last executing test programs: 3.38689826s ago: executing program 0 (id=2260): r0 = openat$vsock(0xffffff9c, &(0x7f0000000000), 0x80000, 0x0) close_range(r0, r0, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKINFO_SET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x14, 0x0, 0x200, 0x70bd28, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x8001}, 0x80) 3.299700391s ago: executing program 0 (id=2262): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg$unix(r0, &(0x7f0000001900)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}], 0x1, 0x0, 0x0) ioctl$KDFONTOP_COPY(r2, 0x5450, 0x0) 3.219820481s ago: executing program 0 (id=2264): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$mixer(0xffffff9c, &(0x7f0000000040), 0x28040, 0x0) ioctl$DMA_HEAP_IOCTL_ALLOC(r1, 0xc0184800, &(0x7f0000000000)={0x7, r0, 0x1}) sendmsg$IPSET_CMD_RENAME(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={0x0}, 0x1, 0x0, 0x0, 0x4c45}, 0x20000080) 3.139602621s ago: executing program 0 (id=2265): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) sendto$l2tp6(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x3}, 0x20) sendmsg$NL80211_CMD_DEL_PMK(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}, 0x1, 0x0, 0x0, 0x20014094}, 0x24004000) 540.214851ms ago: executing program 0 (id=2296): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r1, &(0x7f0000000840)={0x0, 0x0, 0x0}, 0x0) recvmsg$unix(r0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_netprio_ifpriomap(r2, 0x0, 0x0) 540.071662ms ago: executing program 1 (id=2297): r0 = openat$selinux_policy(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) write$P9_RSETATTR(r0, 0x0, 0x0) 427.942396ms ago: executing program 0 (id=2298): socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x8000f28, 0x0) write$tcp_mem(r1, &(0x7f0000000140)={0x8000000000000001, 0x20, 0x2, 0x20, 0x8}, 0x48) 334.871378ms ago: executing program 1 (id=2299): r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x3, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r2, 0x5450, 0x0) 251.165839ms ago: executing program 1 (id=2300): r0 = socket(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000040)={0x1d, r1, 0x3, {0x0, 0x0, 0x1}}, 0x18) sendmsg$TIPC_NL_LINK_RESET_STATS(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={0x0, 0x14}}, 0x4) 168.965189ms ago: executing program 1 (id=2301): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg$unix(r0, &(0x7f0000001900)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}], 0x1, 0x0, 0x0) ioctl$KDFONTOP_COPY(r2, 0x5450, 0x0) 100.220538ms ago: executing program 1 (id=2302): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$mixer(0xffffff9c, &(0x7f0000000040), 0x28040, 0x0) ioctl$DMA_HEAP_IOCTL_ALLOC(r1, 0xc0184800, &(0x7f0000000000)={0x7, r0, 0x1}) sendmsg$IPSET_CMD_RENAME(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={0x0}, 0x1, 0x0, 0x0, 0x4c45}, 0x20000080) 0s ago: executing program 1 (id=2303): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup3(r0, r1, 0x0) sendmsg$ETHTOOL_MSG_FEATURES_GET(r2, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4008040}, 0x48000) kernel console output (not intermixed with test programs): [ 53.297354][ T29] audit: type=1400 audit(53.210:56): avc: denied { read write } for pid=3087 comm="sftp-server" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 53.307828][ T29] audit: type=1400 audit(53.220:57): avc: denied { open } for pid=3087 comm="sftp-server" path="/dev/null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 Warning: Permanently added '[localhost]:42295' (ED25519) to the list of known hosts. [ 67.956788][ T29] audit: type=1400 audit(67.860:58): avc: denied { name_bind } for pid=3090 comm="sshd-session" src=30000 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 69.496759][ T29] audit: type=1400 audit(69.410:59): avc: denied { execute } for pid=3091 comm="sh" name="syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 69.533745][ T29] audit: type=1400 audit(69.440:60): avc: denied { execute_no_trans } for pid=3091 comm="sh" path="/syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 72.724002][ T29] audit: type=1400 audit(72.640:61): avc: denied { mounton } for pid=3091 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=806 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 72.730792][ T29] audit: type=1400 audit(72.650:62): avc: denied { mount } for pid=3091 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 72.741299][ T3091] cgroup: Unknown subsys name 'net' [ 72.746525][ T29] audit: type=1400 audit(72.660:63): avc: denied { unmount } for pid=3091 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 72.888913][ T3091] cgroup: Unknown subsys name 'cpuset' [ 72.894891][ T3091] cgroup: Unknown subsys name 'hugetlb' [ 72.899815][ T3091] cgroup: Unknown subsys name 'rlimit' [ 73.125649][ T29] audit: type=1400 audit(73.040:64): avc: denied { setattr } for pid=3091 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 73.135424][ T29] audit: type=1400 audit(73.040:65): avc: denied { mounton } for pid=3091 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 73.135629][ T29] audit: type=1400 audit(73.050:66): avc: denied { mount } for pid=3091 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 73.360157][ T3093] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 73.363122][ T29] audit: type=1400 audit(73.280:67): avc: denied { relabelto } for pid=3093 comm="mkswap" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 73.374356][ T29] audit: type=1400 audit(73.290:68): avc: denied { write } for pid=3093 comm="mkswap" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 73.413779][ T29] audit: type=1400 audit(73.330:69): avc: denied { read } for pid=3091 comm="syz-executor" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 73.414362][ T29] audit: type=1400 audit(73.330:70): avc: denied { open } for pid=3091 comm="syz-executor" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 81.708100][ T3091] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 83.748022][ T29] audit: type=1400 audit(83.660:71): avc: denied { execmem } for pid=3094 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 83.805651][ T29] audit: type=1400 audit(83.720:72): avc: denied { read } for pid=3096 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 83.806934][ T29] audit: type=1400 audit(83.720:73): avc: denied { open } for pid=3096 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 83.832845][ T29] audit: type=1400 audit(83.750:74): avc: denied { mounton } for pid=3096 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 83.857746][ T29] audit: type=1400 audit(83.770:75): avc: denied { module_request } for pid=3096 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 83.857983][ T29] audit: type=1400 audit(83.780:76): avc: denied { module_request } for pid=3097 comm="syz-executor" kmod="netdev-nr1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 83.915916][ T29] audit: type=1400 audit(83.830:77): avc: denied { sys_module } for pid=3097 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 84.633297][ T29] audit: type=1400 audit(84.550:78): avc: denied { ioctl } for pid=3097 comm="syz-executor" path="/dev/net/tun" dev="devtmpfs" ino=677 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 85.721459][ T3097] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 85.730680][ T3097] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 85.820991][ T3096] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 85.830470][ T3096] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 86.572322][ T3097] hsr_slave_0: entered promiscuous mode [ 86.579838][ T3097] hsr_slave_1: entered promiscuous mode [ 86.675337][ T3096] hsr_slave_0: entered promiscuous mode [ 86.681995][ T3096] hsr_slave_1: entered promiscuous mode [ 86.684641][ T3096] debugfs: 'hsr0' already exists in 'hsr' [ 86.689955][ T3096] Cannot create hsr debugfs