809b7c74>] (gpiochip_set+0x1c/0x44) [ 726.302465][ C1] r7:00000000 r6:00000000 r5:00000000 r4:8414e600 [ 726.302482][ C1] [<809b7c58>] (gpiochip_set) from [<809ba53c>] (gpiod_set_raw_value_commit+0x78/0x218) [ 726.302550][ C1] [<809ba4c4>] (gpiod_set_raw_value_commit) from [<809bbddc>] (gpiod_set_value_nocheck+0x44/0x58) [ 726.302626][ C1] r10:81c05450 r9:df805ebc r8:00000102 r7:fffff860 r6:00000009 r5:00000000 [ 726.302658][ C1] r4:8414e600 [ 726.302675][ C1] [<809bbd98>] (gpiod_set_value_nocheck) from [<809bbe2c>] (gpiod_set_value+0x3c/0x88) [ 726.302732][ C1] [<809bbdf0>] (gpiod_set_value) from [<809cc5c8>] (gpio_led_set+0x5c/0x60) [ 726.302793][ C1] r5:845b8844 r4:845b8844 [ 726.302811][ C1] [<809cc56c>] (gpio_led_set) from [<809c9e60>] (led_set_brightness_nosleep+0x38/0x44) [ 726.302871][ C1] r5:845b8844 r4:85809e8c [ 726.302888][ C1] [<809c9e28>] (led_set_brightness_nosleep) from [<809ccec4>] (led_heartbeat_function+0x84/0x144) [ 726.302963][ C1] [<809cce40>] (led_heartbeat_function) from [<80326f70>] (call_timer_fn+0x30/0x220) [ 726.303042][ C1] r7:fffff860 r6:809cce40 r5:85809e8c r4:83216000 [ 726.303062][ C1] [<80326f40>] (call_timer_fn) from [<80327424>] (__run_timers+0x2c4/0x3f8) [ 726.303145][ C1] r9:df805ebc r8:fffff860 r7:00000000 r6:809cce40 r5:dddd9f00 r4:85809e8c [ 726.303166][ C1] [<80327160>] (__run_timers) from [<803275c0>] (run_timer_base+0x68/0x78) [ 726.303280][ C1] r10:83216000 r9:82804d80 r8:00000102 r7:00000001 r6:00000082 r5:00000002 [ 726.303305][ C1] r4:dddd9f00 [ 726.303322][ C1] [<80327558>] (run_timer_base) from [<803275ec>] (run_timer_softirq+0x1c/0x34) [ 726.303401][ C1] r4:82804084 [ 726.303425][ C1] [<803275d0>] (run_timer_softirq) from [<8025b55c>] (handle_softirqs+0x140/0x458) [ 726.303494][ C1] [<8025b41c>] (handle_softirqs) from [<8025b9d0>] (__irq_exit_rcu+0x110/0x1d0) [ 726.303578][ C1] r10:00000000 r9:83216000 r8:00000000 r7:df865e08 r6:82443e68 r5:8247ef9c [ 726.303608][ C1] r4:83216000 [ 726.303627][ C1] [<8025b8c0>] (__irq_exit_rcu) from [<8025bd48>] (irq_exit+0x10/0x18) [ 726.303709][ C1] r5:8247ef9c r4:826c3a9c [ 726.303734][ C1] [<8025bd38>] (irq_exit) from [<81aad164>] (generic_handle_arch_irq+0x7c/0x80) [ 726.303800][ C1] [<81aad0e8>] (generic_handle_arch_irq) from [<81a7d0fc>] (call_with_stack+0x1c/0x20) [ 726.303877][ C1] r9:83216000 r8:83fc9e88 r7:df865e3c r6:ffffffff r5:60000013 r4:809c7cb8 [ 726.303899][ C1] [<81a7d0e0>] (call_with_stack) from [<80200bec>] (__irq_svc+0x8c/0xbc) [ 726.303966][ C1] Exception stack(0xdf865e08 to 0xdf865e50) [ 726.304010][ C1] 5e00: e0195008 00000009 000040dd 00000000 e0195008 00000009 [ 726.304046][ C1] 5e20: 00000001 83e9af68 83fc9e88 83e9ae40 00000000 df865e6c df865e58 df865e58 [ 726.304075][ C1] 5e40: 809c7cb4 809c7cb8 60000013 ffffffff [ 726.304097][ C1] [<809c7c98>] (gpio_mmio_write32) from [<809c74d8>] (gpio_mmio_set+0x64/0x80) [ 726.304182][ C1] r5:00000008 