last executing test programs: 1.34485661s ago: executing program 1 (id=1741): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0x541b, &(0x7f0000000000)={0xffffffffffffffff}) close_range(r1, 0xffffffffffffffff, 0x0) socket$nl_audit(0x10, 0x3, 0x9) sendmsg$RDMA_NLDEV_CMD_PORT_GET(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x1405, 0x400, 0x70bd2d, 0x25dfdbfe}, 0x10}, 0x1, 0x0, 0x0, 0x40800}, 0x40000) 1.247666902s ago: executing program 1 (id=1743): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x275a, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0x541b, &(0x7f0000000000)={0xffffffffffffffff}) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, r0, 0x0) write$hidraw(r2, &(0x7f0000000980)="dd", 0x1) 1.177339461s ago: executing program 1 (id=1745): r0 = openat$pfkey(0xffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.pending_reads\x00', 0xe0842, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) sendmsg$inet(r1, &(0x7f0000000840)={0x0, 0x0, 0x0}, 0x4000000) 1.097282261s ago: executing program 1 (id=1747): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "7f12ddc1517600"}) r1 = syz_open_pts(r0, 0x0) read(r1, 0x0, 0x2006) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)) 515.733765ms ago: executing program 1 (id=1756): r0 = openat$null(0xffffffffffffff9c, &(0x7f00000002c0), 0x91a2f0007feb3929, 0x0) close(r0) r1 = socket$nl_audit(0x10, 0x3, 0x9) dup3(r1, 0xffffffffffffffff, 0x0) write$sndseq(r0, &(0x7f0000000480)=[{0x8, 0xfa, 0x4, 0x10, @time={0x48166b2e, 0x4}, {0x5, 0xe}, {0x8, 0xf8}, @time=@tick=0x7}], 0x1c) 412.824698ms ago: executing program 1 (id=1758): r0 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000000)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000380)={0x1d, r1, 0x4, {0x2, 0x0, 0x2}, 0xfe}, 0x18) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, 0x0, 0x1, 0x70bd28, 0x25dfdbff}, 0x1c}, 0x1, 0x0, 0x0, 0x8004}, 0x20000080) sendmsg$inet(r0, &(0x7f0000001600)={0x0, 0x0, &(0x7f0000001500)=[{&(0x7f00000014c0)='_', 0x1}], 0x1}, 0x800) 247.424199ms ago: executing program 0 (id=1760): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = getpid() r2 = syz_pidfd_open(r1, 0x0) r3 = pidfd_getfd(r2, r0, 0x0) sendmsg$IPSET_CMD_DESTROY(r3, &(0x7f00000003c0)={0x0, 0x0, &(0x7f00000001c0)={0x0}, 0x1, 0x0, 0x0, 0x80}, 0x0) 183.663267ms ago: executing program 0 (id=1761): r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000000c0)={'vcan0\x00', 0x0}) bind$can_j1939(r1, &(0x7f0000000340)={0x1d, r2, 0x0, {0x0, 0xff, 0x6}, 0xfd}, 0x18) sendmsg$sock(r1, &(0x7f0000000200)={&(0x7f00000005c0)=@can, 0x80, 0x0}, 0x4000040) 127.477944ms ago: executing program 0 (id=1762): r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$sock_proto_private(r2, 0x89e0, 0x0) 66.878772ms ago: executing program 0 (id=1763): r0 = memfd_create(&(0x7f0000000100)='),\x00', 0x0) r1 = getpgid(0x0) r2 = syz_pidfd_open(r1, 0x0) r3 = pidfd_getfd(r2, r0, 0x0) ioctl$F2FS_IOC_RESIZE_FS(r3, 0x5452, &(0x7f0000000200)=0x80000000000) 5.150719ms ago: executing program 0 (id=1764): r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000380), 0x8, 0x0) r1 = socket$nl_audit(0x10, 0x3, 0x9) dup3(r1, r0, 0x0) sendmsg$AUDIT_GET(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f00000005c0)={0x10}, 0x10}}, 0x0) read$FUSE(r0, 0x0, 0x0) 0s ago: executing program 0 (id=1765): r0 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000000)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000380)={0x1d, r1, 0x4, {0x2, 0x0, 0x2}, 0xfe}, 0x11) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x14, 0x0, 0x400, 0x70bd2d, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x8}, 0x800) sendmsg$TIPC_NL_MON_PEER_GET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)={0x14, 0x0, 0x20, 0x70bd27, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x20000800}, 0x40000) kernel console output (not intermixed with test programs): [ 47.412020][ T29] audit: type=1400 audit(47.330:56): avc: denied { read write } for pid=3087 comm="sftp-server" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 47.434503][ T29] audit: type=1400 audit(47.360:57): avc: denied { open } for pid=3087 comm="sftp-server" path="/dev/null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 Warning: Permanently added '[localhost]:57375' (ED25519) to the list of known hosts. [ 63.238672][ T29] audit: type=1400 audit(63.150:58): avc: denied { name_bind } for pid=3090 comm="sshd-session" src=30000 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 64.363295][ T29] audit: type=1400 audit(64.280:59): avc: denied { execute } for pid=3091 comm="sh" name="syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 64.384041][ T29] audit: type=1400 audit(64.300:60): avc: denied { execute_no_trans } for pid=3091 comm="sh" path="/syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 68.612338][ T29] audit: type=1400 audit(68.530:61): avc: denied { mounton } for pid=3091 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=806 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 68.617753][ T29] audit: type=1400 audit(68.540:62): avc: denied { mount } for pid=3091 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 68.637006][ T3091] cgroup: Unknown subsys name 'net' [ 68.646703][ T29] audit: type=1400 audit(68.570:63): avc: denied { unmount } for pid=3091 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 68.811704][ T3091] cgroup: Unknown subsys name 'cpuset' [ 68.819819][ T3091] cgroup: Unknown subsys name 'hugetlb' [ 68.820714][ T3091] cgroup: Unknown subsys name 'rlimit' [ 69.018307][ T29] audit: type=1400 audit(68.940:64): avc: denied { setattr } for pid=3091 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 69.020342][ T29] audit: type=1400 audit(68.940:65): avc: denied { mounton } for pid=3091 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 69.022367][ T29] audit: type=1400 audit(68.940:66): avc: denied { mount } for pid=3091 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 69.212410][ T3093] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 69.215817][ T29] audit: