last executing test programs: 2.542958208s ago: executing program 0 (id=1414): r0 = socket(0x29, 0x2, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockname$inet6(r0, 0x0, &(0x7f0000000180)) 2.115418013s ago: executing program 0 (id=1415): r0 = openat$vsock(0xffffff9c, &(0x7f0000000000), 0x200000, 0x0) close_range(r0, r0, 0x0) socket(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x17, &(0x7f0000000040)=0x3, 0x4) 1.81869955s ago: executing program 0 (id=1416): r0 = fsopen(&(0x7f00000001c0)='ramfs\x00', 0x0) fsconfig$FSCONFIG_SET_FLAG(r0, 0x6, 0x0, 0x0, 0x0) r1 = fsmount(r0, 0x0, 0x1) renameat(r1, &(0x7f0000000100)='./file1\x00', r1, &(0x7f0000000140)='./file0\x00') 1.193969209s ago: executing program 0 (id=1417): r0 = socket$unix(0x1, 0x1, 0x0) r1 = memfd_create(&(0x7f00000002c0)='-B\xd5NI\xc5\xac\xdb\xb9\xdb\xd1\xa7\xb1S\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbf]\xcbE\x00#\xcf)\x0f\xc8\xc0:\x9cc\x10$\xee\xa9\x8bcc\xad\x89\x9ck\xde\xc5\xe96\xddUE\xc98M\xcd\xfb\xcc\x97\xb4\v\xa9&\xcdJx\xaa\x8f~\x1b\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00=\xce\xe7>\x12\xf2\xe8\x1c\x11G\xdcpA\xbe\xb6?\xb61Kd\xf0\xb6\x963(nB\xc5\xb3\x9e\\\x15\xb1J\xffFQ~\xd2\x00\x8d\x8d\x93\xec@\xa8\xd5\xa3\xf9\xfe`@\xac\x01\xe4\x03\xb5H\x9ay\xe4\x89\xb9\xd8.\xf8\x8eV\xe3w\x97pn\x9b\x93\xc1\xfa\xa7I\xf7\n>\xd9e\xc7\xf5\xf4\xb3\xec6\fn\xfb&\xeb&h\xa7T\xd7J\x8d\xa2a\x92T#\x9d\x06\xd3\x11\xfa\xaa&\t\xa71\x02\xed\xfc\x7f\\S\x995[So\x1bT\x10D\xf7^\b\x93g\xcbb,\xc3\x91\xdb/w\xa36', 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) write$USERIO_CMD_REGISTER(r2, 0x0, 0x0) 486.134088ms ago: executing program 1 (id=1418): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000780)={0x26, 'hash\x00', 0x0, 0x0, 'sha3-384\x00'}, 0x58) r1 = accept(r0, 0x0, 0x0) sendmsg$NL80211_CMD_DISASSOCIATE(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x8010}, 0x20000800) 472.02644ms ago: executing program 0 (id=1422): r0 = socket$unix(0x1, 0x1, 0x0) r1 = memfd_create(&(0x7f00000002c0)='-B\xd5NI\xc5\xac\xdb\xb9\xdb\xd1\xa7\xb1S\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbf]\xcbE\x00#\xcf)\x0f\xc8\xc0:\x9cc\x10$\xee\xa9\x8bcc\xad\x89\x9ck\xde\xc5\xe96\xddUE\xc98M\xcd\xfb\xcc\x97\xb4\v\xa9&\xcdJx\xaa\x8f~\x1b\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00=\xce\xe7>\x12\xf2\xe8\x1c\x11G\xdcpA\xbe\xb6?\xb61Kd\xf0\xb6\x963(nB\xc5\xb3\x9e\\\x15\xb1J\xffFQ~\xd2\x00\x8d\x8d\x93\xec@\xa8\xd5\xa3\xf9\xfe`@\xac\x01\xe4\x03\xb5H\x9ay\xe4\x89\xb9\xd8.\xf8\x8eV\xe3w\x97pn\x9b\x93\xc1\xfa\xa7I\xf7\n>\xd9e\xc7\xf5\xf4\xb3\xec6\fn\xfb&\xeb&h\xa7T\xd7J\x8d\xa2a\x92T#\x9d\x06\xd3\x11\xfa\xaa&\t\xa71\x02\xed\xfc\x7f\\S\x995[So\x1bT\x10D\xf7^\b\x93g\xcbb,\xc3\x91\xdb/w\xa36', 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) write$USERIO_CMD_REGISTER(r2, 0x0, 0x0) 348.989026ms ago: executing program 1 (id=1419): r0 = landlock_create_ruleset(&(0x7f00000000c0)={0xcc58, 0x2, 0x3}, 0x18, 0x0) landlock_restrict_self(r0, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$SNDCTL_SEQ_TESTMIDI(r1, 0x541b, 0x0) 239.31363ms ago: executing program 1 (id=1420): r0 = openat$vsock(0xffffff9c, &(0x7f0000000000), 0x200000, 0x0) close_range(r0, r0, 0x0) socket(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x17, &(0x7f0000000040)=0x3, 0x4) 229.687281ms ago: executing program 0 (id=1425): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) sendto$l2tp6(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x3}, 0x20) sendmsg$RDMA_NLDEV_CMD_STAT_DEL(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}, 0x1, 0x0, 0x0, 0x4000008}, 0x20004000) 171.256248ms ago: executing program 1 (id=1421): r0 = fsopen(&(0x7f00000001c0)='ramfs\x00', 0x0) fsconfig$FSCONFIG_SET_FLAG(r0, 0x6, 0x0, 0x0, 0x0) r1 = fsmount(r0, 0x0, 0x1) renameat(r1, &(0x7f0000000100)='./file1\x00', r1, &(0x7f0000000140)='./file0\x00') 91.345038ms ago: executing program 1 (id=1423): r0 = socket(0x29, 0x2, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockname$inet6(r0, 0x0, &(0x7f0000000180)) 0s ago: executing program 1 (id=1424): r0 = openat$selinux_enforce(0xffffff9c, &(0x7f0000000000), 0x40000, 0x0) close(r0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_int(r0, 0x0, 0x22, 0x0, &(0x7f00000019c0)) kernel console output (not intermixed with test programs): [ 48.584724][ T29] audit: type=1400 audit(48.530:56): avc: denied { read write } for pid=3087 comm="sftp-server" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 48.586749][ T29] audit: type=1400 audit(48.530:57): avc: denied { open } for pid=3087 comm="sftp-server" path="/dev/null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 Warning: Permanently added '[localhost]:25524' (ED25519) to the list of known hosts. [ 61.414312][ T29] audit: type=1400 audit(61.360:58): avc: denied { name_bind } for pid=3090 comm="sshd-session" src=30000 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 63.628366][ T29] audit: type=1400 audit(63.570:59): avc: denied { execute } for pid=3091 comm="sh" name="syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 63.649438][ T29] audit: type=1400 audit(63.590:60): avc: denied { execute_no_trans } for pid=3091 comm="sh" path="/syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 66.920994][ T29] audit: type=1400 audit(66.860:61): avc: denied { mounton } for pid=3091 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=806 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 66.925130][ T29] audit: type=1400 audit(66.870:62): avc: denied { mount } for pid=3091 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 66.945383][ T3091] cgroup: Unknown subsys name 'net' [ 66.955357][ T29] audit: type=1400 audit(66.900:63): avc: denied { unmount } for pid=3091 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 67.147758][ T3091] cgroup: Unknown subsys name 'cpuset' [ 67.154161][ T3091] cgroup: Unknown subsys name 'hugetlb' [ 67.155077][ T3091] cgroup: Unknown subsys name 'rlimit' [ 67.364756][ T29] audit: type=1400 audit(67.310:64): avc: denied { setattr } for pid=3091 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 67.368121][ T29] audit: type=1400 audit(67.310:65): avc: denied { mounton } for pid=3091 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 67.372372][ T29] audit: type=1400 audit(67.320:66): avc: denied { mount } for pid=3091 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 67.590465][ T3093] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 67.594595][ T29] audit: type=1400 audit(67.540:67): avc: denied { relabelto } for pid=3093 comm="mkswap" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 67.601139][ T29] audit: type=1400 audit(67.550:68): avc: denied { write } for pid=3093 comm="mkswap" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 67.643385][ T29] audit: type=1400 audit(67.590:69): avc: denied { read } for pid=3091 comm="syz-executor" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 67.645057][ T29] audit: type=1400 audit(67.590:70): avc: denied { open } for pid=3091 comm="syz-executor" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 75.510771][ T3091] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 77.493790][ T29] audit: type=1400 audit(77.440:71): avc: denied { execmem } for pid=3094 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 77.558889][ T29] audit: type=1400 audit(77.500:72): avc: denied { read } for pid=3096 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 77.571667][ T29] audit: type=1400 audit(77.510:73): avc: denied { open } for pid=3096 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 77.576812][ T29] audit: type=1400 audit(77.520:74): avc: denied { mounton } for pid=3097 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 77.601510][ T29] audit: type=1400 audit(77.550:75): avc: denied { module_request } for pid=3096 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 77.601878][ T29] audit: type=1400 audit(77.550:76): avc: denied { module_request } for pid=3097 comm="syz-executor" kmod="netdev-nr1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 77.675543][ T29] audit: type=1400 audit(77.620:77): avc: denied { sys_module } for pid=3096 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 78.234535][ T29] audit: type=1400 audit(78.180:78): avc: denied { ioctl } for pid=3096 comm="syz-executor" path="/dev/net/tun" dev="devtmpfs" ino=677 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 79.096146][ T3097] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 79.105519][ T3097] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 79.285853][ T3096] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 79.298496][ T3096] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 79.887922][ T3097] hsr_slave_0: entered promiscuous mode [ 79.894071][ T3097] hsr_slave_1: entered promiscuous mode [ 80.034477][ T3096] hsr_slave_0: entered promiscuous mode [ 80.036094][ T3096] hsr_slave_1: entered promiscuous mode [ 80.038788][ T3096] debugfs: 'hsr0' already exists in 'hsr' [ 80.040978][ T3096] Cannot create hsr debugfs directory [ 80.437231][ T29] audit: type=1400 audit(80.380:79): avc: denied { create } for pid=3097 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 80.446496][ T29] audit: type=1400 audit(80.390:80): avc: denied { write } for pid=3097 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 80.460490][ T3097] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 80.472929][ T3097] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 80.481493][ T3097] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 80.500630][ T3097] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 80.608384][ T3096] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 80.622963][ T3096] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 80.635073][ T3096] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 80.650144][ T3096] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 81.348349][ T3097] 8021q: adding VLAN 0 to HW filter on device bond0 [ 81.390635][ T3096] 8021q: adding VLAN 0 to HW filter on device bond0 [ 83.861089][ T3096] veth0_vlan: entered promiscuous mode [ 83.873990][ T3096] veth1_vlan: entered promiscuous mode [ 83.947289][ T3096] veth0_macvtap: entered promiscuous mode [ 83.955359][ T3096] veth1_macvtap: entered promiscuous mode [ 84.015753][ T929] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 84.016545][ T929] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 84.016651][ T929] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 84.016726][ T929] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 84.100356][ T3097] veth0_vlan: entered promiscuous mode [ 84.158305][ T3097] veth1_vlan: entered promiscuous mode [ 84.189411][ T29] kauditd_printk_skb: 1 callbacks suppressed [ 84.190098][ T29] audit: type=1400 audit(84.130:82): avc: denied { mount } for pid=3096 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 84.207038][ T29] audit: type=1400 audit(84.150:83): avc: denied { mounton } for pid=3096 comm="syz-executor" path="/syzkaller.iKjLFZ/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 84.219116][ T29] audit: type=1400 audit(84.160:84): avc: denied { mount } for pid=3096 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 84.231174][ T29] audit: type=1400 audit(84.170:85): avc: denied { mounton } for pid=3096 comm="syz-executor" path="/syzkaller.iKjLFZ/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 84.241180][ T29] audit: type=1400 audit(84.180:86): avc: denied { mounton } for pid=3096 comm="syz-executor" path="/syzkaller.iKjLFZ/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=2026 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 84.260831][ T3097] veth0_macvtap: entered promiscuous mode [ 84.270397][ T3097] veth1_macvtap: entered promiscuous mode [ 84.287270][ T29] audit: type=1400 audit(84.230:87): avc: denied { unmount } for pid=3096 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 84.301743][ T29] audit: type=1400 audit(84.240:88): avc: denied { mounton } for pid=3096 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=772 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 84.304566][ T29] audit: type=1400 audit(84.250:89): avc: denied { mount } for pid=3096 comm="syz-executor" name="/" dev="gadgetfs" ino=2027 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 