last executing test programs: 7m20.945202235s ago: executing program 0 (id=997): socketpair(0x1, 0x3, 0x0, &(0x7f0000001ec0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$NL80211_CMD_NOTIFY_RADAR(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) recvmsg$inet_nvme(r1, &(0x7f0000004700)={0x0, 0x0, 0x0}, 0x40) 7m20.872228445s ago: executing program 0 (id=999): r0 = openat$selinux_avc_hash_stats(0xffffff9c, &(0x7f0000000240), 0x0, 0x0) r1 = dup(r0) ioctl$TUNSETCARRIER(r1, 0x5450, 0x0) 7m20.803855003s ago: executing program 0 (id=1000): r0 = openat$vcs(0xffffff9c, &(0x7f0000000180), 0x900, 0x0) socket$nl_route(0x10, 0x3, 0x0) dup(r0) 7m20.744236551s ago: executing program 0 (id=1002): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) sendmsg$alg(r1, &(0x7f0000000740)={0x0, 0x0, 0x0}, 0x20002004) 7m20.653765762s ago: executing program 0 (id=1004): r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000080)={0x8}) openat2(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)={0x2040}, 0x18) 7m20.464723077s ago: executing program 0 (id=1006): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockname(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNGETFILTER(r0, 0x8910, &(0x7f0000000080)=""/93) 7m11.672153485s ago: executing program 1 (id=1010): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='freezer.self_freezing\x00', 0x275a, 0x0) r1 = ioctl$NS_GET_PARENT(r0, 0x5450, 0x0) ioctl$EXT4_IOC_MIGRATE(r1, 0x5450) 7m11.423934367s ago: executing program 1 (id=1011): socketpair(0x1, 0x3, 0x0, &(0x7f0000001ec0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$NL80211_CMD_NOTIFY_RADAR(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) recvmsg$inet_nvme(r1, &(0x7f0000004700)={0x0, 0x0, 0x0}, 0x40) 6m35.075141659s ago: executing program 32 (id=1006): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockname(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNGETFILTER(r0, 0x8910, &(0x7f0000000080)=""/93) 6m26.136891865s ago: executing program 1 (id=1016): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) sendmsg$alg(r1, &(0x7f0000000740)={0x0, 0x0, 0x0}, 0x20002004) 6m25.970618727s ago: executing program 1 (id=1018): openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) mprotect(&(0x7f0000000000/0x1000)=nil, 0x1000, 0xc) openat$ubi_ctrl(0xffffff9c, &(0x7f0000000000), 0xe0480, 0x0) 6m17.780257748s ago: executing program 1 (id=1015): r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000080)={0x8}) openat2(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)={0x2040}, 0x18) 6m17.607622199s ago: executing program 1 (id=1022): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup2(r0, r0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r1, &(0x7f0000001940)={0x5, 0x10, 0xfa00, {0x0, 0xffffffffffffffff, 0x2}}, 0x18) 5m32.176642667s ago: executing program 33 (id=1022): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup2(r0, r0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r1, &(0x7f0000001940)={0x5, 0x10, 0xfa00, {0x0, 0xffffffffffffffff, 0x2}}, 0x18) 2m59.784220584s ago: executing program 2 (id=2262): r0 = timerfd_create(0x0, 0x0) openat$tcp_mem(0xffffffffffffff9c, 0x0, 0x1, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x5451, 0x0) 2m59.694235036s ago: executing program 2 (id=2264): r0 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) r1 = dup(r0) sendmsg$RDMA_NLDEV_CMD_STAT_DEL(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) 2m59.601575988s ago: executing program 2 (id=2266): r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0), 0x1a1101, 0x0) r1 = dup(r0) ioctl$BTRFS_IOC_BALANCE_V2(r1, 0xc4009420, 0x0) 2m59.483999393s ago: executing program 2 (id=2267): mkdir(&(0x7f0000000280)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0x2) mount$fuse(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0xa6d214, 0x0) 2m59.415808051s ago: executing program 2 (id=2268): openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x20142, 0x0) mount(&(0x7f0000000040)=@filename='./file1\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x909000, 0x0) mount$tmpfs(0x0, &(0x7f00000012c0)='./file1\x00', 0x0, 0x300011, &(0x7f0000001340)) 2m59.213057587s ago: executing program 2 (id=2269): r0 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0) r1 = openat2$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)={0x40}, 0x18) fsconfig$FSCONFIG_SET_PATH(r0, 0x3, &(0x7f00000000c0)='\'!*,@{,)(\x00', &(0x7f0000000140)='./file0\x00', r1) 2m59.212935607s ago: executing program 34 (id=2269): r0 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0) r1 = openat2$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)={0x40}, 0x18) fsconfig$FSCONFIG_SET_PATH(r0, 0x3, &(0x7f00000000c0)='\'!*,@{,)(\x00', &(0x7f0000000140)='./file0\x00', r1) 2m51.79317308s ago: executing program 4 (id=2285): r0 = openat$mixer(0xffffff9c, &(0x7f0000000040), 0x580, 0x0) ioctl$DMA_HEAP_IOCTL_ALLOC(r0, 0xc0184800, &(0x7f0000000000)={0x0, r0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, 0x0) 2m51.700122922s ago: executing program 4 (id=2286): r0 = socket$nl_route(0x10, 0x3, 0x0) getpeername(r0, &(0x7f00000002c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, &(0x7f0000000040)=0x80) ioctl$TCSBRKP(r1, 0x5450, 0x0) 2m51.602600625s ago: executing program 4 (id=2287): r0 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/attr/exec\x00', 0x2, 0x0) socket$inet_mptcp(0x2, 0x1, 0x106) fcntl$addseals(r0, 0x406, 0x1f) 2m51.514738076s ago: executing program 4 (id=2288): mkdir(&(0x7f0000000280)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0x2) mount$fuse(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0xa6d214, 0x0) 2m51.442869095s ago: executing program 4 (id=2289): r0 = socket$unix(0x1, 0x1, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$F2FS_IOC_RELEASE_COMPRESS_BLOCKS(r0, 0x8901, &(0x7f00000000c0)) 2m51.213583434s ago: executing program 4 (id=2290): r0 = syz_open_procfs(0x0, &(0x7f0000000400)='status\x00') socketpair$unix(0x1, 0x2, 0x0, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x5421, &(0x7f0000000180)) 2m51.213424674s ago: executing program 35 (id=2290): r0 = syz_open_procfs(0x0, &(0x7f0000000400)='status\x00') socketpair$unix(0x1, 0x2, 0x0, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x5421, &(0x7f0000000180)) 1.346124779s ago: executing program 3 (id=3901): r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='oom_score_adj\x00') r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) tee(r0, r1, 0x0, 0x0) 1.141231675s ago: executing program 3 (id=3906): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) shutdown(r0, 0x0) recvfrom$unix(r0, 0x0, 0x0, 0x40, &(0x7f0000000140)=@abs, 0x20000000) 926.017642ms ago: executing program 3 (id=3907): symlinkat(&(0x7f0000000180)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00') socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000180)=@file={0x1, './file0/file0\x00'}, 0x6e) 853.592762ms ago: executing program 3 (id=3908): r0 = creat(&(0x7f0000000100)='./file0\x00', 0x10) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340), 0x0, 0x0, 0x1) fsetxattr$trusted_overlay_origin(r0, &(0x7f00000004c0), &(0x7f0000000500), 0x2, 0x2) 753.276465ms ago: executing program 3 (id=3910): bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000500)={@map=0x1, 0x2e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='blkio.bfq.io_merged_recursive\x00', 0x275a, 0x0) sendfile(r0, r1, 0x0, 0x0) 642.046539ms ago: executing program 3 (id=3913): r0 = socket(0x2b, 0x1, 0x1) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000000)={@private1={0xfc, 0x1, '\x00', 0x1}}, 0x14) 443.256194ms ago: executing program 5 (id=3915): r0 = openat$audio1(0xffffffffffffff9c, &(0x7f0000000240), 0x103202, 0x0) ioctl$SNDCTL_DSP_SETFRAGMENT(r0, 0xc004500a, &(0x7f0000000040)=0x12) ioctl$SNDCTL_DSP_STEREO(r0, 0xc0045003, &(0x7f0000000000)) 350.663356ms ago: executing program 5 (id=3916): r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/crypto\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r0, 0x5452, &(0x7f00000020c0)={0x0, 0xaa, 0x0, 0x0, 0xffffffffffffffff}) ioctl$TCGETS2(r1, 0x5452, &(0x7f00000001c0)) 273.492215ms ago: executing program 5 (id=3917): r0 = syz_open_dev$I2C(&(0x7f0000000040), 0x0, 0x0) ioctl$I2C_PEC(r0, 0x708, 0xffffffff) ioctl$I2C_SMBUS(r0, 0x720, &(0x7f0000000100)={0x1, 0xfd, 0x1, &(0x7f0000000000)={0xb, "e89bc5d748e8290e3619f6201f98cad6d3bf3734cdb92f5963a07b61dedbd29410"}}) 174.556458ms ago: executing program 5 (id=3918): r0 = socket$nl_audit(0x10, 0x3, 0x9) r1 = dup(r0) sendmsg$NL80211_CMD_DEAUTHENTICATE(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)={0x28, 0x0, 0x100, 0x70bd2c, 0x25dfdbfc, {{}, {@val={0x8}, @val={0xc, 0x99, {0xc81f, 0x3}}}}}, 0x28}, 0x1, 0x0, 0x0, 0x1}, 0x40040c0) 70.662741ms ago: executing program 5 (id=3919): pipe2$9p(&(0x7f0000000040)={0xffffffffffffffff}, 0x0) r1 = ioctl$TUNGETDEVNETNS(r0, 0x5421, 0x20000000) write$P9_ROPEN(r1, 0x0, 0x0) 0s ago: executing program 5 (id=3920): r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_RX_RING(r0, 0x11b, 0x2, 0x0, 0x0) getsockopt$sock_linger(r0, 0x1, 0xd, 0x0, &(0x7f0000000580)) kernel console output (not intermixed with test programs): [ 48.199915][ T29] audit: type=1400 audit(48.100:56): avc: denied { read write } for pid=3090 comm="sftp-server" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 48.204022][ T29] audit: type=1400 audit(48.100:57): avc: denied { open } for pid=3090 comm="sftp-server" path="/dev/null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 Warning: Permanently added '[localhost]:36150' (ED25519) to the list of known hosts. [ 63.493388][ T29] audit: type=1400 audit(63.400:58): avc: denied { name_bind } for pid=3093 comm="sshd-session" src=30000 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 65.550532][ T29] audit: type=1400 audit(65.450:59): avc: denied { execute } for pid=3094 comm="sh" name="syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 65.565707][ T29] audit: type=1400 audit(65.460:60): avc: denied { execute_no_trans } for pid=3094 comm="sh" path="/syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 69.093951][ T29] audit: type=1400 audit(69.000:61): avc: denied { mounton } for pid=3094 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=806 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 69.099483][ T29] audit: type=1400 audit(69.000:62): avc: denied { mount } for pid=3094 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 69.116921][ T3094] cgroup: Unknown subsys name 'net' [ 69.126275][ T29] audit: type=1400 audit(69.030:63): avc: denied { unmount } for pid=3094 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 69.280770][ T3094] cgroup: Unknown subsys name 'cpuset' [ 69.287919][ T3094] cgroup: Unknown subsys name 'hugetlb' [ 69.288970][ T3094] cgroup: Unknown subsys name 'rlimit' [ 69.476248][ T29] audit: type=1400 audit(69.380:64): avc: denied { setattr } for pid=3094 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 69.478406][ T29] audit: type=1400 audit(69.380:65): avc: denied { mounton } for pid=3094 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 69.482999][ T29] audit: type=1400 audit(69.380:66): avc: denied { mount } for pid=3094 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 69.676968][ T3096] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 69.684376][ T29] audit: type=1400 audit(69.580:67): avc: denied { relabelto } for pid=3096 comm="mkswap" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 69.688815][ T29] audit: type=1400 audit(69.590:68): avc: denied { write } for pid=3096 comm="mkswap" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 69.736281][ T29] audit: type=1400 audit(69.640:69): avc: denied { read } for pid=3094 comm="syz-executor" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 69.738250][ T29] audit: type=1400 audit(69.640:70): avc: denied { open } for pid=3094 comm="syz-executor" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 77.874901][ T3094] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 79.858812][ T29] audit: type=1400 audit(79.760:71): avc: denied { execmem } for pid=3097 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 79.921355][ T29] audit: type=1400 audit(79.820:72): avc: denied { read } for pid=3099 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 79.924511][ T29] audit: type=1400 audit(79.820:73): avc: denied { open } for pid=3099 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 79.938882][ T29] audit: type=1400 audit(79.840:74): avc: denied { mounton } for pid=3099 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 79.958878][ T29] audit: type=1400 audit(79.860:75): avc: denied { module_request } for pid=3099 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 80.008032][ T29] audit: type=1400 audit(79.910:76): avc: denied { sys_module } for pid=3099 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 80.602971][ T29] audit: type=1400 audit(80.500:77): avc: denied { ioctl } for pid=3099 comm="syz-executor" path="/dev/net/tun" dev="devtmpfs" ino=677 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 81.715861][ T3099] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 81.728327][ T3099] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 81.817935][ T3100] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 81.821761][ T3100] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 82.543466][ T3099] hsr_slave_0: entered promiscuous mode [ 82.546567][ T3099] hsr_slave_1: entered promiscuous mode [ 82.621033][ T3100] hsr_slave_0: entered promiscuous mode [ 82.625207][ T3100] hsr_slave_1: entered promiscuous mode [ 82.626408][ T3100] debugfs: 'hsr0' already exists in 'hsr' [ 82.626949][ T3100] Cannot create hsr debugfs directory [ 83.079022][ T29] audit: type=1400 audit(82.980:78): avc: denied { create } for pid=3099 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 83.080602][ T29] audit: type=1400 audit(82.980:79): avc: denied { write } for pid=3099 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 83.087107][ T29] audit: type=1400 audit(82.990:80): avc: denied { read } for pid=3099 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 83.099108][ T3099] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 83.118519][ T3099] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 83.138346][ T3099] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 83.157427][ T3099] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 83.166516][ T3100] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 83.174678][ T3100] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 83.207035][ T3100] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 83.223389][ T3100] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 83.896370][ T3099] 8021q: adding VLAN 0 to HW filter on device bond0 [ 83.974177][ T3100] 8021q: adding VLAN 0 to HW filter on device bond0 [ 86.517435][ T3099] veth0_vlan: entered promiscuous mode [ 86.548023][ T3099] veth1_vlan: entered promiscuous mode [ 86.601895][ T3100] veth0_vlan: entered promiscuous mode [ 86.633642][ T3100] veth1_vlan: entered promiscuous mode [ 86.665923][ T3099] veth0_macvtap: entered promiscuous mode [ 86.682384][ T3099] veth1_macvtap: entered promiscuous mode [ 86.784804][ T1266] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 86.786377][ T1266] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 86.794255][ T1266] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 86.796466][ T1266] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 86.801739][ T3100] veth0_macvtap: entered promiscuous mode [ 86.829800][ T3100] veth1_macvtap: entered promiscuous mode [ 86.953542][ T29] audit: type=1400 audit(86.850:81): avc: denied { mount } for pid=3099 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 86.956476][ T29] audit: type=1400 audit(86.860:82): avc: denied { mounton } for pid=3099 comm="syz-executor" path="/syzkaller.2J7QAk/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 86.975201][ T29] audit: type=1400 audit(86.880:83): avc: denied { mount } for pid=3099 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 86.997844][ T29] audit: type=1400 audit(86.900:84): avc: denied { mounton } for pid=3099 comm="syz-executor" path="/syzkaller.2J7QAk/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 87.011359][ T1247] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 87.013876][ T29] audit: type=1400 audit(86.920:85): avc: denied { mounton } for pid=3099 comm="syz-executor" path="/syzkaller.2J7QAk/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=2355 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 87.014685][ T1247] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 87.014917][ T1247] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 87.015134][ T1247] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 87.044607][ T29] audit: type=1400 audit(86.940:86): avc: denied { unmount } for pid=3099 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 87.058101][ T29] audit: type=1400 audit(86.960:87): avc: denied { mounton } for pid=3099 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=772 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 87.060693][ T29] audit: type=1400 audit(86.960:88): avc: denied { mount } for pid=3099 comm="syz-executor" name="/" dev="gadgetfs" ino=1016 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 87.083611][ T29] audit: type=1400 audit(86.970:89): avc: denied { mount } for pid=3099 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 87.123745][ T29] audit: type=1400 audit(87.030:90): avc: denied { mounton } for pid=3099 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 87.207747][ T3099] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 88.630557][ T3735] Zero length message leads to an empty skb [ 91.597343][ T3824] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=3824 comm=syz.0.58 [ 92.691837][ T29] kauditd_printk_skb: 31 callbacks suppressed [ 92.695895][ T29] audit: type=1400 audit(92.590:122): avc: denied { connect } for pid=3848 comm="syz.0.71" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 92.993865][ T29] audit: type=1400 audit(92.900:123): avc: denied { create } for pid=3859 comm="syz.0.76" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 92.997777][ T29] audit: type=1400 audit(92.900:124): avc: denied { bind } for pid=3859 comm="syz.0.76" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 93.003008][ T29] audit: type=1400 audit(92.900:125): avc: denied { setopt } for pid=3859 comm="syz.0.76" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 93.359307][ T29] audit: type=1400 audit(93.260:126): avc: denied { write } for pid=3873 comm="syz.1.83" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 93.523208][ T29] audit: type=1400 audit(93.430:127): avc: denied { write } for pid=3879 comm="syz.0.86" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 93.871138][ T3894] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3894 comm=syz.1.93 [ 95.616059][ T29] audit: type=1400 audit(95.520:128): avc: denied { mount } for pid=3936 comm="syz.0.114" name="/" dev="devpts" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:devpts_t tclass=filesystem permissive=1 [ 95.639198][ T29] audit: type=1400 audit(95.540:129): avc: denied { unmount } for pid=3099 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:devpts_t tclass=filesystem permissive=1 [ 96.013821][ T29] audit: type=1400 audit(95.920:130): avc: denied { map_create } for pid=3944 comm="syz.0.118" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 96.019828][ T29] audit: type=1400 audit(95.920:131): avc: denied { map_read map_write } for pid=3944 comm="syz.0.118" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 96.103179][ T3947] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=3947 comm=syz.0.119 [ 96.624338][ T3966] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=3966 comm=syz.1.127 [ 100.400345][ T4015] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4015 comm=syz.1.151 [ 