r4:83e9ae40 [ 726.304201][ C1] [<809c7474>] (gpio_mmio_set) from [<809b7c74>] (gpiochip_set+0x1c/0x44) [ 726.304274][ C1] r7:00000001 r6:00000000 r5:00000003 r4:8414e63c [ 726.304297][ C1] [<809b7c58>] (gpiochip_set) from [<809ba53c>] (gpiod_set_raw_value_commit+0x78/0x218) [ 726.304360][ C1] [<809ba4c4>] (gpiod_set_raw_value_commit) from [<809bbddc>] (gpiod_set_value_nocheck+0x44/0x58) [ 726.304437][ C1] r10:00000000 r9:00000000 r8:00000001 r7:ddde24c0 r6:8335ebd8 r5:00000001 [ 726.304473][ C1] r4:8414e63c [ 726.304490][ C1] [<809bbd98>] (gpiod_set_value_nocheck) from [<809bbe2c>] (gpiod_set_value+0x3c/0x88) [ 726.304549][ C1] [<809bbdf0>] (gpiod_set_value) from [<809cc5c8>] (gpio_led_set+0x5c/0x60) [ 726.304611][ C1] r5:000000ff r4:845b8b14 [ 726.304629][ C1] [<809cc56c>] (gpio_led_set) from [<809c9ef0>] (led_set_brightness+0x84/0x90) [ 726.304705][ C1] r5:000000ff r4:845b8b14 [ 726.304724][ C1] [<809c9e6c>] (led_set_brightness) from [<809cba70>] (led_trigger_event+0x40/0x58) [ 726.304792][ C1] r5:000000ff r4:845b8b14 [ 726.304812][ C1] [<809cba30>] (led_trigger_event) from [<809cd0cc>] (ledtrig_cpu+0xac/0xf4) [ 726.304882][ C1] r7:ddde24c0 r6:00000002 r5:82b15cd8 r4:000000fe [ 726.304902][ C1] [<809cd020>] (ledtrig_cpu) from [<80227a38>] (arch_cpu_idle_exit+0x14/0x18) [ 726.305072][ C1] r9:00000000 r8:00000001 r7:8280c710 r6:83216000 r5:8280c6d0 r4:00000001 [ 726.305110][ C1] [<80227a24>] (arch_cpu_idle_exit) from [<802b158c>] (do_idle+0x5c/0x2d8) [ 726.305196][ C1] [<802b1530>] (do_idle) from [<802b1b38>] (cpu_startup_entry+0x30/0x34) [ 726.305282][ C1] r10:00000000 r9:414fc0f0 r8:80003000 r7:82a7b4a4 r6:83216000 r5:00000001 [ 726.305307][ C1] r4:00000092 [ 726.305325][ C1] [<802b1b08>] (cpu_startup_entry) from [<8022f360>] (secondary_start_kernel+0x128/0x194) [ 726.305408][ C1] [<8022f238>] (secondary_start_kernel) from [<80220094>] (__enable_mmu+0x0/0xc) [ 726.305502][ C1] r7:82a7b4a4 r6:30c0387d r5:00000000 r4:830b7bc0 [ 726.306888][ C0] Kernel panic - not syncing: softlockup: hung tasks [ 726.340004][ C0] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Tainted: G L syzkaller #0 PREEMPT [ 726.340468][ C0] Tainted: [L]=SOFTLOCKUP [ 726.340652][ C0] Hardware name: ARM-Versatile Express [ 726.340885][ C0] Call trace: [ 726.341161][ C0] [<80201a74>] (dump_backtrace) from [<80201b70>] (show_stack+0x18/0x1c) [ 726.341522][ C0] r7:822964bc r6:8281b500 r5:00000000 r4:8229566c [ 726.341736][ C0] [<80201b58>] (show_stack) from [<8021ee08>] (dump_stack_lvl+0x54/0x7c) [ 726.342049][ C0] [<8021edb4>] (dump_stack_lvl) from [<8021ee48>] (dump_stack+0x18/0x1c) [ 726.342365][ C0] r5:00000000 r4:82a7bd14 [ 726.342525][ C0] [<8021ee30>] (dump_stack) from [<80202648>] (vpanic+0xe0/0x2e8) [ 726.342806][ C0] [<80202568>] (vpanic) from [<80202884>] (trace_suspend_resume+0x0/0xd8) [ 726.343124][ C0] r7:82ac27f8 [ 726.343291][ C0] [<80202850>] (panic) from [<80383f14>] (watchdog_timer_fn+0x2dc/0x350) [ 726.343627][ C0] r3:00000001 r2:00004000 r1:82a7bd1c r0:822964bc [ 726.343845][ C0] [<80383c38>] (watchdog_timer_fn) from [<80329b64>] (__hrtimer_run_queues+0x1c4/0x454) [ 726.344201][ C0] r10:8281b500 r9:00000000 r8:dddc7130 r7:80383c38 r6:dddc7000 r5:dddc7040 [ 726.344466][ C0] r4:dddc75d8 [ 726.344611][ C0] [<803299a0>] (__hrtimer_run_queues) from [<8032b168>] (hrtimer_interrupt+0x148/0x2bc) [ 726.345004][ C0] r10:158045e0 r9:dddc7180 r8:dddc7130 r7:000000a9 r6:00000003 r5:20000193 [ 726.345260][ C0] r4:dddc7000 [ 726.345414][ C0] [<8032b020>] (hrtimer_interrupt) from [<813400d8>] (arch_timer_handler_virt+0x30/0x38) [ 726.345783][ C0] r10:81d0fc78 r9:8309e400 r8:00000000 r7:00000000 r6:00000000 r5:82498528 [ 726.346048][ C0] r4:8309de40 [ 726.346200][ C0] [<813400a8>] (arch_timer_handler_virt) from [<802ef9b4>] (handle_percpu_devid_irq+0x128/0x34c) [ 726.346586][ C0] [<802ef88c>] (handle_percpu_devid_irq) from [<802e8b44>] (handle_irq_desc+0x74/0x84) [ 726.346941][ C0] r10:00000001 r9:8281b500 r8:00000000 r7:df80a00c r6:826c2388 r5:df80a000 [ 726.347234][ C0] r4:8280cc44 [ 726.347385][ C0] [<802e8ad0>] (handle_irq_desc) from [<802e8bc0>] (generic_handle_domain_irq+0x18/0x1c) [ 726.347708][ C0] [<802e8ba8>] (generic_handle_domain_irq) from [<802012c8>] (gic_handle_irq+0x68/0x7c) [ 726.348048][ C0] [<80201260>] (gic_handle_irq) from [<81aad148>] (generic_handle_arch_irq+0x60/0x80) [ 726.348404][ C0] r7:82801b90 r6:82443e68 r5:8247ef9c r4:826c3a9c [ 726.348608][ C0] [<81aad0e8>] (generic_handle_arch_irq) from [<80200bdc>] (__irq_svc+0x7c/0xbc) [ 726.348948][ C0] Exception stack(0x82801b90 to 0x82801bd8) [ 726.349170][ C0] 1b80: ddddb488 00000000 ffffffff 00003c32 [ 726.349495][ C0] 1ba0: 830bf380 830bf3b0 82801cb8 ddddb488 00000001 8280c9a4 00000001 82801bec [ 726.349783][ C0] 1bc0: 82801bf0 82801be0 80346da4 81abb53c 60000113 ffffffff [ 726.350051][ C0] r9:8281b500 r8:00000001 r7:82801bc4 r6:ffffffff r5:60000113 r4:81abb53c [ 726.350315][ C0] [<81abb514>] (_raw_spin_unlock_irq) from [<80346da4>] (tmigr_handle_remote_up+0x218/0x4b0) [ 726.350685][ C0] [<80346b8c>] (tmigr_handle_remote_up) from [<803450a4>] (__walk_groups_from+0x3c/0xe4) [ 726.351050][ C0] r10:8281b500 r9:8280c820 r8:80346b8c r7:82801cb8 r6:830bf380 r5:00000002 [ 726.351358][ C0] r4:830bf380 [ 726.351512][ C0] [<80345068>] (__walk_groups_from) from [<8034743c>] (tmigr_handle_remote+0xe8/0x108) [ 726.351880][ C0] r9:82804d80 r8:00000102 r7:00000001 r6:00000002 r5:00000002 r4:dddc7488 [ 726.352131][ C0] [<80347354>] (tmigr_handle_remote) from [<80327600>] (run_timer_softirq+0x30/0x34) [ 726.352483][ C0] r4:82804084 [ 726.352636][ C0] [<803275d0>] (run_timer_softirq) from [<8025b55c>] (handle_softirqs+0x140/0x458) [ 726.352965][ C0] [<8025b41c>] (handle_softirqs) from [<8025b9d0>] (__irq_exit_rcu+0x110/0x1d0) [ 726.353356][ C0] r10:00000000 r9:8281b500 