directory [ 87.108265][ T29] audit: type=1400 audit(87.020:79): avc: denied { create } for pid=3097 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 87.110232][ T29] audit: type=1400 audit(87.020:80): avc: denied { write } for pid=3097 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 87.119247][ T3097] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 87.132309][ T3097] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 87.150490][ T3097] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 87.160889][ T3097] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 87.251444][ T3096] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 87.268570][ T3096] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 87.281415][ T3096] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 87.296455][ T3096] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 88.050503][ T3097] 8021q: adding VLAN 0 to HW filter on device bond0 [ 88.141308][ T3096] 8021q: adding VLAN 0 to HW filter on device bond0 [ 90.992232][ T3097] veth0_vlan: entered promiscuous mode [ 91.031481][ T3097] veth1_vlan: entered promiscuous mode [ 91.055357][ T3096] veth0_vlan: entered promiscuous mode [ 91.081455][ T3096] veth1_vlan: entered promiscuous mode [ 91.164577][ T3097] veth0_macvtap: entered promiscuous mode [ 91.182478][ T3096] veth0_macvtap: entered promiscuous mode [ 91.193359][ T3097] veth1_macvtap: entered promiscuous mode [ 91.203068][ T3096] veth1_macvtap: entered promiscuous mode [ 91.299585][ T2075] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 91.313928][ T2075] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 91.314466][ T2075] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 91.316124][ T2075] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 91.388570][ T2075] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 91.389696][ T2075] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 91.389843][ T2075] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 91.389930][ T2075] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 91.446163][ T29] kauditd_printk_skb: 1 callbacks suppressed [ 91.453354][ T29] audit: type=1400 audit(91.360:82): avc: denied { mount } for pid=3096 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 91.475546][ T29] audit: type=1400 audit(91.390:83): avc: denied { mounton } for pid=3096 comm="syz-executor" path="/syzkaller.8ktNmJ/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 91.485161][ T29] audit: type=1400 audit(91.400:84): avc: denied { mount } for pid=3096 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 91.495412][ T29] audit: type=1400 audit(91.410:85): avc: denied { mounton } for pid=3096 comm="syz-executor" path="/syzkaller.8ktNmJ/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 91.502373][ T29] audit: type=1400 audit(91.420:86): avc: denied { mounton } for pid=3096 comm="syz-executor" path="/syzkaller.8ktNmJ/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=3192 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 91.532247][ T29] audit: type=1400 audit(91.450:87): avc: denied { unmount } for pid=3096 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 91.546522][ T29] audit: type=1400 audit(91.460:88): avc: denied { mounton } for pid=3096 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=772 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 91.567103][ T29] audit: type=1400 audit(91.470:89): avc: denied { mount } for pid=3096 comm="syz-executor" name="/" dev="gadgetfs" ino=3193 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 91.568944][ T29] audit: type=1400 audit(91.480:90): avc: denied { mount } for pid=3096 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 91.569041][ T29] audit: type=1400 audit(91.480:91): avc: denied { mounton } for pid=3096 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 91.648235][ T3096] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 94.795633][ T3790] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3790 comm=syz.0.41 [ 95.385973][ T3803] Zero length message leads to an empty skb [ 98.112255][ T29] kauditd_printk_skb: 18 callbacks suppressed [ 98.113443][ T29] audit: type=1400 audit(98.030:110): avc: denied { execute } for pid=3827 comm="syz.1.59" path=2F6D656D66643A0B656DDA9952406DFCFE9B232AFF202864656C6574656429 dev="tmpfs" ino=1025 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 99.788173][ T3859] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=3859 comm=syz.0.74 [ 99.859735][ T29] audit: type=1400 audit(99.780:111): avc: denied { create } for pid=3860 comm="syz.0.75" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 101.715812][ T29] audit: type=1400 audit(101.630:112): avc: denied { write } for pid=3911 comm="syz.0.100" name="ip_mr_cache" dev="proc" ino=4026532764 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 102.289917][ T29] audit: type=1400 audit(102.210:113): avc: denied { setattr } for pid=3932 comm="syz.1.111" name="" dev="pipefs" ino=2696 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=1 [ 102.857924][ T3954] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=3954 comm=syz.0.120 [ 103.167030][ T3966] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5137 sclass=netlink_route_socket pid=3966 comm=syz.1.126 [ 103.432952][ T29] audit: type=1400 audit(103.350:114): avc: denied { create } for pid=3974 comm="syz.0.131" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 103.438950][ T29] audit: type=1400 audit(103.360:115): avc: denied { write } for pid=3974 comm="syz.0.131" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 103.531850][ T29] audit: type=1400 audit(103.450:116): avc: denied { map_create } for pid=3978 comm="syz.0.133" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 106.294741][ T29] audit: type=1400 audit(106.210:117): avc: denied { mount } for pid=3992 comm="syz.0.139" name="/" dev="sysfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=filesystem permissive=1 [ 106.322236][ T29] audit: type=1400 audit(106.240:118): avc: denied { unmount } for pid=3096 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=filesystem permissive=1 [ 107.101660][ T29] audit: type=1400 audit(107.020:119): avc: denied { ioctl } for pid=4004 comm="syz.0.145" path="socket:[3696]" dev="sockfs" ino=3696 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 107.111056][ T29] audit: type=1400 audit(107.030:120): avc: denied { bind } for pid=4004 comm="syz.0.145" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 108.374490][ T4018] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4018 comm=syz.0.151 [ 108.384058][ T29] audit: type=1400 audit(108.300:121): avc: denied { create } for pid=4017 comm="syz.1.152" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 108.392183][ T29] audit: type=1400 audit(108.310:122): avc: denied { write } for pid=4017 comm="syz.1.152" path="socket:[3726]" dev="sockfs" ino=3726 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 109.010697][ T4043] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=258 sclass=netlink_route_socket pid=4043 comm=syz.1.164 [ 109.356316][ T4056] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4056 comm=syz.0.170 [ 109.915586][ T29] audit: type=1400 audit(109.830:123): avc: denied { map } for pid=4076 comm="syz.1.181" path="socket:[2910]" dev="sockfs" ino=2910 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tcp_socket permissive=1 [ 110.494290][ T29] audit: type=1400 audit(110.410:124): avc: denied { bpf } for pid=4100 comm="syz.1.192" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 110.501579][ T29] audit: type=1400 audit(110.420:125): avc: denied { map_read map_write } for pid=4100 comm="syz.1.192" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 111.641074][ T29] audit: type=1400 audit(111.560:126): avc: denied { ioctl } for pid=4126 comm="syz.1.205" path="socket:[2996]" dev="sockfs" ino=2996 