last executing test programs: 709.349079ms ago: executing program 1 (id=2190): r0 = openat$selinux_enforce(0xffffff9c, &(0x7f0000000000), 0xa400, 0x0) close$binfmt(r0) syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000100)={0x14, 0x2, 0x9, 0x101, 0x0, 0x0, {0x1, 0x0, 0x3}}, 0x14}, 0x1, 0x0, 0x0, 0x84c4}, 0x10) 558.876088ms ago: executing program 0 (id=2191): r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/slabinfo\x00', 0x0, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) write$RDMA_USER_CM_CMD_GET_EVENT(r0, 0x0, 0x0) 558.685068ms ago: executing program 1 (id=2192): r0 = io_uring_setup(0x19fd, &(0x7f0000000380)={0x0, 0x52fe, 0x0, 0x4, 0x74}) close_range(r0, 0xffffffffffffffff, 0x0) openat$mixer(0xffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, &(0x7f0000000cc0)={{0x0, 0x57, 0x0, 0x8, 0x16, 0x2, 0x4, 0xd7b, 0x8001, 0x2, 0x0, 0xb29e, 0x5, 0x7, 0x9}}) 450.247442ms ago: executing program 0 (id=2193): r0 = openat$selinux_enforce(0xffffff9c, &(0x7f0000000100), 0x20000, 0x0) close_range(r0, 0xffffffffffffffff, 0x2) socket$key(0xf, 0x3, 0x2) sendmsg$NL80211_CMD_START_AP(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={0x0}, 0x1, 0x0, 0x0, 0x10}, 0x810) 450.013472ms ago: executing program 1 (id=2194): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) dup2(r0, r1) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000140)=@gcm_128={{}, "2a7896820734e325", "30861ba14e83c65cecbb241a4f06e1cc", "d2e7a145", "9c37b1fc18f2e586"}, 0x28) 337.384057ms ago: executing program 0 (id=2195): r0 = syz_open_dev$audion(&(0x7f0000000000), 0x3, 0x11e643ae52349c69) close(r0) syz_genetlink_get_family_id$tipc(0x0, 0xffffffffffffffff) getsockname(r0, 0x0, &(0x7f0000000100)) 332.941127ms ago: executing program 1 (id=2196): r0 = openat$hwrng(0xffffff9c, &(0x7f0000000000), 0x400, 0x0) close_range(r0, r0, 0x0) socket$igmp(0x2, 0x3, 0x2) setsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000300)={0x77359400}, 0x8) 219.769201ms ago: executing program 0 (id=2197): pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close_range(r0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) sendmsg$NL80211_CMD_FRAME(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}, 0x1, 0x0, 0x0, 0x2}, 0x20000000) 150.134661ms ago: executing program 1 (id=2198): r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0x1, 0x80) close_range(r0, r0, 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x0, 0x10, 0x70bd25, 0x25dfdbfe}, 0x14}}, 0x0) 149.91483ms ago: executing program 0 (id=2199): r0 = openat$pfkey(0xffffff9c, &(0x7f0000000040), 0x0, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x0) write$selinux_context(r0, &(0x7f0000000340)='system_u:object_r:dpkg_lock_t:s0\x00', 0x21) 227.98µs ago: executing program 0 (id=2200): pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) sendmsg$NL80211_CMD_STOP_NAN(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}, 0x1, 0x0, 0x0, 0x4000004}, 0x40) 0s ago: executing program 1 (id=2201): r0 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000140)={'vxcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f00000001c0)={0x1d, r1, 0x1, {0x2}}, 0x18) sendmsg$NL80211_CMD_GET_KEY(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000200)={0x20, 0x0, 0x8, 0x70bd26, 0x25dfdbfd, {{}, {@void, @val={0xc, 0x99, {0xe1, 0x19}}}}}, 0x20}, 0x1, 0x0, 0x0, 0x1}, 0x4000) kernel console output (not intermixed with test programs): [ 47.331359][ T29] audit: type=1400 audit(47.260:56): avc: denied { read write } for pid=3098 comm="sftp-server" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 47.334514][ T29] audit: type=1400 audit(47.260:57): avc: denied { open } for pid=3098 comm="sftp-server" path="/dev/null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 Warning: Permanently added '[localhost]:62488' (ED25519) to the list of known hosts. [ 62.706256][ T29] audit: type=1400 audit(62.630:58): avc: denied { name_bind } for pid=3101 comm="sshd-session" src=30000 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 63.946176][ C1] hrtimer: interrupt took 19690288 ns [ 64.713022][ T29] audit: type=1400 audit(64.640:59): avc: denied { execute } for pid=3102 comm="sh" name="syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 64.713426][ T29] audit: type=1400 audit(64.640:60): avc: denied { execute_no_trans } for pid=3102 comm="sh" path="/syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 67.369817][ T29] audit: type=1400 audit(67.300:61): avc: denied { mounton } for pid=3102 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=806 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 67.375527][ T29] audit: type=1400 audit(67.300:62): avc: denied { mount } for pid=3102 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 67.388124][ T3102] cgroup: Unknown subsys name 'net' [ 67.393675][ T29] audit: type=1400 audit(67.320:63): avc: denied { unmount } for pid=3102 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 67.555584][ T3102] cgroup: Unknown subsys name 'cpuset' [ 67.563730][ T3102] cgroup: Unknown subsys name 'hugetlb' [ 67.564680][ T3102] cgroup: Unknown subsys name 'rlimit' [ 67.816965][ T29] audit: type=1400 audit(67.740:64): avc: denied { setattr } for pid=3102 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 67.818834][ T29] audit: type=1400 audit(67.750:65): avc: denied { mounton } for pid=3102 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 67.821633][ T29] audit: type=1400 audit(67.750:66): avc: denied { mount } for pid=3102 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 68.030351][ T3104] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 68.033774][ T29] audit: type=1400 audit(67.960:67): avc: denied { relabelto } for pid=3104 comm="mkswap" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 68.040999][ T29] audit: type=1400 audit(67.970:68): avc: denied { write } for pid=3104 comm="mkswap" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 68.083550][ T29] audit: type=1400 audit(68.010:69): avc: denied { read } for pid=3102 comm="syz-executor" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 68.088543][ T29] audit: type=1400 audit(68.010:70): avc: denied { open } for pid=3102 comm="syz-executor" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 76.039072][ T3102] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 78.052485][ T29] audit: type=1400 audit(77.980:71): avc: denied { execmem } for pid=3105 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 78.116570][ T29] audit: type=1400 audit(78.040:72): avc: denied { read } for pid=3107 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 78.123521][ T29] audit: type=1400 audit(78.050:73): avc: denied { open } for pid=3107 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 78.136701][ T29] audit: type=1400 audit(78.060:74): avc: denied { mounton } for pid=3107 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 78.160395][ T29] audit: type=1400 audit(78.090:75): avc: denied { module_request } for pid=3107 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 78.160754][ T29] audit: type=1400 audit(78.090:76): avc: denied { module_request } for pid=3108 comm="syz-executor" kmod="netdev-nr1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 78.239835][ T29] audit: type=1400 audit(78.170:77): avc: denied { sys_module } for pid=3107 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 78.883367][ T29] audit: type=1400 audit(78.810:78): avc: denied { ioctl } for pid=3107 comm="syz-executor" path="/dev/net/tun" dev="devtmpfs" ino=677 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 79.930673][ T3108] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 79.953789][ T3108] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 79.978400][ T3107] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 80.002682][ T3107] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 80.724798][ T3108] hsr_slave_0: entered promiscuous mode [ 80.729245][ T3108] hsr_slave_1: entered promiscuous mode [ 80.914609][ T3107] hsr_slave_0: entered promiscuous mode [ 80.920343][ T3107] hsr_slave_1: entered promiscuous mode [ 80.921836][ T3107] debugfs: 'hsr0' already exists in 'hsr' [ 80.923327][ T3107] Cannot create hsr debugfs directory [ 81.284521][ T29] audit: type=1400 audit(81.210:79): avc: denied { create } for pid=3108 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 81.289948][ T29] audit: type=1400 audit(81.220:80): avc: denied { write } for pid=3108 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 81.309062][ T3108] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 81.329324][ T3108] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 81.338673][ T3108] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 81.359835][ T3108] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 81.427274][ T3107] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 81.441379][ T3107] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 81.457048][ T3107] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 81.465636][ T3107] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 81.964079][ T3107] 8021q: adding VLAN 0 to HW filter on device bond0 [ 82.130716][ T3108] 8021q: adding VLAN 0 to HW filter on device bond0 [ 84.942248][ T3107] veth0_vlan: entered promiscuous mode [ 84.979697][ T3107] veth1_vlan: entered promiscuous mode [ 85.020456][ T3108] veth0_vlan: entered promiscuous mode [ 85.042237][ T3108] veth1_vlan: entered promiscuous mode [ 85.090971][ T3107] veth0_macvtap: entered promiscuous mode [ 85.101876][ T3107] veth1_macvtap: entered promiscuous mode [ 85.161079][ T3108] veth0_macvtap: entered promiscuous mode [ 85.185269][ T3108] veth1_macvtap: entered promiscuous mode [ 85.205337][ T2685] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 85.212051][ T2685] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 85.212590][ T2685] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 85.212787][ T2685] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 85.339008][ T29] kauditd_printk_skb: 1 callbacks suppressed [ 85.339950][ T29] audit: type=1400 audit(85.270:82): avc: denied { mount } for pid=3107 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 85.358572][ T29] audit: type=1400 audit(85.280:83): avc: denied { mounton } for pid=3107 comm="syz-executor" path="/syzkaller.mcBfJo/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 85.371290][ T29] audit: type=1400 audit(85.300:84): avc: denied { mount } for pid=3107 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 85.382060][ T29] audit: type=1400 audit(85.310:85): avc: denied { mounton } for pid=3107 comm="syz-executor" path="/syzkaller.mcBfJo/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 85.392265][ T29] audit: type=1400 audit(85.320:86): avc: denied { mounton } for pid=3107 comm="syz-executor" path="/syzkaller.mcBfJo/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=3083 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 85.417914][ T2685] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 85.419834][ T2685] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 85.422493][ T29] audit: type=1400 audit(85.350:87): avc: denied { unmount } for pid=3107 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 85.423399][ T2685] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 85.423548][ T2685] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 85.430858][ T29] audit: type=1400 audit(85.360:88): avc: denied { mounton } for pid=3107 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=772 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 85.434805][ T29] audit: type=1400 audit(85.360:89): avc: denied { mount } for pid=3107 comm="syz-executor" name="/" dev="gadgetfs" ino=3084 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 85.448313][ T29] audit: type=1400 audit(85.370:90): avc: denied { mount } for pid=3107 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 85.448817][ T29] audit: type=1400 audit(85.370:91): avc: denied { mounton } for pid=3107 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 85.499677][ T3107] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 86.538413][ T3731] input: syz1 as /devices/virtual/input/input3 [ 90.855735][ T29] kauditd_printk_skb: 19 callbacks suppressed [ 90.859202][ T29] audit: type=1400 audit(90.780:111): avc: denied { read write } for pid=3831 comm="syz.1.56" name="binder0" dev="binder" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 90.862526][ T29] audit: type=1400 audit(90.790:112): avc: denied { open } for pid=3831 comm="syz.1.56" path="/dev/binderfs/binder0" dev="binder" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 91.059875][ T29] audit: type=1400 audit(90.990:113): avc: denied { create } for pid=3835 comm="syz.1.58" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 91.072864][ T29] audit: type=1400 audit(91.000:114): avc: denied { connect } for pid=3835 comm="syz.1.58" lport=256 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 91.079335][ T29] audit: type=1400 audit(91.010:115): avc: denied { write } for pid=3835 comm="syz.1.58" laddr=127.0.0.1 lport=256 faddr=127.0.0.1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 91.587919][ T29] audit: type=1400 audit(91.520:116): avc: denied { getopt } for pid=3835 comm="syz.1.58" laddr=127.0.0.1 lport=256 faddr=127.0.0.1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 91.721688][ T3842] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=514 sclass=netlink_route_socket pid=3842 comm=syz.1.60 [ 92.072760][ T29] audit: type=1400 audit(92.000:117): avc: denied { create } for pid=3849 comm="syz.1.64" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 92.077079][ T29] audit: type=1400 audit(92.010:118): avc: denied { write } for pid=3849 comm="syz.1.64" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 94.084891][ T29] audit: type=1400 audit(94.010:119): avc: denied { associate } for pid=3877 comm="syz.1.79" name="pfkey" scontext=root:object_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 94.102489][ T29] audit: type=1400 audit(94.030:120): avc: denied { create } for pid=3877 comm="syz.1.79" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 97.793183][ T3958] raw_sendmsg: syz.1.117 forgot to set AF_INET. Fix it! [ 97.893959][ T29] kauditd_printk_skb: 4 callbacks suppressed [ 97.896338][ T29] audit: type=1400 audit(97.820:125): avc: denied { setopt } for pid=3959 comm="syz.1.118" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 99.131421][ T29] audit: type=1400 audit(99.060:126): avc: denied { create } for pid=3994 comm="syz.0.136" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 99.315531][ T29] audit: type=1400 audit(99.240:127): avc: denied { create } for pid=4003 comm="syz.0.140" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 99.594727][ T29] audit: type=1400 audit(99.520:128): avc: denied { read } for pid=4014 comm="syz.0.145" path="socket:[2970]" dev="sockfs" ino=2970 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 100.486563][ T4043] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4043 comm=syz.1.159 [ 101.191758][ T29] audit: type=1400 audit(101.120:129): avc: denied { create } for pid=4062 comm="syz.0.169" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 101.202329][ T29] audit: type=1400 audit(101.130:130): avc: denied { write } for pid=4062 comm="syz.0.169" path="socket:[3039]" dev="sockfs" ino=3039 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 101.279577][ T4066] Zero length message leads to an empty skb [ 101.769002][ T29] audit: type=1400 audit(101.700:131): avc: denied { write } for pid=4075 comm="syz.0.175" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 102.182610][ T29] audit: type=1400 audit(102.110:132): avc: denied { create } for pid=4083 comm="syz.0.179" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 102.190988][ T29] audit: type=1400 audit(102.110:133): avc: denied { write } for pid=4083 comm="syz.0.179" path="socket:[4129]" dev="sockfs" ino=4129 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 102.761772][ T29] audit: type=1400 audit(102.690:134): avc: denied { prog_load } for pid=4095 comm="syz.0.185" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 105.293877][ T29] kauditd_printk_skb: 1 callbacks suppressed [ 105.309425][ T29] audit: type=1400 audit(105.220:136): avc: denied { nlmsg_read } for pid=4152 comm="syz.0.213" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 105.811409][ T29] audit: type=1400 audit(105.740:137): avc: denied { remount } for pid=4168 comm="syz.1.221" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 105.830033][ T29] audit: type=1400 audit(105.750:138): avc: denied { unmount } for pid=3108 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 105.903773][ T29] audit: type=1400 audit(105.830:139): avc: denied { ioctl } for pid=4172 comm="syz.1.222" path="socket:[4301]" dev="sockfs" ino=4301 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 105.910299][ T29] audit: type=1400 audit(105.840:140): avc: denied { bind } for pid=4172 comm="syz.1.222" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 108.278037][ T29] audit: type=1400 audit(108.210:141): avc: denied { create } for pid=4226 comm="syz.0.247" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 108.282236][ T29] audit: type=1400 audit(108.210:142): avc: denied { write } for pid=4226 comm="syz.0.247" path="socket:[4404]" dev="sockfs" ino=4404 