last executing test programs: 5.404920353s ago: executing program 0 (id=1108): r0 = socket$unix(0x1, 0x5, 0x0) bind$unix(r0, &(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e) creat(&(0x7f0000000000)='./file0\x00', 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) openat$userio(0xffffff9c, &(0x7f0000000000), 0x8000, 0x0) 5.165272364s ago: executing program 0 (id=1109): r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x141c02, 0x0) close(r0) openat$iommufd(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$IOMMU_IOAS_ALLOC(r0, 0x3b81, &(0x7f0000000040)={0xc, 0x0, 0x0}) ioctl$IOMMU_VFIO_IOAS$SET(r0, 0x3b88, &(0x7f0000000100)={0xc, r1}) 4.705620842s ago: executing program 1 (id=1110): r0 = socket(0x29, 0x2, 0x0) sendmsg$BATADV_CMD_SET_VLAN(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[], 0x33fe0}, 0x1, 0x0, 0x0, 0x400d1}, 0x2404c941) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), r0) r1 = dup(r0) sendmsg$NLBL_UNLABEL_C_STATICREMOVEDEF(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) 4.702105492s ago: executing program 0 (id=1111): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) recvmmsg$unix(r1, &(0x7f0000003f00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000002100)=[@rights={{0x10, 0x1, 0x1, [0xffffffffffffffff]}}], 0x10}}], 0x1, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$TUNSETOFFLOAD(r2, 0x5451, 0x1b) 4.391861272s ago: executing program 0 (id=1112): r0 = openat$sw_sync_info(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000014c0)) getpeername$inet(r0, 0x0, &(0x7f0000000140)) 3.467455209s ago: executing program 0 (id=1113): r0 = socket(0x29, 0x2, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x11}, &(0x7f00000001c0)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) sendmsg$BATADV_CMD_SET_VLAN(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000e00)=ANY=[], 0x33fe0}, 0x1, 0x0, 0x0, 0x44008000}, 0x40011) sendmsg$NL80211_CMD_SET_CQM(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={0x0}, 0x1, 0x0, 0x0, 0x20000040}, 0x8000) 2.027054523s ago: executing program 0 (id=1114): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) mknod(&(0x7f0000000280)='./file0\x00', 0x1ffa, 0x0) open$dir(&(0x7f00000002c0)='./file0\x00', 0x80, 0x0) dup2(r0, r1) 1.987245718s ago: executing program 1 (id=1115): mkdir(&(0x7f0000000440)='./file1\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f0000000000)='tmpfs\x00', 0x0, &(0x7f00000001c0)='usrquota') chdir(&(0x7f0000000140)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='net_prio.prioidx\x00', 0x275a, 0x0) quotactl_fd$Q_GETINFO(r0, 0xffffffff80000501, 0x0, 0x0) 1.697573504s ago: executing program 1 (id=1116): pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) dup(r2) sendmsg$NL80211_CMD_SET_POWER_SAVE(r1, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000340)={0x20, 0x0, 0x200, 0x70bd2c, 0x25dfdbfd, {{}, {@void, @val={0xc, 0x99, {0x4, 0x2e}}}}}, 0x20}, 0x1, 0x0, 0x0, 0x80}, 0x8000) 1.155887594s ago: executing program 1 (id=1117): r0 = socket(0x29, 0x2, 0x0) sendmsg$BATADV_CMD_SET_VLAN(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[], 0x33fe0}, 0x1, 0x0, 0x0, 0x20000080}, 0x0) timer_create(0x1, &(0x7f0000000080)={0x0, 0x11, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) sendmsg$DEVLINK_CMD_TRAP_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0, 0x50}, 0x1, 0x0, 0x0, 0x8000}, 0x80000) 288.551553ms ago: executing program 1 (id=1118): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x7002}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000600)={'pim6reg1\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}) pread64(r0, 0x0, 0x0, 0x10000) 0s ago: executing program 1 (id=1119): r0 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000000)={'vxcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000080)={0x1d, r1, 0x1, {0x1, 0x0, 0x3}, 0xff}, 0x18) sendmsg$TIPC_NL_MON_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[], 0x14}, 0x1, 0x0, 0x0, 0x40040}, 0x4) sendmsg$NL80211_CMD_START_AP(r0, &(0x7f0000000b80)={0x0, 0x0, &(0x7f0000000b40)={0x0}, 0x1, 0x0, 0x0, 0x4000004}, 0x4040000) kernel console output (not intermixed with test programs): [ 48.204923][ T29] audit: type=1400 audit(48.100:56): avc: denied { read write } for pid=3085 comm="sftp-server" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 48.206549][ T29] audit: type=1400 audit(48.110:57): avc: denied { open } for pid=3085 comm="sftp-server" path="/dev/null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 Warning: Permanently added '[localhost]:9857' (ED25519) to the list of known hosts. [ 63.033191][ T29] audit: type=1400 audit(62.940:58): avc: denied { name_bind } for pid=3088 comm="sshd-session" src=30000 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 64.932991][ T29] audit: type=1400 audit(64.840:59): avc: denied { execute } for pid=3089 comm="sh" name="syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 64.953297][ T29] audit: type=1400 audit(64.860:60): avc: denied { execute_no_trans } for pid=3089 comm="sh" path="/syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 69.280247][ T29] audit: type=1400 audit(69.190:61): avc: denied { mounton } for pid=3089 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=806 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 69.289129][ T29] audit: type=1400 audit(69.200:62): avc: denied { mount } for pid=3089 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 69.306550][ T3089] cgroup: Unknown subsys name 'net' [ 69.316030][ T29] audit: type=1400 audit(69.230:63): avc: denied { unmount } for pid=3089 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 69.525123][ T3089] cgroup: Unknown subsys name 'cpuset' [ 69.531034][ T3089] cgroup: Unknown subsys name 'hugetlb' [ 69.534306][ T3089] cgroup: Unknown subsys name 'rlimit' [ 69.762099][ T29] audit: type=1400 audit(69.670:64): avc: denied { setattr } for pid=3089 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 69.767613][ T29] audit: type=1400 audit(69.680:65): avc: denied { mounton } for pid=3089 