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 111.828363][ T29] audit: type=1400 audit(111.740:127): avc: denied { create } for pid=4134 comm="syz.1.209" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 111.831845][ T29] audit: type=1400 audit(111.750:128): avc: denied { read } for pid=4134 comm="syz.1.209" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 111.893136][ T4138] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=4138 comm=syz.0.210 [ 112.332234][ T4154] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 112.345152][ T29] audit: type=1400 audit(112.260:129): avc: denied { bind } for pid=4152 comm="syz.0.218" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 112.347938][ T29] audit: type=1400 audit(112.260:130): avc: denied { name_bind } for pid=4152 comm="syz.0.218" src=20004 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=rawip_socket permissive=1 [ 112.350148][ T29] audit: type=1400 audit(112.260:131): avc: denied { node_bind } for pid=4152 comm="syz.0.218" src=20004 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 [ 112.356697][ T29] audit: type=1400 audit(112.270:132): avc: denied { read } for pid=4152 comm="syz.0.218" lport=20004 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 113.445249][ T4176] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4176 comm=syz.0.227 [ 113.999024][ T4191] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=271 sclass=netlink_tcpdiag_socket pid=4191 comm=syz.0.235 [ 114.793943][ T4217] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4217 comm=syz.0.246 [ 115.026940][ T29] kauditd_printk_skb: 1 callbacks suppressed [ 115.038638][ T29] audit: type=1400 audit(114.940:134): avc: denied { setopt } for pid=4224 comm="syz.0.251" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 115.339804][ T29] audit: type=1400 audit(115.250:135): avc: denied { create } for pid=4234 comm="syz.1.256" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 115.354596][ T29] audit: type=1400 audit(115.270:136): avc: denied { ioctl } for pid=4234 comm="syz.1.256" path="socket:[5143]" dev="sockfs" ino=5143 ioctlcmd=0x8904 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 115.836770][ T29] audit: type=1400 audit(115.750:137): avc: denied { connect } for pid=4253 comm="syz.0.266" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 115.846614][ T4255] Dead loop on virtual device ip6_vti0, fix it urgently! [ 116.339344][ T4281] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=311 sclass=netlink_route_socket pid=4281 comm=syz.1.279 [ 116.891679][ T29] audit: type=1400 audit(116.810:138): avc: denied { read } for pid=4298 comm="syz.1.288" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 116.934309][ T4301] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=65534 sclass=netlink_audit_socket pid=4301 comm=syz.0.289 [ 117.022127][ T29] audit: type=1400 audit(116.940:139): avc: denied { ioctl } for pid=4303 comm="syz.0.291" path="socket:[4341]" dev="sockfs" ino=4341 ioctlcmd=0x89e2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 117.476313][ T29] audit: type=1400 audit(117.390:140): avc: denied { create } for pid=4320 comm="syz.0.300" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 117.491156][ T29] audit: type=1400 audit(117.410:141): avc: denied { bind } for pid=4320 comm="syz.0.300" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 117.508739][ T29] audit: type=1400 audit(117.430:142): avc: denied { remount } for pid=4321 comm="syz.1.299" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 117.585954][ T29] audit: type=1400 audit(117.500:143): avc: denied { ioctl } for pid=4324 comm="syz.0.301" path="socket:[4390]" dev="sockfs" ino=4390 ioctlcmd=0x894c scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 117.791347][ T52] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 117.866192][ T52] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 117.928218][ T52] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 117.978744][ T52] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 118.295218][ T52] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 118.305644][ T52] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 118.316045][ T52] bond0 (unregistering): Released all slaves [ 118.416545][ T52] hsr_slave_0: left promiscuous mode [ 118.433320][ T52] hsr_slave_1: left promiscuous mode [ 118.452675][ T52] veth1_macvtap: left promiscuous mode [ 118.453354][ T52] veth0_macvtap: left promiscuous mode [ 118.453692][ T52] veth1_vlan: left promiscuous mode [ 118.453967][ T52] veth0_vlan: left promiscuous mode [ 120.348858][ T4415] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4415 comm=syz.0.305 [ 121.099423][ T4331] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 121.111025][ T4331] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 122.061507][ T4331] hsr_slave_0: entered promiscuous mode [ 122.063519][ T4331] hsr_slave_1: entered promiscuous mode [ 122.703863][ T4331] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 122.719145][ T4331] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 122.731481][ T4331] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 122.745378][ T4331] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 123.546022][ T4331] 8021q: adding VLAN 0 to HW filter on device bond0 [ 123.619393][ T29] audit: type=1400 audit(123.540:144): avc: denied { ioctl } for pid=4673 comm="syz.0.309" path="socket:[5559]" dev="sockfs" ino=5559 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 126.109529][ T4331] veth0_vlan: entered promiscuous mode [ 126.134972][ T4331] veth1_vlan: entered promiscuous mode [ 126.211520][ T4331] veth0_macvtap: entered promiscuous mode [ 126.223066][ T4331] veth1_macvtap: entered promiscuous mode [ 126.292671][ T32] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 126.293058][ T32] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 126.293153][ T32] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 126.293222][ T32] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 130.993776][ T4812] input: syz0 as /devices/virtual/input/input3 [ 133.671628][ T4830] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4830 comm=syz.1.343 [ 135.358301][ T4845] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4845 comm=syz.1.351 [ 135.733746][ T29] audit: type=1400 audit(135.650:145): avc: denied { create } for pid=4859 comm="syz.1.358" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 135.748675][ T29] audit: type=1400 audit(135.670:146): avc: denied { allowed } for pid=4859 comm="syz.1.358" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 135.764053][ T29] audit: type=1400 audit(135.680:147): avc: denied { create } for pid=4859 comm="syz.1.358" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 135.771306][ T29] audit: type=1400 audit(135.690:148): avc: denied { map } for pid=4859 comm="syz.1.358" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=5880 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 135.771643][ T29] audit: type=1400 audit(135.690:149): avc: denied { read write } for pid=4859 comm="syz.1.358" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=5880 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 135.799901][ T29] audit: type=1400 audit(135.720:150): avc: denied { write } for pid=4859 comm="syz.1.358" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 135.911232][ T4867] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4867 comm=syz.1.361 [ 138.372733][ T29] audit: type=1400 audit(138.290:151): avc: denied { unmount } for pid=3096 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 143.889103][ T4937] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4937 comm=syz.1.395 [ 147.652471][ T4953] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4953 comm=syz.0.400 [ 148.046143][ T4966] ======================================================= [ 148.046143][ T4966] WARNING: The mand mount option