84.322298][ T29] audit: type=1400 audit(84.260:90): avc: denied { mount } for pid=3096 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 84.326609][ T29] audit: type=1400 audit(84.270:91): avc: denied { mounton } for pid=3096 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 84.390987][ T12] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 84.391420][ T12] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 84.391514][ T12] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 84.391613][ T12] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 84.456547][ T3096] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 86.980700][ T3712] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3712 comm=syz.0.2 [ 89.396858][ T3753] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3753 comm=syz.1.20 [ 90.671376][ T3762] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1012 sclass=netlink_route_socket pid=3762 comm=syz.1.27 [ 90.794446][ T3767] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1012 sclass=netlink_route_socket pid=3767 comm=syz.0.33 [ 91.193062][ T29] kauditd_printk_skb: 20 callbacks suppressed [ 91.195012][ T29] audit: type=1400 audit(134217819.134:112): avc: denied { append } for pid=3782 comm="syz.1.38" name="loop-control" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 91.426773][ T29] audit: type=1400 audit(134217819.364:113): avc: denied { create } for pid=3790 comm="syz.1.41" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 91.516311][ T29] audit: type=1400 audit(134217819.454:114): avc: denied { ioctl } for pid=3792 comm="syz.1.42" path="socket:[2540]" dev="sockfs" ino=2540 ioctlcmd=0x894c scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 91.660610][ T29] audit: type=1400 audit(134217819.604:115): avc: denied { setopt } for pid=3796 comm="syz.1.45" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 92.361700][ T29] audit: type=1400 audit(134217820.304:116): avc: denied { ioctl } for pid=3819 comm="syz.1.55" path="socket:[3285]" dev="sockfs" ino=3285 ioctlcmd=0x8902 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 92.412017][ T29] audit: type=1400 audit(134217820.344:117): avc: denied { create } for pid=3822 comm="syz.1.57" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 92.420703][ T29] audit: type=1400 audit(134217820.364:118): avc: denied { ioctl } for pid=3822 comm="syz.1.57" path="socket:[2605]" dev="sockfs" ino=2605 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 92.423783][ T29] audit: type=1400 audit(134217820.364:119): avc: denied { bind } for pid=3822 comm="syz.1.57" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 92.426703][ T29] audit: type=1400 audit(134217820.364:120): avc: denied { write } for pid=3822 comm="syz.1.57" path="socket:[2605]" dev="sockfs" ino=2605 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 99.269159][ T29] audit: type=1400 audit(134217827.204:121): avc: denied { create } for pid=3864 comm="syz.0.74" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 99.273651][ T29] audit: type=1400 audit(134217827.214:122): avc: denied { write } for pid=3864 comm="syz.0.74" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 99.276347][ T3866] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=3866 comm=syz.0.74 [ 99.385603][ T3870] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=3870 comm=syz.0.77 [ 99.677647][ T3881] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=3881 comm=syz.1.82 [ 99.777061][ T3884] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=3884 comm=syz.1.84 [ 99.908419][ T29] audit: type=1400 audit(134217827.844:123): avc: denied { create } for pid=3887 comm="syz.0.86" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 99.922940][ T29] audit: type=1400 audit(134217827.864:124): avc: denied { ioctl } for pid=3887 comm="syz.0.86" path="socket:[2700]" dev="sockfs" ino=2700 ioctlcmd=0x5403 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 100.212976][ T3900] Zero length message leads to an empty skb [ 100.854957][ T3926] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=3926 comm=syz.0.103 [ 101.055492][ T3934] capability: warning: `syz.0.107' uses 32-bit capabilities (legacy support in use) [ 101.178935][ T3938] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=3938 comm=syz.0.110 [ 101.782376][ T3962] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=3962 comm=syz.0.119 [ 101.945099][ T3968] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=515 sclass=netlink_audit_socket pid=3968 comm=syz.0.123 [ 102.107341][ T3975] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=3975 comm=syz.1.128 [ 102.251979][ T3980] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=515 sclass=netlink_audit_socket pid=3980 comm=syz.0.131 [ 105.665916][ T29] audit: type=1400 audit(134217833.604:125): avc: denied { setopt } for pid=4007 comm="syz.1.144" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 109.766163][ T29] audit: type=1400 audit(134217837.704:126): avc: denied { create } for pid=4048 comm="syz.0.163" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 109.771289][ T29] audit: type=1400 audit(134217837.714:127): avc: denied { write } for pid=4048 comm="syz.0.163" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 109.846182][ T4051] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4051 comm=syz.0.164 [ 110.078318][ T29] audit: type=1400 audit(134217838.014:128): avc: denied { write } for pid=4057 comm="syz.0.166" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 110.245720][ T4065] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4065 comm=syz.1.169 [ 113.284947][ T29] audit: type=1400 audit(134217841.224:129): avc: denied { connect } for pid=4102 comm="syz.1.188" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 114.830955][ T4160] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4160 comm=syz.0.215 [ 115.207752][ T4173] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4173 comm=syz.1.224 [ 115.246890][ T29] audit: type=1400 audit(134217843.184:130): avc: denied { create } for pid=4171 comm="syz.0.223" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 