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 69.775789][ T29] audit: type=1400 audit(69.680:66): avc: denied { mount } for pid=3089 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 69.980904][ T3091] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 69.984753][ T29] audit: type=1400 audit(69.900:67): avc: denied { relabelto } for pid=3091 comm="mkswap" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 69.989886][ T29] audit: type=1400 audit(69.900:68): avc: denied { write } for pid=3091 comm="mkswap" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 70.032284][ T29] audit: type=1400 audit(69.940:69): avc: denied { read } for pid=3089 comm="syz-executor" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 70.033379][ T29] audit: type=1400 audit(69.950:70): avc: denied { open } for pid=3089 comm="syz-executor" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 76.759521][ T3089] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 78.928527][ T29] audit: type=1400 audit(78.840:71): avc: denied { execmem } for pid=3092 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 78.995805][ T29] audit: type=1400 audit(78.910:72): avc: denied { read } for pid=3094 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 78.997872][ T29] audit: type=1400 audit(78.910:73): avc: denied { open } for pid=3094 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 79.007439][ T29] audit: type=1400 audit(78.910:74): avc: denied { mounton } for pid=3094 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 79.021711][ T29] audit: type=1400 audit(78.930:75): avc: denied { module_request } for pid=3094 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 79.090839][ T29] audit: type=1400 audit(79.000:76): avc: denied { sys_module } for pid=3094 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 79.618851][ T29] audit: type=1400 audit(79.530:77): avc: denied { ioctl } for pid=3094 comm="syz-executor" path="/dev/net/tun" dev="devtmpfs" ino=677 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 80.821447][ T3094] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 80.834244][ T3094] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 81.070195][ T3095] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 81.080929][ T3095] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 81.809341][ T3094] hsr_slave_0: entered promiscuous mode [ 81.815114][ T3094] hsr_slave_1: entered promiscuous mode [ 82.071791][ T3095] hsr_slave_0: entered promiscuous mode [ 82.076156][ T3095] hsr_slave_1: entered promiscuous mode [ 82.078676][ T3095] debugfs: 'hsr0' already exists in 'hsr' [ 82.079411][ T3095] Cannot create hsr debugfs directory [ 82.404386][ T29] audit: type=1400 audit(82.310:78): avc: denied { create } for pid=3094 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 82.409198][ T29] audit: type=1400 audit(82.320:79): avc: denied { write } for pid=3094 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 82.418833][ T29] audit: type=1400 audit(82.330:80): avc: denied { read } for pid=3094 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 82.448729][ T3094] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 82.463624][ T3094] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 82.471225][ T3094] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 82.486633][ T3094] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 82.601434][ T3095] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 82.608659][ T3095] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 82.616388][ T3095] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 82.625820][ T3095] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 83.188735][ T3094] 8021q: adding VLAN 0 to HW filter on device bond0 [ 83.258560][ T3095] 8021q: adding VLAN 0 to HW filter on device bond0 [ 85.902152][ T3094] veth0_vlan: entered promiscuous mode [ 85.917734][ T3094] veth1_vlan: entered promiscuous mode [ 85.978175][ T3094] veth0_macvtap: entered promiscuous mode [ 85.991412][ T3094] veth1_macvtap: entered promiscuous mode [ 86.051233][ T12] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 86.052079][ T12] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 86.052190][ T12] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 86.052267][ T12] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 86.099966][ T3095] veth0_vlan: entered promiscuous mode [ 86.159286][ T3095] veth1_vlan: entered promiscuous mode [ 86.189458][ T29] audit: type=1400 audit(86.100:81): avc: denied { mount } for pid=3094 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 86.194245][ T29] audit: type=1400 audit(86.110:82): avc: denied { mounton } for pid=3094 comm="syz-executor" path="/syzkaller.GgcexO/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 86.199432][ T29] audit: type=1400 audit(86.110:83): avc: denied { mount } for pid=3094 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 86.209446][ T29] audit: type=1400 audit(86.120:84): avc: denied { mounton } for pid=3094 comm="syz-executor" path="/syzkaller.GgcexO/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 86.214381][ T29] audit: type=1400 audit(86.130:85): avc: denied { mounton } for pid=3094 comm="syz-executor" path="/syzkaller.GgcexO/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=3207 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 86.230317][ T29] audit: type=1400 audit(86.140:86): avc: denied { unmount } for pid=3094 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 86.236254][ T29] audit: type=1400 audit(86.150:87): avc: denied { mounton } for pid=3094 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=772 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 86.239417][ T29] audit: type=1400 audit(86.150:88): avc: denied { mount } for pid=3094 comm="syz-executor" name="/" dev="gadgetfs" ino=3208 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 86.245817][ T29] audit: type=1400 audit(86.160:89): avc: denied { mount } for pid=3094 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 86.249033][ T29] audit: type=1400 audit(86.160:90): avc: denied { mounton } for pid=3094 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 86.295984][ T3094] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 86.311186][ T3095] veth0_macvtap: entered promiscuous mode [ 86.327042][ T3095] veth1_macvtap: entered promiscuous mode [ 86.413934][ T57] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 86.414296][ T57] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 86.415595][ T57] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 86.415871][ T57] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 87.391795][ T3717] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=3717 comm=syz.1.8 [ 89.967763][ T3746] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=3746 comm=syz.0.22 [ 90.896823][ T3760] netlink: 16 bytes leftover after parsing attributes in process `syz.0.29'. [ 91.394003][ T105] usb 1-1: new high-speed USB device number 2 using dummy_hcd [ 91.578121][ T105] usb 1-1: config 0 interface 0 altsetting 0 has an endpoint descriptor with address 0xFF, changing to 0x8F [ 91.579358][ T105] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x8F has an invalid bInterval 0, changing to 7 [ 91.583033][ T105] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x8F has invalid wMaxPacketSize 0 [ 91.584708][ T105] usb 1-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 21 [ 91.587599][ T105] usb 1-1: New USB device found, idVendor=047f, idProduct=ffff, bcdDevice= 0.00 [ 91.589267][ T105] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 91.600757][ T105] usb 1-1: config 0 descriptor?? [ 92.054732][ T105] plantronics 0003:047F:FFFF.0001: hiddev0,hidraw0: USB HID v0.40 Device [HID 047f:ffff] on usb-dummy_hcd.0-1/input0 [ 94.048261][ T105] usb 1-1: USB disconnect, device number 2 [ 95.087719][ T29] kauditd_printk_skb: 20 callbacks suppressed [ 95.093398][ T29] audit: type=1400 audit(95.000:111): avc: denied { read write } for pid=3804 comm="syz.0.39" name="binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 95.096155][ T29] audit: type=1400 audit(95.000:112): avc: denied { ioctl open } for pid=3804 comm="syz.0.39" path="/dev/binderfs/binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 95.109605][ T29] audit: type=1400 audit(95.020:113): avc: denied { map } for pid=3804 comm="syz.0.39" path="/dev/binderfs/binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 95.111628][ T3805] binder: binder_mmap: 3804 20000000-20b36000 bad vm_flags failed -1 [ 95.116694][ T3805] binder: 3804:3805 ioctl c018620c 0 returned -14 [ 95.268365][ T29] audit: type=1400 audit(95.180:114): avc: denied { create } for pid=3808 comm="syz.0.41" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 95.275514][ T29] audit: type=1400 audit(95.190:115): avc: denied { write } for pid=3808 comm="syz.0.41" path="socket:[2343]" dev="sockfs" ino=2343 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 95.391381][ T29] audit: type=1400 audit(95.300:116): avc: denied { create } for pid=3813 comm="syz.0.43" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 95.401752][ T29] audit: type=1400 audit(95.310:117): avc: denied { write } for pid=3813 comm="syz.0.43" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 95.429559][ T29] audit: type=1400 audit(95.340:118): avc: denied { append } for pid=3815 comm="syz.1.44" name="vcsa" dev="devtmpfs" ino=15 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 96.055416][ T29] audit: type=1400 audit(95.970:119): avc: denied { read } for pid=3828 comm="syz.0.50" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 97.149197][ T29] audit: type=1400 audit(97.060:120): avc: denied { create } for pid=3835 comm="syz.1.53" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 98.743391][ T108] usb 2-1: new high-speed USB device number 2 using dummy_hcd [ 98.903041][ T108] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 98.903368][ T108] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 98.905306][ T108] usb 2-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 21 [ 98.905734][ T108] usb 2-1: New USB device found, idVendor=047f, idProduct=ffff, bcdDevice= 0.00 [ 98.905870][ T108] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 98.912081][ T108] usb 2-1: config 0 descriptor?? [ 99.348547][ T108] plantronics 0003:047F:FFFF.0002: hiddev0,hidraw0: USB HID v0.40 Device [HID 047f:ffff] on usb-dummy_hcd.1-1/input0 [ 100.750384][ T29] kauditd_printk_skb: 2 callbacks suppressed [ 100.751661][ T29] audit: type=1400 audit(100.660:123): avc: denied { prog_load } for pid=3911 comm="syz.1.83" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 100.755895][ T29] audit: type=1400 audit(100.670:124): avc: denied { bpf } for pid=3911 comm="syz.1.83" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 100.759349][ T29] audit: type=1400 audit(100.670:125): avc: denied { perfmon } for pid=3911 comm="syz.1.83" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 100.784403][ T29] audit: type=1400 audit(100.690:126): avc: denied { prog_run } for pid=3911 comm="syz.1.83" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 101.435797][ T108] usb 2-1: USB disconnect, device number 2 [ 103.777069][ T29] audit: type=1400 audit(103.690:127): avc: denied { ioctl } for pid=3941 comm="syz.1.93" path="socket:[3624]" dev="sockfs" ino=3624 ioctlcmd=0x662c scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 105.301323][ T29] audit: type=1400 audit(105.210:128): avc: denied { unmount } for pid=3953 comm="syz.0.99" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 105.396023][ T3961] Zero length message leads to an empty skb [ 107.518466][ T29] audit: type=1400 audit(107.430:129): avc: denied { create } for pid=3976 comm="syz.0.108" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 107.520707][ T3978] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 107.534562][ T29] audit: type=1400 audit(107.450:130): avc: denied { create } for pid=3976 comm="syz.0.108" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 107.540828][ T29] audit: type=1400 audit(107.450:131): avc: denied { write } for pid=3976 