has been deprecated and [ 148.046143][ T4966] and is ignored by this kernel. Remove the mand [ 148.046143][ T4966] option from the mount to silence this warning. [ 148.046143][ T4966] ======================================================= [ 148.053102][ T29] audit: type=1400 audit(147.970:152): avc: denied { mount } for pid=4965 comm="syz.1.409" name="/" dev="ramfs" ino=6031 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 148.087974][ T29] audit: type=1400 audit(147.990:153): avc: denied { unmount } for pid=4331 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 149.994236][ T29] audit: type=1400 audit(149.910:154): avc: denied { setopt } for pid=5029 comm="syz.1.440" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 150.043610][ T29] audit: type=1400 audit(149.960:155): avc: denied { create } for pid=5031 comm="syz.0.442" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 150.049640][ T29] audit: type=1400 audit(149.970:156): avc: denied { write } for pid=5031 comm="syz.0.442" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 150.049729][ T5032] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=5032 comm=syz.0.442 [ 150.334814][ T5043] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=5043 comm=syz.1.448 [ 150.879306][ T5064] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5064 comm=syz.0.458 [ 151.225962][ T5078] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5078 comm=syz.1.464 [ 155.595414][ T5144] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5144 comm=syz.0.497 [ 157.936024][ T5158] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5158 comm=syz.1.502 [ 159.421558][ T29] audit: type=1400 audit(159.340:157): avc: denied { create } for pid=5211 comm="syz.1.530" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 159.432378][ T29] audit: type=1400 audit(159.350:158): avc: denied { write } for pid=5211 comm="syz.1.530" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 161.170766][ T5238] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5238 comm=syz.0.544 [ 162.432658][ T5249] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5249 comm=syz.1.549 [ 177.595822][ T29] audit: type=1400 audit(177.510:159): avc: denied { getopt } for pid=5376 comm="syz.0.610" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 177.966836][ T29] audit: type=1400 audit(177.880:160): avc: denied { watch_mount watch_reads } for pid=5384 comm="syz.0.614" path="pipe:[618]" dev="pipefs" ino=618 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=1 [ 180.482892][ T29] audit: type=1400 audit(180.400:161): avc: denied { name_bind } for pid=5401 comm="syz.0.622" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 183.570862][ T29] audit: type=1400 audit(183.490:162): avc: denied { setopt } for pid=5435 comm="syz.0.638" lport=255 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 186.596450][ T29] audit: type=1400 audit(186.510:163): avc: denied { setopt } for pid=5545 comm="syz.0.692" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 186.689460][ T5551] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 186.700983][ T29] audit: type=1400 audit(186.620:164): avc: denied { getopt } for pid=5549 comm="syz.1.695" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 187.895375][ T5597] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1005 sclass=netlink_route_socket pid=5597 comm=syz.1.717 [ 188.161860][ T29] audit: type=1400 audit(188.080:165): avc: denied { create } for pid=5606 comm="syz.0.722" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 188.620483][ T29] audit: type=1400 audit(188.540:166): avc: denied { getopt } for pid=5624 comm="syz.1.731" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 192.924918][ T5650] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5650 comm=syz.0.742 [ 193.180930][ T5656] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5656 comm=syz.0.745 [ 194.879478][ T29] audit: type=1400 audit(194.800:167): avc: denied { ioctl } for pid=5673 comm="syz.1.754" path="socket:[9312]" dev="sockfs" ino=9312 ioctlcmd=0x5411 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 195.732664][ T5698] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5698 comm=syz.0.766 [ 195.999250][ T29] audit: type=1400 audit(195.920:168): avc: denied { create } for pid=5705 comm="syz.1.770" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1 [ 196.007037][ T29] audit: type=1400 audit(195.920:169): avc: denied { write } for pid=5705 comm="syz.1.770" path="socket:[9391]" dev="sockfs" ino=9391 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1 [ 196.270968][ T5712] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5712 comm=syz.1.773 [ 196.450312][ T29] audit: type=1400 audit(196.370:170): avc: denied { mounton } for pid=5716 comm="syz.1.775" path="/250/file0" dev="tmpfs" ino=1286 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 197.283917][ T5737] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5737 comm=syz.1.784 [ 198.562916][ T5766] capability: warning: `syz.0.798' uses 32-bit capabilities (legacy support in use) [ 199.750878][ T5803] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5803 comm=syz.1.816 [ 203.619290][ T5861] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5861 comm=syz.1.842 [ 204.551544][ T5878] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5878 comm=syz.0.850 [ 207.433562][ T5897] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=271 sclass=netlink_tcpdiag_socket pid=5897 comm=syz.1.860 [ 208.212549][ T52] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 208.289248][ T52] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 208.329348][ T52] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 208.405864][ T52] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 208.681960][ T52] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 208.689214][ T52] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 208.693344][ T52] bond0 (unregistering): Released all slaves [ 208.793453][ T52] hsr_slave_0: left promiscuous mode [ 208.801630][ T52] hsr_slave_1: left promiscuous mode [ 208.822429][ T52] veth1_macvtap: left promiscuous mode [ 208.822889][ T52] veth0_macvtap: left promiscuous mode [ 208.823366][ T52] veth1_vlan: left promiscuous mode [ 208.823623][ T52] veth0_vlan: left promiscuous mode [ 210.871968][ T5922] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 210.883761][ T5922] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 211.782603][ T5922] hsr_slave_0: entered promiscuous mode [ 211.786140][ T5922] hsr_slave_1: entered promiscuous mode [ 211.789404][ T5922] debugfs: 'hsr0' already exists in 'hsr' [ 211.790750][ T5922] Cannot create hsr debugfs directory [ 212.388224][ T5922] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 212.392934][ T5922] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 212.401102][ T5922] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 212.406172][ T5922] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 213.105022][ T5922] 8021q: adding VLAN 0 to HW filter on device bond0 [ 216.113957][ T5922] veth0_vlan: entered promiscuous mode [ 216.134005][ T5922] veth1_vlan: entered promiscuous mode [ 216.223764][ T5922] veth0_macvtap: entered promiscuous mode [ 216.243488][ T5922] veth1_macvtap: entered promiscuous mode [ 216.328351][ T60] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 216.329274][ T60] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 216.329380][ T60] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 216.329443][ T60] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 221.530264][ T6399] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6399 comm=syz.1.913 [ 221.870671][ T6413] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6413 comm=syz.1.920 [ 222.366140][ T6425] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6425 comm=syz.0.926 [ 222.526054][ T6431] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6431 