104.108847][ T29] kauditd_printk_skb: 2 callbacks suppressed [ 104.109706][ T29] audit: type=1400 audit(104.010:134): avc: denied { write } for pid=4059 comm="syz.1.173" path="socket:[3622]" dev="sockfs" ino=3622 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 104.313054][ T4067] SELinux: syz.1.176 (4067) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace. [ 106.449380][ T29] audit: type=1400 audit(106.350:135): avc: denied { lock } for pid=4074 comm="syz.0.180" path="/dev/urandom" dev="devtmpfs" ino=8 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 106.785812][ T4083] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 109.780456][ T29] audit: type=1400 audit(109.680:136): avc: denied { prog_load } for pid=4102 comm="syz.1.193" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 109.780966][ T29] audit: type=1400 audit(109.680:137): avc: denied { bpf } for pid=4102 comm="syz.1.193" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 109.890526][ T29] audit: type=1400 audit(109.790:138): avc: denied { write } for pid=4106 comm="syz.1.195" path="socket:[4153]" dev="sockfs" ino=4153 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 110.696266][ T29] audit: type=1400 audit(110.600:139): avc: denied { setopt } for pid=4134 comm="syz.0.209" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 112.228784][ T29] audit: type=1400 audit(112.130:140): avc: denied { getopt } for pid=4194 comm="syz.1.239" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 115.318834][ T29] audit: type=1400 audit(115.220:141): avc: denied { ioctl } for pid=4223 comm="syz.1.253" path="socket:[3891]" dev="sockfs" ino=3891 ioctlcmd=0x127e scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 115.593632][ T4230] capability: warning: `syz.1.256' uses deprecated v2 capabilities in a way that may be insecure [ 115.601938][ T29] audit: type=1400 audit(115.500:142): avc: denied { bind } for pid=4229 comm="syz.1.256" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=mctp_socket permissive=1 [ 116.060409][ T29] audit: type=1400 audit(115.960:143): avc: denied { create } for pid=4240 comm="syz.1.261" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 116.070396][ T29] audit: type=1400 audit(115.970:144): avc: denied { connect } for pid=4240 comm="syz.1.261" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 116.509496][ T29] audit: type=1400 audit(116.410:145): avc: denied { write } for pid=4248 comm="syz.1.265" path="socket:[3923]" dev="sockfs" ino=3923 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sock_file permissive=1 [ 116.774311][ T29] audit: type=1400 audit(116.680:146): avc: denied { append } for pid=4254 comm="syz.1.268" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 117.476275][ T4271] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4271 comm=syz.1.276 [ 122.348649][ T29] audit: type=1400 audit(122.250:147): avc: denied { read } for pid=4319 comm="syz.0.300" lport=262 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 124.124573][ T4328] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=4328 comm=syz.0.303 [ 128.867265][ T29] audit: type=1400 audit(128.770:148): avc: denied { ioctl } for pid=4422 comm="syz.0.350" path="socket:[4659]" dev="sockfs" ino=4659 ioctlcmd=0x8903 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sock_file permissive=1 [ 129.073154][ T29] audit: type=1400 audit(128.970:149): avc: denied { unmount } for pid=3099 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 130.452124][ T29] audit: type=1400 audit(130.350:150): avc: denied { read } for pid=4471 comm="syz.1.374" path="socket:[5337]" dev="sockfs" ino=5337 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 132.100930][ T29] audit: type=1400 audit(132.000:151): avc: denied { ioctl } for pid=4512 comm="syz.1.394" path="socket:[5391]" dev="sockfs" ino=5391 ioctlcmd=0xb704 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 132.295963][ T29] audit: type=1400 audit(132.200:152): avc: denied { create } for pid=4516 comm="syz.1.396" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 132.305944][ T29] audit: type=1400 audit(132.210:153): avc: denied { ioctl } for pid=4516 comm="syz.1.396" path="socket:[4848]" dev="sockfs" ino=4848 ioctlcmd=0x8904 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 132.383451][ T29] audit: type=1400 audit(132.290:154): avc: denied { watch } for pid=4518 comm="syz.1.397" path="/203" dev="tmpfs" ino=1052 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 132.743228][ T29] audit: type=1400 audit(132.650:155): avc: denied { setopt } for pid=4528 comm="syz.1.402" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 134.362823][ T29] audit: type=1400 audit(134.260:156): avc: denied { perfmon } for pid=4596 comm="syz.0.435" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 135.540067][ T29] audit: type=1400 audit(135.440:157): avc: denied { shutdown } for pid=4643 comm="syz.0.458" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 135.706177][ T29] audit: type=1400 audit(135.610:158): avc: denied { connect } for pid=4649 comm="syz.1.461" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 138.631456][ T29] audit: type=1400 audit(138.530:159): avc: denied { create } for pid=4669 comm="syz.1.470" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 138.636164][ T29] audit: type=1400 audit(138.540:160): avc: denied { write } for pid=4669 comm="syz.1.470" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 138.640927][ T29] audit: type=1400 audit(138.540:161): avc: denied { read } for pid=4669 comm="syz.1.470" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 138.680491][ T29] audit: type=1400 audit(138.580:162): avc: denied { write } for pid=4671 comm="syz.0.471" name="anycast6" dev="proc" ino=4026532702 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 141.730585][ T29] audit: type=1400 audit(141.630:163): avc: denied { accept } for pid=4729 comm="syz.0.500" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 145.748921][ T29] audit: type=1400 audit(145.650:164): avc: denied { map } for pid=4827 comm="syz.1.547" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=6451 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 145.751136][ T29] audit: type=1400 audit(145.650:165): avc: denied { read write } for pid=4827 comm="syz.1.547" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=6451 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 150.804509][ T4928] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4928 comm=syz.1.595 [ 159.438075][ T5096] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5096 comm=syz.1.678 [ 160.805173][ T5125] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5125 comm=syz.0.693 [ 163.394534][ T5183] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=5183 comm=syz.0.721 [ 166.071657][ T5229] SELinux: Context system_u:object_r:systemd_logger_exec_t:s0 is not valid (left unmapped). [ 166.075362][ T29] audit: type=1400 audit(165.980:166): avc: denied { relabelto } for pid=5228 comm="syz.1.744" name="devices.deny" dev="tmpfs" ino=1840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="system_u:object_r:systemd_logger_exec_t:s0" [ 166.079174][ T29] audit: type=1400 audit(165.980:167): avc: denied { associate } for pid=5228 comm="syz.1.744" name="devices.deny" dev="tmpfs" ino=1840 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 srawcon="system_u:object_r:systemd_logger_exec_t:s0" [ 166.106964][ T29] audit: type=1400 audit(166.010:168): avc: denied { unlink } for pid=3100 comm="syz-executor" name="devices.deny" dev="tmpfs" ino=1840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="system_u:object_r:systemd_logger_exec_t:s0" [ 167.514022][ T5260] syz.0.758 calls setitimer() with new_value NULL pointer. Misfeature support will be removed [ 167.878723][ T29] audit: type=1400 audit(167.780:169): avc: denied { read } for pid=5269 comm="syz.0.764" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 191.305171][ T5467] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5467 comm=syz.1.858 [ 191.518630][ T5473] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5473 comm=syz.0.865 [ 192.664823][ T5505] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=5505 comm=syz.1.877 [ 193.675087][ T5532] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5532 comm=syz.0.890 [ 193.983071][ T5543] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5543 comm=syz.1.897 [ 197.889424][ T29] audit: type=1400 audit(197.790:170): avc: denied { setopt } for pid=5599 comm="syz.0.925" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 214.369582][ T29] audit: type=1400 audit(214.270:171): avc: denied { setattr } for pid=3099 comm="syz-executor" path="/dev/binderfs" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 259.887015][ T1266] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 259.960864][ T1266] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 260.025922][ T1266] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 260.072832][ T1266] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 260.306340][ T1266] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 260.328730][ T1266] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 260.338648][ T1266] bond0 (unregistering): Released all slaves [ 260.424949][ T1266] hsr_slave_0: left promiscuous mode [ 260.433017][ T1266] hsr_slave_1: left promiscuous mode [ 260.448232][ T1266] veth1_macvtap: left promiscuous mode [ 260.449318][ T1266] veth0_macvtap: left promiscuous mode [ 260.450268][ T1266] veth1_vlan: left promiscuous mode [ 260.451405][ T1266] veth0_vlan: left promiscuous mode [ 262.586587][ T5775] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 262.605324][ T5775] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 263.675224][ T5775] hsr_slave_0: entered promiscuous mode [ 263.676667][ T5775] hsr_slave_1: entered promiscuous mode [ 264.218485][ T5775] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 264.231480][ T5775] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 