115.255481][ T29] audit: type=1400 audit(134217843.194:131): avc: denied { write } for pid=4171 comm="syz.0.223" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 115.567402][ T29] audit: type=1400 audit(134217843.504:132): avc: denied { setopt } for pid=4182 comm="syz.0.228" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 115.958067][ T4196] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4196 comm=syz.1.235 [ 116.107340][ T29] audit: type=1400 audit(134217844.044:133): avc: denied { ioctl } for pid=4200 comm="syz.0.237" path="socket:[3978]" dev="sockfs" ino=3978 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 116.302515][ T4209] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4209 comm=syz.0.241 [ 116.788468][ T29] audit: type=1400 audit(134217844.724:134): avc: denied { create } for pid=4229 comm="syz.1.252" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 116.804686][ T29] audit: type=1400 audit(134217844.744:135): avc: denied { write } for pid=4229 comm="syz.1.252" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 117.003560][ T29] audit: type=1400 audit(134217844.934:136): avc: denied { read } for pid=4237 comm="syz.0.255" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 119.063005][ T4310] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4310 comm=syz.0.288 [ 119.664157][ T4334] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4334 comm=syz.1.303 [ 122.468090][ T29] audit: type=1400 audit(134217850.404:137): avc: denied { ioctl } for pid=4354 comm="syz.0.311" path="socket:[5303]" dev="sockfs" ino=5303 ioctlcmd=0xf517 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 123.025933][ T29] audit: type=1400 audit(134217850.964:138): avc: denied { prog_load } for pid=4374 comm="syz.0.322" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 123.027683][ T29] audit: type=1400 audit(134217850.964:139): avc: denied { bpf } for pid=4374 comm="syz.0.322" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 123.028732][ T29] audit: type=1400 audit(134217850.964:140): avc: denied { perfmon } for pid=4374 comm="syz.0.322" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 123.059031][ T29] audit: type=1400 audit(134217850.994:141): avc: denied { prog_run } for pid=4374 comm="syz.0.322" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 125.945760][ T29] audit: type=1400 audit(134217853.884:142): avc: denied { ioctl } for pid=4389 comm="syz.1.329" path="socket:[5366]" dev="sockfs" ino=5366 ioctlcmd=0x5511 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 133.028976][ T4455] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4455 comm=syz.0.361 [ 133.644432][ T4466] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4466 comm=syz.0.368 [ 144.866159][ T29] audit: type=1400 audit(134217872.794:143): avc: denied { create } for pid=4688 comm="syz.1.478" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 144.866615][ T29] audit: type=1400 audit(134217872.804:144): avc: denied { write } for pid=4688 comm="syz.1.478" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 152.770393][ T29] audit: type=1400 audit(134217880.704:145): avc: denied { create } for pid=4710 comm="syz.0.486" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 152.776686][ T29] audit: type=1400 audit(134217880.714:146): avc: denied { connect } for pid=4710 comm="syz.0.486" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 154.093164][ T4765] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4765 comm=syz.1.514 [ 154.550569][ T4779] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4779 comm=syz.0.521 [ 157.242690][ T4815] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4815 comm=syz.0.539 [ 157.601356][ T29] audit: type=1400 audit(134217885.544:147): avc: denied { setopt } for pid=4824 comm="syz.1.544" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 157.870645][ T4829] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4829 comm=syz.1.546 [ 158.604040][ T29] audit: type=1400 audit(134217886.544:148): avc: denied { read } for pid=4839 comm="syz.0.551" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 159.232146][ T29] audit: type=1400 audit(134217887.174:149): avc: denied { create } for pid=4846 comm="syz.1.555" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 159.314723][ T29] audit: type=1400 audit(134217887.254:150): avc: denied { write } for pid=4846 comm="syz.1.555" path="socket:[6401]" dev="sockfs" ino=6401 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 162.155286][ T4872] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4872 comm=syz.1.565 [ 163.592636][ T4883] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4883 comm=syz.0.572 [ 167.298236][ T4932] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4932 comm=syz.0.595 [ 167.589401][ T4944] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4944 comm=syz.1.601 [ 167.801608][ T4951] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4951 comm=syz.0.604 [ 167.887816][ T4953] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4953 comm=syz.0.606 [ 168.186146][ T4963] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4963 comm=syz.1.611 [ 168.245338][ T4965] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4965 comm=syz.0.612 [ 171.683614][ T29] audit: type=1400 audit(134217899.624:151): avc: denied { getopt } for pid=5035 comm="syz.1.646" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 172.094529][ T29] audit: type=1400 audit(134217900.034:152): avc: denied { getopt } for pid=5050 comm="syz.1.652" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 177.829337][ T5127] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=259 sclass=netlink_route_socket pid=5127 comm=syz.0.691 [ 178.552801][ T29] audit: type=1400 audit(402653362.491:153): avc: denied { read } for pid=5136 comm="syz.1.698" path="socket:[6887]" dev="sockfs" ino=6887 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 178.761403][ T5145] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=259 sclass=netlink_route_socket pid=5145 comm=syz.0.697 [ 185.603684][ T29] audit: type=1400 audit(402653369.541:154): avc: denied { setopt } for pid=5184 