comm=syz.1.933 [ 222.999020][ T6451] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=6451 comm=syz.0.936 [ 223.378976][ T6464] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=6464 comm=syz.1.944 [ 240.228875][ T6566] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6566 comm=syz.0.990 [ 240.641519][ T6580] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6580 comm=syz.1.998 [ 240.862216][ T29] audit: type=1400 audit(240.780:171): avc: denied { associate } for pid=6585 comm="syz.1.1001" name="pfkey" scontext=root:object_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 240.959803][ T29] audit: type=1400 audit(240.880:172): avc: denied { create } for pid=6587 comm="syz.1.1002" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 241.423922][ T29] audit: type=1400 audit(241.340:173): avc: denied { map } for pid=6600 comm="syz.1.1008" path="socket:[11420]" dev="sockfs" ino=11420 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=unix_stream_socket permissive=1 [ 242.106188][ T29] audit: type=1400 audit(242.020:174): avc: denied { create } for pid=6616 comm="syz.1.1016" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 242.113424][ T29] audit: type=1400 audit(242.030:175): avc: denied { setopt } for pid=6616 comm="syz.1.1016" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 243.060072][ T6644] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6644 comm=syz.0.1029 [ 243.155711][ T29] audit: type=1400 audit(243.070:176): avc: denied { ioctl } for pid=6645 comm="syz.0.1030" path="net:[4026532739]" dev="nsfs" ino=4026532739 ioctlcmd=0xb703 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 243.293520][ T6651] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6651 comm=syz.0.1032 [ 243.569618][ T6666] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6666 comm=syz.1.1041 [ 244.304164][ T6701] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=6701 comm=syz.1.1058 [ 244.651800][ T6716] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1011 sclass=netlink_route_socket pid=6716 comm=syz.0.1065 [ 246.660886][ T29] audit: type=1400 audit(246.580:177): avc: denied { create } for pid=6762 comm="syz.0.1088" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 246.672347][ T29] audit: type=1400 audit(246.590:178): avc: denied { setopt } for pid=6762 comm="syz.0.1088" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 247.671378][ T29] audit: type=1400 audit(247.590:179): avc: denied { create } for pid=6780 comm="syz.0.1097" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=mctp_socket permissive=1 [ 247.675557][ T29] audit: type=1400 audit(247.590:180): avc: denied { ioctl } for pid=6780 comm="syz.0.1097" path="socket:[11698]" dev="sockfs" ino=11698 ioctlcmd=0x89e2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=mctp_socket permissive=1 [ 247.679061][ T29] audit: type=1400 audit(247.600:181): avc: denied { bind } for pid=6780 comm="syz.0.1097" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=mctp_socket permissive=1 [ 248.454218][ T6798] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6798 comm=syz.0.1105 [ 250.365570][ T6822] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6822 comm=syz.0.1117 [ 254.656852][ T6882] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=6882 comm=syz.0.1145 [ 254.989513][ T29] audit: type=1400 audit(254.910:182): avc: denied { ioctl } for pid=6895 comm="syz.1.1152" path="socket:[12636]" dev="sockfs" ino=12636 ioctlcmd=0x5451 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 255.343870][ T29] audit: type=1400 audit(255.260:183): avc: denied { read } for pid=6904 comm="syz.0.1157" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 255.891089][ T6928] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=6928 comm=syz.1.1168 [ 256.550224][ T6957] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=6957 comm=syz.1.1183 [ 256.851626][ T6971] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=6971 comm=syz.1.1189 [ 257.176500][ T29] audit: type=1400 audit(257.090:184): avc: denied { append } for pid=6981 comm="syz.0.1195" name="pfkey" dev="proc" ino=4026532810 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 257.186383][ T6982] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6982 comm=syz.0.1195 [ 258.765163][ T29] audit: type=1400 audit(258.680:185): avc: denied { prog_load } for pid=7000 comm="syz.1.1204" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 258.767851][ T29] audit: type=1400 audit(258.680:186): avc: denied { perfmon } for pid=7000 comm="syz.1.1204" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 258.792265][ T29] audit: type=1400 audit(258.710:187): avc: denied { prog_run } for pid=7000 comm="syz.1.1204" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 264.726546][ T7047] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1794 sclass=netlink_route_socket pid=7047 comm=syz.0.1227 [ 264.853429][ T7049] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=7049 comm=syz.1.1228 [ 265.610910][ T7068] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=7068 comm=syz.1.1237 [ 265.954833][ T29] audit: type=1400 audit(265.870:188): avc: denied { ioctl } for pid=7075 comm="syz.1.1241" path="socket:[12193]" dev="sockfs" ino=12193 ioctlcmd=0x3309 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 266.220309][ T7084] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7084 comm=syz.1.1245 [ 266.330483][ T29] audit: type=1400 audit(266.250:189): avc: denied { nlmsg_write } for pid=7087 comm="syz.1.1248" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 270.418689][ T29] audit: type=1400 audit(270.340:190): avc: denied { connect } for pid=7175 comm="syz.1.1286" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 270.511174][ T29] audit: type=1400 audit(270.430:191): avc: denied { connect } for pid=7177 comm="syz.0.1287" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 273.948977][ T29] audit: type=1400 audit(273.870:192): avc: denied { read } for pid=7222 comm="syz.1.1309" path="socket:[13254]" dev="sockfs" ino=13254 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 274.378266][ T7229] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=1541 sclass=netlink_audit_socket pid=7229 comm=syz.1.1311 [ 275.375456][ T29] audit: type=1400 audit(275.290:193): avc: denied { audit_write } for pid=7237 comm="syz.1.1316" capability=29 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 277.052084][ T7258] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7258 comm=syz.0.1326 [ 278.792211][ T29] audit: type=1400 audit(278.710:194): avc: denied { unmount } for pid=4331 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 280.116826][ T29] audit: type=1400 audit(280.030:195): avc: denied { mount } for pid=7361 comm="syz.0.1377" name="/" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=filesystem permissive=1 [ 280.133575][ T29] audit: type=1400 audit(280.050:196): avc: denied { unmount } for pid=5922 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=filesystem permissive=1 [ 280.180696][ T7366] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1546 sclass=netlink_route_socket pid=7366 comm=syz.0.1379 [ 285.226270][ T29] audit: type=1400 audit(285.140:197): avc: denied { setattr } for pid=7438 comm="syz.1.1414" name="RAWv6" dev="sockfs" ino=13820 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 285.436903][ T7448] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=7448 comm=syz.1.1418 [ 285.719808][ T29] audit: type=1400 audit(285.640:198): avc: denied { unmount } for pid=7457 comm="syz.1.1424" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 285.808932][ T29] audit: type=1400 audit(285.720:199): avc: denied { write } for pid=7460 comm="syz.0.1425" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 286.429055][ T7487] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=7487 comm=syz.1.1437 [ 290.178607][ T7547] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=7547 comm=syz.1.1467 [ 296.395014][ T7668] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7668 comm=syz.0.1525 [ 300.722562][ T7688] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7688 comm=syz.0.1538 [ 301.102525][ T7705] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7705 comm=syz.0.1544 [ 301.314333][ T7713] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=7713 comm=syz.1.1548 [ 302.889722][ T7733] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7733 comm=syz.0.1557 [ 303.179302][ T7736] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=7736 comm=syz.1.1558 [ 306.165230][ T7770] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7770 comm=syz.0.1575 [ 309.548217][ T7823] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=7823 comm=syz.1.1601 [ 309.946884][ T7839] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7839 comm=syz.1.1609 [ 310.361429][ T29] audit: type=1400 audit(310.280:200): avc: denied { setopt } for pid=7854 comm="syz.1.1617" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 311.349295][ T7896] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7896 comm=syz.0.1638 [ 311.938659][ T7917] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=7917 comm=syz.0.1647 [ 312.630660][ T7946] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=7946 comm=syz.1.1661 [ 315.037686][ T8010] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8010 comm=syz.1.1693 [ 315.414966][ T8023] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8023 comm=syz.1.1698 [ 315.576540][ T8034] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8034 comm=syz.0.1706 [ 316.515396][ T8069] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=8069 comm=syz.0.1722 [ 317.723626][ T8105] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8105 comm=syz.1.1741 [ 318.648812][ T8111] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=8111 comm=syz.0.1744 [ 324.919973][ T8146] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=8146 comm=syz.0.1760 [ 325.447004][ T8164] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8164 comm=syz.0.1770 [ 325.700645][ T8166] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1546 sclass=netlink_route_socket pid=8166 comm=syz.1.1772 [ 334.166107][ T8260] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=8260 comm=syz.0.1815 [ 339.712451][ T8331] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8331 comm=syz.1.1851 [ 340.043426][ T8343] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8343 comm=syz.1.1857 [ 345.566421][ T8372] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8372 comm=syz.1.1870 [ 348.283942][ T8430] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=8430 comm=syz.1.1896 [ 349.002296][ T8455] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=8455 comm=syz.0.1908 [ 356.143986][ T8529] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=8529 comm=syz.0.1943 [ 356.515452][ T8548] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=8548 comm=syz.0.1951 [ 357.013402][ T8564] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8564 comm=syz.1.1963 [ 357.660985][ T8587] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8587 comm=syz.1.1970 [ 360.049153][ T8647] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8647 comm=syz.0.2001 [ 362.014993][ T8707] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8707 comm=syz.1.2029 [ 362.342572][ T29] audit: type=1400 audit(362.260:201): avc: denied { setopt } for pid=8720 comm="syz.1.2036" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 362.771661][ T29] audit: type=1400 audit(362.690:202): avc: denied { ioctl } for pid=8739 comm="syz.1.2047" path="socket:[19143]" dev="sockfs" ino=19143 ioctlcmd=0x662a scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 362.790125][ T29] audit: type=1400 audit(362.700:203): avc: denied { getopt } for pid=8739 comm="syz.1.2047" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 377.230972][ T8809] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2573 sclass=netlink_route_socket pid=8809 comm=syz.0.2079 [ 377.429730][ T8815] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8815 comm=syz.0.2082 [ 377.750496][ T8825] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8825 comm=syz.0.2087 [ 378.454202][ T29] audit: type=1400 audit(378.370:204): avc: denied { lock } for pid=8840 comm="syz.0.2095" path="socket:[18330]" dev="sockfs" ino=18330 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 379.294692][ T8878] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1281 sclass=netlink_route_socket pid=8878 comm=syz.0.2114 [ 382.998234][ T8930] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8930 comm=syz.0.2139 [ 385.762217][ T8960] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=8960 comm=syz.0.2154 [ 386.876676][ T29] audit: type=1400 audit(386.790:205): avc: denied { read } for pid=8979 comm="syz.1.2163" name="binder-control" dev="binder" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 386.897059][ T29] audit: type=1400 audit(386.810:206): avc: denied { open } for pid=8979 comm="syz.1.2163" path="/dev/binderfs/binder-control" dev="binder" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 386.981507][ T29] audit: type=1400 audit(386.900:207): avc: denied { ioctl } for pid=8979 comm="syz.1.2163" path="/dev/binderfs/binder-control" dev="binder" ino=2 ioctlcmd=0xaf30 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 389.552889][ T9002] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=9002 comm=syz.1.2172 [ 395.169579][ T29] audit: type=1400 audit(395.090:208): avc: denied { getattr } for pid=9063 comm="syz.0.2201" path="user:[4026531837]" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 396.604444][ T29] audit: type=1400 audit(396.520:209): avc: denied { getattr } for pid=9088 comm="syz.0.2214" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=19782 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 402.602078][ T9147] input: syz1 as /devices/virtual/input/input4 [ 403.046813][ T9171] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=9171 comm=syz.0.2251 [ 403.171308][ T9175] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=9175 comm=syz.0.2253 [ 403.267698][ T9178] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=9178 comm=syz.1.2254 [ 403.645818][ T9192] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=9192 comm=syz.1.2261 [ 404.366324][ T9214] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=1025 sclass=netlink_audit_socket pid=9214 comm=syz.1.2272 [ 404.509767][ T9218] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=9218 comm=syz.1.2274 [ 405.293841][ T9236] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=9236 comm=syz.1.2283 [ 858.311005][ C1] watchdog: BUG: soft lockup - CPU#1 stuck for 430s! [swapper/1:0] [ 858.311285][ C1] Modules linked in: [ 858.312076][ C1] CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Not tainted syzkaller #0 PREEMPT [ 858.312293][ C1] Hardware name: ARM-Versatile Express [ 858.312510][ C1] PC is at _raw_spin_lock+0x4c/0x58 [ 858.313220][ C1] LR is at _raw_spin_lock+0x18/0x58 [ 858.313262][ C1] pc : [<81abc000>] lr : [<81abbfcc>] psr: 80000113 [ 858.313298][ C1] sp : df805d68 ip : df805d68 fp : df805d7c [ 858.313329][ C1] r10: 81c05450 r9 : 840eac40 r8 : 840b1a88 [ 858.313363][ C1] r7 : 840ead68 r6 : 00000000 r5 : 00000001 r4 : 840ead68 [ 858.313402][ C1] r3 : 0000ce77 r2 : 0000ce78 r1 : 00000000 r0 : 00000001 [ 858.313507][ C1] Flags: Nzcv IRQs on FIQs on Mode SVC_32 ISA ARM Segment none [ 858.313569][ C1] Control: 30c5387d Table: 84d8b580 DAC: 00000000 [ 858.313668][ C1] Call trace: frame pointer underflow [ 858.313935][ C1] [<81abbfb4>] (_raw_spin_lock) from [<809c7b2c>] (gpio_mmio_set+0x44/0x80) [ 858.314229][ C1] r5:00000001 r4:840eac40 [ 858.314311][ C1] [<809c7ae8>] (gpio_mmio_set) from [<809b82e8>] (gpiochip_set+0x1c/0x44) [ 858.314377][ C1] r7:00000000 r6:00000000 r5:00000000 r4:841766c0 [ 858.314428][ C1] [<809b82cc>] (gpiochip_set) from [<809babb0>] (gpiod_set_raw_value_commit+0x78/0x218) [ 858.314479][ C1] [<809bab38>] (gpiod_set_raw_value_commit) from [<809bc450>] (gpiod_set_value_nocheck+0x44/0x58) [ 858.314554][ C1] r10:81c05450 r9:df805ebc r8:00000102 r7:00002da6 r6:00000026 r5:00000000 [ 858.314580][ C1] r4:841766c0 [ 858.314605][ C1] [<809bc40c>] (gpiod_set_value_nocheck) from [<809bc4a0>] (gpiod_set_value+0x3c/0x88) [ 858.314651][ C1] [<809bc464>] (gpiod_set_value) from [<809ccc3c>] (gpio_led_set+0x5c/0x60) [ 858.314699][ C1] r5:83304044 r4:83304044 [ 858.314714][ C1] [<809ccbe0>] (gpio_led_set) from [<809ca4d4>] (led_set_brightness_nosleep+0x38/0x44) [ 858.314757][ C1] r5:83304044 r4:8455524c [ 858.314772][ C1] [<809ca49c>] (led_set_brightness_nosleep) from [<809cd538>] (led_heartbeat_function+0x84/0x144) [ 858.314812][ C1] [<809cd4b4>] (led_heartbeat_function) from [<80327070>] (call_timer_fn+0x30/0x220) [ 858.314870][ C1] r7:00002da6 r6:809cd4b4 r5:8455524c r4:83216000 [ 858.314885][ C1] [<80327040>] (call_timer_fn) from [<80327524>] (__run_timers+0x2c4/0x3f8) [ 858.314945][ C1] r9:df805ebc r8:00002da6 r7:00000000 r6:809cd4b4 r5:dddd9f00 r4:8455524c [ 858.314960][ C1] [<80327260>] (__run_timers) from [<803276c0>] (run_timer_base+0x68/0x78) [ 858.315017][ C1] r10:83216000 r9:82804d80 r8:00000102 r7:00000001 r6:00000082 r5:00000002 [ 858.315035][ C1] r4:dddd9f00 [ 858.315049][ C1] [<80327658>] (run_timer_base) from [<803276ec>] (run_timer_softirq+0x1c/0x34) [ 858.315099][ C1] r4:82804084 [ 858.315116][ C1] [<803276d0>] (run_timer_softirq) from [<8025b65c>] (handle_softirqs+0x140/0x458) [ 858.315174][ C1] [<8025b51c>] (handle_softirqs) from [<8025bad0>] (__irq_exit_rcu+0x110/0x1d0) [ 858.315235][ C1] r10:00000000 r9:83216000 r8:00000000 r7:df865e08 r6:82443f98 r5:8247f0cc [ 858.315253][ C1] r4:83216000 [ 858.315267][ C1] [<8025b9c0>] (__irq_exit_rcu) from [<8025be48>] (irq_exit+0x10/0x18) [ 858.315319][ C1] r5:8247f0cc r4:826c3a9c [ 858.315335][ C1] [<8025be38>] (irq_exit) from [<81aada64>] (generic_handle_arch_irq+0x7c/0x80) [ 858.315389][ C1] [<81aad9e8>] (generic_handle_arch_irq) from [<81a7da0c>] (call_with_stack+0x1c/0x20) [ 858.315449][ C1] r9:83216000 r8:840b1a88 r7:df865e3c r6:ffffffff r5:60000013 r4:809c832c [ 858.315467][ C1] [<81a7d9f0>] (call_with_stack) from [<80200bec>] (__irq_svc+0x8c/0xbc) [ 858.315621][ C1] Exception stack(0xdf865e08 to 0xdf865e50) [ 858.315808][ C1] 5e00: e0176008 00000009 0000ce77 00000000 e0176008 00000009 [ 858.315856][ C1] 5e20: 00000001 840ead68 840b1a88 840eac40 00000000 df865e6c df865e58 df865e58 [ 858.315881][ C1] 5e40: 809c8328 809c832c 60000013 ffffffff [ 858.315935][ C1] [<809c830c>] (gpio_mmio_write32) from [<809c7b4c>] (gpio_mmio_set+0x64/0x80) [ 858.315997][ C1] r5:00000008 r4:840eac40 [ 858.316011][ C1] [<809c7ae8>] (gpio_mmio_set) from [<809b82e8>] (gpiochip_set+0x1c/0x44) [ 858.316071][ C1] r7:00000001 r6:00000000 r5:00000003 r4:841766fc [ 858.316088][ C1] [<809b82cc>] (gpiochip_set) from [<809babb0>] (gpiod_set_raw_value_commit+0x78/0x218) [ 858.316144][ C1] [<809bab38>] (gpiod_set_raw_value_commit) from [<809bc450>] (gpiod_set_value_nocheck+0x44/0x58) [ 858.316200][ C1] r10:00000000 r9:00000000 r8:00000001 r7:ddde24c0 r6:83ebf018 r5:00000001 [ 858.316219][ C1] r4:841766fc [ 858.316233][ C1] [<809bc40c>] (gpiod_set_value_nocheck) from [<809bc4a0>] (gpiod_set_value+0x3c/0x88) [ 858.316273][ C1] [<809bc464>] (gpiod_set_value) from [<809ccc3c>] (gpio_led_set+0x5c/0x60) [ 858.316317][ C1] r5:000000ff r4:83304314 [ 858.316331][ C1] [<809ccbe0>] (gpio_led_set) from [<809ca564>] (led_set_brightness+0x84/0x90) [ 858.316377][ C1] r5:000000ff r4:83304314 [ 858.316390][ C1] [<809ca4e0>] (led_set_brightness) from [<809cc0e4>] (led_trigger_event+0x40/0x58) [ 858.316433][ C1] r5:000000ff r4:83304314 [ 858.316448][ C1] [<809cc0a4>] (led_trigger_event) from [<809cd740>] (ledtrig_cpu+0xac/0xf4) [ 858.316499][ C1] r7:ddde24c0 r6:00000002 r5:82b15cd8 r4:000000fe [ 858.316514][ C1] [<809cd694>] (ledtrig_cpu) from [<80227a38>] (arch_cpu_idle_exit+0x14/0x18) [ 858.316573][ C1] r9:00000000 r8:00000001 r7:8280c710 r6:83216000 r5:8280c6d0 r4:00000001 [ 858.316599][ C1] [<80227a24>] (arch_cpu_idle_exit) from [<802b168c>] (do_idle+0x5c/0x2d8) [ 858.316651][ C1] [<802b1630>] (do_idle) from [<802b1c38>] (cpu_startup_entry+0x30/0x34) [ 858.316713][ C1] r10:00000000 r9:414fc0f0 r8:80003000 r7:82a7b4a4 r6:83216000 r5:00000001 [ 858.316733][ C1] r4:00000092 [ 858.316747][ C1] [<802b1c08>] (cpu_startup_entry) from [<8022f360>] (secondary_start_kernel+0x128/0x194) [ 858.316803][ C1] [<8022f238>] (secondary_start_kernel) from [<80220094>] (__enable_mmu+0x0/0xc) [ 858.316867][ C1] r7:82a7b4a4 r6:30c0387d r5:00000000 r4:830b7bc0 [ 858.317185][ C1] Sending NMI from CPU 1 to CPUs 0: [ 858.317839][ C0] NMI backtrace for cpu 0 [ 858.317999][ C0] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Not tainted syzkaller #0 PREEMPT [ 858.318061][ C0] Hardware name: ARM-Versatile Express [ 858.318087][ C0] PC is at _raw_spin_lock+0x40/0x58 [ 858.318152][ C0] LR is at _raw_spin_lock+0x18/0x58 [ 858.318185][ C0] pc : [<81abbff4>] lr : [<81abbfcc>] psr: 80000013 [ 858.318208][ C0] sp : 82801e28 ip : 82801e28 fp : 82801e3c [ 858.318229][ C0] r10: 00000000 r9 : 840eac40 r8 : 840b1a88 [ 858.318253][ C0] r7 : 840ead68 r6 : 00000001 r5 : 00000004 r4 : 840ead68 [ 858.318276][ C0] r3 : 0000ce77 r2 : 0000ce79 r1 : 00000000 r0 : 00000001 [ 858.318302][ C0] Flags: Nzcv IRQs on FIQs on Mode SVC_32 ISA ARM Segment user [ 858.318345][ C0] Control: 30c5387d Table: 84d8b580 DAC: fffffffd [ 858.318367][ C0] Call trace: [ 858.318440][ C0] [<81abbfb4>] (_raw_spin_lock) from [<809c7b2c>] (gpio_mmio_set+0x44/0x80) [ 858.318525][ C0] r5:00000004 r4:840eac40 [ 858.318550][ C0] [<809c7ae8>] (gpio_mmio_set) from [<809b82e8>] (gpiochip_set+0x1c/0x44) [ 858.318632][ C0] r7:00000001 r6:00000000 r5:00000002 r4:841766e8 [ 858.318651][ C0] [<809b82cc>] (gpiochip_set) from [<809babb0>] (gpiod_set_raw_value_commit+0x78/0x218) [ 858.318708][ C0] [<809bab38>] (gpiod_set_raw_value_commit) from [<809bc450>] (gpiod_set_value_nocheck+0x44/0x58) [ 858.318776][ C0] r10:00000000 r9:00000000 r8:00000001 r7:dddce4c0 r6:83eb9f58 r5:00000001 [ 858.318799][ C0] r4:841766e8 [ 858.318817][ C0] [<809bc40c>] (gpiod_set_value_nocheck) from [<809bc4a0>] (gpiod_set_value+0x3c/0x88) [ 858.318879][ C0] [<809bc464>] (gpiod_set_value) from [<809ccc3c>] (gpio_led_set+0x5c/0x60) [ 858.318943][ C0] r5:000000ff r4:83304224 [ 858.318961][ C0] [<809ccbe0>] (gpio_led_set) from [<809ca564>] (led_set_brightness+0x84/0x90) [ 858.319016][ C0] r5:000000ff r4:83304224 [ 858.319036][ C0] [<809ca4e0>] (led_set_brightness) from [<809cc0e4>] (led_trigger_event+0x40/0x58) [ 858.319092][ C0] r5:000000ff r4:83304224 [ 858.319112][ C0] [<809cc0a4>] (led_trigger_event) from [<809cd740>] (ledtrig_cpu+0xac/0xf4) [ 858.319179][ C0] r7:dddce4c0 r6:00000002 r5:82b15cd8 r4:000001fd [ 858.319200][ C0] [<809cd694>] (ledtrig_cpu) from [<80227a38>] (arch_cpu_idle_exit+0x14/0x18) [ 858.319274][ C0] r9:00000000 r8:00000000 r7:8280c710 r6:8281b500 r5:8280c6d0 r4:00000000 [ 858.319409][ C0] [<80227a24>] (arch_cpu_idle_exit) from [<802b168c>] (do_idle+0x5c/0x2d8) [ 858.319490][ C0] [<802b1630>] (do_idle) from [<802b1c38>] (cpu_startup_entry+0x30/0x34) [ 858.319573][ C0] r10:8281aff4 r9:8280c680 r8:823bec64 r7:00000000 r6:deffc06c r5:828222e8 [ 858.319603][ C0] r4:000000ed [ 858.319626][ C0] [<802b1c08>] (cpu_startup_entry) from [<81aaf47c>] (kernel_init+0x0/0x138) [ 858.319703][ C0] [<81aaf39c>] (rest_init) from [<8260145c>] (start_kernel+0x844/0x860) [ 858.319822][ C0] [<82600c18>] (start_kernel) from [<00000000>] (0x0) [ 858.331439][ C1] Kernel panic - not syncing: softlockup: hung tasks [ 858.389552][ C1] CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Tainted: G L syzkaller #0 PREEMPT [ 858.391541][ C1] Tainted: [L]=SOFTLOCKUP [ 858.392389][ C1] Hardware name: ARM-Versatile Express [ 858.393478][ C1] Call trace: frame pointer underflow [ 858.394668][ C1] [<80201a74>] (dump_backtrace) from [<80201b70>] (show_stack+0x18/0x1c) [ 858.396290][ C1] r7:822965a4 r6:83216000 r5:00000000 r4:82295754 [ 858.397520][ C1] [<80201b58>] (show_stack) from [<8021ee08>] (dump_stack_lvl+0x54/0x7c) [ 858.399424][ C1] [<8021edb4>] (dump_stack_lvl) from [<8021ee48>] (dump_stack+0x18/0x1c) [ 858.401506][ C1] r5:00000000 r4:82a7bd14 [ 858.402679][ C1] [<8021ee30>] (dump_stack) from [<80202648>] (vpanic+0xe0/0x2e8) [ 858.404660][ C1] [<80202568>] (vpanic) from [<80202884>] (trace_suspend_resume+0x0/0xd8) [ 858.406716][ C1] r7:82ac27f8 [ 858.407734][ C1] [<80202850>] (panic) from [<80383fcc>] (watchdog_timer_fn+0x2dc/0x350) [ 858.409856][ C1] r3:00000001 r2:00004000 r1:82a7bd1c r0:822965a4 [ 858.411578][ C1] [<80383cf0>] (watchdog_timer_fn) from [<80329c64>] (__hrtimer_run_queues+0x1c4/0x454) [ 858.414020][ C1] r10:83216000 r9:00000000 r8:ddddb130 r7:80383cf0 r6:ddddb000 r5:ddddb040 [ 858.417033][ C1] r4:ddddb5d8 [ 858.418290][ C1] [<80329aa0>] (__hrtimer_run_queues) from [<8032b268>] (hrtimer_interrupt+0x148/0x2bc) [ 858.420375][ C1] r10:d2b441b0 r9:ddddb180 r8:ddddb130 r7:000000c7 r6:00000003 r5:20000193 [ 858.421933][ C1] r4:ddddb000 [ 858.422628][ C1] [<8032b120>] (hrtimer_interrupt) from [<813409e8>] (arch_timer_handler_virt+0x30/0x38) [ 858.424435][ C1] r10:81d0fc78 r9:8309e400 r8:00000000 r7:00000001 r6:00000001 r5:82498528 [ 858.425998][ C1] r4:8309de40 [ 858.426684][ C1] [<813409b8>] (arch_timer_handler_virt) from [<802efab4>] (handle_percpu_devid_irq+0x128/0x34c) [ 858.428573][ C1] [<802ef98c>] (handle_percpu_devid_irq) from [<802e8c44>] (handle_irq_desc+0x74/0x84) [ 858.430372][ C1] r10:81c05450 r9:83216000 r8:00000000 r7:df80a00c r6:826c2388 r5:df80a000 [ 858.432037][ C1] r4:8280cc44 [ 858.432867][ C1] [<802e8bd0>] (handle_irq_desc) from [<802e8cc0>] (generic_handle_domain_irq+0x18/0x1c) [ 858.435248][ C1] [<802e8ca8>] (generic_handle_domain_irq) from [<802012c8>] (gic_handle_irq+0x68/0x7c) [ 858.437590][ C1] [<80201260>] (gic_handle_irq) from [<81aada48>] (generic_handle_arch_irq+0x60/0x80) [ 858.439821][ C1] r7:df805d18 r6:82443f98 r5:8247f0cc r4:826c3a9c [ 858.441452][ C1] [<81aad9e8>] (generic_handle_arch_irq) from [<80200bdc>] (__irq_svc+0x7c/0xbc) [ 858.444006][ C1] Exception stack(0xdf805d18 to 0xdf805d60) [ 858.445683][ C1] 5d00: 00000001 00000000 [ 858.448634][ C1] 5d20: 0000ce78 0000ce77 840ead68 00000001 00000000 840ead68 840b1a88 840eac40 [ 858.452450][ C1] 5d40: 81c05450 df805d7c df805d68 df805d68 81abbfcc 81abc000 80000113 ffffffff [ 858.454169][ C1] r9:83216000 r8:840b1a88 r7:df805d4c r6:ffffffff r5:80000113 r4:81abc000 [ 858.455801][ C1] [<81abbfb4>] (_raw_spin_lock) from [<809c7b2c>] (gpio_mmio_set+0x44/0x80) [ 858.457476][ C1] r5:00000001 r4:840eac40 [ 858.458317][ C1] [<809c7ae8>] (gpio_mmio_set) from [<809b82e8>] (gpiochip_set+0x1c/0x44) [ 858.460010][ C1] r7:00000000 r6:00000000 r5:00000000 r4:841766c0 [ 858.461205][ C1] [<809b82cc>] (gpiochip_set) from [<809babb0>] (gpiod_set_raw_value_commit+0x78/0x218) [ 858.463055][ C1] [<809bab38>] (gpiod_set_raw_value_commit) from [<809bc450>] (gpiod_set_value_nocheck+0x44/0x58) [ 858.465029][ C1] r10:81c05450 r9:df805ebc r8:00000102 r7:00002da6 r6:00000026 r5:00000000 [ 858.467242][ C1] r4:841766c0 [ 858.468079][ C1] [<809bc40c>] (gpiod_set_value_nocheck) from [<809bc4a0>] (gpiod_set_value+0x3c/0x88) [ 858.470158][ C1] [<809bc464>] (gpiod_set_value) from [<809ccc3c>] (gpio_led_set+0x5c/0x60) [ 858.472159][ C1] r5:83304044 r4:83304044 [ 858.473200][ C1] [<809ccbe0>] (gpio_led_set) from [<809ca4d4>] (led_set_brightness_nosleep+0x38/0x44) [ 858.475440][ C1] r5:83304044 r4:8455524c [ 858.476423][ C1] [<809ca49c>] (led_set_brightness_nosleep) from [<809cd538>] (led_heartbeat_function+0x84/0x144) [ 858.479067][ C1] [<809cd4b4>] (led_heartbeat_function) from [<80327070>] (call_timer_fn+0x30/0x220) [ 858.481321][ C1] r7:00002da6 r6:809cd4b4 r5:8455524c r4:83216000 [ 858.483261][ C1] [<80327040>] (call_timer_fn) from [<80327524>] (__run_timers+0x2c4/0x3f8) [ 858.485187][ C1] r9:df805ebc r8:00002da6 r7:00000000 r6:809cd4b4 r5:dddd9f00 r4:8455524c [ 858.486773][ C1] [<80327260>] (__run_timers) from [<803276c0>] (run_timer_base+0x68/0x78) [ 858.488378][ C1] r10:83216000 r9:82804d80 r8:00000102 r7:00000001 r6:00000082 r5:00000002 [ 858.489935][ C1] r4:dddd9f00 [ 858.490602][ C1] [<80327658>] (run_timer_base) from [<803276ec>] (run_timer_softirq+0x1c/0x34) [ 858.492311][ C1] r4:82804084 [ 858.493036][ C1] [<803276d0>] (run_timer_softirq) from [<8025b65c>] (handle_softirqs+0x140/0x458) [ 858.494903][ C1] [<8025b51c>] (handle_softirqs) from [<8025bad0>] (__irq_exit_rcu+0x110/0x1d0) [ 858.496853][ C1] r10:00000000 r9:83216000 r8:00000000 r7:df865e08 r6:82443f98 r5:8247f0cc [ 858.498459][ C1] r4:83216000 [ 858.499335][ C1] [<8025b9c0>] (__irq_exit_rcu) from [<8025be48>] (irq_exit+0x10/0x18) [ 858.501376][ C1] r5:8247f0cc r4:826c3a9c [ 858.502365][ C1] [<8025be38>] (irq_exit) from [<81aada64>] (generic_handle_arch_irq+0x7c/0x80) [ 858.504551][ C1] [<81aad9e8>] (generic_handle_arch_irq) from [<81a7da0c>] (call_with_stack+0x1c/0x20) [ 858.507065][ C1] r9:83216000 r8:840b1a88 r7:df865e3c r6:ffffffff r5:60000013 r4:809c832c [ 858.509203][ C1] [<81a7d9f0>] (call_with_stack) from [<80200bec>] (__irq_svc+0x8c/0xbc) [ 858.511536][ C1] Exception stack(0xdf865e08 to 0xdf865e50) [ 858.532331][ C1] 5e00: e0176008 00000009 0000ce77 00000000 e0176008 00000009 [ 858.534708][ C1] 5e20: 00000001 840ead68 840b1a88 840eac40 00000000 df865e6c df865e58 df865e58 [ 858.536832][ C1] 5e40: 809c8328 809c832c 60000013 ffffffff [ 858.538337][ C1] [<809c830c>] (gpio_mmio_write32) from [<809c7b4c>] (gpio_mmio_set+0x64/0x80) [ 858.540722][ C1] r5:00000008 r4:840eac40 [ 858.541811][ C1] [<809c7ae8>] (gpio_mmio_set) from [<809b82e8>] (gpiochip_set+0x1c/0x44) [ 858.544296][ C1] r7:00000001 r6:00000000 r5:00000003 r4:841766fc [ 858.546173][ C1] [<809b82cc>] (gpiochip_set) from [<809babb0>] (gpiod_set_raw_value_commit+0x78/0x218) [ 858.550893][ C1] [<809bab38>] (gpiod_set_raw_value_commit) from [<809bc450>] (gpiod_set_value_nocheck+0x44/0x58) [ 858.553761][ C1] r10:00000000 r9:00000000 r8:00000001 r7:ddde24c0 r6:83ebf018 r5:00000001 [ 858.555784][ C1] r4:841766fc [ 858.556566][ C1] [<809bc40c>] (gpiod_set_value_nocheck) from [<809bc4a0>] (gpiod_set_value+0x3c/0x88) [ 858.558759][ C1] [<809bc464>] (gpiod_set_value) from [<809ccc3c>] (gpio_led_set+0x5c/0x60) [ 858.561123][ C1] r5:000000ff r4:83304314 [ 858.562278][ C1] [<809ccbe0>] (gpio_led_set) from [<809ca564>] (led_set_brightness+0x84/0x90) [ 858.565141][ C1] r5:000000ff r4:83304314 [ 858.567110][ C1] [<809ca4e0>] (led_set_brightness) from [<809cc0e4>] (led_trigger_event+0x40/0x58) [ 858.569771][ C1] r5:000000ff r4:83304314 [ 858.570998][ C1] [<809cc0a4>] (led_trigger_event) from [<809cd740>] (ledtrig_cpu+0xac/0xf4) [ 858.573182][ C1] r7:ddde24c0 r6:00000002 r5:82b15cd8 r4:000000fe [ 858.574660][ C1] [<809cd694>] (ledtrig_cpu) from [<80227a38>] (arch_cpu_idle_exit+0x14/0x18) [ 858.577168][ C1] r9:00000000 r8:00000001 r7:8280c710 r6:83216000 r5:8280c6d0 r4:00000001 [ 858.579856][ C1] [<80227a24>] (arch_cpu_idle_exit) from [<802b168c>] (do_idle+0x5c/0x2d8) [ 858.582680][ C1] [<802b1630>] (do_idle) from [<802b1c38>] (cpu_startup_entry+0x30/0x34) [ 858.585898][ C1] r10:00000000 r9:414fc0f0 r8:80003000 r7:82a7b4a4 r6:83216000 r5:00000001 [ 858.587732][ C1] r4:00000092 [ 858.588650][ C1] [<802b1c08>] (cpu_startup_entry) from [<8022f360>] (secondary_start_kernel+0x128/0x194) [ 858.591477][ C1] [<8022f238>] (secondary_start_kernel) from [<80220094>] (__enable_mmu+0x0/0xc) [ 858.593627][ C1] r7:82a7b4a4 r6:30c0387d r5:00000000 r4:830b7bc0 [ 858.597604][ C1] Rebooting in 86400 seconds..