264.260511][ T5775] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 264.277122][ T5775] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 265.296617][ T5775] 8021q: adding VLAN 0 to HW filter on device bond0 [ 268.316658][ T5775] veth0_vlan: entered promiscuous mode [ 268.341619][ T5775] veth1_vlan: entered promiscuous mode [ 268.421050][ T5775] veth0_macvtap: entered promiscuous mode [ 268.443687][ T5775] veth1_macvtap: entered promiscuous mode [ 268.553490][ T52] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 268.554154][ T52] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 268.556088][ T52] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 268.556592][ T52] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 280.884864][ T29] audit: type=1400 audit(280.790:172): avc: denied { prog_run } for pid=6205 comm="syz.2.1040" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 281.336892][ T29] audit: type=1400 audit(281.240:173): avc: denied { bind } for pid=6211 comm="syz.2.1042" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 281.355918][ T29] audit: type=1400 audit(281.250:174): avc: denied { write } for pid=6211 comm="syz.2.1042" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 284.476857][ T6238] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 284.487890][ T29] audit: type=1400 audit(284.390:175): avc: denied { ioctl } for pid=6237 comm="syz.2.1053" path="socket:[10460]" dev="sockfs" ino=10460 ioctlcmd=0x894c scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 322.808953][ T1266] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 322.897822][ T1266] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 322.957288][ T1266] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 323.024399][ T1266] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 323.250184][ T1266] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 323.256920][ T1266] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 323.260088][ T1266] bond0 (unregistering): Released all slaves [ 323.327464][ T1266] hsr_slave_0: left promiscuous mode [ 323.329288][ T1266] hsr_slave_1: left promiscuous mode [ 323.345946][ T1266] veth1_macvtap: left promiscuous mode [ 323.346310][ T1266] veth0_macvtap: left promiscuous mode [ 323.347808][ T1266] veth1_vlan: left promiscuous mode [ 323.348105][ T1266] veth0_vlan: left promiscuous mode [ 324.568000][ T6252] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 324.576909][ T6252] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 325.477457][ T6252] hsr_slave_0: entered promiscuous mode [ 325.478505][ T6252] hsr_slave_1: entered promiscuous mode [ 325.481668][ T6252] debugfs: 'hsr0' already exists in 'hsr' [ 325.483663][ T6252] Cannot create hsr debugfs directory [ 325.678737][ T6252] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 325.688156][ T6252] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 325.705156][ T6252] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 325.710566][ T6252] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 326.495642][ T6252] 8021q: adding VLAN 0 to HW filter on device bond0 [ 329.319647][ T6252] veth0_vlan: entered promiscuous mode [ 329.339853][ T6252] veth1_vlan: entered promiscuous mode [ 329.409269][ T6252] veth0_macvtap: entered promiscuous mode [ 329.423767][ T6252] veth1_macvtap: entered promiscuous mode [ 329.506789][ T31] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 329.509833][ T31] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 329.513689][ T31] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 329.518017][ T31] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 330.418446][ T29] audit: type=1400 audit(330.310:176): avc: denied { connect } for pid=6625 comm="syz.2.1070" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 330.427612][ T29] audit: type=1400 audit(330.320:177): avc: denied { write } for pid=6625 comm="syz.2.1070" path="socket:[10788]" dev="sockfs" ino=10788 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 333.455498][ T6654] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=5123 sclass=netlink_audit_socket pid=6654 comm=syz.3.1083 [ 334.583114][ T29] audit: type=1400 audit(334.480:178): avc: denied { create } for pid=6697 comm="syz.3.1103" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 339.870870][ T6799] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 339.960942][ T6799] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 339.995912][ T6222] hid-generic 0008:0007:FFFF.0001: item fetching failed at offset 0/1 [ 339.998196][ T6222] hid-generic 0008:0007:FFFF.0001: probe with driver hid-generic failed with error -22 [ 340.086293][ T6799] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 340.178513][ T6799] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 340.304410][ T31] netdevsim netdevsim2 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 340.364717][ T31] netdevsim netdevsim2 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 340.399915][ T31] netdevsim netdevsim2 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 340.441261][ T31] netdevsim netdevsim2 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 341.257200][ T29] audit: type=1400 audit(341.160:179): avc: denied { ioctl } for pid=6851 comm="syz.3.1159" path="pid:[4026532649]" dev="nsfs" ino=4026532649 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 342.885547][ T23] hid-generic 0008:0007:FFFF.0002: item fetching failed at offset 0/1 [ 342.886292][ T23] hid-generic 0008:0007:FFFF.0002: probe with driver hid-generic failed with error -22 [ 348.332732][ T29] audit: type=1400 audit(348.230:180): avc: denied { setopt } for pid=6950 comm="syz.3.1203" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 358.024761][ T29] audit: type=1400 audit(357.930:181): avc: denied { bind } for pid=7101 comm="syz.3.1272" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 362.778363][ T7185] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=7185 comm=syz.2.1314 [ 362.866915][ T29] audit: type=1400 audit(362.770:182): avc: denied { ioctl } for pid=7187 comm="syz.2.1315" path="socket:[12696]" dev="sockfs" ino=12696 ioctlcmd=0x8903 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 366.377849][ T29] audit: type=1400 audit(366.280:183): avc: denied { read } for pid=7297 comm="syz.3.1365" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 366.936914][ T7322] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=7322 comm=syz.3.1377 [ 367.238246][ T29] audit: type=1400 audit(367.140:184): avc: denied { bind } for pid=7332 comm="syz.3.1382" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 367.240937][ T29] audit: type=1400 audit(367.140:185): avc: denied { name_bind } for pid=7332 comm="syz.3.1382" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=icmp_socket permissive=1 [ 367.246592][ T29] audit: type=1400 audit(367.150:186): avc: denied { node_bind } for pid=7332 comm="syz.3.1382" saddr=172.20.20.40 src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=icmp_socket permissive=1 [ 370.058245][ T29] audit: type=1400 audit(369.960:187): avc: denied { remount } for pid=7418 comm="syz.3.1423" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 372.636374][ T29] audit: type=1400 audit(372.540:188): avc: denied { node_bind } for pid=7445 comm="syz.2.1438" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 381.656859][ T29] audit: type=1400 audit(381.560:189): avc: denied { create } for pid=7559 comm="syz.2.1493" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 381.682608][ T29] audit: type=1400 audit(381.580:190): avc: denied { write } for pid=7559 comm="syz.2.1493" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 382.397034][ T29] audit: type=1400 audit(382.300:191): avc: denied { getopt } for pid=7566 comm="syz.3.1497" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 383.709540][ T29] audit: type=1400 audit(383.610:192): avc: denied { getopt } for pid=7586 comm="syz.2.1507" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 385.169885][ T7633] input input4: cannot allocate more than FF_MAX_EFFECTS effects [ 391.909983][ T29] audit: type=1400 audit(391.800:193): avc: denied { write } for pid=7687 comm="syz.2.1556" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 393.393586][ T29] audit: type=1400 audit(393.300:194): avc: denied { getopt } for pid=7704 comm="syz.3.1565" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 396.949445][ T29] audit: type=1400 audit(396.850:195): avc: denied { read } for pid=7747 comm="syz.3.1586" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 397.096906][ T7754] SELinux: Context system_u:object_r:ssh_exec_t:s0 is not valid (left unmapped). [ 397.099657][ T29] audit: type=1400 audit(397.000:196): avc: denied { relabelto } for pid=7753 comm="syz.2.1588" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 trawcon="system_u:object_r:ssh_exec_t:s0" [ 397.100440][ T29] audit: type=1400 audit(397.000:197): avc: denied { associate } for pid=7753 comm="syz.2.1588" name="/" dev="tmpfs" ino=1 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 srawcon="system_u:object_r:ssh_exec_t:s0" [ 397.160811][ T29] audit: type=1400 audit(397.060:198): avc: denied { setopt } for pid=7755 comm="syz.2.1589" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 397.343585][ T29] audit: type=1400 audit(397.250:199): avc: denied { map } for pid=7759 comm="syz.2.1591" path="/dev/nvme-fabrics" dev="devtmpfs" ino=665 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 402.476461][ T29] audit: type=1400 audit(402.380:200): avc: denied { create } for pid=7823 comm="syz.3.1623" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 402.497621][ T29] audit: type=1400 audit(402.380:201): avc: denied { bind } for pid=7823 comm="syz.3.1623" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 402.514704][ T29] audit: type=1400 audit(402.410:202): avc: denied { connect } for pid=7823 comm="syz.3.1623" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 403.548836][ T29] audit: type=1400 audit(403.450:203): avc: denied { mount } for pid=7841 comm="syz.2.1632" name="/" dev="tracefs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tracefs_t tclass=filesystem permissive=1 [ 403.572736][ T29] audit: type=1400 audit(403.470:204): avc: denied { remount } for pid=7841 comm="syz.2.1632" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tracefs_t tclass=filesystem permissive=1 [ 403.583098][ T7842] ======================================================= [ 403.583098][ T7842] WARNING: The mand mount option has been deprecated and [ 403.583098][ T7842] and is ignored by this kernel. Remove the mand [ 403.583098][ T7842] option from the mount to silence this warning. [ 403.583098][ T7842] ======================================================= [ 403.632674][ T29] audit: type=1400 audit(403.530:205): avc: denied { unmount } for pid=5775 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tracefs_t tclass=filesystem permissive=1 [ 405.266765][ T29] audit: type=1400 audit(405.170:206): avc: denied { lock } for pid=7857 comm="syz.2.1640" path="socket:[15789]" dev="sockfs" ino=15789 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 410.899376][ T29] audit: type=1400 audit(410.800:207): avc: denied { ioctl } for pid=7949 comm="syz.2.1685" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=15928 ioctlcmd=0xaa3f scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 410.909175][ T29] audit: type=1400 audit(410.810:208): avc: denied { getattr } for pid=7949 comm="syz.2.1685" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=15928 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 422.730258][ T29] audit: type=1400 audit(422.630:209): avc: denied { write } for pid=8053 comm="syz.3.1731" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 423.364773][ T8075] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8075 comm=syz.3.1742 [ 423.618611][ T8088] ucma_write: process 651 (syz.3.1748) changed security contexts after opening file descriptor, this is not allowed. [ 424.854995][ T8122] netlink: 16 bytes leftover after parsing attributes in process `syz.3.1765'. [ 426.152868][ T29] audit: type=1400 audit(426.050:210): avc: denied { getopt } for pid=8154 comm="syz.2.1781" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 427.808911][ T29] audit: type=1400 audit(427.710:211): avc: denied { unmount } for pid=5775 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=filesystem permissive=1 [ 428.076988][ T8206] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=8206 comm=syz.3.1805 [ 430.308118][ T29] audit: type=1400 audit(430.210:212): avc: denied { accept } for pid=8266 comm="syz.3.1835" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 434.060218][ T29] audit: type=1400 audit(433.960:213): avc: denied { module_load } for pid=8357 comm="syz.3.1879" path=2F6D656D66643A20C736BE918D183229219A25A2D238D606070EFCFE128F2613AE254054A3B03E5CECA9F951403641108C6E7C202864656C6574656429 dev="tmpfs" ino=1031 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=system permissive=1 [ 434.194964][ T8358] Invalid ELF header magic: != ELF [ 438.281146][ T8408] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=8408 comm=syz.3.1903 [ 446.731629][ T8580] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=1540 sclass=netlink_audit_socket pid=8580 comm=syz.2.1971 [ 447.130288][ T29] audit: type=1400 audit(447.030:214): avc: denied { nlmsg_read } for pid=8598 comm="syz.3.1980" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 447.137621][ T8599] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=8599 comm=syz.3.1980 [ 447.731260][ T29] audit: type=1400 audit(447.630:215): avc: denied { read } for pid=8623 comm="syz.2.1993" path="socket:[17913]" dev="sockfs" ino=17913 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 448.048135][ T8642] capability: warning: `syz.2.2001' uses 32-bit capabilities (legacy support in use) [ 449.883363][ T29] audit: type=1400 audit(449.780:216): avc: denied { lock } for pid=8722 comm="syz.2.2041" path="socket:[18095]" dev="sockfs" ino=18095 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 450.537093][ T29] audit: type=1400 audit(450.440:217): avc: denied { read } for pid=8747 comm="syz.2.2054" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 451.579902][ T8781] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=8781 comm=syz.2.2070 [ 452.644042][ T29] audit: type=1400 audit(452.540:218): avc: denied { getopt } for pid=8806 comm="syz.2.2083" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 455.503943][ T8910] semctl(GETNCNT/GETZCNT) is since 3.16 Single Unix Specification compliant. [ 455.503943][ T8910] The task syz.2.2125 (8910) triggered the difference, watch for misbehavior. [ 467.859057][ T9006] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=9006 comm=syz.2.2175 [ 472.158897][ T9081] Invalid ELF header magic: != ELF [ 472.605706][ T9102] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=1540 sclass=netlink_audit_socket pid=9102 comm=syz.3.2222 [ 475.625896][ T192] netdevsim netdevsim2 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 475.671122][ T192] netdevsim netdevsim2 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 475.734723][ T192] netdevsim netdevsim2 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 475.783605][ T192] netdevsim netdevsim2 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 476.036382][ T192] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 476.039710][ T192] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 476.043574][ T192] bond0 (unregistering): Released all slaves [ 476.092881][ T192] hsr_slave_0: left promiscuous mode [ 476.097984][ T192] hsr_slave_1: left promiscuous mode [ 476.111134][ T192] veth1_macvtap: left promiscuous mode [ 476.111752][ T192] veth0_macvtap: left promiscuous mode [ 476.112299][ T192] veth1_vlan: left promiscuous mode [ 476.112425][ T192] veth0_vlan: left promiscuous mode [ 477.351405][ T9200] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 477.356963][ T9200] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 478.054528][ T9200] hsr_slave_0: entered promiscuous mode [ 478.056797][ T9200] hsr_slave_1: entered promiscuous mode [ 478.417856][ T9200] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 478.424454][ T9200] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 478.430064][ T9200] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 478.436003][ T9200] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 479.200580][ T9200] 8021q: adding VLAN 0 to HW filter on device bond0 [ 481.673854][ T9200] veth0_vlan: entered promiscuous mode [ 481.683737][ T9200] veth1_vlan: entered promiscuous mode [ 481.734197][ T9200] veth0_macvtap: entered promiscuous mode [ 481.751869][ T9200] veth1_macvtap: entered promiscuous mode [ 481.815848][ T935] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 481.817867][ T935] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 481.819022][ T935] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 481.819933][ T935] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 483.641293][ T1646] netdevsim netdevsim4 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 483.810879][ T1646] netdevsim netdevsim4 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 483.894375][ T1646] netdevsim netdevsim4 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 483.964783][ T1646] netdevsim netdevsim4 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 484.177126][ T1646] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 484.181483][ T1646] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 484.188900][ T1646] bond0 (unregistering): Released all slaves [ 484.252540][ T1646] hsr_slave_0: left promiscuous mode [ 484.254743][ T1646] hsr_slave_1: left promiscuous mode [ 484.261250][ T1646] veth1_macvtap: left promiscuous mode [ 484.265301][ T1646] veth0_macvtap: left promiscuous mode [ 484.266094][ T1646] veth1_vlan: left promiscuous mode [ 484.266806][ T1646] veth0_vlan: left promiscuous mode [ 485.876548][ T9606] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 485.886654][ T9606] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 486.597658][ T9606] hsr_slave_0: entered promiscuous mode [ 486.599094][ T9606] hsr_slave_1: entered promiscuous mode [ 486.847870][ T9606] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 486.856025][ T9606] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 486.864591][ T9606] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 486.870061][ T9606] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 487.563893][ T9606] 8021q: adding VLAN 0 to HW filter on device bond0 [ 488.159809][ T9606] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 490.271927][ T9606] veth0_vlan: entered promiscuous mode [ 490.291078][ T9606] veth1_vlan: entered promiscuous mode [ 490.356477][ T9606] veth0_macvtap: entered promiscuous mode [ 490.366132][ T9606] veth1_macvtap: entered promiscuous mode [ 490.406660][ T935] netdevsim netdevsim5 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 490.407080][ T935] netdevsim netdevsim5 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 490.407167][ T935] netdevsim netdevsim5 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 490.407251][ T935] netdevsim netdevsim5 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 490.879450][ T9989] netlink: 16 bytes leftover after parsing attributes in process `syz.5.2296'. [ 492.818572][ T29] audit: type=1400 audit(492.720:219): avc: denied { getopt } for pid=10033 comm="syz.3.2318" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 494.519251][T10075] veth0_to_team: entered promiscuous mode [ 494.519678][T10075] veth0_to_team: entered allmulticast mode [ 496.592730][ T29] audit: type=1400 audit(496.490:220): avc: denied { map } for pid=10118 comm="syz.3.2355" path="/proc/sys/net/ipv4/tcp_rmem" dev="proc" ino=12518 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_net_t tclass=file permissive=1 [ 505.437176][ T29] audit: type=1400 audit(505.330:221): avc: denied { bind } for pid=10262 comm="syz.3.2414" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 506.058106][T10283] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=10283 comm=syz.5.2421 [ 508.588694][ T29] audit: type=1400 audit(508.490:222): avc: denied { setopt } for pid=10356 comm="syz.3.2450" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 509.323779][ T29] audit: type=1400 audit(509.230:223): avc: denied { connect } for pid=10389 comm="syz.5.2466" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 509.603414][T10406] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=10406 comm=syz.5.2474 [ 515.369347][T10546] lo: entered promiscuous mode [ 515.370905][T10546] lo: entered allmulticast mode [ 515.376641][T10546] tunl0: entered promiscuous mode [ 515.380474][T10546] tunl0: entered allmulticast mode [ 515.385276][T10546] gre0: entered promiscuous mode [ 515.387458][T10546] gre0: entered allmulticast mode [ 515.389828][T10546] gretap0: entered promiscuous mode [ 515.391273][T10546] gretap0: entered allmulticast mode [ 515.396990][T10546] erspan0: entered promiscuous mode [ 515.398869][T10546] erspan0: entered allmulticast mode [ 515.403147][T10546] ip_vti0: entered promiscuous mode [ 515.404703][T10546] ip_vti0: entered allmulticast mode [ 515.407002][T10546] ip6_vti0: entered promiscuous mode [ 515.408009][T10546] ip6_vti0: entered allmulticast mode [ 515.410962][T10546] sit0: entered promiscuous mode [ 515.412933][T10546] sit0: entered allmulticast mode [ 515.415077][T10546] ip6tnl0: entered promiscuous mode [ 515.416041][T10546] ip6tnl0: entered allmulticast mode [ 515.418193][T10546] ip6gre0: entered promiscuous mode [ 515.421442][T10546] ip6gre0: entered allmulticast mode [ 515.427273][T10546] syz_tun: entered promiscuous mode [ 515.430590][T10546] syz_tun: entered allmulticast mode [ 515.434114][T10546] ip6gretap0: entered promiscuous mode [ 515.434913][T10546] ip6gretap0: entered allmulticast mode [ 515.436630][T10546] vcan0: entered promiscuous mode [ 515.437439][T10546] vcan0: entered allmulticast mode [ 515.438947][T10546] bond0: entered promiscuous mode [ 515.439769][T10546] bond_slave_0: entered promiscuous mode [ 515.440760][T10546] bond_slave_1: entered promiscuous mode [ 515.441617][T10546] bond0: entered allmulticast mode [ 515.445351][T10546] bond_slave_0: entered allmulticast mode [ 515.445842][T10546] bond_slave_1: entered allmulticast mode [ 515.448278][T10546] dummy0: entered promiscuous mode [ 515.448646][T10546] dummy0: entered allmulticast mode [ 515.449978][T10546] nlmon0: entered promiscuous mode [ 515.450310][T10546] nlmon0: entered allmulticast mode [ 515.451553][T10546] vxcan0: entered promiscuous mode [ 515.451795][T10546] vxcan0: entered allmulticast mode [ 515.474520][T10546] vxcan1: entered promiscuous mode [ 515.476584][T10546] vxcan1: entered allmulticast mode [ 515.478259][T10546] veth0: entered promiscuous mode [ 515.479052][T10546] veth0: entered allmulticast mode [ 515.480787][T10546] veth1: entered promiscuous mode [ 515.481435][T10546] veth1: entered allmulticast mode [ 515.483418][T10546] wg0: entered promiscuous mode [ 515.485443][T10546] wg0: entered allmulticast mode [ 515.486711][T10546] wg1: entered promiscuous mode [ 515.487296][T10546] wg1: entered allmulticast mode [ 515.488776][T10546] wg2: entered promiscuous mode [ 515.489655][T10546] wg2: entered allmulticast mode [ 515.490916][T10546] veth0_to_bridge: entered promiscuous mode [ 515.491606][T10546] veth0_to_bridge: entered allmulticast mode [ 515.494072][T10546] bridge_slave_0: entered promiscuous mode [ 515.494748][T10546] bridge_slave_0: entered allmulticast mode [ 515.496556][T10546] veth1_to_bridge: entered promiscuous mode [ 515.497168][T10546] veth1_to_bridge: entered allmulticast mode [ 515.498663][T10546] bridge_slave_1: entered promiscuous mode [ 515.499289][T10546] bridge_slave_1: entered allmulticast mode [ 515.501448][T10546] veth0_to_bond: entered promiscuous mode [ 515.502620][T10546] veth0_to_bond: entered allmulticast mode [ 515.506041][T10546] bond0: (slave bond_slave_0): Releasing backup interface [ 515.521588][T10546] veth1_to_bond: entered promiscuous mode [ 515.526735][T10546] veth1_to_bond: entered allmulticast mode [ 515.535692][T10546] bond0: (slave bond_slave_1): Releasing backup interface [ 515.556252][T10546] veth0_to_team: entered promiscuous mode [ 515.556922][T10546] veth0_to_team: entered allmulticast mode [ 515.559264][T10546] team_slave_0: entered promiscuous mode [ 515.560610][T10546] team_slave_0: entered allmulticast mode [ 515.565271][T10546] veth1_to_team: entered promiscuous mode [ 515.565648][T10546] veth1_to_team: entered allmulticast mode [ 515.567122][T10546] team_slave_1: entered promiscuous mode [ 515.567481][T10546] team_slave_1: entered allmulticast mode [ 515.569060][T10546] veth0_to_batadv: entered promiscuous mode [ 515.569308][T10546] veth0_to_batadv: entered allmulticast mode [ 515.571012][T10546] batadv_slave_0: entered promiscuous mode [ 515.571399][T10546] batadv_slave_0: entered allmulticast mode [ 515.581636][T10546] veth1_to_batadv: entered promiscuous mode [ 515.583117][T10546] veth1_to_batadv: entered allmulticast mode [ 515.585879][T10546] batadv_slave_1: entered promiscuous mode [ 515.591440][T10546] batadv_slave_1: entered allmulticast mode [ 515.606585][T10546] xfrm0: entered promiscuous mode [ 515.613668][T10546] xfrm0: entered allmulticast mode [ 515.619695][T10546] veth0_to_hsr: entered promiscuous mode [ 515.621354][T10546] veth0_to_hsr: entered allmulticast mode [ 515.625399][T10546] hsr_slave_0: entered allmulticast mode [ 515.627595][T10546] A link change request failed with some changes committed already. Interface hsr_slave_0 may have been left with an inconsistent configuration, please check. [ 528.913581][ T29] audit: type=1400 audit(528.810:224): avc: denied { getopt } for pid=10757 comm="syz.3.2645" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 538.163973][T10904] binfmt_misc: register: failed to install interpreter file ./file0/file0 [ 538.628778][ T29] audit: type=1400 audit(538.530:225): avc: denied { create } for pid=10925 comm="syz.5.2726" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1 [ 540.517052][ T29] audit: type=1400 audit(540.420:226): avc: denied { ioctl } for pid=10976 comm="syz.5.2750" path="socket:[24921]" dev="sockfs" ino=24921 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 546.642831][ T29] audit: type=1400 audit(546.540:227): avc: denied { read } for pid=11095 comm="syz.3.2806" path="socket:[24301]" dev="sockfs" ino=24301 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 548.948542][ T29] audit: type=1400 audit(548.850:228): avc: denied { bind } for pid=11160 comm="syz.5.2838" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 553.507584][T11234] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=1794 sclass=netlink_xfrm_socket pid=11234 comm=syz.3.2870 [ 557.150494][T11271] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=11271 comm=syz.5.2889 [ 563.704690][T11343] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=11343 comm=syz.3.2925 [ 564.156503][T11365] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=11365 comm=syz.5.2935 [ 564.945809][T11400] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=11400 comm=syz.3.2952 [ 565.388631][T11421] pimreg: entered allmulticast mode [ 565.396594][T11421] pimreg: left allmulticast mode [ 568.476333][ T29] audit: type=1400 audit(568.380:229): avc: denied { getopt } for pid=11497 comm="syz.3.2998" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 569.071203][ T29] audit: type=1400 audit(568.970:230): avc: denied { mount } for pid=11515 comm="syz.3.3006" name="/" dev="selinuxfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=filesystem permissive=1 [ 569.079553][ T29] audit: type=1400 audit(568.980:231): avc: denied { remount } for pid=11515 comm="syz.3.3006" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=filesystem permissive=1 [ 569.094905][ T29] audit: type=1400 audit(569.000:232): avc: denied { unmount } for pid=6252 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=filesystem permissive=1 [ 570.524350][ T2877] hid-generic 0006:0007:0024.0003: item fetching failed at offset 0/4 [ 570.525151][ T2877] hid-generic 0006:0007:0024.0003: probe with driver hid-generic failed with error -22 [ 573.636262][ T29] audit: type=1400 audit(573.540:233): avc: denied { ioctl } for pid=11582 comm="syz.5.3038" path="socket:[26935]" dev="sockfs" ino=26935 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 574.786976][ T29] audit: type=1400 audit(574.690:234): avc: denied { mount } for pid=11629 comm="syz.5.3062" name="/" dev="ramfs" ino=26198 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 576.145333][ T29] audit: type=1400 audit(576.050:235): avc: denied { allowed } for pid=11676 comm="syz.5.3085" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 577.251035][ T29] audit: type=1400 audit(577.150:236): avc: denied { write } for pid=11722 comm="syz.5.3107" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 585.443097][ T29] audit: type=1400 audit(585.330:237): avc: denied { bind } for pid=11941 comm="syz.3.3215" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 587.815822][ T29] audit: type=1400 audit(587.720:238): avc: denied { ioctl } for pid=11979 comm="syz.3.3234" path="socket:[27535]" dev="sockfs" ino=27535 ioctlcmd=0x9420 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 603.794519][ T29] audit: type=1400 audit(603.700:239): avc: denied { setopt } for pid=12218 comm="syz.5.3349" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 609.874627][T12301] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=12301 comm=syz.5.3388 [ 612.300112][ T29] audit: type=1400 audit(612.200:240): avc: denied { read } for pid=12343 comm="syz.3.3409" name="binder0" dev="binder" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 612.305496][ T29] audit: type=1400 