r8:00000000 r7:82801dd8 r6:82443e68 r5:8247ef9c [ 726.353664][ C0] r4:8281b500 [ 726.353829][ C0] [<8025b8c0>] (__irq_exit_rcu) from [<8025bd48>] (irq_exit+0x10/0x18) [ 726.354169][ C0] r5:8247ef9c r4:826c3a9c [ 726.354366][ C0] [<8025bd38>] (irq_exit) from [<81aad164>] (generic_handle_arch_irq+0x7c/0x80) [ 726.354725][ C0] [<81aad0e8>] (generic_handle_arch_irq) from [<80200bdc>] (__irq_svc+0x7c/0xbc) [ 726.355103][ C0] Exception stack(0x82801dd8 to 0x82801e20) [ 726.355427][ C0] 1dc0: 00000001 00000000 [ 726.355764][ C0] 1de0: 000040df 000040dd 83e9af68 00000004 00000001 83e9af68 83fc9e88 83e9ae40 [ 726.356073][ C0] 1e00: 00000000 82801e3c 82801e28 82801e28 81abb6cc 81abb6f4 80000013 ffffffff [ 726.356448][ C0] r9:8281b500 r8:83fc9e88 r7:82801e0c r6:ffffffff r5:80000013 r4:81abb6f4 [ 726.356742][ C0] [<81abb6b4>] (_raw_spin_lock) from [<809c74b8>] (gpio_mmio_set+0x44/0x80) [ 726.357111][ C0] r5:00000004 r4:83e9ae40 [ 726.357299][ C0] [<809c7474>] (gpio_mmio_set) from [<809b7c74>] (gpiochip_set+0x1c/0x44) [ 726.357659][ C0] r7:00000001 r6:00000000 r5:00000002 r4:8414e628 [ 726.357895][ C0] [<809b7c58>] (gpiochip_set) from [<809ba53c>] (gpiod_set_raw_value_commit+0x78/0x218) [ 726.358257][ C0] [<809ba4c4>] (gpiod_set_raw_value_commit) from [<809bbddc>] (gpiod_set_value_nocheck+0x44/0x58) [ 726.358657][ C0] r10:00000000 r9:00000000 r8:00000001 r7:dddce4c0 r6:8335ee58 r5:00000001 [ 726.358956][ C0] r4:8414e628 [ 726.359115][ C0] [<809bbd98>] (gpiod_set_value_nocheck) from [<809bbe2c>] (gpiod_set_value+0x3c/0x88) [ 726.359535][ C0] [<809bbdf0>] (gpiod_set_value) from [<809cc5c8>] (gpio_led_set+0x5c/0x60) [ 726.359898][ C0] r5:000000ff r4:845b8a24 [ 726.360086][ C0] [<809cc56c>] (gpio_led_set) from [<809c9ef0>] (led_set_brightness+0x84/0x90) [ 726.361257][ C0] r5:000000ff r4:845b8a24 [ 726.361449][ C0] [<809c9e6c>] (led_set_brightness) from [<809cba70>] (led_trigger_event+0x40/0x58) [ 726.362373][ C0] r5:000000ff r4:845b8a24 [ 726.362573][ C0] [<809cba30>] (led_trigger_event) from [<809cd0cc>] (ledtrig_cpu+0xac/0xf4) [ 726.362927][ C0] r7:dddce4c0 r6:00000002 r5:82b15cd8 r4:000001fd [ 726.363139][ C0] [<809cd020>] (ledtrig_cpu) from [<80227a38>] (arch_cpu_idle_exit+0x14/0x18) [ 726.363587][ C0] r9:00000000 r8:00000000 r7:8280c710 r6:8281b500 r5:8280c6d0 r4:00000000 [ 726.363891][ C0] [<80227a24>] (arch_cpu_idle_exit) from [<802b158c>] (do_idle+0x5c/0x2d8) [ 726.364238][ C0] [<802b1530>] (do_idle) from [<802b1b38>] (cpu_startup_entry+0x30/0x34) [ 726.364612][ C0] r10:8281aff4 r9:8280c680 r8:823bea70 r7:00000000 r6:deffc06c r5:828222e8 [ 726.364902][ C0] r4:000000ed [ 726.365051][ C0] [<802b1b08>] (cpu_startup_entry) from [<81aaeb7c>] (kernel_init+0x0/0x138) [ 726.365408][ C0] [<81aaea9c>] (rest_init) from [<8260145c>] (start_kernel+0x844/0x860) [ 726.365752][ C0] [<82600c18>] (start_kernel) from [<00000000>] (0x0) [ 726.368566][ C0] Rebooting in 86400 seconds..