type=1400 audit(69.140:67): avc: denied { relabelto } for pid=3093 comm="mkswap" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 69.219426][ T29] audit: type=1400 audit(69.140:68): avc: denied { write } for pid=3093 comm="mkswap" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 69.250686][ T29] audit: type=1400 audit(69.170:69): avc: denied { read } for pid=3091 comm="syz-executor" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 69.251252][ T29] audit: type=1400 audit(69.170:70): avc: denied { open } for pid=3091 comm="syz-executor" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 76.701428][ T3091] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 78.743404][ T29] audit: type=1400 audit(78.660:71): avc: denied { execmem } for pid=3094 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 78.810634][ T29] audit: type=1400 audit(78.730:72): avc: denied { read } for pid=3096 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 78.814068][ T29] audit: type=1400 audit(78.730:73): avc: denied { open } for pid=3096 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 78.820713][ T29] audit: type=1400 audit(78.740:74): avc: denied { mounton } for pid=3096 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 78.859045][ T29] audit: type=1400 audit(78.780:75): avc: denied { module_request } for pid=3096 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 78.943277][ T29] audit: type=1400 audit(78.860:76): avc: denied { sys_module } for pid=3096 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 79.608927][ T29] audit: type=1400 audit(79.530:77): avc: denied { ioctl } for pid=3097 comm="syz-executor" path="/dev/net/tun" dev="devtmpfs" ino=677 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 80.730189][ T3096] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 80.755846][ T3096] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 80.808959][ T3097] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 80.818135][ T3097] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 81.628267][ T3097] hsr_slave_0: entered promiscuous mode [ 81.631651][ T3097] hsr_slave_1: entered promiscuous mode [ 81.700078][ T3096] hsr_slave_0: entered promiscuous mode [ 81.703705][ T3096] hsr_slave_1: entered promiscuous mode [ 81.705835][ T3096] debugfs: 'hsr0' already exists in 'hsr' [ 81.706803][ T3096] Cannot create hsr debugfs directory [ 82.140395][ T29] audit: type=1400 audit(82.060:78): avc: denied { create } for pid=3097 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 82.145168][ T29] audit: type=1400 audit(82.070:79): avc: denied { write } for pid=3097 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 82.148318][ T29] audit: type=1400 audit(82.070:80): avc: denied { read } for pid=3097 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 82.157220][ T3097] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 82.179816][ T3097] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 82.198691][ T3097] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 82.217490][ T3097] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 82.277809][ T3096] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 82.296410][ T3096] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 82.308248][ T3096] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 82.330830][ T3096] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 83.028012][ T3097] 8021q: adding VLAN 0 to HW filter on device bond0 [ 83.106419][ T3096] 8021q: adding VLAN 0 to HW filter on device bond0 [ 85.704155][ T3097] veth0_vlan: entered promiscuous mode [ 85.728345][ T3097] veth1_vlan: entered promiscuous mode [ 85.809157][ T3097] veth0_macvtap: entered promiscuous mode [ 85.825554][ T3097] veth1_macvtap: entered promiscuous mode [ 85.915870][ T1302] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 85.919552][ T1302] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 85.924746][ T1302] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 85.939939][ T3096] veth0_vlan: entered promiscuous mode [ 85.945925][ T1302] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 85.985092][ T3096] veth1_vlan: entered promiscuous mode [ 86.064031][ T29] audit: type=1400 audit(85.980:81): avc: denied { mount } for pid=3097 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 86.076464][ T29] audit: type=1400 audit(86.000:82): avc: denied { mounton } for pid=3097 comm="syz-executor" path="/syzkaller.C8i9tu/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 86.076874][ T29] audit: type=1400 audit(86.000:83): avc: denied { mount } for pid=3097 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 86.095119][ T29] audit: type=1400 audit(86.020:84): avc: denied { mounton } for pid=3097 comm="syz-executor" path="/syzkaller.C8i9tu/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 86.098027][ T29] audit: type=1400 audit(86.020:85): avc: denied { mounton } for pid=3097 comm="syz-executor" path="/syzkaller.C8i9tu/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=3118 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 86.111935][ T29] audit: type=1400 audit(86.030:86): avc: denied { unmount } for pid=3097 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 86.116150][ T3096] veth0_macvtap: entered promiscuous mode [ 86.122223][ T3096] veth1_macvtap: entered promiscuous mode [ 86.132111][ T29] audit: type=1400 audit(86.050:87): avc: denied { mounton } for pid=3097 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=772 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 86.143961][ T29] audit: type=1400 audit(86.070:88): avc: denied { mount } for pid=3097 comm="syz-executor" name="/" dev="gadgetfs" ino=2283 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 86.156786][ T29] audit: type=1400 audit(86.070:89): avc: denied { mount } for pid=3097 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 86.165114][ T29] audit: type=1400 audit(86.090:90): avc: denied { mounton } for pid=3097 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 86.188013][ T1281] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 