comm="syz.0.108" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 107.904984][ T29] audit: type=1400 audit(107.820:132): avc: denied { mounton } for pid=3987 comm="syz.0.114" path="/proc/141/task" dev="proc" ino=2624 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 107.994347][ T29] audit: type=1400 audit(107.910:133): avc: denied { ioctl } for pid=3990 comm="syz.0.115" path="socket:[2631]" dev="sockfs" ino=2631 ioctlcmd=0x89f8 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 108.752022][ T29] audit: type=1400 audit(108.660:134): avc: denied { unmount } for pid=3094 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 108.830124][ T29] audit: type=1400 audit(108.740:135): avc: denied { read } for pid=4001 comm="syz.1.120" path="socket:[3726]" dev="sockfs" ino=3726 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 113.366743][ T29] audit: type=1400 audit(113.280:136): avc: denied { watch watch_reads } for pid=4100 comm="syz.0.163" path="/96/file1" dev="tmpfs" ino=521 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 114.382277][ T4116] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4116 comm=syz.0.170 [ 122.050457][ T29] audit: type=1400 audit(121.960:137): avc: denied { append } for pid=4205 comm="syz.1.212" name="nbd1" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 122.070379][ T29] audit: type=1400 audit(121.980:138): avc: denied { setattr } for pid=4205 comm="syz.1.212" name="nbd1" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 122.477215][ T29] audit: type=1400 audit(122.390:139): avc: denied { map } for pid=4215 comm="syz.1.216" path="/dev/zero" dev="devtmpfs" ino=5 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 122.488016][ T29] audit: type=1400 audit(122.400:140): avc: denied { ioctl } for pid=4215 comm="syz.1.216" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=3069 ioctlcmd=0xaa3f scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 123.158337][ T29] audit: type=1400 audit(123.070:141): avc: denied { read } for pid=4225 comm="syz.0.221" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 125.988683][ T29] audit: type=1400 audit(125.900:142): avc: denied { setopt } for pid=4262 comm="syz.1.237" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 129.325277][ T4306] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4306 comm=syz.1.256 [ 131.199061][ T29] audit: type=1400 audit(131.110:143): avc: denied { name_bind } for pid=4332 comm="syz.0.269" src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 131.201934][ T29] audit: type=1400 audit(131.110:144): avc: denied { node_bind } for pid=4332 comm="syz.0.269" saddr=172.20.20.170 src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 135.567317][ T29] audit: type=1400 audit(135.480:145): avc: denied { create } for pid=4350 comm="syz.0.277" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 135.577678][ T29] audit: type=1400 audit(135.490:146): avc: denied { ioctl } for pid=4350 comm="syz.0.277" path="socket:[5302]" dev="sockfs" ino=5302 ioctlcmd=0x3b82 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 136.088516][ T29] audit: type=1400 audit(136.000:147): avc: denied { nlmsg_write } for pid=4356 comm="syz.1.280" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 136.743969][ T29] audit: type=1400 audit(136.650:148): avc: denied { ioctl } for pid=4360 comm="syz.1.283" path="socket:[4345]" dev="sockfs" ino=4345 ioctlcmd=0x500d scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 137.290747][ T4375] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=770 sclass=netlink_route_socket pid=4375 comm=syz.1.289 [ 141.093205][ T29] audit: type=1400 audit(141.000:149): avc: denied { write } for pid=4416 comm="syz.0.307" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 147.453643][ T4475] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4475 comm=syz.0.336 [ 149.048655][ T29] audit: type=1400 audit(148.960:150): avc: denied { audit_write } for pid=4503 comm="syz.1.348" capability=29 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 149.423521][ T108] usb 2-1: new high-speed USB device number 3 using dummy_hcd [ 149.490812][ T4518] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4518 comm=syz.0.356 [ 149.580939][ T108] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 149.581299][ T108] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 149.581659][ T108] usb 2-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 21 [ 149.581800][ T108] usb 2-1: New USB device found, idVendor=047f, idProduct=ffff, bcdDevice= 0.00 [ 149.581845][ T108] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 149.589325][ T108] usb 2-1: config 0 descriptor?? [ 150.025579][ T108] plantronics 0003:047F:FFFF.0003: unknown main item tag 0x0 [ 150.026032][ T108] plantronics 0003:047F:FFFF.0003: unknown main item tag 0x0 [ 150.026369][ T108] plantronics 0003:047F:FFFF.0003: unknown main item tag 0x0 [ 150.026680][ T108] plantronics 0003:047F:FFFF.0003: unknown main item tag 0x0 [ 150.026986][ T108] plantronics 0003:047F:FFFF.0003: unknown main item tag 0x0 [ 150.027275][ T108] plantronics 0003:047F:FFFF.0003: unknown main item tag 0x0 [ 150.027563][ T108] plantronics 0003:047F:FFFF.0003: unknown main item tag 0x0 [ 150.027850][ T108] plantronics 0003:047F:FFFF.0003: unknown main item tag 0x0 [ 150.028143][ T108] plantronics 0003:047F:FFFF.0003: unknown main item tag 0x0 [ 150.028444][ T108] plantronics 0003:047F:FFFF.0003: unknown main item tag 0x0 [ 150.034012][ T108] plantronics 0003:047F:FFFF.0003: hiddev0,hidraw0: USB HID v0.40 Device [HID 047f:ffff] on usb-dummy_hcd.1-1/input0 [ 150.291468][ T43] usb 2-1: USB disconnect, device number 3 [ 151.880267][ T4565] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4565 comm=syz.1.369 [ 152.784961][ T29] audit: type=1400 audit(152.700:151): avc: denied { wake_alarm } for pid=4579 comm="syz.0.379" capability=35 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 160.054551][ T29] audit: type=1400 audit(159.970:152): avc: denied { mount } for pid=4681 comm="syz.1.425" name="/" dev="sysfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=filesystem