audit(612.210:241): avc: denied { open } for pid=12343 comm="syz.3.3409" path="/dev/binderfs/binder0" dev="binder" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 612.317021][ T29] audit: type=1400 audit(612.220:242): avc: denied { ioctl } for pid=12343 comm="syz.3.3409" path="/dev/binderfs/binder0" dev="binder" ino=7 ioctlcmd=0x620b scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 612.321603][T12344] binder: 12343:12344 ioctl c018620b 0 returned -14 [ 614.969999][ T29] audit: type=1400 audit(614.870:243): avc: denied { setattr } for pid=12413 comm="syz.3.3442" name="NETLINK" dev="sockfs" ino=29722 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 620.513556][T12608] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=12608 comm=syz.3.3536 [ 620.598973][ T29] audit: type=1400 audit(620.500:244): avc: denied { map } for pid=12609 comm="syz.5.3538" path="socket:[29420]" dev="sockfs" ino=29420 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tcp_socket permissive=1 [ 620.621506][ T29] audit: type=1400 audit(620.520:245): avc: denied { setopt } for pid=12610 comm="syz.3.3539" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 629.414219][T12823] netlink: 4 bytes leftover after parsing attributes in process `syz.3.3642'. [ 630.659488][T12848] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2304 sclass=netlink_route_socket pid=12848 comm=syz.5.3654 [ 634.978183][T12981] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=12981 comm=syz.3.3720 [ 638.109045][T13000] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=13000 comm=syz.3.3729 [ 640.445472][T13058] syz.5.3758 uses obsolete (PF_INET,SOCK_PACKET) [ 646.515525][ T29] audit: type=1400 audit(646.420:246): avc: denied { mount } for pid=13187 comm="syz.5.3826" name="/" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=filesystem permissive=1 [ 646.518289][ T29] audit: type=1400 audit(646.420:247): avc: denied { remount } for pid=13187 comm="syz.5.3826" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=filesystem permissive=1 [ 646.544021][ T29] audit: type=1400 audit(646.450:248): avc: denied { unmount } for pid=9606 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=filesystem permissive=1 [ 654.747091][T13382] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=13382 comm=syz.5.3918 [ 1056.292550][ C0] watchdog: BUG: soft lockup - CPU#0 stuck for 430s! [swapper/0:0] [ 1056.292844][ C0] Modules linked in: [ 1056.293851][ C0] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Tainted: G L syzkaller #0 PREEMPT [ 1056.294017][ C0] Tainted: [L]=SOFTLOCKUP [ 1056.294060][ C0] Hardware name: ARM-Versatile Express [ 1056.294266][ C0] PC is at _raw_spin_unlock_irq+0x28/0x54 [ 1056.294988][ C0] LR is at tmigr_handle_remote_up+0x268/0x4b0 [ 1056.295051][ C0] pc : [<81abba7c>] lr : [<80346df4>] psr: 60000113 [ 1056.295091][ C0] sp : 82801be0 ip : 82801bf0 fp : 82801bec [ 1056.295124][ C0] r10: 00000001 r9 : 00000098 r8 : d47d2400 [ 1056.295163][ C0] r7 : ddddb488 r6 : 82801cb8 r5 : 830bf3b0 r4 : 830bf380 [ 1056.295200][ C0] r3 : 00000f09 r2 : 00000103 r1 : 830bf3b0 r0 : ddddb488 [ 1056.295366][ C0] Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment user [ 1056.295442][ C0] Control: 30c5387d Table: 85eb95c0 DAC: fffffffd [ 1056.295553][ C0] Call trace: [ 1056.295813][ C0] [<81abba54>] (_raw_spin_unlock_irq) from [<80346df4>] (tmigr_handle_remote_up+0x268/0x4b0) [ 1056.296146][ C0] [<80346b8c>] (tmigr_handle_remote_up) from [<803450a4>] (__walk_groups_from+0x3c/0xe4) [ 1056.296273][ C0] r10:8281b500 r9:8280c820 r8:80346b8c r7:82801cb8 r6:830bf380 r5:00000002 [ 1056.296313][ C0] r4:830bf380 [ 1056.296333][ C0] [<80345068>] (__walk_groups_from) from [<8034743c>] (tmigr_handle_remote+0xe8/0x108) [ 1056.296415][ C0] r9:82804d80 r8:00000102 r7:00000001 r6:00000082 r5:00000002 r4:dddc7488 [ 1056.296434][ C0] [<80347354>] (tmigr_handle_remote) from [<80327600>] (run_timer_softirq+0x30/0x34) [ 1056.296498][ C0] r4:82804084 [ 1056.296516][ C0] [<803275d0>] (run_timer_softirq) from [<8025b55c>] (handle_softirqs+0x140/0x458) [ 1056.296579][ C0] [<8025b41c>] (handle_softirqs) from [<8025b9d0>] (__irq_exit_rcu+0x110/0x1d0) [ 1056.296652][ C0] r10:00000000 r9:8281b500 r8:00000000 r7:82801dd8 r6:82443ff8 r5:8247f12c [ 1056.296673][ C0] r4:8281b500 [ 1056.296688][ C0] [<8025b8c0>] (__irq_exit_rcu) from [<8025bd48>] (irq_exit+0x10/0x18) [ 1056.296748][ C0] r5:8247f12c r4:826c3a9c [ 1056.296763][ C0] [<8025bd38>] (irq_exit) from [<81aad6a4>] (generic_handle_arch_irq+0x7c/0x80) [ 1056.296834][ C0] [<81aad628>] (generic_handle_arch_irq) from [<80200bdc>] (__irq_svc+0x7c/0xbc) [ 1056.296961][ C0] Exception stack(0x82801dd8 to 0x82801e20) [ 1056.297152][ C0] 1dc0: 00000001 00000000 [ 1056.297212][ C0] 1de0: 00001f8a 00001f88 8403cb68 00000004 00000001 8403cb68 84484688 8403ca40 [ 1056.297246][ C0] 1e00: 00000000 82801e3c 82801e28 82801e28 81abbc0c 81abbc34 80000013 ffffffff [ 1056.297316][ C0] r9:8281b500 r8:84484688 r7:82801e0c r6:ffffffff r5:80000013 r4:81abbc34 [ 1056.297334][ C0] [<81abbbf4>] (_raw_spin_lock) from [<809c77ac>] (gpio_mmio_set+0x44/0x80) [ 1056.297407][ C0] r5:00000004 r4:8403ca40 [ 1056.297423][ C0] [<809c7768>] (gpio_mmio_set) from [<809b7f68>] (gpiochip_set+0x1c/0x44) [ 1056.297495][ C0] r7:00000001 r6:00000000 r5:00000002 r4:841693e8 [ 1056.297511][ C0] [<809b7f4c>] (gpiochip_set) from [<809ba830>] (gpiod_set_raw_value_commit+0x78/0x218) [ 1056.297570][ C0] [<809ba7b8>] (gpiod_set_raw_value_commit) from [<809bc0d0>] (gpiod_set_value_nocheck+0x44/0x58) [ 1056.297639][ C0] r10:00000000 r9:00000000 r8:00000001 r7:dddce4c0 r6:838c4758 r5:00000001 [ 1056.297658][ C0] r4:841693e8 [ 1056.297672][ C0] [<809bc08c>] (gpiod_set_value_nocheck) from [<809bc120>] (gpiod_set_value+0x3c/0x88) [ 1056.297722][ C0] [<809bc0e4>] (gpiod_set_value) from [<809cc8bc>] (gpio_led_set+0x5c/0x60) [ 1056.297776][ C0] r5:000000ff r4:8334f224 [ 1056.297796][ C0] [<809cc860>] (gpio_led_set) from [<809ca1e4>] (led_set_brightness+0x84/0x90) [ 1056.297852][ C0] r5:000000ff r4:8334f224 [ 1056.297866][ C0] [<809ca160>] (led_set_brightness) from [<809cbd64>] (led_trigger_event+0x40/0x58) [ 1056.297921][ C0] r5:000000ff r4:8334f224 [ 1056.297936][ C0] [<809cbd24>] (led_trigger_event) from [<809cd3c0>] (ledtrig_cpu+0xac/0xf4) [ 1056.297997][ C0] r7:dddce4c0 r6:00000002 r5:82b15cd8 r4:000001fd [ 1056.298014][ C0] [<809cd314>] (ledtrig_cpu) from [<80227a38>] (arch_cpu_idle_exit+0x14/0x18) [ 1056.298083][ C0] r9:00000000 r8:00000000 r7:8280c710 r6:8281b500 r5:8280c6d0 r4:00000000 [ 1056.298100][ C0] [<80227a24>] (arch_cpu_idle_exit) from [<802b158c>] (do_idle+0x5c/0x2d8) [ 1056.298160][ C0] [<802b1530>] (do_idle) from [<802b1b38>] (cpu_startup_entry+0x30/0x34) [ 1056.298232][ C0] r10:8281aff4 r9:8280c680 r8:823bec00 r7:00000000 r6:deffc06c r5:828222e8 [ 1056.298252][ C0] r4:000000ed [ 1056.298267][ C0] [<802b1b08>] (cpu_startup_entry) from [<81aaf0bc>] (kernel_init+0x0/0x138) [ 1056.298335][ C0] [<81aaefdc>] (rest_init) from [<8260145c>] (start_kernel+0x844/0x860) [ 1056.298428][ C0] [<82600c18>] (start_kernel) from [<00000000>] (0x0) [ 1056.299113][ C0] Sending NMI from CPU 0 to CPUs 1: [ 1056.300049][ C1] NMI backtrace for cpu 1 [ 1056.300350][ C1] CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Tainted: G L syzkaller #0 PREEMPT [ 1056.300432][ C1] Tainted: [L]=SOFTLOCKUP [ 1056.300451][ C1] Hardware name: ARM-Versatile Express [ 1056.300477][ C1] PC is at _raw_spin_lock+0x40/0x58 [ 1056.300570][ C1] LR is at _raw_spin_lock+0x18/0x58 [ 1056.300610][ C1] pc : [<81abbc34>] lr : [<81abbc0c>] psr: 80000113 [ 1056.300639][ C1] sp : df805d68 ip : df805d68 fp : df805d7c [ 1056.300664][ C1] r10: 81c05450 r9 : 8403ca40 r8 : 84484688 [ 1056.300688][ C1] r7 : 8403cb68 r6 : 00000001 r5 : 00000001 r4 : 8403cb68 [ 1056.300714][ C1] r3 : 00001f88 r2 : 00001f89 r1 : 00000000 r0 : 00000001 [ 1056.300744][ C1] Flags: Nzcv IRQs on FIQs on Mode SVC_32 ISA ARM Segment none [ 1056.300783][ C1] Control: 30c5387d Table: 85f47e80 DAC: 00000000 [ 1056.300816][ C1] Call trace: frame pointer underflow [ 1056.300927][ C1] [<81abbbf4>] (_raw_spin_lock) from [<809c77ac>] (gpio_mmio_set+0x44/0x80) [ 1056.301026][ C1] r5:00000001 r4:8403ca40 [ 1056.301066][ C1] [<809c7768>] (gpio_mmio_set) from [<809b7f68>] (gpiochip_set+0x1c/0x44) [ 1056.301161][ C1] r7:00000001 r6:00000000 r5:00000000 r4:841693c0 [ 1056.301181][ C1] [<809b7f4c>] (gpiochip_set) from [<809ba830>] (gpiod_set_raw_value_commit+0x78/0x218) [ 1056.301248][ C1] [<809ba7b8>] (gpiod_set_raw_value_commit) from [<809bc0d0>] (gpiod_set_value_nocheck+0x44/0x58) [ 1056.301347][ C1] r10:81c05450 r9:df805ebc r8:00000102 r7:00008b37 r6:00000007 r5:00000001 [ 1056.301373][ C1] r4:841693c0 [ 1056.301390][ C1] [<809bc08c>] (gpiod_set_value_nocheck) from [<809bc120>] (gpiod_set_value+0x3c/0x88) [ 1056.301451][ C1] [<809bc0e4>] (gpiod_set_value) from [<809cc8bc>] (gpio_led_set+0x5c/0x60) [ 1056.301514][ C1] r5:8334f044 r4:8334f044 [ 1056.301537][ C1] [<809cc860>] (gpio_led_set) from [<809ca154>] (led_set_brightness_nosleep+0x38/0x44) [ 1056.301610][ C1] r5:8334f044 r4:858ae28c [ 1056.301629][ C1] [<809ca11c>] (led_set_brightness_nosleep) from [<809cd1b8>] (led_heartbeat_function+0x84/0x144) [ 1056.301693][ C1] [<809cd134>] (led_heartbeat_function) from [<80326f70>] (call_timer_fn+0x30/0x220) [ 1056.301774][ C1] r7:00008b37 r6:809cd134 r5:858ae28c r4:83216000 [ 1056.301803][ C1] [<80326f40>] (call_timer_fn) from [<80327424>] (__run_timers+0x2c4/0x3f8) [ 1056.301886][ C1] r9:df805ebc r8:00008b37 r7:00000000 r6:809cd134 r5:dddd9f00 r4:858ae28c [ 1056.301910][ C1] [<80327160>] (__run_timers) from [<803275c0>] (run_timer_base+0x68/0x78) [ 1056.301995][ C1] r10:83216000 r9:82804d80 r8:00000102 r7:00000001 r6:00000082 r5:00000002 [ 1056.302018][ C1] r4:dddd9f00 [ 1056.302036][ C1] [<80327558>] (run_timer_base) from [<803275ec>] (run_timer_softirq+0x1c/0x34) [ 1056.302099][ C1] r4:82804084 [ 1056.302133][ C1] [<803275d0>] (run_timer_softirq) from [<8025b55c>] (handle_softirqs+0x140/0x458) [ 