86.188516][ T1281] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 86.188655][ T1281] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 86.188729][ T1281] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 86.280515][ T3097] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 87.063984][ T3709] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=3709 comm=syz.0.1 [ 93.606497][ T29] kauditd_printk_skb: 9 callbacks suppressed [ 93.607918][ T29] audit: type=1400 audit(93.530:100): avc: denied { create } for pid=3754 comm="syz.1.24" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 93.620371][ T29] audit: type=1400 audit(93.540:101): avc: denied { write } for pid=3754 comm="syz.1.24" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 94.124251][ T29] audit: type=1400 audit(94.050:102): avc: denied { create } for pid=3759 comm="syz.0.26" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 94.128805][ T29] audit: type=1400 audit(94.050:103): avc: denied { read } for pid=3759 comm="syz.0.26" path="socket:[2385]" dev="sockfs" ino=2385 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 94.418667][ T29] audit: type=1400 audit(94.340:104): avc: denied { create } for pid=3766 comm="syz.1.29" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 95.795192][ T29] audit: type=1400 audit(95.720:105): avc: denied { mounton } for pid=3776 comm="syz.1.33" path="/19/file0" dev="tmpfs" ino=115 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 95.831782][ T29] audit: type=1400 audit(95.750:106): avc: denied { unmount } for pid=3097 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 98.085135][ T29] audit: type=1400 audit(98.010:107): avc: denied { audit_write } for pid=3805 comm="syz.1.46" capability=29 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 98.755595][ T3820] SELinux: Context system_u:object_r:login_exec_t:s0 is not valid (left unmapped). [ 98.757036][ T29] audit: type=1400 audit(98.680:108): avc: denied { relabelto } for pid=3819 comm="syz.1.53" name="file1" dev="tmpfs" ino=217 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="system_u:object_r:login_exec_t:s0" [ 98.758449][ T29] audit: type=1400 audit(98.680:109): avc: denied { associate } for pid=3819 comm="syz.1.53" name="file1" dev="tmpfs" ino=217 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 srawcon="system_u:object_r:login_exec_t:s0" [ 98.775694][ T29] audit: type=1400 audit(98.700:110): avc: denied { unlink } for pid=3097 comm="syz-executor" name="file1" dev="tmpfs" ino=217 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="system_u:object_r:login_exec_t:s0" [ 102.986203][ T29] audit: type=1400 audit(102.910:111): avc: denied { create } for pid=3838 comm="syz.1.62" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 102.992156][ T29] audit: type=1400 audit(102.910:112): avc: denied { write } for pid=3838 comm="syz.1.62" path="socket:[3412]" dev="sockfs" ino=3412 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 104.190931][ T3843] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3843 comm=syz.1.64 [ 104.398358][ T29] audit: type=1400 audit(104.320:113): avc: denied { unmount } for pid=3097 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 108.767093][ T29] audit: type=1400 audit(108.690:114): avc: denied { create } for pid=3899 comm="syz.0.91" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 108.769537][ T29] audit: type=1400 audit(108.690:115): avc: denied { write } for pid=3899 comm="syz.0.91" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 110.209147][ T3915] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=3915 comm=syz.1.97 [ 110.216630][ T29] audit: type=1400 audit(110.130:116): avc: denied { allowed } for pid=3914 comm="syz.0.98" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 110.227144][ T29] audit: type=1400 audit(110.150:117): avc: denied { create } for pid=3914 comm="syz.0.98" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 110.390544][ T29] audit: type=1400 audit(110.310:118): avc: denied { append } for pid=3919 comm="syz.1.100" name="001" dev="devtmpfs" ino=689 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 110.858883][ T29] audit: type=1400 audit(110.780:119): avc: denied { execute } for pid=3926 comm="syz.0.103" name="file0" dev="tmpfs" ino=186 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 110.860192][ T3927] process 'syz.0.103' launched './file0' with NULL argv: empty string added [ 110.860766][ T29] audit: type=1400 audit(110.780:120): avc: denied { execute_no_trans } for pid=3926 comm="syz.0.103" path="/32/file0" dev="tmpfs" ino=186 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 111.120623][ T29] audit: type=1400 audit(111.040:121): avc: denied { create } for pid=3933 comm="syz.1.106" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 111.136134][ T29] audit: type=1400 audit(111.060:122): avc: denied { write } for pid=3933 comm="syz.1.106" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 112.071883][ T3940] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=3940 comm=syz.0.109 [ 112.145458][ T29] audit: type=1400 audit(112.070:123): avc: denied { create } for pid=3941 comm="syz.0.110" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 112.150198][ T29] audit: type=1400 audit(112.070:124): avc: denied { bind } for pid=3941 comm="syz.0.110" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 112.155397][ T29] audit: type=1400 audit(112.080:125): avc: denied { setopt } for pid=3941 comm="syz.0.110" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 112.725506][ T3955] Zero length message leads to an empty skb [ 116.448677][ T29] kauditd_printk_skb: 3 callbacks suppressed [ 116.450344][ T29] audit: type=1400 audit(116.370:129): avc: denied { prog_load } for pid=4001 comm="syz.0.137" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 116.451879][ T29] audit: type=1400 audit(116.370:130): avc: denied { bpf } for pid=4001 comm="syz.0.137" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 116.463711][ T29] audit: type=1400 audit(116.380:131): avc: denied { map_create } for pid=4001 comm="syz.0.137" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 116.468513][ T29] audit: type=1400 audit(116.390:132): avc: denied { map_read map_write } for pid=4001 comm="syz.0.137" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 116.477570][ T29] audit: type=1400 audit(116.400:133): avc: denied { perfmon } for pid=4001 comm="syz.0.137" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 116.514867][ T29] audit: type=1400 audit(116.440:134): avc: denied { prog_run } for pid=4001 comm="syz.0.137" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 122.465190][ T29] audit: type=1400 audit(122.390:135): avc: denied { create } for pid=4048 comm="syz.1.160" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 122.496167][ T29] audit: type=1400 audit(122.420:136): avc: denied { write } for pid=4048 comm="syz.1.160" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 122.941950][ T29] audit: type=1400 audit(122.860:137): avc: denied { read } for pid=4057 comm="syz.1.164" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 124.097155][ T4078] SELinux: Context system_u:object_r:hald_cache_t:s0 is not valid (left unmapped). [ 124.098598][ T29] audit: type=1400 audit(124.020:138): avc: denied { relabelto } for pid=4077 comm="syz.0.173" name="pcmC0D0p" dev="devtmpfs" ino=723 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:hald_cache_t:s0" [ 124.101386][ T29] audit: type=1400 audit(124.020:139): avc: denied { associate } for pid=4077 comm="syz.0.173" name="pcmC0D0p" dev="devtmpfs" ino=723 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:device_t tclass=filesystem permissive=1 srawcon="system_u:object_r:hald_cache_t:s0" [ 126.457184][ T4101] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=5133 sclass=netlink_audit_socket pid=4101 comm=syz.1.183 [ 127.971076][ T29] audit: type=1400 audit(127.890:140): avc: denied { ioctl } for pid=4146 comm="syz.0.205" path="socket:[3034]" dev="sockfs" ino=3034 ioctlcmd=0x8942 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 133.280624][ T29] audit: type=1400 audit(133.200:141): avc: denied { view } for pid=4193 comm="syz.1.223" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 134.623220][ T29] audit: type=1400 audit(134.540:142): avc: denied { create } for pid=4217 comm="syz.0.235" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 134.629246][ T29] audit: type=1400 audit(134.550:143): avc: denied { connect } for pid=4217 comm="syz.0.235" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 135.140094][ T29] audit: type=1400 audit(135.060:144): avc: denied { write } for pid=4217 comm="syz.0.235" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 137.207755][ T29] audit: type=1400 audit(137.130:145): avc: denied { write } for pid=4255 comm="syz.0.252" name="arp" dev="proc" ino=4026532751 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 138.470975][ T29] audit: type=1400 audit(138.390:146): avc: denied { create } for pid=4266 comm="syz.0.257" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 138.488632][ T29] audit: type=1400 audit(138.410:147): avc: denied { ioctl } for pid=4266 comm="syz.0.257" path="socket:[5190]" dev="sockfs" ino=5190 ioctlcmd=0x8982 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 139.199748][ T29] audit: type=1400 audit(139.120:148): avc: denied { ioctl } for pid=4292 comm="syz.1.268" path="socket:[4313]" dev="sockfs" ino=4313 ioctlcmd=0x5002 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 139.411717][ T29] audit: type=1400 audit(139.330:149): avc: denied { ioctl } for pid=4300 comm="syz.1.272" path="socket:[5244]" dev="sockfs" ino=5244 ioctlcmd=0x8982 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 145.133590][ T44] usb 2-1: new high-speed USB device number 2 using dummy_hcd [ 145.289883][ T44] usb 2-1: config 1 interface 0 altsetting 127 bulk endpoint 0x81 has invalid maxpacket 64 [ 145.290637][ T44] usb 2-1: config 1 interface 0 altsetting 127 bulk endpoint 0x2 has invalid maxpacket 32 [ 145.291053][ T44] usb 2-1: config 1 interface 0 has no altsetting 0 [ 145.300536][ T44] usb 2-1: New USB device found, idVendor=0bda, idProduct=8150, bcdDevice= 0.40 [ 145.300758][ T44] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 145.303840][ T44] usb 2-1: Product: syz [ 145.304626][ T44] usb 2-1: Manufacturer: syz [ 145.304677][ T44] usb 2-1: SerialNumber: syz [ 145.314311][ T4390] raw-gadget.0 gadget.1: fail, usb_ep_enable returned -22 [ 145.319289][ T4390] raw-gadget.0 gadget.1: fail, usb_ep_enable returned -22 [ 146.363156][ T44] (unnamed net_device) (uninitialized): Assigned a random MAC address: ee:7f:e9:1c:80:3d [ 146.387430][ T44] rtl8150 2-1:1.0: eth1: rtl8150 is detected [ 146.405660][ T44] usb 2-1: USB disconnect, device number 2 [ 147.874657][ T4451] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4451 comm=syz.1.324 [ 148.169764][ T29] audit: type=1400 audit(148.090:150): avc: denied { write } for pid=4455 comm="syz.1.326" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 148.180157][ T29] audit: type=1400 audit(148.100:151): avc: denied { ioctl } for pid=4455 comm="syz.1.326" path="socket:[5424]" dev="sockfs" ino=5424 ioctlcmd=0x8982 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 149.340330][ T29] audit: type=1400 audit(149.260:152): avc: denied { mount } for pid=4475 comm="syz.1.333" name="/" dev="sysfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=filesystem permissive=1 [ 151.527933][ T29] audit: type=1400 audit(151.450:153): avc: denied { read } for pid=4518 comm="syz.0.353" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 153.426560][ T29] audit: type=1400 audit(153.350:154): avc: denied { read } for pid=4541 comm="syz.1.364" name="binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 153.430004][ T29] audit: type=1400 audit(153.350:155): avc: denied { open } for pid=4541 comm="syz.1.364" path="/dev/binderfs/binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 154.104221][ T29] audit: type=1400 audit(154.020:156): avc: denied { block_suspend } for pid=4545 