comm="syz.0.717" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 198.386052][ T5302] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5124 sclass=netlink_route_socket pid=5302 comm=syz.1.773 [ 198.676343][ T5317] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5124 sclass=netlink_route_socket pid=5317 comm=syz.0.780 [ 199.833866][ T5363] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1545 sclass=netlink_route_socket pid=5363 comm=syz.1.805 [ 200.114191][ T29] audit: type=1400 audit(402653384.051:155): avc: denied { nlmsg_tty_audit } for pid=5374 comm="syz.1.810" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 200.123435][ T5377] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1545 sclass=netlink_route_socket pid=5377 comm=syz.0.812 [ 200.718907][ T29] audit: type=1400 audit(402653384.651:156): avc: denied { read } for pid=5402 comm="syz.1.824" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 201.676681][ T5443] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5443 comm=syz.1.845 [ 202.304442][ T29] audit: type=1400 audit(402653386.241:157): avc: denied { setopt } for pid=5446 comm="syz.1.847" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 202.538818][ T29] audit: type=1400 audit(402653386.471:158): avc: denied { getopt } for pid=5468 comm="syz.0.857" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 202.942505][ T29] audit: type=1400 audit(402653386.881:159): avc: denied { write } for pid=5476 comm="syz.0.861" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 203.103021][ T5481] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5481 comm=syz.0.863 [ 203.644469][ T29] audit: type=1400 audit(402653387.581:160): avc: denied { unmount } for pid=3097 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 203.887716][ T5508] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1793 sclass=netlink_route_socket pid=5508 comm=syz.1.875 [ 204.946272][ T5551] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5551 comm=syz.0.897 [ 207.717089][ T5599] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5599 comm=syz.1.919 [ 208.059309][ T29] audit: type=1400 audit(402653391.991:161): avc: denied { write } for pid=5609 comm="syz.1.924" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 208.803107][ T29] audit: type=1400 audit(402653392.741:162): avc: denied { nlmsg_write } for pid=5640 comm="syz.1.940" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 208.813559][ T29] audit: type=1400 audit(402653392.751:163): avc: denied { write } for pid=5640 comm="syz.1.940" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 208.823801][ T29] audit: type=1400 audit(402653392.761:164): avc: denied { node_bind } for pid=5641 comm="syz.0.941" saddr=::ffff:224.0.0.2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 209.110810][ T5653] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5653 comm=syz.0.946 [ 210.477950][ T5680] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=5680 comm=syz.0.961 [ 210.684528][ T5687] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65534 sclass=netlink_route_socket pid=5687 comm=syz.1.958 [ 210.890420][ T29] audit: type=1400 audit(402653394.821:165): avc: denied { write } for pid=5693 comm="syz.1.964" name="psched" dev="proc" ino=4026532754 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 211.255718][ T5710] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5710 comm=syz.0.972 [ 211.376404][ T29] audit: type=1400 audit(402653395.301:166): avc: denied { ioctl } for pid=5715 comm="syz.0.976" path="socket:[9829]" dev="sockfs" ino=9829 ioctlcmd=0x89e2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 211.544977][ T29] audit: type=1400 audit(402653395.481:167): avc: denied { read } for pid=5723 comm="syz.1.979" path="socket:[9845]" dev="sockfs" ino=9845 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 214.504234][ T5786] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5786 comm=syz.0.1010 [ 214.596866][ T5790] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5790 comm=syz.1.1016 [ 216.319179][ T5820] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1281 sclass=netlink_route_socket pid=5820 comm=syz.1.1027 [ 216.901365][ T5847] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5847 comm=syz.0.1041 [ 218.597733][ T5916] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5916 comm=syz.0.1074 [ 220.483966][ T5945] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5945 comm=syz.1.1086 [ 221.277915][ T5971] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5971 comm=syz.1.1101 [ 221.708495][ T5983] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5983 comm=syz.0.1107 [ 223.982727][ T6015] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6015 comm=syz.0.1121 [ 224.448525][ T6034] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=6034 comm=syz.1.1131 [ 224.683856][ T6043] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=6043 comm=syz.1.1135 [ 231.903347][ T6144] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6144 comm=syz.0.1186 [ 233.321556][ T6158] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=6158 comm=syz.0.1192 [ 240.988888][ T29] audit: type=1400 audit(402653424.921:168): avc: denied { write } for pid=6269 comm="syz.0.1246" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 241.362490][ T6284] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1540 sclass=netlink_route_socket pid=6284 comm=syz.0.1253 [ 246.908120][ T6379] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1793 sclass=netlink_route_socket pid=6379 comm=syz.0.1299 [ 247.987354][ T6422] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=6422 comm=syz.1.1320 [ 250.150667][ T6470] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=6470 comm=syz.0.1342 [ 253.981113][ T29] audit: type=1400 audit(402653437.911:169): avc: denied { ioctl } for pid=6528 comm="syz.0.1374" path="socket:[12370]" dev="sockfs" ino=12370 ioctlcmd=0x5451 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 259.893311][ T29] audit: type=1400 audit(402653443.831:170): avc: denied { allowed } for pid=6578 comm="syz.1.1398" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 