1056.302208][ C1] [<8025b41c>] (handle_softirqs) from [<8025b9d0>] (__irq_exit_rcu+0x110/0x1d0) [ 1056.302305][ C1] r10:00000000 r9:83216000 r8:00000000 r7:df865e08 r6:82443ff8 r5:8247f12c [ 1056.302332][ C1] r4:83216000 [ 1056.302350][ C1] [<8025b8c0>] (__irq_exit_rcu) from [<8025bd48>] (irq_exit+0x10/0x18) [ 1056.302426][ C1] r5:8247f12c r4:826c3a9c [ 1056.302445][ C1] [<8025bd38>] (irq_exit) from [<81aad6a4>] (generic_handle_arch_irq+0x7c/0x80) [ 1056.302523][ C1] [<81aad628>] (generic_handle_arch_irq) from [<81a7d654>] (call_with_stack+0x1c/0x20) [ 1056.302613][ C1] r9:83216000 r8:84484688 r7:df865e3c r6:ffffffff r5:60000013 r4:809c7fac [ 1056.302636][ C1] [<81a7d638>] (call_with_stack) from [<80200bec>] (__irq_svc+0x8c/0xbc) [ 1056.302706][ C1] Exception stack(0xdf865e08 to 0xdf865e50) [ 1056.302753][ C1] 5e00: e0271008 00000008 00001f88 00000000 e0271008 00000008 [ 1056.302806][ C1] 5e20: 00000001 8403cb68 84484688 8403ca40 00000000 df865e6c df865e58 df865e58 [ 1056.302853][ C1] 5e40: 809c7fa8 809c7fac 60000013 ffffffff [ 1056.302879][ C1] [<809c7f8c>] (gpio_mmio_write32) from [<809c77cc>] (gpio_mmio_set+0x64/0x80) [ 1056.302959][ C1] r5:00000008 r4:8403ca40 [ 1056.302978][ C1] [<809c7768>] (gpio_mmio_set) from [<809b7f68>] (gpiochip_set+0x1c/0x44) [ 1056.303058][ C1] r7:00000001 r6:00000000 r5:00000003 r4:841693fc [ 1056.303079][ C1] [<809b7f4c>] (gpiochip_set) from [<809ba830>] (gpiod_set_raw_value_commit+0x78/0x218) [ 1056.303145][ C1] [<809ba7b8>] (gpiod_set_raw_value_commit) from [<809bc0d0>] (gpiod_set_value_nocheck+0x44/0x58) [ 1056.303229][ C1] r10:00000000 r9:00000000 r8:00000001 r7:ddde24c0 r6:838c4118 r5:00000001 [ 1056.303255][ C1] r4:841693fc [ 1056.303271][ C1] [<809bc08c>] (gpiod_set_value_nocheck) from [<809bc120>] (gpiod_set_value+0x3c/0x88) [ 1056.303362][ C1] [<809bc0e4>] (gpiod_set_value) from [<809cc8bc>] (gpio_led_set+0x5c/0x60) [ 1056.303431][ C1] r5:000000ff r4:8334f314 [ 1056.303452][ C1] [<809cc860>] (gpio_led_set) from [<809ca1e4>] (led_set_brightness+0x84/0x90) [ 1056.303520][ C1] r5:000000ff r4:8334f314 [ 1056.303539][ C1] [<809ca160>] (led_set_brightness) from [<809cbd64>] (led_trigger_event+0x40/0x58) [ 1056.303610][ C1] r5:000000ff r4:8334f314 [ 1056.303644][ C1] [<809cbd24>] (led_trigger_event) from [<809cd3c0>] (ledtrig_cpu+0xac/0xf4) [ 1056.303724][ C1] r7:ddde24c0 r6:00000002 r5:82b15cd8 r4:000000fe [ 1056.303742][ C1] [<809cd314>] (ledtrig_cpu) from [<80227a38>] (arch_cpu_idle_exit+0x14/0x18) [ 1056.303834][ C1] r9:00000000 r8:00000001 r7:8280c710 r6:83216000 r5:8280c6d0 r4:00000001 [ 1056.303858][ C1] [<80227a24>] (arch_cpu_idle_exit) from [<802b158c>] (do_idle+0x5c/0x2d8) [ 1056.303928][ C1] [<802b1530>] (do_idle) from [<802b1b38>] (cpu_startup_entry+0x30/0x34) [ 1056.304015][ C1] r10:00000000 r9:414fc0f0 r8:80003000 r7:82a7b4a4 r6:83216000 r5:00000001 [ 1056.304042][ C1] r4:00000092 [ 1056.304061][ C1] [<802b1b08>] (cpu_startup_entry) from [<8022f360>] (secondary_start_kernel+0x128/0x194) [ 1056.304138][ C1] [<8022f238>] (secondary_start_kernel) from [<80220094>] (__enable_mmu+0x0/0xc) [ 1056.304224][ C1] r7:82a7b4a4 r6:30c0387d r5:00000000 r4:830b7bc0 [ 1056.305253][ C0] Kernel panic - not syncing: softlockup: hung tasks [ 1056.336637][ C0] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Tainted: G L syzkaller #0 PREEMPT [ 1056.336992][ C0] Tainted: [L]=SOFTLOCKUP [ 1056.337135][ C0] Hardware name: ARM-Versatile Express [ 1056.337351][ C0] Call trace: [ 1056.337611][ C0] [<80201a74>] (dump_backtrace) from [<80201b70>] (show_stack+0x18/0x1c) [ 1056.337969][ C0] r7:82296540 r6:8281b500 r5:00000000 r4:822956f0 [ 1056.338167][ C0] [<80201b58>] (show_stack) from [<8021ee08>] (dump_stack_lvl+0x54/0x7c) [ 1056.338472][ C0] [<8021edb4>] (dump_stack_lvl) from [<8021ee48>] (dump_stack+0x18/0x1c) [ 1056.338796][ C0] r5:00000000 r4:82a7bd14 [ 1056.338957][ C0] [<8021ee30>] (dump_stack) from [<80202648>] (vpanic+0xe0/0x2e8) [ 1056.339228][ C0] [<80202568>] (vpanic) from [<80202884>] (trace_suspend_resume+0x0/0xd8) [ 1056.339563][ C0] r7:82ac27f8 [ 1056.339702][ C0] [<80202850>] (panic) from [<80383f14>] (watchdog_timer_fn+0x2dc/0x350) [ 1056.340042][ C0] r3:00000001 r2:00004000 r1:82a7bd1c r0:82296540 [ 1056.340252][ C0] [<80383c38>] (watchdog_timer_fn) from [<80329b64>] (__hrtimer_run_queues+0x1c4/0x454) [ 1056.340631][ C0] r10:8281b500 r9:00000000 r8:dddc7130 r7:80383c38 r6:dddc7000 r5:dddc7040 [ 1056.340913][ C0] r4:dddc75d8 [ 1056.341054][ C0] [<803299a0>] (__hrtimer_run_queues) from [<8032b168>] (hrtimer_interrupt+0x148/0x2bc) [ 1056.341410][ C0] r10:ea702ce0 r9:dddc7180 r8:dddc7130 r7:000000f5 r6:00000003 r5:20000193 [ 1056.341665][ C0] r4:dddc7000 [ 1056.341800][ C0] [<8032b020>] (hrtimer_interrupt) from [<81340630>] (arch_timer_handler_virt+0x30/0x38) [ 1056.342157][ C0] r10:81d0fc78 r9:8309e400 r8:00000000 r7:00000000 r6:00000000 r5:82498528 [ 1056.342425][ C0] r4:8309de40 [ 1056.342561][ C0] [<81340600>] (arch_timer_handler_virt) from [<802ef9b4>] (handle_percpu_devid_irq+0x128/0x34c) [ 1056.342924][ C0] [<802ef88c>] (handle_percpu_devid_irq) from [<802e8b44>] (handle_irq_desc+0x74/0x84) [ 1056.343267][ C0] r10:00000001 r9:8281b500 r8:00000000 r7:df80a00c r6:826c2388 r5:df80a000 [ 1056.343566][ C0] r4:8280cc44 [ 1056.343700][ C0] [<802e8ad0>] (handle_irq_desc) from [<802e8bc0>] (generic_handle_domain_irq+0x18/0x1c) [ 1056.344062][ C0] [<802e8ba8>] (generic_handle_domain_irq) from [<802012c8>] (gic_handle_irq+0x68/0x7c) [ 1056.344404][ C0] [<80201260>] (gic_handle_irq) from [<81aad688>] (generic_handle_arch_irq+0x60/0x80) [ 1056.344756][ C0] r7:82801b90 r6:82443ff8 r5:8247f12c r4:826c3a9c [ 1056.344980][ C0] [<81aad628>] (generic_handle_arch_irq) from [<80200bdc>] (__irq_svc+0x7c/0xbc) [ 1056.345315][ C0] Exception stack(0x82801b90 to 0x82801bd8) [ 1056.345539][ C0] 1b80: ddddb488 830bf3b0 00000103 00000f09 [ 1056.345833][ C0] 1ba0: 830bf380 830bf3b0 82801cb8 ddddb488 d47d2400 00000098 00000001 82801bec [ 1056.346117][ C0] 1bc0: 82801bf0 82801be0 80346df4 81abba7c 60000113 ffffffff [ 1056.346374][ C0] r9:8281b500 r8:d47d2400 r7:82801bc4 r6:ffffffff r5:60000113 r4:81abba7c [ 1056.346661][ C0] [<81abba54>] (_raw_spin_unlock_irq) from [<80346df4>] (tmigr_handle_remote_up+0x268/0x4b0) [ 1056.347030][ C0] [<80346b8c>] (tmigr_handle_remote_up) from [<803450a4>] (__walk_groups_from+0x3c/0xe4) [ 1056.347422][ C0] r10:8281b500 r9:8280c820 r8:80346b8c r7:82801cb8 r6:830bf380 r5:00000002 [ 1056.347699][ C0] r4:830bf380 [ 1056.347849][ C0] [<80345068>] (__walk_groups_from) from [<8034743c>] (tmigr_handle_remote+0xe8/0x108) [ 1056.348208][ C0] r9:82804d80 r8:00000102 r7:00000001 r6:00000082 r5:00000002 r4:dddc7488 [ 1056.348474][ C0] [<80347354>] (tmigr_handle_remote) from [<80327600>] (run_timer_softirq+0x30/0x34) [ 1056.348836][ C0] r4:82804084 [ 1056.348976][ C0] [<803275d0>] (run_timer_softirq) from [<8025b55c>] (handle_softirqs+0x140/0x458) [ 1056.349315][ C0] [<8025b41c>] (handle_softirqs) from [<8025b9d0>] (__irq_exit_rcu+0x110/0x1d0) [ 1056.349650][ C0] r10:00000000 r9:8281b500 r8:00000000 r7:82801dd8 r6:82443ff8 r5:8247f12c [ 1056.349948][ C0] r4:8281b500 [ 1056.350084][ C0] [<8025b8c0>] (__irq_exit_rcu) from [<8025bd48>] (irq_exit+0x10/0x18) [ 1056.350394][ C0] r5:8247f12c r4:826c3a9c [ 1056.350557][ C0] [<8025bd38>] (irq_exit) from [<81aad6a4>] (generic_handle_arch_irq+0x7c/0x80) [ 1056.350898][ C0] [<81aad628>] (generic_handle_arch_irq) from [<80200bdc>] (__irq_svc+0x7c/0xbc) [ 1056.351232][ C0] Exception stack(0x82801dd8 to 0x82801e20) [ 1056.351495][ C0] 1dc0: 00000001 00000000 [ 1056.351809][ C0] 1de0: 00001f8a 00001f88 8403cb68 00000004 00000001 8403cb68 84484688 8403ca40 [ 1056.352109][ C0] 1e00: 00000000 82801e3c 82801e28 82801e28 81abbc0c 81abbc34 80000013 ffffffff [ 1056.352401][ C0] r9:8281b500 r8:84484688 r7:82801e0c r6:ffffffff r5:80000013 r4:81abbc34 [ 1056.352671][ C0] [<81abbbf4>] (_raw_spin_lock) from [<809c77ac>] (gpio_mmio_set+0x44/0x80) [ 1056.353009][ C0] r5:00000004 r4:8403ca40 [ 1056.353194][ C0] [<809c7768>] (gpio_mmio_set) from [<809b7f68>] (gpiochip_set+0x1c/0x44) [ 1056.353521][ C0] r7:00000001 r6:00000000 r5:00000002 r4:841693e8 [ 1056.353746][ C0] [<809b7f4c>] (gpiochip_set) from [<809ba830>] (gpiod_set_raw_value_commit+0x78/0x218) [ 1056.354090][ C0] [<809ba7b8>] (gpiod_set_raw_value_commit) from [<809bc0d0>] (gpiod_set_value_nocheck+0x44/0x58) [ 1056.354441][ C0] r10:00000000 r9:00000000 r8:00000001 r7:dddce4c0 r6:838c4758 r5:00000001 [ 1056.354698][ C0] r4:841693e8 [ 1056.354857][ C0] [<809bc08c>] (gpiod_set_value_nocheck) from [<809bc120>] (gpiod_set_value+0x3c/0x88) [ 1056.355203][ C0] [<809bc0e4>] (gpiod_set_value) from [<809cc8bc>] (gpio_led_set+0x5c/0x60) [ 1056.355537][ C0] r5:000000ff r4:8334f224 [ 1056.355698][ C0] [<809cc860>] (gpio_led_set) from [<809ca1e4>] (led_set_brightness+0x84/0x90) [ 1056.356017][ C0] r5:000000ff r4:8334f224 [ 1056.356173][ C0] [<809ca160>] (led_set_brightness) from [<809cbd64>] (led_trigger_event+0x40/0x58) [ 1056.356499][ C0] r5:000000ff r4:8334f224 [ 1056.356659][ C0] [<809cbd24>] (led_trigger_event) from [<809cd3c0>] (ledtrig_cpu+0xac/0xf4) [ 1056.356980][ C0] r7:dddce4c0 r6:00000002 r5:82b15cd8 r4:000001fd [ 1056.357184][ C0] [<809cd314>] (ledtrig_cpu) from [<80227a38>] (arch_cpu_idle_exit+0x14/0x18) [ 1056.357512][ C0] r9:00000000 r8:00000000 r7:8280c710 r6:8281b500 r5:8280c6d0 r4:00000000 [ 1056.357769][ C0] [<80227a24>] (arch_cpu_idle_exit) from [<802b158c>] (do_idle+0x5c/0x2d8) [ 1056.358166][ C0] [<802b1530>] (do_idle) from [<802b1b38>] (cpu_startup_entry+0x30/0x34) [ 1056.358503][ C0] r10:8281aff4 r9:8280c680 r8:823bec00 r7:00000000 r6:deffc06c r5:828222e8 [ 1056.358765][ C0] r4:000000ed [ 1056.358904][ C0] [<802b1b08>] (cpu_startup_entry) from [<81aaf0bc>] (kernel_init+0x0/0x138) [ 1056.359225][ C0] [<81aaefdc>] (rest_init) from [<8260145c>] (start_kernel+0x844/0x860) [ 1056.359564][ C0] [<82600c18>] (start_kernel) from [<00000000>] (0x0) [ 1056.361936][ C0] Rebooting in 86400 seconds..