comm="syz.0.366" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 154.761723][ T29] audit: type=1400 audit(154.680:157): avc: denied { ioctl } for pid=4567 comm="syz.1.374" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=4751 ioctlcmd=0xaa3f scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 155.189700][ T29] audit: type=1400 audit(155.110:158): avc: denied { ioctl } for pid=4582 comm="syz.0.381" path="socket:[5627]" dev="sockfs" ino=5627 ioctlcmd=0x8904 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 168.900685][ T29] audit: type=1400 audit(168.820:159): avc: denied { nlmsg_write } for pid=4736 comm="syz.1.447" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 170.846854][ T4746] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4746 comm=syz.0.451 [ 171.232916][ T29] audit: type=1400 audit(171.150:160): avc: denied { map } for pid=4738 comm="syz.1.448" path="pipe:[5876]" dev="pipefs" ino=5876 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=1 [ 173.179715][ T29] audit: type=1400 audit(173.100:161): avc: denied { associate } for pid=4760 comm="syz.0.458" name="uts" scontext=root:object_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 178.275920][ T4807] netlink: 40 bytes leftover after parsing attributes in process `syz.0.477'. [ 183.378340][ T29] audit: type=1400 audit(183.300:162): avc: denied { connect } for pid=4877 comm="syz.1.509" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 185.544776][ T4919] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=259 sclass=netlink_tcpdiag_socket pid=4919 comm=syz.1.529 [ 188.634147][ T29] audit: type=1400 audit(188.550:163): avc: denied { ioctl } for pid=4961 comm="syz.1.549" path="socket:[6422]" dev="sockfs" ino=6422 ioctlcmd=0x4805 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 196.992112][ T5054] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5054 comm=syz.0.594 [ 199.628829][ T5098] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=5098 comm=syz.1.615 [ 203.068397][ T5156] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5156 comm=syz.1.641 [ 203.226037][ T5160] capability: warning: `syz.1.643' uses deprecated v2 capabilities in a way that may be insecure [ 208.101019][ T29] audit: type=1400 audit(208.020:164): avc: denied { create } for pid=5210 comm="syz.1.665" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 208.113463][ T29] audit: type=1400 audit(208.030:165): avc: denied { connect } for pid=5210 comm="syz.1.665" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 208.889119][ T5225] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5225 comm=syz.1.671 [ 214.049739][ T5283] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5283 comm=syz.0.694 [ 214.709676][ T5309] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5309 comm=syz.1.706 [ 216.009226][ T29] audit: type=1400 audit(215.930:166): avc: denied { read } for pid=5335 comm="syz.0.717" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 220.065758][ T5377] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5377 comm=syz.1.733 [ 223.139381][ T5409] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5409 comm=syz.0.748 [ 231.357824][ T29] audit: type=1400 audit(231.280:167): avc: denied { ioctl } for pid=5480 comm="syz.1.781" path="/dev/binderfs/binder0" dev="binder" ino=4 ioctlcmd=0x6205 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 233.394352][ T5481] binder: 5480:5481 ioctl c0306201 20001a80 returned -14 [ 237.362028][ T29] audit: type=1400 audit(237.280:168): avc: denied { watch watch_reads } for pid=5565 comm="syz.0.820" path="pipe:[528]" dev="pipefs" ino=528 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=1 [ 239.539965][ T29] audit: type=1400 audit(239.460:169): avc: denied { watch_reads } for pid=5597 comm="syz.1.834" path="/427" dev="tmpfs" ino=2239 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 244.235937][ T29] audit: type=1400 audit(244.160:170): avc: denied { create } for pid=5688 comm="syz.1.874" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 244.239321][ T29] audit: type=1400 audit(244.160:171): avc: denied { ioctl } for pid=5688 comm="syz.1.874" path="socket:[8706]" dev="sockfs" ino=8706 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 245.239275][ T5704] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5704 comm=syz.0.880 [ 254.763021][ T29] audit: type=1400 audit(254.680:172): avc: denied { name_bind } for pid=5830 comm="syz.0.939" src=20004 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 255.070340][ T29] audit: type=1400 audit(254.990:173): avc: denied { ioctl } for pid=5836 comm="syz.0.942" path="socket:[9796]" dev="sockfs" ino=9796 ioctlcmd=0x3e03 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 262.161781][ T29] audit: type=1400 audit(262.080:174): avc: denied { bind } for pid=5923 comm="syz.0.982" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 267.045293][ T29] audit: type=1400 audit(266.970:175): avc: denied { mount } for pid=6012 comm="syz.0.1026" name="/" dev="ramfs" ino=10336 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 267.332147][ T29] audit: type=1400 audit(267.250:176): avc: denied { map } for pid=6027 comm="syz.1.1033" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=10107 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 267.345146][ T29] audit: type=1400 audit(267.260:177): avc: denied { read write } for pid=6027 comm="syz.1.1033" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=10107 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 269.851152][ T29] audit: type=1400 audit(269.770:178): avc: denied { unmount } for pid=3096 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=filesystem permissive=1 [ 278.782697][ C1] hrtimer: interrupt took 2721728 ns [ 281.276217][ T6202] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=6202 comm=syz.1.1113 [ 283.478394][ T29] audit: type=1400 audit(283.400:179): avc: denied { setattr } for pid=6222 comm="syz.1.1122" name="" dev="pipefs" ino=531 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=1 [ 287.533663][ T29] audit: type=1400 