259.907679][ T29] audit: type=1400 audit(402653443.841:171): avc: denied { create } for pid=6578 comm="syz.1.1398" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 259.912246][ T29] audit: type=1400 audit(402653443.851:172): avc: denied { map } for pid=6578 comm="syz.1.1398" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=13447 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 259.915623][ T29] audit: type=1400 audit(402653443.851:173): avc: denied { read write } for pid=6578 comm="syz.1.1398" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=13447 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 262.942524][ T6602] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=6602 comm=syz.1.1409 [ 265.065414][ T29] audit: type=1400 audit(402653448.991:174): avc: denied { mount } for pid=6616 comm="syz.0.1416" name="/" dev="ramfs" ino=12562 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 726.189795][ C0] watchdog: BUG: soft lockup - CPU#0 stuck for 430s! [swapper/0:0] [ 726.189968][ C0] Modules linked in: [ 726.190785][ C0] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Tainted: G L syzkaller #0 PREEMPT [ 726.190957][ C0] Tainted: [L]=SOFTLOCKUP [ 726.190985][ C0] Hardware name: ARM-Versatile Express [ 726.191111][ C0] PC is at _raw_spin_unlock_irq+0x28/0x54 [ 726.191599][ C0] LR is at tmigr_handle_remote_up+0x218/0x4b0 [ 726.191639][ C0] pc : [<81abba7c>] lr : [<80346da4>] psr: 60000113 [ 726.191661][ C0] sp : 82801be0 ip : 82801bf0 fp : 82801bec [ 726.191681][ C0] r10: 00000001 r9 : 8280c9a4 r8 : 00000001 [ 726.191703][ C0] r7 : ddddb488 r6 : 82801cb8 r5 : 830bf3b0 r4 : 830bf380 [ 726.191725][ C0] r3 : 0000181a r2 : ffffffff r1 : 00000000 r0 : ddddb488 [ 726.191794][ C0] Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment user [ 726.191838][ C0] Control: 30c5387d Table: 851c9580 DAC: fffffffd [ 726.191903][ C0] Call trace: [ 726.192058][ C0] [<81abba54>] (_raw_spin_unlock_irq) from [<80346da4>] (tmigr_handle_remote_up+0x218/0x4b0) [ 726.192264][ C0] [<80346b8c>] (tmigr_handle_remote_up) from [<803450a4>] (__walk_groups_from+0x3c/0xe4) [ 726.192337][ C0] r10:8281b500 r9:8280c820 r8:80346b8c r7:82801cb8 r6:830bf380 r5:00000002 [ 726.192360][ C0] r4:830bf380 [ 726.192372][ C0] [<80345068>] (__walk_groups_from) from [<8034743c>] (tmigr_handle_remote+0xe8/0x108) [ 726.192417][ C0] r9:82804d80 r8:00000102 r7:00000001 r6:00000082 r5:00000002 r4:dddc7488 [ 726.192428][ C0] [<80347354>] (tmigr_handle_remote) from [<80327600>] (run_timer_softirq+0x30/0x34) [ 726.192465][ C0] r4:82804084 [ 726.192473][ C0] [<803275d0>] (run_timer_softirq) from [<8025b55c>] (handle_softirqs+0x140/0x458) [ 726.192507][ C0] [<8025b41c>] (handle_softirqs) from [<8025b9d0>] (__irq_exit_rcu+0x110/0x1d0) [ 726.192555][ C0] r10:00000000 r9:8281b500 r8:00000000 r7:82801dd8 r6:82443ff8 r5:8247f12c [ 726.192566][ C0] r4:8281b500 [ 726.192573][ C0] [<8025b8c0>] (__irq_exit_rcu) from [<8025bd48>] (irq_exit+0x10/0x18) [ 726.192607][ C0] r5:8247f12c r4:826c3a9c [ 726.192615][ C0] [<8025bd38>] (irq_exit) from [<81aad6a4>] (generic_handle_arch_irq+0x7c/0x80) [ 726.192650][ C0] [<81aad628>] (generic_handle_arch_irq) from [<80200bdc>] (__irq_svc+0x7c/0xbc) [ 726.192727][ C0] Exception stack(0x82801dd8 to 0x82801e20) [ 726.192830][ C0] 1dc0: 00000001 00000000 [ 726.192860][ C0] 1de0: 00000b68 00000b66 83f27368 00000004 00000001 83f27368 84371e88 83f27240 [ 726.192878][ C0] 1e00: 00000000 82801e3c 82801e28 82801e28 81abbc0c 81abbc34 80000013 ffffffff [ 726.192919][ C0] r9:8281b500 r8:84371e88 r7:82801e0c r6:ffffffff r5:80000013 r4:81abbc34 [ 726.192929][ C0] [<81abbbf4>] (_raw_spin_lock) from [<809c77ac>] (gpio_mmio_set+0x44/0x80) [ 726.192972][ C0] r5:00000004 r4:83f27240 [ 726.192981][ C0] [<809c7768>] (gpio_mmio_set) from [<809b7f68>] (gpiochip_set+0x1c/0x44) [ 726.193022][ C0] r7:00000001 r6:00000000 r5:00000002 r4:842227a8 [ 726.193030][ C0] [<809b7f4c>] (gpiochip_set) from [<809ba830>] (gpiod_set_raw_value_commit+0x78/0x218) [ 726.193062][ C0] [<809ba7b8>] (gpiod_set_raw_value_commit) from [<809bc0d0>] (gpiod_set_value_nocheck+0x44/0x58) [ 726.193102][ C0] r10:00000000 r9:00000000 r8:00000001 r7:dddce4c0 r6:83809758 r5:00000001 [ 726.193112][ C0] r4:842227a8 [ 726.193119][ C0] [<809bc08c>] (gpiod_set_value_nocheck) from [<809bc120>] (gpiod_set_value+0x3c/0x88) [ 726.193148][ C0] [<809bc0e4>] (gpiod_set_value) from [<809cc8bc>] (gpio_led_set+0x5c/0x60) [ 726.193179][ C0] r5:000000ff r4:84642a24 [ 726.193187][ C0] [<809cc860>] (gpio_led_set) from [<809ca1e4>] (led_set_brightness+0x84/0x90) [ 726.193218][ C0] r5:000000ff r4:84642a24 [ 726.193226][ C0] [<809ca160>] (led_set_brightness) from [<809cbd64>] (led_trigger_event+0x40/0x58) [ 726.193257][ C0] r5:000000ff r4:84642a24 [ 726.193265][ C0] [<809cbd24>] (led_trigger_event) from [<809cd3c0>] (ledtrig_cpu+0xac/0xf4) [ 726.193299][ C0] r7:dddce4c0 r6:00000002 r5:82b15cd8 r4:000001fd [ 726.193308][ C0] [<809cd314>] (ledtrig_cpu) from [<80227a38>] (arch_cpu_idle_exit+0x14/0x18) [ 726.193348][ C0] r9:00000000 r8:00000000 r7:8280c710 r6:8281b500 r5:8280c6d0 r4:00000000 [ 726.193358][ C0] [<80227a24>] (arch_cpu_idle_exit) from [<802b158c>] (do_idle+0x5c/0x2d8) [ 726.193392][ C0] [<802b1530>] (do_idle) from [<802b1b38>] (cpu_startup_entry+0x30/0x34) [ 726.193433][ C0] r10:8281aff4 r9:8280c680 r8:823bec00 r7:00000000 r6:deffc06c r5:828222e8 [ 726.193444][ C0] r4:000000ed [ 726.193452][ C0] [<802b1b08>] (cpu_startup_entry) from [<81aaf0bc>] (kernel_init+0x0/0x138) [ 726.193489][ C0] [<81aaefdc>] (rest_init) from [<8260145c>] (start_kernel+0x844/0x860) [ 726.193550][ C0] [<82600c18>] (start_kernel) from [<00000000>] (0x0) [ 726.193951][ C0] Sending NMI from CPU 0 to CPUs 1: [ 726.194577][ C1] NMI backtrace for cpu 1 [ 726.194824][ C1] CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Tainted: G L syzkaller #0 PREEMPT [ 726.194876][ C1] Tainted: [L]=SOFTLOCKUP [ 726.194886][ C1] Hardware name: ARM-Versatile Express [ 726.194899][ C1] PC is at _raw_spin_lock+0x40/0x58 [ 726.194978][ C1] LR is at _raw_spin_lock+0x18/0x58 [ 726.194999][ C1] pc : [<81abbc34>] lr : [<81abbc0c>] psr: 80000113 [ 