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 108.785567][ T29] audit: type=1400 audit(108.710:143): avc: denied { unmount } for pid=3108 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 108.941224][ T4251] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4251 comm=syz.0.259 [ 109.389662][ T4267] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4267 comm=syz.1.267 [ 109.619222][ T29] audit: type=1400 audit(109.550:144): avc: denied { execute } for pid=4272 comm="syz.1.270" path="/149/cpu.stat" dev="tmpfs" ino=785 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 111.870077][ T4329] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4329 comm=syz.1.298 [ 111.995414][ T4333] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4333 comm=syz.1.300 [ 112.707788][ T4362] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1011 sclass=netlink_route_socket pid=4362 comm=syz.0.314 [ 113.105369][ T29] audit: type=1400 audit(113.030:145): avc: denied { perfmon } for pid=4377 comm="syz.1.322" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 113.121341][ T29] audit: type=1400 audit(113.050:146): avc: denied { prog_run } for pid=4377 comm="syz.1.322" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 113.126570][ T4378] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 113.129868][ T29] audit: type=1400 audit(113.060:147): avc: denied { ioctl } for pid=4377 comm="syz.1.322" path="socket:[5177]" dev="sockfs" ino=5177 ioctlcmd=0x89e0 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 114.528159][ T29] audit: type=1400 audit(114.460:148): avc: denied { ioctl } for pid=4389 comm="syz.0.328" path="socket:[5204]" dev="sockfs" ino=5204 ioctlcmd=0x8936 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 120.581893][ T4468] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5132 sclass=netlink_route_socket pid=4468 comm=syz.0.366 [ 127.592482][ T4504] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4504 comm=syz.1.382 [ 128.860507][ T29] audit: type=1400 audit(128.790:149): avc: denied { ioctl } for pid=4536 comm="syz.1.399" path="socket:[4987]" dev="sockfs" ino=4987 ioctlcmd=0x5451 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 129.717016][ T4571] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4571 comm=syz.1.416 [ 130.205723][ T4586] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=5121 sclass=netlink_audit_socket pid=4586 comm=syz.1.422 [ 131.257442][ T4612] input: syz0 as /devices/virtual/input/input5 [ 131.457541][ T29] audit: type=1400 audit(131.390:150): avc: denied { audit_write } for pid=4619 comm="syz.1.438" capability=29 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 132.226745][ T29] audit: type=1400 audit(132.150:151): avc: denied { map } for pid=4635 comm="syz.0.446" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=5595 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 132.785548][ T4647] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4647 comm=syz.0.451 [ 133.334816][ T4659] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1550 sclass=netlink_route_socket pid=4659 comm=syz.0.457 [ 147.484282][ T29] audit: type=1400 audit(147.410:152): avc: denied { map_create } for pid=4827 comm="syz.1.539" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 147.506334][ T29] audit: type=1400 audit(147.430:153): avc: denied { map_read map_write } for pid=4827 comm="syz.1.539" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 151.427560][ T4869] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5130 sclass=netlink_route_socket pid=4869 comm=syz.0.558 [ 155.538291][ T29] audit: type=1400 audit(155.470:154): avc: denied { setopt } for pid=4920 comm="syz.0.585" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 155.789436][ T4926] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1550 sclass=netlink_route_socket pid=4926 comm=syz.0.587 [ 156.940132][ T4937] capability: warning: `syz.0.593' uses 32-bit capabilities (legacy support in use) [ 162.386537][ T29] audit: type=1400 audit(162.310:155): avc: denied { ioctl } for pid=4982 comm="syz.1.614" path="socket:[7222]" dev="sockfs" ino=7222 ioctlcmd=0x4b67 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 162.466954][ T4986] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1013 sclass=netlink_route_socket pid=4986 comm=syz.0.615 [ 162.559842][ T4989] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4989 comm=syz.0.617 [ 162.855356][ T4998] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4998 comm=syz.1.621 [ 163.184994][ T5010] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=11 sclass=netlink_route_socket pid=5010 comm=syz.0.627 [ 163.654790][ T5018] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5018 comm=syz.1.630 [ 163.937165][ T5024] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=311 sclass=netlink_route_socket pid=5024 comm=syz.1.634 [ 166.319228][ T5035] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1013 sclass=netlink_route_socket pid=5035 comm=syz.1.639 [ 173.328486][ T5062] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=5062 comm=syz.0.651 [ 174.918371][ T5093] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5093 comm=syz.1.667 [ 174.951096][ T29] audit: type=1400 audit(174.880:156): avc: denied { create } for pid=5091 comm="syz.0.666" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 179.407751][ T29] audit: type=1400 audit(179.330:157): avc: denied { lock } for pid=5234 comm="syz.1.736" path="socket:[7592]" dev="sockfs" ino=7592 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=udp_socket permissive=1 [ 184.689934][ T29] audit: type=1400 audit(184.610:158): avc: denied { create } for pid=5311 comm="syz.0.774" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 184.701226][ T29] audit: type=1400 audit(184.620:159): avc: denied { setopt } for pid=5311 comm="syz.0.774" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 190.150905][ T29] audit: type=1400 audit(190.080:160): avc: denied { sqpoll } for pid=5398 comm="syz.0.817" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 191.500698][ T29] audit: type=1400 audit(191.430:161): avc: denied { create } for pid=5432 comm="syz.1.834" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 191.505169][ T29] audit: type=1400 audit(191.430:162): avc: denied { ioctl } for pid=5432 comm="syz.1.834" path="socket:[8842]" dev="sockfs" ino=8842 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 192.199768][ T29] audit: type=1400 audit(192.130:163): avc: denied { bind } for pid=5462 comm="syz.1.849" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 192.201064][ T29] audit: type=1400 audit(192.130:164): avc: denied { node_bind } for pid=5462 comm="syz.1.849" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 [ 193.333036][ T5499] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5499 comm=syz.0.867 [ 194.274074][ T5523] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5523 comm=syz.0.879 [ 196.131867][ T5569] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5569 comm=syz.1.901 [ 203.251254][ T5701] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5701 comm=syz.0.966 [ 203.538028][ T29] audit: type=1400 audit(203.460:165): avc: denied { map } for pid=5708 comm="syz.0.970" path="pipe:[10278]" dev="pipefs" ino=10278 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=1 [ 203.907325][ T29] audit: type=1400 audit(203.840:166): avc: denied { getopt } for pid=5716 comm="syz.0.974" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 204.196952][ T5724] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5724 comm=syz.0.978 [ 209.253623][ T29] audit: type=1400 audit(209.180:167): avc: denied { ioctl } for pid=5774 comm="syz.0.1002" path="socket:[10396]" dev="sockfs" ino=10396 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 209.261125][ T29] audit: type=1400 audit(209.190:168): avc: denied { bind } for pid=5774 comm="syz.0.1002" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 209.265342][ T29] audit: type=1400 audit(209.190:169): avc: denied { write } for pid=5774 comm="syz.0.1002" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 211.541980][ T29] audit: type=1400 audit(211.470:170): avc: denied { ioctl } for pid=5810 comm="syz.1.1020" path="socket:[9658]" dev="sockfs" ino=9658 ioctlcmd=0x456f scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 215.435774][ T5935] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5935 comm=syz.0.1076 [ 222.219377][ T5985] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65534 sclass=netlink_route_socket pid=5985 comm=syz.1.1102 [ 222.380066][ T29] audit: type=1400 audit(222.310:171): avc: denied { setopt } for pid=5990 comm="syz.0.1105" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 222.648519][ T29] audit: type=1400 audit(222.580:172): avc: denied { map } for pid=6000 comm="syz.0.1110" path="/dev/fb0" dev="devtmpfs" ino=616 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 222.651451][ T29] audit: type=1400 audit(222.580:173): avc: denied { execute } for pid=6000 comm="syz.0.1110" path="/dev/fb0" dev="devtmpfs" ino=616 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 224.289824][ T6045] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=6045 comm=syz.1.1131 [ 224.506629][ T29] audit: type=1400 audit(224.420:174): avc: denied { setopt } for pid=6050 comm="syz.0.1134" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 224.558905][ T6053] veth1_to_team: entered allmulticast mode [ 225.017045][ T6067] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=6067 comm=syz.0.1142 [ 226.794832][ T29] audit: type=1400 audit(226.720:175): avc: denied { read } for pid=6104 comm="syz.1.1160" path="socket:[10880]" dev="sockfs" ino=10880 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 227.399279][ T6121] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=6121 comm=syz.0.1168 [ 227.511492][ T29] audit: type=1400 audit(227.440:176): avc: denied { shutdown } for pid=6122 comm="syz.1.1169" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 227.515268][ T29] audit: type=1400 audit(227.440:177): avc: denied { write } for pid=6122 comm="syz.1.1169" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 228.648076][ T29] audit: type=1400 audit(228.580:178): avc: denied { remount } for pid=6141 comm="syz.1.1178" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 230.779747][ T29] audit: type=1400 audit(230.710:179): avc: denied { nlmsg_write } for pid=6166 comm="syz.0.1190" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 231.658719][ T6195] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=6195 comm=syz.0.1204 [ 231.780729][ T6198] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=6198 comm=syz.1.1205 [ 237.871483][ T29] audit: type=1400 audit(237.800:180): avc: denied { watch watch_reads } for pid=6371 comm="syz.0.1292" path="/708" dev="tmpfs" ino=3623 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 238.091048][ T6377] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6377 comm=syz.1.1294 [ 240.864914][ T29] audit: type=1400 audit(240.790:181): avc: denied { connect } for pid=6404 comm="syz.0.1307" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 241.724351][ T29] audit: type=1400 audit(241.650:182): avc: denied { setopt } for pid=6412 comm="syz.1.1311" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 246.760060][ T29] audit: type=1400 audit(246.690:183): avc: denied { write } for pid=6485 comm="syz.1.1346" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 248.423521][ T29] audit: type=1400 audit(248.350:184): avc: denied { ioctl } for pid=6536 comm="syz.1.1373" path="socket:[12246]" dev="sockfs" ino=12246 ioctlcmd=0x5451 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 248.749008][ T29] audit: type=1400 audit(248.680:185): avc: denied { setattr } for pid=6546 comm="syz.0.1377" name="RAWv6" dev="sockfs" ino=12558 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 251.131736][ T6586] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=515 sclass=netlink_audit_socket pid=6586 comm=syz.1.1395 [ 254.669242][ T6637] kernel profiling enabled (shift: 7) [ 258.695588][ T6681] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6681 comm=syz.0.1442 [ 263.077097][ T29] audit: type=1400 audit(263.010:186): avc: denied { setopt } for pid=6733 comm="syz.0.1469" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 264.190733][ T6755] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=637 sclass=netlink_route_socket pid=6755 comm=syz.0.1479 [ 268.421383][ T6811] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=6811 comm=syz.1.1505 [ 269.261942][ T29] audit: type=1400 audit(269.190:187): avc: denied { write } for pid=6839 comm="syz.1.1520" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 269.262010][ T6840] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=6840 comm=syz.1.1520 [ 269.448526][ T6846] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6846 comm=syz.0.1523 [ 270.378413][ T6874] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6874 comm=syz.0.1537 [ 270.593468][ T6881] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=1550 sclass=netlink_audit_socket pid=6881 comm=syz.1.1540 [ 273.107000][ T6924] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6924 comm=syz.1.1561 [ 277.232863][ T6939] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6939 comm=syz.0.1568 [ 293.665068][ T7067] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=7067 comm=syz.1.1626 [ 294.326456][ T7077] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=7077 comm=syz.0.1637 [ 297.084451][ T7088] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65534 sclass=netlink_route_socket pid=7088 comm=syz.0.1642 [ 300.248294][ T7132] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=7132 comm=syz.1.1659 [ 301.173101][ T7158] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=7158 comm=syz.0.1669 [ 303.622485][ T7208] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=7208 comm=syz.1.1698 [ 304.580533][ T7225] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=7225 comm=syz.0.1702 [ 307.495270][ T7273] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=7273 comm=syz.1.1726 [ 307.658366][ T7277] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=7277 comm=syz.1.1729 [ 313.445093][ T7415] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7415 comm=syz.0.1798 [ 328.064100][ T7693] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=515 sclass=netlink_audit_socket pid=7693 comm=syz.0.1934 [ 336.906800][ T7797] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7797 comm=syz.1.1984 [ 337.144032][ T7799] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7799 comm=syz.0.1990 [ 351.291356][ T7952] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7952 comm=syz.1.2060 [ 353.299508][ T7991] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=7991 comm=syz.0.2080 [ 353.874757][ T8008] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=8008 comm=syz.1.2087 [ 354.409458][ T8022] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=8022 comm=syz.0.2094 [ 354.515577][ T8025] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8025 comm=syz.1.2096 [ 354.881112][ T8036] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=8036 comm=syz.0.2100 [ 355.518337][ T8053] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=1550 sclass=netlink_audit_socket pid=8053 comm=syz.0.2111 [ 792.256576][ C0] watchdog: BUG: soft lockup - CPU#0 stuck for 430s! [syz.1.313:4360] [ 792.256838][ C0] Modules linked in: [ 792.257954][ C0] CPU: 0 UID: 0 PID: 4360 Comm: syz.1.313 Tainted: G L syzkaller #0 PREEMPT [ 792.258243][ C0] Tainted: [L]=SOFTLOCKUP [ 792.258295][ C0] Hardware name: ARM-Versatile Express [ 792.258533][ C0] PC is at _raw_spin_unlock_irq+0x28/0x54 [ 792.259281][ C0] LR is at tmigr_handle_remote_up+0x268/0x4b0 [ 792.259360][ C0] pc : [<81a89b04>] lr : [<80346224>] psr: 60000113 [ 792.259407][ C0] sp : df801e08 ip : df801e18 fp : df801e14 [ 792.259445][ C0] r10: 00000001 r9 : 00000054 r8 : cd342700 [ 792.259490][ C0] r7 : ddddb488 r6 : df801ee0 r5 : 830bf3b0 r4 : 830bf380 [ 792.259536][ C0] r3 : 0000c6bc r2 : 00000101 r1 : 830bf3b0 r0 : ddddb488 [ 792.259655][ C0] Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment user [ 792.259733][ C0] Control: 30c5387d Table: 85fb7f80 DAC: fffffffd [ 792.259840][ C0] Call trace: frame pointer underflow [ 792.260138][ C0] [<81a89adc>] (_raw_spin_unlock_irq) from [<80346224>] (tmigr_handle_remote_up+0x268/0x4b0) [ 792.260531][ C0] [<80345fbc>] (tmigr_handle_remote_up) from [<803444d4>] (__walk_groups_from+0x3c/0xe4) [ 792.260649][ C0] r10:83ff4800 r9:8280c820 r8:80345fbc r7:df801ee0 r6:830bf380 r5:00000002 [ 792.260690][ C0] r4:830bf380 [ 792.260714][ C0] [<80344498>] (__walk_groups_from) from [<8034686c>] (tmigr_handle_remote+0xe8/0x108) [ 792.260787][ C0] r9:82804d80 r8:00000100 r7:00000001 r6:00000002 r5:00000002 r4:dddc7488 [ 792.260808][ C0] [<80346784>] (tmigr_handle_remote) from [<80326e68>] (run_timer_softirq+0x30/0x34) [ 792.260868][ C0] r4:82804084 [ 792.260885][ C0] [<80326e38>] (run_timer_softirq) from [<8025af68>] (handle_softirqs+0x140/0x458) [ 792.260945][ C0] [<8025ae28>] (handle_softirqs) from [<8025b3dc>] (__irq_exit_rcu+0x110/0x1d0) [ 792.261014][ C0] r10:00006364 r9:00000000 r8:00000000 r7:ec9c1fb0 r6:82440a40 r5:8247bc64 [ 792.261034][ C0] r4:83ff4800 [ 