audit(287.450:180): avc: denied { mounton } for pid=6250 comm="syz.1.1137" path="/proc/1238/task" dev="proc" ino=10749 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 290.084264][ T6273] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 290.169054][ T29] audit: type=1400 audit(290.090:181): avc: denied { setopt } for pid=6274 comm="syz.0.1147" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 300.475097][ T6371] binder: 6369:6371 ioctl c0306201 20001a80 returned -14 [ 306.189457][ T6443] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=6443 comm=syz.1.1224 [ 309.137778][ T6489] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=6489 comm=syz.0.1245 [ 319.075321][ T6555] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=6555 comm=syz.0.1272 [ 319.461045][ T6571] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6571 comm=syz.1.1284 [ 324.129293][ T6628] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=6628 comm=syz.0.1307 [ 334.109738][ T6706] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=6706 comm=syz.0.1337 [ 338.706010][ T6765] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=6765 comm=syz.0.1363 [ 342.146257][ T6808] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=6808 comm=syz.1.1384 [ 345.228668][ T6868] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=6868 comm=syz.1.1413 [ 367.874090][ T7184] SELinux: Context system_u:object_r:v4l_device_t:s0 is not valid (left unmapped). [ 367.875805][ T29] audit: type=1400 audit(367.800:182): avc: denied { relabelto } for pid=7182 comm="syz.0.1558" name="userio" dev="devtmpfs" ino=694 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:v4l_device_t:s0" [ 367.877793][ T29] audit: type=1400 audit(367.800:183): avc: denied { associate } for pid=7182 comm="syz.0.1558" name="userio" dev="devtmpfs" ino=694 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:device_t tclass=filesystem permissive=1 srawcon="system_u:object_r:v4l_device_t:s0" [ 371.156636][ T29] audit: type=1400 audit(371.080:184): avc: denied { relabelfrom } for pid=7194 comm="syz.0.1563" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 371.157273][ T29] audit: type=1400 audit(371.080:185): avc: denied { relabelto } for pid=7194 comm="syz.0.1563" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 385.390615][ T7375] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=7375 comm=syz.1.1643 [ 391.134363][ T29] audit: type=1400 audit(391.060:186): avc: denied { append } for pid=7454 comm="syz.1.1675" name="pcmC0D0p" dev="devtmpfs" ino=723 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:hald_cache_t:s0" [ 391.136948][ T29] audit: type=1400 audit(391.060:187): avc: denied { open } for pid=7454 comm="syz.1.1675" path="/dev/snd/pcmC0D0p" dev="devtmpfs" ino=723 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:hald_cache_t:s0" [ 391.139406][ T29] audit: type=1400 audit(391.060:188): avc: denied { ioctl } for pid=7454 comm="syz.1.1675" path="/dev/snd/pcmC0D0p" dev="devtmpfs" ino=723 ioctlcmd=0x4120 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:hald_cache_t:s0" [ 393.464350][ T7484] faux_driver vkms: [drm] Unknown color mode 259; guessing buffer size. [ 396.146496][ T29] audit: type=1400 audit(396.070:189): avc: denied { remount } for pid=7521 comm="syz.1.1706" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 397.243643][ T29] audit: type=1400 audit(397.170:190): avc: denied { remount } for pid=7545 comm="syz.1.1716" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 399.034344][ T7598] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=5125 sclass=netlink_audit_socket pid=7598 comm=syz.1.1741 [ 399.128362][ T7604] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=7604 comm=syz.0.1744 [ 399.349911][ T29] audit: type=1400 audit(399.270:191): avc: denied { nlmsg_read } for pid=7613 comm="syz.0.1749" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 399.986603][ T7635] capability: warning: `syz.0.1759' uses 32-bit capabilities (legacy support in use) [ 858.282917][ C1] watchdog: BUG: soft lockup - CPU#1 stuck for 430s! [swapper/1:0] [ 858.283255][ C1] Modules linked in: [ 858.284390][ C1] CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Tainted: G L syzkaller #0 PREEMPT [ 858.284700][ C1] Tainted: [L]=SOFTLOCKUP [ 858.284748][ C1] Hardware name: ARM-Versatile Express [ 858.285028][ C1] PC is at _raw_spin_lock+0x40/0x58 [ 858.285234][ C1] LR is at _raw_spin_lock+0x18/0x58 [ 858.285289][ C1] pc : [<81abbef4>] lr : [<81abbecc>] psr: 80000113 [ 858.285331][ C1] sp : df805d68 ip : df805d68 fp : df805d7c [ 858.285369][ C1] r10: 81c05450 r9 : 840f9840 r8 : 83e62288 [ 858.285409][ C1] r7 : 840f9968 r6 : 00000000 r5 : 00000001 r4 : 840f9968 [ 858.285462][ C1] r3 : 00004ca2 r2 : 00004ca3 r1 : 00000000 r0 : 00000001 [ 858.285593][ C1] Flags: Nzcv IRQs on FIQs on Mode SVC_32 ISA ARM Segment none [ 858.285679][ C1] Control: 30c5387d Table: 855f3640 DAC: 00000000 [ 858.285786][ C1] Call trace: frame pointer underflow [ 858.286134][ C1] [<81abbeb4>] (_raw_spin_lock) from [<809c7a2c>] (gpio_mmio_set+0x44/0x80) [ 858.286436][ C1] r5:00000001 r4:840f9840 [ 858.286539][ C1] [<809c79e8>] (gpio_mmio_set) from [<809b81e8>] (gpiochip_set+0x1c/0x44) [ 858.286624][ C1] r7:00000000 r6:00000000 r5:00000000 r4:83fa3b40 [ 858.286647][ C1] [<809b81cc>] (gpiochip_set) from [<809baab0>] (gpiod_set_raw_value_commit+0x78/0x218) [ 858.286707][ C1] [<809baa38>] (gpiod_set_raw_value_commit) from [<809bc350>] (gpiod_set_value_nocheck+0x44/0x58) [ 858.286812][ C1] r10:81c05450 r9:df805ebc r8:00000102 r7:0000274e r6:00000028 r5:00000000 [ 858.286852][ C1] r4:83fa3b40 [ 858.286873][ C1] [<809bc30c>] (gpiod_set_value_nocheck) from [<809bc3a0>] (gpiod_set_value+0x3c/0x88) [ 858.286936][ C1] [<809bc364>] (gpiod_set_value) from [<809ccb3c>] (gpio_led_set+0x5c/0x60) [ 858.287018][ C1] r5:83e20844 r4:83e20844 [ 858.287038][ C1] [<809ccae0>] (gpio_led_set) from [<809ca3d4>] (led_set_brightness_nosleep+0x38/0x44) [ 858.287107][ C1] r5:83e20844 r4:838a56cc [ 858.287127][ C1] [<809ca39c>] (led_set_brightness_nosleep) from [<809cd438>] (led_heartbeat_function+0x84/0x144) [ 858.287189][ C1] [<809cd3b4>] (led_heartbeat_function) from [<80327070>] (call_timer_fn+0x30/0x220) [ 858.287271][ C1] r7:0000274e r6:809cd3b4 r5:838a56cc r4:83216000 [ 858.287294][ C1] [<80327040>] (call_timer_fn) from [<80327524>] (__run_timers+0x2c4/0x3f8) [ 858.287374][ C1] r9:df805ebc r8:0000274e r7:00000000 r6:809cd3b4 r5:dddd9f00 r4:838a56cc [ 858.287398][ C1] [<80327260>] (__run_timers) from [<803276c0>] (run_timer_base+0x68/0x78) [ 858.287478][ C1] r10:83216000 r9:82804d80 r8:00000102 r7:00000001 r6:00000082 r5:00000002 [ 858.287505][ C1] r4:dddd9f00 [ 858.287524][ C1] [<80327658>] (run_timer_base) from [<803276ec>] (run_timer_softirq+0x1c/0x34) [ 858.287591][ C1] r4:82804084 [ 858.287610][ C1] [<803276d0>] (run_timer_softirq) from [<8025b65c>] (handle_softirqs+0x140/0x458) [ 858.287675][ C1] [<8025b51c>] (handle_softirqs) from [<8025bad0>] (__irq_exit_rcu+0x110/0x1d0) [ 858.287754][ C1] r10:00000000 r9:83216000 r8:00000000 r7:df865e08 r6:82443f98 r5:8247f0cc [ 858.287781][ C1] r4:83216000 [ 858.287801][ C1] [<8025b9c0>] (__irq_exit_rcu) from [<8025be48>] (irq_exit+0x10/0x18) [ 858.287871][ C1] r5:8247f0cc r4:826c3a9c [ 858.287888][ C1] [<8025be38>] (irq_exit) from [<81aad964>] (generic_handle_arch_irq+0x7c/0x80) [ 858.287959][ C1] [<81aad8e8>] (generic_handle_arch_irq) from [<81a7d904>] (call_with_stack+0x1c/0x20) [ 858.288048][ C1] r9:83216000 r8:83e62288 r7:df865e3c r6:ffffffff r5:60000013 r4:809c822c [ 858.288070][ C1] [<81a7d8e8>] (call_with_stack) from [<80200bec>] (__irq_svc+0x8c/0xbc) [ 858.288215][ C1] Exception stack(0xdf865e08 to 0xdf865e50) [ 858.288425][ C1] 5e00: e031d008 0000000d 00004ca2 00000000 e031d008 0000000d [ 858.288493][ C1] 5e20: 00000001 840f9968 83e62288 840f9840 00000000 df865e6c df865e58 df865e58 [ 858.288526][ C1] 5e40: 809c8228 809c822c 60000013 ffffffff [ 858.288595][ C1] [<809c820c>] (gpio_mmio_write32) from [<809c7a4c>] (gpio_mmio_set+0x64/0x80) [ 858.288675][ C1] r5:00000008 r4:840f9840 [ 858.288701][ C1] [<809c79e8>] (gpio_mmio_set) from [<809b81e8>] (gpiochip_set+0x1c/0x44) [ 858.288779][ C1] r7:00000001 r6:00000000 r5:00000003 r4:83fa3b7c [ 858.288800][ C1] [<809b81cc>] (gpiochip_set) from [<809baab0>] (gpiod_set_raw_value_commit+0x78/0x218) [ 858.288869][ C1] [<809baa38>] (gpiod_set_raw_value_commit) from [<809bc350>] (gpiod_set_value_nocheck+0x44/0x58) [ 858.288944][ C1] r10:00000000 r9:00000000 r8:00000001 r7:ddde24c0 r6:838dbc98 r5:00000001 [ 858.288977][ C1] r4:83fa3b7c [ 858.288993][ C1] [<809bc30c>] (gpiod_set_value_nocheck) from [<809bc3a0>] (gpiod_set_value+0x3c/0x88) [ 858.289053][ C1] [<809bc364>] (gpiod_set_value) from [<809ccb3c>] (gpio_led_set+0x5c/0x60) [ 858.289114][ C1] r5:000000ff r4:83e20b14 [ 858.289132][ C1] [<809ccae0>] (gpio_led_set) from [<809ca464>] (led_set_brightness+0x84/0x90) [ 858.289195][ C1] r5:000000ff r4:83e20b14 [ 858.289218][ C1] [<809ca3e0>] (led_set_brightness) from [<809cbfe4>] (led_trigger_event+0x40/0x58) [ 858.289283][ C1] r5:000000ff r4:83e20b14 [ 858.289305][ C1] [<809cbfa4>] (led_trigger_event) from [<809cd640>] (ledtrig_cpu+0xac/0xf4) [ 858.289377][ C1] r7:ddde24c0 r6:00000002 r5:82b15cd8 r4:000001fd [ 858.289402][ C1] [<809cd594>] (ledtrig_cpu) from [<80227a38>] (arch_cpu_idle_exit+0x14/0x18) [ 858.289486][ C1] r9:00000000 r8:00000001 r7:8280c710 r6:83216000 r5:8280c6d0 r4:00000001 [ 858.289511][ C1] [<80227a24>] (arch_cpu_idle_exit) from [<802b168c>] (do_idle+0x5c/0x2d8) [ 858.289581][ C1] [<802b1630>] (do_idle) from [<802b1c38>] (cpu_startup_entry+0x30/0x34) [ 858.289666][ C1] r10:00000000 r9:414fc0f0 r8:80003000 r7:82a7b4a4 r6:83216000 r5:00000001 [ 858.289693][ C1] r4:00000092 [ 858.289712][ C1] [<802b1c08>] (cpu_startup_entry) from [<8022f360>] (secondary_start_kernel+0x128/0x194) [ 858.289784][ C1] [<8022f238>] (secondary_start_kernel) from [<80220094>] (__enable_mmu+0x0/0xc) [ 858.289866][ C1] r7:82a7b4a4 r6:30c0387d r5:00000000 r4:830b7bc0 [ 858.290213][ C1] Sending NMI from CPU 1 to CPUs 0: [ 868.317038][ C1] Kernel panic - not syncing: softlockup: hung tasks [ 868.337464][ C1] CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Tainted: G L syzkaller #0 PREEMPT [ 868.337853][ C1] Tainted: [L]=SOFTLOCKUP [ 868.338022][ C1] Hardware name: ARM-Versatile Express [ 868.338239][ C1] Call trace: frame pointer underflow [ 868.338602][ C1] [<80201a74>] (dump_backtrace) from [<80201b70>] (show_stack+0x18/0x1c) [ 868.339004][ C1] r7:822965a4 r6:83216000 r5:00000000 r4:82295754 [ 868.339235][ C1] [<80201b58>] (show_stack) from [<8021ee08>] (dump_stack_lvl+0x54/0x7c) [ 868.339538][ C1] [<8021edb4>] (dump_stack_lvl) from [<8021ee48>] (dump_stack+0x18/0x1c) [ 868.339852][ C1] r5:00000000 r4:82a7bd14 [ 868.340014][ C1] [<8021ee30>] (dump_stack) from [<80202648>] (vpanic+0xe0/0x2e8) [ 868.340290][ C1] [<80202568>] (vpanic) from [<80202884>] (trace_suspend_resume+0x0/0xd8) [ 868.340565][ C1] r7:82ac27f8 [ 868.340701][ C1] [<80202850>] (panic) from [<80383fcc>] (watchdog_timer_fn+0x2dc/0x350) [ 868.341012][ C1] r3:00000001 r2:00004000 r1:82a7bd1c r0:822965a4 [ 868.341214][ C1] [<80383cf0>] (watchdog_timer_fn) from [<80329c64>] (__hrtimer_run_queues+0x1c4/0x454) [ 868.341558][ C1] r10:83216000 r9:00000000 r8:ddddb130 r7:80383cf0 r6:ddddb000 r5:ddddb040 [ 868.341829][ C1] r4:ddddb5d8 [ 868.341972][ C1] [<80329aa0>] (__hrtimer_run_queues) from [<8032b268>] (hrtimer_interrupt+0x148/0x2bc) [ 868.342313][ C1] r10:d14f65e0 r9:ddddb180 r8:ddddb130 r7:000000c7 r6:00000003 r5:20000193 [ 868.342564][ C1] r4:ddddb000 [ 868.342692][ C1] [<8032b120>] (hrtimer_interrupt) from [<813408e0>] (arch_timer_handler_virt+0x30/0x38) [ 868.343086][ C1] r10:81d0fc78 r9:8309e400 r8:00000000 r7:00000001 r6:00000001 r5:82498528 [ 868.343338][ C1] r4:8309de40 [ 868.343764][ C1] [<813408b0>] (arch_timer_handler_virt) from [<802efab4>] (handle_percpu_devid_irq+0x128/0x34c) [ 868.344130][ C1] [<802ef98c>] (handle_percpu_devid_irq) from [<802e8c44>] (handle_irq_desc+0x74/0x84) [ 868.344607][ C1] r10:81c05450 r9:83216000 r8:00000000 r7:df80a00c r6:826c2388 