permissive=1 [ 162.029569][ T29] audit: type=1400 audit(161.940:153): avc: denied { unmount } for pid=3095 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=filesystem permissive=1 [ 169.721233][ T4752] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4752 comm=syz.0.452 [ 169.835940][ T4756] syz.0.455 uses obsolete (PF_INET,SOCK_PACKET) [ 169.838431][ T29] audit: type=1400 audit(169.750:154): avc: denied { create } for pid=4755 comm="syz.0.455" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 169.847409][ T29] audit: type=1400 audit(169.760:155): avc: denied { ioctl } for pid=4755 comm="syz.0.455" path="socket:[6003]" dev="sockfs" ino=6003 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 178.943644][ T4875] ucma_write: process 584 (syz.0.507) changed security contexts after opening file descriptor, this is not allowed. [ 180.849671][ T29] audit: type=1400 audit(180.760:156): avc: denied { mounton } for pid=4898 comm="syz.0.519" path="/286/file0" dev="tmpfs" ino=1513 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 182.931283][ T4921] netlink: 40 bytes leftover after parsing attributes in process `syz.1.527'. [ 185.859628][ T29] audit: type=1400 audit(185.770:157): avc: denied { write } for pid=4962 comm="syz.0.545" name="psched" dev="proc" ino=4026532664 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 185.970313][ T4965] netlink: 20 bytes leftover after parsing attributes in process `syz.1.546'. [ 186.909350][ T4990] ======================================================= [ 186.909350][ T4990] WARNING: The mand mount option has been deprecated and [ 186.909350][ T4990] and is ignored by this kernel. Remove the mand [ 186.909350][ T4990] option from the mount to silence this warning. [ 186.909350][ T4990] ======================================================= [ 187.081349][ T29] audit: type=1400 audit(186.990:158): avc: denied { mount } for pid=4981 comm="syz.1.554" name="/" dev="bpf" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bpf_t tclass=filesystem permissive=1 [ 188.906879][ T29] audit: type=1400 audit(188.820:159): avc: denied { unmount } for pid=3095 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bpf_t tclass=filesystem permissive=1 [ 190.767775][ T5019] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1547 sclass=netlink_route_socket pid=5019 comm=syz.1.568 [ 206.893029][ T29] audit: type=1400 audit(206.800:160): avc: denied { read } for pid=5130 comm="syz.0.619" path="socket:[7591]" dev="sockfs" ino=7591 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 208.847210][ T5174] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5174 comm=syz.0.639 [ 212.195767][ T5223] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=5137 sclass=netlink_audit_socket pid=5223 comm=syz.0.663 [ 212.636481][ T29] audit: type=1400 audit(212.550:161): avc: denied { block_suspend } for pid=5232 comm="syz.0.668" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 219.239750][ T29] audit: type=1400 audit(219.150:162): avc: denied { execute } for pid=5322 comm="syz.0.708" path="/388/cpu.stat" dev="tmpfs" ino=2048 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 219.250003][ T29] audit: type=1400 audit(219.160:163): avc: denied { create } for pid=5322 comm="syz.0.708" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=mctp_socket permissive=1 [ 219.258597][ T29] audit: type=1400 audit(219.170:164): avc: denied { write } for pid=5322 comm="syz.0.708" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=mctp_socket permissive=1 [ 221.453686][ T105] usb 2-1: new high-speed USB device number 4 using dummy_hcd [ 221.603739][ T105] usb 2-1: Using ep0 maxpacket: 32 [ 221.609413][ T105] usb 2-1: config 0 interface 0 altsetting 0 bulk endpoint 0x85 has invalid maxpacket 32 [ 221.619096][ T105] usb 2-1: New USB device found, idVendor=0499, idProduct=1010, bcdDevice= a.f5 [ 221.619305][ T105] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 221.619649][ T105] usb 2-1: Product: syz [ 221.619746][ T105] usb 2-1: Manufacturer: syz [ 221.619782][ T105] usb 2-1: SerialNumber: syz [ 221.626901][ T105] usb 2-1: config 0 descriptor?? [ 221.631475][ T5336] raw-gadget.0 gadget.1: fail, usb_ep_enable returned -22 [ 221.639376][ T105] usb 2-1: Quirk or no altset; falling back to MIDI 1.0 [ 221.844852][ T3044] usb 2-1: USB disconnect, device number 4 [ 222.053866][ T5377] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=5137 sclass=netlink_audit_socket pid=5377 comm=syz.1.719 [ 225.080061][ T5405] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5405 comm=syz.1.733 [ 249.841672][ T29] audit: type=1400 audit(249.750:165): avc: denied { map_create } for pid=5605 comm="syz.0.827" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 255.963402][ T29] audit: type=1400 audit(255.870:166): avc: denied { create } for pid=5664 comm="syz.0.853" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 255.975212][ T29] audit: type=1400 audit(255.890:167): avc: denied { mounton } for pid=5664 comm="syz.0.853" path="/448/file0" dev="tmpfs" ino=2365 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 256.011876][ T29] audit: type=1400 audit(255.920:168): avc: denied { unlink } for pid=3094 comm="syz-executor" name="file0" dev="tmpfs" ino=2365 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 256.758858][ T29] audit: type=1400 audit(256.670:169): avc: denied { create } for pid=5673 comm="syz.1.857" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 256.761907][ T29] audit: type=1400 audit(256.670:170): avc: denied { ioctl } for pid=5673 comm="syz.1.857" path="socket:[9495]" dev="sockfs" ino=9495 ioctlcmd=0x89f3 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 256.879089][ T29] audit: type=1400 audit(256.790:171): avc: denied { write } for pid=5673 comm="syz.1.857" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 257.048924][ T5686] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5686 comm=syz.0.860 [ 267.989287][ T3701] hid_parser_main: 5 callbacks suppressed [ 267.989789][ T3701] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 268.000872][ T3701] hid-generic 0000:0000:0000.0004: hidraw0: HID v0.00 Device [syz1] on syz0 [ 271.010923][ T29] audit: type=1400 audit(270.920:172): avc: denied { nlmsg_read } for pid=5780 comm="syz.0.900" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 271.177867][ T29] audit: type=1400 audit(271.090:173): avc: denied { associate } for pid=5785 comm="syz.1.903" name="uts" scontext=root:object_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 271.477704][ T5793] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5793 comm=syz.1.906 [ 271.557238][ T5795] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5795 comm=syz.1.907 [ 273.101372][ T5834] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=19 sclass=netlink_audit_socket pid=5834 comm=syz.0.926 [ 274.624984][ T23] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 274.627764][ T23] hid-generic 0000:0000:0000.0005: hidraw0: HID v0.00 Device [syz1] on syz0 [ 276.523175][ T23] usb 1-1: new high-speed USB device number 3 using dummy_hcd [ 276.673213][ T23] usb 1-1: Using ep0 maxpacket: 32 [ 276.680710][ T23] usb 1-1: config 0 interface 0 altsetting 0 bulk endpoint 0x85 has invalid maxpacket 32 [ 276.690725][ T23] usb 1-1: New USB device found, idVendor=0499, idProduct=1010, bcdDevice= a.f5 [ 276.690979][ T23] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 276.691169][ T23] usb 1-1: Product: syz [ 276.691215][ T23] usb 1-1: Manufacturer: syz [ 276.691245][ T23] usb 1-1: SerialNumber: syz [ 276.697608][ T23] usb 1-1: config 0 descriptor?? [ 276.701359][ T5867] raw-gadget.0 gadget.0: fail, usb_ep_enable returned -22 [ 276.705611][ T23] usb 1-1: Quirk or no altset; falling back to MIDI 1.0 [ 276.909702][ T23] usb 1-1: USB disconnect, device number 3 [ 277.006383][ T5903] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5903 comm=syz.0.940 [ 277.064399][ T5905] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5905 comm=syz.0.941 [ 280.816852][ T5920] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=19 sclass=netlink_audit_socket pid=5920 comm=syz.1.948 [ 281.896466][ T29] audit: type=1400 audit(281.810:174): avc: denied { getopt } for pid=5937 comm="syz.1.957" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 284.153664][ T29] audit: type=1400 audit(284.070:175): avc: denied { append } for pid=5975 comm="syz.0.975" name="pfkey" dev="proc" ino=4026532721 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 284.335309][ T5981] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=1795 sclass=netlink_audit_socket pid=5981 comm=syz.0.978 [ 285.017057][ T29] audit: type=1400 audit(284.930:176): avc: denied { mount } for pid=6001 comm="syz.0.988" name="/" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=filesystem permissive=1 [ 285.027840][ T29] audit: type=1400 audit(284.940:177): avc: denied { getopt } for pid=6001 comm="syz.0.988" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 285.036825][ T29] audit: type=1400 audit(284.950:178): avc: denied { remount } for pid=6001 comm="syz.0.988" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=filesystem permissive=1 [ 285.036928][ T6002] debugfs: Invalid uid '0x00000000ffffffff' [ 285.059742][ T29] audit: type=1400 audit(284.970:179): avc: denied { unmount } for pid=3094 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=filesystem permissive=1 [ 292.223401][ T29] audit: type=1400 audit(292.130:180): avc: denied { sqpoll } for pid=6069 comm="syz.0.1019" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 292.229523][ T29] audit: type=1400 audit(292.140:181): avc: denied { write } for pid=6069 comm="syz.0.1019" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=10116 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 295.019233][ T29] audit: type=1400 audit(294.930:182): avc: denied { setopt } for pid=6091 comm="syz.1.1029" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 298.011120][ T6125] capability: warning: `syz.1.1044' uses 32-bit capabilities (legacy support in use) [ 300.374042][ T6177] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=6177 comm=syz.0.1068 [ 726.282908][ C0] watchdog: BUG: soft lockup - CPU#0 stuck for 430s! [swapper/0:0] [ 726.283208][ C0] Modules linked in: [ 726.284278][ C0] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Tainted: G L syzkaller #0 PREEMPT [ 726.284607][ C0] Tainted: [L]=SOFTLOCKUP [ 726.284658][ C0] Hardware name: ARM-Versatile Express [ 726.284886][ C0] PC is at _raw_spin_lock+0x40/0x58 [ 726.285098][ C0] LR is at _raw_spin_lock+0x18/0x58 [ 726.285150][ C0] pc : [<81abbef4>] lr : [<81abbecc>] psr: 80000013 [ 726.285192][ C0] sp : 82801e28 ip : 82801e28 fp : 82801e3c [ 726.285228][ C0] r10: 00000000 r9 : 8410b040 r8 : 83ecd688 [ 726.285268][ C0] r7 : 8410b168 r6 : 00000001 r5 : 00000004 r4 : 8410b168 [ 726.285311][ C0] r3 : 0000d28c r2 : 0000d28e r1 : 00000000 r0 : 00000001 [ 726.285430][ C0] Flags: Nzcv IRQs on FIQs on Mode SVC_32 ISA ARM Segment user [ 726.285501][ C0] Control: 30c5387d Table: 85e4d200 DAC: fffffffd [ 726.285597][ C0] Call trace: [ 726.285875][ C0] [<81abbeb4>] (_raw_spin_lock) from [<809c7a2c>] (gpio_mmio_set+0x44/0x80) [ 726.286172][ C0] r5:00000004 r4:8410b040 [ 726.286270][ C0] [<809c79e8>] (gpio_mmio_set) from [<809b81e8>] (gpiochip_set+0x1c/0x44) [ 726.286349][ C0] r7:00000001 r6:00000000 r5:00000002 r4:8409fda8 [ 726.286369][ C0] [<809b81cc>] (gpiochip_set) from [<809baab0>] (gpiod_set_raw_value_commit+0x78/0x218) [ 726.286420][ C0] [<809baa38>] (gpiod_set_raw_value_commit) from [<809bc350>] (gpiod_set_value_nocheck+0x44/0x58) [ 726.286504][ C0] r10:00000000 r9:00000000 r8:00000001 r7:dddce4c0 r6:838e2018 r5:00000001 [ 726.286536][ C0] r4:8409fda8 [ 726.286555][ C0] [<809bc30c>] (gpiod_set_value_nocheck) from [<809bc3a0>] (gpiod_set_value+0x3c/0x88) [ 726.286604][ C0] [<809bc364>] (gpiod_set_value) from [<809ccb3c>] (gpio_led_set+0x5c/0x60) [ 726.286660][ C0] r5:000000ff r4:830fea24 [ 726.286680][ C0] [<809ccae0>] (gpio_led_set) from [<809ca464>] (led_set_brightness+0x84/0x90) [ 726.286737][ C0] r5:000000ff r4:830fea24 [ 726.286753][ C0] [<809ca3e0>] (led_set_brightness) from [<809cbfe4>] (led_trigger_event+0x40/0x58) [ 726.286805][ C0] r5:000000ff r4:830fea24 [ 726.286822][ C0] [<809cbfa4>] (led_trigger_event) from [<809cd640>] (ledtrig_cpu+0xac/0xf4) [ 726.286883][ C0] r7:dddce4c0 r6:00000002 r5:82b15cd8 r4:000001fd [ 726.286903][ C0] [<809cd594>] (ledtrig_cpu) from [<80227a38>] (arch_cpu_idle_exit+0x14/0x18) [ 726.286980][ C0] r9:00000000 r8:00000000 r7:8280c710 r6:8281b500 r5:8280c6d0 r4:00000000 [ 726.286998][ C0] [<80227a24>] (arch_cpu_idle_exit) from [<802b168c>] (do_idle+0x5c/0x2d8) [ 726.287052][ C0] [<802b1630>] (do_idle) from [<802b1c38>] (cpu_startup_entry+0x30/0x34) [ 726.287121][ C0] r10:8281aff4 r9:8280c680 r8:823bec64 r7:00000000 r6:deffc06c r5:828222e8 [ 726.287141][ C0] r4:000000ed [ 726.287159][ C0] [<802b1c08>] (cpu_startup_entry) from [<81aaf37c>] (kernel_init+0x0/0x138) [ 726.287219][ C0] [<81aaf29c>] (rest_init) from [<8260145c>] (start_kernel+0x844/0x860) [ 726.287318][ C0] [<82600c18>] (start_kernel) from [<00000000>] (0x0) [ 726.288016][ C0] Sending NMI from CPU 0 to CPUs 1: [ 726.288689][ C1] NMI backtrace for cpu 1 [ 726.288796][ C1] CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Tainted: G L syzkaller #0 PREEMPT [ 726.288854][ C1] Tainted: [L]=SOFTLOCKUP [ 726.288870][ C1] Hardware name: ARM-Versatile Express [ 726.288890][ C1] PC is at _raw_spin_lock+0x40/0x58 [ 726.288947][ C1] LR is at _raw_spin_lock+0x18/0x58 [ 726.288978][ C1] pc : [<81abbef4>] lr : [<81abbecc>] psr: 80000113 [ 726.289003][ C1] sp : df805d68 ip : df805d68 fp : df805d7c [ 726.289025][ C1] r10: 81c05450 r9 : 8410b040 r8 : 83ecd688 [ 726.289045][ C1] r7 : 8410b168 r6 : 00000001 r5 : 00000001 r4 : 8410b168 [ 726.289072][ C1] r3 : 0000d28c r2 : 0000d28d r1 : 00000000 r0 : 00000001 [ 726.289101][ C1] Flags: Nzcv IRQs on FIQs on Mode SVC_32 ISA ARM Segment none [ 726.289141][ C1] Control: 30c5387d Table: 84e866c0 DAC: 00000000 [ 726.289165][ C1] Call trace: frame pointer underflow [ 726.289276][ C1] [<81abbeb4>] (_raw_spin_lock) from [<809c7a2c>] (gpio_mmio_set+0x44/0x80) [ 726.289366][ C1] r5:00000001 r4:8410b040 [ 726.289390][ C1] [<809c79e8>] (gpio_mmio_set) from [<809b81e8>] (gpiochip_set+0x1c/0x44) [ 726.289471][ C1] r7:00000001 r6:00000000 r5:00000000 r4:8409fd80 [ 726.289494][ C1] [<809b81cc>] (gpiochip_set) from [<809baab0>] (gpiod_set_raw_value_commit+0x78/0x218) [ 726.289558][ C1] [<809baa38>] (gpiod_set_raw_value_commit) from [<809bc350>] (gpiod_set_value_nocheck+0x44/0x58) [ 726.289638][ C1] r10:81c05450 r9:df805ebc r8:00000102 r7:000004a9 r6:00000007 r5:00000001 [ 726.289663][ C1] r4:8409fd80 [ 726.289682][ C1] [<809bc30c>] (gpiod_set_value_nocheck) from [<809bc3a0>] (gpiod_set_value+0x3c/0x88) [ 726.289752][ C1] [<809bc364>] (gpiod_set_value) from [<809ccb3c>] (gpio_led_set+0x5c/0x60) [ 726.289817][ C1] r5:830fe844 r4:830fe844 [ 726.289836][ C1] [<809ccae0>] (gpio_led_set) from [<809ca3d4>] (led_set_brightness_nosleep+0x38/0x44) [ 726.289899][ C1] r5:830fe844 r4:846b24cc [ 726.289918][ C1] [<809ca39c>] (led_set_brightness_nosleep) from [<809cd438>] (led_heartbeat_function+0x84/0x144) [ 726.289976][ C1] [<809cd3b4>] (led_heartbeat_function) from [<80327070>] (call_timer_fn+0x30/0x220) [ 726.290052][ C1] r7:000004a9 r6:809cd3b4 r5:846b24cc r4:83216000 [ 726.290074][ C1] [<80327040>] (call_timer_fn) from [<80327524>] (__run_timers+0x2c4/0x3f8) [ 726.290150][ C1] r9:df805ebc r8:000004a9 r7:00000000 r6:809cd3b4 r5:dddd9f00 r4:846b24cc [ 726.290172][ C1] [<80327260>] (__run_timers) from [<803276c0>] (run_timer_base+0x68/0x78) [ 726.290250][ C1] r10:83216000 r9:82804d80 r8:00000102 r7:00000001 r6:00000082 r5:00000002 [ 726.290276][ C1] r4:dddd9f00 [ 726.290295][ C1] [<80327658>] (run_timer_base) from [<803276ec>] (run_timer_softirq+0x1c/0x34) [ 726.290358][ C1] r4:82804084 [ 726.290376][ C1] [<803276d0>] (run_timer_softirq) from [<8025b65c>] (handle_softirqs+0x140/0x458) [ 726.290440][ C1] [<8025b51c>] (handle_softirqs) from [<8025bad0>] (__irq_exit_rcu+0x110/0x1d0) [ 726.290518][ C1] r10:00000000 r9:83216000 r8:00000000 r7:df865e08 r6:82443f98 r5:8247f0cc [ 726.290541][ C1] r4:83216000 [ 726.290559][ C1] [<8025b9c0>] (__irq_exit_rcu) from [<8025be48>] (irq_exit+0x10/0x18) [ 726.290626][ C1] r5:8247f0cc r4:826c3a9c [ 726.290647][ C1] [<8025be38>] (irq_exit) from [<81aad964>] (generic_handle_arch_irq+0x7c/0x80) [ 726.290723][ C1] [<81aad8e8>] (generic_handle_arch_irq) from [<81a7d904>] (call_with_stack+0x1c/0x20) [ 726.290803][ C1] r9:83216000 r8:83ecd688 r7:df865e3c r6:ffffffff r5:60000013 r4:809c8228 [ 726.290824][ C1] [<81a7d8e8>] (call_with_stack) from [<80200bec>] (__irq_svc+0x8c/0xbc) [ 726.290974][ C1] Exception stack(0xdf865e08 to 0xdf865e50) [ 726.291176][ C1] 5e00: e01f3008 00000008 0000d28c 00000000 e01f3008 00000008 [ 726.291241][ C1] 5e20: 00000001 8410b168 83ecd688 8410b040 00000000 df865e6c df865e58 df865e58 [ 726.291278][ C1] 5e40: 809c8228 809c8228 60000013 ffffffff [ 726.291364][ C1] [<809c820c>] (gpio_mmio_write32) from [<809c7a4c>] (gpio_mmio_set+0x64/0x80) [ 726.291447][ C1] r5:00000008 r4:8410b040 [ 726.291473][ C1] [<809c79e8>] (gpio_mmio_set) from [<809b81e8>] (gpiochip_set+0x1c/0x44) [ 726.291552][ C1] r7:00000001 r6:00000000 r5:00000003 r4:8409fdbc [ 726.291576][ C1] [<809b81cc>] (gpiochip_set) from [<809baab0>] (gpiod_set_raw_value_commit+0x78/0x218) [ 726.291636][ C1] [<809baa38>] (gpiod_set_raw_value_commit) from [<809bc350>] (gpiod_set_value_nocheck+0x44/0x58) [ 726.291722][ C1] r10:00000000 r9:00000000 r8:00000001 r7:ddde24c0 r6:838e2518 r5:00000001 [ 726.291754][ C1] r4:8409fdbc [ 726.291774][ C1] [<809bc30c>] (gpiod_set_value_nocheck) from [<809bc3a0>] (gpiod_set_value+0x3c/0x88) [ 726.291840][ C1] [<809bc364>] (gpiod_set_value) from [<809ccb3c>] (gpio_led_set+0x5c/0x60) [ 726.291910][ C1] r5:000000ff r4:830feb14 [ 726.291949][ C1] [<809ccae0>] (gpio_led_set) from [<809ca464>] (led_set_brightness+0x84/0x90) [ 726.292021][ C1] r5:000000ff r4:830feb14 [ 726.292048][ C1] [<809ca3e0>] (led_set_brightness) from [<809cbfe4>] (led_trigger_event+0x40/0x58) [ 726.292117][ C1] r5:000000ff r4:830feb14 [ 726.292141][ C1] [<809cbfa4>] (led_trigger_event) from [<809cd640>] (ledtrig_cpu+0xac/0xf4) [ 726.292214][ C1] r7:ddde24c0 r6:00000002 r5:82b15cd8 r4:000000fe [ 726.292239][ C1] [<809cd594>] (ledtrig_cpu) from [<80227a38>] (arch_cpu_idle_exit+0x14/0x18) [ 726.292321][ C1] r9:00000000 r8:00000001 r7:8280c710 r6:83216000 r5:8280c6d0 r4:00000001 [ 726.292398][ C1] [<80227a24>] (arch_cpu_idle_exit) from [<802b168c>] (do_idle+0x5c/0x2d8) [ 726.292480][ C1] [<802b1630>] (do_idle) from [<802b1c38>] (cpu_startup_entry+0x30/0x34) [ 726.292600][ C1] r10:00000000 r9:414fc0f0 r8:80003000 r7:82a7b4a4 r6:83216000 r5:00000001 [ 726.292629][ C1] r4:00000092 [ 726.292649][ C1] [<802b1c08>] (cpu_startup_entry) from [<8022f360>] (secondary_start_kernel+0x128/0x194) [ 726.292731][ C1] [<8022f238>] (secondary_start_kernel) from [<80220094>] (__enable_mmu+0x0/0xc) [ 726.292813][ C1] r7:82a7b4a4 r6:30c0387d r5:00000000 r4:830b7bc0 [ 726.294182][ C0] Kernel panic - not syncing: softlockup: hung tasks [ 726.322790][ C0] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Tainted: G L syzkaller #0 PREEMPT [ 726.323200][ C0] Tainted: [L]=SOFTLOCKUP [ 726.323387][ C0] Hardware name: ARM-Versatile Express [ 726.323648][ C0] Call trace: [ 726.323927][ C0] [<80201a74>] (dump_backtrace) from [<80201b70>] (show_stack+0x18/0x1c) [ 726.324320][ C0] r7:822965a4 r6:8281b500 r5:00000000 r4:82295754 [ 726.324599][ C0] [<80201b58>] (show_stack) from [<8021ee08>] (dump_stack_lvl+0x54/0x7c) [ 726.324930][ C0] [<8021edb4>] (dump_stack_lvl) from [<8021ee48>] (dump_stack+0x18/0x1c) [ 726.325285][ C0] r5:00000000 r4:82a7bd14 [ 726.325468][ C0] [<8021ee30>] (dump_stack) from [<80202648>] (vpanic+0xe0/0x2e8) [ 726.325767][ C0] [<80202568>] (vpanic) from [<80202884>] (trace_suspend_resume+0x0/0xd8) [ 726.326138][ C0] r7:82ac27f8 [ 726.326296][ C0] [<80202850>] (panic) from [<80383fcc>] (watchdog_timer_fn+0x2dc/0x350) [ 726.326639][ C0] r3:00000001 r2:00004000 r1:82a7bd1c r0:822965a4 [ 726.326868][ C0] [<80383cf0>] (watchdog_timer_fn) from [<80329c64>] (__hrtimer_run_queues+0x1c4/0x454) [ 726.327261][ C0] r10:8281b500 r9:00000000 r8:dddc7130 r7:80383cf0 r6:dddc7000 r5:dddc7040 [ 726.327556][ C0] r4:dddc75d8 [ 726.327714][ C0] [<80329aa0>] (__hrtimer_run_queues) from [<8032b268>] (hrtimer_interrupt+0x148/0x2bc) [ 726.328101][ C0] r10:14e73f80 r9:dddc7180 r8:dddc7130 r7:000000a9 r6:00000003 r5:20000193 [ 726.328398][ C0] r4:dddc7000 [ 726.328569][ C0] [<8032b120>] (hrtimer_interrupt) from [<813408e0>] (arch_timer_handler_virt+0x30/0x38) [ 726.328971][ C0] r10:81d0fc78 r9:8309e400 r8:00000000 r7:00000000 r6:00000000 r5:82498528 [ 726.329271][ C0] r4:8309de40 [ 726.329430][ C0] [<813408b0>] (arch_timer_handler_virt) from [<802efab4>] (handle_percpu_devid_irq+0x128/0x34c) [ 726.329817][ C0] [<802ef98c>] (handle_percpu_devid_irq) from [<802e8c44>] (handle_irq_desc+0x74/0x84) [ 726.330200][ C0] r10:00000000 r9:8281b500 r8:00000000 r7:df80a00c r6:826c2388 r5:df80a000 [ 726.330587][ C0] r4:8280cc44 [ 726.330739][ C0] [<802e8bd0>] (handle_irq_desc) from [<802e8cc0>] (generic_handle_domain_irq+0x18/0x1c) [ 726.331124][ C0] [<802e8ca8>] (generic_handle_domain_irq) from [<802012c8>] (gic_handle_irq+0x68/0x7c) [ 726.331488][ C0] [<80201260>] (gic_handle_irq) from [<81aad948>] (generic_handle_arch_irq+0x60/0x80) [ 726.331858][ C0] r7:82801dd8 r6:82443f98 r5:8247f0cc r4:826c3a9c [ 726.332099][ C0] [<81aad8e8>] (generic_handle_arch_irq) from [<80200bdc>] (__irq_svc+0x7c/0xbc) [ 726.332690][ C0] Exception stack(0x82801dd8 to 0x82801e20) [ 726.332990][ C0] 1dc0: 00000001 00000000 [ 726.333443][ C0] 1de0: 0000d28e 0000d28c 8410b168 00000004 00000001 8410b168 83ecd688 8410b040 [ 726.333809][ C0] 1e00: 00000000 82801e3c 82801e28 82801e28 81abbecc 81abbef4 80000013 ffffffff [ 726.334152][ C0] r9:8281b500 r8:83ecd688 r7:82801e0c r6:ffffffff r5:80000013 r4:81abbef4 [ 726.334440][ C0] [<81abbeb4>] (_raw_spin_lock) from [<809c7a2c>] (gpio_mmio_set+0x44/0x80) [ 726.334766][ C0] r5:00000004 r4:8410b040 [ 726.334965][ C0] [<809c79e8>] (gpio_mmio_set) from [<809b81e8>] (gpiochip_set+0x1c/0x44) [ 726.335344][ C0] r7:00000001 r6:00000000 r5:00000002 r4:8409fda8 [ 726.335581][ C0] [<809b81cc>] (gpiochip_set) from [<809baab0>] (gpiod_set_raw_value_commit+0x78/0x218) [ 726.335961][ C0] [<809baa38>] (gpiod_set_raw_value_commit) from [<809bc350>] (gpiod_set_value_nocheck+0x44/0x58) [ 726.336379][ C0] r10:00000000 r9:00000000 r8:00000001 r7:dddce4c0 r6:838e2018 r5:00000001 [ 726.336719][ C0] r4:8409fda8 [ 726.336873][ C0] [<809bc30c>] (gpiod_set_value_nocheck) from [<809bc3a0>] (gpiod_set_value+0x3c/0x88) [ 726.337240][ C0] [<809bc364>] (gpiod_set_value) from [<809ccb3c>] (gpio_led_set+0x5c/0x60) [ 726.337581][ C0] r5:000000ff r4:830fea24 [ 726.337760][ C0] [<809ccae0>] (gpio_led_set) from [<809ca464>] (led_set_brightness+0x84/0x90) [ 726.338123][ C0] r5:000000ff r4:830fea24 [ 726.338304][ C0] [<809ca3e0>] (led_set_brightness) from [<809cbfe4>] (led_trigger_event+0x40/0x58) [ 726.338667][ C0] r5:000000ff r4:830fea24 [ 726.338853][ C0] [<809cbfa4>] (led_trigger_event) from [<809cd640>] (ledtrig_cpu+0xac/0xf4) [ 726.339210][ C0] r7:dddce4c0 r6:00000002 r5:82b15cd8 r4:000001fd [ 726.339449][ C0] [<809cd594>] (ledtrig_cpu) from [<80227a38>] (arch_cpu_idle_exit+0x14/0x18) [ 726.339804][ C0] r9:00000000 r8:00000000 r7:8280c710 r6:8281b500 r5:8280c6d0 r4:00000000 [ 726.340107][ C0] [<80227a24>] (arch_cpu_idle_exit) from [<802b168c>] (do_idle+0x5c/0x2d8) [ 726.340455][ C0] [<802b1630>] (do_idle) from [<802b1c38>] (cpu_startup_entry+0x30/0x34) [ 726.340846][ C0] r10:8281aff4 r9:8280c680 r8:823bec64 r7:00000000 r6:deffc06c r5:828222e8 [ 726.341143][ C0] r4:000000ed [ 726.341306][ C0] [<802b1c08>] (cpu_startup_entry) from [<81aaf37c>] (kernel_init+0x0/0x138) [ 726.341657][ C0] [<81aaf29c>] (rest_init) from [<8260145c>] (start_kernel+0x844/0x860) [ 726.342019][ C0] [<82600c18>] (start_kernel) from [<00000000>] (0x0) [ 726.344849][ C0] Rebooting in 86400 seconds..