792.261051][ C0] [<8025b2cc>] (__irq_exit_rcu) from [<8025b754>] (irq_exit+0x10/0x18) [ 792.261108][ C0] r5:8247bc64 r4:826c2a9c [ 792.261124][ C0] [<8025b744>] (irq_exit) from [<81a7b738>] (generic_handle_arch_irq+0x7c/0x80) [ 792.261179][ C0] [<81a7b6bc>] (generic_handle_arch_irq) from [<81a4b818>] (call_with_stack+0x1c/0x20) [ 792.261258][ C0] r9:00000000 r8:826b8044 r7:83ff4800 r6:ffffffff r5:20000010 r4:000194ac [ 792.261283][ C0] [<81a4b7fc>] (call_with_stack) from [<80200f68>] (__irq_usr+0x88/0xa0) [ 792.261426][ C0] Exception stack(0xec9c1fb0 to 0xec9c1ff8) [ 792.261626][ C0] 1fa0: ffffffff 00000004 000001e4 00000000 [ 792.261687][ C0] 1fc0: 00000000 00000000 00000000 00000000 00300000 00000000 00006364 76f5c0bc [ 792.261727][ C0] 1fe0: 20002e10 20002e10 000194ac 000194ac 20000010 ffffffff [ 792.262085][ C0] Sending NMI from CPU 0 to CPUs 1: [ 792.262862][ C1] NMI backtrace for cpu 1 [ 792.263109][ C1] CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Tainted: G L syzkaller #0 PREEMPT [ 792.263183][ C1] Tainted: [L]=SOFTLOCKUP [ 792.263205][ C1] Hardware name: ARM-Versatile Express [ 792.263226][ C1] PC is at _raw_spin_lock+0x40/0x58 [ 792.263305][ C1] LR is at _raw_spin_lock+0x18/0x58 [ 792.263353][ C1] pc : [<81a89cbc>] lr : [<81a89c94>] psr: 80000113 [ 792.263384][ C1] sp : df805d68 ip : df805d68 fp : df805d7c [ 792.263406][ C1] r10: 81c05430 r9 : 84128e40 r8 : 8387fe88 [ 792.263431][ C1] r7 : 84128f68 r6 : 00000001 r5 : 00000001 r4 : 84128f68 [ 792.263456][ C1] r3 : 0000a64d r2 : 0000a64e r1 : 00000000 r0 : 00000001 [ 792.263483][ C1] Flags: Nzcv IRQs on FIQs on Mode SVC_32 ISA ARM Segment none [ 792.263524][ C1] Control: 30c5387d Table: 851578c0 DAC: 00000000 [ 792.263550][ C1] Call trace: frame pointer underflow [ 792.263628][ C1] [<81a89c7c>] (_raw_spin_lock) from [<809c0ef0>] (gpio_mmio_set+0x44/0x80) [ 792.263720][ C1] r5:00000001 r4:84128e40 [ 792.263743][ C1] [<809c0eac>] (gpio_mmio_set) from [<809b187c>] (gpiochip_set+0x1c/0x44) [ 792.263821][ C1] r7:00000001 r6:00000000 r5:00000000 r4:841cad80 [ 792.263839][ C1] [<809b1860>] (gpiochip_set) from [<809b4094>] (gpiod_set_raw_value_commit+0x78/0x218) [ 792.263895][ C1] [<809b401c>] (gpiod_set_raw_value_commit) from [<809b5934>] (gpiod_set_value_nocheck+0x44/0x58) [ 792.263974][ C1] r10:81c05430 r9:df805ebc r8:00000102 r7:00001912 r6:00000007 r5:00000001 [ 792.263998][ C1] r4:841cad80 [ 792.264015][ C1] [<809b58f0>] (gpiod_set_value_nocheck) from [<809b5984>] (gpiod_set_value+0x3c/0x88) [ 792.264066][ C1] [<809b5948>] (gpiod_set_value) from [<809c5fec>] (gpio_led_set+0x5c/0x60) [ 792.264124][ C1] r5:8330f844 r4:8330f844 [ 792.264142][ C1] [<809c5f90>] (gpio_led_set) from [<809c3898>] (led_set_brightness_nosleep+0x38/0x44) [ 792.264259][ C1] r5:8330f844 r4:84d0608c [ 792.264277][ C1] [<809c3860>] (led_set_brightness_nosleep) from [<809c68e8>] (led_heartbeat_function+0x84/0x144) [ 792.264338][ C1] [<809c6864>] (led_heartbeat_function) from [<803267d8>] (call_timer_fn+0x30/0x220) [ 792.264418][ C1] r7:00001912 r6:809c6864 r5:84d0608c r4:83216000 [ 792.264439][ C1] [<803267a8>] (call_timer_fn) from [<80326c8c>] (__run_timers+0x2c4/0x3f8) [ 792.264507][ C1] r9:df805ebc r8:00001912 r7:00000000 r6:809c6864 r5:dddd9f00 r4:84d0608c [ 792.264527][ C1] [<803269c8>] (__run_timers) from [<80326e28>] (run_timer_base+0x68/0x78) [ 792.264608][ C1] r10:83216000 r9:82804d80 r8:00000102 r7:00000001 r6:00000082 r5:00000002 [ 792.264630][ C1] r4:dddd9f00 [ 792.264648][ C1] [<80326dc0>] (run_timer_base) from [<80326e54>] (run_timer_softirq+0x1c/0x34) [ 792.264720][ C1] r4:82804084 [ 792.264736][ C1] [<80326e38>] (run_timer_softirq) from [<8025af68>] (handle_softirqs+0x140/0x458) [ 792.264797][ C1] [<8025ae28>] (handle_softirqs) from [<8025b3dc>] (__irq_exit_rcu+0x110/0x1d0) [ 792.264870][ C1] r10:00000000 r9:83216000 r8:00000000 r7:df865e08 r6:82440a40 r5:8247bc64 [ 792.264891][ C1] r4:83216000 [ 792.264908][ C1] [<8025b2cc>] (__irq_exit_rcu) from [<8025b754>] (irq_exit+0x10/0x18) [ 792.264967][ C1] r5:8247bc64 r4:826c2a9c [ 792.264984][ C1] [<8025b744>] (irq_exit) from [<81a7b738>] (generic_handle_arch_irq+0x7c/0x80) [ 792.265109][ C1] [<81a7b6bc>] (generic_handle_arch_irq) from [<81a4b818>] (call_with_stack+0x1c/0x20) [ 792.265209][ C1] r9:83216000 r8:8387fe88 r7:df865e3c r6:ffffffff r5:60000013 r4:809c16f0 [ 792.265233][ C1] [<81a4b7fc>] (call_with_stack) from [<80200bec>] (__irq_svc+0x8c/0xbc) [ 792.265301][ C1] Exception stack(0xdf865e08 to 0xdf865e50) [ 792.265344][ C1] 5e00: e05ff008 0000000c 0000a64d 00000000 e05ff008 0000000c [ 792.265380][ C1] 5e20: 00000001 84128f68 8387fe88 84128e40 00000000 df865e6c df865e58 df865e58 [ 792.265408][ C1] 5e40: 809c16ec 809c16f0 60000013 ffffffff [ 792.265431][ C1] [<809c16d0>] (gpio_mmio_write32) from [<809c0f10>] (gpio_mmio_set+0x64/0x80) [ 792.265495][ C1] r5:00000008 r4:84128e40 [ 792.265512][ C1] [<809c0eac>] (gpio_mmio_set) from [<809b187c>] (gpiochip_set+0x1c/0x44) [ 792.265593][ C1] r7:00000001 r6:00000000 r5:00000003 r4:841cadbc [ 792.265613][ C1] [<809b1860>] (gpiochip_set) from [<809b4094>] (gpiod_set_raw_value_commit+0x78/0x218) [ 792.265673][ C1] [<809b401c>] (gpiod_set_raw_value_commit) from [<809b5934>] (gpiod_set_value_nocheck+0x44/0x58) [ 792.265741][ C1] r10:00000000 r9:00000000 r8:00000001 r7:ddde24c0 r6:8381c958 r5:00000001 [ 792.265763][ C1] r4:841cadbc [ 792.265778][ C1] [<809b58f0>] (gpiod_set_value_nocheck) from [<809b5984>] (gpiod_set_value+0x3c/0x88) [ 792.265827][ C1] [<809b5948>] (gpiod_set_value) from [<809c5fec>] (gpio_led_set+0x5c/0x60) [ 792.265881][ C1] r5:000000ff r4:8330fb14 [ 792.265898][ C1] [<809c5f90>] (gpio_led_set) from [<809c3928>] (led_set_brightness+0x84/0x90) [ 792.265954][ C1] r5:000000ff r4:8330fb14 [ 792.265969][ C1] [<809c38a4>] (led_set_brightness) from [<809c5494>] (led_trigger_event+0x40/0x58) [ 792.266017][ C1] r5:000000ff r4:8330fb14 [ 792.266033][ C1] [<809c5454>] (led_trigger_event) from [<809c6af0>] (ledtrig_cpu+0xac/0xf4) [ 792.266088][ C1] r7:ddde24c0 r6:00000002 r5:82b15bd8 r4:000001fd [ 792.266105][ C1] [<809c6a44>] (ledtrig_cpu) from [<80227758>] (arch_cpu_idle_exit+0x14/0x18) [ 792.266170][ C1] r9:00000000 r8:00000001 r7:8280c710 r6:83216000 r5:8280c6d0 r4:00000001 [ 792.266189][ C1] [<80227744>] (arch_cpu_idle_exit) from [<802b13cc>] (do_idle+0x5c/0x2d8) [ 792.266251][ C1] [<802b1370>] (do_idle) from [<802b1978>] (cpu_startup_entry+0x30/0x34) [ 792.266323][ C1] r10:00000000 r9:414fc0f0 r8:80003000 r7:82a7b4a4 r6:83216000 r5:00000001 [ 792.266350][ C1] r4:00000092 [ 792.266367][ C1] [<802b1948>] (cpu_startup_entry) from [<8022f04c>] (secondary_start_kernel+0x128/0x180) [ 792.266436][ C1] [<8022ef24>] (secondary_start_kernel) from [<80220094>] (__enable_mmu+0x0/0xc) [ 792.266510][ C1] r7:82a7b4a4 r6:30c0387d r5:00000000 r4:830b7b80 [ 792.268247][ C0] Kernel panic - not syncing: softlockup: hung tasks [ 792.298394][ C0] CPU: 0 UID: 0 PID: 4360 Comm: syz.1.313 Tainted: G L syzkaller #0 PREEMPT [ 792.298806][ C0] Tainted: [L]=SOFTLOCKUP [ 792.298989][ C0] Hardware name: ARM-Versatile Express [ 792.299240][ C0] Call trace: frame pointer underflow [ 792.299631][ C0] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 792.300015][ C0] r7:822936e0 r6:83ff4800 r5:00000000 r4:82292888 [ 792.300307][ C0] [<80201b08>] (show_stack) from [<8021ec70>] (dump_stack_lvl+0x54/0x7c) [ 792.300671][ C0] [<8021ec1c>] (dump_stack_lvl) from [<8021ecb0>] (dump_stack+0x18/0x1c) [ 792.301018][ C0] r5:00000000 r4:82a7bd18 [ 792.301199][ C0] [<8021ec98>] (dump_stack) from [<802025f8>] (vpanic+0xe0/0x2e8) [ 792.301534][ C0] [<80202518>] (vpanic) from [<80202834>] (trace_suspend_resume+0x0/0xd8) [ 792.301872][ C0] r7:82ac27f0 [ 792.302031][ C0] [<80202800>] (panic) from [<803832c4>] (watchdog_timer_fn+0x2bc/0x330) [ 792.302402][ C0] r3:00000001 r2:00004000 r1:82a7bd20 r0:822936e0 [ 792.302644][ C0] [<80383008>] (watchdog_timer_fn) from [<803293cc>] (__hrtimer_run_queues+0x1c4/0x454) [ 792.303036][ C0] r10:83ff4800 r9:00000000 r8:dddc7130 r7:80383008 r6:dddc7000 r5:dddc7040 [ 792.303377][ C0] r4:dddc75d8 [ 792.303540][ C0] [<80329208>] (__hrtimer_run_queues) from [<8032a9d0>] (hrtimer_interrupt+0x148/0x2bc) [ 792.303957][ C0] r10:72381820 r9:dddc7180 r8:dddc7130 r7:000000b8 r6:00000003 r5:20000193 [ 792.304334][ C0] r4:dddc7000 [ 792.304504][ C0] [<8032a888>] (hrtimer_interrupt) from [<8131cfd0>] (arch_timer_handler_virt+0x30/0x38) [ 792.304908][ C0] r10:81d0f768 r9:8309e400 r8:00000000 r7:00000000 r6:00000000 r5:82495528 [ 792.305220][ C0] r4:8309de00 [ 792.305390][ C0] [<8131cfa0>] (arch_timer_handler_virt) from [<802ef550>] (handle_percpu_devid_irq+0x128/0x34c) [ 792.305778][ C0] [<802ef428>] (handle_percpu_devid_irq) from [<802e86f4>] (handle_irq_desc+0x74/0x84) [ 792.306226][ C0] r10:00000001 r9:83ff4800 r8:00000000 r7:df80a00c r6:826c1388 r5:df80a000 [ 792.306567][ C0] r4:8280cc3c [ 792.306723][ C0] [<802e8680>] (handle_irq_desc) from [<802e8770>] (generic_handle_domain_irq+0x18/0x1c) [ 792.307095][ C0] [<802e8758>] (generic_handle_domain_irq) from [<802012c8>] (gic_handle_irq+0x68/0x7c) [ 792.307480][ C0] [<80201260>] (gic_handle_irq) from [<81a7b71c>] (generic_handle_arch_irq+0x60/0x80) [ 792.307890][ C0] r7:df801db8 r6:82440a40 r5:8247bc64 r4:826c2a9c [ 792.308158][ C0] [<81a7b6bc>] (generic_handle_arch_irq) from [<80200bdc>] (__irq_svc+0x7c/0xbc) [ 792.308551][ C0] Exception stack(0xdf801db8 to 0xdf801e00) [ 792.308811][ C0] 1da0: ddddb488 830bf3b0 [ 792.309136][ C0] 1dc0: 00000101 0000c6bc 830bf380 830bf3b0 df801ee0 ddddb488 cd342700 00000054 [ 792.309480][ C0] 1de0: 00000001 df801e14 df801e18 df801e08 80346224 81a89b04 60000113 ffffffff [ 792.309822][ C0] r9:83ff4800 r8:cd342700 r7:df801dec r6:ffffffff r5:60000113 r4:81a89b04 [ 792.310154][ C0] [<81a89adc>] (_raw_spin_unlock_irq) from [<80346224>] (tmigr_handle_remote_up+0x268/0x4b0) [ 792.310614][ C0] [<80345fbc>] (tmigr_handle_remote_up) from [<803444d4>] (__walk_groups_from+0x3c/0xe4) [ 792.311044][ C0] r10:83ff4800 r9:8280c820 r8:80345fbc r7:df801ee0 r6:830bf380 r5:00000002 [ 792.311366][ C0] r4:830bf380 [ 792.311546][ C0] [<80344498>] (__walk_groups_from) from [<8034686c>] (tmigr_handle_remote+0xe8/0x108) [ 792.311959][ C0] r9:82804d80 r8:00000100 r7:00000001 r6:00000002 r5:00000002 r4:dddc7488 [ 792.312308][ C0] [<80346784>] (tmigr_handle_remote) from [<80326e68>] (run_timer_softirq+0x30/0x34) [ 792.312813][ C0] r4:82804084 [ 792.312994][ C0] [<80326e38>] (run_timer_softirq) from [<8025af68>] (handle_softirqs+0x140/0x458) [ 792.313776][ C0] [<8025ae28>] (handle_softirqs) from [<8025b3dc>] (__irq_exit_rcu+0x110/0x1d0) [ 792.314164][ C0] r10:00006364 r9:00000000 r8:00000000 r7:ec9c1fb0 r6:82440a40 r5:8247bc64 [ 792.314501][ C0] r4:83ff4800 [ 792.314670][ C0] [<8025b2cc>] (__irq_exit_rcu) from [<8025b754>] (irq_exit+0x10/0x18) [ 792.315015][ C0] r5:8247bc64 r4:826c2a9c [ 792.315220][ C0] [<8025b744>] (irq_exit) from [<81a7b738>] (generic_handle_arch_irq+0x7c/0x80) [ 792.315633][ C0] [<81a7b6bc>] (generic_handle_arch_irq) from [<81a4b818>] (call_with_stack+0x1c/0x20) [ 792.316060][ C0] r9:00000000 r8:826b8044 r7:83ff4800 r6:ffffffff r5:20000010 r4:000194ac [ 792.316418][ C0] [<81a4b7fc>] (call_with_stack) from [<80200f68>] (__irq_usr+0x88/0xa0) [ 792.316761][ C0] Exception stack(0xec9c1fb0 to 0xec9c1ff8) [ 792.317006][ C0] 1fa0: ffffffff 00000004 000001e4 00000000 [ 792.317391][ C0] 1fc0: 00000000 00000000 00000000 00000000 00300000 00000000 00006364 76f5c0bc [ 792.317734][ C0] 1fe0: 20002e10 20002e10 000194ac 000194ac 20000010 ffffffff [ 792.320588][ C0] Rebooting in 86400 seconds..