r5:df80a000 [ 868.344910][ C1] r4:8280cc44 [ 868.345065][ C1] [<802e8bd0>] (handle_irq_desc) from [<802e8cc0>] (generic_handle_domain_irq+0x18/0x1c) [ 868.345427][ C1] [<802e8ca8>] (generic_handle_domain_irq) from [<802012c8>] (gic_handle_irq+0x68/0x7c) [ 868.345768][ C1] [<80201260>] (gic_handle_irq) from [<81aad948>] (generic_handle_arch_irq+0x60/0x80) [ 868.346110][ C1] r7:df805d18 r6:82443f98 r5:8247f0cc r4:826c3a9c [ 868.346318][ C1] [<81aad8e8>] (generic_handle_arch_irq) from [<80200bdc>] (__irq_svc+0x7c/0xbc) [ 868.346615][ C1] Exception stack(0xdf805d18 to 0xdf805d60) [ 868.346861][ C1] 5d00: 00000001 00000000 [ 868.347132][ C1] 5d20: 00004ca3 00004ca2 840f9968 00000001 00000000 840f9968 83e62288 840f9840 [ 868.347394][ C1] 5d40: 81c05450 df805d7c df805d68 df805d68 81abbecc 81abbef4 80000113 ffffffff [ 868.347666][ C1] r9:83216000 r8:83e62288 r7:df805d4c r6:ffffffff r5:80000113 r4:81abbef4 [ 868.347899][ C1] [<81abbeb4>] (_raw_spin_lock) from [<809c7a2c>] (gpio_mmio_set+0x44/0x80) [ 868.348220][ C1] r5:00000001 r4:840f9840 [ 868.348375][ C1] [<809c79e8>] (gpio_mmio_set) from [<809b81e8>] (gpiochip_set+0x1c/0x44) [ 868.348784][ C1] r7:00000000 r6:00000000 r5:00000000 r4:83fa3b40 [ 868.349011][ C1] [<809b81cc>] (gpiochip_set) from [<809baab0>] (gpiod_set_raw_value_commit+0x78/0x218) [ 868.349328][ C1] [<809baa38>] (gpiod_set_raw_value_commit) from [<809bc350>] (gpiod_set_value_nocheck+0x44/0x58) [ 868.349690][ C1] r10:81c05450 r9:df805ebc r8:00000102 r7:0000274e r6:00000028 r5:00000000 [ 868.349952][ C1] r4:83fa3b40 [ 868.350094][ C1] [<809bc30c>] (gpiod_set_value_nocheck) from [<809bc3a0>] (gpiod_set_value+0x3c/0x88) [ 868.350408][ C1] [<809bc364>] (gpiod_set_value) from [<809ccb3c>] (gpio_led_set+0x5c/0x60) [ 868.350716][ C1] r5:83e20844 r4:83e20844 [ 868.350916][ C1] [<809ccae0>] (gpio_led_set) from [<809ca3d4>] (led_set_brightness_nosleep+0x38/0x44) [ 868.351241][ C1] r5:83e20844 r4:838a56cc [ 868.351404][ C1] [<809ca39c>] (led_set_brightness_nosleep) from [<809cd438>] (led_heartbeat_function+0x84/0x144) [ 868.351746][ C1] [<809cd3b4>] (led_heartbeat_function) from [<80327070>] (call_timer_fn+0x30/0x220) [ 868.352086][ C1] r7:0000274e r6:809cd3b4 r5:838a56cc r4:83216000 [ 868.352482][ C1] [<80327040>] (call_timer_fn) from [<80327524>] (__run_timers+0x2c4/0x3f8) [ 868.352827][ C1] r9:df805ebc r8:0000274e r7:00000000 r6:809cd3b4 r5:dddd9f00 r4:838a56cc [ 868.353150][ C1] [<80327260>] (__run_timers) from [<803276c0>] (run_timer_base+0x68/0x78) [ 868.353460][ C1] r10:83216000 r9:82804d80 r8:00000102 r7:00000001 r6:00000082 r5:00000002 [ 868.353716][ C1] r4:dddd9f00 [ 868.353871][ C1] [<80327658>] (run_timer_base) from [<803276ec>] (run_timer_softirq+0x1c/0x34) [ 868.354191][ C1] r4:82804084 [ 868.354329][ C1] [<803276d0>] (run_timer_softirq) from [<8025b65c>] (handle_softirqs+0x140/0x458) [ 868.354648][ C1] [<8025b51c>] (handle_softirqs) from [<8025bad0>] (__irq_exit_rcu+0x110/0x1d0) [ 868.355024][ C1] r10:00000000 r9:83216000 r8:00000000 r7:df865e08 r6:82443f98 r5:8247f0cc [ 868.355284][ C1] r4:83216000 [ 868.355421][ C1] [<8025b9c0>] (__irq_exit_rcu) from [<8025be48>] (irq_exit+0x10/0x18) [ 868.355710][ C1] r5:8247f0cc r4:826c3a9c [ 868.355898][ C1] [<8025be38>] (irq_exit) from [<81aad964>] (generic_handle_arch_irq+0x7c/0x80) [ 868.356224][ C1] [<81aad8e8>] (generic_handle_arch_irq) from [<81a7d904>] (call_with_stack+0x1c/0x20) [ 868.356561][ C1] r9:83216000 r8:83e62288 r7:df865e3c r6:ffffffff r5:60000013 r4:809c822c [ 868.356816][ C1] [<81a7d8e8>] (call_with_stack) from [<80200bec>] (__irq_svc+0x8c/0xbc) [ 868.357092][ C1] Exception stack(0xdf865e08 to 0xdf865e50) [ 868.357378][ C1] 5e00: e031d008 0000000d 00004ca2 00000000 e031d008 0000000d [ 868.357648][ C1] 5e20: 00000001 840f9968 83e62288 840f9840 00000000 df865e6c df865e58 df865e58 [ 868.357942][ C1] 5e40: 809c8228 809c822c 60000013 ffffffff [ 868.358154][ C1] [<809c820c>] (gpio_mmio_write32) from [<809c7a4c>] (gpio_mmio_set+0x64/0x80) [ 868.358478][ C1] r5:00000008 r4:840f9840 [ 868.358638][ C1] [<809c79e8>] (gpio_mmio_set) from [<809b81e8>] (gpiochip_set+0x1c/0x44) [ 868.359047][ C1] r7:00000001 r6:00000000 r5:00000003 r4:83fa3b7c [ 868.359226][ C1] [<809b81cc>] (gpiochip_set) from [<809baab0>] (gpiod_set_raw_value_commit+0x78/0x218) [ 868.359549][ C1] [<809baa38>] (gpiod_set_raw_value_commit) from [<809bc350>] (gpiod_set_value_nocheck+0x44/0x58) [ 868.359906][ C1] r10:00000000 r9:00000000 r8:00000001 r7:ddde24c0 r6:838dbc98 r5:00000001 [ 868.360201][ C1] r4:83fa3b7c [ 868.360341][ C1] [<809bc30c>] (gpiod_set_value_nocheck) from [<809bc3a0>] (gpiod_set_value+0x3c/0x88) [ 868.360668][ C1] [<809bc364>] (gpiod_set_value) from [<809ccb3c>] (gpio_led_set+0x5c/0x60) [ 868.360985][ C1] r5:000000ff r4:83e20b14 [ 868.361148][ C1] [<809ccae0>] (gpio_led_set) from [<809ca464>] (led_set_brightness+0x84/0x90) [ 868.361464][ C1] r5:000000ff r4:83e20b14 [ 868.361626][ C1] [<809ca3e0>] (led_set_brightness) from [<809cbfe4>] (led_trigger_event+0x40/0x58) [ 868.361953][ C1] r5:000000ff r4:83e20b14 [ 868.362126][ C1] [<809cbfa4>] (led_trigger_event) from [<809cd640>] (ledtrig_cpu+0xac/0xf4) [ 868.362441][ C1] r7:ddde24c0 r6:00000002 r5:82b15cd8 r4:000001fd [ 868.362652][ C1] [<809cd594>] (ledtrig_cpu) from [<80227a38>] (arch_cpu_idle_exit+0x14/0x18) [ 868.363023][ C1] r9:00000000 r8:00000001 r7:8280c710 r6:83216000 r5:8280c6d0 r4:00000001 [ 868.363293][ C1] [<80227a24>] (arch_cpu_idle_exit) from [<802b168c>] (do_idle+0x5c/0x2d8) [ 868.363623][ C1] [<802b1630>] (do_idle) from [<802b1c38>] (cpu_startup_entry+0x30/0x34) [ 868.363943][ C1] r10:00000000 r9:414fc0f0 r8:80003000 r7:82a7b4a4 r6:83216000 r5:00000001 [ 868.364224][ C1] r4:00000092 [ 868.364373][ C1] [<802b1c08>] (cpu_startup_entry) from [<8022f360>] (secondary_start_kernel+0x128/0x194) [ 868.364716][ C1] [<8022f238>] (secondary_start_kernel) from [<80220094>] (__enable_mmu+0x0/0xc) [ 868.365055][ C1] r7:82a7b4a4 r6:30c0387d r5:00000000 r4:830b7bc0 [ 869.921594][ C1] SMP: failed to stop secondary CPUs [ 869.922889][ C1] Rebooting in 86400 seconds..