726.195014][ C1] sp : df805d68 ip : df805d68 fp : df805d7c [ 726.195025][ C1] r10: 81c05450 r9 : 83f27240 r8 : 84371e88 [ 726.195036][ C1] r7 : 83f27368 r6 : 00000001 r5 : 00000001 r4 : 83f27368 [ 726.195048][ C1] r3 : 00000b66 r2 : 00000b67 r1 : 00000000 r0 : 00000001 [ 726.195062][ C1] Flags: Nzcv IRQs on FIQs on Mode SVC_32 ISA ARM Segment none [ 726.195084][ C1] Control: 30c5387d Table: 85dacd00 DAC: 00000000 [ 726.195096][ C1] Call trace: frame pointer underflow [ 726.195161][ C1] [<81abbbf4>] (_raw_spin_lock) from [<809c77ac>] (gpio_mmio_set+0x44/0x80) [ 726.195211][ C1] r5:00000001 r4:83f27240 [ 726.195220][ C1] [<809c7768>] (gpio_mmio_set) from [<809b7f68>] (gpiochip_set+0x1c/0x44) [ 726.195260][ C1] r7:00000001 r6:00000000 r5:00000000 r4:84222780 [ 726.195269][ C1] [<809b7f4c>] (gpiochip_set) from [<809ba830>] (gpiod_set_raw_value_commit+0x78/0x218) [ 726.195302][ C1] [<809ba7b8>] (gpiod_set_raw_value_commit) from [<809bc0d0>] (gpiod_set_value_nocheck+0x44/0x58) [ 726.195340][ C1] r10:81c05450 r9:df805ebc r8:00000102 r7:fffff350 r6:00000007 r5:00000001 [ 726.195352][ C1] r4:84222780 [ 726.195359][ C1] [<809bc08c>] (gpiod_set_value_nocheck) from [<809bc120>] (gpiod_set_value+0x3c/0x88) [ 726.195386][ C1] [<809bc0e4>] (gpiod_set_value) from [<809cc8bc>] (gpio_led_set+0x5c/0x60) [ 726.195415][ C1] r5:84642844 r4:84642844 [ 726.195424][ C1] [<809cc860>] (gpio_led_set) from [<809ca154>] (led_set_brightness_nosleep+0x38/0x44) [ 726.195458][ C1] r5:84642844 r4:84cebb8c [ 726.195467][ C1] [<809ca11c>] (led_set_brightness_nosleep) from [<809cd1b8>] (led_heartbeat_function+0x84/0x144) [ 726.195496][ C1] [<809cd134>] (led_heartbeat_function) from [<80326f70>] (call_timer_fn+0x30/0x220) [ 726.195534][ C1] r7:fffff350 r6:809cd134 r5:84cebb8c r4:83216000 [ 726.195547][ C1] [<80326f40>] (call_timer_fn) from [<80327424>] (__run_timers+0x2c4/0x3f8) [ 726.195615][ C1] r9:df805ebc r8:fffff350 r7:00000000 r6:809cd134 r5:dddd9f00 r4:84cebb8c [ 726.195628][ C1] [<80327160>] (__run_timers) from [<803275c0>] (run_timer_base+0x68/0x78) [ 726.195666][ C1] r10:83216000 r9:82804d80 r8:00000102 r7:00000001 r6:00000082 r5:00000002 [ 726.195678][ C1] r4:dddd9f00 [ 726.195696][ C1] [<80327558>] (run_timer_base) from [<803275ec>] (run_timer_softirq+0x1c/0x34) [ 726.195754][ C1] r4:82804084 [ 726.195764][ C1] [<803275d0>] (run_timer_softirq) from [<8025b55c>] (handle_softirqs+0x140/0x458) [ 726.195797][ C1] [<8025b41c>] (handle_softirqs) from [<8025b9d0>] (__irq_exit_rcu+0x110/0x1d0) [ 726.195836][ C1] r10:00000000 r9:83216000 r8:00000000 r7:df865e08 r6:82443ff8 r5:8247f12c [ 726.195846][ C1] r4:83216000 [ 726.195853][ C1] [<8025b8c0>] (__irq_exit_rcu) from [<8025bd48>] (irq_exit+0x10/0x18) [ 726.195885][ C1] r5:8247f12c r4:826c3a9c [ 726.195893][ C1] [<8025bd38>] (irq_exit) from [<81aad6a4>] (generic_handle_arch_irq+0x7c/0x80) [ 726.195927][ C1] [<81aad628>] (generic_handle_arch_irq) from [<81a7d654>] (call_with_stack+0x1c/0x20) [ 726.195966][ C1] r9:83216000 r8:84371e88 r7:df865e3c r6:ffffffff r5:60000013 r4:809c7fac [ 726.195976][ C1] [<81a7d638>] (call_with_stack) from [<80200bec>] (__irq_svc+0x8c/0xbc) [ 726.196006][ C1] Exception stack(0xdf865e08 to 0xdf865e50) [ 726.196029][ C1] 5e00: e01ab008 00000008 00000b66 00000000 e01ab008 00000008 [ 726.196046][ C1] 5e20: 00000001 83f27368 84371e88 83f27240 00000000 df865e6c df865e58 df865e58 [ 726.196060][ C1] 5e40: 809c7fa8 809c7fac 60000013 ffffffff [ 726.196071][ C1] [<809c7f8c>] (gpio_mmio_write32) from [<809c77cc>] (gpio_mmio_set+0x64/0x80) [ 726.196106][ C1] r5:00000008 r4:83f27240 [ 726.196114][ C1] [<809c7768>] (gpio_mmio_set) from [<809b7f68>] (gpiochip_set+0x1c/0x44) [ 726.196152][ C1] r7:00000001 r6:00000000 r5:00000003 r4:842227bc [ 726.196160][ C1] [<809b7f4c>] (gpiochip_set) from [<809ba830>] (gpiod_set_raw_value_commit+0x78/0x218) [ 726.196191][ C1] [<809ba7b8>] (gpiod_set_raw_value_commit) from [<809bc0d0>] (gpiod_set_value_nocheck+0x44/0x58) [ 726.196229][ C1] r10:00000000 r9:00000000 r8:00000001 r7:ddde24c0 r6:83809798 r5:00000001 [ 726.196239][ C1] r4:842227bc [ 726.196247][ C1] [<809bc08c>] (gpiod_set_value_nocheck) from [<809bc120>] (gpiod_set_value+0x3c/0x88) [ 726.196274][ C1] [<809bc0e4>] (gpiod_set_value) from [<809cc8bc>] (gpio_led_set+0x5c/0x60) [ 726.196305][ C1] r5:000000ff r4:84642b14 [ 726.196313][ C1] [<809cc860>] (gpio_led_set) from [<809ca1e4>] (led_set_brightness+0x84/0x90) [ 726.196343][ C1] r5:000000ff r4:84642b14 [ 726.196351][ C1] [<809ca160>] (led_set_brightness) from [<809cbd64>] (led_trigger_event+0x40/0x58) [ 726.196381][ C1] r5:000000ff r4:84642b14 [ 726.196397][ C1] [<809cbd24>] (led_trigger_event) from [<809cd3c0>] (ledtrig_cpu+0xac/0xf4) [ 726.196431][ C1] r7:ddde24c0 r6:00000002 r5:82b15cd8 r4:000000fe [ 726.196439][ C1] [<809cd314>] (ledtrig_cpu) from [<80227a38>] (arch_cpu_idle_exit+0x14/0x18) [ 726.196480][ C1] r9:00000000 r8:00000001 r7:8280c710 r6:83216000 r5:8280c6d0 r4:00000001 [ 726.196489][ C1] [<80227a24>] (arch_cpu_idle_exit) from [<802b158c>] (do_idle+0x5c/0x2d8) [ 726.196551][ C1] [<802b1530>] (do_idle) from [<802b1b38>] (cpu_startup_entry+0x30/0x34) [ 726.196659][ C1] r10:00000000 r9:414fc0f0 r8:80003000 r7:82a7b4a4 r6:83216000 r5:00000001 [ 726.196696][ C1] r4:00000092 [ 726.196730][ C1] [<802b1b08>] (cpu_startup_entry) from [<8022f360>] (secondary_start_kernel+0x128/0x194) [ 726.196807][ C1] [<8022f238>] (secondary_start_kernel) from [<80220094>] (__enable_mmu+0x0/0xc) [ 726.196894][ C1] r7:82a7b4a4 r6:30c0387d r5:00000000 r4:830b7bc0 [ 726.197660][ C0] Kernel panic - not syncing: softlockup: hung tasks [ 726.227028][ C0] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Tainted: G L syzkaller #0 PREEMPT [ 726.227375][ C0] Tainted: [L]=SOFTLOCKUP [ 726.227542][ C0] Hardware name: ARM-Versatile Express [ 726.227765][ C0] Call trace: [ 726.227966][ C0] [<80201a74>] (dump_backtrace) from [<80201b70>] (show_stack+0x18/0x1c) [ 726.228259][ C0] r7:82296540 r6:8281b500 r5:00000000 r4:822956f0 [ 726.228425][ C0] [<80201b58>] (show_stack) from [<8021ee08>] (dump_stack_lvl+0x54/0x7c) [ 726.228665][ C0] [<8021edb4>] (dump_stack_lvl) from [<8021ee48>] (dump_stack+0x18/0x1c) [ 726.228902][ C0] r5:00000000 r4:82a7bd14 [ 726.229032][ C0] [<8021ee30>] (dump_stack) from [<80202648>] (vpanic+0xe0/0x2e8) [ 726.229247][ C0] [<80202568>] (vpanic) from [<80202884>] (trace_suspend_resume+0x0/0xd8) [ 726.229481][ C0] r7:82ac27f8 [ 726.229632][ C0] [<80202850>] (panic) from [<80383f14>] (watchdog_timer_fn+0x2dc/0x350) [ 726.229893][ C0] r3:00000001 r2:00004000 r1:82a7bd1c r0:82296540 [ 726.230108][ C0] [<80383c38>] (watchdog_timer_fn) from [<80329b64>] (__hrtimer_run_queues+0x1c4/0x454) [ 726.230514][ C0] r10:8281b500 r9:00000000 r8:dddc7130 r7:80383c38 r6:dddc7000 r5:dddc7040 [ 726.230805][ C0] r4:dddc75d8 [ 726.230924][ C0] [<803299a0>] (__hrtimer_run_queues) from [<8032b168>] (hrtimer_interrupt+0x148/0x2bc) [ 726.231459][ C0] r10:11538ca0 r9:dddc7180 r8:dddc7130 r7:000000a9 r6:00000003 r5:20000193 [ 726.231691][ C0] r4:dddc7000 [ 726.231809][ C0] [<8032b020>] (hrtimer_interrupt) from [<81340630>] (arch_timer_handler_virt+0x30/0x38) [ 726.232078][ C0] r10:81d0fc78 r9:8309e400 r8:00000000 r7:00000000 r6:00000000 r5:82498528 [ 726.232274][ C0] r4:8309de40 [ 726.232407][ C0] [<81340600>] (arch_timer_handler_virt) from [<802ef9b4>] (handle_percpu_devid_irq+0x128/0x34c) [ 726.232675][ C0] [<802ef88c>] (handle_percpu_devid_irq) from [<802e8b44>] (handle_irq_desc+0x74/0x84) [ 726.232940][ C0] r10:00000001 r9:8281b500 r8:00000000 r7:df80a00c r6:826c2388 r5:df80a000 [ 726.233134][ C0] r4:8280cc44 [ 726.233254][ C0] [<802e8ad0>] (handle_irq_desc) from [<802e8bc0>] (generic_handle_domain_irq+0x18/0x1c) [ 726.233510][ C0] [<802e8ba8>] (generic_handle_domain_irq) from [<802012c8>] (gic_handle_irq+0x68/0x7c) [ 726.233775][ C0] [<80201260>] (gic_handle_irq) from [<81aad688>] (generic_handle_arch_irq+0x60/0x80) [ 726.234030][ C0] r7:82801b90 r6:82443ff8 r5:8247f12c r4:826c3a9c [ 726.234190][ C0] [<81aad628>] (generic_handle_arch_irq) from [<80200bdc>] (__irq_svc+0x7c/0xbc) [ 726.234480][ C0] Exception stack(0x82801b90 to 0x82801bd8) [ 726.234678][ C0] 1b80: ddddb488 00000000 ffffffff 0000181a [ 726.234921][ C0] 1ba0: 830bf380 830bf3b0 82801cb8 ddddb488 00000001 8280c9a4 00000001 82801bec [ 726.235138][ C0] 1bc0: 82801bf0 82801be0 80346da4 81abba7c 60000113 ffffffff [ 726.235381][ C0] r9:8281b500 r8:00000001 r7:82801bc4 r6:ffffffff r5:60000113 r4:81abba7c [ 726.235667][ C0] [<81abba54>] (_raw_spin_unlock_irq) from [<80346da4>] (tmigr_handle_remote_up+0x218/0x4b0) [ 726.236017][ C0] [<80346b8c>] (tmigr_handle_remote_up) from [<803450a4>] (__walk_groups_from+0x3c/0xe4) [ 726.236422][ C0] r10:8281b500 r9:8280c820 r8:80346b8c r7:82801cb8 r6:830bf380 r5:00000002 [ 726.236699][ C0] r4:830bf380 [ 726.236831][ C0] [<80345068>] (__walk_groups_from) from [<8034743c>] (tmigr_handle_remote+0xe8/0x108) [ 726.237214][ C0] r9:82804d80 r8:00000102 r7:00000001 r6:00000082 r5:00000002 r4:dddc7488 [ 726.237445][ C0] [<80347354>] (tmigr_handle_remote) from [<80327600>] (run_timer_softirq+0x30/0x34) [ 726.237718][ C0] r4:82804084 [ 726.237839][ C0] [<803275d0>] (run_timer_softirq) from [<8025b55c>] (handle_softirqs+0x140/0x458) [ 726.238081][ C0] [<8025b41c>] (handle_softirqs) from [<8025b9d0>] (__irq_exit_rcu+0x110/0x1d0) [ 726.238358][ C0] r10:00000000 r9:8281b500 r8:00000000 r7:82801dd8 r6:82443ff8 r5:8247f12c [ 726.238571][ C0] r4:8281b500 [ 726.238717][ C0] [<8025b8c0>] (__irq_exit_rcu) from [<8025bd48>] (irq_exit+0x10/0x18) [ 726.238985][ C0] r5:8247f12c r4:826c3a9c [ 726.239147][ C0] [<8025bd38>] (irq_exit) from [<81aad6a4>] (generic_handle_arch_irq+0x7c/0x80) [ 726.239468][ C0] [<81aad628>] (generic_handle_arch_irq) from [<80200bdc>] (__irq_svc+0x7c/0xbc) [ 726.240112][ C0] Exception stack(0x82801dd8 to 0x82801e20) [ 726.240311][ C0] 1dc0: 00000001 00000000 [ 726.240585][ C0] 1de0: 00000b68 00000b66 83f27368 00000004 00000001 83f27368 84371e88 83f27240 [ 726.240844][ C0] 1e00: 00000000 82801e3c 82801e28 82801e28 81abbc0c 81abbc34 80000013 ffffffff [ 726.241128][ C0] r9:8281b500 r8:84371e88 r7:82801e0c r6:ffffffff r5:80000013 r4:81abbc34 [ 726.241295][ C0] [<81abbbf4>] (_raw_spin_lock) from [<809c77ac>] (gpio_mmio_set+0x44/0x80) [ 726.241558][ C0] r5:00000004 r4:83f27240 [ 726.241695][ C0] [<809c7768>] (gpio_mmio_set) from [<809b7f68>] (gpiochip_set+0x1c/0x44) [ 726.241948][ C0] r7:00000001 r6:00000000 r5:00000002 r4:842227a8 [ 726.242115][ C0] [<809b7f4c>] (gpiochip_set) from [<809ba830>] (gpiod_set_raw_value_commit+0x78/0x218) [ 726.242428][ C0] [<809ba7b8>] (gpiod_set_raw_value_commit) from [<809bc0d0>] (gpiod_set_value_nocheck+0x44/0x58) [ 726.242713][ C0] r10:00000000 r9:00000000 r8:00000001 r7:dddce4c0 r6:83809758 r5:00000001 [ 726.242915][ C0] r4:842227a8 [ 726.243110][ C0] [<809bc08c>] (gpiod_set_value_nocheck) from [<809bc120>] (gpiod_set_value+0x3c/0x88) [ 726.243641][ C0] [<809bc0e4>] (gpiod_set_value) from [<809cc8bc>] (gpio_led_set+0x5c/0x60) [ 726.243952][ C0] r5:000000ff r4:84642a24 [ 726.244107][ C0] [<809cc860>] (gpio_led_set) from [<809ca1e4>] (led_set_brightness+0x84/0x90) [ 726.244359][ C0] r5:000000ff r4:84642a24 [ 726.244490][ C0] [<809ca160>] (led_set_brightness) from [<809cbd64>] (led_trigger_event+0x40/0x58) [ 726.244739][ C0] r5:000000ff r4:84642a24 [ 726.244883][ C0] [<809cbd24>] (led_trigger_event) from [<809cd3c0>] (ledtrig_cpu+0xac/0xf4) [ 726.245144][ C0] r7:dddce4c0 r6:00000002 r5:82b15cd8 r4:000001fd [ 726.245352][ C0] [<809cd314>] (ledtrig_cpu) from [<80227a38>] (arch_cpu_idle_exit+0x14/0x18) [ 726.245653][ C0] r9:00000000 r8:00000000 r7:8280c710 r6:8281b500 r5:8280c6d0 r4:00000000 [ 726.245831][ C0] [<80227a24>] (arch_cpu_idle_exit) from [<802b158c>] (do_idle+0x5c/0x2d8) [ 726.246068][ C0] [<802b1530>] (do_idle) from [<802b1b38>] (cpu_startup_entry+0x30/0x34) [ 726.246350][ C0] r10:8281aff4 r9:8280c680 r8:823bec00 r7:00000000 r6:deffc06c r5:828222e8 [ 726.246561][ C0] r4:000000ed [ 726.246662][ C0] [<802b1b08>] (cpu_startup_entry) from [<81aaf0bc>] (kernel_init+0x0/0x138) [ 726.246856][ C0] [<81aaefdc>] (rest_init) from [<8260145c>] (start_kernel+0x844/0x860) [ 726.247082][ C0] [<82600c18>] (start_kernel) from [<00000000>] (0x0) [ 726.249345][ C0] Rebooting in 86400 seconds..